Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-54900 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-09-09T17:01:27.208Z | 2026-02-26T17:48:51.522Z |
| CVE-2025-54225 |
7.8 (3.1)
|
InDesign Desktop | Use After Free (CWE-416) |
Adobe |
InDesign Desktop |
2025-08-12T20:54:57.039Z | 2026-02-26T17:48:51.305Z |
| CVE-2025-54209 |
7.8 (3.1)
|
InDesign Desktop | Heap-based Buffer Overflow (CWE-122) |
Adobe |
InDesign Desktop |
2025-08-12T20:54:56.266Z | 2026-02-26T17:48:51.670Z |
| CVE-2025-54208 |
7.8 (3.1)
|
InDesign Desktop | Out-of-bounds Write (CWE-787) |
Adobe |
InDesign Desktop |
2025-08-12T20:54:55.490Z | 2026-02-26T17:48:51.990Z |
| CVE-2025-54115 |
7 (3.1)
|
Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-09-09T17:01:26.035Z | 2026-02-26T17:48:51.833Z |
| CVE-2025-55234 |
8.8 (3.1)
|
Windows SMB Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-09-09T17:01:32.635Z | 2026-02-26T17:48:50.660Z |
| CVE-2025-55224 |
7.8 (3.1)
|
Windows Hyper-V Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-09-09T17:01:31.548Z | 2026-02-26T17:48:50.960Z |
| CVE-2025-54256 |
8.6 (3.1)
|
Dreamweaver Desktop | Cross-Site Request Forgery (CSRF… |
Adobe |
Dreamweaver Desktop |
2025-09-09T18:17:30.369Z | 2026-02-26T17:48:50.297Z |
| CVE-2025-54224 |
7.8 (3.1)
|
InDesign Desktop | Use After Free (CWE-416) |
Adobe |
InDesign Desktop |
2025-08-12T20:54:59.419Z | 2026-02-26T17:48:50.123Z |
| CVE-2025-54213 |
7.8 (3.1)
|
InDesign Desktop | Out-of-bounds Write (CWE-787) |
Adobe |
InDesign Desktop |
2025-08-12T20:54:58.607Z | 2026-02-26T17:48:50.502Z |
| CVE-2025-54210 |
7.8 (3.1)
|
InDesign Desktop | Out-of-bounds Write (CWE-787) |
Adobe |
InDesign Desktop |
2025-08-12T20:54:57.814Z | 2026-02-26T17:48:50.820Z |
| CVE-2025-54257 |
7.8 (3.1)
|
Acrobat Reader | Use After Free (CWE-416) |
Adobe |
Acrobat Reader |
2025-09-09T20:08:48.397Z | 2026-02-26T17:48:49.658Z |
| CVE-2025-54242 |
7.8 (3.1)
|
Premiere Pro | Use After Free (CWE-416) |
Adobe |
Premiere Pro |
2025-09-09T18:27:11.668Z | 2026-02-26T17:48:49.971Z |
| CVE-2025-54211 |
7.8 (3.1)
|
InDesign Desktop | Heap-based Buffer Overflow (CWE-122) |
Adobe |
InDesign Desktop |
2025-08-12T20:55:02.152Z | 2026-02-26T17:48:49.210Z |
| CVE-2025-54207 |
7.8 (3.1)
|
InDesign Desktop | Access of Uninitialized Pointer (CWE-824) |
Adobe |
InDesign Desktop |
2025-08-12T20:55:01.275Z | 2026-02-26T17:48:49.818Z |
| CVE-2025-43491 |
7.3 (4.0)
|
Poly Lens Desktop Application – Privilege Escalation |
HP, Inc. |
Poly Lens |
2025-09-09T20:29:47.968Z | 2026-02-26T17:48:49.381Z |
| CVE-2025-23342 |
8.2 (3.1)
|
The NVIDIA NVDebug tool contains a vulnerability … |
NVIDIA |
NVDebug tool |
2025-09-09T21:02:30.077Z | 2026-02-26T17:48:49.029Z |
| CVE-2025-54221 |
7.8 (3.1)
|
InCopy | Out-of-bounds Write (CWE-787) |
Adobe |
InCopy |
2025-08-12T21:01:30.617Z | 2026-02-26T17:48:48.481Z |
| CVE-2025-54220 |
7.8 (3.1)
|
InCopy | Heap-based Buffer Overflow (CWE-122) |
Adobe |
InCopy |
2025-08-12T21:01:29.783Z | 2026-02-26T17:48:48.863Z |
| CVE-2025-54219 |
7.8 (3.1)
|
InCopy | Heap-based Buffer Overflow (CWE-122) |
Adobe |
InCopy |
2025-08-12T21:01:31.401Z | 2026-02-26T17:48:48.144Z |
| CVE-2025-23344 |
7.3 (3.1)
|
The NVIDIA NVDebug tool contains a vulnerability … |
NVIDIA |
NVDebug tool |
2025-09-09T21:03:28.237Z | 2026-02-26T17:48:48.319Z |
| CVE-2025-23343 |
7.6 (3.1)
|
The NVIDIA NVDebug tool contains a vulnerability … |
NVIDIA |
NVDebug tool |
2025-09-09T21:02:50.631Z | 2026-02-26T17:48:48.661Z |
| CVE-2025-58462 |
9.3 (4.0)
9.8 (3.1)
|
OPEXUS FOIAXpress PAL SQL injection |
OPEXUS |
FOIAXpress Public Access Link (PAL) |
2025-09-09T21:09:48.098Z | 2026-02-26T17:48:47.966Z |
| CVE-2025-54245 |
7.8 (3.1)
|
Substance3D - Viewer | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Viewer |
2025-09-09T21:10:25.377Z | 2026-02-26T17:48:47.774Z |
| CVE-2025-54243 |
7.8 (3.1)
|
Substance3D - Viewer | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Viewer |
2025-09-09T21:10:26.205Z | 2026-02-26T17:48:47.369Z |
| CVE-2025-54223 |
7.8 (3.1)
|
InCopy | Use After Free (CWE-416) |
Adobe |
InCopy |
2025-08-12T21:01:32.173Z | 2026-02-26T17:48:47.580Z |
| CVE-2025-54218 |
7.8 (3.1)
|
InCopy | Out-of-bounds Write (CWE-787) |
Adobe |
InCopy |
2025-08-12T21:01:32.983Z | 2026-02-26T17:48:47.098Z |
| CVE-2025-54260 |
7.8 (3.1)
|
Substance3D - Modeler | Out-of-bounds Read (CWE-125) |
Adobe |
Substance3D - Modeler |
2025-09-09T21:41:12.730Z | 2026-02-26T17:48:46.133Z |
| CVE-2025-54244 |
7.8 (3.1)
|
Substance3D - Viewer | Heap-based Buffer Overflow (CWE-122) |
Adobe |
Substance3D - Viewer |
2025-09-09T21:10:26.990Z | 2026-02-26T17:48:46.906Z |
| CVE-2025-54217 |
7.8 (3.1)
|
InCopy | Heap-based Buffer Overflow (CWE-122) |
Adobe |
InCopy |
2025-08-12T21:01:35.047Z | 2026-02-26T17:48:46.330Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-68844 |
7.1 (3.1)
|
WordPress Membee Login plugin <= 2.3.6 - Cross Site Sc… |
DaleAB |
Membee Login |
2026-02-20T15:46:42.323Z | 2026-02-23T21:48:03.999Z |
| CVE-2025-68843 |
7.1 (3.1)
|
WordPress FeedWordPress Advanced Filters plugin <= 0.6… |
Bas Schuiling |
FeedWordPress Advanced Filters |
2026-02-20T15:46:42.104Z | 2026-02-23T21:48:04.149Z |
| CVE-2025-68842 |
7.1 (3.1)
|
WordPress Widget Logic Visual plugin <= 1.52 - Reflect… |
totalbounty |
Widget Logic Visual |
2026-02-20T15:46:41.871Z | 2026-02-23T21:48:04.312Z |
| CVE-2025-68501 |
7.1 (3.1)
|
WordPress Mollie Payments for WooCommerce plugin <= 8.… |
Mollie |
Mollie Payments for WooCommerce |
2026-02-20T15:46:38.572Z | 2026-02-23T21:48:04.608Z |
| CVE-2025-68495 |
7.1 (3.1)
|
WordPress JetEngine plugin <= 3.8.0 - Reflected Cross … |
Crocoblock |
JetEngine |
2026-02-20T15:46:38.333Z | 2026-02-23T21:48:04.885Z |
| CVE-2025-68031 |
7.1 (3.1)
|
WordPress افزونه پیامک حرفه ای فراز اس ام اس plugin <=… |
faraz sms |
افزونه پیامک حرفه ای فراز اس ام اس |
2026-02-20T15:46:36.305Z | 2026-02-23T21:48:05.070Z |
| CVE-2025-67991 |
7.1 (3.1)
|
WordPress User Extra Fields plugin <= 16.8 - Cross Sit… |
vanquish |
User Extra Fields |
2026-02-20T15:46:32.315Z | 2026-02-23T21:48:05.306Z |
| CVE-2025-67990 |
7.1 (3.1)
|
WordPress GMap Targeting plugin <= 1.1.7 - Cross Site … |
RealMag777 |
GMap Targeting |
2026-02-20T15:46:32.120Z | 2026-02-23T21:48:05.571Z |
| CVE-2025-67984 |
7.1 (3.1)
|
WordPress NPS computy plugin <= 2.8.2 - Cross Site Scr… |
calliko |
NPS computy |
2026-02-20T15:46:31.564Z | 2026-02-23T21:48:05.709Z |
| CVE-2025-67978 |
7.1 (3.1)
|
WordPress Educare plugin <= 1.6.1 - Cross Site Scripti… |
FixBD |
Educare |
2026-02-20T15:46:30.665Z | 2026-02-23T21:48:05.850Z |
| CVE-2025-67972 |
7.1 (3.1)
|
WordPress Prague plugin <= 2.2.8 - Cross Site Scriptin… |
fox-themes |
Prague |
2026-02-20T15:46:29.103Z | 2026-02-23T21:48:05.989Z |
| CVE-2025-67971 |
7.1 (3.1)
|
WordPress FluentCart plugin < 1.3.0 - Cross Site Scrip… |
WPManageNinja |
FluentCart |
2026-02-20T15:46:28.917Z | 2026-02-23T21:48:06.125Z |
| CVE-2025-53237 |
7.1 (3.1)
|
WordPress WP Wizard Cloak Plugin <= 1.0.1 - Cross Site… |
Soflyy |
WP Wizard Cloak |
2026-02-20T15:46:27.310Z | 2026-02-23T21:48:06.274Z |
| CVE-2025-53233 |
7.1 (3.1)
|
WordPress Storyform plugin <= 0.6.14 - Cross Site Scri… |
RylanH |
Storyform |
2026-02-20T15:46:27.120Z | 2026-02-23T21:48:06.436Z |
| CVE-2026-22351 |
6.5 (3.1)
|
WordPress WP FullCalendar plugin <= 1.6 - Broken Acces… |
Marcus (aka @msykes) |
WP FullCalendar |
2026-02-20T15:47:00.722Z | 2026-02-23T20:57:03.618Z |
| CVE-2025-69393 |
7.5 (3.1)
|
WordPress Exzo theme <= 1.2.4 - Broken Access Control … |
Jthemes |
Exzo |
2026-02-20T15:46:55.856Z | 2026-02-23T21:01:44.923Z |
| CVE-2025-69380 |
7.5 (3.1)
|
WordPress Upload Files Anywhere plugin <= 2.8 - Arbitr… |
vanquish |
Upload Files Anywhere |
2026-02-20T15:46:53.401Z | 2026-02-23T21:02:21.465Z |
| CVE-2020-8908 |
3.3 (3.1)
|
Temp directory permission issue in Guava |
Google LLC |
Guava |
2020-12-10T22:10:58.000Z | 2024-08-04T10:12:10.998Z |
| CVE-2025-70064 |
8.8 (3.1)
|
PHPGurukul Hospital Management System v4.0 contai… |
n/a |
n/a |
2026-02-18T00:00:00.000Z | 2026-02-18T19:32:55.774Z |
| CVE-2025-70062 |
6.5 (3.1)
|
PHPGurukul Hospital Management System v4.0 contai… |
n/a |
n/a |
2026-02-18T00:00:00.000Z | 2026-02-18T19:41:02.963Z |
| CVE-2026-2886 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda A21 SetOnlineDevName set_device_name stack-based… |
Tenda |
A21 |
2026-02-21T21:02:11.930Z | 2026-02-23T19:31:15.738Z |
| CVE-2026-2870 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda A21 formSetQosBand set_qosMib_list stack-based o… |
Tenda |
A21 |
2026-02-21T14:32:12.603Z | 2026-02-23T19:37:36.449Z |
| CVE-2026-2871 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda A21 SetIpMacBind fromSetIpMacBind stack-based overflow |
Tenda |
A21 |
2026-02-21T15:32:09.853Z | 2026-02-23T19:38:22.083Z |
| CVE-2026-2872 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda A21 MAC Filtering Configuration Endpoint setBlac… |
Tenda |
A21 |
2026-02-21T16:02:10.216Z | 2026-02-23T19:39:05.567Z |
| CVE-2026-2873 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda A21 openSchedWifi setSchedWifi stack-based overflow |
Tenda |
A21 |
2026-02-21T16:32:07.564Z | 2026-02-23T19:24:56.776Z |
| CVE-2026-27119 |
5.1 (4.0)
|
Svelte affected by XSS in SSR `<option>` element |
sveltejs |
svelte |
2026-02-20T22:25:42.794Z | 2026-02-23T19:42:58.320Z |
| CVE-2026-27121 |
5.1 (4.0)
|
Svelte affected by cross-site scripting via spread att… |
sveltejs |
svelte |
2026-02-20T22:27:36.103Z | 2026-02-23T19:34:18.150Z |
| CVE-2026-27122 |
5.1 (4.0)
|
Svelte SSR does not validate dynamic element tag names… |
sveltejs |
svelte |
2026-02-20T22:28:37.824Z | 2026-02-23T19:23:03.403Z |
| CVE-2026-27125 |
5.3 (4.0)
|
Svelte SSR attribute spreading includes inherited prop… |
sveltejs |
svelte |
2026-02-20T22:29:45.364Z | 2026-02-25T21:33:14.822Z |
| CVE-2026-23643 |
5.4 (3.1)
|
CakePHP PaginatorHelper::limitControl() vulnerable to … |
cakephp |
cakephp |
2026-01-16T20:38:45.170Z | 2026-01-16T21:21:56.372Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-68843 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:13.000 | 2026-02-23T22:16:18.773 |
| fkie_cve-2025-68842 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:12.873 | 2026-02-23T22:16:18.583 |
| fkie_cve-2025-68501 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:10.100 | 2026-02-23T22:16:18.387 |
| fkie_cve-2025-68495 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:09.630 | 2026-02-23T22:16:18.190 |
| fkie_cve-2025-68031 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:08.087 | 2026-02-23T22:16:17.997 |
| fkie_cve-2025-67991 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:05.230 | 2026-02-23T22:16:17.807 |
| fkie_cve-2025-67990 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:05.100 | 2026-02-23T22:16:17.617 |
| fkie_cve-2025-67984 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:04.710 | 2026-02-23T22:16:17.430 |
| fkie_cve-2025-67978 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:04.063 | 2026-02-23T22:16:17.233 |
| fkie_cve-2025-67972 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:03.430 | 2026-02-23T22:16:17.043 |
| fkie_cve-2025-67971 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:03.293 | 2026-02-23T22:16:16.837 |
| fkie_cve-2025-53237 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:02.223 | 2026-02-23T22:16:16.620 |
| fkie_cve-2025-53233 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-20T16:22:02.077 | 2026-02-23T22:16:16.373 |
| fkie_cve-2026-22351 | Missing Authorization vulnerability in Marcus (aka @msykes) WP FullCalendar wp-fullcalendar allows … | 2026-02-20T16:22:34.237 | 2026-02-23T21:19:09.807 |
| fkie_cve-2025-69393 | Missing Authorization vulnerability in Jthemes Exzo exzo allows Exploiting Incorrectly Configured A… | 2026-02-20T16:22:24.840 | 2026-02-23T21:19:08.873 |
| fkie_cve-2025-69380 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in van… | 2026-02-20T16:22:22.570 | 2026-02-23T21:19:08.670 |
| fkie_cve-2020-8908 | A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with … | 2020-12-10T23:15:13.973 | 2026-02-23T21:17:30.437 |
| fkie_cve-2025-70064 | PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulnerability. A low-pri… | 2026-02-18T19:21:42.493 | 2026-02-23T21:03:37.660 |
| fkie_cve-2025-70062 | PHPGurukul Hospital Management System v4.0 contains a Cross-Site Request Forgery (CSRF) vulnerabili… | 2026-02-18T19:21:42.270 | 2026-02-23T21:03:09.027 |
| fkie_cve-2026-2886 | A weakness has been identified in Tenda A21 1.0.0.0. This affects the function set_device_name of t… | 2026-02-21T21:16:11.217 | 2026-02-23T21:00:35.513 |
| fkie_cve-2026-2870 | A security flaw has been discovered in Tenda A21 1.0.0.0. Affected by this issue is the function se… | 2026-02-21T15:15:59.643 | 2026-02-23T21:00:00.257 |
| fkie_cve-2026-2871 | A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of … | 2026-02-21T16:16:05.133 | 2026-02-23T20:59:13.240 |
| fkie_cve-2026-2872 | A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerability affects the fun… | 2026-02-21T16:16:05.390 | 2026-02-23T20:57:59.307 |
| fkie_cve-2026-2873 | A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the function setSchedWifi of … | 2026-02-21T17:15:58.987 | 2026-02-23T20:56:58.853 |
| fkie_cve-2026-27119 | svelte performance oriented web framework. From 5.39.3, <=5.51.4, in certain circumstances, the ser… | 2026-02-20T23:16:02.360 | 2026-02-23T20:54:04.723 |
| fkie_cve-2026-27121 | svelte performance oriented web framework. Versions of svelte prior to 5.51.5 are vulnerable to cro… | 2026-02-20T23:16:02.503 | 2026-02-23T20:53:34.367 |
| fkie_cve-2026-27122 | svelte performance oriented web framework. Prior to 5.51.5, when using <svelte:element this={tag}> … | 2026-02-20T23:16:02.640 | 2026-02-23T20:53:01.857 |
| fkie_cve-2026-27125 | svelte performance oriented web framework. Prior to 5.51.5, in server-side rendering, attribute spr… | 2026-02-20T23:16:02.780 | 2026-02-23T20:52:23.960 |
| fkie_cve-2026-23643 | CakePHP is a rapid development framework for PHP. The PaginatorHelper::limitControl() method has a … | 2026-01-16T21:15:51.543 | 2026-02-23T20:51:11.360 |
| fkie_cve-2026-27169 | OpenSift is an AI study tool that sifts through large datasets using semantic search and generative… | 2026-02-21T00:16:16.810 | 2026-02-23T20:50:36.870 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-mg5h-rhjq-6v84 |
6.1 (3.1)
|
phpMyFAQ vulnerable to reflected Cross-site Scripting | 2022-10-31T12:00:18Z | 2026-02-18T23:33:51Z |
| ghsa-gx7g-wjxg-jwwj |
3.5 (3.1)
|
Cross-Site Request Forgery in YOURLS | 2022-04-04T00:00:55Z | 2026-02-18T23:33:34Z |
| ghsa-pqqf-7hxm-rj5r |
7.6 (3.1)
|
Leaky JWTs in OpenMetadata exposing highly-privileged bot users | 2026-02-11T14:23:02Z | 2026-02-18T23:30:21Z |
| ghsa-3m4q-jmj6-r34q |
7.1 (3.1)
|
Keras has a Local File Disclosure via HDF5 External Storage During Keras Weight Loading | 2026-02-18T22:41:58Z | 2026-02-18T22:41:58Z |
| ghsa-c5w7-m8wf-xc77 |
8.7 (4.0)
|
Apache NiFi: Missing Authorization of Restricted Permissions for Component Updates | 2026-02-17T12:31:07Z | 2026-02-18T22:39:26Z |
| ghsa-gfmx-qqqh-f38q |
7.1 (4.0)
|
Duplicate Advisory: Keras vulnerable to arbitrary file read in the model loading mechanism (HDF5 in… | 2026-02-12T00:31:03Z | 2026-02-18T22:38:48Z |
| ghsa-79q9-wc6p-cf92 |
8.8 (3.1)
|
LibreNMS has a Time-Based Blind SQL Injection in address-search.inc.php | 2026-02-18T22:31:37Z | 2026-02-18T22:31:37Z |
| ghsa-h3rv-q4rq-pqcv |
|
LibreNMS: SQL Injection in ajax_table.php spreads through a covert data stream. | 2026-02-18T22:30:18Z | 2026-02-18T22:30:18Z |
| ghsa-wx95-c6cv-8532 |
5.3 (3.1)
|
Nokogiri does not check the return value from xmlC14NExecute | 2026-02-18T21:57:38Z | 2026-02-18T21:57:38Z |
| ghsa-r8p8-qw9w-j9qv |
7.5 (4.0)
|
pretix unsafely evaluates variables in emails | 2026-02-16T12:30:25Z | 2026-02-18T21:44:45Z |
| ghsa-xrj7-v4x4-74hr |
3.3 (3.1)
|
A flaw was found in QEMU in the uefi-vars virtual device. When the guest writes to register UEFI_VA… | 2026-02-18T21:31:23Z | 2026-02-18T21:31:23Z |
| ghsa-xj75-gfvf-4g86 |
7.7 (3.1)
|
The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has … | 2026-02-18T21:31:23Z | 2026-02-18T21:31:23Z |
| ghsa-vmr8-g4h2-2x5j |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in Rongzhitong Visual Integrated Command and Dispatch Platform up to 2026… | 2026-02-18T21:31:23Z | 2026-02-18T21:31:23Z |
| ghsa-rwf8-6fj2-4vrx |
6.3 (3.1)
2.1 (4.0)
|
A security vulnerability has been detected in Alixhan xh-admin-backend up to 1.7.0. This issue affe… | 2026-02-18T21:31:23Z | 2026-02-18T21:31:23Z |
| ghsa-pppv-pc54-6j8r |
3.3 (3.1)
1.9 (4.0)
|
A security flaw has been discovered in Squirrel up to 3.2. This affects the function SQObjectPtr::o… | 2026-02-18T21:31:22Z | 2026-02-18T21:31:23Z |
| ghsa-mjjq-x58m-rfxp |
3.3 (3.1)
1.9 (4.0)
|
A weakness has been identified in FascinatedBox lily up to 2.3. This vulnerability affects the func… | 2026-02-18T21:31:23Z | 2026-02-18T21:31:23Z |
| ghsa-jx8h-vrjj-cm6g |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability has been found in Rongzhitong Visual Integrated Command and Dispatch Platform up to… | 2026-02-18T21:31:23Z | 2026-02-18T21:31:23Z |
| ghsa-gwrh-w4f9-ffc9 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was detected in huanzi-qch base-admin up to 57a8126bb3353a004f3c7722089e3b926ea8359… | 2026-02-18T21:31:23Z | 2026-02-18T21:31:23Z |
| ghsa-gq25-pccv-6q8j |
5.5 (3.1)
|
A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploi… | 2026-02-18T21:31:23Z | 2026-02-18T21:31:23Z |
| ghsa-cq5p-w4x6-m6h3 |
3.3 (3.1)
1.9 (4.0)
|
A vulnerability was identified in FascinatedBox lily up to 2.3. Affected by this issue is the funct… | 2026-02-18T21:31:22Z | 2026-02-18T21:31:23Z |
| ghsa-9f49-2j27-6f79 |
6.3 (3.1)
|
A flaw was found in the rgaufman/live555 fork of live555. A remote attacker could exploit a segment… | 2026-02-18T21:31:23Z | 2026-02-18T21:31:23Z |
| ghsa-7qhw-4fcq-2g37 |
4.8 (3.1)
|
An insufficient entropy vulnerability was found in glibc. The getrandom and arc4random family of fu… | 2026-02-18T21:31:23Z | 2026-02-18T21:31:23Z |
| ghsa-4pq4-6gr5-cr69 |
6.5 (3.1)
|
An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this fla… | 2026-02-18T21:31:23Z | 2026-02-18T21:31:23Z |
| ghsa-wjf9-j9vw-27f4 |
8.8 (3.1)
|
PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulnerability. A low-pri… | 2026-02-18T21:31:22Z | 2026-02-18T21:31:22Z |
| ghsa-v3v9-r7ff-976x |
9.8 (3.1)
|
CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in print_membership_card.… | 2026-02-18T18:30:40Z | 2026-02-18T21:31:22Z |
| ghsa-rcjr-qg8v-4c3v |
7.8 (3.1)
|
A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-o… | 2026-02-18T21:31:22Z | 2026-02-18T21:31:22Z |
| ghsa-m4v3-95xp-3j5h |
7.5 (3.1)
|
Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWorlds Online Time Ta… | 2026-02-18T18:30:40Z | 2026-02-18T21:31:22Z |
| ghsa-h5jq-923c-7w8g |
7.8 (3.1)
|
A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out… | 2026-02-18T21:31:22Z | 2026-02-18T21:31:22Z |
| ghsa-ff7j-jwgr-hgxp |
6.5 (3.1)
7.1 (4.0)
|
Improper Access Control (IDOR) in the Graylog API, version 2.2.3, which occurs when modifying the u… | 2026-02-18T15:31:26Z | 2026-02-18T21:31:22Z |
| ghsa-cw7v-qx8m-563q |
6.1 (3.1)
5.3 (4.0)
|
Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.… | 2026-02-18T15:31:26Z | 2026-02-18T21:31:22Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-209 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:34.191182Z |
| pysec-2021-208 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:34.015475Z |
| pysec-2021-207 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:33.847369Z |
| pysec-2021-206 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:33.683964Z |
| pysec-2021-205 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:33.499981Z |
| pysec-2021-204 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:33.334705Z |
