Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-20963 |
8.8 (3.1)
|
Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2026-01-13T17:56:49.798Z | 2026-02-26T15:04:25.838Z |
| CVE-2025-62404 |
7.3 (4.0)
|
Heap-based Buffer Overflow Vulnerability in TP-Link Ar… |
TP-Link Systems Inc. |
Archer AX53 v1.0 |
2026-02-03T18:51:53.339Z | 2026-02-26T15:04:25.688Z |
| CVE-2026-20830 |
7 (3.1)
|
Capability Access Management Service (camsvc) Elevatio… |
Microsoft |
Windows Server 2025 |
2026-01-13T17:56:50.400Z | 2026-02-26T15:04:25.550Z |
| CVE-2025-62405 |
7.3 (4.0)
|
Heap-based Buffer Overflow Vulnerability in TP-Link Ar… |
TP-Link Systems Inc. |
Archer AX53 v1.0 |
2026-02-03T18:52:21.772Z | 2026-02-26T15:04:25.401Z |
| CVE-2026-21221 |
7 (3.1)
|
Capability Access Management Service (camsvc) Elevatio… |
Microsoft |
Windows 11 Version 24H2 |
2026-01-13T17:56:50.882Z | 2026-02-26T15:04:25.225Z |
| CVE-2025-62501 |
7 (4.0)
|
SSH Hostkey Misconfiguration Vulnerability in TP-Link … |
TP-Link Systems Inc. |
Archer AX53 v1.0 |
2026-02-03T18:52:54.216Z | 2026-02-26T15:04:25.063Z |
| CVE-2026-20947 |
8.8 (3.1)
|
Microsoft SharePoint Server Remote Code Execution Vuln… |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2026-01-13T17:56:52.105Z | 2026-02-26T15:04:24.921Z |
| CVE-2025-62673 |
8.6 (4.0)
|
Heap-based Buffer Overflow Vulnerability in TP-Link Ar… |
TP-Link Systems Inc. |
Archer AX53 v1.0 |
2026-02-03T18:53:32.813Z | 2026-02-26T15:04:24.789Z |
| CVE-2026-20843 |
7.8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Eleva… |
Microsoft |
Windows 10 Version 1607 |
2026-01-13T17:56:52.600Z | 2026-02-26T15:04:24.630Z |
| CVE-2025-65079 |
6.9 (4.0)
|
Heap-based buffer overflow vulnerability in Postscript… |
Lexmark |
MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ |
2026-02-03T20:23:24.405Z | 2026-02-26T15:04:24.490Z |
| CVE-2026-20848 |
7.5 (3.1)
|
Windows SMB Server Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-01-13T17:56:53.183Z | 2026-02-26T15:04:24.337Z |
| CVE-2025-65080 |
6.9 (4.0)
|
Type confusion vulnerability in Postscript interpreter |
Lexmark |
MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ |
2026-02-03T20:35:54.592Z | 2026-02-26T15:04:24.195Z |
| CVE-2026-20849 |
7.5 (3.1)
|
Windows Kerberos Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-01-13T17:56:53.833Z | 2026-02-26T15:04:24.056Z |
| CVE-2025-65081 |
6.9 (4.0)
|
Out-of-bounds read vulnerability in Postscript interpreter |
Lexmark |
MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ |
2026-02-03T20:39:14.501Z | 2026-02-26T15:04:23.914Z |
| CVE-2026-20853 |
7.4 (3.1)
|
Windows WalletService Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-01-13T17:56:54.332Z | 2026-02-26T15:04:23.756Z |
| CVE-2025-65077 |
8.8 (4.0)
|
Relative path traversal vulnerability in Embedded Solu… |
Lexmark |
MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ |
2026-02-03T20:44:32.330Z | 2026-02-26T15:04:23.610Z |
| CVE-2026-20854 |
7.5 (3.1)
|
Windows Local Security Authority Subsystem Service (LS… |
Microsoft |
Windows 11 Version 24H2 |
2026-01-13T17:56:54.915Z | 2026-02-26T15:04:23.436Z |
| CVE-2025-65078 |
9.3 (4.0)
|
Untrusted search path vulnerability in Embedded Soluti… |
Lexmark |
MXTCT, MSNGM, MSTGM, MXNGM, MXTGM, CSNGV, CSTGV, CXTGV, MSNGW, MSTGW, MXTGW, CSTLS, CXTLS, MXTLS, CSTMM, CXTMM, CSTPC, CXTPC, MXTPM, MSNSN, MSTSN, MXTSN, CSNZJ, CSTZJ, CXNZJ, CXTZJ |
2026-02-03T20:51:20.556Z | 2026-02-26T15:04:23.262Z |
| CVE-2026-21219 |
7 (3.1)
|
Inbox COM Objects (Global Memory) Remote Code Executio… |
Microsoft |
Windows SDK |
2026-01-13T17:56:55.396Z | 2026-02-26T15:04:23.124Z |
| CVE-2026-1861 |
8.8 (3.1)
|
Heap buffer overflow in libvpx in Google Chrome p… |
Google |
Chrome |
2026-02-03T20:56:47.624Z | 2026-02-26T15:04:22.981Z |
| CVE-2026-20861 |
7.8 (3.1)
|
Windows Management Services Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 1809 |
2026-01-13T17:56:55.982Z | 2026-02-26T15:04:22.827Z |
| CVE-2026-1862 |
8.8 (3.1)
|
Type Confusion in V8 in Google Chrome prior to 14… |
Google |
Chrome |
2026-02-03T20:56:48.455Z | 2026-02-26T15:04:22.687Z |
| CVE-2026-20863 |
7 (3.1)
|
Win32k Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 version 22H3 |
2026-01-13T17:56:57.213Z | 2026-02-26T15:04:22.548Z |
| CVE-2026-1580 |
8.8 (3.1)
|
ingress-nginx auth-method nginx configuration injection |
Kubernetes |
ingress-nginx |
2026-02-03T22:16:47.223Z | 2026-02-26T15:04:22.416Z |
| CVE-2026-20866 |
7.8 (3.1)
|
Windows Management Services Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 1809 |
2026-01-13T17:56:57.777Z | 2026-02-26T15:04:22.262Z |
| CVE-2026-24512 |
8.8 (3.1)
|
ingress-nginx auth-method nginx configuration injection |
Kubernetes |
ingress-nginx |
2026-02-03T22:17:08.989Z | 2026-02-26T15:04:22.072Z |
| CVE-2026-20867 |
7.8 (3.1)
|
Windows Management Services Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 1809 |
2026-01-13T17:56:58.268Z | 2026-02-26T15:04:21.857Z |
| CVE-2026-20979 |
8.4 (4.0)
|
Improper privilege management in Settings prior t… |
Samsung Mobile |
Samsung Mobile Devices |
2026-02-04T06:14:40.116Z | 2026-02-26T15:04:21.706Z |
| CVE-2026-20868 |
8.8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Remot… |
Microsoft |
Windows 10 Version 1607 |
2026-01-13T17:56:58.903Z | 2026-02-26T15:04:21.562Z |
| CVE-2026-20983 |
8.4 (4.0)
|
Improper export of android application components… |
Samsung Mobile |
Samsung Mobile Devices |
2026-02-04T06:14:45.725Z | 2026-02-26T15:04:21.414Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2020-37171 |
6.7 (4.0)
6.2 (3.1)
|
TapinRadio 2.12.3 - 'username' Denial of Service |
Raimersoft |
TapinRadio |
2026-02-06T23:14:13.743Z | 2026-02-17T16:54:04.150Z |
| CVE-2026-25491 |
1.9 (4.0)
|
Craft has a Stored XSS in Entry Types Name |
craftcms |
cms |
2026-02-09T19:25:29.690Z | 2026-02-10T16:00:46.911Z |
| CVE-2026-26019 |
4.1 (3.1)
|
@langchain/community affected by SSRF Bypass in Recurs… |
langchain-ai |
langchainjs |
2026-02-11T21:11:10.166Z | 2026-02-12T21:14:41.756Z |
| CVE-2020-37164 |
6.7 (4.0)
6.2 (3.1)
|
AbsoluteTelnet 11.12 - "license entry" Denial of Service |
Celestial Software |
AbsoluteTelnet |
2026-02-06T23:14:12.124Z | 2026-02-17T16:55:41.476Z |
| CVE-2026-25994 |
8.1 (4.0)
|
PJSIP has a heap buffer overflow in ICE with long username |
pjsip |
pjproject |
2026-02-11T20:56:47.340Z | 2026-02-12T21:20:58.443Z |
| CVE-2026-26000 |
5.3 (4.0)
|
XWiki Platform affected by click-jacking through CSS i… |
xwiki |
xwiki-platform |
2026-02-12T20:30:07.263Z | 2026-02-12T20:54:45.754Z |
| CVE-2026-27052 |
7.5 (3.1)
|
WordPress Sales Countdown Timer for WooCommerce and Wo… |
villatheme |
Sales Countdown Timer for WooCommerce and WordPress |
2026-02-19T08:27:09.802Z | 2026-02-19T18:13:49.625Z |
| CVE-2026-27042 |
5.3 (3.1)
|
WordPress NotificationX plugin <= 3.2.1 - Broken Acces… |
WPDeveloper |
NotificationX |
2026-02-19T08:27:09.364Z | 2026-02-19T18:19:14.402Z |
| CVE-2026-25459 |
4.3 (3.1)
|
WordPress Sober theme <= 3.5.12 - Broken Access Contro… |
uixthemes |
Sober |
2026-02-19T08:27:08.568Z | 2026-02-19T18:22:54.623Z |
| CVE-2026-25432 |
6.5 (3.1)
|
WordPress Omnipress plugin <= 1.6.7 - Cross Site Scrip… |
omnipressteam |
Omnipress |
2026-02-19T08:27:07.843Z | 2026-02-19T18:27:07.271Z |
| CVE-2026-25423 |
3.8 (3.1)
|
WordPress Real 3D FlipBook plugin <= 4.16.4 - Broken A… |
creativeinteractivemedia |
Real 3D FlipBook |
2026-02-19T08:27:07.440Z | 2026-02-19T18:30:15.667Z |
| CVE-2026-25418 |
7.6 (3.1)
|
