Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-61800 |
7.8 (3.1)
|
Dimension | Integer Overflow or Wraparound (CWE-190) |
Adobe |
Dimension |
2025-10-14T19:34:14.782Z | 2026-02-26T16:57:57.151Z |
| CVE-2025-61678 |
8.6 (4.0)
|
FreePBX Endpoint Manager vulnerable to authenticated a… |
FreePBX |
endpointman |
2025-10-14T19:33:29.934Z | 2026-02-26T16:57:57.778Z |
| CVE-2025-13027 |
8.1 (3.1)
|
Memory safety bugs fixed in Firefox 145 and Thunderbird 145 |
Mozilla |
Firefox |
2025-11-11T15:47:17.570Z | 2026-02-26T16:57:57.948Z |
| CVE-2025-12943 |
5.2 (4.0)
|
Improper certificate validation in firmware update log… |
NETGEAR |
RAX30 |
2025-11-11T16:17:44.766Z | 2026-02-26T16:57:57.314Z |
| CVE-2025-12942 |
4.8 (4.0)
|
Improper input validation in NETGEAR R6260 and R6850 |
NETGEAR |
R6260 |
2025-11-11T16:17:37.212Z | 2026-02-26T16:57:57.630Z |
| CVE-2025-61806 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Read (CWE-125) |
Adobe |
Substance3D - Stager |
2025-10-14T19:42:36.889Z | 2026-02-26T16:57:56.091Z |
| CVE-2025-61799 |
7.8 (3.1)
|
Dimension | Out-of-bounds Read (CWE-125) |
Adobe |
Dimension |
2025-10-14T19:34:16.394Z | 2026-02-26T16:57:56.424Z |
| CVE-2025-61798 |
7.8 (3.1)
|
Dimension | Out-of-bounds Read (CWE-125) |
Adobe |
Dimension |
2025-10-14T19:34:15.634Z | 2026-02-26T16:57:56.779Z |
| CVE-2025-33178 |
7.8 (3.1)
|
NVIDIA NeMo Framework for all platforms contains … |
NVIDIA |
NeMo Framework |
2025-11-11T16:18:39.568Z | 2026-02-26T16:57:56.263Z |
| CVE-2025-23361 |
7.8 (3.1)
|
NVIDIA NeMo Framework for all platforms contains … |
NVIDIA |
NeMo Framework |
2025-11-11T16:18:05.918Z | 2026-02-26T16:57:56.581Z |
| CVE-2025-12944 |
6.8 (4.0)
|
Improper input validation in NETGEAR DGN2200v4 |
NETGEAR |
DGN2200v4 |
2025-11-11T16:17:51.202Z | 2026-02-26T16:57:56.973Z |
| CVE-2025-61807 |
7.8 (3.1)
|
Substance3D - Stager | Integer Overflow or Wraparound … |
Adobe |
Substance3D - Stager |
2025-10-14T19:42:37.705Z | 2026-02-26T16:57:55.784Z |
| CVE-2025-61805 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Read (CWE-125) |
Adobe |
Substance3D - Stager |
2025-10-14T19:42:38.481Z | 2026-02-26T16:57:55.495Z |
| CVE-2025-61802 |
7.8 (3.1)
|
Substance3D - Stager | Use After Free (CWE-416) |
Adobe |
Substance3D - Stager |
2025-10-14T19:42:39.266Z | 2026-02-26T16:57:55.144Z |
| CVE-2025-20614 |
6.7 (3.1)
|
External control of file name or path for some In… |
n/a |
Intel(R) CIP software |
2025-11-11T16:49:35.660Z | 2026-02-26T16:57:55.346Z |
| CVE-2025-20050 |
6.7 (3.1)
|
Uncontrolled search path for some Intel(R) CIP so… |
n/a |
Intel(R) CIP software |
2025-11-11T16:49:30.208Z | 2026-02-26T16:57:55.652Z |
| CVE-2025-20010 |
7.8 (3.1)
|
Use of unmaintained third party components for so… |
n/a |
Intel(R) Processor Identification Utility |
2025-11-11T16:49:22.946Z | 2026-02-26T16:57:55.941Z |
| CVE-2025-61803 |
7.8 (3.1)
|
Substance3D - Stager | Integer Overflow or Wraparound … |
Adobe |
Substance3D - Stager |
2025-10-14T19:42:40.054Z | 2026-02-26T16:57:54.811Z |
| CVE-2025-54264 |
8.1 (3.1)
|
Adobe Commerce | Cross-site Scripting (Stored XSS) (CWE-79) |
Adobe |
Adobe Commerce |
2025-10-14T20:27:53.635Z | 2026-02-26T16:57:54.374Z |
| CVE-2025-54263 |
8.1 (3.1)
|
Adobe Commerce | Incorrect Authorization (CWE-863) |
Adobe |
Adobe Commerce |
2025-10-14T20:27:56.014Z | 2026-02-26T16:57:54.026Z |
| CVE-2025-24327 |
6.7 (3.1)
|
Insecure inherited permissions for some Intel(R) … |
n/a |
Intel(R) Rapid Storage Technology Application |
2025-11-11T16:49:45.543Z | 2026-02-26T16:57:54.194Z |
| CVE-2025-24307 |
2 (3.1)
|
Improper privilege management for some Intel(R) C… |
n/a |
Intel(R) CIP software |
2025-11-11T16:49:42.183Z | 2026-02-26T16:57:54.596Z |
| CVE-2025-24299 |
8.8 (3.1)
|
Improper input validation for some Intel(R) CIP s… |
n/a |
Intel(R) CIP software |
2025-11-11T16:49:40.532Z | 2026-02-26T16:57:54.973Z |
| CVE-2025-54267 |
6.5 (3.1)
|
Adobe Commerce | Incorrect Authorization (CWE-863) |
Adobe |
Adobe Commerce |
2025-10-14T20:27:57.566Z | 2026-02-26T16:57:53.711Z |
| CVE-2025-49553 |
9.3 (3.1)
|
Adobe Connect | Cross-site Scripting (DOM-based XSS) (… |
Adobe |
Adobe Connect |
2025-10-14T21:53:32.190Z | 2026-02-26T16:57:53.427Z |
| CVE-2025-49552 |
7.3 (3.1)
|
Adobe Connect | Cross-site Scripting (DOM-based XSS) (… |
Adobe |
Adobe Connect |
2025-10-14T21:53:32.953Z | 2026-02-26T16:57:53.111Z |
| CVE-2025-24838 |
8.8 (3.1)
|
Improper privilege management for some Intel(R) C… |
n/a |
Intel(R) CIP software |
2025-11-11T16:49:55.796Z | 2026-02-26T16:57:53.275Z |
| CVE-2025-24519 |
6.5 (3.1)
|
Buffer overflow for some Intel(R) QAT Windows sof… |
n/a |
Intel(R) QAT Windows software |
2025-11-11T16:49:52.249Z | 2026-02-26T16:57:53.575Z |
| CVE-2025-24491 |
6.7 (3.1)
|
Uncontrolled search path for some Intel(R) Killer… |
n/a |
Intel(R) Killer(TM) Performance Suite software |
2025-11-11T16:49:47.311Z | 2026-02-26T16:57:53.871Z |
| CVE-2025-61804 |
7.8 (3.1)
|
Animate | Heap-based Buffer Overflow (CWE-122) |
Adobe |
Animate |
2025-10-15T00:18:06.059Z | 2026-02-26T16:57:52.213Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-15351 |
7.8 (3.0)
|
Anritsu VectorStar CHX File Parsing Deserialization of… |
Anritsu |
VectorStar |
2026-01-23T03:31:31.696Z | 2026-01-23T19:04:54.797Z |
| CVE-2025-70149 |
9.8 (3.1)
|
CodeAstro Membership Management System 1.0 is vul… |
n/a |
n/a |
2026-02-18T00:00:00.000Z | 2026-02-18T18:28:23.173Z |
| CVE-2025-70150 |
9.8 (3.1)
|
CodeAstro Membership Management System 1.0 contai… |
n/a |
n/a |
2026-02-18T00:00:00.000Z | 2026-02-18T17:46:15.789Z |
| CVE-2024-55271 |
3.5 (3.1)
|
A Cross-Site Request Forgery (CSRF) vulnerability… |
n/a |
n/a |
2026-02-17T00:00:00.000Z | 2026-02-17T18:48:24.237Z |
| CVE-2026-20796 |
3.1 (3.1)
|
Time-of-check time-of-use vulnerability in common teams API |
Mattermost |
Mattermost |
2026-02-13T10:30:03.445Z | 2026-02-13T17:02:25.985Z |
| CVE-2026-26076 |
6.9 (4.0)
|
ntpd-rs affected by excessive CPU load from malformed … |
pendulum-project |
ntpd-rs |
2026-02-12T21:48:44.651Z | 2026-02-13T16:00:13.690Z |
| CVE-2025-70141 |
9.4 (3.1)
|
SourceCodester Customer Support System 1.0 contai… |
n/a |
n/a |
2026-02-18T00:00:00.000Z | 2026-02-18T18:31:26.903Z |
| CVE-2025-41738 |
7.5 (3.1)
|
CODESYS Control - Invalid type usage in visualization |
CODESYS |
CODESYS Control RTE (SL) |
2025-12-01T10:02:33.407Z | 2025-12-01T14:00:28.509Z |
| CVE-2026-26007 |
8.2 (4.0)
|
cryptography Subgroup Attack Due to Missing Subgroup V… |
pyca |
cryptography |
2026-02-10T21:42:56.471Z | 2026-02-11T21:28:47.345Z |
| CVE-2025-41700 |
7.8 (3.1)
|
CODESYS Development System - Deserialization of Untrus… |
CODESYS |
CODESYS Development System |
2025-12-01T10:02:47.312Z | 2025-12-01T13:59:26.310Z |
| CVE-2025-70296 |
5.4 (3.1)
|
A stored HTML injection vulnerability in the Reci… |
n/a |
n/a |
2026-02-11T00:00:00.000Z | 2026-02-12T21:02:53.317Z |
| CVE-2025-70297 |
6.1 (3.1)
|
A stored cross-site scripting (XSS) vulnerability… |
n/a |
n/a |
2026-02-11T00:00:00.000Z | 2026-02-12T21:04:08.214Z |
| CVE-2026-23476 |
5.4 (3.1)
|
FacturaScripts Affected by Reflected XSS |
NeoRazorX |
facturascripts |
2026-02-02T20:49:05.731Z | 2026-02-03T15:33:51.348Z |
| CVE-2025-69210 |
1.2 (4.0)
|
FacturaScripts vulnerable to Stored Cross-Site Scripti… |
NeoRazorX |
facturascripts |
2025-12-30T19:23:31.130Z | 2025-12-30T19:47:52.458Z |
| CVE-2026-23997 |
8 (3.1)
|
FacturaScripts has a Stored Cross-Site Scripting (XSS)… |
NeoRazorX |
facturascripts |
2026-02-02T20:19:45.182Z | 2026-02-03T15:06:30.329Z |
| CVE-2026-25513 |
8.3 (4.0)
|
FacturaScripts has SQL Injection vulnerability in API … |
NeoRazorX |
facturascripts |
2026-02-04T19:59:57.190Z | 2026-02-05T14:32:21.989Z |
| CVE-2026-25514 |
8.7 (4.0)
|
FacturaScripts has SQL Injection vulnerability in Auto… |
NeoRazorX |
facturascripts |
2026-02-04T19:59:54.847Z | 2026-02-05T14:32:26.569Z |
| CVE-2024-5462 |
5.3 (4.0)
|
Brocade Fabric OS may capture SNMP Passwords in clear text |
Brocade |
Brocade Fabric OS |
2025-02-14T23:48:54.368Z | 2025-02-18T16:26:54.617Z |
| CVE-2024-5461 |
8.6 (4.0)
|
Command or parameter injection via unique embedded swi… |
Brocade |
Brocade Fabric OS |
2025-02-15T00:06:56.950Z | 2025-09-09T18:59:55.320Z |
| CVE-2026-20141 |
4.3 (3.1)
|
Improper Access Control in Splunk Monitoring Console App |
Splunk |
Splunk Enterprise |
2026-02-18T16:45:21.436Z | 2026-02-18T17:56:35.360Z |
| CVE-2026-20142 |
6.8 (3.1)
|
Sensitive Information Disclosure in "_internal" index … |
Splunk |
Splunk Enterprise |
2026-02-18T16:45:37.455Z | 2026-02-26T14:44:16.319Z |
| CVE-2026-20144 |
6.8 (3.1)
|
Sensitive Information Disclosure in ''_internal'' inde… |
Splunk |
Splunk Enterprise |
2026-02-18T16:45:23.674Z | 2026-02-26T14:44:16.610Z |
| CVE-2025-69725 |
4.7 (3.1)
|
An Open Redirect vulnerability in the go-chi/chi … |
n/a |
n/a |
2026-02-19T00:00:00.000Z | 2026-02-23T13:58:39.270Z |
| CVE-2025-67305 |
9.8 (3.1)
|
In RUCKUS Network Director (RND) < 4.5.0.56, the … |
n/a |
n/a |
2026-02-19T00:00:00.000Z | 2026-02-23T14:06:57.026Z |
| CVE-2025-67304 |
9.8 (3.1)
|
In Ruckus Network Director (RND) < 4.5.0.54, the … |
n/a |
n/a |
2026-02-19T00:00:00.000Z | 2026-02-23T14:03:21.884Z |
| CVE-2025-55853 |
9.1 (3.1)
|
SoftVision webPDF before 10.0.2 is vulnerable to … |
n/a |
n/a |
2026-02-19T00:00:00.000Z | 2026-02-23T13:50:12.035Z |
| CVE-2026-2327 |
5.3 (3.1)
|
Versions of the package markdown-it from 13.0.0 a… |
n/a |
markdown-it |
2026-02-12T05:00:07.369Z | 2026-02-12T14:41:53.714Z |
| CVE-2025-15577 |
8.7 (4.0)
|
Valmet DNA Web server arbitrary file read access |
Valmet |
Valmet DNA Web Tools |
2026-02-12T06:04:56.536Z | 2026-02-16T13:29:46.519Z |
| CVE-2025-55018 |
5.2 (3.1)
|
An inconsistent interpretation of http requests (… |
Fortinet |
FortiOS |
2026-02-10T15:39:12.431Z | 2026-02-27T08:54:42.027Z |
| CVE-2026-27502 |
5.1 (4.0)
6.1 (3.1)
|
SVXportal <= 2.5 log.php Search Reflected XSS |
sa2blv |
SVXportal |
2026-02-20T16:48:24.010Z | 2026-02-20T20:12:00.277Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-41700 | An unauthenticated attacker can trick a local user into executing arbitrary code by opening a delib… | 2025-12-01T10:16:00.440 | 2026-02-23T15:35:10.653 |
| fkie_cve-2025-70296 | A stored HTML injection vulnerability in the Recipe Notes rendering component in Mealie 3.3.1 allow… | 2026-02-11T19:15:50.580 | 2026-02-23T15:34:31.483 |
| fkie_cve-2025-70297 | A stored cross-site scripting (XSS) vulnerability in the recipe asset upload and media serving comp… | 2026-02-11T19:15:50.690 | 2026-02-23T15:33:59.703 |
| fkie_cve-2026-23476 | FacturaScripts is open-source enterprise resource planning and accounting software. Prior to 2025.8… | 2026-02-02T23:16:07.030 | 2026-02-23T15:32:54.620 |
| fkie_cve-2025-69210 | FacturaScripts is open-source enterprise resource planning and accounting software. Prior to versio… | 2025-12-30T20:16:01.697 | 2026-02-23T15:23:12.360 |
| fkie_cve-2026-23997 | FacturaScripts is open-source enterprise resource planning and accounting software. In 2025.71 and … | 2026-02-02T23:16:07.347 | 2026-02-23T15:07:15.160 |
| fkie_cve-2026-25513 | FacturaScripts is open-source enterprise resource planning and accounting software. Prior to versio… | 2026-02-04T20:16:07.973 | 2026-02-23T15:02:32.667 |
| fkie_cve-2026-25514 | FacturaScripts is open-source enterprise resource planning and accounting software. Prior to versio… | 2026-02-04T20:16:08.113 | 2026-02-23T15:00:00.237 |
| fkie_cve-2024-5462 | If Brocade Fabric OS before Fabric OS 9.2.0 configuration settings are not set to encrypt SNMP pass… | 2025-02-15T00:15:13.650 | 2026-02-23T14:56:40.837 |
| fkie_cve-2024-5461 | Implementation of the Simple Network Management Protocol (SNMP) operating on the Brocade 6547 (FC5… | 2025-02-15T00:15:13.513 | 2026-02-23T14:53:15.870 |
| fkie_cve-2026-20141 | In Splunk Enterprise versions below 10.0.2, 10.0.3, 9.4.8, and 9.3.9, a low-privileged user who doe… | 2026-02-18T18:24:26.827 | 2026-02-23T14:46:16.627 |
| fkie_cve-2026-20142 | In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11, a user of a Splunk Se… | 2026-02-18T18:24:28.053 | 2026-02-23T14:44:34.597 |
| fkie_cve-2026-20144 | In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.8, and 9.2.11, and Splunk Cloud Plat… | 2026-02-18T18:24:29.220 | 2026-02-23T14:43:22.443 |
| fkie_cve-2025-69725 | An Open Redirect vulnerability in the go-chi/chi >=5.2.2 RedirectSlashes function allows remote att… | 2026-02-19T17:24:39.830 | 2026-02-23T14:16:21.360 |
| fkie_cve-2025-67305 | In RUCKUS Network Director (RND) < 4.5.0.56, the OVA appliance contains hardcoded SSH keys for the … | 2026-02-19T21:18:28.487 | 2026-02-23T14:16:20.870 |
| fkie_cve-2025-67304 | In Ruckus Network Director (RND) < 4.5.0.54, the OVA appliance contains hardcoded credentials for t… | 2026-02-19T20:25:24.373 | 2026-02-23T14:16:20.680 |
| fkie_cve-2025-55853 | SoftVision webPDF before 10.0.2 is vulnerable to Server-Side Request Forgery (SSRF). The PDF conver… | 2026-02-19T15:16:11.190 | 2026-02-23T14:16:20.493 |
| fkie_cve-2026-2327 | Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Express… | 2026-02-12T06:16:02.243 | 2026-02-23T14:08:11.870 |
| fkie_cve-2025-15577 | An unauthenticated attacker can exploit this vulnerability by manipulating URL to achieve arbitrary… | 2026-02-12T07:15:56.400 | 2026-02-23T14:05:23.027 |
| fkie_cve-2025-55018 | An inconsistent interpretation of http requests ('http request smuggling') vulnerability in Fortine… | 2026-02-10T16:16:08.913 | 2026-02-23T14:02:30.417 |
| fkie_cve-2026-27502 | SVXportal version 2.5 and prior contain a reflected cross-site scripting vulnerability in log.php v… | 2026-02-20T17:25:56.750 | 2026-02-23T13:59:18.180 |
| fkie_cve-2026-27503 | SVXportal version 2.5 and prior contain a reflected cross-site scripting vulnerability in admin/log… | 2026-02-20T17:25:56.920 | 2026-02-23T13:58:42.027 |
| fkie_cve-2026-27504 | SVXportal version 2.5 and prior contain a reflected cross-site scripting vulnerability in radiomobi… | 2026-02-20T17:25:57.087 | 2026-02-23T13:57:52.463 |
| fkie_cve-2026-27505 | SVXportal version 2.5 and prior contain a stored cross-site scripting vulnerability in the user reg… | 2026-02-20T17:25:57.253 | 2026-02-23T13:56:05.413 |
| fkie_cve-2026-27506 | SVXportal version 2.5 and prior contain a stored cross-site scripting vulnerability in the user pro… | 2026-02-20T17:25:57.410 | 2026-02-23T13:55:30.903 |
| fkie_cve-2013-6662 | Google Chrome caches TLS sessions before certificate validation occurs. | 2017-04-13T17:59:00.247 | 2026-02-23T13:55:21.130 |
| fkie_cve-2022-40011 | Typora through 1.3.8 allows XSS if a document containing an SVG element with an attacker-controlled… | 2022-12-23T23:15:08.917 | 2026-02-23T13:54:46.547 |
| fkie_cve-2026-26325 | OpenClaw is a personal AI assistant. Prior to version 2026.2.14, a mismatch between `rawCommand` an… | 2026-02-19T23:16:25.800 | 2026-02-23T13:47:10.610 |
| fkie_cve-2026-26326 | OpenClaw is a personal AI assistant. Prior to version 2026.2.14, `skills.status` could disclose sec… | 2026-02-19T23:16:25.950 | 2026-02-23T13:46:15.530 |
| fkie_cve-2026-26327 | OpenClaw is a personal AI assistant. Discovery beacons (Bonjour/mDNS and DNS-SD) include TXT record… | 2026-02-19T23:16:26.100 | 2026-02-23T13:44:36.753 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-rp48-fq7w-35g6 |
|
In the Linux kernel, the following vulnerability has been resolved: dpll: Prevent duplicate regist… | 2026-02-14T15:32:19Z | 2026-02-14T15:32:19Z |
| ghsa-fxmr-wvvq-356h |
|
In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix … | 2026-02-14T15:32:19Z | 2026-02-14T15:32:19Z |
| ghsa-crj3-7xqp-x3m2 |
|
In the Linux kernel, the following vulnerability has been resolved: sctp: move SCTP_CMD_ASSOC_SHKE… | 2026-02-14T15:32:19Z | 2026-02-14T15:32:19Z |
| ghsa-7jxv-w4j5-p37v |
|
In the Linux kernel, the following vulnerability has been resolved: arm64: Set __nocfi on swsusp_a… | 2026-02-14T15:32:19Z | 2026-02-14T15:32:19Z |
| ghsa-6mvr-5ch7-jjjq |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dead lock wh… | 2026-02-14T15:32:19Z | 2026-02-14T15:32:19Z |
| ghsa-5pm5-3fx7-4f4r |
|
In the Linux kernel, the following vulnerability has been resolved: perf: Fix refcount warning on … | 2026-02-14T15:32:19Z | 2026-02-14T15:32:19Z |
| ghsa-528j-v6ch-qq32 |
|
In the Linux kernel, the following vulnerability has been resolved: ipv6: annotate data-race in nd… | 2026-02-14T15:32:19Z | 2026-02-14T15:32:19Z |
| ghsa-2wj2-8hhp-h6hm |
|
In the Linux kernel, the following vulnerability has been resolved: netdevsim: fix a race issue re… | 2026-02-14T15:32:19Z | 2026-02-14T15:32:19Z |
| ghsa-x5p5-6q7q-gj33 |
|
In the Linux kernel, the following vulnerability has been resolved: interconnect: debugfs: initial… | 2026-02-14T15:32:18Z | 2026-02-14T15:32:18Z |
| ghsa-p8gw-hvf3-xmc4 |
|
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix data-race warning a… | 2026-02-14T15:32:18Z | 2026-02-14T15:32:18Z |
| ghsa-mwgw-4c23-7465 |
|
In the Linux kernel, the following vulnerability has been resolved: serial: Fix not set tty->port … | 2026-02-14T15:32:18Z | 2026-02-14T15:32:18Z |
| ghsa-j2h6-x5fv-586q |
|
In the Linux kernel, the following vulnerability has been resolved: igc: Reduce TSN TX packet buff… | 2026-02-14T15:32:18Z | 2026-02-14T15:32:18Z |
| ghsa-h3v4-524h-5jpx |
|
In the Linux kernel, the following vulnerability has been resolved: mISDN: annotate data-race arou… | 2026-02-14T15:32:18Z | 2026-02-14T15:32:18Z |
| ghsa-g579-pq4g-x964 |
|
In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: ptrace: Fix SVE … | 2026-02-14T15:32:18Z | 2026-02-14T15:32:18Z |
| ghsa-ccr5-8c2w-j2f4 |
|
In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: check IO_WQ_BI… | 2026-02-14T15:32:18Z | 2026-02-14T15:32:18Z |
| ghsa-8jcj-2cc9-ghpj |
|
In the Linux kernel, the following vulnerability has been resolved: bonding: provide a net pointer… | 2026-02-14T15:32:18Z | 2026-02-14T15:32:18Z |
| ghsa-6pp9-r78q-5hwx |
|
In the Linux kernel, the following vulnerability has been resolved: ice: add missing ice_deinit_hw… | 2026-02-14T15:32:18Z | 2026-02-14T15:32:18Z |
| ghsa-5ggv-7qrf-gvxf |
|
In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-of-dwcmshc: Prevent… | 2026-02-14T15:32:18Z | 2026-02-14T15:32:18Z |
| ghsa-44pj-mggw-c3m7 |
|
In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: Remo… | 2026-02-14T15:32:18Z | 2026-02-14T15:32:18Z |
| ghsa-3w5h-8286-m3qw |
|
In the Linux kernel, the following vulnerability has been resolved: l2tp: avoid one data-race in l… | 2026-02-14T15:32:18Z | 2026-02-14T15:32:18Z |
| ghsa-gvj8-q7mf-wvgw |
6.4 (3.1)
|
The Essential Addons for Elementor – Popular Elementor Templates & Widgets plugin for WordPress is … | 2026-02-14T12:30:26Z | 2026-02-14T12:30:26Z |
| ghsa-6jhh-8c75-gvr4 |
4.3 (3.1)
|
The Media Library Folders plugin for WordPress is vulnerable to Insecure Direct Object Reference in… | 2026-02-14T12:30:26Z | 2026-02-14T12:30:26Z |
| ghsa-wcg8-g6m5-jgh5 |
5.4 (3.1)
|
The Scheduler Widget plugin for WordPress is vulnerable to Insecure Direct Object Reference in all … | 2026-02-14T09:31:33Z | 2026-02-14T09:31:34Z |
| ghsa-pr25-8xv2-wpjq |
4.9 (3.1)
|
The Mail Mint plugin for WordPress is vulnerable to blind SQL Injection via the 'forms', 'automatio… | 2026-02-14T09:31:34Z | 2026-02-14T09:31:34Z |
| ghsa-mv6c-jc9c-qq2q |
6.4 (3.1)
|
The myCred plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mycr… | 2026-02-14T09:31:33Z | 2026-02-14T09:31:34Z |
| ghsa-jwgq-qf3x-8r62 |
7.2 (3.1)
|
The Super Page Cache plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Acti… | 2026-02-14T09:31:34Z | 2026-02-14T09:31:34Z |
| ghsa-92mm-wrj7-g7r7 |
4.3 (3.1)
|
The Modula Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to authori… | 2026-02-14T09:31:34Z | 2026-02-14T09:31:34Z |
| ghsa-5899-42j8-fxpr |
5.0 (3.1)
|
The MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulne… | 2026-02-14T09:31:34Z | 2026-02-14T09:31:34Z |
| ghsa-xhwg-m969-356h |
7.5 (3.1)
|
The PhotoStack Gallery plugin for WordPress is vulnerable to SQL Injection via the 'postid' paramet… | 2026-02-14T09:31:33Z | 2026-02-14T09:31:33Z |
| ghsa-x6ph-vfh4-48q4 |
9.8 (3.1)
|
The Truelysell Core plugin for WordPress is vulnerable to privilege escalation in versions less tha… | 2026-02-14T09:31:33Z | 2026-02-14T09:31:33Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2014-9 |
|
Incomplete blacklist vulnerability in the lxml.html.clean module in lxml before 3.3.5 all… | lxml | 2014-05-14T19:55:00Z | 2021-07-05T00:01:22.415943Z |
| pysec-2014-8 |
|
The default configuration for bccache.FileSystemBytecodeCache in Jinja2 before 2.7.2 does… | jinja2 | 2014-05-19T14:55:00Z | 2021-07-05T00:01:22.043149Z |
| pysec-2013-6 |
|
Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.… | moin | 2013-01-03T01:55:00Z | 2021-07-05T00:01:22.974248Z |
| pysec-2013-5 |
|
Directory traversal vulnerability in the _do_attachment_move function in the AttachFile a… | moin | 2013-01-03T01:55:00Z | 2021-07-05T00:01:22.941193Z |
| pysec-2011-6 |
|
Cross-site scripting (XSS) vulnerability in the reStructuredText (rst) parser in parser/t… | moin | 2011-02-22T18:00:00Z | 2021-07-05T00:01:22.907058Z |
| pysec-2010-3 |
|
The default configuration of cfg.packagepages_actions_excluded in MoinMoin before 1.8.7 d… | moin | 2010-02-26T19:30:00Z | 2021-07-05T00:01:22.874295Z |
| pysec-2010-2 |
|
MoinMoin before 1.8.7 and 1.9.x before 1.9.2 does not properly sanitize user profiles, wh… | moin | 2010-02-26T19:30:00Z | 2021-07-05T00:01:22.841909Z |
| pysec-2010-1 |
|
Mako before 0.3.4 relies on the cgi.escape function in the Python standard library for cr… | mako | 2010-07-02T19:00:00Z | 2021-07-05T00:01:22.516270Z |
| pysec-2019-152 |
|
A vulnerability was found in openstack-ironic-inspector all versions excluding 5.0.2, 6.0… | ironic-inspector | 2019-07-30T17:15:00Z | 2021-07-05T00:01:21.998814Z |
| pysec-2019-151 |
|
send_email in graphite-web/webapp/graphite/composer/views.py in Graphite through 1.1.5 is… | graphite-web | 2019-10-11T23:15:00Z | 2021-07-05T00:01:21.806042Z |
| pysec-2017-15 |
|
The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cros… | html5lib | 2017-02-22T16:59:00Z | 2021-07-05T00:01:21.869008Z |
| pysec-2017-14 |
|
The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cros… | html5lib | 2017-02-22T16:59:00Z | 2021-07-05T00:01:21.837127Z |
| pysec-2017-13 |
|
FedMsg 0.18.1 and older is vulnerable to a message validation flaw resulting in message v… | fedmsg | 2017-07-17T13:18:00Z | 2021-07-05T00:01:21.573658Z |
| pysec-2017-12 |
|
Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute… | dulwich | 2017-10-29T20:29:00Z | 2021-07-05T00:01:21.470158Z |
| pysec-2013-4 |
|
Multiple cross-site scripting (XSS) vulnerabilities in Graphite before 0.9.11 allow remot… | graphite-web | 2013-09-27T10:08:00Z | 2021-07-05T00:01:21.777451Z |
| pysec-2013-3 |
|
The renderLocalView function in render/views.py in graphite-web in Graphite 0.9.5 through… | graphite-web | 2013-09-27T10:08:00Z | 2021-07-05T00:01:21.746777Z |
| pysec-2017-9 |
|
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input … | django | 2017-04-04T17:59:00Z | 2021-07-05T00:01:20.658989Z |
| pysec-2017-10 |
|
A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 bef… | django | 2017-04-04T17:59:00Z | 2021-07-05T00:01:20.782735Z |
| pysec-2016-3 |
|
The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a s… | django | 2016-10-03T18:59:00Z | 2021-07-05T00:01:20.518242Z |
| pysec-2015-10 |
|
Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 use… | django | 2015-07-14T17:59:00Z | 2021-07-05T00:01:20.182098Z |
| pysec-2015-8 |
|
Cross-site scripting (XSS) vulnerability in the contents function in admin/helpers.py in … | django | 2015-03-12T14:59:00Z | 2021-07-05T00:01:19.894697Z |
| pysec-2015-7 |
|
ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_… | django | 2015-01-16T16:59:00Z | 2021-07-05T00:01:19.802913Z |
| pysec-2015-6 |
|
The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.… | django | 2015-01-16T16:59:00Z | 2021-07-05T00:01:19.682404Z |
| pysec-2015-5 |
|
The django.util.http.is_safe_url function in Django before 1.4.18, 1.6.x before 1.6.10, a… | django | 2015-01-16T16:59:00Z | 2021-07-05T00:01:19.540383Z |
| pysec-2015-4 |
|
Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers… | django | 2015-01-16T16:59:00Z | 2021-07-05T00:01:19.325962Z |
| pysec-2014-7 |
|
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9,… | django | 2014-08-26T14:55:00Z | 2021-07-05T00:01:19.203370Z |
| pysec-2014-6 |
|
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.… | django | 2014-08-26T14:55:00Z | 2021-07-05T00:01:19.085708Z |
| pysec-2014-5 |
|
The default configuration for the file upload handling system in Django before 1.4.14, 1.… | django | 2014-08-26T14:55:00Z | 2021-07-05T00:01:18.973883Z |
| pysec-2014-4 |
|
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x… | django | 2014-08-26T14:55:00Z | 2021-07-05T00:01:18.862505Z |
| pysec-2014-3 |
|
The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field clas… | django | 2014-04-23T15:55:00Z | 2021-07-05T00:01:18.748183Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-3408 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.140045Z |
| gsd-2024-3407 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.413703Z |
| gsd-2024-3406 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.258113Z |
| gsd-2024-3405 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.054613Z |
| gsd-2024-3404 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.145852Z |
| gsd-2024-3403 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.402703Z |
| gsd-2024-3402 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.303228Z |
| gsd-2024-3401 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.421566Z |
| gsd-2024-3400 | A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-… | 2024-04-11T05:03:27.203461Z |
| gsd-2024-3399 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.146463Z |
| gsd-2024-3398 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.169704Z |
| gsd-2024-3397 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.041818Z |
| gsd-2024-3396 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.102005Z |
| gsd-2024-3395 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.172818Z |
| gsd-2024-3394 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.221379Z |
| gsd-2024-3393 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.097463Z |
| gsd-2024-3392 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.116961Z |
| gsd-2024-3391 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.134890Z |
| gsd-2024-3390 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.293304Z |
| gsd-2024-3389 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.267136Z |
| gsd-2024-3388 | A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enable… | 2024-04-11T05:03:27.133926Z |
| gsd-2024-3387 | A weak (low bit strength) device certificate in Palo Alto Networks Panorama software enab… | 2024-04-11T05:03:27.048508Z |
| gsd-2024-3386 | An incorrect string comparison vulnerability in Palo Alto Networks PAN-OS software preven… | 2024-04-11T05:03:27.242248Z |
| gsd-2024-3385 | A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote atta… | 2024-04-11T05:03:27.290920Z |
| gsd-2024-3384 | A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot… | 2024-04-11T05:03:27.078070Z |
| gsd-2024-3383 | A vulnerability in how Palo Alto Networks PAN-OS software processes data received from Cl… | 2024-04-11T05:03:27.257299Z |
| gsd-2024-3382 | A memory leak exists in Palo Alto Networks PAN-OS software that enables an attacker to se… | 2024-04-11T05:03:27.263916Z |
| gsd-2024-3381 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.056344Z |
| gsd-2024-3380 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.090971Z |
| gsd-2024-3379 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.106995Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191712 | Malicious code in d1snakegame (PyPI) | 2025-10-03T16:11:50Z | 2025-12-31T02:45:15Z |
| mal-2025-191711 | Malicious code in d1n0exploitaaaa (PyPI) | 2025-11-14T17:22:10Z | 2025-12-31T02:45:15Z |
| mal-2025-191709 | Malicious code in cti-ctf-challenges (PyPI) | 2025-09-09T17:40:01Z | 2025-12-31T02:45:15Z |
| mal-2025-191708 | Malicious code in crto5 (PyPI) | 2025-07-14T16:42:19Z | 2025-12-31T02:45:15Z |
| mal-2025-191704 | Malicious code in computestpspeedcomp (PyPI) | 2025-02-13T13:18:05Z | 2025-12-31T02:45:15Z |
| mal-2025-191702 | Malicious code in chromifypro (PyPI) | 2025-11-07T22:43:23Z | 2025-12-31T02:45:15Z |
| mal-2025-191699 | Malicious code in chat-prompt-logger (PyPI) | 2025-11-30T00:34:30Z | 2025-12-31T02:45:15Z |
| mal-2025-191698 | Malicious code in callistopy (PyPI) | 2025-07-05T10:23:57Z | 2025-12-31T02:45:15Z |
| mal-2025-191694 | Malicious code in bprintoor (PyPI) | 2025-02-13T13:18:05Z | 2025-12-31T02:45:15Z |
| mal-2025-191689 | Malicious code in backtradingbot (PyPI) | 2025-07-31T08:37:38Z | 2025-12-31T02:45:15Z |
| mal-2025-191688 | Malicious code in axonify (PyPI) | 2025-03-18T09:49:12Z | 2025-12-31T02:45:15Z |
| mal-2025-191686 | Malicious code in aws-enumerateiam (PyPI) | 2025-11-18T23:47:36Z | 2025-12-31T02:45:15Z |
| mal-2025-191681 | Malicious code in anothertestproject (PyPI) | 2025-10-08T12:45:34Z | 2025-12-31T02:45:15Z |
| mal-2025-191678 | Malicious code in amd-taichi (PyPI) | 2025-09-15T14:34:20Z | 2025-12-31T02:45:15Z |
| mal-2025-191674 | Malicious code in aiogram-msgeffect (PyPI) | 2025-11-22T16:25:53Z | 2025-12-31T02:45:15Z |
| mal-2025-191658 | Malicious code in richx (PyPI) | 2025-10-31T13:39:17Z | 2025-12-31T02:45:15Z |
| mal-2025-191655 | Malicious code in rando0192490 (PyPI) | 2025-10-19T16:48:34Z | 2025-12-31T02:45:15Z |
| mal-2025-191653 | Malicious code in ptxcompiler (PyPI) | 2025-10-17T15:20:16Z | 2025-12-31T02:45:15Z |
| mal-2025-191651 | Malicious code in my-first-pypi-demo (PyPI) | 2025-08-20T16:33:25Z | 2025-12-31T02:45:15Z |
| mal-2025-191650 | Malicious code in musl-dev (PyPI) | 2025-10-16T09:20:43Z | 2025-12-31T02:45:15Z |
| mal-2025-191649 | Malicious code in md5-en (PyPI) | 2025-10-15T20:24:59Z | 2025-12-31T02:45:15Z |
| mal-2025-191647 | Malicious code in mcp-runcommand-server (PyPI) | 2025-10-10T10:05:00Z | 2025-12-31T02:45:15Z |
| mal-2025-191646 | Malicious code in makronlox (PyPI) | 2025-10-16T20:06:59Z | 2025-12-31T02:45:15Z |
| mal-2025-191644 | Malicious code in lbank-connector-pythons (PyPI) | 2025-10-22T12:45:32Z | 2025-12-31T02:45:15Z |
| mal-2025-191643 | Malicious code in krisp-audio (PyPI) | 2025-11-02T16:54:07Z | 2025-12-31T02:45:15Z |
| mal-2025-191640 | Malicious code in install-all-setup (PyPI) | 2025-10-29T21:52:42Z | 2025-12-31T02:45:15Z |
| mal-2025-191636 | Malicious code in humunculous591014 (PyPI) | 2025-10-19T16:45:19Z | 2025-12-31T02:45:15Z |
| mal-2025-191634 | Malicious code in humunculous5910 (PyPI) | 2025-10-19T16:57:22Z | 2025-12-31T02:45:15Z |
| mal-2025-191631 | Malicious code in hexdecpy (PyPI) | 2025-10-24T21:59:02Z | 2025-12-31T02:45:15Z |
| mal-2025-191630 | Malicious code in hexdecli (PyPI) | 2025-10-25T16:03:26Z | 2025-12-31T02:45:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0341 | Fortinet FortiWeb: Mehrere Schwachstellen ermöglichen Ausführung von Kommandos | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0340 | Fortinet FortiAnalyzer und FortiManager: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0339 | Fortinet FortiAnalyzer: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0338 | Adobe Creative Cloud Applikationen: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0337 | Adobe Magento: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0335 | Microsoft Apps (Outlook und PC Manager): Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0334 | Microsoft Azure (Network Watcher und HPC Pack): Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0333 | Microsoft Visual Studio und Visual Studio Code: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0332 | Microsoft Surface: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0330 | Intel Driver and Support Assistant: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0328 | Intel BMC Server Firmware: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0326 | Intel Server M50FCP Family BIOS: Schwachstelle ermöglicht Privilegieneskalation | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0322 | Adobe Photoshop Elements: Schwachstelle ermöglicht Privilegieneskalation | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0321 | Fortinet FortiOS und FortiProxy: Schwachstelle ermöglicht Codeausführung | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0319 | Fortinet FortiOS: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0318 | Insyde UEFI Firmware: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0317 | JetBrains TeamCity: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0315 | Ivanti Cloud Services Appliance: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0190 | Cacti: Mehrere Schwachstellen | 2025-01-26T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0070 | Fortinet FortiOS: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-01-14T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2024-3686 | Drupal: Mehrere Schwachstellen ermöglichen | 2024-12-11T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2024-3418 | Intel Firmware: Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2024-3088 | Cacti: Mehrere Schwachstellen | 2024-10-06T22:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2024-1700 | Internet Systems Consortium BIND: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-07-23T22:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2024-1506 | Dell BSAFE: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-07-02T22:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2023-1754 | IBM InfoSphere Information Server: Mehrere Schwachstellen | 2023-07-16T22:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2022-1575 | wget: Schwachstelle ermöglicht Offenlegung von Informationen | 2021-04-28T22:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2022-1115 | QEMU: Schwachstelle ermöglicht Denial of Service | 2021-06-20T22:00:00.000+00:00 | 2025-02-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0313 | Siemens SIPROTEC: Mehrere Schwachstellen | 2025-02-10T23:00:00.000+00:00 | 2025-02-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0312 | Siemens SIMATIC S7: Mehrere Schwachstellen | 2025-02-10T23:00:00.000+00:00 | 2025-02-10T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:4464 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.10.4 security updates and bug fixes | 2024-07-10T19:53:51+00:00 | 2026-02-27T03:13:51+00:00 |
| rhsa-2024:4269 | Red Hat Security Advisory: OpenShift Virtualization 4.12.12 Images security update | 2024-07-02T15:00:47+00:00 | 2026-02-27T03:13:44+00:00 |
| rhsa-2024:3989 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | 2024-06-20T00:34:55+00:00 | 2026-02-27T03:13:31+00:00 |
| rhsa-2024:3920 | Red Hat Security Advisory: Migration Toolkit for Runtimes security, bug fix and enhancement update | 2024-06-13T11:02:36+00:00 | 2026-02-27T03:13:29+00:00 |
| rhsa-2024:3473 | Red Hat Security Advisory: OpenShift Virtualization 4.14.6 Images security update | 2024-05-29T15:48:02+00:00 | 2026-02-27T03:13:11+00:00 |
| rhsa-2024:3314 | Red Hat Security Advisory: OpenShift Virtualization 4.15.2 Images security update | 2024-05-23T06:29:37+00:00 | 2026-02-27T03:13:11+00:00 |
| rhsa-2024:11023 | Red Hat Security Advisory: HawtIO 4.1.0 for Red Hat build of Apache Camel 4 Release and security update. | 2024-12-12T20:00:23+00:00 | 2026-02-27T03:12:29+00:00 |
| rhsa-2024:1321 | Red Hat Security Advisory: ACS 4.3 enhancement and security update | 2024-03-13T20:55:36+00:00 | 2026-02-27T03:12:27+00:00 |
| rhsa-2024:10908 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.7 | 2024-12-10T08:27:47+00:00 | 2026-02-27T03:12:24+00:00 |
| rhsa-2024:10517 | Red Hat Security Advisory: OpenShift Container Platform 4.17.7 security and extras update | 2024-12-03T08:24:26+00:00 | 2026-02-27T03:12:11+00:00 |
| rhsa-2024:0719 | Red Hat Security Advisory: Migration Toolkit for Runtimes security, bug fix and enhancement update | 2024-02-07T15:32:23+00:00 | 2026-02-27T03:12:07+00:00 |
| rhsa-2023:7222 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.2 security and bug fix update | 2023-11-15T01:25:46+00:00 | 2026-02-27T03:11:46+00:00 |
| rhsa-2023:5488 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update | 2023-10-05T20:18:28+00:00 | 2026-02-27T03:11:43+00:00 |
| rhsa-2023:5486 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update on RHEL 9 | 2023-10-06T03:41:07+00:00 | 2026-02-27T03:11:42+00:00 |
| rhsa-2023:5485 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update on RHEL 8 | 2023-10-06T07:21:50+00:00 | 2026-02-27T03:11:34+00:00 |
| rhsa-2023:5484 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update on RHEL 7 | 2023-10-05T20:23:52+00:00 | 2026-02-27T03:11:32+00:00 |
| rhsa-2023:5379 | Red Hat Security Advisory: Network Observability 1.4.0 for OpenShift | 2023-09-28T02:59:49+00:00 | 2026-02-27T03:11:30+00:00 |
| rhsa-2023:5363 | Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update | 2023-09-26T14:56:16+00:00 | 2026-02-27T03:11:27+00:00 |
| rhsa-2023:5362 | Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update | 2023-09-26T15:05:53+00:00 | 2026-02-27T03:11:26+00:00 |
| rhsa-2023:5361 | Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update | 2023-09-26T14:56:14+00:00 | 2026-02-27T03:11:23+00:00 |
| rhsa-2023:5360 | Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update | 2023-09-26T14:59:37+00:00 | 2026-02-27T03:11:22+00:00 |
| rhsa-2023:4341 | Red Hat Security Advisory: Logging Subsystem 5.7.4 - Red Hat OpenShift bug fix and security update | 2023-08-02T13:49:36+00:00 | 2026-02-27T03:11:13+00:00 |
| rhsa-2023:3998 | Red Hat Security Advisory: Logging Subsystem 5.7.3 - Red Hat OpenShift security update | 2023-07-12T17:58:01+00:00 | 2026-02-27T03:11:10+00:00 |
| rhsa-2022:2265 | Red Hat Security Advisory: OpenShift Container Platform 4.6.58 security and extras update | 2022-05-26T20:06:24+00:00 | 2026-02-27T03:09:14+00:00 |
| rhsa-2022:1699 | Red Hat Security Advisory: OpenShift Container Platform 4.7.50 security update | 2022-05-12T18:05:11+00:00 | 2026-02-27T03:09:10+00:00 |
| rhsa-2022:1622 | Red Hat Security Advisory: OpenShift Container Platform 4.6.57 security and extras update | 2022-05-04T09:05:42+00:00 | 2026-02-27T03:09:06+00:00 |
| rhsa-2022:1370 | Red Hat Security Advisory: OpenShift Container Platform 4.8.37 security and extras update | 2022-04-20T12:18:41+00:00 | 2026-02-27T03:09:02+00:00 |
| rhsa-2022:1363 | Red Hat Security Advisory: OpenShift Container Platform 4.9.29 bug fix and security update | 2022-04-20T14:43:46+00:00 | 2026-02-27T03:08:53+00:00 |
| rhsa-2022:1357 | Red Hat Security Advisory: OpenShift Container Platform 4.10.10 security and extras update | 2022-04-20T11:41:10+00:00 | 2026-02-27T03:08:44+00:00 |
| rhsa-2022:0041 | Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update | 2022-01-06T18:43:03+00:00 | 2026-02-27T03:08:40+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-21-112-01 | Horner Automation Cscape | 2021-04-22T00:00:00.000000Z | 2021-04-22T00:00:00.000000Z |
| icsa-21-110-06 | Eaton Intelligent Power Manager | 2021-04-20T00:00:00.000000Z | 2021-04-20T00:00:00.000000Z |
| icsa-21-110-05 | Delta Electronics CNCSoft-B | 2021-04-20T00:00:00.000000Z | 2021-04-20T00:00:00.000000Z |
| icsa-21-110-04 | Delta Electronics CNCSoft ScreenEditor | 2021-04-20T00:00:00.000000Z | 2021-04-20T00:00:00.000000Z |
| icsa-21-110-03 | Delta Industrial Automation COMMGR | 2021-04-20T00:00:00.000000Z | 2021-04-20T00:00:00.000000Z |
| icsa-21-110-02 | ICSA-21-110-02_Rockwell Automation Stratix Switches | 2021-04-20T00:00:00.000000Z | 2021-04-20T00:00:00.000000Z |
| icsa-21-110-01 | Hitachi ABB Power Grids Ellipse APM | 2021-04-20T00:00:00.000000Z | 2021-04-20T00:00:00.000000Z |
| icsa-21-096-01 | Hitachi Energy Relion 670, 650 and SAM600-IO | 2021-04-06T00:00:00.000000Z | 2021-04-20T00:00:00.000000Z |
| icsa-20-161-02 | Mitsubishi Electric MELSEC iQ-R Series (Update C) | 2020-06-09T00:00:00.000000Z | 2021-04-20T00:00:00.000000Z |
| icsa-21-105-02 | EIPStackGroup OpENer Ethernet/IP | 2021-04-15T00:00:00.000000Z | 2021-04-15T00:00:00.000000Z |
| icsa-21-105-01 | Schneider Electric C-Bus Toolkit | 2021-04-15T00:00:00.000000Z | 2021-04-15T00:00:00.000000Z |
| icsa-21-103-10 | Siemens and PKE Control Center Server | 2021-04-13T00:00:00.000000Z | 2021-04-13T00:00:00.000000Z |
| icsa-21-103-03 | JTEKT TOYOPUC products | 2021-04-13T00:00:00.000000Z | 2021-04-13T00:00:00.000000Z |
| icsa-21-103-02 | Advantech WebAccessSCADA | 2021-04-13T00:00:00.000000Z | 2021-04-13T00:00:00.000000Z |
| icsa-21-103-01 | Schneider Electric SoMachine Basic | 2021-04-13T00:00:00.000000Z | 2021-04-13T00:00:00.000000Z |
| icsa-19-344-02 | Siemens and PKE SiNVR, SiVMS Video Server (Update A) | 2019-12-10T00:00:00.000000Z | 2021-04-13T00:00:00.000000Z |
| icsma-19-080-01 | Medtronic Conexus Radio Frequency Telemetry Protocol (Update C) | 2019-03-21T00:00:00.000000Z | 2021-04-08T00:00:00.000000Z |
| icsa-21-098-01 | FATEK Automation WinProladder | 2021-04-08T00:00:00.000000Z | 2021-04-08T00:00:00.000000Z |
| icsa-21-091-01 | Rockwell Automation FactoryTalk AssetCentre | 2021-04-01T00:00:00.000000Z | 2021-04-01T00:00:00.000000Z |
| icsma-21-084-01 | Philips Gemini PET/CT Family | 2021-03-25T00:00:00.000000Z | 2021-03-25T00:00:00.000000Z |
| icsa-21-082-03 | GE Reason DR60 | 2021-03-23T00:00:00.000000Z | 2021-03-23T00:00:00.000000Z |
| icsa-21-082-02 | GE MU320E | 2021-03-23T00:00:00.000000Z | 2021-03-23T00:00:00.000000Z |
| icsa-21-082-01 | Weintek EasyWeb cMT | 2021-03-23T00:00:00.000000Z | 2021-03-23T00:00:00.000000Z |
| icsa-21-061-02 | Rockwell Automation CompactLogix 5370 and ControlLogix 5570 Controllers (Update A) | 2021-03-02T00:00:00.000000Z | 2021-03-23T00:00:00.000000Z |
| icsa-21-033-01 | Rockwell Automation MicroLogix 1400 (Update A) | 2021-02-02T00:00:00.000000Z | 2021-03-23T00:00:00.000000Z |
| icsa-21-077-03 | Hitachi ABB Power Grids eSOMS Telerik | 2021-03-18T00:00:00.000000Z | 2021-03-18T00:00:00.000000Z |
| icsa-21-077-02 | Hitachi ABB Power Grids eSOMS | 2021-03-18T00:00:00.000000Z | 2021-03-18T00:00:00.000000Z |
| icsa-21-077-01 | Johnson Controls Exacq Technologies exacqVision | 2021-03-18T00:00:00.000000Z | 2021-03-18T00:00:00.000000Z |
| icsa-21-056-03 | Rockwell Automation Logix Controllers (Update A) | 2021-02-25T00:00:00.000000Z | 2021-03-18T00:00:00.000000Z |
| icsma-17-017-02 | BD Alaris 8015 PC Unit (Update B) | 2017-01-17T00:00:00.000000Z | 2021-03-16T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-rv-rce-m4feegwx | Cisco RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution Multiple Vulnerabilities | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-rv-rce-m4FEEGWX | Cisco RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution Multiple Vulnerabilities | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-rv-rce-aqkreqp | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-rv-rce-AQKREqp | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-rv-info-dis-fewbwgsd | Cisco Small Business RV110W and RV215W Series Routers Information Disclosure Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-rv-info-dis-FEWBWgsD | Cisco Small Business RV110W and RV215W Series Routers Information Disclosure Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-rv-auth-bypass-cgv9eruz | Cisco RV110W, RV130, RV130W, and RV215W Routers Authentication Bypass Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-rv-auth-bypass-cGv9EruZ | Cisco RV110W, RV130, RV130W, and RV215W Routers Authentication Bypass Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-fpdos-horbfd9f | Cisco SD-WAN vEdge Routers Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-fpdos-hORBfd9f | Cisco SD-WAN vEdge Routers Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-emvman-3y6lutcz | Cisco SD-WAN vManage Software Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-emvman-3y6LuTcZ | Cisco SD-WAN vManage Software Denial of Service Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-dncm-xss-avmyawd2 | Cisco Data Center Network Manager Cross-Site Scripting Vulnerabilities | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-dncm-xss-AvMyAwd2 | Cisco Data Center Network Manager Cross-Site Scripting Vulnerabilities | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-dcnm-privescal-zxfch7dg | Cisco Data Center Network Manager Privilege Escalation Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-dcnm-privescal-zxfCH7Dg | Cisco Data Center Network Manager Privilege Escalation Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-code-exec-wh3bnfb | Cisco RV110W and RV215W Series Routers Arbitrary Code Execution Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-code-exec-wH3BNFb | Cisco RV110W and RV215W Series Routers Arbitrary Code Execution Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-cmd-shell-injection-9joqn9dy | Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers Command Shell Injection Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-cmd-shell-injection-9jOQn9Dy | Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers Command Shell Injection Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-cma-turn-crdls-rhjszkxn | Cisco Meetings App Missing TURN Server Credentials Expiration Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-cma-turn-crdls-RHjSzKXn | Cisco Meetings App Missing TURN Server Credentials Expiration Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-clibypvman-skclf2l | Cisco SD-WAN vManage Software Command Injection Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-clibypvman-sKcLf2L | Cisco SD-WAN vManage Software Command Injection Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-cisco-prime-priv-esc-hyhwdzba | Cisco Prime License Manager Privilege Escalation Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-cisco-prime-priv-esc-HyhwdzBA | Cisco Prime License Manager Privilege Escalation Vulnerability | 2020-07-15T16:00:00+00:00 | 2020-07-15T16:00:00+00:00 |
| cisco-sa-telnetd-efjrezpx | Telnet Vulnerability Affecting Cisco Products: June 2020 | 2020-06-24T16:00:00+00:00 | 2020-07-08T16:58:30+00:00 |
| cisco-sa-telnetd-EFJrEzPx | Telnet Vulnerability Affecting Cisco Products: June 2020 | 2020-06-24T16:00:00+00:00 | 2020-07-08T16:58:30+00:00 |
| cisco-sa-sbswitch-session-jzas5jny | Cisco Small Business Smart and Managed Switches Session Management Vulnerability | 2020-07-01T16:00:00+00:00 | 2020-07-01T16:00:00+00:00 |
| cisco-sa-sbswitch-session-JZAS5jnY | Cisco Small Business Smart and Managed Switches Session Management Vulnerability | 2020-07-01T16:00:00+00:00 | 2020-07-01T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-41715 | Memory exhaustion when compiling regular expressions in regexp/syntax | 2022-10-02T00:00:00.000Z | 2026-02-18T02:32:43.000Z |
| msrc_cve-2024-57940 | exfat: fix the infinite loop in exfat_readdir() | 2025-01-02T00:00:00.000Z | 2026-02-18T02:32:30.000Z |
| msrc_cve-2025-21920 | vlan: enforce underlying device type | 2025-04-02T00:00:00.000Z | 2026-02-18T02:32:29.000Z |
| msrc_cve-2024-50000 | net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() | 2024-10-01T07:00:00.000Z | 2026-02-18T02:32:22.000Z |
| msrc_cve-2025-49178 | Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: unprocessed client request due to bytes to ignore | 2025-06-02T00:00:00.000Z | 2026-02-18T02:32:18.000Z |
| msrc_cve-2024-36008 | ipv4: check for NULL idev in ip_route_use_hint() | 2024-05-02T07:00:00.000Z | 2026-02-18T02:32:17.000Z |
| msrc_cve-2024-32487 | less through 653 allows OS command execution via a newline character in the name of a file because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable but this is set by default in many common cases. | 2024-04-02T07:00:00.000Z | 2026-02-18T02:32:16.000Z |
| msrc_cve-2024-42259 | drm/i915/gem: Fix Virtual Memory mapping boundaries calculation | 2024-08-02T00:00:00.000Z | 2026-02-18T02:32:14.000Z |
| msrc_cve-2025-37768 | drm/amd/pm: Prevent division by zero | 2025-05-02T00:00:00.000Z | 2026-02-18T02:32:09.000Z |
| msrc_cve-2025-39764 | netfilter: ctnetlink: remove refcounting in expectation dumpers | 2025-09-02T00:00:00.000Z | 2026-02-18T02:31:57.000Z |
| msrc_cve-2025-58188 | Panic when validating certificates with DSA public keys in crypto/x509 | 2025-10-02T00:00:00.000Z | 2026-02-18T02:31:53.000Z |
| msrc_cve-2025-68725 | bpf: Do not let BPF test infra emit invalid GSO types to stack | 2025-12-02T00:00:00.000Z | 2026-02-18T02:31:52.000Z |
| msrc_cve-2025-21844 | smb: client: Add check for next_buffer in receive_encrypted_standard() | 2025-03-02T00:00:00.000Z | 2026-02-18T02:31:38.000Z |
| msrc_cve-2024-21171 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2024-07-01T07:00:00.000Z | 2026-02-18T02:31:30.000Z |
| msrc_cve-2025-37754 | drm/i915/huc: Fix fence not released on early probe errors | 2025-05-02T00:00:00.000Z | 2026-02-18T02:31:29.000Z |
| msrc_cve-2024-49936 | net/xen-netback: prevent UAF in xenvif_flush_hash() | 2024-10-01T07:00:00.000Z | 2026-02-18T02:31:25.000Z |
| msrc_cve-2025-21923 | HID: hid-steam: Fix use-after-free when detaching device | 2025-04-02T00:00:00.000Z | 2026-02-18T02:31:21.000Z |
| msrc_cve-2025-49180 | Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: integer overflow in x resize, rotate and reflect (randr) extension | 2025-06-02T00:00:00.000Z | 2026-02-18T02:30:58.000Z |
| msrc_cve-2025-21858 | geneve: Fix use-after-free in geneve_find_dev(). | 2025-03-02T00:00:00.000Z | 2026-02-18T02:30:55.000Z |
| msrc_cve-2024-13176 | Timing side-channel in ECDSA signature computation | 2025-01-02T00:00:00.000Z | 2026-02-18T02:30:48.000Z |
| msrc_cve-2023-29402 | Code injection via go command with cgo in cmd/go | 2023-06-01T07:00:00.000Z | 2026-02-18T02:30:46.000Z |
| msrc_cve-2025-37909 | net: lan743x: Fix memleak issue when GSO enabled | 2025-05-02T00:00:00.000Z | 2026-02-18T02:30:45.000Z |
| msrc_cve-2025-38377 | rose: fix dangling neighbour pointers in rose_rt_device_down() | 2025-07-02T00:00:00.000Z | 2026-02-18T02:30:44.000Z |
| msrc_cve-2025-68742 | bpf: Fix invalid prog->stats access when update_effective_progs fails | 2025-12-02T00:00:00.000Z | 2026-02-18T02:30:39.000Z |
| msrc_cve-2024-35801 | x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD | 2024-05-02T07:00:00.000Z | 2026-02-18T02:30:36.000Z |
| msrc_cve-2023-39318 | Improper handling of HTML-like comments in script contexts in html/template | 2023-09-01T00:00:00.000Z | 2026-02-18T02:30:29.000Z |
| msrc_cve-2024-50019 | kthread: unpark only parked kthread | 2024-10-01T07:00:00.000Z | 2026-02-18T02:30:21.000Z |
| msrc_cve-2025-21922 | ppp: Fix KMSAN uninit-value warning with bpf | 2025-04-02T00:00:00.000Z | 2026-02-18T02:30:15.000Z |
| msrc_cve-2024-6608 | It was possible to move the cursor using pointerlock from an iframe. This allowed moving the cursor outside of the viewport and the Firefox window. This vulnerability affects Firefox < 128 and Thunderbird < 128. | 2024-07-01T07:00:00.000Z | 2026-02-18T02:30:11.000Z |
| msrc_cve-2024-45590 | body-parser vulnerable to denial of service when url encoding is enabled | 2024-09-01T07:00:00.000Z | 2026-02-18T02:30:01.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:13758-1 | chromedriver-121.0.6167.184-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13757-1 | squid-6.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13756-1 | go1.21-1.21.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13755-1 | fontforge-20230101-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13754-1 | crun-1.14.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13753-1 | MozillaThunderbird-115.8.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13752-1 | go1.22-1.22.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13751-1 | tar-1.35-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13750-1 | rabbitmq-java-client-5.20.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13749-1 | python310-Django-4.2.11-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13748-1 | libopenjp2-7-2.5.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13747-1 | caja-engrampa-1.26.1-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13746-1 | libzzip-0-13-0.13.72-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13745-1 | xen-4.18.0_06-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13744-1 | python312-3.12.2-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13743-1 | xmlgraphics-batik-1.17-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13742-1 | libunbound8-1.19.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13741-1 | python39-3.9.18-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13740-1 | python311-3.11.8-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13739-1 | python310-3.10.13-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13738-1 | nodejs-electron-28.2.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13737-1 | glade-3.40.0-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13736-1 | python38-3.8.18-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13735-1 | python310-orjson-3.9.15-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13734-1 | postgresql-jdbc-42.7.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13733-1 | opensc-0.24.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13732-1 | libmodsecurity3-3.0.12-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13731-1 | exiv2-0.28.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13730-1 | dav1d-1.4.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13729-1 | python310-uamqp-1.6.8-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-1330 | Heap-buffer-overflow in parse_content_length | 2021-09-19T00:01:45.327292Z | 2022-04-13T03:04:37.758340Z |
| osv-2021-1300 | UNKNOWN READ in get_body | 2021-09-17T00:01:33.668747Z | 2022-04-13T03:04:37.727198Z |
| osv-2021-1258 | Bad-cast to SplashPattern from invalid vptr | 2021-09-15T00:00:11.560834Z | 2022-04-13T03:04:37.235796Z |
| osv-2021-1250 | Segv on unknown address in ft_free | 2021-09-14T00:00:09.257971Z | 2022-04-13T03:04:37.307853Z |
| osv-2021-1221 | Heap-buffer-overflow in parse_via_param | 2021-09-11T00:00:10.922189Z | 2022-04-13T03:04:37.763544Z |
| osv-2021-1202 | Heap-buffer-overflow in parse_to_param | 2021-09-05T00:01:58.381058Z | 2022-04-13T03:04:37.737870Z |
| osv-2021-1201 | Heap-buffer-overflow in q_memchr | 2021-09-05T00:00:46.108630Z | 2022-04-13T03:04:37.747979Z |
| osv-2021-1198 | Heap-buffer-overflow in parse_param_name | 2021-09-04T00:01:26.375213Z | 2022-04-13T03:04:37.768689Z |
| osv-2021-1196 | Heap-buffer-overflow in parse_content_length | 2021-09-04T00:00:36.456594Z | 2022-04-13T03:04:37.732807Z |
| osv-2021-1195 | Heap-buffer-overflow in trim_leading | 2021-09-04T00:00:17.660776Z | 2022-04-13T03:04:37.742922Z |
| osv-2020-861 | Segv on unknown address in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2020-07-14T22:13:48.598875Z | 2022-04-13T03:04:37.960635Z |
| osv-2020-854 | UNKNOWN READ in std::__1::__hash_node_base<std::__1::__hash_node<std::__1::__hash_value_type<std | 2020-07-14T22:13:46.858160Z | 2022-04-13T03:04:37.973535Z |
| osv-2020-853 | Use-of-uninitialized-value in llvm_ks::MCAssembler::computeFragmentSize | 2020-07-14T22:13:46.021034Z | 2022-04-13T03:04:37.932542Z |
| osv-2020-827 | Use-of-uninitialized-value in llvm_ks::isIntN | 2020-07-14T05:37:49.656443Z | 2022-04-13T03:04:37.916410Z |
| osv-2020-823 | Object-size in std::__1::vector<wabt::DataSegment*, std::__1::allocator<wabt::DataSegment*> >:: | 2020-07-14T05:37:48.903126Z | 2022-04-13T03:04:37.966850Z |
| osv-2020-797 | Use-of-uninitialized-value in MipsAsmParser::isPicAndNotNxxAbi | 2020-07-14T05:37:37.559643Z | 2022-04-13T03:04:37.905755Z |
| osv-2020-783 | UNKNOWN READ in wabt::BinaryReaderIR::OnFunctionSymbol | 2020-07-14T05:37:33.041385Z | 2022-04-13T03:04:37.986252Z |
| osv-2020-736 | Heap-use-after-free in WelsDec::DecreasePicBuff | 2020-07-01T00:00:27.634899Z | 2022-04-13T03:04:37.436133Z |
| osv-2020-713 | Heap-buffer-overflow in XRef::getEntry | 2020-07-01T00:00:26.302679Z | 2022-04-13T03:04:37.253974Z |
| osv-2020-692 | Heap-use-after-free in WelsDec::SetUnRef | 2020-07-01T00:00:25.142699Z | 2022-04-13T03:04:37.499930Z |
| osv-2020-681 | Heap-use-after-free in WelsDec::SetUnRef | 2020-07-01T00:00:24.507688Z | 2022-04-13T03:04:37.531665Z |
| osv-2020-671 | Heap-use-after-free in WelsDec::SetUnRef | 2020-07-01T00:00:23.823813Z | 2022-04-13T03:04:37.574359Z |
| osv-2020-662 | UNKNOWN READ in wmem_strdup_printf | 2020-07-01T00:00:23.358358Z | 2022-04-13T03:04:37.886597Z |
| osv-2020-651 | Stack-buffer-overflow in tvb_memcpy | 2020-07-01T00:00:22.588939Z | 2022-04-13T03:04:37.865446Z |
| osv-2020-62 | Stack-buffer-overflow in tvb_get_ipv4_addr_with_prefix_len | 2020-06-24T01:51:12.327011Z | 2022-04-13T03:04:37.780752Z |
| osv-2020-607 | UNKNOWN READ in WelsDec::CWelsDecoder::DecodeFrame2WithCtx | 2020-07-01T00:00:20.087273Z | 2022-04-13T03:04:37.626480Z |
| osv-2020-587 | UNKNOWN READ in Interpreter::evaluate | 2020-07-01T00:00:18.669002Z | 2022-04-13T03:04:37.894780Z |
| osv-2020-578 | Heap-use-after-free in WelsDec::ResetRefPicReferences | 2020-07-01T00:00:18.077733Z | 2022-04-13T03:04:37.446822Z |
| osv-2020-570 | Global-buffer-overflow in decode_tlv | 2020-07-01T00:00:17.578359Z | 2022-04-13T03:04:37.816713Z |
| osv-2020-557 | Global-buffer-overflow in dissect_snmp_PDUs | 2020-07-01T00:00:16.823057Z | 2022-04-13T03:04:37.855035Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-envoy-2024-32976 | Envoy can enter an endless loop while decompressing Brotli data with extra input | 2024-06-06T07:18:14.958Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-32975 | Envoy crashes in QuicheDataReader::PeekVarInt62Length() | 2024-06-06T07:18:33.558Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-32974 | Envoy affected by a crash in EnvoyQuicServerStream::OnInitialHeadersComplete() | 2024-06-06T07:18:49.760Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-32475 | Envoy RELEASE_ASSERT using auto_sni with :authority header > 255 bytes | 2024-04-20T07:17:35.607Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-23327 | Crash in proxy protocol when command type of LOCAL in Envoy | 2024-03-06T10:51:34.990Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-23326 | Envoy incorrectly accepts HTTP 200 response for entering upgrade mode | 2024-06-06T07:20:12.358Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-23325 | Envoy crashes when using an address type that isn’t supported by the OS | 2024-03-06T10:51:44.887Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-23324 | Envoy ext auth can be bypassed when Proxy protocol filter sets invalid UTF-8 metadata | 2024-03-06T10:51:54.396Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-23323 | Excessive CPU usage when URI template matcher is configured using regex in Envoy | 2024-03-06T10:52:03.196Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-23322 | Envoy crashes when idle and request per try timeout occur within the backoff interval | 2024-03-06T10:52:13.860Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2023-35945 | Envoy vulnerable to HTTP/2 memory leak in nghttp2 codec | 2024-03-06T10:52:37.891Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2023-35944 | Envoy vulnerable to incorrect handling of HTTP requests and responses with mixed case schemes | 2024-03-06T10:52:47.709Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2023-35943 | Envoy vulnerable to CORS filter segfault when origin header is removed | 2024-03-06T10:52:59.499Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2023-35942 | Envoy's gRPC access log crash caused by the listener draining | 2024-03-06T10:53:10.274Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2023-35941 | Envoy vulnerable to OAuth2 credentials exploit with permanent validity | 2024-03-06T10:53:21.084Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2023-27496 | Envoy may crash when a redirect url without a state param is received in the oauth filter | 2024-03-06T10:53:33.396Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2023-27493 | Envoy doesn't escape HTTP header values | 2024-03-06T10:53:47.786Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2023-27492 | Envoy may crash when a large request body is processed in Lua filter | 2024-03-06T10:54:01.303Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2023-27491 | Envoy forwards invalid Http2/Http3 downstream headers | 2024-03-06T10:54:12.095Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2023-27488 | Envoy gRPC client produces invalid protobuf when an HTTP header with non-UTF8 value is received. | 2024-03-06T10:54:22.577Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2023-27487 | Envoy client may fake the header `x-envoy-original-path` | 2024-03-06T10:54:33.403Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2022-29228 | Reachable assertion in Envoy | 2024-03-06T10:54:44.974Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2022-29227 | Use after free in Envoy | 2024-03-06T10:54:55.978Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2022-29226 | Trivial authentication bypass in Envoy | 2024-03-06T10:55:07.399Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2022-29225 | Zip bomb vulnerability in Envoy | 2024-03-06T10:55:19.285Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2022-29224 | Segmentation fault leading to crash in Envoy | 2024-03-06T10:55:32.703Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2022-23606 | Crash when a cluster is deleted in Envoy | 2024-03-06T10:55:43.299Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2022-21657 | X.509 Extended Key Usage and Trust Purposes bypass in Envoy | 2024-03-06T10:55:54.594Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2022-21656 | X.509 subjectAltName matching bypass in Envoy | 2024-03-06T10:56:05.460Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2022-21655 | Incorrect handling of internal redirects results in crash in Envoy | 2024-03-06T10:56:14.571Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202202-0094 | Insufficient control flow management in some Intel(R) Processors may allow an authenticat… | 2024-02-22T19:56:19.736000Z |
| var-202402-1320 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions), … | 2024-02-22T19:51:06.482000Z |
| var-202402-1316 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions), … | 2024-02-22T19:19:55.313000Z |
| var-202402-0623 | An issue in Dlink DIR-816A2 v.1.10CNB05 allows a remote attacker to execute arbitrary cod… | 2024-02-21T22:45:57.280000Z |
| var-200906-0241 | The default configuration of the Security global settings on the Citrix NetScaler Access … | 2024-02-21T22:37:34.016000Z |
| var-201107-0133 | fw_dbus.py in system-config-firewall 1.2.29 and earlier uses the pickle Python module uns… | 2024-02-21T22:37:32.585000Z |
| var-202402-1317 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < … | 2024-02-21T21:19:33.369000Z |
| var-202402-1318 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions), … | 2024-02-21T19:09:48.309000Z |
| var-202402-1982 | IBM Security Verify Access 10.0.0.0 through 10.0.6.1 uses insecure calls that could allow… | 2024-02-20T23:28:21.145000Z |
| var-202311-0436 | Affected devices can be configured to send emails when certain events occur on the device… | 2024-02-20T22:47:55.689000Z |
| var-202311-0438 | Affected devices do not properly validate the authentication when performing certain modi… | 2024-02-20T22:34:20.296000Z |
| var-202003-0779 | A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0… | 2024-02-20T22:30:28.006000Z |
| var-202207-0791 | Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.… | 2024-02-20T22:11:03.857000Z |
| var-202402-1325 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions), … | 2024-02-20T22:07:57.270000Z |
| var-202402-1319 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < … | 2024-02-20T21:51:36.313000Z |
| var-202003-0775 | A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0… | 2024-02-20T21:40:03.943000Z |
| var-202003-0777 | A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0… | 2024-02-20T21:37:55.839000Z |
| var-202402-1323 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < … | 2024-02-20T21:26:26.290000Z |
| var-202003-0778 | A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0… | 2024-02-20T21:19:51.473000Z |
| var-201912-1831 | A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0… | 2024-02-20T20:55:04.578000Z |
| var-202004-2205 | Server or client applications that call the SSL_check_chain() function during or after a … | 2024-02-20T20:51:42.423000Z |
| var-200105-0011 | Directory traversal vulnerability in SEDUM HTTP Server 2.0 allows remote attackers to rea… | 2024-02-20T20:44:23.927000Z |
| var-202312-0198 | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (… | 2024-02-20T20:25:11.371000Z |
| var-202402-1321 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < … | 2024-02-20T20:14:49.192000Z |
| var-201912-1242 | A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0… | 2024-02-20T19:59:07.808000Z |
| var-202003-0780 | A vulnerability has been identified in SiNVR/SiVMS Video Server (All versions < V5.0.0). … | 2024-02-20T19:22:33.877000Z |
| var-202009-0115 | In Xiaomi router R3600 ROM version<1.0.66, filters in the set_WAN6 interface can be bypas… | 2024-02-20T02:33:04.433000Z |
| var-201805-0698 | A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/info.php ke… | 2024-02-20T02:29:40.837000Z |
| var-202202-1521 | TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a remote code execution (RCE… | 2024-02-20T02:26:57.257000Z |
| var-202104-1458 | TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulne… | 2024-02-20T02:26:34.284000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2008-000078 | CGI RESCUE MiniBBS2000 directory traversal vulnerability | 2008-11-26T17:50+09:00 | 2009-04-30T15:35+09:00 |
| jvndb-2009-000024 | Web Mailer from CGI RESCUE vulnerable to HTTP header injection | 2009-04-28T16:36+09:00 | 2009-04-28T16:36+09:00 |
| jvndb-2009-000023 | FORM2MAIL from CGI RESCUE allows unauthorized email transmission | 2009-04-28T16:35+09:00 | 2009-04-28T16:35+09:00 |
| jvndb-2009-000022 | Cross-site scripting vulnerability in MiniBBS from CGI RESCUE | 2009-04-28T16:35+09:00 | 2009-04-28T16:35+09:00 |
| jvndb-2009-000021 | MiniBBS22 from CGI RESCUE allows unauthorized email transmission | 2009-04-28T16:35+09:00 | 2009-04-28T16:35+09:00 |
| jvndb-2009-000019 | Cross-site scripting vulnerability in apricot.php from LovPop.net | 2009-04-17T14:40+09:00 | 2009-04-17T14:40+09:00 |
| jvndb-2009-001135 | Fujitsu Jasmine HTTP Response Splitting Vulnerability When Executing WebLink Template | 2009-04-17T14:13+09:00 | 2009-04-17T14:13+09:00 |
| jvndb-2009-000017 | XOOPS Cube Legacy cross-site scripting vulnerability | 2009-04-07T17:06+09:00 | 2009-04-07T17:06+09:00 |
| jvndb-2009-000016 | Access Analyzer CGI Professional Version vulnerability allows third party to gain administrative privileges | 2009-03-31T16:08+09:00 | 2009-03-31T16:08+09:00 |
| jvndb-2008-001647 | Jasmine WebLink Template Multiple Vulnerabilities | 2008-09-18T11:48+09:00 | 2009-03-30T14:29+09:00 |
| jvndb-2009-001087 | Fujitsu Enhanced Support Facility HRM-S Hardware/Software Information Disclosure Vulnerability | 2009-03-24T17:35+09:00 | 2009-03-24T17:35+09:00 |
| jvndb-2009-000015 | Cross-site scripting vulnerability in Access Analyzer CGI Standard Version (Ver. 3.x) | 2009-03-16T17:07+09:00 | 2009-03-16T17:07+09:00 |
| jvndb-2009-000014 | MP Form Mail CGI vulnerability allows third party to gain administrative privileges | 2009-03-13T16:25+09:00 | 2009-03-13T16:25+09:00 |
| jvndb-2009-000012 | Buffer overflow vulnerability in ActiveX Control for Sony SNC series network cameras | 2009-03-09T16:27+09:00 | 2009-03-09T16:27+09:00 |
| jvndb-2009-000013 | PEAK XOOPS piCal cross-site scripting vulnerability | 2009-03-03T16:37+09:00 | 2009-03-03T16:37+09:00 |
| jvndb-2009-001033 | Multiple Vulnerabilities in uCosminexus Portal Framework | 2009-03-02T17:38+09:00 | 2009-03-02T17:38+09:00 |
| jvndb-2009-001032 | JP1/Cm2/Network Node Manager Denial of Service (DoS) Vulnerability | 2009-03-02T17:38+09:00 | 2009-03-02T17:38+09:00 |
| jvndb-2009-000010 | Apache Tomcat information disclosure vulnerability | 2009-02-26T15:28+09:00 | 2009-02-26T15:28+09:00 |
| jvndb-2009-001025 | Vulnerability allowing Viewing/Updating of Other Users' Information in Groupmax World Wide Web Desktop Version 6 | 2009-02-26T11:55+09:00 | 2009-02-26T11:55+09:00 |
| jvndb-2009-000009 | FAST ESP cross-site scripting vulnerability | 2009-02-17T11:55+09:00 | 2009-02-17T11:55+09:00 |
| jvndb-2009-000011 | Becky! Internet Mail buffer overflow vulnerability | 2009-02-12T17:28+09:00 | 2009-02-12T17:28+09:00 |
| jvndb-2007-000817 | Flash Player vulnerable in handling cross-domain policy files | 2008-05-21T00:00+09:00 | 2009-02-10T11:32+09:00 |
| jvndb-2009-000008 | Fulltext search CGI vulnerability allows third party to gain administrative privileges | 2009-01-28T15:25+09:00 | 2009-01-28T15:25+09:00 |
| jvndb-2009-000007 | Oracle WebLogic Server vulnerable to cross-site scripting | 2009-01-20T16:45+09:00 | 2009-01-20T16:45+09:00 |
| jvndb-2009-000006 | Cisco IOS cross-site scripting vulnerability | 2009-01-15T19:14+09:00 | 2009-01-15T19:14+09:00 |
| jvndb-2009-000005 | MODx vulnerable to SQL injection | 2009-01-09T15:54+09:00 | 2009-01-09T15:54+09:00 |
| jvndb-2009-000004 | MODx cross-site request forgery vulnerability | 2009-01-09T15:54+09:00 | 2009-01-09T15:54+09:00 |
| jvndb-2009-000003 | MODx cross-site scripting vulnerability | 2009-01-09T15:54+09:00 | 2009-01-09T15:54+09:00 |
| jvndb-2009-000001 | MyNETS cross-site scripting vulnerability | 2009-01-08T11:34+09:00 | 2009-01-08T11:34+09:00 |
| jvndb-2008-000086 | BlackJumboDog authentication bypass vulnerability | 2008-12-25T16:22+09:00 | 2008-12-25T16:22+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:01702-1 | Security update for glibc | 2025-05-24T09:50:54Z | 2025-05-24T09:50:54Z |
| suse-su-2025:01701-1 | Security update for MozillaFirefox | 2025-05-24T08:34:24Z | 2025-05-24T08:34:24Z |
| suse-su-2025:20346-1 | Security update for python311 | 2025-05-23T13:40:05Z | 2025-05-23T13:40:05Z |
| suse-su-2025:20345-1 | Security update for augeas | 2025-05-23T13:00:13Z | 2025-05-23T13:00:13Z |
| suse-su-2025:01695-1 | Security update for python-setuptools | 2025-05-23T12:50:53Z | 2025-05-23T12:50:53Z |
| suse-su-2025:01693-1 | Security update for python36-setuptools | 2025-05-23T12:48:03Z | 2025-05-23T12:48:03Z |
| suse-su-2025:01649-2 | Security update for python-tornado6 | 2025-05-23T11:58:50Z | 2025-05-23T11:58:50Z |
| suse-su-2025:01692-1 | Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) | 2025-05-23T08:03:48Z | 2025-05-23T08:03:48Z |
| suse-su-2025:20365-1 | Security update for s390-tools | 2025-05-23T07:59:47Z | 2025-05-23T07:59:47Z |
| suse-su-2025:20352-1 | Security update for s390-tools | 2025-05-23T07:48:14Z | 2025-05-23T07:48:14Z |
| suse-su-2025:20344-1 | Security update for the Linux Kernel | 2025-05-23T07:28:27Z | 2025-05-23T07:28:27Z |
| suse-su-2025:20355-1 | Security update for the Linux Kernel | 2025-05-23T07:28:26Z | 2025-05-23T07:28:26Z |
| suse-su-2025:20354-1 | Security update for the Linux Kernel | 2025-05-23T07:19:59Z | 2025-05-23T07:19:59Z |
| suse-su-2025:20343-1 | Security update for the Linux Kernel | 2025-05-23T07:19:59Z | 2025-05-23T07:19:59Z |
| suse-su-2025:01683-1 | Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) | 2025-05-22T21:38:10Z | 2025-05-22T21:38:10Z |
| suse-su-2025:01682-1 | Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) | 2025-05-22T20:04:36Z | 2025-05-22T20:04:36Z |
| suse-su-2025:01677-1 | Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5) | 2025-05-22T20:04:28Z | 2025-05-22T20:04:28Z |
| suse-su-2025:01676-1 | Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | 2025-05-22T20:04:19Z | 2025-05-22T20:04:19Z |
| suse-su-2025:01675-1 | Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) | 2025-05-22T19:34:27Z | 2025-05-22T19:34:27Z |
| suse-su-2025:01668-1 | Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) | 2025-05-22T19:34:13Z | 2025-05-22T19:34:13Z |
| suse-su-2025:01672-1 | Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3) | 2025-05-22T19:34:05Z | 2025-05-22T19:34:05Z |
| suse-su-2025:01669-1 | Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) | 2025-05-22T19:33:43Z | 2025-05-22T19:33:43Z |
| suse-su-2025:01663-1 | Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) | 2025-05-22T17:33:37Z | 2025-05-22T17:33:37Z |
| suse-su-2025:01662-1 | Security update for python-cryptography | 2025-05-22T16:04:44Z | 2025-05-22T16:04:44Z |
| suse-su-2025:01661-1 | Security update for postgresql14 | 2025-05-22T16:03:02Z | 2025-05-22T16:03:02Z |
| suse-su-2025:01660-1 | Security update for MozillaThunderbird | 2025-05-22T16:01:46Z | 2025-05-22T16:01:46Z |
| suse-su-2025:01658-1 | Security update for open-vm-tools | 2025-05-22T13:34:46Z | 2025-05-22T13:34:46Z |
| suse-su-2025:20370-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-05-22T13:03:44Z | 2025-05-22T13:03:44Z |
| suse-su-2025:20369-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-05-22T13:03:44Z | 2025-05-22T13:03:44Z |
| suse-su-2025:20368-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 | 2025-05-22T13:03:44Z | 2025-05-22T13:03:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-26885 | Google Android权限提升漏洞(CNVD-2025-26885) | 2025-09-08 | 2025-11-06 |
| cnvd-2025-26884 | Google Android权限提升漏洞(CNVD-2025-26884) | 2025-09-08 | 2025-11-06 |
| cnvd-2025-26883 | Google Android权限提升漏洞(CNVD-2025-26883) | 2025-09-08 | 2025-11-06 |
| cnvd-2025-26882 | Google Android权限提升漏洞(CNVD-2025-26882) | 2025-09-08 | 2025-11-06 |
| cnvd-2025-26881 | Google Android拒绝服务漏洞(CNVD-2025-26881) | 2025-09-08 | 2025-11-06 |
| cnvd-2025-26880 | Google Android信息泄露漏洞(CNVD-2025-26880) | 2025-09-08 | 2025-11-06 |
| cnvd-2025-26879 | Google Android权限提升漏洞(CNVD-2025-26879) | 2025-09-08 | 2025-11-06 |
| cnvd-2025-26878 | TP-LINK AX10信息泄露漏洞 | 2025-09-11 | 2025-11-06 |
| cnvd-2025-27237 | Tenda O3 formAdvSetLanip函数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-05 |
| cnvd-2025-27236 | Tenda O3 form/setDhcpConfig函数函数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-05 |
| cnvd-2025-27235 | Tenda CH22 fromVirtualSer函数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-05 |
| cnvd-2025-27234 | Tenda CH22 fromSafeUrlFilter函数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-05 |
| cnvd-2025-27047 | jonnys Liquor跨站脚本漏洞 | 2024-11-15 | 2025-11-05 |
| cnvd-2025-27046 | jonnys Liquor browse.php文件SQL注入漏洞 | 2025-07-21 | 2025-11-05 |
| cnvd-2025-27045 | jonnys Liquor delete-row.php文件SQL注入漏洞 | 2025-07-21 | 2025-11-05 |
| cnvd-2025-27044 | jonnys Liquor admin-area.php文件SQL注入漏洞 | 2025-07-21 | 2025-11-05 |
| cnvd-2025-27043 | Crime Reporting System userlogin.php文件SQL注入漏洞 | 2025-07-21 | 2025-11-05 |
| cnvd-2025-27042 | Crime Reporting System registration.php文件SQL注入漏洞 | 2025-07-21 | 2025-11-05 |
| cnvd-2025-27041 | Crime Reporting System policelogin.php文件SQL注入漏洞 | 2025-07-21 | 2025-11-05 |
| cnvd-2025-27040 | Crime Reporting System /headlogin.php文件SQL注入漏洞 | 2025-07-21 | 2025-11-05 |
| cnvd-2025-27039 | Crime Reporting System /complainer_page.php文件SQL注入漏洞 | 2025-07-21 | 2025-11-05 |
| cnvd-2025-27038 | Chat System update_room.php文件SQL注入漏洞 | 2024-12-30 | 2025-11-05 |
| cnvd-2025-27037 | Chat System update_user.php文件跨站脚本漏洞 | 2024-12-30 | 2025-11-05 |
| cnvd-2025-27036 | Chat System update_user.php文件SQL注入漏洞 | 2024-12-30 | 2025-11-05 |
| cnvd-2025-27035 | Chat System chatroom.php文件跨站脚本漏洞 | 2024-12-30 | 2025-11-05 |
| cnvd-2025-27034 | Chat System chatroom.php文件SQL注入漏洞 | 2024-12-30 | 2025-11-05 |
| cnvd-2025-27033 | Chat System update_room.php文件跨站脚本漏洞 | 2024-12-30 | 2025-11-05 |
| cnvd-2025-27032 | Chat System deleteuser.php文件SQL注入漏洞 | 2025-01-07 | 2025-11-05 |
| cnvd-2025-27031 | Chat System deleteroom.php文件SQL注入漏洞 | 2025-01-16 | 2025-11-05 |
| cnvd-2025-27030 | Chat System leaveroom.php文件SQL注入漏洞 | 2025-01-23 | 2025-11-05 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2024-AVI-1079 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| CERTFR-2024-AVI-1078 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| CERTFR-2024-AVI-1077 | Multiples vulnérabilités dans Microsoft Edge | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| CERTFR-2024-AVI-1076 | Multiples vulnérabilités dans Suricata | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| CERTFR-2024-AVI-1075 | Multiples vulnérabilités dans Nagios XI | 2024-12-13T00:00:00.000000 | 2024-12-13T00:00:00.000000 |
| certfr-2024-avi-1074 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| certfr-2024-avi-1073 | Vulnérabilité dans les produits Mozilla | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| certfr-2024-avi-1072 | Multiples vulnérabilités dans les produits Apple | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| certfr-2024-avi-1071 | Multiples vulnérabilités dans les produits Tenable | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| CERTFR-2024-AVI-1074 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| CERTFR-2024-AVI-1073 | Vulnérabilité dans les produits Mozilla | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| CERTFR-2024-AVI-1072 | Multiples vulnérabilités dans les produits Apple | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| CERTFR-2024-AVI-1071 | Multiples vulnérabilités dans les produits Tenable | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| certfr-2024-avi-1070 | Multiples vulnérabilités dans les produits Microsoft | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1069 | Multiples vulnérabilités dans Microsoft Windows | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1068 | Multiples vulnérabilités dans Microsoft Office | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1067 | Multiples vulnérabilités dans les produits Atlassian | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1066 | Vulnérabilité dans Apache Struts | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1065 | Multiples vulnérabilités dans GitLab | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1064 | Multiples vulnérabilités dans GLPI | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1063 | Vulnérabilité dans cURL et libcurl | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1062 | Multiples vulnérabilités dans les produits Siemens | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1061 | Multiples vulnérabilités dans les produits Splunk | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1060 | Multiples vulnérabilités dans Ruby on Rails | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1059 | Multiples vulnérabilités dans les produits Intel | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1058 | Multiples vulnérabilités dans les produits Ivanti | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1057 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1056 | Multiples vulnérabilités dans les produits Adobe | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1055 | Multiples vulnérabilités dans Google Chrome | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| CERTFR-2024-AVI-1070 | Multiples vulnérabilités dans les produits Microsoft | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |