Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-53779 |
7.2 (3.1)
|
Windows Kerberos Elevation of Privilege Vulnerability |
Microsoft |
Windows Server 2025 |
2025-08-12T17:10:40.473Z | 2026-02-26T17:49:05.758Z |
| CVE-2025-42958 |
9.1 (3.1)
|
Missing Authentication check in SAP NetWeaver |
SAP_SE |
SAP NetWeaver |
2025-09-09T02:11:46.733Z | 2026-02-26T17:49:05.587Z |
| CVE-2025-42944 |
10 (3.1)
|
Insecure Deserialization vulnerability in SAP Netweave… |
SAP_SE |
SAP Netweaver (RMI-P4) |
2025-09-09T02:11:39.754Z | 2026-02-26T17:49:05.927Z |
| CVE-2025-9872 |
8.8 (3.1)
|
Insufficient filename validation in Ivanti Endpoi… |
Ivanti |
Endpoint Manager |
2025-09-09T15:11:13.957Z | 2026-02-26T17:49:04.223Z |
| CVE-2025-9712 |
8.8 (3.1)
|
Insufficient filename validation in Ivanti Endpoi… |
Ivanti |
Endpoint Manager |
2025-09-09T15:09:05.375Z | 2026-02-26T17:49:04.952Z |
| CVE-2025-53789 |
7.8 (3.1)
|
Windows StateRepository API Server file Elevation of P… |
Microsoft |
Windows 10 Version 1507 |
2025-08-12T17:10:42.931Z | 2026-02-26T17:49:04.407Z |
| CVE-2025-48807 |
6.7 (3.1)
|
Windows Hyper-V Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-08-12T17:10:44.021Z | 2026-02-26T17:49:04.059Z |
| CVE-2025-55147 |
8.8 (3.1)
|
CSRF in Ivanti Connect Secure before 22.7R2.9 or … |
Ivanti |
Connect Secure |
2025-09-09T15:32:25.940Z | 2026-02-26T17:49:03.552Z |
| CVE-2025-55145 |
8.9 (3.1)
|
Missing authorization in Ivanti Connect Secure be… |
Ivanti |
Connect Secure 22.7R2.9 |
2025-09-09T15:22:05.340Z | 2026-02-26T17:49:03.893Z |
| CVE-2025-49707 |
7.9 (3.1)
|
Azure Virtual Machines Spoofing Vulnerability |
Microsoft |
DCadsv5-series Azure VM |
2025-08-12T17:10:47.689Z | 2026-02-26T17:49:03.728Z |
| CVE-2025-20044 |
4.1 (3.1)
|
Improper locking for some Intel(R) TDX Module fir… |
n/a |
Intel(R) TDX Module firmware |
2025-08-12T17:29:04.317Z | 2026-02-26T17:49:03.287Z |
| CVE-2025-55142 |
8.8 (3.1)
|
Missing authorization in Ivanti Connect Secure be… |
Ivanti |
Connect Secure |
2025-09-09T15:49:20.192Z | 2026-02-26T17:49:02.701Z |
| CVE-2025-55141 |
8.8 (3.1)
|
Missing authorization in Ivanti Connect Secure be… |
Ivanti |
Connect Secure |
2025-09-09T15:45:52.822Z | 2026-02-26T17:49:02.944Z |
| CVE-2025-49555 |
8.1 (3.1)
|
Adobe Commerce | Cross-Site Request Forgery (CSRF) (CWE-352) |
Adobe |
Adobe Commerce |
2025-08-12T17:55:05.453Z | 2026-02-26T17:49:02.275Z |
| CVE-2025-54252 |
5.4 (3.1)
|
Adobe Experience Manager | Cross-site Scripting (Store… |
Adobe |
Adobe Experience Manager |
2025-09-09T16:36:27.649Z | 2026-02-26T17:49:01.878Z |
| CVE-2025-54106 |
8.8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Remot… |
Microsoft |
Windows Server 2012 R2 |
2025-09-09T17:00:49.707Z | 2026-02-26T17:49:01.010Z |
| CVE-2025-54102 |
7.8 (3.1)
|
Windows Connected Devices Platform Service Elevation o… |
Microsoft |
Windows 10 Version 1607 |
2025-09-09T17:00:49.048Z | 2026-02-26T17:49:01.409Z |
| CVE-2025-49559 |
5.3 (3.1)
|
Adobe Commerce | Improper Limitation of a Pathname to … |
Adobe |
Adobe Commerce |
2025-08-12T17:55:06.460Z | 2026-02-26T17:49:01.611Z |
| CVE-2025-49558 |
5.9 (3.1)
|
Adobe Commerce | Time-of-check Time-of-use (TOCTOU) Ra… |
Adobe |
Adobe Commerce |
2025-08-12T17:55:08.951Z | 2026-02-26T17:49:01.174Z |
| CVE-2025-54897 |
8.8 (3.1)
|
Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2025-09-09T17:00:53.664Z | 2026-02-26T17:49:00.263Z |
| CVE-2025-54896 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-09-09T17:00:53.019Z | 2026-02-26T17:49:00.615Z |
| CVE-2025-49557 |
8.7 (3.1)
|
Adobe Commerce | Cross-site Scripting (Stored XSS) (CWE-79) |
Adobe |
Adobe Commerce |
2025-08-12T17:55:09.849Z | 2026-02-26T17:49:00.825Z |
| CVE-2025-54899 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-09-09T17:00:54.798Z | 2026-02-26T17:48:59.223Z |
| CVE-2025-54898 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-09-09T17:00:54.212Z | 2026-02-26T17:48:59.769Z |
| CVE-2025-49813 |
6.6 (3.1)
|
An improper neutralization of special elements us… |
Fortinet |
FortiADC |
2025-08-12T18:59:19.468Z | 2026-02-26T17:48:59.044Z |
| CVE-2025-32766 |
6.3 (3.1)
|
A stack-based buffer overflow vulnerability [CWE-… |
Fortinet |
FortiWeb |
2025-08-12T18:59:16.692Z | 2026-02-26T17:48:59.410Z |
| CVE-2025-25256 |
9.8 (3.1)
|
An improper neutralization of special elements us… |
Fortinet |
FortiSIEM |
2025-08-12T18:59:14.863Z | 2026-02-26T17:48:59.921Z |
| CVE-2025-54906 |
7.8 (3.1)
|
Microsoft Office Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-09-09T17:00:57.894Z | 2026-02-26T17:48:58.388Z |
| CVE-2025-54904 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-09-09T17:00:56.615Z | 2026-02-26T17:48:58.533Z |
| CVE-2025-54902 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-09-09T17:00:55.356Z | 2026-02-26T17:48:58.838Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-14856 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
y_project RuoYi getnames code injection |
y_project |
RuoYi |
2025-12-18T01:32:07.806Z | 2026-02-24T05:53:39.348Z |
| CVE-2025-14834 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Simple Stock System checkuser.php sql in… |
code-projects |
Simple Stock System |
2025-12-17T23:02:05.789Z | 2026-02-24T05:52:43.393Z |
| CVE-2025-14694 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
ketr JEPaaS readAllPostil sql injection |
ketr |
JEPaaS |
2025-12-15T00:32:06.939Z | 2026-02-24T05:52:18.612Z |
| CVE-2025-14674 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
aizuda snail-job QLExpressEngine.java QLExpressEngine.… |
aizuda |
snail-job |
2025-12-14T18:02:14.475Z | 2026-02-24T05:52:05.136Z |
| CVE-2025-14673 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
gmg137 snap7-rs client.rs as_ct_write heap-based overflow |
gmg137 |
snap7-rs |
2025-12-14T17:32:10.600Z | 2026-02-24T05:51:39.225Z |
| CVE-2025-14672 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
gmg137 snap7-rs s7_micro_client.cpp opWriteArea heap-b… |
gmg137 |
snap7-rs |
2025-12-14T17:02:10.962Z | 2026-02-24T05:51:18.746Z |
| CVE-2025-14668 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
campcodes Advanced Online Examination System loginExe.… |
campcodes |
Advanced Online Examination System |
2025-12-14T16:32:07.839Z | 2026-02-24T05:50:59.131Z |
| CVE-2025-14665 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Tenda WH450 HTTP Request DhcpListClient stack-based overflow |
Tenda |
WH450 |
2025-12-14T15:02:09.088Z | 2026-02-24T05:50:47.189Z |
| CVE-2025-14656 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC20 openSchedWifi httpd buffer overflow |
Tenda |
AC20 |
2025-12-14T11:02:07.310Z | 2026-02-24T05:50:18.678Z |
| CVE-2025-14655 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC20 httpd SetSysAutoRebbotCfg formSetRebootTime… |
Tenda |
AC20 |
2025-12-14T10:32:08.489Z | 2026-02-24T05:50:00.913Z |
| CVE-2025-14636 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
Tenda AX9 httpd image_check weak hash |
Tenda |
AX9 |
2025-12-13T19:02:08.025Z | 2026-02-24T05:49:20.379Z |
| CVE-2025-14589 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Prison Management System search.php sql … |
code-projects |
Prison Management System |
2025-12-13T10:32:07.091Z | 2026-02-24T05:48:41.011Z |
| CVE-2025-14583 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
campcodes Online Student Enrollment System register.ph… |
campcodes |
Online Student Enrollment System |
2025-12-12T22:02:09.974Z | 2026-02-24T05:48:12.459Z |
| CVE-2025-14582 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
campcodes Online Student Enrollment System index.php u… |
campcodes |
Online Student Enrollment System |
2025-12-12T22:02:07.303Z | 2026-02-24T05:48:00.344Z |
| CVE-2025-14566 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
kidaze CourseSelectionSystem reg.php sql injection |
kidaze |
CourseSelectionSystem |
2025-12-12T15:32:08.420Z | 2026-02-24T05:47:11.578Z |
| CVE-2025-14565 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
kidaze CourseSelectionSystem login1.php sql injection |
kidaze |
CourseSelectionSystem |
2025-12-12T15:32:06.269Z | 2026-02-24T05:46:58.180Z |
| CVE-2025-14527 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
projectworlds Advanced Library Management System view_… |
projectworlds |
Advanced Library Management System |
2025-12-11T17:02:09.729Z | 2026-02-24T05:46:32.987Z |
| CVE-2025-14526 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda CH22 L7Im frmL7ImForm buffer overflow |
Tenda |
CH22 |
2025-12-11T16:32:09.328Z | 2026-02-24T05:46:21.260Z |
| CVE-2025-14518 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
PowerJob Network Request PingPongUtils.java checkConne… |
n/a |
PowerJob |
2025-12-11T15:02:08.153Z | 2026-02-24T05:46:06.690Z |
| CVE-2025-14276 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
Ilevia EVE X1 Server leaf_search.php command injection |
Ilevia |
EVE X1 Server |
2025-12-08T21:32:08.167Z | 2026-02-24T05:44:58.788Z |
| CVE-2025-14219 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Campcodes Retro Basketball Shoes Online Store admin_ru… |
Campcodes |
Retro Basketball Shoes Online Store |
2025-12-08T06:02:07.585Z | 2026-02-24T05:44:07.983Z |
| CVE-2025-14212 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
projectworlds Advanced Library Management System membe… |
projectworlds |
Advanced Library Management System |
2025-12-08T03:02:07.359Z | 2026-02-24T05:43:55.095Z |
| CVE-2025-14211 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
projectworlds Advanced Library Management System delet… |
projectworlds |
Advanced Library Management System |
2025-12-08T02:32:06.385Z | 2026-02-24T05:43:41.688Z |
| CVE-2025-14209 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Campcodes School File Management System update_query.p… |
Campcodes |
School File Management System |
2025-12-08T01:32:07.017Z | 2026-02-24T05:43:17.750Z |
| CVE-2025-14195 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Employee Profile Management System add_f… |
code-projects |
Employee Profile Management System |
2025-12-07T15:02:05.771Z | 2026-02-24T05:42:38.842Z |
| CVE-2025-14193 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Employee Profile Management System view_… |
code-projects |
Employee Profile Management System |
2025-12-07T14:02:05.879Z | 2026-02-24T05:42:12.330Z |
| CVE-2025-14012 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
JIZHICMS Batch Delete Comments deleteAll.html delete s… |
n/a |
JIZHICMS |
2025-12-04T17:32:08.510Z | 2026-02-24T05:40:25.562Z |
| CVE-2025-14011 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
JIZHICMS Add Display Name Field addcomment.html commen… |
n/a |
JIZHICMS |
2025-12-04T17:32:06.179Z | 2026-02-24T05:40:11.562Z |
| CVE-2025-14005 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
dayrui XunRuiCMS Add Display Name Field admind45f74adb… |
dayrui |
XunRuiCMS |
2025-12-04T13:32:08.601Z | 2026-02-24T05:39:20.960Z |
| CVE-2025-14004 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
dayrui XunRuiCMS Email Setting admind45f74adbd95.php s… |
dayrui |
XunRuiCMS |
2025-12-04T13:32:06.141Z | 2026-02-24T05:39:08.429Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-14694 | A vulnerability was found in ketr JEPaaS up to 7.2.8. This impacts the function readAllPostil of th… | 2025-12-15T01:15:38.127 | 2026-02-24T06:16:26.077 |
| fkie_cve-2025-14674 | A vulnerability was found in aizuda snail-job up to 1.6.0. Affected by this vulnerability is the fu… | 2025-12-14T18:15:43.977 | 2026-02-24T06:16:25.897 |
| fkie_cve-2025-14673 | A vulnerability has been found in gmg137 snap7-rs up to 1.142.1. Affected is the function snap7_rs:… | 2025-12-14T18:15:43.783 | 2026-02-24T06:16:25.723 |
| fkie_cve-2025-14672 | A flaw has been found in gmg137 snap7-rs up to 1.142.1. This impacts the function TSnap7MicroClient… | 2025-12-14T17:15:39.980 | 2026-02-24T06:16:25.537 |
| fkie_cve-2025-14668 | A vulnerability was detected in campcodes Advanced Online Examination System 1.0. This affects an u… | 2025-12-14T17:15:39.157 | 2026-02-24T06:16:25.353 |
| fkie_cve-2025-14665 | A security flaw has been discovered in Tenda WH450 1.0.0.18. Impacted is an unknown function of the… | 2025-12-14T15:15:47.013 | 2026-02-24T06:16:25.157 |
| fkie_cve-2025-14656 | A weakness has been identified in Tenda AC20 16.03.08.12. This affects the function httpd of the fi… | 2025-12-14T11:15:40.720 | 2026-02-24T06:16:24.803 |
| fkie_cve-2025-14655 | A security flaw has been discovered in Tenda AC20 16.03.08.12. The impacted element is the function… | 2025-12-14T11:15:39.563 | 2026-02-24T06:16:24.630 |
| fkie_cve-2025-14636 | A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check… | 2025-12-13T19:15:38.363 | 2026-02-24T06:16:24.073 |
| fkie_cve-2025-14589 | A weakness has been identified in code-projects Prison Management System 2.0. This issue affects so… | 2025-12-13T16:16:52.293 | 2026-02-24T06:16:23.533 |
| fkie_cve-2025-14583 | A flaw has been found in campcodes Online Student Enrollment System 1.0. This impacts an unknown fu… | 2025-12-12T22:15:39.123 | 2026-02-24T06:16:23.170 |
| fkie_cve-2025-14582 | A vulnerability was detected in campcodes Online Student Enrollment System 1.0. This affects an unk… | 2025-12-12T22:15:38.517 | 2026-02-24T06:16:22.977 |
| fkie_cve-2025-14566 | A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905… | 2025-12-12T16:15:42.943 | 2026-02-24T06:16:22.173 |
| fkie_cve-2025-14565 | A vulnerability was identified in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f… | 2025-12-12T16:15:42.757 | 2026-02-24T06:16:21.987 |
| fkie_cve-2025-14527 | A weakness has been identified in projectworlds Advanced Library Management System 1.0. This vulner… | 2025-12-11T17:15:55.850 | 2026-02-24T06:16:21.630 |
| fkie_cve-2025-14526 | A security flaw has been discovered in Tenda CH22 1.0.0.1. This affects the function frmL7ImForm of… | 2025-12-11T17:15:55.660 | 2026-02-24T06:16:21.430 |
| fkie_cve-2025-14518 | A vulnerability was identified in PowerJob up to 5.1.2. This vulnerability affects the function che… | 2025-12-11T15:15:47.333 | 2026-02-24T06:16:21.230 |
| fkie_cve-2025-14276 | A vulnerability was determined in Ilevia EVE X1 Server up to 4.6.5.0.eden. Impacted is an unknown f… | 2025-12-08T22:15:50.933 | 2026-02-24T06:16:20.263 |
| fkie_cve-2025-14219 | A weakness has been identified in Campcodes Retro Basketball Shoes Online Store 1.0. The impacted e… | 2025-12-08T06:15:46.870 | 2026-02-24T06:16:19.700 |
| fkie_cve-2025-14212 | A flaw has been found in projectworlds Advanced Library Management System 1.0. Affected by this iss… | 2025-12-08T03:16:15.573 | 2026-02-24T06:16:19.523 |
| fkie_cve-2025-14211 | A vulnerability was detected in projectworlds Advanced Library Management System 1.0. Affected by t… | 2025-12-08T03:16:15.377 | 2026-02-24T06:16:19.340 |
| fkie_cve-2025-14209 | A weakness has been identified in Campcodes School File Management System 1.0. This impacts an unkn… | 2025-12-08T02:15:53.060 | 2026-02-24T06:16:18.987 |
| fkie_cve-2025-14195 | A security flaw has been discovered in code-projects Employee Profile Management System 1.0. Impact… | 2025-12-07T15:15:47.623 | 2026-02-24T06:16:18.467 |
| fkie_cve-2025-14193 | A vulnerability was determined in code-projects Employee Profile Management System 1.0. This vulner… | 2025-12-07T14:15:47.143 | 2026-02-24T06:16:18.097 |
| fkie_cve-2025-14012 | A vulnerability was determined in JIZHICMS up to 2.5.5. The affected element is the function delete… | 2025-12-04T18:15:50.570 | 2026-02-24T06:16:16.690 |
| fkie_cve-2025-14011 | A vulnerability was found in JIZHICMS up to 2.5.5. Impacted is the function commentlist of the file… | 2025-12-04T18:15:50.330 | 2026-02-24T06:16:16.490 |
| fkie_cve-2025-14005 | A weakness has been identified in dayrui XunRuiCMS up to 4.7.1. Affected by this vulnerability is a… | 2025-12-04T14:16:03.470 | 2026-02-24T06:16:15.817 |
| fkie_cve-2025-14004 | A security flaw has been discovered in dayrui XunRuiCMS up to 4.7.1. Affected is an unknown functio… | 2025-12-04T14:16:03.190 | 2026-02-24T06:16:14.230 |
| fkie_cve-2025-69367 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:20.880 | 2026-02-23T23:16:15.517 |
| fkie_cve-2025-68854 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:14.287 | 2026-02-23T23:16:15.333 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-wpfv-crpp-p2xq |
6.5 (3.1)
6.9 (4.0)
|
Cross-site scripting vulnerability exists in E-mail function of Cybozu Garoon 5.0.0 to 6.0.3, which… | 2026-02-02T09:30:30Z | 2026-02-19T15:30:33Z |
| ghsa-5pq5-2786-pgrm |
5.7 (3.1)
6.8 (4.0)
|
Cross-site scripting vulnerability exists in Message function of Cybozu Garoon 5.15.0 to 6.0.3, whi… | 2026-02-02T09:30:30Z | 2026-02-19T15:30:33Z |
| ghsa-3288-p39f-rqpv |
0.5 (4.0)
|
Unsoundness in opt-in ARMv8 assembly backend for `keccak` | 2026-02-19T15:17:41Z | 2026-02-19T15:17:41Z |
| ghsa-9ppg-jx86-fqw7 |
|
Unauthorized npm publish of cline@2.3.0 with modified postinstall script | 2026-02-19T15:17:10Z | 2026-02-19T15:17:10Z |
| ghsa-fpj8-gq4v-p354 |
6.3 (4.0)
|
Apache Tomcat - Client certificate verification bypass | 2026-02-17T21:31:13Z | 2026-02-19T15:06:50Z |
| ghsa-qq5r-98hh-rxc9 |
2.7 (4.0)
|
Apache Tomcat - Security constraint bypass with HTTP/0.9 | 2026-02-17T21:31:13Z | 2026-02-19T15:06:26Z |
| ghsa-mvg3-r374-jg32 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in Tsinghua Unigroup Electronic Archives System up to 3.2.210802(625… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-fq57-8j4v-2xq2 |
6.7 (4.0)
|
Fileflows versions before 25.05.2 are affected by an authenticated SQL injection vulnerability in t… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-87c2-mcff-93mr |
9.8 (3.1)
8.9 (4.0)
|
A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the fu… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-6rxp-px53-8xf6 |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). The af… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-63wr-vhhf-qrpx |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in GoogTech sms-ssm up to e8534c766fd13f5f94c01dab475d75f286918a8d. … | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-3428-qfh5-9x74 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was determined in Tsinghua Unigroup Electronic Archives System up to 3.2.210802(625… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-w366-h875-fm53 |
8.2 (3.1)
8.8 (4.0)
|
MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in th… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-m568-c33v-g59q |
8.8 (3.1)
|
Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potent… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-h5vr-w6qh-ffwp |
8.8 (3.1)
|
Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-grp8-p6j9-9x5f |
9.8 (3.1)
9.3 (4.0)
|
MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution throug… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-ggv8-8p4m-x2fc |
4.3 (3.1)
2.1 (4.0)
|
A security flaw has been discovered in Tsinghua Unigroup Electronic Archives System 3.2.210802(6253… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-g4hf-7q6p-whw3 |
8.4 (3.1)
8.6 (4.0)
|
Saturn Remote Mouse Server contains a command injection vulnerability that allows unauthenticated a… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-9vw8-375m-pj63 |
6.5 (3.1)
5.5 (4.0)
|
A vulnerability was determined in Rongzhitong Visual Integrated Command and Dispatch Platform up to… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-6f4f-6mw4-9rmf |
5.3 (4.0)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Delinea Inc… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-654q-5mj4-74h4 |
6.9 (4.0)
|
Improper Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') in Delinea Inc. Cl… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-5v24-5hr7-xg26 |
7.5 (3.1)
8.7 (4.0)
|
MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation throug… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-5c8c-h849-76wx |
7.2 (3.1)
5.3 (4.0)
|
MajorDoMo (aka Major Domestic Module) contains a stored cross-site scripting (XSS) vulnerability th… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-36ph-wmrq-6hrj |
7.2 (3.1)
7.3 (4.0)
|
A vulnerability was identified in Advantech WISE-6610 1.2.1_20251110. Affected is an unknown functi… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-wj34-3cm4-v64v |
6.1 (3.1)
5.1 (4.0)
|
IPFire 2.21 Core Update 127 contains a reflected cross-site scripting vulnerability in the updatexl… | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ghsa-rpq9-4jjf-2xhh |
6.1 (3.1)
5.1 (4.0)
|
MajorDoMo (aka Major Domestic Module) contains a reflected cross-site scripting (XSS) vulnerability… | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ghsa-qx68-hf7m-xmfg |
6.1 (3.1)
5.1 (4.0)
|
IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the… | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ghsa-pgfc-hgqj-gfc4 |
6.1 (3.1)
5.1 (4.0)
|
IPFire 2.21 Core Update 127 contains multiple cross-site scripting vulnerabilities in the ovpnmain.… | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ghsa-pcm2-gfvw-8jpr |
6.4 (3.1)
5.1 (4.0)
|
IPFire 2.21 Core Update 127 contains multiple stored cross-site scripting vulnerabilities in the ex… | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ghsa-p5wr-fv9m-v746 |
9.8 (3.1)
8.4 (4.0)
|
ChaosPro 2.0 contains a buffer overflow vulnerability in the configuration file path handling that … | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-269 |
|
TensorFlow is an end-to-end open source platform for machine learning. When a user does n… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.708163Z |
| pysec-2021-268 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.623027Z |
| pysec-2021-267 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.539250Z |
| pysec-2021-266 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.455188Z |
| pysec-2021-265 |
|
TensorFlow is an end-to-end open source platform for machine learning. If a user does not… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.365129Z |
| pysec-2021-264 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T18:15:00Z | 2021-08-27T03:22:43.277267Z |
| pysec-2021-263 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.190554Z |
| pysec-2021-262 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T18:15:00Z | 2021-08-27T03:22:43.107664Z |
| pysec-2021-261 |
|
TensorFlow is an end-to-end open source platform for machine learning. When restoring ten… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.020795Z |
| pysec-2021-260 |
|
TensorFlow is an end-to-end open source platform for machine learning. Sending invalid ar… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:42.935785Z |
| pysec-2021-259 |
|
TensorFlow is an end-to-end open source platform for machine learning. It is possible to … | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:42.844418Z |
| pysec-2021-258 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T18:15:00Z | 2021-08-27T03:22:42.737707Z |
| pysec-2021-257 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:42.637508Z |
| pysec-2021-256 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing invalid ar… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.523296Z |
| pysec-2021-255 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing a complex … | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.358462Z |
| pysec-2021-254 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.200654Z |
| pysec-2021-253 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.041590Z |
| pysec-2021-252 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.882183Z |
| pysec-2021-251 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.712204Z |
| pysec-2021-250 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.522961Z |
| pysec-2021-249 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.356902Z |
| pysec-2021-248 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.176381Z |
| pysec-2021-247 |
|
TensorFlow is an end-to-end open source platform for machine learning. The validation in … | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.001819Z |
| pysec-2021-246 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.807777Z |
| pysec-2021-245 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.610515Z |
| pysec-2021-244 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.417025Z |
| pysec-2021-243 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.241160Z |
| pysec-2021-242 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite code fo… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.058012Z |
| pysec-2021-241 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.893665Z |
| pysec-2021-240 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.733041Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32374 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.139424Z |
| gsd-2024-32373 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.102384Z |
| gsd-2024-32372 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.069479Z |
| gsd-2024-32371 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.027298Z |
| gsd-2024-32370 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.045045Z |
| gsd-2024-32369 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.066742Z |
| gsd-2024-32368 | Insecure Permission vulnerability in Agasta Sanketlife 2.0 Pocket 12-Lead ECG Monitor FW … | 2024-04-13T05:02:29.061959Z |
| gsd-2024-32367 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.115401Z |
| gsd-2024-32366 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.128650Z |
| gsd-2024-32365 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.143271Z |
| gsd-2024-32364 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.140058Z |
| gsd-2024-32363 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.088723Z |
| gsd-2024-32362 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.048089Z |
| gsd-2024-32361 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.064540Z |
| gsd-2024-32360 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.086426Z |
| gsd-2024-32359 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.122289Z |
| gsd-2024-32358 | An issue in Jpress v.5.1.0 allows a remote attacker to execute arbitrary code via a craft… | 2024-04-13T05:02:29.105495Z |
| gsd-2024-32357 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.054637Z |
| gsd-2024-32356 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.096697Z |
| gsd-2024-32355 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.127151Z |
| gsd-2024-32354 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.106475Z |
| gsd-2024-32353 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.074221Z |
| gsd-2024-32352 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.052856Z |
| gsd-2024-32351 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.060329Z |
| gsd-2024-32350 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.105105Z |
| gsd-2024-32349 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.073511Z |
| gsd-2024-32348 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.040749Z |
| gsd-2024-32347 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.082741Z |
| gsd-2024-32346 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.041404Z |
| gsd-2024-32345 | A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15 allows … | 2024-04-13T05:02:29.104221Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-25 | Malicious code in usaa-authentication-mocks (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:35Z |
| mal-2026-24 | Malicious code in tickncook-robot (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:35Z |
| mal-2025-192951 | Malicious code in ugc-kit (npm) | 2025-12-27T17:21:21Z | 2026-01-06T03:48:35Z |
| MAL-2026-25 | Malicious code in usaa-authentication-mocks (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:35Z |
| MAL-2026-24 | Malicious code in tickncook-robot (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:35Z |
| MAL-2025-192951 | Malicious code in ugc-kit (npm) | 2025-12-27T17:21:21Z | 2026-01-06T03:48:35Z |
| mal-2026-21 | Malicious code in orchestration-node-common-errors (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:34Z |
| MAL-2026-21 | Malicious code in orchestration-node-common-errors (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:34Z |
| mal-2025-190574 | Malicious code in kc-next (npm) | 2025-11-19T00:28:04Z | 2026-01-06T03:48:33Z |
| MAL-2025-190574 | Malicious code in kc-next (npm) | 2025-11-19T00:28:04Z | 2026-01-06T03:48:33Z |
| mal-2026-18 | Malicious code in initializers (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:32Z |
| mal-2026-16 | Malicious code in fix-cc-raiesy (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:32Z |
| mal-2025-192959 | Malicious code in intl-tel-input-utils (npm) | 2025-12-29T15:00:48Z | 2026-01-06T03:48:32Z |
| mal-2025-192950 | Malicious code in ing-feat-ui-image (npm) | 2025-12-27T17:11:08Z | 2026-01-06T03:48:32Z |
| mal-2025-192949 | Malicious code in ing-feat-malware-detection (npm) | 2025-12-27T17:11:12Z | 2026-01-06T03:48:32Z |
| mal-2025-192934 | Malicious code in ing-feat-kyc-consent (npm) | 2025-12-25T18:55:12Z | 2026-01-06T03:48:32Z |
| mal-2025-192933 | Malicious code in ing-feat-auth-idin (npm) | 2025-12-25T18:54:53Z | 2026-01-06T03:48:32Z |
| mal-2025-190573 | Malicious code in gbiz-next (npm) | 2025-11-18T23:23:34Z | 2026-01-06T03:48:32Z |
| MAL-2026-18 | Malicious code in initializers (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:32Z |
| MAL-2026-16 | Malicious code in fix-cc-raiesy (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:32Z |
| MAL-2025-192959 | Malicious code in intl-tel-input-utils (npm) | 2025-12-29T15:00:48Z | 2026-01-06T03:48:32Z |
| MAL-2025-192950 | Malicious code in ing-feat-ui-image (npm) | 2025-12-27T17:11:08Z | 2026-01-06T03:48:32Z |
| MAL-2025-192949 | Malicious code in ing-feat-malware-detection (npm) | 2025-12-27T17:11:12Z | 2026-01-06T03:48:32Z |
| MAL-2025-192934 | Malicious code in ing-feat-kyc-consent (npm) | 2025-12-25T18:55:12Z | 2026-01-06T03:48:32Z |
| MAL-2025-192933 | Malicious code in ing-feat-auth-idin (npm) | 2025-12-25T18:54:53Z | 2026-01-06T03:48:32Z |
| MAL-2025-190573 | Malicious code in gbiz-next (npm) | 2025-11-18T23:23:34Z | 2026-01-06T03:48:32Z |
| mal-2026-14 | Malicious code in ent-profile-unauth-msr-stop (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:31Z |
| mal-2026-13 | Malicious code in ent-file-upload-widget-v2 (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:31Z |
| mal-2026-12 | Malicious code in datatables-editor (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:31Z |
| MAL-2026-14 | Malicious code in ent-profile-unauth-msr-stop (npm) | 2026-01-02T22:06:48Z | 2026-01-06T03:48:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0079 | QEMU: Schwachstelle ermöglicht Denial of Service | 2024-01-14T23:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2024-0064 | Juniper Produkte: Mehrere Schwachstellen | 2024-01-10T23:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2023-2302 | QEMU: Schwachstelle ermöglicht Denial of Service | 2023-09-10T22:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2023-1662 | QEMU: Schwachstelle ermöglicht Denial of Service | 2023-07-04T22:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2022-1955 | OpenSSL: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2016-08-28T22:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2022-0604 | Net-SNMP: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2022-07-06T22:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2025-0784 | Jenkins jenkins/ssh-agent / jenkins/ssh-slave: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0783 | Drupal: Mehrere Schwachstellen | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0782 | NATS Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0781 | Apache ActiveMQ Artemis: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0780 | PaloAlto Networks PAN-OS: Mehrere Schwachstellen | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0779 | PaloAlto Networks GlobalProtect: Schwachstelle ermöglicht Privilegieneskalation | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0778 | GitLab: Mehrere Schwachstellen | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0777 | Juniper JUNOS: Mehrere Schwachstellen | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0776 | Dell BIOS: Schwachstelle ermöglicht die Umgehung von Sicherheitsmaßnahmen | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0711 | Red Hat OpenShift (Tempo): Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-04-06T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0544 | Microsoft Azure: Mehrere Schwachstellen | 2025-03-11T23:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0225 | Dell PowerProtect Data Domain: Mehrere Schwachstellen | 2025-01-30T23:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1934 | MongoDB: Schwachstelle ermöglicht Privilegieneskalation | 2024-08-27T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1792 | MongoDB: Schwachstelle ermöglicht Privilegieneskalation | 2024-08-07T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1166 | MongoDB: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-05-15T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1003 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2024-05-01T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0346 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-02-11T23:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0251 | OpenSC: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-01-30T23:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0232 | Linux Kernel: Mehrere Schwachstellen | 2024-01-28T23:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2023-2620 | Samba: Mehrere Schwachstellen | 2023-10-10T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2023-2500 | OpenSC: Mehrere Schwachstellen | 2023-09-27T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2023-2298 | OpenSSL: Schwachstelle ermöglicht Denial of Service | 2023-09-10T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2023-2127 | MongoDB: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-08-23T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2023-1324 | OpenSC: Schwachstelle ermöglicht Denial of Service | 2023-05-30T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:19098 | Red Hat Security Advisory: libssh security update | 2025-10-27T01:38:38+00:00 | 2026-02-27T17:05:47+00:00 |
| rhsa-2025:19300 | Red Hat Security Advisory: OpenShift Container Platform 4.19.18 bug fix and security update | 2025-11-05T18:15:06+00:00 | 2026-02-27T17:05:46+00:00 |
| rhsa-2025:19101 | Red Hat Security Advisory: libssh security update | 2025-10-27T08:30:35+00:00 | 2026-02-27T17:05:46+00:00 |
| rhsa-2025:19012 | Red Hat Security Advisory: libssh security update | 2025-10-23T20:00:32+00:00 | 2026-02-27T17:05:44+00:00 |
| rhsa-2025:18286 | Red Hat Security Advisory: libssh security update | 2025-10-20T02:19:30+00:00 | 2026-02-27T17:05:44+00:00 |
| rhsa-2025:18275 | Red Hat Security Advisory: libssh security update | 2025-10-16T22:09:51+00:00 | 2026-02-27T17:05:44+00:00 |
| rhsa-2025:18231 | Red Hat Security Advisory: libssh security update | 2025-10-16T10:25:20+00:00 | 2026-02-27T17:05:43+00:00 |
| rhsa-2024:5079 | Red Hat Security Advisory: libtiff security update | 2024-08-07T11:17:09+00:00 | 2026-02-27T17:05:42+00:00 |
| rhsa-2025:8278 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.16.1 security update | 2025-05-28T20:55:14+00:00 | 2026-02-27T16:40:58+00:00 |
| rhsa-2025:8277 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.15.3 security update | 2025-05-28T20:51:24+00:00 | 2026-02-27T16:40:56+00:00 |
| rhsa-2025:8269 | Red Hat Security Advisory: Red Hat OpenShift GitOps 1.16.1 security release | 2025-05-28T16:54:33+00:00 | 2026-02-27T16:40:54+00:00 |
| rhsa-2025:7630 | Red Hat Security Advisory: updated discovery-cli RPMs | 2025-05-15T02:54:01+00:00 | 2026-02-27T16:40:54+00:00 |
| rhsa-2025:3709 | Red Hat Security Advisory: updated discovery container images | 2025-04-08T17:51:49+00:00 | 2026-02-27T16:40:16+00:00 |
| rhsa-2024:1267 | Red Hat Security Advisory: OpenShift Container Platform 4.12.53 packages and security update | 2024-03-20T01:54:44+00:00 | 2026-02-27T16:40:15+00:00 |
| rhsa-2023:3923 | Red Hat Security Advisory: go-toolset and golang security update | 2023-06-29T09:49:22+00:00 | 2026-02-27T16:40:07+00:00 |
| rhsa-2023:3922 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2023-06-29T09:14:53+00:00 | 2026-02-27T16:40:06+00:00 |
| rhsa-2023:3920 | Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update | 2023-06-29T05:33:42+00:00 | 2026-02-27T16:40:03+00:00 |
| rhba-2025:9645 | Red Hat Bug Fix Advisory: mirror registry for Red Hat OpenShift 2.0.7 container | 2025-07-14T08:07:01+00:00 | 2026-02-27T16:38:57+00:00 |
| rhsa-2025:7626 | Red Hat Security Advisory: Red Hat Developer Hub 1.6.0 release. | 2025-05-14T17:51:56+00:00 | 2026-02-27T16:36:54+00:00 |
| rhsa-2025:10020 | Red Hat Security Advisory: Network Observability 1.9.0 for OpenShift | 2025-07-01T07:28:57+00:00 | 2026-02-27T16:36:48+00:00 |
| rhsa-2026:3407 | Red Hat Security Advisory: mingw-fontconfig security update | 2026-02-26T14:19:55+00:00 | 2026-02-27T16:36:06+00:00 |
| rhsa-2026:3220 | Red Hat Security Advisory: protobuf security update | 2026-02-24T16:09:22+00:00 | 2026-02-27T16:36:05+00:00 |
| rhsa-2026:3059 | Red Hat Security Advisory: protobuf security update | 2026-02-23T08:32:48+00:00 | 2026-02-27T16:36:05+00:00 |
| rhsa-2026:3219 | Red Hat Security Advisory: protobuf security update | 2026-02-24T16:27:37+00:00 | 2026-02-27T16:36:04+00:00 |
| rhsa-2026:3218 | Red Hat Security Advisory: protobuf security update | 2026-02-24T15:37:12+00:00 | 2026-02-27T16:36:03+00:00 |
| rhsa-2026:3097 | Red Hat Security Advisory: protobuf security update | 2026-02-23T16:02:27+00:00 | 2026-02-27T16:36:02+00:00 |
| rhsa-2026:3095 | Red Hat Security Advisory: protobuf security update | 2026-02-23T16:22:42+00:00 | 2026-02-27T16:36:01+00:00 |
| rhsa-2026:3094 | Red Hat Security Advisory: protobuf security update | 2026-02-23T15:47:47+00:00 | 2026-02-27T16:36:01+00:00 |
| rhsa-2026:0518 | Red Hat Security Advisory: Red Hat Quay 3.16.1 | 2026-01-13T16:03:52+00:00 | 2026-02-27T16:35:46+00:00 |
| rhsa-2025:23851 | Red Hat Security Advisory: go-rpm-macros security update | 2025-12-22T11:31:13+00:00 | 2026-02-27T16:35:44+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-23-082-02 | CP Plus KVMS Pro | 2023-03-31T19:07:05.255213Z | 2023-03-31T19:07:05.255213Z |
| icsa-23-082-01 | RoboDK | 2023-03-31T19:07:05.310067Z | 2023-03-31T19:07:05.310067Z |
| icsa-23-080-06 | Rockwell Automation ThinManager | 2023-03-31T19:07:05.264096Z | 2023-03-31T19:07:05.264096Z |
| icsa-23-075-07 | Rockwell Automation Modbus TCP AOI Server | 2023-03-31T16:10:45.648316Z | 2023-03-31T16:10:45.648316Z |
| icsa-23-073-01 | Omron CJ1M PLC | 2023-03-31T15:58:39.527124Z | 2023-03-31T15:58:39.527124Z |
| icsa-23-073-03 | GE iFIX | 2023-03-29T18:59:20.240657Z | 2023-03-29T18:59:20.240657Z |
| icsa-23-073-02 | Autodesk FBX SDK | 2023-03-29T18:59:20.225092Z | 2023-03-29T18:59:20.225092Z |
| icsa-23-073-04 | AVEVA Plant SCADA and AVEVA Telemetry Server | 2023-03-29T18:39:49.233100Z | 2023-03-29T18:39:49.233100Z |
| icsa-23-068-01 | Akuvox E11 | 2023-03-29T18:39:49.192244Z | 2023-03-29T18:39:49.192244Z |
| icsa-23-068-02 | B&R Systems Diagnostics Manager | 2023-03-29T17:05:20.993768Z | 2023-03-29T17:05:20.993768Z |
| icsa-23-068-04 | Step Tools Third-Party | 2023-03-29T16:55:34.194688Z | 2023-03-29T16:55:34.194688Z |
| icsa-23-080-01 | Keysight N6845A Geolocation Server | 2023-03-29T16:37:57.399870Z | 2023-03-29T16:37:57.399870Z |
| icsa-23-080-02 | Delta Electronics InfraSuite Device Master | 2023-03-29T16:33:08.768690Z | 2023-03-29T16:33:08.768690Z |
| icsa-23-080-07 | Siemens SCALANCE Third-Party | 2023-03-14T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-23-080-04 | Siemens RADIUS Client of SIPROTEC 5 Devices | 2023-03-14T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-23-075-03 | Siemens RUGGEDCOM CROSSBOW V5.2 | 2023-03-14T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-23-075-02 | Siemens RUGGEDCOM CROSSBOW V5.3 | 2023-03-14T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-23-075-01 | Siemens SCALANCE, RUGGEDCOM Third-Party | 2023-03-14T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-23-047-01 | Siemens Solid Edge | 2023-02-14T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-23-012-10 | Siemens Automation License Manager | 2023-01-10T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-22-195-12 | Siemens SRCS VPN Feature in SIMATIC CP Devices | 2022-07-12T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-21-194-07 | Siemens Industrial Products LLDP (Update D) | 2021-07-13T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-21-131-03 | Siemens Linux-based Products (Update J) | 2021-05-11T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-23-061-03 | Rittal CMC III Access systems | 2023-03-06T19:52:26.297982Z | 2023-03-06T19:52:26.297982Z |
| icsa-23-059-02 | Hitachi Energy Gateway Station | 2023-03-06T19:52:26.266848Z | 2023-03-06T19:52:26.266848Z |
| icsa-23-059-01 | Hitachi Energy Gateway Station | 2023-03-06T19:52:26.287374Z | 2023-03-06T19:52:26.287374Z |
| icsma-23-061-01 | Medtronic Micro Clinician and InterStim Apps | 2023-03-06T16:35:54.956247Z | 2023-03-06T16:35:54.956247Z |
| icsa-23-061-02 | Baicells Nova | 2023-03-02T07:00:00.000000Z | 2023-03-02T07:00:00.000000Z |
| icsa-23-054-01 | PTC ThingWorx Edge | 2023-02-27T20:46:39.753316Z | 2023-02-27T20:46:39.753316Z |
| icsa-23-052-01 | Mitsubishi Electric MELSOFT iQ AppPortal | 2023-02-27T20:46:39.744091Z | 2023-02-27T20:46:39.744091Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-msx-dos-4j7sytvU | Cisco Managed Services Accelerator Denial of Service Vulnerability | 2021-02-03T16:00:00+00:00 | 2021-02-03T16:00:00+00:00 |
| cisco-sa-ipv6-acl-chgdyk8j | Cisco IOS XR and Cisco NX-OS Software IPv6 Access Control List Bypass Vulnerability | 2021-02-03T16:00:00+00:00 | 2021-02-03T16:00:00+00:00 |
| cisco-sa-ipv6-acl-CHgdYk8j | Cisco IOS XR and Cisco NX-OS Software IPv6 Access Control List Bypass Vulnerability | 2021-02-03T16:00:00+00:00 | 2021-02-03T16:00:00+00:00 |
| cisco-sa-ioxr-l-znhcgcbt | Cisco IOS XR Software for Cisco 8000 Series Routers and Network Convergence System 540 Series Routers Image Verification Vulnerabilities | 2021-02-03T16:00:00+00:00 | 2021-02-03T16:00:00+00:00 |
| cisco-sa-ioxr-l-zNhcGCBt | Cisco IOS XR Software for Cisco 8000 Series Routers and Network Convergence System 540 Series Routers Image Verification Vulnerabilities | 2021-02-03T16:00:00+00:00 | 2021-02-03T16:00:00+00:00 |
| cisco-sa-iosxr-pe-qpzcaepe | Cisco IOS XR Software for Cisco 8000 Series Routers and Network Convergence System 540 Series Routers Privilege Escalation Vulnerability | 2021-02-03T16:00:00+00:00 | 2021-02-03T16:00:00+00:00 |
| cisco-sa-iosxr-pe-QpzCAePe | Cisco IOS XR Software for Cisco 8000 Series Routers and Network Convergence System 540 Series Routers Privilege Escalation Vulnerability | 2021-02-03T16:00:00+00:00 | 2021-02-03T16:00:00+00:00 |
| cisco-sa-ios-infodisc-4mtm9gyt | Cisco IOS XR Software Unauthorized Information Disclosure Vulnerability | 2021-02-03T16:00:00+00:00 | 2021-02-03T16:00:00+00:00 |
| cisco-sa-ios-infodisc-4mtm9Gyt | Cisco IOS XR Software Unauthorized Information Disclosure Vulnerability | 2021-02-03T16:00:00+00:00 | 2021-02-03T16:00:00+00:00 |
| cisco-sa-sdwan-dosmulti-48jjueup | Cisco SD-WAN Denial of Service Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-02-02T22:21:54+00:00 |
| cisco-sa-sdwan-dosmulti-48jJuEUP | Cisco SD-WAN Denial of Service Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-02-02T22:21:54+00:00 |
| cisco-sa-sdwan-abyp-tngfhrs | Cisco SD-WAN vManage Authorization Bypass Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-02-02T22:20:48+00:00 |
| cisco-sa-sdwan-abyp-TnGFHrS | Cisco SD-WAN vManage Authorization Bypass Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-02-02T22:20:48+00:00 |
| cisco-sa-sdwan-cmdinjm-9qmsmgcn | Cisco SD-WAN Command Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-02-02T22:17:18+00:00 |
| cisco-sa-sdwan-cmdinjm-9QMSmgcn | Cisco SD-WAN Command Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-02-02T22:17:18+00:00 |
| cisco-sa-dnac-privesc-6qja3hvh | Cisco DNA Center Privilege Escalation Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-02-02T17:55:38+00:00 |
| cisco-sa-dnac-privesc-6qjA3hVh | Cisco DNA Center Privilege Escalation Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-02-02T17:55:38+00:00 |
| cisco-sa-dnacid-ofeerjcn | Cisco DNA Center Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-26T14:34:33+00:00 |
| cisco-sa-dnacid-OfeeRjcn | Cisco DNA Center Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-26T14:34:33+00:00 |
| cisco-sa-dnac-csrf-dc83cmcv | Cisco DNA Center Cross-Site Request Forgery Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-25T14:01:28+00:00 |
| cisco-sa-dnac-csrf-dC83cMcV | Cisco DNA Center Cross-Site Request Forgery Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-25T14:01:28+00:00 |
| cisco-sa-wsa-prv-esc-npzwzrqj | Cisco Secure Web Appliance Privilege Escalation Vulnerability | 2020-11-18T16:00:00+00:00 | 2021-01-21T14:53:26+00:00 |
| cisco-sa-wsa-prv-esc-nPzWZrQj | Cisco Secure Web Appliance Privilege Escalation Vulnerability | 2020-11-18T16:00:00+00:00 | 2021-01-21T14:53:26+00:00 |
| cisco-sa-expressway-8j3yz7hv | Cisco Expressway Software TURN Server Configuration Issue | 2020-11-18T16:00:00+00:00 | 2021-01-20T20:41:10+00:00 |
| cisco-sa-Expressway-8J3yZ7hV | Cisco Expressway Software TURN Server Configuration Issue | 2020-11-18T16:00:00+00:00 | 2021-01-20T20:41:10+00:00 |
| cisco-sa-wsa-xss-rub5wgql | Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-wsa-xss-RuB5WGqL | Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-vmanage-cql-inject-72ehnuc | Cisco SD-WAN vManage Cypher Query Language Injection Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-vmanage-cql-inject-72EhnUc | Cisco SD-WAN vManage Cypher Query Language Injection Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-vman-sqlinjm-xv8dsjq5 | Cisco SD-WAN vManage SQL Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-33503 | An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component the authority regular expression exhibits catastrophic backtracking causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect. | 2021-06-02T00:00:00.000Z | 2026-02-18T14:13:20.000Z |
| msrc_cve-2024-50185 | mptcp: handle consistently DSS corruption | 2024-11-02T00:00:00.000Z | 2026-02-18T14:13:18.000Z |
| msrc_cve-2025-37864 | net: dsa: clean up FDB, MDB, VLAN entries on unbind | 2025-05-02T00:00:00.000Z | 2026-02-18T14:13:00.000Z |
| msrc_cve-2025-68471 | Avahi has a reachable assertion in lookup_start | 2026-01-02T00:00:00.000Z | 2026-02-18T14:12:53.000Z |
| msrc_cve-2024-21219 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.39 and prior 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2024-10-01T07:00:00.000Z | 2026-02-18T14:12:52.000Z |
| msrc_cve-2024-50186 | net: explicitly clear the sk pointer, when pf->create fails | 2024-11-02T00:00:00.000Z | 2026-02-18T14:12:49.000Z |
| msrc_cve-2023-45234 | Buffer Overflow in EDK II Network Package | 2024-01-01T08:00:00.000Z | 2026-02-18T14:12:43.000Z |
| msrc_cve-2025-22055 | net: fix geneve_opt length integer overflow | 2025-04-02T00:00:00.000Z | 2026-02-18T14:12:30.000Z |
| msrc_cve-2024-50230 | nilfs2: fix kernel bug due to missing clearing of checked flag | 2024-11-02T00:00:00.000Z | 2026-02-18T14:12:28.000Z |
| msrc_cve-2025-68468 | Avahi has a reachable assertion in lookup_multicast_callback | 2026-01-02T00:00:00.000Z | 2026-02-18T14:12:12.000Z |
| msrc_cve-2024-21237 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication GCS). Supported versions that are affected are 8.0.39 and prior 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L). | 2024-10-01T07:00:00.000Z | 2026-02-18T14:12:07.000Z |
| msrc_cve-2024-50177 | drm/amd/display: fix a UBSAN warning in DML2.1 | 2024-11-02T00:00:00.000Z | 2026-02-18T14:12:06.000Z |
| msrc_cve-2025-40158 | ipv6: use RCU in ip6_output() | 2025-11-02T00:00:00.000Z | 2026-02-18T14:12:03.000Z |
| msrc_cve-2025-37796 | wifi: at76c50x: fix use after free access in at76_disconnect | 2025-05-02T00:00:00.000Z | 2026-02-18T14:11:59.000Z |
| msrc_cve-2025-38688 | iommufd: Prevent ALIGN() overflow | 2025-09-02T00:00:00.000Z | 2026-02-18T14:11:44.000Z |
| msrc_cve-2024-50089 | This CVE has been marked Rejected in the CVE List. | 2024-11-02T00:00:00.000Z | 2026-02-18T14:11:41.000Z |
| msrc_cve-2025-40170 | net: use dst_dev_rcu() in sk_setup_caps() | 2025-11-02T00:00:00.000Z | 2026-02-18T14:11:40.000Z |
| msrc_cve-2025-68276 | Avahi has a reachable assertion in avahi_wide_area_scan_cache | 2026-01-02T00:00:00.000Z | 2026-02-18T14:11:33.000Z |
| msrc_cve-2024-42151 | bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable | 2024-07-01T07:00:00.000Z | 2026-02-18T14:11:33.000Z |
| msrc_cve-2025-22029 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2025-04-02T00:00:00.000Z | 2026-02-18T14:11:31.000Z |
| msrc_cve-2024-21239 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2024-10-01T07:00:00.000Z | 2026-02-18T14:11:27.000Z |
| msrc_cve-2024-52532 | GNOME libsoup before 3.6.1 has an infinite loop and memory consumption. during the reading of certain patterns of WebSocket data from clients. | 2024-11-02T00:00:00.000Z | 2026-02-18T14:11:13.000Z |
| msrc_cve-2025-37887 | pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result | 2025-05-02T00:00:00.000Z | 2026-02-18T14:11:03.000Z |
| msrc_cve-2024-46901 | Apache Subversion: mod_dav_svn denial-of-service via control characters in paths | 2024-12-02T00:00:00.000Z | 2026-02-18T14:10:59.000Z |
| msrc_cve-2022-42916 | In curl before 7.86.0 the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion e.g. using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26. | 2022-10-02T00:00:00.000Z | 2026-02-18T14:10:58.000Z |
| msrc_cve-2023-5992 | Opensc: side-channel leaks while stripping encryption pkcs#1 padding | 2024-01-01T08:00:00.000Z | 2026-02-18T14:10:55.000Z |
| msrc_cve-2025-38677 | f2fs: fix to avoid out-of-boundary access in dnode page | 2025-08-02T00:00:00.000Z | 2026-02-18T14:10:51.000Z |
| msrc_cve-2025-40168 | smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match(). | 2025-11-02T00:00:00.000Z | 2026-02-18T14:10:50.000Z |
| msrc_cve-2024-21196 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin). Supported versions that are affected are 8.0.39 and prior 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2024-10-01T07:00:00.000Z | 2026-02-18T14:10:44.000Z |
| msrc_cve-2025-37767 | drm/amd/pm: Prevent division by zero | 2025-05-02T00:00:00.000Z | 2026-02-18T14:10:36.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:0278-1 | Security update for chromium | 2024-09-05T10:49:38Z | 2024-09-05T10:49:38Z |
| opensuse-su-2024:14318-1 | python310-Django-5.1.1-1.1 on GA media | 2024-09-05T00:00:00Z | 2024-09-05T00:00:00Z |
| opensuse-su-2024:14317-1 | libopenssl-3-devel-3.1.4-13.1 on GA media | 2024-09-05T00:00:00Z | 2024-09-05T00:00:00Z |
| opensuse-su-2024:14316-1 | nqptp-1.2.4-1.1 on GA media | 2024-09-05T00:00:00Z | 2024-09-05T00:00:00Z |
| opensuse-su-2024:14315-1 | libvirt-10.7.0-1.1 on GA media | 2024-09-05T00:00:00Z | 2024-09-05T00:00:00Z |
| opensuse-su-2024:14314-1 | klp-build-0~20240902.c95cc9e-1.1 on GA media | 2024-09-05T00:00:00Z | 2024-09-05T00:00:00Z |
| opensuse-su-2024:14313-1 | chromedriver-128.0.6613.119-1.1 on GA media | 2024-09-05T00:00:00Z | 2024-09-05T00:00:00Z |
| opensuse-su-2024:14312-1 | runc-1.2.0~rc3-1.1 on GA media | 2024-09-04T00:00:00Z | 2024-09-04T00:00:00Z |
| opensuse-su-2024:14311-1 | python310-numpy1-1.26.4-1.1 on GA media | 2024-09-04T00:00:00Z | 2024-09-04T00:00:00Z |
| opensuse-su-2024:14310-1 | python310-Django4-4.2.16-1.1 on GA media | 2024-09-04T00:00:00Z | 2024-09-04T00:00:00Z |
| opensuse-su-2024:14309-1 | libpcap-devel-1.10.5-1.1 on GA media | 2024-09-04T00:00:00Z | 2024-09-04T00:00:00Z |
| opensuse-su-2024:14308-1 | htmldoc-1.9.18-2.1 on GA media | 2024-09-04T00:00:00Z | 2024-09-04T00:00:00Z |
| opensuse-su-2024:14307-1 | haproxy-3.0.4+git0.7a59afa93-1.1 on GA media | 2024-09-04T00:00:00Z | 2024-09-04T00:00:00Z |
| opensuse-su-2024:14306-1 | 389-ds-3.1.1~git13.a9c7ff9-1.1 on GA media | 2024-09-04T00:00:00Z | 2024-09-04T00:00:00Z |
| opensuse-su-2024:14305-1 | tcpdump-4.99.5-1.1 on GA media | 2024-09-03T00:00:00Z | 2024-09-03T00:00:00Z |
| opensuse-su-2024:14304-1 | libmbedcrypto7-2.28.9-1.1 on GA media | 2024-09-03T00:00:00Z | 2024-09-03T00:00:00Z |
| opensuse-su-2024:0276-1 | Security update for cacti, cacti-spine | 2024-09-02T16:41:32Z | 2024-09-02T16:41:32Z |
| opensuse-su-2024:0275-1 | Security update for opera | 2024-09-02T16:36:37Z | 2024-09-02T16:36:37Z |
| opensuse-su-2024:0274-1 | Security update for cacti, cacti-spine | 2024-09-02T08:09:11Z | 2024-09-02T08:09:11Z |
| opensuse-su-2024:14303-1 | chromedriver-128.0.6613.113-1.1 on GA media | 2024-08-31T00:00:00Z | 2024-08-31T00:00:00Z |
| opensuse-su-2024:0269-1 | Security update for trivy | 2024-08-30T08:00:45Z | 2024-08-30T08:00:45Z |
| opensuse-su-2024:0268-1 | Security update for trivy | 2024-08-30T08:00:39Z | 2024-08-30T08:00:39Z |
| opensuse-su-2024:0267-1 | Security update for chromium | 2024-08-30T06:36:55Z | 2024-08-30T06:36:55Z |
| opensuse-su-2024:14302-1 | libwireshark17-4.2.7-1.1 on GA media | 2024-08-30T00:00:00Z | 2024-08-30T00:00:00Z |
| opensuse-su-2024:14301-1 | python313-3.13.0~rc1-3.1 on GA media | 2024-08-30T00:00:00Z | 2024-08-30T00:00:00Z |
| opensuse-su-2024:14300-1 | python312-3.12.5-2.1 on GA media | 2024-08-30T00:00:00Z | 2024-08-30T00:00:00Z |
| opensuse-su-2024:14299-1 | python311-3.11.9-7.1 on GA media | 2024-08-30T00:00:00Z | 2024-08-30T00:00:00Z |
| opensuse-su-2024:14298-1 | python310-3.10.14-7.1 on GA media | 2024-08-30T00:00:00Z | 2024-08-30T00:00:00Z |
| opensuse-su-2024:14297-1 | python39-3.9.19-7.1 on GA media | 2024-08-29T00:00:00Z | 2024-08-29T00:00:00Z |
| opensuse-su-2024:14296-1 | python38-3.8.19-8.1 on GA media | 2024-08-29T00:00:00Z | 2024-08-29T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-474 | Heap-buffer-overflow in sc_pkcs15emu_oberthur_add_cert | 2021-03-02T00:01:16.102524Z | 2022-04-13T03:04:41.537593Z |
| osv-2021-453 | UNKNOWN WRITE in std::__1::pair<unsigned int, void*> uWS::HttpParser::fenceAndConsumePostPadded<0 | 2021-02-28T00:00:19.863324Z | 2022-04-13T03:04:41.024750Z |
| osv-2021-437 | Heap-use-after-free in ofats::any_detail::handler_traits<void>::handler_base<ofats::any_detail::handler | 2021-02-23T00:00:23.638786Z | 2022-04-13T03:04:41.003419Z |
| osv-2021-262 | Heap-buffer-overflow in sc_pkcs15emu_oberthur_add_data | 2021-02-02T00:00:59.070801Z | 2022-04-13T03:04:41.618920Z |
| osv-2021-1748 | Heap-buffer-overflow in jxl::N_AVX2::FloatToRGBA8 | 2021-12-24T00:01:41.024002Z | 2022-04-13T03:04:41.785711Z |
| osv-2021-1727 | UNKNOWN WRITE in void uWS::WebSocketProtocol<true, Impl>::UnrolledXor<4> | 2021-12-21T00:00:12.716885Z | 2022-04-13T03:04:41.036032Z |
| osv-2021-1644 | Container-overflow in void jxl::CopyImageTo<int> | 2021-12-04T00:00:20.702471Z | 2022-04-13T03:04:41.848813Z |
| osv-2021-1607 | Container-overflow in void jxl::CopyImageTo<int> | 2021-11-22T00:01:39.687600Z | 2022-04-13T03:04:41.817334Z |
| osv-2021-1606 | Segv on unknown address in jxl::N_AVX2::SingleFromSingle | 2021-11-22T00:00:41.045135Z | 2022-04-13T03:04:41.806651Z |
| osv-2021-1510 | Heap-buffer-overflow in WriteRingBuffer | 2021-10-30T00:01:37.386031Z | 2022-04-13T03:04:41.838573Z |
| osv-2021-1496 | Heap-buffer-overflow in jxl::JxlBoxContentDecoder::Process | 2021-10-28T00:00:18.879739Z | 2022-04-13T03:04:41.801326Z |
| osv-2021-1430 | Heap-buffer-overflow in diagnosticInfoOrder | 2021-10-10T00:01:34.859517Z | 2022-04-13T03:04:41.309026Z |
| osv-2021-1392 | Container-overflow in std::__1::__function::__func<uWS::TemplatedApp<false>&& uWS::TemplatedApp<false> | 2021-09-28T00:01:42.602963Z | 2022-04-13T03:04:41.041539Z |
| osv-2021-1378 | Container-overflow in std::__1::__function::__func<LLVMFuzzerTestOneInput::$_0, std::__1::allocator<LL | 2021-09-27T00:00:27.699638Z | 2022-04-13T03:04:41.008888Z |
| osv-2021-120 | Heap-use-after-free in UA_SecureChannel_deleteMembersCleanup | 2021-01-13T00:01:31.105656Z | 2022-04-13T03:04:41.254422Z |
| osv-2021-1184 | UNKNOWN READ in ucl_array_append | 2021-09-01T00:00:25.788562Z | 2022-04-13T03:04:41.758531Z |
| osv-2021-1054 | Heap-buffer-overflow in jxl::N_SCALAR::SingleFromSingle | 2021-07-25T00:00:29.071944Z | 2022-04-13T03:04:41.864953Z |
| osv-2021-1052 | Use-of-uninitialized-value in jxl::N_AVX2::UpsampleRect | 2021-07-25T00:00:12.369578Z | 2022-04-13T03:04:41.796132Z |
| osv-2021-1049 | Container-overflow in jxl::InvSqueeze | 2021-07-25T00:00:06.796305Z | 2022-04-13T03:04:41.828010Z |
| osv-2021-1017 | Stack-buffer-overflow in piv_compute_signature | 2021-07-16T00:00:22.598607Z | 2022-04-13T03:04:41.569910Z |
| osv-2021-1015 | Dynamic-stack-buffer-overflow in VP8SetSegmentParams | 2021-07-16T00:00:06.429201Z | 2022-04-13T03:04:41.769854Z |
| osv-2021-1011 | Use-of-uninitialized-value in jxl::N_AVX2::AddNoise | 2021-07-15T00:01:15.197122Z | 2022-04-13T03:04:41.843573Z |
| osv-2020-969 | Stack-buffer-overflow in pgp_parse_algo_attr_blob | 2020-07-22T00:00:28.643216Z | 2022-04-13T03:04:41.592346Z |
| osv-2020-959 | Container-overflow in yysmiles_parse | 2020-07-22T00:00:26.027272Z | 2022-04-13T03:04:41.497030Z |
| osv-2020-885 | Stack-use-after-scope in coolkey_apdu_io | 2020-07-14T22:13:58.474226Z | 2022-04-13T03:04:41.670487Z |
| osv-2020-88 | Segv on unknown address in cbor_decref | 2020-06-24T01:51:13.521395Z | 2022-04-13T03:04:41.486347Z |
| osv-2020-709 | Heap-double-free in sc_pkcs15_free_object_content | 2020-07-01T00:00:26.090578Z | 2022-04-13T03:04:41.707057Z |
| osv-2020-693 | Heap-buffer-overflow in parse_sec_attr_44 | 2020-07-01T00:00:25.178023Z | 2022-04-13T03:04:41.597761Z |
| osv-2020-680 | Bad-free in sc_pkcs15_decode_prkdf_entry | 2020-07-01T00:00:24.475752Z | 2022-04-13T03:04:41.639666Z |
| osv-2020-676 | Heap-use-after-free in String_clear | 2020-07-01T00:00:24.168174Z | 2022-04-13T03:04:41.324196Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-mlflow-2023-4033 | OS Command Injection in mlflow/mlflow | 2024-03-06T10:58:27.677Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2023-3765 | Absolute Path Traversal in mlflow/mlflow | 2024-03-06T10:58:35.367Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2023-2780 | Path Traversal: '\..\filename' in mlflow/mlflow | 2024-03-06T10:58:54.968Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2023-2356 | Relative Path Traversal in mlflow/mlflow | 2024-03-06T10:59:06.605Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2023-1177 | Path Traversal: '\..\filename' in mlflow/mlflow | 2024-03-06T10:59:15.795Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2023-1176 | Absolute Path Traversal in mlflow/mlflow | 2024-03-06T10:59:27.081Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2022-0736 | Insecure Temporary File in mlflow/mlflow | 2024-03-06T10:59:37.587Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2025-31489 | MinIO performs incomplete signature validation for unsigned-trailer uploads | 2025-04-14T11:14:54.951Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2025-27414 | MinIO SFTP authentication bypass due to improperly trusted SSH key | 2025-04-14T11:14:42.946Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2024-55949 | Privilege escalation in IAM import API in MinIO | 2025-04-14T11:14:32.648Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2024-36107 | Information disclosure in minio | 2024-06-04T09:46:16.011Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2023-28433 | Minio Privilege Escalation on Windows via Path separator manipulation | 2024-03-06T10:56:28.094Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2023-27589 | Minio vulnerable to denial of access by an admin privileged user for root credential | 2024-03-06T10:56:49.290Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2023-25812 | Allowed DELETE on resources on object locked buckets under Governance mode in Minio | 2024-03-06T10:56:58.195Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2022-35919 | Authenticated requests for server update admin API allows path traversal in minio | 2024-03-06T10:57:07.178Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2022-31028 | Possible DDOS by establishing keep-alive connections with anonymous HTTP clients in MinIO | 2024-03-06T10:57:16.966Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2022-24842 | Improper Privilege Management in MinIO | 2024-03-06T10:57:27.260Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2021-43858 | User privilege escalation in MinIO | 2024-03-06T10:57:38.503Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2021-21390 | MITM modification of request bodies in MinIO | 2024-03-06T10:58:02.168Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2021-21362 | Bypassing readOnly policy by creating a temporary 'mc share upload' URL | 2024-03-06T10:58:10.992Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2021-21287 | Server-Side Request Forgery in MinIO Browser API | 2024-03-06T10:58:22.370Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2020-11012 | Authentication bypass MinIO Admin API | 2024-03-06T10:58:32.002Z | 2025-05-20T10:02:07.006Z |
| bit-mastodon-2025-27399 | Mastodon's domain blocks & rationales ignore user approval when visibility set as "users" | 2025-03-02T07:13:02.508Z | 2025-05-20T10:02:07.006Z |
| bit-mastodon-2025-27157 | Mastodon's rate-limits are missing on `/auth/setup` | 2025-03-02T07:13:08.797Z | 2025-05-20T10:02:07.006Z |
| bit-mastodon-2024-37903 | Mastodon has improper authorship check on audience extension for existing posts | 2024-07-09T07:24:52.373Z | 2025-05-20T10:02:07.006Z |
| bit-mastodon-2024-25623 | Lack of media type verification of Activity Streams objects allows impersonation of remote accounts | 2024-03-31T18:20:59.562Z | 2025-05-20T10:02:07.006Z |
| bit-mastodon-2024-25619 | Destroying OAuth Applications doesn't notify Streaming of Access Tokens being destroyed in mastodon | 2024-03-31T18:21:09.827Z | 2025-05-20T10:02:07.006Z |
| bit-mastodon-2024-25618 | External OpenID Connect Account Takeover by E-Mail Change in mastodon | 2024-03-31T18:21:20.227Z | 2025-05-20T10:02:07.006Z |
| bit-mastodon-2024-23832 | Mastodon Remote user impersonation and takeover | 2024-03-06T10:55:37.581Z | 2025-05-20T10:02:07.006Z |
| bit-mastodon-2023-42452 | Mastodon vulnerable to Stored XSS through the translation feature | 2024-03-06T10:55:46.292Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202401-0919 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It h… | 2024-05-17T22:55:38.483000Z |
| var-202403-0889 | A vulnerability classified as critical has been found in Tenda AC18 15.03.05.05. Affected… | 2024-05-17T22:55:37.933000Z |
| var-200608-0067 | Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attac… | 2024-05-17T22:55:28.617000Z |
| var-201810-0743 | An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An … | 2024-05-17T22:54:06.349000Z |
| var-201908-0924 | On BC Vault devices, a side channel for the row-based SSD1309 OLED display was found. The… | 2024-05-17T22:53:34.855000Z |
| var-202007-1256 | D-Link DIR-610 devices allow Remote Command Execution via the cmd parameter to command.ph… | 2024-05-17T22:53:33.183000Z |
| var-202007-1255 | D-Link DIR-610 devices allow Information Disclosure via SERVICES=DEVICE.ACCOUNT%0AAUTHORI… | 2024-05-17T22:53:33.155000Z |
| var-202004-0541 | In the web-panel in IQrouter through 3.3.1, remote attackers can read system logs because… | 2024-05-17T22:53:33.622000Z |
| var-202004-0539 | In IQrouter through 3.3.1, the Lua function reset_password in the web-panel allows remote… | 2024-05-17T22:53:33.596000Z |
| var-202303-1193 | DrayTek Vigor2960 v1.5.1.4 allows an authenticated attacker with network access to the we… | 2024-05-17T22:53:23.590000Z |
| var-202312-0247 | A vulnerability has been found in D-Link DAR-7000 up to 20231126 and classified as critic… | 2024-05-17T22:53:21.037000Z |
| var-202402-0012 | Heap-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. By p… | 2024-05-17T22:53:20.357000Z |
| var-202402-0011 | Stack-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. Pro… | 2024-05-17T22:53:20.336000Z |
| var-202401-0630 | A vulnerability classified as problematic has been found in Totolink T6 4.1.9cu.5241_B202… | 2024-05-17T22:53:20.685000Z |
| var-202401-0462 | A vulnerability classified as critical was found in Totolink X2000R 1.0.0-B20221212.1452.… | 2024-05-17T22:53:20.724000Z |
| var-202405-0440 | Quantum 140CPU65150PL is a Unity processor in the Schneider Electric series. It combines … | 2024-05-17T22:53:18.549000Z |
| var-200212-0448 | NOTE: this issue has been disputed by the vendor. Symantec Norton AntiVirus (NAV) 2002 al… | 2024-05-17T22:53:16.670000Z |
| var-200904-0305 | NOTE: this issue has been disputed by the vendor. Buffer overflow in the PKI Web Service… | 2024-05-17T22:51:29.014000Z |
| var-201312-0320 | The TFTP service in Cisco Unified Communications Manager (aka CUCM or Unified CM) allows … | 2024-05-17T22:51:19.658000Z |
| var-201708-1530 | An issue was discovered in SMA Solar Technology products. By sending crafted packets to a… | 2024-05-17T22:51:11.192000Z |
| var-201806-0922 | An issue was discovered on Canon LBP6650, LBP3370, LBP3460, and LBP7750C devices. It is p… | 2024-05-17T22:51:09.788000Z |
| var-201907-1179 | D-Link DSL-2750U 1.11 is affected by: Authentication Bypass. The impact is: denial of ser… | 2024-05-17T22:51:07.117000Z |
| var-201907-1137 | Vivotek FD8136 devices allow Remote Command Injection, aka "another command injection vul… | 2024-05-17T22:51:07.153000Z |
| var-202108-1371 | D-Link DSR-500N version 1.02 contains hard-coded credentials for undocumented user accoun… | 2024-05-17T22:51:03.527000Z |
| var-202106-0546 | A CWE-20: Improper Input Validation vulnerability exists in PowerLogic EGX100 (Versions 3… | 2024-05-17T22:51:03.800000Z |
| var-202106-0545 | A CWE-20: Improper Input Validation vulnerability exists in PowerLogic EGX100 (Versions 3… | 2024-05-17T22:51:03.773000Z |
| var-202106-0544 | A CWE-20: Improper Input Validation vulnerability exists in PowerLogic EGX100 (Versions 3… | 2024-05-17T22:51:03.745000Z |
| var-202104-1463 | An issue was discovered on D-Link DIR-802 A1 devices through 1.00b05. Universal Plug and … | 2024-05-17T22:51:03.971000Z |
| var-202302-0098 | A vulnerability was found in TRENDnet TEW-652BRP 3.04b01. It has been classified as criti… | 2024-05-17T22:51:00.331000Z |
| var-202304-2229 | A vulnerability has been found in Netgear SRX5308 up to 4.3.5-3 and classified as problem… | 2024-05-17T22:50:55.936000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2007-000772 | Hitachi Web Server SSL Client Authentication Vulnerability | 2008-05-21T00:00+09:00 | 2014-05-23T18:32+09:00 |
| jvndb-2005-000601 | OpenSSL version rollback vulnerability | 2008-05-21T00:00+09:00 | 2014-05-22T18:04+09:00 |
| jvndb-2006-000992 | Multiple Vulnerabilities Concerning Hitachi Web Server | 2009-02-04T17:42+09:00 | 2014-05-22T18:03+09:00 |
| jvndb-2005-000727 | mod_imap cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2014-05-22T18:03+09:00 |
| jvndb-2007-000773 | Hitachi Web Server Cross-Site Scripting Vulnerability with Server-Status Page | 2008-05-21T00:00+09:00 | 2014-05-21T18:27+09:00 |
| jvndb-2009-001740 | Hitachi Web Server Reverse Proxy Denial of Service (DoS) Vulnerability | 2009-07-14T10:17+09:00 | 2014-05-21T18:24+09:00 |
| jvndb-2011-001633 | Header Customization by Hitachi Web Server RequetHeader Directive Could Allow Attacker to Access Data Deleted from Memory | 2011-06-29T17:54+09:00 | 2014-05-21T18:21+09:00 |
| jvndb-2008-001513 | Cross-Site Scripting Vulnerability in Hitachi Web Server Status Information Display Function | 2008-07-30T13:45+09:00 | 2014-05-21T18:19+09:00 |
| jvndb-2009-001741 | Hitachi Web Server Vulnerability in SSL Client Authentication | 2009-07-14T10:17+09:00 | 2014-05-21T18:16+09:00 |
| jvndb-2011-000053 | Android vulnerability where an incorrect SSL certificate is displayed | 2011-07-29T14:26+09:00 | 2014-05-19T17:19+09:00 |
| jvndb-2014-000042 | Cybozu Garoon Phone Messages vulnerable to denial-of-service (DoS) | 2014-04-30T15:14+09:00 | 2014-05-14T10:50+09:00 |
| jvndb-2014-000044 | intra-mart vulnerable to open redirect | 2014-05-08T12:46+09:00 | 2014-05-12T17:45+09:00 |
| jvndb-2014-000043 | Cybozu Garoon API access restriction bypass vulnerability | 2014-04-30T15:08+09:00 | 2014-05-08T18:06+09:00 |
| jvndb-2014-000040 | Cybozu Remote Service Manager vulnerable to session fixation | 2014-04-18T13:35+09:00 | 2014-04-28T18:14+09:00 |
| jvndb-2014-000039 | Cybozu Remote Service Manager vulnerable to denial-of-service (DoS) | 2014-04-18T13:40+09:00 | 2014-04-28T18:13+09:00 |
| jvndb-2014-000037 | AndExplorer vulnerable to directory traversal | 2014-04-18T12:39+09:00 | 2014-04-28T18:12+09:00 |
| jvndb-2014-000038 | TOSHIBA TEC e-Studio series vulnerable to cross-site request forgery | 2014-04-18T14:30+09:00 | 2014-04-28T18:11+09:00 |
| jvndb-2014-000036 | Content Provider in CamiApp for Android fails to restrict access permissions | 2014-04-14T13:45+09:00 | 2014-04-21T18:34+09:00 |
| jvndb-2014-000035 | SD Card Manager vulnerable to directory traversal | 2014-04-11T13:43+09:00 | 2014-04-16T18:22+09:00 |
| jvndb-2014-000041 | Redmine vulnerable to open redirect | 2014-04-16T15:06+09:00 | 2014-04-16T15:06+09:00 |
| jvndb-2014-000029 | sp mode mail vulnerability where Java methods may be executed | 2014-03-18T14:09+09:00 | 2014-03-25T19:25+09:00 |
| jvndb-2014-000028 | sp mode mail issue where emails in the process of creation may be accessed | 2014-03-18T14:08+09:00 | 2014-03-25T19:24+09:00 |
| jvndb-2014-000027 | sp mode mail issue when accessing attachments in incoming mail | 2014-03-18T14:07+09:00 | 2014-03-24T19:04+09:00 |
| jvndb-2014-000033 | ES File Explorer vulnerable to directory traversal | 2014-03-20T14:05+09:00 | 2014-03-24T18:50+09:00 |
| jvndb-2014-000032 | Silex vulnerable to cross-site scripting | 2014-03-20T14:02+09:00 | 2014-03-24T18:27+09:00 |
| jvndb-2014-000031 | Unzipper vulnerable to directory traversal | 2014-03-17T13:45+09:00 | 2014-03-19T15:15+09:00 |
| jvndb-2014-000030 | Demaecan for Android. contains an issue where it fails to verify SSL server certificates | 2014-03-17T13:43+09:00 | 2014-03-19T15:14+09:00 |
| jvndb-2013-000111 | Android OS vulnerable to arbitrary Java method execution | 2013-12-17T13:57+09:00 | 2014-03-05T17:27+09:00 |
| jvndb-2014-000025 | XooNIps vulnerable to cross-site scripting | 2014-02-26T15:19+09:00 | 2014-03-03T18:50+09:00 |
| jvndb-2014-000022 | Denny's App for Android. contains an issue where it fails to verify SSL server certificates | 2014-02-26T15:21+09:00 | 2014-03-03T18:49+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:02433-1 | Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) | 2025-07-21T11:33:36Z | 2025-07-21T11:33:36Z |
| suse-su-2025:02432-1 | Security update for iputils | 2025-07-21T11:23:54Z | 2025-07-21T11:23:54Z |
| suse-su-2025:02431-1 | Security update for iputils | 2025-07-21T11:23:49Z | 2025-07-21T11:23:49Z |
| suse-su-2025:02430-1 | Security update for iputils | 2025-07-21T11:23:21Z | 2025-07-21T11:23:21Z |
| suse-su-2025:02429-1 | Security update for rmt-server | 2025-07-21T11:04:10Z | 2025-07-21T11:04:10Z |
| suse-su-2025:20502-1 | Security update for iputils | 2025-07-21T10:04:01Z | 2025-07-21T10:04:01Z |
| suse-su-2025:02428-1 | Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) | 2025-07-21T09:04:15Z | 2025-07-21T09:04:15Z |
| suse-su-2025:02427-1 | Security update for python3 | 2025-07-21T08:54:02Z | 2025-07-21T08:54:02Z |
| suse-su-2025:02422-1 | Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5) | 2025-07-21T08:33:35Z | 2025-07-21T08:33:35Z |
| suse-su-2025:02421-1 | Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6) | 2025-07-21T08:05:09Z | 2025-07-21T08:05:09Z |
| suse-su-2025:02420-1 | Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6) | 2025-07-21T08:04:57Z | 2025-07-21T08:04:57Z |
| suse-su-2025:02419-1 | Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | 2025-07-21T08:04:52Z | 2025-07-21T08:04:52Z |
| suse-su-2025:02418-1 | Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3) | 2025-07-21T08:04:41Z | 2025-07-21T08:04:41Z |
| suse-su-2025:02416-1 | Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) | 2025-07-21T08:04:24Z | 2025-07-21T08:04:24Z |
| suse-su-2025:02415-1 | Security update for the Linux Kernel (Live Patch 63 for SLE 12 SP5) | 2025-07-21T08:04:13Z | 2025-07-21T08:04:13Z |
| suse-su-2025:02413-1 | Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6) | 2025-07-21T07:34:18Z | 2025-07-21T07:34:18Z |
| suse-su-2025:02412-1 | Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) | 2025-07-21T07:34:13Z | 2025-07-21T07:34:13Z |
| suse-su-2025:02411-1 | Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP6) | 2025-07-21T07:34:09Z | 2025-07-21T07:34:09Z |
| suse-su-2025:02410-1 | Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5) | 2025-07-21T07:34:05Z | 2025-07-21T07:34:05Z |
| suse-su-2025:02405-1 | Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP6) | 2025-07-21T07:07:13Z | 2025-07-21T07:07:13Z |
| suse-su-2025:02403-1 | Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 2025-07-21T07:07:03Z | 2025-07-21T07:07:03Z |
| suse-su-2025:02402-1 | Security update for the Linux Kernel (Live Patch 64 for SLE 12 SP5) | 2025-07-21T07:06:57Z | 2025-07-21T07:06:57Z |
| suse-su-2025:02401-1 | Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4) | 2025-07-21T06:34:10Z | 2025-07-21T06:34:10Z |
| suse-su-2025:02400-1 | Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4) | 2025-07-21T06:34:03Z | 2025-07-21T06:34:03Z |
| suse-su-2025:02399-1 | Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) | 2025-07-21T06:33:56Z | 2025-07-21T06:33:56Z |
| suse-su-2025:02398-1 | Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) | 2025-07-21T06:33:50Z | 2025-07-21T06:33:50Z |
| suse-su-2025:02396-1 | Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5) | 2025-07-21T06:33:38Z | 2025-07-21T06:33:38Z |
| suse-su-2025:02394-1 | Security update for the Linux Kernel (Live Patch 65 for SLE 12 SP5) | 2025-07-20T00:04:08Z | 2025-07-20T00:04:08Z |
| suse-su-2025:02393-1 | Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5) | 2025-07-19T18:03:51Z | 2025-07-19T18:03:51Z |
| suse-su-2025:02392-1 | Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5) | 2025-07-19T13:33:38Z | 2025-07-19T13:33:38Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-29166 | Apache OpenOffice安全绕过漏洞(CNVD-2025-29166) | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29165 | Apache OpenOffice信息泄露漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29164 | Apache OpenOffice安全绕过漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29162 | Dell SmartFabric OS10 Software命令注入漏洞(CNVD-2025-29162) | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29161 | Dell SmartFabric OS10 Software命令注入漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29160 | Dell SmartFabric OS10 Software代码注入漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29159 | Fortinet FortiWeb信任管理问题漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29158 | Fortinet FortiExtender缓冲区溢出漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29157 | Fortinet FortiClientWindows访问控制错误漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29156 | Fortinet FortiADC缓冲区溢出漏洞(CNVD-2025-29156) | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29155 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29155) | 2025-10-21 | 2025-11-21 |
| cnvd-2025-29154 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29154) | 2025-10-23 | 2025-11-21 |
| cnvd-2025-29152 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29152) | 2025-10-23 | 2025-11-21 |
| cnvd-2025-29151 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29151) | 2025-10-31 | 2025-11-21 |
| cnvd-2025-29150 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4信息泄露漏洞(CNVD-2025-29150) | 2025-10-31 | 2025-11-21 |
| cnvd-2025-29149 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4信息泄露漏洞(CNVD-2025-29149) | 2025-10-31 | 2025-11-21 |
| cnvd-2025-29148 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4命令执行漏洞 | 2025-10-31 | 2025-11-21 |
| cnvd-2025-29147 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4跨站脚本漏洞 | 2025-10-31 | 2025-11-21 |
| cnvd-2025-29146 | Vehicle Management edit1.php文件SQL注入漏洞 | 2024-09-24 | 2025-11-21 |
| cnvd-2025-29145 | Vehicle Management /filter3.php文件SQL注入漏洞 | 2025-08-01 | 2025-11-21 |
| cnvd-2025-29144 | Vehicle Management edit1.php文件SQL注入漏洞 | 2025-08-01 | 2025-11-21 |
| cnvd-2025-29143 | Vehicle Management updatebal.php文件SQL注入漏洞 | 2025-08-10 | 2025-11-21 |
| cnvd-2025-29142 | Vehicle Management print.php文件SQL注入漏洞 | 2025-08-10 | 2025-11-21 |
| cnvd-2025-29141 | Simple Online Hotel Reservation System index.php文件SQL注入漏洞 | 2025-06-27 | 2025-11-21 |
| cnvd-2025-29140 | Simple Online Hotel Reservation System edit_room.php文件SQL注入漏洞 | 2025-06-27 | 2025-11-21 |
| cnvd-2025-29139 | Simple Online Hotel Reservation System edit_query_account.php文件SQL注入漏洞 | 2025-06-27 | 2025-11-21 |
| cnvd-2025-29138 | Simple Online Hotel Reservation System add_query_reserve.php文件SQL注入漏洞 | 2025-11-18 | 2025-11-21 |
| cnvd-2025-29137 | Simple Online Hotel Reservation System edit_account.php文件SQL注入漏洞 | 2025-11-18 | 2025-11-21 |
| cnvd-2025-29136 | WordPress Like-it plugin跨站请求伪造漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29135 | WordPress Gutenify plugin跨站脚本漏洞 | 2025-11-20 | 2025-11-21 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0272 | Multiples vulnérabilités dans les produits Splunk | 2025-04-03T00:00:00.000000 | 2025-04-03T00:00:00.000000 |
| CERTFR-2025-AVI-0271 | Vulnérabilité dans Tenable Nessus Agent | 2025-04-03T00:00:00.000000 | 2025-04-03T00:00:00.000000 |
| CERTFR-2025-AVI-0270 | Multiples vulnérabilités dans les produits Cisco | 2025-04-03T00:00:00.000000 | 2025-04-03T00:00:00.000000 |
| certfr-2025-avi-0269 | Multiples vulnérabilités dans les produits Moxa | 2025-04-02T00:00:00.000000 | 2025-04-02T00:00:00.000000 |
| certfr-2025-avi-0268 | Vulnérabilité dans les produits VMware | 2025-04-02T00:00:00.000000 | 2025-04-02T00:00:00.000000 |
| certfr-2025-avi-0267 | Multiples vulnérabilités dans MongoDB Server | 2025-04-02T00:00:00.000000 | 2025-04-02T00:00:00.000000 |
| certfr-2025-avi-0266 | Multiples vulnérabilités dans les produits Mozilla | 2025-04-02T00:00:00.000000 | 2025-04-02T00:00:00.000000 |
| certfr-2025-avi-0264 | Multiples vulnérabilités dans Trend Micro Deep Security Agent | 2025-04-02T00:00:00.000000 | 2025-04-02T00:00:00.000000 |
| certfr-2025-avi-0263 | Multiples vulnérabilités dans HPE Aruba Networking Virtual Intranet Access | 2025-04-02T00:00:00.000000 | 2025-04-02T00:00:00.000000 |
| certfr-2025-avi-0262 | Multiples vulnérabilités dans les produits Kaspersky | 2025-04-02T00:00:00.000000 | 2025-04-02T00:00:00.000000 |
| CERTFR-2025-AVI-0269 | Multiples vulnérabilités dans les produits Moxa | 2025-04-02T00:00:00.000000 | 2025-04-02T00:00:00.000000 |
| CERTFR-2025-AVI-0268 | Vulnérabilité dans les produits VMware | 2025-04-02T00:00:00.000000 | 2025-04-02T00:00:00.000000 |
| CERTFR-2025-AVI-0267 | Multiples vulnérabilités dans MongoDB Server | 2025-04-02T00:00:00.000000 | 2025-04-02T00:00:00.000000 |
| CERTFR-2025-AVI-0266 | Multiples vulnérabilités dans les produits Mozilla | 2025-04-02T00:00:00.000000 | 2025-04-02T00:00:00.000000 |
| CERTFR-2025-AVI-0264 | Multiples vulnérabilités dans Trend Micro Deep Security Agent | 2025-04-02T00:00:00.000000 | 2025-04-02T00:00:00.000000 |
| CERTFR-2025-AVI-0263 | Multiples vulnérabilités dans HPE Aruba Networking Virtual Intranet Access | 2025-04-02T00:00:00.000000 | 2025-04-02T00:00:00.000000 |
| CERTFR-2025-AVI-0262 | Multiples vulnérabilités dans les produits Kaspersky | 2025-04-02T00:00:00.000000 | 2025-04-02T00:00:00.000000 |
| certfr-2025-avi-0261 | Multiples vulnérabilités dans Microsoft Azure | 2025-04-01T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| certfr-2025-avi-0260 | Multiples vulnérabilités dans Zabbix | 2025-04-01T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| certfr-2025-avi-0259 | Multiples vulnérabilités dans les produits Fortinet | 2025-04-01T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| CERTFR-2025-AVI-0261 | Multiples vulnérabilités dans Microsoft Azure | 2025-04-01T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| CERTFR-2025-AVI-0260 | Multiples vulnérabilités dans Zabbix | 2025-04-01T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| CERTFR-2025-AVI-0259 | Multiples vulnérabilités dans les produits Fortinet | 2025-04-01T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| certfr-2025-avi-0257 | Vulnérabilité dans Synology Mail Server | 2025-03-31T00:00:00.000000 | 2025-03-31T00:00:00.000000 |
| certfr-2025-avi-0256 | Multiples vulnérabilités dans Broadcom VMware Tanzu Greenplum | 2025-03-31T00:00:00.000000 | 2025-03-31T00:00:00.000000 |
| CERTFR-2025-AVI-0257 | Vulnérabilité dans Synology Mail Server | 2025-03-31T00:00:00.000000 | 2025-03-31T00:00:00.000000 |
| CERTFR-2025-AVI-0256 | Multiples vulnérabilités dans Broadcom VMware Tanzu Greenplum | 2025-03-31T00:00:00.000000 | 2025-03-31T00:00:00.000000 |
| certfr-2025-avi-0255 | Multiples vulnérabilités dans les produits IBM | 2025-03-28T00:00:00.000000 | 2025-03-28T00:00:00.000000 |
| certfr-2025-avi-0254 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-03-28T00:00:00.000000 | 2025-03-28T00:00:00.000000 |
| certfr-2025-avi-0253 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-03-28T00:00:00.000000 | 2025-03-28T00:00:00.000000 |