WordPress Bit Form plugin <= 2.21.10 - SQL Injection v… |
bitpressadmin |
Bit Form |
2026-02-19T08:27:06.644Z | 2026-02-19T18:36:02.883Z |
| CVE-2026-25415 |
5.3 (3.1)
|
WordPress WPBookit Pro plugin <= 1.6.18 - Broken Acces… |
iqonicdesign |
WPBookit Pro |
2026-02-19T08:27:06.273Z | 2026-02-19T18:40:07.078Z |
| CVE-2026-25411 |
4.3 (3.1)
|
WordPress Revision Manager TMC plugin <= 2.8.22 - Cros… |
themastercut |
Revision Manager TMC |
2026-02-19T08:27:05.876Z | 2026-02-19T18:43:10.425Z |
| CVE-2025-71250 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-19T14:58:20.858Z | 2026-02-19T18:39:35.672Z |
| CVE-2025-71249 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-19T14:58:20.100Z | 2026-02-19T18:39:07.270Z |
| CVE-2025-71248 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-19T14:58:19.289Z | 2026-02-19T18:38:36.174Z |
| CVE-2025-71247 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-19T14:58:18.553Z | 2026-02-19T18:38:12.695Z |
| CVE-2026-25498 |
8.6 (4.0)
|
Craft has a potential authenticated Remote Code Execut… |
craftcms |
cms |
2026-02-09T19:55:06.558Z | 2026-02-10T15:59:54.896Z |
| CVE-2026-25493 |
6.9 (4.0)
|
Craft has a SSRF in GraphQL Asset Mutation via HTTP Redirect |
craftcms |
cms |
2026-02-09T19:36:58.713Z | 2026-02-10T16:00:35.771Z |
| CVE-2026-25495 |
8.7 (4.0)
|
Craft has a SQL Injection in Element Indexes via crite… |
craftcms |
cms |
2026-02-09T19:42:57.778Z | 2026-02-10T16:00:20.118Z |
| CVE-2026-25494 |
6.9 (4.0)
|
Craft has a SSRF in GraphQL Asset Mutation via Alterna… |
craftcms |
cms |
2026-02-09T19:41:13.085Z | 2026-02-10T16:00:28.753Z |
| CVE-2026-25496 |
4.8 (4.0)
|
Craft has a stored XSS in Number Prefix & Suffix Fields |
craftcms |
cms |
2026-02-09T19:45:19.835Z | 2026-02-10T16:00:13.566Z |
| CVE-2026-25497 |
8.6 (4.0)
|
Craft has a GraphQL Asset Mutation Privilege Escalation |
craftcms |
cms |
2026-02-09T19:50:08.543Z | 2026-02-10T16:00:07.992Z |
| CVE-2026-25492 |
5.3 (4.0)
|
Craft has a save_images_Asset graphql mutation can be … |
craftcms |
cms |
2026-02-09T19:33:24.366Z | 2026-02-10T16:00:41.366Z |
| CVE-2020-37166 |
6.9 (4.0)
6.2 (3.1)
|
AbsoluteTelnet 11.12 - 'SSH2/username' Denial of Service |
Celestial Software |
AbsoluteTelnet |
2026-02-06T23:14:12.943Z | 2026-02-17T16:54:51.820Z |
| CVE-2025-70998 |
9.8 (3.1)
|
UTT HiPER 810 / nv810v4 router firmware v1.5.0-14… |
n/a |
n/a |
2026-02-18T00:00:00.000Z | 2026-02-18T15:37:27.390Z |
| CVE-2018-17366 |
N/A
|
An issue was discovered in MCMS 4.6.5. There is a… |
n/a |
n/a |
2018-09-23T18:00:00.000Z | 2024-08-05T10:47:04.301Z |
| CVE-2026-2666 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
mingSoft MCMS Template Archive uploadTemplate.do unres… |
mingSoft |
MCMS |
2026-02-18T20:02:09.402Z | 2026-02-23T10:19:52.686Z |
| CVE-2026-2648 |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-02-18T21:39:03.100Z | 2026-02-26T14:44:15.504Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2020-37171 | TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy username conf… | 2026-02-07T00:15:57.460 | 2026-02-19T19:29:30.633 |
| fkie_cve-2026-25491 | Craft is a platform for creating digital experiences. From 5.0.0-RC1 to 5.8.21, Craft has a stored … | 2026-02-09T20:15:57.483 | 2026-02-19T19:26:43.110 |
| fkie_cve-2026-26019 | LangChain is a framework for building LLM-powered applications. Prior to 1.1.14, the RecursiveUrlLo… | 2026-02-11T22:15:51.910 | 2026-02-19T19:25:25.940 |
| fkie_cve-2020-37164 | AbsoluteTelnet 11.12 contains a denial of service vulnerability that allows local attackers to cras… | 2026-02-07T00:15:56.787 | 2026-02-19T19:24:08.323 |
| fkie_cve-2026-25994 | PJSIP is a free and open source multimedia communication library written in C. In 2.16 and earlier,… | 2026-02-11T21:16:20.813 | 2026-02-19T19:23:29.843 |
| fkie_cve-2026-26000 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top o… | 2026-02-12T21:16:02.990 | 2026-02-19T19:22:44.910 |
| fkie_cve-2026-27052 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-02-19T09:16:26.527 | 2026-02-19T19:22:30.010 |
| fkie_cve-2026-27042 | Missing Authorization vulnerability in WPDeveloper NotificationX notificationx allows Exploiting In… | 2026-02-19T09:16:26.243 | 2026-02-19T19:22:29.837 |
| fkie_cve-2026-25459 | Missing Authorization vulnerability in uixthemes Sober sober allows Exploiting Incorrectly Configur… | 2026-02-19T09:16:24.860 | 2026-02-19T19:22:29.363 |
| fkie_cve-2026-25432 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T09:16:24.297 | 2026-02-19T19:22:29.180 |
| fkie_cve-2026-25423 | Missing Authorization vulnerability in creativeinteractivemedia Real 3D FlipBook real3d-flipbook-li… | 2026-02-19T09:16:24.020 | 2026-02-19T19:22:28.953 |
| fkie_cve-2026-25418 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-02-19T09:16:23.460 | 2026-02-19T19:22:28.717 |
| fkie_cve-2026-25415 | Missing Authorization vulnerability in iqonicdesign WPBookit Pro wpbookit-pro allows Exploiting Inc… | 2026-02-19T09:16:23.180 | 2026-02-19T19:22:28.550 |
| fkie_cve-2026-25411 | Cross-Site Request Forgery (CSRF) vulnerability in themastercut Revision Manager TMC revision-manag… | 2026-02-19T09:16:22.910 | 2026-02-19T19:22:28.370 |
| fkie_cve-2025-71250 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-19T16:27:13.493 | 2026-02-19T19:22:28.140 |
| fkie_cve-2025-71249 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-19T16:27:13.287 | 2026-02-19T19:22:28.077 |
| fkie_cve-2025-71248 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-19T16:27:13.083 | 2026-02-19T19:22:28.017 |
| fkie_cve-2025-71247 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-19T16:27:12.853 | 2026-02-19T19:22:27.937 |
| fkie_cve-2026-25498 | Craft is a platform for creating digital experiences. In versions 4.0.0-RC1 through 4.16.17 and 5.0… | 2026-02-09T20:15:58.510 | 2026-02-19T19:20:46.393 |
| fkie_cve-2026-25493 | Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 a… | 2026-02-09T20:15:57.793 | 2026-02-19T19:20:06.863 |
| fkie_cve-2026-25495 | Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 a… | 2026-02-09T20:15:58.080 | 2026-02-19T19:18:14.197 |
| fkie_cve-2026-25494 | Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 … | 2026-02-09T20:15:57.937 | 2026-02-19T19:17:44.850 |
| fkie_cve-2026-25496 | Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 a… | 2026-02-09T20:15:58.223 | 2026-02-19T19:17:02.927 |
| fkie_cve-2026-25497 | Craft is a platform for creating digital experiences. In Craft versions from 4.0.0-RC1 to before 4.… | 2026-02-09T20:15:58.367 | 2026-02-19T19:16:05.023 |
| fkie_cve-2026-25492 | Craft CMS is a content management system. In Craft versions 3.5.0 through 4.16.17 and 5.0.0-RC1 thr… | 2026-02-09T20:15:57.650 | 2026-02-19T19:12:55.063 |
| fkie_cve-2020-37166 | AbsoluteTelnet 11.12 contains a denial of service vulnerability in the SSH2 username input field th… | 2026-02-07T00:15:57.117 | 2026-02-19T18:52:13.997 |
| fkie_cve-2025-70998 | UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default cr… | 2026-02-18T16:22:29.453 | 2026-02-19T18:47:14.493 |
| fkie_cve-2018-17366 | An issue was discovered in MCMS 4.6.5. There is a CSRF vulnerability that can add an administrator … | 2018-09-23T18:29:00.907 | 2026-02-19T18:39:55.267 |
| fkie_cve-2026-2666 | A flaw has been found in mingSoft MCMS 6.1.1. The affected element is an unknown function of the fi… | 2026-02-18T20:18:37.297 | 2026-02-19T18:36:04.607 |
| fkie_cve-2026-2648 | Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed a remote attacker t… | 2026-02-18T22:16:26.710 | 2026-02-19T18:35:27.370 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-5w28-wvm6-xf4j |
7.0 (3.1)
|
Use after free in Windows Subsystem for Linux allows an authorized attacker to elevate privileges l… | 2026-02-10T18:30:41Z | 2026-02-10T18:30:41Z |
| ghsa-5rxv-pj8f-g3gq |
7.0 (3.1)
|
Concurrent execution using shared resource with improper synchronization ('race condition') in Wind… | 2026-02-10T18:30:41Z | 2026-02-10T18:30:41Z |
| ghsa-5gf4-2f6r-6gcj |
7.8 (3.1)
|
Untrusted pointer dereference in Windows HTTP.sys allows an authorized attacker to elevate privileg… | 2026-02-10T18:30:41Z | 2026-02-10T18:30:41Z |
| ghsa-5cch-r4ff-mh3m |
7.8 (3.1)
|
Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally. | 2026-02-10T18:30:41Z | 2026-02-10T18:30:41Z |
| ghsa-56fh-gxc8-3p64 |
7.8 (3.1)
|
Time-of-check time-of-use (toctou) race condition in Windows HTTP.sys allows an authorized attacker… | 2026-02-10T18:30:41Z | 2026-02-10T18:30:41Z |
| ghsa-545g-3772-4wwv |
7.0 (3.1)
|
Concurrent execution using shared resource with improper synchronization ('race condition') in Wind… | 2026-02-10T18:30:41Z | 2026-02-10T18:30:41Z |
| ghsa-4mq7-7q99-xhq3 |
7.0 (3.1)
|
Use after free in Mailslot File System allows an authorized attacker to elevate privileges locally. | 2026-02-10T18:30:41Z | 2026-02-10T18:30:41Z |
| ghsa-4j53-hjh6-2xw6 |
5.5 (3.1)
|
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose informatio… | 2026-02-10T18:30:41Z | 2026-02-10T18:30:41Z |
| ghsa-4g5r-whcx-rjr9 |
7.8 (3.1)
|
After Effects versions 25.6 and earlier are affected by an Integer Overflow or Wraparound vulnerabi… | 2026-02-10T18:30:41Z | 2026-02-10T18:30:41Z |
| ghsa-3g4j-rmgh-9r5p |
7.0 (3.1)
|
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to el… | 2026-02-10T18:30:41Z | 2026-02-10T18:30:41Z |
| ghsa-35fp-m999-3h79 |
7.8 (3.1)
|
Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized at… | 2026-02-10T18:30:41Z | 2026-02-10T18:30:41Z |
| ghsa-2pm9-6ww9-wqv9 |
7.5 (3.1)
|
Exposure of sensitive information to an unauthorized actor in Microsoft Office Outlook allows an un… | 2026-02-10T18:30:41Z | 2026-02-10T18:30:41Z |
| ghsa-25h5-vgq2-336r |
7.8 (3.1)
|
Concurrent execution using shared resource with improper synchronization ('race condition') in Wind… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:41Z |
| ghsa-23hw-462m-2wh4 |
7.5 (3.1)
|
Buffer over-read in Windows GDI+ allows an unauthorized attacker to deny service over a network. | 2026-02-10T18:30:40Z | 2026-02-10T18:30:41Z |
| ghsa-x82r-h9qc-7x2x |
6.5 (3.1)
6.0 (4.0)
|
Out-of-bounds read in the firmware for some 100GbE Intel(R) Ethernet Network Adapter E810 before ve… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-vv67-m8xj-7g3c |
6.7 (3.1)
5.4 (4.0)
|
Incorrect default permissions for some Intel(R) Graphics Driver software within Ring 2: Privileged … | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-vg62-j2j5-2jx5 |
4.1 (3.1)
5.6 (4.0)
|
Exposure of sensitive information during transient execution for some TDX within Ring 0: Hypervisor… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-rwxr-mxrh-28v7 |
4.7 (3.1)
5.7 (4.0)
|
Improper conditions check in some firmware for some Intel(R) NPU Drivers within Ring 1: Device Driv… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-phpq-389w-765c |
7.9 (3.1)
8.3 (4.0)
|
Race condition for some TDX Module within Ring 0: Hypervisor may allow an escalation of privilege. … | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-gm26-9m2c-frwp |
8.1 (3.1)
|
Improper certificate validation in Azure Local allows an unauthorized attacker to execute code over… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-ggrw-x635-4pj7 |
2.8 (3.1)
2.0 (4.0)
|
Improper conditions check in some firmware for some Intel(R) Graphics Drivers and Intel LTS kernels… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-f2ww-7vgq-c34p |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-cjvx-jh2c-prqx |
4.1 (3.1)
5.6 (4.0)
|
Out-of-bounds read for some TDX Module before version tdx1.5 within Ring 0: Hypervisor may allow an… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-cf43-7r7r-9f4f |
3.9 (3.1)
1.8 (4.0)
|
Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an e… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-cc5f-w4v2-qr2q |
6.7 (3.1)
5.4 (4.0)
|
Uncontrolled search path for some AI Playground before version 2.6.1 beta within Ring 3: User Appli… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-9gjv-4x58-j6r8 |
5.3 (3.1)
5.6 (4.0)
|
Race condition for some TDX Module before version tdx1.5 within Ring 0: Hypervisor may allow a deni… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-9f53-h2mq-rm2m |
8.6 (3.1)
8.7 (4.0)
|
Out-of-bounds write in the firmware for the Intel(R) AMT and Intel(R) Standard Manageability within… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-9755-vpxc-gg29 |
4.1 (3.1)
5.6 (4.0)
|
Out-of-bounds read in the firmware for some Intel(R) Converged Security and Management Engine (CSME… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-8qcf-3wm9-8vmw |
4.1 (3.1)
5.6 (4.0)
|
Use of uninitialized variable for some TDX Module before version tdx1.5 within Ring 0: Hypervisor m… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-8hvj-g8h8-46hp |
5.5 (3.1)
6.8 (4.0)
|
Improper conditions check in some firmware for some Intel(R) NPU Drivers within Ring 1: Device Driv… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-29959 | A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a prints Brocade Fabric OS swit… | 2024-04-03T05:02:30.806991Z |
| gsd-2024-29962 | Brocade SANnav OVA before v2.3.1 and v2.3.0a have an insecure file permission setting tha… | 2024-04-03T05:02:30.803538Z |
| gsd-2024-29936 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.795714Z |
| gsd-2024-29877 | Cross-Site Scripting (XSS) vulnerability in Sentrifugo 3.2, through /sentrifugo/index.p… | 2024-04-03T05:02:30.794239Z |
| gsd-2024-29927 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.793567Z |
| gsd-2024-29849 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.792306Z |
| gsd-2024-29836 | The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains… | 2024-04-03T05:02:30.792104Z |
| gsd-2024-29860 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.788150Z |
| gsd-2024-29920 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.779968Z |
| gsd-2024-29840 | The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains… | 2024-04-03T05:02:30.779683Z |
| gsd-2024-29904 | CodeIgniter is a PHP full-stack web framework A vulnerability was found in the Language c… | 2024-04-03T05:02:30.773147Z |
| gsd-2024-29988 | SmartScreen Prompt Security Feature Bypass Vulnerability | 2024-04-03T05:02:30.772120Z |
| gsd-2024-29838 | The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below does not… | 2024-04-03T05:02:30.771911Z |
| gsd-2024-29956 | A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a prints the Brocade SANnav pas… | 2024-04-03T05:02:30.770140Z |
| gsd-2024-29958 | A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a prints the encryption key in … | 2024-04-03T05:02:30.769933Z |
| gsd-2024-29901 | The AuthKit library for Next.js provides helpers for authentication and session managemen… | 2024-04-03T05:02:30.769067Z |
| gsd-2024-29979 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.767525Z |
| gsd-2024-29935 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.766896Z |
| gsd-2024-29843 | The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains… | 2024-04-03T05:02:30.766108Z |
| gsd-2024-29857 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.765905Z |
| gsd-2024-29084 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.762876Z |
| gsd-2024-29933 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.760024Z |
| gsd-2024-29929 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.759331Z |
| gsd-2024-29938 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.759038Z |
| gsd-2024-29829 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.758823Z |
| gsd-2024-29867 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.757896Z |
| gsd-2024-29999 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.756915Z |
| gsd-2024-29903 | Cosign provides code signing and transparency for containers and binaries. Prior to versi… | 2024-04-03T05:02:30.753828Z |
| gsd-2024-29880 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.752184Z |
| gsd-2024-29917 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.748464Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-192337 | Malicious code in elf-stats-shimmering-garland-476 (npm) | 2025-12-05T21:10:10Z | 2025-12-05T21:10:10Z |
| mal-2025-192336 | Malicious code in elf-stats-northbound-drum-422 (npm) | 2025-12-05T21:10:10Z | 2025-12-05T21:10:10Z |
| mal-2025-192335 | Malicious code in elf-stats-mulled-snowglobe-636 (npm) | 2025-12-05T21:10:10Z | 2025-12-05T21:10:10Z |
| mal-2025-192333 | Malicious code in elf-stats-lanternlit-saddlebag-279 (npm) | 2025-12-05T21:10:10Z | 2025-12-05T21:10:10Z |
| mal-2025-192332 | Malicious code in elf-stats-flickering-lantern-502 (npm) | 2025-12-05T21:10:10Z | 2025-12-05T21:10:10Z |
| mal-2025-192331 | Malicious code in elf-stats-evergreen-satchel-264 (npm) | 2025-12-05T21:10:10Z | 2025-12-05T21:10:10Z |
| mal-2025-192329 | Malicious code in elf-stats-cosy-toy-308 (npm) | 2025-12-05T21:10:10Z | 2025-12-05T21:10:10Z |
| mal-2025-192327 | Malicious code in elf-stats-candystriped-garland-735 (npm) | 2025-12-05T21:10:10Z | 2025-12-05T21:10:10Z |
| mal-2025-192326 | Malicious code in elf-stats-candlelit-hollyberry-248 (npm) | 2025-12-05T21:10:10Z | 2025-12-05T21:10:10Z |
| mal-2025-192325 | Malicious code in elf-stats-aurora-mailbag-938 (npm) | 2025-12-05T21:10:10Z | 2025-12-05T21:10:10Z |
| mal-2025-192317 | Malicious code in tailwindcss-setfont (npm) | 2025-12-05T03:07:11Z | 2025-12-05T20:41:20Z |
| mal-2025-192316 | Malicious code in tailwindcss-animation-helper (npm) | 2025-12-05T03:05:17Z | 2025-12-05T20:41:20Z |
| mal-2025-192293 | Malicious code in tailwindcss-animation-css (npm) | 2025-12-03T22:19:24Z | 2025-12-05T20:41:20Z |
| mal-2025-192314 | Malicious code in react-svg-supporter (npm) | 2025-12-05T02:52:02Z | 2025-12-05T20:41:19Z |
| mal-2025-192313 | Malicious code in react-svg-fill (npm) | 2025-12-05T02:57:24Z | 2025-12-05T20:41:19Z |
| mal-2025-192312 | Malicious code in react-svg-bundler (npm) | 2025-12-05T02:52:02Z | 2025-12-05T20:41:19Z |
| mal-2025-192311 | Malicious code in react-icon-updater (npm) | 2025-12-05T02:50:28Z | 2025-12-05T20:41:19Z |
| mal-2025-192310 | Malicious code in node-tailwind (npm) | 2025-12-05T02:42:15Z | 2025-12-05T20:41:19Z |
| mal-2025-192309 | Malicious code in node-dpapi1 (npm) | 2025-12-05T02:42:15Z | 2025-12-05T20:41:19Z |
| mal-2025-192308 | Malicious code in module-listener (npm) | 2025-12-05T02:42:15Z | 2025-12-05T20:41:19Z |
| mal-2025-192307 | Malicious code in jsonify-settings (npm) | 2025-12-05T02:44:48Z | 2025-12-05T20:41:18Z |
| mal-2025-192303 | Malicious code in elf-stats-ginger-wreath-646 (npm) | 2025-12-04T13:55:53Z | 2025-12-05T20:41:17Z |
| mal-2025-192301 | Malicious code in elf-stats-mulled-ornament-810 (npm) | 2025-12-04T07:15:49Z | 2025-12-05T20:41:17Z |
| mal-2025-192300 | Malicious code in elf-stats-marzipan-cocoa-562 (npm) | 2025-12-04T07:15:49Z | 2025-12-05T20:41:17Z |
| mal-2025-192299 | Malicious code in elf-stats-lanternlit-snowman-834 (npm) | 2025-12-04T07:15:49Z | 2025-12-05T20:41:17Z |
| mal-2025-192298 | Malicious code in elf-stats-candlelit-marshmallow-663 (npm) | 2025-12-04T07:15:49Z | 2025-12-05T20:41:17Z |
| mal-2025-192297 | Malicious code in elf-stats-bright-cocoa-293 (npm) | 2025-12-04T07:15:49Z | 2025-12-05T20:41:17Z |
| mal-2025-192295 | Malicious code in elf-stats-jubilant-ornament-641 (npm) | 2025-12-04T06:00:43Z | 2025-12-05T20:41:17Z |
| mal-2025-192292 | Malicious code in email-validated (npm) | 2025-12-03T22:19:24Z | 2025-12-05T20:41:17Z |
| mal-2025-192291 | Malicious code in email-regexed (npm) | 2025-12-03T22:19:24Z | 2025-12-05T20:41:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0878 | IBM InfoSphere Information Server: Mehrere Schwachstellen | 2025-04-23T22:00:00.000+00:00 | 2025-04-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0876 | Proxmox Virtual Environment: Schwachstelle ermöglicht Manipulation von Dateien | 2025-04-23T22:00:00.000+00:00 | 2025-04-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0874 | SonicWall SSL-VPN: Schwachstelle ermöglicht Denial of Service | 2025-04-23T22:00:00.000+00:00 | 2025-04-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0856 | Proxmox Virtual Environment: Mehrere Schwachstellen | 2025-04-21T22:00:00.000+00:00 | 2025-04-23T22:00:00.000+00:00 |
| wid-sec-w-2023-2627 | Eclipse Jetty: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-10-10T22:00:00.000+00:00 | 2025-04-23T22:00:00.000+00:00 |
| wid-sec-w-2022-0614 | Eclipse Jetty: Mehrere Schwachstellen | 2022-07-07T22:00:00.000+00:00 | 2025-04-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0873 | xwiki: Mehrere Schwachstellen ermöglichen SQL-Injection | 2025-04-22T22:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2025-0872 | Trellix Endpoint Security: Schwachstelle ermöglicht Denial of Service | 2025-04-22T22:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2025-0871 | CODESYS: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-04-22T22:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2025-0870 | Hitachi Ops Center: Mehrere Schwachstellen ermöglichen Offenlegung von informationen | 2025-04-22T22:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2025-0868 | PyTorch: Schwachstelle ermöglicht Codeausführung | 2025-04-22T22:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2025-0864 | Ruby: Schwachstelle ermöglicht Man-in-the-Middle Angriff | 2013-06-27T22:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2025-0657 | Erlang/OTP: Schwachstelle ermöglicht Denial of Service | 2025-03-30T22:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2025-0579 | Mattermost Server: Mehrere Schwachstellen | 2025-03-17T23:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2025-0495 | Synology DiskStation Manager: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-03-05T23:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2024-1605 | Fabasoft Folio: Schwachstelle ermöglicht Codeausführung | 2024-07-11T22:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2024-1216 | GitLab: Mehrere Schwachstellen | 2024-05-21T22:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2024-1151 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2024-05-14T22:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2023-3209 | bluez: Mehrere Schwachstellen | 2023-12-21T23:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2023-3197 | bluez: Mehrere Schwachstellen | 2023-12-20T23:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2023-2461 | Ruby: Schwachstelle ermöglicht Codeausführung | 2021-05-02T22:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2023-1231 | WordPress: Mehrere Schwachstellen | 2023-05-16T22:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2022-2173 | Ruby: Schwachstelle ermöglicht Manipulation von Dateien | 2022-11-24T23:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2022-1305 | Ruby: Mehrere Schwachstellen | 2021-07-07T22:00:00.000+00:00 | 2025-04-22T22:00:00.000+00:00 |
| wid-sec-w-2025-0863 | Microsoft GitHub Enterprise: Mehrere Schwachstellen | 2025-04-21T22:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| wid-sec-w-2025-0862 | Moodle: Mehrere Schwachstellen | 2025-04-21T22:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| wid-sec-w-2025-0860 | Liferay Portal und Liferay DXP: Schwachstelle ermöglicht Cross-Site Scripting | 2025-04-21T22:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| wid-sec-w-2025-0859 | Tenable Security Nessus: Mehrere Schwachstellen | 2025-04-21T22:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| wid-sec-w-2025-0855 | Zyxel Firewall: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-04-21T22:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| wid-sec-w-2025-0852 | IBM Maximo Asset Management: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-04-21T22:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:16904 | Red Hat Security Advisory: kernel security update | 2025-09-29T08:02:17+00:00 | 2026-02-03T20:08:59+00:00 |
| rhsa-2025:2445 | Red Hat Security Advisory: OpenShift Container Platform 4.17.20 bug fix and security update | 2025-03-12T19:12:02+00:00 | 2026-02-03T20:08:54+00:00 |
| rhsa-2025:17159 | Red Hat Security Advisory: kernel security update | 2025-10-01T18:14:44+00:00 | 2026-02-03T20:08:46+00:00 |
| rhsa-2025:15782 | Red Hat Security Advisory: kernel security update | 2025-09-15T10:31:30+00:00 | 2026-02-03T20:08:45+00:00 |
| rhsa-2025:15668 | Red Hat Security Advisory: kernel security update | 2025-09-11T06:45:54+00:00 | 2026-02-03T20:08:45+00:00 |
| rhsa-2025:15661 | Red Hat Security Advisory: kernel security update | 2025-09-11T03:38:29+00:00 | 2026-02-03T20:08:45+00:00 |
| rhsa-2025:15649 | Red Hat Security Advisory: kernel security update | 2025-09-10T17:18:12+00:00 | 2026-02-03T20:08:45+00:00 |
| rhsa-2025:15648 | Red Hat Security Advisory: kernel security update | 2025-09-10T16:23:22+00:00 | 2026-02-03T20:08:44+00:00 |
| rhsa-2025:15647 | Red Hat Security Advisory: kernel security update | 2025-09-10T16:20:58+00:00 | 2026-02-03T20:08:44+00:00 |
| rhsa-2025:15646 | Red Hat Security Advisory: kernel-rt security update | 2025-09-10T15:54:37+00:00 | 2026-02-03T20:08:42+00:00 |
| rhsa-2025:15008 | Red Hat Security Advisory: kernel security update | 2025-09-02T04:26:50+00:00 | 2026-02-03T20:08:42+00:00 |
| rhsa-2025:14005 | Red Hat Security Advisory: kernel-rt security update | 2025-08-18T12:14:54+00:00 | 2026-02-03T20:08:39+00:00 |
| rhsa-2025:14003 | Red Hat Security Advisory: kernel security update | 2025-08-18T12:00:00+00:00 | 2026-02-03T20:08:37+00:00 |
| rhsa-2025:3666 | Red Hat Security Advisory: openssl security update | 2025-04-08T01:14:48+00:00 | 2026-02-03T20:08:22+00:00 |
| rhsa-2025:1925 | Red Hat Security Advisory: Updated service-interconnect rhel9 container images for 1.5 | 2025-02-27T15:19:12+00:00 | 2026-02-03T20:08:22+00:00 |
| rhsa-2025:1673 | Red Hat Security Advisory: mysql:8.0 security update | 2025-02-19T11:10:11+00:00 | 2026-02-03T20:08:21+00:00 |
| rhsa-2025:1671 | Red Hat Security Advisory: mysql security update | 2025-02-19T10:31:41+00:00 | 2026-02-03T20:08:20+00:00 |
| rhsa-2025:1487 | Red Hat Security Advisory: updated discovery container images | 2025-02-13T20:14:49+00:00 | 2026-02-03T20:08:20+00:00 |
| rhsa-2025:1330 | Red Hat Security Advisory: openssl security update | 2025-02-11T16:50:14+00:00 | 2026-02-03T20:08:19+00:00 |
| rhsa-2024:11029 | Red Hat Security Advisory: ruby:2.5 security update | 2024-12-12T23:02:50+00:00 | 2026-02-03T20:08:17+00:00 |
| rhsa-2025:1227 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.9.11 | 2025-02-12T16:40:08+00:00 | 2026-02-03T20:08:14+00:00 |
| rhsa-2024:11028 | Red Hat Security Advisory: ruby:2.5 security update | 2024-12-12T22:59:20+00:00 | 2026-02-03T20:08:13+00:00 |
| rhsa-2024:11027 | Red Hat Security Advisory: ruby:2.5 security update | 2024-12-12T22:49:45+00:00 | 2026-02-03T20:08:11+00:00 |
| rhsa-2024:10982 | Red Hat Security Advisory: ruby:3.1 security update | 2024-12-12T09:09:04+00:00 | 2026-02-03T20:08:11+00:00 |
| rhsa-2024:10977 | Red Hat Security Advisory: ruby security update | 2024-12-12T07:11:59+00:00 | 2026-02-03T20:08:11+00:00 |
| rhsa-2024:11001 | Red Hat Security Advisory: ruby:2.5 security update | 2024-12-12T12:58:39+00:00 | 2026-02-03T20:08:10+00:00 |
| rhsa-2024:10966 | Red Hat Security Advisory: ruby:3.1 security update | 2024-12-11T19:14:02+00:00 | 2026-02-03T20:08:10+00:00 |
| rhsa-2024:10987 | Red Hat Security Advisory: pcs security update | 2024-12-12T10:01:14+00:00 | 2026-02-03T20:08:09+00:00 |
| rhsa-2024:10984 | Red Hat Security Advisory: ruby:3.1 security update | 2024-12-12T09:20:34+00:00 | 2026-02-03T20:08:09+00:00 |
| rhsa-2024:10961 | Red Hat Security Advisory: ruby security update | 2024-12-11T16:49:32+00:00 | 2026-02-03T20:08:08+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-26582 | net: tls: fix use-after-free with partial reads and async decrypt | 2024-02-02T08:00:00.000Z | 2026-02-18T01:08:38.000Z |
| msrc_cve-2023-27536 | An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed. | 2023-03-10T00:00:00.000Z | 2026-02-18T01:08:38.000Z |
| msrc_cve-2023-46853 | In Memcached before 1.6.22 an off-by-one error exists when processing proxy requests in proxy mode if \n is used instead of \r\n. | 2023-10-01T00:00:00.000Z | 2026-02-18T01:08:33.000Z |
| msrc_cve-2024-11584 | cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.socket with default SocketMode that grants 0666 permissions, making it world-writable. This is used for the "/run/cloud-init/hook-hotplug-cmd" FIFO. An unprivileged user could trigger hotplug-hook commands. | 2025-06-02T00:00:00.000Z | 2026-02-18T01:08:28.000Z |
| msrc_cve-2024-26928 | smb: client: fix potential UAF in cifs_debug_files_proc_show() | 2024-04-02T07:00:00.000Z | 2026-02-18T01:08:25.000Z |
| msrc_cve-2025-21727 | padata: fix UAF in padata_reorder | 2025-02-02T00:00:00.000Z | 2026-02-18T01:08:16.000Z |
| msrc_cve-2025-39713 | media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() | 2025-09-02T00:00:00.000Z | 2026-02-18T01:08:06.000Z |
| msrc_cve-2024-38473 | Apache HTTP Server proxy encoding problem | 2024-07-01T07:00:00.000Z | 2026-02-18T01:08:06.000Z |
| msrc_cve-2024-26585 | tls: fix race between tx work scheduling and socket close | 2024-02-02T08:00:00.000Z | 2026-02-18T01:07:59.000Z |
| msrc_cve-2023-46852 | In Memcached before 1.6.22 a buffer overflow exists when processing multiget requests in proxy mode if there are many spaces after the "get" substring. | 2023-10-01T00:00:00.000Z | 2026-02-18T01:07:52.000Z |
| msrc_cve-2025-21820 | tty: xilinx_uartps: split sysrq handling | 2025-02-02T00:00:00.000Z | 2026-02-18T01:07:51.000Z |
| msrc_cve-2025-53020 | Apache HTTP Server: HTTP/2 DoS by Memory Increase | 2025-07-02T00:00:00.000Z | 2026-02-18T01:07:44.000Z |
| msrc_cve-2025-21731 | nbd: don't allow reconnect after disconnect | 2025-02-02T00:00:00.000Z | 2026-02-18T01:07:35.000Z |
| msrc_cve-2024-49907 | drm/amd/display: Check null pointers before using dc->clk_mgr | 2024-10-01T07:00:00.000Z | 2026-02-18T01:07:35.000Z |
| msrc_cve-2024-6174 | When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform enumeration. | 2025-06-02T00:00:00.000Z | 2026-02-18T01:07:26.000Z |
| msrc_cve-2023-28938 | Uncontrolled resource consumption in some Intel(R) SSD Tools software before version mdadm-4.2-rc2 may allow a priviledged user to potentially enable denial of service via local access. | 2023-08-01T00:00:00.000Z | 2026-02-18T01:07:13.000Z |
| msrc_cve-2021-22918 | Node.js before 16.4.1 14.17.2 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo(). | 2021-07-02T00:00:00.000Z | 2026-02-18T01:07:13.000Z |
| msrc_cve-2024-46981 | Redis' Lua library commands may lead to remote code execution | 2025-01-02T00:00:00.000Z | 2026-02-18T01:07:12.000Z |
| msrc_cve-2024-54458 | scsi: ufs: bsg: Set bsg_queue to NULL after removal | 2025-02-02T00:00:00.000Z | 2026-02-18T01:06:59.000Z |
| msrc_cve-2023-24531 | Output of "go env" does not sanitize values in cmd/go | 2024-07-01T07:00:00.000Z | 2026-02-18T01:06:58.000Z |
| msrc_cve-2023-28320 | A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names selected at build time. If it is built to use the synchronous resolver it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave. | 2023-05-01T00:00:00.000Z | 2026-02-18T01:06:44.000Z |
| msrc_cve-2025-32990 | Gnutls: vulnerability in gnutls certtool template parsing | 2025-07-02T00:00:00.000Z | 2026-02-18T01:06:39.000Z |
| msrc_cve-2025-27423 | Improper Input Validation in Vim | 2025-03-02T00:00:00.000Z | 2026-02-18T01:06:28.000Z |
| msrc_cve-2023-28736 | Buffer overflow in some Intel(R) SSD Tools software before version mdadm-4.2-rc2 may allow a privileged user to potentially enable escalation of privilege via local access. | 2023-08-01T00:00:00.000Z | 2026-02-18T01:06:28.000Z |
| msrc_cve-2025-22104 | ibmvnic: Use kernel helpers for hex dumps | 2025-04-02T00:00:00.000Z | 2026-02-18T01:06:27.000Z |
| msrc_cve-2023-52979 | squashfs: harden sanity check in squashfs_read_xattr_id_table | 2025-03-02T00:00:00.000Z | 2026-02-18T01:06:23.000Z |
| msrc_cve-2022-23806 | Curve.IsOnCurve in crypto/elliptic in Go before 1.16.14 and 1.17.x before 1.17.7 can incorrectly return true in situations with a big.Int value that is not a valid field element. | 2022-02-02T00:00:00.000Z | 2026-02-18T01:06:11.000Z |
| msrc_cve-2024-27304 | pgx SQL Injection via Protocol Message Size Overflow | 2024-03-02T08:00:00.000Z | 2026-02-18T01:05:59.000Z |
| msrc_cve-2025-21729 | wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion | 2025-02-02T00:00:00.000Z | 2026-02-18T01:05:43.000Z |
| msrc_cve-2024-57975 | btrfs: do proper folio cleanup when run_delalloc_nocow() failed | 2025-02-02T00:00:00.000Z | 2026-02-18T01:05:38.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202504-1125 | A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2)… | 2025-08-23T19:41:31.549000Z |
| var-202508-0383 | A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions < V3.2… | 2025-08-23T19:36:48.195000Z |
| var-202508-0355 | A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions < V3.3… | 2025-08-23T19:36:48.016000Z |
| var-202406-2601 | TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a stack overflow via the sub… | 2025-08-22T23:50:40.342000Z |
| var-202405-1258 | D-Link DIR-845L router v1.01KRb03 and before is vulnerable to Permission Bypass via the g… | 2025-08-22T23:25:51.503000Z |
| var-202401-1251 | A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216 and classified as crit… | 2025-08-21T23:42:00.329000Z |
| var-202407-2456 | A vulnerability classified as critical has been found in TOTOLINK A3700R 9.1.2u.5822_B202… | 2025-08-21T23:41:38.437000Z |
| var-202408-1790 | In D-Link DIR-860L v2.03, there is a buffer overflow vulnerability due to the lack of len… | 2025-08-21T23:39:03.385000Z |
| var-202508-1788 | TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a command injection vuln… | 2025-08-21T23:27:05.448000Z |
| var-202507-0155 | A vulnerability, which was classified as critical, has been found in TOTOLINK N200RE 9.3.… | 2025-08-21T23:18:17.243000Z |
| var-202312-0589 | D-Link G416 httpd Improper Handling of Exceptional Conditions Information Disclosure Vuln… | 2025-08-21T23:11:17.957000Z |
| var-202312-0517 | D-Link G416 nodered gz File Handling Command Injection Remote Code Execution Vulnerabilit… | 2025-08-21T23:11:17.928000Z |
| var-202312-0686 | D-Link G416 cfgsave Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This… | 2025-08-21T23:11:17.897000Z |
| var-202312-0559 | D-Link G416 ovpncfg Stack-based Buffer Overflow Remote Code Execution Vulnerability. This… | 2025-08-21T23:11:17.869000Z |
| var-202312-0526 | D-Link G416 httpd API-AUTH Digest Processing Stack-based Buffer Overflow Remote Code Exec… | 2025-08-21T23:11:17.836000Z |
| var-202312-0552 | D-Link G416 awsfile tar File Handling Command Injection Remote Code Execution Vulnerabili… | 2025-08-21T23:11:17.805000Z |
| var-202312-0516 | D-Link G416 awsfile rm Command Injection Remote Code Execution Vulnerability. This vulner… | 2025-08-21T23:11:17.773000Z |
| var-202312-0592 | D-Link G416 httpd Missing Authentication for Critical Function Remote Code Execution Vuln… | 2025-08-21T23:11:17.741000Z |
| var-202312-0501 | D-Link G416 nodered tar File Handling Command Injection Remote Code Execution Vulnerabili… | 2025-08-21T23:11:17.713000Z |
| var-202312-0618 | D-Link G416 httpd API-AUTH Timestamp Processing Stack-based Buffer Overflow Remote Code E… | 2025-08-21T23:11:17.681000Z |
| var-202112-2294 | NETGEAR R6400 devices before 1.0.1.70 are affected by server-side injection. NETGEAR R640… | 2025-08-20T23:17:58.442000Z |
| var-202110-1807 | NETGEAR Multiple Routers httpd Missing Authentication for Critical Function Information D… | 2025-08-20T23:06:15.645000Z |
| var-202506-1042 | A vulnerability has been found in D-Link DIR-825 2.03 and classified as critical. This vu… | 2025-08-19T23:20:40.170000Z |
| var-202507-0252 | A vulnerability was found in D-Link DI-500WF 17.04.10A1T. It has been declared as critica… | 2025-08-18T23:04:19.023000Z |
| var-202309-0636 | The OPC UA implementations (ANSI C and C++) in affected products contain an integer overf… | 2025-08-18T20:07:45.251000Z |
| var-202507-3434 | The iBall Baton iB-WRB303N is a wireless router. The iBall Baton iB-WRB303N has an infor… | 2025-08-17T23:47:32.715000Z |
| var-202507-3602 | Shenzhen Jixiang Tengda Technology Co., Ltd. (Tenda) is a high-tech enterprise specializi… | 2025-08-17T23:47:32.637000Z |
| var-202507-3917 | The Ricoh M320F is a monochrome laser multifunction printer. The Ricoh M320F has an unau… | 2025-08-17T23:47:32.483000Z |
| var-202112-2303 | NETGEAR R7000 devices before 1.0.11.116 are affected by disclosure of sensitive informati… | 2025-08-17T23:45:50.269000Z |
| var-202506-1156 | A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been classified… | 2025-08-17T23:45:44.450000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:0241-1 | Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) | 2025-01-26T05:03:57Z | 2025-01-26T05:03:57Z |
| suse-su-2025:0240-1 | Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3) | 2025-01-25T11:33:32Z | 2025-01-25T11:33:32Z |
| suse-su-2025:0239-1 | Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) | 2025-01-25T11:04:00Z | 2025-01-25T11:04:00Z |
| suse-su-2025:0238-1 | Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 2025-01-25T10:03:57Z | 2025-01-25T10:03:57Z |
| suse-su-2025:0237-1 | Security update for nodejs20 | 2025-01-24T19:33:36Z | 2025-01-24T19:33:36Z |
| suse-su-2025:0236-1 | Security update for the Linux Kernel | 2025-01-24T17:02:35Z | 2025-01-24T17:02:35Z |
| suse-su-2025:0235-1 | Security update for java-11-openjdk | 2025-01-24T16:34:30Z | 2025-01-24T16:34:30Z |
| suse-su-2025:0234-1 | Security update for nodejs18 | 2025-01-24T16:34:19Z | 2025-01-24T16:34:19Z |
| suse-su-2025:0233-1 | Security update for nodejs18 | 2025-01-24T16:05:12Z | 2025-01-24T16:05:12Z |
| suse-su-2025:0232-1 | Security update for nodejs20 | 2025-01-24T14:33:49Z | 2025-01-24T14:33:49Z |
| suse-su-2025:0231-1 | Security update for the Linux Kernel | 2025-01-24T10:10:55Z | 2025-01-24T10:10:55Z |
| suse-su-2025:0230-1 | Security update for the Linux Kernel | 2025-01-24T10:10:41Z | 2025-01-24T10:10:41Z |
| suse-su-2025:0229-1 | Security update for the Linux Kernel | 2025-01-24T10:10:25Z | 2025-01-24T10:10:25Z |
| suse-su-2025:0217-1 | Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer | 2025-01-22T02:53:54Z | 2025-01-22T02:53:54Z |
| suse-su-2025:0216-1 | Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer | 2025-01-22T02:53:21Z | 2025-01-22T02:53:21Z |
| suse-su-2025:0215-1 | Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container | 2025-01-22T02:52:51Z | 2025-01-22T02:52:51Z |
| suse-su-2025:0214-1 | Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container | 2025-01-22T02:52:11Z | 2025-01-22T02:52:11Z |
| suse-su-2025:0208-1 | Security update for nvidia-open-driver-G06-signed | 2025-01-21T14:44:38Z | 2025-01-21T14:44:38Z |
| suse-su-2025:0207-1 | Security update for nvidia-open-driver-G06-signed | 2025-01-21T14:44:02Z | 2025-01-21T14:44:02Z |
| suse-su-2025:0203-1 | Security update for the Linux Kernel | 2025-01-21T13:58:41Z | 2025-01-21T13:58:41Z |
| suse-su-2025:0202-1 | Security update for the Linux Kernel | 2025-01-21T12:52:55Z | 2025-01-21T12:52:55Z |
| suse-su-2025:0200-1 | Security update for pam_u2f | 2025-01-21T12:50:26Z | 2025-01-21T12:50:26Z |
| suse-su-2025:0198-1 | Security update for pam_u2f | 2025-01-21T10:10:10Z | 2025-01-21T10:10:10Z |
| suse-su-2025:0197-1 | Security update for git | 2025-01-21T10:03:35Z | 2025-01-21T10:03:35Z |
| suse-su-2025:0196-1 | Security update for dhcp | 2025-01-21T08:34:38Z | 2025-01-21T08:34:38Z |
| suse-su-2025:0194-1 | Security update for libqt5-qtwebkit | 2025-01-20T13:26:22Z | 2025-01-20T13:26:22Z |
| suse-su-2025:0192-1 | Security update for pam_u2f | 2025-01-20T09:04:08Z | 2025-01-20T09:04:08Z |
| suse-su-2025:0191-1 | Security update for amazon-ssm-agent | 2025-01-20T06:49:21Z | 2025-01-20T06:49:21Z |
| suse-su-2025:0184-1 | Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) | 2025-01-18T02:04:20Z | 2025-01-18T02:04:20Z |
| suse-su-2025:0188-1 | Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | 2025-01-18T02:04:10Z | 2025-01-18T02:04:10Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:12676-1 | nova-3.6.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12675-1 | chromedriver-110.0.5481.77-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12674-1 | c-ares-devel-1.19.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12673-1 | libQt6Concurrent6-6.4.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12672-1 | pesign-113-11.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12671-1 | less-608-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12670-1 | java-1_8_0-openjdk-1.8.0.362-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12669-1 | java-17-openjdk-17.0.6.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12668-1 | helmfile-0.150.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12667-1 | helm-3.11.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12666-1 | caddy-2.6.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12665-1 | xwayland-22.1.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12664-1 | xorg-x11-server-21.1.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12663-1 | java-11-openjdk-11.0.18.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12662-1 | ceph-16.2.11.58+g38d6afd3b78-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12661-1 | java-19-openjdk-19.0.2.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12660-1 | harfbuzz-devel-6.0.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12659-1 | grafana-8.5.20-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12658-1 | sysstat-12.6.1-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12657-1 | nodejs-electron-22.2.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12656-1 | apr-util-devel-1.6.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12655-1 | apr-devel-1.7.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12654-1 | python310-Django-4.1.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12653-1 | libpkgconf-devel-1.8.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12652-1 | MozillaThunderbird-102.7.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12651-1 | perl-Email-Address-1.913-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12650-1 | golang-github-prometheus-prometheus-2.41.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12649-1 | binwalk-2.3.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12648-1 | ruby3.1-rubygem-globalid-1.1.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12647-1 | libwireshark16-4.0.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-mariadb-2021-46662 | 2024-03-06T11:04:59.469Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-46661 | 2024-03-06T11:05:08.409Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-46659 | 2024-03-06T11:05:17.293Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-46658 | 2024-03-06T11:05:27.709Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-46657 | 2024-03-06T11:05:37.876Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-35604 | 2024-03-06T11:05:47.874Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-27928 | 2024-03-06T11:05:58.174Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2389 | 2024-03-06T11:06:07.303Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2372 | 2024-03-06T11:06:16.373Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2194 | 2024-03-06T11:06:25.164Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2180 | 2024-03-06T11:06:35.896Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2174 | 2024-03-06T11:06:44.208Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2166 | 2024-03-06T11:06:56.186Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2154 | 2024-03-06T11:07:04.370Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2144 | 2024-03-06T11:07:14.870Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2032 | 2024-03-06T11:07:23.876Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2022 | 2024-03-06T11:07:31.801Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2011 | 2024-03-06T11:07:40.785Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2007 | 2024-03-06T11:07:48.392Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2020-7221 | 2024-03-06T11:07:58.868Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2020-2922 | 2024-03-06T11:08:09.366Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2020-28912 | 2024-03-06T11:08:18.607Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2020-2814 | 2024-03-06T11:08:28.705Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2020-2812 | 2024-03-06T11:08:40.599Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2020-2780 | 2024-03-06T11:08:49.705Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2020-2760 | 2024-03-06T11:08:57.859Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2020-2752 | 2024-03-06T11:09:05.198Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2020-2574 | 2024-03-06T11:09:12.878Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2020-15180 | 2024-03-06T11:09:20.696Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2020-14812 | 2024-03-06T11:09:27.982Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-23590 | TOTOLINK N600R命令注入漏洞 | 2025-09-05 | 2025-10-14 |
| cnvd-2025-23589 | TOTOLINK X6000R OS命令注入漏洞 | 2025-09-26 | 2025-10-14 |
| cnvd-2025-23588 | TOTOLINK X6000R输入验证不当漏洞 | 2025-09-26 | 2025-10-14 |
| cnvd-2025-23587 | TOTOLINK N600R空指针取消引用漏洞 | 2025-09-28 | 2025-10-14 |
| cnvd-2025-23586 | TOTOLINK X18 setEasyMeshAgentCfg函数mac参数命令注入漏洞 | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23585 | TOTOLINK X18 setEasyMeshAgentCfg函数命令注入漏洞 | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23584 | TOTOLINK N600R /cgi-bin/cstecgi.cgi文件缓冲区溢出漏洞 | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23572 | AndSoft e-TMS路径遍历漏洞 | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23571 | AndSoft e-TMS加密问题漏洞 | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23570 | AndSoft e-TMS SQL注入漏洞 | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23569 | AndSoft e-TMS SQL注入漏洞(CNVD-2025-23569) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23568 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23568) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23567 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23567) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23566 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23566) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23565 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23565) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23564 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23564) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23563 | AndSoft e-TMS操作系统命令注入漏洞(CNVD-2025-23563) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23562 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23562) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23561 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23561) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23560 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23560) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23559 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23559) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23558 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23558) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23557 | AndSoft e-TMS操作系统命令注入漏洞(CNVD-2025-23557) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23556 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23556) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23555 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23555) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23554 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23554) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23553 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23553) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23552 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23552) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23551 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23551) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23550 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23550) | 2025-10-13 | 2025-10-14 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2022-avi-985 | Multiples vulnérabilités dans OpenSSL | 2022-11-02T00:00:00.000000 | 2022-11-02T00:00:00.000000 |
| certfr-2022-avi-984 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2022-11-02T00:00:00.000000 | 2022-11-02T00:00:00.000000 |
| certfr-2022-avi-983 | Multiples vulnérabilités dans Apple Xcode | 2022-11-02T00:00:00.000000 | 2022-11-02T00:00:00.000000 |
| certfr-2022-avi-982 | Multiples vulnérabilités dans les produits Kaspersky | 2022-11-02T00:00:00.000000 | 2022-11-02T00:00:00.000000 |
| certfr-2022-avi-981 | Multiples vulnérabilités dans les produits Foxit | 2022-11-02T00:00:00.000000 | 2022-11-02T00:00:00.000000 |
| certfr-2022-avi-980 | Vulnérabilité dans Microsoft Edge | 2022-11-02T00:00:00.000000 | 2022-11-02T00:00:00.000000 |
| certfr-2022-avi-978 | Multiples vulnérabilités dans VMware Spring | 2022-11-02T00:00:00.000000 | 2022-11-02T00:00:00.000000 |
| certfr-2022-avi-977 | Multiples vulnérabilités dans Citrix Hypervisor | 2022-11-02T00:00:00.000000 | 2022-11-02T00:00:00.000000 |
| certfr-2022-avi-976 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-11-02T00:00:00.000000 | 2022-11-02T00:00:00.000000 |
| certfr-2022-avi-975 | Vulnérabilité dans Apache Tomcat | 2022-11-02T00:00:00.000000 | 2022-11-02T00:00:00.000000 |
| certfr-2022-avi-974 | Multiples vulnérabilités dans Xen | 2022-11-02T00:00:00.000000 | 2022-11-02T00:00:00.000000 |
| certfr-2022-avi-973 | Multiples vulnérabilités dans les produits Fortinet | 2022-11-02T00:00:00.000000 | 2022-11-02T00:00:00.000000 |
| certfr-2022-avi-972 | Vulnérabilité dans Azure CLI | 2022-10-31T00:00:00.000000 | 2022-10-31T00:00:00.000000 |
| certfr-2022-avi-971 | Multiples vulnérabilités dans PHP | 2022-10-31T00:00:00.000000 | 2022-10-31T00:00:00.000000 |
| certfr-2022-avi-970 | Vulnérabilité dans Nextcloud Server | 2022-10-31T00:00:00.000000 | 2022-10-31T00:00:00.000000 |
| certfr-2022-avi-969 | Vulnérabilité dans les produits NetApp | 2022-10-31T00:00:00.000000 | 2022-10-31T00:00:00.000000 |
| certfr-2022-avi-968 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2022-10-28T00:00:00.000000 | 2022-10-28T00:00:00.000000 |
| certfr-2022-avi-967 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-10-28T00:00:00.000000 | 2022-10-28T00:00:00.000000 |
| certfr-2022-avi-966 | Multiples vulnérabilités dans les produits Synology | 2022-10-28T00:00:00.000000 | 2022-10-28T00:00:00.000000 |
| certfr-2022-avi-965 | Multiples vulnérabilités dans Microsoft Edge | 2022-10-28T00:00:00.000000 | 2022-10-28T00:00:00.000000 |
| certfr-2022-avi-964 | Vulnérabilité dans Google Chrome | 2022-10-28T00:00:00.000000 | 2022-10-28T00:00:00.000000 |
| certfr-2022-avi-963 | Multiples vulnérabilités dans Apple iOS et iPadOS | 2022-10-28T00:00:00.000000 | 2022-10-28T00:00:00.000000 |
| certfr-2022-avi-962 | Multiples vulnérabilités dans Tenable Nessus | 2022-10-28T00:00:00.000000 | 2022-10-28T00:00:00.000000 |
| certfr-2022-avi-961 | Multiples vulnérabilités dans Nextcloud Server | 2022-10-27T00:00:00.000000 | 2022-10-27T00:00:00.000000 |
| certfr-2022-avi-960 | Multiples vulnérabilités dans les produits IBM | 2022-10-27T00:00:00.000000 | 2022-10-27T00:00:00.000000 |
| certfr-2022-avi-959 | Multiples vulnérabilités dans Tenable Nessus | 2022-10-27T00:00:00.000000 | 2022-10-27T00:00:00.000000 |
| certfr-2022-avi-958 | Multiples vulnérabilités dans Wireshark | 2022-10-27T00:00:00.000000 | 2022-10-27T00:00:00.000000 |
| certfr-2022-avi-957 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2022-10-26T00:00:00.000000 | 2022-10-26T00:00:00.000000 |
| certfr-2022-avi-956 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2022-10-26T00:00:00.000000 | 2022-10-26T00:00:00.000000 |
| certfr-2022-avi-955 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-10-26T00:00:00.000000 | 2022-10-26T00:00:00.000000 |