Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2019-25307 |
8.5 (4.0)
7.8 (3.1)
|
WorkgroupMail 7.5.1 - 'WorkgroupMail' Unquoted Service Path |
Softalk |
WorkgroupMail |
2026-02-11T14:56:50.702Z | 2026-02-11T21:15:52.755Z |
| CVE-2019-25306 |
8.5 (4.0)
7.8 (3.1)
|
BlackMoon FTP Server 3.1.2.1731 - 'BMFTP-RELEASE' Unqu… |
Blackmoon |
BlackMoon FTP Server |
2026-02-11T14:56:50.028Z | 2026-02-11T21:10:36.344Z |
| CVE-2018-25157 |
5.1 (4.0)
6.4 (3.1)
|
Phraseanet 4.0.3 Stored XSS via Document Upload |
Phraseanet |
Phraseanet DAM Open Source |
2026-02-11T14:56:49.570Z | 2026-02-11T21:09:46.413Z |
| CVE-2019-25310 |
8.5 (4.0)
7.8 (3.1)
|
ActiveFax Server 6.92 Build 0316 - 'ActiveFaxServiceNT… |
Actfax |
ActiveFax Server |
2026-02-11T14:56:52.118Z | 2026-02-11T21:09:08.631Z |
| CVE-2025-62855 |
1.3 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:16:00.950Z | 2026-02-11T21:05:57.561Z |
| CVE-2026-1571 |
5.3 (4.0)
|
Reflected XSS Vulnerability on TP-Link Archer C60 |
TP-Link Systems Inc. |
Archer C60 v3 |
2026-02-11T00:39:29.001Z | 2026-02-11T20:58:52.270Z |
| CVE-2026-25062 |
5.5 (3.1)
|
Outline Affected an Arbitrary File Read via Path Trave… |
outline |
outline |
2026-02-11T20:23:07.052Z | 2026-02-11T20:53:58.855Z |
| CVE-2025-64487 |
7.6 (3.1)
|
Outline is vulnerable to privilege escalation vulnerab… |
outline |
outline |
2026-02-11T20:25:41.719Z | 2026-02-11T20:52:54.633Z |
| CVE-2020-37156 |
6.9 (4.0)
6.5 (3.1)
|
BloodX 1.0 - Authentication Bypass |
diveshlunker |
BloodX |
2026-02-11T20:49:48.699Z | 2026-02-11T20:49:48.699Z |
| CVE-2025-68643 |
5.4 (3.1)
|
Axigen Mail Server before 10.5.57 allows stored C… |
n/a |
n/a |
2026-02-05T00:00:00.000Z | 2026-02-11T20:07:14.705Z |
| CVE-2026-25920 |
5.5 (3.1)
|
SumatraPDF has a heap out-of-bounds read in MOBI HuffD… |
sumatrapdfreader |
sumatrapdf |
2026-02-09T21:32:26.520Z | 2026-02-11T19:58:04.411Z |
| CVE-2026-0228 |
1.3 (4.0)
|
PAN-OS: Improper Validation of Terminal Server Agent C… |
Palo Alto Networks |
Cloud NGFW |
2026-02-11T17:55:44.109Z | 2026-02-11T19:04:15.415Z |
| CVE-2026-0229 |
6.6 (4.0)
|
PAN-OS: Denial of Service in Advanced DNS Security Feature |
Palo Alto Networks |
Cloud NGFW |
2026-02-11T17:56:09.270Z | 2026-02-11T18:58:48.926Z |
| CVE-2026-25128 |
7.5 (3.1)
|
fast-xml-parser has RangeError DoS Numeric Entities Bug |
NaturalIntelligence |
fast-xml-parser |
2026-01-30T15:14:58.244Z | 2026-02-11T18:38:40.192Z |
| CVE-2026-2360 |
8 (3.1)
|
Improper search_path protection in PostgreSQL Anonymiz… |
DALIBO |
PostgreSQL Anonymizer |
2026-02-11T17:47:55.737Z | 2026-02-11T18:29:12.805Z |
| CVE-2026-2361 |
8 (3.1)
|
Improper search_path protection in PostgreSQL Anonymiz… |
DALIBO |
PostgreSQL Anonymizer |
2026-02-11T17:48:03.805Z | 2026-02-11T18:24:03.242Z |
| CVE-2025-69618 |
6.5 (3.1)
|
An arbitrary file overwrite vulnerability in the … |
n/a |
n/a |
2026-02-04T00:00:00.000Z | 2026-02-11T17:18:11.016Z |
| CVE-2025-69621 |
6.5 (3.1)
|
An arbitrary file overwrite vulnerability in the … |
n/a |
n/a |
2026-02-04T00:00:00.000Z | 2026-02-11T17:17:13.200Z |
| CVE-2025-70758 |
7.5 (3.1)
|
chetans9 core-php-admin-panel through commit a94a… |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-11T17:15:39.795Z |
| CVE-2025-70559 |
6.5 (3.1)
|
pdfminer.six before 20251230 contains an insecure… |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-11T17:14:25.693Z |
| CVE-2025-70311 |
6.5 (3.1)
|
JEEWMS 1.0 is vulnerable to SQL Injection. Attack… |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-11T17:12:52.970Z |
| CVE-2025-69983 |
8.2 (3.1)
|
FUXA v1.2.7 allows Remote Code Execution (RCE) vi… |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-11T17:10:17.573Z |
| CVE-2025-69981 |
7.5 (3.1)
|
FUXA v1.2.7 contains an Unrestricted File Upload … |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-11T17:08:25.986Z |
| CVE-2025-52870 |
0.6 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:59.439Z | 2026-02-11T16:59:50.333Z |
| CVE-2025-53598 |
0.6 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:54.742Z | 2026-02-11T16:59:33.191Z |
| CVE-2025-54146 |
1.3 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:50.129Z | 2026-02-11T16:59:15.991Z |
| CVE-2025-54147 |
1.3 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:45.923Z | 2026-02-11T16:58:56.313Z |
| CVE-2025-54148 |
1.3 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:40.809Z | 2026-02-11T16:58:32.698Z |
| CVE-2025-54149 |
4.9 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:34.659Z | 2026-02-11T16:58:13.445Z |
| CVE-2025-54150 |
4.9 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:29.651Z | 2026-02-11T16:57:37.867Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-70336 |
4.8 (3.1)
|
A Stored cross-site scripting (XSS) vulnerability… |
n/a |
n/a |
2026-01-28T00:00:00.000Z | 2026-01-29T17:12:29.813Z |
| CVE-2026-23553 |
2.9 (3.1)
|
x86: incomplete IBPB for vCPU isolation |
Xen |
Xen |
2026-01-28T15:33:44.782Z | 2026-01-28T16:41:14.803Z |
| CVE-2026-24685 |
9.4 (4.0)
|
OpenProject has Argument Injection on Repository modul… |
opf |
openproject |
2026-01-28T16:47:22.850Z | 2026-01-28T17:54:14.053Z |
| CVE-2025-8085 |
8.6 (3.1)
|
Ditty < 3.1.58 - Unauthenticated SSRF |
Unknown |
Ditty |
2025-09-08T06:00:04.914Z | 2025-09-08T18:17:25.816Z |
| CVE-2025-58348 |
5.5 (3.1)
|
An issue was discovered in the Wi-Fi driver in Sa… |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-09T16:13:14.339Z |
| CVE-2025-58347 |
5.5 (3.1)
|
An issue was discovered in the Wi-Fi driver in Sa… |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-09T16:11:43.470Z |
| CVE-2025-58346 |
5.5 (3.1)
|
An issue was discovered in the Wi-Fi driver in Sa… |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-09T16:11:55.769Z |
| CVE-2025-58345 |
5.5 (3.1)
|
An issue was discovered in the Wi-Fi driver in Sa… |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-09T16:12:08.919Z |
| CVE-2025-58343 |
5.5 (3.1)
|
An issue was discovered in the Wi-Fi driver in Sa… |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-09T16:12:35.658Z |
| CVE-2020-37017 |
8.5 (4.0)
7.8 (3.1)
|
CodeMeter 6.60 - 'CodeMeter.exe' Unquoted Service Path |
Wibu |
CodeMeter |
2026-01-29T14:28:33.069Z | 2026-02-09T17:08:51.010Z |
| CVE-2020-36944 |
6.9 (4.0)
4 (3.1)
|
ILIAS Learning Management System 4.3 - SSRF |
ilias.de |
ILIAS Learning Management System |
2026-01-28T17:35:07.114Z | 2026-01-29T18:13:23.660Z |
| CVE-2020-36972 |
8.8 (4.0)
8.2 (3.1)
|
SmartBlog 2.0.1 - 'id_post' Blind SQL injection |
smartdatasoft |
SmartBlog |
2026-01-28T17:35:11.956Z | 2026-01-28T21:12:56.527Z |
| CVE-2025-67723 |
4.6 (3.1)
|
Discourse vulnerable to stored Cross-site Scripting vi… |
discourse |
discourse |
2026-01-28T18:21:35.379Z | 2026-01-28T19:28:24.714Z |
| CVE-2025-69601 |
6.5 (3.1)
|
A directory traversal (Zip Slip) vulnerability ex… |
n/a |
n/a |
2026-01-28T00:00:00.000Z | 2026-02-02T15:51:24.053Z |
| CVE-2025-69602 |
9.1 (3.1)
|
A session fixation vulnerability exists in 66biol… |
n/a |
n/a |
2026-01-28T00:00:00.000Z | 2026-01-29T20:05:59.340Z |
| CVE-2026-1544 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
D-Link DIR-823X set_mode sub_41E2A0 os command injection |
D-Link |
DIR-823X |
2026-01-28T21:32:09.912Z | 2026-01-29T18:01:07.067Z |
| CVE-2026-1546 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
jishenghua jshERP com.jsh.erp.datasource.mappers.Depot… |
jishenghua |
jshERP |
2026-01-28T22:02:06.131Z | 2026-01-29T18:00:41.241Z |
| CVE-2026-1547 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Totolink A7000R cstecgi.cgi setUnloadUserData command … |
Totolink |
A7000R |
2026-01-28T22:02:10.788Z | 2026-01-29T16:54:19.511Z |
| CVE-2026-24857 |
5.5 (4.0)
|
bulk_extractor has Heap-based Buffer Overflow vulnerability |
simsong |
bulk_extractor |
2026-01-28T21:30:35.410Z | 2026-01-29T18:01:12.601Z |
| CVE-2026-24888 |
6.5 (3.1)
|
Maker.js Vulnerable to Unsafe Property Copying in make… |
microsoft |
maker.js |
2026-01-28T21:35:44.030Z | 2026-01-29T18:00:53.428Z |
| CVE-2026-1548 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Totolink A7000R cstecgi.cgi CloudACMunualUpdateUserdat… |
Totolink |
A7000R |
2026-01-28T22:32:08.747Z | 2026-01-29T16:54:04.542Z |
| CVE-2026-1549 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
jishenghua jshERP PluginController uploadPluginConfigF… |
jishenghua |
jshERP |
2026-01-28T23:02:07.452Z | 2026-01-29T16:53:53.858Z |
| CVE-2026-0398 |
5.3 (3.1)
|
Crafted zones can lead to increased resource usage and… |
PowerDNS |
Recursor |
2026-02-09T14:20:46.592Z | 2026-02-09T15:37:04.885Z |
| CVE-2025-64517 |
4.4 (3.1)
|
sudo-rs doesn't record authenticating user properly in… |
trifectatechfoundation |
sudo-rs |
2025-11-12T22:08:29.422Z | 2026-02-12T15:49:17.021Z |
| CVE-2022-46763 |
8.8 (3.1)
|
A SQL injection issue in a database stored functi… |
TrueConf |
TrueConf Server |
2022-12-27T00:00:00.000Z | 2026-02-10T17:20:04.773Z |
| CVE-2025-12772 |
8.5 (4.0)
|
Plaintext Switch admin login password is seen in Broca… |
Brocade |
SANnav |
2026-02-02T22:41:13.921Z | 2026-02-04T16:53:20.826Z |
| CVE-2026-25804 |
8 (4.0)
|
Antrea has invalid enforcement order for network polic… |
antrea-io |
antrea |
2026-02-06T22:58:35.041Z | 2026-02-09T15:25:44.301Z |
| CVE-2026-25803 |
9.8 (3.1)
|
3DP-MANAGER Uses Hard-coded Credentials |
denpiligrim |
3dp-manager |
2026-02-06T22:52:40.631Z | 2026-02-09T15:25:57.618Z |
| CVE-2026-25762 |
7.5 (3.1)
|
AdonisJS vulnerable to Denial of Service (DoS) via Unr… |
adonisjs |
core |
2026-02-06T22:48:55.471Z | 2026-02-09T15:26:05.149Z |
| CVE-2026-25760 |
6.5 (3.1)
|
Website Path Traversal / Arbitrary File Read (Authenti… |
