Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-6177 |
7.4 (3.1)
|
ChromeOS MiniOS Root Code Execution Bypass While Dev M… |
Google |
ChromeOS |
2025-06-16T16:43:44.191Z | 2026-02-26T17:50:35.152Z |
| CVE-2025-5309 |
8.6 (4.0)
|
Remote Support & Privileged Remote Access server side … |
BeyondTrust |
Remote support & Privileged Remote Access |
2025-06-16T16:06:14.413Z | 2026-02-26T17:50:35.531Z |
| CVE-2025-50106 |
8.1 (3.1)
|
Vulnerability in the Oracle Java SE, Oracle Graal… |
Oracle Corporation |
Oracle Java SE |
2025-07-15T19:27:51.820Z | 2026-02-26T17:50:35.373Z |
| CVE-2025-50105 |
8.1 (3.1)
|
Vulnerability in the Oracle Universal Work Queue … |
Oracle Corporation |
Oracle Universal Work Queue |
2025-07-15T19:27:51.467Z | 2026-02-26T17:50:35.681Z |
| CVE-2025-3594 |
8.6 (4.0)
|
Path traversal vulnerability with the downloading… |
Liferay |
Portal |
2025-06-16T14:13:54.426Z | 2026-02-26T17:50:35.843Z |
| CVE-2025-5777 |
9.3 (4.0)
|
NetScaler ADC and NetScaler Gateway - Insufficient inp… |
NetScaler |
ADC |
2025-06-17T12:29:34.506Z | 2026-02-26T17:50:34.679Z |
| CVE-2025-5349 |
8.7 (4.0)
|
NetScaler ADC and NetScaler Gateway - Improper access … |
NetScaler |
ADC |
2025-06-17T12:32:24.670Z | 2026-02-26T17:50:34.130Z |
| CVE-2025-53024 |
8.2 (3.1)
|
Vulnerability in the Oracle VM VirtualBox product… |
Oracle Corporation |
Oracle VM VirtualBox |
2025-07-15T19:27:53.338Z | 2026-02-26T17:50:34.315Z |
| CVE-2025-50108 |
5.4 (3.1)
|
Vulnerability in the Oracle Hyperion Financial Re… |
Oracle Corporation |
Oracle Hyperion Financial Reporting |
2025-07-15T19:27:52.577Z | 2026-02-26T17:50:34.940Z |
| CVE-2025-53028 |
8.2 (3.1)
|
Vulnerability in the Oracle VM VirtualBox product… |
Oracle Corporation |
Oracle VM VirtualBox |
2025-07-15T19:27:54.787Z | 2026-02-26T17:50:33.185Z |
| CVE-2025-53027 |
8.2 (3.1)
|
Vulnerability in the Oracle VM VirtualBox product… |
Oracle Corporation |
Oracle VM VirtualBox |
2025-07-15T19:27:54.426Z | 2026-02-26T17:50:33.628Z |
| CVE-2025-53025 |
6 (3.1)
|
Vulnerability in the Oracle VM VirtualBox product… |
Oracle Corporation |
Oracle VM VirtualBox |
2025-07-15T19:27:53.685Z | 2026-02-26T17:50:33.962Z |
| CVE-2025-4879 |
7.3 (4.0)
|
Citrix Workspace App for Windows - Local Privilege esc… |
Citrix |
Workspace App for Windows |
2025-06-17T13:02:59.807Z | 2026-02-26T17:50:33.783Z |
| CVE-2025-0320 |
8.6 (4.0)
|
Citrix Secure Access - Local Privilege escalation allo… |
Citrix |
Secure Access Client for Windows |
2025-06-17T13:25:22.351Z | 2026-02-26T17:50:33.431Z |
| CVE-2025-7673 |
9.8 (3.1)
|
A buffer overflow vulnerability in the URL parser… |
Zyxel |
VMG8825-T50K firmware |
2025-07-16T07:11:02.974Z | 2026-02-26T17:50:32.365Z |
| CVE-2025-53030 |
6 (3.1)
|
Vulnerability in the Oracle VM VirtualBox product… |
Oracle Corporation |
Oracle VM VirtualBox |
2025-07-15T19:27:55.615Z | 2026-02-26T17:50:32.737Z |
| CVE-2025-47867 |
7.5 (3.1)
|
A Local File Inclusion vulnerability in a Trend M… |
Trend Micro, Inc. |
Trend Micro Apex Central |
2025-06-17T17:42:55.846Z | 2026-02-26T17:50:32.563Z |
| CVE-2025-47865 |
7.5 (3.1)
|
A Local File Inclusion vulnerability in a Trend M… |
Trend Micro, Inc. |
Trend Micro Apex Central |
2025-06-17T17:42:30.922Z | 2026-02-26T17:50:32.959Z |
| CVE-2025-49220 |
9.8 (3.1)
|
An insecure deserialization operation in Trend Mi… |
Trend Micro, Inc. |
Trend Micro Apex Central |
2025-06-17T17:43:23.501Z | 2026-02-26T17:50:31.672Z |
| CVE-2025-49219 |
9.8 (3.1)
|
An insecure deserialization operation in Trend Mi… |
Trend Micro, Inc. |
Trend Micro Apex Central |
2025-06-17T17:43:12.062Z | 2026-02-26T17:50:31.992Z |
| CVE-2025-34510 |
8.8 (3.1)
|
Sitecore XM, XC, and XP Post-Auth RCE via Zip Slip |
Sitecore |
Experience Manager |
2025-06-17T18:46:04.239Z | 2026-02-26T17:50:31.002Z |
| CVE-2025-34509 |
7.5 (3.1)
|
Sitecore XM and XP Hardcoded Credentials |
Sitecore |
Experience Manager |
2025-06-17T18:20:57.441Z | 2026-02-26T17:50:31.319Z |
| CVE-2025-20284 |
6.5 (3.1)
|
Cisco Identity Services Engine Authenticated Remote Co… |
Cisco |
Cisco Identity Services Engine Software |
2025-07-16T16:16:46.479Z | 2026-02-26T17:50:31.157Z |
| CVE-2025-20283 |
6.5 (3.1)
|
Cisco Identity Services Engine Authenticated Remote Co… |
Cisco |
Cisco Identity Services Engine Software |
2025-07-16T16:16:37.827Z | 2026-02-26T17:50:31.510Z |
| CVE-2025-20274 |
6.3 (3.1)
|
Cisco Unified Intelligence Center Arbitrary File Uploa… |
Cisco |
Cisco Unified Contact Center Express |
2025-07-16T16:16:28.874Z | 2026-02-26T17:50:31.824Z |
| CVE-2025-49218 |
7.7 (3.1)
|
A post-auth SQL injection vulnerability in the Tr… |
Trend Micro, Inc. |
Trend Micro Endpoint Encryption Policy Server |
2025-06-17T20:28:22.211Z | 2026-02-26T17:50:30.136Z |
| CVE-2025-34511 |
8.8 (3.1)
|
Sitecore PowerShell Extension RCE via Unrestricted Upload |
Sitecore |
Powershell Extension |
2025-06-17T19:05:10.466Z | 2026-02-26T17:50:30.660Z |
| CVE-2025-20337 |
10 (3.1)
|
Cisco ISE API Unauthenticated Remote Code Execution Vu… |
Cisco |
Cisco Identity Services Engine Software |
2025-07-16T16:17:04.664Z | 2026-02-26T17:50:30.400Z |
| CVE-2025-20285 |
4.1 (3.1)
|
Cisco Identity Services Engine IP Filter Access Restri… |
Cisco |
Cisco Identity Services Engine Software |
2025-07-16T16:16:56.155Z | 2026-02-26T17:50:30.825Z |
| CVE-2025-6191 |
8.8 (3.1)
|
Integer overflow in V8 in Google Chrome prior to … |
Google |
Chrome |
2025-06-18T18:16:36.095Z | 2026-02-26T17:50:29.277Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-67996 |
9.8 (3.1)
|
WordPress Nestin theme < 1.2.6 - PHP Object Injection … |
BoldThemes |
Nestin |
2026-02-20T15:46:33.328Z | 2026-02-24T20:59:31.083Z |
| CVE-2025-67995 |
9.8 (3.1)
|
WordPress PatioTime theme < 2.1 - PHP Object Injection… |
LoftOcean |
PatioTime |
2026-02-20T15:46:33.136Z | 2026-02-24T20:53:56.722Z |
| CVE-2025-67992 |
8.1 (3.1)
|
WordPress PatioTime theme < 2.1 - Local File Inclusion… |
LoftOcean |
PatioTime |
2026-02-20T15:46:32.513Z | 2026-02-24T20:51:06.557Z |
| CVE-2025-67988 |
8.1 (3.1)
|
WordPress CozyStay theme < 1.9.1 - Local File Inclusio… |
LoftOcean |
CozyStay |
2026-02-20T15:46:31.946Z | 2026-02-24T20:51:06.372Z |
| CVE-2025-67982 |
8.1 (3.1)
|
WordPress Urna theme <= 2.5.12 - Local File Inclusion … |
thembay |
Urna |
2026-02-20T15:46:31.376Z | 2026-02-24T20:51:06.097Z |
| CVE-2025-67981 |
8.1 (3.1)
|
WordPress Besa theme <= 2.3.15 - Local File Inclusion … |
thembay |
Besa |
2026-02-20T15:46:31.208Z | 2026-02-24T20:51:05.942Z |
| CVE-2025-67980 |
8.1 (3.1)
|
WordPress Hara theme <= 1.2.17 - Local File Inclusion … |
thembay |
Hara |
2026-02-20T15:46:31.029Z | 2026-02-24T20:51:04.121Z |
| CVE-2025-60087 |
8.1 (3.1)
|
WordPress Extensive VC Addons for WPBakery page builde… |
Nenad Obradovic |
Extensive VC Addons for WPBakery page builder |
2026-02-20T15:46:27.515Z | 2026-02-24T20:51:04.478Z |
| CVE-2019-25294 |
5.1 (4.0)
6.4 (3.1)
|
html5_snmp 1.11 - 'Remark' Persistent Cross-Site Scripting |
lolypop55 |
html5_snmp |
2026-02-06T16:41:35.318Z | 2026-02-06T19:54:41.405Z |
| CVE-2019-25298 |
7.1 (4.0)
7.1 (3.1)
|
html5_snmp 1.11 - 'Router_ID' SQL Injection |
lolypop55 |
html5_snmp |
2026-02-06T16:41:35.732Z | 2026-02-06T20:05:02.469Z |
| CVE-2026-25556 |
5.9 (4.0)
|
MuPDF <= 1.27.0 Barcode Decoding Double Free |
Artifex Software |
MuPDF |
2026-02-06T16:11:59.926Z | 2026-02-06T16:35:11.989Z |
| CVE-2026-3067 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
HummerRisk Archive Extraction CommandUtils.java extrac… |
n/a |
HummerRisk |
2026-02-24T03:32:07.867Z | 2026-02-24T18:47:21.803Z |
| CVE-2026-3066 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
HummerRisk Cloud Compliance Scanning PlatformUtils.jav… |
n/a |
HummerRisk |
2026-02-24T03:02:07.364Z | 2026-02-24T18:55:12.566Z |
| CVE-2026-3065 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
HummerRisk Cloud Task Dry-run CloudTaskService.java Co… |
n/a |
HummerRisk |
2026-02-24T02:32:10.391Z | 2026-02-28T02:11:08.525Z |
| CVE-2026-3064 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
HummerRisk Cloud Task Scheduler ResourceCreateService.… |
n/a |
HummerRisk |
2026-02-24T02:32:08.524Z | 2026-02-24T19:30:05.511Z |
| CVE-2024-56373 |
N/A
|
Apache Airflow: SSTI to Code Execution in Airflow thro… |
Apache Software Foundation |
Apache Airflow |
2026-02-24T10:06:41.162Z | 2026-02-26T14:44:09.219Z |
| CVE-2025-27555 |
N/A
|
Apache Airflow: Connection Secrets not masked in UI wh… |
Apache Software Foundation |
Apache Airflow |
2026-02-24T10:09:59.703Z | 2026-02-24T15:40:05.895Z |
| CVE-2026-3070 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
SourceCodester Modern Image Gallery App upload.php cro… |
SourceCodester |
Modern Image Gallery App |
2026-02-24T04:32:08.072Z | 2026-02-24T17:13:37.627Z |
| CVE-2026-3069 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Document Management System edtlbls.php sq… |
itsourcecode |
Document Management System |
2026-02-24T04:02:08.442Z | 2026-02-24T18:10:09.581Z |
| CVE-2026-3068 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Document Management System deluser.php sq… |
itsourcecode |
Document Management System |
2026-02-24T03:32:10.667Z | 2026-02-24T18:34:43.481Z |
| CVE-2026-23000 |
N/A
|
net/mlx5e: Fix crash on profile change rollback failure |
Linux |
Linux |
2026-01-25T14:36:14.854Z | 2026-02-09T08:36:52.780Z |
| CVE-2026-25651 |
6.1 (3.1)
|
client-certificate-auth has an Open Redirect via Host … |
tgies |
client-certificate-auth |
2026-02-06T18:50:26.046Z | 2026-02-09T15:28:48.992Z |
| CVE-2026-25650 |
6.6 (4.0)
|
MCP Salesforce Connector has arbitrary attribute acces… |
smn2gnt |
MCP-Salesforce |
2026-02-06T18:53:58.009Z | 2026-02-09T15:28:43.765Z |
| CVE-2023-34382 |
4.4 (3.1)
|
WordPress Dokan Plugin <= 3.7.19 is vulnerable to PHP … |
weDevs |
Dokan – Best WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy |
2023-12-19T19:40:58.498Z | 2024-08-02T16:10:06.759Z |
| CVE-2026-25647 |
4.6 (3.1)
|
Lute has a Stored Cross-Site Scripting (XSS) via Markd… |
siyuan-note |
siyuan |
2026-02-06T19:03:36.847Z | 2026-02-09T15:28:33.222Z |
| CVE-2020-36748 |
4.3 (3.1)
|
The Dokan plugin for WordPress is vulnerable to C… |
wedevs |
Dokan – Best WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy |
2023-07-01T05:33:28.668Z | 2024-10-28T15:24:44.232Z |
| CVE-2022-3194 |
5.4 (3.1)
|
Dokan < 3.6.4 - Vendor Stored Cross-Site Scripting |
Unknown |
Dokan |
2024-01-16T15:53:36.500Z | 2025-06-02T15:10:22.999Z |
| CVE-2026-1769 |
5.3 (3.1)
|
Stored XSS on Xerox CentreWare Web 7.0.6 |
Xerox |
CentreWare |
2026-02-06T17:19:45.450Z | 2026-02-06T18:42:12.895Z |
| CVE-2022-3915 |
9.8 (3.1)
|
Dokan < 3.7.6 - Unauthenticated SQLi |
Unknown |
Dokan |
2022-12-12T17:54:43.952Z | 2025-04-22T14:58:27.755Z |
| CVE-2026-23989 |
8.2 (3.1)
|
REVA Public Link Exploit |
opencloud-eu |
reva |
2026-02-06T18:28:25.075Z | 2026-02-06T18:52:19.409Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-67992 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-02-20T16:22:05.360 | 2026-02-24T21:16:19.940 |
| fkie_cve-2025-67988 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-02-20T16:22:04.970 | 2026-02-24T21:16:19.753 |
| fkie_cve-2025-67982 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-02-20T16:22:04.580 | 2026-02-24T21:16:19.570 |
| fkie_cve-2025-67981 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-02-20T16:22:04.450 | 2026-02-24T21:16:19.380 |
| fkie_cve-2025-67980 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-02-20T16:22:04.323 | 2026-02-24T21:16:19.193 |
| fkie_cve-2025-60087 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-02-20T16:22:02.367 | 2026-02-24T21:16:18.987 |
| fkie_cve-2019-25294 | html5_snmp 1.11 contains a persistent cross-site scripting vulnerability that allows attackers to i… | 2026-02-06T17:16:10.693 | 2026-02-24T21:15:49.467 |
| fkie_cve-2019-25298 | html5_snmp 1.11 contains multiple SQL injection vulnerabilities that allow attackers to manipulate … | 2026-02-06T17:16:10.853 | 2026-02-24T21:14:49.210 |
| fkie_cve-2026-25556 | MuPDF versions 1.23.0 through 1.27.0 contain a double-free vulnerability in fz_fill_pixmap_from_dis… | 2026-02-06T17:16:27.387 | 2026-02-24T21:07:13.627 |
| fkie_cve-2026-3067 | A vulnerability has been found in HummerRisk up to 1.5.0. This issue affects the function extractTa… | 2026-02-24T04:15:59.210 | 2026-02-24T21:06:26.253 |
| fkie_cve-2026-3066 | A flaw has been found in HummerRisk up to 1.5.0. This vulnerability affects the function fixedComma… | 2026-02-24T04:15:58.980 | 2026-02-24T21:05:59.363 |
| fkie_cve-2026-3065 | A vulnerability was detected in HummerRisk up to 1.5.0. This affects the function CommandUtils.comm… | 2026-02-24T03:16:03.653 | 2026-02-24T21:05:47.217 |
| fkie_cve-2026-3064 | A security vulnerability has been detected in HummerRisk up to 1.5.0. Affected by this issue is som… | 2026-02-24T03:16:03.427 | 2026-02-24T21:05:33.127 |
| fkie_cve-2024-56373 | DAG Author (who already has quite a lot of permissions) could manipulate database of Airflow 2 in t… | 2026-02-24T10:16:02.717 | 2026-02-24T21:05:08.843 |
| fkie_cve-2025-27555 | Airflow versions before 2.11.1 have a vulnerability that allows authenticated users with audit log … | 2026-02-24T10:16:02.917 | 2026-02-24T21:04:58.230 |
| fkie_cve-2026-3070 | A vulnerability was detected in SourceCodester Modern Image Gallery App 1.0. Affected by this vulne… | 2026-02-24T05:17:23.430 | 2026-02-24T21:04:49.517 |
| fkie_cve-2026-3069 | A security vulnerability has been detected in itsourcecode Document Management System 1.0. Affected… | 2026-02-24T05:17:18.333 | 2026-02-24T21:04:26.693 |
| fkie_cve-2026-3068 | A weakness has been identified in itsourcecode Document Management System 1.0. This impacts an unkn… | 2026-02-24T04:15:59.427 | 2026-02-24T21:04:16.370 |
| fkie_cve-2026-23000 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix crash on profil… | 2026-01-25T15:15:54.853 | 2026-02-24T21:01:41.390 |
| fkie_cve-2026-25651 | client-certificate-auth is middleware for Node.js implementing client SSL certificate authenticatio… | 2026-02-06T19:16:09.897 | 2026-02-24T21:00:44.357 |
| fkie_cve-2026-25650 | MCP Salesforce Connector is a Model Context Protocol (MCP) server implementation for Salesforce int… | 2026-02-06T19:16:09.743 | 2026-02-24T20:59:52.390 |
| fkie_cve-2023-34382 | Deserialization of Untrusted Data vulnerability in weDevs Dokan – Best WooCommerce Multivendor Mark… | 2023-12-19T20:15:07.340 | 2026-02-24T20:59:24.530 |
| fkie_cve-2026-25647 | Lute is a structured Markdown engine supporting Go and JavaScript. Lute 1.7.6 and earlier (as used … | 2026-02-06T19:16:09.593 | 2026-02-24T20:59:10.180 |
| fkie_cve-2020-36748 | The Dokan plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and i… | 2023-07-01T06:15:09.433 | 2026-02-24T20:59:03.343 |
| fkie_cve-2022-3194 | The Dokan WordPress plugin before 3.6.4 allows vendors to inject arbitrary javascript in product re… | 2024-01-16T16:15:09.883 | 2026-02-24T20:58:39.753 |
| fkie_cve-2026-1769 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-06T18:15:56.193 | 2026-02-24T20:58:11.823 |
| fkie_cve-2022-3915 | The Dokan WordPress plugin before 3.7.6 does not properly sanitise and escape a parameter before us… | 2022-12-12T18:15:11.817 | 2026-02-24T20:58:05.303 |
| fkie_cve-2026-23989 | REVA is an interoperability platform. Prior to 2.42.3 and 2.40.3, a bug in the GRPC authorization m… | 2026-02-06T19:16:08.470 | 2026-02-24T20:57:55.337 |
| fkie_cve-2023-26525 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2023-12-20T18:15:11.680 | 2026-02-24T20:57:36.037 |
| fkie_cve-2026-24903 | OrcaStatLLM Researcher is an LLM Based Research Paper Generator. A Stored Cross-Site Scripting (XSS… | 2026-02-06T18:15:58.830 | 2026-02-24T20:57:19.450 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-8m92-8r47-wxqw |
5.4 (3.1)
2.1 (4.0)
|
A security flaw has been discovered in detronetdip E-commerce 1.0.0. The impacted element is the fu… | 2026-02-20T18:31:39Z | 2026-02-20T18:31:39Z |
| ghsa-82j5-hm8j-jwhq |
8.2 (3.1)
|
The underlying PLC of the device can be remotely influenced, without proper safeguards or authentication. | 2026-02-20T18:31:39Z | 2026-02-20T18:31:39Z |
| ghsa-7689-4fm5-8xxm |
9.8 (3.1)
|
The web management interface of the device allows the administrator username and password to be se… | 2026-02-20T18:31:39Z | 2026-02-20T18:31:39Z |
| ghsa-4fcf-69p7-63vf |
3.5 (3.1)
2.0 (4.0)
|
A weakness has been identified in detronetdip E-commerce 1.0.0. This affects the function get_safe_… | 2026-02-20T18:31:39Z | 2026-02-20T18:31:39Z |
| ghsa-47ph-88gx-hg42 |
7.2 (3.1)
7.3 (4.0)
|
A security vulnerability has been detected in UTT HiPER 520 1.7.7-160105. This impacts the function… | 2026-02-20T18:31:39Z | 2026-02-20T18:31:39Z |
| ghsa-3vr9-ghwq-fh8h |
7.5 (3.1)
|
The Wi-Fi router is vulnerable to de-authentication attacks due to the absence of management frame… | 2026-02-20T18:31:39Z | 2026-02-20T18:31:39Z |
| ghsa-3fr7-jch8-4qjv |
7.5 (3.1)
|
The embedded web interface of the device does not support HTTPS/TLS for authentication and uses HT… | 2026-02-20T18:31:39Z | 2026-02-20T18:31:39Z |
| ghsa-2x2g-fcpp-7fr9 |
6.2 (4.0)
|
HyperCloud versions 2.3.5 through 2.6.8 improperly allowed refresh tokens to be used directly for r… | 2026-02-20T18:31:39Z | 2026-02-20T18:31:39Z |
| ghsa-v6m3-2f65-r5x7 |
8.1 (3.1)
|
A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and prior, which would allow re… | 2026-02-20T18:31:38Z | 2026-02-20T18:31:38Z |
| ghsa-42qj-j5qx-4j25 |
3.7 (3.1)
|
A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and prior, which would allow re… | 2026-02-20T18:31:38Z | 2026-02-20T18:31:38Z |
| ghsa-57gh-h62q-5fwp |
|
Missing Authorization vulnerability in Saiful Islam Sync Master Sheet – Product Sync with Goo… | 2026-02-20T18:31:35Z | 2026-02-20T18:31:35Z |
| ghsa-vg7x-9fx9-rhfv |
3.5 (3.1)
|
HCL Connections is vulnerable to information disclosure. In a very specific user navigation scenar… | 2026-02-20T18:31:33Z | 2026-02-20T18:31:33Z |
| ghsa-wh7w-625p-7j85 |
5.4 (3.1)
|
Missing Authorization vulnerability in designinvento DirectoryPress directorypress allows Exploitin… | 2026-02-19T21:30:48Z | 2026-02-20T18:31:32Z |
| ghsa-q8m6-hjhf-m246 |
7.5 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-02-19T21:30:48Z | 2026-02-20T18:31:32Z |
| ghsa-jw2g-7q64-j48j |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T21:30:48Z | 2026-02-20T18:31:32Z |
| ghsa-8g2j-5xh3-r35m |
5.9 (3.1)
|
Missing Authorization vulnerability in SeedProd Coming Soon Page, Under Construction & Maintenance … | 2026-02-19T21:30:48Z | 2026-02-20T18:31:32Z |
| ghsa-27v4-jx99-gfh6 |
5.9 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T21:30:48Z | 2026-02-20T18:31:32Z |
| ghsa-px76-q5p2-wfgw |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T18:31:53Z | 2026-02-20T18:31:28Z |
| ghsa-4mjj-m5cc-rchc |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T18:31:53Z | 2026-02-20T18:31:28Z |
| ghsa-x648-6h35-89x6 |
5.3 (3.1)
|
Authorization Bypass Through User-Controlled Key vulnerability in N-Media Frontend File Manager nme… | 2026-02-19T18:31:51Z | 2026-02-20T18:31:27Z |
| ghsa-wq4c-m266-6c9g |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T18:31:53Z | 2026-02-20T18:31:27Z |
| ghsa-vv37-5fmc-w362 |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T18:31:52Z | 2026-02-20T18:31:27Z |
| ghsa-vf83-6p8j-54f5 |
4.3 (3.1)
|
Missing Authorization vulnerability in PenciDesign Penci AI SmartContent Creator penci-ai allows Ex… | 2026-02-19T18:31:53Z | 2026-02-20T18:31:27Z |
| ghsa-rw72-9mv7-cr6q |
5.9 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T18:31:52Z | 2026-02-20T18:31:27Z |
| ghsa-rf9x-x7wj-42rg |
5.9 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T18:31:52Z | 2026-02-20T18:31:27Z |
| ghsa-q2q8-xrr4-fqjh |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T18:31:53Z | 2026-02-20T18:31:27Z |
| ghsa-mxq6-8688-3xc6 |
5.4 (3.1)
|
Missing Authorization vulnerability in scripteo Ads Pro ap-plugin-scripteo allows Exploiting Incorr… | 2026-02-19T18:31:52Z | 2026-02-20T18:31:27Z |
| ghsa-hrxh-f933-qcp6 |
4.3 (3.1)
|
Missing Authorization vulnerability in Shahjahan Jewel FluentForm fluentform allows Exploiting Inco… | 2026-02-19T18:31:52Z | 2026-02-20T18:31:27Z |
| ghsa-gq95-fxhv-hvcp |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T18:31:53Z | 2026-02-20T18:31:27Z |
| ghsa-f647-638r-hxrw |
4.3 (3.1)
|
Missing Authorization vulnerability in PublishPress PublishPress Authors publishpress-authors allow… | 2026-02-19T18:31:52Z | 2026-02-20T18:31:27Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-604 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.759272Z |
| pysec-2021-603 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-13T00:15:00Z | 2021-12-09T06:35:06.680335Z |
| pysec-2021-602 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:06.599796Z |
| pysec-2021-601 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:06.517637Z |
| pysec-2021-600 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.437026Z |
| pysec-2021-599 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:06.351462Z |
| pysec-2021-598 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.268797Z |
| pysec-2021-597 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.188810Z |
| pysec-2021-596 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.073182Z |
| pysec-2021-595 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.976648Z |
| pysec-2021-594 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.896757Z |
| pysec-2021-593 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.816233Z |
| pysec-2021-592 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.737030Z |
| pysec-2021-591 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.654112Z |
| pysec-2021-590 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.572307Z |
| pysec-2021-589 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.480275Z |
| pysec-2021-588 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.402350Z |
| pysec-2021-587 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.322708Z |
| pysec-2021-586 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.237190Z |
| pysec-2021-585 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.144273Z |
| pysec-2021-584 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.048687Z |
| pysec-2021-583 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.970183Z |
| pysec-2021-582 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.885089Z |
| pysec-2021-581 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.799643Z |
| pysec-2021-580 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:04.699565Z |
| pysec-2021-579 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:04.618744Z |
| pysec-2021-578 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.523711Z |
| pysec-2021-577 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:04.439609Z |
| pysec-2021-576 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.358938Z |
| pysec-2021-575 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:04.272005Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32637 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.746922Z |
| gsd-2024-32636 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.734385Z |
| gsd-2024-32635 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.875136Z |
| gsd-2024-32634 | In huge memory get unmapped area check, code can never be reached because of a logical co… | 2024-04-17T05:01:56.786326Z |
| gsd-2024-32633 | An unsigned value can never be negative, so eMMC full disk test will always evaluate the … | 2024-04-17T05:01:56.911843Z |
| gsd-2024-32632 | A value in ATCMD will be misinterpreted by printf, causing incorrect output and possibly … | 2024-04-17T05:01:56.874071Z |
| gsd-2024-32631 | Out-of-Bounds read in ciCCIOTOPT in ASR180X will cause incorrect computations. | 2024-04-17T05:01:56.850009Z |
| gsd-2024-32630 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.788485Z |
| gsd-2024-32629 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.745948Z |
| gsd-2024-32628 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.921845Z |
| gsd-2024-32627 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.790643Z |
| gsd-2024-32626 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.745742Z |
| gsd-2024-32625 | In OffloadAMRWriter, a scalar field is not initialized so will contain an arbitrary value… | 2024-04-17T05:01:56.808008Z |
| gsd-2024-32624 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.752708Z |
| gsd-2024-32623 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.735689Z |
| gsd-2024-32622 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.759963Z |
| gsd-2024-32621 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.806292Z |
| gsd-2024-32620 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.763957Z |
| gsd-2024-32619 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.826672Z |
| gsd-2024-32618 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.814307Z |
| gsd-2024-32617 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.777069Z |
| gsd-2024-32616 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.883715Z |
| gsd-2024-32615 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.879864Z |
| gsd-2024-32614 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.882434Z |
| gsd-2024-32613 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.903371Z |
| gsd-2024-32612 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.740949Z |
| gsd-2024-32611 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.751442Z |
| gsd-2024-32610 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.870487Z |
| gsd-2024-32609 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.830655Z |
| gsd-2024-32608 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.871839Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2026-246 | Malicious code in admin1001 (npm) | 2026-01-13T15:31:00Z | 2026-01-16T03:49:00Z |
| mal-0000-ghsa-malware-2e19c4af31e55eea | Malware in admin1001 | 2026-01-16T03:26:04Z | 2026-01-16T03:26:04Z |
| MAL-0000-GHSA-MALWARE-2E19C4AF31E55EEA | Malware in admin1001 | 2026-01-16T03:26:04Z | 2026-01-16T03:26:04Z |
| mal-2026-313 | Malicious code in spire.officejs-fonts (npm) | 2026-01-16T00:10:24Z | 2026-01-16T00:10:24Z |
| mal-2026-312 | Malicious code in spire.officejs-externs (npm) | 2026-01-16T00:10:24Z | 2026-01-16T00:10:24Z |
| mal-2026-310 | Malicious code in sky1oauth2 (npm) | 2026-01-16T00:10:24Z | 2026-01-16T00:10:24Z |
| mal-2026-302 | Malicious code in s3-cache-handler (npm) | 2026-01-16T00:10:24Z | 2026-01-16T00:10:24Z |
| mal-2026-298 | Malicious code in omnicore-ds2-sdk2 (npm) | 2026-01-16T00:10:24Z | 2026-01-16T00:10:24Z |
| mal-2026-284 | Malicious code in flag-v211 (npm) | 2026-01-16T00:10:24Z | 2026-01-16T00:10:24Z |
| mal-2026-283 | Malicious code in flag-v21 (npm) | 2026-01-16T00:10:24Z | 2026-01-16T00:10:24Z |
| MAL-2026-313 | Malicious code in spire.officejs-fonts (npm) | 2026-01-16T00:10:24Z | 2026-01-16T00:10:24Z |
| MAL-2026-312 | Malicious code in spire.officejs-externs (npm) | 2026-01-16T00:10:24Z | 2026-01-16T00:10:24Z |
| MAL-2026-310 | Malicious code in sky1oauth2 (npm) | 2026-01-16T00:10:24Z | 2026-01-16T00:10:24Z |
| MAL-2026-302 | Malicious code in s3-cache-handler (npm) | 2026-01-16T00:10:24Z | 2026-01-16T00:10:24Z |
| MAL-2026-298 | Malicious code in omnicore-ds2-sdk2 (npm) | 2026-01-16T00:10:24Z | 2026-01-16T00:10:24Z |
| MAL-2026-284 | Malicious code in flag-v211 (npm) | 2026-01-16T00:10:24Z | 2026-01-16T00:10:24Z |
| MAL-2026-283 | Malicious code in flag-v21 (npm) | 2026-01-16T00:10:24Z | 2026-01-16T00:10:24Z |
| mal-2026-234 | Malicious code in xml2js-js (npm) | 2026-01-12T01:59:27Z | 2026-01-15T22:09:23Z |
| mal-2026-207 | Malicious code in yargs-js (npm) | 2026-01-12T00:22:24Z | 2026-01-15T22:09:23Z |
| mal-2026-187 | Malicious code in yunxohang7 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| mal-2026-186 | Malicious code in yunxohang6 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| mal-2026-185 | Malicious code in yunxohang5 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| mal-2026-184 | Malicious code in yunxohang4 (npm) | 2025-12-26T10:20:32Z | 2026-01-15T22:09:23Z |
| mal-2026-183 | Malicious code in yunxohang11 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| mal-2026-182 | Malicious code in yunxohang10 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| mal-2025-192992 | Malicious code in umap (PyPI) | 2025-12-31T11:45:36Z | 2026-01-15T22:09:23Z |
| MAL-2026-234 | Malicious code in xml2js-js (npm) | 2026-01-12T01:59:27Z | 2026-01-15T22:09:23Z |
| MAL-2026-207 | Malicious code in yargs-js (npm) | 2026-01-12T00:22:24Z | 2026-01-15T22:09:23Z |
| MAL-2026-187 | Malicious code in yunxohang7 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| MAL-2026-186 | Malicious code in yunxohang6 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1100 | Lexmark Multifunction Printer: Schwachstelle ermöglicht Codeausführung | 2025-05-19T22:00:00.000+00:00 | 2025-05-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1099 | VMware Tanzu Spring Security: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-19T22:00:00.000+00:00 | 2025-05-19T22:00:00.000+00:00 |
| wid-sec-w-2025-0978 | Drupal Erweiterungen: Mehrere Schwachstellen | 2025-05-07T22:00:00.000+00:00 | 2025-05-19T22:00:00.000+00:00 |
| wid-sec-w-2025-0959 | Samsung Exynos: Mehrere Schwachstellen | 2025-05-06T22:00:00.000+00:00 | 2025-05-19T22:00:00.000+00:00 |
| wid-sec-w-2025-0828 | Oracle Database Server: Mehrere Schwachstellen | 2025-04-15T22:00:00.000+00:00 | 2025-05-19T22:00:00.000+00:00 |
| wid-sec-w-2024-0218 | Red Hat Enterprise Linux's oniguruma, tcpslice, c-ares: Mehrere Schwachstellen | 2024-01-25T23:00:00.000+00:00 | 2025-05-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1095 | HCL Domino Volt und Leap: Mehrere Schwachstellen | 2025-05-18T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1094 | QT: Schwachstelle ermöglicht Privilegieneskalation | 2025-05-18T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1093 | IBM Security Guardium: Schwachstelle ermöglicht Manipulation von Dateien | 2025-05-18T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1092 | D-LINK DAP-2695 Router: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2025-05-18T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1091 | Netgate pfSense: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2025-05-18T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1090 | WatchGuard Firebox: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2025-05-18T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1088 | Fluentd: Schwachstelle ermöglicht Denial of Service | 2021-10-28T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1087 | GitLab: Mehrere Schwachstellen | 2020-09-02T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1086 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Offenlegung von Informationen | 2018-07-24T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1085 | Ruby on Rails: Mehrere Schwachstellen | 2016-01-25T23:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1084 | ESRI ArcGIS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-15T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1083 | Netgate pfSense: Mehrere Schwachstellen | 2025-05-15T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1082 | Nextcloud: Mehrere Schwachstellen | 2025-05-15T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1081 | Google Cloud Platform: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-15T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1066 | Hitachi Ops Center: Mehrere Schwachstellen | 2025-05-14T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-0804 | Oracle Virtualization: Mehrere Schwachstellen | 2025-04-15T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-0769 | Microsoft Office: Mehrere Schwachstellen | 2025-04-08T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-0758 | Ivanti Endpoint Manager: Mehrere Schwachstellen | 2025-04-08T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-0750 | Microsoft Outlook für Android: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-04-08T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2025-0748 | Microsoft DeveloperTools: Mehrere Schwachstellen | 2025-04-08T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2024-3448 | OpenAFS: Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2024-3205 | Ruby on Rails: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-10-15T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2024-1292 | Ruby on Rails: Mehrere Schwachstellen | 2024-06-04T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2024-0462 | Ruby on Rails: Mehrere Schwachstellen | 2024-02-21T23:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2020:2067 | Red Hat Security Advisory: Red Hat build of Thorntail 2.5.1 security and bug fix update | 2020-05-18T10:24:57+00:00 | 2026-02-28T00:55:15+00:00 |
| rhsa-2020:0962 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update | 2020-03-24T11:31:04+00:00 | 2026-02-28T00:55:14+00:00 |
| rhsa-2020:0951 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.7 security update | 2020-03-23T20:13:32+00:00 | 2026-02-28T00:55:13+00:00 |
| rhsa-2020:0804 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.7 on RHEL 6 security update | 2020-03-12T17:05:52+00:00 | 2026-02-28T00:55:11+00:00 |
| rhsa-2020:0811 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.7 security update | 2020-03-12T17:00:20+00:00 | 2026-02-28T00:55:08+00:00 |
| rhsa-2020:0806 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.7 on RHEL 8 security update | 2020-03-12T17:02:57+00:00 | 2026-02-28T00:55:08+00:00 |
| rhsa-2020:0805 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.7 on RHEL 7 security update | 2020-03-12T17:07:00+00:00 | 2026-02-28T00:55:08+00:00 |
| rhsa-2019:1712 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 7 security and bug fix update | 2019-07-09T13:55:40+00:00 | 2026-02-28T00:55:08+00:00 |
| rhsa-2019:3931 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.2 security release | 2019-11-20T16:04:24+00:00 | 2026-02-28T00:55:06+00:00 |
| rhsa-2019:3929 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.2 security release | 2019-11-20T16:08:26+00:00 | 2026-02-28T00:55:06+00:00 |
| rhsa-2019:2205 | Red Hat Security Advisory: tomcat security, bug fix, and enhancement update | 2019-08-06T13:01:58+00:00 | 2026-02-28T00:55:04+00:00 |
| rhsa-2019:1529 | Red Hat Security Advisory: pki-deps:10.6 security update | 2019-06-18T17:22:10+00:00 | 2026-02-28T00:55:03+00:00 |
| rhsa-2019:0451 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.0 Service Pack 2 security and bug fix update | 2019-03-04T17:36:51+00:00 | 2026-02-28T00:55:03+00:00 |
| rhsa-2019:0450 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.0 Service Pack 2 security and bug fix update | 2019-03-04T17:35:02+00:00 | 2026-02-28T00:55:02+00:00 |
| rhsa-2018:3768 | Red Hat Security Advisory: Red Hat Fuse 7.2 security update | 2018-12-04T16:00:23+00:00 | 2026-02-28T00:55:02+00:00 |
| rhsa-2018:2470 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 4 security and bug fix update | 2018-08-16T14:50:36+00:00 | 2026-02-28T00:55:01+00:00 |
| rhsa-2018:2469 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 4 security and bug fix update | 2018-08-16T15:01:18+00:00 | 2026-02-28T00:54:59+00:00 |
| rhsa-2025:8395 | Red Hat Security Advisory: rsync security update | 2025-06-02T21:24:57+00:00 | 2026-02-28T00:54:53+00:00 |
| rhsa-2025:8314 | Red Hat Security Advisory: zlib security update | 2025-05-29T13:39:51+00:00 | 2026-02-28T00:54:53+00:00 |
| rhsa-2025:13947 | Red Hat Security Advisory: rsync security update | 2025-08-18T01:20:03+00:00 | 2026-02-28T00:54:50+00:00 |
| rhsa-2025:12013 | Red Hat Security Advisory: rsync security update | 2025-07-29T00:20:18+00:00 | 2026-02-28T00:54:50+00:00 |
| rhsa-2025:11048 | Red Hat Security Advisory: rsync security update | 2025-07-15T00:31:43+00:00 | 2026-02-28T00:54:49+00:00 |
| rhsa-2025:10541 | Red Hat Security Advisory: rsync security update | 2025-07-08T00:18:38+00:00 | 2026-02-28T00:54:47+00:00 |
| rhsa-2017:3453 | Red Hat Security Advisory: java-1.8.0-ibm security update | 2017-12-13T16:48:15+00:00 | 2026-02-28T00:54:45+00:00 |
| rhsa-2017:3047 | Red Hat Security Advisory: java-1.6.0-sun security update | 2017-10-24T12:09:09+00:00 | 2026-02-28T00:54:43+00:00 |
| rhsa-2017:3046 | Red Hat Security Advisory: java-1.7.0-oracle security update | 2017-10-24T12:14:29+00:00 | 2026-02-28T00:54:37+00:00 |
| rhsa-2017:2999 | Red Hat Security Advisory: java-1.8.0-oracle security update | 2017-10-23T07:44:37+00:00 | 2026-02-28T00:54:37+00:00 |
| rhsa-2017:1222 | Red Hat Security Advisory: java-1.6.0-ibm security update | 2017-05-10T12:43:49+00:00 | 2026-02-28T00:54:36+00:00 |
| rhsa-2017:1221 | Red Hat Security Advisory: java-1.7.1-ibm security update | 2017-05-10T12:44:04+00:00 | 2026-02-28T00:54:28+00:00 |
| rhsa-2017:1220 | Red Hat Security Advisory: java-1.8.0-ibm security update | 2017-05-10T12:44:34+00:00 | 2026-02-28T00:54:27+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-193-08 | Siemens Mendix Encryption Module | 2024-07-09T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-193-04 | Siemens Simcenter Femap | 2024-07-09T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-193-01 | Siemens Remote Connect Server | 2024-07-09T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-165-06 | Siemens TIM 1531 IRC | 2024-06-11T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-116-03 | Siemens RUGGEDCOM APE1808 devices configured with Palo Alto Networks Virtual NGFW | 2024-04-19T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-23-285-08 | Siemens SINEC NMS | 2023-10-10T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-22-167-17 | Siemens OpenSSL Affecting Industrial Products | 2022-06-14T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-20-042-04 | Siemens PROFINET-IO Stack (Update H) | 2020-02-11T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-19-283-02 | Siemens PROFINET Devices (Update K) | 2019-10-08T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-17-339-01 | Siemens Industrial Products (Update S) | 2017-11-23T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-184-02 | mySCADA myPRO | 2024-07-02T06:00:00.000000Z | 2024-07-02T06:00:00.000000Z |
| icsa-24-184-01 | Johnson Controls Kantech Door Controllers | 2024-07-02T06:00:00.000000Z | 2024-07-02T06:00:00.000000Z |
| icsa-24-179-07 | Johnson Controls Illustra Essentials Gen 4 (Update A) | 2024-06-27T06:00:00.000000Z | 2024-07-02T06:00:00.000000Z |
| icsa-24-179-06 | Johnson Controls Illustra Essentials Gen 4 (Update A) | 2024-06-27T06:00:00.000000Z | 2024-07-02T06:00:00.000000Z |
| icsa-24-179-05 | Johnson Controls Illustra Essentials Gen 4 (Update A) | 2024-06-27T06:00:00.000000Z | 2024-07-02T06:00:00.000000Z |
| icsa-24-179-04 | Johnson Controls Illustra Essentials Gen 4 (Update A) | 2024-06-27T06:00:00.000000Z | 2024-07-02T06:00:00.000000Z |
| icsa-24-177-02 | PTC Creo Elements/Direct License Server (Update A) | 2024-06-25T06:00:00.000000Z | 2024-07-02T06:00:00.000000Z |
| icsa-24-179-03 | Yokogawa FAST/TOOLS and CI Server | 2024-06-27T06:00:00.000000Z | 2024-06-27T06:00:00.000000Z |
| icsa-24-179-02 | SDG Technologies PnPSCADA | 2024-06-27T06:00:00.000000Z | 2024-06-27T06:00:00.000000Z |
| icsa-24-179-01 | TELSAT marKoni FM Transmitter | 2024-06-27T06:00:00.000000Z | 2024-06-27T06:00:00.000000Z |
| icsa-24-177-01 | ABB 800xA Base | 2024-06-25T06:00:00.000000Z | 2024-06-25T06:00:00.000000Z |
| icsa-24-172-03 | Westermo L210-F2G | 2024-06-20T06:00:00.000000Z | 2024-06-20T06:00:00.000000Z |
| icsa-24-172-02 | CAREL Boss-Mini | 2024-06-20T06:00:00.000000Z | 2024-06-20T06:00:00.000000Z |
| icsa-24-172-01 | Yokogawa CENTUM | 2024-06-20T06:00:00.000000Z | 2024-06-20T06:00:00.000000Z |
| icsa-24-170-01 | RAD Data Communications SecFlow-2 | 2024-06-18T06:00:00.000000Z | 2024-06-18T06:00:00.000000Z |
| icsa-24-165-19 | Motorola Solutions Vigilant License Plate Readers | 2024-06-13T06:00:00.000000Z | 2024-06-13T06:00:00.000000Z |
| icsa-24-165-18 | Rockwell Automation FactoryTalk View SE | 2024-06-13T06:00:00.000000Z | 2024-06-13T06:00:00.000000Z |
| icsa-24-165-17 | Rockwell Automation FactoryTalk View SE | 2024-06-13T06:00:00.000000Z | 2024-06-13T06:00:00.000000Z |
| icsa-24-165-16 | Rockwell Automation FactoryTalk View SE | 2024-06-13T06:00:00.000000Z | 2024-06-13T06:00:00.000000Z |
| icsa-24-165-14 | Fuji Electric Tellus Lite V-Simulator | 2024-06-13T06:00:00.000000Z | 2024-06-13T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-prime-collab-xss-fqmde5go | Cisco Prime Collaboration Provisioning Cross-Site Scripting Vulnerability | 2021-09-01T16:00:00+00:00 | 2021-09-01T16:00:00+00:00 |
| cisco-sa-prime-collab-xss-fQMDE5GO | Cisco Prime Collaboration Provisioning Cross-Site Scripting Vulnerability | 2021-09-01T16:00:00+00:00 | 2021-09-01T16:00:00+00:00 |
| cisco-sa-nfvis-g2dmvvh | Cisco Enterprise NFV Infrastructure Software Authentication Bypass Vulnerability | 2021-09-01T16:00:00+00:00 | 2021-09-01T16:00:00+00:00 |
| cisco-sa-nfvis-g2DMVVh | Cisco Enterprise NFV Infrastructure Software Authentication Bypass Vulnerability | 2021-09-01T16:00:00+00:00 | 2021-09-01T16:00:00+00:00 |
| cisco-sa-ise-xss-4hnzfewr | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2021-09-01T16:00:00+00:00 | 2021-09-01T16:00:00+00:00 |
| cisco-sa-ise-xss-4HnZFewr | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2021-09-01T16:00:00+00:00 | 2021-09-01T16:00:00+00:00 |
| cisco-sa-insight-infodis-2by2zpbb | Cisco Nexus Insights Authenticated Information Disclosure Vulnerability | 2021-09-01T16:00:00+00:00 | 2021-09-01T16:00:00+00:00 |
| cisco-sa-insight-infodis-2By2ZpBB | Cisco Nexus Insights Authenticated Information Disclosure Vulnerability | 2021-09-01T16:00:00+00:00 | 2021-09-01T16:00:00+00:00 |
| cisco-sa-dnsmasq-dns-2021-c5mrdf3g | Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021 | 2021-01-19T12:15:00+00:00 | 2021-08-30T17:24:42+00:00 |
| cisco-sa-ucs-ssh-dos-mgvmyrqy | Cisco UCS Manager Software SSH Sessions Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-ucs-ssh-dos-MgvmyrQy | Cisco UCS Manager Software SSH Sessions Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-nxos-ngoam-dos-ltdb9hv | Cisco NX-OS Software VXLAN OAM (NGOAM) Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-nxos-ngoam-dos-LTDb9Hv | Cisco NX-OS Software VXLAN OAM (NGOAM) Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-nxos-login-blockfor-rwjgvecu | Cisco NX-OS Software system login block-for Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-nxos-login-blockfor-RwjGVEcu | Cisco NX-OS Software system login block-for Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-nexus-acl-vrvqypve | Cisco Nexus 9500 Series Switches Access Control List Bypass Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-nexus-acl-vrvQYPVe | Cisco Nexus 9500 Series Switches Access Control List Bypass Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-naci-mdvul-vrkvgnu | Cisco Nexus 9000 Series Fabric Switches ACI Mode Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-naci-mdvul-vrKVgNU | Cisco Nexus 9000 Series Fabric Switches ACI Mode Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-naci-afr-utjfo2d7 | Cisco Nexus 9000 Series Fabric Switches ACI Mode Arbitrary File Read Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-naci-afr-UtjfO2D7 | Cisco Nexus 9000 Series Fabric Switches ACI Mode Arbitrary File Read Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-n9kaci-queue-wedge-clddefkf | Cisco Nexus 9000 Series Fabric Switches ACI Mode Queue Wedge Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-n9kaci-queue-wedge-cLDDEfKF | Cisco Nexus 9000 Series Fabric Switches ACI Mode Queue Wedge Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-capic-scss-bft75yrm | Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-capic-scss-bFT75YrM | Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-capic-pesc-pkmgk4j | Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-capic-pesc-pkmGK4J | Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-20190515-nxos-pyth-escal | Cisco NX-OS Software Python Parser Privilege Escalation Vulnerability | 2019-05-15T16:00:00+00:00 | 2021-08-25T15:49:16+00:00 |
| cisco-sa-qnx-toxjvpdl | BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021 | 2021-08-18T16:00:00+00:00 | 2021-08-25T14:44:04+00:00 |
| cisco-sa-qnx-TOxjVPdL | BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021 | 2021-08-18T16:00:00+00:00 | 2021-08-25T14:44:04+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38038 | cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost | 2025-06-02T00:00:00.000Z | 2026-02-18T14:50:51.000Z |
| msrc_cve-2023-6864 | Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121. | 2023-12-01T08:00:00.000Z | 2026-02-18T14:50:48.000Z |
| msrc_cve-2024-47673 | wifi: iwlwifi: mvm: pause TCM when the firmware is stopped | 2024-10-01T07:00:00.000Z | 2026-02-18T14:50:47.000Z |
| msrc_cve-2026-0716 | Libsoup: out-of-bounds read in libsoup websocket frame processing | 2026-01-02T00:00:00.000Z | 2026-02-18T14:50:43.000Z |
| msrc_cve-2025-38048 | virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN | 2025-06-02T00:00:00.000Z | 2026-02-18T14:50:26.000Z |
| msrc_cve-2022-46883 | Mozilla developers Gabriele Svelto, Yulia Startsev, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 106. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.<br />*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 107. This vulnerability affects Firefox < 107. | 2022-12-02T00:00:00.000Z | 2026-02-18T14:50:22.000Z |
| msrc_cve-2024-40997 | cpufreq: amd-pstate: fix memory leak on CPU EPP exit | 2024-07-01T07:00:00.000Z | 2026-02-18T14:50:18.000Z |
| msrc_cve-2024-25710 | Apache Commons Compress: Denial of service caused by an infinite loop for a corrupted DUMP file | 2024-02-02T08:00:00.000Z | 2026-02-18T14:50:17.000Z |
| msrc_cve-2024-47695 | RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds | 2024-10-01T07:00:00.000Z | 2026-02-18T14:50:09.000Z |
| msrc_cve-2025-47711 | Nbdkit: nbdkit-server: off-by-one error when processing block status may lead to a denial of service | 2025-06-02T00:00:00.000Z | 2026-02-18T14:50:03.000Z |
| msrc_cve-2017-11697 | The __hash_open function in hash.c:229 in Mozilla Network Security Services (NSS) allows context-dependent attackers to cause a denial of service (floating point exception and crash) via a crafted cert8.db file. | 2017-12-02T00:00:00.000Z | 2026-02-18T14:50:03.000Z |
| msrc_cve-2026-0915 | getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler | 2026-01-02T00:00:00.000Z | 2026-02-18T14:49:58.000Z |
| msrc_cve-2025-38077 | platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() | 2025-06-02T00:00:00.000Z | 2026-02-18T14:49:58.000Z |
| msrc_cve-2023-52639 | KVM: s390: vsie: fix race during shadow creation | 2024-04-02T07:00:00.000Z | 2026-02-18T14:49:57.000Z |
| msrc_cve-2021-32714 | Integer Overflow in Chunked Transfer-Encoding | 2021-07-02T00:00:00.000Z | 2026-02-18T14:49:54.000Z |
| msrc_cve-2017-15042 | An unintended cleartext issue exists in Go before 1.8.4 and 1.9.x before 1.9.1. RFC 4954 requires that, during SMTP, the PLAIN auth scheme must only be used on network connections secured with TLS. The original implementation of smtp.PlainAuth in Go 1.0 enforced this requirement, and it was documented to do so. In 2013, upstream issue #5184, this was changed so that the server may decide whether PLAIN is acceptable. The result is that if you set up a man-in-the-middle SMTP server that doesn't advertise STARTTLS and does advertise that PLAIN auth is OK, the smtp.PlainAuth implementation sends the username and password. | 2017-10-02T00:00:00.000Z | 2026-02-18T14:49:38.000Z |
| msrc_cve-2024-40996 | bpf: Avoid splat in pskb_pull_reason | 2024-07-01T07:00:00.000Z | 2026-02-18T14:49:37.000Z |
| msrc_cve-2024-26147 | Helm's Missing YAML Content Leads To Panic | 2024-02-02T08:00:00.000Z | 2026-02-18T14:49:37.000Z |
| msrc_cve-2024-53580 | iperf v3.17.1 was discovered to contain a segmentation violation via the iperf_exchange_parameters() function. | 2024-12-02T00:00:00.000Z | 2026-02-18T14:49:36.000Z |
| msrc_cve-2024-26646 | thermal: intel: hfi: Add syscore callbacks for system-wide PM | 2024-03-02T08:00:00.000Z | 2026-02-18T14:49:31.000Z |
| msrc_cve-2025-38061 | net: pktgen: fix access outside of user given buffer in pktgen_thread_write() | 2025-06-02T00:00:00.000Z | 2026-02-18T14:49:28.000Z |
| msrc_cve-2024-49851 | tpm: Clean up TPM space after command failure | 2024-10-01T07:00:00.000Z | 2026-02-18T14:49:28.000Z |
| msrc_cve-2025-47712 | Nbd: nbdkit: integer overflow triggers an assertion resulting in denial of service | 2025-06-02T00:00:00.000Z | 2026-02-18T14:49:21.000Z |
| msrc_cve-2024-24785 | Errors returned from JSON marshaling may break template escaping in html/template | 2024-03-02T08:00:00.000Z | 2026-02-18T14:49:14.000Z |
| msrc_cve-2026-0897 | Denial of Service in Keras via Excessive Memory Allocation in HDF5 Metadata | 2026-01-02T00:00:00.000Z | 2026-02-18T14:49:12.000Z |
| msrc_cve-2022-49516 | ice: always check VF VSI pointer values | 2025-02-02T00:00:00.000Z | 2026-02-18T14:49:06.000Z |
| msrc_cve-2024-40960 | ipv6: prevent possible NULL dereference in rt6_probe() | 2024-07-01T07:00:00.000Z | 2026-02-18T14:49:05.000Z |
| msrc_cve-2024-23829 | aiohttp's HTTP parser (the python one, not llhttp) still overly lenient about separators | 2024-01-01T08:00:00.000Z | 2026-02-18T14:49:03.000Z |
| msrc_cve-2022-48833 | btrfs: skip reserved bytes warning on unmount after log cleanup failure | 2024-07-01T07:00:00.000Z | 2026-02-18T14:49:03.000Z |
| msrc_cve-2025-38065 | orangefs: Do not truncate file size | 2025-06-02T00:00:00.000Z | 2026-02-18T14:48:59.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:14707-1 | openvpn-2.6.10-5.1 on GA media | 2025-01-28T00:00:00Z | 2025-01-28T00:00:00Z |
| opensuse-su-2025:14706-1 | corepack22-22.13.0-1.1 on GA media | 2025-01-28T00:00:00Z | 2025-01-28T00:00:00Z |
| opensuse-su-2025:14705-1 | kernel-devel-longterm-6.12.11-1.1 on GA media | 2025-01-28T00:00:00Z | 2025-01-28T00:00:00Z |
| opensuse-su-2025:14704-1 | govulncheck-vulndb-0.0.20250117T214834-1.1 on GA media | 2025-01-28T00:00:00Z | 2025-01-28T00:00:00Z |
| opensuse-su-2025:14703-1 | apache2-mod_security2-2.9.8-2.1 on GA media | 2025-01-28T00:00:00Z | 2025-01-28T00:00:00Z |
| opensuse-su-2025:0034-1 | Security update for chromium | 2025-01-27T07:28:18Z | 2025-01-27T07:28:18Z |
| opensuse-su-2025:14702-1 | python311-sentry-sdk-2.20.0-1.1 on GA media | 2025-01-27T00:00:00Z | 2025-01-27T00:00:00Z |
| opensuse-su-2025:14701-1 | python311-asteval-1.0.6-1.1 on GA media | 2025-01-27T00:00:00Z | 2025-01-27T00:00:00Z |
| opensuse-su-2025:14700-1 | iperf-3.18-1.1 on GA media | 2025-01-27T00:00:00Z | 2025-01-27T00:00:00Z |
| opensuse-su-2025:14699-1 | gstreamer-plugins-good-1.24.11-2.1 on GA media | 2025-01-27T00:00:00Z | 2025-01-27T00:00:00Z |
| opensuse-su-2025:14698-1 | chromedriver-132.0.6834.110-1.1 on GA media | 2025-01-26T00:00:00Z | 2025-01-26T00:00:00Z |
| opensuse-su-2025:0033-1 | Security update for qt6-connectivity | 2025-01-25T17:01:16Z | 2025-01-25T17:01:16Z |
| opensuse-su-2025:14697-1 | ruby3.4-rubygem-nokogiri-1.18.2-1.1 on GA media | 2025-01-25T00:00:00Z | 2025-01-25T00:00:00Z |
| opensuse-su-2025:14696-1 | libopenssl-3-devel-3.2.3-4.1 on GA media | 2025-01-25T00:00:00Z | 2025-01-25T00:00:00Z |
| opensuse-su-2025:14695-1 | go1.23-1.23.5-1.1 on GA media | 2025-01-25T00:00:00Z | 2025-01-25T00:00:00Z |
| opensuse-su-2025:14694-1 | go1.22-1.22.11-1.1 on GA media | 2025-01-25T00:00:00Z | 2025-01-25T00:00:00Z |
| opensuse-su-2025:14693-1 | go1.24-1.24rc2-1.1 on GA media | 2025-01-24T00:00:00Z | 2025-01-24T00:00:00Z |
| opensuse-su-2025:0030-1 | Security update for dante | 2025-01-23T19:01:59Z | 2025-01-23T19:01:59Z |
| opensuse-su-2025:0025-1 | Security update for cheat | 2025-01-23T19:01:34Z | 2025-01-23T19:01:34Z |
| opensuse-su-2025:0024-1 | Security update for qt6-webengine | 2025-01-23T09:21:43Z | 2025-01-23T09:21:43Z |
| opensuse-su-2025:14692-1 | libQt6Bluetooth6-6.8.1-2.1 on GA media | 2025-01-23T00:00:00Z | 2025-01-23T00:00:00Z |
| opensuse-su-2025:14691-1 | python313-3.13.1-1.1 on GA media | 2025-01-23T00:00:00Z | 2025-01-23T00:00:00Z |
| opensuse-su-2025:14690-1 | python311-azure-storage-blob-12.24.1-1.1 on GA media | 2025-01-23T00:00:00Z | 2025-01-23T00:00:00Z |
| opensuse-su-2025:14689-1 | podman-5.3.2-1.1 on GA media | 2025-01-23T00:00:00Z | 2025-01-23T00:00:00Z |
| opensuse-su-2025:14688-1 | phpMyAdmin-5.2.2-1.1 on GA media | 2025-01-23T00:00:00Z | 2025-01-23T00:00:00Z |
| opensuse-su-2025:14687-1 | nodejs-electron-33.3.2-1.1 on GA media | 2025-01-23T00:00:00Z | 2025-01-23T00:00:00Z |
| opensuse-su-2025:14686-1 | java-21-openjdk-21.0.6.0-1.1 on GA media | 2025-01-23T00:00:00Z | 2025-01-23T00:00:00Z |
| opensuse-su-2025:14685-1 | java-11-openjdk-11.0.26.0-1.1 on GA media | 2025-01-23T00:00:00Z | 2025-01-23T00:00:00Z |
| opensuse-su-2025:14684-1 | helmfile-0.170.1-1.1 on GA media | 2025-01-23T00:00:00Z | 2025-01-23T00:00:00Z |
| opensuse-su-2025:14683-1 | clamav-1.4.2-1.1 on GA media | 2025-01-23T00:00:00Z | 2025-01-23T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-605 | Heap-buffer-overflow in mrb_bint_cmp | 2022-07-21T00:00:15.226959Z | 2022-07-21T00:00:15.227263Z |
| osv-2022-604 | Stack-buffer-overflow in sc_asn1_read_tag | 2022-07-20T00:01:45.985390Z | 2022-07-20T00:01:45.985682Z |
| osv-2022-603 | Heap-buffer-overflow in mrb_vm_exec | 2022-07-20T00:01:44.769746Z | 2022-07-20T00:01:44.769985Z |
| osv-2022-601 | Heap-buffer-overflow in mrb_bint_xor | 2022-07-20T00:00:17.741225Z | 2022-07-20T00:00:17.741572Z |
| osv-2022-600 | Segv on unknown address in mrb_bint_to_s | 2022-07-20T00:00:13.612086Z | 2022-07-20T00:00:13.612334Z |
| osv-2022-598 | Heap-buffer-overflow in get_symbols_64 | 2022-07-19T00:02:00.850559Z | 2022-07-19T00:02:00.850820Z |
| osv-2022-594 | Container-overflow in STOFFStarMathToMMLConverterInternal::Parser::convert | 2022-07-19T00:01:28.212413Z | 2022-07-19T00:01:28.212684Z |
| osv-2022-590 | Heap-use-after-free in .tmpoLlNv4 | 2022-07-19T00:00:24.803758Z | 2022-07-19T00:00:24.804013Z |
| osv-2022-588 | Heap-use-after-free in wasmtime_runtime::externref::gc::hcbc8e23ae41614fa | 2022-07-19T00:00:07.311785Z | 2022-07-19T00:00:07.312090Z |
| osv-2022-108 | Heap-buffer-overflow in void apply_string<GSUBProxy> | 2022-01-31T00:01:43.533565Z | 2022-07-18T02:26:29.025862Z |
| osv-2022-580 | Heap-buffer-overflow in jxl::N_AVX2::BlendingStage::ProcessPaddingRow | 2022-07-13T00:02:03.212239Z | 2022-07-13T00:02:03.212489Z |
| osv-2022-578 | Heap-buffer-overflow in mrb_bint_to_s | 2022-07-13T00:02:00.667751Z | 2022-07-13T00:02:00.667996Z |
| osv-2022-577 | Heap-use-after-free in jsmn_parse | 2022-07-13T00:01:36.106912Z | 2022-07-13T00:01:36.107146Z |
| osv-2022-571 | Use-of-uninitialized-value in LZ4_compress_fast_extState_fastReset | 2022-07-11T00:01:33.842818Z | 2022-07-11T00:01:33.843061Z |
| osv-2022-564 | Heap-buffer-overflow in sc_pkcs15_allocate_object_content | 2022-07-10T00:01:59.838881Z | 2022-07-10T00:01:59.839151Z |
| osv-2022-563 | Use-of-uninitialized-value in LZ4HC_compress_generic_noDictCtx | 2022-07-10T00:01:51.341319Z | 2022-07-10T00:01:51.341599Z |
| osv-2022-562 | UNKNOWN WRITE in udiv | 2022-07-10T00:01:06.487981Z | 2022-07-10T00:01:06.488225Z |
| osv-2022-557 | Heap-buffer-overflow in emit_goto | 2022-07-10T00:00:08.803034Z | 2022-07-10T00:00:08.803287Z |
| osv-2021-710 | Heap-use-after-free in iov_from_buf_full | 2021-05-01T00:00:22.994253Z | 2022-07-09T00:39:34.474998Z |
| osv-2021-617 | Stack-use-after-return in v9fs_setattr | 2021-04-09T00:00:27.093027Z | 2022-07-09T00:38:04.296171Z |
| osv-2022-556 | UNKNOWN READ in mrb_bint_cmp | 2022-07-09T00:01:42.436937Z | 2022-07-09T00:01:42.437163Z |
| osv-2022-551 | Heap-buffer-overflow in fixup_pcap_pkthdr | 2022-07-09T00:00:45.162171Z | 2022-07-09T00:00:45.162417Z |
| osv-2022-550 | Heap-use-after-free in mrb_bint_new_str | 2022-07-09T00:00:43.820059Z | 2022-07-09T00:00:43.820285Z |
| osv-2022-549 | Invalid-free in round_trip_fuzzer.c | 2022-07-09T00:00:25.413389Z | 2022-07-09T00:00:25.413619Z |
| osv-2021-1176 | Index-out-of-bounds in draco::MeshEdgebreakerTraversalValenceDecoder::DecodeSymbol | 2021-08-29T00:00:08.242884Z | 2022-07-08T00:09:40.094418Z |
| osv-2021-1177 | Stack-buffer-overflow in bool draco::FloatPointsTreeDecoder::DecodePointCloud<draco::PointAttributeVector | 2021-08-29T00:01:18.789522Z | 2022-07-08T00:09:39.559498Z |
| osv-2021-1183 | UNKNOWN WRITE in draco::DepthFirstTraverser<draco::CornerTable, draco::MeshAttributeIndicesEncodi | 2021-09-01T00:00:21.323146Z | 2022-07-08T00:09:38.379641Z |
| osv-2021-1640 | Global-buffer-overflow in draco::MeshEdgebreakerDecoderImpl<draco::MeshEdgebreakerTraversalValenceDecoder> | 2021-12-02T00:01:06.640577Z | 2022-07-08T00:09:36.686740Z |
| osv-2021-1181 | Heap-buffer-overflow in draco::MeshPredictionSchemeTexCoordsDecoder<int, draco::PredictionSchemeWrapDeco | 2021-08-31T00:00:29.155871Z | 2022-07-08T00:09:36.944195Z |
| osv-2022-543 | Index-out-of-bounds in decode_coefs | 2022-07-08T00:00:44.687010Z | 2022-07-08T00:00:44.687286Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tensorflow-2021-29606 | Heap OOB read in TFLite | 2024-03-06T11:18:11.890Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29605 | Integer overflow in TFLite memory allocation | 2024-03-06T11:18:13.142Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29604 | Division by zero in TFLite's implementation of hashtable lookup | 2024-03-06T11:18:14.391Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29603 | Heap OOB write in TFLite | 2024-03-06T11:18:15.660Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29602 | Division by zero in TFLite's implementation of `DepthwiseConv` | 2024-03-06T11:18:16.905Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29601 | Integer overflow in TFLite concatentation | 2024-03-06T11:18:18.197Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29600 | Division by zero in TFLite's implementation of `OneHot` | 2024-03-06T11:18:19.505Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29599 | Division by zero in TFLite's implementation of `Split` | 2024-03-06T11:18:20.763Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29598 | Division by zero in TFLite's implementation of `SVDF` | 2024-03-06T11:18:22.016Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29597 | Division by zero in TFLite's implementation of `SpaceToBatchNd` | 2024-03-06T11:18:23.269Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29596 | Division by zero in TFLite's implementation of `EmbeddingLookup` | 2024-03-06T11:18:24.521Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29595 | Division by zero in TFLite's implementation of `DepthToSpace` | 2024-03-06T11:18:25.797Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29594 | Division by zero in TFLite's convolution code | 2024-03-06T11:18:27.079Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29593 | Division by zero in TFLite's implementation of `BatchToSpaceNd` | 2024-03-06T11:18:28.291Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29592 | Null pointer dereference in TFLite's `Reshape` operator | 2024-03-06T11:18:29.538Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29591 | Stack overflow due to looping TFLite subgraph | 2024-03-06T11:18:30.811Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29590 | Heap OOB read in TFLite's implementation of `Minimum` or `Maximum` | 2024-03-06T11:18:32.081Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29589 | Division by zero in TFLite's implementation of `GatherNd` | 2024-03-06T11:18:33.323Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29588 | Division by zero in TFLite's implementation of `TransposeConv` | 2024-03-06T11:18:34.591Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29587 | Division by zero in TFLite's implementation of `SpaceToDepth` | 2024-03-06T11:18:35.864Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29586 | Division by zero in optimized pooling implementations in TFLite | 2024-03-06T11:18:37.092Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29585 | Division by zero in padding computation in TFLite | 2024-03-06T11:18:38.409Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29584 | CHECK-fail due to integer overflow | 2024-03-06T11:18:39.665Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29583 | Heap buffer overflow and undefined behavior in `FusedBatchNorm` | 2024-03-06T11:18:40.954Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29582 | Heap OOB read in `tf.raw_ops.Dequantize` | 2024-03-06T11:18:42.277Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29581 | Segfault in `CTCBeamSearchDecoder` | 2024-03-06T11:18:43.535Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29580 | Undefined behavior and `CHECK`-fail in `FractionalMaxPoolGrad` | 2024-03-06T11:18:44.771Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29579 | Heap buffer overflow in `MaxPoolGrad` | 2024-03-06T11:18:45.994Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29578 | Heap buffer overflow in `FractionalAvgPoolGrad` | 2024-03-06T11:18:47.276Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29577 | Heap buffer overflow in `AvgPool3DGrad` | 2024-03-06T11:18:48.556Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-200609-1335 | OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a de… | 2024-06-11T21:44:28.628000Z |
| var-202308-0239 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T21:37:33.070000Z |
| var-202107-1608 | Affected devices contain a vulnerability that allows an unauthenticated attacker to trigg… | 2024-06-11T21:23:54.270000Z |
| var-200609-1025 | The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not prope… | 2024-06-11T21:00:15.795000Z |
| var-202311-0434 | Affected devices do not properly validate the length of inputs when performing certain co… | 2024-06-11T20:49:25.151000Z |
| var-202308-0235 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T20:44:06.833000Z |
| var-202308-0236 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T20:39:39.547000Z |
| var-202308-0242 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T20:29:19.020000Z |
| var-202301-0605 | Affected devices do not contain an Immutable Root of Trust in Hardware. With this the int… | 2024-06-11T20:07:07.374000Z |
| var-202308-0237 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T20:04:39.157000Z |
| var-202308-0234 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T19:29:50.522000Z |
| var-202101-0146 | A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) al… | 2024-06-10T23:02:24.713000Z |
| var-202401-1629 | Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC … | 2024-06-10T23:02:20.710000Z |
| var-202103-1564 | Netty is an open-source, asynchronous event-driven network application framework for rapi… | 2024-06-10T21:06:19.954000Z |
| var-200110-0175 | The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.… | 2024-06-10T20:51:29.701000Z |
| var-200609-0685 | The VPN service in Apple Mac OS X 10.3.x through 10.3.9 and 10.4.x through 10.4.8 does no… | 2024-06-10T20:21:01.994000Z |
| var-200405-0014 | Unknown vulnerability in the CUPS printing system in Mac OS X 10.3.3 and Mac OS X 10.2.8 … | 2024-06-09T23:16:08.911000Z |
| var-200407-0077 | Integer overflow in Apple QuickTime (QuickTime.qts) before 6.5.1 allows attackers to exec… | 2024-06-09T23:13:11.097000Z |
| var-200405-0015 | Unknown vulnerability in Mail for Mac OS X 10.3.3 and 10.2.8, with unknown impact, relate… | 2024-06-09T23:11:31.075000Z |
| var-200407-0052 | Argument injection vulnerability in the SSH URI handler for Safari on Mac OS 10.3.3 and e… | 2024-06-09T23:09:18.606000Z |
| var-200411-0076 | Unknown vulnerability in Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 1545… | 2024-06-09T23:07:21.196000Z |
| var-200411-0075 | Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), and ONS 15454 SD before 4.1(3) al… | 2024-06-09T23:07:21.165000Z |
| var-200411-0074 | Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and C… | 2024-06-09T23:07:21.232000Z |
| var-200408-0124 | HP Integrated Lights-Out (iLO) 1.10 and other versions before 1.55 allows remote attacker… | 2024-06-09T23:05:35.469000Z |
| var-200408-0090 | The "Show in Finder" button in the Safari web browser in Mac OS X 10.3.4 and 10.2.8 may e… | 2024-06-09T23:04:44.017000Z |
| var-200406-0041 | Cisco Wireless LAN Solution Engine (WLSE) 2.0 through 2.5 and Hosting Solution Engine (HS… | 2024-06-09T23:04:44.092000Z |
| var-200408-0089 | LaunchServices in Mac OS X 10.3.4 and 10.2.8 automatically registers and executes new app… | 2024-06-09T23:04:43.969000Z |
| var-200411-0149 | Cisco 11000 Series Content Services Switches (CSS) running WebNS 5.0(x) before 05.0(04.07… | 2024-06-09T23:01:32.729000Z |
| var-200408-0113 | Unknown vulnerability in AppleFileServer for Mac OS X 10.3.4, related to "the use of SSH … | 2024-06-09T22:57:27.818000Z |
| var-200408-0112 | Unknown vulnerability in Mac OS X 10.3.4, related to "handling of process IDs during pack… | 2024-06-09T22:57:27.883000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000142 | Cybozu Garoon vulnerable to open redirect | 2016-08-22T15:16+09:00 | 2017-05-23T12:01+09:00 |
| jvndb-2016-000138 | Cybozu Mailwise contains issue in preventing clickjacking attacks | 2016-08-16T14:14+09:00 | 2017-05-23T12:01+09:00 |
| jvndb-2014-000069 | RockDisk vulnerable to cross-site scripting | 2014-07-02T14:40+09:00 | 2017-05-17T17:07+09:00 |
| jvndb-2016-000201 | SetucoCMS vulnerable to session management | 2016-10-07T15:04+09:00 | 2017-05-17T14:44+09:00 |
| jvndb-2016-000200 | SetucoCMS vulnerable to code injection | 2016-10-07T15:04+09:00 | 2017-05-17T14:44+09:00 |
| jvndb-2016-000199 | SetucoCMS vulnerable to denial-of-service (DoS) | 2016-10-07T15:04+09:00 | 2017-05-17T14:44+09:00 |
| jvndb-2016-000198 | SetucoCMS vulnerable to SQL injection | 2016-10-07T15:04+09:00 | 2017-05-17T14:44+09:00 |
| jvndb-2016-000197 | SetucoCMS vulnerable to cross-site scripting | 2016-10-07T15:04+09:00 | 2017-05-17T14:44+09:00 |
| jvndb-2016-000196 | SetucoCMS vulnerable to cross-site request forgery | 2016-10-07T15:04+09:00 | 2017-05-17T14:44+09:00 |
| jvndb-2016-000202 | Usermin cross-site scripting vulnerabilties | 2016-10-07T13:50+09:00 | 2017-05-16T17:52+09:00 |
| jvndb-2017-000033 | PrimeDrive Desktop Application Installer may insecurely load Dynamic Link Libraries | 2017-03-01T15:53+09:00 | 2017-05-15T11:27+09:00 |
| jvndb-2016-000193 | Cybozu Office vulnerable to Reflected File Download (RFD) | 2016-10-03T15:47+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000192 | Cybozu Office vulnerable to denial-of-service (DoS) | 2016-10-03T15:46+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000189 | "Project" function in Cybozu Office vulnerable vulnerable to operation restriction bypass | 2016-10-03T15:43+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000188 | Breadcrumb trail in Cybozu Office vulnerable vulnerable to browse restriction bypass | 2016-10-03T15:43+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000186 | "Schedule" function in Cybozu Office vulnerable to cross-site scripting | 2016-10-03T15:43+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000191 | Cybozu Office vulnerable to information disclosure | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000190 | Cybozu Office vulnerable to mail header injection | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000187 | "Project" function in Cybozu Office vulnerable vulnerable to access restriction bypass | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000185 | "Project" function in Cybozu Office vulnerable to cross-site scripting | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000184 | "Customapp" function in Cybozu Office vulnerable to cross-site scripting | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2017-000066 | The API in Cybozu Office vulnerable to denial-of-service (DoS) | 2017-04-11T16:05+09:00 | 2017-04-11T16:05+09:00 |
| jvndb-2016-006450 | Vulnerability in JP1/Cm2/Network Node Manager i | 2017-03-30T15:01+09:00 | 2017-03-30T15:01+09:00 |
| jvndb-2016-000158 | Zend Framework vulnerable to SQL injection | 2016-09-15T14:11+09:00 | 2017-03-16T14:15+09:00 |
| jvndb-2017-000013 | Nessus vulnerable to cross-site scripting | 2017-01-24T13:38+09:00 | 2017-02-20T17:44+09:00 |
| jvndb-2016-000096 | Apache Struts 1 vulnerability that allows unintended remote operations against components on memory | 2016-06-07T16:26+09:00 | 2017-02-20T15:42+09:00 |
| jvndb-2017-000025 | Apache Brooklyn vulnerable to cross-site scripting | 2017-02-15T16:20+09:00 | 2017-02-15T16:20+09:00 |
| jvndb-2017-000015 | Norton Download Manager may insecurely load Dynamic Link Libraries | 2017-02-10T14:58+09:00 | 2017-02-10T14:58+09:00 |
| jvndb-2017-000012 | Java (OGNL) code execution in Apache Struts 2 when devMode is enabled | 2017-01-20T14:01+09:00 | 2017-01-20T14:01+09:00 |
| jvndb-2014-000048 | OpenSSL improper handling of Change Cipher Spec message | 2014-06-06T13:48+09:00 | 2016-12-27T11:49+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:20644-1 | Security update for kernel-livepatch-MICRO-6-0_Update_8 | 2025-08-29T14:26:41Z | 2025-08-29T14:26:41Z |
| suse-su-2025:20638-1 | Security update for kernel-livepatch-MICRO-6-0_Update_3 | 2025-08-29T14:20:26Z | 2025-08-29T14:20:26Z |
| suse-su-2025:20688-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 | 2025-08-29T14:01:57Z | 2025-08-29T14:01:57Z |
| suse-su-2025:20637-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 | 2025-08-29T14:01:57Z | 2025-08-29T14:01:57Z |
| suse-su-2025:03029-1 | Security update for python-future | 2025-08-29T13:49:15Z | 2025-08-29T13:49:15Z |
| suse-su-2025:03028-1 | Security update for python-future | 2025-08-29T13:49:02Z | 2025-08-29T13:49:02Z |
| suse-su-2025:20687-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 | 2025-08-29T13:42:59Z | 2025-08-29T13:42:59Z |
| suse-su-2025:20686-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-08-29T13:42:59Z | 2025-08-29T13:42:59Z |
| suse-su-2025:20636-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 | 2025-08-29T13:42:59Z | 2025-08-29T13:42:59Z |
| suse-su-2025:20635-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-08-29T13:42:59Z | 2025-08-29T13:42:59Z |
| suse-su-2025:20685-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-08-29T13:36:25Z | 2025-08-29T13:36:25Z |
| suse-su-2025:20634-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-08-29T13:36:25Z | 2025-08-29T13:36:25Z |
| suse-su-2025:20684-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 | 2025-08-29T13:31:00Z | 2025-08-29T13:31:00Z |
| suse-su-2025:20633-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 | 2025-08-29T13:31:00Z | 2025-08-29T13:31:00Z |
| suse-su-2025:03026-1 | Security update for libsoup | 2025-08-29T12:42:45Z | 2025-08-29T12:42:45Z |
| suse-su-2025:03025-1 | Security update for javamail | 2025-08-29T12:42:21Z | 2025-08-29T12:42:21Z |
| suse-su-2025:03024-1 | Security update for tomcat | 2025-08-29T12:40:19Z | 2025-08-29T12:40:19Z |
| suse-su-2025:03023-1 | Security update for the Linux Kernel | 2025-08-29T11:54:08Z | 2025-08-29T11:54:08Z |
| suse-su-2025:03022-1 | Security update for git | 2025-08-29T11:51:56Z | 2025-08-29T11:51:56Z |
| suse-su-2025:03021-1 | Security update for netty | 2025-08-29T09:42:17Z | 2025-08-29T09:42:17Z |
| suse-su-2025:20665-1 | Security update for gnutls | 2025-08-29T09:03:56Z | 2025-08-29T09:03:56Z |
| suse-su-2025:20664-1 | Security update for Mesa | 2025-08-29T08:57:25Z | 2025-08-29T08:57:25Z |
| suse-su-2025:20663-1 | Security update for jbigkit | 2025-08-29T08:57:25Z | 2025-08-29T08:57:25Z |
| suse-su-2025:03020-1 | Security update for postgresql14 | 2025-08-29T08:32:23Z | 2025-08-29T08:32:23Z |
| suse-su-2025:03019-1 | Security update for postgresql14 | 2025-08-29T08:31:52Z | 2025-08-29T08:31:52Z |
| suse-su-2025:03018-1 | Security update for postgresql15 | 2025-08-29T08:31:14Z | 2025-08-29T08:31:14Z |
| suse-su-2025:03017-1 | Security update for udisks2 | 2025-08-29T08:29:57Z | 2025-08-29T08:29:57Z |
| suse-su-2025:03016-1 | Security update for udisks2 | 2025-08-29T08:28:26Z | 2025-08-29T08:28:26Z |
| suse-su-2025:03015-1 | Security update for udisks2 | 2025-08-29T08:28:07Z | 2025-08-29T08:28:07Z |
| suse-su-2025:20662-1 | Security update for polkit | 2025-08-29T07:50:47Z | 2025-08-29T07:50:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-30130 | WordPress ELEX WordPress HelpDesk & Customer Ticketing System plugin未经授权的数据修改漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30129 | WordPress ELEX WordPress HelpDesk&Customer Ticketing System plugin缺少权限检查漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30128 | Devolutions Server输入验证不当漏洞 | 2025-10-31 | 2025-12-05 |
| cnvd-2025-30127 | Devolutions Server未经授权的访问漏洞 | 2025-10-31 | 2025-12-05 |
| cnvd-2025-30126 | Devolutions Server存在未明漏洞(CNVD-2025-30126) | 2025-12-03 | 2025-12-05 |
| cnvd-2025-30125 | Devolutions Server存在未明漏洞 | 2025-12-03 | 2025-12-05 |
| cnvd-2025-30124 | Devolutions Server SQL注入漏洞 | 2025-12-03 | 2025-12-05 |
| cnvd-2025-30218 | Wireshark EAP dissector拒绝服务漏洞 | 2023-01-30 | 2025-12-04 |
| cnvd-2025-30216 | Wireshark拒绝服务漏洞(CNVD-2025-30216) | 2025-06-06 | 2025-12-04 |
| cnvd-2025-30215 | Wireshark缓冲区溢出漏洞(CNVD-2025-30215) | 2025-11-28 | 2025-12-04 |
| cnvd-2025-30214 | Cisco Catalyst Center Virtual Appliance访问控制错误漏洞 | 2025-11-28 | 2025-12-04 |
| cnvd-2025-30031 | Laundry System insert_laundry.php文件跨站脚本漏洞 | 2025-06-10 | 2025-12-04 |
| cnvd-2025-30030 | Laundry System edit_type.php文件跨站脚本漏洞 | 2025-06-10 | 2025-12-04 |
| cnvd-2025-30029 | Laundry System edit_laundry.php文件跨站脚本漏洞 | 2025-06-10 | 2025-12-04 |
| cnvd-2025-30028 | Traffic Offense Reporting System saveuser.php文件跨站脚本漏洞 | 2025-06-11 | 2025-12-04 |
| cnvd-2025-30027 | Traffic Offense Reporting System save-settings.php文件跨站脚本漏洞 | 2025-06-11 | 2025-12-04 |
| cnvd-2025-30026 | Patient Record Management System urinalysis_form.php文件SQL注入漏洞 | 2025-06-11 | 2025-12-04 |
| cnvd-2025-30025 | Patient Record Management System sputum_form.php文件SQL注入漏洞 | 2025-06-11 | 2025-12-04 |
| cnvd-2025-30024 | Laundry System身份验证缺失漏洞 | 2025-06-17 | 2025-12-04 |
| cnvd-2025-30023 | Patient Record Management System urinalysis_record.php文件SQL注入漏洞 | 2025-06-20 | 2025-12-04 |
| cnvd-2025-30022 | Patient Record Management System xray_form.php文件SQL注入漏洞 | 2025-07-23 | 2025-12-04 |
| cnvd-2025-30021 | Patient Record Management System xray_print.php文件SQL注入漏洞 | 2025-04-09 | 2025-12-04 |
| cnvd-2025-30020 | Patient Record Management System dental_not.php文件SQL注入漏洞 | 2025-04-09 | 2025-12-04 |
| cnvd-2025-30019 | Patient Record Management System dental_form.php文件SQL注入漏洞 | 2025-04-09 | 2025-12-04 |
| cnvd-2025-30018 | Patient Record Management System birthing_record.php文件SQL注入漏洞 | 2025-04-09 | 2025-12-04 |
| cnvd-2025-30017 | Patient Record Management System birthing_print.php文件SQL注入漏洞 | 2025-04-09 | 2025-12-04 |
| cnvd-2025-30016 | Patient Record Management System birthing_pending.php文件SQL注入漏洞 | 2025-04-09 | 2025-12-04 |
| cnvd-2025-30015 | Patient Record Management System birthing_form.php文件SQL注入漏洞 | 2025-04-09 | 2025-12-04 |
| cnvd-2025-30014 | Patient Record Management System add_patient.php文件SQL注入漏洞 | 2025-04-09 | 2025-12-04 |
| cnvd-2025-30013 | Patient Record Management System edit_dpatient.php文件SQL注入漏洞 | 2025-04-18 | 2025-12-04 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0490 | Multiples vulnérabilités dans Ivanti Workspace Control (IWC) | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| certfr-2025-avi-0489 | Multiples vulnérabilités dans Google Chrome | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| certfr-2025-avi-0488 | Vulnérabilité dans Stormshield Network Security | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| certfr-2025-avi-0487 | Multiples vulnérabilités dans les produits SAP | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0501 | Multiples vulnérabilités dans les produits Microsoft | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0500 | Vulnérabilité dans Microsoft .Net | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0499 | Multiples vulnérabilités dans Microsoft Windows | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0498 | Multiples vulnérabilités dans Microsoft Office | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0497 | Vulnérabilité dans les processeurs Intel | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0496 | Multiples vulnérabilités dans les produits Fortinet | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0495 | Multiples vulnérabilités dans les produits Adobe | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0494 | Vulnérabilité dans Elastic Kibana | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0493 | Multiples vulnérabilités dans les produits Centreon | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0492 | Multiples vulnérabilités dans les produits Siemens | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0491 | Multiples vulnérabilités dans les produits Mozilla | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0490 | Multiples vulnérabilités dans Ivanti Workspace Control (IWC) | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0489 | Multiples vulnérabilités dans Google Chrome | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0488 | Vulnérabilité dans Stormshield Network Security | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0487 | Multiples vulnérabilités dans les produits SAP | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| certfr-2025-avi-0486 | Multiples vulnérabilités dans les produits Qnap | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| certfr-2025-avi-0485 | Multiples vulnérabilités dans les produits Schneider Electric | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| certfr-2025-avi-0484 | Vulnérabilité dans les produits HPE Aruba Networking | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| certfr-2025-avi-0483 | Vulnérabilité dans Mozilla VPN | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| CERTFR-2025-AVI-0486 | Multiples vulnérabilités dans les produits Qnap | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| CERTFR-2025-AVI-0485 | Multiples vulnérabilités dans les produits Schneider Electric | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| CERTFR-2025-AVI-0484 | Vulnérabilité dans les produits HPE Aruba Networking | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| CERTFR-2025-AVI-0483 | Vulnérabilité dans Mozilla VPN | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| certfr-2025-avi-0482 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |
| certfr-2025-avi-0481 | Multiples vulnérabilités dans les produits IBM | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |
| certfr-2025-avi-0480 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |