Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-20700 |
8.8 (3.1)
|
In the Airoha Bluetooth audio SDK, there is a pos… |
Airoha Technology Corp. |
AB156x, AB157x, AB158x, AB159x series, AB1627 |
2025-08-04T06:19:06.133Z | 2026-02-26T17:50:06.021Z |
| CVE-2025-20698 |
6.7 (3.1)
|
In Power HAL, there is a possible out of bounds w… |
MediaTek, Inc. |
MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8196, MT8391, MT8676, MT8678, MT8775, MT8786, MT8788E, MT8792, MT8796, MT8873, MT8883, MT8893 |
2025-08-04T01:49:50.189Z | 2026-02-26T17:50:06.437Z |
| CVE-2025-20697 |
6.7 (3.1)
|
In Power HAL, there is a possible out of bounds w… |
MediaTek, Inc. |
MT2718, MT6761, MT6765, MT6768, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6889, MT6893, MT6897, MT6989, MT6991, MT8186, MT8196, MT8391, MT8678, MT8775, MT8786, MT8788E, MT8792, MT8796, MT8873, MT8883, MT8893 |
2025-08-04T01:49:48.567Z | 2026-02-26T17:50:06.885Z |
| CVE-2025-43196 |
7.8 (3.1)
|
A path handling issue was addressed with improved… |
Apple |
macOS |
2025-07-29T23:54:35.368Z | 2026-02-26T17:50:05.753Z |
| CVE-2025-25011 |
7 (3.1)
|
Beats Uncontrolled Search Path Element can lead to Loc… |
Elastic |
Beats |
2025-07-30T00:15:43.132Z | 2026-02-26T17:50:05.471Z |
| CVE-2025-8292 |
8.8 (3.1)
|
Use after free in Media Stream in Google Chrome p… |
Google |
Chrome |
2025-07-30T01:18:27.241Z | 2026-02-26T17:50:04.225Z |
| CVE-2025-20702 |
8.8 (3.1)
|
In the Airoha Bluetooth audio SDK, there is a pos… |
Airoha Technology Corp. |
AB156x, AB157x, AB158x, AB159x series, AB1627 |
2025-08-04T06:20:40.458Z | 2026-02-26T17:50:04.037Z |
| CVE-2025-20701 |
8.8 (3.1)
|
In the Airoha Bluetooth audio SDK, there is a pos… |
Airoha Technology Corp. |
AB156x, AB157x, AB158x, AB159x series |
2025-08-04T06:20:32.057Z | 2026-02-26T17:50:04.636Z |
| CVE-2025-6205 |
9.1 (3.1)
|
Missing authorization vulnerability affecting DELMIA A… |
Dassault Systèmes |
DELMIA Apriso |
2025-08-04T09:14:42.308Z | 2026-02-26T17:50:03.025Z |
| CVE-2025-6204 |
8 (3.1)
|
Improper Control of Generation of Code (Code Injection… |
Dassault Systèmes |
DELMIA Apriso |
2025-08-04T09:14:08.343Z | 2026-02-26T17:50:03.655Z |
| CVE-2025-46811 |
9.8 (3.1)
9.3 (4.0)
|
SUSE Multi Linux Manager allows code execution via unp… |
SUSE |
Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1 |
2025-07-30T14:20:53.828Z | 2026-02-26T17:50:03.837Z |
| CVE-2025-36611 |
7.3 (3.1)
|
Dell Encryption and Dell Security Management Serv… |
Dell |
Encryption |
2025-07-30T16:18:09.720Z | 2026-02-26T17:50:03.439Z |
| CVE-2025-30105 |
8.8 (3.1)
|
Dell XtremIO, version(s) 6.4.0-22, contain(s) an … |
Dell |
XtremIO |
2025-07-30T17:50:38.998Z | 2026-02-26T17:50:02.728Z |
| CVE-2025-0932 |
4.3 (3.1)
|
Mali GPU Userspace Driver allows access to already fre… |
Arm Ltd |
Bifrost GPU Userspace Driver |
2025-08-04T10:00:57.639Z | 2026-02-26T17:50:02.507Z |
| CVE-2025-36604 |
7.3 (3.1)
|
Dell Unity, version(s) 5.5 and prior, contain(s) … |
Dell |
Unity |
2025-08-04T14:00:05.295Z | 2026-02-26T17:50:01.164Z |
| CVE-2025-26332 |
8.8 (3.1)
|
TechAdvisor versions 2.6 through 3.37-30 for Dell… |
Dell |
TechAdvisor |
2025-07-30T17:55:55.248Z | 2026-02-26T17:50:01.657Z |
| CVE-2025-36606 |
7.8 (3.1)
|
Dell Unity, version(s) 5.5 and prior, contain(s) … |
Dell |
Unity |
2025-08-04T14:09:01.986Z | 2026-02-26T17:50:00.916Z |
| CVE-2025-36607 |
7.8 (3.1)
|
Dell Unity, version(s) 5.5 and prior, contain(s) … |
Dell |
Unity |
2025-08-04T14:12:56.544Z | 2026-02-26T17:49:59.991Z |
| CVE-2025-36594 |
9.8 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain Feature Release |
2025-08-04T14:25:56.750Z | 2026-02-26T17:49:59.859Z |
| CVE-2025-30099 |
7.8 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain Feature Release |
2025-08-04T14:47:32.002Z | 2026-02-26T17:49:59.094Z |
| CVE-2025-30098 |
6.7 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain Feature Release |
2025-08-04T14:42:36.430Z | 2026-02-26T17:49:59.257Z |
| CVE-2025-30097 |
6.7 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain Feature Release |
2025-08-04T14:38:04.039Z | 2026-02-26T17:49:59.488Z |
| CVE-2025-30096 |
6.7 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain Feature Release |
2025-08-04T14:32:53.745Z | 2026-02-26T17:49:59.714Z |
| CVE-2025-7025 |
8.4 (4.0)
|
Rockwell Automation Heap-based Buffer Overflow In Aren… |
Rockwell Automation |
Arena® Simulation |
2025-08-05T13:37:17.720Z | 2026-02-26T17:49:58.127Z |
| CVE-2025-54987 |
9.4 (3.1)
|
A vulnerability in Trend Micro Apex One (on-premi… |
Trend Micro, Inc. |
Trend Micro Apex One |
2025-08-05T13:00:38.698Z | 2026-02-26T17:49:58.349Z |
| CVE-2025-54982 |
9.6 (3.1)
|
SAML 2.0 Public Key Validation Issue |
Zscaler |
Authentication Server |
2025-08-05T05:36:06.752Z | 2026-02-26T17:49:58.538Z |
| CVE-2025-26476 |
8.4 (3.1)
|
Dell ECS versions prior to 3.8.1.5/ ObjectScale v… |
Dell |
ECS |
2025-08-04T18:44:50.332Z | 2026-02-26T17:49:58.743Z |
| CVE-2025-21120 |
8.3 (3.1)
|
Dell Avamar, versions prior to 19.10 SP1 with pat… |
Dell |
Avamar Server |
2025-08-04T18:33:07.220Z | 2026-02-26T17:49:58.914Z |
| CVE-2025-7033 |
8.4 (4.0)
|
Rockwell Automation Heap-based Buffer Overflow In Aren… |
Rockwell Automation |
Arena® Simulation |
2025-08-05T13:42:37.178Z | 2026-02-26T17:49:57.715Z |
| CVE-2025-7032 |
8.4 (4.0)
|
Rockwell Automation Stack-based Buffer Overflow In Are… |
Rockwell Automation |
Arena® Simulation |
2025-08-05T13:39:32.769Z | 2026-02-26T17:49:57.896Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2024-38891 |
9.1 (3.1)
|
An issue in Horizon Business Services Inc. Catere… |
n/a |
n/a |
2024-08-02T00:00:00.000Z | 2024-08-12T19:56:12.566Z |
| CVE-2026-24686 |
4.7 (3.1)
|
go-tuf Path Traversal in TAP 4 Multirepo Client Allows… |
theupdateframework |
go-tuf |
2026-01-27T00:45:43.422Z | 2026-01-27T14:40:01.511Z |
| CVE-2024-38886 |
9.8 (3.1)
|
An issue in Horizon Business Services Inc. Catere… |
n/a |
n/a |
2024-08-02T00:00:00.000Z | 2024-08-12T19:57:21.532Z |
| CVE-2025-71241 |
4.8 (4.0)
5.4 (3.1)
|
SPIP < 4.3.6 Cross-Site Scripting in Private Area |
SPIP |
SPIP |
2026-02-19T14:58:13.755Z | 2026-02-20T20:27:57.434Z |
| CVE-2025-71240 |
4.8 (4.0)
5.4 (3.1)
|
SPIP < 4.2.15 Cross-Site Scripting via Code Tags |
SPIP |
SPIP |
2026-02-19T14:58:12.961Z | 2026-02-19T20:22:11.736Z |
| CVE-2025-2149 |
2 (4.0)
2.5 (3.1)
2.5 (3.0)
|
PyTorch Quantized Sigmoid Module nnq_Sigmoid initialization |
n/a |
PyTorch |
2025-03-10T12:31:04.788Z | 2025-03-10T14:08:14.533Z |
| CVE-2025-14448 |
5.4 (3.1)
|
WP-Members Membership Plugin <= 3.5.4.3 - Authenticate… |
cbutlerjr |
WP-Members Membership Plugin |
2026-01-15T05:24:19.163Z | 2026-01-15T14:47:50.023Z |
| CVE-2026-25795 |
5.3 (3.1)
|
ImageMagick has NULL pointer dereference in ReadSFWIma… |
ImageMagick |
ImageMagick |
2026-02-24T00:54:34.640Z | 2026-02-26T15:08:55.743Z |
| CVE-2026-25796 |
5.3 (3.1)
|
ImageMagick has memory leak of watermark Image object … |
ImageMagick |
ImageMagick |
2026-02-24T00:57:27.441Z | 2026-02-26T15:12:22.180Z |
| CVE-2026-25798 |
5.3 (3.1)
|
ImageMagick has NULL Pointer Dereference in ClonePixel… |
ImageMagick |
ImageMagick |
2026-02-24T01:02:30.911Z | 2026-02-26T15:21:20.797Z |
| CVE-2026-25799 |
5.3 (3.1)
|
ImageMagick has Division-by-Zero in YUV sampling facto… |
ImageMagick |
ImageMagick |
2026-02-24T01:05:39.405Z | 2026-02-26T15:22:25.612Z |
| CVE-2026-25897 |
6.5 (3.1)
|
ImageMagick has heap overflow in sun decoder on 32-bit… |
ImageMagick |
ImageMagick |
2026-02-24T01:16:15.438Z | 2026-02-26T15:24:12.905Z |
| CVE-2026-25989 |
7.5 (3.1)
|
ImageMagick has integer overflow or wraparound and inc… |
ImageMagick |
ImageMagick |
2026-02-24T01:50:12.995Z | 2026-02-28T02:09:11.388Z |
| CVE-2026-26066 |
6.2 (3.1)
|
ImageMagick has infinite loop when writing IPTCTEXT le… |
ImageMagick |
ImageMagick |
2026-02-24T01:52:30.870Z | 2026-02-26T21:33:40.181Z |
| CVE-2026-26283 |
6.2 (3.1)
|
ImageMagick has possible infinite loop in JPEG encoder… |
ImageMagick |
ImageMagick |
2026-02-24T01:55:59.350Z | 2026-02-24T20:47:41.990Z |
| CVE-2026-26284 |
6.5 (3.1)
|
ImageMagick has heap overflow in pcd decoder that lead… |
ImageMagick |
ImageMagick |
2026-02-24T02:00:19.417Z | 2026-02-24T20:46:56.730Z |
| CVE-2026-26983 |
5.3 (3.1)
|
ImageMagick: Invalid MSL <map> can result in a use aft… |
ImageMagick |
ImageMagick |
2026-02-24T02:01:20.113Z | 2026-02-28T02:09:53.161Z |
| CVE-2025-9862 |
6.1 (4.0)
|
Ghost 6.0.6 - SSRF via oEmbed Bookmark |
Ghost |
Ghost |
2025-09-17T15:02:01.533Z | 2025-09-17T15:42:32.020Z |
| CVE-2026-2983 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SourceCodester Student Result Management System Bulk I… |
SourceCodester |
Student Result Management System |
2026-02-23T09:32:07.933Z | 2026-02-23T12:45:23.221Z |
| CVE-2025-21015 |
4 (3.1)
|
Path Traversal in Document scanner prior to SMR A… |
Samsung Mobile |
Samsung Mobile Devices |
2025-08-06T04:23:30.239Z | 2025-08-06T13:44:16.974Z |
| CVE-2026-0668 |
5.3 (3.1)
|
VisualData extension: Regular Expression Denial of Ser… |
Wikimedia Foundation |
MediaWiki - VisualData Extension |
2026-01-07T17:36:19.258Z | 2026-01-07T19:17:41.764Z |
| CVE-2024-58041 |
9.1 (3.1)
|
Smolder versions through 1.51 for Perl uses insecure r… |
WONKO |
Smolder |
2026-02-23T23:54:23.396Z | 2026-02-24T16:41:35.824Z |
| CVE-2026-2984 |
6.9 (4.0)
6.5 (3.1)
6.5 (3.0)
|
SourceCodester Student Result Management System drop_u… |
SourceCodester |
Student Result Management System |
2026-02-23T10:02:10.131Z | 2026-02-23T12:44:35.884Z |
| CVE-2021-42306 |
8.1 (3.1)
|
Azure Active Directory Information Disclosure Vulnerability |
Microsoft |
Azure Automation |
2021-11-24T01:05:13.000Z | 2024-08-04T03:30:38.252Z |
| CVE-2025-54158 |
7.8 (3.1)
|
Missing authentication for critical function vuln… |
Synology |
BeeDrive for desktop |
2025-12-04T15:13:29.761Z | 2025-12-04T20:01:18.860Z |
| CVE-2021-41372 |
7.6 (3.1)
|
Power BI Report Server Spoofing Vulnerability |
Microsoft |
Power BI Report Server version 1.11.8091.10468 |
2021-11-10T00:46:45.000Z | 2024-08-04T03:08:32.244Z |
| CVE-2021-40032 |
N/A
|
The bone voice ID TA has a vulnerability in infor… |
Huawei |
HarmonyOS |
2022-01-07T22:39:47.000Z | 2024-08-04T02:27:30.614Z |
| CVE-2021-40027 |
N/A
|
The bone voice ID TA has a vulnerability in calcu… |
Huawei |
HarmonyOS |
2022-01-07T22:39:45.000Z | 2024-08-04T02:27:31.425Z |
| CVE-2021-40014 |
N/A
|
The bone voice ID trusted application (TA) has a … |
Huawei |
HarmonyOS |
2022-01-07T22:39:41.000Z | 2024-08-04T02:27:30.472Z |
| CVE-2021-40006 |
N/A
|
Vulnerability of design defects in the security a… |
Huawei |
HarmonyOS |
2022-01-07T22:39:30.000Z | 2024-08-04T02:20:34.199Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-25799 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T01:16:14.763 | 2026-02-24T18:44:52.853 |
| fkie_cve-2026-25897 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T02:16:00.837 | 2026-02-24T18:44:12.467 |
| fkie_cve-2026-25989 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T03:16:00.773 | 2026-02-24T18:43:16.560 |
| fkie_cve-2026-26066 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T03:16:00.937 | 2026-02-24T18:42:32.553 |
| fkie_cve-2026-26283 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T03:16:01.290 | 2026-02-24T18:41:35.010 |
| fkie_cve-2026-26284 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T03:16:01.543 | 2026-02-24T18:39:19.270 |
| fkie_cve-2026-26983 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T03:16:02.107 | 2026-02-24T18:38:31.420 |
| fkie_cve-2025-9862 | Server-Side Request Forgery (SSRF) vulnerability in Ghost allows an attacker to access internal res… | 2025-09-17T15:15:43.937 | 2026-02-24T18:36:18.247 |
| fkie_cve-2026-2983 | A vulnerability was determined in SourceCodester Student Result Management System 1.0. The impacted… | 2026-02-23T10:16:58.757 | 2026-02-24T18:32:54.093 |
| fkie_cve-2025-21015 | Path Traversal in Document scanner prior to SMR Aug-2025 Release 1 allows local attackers to delete… | 2025-08-06T05:15:34.070 | 2026-02-24T18:32:47.410 |
| fkie_cve-2026-0668 | Inefficient Regular Expression Complexity vulnerability in Wikimedia Foundation MediaWiki - VisualD… | 2026-01-07T18:15:52.873 | 2026-02-24T18:32:21.493 |
| fkie_cve-2024-58041 | Smolder versions through 1.51 for Perl uses insecure rand() function for cryptographic functions. … | 2026-02-24T00:16:17.820 | 2026-02-24T18:29:32.403 |
| fkie_cve-2026-2984 | A vulnerability was identified in SourceCodester Student Result Management System 1.0. This affects… | 2026-02-23T11:16:39.443 | 2026-02-24T18:29:16.143 |
| fkie_cve-2021-42306 | An information disclosure vulnerability manifests when a user or an application uploads unprotected… | 2021-11-24T01:15:08.363 | 2026-02-24T18:28:18.767 |
| fkie_cve-2025-54158 | Missing authentication for critical function vulnerability in BeeDrive in Synology BeeDrive for des… | 2025-12-04T16:16:20.923 | 2026-02-24T18:27:57.053 |
| fkie_cve-2021-41372 | A Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerability exists when Power … | 2021-11-10T01:19:30.517 | 2026-02-24T18:27:23.977 |
| fkie_cve-2021-40032 | The bone voice ID TA has a vulnerability in information management,Successful exploitation of this … | 2022-01-10T14:10:22.200 | 2026-02-24T18:25:53.837 |
| fkie_cve-2021-40027 | The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation o… | 2022-01-10T14:10:21.810 | 2026-02-24T18:25:53.303 |
| fkie_cve-2021-40014 | The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitati… | 2022-01-10T14:10:21.463 | 2026-02-24T18:25:52.137 |
| fkie_cve-2021-40006 | Vulnerability of design defects in the security algorithm component. Successful exploitation of thi… | 2022-01-10T14:10:21.260 | 2026-02-24T18:25:51.007 |
| fkie_cve-2025-59472 | A denial of service vulnerability exists in Next.js versions with Partial Prerendering (PPR) enable… | 2026-01-26T22:15:53.027 | 2026-02-24T18:24:35.830 |
| fkie_cve-2021-39298 | A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attack… | 2022-02-16T17:15:10.860 | 2026-02-24T18:23:48.730 |
| fkie_cve-2021-38180 | SAP Business One - version 10.0, allows an attacker to inject formulas when exporting data to Excel… | 2021-10-12T15:15:08.720 | 2026-02-24T18:22:14.410 |
| fkie_cve-2021-38162 | SAP Web Dispatcher versions - 7.49, 7.53, 7.77, 7.81, KRNL64NUC - 7.22, 7.22EXT, 7.49, KRNL64UC -7.… | 2021-09-14T12:15:10.740 | 2026-02-24T18:22:12.250 |
| fkie_cve-2021-36958 | <p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly p… | 2021-08-12T18:15:10.303 | 2026-02-24T18:20:47.393 |
| fkie_cve-2026-24054 | Kata Containers is an open source project focusing on a standard implementation of lightweight Virt… | 2026-01-29T18:16:15.270 | 2026-02-24T18:20:17.090 |
| fkie_cve-2021-35226 | An entity in Network Configuration Manager product is misconfigured and exposing password field to … | 2022-10-10T23:15:14.193 | 2026-02-24T18:19:24.213 |
| fkie_cve-2021-34481 | <p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly p… | 2021-07-16T21:15:10.133 | 2026-02-24T18:18:15.253 |
| fkie_cve-2025-68722 | Axigen Mail Server before 10.5.57 and 10.6.x before 10.6.26 contains a Cross-Site Request Forgery (… | 2026-02-05T16:15:50.733 | 2026-02-24T18:14:24.153 |
| fkie_cve-2026-25807 | ZAI Shell is an autonomous SysOps agent designed to navigate, repair, and secure complex environmen… | 2026-02-09T22:16:02.293 | 2026-02-24T18:13:41.050 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-p922-cfp2-x9v3 |
|
Rejected reason: Not used | 2026-02-20T06:30:38Z | 2026-02-20T06:30:38Z |
| ghsa-j27m-px7h-crj7 |
|
Rejected reason: Not used | 2026-02-20T06:30:38Z | 2026-02-20T06:30:38Z |
| ghsa-cg6c-xr24-rrqf |
|
Rejected reason: Not used | 2026-02-20T06:30:38Z | 2026-02-20T06:30:38Z |
| ghsa-7544-9rpr-83f6 |
|
Rejected reason: Not used | 2026-02-20T06:30:38Z | 2026-02-20T06:30:38Z |
| ghsa-8823-cww3-2gv3 |
6.4 (3.1)
|
The Quiz Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `… | 2026-02-20T03:31:40Z | 2026-02-20T03:31:40Z |
| ghsa-7jwr-q23r-96hf |
7.3 (3.1)
5.5 (4.0)
|
A weakness has been identified in Fujian Smart Integrated Management Platform System up to 7.5. Imp… | 2026-02-20T03:31:40Z | 2026-02-20T03:31:40Z |
| ghsa-658m-53rw-9pgg |
7.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in Fujian Smart Integrated Management Platform System up to 7.5… | 2026-02-20T03:31:39Z | 2026-02-20T03:31:40Z |
| ghsa-xj5x-4c9j-jr89 |
10.0 (3.1)
|
Sensitive data disclosure and manipulation due to improper authentication. The following products a… | 2026-02-20T03:31:39Z | 2026-02-20T03:31:39Z |
| ghsa-vvcr-j24q-wc29 |
9.8 (3.1)
|
Sensitive data disclosure and manipulation due to missing authentication. The following products ar… | 2026-02-20T03:31:39Z | 2026-02-20T03:31:39Z |
| ghsa-p3p8-xvrh-mwgr |
10.0 (3.1)
|
Sensitive data disclosure and manipulation due to missing authorization. The following products are… | 2026-02-20T03:31:39Z | 2026-02-20T03:31:39Z |
| ghsa-8f5v-g9hx-qc4q |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in Dromara RuoYi-Vue-Plus up to 5.5.3. This vulnerability affects th… | 2026-02-20T03:31:39Z | 2026-02-20T03:31:39Z |
| ghsa-5pfr-259p-873j |
10.0 (3.1)
|
Sensitive data disclosure and manipulation due to improper authentication. The following products a… | 2026-02-20T03:31:39Z | 2026-02-20T03:31:39Z |
| ghsa-w9fg-2h32-5478 |
6.3 (3.1)
|
Tanium addressed a SQL injection vulnerability in Asset. | 2026-02-20T00:31:53Z | 2026-02-20T00:31:53Z |
| ghsa-rx38-cw65-cmwp |
8.2 (3.1)
|
Improper access control in Microsoft Teams allows an unauthorized attacker to disclose information … | 2026-02-20T00:31:53Z | 2026-02-20T00:31:53Z |
| ghsa-fj3r-hwrr-xqfr |
6.5 (3.1)
|
Tanium addressed an insertion of sensitive information into log file vulnerability in Interact and TDS. | 2026-02-20T00:31:53Z | 2026-02-20T00:31:53Z |
| ghsa-8g63-rx6r-ghfc |
5.3 (3.1)
|
Tanium addressed an insertion of sensitive information into log file vulnerability in TanOS. | 2026-02-20T00:31:53Z | 2026-02-20T00:31:53Z |
| ghsa-4jmq-69hm-3jp3 |
4.7 (3.1)
|
Tanium addressed a use-after-free vulnerability in the Cloud Workloads Enforce client extension. | 2026-02-20T00:31:53Z | 2026-02-20T00:31:53Z |
| ghsa-22jr-f6pc-522x |
6.5 (3.1)
|
Tanium addressed an insertion of sensitive information into log file vulnerability in Trends. | 2026-02-20T00:31:53Z | 2026-02-20T00:31:53Z |
| ghsa-xprw-mh67-9xf5 |
8.8 (3.1)
|
Deserialization of Untrusted Data vulnerability in codetipi Valenti valenti allows Object Injection… | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-xmxf-f859-45ch |
5.3 (3.1)
|
Missing Authorization vulnerability in peregrinethemes Shopwell shopwell allows Exploiting Incorrec… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-xgvq-3q42-wr4g |
9.8 (3.1)
|
Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows … | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-xfv7-f3m9-5h58 |
4.3 (3.1)
|
Missing Authorization vulnerability in madalin.ungureanu Client Portal client-portal allows Exploit… | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-r7pc-wm4g-53rv |
4.3 (3.1)
|
Missing Authorization vulnerability in StellarWP iThemes Sync ithemes-sync allows Exploiting Incorr… | 2026-02-19T18:31:53Z | 2026-02-20T00:31:52Z |
| ghsa-qrj7-4954-7p6v |
6.5 (3.1)
7.1 (4.0)
|
An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed an… | 2026-02-18T21:31:23Z | 2026-02-20T00:31:52Z |
| ghsa-pmfh-36xp-5j94 |
4.3 (3.1)
|
Missing Authorization vulnerability in WP Messiah TOP Table Of Contents top-table-of-contents allow… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-p546-7whm-cxpm |
9.0 (3.1)
7.6 (4.0)
|
An URL redirection vulnerability was identified in GitHub Enterprise Server that allowed attacker-c… | 2026-02-18T21:31:23Z | 2026-02-20T00:31:52Z |
| ghsa-m5w7-8p57-p7r3 |
5.3 (3.1)
|
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in rtCamp … | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-jwh4-2xr6-36qf |
5.3 (3.1)
|
Missing Authorization vulnerability in Kraft Plugins Wheel of Life wheel-of-life allows Exploiting … | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-hm7p-gwh2-3jfm |
5.3 (3.1)
|
Missing Authorization vulnerability in alttextai Download Alt Text AI alttext-ai allows Exploiting … | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-g6g2-qr88-w8qf |
5.4 (3.1)
|
Missing Authorization vulnerability in BBR Plugins Better Business Reviews better-business-reviews … | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-514 |
|
TensorFlow is an end-to-end open source platform for machine learning. Optimized pooling … | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:56.717383Z |
| pysec-2021-513 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite computa… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:56.553875Z |
| pysec-2021-512 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:56.381620Z |
| pysec-2021-511 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:56.228145Z |
| pysec-2021-510 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:56.077512Z |
| pysec-2021-509 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:55.926686Z |
| pysec-2021-508 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:55.778346Z |
| pysec-2021-507 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:55.622531Z |
| pysec-2021-506 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:55.459344Z |
| pysec-2021-505 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:55.310052Z |
| pysec-2021-504 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:55.161027Z |
| pysec-2021-503 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:55.002066Z |
| pysec-2021-502 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:54.849798Z |
| pysec-2021-501 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:54.700321Z |
| pysec-2021-500 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:54.530775Z |
| pysec-2021-499 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:54.370426Z |
| pysec-2021-498 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:54.218525Z |
| pysec-2021-497 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:54.064557Z |
| pysec-2021-496 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:53.905703Z |
| pysec-2021-495 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:53.752999Z |
| pysec-2021-494 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can wr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:53.596467Z |
| pysec-2021-493 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:53.440506Z |
| pysec-2021-492 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:53.290029Z |
| pysec-2021-491 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:53.142665Z |
| pysec-2021-490 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.986581Z |
| pysec-2021-489 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.832408Z |
| pysec-2021-488 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.680803Z |
| pysec-2021-487 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ac… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.523360Z |
| pysec-2021-486 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.373382Z |
| pysec-2021-485 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.215362Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-3813 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.563144Z |
| gsd-2024-3812 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.721612Z |
| gsd-2024-3811 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.786226Z |
| gsd-2024-3810 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.788634Z |
| gsd-2024-3809 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.746320Z |
| gsd-2024-3808 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.576112Z |
| gsd-2024-3807 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.672167Z |
| gsd-2024-3806 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.641539Z |
| gsd-2024-3805 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.523985Z |
| gsd-2024-3804 | A vulnerability, which was classified as critical, has been found in Vesystem Cloud Deskt… | 2024-04-16T05:01:59.582546Z |
| gsd-2024-3803 | A vulnerability classified as critical was found in Vesystem Cloud Desktop up to 20240408… | 2024-04-16T05:01:59.588357Z |
| gsd-2024-3802 | Vulnerabilities in Celeste 22.x was vulnerable to takeover from unauthenticated local att… | 2024-04-16T05:01:59.496986Z |
| gsd-2024-3801 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.776992Z |
| gsd-2024-3800 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.685996Z |
| gsd-2024-3799 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.763014Z |
| gsd-2024-3798 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.804368Z |
| gsd-2024-3797 | A vulnerability was found in SourceCodester QR Code Bookmark System 1.0. It has been decl… | 2024-04-16T05:01:59.613274Z |
| gsd-2024-3796 | Vulnerability in WBSAirback 21.02.04, which consists of a stored Cross-Site Scripting (XS… | 2024-04-16T05:01:59.634923Z |
| gsd-2024-3795 | Vulnerability in WBSAirback 21.02.04, which consists of a stored Cross-Site Scripting (XS… | 2024-04-16T05:01:59.565782Z |
| gsd-2024-3794 | Vulnerability in WBSAirback 21.02.04, which consists of a stored Cross-Site Scripting (XS… | 2024-04-16T05:01:59.639584Z |
| gsd-2024-3793 | Vulnerability in WBSAirback 21.02.04, which consists of a stored Cross-Site Scripting (XS… | 2024-04-16T05:01:59.751936Z |
| gsd-2024-3792 | Vulnerability in WBSAirback 21.02.04, which consists of a stored Cross-Site Scripting (XS… | 2024-04-16T05:01:59.756040Z |
| gsd-2024-3791 | Vulnerability in WBSAirback 21.02.04, which consists of a stored Cross-Site Scripting (XS… | 2024-04-16T05:01:59.627138Z |
| gsd-2024-3790 | Vulnerability in WBSAirback 21.02.04, which consists of a stored Cross-Site Scripting (XS… | 2024-04-16T05:01:59.612027Z |
| gsd-2024-3789 | Uncontrolled resource consumption vulnerability in White Bear Solutions WBSAirback, versi… | 2024-04-16T05:01:59.519841Z |
| gsd-2024-3788 | Vulnerability in WBSAirback 21.02.04, which involves improper neutralisation of Server-Si… | 2024-04-16T05:01:59.519461Z |
| gsd-2024-3787 | Vulnerability in WBSAirback 21.02.04, which involves improper neutralisation of Server-Si… | 2024-04-16T05:01:59.681920Z |
| gsd-2024-3786 | Vulnerability in WBSAirback 21.02.04, which involves improper neutralisation of Server-Si… | 2024-04-16T05:01:59.599646Z |
| gsd-2024-3785 | Vulnerability in WBSAirback 21.02.04, which involves improper neutralisation of Server-Si… | 2024-04-16T05:01:59.803182Z |
| gsd-2024-3784 | Vulnerability in WBSAirback 21.02.04, which involves improper neutralisation of Server-Si… | 2024-04-16T05:01:59.659067Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2026-220 | Malicious code in framer-motion-js (npm) | 2026-01-12T02:02:53Z | 2026-01-15T22:09:19Z |
| MAL-2026-219 | Malicious code in firestore-types (npm) | 2026-01-12T01:57:12Z | 2026-01-15T22:09:19Z |
| MAL-2026-218 | Malicious code in express-sessions-id (npm) | 2026-01-12T03:21:11Z | 2026-01-15T22:09:19Z |
| MAL-2026-217 | Malicious code in experimental-utils (npm) | 2026-01-12T01:57:12Z | 2026-01-15T22:09:19Z |
| MAL-2026-167 | Malicious code in icon-service (npm) | 2026-01-08T14:55:56Z | 2026-01-15T22:09:19Z |
| mal-2026-245 | Malicious code in cnamts-captcha-component (npm) | 2026-01-13T05:26:09Z | 2026-01-15T22:09:18Z |
| mal-2026-239 | Malicious code in chai-as-enhanced (npm) | 2026-01-13T03:23:31Z | 2026-01-15T22:09:18Z |
| mal-2026-216 | Malicious code in cors-base (npm) | 2026-01-12T03:12:02Z | 2026-01-15T22:09:18Z |
| mal-2026-215 | Malicious code in auth-types (npm) | 2026-01-12T01:57:12Z | 2026-01-15T22:09:18Z |
| mal-2026-214 | Malicious code in analytics-browser (npm) | 2026-01-12T01:57:12Z | 2026-01-15T22:09:18Z |
| mal-2026-203 | Malicious code in body-parser-js (npm) | 2026-01-12T00:22:24Z | 2026-01-15T22:09:18Z |
| mal-2026-174 | Malicious code in dotenv-intended (npm) | 2026-01-09T02:55:20Z | 2026-01-15T22:09:18Z |
| mal-2026-173 | Malicious code in cng-web-lib (npm) | 2026-01-09T02:54:15Z | 2026-01-15T22:09:18Z |
| mal-2026-172 | Malicious code in chai-tests-async (npm) | 2026-01-09T02:55:20Z | 2026-01-15T22:09:18Z |
| mal-2026-171 | Malicious code in amdocs-core (npm) | 2026-01-09T02:54:15Z | 2026-01-15T22:09:18Z |
| MAL-2026-245 | Malicious code in cnamts-captcha-component (npm) | 2026-01-13T05:26:09Z | 2026-01-15T22:09:18Z |
| MAL-2026-239 | Malicious code in chai-as-enhanced (npm) | 2026-01-13T03:23:31Z | 2026-01-15T22:09:18Z |
| MAL-2026-216 | Malicious code in cors-base (npm) | 2026-01-12T03:12:02Z | 2026-01-15T22:09:18Z |
| MAL-2026-215 | Malicious code in auth-types (npm) | 2026-01-12T01:57:12Z | 2026-01-15T22:09:18Z |
| MAL-2026-214 | Malicious code in analytics-browser (npm) | 2026-01-12T01:57:12Z | 2026-01-15T22:09:18Z |
| MAL-2026-203 | Malicious code in body-parser-js (npm) | 2026-01-12T00:22:24Z | 2026-01-15T22:09:18Z |
| MAL-2026-174 | Malicious code in dotenv-intended (npm) | 2026-01-09T02:55:20Z | 2026-01-15T22:09:18Z |
| MAL-2026-173 | Malicious code in cng-web-lib (npm) | 2026-01-09T02:54:15Z | 2026-01-15T22:09:18Z |
| MAL-2026-172 | Malicious code in chai-tests-async (npm) | 2026-01-09T02:55:20Z | 2026-01-15T22:09:18Z |
| MAL-2026-171 | Malicious code in amdocs-core (npm) | 2026-01-09T02:54:15Z | 2026-01-15T22:09:18Z |
| mal-2026-213 | Malicious code in @maxcointech/simple-string-utils (npm) | 2026-01-12T03:12:01Z | 2026-01-15T22:09:17Z |
| mal-2026-211 | Malicious code in @workleap-widgets/client (npm) | 2026-01-12T01:26:09Z | 2026-01-15T22:09:17Z |
| mal-2026-210 | Malicious code in @workleap-ai/shared (npm) | 2026-01-12T01:26:09Z | 2026-01-15T22:09:17Z |
| mal-2026-209 | Malicious code in @t4i-cms-components/contact-card (npm) | 2026-01-12T01:26:09Z | 2026-01-15T22:09:17Z |
| mal-2026-208 | Malicious code in @gwp-gtmt-components/event-listener (npm) | 2026-01-12T01:26:09Z | 2026-01-15T22:09:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1049 | Intel PROSet Wireless WiFi Software: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1048 | Microsoft Defender: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1047 | Red Hat Enterprise Linux (exiv2): Schwachstelle ermöglicht Codeausführung | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1046 | Adobe Creative Cloud Applikationen: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1045 | Adobe Dreamweaver: Schwachstelle ermöglicht Codeausführung | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1044 | Adobe Connect: Mehrere Schwachstellen ermöglichen Cross-Site Scripting und Rechteerweiterung | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1043 | sudo-rs: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1040 | Red Hat Enterprise Linux (perl-Module-ScanDeps): Schwachstelle ermöglicht Privilegieneskalation | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1039 | Adobe Photoshop: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1037 | Ivanti Neurons for MDM: Schwachstelle ermöglicht Manipulation von Dateien | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1036 | Red Hat Enterprise Linux (Aardvark-dns): Schwachstelle ermöglicht Denial of Service | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1035 | Xerox FreeFlow Print Server: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1033 | Ivanti Endpoint Manager Mobile: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1032 | Ivanti Cloud Services Application: Schwachstelle ermöglicht Privilegieneskalation | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1027 | Fortinet FortiVoice, FortiMail und FortiRecorder: Schwachstelle ermöglicht Codeausführung | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1026 | Fortinet FortiOS, FortiProxy und FortiSwitch: Schwachstelle ermöglicht Privilegieneskalation | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1025 | Fortinet FortiOS: Mehrere Schwachstellen ermöglicht Denial of Service | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1024 | Fortinet FortiPortal: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1023 | Phoenix Technologies BIOS (SCT4): Schwachstelle ermöglicht Denial of Service | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1021 | Fortinet FortiClient Mac, Windows, EMS und FortiVoice: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1019 | Checkmk: Schwachstelle ermöglicht Privilegieneskalation | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1018 | Fortinet FortiManager: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1016 | Microsoft Dataverse: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1014 | Microsoft Azure: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1002 | SAP Patchday Mai 2025: Mehrere Schwachstellen | 2025-05-12T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-0731 | TianoCore EDK2: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-04-07T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-0629 | Ingress NGINX Controller für Kubernetes: Mehrere Schwachstellen | 2025-03-24T23:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-0382 | Linux Kernel: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2025-02-16T23:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-0381 | libarchive: Schwachstelle ermöglicht Denial of Service | 2025-02-16T23:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-0366 | Vaultwarden: Schwachstelle ermöglicht Denial of Service oder Offenlegung von Informationen | 2025-02-13T23:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:7625 | Red Hat Security Advisory: Red Hat AMQ Broker 7.13.0 release and security update | 2025-05-14T17:51:15+00:00 | 2026-02-27T19:59:52+00:00 |
| rhsa-2025:19094 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.24.0 Release. | 2025-10-23T20:33:38+00:00 | 2026-02-27T19:59:50+00:00 |
| rhsa-2023:5693 | Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security, enhancement, and bug fix update | 2023-10-12T16:37:02+00:00 | 2026-02-27T19:59:44+00:00 |
| rhsa-2023:4730 | Red Hat Security Advisory: OpenShift Container Platform 4.13.10 security update | 2023-08-30T17:55:36+00:00 | 2026-02-27T19:59:44+00:00 |
| rhsa-2023:3645 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.7 security update | 2023-06-15T20:55:50+00:00 | 2026-02-27T19:59:42+00:00 |
| rhsa-2023:3363 | Red Hat Security Advisory: OpenShift Container Platform 4.10.61 bug fix and security update | 2023-06-07T09:12:12+00:00 | 2026-02-27T19:59:41+00:00 |
| rhsa-2023:3309 | Red Hat Security Advisory: OpenShift Container Platform 4.11.42 bug fix and security update | 2023-05-31T12:01:26+00:00 | 2026-02-27T19:59:41+00:00 |
| rhsa-2023:3287 | Red Hat Security Advisory: OpenShift Container Platform 4.12.19 bug fix and security update | 2023-05-31T08:24:34+00:00 | 2026-02-27T19:59:39+00:00 |
| rhsa-2023:1656 | Red Hat Security Advisory: OpenShift Container Platform 4.10.56 security update | 2023-04-12T11:42:14+00:00 | 2026-02-27T19:59:35+00:00 |
| rhsa-2023:1525 | Red Hat Security Advisory: OpenShift Container Platform 4.9.59 security update | 2023-04-05T23:06:58+00:00 | 2026-02-27T19:59:28+00:00 |
| rhsa-2023:1392 | Red Hat Security Advisory: OpenShift Container Platform 4.10.55 security update | 2023-03-29T02:46:01+00:00 | 2026-02-27T19:59:24+00:00 |
| rhsa-2023:1047 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 for OpenShift image security and enhancement update | 2023-03-01T21:46:46+00:00 | 2026-02-27T19:59:21+00:00 |
| rhsa-2023:0934 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | 2023-02-28T00:50:28+00:00 | 2026-02-27T19:59:19+00:00 |
| rhsa-2023:0634 | Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update | 2023-02-09T14:01:04+00:00 | 2026-02-27T19:59:18+00:00 |
| rhsa-2023:0612 | Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update | 2023-02-06T19:42:24+00:00 | 2026-02-27T19:59:18+00:00 |
| rhsa-2022:8008 | Red Hat Security Advisory: buildah security and bug fix update | 2022-11-15T15:06:08+00:00 | 2026-02-27T19:59:15+00:00 |
| rhsa-2022:5101 | Red Hat Security Advisory: Red Hat AMQ Broker 7.10.0 release and security update | 2022-06-16T14:52:46+00:00 | 2026-02-27T19:59:13+00:00 |
| rhsa-2022:7955 | Red Hat Security Advisory: skopeo security and bug fix update | 2022-11-15T12:38:32+00:00 | 2026-02-27T19:59:11+00:00 |
| rhsa-2022:7954 | Red Hat Security Advisory: podman security and bug fix update | 2022-11-15T13:20:30+00:00 | 2026-02-27T19:59:11+00:00 |
| rhsa-2022:6916 | Red Hat Security Advisory: Red Hat AMQ Broker 7.10.1 release and security update | 2022-10-12T07:56:52+00:00 | 2026-02-27T19:59:10+00:00 |
| rhsa-2022:6536 | Red Hat Security Advisory: OpenShift Container Platform 4.11.5 bug fix and security update | 2022-09-20T16:32:26+00:00 | 2026-02-27T19:59:09+00:00 |
| rhsa-2022:2183 | Red Hat Security Advisory: Release of containers for OSP 16.2.z director operator tech preview | 2022-05-11T11:33:14+00:00 | 2026-02-27T19:59:08+00:00 |
| rhsa-2022:1679 | Red Hat Security Advisory: Cryostat 2.1.0: new Cryostat on RHEL 8 container images | 2022-05-10T15:34:53+00:00 | 2026-02-27T19:59:08+00:00 |
| rhsa-2022:1660 | Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 2.0.5 [security update] | 2022-05-02T05:51:54+00:00 | 2026-02-27T19:59:07+00:00 |
| rhsa-2022:1329 | Red Hat Security Advisory: OpenShift Virtualization 4.8.5 RPMs security update | 2022-04-12T15:09:58+00:00 | 2026-02-27T19:59:06+00:00 |
| rhsa-2022:0998 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (golang-github-vbatts-tar-split) security update | 2022-03-23T22:12:28+00:00 | 2026-02-27T19:59:04+00:00 |
| rhsa-2022:0988 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-github-vbatts-tar-split) security update | 2022-03-24T10:59:08+00:00 | 2026-02-27T19:59:03+00:00 |
| rhsa-2022:0947 | Red Hat Security Advisory: OpenShift Virtualization 4.10.0 Images security and bug fix update | 2022-03-16T15:45:58+00:00 | 2026-02-27T19:59:02+00:00 |
| rhsa-2022:0577 | Red Hat Security Advisory: Windows Container Support for Red Hat OpenShift 5.0.0 [security update] | 2022-03-28T09:34:15+00:00 | 2026-02-27T19:59:01+00:00 |
| rhsa-2022:0492 | Red Hat Security Advisory: OpenShift Container Platform 4.7.43 security update | 2022-02-16T11:18:29+00:00 | 2026-02-27T19:59:01+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-23-285-07 | Siemens RUGGEDCOM APE180 | 2023-10-10T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-23-257-06 | Siemans WIBU Systems CodeMeter | 2023-09-12T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-23-166-08 | Siemens SIMATIC STEP 7 and Derived Products | 2023-06-13T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-130-03 | Delta Electronics InfraSuite Device Master | 2024-05-09T06:00:00.000000Z | 2024-05-09T06:00:00.000000Z |
| icsa-24-130-02 | alpitronic Hypercharger EV charger | 2024-05-09T06:00:00.000000Z | 2024-05-09T06:00:00.000000Z |
| icsa-24-130-01 | Rockwell Automation FactoryTalk Historian SE | 2024-05-09T06:00:00.000000Z | 2024-05-09T06:00:00.000000Z |
| icsa-24-107-03 | Rockwell Automation ControlLogix and GuardLogix (Update A) | 2024-04-16T06:00:00.000000Z | 2024-05-09T06:00:00.000000Z |
| icsa-24-128-02 | SUBNET Substation Server | 2024-05-07T06:00:00.000000Z | 2024-05-07T06:00:00.000000Z |
| icsa-24-128-01 | PTC Codebeamer | 2024-05-07T06:00:00.000000Z | 2024-05-07T06:00:00.000000Z |
| icsa-25-126-03 | BrightSign Players | 2024-05-06T06:00:00.000000Z | 2024-05-06T06:00:00.000000Z |
| icsa-24-123-02 | Delta Electronics DIAEnergie | 2024-05-02T06:00:00.000000Z | 2024-05-02T06:00:00.000000Z |
| icsa-24-067-01 | Chirp Systems Chirp Access (Update C) | 2024-03-07T07:00:00.000000Z | 2024-05-02T06:00:00.000000Z |
| icsa-24-354-02 | Hitachi Energy SDM600 | 2024-04-30T12:30:00.000000Z | 2024-04-30T12:30:00.000000Z |
| icsa-24-109-01 | Unitronics Vision Legacy series (Update A) | 2024-04-18T06:00:00.000000Z | 2024-04-30T06:00:00.000000Z |
| icsa-24-016-01 | SEW-EURODRIVE MOVITOOLS MotionStudio | 2024-01-16T07:00:00.000000Z | 2024-04-30T06:00:00.000000Z |
| icsa-24-116-04 | Honeywell Experion PKS, Experion LX, PlantCruise by Experion, Safety Manager, Safety Manager SC | 2024-04-25T06:00:00.000000Z | 2024-04-25T06:00:00.000000Z |
| icsa-24-116-01 | Hitachi Energy RTU500 Series | 2024-04-25T06:00:00.000000Z | 2024-04-25T06:00:00.000000Z |
| icsa-24-102-09 | Rockwell Automation 5015-AENFTXT (Update A) | 2024-04-11T06:00:00.000000Z | 2024-04-25T06:00:00.000000Z |
| icsa-23-143-03 | Mitsubishi Electric MELSEC Series CPU module (Update D) | 2023-05-23T06:00:00.000000Z | 2024-04-25T06:00:00.000000Z |
| icsa-24-051-03 | Mitsubishi Electric Electrical discharge machines | 2024-02-20T07:00:00.000000Z | 2024-04-23T06:00:00.000000Z |
| icsa-21-287-03 | Mitsubishi Electric MELSEC iQ-R Series | 2021-08-06T06:00:00.000000Z | 2024-04-18T06:00:00.000000Z |
| icsa-21-250-01 | Mitsubishi Electric MELSEC iQ-R Series | 2021-09-07T06:00:00.000000Z | 2024-04-18T06:00:00.000000Z |
| icsa-24-107-04 | RoboDK RoboDK | 2024-04-16T06:00:00.000000Z | 2024-04-16T06:00:00.000000Z |
| icsa-24-107-02 | Electrolink FM/DAB/TV Transmitter | 2024-04-16T06:00:00.000000Z | 2024-04-16T06:00:00.000000Z |
| icsa-24-107-01 | Measuresoft ScadaPro | 2024-04-16T06:00:00.000000Z | 2024-04-16T06:00:00.000000Z |
| icsa-24-100-01 | SUBNET PowerSYSTEM Server and Substation Server | 2024-04-09T06:00:00.000000Z | 2024-04-09T06:00:00.000000Z |
| icsa-24-102-07 | Siemens SINEC NMS | 2024-04-09T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-24-102-06 | Siemens Parasolid | 2024-04-09T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-24-102-05 | Siemens Scalance W1750D | 2024-04-09T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-24-046-01 | Siemens SCALANCE W1750D | 2024-02-13T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-bpa-priv-esc-dgubwbH4 | Cisco Business Process Automation Privilege Escalation Vulnerabilities | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-ipcamera-lldpcdp-mem-ytqdmjro | Cisco Video Surveillance 7000 Series IP Cameras Cisco Discovery Protocol and Link Layer Discovery Protocol Memory Leak Vulnerabilities | 2021-06-02T16:00:00+00:00 | 2021-07-07T15:55:28+00:00 |
| cisco-sa-ipcamera-lldpcdp-mem-yTQDmjRO | Cisco Video Surveillance 7000 Series IP Cameras Cisco Discovery Protocol and Link Layer Discovery Protocol Memory Leak Vulnerabilities | 2021-06-02T16:00:00+00:00 | 2021-07-07T15:55:28+00:00 |
| cisco-sa-asaftd-xss-multiple-fcb3vpze | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Cross-Site Scripting Vulnerabilities | 2020-10-21T16:00:00+00:00 | 2021-06-28T15:14:27+00:00 |
| cisco-sa-asaftd-xss-multiple-FCB3vPZe | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Cross-Site Scripting Vulnerabilities | 2020-10-21T16:00:00+00:00 | 2021-06-28T15:14:27+00:00 |
| cisco-sa-ade-xcvaqeoz | Cisco ADE-OS Local File Inclusion Vulnerability | 2021-05-19T16:00:00+00:00 | 2021-06-24T14:24:36+00:00 |
| cisco-sa-ade-xcvAQEOZ | Cisco ADE-OS Local File Inclusion Vulnerability | 2021-05-19T16:00:00+00:00 | 2021-06-24T14:24:36+00:00 |
| cisco-sa-sdwanbo-qkcabns2 | Cisco SD-WAN Solution Buffer Overflow Vulnerability | 2020-03-18T16:00:00+00:00 | 2021-06-23T18:22:48+00:00 |
| cisco-sa-sdwanbo-QKcABnS2 | Cisco SD-WAN Solution Buffer Overflow Vulnerability | 2020-03-18T16:00:00+00:00 | 2021-06-23T18:22:48+00:00 |
| cisco-sa-sdwpresc-ysjgve9 | Cisco SD-WAN Solution Privilege Escalation Vulnerability | 2020-03-18T16:00:00+00:00 | 2021-06-23T18:09:31+00:00 |
| cisco-sa-sdwpresc-ySJGvE9 | Cisco SD-WAN Solution Privilege Escalation Vulnerability | 2020-03-18T16:00:00+00:00 | 2021-06-23T18:09:31+00:00 |
| cisco-sa-jabber-guc5mlwg | Cisco Jabber Desktop and Mobile Client Software Vulnerabilities | 2021-06-16T16:00:00+00:00 | 2021-06-17T20:25:14+00:00 |
| cisco-sa-jabber-GuC5mLwG | Cisco Jabber Desktop and Mobile Client Software Vulnerabilities | 2021-06-16T16:00:00+00:00 | 2021-06-17T20:25:14+00:00 |
| cisco-sa-meetingserver-dos-nzvwmmqt | Cisco Meeting Server API Denial of Service Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-meetingserver-dos-NzVWMMQT | Cisco Meeting Server API Denial of Service Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-esa-wsa-cert-vali-n8l97rw | Cisco Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-esa-wsa-cert-vali-n8L97RW | Cisco Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-dnac-certvalid-usej2czk | Cisco DNA Center Certificate Validation Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-dnac-certvalid-USEj2CZk | Cisco DNA Center Certificate Validation Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-ciscosb-multivulns-wwyb7s5e | Cisco Small Business 220 Series Smart Switches Vulnerabilities | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-ciscosb-multivulns-Wwyb7s5E | Cisco Small Business 220 Series Smart Switches Vulnerabilities | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-anyconnect-pos-dll-ff8j6dfv | Cisco AnyConnect Secure Mobility Client for Windows with VPN Posture (HostScan) Module DLL Hijacking Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-anyconnect-pos-dll-ff8j6dFv | Cisco AnyConnect Secure Mobility Client for Windows with VPN Posture (HostScan) Module DLL Hijacking Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-anyconnect-dos-hmhydfb8 | Cisco AnyConnect Secure Mobility Client for Windows Denial of Service Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-anyconnect-dos-hMhyDfb8 | Cisco AnyConnect Secure Mobility Client for Windows Denial of Service Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-webex-teams-7zmcxg99 | Cisco Jabber and Webex Client Software Shared File Manipulation Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-06-16T15:29:27+00:00 |
| cisco-sa-webex-teams-7ZMcXG99 | Cisco Jabber and Webex Client Software Shared File Manipulation Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-06-16T15:29:27+00:00 |
| cisco-sa-ftd-ssl-decrypt-dos-ddyluk6c | Cisco Firepower Threat Defense Software SSL Decryption Policy Denial of Service Vulnerability | 2021-04-28T16:00:00+00:00 | 2021-06-08T21:10:36+00:00 |
| cisco-sa-ftd-ssl-decrypt-dos-DdyLuK6c | Cisco Firepower Threat Defense Software SSL Decryption Policy Denial of Service Vulnerability | 2021-04-28T16:00:00+00:00 | 2021-06-08T21:10:36+00:00 |
| cisco-sa-webex-redirect-xuzfu3ph | Cisco Webex Meetings and Webex Meetings Server File Redirect Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-50156 | drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() | 2024-11-02T00:00:00.000Z | 2026-02-18T14:38:13.000Z |
| msrc_cve-2023-5679 | Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution | 2024-02-02T08:00:00.000Z | 2026-02-18T14:38:12.000Z |
| msrc_cve-2024-49855 | nbd: fix race between timeout and normal completion | 2024-10-01T07:00:00.000Z | 2026-02-18T14:38:08.000Z |
| msrc_cve-2026-0861 | Integer overflow in memalign leads to heap corruption | 2026-01-02T00:00:00.000Z | 2026-02-18T14:37:56.000Z |
| msrc_cve-2024-47752 | media: mediatek: vcodec: Fix H264 stateless decoder smatch warning | 2024-10-01T07:00:00.000Z | 2026-02-18T14:37:50.000Z |
| msrc_cve-2017-1000097 | On Darwin, user's trust preferences for root certificates were not honored. If the user had a root certificate loaded in their Keychain that was explicitly not trusted, a Go program would still verify a connection using that root certificate. | 2017-10-02T00:00:00.000Z | 2026-02-18T14:37:50.000Z |
| msrc_cve-2024-25110 | Azure IoT Platform Device SDK Remote Code Execution Vulnerability | 2024-02-02T08:00:00.000Z | 2026-02-18T14:37:38.000Z |
| msrc_cve-2021-38561 | golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input this can be used as a vector for a denial-of-service attack. | 2022-12-02T00:00:00.000Z | 2026-02-18T14:37:32.000Z |
| msrc_cve-2024-50257 | netfilter: Fix use-after-free in get_info() | 2024-11-02T00:00:00.000Z | 2026-02-18T14:37:31.000Z |
| msrc_cve-2025-0913 | Inconsistent handling of O_CREATE|O_EXCL on Unix and Windows in os in syscall | 2025-06-02T00:00:00.000Z | 2026-02-18T14:37:28.000Z |
| msrc_cve-2025-68780 | sched/deadline: only set free_cpus for online runqueues | 2026-01-02T00:00:00.000Z | 2026-02-18T14:37:22.000Z |
| msrc_cve-2022-45419 | If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox < 107. | 2022-12-02T00:00:00.000Z | 2026-02-18T14:37:20.000Z |
| msrc_cve-2024-9676 | Podman: buildah: cri-o: symlink traversal vulnerability in the containers/storage library can cause denial of service (dos) | 2024-10-01T07:00:00.000Z | 2026-02-18T14:37:19.000Z |
| msrc_cve-2023-6937 | Improper (D)TLS key boundary enforcement | 2024-02-02T08:00:00.000Z | 2026-02-18T14:37:07.000Z |
| msrc_cve-2025-71069 | f2fs: invalidate dentry cache on failed whiteout creation | 2026-01-02T00:00:00.000Z | 2026-02-18T14:37:03.000Z |
| msrc_cve-2023-5728 | During garbage collection extra operations were performed on a object that should not be. This could have led to a potentially exploitable crash. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1. | 2023-10-01T00:00:00.000Z | 2026-02-18T14:37:02.000Z |
| msrc_cve-2024-53101 | fs: Fix uninitialized value issue in from_kuid and from_kgid | 2024-11-02T00:00:00.000Z | 2026-02-18T14:36:48.000Z |
| msrc_cve-2024-24575 | libgit2 is vulnerable to a denial of service attack in `git_revparse_single` | 2024-02-02T08:00:00.000Z | 2026-02-18T14:36:48.000Z |
| msrc_cve-2020-11656 | In SQLite through 3.31.1 the ALTER TABLE implementation has a use-after-free as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement. | 2020-04-02T00:00:00.000Z | 2026-02-18T14:36:44.000Z |
| msrc_cve-2025-68794 | iomap: adjust read range correctly for non-block-aligned positions | 2026-01-02T00:00:00.000Z | 2026-02-18T14:36:42.000Z |
| msrc_cve-2019-25085 | GNOME gvdb gvdb-builder.c gvdb_table_write_contents_async use after free | 2022-12-02T00:00:00.000Z | 2026-02-18T14:36:30.000Z |
| msrc_cve-2025-71094 | net: usb: asix: validate PHY address before use | 2026-01-02T00:00:00.000Z | 2026-02-18T14:36:19.000Z |
| msrc_cve-2024-5187 | Arbitrary File Overwrite in download_model_with_test_data in onnx/onnx | 2024-06-02T07:00:00.000Z | 2026-02-18T14:36:17.000Z |
| msrc_cve-2019-6486 | Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks. | 2019-01-02T00:00:00.000Z | 2026-02-18T14:36:13.000Z |
| msrc_cve-2024-52949 | iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack. | 2024-12-02T00:00:00.000Z | 2026-02-18T14:36:11.000Z |
| msrc_cve-2018-20169 | An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor related to __usb_get_extra_descriptor in drivers/usb/core/usb.c. | 2018-12-02T00:00:00.000Z | 2026-02-18T14:36:10.000Z |
| msrc_cve-2025-71091 | team: fix check for port enabled in team_queue_override_port_prio_changed() | 2026-01-02T00:00:00.000Z | 2026-02-18T14:35:57.000Z |
| msrc_cve-2025-38003 | can: bcm: add missing rcu read protection for procfs content | 2025-06-02T00:00:00.000Z | 2026-02-18T14:35:46.000Z |
| msrc_cve-2024-21194 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2024-10-01T07:00:00.000Z | 2026-02-18T14:35:43.000Z |
| msrc_cve-2024-12401 | Cert-manager: potential dos when parsing specially crafted pem inputs | 2024-12-02T00:00:00.000Z | 2026-02-18T14:35:41.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:14625-1 | gstreamer-plugins-base-1.24.11-1.1 on GA media | 2025-01-09T00:00:00Z | 2025-01-09T00:00:00Z |
| opensuse-su-2025:14624-1 | govulncheck-vulndb-0.0.20250108T191942-1.1 on GA media | 2025-01-09T00:00:00Z | 2025-01-09T00:00:00Z |
| opensuse-su-2025:0008-1 | Security update for python-django-ckeditor | 2025-01-07T17:02:06Z | 2025-01-07T17:02:06Z |
| opensuse-su-2025:0004-1 | Security update for rubygem-json-jwt | 2025-01-07T17:01:48Z | 2025-01-07T17:01:48Z |
| opensuse-su-2025:0003-1 | Security update for etcd | 2025-01-07T15:04:12Z | 2025-01-07T15:04:12Z |
| opensuse-su-2025:14623-1 | tomcat10-10.1.34-1.1 on GA media | 2025-01-07T00:00:00Z | 2025-01-07T00:00:00Z |
| opensuse-su-2025:14622-1 | tomcat-9.0.98-1.1 on GA media | 2025-01-07T00:00:00Z | 2025-01-07T00:00:00Z |
| opensuse-su-2025:14621-1 | libruby3_4-3_4-3.4.1-1.1 on GA media | 2025-01-07T00:00:00Z | 2025-01-07T00:00:00Z |
| opensuse-su-2025:14620-1 | libopenjp2-7-2.5.3-2.1 on GA media | 2025-01-07T00:00:00Z | 2025-01-07T00:00:00Z |
| opensuse-su-2025:14619-1 | firefox-esr-128.6.0-1.1 on GA media | 2025-01-07T00:00:00Z | 2025-01-07T00:00:00Z |
| opensuse-su-2025:14618-1 | apptainer-1.3.6-2.1 on GA media | 2025-01-07T00:00:00Z | 2025-01-07T00:00:00Z |
| opensuse-su-2025:14617-1 | rizin-0.7.4-1.1 on GA media | 2025-01-05T00:00:00Z | 2025-01-05T00:00:00Z |
| opensuse-su-2025:14616-1 | libpoppler-cpp1-24.12.0-1.1 on GA media | 2025-01-03T00:00:00Z | 2025-01-03T00:00:00Z |
| opensuse-su-2025:14615-1 | corepack22-22.12.0-1.1 on GA media | 2025-01-03T00:00:00Z | 2025-01-03T00:00:00Z |
| opensuse-su-2025:14614-1 | harfbuzz-devel-10.1.0-2.1 on GA media | 2025-01-02T00:00:00Z | 2025-01-02T00:00:00Z |
| opensuse-su-2025:14613-1 | velero-1.15.1-1.1 on GA media | 2025-01-01T00:00:00Z | 2025-01-01T00:00:00Z |
| opensuse-su-2025:14612-1 | sops-3.9.3-1.1 on GA media | 2025-01-01T00:00:00Z | 2025-01-01T00:00:00Z |
| opensuse-su-2024:14611-1 | libQt6Pdf6-6.8.1-2.1 on GA media | 2024-12-29T00:00:00Z | 2024-12-29T00:00:00Z |
| opensuse-su-2024:14610-1 | assimp-devel-5.4.3-3.1 on GA media | 2024-12-29T00:00:00Z | 2024-12-29T00:00:00Z |
| opensuse-su-2024:0417-1 | Security update for chromium | 2024-12-28T11:45:06Z | 2024-12-28T11:45:06Z |
| opensuse-su-2024:14609-1 | libparaview5_12-5.12.1-2.1 on GA media | 2024-12-22T00:00:00Z | 2024-12-22T00:00:00Z |
| opensuse-su-2024:14608-1 | govulncheck-vulndb-0.0.20241220T214820-1.1 on GA media | 2024-12-22T00:00:00Z | 2024-12-22T00:00:00Z |
| opensuse-su-2024:0413-1 | Security update for python-python-sql | 2024-12-21T13:02:20Z | 2024-12-21T13:02:20Z |
| opensuse-su-2024:0412-1 | Security update for python-python-sql | 2024-12-21T13:02:17Z | 2024-12-21T13:02:17Z |
| opensuse-su-2024:14607-1 | chromedriver-131.0.6778.204-1.1 on GA media | 2024-12-21T00:00:00Z | 2024-12-21T00:00:00Z |
| opensuse-su-2024:14606-1 | teleport-17.1.0-1.1 on GA media | 2024-12-20T00:00:00Z | 2024-12-20T00:00:00Z |
| opensuse-su-2024:14605-1 | tuned-2.24.1.0+git.90c24ee-1.1 on GA media | 2024-12-19T00:00:00Z | 2024-12-19T00:00:00Z |
| opensuse-su-2024:14604-1 | logcli-3.3.2-1.1 on GA media | 2024-12-19T00:00:00Z | 2024-12-19T00:00:00Z |
| opensuse-su-2024:14603-1 | govulncheck-vulndb-0.0.20241218T202206-1.1 on GA media | 2024-12-19T00:00:00Z | 2024-12-19T00:00:00Z |
| opensuse-su-2024:14602-1 | tailscale-1.78.3-2.1 on GA media | 2024-12-18T00:00:00Z | 2024-12-18T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-436 | Stack-buffer-overflow in spvtools::opt::CompositeInsertToCompositeConstruct | 2022-05-29T00:00:37.959985Z | 2022-05-29T00:00:37.960247Z |
| osv-2022-434 | Segv on unknown address in sc_aux_data_free | 2022-05-28T00:00:15.235936Z | 2022-05-28T00:00:15.236194Z |
| osv-2022-432 | Stack-use-after-return in conversation_match_element_list | 2022-05-26T00:00:29.927017Z | 2022-05-26T00:00:29.927244Z |
| osv-2022-431 | Uncaught exception in com.ctc.wstx.dtd.FullDTDReader.readContentSpec | 2022-05-26T00:00:20.481972Z | 2022-05-26T00:00:20.482230Z |
| osv-2022-429 | Heap-buffer-overflow in pdfi_dict_get_no_store_R_inner | 2022-05-25T00:00:30.642736Z | 2022-05-25T00:00:30.642988Z |
| osv-2022-425 | Heap-use-after-free in std::__1::__tree_node_base<void*>*& std::__1::__tree<std::__1::__value_type<std: | 2022-05-21T00:01:00.208406Z | 2022-05-21T00:01:00.208655Z |
| osv-2022-423 | Heap-buffer-overflow in sc_build_pin | 2022-05-20T00:00:21.692977Z | 2022-05-20T00:00:21.693236Z |
| osv-2021-1809 | Heap-buffer-overflow in ujson.cpython-38-x86_64-linux-gnu.so | 2022-02-25T00:00:25.106722Z | 2022-05-19T00:55:00.970552Z |
| osv-2021-955 | Stack-buffer-overflow in Buffer_AppendIndentUnchecked | 2021-07-11T00:01:05.153778Z | 2022-05-19T00:45:08.957102Z |
| osv-2022-422 | UNKNOWN WRITE in alloc_restore_step_in | 2022-05-19T00:01:44.794873Z | 2022-05-19T00:01:44.795111Z |
| osv-2022-421 | Stack-buffer-overflow in cardos_list_files | 2022-05-19T00:01:39.869536Z | 2022-05-19T00:01:39.869761Z |
| osv-2022-419 | Heap-buffer-overflow in uncompress_b44_impl | 2022-05-19T00:00:46.415466Z | 2022-05-19T00:00:46.415698Z |
| osv-2022-417 | Heap-buffer-overflow in read_xref | 2022-05-19T00:00:17.646200Z | 2022-05-19T00:00:17.646459Z |
| osv-2022-416 | Heap-buffer-overflow in opj_t1_allocate_buffers | 2022-05-19T00:00:17.026619Z | 2022-05-19T00:00:17.026871Z |
| osv-2022-415 | UNKNOWN READ in pdfi_free_object | 2022-05-19T00:00:14.734454Z | 2022-05-19T00:00:14.734703Z |
| osv-2022-413 | Heap-buffer-overflow in generic_unpack | 2022-05-18T00:00:39.752172Z | 2022-05-18T00:00:39.752426Z |
| osv-2022-412 | Bad-cast to const upb_tabent' (aka 'const struct _upb_tabent')insert | 2022-05-17T00:00:31.470478Z | 2022-05-17T00:00:31.470713Z |
| osv-2022-409 | Heap-buffer-overflow in std::__1::__tree_node_base<void*>*& std::__1::__tree<std::__1::__value_type<std: | 2022-05-12T00:01:13.318272Z | 2022-05-12T00:01:13.318534Z |
| osv-2022-33 | Heap-buffer-overflow in ndlz8_decompress | 2022-01-12T00:00:34.083560Z | 2022-05-09T00:03:53.061033Z |
| osv-2021-1676 | UNKNOWN READ in ndlz8_decompress | 2021-12-13T00:01:17.549900Z | 2022-05-09T00:03:38.776759Z |
| osv-2021-1663 | Heap-buffer-overflow in ndlz4_decompress | 2021-12-10T00:01:27.708469Z | 2022-05-09T00:03:37.477192Z |
| osv-2021-1645 | UNKNOWN READ in ndlz4_decompress | 2021-12-04T00:01:27.768326Z | 2022-05-09T00:03:36.967604Z |
| osv-2022-401 | UNKNOWN READ in OT::gvar::subset | 2022-05-08T00:00:43.199921Z | 2022-05-08T00:00:43.200135Z |
| osv-2021-398 | Segv on unknown address in llvm_ks::StringRef::operator | 2021-02-15T00:00:40.792550Z | 2022-05-04T00:04:15.653021Z |
| osv-2022-393 | Heap-use-after-free in mrb_funcall_with_block | 2022-05-04T00:00:21.149913Z | 2022-05-04T00:00:21.150142Z |
| osv-2022-389 | Global-buffer-overflow in _dwarf_pathjoinl | 2022-05-01T00:01:57.432738Z | 2022-05-01T00:01:57.432994Z |
| osv-2022-386 | Invalid-free in change_pin | 2022-05-01T00:00:17.507442Z | 2022-05-01T00:00:17.507768Z |
| osv-2022-383 | Heap-use-after-free in r_asm_free | 2022-04-30T00:00:25.155380Z | 2022-04-30T00:00:25.155685Z |
| osv-2022-327 | Stack-use-after-return in QSemaphore::release | 2022-04-10T00:01:12.211800Z | 2022-04-27T22:12:36.132079Z |
| osv-2022-380 | Stack-buffer-overflow in sc_asn1_read_tag | 2022-04-27T00:01:38.850365Z | 2022-04-27T00:01:38.850588Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tensorflow-2021-29516 | Null pointer dereference via invalid Ragged Tensors | 2024-03-06T11:20:04.830Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29515 | Reference binding to null pointer in `MatrixDiag*` ops | 2024-03-06T11:20:06.083Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29514 | Heap out of bounds write in `RaggedBinCount` | 2024-03-06T11:20:07.369Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29513 | Type confusion during tensor casts lead to dereferencing null pointers | 2024-03-06T11:20:08.573Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2021-29512 | Heap buffer overflow in `RaggedBinCount` | 2024-03-06T11:20:09.837Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-5215 | Segmentation faultin TensorFlow when converting a Python string to tf.float16 | 2024-03-06T11:20:11.097Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-26271 | Heap out of bounds access in MakeEdge in TensorFlow | 2024-03-06T11:20:12.357Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-26270 | CHECK-fail in LSTM with zero-length input in TensorFlow | 2024-03-06T11:20:13.620Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-26268 | Write to immutable memory region in TensorFlow | 2024-03-06T11:20:16.150Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-26267 | Lack of validation in data format attributes in TensorFlow | 2024-03-06T11:20:17.433Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-26266 | Uninitialized memory access in Eigen types in TensorFlow | 2024-03-06T11:20:18.700Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15266 | Undefined behavior in Tensorflow | 2024-03-06T11:20:19.925Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15265 | Segfault in Tensorflow | 2024-03-06T11:20:21.200Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15214 | Out of bounds write in tensorflow-lite | 2024-03-06T11:20:22.469Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15213 | Denial of service in tensorflow-lite | 2024-03-06T11:20:23.714Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15212 | Out of bounds access in tensorflow-lite | 2024-03-06T11:20:24.948Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15211 | Out of bounds access in tensorflow-lite | 2024-03-06T11:20:26.160Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15210 | Segmentation fault in tensorflow-lite | 2024-03-06T11:20:27.420Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15209 | Null pointer dereference in tensorflow-lite | 2024-03-06T11:20:28.655Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15208 | Data corruption in tensorflow-lite | 2024-03-06T11:20:29.898Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15207 | Segfault and data corruption in tensorflow-lite | 2024-03-06T11:20:31.155Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15206 | Denial of Service in Tensorflow | 2024-03-06T11:20:32.379Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15205 | Data leak in Tensorflow | 2024-03-06T11:20:33.621Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15204 | Segfault in Tensorflow | 2024-03-06T11:20:34.916Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15203 | Denial of Service in Tensorflow | 2024-03-06T11:20:36.172Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15202 | Integer truncation in Shard API usage | 2024-03-06T11:20:37.404Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15201 | Heap buffer overflow in Tensorflow | 2024-03-06T11:20:38.643Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15200 | Segfault in Tensorflow | 2024-03-06T11:20:39.865Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15199 | Denial of Service in Tensorflow | 2024-03-06T11:20:41.128Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15198 | Heap buffer overflow in Tensorflow | 2024-03-06T11:20:42.418Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-200407-0089 | The Clear Channel Assessment (CCA) algorithm in the IEEE 802.11 wireless protocol, when u… | 2024-06-06T21:15:04.534000Z |
| var-200609-1273 | The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.… | 2024-06-06T20:58:26.894000Z |
| var-200110-0224 | OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a de… | 2024-06-06T20:09:53.938000Z |
| var-202309-0939 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in D-Link DAR-7000 up to 2… | 2024-06-06T19:22:15.323000Z |
| var-202404-0346 | A vulnerability, which was classified as critical, has been found in Tenda W15E 15.11.0.1… | 2024-06-05T23:36:16.005000Z |
| var-202404-2112 | A vulnerability, which was classified as critical, has been found in Tenda i21 1.0.0.14(4… | 2024-06-05T23:36:15.895000Z |
| var-202404-2091 | A vulnerability, which was classified as critical, has been found in Tenda AX1803 1.0.0.1… | 2024-06-05T23:36:15.910000Z |
| var-202404-2089 | A vulnerability has been found in Tenda i21 1.0.0.14(4656) and classified as critical. Th… | 2024-06-05T23:36:15.925000Z |
| var-202404-0367 | A vulnerability was found in Tenda W15E 15.11.0.14 and classified as critical. Affected b… | 2024-06-05T23:36:15.990000Z |
| var-202404-2113 | A vulnerability was found in Tenda AX1806 1.0.0.1 and classified as critical. Affected by… | 2024-06-05T23:36:01.224000Z |
| var-202404-2118 | A vulnerability has been found in Tenda AX1806 1.0.0.1 and classified as critical. Affect… | 2024-06-05T23:35:43.110000Z |
| var-202404-2097 | A vulnerability, which was classified as critical, was found in Tenda i21 1.0.0.14(4656).… | 2024-06-05T23:35:43.126000Z |
| var-202404-0270 | A vulnerability was found in Tenda 4G300 1.01.42. It has been classified as critical. Thi… | 2024-06-05T23:35:43.194000Z |
| var-202404-0123 | A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been rated as critical. Th… | 2024-06-05T23:35:43.212000Z |
| var-202404-0322 | A vulnerability was found in Tenda 4G300 1.01.42. It has been declared as critical. This … | 2024-06-05T23:34:30.406000Z |
| var-202405-0133 | A vulnerability, which was classified as critical, was found in Tenda i21 1.0.0.14(4656).… | 2024-06-05T23:34:09.186000Z |
| var-202404-2104 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been rated as critical. Aff… | 2024-06-05T23:34:09.254000Z |
| var-202404-0212 | A vulnerability was found in Tenda W15E 15.11.0.14. It has been classified as critical. A… | 2024-06-05T23:34:09.335000Z |
| var-201708-1537 | An issue was discovered in SMA Solar Technology products. A secondary authentication syst… | 2024-06-05T23:33:03.904000Z |
| var-202404-0168 | A vulnerability classified as critical has been found in Tenda AC500 2.0.1.9(1307). Affec… | 2024-06-05T23:30:46.549000Z |
| var-202404-0147 | A vulnerability, which was classified as critical, has been found in Tenda AC500 2.0.1.9(… | 2024-06-05T23:30:46.565000Z |
| var-202404-2117 | A vulnerability classified as critical was found in Tenda W9 1.0.0.7(4456). Affected by t… | 2024-06-05T23:30:45.919000Z |
| var-202405-0051 | A vulnerability classified as critical was found in Tenda i21 1.0.0.14(4656). This vulner… | 2024-06-05T23:30:23.676000Z |
| var-202404-0306 | A vulnerability classified as critical has been found in Tenda W30E 1.0/1.0.1.25. Affecte… | 2024-06-05T23:30:23.786000Z |
| var-202404-0096 | A vulnerability classified as critical was found in Tenda F1202 1.2.0.20(408). Affected b… | 2024-06-05T23:30:23.816000Z |
| var-202405-0092 | A vulnerability has been found in Tenda i21 1.0.0.14(4656) and classified as critical. Af… | 2024-06-05T23:27:13.340000Z |
| var-202405-0129 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been declared as critical. … | 2024-06-05T23:26:43.263000Z |
| var-202405-0066 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been classified as critical… | 2024-06-05T23:26:43.288000Z |
| var-202404-0213 | A vulnerability classified as critical was found in Tenda W15E 15.11.0.14. Affected by th… | 2024-06-05T23:26:43.941000Z |
| var-201806-0914 | Default and unremovable support credentials (user:nwk password:nwk2) allow attackers to g… | 2024-06-05T23:25:59.167000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000090 | Source code of Old_GSI_Maps prior to January, 2015 vulnerable to directory traversal | 2016-05-30T14:07+09:00 | 2016-06-23T15:13+09:00 |
| jvndb-2016-000075 | NetCommons vulnerable to privilege escalation | 2016-05-26T14:30+09:00 | 2016-06-23T15:13+09:00 |
| jvndb-2014-000054 | Spring Framework vulnerable to directory traversal | 2014-06-13T12:40+09:00 | 2016-06-23T13:45+09:00 |
| jvndb-2016-000101 | ETX-R vulnerable to denial-of-service (DoS) | 2016-06-14T14:00+09:00 | 2016-06-23T12:20+09:00 |
| jvndb-2016-000073 | Trend Micro Internet Security access restriction flaw | 2016-06-02T16:18+09:00 | 2016-06-22T18:12+09:00 |
| jvndb-2016-000088 | Trend Micro Internet Security vulnerable to arbitrary script execution | 2016-06-02T16:18+09:00 | 2016-06-22T18:08+09:00 |
| jvndb-2016-000089 | Trend Micro enterprise products HTTP header injection vulnerability | 2016-06-02T16:18+09:00 | 2016-06-22T17:58+09:00 |
| jvndb-2016-000074 | Trend Micro enterprise products directory traversal vulnerability | 2016-06-02T16:18+09:00 | 2016-06-22T17:56+09:00 |
| jvndb-2016-000001 | DX Library vulnerable to buffer overflow | 2016-01-05T14:26+09:00 | 2016-06-08T18:06+09:00 |
| jvndb-2016-000072 | WebARENA formmail vulnerable to cross-site scripting | 2016-05-27T13:54+09:00 | 2016-06-08T17:47+09:00 |
| jvndb-2016-000071 | WordPress plugin "Markdown on Save Improved" vulnerable to cross-site scripting | 2016-05-25T14:37+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000070 | php-contact-form vulnerable to cross-site scripting | 2016-05-24T12:27+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000069 | MP Form Mail CGI Professional Edition vulnerable to directory traversal | 2016-05-20T14:22+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000068 | HumHub vulnerable to cross-site scripting | 2016-05-24T12:24+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000066 | Web Mailing List vulnerable to cross-site scripting | 2016-05-19T13:37+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000026 | Cybozu Office vulnerable to cross-site scripting | 2016-02-15T16:21+09:00 | 2016-06-06T15:00+09:00 |
| jvndb-2015-000152 | Cybozu Garoon vulnerable to LDAP injection | 2015-10-07T14:48+09:00 | 2016-06-02T19:15+09:00 |
| jvndb-2016-000058 | Apache Cordova fails to restrict access permissions | 2016-05-11T14:16+09:00 | 2016-06-02T17:49+09:00 |
| jvndb-2016-000063 | FileMaker server issue where PHP source code may be viewable | 2016-05-13T14:27+09:00 | 2016-06-02T09:43+09:00 |
| jvndb-2016-000064 | WordPress plugin "Ninja Forms" vulnerable to PHP object injection | 2016-05-13T14:27+09:00 | 2016-06-01T17:00+09:00 |
| jvndb-2016-000061 | WN-GDN/R3 Series does not limit authentication attempts | 2016-05-12T14:34+09:00 | 2016-06-01T16:52+09:00 |
| jvndb-2016-000062 | WN-G300R Series vulnerable to cross-site scripting | 2016-05-12T14:34+09:00 | 2016-06-01T16:48+09:00 |
| jvndb-2016-000059 | Apache Cordova vulnerable to arbitrary plugin execution | 2016-05-11T14:16+09:00 | 2016-06-01T16:30+09:00 |
| jvndb-2016-000055 | kintone mobile for Android information management vulnerability | 2016-04-25T15:35+09:00 | 2016-06-01T16:21+09:00 |
| jvndb-2016-000054 | Electron may insecurely load Node modules | 2016-04-22T13:49+09:00 | 2016-06-01T15:56+09:00 |
| jvndb-2016-000052 | EC-CUBE fails to restrict access permissions | 2016-04-26T13:56+09:00 | 2016-05-31T17:41+09:00 |
| jvndb-2016-000051 | EC-CUBE fails to restrict access permissions | 2016-04-26T13:56+09:00 | 2016-05-31T17:41+09:00 |
| jvndb-2016-000053 | EC-CUBE vulnerable to cross-site request forgery | 2016-04-26T14:24+09:00 | 2016-05-31T17:40+09:00 |
| jvndb-2015-000151 | Multiple PHP code execution vulnerabilitles in Cybozu Garoon | 2015-10-07T14:48+09:00 | 2016-05-30T15:34+09:00 |
| jvndb-2015-000115 | Japan Connected-free Wi-Fi vulnerable to allow URL whitelist bypass | 2015-09-11T14:16+09:00 | 2016-05-27T14:32+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:20576-1 | Security update for kernel-livepatch-MICRO-6-0_Update_3 | 2025-08-25T12:16:43Z | 2025-08-25T12:16:43Z |
| suse-su-2025:20575-1 | Security update for kernel-livepatch-MICRO-6-0_Update_2 | 2025-08-25T12:16:43Z | 2025-08-25T12:16:43Z |
| suse-su-2025:20568-1 | Security update for kernel-livepatch-MICRO-6-0_Update_4 | 2025-08-25T12:16:43Z | 2025-08-25T12:16:43Z |
| suse-su-2025:20601-1 | Security update for the Linux Kernel | 2025-08-25T11:19:19Z | 2025-08-25T11:19:19Z |
| suse-su-2025:02975-1 | Security update for cmake3 | 2025-08-25T10:42:11Z | 2025-08-25T10:42:11Z |
| suse-su-2025:02974-1 | Security update for net-tools | 2025-08-25T09:23:53Z | 2025-08-25T09:23:53Z |
| suse-su-2025:02973-1 | Security update for webkit2gtk3 | 2025-08-25T08:49:16Z | 2025-08-25T08:49:16Z |
| suse-su-2025:02972-1 | Security update for ffmpeg-4 | 2025-08-25T08:46:43Z | 2025-08-25T08:46:43Z |
| suse-su-2025:02971-1 | Security update for pam | 2025-08-25T08:28:35Z | 2025-08-25T08:28:35Z |
| suse-su-2025:02970-1 | Security update for pam | 2025-08-25T08:28:14Z | 2025-08-25T08:28:14Z |
| suse-su-2025:02969-1 | Security update for the Linux Kernel | 2025-08-25T06:22:23Z | 2025-08-25T06:22:23Z |
| suse-su-2025:02968-1 | Security update for libqt4 | 2025-08-25T06:20:49Z | 2025-08-25T06:20:49Z |
| suse-su-2025:02964-1 | Security update for glibc | 2025-08-22T12:52:41Z | 2025-08-22T12:52:41Z |
| suse-su-2025:02963-1 | Security update for gdk-pixbuf | 2025-08-22T12:52:12Z | 2025-08-22T12:52:12Z |
| suse-su-2025:02962-1 | Security update for rust-keylime | 2025-08-22T12:50:26Z | 2025-08-22T12:50:26Z |
| suse-su-2025:02961-1 | Security update for rust-keylime | 2025-08-22T10:07:35Z | 2025-08-22T10:07:35Z |
| suse-su-2025:02957-1 | Security update for rust-keylime | 2025-08-22T07:56:12Z | 2025-08-22T07:56:12Z |
| suse-su-2025:02955-1 | Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) | 2025-08-21T14:03:52Z | 2025-08-21T14:03:52Z |
| suse-su-2025:02954-1 | Security update for gdk-pixbuf | 2025-08-21T13:42:54Z | 2025-08-21T13:42:54Z |
| suse-su-2025:02948-1 | Security update for python310 | 2025-08-21T11:47:44Z | 2025-08-21T11:47:44Z |
| suse-su-2025:02945-1 | Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3) | 2025-08-21T10:03:41Z | 2025-08-21T10:03:41Z |
| suse-su-2025:02944-1 | Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7) | 2025-08-21T09:33:44Z | 2025-08-21T09:33:44Z |
| suse-su-2025:02943-1 | Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7) | 2025-08-21T09:33:37Z | 2025-08-21T09:33:37Z |
| suse-su-2025:02942-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) | 2025-08-21T09:33:31Z | 2025-08-21T09:33:31Z |
| suse-su-2025:20598-1 | Security update for libsoup | 2025-08-21T09:33:10Z | 2025-08-21T09:33:10Z |
| suse-su-2025:02938-1 | Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6) | 2025-08-21T09:04:12Z | 2025-08-21T09:04:12Z |
| suse-su-2025:02937-1 | Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) | 2025-08-21T09:04:04Z | 2025-08-21T09:04:04Z |
| suse-su-2025:02936-1 | Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP4) | 2025-08-21T09:03:55Z | 2025-08-21T09:03:55Z |
| suse-su-2025:20566-1 | Security update for net-tools | 2025-08-21T08:01:27Z | 2025-08-21T08:01:27Z |
| suse-su-2025:20565-1 | Security update for docker | 2025-08-21T08:01:27Z | 2025-08-21T08:01:27Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-29940 | ASUS Armoury Crate空指针取消引用漏洞 | 2025-10-17 | 2025-12-03 |
| cnvd-2025-29939 | ASUS Armoury Crate内存缓冲区操作限制不当漏洞 | 2025-11-11 | 2025-12-03 |
| cnvd-2025-29938 | ASUS Router堆栈缓冲区溢出漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29937 | ASUS Router路径遍历漏洞(CNVD-2025-29937) | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29936 | ASUS Router身份验证绕过漏洞(CNVD-2025-29936) | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29935 | ASUS Router整数下溢漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29934 | WordPress houzez跨站脚本漏洞 | 2025-11-28 | 2025-12-03 |
| cnvd-2025-29871 | School Fees Payment System student.php文件跨站脚本漏洞 | 2025-06-27 | 2025-12-03 |
| cnvd-2025-29870 | Library System return.php文件SQL注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29869 | Library System index.php文件SQL注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29868 | Library System mail.php文件SQL注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29783 | ASUS Router路径遍历漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29782 | ASUS Router命令注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29781 | ASUS Router身份验证绕过漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29780 | ASUS Router SQL注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29751 | AMD CPU指令不当漏洞 | 2023-11-20 | 2025-12-03 |
| cnvd-2025-29750 | AMD CPU竞争条件漏洞 | 2024-03-19 | 2025-12-03 |
| cnvd-2025-29749 | AMD uProf连接点漏洞 | 2025-05-28 | 2025-12-03 |
| cnvd-2025-29748 | AMD StoreMI DLL劫持漏洞 | 2025-11-25 | 2025-12-03 |
| cnvd-2025-29747 | AMD StoreMI默认权限配置不当漏洞 | 2025-11-25 | 2025-12-03 |
| cnvd-2025-29746 | AMD CPU存在未明漏洞 | 2025-11-25 | 2025-12-03 |
| cnvd-2025-29745 | AMD CPU熵处理不当漏洞 | 2025-11-25 | 2025-12-03 |
| cnvd-2025-29744 | AMD XOCL driver输入验证不当漏洞(CNVD-2025-29744) | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29743 | AMD Xilinx Run Time权限提升漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29742 | AMD Xilinx Run Time缓冲区溢出漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29741 | AMD Xilinx Run Time锁定保护不足漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29740 | AMD XOCL driver输入验证不当漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29739 | AMD uProf输入验证不当漏洞(CNVD-2025-29739) | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29738 | AMD uProf返回值处理不当漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29737 | AMD uProf输入验证不当漏洞 | 2025-11-27 | 2025-12-03 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0449 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| certfr-2025-avi-0448 | Multiples vulnérabilités dans Tenable Nessus Network Monitor | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| certfr-2025-avi-0447 | Multiples vulnérabilités dans Grafana | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| certfr-2025-avi-0446 | Multiples vulnérabilités dans Asterisk | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| certfr-2025-avi-0445 | Multiples vulnérabilités dans Mozilla Thunderbird | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| certfr-2025-avi-0444 | Vulnérabilité dans OpenSSL | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| certfr-2025-avi-0443 | Vulnérabilité dans VMware Avi Load Balancer | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| CERTFR-2025-AVI-0452 | Multiples vulnérabilités dans les produits IBM | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| CERTFR-2025-AVI-0451 | Vulnérabilité dans Microsoft Edge | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| CERTFR-2025-AVI-0450 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| CERTFR-2025-AVI-0449 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| CERTFR-2025-AVI-0448 | Multiples vulnérabilités dans Tenable Nessus Network Monitor | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| CERTFR-2025-AVI-0447 | Multiples vulnérabilités dans Grafana | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| CERTFR-2025-AVI-0446 | Multiples vulnérabilités dans Asterisk | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| CERTFR-2025-AVI-0445 | Multiples vulnérabilités dans Mozilla Thunderbird | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| CERTFR-2025-AVI-0444 | Vulnérabilité dans OpenSSL | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| CERTFR-2025-AVI-0443 | Vulnérabilité dans VMware Avi Load Balancer | 2025-05-23T00:00:00.000000 | 2025-05-23T00:00:00.000000 |
| certfr-2025-avi-0442 | Vulnérabilité dans Mozilla Firefox pour iOS | 2025-05-22T00:00:00.000000 | 2025-05-22T00:00:00.000000 |
| certfr-2025-avi-0440 | Vulnérabilité dans Grafana | 2025-05-22T00:00:00.000000 | 2025-05-22T00:00:00.000000 |
| certfr-2025-avi-0439 | Multiples vulnérabilités dans Google Chrome | 2025-05-22T00:00:00.000000 | 2025-05-22T00:00:00.000000 |
| certfr-2025-avi-0438 | Multiples vulnérabilités dans les produits Cisco | 2025-05-22T00:00:00.000000 | 2025-05-22T00:00:00.000000 |
| certfr-2025-avi-0437 | Multiples vulnérabilités dans GitLab | 2025-05-22T00:00:00.000000 | 2025-05-22T00:00:00.000000 |
| certfr-2025-avi-0436 | Vulnérabilité dans ISC BIND | 2025-05-22T00:00:00.000000 | 2025-05-22T00:00:00.000000 |
| CERTFR-2025-AVI-0442 | Vulnérabilité dans Mozilla Firefox pour iOS | 2025-05-22T00:00:00.000000 | 2025-05-22T00:00:00.000000 |
| CERTFR-2025-AVI-0440 | Vulnérabilité dans Grafana | 2025-05-22T00:00:00.000000 | 2025-05-22T00:00:00.000000 |
| CERTFR-2025-AVI-0439 | Multiples vulnérabilités dans Google Chrome | 2025-05-22T00:00:00.000000 | 2025-05-22T00:00:00.000000 |
| CERTFR-2025-AVI-0438 | Multiples vulnérabilités dans les produits Cisco | 2025-05-22T00:00:00.000000 | 2025-05-22T00:00:00.000000 |
| CERTFR-2025-AVI-0437 | Multiples vulnérabilités dans GitLab | 2025-05-22T00:00:00.000000 | 2025-05-22T00:00:00.000000 |
| CERTFR-2025-AVI-0436 | Vulnérabilité dans ISC BIND | 2025-05-22T00:00:00.000000 | 2025-05-22T00:00:00.000000 |
| certfr-2025-avi-0435 | Multiples vulnérabilités dans les produits Atlassian | 2025-05-21T00:00:00.000000 | 2025-05-21T00:00:00.000000 |