Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-5268 |
8.1 (3.1)
|
Memory safety bugs fixed in Firefox 139, Thunderbird 1… |
Mozilla |
Firefox |
2025-05-27T12:29:26.941Z | 2026-02-26T18:27:55.292Z |
| CVE-2025-5265 |
4.8 (3.1)
|
Potential local code execution in “Copy as cURL” command |
Mozilla |
Firefox |
2025-05-27T12:29:24.338Z | 2026-02-26T18:27:55.713Z |
| CVE-2025-4085 |
7.1 (3.1)
|
An attacker with control over a content process c… |
Mozilla |
Firefox |
2025-04-29T13:13:39.469Z | 2026-02-26T18:27:55.436Z |
| CVE-2025-4084 |
5.7 (3.1)
|
Due to insufficient escaping of the special chara… |
Mozilla |
Firefox ESR |
2025-04-29T13:13:38.073Z | 2026-02-26T18:27:55.852Z |
| CVE-2025-36014 |
8.2 (3.1)
|
IBM Integration Bus for z/OS code injection |
IBM |
Integration Bus |
2025-07-07T16:15:53.537Z | 2026-02-26T18:27:55.117Z |
| CVE-2025-27446 |
N/A
|
Apache APISIX Java Plugin Runner: Local listening file… |
Apache Software Foundation |
Apache APISIX Java Plugin Runner |
2025-07-06T06:05:15.144Z | 2026-02-26T18:27:55.996Z |
| CVE-2025-5063 |
8.8 (3.1)
|
Use after free in Compositing in Google Chrome pr… |
Google |
Chrome |
2025-05-27T20:43:02.737Z | 2026-02-26T18:27:54.382Z |
| CVE-2025-4089 |
5.1 (3.1)
|
Due to insufficient escaping of special character… |
Mozilla |
Firefox |
2025-04-29T13:13:45.152Z | 2026-02-26T18:27:54.937Z |
| CVE-2025-27700 |
8.4 (3.1)
|
There is a possible bypass of carrier restriction… |
Google |
Android |
2025-05-27T15:41:52.015Z | 2026-02-26T18:27:54.797Z |
| CVE-2025-24338 |
7.1 (3.1)
|
A vulnerability in the “Manages app data” functio… |
Bosch Rexroth AG |
ctrlX OS - Solutions |
2025-04-30T10:51:00.663Z | 2026-02-26T18:27:54.213Z |
| CVE-2025-20319 |
6.8 (3.1)
|
Remote Command Execution through Scripted Input Files … |
Splunk |
Splunk Enterprise |
2025-07-07T17:48:01.283Z | 2026-02-26T18:27:54.075Z |
| CVE-2025-1351 |
6.7 (3.1)
|
IBM Storage Virtualize privilege escalation |
IBM |
Storage Virtualize |
2025-07-07T16:41:23.342Z | 2026-02-26T18:27:54.618Z |
| CVE-2025-5280 |
8.8 (3.1)
|
Out of bounds write in V8 in Google Chrome prior … |
Google |
Chrome |
2025-05-27T20:43:03.111Z | 2026-02-26T18:27:53.940Z |
| CVE-2025-48927 |
5.3 (3.1)
|
The TeleMessage service through 2025-05-05 config… |
TeleMessage |
service |
2025-05-28T00:00:00.000Z | 2026-02-26T18:27:53.525Z |
| CVE-2025-42959 |
8.1 (3.1)
|
Missing Authentication check after implementation of S… |
SAP_SE |
SAP NetWeaver ABAP Server and ABAP Platform |
2025-07-08T00:35:03.181Z | 2026-02-26T18:27:53.365Z |
| CVE-2025-42953 |
8.1 (3.1)
|
Missing Authorization check in SAP NetWeaver Applicati… |
SAP_SE |
SAP NetWeaver Application Server for ABAP |
2025-07-08T00:34:41.326Z | 2026-02-26T18:27:53.790Z |
| CVE-2025-24351 |
8.8 (3.1)
|
A vulnerability in the “Remote Logging” functiona… |
Bosch Rexroth AG |
ctrlX OS - Device Admin |
2025-04-30T11:47:00.441Z | 2026-02-26T18:27:53.157Z |
| CVE-2025-24346 |
7.5 (3.1)
|
A vulnerability in the “Proxy” functionality of t… |
Bosch Rexroth AG |
ctrlX OS - Device Admin |
2025-04-30T11:39:42.899Z | 2026-02-26T18:27:53.666Z |
| CVE-2025-48928 |
4 (3.1)
|
The TeleMessage service through 2025-05-05 is bas… |
TeleMessage |
service |
2025-05-28T00:00:00.000Z | 2026-02-26T18:27:52.827Z |
| CVE-2025-42964 |
9.1 (3.1)
|
Insecure Deserialization in SAP NetWeaver Enterprise P… |
SAP_SE |
SAP NetWeaver Enterprise Portal Administration |
2025-07-08T00:35:53.251Z | 2026-02-26T18:27:52.401Z |
| CVE-2025-42963 |
9.1 (3.1)
|
Insecure Deserialization in SAP NetWeaver Application … |
SAP_SE |
SAP NetWeaver Application Server for Java (Log Viewer ) |
2025-07-08T00:35:45.105Z | 2026-02-26T18:27:52.979Z |
| CVE-2025-25251 |
7.4 (3.1)
|
An Incorrect Authorization vulnerability [CWE-863… |
Fortinet |
FortiClientMac |
2025-05-28T07:53:42.390Z | 2026-02-26T18:27:52.267Z |
| CVE-2025-48734 |
N/A
|
Apache Commons BeanUtils: PropertyUtilsBean does not s… |
Apache Software Foundation |
Apache Commons BeanUtils 1.x |
2025-05-28T13:32:08.300Z | 2026-02-26T18:27:51.274Z |
| CVE-2025-42967 |
9.9 (3.1)
|
Code Injection vulnerability in SAP S/4HANA and SAP SC… |
SAP_SE |
SAP S/4HANA and SAP SCM (Characteristic Propagation) |
2025-07-08T00:36:23.081Z | 2026-02-26T18:27:51.424Z |
| CVE-2025-42966 |
9.1 (3.1)
|
Insecure Deserialization vulnerability in SAP NetWeave… |
SAP_SE |
SAP NetWeaver (XML Data Archiving Service) |
2025-07-08T00:36:13.153Z | 2026-02-26T18:27:51.830Z |
| CVE-2025-22252 |
9 (3.1)
|
A missing authentication for critical function in… |
Fortinet |
FortiProxy |
2025-05-28T07:55:49.946Z | 2026-02-26T18:27:51.978Z |
| CVE-2025-43001 |
6.9 (3.1)
|
Multiple Privilege Escalation Vulnerabilities in SAPCAR |
SAP_SE |
SAPCAR |
2025-07-08T00:38:50.441Z | 2026-02-26T18:27:50.304Z |
| CVE-2025-42992 |
6.9 (3.1)
|
Multiple Privilege Escalation Vulnerabilities in SAPCAR |
SAP_SE |
SAPCAR |
2025-07-08T00:38:42.352Z | 2026-02-26T18:27:50.733Z |
| CVE-2025-3357 |
9.8 (3.1)
|
IBM Tivoli Monitoring code execution |
IBM |
Tivoli Monitoring |
2025-05-28T14:51:29.649Z | 2026-02-26T18:27:50.921Z |
| CVE-2025-2501 |
8.5 (4.0)
7.8 (3.1)
|
An untrusted search path vulnerability was report… |
Lenovo |
PC Manager |
2025-05-30T19:14:14.040Z | 2026-02-26T18:27:50.105Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-27572 |
6.9 (4.0)
|
Wasmtime can panic when adding excessive fields to a `… |
bytecodealliance |
wasmtime |
2026-02-24T21:31:50.186Z | 2026-02-27T20:55:29.879Z |
| CVE-2018-20029 |
N/A
|
The nxfs.sys driver in the DokanFS library 0.6.0 … |
n/a |
n/a |
2018-12-10T20:00:00.000Z | 2024-09-16T20:53:16.051Z |
| CVE-2026-23967 |
7.5 (3.1)
|
sm-crypto Affected by Signature Malleability in SM2-DSA |
JuneAndGreen |
sm-crypto |
2026-01-22T01:59:30.555Z | 2026-01-22T16:03:58.987Z |
| CVE-2026-23966 |
9.1 (3.1)
|
sm-crypto Affected by Private Key Recovery in SM2-PKE |
JuneAndGreen |
sm-crypto |
2026-01-22T02:06:54.003Z | 2026-01-22T15:49:07.259Z |
| CVE-2018-5410 |
N/A
|
Dokan file system driver contains a stack-based buffer… |
Dokan |
Open Source File System |
2019-01-07T14:00:00.000Z | 2024-08-05T05:33:44.211Z |
| CVE-2026-2537 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Comfast CF-E4 HTTP POST Request mbox-config command in… |
Comfast |
CF-E4 |
2026-02-16T05:32:05.986Z | 2026-02-23T10:06:10.768Z |
| CVE-2026-23965 |
7.5 (3.1)
|
sm-crypto Affected by Signature Forgery in SM2-DSA |
JuneAndGreen |
sm-crypto |
2026-01-22T02:05:43.426Z | 2026-01-22T15:58:10.585Z |
| CVE-2026-25061 |
5.5 (4.0)
|
tcpflow has TIM Element OOB Write in wifipcap |
simsong |
tcpflow |
2026-01-29T21:42:47.013Z | 2026-02-10T20:14:00.298Z |
| CVE-2025-65715 |
7.8 (3.1)
|
An issue in the code-runner.executorMap setting o… |
n/a |
n/a |
2026-02-16T00:00:00.000Z | 2026-02-18T14:46:57.225Z |
| CVE-2026-21483 |
5.4 (4.0)
|
listmonk Vulnerable to Stored XSS Leading to Admin Acc… |
knadh |
listmonk |
2026-01-02T20:57:29.332Z | 2026-01-02T21:18:57.834Z |
| CVE-2026-3197 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-02-25T14:01:00.880Z | |
| CVE-2026-27368 |
5.3 (3.1)
|
WordPress Coming Soon Page, Under Construction & Maint… |
SeedProd |
Coming Soon Page, Under Construction & Maintenance Mode by SeedProd |
2026-02-19T20:35:42.391Z | 2026-02-25T14:30:37.052Z |
| CVE-2026-22383 |
5.4 (3.1)
|
WordPress PawFriends - Pet Shop and Veterinary WordPre… |
Mikado-Themes |
PawFriends - Pet Shop and Veterinary WordPress Theme |
2026-02-20T15:47:06.889Z | 2026-02-25T14:15:57.381Z |
| CVE-2026-27204 |
6.9 (4.0)
|
Wasmtime WASI implementations are vulnerable to guest-… |
bytecodealliance |
wasmtime |
2026-02-24T21:23:47.007Z | 2026-02-27T20:54:48.839Z |
| CVE-2026-22350 |
6.5 (3.1)
|
WordPress PDF for Elementor Forms + Drag And Drop Temp… |
add-ons.org |
PDF for Elementor Forms + Drag And Drop Template Builder |
2026-02-20T15:47:00.543Z | 2026-02-25T14:40:29.656Z |
| CVE-2025-69403 |
9.9 (3.1)
|
WordPress Bravis Addons plugin <= 1.1.9 - Arbitrary Fi… |
Bravis-Themes |
Bravis Addons |
2026-02-20T15:46:57.715Z | 2026-02-25T14:48:03.724Z |
| CVE-2025-61145 |
5.5 (3.1)
|
libtiff up to v4.7.1 was discovered to contain a … |
n/a |
n/a |
2026-02-23T00:00:00.000Z | 2026-02-25T14:30:23.881Z |
| CVE-2025-61144 |
9.8 (3.1)
|
libtiff up to v4.7.1 was discovered to contain a … |
n/a |
n/a |
2026-02-23T00:00:00.000Z | 2026-02-25T14:27:56.707Z |
| CVE-2025-61143 |
5.5 (3.1)
|
libtiff up to v4.7.1 was discovered to contain a … |
n/a |
n/a |
2026-02-23T00:00:00.000Z | 2026-02-25T14:24:54.699Z |
| CVE-2022-31595 |
N/A
|
SAP Financial Consolidation - version 1010,�does … |
SAP SE |
SAP Financial Consolidation |
2022-06-14T18:45:56.000Z | 2024-08-03T07:19:06.842Z |
| CVE-2026-27195 |
6.9 (4.0)
|
Wasmtime is vulnerable to panic when dropping a `[Type… |
bytecodealliance |
wasmtime |
2026-02-24T21:15:20.366Z | 2026-02-24T21:36:54.122Z |
| CVE-2026-27729 |
5.9 (3.1)
|
Astro has memory exhaustion DoS due to missing reques… |
withastro |
astro |
2026-02-24T00:46:15.945Z | 2026-02-26T14:59:37.450Z |
| CVE-2026-25545 |
6.9 (4.0)
|
Astro has Full-Read SSRF in error rendering via Host: … |
withastro |
astro |
2026-02-24T00:37:05.378Z | 2026-02-26T14:53:21.152Z |
| CVE-2022-2845 |
7.8 (3.1)
|
Improper Validation of Specified Quantity in Input in … |
vim |
vim/vim |
2022-08-17T00:00:00.000Z | 2024-08-03T00:52:58.914Z |
| CVE-2022-2824 |
8.8 (3.1)
|
Authorization Bypass Through User-Controlled Key in op… |
openemr |
openemr/openemr |
2022-08-15T15:50:09.000Z | 2024-08-03T00:52:58.910Z |
| CVE-2022-2820 |
7 (3.1)
|
Session Fixation in namelessmc/nameless |
namelessmc |
namelessmc/nameless |
2022-08-15T10:30:53.000Z | 2024-08-03T00:52:58.982Z |
| CVE-2022-2818 |
9.8 (3.1)
|
Improper Removal of Sensitive Information Before Stora… |
cockpit-hq |
cockpit-hq/cockpit |
2022-08-15T09:50:24.000Z | 2024-08-03T00:52:58.603Z |
| CVE-2022-2732 |
8.3 (3.1)
|
Missing Authorization in openemr/openemr |
openemr |
openemr/openemr |
2022-08-09T12:06:13.000Z | 2024-11-20T16:18:21.615Z |
| CVE-2022-2637 |
5.4 (3.1)
|
Privilege Escalation Vulnerability in Hitachi Storage … |
Hitachi |
Hitachi Storage Plug-in for VMware vCenter |
2022-10-06T00:00:00.000Z | 2024-08-03T00:46:03.300Z |
| CVE-2022-2636 |
8.5 (3.1)
|
Code Injection in hestiacp/hestiacp |
hestiacp |
hestiacp/hestiacp |
2022-08-05T09:30:16.000Z | 2024-08-03T00:46:03.216Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2023-34382 | Deserialization of Untrusted Data vulnerability in weDevs Dokan – Best WooCommerce Multivendor Mark… | 2023-12-19T20:15:07.340 | 2026-02-24T20:59:24.530 |
| fkie_cve-2026-25647 | Lute is a structured Markdown engine supporting Go and JavaScript. Lute 1.7.6 and earlier (as used … | 2026-02-06T19:16:09.593 | 2026-02-24T20:59:10.180 |
| fkie_cve-2020-36748 | The Dokan plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and i… | 2023-07-01T06:15:09.433 | 2026-02-24T20:59:03.343 |
| fkie_cve-2022-3194 | The Dokan WordPress plugin before 3.6.4 allows vendors to inject arbitrary javascript in product re… | 2024-01-16T16:15:09.883 | 2026-02-24T20:58:39.753 |
| fkie_cve-2026-1769 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-06T18:15:56.193 | 2026-02-24T20:58:11.823 |
| fkie_cve-2022-3915 | The Dokan WordPress plugin before 3.7.6 does not properly sanitise and escape a parameter before us… | 2022-12-12T18:15:11.817 | 2026-02-24T20:58:05.303 |
| fkie_cve-2026-23989 | REVA is an interoperability platform. Prior to 2.42.3 and 2.40.3, a bug in the GRPC authorization m… | 2026-02-06T19:16:08.470 | 2026-02-24T20:57:55.337 |
| fkie_cve-2023-26525 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2023-12-20T18:15:11.680 | 2026-02-24T20:57:36.037 |
| fkie_cve-2026-24903 | OrcaStatLLM Researcher is an LLM Based Research Paper Generator. A Stored Cross-Site Scripting (XSS… | 2026-02-06T18:15:58.830 | 2026-02-24T20:57:19.450 |
| fkie_cve-2026-24851 | OpenFGA is a high-performance and flexible authorization/permission engine built for developers and… | 2026-02-06T18:15:58.673 | 2026-02-24T20:52:16.493 |
| fkie_cve-2026-26745 | OpenSourcePOS 3.4.1 has a second order SQL Injection vulnerability in the handling of the currency_… | 2026-02-20T17:25:55.807 | 2026-02-24T20:45:24.933 |
| fkie_cve-2026-2822 | A security vulnerability has been detected in JeecgBoot up to 3.9.1. The affected element is an unk… | 2026-02-20T05:17:53.663 | 2026-02-24T20:45:10.790 |
| fkie_cve-2019-25454 | phpMoAdmin 1.1.5 contains a stored cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-20T23:16:02.077 | 2026-02-24T20:44:04.553 |
| fkie_cve-2019-25453 | phpMoAdmin 1.1.5 contains a reflected cross-site scripting vulnerability that allows unauthenticate… | 2026-02-20T23:16:01.893 | 2026-02-24T20:43:34.470 |
| fkie_cve-2026-2690 | A flaw has been found in itsourcecode Event Management System 1.0. Affected by this vulnerability i… | 2026-02-19T07:17:47.670 | 2026-02-24T20:42:50.850 |
| fkie_cve-2026-26746 | OpenSourcePOS 3.4.1 contains a Local File Inclusion (LFI) vulnerability in the Sales.php::getInvoic… | 2026-02-20T17:25:55.920 | 2026-02-24T20:42:28.327 |
| fkie_cve-2025-62326 | HCL Digital Experience is susceptible to stored cross-site scripting (XSS) in the administrative us… | 2026-02-20T20:25:18.607 | 2026-02-24T20:42:11.723 |
| fkie_cve-2026-2689 | A vulnerability was detected in itsourcecode Event Management System 1.0. Affected is an unknown fu… | 2026-02-19T07:17:47.447 | 2026-02-24T20:41:54.953 |
| fkie_cve-2019-25364 | MailCarrier 2.51 contains a buffer overflow vulnerability in the POP3 USER command that allows remo… | 2026-02-18T22:16:22.260 | 2026-02-24T20:41:08.130 |
| fkie_cve-2019-25326 | ipPulse 1.92 contains a denial of service vulnerability that allows local attackers to crash the ap… | 2026-02-18T22:16:18.980 | 2026-02-24T20:38:18.883 |
| fkie_cve-2025-70329 | TOTOLink X5000R v9.1.0cu_2415_B20250515 contains an OS command injection vulnerability in the setIp… | 2026-02-23T20:28:53.603 | 2026-02-24T20:38:09.483 |
| fkie_cve-2025-69700 | Tenda FH1203 V2.0.1.6 contains a stack-based buffer overflow vulnerability in the modify_add_client… | 2026-02-23T14:16:21.233 | 2026-02-24T20:37:59.887 |
| fkie_cve-2026-24853 | Caido is a web security auditing toolkit. Prior to 0.55.0, Caido blocks non whitelisted domains to … | 2026-02-13T23:16:11.800 | 2026-02-24T20:32:18.710 |
| fkie_cve-2026-23805 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-02-19T09:16:13.360 | 2026-02-24T20:27:47.113 |
| fkie_cve-2026-22384 | Deserialization of Untrusted Data vulnerability in leafcolor Applay - Shortcodes applay-shortcodes … | 2026-02-20T16:22:38.090 | 2026-02-24T20:27:46.610 |
| fkie_cve-2026-22354 | Deserialization of Untrusted Data vulnerability in Dotstore Woocommerce Category Banner Management … | 2026-02-20T16:22:34.550 | 2026-02-24T20:27:46.430 |
| fkie_cve-2025-69366 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-02-20T16:22:20.740 | 2026-02-24T20:27:46.047 |
| fkie_cve-2025-69365 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-02-20T16:22:20.600 | 2026-02-24T20:27:45.863 |
| fkie_cve-2025-69337 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-02-20T16:22:20.457 | 2026-02-24T20:27:45.680 |
| fkie_cve-2025-69329 | Deserialization of Untrusted Data vulnerability in Jthemes Prestige prestige allows Object Injectio… | 2026-02-20T16:22:20.173 | 2026-02-24T20:27:45.500 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2qj5-gwg2-xwc4 |
8.6 (4.0)
|
OpenClaw: Unsanitized CWD path injection into LLM prompts | 2026-02-18T22:42:29Z | 2026-02-20T16:46:56Z |
| ghsa-5r23-prx4-mqg3 |
6.1 (3.1)
|
Cilium may not enforce host firewall policies when Native Routing, WireGuard and Node Encryption ar… | 2026-02-19T19:39:01Z | 2026-02-20T16:46:49Z |
| ghsa-fw7p-63qq-7hpr |
1.7 (4.0)
|
filippo.io/edwards25519 MultiScalarMult produces invalid results or undefined behavior if receiver … | 2026-02-18T22:37:15Z | 2026-02-20T16:46:42Z |
| ghsa-xwjm-j929-xq7c |
6.7 (3.1)
|
OpenClaw has a Path Traversal in Browser Download Functionality | 2026-02-18T17:37:52Z | 2026-02-20T16:46:20Z |
| ghsa-wgm6-9rvv-3438 |
6.9 (4.0)
|
Libredesk has a SSRF Vulnerability in Webhooks | 2026-02-18T00:56:30Z | 2026-02-20T16:46:10Z |
| ghsa-3fqr-4cg8-h96q |
7.1 (3.1)
|
OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints | 2026-02-18T00:53:59Z | 2026-02-20T16:46:03Z |
| ghsa-m7x8-2w3w-pr42 |
8.6 (4.0)
|
OpenClaw has a command injection in maintainer clawtributors updater | 2026-02-18T00:46:54Z | 2026-02-20T16:45:55Z |
| ghsa-cv7m-c9jx-vg7q |
7.1 (4.0)
|
OpenClaw has a path traversal in browser upload allows local file read | 2026-02-18T00:46:49Z | 2026-02-20T16:45:47Z |
| ghsa-g34w-4xqq-h79m |
6.5 (3.1)
|
OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities | 2026-02-18T00:43:54Z | 2026-02-20T16:45:39Z |
| ghsa-pv58-549p-qh99 |
7.1 (4.0)
|
OpenClaw allows unauthenticated discovery TXT records to steer routing and TLS pinning | 2026-02-18T00:33:35Z | 2026-02-20T16:45:30Z |
| ghsa-8mh7-phf8-xgfm |
5.3 (4.0)
|
OpenClaw skills.status could leak secrets to operator.read clients | 2026-02-17T21:43:41Z | 2026-02-20T16:45:23Z |
| ghsa-h3f9-mjwj-w476 |
7.2 (3.1)
|
OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals | 2026-02-17T21:42:49Z | 2026-02-20T16:44:54Z |
| ghsa-jrvc-8ff5-2f9f |
7.5 (3.1)
|
OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reachable) | 2026-02-17T21:42:40Z | 2026-02-20T16:44:46Z |
| ghsa-g6q9-8fvw-f7rf |
7.6 (3.1)
|
OpenClaw Gateway tool allowed unrestricted gatewayUrl override | 2026-02-17T21:42:15Z | 2026-02-20T16:44:39Z |
| ghsa-8jpq-5h99-ff5r |
7.5 (3.1)
|
OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension | 2026-02-17T21:41:52Z | 2026-02-20T16:44:32Z |
| ghsa-7q2j-c4q5-rm27 |
7.1 (4.0)
|
OpenClaw macOS deep link confirmation truncation can conceal executed agent message | 2026-02-17T21:41:40Z | 2026-02-20T16:44:25Z |
| ghsa-4hg8-92x6-h2f3 |
7.5 (3.1)
|
OpenClaw is Missing Webhook Authentication in Telnyx Provider Allows Unauthenticated Requests | 2026-02-17T21:40:46Z | 2026-02-20T16:44:19Z |
| ghsa-pchc-86f6-8758 |
7.5 (3.1)
|
OpenClaw BlueBubbles webhook auth bypass via loopback proxy trust | 2026-02-17T21:33:51Z | 2026-02-20T16:44:12Z |
| ghsa-7v42-g35v-xrch |
7.5 (3.1)
|
Improper Digest Verification in httpsig-hyper May Allow Message Integrity Bypass | 2026-02-17T21:29:34Z | 2026-02-20T16:44:04Z |
| ghsa-wfqv-66vq-46rm |
3.7 (3.1)
|
Cosign considered signatures valid with expired intermediate certificates when transparency log ver… | 2026-02-19T22:09:12Z | 2026-02-20T16:43:55Z |
| ghsa-wc6r-7g4j-c7x4 |
9.5 (4.0)
|
The vulnerability was rooted in how the Tassos Framework plugin handled specific AJAX requests thro… | 2026-02-20T15:31:03Z | 2026-02-20T15:31:03Z |
| ghsa-7cp9-3m8m-4jv3 |
2.3 (4.0)
|
An integer underflow vulnerability is present in Silicon Lab’s implementation of PSA Crypto and SE … | 2026-02-20T15:31:03Z | 2026-02-20T15:31:03Z |
| ghsa-2m3f-m6mg-cvqf |
2.4 (4.0)
|
An integer underflow vulnerability in Silicon Labs Secure NCP host implementation allows a buffer o… | 2026-02-20T15:31:03Z | 2026-02-20T15:31:03Z |
| ghsa-w8hr-79rx-368j |
9.8 (3.1)
9.3 (4.0)
|
Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve remote code exec… | 2026-02-19T18:31:55Z | 2026-02-20T15:31:00Z |
| ghsa-v8wf-h34r-55f7 |
6.8 (3.1)
|
In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11, a user of a Splunk Se… | 2026-02-18T18:30:40Z | 2026-02-20T15:31:00Z |
| ghsa-qvhf-98cj-8779 |
8.8 (3.1)
|
TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via … | 2026-02-17T21:31:13Z | 2026-02-20T15:31:00Z |
| ghsa-pqh8-xq2x-mwg2 |
8.8 (3.1)
|
TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via … | 2026-02-17T21:31:14Z | 2026-02-20T15:31:00Z |
| ghsa-p97j-p47c-p6g9 |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T18:31:54Z | 2026-02-20T15:31:00Z |
| ghsa-j59q-24q8-ggc7 |
7.5 (3.1)
8.7 (4.0)
|
Hyland Alfresco allows unauthenticated attackers to read arbitrary files from protected directories… | 2026-02-19T18:31:55Z | 2026-02-20T15:31:00Z |
| ghsa-cg7h-phwj-q3qc |
6.5 (3.1)
6.9 (4.0)
|
Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve server-side requ… | 2026-02-19T18:31:55Z | 2026-02-20T15:31:00Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-544 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.440204Z |
| pysec-2021-543 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.249240Z |
| pysec-2021-542 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.093835Z |
| pysec-2021-541 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.939983Z |
| pysec-2021-540 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.791095Z |
| pysec-2021-539 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.643127Z |
| pysec-2021-538 |
|
TensorFlow is an end-to-end open source platform for machine learning. The validation in … | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.479412Z |
| pysec-2021-537 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.330206Z |
| pysec-2021-536 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.179664Z |
| pysec-2021-535 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.010376Z |
| pysec-2021-534 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.860176Z |
| pysec-2021-533 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite code fo… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.713113Z |
| pysec-2021-532 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.535781Z |
| pysec-2021-531 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.386976Z |
| pysec-2021-530 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.232371Z |
| pysec-2021-529 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.076380Z |
| pysec-2021-528 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.930299Z |
| pysec-2021-527 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.781489Z |
| pysec-2021-526 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.584252Z |
| pysec-2021-525 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.435866Z |
| pysec-2021-524 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.287349Z |
| pysec-2021-523 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.107477Z |
| pysec-2021-522 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFLite's convoluti… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.958093Z |
| pysec-2021-521 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.775345Z |
| pysec-2021-520 |
|
TensorFlow is an end-to-end open source platform for machine learning. The fix for CVE-20… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.625576Z |
| pysec-2021-519 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFlite graphs must… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.477070Z |
| pysec-2021-518 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.326959Z |
| pysec-2021-517 |
|
TensorFlow is an end-to-end open source platform for machine learning. The reference impl… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.180094Z |
| pysec-2021-516 |
|
TensorFlow is an end-to-end open source platform for machine learning. The optimized impl… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.029977Z |
| pysec-2021-515 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `Prepare` step… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:56.873016Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-3843 | Insufficient data validation in Downloads in Google Chrome prior to 124.0.6367.60 allowed… | 2024-04-16T05:01:59.826978Z |
| gsd-2024-3842 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.659856Z |
| gsd-2024-3841 | Insufficient data validation in Browser Switcher in Google Chrome prior to 124.0.6367.60 … | 2024-04-16T05:01:59.600187Z |
| gsd-2024-3840 | Insufficient policy enforcement in Site Isolation in Google Chrome prior to 124.0.6367.60… | 2024-04-16T05:01:59.576849Z |
| gsd-2024-3839 | Out of bounds read in Fonts in Google Chrome prior to 124.0.6367.60 allowed a remote atta… | 2024-04-16T05:01:59.768915Z |
| gsd-2024-3838 | Inappropriate implementation in Autofill in Google Chrome prior to 124.0.6367.60 allowed … | 2024-04-16T05:01:59.751203Z |
| gsd-2024-3837 | Use after free in QUIC in Google Chrome prior to 124.0.6367.60 allowed a remote attacker … | 2024-04-16T05:01:59.698787Z |
| gsd-2024-3836 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.728272Z |
| gsd-2024-3835 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.708972Z |
| gsd-2024-3834 | Use after free in Downloads in Google Chrome prior to 124.0.6367.60 allowed a remote atta… | 2024-04-16T05:01:59.771487Z |
| gsd-2024-3833 | Object corruption in WebAssembly in Google Chrome prior to 124.0.6367.60 allowed a remote… | 2024-04-16T05:01:59.817104Z |
| gsd-2024-3832 | Object corruption in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote attacker… | 2024-04-16T05:01:59.619891Z |
| gsd-2024-3831 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.771707Z |
| gsd-2024-3830 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.773549Z |
| gsd-2024-3829 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.795019Z |
| gsd-2024-3828 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.782933Z |
| gsd-2024-3827 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.512732Z |
| gsd-2024-3826 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.639957Z |
| gsd-2024-3825 | Versions of the BlazeMeter Jenkins plugin prior to 4.22 contain a flaw which results in c… | 2024-04-16T05:01:59.804817Z |
| gsd-2024-3824 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.814267Z |
| gsd-2024-3823 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.618229Z |
| gsd-2024-3822 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.503170Z |
| gsd-2024-3821 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.665218Z |
| gsd-2024-3820 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.488537Z |
| gsd-2024-3819 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.535261Z |
| gsd-2024-3818 | The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for Wor… | 2024-04-16T05:01:59.566901Z |
| gsd-2024-3817 | HashiCorp’s go-getter library is vulnerable to argument injection when executing Git to d… | 2024-04-16T05:01:59.493981Z |
| gsd-2024-3816 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.746535Z |
| gsd-2024-3815 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.825010Z |
| gsd-2024-3814 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.515931Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-234 | Malicious code in xml2js-js (npm) | 2026-01-12T01:59:27Z | 2026-01-15T22:09:23Z |
| mal-2026-207 | Malicious code in yargs-js (npm) | 2026-01-12T00:22:24Z | 2026-01-15T22:09:23Z |
| mal-2026-187 | Malicious code in yunxohang7 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| mal-2026-186 | Malicious code in yunxohang6 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| mal-2026-185 | Malicious code in yunxohang5 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| mal-2026-184 | Malicious code in yunxohang4 (npm) | 2025-12-26T10:20:32Z | 2026-01-15T22:09:23Z |
| mal-2026-183 | Malicious code in yunxohang11 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| mal-2026-182 | Malicious code in yunxohang10 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| mal-2025-192992 | Malicious code in umap (PyPI) | 2025-12-31T11:45:36Z | 2026-01-15T22:09:23Z |
| MAL-2026-234 | Malicious code in xml2js-js (npm) | 2026-01-12T01:59:27Z | 2026-01-15T22:09:23Z |
| MAL-2026-207 | Malicious code in yargs-js (npm) | 2026-01-12T00:22:24Z | 2026-01-15T22:09:23Z |
| MAL-2026-187 | Malicious code in yunxohang7 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| MAL-2026-186 | Malicious code in yunxohang6 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| MAL-2026-185 | Malicious code in yunxohang5 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| MAL-2026-184 | Malicious code in yunxohang4 (npm) | 2025-12-26T10:20:32Z | 2026-01-15T22:09:23Z |
| MAL-2026-183 | Malicious code in yunxohang11 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| MAL-2026-182 | Malicious code in yunxohang10 (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:23Z |
| MAL-2025-192992 | Malicious code in umap (PyPI) | 2025-12-31T11:45:36Z | 2026-01-15T22:09:23Z |
| mal-2026-235 | Malicious code in tailwindcss-animate-tool (npm) | 2026-01-12T05:56:53Z | 2026-01-15T22:09:22Z |
| mal-2026-233 | Malicious code in simple-string-utils3 (npm) | 2026-01-12T03:12:01Z | 2026-01-15T22:09:22Z |
| mal-2026-206 | Malicious code in terser-js (npm) | 2026-01-12T00:22:24Z | 2026-01-15T22:09:22Z |
| mal-2026-188 | Malicious code in shopping-cart-service (npm) | 2026-01-10T08:14:10Z | 2026-01-15T22:09:22Z |
| mal-2026-181 | Malicious code in smintio-portals-component-sdk (npm) | 2026-01-09T02:54:15Z | 2026-01-15T22:09:22Z |
| mal-2026-180 | Malicious code in shreddit.styles (npm) | 2026-01-09T03:03:26Z | 2026-01-15T22:09:22Z |
| mal-2026-170 | Malicious code in secguest-react-lib (npm) | 2025-12-24T07:53:35Z | 2026-01-15T22:09:22Z |
| mal-2026-169 | Malicious code in secguest-lib (npm) | 2025-12-22T09:00:52Z | 2026-01-15T22:09:22Z |
| MAL-2026-235 | Malicious code in tailwindcss-animate-tool (npm) | 2026-01-12T05:56:53Z | 2026-01-15T22:09:22Z |
| MAL-2026-233 | Malicious code in simple-string-utils3 (npm) | 2026-01-12T03:12:01Z | 2026-01-15T22:09:22Z |
| MAL-2026-206 | Malicious code in terser-js (npm) | 2026-01-12T00:22:24Z | 2026-01-15T22:09:22Z |
| MAL-2026-188 | Malicious code in shopping-cart-service (npm) | 2026-01-10T08:14:10Z | 2026-01-15T22:09:22Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1064 | PaloAlto Networks PAN-OS: Mehrere Schwachstellen | 2025-05-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1063 | PaloAlto Networks GlobalProtect: Mehrere Schwachstellen | 2025-05-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1061 | Vercel Next.js: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1060 | Red Hat OpenShift: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1059 | Red Hat Enterprise Linux (Yggdrasil): Schwachstelle ermöglicht Privilegieneskalation | 2025-05-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1057 | PaloAlto Networks Prisma Cloud Compute Edition: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1054 | SonicWall SMA: Schwachstelle ermöglicht Manipulation | 2025-05-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1053 | Progress Software Sitefinity: Schwachstelle ermöglicht Denial of Service | 2025-05-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1052 | Jenkins Plugins: Mehrere Schwachstellen | 2025-05-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2025-0056 | Keycloak: Mehrere Schwachstellen | 2025-01-13T23:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2024-3499 | VMware Tanzu Spring Security: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-11-19T23:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2024-3147 | Red Hat Produkte: Mehrere Schwachstellen | 2024-10-10T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2024-2190 | Red Hat Single Sign On und Keycloak: Mehrere Schwachstellen ermöglicht Privilegieneskalation | 2024-09-19T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2024-2185 | Keycloak: Schwachstelle ermöglicht Darstellen falscher Informationen | 2024-09-19T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2024-2108 | Keycloak: Schwachstelle ermöglicht Denial of Service | 2024-09-10T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2024-1548 | Node.js: Mehrere Schwachstellen | 2024-07-08T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2024-1068 | Red Hat Enterprise Linux (Quarkus and Netty): Mehrere Schwachstellen | 2024-05-07T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2024-0679 | Apache Commons: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-03-20T23:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2024-0414 | Apache Commons: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-02-18T23:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2024-0393 | Node.js: Mehrere Schwachstellen | 2024-02-14T23:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2024-0340 | Apache Solr: Mehrere Schwachstellen | 2024-02-11T23:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2024-0181 | OpenSSL: Schwachstelle ermöglicht Denial of Service | 2024-01-23T23:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2023-3228 | Python (pip): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-12-28T23:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2023-3141 | bzip2: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2019-06-23T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2023-3105 | Red Hat Enterprise Linux (tracker-miners): Schwachstelle ermöglicht Codeausführung | 2023-12-11T23:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2023-2655 | Node.js: Mehrere Schwachstellen | 2023-10-15T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2023-1572 | jQuery: Schwachstelle ermöglicht Cross-Site Scripting | 2023-06-26T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2023-1480 | FasterXML Jackson: Schwachstelle ermöglicht Denial of Service | 2023-06-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2023-0055 | Microsoft Windows und Microsoft Windows Server: Mehrere Schwachstellen | 2023-01-10T23:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2022-1608 | FasterXML Jackson: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-10-03T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2065 | Red Hat Security Advisory: OpenShift Container Platform 4.12.85 bug fix and security update | 2026-02-12T12:19:52+00:00 | 2026-03-02T18:47:09+00:00 |
| rhsa-2026:2078 | Red Hat Security Advisory: OpenShift Container Platform 4.18.33 bug fix and security update | 2026-02-11T04:27:02+00:00 | 2026-03-02T18:47:08+00:00 |
| rhsa-2026:2066 | Red Hat Security Advisory: OpenShift Container Platform 4.12.85 security and extras update | 2026-02-12T10:52:37+00:00 | 2026-03-02T18:47:08+00:00 |
| rhsa-2026:1577 | Red Hat Security Advisory: OpenShift Container Platform 4.17.48 bug fix and security update | 2026-02-04T08:15:24+00:00 | 2026-03-02T18:47:08+00:00 |
| rhsa-2026:1556 | Red Hat Security Advisory: OpenShift Container Platform 4.20.13 security and extras update | 2026-02-04T04:16:28+00:00 | 2026-03-02T18:47:05+00:00 |
| rhsa-2026:1555 | Red Hat Security Advisory: OpenShift Container Platform 4.20.13 bug fix and security update | 2026-02-04T04:50:43+00:00 | 2026-03-02T18:46:59+00:00 |
| rhsa-2026:1549 | Red Hat Security Advisory: OpenShift Container Platform 4.15.61 bug fix and security update | 2026-02-05T15:48:33+00:00 | 2026-03-02T18:46:54+00:00 |
| rhsa-2026:1062 | Red Hat Security Advisory: OpenShift Container Platform 4.18.32 bug fix and security update | 2026-02-03T17:11:40+00:00 | 2026-03-02T18:46:54+00:00 |
| rhsa-2026:1004 | Red Hat Security Advisory: OpenShift Container Platform 4.14.61 security and extras update | 2026-01-30T09:50:08+00:00 | 2026-03-02T18:46:54+00:00 |
| rhsa-2026:0715 | Red Hat Security Advisory: OpenShift Container Platform 4.17.47 bug fix and security update | 2026-01-22T18:11:18+00:00 | 2026-03-02T18:46:54+00:00 |
| rhsa-2026:0338 | Red Hat Security Advisory: OpenShift Container Platform 4.18.31 bug fix and security update | 2026-01-14T22:29:24+00:00 | 2026-03-02T18:46:53+00:00 |
| rhsa-2026:0327 | Red Hat Security Advisory: OpenShift Container Platform 4.16.55 bug fix and security update | 2026-01-15T15:33:44+00:00 | 2026-03-02T18:46:53+00:00 |
| rhsa-2025:0079 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17.2 Bug Fix Update | 2025-01-08T10:04:05+00:00 | 2026-03-02T18:46:44+00:00 |
| rhsa-2024:8113 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.3 security and bug fix update | 2024-10-15T08:52:38+00:00 | 2026-03-02T18:46:42+00:00 |
| rhsa-2024:8023 | Red Hat Security Advisory: Release of OpenShift Serverless Logic 1.34.0 security update & enhancements | 2024-10-14T00:59:58+00:00 | 2026-03-02T18:46:42+00:00 |
| rhba-2024:7523 | Red Hat Bug Fix Advisory: Red Hat Developer Hub 1.3.0 release | 2024-10-02T15:29:03+00:00 | 2026-03-02T18:46:23+00:00 |
| rhsa-2024:8169 | Red Hat Security Advisory: thunderbird security update | 2024-10-16T06:37:53+00:00 | 2026-03-02T18:07:01+00:00 |
| rhsa-2024:8166 | Red Hat Security Advisory: thunderbird security update | 2024-10-16T06:41:43+00:00 | 2026-03-02T18:07:01+00:00 |
| rhsa-2024:7856 | Red Hat Security Advisory: thunderbird security update | 2024-10-09T12:04:34+00:00 | 2026-03-02T18:07:01+00:00 |
| rhsa-2024:7855 | Red Hat Security Advisory: thunderbird security update | 2024-10-09T11:35:59+00:00 | 2026-03-02T18:07:00+00:00 |
| rhsa-2024:7854 | Red Hat Security Advisory: thunderbird security update | 2024-10-09T12:06:15+00:00 | 2026-03-02T18:07:00+00:00 |
| rhsa-2024:7853 | Red Hat Security Advisory: thunderbird security update | 2024-10-09T11:43:44+00:00 | 2026-03-02T18:07:00+00:00 |
| rhsa-2024:7842 | Red Hat Security Advisory: firefox security update | 2024-10-09T09:11:19+00:00 | 2026-03-02T18:06:59+00:00 |
| rhsa-2024:7704 | Red Hat Security Advisory: firefox security update | 2024-10-07T01:23:07+00:00 | 2026-03-02T18:06:59+00:00 |
| rhsa-2024:7703 | Red Hat Security Advisory: firefox security update | 2024-10-07T01:20:11+00:00 | 2026-03-02T18:06:59+00:00 |
| rhsa-2024:7702 | Red Hat Security Advisory: firefox security update | 2024-10-07T01:23:07+00:00 | 2026-03-02T18:06:59+00:00 |
| rhsa-2024:7700 | Red Hat Security Advisory: firefox security update | 2024-10-07T01:38:18+00:00 | 2026-03-02T18:06:58+00:00 |
| rhsa-2024:7699 | Red Hat Security Advisory: thunderbird security update | 2024-10-07T01:26:31+00:00 | 2026-03-02T18:06:58+00:00 |
| rhsa-2024:7646 | Red Hat Security Advisory: firefox security update | 2024-10-03T18:18:38+00:00 | 2026-03-02T18:06:58+00:00 |
| rhsa-2024:7622 | Red Hat Security Advisory: firefox security update | 2024-10-03T11:30:46+00:00 | 2026-03-02T18:06:57+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsma-24-151-01 | Baxter Welch Allyn Configuration Tool | 2024-05-30T06:00:00.000000Z | 2024-05-30T06:00:00.000000Z |
| icsa-24-151-04 | Westermo EDW-100 | 2024-05-30T06:00:00.000000Z | 2024-05-30T06:00:00.000000Z |
| icsa-24-151-03 | Inosoft VisiWin | 2024-05-30T06:00:00.000000Z | 2024-05-30T06:00:00.000000Z |
| icsa-24-151-01 | LenelS2 NetBox | 2024-05-30T06:00:00.000000Z | 2024-05-30T06:00:00.000000Z |
| icsa-22-172-01 | Mitsubishi Electric MELSEC iQ-R, Q, L Series and MELIPC Series (Update C) | 2022-06-14T06:00:00.000000Z | 2024-05-30T06:00:00.000000Z |
| icsa-24-149-01 | Campbell Scientific CSI Web Server | 2024-05-28T06:00:00.000000Z | 2024-05-28T06:00:00.000000Z |
| icsa-24-144-01 | AutomationDirect Productivity PLCs | 2024-05-23T06:00:00.000000Z | 2024-05-23T06:00:00.000000Z |
| icsa-24-142-01 | LCDS LAquis SCADA | 2024-05-21T06:00:00.000000Z | 2024-05-21T06:00:00.000000Z |
| icsma-20-049-02 | GE Healthcare Ultrasound products (Update A) | 2020-02-18T07:00:00.000000Z | 2024-05-16T06:00:00.000000Z |
| icsa-24-137-14 | Rockwell Automation FactoryTalk View SE | 2024-05-16T06:00:00.000000Z | 2024-05-16T06:00:00.000000Z |
| icsa-24-044-01 | Mitsubishi Electric MELSEC iQ-R Series Safety CPU and SIL2 Process CPU (Update A) | 2024-02-13T07:00:00.000000Z | 2024-05-16T06:00:00.000000Z |
| icsa-24-135-03 | Johnson Controls Software House C●CURE 9000 | 2024-05-14T06:00:00.000000Z | 2024-05-14T06:00:00.000000Z |
| icsa-24-135-02 | SUBNET PowerSYSTEM Center | 2024-05-14T06:00:00.000000Z | 2024-05-14T06:00:00.000000Z |
| icsa-24-135-01 | Rockwell Automation FactoryTalk Remote Access | 2024-05-14T06:00:00.000000Z | 2024-05-14T06:00:00.000000Z |
| icsa-24-137-12 | Siemens Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-11 | Siemens RUGGEDCOM APE1808 | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-10 | Siemens RUGGEDCOM CROSSBOW | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-09 | Siemens Solid Edge | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-08 | Siemens PS/IGES Parasolid Translator Component | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-06 | Siemens SIMATIC CN 4100 | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-05 | Siemens Simcenter Nastran | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-04 | Siemens Polarion ALM | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-03 | Siemens Teamcenter Visualization and JT2Go | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-01 | Siemens Parasolid | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-074-09 | Siemens Sinteso EN Cerberus PRO EN Fire Protection Systems | 2024-03-12T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-074-02 | Siemens Solid Edge | 2024-03-12T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-046-14 | Siemens Polarion ALM | 2024-02-13T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-046-08 | Siemens RUGGEDCOM APE1808 | 2024-02-13T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-23-348-09 | Siemens Simantic S7-1500 CPU family | 2023-12-12T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-23-320-14 | Siemens RUGGEDCOM APE1808 Devices | 2023-11-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cuic-xss-cshudtrl | Cisco Unified Intelligence Center Reflected Cross-Site Scripting Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-07-21T19:55:20+00:00 |
| cisco-sa-cuic-xss-csHUdtrL | Cisco Unified Intelligence Center Reflected Cross-Site Scripting Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-07-21T19:55:20+00:00 |
| cisco-sa-ucsi2-iptaclbp-l8dzs8m8 | Cisco Intersight Virtual Appliance IPv4 and IPv6 Forwarding Vulnerabilities | 2021-07-21T16:00:00+00:00 | 2021-07-21T16:00:00+00:00 |
| cisco-sa-ucsi2-iptaclbp-L8Dzs8m8 | Cisco Intersight Virtual Appliance IPv4 and IPv6 Forwarding Vulnerabilities | 2021-07-21T16:00:00+00:00 | 2021-07-21T16:00:00+00:00 |
| cisco-sa-ucsi2-dtcinj-yh5u4rsx | Cisco Intersight Virtual Appliance Vulnerabilities | 2021-07-21T16:00:00+00:00 | 2021-07-21T16:00:00+00:00 |
| cisco-sa-ucsi2-dtcinj-yH5U4RSx | Cisco Intersight Virtual Appliance Vulnerabilities | 2021-07-21T16:00:00+00:00 | 2021-07-21T16:00:00+00:00 |
| cisco-sa-sdwan-vmanage-infdis-lggop9se | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2021-07-21T16:00:00+00:00 | 2021-07-21T16:00:00+00:00 |
| cisco-sa-sdwan-vmanage-infdis-LggOP9sE | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2021-07-21T16:00:00+00:00 | 2021-07-21T16:00:00+00:00 |
| cisco-sa-sdw-mpls-infodisclos-mssrfkzq | Cisco SD-WAN Software Information Disclosure Vulnerability | 2021-07-21T16:00:00+00:00 | 2021-07-21T16:00:00+00:00 |
| cisco-sa-sdw-mpls-infodisclos-MSSRFkZq | Cisco SD-WAN Software Information Disclosure Vulnerability | 2021-07-21T16:00:00+00:00 | 2021-07-21T16:00:00+00:00 |
| cisco-sa-imc-openred-zayru6d2 | Cisco Integrated Management Controller Open Redirect Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-07-16T17:37:29+00:00 |
| cisco-sa-imc-openred-zAYrU6d2 | Cisco Integrated Management Controller Open Redirect Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-07-16T17:37:29+00:00 |
| cisco-sa-asa-ftd-ipsec-dos-tfkqbgwc | Cisco Adaptive Security Appliance Software Release 9.16.1 and Cisco Firepower Threat Defense Software Release 7.0.0 IPsec Denial of Service Vulnerability | 2021-07-15T16:00:00+00:00 | 2021-07-16T14:57:55+00:00 |
| cisco-sa-asa-ftd-ipsec-dos-TFKQbgWC | Cisco Adaptive Security Appliance Software Release 9.16.1 and Cisco Firepower Threat Defense Software Release 7.0.0 IPsec Denial of Service Vulnerability | 2021-07-15T16:00:00+00:00 | 2021-07-16T14:57:55+00:00 |
| cisco-sa-proximity-ssl-cert-gbbu3rb | Cisco Intelligent Proximity SSL Certificate Validation Vulnerability | 2020-03-04T16:00:00+00:00 | 2021-07-15T14:50:11+00:00 |
| cisco-sa-proximity-ssl-cert-gBBu3RB | Cisco Intelligent Proximity SSL Certificate Validation Vulnerability | 2020-03-04T16:00:00+00:00 | 2021-07-15T14:50:11+00:00 |
| cisco-sa-20190515-nxos-cmdinj-1735 | Cisco NX-OS Software Command Injection Vulnerability (CVE-2019-1735) | 2019-05-15T16:00:00+00:00 | 2021-07-12T14:24:27+00:00 |
| cisco-sa-20190515-nxos-conf-bypass | Cisco FXOS and NX-OS Software Secure Configuration Bypass Vulnerability | 2019-05-15T16:00:00+00:00 | 2021-07-12T14:24:25+00:00 |
| cisco-sa-20190515-nxos-snmp-dos | Cisco FXOS and NX-OS Software Simple Network Management Protocol Denial of Service Vulnerability | 2019-05-15T16:00:00+00:00 | 2021-07-12T14:24:24+00:00 |
| cisco-sa-broad-as-inf-disc-zuxgffxq | Cisco BroadWorks Application Server Information Disclosure Vulnerability | 2021-07-07T16:00:00+00:00 | 2021-07-09T18:17:57+00:00 |
| cisco-sa-broad-as-inf-disc-ZUXGFFXQ | Cisco BroadWorks Application Server Information Disclosure Vulnerability | 2021-07-07T16:00:00+00:00 | 2021-07-09T18:17:57+00:00 |
| cisco-sa-sdwan-vmaninfdis3-ovdr6uu8 | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-07-07T19:45:23+00:00 |
| cisco-sa-sdwan-vmaninfdis3-OvdR6uu8 | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-07-07T19:45:23+00:00 |
| cisco-sa-vvb-xss-wg4zxrp3 | Cisco Virtualized Voice Browser Cross-Site Scripting Vulnerability | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-vvb-xss-wG4zXRp3 | Cisco Virtualized Voice Browser Cross-Site Scripting Vulnerability | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-ipcamera-lldp-mem-wgqundtq | Cisco Video Surveillance 7000 Series IP Cameras Link Layer Discovery Protocol Memory Leak Vulnerabilities | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-ipcamera-lldp-mem-wGqundTq | Cisco Video Surveillance 7000 Series IP Cameras Link Layer Discovery Protocol Memory Leak Vulnerabilities | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-brcm-mxc-jul2021-26lquzuh | Broadcom MediaxChange Vulnerability Affecting Cisco Products: July 2021 | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-brcm-mxc-jul2021-26LqUZUh | Broadcom MediaxChange Vulnerability Affecting Cisco Products: July 2021 | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-bpa-priv-esc-dgubwbh4 | Cisco Business Process Automation Privilege Escalation Vulnerabilities | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-36764 | Heap Buffer Overflow in Tcg2MeasurePeImage | 2024-01-01T08:00:00.000Z | 2026-02-18T14:45:58.000Z |
| msrc_cve-2024-50250 | fsdax: dax_unshare_iter needs to copy entire blocks | 2024-11-02T00:00:00.000Z | 2026-02-18T14:45:46.000Z |
| msrc_cve-2024-47685 | netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() | 2024-10-01T07:00:00.000Z | 2026-02-18T14:45:46.000Z |
| msrc_cve-2019-11236 | In the urllib3 library through 1.24.1 for Python CRLF injection is possible if the attacker controls the request parameter. | 2019-04-02T00:00:00.000Z | 2026-02-18T14:45:40.000Z |
| msrc_cve-2025-38047 | x86/fred: Fix system hang during S4 resume with FRED enabled | 2025-06-02T00:00:00.000Z | 2026-02-18T14:45:25.000Z |
| msrc_cve-2025-71125 | tracing: Do not register unsupported perf events | 2026-01-02T00:00:00.000Z | 2026-02-18T14:45:24.000Z |
| msrc_cve-2024-49866 | tracing/timerlat: Fix a race during cpuhp processing | 2024-10-01T07:00:00.000Z | 2026-02-18T14:45:16.000Z |
| msrc_cve-2024-42353 | WebOb's location header normalization during redirect leads to open redirect | 2024-08-02T00:00:00.000Z | 2026-02-18T14:45:16.000Z |
| msrc_cve-2018-25091 | urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive). | 2023-10-01T00:00:00.000Z | 2026-02-18T14:45:13.000Z |
| msrc_cve-2025-71130 | drm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer | 2026-01-02T00:00:00.000Z | 2026-02-18T14:44:46.000Z |
| msrc_cve-2025-5917 | Libarchive: off by one error in build_ustar_entry_name() at archive_write_set_format_pax.c | 2025-06-02T00:00:00.000Z | 2026-02-18T14:44:45.000Z |
| msrc_cve-2024-47747 | net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition | 2024-10-01T07:00:00.000Z | 2026-02-18T14:44:32.000Z |
| msrc_cve-2021-4238 | Insufficient randomness in github.com/Masterminds/goutils | 2022-12-02T00:00:00.000Z | 2026-02-18T14:44:31.000Z |
| msrc_cve-2024-43374 | Vim heap-use-after-free in src/arglist.c:207 | 2024-08-02T00:00:00.000Z | 2026-02-18T14:44:22.000Z |
| msrc_cve-2025-38035 | nvmet-tcp: don't restore null sk_state_change | 2025-06-02T00:00:00.000Z | 2026-02-18T14:44:20.000Z |
| msrc_cve-2024-50258 | net: fix crash when config small gso_max_size/gso_ipv4_max_size | 2024-11-02T00:00:00.000Z | 2026-02-18T14:44:19.000Z |
| msrc_cve-2025-71127 | wifi: mac80211: Discard Beacon frames to non-broadcast address | 2026-01-02T00:00:00.000Z | 2026-02-18T14:44:12.000Z |
| msrc_cve-2025-71131 | crypto: seqiv - Do not use req->iv after crypto_aead_encrypt | 2026-01-02T00:00:00.000Z | 2026-02-18T14:44:07.000Z |
| msrc_cve-2023-45290 | Memory exhaustion in multipart form parsing in net/textproto and net/http | 2024-03-02T08:00:00.000Z | 2026-02-18T14:44:04.000Z |
| msrc_cve-2023-3966 | Openvswsitch: ovs-vswitch fails to recover after malformed geneve metadata packet | 2024-02-02T08:00:00.000Z | 2026-02-18T14:44:03.000Z |
| msrc_cve-2011-3048 | The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow. | 2012-05-02T00:00:00.000Z | 2026-02-18T14:43:57.000Z |
| msrc_cve-2024-47755 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2024-10-01T07:00:00.000Z | 2026-02-18T14:43:37.000Z |
| msrc_cve-2025-71121 | parisc: Do not reprogram affinitiy on ASP chip | 2026-01-02T00:00:00.000Z | 2026-02-18T14:43:31.000Z |
| msrc_cve-2025-68799 | caif: fix integer underflow in cffrml_receive() | 2026-01-02T00:00:00.000Z | 2026-02-18T14:43:30.000Z |
| msrc_cve-2024-42270 | netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init(). | 2024-08-02T00:00:00.000Z | 2026-02-18T14:43:29.000Z |
| msrc_cve-2025-5918 | Libarchive: reading past eof may be triggered for piped file streams | 2025-06-02T00:00:00.000Z | 2026-02-18T14:43:28.000Z |
| msrc_cve-2025-38080 | drm/amd/display: Increase block_sequence array size | 2025-06-02T00:00:00.000Z | 2026-02-18T14:43:19.000Z |
| msrc_cve-2019-11324 | The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument. | 2019-04-02T00:00:00.000Z | 2026-02-18T14:43:18.000Z |
| msrc_cve-2024-50143 | udf: fix uninit-value use in udf_get_fileshortad | 2024-11-02T00:00:00.000Z | 2026-02-18T14:43:13.000Z |
| msrc_cve-2023-6936 | Heap-buffer over-read with WOLFSSL_CALLBACKS | 2024-02-02T08:00:00.000Z | 2026-02-18T14:43:07.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:14656-1 | perl-Compress-Raw-Zlib-2.213-1.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:14655-1 | hplip-3.24.4-4.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:14654-1 | grafana-11.3.0-5.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:14653-1 | govulncheck-vulndb-0.0.20250115T172141-1.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:14652-1 | git-2.48.1-1.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:0012-1 | Security update for opera | 2025-01-15T12:36:20Z | 2025-01-15T12:36:20Z |
| opensuse-su-2025:14651-1 | python311-Django4-4.2.18-1.1 on GA media | 2025-01-15T00:00:00Z | 2025-01-15T00:00:00Z |
| opensuse-su-2025:14650-1 | pam_u2f-1.3.1-1.1 on GA media | 2025-01-15T00:00:00Z | 2025-01-15T00:00:00Z |
| opensuse-su-2025:14649-1 | git-lfs-3.6.1-1.1 on GA media | 2025-01-15T00:00:00Z | 2025-01-15T00:00:00Z |
| opensuse-su-2025:14648-1 | MozillaThunderbird-128.6.0-1.1 on GA media | 2025-01-15T00:00:00Z | 2025-01-15T00:00:00Z |
| opensuse-su-2025:14647-1 | python311-translate-toolkit-3.14.5-1.1 on GA media | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| opensuse-su-2025:14646-1 | libraptor-devel-2.0.16-4.1 on GA media | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| opensuse-su-2025:14645-1 | python311-Pillow-11.1.0-1.1 on GA media | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| opensuse-su-2025:14644-1 | govulncheck-vulndb-0.0.20250109T194159-1.1 on GA media | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| opensuse-su-2025:14643-1 | dcmtk-3.6.9-1.1 on GA media | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| opensuse-su-2025:14642-1 | SDL2_sound-devel-2.0.4-1.1 on GA media | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| opensuse-su-2025:14641-1 | rclone-1.69.0-1.1 on GA media | 2025-01-13T00:00:00Z | 2025-01-13T00:00:00Z |
| opensuse-su-2025:14640-1 | kepler-0.7.11-2.1 on GA media | 2025-01-13T00:00:00Z | 2025-01-13T00:00:00Z |
| opensuse-su-2025:14639-1 | yq-4.44.6-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14638-1 | valkey-8.0.2-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14637-1 | python311-mistune-3.1.0-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14636-1 | proftpd-1.3.8c-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14635-1 | perl-Module-ScanDeps-1.370.0-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14634-1 | operator-sdk-1.39.0-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14633-1 | grafana-11.3.0-4.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14632-1 | frr-10.2.1-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14631-1 | dpdk-23.11.1-4.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14630-1 | MozillaFirefox-134.0-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14629-1 | chromedriver-131.0.6778.264-1.1 on GA media | 2025-01-10T00:00:00Z | 2025-01-10T00:00:00Z |
| opensuse-su-2025:14628-1 | python311-slixmpp-1.8.6-1.1 on GA media | 2025-01-09T00:00:00Z | 2025-01-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-997 | Heap-buffer-overflow in ZSTD_createDDict_advanced | 2021-07-14T00:01:21.159182Z | 2022-06-16T00:04:17.868354Z |
| osv-2021-897 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2021-06-26T00:00:37.934284Z | 2022-06-16T00:04:17.202124Z |
| osv-2021-1791 | Heap-buffer-overflow in ZSTD_createDDict | 2021-12-31T00:02:03.777116Z | 2022-06-16T00:04:04.371193Z |
| osv-2021-1589 | Heap-buffer-overflow in inflate | 2021-11-19T00:00:42.702380Z | 2022-06-16T00:04:02.814797Z |
| osv-2022-485 | Segv on unknown address in duckdb::ExpressionBinder::BindExpression | 2022-06-16T00:00:15.479357Z | 2022-06-16T00:00:15.479757Z |
| osv-2022-483 | Heap-buffer-overflow in ndpi_search_dns | 2022-06-15T00:01:56.102357Z | 2022-06-15T00:01:56.102595Z |
| osv-2022-481 | UNKNOWN READ in ndpi_strdup | 2022-06-15T00:01:12.654297Z | 2022-06-15T00:01:12.654543Z |
| osv-2022-480 | Heap-buffer-overflow in jxl::JxlBoxContentDecoder::Process | 2022-06-15T00:00:47.673415Z | 2022-06-15T00:00:47.673708Z |
| osv-2022-476 | Stack-buffer-overflow in simple_str_to_doublestr | 2022-06-13T00:01:55.785660Z | 2022-06-13T00:01:55.785861Z |
| osv-2022-475 | Heap-double-free in nft_set_context_free_many | 2022-06-13T00:01:49.208216Z | 2022-06-13T00:01:49.208454Z |
| osv-2022-474 | Heap-double-free in config_parse_nft_set_context | 2022-06-13T00:00:44.235758Z | 2022-06-13T00:00:44.236019Z |
| osv-2022-473 | Stack-buffer-overflow in input_osc_52 | 2022-06-13T00:00:43.680059Z | 2022-06-13T00:00:43.680337Z |
| osv-2022-472 | Heap-double-free in nft_set_context_free_many | 2022-06-12T00:02:00.632767Z | 2022-06-12T00:02:00.632977Z |
| osv-2022-468 | Heap-buffer-overflow in json_parse | 2022-06-12T00:00:08.434300Z | 2022-06-12T00:00:08.434602Z |
| osv-2022-467 | Security exception in jaz.Zer.<clinit> | 2022-06-10T00:00:30.386864Z | 2022-06-10T00:00:30.387111Z |
| osv-2022-460 | Heap-use-after-free in inflate | 2022-06-06T00:01:38.349008Z | 2022-06-09T00:43:11.909085Z |
| osv-2022-463 | Uncaught exception in com.ctc.wstx.dtd.FullDTDReader.readContentSpec | 2022-06-08T00:00:50.179167Z | 2022-06-08T00:00:50.179440Z |
| osv-2022-458 | Uncaught exception in com.ctc.wstx.dtd.FullDTDReader.readContentSpec | 2022-06-04T00:01:54.560493Z | 2022-06-04T00:01:54.560720Z |
| osv-2022-457 | Heap-buffer-overflow in CFF::Charset::collect_glyph_to_sid_map | 2022-06-04T00:01:52.823074Z | 2022-06-04T00:01:52.823308Z |
| osv-2022-456 | Null-dereference READ in load_glyph | 2022-06-04T00:01:31.294896Z | 2022-06-04T00:01:31.295128Z |
| osv-2022-455 | Uncaught exception in com.ctc.wstx.dtd.FullDTDReader.readContentSpec | 2022-06-04T00:01:04.189652Z | 2022-06-04T00:01:04.189880Z |
| osv-2022-453 | Segv on unknown address in gx_device_finalize | 2022-06-03T00:00:46.765501Z | 2022-06-03T00:00:46.765738Z |
| osv-2022-451 | Heap-buffer-overflow in myeid_create_key | 2022-06-02T00:02:00.250877Z | 2022-06-02T00:02:00.251315Z |
| osv-2022-450 | Heap-buffer-overflow in Curl_headers_push | 2022-06-02T00:01:55.821368Z | 2022-06-02T00:01:55.821619Z |
| osv-2022-449 | UNKNOWN WRITE in alloc_restore_step_in | 2022-06-02T00:01:51.881159Z | 2022-06-02T00:01:51.881396Z |
| osv-2022-447 | Heap-buffer-overflow in ndpi_search_http_tcp | 2022-06-01T00:01:50.990454Z | 2022-06-01T00:01:50.990703Z |
| osv-2022-445 | Stack-buffer-overflow in tlsCheckUncommonALPN | 2022-06-01T00:00:07.684819Z | 2022-06-01T00:00:07.685074Z |
| osv-2022-443 | Heap-buffer-overflow in ndpi_search_http_tcp | 2022-05-31T00:00:50.179754Z | 2022-05-31T00:00:50.180013Z |
| osv-2022-439 | Stack-use-after-return in test_update | 2022-05-29T00:01:40.731606Z | 2022-05-29T00:01:40.731836Z |
| osv-2022-437 | Stack-buffer-overflow in sc_asn1_read_tag | 2022-05-29T00:00:46.150112Z | 2022-05-29T00:00:46.150356Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tensorflow-2021-29565 | Null pointer dereference in `SparseFillEmptyRows` | 2024-03-06T11:19:03.545Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29564 | Null pointer dereference in `EditDistance` | 2024-03-06T11:19:04.756Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29563 | CHECK-fail in `tf.raw_ops.RFFT` | 2024-03-06T11:19:05.998Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29562 | CHECK-fail in `tf.raw_ops.IRFFT` | 2024-03-06T11:19:07.253Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29561 | CHECK-fail in `LoadAndRemapMatrix` | 2024-03-06T11:19:08.489Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29560 | Heap buffer overflow in `RaggedTensorToTensor` | 2024-03-06T11:19:09.761Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29559 | Heap OOB access in unicode ops | 2024-03-06T11:19:11.020Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29558 | Heap buffer overflow in `SparseSplit` | 2024-03-06T11:19:12.266Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29557 | Division by 0 in `SparseMatMul` | 2024-03-06T11:19:13.508Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29556 | Division by 0 in `Reverse` | 2024-03-06T11:19:14.819Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29555 | Division by 0 in `FusedBatchNorm` | 2024-03-06T11:19:16.076Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29554 | Division by 0 in `DenseCountSparseOutput` | 2024-03-06T11:19:17.329Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29553 | Heap OOB in `QuantizeAndDequantizeV3` | 2024-03-06T11:19:18.587Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29552 | CHECK-failure in `UnsortedSegmentJoin` | 2024-03-06T11:19:19.829Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29551 | OOB read in `MatrixTriangularSolve` | 2024-03-06T11:19:21.114Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29550 | Division by 0 in `FractionalAvgPool` | 2024-03-06T11:19:22.352Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29549 | Division by 0 in `QuantizedAdd` | 2024-03-06T11:19:23.653Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29548 | Division by 0 in `QuantizedBatchNormWithGlobalNormalization` | 2024-03-06T11:19:24.918Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29547 | Heap out of bounds in `QuantizedBatchNormWithGlobalNormalization` | 2024-03-06T11:19:26.153Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29546 | Division by 0 in `QuantizedBiasAdd` | 2024-03-06T11:19:27.416Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29545 | Heap buffer overflow in `SparseTensorToCSRSparseMatrix` | 2024-03-06T11:19:28.650Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29544 | CHECK-fail in `QuantizeAndDequantizeV4Grad` | 2024-03-06T11:19:29.901Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29543 | CHECK-fail in `CTCGreedyDecoder` | 2024-03-06T11:19:31.117Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29542 | Heap buffer overflow in `StringNGrams` | 2024-03-06T11:19:32.352Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29541 | Null pointer dereference in `StringNGrams` | 2024-03-06T11:19:33.584Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29540 | Heap buffer overflow in `Conv2DBackpropFilter` | 2024-03-06T11:19:34.848Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29539 | Segfault in tf.raw_ops.ImmutableConst | 2024-03-06T11:19:36.131Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29538 | Division by zero in `Conv2DBackpropFilter` | 2024-03-06T11:19:37.370Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29537 | Heap buffer overflow in `QuantizedResizeBilinear` | 2024-03-06T11:19:38.623Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29536 | Heap buffer overflow in `QuantizedReshape` | 2024-03-06T11:19:39.891Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202405-0224 | D-Link DIR-3040 prog.cgi websSecurityHandler Memory Leak Denial-of-Service Vulnerability.… | 2024-06-07T22:57:41.073000Z |
| var-202405-0217 | D-Link DIR-2640 HTTP Referer Stack-Based Buffer Overflow Remote Code Execution Vulnerabil… | 2024-06-07T22:54:49.824000Z |
| var-202210-2081 | An Improper Input Validation vulnerability exists in Trihedral VTScada version 12.0.38 an… | 2024-06-07T22:53:10.566000Z |
| var-202402-1450 | Incorrect Privilege Assignment vulnerability in Mitsubishi Electric Corporation MELSEC iQ… | 2024-06-07T22:53:08.079000Z |
| var-200110-0292 | OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a de… | 2024-06-07T21:31:54.786000Z |
| var-201911-0712 | An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8… | 2024-06-07T20:56:30.284000Z |
| var-200609-0707 | The FTP server in Apple Mac OS X 10.4.8 and earlier, when FTP Access is enabled, will cra… | 2024-06-07T19:51:48.462000Z |
| var-201409-1156 | GNU Bash through 4.3 processes trailing strings after function definitions in the values … | 2024-06-07T19:22:35.899000Z |
| var-200411-0128 | Heap-based buffer overflow in Dell OpenManage Web Server 3.4.0 allows remote attackers to… | 2024-06-06T23:12:44.021000Z |
| var-202307-2198 | Authentication Bypass vulnerability in D-Link DIR-885L FW102b01 allows remote attackers t… | 2024-06-06T23:11:27.436000Z |
| var-200411-0127 | Buffer overflow in Serv-U ftp before 5.0.0.4 allows remote authenticated users to execute… | 2024-06-06T23:11:25.303000Z |
| var-200411-0080 | Linksys WAP55AG 1.07 allows remote attackers with access to an SNMP read only community s… | 2024-06-06T23:10:52.028000Z |
| var-202404-2100 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been classified as critical… | 2024-06-06T23:10:25.514000Z |
| var-202203-0661 | Improper neutralization of Special Elements leading to OS Command Injection vulnerability… | 2024-06-06T23:09:03.360000Z |
| var-200408-0157 | A certain ActiveX control in Symantec Norton AntiVirus 2004 allows remote attackers to ca… | 2024-06-06T23:06:44.094000Z |
| var-200407-0081 | The SYMDNS.SYS driver in Symantec Norton Internet Security and Professional 2002 through … | 2024-06-06T23:06:44.146000Z |
| var-200407-0080 | Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton Internet Security and Professi… | 2024-06-06T23:06:44.205000Z |
| var-200411-0158 | The Javascript engine in Safari 1.2 and earlier allows remote attackers to cause a denial… | 2024-06-06T23:03:20.913000Z |
| var-202404-2094 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been declared as critical. … | 2024-06-06T23:01:55.408000Z |
| var-202404-0368 | A vulnerability, which was classified as critical, was found in Tenda W15E 15.11.0.14. Af… | 2024-06-06T23:01:55.473000Z |
| var-202404-0179 | A vulnerability classified as critical was found in Tenda AC500 2.0.1.9(1307). Affected b… | 2024-06-06T23:01:55.520000Z |
| var-202102-1300 | The administration web interface on Belkin Linksys WRT160NL 1.0.04.002_US_20130619 device… | 2024-06-06T23:00:56.504000Z |
| var-202309-0018 | A vulnerability, which was classified as critical, has been found in D-Link DAR-8000-10 u… | 2024-06-06T22:58:19.435000Z |
| var-202404-0389 | A vulnerability was found in Tenda W15E 15.11.0.14. It has been rated as critical. This i… | 2024-06-06T22:58:15.190000Z |
| var-202303-0412 | Cross-site scripting vulnerability in SEIKO EPSON printers/network interface Web Config a… | 2024-06-06T22:56:24.356000Z |
| var-202303-0411 | Cross-site request forgery (CSRF) vulnerability in SEIKO EPSON printers/network interface… | 2024-06-06T22:56:24.324000Z |
| var-200408-0170 | SYMNDIS.SYS in Symantec Norton Internet Security 2003 and 2004, Norton Personal Firewall … | 2024-06-06T22:56:19.338000Z |
| var-200412-0086 | The H.323 protocol agent in StoneSoft firewall engine 2.2.8 and earlier allows remote att… | 2024-06-06T22:55:00.856000Z |
| var-200408-0174 | Buffer overflow in the logging capability for the DHCP daemon (DHCPD) for ISC DHCP 3.0.1r… | 2024-06-06T22:52:01.388000Z |
| var-200412-0097 | Memory leak in Juniper JUNOS Packet Forwarding Engine (PFE) allows remote attackers to ca… | 2024-06-06T22:40:43.014000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000106 | Multiple Hikari Denwa routers vulnerable to cross-site request forgery | 2016-06-27T14:19+09:00 | 2016-08-03T16:07+09:00 |
| jvndb-2016-000105 | Multiple Hikari Denwa routers vulnerable to OS command injection | 2016-06-27T14:10+09:00 | 2016-08-03T16:07+09:00 |
| jvndb-2016-000119 | QNAP QTS vulnerable to cross-site scripting | 2016-06-27T13:48+09:00 | 2016-08-03T14:55+09:00 |
| jvndb-2016-000128 | Android OS Contacts app fails to restrict access permissions | 2016-07-25T11:14+09:00 | 2016-07-25T11:14+09:00 |
| jvndb-2016-000103 | Deep Discovery Inspector vulnerable to remote code execution | 2016-06-16T14:03+09:00 | 2016-07-12T15:03+09:00 |
| jvndb-2015-000190 | EC-CUBE plugin BbAdminViewsControl vulnerable to SQL injection | 2015-12-03T14:26+09:00 | 2016-07-07T14:53+09:00 |
| jvndb-2016-000116 | WordPress plugin "Welcart e-Commerce" vulnerable to cross-site scripting | 2016-06-24T13:43+09:00 | 2016-06-29T16:05+09:00 |
| jvndb-2016-000115 | WordPress plugin "Welcart e-Commerce" vulnerable to PHP object injection | 2016-06-24T13:43+09:00 | 2016-06-29T16:04+09:00 |
| jvndb-2016-000109 | CG-WLR300GNV Series does not limit authentication attempts | 2016-06-22T14:57+09:00 | 2016-06-29T16:04+09:00 |
| jvndb-2016-000108 | CG-WLBARAGM vulnerable to denial-of-service (DoS) | 2016-06-22T14:57+09:00 | 2016-06-29T16:04+09:00 |
| jvndb-2016-000107 | CG-WLBARGL vulnerable to command injection | 2016-06-22T14:56+09:00 | 2016-06-29T16:03+09:00 |
| jvndb-2016-000118 | WordPress plugin "Welcart e-Commerce" vulnerable to session management | 2016-06-24T14:12+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000117 | WordPress plugin "Welcart e-Commerce" vulnerable to cross-site scripting | 2016-06-24T14:12+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000094 | Cybozu Garoon function "MultiReport" vulnerable to access restriction bypass | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000093 | Cybozu Garoon function "Portlets" vulnerable to access restriction bypass | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000079 | Cybozu Garoon vulnerable to information disclosure | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000077 | Cybozu Garoon mail function vulnerable to access restriction bypass | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000087 | Multiple Buffalo wireless LAN routers vulnerable to information disclosure | 2016-05-27T13:53+09:00 | 2016-06-27T14:59+09:00 |
| jvndb-2016-000086 | Multiple Buffalo wireless LAN routers vulnerable to directory traversal | 2016-05-27T13:53+09:00 | 2016-06-27T14:58+09:00 |
| jvndb-2016-000099 | DX Library vulnerable to remote code execution | 2016-06-08T14:30+09:00 | 2016-06-27T11:32+09:00 |
| jvndb-2016-000098 | TERASOLUNA Server Framework for Java(WEB) access restriction bypass vulnerability in the file extention filter | 2016-06-07T16:26+09:00 | 2016-06-27T11:32+09:00 |
| jvndb-2016-000095 | Cybozu Garoon logging function vulnerable to directory traversal | 2016-05-30T16:18+09:00 | 2016-06-23T17:49+09:00 |
| jvndb-2016-000085 | Cybozu Garoon fails to restrict access permissions | 2016-05-30T16:18+09:00 | 2016-06-23T17:43+09:00 |
| jvndb-2016-000078 | Cybozu Garoon function "Files" vulnerable to directory traversal | 2016-05-30T16:18+09:00 | 2016-06-23T17:40+09:00 |
| jvndb-2016-000076 | Japan Connected-free Wi-Fi vulnerable to API execution | 2016-05-27T13:51+09:00 | 2016-06-23T17:38+09:00 |
| jvndb-2016-000082 | Cybozu Garoon fails to restrict access permissions | 2016-05-30T16:18+09:00 | 2016-06-23T17:35+09:00 |
| jvndb-2016-000091 | H2O use-after-free vulnerability | 2016-05-27T13:46+09:00 | 2016-06-23T17:23+09:00 |
| jvndb-2016-000100 | ETX-R vulnerable to cross-site request forgery | 2016-06-14T13:55+09:00 | 2016-06-23T17:12+09:00 |
| jvndb-2016-000084 | Cybozu Garoon vulnerable to cross-site scripting | 2016-05-30T16:18+09:00 | 2016-06-23T17:09+09:00 |
| jvndb-2016-000081 | Cybozu Garoon vulnerable to open redirect | 2016-05-30T16:18+09:00 | 2016-06-23T17:06+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:02981-1 | Security update for postgresql16 | 2025-08-25T13:47:51Z | 2025-08-25T13:47:51Z |
| suse-su-2025:02980-1 | Security update for postgresql16 | 2025-08-25T13:46:44Z | 2025-08-25T13:46:44Z |
| suse-su-2025:02979-1 | Security update for tomcat11 | 2025-08-25T13:46:18Z | 2025-08-25T13:46:18Z |
| suse-su-2025:02978-1 | Security update for tomcat10 | 2025-08-25T13:45:39Z | 2025-08-25T13:45:39Z |
| suse-su-2025:20586-1 | Security update for the Linux Kernel | 2025-08-25T13:33:57Z | 2025-08-25T13:33:57Z |
| suse-su-2025:20602-1 | Security update for the Linux Kernel | 2025-08-25T13:32:36Z | 2025-08-25T13:32:36Z |
| suse-su-2025:20577-1 | Security update for the Linux Kernel | 2025-08-25T13:29:45Z | 2025-08-25T13:29:45Z |
| suse-su-2025:20626-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20625-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20624-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20623-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20622-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20621-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20620-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20585-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20584-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20583-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20582-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20581-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20580-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20579-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20578-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:02977-1 | Security update for kubernetes1.18 | 2025-08-25T12:18:12Z | 2025-08-25T12:18:12Z |
| suse-su-2025:20617-1 | Security update for kernel-livepatch-MICRO-6-0_Update_10 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20616-1 | Security update for kernel-livepatch-MICRO-6-0_Update_9 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20615-1 | Security update for kernel-livepatch-MICRO-6-0_Update_8 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20614-1 | Security update for kernel-livepatch-MICRO-6-0_Update_7 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20613-1 | Security update for kernel-livepatch-MICRO-6-0_Update_6 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20612-1 | Security update for kernel-livepatch-MICRO-6-0_Update_5 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20574-1 | Security update for kernel-livepatch-MICRO-6-0_Update_9 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-30209 | Nero Social Networking Site friendsphoto.php文件SQL注入漏洞 | 2025-11-20 | 2025-12-05 |
| cnvd-2025-30208 | Blog Site admin.php文件授权不当漏洞 | 2025-11-27 | 2025-12-05 |
| cnvd-2025-30207 | Blog Site blog.php文件SQL注入漏洞 | 2025-11-27 | 2025-12-05 |
| cnvd-2025-30206 | Devolutions Server证书验证不当漏洞 | 2025-10-21 | 2025-12-05 |
| cnvd-2025-30171 | WordPress Import WP plugin信息泄露漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30170 | WordPress I Order Terms plugin跨站请求伪造漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30169 | WordPress HT Mega plugin跨站脚本漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30168 | WordPress Gutenverse plugin缺少授权漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30167 | WordPress Gutenverse Form plugin缺少授权漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30166 | WordPress EchBay Admin Security plugin跨站脚本漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30165 | WordPress Display Pages Shortcode plugin跨站脚本漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30164 | WordPress Custom Post Type plugin跨站请求伪造漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30163 | WordPress Custom Order Numbers for WooCommerce plugin缺少授权漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30162 | WordPress Checkbox plugin未经授权的数据丢失漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30161 | WordPress Chat Help plugin缺失授权漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30160 | WordPress Cart Weight for WooCommerce plugin缺失授权漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30159 | WordPress Bulma Shortcodes plugin跨站脚本漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30158 | WordPress Accordion Slider plugin跨站脚本漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30134 | WordPress ELEX WordPress HelpDesk & Customer Ticketing System plugin不安全的直接对象引用漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30133 | WordPress ELEX WordPress HelpDesk & Customer Ticketing System plugin未经授权的数据修改漏洞(CNVD-2025… | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30132 | WordPress ELEX WordPress HelpDesk & Customer Ticketing System plugin未经授权的数据修改漏洞(CNVD-2025… | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30131 | WordPress ELEX WordPress HelpDesk & Customer Ticketing System plugin未经授权的数据修改漏洞(CNVD-2025… | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30130 | WordPress ELEX WordPress HelpDesk & Customer Ticketing System plugin未经授权的数据修改漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30129 | WordPress ELEX WordPress HelpDesk&Customer Ticketing System plugin缺少权限检查漏洞 | 2025-11-25 | 2025-12-05 |
| cnvd-2025-30128 | Devolutions Server输入验证不当漏洞 | 2025-10-31 | 2025-12-05 |
| cnvd-2025-30127 | Devolutions Server未经授权的访问漏洞 | 2025-10-31 | 2025-12-05 |
| cnvd-2025-30126 | Devolutions Server存在未明漏洞(CNVD-2025-30126) | 2025-12-03 | 2025-12-05 |
| cnvd-2025-30125 | Devolutions Server存在未明漏洞 | 2025-12-03 | 2025-12-05 |
| cnvd-2025-30124 | Devolutions Server SQL注入漏洞 | 2025-12-03 | 2025-12-05 |
| cnvd-2025-30218 | Wireshark EAP dissector拒绝服务漏洞 | 2023-01-30 | 2025-12-04 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0466 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| certfr-2025-avi-0465 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| certfr-2025-avi-0464 | Multiples vulnérabilités dans le noyau Linux de Debian | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| certfr-2025-avi-0463 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| certfr-2025-avi-0462 | Multiples vulnérabilités dans Microsoft Edge | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| certfr-2025-avi-0461 | Vulnérabilité dans Apache Tomcat | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| certfr-2025-avi-0460 | Vulnérabilité dans Spring Cloud Gateway Server | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| certfr-2025-avi-0459 | Multiples vulnérabilités dans ISC Kea DHCP | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| certfr-2025-avi-0401 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2025-05-14T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| CERTFR-2025-AVI-0467 | Multiples vulnérabilités dans IBM Db2 | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| CERTFR-2025-AVI-0466 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| CERTFR-2025-AVI-0465 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| CERTFR-2025-AVI-0464 | Multiples vulnérabilités dans le noyau Linux de Debian | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| CERTFR-2025-AVI-0463 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| CERTFR-2025-AVI-0462 | Multiples vulnérabilités dans Microsoft Edge | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| CERTFR-2025-AVI-0461 | Vulnérabilité dans Apache Tomcat | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| CERTFR-2025-AVI-0460 | Vulnérabilité dans Spring Cloud Gateway Server | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| CERTFR-2025-AVI-0459 | Multiples vulnérabilités dans ISC Kea DHCP | 2025-05-30T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| CERTFR-2025-AVI-0401 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2025-05-14T00:00:00.000000 | 2025-05-30T00:00:00.000000 |
| certfr-2025-avi-0458 | Multiples vulnérabilités dans Curl | 2025-05-28T00:00:00.000000 | 2025-05-28T00:00:00.000000 |
| certfr-2025-avi-0457 | Vulnérabilité dans Traefik | 2025-05-28T00:00:00.000000 | 2025-05-28T00:00:00.000000 |
| certfr-2025-avi-0456 | Multiples vulnérabilités dans Citrix et Xen | 2025-05-28T00:00:00.000000 | 2025-05-28T00:00:00.000000 |
| certfr-2025-avi-0455 | Multiples vulnérabilités dans Google Chrome | 2025-05-28T00:00:00.000000 | 2025-05-28T00:00:00.000000 |
| certfr-2025-avi-0454 | Multiples vulnérabilités dans les produits Mozilla | 2025-05-28T00:00:00.000000 | 2025-05-28T00:00:00.000000 |
| CERTFR-2025-AVI-0458 | Multiples vulnérabilités dans Curl | 2025-05-28T00:00:00.000000 | 2025-05-28T00:00:00.000000 |
| CERTFR-2025-AVI-0457 | Vulnérabilité dans Traefik | 2025-05-28T00:00:00.000000 | 2025-05-28T00:00:00.000000 |
| CERTFR-2025-AVI-0456 | Multiples vulnérabilités dans Citrix et Xen | 2025-05-28T00:00:00.000000 | 2025-05-28T00:00:00.000000 |
| CERTFR-2025-AVI-0455 | Multiples vulnérabilités dans Google Chrome | 2025-05-28T00:00:00.000000 | 2025-05-28T00:00:00.000000 |
| CERTFR-2025-AVI-0454 | Multiples vulnérabilités dans les produits Mozilla | 2025-05-28T00:00:00.000000 | 2025-05-28T00:00:00.000000 |
| certfr-2025-avi-0452 | Multiples vulnérabilités dans les produits IBM | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |