Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-55693 |
7.4 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2025-10-14T17:01:10.928Z | 2026-02-26T17:47:07.571Z |
| CVE-2025-55692 |
7.8 (3.1)
|
Windows Error Reporting Service Elevation of Privilege… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:01:10.200Z | 2026-02-26T17:47:07.930Z |
| CVE-2025-36186 |
7.4 (3.1)
|
IBM Db2 privilege escalation |
IBM |
Db2 |
2025-11-07T18:40:32.478Z | 2026-02-26T17:47:07.406Z |
| CVE-2025-55697 |
7.8 (3.1)
|
Azure Local Elevation of Privilege Vulnerability |
Microsoft |
Windows Server 2022, 23H2 Edition (Server Core installation) |
2025-10-14T17:01:13.464Z | 2026-02-26T17:47:06.360Z |
| CVE-2025-55695 |
5.5 (3.1)
|
Windows WLAN AutoConfig Service Information Disclosure… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:01:12.120Z | 2026-02-26T17:47:06.736Z |
| CVE-2025-37736 |
8.8 (3.1)
|
Elastic Cloud Enterprise Improper Authorization |
Elastic |
Elastic Cloud Enterprise (ECE) |
2025-11-07T22:08:11.891Z | 2026-02-26T17:47:06.540Z |
| CVE-2025-12907 |
8.8 (3.1)
|
Insufficient validation of untrusted input in Dev… |
Google |
Chrome |
2025-11-07T23:23:37.805Z | 2026-02-26T17:47:06.124Z |
| CVE-2025-10230 |
10 (3.1)
|
Samba: command injection in wins server hook script |
|
|
2025-11-07T19:42:06.624Z | 2026-02-26T17:47:06.972Z |
| CVE-2025-64685 |
8.1 (3.1)
|
In JetBrains YouTrack before 2025.3.104432 missin… |
JetBrains |
YouTrack |
2025-11-10T13:27:58.093Z | 2026-02-26T17:47:05.797Z |
| CVE-2025-64456 |
8.4 (3.1)
|
In JetBrains ReSharper before 2025.2.4 missing si… |
JetBrains |
ReSharper |
2025-11-10T13:28:03.624Z | 2026-02-26T17:47:05.432Z |
| CVE-2025-58724 |
7.8 (3.1)
|
Arc Enabled Servers - Azure Connected Machine Agent El… |
Microsoft |
Arc Enabled Servers - Azure Connected Machine Agent |
2025-10-14T17:01:17.311Z | 2026-02-26T17:47:05.149Z |
| CVE-2025-58720 |
7.8 (3.1)
|
Windows Cryptographic Services Information Disclosure … |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:01:16.728Z | 2026-02-26T17:47:05.613Z |
| CVE-2025-58718 |
8.8 (3.1)
|
Remote Desktop Client Remote Code Execution Vulnerability |
Microsoft |
Remote Desktop client for Windows Desktop |
2025-10-14T17:01:16.045Z | 2026-02-26T17:47:05.958Z |
| CVE-2025-64457 |
4.2 (3.1)
|
In JetBrains ReSharper, Rider and dotTrace before… |
JetBrains |
ReSharper, Rider and dotTrace |
2025-11-10T13:28:23.970Z | 2026-02-26T17:47:04.857Z |
| CVE-2025-58726 |
7.5 (3.1)
|
Windows SMB Server Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:01:18.544Z | 2026-02-26T17:47:04.405Z |
| CVE-2025-12480 |
9.1 (3.1)
|
Triofox versions prior to 16.7.10368.56560, are v… |
TrioFox |
TrioFox |
2025-11-10T14:20:40.677Z | 2026-02-26T17:47:04.149Z |
| CVE-2025-58731 |
7 (3.1)
|
Inbox COM Objects (Global Memory) Remote Code Executio… |
Microsoft |
Windows 11 version 22H2 |
2025-10-14T17:01:21.329Z | 2026-02-26T17:47:03.404Z |
| CVE-2025-58730 |
7 (3.1)
|
Inbox COM Objects (Global Memory) Remote Code Executio… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:01:20.803Z | 2026-02-26T17:47:03.904Z |
| CVE-2025-46430 |
7.3 (3.1)
|
Dell Display and Peripheral Manager, versions pri… |
Dell |
Display and Peripheral Manager |
2025-11-10T15:59:35.862Z | 2026-02-26T17:47:03.676Z |
| CVE-2025-43079 |
6.3 (3.1)
|
Local Privilege Escalation via qagent_uninstall.sh Qua… |
Qualys Inc |
Qualys Agent |
2025-11-10T17:10:31.066Z | 2026-02-26T17:47:03.045Z |
| CVE-2025-58733 |
7 (3.1)
|
Inbox COM Objects (Global Memory) Remote Code Executio… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:01:22.002Z | 2026-02-26T17:47:02.652Z |
| CVE-2025-12967 |
8.6 (4.0)
8 (3.1)
|
An issue in AWS Wrappers for Amazon Aurora Postgr… |
AWS |
JDBC Wrapper |
2025-11-10T18:09:10.157Z | 2026-02-26T17:47:02.133Z |
| CVE-2025-58736 |
7 (3.1)
|
Inbox COM Objects (Global Memory) Remote Code Executio… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:01:23.297Z | 2026-02-26T17:47:01.178Z |
| CVE-2025-58734 |
7 (3.1)
|
Inbox COM Objects (Global Memory) Remote Code Executio… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:01:22.652Z | 2026-02-26T17:47:01.808Z |
| CVE-2025-12429 |
8.8 (3.1)
|
Inappropriate implementation in V8 in Google Chro… |
Google |
Chrome |
2025-11-10T20:00:13.470Z | 2026-02-26T17:47:01.025Z |
| CVE-2025-12428 |
8.8 (3.1)
|
Type Confusion in V8 in Google Chrome prior to 14… |
Google |
Chrome |
2025-11-10T20:00:12.016Z | 2026-02-26T17:47:01.496Z |
| CVE-2025-58737 |
7 (3.1)
|
Remote Desktop Protocol Remote Code Execution Vulnerability |
Microsoft |
Windows Server 2012 R2 |
2025-10-14T17:01:23.949Z | 2026-02-26T17:47:00.870Z |
| CVE-2025-12432 |
8.8 (3.1)
|
Race in V8 in Google Chrome prior to 142.0.7444.5… |
Google |
Chrome |
2025-11-10T20:00:15.299Z | 2026-02-26T17:47:00.628Z |
| CVE-2025-59193 |
7 (3.1)
|
Windows Management Services Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:01:29.982Z | 2026-02-26T17:46:59.075Z |
| CVE-2025-59192 |
7.8 (3.1)
|
Storport.sys Driver Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:01:29.346Z | 2026-02-26T17:46:59.579Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2021-36342 |
7.5 (3.1)
|
Dell BIOS contains an improper input validation v… |
Dell |
CPG BIOS |
2022-01-24T20:10:18.115Z | 2024-09-16T18:34:09.570Z |
| CVE-2026-26003 |
6.9 (4.0)
|
FastGPT Plugin forwarding request is not authenticated… |
labring |
FastGPT |
2026-02-10T17:52:38.919Z | 2026-02-10T19:06:11.563Z |
| CVE-2026-25993 |
9.3 (4.0)
|
EverShop has a Second-Order SQL Injection in URL Rewri… |
evershopcommerce |
evershop |
2026-02-10T17:43:38.998Z | 2026-02-10T19:29:56.966Z |
| CVE-2022-2290 |
6.4 (3.0)
|
Cross-site Scripting (XSS) - Reflected in zadam/trilium |
zadam |
zadam/trilium |
2022-07-03T06:05:13.000Z | 2024-08-03T00:32:09.599Z |
| CVE-2026-25992 |
7.5 (3.1)
|
SiYuan has a File Read Interface Case Bypass Vulnerability |
siyuan-note |
siyuan |
2026-02-10T17:47:36.041Z | 2026-02-10T19:17:41.722Z |
| CVE-2026-25947 |
8.8 (3.1)
|
Worklenz Boolean-Based Blind SQL Injection via Imprope… |
Worklenz |
worklenz |
2026-02-10T17:32:56.224Z | 2026-02-10T19:26:19.859Z |
| CVE-2026-25889 |
5.4 (3.1)
|
File Browser has an Authentication Bypass in User Pass… |
filebrowser |
filebrowser |
2026-02-09T21:18:13.054Z | 2026-02-10T15:57:57.441Z |
| CVE-2026-21484 |
5.3 (3.1)
|
AnythingLLM Vulnerable to Username Enumeration w/ Pass… |
Mintplex-Labs |
anything-llm |
2026-01-03T01:21:39.386Z | 2026-01-05T20:36:58.168Z |
| CVE-2025-70152 |
9.8 (3.1)
|
code-projects Community Project Scholars Tracking… |
n/a |
n/a |
2026-02-18T00:00:00.000Z | 2026-02-18T18:06:19.419Z |
| CVE-2025-70151 |
8.8 (3.1)
|
code-projects Scholars Tracking System 1.0 allows… |
n/a |
n/a |
2026-02-18T00:00:00.000Z | 2026-02-18T18:22:07.589Z |
| CVE-2025-13455 |
7.3 (4.0)
7.8 (3.1)
|
A vulnerability was reported in ThinkPlus configu… |
Lenovo |
ThinkPlus FU100 |
2026-01-14T22:18:24.196Z | 2026-01-15T14:49:46.172Z |
| CVE-2026-25791 |
7.5 (3.1)
|
Sliver has a DNS C2 OTP Bypass Allows Unauthenticated … |
BishopFox |
sliver |
2026-02-09T20:34:31.144Z | 2026-02-10T15:59:20.819Z |
| CVE-2026-25757 |
7.7 (4.0)
|
Unauthenticated Spree Commerce users can view complete… |
spree |
spree |
2026-02-06T22:37:07.542Z | 2026-02-09T15:26:28.967Z |
| CVE-2026-25059 |
8.8 (3.1)
|
OpenList affected by Path Traversal in file copy and r… |
OpenListTeam |
OpenList |
2026-02-02T22:24:40.744Z | 2026-02-04T16:53:37.480Z |
| CVE-2026-25060 |
8.1 (3.1)
|
OpenList Insecure TLS Default Configuration |
OpenListTeam |
OpenList |
2026-02-02T22:26:42.421Z | 2026-02-04T16:53:31.990Z |
| CVE-2025-65017 |
8.2 (4.0)
|
Decidim's private data exports can lead to data leaks |
decidim |
decidim |
2026-02-03T15:05:24.738Z | 2026-02-03T17:09:47.635Z |
| CVE-2026-23829 |
5.3 (3.1)
|
Mailpit has SMTP Header Injection via Regex Bypass |
axllent |
mailpit |
2026-01-18T23:23:04.176Z | 2026-01-20T20:08:41.935Z |
| CVE-2026-21518 |
8.8 (3.1)
|
GitHub Copilot and Visual Studio Code Security Feature… |
Microsoft |
Microsoft Visual Studio Code CoPilot Chat Extension |
2026-02-10T17:51:15.121Z | 2026-02-27T20:55:26.967Z |
| CVE-2025-15549 |
4.8 (4.0)
4.8 (3.1)
|
FluentCMS 2026 Stored XSS via SVG Upload in File Management |
FluentCMS |
FluentCMS |
2026-01-29T19:41:36.216Z | 2026-02-23T16:36:40.012Z |
| CVE-2023-51763 |
N/A
|
csv_builder.rb in ActiveAdmin (aka Active Admin) … |
n/a |
n/a |
2023-12-24T00:00:00.000Z | 2026-02-23T16:53:44.016Z |
| CVE-2025-69806 |
7.5 (3.1)
|
p2r3 bareiron commit: 8e4d4020d contains an Out-o… |
n/a |
n/a |
2026-02-12T00:00:00.000Z | 2026-02-18T13:50:42.198Z |
| CVE-2025-69807 |
7.5 (3.1)
|
p2r3 Bareiron commit: 8e4d4020d is vulnerable to … |
n/a |
n/a |
2026-02-12T00:00:00.000Z | 2026-02-12T19:01:33.622Z |
| CVE-2020-0998 |
7.8 (3.1)
|
Windows Graphics Component Elevation of Privilege Vuln… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:34.000Z | 2024-11-18T17:44:29.703Z |
| CVE-2020-0997 |
7.8 (3.1)
|
Windows Camera Codec Pack Remote Code Execution Vulner… |
Microsoft |
Windows 10 Version 1607 |
2020-09-11T17:08:34.000Z | 2024-08-04T06:18:03.627Z |
| CVE-2020-0989 |
5.5 (3.1)
|
Windows Mobile Device Management Diagnostics Informati… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:33.000Z | 2024-08-04T06:18:03.633Z |
| CVE-2020-0951 |
6.7 (3.1)
|
Windows Defender Application Control Security Feature … |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:33.000Z | 2024-08-04T06:18:03.545Z |
| CVE-2020-0941 |
5.5 (3.1)
|
Win32k Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:32.000Z | 2024-08-04T06:18:03.558Z |
| CVE-2020-0928 |
5.5 (3.1)
|
Windows Kernel Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:32.000Z | 2024-08-04T06:18:03.539Z |
| CVE-2020-0922 |
8.8 (3.1)
|
Microsoft COM for Windows Remote Code Execution Vulner… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:31.000Z | 2024-08-04T06:18:03.519Z |
| CVE-2020-0914 |
5.5 (3.1)
|
Windows State Repository Service Information Disclosur… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:30.000Z | 2024-08-04T06:18:03.478Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2021-36342 | Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user… | 2022-01-24T20:15:07.987 | 2026-02-23T18:09:00.677 |
| fkie_cve-2026-26003 | FastGPT is an AI Agent building platform. From 4.14.0 to 4.14.5, attackers can directly access the … | 2026-02-10T18:16:39.107 | 2026-02-23T18:06:14.713 |
| fkie_cve-2026-25993 | EverShop is a TypeScript-first eCommerce platform. During category update and deletion event handli… | 2026-02-10T18:16:38.957 | 2026-02-23T18:03:12.130 |
| fkie_cve-2022-2290 | Cross-site Scripting (XSS) - Reflected in GitHub repository zadam/trilium prior to 0.52.4, 0.53.1-beta. | 2022-07-03T06:15:07.123 | 2026-02-23T18:00:15.210 |
| fkie_cve-2026-25992 | SiYuan is a personal knowledge management system. Prior to 3.5.5, the /api/file/getFile endpoint us… | 2026-02-10T18:16:38.807 | 2026-02-23T17:58:09.347 |
| fkie_cve-2026-25947 | Worklenz is a project management tool. Prior to 2.1.7, there are multiple SQL injection vulnerabili… | 2026-02-10T18:16:38.423 | 2026-02-23T17:57:18.470 |
| fkie_cve-2026-25889 | File Browser provides a file managing interface within a specified directory and it can be used to … | 2026-02-09T22:16:03.723 | 2026-02-23T17:55:17.183 |
| fkie_cve-2026-21484 | AnythingLLM is an application that turns pieces of content into context that any LLM can use as ref… | 2026-01-03T02:15:41.553 | 2026-02-23T17:54:38.833 |
| fkie_cve-2025-70152 | code-projects Community Project Scholars Tracking System 1.0 is vulnerable to SQL Injection in the … | 2026-02-18T18:24:21.530 | 2026-02-23T17:54:31.543 |
| fkie_cve-2025-70151 | code-projects Scholars Tracking System 1.0 allows an authenticated attacker to achieve remote code … | 2026-02-18T18:24:20.757 | 2026-02-23T17:53:20.030 |
| fkie_cve-2025-13455 | A vulnerability was reported in ThinkPlus configuration software that could allow a local authentic… | 2026-01-14T23:15:55.803 | 2026-02-23T17:53:20.473 |
| fkie_cve-2026-25791 | Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to 1.7.0, th… | 2026-02-09T21:15:49.650 | 2026-02-23T17:42:31.743 |
| fkie_cve-2026-25757 | Spree is an open source e-commerce solution built with Ruby on Rails. Prior to versions 5.0.8, 5.1.… | 2026-02-06T23:15:54.527 | 2026-02-23T17:40:58.347 |
| fkie_cve-2026-25059 | OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path tr… | 2026-02-02T23:16:08.753 | 2026-02-23T17:35:20.183 |
| fkie_cve-2026-25060 | OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, certificate verification is disa… | 2026-02-02T23:16:08.913 | 2026-02-23T17:35:00.207 |
| fkie_cve-2025-65017 | Decidim is a participatory democracy framework. In versions from 0.30.0 to before 0.30.4 and from 0… | 2026-02-03T15:16:12.403 | 2026-02-23T17:32:33.507 |
| fkie_cve-2026-23829 | Mailpit is an email testing tool and API for developers. Prior to version 1.28.3, Mailpit's SMTP se… | 2026-01-19T00:15:48.707 | 2026-02-23T17:29:31.440 |
| fkie_cve-2026-21518 | Improper neutralization of special elements used in a command ('command injection') in GitHub Copil… | 2026-02-10T18:16:34.263 | 2026-02-23T17:23:27.390 |
| fkie_cve-2025-15549 | FluentCMS 2026 contains a stored cross-site scripting vulnerability that allows authenticated admin… | 2026-01-29T20:16:07.010 | 2026-02-23T17:23:19.860 |
| fkie_cve-2023-51763 | csv_builder.rb in ActiveAdmin (aka Active Admin) before 3.2.0 allows CSV injection. | 2023-12-24T04:15:07.633 | 2026-02-23T17:23:19.677 |
| fkie_cve-2025-69806 | p2r3 bareiron commit: 8e4d4020d contains an Out-of-bounds Read, which allows unauthenticated remote… | 2026-02-12T18:16:08.657 | 2026-02-23T17:21:48.243 |
| fkie_cve-2025-69807 | p2r3 Bareiron commit: 8e4d4020d is vulnerable to Buffer Overflow, which allows unauthenticated remo… | 2026-02-12T18:16:08.763 | 2026-02-23T17:20:35.473 |
| fkie_cve-2020-0998 | <p>An elevation of privilege vulnerability exists when the Windows Graphics Component improperly ha… | 2020-09-11T17:15:15.213 | 2026-02-23T17:19:10.927 |
| fkie_cve-2020-0997 | <p>A remote code execution vulnerability exists when the Windows Camera Codec Pack improperly handl… | 2020-09-11T17:15:15.153 | 2026-02-23T17:19:10.650 |
| fkie_cve-2020-0989 | <p>An information disclosure vulnerability exists when Windows Mobile Device Management (MDM) Diagn… | 2020-09-11T17:15:15.090 | 2026-02-23T17:19:09.100 |
| fkie_cve-2020-0951 | <p>A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) wh… | 2020-09-11T17:15:15.043 | 2026-02-23T17:19:02.010 |
| fkie_cve-2020-0941 | <p>An information disclosure vulnerability exists when the win32k component improperly provides ker… | 2020-09-11T17:15:14.980 | 2026-02-23T17:19:00.057 |
| fkie_cve-2020-0928 | <p>An information disclosure vulnerability exists when the Windows kernel improperly handles object… | 2020-09-11T17:15:14.933 | 2026-02-23T17:18:58.243 |
| fkie_cve-2020-0922 | <p>A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles o… | 2020-09-11T17:15:14.887 | 2026-02-23T17:18:57.917 |
| fkie_cve-2020-0914 | <p>An information disclosure vulnerability exists when the Windows State Repository Service imprope… | 2020-09-11T17:15:14.777 | 2026-02-23T17:18:56.437 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-q8wj-qfj9-vjfp |
|
In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix UAF in con… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-pw2v-cmfh-x2p3 |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: do not strictly require… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-phfr-35gx-vf86 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/xe/nvm: Fix double-free on… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-mg8f-6pj8-cf5j |
|
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix race between rfk… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-m5mw-gf4c-pwc3 |
|
In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: fix potential… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-h3xv-g92m-m7cv |
|
In the Linux kernel, the following vulnerability has been resolved: drm/imx/tve: fix probe device … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-fg9w-2hrh-3rjq |
|
In the Linux kernel, the following vulnerability has been resolved: net: fix segmentation of forwa… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:15Z |
| ghsa-9vc4-746x-p2rf |
|
In the Linux kernel, the following vulnerability has been resolved: sfc: fix deadlock in RSS confi… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-9j4j-wgpf-5mxc |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: wlcore: ensure skb headr… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-959m-9w2w-7jxc |
|
In the Linux kernel, the following vulnerability has been resolved: dmaengine: mmp_pdma: Fix race … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-7xmm-c998-f7c9 |
|
In the Linux kernel, the following vulnerability has been resolved: flex_proportions: make fprop_n… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-7g88-w646-8r4r |
|
In the Linux kernel, the following vulnerability has been resolved: octeon_ep: Fix memory leak in … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-6rr8-q652-pwgf |
|
In the Linux kernel, the following vulnerability has been resolved: net: cpsw: Execute ndo_set_rx_… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-6hxq-g3f7-5m89 |
|
In the Linux kernel, the following vulnerability has been resolved: smb/server: call ksmbd_session… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-5w3w-6qf9-5hqm |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: ocb: skip rx_n… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-5vr5-28pm-p634 |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: TC, delete flows on… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-5r72-p4cv-h344 |
|
In the Linux kernel, the following vulnerability has been resolved: bonding: fix use-after-free du… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-5p9c-24w4-pq6q |
|
In the Linux kernel, the following vulnerability has been resolved: ice: Fix NULL pointer derefere… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-4rgv-cpg8-f3hr |
|
In the Linux kernel, the following vulnerability has been resolved: mm/shmem, swap: fix race of tr… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-4chx-f5rg-w5pp |
|
In the Linux kernel, the following vulnerability has been resolved: rocker: fix memory leak in roc… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-3x2r-29rp-vh66 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix NULL pointer d… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-398f-64gc-qxqm |
|
In the Linux kernel, the following vulnerability has been resolved: perf: sched: Fix perf crash wi… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-2j2f-9hjh-v2xm |
|
In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: Fix memleak in nfc_… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-2chr-7vph-93pf |
|
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix memory le… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:15Z |
| ghsa-v844-6465-jhqh |
|
In the Linux kernel, the following vulnerability has been resolved: libceph: reset sparse-read sta… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-rwc9-h9mh-xfwq |
|
In the Linux kernel, the following vulnerability has been resolved: of: unittest: Fix memory leak … | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-pjvx-fh86-c22p |
|
In the Linux kernel, the following vulnerability has been resolved: drm/bridge: synopsys: dw-dp: f… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-p59g-r9hh-rmr8 |
|
In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs-scheme: cleanup… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-hqxw-2v34-r7g3 |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly deco… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-hcr8-x92w-q652 |
|
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_uart: fix null-… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2016-7 |
|
Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pi… | pillow | 2016-04-13T16:59:00Z | 2021-07-05T00:01:24.042207Z |
| pysec-2014-11 |
|
pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of pack… | pip | 2014-11-24T15:59:00Z | 2021-07-05T00:01:24.413265Z |
| pysec-2013-9 |
|
pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a … | pip | 2013-08-17T06:54:00Z | 2021-07-05T00:01:24.378636Z |
| pysec-2013-8 |
|
pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perf… | pip | 2013-08-06T02:52:00Z | 2021-07-05T00:01:24.339020Z |
| pysec-2010-9 |
|
ftpserver.py in pyftpdlib before 0.5.2 does not require the l permission for the MLST com… | pyftpdlib | 2010-10-19T20:00:00Z | 2021-07-05T00:01:24.817551Z |
| pysec-2010-8 |
|
Race condition in the FTPHandler class in ftpserver.py in pyftpdlib before 0.5.2 allows r… | pyftpdlib | 2010-10-19T20:00:00Z | 2021-07-05T00:01:24.787287Z |
| pysec-2010-7 |
|
Race condition in the FTPHandler class in ftpserver.py in pyftpdlib before 0.5.1 allows r… | pyftpdlib | 2010-10-19T20:00:00Z | 2021-07-05T00:01:24.754790Z |
| pysec-2010-6 |
|
The ftp_QUIT function in ftpserver.py in pyftpdlib before 0.5.0 allows remote authenticat… | pyftpdlib | 2010-10-19T20:00:00Z | 2021-07-05T00:01:24.722786Z |
| pysec-2010-5 |
|
ftpserver.py in pyftpdlib before 0.5.0 does not delay its response after receiving an inv… | pyftpdlib | 2010-10-19T20:00:00Z | 2021-07-05T00:01:24.685476Z |
| pysec-2010-4 |
|
Multiple directory traversal vulnerabilities in FTPServer.py in pyftpdlib before 0.3.0 al… | pyftpdlib | 2010-10-19T20:00:00Z | 2021-07-05T00:01:24.654243Z |
| pysec-2010-11 |
|
Race condition in the FTPHandler class in ftpserver.py in pyftpdlib before 0.5.2 allows r… | pyftpdlib | 2010-10-19T20:00:00Z | 2021-07-05T00:01:24.878652Z |
| pysec-2010-10 |
|
Memory leak in the on_dtp_close function in ftpserver.py in pyftpdlib before 0.5.2 allows… | pyftpdlib | 2010-10-19T20:00:00Z | 2021-07-05T00:01:24.847543Z |
| pysec-2018-47 |
|
Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin b… | moin | 2018-10-15T19:29:00Z | 2021-07-05T00:01:23.080305Z |
| pysec-2017-22 |
|
An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMi… | owlmixin | 2017-11-08T03:29:00Z | 2021-07-05T00:01:23.384346Z |
| pysec-2017-21 |
|
OpenStack Nova-LXD before 13.1.1 uses the wrong name for the veth pairs when applying Neu… | nova-lxd | 2017-04-12T22:59:00Z | 2021-07-05T00:01:23.183236Z |
| pysec-2017-20 |
|
Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin b… | moin | 2017-01-30T22:59:00Z | 2021-07-05T00:01:23.049637Z |
| pysec-2016-6 |
|
Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow befo… | pillow | 2016-04-13T16:59:00Z | 2021-07-05T00:01:23.974761Z |
| pysec-2016-5 |
|
Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow… | pillow | 2016-04-13T16:59:00Z | 2021-07-05T00:01:23.915090Z |
| pysec-2015-16 |
|
Pillow before 2.7.0 allows remote attackers to cause a denial of service via a compressed… | pillow | 2015-01-16T16:59:00Z | 2021-07-05T00:01:23.853626Z |
| pysec-2015-15 |
|
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a de… | pillow | 2015-05-01T15:59:00Z | 2021-07-05T00:01:23.790243Z |
| pysec-2014-10 |
|
PIL/IcnsImagePlugin.py in Python Imaging Library (PIL) and Pillow before 2.3.2 and 2.5.x … | pillow | 2014-08-25T14:55:00Z | 2021-07-05T00:01:23.718339Z |
| pysec-2013-7 |
|
Multiple directory traversal vulnerabilities in the (1) twikidraw (action/twikidraw.py) a… | moin | 2013-01-03T01:55:00Z | 2021-07-05T00:01:23.010630Z |
| pysec-2019-153 |
|
modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided dat… | modulemd | 2019-01-10T21:29:00Z | 2021-07-05T00:01:22.789825Z |
| pysec-2017-19 |
|
An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_q… | mlalchemy | 2017-11-08T03:29:00Z | 2021-07-05T00:01:22.762966Z |
| pysec-2017-18 |
|
Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune… | mistune | 2017-12-29T15:29:00Z | 2021-07-05T00:01:22.732782Z |
| pysec-2017-17 |
|
Multiple cross-site scripting (XSS) vulnerabilities in the administration pages in Kallit… | kallithea | 2017-09-19T15:29:00Z | 2021-07-05T00:01:22.152589Z |
| pysec-2017-16 |
|
Cross-site request forgery (CSRF) vulnerability in Kallithea before 0.2. | kallithea | 2017-09-21T14:29:00Z | 2021-07-05T00:01:22.120949Z |
| pysec-2016-4 |
|
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3… | jwcrypto | 2016-09-01T23:59:00Z | 2021-07-05T00:01:22.078687Z |
| pysec-2015-14 |
|
The _validaterepo function in sshpeer in Mercurial before 3.2.4 allows remote attackers t… | mercurial | 2015-03-31T14:59:00Z | 2021-07-05T00:01:22.697962Z |
| pysec-2015-13 |
|
CRLF injection vulnerability in Kallithea before 0.3 allows remote attackers to inject ar… | kallithea | 2015-10-29T20:59:00Z | 2021-07-05T00:01:22.184837Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-3438 | A vulnerability was found in SourceCodester Prison Management System 1.0 and classified a… | 2024-04-11T05:03:27.241051Z |
| gsd-2024-3437 | A vulnerability was found in SourceCodester Prison Management System 1.0. It has been rat… | 2024-04-11T05:03:27.161557Z |
| gsd-2024-3436 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.357054Z |
| gsd-2024-3435 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.057928Z |
| gsd-2024-3434 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.313876Z |
| gsd-2024-3433 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.425332Z |
| gsd-2024-3432 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.149591Z |
| gsd-2024-3431 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.233402Z |
| gsd-2024-3430 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.098540Z |
| gsd-2024-3429 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.063794Z |
| gsd-2024-3428 | A vulnerability has been found in SourceCodester Online Courseware 1.0 and classified as … | 2024-04-11T05:03:27.190953Z |
| gsd-2024-3427 | A vulnerability, which was classified as problematic, was found in SourceCodester Online … | 2024-04-11T05:03:27.380682Z |
| gsd-2024-3426 | A vulnerability, which was classified as problematic, has been found in SourceCodester On… | 2024-04-11T05:03:27.392807Z |
| gsd-2024-3425 | A vulnerability classified as critical was found in SourceCodester Online Courseware 1.0.… | 2024-04-11T05:03:27.414444Z |
| gsd-2024-3424 | A vulnerability classified as critical has been found in SourceCodester Online Courseware… | 2024-04-11T05:03:27.283686Z |
| gsd-2024-3423 | A vulnerability was found in SourceCodester Online Courseware 1.0. It has been rated as c… | 2024-04-11T05:03:27.335996Z |
| gsd-2024-3422 | A vulnerability was found in SourceCodester Online Courseware 1.0. It has been declared a… | 2024-04-11T05:03:27.347364Z |
| gsd-2024-3421 | A vulnerability was found in SourceCodester Online Courseware 1.0. It has been classified… | 2024-04-11T05:03:27.102989Z |
| gsd-2024-3420 | A vulnerability was found in SourceCodester Online Courseware 1.0 and classified as criti… | 2024-04-11T05:03:27.247125Z |
| gsd-2024-3419 | A vulnerability has been found in SourceCodester Online Courseware 1.0 and classified as … | 2024-04-11T05:03:27.085806Z |
| gsd-2024-3418 | A vulnerability, which was classified as critical, was found in SourceCodester Online Cou… | 2024-04-11T05:03:27.234193Z |
| gsd-2024-3417 | A vulnerability, which was classified as critical, has been found in SourceCodester Onlin… | 2024-04-11T05:03:27.326834Z |
| gsd-2024-3416 | A vulnerability classified as critical was found in SourceCodester Online Courseware 1.0.… | 2024-04-11T05:03:27.302564Z |
| gsd-2024-3415 | A vulnerability was found in SourceCodester Human Resource Information System 1.0. It has… | 2024-04-11T05:03:27.120981Z |
| gsd-2024-3414 | A vulnerability was found in SourceCodester Human Resource Information System 1.0 and cla… | 2024-04-11T05:03:27.382122Z |
| gsd-2024-3413 | A vulnerability has been found in SourceCodester Human Resource Information System 1.0 an… | 2024-04-11T05:03:27.074349Z |
| gsd-2024-3412 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.071888Z |
| gsd-2024-3411 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.115935Z |
| gsd-2024-3410 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.356725Z |
| gsd-2024-3409 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.316530Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191862 | Malicious code in saintone (PyPI) | 2025-10-15T20:25:13Z | 2025-12-31T02:45:15Z |
| mal-2025-191861 | Malicious code in s3transfer-sl (PyPI) | 2025-04-23T10:32:24Z | 2025-12-31T02:45:15Z |
| mal-2025-191857 | Malicious code in requtils (PyPI) | 2025-11-18T00:29:33Z | 2025-12-31T02:45:15Z |
| mal-2025-191852 | Malicious code in readosso (PyPI) | 2025-09-20T08:25:40Z | 2025-12-31T02:45:15Z |
| mal-2025-191851 | Malicious code in r-irkernel (PyPI) | 2025-09-13T21:49:01Z | 2025-12-31T02:45:15Z |
| mal-2025-191850 | Malicious code in quicksort-pro (PyPI) | 2025-11-13T19:25:07Z | 2025-12-31T02:45:15Z |
| mal-2025-191847 | Malicious code in pytzv (PyPI) | 2025-04-25T16:08:50Z | 2025-12-31T02:45:15Z |
| mal-2025-191843 | Malicious code in python3-6 (PyPI) | 2025-10-10T16:27:54Z | 2025-12-31T02:45:15Z |
| mal-2025-191841 | Malicious code in python-rootpath (PyPI) | 2025-11-12T20:57:18Z | 2025-12-31T02:45:15Z |
| mal-2025-191840 | Malicious code in python-doenv (PyPI) | 2025-12-01T19:24:56Z | 2025-12-31T02:45:15Z |
| mal-2025-191838 | Malicious code in pytelegramapi (PyPI) | 2025-10-20T17:57:20Z | 2025-12-31T02:45:15Z |
| mal-2025-191836 | Malicious code in pyrovider (PyPI) | 2025-03-24T17:43:55Z | 2025-12-31T02:45:15Z |
| mal-2025-191835 | Malicious code in pylibcugraph (PyPI) | 2025-11-13T19:46:03Z | 2025-12-31T02:45:15Z |
| mal-2025-191828 | Malicious code in prof-tg-to-qu (PyPI) | 2025-07-31T10:02:03Z | 2025-12-31T02:45:15Z |
| mal-2025-191821 | Malicious code in prof-qux (PyPI) | 2025-07-26T15:02:22Z | 2025-12-31T02:45:15Z |
| mal-2025-191819 | Malicious code in prof-qu (PyPI) | 2025-07-25T12:14:04Z | 2025-12-31T02:45:15Z |
| mal-2025-191815 | Malicious code in pokemon-app-sdk (PyPI) | 2025-09-13T21:48:37Z | 2025-12-31T02:45:15Z |
| mal-2025-191814 | Malicious code in perfviewer (PyPI) | 2025-11-16T21:33:31Z | 2025-12-31T02:45:15Z |
| mal-2025-191813 | Malicious code in peptest2 (PyPI) | 2025-11-20T14:01:54Z | 2025-12-31T02:45:15Z |
| mal-2025-191812 | Malicious code in peptest (PyPI) | 2025-11-20T11:33:54Z | 2025-12-31T02:45:15Z |
| mal-2025-191805 | Malicious code in nspacercesolve (PyPI) | 2025-11-22T15:22:31Z | 2025-12-31T02:45:15Z |
| mal-2025-191804 | Malicious code in notary-client (PyPI) | 2025-08-28T22:33:58Z | 2025-12-31T02:45:15Z |
| mal-2025-191803 | Malicious code in network-utils-simple (PyPI) | 2025-02-14T23:02:49Z | 2025-12-31T02:45:15Z |
| mal-2025-191802 | Malicious code in netmanagement (PyPI) | 2025-09-07T16:49:12Z | 2025-12-31T02:45:15Z |
| mal-2025-191797 | Malicious code in multis (PyPI) | 2025-02-13T13:18:05Z | 2025-12-31T02:45:15Z |
| mal-2025-191796 | Malicious code in mulaptested-pakname (PyPI) | 2025-08-28T22:36:38Z | 2025-12-31T02:45:15Z |
| mal-2025-191791 | Malicious code in minemeld-core (PyPI) | 2025-11-14T17:22:38Z | 2025-12-31T02:45:15Z |
| mal-2025-191789 | Malicious code in mcp-weather-full (PyPI) | 2025-11-06T08:46:54Z | 2025-12-31T02:45:15Z |
| mal-2025-191788 | Malicious code in mcp-runcmd-server (PyPI) | 2025-10-13T07:46:53Z | 2025-12-31T02:45:15Z |
| mal-2025-191785 | Malicious code in matlab-cli (PyPI) | 2025-05-09T08:09:20Z | 2025-12-31T02:45:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0358 | Grafana: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-02-13T23:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2023-2773 | Apache ActiveMQ: Schwachstelle ermöglicht Codeausführung | 2023-10-29T23:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2023-2698 | Redis: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-10-17T22:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2023-2690 | Oracle MySQL: Mehrere Schwachstellen | 2023-10-17T22:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2023-2115 | BusyBox: Schwachstelle ermöglicht Codeausführung | 2023-08-22T22:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2023-1698 | Redis: Mehrere Schwachstellen ermöglichen Codeausführung | 2023-07-10T22:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2023-1551 | Grafana: Schwachstelle ermöglicht Übernahme von Benutzerkonto | 2023-06-22T22:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2023-0989 | Redis: Schwachstelle ermöglicht Denial of Service | 2023-04-17T22:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2023-0510 | Redis: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-02-28T23:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2023-0102 | Redis: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-01-16T23:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2022-0071 | OpenSSL: Mehrere Schwachstellen | 2022-05-03T22:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2025-0364 | IBM Power Hardware Management Console: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-02-12T23:00:00.000+00:00 | 2025-02-12T23:00:00.000+00:00 |
| wid-sec-w-2025-0363 | Drupal: Mehrere Schwachstellen | 2025-02-12T23:00:00.000+00:00 | 2025-02-12T23:00:00.000+00:00 |
| wid-sec-w-2025-0359 | IBM Business Automation Workflow: Schwachstelle ermöglicht Denial of Service | 2025-02-12T23:00:00.000+00:00 | 2025-02-12T23:00:00.000+00:00 |
| wid-sec-w-2025-0357 | D-LINK Router: Schwachstelle ermöglicht Codeausführung | 2025-02-12T23:00:00.000+00:00 | 2025-02-12T23:00:00.000+00:00 |
| wid-sec-w-2025-0356 | Progress Software Telerik Report Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-02-12T23:00:00.000+00:00 | 2025-02-12T23:00:00.000+00:00 |
| wid-sec-w-2024-0266 | Linux Kernel: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2024-01-31T23:00:00.000+00:00 | 2025-02-12T23:00:00.000+00:00 |
| wid-sec-w-2023-2816 | Red Hat Ansible Automation Platform: Schwachstelle ermöglicht Codeausführung | 2023-11-02T23:00:00.000+00:00 | 2025-02-12T23:00:00.000+00:00 |
| wid-sec-w-2023-2351 | gcc: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-09-13T22:00:00.000+00:00 | 2025-02-12T23:00:00.000+00:00 |
| wid-sec-w-2022-1899 | Ansible: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-10-30T23:00:00.000+00:00 | 2025-02-12T23:00:00.000+00:00 |
| wid-sec-w-2025-0352 | Cacti: Schwachstelle ermöglicht Manipulation von Dateien | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0351 | Ivanti Connect Secure, Policy Secure und Secure Access Client: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0350 | Microsoft Office: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0348 | Fortinet FortiSIEM: Schwachstelle ermöglicht Cross-Site Scripting | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0347 | Fortinet FortiSandbox: Schwachstelle ermöglicht Cross-Site Scripting | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0346 | Fortinet FortiClient: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0345 | Ivanti Neurons for MDM: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0344 | Fortinet FortiManager: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0343 | Red Hat OpenShift: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0342 | Fortinet FortiPortal: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2017:3239 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update | 2017-11-16T19:10:21+00:00 | 2026-02-27T07:48:55+00:00 |
| rhsa-2017:3114 | Red Hat Security Advisory: Red Hat JBoss Web Server security and bug fix update | 2017-11-02T19:04:48+00:00 | 2026-02-27T07:48:54+00:00 |
| rhsa-2017:3113 | Red Hat Security Advisory: Red Hat JBoss Web Server security and bug fix update | 2017-11-02T19:15:44+00:00 | 2026-02-27T07:48:53+00:00 |
| rhsa-2017:2710 | Red Hat Security Advisory: Red Hat JBoss Core Services security update | 2017-09-13T16:49:04+00:00 | 2026-02-27T07:48:53+00:00 |
| rhsa-2017:2709 | Red Hat Security Advisory: Red Hat JBoss Core Services security update | 2017-09-13T16:48:46+00:00 | 2026-02-27T07:48:52+00:00 |
| rhsa-2017:2708 | Red Hat Security Advisory: Red Hat JBoss Core Services security update | 2017-09-13T16:37:52+00:00 | 2026-02-27T07:48:51+00:00 |
| rhsa-2017:1216 | Red Hat Security Advisory: java-1.7.1-ibm security update | 2017-05-09T16:41:26+00:00 | 2026-02-27T07:48:45+00:00 |
| rhsa-2017:0462 | Red Hat Security Advisory: java-1.8.0-ibm security update | 2017-03-08T13:22:53+00:00 | 2026-02-27T07:48:45+00:00 |
| rhsa-2017:0338 | Red Hat Security Advisory: java-1.6.0-ibm security update | 2017-02-28T08:29:25+00:00 | 2026-02-27T07:48:42+00:00 |
| rhsa-2017:0337 | Red Hat Security Advisory: java-1.7.0-ibm security update | 2017-02-28T08:19:27+00:00 | 2026-02-27T07:48:39+00:00 |
| rhsa-2017:0336 | Red Hat Security Advisory: java-1.7.1-ibm security update | 2017-02-28T08:19:38+00:00 | 2026-02-27T07:48:38+00:00 |
| rhsa-2016:1940 | Red Hat Security Advisory: openssl security update | 2016-09-27T13:46:00+00:00 | 2026-02-27T07:48:38+00:00 |
| rhsa-2013:1136 | Red Hat Security Advisory: rubygem-passenger security update | 2013-08-05T15:48:00+00:00 | 2026-02-27T07:48:36+00:00 |
| rhba-2020:0390 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.1 packages update | 2020-02-12T06:38:18+00:00 | 2026-02-27T07:48:33+00:00 |
| rhba-2019:2581 | Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 images update | 2019-09-03T17:12:22+00:00 | 2026-02-27T07:48:30+00:00 |
| rhsa-2026:2366 | Red Hat Security Advisory: Red Hat build of Keycloak 26.4.9 Images Security Update | 2026-02-09T20:41:06+00:00 | 2026-02-27T07:44:32+00:00 |
| rhsa-2026:2365 | Red Hat Security Advisory: Red Hat build of Keycloak 26.4.9 Security Update | 2026-02-09T20:37:33+00:00 | 2026-02-27T07:44:29+00:00 |
| rhsa-2025:22089 | Red Hat Security Advisory: Red Hat build of Keycloak 26.2.11 Security Update | 2025-11-25T16:06:13+00:00 | 2026-02-27T07:44:21+00:00 |
| rhsa-2025:22088 | Red Hat Security Advisory: Red Hat build of Keycloak 26.2.11 Images Security Update | 2025-11-25T16:12:38+00:00 | 2026-02-27T07:44:20+00:00 |
| rhsa-2025:21886 | Red Hat Security Advisory: Satellite 6.18.1 Async Update | 2025-11-20T20:43:24+00:00 | 2026-02-27T07:44:12+00:00 |
| rhsa-2025:21775 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2025-11-19T20:53:45+00:00 | 2026-02-27T07:44:12+00:00 |
| rhsa-2025:21371 | Red Hat Security Advisory: Red Hat build of Keycloak 26.4.4 Images Security Update | 2025-11-13T19:30:13+00:00 | 2026-02-27T07:44:09+00:00 |
| rhsa-2025:21370 | Red Hat Security Advisory: Red Hat build of Keycloak 26.4.4 Security Update | 2025-11-13T17:51:13+00:00 | 2026-02-27T07:44:07+00:00 |
| rhsa-2025:19221 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2025-10-28T21:16:15+00:00 | 2026-02-27T07:44:05+00:00 |
| rhsa-2024:1433 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | 2024-03-20T00:40:07+00:00 | 2026-02-27T07:19:57+00:00 |
| rhsa-2024:1027 | Red Hat Security Advisory: Migration Toolkit for Applications security update | 2024-02-28T18:13:39+00:00 | 2026-02-27T07:19:22+00:00 |
| rhba-2021:3003 | Red Hat Bug Fix Advisory: Red Hat OpenShift Container Storage 4.8.0 container images bug fix and enhancement update | 2021-08-03T18:15:00+00:00 | 2026-02-27T06:58:57+00:00 |
| rhba-2020:2215 | Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update | 2020-05-28T10:55:32+00:00 | 2026-02-27T06:58:55+00:00 |
| rhba-2020:0930 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.9 bug fix update | 2020-04-01T19:10:14+00:00 | 2026-02-27T06:58:52+00:00 |
| rhba-2020:0929 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.9 packages update | 2020-04-01T18:19:13+00:00 | 2026-02-27T06:58:52+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-21-161-01 | Rockwell Automation FactoryTalk Services Platform | 2021-06-10T00:00:00.000000Z | 2021-06-10T00:00:00.000000Z |
| icsa-21-159-02 | Open Design Alliance Drawings SDK | 2021-06-08T06:00:00.000000Z | 2021-06-08T06:00:00.000000Z |
| icsa-21-159-06 | Thales Sentinel LDK Run-Time Environment | 2021-06-08T00:00:00.000000Z | 2021-06-08T00:00:00.000000Z |
| icsa-21-159-05 | Schneider Electric Modicon X80 | 2021-06-08T00:00:00.000000Z | 2021-06-08T00:00:00.000000Z |
| icsa-21-159-04 | Schneider Electric IGSS | 2021-06-08T00:00:00.000000Z | 2021-06-08T00:00:00.000000Z |
| icsa-21-159-03 | AVEVA InTouch | 2021-06-08T00:00:00.000000Z | 2021-06-08T00:00:00.000000Z |
| icsa-21-159-01 | Johnson Controls Metasys | 2021-06-08T00:00:00.000000Z | 2021-06-08T00:00:00.000000Z |
| icsa-21-154-01 | Advantech iView | 2021-06-03T00:00:00.000000Z | 2021-06-03T00:00:00.000000Z |
| icsa-21-147-05 | Mitsubishi Electric MELSEC iQ-R Series | 2021-05-27T00:00:00.000000Z | 2021-05-27T00:00:00.000000Z |
| icsa-21-147-04 | Siemens JT2Go and Teamcenter Visualization | 2021-05-27T00:00:00.000000Z | 2021-05-27T00:00:00.000000Z |
| icsa-21-147-03 | MesaLabs AmegaView | 2021-05-27T00:00:00.000000Z | 2021-05-27T00:00:00.000000Z |
| icsa-21-147-02 | Johnson Controls Sensormatic Electronics VideoEdge | 2021-05-27T00:00:00.000000Z | 2021-05-27T00:00:00.000000Z |
| icsa-21-147-01 | GENIVI Alliance DLT | 2021-05-27T00:00:00.000000Z | 2021-05-27T00:00:00.000000Z |
| icsa-21-012-03 | Siemens JT2Go and Teamcenter Visualization (Update B) | 2021-01-12T00:00:00.000000Z | 2021-05-27T00:00:00.000000Z |
| icsa-20-212-03 | Mitsubishi Electric Factory Automation Products Path Traversal (Update C) | 2020-07-30T00:00:00.000000Z | 2021-05-27T00:00:00.000000Z |
| icsa-21-145-02 | Rockwell Automation Micro800 and MicroLogix 1400 | 2021-05-25T00:00:00.000000Z | 2021-05-25T00:00:00.000000Z |
| icsa-21-145-01 | Datakit Libraries bundled in Luxion KeyShot | 2021-05-25T00:00:00.000000Z | 2021-05-25T00:00:00.000000Z |
| icsa-21-138-01 | ICSA-21-138-01_Emerson Rosemount X-STREAM | 2021-05-18T00:00:00.000000Z | 2021-05-18T00:00:00.000000Z |
| icsa-21-021-04 | Mitsubishi Electric MELFA (Update A) | 2021-01-21T00:00:00.000000Z | 2021-05-18T00:00:00.000000Z |
| icsa-21-133-04 | OPC UA Products Built with the .NET Framework 4.5, 4.0, and 3.5 | 2021-05-13T00:00:00.000000Z | 2021-05-13T00:00:00.000000Z |
| icsa-21-133-03 | OPC Foundation UA Products Built with .NET Framework | 2021-05-13T00:00:00.000000Z | 2021-05-13T00:00:00.000000Z |
| icsa-21-133-02 | Johnson Controls Sensormatic Tyco AI | 2021-05-13T00:00:00.000000Z | 2021-05-13T00:00:00.000000Z |
| icsa-21-133-01 | Rockwell Automation Connected Components Workbench | 2021-05-13T00:00:00.000000Z | 2021-05-13T00:00:00.000000Z |
| icsa-21-131-01 | Omron CX-One | 2021-05-11T00:00:00.000000Z | 2021-05-11T00:00:00.000000Z |
| icsa-21-040-08 | Siemens SIMARIS Configuration (Update A) | 2021-02-09T00:00:00.000000Z | 2021-05-11T00:00:00.000000Z |
| icsa-21-124-02 | Delta Electronics CNCSoft ScreenEditor | 2021-05-04T00:00:00.000000Z | 2021-05-04T00:00:00.000000Z |
| icsa-21-124-01 | Advantech WISE-PaaS RMM | 2021-05-04T00:00:00.000000Z | 2021-05-04T00:00:00.000000Z |
| icsa-21-119-03 | Johnson Controls Exacq Technologies exacqVision | 2021-04-29T00:00:00.000000Z | 2021-04-29T00:00:00.000000Z |
| icsa-21-119-02 | Cassia Networks Access Controller | 2021-04-29T00:00:00.000000Z | 2021-04-29T00:00:00.000000Z |
| icsa-21-119-01 | Texas Instruments SimpleLink | 2021-04-29T00:00:00.000000Z | 2021-04-29T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-vmpresc-syzcs4kc | Cisco SD-WAN Solution Software Privilege Escalation Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmpresc-SyzcS4kC | Cisco SD-WAN Solution Software Privilege Escalation Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmdirtrav-efdaxsjg | Cisco SD-WAN vManage Software Directory Traversal Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmdirtrav-eFdAxsJg | Cisco SD-WAN vManage Software Directory Traversal Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmanxss-z7bhvhpy | Cisco SD-WAN vManage Software Cross-Site Scripting Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmanxss-z7bhvHpy | Cisco SD-WAN vManage Software Cross-Site Scripting Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmanxml-aj4gfekd | Cisco SD-WAN vManage Software XML External Entity Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmanxml-Aj4GFEKd | Cisco SD-WAN vManage Software XML External Entity Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmanwebid-5qwmccvt | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmanwebid-5QWMcCvt | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmanrce-4jtwt28p | Cisco SD-WAN vManage Software Remote Code Execution Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmanrce-4jtWT28P | Cisco SD-WAN vManage Software Remote Code Execution Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmandowndir-cvgvdkm3 | Cisco SD-WAN vManage Software Path Traversal Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vmandowndir-CVGvdKM3 | Cisco SD-WAN vManage Software Path Traversal Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-visio-dir-sql-inj-fpm3mpft | Cisco Vision Dynamic Signage Director SQL Injection Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-visio-dir-sql-inj-fPm3MPfT | Cisco Vision Dynamic Signage Director SQL Injection Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vedgfpdos-pkqqrnwv | Cisco SD-WAN vEdge Routers Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-vedgfpdos-PkqQrnwV | Cisco SD-WAN vEdge Routers Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sivm-m8wugr9o | Cisco SD-WAN vManage Software SQL Injection Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sivm-M8wugR9O | Cisco SD-WAN vManage Software SQL Injection Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sdw-dos-kwodyhnb | Cisco SD-WAN Solution Software Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sdw-dos-KWOdyHnB | Cisco SD-WAN Solution Software Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sdscred-hfwwfqbj | Cisco SD-WAN Solution Software Static Credentials Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sdscred-HfWWfqBj | Cisco SD-WAN Solution Software Static Credentials Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sb-rce-dos-9zajkx4 | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Remote Code Execution and Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sb-rce-dos-9ZAjkx4 | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Remote Code Execution and Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sb-dos-zn5gvnh7 | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-sb-dos-ZN5GvNH7 | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-rv110w-static-cred-bmtwbwty | Cisco Small Business RV110W Wireless-N VPN Firewall Static Default Credential Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-rv110w-static-cred-BMTWBWTy | Cisco Small Business RV110W Wireless-N VPN Firewall Static Default Credential Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-0760 | A flood of DNS messages over TCP may make the server unstable | 2024-07-01T07:00:00.000Z | 2026-02-18T02:38:37.000Z |
| msrc_cve-2025-68374 | md: fix rcu protection in md_wakeup_thread | 2025-12-02T00:00:00.000Z | 2026-02-18T02:38:35.000Z |
| msrc_cve-2024-45010 | mptcp: pm: only mark 'subflow' endp as available | 2024-09-01T07:00:00.000Z | 2026-02-18T02:38:35.000Z |
| msrc_cve-2025-37979 | ASoC: qcom: Fix sc7280 lpass potential buffer overflow | 2025-05-02T00:00:00.000Z | 2026-02-18T02:38:19.000Z |
| msrc_cve-2020-36476 | An issue was discovered in Mbed TLS before 2.24.0 (and before 2.16.8 LTS and before 2.7.17 LTS). There is missing zeroization of plaintext buffers in mbedtls_ssl_read to erase unused application data from memory. | 2021-08-02T00:00:00.000Z | 2026-02-18T02:38:16.000Z |
| msrc_cve-2024-49867 | btrfs: wait for fixup workers before stopping cleaner kthread during umount | 2024-10-01T07:00:00.000Z | 2026-02-18T02:38:12.000Z |
| msrc_cve-2022-49043 | xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free. | 2025-01-02T00:00:00.000Z | 2026-02-18T02:38:12.000Z |
| msrc_cve-2023-6237 | Excessive time spent checking invalid RSA public keys | 2024-04-02T07:00:00.000Z | 2026-02-18T02:38:09.000Z |
| msrc_cve-2025-68724 | crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id | 2025-12-02T00:00:00.000Z | 2026-02-18T02:38:05.000Z |
| msrc_cve-2024-1975 | SIG(0) can be used to exhaust CPU resources | 2024-07-01T07:00:00.000Z | 2026-02-18T02:38:02.000Z |
| msrc_cve-2024-45015 | drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable() | 2024-09-01T07:00:00.000Z | 2026-02-18T02:37:52.000Z |
| msrc_cve-2025-23158 | media: venus: hfi: add check to handle incorrect queue size | 2025-05-02T00:00:00.000Z | 2026-02-18T02:37:42.000Z |
| msrc_cve-2024-10846 | Excessive Platform Resource Consumption within a Loop when unmarshalling Compose file having recursive loop | 2025-01-02T00:00:00.000Z | 2026-02-18T02:37:40.000Z |
| msrc_cve-2019-14202 | An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_readlink_reply. | 2019-07-02T00:00:00.000Z | 2026-02-18T02:37:30.000Z |
| msrc_cve-2024-46674 | usb: dwc3: st: fix probed platform device ref count on probe error path | 2024-09-01T07:00:00.000Z | 2026-02-18T02:37:06.000Z |
| msrc_cve-2025-22049 | LoongArch: Increase ARCH_DMA_MINALIGN up to 16 | 2025-04-02T00:00:00.000Z | 2026-02-18T02:37:02.000Z |
| msrc_cve-2025-0395 | When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size. | 2025-01-02T00:00:00.000Z | 2026-02-18T02:37:02.000Z |
| msrc_cve-2025-39748 | bpf: Forget ranges when refining tnum after JSET | 2025-09-02T00:00:00.000Z | 2026-02-18T02:37:01.000Z |
| msrc_cve-2025-68378 | bpf: Fix stackmap overflow check in __bpf_get_stackid() | 2025-12-02T00:00:00.000Z | 2026-02-18T02:36:53.000Z |
| msrc_cve-2025-40102 | KVM: arm64: Prevent access to vCPU events before init | 2025-10-02T00:00:00.000Z | 2026-02-18T02:36:46.000Z |
| msrc_cve-2024-4076 | Assertion failure when serving both stale cache data and authoritative zone content | 2024-07-01T07:00:00.000Z | 2026-02-18T02:36:45.000Z |
| msrc_cve-2019-14195 | An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with unvalidated length at nfs_readlink_reply in the "else" block after calculating the new path length. | 2019-07-02T00:00:00.000Z | 2026-02-18T02:36:37.000Z |
| msrc_cve-2025-50182 | urllib3 does not control redirects in browsers and Node.js | 2025-06-02T00:00:00.000Z | 2026-02-18T02:36:36.000Z |
| msrc_cve-2023-24536 | Excessive resource consumption in net/http, net/textproto and mime/multipart | 2023-04-01T00:00:00.000Z | 2026-02-18T02:36:33.000Z |
| msrc_cve-2024-49889 | ext4: avoid use-after-free in ext4_ext_show_leaf() | 2024-10-01T07:00:00.000Z | 2026-02-18T02:36:32.000Z |
| msrc_cve-2025-37771 | drm/amd/pm: Prevent division by zero | 2025-05-02T00:00:00.000Z | 2026-02-18T02:36:26.000Z |
| msrc_cve-2025-39789 | crypto: x86/aegis - Add missing error checks | 2025-09-02T00:00:00.000Z | 2026-02-18T02:36:22.000Z |
| msrc_cve-2022-2880 | Incorrect sanitization of forwarded query parameters in net/http/httputil | 2022-10-02T00:00:00.000Z | 2026-02-18T02:36:17.000Z |
| msrc_cve-2024-45021 | memcg_write_event_control(): fix a user-triggerable oops | 2024-09-01T07:00:00.000Z | 2026-02-18T02:36:07.000Z |
| msrc_cve-2025-22150 | Undici Uses Insufficiently Random Values | 2025-01-02T00:00:00.000Z | 2026-02-18T02:36:04.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:13788-1 | ini4j-0.5.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13787-1 | eclipse-emf-core-2.22.0-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13786-1 | eclipse-contributor-tools-4.15-13.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13785-1 | kernel-devel-6.8.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13784-1 | buildah-1.35.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13783-1 | python310-black-24.3.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13782-1 | teleport-15.1.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13781-1 | rclone-1.66.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13780-1 | python310-python-rapidjson-1.16-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13779-1 | expat-2.6.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13778-1 | cmctl-1.14.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13777-1 | ungoogled-chromium-122.0.6261.128-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13776-1 | trilead-ssh2-217.293.v56de4d4d3515-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13775-1 | libQt6Concurrent6-6.6.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13774-1 | python310-aiosmtpd-1.4.5-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13773-1 | nodejs-electron-28.2.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13772-1 | jsch-agent-proxy-connector-factory-0.0.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13771-1 | chromedriver-122.0.6261.128-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13770-1 | Bottles-51.11-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13769-1 | ucode-intel-20240312-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13768-1 | python310-rpyc-6.0.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13767-1 | kernel-devel-6.7.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13766-1 | ungoogled-chromium-122.0.6261.111-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13765-1 | opensc-0.25.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13764-1 | chromedriver-122.0.6261.111-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13763-1 | clojure-1.11.2.1446-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13762-1 | libunbound8-1.19.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13761-1 | graphviz-2.49.3-9.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13760-1 | perl-Spreadsheet-ParseXLSX-0.310.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13759-1 | libvirt-10.1.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2018-109 | Heap-use-after-free in ssl_get_prev_session | 2021-01-13T00:00:48.206043Z | 2022-04-13T03:04:38.768619Z |
| osv-2017-119 | Stack-buffer-overflow in ot::MeshCoP::CommissionerSessionIdTlv::GetCommissionerSessionId | 2021-01-13T21:57:51.011913Z | 2022-04-13T03:04:38.993383Z |
| osv-2022-82 | Heap-buffer-overflow in generic_unpack | 2022-01-24T00:00:34.740260Z | 2022-04-13T03:04:37.189553Z |
| osv-2022-77 | Heap-buffer-overflow in hufDecode | 2022-01-23T00:00:10.014207Z | 2022-04-13T03:04:37.150888Z |
| osv-2022-58 | Heap-buffer-overflow in internal_huf_decompress | 2022-01-19T00:01:46.235163Z | 2022-04-13T03:04:37.212914Z |
| osv-2022-306 | Heap-buffer-overflow in Imf_3_1::memstream_read | 2022-04-05T00:00:45.087023Z | 2022-04-13T03:04:37.050267Z |
| osv-2022-258 | Heap-double-free in Imf_3_1::RgbaInputFile::~RgbaInputFile | 2022-03-19T00:00:41.775467Z | 2022-04-13T03:04:37.079008Z |
| osv-2021-940 | Heap-buffer-overflow in json_string_unescape | 2021-07-09T00:01:28.772223Z | 2022-04-13T03:04:37.827671Z |
| osv-2021-850 | Heap-buffer-overflow in proto_item_append_text | 2021-06-11T00:01:24.261978Z | 2022-04-13T03:04:37.806635Z |
| osv-2021-813 | Use-of-uninitialized-value in StandardSecurityHandler::StandardSecurityHandler | 2021-05-30T00:00:05.737839Z | 2022-04-13T03:04:37.224604Z |
| osv-2021-654 | Heap-buffer-overflow in decode_mcu_fast | 2021-04-18T00:01:02.873828Z | 2022-04-13T03:04:37.704903Z |
| osv-2021-609 | Heap-buffer-overflow in get_word_rgb_row | 2021-04-07T00:01:13.031934Z | 2022-04-13T03:04:37.694188Z |
| osv-2021-443 | Segv on unknown address in Imf_2_5::copyIntoFrameBuffer | 2021-02-24T00:01:03.341594Z | 2022-04-13T03:04:37.104577Z |
| osv-2021-430 | Stack-buffer-overflow in tvb_memcpy | 2021-02-22T00:00:22.320320Z | 2022-04-13T03:04:37.838011Z |
| osv-2021-423 | Heap-buffer-overflow in dissect_vjc_uncomp | 2021-02-20T00:01:09.114506Z | 2022-04-13T03:04:37.843092Z |
| osv-2021-41 | Heap-buffer-overflow in BaseMemStream<char const>::getChar | 2021-01-12T00:00:15.199726Z | 2022-04-13T03:04:37.289542Z |
| osv-2021-389 | Bad-cast to tt_cmap_t' (aka 'struct _tt_cmap')_cairo_truetype_index_to_ucs4 | 2021-02-13T00:01:04.517207Z | 2022-04-13T03:04:37.229998Z |
| osv-2021-37 | Heap-buffer-overflow in WelsDec::CopyRectBlock4Cols | 2021-01-10T00:00:03.839095Z | 2022-04-13T03:04:37.652617Z |
| osv-2021-365 | Global-buffer-overflow in llvm_ks::StringRef::find_last_not_of | 2021-02-11T00:00:55.402078Z | 2022-04-13T03:04:37.927355Z |
| osv-2021-362 | Heap-use-after-free in DestroyPicBuff | 2021-02-11T00:00:20.830392Z | 2022-04-13T03:04:37.636977Z |
| osv-2021-288 | UNKNOWN READ in wabt::ReadBinary | 2021-02-07T00:00:01.703392Z | 2022-04-13T03:04:37.955214Z |
| osv-2021-269 | Stack-use-after-return in sta_prop_equal_fn | 2021-02-04T00:00:11.295257Z | 2022-04-13T03:04:37.801763Z |
| osv-2021-245 | UNKNOWN WRITE in WelsDecodeBs | 2021-01-28T00:02:30.610788Z | 2022-04-13T03:04:37.403912Z |
| osv-2021-204 | Heap-buffer-overflow in WelsDec::NeedErrorCon | 2021-01-16T00:00:32.109463Z | 2022-04-13T03:04:37.398650Z |
| osv-2021-2 | Heap-buffer-overflow in Imf_2_5::FastHufDecoder::decode | 2021-01-01T00:00:05.623596Z | 2022-04-13T03:04:37.123418Z |
| osv-2021-1674 | Heap-buffer-overflow in find_sdp_line_delimiter | 2021-12-13T00:00:05.790795Z | 2022-04-13T03:04:37.753098Z |
| osv-2021-1470 | Heap-buffer-overflow in hufDecode | 2021-10-21T00:00:36.107139Z | 2022-04-13T03:04:37.218942Z |
| osv-2021-1457 | Heap-buffer-overflow in generic_unpack | 2021-10-17T00:01:33.875064Z | 2022-04-13T03:04:37.206944Z |
| osv-2021-1451 | Heap-buffer-overflow in Imf_3_1::memstream_read | 2021-10-15T00:00:15.606456Z | 2022-04-13T03:04:37.061710Z |
| osv-2021-1440 | Heap-buffer-overflow in internal_huf_decompress | 2021-10-12T00:01:30.701207Z | 2022-04-13T03:04:37.072969Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitea-2023-3515 | Open Redirect in go-gitea/gitea | 2024-03-06T10:52:08.603Z | 2025-05-20T10:02:07.006Z |
| bit-gitea-2022-1928 | Cross-site Scripting (XSS) - Stored in go-gitea/gitea | 2024-03-06T10:53:22.292Z | 2025-05-20T10:02:07.006Z |
| bit-gitea-2022-1058 | Open Redirect on login in go-gitea/gitea | 2024-03-06T10:53:31.004Z | 2025-05-20T10:02:07.006Z |
| bit-gitea-2022-0905 | Missing Authorization in go-gitea/gitea | 2024-03-06T10:53:40.961Z | 2025-05-20T10:02:07.006Z |
| bit-git-2024-52005 | The sideband payload is passed unfiltered to the terminal in git | 2025-04-14T11:03:18.348Z | 2025-05-20T10:02:07.006Z |
| bit-git-2022-25648 | Command Injection | 2024-03-06T10:52:03.704Z | 2025-05-20T10:02:07.006Z |
| bit-git-2020-5260 | malicious URLs may cause Git to present stored credentials to the wrong server | 2024-03-06T10:52:15.272Z | 2025-05-20T10:02:07.006Z |
| bit-ghost-2024-43409 | Ghost's improper authentication allows access to member information and actions | 2024-08-23T07:18:19.005Z | 2025-05-20T10:02:07.006Z |
| bit-ghost-2023-40028 | Arbitrary file read via symlinks in Ghost | 2024-03-06T10:52:08.986Z | 2025-05-20T10:02:07.006Z |
| bit-ghost-2023-31133 | Ghost vulnerable to disclosure of private API fields | 2024-03-06T10:52:29.977Z | 2025-05-20T10:02:07.006Z |
| bit-ghost-2021-39192 | Privilege escalation: all users can access Admin-level API keys | 2024-03-06T10:54:14.780Z | 2025-05-20T10:02:07.006Z |
| bit-ghost-2021-29484 | DOM XSS in Theme Preview | 2024-03-06T10:54:24.871Z | 2025-05-20T10:02:07.006Z |
| bit-fluentd-2022-39379 | Fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration) | 2024-03-06T10:51:50.613Z | 2025-05-20T10:02:07.006Z |
| bit-fluentd-2021-41186 | ReDoS vulnerability in parser_apache2 | 2024-03-06T10:52:03.183Z | 2025-05-20T10:02:07.006Z |
| bit-flink-2020-17518 | Apache Flink directory traversal attack: remote file writing through the REST API | 2024-03-06T10:52:08.186Z | 2025-05-20T10:02:07.006Z |
| bit-etcd-2023-32082 | etcd key name can be accessed via LeaseTimeToLive API | 2024-03-06T10:51:44.987Z | 2025-05-20T10:02:07.006Z |
| bit-etcd-2020-15113 | Improper Preservation of Permissions in etcd | 2024-03-06T10:52:21.172Z | 2025-05-20T10:02:07.006Z |
| bit-etcd-2020-15112 | Improper Input Validation in etcd | 2024-03-06T10:52:31.679Z | 2025-05-20T10:02:07.006Z |
| bit-etcd-2020-15106 | Improper Input Validation in etcd | 2024-03-06T10:52:40.894Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2025-30157 | Envoy crashes when HTTP ext_proc processes local replies | 2025-03-25T07:10:09.552Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-53271 | HTTP/1.1 multiple issues with envoy.reloadable_features.http1_balsa_delay_reset in envoy | 2024-12-20T07:08:24.205Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-53270 | HTTP/1: sending overload crashes when the request is reset beforehand in envoy | 2024-12-20T07:08:32.803Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-45810 | Envoy crashes for LocalReply in http async client | 2024-09-21T07:10:05.550Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-45809 | Jwt filter crash in the clear route cache with remote JWKs in envoy | 2024-09-21T07:10:18.152Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-45808 | Malicious log injection via access logs in envoy | 2024-09-21T07:10:31.256Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-45807 | oghttp2 crash on OnBeginHeadersForStream in envoy | 2024-09-21T07:10:45.353Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-45806 | Potential manipulate `x-envoy` headers from external sources in envoy | 2024-09-21T07:10:58.550Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-34364 | Envoy OOM vector from HTTP async client with unbounded response buffer for mirror response | 2024-06-06T07:17:26.560Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-34363 | Envoy can crash due to uncaught nlohmann JSON exception | 2024-06-06T07:17:42.957Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-34362 | Envoy affected by a crash (use-after-free) in EnvoyQuicServerStream | 2024-06-06T07:17:58.763Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202002-0214 | In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write… | 2024-02-27T23:07:41.847000Z |
| var-202402-1803 | An improper privilege management vulnerability [CWE-269] in Fortinet FortiClientEMS versi… | 2024-02-27T23:06:09.479000Z |
| var-200505-0198 | Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other vers… | 2024-02-27T22:53:51.996000Z |
| var-200907-0445 | Opera, possibly 9.64 and earlier, allows remote attackers to cause a denial of service (m… | 2024-02-27T22:16:58.978000Z |
| var-202105-1476 | An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and… | 2024-02-27T21:58:56.714000Z |
| var-202105-1429 | An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, … | 2024-02-27T20:24:19.155000Z |
| var-202105-1477 | An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WPA, WPA2, and WPA3… | 2024-02-27T19:14:44.708000Z |
| var-200203-0011 | Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or r… | 2024-02-26T22:51:43.141000Z |
| var-201706-0438 | Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware vers… | 2024-02-26T22:48:07.734000Z |
| var-201104-0076 | Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.1… | 2024-02-26T22:22:58.648000Z |
| var-200711-0249 | Integer signedness error in the Networking component in Apple Mac OS X 10.4 through 10.4.… | 2024-02-26T21:58:59.668000Z |
| var-202402-1248 | A vulnerability has been identified in SIMATIC CP 343-1 (6GK7343-1EX30-0XE0) (All version… | 2024-02-24T22:55:23.183000Z |
| var-202309-0575 | A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visua… | 2024-02-23T20:27:35.795000Z |
| var-200711-0210 | Invensys Wonderware InTouch 8.0 creates a NetDDE share with insecure permissions (Everyon… | 2024-02-22T23:05:04.317000Z |
| var-202312-1526 | An improper neutralization of input during web page generation ('cross-site scripting') i… | 2024-02-22T23:00:21.326000Z |
| var-202007-1057 | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) … | 2024-02-22T23:00:06.178000Z |
| var-200901-0408 | Directory traversal vulnerability in the OBEX FTP Service in the Microsoft Bluetooth stac… | 2024-02-22T22:59:46.486000Z |
| var-202401-2083 | TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vul… | 2024-02-22T22:59:00.640000Z |
| var-200802-0381 | The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56… | 2024-02-22T22:49:53.121000Z |
| var-200911-0246 | Multiple directory traversal vulnerabilities in Home FTP Server 1.10.1.139 allow remote a… | 2024-02-22T22:49:51.008000Z |
| var-202401-2215 | TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vul… | 2024-02-22T22:46:17.642000Z |
| var-202312-1696 | A improper neutralization of input during web page generation ('cross-site scripting') in… | 2024-02-22T22:46:17.839000Z |
| var-200709-0395 | Cisco Adaptive Security Appliance (ASA) running PIX 7.0 before 7.0.7.1, 7.1 before 7.1.2.… | 2024-02-22T22:44:28.185000Z |
| var-200801-0123 | OKI C5510MFP Printer CU H2.15, PU 01.03.01, System F/W 1.01, and Web Page 1.00 sends the … | 2024-02-22T22:42:05.608000Z |
| var-200212-0658 | Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check the retu… | 2024-02-22T22:41:24.411000Z |
| var-202402-1322 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < … | 2024-02-22T22:23:10.829000Z |
| var-200812-0329 | The Cisco Linksys WVC54GC wireless video camera before firmware 1.25 sends cleartext conf… | 2024-02-22T22:22:40.709000Z |
| var-200902-0476 | XTerm in Apple Mac OS X 10.4.11 and 10.5.6, when used with luit, creates tty devices with… | 2024-02-22T22:11:14.505000Z |
| var-202402-1324 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < … | 2024-02-22T20:48:02.808000Z |
| var-201912-0889 | Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of un… | 2024-02-22T20:10:54.285000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2009-000051 | Webservice-DIC yoyaku_v41 vulnerable to command injection | 2009-07-31T15:34+09:00 | 2009-07-31T15:34+09:00 |
| jvndb-2009-000050 | MySQL Connector/J vulnerable to SQL injection | 2009-07-29T15:30+09:00 | 2009-07-29T15:30+09:00 |
| jvndb-2009-000020 | Movable Type cross-site scripting vulnerability | 2009-04-28T16:18+09:00 | 2009-07-29T12:22+09:00 |
| jvndb-2009-000002 | Movable Type Enterprise cross-site scripting vulnerability | 2009-01-13T18:50+09:00 | 2009-07-29T12:22+09:00 |
| jvndb-2009-000049 | Cross-site scripting vulnerability in RevoCounter CGI (Animation Counter) | 2009-07-24T17:19+09:00 | 2009-07-24T17:19+09:00 |
| jvndb-2009-000048 | shiromuku(fs6)DIARY cross-site scripting vulnerability | 2009-07-15T18:15+09:00 | 2009-07-15T18:15+09:00 |
| jvndb-2008-000069 | Apache Tomcat allows access from a non-permitted IP address | 2008-10-10T15:44+09:00 | 2009-07-08T11:38+09:00 |
| jvndb-2009-001545 | Cosminexus Processing Kit for XML and Hitachi Developer's Kit for Java Possible Unauthorized Access through Zip File Scanning Utility | 2009-07-07T11:12+09:00 | 2009-07-07T11:12+09:00 |
| jvndb-2009-001544 | Cosminexus Processing Kit for XML and Hitachi Developer's Kit for Java Possible Unauthorized Access through Vulnerability in Encoding Process | 2009-07-07T11:12+09:00 | 2009-07-07T11:12+09:00 |
| jvndb-2009-000046 | PHP-I-BOARD from Let's PHP! vulnerable to directory traversal | 2009-07-01T17:54+09:00 | 2009-07-01T17:54+09:00 |
| jvndb-2009-000045 | PHP-I-BOARD from Let's PHP! vulnerable to cross-site scripting | 2009-07-01T17:54+09:00 | 2009-07-01T17:54+09:00 |
| jvndb-2009-000044 | Tree BBS from Let's PHP! vulnerable to cross-site scripting | 2009-07-01T17:53+09:00 | 2009-07-01T17:53+09:00 |
| jvndb-2009-000043 | Movable Type access restriction bypass vulnerability | 2009-07-01T17:53+09:00 | 2009-07-01T17:53+09:00 |
| jvndb-2009-000042 | Movable Type cross-site scripting vulnerability | 2009-07-01T17:53+09:00 | 2009-07-01T17:53+09:00 |
| jvndb-2008-000075 | EC-CUBE vulnerable to SQL injection | 2008-11-06T16:04+09:00 | 2009-06-25T15:44+09:00 |
| jvndb-2009-000041 | Cross-site scripting vulnerability in PukiWikiMod from XOOPS Maniac | 2009-06-19T16:35+09:00 | 2009-06-19T16:35+09:00 |
| jvndb-2009-000040 | iPhone OS denial of service (DoS) vulnerability | 2009-06-18T17:54+09:00 | 2009-06-18T17:54+09:00 |
| jvndb-2009-000039 | Buffer overflow vulnerability in Microsoft Works converters | 2009-06-18T17:54+09:00 | 2009-06-18T17:54+09:00 |
| jvndb-2009-000038 | Cross-site scripting vulnerability in activeCollab | 2009-06-18T17:54+09:00 | 2009-06-18T17:54+09:00 |
| jvndb-2009-000035 | Predictable session ID vulnerability in Serene Bach | 2009-06-18T17:53+09:00 | 2009-06-18T17:53+09:00 |
| jvndb-2009-000034 | IMG-BBS from MT312 vulnerable to cross-site scripting | 2009-05-29T16:19+09:00 | 2009-05-29T16:19+09:00 |
| jvndb-2009-000033 | REP-BBS from MT312 vulnerable to cross-site scripting | 2009-05-29T16:19+09:00 | 2009-05-29T16:19+09:00 |
| jvndb-2009-000032 | Directory traversal vulnerability in multiple Cisco Systems products | 2009-05-29T16:19+09:00 | 2009-05-29T16:19+09:00 |
| jvndb-2009-000031 | Cross-site scripting vulnerability in leger (free edition) | 2009-05-27T18:28+09:00 | 2009-05-27T18:28+09:00 |
| jvndb-2009-000030 | a-News from Appleple vulnerable to cross-site scripting | 2009-05-22T14:31+09:00 | 2009-05-22T14:31+09:00 |
| jvndb-2009-000029 | HP System Management Homepage vulnerable to cross-site scripting | 2009-05-20T16:01+09:00 | 2009-05-20T16:01+09:00 |
| jvndb-2009-000028 | Trees from CGI RESCUE vulnerable to cross-site scripting | 2009-05-19T13:41+09:00 | 2009-05-19T13:41+09:00 |
| jvndb-2009-000027 | Sun GlassFish Enterprise Server and Sun Java System Application Server vulnerable to cross-site scripting | 2009-05-13T15:37+09:00 | 2009-05-13T15:37+09:00 |
| jvndb-2009-000026 | SQL injection vulnerability in SKIP from SKIP User Group | 2009-05-12T17:50+09:00 | 2009-05-12T17:50+09:00 |
| jvndb-2009-000025 | Cross-site scripting vulnerability in SKIP from SKIP User Group | 2009-05-12T17:50+09:00 | 2009-05-12T17:50+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:01464-1 | Security update for ImageMagick | 2025-05-29T09:33:48Z | 2025-05-29T09:33:48Z |
| suse-su-2025:01551-1 | Security update for go1.24 | 2025-05-29T09:29:35Z | 2025-05-29T09:29:35Z |
| suse-su-2025:20375-1 | Security update for libsoup | 2025-05-29T09:19:43Z | 2025-05-29T09:19:43Z |
| suse-su-2025:01537-1 | Security update for tomcat10 | 2025-05-29T09:04:24Z | 2025-05-29T09:04:24Z |
| suse-su-2025:01735-1 | Security update for wxWidgets-3_2 | 2025-05-29T04:11:02Z | 2025-05-29T04:11:02Z |
| suse-su-2025:01732-1 | Security update for python-tornado | 2025-05-28T14:44:51Z | 2025-05-28T14:44:51Z |
| suse-su-2025:01731-1 | Security update for go1.23-openssl | 2025-05-28T14:33:12Z | 2025-05-28T14:33:12Z |
| suse-su-2025:01729-1 | Security update for gstreamer-plugins-bad | 2025-05-28T14:28:45Z | 2025-05-28T14:28:45Z |
| suse-su-2025:01726-1 | Security update for python-tornado | 2025-05-28T13:46:00Z | 2025-05-28T13:46:00Z |
| suse-su-2025:01725-1 | Security update for gstreamer-plugins-bad | 2025-05-28T13:44:13Z | 2025-05-28T13:44:13Z |
| suse-su-2025:01724-1 | Security update for webkit2gtk3 | 2025-05-28T11:10:47Z | 2025-05-28T11:10:47Z |
| suse-su-2025:01723-1 | Security update for python39-setuptools | 2025-05-28T11:08:22Z | 2025-05-28T11:08:22Z |
| suse-su-2025:20367-1 | Security update for kernel-livepatch-MICRO-6-0_Update_2 | 2025-05-28T10:02:19Z | 2025-05-28T10:02:19Z |
| suse-su-2025:20351-1 | Security update for kernel-livepatch-MICRO-6-0_Update_2 | 2025-05-28T10:02:19Z | 2025-05-28T10:02:19Z |
| suse-su-2025:20366-1 | Security update for kernel-livepatch-MICRO-6-0_Update_5 | 2025-05-28T09:53:11Z | 2025-05-28T09:53:11Z |
| suse-su-2025:20350-1 | Security update for kernel-livepatch-MICRO-6-0_Update_5 | 2025-05-28T09:53:11Z | 2025-05-28T09:53:11Z |
| suse-su-2025:20349-1 | Security update for kernel-livepatch-MICRO-6-0_Update_3 | 2025-05-28T09:53:11Z | 2025-05-28T09:53:11Z |
| suse-su-2025:20364-1 | Security update for libxml2 | 2025-05-28T09:00:09Z | 2025-05-28T09:00:09Z |
| suse-su-2025:20363-1 | Security update for skopeo | 2025-05-28T08:56:42Z | 2025-05-28T08:56:42Z |
| suse-ru-2025:20362-1 | Recommended update for git | 2025-05-28T07:19:22Z | 2025-05-28T07:19:22Z |
| suse-su-2025:01720-1 | Security update for webkit2gtk3 | 2025-05-27T13:54:56Z | 2025-05-27T13:54:56Z |
| suse-su-2025:01718-1 | Security update for gstreamer-plugins-bad | 2025-05-27T12:53:43Z | 2025-05-27T12:53:43Z |
| suse-su-2025:01717-1 | Security update for gstreamer-plugins-bad | 2025-05-27T12:51:34Z | 2025-05-27T12:51:34Z |
| suse-su-2025:01716-1 | Security update for mariadb | 2025-05-27T12:44:03Z | 2025-05-27T12:44:03Z |
| suse-su-2025:01715-1 | Security update for python-setuptools | 2025-05-27T12:34:45Z | 2025-05-27T12:34:45Z |
| suse-su-2025:01713-1 | Security update for govulncheck-vulndb | 2025-05-27T10:04:35Z | 2025-05-27T10:04:35Z |
| suse-su-2025:20361-1 | Security update for glibc | 2025-05-27T09:35:37Z | 2025-05-27T09:35:37Z |
| suse-su-2025:20360-1 | Security update for docker | 2025-05-27T08:59:26Z | 2025-05-27T08:59:26Z |
| suse-su-2025:20359-1 | Security update for unbound | 2025-05-27T08:57:55Z | 2025-05-27T08:57:55Z |
| suse-su-2025:01710-1 | Security update for MozillaFirefox | 2025-05-26T17:33:49Z | 2025-05-26T17:33:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-27248 | WordPress List category posts plugin信息泄露漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27247 | WordPress Kleo plugin文件包含漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27246 | WordPress King Addons for Elementor plugin权限提升漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27245 | WordPress kallyas plugin跨站脚本漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27244 | WordPress kallyas plugin代码执行漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27243 | WordPress K Elements plugin跨站脚本漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27242 | WordPress Insert PHP Code Snippet plugin缺少授权漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27241 | WordPress Inactive Logout plugin跨站脚本漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27240 | WordPress Gutenberg plugin跨站脚本漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27239 | WordPress Groundhogg Plugin跨站脚本漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27238 | WordPress FuseWP plugin未授权修改数据漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27114 | Tenda AC10缓冲区溢出漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27063 | WordPress Folderly plugin未经授权的数据修改漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27062 | WordPress Flying Images plugin跨站脚本漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27061 | WordPress Essential Addons for Elementor plugin授权缺失漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27060 | WordPress ERI File Library plugin未授权数据访问漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27059 | WordPress Employee Spotlight plugin跨站脚本漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27058 | WordPress Document Library Lite plugin不当授权漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27057 | WordPress Depicter plugin跨站请求伪造漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27056 | WordPress Consulting plugin文件包含漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27055 | WordPress Consulting Elementor Widgets plugin文件包含漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27054 | WordPress Consulting Elementor Widgets plugin跨站脚本漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27053 | WordPress Community Events plugin跨站脚本漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27052 | WordPress Blocksy Companion Plugin跨站脚本漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27051 | WordPress Bard plugin跨站请求伪造漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27050 | WordPress AppPresser plugin未经授权的数据访问漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27049 | WordPress Analytify Pro plugin信息泄露漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-27048 | WordPress Advanced Database Cleaner plugin跨站请求伪造漏洞 | 2025-11-05 | 2025-11-06 |
| cnvd-2025-26891 | 多款Mozilla产品代码执行漏洞(CNVD-2025-26891) | 2025-09-18 | 2025-11-06 |
| cnvd-2025-26890 | 多款Mozilla产品欺骗漏洞(CNVD-2025-26890) | 2025-09-18 | 2025-11-06 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-avi-1093 | Multiples vulnérabilités dans Xen | 2024-12-18T00:00:00.000000 | 2024-12-18T00:00:00.000000 |
| certfr-2024-avi-1092 | Vulnérabilité dans Traefik | 2024-12-18T00:00:00.000000 | 2024-12-18T00:00:00.000000 |
| CERTFR-2024-AVI-1094 | Vulnérabilité dans les produits Elastic | 2024-12-18T00:00:00.000000 | 2024-12-18T00:00:00.000000 |
| CERTFR-2024-AVI-1093 | Multiples vulnérabilités dans Xen | 2024-12-18T00:00:00.000000 | 2024-12-18T00:00:00.000000 |
| CERTFR-2024-AVI-1092 | Vulnérabilité dans Traefik | 2024-12-18T00:00:00.000000 | 2024-12-18T00:00:00.000000 |
| certfr-2024-avi-1089 | Vulnérabilité dans les produits StormShield Management Center | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| certfr-2024-avi-1088 | Multiples vulnérabilités dans les produits Foxit | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| certfr-2024-avi-1087 | Vulnérabilité dans les produits Siemens | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| certfr-2024-avi-1086 | Multiples vulnérabilités dans Trend Micro Apex One | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| certfr-2024-avi-1085 | Multiples vulnérabilités dans Moodle | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| CERTFR-2024-AVI-1089 | Vulnérabilité dans les produits StormShield Management Center | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| CERTFR-2024-AVI-1088 | Multiples vulnérabilités dans les produits Foxit | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| CERTFR-2024-AVI-1087 | Vulnérabilité dans les produits Siemens | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| CERTFR-2024-AVI-1086 | Multiples vulnérabilités dans Trend Micro Apex One | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| CERTFR-2024-AVI-1085 | Multiples vulnérabilités dans Moodle | 2024-12-17T00:00:00.000000 | 2024-12-17T00:00:00.000000 |
| certfr-2024-avi-1084 | Vulnérabilité dans SolarWinds Web Help Desk | 2024-12-16T00:00:00.000000 | 2024-12-16T00:00:00.000000 |
| certfr-2024-avi-1083 | Multiples vulnérabilités dans Mozilla Thunderbird | 2024-12-16T00:00:00.000000 | 2024-12-16T00:00:00.000000 |
| certfr-2024-avi-1082 | Multiples vulnérabilités dans les produits Synology | 2024-12-16T00:00:00.000000 | 2024-12-16T00:00:00.000000 |
| CERTFR-2024-AVI-1084 | Vulnérabilité dans SolarWinds Web Help Desk | 2024-12-16T00:00:00.000000 | 2024-12-16T00:00:00.000000 |
| CERTFR-2024-AVI-1083 | Multiples vulnérabilités dans Mozilla Thunderbird | 2024-12-16T00:00:00.000000 | 2024-12-16T00:00:00.000000 |
| CERTFR-2024-AVI-1082 | Multiples vulnérabilités dans les produits Synology | 2024-12-16T00:00:00.000000 | 2024-12-16T00:00:00.000000 |
| certfr-2024-avi-1081 | Multiples vulnérabilités dans les produits IBM | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| certfr-2024-avi-1080 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| certfr-2024-avi-1079 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| certfr-2024-avi-1078 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| certfr-2024-avi-1077 | Multiples vulnérabilités dans Microsoft Edge | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| certfr-2024-avi-1076 | Multiples vulnérabilités dans Suricata | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| certfr-2024-avi-1075 | Multiples vulnérabilités dans Nagios XI | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| CERTFR-2024-AVI-1081 | Multiples vulnérabilités dans les produits IBM | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| CERTFR-2024-AVI-1080 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |