Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-43248 |
7.8 (3.1)
|
A logic issue was addressed with improved restric… |
Apple |
macOS |
2025-07-29T23:29:14.960Z | 2026-02-26T17:50:10.867Z |
| CVE-2025-31277 |
8.8 (3.1)
|
The issue was addressed with improved memory hand… |
Apple |
Safari |
2025-07-29T23:29:31.341Z | 2026-02-26T17:50:10.138Z |
| CVE-2025-31273 |
8.8 (3.1)
|
The issue was addressed with improved memory hand… |
Apple |
Safari |
2025-07-29T23:29:17.520Z | 2026-02-26T17:50:10.719Z |
| CVE-2025-6037 |
6.8 (3.1)
|
Vault Certificate Auth Method Did Not Validate Common … |
HashiCorp |
Vault |
2025-08-01T17:52:48.778Z | 2026-02-26T17:50:09.821Z |
| CVE-2025-43188 |
7.8 (3.1)
|
A permissions issue was addressed with additional… |
Apple |
macOS |
2025-07-29T23:35:02.331Z | 2026-02-26T17:50:09.988Z |
| CVE-2025-31280 |
7.8 (3.1)
|
A memory corruption issue was addressed with impr… |
Apple |
macOS |
2025-07-29T23:35:11.230Z | 2026-02-26T17:50:09.441Z |
| CVE-2025-31278 |
8.8 (3.1)
|
The issue was addressed with improved memory hand… |
Apple |
Safari |
2025-07-29T23:35:08.211Z | 2026-02-26T17:50:09.662Z |
| CVE-2025-31243 |
7.8 (3.1)
|
A permissions issue was addressed with additional… |
Apple |
macOS |
2025-07-29T23:35:12.200Z | 2026-02-26T17:50:09.054Z |
| CVE-2025-23276 |
7.8 (3.1)
|
NVIDIA Installer for Windows contains a vulnerabi… |
NVIDIA |
GPU Display Drivers |
2025-08-02T22:01:47.735Z | 2026-02-26T17:50:09.240Z |
| CVE-2025-43275 |
9.8 (3.1)
|
A race condition was addressed with additional va… |
Apple |
macOS |
2025-07-29T23:35:18.249Z | 2026-02-26T17:50:08.374Z |
| CVE-2025-43214 |
6.5 (3.1)
|
The issue was addressed with improved memory hand… |
Apple |
Safari |
2025-07-29T23:35:14.203Z | 2026-02-26T17:50:08.714Z |
| CVE-2025-23281 |
7 (3.1)
|
NVIDIA GPU Display Driver for Windows contains a … |
NVIDIA |
GPU Display Drivers |
2025-08-02T22:07:47.139Z | 2026-02-26T17:50:08.167Z |
| CVE-2025-23279 |
7 (3.1)
|
NVIDIA .run Installer for Linux and Solaris conta… |
NVIDIA |
GPU Display Drivers |
2025-08-02T22:06:27.048Z | 2026-02-26T17:50:08.520Z |
| CVE-2025-23277 |
7.3 (3.1)
|
NVIDIA Display Driver for Linux and Windows conta… |
NVIDIA |
GPU Display Drivers |
2025-08-02T22:03:56.696Z | 2026-02-26T17:50:08.876Z |
| CVE-2025-43253 |
9.8 (3.1)
|
This issue was addressed with improved input vali… |
Apple |
macOS |
2025-07-29T23:35:38.252Z | 2026-02-26T17:50:07.071Z |
| CVE-2025-43249 |
7.8 (3.1)
|
A logic issue was addressed with improved checks.… |
Apple |
macOS |
2025-07-29T23:35:35.015Z | 2026-02-26T17:50:07.436Z |
| CVE-2025-43199 |
9.8 (3.1)
|
A permissions issue was addressed by removing the… |
Apple |
macOS |
2025-07-29T23:35:34.190Z | 2026-02-26T17:50:07.807Z |
| CVE-2025-24119 |
7.8 (3.1)
|
This issue was addressed through improved state m… |
Apple |
macOS |
2025-07-29T23:35:25.892Z | 2026-02-26T17:50:07.970Z |
| CVE-2025-23284 |
7.8 (3.1)
|
NVIDIA vGPU software contains a vulnerability in … |
NVIDIA |
GPU Display Drivers |
2025-08-02T22:16:50.073Z | 2026-02-26T17:50:07.252Z |
| CVE-2025-23283 |
7.8 (3.1)
|
NVIDIA vGPU software for Linux-style hypervisors … |
NVIDIA |
GPU Display Drivers |
2025-08-02T22:13:17.132Z | 2026-02-26T17:50:07.602Z |
| CVE-2025-43270 |
8.8 (3.1)
|
An access issue was addressed with additional san… |
Apple |
macOS |
2025-07-29T23:35:46.623Z | 2026-02-26T17:50:06.199Z |
| CVE-2025-43266 |
5.1 (3.1)
|
A permissions issue was addressed with additional… |
Apple |
macOS |
2025-07-29T23:35:45.570Z | 2026-02-26T17:50:06.675Z |
| CVE-2025-20700 |
8.8 (3.1)
|
In the Airoha Bluetooth audio SDK, there is a pos… |
Airoha Technology Corp. |
AB156x, AB157x, AB158x, AB159x series, AB1627 |
2025-08-04T06:19:06.133Z | 2026-02-26T17:50:06.021Z |
| CVE-2025-20698 |
6.7 (3.1)
|
In Power HAL, there is a possible out of bounds w… |
MediaTek, Inc. |
MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8196, MT8391, MT8676, MT8678, MT8775, MT8786, MT8788E, MT8792, MT8796, MT8873, MT8883, MT8893 |
2025-08-04T01:49:50.189Z | 2026-02-26T17:50:06.437Z |
| CVE-2025-20697 |
6.7 (3.1)
|
In Power HAL, there is a possible out of bounds w… |
MediaTek, Inc. |
MT2718, MT6761, MT6765, MT6768, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6889, MT6893, MT6897, MT6989, MT6991, MT8186, MT8196, MT8391, MT8678, MT8775, MT8786, MT8788E, MT8792, MT8796, MT8873, MT8883, MT8893 |
2025-08-04T01:49:48.567Z | 2026-02-26T17:50:06.885Z |
| CVE-2025-43196 |
7.8 (3.1)
|
A path handling issue was addressed with improved… |
Apple |
macOS |
2025-07-29T23:54:35.368Z | 2026-02-26T17:50:05.753Z |
| CVE-2025-25011 |
7 (3.1)
|
Beats Uncontrolled Search Path Element can lead to Loc… |
Elastic |
Beats |
2025-07-30T00:15:43.132Z | 2026-02-26T17:50:05.471Z |
| CVE-2025-8292 |
8.8 (3.1)
|
Use after free in Media Stream in Google Chrome p… |
Google |
Chrome |
2025-07-30T01:18:27.241Z | 2026-02-26T17:50:04.225Z |
| CVE-2025-20702 |
8.8 (3.1)
|
In the Airoha Bluetooth audio SDK, there is a pos… |
Airoha Technology Corp. |
AB156x, AB157x, AB158x, AB159x series, AB1627 |
2025-08-04T06:20:40.458Z | 2026-02-26T17:50:04.037Z |
| CVE-2025-20701 |
8.8 (3.1)
|
In the Airoha Bluetooth audio SDK, there is a pos… |
Airoha Technology Corp. |
AB156x, AB157x, AB158x, AB159x series |
2025-08-04T06:20:32.057Z | 2026-02-26T17:50:04.636Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2022-0569 |
5.3 (3.1)
|
Observable Discrepancy in snipe/snipe-it |
snipe |
snipe/snipe-it |
2022-02-12T23:55:09.000Z | 2024-08-02T23:32:46.184Z |
| CVE-2022-0565 |
7.6 (3.1)
|
Cross-site Scripting in pimcore/pimcore |
pimcore |
pimcore/pimcore |
2022-02-12T12:30:10.000Z | 2024-11-19T19:16:33.301Z |
| CVE-2022-0536 |
2.6 (3.1)
|
Improper Removal of Sensitive Information Before Stora… |
follow-redirects |
follow-redirects/follow-redirects |
2022-02-09T10:45:10.000Z | 2024-08-02T23:32:46.161Z |
| CVE-2022-0528 |
6.5 (3.1)
|
Server-Side Request Forgery (SSRF) in transloadit/uppy |
transloadit |
transloadit/uppy |
2022-03-03T07:00:11.000Z | 2024-08-02T23:32:46.214Z |
| CVE-2022-0355 |
8.8 (3.1)
|
Improper Removal of Sensitive Information Before Stora… |
feross |
feross/simple-get |
2022-01-26T00:00:00.000Z | 2024-08-02T23:25:40.264Z |
| CVE-2022-0338 |
4.3 (3.1)
|
Insertion of Sensitive Information into Log File in de… |
delgan |
delgan/loguru |
2022-01-25T09:00:12.000Z | 2024-08-02T23:25:40.271Z |
| CVE-2022-0282 |
4.3 (3.1)
|
Cross-site Scripting in microweber/microweber |
microweber |
microweber/microweber |
2022-01-20T11:15:11.000Z | 2024-08-02T23:25:39.522Z |
| CVE-2022-0178 |
6.3 (3.1)
|
Missing Authorization in snipe/snipe-it |
snipe |
snipe/snipe-it |
2022-01-13T22:25:11.000Z | 2024-08-02T23:18:42.014Z |
| CVE-2022-0121 |
8 (3.1)
|
Cross-site Scripting in hoppscotch/hoppscotch |
hoppscotch |
hoppscotch/hoppscotch |
2022-01-06T02:30:10.000Z | 2024-08-02T23:18:41.752Z |
| CVE-2024-38882 |
9.8 (3.1)
|
An issue in Horizon Business Services Inc. Catere… |
n/a |
n/a |
2024-08-02T00:00:00.000Z | 2024-08-07T15:28:21.567Z |
| CVE-2024-38881 |
7.5 (3.1)
|
An issue in Horizon Business Services Inc. Catere… |
n/a |
n/a |
2024-08-02T00:00:00.000Z | 2024-08-07T15:28:03.438Z |
| CVE-2024-38891 |
9.1 (3.1)
|
An issue in Horizon Business Services Inc. Catere… |
n/a |
n/a |
2024-08-02T00:00:00.000Z | 2024-08-12T19:56:12.566Z |
| CVE-2026-24686 |
4.7 (3.1)
|
go-tuf Path Traversal in TAP 4 Multirepo Client Allows… |
theupdateframework |
go-tuf |
2026-01-27T00:45:43.422Z | 2026-01-27T14:40:01.511Z |
| CVE-2024-38886 |
9.8 (3.1)
|
An issue in Horizon Business Services Inc. Catere… |
n/a |
n/a |
2024-08-02T00:00:00.000Z | 2024-08-12T19:57:21.532Z |
| CVE-2025-71241 |
4.8 (4.0)
5.4 (3.1)
|
SPIP < 4.3.6 Cross-Site Scripting in Private Area |
SPIP |
SPIP |
2026-02-19T14:58:13.755Z | 2026-02-20T20:27:57.434Z |
| CVE-2025-71240 |
4.8 (4.0)
5.4 (3.1)
|
SPIP < 4.2.15 Cross-Site Scripting via Code Tags |
SPIP |
SPIP |
2026-02-19T14:58:12.961Z | 2026-02-19T20:22:11.736Z |
| CVE-2025-2149 |
2 (4.0)
2.5 (3.1)
2.5 (3.0)
|
PyTorch Quantized Sigmoid Module nnq_Sigmoid initialization |
n/a |
PyTorch |
2025-03-10T12:31:04.788Z | 2025-03-10T14:08:14.533Z |
| CVE-2025-14448 |
5.4 (3.1)
|
WP-Members Membership Plugin <= 3.5.4.3 - Authenticate… |
cbutlerjr |
WP-Members Membership Plugin |
2026-01-15T05:24:19.163Z | 2026-01-15T14:47:50.023Z |
| CVE-2026-25795 |
5.3 (3.1)
|
ImageMagick has NULL pointer dereference in ReadSFWIma… |
ImageMagick |
ImageMagick |
2026-02-24T00:54:34.640Z | 2026-02-26T15:08:55.743Z |
| CVE-2026-25796 |
5.3 (3.1)
|
ImageMagick has memory leak of watermark Image object … |
ImageMagick |
ImageMagick |
2026-02-24T00:57:27.441Z | 2026-02-26T15:12:22.180Z |
| CVE-2026-25798 |
5.3 (3.1)
|
ImageMagick has NULL Pointer Dereference in ClonePixel… |
ImageMagick |
ImageMagick |
2026-02-24T01:02:30.911Z | 2026-02-26T15:21:20.797Z |
| CVE-2026-25799 |
5.3 (3.1)
|
ImageMagick has Division-by-Zero in YUV sampling facto… |
ImageMagick |
ImageMagick |
2026-02-24T01:05:39.405Z | 2026-02-26T15:22:25.612Z |
| CVE-2026-25897 |
6.5 (3.1)
|
ImageMagick has heap overflow in sun decoder on 32-bit… |
ImageMagick |
ImageMagick |
2026-02-24T01:16:15.438Z | 2026-02-26T15:24:12.905Z |
| CVE-2026-25989 |
7.5 (3.1)
|
ImageMagick has integer overflow or wraparound and inc… |
ImageMagick |
ImageMagick |
2026-02-24T01:50:12.995Z | 2026-02-28T02:09:11.388Z |
| CVE-2026-26066 |
6.2 (3.1)
|
ImageMagick has infinite loop when writing IPTCTEXT le… |
ImageMagick |
ImageMagick |
2026-02-24T01:52:30.870Z | 2026-02-26T21:33:40.181Z |
| CVE-2026-26283 |
6.2 (3.1)
|
ImageMagick has possible infinite loop in JPEG encoder… |
ImageMagick |
ImageMagick |
2026-02-24T01:55:59.350Z | 2026-02-24T20:47:41.990Z |
| CVE-2026-26284 |
6.5 (3.1)
|
ImageMagick has heap overflow in pcd decoder that lead… |
ImageMagick |
ImageMagick |
2026-02-24T02:00:19.417Z | 2026-02-24T20:46:56.730Z |
| CVE-2026-26983 |
5.3 (3.1)
|
ImageMagick: Invalid MSL <map> can result in a use aft… |
ImageMagick |
ImageMagick |
2026-02-24T02:01:20.113Z | 2026-02-28T02:09:53.161Z |
