Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-54258 |
7.8 (3.1)
|
Substance3D - Modeler | Use After Free (CWE-416) |
Adobe |
Substance3D - Modeler |
2025-09-09T21:41:14.245Z | 2026-02-26T17:48:45.643Z |
| CVE-2025-54222 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Stager |
2025-08-12T21:46:17.193Z | 2026-02-26T17:48:45.405Z |
| CVE-2025-54216 |
7.8 (3.1)
|
InCopy | Out-of-bounds Write (CWE-787) |
Adobe |
InCopy |
2025-08-12T21:01:35.837Z | 2026-02-26T17:48:45.971Z |
| CVE-2025-54232 |
7.8 (3.1)
|
Adobe Framemaker | Use After Free (CWE-416) |
Adobe |
Adobe Framemaker |
2025-08-12T22:17:45.489Z | 2026-02-26T17:48:44.013Z |
| CVE-2025-54231 |
7.8 (3.1)
|
Adobe Framemaker | Use After Free (CWE-416) |
Adobe |
Adobe Framemaker |
2025-08-12T22:17:44.701Z | 2026-02-26T17:48:44.404Z |
| CVE-2025-54229 |
7.8 (3.1)
|
Adobe Framemaker | Use After Free (CWE-416) |
Adobe |
Adobe Framemaker |
2025-08-12T22:17:43.894Z | 2026-02-26T17:48:44.794Z |
| CVE-2025-43888 |
8.8 (3.1)
|
Dell PowerProtect Data Manager, Hyper-V, version(… |
Dell |
PowerProtect Data Manager |
2025-09-10T15:42:34.448Z | 2026-02-26T17:48:44.642Z |
| CVE-2025-43884 |
8.2 (3.1)
|
Dell PowerProtect Data Manager, version(s) 19.19 … |
Dell |
PowerProtect Data Manager |
2025-09-10T15:47:40.671Z | 2026-02-26T17:48:44.165Z |
| CVE-2025-10231 |
7 (3.1)
|
N-central Incorrect Default Permissions could lead to … |
N-able |
N-central |
2025-09-10T13:34:41.906Z | 2026-02-26T17:48:44.943Z |
| CVE-2025-54230 |
7.8 (3.1)
|
Adobe Framemaker | Use After Free (CWE-416) |
Adobe |
Adobe Framemaker |
2025-08-12T22:17:46.249Z | 2026-02-26T17:48:43.346Z |
| CVE-2025-43887 |
7 (3.1)
|
Dell PowerProtect Data Manager, version(s) 19.19 … |
Dell |
PowerProtect Data Manager |
2025-09-10T15:59:56.185Z | 2026-02-26T17:48:43.142Z |
| CVE-2025-43885 |
7.8 (3.1)
|
Dell PowerProtect Data Manager, version(s) 19.19 … |
Dell |
PowerProtect Data Manager |
2025-09-10T15:52:28.608Z | 2026-02-26T17:48:43.857Z |
| CVE-2025-43725 |
7.8 (3.1)
|
Dell PowerProtect Data Manager, Generic Applicati… |
Dell |
PowerProtect Data Manager |
2025-09-10T15:56:08.961Z | 2026-02-26T17:48:43.554Z |
| CVE-2025-8879 |
8.8 (3.1)
|
Heap buffer overflow in libaom in Google Chrome p… |
Google |
Chrome |
2025-08-13T02:43:43.287Z | 2026-02-26T17:48:42.532Z |
| CVE-2025-49457 |
9.6 (3.1)
|
Zoom Clients for Windows - Untrusted Search Path |
Zoom Communications Inc |
Zoom Clients for Windows |
2025-08-12T22:54:20.362Z | 2026-02-26T17:48:42.934Z |
| CVE-2025-20248 |
6 (3.1)
|
Cisco IOS XR Software Image Verification Bypass Vulner… |
Cisco |
Cisco IOS XR Software |
2025-09-10T16:06:49.860Z | 2026-02-26T17:48:42.697Z |
| CVE-2025-10200 |
8.8 (3.1)
|
Use after free in Serviceworker in Google Chrome … |
Google |
Chrome |
2025-09-10T19:12:02.495Z | 2026-02-26T17:48:42.233Z |
| CVE-2025-8941 |
7.8 (3.1)
|
Linux-pam: incomplete fix for cve-2025-6020 |
|
|
2025-08-13T14:42:37.570Z | 2026-02-26T17:48:41.074Z |
| CVE-2025-8882 |
8.8 (3.1)
|
Use after free in Aura in Google Chrome prior to … |
Google |
Chrome |
2025-08-13T02:43:45.162Z | 2026-02-26T17:48:41.473Z |
| CVE-2025-8880 |
8.8 (3.1)
|
Race in V8 in Google Chrome prior to 139.0.7258.1… |
Google |
Chrome |
2025-08-13T02:43:43.711Z | 2026-02-26T17:48:41.969Z |
| CVE-2025-10201 |
8.8 (3.1)
|
Inappropriate implementation in Mojo in Google Ch… |
Google |
Chrome |
2025-09-10T19:12:03.219Z | 2026-02-26T17:48:41.797Z |
| CVE-2025-10193 |
7.4 (4.0)
|
Neo4j Cypher MCP server is vulnerable to DNS rebinding… |
neo4j |
neo4j-cypher MCP server |
2025-09-11T14:05:30.592Z | 2026-02-26T17:48:41.293Z |
| CVE-2024-47120 |
6.4 (3.1)
|
IBM Security Verify Information Queue code execution |
IBM |
Security Verify Information Queue |
2025-09-10T20:04:19.307Z | 2026-02-26T17:48:41.624Z |
| CVE-2025-55319 |
8.8 (3.1)
|
Agentic AI and Visual Studio Code Remote Code Executio… |
Microsoft |
Visual Studio Code |
2025-09-12T00:49:27.731Z | 2026-02-26T17:48:40.579Z |
| CVE-2025-48500 |
7.3 (3.1)
7 (4.0)
|
BIG-IP APM VPN web client for macOS vulnerability |
F5 |
BIG-IP Edge Client |
2025-08-13T14:46:54.682Z | 2026-02-26T17:48:40.742Z |
| CVE-2025-36222 |
8.7 (3.1)
|
IBM Fusion insecure default configuration |
IBM |
Fusion |
2025-09-11T20:44:06.696Z | 2026-02-26T17:48:40.895Z |
| CVE-2025-34153 |
10 (4.0)
|
Hyland OnBase < 17.0.2.87 .NET Remoting TCP Channel Un… |
Hyland Software |
OnBase |
2025-08-13T16:51:26.020Z | 2026-02-26T17:48:40.335Z |
| CVE-2025-21042 |
8.8 (3.1)
|
Out-of-bounds write in libimagecodec.quram.so pri… |
Samsung Mobile |
Samsung Mobile Devices |
2025-09-12T07:21:49.997Z | 2026-02-26T17:48:40.023Z |
| CVE-2025-8904 |
9 (4.0)
8.5 (3.1)
|
Privilege escalation issue in Amazon EMR Secret Agent … |
Amazon |
EMR |
2025-08-13T17:06:29.293Z | 2026-02-26T17:48:39.166Z |
| CVE-2025-27234 |
7.3 (4.0)
|
Zabbix Agent 2 smartctl plugin RCE vulnerability in Za… |
Zabbix |
Zabbix |
2025-09-12T10:31:58.770Z | 2026-02-26T17:48:39.389Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-27189 |
6.6 (3.1)
|
OpenSift: Race-prone local persistence could cause sta… |
OpenSift |
OpenSift |
2026-02-21T00:01:46.960Z | 2026-02-25T21:25:52.502Z |
| CVE-2026-24050 |
1.1 (4.0)
|
Zulip affected by Stored XSS in user profile modal |
zulip |
zulip |
2026-02-06T18:20:33.160Z | 2026-02-09T15:28:55.237Z |
| CVE-2026-27194 |
8.1 (4.0)
|
D-Tale affected by Remote Code Execution through the /… |
man-group |
dtale |
2026-02-21T04:25:38.628Z | 2026-02-24T18:58:24.887Z |
| CVE-2026-27197 |
9.1 (3.1)
|
Sentry: Improper Authentication on SAML SSO process al… |
getsentry |
sentry |
2026-02-21T04:35:14.635Z | 2026-02-24T19:00:07.663Z |
| CVE-2026-27484 |
2.3 (4.0)
|
OpenClaw Discord moderation authorization used untrust… |
openclaw |
openclaw |
2026-02-21T09:21:16.568Z | 2026-02-24T18:14:56.099Z |
| CVE-2026-27485 |
4.6 (4.0)
|
OpenClaw affected by Stored XSS in Control UI via unsa… |
openclaw |
openclaw |
2026-02-21T09:27:53.172Z | 2026-02-24T18:15:59.411Z |
| CVE-2026-27487 |
7.6 (3.1)
|
OpenClaw: Prevent shell injection in macOS keychain cr… |
openclaw |
openclaw |
2026-02-21T09:35:28.935Z | 2026-02-24T18:21:54.882Z |
| CVE-2026-27488 |
6.9 (4.0)
|
OpenClaw hardened cron webhook delivery against SSRF |
openclaw |
openclaw |
2026-02-21T09:49:04.956Z | 2026-02-24T18:12:40.027Z |
| CVE-2026-27576 |
4.8 (4.0)
|
OpenClaw: ACP prompt-size checks missing in local stdi… |
openclaw |
openclaw |
2026-02-21T10:00:12.193Z | 2026-02-24T18:11:33.124Z |
| CVE-2026-27574 |
10 (3.1)
|
OneUptime: node:vm sandbox escape in probe allows any … |
OneUptime |
oneuptime |
2026-02-21T10:13:03.840Z | 2026-02-24T18:10:23.455Z |
| CVE-2026-2867 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Vehicle Management System billaction.php … |
itsourcecode |
Vehicle Management System |
2026-02-21T13:32:07.912Z | 2026-02-23T19:33:52.753Z |
| CVE-2026-2876 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda A18 setBlackRule parse_macfilter_rule stack-base… |
Tenda |
A18 |
2026-02-21T17:32:11.364Z | 2026-02-23T15:41:12.127Z |
| CVE-2020-0878 |
4.2 (3.1)
|
Microsoft Browser Memory Corruption Vulnerability |
Microsoft |
ChakraCore |
2020-09-11T17:08:26.000Z | 2025-10-21T23:35:36.572Z |
| CVE-2020-1380 |
7.8 (3.1)
|
Scripting Engine Memory Corruption Vulnerability |
Microsoft |
Internet Explorer 11 |
2020-08-17T19:13:00.000Z | 2025-10-21T23:35:37.973Z |
| CVE-2020-1464 |
7.8 (3.1)
|
Windows Spoofing Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-08-17T19:13:03.000Z | 2025-10-21T23:35:37.819Z |
| CVE-2020-1472 |
5.5 (3.1)
|
Netlogon Elevation of Privilege Vulnerability |
Microsoft |
Windows Server version 2004 |
2020-08-17T19:13:05.000Z | 2025-10-21T23:35:37.656Z |
| CVE-2026-24007 |
4.6 (3.1)
|
Tuleap is missing CSRF protection in the Overview inco… |
Enalean |
tuleap |
2026-02-02T19:52:51.336Z | 2026-02-03T14:56:49.087Z |
| CVE-2026-2853 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DWR-M960 System Log Configuration Endpoint form… |
D-Link |
DWR-M960 |
2026-02-20T19:02:09.052Z | 2026-02-24T14:40:30.014Z |
| CVE-2026-2588 |
9.1 (3.1)
|
Crypt::NaCl::Sodium versions through 2.001 for Perl ha… |
TIMLEGGE |
Crypt::NaCl::Sodium |
2026-02-22T23:31:19.720Z | 2026-02-23T18:47:51.202Z |
| CVE-2026-24956 |
9.3 (3.1)
|
WordPress Download Manager Addons for Elementor plugin… |
Shahjada |
Download Manager Addons for Elementor |
2026-02-20T15:47:08.982Z | 2026-02-23T19:03:49.201Z |
| CVE-2020-7921 |
4.6 (3.1)
|
Administrative action may disable enforcement of per-u… |
MongoDB Inc. |
MongoDB Server |
2020-05-06T14:55:12.000Z | 2024-11-18T17:30:33.314Z |
| CVE-2026-2854 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DWR-M960 NTP Configuration Endpoint formNtp sub… |
D-Link |
DWR-M960 |
2026-02-20T19:02:12.919Z | 2026-02-24T14:41:43.475Z |
| CVE-2026-2855 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DWR-M960 DDNS Settings formDdns sub_4648F0 stac… |
D-Link |
DWR-M960 |
2026-02-20T20:02:08.785Z | 2026-02-24T14:43:57.058Z |
| CVE-2020-7346 |
7.8 (3.1)
|
Privilege escalation in McAfee DLP Endpoint for Windows |
McAfee,LLC |
McAfee Data Loss Prevention (DLP) Endpoint for Windows |
2021-03-23T16:05:23.000Z | 2024-08-04T09:25:49.105Z |
| CVE-2026-2856 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DWR-M960 Filter Configuration Endpoint formFilt… |
D-Link |
DWR-M960 |
2026-02-20T20:32:09.760Z | 2026-02-24T14:45:30.706Z |
| CVE-2026-21862 |
7.7 (4.0)
|
RustFS sourceIp bypass via spoofed X-Forwarded-For/Rea… |
rustfs |
rustfs |
2026-02-03T16:06:08.929Z | 2026-02-03T17:10:32.495Z |
| CVE-2026-2857 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DWR-M960 Port Forwarding Configuration Endpoint… |
D-Link |
DWR-M960 |
2026-02-20T21:02:09.283Z | 2026-02-24T14:47:08.836Z |
| CVE-2026-2881 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DWR-M960 Advanced Firewall Configuration Endpoi… |
D-Link |
DWR-M960 |
2026-02-21T19:32:09.010Z | 2026-02-23T19:24:16.120Z |
| CVE-2026-2691 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Event Management System manage_register.p… |
itsourcecode |
Event Management System |
2026-02-19T01:32:07.068Z | 2026-02-24T15:41:47.584Z |
| CVE-2026-2905 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda HG9 Wireless Configuration Endpoint formWlanSetu… |
Tenda |
HG9 |
2026-02-22T01:02:10.433Z | 2026-02-23T19:13:59.154Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-27189 | OpenSift is an AI study tool that sifts through large datasets using semantic search and generative… | 2026-02-21T00:16:17.140 | 2026-02-23T20:48:59.453 |
| fkie_cve-2026-24050 | Zulip is an open-source team collaboration tool. From 5.0 to before 11.5, some administrative actio… | 2026-02-06T19:16:08.640 | 2026-02-23T20:48:10.037 |
| fkie_cve-2026-27194 | D-Tale is a visualizer for pandas data structures. Versions prior to 3.20.0 are vulnerable to Remot… | 2026-02-21T05:17:29.123 | 2026-02-23T20:47:29.423 |
| fkie_cve-2026-27197 | Sentry is a developer-first error tracking and performance monitoring tool. Versions 21.12.0 throug… | 2026-02-21T05:17:29.510 | 2026-02-23T20:45:01.957 |
| fkie_cve-2026-27484 | OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the Discord moderation action… | 2026-02-21T10:16:12.557 | 2026-02-23T20:44:09.190 |
| fkie_cve-2026-27485 | OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, skills/skill-creator/scripts/… | 2026-02-21T10:16:12.723 | 2026-02-23T20:43:11.533 |
| fkie_cve-2026-27487 | OpenClaw is a personal AI assistant. In versions 2026.2.13 and below, when using macOS, the Claude … | 2026-02-21T10:16:13.100 | 2026-02-23T20:41:59.130 |
| fkie_cve-2026-27488 | OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, Cron webhook delivery in src/… | 2026-02-21T10:16:13.267 | 2026-02-23T20:41:07.240 |
| fkie_cve-2026-27576 | OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the ACP bridge accepts very l… | 2026-02-21T10:16:13.437 | 2026-02-23T20:39:31.980 |
| fkie_cve-2026-27574 | OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, … | 2026-02-21T11:15:57.443 | 2026-02-23T20:36:09.117 |
| fkie_cve-2026-2867 | A vulnerability was determined in itsourcecode Vehicle Management System 1.0. Affected is an unknow… | 2026-02-21T14:15:57.983 | 2026-02-23T20:33:18.727 |
| fkie_cve-2026-2876 | A vulnerability was determined in Tenda A18 15.13.07.13. This affects the function parse_macfilter_… | 2026-02-21T18:16:00.933 | 2026-02-23T20:33:02.043 |
| fkie_cve-2020-0878 | <p>A remote code execution vulnerability exists in the way that Microsoft browsers access objects i… | 2020-09-11T17:15:14.370 | 2026-02-23T20:30:46.833 |
| fkie_cve-2020-1380 | A remote code execution vulnerability exists in the way that the scripting engine handles objects i… | 2020-08-17T19:15:14.553 | 2026-02-23T20:30:44.613 |
| fkie_cve-2020-1464 | A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who… | 2020-08-17T19:15:14.867 | 2026-02-23T20:30:39.947 |
| fkie_cve-2020-1472 | An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon s… | 2020-08-17T19:15:15.117 | 2026-02-23T20:30:36.010 |
| fkie_cve-2026-24007 | Tuleap is an Open Source Suite for management of software development and collaboration. Tuleap is … | 2026-02-02T23:16:07.500 | 2026-02-23T20:29:40.347 |
| fkie_cve-2026-2853 | A vulnerability was detected in D-Link DWR-M960 1.01.07. This affects the function sub_462E14 of th… | 2026-02-20T20:25:25.270 | 2026-02-23T20:29:33.487 |
| fkie_cve-2026-2588 | Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw on 32-bit systems.… | 2026-02-23T00:15:59.330 | 2026-02-23T20:28:55.517 |
| fkie_cve-2026-24956 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-02-20T16:22:39.817 | 2026-02-23T20:28:54.140 |
| fkie_cve-2020-7921 | Improper serialization of internal state in the authorization subsystem in MongoDB Server's authori… | 2020-05-06T15:15:11.880 | 2026-02-23T20:28:37.660 |
| fkie_cve-2026-2854 | A flaw has been found in D-Link DWR-M960 1.01.07. This impacts the function sub_4611CC of the file … | 2026-02-20T20:25:25.483 | 2026-02-23T20:28:30.473 |
| fkie_cve-2026-2855 | A vulnerability has been found in D-Link DWR-M960 1.01.07. Affected is the function sub_4648F0 of t… | 2026-02-20T20:25:25.690 | 2026-02-23T20:27:55.050 |
| fkie_cve-2020-7346 | Privilege Escalation vulnerability in McAfee Data Loss Prevention (DLP) for Windows prior to 11.6.1… | 2021-03-23T16:15:13.940 | 2026-02-23T20:27:54.730 |
| fkie_cve-2026-2856 | A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the functio… | 2026-02-20T21:19:30.610 | 2026-02-23T20:27:19.517 |
| fkie_cve-2026-21862 | RustFS is a distributed object storage system built in Rust. Prior to version alpha.78, IP-based ac… | 2026-02-03T16:16:12.753 | 2026-02-23T20:26:41.903 |
| fkie_cve-2026-2857 | A vulnerability was determined in D-Link DWR-M960 1.01.07. Affected by this issue is the function s… | 2026-02-20T21:19:30.823 | 2026-02-23T20:26:36.483 |
| fkie_cve-2026-2881 | A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function … | 2026-02-21T20:16:39.067 | 2026-02-23T20:25:52.360 |
| fkie_cve-2026-2691 | A vulnerability has been found in itsourcecode Event Management System 1.0. Affected by this issue … | 2026-02-19T07:17:47.880 | 2026-02-23T20:23:53.497 |
| fkie_cve-2026-2905 | A vulnerability was identified in Tenda HG9 300001138. This impacts an unknown function of the file… | 2026-02-22T02:16:56.380 | 2026-02-23T20:22:10.010 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-cf26-rj67-f4wr |
6.1 (3.1)
5.3 (4.0)
|
Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.… | 2026-02-18T15:31:26Z | 2026-02-18T21:31:22Z |
| ghsa-8rqj-9226-cwx7 |
8.8 (3.1)
|
code-projects Scholars Tracking System 1.0 allows an authenticated attacker to achieve remote code … | 2026-02-18T18:30:40Z | 2026-02-18T21:31:22Z |
| ghsa-8gfj-223w-87pr |
6.5 (3.1)
|
The 'Medical History' module in PHPGurukul Hospital Management System v4.0 contains an Insecure Dir… | 2026-02-18T21:31:22Z | 2026-02-18T21:31:22Z |
| ghsa-5pqm-c33h-22jc |
9.1 (3.1)
|
Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Onl… | 2026-02-18T18:30:40Z | 2026-02-18T21:31:22Z |
| ghsa-5hp8-hwcv-h225 |
6.1 (3.1)
5.3 (4.0)
|
Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.… | 2026-02-18T15:31:26Z | 2026-02-18T21:31:22Z |
| ghsa-55vh-w3p8-qq9g |
9.4 (3.1)
|
SourceCodester Customer Support System 1.0 contains an incorrect access control vulnerability in aj… | 2026-02-18T18:30:40Z | 2026-02-18T21:31:22Z |
| ghsa-49xw-73mm-8fw9 |
6.1 (3.1)
5.3 (4.0)
|
Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.… | 2026-02-18T15:31:26Z | 2026-02-18T21:31:22Z |
| ghsa-47m2-7g75-xvrp |
6.1 (3.1)
5.3 (4.0)
|
Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.… | 2026-02-18T15:31:26Z | 2026-02-18T21:31:22Z |
| ghsa-3crm-x896-j73p |
9.8 (3.1)
9.3 (4.0)
|
Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to inco… | 2026-02-18T15:31:26Z | 2026-02-18T21:31:22Z |
| ghsa-2hcf-jfqx-g286 |
6.5 (3.1)
|
PHPGurukul Hospital Management System v4.0 contains a Cross-Site Request Forgery (CSRF) vulnerabili… | 2026-02-18T21:31:22Z | 2026-02-18T21:31:22Z |
| ghsa-27xm-cj78-cxmr |
6.5 (3.1)
|
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 … | 2026-02-17T18:32:57Z | 2026-02-18T21:31:22Z |
| ghsa-xqcm-jrw9-wq72 |
5.4 (3.1)
|
A flaw was found in Dropbear. When running in multi-user mode and authenticating users, the dropbea… | 2026-02-13T00:32:51Z | 2026-02-18T21:31:18Z |
| ghsa-62j7-j842-x6r6 |
5.4 (3.1)
7.1 (4.0)
|
WeKan versions prior to 8.19 contain an authorization vulnerability in card move logic. A user can … | 2026-02-08T00:30:59Z | 2026-02-18T21:31:18Z |
| ghsa-f5pv-9whq-7mv7 |
6.8 (3.1)
|
In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.8, and 9.2.11, and Splunk Cloud Plat… | 2026-02-18T18:30:41Z | 2026-02-18T18:30:41Z |
| ghsa-9pjv-cqr5-4xh7 |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in newbee-ltd newbee-mall up to a069069b07027613bf0e7f571736be86f431faee.… | 2026-02-18T18:30:41Z | 2026-02-18T18:30:41Z |
| ghsa-4mcw-fcqm-vqg3 |
3.3 (3.1)
1.9 (4.0)
|
A vulnerability was determined in Squirrel up to 3.2. Affected by this vulnerability is the functio… | 2026-02-18T18:30:41Z | 2026-02-18T18:30:41Z |
| ghsa-w35p-gjc5-2g6r |
4.3 (3.1)
|
The Booking Calendar plugin for WordPress is vulnerable to Insecure Direct Object Reference in all … | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-hcrc-x9p4-f9jh |
9.8 (3.1)
|
code-projects Community Project Scholars Tracking System 1.0 is vulnerable to SQL Injection in the … | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-chpq-fr33-gp2m |
7.5 (3.1)
8.7 (4.0)
|
When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate. Not… | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-7fjm-558r-4j8r |
7.5 (3.1)
|
Missing authentication and authorization in print_membership_card.php in CodeAstro Membership Manag… | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-6rjp-j8mc-4f57 |
3.3 (3.1)
1.9 (4.0)
|
A vulnerability has been found in wren-lang wren up to 0.4.0. This impacts the function printError … | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-64jv-v62f-2xrg |
4.3 (3.1)
|
In Splunk Enterprise versions below 10.0.2, 10.0.3, 9.4.8, and 9.3.9, a low-privileged user who doe… | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-5q5x-wqxc-vv25 |
9.8 (3.1)
|
CodeAstro Membership Management System 1.0 contains a missing authentication vulnerability in delet… | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-4v8p-q39m-4pj8 |
3.5 (3.1)
|
In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.5, 9.3.7, and 9.2.9, and Splunk Cloud Platf… | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-xw73-fccw-fgc4 |
9.8 (3.1)
|
ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application pass… | 2026-02-18T18:30:39Z | 2026-02-18T18:30:39Z |
| ghsa-fqrv-m9rv-j33j |
9.8 (3.1)
|
UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default cr… | 2026-02-18T18:30:39Z | 2026-02-18T18:30:39Z |
| ghsa-f2fg-5m3g-hqwv |
6.5 (3.1)
|
mayswind ezbookkeeping versions 1.2.0 and earlier contain a critical vulnerability in JSON and XML … | 2026-02-18T18:30:39Z | 2026-02-18T18:30:39Z |
| ghsa-f7cx-4c4g-9g59 |
7.8 (3.1)
|
An arbitrary code execution vulnerability exists in the Code Stream directive functionality of Open… | 2026-02-18T15:31:26Z | 2026-02-18T18:30:38Z |
| ghsa-c56r-fcf4-6rp2 |
10.0 (3.1)
|
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credenti… | 2026-02-17T21:31:14Z | 2026-02-18T18:30:35Z |
| ghsa-xfjv-gcf8-3jqc |
7.5 (3.1)
9.2 (4.0)
|
Access control settings for forum post custom fields are not applied to the JSON output type, leadi… | 2026-02-06T09:30:28Z | 2026-02-18T18:30:23Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-179 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:28.937409Z |
| pysec-2021-178 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:28.768951Z |
| pysec-2021-177 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:28.584780Z |
| pysec-2021-176 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_op… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:28.395200Z |
| pysec-2021-175 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:28.180235Z |
| pysec-2021-174 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:28.012732Z |
| pysec-2021-173 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:27.845923Z |
| pysec-2021-172 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:27.629630Z |
| pysec-2021-171 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:27.421981Z |
| pysec-2021-170 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:27.240459Z |
| pysec-2021-169 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can fo… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:27.051975Z |
| pysec-2021-168 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:26.851089Z |
| pysec-2021-167 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:26.683297Z |
| pysec-2021-166 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:26.519373Z |
| pysec-2021-165 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:26.348588Z |
| pysec-2021-164 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:26.181060Z |
| pysec-2021-163 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:25.990763Z |
| pysec-2021-162 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:25.775857Z |
| pysec-2021-161 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:25.604287Z |
| pysec-2021-160 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:25.367237Z |
| pysec-2021-159 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `tf.raw_ops.Co… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:25.206676Z |
| pysec-2021-158 |
|
TensorFlow is an end-to-end open source platform for machine learning. Specifying a negat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:25.027733Z |
| pysec-2021-157 |
|
TensorFlow is an end-to-end open source platform for machine learning. Missing validation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:24.934633Z |
| pysec-2021-156 |
|
TensorFlow is an end-to-end open source platform for machine learning. The API of `tf.raw… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:24.765492Z |
| pysec-2021-155 |
|
TensorFlow is an end-to-end open source platform for machine learning. In eager mode (def… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:24.585448Z |
| pysec-2021-154 |
|
TensorFlow is an end-to-end open source platform for machine learning. A malicious user c… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:24.411852Z |
| pysec-2021-153 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_op… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:24.214869Z |
| pysec-2021-152 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:24.038004Z |
| pysec-2021-151 |
|
TensorFlow is an end-to-end open source platform for machine learning. If the `splits` ar… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:23.861341Z |
| pysec-2021-150 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling TF operati… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:23.682962Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32284 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.029082Z |
| gsd-2024-32283 | Tenda FH1203 V2.0.1.6 firmware has a command injection vulnerablility in formexeCommand f… | 2024-04-13T05:02:29.045805Z |
| gsd-2024-32282 | Tenda FH1202 v1.2.0.14(408) firmware contains a command injection vulnerablility in the f… | 2024-04-13T05:02:29.078830Z |
| gsd-2024-32281 | Tenda AC7V1.0 v15.03.06.44 firmware contains a command injection vulnerablility in formex… | 2024-04-13T05:02:29.051225Z |
| gsd-2024-32280 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.133247Z |
| gsd-2024-32279 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.079893Z |
| gsd-2024-32278 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.036847Z |
| gsd-2024-32277 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.123802Z |
| gsd-2024-32276 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.078227Z |
| gsd-2024-32275 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.033362Z |
| gsd-2024-32274 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.076373Z |
| gsd-2024-32273 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.048759Z |
| gsd-2024-32272 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.031169Z |
| gsd-2024-32271 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.090648Z |
| gsd-2024-32270 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.106273Z |
| gsd-2024-32269 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.062152Z |
| gsd-2024-32268 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.062352Z |
| gsd-2024-32267 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.027097Z |
| gsd-2024-32266 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.137388Z |
| gsd-2024-32265 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.064928Z |
| gsd-2024-32264 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.147153Z |
| gsd-2024-32263 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.037043Z |
| gsd-2024-32262 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.139229Z |
| gsd-2024-32261 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.092785Z |
| gsd-2024-32260 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.085284Z |
| gsd-2024-32259 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.083669Z |
| gsd-2024-32258 | The network server of fceux 2.7.0 has a path traversal vulnerability, allowing attackers … | 2024-04-13T05:02:29.145748Z |
| gsd-2024-32257 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.115592Z |
| gsd-2024-32256 | Phpgurukul Tourism Management System v2.0 is vulnerable to Unrestricted Upload of File wi… | 2024-04-13T05:02:29.101041Z |
| gsd-2024-32255 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.083472Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2025-192887 | Malicious code in workvivo-chatbot (npm) | 2025-12-23T08:36:36Z | 2026-01-02T21:37:31Z |
| MAL-2025-192886 | Malicious code in workvivo-anniversary-automation (npm) | 2025-12-23T08:36:35Z | 2026-01-02T21:37:31Z |
| MAL-2025-192885 | Malicious code in wealthbox-marketing (npm) | 2025-12-23T08:35:44Z | 2026-01-02T21:37:31Z |
| MAL-2025-192884 | Malicious code in vite-react-setting (npm) | 2025-12-23T08:35:16Z | 2026-01-02T21:37:31Z |
| MAL-2025-192883 | Malicious code in varshade-afc (npm) | 2025-12-23T08:34:50Z | 2026-01-02T21:37:31Z |
| MAL-2025-192882 | Malicious code in vapark-boost-v1 (npm) | 2025-12-23T08:34:49Z | 2026-01-02T21:37:31Z |
| MAL-2025-192881 | Malicious code in typeface-maison-neue (npm) | 2025-12-23T08:34:00Z | 2026-01-02T21:37:31Z |
| MAL-2025-192880 | Malicious code in tierlist (npm) | 2025-12-23T08:33:32Z | 2026-01-02T21:37:31Z |
| mal-2026-4 | Malicious code in rules-playground (npm) | 2026-01-01T17:03:00Z | 2026-01-02T21:37:30Z |
| mal-2026-3 | Malicious code in rules-deployer (npm) | 2026-01-01T16:52:37Z | 2026-01-02T21:37:30Z |
| mal-2025-192978 | Malicious code in tailwindcss-typography-style (npm) | 2025-12-30T16:05:07Z | 2026-01-02T21:37:30Z |
| mal-2025-192977 | Malicious code in shopify-app-react-router (npm) | 2025-12-30T16:12:28Z | 2026-01-02T21:37:30Z |
| mal-2025-192976 | Malicious code in shop-minis-docs (npm) | 2025-12-30T16:12:28Z | 2026-01-02T21:37:30Z |
| mal-2025-192975 | Malicious code in rt-text-media-collection (npm) | 2025-12-30T16:12:28Z | 2026-01-02T21:37:30Z |
| mal-2025-192974 | Malicious code in rt-interactive-card-collection (npm) | 2025-12-30T16:12:28Z | 2026-01-02T21:37:30Z |
| mal-2025-192973 | Malicious code in react-dom-bindings (npm) | 2025-12-30T16:12:28Z | 2026-01-02T21:37:30Z |
| mal-2025-192972 | Malicious code in react-devtools-shared (npm) | 2025-12-30T16:12:28Z | 2026-01-02T21:37:30Z |
| mal-2025-192971 | Malicious code in react-devtools-extensions (npm) | 2025-12-30T16:12:28Z | 2026-01-02T21:37:30Z |
| mal-2025-192879 | Malicious code in tescoutils (npm) | 2025-12-23T08:33:02Z | 2026-01-02T21:37:30Z |
| mal-2025-192878 | Malicious code in teeseest (npm) | 2025-12-23T08:32:50Z | 2026-01-02T21:37:30Z |
| mal-2025-192876 | Malicious code in suntik-tiktok (npm) | 2025-12-23T08:32:05Z | 2026-01-02T21:37:30Z |
| mal-2025-192875 | Malicious code in sturdyfetch9 (npm) | 2025-12-23T08:31:59Z | 2026-01-02T21:37:30Z |
| mal-2025-192874 | Malicious code in sturdyfetch5 (npm) | 2025-12-23T08:31:52Z | 2026-01-02T21:37:30Z |
| mal-2025-192873 | Malicious code in sturdyfetch4 (npm) | 2025-12-23T08:31:51Z | 2026-01-02T21:37:30Z |
| mal-2025-192872 | Malicious code in sturdyfetch3 (npm) | 2025-12-23T08:31:50Z | 2026-01-02T21:37:30Z |
| mal-2025-192871 | Malicious code in sturdyfetch22 (npm) | 2025-12-23T08:31:49Z | 2026-01-02T21:37:30Z |
| mal-2025-192870 | Malicious code in sturdyfetch21 (npm) | 2025-12-23T08:31:48Z | 2026-01-02T21:37:30Z |
| mal-2025-192869 | Malicious code in sturdyfetch19 (npm) | 2025-12-23T08:31:47Z | 2026-01-02T21:37:30Z |
| mal-2025-192868 | Malicious code in sturdyfetch18 (npm) | 2025-12-23T08:31:47Z | 2026-01-02T21:37:30Z |
| mal-2025-192867 | Malicious code in sturdyfetch17 (npm) | 2025-12-23T08:31:46Z | 2026-01-02T21:37:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-0284 | logrotate: Schwachstelle ermöglicht Denial of Service | 2022-05-26T22:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2022-0181 | Grub2: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2022-06-07T22:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0710 | Microsoft Edge: Mehrere Schwachstellen | 2025-04-03T22:00:00.000+00:00 | 2025-04-03T22:00:00.000+00:00 |
| wid-sec-w-2025-0707 | M-Files Server: Mehrere Schwachstellen | 2025-04-03T22:00:00.000+00:00 | 2025-04-03T22:00:00.000+00:00 |
| wid-sec-w-2025-0706 | Moxa Router: Mehrere Schwachstellen | 2025-04-03T22:00:00.000+00:00 | 2025-04-03T22:00:00.000+00:00 |
| wid-sec-w-2025-0703 | Ivanti Connect Secure: Schwachstelle ermöglicht Codeausführung | 2025-04-03T22:00:00.000+00:00 | 2025-04-03T22:00:00.000+00:00 |
| wid-sec-w-2025-0702 | JetBrains IntelliJ IDEA: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-04-03T22:00:00.000+00:00 | 2025-04-03T22:00:00.000+00:00 |
| wid-sec-w-2025-0349 | Intel Ethernet Controller: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-04-03T22:00:00.000+00:00 |
| wid-sec-w-2025-0324 | Intel Graphics Driver: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-04-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3082 | Apache Commons IO: Schwachstelle ermöglicht Denial of Service | 2024-10-03T22:00:00.000+00:00 | 2025-04-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1625 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-07-16T22:00:00.000+00:00 | 2025-04-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1433 | OpenVPN: Mehrere Schwachstellen ermöglichen Denial of Service und Privilegieneskalation | 2024-06-23T22:00:00.000+00:00 | 2025-04-03T22:00:00.000+00:00 |
| wid-sec-w-2023-0011 | ffmpeg: Mehrere Schwachstellen | 2021-06-01T22:00:00.000+00:00 | 2025-04-03T22:00:00.000+00:00 |
| wid-sec-w-2022-1664 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-10-10T22:00:00.000+00:00 | 2025-04-03T22:00:00.000+00:00 |
| wid-sec-w-2025-0699 | Cisco EPNM und Prime Infrastructure: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2025-04-02T22:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0697 | Checkmk: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-04-02T22:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0696 | PyTorch: Schwachstelle ermöglicht Denial of Service | 2025-04-02T22:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0695 | IBM TXSeries for Multiplatforms: Mehrere Schwachstellen | 2025-04-02T22:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0693 | Red Hat build of Quarkus: Schwachstelle ermöglicht Denial of Service | 2025-04-02T22:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0691 | SugarCRM Sugar Enterprise: Mehrere Schwachstellen | 2025-04-02T22:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0690 | Drupal: Mehrere Schwachstellen | 2025-04-02T22:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0689 | Jenkins Plugins: Mehrere Schwachstellen | 2025-04-02T22:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0688 | win.rar WinRAR: Schwachstelle ermöglicht Codeausführung | 2025-04-02T22:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0687 | Dell PowerProtect Data Domain: Schwachstelle ermöglicht Privilegieneskalation | 2025-04-02T22:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0686 | IBM DataPower Gateway: Mehrere Schwachstellen | 2025-04-02T22:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0685 | Yubico YubiKey: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-04-02T22:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0615 | CrushFTP: Schwachstelle ermöglicht das Umgehen der Authentisierung | 2025-03-20T23:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0610 | Tenable Security Nessus Agent: Schwachstelle ermöglicht Privilegieneskalation | 2025-03-20T23:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0508 | Apache Camel: Schwachstelle ermöglicht Manipulation | 2025-03-09T23:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0444 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Denial of Service | 2025-02-26T23:00:00.000+00:00 | 2025-04-02T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:9884 | Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.2.0 | 2024-11-18T14:52:00+00:00 | 2026-02-27T16:26:30+00:00 |
| rhsa-2024:8351 | Red Hat Security Advisory: grafana:7.3.6 security update | 2024-10-23T10:12:31+00:00 | 2026-02-27T16:26:29+00:00 |
| rhsa-2024:8113 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.3 security and bug fix update | 2024-10-15T08:52:38+00:00 | 2026-02-27T16:26:28+00:00 |
| rhsa-2024:7725 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.5 | 2024-10-07T09:24:53+00:00 | 2026-02-27T16:26:25+00:00 |
| rhsa-2024:7724 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.11 | 2024-10-07T09:22:37+00:00 | 2026-02-27T16:26:24+00:00 |
| rhsa-2024:11293 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.6.4 security enhancements and bug fixes | 2024-12-17T19:52:29+00:00 | 2026-02-27T16:26:15+00:00 |
| rhsa-2024:10906 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.5 security and bug fix update | 2024-12-10T01:37:19+00:00 | 2026-02-27T16:26:12+00:00 |
| rhsa-2024:10865 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.12.1 bug fixes and container updates | 2024-12-05T19:46:00+00:00 | 2026-02-27T16:26:11+00:00 |
| rhsa-2024:10857 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.7.2 security updates and bug fixes | 2024-12-05T16:41:20+00:00 | 2026-02-27T16:26:10+00:00 |
| rhsa-2024:10236 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.17.0 release | 2024-11-25T19:44:38+00:00 | 2026-02-27T16:26:07+00:00 |
| rhba-2024:10184 | Red Hat Bug Fix Advisory: Red Hat Developer Hub 1.2.5 bugfix release | 2024-11-21T22:06:56+00:00 | 2026-02-27T16:26:02+00:00 |
| rhsa-2026:2694 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2026-02-12T22:32:47+00:00 | 2026-02-27T16:21:58+00:00 |
| rhsa-2025:9294 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.17.2 | 2025-06-19T13:39:23+00:00 | 2026-02-27T16:21:31+00:00 |
| rhsa-2025:8512 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.16.4 | 2025-06-04T12:25:29+00:00 | 2026-02-27T16:21:30+00:00 |
| rhsa-2025:8233 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.18.1 | 2025-05-27T18:59:27+00:00 | 2026-02-27T16:21:27+00:00 |
| rhsa-2025:4437 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.13 security update | 2025-05-05T00:13:08+00:00 | 2026-02-27T16:21:21+00:00 |
| rhsa-2025:4226 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.10 on RHEL 7 security update | 2025-04-28T00:20:32+00:00 | 2026-02-27T16:21:18+00:00 |
| rhsa-2025:2876 | Red Hat Security Advisory: ACS 4.7 enhancement and security update | 2025-03-17T01:38:45+00:00 | 2026-02-27T16:21:13+00:00 |
| rhsa-2025:23225 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.25.0 Release. | 2025-12-15T21:46:21+00:00 | 2026-02-27T16:21:02+00:00 |
| rhsa-2025:1813 | Red Hat Security Advisory: python3.11-urllib3 security update | 2025-02-25T11:30:52+00:00 | 2026-02-27T16:20:54+00:00 |
| rhsa-2025:1793 | Red Hat Security Advisory: python3.11-urllib3 security update | 2025-02-25T11:31:57+00:00 | 2026-02-27T16:20:53+00:00 |
| rhsa-2025:15874 | Red Hat Security Advisory: python-cryptography security update | 2025-09-16T00:58:46+00:00 | 2026-02-27T16:20:48+00:00 |
| rhsa-2025:13098 | Red Hat Security Advisory: python-cryptography security update | 2025-08-06T00:27:56+00:00 | 2026-02-27T16:20:47+00:00 |
| rhsa-2025:14553 | Red Hat Security Advisory: python-cryptography security update | 2025-08-26T00:45:19+00:00 | 2026-02-27T16:20:46+00:00 |
| rhsa-2025:13104 | Red Hat Security Advisory: python-cryptography security update | 2025-08-06T00:50:00+00:00 | 2026-02-27T16:20:46+00:00 |
| rhsa-2025:13103 | Red Hat Security Advisory: python-cryptography security update | 2025-08-06T00:44:36+00:00 | 2026-02-27T16:20:46+00:00 |
| rhsa-2025:13102 | Red Hat Security Advisory: python-cryptography security update | 2025-08-06T00:30:05+00:00 | 2026-02-27T16:20:44+00:00 |
| rhsa-2025:13101 | Red Hat Security Advisory: python-cryptography security update | 2025-08-06T00:40:36+00:00 | 2026-02-27T16:20:44+00:00 |
| rhsa-2025:13100 | Red Hat Security Advisory: python-cryptography security update | 2025-08-06T00:41:10+00:00 | 2026-02-27T16:20:43+00:00 |
| rhsa-2025:11814 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.19 security, enhancement & bug fix update | 2025-07-28T04:53:57+00:00 | 2026-02-27T16:20:40+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-356-02 | Rockwell Automation Studio 5000 Logix Emulate | 2022-12-22T00:00:00.000000Z | 2022-12-22T00:00:00.000000Z |
| icsa-22-356-01 | Priva TopControl Suite | 2022-12-22T00:00:00.000000Z | 2022-12-22T00:00:00.000000Z |
| icsa-22-354-05 | Delta 4G Router DX-3021 | 2022-12-20T00:00:00.000000Z | 2022-12-20T00:00:00.000000Z |
| icsa-22-354-04 | Rockwell Automation MicroLogix 1100 and 1400 | 2022-12-20T00:00:00.000000Z | 2022-12-20T00:00:00.000000Z |
| icsa-22-354-02 | Rockwell Automation GuardLogix and ControlLogix controllers | 2022-12-20T00:00:00.000000Z | 2022-12-20T00:00:00.000000Z |
| icsa-22-354-01 | Fuji Electric Tellus Lite V-Simulator | 2022-12-20T00:00:00.000000Z | 2022-12-20T00:00:00.000000Z |
| icsa-22-349-21 | Siemens SCALANCE X-200RNA Switch Devices | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-19 | Siemens SICAM PAS | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-18 | Siemens SCALANCE SC-600 Family | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-17 | Siemens Mendix Email Connector | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-15 | Siemens Teamcenter Visualization and JT2Go | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-02 | Siemens SCALANCE X-200RNA Switch Devices | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-347-02 | Schneider Electric APC Easy UPS Online | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-347-01 | ICONICS and Mitsubishi Electric Products | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-346-05 | Siemens PLM Help Server | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-258-04 | Siemens Mendix SAML Module | 2022-09-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-21-012-02 | Siemens SCALANCE X Switches (Update B) | 2021-01-12T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-20-161-04 | Siemens SIMATIC, SINAMICS, SINEC, SINEMA, SINUMERIK (Update J) | 2020-06-09T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-20-042-07 | Siemens SCALANCE X Switches (Update B) | 2020-02-11T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-20-014-03 | Siemens SCALANCE X Switches (Update B) | 2020-01-14T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-18-163-02 | Siemens SCALANCE X Switches (Update A) | 2018-06-12T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-20-212-04 | Mitsubishi Electric Factory Automation Engineering Products | 2020-07-30T00:00:00.000000Z | 2022-12-09T00:00:00.000000Z |
| icsa-22-342-03 | Rockwell Automation Logix controllers | 2022-12-08T00:00:00.000000Z | 2022-12-08T00:00:00.000000Z |
| icsa-22-342-01 | Advantech iView | 2022-12-08T00:00:00.000000Z | 2022-12-08T00:00:00.000000Z |
| icsma-22-335-01 | BD BodyGuard Pumps | 2022-12-01T00:00:00.000000Z | 2022-12-01T00:00:00.000000Z |
| icsa-22-335-02 | Horner Automation Remote Compact Controller | 2022-12-01T00:00:00.000000Z | 2022-12-01T00:00:00.000000Z |
| icsa-22-335-01 | Mitsubishi Electric MELSEC iQ-R Series | 2022-12-01T00:00:00.000000Z | 2022-12-01T00:00:00.000000Z |
| icsa-22-333-01 | Mitsubishi Electric GOT2000 | 2022-11-29T00:00:00.000000Z | 2022-11-29T00:00:00.000000Z |
| icsa-22-326-02 | Digital Alert Systems DASDEC | 2022-11-22T07:00:00.000000Z | 2022-11-22T07:00:00.000000Z |
| icsa-22-326-05 | Moxa Multiple ARM-Based Computers | 2022-11-22T00:00:00.000000Z | 2022-11-22T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-rv-command-inject-LBdQ2KRN | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Command Injection Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-proximity-dll-uvw4vhpm | Cisco Proximity Desktop for Windows DLL Hijacking Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-proximity-dll-UvW4VHPM | Cisco Proximity Desktop for Windows DLL Hijacking Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-nfvis-xss-smsz5vhb | Cisco Enterprise NFV Infrastructure Software Cross-Site Scripting Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-nfvis-xss-smsz5Vhb | Cisco Enterprise NFV Infrastructure Software Cross-Site Scripting Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-ipcameras-dos-9zdzcufq | Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Denial of Service Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-ipcameras-dos-9zdZcUfq | Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Denial of Service Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-fmc-xee-dfzardcs | Cisco Firepower Management Center XML Entity Expansion Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-fmc-xee-DFzARDcs | Cisco Firepower Management Center XML Entity Expansion Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-fmc-stored-xss-djkfczf2 | Cisco Firepower Management Center Stored Cross-Site Scripting Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-fmc-stored-xss-djKfCzf2 | Cisco Firepower Management Center Stored Cross-Site Scripting Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-fmc-infodisc-rjdktm6f | Cisco Firepower Management Center Information Disclosure Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-fmc-infodisc-RJdktM6f | Cisco Firepower Management Center Information Disclosure Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-dnac-xss-hfv73cs3 | Cisco DNA Center Cross-Site Scripting Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-dnac-xss-HfV73cS3 | Cisco DNA Center Cross-Site Scripting Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-cucm-logging-6qswkryz | Cisco Unified Communications Products Information Disclosure Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-cucm-logging-6QSWKRYz | Cisco Unified Communications Products Information Disclosure Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-cmxpe-75asy9k | Cisco Connected Mobile Experiences Privilege Escalation Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-cmxpe-75Asy9k | Cisco Connected Mobile Experiences Privilege Escalation Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-cmxapi-kskwcmfp | Cisco Connected Mobile Experiences User Enumeration Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-cmxapi-KsKwCmfp | Cisco Connected Mobile Experiences User Enumeration Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-20191112-asa-ftd-lua-rce | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Code Execution Vulnerability | 2019-11-12T13:15:00+00:00 | 2021-01-11T19:14:20+00:00 |
| cisco-sa-cedge-filt-bypass-y6wzmqm4 | Cisco SD-WAN Software Packet Filtering Bypass Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-12-14T21:43:02+00:00 |
| cisco-sa-cedge-filt-bypass-Y6wZMqm4 | Cisco SD-WAN Software Packet Filtering Bypass Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-12-14T21:43:02+00:00 |
| cisco-sa-webex-auth-token-3vg57a5r | Cisco Webex Meetings and Cisco Webex Meetings Server Ghost Join Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-12-10T16:10:07+00:00 |
| cisco-sa-webex-auth-token-3vg57A5r | Cisco Webex Meetings and Cisco Webex Meetings Server Ghost Join Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-12-10T16:10:07+00:00 |
| cisco-sa-jabber-zktzjpgo | Cisco Jabber Desktop and Mobile Client Software Vulnerabilities | 2020-12-10T16:00:00+00:00 | 2020-12-10T16:00:00+00:00 |
| cisco-sa-jabber-ZktzjpgO | Cisco Jabber Desktop and Mobile Client Software Vulnerabilities | 2020-12-10T16:00:00+00:00 | 2020-12-10T16:00:00+00:00 |
| cisco-sa-ios-profinet-dos-65qyg3w5 | Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-12-09T15:23:48+00:00 |
| cisco-sa-ios-profinet-dos-65qYG3W5 | Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-12-09T15:23:48+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-15889 | Lua 5.4.0 has a getobjname heap-based buffer over-read because youngcollection in lgc.c uses markold for an insufficient number of list members. | 2020-07-02T00:00:00.000Z | 2026-02-18T14:04:58.000Z |
| msrc_cve-2024-53060 | drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported | 2024-11-02T00:00:00.000Z | 2026-02-18T14:04:52.000Z |
| msrc_cve-2024-44954 | ALSA: line6: Fix racy access to midibuf | 2024-09-01T07:00:00.000Z | 2026-02-18T14:04:50.000Z |
| msrc_cve-2024-49878 | resource: fix region_intersects() vs add_memory_driver_managed() | 2024-10-01T07:00:00.000Z | 2026-02-18T14:04:44.000Z |
| msrc_cve-2023-6780 | Glibc: integer overflow in __vsyslog_internal() | 2024-01-01T08:00:00.000Z | 2026-02-18T14:04:41.000Z |
| msrc_cve-2025-37952 | ksmbd: Fix UAF in __close_file_table_ids | 2025-05-02T00:00:00.000Z | 2026-02-18T14:04:27.000Z |
| msrc_cve-2024-44958 | sched/smt: Fix unbalance sched_smt_present dec/inc | 2024-09-01T07:00:00.000Z | 2026-02-18T14:04:22.000Z |
| msrc_cve-2019-20352 | In Netwide Assembler (NASM) 2.15rc0, a heap-based buffer over-read occurs (via a crafted .asm file) in set_text_free when called from expand_one_smacro in asm/preproc.c. | 2020-01-02T00:00:00.000Z | 2026-02-18T14:04:17.000Z |
| msrc_cve-2023-6779 | Glibc: off-by-one heap-based buffer overflow in __vsyslog_internal() | 2024-01-01T08:00:00.000Z | 2026-02-18T14:04:15.000Z |
| msrc_cve-2024-54661 | readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file. | 2024-12-02T00:00:00.000Z | 2026-02-18T14:04:01.000Z |
| msrc_cve-2024-50168 | net/sun3_82586: fix potential memory leak in sun3_82586_send_packet() | 2024-11-02T00:00:00.000Z | 2026-02-18T14:04:01.000Z |
| msrc_cve-2025-40339 | drm/amdgpu: fix nullptr err of vm_handle_moved | 2025-12-02T00:00:00.000Z | 2026-02-18T14:04:00.000Z |
| msrc_cve-2024-44977 | drm/amdgpu: Validate TA binary size | 2024-09-01T07:00:00.000Z | 2026-02-18T14:03:55.000Z |
| msrc_cve-2025-37922 | book3s64/radix : Align section vmemmap start address to PAGE_SIZE | 2025-05-02T00:00:00.000Z | 2026-02-18T14:03:52.000Z |
| msrc_cve-2022-48622 | In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10 the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c. | 2024-01-01T08:00:00.000Z | 2026-02-18T14:03:46.000Z |
| msrc_cve-2022-48434 | libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and other products, leaves stale hwaccel state in worker threads, which allows attackers to trigger a use-after-free and execute arbitrary code in some circumstances (e.g., hardware re-initialization upon a mid-video SPS change when Direct3D11 is used). | 2023-03-10T00:00:00.000Z | 2026-02-18T14:03:41.000Z |
| msrc_cve-2021-27918 | encoding/xml in Go before 1.15.9 and 1.16.x before 1.16.1 has an infinite loop if a custom TokenReader (for xml.NewTokenDecoder) returns EOF in the middle of an element. This can occur in the Decode DecodeElement or Skip method. | 2021-03-02T00:00:00.000Z | 2026-02-18T14:03:28.000Z |
| msrc_cve-2024-44988 | net: dsa: mv88e6xxx: Fix out-of-bound access | 2024-09-01T07:00:00.000Z | 2026-02-18T14:03:27.000Z |
| msrc_cve-2025-39989 | x86/mce: use is_copy_from_user() to determine copy-from-user context | 2025-04-02T00:00:00.000Z | 2026-02-18T14:03:25.000Z |
| msrc_cve-2024-53088 | i40e: fix race condition by adding filter's intermediate sync state | 2024-11-02T00:00:00.000Z | 2026-02-18T14:03:22.000Z |
| msrc_cve-2024-49902 | jfs: check if leafidx greater than num leaves per dmap tree | 2024-10-01T07:00:00.000Z | 2026-02-18T14:03:22.000Z |
| msrc_cve-2023-23934 | Wrkzeug's incorrect parsing of nameless cookies leads to __Host- cookies bypass | 2023-02-01T00:00:00.000Z | 2026-02-18T14:03:17.000Z |
| msrc_cve-2024-0853 | OCSP verification bypass with TLS session reuse | 2024-02-02T08:00:00.000Z | 2026-02-18T14:03:08.000Z |
| msrc_cve-2024-49940 | l2tp: prevent possible tunnel refcount underflow | 2024-10-01T07:00:00.000Z | 2026-02-18T14:02:54.000Z |
| msrc_cve-2025-22086 | RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow | 2025-04-02T00:00:00.000Z | 2026-02-18T14:02:50.000Z |
| msrc_cve-2024-44982 | drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails | 2024-09-01T07:00:00.000Z | 2026-02-18T14:02:45.000Z |
| msrc_cve-2024-53066 | nfs: Fix KMSAN warning in decode_getfattr_attrs() | 2024-11-02T00:00:00.000Z | 2026-02-18T14:02:44.000Z |
| msrc_cve-2021-29923 | Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet which (in some situations) allows attackers to bypass access control that is based on IP addresses because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR. | 2021-08-02T00:00:00.000Z | 2026-02-18T14:02:27.000Z |
| msrc_cve-2025-21931 | hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio | 2025-04-02T00:00:00.000Z | 2026-02-18T14:02:23.000Z |
| msrc_cve-2023-6200 | Kernel: icmpv6 router advertisement packets aka linux tcp/ip remote code execution vulnerability | 2024-01-01T08:00:00.000Z | 2026-02-18T14:02:20.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:14244-1 | ansible-9-9.8.0-1.1 on GA media | 2024-08-08T00:00:00Z | 2024-08-08T00:00:00Z |
| opensuse-su-2024:14243-1 | roundcubemail-1.6.8-1.1 on GA media | 2024-08-07T00:00:00Z | 2024-08-07T00:00:00Z |
| opensuse-su-2024:14242-1 | element-web-1.11.73-1.1 on GA media | 2024-08-07T00:00:00Z | 2024-08-07T00:00:00Z |
| opensuse-su-2024:14241-1 | libxml2-2-2.12.9-1.1 on GA media | 2024-08-06T00:00:00Z | 2024-08-06T00:00:00Z |
| opensuse-su-2024:14240-1 | libnbd-1.20.2-1.1 on GA media | 2024-08-06T00:00:00Z | 2024-08-06T00:00:00Z |
| opensuse-su-2024:0231-1 | Security update for python-notebook | 2024-08-02T10:51:39Z | 2024-08-02T10:51:39Z |
| opensuse-su-2024:14239-1 | patch-2.7.6-8.1 on GA media | 2024-08-02T00:00:00Z | 2024-08-02T00:00:00Z |
| opensuse-su-2024:14238-1 | libneatvnc0-0.8.1-1.1 on GA media | 2024-08-02T00:00:00Z | 2024-08-02T00:00:00Z |
| opensuse-su-2024:14237-1 | trivy-0.54.1-1.1 on GA media | 2024-08-01T00:00:00Z | 2024-08-01T00:00:00Z |
| opensuse-su-2024:14236-1 | python-Twisted-doc-24.3.0-2.1 on GA media | 2024-08-01T00:00:00Z | 2024-08-01T00:00:00Z |
| opensuse-su-2024:14235-1 | nova-3.10.0-1.1 on GA media | 2024-08-01T00:00:00Z | 2024-08-01T00:00:00Z |
| opensuse-su-2024:14234-1 | klp-build-0~20240731.edfe0bf-1.1 on GA media | 2024-08-01T00:00:00Z | 2024-08-01T00:00:00Z |
| opensuse-su-2024:14233-1 | java-1_8_0-openjdk-1.8.0.422-1.1 on GA media | 2024-08-01T00:00:00Z | 2024-08-01T00:00:00Z |
| opensuse-su-2024:14232-1 | golang-github-prometheus-prometheus-2.53.0-3.1 on GA media | 2024-08-01T00:00:00Z | 2024-08-01T00:00:00Z |
| opensuse-su-2024:14231-1 | ffmpeg-4-4.4.4-12.1 on GA media | 2024-08-01T00:00:00Z | 2024-08-01T00:00:00Z |
| opensuse-su-2024:14230-1 | espeak-ng-1.51.1-1.1 on GA media | 2024-08-01T00:00:00Z | 2024-08-01T00:00:00Z |
| opensuse-su-2024:14229-1 | docker-26.1.5_ce-1.1 on GA media | 2024-08-01T00:00:00Z | 2024-08-01T00:00:00Z |
| opensuse-su-2024:14228-1 | matrix-synapse-1.112.0-1.1 on GA media | 2024-07-31T00:00:00Z | 2024-07-31T00:00:00Z |
| opensuse-su-2024:14227-1 | 389-ds-3.1.1~git0.aef1668-1.1 on GA media | 2024-07-31T00:00:00Z | 2024-07-31T00:00:00Z |
| opensuse-su-2024:14226-1 | ffmpeg-6-6.1.1-6.1 on GA media | 2024-07-30T00:00:00Z | 2024-07-30T00:00:00Z |
| opensuse-su-2024:14225-1 | curl-8.9.0-1.1 on GA media | 2024-07-30T00:00:00Z | 2024-07-30T00:00:00Z |
| opensuse-su-2024:14224-1 | cargo-audit-advisory-db-20240730-1.1 on GA media | 2024-07-30T00:00:00Z | 2024-07-30T00:00:00Z |
| opensuse-su-2024:14223-1 | libwireshark17-4.2.6-3.1 on GA media | 2024-07-29T00:00:00Z | 2024-07-29T00:00:00Z |
| opensuse-su-2024:14222-1 | ffmpeg-7-7.0-3.1 on GA media | 2024-07-28T00:00:00Z | 2024-07-28T00:00:00Z |
| opensuse-su-2024:14221-1 | ffmpeg-5-5.1.4-9.1 on GA media | 2024-07-28T00:00:00Z | 2024-07-28T00:00:00Z |
| opensuse-su-2024:0227-1 | Security update for gh | 2024-07-27T04:01:36Z | 2024-07-27T04:01:36Z |
| opensuse-su-2024:0226-1 | Security update for gh | 2024-07-27T04:01:34Z | 2024-07-27T04:01:34Z |
| opensuse-su-2024:0225-1 | Security update for assimp | 2024-07-27T04:01:30Z | 2024-07-27T04:01:30Z |
| opensuse-su-2024:0224-2 | Security update for keybase-client | 2024-07-26T18:12:13Z | 2024-07-26T18:12:13Z |
| opensuse-su-2024:0223-1 | Security update for opera | 2024-07-26T14:31:50Z | 2024-07-26T14:31:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-1611 | Heap-buffer-overflow in yaml_emitter_emit_flow_mapping_key | 2020-08-14T00:01:51.615528Z | 2022-04-13T03:04:41.717390Z |
| osv-2020-1598 | Use-of-uninitialized-value in longest_match | 2020-08-12T00:00:12.956208Z | 2022-04-13T03:04:41.014335Z |
| osv-2020-1351 | Heap-use-after-free in sc_pkcs15_free_object | 2020-07-22T21:50:08.637276Z | 2022-04-13T03:04:41.575360Z |
| osv-2020-1288 | Heap-buffer-overflow in asn1_decode_entry | 2020-07-22T21:50:03.236534Z | 2022-04-13T03:04:41.602984Z |
| osv-2020-1171 | Heap-use-after-free in JS_ReadObjectRec | 2020-07-22T21:49:53.004112Z | 2022-04-13T03:04:41.243346Z |
| osv-2020-1083 | Heap-use-after-free in rpl_glob | 2020-07-22T21:49:45.883645Z | 2022-04-13T03:04:41.737685Z |
| osv-2020-1053 | UNKNOWN READ in js_parse_source_element | 2020-07-22T21:49:43.353213Z | 2022-04-13T03:04:41.248875Z |
| osv-2020-105 | Segv on unknown address in cbor_typeof | 2020-06-24T01:51:14.307336Z | 2022-04-13T03:04:41.481665Z |
| osv-2020-1046 | Stack-buffer-overflow in sc_pkcs15emu_object_add | 2020-07-22T21:49:42.803976Z | 2022-04-13T03:04:41.613341Z |
| osv-2020-1040 | Heap-buffer-overflow in decode_bit_string | 2020-07-22T21:49:41.688762Z | 2022-04-13T03:04:41.691566Z |
| osv-2020-1017 | Heap-buffer-overflow in decode_bit_string | 2020-07-22T21:49:40.221914Z | 2022-04-13T03:04:41.665375Z |
| osv-2018-68 | Heap-buffer-overflow in read_bits_16 | 2021-01-13T00:00:32.913897Z | 2022-04-13T03:04:41.157737Z |
| osv-2018-50 | Heap-use-after-free in UA_Session_deleteMembersCleanup | 2021-01-13T00:00:26.992658Z | 2022-04-13T03:04:41.341050Z |
| osv-2018-210 | Heap-use-after-free in UA_SecureChannel_deleteMembersCleanup | 2021-01-13T00:01:25.341940Z | 2022-04-13T03:04:41.270736Z |
| osv-2018-160 | Heap-buffer-overflow in do_uncompress_block | 2021-01-13T00:01:07.606550Z | 2022-04-13T03:04:41.216636Z |
| osv-2018-137 | Heap-buffer-overflow in set_char_prefix | 2021-01-13T00:00:59.684851Z | 2022-04-13T03:04:41.742908Z |
| osv-2018-130 | Stack-buffer-overflow in parse_tables | 2021-01-13T00:00:58.133861Z | 2022-04-13T03:04:41.141348Z |
| osv-2018-125 | Heap-buffer-overflow in read_bits_16 | 2021-01-13T00:00:56.185471Z | 2022-04-13T03:04:41.200549Z |
| osv-2017-78 | Negative-size-param in UA_SecureChannel_processChunk | 2021-01-13T21:57:35.111717Z | 2022-04-13T03:04:41.415024Z |
| osv-2017-66 | UNKNOWN READ in cfree | 2021-01-13T21:56:32.213437Z | 2022-04-13T03:04:41.445471Z |
| osv-2017-58 | Heap-use-after-free in UA_Array_copy | 2021-01-13T21:56:29.199662Z | 2022-04-13T03:04:41.276141Z |
| osv-2017-55 | Heap-double-free in ExtensionObject_deleteMembers | 2021-01-13T21:56:28.199946Z | 2022-04-13T03:04:41.260064Z |
| osv-2017-48 | Heap-buffer-overflow in Operation_addNode_finish | 2021-01-13T21:56:09.508442Z | 2022-04-13T03:04:41.313990Z |
| osv-2017-42 | Heap-use-after-free in UA_Array_copy | 2021-01-13T21:56:05.277761Z | 2022-04-13T03:04:41.363919Z |
| osv-2017-29 | Heap-use-after-free in UInt32_encodeBinary | 2021-01-13T00:01:34.623502Z | 2022-04-13T03:04:41.319118Z |
| osv-2017-101 | Heap-double-free in ExtensionObject_deleteMembers | 2021-01-13T21:57:41.211384Z | 2022-04-13T03:04:41.439985Z |
| osv-2017-10 | Heap-use-after-free in UA_Subscription_answerPublishRequestsNoSubscription | 2021-01-13T00:00:22.415687Z | 2022-04-13T03:04:41.303920Z |
| osv-2022-55 | Heap-buffer-overflow in ndlz4_decompress | 2022-01-17T00:01:46.844742Z | 2022-04-13T03:04:40.429461Z |
| osv-2022-250 | Heap-buffer-overflow in __covrec_1D46B478ANUMBER | 2022-03-17T00:01:53.988524Z | 2022-04-13T03:04:40.163328Z |
| osv-2021-979 | Heap-buffer-overflow in stbi__convert_16_to_8 | 2021-07-13T00:01:26.986629Z | 2022-04-13T03:04:40.811607Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-keydb-2024-31227 | Denial-of-service due to malformed ACL selectors in Redis | 2024-10-09T16:30:52.029Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2023-45145 | Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window. | 2024-08-22T19:22:46.458Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2023-41056 | Redis vulnerable to integer overflow in certain payloads | 2024-08-22T19:23:05.762Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2023-41053 | Redis SORT_RO may bypass ACL configuration | 2024-08-22T19:23:23.662Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2023-36824 | Heap overflow in COMMAND GETKEYS and ACL evaluation in Redis | 2024-08-22T19:23:41.759Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2023-28856 | `HINCRBYFLOAT` can be used to crash a redis-server process | 2024-08-22T19:24:15.254Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2023-28425 | Specially crafted MSETNX command can lead to denial-of-service | 2024-08-22T19:24:32.454Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2023-25155 | Integer Overflow in several Redis commands can lead to denial of service. | 2024-08-22T19:24:48.358Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2023-22458 | Integer overflow in multiple Redis commands can lead to denial-of-service | 2024-08-22T19:25:05.961Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2022-3647 | Redis Crash Report debug.c sigsegvHandler denial of service | 2024-08-22T19:25:26.151Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2022-36021 | Redis string pattern matching can be abused to achieve Denial of Service | 2024-08-22T19:25:41.457Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2022-35951 | Redis subject to Integer Overflow leading to Remote Code Execution via Heap Overflow | 2024-08-22T19:26:14.253Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2022-31144 | Potential heap overflow in Redis | 2024-08-22T19:26:49.452Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2022-24834 | Heap overflow issue with the Lua cjson library used by Redis | 2024-08-22T19:27:04.151Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2022-24736 | A Malformed Lua script can crash Redis | 2024-08-22T19:27:22.053Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2022-24735 | Lua scripts can be manipulated to overcome ACL rules in Redis | 2024-08-22T19:27:40.959Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2021-41099 | Integer overflow issue with strings in Redis | 2024-08-22T19:28:22.058Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2021-32762 | Integer overflow that can lead to heap overflow in redis-cli, redis-sentinel on some platforms | 2024-08-22T19:28:35.562Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2021-32687 | Integer overflow issue with intsets in Redis | 2024-08-22T19:28:52.055Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2021-32675 | DoS vulnerability in Redis | 2024-08-22T19:29:09.056Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2021-32672 | Vulnerability in Lua Debugger in Redis | 2024-08-22T19:29:26.350Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2021-32628 | Vulnerability in handling large ziplists | 2024-08-22T19:29:45.549Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2021-32627 | Integer overflow issue with Streams in Redis | 2024-08-22T19:30:03.650Z | 2025-05-20T10:02:07.006Z |
| bit-keydb-2021-32626 | Lua scripts can overflow the heap-based Lua stack in Redis | 2024-08-22T19:30:18.060Z | 2025-05-20T10:02:07.006Z |
| bit-kafka-2024-56128 | Apache Kafka: SCRAM authentication vulnerable to replay attacks when used without encryption | 2024-12-24T19:12:41.492Z | 2025-05-20T10:02:07.006Z |
| bit-kafka-2022-34917 | Unauthenticated clients may cause OutOfMemoryError on Apache Kafka Brokers | 2024-03-06T10:54:18.506Z | 2025-05-20T10:02:07.006Z |
| bit-kafka-2021-38153 | Timing Attack Vulnerability for Apache Kafka Connect and Clients | 2024-03-06T10:54:31.089Z | 2025-05-20T10:02:07.006Z |
| bit-jupyterlab-2024-43805 | HTML injection in Jupyter Notebook and JupyterLab leading to DOM Clobbering | 2024-08-30T07:13:49.180Z | 2025-05-20T10:02:07.006Z |
| bit-jupyterlab-2024-22421 | Potential authentication and CSRF tokens leak in JupyterLab | 2024-03-06T10:54:03.685Z | 2025-05-20T10:02:07.006Z |
| bit-jupyterlab-2024-22420 | Stored cross site scripting in Markdown Preview in JupyterLab | 2024-03-06T10:54:13.085Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202309-0933 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has be… | 2024-05-17T19:18:29.283000Z |
| var-202405-0649 | Beijing Yakong Technology Development Co., Ltd. is a high-tech enterprise of industrial a… | 2024-05-17T19:18:28.895000Z |
| var-202404-2194 | IBM MQ Appliance 9.3 CD and LTS are vulnerable to a heap-based buffer overflow, caused by… | 2024-05-16T22:47:05.065000Z |
| var-199809-0010 | iChat ROOMS Webserver allows remote attackers to read arbitrary files via a .. (dot dot) … | 2024-05-15T22:56:45.437000Z |
| var-199804-0007 | Buffer overflow in Apple AppleShare Mail Server 5.0.3 on MacOS 8.1 and earlier allows a r… | 2024-05-15T22:53:49.707000Z |
| var-199804-0010 | Buffer overflow in SMTP HELO command in Sendmail allows a remote attacker to hide activit… | 2024-05-15T22:53:31.351000Z |
| var-199912-0023 | lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows loc… | 2024-05-15T22:38:32.874000Z |
| var-199807-0030 | By design, the "established" command on the Cisco PIX firewall allows connections from on… | 2024-05-14T22:59:38.281000Z |
| var-200004-0053 | Buffer overflow in WebObjects.exe in the WebObjects Developer 4.5 package allows remote a… | 2024-05-14T22:59:17.344000Z |
| var-199911-0013 | Idle locking function in MacOS 9 allows local attackers to bypass the password protection… | 2024-05-14T22:59:17.410000Z |
| var-199907-0037 | MacOS uses weak encryption for passwords that are stored in the Users & Groups Data File.… | 2024-05-14T22:57:55.325000Z |
| var-202306-1109 | A vulnerability has been identified in SIMATIC PCS 7 (All versions < V9.1 SP2 UC04), SIMA… | 2024-05-14T22:57:37.290000Z |
| var-199905-0009 | Control Panel "Password Security" option for Apple Powerbooks allows attackers with physi… | 2024-05-14T22:57:34.106000Z |
| var-199910-0007 | Idle locking function in MacOS 9 allows local users to bypass the password protection of … | 2024-05-14T22:52:35.479000Z |
| var-199912-0159 | Macintosh systems generate large ICMP datagrams in response to malformed datagrams, allow… | 2024-05-14T22:51:21.274000Z |
| var-202004-0712 | A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: EK-ER… | 2024-05-14T22:36:22.729000Z |
| var-202312-0236 | A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC P… | 2024-05-14T22:20:44.510000Z |
| var-202210-0537 | A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE M… | 2024-05-14T22:02:48.955000Z |
| var-202312-0234 | A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC P… | 2024-05-14T21:47:37.301000Z |
| var-202212-1301 | A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.50), S… | 2024-05-14T21:36:09.623000Z |
| var-202312-0237 | A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC P… | 2024-05-14T21:07:38.158000Z |
| var-202304-0737 | A vulnerability has been identified in SIPROTEC 5 6MD85 (CP300) (All versions >= V7.80 < … | 2024-05-14T20:45:05.054000Z |
| var-202312-0235 | A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC P… | 2024-05-14T20:30:13.048000Z |
| var-202312-0238 | A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC P… | 2024-05-14T19:25:50.562000Z |
| var-202312-1262 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command … | 2024-05-12T23:08:54.835000Z |
| var-199808-0007 | Cisco PIX firewall manager (PFM) on Windows NT allows attackers to connect to port 8080 o… | 2024-05-12T03:50:13.318000Z |
| var-199507-0001 | In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control li… | 2024-05-12T03:50:13.380000Z |
| var-202312-2148 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command … | 2024-05-12T03:49:21.253000Z |
| var-202312-1439 | TOTOlink EX1800T V9.1.0cu.2112_B20220316 is vulnerable to an unauthorized arbitrary comma… | 2024-05-12T03:47:51.622000Z |
| var-202312-0767 | TOTOlink EX1800T V9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command … | 2024-05-12T03:47:51.665000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2013-000089 | D-Link DWL-2100AP vulnerable to denial-of-service (DoS) | 2013-09-20T15:07+09:00 | 2013-09-30T15:47+09:00 |
| jvndb-2013-004319 | Multiple vulnerabilities in Java bundled with Hitachi JP1/Cm2/Network Node Manager i | 2013-09-27T14:51+09:00 | 2013-09-27T14:51+09:00 |
| jvndb-2013-004318 | Multiple vulnerabilities in Hitachi JP1/Cm2/Network Node Manager i | 2013-09-27T14:49+09:00 | 2013-09-27T14:49+09:00 |
| jvndb-2013-000088 | ChamaCargo vulnerable to cross-site scripting | 2013-09-13T12:21+09:00 | 2013-09-18T16:12+09:00 |
| jvndb-2013-000086 | Opera vulnerable to cross-site scripting | 2013-09-12T14:13+09:00 | 2013-09-17T14:20+09:00 |
| jvndb-2013-000085 | VMware ESX and ESXi vulnerable to buffer overflow | 2013-09-06T14:03+09:00 | 2013-09-11T14:06+09:00 |
| jvndb-2013-000084 | VMware ESX and ESXi vulnerable to directory traversal | 2013-09-06T13:59+09:00 | 2013-09-11T13:59+09:00 |
| jvndb-2013-000082 | Cybozu Office vulnerable to cross-site scripting | 2013-09-10T13:56+09:00 | 2013-09-11T13:34+09:00 |
| jvndb-2013-000081 | EC-CUBE vulnerable to directory traversal when used in Windows | 2013-08-30T14:38+09:00 | 2013-09-02T18:25+09:00 |
| jvndb-2013-000071 | Oracle Outside In vulnerable to denial-of-service (DoS) | 2013-07-17T13:56+09:00 | 2013-08-28T14:31+09:00 |
| jvndb-2013-000078 | Yafuoku! contains an issue where it fails to verify SSL server certificates | 2013-08-19T15:35+09:00 | 2013-08-23T18:43+09:00 |
| jvndb-2013-000079 | Yahoo! Japan Shopping for Android contains an issue where it fails to verify SSL server certificates | 2013-08-19T15:50+09:00 | 2013-08-23T18:42+09:00 |
| jvndb-2013-000080 | PHP OpenID Library vulnerable to XML external entity injection | 2013-08-21T14:26+09:00 | 2013-08-23T18:38+09:00 |
| jvndb-2013-000077 | Cybozu Mailwise vulnerable to information disclosure | 2013-08-13T12:22+09:00 | 2013-08-20T11:37+09:00 |
| jvndb-2013-000075 | docomo overseas usage application vulnerability in the connection process | 2013-08-07T15:01+09:00 | 2013-08-14T14:17+09:00 |
| jvndb-2013-000076 | JP1/IT Desktop Management - Manager and Hitachi IT Operations Director vulnerable to privilege escalation | 2013-07-29T13:39+09:00 | 2013-08-02T18:17+09:00 |
| jvndb-2012-002110 | WordPress vulnerable to cross-site scripting | 2013-07-26T13:33+09:00 | 2013-07-26T13:33+09:00 |
| jvndb-2013-000072 | JBoss RichFaces vulnerable to remote code execution | 2013-07-19T12:32+09:00 | 2013-07-24T16:16+09:00 |
| jvndb-2013-000069 | Cybozu Office session management vulnerability | 2013-07-16T12:27+09:00 | 2013-07-23T19:09+09:00 |
| jvndb-2013-003391 | Oracle Enterprise Manager vulnerable to cross-site scripting | 2013-07-22T15:00+09:00 | 2013-07-22T15:00+09:00 |
| jvndb-2007-000819 | Cross-site scripting vulnerability in Apache HTTP Server "mod_imap" and "mod_imagemap" | 2008-05-21T00:00+09:00 | 2013-07-18T18:58+09:00 |
| jvndb-2013-000068 | AQUOS PhotoPlayer HN-PP150 vulnerable to denial-of-service (DoS) | 2013-07-11T15:39+09:00 | 2013-07-16T14:21+09:00 |
| jvndb-2013-000065 | EC-CUBE vulnerable to directory traversal | 2013-06-27T14:33+09:00 | 2013-07-02T16:15+09:00 |
| jvndb-2013-000064 | EC-CUBE vulnerable to cross-site scripting | 2013-06-27T14:31+09:00 | 2013-07-02T16:10+09:00 |
| jvndb-2013-000063 | EC-CUBE vulnerable to cross-site scripting | 2013-06-27T14:31+09:00 | 2013-07-02T16:06+09:00 |
| jvndb-2013-000062 | EC-CUBE vulnerable to code injection | 2013-06-27T14:29+09:00 | 2013-07-02T16:01+09:00 |
| jvndb-2013-000061 | EC-CUBE vulnerable to directory traversal | 2013-06-27T14:29+09:00 | 2013-07-02T15:57+09:00 |
| jvndb-2013-000067 | CLIP-MAIL vulnerable to cross-site scripting | 2013-06-27T14:35+09:00 | 2013-07-02T15:52+09:00 |
| jvndb-2013-000066 | POST-MAIL vulnerable to cross-site scripting | 2013-06-27T14:38+09:00 | 2013-07-02T15:47+09:00 |
| jvndb-2013-000058 | Ichitaro series vulnerable to arbitrary code execution | 2013-06-18T15:17+09:00 | 2013-06-26T14:49+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:02311-1 | Security update for protobuf | 2025-07-15T09:15:50Z | 2025-07-15T09:15:50Z |
| suse-su-2025:02310-1 | Security update for protobuf | 2025-07-15T09:15:14Z | 2025-07-15T09:15:14Z |
| suse-su-2025:02309-1 | Security update for protobuf | 2025-07-15T09:14:54Z | 2025-07-15T09:14:54Z |
| suse-su-2025:02308-1 | Security update for the Linux Kernel | 2025-07-14T15:55:56Z | 2025-07-14T15:55:56Z |
| suse-su-2025:02307-1 | Security update for the Linux Kernel | 2025-07-14T12:31:08Z | 2025-07-14T12:31:08Z |
| suse-su-2025:02304-1 | Security update for gstreamer-plugins-base | 2025-07-14T10:51:05Z | 2025-07-14T10:51:05Z |
| suse-su-2025:02303-1 | Security update for gstreamer-plugins-good | 2025-07-14T10:50:49Z | 2025-07-14T10:50:49Z |
| suse-su-2025:02302-1 | Security update for gstreamer-plugins-base | 2025-07-14T10:50:22Z | 2025-07-14T10:50:22Z |
| suse-su-2025:02297-1 | Security update for python36 | 2025-07-11T16:03:54Z | 2025-07-11T16:03:54Z |
| suse-su-2025:02296-1 | Security update for go1.23 | 2025-07-11T15:20:05Z | 2025-07-11T15:20:05Z |
| suse-su-2025:02295-1 | Security update for go1.24 | 2025-07-11T15:18:49Z | 2025-07-11T15:18:49Z |
| suse-su-2025:20493-1 | Security update for the Linux Kernel | 2025-07-11T15:14:18Z | 2025-07-11T15:14:18Z |
| suse-su-2025:02294-1 | Security update for libxml2 | 2025-07-11T14:47:43Z | 2025-07-11T14:47:43Z |
| suse-su-2025:20475-1 | Security update for the Linux Kernel | 2025-07-11T13:43:10Z | 2025-07-11T13:43:10Z |
| suse-su-2025:02290-1 | Security update for xen | 2025-07-11T11:13:27Z | 2025-07-11T11:13:27Z |
| suse-su-2025:02289-1 | Security update for docker | 2025-07-11T11:12:49Z | 2025-07-11T11:12:49Z |
| suse-su-2025:20492-1 | Security update for python311 | 2025-07-11T09:47:32Z | 2025-07-11T09:47:32Z |
| suse-su-2025:20491-1 | Security update for rust-keylime | 2025-07-11T09:39:57Z | 2025-07-11T09:39:57Z |
| suse-su-2025:20490-1 | Security update for libgcrypt | 2025-07-11T09:20:30Z | 2025-07-11T09:20:30Z |
| suse-su-2025:02283-1 | Security update for audiofile | 2025-07-11T08:35:16Z | 2025-07-11T08:35:16Z |
| suse-su-2025:02282-1 | Security update for umoci | 2025-07-11T08:34:24Z | 2025-07-11T08:34:24Z |
| suse-su-2025:02281-1 | Security update for libssh | 2025-07-10T16:05:33Z | 2025-07-10T16:05:33Z |
| suse-su-2025:02280-1 | Security update for tomcat | 2025-07-10T16:04:29Z | 2025-07-10T16:04:29Z |
| suse-su-2025:02279-1 | Security update for libssh | 2025-07-10T16:03:25Z | 2025-07-10T16:03:25Z |
| suse-su-2025:02278-1 | Security update for libssh | 2025-07-10T16:02:57Z | 2025-07-10T16:02:57Z |
| suse-su-2025:02277-1 | Security update for libsoup2 | 2025-07-10T14:35:27Z | 2025-07-10T14:35:27Z |
| suse-su-2025:02276-1 | Security update for libsoup | 2025-07-10T14:35:08Z | 2025-07-10T14:35:08Z |
| suse-su-2025:02275-1 | Security update for libxml2 | 2025-07-10T14:34:07Z | 2025-07-10T14:34:07Z |
| suse-su-2025:20474-1 | Security update for afterburn | 2025-07-10T14:27:22Z | 2025-07-10T14:27:22Z |
| suse-su-2025:20489-1 | Security update for sudo | 2025-07-10T12:49:58Z | 2025-07-10T12:49:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-28950 | Simple Cafe Ordering System portal.php文件SQL注入漏洞 | 2025-08-20 | 2025-11-20 |
| cnvd-2025-28949 | Simple Cafe Ordering System login.php文件SQL注入漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28948 | Simple Cafe Ordering System add_to_cart文件跨站脚本漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28947 | Simple Cafe Ordering System addmem.php文件SQL注入漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28946 | Student Information System searchquery.php文件SQL注入漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28944 | Student Information System /index.php文件SQL注入漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28943 | Student Information System register.php文件SQL注入漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28942 | Student Information System /editprofile.php文件SQL注入漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28941 | Student Information System register.php跨站脚本漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28940 | Student Information System editprofile.php文件跨站脚本漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28838 | WordPress Payments Braintree For WooCommerce plugin授权绕过漏洞 | 2025-11-14 | 2025-11-20 |
| cnvd-2025-28837 | WordPress Easy Email Subscription plugin跨站脚本漏洞 | 2025-11-14 | 2025-11-20 |
| cnvd-2025-28836 | WordPress Asgaros Forum plugin跨站请求伪造漏洞 | 2025-11-14 | 2025-11-20 |
| cnvd-2025-28835 | WordPress Theater for WordPress plugin缺少授权漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28834 | WordPress Survey Maker plugin缺少能力检查漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28833 | WordPress Survey Maker plugin缺少授权漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28832 | WordPress Survey Maker plugin未授权访问漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28831 | WordPress SureForms plugin信息泄露漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28830 | WordPress Save as PDF Button plugin跨站脚本漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28829 | WordPress quicq plugin缺少能力检查漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28828 | WordPress Qi Blocks plugin跨站脚本漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28827 | WordPress Popup addon for Ninja Forms plugin跨站脚本漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28826 | WordPress Frontend File Manager Plugin缺少授权漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28825 | WordPress Data Tables Generator by Supsystic plugin任意文件删除漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28824 | WordPress Contact Form Email plugin缺少授权漏洞 | 2025-11-18 | 2025-11-20 |
| cnvd-2025-28721 | Mozilla Firefox缓冲区溢出漏洞(CNVD-2025-28721) | 2025-11-14 | 2025-11-20 |
| cnvd-2025-28720 | Mozilla Firefox代码执行漏洞(CNVD-2025-28720) | 2025-11-14 | 2025-11-20 |
| cnvd-2025-28719 | Mozilla Firefox和Firefox ESR安全绕过漏洞(CNVD-2025-28719) | 2025-11-14 | 2025-11-20 |
| cnvd-2025-28718 | Mozilla Firefox和Firefox ESR代码执行漏洞(CNVD-2025-28718) | 2025-11-14 | 2025-11-20 |
| cnvd-2025-28717 | Mozilla Firefox和Firefox ESR缓冲区溢出漏洞(CNVD-2025-28717) | 2025-11-14 | 2025-11-20 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0223 | Multiples vulnérabilités dans Suricata | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| certfr-2025-avi-0222 | Vulnérabilité dans MongoDB C Driver | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| certfr-2025-avi-0221 | Multiples vulnérabilités dans HPE Aruba Networking AOS-CX | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| certfr-2025-avi-0219 | Multiples vulnérabilités dans GLPI | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| certfr-2025-avi-0218 | Multiples vulnérabilités dans Atlassian Jira | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| CERTFR-2025-AVI-0224 | Multiples vulnérabilités dans les produits Synology | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| CERTFR-2025-AVI-0223 | Multiples vulnérabilités dans Suricata | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| CERTFR-2025-AVI-0222 | Vulnérabilité dans MongoDB C Driver | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| CERTFR-2025-AVI-0221 | Multiples vulnérabilités dans HPE Aruba Networking AOS-CX | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| CERTFR-2025-AVI-0219 | Multiples vulnérabilités dans GLPI | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| CERTFR-2025-AVI-0218 | Multiples vulnérabilités dans Atlassian Jira | 2025-03-19T00:00:00.000000 | 2025-03-19T00:00:00.000000 |
| certfr-2025-avi-0216 | Multiples vulnérabilités dans les produits Schneider Electric | 2025-03-17T00:00:00.000000 | 2025-03-17T00:00:00.000000 |
| certfr-2025-avi-0215 | Multiples vulnérabilités dans VMware Tanzu Gemfire | 2025-03-17T00:00:00.000000 | 2025-03-17T00:00:00.000000 |
| CERTFR-2025-AVI-0216 | Multiples vulnérabilités dans les produits Schneider Electric | 2025-03-17T00:00:00.000000 | 2025-03-17T00:00:00.000000 |
| CERTFR-2025-AVI-0215 | Multiples vulnérabilités dans VMware Tanzu Gemfire | 2025-03-17T00:00:00.000000 | 2025-03-17T00:00:00.000000 |
| certfr-2025-avi-0214 | Multiples vulnérabilités dans les produits IBM | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| certfr-2025-avi-0213 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| certfr-2025-avi-0212 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| certfr-2025-avi-0211 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| certfr-2025-avi-0210 | Multiples vulnérabilités dans VMware Tanzu | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| certfr-2025-avi-0209 | Multiples vulnérabilités dans PHP | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| certfr-2025-avi-0208 | Vulnérabilité dans Microsoft Dataverse | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| CERTFR-2025-AVI-0214 | Multiples vulnérabilités dans les produits IBM | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| CERTFR-2025-AVI-0213 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| CERTFR-2025-AVI-0212 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| CERTFR-2025-AVI-0211 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| CERTFR-2025-AVI-0210 | Multiples vulnérabilités dans VMware Tanzu | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| CERTFR-2025-AVI-0209 | Multiples vulnérabilités dans PHP | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| CERTFR-2025-AVI-0208 | Vulnérabilité dans Microsoft Dataverse | 2025-03-14T00:00:00.000000 | 2025-03-14T00:00:00.000000 |
| certfr-2025-avi-0207 | Multiples vulnérabilités dans Cisco IOS XR | 2025-03-13T00:00:00.000000 | 2025-03-13T00:00:00.000000 |