BishopFox |
sliver |
2026-02-06T21:32:27.276Z | 2026-02-09T15:26:46.263Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-1544 | A security flaw has been discovered in D-Link DIR-823X 250416. Impacted is the function sub_41E2A0 … | 2026-01-28T22:15:55.277 | 2026-02-09T17:06:23.600 |
| fkie_cve-2026-1546 | A security vulnerability has been detected in jishenghua jshERP up to 3.6. The impacted element is … | 2026-01-28T22:15:55.660 | 2026-02-09T16:58:44.613 |
| fkie_cve-2026-1547 | A vulnerability was detected in Totolink A7000R 4.1cu.4154. This affects the function setUnloadUser… | 2026-01-28T22:15:55.853 | 2026-02-09T16:56:16.900 |
| fkie_cve-2026-24857 | `bulk_extractor` is a digital forensics exploitation tool. Starting in version 1.4, `bulk_extractor… | 2026-01-28T22:15:56.350 | 2026-02-09T16:47:23.343 |
| fkie_cve-2026-24888 | Maker.js is a 2D vector line drawing and shape modeling for CNC and laser cutters. In versions up t… | 2026-01-28T22:15:56.517 | 2026-02-09T16:37:29.410 |
| fkie_cve-2026-1548 | A flaw has been found in Totolink A7000R 4.1cu.4154. This impacts the function CloudACMunualUpdateU… | 2026-01-28T23:15:50.670 | 2026-02-09T16:34:19.650 |
| fkie_cve-2026-1549 | A vulnerability was identified in jishenghua jshERP up to 3.6. Affected by this vulnerability is an… | 2026-01-28T23:15:50.870 | 2026-02-09T16:21:03.187 |
| fkie_cve-2026-0398 | Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poiso… | 2026-02-09T15:16:11.360 | 2026-02-09T16:16:00.100 |
| fkie_cve-2025-64517 | sudo-rs is a memory safe implementation of sudo and su written in Rust. With `Defaults targetpw` (o… | 2025-11-12T22:15:50.460 | 2026-02-09T16:15:59.530 |
| fkie_cve-2022-46763 | A SQL injection issue in a database stored function in TrueConf Server 5.2.0.10225 (fixed in 5.2.6.… | 2022-12-27T01:15:10.993 | 2026-02-09T16:15:57.840 |
| fkie_cve-2025-12772 | Brocade SANnav before 2.4.0b logs the Brocade Fabric OS Switch admin password on the SANnav support… | 2026-02-02T23:15:58.453 | 2026-02-09T16:12:42.880 |
| fkie_cve-2026-25804 | Antrea is a Kubernetes networking solution intended to be Kubernetes native. Prior to versions 2.3.… | 2026-02-06T23:15:55.123 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-25803 | 3DP-MANAGER is an inbound generator for 3x-ui. In version 2.0.1 and prior, the application automati… | 2026-02-06T23:15:54.973 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-25762 | AdonisJS is a TypeScript-first web framework. Prior to versions 10.1.3 and 11.0.0-next.9, a denial … | 2026-02-06T23:15:54.670 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-25760 | Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to 1.6.11, a… | 2026-02-06T22:16:12.277 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-25758 | Spree is an open source e-commerce solution built with Ruby on Rails. A critical IDOR vulnerability… | 2026-02-06T22:16:12.133 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-25757 | Spree is an open source e-commerce solution built with Ruby on Rails. Prior to versions 5.0.8, 5.1.… | 2026-02-06T23:15:54.527 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-25754 | AdonisJS is a TypeScript-first web framework. Prior to versions 10.1.3 and 11.0.0-next.9, a prototy… | 2026-02-06T23:15:54.390 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-25749 | Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow … | 2026-02-06T23:15:54.230 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-25732 | NiceGUI is a Python-based UI framework. Prior to 3.7.0, NiceGUI's FileUpload.name property exposes … | 2026-02-06T22:16:11.993 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-25644 | DataHub is an open-source metadata platform. Prior to version 1.3.1.8, the LDAP ingestion source is… | 2026-02-06T23:15:54.077 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-25574 | Payload is a free and open source headless content management system. Prior to 3.74.0, a cross-coll… | 2026-02-06T22:16:11.740 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-25544 | Payload is a free and open source headless content management system. Prior to 3.73.0, when queryin… | 2026-02-06T22:16:11.597 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-25533 | Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.10.1, … | 2026-02-06T22:16:11.450 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-25516 | NiceGUI is a Python-based UI framework. The ui.markdown() component uses the markdown2 library to c… | 2026-02-06T22:16:11.300 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-2069 | A flaw has been found in ggml-org llama.cpp up to 55abc39. Impacted is the function llama_grammar_a… | 2026-02-06T22:16:12.883 | 2026-02-09T16:08:55.263 |
| fkie_cve-2026-1727 | The Agentspace service was affected by a vulnerability that exposed sensitive information due to th… | 2026-02-06T22:16:10.860 | 2026-02-09T16:08:55.263 |
| fkie_cve-2025-68621 | Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on … | 2026-02-06T22:16:10.660 | 2026-02-09T16:08:55.263 |
| fkie_cve-2025-31990 | Rate limiting for certain API calls is not being enforced, making HCL Velocity vulnerable to Denial… | 2026-02-07T04:15:52.470 | 2026-02-09T16:08:55.263 |
| fkie_cve-2025-15491 | The Post Slides WordPress plugin through 1.0.1 does not validate some shortcode attributes before u… | 2026-02-07T06:16:04.003 | 2026-02-09T16:08:55.263 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-933f-4h29-gq7r |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: perf trace: Really free the ev… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-523c-3cg7-7hhv |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: ac97: Fix possible NULL … | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-xwrx-f4gw-ff4g |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix unpinning of page… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-xvh8-f5vg-49g2 |
8.8 (3.1)
7.4 (4.0)
|
A security flaw has been discovered in D-Link DIR-825 up to 2.10. Affected by this vulnerability is… | 2025-09-18T15:30:32Z | 2026-02-04T00:30:26Z |
| ghsa-rxmq-8fwh-qv2c |
3.5 (3.1)
2.0 (4.0)
|
A vulnerability was identified in MiczFlor RPi-Jukebox-RFID up to 2.8.0. This vulnerability affects… | 2025-09-13T18:30:55Z | 2026-02-04T00:30:26Z |
| ghsa-rf27-4m25-62jv |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix use after free in… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-j389-h5qc-xpxp |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Fix a leak in map_… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-hqcj-v9r7-994j |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Take RTNL lock when… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-g934-mv7g-597h |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ext4: fix possible double unlo… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-g6mx-q5xq-839q |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-sysman: Fix… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-826h-69x5-63pc |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: bpf, arm64: Fixed a BTI error … | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-4mh8-7crp-48x9 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: drop gfx_v11_0_cp_… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-2v3f-c84w-3jx7 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: scsi: hisi_sas: Grab sas_dev l… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-qgqw-h4xq-7w8w |
7.7 (4.0)
|
Claude Code has a Command Injection in find Command Bypasses User Approval Prompt | 2026-02-03T19:33:32Z | 2026-02-03T22:15:47Z |
| ghsa-vhw5-3g5m-8ggf |
7.1 (4.0)
|
Claude Code has a Domain Validation Bypass which Allows Automatic Requests to Attacker-Controlled Domains | 2026-02-03T19:15:59Z | 2026-02-03T22:15:32Z |
| ghsa-46c4-8wrp-j99v |
5.3 (3.1)
|
Improper Validation and Sanitization in url-parse | 2022-01-06T20:30:34Z | 2026-02-03T22:13:35Z |
| ghsa-hh27-ffr2-f2jc |
6.1 (3.1)
|
Open redirect in url-parse | 2021-08-10T16:07:08Z | 2026-02-03T22:12:27Z |
| ghsa-9m6j-fcg5-2442 |
5.3 (3.1)
|
Path traversal in url-parse | 2021-05-06T16:10:51Z | 2026-02-03T22:11:36Z |
| ghsa-jf5r-8hm2-f872 |
6.5 (3.1)
|
url-parse incorrectly parses hostname / protocol due to unstripped leading control characters. | 2022-02-22T00:00:30Z | 2026-02-03T22:10:35Z |
| ghsa-h9r9-2pxg-cx9m |
6.1 (4.0)
|
Craft Commerce has Stored XSS in Shipping Zone (Name & Description) Fields Leading to Potential Pri… | 2026-02-02T23:04:00Z | 2026-02-03T21:40:58Z |
| ghsa-wq2m-r96q-crrf |
6.1 (4.0)
|
Craft Commerce has Stored XSS in Inventory Location Address Leading to Potential Privilege Escalation | 2026-02-02T23:02:33Z | 2026-02-03T21:40:50Z |
| ghsa-v585-mf6r-rqrc |
6.1 (4.0)
|
Craft Commerce has Stored XSS in Tax Zones (Name & Description) Leading to Potential Privilege Escalation | 2026-02-02T23:00:13Z | 2026-02-03T21:40:44Z |
| ghsa-p6w8-q63m-72c8 |
6.1 (4.0)
|
Craft Commerce has Stored XSS in Tax Categories (Name & Description) Fields Leading to Potential Pr… | 2026-02-02T22:51:51Z | 2026-02-03T21:40:36Z |
| ghsa-wqc5-485v-3hqh |
6.1 (4.0)
|
Craft CMS has Stored XSS in Tax Rates Name Leading to Potential Privilege Escalation | 2026-02-02T22:51:16Z | 2026-02-03T21:40:29Z |
| ghsa-g92v-wpv7-6w22 |
6.1 (4.0)
|
Craft Commerce has Stored XSS in Shipping Methods Name Field Leading to Potential Privilege Escalation | 2026-02-02T22:49:55Z | 2026-02-03T21:40:21Z |
| ghsa-w8gw-qm8p-j9j3 |
6.2 (4.0)
|
Craft Commerce has Stored XSS in Shipping Categories (Name & Description) Fields Leading to Potenti… | 2026-02-02T22:45:03Z | 2026-02-03T21:40:14Z |
