Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-20743 |
4.2 (3.1)
|
In clkdbg, there is a possible escalation of priv… |
MediaTek, Inc. |
MT2718, MT6761, MT6765, MT6768, MT6781, MT6853, MT6877, MT6886, MT6893, MT6897, MT6899, MT6983, MT6989, MT6991, MT8113, MT8163, MT8168, MT8169, MT8183, MT8186, MT8188, MT8195, MT8196, MT8321, MT8365, MT8385, MT8390, MT8391, MT8512, MT8516, MT8519, MT8676, MT8678, MT8695, MT8696, MT8698, MT8755, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788E, MT8791T, MT8792, MT8793, MT8796, MT8797, MT8798, MT8873, MT8883, MT8893 |
2025-11-04T06:19:57.990Z | 2026-02-26T17:47:25.102Z |
| CVE-2025-20742 |
8 (3.1)
|
In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7603, MT7615, MT7622, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:19:56.287Z | 2026-02-26T17:47:25.532Z |
| CVE-2025-20737 |
7.8 (3.1)
|
In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:19:52.883Z | 2026-02-26T17:47:25.862Z |
| CVE-2025-58719 |
4.7 (3.1)
|
Windows Connected Devices Platform Service Elevation o… |
Microsoft |
Windows 10 Version 1607 |
2025-10-14T17:00:25.357Z | 2026-02-26T17:47:24.314Z |
| CVE-2025-58716 |
8.8 (3.1)
|
Windows Speech Runtime Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:24.216Z | 2026-02-26T17:47:24.925Z |
| CVE-2025-20745 |
4.2 (3.1)
|
In apusys, there is a possible memory corruption … |
MediaTek, Inc. |
MT2718, MT6989, MT6991, MT8370, MT8390, MT8395, MT8676, MT8678, MT87920 |
2025-11-04T06:20:03.095Z | 2026-02-26T17:47:24.132Z |
| CVE-2025-20744 |
4.2 (3.1)
|
In pda, there is a possible escalation of privile… |
MediaTek, Inc. |
MT6899, MT6991, MT8793 |
2025-11-04T06:19:59.710Z | 2026-02-26T17:47:24.636Z |
| CVE-2025-58732 |
7 (3.1)
|
Inbox COM Objects (Global Memory) Remote Code Executio… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:27.106Z | 2026-02-26T17:47:23.233Z |
| CVE-2025-58728 |
7.8 (3.1)
|
Windows Bluetooth Service Elevation of Privilege Vulne… |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:00:26.604Z | 2026-02-26T17:47:23.624Z |
| CVE-2025-58722 |
7.8 (3.1)
|
Microsoft DWM Core Library Elevation of Privilege Vuln… |
Microsoft |
Windows 10 Version 1607 |
2025-10-14T17:00:25.939Z | 2026-02-26T17:47:23.967Z |
| CVE-2025-20732 |
4.2 (3.1)
|
In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:08.954Z | 2026-02-26T17:47:23.060Z |
| CVE-2025-20731 |
4.2 (3.1)
|
In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:07.276Z | 2026-02-26T17:47:23.446Z |
| CVE-2025-20729 |
4.2 (3.1)
|
In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:05.491Z | 2026-02-26T17:47:23.785Z |
| CVE-2025-59199 |
7.8 (3.1)
|
Software Protection Platform (SPP) Elevation of Privil… |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:00:30.703Z | 2026-02-26T17:47:22.119Z |
| CVE-2025-59196 |
7 (3.1)
|
Windows Simple Search and Discovery Protocol (SSDP) Se… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:30.108Z | 2026-02-26T17:47:22.454Z |
| CVE-2025-58735 |
7 (3.1)
|
Inbox COM Objects (Global Memory) Remote Code Executio… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:27.693Z | 2026-02-26T17:47:22.866Z |
| CVE-2025-20736 |
6.7 (3.1)
|
In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:12.530Z | 2026-02-26T17:47:22.290Z |
| CVE-2025-20734 |
4.2 (3.1)
|
In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:10.764Z | 2026-02-26T17:47:22.715Z |
| CVE-2025-59206 |
7.4 (3.1)
|
Windows Resilient File System (ReFS) Deduplication Ser… |
Microsoft |
Windows 11 Version 24H2 |
2025-10-14T17:00:33.832Z | 2026-02-26T17:47:21.086Z |
| CVE-2025-59202 |
7 (3.1)
|
Windows Remote Desktop Services Elevation of Privilege… |
Microsoft |
Windows 10 Version 1607 |
2025-10-14T17:00:32.507Z | 2026-02-26T17:47:21.448Z |
| CVE-2025-59201 |
7.8 (3.1)
|
Network Connection Status Indicator (NCSI) Elevation o… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:32.009Z | 2026-02-26T17:47:21.811Z |
| CVE-2025-20746 |
6.7 (3.1)
|
In gnss service, there is a possible out of bound… |
MediaTek, Inc. |
MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, MT8893 |
2025-11-04T06:20:17.860Z | 2026-02-26T17:47:21.269Z |
| CVE-2025-20739 |
6.7 (3.1)
|
In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:16.025Z | 2026-02-26T17:47:21.665Z |
| CVE-2025-20738 |
6.7 (3.1)
|
In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:14.296Z | 2026-02-26T17:47:21.974Z |
| CVE-2025-59228 |
8.8 (3.1)
|
Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2025-10-14T17:00:36.069Z | 2026-02-26T17:47:20.415Z |
| CVE-2025-59207 |
7.8 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:00:34.901Z | 2026-02-26T17:47:20.764Z |
| CVE-2025-20748 |
6.7 (3.1)
|
In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:23.128Z | 2026-02-26T17:47:20.093Z |
| CVE-2025-20747 |
6.7 (3.1)
|
In gnss service, there is a possible out of bound… |
MediaTek, Inc. |
MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, MT8893 |
2025-11-04T06:20:19.607Z | 2026-02-26T17:47:20.939Z |
| CVE-2025-20741 |
6.7 (3.1)
|
In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:21.366Z | 2026-02-26T17:47:20.590Z |
| CVE-2025-59234 |
7.8 (3.1)
|
Microsoft Office Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-10-14T17:00:37.730Z | 2026-02-26T17:47:19.101Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2020-16862 |
7.1 (3.1)
|
Microsoft Dynamics 365 (on-premises) Remote Code Execu… |
Microsoft |
Microsoft Dynamics 365 (on-premises) version 9.0 |
2020-09-11T17:08:44.000Z | 2024-11-18T17:43:58.914Z |
| CVE-2020-16861 |
5.4 (3.1)
|
Microsoft Dynamics 365 (On-Premise) Cross Site Scripti… |
Microsoft |
Microsoft Dynamics 365 (on-premises) version 8.2 |
2020-09-11T17:08:43.000Z | 2024-08-04T13:45:34.607Z |
| CVE-2020-16860 |
6.8 (3.1)
|
Microsoft Dynamics 365 (on-premises) Remote Code Execu… |
Microsoft |
Microsoft Dynamics 365 (on-premises) version 9.0 |
2020-09-11T17:08:43.000Z | 2024-08-04T13:45:34.333Z |
| CVE-2020-16859 |
5.4 (3.1)
|
Microsoft Dynamics 365 (On-Premise) Cross Site Scripti… |
Microsoft |
Microsoft Dynamics 365 (on-premises) version 9.0 |
2020-09-11T17:08:42.000Z | 2024-08-04T13:45:34.010Z |
| CVE-2020-16858 |
5.4 (3.1)
|
Microsoft Dynamics 365 (On-Premise) Cross Site Scripti… |
Microsoft |
Microsoft Dynamics 365 (on-premises) version 9.0 |
2020-09-11T17:08:42.000Z | 2024-08-04T13:45:34.617Z |
| CVE-2020-16857 |
7.1 (3.1)
|
Microsoft Dynamics 365 for Finance and Operations (on-… |
Microsoft |
Dynamics 365 for Finance and Operations |
2020-09-11T17:08:41.000Z | 2024-08-04T13:45:33.226Z |
| CVE-2020-16856 |
7.8 (3.1)
|
Visual Studio Remote Code Execution Vulnerability |
Microsoft |
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) |
2020-09-11T17:08:40.000Z | 2024-08-04T13:45:34.276Z |
| CVE-2020-16855 |
5.5 (3.1)
|
Microsoft Office Information Disclosure Vulnerability |
Microsoft |
Microsoft Office 2019 for Mac |
2020-09-11T17:08:38.000Z | 2024-08-04T13:45:33.993Z |
| CVE-2020-16854 |
5.5 (3.1)
|
Windows Kernel Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:36.000Z | 2024-08-04T13:45:34.406Z |
| CVE-2020-16853 |
7.1 (3.1)
|
OneDrive for Windows Elevation of Privilege Vulnerability |
Microsoft |
OneDrive for Windows |
2020-09-11T17:08:36.000Z | 2024-08-04T13:45:34.497Z |
| CVE-2020-16852 |
7.1 (3.1)
|
OneDrive for Windows Elevation of Privilege Vulnerability |
Microsoft |
OneDrive for Windows |
2020-09-11T17:08:35.000Z | 2024-08-04T13:45:33.189Z |
| CVE-2020-16851 |
7.1 (3.1)
|
OneDrive for Windows Elevation of Privilege Vulnerability |
Microsoft |
OneDrive for Windows |
2020-09-11T17:08:35.000Z | 2024-08-04T13:45:33.215Z |
| CVE-2020-16228 |
N/A
|
Philips Patient Monitoring Devices Improper Check for … |
Philips |
Patient Information Center iX (PICiX) |
2020-09-11T12:58:13.000Z | 2024-08-04T13:37:54.179Z |
| CVE-2020-16224 |
N/A
|
Philips Patient Monitoring Devices Improper Handling o… |
Philips |
Patient Information Center iX (PICiX) |
2020-09-11T13:05:19.000Z | 2024-08-04T13:37:53.948Z |
| CVE-2020-16222 |
N/A
|
Philips Patient Monitoring Devices Improper Authentication |
Philips |
Patient Information Center iX (PICiX) |
2020-09-11T12:55:23.000Z | 2024-08-04T13:37:54.092Z |
| CVE-2020-16220 |
N/A
|
Philips Patient Monitoring Devices Improper Validation… |
Philips |
Patient Information Center iX (PICiX) |
2020-09-11T13:11:22.000Z | 2024-08-04T13:37:53.493Z |
| CVE-2020-16218 |
N/A
|
Philips Patient Monitoring Devices Cross-site Scripting |
Philips |
Patient Information Center iX (PICiX) |
2020-09-11T12:50:08.000Z | 2024-08-04T13:37:54.157Z |
| CVE-2020-16216 |
N/A
|
Philips Patient Monitoring Devices Improper Input Validation |
Philips |
IntelliVue patient monitors |
2020-09-11T13:06:55.000Z | 2024-08-04T13:37:54.166Z |
| CVE-2020-16214 |
N/A
|
Philips Patient Monitoring Devices Improper Neutraliza… |
Philips |
Patient Information Center iX (PICiX) |
2020-09-11T12:53:15.000Z | 2024-08-04T13:37:53.937Z |
| CVE-2026-22778 |
9.8 (3.1)
|
vLLM leaks a heap address when PIL throws an error |
vllm-project |
vllm |
2026-02-02T21:09:53.265Z | 2026-02-03T15:42:57.155Z |
| CVE-2026-24762 |
6.9 (4.0)
|
RustFS Logs Sensitive Credentials in Plaintext |
rustfs |
rustfs |
2026-02-03T16:06:17.699Z | 2026-02-03T17:11:10.897Z |
| CVE-2020-14498 |
9.6 (3.1)
|
HMS Industrial Networks AB eCatcher Stack-based Buffer… |
HMS Industrial Networks AB |
eCatcher |
2020-08-26T13:30:01.000Z | 2024-08-04T12:46:34.660Z |
| CVE-2026-24776 |
4.3 (3.1)
|
OpenProject has an IDOR on MeetingAgendaItems allows c… |
opf |
openproject |
2026-02-06T17:56:11.712Z | 2026-02-06T18:37:12.569Z |
| CVE-2026-27190 |
8.1 (3.1)
|
Deno has a Command Injection via Incomplete shell meta… |
denoland |
deno |
2026-02-20T20:52:11.468Z | 2026-02-24T18:30:43.652Z |
| CVE-2026-27120 |
6.1 (3.1)
|
Leaf-kit html escaping does not work on characters tha… |
vapor |
leaf-kit |
2026-02-20T21:27:09.642Z | 2026-02-24T18:41:10.070Z |
| CVE-2026-27118 |
5.3 (4.0)
|
Cache poisoning in @sveltejs/adapter-vercel |
sveltejs |
kit |
2026-02-20T21:24:55.577Z | 2026-02-24T18:42:11.028Z |
| CVE-2026-27113 |
6.3 (3.1)
|
Liquid Prompt arbitrary command injection via crafted … |
liquidprompt |
liquidprompt |
2026-02-20T21:34:22.107Z | 2026-02-23T19:39:02.895Z |
| CVE-2026-27022 |
6.5 (3.1)
|
RediSearch Query Injection in @langchain/langgraph-che… |
langchain-ai |
langgraphjs |
2026-02-20T21:06:53.773Z | 2026-02-24T18:33:25.127Z |
| CVE-2026-27020 |
5.3 (4.0)
|
Photobooth has a XSS vulnerability in user input |
lukas12000 |
photobooth |
2026-02-20T21:03:42.431Z | 2026-02-24T18:31:33.136Z |
| CVE-2026-25896 |
9.3 (3.1)
|
fast-xml-parser has an entity encoding bypass via rege… |
NaturalIntelligence |
fast-xml-parser |
2026-02-20T20:57:48.074Z | 2026-02-23T19:29:10.187Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2020-16861 | <p>A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not p… | 2020-09-11T17:15:17.153 | 2026-02-23T18:21:12.783 |
| fkie_cve-2020-16860 | <p>A remote code execution vulnerability exists in Microsoft Dynamics 365 (on-premises) when the se… | 2020-09-11T17:15:17.090 | 2026-02-23T18:21:12.640 |
| fkie_cve-2020-16859 | <p>A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not p… | 2020-09-11T17:15:17.043 | 2026-02-23T18:21:12.500 |
| fkie_cve-2020-16858 | <p>A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not p… | 2020-09-11T17:15:16.950 | 2026-02-23T18:21:12.357 |
| fkie_cve-2020-16857 | <p>A remote code execution vulnerability exists in Microsoft Dynamics 365 for Finance and Operation… | 2020-09-11T17:15:16.903 | 2026-02-23T18:21:12.207 |
| fkie_cve-2020-16856 | <p>A remote code execution vulnerability exists in Visual Studio when it improperly handles objects… | 2020-09-11T17:15:16.857 | 2026-02-23T18:21:12.033 |
| fkie_cve-2020-16855 | <p>An information disclosure vulnerability exists when Microsoft Office software reads out of bound… | 2020-09-11T17:15:16.793 | 2026-02-23T18:21:11.887 |
| fkie_cve-2020-16854 | <p>An information disclosure vulnerability exists when the Windows kernel improperly handles object… | 2020-09-11T17:15:16.747 | 2026-02-23T18:21:11.383 |
| fkie_cve-2020-16853 | <p>An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application… | 2020-09-11T17:15:16.700 | 2026-02-23T18:21:11.260 |
| fkie_cve-2020-16852 | <p>An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application… | 2020-09-11T17:15:16.653 | 2026-02-23T18:21:11.137 |
| fkie_cve-2020-16851 | <p>An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application… | 2020-09-11T17:15:16.557 | 2026-02-23T18:21:10.997 |
| fkie_cve-2020-16228 | In Patient Information Center iX (PICiX) Versions C.02 and C.03, PerformanceBridge Focal Point Ver… | 2020-09-11T13:15:11.377 | 2026-02-23T18:20:59.040 |
| fkie_cve-2020-16224 | In Patient Information Center iX (PICiX) Versions C.02, C.03, the software parses a formatted mess… | 2020-09-11T14:15:11.567 | 2026-02-23T18:20:58.147 |
| fkie_cve-2020-16222 | In Patient Information Center iX (PICiX) Version B.02, C.02, C.03, and PerformanceBridge Focal Poi… | 2020-09-11T13:15:11.300 | 2026-02-23T18:20:57.950 |
| fkie_cve-2020-16220 | In Patient Information Center iX (PICiX) Versions C.02, C.03, PerformanceBridge Focal Point Versio… | 2020-09-11T14:15:11.503 | 2026-02-23T18:20:57.747 |
| fkie_cve-2020-16218 | In Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, the software does not neutrali… | 2020-09-11T13:15:11.237 | 2026-02-23T18:20:57.540 |
| fkie_cve-2020-16216 | In IntelliVue patient monitors MX100, MX400-550, MX600, MX700, MX750, MX800, MX850, MP2-MP90, and … | 2020-09-11T14:15:11.440 | 2026-02-23T18:20:57.330 |
| fkie_cve-2020-16214 | In Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, the software saves user-provid… | 2020-09-11T13:15:11.160 | 2026-02-23T18:20:57.047 |
| fkie_cve-2026-22778 | vLLM is an inference and serving engine for large language models (LLMs). From 0.8.3 to before 0.14… | 2026-02-02T23:16:06.700 | 2026-02-23T18:19:12.450 |
| fkie_cve-2026-24762 | RustFS is a distributed object storage system built in Rust. From versions alpha.13 to alpha.81, Ru… | 2026-02-03T16:16:14.057 | 2026-02-23T18:18:34.020 |
| fkie_cve-2020-14498 | HMS Industrial Networks AB eCatcher all versions prior to 6.5.5 is vulnerable to a stack-based buff… | 2020-08-26T14:15:10.540 | 2026-02-23T18:18:16.760 |
| fkie_cve-2026-24776 | OpenProject is an open-source, web-based project management software. Prior to 17.0.2, the drag&dro… | 2026-02-06T18:15:58.497 | 2026-02-23T18:14:32.807 |
| fkie_cve-2026-27190 | Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to 2.6.8, a command injection vuln… | 2026-02-20T21:19:28.090 | 2026-02-23T18:14:13.887 |
| fkie_cve-2026-27120 | Leafkit is a templating language with Swift-inspired syntax. Prior to 1.4.1, htmlEscaped in leaf-ki… | 2026-02-20T22:16:29.830 | 2026-02-23T18:14:13.887 |
| fkie_cve-2026-27118 | SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. V… | 2026-02-20T22:16:29.673 | 2026-02-23T18:14:13.887 |
| fkie_cve-2026-27113 | Liquid Prompt is an adaptive prompt for Bash and Zsh. Starting in commit cf3441250bb5d8b45f6f8b389f… | 2026-02-20T22:16:29.503 | 2026-02-23T18:14:13.887 |
| fkie_cve-2026-27022 | @langchain/langgraph-checkpoint-redis is the Redis checkpoint and store implementation for LangGrap… | 2026-02-20T22:16:28.480 | 2026-02-23T18:14:13.887 |
| fkie_cve-2026-27020 | Photobooth prior to 1.0.1 has a cross-site scripting (XSS) vulnerability in user input fields. Mali… | 2026-02-20T21:19:27.940 | 2026-02-23T18:14:13.887 |
| fkie_cve-2026-25896 | fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object w… | 2026-02-20T21:19:27.470 | 2026-02-23T18:14:13.887 |
| fkie_cve-2026-25880 | SumatraPDF is a multi-format reader for Windows. In 3.5.2 and earlier, the PDF reader allows execut… | 2026-02-09T22:16:03.267 | 2026-02-23T18:14:13.717 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-c68v-2764-rf86 |
2.7 (3.1)
5.1 (4.0)
|
A vulnerability was identified in vichan-devel vichan up to 5.1.5. This vulnerability affects unkno… | 2026-02-16T09:30:30Z | 2026-02-16T09:30:30Z |
| ghsa-8mxg-vjpv-vxv2 |
3.5 (3.1)
2.0 (4.0)
|
A security vulnerability has been detected in LigeroSmart up to 6.1.26. The affected element is an … | 2026-02-16T09:30:30Z | 2026-02-16T09:30:30Z |
| ghsa-54wp-f6vm-v42x |
7.3 (3.1)
6.9 (4.0)
|
A security flaw has been discovered in yued-fe LuLu UI up to 3.0.0. This issue affects the function… | 2026-02-16T09:30:30Z | 2026-02-16T09:30:30Z |
| ghsa-4wc5-h6jc-fhhw |
3.5 (3.1)
2.0 (4.0)
|
A weakness has been identified in LigeroSmart up to 6.1.26. Impacted is an unknown function of the … | 2026-02-16T09:30:30Z | 2026-02-16T09:30:30Z |
| ghsa-2425-8942-cjhp |
7.0 (3.1)
7.3 (4.0)
|
A security flaw has been discovered in Flos Freeware Notepad2 4.2.22/4.2.23/4.2.24/4.2.25. Affected… | 2026-02-16T09:30:30Z | 2026-02-16T09:30:30Z |
| ghsa-gw5f-7fqh-pvm6 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in opencc JFlow up to 20260129. This affects the function Imp_Done o… | 2026-02-16T06:31:29Z | 2026-02-16T06:31:29Z |
| ghsa-cr6h-978m-qj75 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in Comfast CF-N1 V2 2.6.0.2. The affected element is the function su… | 2026-02-16T06:31:29Z | 2026-02-16T06:31:29Z |
| ghsa-9394-fqhw-qhr3 |
4.7 (3.1)
2.0 (4.0)
|
A vulnerability was identified in Comfast CF-E4 2.6.0.1. This impacts an unknown function of the fi… | 2026-02-16T06:31:29Z | 2026-02-16T06:31:29Z |
| ghsa-86c5-9jxx-m8g7 |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in Wavlink WL-WN579A3 up to 20210219. This affects the function AddM… | 2026-02-16T06:31:29Z | 2026-02-16T06:31:29Z |
| ghsa-7r5x-3969-58xr |
6.3 (3.1)
5.3 (4.0)
|
A vulnerability was detected in lintsinghua DeepAudit up to 3.0.3. This issue affects some unknown … | 2026-02-16T06:31:29Z | 2026-02-16T06:31:29Z |
| ghsa-7364-56q4-9jv8 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in Comfast CF-N1 V2 2.6.0.2. The impacted element is the function sub_44A… | 2026-02-16T06:31:29Z | 2026-02-16T06:31:29Z |
| ghsa-4833-xmjg-923x |
7.3 (3.1)
5.5 (4.0)
|
A flaw has been found in Tosei Self-service Washing Machine 4.02. Impacted is an unknown function o… | 2026-02-16T06:31:29Z | 2026-02-16T06:31:29Z |
| ghsa-xqpr-gx4w-53xf |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability has been found in Free5GC up to 4.1.0. This affects an unknown function of the comp… | 2026-02-16T03:30:17Z | 2026-02-16T03:30:17Z |
| ghsa-xjrj-8prq-9366 |
6.3 (3.1)
5.3 (4.0)
|
A security flaw has been discovered in Wavlink WL-WN579A3 up to 20210219. Affected by this issue is… | 2026-02-16T03:30:17Z | 2026-02-16T03:30:17Z |
| ghsa-wrqv-g27w-82rr |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in Wavlink WL-WN579A3 up to 20210219. Affected is an unknown functio… | 2026-02-16T03:30:17Z | 2026-02-16T03:30:17Z |
| ghsa-mvfh-9xv2-5xj7 |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function smf_gn_ha… | 2026-02-16T03:30:17Z | 2026-02-16T03:30:17Z |
| ghsa-9hwv-m488-9fjx |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in Wavlink WL-WN579A3 up to 20210219. Affected by this vulnerability… | 2026-02-16T03:30:17Z | 2026-02-16T03:30:17Z |
| ghsa-6995-8cjx-mq6q |
5.3 (3.1)
5.5 (4.0)
|
A flaw has been found in Open5GS 2.7.6. The impacted element is the function mme_s11_handle_create_… | 2026-02-16T03:30:17Z | 2026-02-16T03:30:17Z |
| ghsa-43wm-f3cq-hfrw |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in Wavlink WL-WN579A3 up to 20210219. This impacts the function multi_ssi… | 2026-02-16T03:30:17Z | 2026-02-16T03:30:17Z |
| ghsa-7vmq-r9p9-95jc |
5.3 (3.1)
5.5 (4.0)
|
A security vulnerability has been detected in Open5GS up to 2.7.6. Impacted is an unknown function … | 2026-02-16T00:31:41Z | 2026-02-16T00:31:41Z |
| ghsa-3pqw-6hf5-8r97 |
5.3 (3.1)
5.5 (4.0)
|
A weakness has been identified in Open5GS up to 2.7.6. This issue affects the function sgwc_s5c_han… | 2026-02-16T00:31:41Z | 2026-02-16T00:31:41Z |
| ghsa-wx79-r7m5-q3gg |
9.8 (3.1)
9.3 (4.0)
|
eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insuffi… | 2026-02-15T18:30:24Z | 2026-02-15T18:30:24Z |
| ghsa-f778-29c3-g295 |
8.8 (3.1)
8.7 (4.0)
|
eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the resetU… | 2026-02-15T18:30:23Z | 2026-02-15T18:30:23Z |
| ghsa-5cwq-67p7-h8hr |
9.8 (3.1)
9.3 (4.0)
|
eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that… | 2026-02-15T18:30:23Z | 2026-02-15T18:30:23Z |
| ghsa-43f8-f3f2-rc3j |
6.5 (3.1)
7.1 (4.0)
|
eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the delete… | 2026-02-15T18:30:23Z | 2026-02-15T18:30:23Z |
| ghsa-xq5r-rwpv-6jwc |
6.4 (3.1)
5.1 (4.0)
|
OPNsense 19.1 contains a stored cross-site scripting vulnerability that allows authenticated attack… | 2026-02-15T15:31:31Z | 2026-02-15T15:31:31Z |
| ghsa-rpcc-624p-hfv6 |
5.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in Open5GS up to 2.7.6. This vulnerability affects the function… | 2026-02-15T15:31:31Z | 2026-02-15T15:31:31Z |
| ghsa-r996-q9x2-5wwf |
7.0 (3.1)
6.4 (4.0)
|
A vulnerability was identified in Unidocs ezPDF DRM Reader and ezPDF Reader 2.0/3.0.0.4 on 32-bit. … | 2026-02-15T15:31:31Z | 2026-02-15T15:31:31Z |
| ghsa-prpr-jj7j-2v2f |
6.1 (3.1)
5.1 (4.0)
|
OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows attackers to inje… | 2026-02-15T15:31:31Z | 2026-02-15T15:31:31Z |
| ghsa-mh66-gfv9-x2xc |
6.4 (3.1)
5.1 (4.0)
|
OPNsense 19.1 contains a stored cross-site scripting vulnerability in the system_advanced_sysctl.ph… | 2026-02-15T15:31:31Z | 2026-02-15T15:31:31Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2017-45 |
|
Cross-site scripting (XSS) vulnerability in IPython 3.x before 3.2 allows remote attacker… | ipython | 2017-09-21T14:29:00Z | 2021-07-15T02:22:14.767338Z |
| pysec-2015-25 |
|
The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allow… | ipython | 2015-09-29T19:59:00Z | 2021-07-15T02:22:14.948088Z |
| pysec-2015-24 |
|
Cross-site scripting (XSS) vulnerability in the file browser in notebook/notebookapp.py i… | ipython | 2015-09-21T19:59:00Z | 2021-07-15T02:22:14.906376Z |
| pysec-2017-44 |
|
In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled i… | django | 2017-09-07T13:29:00Z | 2021-07-15T02:22:10.638315Z |
| pysec-2016-18 |
|
Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when se… | django | 2016-12-09T20:59:00Z | 2021-07-15T02:22:10.532243Z |
| pysec-2016-17 |
|
Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded… | django | 2016-12-09T20:59:00Z | 2021-07-15T02:22:10.369344Z |
| pysec-2016-16 |
|
The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1… | django | 2016-04-08T15:59:00Z | 2021-07-15T02:22:10.225115Z |
| pysec-2016-15 |
|
The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows… | django | 2016-04-08T15:59:00Z | 2021-07-15T02:22:10.137209Z |
| pysec-2016-14 |
|
Django 1.9.x before 1.9.2, when ModelAdmin.save_as is set to True, allows remote authenti… | django | 2016-02-08T19:59:00Z | 2021-07-15T02:22:10.055528Z |
| pysec-2015-23 |
|
The (1) contrib.sessions.backends.base.SessionBase.flush and (2) cache_db.SessionStore.fl… | django | 2015-08-24T14:59:00Z | 2021-07-15T02:22:10.010649Z |
| pysec-2015-22 |
|
contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before … | django | 2015-08-24T14:59:00Z | 2021-07-15T02:22:09.927134Z |
| pysec-2015-21 |
|
validators.URLValidator in Django 1.8.x before 1.8.3 allows remote attackers to cause a d… | django | 2015-07-14T17:59:00Z | 2021-07-15T02:22:09.798596Z |
| pysec-2015-19 |
|
The session.flush function in the cached_db backend in Django 1.8.x before 1.8.2 does not… | django | 2015-06-02T14:59:00Z | 2021-07-15T02:22:09.577532Z |
| pysec-2013-21 |
|
The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.… | django | 2013-10-04T17:55:00Z | 2021-07-15T02:22:09.088856Z |
| pysec-2013-20 |
|
Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1… | django | 2013-09-16T19:14:00Z | 2021-07-15T02:22:08.994909Z |
| pysec-2013-19 |
|
Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/adm… | django | 2013-10-04T17:55:00Z | 2021-07-15T02:22:08.907870Z |
| pysec-2013-18 |
|
The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x be… | django | 2013-09-23T20:55:00Z | 2021-07-15T02:22:08.840916Z |
| pysec-2013-17 |
|
The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release… | django | 2013-05-02T14:55:00Z | 2021-07-15T02:22:08.748982Z |
| pysec-2013-16 |
|
The administrative interface for Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 b… | django | 2013-05-02T14:55:00Z | 2021-07-15T02:22:08.650123Z |
| pysec-2012-7 |
|
The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x befo… | django | 2012-11-18T23:55:00Z | 2021-07-15T02:22:08.562601Z |
| pysec-2011-9 |
|
The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x bef… | django | 2011-01-10T20:00:00Z | 2021-07-15T02:22:08.187235Z |
| pysec-2011-8 |
|
The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before… | django | 2011-01-10T20:00:00Z | 2021-07-15T02:22:08.091343Z |
| pysec-2011-12 |
|
Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on … | django | 2011-02-14T21:00:00Z | 2021-07-15T02:22:08.473566Z |
| pysec-2011-11 |
|
Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.… | django | 2011-02-14T21:00:00Z | 2021-07-15T02:22:08.384566Z |
| pysec-2011-10 |
|
Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests… | django | 2011-02-14T21:00:00Z | 2021-07-15T02:22:08.278158Z |
| pysec-2010-12 |
|
Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attac… | django | 2010-09-14T19:00:00Z | 2021-07-15T02:22:08.006222Z |
| pysec-2018-52 |
|
A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_w… | cryptography | 2018-07-30T16:29:00Z | 2021-07-15T02:22:07.445715Z |
| pysec-2018-51 |
|
An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values wer… | bleach | 2018-03-07T23:29:00Z | 2021-07-15T02:22:07.141398Z |
| pysec-2009-4 |
|
Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and … | django | 2009-10-13T10:30:00Z | 2021-07-15T02:22:07.960103Z |
| pysec-2009-3 |
|
The Admin media handler in core/servers/basehttp.py in Django 1.0 and 0.96 does not prope… | django | 2009-08-04T16:30:00Z | 2021-07-15T02:22:07.875702Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-3528 | A vulnerability was found in Campcodes Complete Online Student Management System 1.0 and … | 2024-04-11T05:03:27.323652Z |
| gsd-2024-3527 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.121652Z |
| gsd-2024-3526 | A vulnerability has been found in Campcodes Online Event Management System 1.0 and classi… | 2024-04-11T05:03:27.280106Z |
| gsd-2024-3525 | A vulnerability, which was classified as problematic, was found in Campcodes Online Event… | 2024-04-11T05:03:27.419761Z |
| gsd-2024-3524 | A vulnerability, which was classified as problematic, has been found in Campcodes Online … | 2024-04-11T05:03:27.133139Z |
| gsd-2024-3523 | A vulnerability classified as critical was found in Campcodes Online Event Management Sys… | 2024-04-11T05:03:27.336753Z |
| gsd-2024-3522 | A vulnerability classified as critical has been found in Campcodes Online Event Managemen… | 2024-04-11T05:03:27.036590Z |
| gsd-2024-3521 | A vulnerability was found in Byzoro Smart S80 Management Platform up to 20240317. It has … | 2024-04-11T05:03:27.061995Z |
| gsd-2024-3520 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.088874Z |
| gsd-2024-3519 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.321424Z |
| gsd-2024-3518 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.239432Z |
| gsd-2024-3517 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.240663Z |
| gsd-2024-3516 | Heap buffer overflow in ANGLE in Google Chrome prior to 123.0.6312.122 allowed a remote a… | 2024-04-11T05:03:27.300112Z |
| gsd-2024-3515 | Use after free in Dawn in Google Chrome prior to 123.0.6312.122 allowed a remote attacker… | 2024-04-11T05:03:27.175261Z |
| gsd-2024-3514 | ** REJECT ** **DUPLICATE** Please use CVE-2024-1846 instead. | 2024-04-11T05:03:27.174480Z |
| gsd-2024-3513 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.197785Z |
| gsd-2024-3512 | ** REJECT ** **DUPLICATE*** Please use CVE-2024-2583 instead. | 2024-04-11T05:03:27.315790Z |
| gsd-2024-3511 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.292073Z |
| gsd-2024-3510 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.296018Z |
| gsd-2024-3509 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.080625Z |
| gsd-2024-3508 | A flaw was found in Bombastic, which allows authenticated users to upload compressed (bzi… | 2024-04-11T05:03:27.063567Z |
| gsd-2024-3507 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.046374Z |
| gsd-2024-3506 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.128291Z |
| gsd-2024-3505 | JFrog Artifactory Self-Hosted versions below 7.77.3, are vulnerable to sensitive informat… | 2024-04-11T05:03:27.282899Z |
| gsd-2024-3504 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.402916Z |
| gsd-2024-3503 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.399660Z |
| gsd-2024-3502 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.116755Z |
| gsd-2024-3501 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.053973Z |
| gsd-2024-3500 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.329192Z |
| gsd-2024-3499 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.366035Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2024-11712 | Malicious code in spider-ai (PyPI) | 2024-10-02T09:16:00Z | 2025-12-31T02:45:16Z |
| MAL-2024-11704 | Malicious code in sendtowev (PyPI) | 2024-09-17T21:01:02Z | 2025-12-31T02:45:16Z |
| MAL-2024-10241 | Malicious code in youreallydontwantthispackage2131 (PyPI) | 2024-10-22T13:55:39Z | 2025-12-31T02:45:16Z |
| MAL-2024-10163 | Malicious code in solana-token (PyPI) | 2024-10-16T14:51:34Z | 2025-12-31T02:45:16Z |
| mal-2025-975 | Malicious code in reqzest (PyPI) | 2024-12-24T18:09:49Z | 2025-12-31T02:45:15Z |
| mal-2025-969 | Malicious code in reqiest (PyPI) | 2024-12-24T18:09:49Z | 2025-12-31T02:45:15Z |
| mal-2025-968 | Malicious code in reqeuts (PyPI) | 2024-12-24T18:09:49Z | 2025-12-31T02:45:15Z |
| mal-2025-966 | Malicious code in reqest (PyPI) | 2024-12-24T18:09:49Z | 2025-12-31T02:45:15Z |
| mal-2025-942 | Malicious code in langer-updater (PyPI) | 2024-12-16T10:40:50Z | 2025-12-31T02:45:15Z |
| mal-2025-935 | Malicious code in hugginglega (PyPI) | 2024-12-29T19:16:24Z | 2025-12-31T02:45:15Z |
| mal-2025-926 | Malicious code in flasl (PyPI) | 2024-12-24T18:09:49Z | 2025-12-31T02:45:15Z |
| mal-2025-923 | Malicious code in fflask (PyPI) | 2024-12-24T18:09:49Z | 2025-12-31T02:45:15Z |
| mal-2025-6973 | Malicious code in flatfox-api-python (PyPI) | 2025-08-18T18:31:35Z | 2025-12-31T02:45:15Z |
| mal-2025-6787 | Malicious code in flatfox-api (PyPI) | 2025-07-30T10:19:17Z | 2025-12-31T02:45:15Z |
| mal-2025-6579 | Malicious code in runway-python (PyPI) | 2025-07-31T19:16:19Z | 2025-12-31T02:45:15Z |
| mal-2025-6575 | Malicious code in rehttps (PyPI) | 2025-07-01T16:05:05Z | 2025-12-31T02:45:15Z |
| mal-2025-6566 | Malicious code in piprce (PyPI) | 2024-07-26T16:53:30Z | 2025-12-31T02:45:15Z |
| mal-2025-6529 | Malicious code in jirawrapped (PyPI) | 2025-07-02T10:07:35Z | 2025-12-31T02:45:15Z |
| mal-2025-6513 | Malicious code in gramapi (PyPI) | 2025-07-11T22:51:02Z | 2025-12-31T02:45:15Z |
| mal-2025-6499 | Malicious code in elbloadmonitor (PyPI) | 2024-07-26T16:53:30Z | 2025-12-31T02:45:15Z |
| mal-2025-6495 | Malicious code in discord-booster (PyPI) | 2025-05-29T22:39:05Z | 2025-12-31T02:45:15Z |
| mal-2025-6486 | Malicious code in crpt1 (PyPI) | 2025-07-13T13:25:08Z | 2025-12-31T02:45:15Z |
| mal-2025-6010 | Malicious code in ruamel-poc (PyPI) | 2025-07-20T08:05:43Z | 2025-12-31T02:45:15Z |
| mal-2025-5130 | Malicious code in rich-figlet (PyPI) | 2025-05-15T21:07:23Z | 2025-12-31T02:45:15Z |
| mal-2025-5102 | Malicious code in coloraiz (PyPI) | 2025-05-16T10:10:16Z | 2025-12-31T02:45:15Z |
| mal-2025-5099 | Malicious code in c8test (PyPI) | 2024-07-26T16:53:30Z | 2025-12-31T02:45:15Z |
| mal-2025-49320 | Malicious code in python-requirements-inspector (PyPI) | 2025-11-02T23:10:55Z | 2025-12-31T02:45:15Z |
| mal-2025-49310 | Malicious code in faker-python (PyPI) | 2025-11-02T23:05:33Z | 2025-12-31T02:45:15Z |
| mal-2025-48896 | Malicious code in regixtest (PyPI) | 2025-10-01T06:38:19Z | 2025-12-31T02:45:15Z |
| mal-2025-48895 | Malicious code in netkit-lite (PyPI) | 2025-09-26T15:42:58Z | 2025-12-31T02:45:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0115 | Oracle Supply Chain: Mehrere Schwachstellen | 2024-01-16T23:00:00.000+00:00 | 2025-02-24T23:00:00.000+00:00 |
| wid-sec-w-2025-0429 | ffmpeg: Schwachstelle ermöglicht Denial of Service, potentiell Codeausführung | 2025-02-23T23:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-0287 | F5 BIG-IP: Mehrere Schwachstellen | 2025-02-05T23:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-0246 | Grafana: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-02-02T23:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2023-2972 | strongSwan: Schwachstelle ermöglicht Codeausführung und DoS | 2023-11-20T23:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2023-2588 | libxml2: Schwachstelle ermöglicht Denial of Service | 2023-10-08T22:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2023-2214 | libxml2: Schwachstelle ermöglicht Denial of Service | 2023-08-29T22:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2023-2038 | PostgreSQL: Mehrere Schwachstellen | 2023-08-10T22:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2023-1203 | PostgreSQL: Mehrere Schwachstellen | 2023-05-11T22:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2023-0370 | Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen | 2023-02-14T23:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2022-2347 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Codeausführung | 2022-12-15T23:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2022-2316 | Apache CXF: Mehrere Schwachstellen | 2022-12-13T23:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2022-2050 | Red Hat JBoss Application Server (JBoss): Mehrere Schwachstellen | 2020-06-11T22:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2022-1912 | Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen | 2020-08-17T22:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2022-1758 | Apache Commons Text: Schwachstelle ermöglicht Codeausführung | 2022-10-17T22:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2022-0352 | Apache log4j: Schwachstelle ermöglicht Codeausführung | 2021-12-14T23:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2022-0351 | Apache log4j: Schwachstelle ermöglicht Codeausführung | 2021-12-09T23:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-0425 | xwiki: Schwachstelle ermöglicht Codeausführung | 2025-02-20T23:00:00.000+00:00 | 2025-02-20T23:00:00.000+00:00 |
| wid-sec-w-2025-0424 | Keycloak: Schwachstelle ermöglicht Cross-Site Scripting | 2025-02-20T23:00:00.000+00:00 | 2025-02-20T23:00:00.000+00:00 |
| wid-sec-w-2025-0423 | Apache Tomcat: Mehrere Schwachstellen | 2017-09-19T22:00:00.000+00:00 | 2025-02-20T23:00:00.000+00:00 |
| wid-sec-w-2025-0422 | Apache Tomcat: Schwachstelle ermöglicht Codeausführung | 2017-10-03T22:00:00.000+00:00 | 2025-02-20T23:00:00.000+00:00 |
| wid-sec-w-2025-0421 | IBM Security Verify Access: Schwachstelle ermöglicht Codeausführung | 2025-02-20T23:00:00.000+00:00 | 2025-02-20T23:00:00.000+00:00 |
| wid-sec-w-2025-0420 | Nagios Enterprises Nagios XI: Mehrere Schwachstellen | 2025-02-20T23:00:00.000+00:00 | 2025-02-20T23:00:00.000+00:00 |
| wid-sec-w-2025-0291 | Microsoft Edge: Mehrere Schwachstellen | 2025-02-06T23:00:00.000+00:00 | 2025-02-20T23:00:00.000+00:00 |
| wid-sec-w-2025-0418 | Microsoft Power Pages: Schwachstelle ermöglicht Privilegieneskalation | 2025-02-19T23:00:00.000+00:00 | 2025-02-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0417 | Cisco IP Phone: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-02-19T23:00:00.000+00:00 | 2025-02-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0415 | Cisco AsyncOS für Secure Email Gateway : Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-02-19T23:00:00.000+00:00 | 2025-02-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0292 | Moxa Switch (EDS, ICS, IKS und SDS): Schwachstelle ermöglicht Denial of Service | 2025-02-06T23:00:00.000+00:00 | 2025-02-19T23:00:00.000+00:00 |
| wid-sec-w-2024-3669 | Adobe Experience Manager: Mehrere Schwachstellen | 2024-12-10T23:00:00.000+00:00 | 2025-02-19T23:00:00.000+00:00 |
| wid-sec-w-2024-3154 | Moxa Router: Mehrere Schwachstellen ermöglichen Dateimanipulation und Codeausführung | 2024-10-13T22:00:00.000+00:00 | 2025-02-19T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2020:3194 | Red Hat Security Advisory: Container-native Virtualization security, bug fix, and enhancement update | 2020-07-28T19:10:01+00:00 | 2026-02-27T11:14:49+00:00 |
| rhsa-2020:2684 | Red Hat Security Advisory: containernetworking-plugins security update | 2020-06-23T14:27:26+00:00 | 2026-02-27T11:14:19+00:00 |
| rhsa-2020:2592 | Red Hat Security Advisory: OpenShift Container Platform 4.2.36 containernetworking-plugins security update | 2020-07-01T16:06:50+00:00 | 2026-02-27T11:14:17+00:00 |
| rhsa-2020:2443 | Red Hat Security Advisory: OpenShift Container Platform 4.3.25 containernetworking-plugins security update | 2020-06-17T19:46:04+00:00 | 2026-02-27T11:14:12+00:00 |
| rhsa-2020:2403 | Red Hat Security Advisory: OpenShift Container Platform 4.4.8 containernetworking-plugins security update | 2020-06-17T20:52:16+00:00 | 2026-02-27T11:14:05+00:00 |
| rhsa-2020:2992 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | 2020-07-27T18:50:56+00:00 | 2026-02-27T11:13:07+00:00 |
| rhsa-2020:3084 | Red Hat Security Advisory: rh-nodejs10-nodejs security update | 2020-07-21T19:32:07+00:00 | 2026-02-27T11:12:58+00:00 |
| rhsa-2020:2895 | Red Hat Security Advisory: rh-nodejs12-nodejs security update | 2020-07-13T10:51:06+00:00 | 2026-02-27T11:12:39+00:00 |
| rhsa-2020:2852 | Red Hat Security Advisory: nodejs:12 security update | 2020-07-07T17:48:05+00:00 | 2026-02-27T11:12:35+00:00 |
| rhsa-2020:2848 | Red Hat Security Advisory: nodejs:10 security update | 2020-07-07T09:27:40+00:00 | 2026-02-27T11:12:34+00:00 |
| rhsa-2020:2847 | Red Hat Security Advisory: nodejs:12 security update | 2020-07-07T09:14:43+00:00 | 2026-02-27T11:12:30+00:00 |
| rhsa-2020:2849 | Red Hat Security Advisory: nodejs:10 security update | 2020-07-07T09:17:33+00:00 | 2026-02-27T11:11:45+00:00 |
| rhsa-2020:3042 | Red Hat Security Advisory: nodejs:10 security update | 2020-07-21T14:34:45+00:00 | 2026-02-27T11:11:43+00:00 |
| rhsa-2020:2306 | Red Hat Security Advisory: OpenShift Container Platform 4.2.34 ose-openshift-apiserver-container security update | 2020-06-03T09:33:36+00:00 | 2026-02-27T11:11:42+00:00 |
| rhsa-2020:1527 | Red Hat Security Advisory: OpenShift Container Platform 4.2.29 openshift security update | 2020-04-22T04:58:58+00:00 | 2026-02-27T11:11:39+00:00 |
| rhsa-2020:1526 | Red Hat Security Advisory: OpenShift Container Platform 4.2.29 openshift-enterprise-hyperkube-container security update | 2020-04-22T05:15:55+00:00 | 2026-02-27T11:11:37+00:00 |
| rhsa-2020:0933 | Red Hat Security Advisory: OpenShift Container Platform 4.3.9 ose-openshift-apiserver-container security update | 2020-04-01T18:50:35+00:00 | 2026-02-27T11:11:34+00:00 |
| rhsa-2020:0101 | Red Hat Security Advisory: go-toolset-1.12-golang security update | 2020-01-14T08:45:49+00:00 | 2026-02-27T11:11:34+00:00 |
| rhsa-2020:0329 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2020-02-04T13:21:59+00:00 | 2026-02-27T11:11:31+00:00 |
| rhsa-2024:5856 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.7 on RHEL 7 security update | 2024-08-26T11:05:47+00:00 | 2026-02-27T11:02:39+00:00 |
| rhsa-2020:3197 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.8.0 Security Update | 2020-07-29T06:21:49+00:00 | 2026-02-27T11:02:33+00:00 |
| rhsa-2020:3196 | Red Hat Security Advisory: Red Hat Decision Manager 7.8.0 Security Update | 2020-07-29T06:06:57+00:00 | 2026-02-27T11:02:30+00:00 |
| rhsa-2020:2565 | Red Hat Security Advisory: EAP Continuous Delivery Technical Preview Release 18 security update | 2020-06-15T16:17:24+00:00 | 2026-02-27T11:02:29+00:00 |
| rhsa-2020:1445 | Red Hat Security Advisory: Red Hat AMQ Broker 7.4.3 release and security update | 2020-04-14T13:04:37+00:00 | 2026-02-27T11:02:26+00:00 |
| rhsa-2020:0983 | Red Hat Security Advisory: Red Hat Fuse 7.6.0 security update | 2020-03-26T15:46:59+00:00 | 2026-02-27T11:02:24+00:00 |
| rhsa-2020:0922 | Red Hat Security Advisory: Red Hat AMQ Broker 7.6 release and security update | 2020-03-23T08:21:33+00:00 | 2026-02-27T11:02:23+00:00 |
| rhsa-2020:0727 | Red Hat Security Advisory: Red Hat Data Grid 7.3.3 security update | 2020-03-05T12:53:27+00:00 | 2026-02-27T11:02:22+00:00 |
| rhsa-2020:0406 | Red Hat Security Advisory: containernetworking-plugins security update | 2020-02-04T19:25:46+00:00 | 2026-02-27T11:02:05+00:00 |
| rhsa-2019:4352 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R14 security and bug fix update | 2019-12-19T17:37:50+00:00 | 2026-02-27T11:02:01+00:00 |
| rhsa-2019:4269 | Red Hat Security Advisory: container-tools:rhel8 security and bug fix update | 2019-12-17T12:56:53+00:00 | 2026-02-27T11:02:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-21-287-02 | Uffizio GPS Tracker | 2021-10-14T00:00:00.000000Z | 2021-10-14T00:00:00.000000Z |
| icsa-21-287-01 | Schneider Electric CNM | 2021-10-14T00:00:00.000000Z | 2021-10-14T00:00:00.000000Z |
| icsa-21-285-03 | Schneider Electric IGSS | 2021-10-12T00:00:00.000000Z | 2021-10-12T00:00:00.000000Z |
| icsa-21-285-02 | Advantech WebAccess | 2021-10-12T00:00:00.000000Z | 2021-10-12T00:00:00.000000Z |
| icsa-21-285-01 | Advantech WebAccess SCADA | 2021-10-12T00:00:00.000000Z | 2021-10-12T00:00:00.000000Z |
| icsa-21-280-07 | FATEK Automation Communication Server | 2021-10-07T00:00:00.000000Z | 2021-10-07T00:00:00.000000Z |
| icsa-21-280-06 | FATEK Automation WinProladder | 2021-10-07T00:00:00.000000Z | 2021-10-07T00:00:00.000000Z |
| icsa-21-280-03 | Johnson Controls exacqVision | 2021-10-07T00:00:00.000000Z | 2021-10-07T00:00:00.000000Z |
| icsa-21-280-02 | Mobile Industrial Robots Vehicles and MiR Fleet Software | 2021-10-07T00:00:00.000000Z | 2021-10-07T00:00:00.000000Z |
| icsa-21-280-01 | Johnson Controls exacqVision Server Bundle | 2021-10-07T00:00:00.000000Z | 2021-10-07T00:00:00.000000Z |
| icsma-18-219-02 | Medtronic MiniMed MMT-500/MMT-503 Remote Controllers (Update A) | 2018-08-07T00:00:00.000000Z | 2021-10-05T00:00:00.000000Z |
| icsa-21-278-04 | Honeywell Experion PKS and ACE Controllers | 2021-10-05T00:00:00.000000Z | 2021-10-05T00:00:00.000000Z |
| icsa-21-278-03 | Moxa MXview Network Management Software | 2021-10-05T00:00:00.000000Z | 2021-10-05T00:00:00.000000Z |
| icsa-21-278-02 | Emerson WirelessHART Gateway | 2021-10-05T00:00:00.000000Z | 2021-10-05T00:00:00.000000Z |
| icsma-21-273-01 | Boston Scientific Zoom Latitude | 2021-09-30T00:00:00.000000Z | 2021-09-30T00:00:00.000000Z |
| icsa-21-266-02 | Trane Tracer | 2021-09-23T00:00:00.000000Z | 2021-09-23T00:00:00.000000Z |
| icsa-21-054-04 | Ovarro TBox (Update A) | 2021-02-23T00:00:00.000000Z | 2021-09-23T00:00:00.000000Z |
| icsa-21-259-02 | Schneider Electric EcoStruxure and SCADAPack | 2021-09-16T00:00:00.000000Z | 2021-09-16T00:00:00.000000Z |
| icsa-21-257-21 | Siemens Industrial Edge | 2021-09-14T00:00:00.000000Z | 2021-09-14T00:00:00.000000Z |
| icsa-21-257-20 | Siemens LOGO! CMR and SIMATIC RTU 3000 | 2021-09-14T00:00:00.000000Z | 2021-09-14T00:00:00.000000Z |
| icsa-21-257-03 | Schneider Electric Struxureware Data Center Expert | 2021-09-14T00:00:00.000000Z | 2021-09-14T00:00:00.000000Z |
| icsa-21-257-02 | Johnson Controls Sensormatic Electronics KT-1 | 2021-09-14T00:00:00.000000Z | 2021-09-14T00:00:00.000000Z |
| icsa-21-257-01 | Digi PortServer TS 16 | 2021-09-14T00:00:00.000000Z | 2021-09-14T00:00:00.000000Z |
| icsa-21-194-13 | Siemens SINAMICS PERFECT HARMONY GH180 (Update A) | 2021-07-13T00:00:00.000000Z | 2021-09-14T00:00:00.000000Z |
| icsa-21-252-03 | Mitsubishi Electric Europe B.V. smartRTU and INEA ME-RTU | 2021-09-09T00:00:00.000000Z | 2021-09-09T00:00:00.000000Z |
| icsa-21-252-02 | Delta Electronics DOPSoft 2 (Update A) | 2021-09-09T00:00:00.000000Z | 2021-09-09T00:00:00.000000Z |
| icsa-21-252-01 | AVEVA PCS Portal | 2021-09-09T00:00:00.000000Z | 2021-09-09T00:00:00.000000Z |
| icsa-21-250-02 | Hitachi ABB Power Grids System Data Manager | 2021-09-07T00:00:00.000000Z | 2021-09-07T00:00:00.000000Z |
| icsa-21-245-03 | Advantech WebAccess | 2021-09-02T00:00:00.000000Z | 2021-09-02T00:00:00.000000Z |
| icsa-21-245-02 | JTEKT TOYOPUC Products | 2021-09-02T00:00:00.000000Z | 2021-09-02T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-dcnm-authbypass-YVJzqgk2 | Cisco Data Center Network Manager Authorization Bypass Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-dcnm-auth-bypass-myefpfcf | Cisco Data Center Network Manager Authorization Bypass Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-dcnm-auth-bypass-MYeFpFcF | Cisco Data Center Network Manager Authorization Bypass Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cvdsd-xss-temmlyur | Cisco Vision Dynamic Signage Director Stored Cross-Site Scripting Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cvdsd-xss-teMmLyUr | Cisco Vision Dynamic Signage Director Stored Cross-Site Scripting Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cvdsd-rbac-y9lm5jw4 | Cisco Vision Dynamic Signage Director Role-Based Access Control Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cvdsd-rbac-y9LM5jw4 | Cisco Vision Dynamic Signage Director Role-Based Access Control Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cvdsd-pathtrv-5tljrrfn | Cisco Vision Dynamic Signage Director Path Traversal Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cvdsd-pathtrv-5tLJRrFn | Cisco Vision Dynamic Signage Director Path Traversal Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cmx-rshell-esc-l6hbwjbg | Cisco Connected Mobile Experiences Restricted Shell Escape Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cmx-rshell-esc-L6hBwjbg | Cisco Connected Mobile Experiences Restricted Shell Escape Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cmx-prvesc-6g37hjal | Cisco Connected Mobile Experiences Privilege Escalation Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cmx-prvesc-6g37hjAL | Cisco Connected Mobile Experiences Privilege Escalation Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cdp-memleak-k5z7m55t | Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Memory Leak Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-cdp-memleak-k5Z7m55t | Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Memory Leak Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-HYP-WSV-yT3j5hSB | Cisco Hyperflex HX-Series Software Weak Storage Vulnerability | 2020-08-19T16:00:00+00:00 | 2020-08-19T16:00:00+00:00 |
| cisco-sa-webex-client-url-fcmpdfvy | Cisco Webex Meetings Desktop App and Webex Meetings Client URL Filtering Arbitrary Program Execution Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-08-11T16:29:52+00:00 |
| cisco-sa-webex-client-url-fcmpdfVY | Cisco Webex Meetings Desktop App and Webex Meetings Client URL Filtering Arbitrary Program Execution Vulnerability | 2020-06-17T16:00:00+00:00 | 2020-08-11T16:29:52+00:00 |
| cisco-sa-cvp-info-dislosure-nzbewj9v | Cisco Unified Customer Voice Portal Information Disclosure Vulnerability | 2020-07-01T16:00:00+00:00 | 2020-08-11T13:54:42+00:00 |
| cisco-sa-cvp-info-dislosure-NZBEwj9V | Cisco Unified Customer Voice Portal Information Disclosure Vulnerability | 2020-07-01T16:00:00+00:00 | 2020-08-11T13:54:42+00:00 |
| cisco-sa-grub2-code-exec-xlepcapy | GRUB2 Arbitrary Code Execution Vulnerability | 2020-08-04T23:00:00+00:00 | 2020-08-10T15:49:28+00:00 |
| cisco-sa-grub2-code-exec-xLePCAPY | GRUB2 Arbitrary Code Execution Vulnerability | 2020-08-04T23:00:00+00:00 | 2020-08-10T15:49:28+00:00 |
| cisco-sa-bgp-erkeqaer | Cisco IOS XR Software Additional Paths Denial of Service Vulnerability | 2020-08-05T16:00:00+00:00 | 2020-08-10T13:37:52+00:00 |
| cisco-sa-bgp-ErKEqAer | Cisco IOS XR Software Additional Paths Denial of Service Vulnerability | 2020-08-05T16:00:00+00:00 | 2020-08-10T13:37:52+00:00 |
| cisco-sa-webex-smtdelete-gjdurogr | Cisco Webex Meetings Scheduled Meeting Template Deletion Vulnerability | 2020-08-05T16:00:00+00:00 | 2020-08-05T16:00:00+00:00 |
| cisco-sa-webex-smtdelete-gJDurOgR | Cisco Webex Meetings Scheduled Meeting Template Deletion Vulnerability | 2020-08-05T16:00:00+00:00 | 2020-08-05T16:00:00+00:00 |
| cisco-sa-webex-smtcreate-ymud5sk | Cisco Webex Meetings Scheduled Meeting Template Creation Vulnerability | 2020-08-05T16:00:00+00:00 | 2020-08-05T16:00:00+00:00 |
| cisco-sa-webex-smtcreate-YmuD5Sk | Cisco Webex Meetings Scheduled Meeting Template Creation Vulnerability | 2020-08-05T16:00:00+00:00 | 2020-08-05T16:00:00+00:00 |
| cisco-sa-webex-mttngs-xss-3vbdxduf | Cisco Webex Meetings Reflected Cross-Site Scripting Vulnerability | 2020-08-05T16:00:00+00:00 | 2020-08-05T16:00:00+00:00 |
| cisco-sa-webex-mttngs-xss-3VbdxDuF | Cisco Webex Meetings Reflected Cross-Site Scripting Vulnerability | 2020-08-05T16:00:00+00:00 | 2020-08-05T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2023-6337 | Vault May be Vulnerable to a Denial of Service Through Memory Exhaustion When Handling Large HTTP Requests | 2023-12-01T08:00:00.000Z | 2026-02-18T02:46:33.000Z |
| msrc_cve-2024-38595 | net/mlx5: Fix peer devlink set for SF representor devlink port | 2024-06-02T07:00:00.000Z | 2026-02-18T02:46:23.000Z |
| msrc_cve-2024-6874 | macidn punycode buffer overread | 2024-07-01T07:00:00.000Z | 2026-02-18T02:46:17.000Z |
| msrc_cve-2024-26602 | sched/membarrier: reduce the ability to hammer on sys_membarrier | 2024-02-02T08:00:00.000Z | 2026-02-18T02:46:11.000Z |
| msrc_cve-2025-58160 | Tracing logging user input may result in poisoning logs with ANSI escape sequences | 2025-08-02T00:00:00.000Z | 2026-02-18T02:46:10.000Z |
| msrc_cve-2025-37988 | fix a couple of races in MNT_TREE_BENEATH handling by do_move_mount() | 2025-05-02T00:00:00.000Z | 2026-02-18T02:45:59.000Z |
| msrc_cve-2025-23084 | A vulnerability has been identified in Node.js, specifically affecting the handling of drive names in the Windows environment. Certain Node.js functions do not treat drive names as special on Windows. As a result, although Node.js assumes a relative path, it actually refers to the root directory. On Windows, a path that does not start with the file separator is treated as relative to the current directory. This vulnerability affects Windows users of `path.join` API. | 2025-01-02T00:00:00.000Z | 2026-02-18T02:45:59.000Z |
| msrc_cve-2021-44732 | Mbed TLS before 3.0.1 has a double free in certain out-of-memory conditions, as demonstrated by an mbedtls_ssl_set_session() failure. | 2021-12-02T00:00:00.000Z | 2026-02-18T02:45:56.000Z |
| msrc_cve-2025-38181 | calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). | 2025-07-02T00:00:00.000Z | 2026-02-18T02:45:44.000Z |
| msrc_cve-2023-42363 | A use-after-free vulnerability was discovered in xasprintf function in xfuncs_printf.c:344 in BusyBox v.1.36.1. | 2023-11-01T07:00:00.000Z | 2026-02-18T02:45:44.000Z |
| msrc_cve-2024-3177 | Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin | 2024-04-02T07:00:00.000Z | 2026-02-18T02:45:37.000Z |
| msrc_cve-2025-23163 | net: vlan: don't propagate flags on open | 2025-05-02T00:00:00.000Z | 2026-02-18T02:45:28.000Z |
| msrc_cve-2023-4580 | Push notifications stored on disk in private browsing mode were not being encrypted potentially allowing the leak of sensitive information. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2. | 2023-09-01T00:00:00.000Z | 2026-02-18T02:45:22.000Z |
| msrc_cve-2024-49920 | drm/amd/display: Check null pointers before multiple uses | 2024-10-01T07:00:00.000Z | 2026-02-18T02:45:21.000Z |
| msrc_cve-2020-36425 | An issue was discovered in Arm Mbed TLS before 2.24.0. It incorrectly uses a revocationDate check when deciding whether to honor certificate revocation via a CRL. In some situations, an attacker can exploit this by changing the local clock. | 2021-07-02T00:00:00.000Z | 2026-02-18T02:45:16.000Z |
| msrc_cve-2024-45341 | Usage of IPv6 zone IDs can bypass URI name constraints in crypto/x509 | 2025-01-02T00:00:00.000Z | 2026-02-18T02:45:15.000Z |
| msrc_cve-2025-38182 | ublk: santizize the arguments from userspace when adding a device | 2025-07-02T00:00:00.000Z | 2026-02-18T02:45:12.000Z |
| msrc_cve-2024-41110 | Moby authz zero length regression | 2024-07-01T07:00:00.000Z | 2026-02-18T02:45:10.000Z |
| msrc_cve-2024-58098 | bpf: track changes_pkt_data property for global functions | 2025-05-02T00:00:00.000Z | 2026-02-18T02:44:57.000Z |
| msrc_cve-2022-3650 | A privilege escalation flaw was found in Ceph. Ceph-crash.service allows a local attacker to escalate privileges to root in the form of a crash dump and dump privileged information. | 2023-01-04T00:00:00.000Z | 2026-02-18T02:44:53.000Z |
| msrc_cve-2023-3978 | Improper rendering of text nodes in golang.org/x/net/html | 2023-08-01T00:00:00.000Z | 2026-02-18T02:44:49.000Z |
| msrc_cve-2023-29400 | Improper handling of empty HTML attributes in html/template | 2023-05-01T00:00:00.000Z | 2026-02-18T02:44:34.000Z |
| msrc_cve-2022-30767 | nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196. | 2022-05-02T00:00:00.000Z | 2026-02-18T02:44:32.000Z |
| msrc_cve-2024-40902 | jfs: xattr: fix buffer overflow for invalid xattr | 2024-07-01T07:00:00.000Z | 2026-02-18T02:44:20.000Z |
| msrc_cve-2024-49881 | ext4: update orig_path in ext4_find_extent() | 2024-10-01T07:00:00.000Z | 2026-02-18T02:44:16.000Z |
| msrc_cve-2025-37739 | f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks() | 2025-05-02T00:00:00.000Z | 2026-02-18T02:44:14.000Z |
| msrc_cve-2025-38183 | net: lan743x: fix potential out-of-bounds write in lan743x_ptp_io_event_clock_get() | 2025-07-02T00:00:00.000Z | 2026-02-18T02:44:01.000Z |
| msrc_cve-2023-0664 | A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system. | 2023-03-10T00:00:00.000Z | 2026-02-18T02:43:46.000Z |
| msrc_cve-2025-37805 | sound/virtio: Fix cancel_sync warnings on uninitialized work_structs | 2025-05-02T00:00:00.000Z | 2026-02-18T02:43:41.000Z |
| msrc_cve-2024-49893 | drm/amd/display: Check stream_status before it is used | 2024-10-01T07:00:00.000Z | 2026-02-18T02:43:33.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:13878-1 | jasper-4.2.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13877-1 | glibc-2.39-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13876-1 | qemu-8.2.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13875-1 | java-22-openjdk-22.0.1.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13874-1 | python310-idna-3.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13873-1 | java-21-openjdk-21.0.3.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13872-1 | java-17-openjdk-17.0.11.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13871-1 | java-11-openjdk-11.0.23.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13870-1 | filezilla-3.67.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13869-1 | python310-pydantic-2.6.4-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13868-1 | putty-0.81-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13867-1 | php8-8.3.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13866-1 | perl-CryptX-0.80.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13865-1 | golang-github-v2fly-v2ray-core-5.15.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13864-1 | python310-pikepdf-8.15.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13863-1 | cosign-2.2.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13862-1 | python310-ecdsa-0.19.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13861-1 | python310-djangorestframework-3.15.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13860-1 | frr-8.4-10.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13859-1 | nodejs-electron-28.3.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13858-1 | kernel-devel-6.8.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13857-1 | aws-nitro-enclaves-binaryblobs-upstream-1.2.3~git11.d3d77e0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13856-1 | sngrep-1.8.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13855-1 | nodejs-electron-28.2.10-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13854-1 | python310-yt-dlp-2024.04.09-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13853-1 | xen-4.18.2_02-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13852-1 | corepack21-21.7.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13851-1 | corepack20-20.12.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13850-1 | nodejs-electron-28.2.10-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13849-1 | coredns-1.11.1-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-672 | Stack-buffer-overflow in ot::NetworkData::NetworkData::PrefixMatch | 2020-07-01T00:00:23.867280Z | 2022-04-13T03:04:38.941219Z |
| osv-2020-670 | Memcpy-param-overlap in ot::Cli::CoapSecure::Process | 2020-07-01T00:00:23.712711Z | 2022-04-13T03:04:38.899024Z |
| osv-2020-640 | Stack-buffer-overflow in ot::Message::Write | 2020-07-01T00:00:21.979079Z | 2022-04-13T03:04:38.972205Z |
| osv-2020-639 | UNKNOWN READ in ot::Dhcp6::Dhcp6Client::UpdateAddresses | 2020-07-01T00:00:21.898651Z | 2022-04-13T03:04:38.961925Z |
| osv-2020-612 | Use-of-uninitialized-value in std::__1::vector<std::__1::vector<Sass::SharedImpl<Sass::ComplexSelector>, std:: | 2020-07-01T00:00:20.375619Z | 2022-04-13T03:04:38.465562Z |
| osv-2020-608 | UNKNOWN READ in ot::Ip6::Address::PrefixMatch | 2020-07-01T00:00:20.187182Z | 2022-04-13T03:04:38.998672Z |
| osv-2020-604 | UNKNOWN READ in Sass::Parser::parseCompoundSelector | 2020-07-01T00:00:19.975718Z | 2022-04-13T03:04:38.493199Z |
| osv-2020-596 | UNKNOWN READ in ot::PriorityQueue::GetHead | 2020-07-01T00:00:19.212170Z | 2022-04-13T03:04:38.863026Z |
| osv-2020-57 | Stack-buffer-overflow in ot::NetworkData::PrefixTlv::GetPrefixLength | 2020-06-24T01:51:12.118424Z | 2022-04-13T03:04:38.930668Z |
| osv-2020-531 | Stack-buffer-overflow in ot::MeshCoP::DatasetManager::HandleSet | 2020-07-01T00:00:14.991959Z | 2022-04-13T03:04:38.914540Z |
| osv-2020-514 | UNKNOWN READ in asn1_item_print_ctx | 2020-07-01T00:00:13.902833Z | 2022-04-13T03:04:38.813418Z |
| osv-2020-50 | Bad-cast to pcpp::IDnsResource from invalid vptr | 2020-06-24T01:51:11.832891Z | 2022-04-13T03:04:38.606966Z |
| osv-2020-496 | Stack-buffer-overflow in ot::Mle::Mle::HandleParentResponse | 2020-07-01T00:00:13.016987Z | 2022-04-13T03:04:38.857861Z |
| osv-2020-489 | UNKNOWN READ in ot::Dhcp6::Dhcp6Client::ProcessNextIdentityAssociation | 2020-07-01T00:00:12.614826Z | 2022-04-13T03:04:38.831330Z |
| osv-2020-468 | Stack-buffer-overflow in ot::Ip6::Address::FromString | 2020-07-01T00:00:11.286088Z | 2022-04-13T03:04:38.893804Z |
| osv-2020-467 | UNKNOWN READ in ot::MessageQueue::GetTail | 2020-07-01T00:00:11.176081Z | 2022-04-13T03:04:38.847365Z |
| osv-2020-45 | Use-of-uninitialized-value in pcpp::tbp_my_own_strnlen | 2020-06-24T01:51:11.617477Z | 2022-04-13T03:04:38.596300Z |
| osv-2020-442 | Heap-buffer-overflow in CRYPTO_strdup | 2020-07-01T00:00:09.812508Z | 2022-04-13T03:04:38.758794Z |
| osv-2020-430 | Stack-use-after-return in OSSL_PARAM_get_int32 | 2020-07-01T00:00:09.096641Z | 2022-04-13T03:04:38.763723Z |
| osv-2020-407 | Heap-double-free in opt_cleanup | 2020-07-01T00:00:07.757751Z | 2022-04-13T03:04:38.725198Z |
| osv-2020-396 | UNKNOWN READ in ot::TaskletScheduler::PopTasklet | 2020-07-01T00:00:07.092682Z | 2022-04-13T03:04:38.909313Z |
| osv-2020-386 | Heap-buffer-overflow in OPENSSL_strlcpy | 2020-07-01T00:00:06.528477Z | 2022-04-13T03:04:38.742191Z |
| osv-2020-369 | UNKNOWN READ in ot::TimerScheduler::Remove | 2020-07-01T00:00:05.571696Z | 2022-04-13T03:04:38.951596Z |
| osv-2020-354 | UNKNOWN READ in ot::Ip6::NetifUnicastAddress::GetNext | 2020-07-01T00:00:04.807199Z | 2022-04-13T03:04:38.878276Z |
| osv-2020-353 | Stack-buffer-overflow in ot::MeshCoP::Commissioner::GeneratePskc | 2020-07-01T00:00:04.770226Z | 2022-04-13T03:04:38.919894Z |
| osv-2020-348 | Heap-buffer-overflow in std::__1::vector<std::__1::vector<Sass::SharedImpl<Sass::ComplexSelector>, std:: | 2020-07-01T00:00:04.559189Z | 2022-04-13T03:04:38.487815Z |
| osv-2020-343 | Stack-use-after-return in ot::MeshCoP::ChannelMaskEntryBase::GetChannelPage | 2020-07-01T00:00:04.277007Z | 2022-04-13T03:04:38.873261Z |
| osv-2020-336 | Stack-buffer-overflow in ot::NetworkData::PrefixTlv::Init | 2020-07-01T00:00:03.773709Z | 2022-04-13T03:04:38.935999Z |
| osv-2020-3 | UNKNOWN WRITE in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2020-06-24T01:51:08.837392Z | 2022-04-13T03:04:38.537536Z |
| osv-2020-29 | Heap-use-after-free in CRYPTO_DOWN_REF | 2020-06-24T01:51:10.908381Z | 2022-04-13T03:04:38.773716Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2023-5933 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab | 2024-03-06T10:55:55.788Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5831 | Insertion of Sensitive Information Into Sent Data in GitLab | 2024-03-06T10:56:04.198Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5825 | Loop with Unreachable Exit Condition ('Infinite Loop') in GitLab | 2024-03-06T10:56:16.968Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5612 | Missing Authorization in GitLab | 2024-03-06T10:56:26.779Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5512 | Improper Control of Generation of Code ('Code Injection') in GitLab | 2024-03-06T10:56:37.794Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5356 | Incorrect Authorization in GitLab | 2024-03-06T10:56:46.996Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5332 | Dependency on Vulnerable Third-Party Component in GitLab | 2024-03-06T10:56:56.211Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5226 | Improper Control of Generation of Code ('Code Injection') in GitLab | 2024-03-06T10:57:05.691Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5207 | Execution with Unnecessary Privileges in GitLab | 2024-03-06T10:57:16.768Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5198 | Incorrect Authorization in GitLab | 2024-03-06T10:57:26.166Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5117 | Exposure of Sensitive Information Due to Incompatible Policies in GitLab | 2024-12-27T07:25:54.433Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5106 | Incorrect Authorization in GitLab | 2024-03-06T10:57:36.783Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5061 | Missing Authorization in GitLab | 2024-03-06T10:57:46.379Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5009 | Incorrect Authorization in GitLab | 2024-03-06T10:57:56.479Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4912 | Allocation of Resources Without Limits or Throttling in GitLab | 2024-03-06T10:58:07.108Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4895 | Missing Authorization in GitLab | 2024-03-06T10:58:18.268Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4812 | Incorrect Authorization in GitLab | 2024-03-06T10:58:30.571Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4700 | Missing Authorization in GitLab | 2024-03-06T10:58:41.071Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4658 | Incorrect Authorization in GitLab | 2024-03-06T10:58:54.200Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4647 | Allocation of Resources Without Limits or Throttling in GitLab | 2024-03-06T10:59:04.306Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4630 | Missing Authorization in GitLab | 2024-03-06T10:59:13.676Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4532 | Incorrect Authorization in GitLab | 2024-03-06T10:59:22.331Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4522 | Improper Validation of Specified Type of Input in GitLab | 2024-03-06T10:59:30.475Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4379 | Incorrect Authorization in GitLab | 2024-03-06T10:59:42.189Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4378 | Insertion of Sensitive Information Into Sent Data in GitLab | 2024-03-06T10:59:51.700Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4317 | Incorrect Authorization in GitLab | 2024-03-06T11:00:01.391Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4018 | Direct Request ('Forced Browsing') in GitLab | 2024-03-06T11:00:11.187Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4011 | Allocation of Resources Without Limits or Throttling in GitLab | 2024-03-06T11:00:19.771Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4008 | Incorrect Ownership Assignment in GitLab | 2024-03-06T11:00:30.961Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4002 | Insertion of Sensitive Information Into Sent Data in GitLab | 2024-03-06T11:00:43.311Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202005-0696 | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) … | 2024-03-18T22:14:29.272000Z |
| var-200411-0171 | The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos c… | 2024-03-18T21:58:08.254000Z |
| var-202211-0553 | Missing release of memory after effective lifetime in firmware for Intel(R) SPS before ve… | 2024-03-18T21:52:24.173000Z |
| var-202211-0555 | Improper input validation in firmware for Intel(R) SPS before version SPS_E3_04.01.04.700… | 2024-03-18T21:30:47.175000Z |
| var-200305-0063 | OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends… | 2024-03-18T20:58:00.361000Z |
| var-202309-0577 | A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visua… | 2024-03-18T20:45:19.974000Z |
| var-202208-0642 | Incomplete cleanup in a firmware subsystem for Intel(R) SPS before versions SPS_E3_04.08.… | 2024-03-18T20:38:03.825000Z |
| var-200110-0326 | OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a de… | 2024-03-18T20:17:51.889000Z |
| var-200809-0209 | The Hash-based Message Authentication Code (HMAC) provider in Java on Apple Mac OS X 10.4… | 2024-03-18T19:48:03.569000Z |
| var-201011-0079 | OpenSSL in Apple Mac OS X 10.6.x before 10.6.5 does not properly perform arithmetic, whic… | 2024-03-18T19:31:19.132000Z |
| var-202402-0339 | A post authentication command injection vulnerability exists when configuring the wiregu… | 2024-03-16T23:02:49.001000Z |
| var-202402-0356 | A post authentication command injection vulnerability exists in the GRE policy functional… | 2024-03-16T23:02:29.579000Z |
| var-202403-0458 | Dell Secure Connect Gateway, 5.18, contains an Inadequate Encryption Strength Vulnerabili… | 2024-03-16T23:01:37.192000Z |
| var-202402-0660 | A post authentication command injection vulnerability exists in the ipsec policy function… | 2024-03-16T22:55:06.407000Z |
| var-202403-0160 | Cross-Site Scripting (XSS) vulnerability stored in TP-Link Archer AX50 affecting firmware… | 2024-03-16T22:51:04.657000Z |
| var-202311-0697 | A CWE-601 URL Redirection to Untrusted Site vulnerability exists that could cause an ope… | 2024-03-16T22:40:49.696000Z |
| var-200609-1252 | OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key… | 2024-03-16T20:18:27.377000Z |
| var-202402-0523 | there is a possible out of bounds write due to a missing bounds check. This could lead to… | 2024-03-15T23:07:35.562000Z |
| var-202312-0259 | Affected devices improperly handle specially crafted packets sent to port 102/tcp. This… | 2024-03-14T21:09:08.879000Z |
| var-202403-0393 | A Cross-site scripting (XSS) vulnerability in dlapn.cgi, dldongle.cgi, dlcfg.cgi, fwup.cg… | 2024-03-14T03:14:25.338000Z |
| var-202202-1144 | Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `p… | 2024-03-13T08:26:19.866000Z |
| var-202308-3431 | Phicomm k2 v22.6.529.216 was discovered to contain a command injection vulnerability via … | 2024-03-12T18:17:17.595000Z |
| var-202305-1882 | TOTOLINK A3300R v17.0.0cu.557 is vulnerable to Command Injection via /cgi-bin/cstecgi.cgi… | 2024-03-12T18:15:47.847000Z |
| var-202303-0603 | TOTOlink A7100RU V7.4cu.2313_B20191024 router was discovered to contain a command injecti… | 2024-03-12T17:58:50.032000Z |
| var-202401-2614 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the f… | 2024-03-07T22:58:37.321000Z |
| var-202209-2004 | A vulnerability in the SSH implementation of Cisco IOS Software and Cisco IOS XE Software… | 2024-03-07T22:57:51.363000Z |
| var-202401-2371 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the fu… | 2024-03-07T22:56:50.490000Z |
| var-202402-2610 | RG-UAC Ruijie unified online behavior management and audit system is an online behavior m… | 2024-03-07T22:55:59.356000Z |
| var-202402-2400 | NBR6205-E is a router product. Beijing Xingwang Ruijie Network Technology Co., Ltd. N… | 2024-03-07T22:55:59.453000Z |
| var-202401-2419 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the f… | 2024-03-07T22:55:59.714000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2010-000033 | moobbs vulnerable to cross-site scripting | 2010-08-31T14:16+09:00 | 2010-08-31T14:16+09:00 |
| jvndb-2010-000032 | SEIL/X Series and SEIL/B1 IPv6 Unicast RPF vulnerability | 2010-08-25T13:54+09:00 | 2010-08-25T13:54+09:00 |
| jvndb-2010-000030 | Winny vulnerable to buffer overflow | 2010-08-20T17:18+09:00 | 2010-08-20T17:18+09:00 |
| jvndb-2010-000029 | Winny vulnerable to buffer overflow | 2010-08-20T17:18+09:00 | 2010-08-20T17:18+09:00 |
| jvndb-2010-000028 | Winny node information processing vulnerability | 2010-08-20T17:17+09:00 | 2010-08-20T17:17+09:00 |
| jvndb-2010-000027 | Winny BBS information processing vulnerability | 2010-08-20T17:17+09:00 | 2010-08-20T17:17+09:00 |
| jvndb-2010-000031 | Microsoft Windows denial of service (DoS) vulnerability | 2010-08-13T18:44+09:00 | 2010-08-13T18:44+09:00 |
| jvndb-2010-001762 | Arbitrary Code Execution Vulnerability in JP1/Cm2/Network Node Manager | 2010-08-10T12:14+09:00 | 2010-08-10T12:14+09:00 |
| jvndb-2010-001761 | Denial of Service (DoS) Vulnerability in HiRDB | 2010-08-10T12:13+09:00 | 2010-08-10T12:13+09:00 |
| jvndb-2010-001719 | Internet Navigware Server Information Disclosure Vulnerability | 2010-07-28T18:14+09:00 | 2010-07-28T18:14+09:00 |
| jvndb-2010-001545 | Forced Shutdown or Restart with JP1/ServerConductor/Deployment Manager | 2010-06-29T15:35+09:00 | 2010-06-29T15:35+09:00 |
| jvndb-2010-000026 | Explzh buffer overflow vulnerability | 2010-06-22T16:37+09:00 | 2010-06-22T16:37+09:00 |
| jvndb-2010-001534 | Cross-Site Scripting Vulnerability in Interstage Portalworks and Interstage Interaction Manager Portal Function | 2010-06-22T11:24+09:00 | 2010-06-22T11:24+09:00 |
| jvndb-2010-001520 | Groupmax World Wide Web Desktop Cross-Site Scripting Vulnerability | 2010-06-22T11:23+09:00 | 2010-06-22T11:23+09:00 |
| jvndb-2010-001519 | Improper Authentication Vulnerability in Handling of Revoked Certificate in Hitachi Web Server SSL Client Authentication | 2010-06-22T11:23+09:00 | 2010-06-22T11:23+09:00 |
| jvndb-2010-001518 | TP1/Message Control Denial of Service (DoS) Vulnerability | 2010-06-22T11:23+09:00 | 2010-06-22T11:23+09:00 |
| jvndb-2010-000025 | Multiple vulnerabilities in ActiveGeckoBrowser | 2010-06-17T19:50+09:00 | 2010-06-17T19:50+09:00 |
| jvndb-2010-001495 | Stack-Based Buffer Overflow Vulnerability in Collaboration Common Utility | 2010-06-08T14:03+09:00 | 2010-06-08T14:03+09:00 |
| jvndb-2010-001494 | Arbitrary Code Execution Vulnerability in CA ARCserve Backup and BrightStor ARCserve Backup | 2010-06-08T14:03+09:00 | 2010-06-08T14:03+09:00 |
| jvndb-2010-000023 | e-Pares vulnerable to session fixation | 2010-06-03T11:29+09:00 | 2010-06-03T11:29+09:00 |
| jvndb-2010-000022 | e-Pares vulnerable to cross-site request forgery | 2010-06-03T11:29+09:00 | 2010-06-03T11:29+09:00 |
| jvndb-2010-000021 | e-Pares vulnerable to cross-site scripting | 2010-06-03T11:29+09:00 | 2010-06-03T11:29+09:00 |
| jvndb-2010-000024 | Ichitaro series vulnerable to arbitrary code execution | 2010-06-01T17:37+09:00 | 2010-06-01T17:37+09:00 |
| jvndb-2010-001427 | XMAP3 Arbitrary Code Execution Vulnerability | 2010-05-18T11:34+09:00 | 2010-05-18T11:34+09:00 |
| jvndb-2010-001395 | Several EUR Form/EUR Products Arbitrary Code Execution Vulnerability | 2010-05-18T11:33+09:00 | 2010-05-18T11:33+09:00 |
| jvndb-2010-000020 | CapsSuite Small Edition PatchMeister vulnerable to denial of service | 2010-05-17T16:43+09:00 | 2010-05-17T16:43+09:00 |
| jvndb-2010-000019 | WebSAM DeploymentManager vulnerable to denial of service | 2010-05-17T16:42+09:00 | 2010-05-17T16:42+09:00 |
| jvndb-2010-000018 | Interstage Application Server vulnerable in request processing | 2010-05-17T16:42+09:00 | 2010-05-17T16:42+09:00 |
| jvndb-2010-000017 | Movable Type vulnerable to cross-site scripting | 2010-05-12T15:25+09:00 | 2010-05-12T15:25+09:00 |
| jvndb-2010-000016 | Multiple Cybozu products vulnerable to authentication bypass | 2010-04-21T17:27+09:00 | 2010-04-21T17:27+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:01572-1 | Security update for libraw | 2025-06-06T13:12:42Z | 2025-06-06T13:12:42Z |
| suse-su-2025:01779-2 | Security update for iputils | 2025-06-06T12:20:50Z | 2025-06-06T12:20:50Z |
| suse-su-2025:00764-1 | Security update for gnutls | 2025-06-06T10:05:59Z | 2025-06-06T10:05:59Z |
| suse-su-2025:01508-1 | Security update for openvpn | 2025-06-06T10:05:10Z | 2025-06-06T10:05:10Z |
| suse-su-2025:01638-2 | Security update for openssh | 2025-06-06T10:04:40Z | 2025-06-06T10:04:40Z |
| suse-su-2025:01726-2 | Security update for python-tornado | 2025-06-06T09:51:13Z | 2025-06-06T09:51:13Z |
| suse-su-2025:01571-1 | Security update for gimp | 2025-06-05T14:08:08Z | 2025-06-05T14:08:08Z |
| suse-su-2025:01818-1 | Security update for python-cryptography | 2025-06-05T13:53:11Z | 2025-06-05T13:53:11Z |
| suse-su-2025:01500-1 | Security update for opensaml | 2025-06-05T13:19:08Z | 2025-06-05T13:19:08Z |
| suse-su-2025:20393-1 | Security update for docker | 2025-06-05T08:36:35Z | 2025-06-05T08:36:35Z |
| suse-su-2025:20377-1 | Security update for docker | 2025-06-05T08:25:35Z | 2025-06-05T08:25:35Z |
| suse-su-2025:01525-1 | Security update for java-1_8_0-openjdk | 2025-06-05T07:48:32Z | 2025-06-05T07:48:32Z |
| suse-su-2025:01704-2 | Security update for python-setuptools | 2025-06-05T07:48:13Z | 2025-06-05T07:48:13Z |
| suse-su-2025:01817-1 | Security update for libsoup | 2025-06-05T06:52:42Z | 2025-06-05T06:52:42Z |
| suse-su-2025:01816-1 | Security update for libcryptopp | 2025-06-04T17:03:40Z | 2025-06-04T17:03:40Z |
| suse-su-2025:01815-1 | Security update for apache-commons-beanutils | 2025-06-04T17:01:27Z | 2025-06-04T17:01:27Z |
| suse-su-2025:01814-1 | Security update for MozillaFirefox | 2025-06-04T14:10:21Z | 2025-06-04T14:10:21Z |
| suse-su-2025:01813-1 | Security update for MozillaThunderbird | 2025-06-04T14:09:10Z | 2025-06-04T14:09:10Z |
| suse-su-2025:01766-2 | Security update for postgresql16 | 2025-06-04T13:37:40Z | 2025-06-04T13:37:40Z |
| suse-su-2025:01490-1 | Security update for java-17-openjdk | 2025-06-04T10:12:31Z | 2025-06-04T10:12:31Z |
| suse-su-2025:01812-1 | Security update for libsoup | 2025-06-04T10:12:11Z | 2025-06-04T10:12:11Z |
| suse-su-2025:01811-1 | Security update for gnuplot | 2025-06-04T09:29:55Z | 2025-06-04T09:29:55Z |
| suse-su-2025:01810-1 | Security update for python3-setuptools | 2025-06-04T09:29:13Z | 2025-06-04T09:29:13Z |
| suse-su-2025:01809-1 | Security update for govulncheck-vulndb | 2025-06-04T09:28:01Z | 2025-06-04T09:28:01Z |
| suse-su-2025:01702-2 | Security update for glibc | 2025-06-04T07:33:09Z | 2025-06-04T07:33:09Z |
| suse-su-2025:01807-1 | Security update for 389-ds | 2025-06-03T13:15:20Z | 2025-06-03T13:15:20Z |
| suse-su-2025:01806-1 | Security update for 389-ds | 2025-06-03T13:13:56Z | 2025-06-03T13:13:56Z |
| suse-su-2025:01805-1 | Security update for gnuplot | 2025-06-03T11:57:53Z | 2025-06-03T11:57:53Z |
| suse-su-2025:01586-2 | Security update for rubygem-rack | 2025-06-03T09:17:02Z | 2025-06-03T09:17:02Z |
| suse-su-2025:20374-1 | Security update for python311 | 2025-06-03T09:04:41Z | 2025-06-03T09:04:41Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-27460 | Fortinet FortiOS缓冲区溢出漏洞 | 2025-07-16 | 2025-11-10 |
| cnvd-2025-27459 | Foxit PDF Reader缓冲区溢出漏洞(CNVD-2025-27459) | 2025-08-20 | 2025-11-10 |
| cnvd-2025-27458 | IBM Watson Studio on Cloud Pak for Data跨站脚本漏洞 | 2025-08-31 | 2025-11-10 |
| cnvd-2025-27457 | IBM App Connect Enterprise Certified Container日志信息泄露漏洞 | 2025-09-02 | 2025-11-10 |
| cnvd-2025-27456 | Foxit PDF Reader缓冲区溢出漏洞(CNVD-2025-27456) | 2025-09-04 | 2025-11-10 |
| cnvd-2025-27455 | Foxit PDF Reader代码问题漏洞(CNVD-2025-27455) | 2025-09-04 | 2025-11-10 |
| cnvd-2025-27452 | Fortinet FortiClientMAC资源管理错误漏洞 | 2025-10-17 | 2025-11-10 |
| cnvd-2025-27451 | Fortinet FortiClientMac代码注入漏洞 | 2025-10-17 | 2025-11-10 |
| cnvd-2025-27450 | IBM Standards Processing Engine反序列化漏洞 | 2025-10-21 | 2025-11-10 |
| cnvd-2025-27449 | IBM Planning Analytics Local跨站脚本漏洞 | 2025-10-21 | 2025-11-10 |
| cnvd-2025-27448 | NVIDIA Display Driver代码问题漏洞 | 2025-10-21 | 2025-11-10 |
| cnvd-2025-27447 | IBM QRadar SIEM权限提升漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27446 | IBM QRadar SIEM跨站脚本漏洞(CNVD-2025-27446) | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27445 | IBM OpenPages跨站脚本漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27444 | TOTOLINK A3300R lang参数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27443 | TOTOLINK A3300R enable参数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27442 | Tenda CH22 fromSafeMacFilter函数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27441 | Tenda CH22 fromSafeClientFilter函数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27440 | Tenda CH22 fromP2pListFilter函数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27454 | fortinet FortiVoice操作系统命令注入漏洞 | 2025-10-16 | 2025-11-07 |
| cnvd-2025-27453 | fortinet FortiAnalyzer授权问题漏洞 | 2025-10-16 | 2025-11-07 |
| cnvd-2025-27339 | WordPress Qi Blocks plugin缺失授权漏洞 | 2025-11-05 | 2025-11-07 |
| cnvd-2025-27338 | WordPress Post SMTP plugin未授权访问数据漏洞 | 2025-11-05 | 2025-11-07 |
| cnvd-2025-27337 | WordPress Polylang plugin反序列化漏洞 | 2025-11-05 | 2025-11-07 |
| cnvd-2025-27336 | WordPress OOPSpam Anti-Spam plugin IP头伪造漏洞 | 2025-11-05 | 2025-11-07 |
| cnvd-2025-27335 | WordPress Ohio Extra plugin跨站脚本漏洞 | 2025-11-05 | 2025-11-07 |
| cnvd-2025-27334 | WordPress NS Maintenance Mode for WP plugin跨站脚本漏洞 | 2025-11-05 | 2025-11-07 |
| cnvd-2025-27327 | Foxit PDF Reader缓冲区溢出漏洞(CNVD-2025-27327) | 2025-09-04 | 2025-11-07 |
| cnvd-2025-27320 | Modern Bag login.php文件SQL注入漏洞 | 2025-03-19 | 2025-11-07 |
| cnvd-2025-27319 | Modern Bag slideupdate.php文件SQL注入漏洞 | 2025-07-18 | 2025-11-07 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0009 | Multiples vulnérabilités dans les produits Mozilla | 2025-01-08T00:00:00.000000 | 2025-01-15T00:00:00.000000 |
| certfr-2025-avi-0029 | Multiples vulnérabilités dans les produits Siemens | 2025-01-14T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| certfr-2025-avi-0028 | Multiples vulnérabilités dans Typo3 | 2025-01-14T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| certfr-2025-avi-0027 | Multiples vulnérabilités dans les produits SAP | 2025-01-14T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| certfr-2025-avi-0026 | Vulnérabilité dans Veeam Backup pour Microsoft Azure | 2025-01-14T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| CERTFR-2025-AVI-0029 | Multiples vulnérabilités dans les produits Siemens | 2025-01-14T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| CERTFR-2025-AVI-0028 | Multiples vulnérabilités dans Typo3 | 2025-01-14T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| CERTFR-2025-AVI-0027 | Multiples vulnérabilités dans les produits SAP | 2025-01-14T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| CERTFR-2025-AVI-0026 | Vulnérabilité dans Veeam Backup pour Microsoft Azure | 2025-01-14T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| certfr-2025-avi-0025 | Multiples vulnérabilités dans Mozilla Firefox pour iOS | 2025-01-13T00:00:00.000000 | 2025-01-13T00:00:00.000000 |
| CERTFR-2025-AVI-0025 | Multiples vulnérabilités dans Mozilla Firefox pour iOS | 2025-01-13T00:00:00.000000 | 2025-01-13T00:00:00.000000 |
| certfr-2025-avi-0024 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| certfr-2025-avi-0023 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| certfr-2025-avi-0022 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| certfr-2025-avi-0021 | Multiples vulnérabilités dans les produits IBM | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| certfr-2025-avi-0020 | Vulnérabilité dans Asterisk | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| CERTFR-2025-AVI-0024 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| CERTFR-2025-AVI-0023 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| CERTFR-2025-AVI-0022 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| CERTFR-2025-AVI-0021 | Multiples vulnérabilités dans les produits IBM | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| CERTFR-2025-AVI-0020 | Vulnérabilité dans Asterisk | 2025-01-10T00:00:00.000000 | 2025-01-10T00:00:00.000000 |
| certfr-2025-avi-0018 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-01-09T00:00:00.000000 | 2025-01-09T00:00:00.000000 |
| certfr-2025-avi-0017 | Vulnérabilité dans les produits HPE Aruba Networking | 2025-01-09T00:00:00.000000 | 2025-01-09T00:00:00.000000 |
| certfr-2025-avi-0016 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-01-09T00:00:00.000000 | 2025-01-09T00:00:00.000000 |
| certfr-2025-avi-0015 | Multiples vulnérabilités dans GitLab | 2025-01-09T00:00:00.000000 | 2025-01-09T00:00:00.000000 |
| certfr-2025-avi-0014 | Multiples vulnérabilités dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-01-09T00:00:00.000000 |
| CERTFR-2025-AVI-0018 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-01-09T00:00:00.000000 | 2025-01-09T00:00:00.000000 |
| CERTFR-2025-AVI-0017 | Vulnérabilité dans les produits HPE Aruba Networking | 2025-01-09T00:00:00.000000 | 2025-01-09T00:00:00.000000 |
| CERTFR-2025-AVI-0016 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-01-09T00:00:00.000000 | 2025-01-09T00:00:00.000000 |
| CERTFR-2025-AVI-0015 | Multiples vulnérabilités dans GitLab | 2025-01-09T00:00:00.000000 | 2025-01-09T00:00:00.000000 |