| pysec-2021-203 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can wr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:33.149908Z |
| pysec-2021-202 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:32.984830Z |
| pysec-2021-201 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:32.823380Z |
| pysec-2021-200 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:32.655132Z |
| pysec-2021-199 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:32.482991Z |
| pysec-2021-198 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:32.310582Z |
| pysec-2021-197 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:32.127822Z |
| pysec-2021-196 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ac… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:31.940947Z |
| pysec-2021-195 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:31.758663Z |
| pysec-2021-194 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:31.559796Z |
| pysec-2021-193 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:31.368222Z |
| pysec-2021-192 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:31.200110Z |
| pysec-2021-191 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T19:15:00Z | 2021-08-27T03:22:31.001831Z |
| pysec-2021-190 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can re… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:30.834118Z |
| pysec-2021-189 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:30.663551Z |
| pysec-2021-188 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:30.499582Z |
| pysec-2021-187 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:30.332227Z |
| pysec-2021-186 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:30.167299Z |
| pysec-2021-185 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:29.986611Z |
| pysec-2021-184 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:29.791310Z |
| pysec-2021-183 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:29.613359Z |
| pysec-2021-182 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:29.446413Z |
| pysec-2021-181 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:29.285990Z |
| pysec-2021-180 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:29.100995Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32314 | Tenda AC500 V2.0.1.9(1307) firmware contains a command injection vulnerablility in the fo… | 2024-04-13T05:02:29.141246Z |
| gsd-2024-32313 | Tenda FH1205 V2.0.0.7(775) firmware has a stack overflow vulnerability located via the ad… | 2024-04-13T05:02:29.100603Z |
| gsd-2024-32312 | Tenda F1203 V2.0.1.6 firmware has a stack overflow vulnerability located in the adslPwd p… | 2024-04-13T05:02:29.087625Z |
| gsd-2024-32311 | Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability via the adslPwd paramet… | 2024-04-13T05:02:29.088331Z |
| gsd-2024-32310 | Tenda F1203 V2.0.1.6 firmware has a stack overflow vulnerability located in the PPW param… | 2024-04-13T05:02:29.096894Z |
| gsd-2024-32309 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.060127Z |
| gsd-2024-32308 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.099324Z |
| gsd-2024-32307 | Tenda FH1205 V2.0.0.7(775) firmware has a stack overflow vulnerability located via the PP… | 2024-04-13T05:02:29.138172Z |
| gsd-2024-32306 | Tenda AC10U v1.0 Firmware v15.03.06.49 has a stack overflow vulnerability located via the… | 2024-04-13T05:02:29.033558Z |
| gsd-2024-32305 | Tenda A18 v15.03.05.05 firmware has a stack overflow vulnerability located via the PPW pa… | 2024-04-13T05:02:29.146740Z |
| gsd-2024-32304 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.091970Z |
| gsd-2024-32303 | Tenda AC15 v15.03.20_multi, v15.03.05.19, and v15.03.05.18 firmware has a stack overflow … | 2024-04-13T05:02:29.106667Z |
| gsd-2024-32302 | Tenda FH1202 v1.2.0.14(408) firmware has a stack overflow vulnerability via the PPW param… | 2024-04-13T05:02:29.038353Z |
| gsd-2024-32301 | Tenda AC7V1.0 v15.03.06.44 firmware has a stack overflow vulnerability via the PPW parame… | 2024-04-13T05:02:29.098727Z |
| gsd-2024-32300 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.119097Z |
| gsd-2024-32299 | Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability via the PPW parameter i… | 2024-04-13T05:02:29.074429Z |
| gsd-2024-32298 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.035001Z |
| gsd-2024-32297 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.044265Z |
| gsd-2024-32296 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.147932Z |
| gsd-2024-32295 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.056642Z |
| gsd-2024-32294 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.121711Z |
| gsd-2024-32293 | Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the page p… | 2024-04-13T05:02:29.029276Z |
| gsd-2024-32292 | Tenda W30E v1.0 V1.0.1.25(633) firmware contains a command injection vulnerablility in th… | 2024-04-13T05:02:29.057169Z |
| gsd-2024-32291 | Tenda W30E v1.0 firmware v1.0.1.25(633) has a stack overflow vulnerability via the page p… | 2024-04-13T05:02:29.094216Z |
| gsd-2024-32290 | Tenda W30E v1.0 v1.0.1.25(633) firmware has a stack overflow vulnerability via the page p… | 2024-04-13T05:02:29.137141Z |
| gsd-2024-32289 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.122766Z |
| gsd-2024-32288 | Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability located via th… | 2024-04-13T05:02:29.058945Z |
| gsd-2024-32287 | Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the qos pa… | 2024-04-13T05:02:29.086027Z |
| gsd-2024-32286 | Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability located via th… | 2024-04-13T05:02:29.105297Z |
| gsd-2024-32285 | Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the passwo… | 2024-04-13T05:02:29.039000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-9 | Malicious code in 511fola (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| mal-2026-23 | Malicious code in showdownxss (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| mal-2026-22 | Malicious code in pkg1bate5apg1 (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| mal-2026-20 | Malicious code in kid-api (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| mal-2026-19 | Malicious code in jest-config-ibm-cloud-cognitive (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| mal-2026-17 | Malicious code in identity-emitter (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| mal-2026-15 | Malicious code in eslint-config-skynet (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| mal-2026-11 | Malicious code in cc-double-1 (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| mal-2026-10 | Malicious code in babel-preset-ibm-cloud-cognitive (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| MAL-2026-9 | Malicious code in 511fola (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| MAL-2026-23 | Malicious code in showdownxss (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| MAL-2026-22 | Malicious code in pkg1bate5apg1 (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| MAL-2026-20 | Malicious code in kid-api (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| MAL-2026-19 | Malicious code in jest-config-ibm-cloud-cognitive (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| MAL-2026-17 | Malicious code in identity-emitter (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| MAL-2026-15 | Malicious code in eslint-config-skynet (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| MAL-2026-11 | Malicious code in cc-double-1 (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| MAL-2026-10 | Malicious code in babel-preset-ibm-cloud-cognitive (npm) | 2026-01-02T22:06:48Z | 2026-01-02T22:06:48Z |
| mal-2025-192988 | Malicious code in yellowdiscordlookup (npm) | 2025-12-30T17:01:58Z | 2026-01-02T21:37:31Z |
| mal-2025-192888 | Malicious code in workvivo-layout-extension (npm) | 2025-12-23T08:36:36Z | 2026-01-02T21:37:31Z |
| mal-2025-192887 | Malicious code in workvivo-chatbot (npm) | 2025-12-23T08:36:36Z | 2026-01-02T21:37:31Z |
| mal-2025-192886 | Malicious code in workvivo-anniversary-automation (npm) | 2025-12-23T08:36:35Z | 2026-01-02T21:37:31Z |
| mal-2025-192885 | Malicious code in wealthbox-marketing (npm) | 2025-12-23T08:35:44Z | 2026-01-02T21:37:31Z |
| mal-2025-192884 | Malicious code in vite-react-setting (npm) | 2025-12-23T08:35:16Z | 2026-01-02T21:37:31Z |
| mal-2025-192883 | Malicious code in varshade-afc (npm) | 2025-12-23T08:34:50Z | 2026-01-02T21:37:31Z |
| mal-2025-192882 | Malicious code in vapark-boost-v1 (npm) | 2025-12-23T08:34:49Z | 2026-01-02T21:37:31Z |
| mal-2025-192881 | Malicious code in typeface-maison-neue (npm) | 2025-12-23T08:34:00Z | 2026-01-02T21:37:31Z |
| mal-2025-192880 | Malicious code in tierlist (npm) | 2025-12-23T08:33:32Z | 2026-01-02T21:37:31Z |
| MAL-2025-192988 | Malicious code in yellowdiscordlookup (npm) | 2025-12-30T17:01:58Z | 2026-01-02T21:37:31Z |
| MAL-2025-192888 | Malicious code in workvivo-layout-extension (npm) | 2025-12-23T08:36:36Z | 2026-01-02T21:37:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0154 | phpMyAdmin: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2025-01-21T23:00:00.000+00:00 | 2025-04-08T22:00:00.000+00:00 |
| wid-sec-w-2024-1772 | Red Hat OpenShift: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-08-06T22:00:00.000+00:00 | 2025-04-08T22:00:00.000+00:00 |
| wid-sec-w-2023-0301 | phpMyAdmin: Schwachstelle ermöglicht Cross-Site Scripting | 2023-02-07T23:00:00.000+00:00 | 2025-04-08T22:00:00.000+00:00 |
| wid-sec-w-2025-0738 | Fluent Bit: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-04-07T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0737 | ESET NOD32 Antivirus, Endpoint Security and Server Security: Schwachstelle ermöglicht Codeausführung | 2025-04-07T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0736 | Siemens SIMATIC S7: Schwachstelle ermöglicht Denial of Service | 2025-04-07T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0735 | Zoom Video Communications Workplace und Rooms: Mehrere Schwachstellen | 2025-04-07T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0729 | Red Hat JBoss Enterprise Application Platform und WildFly: Schwachstelle ermöglicht Codeausführung | 2025-04-07T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0727 | Axis Axis OS: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-04-07T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0726 | Samsung Android: Mehrere Schwachstellen | 2025-04-07T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0725 | Dell PowerScale OneFS: Mehrere Schwachstellen | 2025-04-07T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0724 | Red Hat Ansible Automation Platform: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-04-07T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0722 | PowerDNS: Schwachstelle ermöglicht Denial of Service | 2025-04-07T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0721 | IBM App Connect Enterprise: Schwachstelle ermöglicht Denial of Service | 2025-04-07T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0720 | Graylog: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-04-07T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0715 | Perl: Mehrere Schwachstellen | 2017-01-15T23:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0170 | Red Hat OpenStack (ironic): Schwachstelle ermöglicht Manipulation von Dateien | 2025-01-22T23:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2024-1947 | Dell BIOS: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2024-08-28T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2024-1842 | HPE ProLiant undSynergy: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2024-08-13T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2024-1437 | Dell integrated Dell Remote Access Controller: Mehrere Schwachstellen | 2024-06-24T22:00:00.000+00:00 | 2025-04-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0717 | Flowise: Schwachstelle ermöglicht Manipulation von Dateien | 2025-04-06T22:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0716 | Perl: Schwachstelle ermöglicht Codeausführung | 2017-01-04T23:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0714 | MinIO: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-04-06T22:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0684 | Zammad: Mehrere Schwachstellen | 2025-04-01T22:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0651 | Mozilla Firefox und Firefox ESR: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-03-27T23:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0561 | Ruby SAML: Mehrere Schwachstellen | 2025-03-13T23:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0497 | Apache Traffic Server: Mehrere Schwachstellen | 2025-03-05T23:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2024-3466 | Apache Traffic Server: Mehrere Schwachstellen | 2024-11-13T23:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2024-2135 | VMware Tanzu Spring Framework: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-09-12T22:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2022-0612 | BusyBox: Schwachstelle ermöglicht Codeausführung | 2022-04-03T22:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:17742 | Red Hat Security Advisory: vim security update | 2025-10-13T02:18:48+00:00 | 2026-02-27T16:34:01+00:00 |
| rhsa-2025:17740 | Red Hat Security Advisory: compat-libtiff3 security update | 2025-10-13T01:21:38+00:00 | 2026-02-27T16:33:59+00:00 |
| rhsa-2025:17739 | Red Hat Security Advisory: compat-libtiff3 security update | 2025-10-13T01:25:23+00:00 | 2026-02-27T16:33:58+00:00 |
| rhsa-2025:17738 | Red Hat Security Advisory: compat-libtiff3 security update | 2025-10-13T01:20:48+00:00 | 2026-02-27T16:33:58+00:00 |
| rhsa-2025:17715 | Red Hat Security Advisory: vim security update | 2025-10-09T19:23:45+00:00 | 2026-02-27T16:33:56+00:00 |
| rhsa-2025:17710 | Red Hat Security Advisory: compat-libtiff3 security update | 2025-10-09T18:49:10+00:00 | 2026-02-27T16:33:55+00:00 |
| rhsa-2025:17675 | Red Hat Security Advisory: compat-libtiff3 security update | 2025-10-09T10:52:59+00:00 | 2026-02-27T16:33:55+00:00 |
| rhsa-2025:17651 | Red Hat Security Advisory: compat-libtiff3 security update | 2025-10-09T08:09:38+00:00 | 2026-02-27T16:33:54+00:00 |
| rhsa-2025:17644 | Red Hat Security Advisory: vim security update | 2025-10-09T07:19:29+00:00 | 2026-02-27T16:33:52+00:00 |
| rhsa-2025:13941 | Red Hat Security Advisory: golang security update | 2025-08-18T00:42:23+00:00 | 2026-02-27T16:33:52+00:00 |
| rhsa-2025:13935 | Red Hat Security Advisory: golang security update | 2025-08-18T00:53:52+00:00 | 2026-02-27T16:33:50+00:00 |
| rhsa-2026:2866 | Red Hat Security Advisory: python3.12-wheel security update | 2026-02-18T02:23:14+00:00 | 2026-02-27T16:32:11+00:00 |
| rhsa-2026:2865 | Red Hat Security Advisory: python-wheel security update | 2026-02-18T01:51:46+00:00 | 2026-02-27T16:32:09+00:00 |
| rhsa-2026:2823 | Red Hat Security Advisory: Updated discovery-cli release RPM versions 2.4.3 | 2026-02-17T15:39:37+00:00 | 2026-02-27T16:32:09+00:00 |
| rhsa-2026:2710 | Red Hat Security Advisory: python3.12-wheel security update | 2026-02-16T10:46:56+00:00 | 2026-02-27T16:32:01+00:00 |
| rhsa-2026:2672 | Red Hat Security Advisory: OpenShift Container Platform 4.17.49 bug fix and security update | 2026-02-18T08:43:43+00:00 | 2026-02-27T16:31:59+00:00 |
| rhsa-2026:2145 | Red Hat Security Advisory: Kiali 1.73.26 for Red Hat OpenShift Service Mesh 2.6 | 2026-02-05T15:53:57+00:00 | 2026-02-27T16:31:47+00:00 |
| rhsa-2026:2090 | Red Hat Security Advisory: python3.12-wheel security update | 2026-02-05T13:26:00+00:00 | 2026-02-27T16:31:43+00:00 |
| rhsa-2026:2078 | Red Hat Security Advisory: OpenShift Container Platform 4.18.33 bug fix and security update | 2026-02-11T04:27:02+00:00 | 2026-02-27T16:31:41+00:00 |
| rhsa-2026:1902 | Red Hat Security Advisory: python-wheel security update | 2026-02-04T11:59:01+00:00 | 2026-02-27T16:31:41+00:00 |
| rhsa-2026:1939 | Red Hat Security Advisory: python3.12-wheel security update | 2026-02-04T19:31:27+00:00 | 2026-02-27T16:31:40+00:00 |
| rhsa-2026:1000 | Red Hat Security Advisory: OpenShift Container Platform 4.20.12 bug fix and security update | 2026-01-27T14:30:57+00:00 | 2026-02-27T16:31:03+00:00 |
| rhsa-2026:0761 | Red Hat Security Advisory: Red Hat build of Cryostat security update | 2026-01-19T03:34:11+00:00 | 2026-02-27T16:30:59+00:00 |
| rhsa-2025:8078 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.3 | 2025-05-21T19:20:03+00:00 | 2026-02-27T16:30:28+00:00 |
| rhsa-2025:0876 | Red Hat Security Advisory: OpenShift Container Platform 4.17.15 bug fix and security update | 2025-02-05T13:37:42+00:00 | 2026-02-27T16:26:56+00:00 |
| rhsa-2025:0692 | Red Hat Security Advisory: redis:7 security update | 2025-01-27T01:43:02+00:00 | 2026-02-27T16:26:48+00:00 |
| rhsa-2025:0323 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.14.13 Bug Fix Update | 2025-01-15T01:19:29+00:00 | 2026-02-27T16:26:35+00:00 |
| rhsa-2025:0164 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.15.9 Bug Fix Update | 2025-01-09T11:27:57+00:00 | 2026-02-27T16:26:34+00:00 |
| rhsa-2024:9885 | Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.2.0 | 2024-11-18T15:17:19+00:00 | 2026-02-27T16:26:32+00:00 |
| rhsa-2024:8507 | Red Hat Security Advisory: grafana security update | 2024-10-28T10:01:19+00:00 | 2026-02-27T16:26:32+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-23-026-07 | Landis+Gyr E850 | 2023-01-26T00:00:00.000000Z | 2023-01-26T00:00:00.000000Z |
| icsa-23-026-06 | Rockwell Automation products using GoAhead Web Server | 2023-01-26T00:00:00.000000Z | 2023-01-26T00:00:00.000000Z |
| icsa-23-026-05 | Mitsubishi Electric MELFA SD/SQ series and F-series Robot Controllers | 2023-01-26T00:00:00.000000Z | 2023-01-26T00:00:00.000000Z |
| icsa-23-026-04 | Sierra Wireless AirLink Router with ALEOS Software | 2023-01-26T00:00:00.000000Z | 2023-01-26T00:00:00.000000Z |
| icsa-23-026-03 | Snap One Wattbox WB-300-IP-3 | 2023-01-26T00:00:00.000000Z | 2023-01-26T00:00:00.000000Z |
| icsa-23-026-01 | Delta Electronics CNCSoft ScreenEditor | 2023-01-26T00:00:00.000000Z | 2023-01-26T00:00:00.000000Z |
| icsa-23-024-01 | XINJE XD | 2023-01-24T00:00:00.000000Z | 2023-01-24T00:00:00.000000Z |
| icsa-23-019-01 | Hitachi Energy PCU400 | 2023-01-19T00:00:00.000000Z | 2023-01-19T00:00:00.000000Z |
| icsa-22-347-03 | Contec CONPROSYS HMI System (CHS) | 2022-12-13T00:00:00.000000Z | 2023-01-19T00:00:00.000000Z |
| icsa-22-298-07 | Delta Electronics InfraSuite Device Master | 2022-10-25T00:00:00.000000Z | 2023-01-18T00:00:00.000000Z |
| icsa-23-017-01 | GE Digital Proficy Historian | 2023-01-17T00:00:00.000000Z | 2023-01-17T00:00:00.000000Z |
| icsa-23-012-07 | Hitachi Energy Lumada APM | 2023-01-12T00:00:00.000000Z | 2023-01-12T00:00:00.000000Z |
| icsa-23-012-06 | Johnson Controls Metasys | 2023-01-12T00:00:00.000000Z | 2023-01-12T00:00:00.000000Z |
| icsa-23-012-05 | SAUTER Controls Nova 200 - 220 Series (PLC 6) | 2023-01-12T00:00:00.000000Z | 2023-01-12T00:00:00.000000Z |
| icsa-23-012-04 | Panasonic Sanyo CCTV Network Camera | 2023-01-12T00:00:00.000000Z | 2023-01-12T00:00:00.000000Z |
| icsa-23-012-03 | InHand Networks InRouter | 2023-01-12T00:00:00.000000Z | 2023-01-12T00:00:00.000000Z |
| icsa-23-012-02 | RONDS Equipment Predictive Maintenance Solution | 2023-01-12T00:00:00.000000Z | 2023-01-12T00:00:00.000000Z |
| icsa-23-012-01 | Sewio RTLS Studio | 2023-01-12T00:00:00.000000Z | 2023-01-12T00:00:00.000000Z |
| icsa-23-017-03 | Siemens SINEC INS | 2023-01-10T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-23-012-11 | Siemens Solid Edge before V2023 MP1 | 2023-01-10T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-23-012-09 | Siemens Mendix SAML Module | 2023-01-10T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-23-010-01 | Black Box KVM | 2023-01-10T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-22-349-13 | Siemens Mendix Workflow Commons | 2022-12-13T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-22-349-06 | Siemens SIMATIC WinCC OA Ultralight Client | 2022-12-13T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-20-042-05 | Siemens SIMATIC S7 (Update B) | 2020-02-11T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-23-005-03 | Hitachi Energy Lumada Asset Performance Management | 2023-01-05T00:00:00.000000Z | 2023-01-05T00:00:00.000000Z |
| icsa-23-005-02 | Hitachi Energy FOXMAN-UN | 2023-01-05T00:00:00.000000Z | 2023-01-05T00:00:00.000000Z |
| icsa-23-005-01 | Hitachi Energy UNEM | 2023-01-05T00:00:00.000000Z | 2023-01-05T00:00:00.000000Z |
| icsa-22-349-01 | Prosys OPC UA Simulation Server (Update A) | 2022-12-15T00:00:00.000000Z | 2023-01-03T00:00:00.000000Z |
| icsa-22-356-04 | Omron CX-Programmer | 2022-12-22T00:00:00.000000Z | 2022-12-22T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-dcnm-authbypass-OHBPbxu | Cisco Data Center Network Manager Authorization Bypass Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-api-path-tptapx2p | Cisco Data Center Network Manager REST API Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-api-path-TpTApx2p | Cisco Data Center Network Manager REST API Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssmor-mdcwkt2x | Cisco Smart Software Manager Satellite Open Redirect Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssmor-MDCWkT2x | Cisco Smart Software Manager Satellite Open Redirect Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-sqi-h5fdvzwp | Cisco Smart Software Manager Satellite SQL Injection Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-sqi-h5fDvZWp | Cisco Smart Software Manager Satellite SQL Injection Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-sc-jd42d4tq | Cisco Smart Software Manager Satellite Static Credential Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-sc-Jd42D4Tq | Cisco Smart Software Manager Satellite Static Credential Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-multici-pgg5wm5a | Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-multici-pgG5WM5A | Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-asr-mem-leak-dos-mtwghkk3 | Cisco StarOS IPv4 Denial of Service Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-asr-mem-leak-dos-MTWGHKk3 | Cisco StarOS IPv4 Denial of Service Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-amp-imm-dll-5paz3hrv | Cisco Advanced Malware Protection for Endpoints and Immunet for Windows DLL Hijacking Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-amp-imm-dll-5PAZ3hRV | Cisco Advanced Malware Protection for Endpoints and Immunet for Windows DLL Hijacking Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-voip-phone-flood-dos-ynu9exov | Cisco IP Phone TCP Packet Flood Denial of Service Vulnerability | 2020-11-04T16:00:00+00:00 | 2021-01-19T17:34:56+00:00 |
| cisco-sa-voip-phone-flood-dos-YnU9EXOv | Cisco IP Phone TCP Packet Flood Denial of Service Vulnerability | 2020-11-04T16:00:00+00:00 | 2021-01-19T17:34:56+00:00 |
| cisco-sa-rv-overflow-wunugv4u | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2021-01-19T16:21:32+00:00 |
| cisco-sa-rv-overflow-WUnUgv4U | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2021-01-19T16:21:32+00:00 |
| cisco-sa-rv-stored-xss-lptq3eqc | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Stored Cross-Site Scripting Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2021-01-14T15:25:16+00:00 |
| cisco-sa-rv-stored-xss-LPTQ3EQC | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Stored Cross-Site Scripting Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2021-01-14T15:25:16+00:00 |
| cisco-sa-anyconnect-dll-injec-pqnryxlf | Cisco AnyConnect Secure Mobility Client for Windows DLL Injection Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-14T15:20:06+00:00 |
| cisco-sa-anyconnect-dll-injec-pQnryXLf | Cisco AnyConnect Secure Mobility Client for Windows DLL Injection Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-14T15:20:06+00:00 |
| cisco-sa-webex-open-redirect-pwvbq2q | Cisco Webex Meetings Open Redirect Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-webex-open-redirect-PWvBQ2q | Cisco Webex Meetings Open Redirect Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-webex-brutef-hostkey-fwrmxvf | Cisco Webex Meetings and Cisco Webex Meetings Server Host Key Brute Forcing Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-webex-brutef-hostkey-FWRMxVF | Cisco Webex Meetings and Cisco Webex Meetings Server Host Key Brute Forcing Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-staros-file-read-l3rdvtey | Cisco StarOS for Cisco ASR 5000 Series Routers Arbitrary File Read Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-staros-file-read-L3RDvtey | Cisco StarOS for Cisco ASR 5000 Series Routers Arbitrary File Read Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-rv-command-inject-lbdq2krn | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Command Injection Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-50160 | ALSA: hda/cs8409: Fix possible NULL dereference | 2024-11-02T00:00:00.000Z | 2026-02-18T14:07:58.000Z |
| msrc_cve-2025-60876 | BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20). | 2025-11-02T00:00:00.000Z | 2026-02-18T14:07:50.000Z |
| msrc_cve-2024-21090 | Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 8.3.0 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). | 2024-04-02T07:00:00.000Z | 2026-02-18T14:07:40.000Z |
| msrc_cve-2024-48949 | The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits "sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()" validation. | 2024-10-01T07:00:00.000Z | 2026-02-18T14:07:28.000Z |
| msrc_cve-2025-23147 | i3c: Add NULL pointer check in i3c_master_queue_ibi() | 2025-05-02T00:00:00.000Z | 2026-02-18T14:07:25.000Z |
| msrc_cve-2024-49935 | ACPI: PAD: fix crash in exit_round_robin() | 2024-10-01T07:00:00.000Z | 2026-02-18T14:07:21.000Z |
| msrc_cve-2025-66418 | urllib3 allows an unbounded number of links in the decompression chain | 2025-12-02T00:00:00.000Z | 2026-02-18T14:07:18.000Z |
| msrc_cve-2024-23653 | BuildKit interactive containers API does not validate entitlements check | 2024-01-01T08:00:00.000Z | 2026-02-18T14:07:15.000Z |
| msrc_cve-2025-37853 | drm/amdkfd: debugfs hang_hws skip GPU with MES | 2025-05-02T00:00:00.000Z | 2026-02-18T14:07:02.000Z |
| msrc_cve-2024-54132 | GitHub CLI allows downloading malicious GitHub Actions workflow artifact to result in path traversal vulnerability | 2024-12-02T00:00:00.000Z | 2026-02-18T14:07:01.000Z |
| msrc_cve-2024-42934 | OpenIPMI before 2.0.36 has an out-of-bounds array access (for authentication type) in the ipmi_sim simulator resulting in denial of service or (with very low probability) authentication bypass or code execution. | 2024-10-01T07:00:00.000Z | 2026-02-18T14:06:59.000Z |
| msrc_cve-2022-32214 | The llhttp parser <v14.20.1 <v16.17.1 and <v18.9.1 in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS). | 2022-07-02T00:00:00.000Z | 2026-02-18T14:06:55.000Z |
| msrc_cve-2024-49927 | x86/ioapic: Handle allocation failures gracefully | 2024-10-01T07:00:00.000Z | 2026-02-18T14:06:51.000Z |
| msrc_cve-2024-2312 | GRUB2 does not call the module fini functions on exit, leading to Debian/Ubuntu's peimage GRUB2 module leaving UEFI system table hooks after exit. This lead to a use-after-free condition, and could possibly lead to secure boot bypass. | 2024-04-02T07:00:00.000Z | 2026-02-18T14:06:41.000Z |
| msrc_cve-2025-37797 | net_sched: hfsc: Fix a UAF vulnerability in class handling | 2025-05-02T00:00:00.000Z | 2026-02-18T14:06:29.000Z |
| msrc_cve-2024-49933 | blk_iocost: fix more out of bound shifts | 2024-10-01T07:00:00.000Z | 2026-02-18T14:06:24.000Z |
| msrc_cve-2022-32148 | Exposure of client IP addresses in net/http | 2022-08-02T00:00:00.000Z | 2026-02-18T14:06:20.000Z |
| msrc_cve-2024-53059 | wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() | 2024-11-02T00:00:00.000Z | 2026-02-18T14:06:17.000Z |
| msrc_cve-2024-48957 | execute_filter_audio in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst. | 2024-10-01T07:00:00.000Z | 2026-02-18T14:06:15.000Z |
| msrc_cve-2025-68291 | mptcp: Initialise rcv_mss before calling tcp_send_active_reset() in mptcp_do_fastclose(). | 2025-12-02T00:00:00.000Z | 2026-02-18T14:06:12.000Z |
| msrc_cve-2025-37969 | iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo | 2025-05-02T00:00:00.000Z | 2026-02-18T14:05:59.000Z |
| msrc_cve-2024-49932 | btrfs: don't readahead the relocation inode on RST | 2024-10-01T07:00:00.000Z | 2026-02-18T14:05:56.000Z |
| msrc_cve-2025-37989 | net: phy: leds: fix memory leak | 2025-05-02T00:00:00.000Z | 2026-02-18T14:05:32.000Z |
| msrc_cve-2024-53257 | Vitess allows HTML injection in /debug/querylogz & /debug/env | 2024-12-02T00:00:00.000Z | 2026-02-18T14:05:32.000Z |
| msrc_cve-2024-48958 | execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst. | 2024-10-01T07:00:00.000Z | 2026-02-18T14:05:32.000Z |
| msrc_cve-2025-52194 | A buffer overflow vulnerability exists in libsndfile version 1.2.2 and potentially earlier versions when processing malformed IRCAM audio files. The vulnerability occurs in the ircam_read_header function at src/ircam.c:164 during sample rate processing, leading to memory corruption and potential code execution. | 2025-08-02T00:00:00.000Z | 2026-02-18T14:05:25.000Z |
| msrc_cve-2024-50153 | scsi: target: core: Fix null-ptr-deref in target_alloc_device() | 2024-11-02T00:00:00.000Z | 2026-02-18T14:05:23.000Z |
| msrc_cve-2023-52356 | Libtiff: segment fault in libtiff in tiffreadrgbatileext() leading to denial of service | 2024-01-01T08:00:00.000Z | 2026-02-18T14:05:22.000Z |
| msrc_cve-2022-43680 | In libexpat through 2.4.9 there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations. | 2022-10-02T00:00:00.000Z | 2026-02-18T14:05:21.000Z |
| msrc_cve-2025-37954 | smb: client: Avoid race in open_cached_dir with lease breaks | 2025-05-02T00:00:00.000Z | 2026-02-18T14:05:04.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:14271-1 | nginx-1.27.1-1.1 on GA media | 2024-08-17T00:00:00Z | 2024-08-17T00:00:00Z |
| opensuse-su-2024:0244-1 | Security update for apptainer | 2024-08-16T04:02:52Z | 2024-08-16T04:02:52Z |
| opensuse-su-2024:0243-1 | Security update for python-aiosmtpd | 2024-08-16T04:02:47Z | 2024-08-16T04:02:47Z |
| opensuse-su-2024:14270-1 | libunbound8-1.21.0-1.1 on GA media | 2024-08-16T00:00:00Z | 2024-08-16T00:00:00Z |
| opensuse-su-2024:14269-1 | bubblewrap-0.10.0-1.1 on GA media | 2024-08-16T00:00:00Z | 2024-08-16T00:00:00Z |
| opensuse-su-2024:0242-1 | Security update for opera | 2024-08-15T15:07:36Z | 2024-08-15T15:07:36Z |
| opensuse-su-2024:14268-1 | ucode-intel-20240813-1.1 on GA media | 2024-08-15T00:00:00Z | 2024-08-15T00:00:00Z |
| opensuse-su-2024:14267-1 | klp-build-0~20240812.ad9f0e0-1.1 on GA media | 2024-08-14T00:00:00Z | 2024-08-14T00:00:00Z |
| opensuse-su-2024:14266-1 | kernel-firmware-all-20240809-1.1 on GA media | 2024-08-14T00:00:00Z | 2024-08-14T00:00:00Z |
| opensuse-su-2024:14265-1 | java-21-openj9-21.0.4.0-1.1 on GA media | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| opensuse-su-2024:14264-1 | java-1_8_0-openj9-1.8.0.422-1.1 on GA media | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| opensuse-su-2024:14263-1 | java-17-openj9-17.0.12.0-1.1 on GA media | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| opensuse-su-2024:14262-1 | java-11-openj9-11.0.24.0-1.1 on GA media | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| opensuse-su-2024:14261-1 | curl-8.9.1-1.1 on GA media | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| opensuse-su-2024:14260-1 | MozillaFirefox-129.0-1.1 on GA media | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| opensuse-su-2024:14259-1 | libzzip-0-13-0.13.78-1.1 on GA media | 2024-08-11T00:00:00Z | 2024-08-11T00:00:00Z |
| opensuse-su-2024:14258-1 | traefik2-2.11.8-1.1 on GA media | 2024-08-10T00:00:00Z | 2024-08-10T00:00:00Z |
| opensuse-su-2024:14257-1 | traefik-3.1.2-1.1 on GA media | 2024-08-10T00:00:00Z | 2024-08-10T00:00:00Z |
| opensuse-su-2024:14256-1 | python38-3.8.19-7.1 on GA media | 2024-08-10T00:00:00Z | 2024-08-10T00:00:00Z |
| opensuse-su-2024:14255-1 | python311-3.11.9-6.1 on GA media | 2024-08-10T00:00:00Z | 2024-08-10T00:00:00Z |
| opensuse-su-2024:14254-1 | python310-3.10.14-6.1 on GA media | 2024-08-10T00:00:00Z | 2024-08-10T00:00:00Z |
| opensuse-su-2024:14253-1 | python39-3.9.19-6.1 on GA media | 2024-08-09T00:00:00Z | 2024-08-09T00:00:00Z |
| opensuse-su-2024:14252-1 | ksh-93vu-10.1 on GA media | 2024-08-09T00:00:00Z | 2024-08-09T00:00:00Z |
| opensuse-su-2024:14251-1 | ansible-core-2.16-2.16.9-1.1 on GA media | 2024-08-09T00:00:00Z | 2024-08-09T00:00:00Z |
| opensuse-su-2024:14250-1 | MozillaThunderbird-115.14.0-1.1 on GA media | 2024-08-09T00:00:00Z | 2024-08-09T00:00:00Z |
| opensuse-su-2024:14249-1 | python313-3.13.0~rc1-1.1 on GA media | 2024-08-08T00:00:00Z | 2024-08-08T00:00:00Z |
| opensuse-su-2024:14248-1 | python310-Django4-4.2.15-1.1 on GA media | 2024-08-08T00:00:00Z | 2024-08-08T00:00:00Z |
| opensuse-su-2024:14247-1 | python310-Django-5.0.8-1.1 on GA media | 2024-08-08T00:00:00Z | 2024-08-08T00:00:00Z |
| opensuse-su-2024:14246-1 | db48-doc-4.8.30-45.1 on GA media | 2024-08-08T00:00:00Z | 2024-08-08T00:00:00Z |
| opensuse-su-2024:14245-1 | apache2-2.4.62-1.1 on GA media | 2024-08-08T00:00:00Z | 2024-08-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-334 | Heap-buffer-overflow in _iri_unescape_inline | 2020-07-01T00:00:03.651708Z | 2022-04-13T03:04:41.722363Z |
| osv-2020-32 | Heap-buffer-overflow in read_bits_16 | 2020-06-24T01:51:11.044419Z | 2022-04-13T03:04:41.173391Z |
| osv-2020-308 | Heap-buffer-overflow in UA_copy | 2020-06-30T00:00:49.384650Z | 2022-04-13T03:04:41.293776Z |
| osv-2020-273 | Heap-use-after-free in copy_string | 2020-06-30T00:00:44.820643Z | 2022-04-13T03:04:41.226766Z |
| osv-2020-238 | Heap-use-after-free in copy_string | 2020-06-26T00:00:08.394661Z | 2022-04-13T03:04:41.168121Z |
| osv-2020-2276 | Negative-size-param in tcos_decipher | 2020-12-19T00:01:12.908184Z | 2022-04-13T03:04:41.586495Z |
| osv-2020-2254 | Stack-use-after-return in insert_pin | 2020-12-10T00:00:49.551956Z | 2022-04-13T03:04:41.554103Z |
| osv-2020-2222 | Heap-double-free in sc_pkcs15_free_tokeninfo | 2020-12-04T00:00:16.472882Z | 2022-04-13T03:04:41.564448Z |
| osv-2020-2217 | Heap-buffer-overflow in std::__1::pair<int, void*> uWS::HttpParser::fenceAndConsumePostPadded<0> | 2020-12-04T00:00:01.928228Z | 2022-04-13T03:04:41.047024Z |
| osv-2020-2178 | Stack-buffer-overflow in insert_key | 2020-11-23T00:00:03.001326Z | 2022-04-13T03:04:41.680639Z |
| osv-2020-2157 | Stack-buffer-overflow in insert_key | 2020-11-15T22:33:40.491170Z | 2022-04-13T03:04:41.580857Z |
| osv-2020-209 | Stack-buffer-overflow in coolkey_rsa_op | 2020-06-24T01:51:19.054921Z | 2022-04-13T03:04:41.701963Z |
| osv-2020-1990 | Heap-buffer-overflow in sc_oberthur_parse_privateinfo | 2020-10-06T00:00:11.269608Z | 2022-04-13T03:04:41.634585Z |
| osv-2020-1981 | Stack-buffer-overflow in fuzz_reader_transmit | 2020-10-04T00:00:10.213058Z | 2022-04-13T03:04:41.650052Z |
| osv-2020-1860 | Stack-buffer-overflow in sc_get_response | 2020-09-28T00:00:07.869363Z | 2022-04-13T03:04:41.660227Z |
| osv-2020-1851 | Stack-buffer-underflow in fmt::v6::basic_format_args<fmt::v6::basic_format_context<std::__1::back_insert_i | 2020-09-26T00:00:34.368870Z | 2022-04-13T03:04:41.476667Z |
| osv-2020-1850 | Heap-buffer-overflow in fmt::v6::basic_string_view<char>::basic_string_view | 2020-09-26T00:00:33.702898Z | 2022-04-13T03:04:41.471399Z |
| osv-2020-1848 | Heap-buffer-overflow in sc_oberthur_parse_publicinfo | 2020-09-26T00:00:10.945991Z | 2022-04-13T03:04:41.696843Z |
| osv-2020-1844 | Heap-buffer-overflow in hextoint | 2020-09-26T00:00:09.496267Z | 2022-04-13T03:04:41.532322Z |
| osv-2020-1841 | UNKNOWN READ in avifRWDataSet | 2020-09-25T00:00:39.705135Z | 2022-04-13T03:04:41.887078Z |
| osv-2020-1840 | Heap-use-after-free in avifFileTypeIsCompatible | 2020-09-25T00:00:39.613381Z | 2022-04-13T03:04:41.892196Z |
| osv-2020-1836 | Heap-buffer-overflow in hextoint | 2020-09-25T00:00:11.266571Z | 2022-04-13T03:04:41.655154Z |
| osv-2020-1835 | Stack-buffer-overflow in fmt::v7::detail::buffer<char>::push_back | 2020-09-25T00:00:10.846065Z | 2022-04-13T03:04:41.466004Z |
| osv-2020-1833 | Heap-buffer-overflow in avifROStreamRead | 2020-09-25T00:00:04.438974Z | 2022-04-13T03:04:41.876574Z |
| osv-2020-1730 | Bad-cast to RDKit::Atom | 2020-09-11T00:00:51.334144Z | 2022-04-13T03:04:41.515246Z |
| osv-2020-1720 | Heap-buffer-overflow in hextoint | 2020-09-08T00:01:07.773084Z | 2022-04-13T03:04:41.624306Z |
| osv-2020-1694 | Segv on unknown address in std::__1::__tree<std::__1::__value_type<unsigned int, std::__1::pair<std::__1::b | 2020-09-04T00:00:07.333173Z | 2022-04-13T03:04:41.030382Z |
| osv-2020-1677 | Heap-use-after-free in UA_NodeMap_delete | 2020-08-30T00:00:18.780626Z | 2022-04-13T03:04:41.410030Z |
| osv-2020-1643 | Heap-use-after-free in UA_NodeMap_delete | 2020-08-22T00:00:17.203907Z | 2022-04-13T03:04:41.375264Z |
| osv-2020-1641 | Use-of-uninitialized-value in us_internal_dispatch_ready_poll | 2020-08-21T00:01:21.212570Z | 2022-04-13T03:04:41.019439Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-magento-2021-21019 | Magento Commerce XML Injection Could Lead To Remote Code Execution | 2024-03-06T11:01:20.594Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2021-21018 | Magnto Commerce Unauthorized Data Modification Could Lead To Arbitrary Code Execution | 2024-03-06T11:01:30.875Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2021-21016 | Magento Commerce Unauthorized Data Modification Could Lead to Arbitrary Code Execution | 2024-03-06T11:01:43.913Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2021-21015 | Magento Commerce Unauthorized Data Modification Could Lead to Arbitrary Code Execution | 2024-03-06T11:01:57.081Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2021-21014 | Magento Commerce Arbitrary Folder Empty Could Lead To Arbitrary Code Execution | 2024-03-06T11:02:08.390Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2020-24407 | Arbitrary code execution via file import functionality | 2024-03-06T11:07:21.498Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2020-24406 | Document root path disclosure on Maintenance page | 2024-03-06T11:07:30.889Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2020-24405 | Incorrect permissions in Inventory module could lead to unauthorized modification of inventory stock data | 2024-03-06T11:07:41.661Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2020-24404 | Incorrect permissions in Integrations component could lead to unauthorized deletion of cmsPages via REST API | 2024-03-06T11:07:52.679Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2020-24403 | Incorrect permissions could lead to unauthorized modification of inventory source data via REST API | 2024-03-06T11:08:04.773Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2020-24402 | Incorrect permissions in the Integrations component could lead to unauthorized deletion of customer details via REST API | 2024-03-06T11:08:15.701Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2020-24401 | Incorrect permissions following the deletion of a user role or deactivation of a user | 2024-03-06T11:08:28.087Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2020-24400 | SQL injection allows arbitrary read from database | 2024-03-06T11:08:37.464Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2020-15151 | Observable Timing Discrepancy in OpenMage LTS | 2024-03-06T11:08:48.067Z | 2025-05-20T10:02:07.006Z |
| bit-logstash-2025-37730 | Logstash Improper Certificate Validation in TCP output | 2025-05-08T05:42:10.346Z | 2025-05-20T10:02:07.006Z |
| bit-logstash-2023-46672 | Logstash Insertion of Sensitive Information into Log File | 2024-03-06T10:55:19.003Z | 2025-05-20T10:02:07.006Z |
| bit-libmemcached-2023-27478 | Disclosure of unrelated data in libmemcached-awesome | 2024-03-06T10:55:12.076Z | 2025-05-20T10:02:07.006Z |
| bit-kustomize-2022-39272 | Flux2 vulnerable to Denial of Service due to Improper use of metav1.Duration | 2024-03-06T10:55:08.291Z | 2025-05-20T10:02:07.006Z |
| bit-kustomize-2022-24878 | Improper path handling in Kustomization files allows for denial of service | 2024-03-06T10:55:18.461Z | 2025-05-20T10:02:07.006Z |
| bit-kustomize-2022-24877 | Improper path handling in kustomization files allows path traversal | 2024-03-06T10:55:31.201Z | 2025-05-20T10:02:07.006Z |
| bit-kustomize-2022-24817 | Improper kubeconfig validation allows arbitrary code execution | 2024-03-06T10:55:40.674Z | 2025-05-20T10:02:07.006Z |
| bit-kustomize-2021-41254 | Privilege escalation to cluster admin on multi-tenant environments | 2024-03-06T10:55:51.596Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2025-25016 | Kibana Unrestricted Upload of File | 2025-05-03T05:46:27.247Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2025-25015 | Kibana arbitrary code execution via prototype pollution | 2025-03-07T20:56:34.668Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2024-52972 | Kibana allocation of resources without limits or throttling leads to crash | 2025-01-27T07:12:30.819Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2024-43710 | Kibana server-side request forgery | 2025-01-27T07:12:37.323Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2024-37281 | Kibana Denial of Service issue | 2024-08-01T07:22:52.204Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2024-37279 | Kibana Broken Access Control issue | 2024-06-17T07:22:48.633Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2024-23442 | Kibana open redirect issue | 2024-06-18T07:22:49.724Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2024-11390 | Kibana Unrestricted Upload of File with Dangerous Type Can Lead to XSS | 2025-05-03T05:44:59.249Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202304-2227 | A vulnerability was found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic.… | 2024-05-17T22:40:20.916000Z |
| var-202306-0893 | Asus RT-N10LX Router v2.0.0.39 was discovered to contain a stack overflow via the url par… | 2024-05-17T22:40:16.875000Z |
| var-202402-0387 | A vulnerability was found in Netgear R7000 1.0.11.136_10.2.120 and classified as problema… | 2024-05-17T22:40:13.024000Z |
| var-202401-1161 | A vulnerability was found in Totolink N350RT 9.3.5u.6255. It has been declared as problem… | 2024-05-17T22:40:13.324000Z |
| var-202401-0743 | A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. Thi… | 2024-05-17T22:40:13.431000Z |
| var-202401-0680 | A vulnerability has been found in Totolink N350RT 9.3.5u.6139_B202012 and classified as c… | 2024-05-17T22:40:13.455000Z |
| var-202401-0617 | A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been rated as critical. Affec… | 2024-05-17T22:40:13.473000Z |
| var-202401-0386 | A vulnerability was found in Totolink T6 4.1.9cu.5241_B20210923. It has been classified a… | 2024-05-17T22:40:13.547000Z |
| var-202401-0050 | A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been declared … | 2024-05-17T22:40:13.664000Z |
| var-202403-0744 | A vulnerability was found in Tenda AC18 15.03.05.05. It has been rated as critical. This … | 2024-05-17T22:40:12.921000Z |
| var-202403-0846 | A vulnerability was found in Tenda AC18 15.03.05.05 and classified as critical. Affected … | 2024-05-17T22:40:11.015000Z |
| var-202403-0930 | A vulnerability, which was classified as critical, has been found in Tenda AC15 15.03.05.… | 2024-05-17T22:40:10.961000Z |
| var-202108-1856 | A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0… | 2024-05-17T22:34:53.609000Z |
| var-200110-0182 | Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.… | 2024-05-17T22:30:40.314000Z |
| var-200609-0837 | OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key… | 2024-05-17T22:22:44.985000Z |
| var-201110-0267 | Untrusted search path vulnerability in Mozilla Network Security Services (NSS), as used i… | 2024-05-17T21:29:23.376000Z |
| var-200712-0427 | The reply function in ftpd.c in the gssftp ftpd in MIT Kerberos 5 (krb5) does not initial… | 2024-05-17T21:18:22.630000Z |
| var-202103-0365 | A DNS client stack-based buffer overflow in ipdnsc_decode_name() affects Wind River VxWor… | 2024-05-17T21:12:07.067000Z |
| var-201408-0270 | Cobham Sailor 6000 satellite terminals have hardcoded Tbus 2 credentials, which allows re… | 2024-05-17T20:55:46.014000Z |
| var-201410-0285 | The My nTelos (aka com.telespree.ntelospostpay) application 1.1.2 for Android does not ve… | 2024-05-17T20:09:30.539000Z |
| var-201805-0227 | The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack … | 2024-05-17T19:19:57.881000Z |
| var-202310-0001 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 201512… | 2024-05-17T19:18:29.305000Z |
| var-202309-0943 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 201512… | 2024-05-17T19:18:29.617000Z |
| var-202309-0941 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 201512… | 2024-05-17T19:18:29.431000Z |
| var-202309-0940 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has be… | 2024-05-17T19:18:29.231000Z |
| var-202309-0938 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 and DAR-8000… | 2024-05-17T19:18:29.598000Z |
| var-202309-0937 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in D-Link DAR-8000 up to 2… | 2024-05-17T19:18:29.364000Z |
| var-202309-0936 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in … | 2024-05-17T19:18:29.333000Z |
| var-202309-0935 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in D-Lin… | 2024-05-17T19:18:29.569000Z |
| var-202309-0934 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 and DAR-8000… | 2024-05-17T19:18:29.384000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2013-000118 | Cybozu Dezie vulnerable to cross-site scripting | 2013-12-10T14:13+09:00 | 2013-12-18T14:51+09:00 |
| jvndb-2013-000117 | Cybozu Garoon vulnerable to session fixation | 2013-12-03T13:51+09:00 | 2013-12-06T10:52+09:00 |
| jvndb-2013-000116 | Cybozu Garoon vulnerable to mail header injection | 2013-12-03T13:49+09:00 | 2013-12-06T10:50+09:00 |
| jvndb-2013-000115 | Cybozu Garoon vulnerable to denial-of-service (DoS) | 2013-12-03T13:46+09:00 | 2013-12-06T10:48+09:00 |
| jvndb-2013-000114 | Cybozu Garoon vulnerable to SQL injection | 2013-12-03T13:45+09:00 | 2013-12-06T10:47+09:00 |
| jvndb-2013-000113 | Multiple cross-site scripting vulnerabilities in Cybozu Garoon | 2013-12-03T13:37+09:00 | 2013-12-06T10:42+09:00 |
| jvndb-2013-000112 | TOWN (modified version) vulnerable to directory traversal | 2013-11-29T14:23+09:00 | 2013-12-06T10:38+09:00 |
| jvndb-2013-000110 | D-Link DES-3800 Series vulnerable to denial-of-service (DoS) | 2013-11-22T14:51+09:00 | 2013-11-26T16:15+09:00 |
| jvndb-2013-000109 | D-Link DES-3800 Series vulnerable to denial-of-service (DoS) | 2013-11-22T14:50+09:00 | 2013-11-26T16:09+09:00 |
| jvndb-2013-000108 | KDrive Personal for Windows contains an issue where it fails to verify SSL server certificates | 2013-11-22T17:39+09:00 | 2013-11-26T16:02+09:00 |
| jvndb-2013-000104 | EC-CUBE vulnerable to information disclosure | 2013-11-20T15:19+09:00 | 2013-11-22T14:42+09:00 |
| jvndb-2013-000105 | EC-CUBE vulnerable to cross-site scripting | 2013-11-20T15:34+09:00 | 2013-11-22T14:40+09:00 |
| jvndb-2013-000097 | EC-CUBE vulnerable to cross-site request forgery | 2013-11-20T15:40+09:00 | 2013-11-22T14:37+09:00 |
| jvndb-2013-000098 | EC-CUBE information disclosure vulnerability | 2013-11-20T15:48+09:00 | 2013-11-22T14:35+09:00 |
| jvndb-2013-000106 | EC-CUBE information disclosure vulnerability | 2013-11-20T16:14+09:00 | 2013-11-22T14:18+09:00 |
| jvndb-2013-000107 | EC-CUBE vulnerable to cross-site scripting | 2013-11-20T15:56+09:00 | 2013-11-22T13:57+09:00 |
| jvndb-2011-003557 | ASP.NET vulnerable to open redirect | 2013-11-15T15:54+09:00 | 2013-11-15T15:54+09:00 |
| jvndb-2013-000103 | Ichitaro series vulnerable to arbitrary code execution | 2013-11-12T14:33+09:00 | 2013-11-15T10:22+09:00 |
| jvndb-2013-000101 | TOWN (modified version) vulnerable to cross-site scripting | 2013-11-07T13:59+09:00 | 2013-11-11T16:34+09:00 |
| jvndb-2013-000100 | Tiki Wiki CMS Groupware vulnerable to SQL injection | 2013-11-05T15:11+09:00 | 2013-11-07T17:57+09:00 |
| jvndb-2013-000099 | Tiki Wiki CMS Groupware vulnerable to cross-site scripting | 2013-11-05T15:05+09:00 | 2013-11-07T17:55+09:00 |
| jvndb-2013-000102 | Page Scroller vulnerable to cross-site scripting | 2013-11-07T14:03+09:00 | 2013-11-07T14:03+09:00 |
| jvndb-2013-000095 | HDL-A and HDL2-A Series vulnerable in session management | 2013-10-18T14:30+09:00 | 2013-10-22T17:56+09:00 |
| jvndb-2013-000093 | Internet Explorer vulnerable to arbitrary code execution | 2013-09-19T14:39+09:00 | 2013-10-10T18:12+09:00 |
| jvndb-2013-000091 | SEIL Series routers vulnerable in RADIUS authentication | 2013-09-20T14:52+09:00 | 2013-10-08T15:36+09:00 |
| jvndb-2013-000094 | Accela BizSearch vulnerable to cross-site scripting | 2013-10-04T12:36+09:00 | 2013-10-08T14:56+09:00 |
| jvndb-2013-004410 | Arbitrary Commands Execution Vulnerability in JP1/Base | 2013-10-03T19:26+09:00 | 2013-10-03T19:26+09:00 |
| jvndb-2013-004409 | Arbitrary Commands Execution Vulnerability in JP1/Automatic Job Management System 3 and JP1/Automatic Job Management System 2 | 2013-10-03T19:24+09:00 | 2013-10-03T19:24+09:00 |
| jvndb-2013-000092 | SEIL Series routers vulnerable to buffer overflow | 2013-09-20T14:57+09:00 | 2013-09-30T16:46+09:00 |
| jvndb-2013-000090 | D-Link DES-3810 Series vulnerable to denial-of-service (DoS) | 2013-09-20T15:12+09:00 | 2013-09-30T15:52+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:02340-1 | Security update for gnutls | 2025-07-17T09:04:04Z | 2025-07-17T09:04:04Z |
| suse-su-2025:02339-1 | Security update for MozillaFirefox, MozillaFirefox-branding-SLE | 2025-07-17T08:52:26Z | 2025-07-17T08:52:26Z |
| suse-su-2025:02289-2 | Security update for docker | 2025-07-16T15:47:57Z | 2025-07-16T15:47:57Z |
| suse-su-2025:01835-2 | Security update for transfig | 2025-07-16T14:52:18Z | 2025-07-16T14:52:18Z |
| suse-su-2025:02336-1 | Security update for kubernetes1.27 | 2025-07-16T14:50:25Z | 2025-07-16T14:50:25Z |
| suse-su-2025:01811-2 | Security update for gnuplot | 2025-07-16T14:49:36Z | 2025-07-16T14:49:36Z |
| suse-su-2025:02335-1 | Security update for the Linux Kernel | 2025-07-16T14:44:37Z | 2025-07-16T14:44:37Z |
| suse-su-2025:02334-1 | Security update for the Linux Kernel | 2025-07-16T13:46:06Z | 2025-07-16T13:46:06Z |
| suse-su-2025:02333-1 | Security update for the Linux Kernel | 2025-07-16T12:53:19Z | 2025-07-16T12:53:19Z |
| suse-su-2025:02332-1 | Security update for erlang | 2025-07-16T12:35:05Z | 2025-07-16T12:35:05Z |
| suse-su-2025:02331-1 | Security update for erlang26 | 2025-07-16T12:34:34Z | 2025-07-16T12:34:34Z |
| suse-su-2025:02330-1 | Security update for rmt-server | 2025-07-16T11:10:11Z | 2025-07-16T11:10:11Z |
| suse-su-2025:02329-1 | Security update for rmt-server | 2025-07-16T09:37:49Z | 2025-07-16T09:37:49Z |
| suse-su-2025:02198-2 | Security update for runc | 2025-07-16T09:09:00Z | 2025-07-16T09:09:00Z |
| suse-su-2025:20496-1 | Security update for pam_pkcs11 | 2025-07-16T08:23:45Z | 2025-07-16T08:23:45Z |
| suse-su-2025:02326-1 | Security update for xen | 2025-07-16T06:37:59Z | 2025-07-16T06:37:59Z |
| suse-su-2025:02325-1 | Security update for xen | 2025-07-16T06:37:43Z | 2025-07-16T06:37:43Z |
| suse-su-2025:02324-1 | Security update for poppler | 2025-07-16T06:37:12Z | 2025-07-16T06:37:12Z |
| suse-ru-2025:20479-1 | Recommended update for pam_pkcs11 | 2025-07-15T14:48:39Z | 2025-07-15T14:48:39Z |
| suse-su-2025:20478-1 | Security update for sudo | 2025-07-15T14:48:17Z | 2025-07-15T14:48:17Z |
| suse-su-2025:02322-1 | Security update for the Linux Kernel | 2025-07-15T14:31:46Z | 2025-07-15T14:31:46Z |
| suse-su-2025:02321-1 | Security update for the Linux Kernel | 2025-07-15T14:31:35Z | 2025-07-15T14:31:35Z |
| suse-su-2025:02320-1 | Security update for the Linux Kernel | 2025-07-15T14:20:22Z | 2025-07-15T14:20:22Z |
| suse-su-2025:02319-1 | Security update for xen | 2025-07-15T14:20:08Z | 2025-07-15T14:20:08Z |
| suse-su-2025:02318-1 | Security update for poppler | 2025-07-15T13:00:31Z | 2025-07-15T13:00:31Z |
| suse-su-2025:02317-1 | Security update for poppler | 2025-07-15T12:59:44Z | 2025-07-15T12:59:44Z |
| suse-su-2025:02316-1 | Security update for xen | 2025-07-15T12:59:25Z | 2025-07-15T12:59:25Z |
| suse-su-2025:02315-1 | Security update for xen | 2025-07-15T12:59:13Z | 2025-07-15T12:59:13Z |
| suse-su-2025:02314-1 | Security update for libxml2 | 2025-07-15T12:34:11Z | 2025-07-15T12:34:11Z |
| suse-su-2025:02312-1 | Security update for the Linux Kernel | 2025-07-15T10:03:28Z | 2025-07-15T10:03:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-29111 | WordPress WP Headless CMS Framework plugin绕过保护机制漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-29110 | WordPress WP Content Pilot plugin缺少授权漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-29109 | WordPress Content Flipper plugin跨站脚本漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-29108 | WordPress WooCommerce Ultimate Points And Rewards plugin信息泄露漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-29107 | WordPress WooCommerce PDF Invoice Builder plugin缺少授权漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-29106 | WordPress Welcart e-Commerce Plugin未授权访问漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-29105 | WordPress ChatBot plugin缺少授权漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-29104 | WordPress Booster for WooCommerce Plugin跨站脚本漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-29103 | WordPress Booster for WooCommerce Plugin缺少授权漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-29102 | WordPress Booking Manager plugin跨站脚本漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-29090 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29090) | 2025-10-31 | 2025-11-20 |
| cnvd-2025-29089 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4拒绝服务漏洞(CNVD-2025-29089) | 2025-10-31 | 2025-11-20 |
| cnvd-2025-29088 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29088) | 2025-10-31 | 2025-11-20 |
| cnvd-2025-29087 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29087) | 2025-10-31 | 2025-11-20 |
| cnvd-2025-29086 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4信息泄露漏洞(CNVD-2025-29086) | 2025-10-31 | 2025-11-20 |
| cnvd-2025-29085 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29085) | 2025-10-31 | 2025-11-20 |
| cnvd-2025-29084 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4权限提升漏洞(CNVD-2025-29084) | 2025-10-31 | 2025-11-20 |
| cnvd-2025-29083 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4权限提升漏洞(CNVD-2025-29083) | 2025-10-31 | 2025-11-20 |
| cnvd-2025-29082 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4拒绝服务漏洞(CNVD-2025-29082) | 2025-10-31 | 2025-11-20 |
| cnvd-2025-29081 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4权限提升漏洞 | 2025-10-31 | 2025-11-20 |
| cnvd-2025-29080 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4跨站请求伪造漏洞 | 2025-11-05 | 2025-11-20 |
| cnvd-2025-29079 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29079) | 2025-11-05 | 2025-11-20 |
| cnvd-2025-29078 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4信息泄露漏洞(CNVD-2025-29078) | 2025-11-05 | 2025-11-20 |
| cnvd-2025-29077 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4信息泄露漏洞 | 2025-11-05 | 2025-11-20 |
| cnvd-2025-29076 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29076) | 2025-11-05 | 2025-11-20 |
| cnvd-2025-29075 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29075) | 2025-11-05 | 2025-11-20 |
| cnvd-2025-29074 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4拒绝服务漏洞(CNVD-2025-29074) | 2025-11-05 | 2025-11-20 |
| cnvd-2025-29073 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4拒绝服务漏洞(CNVD-2025-29073) | 2025-11-05 | 2025-11-20 |
| cnvd-2025-29072 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29072) | 2025-11-05 | 2025-11-20 |
| cnvd-2025-29071 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29071) | 2025-11-05 | 2025-11-20 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0238 | Multiples vulnérabilités dans Laravel | 2025-03-25T00:00:00.000000 | 2025-03-25T00:00:00.000000 |
| CERTFR-2025-AVI-0239 | Multiples vulnérabilités dans Microsoft Azure Kubernetes Service | 2025-03-25T00:00:00.000000 | 2025-03-25T00:00:00.000000 |
| CERTFR-2025-AVI-0238 | Multiples vulnérabilités dans Laravel | 2025-03-25T00:00:00.000000 | 2025-03-25T00:00:00.000000 |
| certfr-2025-avi-0237 | Multiples vulnérabilités dans Microsoft Edge | 2025-03-24T00:00:00.000000 | 2025-03-24T00:00:00.000000 |
| certfr-2025-avi-0236 | Vulnérabilité dans Qnap NAKIVO Backup & Replication | 2025-03-24T00:00:00.000000 | 2025-03-24T00:00:00.000000 |
| CERTFR-2025-AVI-0237 | Multiples vulnérabilités dans Microsoft Edge | 2025-03-24T00:00:00.000000 | 2025-03-24T00:00:00.000000 |
| CERTFR-2025-AVI-0236 | Vulnérabilité dans Qnap NAKIVO Backup & Replication | 2025-03-24T00:00:00.000000 | 2025-03-24T00:00:00.000000 |
| certfr-2025-avi-0235 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| certfr-2025-avi-0234 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| certfr-2025-avi-0233 | Multiples vulnérabilités dans les produits IBM | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| certfr-2025-avi-0232 | Vulnérabilité dans Liferay | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| certfr-2025-avi-0231 | Vulnérabilité dans Microsoft Office | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| certfr-2025-avi-0230 | Vulnérabilité dans Tenable Nessus Agent | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| CERTFR-2025-AVI-0235 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| CERTFR-2025-AVI-0234 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| CERTFR-2025-AVI-0233 | Multiples vulnérabilités dans les produits IBM | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| CERTFR-2025-AVI-0232 | Vulnérabilité dans Liferay | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| CERTFR-2025-AVI-0231 | Vulnérabilité dans Microsoft Office | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| CERTFR-2025-AVI-0230 | Vulnérabilité dans Tenable Nessus Agent | 2025-03-21T00:00:00.000000 | 2025-03-21T00:00:00.000000 |
| certfr-2025-avi-0229 | Vulnérabilité dans Veeam Backup & Replication | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| certfr-2025-avi-0228 | Multiples vulnérabilités dans Spring Security | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| certfr-2025-avi-0227 | Vulnérabilité dans Liferay | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| certfr-2025-avi-0226 | Vulnérabilité dans Google Chrome | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| certfr-2025-avi-0225 | Vulnérabilité dans Drupal | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| CERTFR-2025-AVI-0229 | Vulnérabilité dans Veeam Backup & Replication | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| CERTFR-2025-AVI-0228 | Multiples vulnérabilités dans Spring Security | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| CERTFR-2025-AVI-0227 | Vulnérabilité dans Liferay | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| CERTFR-2025-AVI-0226 | Vulnérabilité dans Google Chrome | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| CERTFR-2025-AVI-0225 | Vulnérabilité dans Drupal | 2025-03-20T00:00:00.000000 | 2025-03-20T00:00:00.000000 |
| certfr-2025-avi-0224 | Multiples vulnérabilités dans les produits Synology | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |