Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2024-13986 |
8.7 (4.0)
|
Nagios XI < 2024R1.3.2 Authenticated Arbitrary File Up… |
Nagios |
Nagios XI |
2025-08-28T15:49:46.119Z | 2026-02-26T17:47:52.808Z |
| CVE-2025-59286 |
9.3 (3.1)
|
Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Copilot's Business Chat |
2025-10-09T21:04:15.392Z | 2026-02-26T17:47:51.165Z |
| CVE-2025-59272 |
9.3 (3.1)
|
Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Copilot's Business Chat |
2025-10-09T21:04:14.254Z | 2026-02-26T17:47:51.544Z |
| CVE-2025-57819 |
10 (4.0)
|
FreePBX Affected by Authentication Bypass Leading to S… |
FreePBX |
endpoint |
2025-08-28T16:45:18.749Z | 2026-02-26T17:47:51.014Z |
| CVE-2025-41250 |
8.5 (3.1)
|
Header injection vulnerability |
VMware |
vCenter |
2025-09-29T17:44:27.967Z | 2026-02-26T17:47:51.328Z |
| CVE-2025-25010 |
6.5 (3.1)
|
Kibana privilege escalation via reporting_user role |
Elastic |
Kibana |
2025-08-28T15:52:08.670Z | 2026-02-26T17:47:51.770Z |
| CVE-2025-58334 |
8.1 (3.1)
|
In JetBrains IDE Services before 2025.5.0.1086, … |
JetBrains |
IDE Services |
2025-08-28T16:48:56.800Z | 2026-02-26T17:47:50.538Z |
| CVE-2025-45376 |
7.5 (3.1)
|
Dell Repository Manager (DRM), versions 3.4.7 and… |
Dell |
Dell Repository Manager (DRM) |
2025-09-29T20:13:36.928Z | 2026-02-26T17:47:50.058Z |
| CVE-2025-41251 |
8.1 (3.1)
|
Weak password recovery vulnerability |
vmware |
NSX |
2025-09-29T18:45:16.614Z | 2026-02-26T17:47:50.851Z |
| CVE-2025-34196 |
9.3 (4.0)
|
Vasion Print (formerly PrinterLogic) Hardcoded Printer… |
Vasion |
Print Virtual Appliance Host |
2025-09-29T19:11:16.044Z | 2026-02-26T17:47:50.394Z |
| CVE-2025-21048 |
6.7 (3.1)
|
Relative path traversal in Knox Enterprise prior … |
Samsung Mobile |
Samsung Mobile Devices |
2025-10-10T06:33:07.200Z | 2026-02-26T17:47:50.220Z |
| CVE-2025-21044 |
5.7 (3.1)
|
Out-of-bounds write in fingerprint trustlet prior… |
Samsung Mobile |
Samsung Mobile Devices |
2025-10-10T06:33:02.865Z | 2026-02-26T17:47:50.698Z |
| CVE-2025-43268 |
7.8 (3.1)
|
A permissions issue was addressed with additional… |
Apple |
macOS |
2025-08-29T00:28:49.616Z | 2026-02-26T17:47:49.833Z |
| CVE-2025-43187 |
7.8 (3.1)
|
This issue was addressed by removing the vulnerab… |
Apple |
macOS |
2025-08-29T00:28:52.591Z | 2026-02-26T17:47:49.360Z |
| CVE-2025-34218 |
10 (4.0)
|
Vasion Print (formerly PrinterLogic) Exposed Internal … |
Vasion |
Print Virtual Appliance Host |
2025-09-29T20:34:23.512Z | 2026-02-26T17:47:49.540Z |
| CVE-2025-34212 |
8.7 (4.0)
|
Vasion Print (formerly PrinterLogic) Insecure Build Pipeline |
Vasion |
Print Virtual Appliance Host |
2025-09-29T20:36:51.280Z | 2026-02-26T17:47:49.008Z |
| CVE-2025-21064 |
8.8 (3.1)
|
Improper authentication in Smart Switch prior to … |
Samsung Mobile |
Smart Switch |
2025-10-10T06:33:22.932Z | 2026-02-26T17:47:49.178Z |
| CVE-2025-21062 |
7.8 (3.1)
|
Use of a broken or risky cryptographic algorithm … |
Samsung Mobile |
Smart Switch |
2025-10-10T06:33:20.889Z | 2026-02-26T17:47:49.685Z |
| CVE-2025-55177 |
5.4 (3.1)
|
Incomplete authorization of linked device synchro… |
Facebook |
WhatsApp Desktop for Mac |
2025-08-29T15:50:28.578Z | 2026-02-26T17:47:48.837Z |
| CVE-2025-36245 |
8.8 (3.1)
|
IBM InfoSphere Information Server command execution |
IBM |
InfoSphere Information Server |
2025-09-29T22:29:33.007Z | 2026-02-26T17:47:48.455Z |
| CVE-2025-30264 |
7.7 (4.0)
|
QTS, QuTS hero |
QNAP Systems Inc. |
QTS |
2025-08-29T17:15:53.952Z | 2026-02-26T17:47:48.098Z |
| CVE-2025-25018 |
8.7 (3.1)
|
Kibana Stored Cross-Site Scripting (XSS) |
Elastic |
Kibana |
2025-10-10T09:50:35.448Z | 2026-02-26T17:47:48.640Z |
| CVE-2025-23309 |
8.2 (3.1)
|
NVIDIA Display Driver contains a vulnerability wh… |
NVIDIA |
GeForce |
2025-10-10T17:40:42.076Z | 2026-02-26T17:47:48.268Z |
| CVE-2025-7779 |
8.8 (3.0)
|
Local privilege escalation due to insecure XPC se… |
Acronis |
Acronis True Image |
2025-09-30T14:52:46.494Z | 2026-02-26T17:47:47.347Z |
| CVE-2025-7493 |
9.1 (3.1)
|
Freeipa: idm: privilege escalation from host to domain… |
Red Hat |
Red Hat Enterprise Linux 10 |
2025-09-30T15:06:46.836Z | 2026-02-26T17:47:47.013Z |
| CVE-2025-52856 |
9.3 (4.0)
|
VioStor |
QNAP Systems Inc. |
VioStor |
2025-08-29T17:17:20.562Z | 2026-02-26T17:47:47.567Z |
| CVE-2025-23282 |
7 (3.1)
|
NVIDIA Display Driver for Linux contains a vulner… |
NVIDIA |
Virtual GPU Manager |
2025-10-10T17:41:55.131Z | 2026-02-26T17:47:47.178Z |
| CVE-2025-23280 |
7 (3.1)
|
NVIDIA Display Driver for Linux contains a vulner… |
NVIDIA |
GeForce |
2025-10-10T17:41:13.886Z | 2026-02-26T17:47:47.725Z |
| CVE-2025-11178 |
7.3 (3.0)
|
Local privilege escalation due to DLL hijacking v… |
Acronis |
Acronis True Image |
2025-09-30T14:52:20.711Z | 2026-02-26T17:47:47.868Z |
| CVE-2025-9968 |
8.5 (4.0)
|
A link following vulnerability exists in the Unif… |
ASUS |
Armoury Crate |
2025-10-13T08:13:33.300Z | 2026-02-26T17:47:46.186Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2020-1159 |
6.6 (3.1)
|
Windows Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1909 |
2020-09-11T17:09:03.000Z | 2024-08-04T06:25:01.215Z |
| CVE-2020-1152 |
5.8 (3.1)
|
Windows Win32k Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:02.000Z | 2024-08-04T06:25:01.287Z |
| CVE-2020-1146 |
6.6 (3.1)
|
Microsoft Store Runtime Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:02.000Z | 2024-08-04T06:25:01.291Z |
| CVE-2020-1133 |
5.5 (3.1)
|
Diagnostics Hub Standard Collector Elevation of Privil… |
Microsoft |
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) |
2020-09-11T17:09:01.000Z | 2024-08-04T06:25:01.292Z |
| CVE-2020-1130 |
6.6 (3.1)
|
Diagnostics Hub Standard Collector Elevation of Privil… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:01.000Z | 2024-08-04T06:25:01.223Z |
| CVE-2020-1129 |
8.8 (3.1)
|
Microsoft Windows Codecs Library Remote Code Execution… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:00.000Z | 2024-11-18T17:41:55.269Z |
| CVE-2020-1122 |
5.5 (3.1)
|
Windows Language Pack Installer Elevation of Privilege… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:00.000Z | 2024-08-04T06:25:01.245Z |
| CVE-2020-1119 |
5.5 (3.1)
|
Windows Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1909 |
2020-09-11T17:08:59.000Z | 2024-08-04T06:25:01.291Z |
| CVE-2020-1115 |
7.8 (3.1)
|
Windows Common Log File System Driver Elevation of Pri… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:59.000Z | 2024-08-04T06:25:01.077Z |
| CVE-2020-1098 |
7.8 (3.1)
|
Windows Shell Infrastructure Component Elevation of Pr… |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:08:58.000Z | 2024-08-04T06:25:01.095Z |
| CVE-2020-1097 |
6.5 (3.1)
|
Windows Graphics Component Information Disclosure Vuln… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:58.000Z | 2024-10-01T15:57:12.774Z |
| CVE-2020-1091 |
6.5 (3.1)
|
Windows Graphics Component Information Disclosure Vuln… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:57.000Z | 2024-08-04T06:25:00.934Z |
| CVE-2020-1083 |
5.5 (3.1)
|
Microsoft Graphics Component Information Disclosure Vu… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:57.000Z | 2024-08-04T06:25:00.832Z |
| CVE-2020-1080 |
8.8 (3.1)
|
Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-10-16T22:18:13.000Z | 2024-08-04T06:25:01.083Z |
| CVE-2020-1074 |
7.8 (3.1)
|
Jet Database Engine Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:56.000Z | 2024-08-04T06:25:01.073Z |
| CVE-2020-1057 |
4.2 (3.1)
|
Scripting Engine Memory Corruption Vulnerability |
Microsoft |
ChakraCore |
2020-09-11T17:08:56.000Z | 2024-08-04T06:25:00.990Z |
| CVE-2020-1053 |
7.8 (3.1)
|
DirectX Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:08:55.000Z | 2024-08-04T06:25:01.093Z |
| CVE-2020-1052 |
7.8 (3.1)
|
Windows Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:08:55.000Z | 2024-08-04T06:25:00.978Z |
| CVE-2020-1047 |
7.8 (3.1)
|
Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-10-16T22:18:13.000Z | 2024-08-04T06:25:01.114Z |
| CVE-2020-1046 |
N/A
|
.NET Framework Remote Code Execution Vulnerability |
Microsoft |
Microsoft .NET Framework 3.5 |
2020-08-17T19:12:57.000Z | 2024-08-04T06:25:00.884Z |
| CVE-2020-1045 |
7.5 (3.1)
|
Microsoft ASP.NET Core Security Feature Bypass Vulnerability |
Microsoft |
ASP.NET Core 2.1 |
2020-09-11T00:00:00.000Z | 2024-11-18T16:25:38.621Z |
| CVE-2020-1044 |
4.3 (3.1)
|
SQL Server Reporting Services Security Feature Bypass … |
Microsoft |
SQL Server 2017 Reporting Services |
2020-09-11T17:08:54.000Z | 2024-08-04T06:25:00.771Z |
| CVE-2020-1039 |
7.8 (3.1)
|
Jet Database Engine Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:54.000Z | 2024-10-01T15:57:18.205Z |
| CVE-2020-1038 |
5.5 (3.1)
|
Windows Routing Utilities Denial of Service |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:53.000Z | 2024-08-04T06:25:00.671Z |
| CVE-2020-1034 |
6.8 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:53.000Z | 2024-08-04T06:25:01.282Z |
| CVE-2020-1033 |
4 (3.1)
|
Windows Kernel Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:52.000Z | 2024-08-04T06:25:00.992Z |
| CVE-2020-1031 |
7.5 (3.1)
|
Windows DHCP Server Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:08:52.000Z | 2024-08-04T06:25:00.842Z |
| CVE-2020-1030 |
7.8 (3.1)
|
Windows Print Spooler Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:08:51.000Z | 2024-08-04T06:25:00.888Z |
| CVE-2020-1025 |
N/A
|
Microsoft Office Elevation of Privilege Vulnerability |
Microsoft |
Skype for Business Server 2019 CU2 |
2020-07-14T22:53:56.000Z | 2024-08-04T06:24:59.514Z |
| CVE-2020-1013 |
7.5 (3.1)
|
Group Policy Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:08:51.000Z | 2024-08-04T06:25:00.644Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2020-1146 | <p>An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handl… | 2020-09-11T17:15:19.137 | 2026-02-23T18:23:42.890 |
| fkie_cve-2020-1133 | <p>An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector impro… | 2020-09-11T17:15:19.090 | 2026-02-23T18:23:39.903 |
| fkie_cve-2020-1130 | <p>An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector impro… | 2020-09-11T17:15:19.043 | 2026-02-23T18:23:39.180 |
| fkie_cve-2020-1129 | <p>A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library ha… | 2020-09-11T17:15:18.980 | 2026-02-23T18:23:38.927 |
| fkie_cve-2020-1122 | <p>An elevation of privilege vulnerability exists when the Windows Language Pack Installer improper… | 2020-09-11T17:15:18.917 | 2026-02-23T18:23:37.897 |
| fkie_cve-2020-1119 | <p>An information disclosure vulnerability exists when StartTileData.dll improperly handles objects… | 2020-09-11T17:15:18.870 | 2026-02-23T18:23:37.473 |
| fkie_cve-2020-1115 | <p>An elevation of privilege vulnerability exists when the <a href="https://technet.microsoft.com/l… | 2020-09-11T17:15:18.823 | 2026-02-23T18:23:36.483 |
| fkie_cve-2020-1098 | <p>An elevation of privilege vulnerability exists when the Shell infrastructure component improperl… | 2020-09-11T17:15:18.777 | 2026-02-23T18:23:33.650 |
| fkie_cve-2020-1097 | <p>An information disclosure vulnerability exists when the Windows GDI component improperly disclos… | 2020-09-11T17:15:18.713 | 2026-02-23T18:23:33.300 |
| fkie_cve-2020-1091 | <p>An information disclosure vulnerability exists when the Windows GDI component improperly disclos… | 2020-09-11T17:15:18.667 | 2026-02-23T18:23:32.110 |
| fkie_cve-2020-1083 | <p>An information disclosure vulnerability exists when the Microsoft Windows Graphics Component imp… | 2020-09-11T17:15:18.620 | 2026-02-23T18:23:30.480 |
| fkie_cve-2020-1080 | <p>An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to pr… | 2020-10-16T23:15:17.570 | 2026-02-23T18:23:29.823 |
| fkie_cve-2020-1074 | <p>A remote code execution vulnerability exists when the Windows Jet Database Engine improperly han… | 2020-09-11T17:15:18.557 | 2026-02-23T18:23:27.790 |
| fkie_cve-2020-1057 | <p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine han… | 2020-09-11T17:15:18.463 | 2026-02-23T18:23:17.813 |
| fkie_cve-2020-1053 | <p>An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory… | 2020-09-11T17:15:18.417 | 2026-02-23T18:23:15.290 |
| fkie_cve-2020-1052 | <p>An elevation of privilege vulnerability exists in the way that the ssdpsrv.dll handles objects i… | 2020-09-11T17:15:18.357 | 2026-02-23T18:23:09.233 |
| fkie_cve-2020-1047 | <p>An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to pr… | 2020-10-16T23:15:17.523 | 2026-02-23T18:23:08.323 |
| fkie_cve-2020-1046 | A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An atta… | 2020-08-17T19:15:14.083 | 2026-02-23T18:23:08.147 |
| fkie_cve-2020-1045 | <p>A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded … | 2020-09-11T17:15:18.307 | 2026-02-23T18:23:07.950 |
| fkie_cve-2020-1044 | <p>A security feature bypass vulnerability exists in SQL Server Reporting Services (SSRS) when the … | 2020-09-11T17:15:18.260 | 2026-02-23T18:23:07.817 |
| fkie_cve-2020-1039 | <p>A remote code execution vulnerability exists when the Windows Jet Database Engine improperly han… | 2020-09-11T17:15:18.200 | 2026-02-23T18:23:07.000 |
| fkie_cve-2020-1038 | <p>A denial of service vulnerability exists when Windows Routing Utilities improperly handles objec… | 2020-09-11T17:15:18.153 | 2026-02-23T18:23:06.480 |
| fkie_cve-2020-1034 | <p>An elevation of privilege vulnerability exists in the way that the Windows Kernel handles object… | 2020-09-11T17:15:18.107 | 2026-02-23T18:23:05.603 |
| fkie_cve-2020-1033 | <p>An information disclosure vulnerability exists when the Windows kernel improperly handles object… | 2020-09-11T17:15:18.057 | 2026-02-23T18:23:05.360 |
| fkie_cve-2020-1031 | <p>An information disclosure vulnerability exists in the way that the Windows Server DHCP service i… | 2020-09-11T17:15:17.997 | 2026-02-23T18:23:04.930 |
| fkie_cve-2020-1030 | <p>An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly… | 2020-09-11T17:15:17.950 | 2026-02-23T18:23:04.587 |
| fkie_cve-2020-1025 | An elevation of privilege vulnerability exists when Microsoft SharePoint Server and Skype for Busin… | 2020-07-14T23:15:11.447 | 2026-02-23T18:23:01.917 |
| fkie_cve-2020-1013 | <p>An elevation of privilege vulnerability exists when Microsoft Windows processes group policy upd… | 2020-09-11T17:15:17.857 | 2026-02-23T18:22:59.423 |
| fkie_cve-2020-1012 | <p>An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects i… | 2020-09-11T17:15:17.807 | 2026-02-23T18:22:59.233 |
| fkie_cve-2025-27550 | IBM Jazz Reporting Service could allow an authenticated user on the host network to obtain sensitiv… | 2026-02-04T21:15:57.753 | 2026-02-23T18:22:37.800 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-f8p4-3gj8-2gxj |
7.1 (3.1)
|
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 … | 2026-02-17T18:32:58Z | 2026-02-17T18:32:58Z |
| ghsa-93pr-w682-79xh |
6.5 (3.1)
|
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 12.1.0 through 12.1.3 could allow… | 2026-02-17T18:32:58Z | 2026-02-17T18:32:58Z |
| ghsa-xq7w-6f6f-mh93 |
9.9 (3.1)
|
A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v… | 2026-02-17T18:32:57Z | 2026-02-17T18:32:57Z |
| ghsa-4gvj-3c7w-rv98 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in Beetel 777VR1 up to 01.00.09. This affects an unknown function of the … | 2026-02-17T18:32:57Z | 2026-02-17T18:32:57Z |
| ghsa-m5mm-m787-fp43 |
5.7 (3.1)
|
An information exposure vulnerability in Datart v1.0.0-rc.3 allows authenticated attackers to acces… | 2026-02-17T15:31:35Z | 2026-02-17T18:32:56Z |
| ghsa-jxvp-h5hw-39x4 |
8.8 (3.1)
|
An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via the url parameter in … | 2026-02-17T18:32:56Z | 2026-02-17T18:32:56Z |
| ghsa-hxj5-g9j8-xgph |
8.8 (3.1)
|
jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the d… | 2026-02-17T18:32:56Z | 2026-02-17T18:32:56Z |
| ghsa-g997-qv67-c7v6 |
9.0 (3.1)
|
An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 allows attackers to … | 2026-02-17T18:32:56Z | 2026-02-17T18:32:56Z |
| ghsa-q5q3-fgwr-rr9h |
5.5 (3.1)
|
The issue was addressed with improved memory handling. This issue is fixed in macOS Tahoe 26.3, mac… | 2026-02-12T00:31:04Z | 2026-02-17T18:32:55Z |
| ghsa-9xqh-f8h9-23pv |
7.5 (3.1)
|
A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. Th… | 2026-02-14T00:32:42Z | 2026-02-17T18:32:55Z |
| ghsa-649g-63pg-hvqg |
5.5 (3.1)
|
A cross-site scripting (XSS) vulnerability in the Item Kits function of OpenSourcePOS v3.4.1 allows… | 2026-02-13T00:32:52Z | 2026-02-17T18:32:55Z |
| ghsa-3p5c-6wpr-gh3w |
5.3 (3.1)
|
A logic issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPa… | 2026-02-12T00:31:05Z | 2026-02-17T18:32:55Z |
| ghsa-38xg-3ffm-68p7 |
8.8 (3.1)
|
LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level… | 2026-02-14T00:32:42Z | 2026-02-17T18:32:55Z |
| ghsa-9gh8-72qr-qfc7 |
7.1 (3.1)
|
An Improper Link Resolution Before File Access ('Link Following') vulnerability in Zscaler Client C… | 2024-05-02T15:30:33Z | 2026-02-17T18:32:54Z |
| ghsa-276f-6jm7-647m |
4.2 (3.1)
|
An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on MacOS … | 2024-05-02T15:30:33Z | 2026-02-17T18:32:54Z |
| ghsa-4hx9-48xh-5mxr |
5.5 (3.1)
|
Keycloak LDAP User Federation provider enables admin-triggered untrusted Java deserialization | 2025-12-19T21:31:05Z | 2026-02-17T17:48:45Z |
| ghsa-895x-rfqp-jh5c |
5.4 (3.1)
|
Keycloak does not invalidate offline sessions when the offline_access scope is removed | 2025-10-23T15:30:34Z | 2026-02-17T17:21:35Z |
| ghsa-64w3-5q9m-68xf |
5.4 (3.1)
|
Keycloak does not invalidate sessions when "Remember Me" is disabled | 2025-10-23T15:30:34Z | 2026-02-17T17:20:04Z |
| ghsa-hr7j-63v7-vj7g |
7.5 (4.0)
|
Pterodactyl Panel's SFTP sessions remain active after user account deletion or password change | 2026-02-17T17:15:18Z | 2026-02-17T17:15:19Z |
| ghsa-xc7w-v5x6-cc87 |
5.9 (3.1)
|
OpenClaw has a webhook auth bypass when gateway is behind a reverse proxy (loopback remoteAddress trust) | 2026-02-17T17:14:00Z | 2026-02-17T17:14:00Z |
| ghsa-56f2-hvwg-5743 |
7.6 (3.1)
|
OpenClaw affected by SSRF in Image Tool Remote Fetch | 2026-02-17T17:13:35Z | 2026-02-17T17:13:35Z |
| ghsa-qw99-grcx-4pvm |
6.5 (3.1)
|
OpenClaw's Chrome extension relay binds publicly due to wildcard treated as loopback | 2026-02-17T17:09:43Z | 2026-02-17T17:09:43Z |
| ghsa-3hcm-ggvf-rch5 |
7.4 (4.0)
|
OpenClaw has an exec allowlist bypass via command substitution/backticks inside double quotes | 2026-02-17T16:46:12Z | 2026-02-17T16:46:12Z |
| ghsa-mr32-vwc2-5j6h |
7.1 (4.0)
|
OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access | 2026-02-17T16:45:47Z | 2026-02-17T16:45:47Z |
| ghsa-qj77-c3c8-9c3q |
7.4 (4.0)
|
OpenClaw's Windows cmd.exe parsing may bypass exec allowlist/approval gating | 2026-02-17T16:44:11Z | 2026-02-17T16:44:11Z |
| ghsa-64qx-vpxx-mvqf |
7.1 (3.1)
|
OpenClaw has an arbitrary transcript path file write via gateway sessionFile | 2026-02-17T16:43:51Z | 2026-02-17T16:43:51Z |
| ghsa-hv93-r4j3-q65f |
7.1 (3.1)
|
OpenClaw Hook Session Key Override Enables Targeted Cross-Session Routing | 2026-02-17T16:43:34Z | 2026-02-17T16:43:34Z |
| ghsa-rfq9-4wcm-64gh |
7.6 (3.1)
5.7 (4.0)
|
ImapEngine affected by command injection via the ID command parameters | 2026-02-14T06:30:58Z | 2026-02-17T16:40:46Z |
| ghsa-v62p-rq8g-8h59 |
9.1 (4.0)
|
pbkdf2 silently disregards Uint8Array input, returning static keys | 2025-06-23T22:42:00Z | 2026-02-17T16:39:00Z |
| ghsa-rv39-79c4-7459 |
9.3 (4.0)
|
OpenClaw's gateway connect could skip device identity checks when auth.token was present but not ye… | 2026-02-17T16:37:04Z | 2026-02-17T16:37:04Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2014-74 |
|
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 2.13… | zope2 | 2014-09-30T14:55:00Z | 2021-07-25T23:34:58.895470Z |
| pysec-2014-73 |
|
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3… | zope2 | 2014-09-30T14:55:00Z | 2021-07-25T23:34:58.778006Z |
| pysec-2017-74 |
|
The tqdm._version module in tqdm versions 4.4.1 and 4.10 allows local users to execute ar… | tqdm | 2017-01-19T20:59:00Z | 2021-07-25T23:34:56.013301Z |
| pysec-2014-72 |
|
Transifex command-line client before 0.10 does not validate X.509 certificates for data t… | transifex-client | 2014-05-02T01:59:00Z | 2021-07-25T23:34:56.578427Z |
| pysec-2013-28 |
|
Directory traversal vulnerability in the client in Tryton 3.0.0, as distributed before 20… | tryton | 2013-11-18T02:55:00Z | 2021-07-25T23:34:56.639990Z |
| pysec-2017-73 |
|
sosreport in SoS 3.x allows local users to obtain sensitive information from sosreport fi… | sosreport | 2017-11-06T17:29:00Z | 2021-07-25T23:34:55.577295Z |
| pysec-2017-72 |
|
sosreport 3.2 uses weak permissions for generated sosreport archives, which allows local … | sosreport | 2017-07-25T18:29:00Z | 2021-07-25T23:34:55.539428Z |
| pysec-2017-71 |
|
win_useradd, salt-cloud and the Linode driver in salt 2015.5.x before 2015.5.6, and 2015.… | salt | 2017-08-09T16:29:00Z | 2021-07-25T23:34:53.862989Z |
| pysec-2017-70 |
|
salt before 2015.5.5 leaks git usernames and passwords to the log. | salt | 2017-10-10T16:29:00Z | 2021-07-25T23:34:53.773176Z |
| pysec-2017-69 |
|
Restkit allows man-in-the-middle attackers to spoof TLS servers by leveraging use of the … | restkit | 2017-08-09T18:29:00Z | 2021-07-25T23:34:53.240479Z |
| pysec-2016-23 |
|
Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, whic… | salt | 2016-04-12T14:59:00Z | 2021-07-25T23:34:53.906248Z |
| pysec-2015-33 |
|
RhodeCode before 2.2.7 allows remote authenticated users to obtain API keys and other sen… | rhodecode | 2015-02-16T15:59:00Z | 2021-07-25T23:34:53.466212Z |
| pysec-2015-32 |
|
RhodeCode before 2.2.7 and Kallithea 0.1 allows remote authenticated users to obtain API … | rhodecode | 2015-02-16T15:59:00Z | 2021-07-25T23:34:53.419876Z |
| pysec-2013-27 |
|
Unspecified vulnerability in salt-ssh in Salt (aka SaltStack) 0.17.0 has unspecified impa… | salt | 2013-11-05T18:55:00Z | 2021-07-25T23:34:53.727680Z |
| pysec-2013-26 |
|
The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate t… | salt | 2013-11-05T18:55:00Z | 2021-07-25T23:34:53.687508Z |
| pysec-2019-161 |
|
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass | python-keystoneclient | 2019-12-10T15:15:00Z | 2021-07-25T23:34:52.007420Z |
| pysec-2017-68 |
|
The Recurly Client Python Library before 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.… | recurly | 2017-11-13T17:29:00Z | 2021-07-25T23:34:52.943535Z |
| pysec-2016-22 |
|
OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard b… | python-muranoclient | 2016-09-26T16:59:00Z | 2021-07-25T23:34:52.302342Z |
| pysec-2015-31 |
|
The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystonec… | python-keystoneclient | 2015-04-17T17:59:00Z | 2021-07-25T23:34:52.173858Z |
| pysec-2014-71 |
|
OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x b… | python-keystoneclient | 2014-10-02T14:55:00Z | 2021-07-25T23:34:52.128374Z |
| pysec-2014-70 |
|
The auth_token middleware in the OpenStack Python client library for Keystone (aka python… | python-keystoneclient | 2014-04-15T14:55:00Z | 2021-07-25T23:34:52.050807Z |
| pysec-2013-25 |
|
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matc… | qpid-python | 2013-08-23T16:55:00Z | 2021-07-25T23:34:52.564224Z |
| pysec-2017-67 |
|
PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafte… | pysaml2 | 2017-03-03T15:59:00Z | 2021-07-25T23:34:51.281897Z |
| pysec-2017-66 |
|
The checkPassword function in python-kerberos does not authenticate the KDC it attempts t… | pykerberos | 2017-08-25T18:29:00Z | 2021-07-25T23:34:51.016854Z |
| pysec-2016-21 |
|
python-docx before 0.8.6 allows context-dependent attackers to conduct XML External Entit… | python-docx | 2016-12-21T22:59:00Z | 2021-07-25T23:34:51.683518Z |
| pysec-2014-69 |
|
python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not prop… | python-keystoneclient | 2014-01-21T18:55:00Z | 2021-07-25T23:34:51.958825Z |
| pysec-2013-24 |
|
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new pa… | python-keystoneclient | 2013-10-01T20:55:00Z | 2021-07-25T23:34:51.897352Z |
| pysec-2017-65 |
|
protobuf allows remote authenticated attackers to cause a heap-based buffer overflow. | protobuf | 2017-09-25T17:29:00Z | 2021-07-25T23:34:50.202612Z |
| pysec-2014-68 |
|
Products/CMFPlone/CatalogTool.py in Plone 3.3 through 4.3.2 allows remote administrators … | products-cmfplone | 2014-05-02T14:55:00Z | 2021-07-25T23:34:50.085881Z |
| pysec-2014-67 |
|
Products/CMFPlone/FactoryTool.py in Plone 3.3 through 4.3.2 allows remote attackers to ob… | products-cmfplone | 2014-05-02T14:55:00Z | 2021-07-25T23:34:50.035277Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-3648 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.398059Z |
| gsd-2024-3647 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.376177Z |
| gsd-2024-3646 | A command injection vulnerability was identified in GitHub Enterprise Server that allowed… | 2024-04-11T05:03:27.301713Z |
| gsd-2024-3645 | The Essential Addons for Elementor Pro plugin for WordPress is vulnerable to Stored Cross… | 2024-04-11T05:03:27.374892Z |
| gsd-2024-3644 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.048188Z |
| gsd-2024-3643 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.151136Z |
| gsd-2024-3642 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.371593Z |
| gsd-2024-3641 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.162401Z |
| gsd-2024-3640 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.310516Z |
| gsd-2024-3639 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.275654Z |
| gsd-2024-3638 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.283226Z |
| gsd-2024-3637 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.344825Z |
| gsd-2024-3636 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.051750Z |
| gsd-2024-3635 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.408596Z |
| gsd-2024-3634 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.301511Z |
| gsd-2024-3633 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.368857Z |
| gsd-2024-3632 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.077625Z |
| gsd-2024-3631 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.340973Z |
| gsd-2024-3630 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.303493Z |
| gsd-2024-3629 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.211590Z |
| gsd-2024-3628 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.073941Z |
| gsd-2024-3627 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.271015Z |
| gsd-2024-3626 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.171817Z |
| gsd-2024-3625 | A flaw was found in Quay, where Quay's database is stored in plain text in mirror-registr… | 2024-04-11T05:03:27.366319Z |
| gsd-2024-3624 | A flaw was found in how Quay's database is stored in plain-text in mirror-registry on the… | 2024-04-11T05:03:27.127424Z |
| gsd-2024-3623 | A flaw was found when using mirror-registry to install Quay. It uses a default database s… | 2024-04-11T05:03:27.130640Z |
| gsd-2024-3622 | A flaw was found when using mirror-registry to install Quay. It uses a default secret, wh… | 2024-04-11T05:03:27.178220Z |
| gsd-2024-3621 | A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System… | 2024-04-11T05:03:27.113679Z |
| gsd-2024-3620 | A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System… | 2024-04-11T05:03:27.375448Z |
| gsd-2024-3619 | A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management S… | 2024-04-11T05:03:27.394674Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2026-5 | Malicious code in queryservice-client (PyPI) | 2026-01-01T18:40:28Z | 2026-01-01T18:40:28Z |
| mal-2025-6694 | Malicious code in amdocs-auth-package (npm) | 2025-08-03T04:02:38Z | 2026-01-01T15:40:09Z |
| MAL-2025-6694 | Malicious code in amdocs-auth-package (npm) | 2025-08-03T04:02:38Z | 2026-01-01T15:40:09Z |
| mal-2026-1 | Malicious code in sfnt2woff-zopfli (PyPI) | 2026-01-01T11:16:31Z | 2026-01-01T11:16:31Z |
| MAL-2026-1 | Malicious code in sfnt2woff-zopfli (PyPI) | 2026-01-01T11:16:31Z | 2026-01-01T11:16:31Z |
| mal-2025-192989 | Malicious code in brolool4141412 (PyPI) | 2025-12-31T11:55:52Z | 2025-12-31T11:55:52Z |
| MAL-2025-192989 | Malicious code in brolool4141412 (PyPI) | 2025-12-31T11:55:52Z | 2025-12-31T11:55:52Z |
| mal-2025-192990 | Malicious code in broooxddd1414 (PyPI) | 2025-12-31T11:55:20Z | 2025-12-31T11:55:20Z |
| MAL-2025-192990 | Malicious code in broooxddd1414 (PyPI) | 2025-12-31T11:55:20Z | 2025-12-31T11:55:20Z |
| mal-2025-192993 | Malicious code in weorewfoi2393 (PyPI) | 2025-12-31T11:52:48Z | 2025-12-31T11:52:48Z |
| MAL-2025-192993 | Malicious code in weorewfoi2393 (PyPI) | 2025-12-31T11:52:48Z | 2025-12-31T11:52:48Z |
| mal-2025-991 | Malicious code in sysfunc (PyPI) | 2024-12-26T12:24:34Z | 2025-12-31T02:45:16Z |
| mal-2025-990 | Malicious code in syscontrol (PyPI) | 2024-12-26T12:24:34Z | 2025-12-31T02:45:16Z |
| mal-2025-989 | Malicious code in swapoc (PyPI) | 2024-08-23T22:55:41Z | 2025-12-31T02:45:16Z |
| mal-2025-6897 | Malicious code in swiv (PyPI) | 2025-08-18T03:20:56Z | 2025-12-31T02:45:16Z |
| mal-2025-6621 | Malicious code in web3toolkit-base (PyPI) | 2025-07-10T19:41:11Z | 2025-12-31T02:45:16Z |
| mal-2025-6614 | Malicious code in vramx (PyPI) | 2025-07-16T19:46:51Z | 2025-12-31T02:45:16Z |
| mal-2025-5847 | Malicious code in vtk-osmesa (PyPI) | 2025-07-14T19:49:43Z | 2025-12-31T02:45:16Z |
| mal-2025-48911 | Malicious code in yuzo (PyPI) | 2025-09-19T16:07:50Z | 2025-12-31T02:45:16Z |
| mal-2025-48898 | Malicious code in suyo (PyPI) | 2025-09-19T13:22:03Z | 2025-12-31T02:45:16Z |
| mal-2025-47811 | Malicious code in vcdiff-py (PyPI) | 2025-08-21T15:31:47Z | 2025-12-31T02:45:16Z |
| mal-2025-47804 | Malicious code in titifel-pypi (PyPI) | 2025-08-14T16:25:29Z | 2025-12-31T02:45:16Z |
| mal-2025-47803 | Malicious code in titifel-pyip (PyPI) | 2025-08-15T17:10:10Z | 2025-12-31T02:45:16Z |
| mal-2025-47802 | Malicious code in testt-test (PyPI) | 2025-08-30T17:44:57Z | 2025-12-31T02:45:16Z |
| mal-2025-41787 | Malicious code in tronapisync (PyPI) | 2025-08-06T22:56:43Z | 2025-12-31T02:45:16Z |
| mal-2025-41760 | Malicious code in set7 (PyPI) | 2025-07-21T14:29:37Z | 2025-12-31T02:45:16Z |
| mal-2025-3004 | Malicious code in systoring (PyPI) | 2025-02-13T13:18:05Z | 2025-12-31T02:45:16Z |
| mal-2025-192679 | Malicious code in system-health-check-test-unique (PyPI) | 2025-12-19T20:42:35Z | 2025-12-31T02:45:16Z |
| mal-2025-192438 | Malicious code in synium (PyPI) | 2025-12-10T18:29:17Z | 2025-12-31T02:45:16Z |
| mal-2025-192386 | Malicious code in telcoo (PyPI) | 2025-12-09T08:05:51Z | 2025-12-31T02:45:16Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0519 | Veritas Infoscale: Schwachstelle ermöglicht Codeausführung | 2025-03-10T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0518 | IBM InfoSphere Data Replication: Mehrere Schwachstellen | 2025-03-10T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0517 | IBM Security Guardium: Schwachstelle ermöglicht Manipulation von Dateien | 2025-03-10T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0516 | Camunda: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2025-03-10T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0514 | Zoom Video Communications Workplace und Rooms: Mehrere Schwachstellen | 2025-03-10T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0513 | OpenVPN: Schwachstelle ermöglicht Denial of Service | 2017-09-28T22:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0392 | Keycloak Organization Feature: Schwachstelle ermöglicht Privilegieneskalation | 2025-02-17T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0365 | Kubernetes: Schwachstelle ermöglicht Denial of Service | 2025-02-13T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0298 | OPC Foundation OPC UA .NET Standard Stack: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-02-09T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0173 | Keycloak: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-22T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0072 | Ivanti Endpoint Manager: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3577 | Red Hat OpenShift: Schwachstelle ermöglicht Manipulation von Daten | 2024-12-02T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3280 | Squid: Schwachstelle ermöglicht Denial of Service | 2024-10-27T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3277 | F5 BIG-IP: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-10-27T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2024-1755 | Gitea: Mehrere Schwachstellen | 2024-08-04T22:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2024-1447 | Squid: Schwachstelle ermöglicht Denial of Service | 2024-06-24T22:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2024-0544 | Squid: Schwachstelle ermöglicht Denial of Service | 2024-03-04T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2024-0424 | PostgreSQL JDBC Driver: Schwachstelle ermöglicht SQL-Injection | 2024-02-19T23:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2023-2375 | Insyde UEFI Firmware: Schwachstelle ermöglicht Codeausführung | 2023-09-17T22:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0510 | Microsoft Edge: Schwachstelle ermöglicht Darstellen falscher Informationen | 2025-03-09T23:00:00.000+00:00 | 2025-03-09T23:00:00.000+00:00 |
| wid-sec-w-2025-0509 | Apache OFBiz: Schwachstelle ermöglicht Codeausführung | 2025-03-09T23:00:00.000+00:00 | 2025-03-09T23:00:00.000+00:00 |
| wid-sec-w-2025-0506 | QNAP NAS (QuLog Center, QTS, QuTS hero): Mehrere Schwachstellen | 2025-03-09T23:00:00.000+00:00 | 2025-03-09T23:00:00.000+00:00 |
| wid-sec-w-2025-0486 | Google Chrome / Microsoft Edge: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-03-04T23:00:00.000+00:00 | 2025-03-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3464 | Mozilla Thunderbird: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-11-13T23:00:00.000+00:00 | 2025-03-09T23:00:00.000+00:00 |
| wid-sec-w-2023-2663 | zlib: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-10-16T22:00:00.000+00:00 | 2025-03-09T23:00:00.000+00:00 |
| wid-sec-w-2022-0116 | OpenVPN: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-03-16T23:00:00.000+00:00 | 2025-03-09T23:00:00.000+00:00 |
| wid-sec-w-2025-0505 | ServiceNow Now Platform: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-03-06T23:00:00.000+00:00 | 2025-03-06T23:00:00.000+00:00 |
| wid-sec-w-2025-0504 | HCL BigFix WebUI Applications: Mehrere Schwachstellen | 2025-03-06T23:00:00.000+00:00 | 2025-03-06T23:00:00.000+00:00 |
| wid-sec-w-2025-0502 | Docker Desktop: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-03-06T23:00:00.000+00:00 | 2025-03-06T23:00:00.000+00:00 |
| wid-sec-w-2025-0498 | python-crypto: Schwachstelle ermöglicht Offenlegung von Informationen | 2018-02-15T23:00:00.000+00:00 | 2025-03-06T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2022:6272 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.11 security update | 2022-08-31T15:00:53+00:00 | 2026-02-27T15:27:32+00:00 |
| rhsa-2022:6262 | Red Hat Security Advisory: OpenShift Container Platform 4.6.61 bug fix and security update | 2022-09-09T05:14:15+00:00 | 2026-02-27T15:27:29+00:00 |
| rhsa-2022:6183 | Red Hat Security Advisory: Logging Subsystem 5.4.5 Security and Bug Fix Update | 2022-09-06T13:32:06+00:00 | 2026-02-27T15:27:28+00:00 |
| rhsa-2022:6188 | Red Hat Security Advisory: Node Maintenance Operator 4.11.1 security update | 2022-08-25T11:20:51+00:00 | 2026-02-27T15:27:27+00:00 |
| rhsa-2022:6184 | Red Hat Security Advisory: Self Node Remediation Operator 0.4.1 security update | 2022-08-25T05:49:45+00:00 | 2026-02-27T15:27:25+00:00 |
| rhsa-2022:6182 | Red Hat Security Advisory: Openshift Logging Security and Bug Fix update (5.3.11) | 2022-09-06T13:21:38+00:00 | 2026-02-27T15:27:23+00:00 |
| rhsa-2022:6113 | Red Hat Security Advisory: Red Hat Application Interconnect 1.0 Release (rpms) | 2022-08-18T15:12:43+00:00 | 2026-02-27T15:27:19+00:00 |
| rhsa-2022:6065 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (collectd-libpod-stats) security update | 2022-08-15T09:45:35+00:00 | 2026-02-27T15:27:10+00:00 |
| rhsa-2022:6062 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (collectd-libpod-stats) security update | 2022-08-15T09:18:25+00:00 | 2026-02-27T15:27:07+00:00 |
| rhsa-2022:6053 | Red Hat Security Advisory: OpenShift Container Platform 4.7.56 security and bug fix update | 2022-08-22T21:14:41+00:00 | 2026-02-27T15:27:04+00:00 |
| rhsa-2022:5928 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update | 2022-08-08T19:43:57+00:00 | 2026-02-27T15:26:52+00:00 |
| rhsa-2022:5924 | Red Hat Security Advisory: Service Telemetry Framework 1.4 security update | 2022-08-08T18:55:19+00:00 | 2026-02-27T15:26:50+00:00 |
| rhsa-2022:5923 | Red Hat Security Advisory: Service Telemetry Framework 1.3 security update | 2022-08-08T16:44:22+00:00 | 2026-02-27T15:26:48+00:00 |
| rhsa-2022:5894 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update. | 2022-08-03T18:02:24+00:00 | 2026-02-27T15:26:42+00:00 |
| rhsa-2022:5893 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update | 2022-08-03T18:01:48+00:00 | 2026-02-27T15:26:38+00:00 |
| rhsa-2022:5892 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update | 2022-08-03T18:01:54+00:00 | 2026-02-27T15:26:38+00:00 |
| rhsa-2022:5879 | Red Hat Security Advisory: OpenShift Container Platform 4.9.45 bug fix and security update | 2022-08-09T14:00:04+00:00 | 2026-02-27T15:26:27+00:00 |
| rhsa-2022:5699 | Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.0.1 security update | 2022-07-28T14:43:45+00:00 | 2026-02-27T15:26:10+00:00 |
| rhsa-2022:5004 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.3 security update | 2022-06-13T12:34:12+00:00 | 2026-02-27T15:25:30+00:00 |
| rhsa-2022:4922 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.5 security update | 2022-06-06T15:11:31+00:00 | 2026-02-27T15:25:28+00:00 |
| rhsa-2022:4919 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.5 security update on RHEL 8 | 2022-06-06T16:00:48+00:00 | 2026-02-27T15:25:23+00:00 |
| rhsa-2022:4918 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.5 security update on RHEL 7 | 2022-06-06T15:54:15+00:00 | 2026-02-27T15:25:22+00:00 |
| rhsa-2022:4914 | Red Hat Security Advisory: rh-nodejs12-nodejs security, bug fix, and enhancement update | 2022-06-06T09:29:16+00:00 | 2026-02-27T15:25:20+00:00 |
| rhsa-2022:4863 | Red Hat Security Advisory: Release of OpenShift Serverless Version 1.22.1 | 2022-06-01T13:57:52+00:00 | 2026-02-27T15:25:18+00:00 |
| rhsa-2022:4860 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.22.1 | 2022-06-01T11:48:35+00:00 | 2026-02-27T15:25:18+00:00 |
| rhsa-2022:4814 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.6.5 security and bug fix update | 2022-05-31T09:48:42+00:00 | 2026-02-27T15:25:15+00:00 |
| rhsa-2022:1819 | Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update | 2022-05-10T14:02:26+00:00 | 2026-02-27T15:25:03+00:00 |
| rhsa-2022:1747 | Red Hat Security Advisory: Release of OpenShift Serverless Version 1.22.0 | 2022-05-09T16:47:58+00:00 | 2026-02-27T15:24:59+00:00 |
| rhsa-2022:1745 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.22.0 | 2022-05-09T07:48:15+00:00 | 2026-02-27T15:24:58+00:00 |
| rhsa-2022:1739 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.2.1 containers security update | 2022-05-05T18:02:37+00:00 | 2026-02-27T15:24:56+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-097-01 | Pepperl+Fuchs WirelessHART-Gateway | 2022-04-07T00:00:00.000000Z | 2022-04-07T00:00:00.000000Z |
| icsa-21-278-01 | Mitsubishi Electric GOT and Tension Controller (Update A) | 2021-10-05T00:00:00.000000Z | 2022-04-07T00:00:00.000000Z |
| icsma-22-095-01 | LifePoint Informatics Patient Portal | 2022-04-05T00:00:00.000000Z | 2022-04-05T00:00:00.000000Z |
| icsma-21-187-01 | Philips Vue PACS (Update B) | 2021-07-06T00:00:00.000000Z | 2022-04-05T00:00:00.000000Z |
| icsa-22-095-02 | Johnson Controls Metasys | 2022-04-05T00:00:00.000000Z | 2022-04-05T00:00:00.000000Z |
| icsa-22-095-01 | Rockwell Automation ISaGRAF | 2022-04-05T00:00:00.000000Z | 2022-04-05T00:00:00.000000Z |
| icsa-22-090-07 | Rockwell Automation Studio 5000 Logix Designer | 2022-03-31T00:00:00.000000Z | 2022-03-31T00:00:00.000000Z |
| icsa-22-090-06 | General Electric Renewable Energy MDS Radios | 2022-03-31T00:00:00.000000Z | 2022-03-31T00:00:00.000000Z |
| icsa-22-090-05 | Rockwell Automation Logix Controllers | 2022-03-31T00:00:00.000000Z | 2022-03-31T00:00:00.000000Z |
| icsa-22-090-03 | Fuji Electric Alpha5 | 2022-03-31T00:00:00.000000Z | 2022-03-31T00:00:00.000000Z |
| icsa-22-090-02 | Hitachi Energy e-mesh EMS | 2022-03-31T00:00:00.000000Z | 2022-03-31T00:00:00.000000Z |
| icsa-22-090-01 | Schneider Electric SCADAPack Workbench | 2022-03-31T00:00:00.000000Z | 2022-03-31T00:00:00.000000Z |
| icsa-22-067-01 | PTC Axeda agent and Axeda Desktop Server (Update C) | 2022-03-08T00:00:00.000000Z | 2022-03-31T00:00:00.000000Z |
| icsma-22-088-01 | Philips e-Alert | 2022-03-29T00:00:00.000000Z | 2022-03-29T00:00:00.000000Z |
| icsa-22-088-04 | Modbus Tools Modbus Slave | 2022-03-29T00:00:00.000000Z | 2022-03-29T00:00:00.000000Z |
| icsa-22-088-03 | Hitachi Energy LinkOne WebView | 2022-03-29T00:00:00.000000Z | 2022-03-29T00:00:00.000000Z |
| icsa-22-088-02 | Omron CX-Position | 2022-03-29T00:00:00.000000Z | 2022-03-29T00:00:00.000000Z |
| icsa-22-088-01 | Rockwell Automation ISaGRAF | 2022-03-29T00:00:00.000000Z | 2022-03-29T00:00:00.000000Z |
| icsa-22-083-02 | mySCADA myPRO | 2022-03-24T00:00:00.000000Z | 2022-03-24T00:00:00.000000Z |
| icsa-22-083-01 | Yokogawa CENTUM and Exaopc | 2022-03-24T00:00:00.000000Z | 2022-03-24T00:00:00.000000Z |
| icsa-21-238-03 | Delta Electronics DIAEnergie (Update C) | 2021-08-26T00:00:00.000000Z | 2022-03-22T00:00:00.000000Z |
| icsa-22-074-01 | ABB OPC Server for AC 800M | 2022-03-15T00:00:00.000000Z | 2022-03-15T00:00:00.000000Z |
| icsa-21-315-09 | Siemens Climatix POL909 (Update A) | 2021-11-11T00:00:00.000000Z | 2022-03-10T00:00:00.000000Z |
| icsa-20-203-01 | Wibu-Systems CodeMeter (Update F) | 2020-08-20T00:00:00.000000Z | 2022-03-10T00:00:00.000000Z |
| icsa-22-067-02 | AVEVA System Platform | 2022-03-08T00:00:00.000000Z | 2022-03-08T00:00:00.000000Z |
| icsa-22-034-01 | Sensormatic PowerManage (Update A) | 2022-02-03T00:00:00.000000Z | 2022-03-08T00:00:00.000000Z |
| icsa-22-063-01 | Trailer Power Line Communications (PLC) J2497 | 2022-03-04T00:00:00.000000Z | 2022-03-04T00:00:00.000000Z |
| icsma-22-062-02 | BD Viper LT | 2022-03-03T00:00:00.000000Z | 2022-03-03T00:00:00.000000Z |
| icsma-22-062-01 | BD Pyxis | 2022-03-03T00:00:00.000000Z | 2022-03-03T00:00:00.000000Z |
| icsa-22-062-01 | IPCOMM ipDIO | 2022-03-03T00:00:00.000000Z | 2022-03-03T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-iosxe-ctbypass-7QHAfHkK | Cisco IOS XE Software Consent Token Bypass Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-cmdinj-2mzhjm6k | Cisco IOS XE Software Command Injection Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-cmdinj-2MzhjM6K | Cisco IOS XE Software Command Injection Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-webui-multi-vftkk7yr | Cisco IOS XE Software Web Management Framework Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-webui-multi-vfTkk7yr | Cisco IOS XE Software Web Management Framework Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-webui-priv-esc-k8zvewm | Cisco IOS XE Software Privilege Escalation Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-webui-priv-esc-K8zvEWM | Cisco IOS XE Software Privilege Escalation Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-lua-rce-7vejx4f | Cisco IOS XE Software Arbitrary Code Execution Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-lua-rce-7VeJX4f | Cisco IOS XE Software Arbitrary Code Execution Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-lpwa-access-cxsd7pra | Cisco IOS Software for Cisco Industrial Routers Virtual-LPWA Unauthorized Access Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-lpwa-access-cXsD7PRA | Cisco IOS Software for Cisco Industrial Routers Virtual-LPWA Unauthorized Access Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-bgp-evpn-dos-lnfyjxff | Cisco IOS and IOS XE Software MP-BGP EVPN Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-bgp-evpn-dos-LNfYJxfF | Cisco IOS and IOS XE Software MP-BGP EVPN Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-info-disclosure-v4bmjbnf | Cisco IOS and IOS XE Software Information Disclosure Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-info-disclosure-V4BmJBNF | Cisco IOS and IOS XE Software Information Disclosure Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-file-overwrite-ynu5prjd | Cisco IOS XE Software Arbitrary File Overwrite Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-file-overwrite-Ynu5PrJD | Cisco IOS XE Software Arbitrary File Overwrite Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ewlc-icmpv6-qb9eyycr | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family Improper Access Control Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ewlc-icmpv6-qb9eYyCR | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family Improper Access Control Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-esp20-arp-dos-gvhvggqj | Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-esp20-arp-dos-GvHVggqJ | Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-dclass-dos-vkh9d8k3 | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WLAN Local Profiling Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-dclass-dos-VKh9D8k3 | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WLAN Local Profiling Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-cops-vld-mpbtvgew | Cisco IOS XE Software Common Open Policy Service Engine Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-confacl-hbptfsuo | Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-confacl-HbPtfSuO | Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-capwap-dos-tpdntdyq | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-capwap-dos-shfzxf | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-capwap-dos-TPdNTdyq | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-capwap-dos-ShFzXf | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2023-0330 | Qemu: lsi53c895a: dma reentrancy issue leads to stack overflow | 2023-03-10T00:00:00.000Z | 2026-02-18T02:56:41.000Z |
| msrc_cve-2025-37803 | udmabuf: fix a buf size overflow issue during udmabuf creation | 2025-05-02T00:00:00.000Z | 2026-02-18T02:56:38.000Z |
| msrc_cve-2023-29409 | Large RSA keys can cause high CPU usage in crypto/tls | 2023-08-01T00:00:00.000Z | 2026-02-18T02:56:34.000Z |
| msrc_cve-2024-26884 | bpf: Fix hashtab overflow check on 32-bit arches | 2024-04-02T07:00:00.000Z | 2026-02-18T02:56:28.000Z |
| msrc_cve-2024-50015 | ext4: dax: fix overflowing extents beyond inode size when partially writing | 2024-10-01T07:00:00.000Z | 2026-02-18T02:56:23.000Z |
| msrc_cve-2024-42069 | net: mana: Fix possible double free in error handling path | 2024-07-01T07:00:00.000Z | 2026-02-18T02:56:21.000Z |
| msrc_cve-2025-27809 | Mbed TLS before 2.28.10 and 3.x before 3.6.3, on the client side, accepts servers that have trusted certificates for arbitrary hostnames unless the TLS client application calls mbedtls_ssl_set_hostname. | 2025-03-02T00:00:00.000Z | 2026-02-18T02:56:16.000Z |
| msrc_cve-2025-37810 | usb: dwc3: gadget: check that event count does not exceed event buffer length | 2025-05-02T00:00:00.000Z | 2026-02-18T02:56:12.000Z |
| msrc_cve-2025-37747 | perf: Fix hang while freeing sigtrap event | 2025-05-02T00:00:00.000Z | 2026-02-18T02:55:56.000Z |
| msrc_cve-2025-5987 | Libssh: invalid return code for chacha20 poly1305 with openssl backend | 2025-07-02T00:00:00.000Z | 2026-02-18T02:55:49.000Z |
| msrc_cve-2025-37840 | mtd: rawnand: brcmnand: fix PM resume warning | 2025-05-02T00:00:00.000Z | 2026-02-18T02:55:43.000Z |
| msrc_cve-2024-49960 | ext4: fix timer use-after-free on failed mount | 2024-10-01T07:00:00.000Z | 2026-02-18T02:55:43.000Z |
| msrc_cve-2024-42064 | drm/amd/display: Skip pipe if the pipe idx not set properly | 2024-07-01T07:00:00.000Z | 2026-02-18T02:55:43.000Z |
| msrc_cve-2023-45142 | OpenTelemetry-Go Contrib has DoS vulnerability in otelhttp due to unbound cardinality metrics | 2023-10-01T00:00:00.000Z | 2026-02-18T02:55:42.000Z |
| msrc_cve-2019-14194 | An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv2 case. | 2019-07-02T00:00:00.000Z | 2026-02-18T02:55:39.000Z |
| msrc_cve-2024-26900 | md: fix kmemleak of rdev->serial | 2024-04-02T07:00:00.000Z | 2026-02-18T02:55:36.000Z |
| msrc_cve-2025-37891 | ALSA: ump: Fix buffer overflow at UMP SysEx message conversion | 2025-05-02T00:00:00.000Z | 2026-02-18T02:55:14.000Z |
| msrc_cve-2024-42070 | netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers | 2024-07-01T07:00:00.000Z | 2026-02-18T02:55:11.000Z |
| msrc_cve-2019-14201 | An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_lookup_reply. | 2019-07-02T00:00:00.000Z | 2026-02-18T02:55:01.000Z |
| msrc_cve-2024-26883 | bpf: Fix stackmap overflow check on 32-bit arches | 2024-04-02T07:00:00.000Z | 2026-02-18T02:54:55.000Z |
| msrc_cve-2025-37933 | octeon_ep: Fix host hang issue during device reboot | 2025-05-02T00:00:00.000Z | 2026-02-18T02:54:46.000Z |
| msrc_cve-2025-38184 | tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer | 2025-07-02T00:00:00.000Z | 2026-02-18T02:54:42.000Z |
| msrc_cve-2023-39319 | Improper handling of special tags within script contexts in html/template | 2023-09-01T00:00:00.000Z | 2026-02-18T02:54:40.000Z |
| msrc_cve-2024-49991 | drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer | 2024-10-01T07:00:00.000Z | 2026-02-18T02:54:27.000Z |
| msrc_cve-2024-42228 | drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc | 2024-07-01T07:00:00.000Z | 2026-02-18T02:54:25.000Z |
| msrc_cve-2024-26885 | bpf: Fix DEVMAP_HASH overflow check on 32-bit arches | 2024-04-02T07:00:00.000Z | 2026-02-18T02:54:25.000Z |
| msrc_cve-2019-14199 | An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call. | 2019-07-02T00:00:00.000Z | 2026-02-18T02:54:24.000Z |
| msrc_cve-2025-23135 | RISC-V: KVM: Teardown riscv specific bits after kvm_exit | 2025-04-02T00:00:00.000Z | 2026-02-18T02:54:23.000Z |
| msrc_cve-2024-46733 | btrfs: fix qgroup reserve leaks in cow_file_range | 2024-09-01T07:00:00.000Z | 2026-02-18T02:54:17.000Z |
| msrc_cve-2025-68756 | block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock | 2026-01-02T00:00:00.000Z | 2026-02-18T02:54:14.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:13998-1 | java-21-openj9-21.0.3.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13997-1 | java-1_8_0-openj9-1.8.0.412-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13996-1 | java-17-openj9-17.0.11.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13995-1 | java-11-openj9-11.0.23.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13994-1 | freerdp2-devel-2.11.5-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13993-1 | python310-PyMySQL-1.1.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13992-1 | libopenssl-3-devel-3.1.4-8.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13991-1 | glibc-2.39-7.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13990-1 | forgejo-7.0.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13989-1 | containerd-1.7.17-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13988-1 | chromedriver-125.0.6422.76-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13987-1 | gitoxide-0.36.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13986-1 | bpftrace-0.20.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13985-1 | xdg-desktop-portal-1.18.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13984-1 | python310-aiosmtpd-1.4.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13983-1 | python-2.7.18-47.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13982-1 | chromedriver-125.0.6422.60-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13981-1 | MozillaThunderbird-115.11.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13980-1 | MozillaFirefox-126.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13979-1 | gitui-0.26.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13978-1 | libwireshark17-4.2.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13977-1 | python310-pywbem-1.7.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13976-1 | chromedriver-124.0.6367.207-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13975-1 | warewulf4-4.5.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13974-1 | ucode-intel-20240514-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13973-1 | perl-Email-MIME-1.954.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13972-1 | nodejs-electron-29.4.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13971-1 | libxml2-2-2.12.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13970-1 | gio-branding-upstream-2.80.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13969-1 | git-cliff-2.2.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-619 | UNKNOWN READ in ot::Ip6::Netif::UnsubscribeAllRoutersMulticast | 2020-07-01T00:00:20.722131Z | 2022-04-13T03:04:39.071470Z |
| osv-2020-610 | UNKNOWN READ in opj_t2_decode_packets | 2020-07-01T00:00:20.269225Z | 2022-04-13T03:04:39.656720Z |
| osv-2020-598 | UNKNOWN READ in ot::Message::GetPriority | 2020-07-01T00:00:19.359328Z | 2022-04-13T03:04:39.003804Z |
| osv-2020-597 | UNKNOWN READ in ot::MessageQueue::GetHead | 2020-07-01T00:00:19.297404Z | 2022-04-13T03:04:39.035260Z |
| osv-2020-562 | UNKNOWN READ in local_add_lv | 2020-07-01T00:00:17.111214Z | 2022-04-13T03:04:39.775341Z |
| osv-2020-540 | Heap-buffer-overflow in byte_from_wkb_state | 2020-07-01T00:00:15.605041Z | 2022-04-13T03:04:39.447294Z |
| osv-2020-528 | Stack-buffer-overflow in ot::Message::Read | 2020-07-01T00:00:14.832074Z | 2022-04-13T03:04:39.076661Z |
| osv-2020-519 | Use-of-uninitialized-value in MOS65XX_group_name | 2020-07-01T00:00:14.210861Z | 2022-04-13T03:04:39.894964Z |
| osv-2020-510 | UNKNOWN READ in ot::Timer::GetFireTime | 2020-07-01T00:00:13.757263Z | 2022-04-13T03:04:39.081813Z |
| osv-2020-471 | Stack-buffer-overflow in ot::Cli::Interpreter::ProcessService | 2020-07-01T00:00:11.530819Z | 2022-04-13T03:04:39.040405Z |
| osv-2020-447 | UNKNOWN READ in yyparse | 2020-07-01T00:00:10.057682Z | 2022-04-13T03:04:39.703625Z |
| osv-2020-438 | Use-of-uninitialized-value in ARM_post_printer | 2020-07-01T00:00:09.576759Z | 2022-04-13T03:04:39.911191Z |
| osv-2020-413 | Stack-buffer-overflow in ot::NetworkData::NetworkDataTlv::GetNext | 2020-07-01T00:00:08.114688Z | 2022-04-13T03:04:39.061092Z |
| osv-2020-383 | Stack-buffer-overflow in ot::NetworkData::Leader::IsStableUpdated | 2020-07-01T00:00:06.392501Z | 2022-04-13T03:04:39.050756Z |
| osv-2020-380 | Stack-buffer-overflow in ot::MeshCoP::ChannelMaskEntry::GetMask | 2020-07-01T00:00:06.263172Z | 2022-04-13T03:04:39.008953Z |
| osv-2020-324 | Heap-buffer-overflow in av1_convolve_2d_copy_sr_sse2 | 2020-07-01T00:00:02.786882Z | 2022-04-13T03:04:39.484676Z |
| osv-2020-323 | Use-of-uninitialized-value in ht_copy | 2020-07-01T00:00:02.715402Z | 2022-04-13T03:04:39.764885Z |
| osv-2020-319 | Use-of-uninitialized-value in inv_txfm2d_add_facade | 2020-07-01T00:00:02.248791Z | 2022-04-13T03:04:39.494971Z |
| osv-2020-305 | Stack-buffer-overflow in ot::NetworkData::Leader::SendCommissioningGetResponse | 2020-06-30T00:00:48.691484Z | 2022-04-13T03:04:39.086968Z |
| osv-2020-253 | Stack-buffer-overflow in mrb_str_len_to_dbl | 2020-06-26T00:00:11.566328Z | 2022-04-13T03:04:39.682918Z |
| osv-2020-2320 | UNKNOWN WRITE in cpu_arm_exec_arm | 2021-12-04T00:00:54.942609Z | 2022-04-13T03:04:39.176437Z |
| osv-2020-231 | UNKNOWN WRITE in gen_mftr | 2020-06-26T00:00:06.484913Z | 2022-04-13T03:04:39.209952Z |
| osv-2020-2305 | UNKNOWN WRITE in tb_flush_armeb | 2021-02-08T00:00:04.373811Z | 2022-04-13T03:04:39.255781Z |
| osv-2020-2259 | Stack-buffer-overflow in ot::MeshCoP::ChannelMaskEntry::GetMask | 2020-12-13T00:00:10.196605Z | 2022-04-13T03:04:39.014179Z |
| osv-2020-2247 | Stack-buffer-overflow in ot::MeshCoP::ChannelMaskEntryBase::GetEntrySize | 2020-12-06T00:00:26.193153Z | 2022-04-13T03:04:39.024692Z |
| osv-2020-2205 | Heap-buffer-overflow in ojph::local::ojph_decode_codeblock | 2020-11-28T00:01:12.405006Z | 2022-04-13T03:04:39.528978Z |
| osv-2020-215 | Use-of-uninitialized-value in xmlStrdup | 2020-06-24T01:51:19.309469Z | 2022-04-13T03:04:39.947858Z |
| osv-2020-2081 | UNKNOWN READ in presym_sym2name | 2020-10-18T00:00:15.125270Z | 2022-04-13T03:04:39.770022Z |
| osv-2020-1945 | UNKNOWN READ in helper_uc_tracecode | 2020-10-02T00:00:37.220816Z | 2022-04-13T03:04:39.170448Z |
| osv-2020-1885 | Heap-use-after-free in xmlStaticCopyNode | 2020-09-29T00:00:43.015893Z | 2022-04-13T03:04:39.952934Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2024-7610 | Uncontrolled Resource Consumption in GitLab | 2024-08-10T07:18:42.094Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-7554 | Exposure of Sensitive Information to an Unauthorized Actor in GitLab | 2024-08-10T07:18:59.092Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-7404 | Improper Restriction of Rendered UI Layers or Frames in GitLab | 2024-11-16T07:12:07.188Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-7296 | Incorrect Authorization in GitLab | 2025-03-15T07:19:42.794Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-7110 | Improper Neutralization of Special Elements used in a Command ('Command Injection') in GitLab | 2024-08-26T08:28:53.762Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-7091 | Exposure of Sensitive Information to an Unauthorized Actor in GitLab | 2024-07-26T07:18:49.551Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-7060 | Exposure of Sensitive Information to an Unauthorized Actor in GitLab | 2024-07-26T07:19:04.262Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-7057 | Improper Access Control in GitLab | 2024-07-26T07:19:19.356Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-7047 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2024-07-26T07:19:35.456Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6826 | Allocation of Resources Without Limits or Throttling in GitLab | 2024-10-26T07:11:57.115Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6685 | Authorization Bypass Through User-Controlled Key in GitLab | 2024-09-18T07:17:55.746Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6678 | Authentication Bypass by Spoofing in GitLab | 2024-09-14T07:08:36.238Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6595 | Uncontrolled Search Path Element in GitLab | 2024-07-19T07:19:00.729Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6530 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2024-10-13T19:10:25.204Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6502 | Incorrect Provision of Specified Functionality in GitLab | 2024-08-26T08:29:33.838Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6446 | Business Logic Errors in GitLab | 2024-09-14T07:09:14.036Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6389 | Exposure of Sensitive System Information to an Unauthorized Control Sphere in GitLab | 2024-09-14T07:09:28.429Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6385 | Improper Access Control in GitLab | 2024-07-13T07:18:39.985Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6356 | Incorrect User Management in GitLab | 2025-02-07T07:16:51.890Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6329 | Improper Encoding or Escaping of Output in GitLab | 2024-08-10T07:20:44.297Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6324 | Inefficient Algorithmic Complexity in GitLab | 2025-01-10T19:17:23.895Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-6323 | Improper Isolation or Compartmentalization in GitLab | 2024-06-28T07:18:50.287Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-5655 | Improper Access Control in GitLab | 2024-06-28T07:19:05.283Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-5470 | Improper Access Control in GitLab | 2024-07-13T07:19:23.283Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-5469 | Uncontrolled Resource Consumption in GitLab | 2024-06-18T07:18:41.229Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-5435 | Generation of Error Message Containing Sensitive Information in GitLab | 2024-09-14T07:10:53.429Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-5430 | Improper Access Control in GitLab | 2024-06-28T07:19:36.388Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-5423 | Uncontrolled Resource Consumption in GitLab | 2024-08-10T07:22:13.593Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-5318 | Missing Authorization in GitLab | 2024-05-29T07:18:35.469Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-5258 | Authorization Bypass Through User-Controlled Key in GitLab | 2024-05-29T07:19:02.770Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202309-2249 | Memory corruption in Graphics while processing user packets for command submission. APQ80… | 2024-04-18T13:16:22.104000Z |
| var-202202-1170 | A CWE-787: Out-of-bounds Write vulnerability exists that could cause denial of service wh… | 2024-04-18T13:14:42.520000Z |
| var-202202-1169 | A CWE-20: Improper Input Validation vulnerability exists that could cause denial of servi… | 2024-04-18T13:14:42.579000Z |
| var-202202-1168 | A CWE-200: Information Exposure vulnerability exists that could cause sensitive informati… | 2024-04-18T13:14:42.548000Z |
| var-202309-2076 | Transient DOS in WLAN Host while doing channel switch announcement (CSA), when a mobile s… | 2024-04-18T13:14:33.200000Z |
| var-202311-1173 | Memory corruption in Audio while processing the VOC packet data from ADSP. 315 5g iot mod… | 2024-04-18T13:14:32.911000Z |
| var-202112-0168 | Buffer overflow vulnerability in ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prio… | 2024-04-18T13:10:59.648000Z |
| var-202112-0167 | ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prior and WRH-733GWH firmware v1.02.9… | 2024-04-18T13:10:59.853000Z |
| var-202205-1608 | Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 … | 2024-04-18T13:10:56.026000Z |
| var-202205-1607 | Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 … | 2024-04-18T13:10:56Z |
| var-202205-1606 | Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a hard-coded credential which may al… | 2024-04-18T13:10:56.052000Z |
| var-202303-0155 | Memory corruption in modem due to buffer overflow while processing a PPP packet. APQ8009 … | 2024-04-18T11:51:41.022000Z |
| var-202307-0110 | Memory Corruption in WLAN HOST while fetching TX status information. 315 5g iot firmware,… | 2024-04-18T11:25:45.574000Z |
| var-202303-0126 | Memory corruption in Bluetooth HOST while processing the AVRC_PDU_GET_PLAYER_APP_VALUE_TE… | 2024-04-18T11:17:44.504000Z |
| var-202303-0162 | Information Disclosure in Graphics during GPU context switch. APQ8009 firmware, APQ8009W … | 2024-04-18T11:10:55.651000Z |
| var-202303-0143 | Memory corruption in WLAN HAL while arbitrary value is passed in WMI UTF command payload.… | 2024-04-18T11:09:36.601000Z |
| var-202301-0630 | A vulnerability has been identified in Automation License Manager V5 (All versions), Auto… | 2024-04-18T10:39:52.317000Z |
| var-202303-0140 | Memory corruption in Video due to double free while playing 3gp clip with invalid metadat… | 2024-04-18T10:05:37.297000Z |
| var-202404-0059 | None | 2024-04-18T05:34:30.626000Z |
| var-202404-0058 | None | 2024-04-18T05:34:30.548000Z |
| var-202404-0057 | None | 2024-04-18T05:34:30.505000Z |
| var-202404-0056 | None | 2024-04-18T05:34:30.562000Z |
| var-202404-0055 | None | 2024-04-18T05:34:30.658000Z |
| var-202403-2496 | Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG19… | 2024-04-18T05:34:30.688000Z |
| var-202403-2300 | Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200H… | 2024-04-18T05:34:30.594000Z |
| var-202403-2122 | Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG19… | 2024-04-18T05:34:30.672000Z |
| var-202403-1925 | Active Debug Code in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG… | 2024-04-18T05:34:30.641000Z |
| var-202403-1757 | Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG19… | 2024-04-18T05:34:30.610000Z |
| var-202403-1555 | Stack-based Buffer Overflow vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, … | 2024-04-18T05:34:30.530000Z |
| var-202403-1178 | Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG19… | 2024-04-18T05:34:30.577000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2011-000070 | Sage vulnerable to arbitrary script execution | 2011-09-02T19:19+09:00 | 2011-09-02T19:19+09:00 |
| jvndb-2011-000069 | Sage vulnerable to arbitrary script execution | 2011-09-02T19:14+09:00 | 2011-09-02T19:14+09:00 |
| jvndb-2011-000068 | Multiple vulnerabilities in Phorum | 2011-09-02T19:11+09:00 | 2011-09-02T19:11+09:00 |
| jvndb-2011-000067 | WebsiteBaker vulnerable to cross-site scripting | 2011-08-26T15:50+09:00 | 2011-08-26T15:50+09:00 |
| jvndb-2011-000064 | Microsoft Windows XP vulnerable to denial-of-service (DoS) | 2011-08-19T16:32+09:00 | 2011-08-19T16:32+09:00 |
| jvndb-2011-000063 | Aipo vulnerable to SQL injection | 2011-08-16T16:44+09:00 | 2011-08-16T16:44+09:00 |
| jvndb-2011-000062 | Aipo vulnerable to cross-site request forgery | 2011-08-16T16:41+09:00 | 2011-08-16T16:41+09:00 |
| jvndb-2011-000061 | Internet Explorer window display vulnerability | 2011-08-12T14:06+09:00 | 2011-08-12T14:06+09:00 |
| jvndb-2011-000060 | Windows URL Protocol Handler may insecurely load executable files | 2011-08-10T17:17+09:00 | 2011-08-10T17:17+09:00 |
| jvndb-2011-001928 | JP1/Performance Management - Web Console Cross-Site Scripting Vulnerability | 2011-08-09T10:11+09:00 | 2011-08-09T10:11+09:00 |
| jvndb-2011-001927 | Arbitrary Code Execution Vulnerability in HiRDB Control Manager | 2011-08-09T10:10+09:00 | 2011-08-09T10:10+09:00 |
| jvndb-2011-000059 | Mozilla Firefox vulnerable to cross-site scripting | 2011-07-28T16:31+09:00 | 2011-07-28T16:31+09:00 |
| jvndb-2011-000058 | Mozilla Firefox vulnerable to cross-site scripting | 2011-07-28T16:29+09:00 | 2011-07-28T16:29+09:00 |
| jvndb-2011-000057 | Mozilla Firefox vulnerable to denial-of-service (DoS) | 2011-07-28T16:27+09:00 | 2011-07-28T16:27+09:00 |
| jvndb-2011-000055 | Mozilla Firefox vulnerability in processing content-length header | 2011-07-28T16:24+09:00 | 2011-07-28T16:24+09:00 |
| jvndb-2011-000056 | Plone vulnerable to cross-site scripting | 2011-07-27T16:17+09:00 | 2011-07-27T16:17+09:00 |
| jvndb-2009-002069 | Oracle iPlanet Web Server information disclosure vulnerability | 2011-07-25T18:06+09:00 | 2011-07-25T18:06+09:00 |
| jvndb-2011-000051 | ASP.NET vulnerable to cross-site scripting | 2011-07-15T16:32+09:00 | 2011-07-15T16:32+09:00 |
| jvndb-2011-000054 | Google Search Appliance vulnerable to cross-site scripting | 2011-07-15T16:27+09:00 | 2011-07-15T16:27+09:00 |
| jvndb-2011-000052 | Internet Explorer vulnerable to cross-site scripting | 2011-07-08T18:29+09:00 | 2011-07-08T18:29+09:00 |
| jvndb-2011-000050 | XnView may insecurely load executable files | 2011-07-05T16:56+09:00 | 2011-07-05T16:56+09:00 |
| jvndb-2011-000049 | Opera vulnerable to denial-of-service (DoS) | 2011-07-05T16:54+09:00 | 2011-07-05T16:54+09:00 |
| jvndb-2011-000048 | ALZip vulnerable to buffer overflow | 2011-06-29T18:20+09:00 | 2011-06-29T18:20+09:00 |
| jvndb-2010-002807 | Accela BizSearch Standard Search Page Cross-Site Scripting Vulnerability | 2011-06-29T17:57+09:00 | 2011-06-29T17:57+09:00 |
| jvndb-2010-002809 | Accela BizSearch Standard Search Page Cross-Site Scripting Vulnerability | 2011-06-29T17:55+09:00 | 2011-06-29T17:55+09:00 |
| jvndb-2010-002808 | Accela BizSearch Standard Search Page Cross-Site Scripting Vulnerability | 2011-06-29T17:55+09:00 | 2011-06-29T17:55+09:00 |
| jvndb-2011-000047 | Cybozu Office vulnerable to cross-site scripting | 2011-06-24T19:23+09:00 | 2011-06-24T19:23+09:00 |
| jvndb-2011-000046 | Multiple Cybozu products vulnerable to cross-site scripting | 2011-06-24T19:21+09:00 | 2011-06-24T19:21+09:00 |
| jvndb-2011-000045 | Multiple Cybozu products vulnerable to cross-site scripting | 2011-06-24T19:18+09:00 | 2011-06-24T19:18+09:00 |
| jvndb-2011-000044 | Cybozu Garoon vulnerable to cross-site scripting | 2011-06-24T19:15+09:00 | 2011-06-24T19:15+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:01974-1 | Security update for xwayland | 2025-06-17T15:28:39Z | 2025-06-17T15:28:39Z |
| suse-su-2025:01972-1 | Security update for the Linux Kernel | 2025-06-17T11:37:43Z | 2025-06-17T11:37:43Z |
| suse-su-2025:20413-1 | Security update for the Linux Kernel | 2025-06-16T15:33:59Z | 2025-06-16T15:33:59Z |
| suse-su-2025:01968-1 | Security update for wireshark | 2025-06-16T14:56:44Z | 2025-06-16T14:56:44Z |
| suse-su-2025:01967-1 | Security update for the Linux Kernel | 2025-06-16T14:56:02Z | 2025-06-16T14:56:02Z |
| suse-su-2025:01966-1 | Security update for the Linux Kernel | 2025-06-16T14:55:49Z | 2025-06-16T14:55:49Z |
| suse-su-2025:01965-1 | Security update for the Linux Kernel | 2025-06-16T14:54:36Z | 2025-06-16T14:54:36Z |
| suse-su-2025:01964-1 | Security update for the Linux Kernel | 2025-06-16T14:54:13Z | 2025-06-16T14:54:13Z |
| suse-su-2025:20421-1 | Security update for the Linux Kernel | 2025-06-16T13:28:28Z | 2025-06-16T13:28:28Z |
| suse-su-2025:01487-1 | Security update for java-11-openjdk | 2025-06-16T12:01:21Z | 2025-06-16T12:01:21Z |
| suse-su-2025:1487-1 | Security update for java-11-openjdk | 2025-06-16T12:00:37Z | 2025-06-16T12:00:37Z |
| suse-su-2025:01487-2 | Security update for java-11-openjdk | 2025-06-16T12:00:37Z | 2025-06-16T12:00:37Z |
| suse-su-2025:20412-1 | Security update for python-setuptools | 2025-06-16T10:54:29Z | 2025-06-16T10:54:29Z |
| suse-su-2025:01962-1 | Security update for apache2-mod_auth_openidc | 2025-06-16T10:04:07Z | 2025-06-16T10:04:07Z |
| suse-su-2025:01961-1 | Security update for grub2 | 2025-06-16T10:03:22Z | 2025-06-16T10:03:22Z |
| suse-su-2025:20410-1 | Security update for ucode-intel | 2025-06-16T09:53:26Z | 2025-06-16T09:53:26Z |
| suse-su-2025:20424-1 | Security update for ucode-intel | 2025-06-16T09:28:11Z | 2025-06-16T09:28:11Z |
| suse-su-2025:20408-1 | Security update for the Linux Kernel | 2025-06-15T13:06:50Z | 2025-06-15T13:06:50Z |
| suse-su-2025:20419-1 | Security update for the Linux Kernel | 2025-06-15T12:06:46Z | 2025-06-15T12:06:46Z |
| suse-su-2025:01958-1 | Security update for the Linux Kernel (Live Patch 55 for SLE 15 SP3) | 2025-06-13T19:33:39Z | 2025-06-13T19:33:39Z |
| suse-su-2025:01957-1 | Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6) | 2025-06-13T18:33:38Z | 2025-06-13T18:33:38Z |
| suse-su-2025:01956-1 | Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3) | 2025-06-13T16:04:11Z | 2025-06-13T16:04:11Z |
| suse-su-2025:01954-1 | Security update for java-1_8_0-openj9 | 2025-06-13T13:56:03Z | 2025-06-13T13:56:03Z |
| suse-su-2025:01953-1 | Security update for apache2-mod_auth_openidc | 2025-06-13T13:55:31Z | 2025-06-13T13:55:31Z |
| suse-su-2025:01952-1 | Security update for python-Django | 2025-06-13T13:55:02Z | 2025-06-13T13:55:02Z |
| suse-su-2025:01951-1 | Security update for the Linux Kernel | 2025-06-13T13:54:47Z | 2025-06-13T13:54:47Z |
| suse-su-2025:01950-1 | Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | 2025-06-13T12:33:33Z | 2025-06-13T12:33:33Z |
| suse-su-2025:01949-1 | Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) | 2025-06-13T12:03:58Z | 2025-06-13T12:03:58Z |
| suse-su-2025:01948-1 | Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6) | 2025-06-13T12:03:49Z | 2025-06-13T12:03:49Z |
| suse-su-2025:20407-1 | Security update for python-cryptography | 2025-06-13T11:08:48Z | 2025-06-13T11:08:48Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-27750 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27750) | 2025-09-02 | 2025-11-12 |
| cnvd-2025-27749 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27749) | 2025-09-02 | 2025-11-12 |
| cnvd-2025-27748 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27748) | 2025-09-02 | 2025-11-12 |
| cnvd-2025-27747 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27747) | 2025-09-02 | 2025-11-12 |
| cnvd-2025-27746 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27746) | 2025-09-02 | 2025-11-12 |
| cnvd-2025-27745 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27745) | 2025-10-15 | 2025-11-12 |
| cnvd-2025-27744 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27744) | 2025-10-15 | 2025-11-12 |
| cnvd-2025-27743 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27743) | 2025-10-15 | 2025-11-12 |
| cnvd-2025-27742 | QNAP QTS和QuTS hero格式化字符串错误漏洞 | 2025-10-15 | 2025-11-12 |
| cnvd-2025-27741 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27741) | 2025-10-15 | 2025-11-12 |
| cnvd-2025-27740 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27740) | 2025-10-15 | 2025-11-12 |
| cnvd-2025-27739 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27739) | 2025-10-15 | 2025-11-12 |
| cnvd-2025-27738 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27738) | 2025-10-15 | 2025-11-12 |
| cnvd-2025-27737 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27737) | 2025-10-15 | 2025-11-12 |
| cnvd-2025-27711 | WordPress插件Activity Plus Reloaded for BuddyPress跨站脚本漏洞 | 2025-10-31 | 2025-11-12 |
| cnvd-2025-27710 | WordPress插件ACF to REST API信息泄露漏洞 | 2025-10-31 | 2025-11-12 |
| cnvd-2025-27709 | WordPress插件ACF Recent Posts Widget跨站脚本漏洞 | 2025-10-31 | 2025-11-12 |
| cnvd-2025-27708 | IPFire跨站脚本漏洞(CNVD-2025-27708) | 2025-10-31 | 2025-11-12 |
| cnvd-2025-27707 | IPFire跨站脚本漏洞(CNVD-2025-27707) | 2025-10-31 | 2025-11-12 |
| cnvd-2025-27706 | IPFire跨站脚本漏洞(CNVD-2025-27706) | 2025-10-31 | 2025-11-12 |
| cnvd-2025-27704 | IPFire跨站脚本漏洞(CNVD-2025-27704) | 2025-10-31 | 2025-11-12 |
| cnvd-2025-27703 | IPFire跨站脚本漏洞(CNVD-2025-27703) | 2025-10-31 | 2025-11-12 |
| cnvd-2025-27702 | IPFire跨站脚本漏洞(CNVD-2025-27702) | 2025-10-31 | 2025-11-12 |
| cnvd-2025-28528 | Foxit PDF Reader缓冲区溢出漏洞 | 2025-08-25 | 2025-11-11 |
| cnvd-2025-27898 | LinkAce跨站脚本漏洞(CNVD-2025-27898) | 2025-11-10 | 2025-11-11 |
| cnvd-2025-27892 | Foxit Reader 3D页面对象内存错误引用漏洞 | 2024-12-25 | 2025-11-11 |
| cnvd-2025-27736 | Inventory Management System removeProduct.php文件SQL注入漏洞 | 2025-06-30 | 2025-11-11 |
| cnvd-2025-27735 | Inventory Management System editProduct.php文件SQL注入漏洞 | 2025-06-30 | 2025-11-11 |
| cnvd-2025-27734 | Inventory Management System editOrder.php文件SQL注入漏洞 | 2025-06-30 | 2025-11-11 |
| cnvd-2025-27733 | Inventory Management System orders.php文件SQL注入漏洞 | 2025-06-30 | 2025-11-11 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0089 | Vulnérabilité dans Python | 2025-02-03T00:00:00.000000 | 2025-02-03T00:00:00.000000 |
| certfr-2025-avi-0088 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0087 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0086 | Multiples vulnérabilités dans les produits IBM | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0085 | Multiples vulnérabilités dans les produits VMware | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0084 | Vulnérabilité dans Microsoft Edge | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0083 | Vulnérabilité dans Apple GarageBand | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2024-avi-0601 | Multiples vulnérabilités dans les produits Mitel | 2024-07-18T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| CERTFR-2025-AVI-0088 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| CERTFR-2025-AVI-0087 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| CERTFR-2025-AVI-0086 | Multiples vulnérabilités dans les produits IBM | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| CERTFR-2025-AVI-0085 | Multiples vulnérabilités dans les produits VMware | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| CERTFR-2025-AVI-0084 | Vulnérabilité dans Microsoft Edge | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| CERTFR-2025-AVI-0083 | Vulnérabilité dans Apple GarageBand | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| CERTFR-2024-AVI-0601 | Multiples vulnérabilités dans les produits Mitel | 2024-07-18T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0082 | Vulnérabilité dans Sonicwall NetExtender | 2025-01-30T00:00:00.000000 | 2025-01-30T00:00:00.000000 |
| certfr-2025-avi-0081 | Multiples vulnérabilités dans ISC BIND | 2025-01-30T00:00:00.000000 | 2025-01-30T00:00:00.000000 |
| CERTFR-2025-AVI-0082 | Vulnérabilité dans Sonicwall NetExtender | 2025-01-30T00:00:00.000000 | 2025-01-30T00:00:00.000000 |
| CERTFR-2025-AVI-0081 | Multiples vulnérabilités dans ISC BIND | 2025-01-30T00:00:00.000000 | 2025-01-30T00:00:00.000000 |
| certfr-2025-avi-0080 | Vulnérabilité dans les produits Moxa | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| certfr-2025-avi-0079 | Multiples vulnérabilités dans Google Chrome | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| certfr-2025-avi-0078 | Vulnérabilité dans VMware Avi Load Balancer | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| certfr-2025-avi-0077 | Multiples vulnérabilités dans HPE Aruba Networking Fabric Composer | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| CERTFR-2025-AVI-0080 | Vulnérabilité dans les produits Moxa | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| CERTFR-2025-AVI-0079 | Multiples vulnérabilités dans Google Chrome | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| CERTFR-2025-AVI-0078 | Vulnérabilité dans VMware Avi Load Balancer | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| CERTFR-2025-AVI-0077 | Multiples vulnérabilités dans HPE Aruba Networking Fabric Composer | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| certfr-2025-avi-0076 | Vulnérabilité dans NetApp ONTAP | 2025-01-28T00:00:00.000000 | 2025-01-28T00:00:00.000000 |
| certfr-2025-avi-0075 | Multiples vulnérabilités dans les produits Apple | 2025-01-28T00:00:00.000000 | 2025-01-28T00:00:00.000000 |
| certfr-2025-avi-0073 | Multiples vulnérabilités dans Microsoft Edge | 2025-01-27T00:00:00.000000 | 2025-01-28T00:00:00.000000 |