| ghsa-2h2m-v2mg-656c |
4.8 (4.0)
|
Craft Commerce has Stored XSS in Product Type Name | 2026-02-02T22:44:05Z | 2026-02-03T21:40:06Z |
| ghsa-8478-rmjg-mjj5 |
6.2 (4.0)
|
Craft Commerce has Stored XSS via Order Status Message with potential database exfiltration | 2026-02-02T22:43:00Z | 2026-02-03T21:39:59Z |
| ghsa-frj9-9rwc-pw9j |
6.2 (4.0)
|
Craft Commerce has Stored DOM XSS in Order Status Name (Reflects in "Recent Orders" Dashboard Widget) | 2026-02-02T22:41:44Z | 2026-02-03T21:39:52Z |
| ghsa-xv49-34rf-rqv4 |
5.3 (3.1)
|
A flaw was found in libsoup, an HTTP client/server library. This HTTP Request Smuggling vulnerabili… | 2026-02-03T21:31:52Z | 2026-02-03T21:31:52Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2020-63 |
|
OpenStack Manila <7.4.1, >=8.0.0 <8.1.1, and >=9.0.0 <9.1.1 allows attackers to view, upd… | manila | 2020-03-12T17:15:00Z | 2020-07-14T17:27:00Z |
| pysec-2019-115 |
|
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other cip… | python-gnupg | 2019-03-21T16:01:00Z | 2020-07-13T04:15:00Z |
| pysec-2020-83 |
|
libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow. | pillow | 2020-01-03T01:15:00Z | 2020-07-10T17:09:00Z |
| pysec-2020-82 |
|
libImaging/SgiRleDecode.c in Pillow before 6.2.2 has an SGI buffer overflow. | pillow | 2020-01-03T01:15:00Z | 2020-07-10T17:06:00Z |
| pysec-2020-37 |
|
In django-basic-auth-ip-whitelist before 0.3.4, a potential timing attack exists on websi… | django-basic-auth-ip-whitelist | 2020-06-24T13:15:00Z | 2020-07-09T14:11:00Z |
| pysec-2020-112 |
|
Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py. | tendenci | 2020-06-21T15:15:00Z | 2020-06-26T19:34:00Z |
| pysec-2019-114 |
|
Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk une… | pyspark | 2019-08-07T17:15:00Z | 2020-06-23T00:15:00Z |
| pysec-2020-47 |
|
In Indy Node 1.12.2, there is an Uncontrolled Resource Consumption vulnerability. Indy No… | indy-node | 2020-06-11T00:15:00Z | 2020-06-22T16:36:00Z |
| pysec-2020-35 |
|
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection … | django | 2020-02-03T12:15:00Z | 2020-06-19T03:15:00Z |
| pysec-2020-9 |
|
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when u… | ansible | 2020-03-09T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-7 |
|
A flaw was found in the Ansible Engine when the fetch module is used. An attacker could i… | ansible | 2020-03-16T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-5 |
|
A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.… | ansible | 2020-03-11T19:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-12 |
|
A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. … | ansible | 2020-03-16T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-10 |
|
A flaw was found in Ansible Engine when the module package or service is used and the par… | ansible | 2020-03-16T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-1 |
|
A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 … | ansible | 2020-05-11T14:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-42 |
|
An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the… | fastecdsa | 2020-06-02T21:15:00Z | 2020-06-03T13:47:00Z |
| pysec-2020-6 |
|
A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, whe… | ansible | 2020-03-03T22:15:00Z | 2020-05-29T14:11:00Z |
| pysec-2020-11 |
|
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a… | ansible | 2020-03-12T18:15:00Z | 2020-05-29T14:09:00Z |
| pysec-2020-13 |
|
A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7… | ansible | 2020-05-12T18:15:00Z | 2020-05-26T17:38:00Z |
| pysec-2020-65 |
|
python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \… | markdown2 | 2020-04-20T16:15:00Z | 2020-05-25T06:15:00Z |
| pysec-2019-5 |
|
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerabi… | ansible | 2019-03-27T13:29:00Z | 2020-05-21T14:55:00Z |
| pysec-2020-2 |
|
An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, … | ansible | 2020-04-30T17:15:00Z | 2020-05-21T14:49:00Z |
| pysec-2020-73 |
|
** DISPUTED ** pandas through 1.0.3 can unserialize and execute commands from an untruste… | pandas | 2020-05-15T19:15:00Z | 2020-05-19T19:12:00Z |
| pysec-2020-107 |
|
** DISPUTED ** scikit-learn (aka sklearn) through 0.23.0 can unserialize and execute comm… | scikit-learn | 2020-05-15T19:15:00Z | 2020-05-19T19:05:00Z |
| pysec-2020-66 |
|
MISP MISP-maltego 1.4.4 incorrectly shares a MISP connection across users in a remote-tra… | misp-maltego | 2020-05-15T18:15:00Z | 2020-05-19T13:38:00Z |
| pysec-2020-153 |
|
In Wagtail before versions 2.7.2 and 2.8.2, a potential timing attack exists on pages or … | wagtail | 2020-04-30T23:15:00Z | 2020-05-08T15:57:00Z |
| pysec-2019-15 |
|
Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django m… | django | 2019-12-02T14:15:00Z | 2020-05-01T02:15:00Z |
| pysec-2020-144 |
|
In Tortoise ORM before versions 0.15.23 and 0.16.6, various forms of SQL injection have b… | tortoise-orm | 2020-04-20T22:15:00Z | 2020-04-28T17:16:00Z |
| pysec-2020-152 |
|
In Wagtail before versions 2.8.1 and 2.7.2, a cross-site scripting (XSS) vulnerability ex… | wagtail | 2020-04-14T23:15:00Z | 2020-04-15T19:15:00Z |
| pysec-2020-160 |
|
Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x befor… | ansible | 2020-01-02T15:15:00Z | 2020-04-13T00:15:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-31785 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.530661Z |
| gsd-2024-31784 | An issue in Typora v.1.8.10 and before, allows a local attacker to obtain sensitive infor… | 2024-04-11T05:03:20.846072Z |
| gsd-2024-31783 | Cross Site Scripting (XSS) vulnerability in Typora v.1.6.7 and before, allows a local att… | 2024-04-11T05:03:20.820859Z |
| gsd-2024-31782 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.795613Z |
| gsd-2024-31781 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.826561Z |
| gsd-2024-31780 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.550745Z |
| gsd-2024-31779 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.857638Z |
| gsd-2024-31778 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.758108Z |
| gsd-2024-31777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.549720Z |
| gsd-2024-31776 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.829079Z |
| gsd-2024-31775 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.608664Z |
| gsd-2024-31774 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.823448Z |
| gsd-2024-31773 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.609543Z |
| gsd-2024-31772 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.889450Z |
| gsd-2024-31771 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.641212Z |
| gsd-2024-31770 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.722234Z |
| gsd-2024-31769 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.730128Z |
| gsd-2024-31768 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.674440Z |
| gsd-2024-31767 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.894878Z |
| gsd-2024-31766 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.613449Z |
| gsd-2024-31765 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.606664Z |
| gsd-2024-31764 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.742906Z |
| gsd-2024-31763 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.707361Z |
| gsd-2024-31762 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.652936Z |
| gsd-2024-31761 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.609337Z |
| gsd-2024-31760 | An issue in sanluan flipped-aurora gin-vue-admin 2.4.x allows an attacker to escalate pri… | 2024-04-11T05:03:20.539097Z |
| gsd-2024-31759 | An issue in sanluan PublicCMS v.4.0.202302.e allows an attacker to escalate privileges vi… | 2024-04-11T05:03:20.715079Z |
| gsd-2024-31758 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.717182Z |
| gsd-2024-31757 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.797233Z |
| gsd-2024-31756 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.710253Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2025-49382 | Malicious code in rce-poc-test-honor-dev (npm) | 2025-11-07T04:05:52Z | 2025-12-24T10:09:30Z |
| MAL-2025-49376 | Malicious code in solara-websocket-dll (npm) | 2025-11-05T23:23:27Z | 2025-12-24T10:09:30Z |
| MAL-2025-49368 | Malicious code in react-tmedia (npm) | 2025-11-05T23:18:22Z | 2025-12-24T10:09:30Z |
| MAL-2025-48551 | Malicious code in react-medias (npm) | 2025-10-22T02:05:10Z | 2025-12-24T10:09:30Z |
| MAL-2025-48536 | Malicious code in reactify-utils (npm) | 2025-10-21T06:21:28Z | 2025-12-24T10:09:30Z |
| MAL-2025-192639 | Malicious code in smm-youtube (npm) | 2025-12-19T08:41:06Z | 2025-12-24T10:09:30Z |
| MAL-2025-192595 | Malicious code in smart-utils-alice (npm) | 2025-12-16T07:05:11Z | 2025-12-24T10:09:30Z |
| MAL-2025-192583 | Malicious code in swissid-common (npm) | 2025-12-16T06:23:05Z | 2025-12-24T10:09:30Z |
| MAL-2025-192577 | Malicious code in sd-skbms (npm) | 2025-12-15T07:33:11Z | 2025-12-24T10:09:30Z |
| MAL-2025-192576 | Malicious code in sd-security (npm) | 2025-12-15T07:33:11Z | 2025-12-24T10:09:30Z |
| MAL-2025-192566 | Malicious code in shopify-monorail (npm) | 2025-12-12T06:31:00Z | 2025-12-24T10:09:30Z |
| MAL-2025-192565 | Malicious code in sdbao-content-sems (npm) | 2025-12-12T06:34:05Z | 2025-12-24T10:09:30Z |
| MAL-2025-192564 | Malicious code in sdbao-content-report (npm) | 2025-12-12T06:34:05Z | 2025-12-24T10:09:30Z |
| MAL-2025-192563 | Malicious code in sd-pay-ts (npm) | 2025-12-12T06:34:06Z | 2025-12-24T10:09:30Z |
| MAL-2025-192562 | Malicious code in sd-pay (npm) | 2025-12-12T06:34:06Z | 2025-12-24T10:09:30Z |
| MAL-2025-192417 | Malicious code in rum-events-format (npm) | 2025-12-10T01:57:45Z | 2025-12-24T10:09:30Z |
| MAL-2025-192401 | Malicious code in serval-integrations-common-frontend (npm) | 2025-12-10T01:43:51Z | 2025-12-24T10:09:30Z |
| MAL-2025-192315 | Malicious code in seeds-random (npm) | 2025-12-05T03:03:24Z | 2025-12-24T10:09:30Z |
| MAL-2025-191595 | Malicious code in tailwindcss-forms (npm) | 2025-12-01T13:26:48Z | 2025-12-24T10:09:30Z |
| MAL-2025-191594 | Malicious code in tailwind-style-override (npm) | 2025-12-01T13:26:47Z | 2025-12-24T10:09:30Z |
| MAL-2025-191593 | Malicious code in tailwind-state (npm) | 2025-12-01T13:26:43Z | 2025-12-24T10:09:30Z |
| MAL-2025-191588 | Malicious code in stringify-coder (npm) | 2025-12-01T13:26:20Z | 2025-12-24T10:09:30Z |
| MAL-2025-191586 | Malicious code in session-validate (npm) | 2025-12-01T13:25:08Z | 2025-12-24T10:09:30Z |
| MAL-2025-191582 | Malicious code in react-mandes (npm) | 2025-12-01T13:22:29Z | 2025-12-24T10:09:30Z |
| MAL-2025-191581 | Malicious code in react-adparser (npm) | 2025-12-01T13:22:08Z | 2025-12-24T10:09:30Z |
| MAL-2025-191503 | Malicious code in start-internal (npm) | 2025-12-01T16:00:47Z | 2025-12-24T10:09:30Z |
| MAL-2025-191428 | Malicious code in solomon-v3-stories (npm) | 2025-11-24T23:41:58Z | 2025-12-24T10:09:30Z |
| MAL-2025-191423 | Malicious code in shelf-jwt-sessions (npm) | 2025-11-25T00:16:49Z | 2025-12-24T10:09:30Z |
| MAL-2025-191422 | Malicious code in selenium-session-client (npm) | 2025-11-25T00:16:49Z | 2025-12-24T10:09:30Z |
| MAL-2025-191421 | Malicious code in selenium-session (npm) | 2025-11-25T00:16:49Z | 2025-12-24T10:09:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0517 | Drupal Extensions: Mehrere Schwachstellen | 2024-02-28T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0465 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-02-21T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0400 | Drupal: Schwachstelle ermöglicht Cross-Site Scripting | 2024-02-14T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0320 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-02-07T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0263 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-01-31T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0196 | Drupal: Mehrere Schwachstellen | 2024-01-24T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0060 | Drupal Extensions: Mehrere Schwachstellen | 2024-01-10T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2023-1503 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-06-18T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2025-0037 | PaloAlto Networks Expedition: Mehrere Schwachstellen | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0036 | Aruba Switch: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0034 | IBM App Connect Enterprise: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0032 | Drupal: Mehrere Schwachstellen | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0031 | Juniper JUNOS: Mehrere Schwachstellen ermöglichen Denial of Service und Informationsoffenlegung | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0030 | Trend Micro Apex One: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0029 | Ivanti Connect Secure: Mehrere Schwachstellen ermöglichen Codeausführung und Privilegienerweiterung | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2024-3140 | Juniper JUNOS: Mehrere Schwachstellen | 2024-10-09T22:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2024-1892 | Red Hat OpenShift: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-08-21T22:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2024-1398 | Red Hat Enterprise Linux (Flatpak): Schwachstelle ermöglicht Codeausführung | 2024-06-17T22:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2024-0182 | Linux Kernel: Mehrere Schwachstellen | 2024-01-23T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2023-2476 | Ruby: Mehrere Schwachstellen | 2020-03-31T22:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2023-2462 | Ruby: Mehrere Schwachstellen | 2021-04-05T22:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2022-0877 | Ruby: Mehrere Schwachstellen | 2021-11-24T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2022-0876 | Ruby: Schwachstelle ermöglicht Denial of Service | 2021-11-14T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2022-0119 | Ruby: Mehrere Schwachstellen | 2022-04-12T22:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0027 | Joomla: Mehrere Schwachstellen | 2025-01-07T23:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0024 | Dell PowerScale: Schwachstelle ermöglicht Denial of Service | 2025-01-07T23:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0023 | ABB AC-500: Mehrere Schwachstellen | 2025-01-07T23:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0022 | VMware Cloud Foundation: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-07T23:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0021 | SonicWall SSL-VPN: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-07T23:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0019 | Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen | 2020-10-13T22:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:5712 | Red Hat Security Advisory: nginx:1.20 security update | 2023-10-16T09:09:24+00:00 | 2026-02-18T16:42:15+00:00 |
| rhsa-2023:5784 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.5 release and security update | 2023-10-17T15:47:19+00:00 | 2026-02-18T16:42:14+00:00 |
| rhsa-2023:5783 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.5 release and security update | 2023-10-17T15:44:28+00:00 | 2026-02-18T16:42:14+00:00 |
| rhsa-2025:4664 | Red Hat Security Advisory: Red Hat Ceph Storage 7.1 security, bug fix, and enhancement updates | 2025-05-07T12:48:57+00:00 | 2026-02-18T16:41:48+00:00 |
| rhsa-2024:8876 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2024-11-05T04:12:40+00:00 | 2026-02-18T16:40:36+00:00 |
| rhsa-2024:8418 | Red Hat Security Advisory: OpenShift Container Platform 4.16.z security update | 2024-10-30T01:33:39+00:00 | 2026-02-18T16:40:34+00:00 |
| rhsa-2024:7987 | Red Hat Security Advisory: Satellite 6.15.4 Security Update | 2024-10-10T20:31:33+00:00 | 2026-02-18T16:40:32+00:00 |
| rhsa-2024:4336 | Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.6.21 | 2024-07-25T06:35:28+00:00 | 2026-02-18T16:40:20+00:00 |
| rhsa-2024:4335 | Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.8.9 | 2024-07-17T13:48:25+00:00 | 2026-02-18T16:40:20+00:00 |
| rhsa-2024:4333 | Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.9.4 | 2024-07-23T16:27:58+00:00 | 2026-02-18T16:40:20+00:00 |
| rhsa-2024:10906 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.5 security and bug fix update | 2024-12-10T01:37:19+00:00 | 2026-02-18T16:40:02+00:00 |
| rhba-2024:7523 | Red Hat Bug Fix Advisory: Red Hat Developer Hub 1.3.0 release | 2024-10-02T15:29:03+00:00 | 2026-02-18T16:39:55+00:00 |
| rhsa-2023:5709 | Red Hat Security Advisory: dotnet7.0 security update | 2023-10-16T09:07:53+00:00 | 2026-02-18T16:38:46+00:00 |
| rhsa-2023:5714 | Red Hat Security Advisory: nginx security update | 2023-10-16T08:59:33+00:00 | 2026-02-18T16:38:44+00:00 |
| rhsa-2023:5749 | Red Hat Security Advisory: .NET 7.0 security update | 2023-10-16T14:45:49+00:00 | 2026-02-18T16:38:42+00:00 |
| rhsa-2023:5710 | Red Hat Security Advisory: dotnet6.0 security update | 2023-10-16T08:59:31+00:00 | 2026-02-18T16:38:40+00:00 |
| rhsa-2023:5708 | Red Hat Security Advisory: dotnet6.0 security update | 2023-10-16T08:59:30+00:00 | 2026-02-18T16:38:40+00:00 |
| rhsa-2023:5705 | Red Hat Security Advisory: rh-dotnet60-dotnet security, bug fix, and enhancement update | 2023-10-16T08:28:38+00:00 | 2026-02-18T16:38:40+00:00 |
| rhsa-2024:0853 | Red Hat Security Advisory: Network Observability 1.5.0 for OpenShift | 2024-02-21T13:32:07+00:00 | 2026-02-18T16:38:39+00:00 |
| rhsa-2024:0712 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.15 security update | 2024-02-07T08:37:47+00:00 | 2026-02-18T16:38:34+00:00 |
| rhsa-2023:5269 | Red Hat Security Advisory: postgresql:15 security update | 2023-09-19T14:43:05+00:00 | 2026-02-18T16:38:33+00:00 |
| rhsa-2024:0714 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.15 Security update | 2024-02-06T19:55:38+00:00 | 2026-02-18T16:38:30+00:00 |
| rhsa-2024:0711 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.15 Security update | 2024-02-07T08:38:29+00:00 | 2026-02-18T16:38:29+00:00 |
| rhsa-2024:0710 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.15 Security update | 2024-02-07T08:37:56+00:00 | 2026-02-18T16:38:28+00:00 |
| rhsa-2023:5491 | Red Hat Security Advisory: Red Hat AMQ Broker 7.11.2 release and security update | 2023-10-05T22:37:30+00:00 | 2026-02-18T16:38:28+00:00 |
| rhsa-2023:5148 | Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.20.2 release and security update | 2023-09-13T16:09:58+00:00 | 2026-02-18T16:38:25+00:00 |
| rhsa-2023:5147 | Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.18.3.2 release and security update | 2023-09-13T15:40:09+00:00 | 2026-02-18T16:38:25+00:00 |
| rhsa-2023:4991 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.3 Product Security and Bug Fix Update | 2023-09-06T13:06:22+00:00 | 2026-02-18T16:38:21+00:00 |
| rhsa-2023:4971 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 2023-09-05T11:53:51+00:00 | 2026-02-18T16:38:21+00:00 |
| rhsa-2023:6793 | Red Hat Security Advisory: rh-python38-python security update | 2023-11-08T08:20:36+00:00 | 2026-02-18T16:38:18+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-19-290-02 | Horner Automation Cscape | 2019-10-17T00:00:00.000000Z | 2019-10-17T00:00:00.000000Z |
| icsma-18-123-01 | Philips Brilliance Computed Tomography (CT) System (Update A) | 2018-05-03T00:00:00.000000Z | 2019-10-10T00:00:00.000000Z |
| icsma-19-248-01 | BD Pyxis (Update A) | 2019-09-05T00:00:00.000000Z | 2019-10-08T00:00:00.000000Z |
| icsa-19-281-04 | Siemens SIMATIC IT UADM | 2019-10-08T00:00:00.000000Z | 2019-10-08T00:00:00.000000Z |
| icsa-19-281-02 | GE Mark VIe Controller | 2019-10-08T00:00:00.000000Z | 2019-10-08T00:00:00.000000Z |
| icsa-19-281-01 | SMA Solar Technology AG Sunny WebBox | 2019-10-08T00:00:00.000000Z | 2019-10-08T00:00:00.000000Z |
| icsa-19-192-02 | ICSA-19-192-02 Siemens SIMATIC WinCC and PCS7 (Update C) | 2019-07-09T00:00:00.000000Z | 2019-10-08T00:00:00.000000Z |
| icsa-19-134-08 | ICSA-19-134-08 Siemens SIMATIC PCS7, WinCC, TIA Portal (Update D) | 2019-05-14T00:00:00.000000Z | 2019-10-08T00:00:00.000000Z |
| icsa-17-129-01 | ICSA-17-129-01 Siemens devices using the PROFINET Discovery and Configuration Protocol (Update K) | 2017-05-08T00:00:00.000000Z | 2019-10-08T00:00:00.000000Z |
| icsa-19-274-03 | Moxa EDR 810 Series | 2019-10-01T00:00:00.000000Z | 2019-10-01T00:00:00.000000Z |
| icsa-19-274-02 | Yokogawa Products | 2019-10-01T00:00:00.000000Z | 2019-10-01T00:00:00.000000Z |
| icsa-19-262-01 | Tridium Niagara | 2019-09-19T00:00:00.000000Z | 2019-09-19T00:00:00.000000Z |
| icsa-19-213-05 | Rockwell Automation Arena Simulation Software (Update B) | 2019-08-01T00:00:00.000000Z | 2019-09-19T00:00:00.000000Z |
| icsa-19-036-03 | WECON LeviStudioU (Update A) | 2019-02-05T00:00:00.000000Z | 2019-09-19T00:00:00.000000Z |
| icsa-19-260-03 | Honeywell Performance IP Cameras and Performance NVRs | 2019-09-17T00:00:00.000000Z | 2019-09-17T00:00:00.000000Z |
| icsa-19-260-01 | Advantech WebAccess | 2019-09-17T00:00:00.000000Z | 2019-09-17T00:00:00.000000Z |
| icsma-19-255-01 | Philips IntelliVue WLAN | 2019-09-12T00:00:00.000000Z | 2019-09-12T00:00:00.000000Z |
| icsa-19-255-05 | 3S-Smart Software Solutions GmbH CODESYS V3 Products Containing a CODESYS Communication Server | 2019-09-12T00:00:00.000000Z | 2019-09-12T00:00:00.000000Z |
| icsa-19-255-04 | 3S-Smart Software Solutions GmbH CODESYS Control V3 OPC UA Server | 2019-09-12T00:00:00.000000Z | 2019-09-12T00:00:00.000000Z |
| icsa-19-255-03 | 3S-Smart Software Solutions GmbH CODESYS Control V3 Online User Management | 2019-09-12T00:00:00.000000Z | 2019-09-12T00:00:00.000000Z |
| icsa-19-255-01 | 3S-Smart Software Solutions GmbH CODESYS V3 Web Server | 2019-09-12T00:00:00.000000Z | 2019-09-12T00:00:00.000000Z |
| icsa-19-260-02 | ICSA-19-260-02 Siemens SINEMA Remote Connect Server | 2019-09-10T00:00:00.000000Z | 2019-09-10T00:00:00.000000Z |
| icsa-19-253-06 | OSIsoft PI SQL Client | 2019-09-10T00:00:00.000000Z | 2019-09-10T00:00:00.000000Z |
| icsa-19-253-05 | Siemens SIMATIC TDC CP51M1 | 2019-09-10T00:00:00.000000Z | 2019-09-10T00:00:00.000000Z |
| icsa-19-253-04 | Siemens IE-WSN-PA Link WirelessHART Gateway | 2019-09-10T00:00:00.000000Z | 2019-09-10T00:00:00.000000Z |
| icsa-19-253-02 | Siemens SINETPLAN | 2019-09-10T00:00:00.000000Z | 2019-09-10T00:00:00.000000Z |
| icsa-19-253-01 | Delta Electronics TPEditor | 2019-09-10T00:00:00.000000Z | 2019-09-10T00:00:00.000000Z |
| icsa-19-248-01 | Red Lion Controls Crimson | 2019-09-05T00:00:00.000000Z | 2019-09-05T00:00:00.000000Z |
| icsa-19-050-04 | Rockwell Automation Allen-Bradley PowerMonitor 1000 (Update A) | 2019-02-19T00:00:00.000000Z | 2019-09-05T00:00:00.000000Z |
| icsa-19-246-02 | EZAutomation EZ PLC Editor | 2019-09-03T00:00:00.000000Z | 2019-09-03T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-email-sec-xss-ebjxuxwp | Cisco Email Security Appliance Cross-Site Scripting Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-email-sec-xss-EbjXuXwP | Cisco Email Security Appliance Cross-Site Scripting Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-cuc-dirtrv-m9hpnme4 | Cisco Unity Connection Directory Traversal Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-cuc-dirtrv-M9HpnME4 | Cisco Unity Connection Directory Traversal Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-umbrella-msi-install | Cisco Umbrella Roaming Client for Windows Install Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-uc-xss | Cisco Unity Connection Stored Cross-Site Scripting Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-sdwan-sqlinj | Cisco SD-WAN Solution SQL Injection Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-sdwan-sql-inject | Cisco SD-WAN Solution SQL Injection Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-sdwan-priv-esc | Cisco SD-WAN Solution Local Privilege Escalation Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-sdwan-cmd-inject | Cisco SD-WAN vManage Command Injection Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-on-prem-dos | Cisco Smart Software Manager On-Prem Web Interface Denial of Service Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-ios-xr-bgp-dos | Cisco IOS XR Software Border Gateway Protocol Attribute Denial of Service Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-hcm-f-csrf | Cisco Hosted Collaboration Mediation Fulfillment Cross-Site Request Forgery Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-fmc-auth | Cisco Firepower Management Center Lightweight Directory Access Protocol Authentication Bypass Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20200122-cuc-info-disclosure | Cisco Unified Communications Manager Information Disclosure Vulnerability | 2020-01-22T16:00:00+00:00 | 2020-01-22T16:00:00+00:00 |
| cisco-sa-20190703-ccapic-restapi | Cisco Application Policy Infrastructure Controller REST API Privilege Escalation Vulnerability | 2019-07-03T16:00:00+00:00 | 2020-01-16T15:25:04+00:00 |
| cisco-sa-20200102-dcnm-auth-bypass | Cisco Data Center Network Manager Authentication Bypass Vulnerabilities | 2020-01-02T16:00:00+00:00 | 2020-01-15T15:58:03+00:00 |
| cisco-sa-20200102-dcnm-comm-inject | Cisco Data Center Network Manager Command Injection Vulnerabilities | 2020-01-02T16:00:00+00:00 | 2020-01-15T15:58:02+00:00 |
| cisco-sa-20200102-dcnm-path-trav | Cisco Data Center Network Manager Path Traversal Vulnerabilities | 2020-01-02T16:00:00+00:00 | 2020-01-15T15:58:01+00:00 |
| cisco-sa-20200102-dcnm-xml-ext-entity | Cisco Data Center Network Manager XML External Entity Read Access Vulnerability | 2020-01-02T16:00:00+00:00 | 2020-01-15T15:58:00+00:00 |
| cisco-sa-20200102-dcnm-sql-inject | Cisco Data Center Network Manager SQL Injection Vulnerabilities | 2020-01-02T16:00:00+00:00 | 2020-01-15T15:57:59+00:00 |
| cisco-sa-20200102-dcnm-unauth-access | Cisco Data Center Network Manager JBoss EAP Unauthorized Access Vulnerability | 2020-01-02T16:00:00+00:00 | 2020-01-15T15:57:58+00:00 |
| cisco-sa-20200108-webex-video | Cisco Webex Video Mesh Node Command Injection Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-webex-centers-dos | Cisco Webex Centers Denial of Service Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-vdsd-auth-bypass | Cisco Vision Dynamic Signage Director Authentication Bypass Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-ucs-dir-infodis | Cisco UCS Director Information Disclosure Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-mme-dos | Cisco Mobility Management Entity Denial of Service Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-ise-auth-bypass | Cisco Identity Services Engine Authorization Bypass Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-iphone-xss | Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Scripting Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| cisco-sa-20200108-er-xss | Cisco Emergency Responder Stored Cross-Site Scripting Vulnerability | 2020-01-08T16:00:00+00:00 | 2020-01-08T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-40013 | ASoC: qcom: audioreach: fix potential null pointer dereference | 2025-10-02T00:00:00.000Z | 2025-10-22T01:01:20.000Z |
| msrc_cve-2025-55315 | ASP.NET Security Feature Bypass Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-22T00:00:00.000Z |
| msrc_cve-2025-25004 | PowerShell Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-21T00:00:00.000Z |
| msrc_cve-2024-57899 | wifi: mac80211: fix mbss changed flags corruption on 32 bit systems | 2025-01-02T00:00:00.000Z | 2025-10-19T01:01:38.000Z |
| msrc_cve-2024-31573 | XMLUnit for Java before 2.10.0, in the default configuration, might allow code execution via an untrusted stylesheet (used for an XSLT transformation), because XSLT extension functions are enabled. | 2025-10-02T00:00:00.000Z | 2025-10-19T01:01:21.000Z |
| msrc_cve-2025-62168 | Squid vulnerable to information disclosure via authentication credential leakage in error handling | 2025-10-02T00:00:00.000Z | 2025-10-19T01:01:13.000Z |
| msrc_cve-2025-21645 | platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it | 2025-01-02T00:00:00.000Z | 2025-10-18T01:01:18.000Z |
| msrc_cve-2025-21629 | net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets | 2025-01-02T00:00:00.000Z | 2025-10-18T01:01:13.000Z |
| msrc_cve-2024-56709 | io_uring: check if iowq is killed before queuing | 2024-12-02T00:00:00.000Z | 2025-10-17T01:01:42.000Z |
| msrc_cve-2024-53687 | riscv: Fix IPIs usage in kfence_protect_page() | 2025-01-02T00:00:00.000Z | 2025-10-17T01:01:36.000Z |
| msrc_cve-2024-49568 | net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg | 2025-01-02T00:00:00.000Z | 2025-10-17T01:01:27.000Z |
| msrc_cve-2022-49133 | drm/amdkfd: svm range restore work deadlock when process exit | 2025-02-02T00:00:00.000Z | 2025-10-17T01:01:22.000Z |
| msrc_cve-2022-49124 | x86/mce: Work around an erratum on fast string copy instructions | 2025-02-02T00:00:00.000Z | 2025-10-17T01:01:16.000Z |
| msrc_cve-2025-55320 | Configuration Manager Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-17T00:00:00.000Z |
| msrc_cve-2025-53784 | Microsoft Word Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53761 | Microsoft PowerPoint Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53760 | Microsoft SharePoint Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53759 | Microsoft Excel Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53741 | Microsoft Excel Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53740 | Microsoft Office Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53739 | Microsoft Excel Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53738 | Microsoft Word Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53737 | Microsoft Excel Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53736 | Microsoft Word Information Disclosure Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53735 | Microsoft Excel Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53733 | Microsoft Word Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53731 | Microsoft Office Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-50154 | Microsoft Windows File Explorer Spoofing Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-39996 | media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove | 2025-10-02T00:00:00.000Z | 2025-10-16T01:03:22.000Z |
| msrc_cve-2025-39986 | can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow | 2025-10-02T00:00:00.000Z | 2025-10-16T01:03:16.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:13247-1 | ghostscript-9.56.1-6.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13246-1 | ghc-pandoc-3.1.3-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13245-1 | kernel-devel-6.5.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13244-1 | ungoogled-chromium-116.0.5845.187-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13243-1 | postgresql15-15.4-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13242-1 | chromedriver-116.0.5845.187-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13241-1 | libopenssl-1_1-devel-1.1.1w-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13240-1 | xterm-384-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13239-1 | sonobuoy-0.56.16-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13238-1 | frr-8.4-6.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13237-1 | python310-certifi-2023.7.22-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13236-1 | python-2.7.18-38.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13235-1 | cpp7-7.5.0+r278197-15.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13234-1 | cpp13-13.2.1+git7813-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13233-1 | cpp12-12.3.0+git1204-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13232-1 | ungoogled-chromium-116.0.5845.179-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13231-1 | libsharpyuv0-1.3.1-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13230-1 | curl-8.3.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13229-1 | chromedriver-116.0.5845.187-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13228-1 | MozillaThunderbird-115.2.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13227-1 | MozillaFirefox-117.0.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13226-1 | gvim-9.0.1894-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13225-1 | velero-1.11.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13224-1 | python310-Brotli-1.1.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13223-1 | libmca_common_dstore1-3.2.3-11.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13222-1 | mutt-2.2.12-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13221-1 | libeconf-devel-0.5.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13220-1 | python310-numpy-1.25.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13219-1 | python39-3.9.18-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13218-1 | python310-CairoSVG-2.7.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2017-25 | Use-of-uninitialized-value in ToPercent | 2021-01-13T00:01:28.724375Z | 2022-04-13T03:04:35.256245Z |
| osv-2017-17 | Use-of-uninitialized-value in QuickOpen::Seek | 2021-01-13T00:00:28.517212Z | 2022-04-13T03:04:35.274300Z |
| osv-2017-14 | Use-of-uninitialized-value in Archive::ConvertFileHeader | 2021-01-13T00:00:26.084396Z | 2022-04-13T03:04:35.231883Z |
| osv-2017-138 | Heap-use-after-free in gnutls_x509_crl_deinit | 2021-01-15T00:00:32.872161Z | 2022-04-13T03:04:35.588129Z |
| osv-2017-13 | Heap-buffer-overflow in File::Write | 2021-01-13T00:00:25.896164Z | 2022-04-13T03:04:35.317926Z |
| osv-2017-117 | Use-of-uninitialized-value in CharToWide | 2021-01-13T21:57:50.799840Z | 2022-04-13T03:04:35.349256Z |
| osv-2017-110 | Use-of-uninitialized-value in ExtractUnixLink30 | 2021-01-13T21:57:48.641018Z | 2022-04-13T03:04:35.343007Z |
| osv-2017-109 | Use-of-uninitialized-value in Unpack::MakeDecodeTables | 2021-01-13T21:57:48.486313Z | 2022-04-13T03:04:35.336939Z |
| osv-2017-104 | Heap-buffer-overflow in Unpack::CopyString | 2021-01-13T21:57:43.088460Z | 2022-04-13T03:04:35.305586Z |
| osv-2017-100 | Use-of-uninitialized-value in Archive::ConvertAttributes | 2021-01-13T21:57:41.100876Z | 2022-04-13T03:04:35.262116Z |
| osv-2022-97 | Heap-buffer-overflow in gs_interpret | 2022-01-29T00:00:27.567705Z | 2022-04-13T03:04:34.418274Z |
| osv-2022-85 | UNKNOWN READ in pdfi_setcolorN | 2022-01-24T00:00:56.571243Z | 2022-04-13T03:04:34.722894Z |
| osv-2022-83 | Heap-use-after-free in gx_monitor_free | 2022-01-24T00:00:35.150378Z | 2022-04-13T03:04:34.797554Z |
| osv-2022-81 | Global-buffer-overflow in get_space_object | 2022-01-24T00:00:28.385382Z | 2022-04-13T03:04:34.752188Z |
| osv-2022-80 | Null-dereference READ in gstate_clone_core | 2022-01-24T00:00:19.630777Z | 2022-04-13T03:04:34.647038Z |
| osv-2022-79 | Segv on unknown address in gp_semaphore_close | 2022-01-24T00:00:12.635637Z | 2022-04-13T03:04:34.603551Z |
| osv-2022-54 | Heap-buffer-overflow in s_hex_process | 2022-01-17T00:00:22.068535Z | 2022-04-13T03:04:34.485965Z |
| osv-2022-53 | Heap-buffer-overflow in mem_true24_fill_rectangle | 2022-01-17T00:00:11.001652Z | 2022-04-13T03:04:34.496848Z |
| osv-2022-47 | Heap-buffer-overflow in mem_mono_copy_mono | 2022-01-16T00:00:36.108268Z | 2022-04-13T03:04:34.703597Z |
| osv-2022-42 | Heap-buffer-overflow in md_decode_utf8__ | 2022-01-14T00:00:32.201187Z | 2022-04-13T03:04:34.861184Z |
| osv-2022-40 | UNKNOWN READ in md_build_attribute | 2022-01-14T00:00:14.345044Z | 2022-04-13T03:04:34.866550Z |
| osv-2022-39 | Stack-buffer-overflow in BZ2_decompress | 2022-01-14T00:00:06.951694Z | 2022-04-13T03:04:34.905281Z |
| osv-2022-3 | UNKNOWN READ in pdfi_free_array | 2022-01-04T00:02:04.301966Z | 2022-04-13T03:04:34.821377Z |
| osv-2022-271 | UNKNOWN READ in pdf14_buf_free | 2022-03-22T00:01:47.478262Z | 2022-04-13T03:04:34.441603Z |
| osv-2022-232 | UNKNOWN READ in pdfi_fapi_get_glyph | 2022-03-11T00:00:50.999282Z | 2022-04-13T03:04:34.809697Z |
| osv-2022-218 | UNKNOWN READ in pdfi_read_cff_font | 2022-03-06T00:01:40.010815Z | 2022-04-13T03:04:34.729007Z |
| osv-2022-210 | UNKNOWN READ in pdfi_count_cff_index | 2022-03-04T00:00:09.623913Z | 2022-04-13T03:04:34.328420Z |
| osv-2022-206 | Heap-buffer-overflow in spgetcc | 2022-02-27T00:02:01.721420Z | 2022-04-13T03:04:34.680498Z |
| osv-2022-18 | UNKNOWN READ in gx_restrict_Pattern | 2022-01-07T00:02:01.270812Z | 2022-04-13T03:04:34.575775Z |
| osv-2022-177 | UNKNOWN READ in gx_dc_default_fill_masked | 2022-02-21T00:00:26.966993Z | 2022-04-13T03:04:34.838399Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-airflow-2023-36543 | Apache Airflow: ReDoS via dags function | 2024-03-06T10:54:19.002Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-35908 | Apache Airflow: Access to DAGs without relevant permission | 2024-03-06T10:54:30.276Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-35005 | Apache Airflow: Information disclosure on configuration view | 2024-03-06T10:54:40.698Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-29247 | Stored XSS on Apache Airflow | 2024-03-06T10:54:51.000Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-25754 | Apache Airflow: Privilege escalation using airflow logs | 2024-03-06T10:55:00.700Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-25695 | Information disclosure in Apache Airflow | 2024-03-06T10:55:12.502Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-22888 | Apache Airflow: Scheduler remote DoS | 2024-03-06T10:55:24.184Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-22887 | Apache Airflow path traversal by authenticated user | 2024-03-06T10:55:33.586Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-22884 | Apache Airflow, Apache Airflow MySQL Provider: Arbitrary file read via MySQL provider in Apache Airflow | 2024-03-06T10:55:44.175Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-46651 | Apache Airflow: Security vulnerability on AirFlow Connections | 2024-03-06T10:55:53.899Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-45402 | Apache Airflow: Open redirect during login | 2024-03-06T10:56:02.090Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-43985 | Apache Airflow prior to 2.4.2 has an open redirect | 2024-03-06T10:56:12.101Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-43982 | Apache Airflow prior to 2.4.2 allows reflected XSS via Origin Query Argument in URL | 2024-03-06T10:56:21.690Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-41672 | Session still functional after user is deactivated | 2024-03-06T10:56:33.995Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-41131 | Apache Airflow Hive Provider vulnerability (command injection via hive_cli connection) | 2024-03-06T10:56:44.188Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-40954 | Apache Airflow Spark Provider RCE that bypass restrictions to read arbitrary files | 2024-03-06T10:56:54.075Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-40754 | Open Redirect | 2024-03-06T10:57:05.679Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-40604 | Format String Vulnerability | 2024-03-06T10:57:16.891Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-40189 | Apache Airlfow Pig Provider RCE | 2024-03-06T10:57:25.694Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-40127 | Apache Airflow <2.4.0 has an RCE in a bash example | 2024-03-06T10:57:35.470Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-38649 | Apache Airflow Pinot provider allowed Command Injection | 2024-03-06T10:57:47.165Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-38170 | Overly permissive umask for daemons | 2024-03-06T10:57:57.694Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-38054 | Session Fixation | 2024-03-06T10:58:07.690Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-27949 | Apache Airflow prior to 2.3.1 may include sensitive values in rendered template | 2024-03-06T10:58:17.378Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-24288 | Apache Airflow: RCE in example DAGs | 2024-03-06T10:58:27.613Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2021-45230 | Apache Airflow: Creating DagRuns didn't respect Dag-level permissions in the Webserver | 2024-03-06T10:58:36.898Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2021-45229 | Apache Airflow: Reflected XSS via Origin Query Argument in URL | 2024-03-06T10:58:46.760Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2021-38540 | Apache Airflow: Variable Import endpoint missed authentication check | 2024-03-06T10:58:56.460Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2021-35936 | No Authentication on Logging Server | 2024-03-06T10:59:07.153Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2021-29621 | Observable Response Discrepancy in Flask-AppBuilder | 2024-03-06T10:59:16.077Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202203-1171 | BigAnt Software BigAnt Server v5.6.06 was discovered to utilize weak password hashes. Big… | 2024-02-13T22:43:22.857000Z |
| var-202203-0921 | ROG Live Service’s function for deleting temp files created by installation has an improp… | 2024-02-13T22:43:22.895000Z |
| var-202203-0900 | An improper neutralization of special elements used in an OS Command vulnerability [CWE-7… | 2024-02-13T22:43:22.919000Z |
| var-202203-0836 | Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressw… | 2024-02-13T22:43:22.952000Z |
| var-202203-0835 | Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressw… | 2024-02-13T22:43:22.979000Z |
| var-202204-0956 | A use of hard-coded cryptographic key vulnerability [CWE-321] in the registration mechani… | 2024-02-13T22:43:19.281000Z |
| var-202204-0955 | A use of hard-coded cryptographic key vulnerability [CWE-321] in FortiEDR versions 5.0.2,… | 2024-02-13T22:43:19.309000Z |
| var-202204-0954 | A improper control of a resource through its lifetime in Fortinet FortiEDR version 5.0.3 … | 2024-02-13T22:43:19.338000Z |
| var-202204-0725 | An authenticated, remote attacker can gain access to a dereferenced pointer contained in … | 2024-02-13T22:43:19.375000Z |
| var-202203-1862 | Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in A… | 2024-02-13T22:43:19.509000Z |
| var-202201-0617 | A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lea… | 2024-02-13T22:43:18.764000Z |
| var-202201-0616 | A CWE-798: Use of Hard-coded Credentials vulnerability exists that could result in inform… | 2024-02-13T22:43:18.796000Z |
| var-200609-0268 | Format string vulnerability in the Real Time Virus Scan service in Symantec AntiVirus Cor… | 2024-02-13T22:43:05.396000Z |
| var-201209-0457 | Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine Firewall Analyzer 7.2… | 2024-02-13T22:42:53.389000Z |
| var-201305-0267 | Session fixation vulnerability in Cisco Secure Access Control System (ACS) allows remote … | 2024-02-13T22:42:39.668000Z |
| var-201304-0254 | Cisco Universal Broadband (aka uBR) 10000 series routers, when an IPv4/IPv6 dual-stack mo… | 2024-02-13T22:42:39.728000Z |
| var-201304-0149 | The debugging feature on the Siemens CP 1604 and CP 1616 interface cards with firmware be… | 2024-02-13T22:42:39.782000Z |
| var-201505-0198 | Cisco Wireless LAN Controller (WLC) devices with software 7.4(1.1) allow remote attackers… | 2024-02-13T22:42:08.222000Z |
| var-201504-0281 | Unrestricted file upload vulnerability in the Custom Prompts upload implementation in Cis… | 2024-02-13T22:42:08.313000Z |
| var-201712-0537 | BA SYSTEMS BAS Web on BAS920 devices (with Firmware 01.01.00*, HTTPserv 00002, and Script… | 2024-02-13T22:42:05.143000Z |
| var-201711-0587 | TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allow remote authenticated users to execu… | 2024-02-13T22:42:05.331000Z |
| var-201808-0410 | The Web server in 3CX version 15.5.8801.3 is vulnerable to Reflected XSS on all stack tra… | 2024-02-13T22:42:04.019000Z |
| var-201805-0169 | Advantech WebAccess 8.1 and earlier contains a DLL hijacking vulnerability which may allo… | 2024-02-13T22:42:04.534000Z |
| var-201901-1456 | An information disclosure vulnerability exists in .NET Framework and .NET Core which allo… | 2024-02-13T22:42:03.182000Z |
| var-201808-0870 | Driver module in Intel Smart Sound Technology before version 9.21.00.3541 potentially all… | 2024-02-13T22:42:03.949000Z |
| var-201906-0479 | A reflective Cross-site scripting (XSS) vulnerability in the free_time_failed.cgi CGI pro… | 2024-02-13T22:42:02.162000Z |
| var-201911-1188 | In Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and pri… | 2024-02-13T22:42:01.167000Z |
| var-201909-0101 | Reflected Cross Site Scripting vulnerability in Administrators web console in McAfee Web … | 2024-02-13T22:42:01.735000Z |
| var-202003-1608 | In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Versi… | 2024-02-13T22:42:00.435000Z |
| var-202005-1060 | Inadequate folder security permissions in Emerson OpenEnterprise versions through 3.3.4 m… | 2024-02-13T22:41:56.862000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2005-000760 | McAfee VirusScan Engine buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000759 | McAfee VirusScan Engine buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000758 | msearch directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000757 | Cybozu Office browser script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000756 | Tsuru-Kame Mail vulnerable in S/MIME signature verification | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000707 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000706 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000705 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000695 | Ruby XMLRPC Server Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000538 | Ruby vulnerability allowing to bypass safe level 4 as a sandbox | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000537 | Webmin and Usermin authentication bypass vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000530 | Vulnerability in multiple web browsers allowing request spoofing attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000396 | Ruby XMLRPC Arbitrary Command Execution Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000343 | DeleGate DNS Message Decompression Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000199 | Sylpheed Filename Buffer Overflow Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000183 | Apache Tomcat denial of service vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000163 | Sylpheed Email Header Buffer Overflow Vulnerability with non-ASCII Characters | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000594 | DNS cache servers resource consumption by TCP SYN_SENT states | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000593 | LDAP server update function vulnerable to buffer overflow | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000592 | Shuriken Pro3 S/MIME signature verification does not verify the certificate authenticity | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000591 | Shuriken Pro3 S/MIME signature verification does not verify the From address | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000590 | Becky! Internet Mail vulnerability in S/MIME signature verification | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000589 | Toshiba HDD & DVD video recorders can be accessed without authentication | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000588 | SSL-VPN products vulnerable to cookie theft | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000587 | desknet's buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000586 | Virus Buster Corporate Edition vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000554 | Namazu cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000511 | DeleGate Multiple Buffer Overflow Vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000473 | Ruby cgi.rb Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000323 | Ruby CGI Session Management Insecure File Permission Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:20158-1 | Security update for ucode-intel | 2025-03-24T12:15:39Z | 2025-03-24T12:15:39Z |
| suse-su-2025:20157-1 | Security update for gnutls | 2025-03-24T09:52:04Z | 2025-03-24T09:52:04Z |
| suse-su-2025:20156-1 | Security update for python-Jinja2 | 2025-03-24T09:41:28Z | 2025-03-24T09:41:28Z |
| suse-su-2025:0989-1 | Security update for u-boot | 2025-03-24T09:32:42Z | 2025-03-24T09:32:42Z |
| suse-su-2025:0988-1 | Security update for zvbi | 2025-03-24T09:32:22Z | 2025-03-24T09:32:22Z |
| suse-su-2025:0986-1 | Security update for libarchive | 2025-03-21T17:49:33Z | 2025-03-21T17:49:33Z |
| suse-su-2025:0985-1 | Security update for libarchive | 2025-03-21T17:45:17Z | 2025-03-21T17:45:17Z |
| suse-su-2025:0984-1 | Security update for xorg-x11-server | 2025-03-21T17:44:38Z | 2025-03-21T17:44:38Z |
| suse-su-2025:0983-1 | Security update for the Linux Kernel | 2025-03-21T17:44:17Z | 2025-03-21T17:44:17Z |
| suse-su-2025:0982-1 | Security update for python311 | 2025-03-21T14:17:05Z | 2025-03-21T14:17:05Z |
| suse-su-2025:0981-1 | Security update for python311 | 2025-03-21T14:16:48Z | 2025-03-21T14:16:48Z |
| suse-su-2025:0980-1 | Security update for apptainer | 2025-03-21T14:15:19Z | 2025-03-21T14:15:19Z |
| suse-su-2025:0979-1 | Security update for zvbi | 2025-03-21T12:54:02Z | 2025-03-21T12:54:02Z |
| suse-su-2025:0977-1 | Security update for wpa_supplicant | 2025-03-21T08:25:51Z | 2025-03-21T08:25:51Z |
| suse-su-2025:0976-1 | Security update for libxml2 | 2025-03-21T08:25:09Z | 2025-03-21T08:25:09Z |
| suse-su-2025:0975-1 | Security update for webkit2gtk3 | 2025-03-21T08:24:35Z | 2025-03-21T08:24:35Z |
| suse-su-2025:0974-1 | Security update for webkit2gtk3 | 2025-03-21T08:23:09Z | 2025-03-21T08:23:09Z |
| suse-su-2025:20241-1 | Security update for gstreamer-plugins-base | 2025-03-20T10:57:31Z | 2025-03-20T10:57:31Z |
| suse-su-2025:20155-1 | Security update for protobuf | 2025-03-20T10:44:54Z | 2025-03-20T10:44:54Z |
| suse-su-2025:0962-1 | Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) | 2025-03-19T19:04:26Z | 2025-03-19T19:04:26Z |
| suse-su-2025:0961-1 | Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) | 2025-03-19T19:04:10Z | 2025-03-19T19:04:10Z |
| suse-su-2025:0960-1 | Security update for freetype2 | 2025-03-19T18:34:08Z | 2025-03-19T18:34:08Z |
| suse-su-2025:0959-1 | Security update for python-Django | 2025-03-19T16:56:42Z | 2025-03-19T16:56:42Z |
| suse-su-2025:0958-1 | Security update for ffmpeg-4 | 2025-03-19T16:55:56Z | 2025-03-19T16:55:56Z |
| suse-su-2025:0956-1 | Security update for python-Jinja2 | 2025-03-19T16:12:31Z | 2025-03-19T16:12:31Z |
| suse-su-2025:0955-1 | Security update for the Linux Kernel | 2025-03-19T16:11:24Z | 2025-03-19T16:11:24Z |
| suse-su-2025:0954-1 | Security update for tomcat | 2025-03-19T13:50:54Z | 2025-03-19T13:50:54Z |
| suse-su-2025:0952-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 2025-03-19T13:34:10Z | 2025-03-19T13:34:10Z |
| suse-su-2025:0950-1 | Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) | 2025-03-19T13:34:04Z | 2025-03-19T13:34:04Z |
| suse-su-2025:0949-1 | Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4) | 2025-03-19T13:04:19Z | 2025-03-19T13:04:19Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-25462 | HCL BigFix WebUI存在未明漏洞 | 2025-10-21 | 2025-10-27 |
| cnvd-2025-25461 | HCL AION信息泄露漏洞(CNVD-2025-25461) | 2025-10-21 | 2025-10-27 |
| cnvd-2025-25460 | HCL AION信息泄露漏洞(CNVD-2025-25460) | 2025-10-21 | 2025-10-27 |
| cnvd-2025-25409 | HCL AION存在未明漏洞(CNVD-2025-25409) | 2025-10-21 | 2025-10-27 |
| cnvd-2025-25388 | HCL AION存在未明漏洞 | 2025-10-21 | 2025-10-27 |
| cnvd-2025-25387 | HCL AION信息泄露漏洞 | 2025-10-21 | 2025-10-27 |
| cnvd-2025-25386 | WordPress插件Addison反序列化漏洞 | 2025-10-24 | 2025-10-27 |
| cnvd-2025-25385 | WordPress插件Acknowledgify缺少授权漏洞 | 2025-10-24 | 2025-10-27 |
| cnvd-2025-25384 | WordPress插件Accordion缺少授权漏洞 | 2025-10-24 | 2025-10-27 |
| cnvd-2025-25383 | WordPress插件Academy LMS权限提升漏洞 | 2025-10-24 | 2025-10-27 |
| cnvd-2015-06128 | 赛飞OA管理系统存在通用型任意文件下载漏洞 | 2015-09-10 | 2025-10-25 |
| cnvd-2025-25376 | Apache Spark加密问题漏洞(CNVD-2025-25376) | 2025-10-21 | 2025-10-24 |
| cnvd-2025-24802 | OpenEXR存在未明漏洞(CNVD-2025-24802) | 2024-04-10 | 2025-10-24 |
| cnvd-2025-24799 | OpenEXR缓冲区溢出漏洞(CNVD-2025-24799) | 2025-08-11 | 2025-10-24 |
| cnvd-2025-24798 | OpenEXR缓冲区溢出漏洞(CNVD-2025-24798) | 2025-08-11 | 2025-10-24 |
| cnvd-2025-24797 | OpenEXR代码问题漏洞(CNVD-2025-24797) | 2025-08-11 | 2025-10-24 |
| cnvd-2025-24796 | OpenEXR存在未明漏洞(CNVD-2025-24796) | 2025-08-11 | 2025-10-24 |
| cnvd-2025-24795 | Mattermost存在未明漏洞(CNVD-2025-24795) | 2025-10-21 | 2025-10-24 |
| cnvd-2025-24794 | Fortinet FortiDLP日志信息泄露漏洞 | 2025-10-21 | 2025-10-24 |
| cnvd-2025-24792 | OpenEXR存在未明漏洞(CNVD-2025-24792) | 2025-10-21 | 2025-10-24 |
| cnvd-2025-24791 | OpenEXR存在未明漏洞(CNVD-2025-24791) | 2025-10-21 | 2025-10-24 |
| cnvd-2025-24790 | OpenEXR存在未明漏洞(CNVD-2025-24790) | 2025-10-21 | 2025-10-24 |
| cnvd-2025-24789 | Opencast信息泄露漏洞(CNVD-2025-24789) | 2025-10-21 | 2025-10-24 |
| cnvd-2025-24788 | Flowise文件上传漏洞(CNVD-2025-24788) | 2025-10-21 | 2025-10-24 |
| cnvd-2025-24786 | Mongoose缓冲区溢出漏洞 | 2025-10-21 | 2025-10-24 |
| cnvd-2025-24785 | Wireshark存在未明漏洞(CNVD-2025-24785) | 2025-10-21 | 2025-10-24 |
| cnvd-2025-24784 | SAMSUNG Mobile devices存在未明漏洞(CNVD-2025-24784) | 2025-10-21 | 2025-10-24 |
| cnvd-2025-24783 | SAMSUNG Mobile devices存在未明漏洞(CNVD-2025-24783) | 2025-10-21 | 2025-10-24 |
| cnvd-2025-24782 | Oracle Solaris资源管理错误漏洞 | 2025-10-22 | 2025-10-24 |
| cnvd-2025-24780 | Beauty Parlour Management System search-invoices.php文件SQL注入漏洞 | 2025-10-13 | 2025-10-24 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2024-AVI-0882 | Multiples vulnérabilités dans Oracle Database Server | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0881 | Multiples vulnérabilités dans Google Chrome | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0880 | Multiples vulnérabilités dans les produits Trend Micro | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| CERTFR-2024-AVI-0879 | Vulnérabilité dans Juniper Networks Junos OS | 2024-10-16T00:00:00.000000 | 2024-10-16T00:00:00.000000 |
| certfr-2024-avi-0878 | Multiples vulnérabilités dans les produits Splunk | 2024-10-15T00:00:00.000000 | 2024-10-15T00:00:00.000000 |
| certfr-2024-avi-0781 | Multiples vulnérabilités dans les produits Juniper Networks | 2024-09-16T00:00:00.000000 | 2024-10-15T00:00:00.000000 |
| certfr-2024-avi-0741 | Multiples vulnérabilités dans Juniper Secure Analytics | 2024-09-05T00:00:00.000000 | 2024-10-15T00:00:00.000000 |
| certfr-2024-avi-0575 | Multiples vulnérabilités dans les produits Juniper Networks | 2024-07-12T00:00:00.000000 | 2024-10-15T00:00:00.000000 |
| CERTFR-2024-AVI-0878 | Multiples vulnérabilités dans les produits Splunk | 2024-10-15T00:00:00.000000 | 2024-10-15T00:00:00.000000 |
| CERTFR-2024-AVI-0781 | Multiples vulnérabilités dans les produits Juniper Networks | 2024-09-16T00:00:00.000000 | 2024-10-15T00:00:00.000000 |
| CERTFR-2024-AVI-0741 | Multiples vulnérabilités dans Juniper Secure Analytics | 2024-09-05T00:00:00.000000 | 2024-10-15T00:00:00.000000 |
| CERTFR-2024-AVI-0575 | Multiples vulnérabilités dans les produits Juniper Networks | 2024-07-12T00:00:00.000000 | 2024-10-15T00:00:00.000000 |
| certfr-2024-avi-0876 | Multiples vulnérabilités dans Moodle | 2024-10-14T00:00:00.000000 | 2024-10-14T00:00:00.000000 |
| certfr-2024-avi-0875 | Multiples vulnérabilités dans les produits Moxa | 2024-10-14T00:00:00.000000 | 2024-10-14T00:00:00.000000 |
| CERTFR-2024-AVI-0876 | Multiples vulnérabilités dans Moodle | 2024-10-14T00:00:00.000000 | 2024-10-14T00:00:00.000000 |
| CERTFR-2024-AVI-0875 | Multiples vulnérabilités dans les produits Moxa | 2024-10-14T00:00:00.000000 | 2024-10-14T00:00:00.000000 |
| certfr-2024-avi-0874 | Multiples vulnérabilités dans Google Android | 2024-10-11T00:00:00.000000 | 2024-10-11T00:00:00.000000 |
| certfr-2024-avi-0873 | Multiples vulnérabilités dans les produits IBM | 2024-10-11T00:00:00.000000 | 2024-10-11T00:00:00.000000 |
| certfr-2024-avi-0872 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2024-10-11T00:00:00.000000 | 2024-10-11T00:00:00.000000 |
| certfr-2024-avi-0871 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-10-11T00:00:00.000000 | 2024-10-11T00:00:00.000000 |
| certfr-2024-avi-0870 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-10-11T00:00:00.000000 | 2024-10-11T00:00:00.000000 |
| certfr-2024-avi-0869 | Vulnérabilité dans Mozilla Thunderbird | 2024-10-11T00:00:00.000000 | 2024-10-11T00:00:00.000000 |
| certfr-2024-avi-0868 | Multiples vulnérabilités dans Microsoft Edge | 2024-10-11T00:00:00.000000 | 2024-10-11T00:00:00.000000 |
| certfr-2024-avi-0867 | Multiples vulnérabilités dans les produits SonicWall | 2024-10-11T00:00:00.000000 | 2024-10-11T00:00:00.000000 |
| CERTFR-2024-AVI-0874 | Multiples vulnérabilités dans Google Android | 2024-10-11T00:00:00.000000 | 2024-10-11T00:00:00.000000 |
| CERTFR-2024-AVI-0873 | Multiples vulnérabilités dans les produits IBM | 2024-10-11T00:00:00.000000 | 2024-10-11T00:00:00.000000 |
| CERTFR-2024-AVI-0872 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2024-10-11T00:00:00.000000 | 2024-10-11T00:00:00.000000 |
| CERTFR-2024-AVI-0871 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-10-11T00:00:00.000000 | 2024-10-11T00:00:00.000000 |
| CERTFR-2024-AVI-0870 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-10-11T00:00:00.000000 | 2024-10-11T00:00:00.000000 |
| CERTFR-2024-AVI-0869 | Vulnérabilité dans Mozilla Thunderbird | 2024-10-11T00:00:00.000000 | 2024-10-11T00:00:00.000000 |