Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-21923 |
6.5 (3.1)
|
Vulnerability in the Oracle Life Sciences Central… |
Oracle Corporation |
Oracle Life Sciences Central Designer |
2026-01-20T21:56:20.389Z | 2026-01-21T20:49:28.694Z |
| CVE-2026-21922 |
4.2 (3.1)
|
Vulnerability in the Oracle Planning and Budgetin… |
Oracle Corporation |
Oracle Planning and Budgeting Cloud Service |
2026-01-20T21:56:19.994Z | 2026-01-21T20:48:53.795Z |
| CVE-2026-21642 |
6.1 (3.0)
|
HackerOne community member Patrick Lang (7yr) has… |
Revive |
Revive Adserver |
2026-01-20T20:48:48.079Z | 2026-01-21T20:47:21.691Z |
| CVE-2026-23886 |
5.3 (3.1)
|
Swift W3C TraceContext has malformed HTTP header that … |
swift-otel |
swift-w3c-trace-context |
2026-01-19T21:01:52.694Z | 2026-01-21T20:47:10.139Z |
| CVE-2026-21664 |
6.1 (3.0)
|
HackerOne community member Huynh Pham Thanh Luc (… |
Revive |
Revive Adserver |
2026-01-20T20:48:47.976Z | 2026-01-21T20:45:35.234Z |
| CVE-2026-1177 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Yonyou KSOA HTTP GET Parameter save_folder.jsp sql injection |
Yonyou |
KSOA |
2026-01-19T21:32:05.867Z | 2026-01-21T20:42:32.780Z |
| CVE-2026-21663 |
6.1 (3.0)
|
HackerOne community member Patrick Lang (7yr) has… |
Revive |
Revive Adserver |
2026-01-20T20:48:47.974Z | 2026-01-21T20:42:21.072Z |
| CVE-2025-59464 |
6.5 (3.0)
|
A memory leak in Node.js’s OpenSSL integration oc… |
nodejs |
node |
2026-01-20T20:41:55.599Z | 2026-01-21T20:41:09.437Z |
| CVE-2026-1178 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Yonyou KSOA HTTP GET Parameter select.jsp sql injection |
Yonyou |
KSOA |
2026-01-19T22:02:06.406Z | 2026-01-21T20:36:59.451Z |
| CVE-2026-1179 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Yonyou KSOA HTTP GET Parameter user_popedom.jsp sql in… |
Yonyou |
KSOA |
2026-01-19T22:32:06.960Z | 2026-01-21T20:31:51.867Z |
| CVE-2026-21637 |
5.9 (3.0)
|
A flaw in Node.js TLS error handling allows remot… |
nodejs |
node |
2026-01-20T20:41:55.352Z | 2026-01-21T20:22:51.033Z |
| CVE-2026-23950 |
8.8 (3.1)
|
node-tar has Race Condition in Path Reservations via U… |
isaacs |
node-tar |
2026-01-20T00:40:48.510Z | 2026-01-21T20:15:57.278Z |
| CVE-2025-59465 |
7.5 (3.0)
|
A malformed `HTTP/2 HEADERS` frame with oversized… |
nodejs |
node |
2026-01-20T20:41:55.317Z | 2026-01-21T20:11:28.986Z |
| CVE-2026-22770 |
6.5 (3.1)
|
ImageMagick vulnerable to Release of Invalid Pointer i… |
ImageMagick |
ImageMagick |
2026-01-20T00:48:19.241Z | 2026-01-21T20:10:46.858Z |
| CVE-2026-21964 |
4.9 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:33.276Z | 2026-01-21T20:04:13.585Z |
| CVE-2026-21965 |
2.7 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:33.583Z | 2026-01-21T19:57:30.139Z |
| CVE-2026-21966 |
6.1 (3.1)
|
Vulnerability in the Oracle Hospitality OPERA 5 P… |
Oracle Corporation |
Oracle Hospitality OPERA 5 Property Services |
2026-01-20T21:56:33.912Z | 2026-01-21T19:54:47.033Z |
| CVE-2026-23955 |
4.2 (3.1)
|
EVerest vulnerable to concatenation of strings literal… |
EVerest |
everest-core |
2026-01-21T19:25:12.104Z | 2026-01-21T19:53:57.098Z |
| CVE-2025-68137 |
8.4 (3.1)
|
EVerest's Integer Overflow and Signed to Unsigned conv… |
EVerest |
everest-core |
2026-01-21T19:20:09.059Z | 2026-01-21T19:51:26.058Z |
| CVE-2026-1192 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Tosei Online Store Management System ネット店舗管理システム imode… |
Tosei |
Online Store Management System ネット店舗管理システム |
2026-01-19T23:02:09.710Z | 2026-01-21T19:48:53.448Z |
| CVE-2025-68136 |
7.4 (3.1)
|
EVerest's inadequate session handling can lead to memo… |
EVerest |
everest-core |
2026-01-21T19:18:21.068Z | 2026-01-21T19:47:04.055Z |
| CVE-2026-1193 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
MineAdmin View view improper authorization |
n/a |
MineAdmin |
2026-01-19T23:02:11.979Z | 2026-01-21T19:44:34.400Z |
| CVE-2025-13465 |
6.9 (4.0)
|
Prototype Pollution Vulnerability in Lodash _.unset an… |
Lodash |
Lodash |
2026-01-21T19:05:28.846Z | 2026-01-21T19:43:38.268Z |
| CVE-2026-22218 |
7.1 (4.0)
|
Chainlit < 2.9.4 Arbitrary File Read via /project/element |
Chainlit |
Chainlit |
2026-01-19T23:14:52.969Z | 2026-01-21T19:42:24.327Z |
| CVE-2026-21967 |
8.6 (3.1)
|
Vulnerability in the Oracle Hospitality OPERA 5 p… |
Oracle Corporation |
Oracle Hospitality OPERA 5 |
2026-01-20T21:56:34.237Z | 2026-01-21T19:32:12.949Z |
| CVE-2026-21968 |
6.5 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:34.542Z | 2026-01-21T19:21:31.349Z |
| CVE-2025-68135 |
6.5 (3.1)
|
EVerest's inadequate exception handling leads to denia… |
EVerest |
everest-core |
2026-01-21T18:56:05.970Z | 2026-01-21T19:17:21.915Z |
| CVE-2025-68132 |
2.4 (4.0)
|
EVerest has out-of-bounds read in DZG_GSH01 SLIP CRC p… |
EVerest |
everest-core |
2026-01-21T18:28:40.763Z | 2026-01-21T19:06:48.136Z |
| CVE-2025-68134 |
7.4 (3.1)
|
EVerest's use of assert functions can potentially lead… |
EVerest |
everest-core |
2026-01-21T18:32:13.882Z | 2026-01-21T19:03:47.370Z |
| CVE-2026-21970 |
6.5 (3.1)
|
Vulnerability in the Oracle Life Sciences Central… |
Oracle Corporation |
Oracle Life Sciences Central Designer |
2026-01-20T21:56:35.163Z | 2026-01-21T18:59:51.402Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1330 |
8.7 (4.0)
7.5 (3.1)
|
HAMASTAR Technology|MeetingHub - Arbitrary File Read |
HAMASTAR Technology |
MeetingHub |
2026-01-22T08:29:25.677Z | 2026-01-22T15:04:55.209Z |
| CVE-2026-24332 |
4.3 (3.1)
|
Discord through 2026-01-16 allows gathering infor… |
Discord |
WebSocket API service |
2026-01-22T08:10:44.462Z | 2026-01-22T15:11:05.705Z |
| CVE-2020-8451 |
N/A
|
The reserved CVE was never used. | N/A | N/A | 2026-01-22T08:05:05.882Z | |
| CVE-2026-0920 |
9.8 (3.1)
|
LA-Studio Element Kit for Elementor <= 1.5.6.3 - Unaut… |
choijun |
LA-Studio Element Kit for Elementor |
2026-01-22T06:47:19.614Z | 2026-01-22T15:20:27.030Z |
| CVE-2026-24049 |
7.1 (3.1)
|
wheel Allows Arbitrary File Permission Modification vi… |
pypa |
wheel |
2026-01-22T04:02:08.706Z | 2026-01-22T12:25:03.192Z |
| CVE-2025-7425 |
7.8 (3.1)
|
Libxslt: heap use-after-free in libxslt caused by atyp… |
GNOME |
libxml2 |
2025-07-10T13:53:37.295Z | 2026-01-22T04:36:51.687Z |
| CVE-2025-71176 |
6.8 (3.1)
|
pytest through 9.0.2 on UNIX relies on directorie… |
pytest |
pytest |
2026-01-22T04:59:17.273Z | 2026-01-22T12:26:39.653Z |
| CVE-2025-6020 |
7.8 (3.1)
|
Linux-pam: linux-pam directory traversal |
|
|
2025-06-17T12:44:08.646Z | 2026-01-22T04:36:44.732Z |
| CVE-2025-5914 |
7.8 (3.1)
|
Libarchive: double free at archive_read_format_rar_see… |
|
|
2025-06-09T19:53:48.923Z | 2026-01-22T04:36:37.970Z |
| CVE-2025-49796 |
9.1 (3.1)
|
Libxml: type confusion leads to denial of service (dos) |
|
|
2025-06-16T15:14:28.251Z | 2026-01-22T04:37:17.056Z |
| CVE-2025-49794 |
9.1 (3.1)
|
Libxml: heap use after free (uaf) leads to denial of s… |
|
|
2025-06-16T15:24:31.020Z | 2026-01-22T04:37:11.874Z |
| CVE-2026-24055 |
6.3 (4.0)
|
Langfuse Slack OAuth Installation Endpoint Lacks Authe… |
langfuse |
langfuse |
2026-01-22T03:07:03.784Z | 2026-01-22T12:40:42.009Z |
| CVE-2026-24042 |
9.4 (3.1)
|
Appsmith public apps can execute unpublished actions (… |
appsmithorg |
appsmith |
2026-01-22T03:52:54.463Z | 2026-01-22T12:28:28.202Z |
| CVE-2026-24039 |
4.3 (3.1)
|
Horilla's Improper Access Control Allows Employees to … |
horilla-opensource |
horilla |
2026-01-22T03:43:41.476Z | 2026-01-22T12:30:11.282Z |
| CVE-2026-24038 |
8.1 (3.1)
|
Horilla HR has 2FA Bypass through its OTP Handling Logic |
horilla-opensource |
horilla |
2026-01-22T03:39:06.216Z | 2026-01-22T12:33:39.694Z |
| CVE-2026-24037 |
4.8 (3.1)
|
Horilla HRM has XSS Bypass through Project Name |
horilla-opensource |
horilla |
2026-01-22T03:31:37.305Z | 2026-01-22T12:36:02.772Z |
| CVE-2026-24036 |
5.3 (3.1)
|
Horilla Exposes Unpublished Job Disclosures through Un… |
horilla-opensource |
horilla |
2026-01-22T03:21:32.538Z | 2026-01-22T12:38:10.451Z |
| CVE-2026-24035 |
4.3 (3.1)
|
Horilla has Improper Access Control Issue that Allows … |
horilla-opensource |
horilla |
2026-01-22T02:43:10.884Z | 2026-01-22T12:41:56.958Z |
| CVE-2026-24034 |
5.4 (3.1)
|
Horilla has File Upload XSS |
horilla-opensource |
horilla |
2026-01-22T02:41:37.702Z | 2026-01-22T12:44:21.620Z |
| CVE-2025-63644 |
5.4 (3.1)
|
A stored cross-site scripting (XSS) vulnerability… |
n/a |
n/a |
2026-01-14T00:00:00.000Z | 2026-01-22T03:02:07.462Z |
| CVE-2026-24010 |
8.8 (3.0)
|
Horilla has HTML Injection Issue that, with Phishing, … |
horilla-opensource |
horilla |
2026-01-22T02:37:19.130Z | 2026-01-22T12:48:02.914Z |
| CVE-2026-24006 |
7.5 (3.1)
|
Seroval affected by Denial of Service via Deeply Neste… |
lxsmnsyc |
seroval |
2026-01-22T02:32:31.913Z | 2026-01-22T12:50:51.270Z |
| CVE-2026-24002 |
9.1 (3.1)
|
pyodide sandbox option is insecure |
gristlabs |
grist-core |
2026-01-22T02:26:28.765Z | 2026-01-22T12:54:32.232Z |
| CVE-2026-24001 |
2.7 (4.0)
|
jsdiff has a Denial of Service vulnerability in parseP… |
kpdecker |
jsdiff |
2026-01-22T02:23:44.059Z | 2026-01-22T12:58:09.928Z |
| CVE-2026-23992 |
5.9 (3.1)
|
go-tuf improperly validates the configured threshold f… |
theupdateframework |
go-tuf |
2026-01-22T02:20:06.845Z | 2026-01-22T15:21:21.301Z |
| CVE-2026-23991 |
5.9 (3.1)
|
go-tuf affected by client DoS via malformed server response |
theupdateframework |
go-tuf |
2026-01-22T02:16:37.294Z | 2026-01-22T15:35:31.770Z |
| CVE-2026-23967 |
7.5 (3.1)
|
sm-crypto Affected by Signature Malleability in SM2-DSA |
JuneAndGreen |
sm-crypto |
2026-01-22T01:59:30.555Z | 2026-01-22T16:03:58.987Z |
| CVE-2026-23966 |
9.1 (3.1)
|
sm-crypto Affected by Private Key Recovery in SM2-PKE |
JuneAndGreen |
sm-crypto |
2026-01-22T02:06:54.003Z | 2026-01-22T15:49:07.259Z |
| CVE-2026-23965 |
7.5 (3.1)
|
sm-crypto Affected by Signature Forgery in SM2-DSA |
JuneAndGreen |
sm-crypto |
2026-01-22T02:05:43.426Z | 2026-01-22T15:58:10.585Z |
| CVE-2026-23964 |
6.5 (3.1)
|
Mastodon has insufficient access control to push notif… |
mastodon |
mastodon |
2026-01-22T01:55:29.904Z | 2026-01-22T17:02:23.614Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-23946 | Tendenci is an open source content management system built for non-profits, associations and cause-… | 2026-01-22T01:15:52.467 | 2026-01-22T01:15:52.467 |
| fkie_cve-2026-23893 | openCryptoki is a PKCS#11 library and provides tooling for Linux and AIX. Versions 2.3.2 and above … | 2026-01-22T01:15:52.310 | 2026-01-22T01:15:52.310 |
| fkie_cve-2025-27378 | AES contains a SQL injection vulnerability due to an inactive configuration that prevents the lates… | 2026-01-22T01:15:51.077 | 2026-01-22T01:15:51.077 |
| fkie_cve-2025-27377 | Altium Designer version 24.9.0 does not validate self-signed server certificates for cloud connecti… | 2026-01-22T01:15:50.510 | 2026-01-22T01:15:50.510 |
| fkie_cve-2026-23887 | Group-Office is an enterprise customer relationship management and groupware tool. In versions 6.8.… | 2026-01-22T00:15:51.930 | 2026-01-22T00:15:51.930 |
| fkie_cve-2026-23873 | hustoj is an open source online judge based on PHP/C++/MySQL/Linux for ACM/ICPC and NOIP training. … | 2026-01-22T00:15:51.770 | 2026-01-22T00:15:51.770 |
| fkie_cve-2026-1036 | The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to un… | 2026-01-22T00:15:51.490 | 2026-01-22T00:15:51.490 |
| fkie_cve-2026-24048 | Backstage is an open framework for building developer portals, and @backstage/backend-defaults prov… | 2026-01-21T23:15:53.580 | 2026-01-21T23:15:53.580 |
| fkie_cve-2026-24047 | Backstage is an open framework for building developer portals, and @backstage/cli-common provides c… | 2026-01-21T23:15:53.407 | 2026-01-21T23:15:53.407 |
| fkie_cve-2026-24046 | Backstage is an open framework for building developer portals. Multiple Scaffolder actions and arch… | 2026-01-21T23:15:53.240 | 2026-01-21T23:15:53.240 |
| fkie_cve-2026-23996 | FastAPI Api Key provides a backend-agnostic library that provides an API key system. Version 1.1.0 … | 2026-01-21T23:15:53.090 | 2026-01-21T23:15:53.090 |
| fkie_cve-2026-23990 | The Flux Operator is a Kubernetes CRD controller that manages the lifecycle of CNCF Flux CD and the… | 2026-01-21T23:15:52.930 | 2026-01-21T23:15:52.930 |
| fkie_cve-2026-23986 | Copier is a library and CLI app for rendering project templates. Prior to version 9.11.2, Copier su… | 2026-01-21T23:15:52.793 | 2026-01-21T23:15:52.793 |
| fkie_cve-2026-23968 | Copier is a library and CLI app for rendering project templates. Prior to version 9.11.2, Copier su… | 2026-01-21T23:15:52.637 | 2026-01-21T23:15:52.637 |
| fkie_cve-2026-23737 | seroval facilitates JS value stringification, including complex structures beyond JSON.stringify ca… | 2026-01-21T23:15:52.493 | 2026-01-21T23:15:52.493 |
| fkie_cve-2026-23736 | seroval facilitates JS value stringification, including complex structures beyond JSON.stringify ca… | 2026-01-21T23:15:52.340 | 2026-01-21T23:15:52.340 |
| fkie_cve-2026-23630 | Docmost is open-source collaborative wiki and documentation software. In versions 0.3.0 through 0.2… | 2026-01-21T23:15:52.187 | 2026-01-21T23:15:52.187 |
| fkie_cve-2026-1181 | Altium 365 workspace endpoints were configured with an overly permissive Cross-Origin Resource Shar… | 2026-01-19T13:16:20.543 | 2026-01-21T23:15:52.023 |
| fkie_cve-2021-47765 | AbsoluteTelnet 11.24 contains a denial of service vulnerability that allows local attackers to cras… | 2026-01-15T16:16:07.830 | 2026-01-21T22:28:45.453 |
| fkie_cve-2021-47764 | AbsoluteTelnet 11.24 contains a denial of service vulnerability that allows local attackers to cras… | 2026-01-15T16:16:07.663 | 2026-01-21T22:28:22.887 |
| fkie_cve-2021-47769 | Isshue Shopping Cart 3.5 contains a persistent cross-site scripting vulnerability in title input fi… | 2026-01-15T16:16:08.507 | 2026-01-21T22:26:53.110 |
| fkie_cve-2023-53894 | phpfm 1.7.9 contains an authentication bypass vulnerability that allows attackers to log in by expl… | 2025-12-16T17:16:01.550 | 2026-01-21T22:26:08.933 |
| fkie_cve-2021-47780 | Macro Expert 4.7 contains an unquoted service path vulnerability that allows local users to potenti… | 2026-01-16T00:16:21.130 | 2026-01-21T22:24:18.603 |
| fkie_cve-2021-47805 | Disk Savvy 13.6.14 contains an unquoted service path vulnerability in its Windows service configura… | 2026-01-16T00:16:25.083 | 2026-01-21T22:23:23.300 |
| fkie_cve-2026-23960 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs o… | 2026-01-21T22:15:50.627 | 2026-01-21T22:15:50.627 |
| fkie_cve-2026-23526 | CVAT is an open source interactive video and image annotation tool for computer vision. In versions… | 2026-01-21T22:15:50.433 | 2026-01-21T22:15:50.433 |
| fkie_cve-2026-23524 | Laravel Reverb provides a real-time WebSocket communication backend for Laravel applications. In ve… | 2026-01-21T22:15:50.280 | 2026-01-21T22:15:50.280 |
| fkie_cve-2026-23518 | Fleet is open source device management software. In versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.… | 2026-01-21T22:15:50.140 | 2026-01-21T22:15:50.140 |
| fkie_cve-2026-23517 | Fleet is open source device management software. A broken access control issue in versions prior to… | 2026-01-21T22:15:49.997 | 2026-01-21T22:15:49.997 |
| fkie_cve-2026-23516 | CVAT is an open source interactive video and image annotation tool for computer vision. In versions… | 2026-01-21T22:15:49.850 | 2026-01-21T22:15:49.850 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-f4fv-h3x5-8339 |
|
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix NULL d… | 2026-01-21T09:31:30Z | 2026-01-21T09:31:30Z |
| ghsa-qhwv-3xrq-pjmj |
|
Rejected reason: Not used | 2026-01-21T06:31:20Z | 2026-01-21T06:31:20Z |
| ghsa-x439-wrmp-cj57 |
|
Rejected reason: Not used | 2026-01-21T06:31:19Z | 2026-01-21T06:31:19Z |
| ghsa-qgv7-gqp9-gvmf |
|
Rejected reason: Not used | 2026-01-21T06:31:19Z | 2026-01-21T06:31:19Z |
| ghsa-g25j-v4g6-r93j |
|
Rejected reason: Not used | 2026-01-21T06:31:19Z | 2026-01-21T06:31:19Z |
| ghsa-8jcf-mmqr-2rq2 |
|
Rejected reason: Not used | 2026-01-21T06:31:19Z | 2026-01-21T06:31:19Z |
| ghsa-2rmv-mx4c-h2wv |
|
Rejected reason: Not used | 2026-01-21T06:31:19Z | 2026-01-21T06:31:19Z |
| ghsa-284g-mwvh-9gpr |
|
Rejected reason: Not used | 2026-01-21T06:31:19Z | 2026-01-21T06:31:19Z |
| ghsa-8239-4cq6-qmwc |
9.8 (3.1)
|
utility.c in telnetd in netkit telnet through 0.17 allows remote attackers to execute arbitrary cod… | 2022-05-24T17:10:20Z | 2026-01-21T03:30:20Z |
| ghsa-2q9f-33q6-9426 |
9.8 (3.1)
|
The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vuln… | 2026-01-21T03:30:20Z | 2026-01-21T03:30:20Z |
| ghsa-2g59-m95p-pgfq |
8.3 (4.0)
|
Chainlit contain a server-side request forgery (SSRF) vulnerability | 2026-01-20T00:30:28Z | 2026-01-21T01:07:02Z |
| ghsa-5vx3-wx4q-6cj8 |
6.5 (3.1)
|
ImageMagick has a NULL pointer dereference in MSL parser via <comment> tag before image load | 2026-01-21T01:06:51Z | 2026-01-21T01:06:51Z |
| ghsa-qp59-x883-77qv |
6.5 (3.1)
|
ImageMagick has a Memory Leak in LoadOpenCLDeviceBenchmark() when parsing malformed XML | 2026-01-21T01:06:34Z | 2026-01-21T01:06:34Z |
| ghsa-r6q2-hw4h-h46w |
8.8 (3.1)
|
Race Condition in node-tar Path Reservations via Unicode Ligature Collisions on macOS APFS | 2026-01-21T01:05:49Z | 2026-01-21T01:05:49Z |
| ghsa-9vj4-wc7r-p844 |
5.5 (3.1)
|
ImageMagick MSL: Stack overflow via infinite recursion in ProcessMSLScript | 2026-01-21T01:05:23Z | 2026-01-21T01:05:23Z |
| ghsa-mvpq-2v8x-ww6g |
5.3 (3.1)
|
Swift W3C TraceContext vulnerable to a malformed HTTP header causing a crash | 2026-01-21T01:05:09Z | 2026-01-21T01:05:09Z |
| ghsa-6vfr-p2hx-6v32 |
6.5 (3.1)
|
Apache Linkis: Password Exposure | 2026-01-19T09:30:28Z | 2026-01-21T01:03:28Z |
| ghsa-c399-q49h-qwc8 |
7.5 (3.1)
|
Apache Linkis: Arbitrary File Read via Double URL Encoding Bypass | 2026-01-19T09:30:27Z | 2026-01-21T01:03:19Z |
| ghsa-4h3h-63v6-88qx |
6.8 (4.0)
|
ESPHome vulnerable to denial-of-service via out-of-bounds check bypass in the API component | 2026-01-21T01:02:49Z | 2026-01-21T01:02:49Z |
| ghsa-pj88-9xww-gxmh |
5.3 (4.0)
|
Swing Music has a Directory Traversal & Filesystem can be accessed by a non-admin user | 2026-01-21T01:02:29Z | 2026-01-21T01:02:29Z |
| ghsa-43mm-m3h2-3prc |
5.3 (3.1)
|
File Browser Vulnerable to Username Enumeration via Timing Attack in /api/login | 2026-01-21T01:02:17Z | 2026-01-21T01:02:17Z |
| ghsa-cv54-7wv7-qxcw |
7.8 (4.0)
|
SiYuan vulnerable to Arbitrary file Read / SSRF | 2026-01-21T01:02:00Z | 2026-01-21T01:02:00Z |
| ghsa-94c7-g2fj-7682 |
8.3 (4.0)
|
SiYuan Vulnerable to Arbitrary File Read via File Copy Functionality | 2026-01-21T01:01:47Z | 2026-01-21T01:01:47Z |
| ghsa-6jxm-fv7w-rw5j |
5.8 (3.1)
|
Mailpit has a Server-Side Request Forgery (SSRF) via HTML Check API | 2026-01-21T01:01:26Z | 2026-01-21T01:01:26Z |
| ghsa-w836-5gpm-7r93 |
4.6 (3.1)
2.1 (4.0)
|
SiYuan has a Reflected Cross-Site Scripting (XSS) via /api/icon/getDynamicIcon | 2026-01-21T01:00:44Z | 2026-01-21T01:00:44Z |
| ghsa-xxf9-4c23-v3mw |
6.5 (3.1)
|
Vulnerability in the Oracle Life Sciences Central Coding product of Oracle Health Sciences Applicat… | 2026-01-21T00:31:43Z | 2026-01-21T00:31:43Z |
| ghsa-wwp8-q895-jwf7 |
4.5 (3.1)
|
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affe… | 2026-01-21T00:31:43Z | 2026-01-21T00:31:43Z |
| ghsa-w9mj-mcph-h88j |
7.1 (3.1)
|
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (c… | 2026-01-21T00:31:43Z | 2026-01-21T00:31:43Z |
| ghsa-vpg5-x373-3q2c |
5.3 (3.1)
|
Vulnerability in the Oracle Life Sciences Central Designer product of Oracle Health Sciences Applic… | 2026-01-21T00:31:43Z | 2026-01-21T00:31:43Z |
| ghsa-v93g-xvc7-hhc6 |
5.4 (3.1)
|
Vulnerability in the PeopleSoft Enterprise SCM Purchasing product of Oracle PeopleSoft (component: … | 2026-01-21T00:31:43Z | 2026-01-21T00:31:43Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2009-10 |
|
Unspecified vulnerability in the Zope Enterprise Objects (ZEO) storage-server functionali… | zodb3 | 2009-09-08T18:30:00Z | 2024-01-17T10:48:40.464440Z |
| pysec-2024-1 |
|
gratient is a user-facing library for generating color gradients of text. Version 0.5 con… | gratient | 2024-01-03T22:31:36+00:00 | |
| pysec-2023-235 |
7.5 (3.1)
|
An issue was discovered in Couchbase Server 7.2.0. There is a private key leak in debug.l… | couchbase | 2023-11-08T21:15:00Z | 2024-01-03T21:03:33.010228Z |
| pysec-2023-233 |
8.8 (3.1)
|
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif,… | exiv2 | 2023-11-06T18:15:00Z | 2024-01-02T15:20:59.435740Z |
| pysec-2021-877 |
7.5 (3.1)
|
An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a… | exiv2 | 2021-07-26T17:15:00Z | 2024-01-02T15:20:59.375619Z |
| pysec-2018-120 |
6.5 (3.1)
|
There is an infinite loop in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.… | exiv2 | 2018-12-12T10:29:00Z | 2024-01-02T15:20:59.318592Z |
| pysec-2018-119 |
6.5 (3.1)
|
There is a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header of jp2image.cp… | exiv2 | 2018-12-12T10:29:00Z | 2024-01-02T15:20:59.259575Z |
| pysec-2018-118 |
6.5 (3.1)
|
There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.… | exiv2 | 2018-12-12T10:29:00Z | 2024-01-02T15:20:59.201635Z |
| pysec-2018-117 |
6.5 (3.1)
|
There is a heap-based buffer over-read in the Exiv2::tEXtToDataBuf function of pngimage.c… | exiv2 | 2018-12-12T10:29:00Z | 2024-01-02T15:20:59.143416Z |
| pysec-2017-112 |
6.5 (3.1)
|
An issue was discovered in Exiv2 0.26. When the data structure of the structure ifd is in… | exiv2 | 2017-05-26T10:29:00Z | 2024-01-02T15:20:59.086141Z |
| pysec-2023-234 |
7.5 (3.1)
|
An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via w… | esptool | 2023-11-09T16:15:00Z | 2024-01-02T13:04:16.284694Z |
| pysec-2017-111 |
6.1 (3.1)
|
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to cros… | apache-atlas | 2017-08-29T20:29:00Z | 2023-12-01T23:23:55.638216Z |
| pysec-2017-110 |
7.5 (3.1)
|
Error responses from Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating included… | apache-atlas | 2017-08-29T20:29:00Z | 2023-12-01T23:23:55.587649Z |
| pysec-2017-109 |
6.1 (3.1)
|
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to Refl… | apache-atlas | 2017-08-29T20:29:00Z | 2023-12-01T23:23:55.536257Z |
| pysec-2017-108 |
6.1 (3.1)
|
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to DOM … | apache-atlas | 2017-08-29T20:29:00Z | 2023-12-01T23:23:55.465498Z |
| pysec-2017-107 |
6.1 (3.1)
|
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to Stor… | apache-atlas | 2017-08-29T20:29:00Z | 2023-12-01T23:23:55.413874Z |
| pysec-2017-106 |
6.1 (3.1)
|
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating use cookies that could be acc… | apache-atlas | 2017-08-29T20:29:00Z | 2023-12-01T23:23:55.361409Z |
| pysec-2017-105 |
7.5 (3.1)
|
Apache Atlas versions 0.6.0 (incubating), 0.7.0 (incubating), and 0.7.1 (incubating) allo… | apache-atlas | 2017-08-29T20:29:00Z | 2023-12-01T23:23:55.302348Z |
| pysec-2023-247 |
6.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Affected … | aiohttp | 2023-11-14T21:15:00+00:00 | 2023-11-22T23:23:57.631856+00:00 |
| pysec-2023-246 |
7.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP … | aiohttp | 2023-11-14T21:15:00+00:00 | 2023-11-22T23:23:57.547793+00:00 |
| pysec-2023-245 |
7.5 (3.1)
|
PyPinkSign v0.5.1 uses a non-random or static IV for Cipher Block Chaining (CBC) mode in … | pypinksign | 2023-11-16T18:15:00+00:00 | 2023-11-22T19:19:42.405614+00:00 |
| pysec-2023-244 |
|
Apache Software Foundation Apache Submarine has an SQL injection vulnerability when a use… | apache-submarine | 2023-11-22T10:15:00+00:00 | 2023-11-22T11:21:52.095543+00:00 |
| pysec-2023-242 |
7.4 (3.1)
|
Missing SSL certificate validation in HTTPie v3.2.2 allows attackers to eavesdrop on comm… | httpie | 2023-11-16T18:15:00+00:00 | 2023-11-22T02:43:48.390438+00:00 |
| pysec-2023-240 |
|
Apache Software Foundation Apache Submarine has a bug when serializing against yaml. The … | apache-submarine | 2023-11-20T09:15:00+00:00 | 2023-11-20T11:21:41.073991+00:00 |
| pysec-2023-239 |
6.8 (3.1)
|
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the remote end of an… | asyncssh | 2023-11-14T03:15:00+00:00 | 2023-11-20T09:25:38.326328+00:00 |
| pysec-2023-238 |
|
Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 t… | pyarrow | 2023-11-20T08:59:06.851388+00:00 | |
| pysec-2023-237 |
5.9 (3.1)
|
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the extension info m… | asyncssh | 2023-11-14T03:15:00+00:00 | 2023-11-17T17:27:01.919743+00:00 |
| pysec-2023-236 |
7.5 (3.1)
|
Remarshal prior to v0.17.1 expands YAML alias nodes unlimitedly, hence Remarshal is vulne… | remarshal | 2023-11-13T03:15:00+00:00 | 2023-11-16T20:25:23.801345+00:00 |
| pysec-2022-43065 |
5.5 (3.1)
|
GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFro… | gdal | 2022-01-01T01:15:00+00:00 | 2023-11-13T19:19:43.960137+00:00 |
| pysec-2019-241 |
9.8 (3.1)
|
GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp … | gdal | 2019-10-14T02:15:00+00:00 | 2023-11-13T19:19:43.892449+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33403 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.676678Z |
| gsd-2024-33402 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.651479Z |
| gsd-2024-33401 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.700617Z |
| gsd-2024-33400 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.665111Z |
| gsd-2024-33399 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.744940Z |
| gsd-2024-33398 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.647172Z |
| gsd-2024-33397 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.614589Z |
| gsd-2024-33396 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.615028Z |
| gsd-2024-33395 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.704229Z |
| gsd-2024-33394 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.712015Z |
| gsd-2024-33393 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.686503Z |
| gsd-2024-33392 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.736262Z |
| gsd-2024-33391 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.703996Z |
| gsd-2024-33390 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.752268Z |
| gsd-2024-33389 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.639989Z |
| gsd-2024-33388 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.663762Z |
| gsd-2024-33387 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.725919Z |
| gsd-2024-33386 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.757270Z |
| gsd-2024-33385 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.702499Z |
| gsd-2024-33384 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.651908Z |
| gsd-2024-33383 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.760137Z |
| gsd-2024-33382 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.713242Z |
| gsd-2024-33381 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.700809Z |
| gsd-2024-33380 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.743956Z |
| gsd-2024-33379 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.717530Z |
| gsd-2024-33378 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.733311Z |
| gsd-2024-33377 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.696373Z |
| gsd-2024-33376 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.759944Z |
| gsd-2024-33375 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.736057Z |
| gsd-2024-33374 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.632805Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-97 | Malicious code in robustinfer (PyPI) | 2026-01-06T18:26:17Z | 2026-01-06T18:26:17Z |
| MAL-2026-97 | Malicious code in robustinfer (PyPI) | 2026-01-06T18:26:17Z | 2026-01-06T18:26:17Z |
| mal-2025-192687 | Malicious code in commander-stable (npm) | 2025-12-22T13:11:06Z | 2026-01-06T14:25:37Z |
| MAL-2025-192687 | Malicious code in commander-stable (npm) | 2025-12-22T13:11:06Z | 2026-01-06T14:25:37Z |
| MAL-2026-96 | Malicious code in pycolorom (PyPI) | 2026-01-06T14:21:10Z | 2026-01-18T23:09:04Z |
| mal-2026-25 | Malicious code in usaa-authentication-mocks (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:35Z |
| mal-2026-24 | Malicious code in tickncook-robot (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:35Z |
| mal-2025-192951 | Malicious code in ugc-kit (npm) | 2025-12-27T17:21:21Z | 2026-01-06T03:48:35Z |
| MAL-2026-25 | Malicious code in usaa-authentication-mocks (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:35Z |
| MAL-2026-24 | Malicious code in tickncook-robot (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:35Z |
| MAL-2025-192951 | Malicious code in ugc-kit (npm) | 2025-12-27T17:21:21Z | 2026-01-06T03:48:35Z |
| mal-2026-21 | Malicious code in orchestration-node-common-errors (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:34Z |
| MAL-2026-21 | Malicious code in orchestration-node-common-errors (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:34Z |
| mal-2025-190574 | Malicious code in kc-next (npm) | 2025-11-19T00:28:04Z | 2026-01-06T03:48:33Z |
| MAL-2025-190574 | Malicious code in kc-next (npm) | 2025-11-19T00:28:04Z | 2026-01-06T03:48:33Z |
| mal-2026-18 | Malicious code in initializers (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:32Z |
| mal-2026-16 | Malicious code in fix-cc-raiesy (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:32Z |
| mal-2025-192959 | Malicious code in intl-tel-input-utils (npm) | 2025-12-29T15:00:48Z | 2026-01-06T03:48:32Z |
| mal-2025-192950 | Malicious code in ing-feat-ui-image (npm) | 2025-12-27T17:11:08Z | 2026-01-06T03:48:32Z |
| mal-2025-192949 | Malicious code in ing-feat-malware-detection (npm) | 2025-12-27T17:11:12Z | 2026-01-06T03:48:32Z |
| mal-2025-192934 | Malicious code in ing-feat-kyc-consent (npm) | 2025-12-25T18:55:12Z | 2026-01-06T03:48:32Z |
| mal-2025-192933 | Malicious code in ing-feat-auth-idin (npm) | 2025-12-25T18:54:53Z | 2026-01-06T03:48:32Z |
| mal-2025-190573 | Malicious code in gbiz-next (npm) | 2025-11-18T23:23:34Z | 2026-01-06T03:48:32Z |
| MAL-2026-18 | Malicious code in initializers (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:32Z |
| MAL-2026-16 | Malicious code in fix-cc-raiesy (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:32Z |
| MAL-2025-192959 | Malicious code in intl-tel-input-utils (npm) | 2025-12-29T15:00:48Z | 2026-01-06T03:48:32Z |
| MAL-2025-192950 | Malicious code in ing-feat-ui-image (npm) | 2025-12-27T17:11:08Z | 2026-01-06T03:48:32Z |
| MAL-2025-192949 | Malicious code in ing-feat-malware-detection (npm) | 2025-12-27T17:11:12Z | 2026-01-06T03:48:32Z |
| MAL-2025-192934 | Malicious code in ing-feat-kyc-consent (npm) | 2025-12-25T18:55:12Z | 2026-01-06T03:48:32Z |
| MAL-2025-192933 | Malicious code in ing-feat-auth-idin (npm) | 2025-12-25T18:54:53Z | 2026-01-06T03:48:32Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1461 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-03T22:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2025-0499 | Linux Kernel: Mehrere Schwachstellen | 2025-03-06T23:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2025-0477 | Android Patchday März 2025: Mehrere Schwachstellen | 2025-03-03T23:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2024-3710 | Red Hat Enterprise Linux (unbound und mpg123): Mehrere Schwachstellen | 2024-12-16T23:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2024-3570 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-12-01T23:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2024-2057 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service oder unspezifischer Angriff | 2024-09-04T22:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2024-1722 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-07-29T22:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2024-1451 | Linux Kernel: Mehrere Schwachstellen | 2024-06-25T22:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2024-1259 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifischen Angriff | 2024-05-30T22:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2023-1689 | Intel Prozessoren: Mehrere Schwachstellen | 2019-11-12T23:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2022-0049 | Linux Kernel: Mehrere Schwachstellen | 2022-01-10T23:00:00.000+00:00 | 2025-08-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1912 | Shibboleth Identity Provider: Schwachstelle ermöglicht Cross-Site Scripting | 2025-08-26T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1911 | ILIAS: Mehrere Schwachstellen | 2025-08-26T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1909 | Nagios Enterprises Nagios XI: Schwachstelle ermöglicht Cross-Site Scripting | 2025-08-26T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1908 | TeamViewer: Schwachstelle ermöglicht Manipulation von Dateien | 2025-08-25T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1907 | QNAP NAS (File Station 5): Mehrere Schwachstellen | 2025-08-25T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1903 | Microsoft GitHub Enterprise: Mehrere Schwachstellen | 2025-08-25T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1433 | Red Hat Enterprise Linux (python-setuptools): Schwachstelle ermöglicht Codeausführung | 2025-06-30T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1405 | FasterXML Jackson: Schwachstelle ermöglicht Denial of Service | 2025-06-25T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1349 | Citrix Systems ADC: Mehrere Schwachstellen | 2025-06-17T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1171 | GStreamer: Mehrere Schwachstellen | 2025-05-29T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-0461 | Linux Kernel: Mehrere Schwachstellen | 2025-02-27T23:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-0427 | Linux Kernel: Schwachstelle ermöglichen nicht spezifizierten Angriff | 2025-02-23T23:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-0320 | Apache Cassandra: Schwachstelle ermöglicht Privilegieneskalation | 2025-02-11T23:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2024-1474 | Red Hat OpenShift Container Platform: Mehrere Schwachstellen | 2024-06-27T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2023-3019 | HAProxy Enterprise: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-11-28T23:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1902 | D-LINK Router DI-7400G+ und DIR-650IN: Mehrere Schwachstellen | 2025-08-25T22:00:00.000+00:00 | 2025-08-25T22:00:00.000+00:00 |
| wid-sec-w-2025-1899 | OpenText Enterprise Security Manager: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-08-24T22:00:00.000+00:00 | 2025-08-25T22:00:00.000+00:00 |
| wid-sec-w-2025-1897 | vim: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-24T22:00:00.000+00:00 | 2025-08-25T22:00:00.000+00:00 |
| wid-sec-w-2025-1624 | Arista EOS: Mehrere Schwachstellen | 2025-07-22T22:00:00.000+00:00 | 2025-08-25T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0253 | Kwetsbaarheid verholpen in Adobe Photoshop | 2024-06-13T13:31:15.643260Z | 2024-06-13T13:31:15.643260Z |
| ncsc-2024-0252 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2024-06-11T18:23:19.082621Z | 2024-06-11T18:23:19.082621Z |
| ncsc-2024-0251 | Kwetsbaarheden verholpen in Microsoft Office | 2024-06-11T18:20:51.628241Z | 2024-06-11T18:20:51.628241Z |
| ncsc-2024-0250 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2024-06-11T18:18:10.131111Z | 2024-06-11T18:18:10.131111Z |
| ncsc-2024-0249 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-06-11T18:15:29.806897Z | 2024-06-11T18:15:29.806897Z |
| ncsc-2024-0248 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-06-11T18:06:57.087085Z | 2024-06-11T18:11:31.381556Z |
| ncsc-2024-0246 | Kwetsbaarheden verholpen in Siemens producten | 2024-06-11T13:29:25.912614Z | 2024-06-11T13:29:25.912614Z |
| ncsc-2024-0247 | Kwetsbaarheden verholpen in SAP producten | 2024-06-11T12:37:09.525507Z | 2024-06-11T12:37:09.525507Z |
| ncsc-2024-0245 | Kwetsbaarheden verholpen in Trend Micro Apex One | 2024-06-11T11:51:02.976099Z | 2024-06-11T11:51:02.976099Z |
| ncsc-2024-0244 | Kwetsbaarheden verholpen in Schneider Electric Sage RTU systemen | 2024-06-11T11:33:48.933251Z | 2024-06-11T11:33:48.933251Z |
| ncsc-2024-0232 | Kwetsbaarheden verholpen in Veeam Backup Enterprise Manager | 2024-05-22T11:42:48.155465Z | 2024-06-11T11:33:12.845658Z |
| ncsc-2024-0243 | Kwetsbaarheden verholpen in PHP | 2024-06-10T07:02:05.106950Z | 2024-06-10T07:02:05.106950Z |
| ncsc-2024-0242 | Kwetsbaarheden verholpen in RoundCube Webmail | 2024-06-07T11:01:13.397121Z | 2024-06-07T11:01:13.397121Z |
| ncsc-2024-0241 | Kwetsbaarheden verholpen in FortiNet FortiWebManager | 2024-06-07T07:22:27.233971Z | 2024-06-07T07:22:27.233971Z |
| ncsc-2024-0240 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-06-07T07:21:29.492650Z | 2024-06-07T07:21:29.492650Z |
| ncsc-2024-0239 | Kwetsbaarheden verholpen in Solarwinds Platform | 2024-06-07T06:26:01.172456Z | 2024-06-07T06:26:01.172456Z |
| ncsc-2024-0238 | Kwetsbaarheid verholpen in Check Point VPN producten | 2024-05-30T07:56:46.220112Z | 2024-05-30T07:56:46.220112Z |
| ncsc-2024-0237 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-05-27T11:26:30.888877Z | 2024-05-27T11:26:30.888877Z |
| ncsc-2024-0235 | Kwetsbaarheid verholpen in Google Chrome | 2024-05-27T07:10:26.268379Z | 2024-05-27T07:50:35.517237Z |
| ncsc-2024-0234 | Kwetsbaarheid verholpen in Github Enterprise Server | 2024-05-23T10:57:36.609416Z | 2024-05-23T10:57:36.609416Z |
| ncsc-2024-0233 | Kwetsbaarheden verholpen in Cisco producten | 2024-05-23T10:56:24.310012Z | 2024-05-23T10:56:24.310012Z |
| ncsc-2024-0231 | Kwetsbaarheden verholpen in Atlassian producten | 2024-05-22T11:13:07.693855Z | 2024-05-22T11:13:07.693855Z |
| ncsc-2024-0230 | Kwetsbaarheden verholpen in QNAP QTS en QTS Hero | 2024-05-22T08:02:19.922765Z | 2024-05-22T08:02:19.922765Z |
| ncsc-2024-0229 | Kwetsbaarheid verholpen in QlikSense Enterprise | 2024-05-22T05:33:44.910098Z | 2024-05-22T05:33:44.910098Z |
| ncsc-2024-0228 | Kwetsbaarheden verholpen in SAP producten | 2024-05-17T11:28:01.264255Z | 2024-05-17T11:28:01.264255Z |
| ncsc-2024-0227 | Kwetsbaarheden verholpen in Adobe Illustrator | 2024-05-16T12:59:04.595951Z | 2024-05-16T12:59:04.595951Z |
| ncsc-2024-0226 | Kwetsbaarheden verholpen in Adobe Animate | 2024-05-16T12:55:49.361352Z | 2024-05-16T12:55:49.361352Z |
| ncsc-2024-0225 | Kwetsbaarheden verholpen in Adobe FrameMaker | 2024-05-16T12:54:55.359838Z | 2024-05-16T12:54:55.359838Z |
| ncsc-2024-0224 | Kwetsbaarheid verholpen in Adobe Dreamweaver | 2024-05-16T12:45:03.866353Z | 2024-05-16T12:45:03.866353Z |
| ncsc-2024-0223 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2024-05-16T12:44:31.298431Z | 2024-05-16T12:44:31.298431Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-491621 | SSA-491621: Denial of Service Vulnerability in CPC80 Firmware of SICAM A8000 Devices | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-474231 | SSA-474231: File Parsing Vulnerability in Simcenter Femap before V2022.2 | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-439148 | SSA-439148: File Parsing Vulnerabilities in PADS Standard/Plus Viewer | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-433782 | SSA-433782: Improper Access Control Vulnerability in Mendix | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-414513 | SSA-414513: Information Disclosure Vulnerability in Mendix | 2022-04-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-348662 | SSA-348662: Multiple Vulnerabilities in SIMATIC MV500 Devices before V3.3 | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-111512 | SSA-111512: Client-side Authentication in SIMATIC WinCC OA | 2022-06-21T00:00:00Z | 2022-06-21T00:00:00Z |
| ssa-911567 | SSA-911567: Missing HTTP headers in SINEMA Remote Connect Server before V3.0 SP2 | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-740594 | SSA-740594: Privilege Escalation Vulnerability in Mendix SAML Module | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-693555 | SSA-693555: Memory Corruption Vulnerability in EN100 Ethernet Module | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-679335 | SSA-679335: Multiple Vulnerabilities in Embedded FTP Server of SIMATIC CP Modules | 2021-08-10T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-662649 | SSA-662649: Denial of Service Vulnerability in Desigo DXR and PXC Controllers | 2022-05-10T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-626968 | SSA-626968: Multiple Webserver Vulnerabilities in Desigo PXC and DXR Devices | 2022-05-10T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-535997 | SSA-535997: Cleartext Storage of Sensitive Information in Multiple SIMATIC Products | 2021-09-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-401167 | SSA-401167: Cross-site scripting Vulnerability in Teamcenter Active Workspace | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-388239 | SSA-388239: Default Password Leakage affecting the Component Shared HIS used in Spectrum Power Systems | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-330556 | SSA-330556: PwnKit Vulnerability in SCALANCE LPE9403 and SINUMERIK Edge Products (CVE-2021-4034) | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-301589 | SSA-301589: Multiple File Parsing Vulnerabilities in Solid Edge, JT2Go and Teamcenter Visualization | 2022-02-08T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-222547 | SSA-222547: Third-Party Component Vulnerabilities in SCALANCE LPE9403 before V2.0 | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-148078 | SSA-148078: Multiple Vulnerabilities in APOGEE/TALON Field Panels | 2017-10-12T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-145224 | SSA-145224: Vulnerability in OSPF Packet Handling of SCALANCE XM-400 and XR-500 Devices | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-787292 | SSA-787292: Denial of Service Vulnerability in SIMATIC RFID Readers | 2021-06-08T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-756638 | SSA-756638: Vulnerabilities in Third-Party Component Mbed TLS of LOGO! CMR Family and SIMATIC RTU 3000 Family | 2021-09-14T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-736385 | SSA-736385: Memory Corruption Vulnerability in OpenV2G | 2022-05-10T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-560465 | SSA-560465: DHCP Client Vulnerability in VxWorks-based Industrial Products | 2021-07-13T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-553086 | SSA-553086: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization | 2022-05-10T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-480937 | SSA-480937: Denial of Service Vulnerability in CP 44x-1 RNA before V1.5.18 | 2022-05-10T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-165073 | SSA-165073: Multiple Vulnerabilities in the Webinterface of SICAM P850 and SICAM P855 Devices | 2022-05-10T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-162616 | SSA-162616: File Parsing Vulnerabilities in Simcenter Femap before V2022.2 | 2022-05-10T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-114589 | SSA-114589: Multiple Vulnerabilities in Nucleus RTOS based APOGEE, TALON and Desigo PXC/PXM Products | 2021-11-09T00:00:00Z | 2022-05-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:8229 | Red Hat Security Advisory: OpenShift Container Platform 4.17.2 bug fix and security update | 2024-10-23T05:29:09+00:00 | 2026-01-22T16:45:05+00:00 |
| rhsa-2024:7179 | Red Hat Security Advisory: OpenShift Container Platform 4.15.35 bug fix and security update | 2024-10-02T05:49:45+00:00 | 2026-01-22T16:45:05+00:00 |
| rhsa-2024:6687 | Red Hat Security Advisory: OpenShift Container Platform 4.16.13 bug fix and security update | 2024-09-19T05:38:53+00:00 | 2026-01-22T16:45:04+00:00 |
| rhsa-2024:6209 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.10 security update | 2024-09-03T10:04:55+00:00 | 2026-01-22T16:45:04+00:00 |
| rhsa-2024:4484 | Red Hat Security Advisory: OpenShift Container Platform 4.13.45 bug fix and security update | 2024-07-17T01:35:44+00:00 | 2026-01-22T16:45:03+00:00 |
| rhsa-2024:4455 | Red Hat Security Advisory: OpenShift Virtualization 4.16.0 Images security update | 2024-07-10T12:40:58+00:00 | 2026-01-22T16:45:03+00:00 |
| rhsa-2024:3523 | Red Hat Security Advisory: OpenShift Container Platform 4.14.28 bug fix and security update | 2024-06-10T16:08:16+00:00 | 2026-01-22T16:45:01+00:00 |
| rhsa-2024:4041 | Red Hat Security Advisory: OpenShift Container Platform 4.15.19 bug fix and security update | 2024-06-26T12:05:41+00:00 | 2026-01-22T16:45:00+00:00 |
| rhsa-2024:4010 | Red Hat Security Advisory: OpenShift Container Platform 4.14.31 security update | 2024-06-26T02:06:07+00:00 | 2026-01-22T16:44:59+00:00 |
| rhsa-2024:4006 | Red Hat Security Advisory: OpenShift Container Platform 4.12.60 bug fix and security update | 2024-06-27T02:11:24+00:00 | 2026-01-22T16:44:59+00:00 |
| rhsa-2024:3718 | Red Hat Security Advisory: OpenShift Container Platform 4.17.0 bug fix and security update | 2024-10-01T17:30:03+00:00 | 2026-01-22T16:44:58+00:00 |
| rhsa-2024:3351 | Red Hat Security Advisory: OpenShift Container Platform 4.12.58 security update | 2024-05-30T04:16:04+00:00 | 2026-01-22T16:44:56+00:00 |
| rhsa-2024:3349 | Red Hat Security Advisory: OpenShift Container Platform 4.12.58 security update | 2024-05-30T03:55:17+00:00 | 2026-01-22T16:44:56+00:00 |
| rhsa-2024:3327 | Red Hat Security Advisory: OpenShift Container Platform 4.15.15 security update | 2024-05-29T15:40:21+00:00 | 2026-01-22T16:44:56+00:00 |
| rhsa-2024:2875 | Red Hat Security Advisory: OpenShift Container Platform 4.13.42 bug fix and security update | 2024-05-23T18:10:59+00:00 | 2026-01-22T16:44:56+00:00 |
| rhsa-2024:3254 | Red Hat Security Advisory: container-tools:rhel8 security update | 2024-05-22T11:48:26+00:00 | 2026-01-22T16:44:55+00:00 |
| rhsa-2024:2877 | Red Hat Security Advisory: OpenShift Container Platform 4.13.42 packages and security update | 2024-05-23T20:46:21+00:00 | 2026-01-22T16:44:54+00:00 |
| rhsa-2024:2869 | Red Hat Security Advisory: OpenShift Container Platform 4.14.26 security update | 2024-05-23T08:24:44+00:00 | 2026-01-22T16:44:52+00:00 |
| rhsa-2024:2784 | Red Hat Security Advisory: OpenShift Container Platform 4.12.57 security update | 2024-05-16T18:36:22+00:00 | 2026-01-22T16:44:52+00:00 |
| rhsa-2024:2776 | Red Hat Security Advisory: OpenShift Container Platform 4.15.13 packages and security update | 2024-05-15T19:05:25+00:00 | 2026-01-22T16:44:51+00:00 |
| rhsa-2024:2672 | Red Hat Security Advisory: OpenShift Container Platform 4.14.24 packages and security update | 2024-05-09T17:18:03+00:00 | 2026-01-22T16:44:51+00:00 |
| rhsa-2024:2669 | Red Hat Security Advisory: OpenShift Container Platform 4.15.12 security update | 2024-05-09T14:16:07+00:00 | 2026-01-22T16:44:50+00:00 |
| rhsa-2024:2639 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.15 security and bug fix update | 2024-05-01T02:44:36+00:00 | 2026-01-22T16:44:48+00:00 |
| rhsa-2024:2549 | Red Hat Security Advisory: skopeo security and bug fix update | 2024-04-30T13:36:46+00:00 | 2026-01-22T16:44:48+00:00 |
| rhsa-2024:2071 | Red Hat Security Advisory: OpenShift Container Platform 4.15.11 packages and security update | 2024-05-02T14:53:59+00:00 | 2026-01-22T16:44:47+00:00 |
| rhsa-2024:2054 | Red Hat Security Advisory: OpenShift Container Platform 4.14.23 security update | 2024-05-02T15:57:53+00:00 | 2026-01-22T16:44:47+00:00 |
| rhsa-2024:2049 | Red Hat Security Advisory: OpenShift Container Platform 4.13.41 packages and security update | 2024-05-02T17:02:00+00:00 | 2026-01-22T16:44:46+00:00 |
| rhsa-2024:1946 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.1 security update | 2024-04-22T12:47:08+00:00 | 2026-01-22T16:44:46+00:00 |
| rhsa-2024:1574 | Red Hat Security Advisory: OpenShift Container Platform 4.12.54 packages and security update | 2024-04-03T07:42:00+00:00 | 2026-01-22T16:44:42+00:00 |
| rhsa-2024:1567 | Red Hat Security Advisory: OpenShift Container Platform 4.14.19 security update | 2024-04-03T16:05:37+00:00 | 2026-01-22T16:44:42+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-15-062-01 | MICROSYS PROMOTIC Stack Buffer Overflow | 2015-12-04T07:00:00.000000Z | 2025-06-06T22:35:46.482417Z |
| icsa-15-057-01 | Network Vision IntraVue Code Injection Vulnerability | 2015-11-29T07:00:00.000000Z | 2025-06-06T22:35:40.053299Z |
| icsa-15-055-03 | Schneider Electric Invensys Positioner Buffer Overflow Vulnerability | 2015-11-27T07:00:00.000000Z | 2025-06-06T22:35:33.492544Z |
| icsa-15-055-02 | Kepware Resource Exhaustion Vulnerability | 2015-11-27T07:00:00.000000Z | 2025-06-06T22:35:27.000975Z |
| icsa-15-055-01 | Software Toolbox Top Server Resource Exhaustion Vulnerability | 2015-11-27T07:00:00.000000Z | 2025-06-06T22:35:20.530492Z |
| icsa-15-050-01a | Siemens SIMATIC STEP 7 TIA Portal Vulnerabilities (Update A) | 2015-11-22T07:00:00.000000Z | 2025-06-06T22:35:07.394617Z |
| icsa-15-048-03 | Yokogawa HART Device DTM Vulnerability | 2015-11-20T07:00:00.000000Z | 2025-06-06T22:35:00.882056Z |
| icsa-15-048-02 | Siemens SIMATIC WinCC TIA Portal Vulnerabilities | 2015-11-20T07:00:00.000000Z | 2025-06-06T22:34:47.839959Z |
| icsa-15-048-01 | Siemens SIMATIC STEP 7 TIA Portal Vulnerabilities | 2015-11-20T07:00:00.000000Z | 2025-06-06T22:34:34.894563Z |
| icsa-15-041-02 | GE Hydran M2 Predictable TCP Initial Sequence Vulnerability | 2015-11-13T07:00:00.000000Z | 2025-06-06T22:34:28.440832Z |
| icsa-15-036-02 | Pepperl+Fuchs Hart Device DTM Vulnerability | 2015-11-08T07:00:00.000000Z | 2025-06-06T22:34:21.972701Z |
| icsa-15-036-01a | GE and MACTek HART Device DTM Vulnerability (Update A) | 2015-11-08T07:00:00.000000Z | 2025-06-06T22:34:15.524601Z |
| icsa-15-034-02 | Siemens Ruggedcom WIN Vulnerability | 2015-11-06T07:00:00.000000Z | 2025-06-06T22:33:56.150269Z |
| icsa-15-029-01 | Honeywell HART DTM Vulnerability | 2015-11-01T06:00:00.000000Z | 2025-06-06T22:33:43.213614Z |
| icsa-15-027-01 | Magnetrol HART DTM Vulnerability | 2015-10-30T06:00:00.000000Z | 2025-06-06T22:33:36.757982Z |
| icsa-15-022-01 | Siemens SIMATIC S7-1200 CPU Web Vulnerability | 2015-10-25T06:00:00.000000Z | 2025-06-06T22:33:30.307653Z |
| icsa-15-020-02 | Schneider Electric ETG3000 FactoryCast HMI Gateway Vulnerabilities | 2015-10-23T06:00:00.000000Z | 2025-06-06T22:33:17.373978Z |
| icsa-15-020-01 | Siemens SCALANCE X-300/X408 Switch Family DOS Vulnerabilities | 2015-10-23T06:00:00.000000Z | 2025-06-06T22:33:04.402280Z |
| icsa-15-013-04a | GE Multilink Switch Vulnerabilities (Update A) | 2015-10-16T06:00:00.000000Z | 2025-06-06T22:32:44.963520Z |
| icsa-15-013-03 | Phoenix Contact Software ProConOs and MultiProg Authentication Vulnerability | 2015-10-16T06:00:00.000000Z | 2025-06-06T22:32:38.508014Z |
| icsa-15-013-02 | Clorius Controls A/S ISC SCADA Insecure Java Client Web Authentication | 2015-10-16T06:00:00.000000Z | 2025-06-06T22:32:32.033557Z |
| icsa-15-013-01 | Siemens SIMATIC WinCC Sm@rtClient iOS Application Authentication Vulnerabilities | 2015-10-16T06:00:00.000000Z | 2025-06-06T22:32:12.568337Z |
| icsa-15-012-01c | CodeWrights GmbH HART Device DTM Vulnerability (Update C) | 2015-10-15T06:00:00.000000Z | 2025-06-06T22:32:06.053252Z |
| icsa-15-012-01b | CodeWrights GmbH HART DTM Vulnerability (Update B) | 2015-10-15T06:00:00.000000Z | 2025-06-06T22:31:59.580273Z |
| icsa-15-012-01a | CodeWrights GmbH HART DTM Vulnerability (Update A) | 2015-10-15T06:00:00.000000Z | 2025-06-06T22:31:53.116696Z |
| icsa-15-012-01 | CodeWrights GmbH HART DTM Vulnerability | 2015-10-15T06:00:00.000000Z | 2025-06-06T22:31:46.333944Z |
| icsa-12-129-01 | WellinTech KingSCADA Insecure Password Encryption | 2012-02-09T07:00:00.000000Z | 2025-06-06T21:45:26.636405Z |
| icsa-12-122-01 | WellinTech KingView DLL Hijack Vulnerability | 2012-02-02T07:00:00.000000Z | 2025-06-06T21:45:20.208792Z |
| icsa-12-102-05 | Siemens Scalance S Multiple Security Vulnerabilities | 2012-01-13T07:00:00.000000Z | 2025-06-06T21:45:13.758298Z |
| icsa-12-102-04 | Siemens Scalance X Buffer Overflow Vulnerability | 2012-01-13T07:00:00.000000Z | 2025-06-06T21:45:07.306451Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-nso-priv-esc-xxqrttft | Cisco Network Services Orchestrator CLI Secure Shell Server Privilege Escalation Vulnerability | 2021-08-04T16:00:00+00:00 | 2023-10-25T16:01:08+00:00 |
| cisco-sa-nso-priv-esc-XXqRtTfT | Cisco Network Services Orchestrator CLI Secure Shell Server Privilege Escalation Vulnerability | 2021-08-04T16:00:00+00:00 | 2023-10-25T16:01:08+00:00 |
| cisco-sa-iosxe-webcmdinjsh-ufjxtgzd | Cisco IOS XE Software Web UI Command Injection Vulnerability | 2021-03-24T16:00:00+00:00 | 2023-10-23T18:22:23+00:00 |
| cisco-sa-iosxe-webcmdinjsh-UFJxTgZD | Cisco IOS XE Software Web UI Command Injection Vulnerability | 2021-03-24T16:00:00+00:00 | 2023-10-23T18:22:23+00:00 |
| cisco-sa-sdwan-lfi-owlbkuge | Cisco Catalyst SD-WAN Manager Local File Inclusion Vulnerability | 2023-10-18T16:00:00+00:00 | 2023-10-18T16:00:00+00:00 |
| cisco-sa-sdwan-lfi-OWLbKUGe | Cisco Catalyst SD-WAN Manager Local File Inclusion Vulnerability | 2023-10-18T16:00:00+00:00 | 2023-10-18T16:00:00+00:00 |
| cisco-sa-aaascp-tyj4fejm | Cisco IOS and IOS XE Software Command Authorization Bypass Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-10-13T13:36:50+00:00 |
| cisco-sa-aaascp-Tyj4fEJm | Cisco IOS and IOS XE Software Command Authorization Bypass Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-10-13T13:36:50+00:00 |
| cisco-sa-asaftd-ravpn-auth-8lyfckec | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access VPN Unauthorized Access Vulnerability | 2023-09-06T16:00:00+00:00 | 2023-10-11T14:59:29+00:00 |
| cisco-sa-asaftd-ravpn-auth-8LyfCkeC | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access VPN Unauthorized Access Vulnerability | 2023-09-06T16:00:00+00:00 | 2023-10-11T14:59:29+00:00 |
| cisco-sa-confd-priv-esc-lsgtcrx4 | ConfD CLI Secure Shell Server Privilege Escalation Vulnerability | 2021-08-04T16:00:00+00:00 | 2023-10-04T16:00:12+00:00 |
| cisco-sa-confd-priv-esc-LsGtCRx4 | ConfD CLI Secure Shell Server Privilege Escalation Vulnerability | 2021-08-04T16:00:00+00:00 | 2023-10-04T16:00:12+00:00 |
| cisco-sa-rdocker-uatbukkn | Cisco IOx Application Hosting Environment Privilege Escalation Vulnerability | 2023-10-04T16:00:00+00:00 | 2023-10-04T16:00:00+00:00 |
| cisco-sa-rdocker-uATbukKn | Cisco IOx Application Hosting Environment Privilege Escalation Vulnerability | 2023-10-04T16:00:00+00:00 | 2023-10-04T16:00:00+00:00 |
| cisco-sa-cucm-apidos-PGsDcdNF | Multiple Cisco Unified Communications Products Unauthenticated API High CPU Utilization Denial of Service Vulnerability | 2023-10-04T16:00:00+00:00 | 2024-05-17T15:07:50+00:00 |
| cisco-sa-cer-priv-esc-b9t3hqk9 | Cisco Emergency Responder Static Credentials Vulnerability | 2023-10-04T16:00:00+00:00 | 2023-10-04T16:00:00+00:00 |
| cisco-sa-cer-priv-esc-B9t3hqk9 | Cisco Emergency Responder Static Credentials Vulnerability | 2023-10-04T16:00:00+00:00 | 2023-10-04T16:00:00+00:00 |
| cisco-sa-wlc-wncd-hfgmsfsd | Cisco IOS XE Software for Wireless LAN Controllers Wireless Network Control Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-wlc-wncd-HFGMsfSD | Cisco IOS XE Software for Wireless LAN Controllers Wireless Network Control Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-webui-cmdij-fzzaexay | Cisco IOS XE Software Web UI Command Injection Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-webui-cmdij-FzZAeXAy | Cisco IOS XE Software Web UI Command Injection Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-vmanage-html-3zkh8d6x | Cisco Catalyst SD-WAN Manager Web UI HTML Injection Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-vmanage-html-3ZKh8d6x | Cisco Catalyst SD-WAN Manager Web UI HTML Injection Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-mlre-h93fswrz | Cisco IOS XE Software for ASR 1000 Series Aggregation Services Routers IPv6 Multicast Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-mlre-H93FswRz | Cisco IOS XE Software for ASR 1000 Series Aggregation Services Routers IPv6 Multicast Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-ios-xe-l2tp-dos-eb5tufmv | Cisco IOS XE Software Layer 2 Tunneling Protocol Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-ios-xe-l2tp-dos-eB5tuFmV | Cisco IOS XE Software Layer 2 Tunneling Protocol Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-getvpn-rce-g8qr68sx | Cisco IOS and IOS XE Software Cisco Group Encrypted Transport VPN Software Out-of-Bounds Write Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-getvpn-rce-g8qR68sx | Cisco IOS and IOS XE Software Cisco Group Encrypted Transport VPN Software Out-of-Bounds Write Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-dnac-ins-acc-con-nhavdrbz | Cisco DNA Center API Insufficient Access Control Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-40337 | net: stmmac: Correctly handle Rx checksum offload errors | 2025-12-02T00:00:00.000Z | 2025-12-16T14:40:54.000Z |
| msrc_cve-2025-40333 | f2fs: fix infinite loop in __insert_extent_tree() | 2025-12-02T00:00:00.000Z | 2025-12-16T14:40:47.000Z |
| msrc_cve-2025-40329 | drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb | 2025-12-02T00:00:00.000Z | 2025-12-16T14:40:41.000Z |
| msrc_cve-2025-40342 | nvme-fc: use lock accessing port_state and rport state | 2025-12-02T00:00:00.000Z | 2025-12-16T14:40:34.000Z |
| msrc_cve-2025-40328 | smb: client: fix potential UAF in smb2_close_cached_fid() | 2025-12-02T00:00:00.000Z | 2025-12-16T14:40:28.000Z |
| msrc_cve-2025-40331 | sctp: Prevent TOCTOU out-of-bounds write | 2025-12-02T00:00:00.000Z | 2025-12-16T14:40:22.000Z |
| msrc_cve-2025-40343 | nvmet-fc: avoid scheduling association deletion twice | 2025-12-02T00:00:00.000Z | 2025-12-16T14:40:15.000Z |
| msrc_cve-2025-40341 | futex: Don't leak robust_list pointer on exec race | 2025-12-02T00:00:00.000Z | 2025-12-16T14:40:09.000Z |
| msrc_cve-2025-40324 | NFSD: Fix crash in nfsd4_read_release() | 2025-12-02T00:00:00.000Z | 2025-12-16T14:40:02.000Z |
| msrc_cve-2025-40303 | btrfs: ensure no dirty metadata is written back for an fs with errors | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:56.000Z |
| msrc_cve-2025-40297 | net: bridge: fix use-after-free due to MST port state bypass | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:49.000Z |
| msrc_cve-2025-40322 | fbdev: bitblit: bound-check glyph index in bit_putcs* | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:43.000Z |
| msrc_cve-2025-40311 | accel/habanalabs: support mapping cb with vmalloc-backed coherent memory | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:36.000Z |
| msrc_cve-2025-40323 | fbcon: Set fb_display[i]->mode to NULL when the mode is released | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:30.000Z |
| msrc_cve-2025-40310 | amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:23.000Z |
| msrc_cve-2025-40294 | Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:17.000Z |
| msrc_cve-2025-40304 | fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:10.000Z |
| msrc_cve-2025-40301 | Bluetooth: hci_event: validate skb length for unknown CC opcode | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:04.000Z |
| msrc_cve-2025-40321 | wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:58.000Z |
| msrc_cve-2025-40319 | bpf: Sync pending IRQ work before freeing ring buffer | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:51.000Z |
| msrc_cve-2025-40292 | virtio-net: fix received length check in big packets | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:45.000Z |
| msrc_cve-2025-40308 | Bluetooth: bcsp: receive data only if registered | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:38.000Z |
| msrc_cve-2025-40269 | ALSA: usb-audio: Fix potential overflow of PCM transfer buffer | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:32.000Z |
| msrc_cve-2025-40281 | sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:25.000Z |
| msrc_cve-2025-40280 | tipc: Fix use-after-free in tipc_mon_reinit_self(). | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:19.000Z |
| msrc_cve-2025-40277 | drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:13.000Z |
| msrc_cve-2025-40273 | NFSD: free copynotify stateid in nfs4_free_ol_stateid() | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:06.000Z |
| msrc_cve-2025-40282 | Bluetooth: 6lowpan: reset link-local header on ipv6 recv path | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:00.000Z |
| msrc_cve-2025-40279 | net: sched: act_connmark: initialize struct tc_ife to fix kernel leak | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:53.000Z |
| msrc_cve-2025-40283 | Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:47.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201912-0503 | An API issue existed in the handling of microphone data. This issue was addressed with im… | 2024-07-23T20:53:56.784000Z |
| var-201110-0332 | Integer signedness error in Apple QuickTime before 7.7.1 allows remote attackers to execu… | 2024-07-23T20:53:56.368000Z |
| var-200909-0782 | Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, a… | 2024-07-23T20:53:20.038000Z |
| var-202105-0257 | An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and… | 2024-07-23T20:53:19.006000Z |
| var-201808-0958 | Systems with microprocessors utilizing speculative execution and address translations may… | 2024-07-23T20:53:19.085000Z |
| var-201404-0008 | Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, whe… | 2024-07-23T20:53:19.246000Z |
| var-201206-0117 | Multiple integer overflows in libxml2, as used in Google Chrome before 20.0.1132.43 and o… | 2024-07-23T20:53:19.963000Z |
| var-202108-2087 | A logic issue was addressed with improved restrictions. This issue is fixed in macOS Mont… | 2024-07-23T20:53:17.541000Z |
| var-200608-0033 | The dynamic linker (dyld) in Apple Mac OS X 10.4.7 allows local users to execute arbitrar… | 2024-07-23T20:53:01.636000Z |
| var-201904-1352 | A type confusion issue was addressed with improved memory handling. This issue affected v… | 2024-07-23T20:52:25.320000Z |
| var-201404-0381 | Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 an… | 2024-07-23T20:52:24.783000Z |
| var-201804-1214 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T20:51:44.833000Z |
| var-201702-0870 | An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari … | 2024-07-23T20:51:43.794000Z |
| var-202202-0050 | xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, … | 2024-07-23T20:51:28.738000Z |
| var-200707-0675 | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5… | 2024-07-23T20:51:26.313000Z |
| var-200607-0664 | Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to … | 2024-07-23T20:51:25.312000Z |
| var-201707-1192 | An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari … | 2024-07-23T20:51:22.759000Z |
| var-201310-0613 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, J… | 2024-07-23T20:51:22.839000Z |
| var-200808-0011 | Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when … | 2024-07-23T20:51:12.284000Z |
| var-200412-0902 | Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 a… | 2024-07-23T20:51:12.187000Z |
| var-202204-0593 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle … | 2024-07-23T20:51:10.729000Z |
| var-201912-0574 | An out-of-bounds read was addressed with improved input validation. plural Apple The prod… | 2024-07-23T20:51:09.117000Z |
| var-202006-1806 | regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression… | 2024-07-23T20:51:08.679000Z |
| var-201205-0297 | The Linux kernel before 3.3.1, when KVM is used, allows guest OS users to cause a denial … | 2024-07-23T20:51:08.752000Z |
| var-201609-0597 | The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other pr… | 2024-07-23T20:50:53.381000Z |
| var-201605-0079 | The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation … | 2024-07-23T20:50:53.695000Z |
| var-200908-0708 | Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Po… | 2024-07-23T20:50:52.900000Z |
| var-202103-0218 | A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can … | 2024-07-23T20:50:49.281000Z |
| var-201501-0340 | Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0… | 2024-07-23T20:50:41.225000Z |
| var-202109-1790 | A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when … | 2024-07-23T20:50:39.175000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-003771 | File and Directory Permissions Vulnerability in JP1/Performance Management | 2023-10-04T15:23+09:00 | 2023-10-04T15:23+09:00 |
| jvndb-2023-003764 | Multiple vulnerabilities in Panasonic KW Watcher | 2023-09-27T14:44+09:00 | 2023-09-27T14:44+09:00 |
| jvndb-2023-003592 | Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software | 2023-09-13T15:02+09:00 | 2023-09-13T15:02+09:00 |
| jvndb-2023-003023 | Vulnerability in HiRDB | 2023-08-29T15:55+09:00 | 2023-09-06T15:45+09:00 |
| jvndb-2023-003335 | Vulnerability in JP1/VERITAS | 2023-09-06T15:35+09:00 | 2023-09-06T15:35+09:00 |
| jvndb-2023-000092 | "direct" Desktop App for macOS fails to restrict access permissions | 2023-09-06T14:33+09:00 | 2023-09-06T14:33+09:00 |
| jvndb-2023-000090 | Multiple vulnerabilities in CGIs of PMailServer and PMailServer2 | 2023-09-05T14:55+09:00 | 2023-09-05T14:55+09:00 |
| jvndb-2023-002787 | OMRON CJ series and CS/CJ Series EtherNet/IT unit vulnerable to Denial-of-Service (DoS) | 2023-08-03T13:45+09:00 | 2023-08-03T13:45+09:00 |
| jvndb-2023-002510 | Multiple Vulnerabilities in Hitachi Device Manager | 2023-07-19T14:48+09:00 | 2023-07-19T14:48+09:00 |
| jvndb-2023-000065 | Multiple vulnerabilities in WAVLINK WL-WN531AX2 | 2023-06-27T16:50+09:00 | 2023-06-27T16:50+09:00 |
| jvndb-2023-000063 | Multiple vulnerabilities in Panasonic AiSEG2 | 2023-06-16T14:05+09:00 | 2023-06-16T14:05+09:00 |
| jvndb-2023-000054 | Wacom Tablet Driver installer for macOS vulnerable to improper link resolution before file access | 2023-05-25T13:40+09:00 | 2023-05-25T13:40+09:00 |
| jvndb-2023-001894 | Android App "Brother iPrint&Scan" vulnerable to improper access control | 2023-05-19T15:40+09:00 | 2023-05-19T15:40+09:00 |
| jvndb-2023-001852 | OS command injection vulnerability in Inaba Denki Sangyo Wi-Fi AP UNIT | 2023-05-17T15:09+09:00 | 2023-05-17T15:09+09:00 |
| jvndb-2023-000036 | API server of TONE Family vulnerable to authentication bypass using an alternate path | 2023-04-17T14:04+09:00 | 2023-04-17T14:04+09:00 |
| jvndb-2023-001492 | Vulnerability in JP1/VERITAS | 2023-04-12T15:01+09:00 | 2023-04-12T15:01+09:00 |
| jvndb-2023-001400 | CONPROSYS HMI System(CHS) vulnerable to SQL injection | 2023-04-03T16:19+09:00 | 2023-04-03T16:19+09:00 |
| jvndb-2021-000070 | Multiple vulnerabilities in GroupSession | 2021-07-19T15:41+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2021-000068 | Multiple vulnerabilities in Retty App | 2021-07-13T14:34+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2021-000033 | Hot Pepper Gourmet App fails to restrict access permissions | 2021-04-27T17:10+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2021-000031 | Gurunavi Apps fail to restrict access permissions | 2021-04-14T17:22+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2020-000079 | desknet's NEO vulnerable to cross-site scripting | 2020-12-03T17:54+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2020-000070 | Studyplus App uses a hard-coded API key for an external service | 2020-11-05T18:43+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2023-000016 | The installers of ELECOM Camera Assistant and QuickFileDealer may insecurely load Dynamic Link Libraries | 2023-02-14T17:00+09:00 | 2023-02-14T17:00+09:00 |
| jvndb-2023-001110 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON CX-Motion Pro | 2023-01-25T14:28+09:00 | 2023-01-25T14:28+09:00 |
| jvndb-2023-000009 | EasyMail vulnerable to cross-site scripting | 2023-01-24T16:00+09:00 | 2023-01-24T16:00+09:00 |
| jvndb-2023-001108 | Contec CONPROSYS HMI System (CHS) vulnerable to multiple SQL injections | 2023-01-24T13:38+09:00 | 2023-01-24T13:38+09:00 |
| jvndb-2023-001008 | File and Directory Permissions Vulnerability in Hitachi Tuning Manager | 2023-01-18T13:51+09:00 | 2023-01-18T13:51+09:00 |
| jvndb-2023-000007 | WordPress plugin "Welcart e-Commerce" vulnerable to directory traversal | 2023-01-17T14:17+09:00 | 2023-01-17T14:17+09:00 |
| jvndb-2023-001005 | Active debug code vulnerability in OMRON CP1L-EL20DR-D | 2023-01-12T15:53+09:00 | 2023-01-12T15:53+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:02970-2 | Security update for pam | 2025-10-17T13:14:09Z | 2025-10-17T13:14:09Z |
| suse-su-2025:20862-1 | Security update for chrony | 2025-10-17T12:05:08Z | 2025-10-17T12:05:08Z |
| suse-su-2025:20863-1 | Security update for grub2 | 2025-10-17T12:04:21Z | 2025-10-17T12:04:21Z |
| suse-su-2025:20866-1 | Security update for open-vm-tools | 2025-10-17T12:03:07Z | 2025-10-17T12:03:07Z |
| suse-su-2025:20853-1 | Security update for open-vm-tools | 2025-10-17T11:57:06Z | 2025-10-17T11:57:06Z |
| suse-su-2025:03630-1 | Security update for openssl1 | 2025-10-17T11:39:00Z | 2025-10-17T11:39:00Z |
| suse-su-2025:03629-1 | Security update for gstreamer-plugins-rs | 2025-10-17T11:38:49Z | 2025-10-17T11:38:49Z |
| suse-su-2025:03628-1 | Security update for the Linux Kernel | 2025-10-17T11:34:59Z | 2025-10-17T11:34:59Z |
| suse-su-2025:03627-1 | Security update for squid | 2025-10-17T06:15:16Z | 2025-10-17T06:15:16Z |
| suse-su-2025:03626-1 | Security update for the Linux Kernel | 2025-10-17T06:14:11Z | 2025-10-17T06:14:11Z |
| suse-su-2025:03625-1 | Security update for pgadmin4 | 2025-10-17T06:12:43Z | 2025-10-17T06:12:43Z |
| suse-su-2025:03624-1 | Security update for expat | 2025-10-16T19:59:29Z | 2025-10-16T19:59:29Z |
| suse-su-2025:03618-1 | Security update for samba | 2025-10-16T07:37:32Z | 2025-10-16T07:37:32Z |
| suse-su-2025:03616-1 | Security update for ImageMagick | 2025-10-16T05:49:33Z | 2025-10-16T05:49:33Z |
| suse-su-2025:03615-1 | Security update for the Linux Kernel | 2025-10-16T05:49:13Z | 2025-10-16T05:49:13Z |
| suse-su-2025:03614-1 | Security update for the Linux Kernel | 2025-10-16T05:48:12Z | 2025-10-16T05:48:12Z |
| suse-su-2025:03613-1 | Security update for the Linux Kernel | 2025-10-16T05:47:42Z | 2025-10-16T05:47:42Z |
| suse-su-2025:03612-1 | Security update for samba | 2025-10-16T04:04:19Z | 2025-10-16T04:04:19Z |
| suse-su-2025:20851-1 | Security update for the Linux Kernel | 2025-10-15T16:17:22Z | 2025-10-15T16:17:22Z |
| suse-su-2025:20861-1 | Security update for the Linux Kernel | 2025-10-15T15:17:40Z | 2025-10-15T15:17:40Z |
| suse-su-2025:20864-1 | Security update for kernel-livepatch-MICRO-6-0_Update_12 | 2025-10-15T15:02:36Z | 2025-10-15T15:02:36Z |
| suse-su-2025:20850-1 | Security update for kernel-livepatch-MICRO-6-0_Update_12 | 2025-10-15T15:02:36Z | 2025-10-15T15:02:36Z |
| suse-su-2025:03607-1 | Security update for squid | 2025-10-15T13:38:36Z | 2025-10-15T13:38:36Z |
| suse-su-2025:03606-1 | Security update for squid | 2025-10-15T13:38:21Z | 2025-10-15T13:38:21Z |
| suse-su-2025:03604-1 | Security update for samba | 2025-10-15T13:37:54Z | 2025-10-15T13:37:54Z |
| suse-su-2025:03603-1 | Security update for samba | 2025-10-15T13:37:44Z | 2025-10-15T13:37:44Z |
| suse-su-2025:03602-1 | Security update for the Linux Kernel | 2025-10-15T12:57:25Z | 2025-10-15T12:57:25Z |
| suse-su-2025:03601-1 | Security update for the Linux Kernel | 2025-10-15T12:57:01Z | 2025-10-15T12:57:01Z |
| suse-su-2025:03600-1 | Security update for the Linux Kernel | 2025-10-15T12:54:53Z | 2025-10-15T12:54:53Z |
| suse-su-2025:03599-1 | Security update for qt6-base | 2025-10-15T12:17:03Z | 2025-10-15T12:17:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15229-1 | himmelblau-0.9.17+git.0.4a97692-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15228-1 | helm-3.18.3-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15227-1 | grype-0.94.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15226-1 | grafana-11.6.3-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15225-1 | govulncheck-vulndb-0.0.20250612T141001-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15224-1 | go1.24-1.24.4-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15223-1 | go1.23-1.23.10-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15222-1 | glibc-2.41-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15221-1 | gio-branding-upstream-2.84.3-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15220-1 | git-lfs-3.7.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15219-1 | gdm-48.0-10.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15218-1 | fractal-11.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15217-1 | flake-pilot-3.1.19-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15216-1 | firefox-esr-128.12.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15215-1 | ffmpeg-4-4.4.6-4.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15214-1 | faad2-2.11.2-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15213-1 | curl-8.14.1-4.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15212-1 | clustershell-1.9.3-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15211-1 | clamav-1.4.3-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15210-1 | chromedriver-138.0.7204.96-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15209-1 | assimp-devel-6.0.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15208-1 | apache-commons-fileupload-1.6.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15207-1 | alloy-1.9.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15206-1 | SDL2-2.32.8-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15205-1 | SDL-1.2.15-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15204-1 | MozillaThunderbird-128.11.1-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15203-1 | MozillaFirefox-139.0.4-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15202-1 | python311-selenium-4.25.0-5.1 on GA media | 2025-06-04T00:00:00Z | 2025-06-04T00:00:00Z |
| opensuse-su-2025:15201-1 | python311-nh3-0.2.17-2.1 on GA media | 2025-06-04T00:00:00Z | 2025-06-04T00:00:00Z |
| opensuse-su-2025:15200-1 | haproxy-3.2.0+git0.e134140d2-2.1 on GA media | 2025-06-04T00:00:00Z | 2025-06-04T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-29948 | School Fees Payment System ajx.php文件SQL注入漏洞 | 2025-06-17 | 2025-12-03 |
| cnvd-2025-29947 | ASUS Armoury Crate竞争条件漏洞 | 2025-06-23 | 2025-12-03 |
| cnvd-2025-29946 | School Fees Payment System跨站请求伪造漏洞 | 2025-06-27 | 2025-12-03 |
| cnvd-2025-29945 | School Fees Payment System student.php文件SQL注入漏洞 | 2025-06-27 | 2025-12-03 |
| cnvd-2025-29944 | School Fees Payment System fees.php文件跨站脚本漏洞 | 2025-06-27 | 2025-12-03 |
| cnvd-2025-29943 | School Fees Payment System branch.php文件跨站脚本漏洞 | 2025-06-27 | 2025-12-03 |
| cnvd-2025-29942 | ASUS Armoury Crate堆栈缓冲区溢出漏洞 | 2025-10-17 | 2025-12-03 |
| cnvd-2025-29941 | ASUS Armoury Crate链接跟随不当漏洞 | 2025-10-17 | 2025-12-03 |
| cnvd-2025-29940 | ASUS Armoury Crate空指针取消引用漏洞 | 2025-10-17 | 2025-12-03 |
| cnvd-2025-29939 | ASUS Armoury Crate内存缓冲区操作限制不当漏洞 | 2025-11-11 | 2025-12-03 |
| cnvd-2025-29938 | ASUS Router堆栈缓冲区溢出漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29937 | ASUS Router路径遍历漏洞(CNVD-2025-29937) | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29936 | ASUS Router身份验证绕过漏洞(CNVD-2025-29936) | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29935 | ASUS Router整数下溢漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29934 | WordPress houzez跨站脚本漏洞 | 2025-11-28 | 2025-12-03 |
| cnvd-2025-29871 | School Fees Payment System student.php文件跨站脚本漏洞 | 2025-06-27 | 2025-12-03 |
| cnvd-2025-29870 | Library System return.php文件SQL注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29869 | Library System index.php文件SQL注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29868 | Library System mail.php文件SQL注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29783 | ASUS Router路径遍历漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29782 | ASUS Router命令注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29781 | ASUS Router身份验证绕过漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29780 | ASUS Router SQL注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29751 | AMD CPU指令不当漏洞 | 2023-11-20 | 2025-12-03 |
| cnvd-2025-29750 | AMD CPU竞争条件漏洞 | 2024-03-19 | 2025-12-03 |
| cnvd-2025-29749 | AMD uProf连接点漏洞 | 2025-05-28 | 2025-12-03 |
| cnvd-2025-29748 | AMD StoreMI DLL劫持漏洞 | 2025-11-25 | 2025-12-03 |
| cnvd-2025-29747 | AMD StoreMI默认权限配置不当漏洞 | 2025-11-25 | 2025-12-03 |
| cnvd-2025-29746 | AMD CPU存在未明漏洞 | 2025-11-25 | 2025-12-03 |
| cnvd-2025-29745 | AMD CPU熵处理不当漏洞 | 2025-11-25 | 2025-12-03 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0850 | Multiples vulnérabilités dans Google Chrome | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0847 | Vulnérabilité dans les produits Liferay | 2025-10-06T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| CERTFR-2025-AVI-0851 | Vulnérabilité dans Python | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| CERTFR-2025-AVI-0850 | Multiples vulnérabilités dans Google Chrome | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| CERTFR-2025-AVI-0847 | Vulnérabilité dans les produits Liferay | 2025-10-06T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0849 | Multiples vulnérabilités dans les produits Elastic | 2025-10-07T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0848 | Vulnérabilité dans OpenSSH | 2025-10-06T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| CERTFR-2025-AVI-0849 | Multiples vulnérabilités dans les produits Elastic | 2025-10-07T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| CERTFR-2025-AVI-0848 | Vulnérabilité dans OpenSSH | 2025-10-06T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0846 | Multiples vulnérabilités dans les produits Qnap | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-avi-0845 | Multiples vulnérabilités dans Zabbix | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| CERTFR-2025-AVI-0846 | Multiples vulnérabilités dans les produits Qnap | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| CERTFR-2025-AVI-0845 | Multiples vulnérabilités dans Zabbix | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-avi-0844 | Multiples vulnérabilités dans IBM Sterling Connect | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0843 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0842 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0841 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0840 | Multiples vulnérabilités dans Zabbix | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0839 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0844 | Multiples vulnérabilités dans IBM Sterling Connect | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0843 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0842 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0841 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0840 | Multiples vulnérabilités dans Zabbix | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0839 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0838 | Multiples vulnérabilités dans les produits Splunk | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| certfr-2025-avi-0837 | Multiples vulnérabilités dans Google Chrome | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| CERTFR-2025-AVI-0838 | Multiples vulnérabilités dans les produits Splunk | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| CERTFR-2025-AVI-0837 | Multiples vulnérabilités dans Google Chrome | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| certfr-2025-avi-0836 | Multiples vulnérabilités dans les produits Tenable | 2025-10-01T00:00:00.000000 | 2025-10-01T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2002-ale-007 | Cédérom Pages Pro | 2002-09-04T00:00:00.000000 | 2002-09-04T00:00:00.000000 |
| CERTA-2002-ALE-007 | Cédérom Pages Pro | 2002-09-04T00:00:00.000000 | 2002-09-04T00:00:00.000000 |
| certa-2002-ale-006 | Propagation du ver Spida (Microsoft SQL Server) | 2002-05-22T00:00:00.000000 | 2002-06-04T00:00:00.000000 |
| CERTA-2002-ALE-006 | Propagation du ver Spida (Microsoft SQL Server) | 2002-05-22T00:00:00.000000 | 2002-06-04T00:00:00.000000 |
| certa-2002-ale-005 | Risque de compromission des auto-commutateurs (PABX) ALCATEL 4400 | 2002-02-20T00:00:00.000000 | 2002-02-20T00:00:00.000000 |
| CERTA-2002-ALE-005 | Risque de compromission des auto-commutateurs (PABX) ALCATEL 4400 | 2002-02-20T00:00:00.000000 | 2002-02-20T00:00:00.000000 |
| certa-2002-ale-004 | Multiples implémentations de SNMP V1 vulnérables | 2002-02-13T00:00:00.000000 | 2002-02-13T00:00:00.000000 |
| CERTA-2002-ALE-004 | Multiples implémentations de SNMP V1 vulnérables | 2002-02-13T00:00:00.000000 | 2002-02-13T00:00:00.000000 |
| certa-2002-ale-003 | Propagation importante du virus « W32.Myparty@mm » | 2002-01-29T00:00:00.000000 | 2002-01-29T00:00:00.000000 |
| CERTA-2002-ALE-003 | Propagation importante du virus « W32.Myparty@mm » | 2002-01-29T00:00:00.000000 | 2002-01-29T00:00:00.000000 |
| certa-2002-ale-002 | Exploitation d'une faille de wu-ftpd | 2002-01-28T00:00:00.000000 | 2002-01-28T00:00:00.000000 |
| CERTA-2002-ALE-002 | Exploitation d'une faille de wu-ftpd | 2002-01-28T00:00:00.000000 | 2002-01-28T00:00:00.000000 |
| certa-2002-ale-001 | Exploitation massive d'une faille de CDE | 2002-01-24T00:00:00.000000 | 2002-01-24T00:00:00.000000 |
| CERTA-2002-ALE-001 | Exploitation massive d'une faille de CDE | 2002-01-24T00:00:00.000000 | 2002-01-24T00:00:00.000000 |
| certa-2001-ale-012 | Rappels concernant les virus | 2001-09-13T00:00:00.000000 | 2002-01-09T00:00:00.000000 |
| CERTA-2001-ALE-012 | Rappels concernant les virus | 2001-09-13T00:00:00.000000 | 2002-01-09T00:00:00.000000 |
| certa-2001-ale-016 | Propagation du ver badtrans - variante B | 2001-11-27T00:00:00.000000 | 2001-11-27T00:00:00.000000 |
| CERTA-2001-ALE-016 | Propagation du ver badtrans - variante B | 2001-11-27T00:00:00.000000 | 2001-11-27T00:00:00.000000 |
| certa-2001-ale-015 | Exploitation massive d'une ancienne vulnérabilité de SSH | 2001-11-19T00:00:00.000000 | 2001-11-19T00:00:00.000000 |
| CERTA-2001-ALE-015 | Exploitation massive d'une ancienne vulnérabilité de SSH | 2001-11-19T00:00:00.000000 | 2001-11-19T00:00:00.000000 |
| certa-2001-ale-014 | Risque de divulgation de données personnelles/confidentielles par des produits Microsoft | 2001-10-19T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| CERTA-2001-ALE-014 | Risque de divulgation de données personnelles/confidentielles par des produits Microsoft | 2001-10-19T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| certa-2001-ale-013 | Propagation du ver/virus NIMDA (Concept Virus) | 2001-09-19T00:00:00.000000 | 2001-09-19T00:00:00.000000 |
| CERTA-2001-ALE-013 | Propagation du ver/virus NIMDA (Concept Virus) | 2001-09-19T00:00:00.000000 | 2001-09-19T00:00:00.000000 |
| certa-2001-ale-011 | <TT>antivirus2001</TT> est un cheval de Troie | 2001-09-10T00:00:00.000000 | 2001-09-13T00:00:00.000000 |
| CERTA-2001-ALE-011 | <TT>antivirus2001</TT> est un cheval de Troie | 2001-09-10T00:00:00.000000 | 2001-09-13T00:00:00.000000 |
| certa-2001-ale-010 | Propagation du ver "Code Blue" | 2001-09-07T00:00:00.000000 | 2001-09-07T00:00:00.000000 |
| CERTA-2001-ALE-010 | Propagation du ver "Code Blue" | 2001-09-07T00:00:00.000000 | 2001-09-07T00:00:00.000000 |
| certa-2001-ale-008 | Propagation du ver « Code Red » | 2001-07-18T00:00:00.000000 | 2001-08-13T00:00:00.000000 |
| CERTA-2001-ALE-008 | Propagation du ver « Code Red » | 2001-07-18T00:00:00.000000 | 2001-08-13T00:00:00.000000 |