Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-0910 |
8.8 (3.1)
|
wpForo Forum <= 2.4.13 - Authenticated (Subscriber+) P… |
tomdever |
wpForo Forum |
2026-02-11T13:25:44.903Z | 2026-02-11T14:22:14.626Z |
| CVE-2026-2337 |
8.7 (4.0)
|
Refleccted XSS on Plunet BusinessManager |
Plunet |
Plunet BusinessManager |
2026-02-11T13:28:30.034Z | 2026-02-11T14:19:29.316Z |
| CVE-2021-26381 |
7.1 (4.0)
|
Improper system call parameter validation in the … |
AMD |
AMD Ryzen™ Threadripper™ PRO 3000 WX-Series Processors |
2026-02-10T19:47:26.356Z | 2026-02-11T14:11:54.692Z |
| CVE-2025-8668 |
9.4 (3.1)
|
Reflected XSS in E-Kalite Software Hardware Engineerin… |
E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. |
Turboard |
2026-02-11T13:34:33.079Z | 2026-02-11T14:09:58.065Z |
| CVE-2025-63386 |
9.1 (3.1)
|
A Cross-Origin Resource Sharing (CORS) misconfigu… |
n/a |
n/a |
2025-12-18T00:00:00.000Z | 2026-02-11T14:09:22.325Z |
| CVE-2026-1227 |
7 (4.0)
|
CWE-611: Improper Restriction of XML External Ent… |
Schneider Electric |
EcoStruxure Building Operation Workstation |
2026-02-11T13:45:51.675Z | 2026-02-11T14:08:24.750Z |
| CVE-2026-1226 |
7 (4.0)
|
CWE‑94: Improper Control of Generation of Code vu… |
Schneider Electric |
EcoStruxure Building Operation Workstation |
2026-02-11T13:49:45.465Z | 2026-02-11T14:07:27.708Z |
| CVE-2025-4404 |
9.1 (3.1)
|
Freeipa: idm: privilege escalation from host to domain… |
|
|
2025-06-17T13:39:17.945Z | 2026-02-11T12:37:51.316Z |
| CVE-2025-59386 |
1.2 (4.0)
|
QuTS hero |
QNAP Systems Inc. |
QuTS hero |
2026-02-11T12:16:19.698Z | 2026-02-11T12:16:19.698Z |
| CVE-2025-6830 |
9.8 (3.1)
|
SQLi in Xpoda Türkiye Information Technology's Passwor… |
Xpoda Türkiye Information Technology Inc. |
Password Module |
2026-02-09T11:18:22.248Z | 2026-02-11T11:26:01.413Z |
| CVE-2025-25207 |
5.7 (3.1)
|
Rhcl: authpolicy callbacks result in denial of service… |
|
|
2025-06-09T06:12:51.416Z | 2026-02-11T10:44:40.702Z |
| CVE-2025-0875 |
6.5 (3.1)
|
IDOR in Proliz Software's OBS |
PROLIZ Computer Software Hardware Service Trade Ltd. Co. |
OBS (Student Affairs Information System) |
2025-09-22T08:02:09.660Z | 2026-02-11T07:23:46.991Z |
| CVE-2024-4259 |
6.9 (4.0)
|
Sensetive Data Exposure in SAMPAS's AKOS |
SAMPAŞ Holding |
AKOS (AkosCepVatandasService) |
2024-09-03T13:15:31.501Z | 2026-02-11T07:15:42.419Z |
| CVE-2023-6190 |
9.8 (3.1)
|
Authenicated Path Traversal in İzmir Katip Çelebi University |
İzmir Katip Çelebi University |
University Information Management System |
2023-12-27T14:36:35.559Z | 2026-02-11T07:14:59.075Z |
| CVE-2025-36511 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) M… |
n/a |
Intel(R) Memory and Storage Tool |
2026-02-10T16:26:04.601Z | 2026-02-11T04:56:53.066Z |
| CVE-2025-29950 |
7.1 (4.0)
|
Improper input validation in system management mo… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:10:28.112Z | 2026-02-11T04:56:51.402Z |
| CVE-2025-29951 |
7.3 (4.0)
|
A buffer overflow in the AMD Secure Processor (AS… |
AMD |
AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics |
2026-02-10T19:50:51.594Z | 2026-02-11T04:56:49.007Z |
| CVE-2026-21349 |
7.8 (3.1)
|
Lightroom Desktop | Out-of-bounds Write (CWE-787) |
Adobe |
Lightroom Desktop |
2026-02-10T19:43:23.584Z | 2026-02-11T04:56:48.192Z |
| CVE-2026-21351 |
7.8 (3.1)
|
After Effects | Use After Free (CWE-416) |
Adobe |
After Effects |
2026-02-10T17:52:53.649Z | 2026-02-11T04:56:47.428Z |
| CVE-2026-21312 |
7.8 (3.1)
|
Audition | Out-of-bounds Write (CWE-787) |
Adobe |
Audition |
2026-02-10T17:45:15.153Z | 2026-02-11T04:56:46.599Z |
| CVE-2026-21345 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Read (CWE-125) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:27.925Z | 2026-02-11T04:56:45.629Z |
| CVE-2026-21344 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Read (CWE-125) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:30.445Z | 2026-02-11T04:56:44.594Z |
| CVE-2026-21343 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Read (CWE-125) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:29.603Z | 2026-02-11T04:56:43.753Z |
| CVE-2026-21342 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:27.134Z | 2026-02-11T04:56:42.986Z |
| CVE-2026-21341 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:28.733Z | 2026-02-11T04:56:42.178Z |
| CVE-2026-21330 |
7.8 (3.1)
|
After Effects | Access of Resource Using Incompatible … |
Adobe |
After Effects |
2026-02-10T17:52:57.874Z | 2026-02-11T04:56:41.422Z |
| CVE-2026-21329 |
7.8 (3.1)
|
After Effects | Use After Free (CWE-416) |
Adobe |
After Effects |
2026-02-10T17:53:05.522Z | 2026-02-11T04:56:40.603Z |
| CVE-2026-21328 |
7.8 (3.1)
|
After Effects | Out-of-bounds Write (CWE-787) |
Adobe |
After Effects |
2026-02-10T17:53:00.426Z | 2026-02-11T04:56:39.644Z |
| CVE-2026-21327 |
7.8 (3.1)
|
After Effects | Out-of-bounds Write (CWE-787) |
Adobe |
After Effects |
2026-02-10T17:52:56.262Z | 2026-02-11T04:56:38.871Z |
| CVE-2026-21326 |
7.8 (3.1)
|
After Effects | Use After Free (CWE-416) |
Adobe |
After Effects |
2026-02-10T17:53:03.097Z | 2026-02-11T04:56:38.089Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2019-25292 |
8.5 (4.0)
7.8 (3.1)
|
Alps HID Monitor Service 8.1.0.10 - 'ApHidMonitorServi… |
Alps |
Alps HID Monitor Service |
2026-02-06T16:41:34.491Z | 2026-02-06T19:51:20.447Z |
| CVE-2019-25266 |
8.5 (4.0)
7.8 (3.1)
|
Wondershare Application Framework Service 2.4.3.231 - … |
Wondershare |
Wondershare Application Framework Service |
2026-02-06T16:41:34.027Z | 2026-02-06T19:13:07.897Z |
| CVE-2023-53546 |
N/A
|
net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_ref… |
Linux |
Linux |
2025-10-04T15:16:54.132Z | 2025-10-04T15:16:54.132Z |
| CVE-2025-68138 |
4.7 (3.1)
|
EVerest affected by memory exhaustion in libocpp |
EVerest |
everest-core |
2026-01-21T19:30:49.196Z | 2026-01-22T21:56:29.394Z |
| CVE-2025-68139 |
4.3 (3.1)
|
In EVerest, by default, the EV is responsible for clos… |
EVerest |
everest-core |
2026-01-21T19:36:36.127Z | 2026-01-22T16:50:50.152Z |
| CVE-2025-68140 |
4.3 (3.1)
|
EVerest allows null session ID to bypass session ID ve… |
EVerest |
everest-core |
2026-01-21T19:54:51.285Z | 2026-01-22T16:50:45.344Z |
| CVE-2025-68141 |
7.4 (3.1)
|
EVerest vulnerable to null pointer dereference during … |
EVerest |
everest-core |
2026-01-21T19:56:14.482Z | 2026-01-22T16:50:38.843Z |
| CVE-2026-23955 |
4.2 (3.1)
|
EVerest vulnerable to concatenation of strings literal… |
EVerest |
everest-core |
2026-01-21T19:25:12.104Z | 2026-01-21T19:53:57.098Z |
| CVE-2025-68137 |
8.4 (3.1)
|
EVerest's Integer Overflow and Signed to Unsigned conv… |
EVerest |
everest-core |
2026-01-21T19:20:09.059Z | 2026-01-21T19:51:26.058Z |
| CVE-2025-68136 |
7.4 (3.1)
|
EVerest's inadequate session handling can lead to memo… |
EVerest |
everest-core |
2026-01-21T19:18:21.068Z | 2026-01-21T19:47:04.055Z |
| CVE-2025-68135 |
6.5 (3.1)
|
EVerest's inadequate exception handling leads to denia… |
EVerest |
everest-core |
2026-01-21T18:56:05.970Z | 2026-01-21T19:17:21.915Z |
| CVE-2025-68134 |
7.4 (3.1)
|
EVerest's use of assert functions can potentially lead… |
EVerest |
everest-core |
2026-01-21T18:32:13.882Z | 2026-01-21T19:03:47.370Z |
| CVE-2025-68133 |
7.4 (3.1)
|
EVerest's unlimited connections can lead to DoS throug… |
EVerest |
everest-core |
2026-01-21T02:25:03.085Z | 2026-01-21T15:09:48.152Z |
| CVE-2025-68132 |
2.4 (4.0)
|
EVerest has out-of-bounds read in DZG_GSH01 SLIP CRC p… |
EVerest |
everest-core |
2026-01-21T18:28:40.763Z | 2026-01-21T19:06:48.136Z |
| CVE-2026-22044 |
6.5 (3.1)
|
GLPI is Vulnerable to Authenticated SQL Injection |
glpi-project |
glpi |
2026-02-04T17:15:39.205Z | 2026-02-04T19:27:43.406Z |
| CVE-2026-22247 |
4.1 (3.1)
|
GLPI is Vulnerable to SSRF via Webhooks |
glpi-project |
glpi |
2026-02-04T17:10:30.153Z | 2026-02-05T14:33:19.799Z |
| CVE-2026-23624 |
4.3 (3.1)
|
GLPI is vulnerable to session stealing on externally a… |
glpi-project |
glpi |
2026-02-04T17:15:33.750Z | 2026-02-04T19:56:27.764Z |
| CVE-2026-24868 |
6.5 (3.1)
|
Mitigation bypass in the Privacy: Anti-Tracking component |
Mozilla |
Firefox |
2026-01-27T15:58:48.472Z | 2026-02-06T20:20:29.530Z |
| CVE-2025-13502 |
7.5 (3.1)
|
Webkit: webkitgtk / wpe webkit: out-of-bounds read and… |
The WebKitGTK Team |
webkitgtk |
2025-11-25T08:02:26.022Z | 2026-02-06T20:06:26.302Z |
| CVE-2025-10622 |
8 (3.1)
|
Foreman: os command injection via ct_location and fcct… |
The Foreman |
Foreman |
2025-11-05T07:32:14.390Z | 2026-02-06T20:07:02.486Z |
| CVE-2007-2774 |
N/A
|
Multiple PHP remote file inclusion vulnerabilitie… |
n/a |
n/a |
2007-05-22T03:00:00.000Z | 2024-08-07T13:49:57.380Z |
| CVE-2025-58381 |
4.6 (4.0)
|
Directory transversal vulnerability in Brocade Fabric … |
Brocade |
Fabric OS |
2026-02-03T05:40:14.240Z | 2026-02-04T16:24:08.695Z |
| CVE-2025-58380 |
4.6 (4.0)
|
Directory transversal vulnerability in Brocade Fabric … |
Brocade |
Fabric OS |
2026-02-03T05:05:49.111Z | 2026-02-03T20:51:28.437Z |
| CVE-2026-0383 |
8.2 (4.0)
|
Information disclosure in Brocade Fabric OS before 9.2… |
Brocade |
Fabric OS |
2026-02-03T03:55:44.788Z | 2026-02-04T04:55:51.294Z |
| CVE-2025-58383 |
8.4 (4.0)
|
Privilege escalation via bind command in Brocade Fabric OS |
Brocade |
Fabric OS |
2026-02-03T01:49:18.962Z | 2026-02-04T04:55:46.301Z |
| CVE-2025-58379 |
6 (4.0)
|
Password Exposure in Brocade Fabric OS |
Brocade |
Fabric OS |
2026-02-03T01:55:09.736Z | 2026-02-03T15:31:23.455Z |
| CVE-2025-62157 |
8.5 (4.0)
|
Argo Workflows exposes artifact repository credentials… |
argoproj |
argo-workflows |
2025-10-14T15:06:39.829Z | 2025-10-14T16:06:02.367Z |
| CVE-2025-62156 |
8.1 (3.1)
|
argo-workflows Zip Slip path traversal allows arbitrar… |
argoproj |
argo-workflows |
2025-10-14T14:52:44.502Z | 2025-10-14T16:04:24.519Z |
| CVE-2024-53862 |
6.3 (4.0)
|
Argo Workflows Allows Access to Archived Workflows wit… |
argoproj |
argo-workflows |
2024-12-02T16:08:17.618Z | 2024-12-02T19:41:07.391Z |
| CVE-2024-47827 |
5.7 (3.1)
|
Argo Workflows Controller: Denial of Service via malic… |
argoproj |
argo-workflows |
2024-10-28T15:10:55.772Z | 2025-04-04T20:43:57.325Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2019-25292 | Alps HID Monitor Service 8.1.0.10 contains an unquoted service path vulnerability that allows local… | 2026-02-06T17:16:10.360 | 2026-02-06T21:57:22.450 |
| fkie_cve-2019-25266 | Wondershare Application Framework Service 2.4.3.231 contains an unquoted service path vulnerability… | 2026-02-06T17:16:10.187 | 2026-02-06T21:57:22.450 |
| fkie_cve-2023-53546 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5: DR, fix memory leak … | 2025-10-04T16:15:49.747 | 2026-02-06T21:27:58.963 |
| fkie_cve-2025-68138 | EVerest is an EV charging software stack, and EVerest libocpp is a C++ implementation of the Open C… | 2026-01-21T20:16:06.007 | 2026-02-06T21:22:15.583 |
| fkie_cve-2025-68139 | EVerest is an EV charging software stack. In all versions up to and including 2025.12.1, the defaul… | 2026-01-21T20:16:06.167 | 2026-02-06T21:22:10.130 |
| fkie_cve-2025-68140 | EVerest is an EV charging software stack. Prior to version 2025.9.0, once the validity of the recei… | 2026-01-21T20:16:06.343 | 2026-02-06T21:22:06.867 |
| fkie_cve-2025-68141 | EVerest is an EV charging software stack. Prior to version 2025.10.0, during the deserialization of… | 2026-01-21T20:16:06.523 | 2026-02-06T21:22:03.747 |
| fkie_cve-2026-23955 | EVerest is an EV charging software stack. Prior to version 2025.9.0, in several places, integer val… | 2026-01-21T20:16:12.517 | 2026-02-06T21:21:59.107 |
| fkie_cve-2025-68137 | EVerest is an EV charging software stack. Prior to version 2025.10.0, an integer overflow occurring… | 2026-01-21T20:16:05.840 | 2026-02-06T21:21:52.920 |
| fkie_cve-2025-68136 | EVerest is an EV charging software stack. Prior to version 2025.10.0, once the module receives a SD… | 2026-01-21T20:16:05.677 | 2026-02-06T21:21:48.500 |
| fkie_cve-2025-68135 | EVerest is an EV charging software stack. Prior to version 2025.10.0, C++ exceptions are not proper… | 2026-01-21T19:16:04.667 | 2026-02-06T21:21:45.790 |
| fkie_cve-2025-68134 | EVerest is an EV charging software stack. Prior to version 2025.10.0, the use of the `assert` funct… | 2026-01-21T19:16:04.510 | 2026-02-06T21:21:42.600 |
| fkie_cve-2025-68133 | EVerest is an EV charging software stack. In versions 2025.9.0 and below, an attacker can exhaust t… | 2026-01-21T03:15:45.513 | 2026-02-06T21:21:36.683 |
| fkie_cve-2025-68132 | EVerest is an EV charging software stack. Prior to version 2025.12.0, `is_message_crc_correct` in t… | 2026-01-21T19:16:04.343 | 2026-02-06T21:21:17.600 |
| fkie_cve-2026-22044 | GLPI is a free asset and IT management software package. From version 0.85 to before 10.0.23, an au… | 2026-02-04T18:16:08.580 | 2026-02-06T21:19:53.713 |
| fkie_cve-2026-22247 | GLPI is a free asset and IT management software package. From version 11.0.0 to before 11.0.5, a GL… | 2026-02-04T18:16:08.753 | 2026-02-06T21:19:00.433 |
| fkie_cve-2026-23624 | GLPI is a free asset and IT management software package. In versions starting from 0.71 to before 1… | 2026-02-04T18:16:08.913 | 2026-02-06T21:18:17.370 |
| fkie_cve-2026-24868 | Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability affects Firefox < 147.0.2. | 2026-01-27T16:16:36.173 | 2026-02-06T21:16:16.923 |
| fkie_cve-2025-13502 | A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and i… | 2025-11-25T08:15:51.917 | 2026-02-06T21:16:15.390 |
| fkie_cve-2025-10622 | A flaw was found in Red Hat Satellite (Foreman component). This vulnerability allows an authenticat… | 2025-11-05T08:15:32.990 | 2026-02-06T21:16:14.800 |
| fkie_cve-2007-2774 | Multiple PHP remote file inclusion vulnerabilities in SunLight CMS 5.3 allow remote attackers to ex… | 2007-05-21T23:30:00.000 | 2026-02-06T20:55:16.183 |
| fkie_cve-2025-58381 | A vulnerability in Brocade Fabric OS before 9.2.1c2 could allow an authenticated attacker with ad… | 2026-02-03T06:15:52.807 | 2026-02-06T20:53:22.197 |
| fkie_cve-2025-58380 | A vulnerability in Brocade Fabric OS before 9.2.1 could allow an authenticated attacker with admin … | 2026-02-03T05:16:21.673 | 2026-02-06T20:52:59.600 |
| fkie_cve-2026-0383 | A vulnerability in Brocade Fabric OS could allow an authenticated, local attacker with privileges t… | 2026-02-03T04:15:55.840 | 2026-02-06T20:52:11.827 |
| fkie_cve-2025-58383 | A vulnerability in Brocade Fabric OS versions before 9.2.1c2 could allow an administrator-level use… | 2026-02-03T02:16:07.260 | 2026-02-06T20:51:56.227 |
| fkie_cve-2025-58379 | Brocade Fabric OS before 9.2.1 has a vulnerability that could allow a local authenticated attacker … | 2026-02-03T02:16:06.970 | 2026-02-06T20:50:29.130 |
| fkie_cve-2025-62157 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs o… | 2025-10-14T15:16:12.853 | 2026-02-06T20:49:29.827 |
| fkie_cve-2025-62156 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs o… | 2025-10-14T15:16:12.683 | 2026-02-06T20:49:29.827 |
| fkie_cve-2024-53862 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs o… | 2024-12-02T16:15:14.277 | 2026-02-06T20:49:29.827 |
| fkie_cve-2024-47827 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs o… | 2024-10-28T16:15:03.990 | 2026-02-06T20:49:29.827 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2rv9-m7pg-rvf8 |
9.8 (3.1)
8.7 (4.0)
|
Konica Minolta FTP Utility 1.0 contains a buffer overflow vulnerability in the NLST command that al… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-2f92-9qpx-3m87 |
9.8 (3.1)
8.4 (4.0)
|
Remote Desktop Audit 2.3.0.157 contains a buffer overflow vulnerability that allows attackers to ex… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-28x7-22j7-wrcc |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: fbdev: omapfb: lcd_mipid: Fix … | 2025-10-07T18:31:10Z | 2026-02-04T00:30:28Z |
| ghsa-wvjj-gc57-3w9j |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: don't access release… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-w939-vjpg-j262 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: clk: microchip: fix potential … | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-v8v9-wq25-mffx |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: fix wron… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-v24g-q75p-xqch |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drm/i915/perf: add sentinel to… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-qw28-7x42-46v9 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Add validation b… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-pw78-hwhh-29v2 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: bpf: Make bpf_refcount_acquire… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-jw77-c2gh-pjqg |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: rcu: Avoid stack overflow due … | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-jg3h-cxcf-h3vq |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: octeon_ep: cancel queued works… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-j5px-w2f8-7x3g |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: vdpa: Add features attr to vdp… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-hh9m-7vg3-wpg4 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: hif_usb: fix memo… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-hcvh-9qhf-6r43 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: media: radio-shark: Add endpoi… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-h9cf-c7q8-gcqh |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: x86: fix clear_user_rep_good()… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-cw77-x75c-4fx8 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ASoC: lpass: Fix for KASAN use… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-c64q-8p7x-8r8g |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: ath6kl: reduce WARN to d… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-c2mm-xf5x-8rpj |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: vmbus: Don't dere… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-9w73-69h2-5rjg |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: media: i2c: ov772x: Fix memlea… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-9ggf-w6f4-gjvq |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: media: amphion: fix REVERSE_IN… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-9597-9v22-38m3 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: Input: exc3000 - properly stop… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-933f-4h29-gq7r |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: perf trace: Really free the ev… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-523c-3cg7-7hhv |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: ac97: Fix possible NULL … | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-xwrx-f4gw-ff4g |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix unpinning of page… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-xvh8-f5vg-49g2 |
8.8 (3.1)
7.4 (4.0)
|
A security flaw has been discovered in D-Link DIR-825 up to 2.10. Affected by this vulnerability is… | 2025-09-18T15:30:32Z | 2026-02-04T00:30:26Z |
| ghsa-rxmq-8fwh-qv2c |
3.5 (3.1)
2.0 (4.0)
|
A vulnerability was identified in MiczFlor RPi-Jukebox-RFID up to 2.8.0. This vulnerability affects… | 2025-09-13T18:30:55Z | 2026-02-04T00:30:26Z |
| ghsa-rf27-4m25-62jv |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix use after free in… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-j389-h5qc-xpxp |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Fix a leak in map_… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-hqcj-v9r7-994j |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Take RTNL lock when… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-g934-mv7g-597h |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ext4: fix possible double unlo… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-27 |
|
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse).… | matrix-synapse | 2021-04-12T21:15:00Z | 2021-04-21T17:02:00Z |
| pysec-2021-26 |
|
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse).… | matrix-synapse | 2021-04-12T22:15:00Z | 2021-04-21T16:45:00Z |
| pysec-2021-10 |
|
A SQL Injection issue in the SQL Panel in Jazzband Django Debug Toolbar before 1.11.1, 2.… | django-debug-toolbar | 2021-04-14T18:15:00Z | 2021-04-21T15:05:00Z |
| pysec-2021-18 |
|
CERN Indico before 2.3.4 can use an attacker-supplied Host header in a password reset link. | indico | 2021-04-07T14:15:00Z | 2021-04-15T14:13:00Z |
| pysec-2021-34 |
|
models/metadata.py in the pikepdf package 1.3.0 through 2.9.2 for Python allows XXE when … | pikepdf | 2021-04-01T20:15:00Z | 2021-04-09T19:15:00Z |
| pysec-2021-11 |
|
django-registration is a user registration package for Django. The django-registration pa… | django-registration | 2021-04-01T22:15:00Z | 2021-04-06T18:40:00Z |
| pysec-2020-95 |
|
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configur… | pyspark | 2020-06-23T22:15:00Z | 2021-04-02T12:15:00Z |
| pysec-2021-51 |
|
An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_ro… | salt | 2021-02-27T05:15:00Z | 2021-04-01T17:15:00Z |
| pysec-2021-50 |
|
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor … | salt | 2021-02-27T05:15:00Z | 2021-04-01T17:15:00Z |
| pysec-2021-75 |
|
In SaltStack Salt before 3002.5, when authenticating to services using certain modules, t… | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-74 |
|
In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi serv… | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-73 |
|
An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vul… | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-57 |
|
An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vul… | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-55 |
|
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to … | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-54 |
|
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They mi… | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-53 |
|
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can … | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-52 |
|
An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does … | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2020-28 |
|
In Mozilla Bleach before 3.12, a mutation XSS in bleach.clean when RCDATA and either svg … | bleach | 2020-03-24T22:15:00Z | 2021-03-30T23:15:00Z |
| pysec-2020-27 |
|
In Mozilla Bleach before 3.11, a mutation XSS affects users calling bleach.clean with nos… | bleach | 2020-03-24T22:15:00Z | 2021-03-30T22:15:00Z |
| pysec-2020-62 |
|
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser did… | lxml | 2020-12-03T17:15:00Z | 2021-03-30T21:15:00Z |
| pysec-2020-50 |
|
The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints… | jupyter-server | 2020-12-21T18:15:00Z | 2021-03-30T19:15:00Z |
| pysec-2021-19 |
|
An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. … | lxml | 2021-03-21T05:15:00Z | 2021-03-30T18:47:00Z |
| pysec-2020-106 |
|
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and to… | salt | 2020-11-06T08:15:00Z | 2021-03-30T13:48:00Z |
| pysec-2020-105 |
|
The TLS module within SaltStack Salt through 3002 creates certificates with weak file per… | salt | 2020-11-06T08:15:00Z | 2021-03-30T13:44:00Z |
| pysec-2020-104 |
|
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to t… | salt | 2020-11-06T08:15:00Z | 2021-03-30T13:29:00Z |
| pysec-2021-32 |
|
OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web… | omero-web | 2021-03-23T16:15:00Z | 2021-03-27T02:20:00Z |
| pysec-2021-31 |
|
OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web… | omero-web | 2021-03-23T16:15:00Z | 2021-03-27T01:59:00Z |
| pysec-2019-4 |
|
In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13… | ansible | 2019-10-08T19:15:00Z | 2021-03-26T22:15:00Z |
| pysec-2021-76 |
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohtt… | aiohttp | 2021-02-26T03:15:00Z | 2021-03-26T20:01:00Z |
| pysec-2021-35 |
|
An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overfl… | pillow | 2021-03-19T04:15:00Z | 2021-03-26T14:06:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-31969 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.819847Z |
| gsd-2024-31968 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.765841Z |
| gsd-2024-31967 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.655152Z |
| gsd-2024-31966 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.856004Z |
| gsd-2024-31965 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.602508Z |
| gsd-2024-31964 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.637728Z |
| gsd-2024-31963 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.605718Z |
| gsd-2024-31962 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.779335Z |
| gsd-2024-31961 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.522969Z |
| gsd-2024-31960 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.845666Z |
| gsd-2024-31959 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.717393Z |
| gsd-2024-31958 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.881893Z |
| gsd-2024-31957 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.534908Z |
| gsd-2024-31956 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.560706Z |
| gsd-2024-31955 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.695461Z |
| gsd-2024-31954 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.599773Z |
| gsd-2024-31953 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.757579Z |
| gsd-2024-31952 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.643311Z |
| gsd-2024-31951 | In the Opaque LSA Extended Link parser in FRRouting (FRR) through 9.1, there can be a buf… | 2024-04-11T05:03:20.830634Z |
| gsd-2024-31950 | In FRRouting (FRR) through 9.1, there can be a buffer overflow and daemon crash in ospf_t… | 2024-04-11T05:03:20.620141Z |
| gsd-2024-31949 | In FRRouting (FRR) through 9.1, an infinite loop can occur when receiving a MP/GR capabil… | 2024-04-11T05:03:20.679258Z |
| gsd-2024-31948 | In FRRouting (FRR) through 9.1, an attacker using a malformed Prefix SID attribute in a B… | 2024-04-11T05:03:20.596771Z |
| gsd-2024-31947 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.548048Z |
| gsd-2024-31946 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.701190Z |
| gsd-2024-31945 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.674799Z |
| gsd-2024-31944 | Cross-Site Request Forgery (CSRF) vulnerability in Octolize WooCommerce UPS Shipping – Li… | 2024-04-11T05:03:20.562624Z |
| gsd-2024-31943 | Cross-Site Request Forgery (CSRF) vulnerability in Octolize USPS Shipping for WooCommerce… | 2024-04-11T05:03:20.876673Z |
| gsd-2024-31942 | Cross-Site Request Forgery (CSRF) vulnerability in Typps Calendarista Basic Edition.This … | 2024-04-11T05:03:20.721733Z |
| gsd-2024-31941 | Cross-Site Request Forgery (CSRF) vulnerability in CodePeople CP Media Player.This issue … | 2024-04-11T05:03:20.862118Z |
| gsd-2024-31940 | Cross-Site Request Forgery (CSRF) vulnerability in RedNao Extra Product Options Builder f… | 2024-04-11T05:03:20.571278Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2024-1800 | Malicious code in baas-admin-sdk (npm) | 2024-06-25T12:29:11Z | 2025-12-30T16:26:11Z |
| mal-0000-kam193-8ddff882bfe186cc | Pentesting or research code in rippling-cli (PyPI) | 2025-12-30T10:00:51Z | 2025-12-30T10:00:53Z |
| MAL-0000-KAM193-8DDFF882BFE186CC | Pentesting or research code in rippling-cli (PyPI) | 2025-12-30T10:00:51Z | 2025-12-30T10:00:53Z |
| mal-0000-kam193-a5e82ba558a433d6 | Pentesting or research code in awsutil (PyPI) | 2025-12-29T21:57:34Z | 2025-12-29T21:57:34Z |
| MAL-0000-KAM193-A5E82BA558A433D6 | Pentesting or research code in awsutil (PyPI) | 2025-12-29T21:57:34Z | 2025-12-29T21:57:34Z |
| mal-0000-kam193-7a913c42577c1aac | Malicious code in cryptozip (PyPI) | 2025-12-28T19:49:40Z | 2025-12-29T12:13:22Z |
| MAL-0000-KAM193-7A913C42577C1AAC | Malicious code in cryptozip (PyPI) | 2025-12-28T19:49:40Z | 2025-12-29T12:13:22Z |
| mal-2025-192579 | Malicious code in smtblib (PyPI) | 2025-12-15T15:24:47Z | 2025-12-29T11:08:56Z |
| MAL-2025-192579 | Malicious code in smtblib (PyPI) | 2025-12-15T15:24:47Z | 2025-12-29T11:08:56Z |
| mal-2025-192958 | Malicious code in smtmlib (PyPI) | 2025-12-29T10:04:23Z | 2025-12-29T10:08:51Z |
| MAL-2025-192958 | Malicious code in smtmlib (PyPI) | 2025-12-29T10:04:23Z | 2025-12-29T10:08:51Z |
| mal-0000-kam193-04bd21d6e982435e | Malicious code in aiogram-types-v3 (PyPI) | 2025-12-28T01:44:36Z | 2025-12-28T19:40:03Z |
| MAL-0000-KAM193-04BD21D6E982435E | Malicious code in aiogram-types-v3 (PyPI) | 2025-12-28T01:44:36Z | 2025-12-28T19:40:03Z |
| mal-2025-192948 | Malicious code in extrazip (PyPI) | 2025-12-27T09:41:01Z | 2025-12-27T09:41:01Z |
| MAL-2025-192948 | Malicious code in extrazip (PyPI) | 2025-12-27T09:41:01Z | 2025-12-27T09:41:01Z |
| mal-0000-kam193-32bc16cb2876d151 | Pentesting or research code in crypo (PyPI) | 2025-12-27T08:56:38Z | 2025-12-27T08:56:38Z |
| MAL-0000-KAM193-32BC16CB2876D151 | Pentesting or research code in crypo (PyPI) | 2025-12-27T08:56:38Z | 2025-12-27T08:56:38Z |
| mal-0000-kam193-171994a8c3aaa87e | Pentesting or research code in crpto (PyPI) | 2025-12-27T08:55:55Z | 2025-12-27T08:55:55Z |
| MAL-0000-KAM193-171994A8C3AAA87E | Pentesting or research code in crpto (PyPI) | 2025-12-27T08:55:55Z | 2025-12-27T08:55:55Z |
| mal-0000-kam193-dcf730d86bfb8fcf | Pentesting or research code in flaask (PyPI) | 2025-12-27T08:53:06Z | 2025-12-27T08:53:06Z |
| MAL-0000-KAM193-DCF730D86BFB8FCF | Pentesting or research code in flaask (PyPI) | 2025-12-27T08:53:06Z | 2025-12-27T08:53:06Z |
| mal-2025-192940 | Malicious code in aiogram-3 (PyPI) | 2025-12-26T04:33:18Z | 2025-12-26T10:09:30Z |
| MAL-2025-192940 | Malicious code in aiogram-3 (PyPI) | 2025-12-26T04:33:18Z | 2025-12-26T10:09:30Z |
| mal-0000-kam193-f6a9fb1c7d327b2f | Malicious code in aiogram-sever-patch (PyPI) | 2025-12-25T14:18:44Z | 2025-12-25T15:55:13Z |
| MAL-0000-KAM193-F6A9FB1C7D327B2F | Malicious code in aiogram-sever-patch (PyPI) | 2025-12-25T14:18:44Z | 2025-12-25T15:55:13Z |
| mal-0000-kam193-6a06919b9f87236d | Pentesting or research code in pxdbench (PyPI) | 2025-12-25T11:04:53Z | 2025-12-25T11:04:53Z |
| MAL-0000-KAM193-6A06919B9F87236D | Pentesting or research code in pxdbench (PyPI) | 2025-12-25T11:04:53Z | 2025-12-25T11:04:53Z |
| mal-2025-192929 | Malicious code in envtoolsx (PyPI) | 2025-12-24T22:45:19Z | 2025-12-24T22:45:19Z |
| MAL-2025-192929 | Malicious code in envtoolsx (PyPI) | 2025-12-24T22:45:19Z | 2025-12-24T22:45:19Z |
| mal-0000-kam193-cc5aee4d7ffd5c96 | Pentesting or research code in livekit-agents-hedra (PyPI) | 2025-12-24T20:38:01Z | 2025-12-24T20:38:01Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0175 | Jenkins Plugins: Mehrere Schwachstellen | 2025-01-22T23:00:00.000+00:00 | 2025-01-22T23:00:00.000+00:00 |
| wid-sec-w-2025-0171 | GitLab: Mehrere Schwachstellen | 2025-01-22T23:00:00.000+00:00 | 2025-01-22T23:00:00.000+00:00 |
| wid-sec-w-2025-0169 | Unify OpenScape 4000: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-01-22T23:00:00.000+00:00 | 2025-01-22T23:00:00.000+00:00 |
| wid-sec-w-2023-2066 | QT: Schwachstelle ermöglicht Denial of Service | 2023-08-15T22:00:00.000+00:00 | 2025-01-22T23:00:00.000+00:00 |
| wid-sec-w-2025-0168 | Oracle JD Edwards: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0165 | Oracle Retail Applications: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0164 | Oracle Siebel CRM: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0163 | Oracle Supply Chain: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0162 | Oracle Systems: Schwachstelle gefährdet Integrität und Verfügbarkeit | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0161 | Oracle Utilities Applications: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0160 | Oracle Virtualization: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0159 | JetBrains TeamCity: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0158 | Linksys Router: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0157 | Microsoft GitHub Enterprise: Schwachstelle ermöglicht Signatur-Spoofing | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0153 | Arista EOS: Schwachstelle ermöglicht Denial of Service | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0152 | Siemens SIMATIC S7: Schwachstelle ermöglicht Manipulation der Konfiguration | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0151 | HCL BigFix: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0149 | Oracle Java SE: Mehrere Schwachstellen | 2019-07-16T22:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0148 | Oracle Communications: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0147 | Oracle Construction and Engineering: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0146 | Oracle E-Business Suite: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0145 | Oracle Enterprise Manager: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0144 | Oracle Financial Services Applications: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0143 | Oracle Fusion Middleware: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0142 | Oracle Health Sciences Applications: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0141 | Oracle Hyperion: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0139 | Oracle Database Server: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0138 | Oracle REST Data Services: Schwachstelle gefährdet Integrität | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0137 | Oracle Secure Backup: Schwachstelle gefährdet Vertraulichkeit | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0136 | Oracle Commerce: Schwachstelle gefährdet Vertraulichkeit | 2025-01-21T23:00:00.000+00:00 | 2025-01-21T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2020:5056 | Red Hat Security Advisory: podman security and bug fix update | 2020-11-10T13:54:40+00:00 | 2026-02-18T16:24:24+00:00 |
| rhsa-2020:5055 | Red Hat Security Advisory: buildah security update | 2020-11-10T13:55:01+00:00 | 2026-02-18T16:24:24+00:00 |
| rhsa-2020:5054 | Red Hat Security Advisory: skopeo security update | 2020-11-10T13:54:32+00:00 | 2026-02-18T16:24:22+00:00 |
| rhsa-2020:3783 | Red Hat Security Advisory: OpenShift Container Platform 4.4.23 cluster-network-operator-container security update | 2020-09-22T07:15:37+00:00 | 2026-02-18T16:24:22+00:00 |
| rhsa-2020:4297 | Red Hat Security Advisory: OpenShift Container Platform 4.6.1 package security update | 2020-10-27T14:53:57+00:00 | 2026-02-18T16:24:21+00:00 |
| rhsa-2020:4694 | Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update | 2020-11-04T01:34:32+00:00 | 2026-02-18T16:24:19+00:00 |
| rhsa-2020:4214 | Red Hat Security Advisory: go-toolset-1.13-golang security and bug fix update | 2020-10-08T10:52:13+00:00 | 2026-02-18T16:24:17+00:00 |
| rhsa-2020:3780 | Red Hat Security Advisory: OpenShift Container Platform 4.5.11 ose-cluster-svcat-apiserver-operator-container security update | 2020-09-21T19:50:11+00:00 | 2026-02-18T16:24:16+00:00 |
| rhsa-2020:3727 | Red Hat Security Advisory: OpenShift Container Platform 3.11.286 security update | 2020-09-16T07:55:58+00:00 | 2026-02-18T16:24:16+00:00 |
| rhsa-2020:3665 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2020-09-08T10:05:46+00:00 | 2026-02-18T16:24:16+00:00 |
| rhsa-2020:3578 | Red Hat Security Advisory: OpenShift Container Platform 4.5.8 security update | 2020-09-08T10:09:31+00:00 | 2026-02-18T16:24:14+00:00 |
| rhsa-2020:3087 | Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.17.5 container images security update | 2020-07-22T07:33:26+00:00 | 2026-02-18T16:24:12+00:00 |
| rhsa-2021:4765 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.19.0 | 2021-11-23T08:45:19+00:00 | 2026-02-18T16:24:09+00:00 |
| rhsa-2023:1334 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.2 security update | 2023-03-20T09:15:52+00:00 | 2026-02-18T16:24:06+00:00 |
| rhsa-2022:0687 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.1 security and bug fix update | 2022-02-28T21:18:28+00:00 | 2026-02-18T16:24:03+00:00 |
| rhsa-2022:0230 | Red Hat Security Advisory: Red Hat OpenShift Enterprise Logging bug fix and security update (5.2.6) | 2022-01-21T19:04:46+00:00 | 2026-02-18T16:24:02+00:00 |
| rhsa-2022:0227 | Red Hat Security Advisory: Red Hat OpenShift Enterprise Logging bug fix and security update (5.3.3) | 2022-01-20T21:40:25+00:00 | 2026-02-18T16:24:02+00:00 |
| rhsa-2022:0226 | Red Hat Security Advisory: Red Hat OpenShift Enterprise Logging bug fix and security update (5.1.7) | 2022-01-20T21:39:00+00:00 | 2026-02-18T16:24:01+00:00 |
| rhsa-2021:4863 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.6.0 Security release | 2021-11-30T14:25:37+00:00 | 2026-02-18T16:24:01+00:00 |
| rhsa-2021:4861 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.6.0 Security release | 2021-11-30T14:28:36+00:00 | 2026-02-18T16:24:00+00:00 |
| rhsa-2021:4424 | Red Hat Security Advisory: openssl security and bug fix update | 2021-11-09T18:08:40+00:00 | 2026-02-18T16:24:00+00:00 |
| rhsa-2021:4628 | Red Hat Security Advisory: Openshift Logging 5.1.4 bug fix and security update | 2021-11-17T02:22:53+00:00 | 2026-02-18T16:23:59+00:00 |
| rhsa-2021:4618 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4 images and security updates | 2021-11-11T18:31:07+00:00 | 2026-02-18T16:23:58+00:00 |
| rhsa-2021:4614 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP10 security update | 2021-11-10T17:20:46+00:00 | 2026-02-18T16:23:57+00:00 |
| rhsa-2021:4613 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP10 security update | 2021-11-10T17:14:06+00:00 | 2026-02-18T16:23:57+00:00 |
| rhsa-2021:4226 | Red Hat Security Advisory: grafana security, bug fix, and enhancement update | 2021-11-09T18:42:22+00:00 | 2026-02-18T16:23:56+00:00 |
| rhsa-2021:4198 | Red Hat Security Advisory: edk2 security, bug fix, and enhancement update | 2021-11-09T18:33:45+00:00 | 2026-02-18T16:23:55+00:00 |
| rhsa-2021:4032 | Red Hat Security Advisory: Openshift Logging 5.2.3 bug fix and security update | 2021-11-17T03:31:35+00:00 | 2026-02-18T16:23:55+00:00 |
| rhsa-2021:3798 | Red Hat Security Advisory: openssl security update | 2021-10-12T16:13:14+00:00 | 2026-02-18T16:23:55+00:00 |
| rhsa-2021:3024 | Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.24.0 Operator/Operand Containers security update | 2021-08-09T07:28:44+00:00 | 2026-02-18T16:23:49+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-19-318-02 | Siemens S7-1200 and S7-200 SMART CPUs (Update B) | 2019-11-14T00:00:00.000000Z | 2020-07-14T00:00:00.000000Z |
| icsa-19-227-03 | Siemens SCALANCE Products (Update A) | 2019-08-15T00:00:00.000000Z | 2020-07-14T00:00:00.000000Z |
| icsa-20-191-02 | Rockwell Automation Logix Designer Studio 5000 | 2020-07-09T00:00:00.000000Z | 2020-07-09T00:00:00.000000Z |
| icsa-20-191-01 | Phoenix Contact Automation Worx Software Suite | 2020-07-09T00:00:00.000000Z | 2020-07-09T00:00:00.000000Z |
| icsa-20-163-02 | Rockwell Automation FactoryTalk Linx Software (Update A) | 2020-06-11T00:00:00.000000Z | 2020-07-09T00:00:00.000000Z |
| icsa-20-189-02 | Mitsubishi Electric GOT2000 Series | 2020-07-07T00:00:00.000000Z | 2020-07-07T00:00:00.000000Z |
| icsa-20-189-01 | Grundfos CIM 500 | 2020-07-07T00:00:00.000000Z | 2020-07-07T00:00:00.000000Z |
| icsa-20-175-01 | Mitsubishi Electric MELSEC iQ-R, iQ-F, Q, L and FX Series CPU Modules (Update A) | 2020-06-23T00:00:00.000000Z | 2020-07-07T00:00:00.000000Z |
| icsa-20-184-02 | ABB System 800xA Information Manager | 2020-07-02T00:00:00.000000Z | 2020-07-02T00:00:00.000000Z |
| icsa-20-184-01 | Nortek Linear eMerge 50P/5000P | 2020-07-02T00:00:00.000000Z | 2020-07-02T00:00:00.000000Z |
| icsa-20-170-01 | Johnson Controls exacqVision (Update A) | 2020-06-18T00:00:00.000000Z | 2020-07-02T00:00:00.000000Z |
| icsa-20-182-02 | Mitsubishi Electric Factory Automation Engineering Software Products | 2020-06-30T00:00:00.000000Z | 2020-06-30T00:00:00.000000Z |
| icsa-20-147-01 | Inductive Automation Ignition (Update B) | 2020-05-26T00:00:00.000000Z | 2020-06-30T00:00:00.000000Z |
| icsma-20-177-01 | Philips Ultrasound Systems | 2020-06-25T00:00:00.000000Z | 2020-06-25T00:00:00.000000Z |
| icsa-20-177-03 | Rockwell Automation FactoryTalk View SE | 2020-06-25T00:00:00.000000Z | 2020-06-25T00:00:00.000000Z |
| icsa-20-177-02 | Rockwell Automation FactoryTalk Services Platform XXE | 2020-06-25T00:00:00.000000Z | 2020-06-25T00:00:00.000000Z |
| icsma-20-170-06 | BD Alaris PCU (Update A) | 2020-06-18T00:00:00.000000Z | 2020-06-23T00:00:00.000000Z |
| icsma-20-170-04 | Baxter Sigma Spectrum Infusion Pumps (Update B) | 2020-06-18T00:00:00.000000Z | 2020-06-23T00:00:00.000000Z |
| icsma-20-170-03 | Baxter Phoenix Hemodialysis Delivery System (Update A) | 2020-06-18T00:00:00.000000Z | 2020-06-23T00:00:00.000000Z |
| icsma-20-170-01 | Baxter ExactaMix (Update A) | 2020-06-18T00:00:00.000000Z | 2020-06-23T00:00:00.000000Z |
| icsa-20-175-03 | ABB Device Library Wizard | 2020-06-23T00:00:00.000000Z | 2020-06-23T00:00:00.000000Z |
| icsa-20-175-02 | Honeywell ControlEdge PLC and RTU | 2020-06-23T00:00:00.000000Z | 2020-06-23T00:00:00.000000Z |
| icsma-20-170-05 | BIOTRONIK CardioMessenger II | 2020-06-18T00:00:00.000000Z | 2020-06-18T00:00:00.000000Z |
| icsa-20-170-05 | Rockwell Automation FactoryTalk View SE | 2020-06-18T00:00:00.000000Z | 2020-06-18T00:00:00.000000Z |
| icsa-20-170-04 | Rockwell Automation FactoryTalk Services Platform | 2020-06-18T00:00:00.000000Z | 2020-06-18T00:00:00.000000Z |
| icsa-20-170-03 | ICONICS GENESIS64, GENESIS32 | 2020-06-18T00:00:00.000000Z | 2020-06-18T00:00:00.000000Z |
| icsa-20-170-02 | Mitsubishi Electric MC Works64, MC Works32 | 2020-06-18T00:00:00.000000Z | 2020-06-18T00:00:00.000000Z |
| icsma-20-163-01 | Philips IntelliBridge Enterprise IBE | 2020-06-11T00:00:00.000000Z | 2020-06-11T00:00:00.000000Z |
| icsa-20-163-01 | OSIsoft PI Web API 2019 | 2020-06-11T00:00:00.000000Z | 2020-06-11T00:00:00.000000Z |
| icsma-18-228-01 | Philips PageWriter TC10, TC20, TC30, TC50, and TC70 Cardiographs (Update A) | 2018-08-16T00:00:00.000000Z | 2020-06-09T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-asa-ssl-vpn-dos-qy7bhpjn | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T20:36:50+00:00 |
| cisco-sa-asa-ssl-vpn-dos-qY7BHpjN | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T20:36:50+00:00 |
| cisco-sa-nxos-ipip-dos-kct9x4 | Cisco NX-OS Software Unexpected IP in IP Packet Processing Vulnerability | 2020-06-01T16:00:00+00:00 | 2020-06-01T16:00:00+00:00 |
| cisco-sa-nxos-ipip-dos-kCT9X4 | Cisco NX-OS Software Unexpected IP in IP Packet Processing Vulnerability | 2020-06-01T16:00:00+00:00 | 2020-06-01T16:00:00+00:00 |
| cisco-sa-20200219-ucs-boot-bypass | Multiple Cisco UCS-Based Products UEFI Secure Boot Bypass Vulnerability | 2020-02-19T16:00:00+00:00 | 2020-06-01T13:56:07+00:00 |
| cisco-sa-20200226-mds-ovrld-dos | Cisco MDS 9000 Series Switches Denial of Service Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-05-21T15:32:26+00:00 |
| cisco-sa-uccx-rce-gmsc6rkn | Cisco Unified Contact Center Express Remote Code Execution Vulnerability | 2020-05-20T16:00:00+00:00 | 2020-05-20T16:00:00+00:00 |
| cisco-sa-uccx-rce-GMSC6RKN | Cisco Unified Contact Center Express Remote Code Execution Vulnerability | 2020-05-20T16:00:00+00:00 | 2020-05-20T16:00:00+00:00 |
| cisco-sa-pcp-sql-inj-22auwt66 | Cisco Prime Collaboration Provisioning Software SQL Injection Vulnerability | 2020-05-20T16:00:00+00:00 | 2020-05-20T16:00:00+00:00 |
| cisco-sa-pcp-sql-inj-22Auwt66 | Cisco Prime Collaboration Provisioning Software SQL Injection Vulnerability | 2020-05-20T16:00:00+00:00 | 2020-05-20T16:00:00+00:00 |
| cisco-sa-cpnr-dhcp-dos-bkezfhlp | Cisco Prime Network Registrar DHCP Denial of Service Vulnerability | 2020-05-20T16:00:00+00:00 | 2020-05-20T16:00:00+00:00 |
| cisco-sa-cpnr-dhcp-dos-BkEZfhLP | Cisco Prime Network Registrar DHCP Denial of Service Vulnerability | 2020-05-20T16:00:00+00:00 | 2020-05-20T16:00:00+00:00 |
| cisco-sa-amp4emac-dos-kfkjugtm | Cisco AMP for Endpoints Mac Connector Software File Scan Denial of Service Vulnerability | 2020-05-20T16:00:00+00:00 | 2020-05-20T16:00:00+00:00 |
| cisco-sa-amp4emac-dos-kfKjUGtM | Cisco AMP for Endpoints Mac Connector Software File Scan Denial of Service Vulnerability | 2020-05-20T16:00:00+00:00 | 2020-05-20T16:00:00+00:00 |
| cisco-sa-amp4elinux-h33dkrvb | Cisco AMP for Endpoints Linux Connector and AMP for Endpoints Mac Connector Software Memory Buffer Vulnerability | 2020-05-20T16:00:00+00:00 | 2020-05-20T16:00:00+00:00 |
| cisco-sa-20180418-fpsnort | Cisco Firepower Detection Engine Secure Sockets Layer Denial of Service Vulnerability | 2018-04-18T16:00:00+00:00 | 2020-05-18T15:38:13+00:00 |
| cisco-sa-20191106-wlc-dos | Cisco Wireless LAN Controller HTTP Parsing Engine Denial of Service Vulnerability | 2019-11-06T16:00:00+00:00 | 2020-05-11T15:58:49+00:00 |
| cisco-sa-fp2100-arp-dos-kldck8ks | Cisco Firepower 2100 Series Security Appliances ARP Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-11T15:48:19+00:00 |
| cisco-sa-fp2100-arp-dos-kLdCK8ks | Cisco Firepower 2100 Series Security Appliances ARP Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-11T15:48:19+00:00 |
| cisco-sa-20190417-air-ap-dos | Cisco Aironet Series Access Points Denial of Service Vulnerability | 2019-04-17T16:00:00+00:00 | 2020-05-11T15:39:50+00:00 |
| cisco-sa-snort_filepolbypass-m4x5dgop | Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-08T15:54:59+00:00 |
| cisco-sa-snort_filepolbypass-m4X5DgOP | Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-08T15:54:59+00:00 |
| cisco-asa-kerberos-bypass-96gghe2ss | Cisco Adaptive Security Appliance Software Kerberos Authentication Bypass Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-07T14:39:34+00:00 |
| cisco-asa-kerberos-bypass-96Gghe2sS | Cisco Adaptive Security Appliance Software Kerberos Authentication Bypass Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-07T14:39:34+00:00 |
| cisco-sa-xpftd-gydxyn8h | Cisco Firepower Device Manager On-Box Software XML Parsing Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-xpftd-gYDXyN8H | Cisco Firepower Device Manager On-Box Software XML Parsing Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-umbrella-head-inject-n4qarjh | Cisco Umbrella Carriage Return Line Feed Injection Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-umbrella-head-inject-n4QArJH | Cisco Umbrella Carriage Return Line Feed Injection Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-ucsd-ar6baguz | Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Role-Based Access Control Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-ucsd-Ar6BAguz | Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Role-Based Access Control Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2023-53105 | net/mlx5e: Fix cleanup null-ptr deref on encap lock | 2025-05-02T00:00:00.000Z | 2025-11-12T01:01:38.000Z |
| msrc_cve-2022-49833 | btrfs: zoned: clone zoned device info when cloning a device | 2025-05-02T00:00:00.000Z | 2025-11-12T01:01:26.000Z |
| msrc_cve-2022-49829 | drm/scheduler: fix fence ref counting | 2025-05-02T00:00:00.000Z | 2025-11-12T01:01:21.000Z |
| msrc_cve-2025-62453 | GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62452 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62449 | Microsoft Visual Studio Code CoPilot Chat Extension Security Feature Bypass Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62222 | Agentic AI and Visual Studio Code Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62219 | Microsoft Wireless Provisioning System Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62218 | Microsoft Wireless Provisioning System Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62217 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62216 | Microsoft Office Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62215 | Windows Kernel Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62214 | Visual Studio Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62213 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62211 | Dynamics 365 Field Service (online) Spoofing Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62210 | Dynamics 365 Field Service (online) Spoofing Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62206 | Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62205 | Microsoft Office Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62204 | Microsoft SharePoint Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62203 | Microsoft Excel Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62202 | Microsoft Excel Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62201 | Microsoft Excel Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62200 | Microsoft Excel Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-62199 | Microsoft Office Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60728 | Microsoft Excel Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60727 | Microsoft Excel Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60726 | Microsoft Excel Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60724 | GDI+ Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60723 | DirectX Graphics Kernel Denial of Service Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60722 | Microsoft OneDrive for Android Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:13420-1 | connman-1.42-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13419-1 | chromedriver-119.0.6045.123-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13418-1 | traceroute-2.1.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13417-1 | python310-asyncssh-2.14.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13416-1 | postfix-3.8.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13415-1 | optipng-0.7.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13414-1 | libecpg6-16.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13413-1 | postgresql15-15.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13412-1 | libmozjs-115-0-115.4.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13411-1 | binutils-2.41-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13410-1 | postgresql14-14.10-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13409-1 | postgresql13-13.13-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13408-1 | postgresql11-11.22-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13407-1 | go1.21-1.21.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13406-1 | go1.20-1.20.11-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13405-1 | kernel-devel-6.6.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13404-1 | mupdf-1.23.4-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13403-1 | exiv2-0.28.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13402-1 | cosign-2.2.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13401-1 | roundcubemail-1.6.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13400-1 | phpPgAdmin-7.14.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13399-1 | libpainter0-0.9.23.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13398-1 | squid-6.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13397-1 | ruby3.2-rubygem-activesupport-7.0-7.0.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13396-1 | gstreamer-plugins-bad-1.22.6-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13395-1 | element-desktop-1.11.47-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13394-1 | clamav-0.103.11-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13393-1 | avahi-0.8-27.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13392-1 | matrix-synapse-1.95.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13391-1 | grpc-devel-1.59.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-1827 | Heap-buffer-overflow in http_process_user_agent | 2020-09-23T00:00:09.799504Z | 2022-04-13T03:04:36.347229Z |
| osv-2020-181 | Heap-buffer-overflow in get_ndpi_flow_info | 2020-06-24T01:51:17.721072Z | 2022-04-13T03:04:36.286917Z |
| osv-2020-179 | Heap-buffer-overflow in get16 | 2020-06-24T01:51:17.643208Z | 2022-04-13T03:04:36.237311Z |
| osv-2020-178 | Heap-buffer-overflow in concat_hash_string | 2020-06-24T01:51:17.576965Z | 2022-04-13T03:04:36.265194Z |
| osv-2020-177 | UNKNOWN in get_ndpi_flow_info6 | 2020-06-24T01:51:17.542041Z | 2022-04-13T03:04:36.058542Z |
| osv-2020-1729 | Use-of-uninitialized-value in ndpi_check_dga_name | 2020-09-11T00:00:28.205135Z | 2022-04-13T03:04:36.336114Z |
| osv-2020-1715 | Stack-buffer-overflow in ndpi_search_kerberos | 2020-09-07T00:00:49.972310Z | 2022-04-13T03:04:36.320061Z |
| osv-2020-171 | Heap-buffer-overflow in ndpi_parse_packet_line_info | 2020-06-24T01:51:17.251380Z | 2022-04-13T03:04:36.008919Z |
| osv-2020-170 | Heap-buffer-overflow in populate_relocs_record | 2020-06-24T01:51:17.217363Z | 2022-04-13T03:04:36.522943Z |
| osv-2020-160 | Heap-buffer-overflow in populate_relocs_record | 2020-06-24T01:51:16.763715Z | 2022-04-13T03:04:36.589376Z |
| osv-2020-1566 | Heap-buffer-overflow in ndpi_workflow_process_packet | 2020-08-02T00:01:17.893681Z | 2022-04-13T03:04:36.216084Z |
| osv-2020-154 | Heap-buffer-overflow in search_valid_dns | 2020-06-24T01:51:16.532133Z | 2022-04-13T03:04:36.204911Z |
| osv-2020-146 | Heap-buffer-overflow in Json::OurReader::parse | 2020-06-24T01:51:16.175015Z | 2022-04-13T03:04:36.739790Z |
| osv-2020-142 | Heap-use-after-free in ndpi_strncasestr | 2020-06-24T01:51:16.020859Z | 2022-04-13T03:04:36.178485Z |
| osv-2020-136 | Heap-buffer-overflow in ndpi_netbios_name_interpret | 2020-06-24T01:51:15.742937Z | 2022-04-13T03:04:36.123517Z |
| osv-2020-1314 | Use-of-uninitialized-value in ndpi_strdup | 2020-07-22T21:50:05.778993Z | 2022-04-13T03:04:36.259727Z |
| osv-2020-1294 | Heap-buffer-overflow in SHA1Update | 2020-07-22T21:50:03.900037Z | 2022-04-13T03:04:36.275838Z |
| osv-2020-1263 | Heap-buffer-overflow in getSSCertificateFingerprint | 2020-07-22T21:50:01.471193Z | 2022-04-13T03:04:36.210485Z |
| osv-2020-1233 | Heap-buffer-overflow in getTLScertificate | 2020-07-22T21:49:58.860561Z | 2022-04-13T03:04:36.352534Z |
| osv-2020-122 | Heap-buffer-overflow in ndpi_strnstr | 2020-06-24T01:51:15.062488Z | 2022-04-13T03:04:36.183580Z |
| osv-2020-1194 | Heap-buffer-overflow in ndpi_search_mail_smtp_tcp | 2020-07-22T21:49:55.131761Z | 2022-04-13T03:04:36.053193Z |
| osv-2020-1187 | Heap-buffer-overflow in ndpi_int_check_stun | 2020-07-22T21:49:54.545726Z | 2022-04-13T03:04:36.063720Z |
| osv-2020-1146 | Heap-buffer-overflow in dex_parse_debug_item | 2020-07-22T21:49:50.759227Z | 2022-04-13T03:04:36.733363Z |
| osv-2020-1133 | Heap-buffer-overflow in ndpi_search_h323 | 2020-07-22T21:49:49.565829Z | 2022-04-13T03:04:36.129327Z |
| osv-2020-1131 | Heap-buffer-overflow in ndpi_search_oscar_tcp_connect | 2020-07-22T21:49:49.427461Z | 2022-04-13T03:04:36.025854Z |
| osv-2020-1114 | Heap-buffer-overflow in ndpi_int_check_stun | 2020-07-22T21:49:48.206675Z | 2022-04-13T03:04:36.156281Z |
| osv-2020-1094 | Heap-buffer-overflow in dex_parse_debug_item | 2020-07-22T21:49:46.622078Z | 2022-04-13T03:04:36.517077Z |
| osv-2020-1082 | Use-of-uninitialized-value in processClientServerHello | 2020-07-22T21:49:45.834056Z | 2022-04-13T03:04:36.167492Z |
| osv-2020-1076 | Stack-buffer-overflow in string_scan_range | 2020-07-22T21:49:45.514181Z | 2022-04-13T03:04:36.636815Z |
| osv-2020-1075 | Use-of-uninitialized-value in processClientServerHello | 2020-07-22T21:49:45.481040Z | 2022-04-13T03:04:36.069366Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2023-22739 | Discourse subject to Allocation of Resources Without Limits or Throttling | 2024-03-06T11:01:16.979Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2023-22468 | Discourse vulnerable to Cross-site Scripting in local oneboxes | 2024-03-06T11:01:29.175Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2023-22455 | Discourse vulnerable to Cross-site Scripting through tag descriptions | 2024-03-06T11:01:41.384Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2023-22454 | Discourse vulnerable to Cross-site Scripting through pending post titles descriptions | 2024-03-06T11:01:50.862Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2023-22453 | Discourse vulnerable to exposure of user post counts per topic to unauthorized users | 2024-03-06T11:02:04.509Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-46177 | Discourse password reset link can lead to in account takeover if user changes to a new email | 2024-03-06T11:02:19.390Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-46168 | Group SMTP user emails are exposed in CC email header | 2024-03-06T11:02:28.770Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-46150 | Discourse may allow exposure of hidden tags in the subject of notification emails | 2024-03-06T11:02:48.405Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-41921 | Discourse chat messages should have a maximum character limit | 2024-03-06T11:03:20.207Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-39385 | Users erroneously and transparently added to private messages in Discourse | 2024-03-06T11:03:32.075Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-39378 | Displaying user badges can leak topic titles to users that have no access to the topic | 2024-03-06T11:03:40.801Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-39356 | Discourse user account takeover via email and invite link | 2024-03-06T11:03:50.674Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-39241 | Possible Server-Side Request Forgery (SSRF) in webhooks | 2024-03-06T11:04:00.270Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-39226 | Discourse user profile location and website fields were not sufficiently length-limited | 2024-03-06T11:04:22.608Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-36068 | Discourse moderators can edit themes via the API | 2024-03-06T11:04:46.895Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-36066 | Discourse vulnerable to RCE via admins uploading maliciously zipped file | 2024-03-06T11:05:00.775Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-31182 | Cache poisoning via maliciously-formed request in Discourse | 2024-03-06T11:05:29.482Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-31060 | Banner topic data is exposed on login-required Discourse sites | 2024-03-06T11:05:50.776Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-31025 | Invite bypasses user approval in Discourse | 2024-03-06T11:06:02.684Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-24850 | Category group permissions leaked in Discourse | 2024-03-06T11:06:14.695Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-24824 | Anonymous user cache poisoning in discourse | 2024-03-06T11:06:25.697Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-24804 | Private group name exposure in discourse | 2024-03-06T11:06:36.976Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-24782 | Secure category names leaked via user activity export in Discourse | 2024-03-06T11:06:48.469Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-23641 | Denial of Service in Discourse | 2024-03-06T11:06:58.961Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-23549 | Discourse vulnerable to bypass of post max_length using HTML comments | 2024-03-06T11:07:09.171Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-23546 | Discourse vulnerable to private topic leak via email#send_digest | 2024-03-06T11:07:32.199Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-21684 | User can bypass approval when invited to Discourse | 2024-03-06T11:07:45.309Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-21678 | User's bio visible even if profile is restricted in Discourse | 2024-03-06T11:07:57.572Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-21642 | Exposure of whisper participants in discourse | 2024-03-06T11:08:17.506Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2021-43850 | Denial of Service in discourse | 2024-03-06T11:08:27.960Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-201807-0366 | The uc-http service 1.0.0 on VelotiSmart WiFi B-380 camera devices allows Directory Trave… | 2024-02-13T23:02:50.396000Z |
| var-201908-0438 | An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm ca… | 2024-02-13T23:02:49.109000Z |
| var-201811-0482 | Improper file permissions in the installer for the Intel Ready Mode Technology may allow … | 2024-02-13T23:02:49.929000Z |
| var-201911-0645 | A Directory Traversal in the Web interface of the Allied Telesis AT-GS950/8 until Firmwar… | 2024-02-13T23:02:48.738000Z |
| var-202007-1263 | HUAWEI Mate 20 smartphones with versions earlier than 10.1.0.160(C00E160R2P11) have an im… | 2024-02-13T23:02:47.931000Z |
| var-202201-1964 | On BIG-IP version 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.4, and… | 2024-02-13T23:02:46.098000Z |
| var-202201-1691 | Keeping sensitive data in unprotected BluetoothSettingsProvider prior to SMR Jan-2022 Rel… | 2024-02-13T23:02:46.212000Z |
| var-202201-1374 | On BIG-IP version 16.1.x before 16.1.2.1, 15.1.x before 15.1.5, 14.1.x before 14.1.4.5, a… | 2024-02-13T23:02:46.399000Z |
| var-202204-1432 | Alt-N MDaemon Security Gateway through 8.5.0 allows SecurityGateway.dll?view=login XML In… | 2024-02-13T23:02:45.169000Z |
| var-202204-1117 | IBM MQ Appliance 9.2 CD and 9.2 LTS are vulnerable to a denial of service in the Login co… | 2024-02-13T23:02:45.215000Z |
| var-201508-0616 | Chiyu BF-630 and BF-630W fingerprint access-control devices allow remote attackers to byp… | 2024-02-13T23:01:01.515000Z |
| var-201504-0288 | Cisco IOS 15.5S and IOS XE allow remote authenticated users to cause a denial of service … | 2024-02-13T23:01:01.709000Z |
| var-201711-0599 | XSS exists in the amtyThumb amty-thumb-recent-post (aka amtyThumb posts or wp-thumb-post)… | 2024-02-13T23:01:00.102000Z |
| var-201806-0630 | Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker to includ… | 2024-02-13T23:00:59.505000Z |
| var-201907-0236 | A vulnerability in the fabric infrastructure VLAN connection establishment of the Cisco N… | 2024-02-13T23:00:58.031000Z |
| var-201907-0465 | Dynacolor FCM-MB40 v1.2.0.0 devices allow remote attackers to execute arbitrary commands … | 2024-02-13T23:00:57.988000Z |
| var-202006-0938 | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker.… | 2024-02-13T23:00:56.963000Z |
| var-202201-1948 | On BIG-IP ASM & Advanced WAF version 16.1.x before 16.1.2, 15.1.x before 15.1.4.1, 14.1.x… | 2024-02-13T23:00:55.015000Z |
| var-202201-1843 | Dell EMC System Update, version 1.9.2 and prior, contain an Unprotected Storage of Creden… | 2024-02-13T23:00:55.070000Z |
| var-202201-1488 | A release of illegal memory vulnerability in the snmpd daemon of Juniper Networks Junos O… | 2024-02-13T23:00:55.177000Z |
| var-202201-1253 | Dell EMC AppSync versions 3.9 to 4.3 contain a clickjacking vulnerability in AppSync. A r… | 2024-02-13T23:00:55.248000Z |
| var-202206-1651 | A vulnerability in live_mfg.shtml of WAVLINK WN535 G3 M35G3R.V5030.180927 allows attacker… | 2024-02-13T23:00:54.068000Z |
| var-202203-1779 | An issue was discovered in Firmware Analysis and Comparison Tool v3.2. With administrator… | 2024-02-13T23:00:54.401000Z |
| var-202203-0542 | IBM MQ Appliance 9.2 CD and 9.2 LTS could allow an authenticated and authorized user to c… | 2024-02-13T23:00:54.505000Z |
| var-202202-1102 | A vulnerability in the web-based management interface of Cisco Prime Service Catalog coul… | 2024-02-13T23:00:54.738000Z |
| var-200507-0067 | IMail stores usernames and passwords in cleartext in a cookie, which allows remote attack… | 2024-02-13T23:00:46.128000Z |
| var-200412-0293 | The web-based Management Console in Blue Coat Security Gateway OS 3.0 through 3.1.3.13 an… | 2024-02-13T23:00:46.424000Z |
| var-201406-0324 | Absolute path traversal vulnerability in the webproc cgi module on the Belkin N150 F9K100… | 2024-02-13T23:00:39.319000Z |
| var-201405-0423 | Multiple cross-site request forgery (CSRF) vulnerabilities in the web administration cons… | 2024-02-13T23:00:39.387000Z |
| var-201505-0100 | Cross-site scripting (XSS) vulnerability in the administrative interface in Cisco WebEx M… | 2024-02-13T23:00:38.831000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2007-000548 | Nessus report function vulnerable to arbitrary script execution | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000507 | Flash Player allows to send arbitrary Referer headers | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000494 | KDDI sample CGI download program directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000491 | Lhaca LHZ Archive Extended Header Size Processing Buffer Overflow Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000487 | sHTTPd cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000486 | rktSNS cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000476 | Hiki arbitrary file deletion vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000471 | RaidenHTTPD cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000454 | dotProject cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000447 | Internet Explorer vulnerable in handling MHTML protocol | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000446 | Internet Explorer vulnerable in MHTML handling | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000434 | ADPLAN cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000429 | Meneame cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000420 | HP System Management Homepage cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000400 | Advance-Flow cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000395 | Homepage Builder sample CGI programs vulnerable to OS command injection | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000322 | Lunascape RSS reader arbitrary script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000301 | Canon Network Camera Server VB100 Series vulnerable to cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000290 | InfoBarrier4 self-decrypted file vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000260 | Shihonkanri Plus Ver2 GOOUT directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000259 | open-gorotto cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000236 | Overlay Weaver cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000229 | MailDwarf vulnerability allows unauthorized sending of emails | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000228 | MailDwarf cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000227 | CruiseWorks and Minna De Office vulnerable in access restrictions | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000225 | NewsGlue and Ikinari Jijyoutsuu arbitrary script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000218 | Interstage Application Server cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000215 | FENCE-Pro and Systemwalker Desktop Encryption self-decoding file vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000200 | Trac cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000199 | CCC Cleaner division-by-zero vulnerability when scanning UPX-packed executables | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:20270-1 | Security update for the Linux Kernel | 2025-04-17T14:30:40Z | 2025-04-17T14:30:40Z |
| suse-su-2025:1342-1 | Security update for poppler | 2025-04-17T14:01:36Z | 2025-04-17T14:01:36Z |
| suse-su-2025:1341-1 | Security update for docker | 2025-04-17T14:01:23Z | 2025-04-17T14:01:23Z |
| suse-su-2025:1340-1 | Security update for mozjs52 | 2025-04-17T11:45:47Z | 2025-04-17T11:45:47Z |
| suse-su-2025:1339-1 | Security update for poppler | 2025-04-17T11:02:47Z | 2025-04-17T11:02:47Z |
| suse-su-2025:1338-1 | Security update for haproxy | 2025-04-17T11:02:33Z | 2025-04-17T11:02:33Z |
| suse-su-2025:1337-1 | Security update for apache2-mod_auth_openidc | 2025-04-17T11:02:04Z | 2025-04-17T11:02:04Z |
| suse-su-2025:1336-1 | Security update for webkit2gtk3 | 2025-04-17T11:01:55Z | 2025-04-17T11:01:55Z |
| suse-su-2025:20190-1 | Security update for the Linux Kernel | 2025-04-17T10:48:21Z | 2025-04-17T10:48:21Z |
| suse-su-2025:20191-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 | 2025-04-17T10:19:01Z | 2025-04-17T10:19:01Z |
| suse-su-2025:20285-1 | Security update for kernel-livepatch-MICRO-6-0_Update_2 | 2025-04-17T10:03:23Z | 2025-04-17T10:03:23Z |
| suse-su-2025:20188-1 | Security update for kernel-livepatch-MICRO-6-0_Update_2 | 2025-04-17T10:03:23Z | 2025-04-17T10:03:23Z |
| suse-su-2025:20189-1 | Security update for kernel-livepatch-MICRO-6-0_Update_3 | 2025-04-17T10:02:27Z | 2025-04-17T10:02:27Z |
| suse-su-2025:20260-1 | Security update for the Linux Kernel | 2025-04-17T09:25:13Z | 2025-04-17T09:25:13Z |
| suse-su-2025:20284-1 | Security update for kernel-livepatch-MICRO-6-0_Update_4 | 2025-04-17T09:25:12Z | 2025-04-17T09:25:12Z |
| suse-su-2025:20187-1 | Security update for kernel-livepatch-MICRO-6-0_Update_4 | 2025-04-17T09:25:12Z | 2025-04-17T09:25:12Z |
| suse-su-2025:20186-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 | 2025-04-17T09:24:53Z | 2025-04-17T09:24:53Z |
| suse-su-2025:1334-1 | Security update for pam | 2025-04-17T07:03:20Z | 2025-04-17T07:03:20Z |
| suse-su-2025:1333-1 | Security update for cosign | 2025-04-17T01:38:19Z | 2025-04-17T01:38:19Z |
| suse-su-2025:1332-1 | Security update for rekor | 2025-04-17T01:37:13Z | 2025-04-17T01:37:13Z |
| suse-su-2025:1331-1 | Security update for webkit2gtk3 | 2025-04-16T15:14:53Z | 2025-04-16T15:14:53Z |
| suse-su-2025:1330-1 | Security update for rsync | 2025-04-16T11:49:27Z | 2025-04-16T11:49:27Z |
| suse-su-2025:1326-1 | Security update for pgadmin4 | 2025-04-16T08:37:10Z | 2025-04-16T08:37:10Z |
| suse-su-2025:1325-1 | Security update for webkit2gtk3 | 2025-04-16T08:36:20Z | 2025-04-16T08:36:20Z |
| suse-su-2025:1324-1 | Security update for apache2-mod_auth_openidc | 2025-04-16T08:35:52Z | 2025-04-16T08:35:52Z |
| suse-su-2025:1321-1 | Security update for Multi-Linux Manager 4.3: Server | 2025-04-16T08:14:57Z | 2025-04-16T08:14:57Z |
| suse-su-2025:1295-1 | Security update for expat | 2025-04-16T07:53:54Z | 2025-04-16T07:53:54Z |
| suse-su-2025:1294-1 | Security update for rubygem-bundler | 2025-04-16T07:52:40Z | 2025-04-16T07:52:40Z |
| suse-su-2025:1293-1 | Security update for the Linux Kernel | 2025-04-16T07:51:20Z | 2025-04-16T07:51:20Z |
| suse-su-2025:1288-1 | Security update for mozjs52 | 2025-04-15T16:25:29Z | 2025-04-15T16:25:29Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-26179 | Online Farm System /forgot_pass.php文件SQL注入漏洞 | 2025-08-01 | 2025-10-31 |
| cnvd-2025-26178 | Online Farm System categoryvalue.php文件SQL注入漏洞 | 2025-08-01 | 2025-10-31 |
| cnvd-2025-26177 | Exam Form Submission /register.php文件SQL注入漏洞 | 2025-08-01 | 2025-10-31 |
| cnvd-2025-26176 | Exam Form Submission delete_s8.php文件SQL注入漏洞 | 2025-08-01 | 2025-10-31 |
| cnvd-2025-26175 | Exam Form Submission delete_s7.php文件SQL注入漏洞 | 2025-08-01 | 2025-10-31 |
| cnvd-2025-26174 | Wazifa System updatesettings.php文件SQL注入漏洞 | 2025-08-10 | 2025-10-31 |
| cnvd-2025-26173 | Wazifa System postpublish.php文件SQL注入漏洞 | 2025-08-10 | 2025-10-31 |
| cnvd-2025-26172 | Exam Form Submission update_s7.php文件SQL注入漏洞 | 2025-08-10 | 2025-10-31 |
| cnvd-2025-26171 | Exam Form Submission update_s5.php文件SQL注入漏洞 | 2025-08-10 | 2025-10-31 |
| cnvd-2025-26170 | Online Event Judging System edit_judge.php文件SQL注入漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26169 | Online Event Judging System edit_criteria.php文件SQL注入漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26168 | Online Event Judging System edit_contestant.php文件SQL注入漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26167 | Online Event Judging System add_judge.php文件SQL注入漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26166 | Online Event Judging System add_contestant.php文件SQL注入漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26165 | Online Event Judging System action.php文件SQL注入漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26164 | Tenda CH22 fromNatStaticSetting函数缓冲区溢出漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26163 | Tenda CH22 formSetIpBind函数缓冲区溢出漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26162 | Tenda CH22 formRouteStatic函数缓冲区溢出漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26161 | Tenda CH22 formaddressNat函数缓冲区溢出漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26160 | Tenda AC6缓冲区溢出漏洞(CNVD-2025-26160) | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26159 | Open5GS存在未明漏洞(CNVD-2025-26159) | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26158 | ZTE MC889A Pro拒绝服务漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26157 | D-Link DIR-823G缓冲区溢出漏洞(CNVD-2025-26157) | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26108 | Microsoft Windows Server远程代码执行漏洞(CNVD-2025-26108) | 2025-10-17 | 2025-10-31 |
| cnvd-2025-26107 | Simple Food Ordering System editproduct.php文件上传漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26106 | Simple Food Ordering System editproduct.php文件跨站脚本漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26105 | Simple Food Ordering System editcategory.php文件跨站脚本漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26104 | Simple Food Ordering System addproduct.php文件跨站脚本漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26103 | Simple Food Ordering System addcategory.php文件跨站脚本漏洞 | 2025-10-31 | 2025-10-31 |
| cnvd-2025-26102 | Simple Food Ordering System addproduct.php文件上传漏洞 | 2025-10-31 | 2025-10-31 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2024-AVI-0966 | Multiples vulnérabilités dans Nagios XI | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| CERTFR-2024-AVI-0965 | Multiples vulnérabilités dans les produits PrimX | 2024-11-13T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| CERTFR-2024-AVI-0964 | Multiples vulnérabilités dans les produits Citrix | 2024-11-12T00:00:00.000000 | 2024-11-13T00:00:00.000000 |
| certfr-2024-avi-0963 | Multiples vulnérabilités dans Xen | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| certfr-2024-avi-0962 | Multiples vulnérabilités dans les produits SAP | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| certfr-2024-avi-0961 | Multiples vulnérabilités dans les produits Schneider Electric | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| certfr-2024-avi-0960 | Multiples vulnérabilités dans les produits Synology | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| certfr-2024-avi-0959 | Multiples vulnérabilités dans les produits NetApp | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| CERTFR-2024-AVI-0963 | Multiples vulnérabilités dans Xen | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| CERTFR-2024-AVI-0962 | Multiples vulnérabilités dans les produits SAP | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| CERTFR-2024-AVI-0961 | Multiples vulnérabilités dans les produits Schneider Electric | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| CERTFR-2024-AVI-0960 | Multiples vulnérabilités dans les produits Synology | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| CERTFR-2024-AVI-0959 | Multiples vulnérabilités dans les produits NetApp | 2024-11-12T00:00:00.000000 | 2024-11-12T00:00:00.000000 |
| certfr-2024-avi-0958 | Multiples vulnérabilités dans les produits IBM | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| certfr-2024-avi-0957 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| certfr-2024-avi-0956 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| certfr-2024-avi-0955 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| certfr-2024-avi-0954 | Multiples vulnérabilités dans Microsoft Edge | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| certfr-2024-avi-0953 | Multiples vulnérabilités dans Moxa EDS-P510 Series | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| certfr-2024-avi-0952 | Vulnérabilité dans les produits F5 | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| CERTFR-2024-AVI-0958 | Multiples vulnérabilités dans les produits IBM | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| CERTFR-2024-AVI-0957 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| CERTFR-2024-AVI-0956 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| CERTFR-2024-AVI-0955 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| CERTFR-2024-AVI-0954 | Multiples vulnérabilités dans Microsoft Edge | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| CERTFR-2024-AVI-0953 | Multiples vulnérabilités dans Moxa EDS-P510 Series | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| CERTFR-2024-AVI-0952 | Vulnérabilité dans les produits F5 | 2024-11-08T00:00:00.000000 | 2024-11-08T00:00:00.000000 |
| certfr-2024-avi-0951 | Multiples vulnérabilités dans Google Pixel | 2024-11-07T00:00:00.000000 | 2024-11-07T00:00:00.000000 |
| certfr-2024-avi-0950 | Multiples vulnérabilités dans les produits Cisco | 2024-11-07T00:00:00.000000 | 2024-11-07T00:00:00.000000 |
| certfr-2024-avi-0949 | Vulnérabilité dans Veeam Backup & Replication | 2024-11-07T00:00:00.000000 | 2024-11-07T00:00:00.000000 |