Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-27054 |
7.8 (3.1)
|
Out-of-bounds Write in Display |
Qualcomm, Inc. |
Snapdragon |
2025-10-09T03:18:03.164Z | 2026-02-26T17:48:07.760Z |
| CVE-2025-23315 |
7.8 (3.1)
|
NVIDIA NeMo Framework for all platforms contains … |
NVIDIA |
NeMo Framework |
2025-08-26T18:30:49.165Z | 2026-02-26T17:48:07.931Z |
| CVE-2025-10500 |
8.8 (3.1)
|
Use after free in Dawn in Google Chrome prior to … |
Google |
Chrome |
2025-09-24T16:17:12.209Z | 2026-02-26T17:48:07.613Z |
| CVE-2025-47338 |
7.8 (3.1)
|
Untrusted Pointer Dereference in DSP Service |
Qualcomm, Inc. |
Snapdragon |
2025-10-09T03:18:07.257Z | 2026-02-26T17:48:06.263Z |
| CVE-2025-27060 |
8.8 (3.1)
|
Untrusted Pointer Dereference in TZ Firmware |
Qualcomm, Inc. |
Snapdragon |
2025-10-09T03:18:06.050Z | 2026-02-26T17:48:06.737Z |
| CVE-2025-22409 |
8.4 (3.1)
|
In rfc_send_buf_uih of rfc_ts_frames.cc, there is… |
Google |
Android |
2025-08-26T22:48:53.937Z | 2026-02-26T17:48:06.428Z |
| CVE-2025-10891 |
8.8 (3.1)
|
Integer overflow in V8 in Google Chrome prior to … |
Google |
Chrome |
2025-09-24T16:17:45.647Z | 2026-02-26T17:48:06.104Z |
| CVE-2025-10502 |
8.8 (3.1)
|
Heap buffer overflow in ANGLE in Google Chrome pr… |
Google |
Chrome |
2025-09-24T16:17:13.365Z | 2026-02-26T17:48:06.584Z |
| CVE-2025-10501 |
8.8 (3.1)
|
Use after free in WebRTC in Google Chrome prior t… |
Google |
Chrome |
2025-09-24T16:17:12.775Z | 2026-02-26T17:48:06.886Z |
| CVE-2025-47340 |
7.8 (3.1)
|
Out-of-bounds Write in DSP Service |
Qualcomm, Inc. |
Snapdragon |
2025-10-09T03:18:08.408Z | 2026-02-26T17:48:05.892Z |
| CVE-2025-22411 |
8.8 (3.1)
|
In process_service_attr_rsp of sdp_discovery.cc, … |
Google |
Android |
2025-08-26T22:48:55.939Z | 2026-02-26T17:48:05.459Z |
| CVE-2025-10892 |
8.8 (3.1)
|
Integer overflow in V8 in Google Chrome prior to … |
Google |
Chrome |
2025-09-24T16:17:46.382Z | 2026-02-26T17:48:05.129Z |
| CVE-2025-47347 |
7.8 (3.1)
|
Stack-based Buffer Overflow in Automotive Software pla… |
Qualcomm, Inc. |
Snapdragon |
2025-10-09T03:18:11.938Z | 2026-02-26T17:48:04.013Z |
| CVE-2025-47341 |
7.8 (3.1)
|
Buffer Copy Without Checking Size of Input in Camera |
Qualcomm, Inc. |
Snapdragon |
2025-10-09T03:18:09.593Z | 2026-02-26T17:48:04.718Z |
| CVE-2025-22412 |
8.8 (3.1)
|
In multiple functions of sdp_server.cc, there is … |
Google |
Android |
2025-08-26T22:48:56.963Z | 2026-02-26T17:48:04.363Z |
| CVE-2025-20334 |
8.8 (3.1)
|
A vulnerability in the HTTP API subsystem of Cisc… |
Cisco |
Cisco IOS XE Software |
2025-09-24T17:07:19.311Z | 2026-02-26T17:48:04.186Z |
| CVE-2025-47349 |
7.8 (3.1)
|
Use of Out-of-range Pointer Offset in DSP Service |
Qualcomm, Inc. |
Snapdragon |
2025-10-09T03:18:13.184Z | 2026-02-26T17:48:03.425Z |
| CVE-2025-43728 |
9.6 (3.1)
|
Dell ThinOS 10, versions prior to 2508_10.0127, c… |
Dell |
ThinOS 10 |
2025-08-27T13:44:25.996Z | 2026-02-26T17:48:03.816Z |
| CVE-2025-20352 |
7.7 (3.1)
|
A vulnerability in the Simple Network Management … |
Cisco |
IOS |
2025-09-24T17:10:42.891Z | 2026-02-26T17:48:03.098Z |
| CVE-2025-20160 |
8.1 (3.1)
|
A vulnerability in the implementation of the TACA… |
Cisco |
IOS |
2025-09-24T17:10:22.652Z | 2026-02-26T17:48:03.600Z |
| CVE-2025-47351 |
7.8 (3.1)
|
Integer Overflow or Wraparound in DSP Service |
Qualcomm, Inc. |
Snapdragon |
2025-10-09T03:18:14.416Z | 2026-02-26T17:48:02.548Z |
| CVE-2025-43882 |
7.8 (3.1)
|
Dell ThinOS 10, versions prior to 2508_10.0127, c… |
Dell |
ThinOS 10 |
2025-08-27T13:51:40.130Z | 2026-02-26T17:48:02.832Z |
| CVE-2025-47354 |
7.8 (3.1)
|
Use After Free in DSP Service |
Qualcomm, Inc. |
Snapdragon |
2025-10-09T03:18:15.699Z | 2026-02-26T17:48:01.202Z |
| CVE-2025-43730 |
8.4 (3.1)
|
Dell ThinOS 10, versions prior to 2508_10.0127, c… |
Dell |
ThinOS 10 |
2025-08-27T13:57:39.797Z | 2026-02-26T17:48:01.025Z |
| CVE-2025-20313 |
6.7 (3.1)
|
Multiple vulnerabilities in Cisco IOS XE Software… |
Cisco |
Cisco IOS XE Software |
2025-09-24T17:12:40.484Z | 2026-02-26T17:48:01.459Z |
| CVE-2025-47355 |
7.8 (3.1)
|
Out-of-bounds Write in DSP Service |
Qualcomm, Inc. |
Snapdragon |
2025-10-09T03:18:16.885Z | 2026-02-26T17:48:00.648Z |
| CVE-2025-20338 |
6 (3.1)
|
A vulnerability in the CLI of Cisco IOS XE Softwa… |
Cisco |
Cisco IOS XE Software |
2025-09-24T17:14:57.638Z | 2026-02-26T17:48:00.835Z |
| CVE-2025-59251 |
7.6 (3.1)
|
Microsoft Edge (Chromium-based) Remote Code Execution … |
Microsoft |
Microsoft Edge (Chromium-based) |
2025-09-24T19:03:48.446Z | 2026-02-26T17:47:59.084Z |
| CVE-2025-5187 |
6.7 (3.1)
|
Nodes can delete themselves by adding an OwnerReference |
Kubernetes |
Kubernetes |
2025-08-27T16:20:56.778Z | 2026-02-26T17:47:59.242Z |
| CVE-2025-43729 |
7.8 (3.1)
|
Dell ThinOS 10, versions prior to 2508_10.0127, c… |
Dell |
ThinOS 10 |
2025-08-27T14:02:47.196Z | 2026-02-26T17:47:59.877Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2020-1489 |
7.8 (3.1)
|
Windows CSC Service Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:12.000Z | 2024-08-04T06:39:10.412Z |
| CVE-2020-1488 |
7 (3.1)
|
Windows AppX Deployment Extensions Elevation of Privil… |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:11.000Z | 2024-08-04T06:39:10.373Z |
| CVE-2020-1487 |
7.8 (3.1)
|
Media Foundation Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:11.000Z | 2024-08-04T06:39:10.512Z |
| CVE-2020-1486 |
7.8 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:10.000Z | 2024-11-18T16:43:36.690Z |
| CVE-2020-1485 |
5.5 (3.1)
|
Windows Image Acquisition Service Information Disclosu… |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:10.000Z | 2024-08-04T06:39:10.363Z |
| CVE-2020-1484 |
N/A
|
Windows Work Folders Service Elevation of Privilege Vu… |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:09.000Z | 2024-08-04T06:39:10.381Z |
| CVE-2020-1483 |
5 (3.1)
|
Microsoft Outlook Memory Corruption Vulnerability |
Microsoft |
Microsoft Office 2019 |
2020-08-17T19:13:09.000Z | 2024-08-04T06:39:10.418Z |
| CVE-2020-1482 |
6.3 (3.1)
|
Microsoft Office SharePoint XSS Vulnerability |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2020-09-11T17:09:19.000Z | 2024-08-04T06:39:10.324Z |
| CVE-2020-1480 |
7.8 (3.1)
|
Windows GDI Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:08.000Z | 2024-08-04T06:39:09.786Z |
| CVE-2020-1479 |
N/A
|
DirectX Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:08.000Z | 2024-08-04T06:39:10.389Z |
| CVE-2020-1478 |
7.8 (3.1)
|
Media Foundation Memory Corruption Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:07.000Z | 2024-08-04T06:39:09.643Z |
| CVE-2020-1477 |
7 (3.1)
|
Media Foundation Memory Corruption Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:07.000Z | 2024-08-04T06:39:10.460Z |
| CVE-2020-1476 |
N/A
|
ASP.NET and .NET Elevation of Privilege Vulnerability |
Microsoft |
Microsoft .NET Framework 4.8 |
2020-08-17T19:13:06.000Z | 2024-08-04T06:39:10.505Z |
| CVE-2020-1475 |
7.8 (3.1)
|
Windows Server Resource Management Service Elevation o… |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:06.000Z | 2024-08-04T06:39:10.290Z |
| CVE-2020-1474 |
7.8 (3.1)
|
Windows Image Acquisition Service Information Disclosu… |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:05.000Z | 2024-11-18T16:46:28.079Z |
| CVE-2020-1473 |
7 (3.1)
|
Jet Database Engine Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-08-17T19:13:05.000Z | 2024-08-04T06:39:09.800Z |
| CVE-2020-1471 |
7.3 (3.1)
|
Windows CloudExperienceHost Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:18.000Z | 2024-08-04T06:39:10.366Z |
| CVE-2020-1470 |
7.8 (3.1)
|
Windows Work Folders Service Elevation of Privilege Vu… |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:04.000Z | 2024-08-04T06:39:09.972Z |
| CVE-2020-1467 |
10 (3.1)
|
Windows Hard Link Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2020-08-17T19:13:04.000Z | 2024-08-04T06:39:09.643Z |
| CVE-2020-1466 |
7.8 (3.1)
|
Windows Remote Desktop Gateway (RD Gateway) Denial of … |
Microsoft |
Windows Server 2019 |
2020-08-17T19:13:03.000Z | 2024-10-01T15:57:42.973Z |
| CVE-2020-1460 |
8.6 (3.1)
|
Microsoft SharePoint Server Remote Code Execution Vuln… |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2020-09-11T17:09:17.000Z | 2024-08-04T06:39:09.671Z |
| CVE-2020-1459 |
7.5 (3.1)
|
Windows ARM Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2020-08-17T19:13:02.000Z | 2024-08-04T06:39:09.644Z |
| CVE-2020-1455 |
5.3 (3.1)
|
Microsoft SQL Server Management Studio Denial of Servi… |
Microsoft |
SQL Server Management Studio 18.6 |
2020-08-17T19:13:02.000Z | 2024-08-04T06:39:09.660Z |
| CVE-2020-1453 |
8.6 (3.1)
|
Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2020-09-11T17:09:17.000Z | 2024-08-04T06:39:09.786Z |
| CVE-2020-1452 |
8.6 (3.1)
|
Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2020-09-11T17:09:16.000Z | 2024-11-18T16:24:00.737Z |
| CVE-2020-1440 |
6.3 (3.1)
|
Microsoft SharePoint Server Tampering Vulnerability |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2020-09-11T17:09:16.000Z | 2024-08-04T06:39:09.629Z |
| CVE-2020-1417 |
5.5 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:01.000Z | 2024-08-04T06:39:09.116Z |
| CVE-2020-1383 |
N/A
|
Windows RRAS Service Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:01.000Z | 2024-11-18T17:26:18.963Z |
| CVE-2020-1379 |
5.5 (3.1)
|
Media Foundation Memory Corruption Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-08-17T19:13:00.000Z | 2024-08-04T06:32:01.258Z |
| CVE-2020-1378 |
7.5 (3.1)
|
Windows Registry Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-08-17T19:12:59.000Z | 2024-08-04T06:32:01.267Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2020-1256 | <p>An information disclosure vulnerability exists when the Windows GDI component improperly disclos… | 2020-09-11T17:15:20.090 | 2026-02-23T18:24:07.953 |
| fkie_cve-2020-1252 | <p>A remote code execution vulnerability exists when Windows improperly handles objects in memory. … | 2020-09-11T17:15:20.043 | 2026-02-23T18:24:06.667 |
| fkie_cve-2020-1250 | <p>An information disclosure vulnerability exists when the win32k component improperly provides ker… | 2020-09-11T17:15:19.997 | 2026-02-23T18:24:06.013 |
| fkie_cve-2020-1245 | <p>An elevation of privilege vulnerability exists in Windows when the Win32k component fails to pro… | 2020-09-11T17:15:19.933 | 2026-02-23T18:24:04.387 |
| fkie_cve-2020-1243 | <p>A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to proper… | 2020-10-16T23:15:17.680 | 2026-02-23T18:24:03.973 |
| fkie_cve-2020-1228 | <p>A denial of service vulnerability exists in Windows DNS when it fails to properly handle queries… | 2020-09-11T17:15:19.887 | 2026-02-23T18:24:00.587 |
| fkie_cve-2020-1227 | <p>A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not prop… | 2020-09-11T17:15:19.823 | 2026-02-23T18:24:00.440 |
| fkie_cve-2020-1224 | <p>An information disclosure vulnerability exists when Microsoft Excel improperly discloses the con… | 2020-09-11T17:15:19.760 | 2026-02-23T18:23:59.973 |
| fkie_cve-2020-1218 | <p>A remote code execution vulnerability exists in Microsoft Word software when it fails to properl… | 2020-09-11T17:15:19.713 | 2026-02-23T18:23:58.600 |
| fkie_cve-2020-1210 | <p>A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to … | 2020-09-11T17:15:19.667 | 2026-02-23T18:23:56.717 |
| fkie_cve-2026-22610 | Angular is a development platform for building mobile and desktop web applications using TypeScript… | 2026-01-10T04:16:01.517 | 2026-02-23T18:23:55.623 |
| fkie_cve-2020-1205 | <p>A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a sp… | 2020-09-11T17:15:19.620 | 2026-02-23T18:23:55.610 |
| fkie_cve-2020-1200 | <p>A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to … | 2020-09-11T17:15:19.573 | 2026-02-23T18:23:54.410 |
| fkie_cve-2020-1198 | <p>A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not prop… | 2020-09-11T17:15:19.510 | 2026-02-23T18:23:54.127 |
| fkie_cve-2020-1193 | <p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails… | 2020-09-11T17:15:19.463 | 2026-02-23T18:23:53.050 |
| fkie_cve-2020-1182 | A remote code execution vulnerability exists in Microsoft Dynamics 365 for Finance and Operations (… | 2020-08-17T19:15:14.147 | 2026-02-23T18:23:51.280 |
| fkie_cve-2020-1180 | <p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine han… | 2020-09-11T17:15:19.403 | 2026-02-23T18:23:51.033 |
| fkie_cve-2020-1172 | <p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine han… | 2020-09-11T17:15:19.357 | 2026-02-23T18:23:49.717 |
| fkie_cve-2020-1169 | <p>An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objec… | 2020-09-11T17:15:19.307 | 2026-02-23T18:23:48.953 |
| fkie_cve-2020-1167 | <p>A remote code execution vulnerability exists in the way that Microsoft Graphics Components handl… | 2020-10-16T23:15:17.617 | 2026-02-23T18:23:48.710 |
| fkie_cve-2020-1159 | <p>An elevation of privilege vulnerability exists in the way that the StartTileData.dll handles fil… | 2020-09-11T17:15:19.247 | 2026-02-23T18:23:47.010 |
| fkie_cve-2020-1152 | <p>An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.s… | 2020-09-11T17:15:19.200 | 2026-02-23T18:23:44.930 |
| fkie_cve-2020-1146 | <p>An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handl… | 2020-09-11T17:15:19.137 | 2026-02-23T18:23:42.890 |
| fkie_cve-2020-1133 | <p>An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector impro… | 2020-09-11T17:15:19.090 | 2026-02-23T18:23:39.903 |
| fkie_cve-2020-1130 | <p>An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector impro… | 2020-09-11T17:15:19.043 | 2026-02-23T18:23:39.180 |
| fkie_cve-2020-1129 | <p>A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library ha… | 2020-09-11T17:15:18.980 | 2026-02-23T18:23:38.927 |
| fkie_cve-2020-1122 | <p>An elevation of privilege vulnerability exists when the Windows Language Pack Installer improper… | 2020-09-11T17:15:18.917 | 2026-02-23T18:23:37.897 |
| fkie_cve-2020-1119 | <p>An information disclosure vulnerability exists when StartTileData.dll improperly handles objects… | 2020-09-11T17:15:18.870 | 2026-02-23T18:23:37.473 |
| fkie_cve-2020-1115 | <p>An elevation of privilege vulnerability exists when the <a href="https://technet.microsoft.com/l… | 2020-09-11T17:15:18.823 | 2026-02-23T18:23:36.483 |
| fkie_cve-2020-1098 | <p>An elevation of privilege vulnerability exists when the Shell infrastructure component improperl… | 2020-09-11T17:15:18.777 | 2026-02-23T18:23:33.650 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-v6c6-vqqg-w888 |
7.2 (3.1)
|
OpenClaw affected by potential code execution via unsafe hook module path handling in Gateway | 2026-02-18T00:57:48Z | 2026-02-18T00:57:48Z |
| ghsa-5xfq-5mr7-426q |
5.5 (3.1)
|
OpenClaw's unsanitized session ID enables path traversal in transcript file operations | 2026-02-18T00:57:30Z | 2026-02-18T00:57:30Z |
| ghsa-w5c7-9qqw-6645 |
7.1 (4.0)
|
OpenClaw inter-session prompts could be treated as direct user instructions | 2026-02-18T00:56:51Z | 2026-02-18T00:56:51Z |
| ghsa-jqpq-mgvm-f9r6 |
8.8 (3.1)
|
OpenClaw: Command hijacking via unsafe PATH handling (bootstrapping + node-host PATH overrides) | 2026-02-18T00:55:50Z | 2026-02-18T00:55:50Z |
| ghsa-pg2v-8xwh-qhcc |
6.5 (3.1)
|
OpenClaw affected by SSRF in optional Tlon (Urbit) extension authentication | 2026-02-18T00:55:00Z | 2026-02-18T00:55:00Z |
| ghsa-c37p-4qqg-3p76 |
6.5 (3.1)
|
OpenClaw Twilio voice-call webhook auth bypass when ngrok loopback compatibility is enabled | 2026-02-18T00:54:48Z | 2026-02-18T00:54:48Z |
| ghsa-mj5r-hh7j-4gxf |
5.9 (3.1)
|
OpenClaw Telegram allowlist authorization accepted mutable usernames | 2026-02-18T00:54:32Z | 2026-02-18T00:54:32Z |
| ghsa-rq6g-px6m-c248 |
8.3 (4.0)
|
OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting | 2026-02-18T00:54:14Z | 2026-02-18T00:54:14Z |
| ghsa-q447-rj3r-2cgh |
7.5 (3.1)
|
OpenClaw affected by denial of service via unbounded webhook request body buffering | 2026-02-18T00:53:07Z | 2026-02-18T00:53:07Z |
| ghsa-h89v-j3x9-8wqj |
6.5 (3.1)
|
OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion… | 2026-02-18T00:52:54Z | 2026-02-18T00:52:54Z |
| ghsa-w2cg-vxx6-5xjg |
5.5 (3.1)
|
OpenClaw: denial of service through large base64 media files allocating large buffers before limit checks | 2026-02-18T00:52:36Z | 2026-02-18T00:52:36Z |
| ghsa-j27p-hq53-9wgc |
7.5 (3.1)
|
OpenClaw affected by denial of service via unbounded URL-backed media fetch | 2026-02-18T00:51:37Z | 2026-02-18T00:51:37Z |
| ghsa-v773-r54f-q32w |
4.8 (3.1)
|
OpenClaw Slack: dmPolicy=open allowed any DM sender to run privileged slash commands | 2026-02-18T00:51:03Z | 2026-02-18T00:51:03Z |
| ghsa-xvhf-x56f-2hpp |
5.7 (3.1)
|
OpenClaw exec approvals: safeBins could bypass stdin-only constraints via shell expansion | 2026-02-18T00:50:47Z | 2026-02-18T00:50:47Z |
| ghsa-wprr-57fw-46wj |
8.8 (3.1)
|
IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands… | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-w5xc-rm8g-jf7m |
8.8 (3.1)
|
Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges… | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-vfjm-qj84-h7cw |
7.4 (3.1)
|
IBM Concert 1.0.0 through 2.1.0 could allow a local user with specific knowledge about the system's… | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-qvc7-4wrw-mpgp |
4.3 (3.1)
|
IBM Cloud Pak System 2.3.3.6, 2.3.3.7, 2.3.4.0, 2.3.4.1, and 2.3.5.0 could allow an authenticated u… | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-q543-x74m-r8q9 |
7.1 (3.1)
|
StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9.0.12 and 12.0.0.4 with Single Si… | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-pp6p-hwf9-pcpx |
7.8 (3.1)
7.1 (4.0)
|
A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function… | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-pgcw-657p-x286 |
6.5 (3.1)
|
Tanium addressed an insecure file permissions vulnerability in Enforce Recovery Key Portal. | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-mw8p-6vj4-pvjr |
3.8 (3.1)
|
IBM watsonx.data 2.2 through 2.2.1 IBM Lakehouse could allow a privileged user to upload malicious … | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-jm7g-jgq2-cxf3 |
4.4 (3.1)
|
IBM WebSphere Application Server 9.0, and 8.5 could provide weaker than expected security during sy… | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-crg7-mqpm-5qr4 |
6.3 (3.1)
2.1 (4.0)
|
A flaw has been found in Blossom up to 1.17.1. This issue affects the function put of the file blos… | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-9xqc-25x2-75vf |
6.1 (3.1)
|
IBM Financial Transaction Manager for ACH Services and Check Services for Multi-Platform 3.0.0.0 th… | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-86fw-gqvv-g24p |
4.9 (3.1)
|
IBM Sterling B2B Integrator versions 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5, and 6.2.1.… | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-7jfh-hm8h-m5rq |
7.8 (3.1)
|
A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPas… | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-74hh-vrfx-9235 |
9.8 (3.1)
9.3 (4.0)
|
The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow a… | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-2mxv-4v56-9pp9 |
4.8 (4.0)
|
Pega Platform versions 8.1.0 through 25.1.1 are affected by a Stored Cross-site Scripting vulnerabi… | 2026-02-18T00:30:16Z | 2026-02-18T00:30:16Z |
| ghsa-chm2-m3w2-wcxm |
2.1 (4.0)
|
OpenClaw Google Chat spoofing access with allowlist authorized mutable email principal despite send… | 2026-02-17T22:56:39Z | 2026-02-17T22:56:39Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2019-191 |
|
An issue was discovered in OpenStack Nova before 17.0.12, 18.x before 18.2.2, and 19.x be… | nova | 2019-08-09T19:15:00Z | 2021-08-27T03:22:09.327110Z |
| pysec-2018-95 |
|
An issue was discovered in Yelp OSXCollector. A maliciously crafted Universal/fat binary … | osxcollector | 2018-06-13T22:29:00Z | 2021-08-27T03:22:09.893229Z |
| pysec-2014-86 |
|
The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier functions in SimpleGeo … | oauth2 | 2014-05-20T14:55:00Z | 2021-08-27T03:22:09.666793Z |
| pysec-2014-85 |
|
The Server.verify_request function in SimpleGeo python-oauth2 does not check the nonce, w… | oauth2 | 2014-05-20T14:55:00Z | 2021-08-27T03:22:09.637359Z |
| pysec-2021-136 |
|
A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending c… | neutron | 2021-05-28T19:15:00Z | 2021-08-27T03:22:08.884816Z |
| pysec-2019-190 |
|
An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.… | neutron | 2019-03-13T02:29:00Z | 2021-08-27T03:22:08.807010Z |
| pysec-2019-189 |
|
An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and … | neutron | 2019-04-05T05:29:00Z | 2021-08-27T03:22:08.705789Z |
| pysec-2018-94 |
|
Live-migrated instances are briefly able to inspect traffic for other instances on the sa… | neutron | 2018-09-10T19:29:00Z | 2021-08-27T03:22:08.615958Z |
| pysec-2018-93 |
|
When using the Linux bridge ml2 driver, non-privileged tenants are able to create and att… | neutron | 2018-09-10T19:29:00Z | 2021-08-27T03:22:08.555558Z |
| pysec-2020-241 |
|
MoinMoin is a wiki engine. In MoinMoin before version 1.9.11, an attacker with write perm… | moin | 2020-11-11T16:15:00Z | 2021-08-27T03:22:07.834309Z |
| pysec-2020-240 |
|
A Denial of Service (DoS) condition is possible in OpenStack Mistral in versions up to an… | mistral | 2020-06-15T15:15:00Z | 2021-08-27T03:22:07.520532Z |
| pysec-2019-188 |
|
A flaw was found in Mercurial before 4.9. It was possible to use symlinks and subreposito… | mercurial | 2019-04-22T16:29:00Z | 2021-08-27T03:22:07.409198Z |
| pysec-2018-92 |
|
A flaw was found in openstack-mistral. By manipulating the SSH private key filename, the … | mistral | 2018-11-02T21:29:00Z | 2021-08-27T03:22:07.552723Z |
| pysec-2018-91 |
|
cext/manifest.c in Mercurial before 4.7.2 has an out-of-bounds read during parsing of a m… | mercurial | 2018-10-04T23:29:00Z | 2021-08-27T03:22:07.367975Z |
| pysec-2018-90 |
|
The mpatch_decode function in mpatch.c in Mercurial before 4.6.1 mishandles certain situa… | mercurial | 2018-07-06T00:29:00Z | 2021-08-27T03:22:07.326002Z |
| pysec-2018-89 |
|
mpatch.c in Mercurial before 4.6.1 mishandles integer addition and subtraction, aka OVE-2… | mercurial | 2018-07-06T00:29:00Z | 2021-08-27T03:22:07.281860Z |
| pysec-2018-88 |
|
The mpatch_apply function in mpatch.c in Mercurial before 4.6.1 incorrectly proceeds in c… | mercurial | 2018-07-06T00:29:00Z | 2021-08-27T03:22:07.239369Z |
| pysec-2018-87 |
|
Mercurial version 4.5 and earlier contains a Incorrect Access Control (CWE-285) vulnerabi… | mercurial | 2018-03-14T13:29:00Z | 2021-08-27T03:22:07.192158Z |
| pysec-2017-91 |
|
In Mercurial before 4.1.3, "hg serve --stdio" allows remote authenticated users to launch… | mercurial | 2017-06-06T21:29:00Z | 2021-08-27T03:22:07.149994Z |
| pysec-2017-90 |
|
In Mercurial before 4.4.1, it is possible that a specially malformed repository can cause… | mercurial | 2017-12-07T18:29:00Z | 2021-08-27T03:22:07.106645Z |
| pysec-2017-89 |
|
Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to po… | mercurial | 2017-10-05T01:29:00Z | 2021-08-27T03:22:07.062416Z |
| pysec-2017-88 |
|
Mercurial prior to version 4.3 is vulnerable to a missing symlink check that can maliciou… | mercurial | 2017-10-05T01:29:00Z | 2021-08-27T03:22:07.021138Z |
| pysec-2016-31 |
|
MoinMoin 1.9.8 allows remote attackers to conduct "JavaScript injection" attacks by using… | moin | 2016-11-10T17:59:00Z | 2021-08-27T03:22:07.805432Z |
| pysec-2016-30 |
|
MoinMoin 1.9.8 allows remote attackers to conduct "JavaScript injection" attacks by using… | moin | 2016-11-10T17:59:00Z | 2021-08-27T03:22:07.777797Z |
| pysec-2010-28 |
|
Cross-site scripting (XSS) vulnerability in action/Despam.py in the Despam action module … | moin | 2010-04-05T15:30:00Z | 2021-08-27T03:22:07.708069Z |
| pysec-2021-135 |
|
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse).… | matrix-synapse | 2021-05-11T15:15:00Z | 2021-08-27T03:22:06.756710Z |
| pysec-2021-134 |
|
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse).… | matrix-synapse | 2021-03-26T20:15:00Z | 2021-08-27T03:22:06.710356Z |
| pysec-2021-133 |
|
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse).… | matrix-synapse | 2021-03-26T20:15:00Z | 2021-08-27T03:22:06.660066Z |
| pysec-2021-132 |
|
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse).… | matrix-synapse | 2021-02-26T18:15:00Z | 2021-08-27T03:22:06.616674Z |
| pysec-2021-131 |
|
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse).… | matrix-synapse | 2021-02-26T18:15:00Z | 2021-08-27T03:22:06.569635Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32164 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.118472Z |
| gsd-2024-32163 | CMSeasy 7.7.7.9 is vulnerable to code execution. | 2024-04-13T05:02:29.035823Z |
| gsd-2024-32162 | CMSeasy 7.7.7.9 is vulnerable to Arbitrary file deletion. | 2024-04-13T05:02:29.116676Z |
| gsd-2024-32161 | jizhiCMS 2.5 suffers from a File upload vulnerability. | 2024-04-13T05:02:29.030360Z |
| gsd-2024-32160 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.065557Z |
| gsd-2024-32159 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.074632Z |
| gsd-2024-32158 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.086840Z |
| gsd-2024-32157 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.032980Z |
| gsd-2024-32156 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.032218Z |
| gsd-2024-32155 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.058740Z |
| gsd-2024-32154 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.079094Z |
| gsd-2024-32153 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.131911Z |
| gsd-2024-3684 | A server side request forgery vulnerability was identified in GitHub Enterprise Server th… | 2024-04-12T05:02:29.275037Z |
| gsd-2024-3683 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-12T05:02:29.274257Z |
| gsd-2024-3682 | The WP STAGING and WP STAGING Pro plugins for WordPress are vulnerable to Sensitive Infor… | 2024-04-12T05:02:29.292769Z |
| gsd-2024-3681 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-12T05:02:29.307607Z |
| gsd-2024-3680 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-12T05:02:29.373611Z |
| gsd-2024-3679 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-12T05:02:29.286671Z |
| gsd-2024-3678 | The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to… | 2024-04-12T05:02:29.184693Z |
| gsd-2024-3677 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-12T05:02:29.212296Z |
| gsd-2024-3676 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-12T05:02:29.354611Z |
| gsd-2024-3675 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-12T05:02:29.169103Z |
| gsd-2024-3674 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-12T05:02:29.368889Z |
| gsd-2024-3673 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-12T05:02:29.255028Z |
| gsd-2024-3672 | The BA Book Everything plugin for WordPress is vulnerable to Stored Cross-Site Scripting … | 2024-04-12T05:02:29.176394Z |
| gsd-2024-3671 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-12T05:02:29.295959Z |
| gsd-2024-3670 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-12T05:02:29.308996Z |
| gsd-2024-3669 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-12T05:02:29.212978Z |
| gsd-2024-3668 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-12T05:02:29.302178Z |
| gsd-2024-3667 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-12T05:02:29.125163Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2025-192832 | Malicious code in node-calculator-73dd (npm) | 2025-12-23T08:22:02Z | 2026-01-02T21:37:29Z |
| MAL-2025-192831 | Malicious code in node-calculator-603e (npm) | 2025-12-23T08:22:01Z | 2026-01-02T21:37:29Z |
| MAL-2025-192830 | Malicious code in node-calculator-5b8f (npm) | 2025-12-23T08:22:00Z | 2026-01-02T21:37:29Z |
| MAL-2025-192829 | Malicious code in node-calculator-40ed (npm) | 2025-12-23T08:21:52Z | 2026-01-02T21:37:29Z |
| MAL-2025-192828 | Malicious code in node-calculator-2eb4 (npm) | 2025-12-23T08:21:51Z | 2026-01-02T21:37:29Z |
| MAL-2025-192827 | Malicious code in node-calculator-290c (npm) | 2025-12-23T08:21:50Z | 2026-01-02T21:37:29Z |
| MAL-2025-192826 | Malicious code in node-calculator-190a (npm) | 2025-12-23T08:21:50Z | 2026-01-02T21:37:29Z |
| MAL-2025-192825 | Malicious code in no-use-extend-native (npm) | 2025-12-23T08:21:48Z | 2026-01-02T21:37:29Z |
| MAL-2025-192824 | Malicious code in no-unsanitized (npm) | 2025-12-23T08:21:47Z | 2026-01-02T21:37:29Z |
| MAL-2025-192823 | Malicious code in nintendo-test (npm) | 2025-12-23T08:21:45Z | 2026-01-02T21:37:29Z |
| mal-2025-193005 | Malicious code in landingpage-service (npm) | 2025-12-31T13:21:20Z | 2026-01-02T21:37:28Z |
| mal-2025-192936 | Malicious code in ing-feat-pis-single-payments (npm) | 2025-12-25T18:54:07Z | 2026-01-02T21:37:28Z |
| mal-2025-192935 | Malicious code in ing-feat-mortgage-consent-starter (npm) | 2025-12-25T18:54:11Z | 2026-01-02T21:37:28Z |
| mal-2025-192822 | Malicious code in ke-moma2 (npm) | 2025-12-23T08:18:31Z | 2026-01-02T21:37:28Z |
| mal-2025-192821 | Malicious code in ke-moma (npm) | 2025-12-23T08:18:30Z | 2026-01-02T21:37:28Z |
| mal-2025-192820 | Malicious code in karem6 (npm) | 2025-12-23T08:18:30Z | 2026-01-02T21:37:28Z |
| mal-2025-192819 | Malicious code in jz-user-js-bridge (npm) | 2025-12-23T08:18:20Z | 2026-01-02T21:37:28Z |
| mal-2025-192818 | Malicious code in jz-ui-user (npm) | 2025-12-23T08:18:20Z | 2026-01-02T21:37:28Z |
| mal-2025-192817 | Malicious code in jz-native-js-bridge (npm) | 2025-12-23T08:18:18Z | 2026-01-02T21:37:28Z |
| mal-2025-192816 | Malicious code in jsxswap (npm) | 2025-12-23T08:18:15Z | 2026-01-02T21:37:28Z |
| mal-2025-192815 | Malicious code in jstoauto (npm) | 2025-12-23T08:18:15Z | 2026-01-02T21:37:28Z |
| mal-2025-192814 | Malicious code in jsswapper (npm) | 2025-12-23T08:18:14Z | 2026-01-02T21:37:28Z |
| mal-2025-192813 | Malicious code in jsonupon (npm) | 2025-12-23T08:18:01Z | 2026-01-02T21:37:28Z |
| mal-2025-192812 | Malicious code in jsonrecap (npm) | 2025-12-23T08:18:00Z | 2026-01-02T21:37:28Z |
| mal-2025-192811 | Malicious code in jsonauto (npm) | 2025-12-23T08:18:00Z | 2026-01-02T21:37:28Z |
| mal-2025-192810 | Malicious code in jsonauthcap (npm) | 2025-12-23T08:17:59Z | 2026-01-02T21:37:28Z |
| mal-2025-192809 | Malicious code in jsonauth (npm) | 2025-12-23T08:17:51Z | 2026-01-02T21:37:28Z |
| mal-2025-192808 | Malicious code in jsonapptoken (npm) | 2025-12-23T08:17:50Z | 2026-01-02T21:37:28Z |
| MAL-2025-193005 | Malicious code in landingpage-service (npm) | 2025-12-31T13:21:20Z | 2026-01-02T21:37:28Z |
| MAL-2025-192936 | Malicious code in ing-feat-pis-single-payments (npm) | 2025-12-25T18:54:07Z | 2026-01-02T21:37:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0644 | IBM App Connect Enterprise: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-03-26T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0643 | GitLab: Mehrere Schwachstellen | 2025-03-26T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0642 | Acronis Cyber Protect: Schwachstelle ermöglicht Privilegieneskalation | 2025-03-26T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0593 | Google Chrome/Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2025-03-19T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0563 | Kubernetes: Schwachstelle ermöglicht Umgehung von Sicherheitsmechanismen | 2025-03-13T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2024-1845 | Intel Prozessor: Mehrere Schwachstellen | 2024-08-13T22:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2024-1828 | Intel Prozessor: Mehrere Schwachstellen | 2024-08-13T22:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2023-2906 | Intel Prozessoren: Mehrere Schwachstellen | 2023-11-14T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2023-2017 | Red Hat Enterprise Linux (libcap): Mehrere Schwachstellen | 2023-08-08T22:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2023-2007 | Intel Prozessoren: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-08-08T22:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2023-2005 | Intel Xeon Prozessoren: Mehrere Schwachstellen | 2023-08-08T22:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0639 | Icinga: Mehrere Schwachstellen | 2025-03-25T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-0637 | Hitachi Energy RTU500: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-03-25T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-0636 | IBM SPSS Statistics: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-03-25T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-0634 | VMware Tools: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-03-25T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-0450 | Red Hat OpenShift Service Mesh Containers: Schwachstelle ermöglicht Cross-Site Scripting | 2025-02-26T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-0231 | MELDUNG ZURÜCKGEZOGEN | 2025-01-30T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-0091 | Microsoft Windows: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2024-3712 | Trend Micro Apex One: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2024-12-16T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2024-1812 | Red Hat Enterprise Linux (389-ds-base ldap server): Schwachstelle ermöglicht Denial of Service | 2024-08-11T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2024-1290 | Red Hat Enterprise Linux: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-06-04T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2024-0954 | FreeRDP: Mehrere Schwachstellen | 2024-04-23T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2024-0905 | FreeRDP: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-04-16T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2024-0426 | Python: Mehrere Schwachstellen ermöglichen Denial of Service | 2016-09-15T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2022-2036 | Varnish HTTP Cache: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2022-11-08T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2022-0865 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-07-31T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2022-0841 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-07-26T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2022-0734 | Linux Kernel: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-07-19T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-0631 | Octopus Deploy: Schwachstelle ermöglicht Manipulation von Dateien | 2025-03-24T23:00:00.000+00:00 | 2025-03-24T23:00:00.000+00:00 |
| wid-sec-w-2025-0624 | Microsoft Edge: Mehrere Schwachstellen | 2025-03-23T23:00:00.000+00:00 | 2025-03-24T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2013:0548 | Red Hat Security Advisory: CloudForms Common 1.1.2 update | 2013-02-21T18:56:00+00:00 | 2026-02-27T08:28:42+00:00 |
| rhsa-2021:0308 | Red Hat Security Advisory: OpenShift Container Platform 4.6.16 security and bug fix update | 2021-02-08T13:49:53+00:00 | 2026-02-27T07:49:28+00:00 |
| rhsa-2020:3842 | Red Hat Security Advisory: OpenShift Container Platform 4.5.13 openshift-enterprise-console-container security update | 2020-10-01T00:15:26+00:00 | 2026-02-27T07:49:27+00:00 |
| rhsa-2020:2479 | Red Hat Security Advisory: OpenShift Container Platform 3.11 atomic-openshift security update | 2020-06-18T21:12:56+00:00 | 2026-02-27T07:49:26+00:00 |
| rhsa-2019:4098 | Red Hat Security Advisory: OpenShift Container Platform 4.2 ose-cluster-kube-controller-manager-operator-container security update | 2019-12-11T08:23:25+00:00 | 2026-02-27T07:49:26+00:00 |
| rhsa-2020:0451 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | 2020-02-19T20:13:45+00:00 | 2026-02-27T07:49:23+00:00 |
| rhsa-2019:4091 | Red Hat Security Advisory: OpenShift Container Platform 4.1 library-go security update | 2019-12-17T07:38:40+00:00 | 2026-02-27T07:49:21+00:00 |
| rhsa-2019:4090 | Red Hat Security Advisory: OpenShift Container Platform 4.1 libseccomp-golang security update | 2019-12-17T07:39:50+00:00 | 2026-02-27T07:49:20+00:00 |
| rhsa-2019:4088 | Red Hat Security Advisory: OpenShift Container Platform 4.1 ose-cluster-openshift-apiserver-operator-container security update | 2019-12-17T07:38:21+00:00 | 2026-02-27T07:49:18+00:00 |
| rhsa-2019:4087 | Red Hat Security Advisory: OpenShift Container Platform 4.1 openshift security update | 2019-12-17T02:18:46+00:00 | 2026-02-27T07:49:18+00:00 |
| rhsa-2019:4082 | Red Hat Security Advisory: OpenShift Container Platform 4.1 operator security update | 2019-12-04T13:58:55+00:00 | 2026-02-27T07:49:18+00:00 |
| rhsa-2019:4081 | Red Hat Security Advisory: OpenShift Container Platform 4.1 ose-cluster-kube-apiserver-operator-container security update | 2019-12-04T13:54:39+00:00 | 2026-02-27T07:49:17+00:00 |
| rhsa-2019:4075 | Red Hat Security Advisory: OpenShift Container Platform 4.2 library-go security update | 2019-12-03T21:10:58+00:00 | 2026-02-27T07:49:16+00:00 |
| rhsa-2019:2859 | Red Hat Security Advisory: OpenShift Container Platform 4.1.18 security update | 2019-09-27T00:14:29+00:00 | 2026-02-27T07:49:15+00:00 |
| rhsa-2019:2791 | Red Hat Security Advisory: OpenShift Container Platform 4.1.16 container image security update | 2019-09-17T18:11:28+00:00 | 2026-02-27T07:49:13+00:00 |
| rhsa-2019:1591 | Red Hat Security Advisory: OpenShift Container Platform 4.1 image security update | 2019-06-26T18:12:35+00:00 | 2026-02-27T07:49:13+00:00 |
| rhsa-2018:2123 | Red Hat Security Advisory: python security update | 2018-07-03T14:14:04+00:00 | 2026-02-27T07:49:01+00:00 |
| rhsa-2019:1245 | Red Hat Security Advisory: Red Hat Quay 3.0.2 security and bug fix update | 2019-05-20T14:12:27+00:00 | 2026-02-27T07:48:59+00:00 |
| rhsa-2017:3240 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update | 2017-11-16T19:27:22+00:00 | 2026-02-27T07:48:57+00:00 |
| rhsa-2017:3239 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update | 2017-11-16T19:10:21+00:00 | 2026-02-27T07:48:55+00:00 |
| rhsa-2017:3114 | Red Hat Security Advisory: Red Hat JBoss Web Server security and bug fix update | 2017-11-02T19:04:48+00:00 | 2026-02-27T07:48:54+00:00 |
| rhsa-2017:3113 | Red Hat Security Advisory: Red Hat JBoss Web Server security and bug fix update | 2017-11-02T19:15:44+00:00 | 2026-02-27T07:48:53+00:00 |
| rhsa-2017:2710 | Red Hat Security Advisory: Red Hat JBoss Core Services security update | 2017-09-13T16:49:04+00:00 | 2026-02-27T07:48:53+00:00 |
| rhsa-2017:2709 | Red Hat Security Advisory: Red Hat JBoss Core Services security update | 2017-09-13T16:48:46+00:00 | 2026-02-27T07:48:52+00:00 |
| rhsa-2017:2708 | Red Hat Security Advisory: Red Hat JBoss Core Services security update | 2017-09-13T16:37:52+00:00 | 2026-02-27T07:48:51+00:00 |
| rhsa-2017:1216 | Red Hat Security Advisory: java-1.7.1-ibm security update | 2017-05-09T16:41:26+00:00 | 2026-02-27T07:48:45+00:00 |
| rhsa-2017:0462 | Red Hat Security Advisory: java-1.8.0-ibm security update | 2017-03-08T13:22:53+00:00 | 2026-02-27T07:48:45+00:00 |
| rhsa-2017:0338 | Red Hat Security Advisory: java-1.6.0-ibm security update | 2017-02-28T08:29:25+00:00 | 2026-02-27T07:48:42+00:00 |
| rhsa-2017:0337 | Red Hat Security Advisory: java-1.7.0-ibm security update | 2017-02-28T08:19:27+00:00 | 2026-02-27T07:48:39+00:00 |
| rhsa-2017:0336 | Red Hat Security Advisory: java-1.7.1-ibm security update | 2017-02-28T08:19:38+00:00 | 2026-02-27T07:48:38+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-235-07 | Hitachi Energy RTU500 | 2022-08-23T00:00:00.000000Z | 2022-08-23T00:00:00.000000Z |
| icsa-22-235-06 | Measuresoft ScadaPro Server and Client | 2022-08-23T00:00:00.000000Z | 2022-08-23T00:00:00.000000Z |
| icsa-22-235-05 | Measuresoft ScadaPro Server | 2022-08-23T00:00:00.000000Z | 2022-08-23T00:00:00.000000Z |
| icsa-22-235-03 | mySCADA myPRO | 2022-08-23T00:00:00.000000Z | 2022-08-23T00:00:00.000000Z |
| icsa-22-235-02 | Delta Industrial Automation DIALink | 2022-08-23T00:00:00.000000Z | 2022-08-23T00:00:00.000000Z |
| icsa-22-153-02 | Illumina Local Run Manager | 2022-06-02T00:00:00.000000Z | 2022-08-23T00:00:00.000000Z |
| icsa-22-228-07 | Sequi PortBloque S | 2022-08-16T00:00:00.000000Z | 2022-08-16T00:00:00.000000Z |
| icsa-22-228-06 | Emerson Proficy Machine Edition | 2022-08-16T00:00:00.000000Z | 2022-08-16T00:00:00.000000Z |
| icsa-22-228-05 | B&R Industrial Automation Automation Studio 4 | 2022-08-16T00:00:00.000000Z | 2022-08-16T00:00:00.000000Z |
| icsa-22-228-04 | Softing Secure Integration Server | 2022-08-16T00:00:00.000000Z | 2022-08-16T00:00:00.000000Z |
| icsa-22-228-03 | Delta Industrial Automation DRAS | 2022-08-16T00:00:00.000000Z | 2022-08-16T00:00:00.000000Z |
| icsa-22-228-01 | Yokogawa CENTUM Controller FCS | 2022-08-16T00:00:00.000000Z | 2022-08-16T00:00:00.000000Z |
| icsa-22-223-06 | Siemens SICAM TOOLBOX II | 2022-08-11T00:00:00.000000Z | 2022-08-11T00:00:00.000000Z |
| icsa-22-223-04 | Emerson ROC800, ROC800L and DL8000 | 2022-08-11T00:00:00.000000Z | 2022-08-11T00:00:00.000000Z |
| icsa-22-223-03 | Schneider Electric EcoStruxure, EcoStruxure Process Expert, SCADAPack RemoteConnect for x70 | 2022-08-11T00:00:00.000000Z | 2022-08-11T00:00:00.000000Z |
| icsa-22-223-05 | Siemens SICAM A8000 Web Server Module | 2022-08-09T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-223-02 | Siemens Teamcenter | 2022-08-09T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-223-01 | Siemens Simcenter STAR-CCM+ | 2022-08-09T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-221-03 | Emerson OpenBSI | 2022-08-09T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-221-02 | Emerson ControlWave | 2022-08-09T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-195-15 | Siemens SIMATIC eaSie Core Package | 2022-07-12T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-195-07 | Siemens Datalogics File Parsing Vulnerability | 2022-07-12T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-167-13 | Siemens Teamcenter | 2022-06-14T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-132-16 | Siemens Teamcenter | 2022-05-10T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-132-13 | Siemens Industrial Devices using libcurl | 2022-05-10T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-041-05 | Siemens SICAM TOOLBOX II (Update A) | 2022-02-08T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-041-02 | Siemens SIMATIC WinCC and PCS | 2022-02-08T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-21-194-06 | Siemens SIMATIC Software Products (Update B) | 2021-07-13T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-20-315-04 | Siemens SIMATIC S7-300 CPUs and SINUMERIK Controller (Update A) | 2020-11-10T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-20-196-05 | Siemens UMC Stack (Update H) | 2020-07-14T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cimc-civ-pkdbe9x5 | Cisco Integrated Management Controller Command Injection Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-anyconnect-file-read-lsvdd6uh | Cisco AnyConnect Secure Mobility Client for Windows Arbitrary File Read Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-anyconnect-file-read-LsvDD6Uh | Cisco AnyConnect Secure Mobility Client for Windows Arbitrary File Read Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-CIMC-CIV-pKDBe9x5 | Cisco Integrated Management Controller Command Injection Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-xbace-oncebys | Cisco IOS XE Software Arbitrary Code Execution Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-11-02T15:15:42+00:00 |
| cisco-sa-xbace-OnCEbyS | Cisco IOS XE Software Arbitrary Code Execution Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-11-02T15:15:42+00:00 |
| cisco-sa-asa-ssl-dos-7uzwwsey | Cisco Adaptive Security Appliance Software SSL/TLS Denial of Service Vulnerability | 2020-10-22T16:00:00+00:00 | 2020-10-27T20:31:40+00:00 |
| cisco-sa-asa-ssl-dos-7uZWwSEy | Cisco Adaptive Security Appliance Software SSL/TLS Denial of Service Vulnerability | 2020-10-22T16:00:00+00:00 | 2020-10-27T20:31:40+00:00 |
| cisco-sa-fxos-sbbyp-kqp6ngre | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities | 2020-10-21T16:00:00+00:00 | 2020-10-23T13:31:44+00:00 |
| cisco-sa-fxos-sbbyp-KqP6NgrE | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities | 2020-10-21T16:00:00+00:00 | 2020-10-23T13:31:44+00:00 |
| cisco-sa-fxos-cmdinj-pqzvmxcr | Cisco FXOS Software Command Injection Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T13:21:04+00:00 |
| cisco-sa-fxos-cmdinj-pqZvmXCr | Cisco FXOS Software Command Injection Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T13:21:04+00:00 |
| cisco-sa-asaftd-dos-qfcnepfx | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T13:16:34+00:00 |
| cisco-sa-asaftd-dos-QFcNEPfx | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T13:16:34+00:00 |
| cisco-sa-asa-ftd-crlf-inj-bx9urwsn | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN CRLF Injection Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:24+00:00 |
| cisco-sa-asa-ftd-crlf-inj-BX9uRwSn | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN CRLF Injection Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:24+00:00 |
| cisco-sa-asa-rxss-l54htxp | Cisco Adaptive Security Appliance Software Web-Based Management Interface Reflected Cross-Site Scripting Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:19+00:00 |
| cisco-sa-asa-rxss-L54Htxp | Cisco Adaptive Security Appliance Software Web-Based Management Interface Reflected Cross-Site Scripting Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:19+00:00 |
| cisco-sa-asaftd-sipdos-3dgvdjvg | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SIP Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:14+00:00 |
| cisco-sa-asaftd-sipdos-3DGvdjvg | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SIP Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:14+00:00 |
| cisco-sa-asaftd-ftpbypass-hy3utxyu | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software FTP Inspection Bypass Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:09+00:00 |
| cisco-sa-asaftd-ftpbypass-HY3UTxYu | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software FTP Inspection Bypass Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:09+00:00 |
| cisco-sa-asaftd-frag-memleak-mctqdp9n | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IP Fragment Memory Leak Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:05+00:00 |
| cisco-sa-asaftd-frag-memleak-mCtqdP9n | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IP Fragment Memory Leak Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:05+00:00 |
| cisco-sa-asaftd-fileup-dos-zvc7wtys | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services File Upload Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:04+00:00 |
| cisco-sa-asaftd-fileup-dos-zvC7wtys | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services File Upload Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:04+00:00 |
| cisco-sa-asaftd-webdos-fbzm5ynw | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:06:59+00:00 |
| cisco-sa-asaftd-webdos-fBzM5Ynw | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:06:59+00:00 |
| cisco-sa-asaftd-sslvpndma-dos-hrrqb9yx | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL VPN Direct Memory Access Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:06:59+00:00 |
| cisco-sa-asaftd-sslvpndma-dos-HRrqB9Yx | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL VPN Direct Memory Access Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:06:59+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2019-14197 | An issue was discovered in Das U-Boot through 2019.07. There is a read of out-of-bounds data at nfs_read_reply. | 2019-07-02T00:00:00.000Z | 2026-02-18T03:06:19.000Z |
| msrc_cve-2025-38261 | riscv: save the SR_SUM status over switches | 2025-07-02T00:00:00.000Z | 2026-02-18T03:06:07.000Z |
| msrc_cve-2025-21666 | vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] | 2025-01-02T00:00:00.000Z | 2026-02-18T03:06:02.000Z |
| msrc_cve-2024-50614 | TinyXML2 through 10.0.0 has a reachable assertion for UINT_MAX/16, that may lead to application exit, in tinyxml2.cpp XMLUtil::GetCharacterRef. | 2024-10-01T07:00:00.000Z | 2026-02-18T03:06:01.000Z |
| msrc_cve-2024-3447 | Qemu: sdhci: heap buffer overflow in sdhci_write_dataport() | 2024-11-02T00:00:00.000Z | 2026-02-18T03:05:46.000Z |
| msrc_cve-2023-24540 | Improper handling of JavaScript whitespace in html/template | 2023-05-01T00:00:00.000Z | 2026-02-18T03:05:43.000Z |
| msrc_cve-2025-38257 | s390/pkey: Prevent overflow in size calculation for memdup_user() | 2025-07-02T00:00:00.000Z | 2026-02-18T03:05:38.000Z |
| msrc_cve-2022-3510 | Parsing issue in protobuf message-type extension | 2022-11-02T00:00:00.000Z | 2026-02-18T03:05:26.000Z |
| msrc_cve-2020-36475 | An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). The calculations performed by mbedtls_mpi_exp_mod are not limited; thus, supplying overly large parameters could lead to denial of service when generating Diffie-Hellman key pairs. | 2021-08-02T00:00:00.000Z | 2026-02-18T03:05:11.000Z |
| msrc_cve-2025-21683 | bpf: Fix bpf_sk_select_reuseport() memory leak | 2025-01-02T00:00:00.000Z | 2026-02-18T03:04:59.000Z |
| msrc_cve-2024-0874 | Coredns: cd bit response is cached and served later | 2024-04-02T07:00:00.000Z | 2026-02-18T03:04:56.000Z |
| msrc_cve-2024-50615 | TinyXML2 through 10.0.0 has a reachable assertion for UINT_MAX/digit, that may lead to application exit, in tinyxml2.cpp XMLUtil::GetCharacterRef. | 2024-10-01T07:00:00.000Z | 2026-02-18T03:04:55.000Z |
| msrc_cve-2025-38263 | bcache: fix NULL pointer in cache_set_flush() | 2025-07-02T00:00:00.000Z | 2026-02-18T03:04:45.000Z |
| msrc_cve-2020-36477 | An issue was discovered in Mbed TLS before 2.24.0. The verification of X.509 certificates when matching the expected common name (the cn argument of mbedtls_x509_crt_verify) with the actual certificate name is mishandled: when the subjecAltName extension is present, the expected name is compared to any name in that extension regardless of its type. This means that an attacker could impersonate a 4-byte or 16-byte domain by getting a certificate for the corresponding IPv4 or IPv6 address (this would require the attacker to control that IP address, though). | 2021-08-02T00:00:00.000Z | 2026-02-18T03:04:42.000Z |
| msrc_cve-2023-6816 | Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer | 2024-01-01T08:00:00.000Z | 2026-02-18T03:04:29.000Z |
| msrc_cve-2025-21665 | filemap: avoid truncating 64-bit offset to 32 bits | 2025-01-02T00:00:00.000Z | 2026-02-18T03:04:28.000Z |
| msrc_cve-2023-28154 | Webpack 5 before 5.76.0 does not avoid cross-realm object access. ImportParserPlugin.js mishandles the magic comment feature. An attacker who controls a property of an untrusted object can obtain access to the real global object. | 2023-03-10T00:00:00.000Z | 2026-02-18T03:04:22.000Z |
| msrc_cve-2024-49761 | REXML ReDoS vulnerability | 2024-10-01T07:00:00.000Z | 2026-02-18T03:04:16.000Z |
| msrc_cve-2024-42081 | drm/xe/xe_devcoredump: Check NULL before assignments | 2024-07-01T07:00:00.000Z | 2026-02-18T03:04:14.000Z |
| msrc_cve-2025-38259 | ASoC: codecs: wcd9335: Fix missing free of regulator supplies | 2025-07-02T00:00:00.000Z | 2026-02-18T03:04:13.000Z |
| msrc_cve-2025-37944 | wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process | 2025-05-02T00:00:00.000Z | 2026-02-18T03:04:11.000Z |
| msrc_cve-2010-0291 | The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the "do_mremap() mess" or "mremap/mmap mess." | 2010-02-02T00:00:00.000Z | 2026-02-18T03:04:10.000Z |
| msrc_cve-2011-4969 | Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag. | 2013-03-02T00:00:00.000Z | 2026-02-18T03:03:58.000Z |
| msrc_cve-2024-0408 | Xorg-x11-server: selinux unlabeled glx pbuffer | 2024-01-01T08:00:00.000Z | 2026-02-18T03:03:51.000Z |
| msrc_cve-2022-33103 | Das U-Boot from v2020.10 to v2022.07-rc3 was discovered to contain an out-of-bounds write via the function sqfs_readdir(). | 2022-07-02T00:00:00.000Z | 2026-02-18T03:03:46.000Z |
| msrc_cve-2023-45283 | Insecure parsing of Windows paths with a \??\ prefix in path/filepath | 2023-11-01T07:00:00.000Z | 2026-02-18T03:03:43.000Z |
| msrc_cve-2025-37943 | wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi | 2025-05-02T00:00:00.000Z | 2026-02-18T03:03:42.000Z |
| msrc_cve-2024-42078 | nfsd: initialise nfsd_info.mutex early. | 2024-07-01T07:00:00.000Z | 2026-02-18T03:03:38.000Z |
| msrc_cve-2025-21631 | block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() | 2025-01-02T00:00:00.000Z | 2026-02-18T03:03:36.000Z |
| msrc_cve-2025-37757 | tipc: fix memory leak in tipc_link_xmit | 2025-05-02T00:00:00.000Z | 2026-02-18T03:03:14.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:14144-1 | python310-kubernetes-28.1.0-4.3 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14143-1 | python310-jupyter-server-2.13.0-2.2 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14142-1 | python310-impacket-0.11.0-3.3 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14141-1 | python310-httplib2-0.22.0-4.5 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14140-1 | python310-hpack-4.0.0-2.7 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14139-1 | python310-dulwich-0.21.7-1.3 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14138-1 | python310-django-registration-3.3-2.2 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14137-1 | python310-django-debug-toolbar-4.3-1.2 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14136-1 | python310-colander-2.0-1.3 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14135-1 | python310-bugzilla-3.2.0-2.3 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14134-1 | python310-bleach-6.1.0-1.5 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14133-1 | python310-bjoern-3.2.2-1.10 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14132-1 | python310-asyncpg-0.29.0-1.3 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14131-1 | python310-XStatic-jquery-ui-1.13.0.1-1.15 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14130-1 | python-Scrapy-doc-2.11.2-1.1 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14129-1 | python310-Flask-Cors-4.0.0-1.3 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14128-1 | python310-CherryPy-18.9.0-3.3 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14127-1 | python310-Babel-2.14.0-1.5 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14126-1 | obs-service-download_url-0.2.1-1.1 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14125-1 | iwd-2.19-1.1 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14124-1 | gettext-its-gtk3-3.24.43-1.1 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14123-1 | global-6.6.13-1.1 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14122-1 | chromedriver-126.0.6478.126-1.1 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14121-1 | cadvisor-0.49.1-1.1 on GA media | 2024-07-12T00:00:00Z | 2024-07-12T00:00:00Z |
| opensuse-su-2024:14120-1 | tomcat10-10.1.25-1.1 on GA media | 2024-07-10T00:00:00Z | 2024-07-10T00:00:00Z |
| opensuse-su-2024:14119-1 | tomcat-9.0.91-1.1 on GA media | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| opensuse-su-2024:14118-1 | python310-certifi-2024.7.4-1.1 on GA media | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| opensuse-su-2024:14117-1 | emacs-29.4-2.1 on GA media | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| opensuse-su-2024:14116-1 | apache2-2.4.61-1.1 on GA media | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| opensuse-su-2024:0194-2 | Security update for keybase-client | 2024-07-08T18:01:42Z | 2024-07-08T18:01:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-287 | Heap-use-after-free in condition_free_list_type | 2020-06-30T00:00:46.614113Z | 2022-04-13T03:04:40.093838Z |
| osv-2020-2251 | Heap-buffer-overflow in blosc_run_decompression_with_context | 2020-12-09T00:00:09.835730Z | 2022-04-13T03:04:40.343034Z |
| osv-2020-2221 | UNKNOWN READ in std::__1::pair<unsigned int, void*> uWS::HttpParser::fenceAndConsumePostPadded<0 | 2020-12-04T00:00:11.822761Z | 2022-04-13T03:04:40.965864Z |
| osv-2020-2197 | Heap-use-after-free in decode_NXAST_RAW_ENCAP | 2020-11-27T00:01:16.495329Z | 2022-04-13T03:04:40.738536Z |
| osv-2020-2184 | Heap-buffer-overflow in frame_get_usermeta | 2020-11-25T00:00:17.879160Z | 2022-04-13T03:04:40.275647Z |
| osv-2020-2183 | Heap-buffer-overflow in Lizard_decompress_safe | 2020-11-25T00:00:12.713716Z | 2022-04-13T03:04:40.174785Z |
| osv-2020-2166 | Heap-buffer-overflow in get_32aligned_be64 | 2020-11-17T00:00:58.901949Z | 2022-04-13T03:04:40.705503Z |
| osv-2020-2151 | Use-of-uninitialized-value in tinfl_decompress | 2020-11-13T00:00:56.838971Z | 2022-04-13T03:04:40.063023Z |
| osv-2020-2103 | Use-of-uninitialized-value in tinfl_decompress | 2020-10-29T00:00:44.282393Z | 2022-04-13T03:04:40.057613Z |
| osv-2020-2098 | Use-of-uninitialized-value in std::__1::__function::__func<LLVMFuzzerTestOneInput::$_0, std::__1::allocator<LL | 2020-10-25T00:00:31.690756Z | 2022-04-13T03:04:40.954895Z |
| osv-2020-2087 | Heap-buffer-overflow in blosc_c | 2020-10-19T00:00:42.021414Z | 2022-04-13T03:04:40.296793Z |
| osv-2020-1976 | Use-of-uninitialized-value in FLAC::Decoder::FuzzerStream::write_callback | 2020-10-03T00:00:34.944603Z | 2022-04-13T03:04:40.547682Z |
| osv-2020-197 | Heap-buffer-overflow in jbig2_image_get_pixels_fast | 2020-06-24T01:51:18.519912Z | 2022-04-13T03:04:40.607737Z |
| osv-2020-1897 | Heap-buffer-overflow in stbi__tga_load | 2020-10-02T00:00:10.675680Z | 2022-04-13T03:04:40.791888Z |
| osv-2020-1892 | Use-of-uninitialized-value in stbi__expand_png_palette | 2020-10-02T00:00:07.829126Z | 2022-04-13T03:04:40.816714Z |
| osv-2020-1834 | Stack-buffer-overflow in onigenc_unicode_get_case_fold_codes_by_str | 2020-09-25T00:00:07.959427Z | 2022-04-13T03:04:40.937721Z |
| osv-2020-1695 | Stack-buffer-overflow in uWS::TopicTree::trimTree | 2020-09-04T00:00:08.299412Z | 2022-04-13T03:04:40.998047Z |
| osv-2020-161 | Heap-use-after-free in jbig2_release_huffman_table | 2020-06-24T01:51:16.820995Z | 2022-04-13T03:04:40.575919Z |
| osv-2020-1599 | Use-of-uninitialized-value in slide_hash | 2020-08-12T00:00:13.402621Z | 2022-04-13T03:04:40.986860Z |
| osv-2020-1521 | Use-of-uninitialized-value in stbi__jpeg_huff_decode | 2020-07-28T00:00:36.454613Z | 2022-04-13T03:04:40.831746Z |
| osv-2020-1510 | UNKNOWN WRITE in FLAC__bitwriter_write_raw_uint32_nocheck | 2020-07-28T00:00:35.146104Z | 2022-04-13T03:04:40.529820Z |
| osv-2020-1478 | Heap-buffer-overflow in load_jpeg_image | 2020-07-28T00:00:27.954104Z | 2022-04-13T03:04:40.801582Z |
| osv-2020-1472 | Heap-buffer-overflow in stbi__YCbCr_to_RGB_simd | 2020-07-28T00:00:27.093869Z | 2022-04-13T03:04:40.821778Z |
| osv-2020-1448 | Global-buffer-overflow in vte_write_debug | 2020-07-28T00:00:21.964189Z | 2022-04-13T03:04:40.043504Z |
| osv-2020-1380 | Use-of-uninitialized-value in stbi__jpeg_decode_block_prog_ac | 2020-07-28T00:00:05.816594Z | 2022-04-13T03:04:40.806471Z |
| osv-2020-1372 | Index-out-of-bounds in stbi__build_huffman | 2020-07-28T00:00:04.120846Z | 2022-04-13T03:04:40.796838Z |
| osv-2020-1274 | Heap-buffer-overflow in exif_entry_get_value | 2020-07-22T21:50:02.388928Z | 2022-04-13T03:04:40.847318Z |
| osv-2020-1257 | Stack-buffer-overflow in readstat_convert | 2020-07-22T21:50:00.845495Z | 2022-04-13T03:04:40.651968Z |
| osv-2020-1240 | Use-of-uninitialized-value in jbig2_decode_mmr_line | 2020-07-22T21:49:59.411582Z | 2022-04-13T03:04:40.563878Z |
| osv-2020-1235 | Heap-buffer-overflow in mbc_case_fold | 2020-07-22T21:49:59.040421Z | 2022-04-13T03:04:40.931744Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-grafana-2024-1313 | Users outside an organization can delete a snapshot with its key | 2024-03-28T07:19:10.064Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2023-5122 | SSRF in CSV Datasource Plugin | 2024-10-24T07:10:55.187Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2023-22462 | Stored XSS in Grafana Text plugin | 2024-03-06T10:53:25.170Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2023-1410 | Stored XSS in Graphite FunctionDescription tooltip | 2024-03-06T10:53:49.160Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-39328 | Grafana vulnerable to race condition allowing privilege escalation | 2024-03-06T10:54:29.505Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-39324 | Grafana vulnerable to spoofing originalUrl of snapshots | 2024-03-06T10:54:38.067Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-39307 | Grafana subject to Exposure of Sensitive Information resulting in User enumeration via forget password | 2024-03-06T10:54:48.105Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-39306 | Grafana contains Improper Input Validation | 2024-03-06T10:54:59.981Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-39229 | Grafana users with email as a username can block other users from signing in | 2024-03-06T10:55:10.706Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-36062 | Grafana folders admin only permission privilege escalation | 2024-03-06T10:55:30.771Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-35957 | Authentication Bypass in Grafana via auth proxy allowing escalation from admin to server admin | 2024-03-06T10:55:38.882Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-31130 | Grafana data source and plugin proxy endpoints leaking authentication tokens to some destination plugins | 2024-03-06T10:56:13.486Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-31123 | Grafana plugin signature bypass vulnerability | 2024-03-06T10:56:23.793Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-31107 | Grafana account takeover via OAuth vulnerability | 2024-03-06T10:56:35.472Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-31097 | Stored XSS in Grafana's Unified Alerting | 2024-03-06T10:56:47.100Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-29170 | Grafana Enterprise datasource network restrictions bypass via HTTP redirects | 2024-03-06T10:56:56.871Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-24812 | FGAC API Key privilege escalation in Grafana | 2024-03-06T10:57:31.076Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-23552 | Grafana stored XSS in FileUploader component | 2024-03-06T10:57:42.704Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-23498 | When query caching is enabled in Grafana users can query another users session | 2024-03-06T10:57:55.176Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-21713 | Exposure of Sensitive Information in Grafana | 2024-03-06T10:58:05.785Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-21703 | Cross Site Request Forgery in Grafana | 2024-03-06T10:58:16.171Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-21702 | Cross site scripting in Grafana proxy | 2024-03-06T10:58:26.283Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-21673 | OAuth Identity Token exposure in Grafana | 2024-03-06T10:58:36.383Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2021-43815 | Grafana directory traversal for `.cvs` files | 2024-03-06T10:58:46.373Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2021-43813 | Directory Traversal in Grafana | 2024-03-06T10:58:57.080Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2021-41244 | Cross organization admin control in Grafana | 2024-03-06T10:59:15.365Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2021-41174 | XSS vulnerability allowing arbitrary JavaScript execution | 2024-03-06T10:59:24.698Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2025-27148 | Gradle vulnerable to local privilege escalation through system temporary directory | 2025-02-27T07:08:45.147Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2023-44387 | Gradle has incorrect permission assignment for symlinked files used in copy or archiving operations | 2024-03-06T10:52:33.070Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2023-42445 | Possible local file exfiltration by XML External entity injection | 2024-03-06T10:52:45.671Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202211-1696 | Stack-based buffer overflow vulnerability exists in CX-Programmer v.9.77 and earlier, whi… | 2024-04-27T11:57:39.547000Z |
| var-202211-1695 | Out-of-bounds write vulnerability exists in CX-Programmer v.9.77 and earlier, which may l… | 2024-04-27T11:57:39.661000Z |
| var-202211-1694 | Use-after free vulnerability exists in CX-Programmer v.9.77 and earlier, which may lead t… | 2024-04-27T11:57:39.635000Z |
| var-202107-1421 | A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (A… | 2024-04-26T10:58:15.919000Z |
| var-200505-0609 | Linksys PSUS4 running firmware 6032 allows remote attackers to cause a denial of service … | 2024-04-26T10:44:27.129000Z |
| var-202403-2157 | A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due t… | 2024-04-20T23:23:33.360000Z |
| var-202404-0165 | SIMATIC PCS 7 is a process control system. SIMATIC WinCC is an automated supervisory cont… | 2024-04-20T23:23:18.968000Z |
| var-202403-2357 | A memory buffer vulnerability in Rockwell Automation Arena Simulation software could pot… | 2024-04-20T23:19:06.927000Z |
| var-201409-0173 | The Netmaster CBW700N cable modem with software 81.447.392110.729.024 has an SNMP communi… | 2024-04-20T23:18:01.803000Z |
| var-202403-2758 | An uninitialized pointer in Rockwell Automation Arena Simulation software could potentia… | 2024-04-20T23:17:49.371000Z |
| var-201807-0057 | Processing malformed SOAP messages when performing the HNAP Login action causes a buffer … | 2024-04-20T23:17:14.127000Z |
| var-201712-0130 | Multiple D-Link devices including the DIR-850L firmware versions 1.14B07 and 2.07.B05 con… | 2024-04-20T23:17:14.088000Z |
| var-202403-3014 | Technicolor TC8715D TC8715D-01.EF.04.38.00-180405-S-FF9-D RSE-TC8717T devices allow a rem… | 2024-04-20T23:05:59.994000Z |
| var-201204-0037 | RuggedCom Rugged Operating System (ROS) before 3.3 has a factory account with a password … | 2024-04-20T23:04:08.913000Z |
| var-202006-1646 | A memory consumption issue was addressed with improved memory handling. This issue is fix… | 2024-04-20T23:03:00.743000Z |
| var-201403-0506 | The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to "ma… | 2024-04-20T19:59:14.400000Z |
| var-200110-0342 | OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a de… | 2024-04-20T19:49:59.696000Z |
| var-202002-0036 | Multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16, as used in Sy… | 2024-04-20T19:49:44.965000Z |
| var-201703-0755 | The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.… | 2024-04-19T23:01:51.687000Z |
| var-201501-0774 | plural UEFI In the system, EFI S3 Resume Boot Path Used in boot script Does not properly … | 2024-04-19T23:01:21.735000Z |
| var-201811-0173 | A vulnerability in the Session Initiation Protocol (SIP) inspection engine of Cisco Adapt… | 2024-04-19T22:59:46.206000Z |
| var-202401-2573 | Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler … | 2024-04-19T22:57:46.120000Z |
| var-201502-0200 | D-Link DAP-1320 Rev Ax with firmware before 1.21b05 allows attackers to execute arbitrary… | 2024-04-19T22:57:38.149000Z |
| var-201501-0762 | BIOS As a locking mechanism BIOS_CNTL.BIOSWE When BIOS_CNTL.BLE Use only Intel Corporatio… | 2024-04-19T22:57:38.199000Z |
| var-201602-0071 | Buffer overflow in the IKEv1 and IKEv2 implementations in Cisco ASA Software before 8.4(7… | 2024-04-19T22:56:33.440000Z |
| var-201503-0067 | Multiple untrusted search path vulnerabilities in (1) EQATEC.Analytics.Monitor.Win32_vc10… | 2024-04-19T22:56:33.838000Z |
| var-201306-0355 | ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax mod… | 2024-04-19T22:55:29.087000Z |
| var-201411-0154 | The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows … | 2024-04-19T22:55:28.224000Z |
| var-201504-0559 | HP Network Automation Has multiple vulnerabilities in the web administration screen. HP N… | 2024-04-19T22:55:06.850000Z |
| var-201705-3474 | An unprivileged network attacker could gain system privileges to provisioned Intel manage… | 2024-04-19T22:55:05.789000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2012-000101 | BeZIP vulnerable to directory traversal | 2012-11-07T16:01+09:00 | 2012-11-07T16:01+09:00 |
| jvndb-2012-000100 | Pebble vulnerable to open redirect | 2012-11-02T14:23+09:00 | 2012-11-02T14:23+09:00 |
| jvndb-2012-000099 | Pebble vulnerable to HTTP header injection | 2012-11-02T14:21+09:00 | 2012-11-02T14:21+09:00 |
| jvndb-2012-000098 | Pebble vulnerability where entries may become unviewable | 2012-11-02T14:20+09:00 | 2012-11-02T14:20+09:00 |
| jvndb-2012-000097 | MosP kintai kanri vulnerable to authentication bypass | 2012-11-02T14:18+09:00 | 2012-11-02T14:18+09:00 |
| jvndb-2012-000096 | MosP kintai kanri fails to restrict access permissions | 2012-11-02T14:16+09:00 | 2012-11-02T14:16+09:00 |
| jvndb-2012-000095 | Mac OS X OpenSSH vulnerable to denial-of-service (DoS) | 2012-10-31T15:01+09:00 | 2012-10-31T15:01+09:00 |
| jvndb-2012-000093 | Tokyo BBS vulnerable to cross-site scripting | 2012-10-26T14:00+09:00 | 2012-10-26T14:00+09:00 |
| jvndb-2012-000088 | Safari vulnerable to local file content disclosure | 2012-10-23T14:57+09:00 | 2012-10-23T14:57+09:00 |
| jvndb-2012-000094 | Smarty vulnerable to cross-site scripting | 2012-10-10T14:45+09:00 | 2012-10-10T14:45+09:00 |
| jvndb-2012-000092 | MyWebSearch vulnerable to cross-site scripting | 2012-10-05T16:49+09:00 | 2012-10-05T16:49+09:00 |
| jvndb-2009-000037 | Apache Tomcat denial of service (DoS) vulnerability | 2009-06-18T17:54+09:00 | 2012-09-28T13:40+09:00 |
| jvndb-2009-000036 | Apache Tomcat information disclosure vulnerability | 2009-06-18T17:53+09:00 | 2012-09-28T13:35+09:00 |
| jvndb-2012-000091 | jigbrowser+ for Android vulnerable in the WebView class | 2012-09-28T12:20+09:00 | 2012-09-28T12:20+09:00 |
| jvndb-2012-000090 | Trend Micro Control Manager vulnerable to SQL injection | 2012-09-27T12:43+09:00 | 2012-09-27T12:43+09:00 |
| jvndb-2012-000089 | ATOK for Android issue in the access permissions for the learning information file | 2012-09-25T13:40+09:00 | 2012-09-25T13:40+09:00 |
| jvndb-2012-000087 | myLittleAdmin for SQL Server 2000 vulnerable to arbitrary script execution | 2012-09-20T12:33+09:00 | 2012-09-20T12:33+09:00 |
| jvndb-2012-000086 | Email Anti-virus (formerly WebShield SMTP) vulnerable to denial-of-service | 2012-09-20T12:31+09:00 | 2012-09-20T12:31+09:00 |
| jvndb-2012-000085 | KUNAI Browser for Remote Service beta vulnerable in the WebView class | 2012-09-13T13:51+09:00 | 2012-09-13T13:51+09:00 |
| jvndb-2012-000084 | Cybozu KUNAI for Android vulnerable in the WebView class | 2012-09-07T16:40+09:00 | 2012-09-07T16:40+09:00 |
| jvndb-2012-000083 | Cybozu KUNAI for Android vulnerable to arbitrary Java method execution | 2012-09-07T16:39+09:00 | 2012-09-07T16:39+09:00 |
| jvndb-2012-000082 | Cybozu Live for Android vulnerable in the WebView class | 2012-09-03T10:41+09:00 | 2012-09-03T10:41+09:00 |
| jvndb-2012-000081 | Cybozu Live for Android vulnerable to arbitrary Java method execution | 2012-09-03T10:34+09:00 | 2012-09-03T10:34+09:00 |
| jvndb-2012-000078 | mixi for Android information management vulnerability | 2012-08-17T15:58+09:00 | 2012-08-17T15:58+09:00 |
| jvndb-2012-000077 | Multiple GREE Android applications vulnerable in the WebView class | 2012-08-17T15:52+09:00 | 2012-08-17T15:52+09:00 |
| jvndb-2012-003525 | Cross-site Scripting Vulnerability in JP1/Integrated Management - Service Support | 2012-08-10T15:05+09:00 | 2012-08-10T15:05+09:00 |
| jvndb-2012-000076 | Sleipnir Mobile for Android vulnerable to arbitrary script execution | 2012-08-08T14:43+09:00 | 2012-08-08T14:43+09:00 |
| jvndb-2012-000075 | Sleipnir Mobile for Android vulnerable to arbitrary Java method execution | 2012-08-08T14:39+09:00 | 2012-08-08T14:39+09:00 |
| jvndb-2012-000074 | LINE for Android vulnerable in handling of implicit intents | 2012-08-07T13:33+09:00 | 2012-08-07T13:33+09:00 |
| jvndb-2011-000088 | Safari for iOS vulnerable to cross-site scripting | 2011-10-17T18:56+09:00 | 2012-08-07T12:11+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:02136-1 | Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) | 2025-06-26T14:03:45Z | 2025-06-26T14:03:45Z |
| suse-su-2025:02135-1 | Security update for the Linux Kernel (Live Patch 66 for SLE 12 SP5) | 2025-06-26T13:03:44Z | 2025-06-26T13:03:44Z |
| suse-su-2025:02134-1 | Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4) | 2025-06-26T12:33:34Z | 2025-06-26T12:33:34Z |
| suse-su-2025:02132-1 | Security update for the Linux Kernel (Live Patch 63 for SLE 12 SP5) | 2025-06-26T11:33:30Z | 2025-06-26T11:33:30Z |
| suse-su-2025:02131-1 | Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5) | 2025-06-26T11:03:53Z | 2025-06-26T11:03:53Z |
| suse-su-2025:02128-1 | Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6) | 2025-06-26T09:04:26Z | 2025-06-26T09:04:26Z |
| suse-su-2025:02127-1 | Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) | 2025-06-26T09:04:15Z | 2025-06-26T09:04:15Z |
| suse-su-2025:02126-1 | Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | 2025-06-26T09:04:06Z | 2025-06-26T09:04:06Z |
| suse-su-2025:02125-1 | Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | 2025-06-26T09:03:57Z | 2025-06-26T09:03:57Z |
| suse-su-2025:02124-1 | Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) | 2025-06-26T09:03:48Z | 2025-06-26T09:03:48Z |
| suse-su-2025:02123-1 | Security update for MozillaFirefox | 2025-06-26T08:51:11Z | 2025-06-26T08:51:11Z |
| suse-su-2025:02122-1 | Security update for MozillaFirefox | 2025-06-26T08:45:47Z | 2025-06-26T08:45:47Z |
| suse-su-2025:02121-1 | Security update for helm | 2025-06-26T08:34:10Z | 2025-06-26T08:34:10Z |
| suse-su-2025:02120-1 | Security update for go1.24-openssl | 2025-06-26T08:22:45Z | 2025-06-26T08:22:45Z |
| suse-su-2025:02119-1 | Security update for clamav | 2025-06-26T08:21:39Z | 2025-06-26T08:21:39Z |
| suse-su-2025:02117-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 2025-06-25T19:03:57Z | 2025-06-25T19:03:57Z |
| suse-su-2025:02116-1 | Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) | 2025-06-25T18:03:43Z | 2025-06-25T18:03:43Z |
| suse-su-2025:02113-1 | Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5) | 2025-06-25T16:33:31Z | 2025-06-25T16:33:31Z |
| suse-su-2025:02112-1 | Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4) | 2025-06-25T16:03:54Z | 2025-06-25T16:03:54Z |
| suse-su-2025:02111-1 | Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4) | 2025-06-25T16:03:46Z | 2025-06-25T16:03:46Z |
| suse-su-2025:02110-1 | Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | 2025-06-25T15:33:42Z | 2025-06-25T15:33:42Z |
| suse-su-2025:02108-1 | Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5) | 2025-06-25T14:33:39Z | 2025-06-25T14:33:39Z |
| suse-su-2025:02107-1 | Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) | 2025-06-25T14:03:50Z | 2025-06-25T14:03:50Z |
| suse-su-2025:02106-1 | Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | 2025-06-25T13:03:52Z | 2025-06-25T13:03:52Z |
| suse-su-2025:02105-1 | Security update for perl-File-Find-Rule | 2025-06-25T11:43:55Z | 2025-06-25T11:43:55Z |
| suse-su-2025:20452-1 | Security update for open-vm-tools | 2025-06-25T08:23:04Z | 2025-06-25T08:23:04Z |
| suse-su-2025:20446-1 | Security update for libsoup | 2025-06-25T08:16:32Z | 2025-06-25T08:16:32Z |
| suse-su-2025:02101-1 | Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5) | 2025-06-25T08:03:48Z | 2025-06-25T08:03:48Z |
| suse-su-2025:02100-1 | Security update for gimp | 2025-06-25T06:03:04Z | 2025-06-25T06:03:04Z |
| suse-su-2025:02099-1 | Security update for the Linux Kernel | 2025-06-25T06:02:39Z | 2025-06-25T06:02:39Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-28703 | WordPress Case Addons plugin文件上传漏洞 | 2025-11-11 | 2025-11-17 |
| cnvd-2025-28702 | WordPress age-restriction plugin缺少授权漏洞 | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28701 | Tenda AC10U form_fast_setting_wifi_set函数栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28700 | Tenda AC10U formSetClientState函数栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28699 | Tenda AC10U formWifiBasicSet函数堆栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28698 | Tenda AC10U add_white_node函数堆栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28697 | Tenda AC10U GetParentControlInfo函数栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28696 | Tenda AC10U addWifiMacFilter函数堆栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28695 | Tenda AC10U setSchedWifi函数堆栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28694 | Tenda AC10U fromSetIpMacBind函数堆栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28693 | Tenda AC10U formSetMacFilterCfg函数堆栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28691 | Tenda AC10U fromWizardHandle方法堆栈缓冲区溢出漏洞 | 2024-04-22 | 2025-11-17 |
| cnvd-2025-28690 | Ivanti Endpoint Manager SQL注入漏洞(CNVD-2025-28690) | 2024-11-15 | 2025-11-17 |
| cnvd-2025-28689 | Ivanti Endpoint Manager SQL注入漏洞(CNVD-2025-28689) | 2024-11-15 | 2025-11-17 |
| cnvd-2025-28688 | Ivanti Endpoint Manager SQL注入漏洞(CNVD-2025-28688) | 2024-11-15 | 2025-11-17 |
| cnvd-2025-28687 | Ivanti Endpoint Manager路径遍历漏洞(CNVD-2025-28687) | 2024-11-15 | 2025-11-17 |
| cnvd-2025-28686 | Ivanti Endpoint Manager路径遍历漏洞(CNVD-2025-28686) | 2024-11-15 | 2025-11-17 |
| cnvd-2025-28685 | Ivanti Endpoint Manager SQL注入漏洞(CNVD-2025-28685) | 2024-11-15 | 2025-11-17 |
| cnvd-2025-28684 | Ivanti Endpoint Manager路径遍历漏洞 | 2025-10-17 | 2025-11-17 |
| cnvd-2025-28683 | Ivanti Endpoint Manager反序列化漏洞 | 2025-10-17 | 2025-11-17 |
| cnvd-2025-28682 | Ivanti Endpoint Manager SQL注入漏洞 | 2025-10-17 | 2025-11-17 |
| cnvd-2025-28680 | Ivanti Endpoint Manager权限问题漏洞 | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28679 | Intel Gaudi资源管理错误漏洞 | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28678 | Intel CIP输入验证错误漏洞(CNVD-2025-28678) | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28677 | Intel CIP输入验证错误漏洞 | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28676 | Intel CIP访问控制不当漏洞 | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28675 | Intel CIP权限提升漏洞(CNVD-2025-28675) | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28674 | Intel CIP权限提升漏洞(CNVD-2025-28674) | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28673 | Intel CIP信息泄露漏洞(CNVD-2025-28673) | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28672 | Intel CIP权限提升漏洞(CNVD-2025-28672) | 2025-11-14 | 2025-11-17 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0161 | Vulnérabilité dans LibreOffice | 2025-02-26T00:00:00.000000 | 2025-02-26T00:00:00.000000 |
| certfr-2025-avi-0160 | Vulnérabilité dans Google Chrome | 2025-02-26T00:00:00.000000 | 2025-02-26T00:00:00.000000 |
| CERTFR-2025-AVI-0162 | Multiples vulnérabilités dans GLPI | 2025-02-26T00:00:00.000000 | 2025-02-26T00:00:00.000000 |
| CERTFR-2025-AVI-0161 | Vulnérabilité dans LibreOffice | 2025-02-26T00:00:00.000000 | 2025-02-26T00:00:00.000000 |
| CERTFR-2025-AVI-0160 | Vulnérabilité dans Google Chrome | 2025-02-26T00:00:00.000000 | 2025-02-26T00:00:00.000000 |
| certfr-2025-avi-0159 | Vulnérabilité dans Progress Telerik Reporting | 2025-02-25T00:00:00.000000 | 2025-02-25T00:00:00.000000 |
| CERTFR-2025-AVI-0159 | Vulnérabilité dans Progress Telerik Reporting | 2025-02-25T00:00:00.000000 | 2025-02-25T00:00:00.000000 |
| certfr-2025-avi-0158 | Multiples vulnérabilités dans les produits NetApp | 2025-02-24T00:00:00.000000 | 2025-02-24T00:00:00.000000 |
| certfr-2025-avi-0157 | Vulnérabilité dans Exim | 2025-02-24T00:00:00.000000 | 2025-02-24T00:00:00.000000 |
| certfr-2025-avi-0156 | Multiples vulnérabilités dans Microsoft Edge | 2025-02-24T00:00:00.000000 | 2025-02-24T00:00:00.000000 |
| certfr-2025-avi-0155 | Vulnérabilité dans les produits Moxa | 2025-02-24T00:00:00.000000 | 2025-02-24T00:00:00.000000 |
| CERTFR-2025-AVI-0158 | Multiples vulnérabilités dans les produits NetApp | 2025-02-24T00:00:00.000000 | 2025-02-24T00:00:00.000000 |
| CERTFR-2025-AVI-0157 | Vulnérabilité dans Exim | 2025-02-24T00:00:00.000000 | 2025-02-24T00:00:00.000000 |
| CERTFR-2025-AVI-0156 | Multiples vulnérabilités dans Microsoft Edge | 2025-02-24T00:00:00.000000 | 2025-02-24T00:00:00.000000 |
| CERTFR-2025-AVI-0155 | Vulnérabilité dans les produits Moxa | 2025-02-24T00:00:00.000000 | 2025-02-24T00:00:00.000000 |
| certfr-2025-avi-0154 | Multiples vulnérabilités dans les produits IBM | 2025-02-21T00:00:00.000000 | 2025-02-21T00:00:00.000000 |
| certfr-2025-avi-0153 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-02-21T00:00:00.000000 | 2025-02-21T00:00:00.000000 |
| certfr-2025-avi-0152 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-02-21T00:00:00.000000 | 2025-02-21T00:00:00.000000 |
| certfr-2025-avi-0151 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-02-21T00:00:00.000000 | 2025-02-21T00:00:00.000000 |
| certfr-2025-avi-0150 | Multiples vulnérabilités dans Tenable Identity Exposure | 2025-02-21T00:00:00.000000 | 2025-02-21T00:00:00.000000 |
| CERTFR-2025-AVI-0154 | Multiples vulnérabilités dans les produits IBM | 2025-02-21T00:00:00.000000 | 2025-02-21T00:00:00.000000 |
| CERTFR-2025-AVI-0153 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-02-21T00:00:00.000000 | 2025-02-21T00:00:00.000000 |
| CERTFR-2025-AVI-0152 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-02-21T00:00:00.000000 | 2025-02-21T00:00:00.000000 |
| CERTFR-2025-AVI-0151 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-02-21T00:00:00.000000 | 2025-02-21T00:00:00.000000 |
| CERTFR-2025-AVI-0150 | Multiples vulnérabilités dans Tenable Identity Exposure | 2025-02-21T00:00:00.000000 | 2025-02-21T00:00:00.000000 |
| certfr-2025-avi-0149 | Multiples vulnérabilités dans Drupal | 2025-02-20T00:00:00.000000 | 2025-02-20T00:00:00.000000 |
| certfr-2025-avi-0148 | Vulnérabilité dans Microsoft Power Pages | 2025-02-20T00:00:00.000000 | 2025-02-20T00:00:00.000000 |
| certfr-2025-avi-0147 | Vulnérabilité dans les produits Moxa | 2025-02-20T00:00:00.000000 | 2025-02-20T00:00:00.000000 |
| certfr-2025-avi-0146 | Vulnérabilité dans Symantec Diagnostic Tool | 2025-02-20T00:00:00.000000 | 2025-02-20T00:00:00.000000 |
| certfr-2025-avi-0145 | Vulnérabilité dans Wireshark | 2025-02-20T00:00:00.000000 | 2025-02-20T00:00:00.000000 |