| CVE-2025-9862 |
6.1 (4.0)
|
Ghost 6.0.6 - SSRF via oEmbed Bookmark |
Ghost |
Ghost |
2025-09-17T15:02:01.533Z | 2025-09-17T15:42:32.020Z |
| CVE-2026-2983 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SourceCodester Student Result Management System Bulk I… |
SourceCodester |
Student Result Management System |
2026-02-23T09:32:07.933Z | 2026-02-23T12:45:23.221Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2022-0569 | Observable Discrepancy in Packagist snipe/snipe-it prior to v5.3.9. | 2022-02-14T12:15:22.260 | 2026-02-24T19:20:55.267 |
| fkie_cve-2022-0565 | Cross-site Scripting in Packagist pimcore/pimcore prior to 10.3.1. | 2022-02-14T12:15:21.947 | 2026-02-24T19:20:54.997 |
| fkie_cve-2022-0536 | Improper Removal of Sensitive Information Before Storage or Transfer in NPM follow-redirects prior … | 2022-02-09T11:15:08.647 | 2026-02-24T19:20:51.187 |
| fkie_cve-2022-0528 | Server-Side Request Forgery (SSRF) in GitHub repository transloadit/uppy prior to 3.3.1. | 2022-03-03T07:15:06.973 | 2026-02-24T19:20:49.950 |
| fkie_cve-2022-0355 | Improper Removal of Sensitive Information Before Storage or Transfer in NPM simple-get prior to 4.0.1. | 2022-01-26T04:15:06.813 | 2026-02-24T19:20:36.153 |
| fkie_cve-2022-0338 | Insertion of Sensitive Information into Log File in Conda loguru prior to 0.5.3. | 2022-01-25T09:15:06.950 | 2026-02-24T19:20:34.750 |
| fkie_cve-2022-0282 | Cross-site Scripting in Packagist microweber/microweber prior to 1.2.11. | 2022-01-20T12:15:08.663 | 2026-02-24T19:20:29.840 |
| fkie_cve-2022-0178 | Missing Authorization vulnerability in snipe snipe/snipe-it.This issue affects snipe/snipe-i before… | 2022-01-13T23:15:07.497 | 2026-02-24T19:20:22.600 |
| fkie_cve-2022-0121 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2022-01-06T03:15:06.790 | 2026-02-24T19:20:17.770 |
| fkie_cve-2024-38882 | An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly l… | 2024-08-02T18:16:19.300 | 2026-02-24T19:09:27.750 |
| fkie_cve-2024-38881 | An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly l… | 2024-08-02T18:16:19.207 | 2026-02-24T19:09:09.500 |
| fkie_cve-2024-38891 | An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly l… | 2024-08-02T21:16:30.853 | 2026-02-24T19:08:57.317 |
| fkie_cve-2026-24686 | go-tuf is a Go implementation of The Update Framework (TUF). go-tuf's TAP 4 Multirepo Client uses t… | 2026-01-27T01:16:02.790 | 2026-02-24T19:08:46.017 |
| fkie_cve-2024-38886 | An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly l… | 2024-08-02T18:16:19.660 | 2026-02-24T19:08:00.533 |
| fkie_cve-2025-71241 | SPIP before 4.3.6, 4.2.17, and 4.1.20 allows Cross-Site Scripting (XSS) in the private area. The co… | 2026-02-19T16:27:11.903 | 2026-02-24T18:57:39.160 |
| fkie_cve-2025-71240 | SPIP before 4.2.15 allows Cross-Site Scripting (XSS) via crafted content in HTML code tags. The app… | 2026-02-19T16:27:11.690 | 2026-02-24T18:53:21.910 |
| fkie_cve-2025-2149 | A vulnerability was found in PyTorch 2.6.0+cu124. It has been rated as problematic. Affected by thi… | 2025-03-10T13:15:36.290 | 2026-02-24T18:52:49.347 |
| fkie_cve-2025-14448 | The WP-Members Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting … | 2026-01-15T06:16:05.610 | 2026-02-24T18:47:57.383 |
| fkie_cve-2026-25795 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T01:16:14.137 | 2026-02-24T18:46:49.677 |
| fkie_cve-2026-25796 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T01:16:14.293 | 2026-02-24T18:46:13.680 |
| fkie_cve-2026-25798 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T01:16:14.603 | 2026-02-24T18:45:31.173 |
| fkie_cve-2026-25799 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T01:16:14.763 | 2026-02-24T18:44:52.853 |
| fkie_cve-2026-25897 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T02:16:00.837 | 2026-02-24T18:44:12.467 |
| fkie_cve-2026-25989 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T03:16:00.773 | 2026-02-24T18:43:16.560 |
| fkie_cve-2026-26066 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T03:16:00.937 | 2026-02-24T18:42:32.553 |
| fkie_cve-2026-26283 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T03:16:01.290 | 2026-02-24T18:41:35.010 |
| fkie_cve-2026-26284 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T03:16:01.543 | 2026-02-24T18:39:19.270 |
| fkie_cve-2026-26983 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-02-24T03:16:02.107 | 2026-02-24T18:38:31.420 |
| fkie_cve-2025-9862 | Server-Side Request Forgery (SSRF) vulnerability in Ghost allows an attacker to access internal res… | 2025-09-17T15:15:43.937 | 2026-02-24T18:36:18.247 |
| fkie_cve-2026-2983 | A vulnerability was determined in SourceCodester Student Result Management System 1.0. The impacted… | 2026-02-23T10:16:58.757 | 2026-02-24T18:32:54.093 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-rx38-cw65-cmwp |
8.2 (3.1)
|
Improper access control in Microsoft Teams allows an unauthorized attacker to disclose information … | 2026-02-20T00:31:53Z | 2026-02-20T00:31:53Z |
| ghsa-fj3r-hwrr-xqfr |
6.5 (3.1)
|
Tanium addressed an insertion of sensitive information into log file vulnerability in Interact and TDS. | 2026-02-20T00:31:53Z | 2026-02-20T00:31:53Z |
| ghsa-8g63-rx6r-ghfc |
5.3 (3.1)
|
Tanium addressed an insertion of sensitive information into log file vulnerability in TanOS. | 2026-02-20T00:31:53Z | 2026-02-20T00:31:53Z |
| ghsa-4jmq-69hm-3jp3 |
4.7 (3.1)
|
Tanium addressed a use-after-free vulnerability in the Cloud Workloads Enforce client extension. | 2026-02-20T00:31:53Z | 2026-02-20T00:31:53Z |
| ghsa-22jr-f6pc-522x |
6.5 (3.1)
|
Tanium addressed an insertion of sensitive information into log file vulnerability in Trends. | 2026-02-20T00:31:53Z | 2026-02-20T00:31:53Z |
| ghsa-xprw-mh67-9xf5 |
8.8 (3.1)
|
Deserialization of Untrusted Data vulnerability in codetipi Valenti valenti allows Object Injection… | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-xmxf-f859-45ch |
5.3 (3.1)
|
Missing Authorization vulnerability in peregrinethemes Shopwell shopwell allows Exploiting Incorrec… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-xgvq-3q42-wr4g |
9.8 (3.1)
|
Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows … | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-xfv7-f3m9-5h58 |
4.3 (3.1)
|
Missing Authorization vulnerability in madalin.ungureanu Client Portal client-portal allows Exploit… | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-r7pc-wm4g-53rv |
4.3 (3.1)
|
Missing Authorization vulnerability in StellarWP iThemes Sync ithemes-sync allows Exploiting Incorr… | 2026-02-19T18:31:53Z | 2026-02-20T00:31:52Z |
| ghsa-qrj7-4954-7p6v |
6.5 (3.1)
7.1 (4.0)
|
An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed an… | 2026-02-18T21:31:23Z | 2026-02-20T00:31:52Z |
| ghsa-pmfh-36xp-5j94 |
4.3 (3.1)
|
Missing Authorization vulnerability in WP Messiah TOP Table Of Contents top-table-of-contents allow… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-p546-7whm-cxpm |
9.0 (3.1)
7.6 (4.0)
|
An URL redirection vulnerability was identified in GitHub Enterprise Server that allowed attacker-c… | 2026-02-18T21:31:23Z | 2026-02-20T00:31:52Z |
| ghsa-m5w7-8p57-p7r3 |
5.3 (3.1)
|
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in rtCamp … | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-jwh4-2xr6-36qf |
5.3 (3.1)
|
Missing Authorization vulnerability in Kraft Plugins Wheel of Life wheel-of-life allows Exploiting … | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-hm7p-gwh2-3jfm |
5.3 (3.1)
|
Missing Authorization vulnerability in alttextai Download Alt Text AI alttext-ai allows Exploiting … | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-g6g2-qr88-w8qf |
5.4 (3.1)
|
Missing Authorization vulnerability in BBR Plugins Better Business Reviews better-business-reviews … | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-fw5x-26p7-22pv |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in wpzita Zita Elementor Site Library zita-site-lib… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-fv8p-2x46-62xh |
5.3 (3.1)
|
Missing Authorization vulnerability in PSM Plugins SupportCandy supportcandy allows Exploiting Inco… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-cppf-28gj-rgc8 |
5.4 (3.1)
|
Missing Authorization vulnerability in 10up Autoshare for Twitter autoshare-for-twitter allows Expl… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-97jx-r35c-g98x |
5.3 (3.1)
|
Missing Authorization vulnerability in Ays Pro AI ChatBot with ChatGPT and Content Generator by AYS… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-92wf-6p4m-jhgj |
5.9 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-89gr-885m-3hc3 |
5.3 (3.1)
|
Missing Authorization vulnerability in WP Swings Ultimate Gift Cards For WooCommerce woo-gift-cards… | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-739q-666p-vgj7 |
5.3 (3.1)
|
Missing Authorization vulnerability in Alma Alma alma-gateway-for-woocommerce allows Exploiting Inc… | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-5h6j-gr7x-5qpg |
9.8 (3.1)
|
Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Restaurant grandrestaurant allo… | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-528q-f4x8-fm57 |
5.3 (3.1)
|
Missing Authorization vulnerability in wpcoachify Coachify coachify allows Exploiting Incorrectly C… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-4234-jpgj-67fv |
4.3 (3.1)
|
Missing Authorization vulnerability in wp.insider Simple Membership simple-membership allows Exploi… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-3h3m-wx6r-9g3v |
5.3 (3.1)
|
Missing Authorization vulnerability in DevsBlink EduBlink edublink allows Exploiting Incorrectly Co… | 2026-02-19T21:30:48Z | 2026-02-20T00:31:52Z |
| ghsa-2q3j-wj77-9934 |
6.5 (3.1)
6.0 (4.0)
|
A Missing Authorization vulnerability was identified in GitHub Enterprise Server that allowed an at… | 2026-02-18T21:31:23Z | 2026-02-20T00:31:52Z |
| ghsa-p6jf-79j3-33f3 |
9.1 (3.1)
|
carbon-apimgt does not properly restrict uploaded files | 2026-02-19T18:31:54Z | 2026-02-19T22:11:44Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-484 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.071121Z |
| pysec-2021-483 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.920437Z |
| pysec-2021-482 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T19:15:00Z | 2021-12-09T06:34:51.766391Z |
| pysec-2021-481 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can re… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.614588Z |
| pysec-2021-480 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.420468Z |
| pysec-2021-479 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.250544Z |
| pysec-2021-478 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.099370Z |
| pysec-2021-477 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.949292Z |
| pysec-2021-476 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.800401Z |
| pysec-2021-475 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.647185Z |
| pysec-2021-474 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.495115Z |
| pysec-2021-473 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.345149Z |
| pysec-2021-472 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.195889Z |
| pysec-2021-471 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.046503Z |
| pysec-2021-470 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.894355Z |
| pysec-2021-469 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.747683Z |
| pysec-2021-468 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.596439Z |
| pysec-2021-467 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_op… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.452107Z |
| pysec-2021-466 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.257791Z |
| pysec-2021-465 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.104886Z |
| pysec-2021-464 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.953620Z |
| pysec-2021-463 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.800365Z |
| pysec-2021-462 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.648836Z |
| pysec-2021-461 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.500169Z |
| pysec-2021-460 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can fo… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.349137Z |
| pysec-2021-459 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.199089Z |
| pysec-2021-458 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.047849Z |
| pysec-2021-457 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.879310Z |
| pysec-2021-456 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.721328Z |
| pysec-2021-455 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.577181Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-3783 | The Backup Agents section in WBSAirback 21.02.04 is affected by a Path Traversal vulnerab… | 2024-04-16T05:01:59.533875Z |
| gsd-2024-3782 | Cross-Site Request Forgery vulnerability in WBSAirback 21.02.04, which could allow an att… | 2024-04-16T05:01:59.775101Z |
| gsd-2024-3781 | Command injection vulnerability in the operating system. Improper neutralisation of speci… | 2024-04-16T05:01:59.559921Z |
| gsd-2024-3780 | A vulnerability of Information Exposure has been found on Technicolor CGA2121 affecting t… | 2024-04-16T05:01:59.797051Z |
| gsd-2024-3779 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.684604Z |
| gsd-2024-32604 | Authorization Bypass Through User-Controlled Key vulnerability in Plechev Andrey WP-Recal… | 2024-04-16T05:01:54.692595Z |
| gsd-2024-32603 | Deserialization of Untrusted Data vulnerability in ThemeKraft WooBuddy.This issue affects… | 2024-04-16T05:01:54.702090Z |
| gsd-2024-32602 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vuln… | 2024-04-16T05:01:54.717563Z |
| gsd-2024-32601 | Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Popup Anything.… | 2024-04-16T05:01:54.603461Z |
| gsd-2024-32600 | Deserialization of Untrusted Data vulnerability in Averta Master Slider.This issue affect… | 2024-04-16T05:01:54.599191Z |
| gsd-2024-32599 | Improper Control of Generation of Code ('Code Injection') vulnerability in Deepak anand W… | 2024-04-16T05:01:54.650918Z |
| gsd-2024-32598 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.700392Z |
| gsd-2024-32597 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.658590Z |
| gsd-2024-32596 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.602047Z |
| gsd-2024-32595 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.607048Z |
| gsd-2024-32594 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.674984Z |
| gsd-2024-32593 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.679922Z |
| gsd-2024-32592 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.579522Z |
| gsd-2024-32591 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.622040Z |
| gsd-2024-32590 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.681804Z |
| gsd-2024-32589 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:54.578090Z |
| gsd-2024-32588 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.604699Z |
| gsd-2024-32587 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.642307Z |
| gsd-2024-32586 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.717307Z |
| gsd-2024-32585 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.722518Z |
| gsd-2024-32584 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.598992Z |
| gsd-2024-32583 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.638287Z |
| gsd-2024-32582 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.604505Z |
| gsd-2024-32581 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.611418Z |
| gsd-2024-32580 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.708066Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-173 | Malicious code in cng-web-lib (npm) | 2026-01-09T02:54:15Z | 2026-01-15T22:09:18Z |
| mal-2026-172 | Malicious code in chai-tests-async (npm) | 2026-01-09T02:55:20Z | 2026-01-15T22:09:18Z |
| mal-2026-171 | Malicious code in amdocs-core (npm) | 2026-01-09T02:54:15Z | 2026-01-15T22:09:18Z |
| MAL-2026-245 | Malicious code in cnamts-captcha-component (npm) | 2026-01-13T05:26:09Z | 2026-01-15T22:09:18Z |
| MAL-2026-239 | Malicious code in chai-as-enhanced (npm) | 2026-01-13T03:23:31Z | 2026-01-15T22:09:18Z |
| MAL-2026-216 | Malicious code in cors-base (npm) | 2026-01-12T03:12:02Z | 2026-01-15T22:09:18Z |
| MAL-2026-215 | Malicious code in auth-types (npm) | 2026-01-12T01:57:12Z | 2026-01-15T22:09:18Z |
| MAL-2026-214 | Malicious code in analytics-browser (npm) | 2026-01-12T01:57:12Z | 2026-01-15T22:09:18Z |
| MAL-2026-203 | Malicious code in body-parser-js (npm) | 2026-01-12T00:22:24Z | 2026-01-15T22:09:18Z |
| MAL-2026-174 | Malicious code in dotenv-intended (npm) | 2026-01-09T02:55:20Z | 2026-01-15T22:09:18Z |
| MAL-2026-173 | Malicious code in cng-web-lib (npm) | 2026-01-09T02:54:15Z | 2026-01-15T22:09:18Z |
| MAL-2026-172 | Malicious code in chai-tests-async (npm) | 2026-01-09T02:55:20Z | 2026-01-15T22:09:18Z |
| MAL-2026-171 | Malicious code in amdocs-core (npm) | 2026-01-09T02:54:15Z | 2026-01-15T22:09:18Z |
| mal-2026-213 | Malicious code in @maxcointech/simple-string-utils (npm) | 2026-01-12T03:12:01Z | 2026-01-15T22:09:17Z |
| mal-2026-211 | Malicious code in @workleap-widgets/client (npm) | 2026-01-12T01:26:09Z | 2026-01-15T22:09:17Z |
| mal-2026-210 | Malicious code in @workleap-ai/shared (npm) | 2026-01-12T01:26:09Z | 2026-01-15T22:09:17Z |
| mal-2026-209 | Malicious code in @t4i-cms-components/contact-card (npm) | 2026-01-12T01:26:09Z | 2026-01-15T22:09:17Z |
| mal-2026-208 | Malicious code in @gwp-gtmt-components/event-listener (npm) | 2026-01-12T01:26:09Z | 2026-01-15T22:09:17Z |
| mal-2026-168 | Malicious code in @zuora-marketing/linting (npm) | 2026-01-08T15:40:55Z | 2026-01-15T22:09:17Z |
| MAL-2026-213 | Malicious code in @maxcointech/simple-string-utils (npm) | 2026-01-12T03:12:01Z | 2026-01-15T22:09:17Z |
| MAL-2026-211 | Malicious code in @workleap-widgets/client (npm) | 2026-01-12T01:26:09Z | 2026-01-15T22:09:17Z |
| MAL-2026-210 | Malicious code in @workleap-ai/shared (npm) | 2026-01-12T01:26:09Z | 2026-01-15T22:09:17Z |
| MAL-2026-209 | Malicious code in @t4i-cms-components/contact-card (npm) | 2026-01-12T01:26:09Z | 2026-01-15T22:09:17Z |
| MAL-2026-208 | Malicious code in @gwp-gtmt-components/event-listener (npm) | 2026-01-12T01:26:09Z | 2026-01-15T22:09:17Z |
| MAL-2026-168 | Malicious code in @zuora-marketing/linting (npm) | 2026-01-08T15:40:55Z | 2026-01-15T22:09:17Z |
| mal-0000-ossf-package-analysis-0faef4f09fbb3807 | Malicious code in admin1001 (npm) | 2026-01-15T06:40:41Z | 2026-01-15T06:40:41Z |
| MAL-0000-OSSF-PACKAGE-ANALYSIS-0FAEF4F09FBB3807 | Malicious code in admin1001 (npm) | 2026-01-15T06:40:41Z | 2026-01-15T06:40:41Z |
| mal-0000-ossf-package-analysis-3a35642da2386734 | Malicious code in admin1001 (npm) | 2026-01-15T06:35:30Z | 2026-01-15T06:35:30Z |
| MAL-0000-OSSF-PACKAGE-ANALYSIS-3A35642DA2386734 | Malicious code in admin1001 (npm) | 2026-01-15T06:35:30Z | 2026-01-15T06:35:30Z |
| mal-0000-ossf-package-analysis-da353a22763d8fd0 | Malicious code in admin1001 (npm) | 2026-01-15T06:28:50Z | 2026-01-15T06:28:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3486 | Apache Tomcat: Mehrere Schwachstellen | 2024-11-17T23:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2024-3296 | Mozilla Firefox, ESR und Thunderbird: Mehrere Schwachstellen | 2024-10-29T23:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2024-3057 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2024-10-01T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2024-0344 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-02-11T23:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2024-0097 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-01-15T23:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2024-0032 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-01-09T23:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2023-3181 | Linux Kernel: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2023-12-19T23:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2023-3090 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-12-10T23:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2770 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-10-29T23:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2643 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2023-10-15T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2598 | Linux Kernel: Schwachstelle ermöglicht Denial of Service oder Offenlegung von Informationen | 2023-10-09T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2553 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-10-03T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2530 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-10-01T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2525 | Linux Kernel: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2023-10-01T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2284 | Linux Kernel: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2023-09-06T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2023-1971 | Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-08-06T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2023-0126 | Oracle MySQL: Mehrere Schwachstellen | 2023-01-17T23:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2022-1596 | Eclipse Jetty: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2021-06-22T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2022-1522 | Oracle Java SE: Mehrere Schwachstellen | 2020-07-14T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1012 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2025-05-12T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1011 | Dell PowerScale InsightIQ: Mehrere Schwachstellen | 2025-05-12T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1009 | Zoom Video Communications Workplace und Rooms: Mehrere Schwachstellen | 2025-05-12T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1008 | Apache Superset: Schwachstelle ermöglicht Umgehung von Sicherheitsvorkehrungen | 2025-05-12T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0994 | Kong Insomnia: Schwachstelle ermöglicht Codeausführung | 2025-05-11T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0985 | F5 BIG-IP: Mehrere Schwachstellen | 2025-05-07T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0492 | AMD EPYC Prozessoren: Schwachstelle ermöglicht Codeausführung | 2025-03-05T23:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0323 | Intel Firmware: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0186 | Red Hat Enterprise Linux (git-lfs): Schwachstelle ermöglicht Erlangen von Benutzerrechten | 2025-01-23T23:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0003 | Red Hat Enterprise Linux (python-requests): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-02T23:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0002 | OpenJPEG: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-01T23:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:2096 | Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.9.1 | 2024-05-01T07:37:52+00:00 | 2026-02-27T20:33:38+00:00 |
| rhsa-2024:2071 | Red Hat Security Advisory: OpenShift Container Platform 4.15.11 packages and security update | 2024-05-02T14:53:59+00:00 | 2026-02-27T20:33:37+00:00 |
| rhsa-2024:2054 | Red Hat Security Advisory: OpenShift Container Platform 4.14.23 security update | 2024-05-02T15:57:53+00:00 | 2026-02-27T20:33:37+00:00 |
| rhsa-2024:2049 | Red Hat Security Advisory: OpenShift Container Platform 4.13.41 packages and security update | 2024-05-02T17:02:00+00:00 | 2026-02-27T20:33:36+00:00 |
| rhsa-2024:1946 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.1 security update | 2024-04-22T12:47:08+00:00 | 2026-02-27T20:33:36+00:00 |
| rhsa-2024:1925 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.3 security and bug fix update | 2024-04-18T12:41:00+00:00 | 2026-02-27T20:33:34+00:00 |
| rhsa-2024:1874 | Red Hat Security Advisory: rhc-worker-script security and enhancement update | 2024-04-18T02:08:28+00:00 | 2026-02-27T20:33:31+00:00 |
| rhsa-2024:1795 | Red Hat Security Advisory: VolSync 0.9.1 security fixes and enhancements | 2024-04-11T21:29:12+00:00 | 2026-02-27T20:33:28+00:00 |
| rhsa-2024:1574 | Red Hat Security Advisory: OpenShift Container Platform 4.12.54 packages and security update | 2024-04-03T07:42:00+00:00 | 2026-02-27T20:33:15+00:00 |
| rhsa-2024:1567 | Red Hat Security Advisory: OpenShift Container Platform 4.14.19 security update | 2024-04-03T16:05:37+00:00 | 2026-02-27T20:33:12+00:00 |
| rhsa-2024:1559 | Red Hat Security Advisory: OpenShift Container Platform 4.15.6 bug fix and security update | 2024-04-02T19:33:26+00:00 | 2026-02-27T20:33:12+00:00 |
| rhsa-2024:1563 | Red Hat Security Advisory: OpenShift Container Platform 4.15.6 packages and security update | 2024-04-02T21:42:24+00:00 | 2026-02-27T20:33:11+00:00 |
| rhsa-2024:1538 | Red Hat Security Advisory: OpenShift Container Platform 4.12 low-latency extras security update | 2024-03-27T15:07:29+00:00 | 2026-02-27T20:33:09+00:00 |
| rhsa-2024:1537 | Red Hat Security Advisory: OpenShift Container Platform 4.13.38 low-latency extras security update | 2024-03-27T15:03:41+00:00 | 2026-02-27T20:33:08+00:00 |
| rhsa-2024:1508 | Red Hat Security Advisory: logging for Red Hat OpenShift security update | 2024-03-27T14:39:42+00:00 | 2026-02-27T20:33:08+00:00 |
| rhsa-2024:1461 | Red Hat Security Advisory: OpenShift Container Platform 4.14.18 packages and security update | 2024-03-27T00:45:48+00:00 | 2026-02-27T20:33:06+00:00 |
| rhsa-2024:1507 | Red Hat Security Advisory: logging for Red Hat OpenShift security update | 2024-03-27T14:21:24+00:00 | 2026-02-27T20:33:05+00:00 |
| rhsa-2024:1474 | Red Hat Security Advisory: logging for Red Hat OpenShift security update | 2024-03-27T15:00:48+00:00 | 2026-02-27T20:33:05+00:00 |
| rhsa-2024:1456 | Red Hat Security Advisory: OpenShift Container Platform 4.13.38 packages and security update | 2024-03-27T00:46:13+00:00 | 2026-02-27T20:33:00+00:00 |
| rhsa-2024:1363 | Red Hat Security Advisory: OpenShift Container Platform 4.15.3 low-latency extras security update | 2024-03-19T22:11:56+00:00 | 2026-02-27T20:32:51+00:00 |
| rhsa-2024:1362 | Red Hat Security Advisory: OpenShift Container Platform 4.14.17 low-latency extras security update | 2024-03-20T11:40:31+00:00 | 2026-02-27T20:32:49+00:00 |
| rhsa-2024:10852 | Red Hat Security Advisory: RHOAI 2.16.0 - Red Hat OpenShift AI | 2024-12-05T14:54:56+00:00 | 2026-02-27T20:32:35+00:00 |
| rhsa-2024:10147 | Red Hat Security Advisory: OpenShift Container Platform 4.16.24 security update | 2024-11-26T18:45:35+00:00 | 2026-02-27T20:32:23+00:00 |
| rhsa-2024:0043 | Red Hat Security Advisory: Red Hat build of MicroShift 4.16.0 security update | 2024-06-27T13:18:33+00:00 | 2026-02-27T20:30:53+00:00 |
| rhsa-2023:4671 | Red Hat Security Advisory: OpenShift Container Platform 4.12.30 bug fix and security update | 2023-08-23T16:31:07+00:00 | 2026-02-27T20:26:19+00:00 |
| rhsa-2023:4025 | Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 7.1.0 [security update] | 2023-07-18T00:18:27+00:00 | 2026-02-27T20:25:41+00:00 |
| rhsa-2023:2107 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.9 security and bug fix update | 2023-05-04T01:50:06+00:00 | 2026-02-27T20:24:44+00:00 |
| rhsa-2023:1372 | Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 8.0.0 [security update] | 2023-05-10T00:28:34+00:00 | 2026-02-27T20:24:42+00:00 |
| rhea-2024:4022 | Red Hat Enhancement Advisory: Red Hat OpenShift Pipelines Client tkn for 1.15.0 release | 2024-06-20T14:25:41+00:00 | 2026-02-27T20:24:13+00:00 |
| rhea-2023:7493 | Red Hat Enhancement Advisory: OpenShift sandboxed containers 1.5.0 update | 2023-11-27T11:44:10+00:00 | 2026-02-27T20:24:11+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-23-320-05 | Siemens SCALANCE W700 | 2023-11-14T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-23-166-11 | Siemens SIMATIC S7-1500 TM MFP Linux Kernel | 2023-06-13T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-23-166-10 | Siemens SIMATIC S7-1500 TM MFP BIOS | 2023-06-13T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-23-075-04 | Siemens SCALANCE W1750D Devices | 2023-03-14T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-24-095-02 | Schweitzer Engineering Laboratories SEL 700 series relays | 2024-04-04T06:00:00.000000Z | 2024-04-04T06:00:00.000000Z |
| icsa-24-095-01 | Hitachi Energy Asset Suite 9 | 2024-04-04T06:00:00.000000Z | 2024-04-04T06:00:00.000000Z |
| icsa-24-093-01 | IOSIX IO-1020 Micro ELD | 2024-04-02T06:00:00.000000Z | 2024-04-02T06:00:00.000000Z |
| icsa-24-086-04 | Rockwell Automation FactoryTalk View ME | 2024-03-26T06:00:00.000000Z | 2024-03-26T06:00:00.000000Z |
| icsa-24-086-03 | Rockwell Automation Arena Simulation | 2024-03-26T06:00:00.000000Z | 2024-03-26T06:00:00.000000Z |
| icsa-24-086-02 | Rockwell Automation PowerFlex 527 | 2024-03-26T06:00:00.000000Z | 2024-03-26T06:00:00.000000Z |
| icsa-24-086-01 | AutomationDirect C-MORE EA9 HMI | 2024-03-26T06:00:00.000000Z | 2024-03-26T06:00:00.000000Z |
| icsa-24-081-01 | Advantech WebAccess/SCADA | 2024-03-21T06:00:00.000000Z | 2024-03-21T06:00:00.000000Z |
| icsa-24-079-01 | Franklin Fueling System EVO 550/5000 | 2024-03-19T06:00:00.000000Z | 2024-03-19T06:00:00.000000Z |
| icsa-24-074-13 | Softing edgeConnector | 2024-03-14T06:00:00.000000Z | 2024-03-14T06:00:00.000000Z |
| icsa-24-074-12 | Delta Electronics DIAEnergie | 2024-03-14T06:00:00.000000Z | 2024-03-14T06:00:00.000000Z |
| icsa-24-074-07 | Siemens SIMATIC | 2024-03-14T06:00:00.000000Z | 2024-03-14T06:00:00.000000Z |
| icsa-24-072-01 | Schneider Electric EcoStruxure Power Design | 2024-03-12T06:00:00.000000Z | 2024-03-12T06:00:00.000000Z |
| icsa-24-074-10 | Siemens Siveillance Control | 2024-03-12T00:00:00.000000Z | 2024-03-12T00:00:00.000000Z |
| icsa-24-074-06 | Siemens SENTRON | 2024-03-12T00:00:00.000000Z | 2024-03-12T00:00:00.000000Z |
| icsa-24-074-04 | Siemens SINEMA Remote Connect Client | 2024-03-12T00:00:00.000000Z | 2024-03-12T00:00:00.000000Z |
| icsa-24-074-03 | Siemens SINEMA Remote Connect Server | 2024-03-12T00:00:00.000000Z | 2024-03-12T00:00:00.000000Z |
| icsa-24-046-15 | Siemens SINEC NMS | 2024-02-13T00:00:00.000000Z | 2024-03-12T00:00:00.000000Z |
| icsa-24-046-10 | Siemens Simcenter Femap | 2024-02-13T00:00:00.000000Z | 2024-03-12T00:00:00.000000Z |
| icsa-23-348-08 | Siemens Web Server of Industrial Products | 2023-12-12T00:00:00.000000Z | 2024-03-12T00:00:00.000000Z |
| icsa-23-320-08 | Siemens SCALANCE Family Products | 2023-11-14T00:00:00.000000Z | 2024-03-12T00:00:00.000000Z |
| icsma-24-065-01 | Santesoft Sante FFT Imaging | 2024-03-05T07:00:00.000000Z | 2024-03-05T07:00:00.000000Z |
| icsa-24-065-01 | Nice Linear eMerge E3-Series | 2024-03-05T07:00:00.000000Z | 2024-03-05T07:00:00.000000Z |
| icsa-24-016-02 | Integration Objects OPC UA Server Toolkit (Update A) | 2024-01-16T07:00:00.000000Z | 2024-03-05T07:00:00.000000Z |
| icsma-24-060-01 | MicroDicom DICOM Viewer | 2024-02-29T07:00:00.000000Z | 2024-02-29T07:00:00.000000Z |
| icsa-24-060-01 | Delta Electronics CNCSoft-B | 2024-02-29T07:00:00.000000Z | 2024-02-29T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-webex-redirect-XuZFU3PH | Cisco Webex Meetings and Webex Meetings Server File Redirect Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-player-rcfdevj2 | Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-player-rCFDeVj2 | Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-player-kxtkfbnr | Cisco Webex Player Memory Corruption Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-player-kxtkFbnR | Cisco Webex Player Memory Corruption Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-player-kof8zvt | Cisco Webex Player Memory Corruption Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-player-kOf8zVT | Cisco Webex Player Memory Corruption Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-player-doj2joj | Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-player-dOJ2jOJ | Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-multimedia-26dpqvro | Cisco Webex Meetings and Webex Meetings Server Multimedia Sharing Security Bypass Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-multimedia-26DpqVRO | Cisco Webex Meetings and Webex Meetings Server Multimedia Sharing Security Bypass Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-dll-inject-xnmcsgtu | Cisco Webex Meetings, Webex Network Recording Player, and Webex Teams DLL Injection Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-dll-inject-XNmcSGTU | Cisco Webex Meetings, Webex Network Recording Player, and Webex Teams DLL Injection Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-8fpbnkoz | Cisco Webex Meetings Client Software Logging Information Disclosure Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-8fpBnKOz | Cisco Webex Meetings Client Software Logging Information Disclosure Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-te-recorder-infodis-mx3ettbm | Cisco ThousandEyes Recorder Information Disclosure Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-te-recorder-infodis-mx3ETTBM | Cisco ThousandEyes Recorder Information Disclosure Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-sd-wan-fuercwwf | Cisco SD-WAN Software Privilege Escalation Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-sd-wan-fuErCWwF | Cisco SD-WAN Software Privilege Escalation Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-cspc-civ-kdubfnfu | Cisco Common Services Platform Collector Command Injection Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-asr5k-autho-bypass-mjdf5s7n | Cisco ASR 5000 Series Software Authorization Bypass Vulnerabilities | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-asr5k-autho-bypass-mJDF5S7n | Cisco ASR 5000 Series Software Authorization Bypass Vulnerabilities | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-CSPC-CIV-kDuBfNfu | Cisco Common Services Platform Collector Command Injection Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-anyconnect-ipc-kfqo9qhk | Cisco AnyConnect Secure Mobility Client Arbitrary Code Execution Vulnerability | 2020-11-04T16:00:00+00:00 | 2021-05-21T18:06:37+00:00 |
| cisco-sa-anyconnect-ipc-KfQO9QhK | Cisco AnyConnect Secure Mobility Client Arbitrary Code Execution Vulnerability | 2020-11-04T16:00:00+00:00 | 2021-05-21T18:06:37+00:00 |
| cisco-sa-http-fp-bp-kfddcqhc | Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerabilities | 2021-04-28T16:00:00+00:00 | 2021-05-20T18:51:31+00:00 |
| cisco-sa-http-fp-bp-KfDdcQhc | Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerabilities | 2021-04-28T16:00:00+00:00 | 2021-05-20T18:51:31+00:00 |
| cisco-sa-snort-tfo-bypass-mmzzrtes | Multiple Cisco Products Snort TCP Fast Open File Policy Bypass Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-05-20T13:27:19+00:00 |
| cisco-sa-snort-tfo-bypass-MmzZrtes | Multiple Cisco Products Snort TCP Fast Open File Policy Bypass Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-05-20T13:27:19+00:00 |
| cisco-sa-20190515-nxos-cli-bypass | Cisco NX-OS Software CLI Bypass to Internal Service Vulnerability | 2019-05-16T16:00:00+00:00 | 2021-05-19T20:31:16+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-29804 | Path traversal via Clean on Windows in path/filepath | 2022-08-02T00:00:00.000Z | 2026-02-18T14:40:21.000Z |
| msrc_cve-2025-71119 | powerpc/kexec: Enable SMT before waking offline CPUs | 2026-01-02T00:00:00.000Z | 2026-02-18T14:40:05.000Z |
| msrc_cve-2024-49859 | f2fs: fix to check atomic_file in f2fs ioctl interfaces | 2024-10-01T07:00:00.000Z | 2026-02-18T14:40:04.000Z |
| msrc_cve-2023-5517 | Querying RFC 1918 reverse zones may cause an assertion failure when "nxdomain-redirect" is enabled | 2024-02-02T08:00:00.000Z | 2026-02-18T14:39:49.000Z |
| msrc_cve-2024-50237 | wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower | 2024-11-02T00:00:00.000Z | 2026-02-18T14:39:41.000Z |
| msrc_cve-2021-33196 | In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5 a crafted file count (in an archive's header) can cause a NewReader or OpenReader panic. | 2021-08-02T00:00:00.000Z | 2026-02-18T14:39:39.000Z |
| msrc_cve-2025-71118 | ACPICA: Avoid walking the Namespace if start_node is NULL | 2026-01-02T00:00:00.000Z | 2026-02-18T14:39:35.000Z |
| msrc_cve-2024-47757 | nilfs2: fix potential oob read in nilfs_btree_check_delete() | 2024-10-01T07:00:00.000Z | 2026-02-18T14:39:33.000Z |
| msrc_cve-2024-2614 | Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9. | 2024-03-02T08:00:00.000Z | 2026-02-18T14:39:30.000Z |
| msrc_cve-2023-4408 | Parsing large DNS messages may cause excessive CPU load | 2024-02-02T08:00:00.000Z | 2026-02-18T14:39:19.000Z |
| msrc_cve-2024-50251 | netfilter: nft_payload: sanitize offset and length before calling skb_checksum() | 2024-11-02T00:00:00.000Z | 2026-02-18T14:39:15.000Z |
| msrc_cve-2025-71111 | hwmon: (w83791d) Convert macros to functions to avoid TOCTOU | 2026-01-02T00:00:00.000Z | 2026-02-18T14:39:13.000Z |
| msrc_cve-2025-22874 | Usage of ExtKeyUsageAny disables policy validation in crypto/x509 | 2025-06-02T00:00:00.000Z | 2026-02-18T14:39:04.000Z |
| msrc_cve-2024-47681 | wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he | 2024-10-01T07:00:00.000Z | 2026-02-18T14:39:03.000Z |
| msrc_cve-2024-47756 | PCI: keystone: Fix if-statement expression in ks_pcie_quirk() | 2024-10-01T07:00:00.000Z | 2026-02-18T14:38:44.000Z |
| msrc_cve-2025-71136 | media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status() | 2026-01-02T00:00:00.000Z | 2026-02-18T14:38:41.000Z |
| msrc_cve-2023-6516 | Specific recursive query patterns may lead to an out-of-memory condition | 2024-02-02T08:00:00.000Z | 2026-02-18T14:38:41.000Z |
| msrc_cve-2024-50148 | Bluetooth: bnep: fix wild-memory-access in proto_unregister | 2024-11-02T00:00:00.000Z | 2026-02-18T14:38:39.000Z |
| msrc_cve-2024-47743 | KEYS: prevent NULL pointer dereference in find_asymmetric_key() | 2024-10-01T07:00:00.000Z | 2026-02-18T14:38:27.000Z |
| msrc_cve-2021-23358 | Arbitrary Code Injection | 2021-03-02T00:00:00.000Z | 2026-02-18T14:38:25.000Z |
| msrc_cve-2025-71116 | libceph: make decode_pool() more resilient against corrupted osdmaps | 2026-01-02T00:00:00.000Z | 2026-02-18T14:38:20.000Z |
| msrc_cve-2024-50156 | drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() | 2024-11-02T00:00:00.000Z | 2026-02-18T14:38:13.000Z |
| msrc_cve-2023-5679 | Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution | 2024-02-02T08:00:00.000Z | 2026-02-18T14:38:12.000Z |
| msrc_cve-2024-49855 | nbd: fix race between timeout and normal completion | 2024-10-01T07:00:00.000Z | 2026-02-18T14:38:08.000Z |
| msrc_cve-2026-0861 | Integer overflow in memalign leads to heap corruption | 2026-01-02T00:00:00.000Z | 2026-02-18T14:37:56.000Z |
| msrc_cve-2024-47752 | media: mediatek: vcodec: Fix H264 stateless decoder smatch warning | 2024-10-01T07:00:00.000Z | 2026-02-18T14:37:50.000Z |
| msrc_cve-2017-1000097 | On Darwin, user's trust preferences for root certificates were not honored. If the user had a root certificate loaded in their Keychain that was explicitly not trusted, a Go program would still verify a connection using that root certificate. | 2017-10-02T00:00:00.000Z | 2026-02-18T14:37:50.000Z |
| msrc_cve-2024-25110 | Azure IoT Platform Device SDK Remote Code Execution Vulnerability | 2024-02-02T08:00:00.000Z | 2026-02-18T14:37:38.000Z |
| msrc_cve-2021-38561 | golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input this can be used as a vector for a denial-of-service attack. | 2022-12-02T00:00:00.000Z | 2026-02-18T14:37:32.000Z |
| msrc_cve-2024-50257 | netfilter: Fix use-after-free in get_info() | 2024-11-02T00:00:00.000Z | 2026-02-18T14:37:31.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:14601-1 | python310-xhtml2pdf-0.2.16-2.1 on GA media | 2024-12-18T00:00:00Z | 2024-12-18T00:00:00Z |
| opensuse-su-2024:14600-1 | libmozjs-128-0-128.5.1-3.1 on GA media | 2024-12-18T00:00:00Z | 2024-12-18T00:00:00Z |
| opensuse-su-2024:14599-1 | govulncheck-vulndb-0.0.20241213T205935-1.1 on GA media | 2024-12-18T00:00:00Z | 2024-12-18T00:00:00Z |
| opensuse-su-2024:14598-1 | docker-stable-24.0.9_ce-6.1 on GA media | 2024-12-18T00:00:00Z | 2024-12-18T00:00:00Z |
| opensuse-su-2024:14597-1 | docker-27.4.1_ce-12.1 on GA media | 2024-12-18T00:00:00Z | 2024-12-18T00:00:00Z |
| opensuse-su-2024:14596-1 | clamav-1.4.1-1.1 on GA media | 2024-12-18T00:00:00Z | 2024-12-18T00:00:00Z |
| opensuse-su-2024:14595-1 | traefik2-2.11.16-1.1 on GA media | 2024-12-17T00:00:00Z | 2024-12-17T00:00:00Z |
| opensuse-su-2024:14594-1 | libmozjs-115-0-115.15.0-4.1 on GA media | 2024-12-17T00:00:00Z | 2024-12-17T00:00:00Z |
| opensuse-su-2024:14593-1 | helm-3.16.4-1.1 on GA media | 2024-12-17T00:00:00Z | 2024-12-17T00:00:00Z |
| opensuse-su-2024:14592-1 | git-bug-0.8.0+git.1733745604.d499b6e-1.1 on GA media | 2024-12-17T00:00:00Z | 2024-12-17T00:00:00Z |
| opensuse-su-2024:14591-1 | emacs-29.4-11.1 on GA media | 2024-12-17T00:00:00Z | 2024-12-17T00:00:00Z |
| opensuse-su-2024:14590-1 | traefik-3.2.3-1.1 on GA media | 2024-12-16T00:00:00Z | 2024-12-16T00:00:00Z |
| opensuse-su-2024:14589-1 | libmozjs-78-0-78.15.0-7.1 on GA media | 2024-12-16T00:00:00Z | 2024-12-16T00:00:00Z |
| opensuse-su-2024:14588-1 | libmozjs-128-0-128.5.1-2.1 on GA media | 2024-12-16T00:00:00Z | 2024-12-16T00:00:00Z |
| opensuse-su-2024:14587-1 | libmozjs-115-0-115.15.0-3.1 on GA media | 2024-12-16T00:00:00Z | 2024-12-16T00:00:00Z |
| opensuse-su-2024:14586-1 | gstreamer-plugins-good-1.24.10-3.1 on GA media | 2024-12-16T00:00:00Z | 2024-12-16T00:00:00Z |
| opensuse-su-2024:14585-1 | cloudflared-2024.12.1-1.1 on GA media | 2024-12-16T00:00:00Z | 2024-12-16T00:00:00Z |
| opensuse-su-2024:14584-1 | MozillaThunderbird-128.5.2-1.1 on GA media | 2024-12-16T00:00:00Z | 2024-12-16T00:00:00Z |
| opensuse-su-2024:14583-1 | MozillaFirefox-133.0.3-1.1 on GA media | 2024-12-16T00:00:00Z | 2024-12-16T00:00:00Z |
| opensuse-su-2024:14582-1 | socat-1.8.0.2-1.1 on GA media | 2024-12-13T00:00:00Z | 2024-12-13T00:00:00Z |
| opensuse-su-2024:14581-1 | python312-3.12.8-1.1 on GA media | 2024-12-13T00:00:00Z | 2024-12-13T00:00:00Z |
| opensuse-su-2024:14580-1 | liboqs-devel-0.12.0-1.1 on GA media | 2024-12-13T00:00:00Z | 2024-12-13T00:00:00Z |
| opensuse-su-2024:14579-1 | gdk-pixbuf-loader-libheif-1.19.5-2.1 on GA media | 2024-12-13T00:00:00Z | 2024-12-13T00:00:00Z |
| opensuse-su-2024:14578-1 | gstreamer-plugins-good-1.24.10-2.1 on GA media | 2024-12-13T00:00:00Z | 2024-12-13T00:00:00Z |
| opensuse-su-2024:14577-1 | gstreamer-plugins-base-1.24.10-2.1 on GA media | 2024-12-13T00:00:00Z | 2024-12-13T00:00:00Z |
| opensuse-su-2024:14576-1 | gstreamer-1.24.10-2.1 on GA media | 2024-12-13T00:00:00Z | 2024-12-13T00:00:00Z |
| opensuse-su-2024:14575-1 | curl-8.11.1-1.1 on GA media | 2024-12-13T00:00:00Z | 2024-12-13T00:00:00Z |
| opensuse-su-2024:14574-1 | chromedriver-131.0.6778.139-1.1 on GA media | 2024-12-13T00:00:00Z | 2024-12-13T00:00:00Z |
| opensuse-su-2024:0406-1 | Security update for chromium | 2024-12-12T10:40:34Z | 2024-12-12T10:40:34Z |
| opensuse-su-2024:0405-1 | Security update for chromium | 2024-12-12T10:36:26Z | 2024-12-12T10:36:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-376 | Heap-buffer-overflow in ndpi_search_raknet | 2022-04-26T00:01:35.220458Z | 2022-04-26T00:01:35.220667Z |
| osv-2022-375 | Stack-use-after-return in std::__1::__function::__func<bool grk::WaveletReverse::decompress_partial_tile<i | 2022-04-26T00:00:52.868142Z | 2022-04-26T00:00:52.868349Z |
| osv-2022-371 | Segv on unknown address in jxl::N_AVX2::WriteToU8Stage::ProcessRow | 2022-04-25T00:00:23.683106Z | 2022-04-25T00:00:23.683365Z |
| osv-2022-368 | Heap-buffer-overflow in exif_get_long | 2022-04-23T00:01:48.707920Z | 2022-04-23T00:01:48.708304Z |
| osv-2022-367 | Segv on unknown address in jxl::N_SSE4::WriteToU8Stage::ProcessRow | 2022-04-23T00:01:38.671607Z | 2022-04-23T00:01:38.671886Z |
| osv-2022-361 | UNKNOWN READ in sc_pkcs15_decode_pubkey_ec | 2022-04-21T00:00:24.706566Z | 2022-04-21T00:00:24.706829Z |
| osv-2021-771 | Heap-use-after-free in dwg_free_TABLEGEOMETRY_private | 2021-05-18T00:00:05.875957Z | 2022-04-18T00:08:44.068985Z |
| osv-2022-354 | Segv on unknown address in gs_heap_free_object | 2022-04-17T00:01:44.034459Z | 2022-04-17T00:01:44.034686Z |
| osv-2022-349 | Heap-buffer-overflow in JS_CallInternal | 2022-04-16T00:00:12.324830Z | 2022-04-16T00:00:12.325106Z |
| osv-2020-1386 | Heap-buffer-overflow in parse_relocation_info | 2020-07-28T00:00:08.332887Z | 2022-04-15T00:08:37.592330Z |
| osv-2020-1519 | Index-out-of-bounds in DHT::hide_hots | 2020-07-28T00:00:36.268160Z | 2022-04-15T00:06:08.963961Z |
| osv-2020-1362 | Use-of-uninitialized-value in LibRaw::init_fuji_block | 2020-07-28T00:00:01.793422Z | 2022-04-15T00:05:54.082034Z |
| osv-2021-919 | UNKNOWN READ in v_FindFunction | 2021-07-05T00:01:12.283873Z | 2022-04-15T00:05:24.837855Z |
| osv-2021-141 | Use-of-uninitialized-value in H5G__traverse_real | 2021-01-13T21:56:17.197324Z | 2022-04-15T00:05:16.240664Z |
| osv-2020-810 | Use-of-uninitialized-value in pcap_filter_with_aux_data | 2020-07-14T05:37:43.627443Z | 2022-04-15T00:05:14.704159Z |
| osv-2021-500 | Heap-buffer-overflow in put_epel_8_fallback | 2021-03-06T00:01:09.514607Z | 2022-04-15T00:04:46.166358Z |
| osv-2022-345 | Stack-buffer-overflow in sc_hsm_list_files | 2022-04-15T00:01:47.875554Z | 2022-04-15T00:01:47.875889Z |
| osv-2020-837 | UNKNOWN WRITE in helper_wfe_arm | 2020-07-14T22:13:40.179651Z | 2022-04-14T06:45:57.434055Z |
| osv-2022-342 | Heap-buffer-overflow in sc_pkcs15init_delete_by_path | 2022-04-14T00:01:38.330194Z | 2022-04-14T00:01:38.330440Z |
| osv-2022-341 | Heap-buffer-overflow in krb_parse | 2022-04-14T00:01:37.890580Z | 2022-04-14T00:01:37.890823Z |
| osv-2022-339 | Heap-use-after-free in gc_trace | 2022-04-14T00:00:06.038155Z | 2022-04-14T00:00:06.038429Z |
| osv-2021-1670 | Dynamic-stack-buffer-overflow in zend_calc_live_ranges | 2021-12-12T00:00:10.869505Z | 2022-04-13T08:16:56.943887Z |
| osv-2020-1779 | Heap-use-after-free in zend_gc_addref | 2020-09-17T00:00:13.246764Z | 2022-04-13T07:12:28.838544Z |
| osv-2018-303 | UNKNOWN READ in _gcry_aes_cbc_enc | 2021-01-15T00:00:29.537688Z | 2022-04-13T04:20:11.137505Z |
| osv-2020-629 | Heap-buffer-overflow in bytestring_to_str | 2020-07-01T00:00:21.373324Z | 2022-04-13T04:14:54.501439Z |
| osv-2021-717 | Heap-use-after-free in real_param | 2021-05-02T00:00:44.749274Z | 2022-04-13T04:13:00.289724Z |
| osv-2020-1875 | Heap-use-after-free in dict_find_string | 2020-09-29T00:00:26.901998Z | 2022-04-13T04:12:40.578439Z |
| osv-2020-1876 | UNKNOWN READ in mem_mapped4_fill_rectangle | 2020-09-29T00:00:30.602171Z | 2022-04-13T04:06:39.561786Z |
| osv-2020-2017 | Heap-buffer-overflow in flb_msgpack_to_json | 2020-10-12T00:00:07.776885Z | 2022-04-13T03:39:52.717186Z |
| osv-2021-1437 | Heap-buffer-overflow in unpack_32bit | 2021-10-11T00:01:37.363287Z | 2022-04-13T03:38:15.105099Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tensorflow-2020-15197 | Denial of Service in Tensorflow | 2024-03-06T11:20:43.693Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15196 | Heap buffer overflow in Tensorflow | 2024-03-06T11:20:44.959Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15195 | Heap buffer overflow in Tensorflow | 2024-03-06T11:20:46.206Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15194 | Denial of Service in Tensorflow | 2024-03-06T11:20:47.450Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15193 | Memory corruption in Tensorflow | 2024-03-06T11:20:48.722Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15192 | Memory leak in Tensorflow | 2024-03-06T11:20:49.978Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15191 | Undefined behavior in Tensorflow | 2024-03-06T11:20:51.213Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15190 | Segfault in Tensorflow | 2024-03-06T11:20:52.431Z | 2025-05-20T10:02:07.006Z |
| bit-syncthing-2022-46165 | Cross-site Scripting (XSS) in Web GUI in syncthing | 2024-07-24T19:38:31.354Z | 2025-05-20T10:02:07.006Z |
| bit-syncthing-2021-21404 | Crash due to malformed relay protocol message | 2024-07-24T19:38:44.658Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-55633 | Apache Superset: SQLLab Improper readonly query validation allows unauthorized write access | 2025-02-05T07:24:52.298Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-53949 | Apache Superset: Lower privilege users are able to create Role when FAB_ADD_SECURITY_API is enabled | 2025-02-05T07:24:59.693Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-53948 | Apache Superset: Error verbosity exposes metadata in analytics databases | 2025-02-05T07:25:06.905Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-53947 | Apache Superset: Improper SQL authorisation, parse not checking for specific postgres functions | 2025-04-14T11:37:01.543Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-39887 | Apache Superset: Improper SQL authorisation, parse not checking for specific engine functions | 2025-02-05T07:25:23.689Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-34693 | Apache Superset: Server arbitrary file read | 2025-02-05T07:25:30.309Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-28148 | Apache Superset: Incorrect datasource authorization on explore REST API | 2025-02-05T07:25:37.993Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-27315 | Apache Superset: Improper error handling on alerts | 2025-02-05T07:25:46.001Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-26016 | Apache Superset: Improper authorization validation on dashboards and charts import | 2025-02-05T07:25:54.594Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-24779 | Apache Superset: Improper data authorization when creating a new dataset | 2025-02-05T07:26:02.294Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-24773 | Apache Superset: Improper validation of SQL statements allows for unauthorized access to data | 2025-02-05T07:26:09.909Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-24772 | Apache Superset: Improper Neutralisation of custom SQL on embedded context | 2025-02-05T07:26:17.412Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-23952 | Apache Superset: Allows for uncontrolled resource consumption via a ZIP bomb (version range fix for CVE-2023-46104) | 2025-02-05T07:26:25.704Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-49736 | Apache Superset: SQL Injection on where_in JINJA macro | 2025-02-05T07:26:33.003Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-49734 | Apache Superset: Privilege Escalation Vulnerability | 2025-02-05T07:26:41.202Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-49657 | Apache Superset: Stored XSS in Dashboard Title and Chart Title | 2025-02-05T07:26:48.212Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-46104 | Apache Superset: Allows for uncontrolled resource consumption via a ZIP bomb | 2025-02-05T07:26:56.804Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-43701 | Apache Superset: Stored XSS on API endpoint | 2025-02-05T07:27:04.308Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-42505 | Apache Superset: Sensitive information disclosure on db connection details | 2025-02-05T07:27:12.602Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2023-42504 | Apache Superset: Lack of rate limiting allows for possible denial of service | 2025-02-05T07:27:18.806Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202404-0244 | A vulnerability was found in Tenda FH1206 1.2.0.8(8155) and classified as critical. This … | 2024-06-05T23:24:25.973000Z |
| var-202404-0181 | A vulnerability has been found in Tenda W30E 1.0.1.25(633) and classified as critical. Th… | 2024-06-05T23:24:25.988000Z |
| var-201708-1539 | An issue was discovered in SMA Solar Technology products. The SMAdata2+ communication pro… | 2024-06-05T23:24:01.267000Z |
| var-202404-0329 | A vulnerability was found in Tenda F1202 1.2.0.20(408). It has been rated as critical. Th… | 2024-06-05T23:23:48.882000Z |
| var-202404-0308 | A vulnerability was found in Tenda W15E 15.11.0.14 and classified as critical. This issue… | 2024-06-05T23:23:48.897000Z |
| var-202311-0698 | An improper access control vulnerability exists in RT-AC87U all versions. An attacker may… | 2024-06-05T23:22:49.183000Z |
| var-202404-0384 | A vulnerability was found in Tenda AC8 16.03.34.09. It has been rated as critical. This i… | 2024-06-05T23:22:48.547000Z |
| var-202404-0324 | A vulnerability, which was classified as critical, was found in Tenda W15E 15.11.0.14. Th… | 2024-06-05T23:22:08.885000Z |
| var-202108-0937 | Null Pointer Dereference vulnerability in D-Link DIR-825 2.10b02, which could let a remot… | 2024-06-05T23:20:20.327000Z |
| var-202404-2158 | A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been classified as critical. … | 2024-06-05T23:20:07.704000Z |
| var-202404-2116 | A vulnerability was found in Tenda A301 15.13.08.12_multi_TDE01. It has been rated as cri… | 2024-06-05T23:20:07.720000Z |
| var-202404-2095 | A vulnerability classified as critical has been found in Tenda W9 1.0.0.7(4456). Affected… | 2024-06-05T23:20:07.736000Z |
| var-201708-1538 | An issue was discovered in SMA Solar Technology products. Sniffed passwords from SMAdata2… | 2024-06-05T23:18:07.639000Z |
| var-202405-0137 | A vulnerability, which was classified as critical, has been found in Tenda i21 1.0.0.14(4… | 2024-06-05T23:17:51.162000Z |
| var-202404-0070 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was fo… | 2024-06-05T23:17:51.328000Z |
| var-202404-0069 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, h… | 2024-06-05T23:17:51.346000Z |
| var-201912-1320 | The Lever PDF Embedder plugin 4.4 for WordPress does not block the distribution of polygl… | 2024-06-05T23:15:30.442000Z |
| var-202404-2111 | A vulnerability was found in Tenda i21 1.0.0.14(4656) and classified as critical. This is… | 2024-06-05T23:15:13.055000Z |
| var-202404-2090 | A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been rated as critical. This … | 2024-06-05T23:15:13.071000Z |
| var-202404-0290 | A vulnerability was found in Tenda TX9 22.03.02.10. It has been rated as critical. Affect… | 2024-06-05T23:15:13.147000Z |
| var-202404-0164 | A vulnerability was found in Tenda W20E 15.11.0.6. It has been declared as critical. This… | 2024-06-05T23:15:13.180000Z |
| var-202309-0942 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was fo… | 2024-06-05T23:11:01.008000Z |
| var-202309-0932 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was fo… | 2024-06-05T23:11:00.930000Z |
| var-202404-2106 | A vulnerability classified as problematic was found in Netgear DG834Gv5 1.6.01.34. This v… | 2024-06-05T23:10:59.337000Z |
| var-200110-0258 | OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a de… | 2024-06-05T22:57:21.246000Z |
| var-200609-1034 | The Security Framework in Apple Mac OS X 10.3.x up to 10.3.9 does not properly prioritize… | 2024-06-05T21:58:52.479000Z |
| var-202307-2004 | It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vuln… | 2024-06-02T23:03:59.433000Z |
| var-202305-2074 | A CWE-319: Cleartext transmission of sensitive information vulnerability exists that cou… | 2024-06-02T23:03:59.712000Z |
| var-202405-3772 | EG2000CE is an intelligent router. EG2000CE of Beijing Xingwang Ruijie Network Technolog… | 2024-06-02T23:03:57.240000Z |
| var-202405-2040 | ER5100G2 is a new generation enterprise-class Gigabit wired router. H3C ER5100G2 system … | 2024-06-02T23:01:42.303000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000057 | Multiple shiro8 Co., Ltd. freearea_ addition_plugins for EC-CUBE vulnerable to cross-site scripting | 2016-04-26T14:18+09:00 | 2016-05-25T17:48+09:00 |
| jvndb-2015-000101 | PHP for Windows vulnerable to OS command injection | 2015-07-17T14:44+09:00 | 2016-05-19T17:43+09:00 |
| jvndb-2016-000048 | EC-CUBE plugin "Social-button Plugin Premium" and "Social-button Plugin" vulnerable to cross-site scripting | 2016-04-08T12:31+09:00 | 2016-05-06T16:13+09:00 |
| jvndb-2016-000038 | ActiveX control for EVA Animator vulnerable to buffer overflow | 2016-04-04T15:30+09:00 | 2016-04-20T09:38+09:00 |
| jvndb-2016-000035 | Aterm WF800HP vulnerable to cross-site request forgery | 2016-03-30T14:49+09:00 | 2016-04-18T15:42+09:00 |
| jvndb-2016-000036 | Aterm WG300HP vulnerable to cross-site request forgery | 2016-03-30T14:49+09:00 | 2016-04-18T15:41+09:00 |
| jvndb-2016-000045 | baserCMS plugin "Casebook Plugin" vulnerable to cross-site request forgery | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000044 | baserCMS plugin "Casebook Plugin" vulnerable to cross-site scripting | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000043 | baserCMS plugin "Menubook Plugin" vulnerable to cross-site request forgery | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000042 | baserCMS plugin "Menubook Plugin" vulnerable to cross-site scripting | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000041 | baserCMS plugin "Recruit Plugin" vulnerable to cross-site request forgery | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000040 | baserCMS plugin "Recruit Plugin" vulnerable to cross-site scripting | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000039 | AQUOS Photo Player HN-PP150 vulnerable to cross-site request forgery | 2016-04-04T15:30+09:00 | 2016-04-07T12:05+09:00 |
| jvndb-2016-000037 | WisePoint contains issue in preventing clickjacking attacks | 2016-04-04T15:30+09:00 | 2016-04-07T12:05+09:00 |
| jvndb-2016-001559 | Information Disclosure Vulnerability in Hitachi Compute Systems Manager | 2016-03-07T17:00+09:00 | 2016-03-31T17:50+09:00 |
| jvndb-2016-000034 | WordPress plugin "WP Favorite Posts" vulnerable to cross-site scripting | 2016-03-24T12:28+09:00 | 2016-03-29T15:40+09:00 |
| jvndb-2016-000015 | EXPRESSCLUSTER X vulnerable to directory traversal | 2016-01-29T13:45+09:00 | 2016-03-16T14:24+09:00 |
| jvndb-2016-000032 | Multiple Corega wireless LAN routers vulnerable to cross-site request forgery | 2016-03-02T14:52+09:00 | 2016-03-16T13:46+09:00 |
| jvndb-2016-000006 | Multiple Buffalo network devices vulnerable to cross-site scripting | 2016-01-22T14:36+09:00 | 2016-03-10T17:53+09:00 |
| jvndb-2016-000005 | Multiple Buffalo network devices vulnerable to cross-site request forgery | 2016-01-22T14:36+09:00 | 2016-03-10T17:53+09:00 |
| jvndb-2016-000029 | LINE for Windows and LINE for Mac OS vulnerable to denial-of-service (DoS) | 2016-02-19T14:43+09:00 | 2016-03-10T17:39+09:00 |
| jvndb-2016-000030 | baserCMS vulnerable to OS command injection | 2016-02-19T14:39+09:00 | 2016-03-07T15:51+09:00 |
| jvndb-2016-000017 | JOB-CUBE vulnerable to cross-site scripting | 2016-01-29T14:06+09:00 | 2016-03-04T17:47+09:00 |
| jvndb-2016-000027 | EC-CUBE plugin "Help plug-in" vulnerable to SQL injection | 2016-02-19T14:42+09:00 | 2016-03-03T17:51+09:00 |
| jvndb-2014-005987 | Multiple Vulnerabilities in JP1/Cm2/Network Node Manager i | 2014-12-16T17:31+09:00 | 2016-02-26T17:52+09:00 |
| jvndb-2014-005986 | Multiple buffer overflows in Hitachi JP1/Cm2/Network Node Manager i | 2014-12-16T17:30+09:00 | 2016-02-26T17:32+09:00 |
| jvndb-2016-000031 | Log-Chat vulnerable to cross-site scripting | 2016-02-22T14:56+09:00 | 2016-02-25T15:10+09:00 |
| jvndb-2016-000025 | Cybozu Office vulnerable to open redirect | 2016-02-15T16:20+09:00 | 2016-02-23T16:32+09:00 |
| jvndb-2016-000024 | Cybozu Office vulnerable to cross-site request forgery | 2016-02-15T16:20+09:00 | 2016-02-23T16:32+09:00 |
| jvndb-2016-000023 | Cybozu Office access restriction bypass vulnerability | 2016-02-15T15:45+09:00 | 2016-02-23T16:32+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:02942-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) | 2025-08-21T09:33:31Z | 2025-08-21T09:33:31Z |
| suse-su-2025:20598-1 | Security update for libsoup | 2025-08-21T09:33:10Z | 2025-08-21T09:33:10Z |
| suse-su-2025:02938-1 | Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6) | 2025-08-21T09:04:12Z | 2025-08-21T09:04:12Z |
| suse-su-2025:02937-1 | Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) | 2025-08-21T09:04:04Z | 2025-08-21T09:04:04Z |
| suse-su-2025:02936-1 | Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP4) | 2025-08-21T09:03:55Z | 2025-08-21T09:03:55Z |
| suse-su-2025:20566-1 | Security update for net-tools | 2025-08-21T08:01:27Z | 2025-08-21T08:01:27Z |
| suse-su-2025:20565-1 | Security update for docker | 2025-08-21T08:01:27Z | 2025-08-21T08:01:27Z |
| suse-su-2025:20564-1 | Security update for libxml2 | 2025-08-21T08:01:26Z | 2025-08-21T08:01:26Z |
| suse-su-2025:02934-1 | Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6) | 2025-08-20T21:33:52Z | 2025-08-20T21:33:52Z |
| suse-su-2025:02933-1 | Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3) | 2025-08-20T20:03:42Z | 2025-08-20T20:03:42Z |
| suse-su-2025:02932-1 | Security update for the Linux Kernel (Live Patch 55 for SLE 15 SP3) | 2025-08-20T18:03:36Z | 2025-08-20T18:03:36Z |
| suse-su-2025:02930-1 | Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) | 2025-08-20T12:03:43Z | 2025-08-20T12:03:43Z |
| suse-su-2025:20563-1 | Security update for gnutls | 2025-08-20T11:55:17Z | 2025-08-20T11:55:17Z |
| suse-su-2025:20562-1 | Security update for dpkg | 2025-08-20T11:40:21Z | 2025-08-20T11:40:21Z |
| suse-su-2025:20560-1 | Security update for libarchive | 2025-08-20T11:38:12Z | 2025-08-20T11:38:12Z |
| suse-su-2025:20561-1 | Security update for sqlite3 | 2025-08-20T11:36:54Z | 2025-08-20T11:36:54Z |
| suse-su-2025:20559-1 | Security update for polkit | 2025-08-20T11:34:24Z | 2025-08-20T11:34:24Z |
| suse-su-2025:02926-1 | Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6) | 2025-08-20T10:36:24Z | 2025-08-20T10:36:24Z |
| suse-su-2025:02718-2 | Security update for libarchive | 2025-08-20T09:46:47Z | 2025-08-20T09:46:47Z |
| suse-su-2025:02924-1 | Security update for go1.25 | 2025-08-20T07:34:44Z | 2025-08-20T07:34:44Z |
| suse-su-2025:02923-1 | Security update for the Linux Kernel | 2025-08-20T07:24:58Z | 2025-08-20T07:24:58Z |
| suse-su-2025:02922-1 | Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6) | 2025-08-19T19:33:28Z | 2025-08-19T19:33:28Z |
| suse-su-2025:02918-1 | Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6) | 2025-08-19T14:33:37Z | 2025-08-19T14:33:37Z |
| suse-su-2025:02919-1 | Security update for gstreamer-0_10-plugins-base | 2025-08-19T13:52:42Z | 2025-08-19T13:52:42Z |
| suse-su-2025:02917-1 | Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3) | 2025-08-19T13:04:09Z | 2025-08-19T13:04:09Z |
| suse-su-2025:02915-1 | Security update for jq | 2025-08-19T12:56:53Z | 2025-08-19T12:56:53Z |
| suse-su-2025:02914-1 | Security update for docker | 2025-08-19T12:54:57Z | 2025-08-19T12:54:57Z |
| suse-su-2025:02913-1 | Security update for docker | 2025-08-19T12:52:43Z | 2025-08-19T12:52:43Z |
| suse-su-2025:02911-1 | Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5) | 2025-08-19T12:33:37Z | 2025-08-19T12:33:37Z |
| suse-su-2025:02909-1 | Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | 2025-08-19T12:03:45Z | 2025-08-19T12:03:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-29736 | Online Birth Certificate System between-dates-report.php文件SQL注入漏洞 | 2025-05-13 | 2025-12-02 |
| cnvd-2025-29735 | Online Birth Certificate System users-applications.php文件SQL注入漏洞 | 2025-06-06 | 2025-12-02 |
| cnvd-2025-29734 | Online Birth Certificate System all-applications.php文件SQL注入漏洞 | 2025-06-06 | 2025-12-02 |
| cnvd-2025-29733 | Medical Card Generation System HTML注入漏洞 | 2025-06-06 | 2025-12-02 |
| cnvd-2025-29732 | Notice Board System category.php文件SQL注入漏洞 | 2025-05-07 | 2025-12-02 |
| cnvd-2025-29731 | Notice Board System bwdates-reports-details.php文件SQL注入漏洞 | 2025-05-13 | 2025-12-02 |
| cnvd-2025-29730 | Notice Board System login.php文件SQL注入漏洞 | 2025-05-22 | 2025-12-02 |
| cnvd-2025-29729 | Notice Board System search-notice.php文件SQL注入漏洞 | 2025-06-11 | 2025-12-02 |
| cnvd-2025-29728 | Notice Board System forgot-password.php文件SQL注入漏洞 | 2025-06-11 | 2025-12-02 |
| cnvd-2025-29727 | Notice Board System admin-profile.php文件SQL注入漏洞 | 2025-06-11 | 2025-12-02 |
| cnvd-2025-29726 | Notice Board System manage-notices.php文件跨站脚本漏洞 | 2025-06-27 | 2025-12-02 |
| cnvd-2025-29725 | TOTOLINK A950RG硬编码漏洞 | 2022-08-30 | 2025-12-02 |
| cnvd-2025-29724 | TOTOLINK A720R硬编码漏洞 | 2022-08-30 | 2025-12-02 |
| cnvd-2025-29723 | TOTOLINK A720R命令注入漏洞(CNVD-2025-29723) | 2022-08-30 | 2025-12-02 |
| cnvd-2025-29722 | TOTOLINK A720R代码执行漏洞(CNVD-2025-29722) | 2022-09-19 | 2025-12-02 |
| cnvd-2025-29721 | TOTOLINK A720R代码执行漏洞 | 2022-09-19 | 2025-12-02 |
| cnvd-2025-29720 | TOTOLINK A720R访问控制错误漏洞 | 2023-02-21 | 2025-12-02 |
| cnvd-2025-29719 | TOTOLINK X2000R跨站脚本漏洞(CNVD-2025-29719) | 2024-04-15 | 2025-12-02 |
| cnvd-2025-29718 | TOTOLINK X2000R跨站脚本漏洞 | 2024-05-22 | 2025-12-02 |
| cnvd-2025-29717 | TOTOLINK A7000R urldecode函数堆栈缓冲区溢出漏洞 | 2025-11-14 | 2025-12-02 |
| cnvd-2025-29716 | TOTOLINK A7000R堆栈缓冲区溢出漏洞 | 2025-11-14 | 2025-12-02 |
| cnvd-2025-29715 | TOTOLINK LR1200GB命令注入漏洞 | 2025-11-18 | 2025-12-02 |
| cnvd-2025-29714 | TOTOLINK A950RG命令注入漏洞 | 2025-11-18 | 2025-12-02 |
| cnvd-2025-29713 | TOTOLINK A950RG缓冲区溢出漏洞 | 2025-11-18 | 2025-12-02 |
| cnvd-2025-29712 | TOTOLINK A720R堆栈缓冲区溢出漏洞 | 2025-11-18 | 2025-12-02 |
| cnvd-2025-29711 | TOTOLINK A720R命令注入漏洞(CNVD-2025-29711) | 2025-11-18 | 2025-12-02 |
| cnvd-2025-29710 | TOTOLINK A720R命令注入漏洞(CNVD-2025-29710) | 2025-11-18 | 2025-12-02 |
| cnvd-2025-29709 | Google Android信息泄露漏洞(CNVD-2025-29709) | 2025-09-08 | 2025-12-02 |
| cnvd-2025-29708 | Google Android拒绝服务漏洞(CNVD-2025-29708) | 2025-09-08 | 2025-12-02 |
| cnvd-2025-29707 | Google Android权限提升漏洞(CNVD-2025-29707) | 2025-09-08 | 2025-12-02 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0434 | Multiples vulnérabilités dans Node.js | 2025-05-21T00:00:00.000000 | 2025-05-21T00:00:00.000000 |
| certfr-2025-avi-0433 | Multiples vulnérabilités dans Adobe ColdFusion | 2025-05-21T00:00:00.000000 | 2025-05-21T00:00:00.000000 |
| certfr-2025-avi-0432 | Vulnérabilité dans Schneider Electric EcoStruxure Power Build Rapsody | 2025-05-21T00:00:00.000000 | 2025-05-21T00:00:00.000000 |
| certfr-2025-avi-0431 | Vulnérabilité dans Mitel OpenScapeXpressions | 2025-05-21T00:00:00.000000 | 2025-05-21T00:00:00.000000 |
| certfr-2025-avi-0430 | Multiples vulnérabilités dans les produits VMware | 2025-05-21T00:00:00.000000 | 2025-05-21T00:00:00.000000 |
| CERTFR-2025-AVI-0435 | Multiples vulnérabilités dans les produits Atlassian | 2025-05-21T00:00:00.000000 | 2025-05-21T00:00:00.000000 |
| CERTFR-2025-AVI-0434 | Multiples vulnérabilités dans Node.js | 2025-05-21T00:00:00.000000 | 2025-05-21T00:00:00.000000 |
| CERTFR-2025-AVI-0433 | Multiples vulnérabilités dans Adobe ColdFusion | 2025-05-21T00:00:00.000000 | 2025-05-21T00:00:00.000000 |
| CERTFR-2025-AVI-0432 | Vulnérabilité dans Schneider Electric EcoStruxure Power Build Rapsody | 2025-05-21T00:00:00.000000 | 2025-05-21T00:00:00.000000 |
| CERTFR-2025-AVI-0431 | Vulnérabilité dans Mitel OpenScapeXpressions | 2025-05-21T00:00:00.000000 | 2025-05-21T00:00:00.000000 |
| CERTFR-2025-AVI-0430 | Multiples vulnérabilités dans les produits VMware | 2025-05-21T00:00:00.000000 | 2025-05-21T00:00:00.000000 |
| certfr-2025-avi-0429 | Multiples vulnérabilités dans Typo3 | 2025-05-20T00:00:00.000000 | 2025-05-20T00:00:00.000000 |
| certfr-2025-avi-0428 | Multiples vulnérabilités dans VMware Cloud Foundation | 2025-05-20T00:00:00.000000 | 2025-05-20T00:00:00.000000 |
| certfr-2025-avi-0427 | Vulnérabilité dans Spring Security | 2025-05-20T00:00:00.000000 | 2025-05-20T00:00:00.000000 |
| CERTFR-2025-AVI-0429 | Multiples vulnérabilités dans Typo3 | 2025-05-20T00:00:00.000000 | 2025-05-20T00:00:00.000000 |
| CERTFR-2025-AVI-0428 | Multiples vulnérabilités dans VMware Cloud Foundation | 2025-05-20T00:00:00.000000 | 2025-05-20T00:00:00.000000 |
| CERTFR-2025-AVI-0427 | Vulnérabilité dans Spring Security | 2025-05-20T00:00:00.000000 | 2025-05-20T00:00:00.000000 |
| certfr-2025-avi-0426 | Vulnérabilité dans Juniper Networks Junos OS | 2025-05-19T00:00:00.000000 | 2025-05-19T00:00:00.000000 |
| certfr-2025-avi-0425 | Vulnérabilité dans les produits Synology | 2025-05-19T00:00:00.000000 | 2025-05-19T00:00:00.000000 |
| certfr-2025-avi-0424 | Multiples vulnérabilités dans les produits Mozilla | 2025-05-19T00:00:00.000000 | 2025-05-19T00:00:00.000000 |
| certfr-2025-avi-0423 | Multiples vulnérabilités dans les produits Netgate | 2025-05-19T00:00:00.000000 | 2025-05-19T00:00:00.000000 |
| certfr-2025-avi-0350 | Vulnérabilité dans SAP NetWeaver | 2025-04-25T00:00:00.000000 | 2025-05-19T00:00:00.000000 |
| CERTFR-2025-AVI-0426 | Vulnérabilité dans Juniper Networks Junos OS | 2025-05-19T00:00:00.000000 | 2025-05-19T00:00:00.000000 |
| CERTFR-2025-AVI-0425 | Vulnérabilité dans les produits Synology | 2025-05-19T00:00:00.000000 | 2025-05-19T00:00:00.000000 |
| CERTFR-2025-AVI-0424 | Multiples vulnérabilités dans les produits Mozilla | 2025-05-19T00:00:00.000000 | 2025-05-19T00:00:00.000000 |
| CERTFR-2025-AVI-0423 | Multiples vulnérabilités dans les produits Netgate | 2025-05-19T00:00:00.000000 | 2025-05-19T00:00:00.000000 |
| CERTFR-2025-AVI-0350 | Vulnérabilité dans SAP NetWeaver | 2025-04-25T00:00:00.000000 | 2025-05-19T00:00:00.000000 |
| certfr-2025-avi-0422 | Multiples vulnérabilités dans IBM QRadar SIEM | 2025-05-16T00:00:00.000000 | 2025-05-16T00:00:00.000000 |
| certfr-2025-avi-0421 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-05-16T00:00:00.000000 | 2025-05-16T00:00:00.000000 |
| certfr-2025-avi-0420 | Multiples vulnérabilités dans les produits Nextcloud | 2025-05-16T00:00:00.000000 | 2025-05-16T00:00:00.000000 |