Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-8668 |
9.4 (3.1)
|
Reflected XSS in E-Kalite Software Hardware Engineerin… |
E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. |
Turboard |
2026-02-11T13:34:33.079Z | 2026-02-11T14:09:58.065Z |
| CVE-2025-63386 |
9.1 (3.1)
|
A Cross-Origin Resource Sharing (CORS) misconfigu… |
n/a |
n/a |
2025-12-18T00:00:00.000Z | 2026-02-11T14:09:22.325Z |
| CVE-2026-1227 |
7 (4.0)
|
CWE-611: Improper Restriction of XML External Ent… |
Schneider Electric |
EcoStruxure Building Operation Workstation |
2026-02-11T13:45:51.675Z | 2026-02-11T14:08:24.750Z |
| CVE-2026-1226 |
7 (4.0)
|
CWE‑94: Improper Control of Generation of Code vu… |
Schneider Electric |
EcoStruxure Building Operation Workstation |
2026-02-11T13:49:45.465Z | 2026-02-11T14:07:27.708Z |
| CVE-2025-4404 |
9.1 (3.1)
|
Freeipa: idm: privilege escalation from host to domain… |
|
|
2025-06-17T13:39:17.945Z | 2026-02-11T12:37:51.316Z |
| CVE-2025-59386 |
1.2 (4.0)
|
QuTS hero |
QNAP Systems Inc. |
QuTS hero |
2026-02-11T12:16:19.698Z | 2026-02-11T12:16:19.698Z |
| CVE-2025-6830 |
9.8 (3.1)
|
SQLi in Xpoda Türkiye Information Technology's Passwor… |
Xpoda Türkiye Information Technology Inc. |
Password Module |
2026-02-09T11:18:22.248Z | 2026-02-11T11:26:01.413Z |
| CVE-2025-25207 |
5.7 (3.1)
|
Rhcl: authpolicy callbacks result in denial of service… |
|
|
2025-06-09T06:12:51.416Z | 2026-02-11T10:44:40.702Z |
| CVE-2025-0875 |
6.5 (3.1)
|
IDOR in Proliz Software's OBS |
PROLIZ Computer Software Hardware Service Trade Ltd. Co. |
OBS (Student Affairs Information System) |
2025-09-22T08:02:09.660Z | 2026-02-11T07:23:46.991Z |
| CVE-2024-4259 |
6.9 (4.0)
|
Sensetive Data Exposure in SAMPAS's AKOS |
SAMPAŞ Holding |
AKOS (AkosCepVatandasService) |
2024-09-03T13:15:31.501Z | 2026-02-11T07:15:42.419Z |
| CVE-2023-6190 |
9.8 (3.1)
|
Authenicated Path Traversal in İzmir Katip Çelebi University |
İzmir Katip Çelebi University |
University Information Management System |
2023-12-27T14:36:35.559Z | 2026-02-11T07:14:59.075Z |
| CVE-2025-36511 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) M… |
n/a |
Intel(R) Memory and Storage Tool |
2026-02-10T16:26:04.601Z | 2026-02-11T04:56:53.066Z |
| CVE-2025-29950 |
7.1 (4.0)
|
Improper input validation in system management mo… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:10:28.112Z | 2026-02-11T04:56:51.402Z |
| CVE-2025-29951 |
7.3 (4.0)
|
A buffer overflow in the AMD Secure Processor (AS… |
AMD |
AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics |
2026-02-10T19:50:51.594Z | 2026-02-11T04:56:49.007Z |
| CVE-2026-21349 |
7.8 (3.1)
|
Lightroom Desktop | Out-of-bounds Write (CWE-787) |
Adobe |
Lightroom Desktop |
2026-02-10T19:43:23.584Z | 2026-02-11T04:56:48.192Z |
| CVE-2026-21351 |
7.8 (3.1)
|
After Effects | Use After Free (CWE-416) |
Adobe |
After Effects |
2026-02-10T17:52:53.649Z | 2026-02-11T04:56:47.428Z |
| CVE-2026-21312 |
7.8 (3.1)
|
Audition | Out-of-bounds Write (CWE-787) |
Adobe |
Audition |
2026-02-10T17:45:15.153Z | 2026-02-11T04:56:46.599Z |
| CVE-2026-21345 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Read (CWE-125) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:27.925Z | 2026-02-11T04:56:45.629Z |
| CVE-2026-21344 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Read (CWE-125) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:30.445Z | 2026-02-11T04:56:44.594Z |
| CVE-2026-21343 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Read (CWE-125) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:29.603Z | 2026-02-11T04:56:43.753Z |
| CVE-2026-21342 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:27.134Z | 2026-02-11T04:56:42.986Z |
| CVE-2026-21341 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:28.733Z | 2026-02-11T04:56:42.178Z |
| CVE-2026-21330 |
7.8 (3.1)
|
After Effects | Access of Resource Using Incompatible … |
Adobe |
After Effects |
2026-02-10T17:52:57.874Z | 2026-02-11T04:56:41.422Z |
| CVE-2026-21329 |
7.8 (3.1)
|
After Effects | Use After Free (CWE-416) |
Adobe |
After Effects |
2026-02-10T17:53:05.522Z | 2026-02-11T04:56:40.603Z |
| CVE-2026-21328 |
7.8 (3.1)
|
After Effects | Out-of-bounds Write (CWE-787) |
Adobe |
After Effects |
2026-02-10T17:53:00.426Z | 2026-02-11T04:56:39.644Z |
| CVE-2026-21327 |
7.8 (3.1)
|
After Effects | Out-of-bounds Write (CWE-787) |
Adobe |
After Effects |
2026-02-10T17:52:56.262Z | 2026-02-11T04:56:38.871Z |
| CVE-2026-21326 |
7.8 (3.1)
|
After Effects | Use After Free (CWE-416) |
Adobe |
After Effects |
2026-02-10T17:53:03.097Z | 2026-02-11T04:56:38.089Z |
| CVE-2026-21325 |
7.8 (3.1)
|
After Effects | Out-of-bounds Read (CWE-125) |
Adobe |
After Effects |
2026-02-10T17:52:57.103Z | 2026-02-11T04:56:37.260Z |
| CVE-2026-21324 |
7.8 (3.1)
|
After Effects | Out-of-bounds Read (CWE-125) |
Adobe |
After Effects |
2026-02-10T17:53:03.917Z | 2026-02-11T04:56:36.506Z |
| CVE-2026-21323 |
7.8 (3.1)
|
After Effects | Use After Free (CWE-416) |
Adobe |
After Effects |
2026-02-10T17:53:04.726Z | 2026-02-11T04:56:35.742Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-0631 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:48:21.791Z | 2026-02-03T04:56:00.729Z |
| CVE-2026-22221 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:43:24.983Z | 2026-02-03T04:55:54.010Z |
| CVE-2026-22222 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:49:22.166Z | 2026-02-03T04:55:54.765Z |
| CVE-2026-22223 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link System Inc. |
Archer BE230 v1.2 |
2026-02-02T17:49:58.951Z | 2026-02-03T04:55:55.533Z |
| CVE-2026-22224 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:52:04.728Z | 2026-02-03T04:55:56.275Z |
| CVE-2026-22225 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:53:42.203Z | 2026-02-03T04:55:56.965Z |
| CVE-2026-22227 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:56:25.111Z | 2026-02-03T04:55:58.450Z |
| CVE-2026-22229 |
8.6 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:58:32.205Z | 2026-02-03T04:55:59.127Z |
| CVE-2026-24688 |
5.1 (4.0)
|
pypdf has possible Infinite Loop when processing outli… |
py-pdf |
pypdf |
2026-01-27T19:44:06.173Z | 2026-01-27T20:51:48.030Z |
| CVE-2026-22226 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:55:30.434Z | 2026-02-03T04:55:57.758Z |
| CVE-2025-12810 |
5.3 (4.0)
|
Failure in Password Rotation and Check-in Mechanism in… |
Delinea Inc. |
Secret Server On-Prem |
2026-01-27T19:46:04.677Z | 2026-01-27T20:51:42.590Z |
| CVE-2025-5553 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
PHPGurukul Rail Pass Management System download-pass.p… |
PHPGurukul |
Rail Pass Management System |
2025-06-04T02:00:22.090Z | 2026-02-06T17:21:36.762Z |
| CVE-2023-6425 |
6.3 (3.1)
|
Cross-site Scripting vulnerability in BigProf products |
BigProf |
Online Clinic Management System |
2023-11-30T13:49:37.332Z | 2026-02-06T17:16:22.258Z |
| CVE-2022-40924 |
7.2 (3.1)
|
Zoo Management System v1.0 has an arbitrary file … |
n/a |
n/a |
2022-09-26T12:03:15.000Z | 2026-02-06T17:28:06.523Z |
| CVE-2026-24883 |
3.7 (3.1)
|
In GnuPG before 2.5.17, a long signature packet l… |
GnuPG |
GnuPG |
2026-01-27T18:43:18.883Z | 2026-01-28T15:52:11.076Z |
| CVE-2026-24882 |
8.4 (3.1)
|
In GnuPG before 2.5.17, a stack-based buffer over… |
GnuPG |
GnuPG |
2026-01-27T18:40:18.166Z | 2026-01-28T15:45:56.231Z |
| CVE-2026-0537 |
7.8 (3.1)
|
RGB File Parsing Memory Corruption |
Autodesk |
3ds Max |
2026-02-04T16:26:01.689Z | 2026-02-06T04:55:22.692Z |
| CVE-2026-0538 |
7.8 (3.1)
|
GIF File Parsing Out-of-Bounds Write |
Autodesk |
3ds Max |
2026-02-04T16:24:36.976Z | 2026-02-06T04:55:20.858Z |
| CVE-2024-37385 |
9.8 (3.1)
|
Roundcube Webmail before 1.5.7 and 1.6.x before 1… |
n/a |
n/a |
2024-06-07T03:24:23.567Z | 2025-02-13T15:59:49.701Z |
| CVE-2026-0660 |
7.8 (3.1)
|
Stack Based Buffer Overflow in GIF File Parsing |
Autodesk |
3ds Max |
2026-02-04T16:27:40.582Z | 2026-02-05T04:55:18.619Z |
| CVE-2026-1504 |
6.5 (3.1)
|
Inappropriate implementation in Background Fetch … |
Google |
Chrome |
2026-01-27T20:46:35.796Z | 2026-01-27T21:16:21.039Z |
| CVE-2026-0227 |
6.6 (4.0)
|
PAN-OS: Firewall Denial of Service (DoS) in GlobalProt… |
Palo Alto Networks |
Cloud NGFW |
2026-01-15T18:45:08.579Z | 2026-01-30T23:36:56.887Z |
| CVE-2025-14512 |
6.5 (3.1)
|
Glib: integer overflow in glib gio attribute escaping … |
GNOME |
glib |
2025-12-11T07:11:02.182Z | 2026-01-06T14:45:25.859Z |
| CVE-2025-14087 |
5.6 (3.1)
|
Glib: glib: buffer underflow in gvariant parser leads … |
GNOME |
glib |
2025-12-10T09:01:34.084Z | 2026-02-06T20:10:02.901Z |
| CVE-2026-23110 |
N/A
|
scsi: core: Wake up the error handler when final compl… |
Linux |
Linux |
2026-02-04T16:08:30.158Z | 2026-02-09T08:38:51.485Z |
| CVE-2026-23108 |
N/A
|
can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB … |
Linux |
Linux |
2026-02-04T16:08:28.650Z | 2026-02-09T08:38:49.458Z |
| CVE-2026-23107 |
N/A
|
arm64/fpsimd: signal: Allocate SSVE storage when resto… |
Linux |
Linux |
2026-02-04T16:08:27.755Z | 2026-02-09T08:38:48.412Z |
| CVE-2026-23105 |
N/A
|
net/sched: qfq: Use cl_is_active to determine whether … |
Linux |
Linux |
2026-02-04T16:08:26.376Z | 2026-02-09T08:38:46.285Z |
| CVE-2026-23103 |
N/A
|
ipvlan: Make the addrs_lock be per port |
Linux |
Linux |
2026-02-04T16:08:24.771Z | 2026-02-09T08:38:44.156Z |
| CVE-2026-23102 |
N/A
|
arm64/fpsimd: signal: Fix restoration of SVE context |
Linux |
Linux |
2026-02-04T16:08:24.034Z | 2026-02-09T08:38:43.127Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-0631 | An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows an adjacent … | 2026-02-02T18:16:13.620 | 2026-02-06T18:36:44.913 |
| fkie_cve-2026-22221 | An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent a… | 2026-02-02T18:16:14.740 | 2026-02-06T18:36:03.140 |
| fkie_cve-2026-22222 | An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent a… | 2026-02-02T18:16:14.870 | 2026-02-06T18:35:31.283 |
| fkie_cve-2026-22223 | An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent a… | 2026-02-02T18:16:15.007 | 2026-02-06T18:34:34.877 |
| fkie_cve-2026-22224 | A command injection vulnerability may be exploited after the admin's authentication in the cloud co… | 2026-02-02T18:16:15.137 | 2026-02-06T18:31:56.727 |
| fkie_cve-2026-22225 | A command injection vulnerability may be exploited after the admin's authentication in the VPN Conn… | 2026-02-02T18:16:15.273 | 2026-02-06T18:31:22.757 |
| fkie_cve-2026-22227 | A command injection vulnerability may be exploited after the admin's authentication via the configu… | 2026-02-02T18:16:15.540 | 2026-02-06T18:30:59.340 |
| fkie_cve-2026-22229 | A command injection vulnerability may be exploited after the admin's authentication via the import … | 2026-02-02T18:16:15.673 | 2026-02-06T18:29:56.750 |
| fkie_cve-2026-24688 | pypdf is a free and open-source pure-python PDF library. An attacker who uses an infinite loop vuln… | 2026-01-27T20:16:24.193 | 2026-02-06T18:27:40.367 |
| fkie_cve-2026-22226 | A command injection vulnerability may be exploited after the admin's authentication in the VPN serv… | 2026-02-02T18:16:15.407 | 2026-02-06T18:27:15.303 |
| fkie_cve-2025-12810 | Improper Authentication vulnerability in Delinea Inc. Secret Server On-Prem (RPC Password Rotation … | 2026-01-27T20:16:14.320 | 2026-02-06T18:26:20.253 |
| fkie_cve-2025-5553 | A vulnerability classified as critical was found in PHPGurukul Rail Pass Management System 1.0. Aff… | 2025-06-04T03:15:27.517 | 2026-02-06T18:15:54.987 |
| fkie_cve-2023-6425 | A vulnerability has been discovered in BigProf Online Clinic Management System 2.2, which does not … | 2023-11-30T14:15:20.317 | 2026-02-06T18:15:54.640 |
| fkie_cve-2022-40924 | Zoo Management System v1.0 has an arbitrary file upload vulnerability in the picture upload point o… | 2022-09-26T13:15:11.643 | 2026-02-06T18:15:54.353 |
| fkie_cve-2026-24883 | In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success wit… | 2026-01-27T19:16:16.823 | 2026-02-06T18:06:07.760 |
| fkie_cve-2026-24882 | In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the P… | 2026-01-27T19:16:16.670 | 2026-02-06T17:50:53.153 |
| fkie_cve-2026-0537 | A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption… | 2026-02-04T17:16:12.237 | 2026-02-06T17:49:40.607 |
| fkie_cve-2026-0538 | A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can force an Out-of-Bounds Wr… | 2026-02-04T17:16:12.403 | 2026-02-06T17:49:06.210 |
| fkie_cve-2024-37385 | Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 on Windows allows command injection via im_co… | 2024-06-07T04:15:30.720 | 2026-02-06T17:48:55.880 |
| fkie_cve-2026-0660 | A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause a Stack-Based Buffe… | 2026-02-04T17:16:12.790 | 2026-02-06T17:48:33.337 |
| fkie_cve-2026-1504 | Inappropriate implementation in Background Fetch API in Google Chrome prior to 144.0.7559.110 allow… | 2026-01-27T21:16:00.480 | 2026-02-06T17:45:56.510 |
| fkie_cve-2026-0227 | A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause … | 2026-01-15T19:16:05.087 | 2026-02-06T17:37:28.723 |
| fkie_cve-2025-14512 | A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (D… | 2025-12-11T07:16:00.463 | 2026-02-06T17:20:29.617 |
| fkie_cve-2025-14087 | A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap cor… | 2025-12-10T09:15:47.053 | 2026-02-06T17:19:39.453 |
| fkie_cve-2026-23110 | In the Linux kernel, the following vulnerability has been resolved: scsi: core: Wake up the error … | 2026-02-04T17:16:21.880 | 2026-02-06T17:16:25.900 |
| fkie_cve-2026-23108 | In the Linux kernel, the following vulnerability has been resolved: can: usb_8dev: usb_8dev_read_b… | 2026-02-04T17:16:21.673 | 2026-02-06T17:16:25.810 |
| fkie_cve-2026-23107 | In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: signal: Allocate… | 2026-02-04T17:16:21.570 | 2026-02-06T17:16:25.717 |
| fkie_cve-2026-23105 | In the Linux kernel, the following vulnerability has been resolved: net/sched: qfq: Use cl_is_acti… | 2026-02-04T17:16:21.370 | 2026-02-06T17:16:25.617 |
| fkie_cve-2026-23103 | In the Linux kernel, the following vulnerability has been resolved: ipvlan: Make the addrs_lock be… | 2026-02-04T17:16:21.177 | 2026-02-06T17:16:25.527 |
| fkie_cve-2026-23102 | In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: signal: Fix rest… | 2026-02-04T17:16:21.077 | 2026-02-06T17:16:25.430 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-46c4-8wrp-j99v |
5.3 (3.1)
|
Improper Validation and Sanitization in url-parse | 2022-01-06T20:30:34Z | 2026-02-03T22:13:35Z |
| ghsa-hh27-ffr2-f2jc |
6.1 (3.1)
|
Open redirect in url-parse | 2021-08-10T16:07:08Z | 2026-02-03T22:12:27Z |
| ghsa-9m6j-fcg5-2442 |
5.3 (3.1)
|
Path traversal in url-parse | 2021-05-06T16:10:51Z | 2026-02-03T22:11:36Z |
| ghsa-jf5r-8hm2-f872 |
6.5 (3.1)
|
url-parse incorrectly parses hostname / protocol due to unstripped leading control characters. | 2022-02-22T00:00:30Z | 2026-02-03T22:10:35Z |
| ghsa-h9r9-2pxg-cx9m |
6.1 (4.0)
|
Craft Commerce has Stored XSS in Shipping Zone (Name & Description) Fields Leading to Potential Pri… | 2026-02-02T23:04:00Z | 2026-02-03T21:40:58Z |
| ghsa-wq2m-r96q-crrf |
6.1 (4.0)
|
Craft Commerce has Stored XSS in Inventory Location Address Leading to Potential Privilege Escalation | 2026-02-02T23:02:33Z | 2026-02-03T21:40:50Z |
| ghsa-v585-mf6r-rqrc |
6.1 (4.0)
|
Craft Commerce has Stored XSS in Tax Zones (Name & Description) Leading to Potential Privilege Escalation | 2026-02-02T23:00:13Z | 2026-02-03T21:40:44Z |
| ghsa-p6w8-q63m-72c8 |
6.1 (4.0)
|
Craft Commerce has Stored XSS in Tax Categories (Name & Description) Fields Leading to Potential Pr… | 2026-02-02T22:51:51Z | 2026-02-03T21:40:36Z |
| ghsa-wqc5-485v-3hqh |
6.1 (4.0)
|
Craft CMS has Stored XSS in Tax Rates Name Leading to Potential Privilege Escalation | 2026-02-02T22:51:16Z | 2026-02-03T21:40:29Z |
| ghsa-g92v-wpv7-6w22 |
6.1 (4.0)
|
Craft Commerce has Stored XSS in Shipping Methods Name Field Leading to Potential Privilege Escalation | 2026-02-02T22:49:55Z | 2026-02-03T21:40:21Z |
| ghsa-w8gw-qm8p-j9j3 |
6.2 (4.0)
|
Craft Commerce has Stored XSS in Shipping Categories (Name & Description) Fields Leading to Potenti… | 2026-02-02T22:45:03Z | 2026-02-03T21:40:14Z |
| ghsa-2h2m-v2mg-656c |
4.8 (4.0)
|
Craft Commerce has Stored XSS in Product Type Name | 2026-02-02T22:44:05Z | 2026-02-03T21:40:06Z |
| ghsa-8478-rmjg-mjj5 |
6.2 (4.0)
|
Craft Commerce has Stored XSS via Order Status Message with potential database exfiltration | 2026-02-02T22:43:00Z | 2026-02-03T21:39:59Z |
| ghsa-frj9-9rwc-pw9j |
6.2 (4.0)
|
Craft Commerce has Stored DOM XSS in Order Status Name (Reflects in "Recent Orders" Dashboard Widget) | 2026-02-02T22:41:44Z | 2026-02-03T21:39:52Z |
| ghsa-xv49-34rf-rqv4 |
5.3 (3.1)
|
A flaw was found in libsoup, an HTTP client/server library. This HTTP Request Smuggling vulnerabili… | 2026-02-03T21:31:52Z | 2026-02-03T21:31:52Z |
| ghsa-wcxx-c2xv-8f8r |
|
Rejected reason: loading template... | 2026-02-03T21:31:52Z | 2026-02-03T21:31:52Z |
| ghsa-v5p5-42vv-7p25 |
6.9 (4.0)
|
A type confusion vulnerability has been identified in the Postscript interpreter in various Lexmark… | 2026-02-03T21:31:52Z | 2026-02-03T21:31:52Z |
| ghsa-m6wh-6x2c-qqwh |
7.8 (3.1)
|
NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where malicious data cre… | 2026-02-03T21:31:52Z | 2026-02-03T21:31:52Z |
| ghsa-jjc7-cxqw-h32m |
8.8 (4.0)
|
A relative path traversal vulnerability has been identified in the Embedded Solutions Framework in … | 2026-02-03T21:31:52Z | 2026-02-03T21:31:52Z |
| ghsa-99r6-qcrg-9jhf |
6.9 (4.0)
|
A heap-based buffer overflow vulnerability has been identified in the Postscript interpreter in var… | 2026-02-03T21:31:52Z | 2026-02-03T21:31:52Z |
| ghsa-8gmc-c3g8-vc4p |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was detected in bolo-blog bolo-solo up to 2.6.4. The impacted element is the functi… | 2026-02-03T21:31:52Z | 2026-02-03T21:31:52Z |
| ghsa-7hq7-f7fv-849c |
8.1 (3.1)
8.2 (4.0)
|
A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of th… | 2026-02-03T21:31:52Z | 2026-02-03T21:31:52Z |
| ghsa-596w-8h87-c3q9 |
9.3 (4.0)
|
An untrusted search path vulnerability has been identified in the Embedded Solutions Framework in v… | 2026-02-03T21:31:52Z | 2026-02-03T21:31:52Z |
| ghsa-26c5-hw5x-8mj6 |
6.9 (4.0)
|
An out-of-bounds read vulnerability has been identified in the Postscript interpreter in various Le… | 2026-02-03T21:31:52Z | 2026-02-03T21:31:52Z |
| ghsa-q4rj-q7j3-gxf6 |
6.0 (4.0)
|
When configured as L2TP/IPSec VPN server, Archer AXE75 V1 may accept connections using L2TP without… | 2026-02-03T21:31:51Z | 2026-02-03T21:31:51Z |
| ghsa-762j-mg76-ggm9 |
7.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in Ziroom ZHOME A0101 1.0.1.0. This issue affects the function … | 2026-02-03T21:31:51Z | 2026-02-03T21:31:51Z |
| ghsa-66jj-x34q-v9c3 |
10.0 (3.1)
|
A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminPando 1.0.1 b… | 2026-02-03T21:31:51Z | 2026-02-03T21:31:51Z |
| ghsa-xrmq-qg76-wcr7 |
3.7 (3.1)
|
HCL AION is affected by an Autocomplete HTML Attribute Not Disabled for Password Field vulnerabilit… | 2026-02-03T21:31:50Z | 2026-02-03T21:31:50Z |
| ghsa-vfrv-pfvv-m3qr |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-03T15:30:25Z | 2026-02-03T21:31:50Z |
| ghsa-r6fx-q53x-p986 |
4.3 (3.1)
|
Missing Authorization vulnerability in Themefic Travelfic Toolkit travelfic-toolkit allows Exploiti… | 2026-02-03T15:30:24Z | 2026-02-03T21:31:50Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2019-118 |
|
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes t… | rpyc | 2019-10-03T20:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-11 |
|
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x b… | django | 2019-08-02T15:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-103 |
|
KeyIdentity LinOTP before 2.10.5.3 has Incorrect Access Control (issue 1 of 2). | linotp | 2019-06-27T14:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-102 |
|
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 20… | limnoria | 2019-11-16T01:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-10 |
|
An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before … | django | 2019-07-01T14:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2020-71 |
|
In openapi-python-client before version 0.5.3, clients generated with a maliciously craft… | openapi-python-client | 2020-08-14T17:15:00Z | 2020-08-20T18:11:00Z |
| pysec-2020-70 |
|
In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. I… | openapi-python-client | 2020-08-14T17:15:00Z | 2020-08-20T18:02:00Z |
| pysec-2020-103 |
|
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The sal… | salt | 2020-04-30T17:15:00Z | 2020-08-20T01:17:00Z |
| pysec-2020-102 |
|
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The sal… | salt | 2020-04-30T17:15:00Z | 2020-08-20T01:17:00Z |
| pysec-2020-46 |
|
In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `htt… | httplib2 | 2020-05-20T16:15:00Z | 2020-08-19T18:56:00Z |
| pysec-2020-38 |
|
django-celery-results through 1.2.1 stores task results in the database. Among the data i… | django-celery-results | 2020-08-11T21:15:00Z | 2020-08-14T20:09:00Z |
| pysec-2020-76 |
|
Pillow before 7.1.0 has multiple out-of-bounds reads in libImaging/FliDecode.c. | pillow | 2020-06-25T19:15:00Z | 2020-08-08T20:15:00Z |
| pysec-2020-150 |
|
This affects all versions of package uvicorn. The request logger provided by the package … | uvicorn | 2020-07-27T12:15:00Z | 2020-08-04T18:05:00Z |
| pysec-2020-30 |
|
A buffer overflow in the patching routine of bsdiff4 before 1.2.0 allows an attacker to w… | bsdiff4 | 2020-07-22T23:15:00Z | 2020-07-31T16:15:00Z |
| pysec-2020-44 |
|
This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen,… | gerapy | 2020-07-29T13:15:00Z | 2020-07-31T14:59:00Z |
| pysec-2020-151 |
|
Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not es… | uvicorn | 2020-07-27T12:15:00Z | 2020-07-29T19:15:00Z |
| pysec-2020-154 |
|
In Wagtail before versions 2.7.4 and 2.9.3, when a form page type is made available to Wa… | wagtail | 2020-07-20T18:15:00Z | 2020-07-28T12:29:00Z |
| pysec-2020-80 |
|
In libImaging/SgiRleDecode.c in Pillow through 7.0.0, a number of out-of-bounds reads exi… | pillow | 2020-06-25T19:15:00Z | 2020-07-27T19:15:00Z |
| pysec-2020-79 |
|
In libImaging/Jpeg2KDecode.c in Pillow before 7.1.0, there are multiple out-of-bounds rea… | pillow | 2020-06-25T19:15:00Z | 2020-07-27T19:15:00Z |
| pysec-2020-78 |
|
In Pillow before 7.1.0, there are two Buffer Overflows in libImaging/TiffDecode.c. | pillow | 2020-06-25T19:15:00Z | 2020-07-27T19:15:00Z |
| pysec-2020-77 |
|
In libImaging/PcxDecode.c in Pillow before 7.1.0, an out-of-bounds read can occur when re… | pillow | 2020-06-25T19:15:00Z | 2020-07-27T19:15:00Z |
| pysec-2019-117 |
|
ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in co… | reportlab | 2019-10-16T12:15:00Z | 2020-07-27T03:15:00Z |
| pysec-2020-16 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecuto… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-24T18:22:00Z |
| pysec-2020-15 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecuto… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-24T18:19:00Z |
| pysec-2020-51 |
|
In jupyterhub-kubespawner before 0.12, certain usernames will be able to craft particular… | jupyterhub-kubespawner | 2020-07-17T21:15:00Z | 2020-07-22T20:28:00Z |
| pysec-2020-14 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command in… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-22T17:15:00Z |
| pysec-2020-17 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. It was discovered that m… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-21T18:45:00Z |
| pysec-2020-23 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. A stored XSS vulnerabili… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-21T18:38:00Z |
| pysec-2020-39 |
|
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in… | django-two-factor-auth | 2020-07-10T21:15:00Z | 2020-07-21T18:06:00Z |
| pysec-2020-36 |
|
Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection … | django | 2020-03-05T15:15:00Z | 2020-07-14T17:28:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-31815 | In TOTOLINK EX200 V4.0.3c.7314_B20191204, an attacker can obtain the configuration file w… | 2024-04-11T05:03:20.780826Z |
| gsd-2024-31814 | TOTOLINK EX200 V4.0.3c.7646_B20201211 allows attackers to bypass login through the Form_L… | 2024-04-11T05:03:20.884658Z |
| gsd-2024-31813 | TOTOLINK EX200 V4.0.3c.7646_B20201211 does not contain an authentication mechanism by default. | 2024-04-11T05:03:20.883958Z |
| gsd-2024-31812 | In TOTOLINK EX200 V4.0.3c.7646_B20201211, an attacker can obtain sensitive information wi… | 2024-04-11T05:03:20.585225Z |
| gsd-2024-31811 | TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (… | 2024-04-11T05:03:20.877591Z |
| gsd-2024-31810 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.846824Z |
| gsd-2024-31809 | TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (… | 2024-04-11T05:03:20.762722Z |
| gsd-2024-31808 | TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (… | 2024-04-11T05:03:20.782624Z |
| gsd-2024-31807 | TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (… | 2024-04-11T05:03:20.898233Z |
| gsd-2024-31806 | TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a Denial-of-Service (DoS)… | 2024-04-11T05:03:20.886467Z |
| gsd-2024-31805 | TOTOLINK EX200 V4.0.3c.7646_B20201211 allows attackers to start the Telnet service withou… | 2024-04-11T05:03:20.784694Z |
| gsd-2024-31804 | An unquoted service path vulnerability in Terratec DMX_6Fire USB v.1.23.0.02 allows a loc… | 2024-04-11T05:03:20.547390Z |
| gsd-2024-31803 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.545975Z |
| gsd-2024-31802 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.579047Z |
| gsd-2024-31801 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.822018Z |
| gsd-2024-31800 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.821394Z |
| gsd-2024-31799 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.567526Z |
| gsd-2024-31798 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.680860Z |
| gsd-2024-31797 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.892713Z |
| gsd-2024-31796 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.889653Z |
| gsd-2024-31795 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.703151Z |
| gsd-2024-31794 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.788538Z |
| gsd-2024-31793 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.712068Z |
| gsd-2024-31792 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.571501Z |
| gsd-2024-31791 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.895756Z |
| gsd-2024-31790 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.777539Z |
| gsd-2024-31789 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.764686Z |
| gsd-2024-31788 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.747028Z |
| gsd-2024-31787 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.650971Z |
| gsd-2024-31786 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.825435Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-192577 | Malicious code in sd-skbms (npm) | 2025-12-15T07:33:11Z | 2025-12-24T10:09:30Z |
| mal-2025-192576 | Malicious code in sd-security (npm) | 2025-12-15T07:33:11Z | 2025-12-24T10:09:30Z |
| mal-2025-192566 | Malicious code in shopify-monorail (npm) | 2025-12-12T06:31:00Z | 2025-12-24T10:09:30Z |
| mal-2025-192565 | Malicious code in sdbao-content-sems (npm) | 2025-12-12T06:34:05Z | 2025-12-24T10:09:30Z |
| mal-2025-192564 | Malicious code in sdbao-content-report (npm) | 2025-12-12T06:34:05Z | 2025-12-24T10:09:30Z |
| mal-2025-192563 | Malicious code in sd-pay-ts (npm) | 2025-12-12T06:34:06Z | 2025-12-24T10:09:30Z |
| mal-2025-192562 | Malicious code in sd-pay (npm) | 2025-12-12T06:34:06Z | 2025-12-24T10:09:30Z |
| mal-2025-192417 | Malicious code in rum-events-format (npm) | 2025-12-10T01:57:45Z | 2025-12-24T10:09:30Z |
| mal-2025-192401 | Malicious code in serval-integrations-common-frontend (npm) | 2025-12-10T01:43:51Z | 2025-12-24T10:09:30Z |
| mal-2025-192315 | Malicious code in seeds-random (npm) | 2025-12-05T03:03:24Z | 2025-12-24T10:09:30Z |
| mal-2025-191595 | Malicious code in tailwindcss-forms (npm) | 2025-12-01T13:26:48Z | 2025-12-24T10:09:30Z |
| mal-2025-191594 | Malicious code in tailwind-style-override (npm) | 2025-12-01T13:26:47Z | 2025-12-24T10:09:30Z |
| mal-2025-191593 | Malicious code in tailwind-state (npm) | 2025-12-01T13:26:43Z | 2025-12-24T10:09:30Z |
| mal-2025-191588 | Malicious code in stringify-coder (npm) | 2025-12-01T13:26:20Z | 2025-12-24T10:09:30Z |
| mal-2025-191586 | Malicious code in session-validate (npm) | 2025-12-01T13:25:08Z | 2025-12-24T10:09:30Z |
| mal-2025-191582 | Malicious code in react-mandes (npm) | 2025-12-01T13:22:29Z | 2025-12-24T10:09:30Z |
| mal-2025-191581 | Malicious code in react-adparser (npm) | 2025-12-01T13:22:08Z | 2025-12-24T10:09:30Z |
| mal-2025-191503 | Malicious code in start-internal (npm) | 2025-12-01T16:00:47Z | 2025-12-24T10:09:30Z |
| mal-2025-191428 | Malicious code in solomon-v3-stories (npm) | 2025-11-24T23:41:58Z | 2025-12-24T10:09:30Z |
| mal-2025-191423 | Malicious code in shelf-jwt-sessions (npm) | 2025-11-25T00:16:49Z | 2025-12-24T10:09:30Z |
| mal-2025-191422 | Malicious code in selenium-session-client (npm) | 2025-11-25T00:16:49Z | 2025-12-24T10:09:30Z |
| mal-2025-191421 | Malicious code in selenium-session (npm) | 2025-11-25T00:16:49Z | 2025-12-24T10:09:30Z |
| mal-2025-191403 | Malicious code in prompt-eng-server (npm) | 2025-11-25T00:16:49Z | 2025-12-24T10:09:30Z |
| MAL-2025-66550 | Malicious code in szsec-infos-report (npm) | 2025-11-11T00:02:04Z | 2025-12-24T10:09:30Z |
| MAL-2025-49446 | Malicious code in supxmlparser (npm) | 2025-11-09T00:17:09Z | 2025-12-24T10:09:30Z |
| MAL-2025-49441 | Malicious code in superbankxmlparser (npm) | 2025-11-09T00:17:09Z | 2025-12-24T10:09:30Z |
| MAL-2025-49439 | Malicious code in study-lab-npm-test (npm) | 2025-11-09T00:17:09Z | 2025-12-24T10:09:30Z |
| MAL-2025-49383 | Malicious code in rce-poc-test-honor-mcp (npm) | 2025-11-07T04:05:52Z | 2025-12-24T10:09:30Z |
| MAL-2025-49382 | Malicious code in rce-poc-test-honor-dev (npm) | 2025-11-07T04:05:52Z | 2025-12-24T10:09:30Z |
| MAL-2025-49376 | Malicious code in solara-websocket-dll (npm) | 2025-11-05T23:23:27Z | 2025-12-24T10:09:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-2978 | GnuTLS: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-11-20T23:00:00.000+00:00 | 2025-01-12T23:00:00.000+00:00 |
| wid-sec-w-2022-0246 | expat: Mehrere Schwachstellen | 2022-01-17T23:00:00.000+00:00 | 2025-01-12T23:00:00.000+00:00 |
| wid-sec-w-2025-0041 | IBM App Connect Enterprise: Schwachstelle ermöglicht Denial of Service | 2025-01-09T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2025-0039 | Nagios Enterprises Nagios XI: Schwachstelle ermöglicht Cross-Site Scripting | 2025-01-09T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3763 | Paessler PRTG: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-12-30T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3522 | Red Hat OpenStack Platform: Mehrere Schwachstellen | 2024-11-20T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3494 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-11-18T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3410 | Xen: Mehrere Schwachstellen | 2024-11-11T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3329 | Mattermost: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-11-04T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3315 | Drupal: Mehrere Schwachstellen | 2024-10-30T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3268 | Drupal: Mehrere Schwachstellen | 2024-10-23T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3127 | Drupal: Mehrere Schwachstellen | 2024-10-09T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3070 | Drupal: Mehrere Schwachstellen | 2024-10-03T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-2178 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-09-18T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-2126 | Drupal: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen und Denial of Service | 2024-09-11T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-2055 | Drupal: Mehrere Schwachstellen | 2024-09-04T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1943 | Drupal "Advanced Varnish" Extension: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-08-28T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1940 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-08-27T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1900 | Drupal Module: Mehrere Schwachstellen | 2024-08-21T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1816 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-08-12T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1791 | Drupal: Mehrere Schwachstellen ermöglichen Codeausführung und Cross Site Scripting | 2024-08-07T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1740 | Drupal: Schwachstelle ermöglicht Cross-Site Scripting | 2024-07-31T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1300 | Drupal: Schwachstelle ermöglicht Denial of Service | 2024-06-05T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1258 | Drupal: Mehrere Schwachstellen | 2024-05-30T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1220 | Drupal Erweiterungen: Mehrere Schwachstellen | 2024-05-22T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1165 | Drupal: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-05-15T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0968 | Drupal: Mehrere Schwachstellen | 2024-04-24T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0739 | Drupal: Schwachstelle ermöglicht Cross-Site Scripting | 2024-03-27T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0570 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-03-06T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0517 | Drupal Extensions: Mehrere Schwachstellen | 2024-02-28T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:1000 | Red Hat Security Advisory: OpenShift Container Platform 4.20.12 bug fix and security update | 2026-01-27T14:30:57+00:00 | 2026-02-18T08:48:42+00:00 |
| rhsa-2026:0761 | Red Hat Security Advisory: Red Hat build of Cryostat security update | 2026-01-19T03:34:11+00:00 | 2026-02-18T08:48:39+00:00 |
| rhsa-2026:0518 | Red Hat Security Advisory: Red Hat Quay 3.16.1 | 2026-01-13T16:03:52+00:00 | 2026-02-18T08:48:31+00:00 |
| rhsa-2025:23644 | Red Hat Security Advisory: Red Hat multicluster global hub 1.4.3 security update | 2025-12-18T10:46:11+00:00 | 2026-02-18T08:48:17+00:00 |
| rhsa-2025:23428 | Red Hat Security Advisory: Red Hat multicluster global hub 1.5.2 security update | 2025-12-17T01:06:13+00:00 | 2026-02-18T08:48:14+00:00 |
| rhsa-2025:23248 | Red Hat Security Advisory: RHSA 4.7.9 security and bug fix update | 2025-12-16T08:28:09+00:00 | 2026-02-18T08:48:09+00:00 |
| rhsa-2025:22861 | Red Hat Security Advisory: Red Hat Developer Hub 1.8.1 release. | 2025-12-08T15:17:40+00:00 | 2026-02-18T08:48:00+00:00 |
| rhsa-2025:3714 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.14.2 | 2025-04-08T19:22:48+00:00 | 2026-02-18T08:35:37+00:00 |
| rhsa-2024:8314 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.0.1 | 2024-10-23T17:26:40+00:00 | 2026-02-18T08:35:21+00:00 |
| rhsa-2024:7744 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.12 security, enhancement & bug fix update | 2024-10-07T12:50:24+00:00 | 2026-02-18T08:35:20+00:00 |
| rhsa-2024:7323 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.6.24 | 2024-10-07T19:55:49+00:00 | 2026-02-18T08:35:19+00:00 |
| rhsa-2024:7237 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.8.13 | 2024-09-26T15:00:53+00:00 | 2026-02-18T08:35:17+00:00 |
| rhsa-2024:6738 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.5.7 security updates and bug fixes | 2024-09-17T19:47:09+00:00 | 2026-02-18T08:35:13+00:00 |
| rhsa-2024:5634 | Red Hat Security Advisory: podman security update | 2024-08-20T16:11:08+00:00 | 2026-02-18T08:34:59+00:00 |
| rhsa-2024:5199 | Red Hat Security Advisory: OpenShift Container Platform 4.12.63 security and extras update | 2024-08-19T01:02:38+00:00 | 2026-02-18T08:34:58+00:00 |
| rhsa-2024:5194 | Red Hat Security Advisory: container-tools:rhel8 security update | 2024-08-12T02:39:45+00:00 | 2026-02-18T08:34:52+00:00 |
| rhsa-2024:5160 | Red Hat Security Advisory: OpenShift Container Platform 4.15.27 security update | 2024-08-15T14:24:40+00:00 | 2026-02-18T08:34:52+00:00 |
| rhsa-2024:5107 | Red Hat Security Advisory: OpenShift Container Platform 4.16.7 bug fix and security update | 2024-08-13T09:55:00+00:00 | 2026-02-18T08:34:50+00:00 |
| rhsa-2024:4858 | Red Hat Security Advisory: OpenShift Container Platform 4.16.5 packages and security update | 2024-07-31T13:21:46+00:00 | 2026-02-18T08:34:50+00:00 |
| rhsa-2024:4965 | Red Hat Security Advisory: OpenShift Container Platform 4.16.6 bug fix and security update | 2024-08-06T11:28:10+00:00 | 2026-02-18T08:34:49+00:00 |
| rhsa-2024:4963 | Red Hat Security Advisory: OpenShift Container Platform 4.14.34 security update | 2024-08-07T13:32:54+00:00 | 2026-02-18T08:34:49+00:00 |
| rhsa-2024:4846 | Red Hat Security Advisory: OpenShift Container Platform 4.13.46 security update | 2024-07-31T14:32:24+00:00 | 2026-02-18T08:34:42+00:00 |
| rhsa-2024:4316 | Red Hat Security Advisory: OpenShift Container Platform 4.16.2 bug fix and security update | 2024-07-09T10:50:31+00:00 | 2026-02-18T08:34:39+00:00 |
| rhsa-2024:4469 | Red Hat Security Advisory: OpenShift Container Platform 4.16.3 security update | 2024-07-16T13:40:33+00:00 | 2026-02-18T08:34:35+00:00 |
| rhsa-2021:3016 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes version 2.3 | 2021-08-06T00:48:52+00:00 | 2026-02-18T08:24:42+00:00 |
| rhsa-2025:9986 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2025-06-30T21:23:51+00:00 | 2026-02-18T08:04:20+00:00 |
| rhsa-2025:9975 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 2025-06-30T17:50:04+00:00 | 2026-02-18T08:04:20+00:00 |
| rhsa-2025:9845 | Red Hat Security Advisory: weldr-client security update | 2025-06-26T16:57:30+00:00 | 2026-02-18T08:04:19+00:00 |
| rhsa-2025:9844 | Red Hat Security Advisory: osbuild-composer security update | 2025-06-26T16:57:43+00:00 | 2026-02-18T08:04:19+00:00 |
| rhsa-2025:9756 | Red Hat Security Advisory: opentelemetry-collector security update | 2025-06-26T07:53:59+00:00 | 2026-02-18T08:04:19+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-19-346-01 | Advantech DiagAnywhere Server | 2019-12-12T00:00:00.000000Z | 2019-12-12T00:00:00.000000Z |
| icsa-19-106-03 | PLC Cycle Time Influences (Update A) | 2019-04-16T00:00:00.000000Z | 2019-12-12T00:00:00.000000Z |
| icsa-19-344-05 | Siemens XHQ Operations Intelligence | 2019-12-10T00:00:00.000000Z | 2019-12-10T00:00:00.000000Z |
| icsa-19-344-01 | Siemens SCALANCE W700 and W1700 | 2019-12-10T00:00:00.000000Z | 2019-12-10T00:00:00.000000Z |
| icsa-19-339-02 | Weidmueller Industrial Ethernet Switches | 2019-12-05T00:00:00.000000Z | 2019-12-05T00:00:00.000000Z |
| icsa-19-339-01 | Thales DIS SafeNet Sentinel LDK License Manager Runtime | 2019-12-05T00:00:00.000000Z | 2019-12-05T00:00:00.000000Z |
| icsa-19-337-02 | Moxa AWK-3121 | 2019-12-03T00:00:00.000000Z | 2019-12-03T00:00:00.000000Z |
| icsa-19-337-01 | Reliable Controls LicenseManager | 2019-12-03T00:00:00.000000Z | 2019-12-03T00:00:00.000000Z |
| icsa-19-330-02 | ABB Relion 650 and 670 Series | 2019-11-26T00:00:00.000000Z | 2019-11-26T00:00:00.000000Z |
| icsa-19-330-01 | ABB Relion 670 Series | 2019-11-26T00:00:00.000000Z | 2019-11-26T00:00:00.000000Z |
| icsa-19-323-01 | Flexera FlexNet Publisher | 2019-11-19T00:00:00.000000Z | 2019-11-19T00:00:00.000000Z |
| icsa-19-318-05 | ABB Power Generation Information Manager (PGIM) and Plant Connect | 2019-11-14T00:00:00.000000Z | 2019-11-14T00:00:00.000000Z |
| icsa-19-318-03 | Siemens Desigo PX Devices | 2019-11-12T00:00:00.000000Z | 2019-11-12T00:00:00.000000Z |
| icsma-19-311-02 | Medtronic Valleylab FT10 and FX8 | 2019-11-07T00:00:00.000000Z | 2019-11-07T00:00:00.000000Z |
| icsma-19-311-01 | Medtronic Valleylab FT10 and LS10 | 2019-11-07T00:00:00.000000Z | 2019-11-07T00:00:00.000000Z |
| icsma-19-120-01 | Philips Tasy EMR (Update A) | 2019-04-30T00:00:00.000000Z | 2019-11-07T00:00:00.000000Z |
| icsa-19-311-02 | Fuji Electric V-Server | 2019-11-07T00:00:00.000000Z | 2019-11-07T00:00:00.000000Z |
| icsa-19-311-01 | Mitsubishi Electric MELSEC-Q Series and MELSEC-L Series CPU Modules | 2019-11-07T00:00:00.000000Z | 2019-11-07T00:00:00.000000Z |
| icsa-19-309-01 | Omron CX-Supervisor | 2019-11-05T00:00:00.000000Z | 2019-11-05T00:00:00.000000Z |
| icsa-19-134-01 | Omron Network Configurator for DeviceNet (Update A) | 2019-05-14T00:00:00.000000Z | 2019-11-05T00:00:00.000000Z |
| icsa-19-304-04 | Honeywell equIP and Performance Series IP Cameras and Recorders | 2019-10-31T00:00:00.000000Z | 2019-10-31T00:00:00.000000Z |
| icsa-19-304-03 | Honeywell equIP and Performance Series IP Cameras | 2019-10-31T00:00:00.000000Z | 2019-10-31T00:00:00.000000Z |
| icsa-19-304-02 | Honeywell equIP Series IP Cameras | 2019-10-31T00:00:00.000000Z | 2019-10-31T00:00:00.000000Z |
| icsa-19-304-01 | Advantech WISE-PaaS/RMM | 2019-10-31T00:00:00.000000Z | 2019-10-31T00:00:00.000000Z |
| icsa-19-302-01 | PHOENIX CONTACT Automation Worx Software Suite | 2019-10-29T00:00:00.000000Z | 2019-10-29T00:00:00.000000Z |
| icsma-19-297-01 | Philips IntelliSpace Perinatal | 2019-10-24T00:00:00.000000Z | 2019-10-24T00:00:00.000000Z |
| icsa-19-297-02 | Honeywell IP-AK2 | 2019-10-24T00:00:00.000000Z | 2019-10-24T00:00:00.000000Z |
| icsa-19-297-01 | Rittal Chiller SK 3232-Series | 2019-10-24T00:00:00.000000Z | 2019-10-24T00:00:00.000000Z |
| icsa-19-057-01 | Moxa IKS, EDS (Update A) | 2019-02-26T00:00:00.000000Z | 2019-10-24T00:00:00.000000Z |
| icsa-19-295-01 | ICSA-19-295-01_Schneider Electric ProClima | 2019-10-22T00:00:00.000000Z | 2019-10-22T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20200205-nxos-cdp-rce | Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability | 2020-02-05T16:00:00+00:00 | 2020-02-14T20:08:04+00:00 |
| cisco-sa-20200122-ios-xr-evpn | Cisco IOS XR Software BGP EVPN Denial of Service Vulnerabilities | 2020-01-22T16:00:00+00:00 | 2020-02-07T16:48:01+00:00 |
| cisco-sa-20191120-cucm-sql | Cisco Unified Communications Manager SQL Injection Vulnerability | 2019-11-20T16:00:00+00:00 | 2020-02-06T17:00:15+00:00 |
| cisco-sa-ise-xss-dxjsrwrx | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2020-02-05T16:00:00+00:00 | 2020-02-05T16:00:00+00:00 |
| cisco-sa-ise-xss-DxJsRWRx | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2020-02-05T16:00:00+00:00 | 2020-02-05T16:00:00+00:00 |
| cisco-sa-20200205-ipcameras-rce-dos | Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Remote Code Execution and Denial of Service Vulnerability | 2020-02-05T16:00:00+00:00 | 2020-02-05T16:00:00+00:00 |
| cisco-sa-20190205-dnac-xss | Cisco Digital Network Architecture Center Stored Cross-Site Scripting Vulnerability | 2020-02-05T16:00:00+00:00 | 2020-02-05T16:00:00+00:00 |
| cisco-sa-20200122-wsa-sma-header-inject | Cisco Web Security Appliance and Cisco Content Security Management Appliance HTTP Header Injection Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-02-03T16:50:10+00:00 |
| cisco-sa-smlbus-switch-dos-r6vqus2u | Cisco Small Business Switches Denial of Service Vulnerability | 2020-01-29T16:00:00+00:00 | 2020-01-29T16:00:00+00:00 |
| cisco-sa-smlbus-switch-dos-R6VquS2u | Cisco Small Business Switches Denial of Service Vulnerability | 2020-01-29T16:00:00+00:00 | 2020-01-29T16:00:00+00:00 |
| cisco-sa-20191016-sbss-csrf | Cisco Small Business Smart and Managed Switches Cross-Site Request Forgery Vulnerability | 2019-10-16T16:00:00+00:00 | 2020-01-27T14:22:59+00:00 |
| cisco-sa-20200124-webex-unauthjoin | Cisco Webex Meetings Suite and Cisco Webex Meetings Online Unauthenticated Meeting Join Vulnerability | 2020-01-24T16:00:00+00:00 | 2020-01-24T19:21:30+00:00 |
| cisco-sa-20200122-ios-xr-routes | Cisco IOS XR Software BGP EVPN Operational Routes Denial of Service Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-24T16:22:50+00:00 |
| cisco-sa-telepresence-path-tr-wdrnyezz | Cisco TelePresence Collaboration Endpoint, TelePresence Codec, and RoomOS Software Path Traversal Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T20:52:27+00:00 |
| cisco-sa-telepresence-path-tr-wdrnYEZZ | Cisco TelePresence Collaboration Endpoint, TelePresence Codec, and RoomOS Software Path Traversal Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T20:52:27+00:00 |
| cisco-sa-20190703-iosxr-bgp-dos | Cisco IOS XR Software Border Gateway Protocol Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2020-01-22T16:01:55+00:00 |
| cisco-sa-webex-cards-dos-fwzncxpq | Cisco Webex Teams Adaptive Cards Denial of Service Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-webex-cards-dos-FWzNcXPq | Cisco Webex Teams Adaptive Cards Denial of Service Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-ucm-csrf-nbhztxl | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-ucm-csrf-NbhZTxL | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-sd-wan-cred-evgsf259 | Cisco IOS XE SD-WAN Software Default Credentials Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-sd-wan-cred-EVGSF259 | Cisco IOS XE SD-WAN Software Default Credentials Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-jabber-guest-xss-6urxhkqv | Cisco Jabber Guest Cross-Site Scripting Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-jabber-guest-xss-6urXhkqv | Cisco Jabber Guest Cross-Site Scripting Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-iptable-bypass-gxw88xjl | Cisco Application Policy Infrastructure Controller Out Of Band Management IP Tables Bypass Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-iptable-bypass-GxW88XjL | Cisco Application Policy Infrastructure Controller Out Of Band Management IP Tables Bypass Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-esa-dos-87mbkc8n | Cisco Email Security Appliance Zip Decompression Engine Denial of Service Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-esa-dos-87mBkc8n | Cisco Email Security Appliance Zip Decompression Engine Denial of Service Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-esa-bypass-5cdv2hma | Cisco Email Security Appliance Content Filter Bypass Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-esa-bypass-5Cdv2HMA | Cisco Email Security Appliance Content Filter Bypass Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-49543 | ath11k: fix the warning of dev_wake in mhi_pm_disable_transition() | 2025-02-02T00:00:00.000Z | 2025-10-24T01:01:44.000Z |
| msrc_cve-2022-49469 | btrfs: fix anon_dev leak in create_subvol() | 2025-02-02T00:00:00.000Z | 2025-10-24T01:01:38.000Z |
| msrc_cve-2022-49173 | spi: fsi: Implement a timeout for polling status | 2025-02-02T00:00:00.000Z | 2025-10-24T01:01:33.000Z |
| msrc_cve-2025-59501 | Microsoft Configuration Manager Spoofing Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-24T00:00:00.000Z |
| msrc_cve-2025-59287 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-24T00:00:00.000Z |
| msrc_cve-2025-53054 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:45.000Z |
| msrc_cve-2025-53045 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:38.000Z |
| msrc_cve-2025-53069 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:30.000Z |
| msrc_cve-2025-53053 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:22.000Z |
| msrc_cve-2025-53062 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:15.000Z |
| msrc_cve-2025-53040 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:07.000Z |
| msrc_cve-2025-53044 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:00.000Z |
| msrc_cve-2025-53042 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:05:53.000Z |
| msrc_cve-2025-59500 | Azure Notification Service Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-23T00:00:00.000Z |
| msrc_cve-2025-59295 | Windows URL Parsing Remote Code Execution Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-23T00:00:00.000Z |
| msrc_cve-2025-59273 | Azure Event Grid System Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-23T00:00:00.000Z |
| msrc_cve-2025-55676 | Windows USB Video Class System Driver Information Disclosure Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-23T00:00:00.000Z |
| msrc_cve-2024-57888 | workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker | 2025-01-02T00:00:00.000Z | 2025-10-22T01:02:36.000Z |
| msrc_cve-2022-49533 | ath11k: Change max no of active probe SSID and BSSID to fw capability | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:31.000Z |
| msrc_cve-2022-49528 | media: i2c: dw9714: Disable the regulator when the driver fails to probe | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:25.000Z |
| msrc_cve-2022-49504 | scsi: lpfc: Inhibit aborts if external loopback plug is inserted | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:20.000Z |
| msrc_cve-2022-49420 | net: annotate races around sk->sk_bound_dev_if | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:14.000Z |
| msrc_cve-2022-49333 | net/mlx5: E-Switch, pair only capable devices | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:09.000Z |
| msrc_cve-2022-49306 | usb: dwc3: host: Stop setting the ACPI companion | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:03.000Z |
| msrc_cve-2022-49267 | mmc: core: use sysfs_emit() instead of sprintf() | 2025-02-02T00:00:00.000Z | 2025-10-22T01:01:58.000Z |
| msrc_cve-2025-8058 | The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow buffer manipulation depending of how the regex is constructed. This issue affects all architectures and ABIs supported by the GNU C library. | 2025-07-02T00:00:00.000Z | 2025-10-22T01:01:52.000Z |
| msrc_cve-2024-38564 | bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE | 2024-06-02T07:00:00.000Z | 2025-10-22T01:01:47.000Z |
| msrc_cve-2025-40010 | afs: Fix potential null pointer dereference in afs_put_server | 2025-10-02T00:00:00.000Z | 2025-10-22T01:01:41.000Z |
| msrc_cve-2025-40011 | drm/gma500: Fix null dereference in hdmi teardown | 2025-10-02T00:00:00.000Z | 2025-10-22T01:01:36.000Z |
| msrc_cve-2025-40016 | media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID | 2025-10-02T00:00:00.000Z | 2025-10-22T01:01:25.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:13270-1 | matrix-synapse-1.93.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13269-1 | chromedriver-117.0.5938.132-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13268-1 | MozillaThunderbird-115.3.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13267-1 | php8-8.2.10-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13266-1 | libmozjs-102-0-102.15.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13265-1 | element-desktop-1.11.43-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13264-1 | dlt-daemon-2.18.10-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13263-1 | ImageMagick-7.1.1.17-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13262-1 | cargo1.72-1.72.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13261-1 | python311-3.11.5-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13260-1 | python310-jupyter-server-2.7.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13259-1 | apache-commons-configuration2-2.9.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13258-1 | nodejs-electron-25.8.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13257-1 | xen-4.17.2_04-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13256-1 | tomcat-9.0.80-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13255-1 | seamonkey-2.53.17.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13254-1 | python-gevent-doc-23.9.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13253-1 | python-2.7.18-39.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13252-1 | libraw-devel-0.21.1-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13251-1 | gnome-extensions-45.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13250-1 | cups-2.4.2-7.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13249-1 | bind-9.18.19-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13248-1 | python312-3.12.0rc3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13247-1 | ghostscript-9.56.1-6.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13246-1 | ghc-pandoc-3.1.3-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13245-1 | kernel-devel-6.5.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13244-1 | ungoogled-chromium-116.0.5845.187-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13243-1 | postgresql15-15.4-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13242-1 | chromedriver-116.0.5845.187-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13241-1 | libopenssl-1_1-devel-1.1.1w-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2018-99 | Heap-buffer-overflow in git__strntol64 | 2021-01-13T00:00:43.443325Z | 2022-04-13T03:04:35.208725Z |
| osv-2018-92 | Use-of-uninitialized-value in _gnutls_x509_get_time | 2021-01-13T00:00:41.525029Z | 2022-04-13T03:04:35.649410Z |
| osv-2018-72 | Use-of-uninitialized-value in read_pbkdf2_params | 2021-01-13T00:00:34.744580Z | 2022-04-13T03:04:35.613386Z |
| osv-2018-58 | Heap-buffer-overflow in tag_parse | 2021-01-13T00:00:29.755710Z | 2022-04-13T03:04:35.203520Z |
| osv-2018-3 | Heap-buffer-overflow in git__strntol64 | 2021-01-12T06:20:32.894786Z | 2022-04-13T03:04:35.177963Z |
| osv-2018-208 | Global-buffer-overflow in bloaty::wasm::Section::Read | 2021-01-13T00:01:24.904877Z | 2022-04-13T03:04:35.767921Z |
| osv-2018-202 | Heap-buffer-overflow in parse_mode | 2021-01-13T00:01:22.703610Z | 2022-04-13T03:04:35.198491Z |
| osv-2018-2 | Heap-buffer-overflow in git_buf_vprintf | 2021-01-12T06:20:27.447382Z | 2022-04-13T03:04:35.213787Z |
| osv-2018-196 | Use-of-uninitialized-value in _pkcs12_decode_safe_contents | 2021-01-13T00:01:21.384798Z | 2022-04-13T03:04:35.621086Z |
| osv-2018-188 | Use-of-uninitialized-value in _decode_pkcs12_auth_safe | 2021-01-13T00:01:19.024161Z | 2022-04-13T03:04:35.641785Z |
| osv-2018-186 | Use-of-uninitialized-value in decode_complex_string | 2021-01-13T00:01:17.204065Z | 2022-04-13T03:04:35.581207Z |
| osv-2018-177 | Heap-buffer-overflow in prefixcmp | 2021-01-13T00:01:13.296112Z | 2022-04-13T03:04:35.193285Z |
| osv-2018-134 | Heap-buffer-overflow in bloaty::DisassembleFindReferences | 2021-01-13T00:00:59.023336Z | 2022-04-13T03:04:35.762718Z |
| osv-2018-122 | Use-of-uninitialized-value in gnutls_pkcs12_get_bag | 2021-01-13T00:00:55.785646Z | 2022-04-13T03:04:35.628751Z |
| osv-2018-121 | Use-of-uninitialized-value in _gnutls_x509_read_pkalgo_params | 2021-01-13T00:00:55.302684Z | 2022-04-13T03:04:35.600569Z |
| osv-2018-104 | Heap-buffer-overflow in git__strntol64 | 2021-01-13T00:00:45.886374Z | 2022-04-13T03:04:35.183028Z |
| osv-2017-93 | Use-of-uninitialized-value in CharToWideMap | 2021-01-13T21:57:40.114700Z | 2022-04-13T03:04:35.299518Z |
| osv-2017-90 | Use-of-uninitialized-value in ComprDataIO::UnpRead | 2021-01-13T21:57:39.385103Z | 2022-04-13T03:04:35.280203Z |
| osv-2017-9 | Use-of-uninitialized-value in QuickOpen::Read | 2021-01-13T00:00:14.156767Z | 2022-04-13T03:04:35.237839Z |
| osv-2017-72 | Use-of-uninitialized-value in _gnutls_mpi_dprint_size | 2021-01-13T21:57:00.941902Z | 2022-04-13T03:04:35.574876Z |
| osv-2017-71 | Use-of-uninitialized-value in wcsncatz | 2021-01-13T21:56:56.231357Z | 2022-04-13T03:04:35.243592Z |
| osv-2017-67 | Heap-buffer-overflow in OSS_FUZZ_png_combine_row | 2021-01-13T21:56:33.199482Z | 2022-04-13T03:04:35.569529Z |
| osv-2017-65 | Use-of-uninitialized-value in Archive::GetComment | 2021-01-13T21:56:32.077659Z | 2022-04-13T03:04:35.268362Z |
| osv-2017-64 | Use-of-uninitialized-value in SetExtraInfo20 | 2021-01-13T21:56:31.829117Z | 2022-04-13T03:04:35.311562Z |
| osv-2017-62 | Use-of-uninitialized-value in gnutls_memset | 2021-01-13T21:56:30.798250Z | 2022-04-13T03:04:35.635523Z |
| osv-2017-41 | Heap-buffer-overflow in OSS_FUZZ_png_combine_row | 2021-01-13T21:56:05.092063Z | 2022-04-13T03:04:35.564255Z |
| osv-2017-39 | Use-of-uninitialized-value in IsRelativeSymlinkSafe | 2021-01-13T21:56:03.501889Z | 2022-04-13T03:04:35.323958Z |
| osv-2017-3 | Use-of-uninitialized-value in Archive::GetComment | 2021-01-13T00:00:02.349159Z | 2022-04-13T03:04:35.226025Z |
| osv-2017-25 | Use-of-uninitialized-value in ToPercent | 2021-01-13T00:01:28.724375Z | 2022-04-13T03:04:35.256245Z |
| osv-2017-17 | Use-of-uninitialized-value in QuickOpen::Seek | 2021-01-13T00:00:28.517212Z | 2022-04-13T03:04:35.274300Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-airflow-2024-32077 | Apache Airflow: XSS vulnerability in Task Instance Log/Log Details | 2024-05-24T07:15:55.746Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2024-31869 | Apache Airflow: Sensitive configuration for providers displayed when "non-sensitive-only" config used | 2024-04-20T07:16:43.969Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2024-29735 | Apache Airflow: Potentially harmful permission changing by log task handler | 2024-03-28T07:16:52.369Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2024-28746 | Apache Airflow: Ignored Airflow Permissions | 2024-03-31T18:16:36.634Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2024-27906 | Apache Airflow: Dag Code and Import Error Permissions Ignored | 2024-03-31T18:16:47.034Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2024-26280 | Apache Airflow: Overly broad default permissions for Viewer/Ops (audit logs) | 2024-03-31T18:16:59.178Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2024-25142 | Apache Airflow: Cache Control - Storage of Sensitive Data in Browser Cache | 2024-06-18T07:17:29.631Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-51702 | Apache Airflow CNCF Kubernetes provider, Apache Airflow: Kubernetes configuration file saved without encryption in the Metadata and logged as plain text in the Triggerer service | 2024-03-06T10:50:28.804Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-50944 | Apache Airflow: Bypass permission verification to read code of other dags | 2024-03-06T10:50:38.379Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-50943 | Apache Airflow: Potential pickle deserialization vulnerability in XComs | 2024-03-06T10:50:50.999Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-50783 | Apache Airflow: Improper access control vulnerability on the "varimport" endpoint | 2024-03-06T10:51:04.280Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-49920 | Apache Airflow: Missing CSRF protection on DAG/trigger | 2024-03-06T10:51:17.298Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-48291 | Apache Airflow: Improper access control to DAG resources | 2024-03-06T10:51:25.710Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-47265 | Apache Airflow: DAG Params alllow to embed unchecked Javascript | 2024-03-06T10:51:38.889Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-47037 | Apache Airflow missing fix for CVE-2023-40611 in 2.7.1 (DAG run broken access) | 2024-03-06T10:51:48.668Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-46288 | Apache Airflow: Sensitive parameters exposed in API when "non-sensitive-only" configuration is set | 2024-03-06T10:52:00.977Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-46215 | Apache Airflow Celery provider, Apache Airflow: Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend | 2024-03-06T10:52:11.268Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-45348 | Apache Airflow: Configuration information leakage vulnerability | 2024-03-06T10:52:21.772Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-42792 | Apache Airflow: Improper access control to DAG resources | 2024-03-06T10:52:32.990Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-42781 | Apache Airflow: Permission verification bypass allows viewing dagruns of other dags | 2024-03-06T10:52:45.892Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-42780 | Apache Airflow: Improper access control vulnerability in the "List dag warnings" feature | 2024-03-06T10:52:56.668Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-42663 | Apache Airflow: Bypass permission verification to view task instances of other dags | 2024-03-06T10:53:07.908Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-40712 | Apache Airflow: Secrets can be unmasked in the "Rendered Template" | 2024-03-06T10:53:19.281Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-40611 | Apache Airflow Dag Runs Broken Access Control Vulnerability | 2024-03-06T10:53:28.968Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-40273 | Session fixation in Apache Airflow web interface | 2024-03-06T10:53:37.079Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-39508 | Apache Airflow: Airflow "Run task" feature allows execution with unnecessary priviledges | 2024-03-06T10:53:46.702Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-39441 | Apache Airflow SMTP Provider, Apache Airflow IMAP Provider, Apache Airflow: SMTP/IMAP client components allowed MITM due to missing Certificate Validation | 2024-03-06T10:53:58.103Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-37379 | Apache Airflow: Exposure of sensitive connection information, DOS and SSRF on "test connection" feature | 2024-03-06T10:54:08.760Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-36543 | Apache Airflow: ReDoS via dags function | 2024-03-06T10:54:19.002Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-35908 | Apache Airflow: Access to DAGs without relevant permission | 2024-03-06T10:54:30.276Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-201304-0173 | SensorApp in Cisco Intrusion Prevention System (IPS) allows local users to cause a denial… | 2024-02-13T22:46:37.155000Z |
| var-201505-0195 | SQL injection vulnerability in Cisco Unified Email Interaction Manager (EIM) and Unified … | 2024-02-13T22:46:35.641000Z |
| var-201502-0399 | Fortinet FortiAuthenticator 3.0.0 logs the PostgreSQL usernames and passwords in cleartex… | 2024-02-13T22:46:35.853000Z |
| var-201806-0735 | Protection Mechanism Failure in ECOS Secure Boot Stick (aka SBS) 5.6.5 allows an attacker… | 2024-02-13T22:46:32.081000Z |
| var-201803-1420 | Dell EMC Isilon OneFS versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 … | 2024-02-13T22:46:32.430000Z |
| var-202012-0641 | Emerson Rosemount X-STREAM Gas AnalyzerX-STREAM enhanced XEGP, XEGK, XEFD, XEXF – all rev… | 2024-02-13T22:46:27.376000Z |
| var-202012-0326 | The affected versions of S+ Operations (version 2.1 SP1 and earlier) used an approach for… | 2024-02-13T22:46:27.415000Z |
| var-202201-0897 | A vulnerability in the information storage architecture of several Cisco IP Phone models … | 2024-02-13T22:46:25.804000Z |
| var-202201-0605 | Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.9… | 2024-02-13T22:46:25.837000Z |
| var-202201-0604 | Buffer Over-read vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.20… | 2024-02-13T22:46:25.869000Z |
| var-202201-0603 | Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Works64 vers… | 2024-02-13T22:46:25.925000Z |
| var-202201-1949 | On BIG-IP version 16.1.x before 16.1.1, 15.1.x before 15.1.4, 14.1.x before 14.1.4.4, and… | 2024-02-13T22:46:22.052000Z |
| var-202203-0696 | Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were… | 2024-02-13T22:46:21.283000Z |
| var-202206-1231 | A vulnerability in the login page of Cisco Identity Services Engine (ISE) could allow an … | 2024-02-13T22:46:20.580000Z |
| var-202206-1082 | A vulnerability in /cgi-bin/ExportAllSettings.sh of WAVLINK WN579 X3 M79X3.V5030.180719 a… | 2024-02-13T22:46:20.645000Z |
| var-202204-0944 | There is an improper authentication vulnerability in FLMG-10 10.0.1.0(H100SP22C00). Succe… | 2024-02-13T22:46:20.981000Z |
| var-201412-0432 | Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X … | 2024-02-13T22:44:04.110000Z |
| var-201504-0075 | Cross-site scripting (XSS) vulnerability in Inductive Automation Ignition 7.7.2 allows re… | 2024-02-13T22:44:03.766000Z |
| var-201704-0098 | SONY SNC-CH115, SNC-CH120, SNC-CH160, SNC-CH220, SNC-CH260, SNC-DH120, SNC-DH120T, SNC-DH… | 2024-02-13T22:44:02.356000Z |
| var-201609-0308 | Cisco Firepower Management Center before 6.1 and FireSIGHT System Software before 6.1, wh… | 2024-02-13T22:44:02.948000Z |
| var-201903-1405 | Grandstream UCM6204 before 1.0.19.20 devices allow remote authenticated users to execute … | 2024-02-13T22:43:58.192000Z |
| var-201810-0462 | SAGA1-L8B with any firmware versions prior to A0.10 are vulnerable to an attack that may … | 2024-02-13T22:43:58.768000Z |
| var-201810-0125 | The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to a denial of s… | 2024-02-13T22:43:58.864000Z |
| var-202010-1194 | A stored cross-site scripting (XSS) vulnerability exists in the SonicOS SSLVPN web interf… | 2024-02-13T22:43:55.708000Z |
| var-202111-0330 | Multiple uncontrolled resource consumption vulnerabilities in the web interface of FortiP… | 2024-02-13T22:43:54.612000Z |
| var-202201-0632 | In a Junos Fusion scenario an External Control of Critical State Data vulnerability in th… | 2024-02-13T22:43:24.052000Z |
| var-202201-0613 | A malicious user on the same LAN could use DNS spoofing followed by a command injection a… | 2024-02-13T22:43:24.117000Z |
| var-202201-0612 | A limited authentication bypass vulnerability was discovered that could allow an attacker… | 2024-02-13T22:43:24.083000Z |
| var-202201-0609 | My Cloud OS 5 was vulnerable to a pre-authenticated stack overflow vulnerability on the F… | 2024-02-13T22:43:24.155000Z |
| var-202201-1556 | A Improper Validation of Specified Index, Position, or Offset in Input vulnerability in t… | 2024-02-13T22:43:23.699000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2005-000792 | eBASEweb SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000791 | Cross-site scripting vulnerability in the Unicode version of msearch | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000789 | Hyper NIKKI System cross-site request forgery vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000788 | FreeStyleWiki command injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000787 | Pochy denial-of-service (DoS) vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000786 | WirelessIP5000 has multiple vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000785 | WirelessIP5000 has multiple vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000784 | WirelessIP5000 has multiple vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000783 | WirelessIP5000 has multiple vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000782 | WirelessIP5000 has multiple vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000781 | Common Management Agent 3.x vulnerable to information leakage | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000780 | Hiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000779 | Hiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000778 | QRcode Perl CGI & PHP script vulnerable to denial of service attack | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000777 | tDiary cross-site request forgery vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000776 | Java Cryptography Extension 1.2.1 (JCE 1.2.1) will no longer function properly after July 28, 2005 due to the expiration of its digital certificate | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000774 | SFS cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000773 | desknet's cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000772 | Inappropriate interpretation of mailto URL scheme by mail client software | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000771 | Wiki clone cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000770 | Virus Security memory leak vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000769 | Virus Security heap overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000768 | Movable Type session management vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000767 | WebUD arbitrary program execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000766 | w3ml cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000765 | Buffalo router configuration management interface vulnerable to remote access and password leakage | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000764 | Website connection problem when a mobile phone terminal uses specific QR code | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000763 | ppBlog cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000762 | Norton AntiVirus causes abnormal OS termination when scanning illegal files | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000761 | Norton AntiVirus causes abnormal OS termination when a user edits a shared network file | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:1027-1 | Security update for the Linux Kernel | 2025-03-26T12:12:05Z | 2025-03-26T12:12:05Z |
| suse-su-2025:1026-1 | Security update for php7 | 2025-03-26T11:30:47Z | 2025-03-26T11:30:47Z |
| suse-su-2025:1025-1 | Security update for php7 | 2025-03-26T11:30:00Z | 2025-03-26T11:30:00Z |
| suse-su-2025:1024-1 | Security update for tomcat10 | 2025-03-26T11:29:12Z | 2025-03-26T11:29:12Z |
| suse-su-2025:1023-1 | Security update for webkit2gtk3 | 2025-03-26T11:28:46Z | 2025-03-26T11:28:46Z |
| suse-su-2025:1022-1 | Security update for apache-commons-vfs2 | 2025-03-26T11:28:34Z | 2025-03-26T11:28:34Z |
| suse-su-2025:1019-1 | Security update for azure-cli-core | 2025-03-26T10:27:40Z | 2025-03-26T10:27:40Z |
| suse-su-2025:1018-1 | Security update for buildah | 2025-03-26T09:03:07Z | 2025-03-26T09:03:07Z |
| suse-su-2025:1017-1 | Security update for buildah | 2025-03-26T09:02:54Z | 2025-03-26T09:02:54Z |
| suse-su-2025:1014-1 | Security update for buildah | 2025-03-25T13:05:55Z | 2025-03-25T13:05:55Z |
| suse-su-2025:1013-1 | Security update for govulncheck-vulndb | 2025-03-25T12:47:48Z | 2025-03-25T12:47:48Z |
| suse-su-2025:1012-1 | Security update for php8 | 2025-03-25T12:47:30Z | 2025-03-25T12:47:30Z |
| suse-su-2025:1011-1 | Security update for grafana | 2025-03-25T11:44:29Z | 2025-03-25T11:44:29Z |
| suse-su-2025:1010-1 | Security update for grafana | 2025-03-25T11:44:15Z | 2025-03-25T11:44:15Z |
| suse-su-2025:1009-1 | Security update for grafana | 2025-03-25T11:44:03Z | 2025-03-25T11:44:03Z |
| suse-su-2025:1008-1 | Security update for python-gunicorn | 2025-03-25T11:09:00Z | 2025-03-25T11:09:00Z |
| suse-su-2025:20161-1 | Security update for libX11 | 2025-03-25T09:05:37Z | 2025-03-25T09:05:37Z |
| suse-su-2025:20160-1 | Security update for openssh | 2025-03-25T09:02:20Z | 2025-03-25T09:02:20Z |
| suse-su-2025:1007-1 | Security update for helm | 2025-03-25T08:44:44Z | 2025-03-25T08:44:44Z |
| suse-su-2025:1006-1 | Security update for google-osconfig-agent | 2025-03-25T08:44:10Z | 2025-03-25T08:44:10Z |
| suse-su-2025:1005-1 | Security update for google-guest-agent | 2025-03-25T08:43:34Z | 2025-03-25T08:43:34Z |
| suse-su-2025:1004-1 | Security update for python-Jinja2 | 2025-03-25T08:42:43Z | 2025-03-25T08:42:43Z |
| suse-su-2025:1003-1 | Security update for libxslt | 2025-03-25T08:42:08Z | 2025-03-25T08:42:08Z |
| suse-su-2025:1002-1 | Security update for python-gunicorn | 2025-03-25T08:41:39Z | 2025-03-25T08:41:39Z |
| suse-su-2025:0998-1 | Security update for freetype2 | 2025-03-25T02:07:21Z | 2025-03-25T02:07:21Z |
| suse-su-2025:0994-1 | Security update for php8 | 2025-03-24T15:11:07Z | 2025-03-24T15:11:07Z |
| suse-su-2025:0993-1 | Security update for webkit2gtk3 | 2025-03-24T14:33:32Z | 2025-03-24T14:33:32Z |
| suse-su-2025:0992-1 | Security update for docker | 2025-03-24T14:31:39Z | 2025-03-24T14:31:39Z |
| suse-su-2025:0991-1 | Security update for rsync | 2025-03-24T13:56:41Z | 2025-03-24T13:56:41Z |
| suse-su-2025:20158-1 | Security update for ucode-intel | 2025-03-24T12:15:39Z | 2025-03-24T12:15:39Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-25574 | Apple MacOS权限提升漏洞 | 2025-04-24 | 2025-10-28 |
| cnvd-2025-25573 | Apple MacOS拒绝服务漏洞(CNVD-2025-25573) | 2025-04-24 | 2025-10-28 |
| cnvd-2025-25572 | Apple MacOS拒绝服务漏洞(CNVD-2025-25572) | 2025-04-24 | 2025-10-28 |
| cnvd-2025-25571 | Apple MacOS拒绝服务漏洞 | 2025-04-24 | 2025-10-28 |
| cnvd-2025-25568 | Apple Xcode拒绝服务漏洞 | 2025-09-18 | 2025-10-28 |
| cnvd-2025-25567 | Apple Xcode沙箱检查不足漏洞 | 2025-09-18 | 2025-10-28 |
| cnvd-2025-25566 | Apple Xcode访问控制不当漏洞 | 2025-09-18 | 2025-10-28 |
| cnvd-2025-25565 | WordPress Contact Form by Supsystic plugin跨站脚本漏洞 | 2025-10-24 | 2025-10-28 |
| cnvd-2025-25564 | WordPress Clanora plugin文件上传漏洞 | 2025-10-24 | 2025-10-28 |
| cnvd-2025-25563 | WordPress Child Themes plugin跨站脚本漏洞 | 2025-10-24 | 2025-10-28 |
| cnvd-2025-25562 | WordPress CF7 Auto Responder Addon plugin跨站脚本漏洞 | 2025-10-24 | 2025-10-28 |
| cnvd-2025-25561 | WordPress Captivate Sync plugin反序列化漏洞 | 2025-10-24 | 2025-10-28 |
| cnvd-2025-25560 | WordPress Buddypress Plugin缺少授权漏洞 | 2025-10-24 | 2025-10-28 |
| cnvd-2025-25559 | WordPress Blockspare plugin敏感信息插入漏洞 | 2025-10-24 | 2025-10-28 |
| cnvd-2025-25558 | WordPress bbPress Notify plugin跨站脚本漏洞 | 2025-10-24 | 2025-10-28 |
| cnvd-2025-25557 | WordPress All in One Time Clock Lite plugin不安全的直接对象引用漏洞 | 2025-10-24 | 2025-10-28 |
| cnvd-2025-25556 | WordPress Advanced Coupons for WooCommerce Coupons plugin SQL注入漏洞 | 2025-10-24 | 2025-10-28 |
| cnvd-2025-25554 | Apple Xcode路径处理不当漏洞 | 2025-09-18 | 2025-10-28 |
| cnvd-2025-25476 | Newforma Project Center Server信息泄露漏洞(CNVD-2025-25476) | 2025-10-21 | 2025-10-28 |
| cnvd-2025-25475 | Newforma Project Center Server开放重定向漏洞 | 2025-10-21 | 2025-10-28 |
| cnvd-2025-25474 | Newforma Project Center Server代码执行漏洞 | 2025-10-21 | 2025-10-28 |
| cnvd-2025-25471 | Newforma Project Center Server信息泄露漏洞 | 2025-10-21 | 2025-10-28 |
| cnvd-2025-25470 | Microsoft Azure Cache for Redis Enterprise权限提升漏洞 | 2025-10-21 | 2025-10-28 |
| cnvd-2025-25469 | Microsoft 365 Word Copilot欺骗漏洞 | 2025-10-21 | 2025-10-28 |
| cnvd-2025-25468 | Microsoft 365 Copilot Business Chat欺骗漏洞(CNVD-2025-25468) | 2025-10-21 | 2025-10-28 |
| cnvd-2025-25467 | Microsoft 365 Copilot Business Chat欺骗漏洞 | 2025-10-21 | 2025-10-28 |
| cnvd-2025-25464 | IBM Aspera Faspex存在未明漏洞 | 2025-10-21 | 2025-10-28 |
| cnvd-2025-25463 | HCL MyXalytics存在未明漏洞 | 2025-10-21 | 2025-10-28 |
| cnvd-2025-25481 | Google Pixel权限提升漏洞(CNVD-2025-25481) | 2025-09-08 | 2025-10-27 |
| cnvd-2025-25480 | Google Pixel权限提升漏洞(CNVD-2025-25480) | 2025-09-08 | 2025-10-27 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2024-AVI-0877 | Multiples Vulnérabilités dans Mozilla Firefox | 2024-10-15T00:00:00.000000 | 2024-10-17T00:00:00.000000 |
| certfr-2024-avi-0892 | Multiples vulnérabilités dans les produits SolarWinds | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0891 | Vulnérabilité dans Synacor Zimbra Desktop | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0890 | Multiples vulnérabilités dans les produits Atlassian | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0889 | Multiples vulnérabilités dans Ruby on Rails | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0888 | Multiples vulnérabilités dans Oracle Weblogic | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0887 | Multiples vulnérabilités dans Oracle Virtualization | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0886 | Multiples vulnérabilités dans Oracle Systems | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0885 | Multiples vulnérabilités dans Oracle PeopleSoft | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0884 | Multiples vulnérabilités dans Oracle MySQL | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0883 | Multiples vulnérabilités dans Oracle Java SE | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0882 | Multiples vulnérabilités dans Oracle Database Server | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0881 | Multiples vulnérabilités dans Google Chrome | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0880 | Multiples vulnérabilités dans les produits Trend Micro | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0879 | Vulnérabilité dans Juniper Networks Junos OS | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0892 | Multiples vulnérabilités dans les produits SolarWinds | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0891 | Vulnérabilité dans Synacor Zimbra Desktop | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0890 | Multiples vulnérabilités dans les produits Atlassian | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0889 | Multiples vulnérabilités dans Ruby on Rails | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0888 | Multiples vulnérabilités dans Oracle Weblogic | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0887 | Multiples vulnérabilités dans Oracle Virtualization | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0886 | Multiples vulnérabilités dans Oracle Systems | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0885 | Multiples vulnérabilités dans Oracle PeopleSoft | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0884 | Multiples vulnérabilités dans Oracle MySQL | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0883 | Multiples vulnérabilités dans Oracle Java SE | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0882 | Multiples vulnérabilités dans Oracle Database Server | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0881 | Multiples vulnérabilités dans Google Chrome | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0880 | Multiples vulnérabilités dans les produits Trend Micro | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0879 | Vulnérabilité dans Juniper Networks Junos OS | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0878 | Multiples vulnérabilités dans les produits Splunk | 2024-10-15T00:00:00.000000 | 2024-10-15T00:00:00.000000 |