Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-14740 |
6.7 (3.1)
|
Docker Desktop for Windows Incorrect Permission Assign… |
Docker Inc. |
Docker Desktop |
2026-02-04T13:57:23.002Z | 2026-02-26T15:04:21.122Z |
| CVE-2026-20871 |
7.8 (3.1)
|
Desktop Window Manager Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 21H2 |
2026-01-13T17:57:00.236Z | 2026-02-26T15:04:20.984Z |
| CVE-2026-0659 |
7.8 (3.1)
|
USD File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
USD for Arnold |
2026-02-04T16:01:27.307Z | 2026-02-26T15:04:20.838Z |
| CVE-2026-20873 |
7.8 (3.1)
|
Windows Management Services Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 1809 |
2026-01-13T17:57:01.485Z | 2026-02-26T15:04:20.703Z |
| CVE-2026-20098 |
8.8 (3.1)
|
Cisco Meeting Management Arbitrary File Upload Vulnerability |
Cisco |
Cisco Meeting Management |
2026-02-04T16:11:48.298Z | 2026-02-26T15:04:20.557Z |
| CVE-2026-20874 |
7.8 (3.1)
|
Windows Management Services Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 1809 |
2026-01-13T17:57:02.246Z | 2026-02-26T15:04:20.421Z |
| CVE-2026-0538 |
7.8 (3.1)
|
GIF File Parsing Out-of-Bounds Write |
Autodesk |
3ds Max |
2026-02-04T16:24:36.976Z | 2026-02-26T15:04:20.268Z |
| CVE-2026-20929 |
7.5 (3.1)
|
Windows HTTP.sys Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-01-13T17:57:02.860Z | 2026-02-26T15:04:20.113Z |
| CVE-2026-0537 |
7.8 (3.1)
|
RGB File Parsing Memory Corruption |
Autodesk |
3ds Max |
2026-02-04T16:26:01.689Z | 2026-02-26T15:04:19.968Z |
| CVE-2026-20931 |
8 (3.1)
|
Windows Telephony Service Elevation of Privilege Vulne… |
Microsoft |
Windows 10 Version 1607 |
2026-01-13T17:57:03.440Z | 2026-02-26T15:04:19.842Z |
| CVE-2026-0661 |
7.8 (3.1)
|
Out-of-Bounds Write in RGB File Parsing |
Autodesk |
3ds Max |
2026-02-04T16:27:13.416Z | 2026-02-26T15:04:19.691Z |
| CVE-2026-20948 |
7.8 (3.1)
|
Microsoft Word Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-01-13T17:57:06.605Z | 2026-02-26T15:04:19.481Z |
| CVE-2026-0660 |
7.8 (3.1)
|
Stack Based Buffer Overflow in GIF File Parsing |
Autodesk |
3ds Max |
2026-02-04T16:27:40.582Z | 2026-02-26T15:04:19.333Z |
| CVE-2026-20949 |
7.8 (3.1)
|
Microsoft Excel Security Feature Bypass Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-01-13T17:57:07.146Z | 2026-02-26T15:04:19.178Z |
| CVE-2026-0662 |
7.8 (3.1)
|
Untrusted Search Path Vulnerability when opening max Files |
Autodesk |
3ds Max |
2026-02-04T16:28:31.980Z | 2026-02-26T15:04:19.038Z |
| CVE-2026-20950 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-01-13T17:57:07.761Z | 2026-02-26T15:04:18.903Z |
| CVE-2026-0536 |
7.8 (3.1)
|
GIF File Parsing Stack Based Buffer Overflow |
Autodesk |
3ds Max |
2026-02-04T18:12:56.985Z | 2026-02-26T15:04:18.760Z |
| CVE-2026-20952 |
8.4 (3.1)
|
Microsoft Office Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-01-13T17:57:08.490Z | 2026-02-26T15:04:18.612Z |
| CVE-2025-11730 |
7.2 (3.1)
|
A post‑authentication command injection vulnerabi… |
Zyxel |
ATP series firmware |
2026-02-05T01:55:12.291Z | 2026-02-26T15:04:18.490Z |
| CVE-2026-20957 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-01-13T17:57:09.187Z | 2026-02-26T15:04:18.357Z |
| CVE-2025-13379 |
8.6 (3.1)
|
A SQL Injection vulnerability has been addressed in IB… |
IBM |
Aspera Console |
2026-02-05T13:30:04.998Z | 2026-02-26T15:04:18.212Z |
| CVE-2026-20941 |
7.8 (3.1)
|
Host Process for Windows Tasks Elevation of Privilege … |
Microsoft |
Windows 11 Version 24H2 |
2026-01-13T17:57:10.464Z | 2026-02-26T15:04:18.056Z |
| CVE-2026-21268 |
8.6 (3.1)
|
Dreamweaver Desktop | Improper Input Validation (CWE-20) |
Adobe |
Dreamweaver Desktop |
2026-01-13T18:25:34.136Z | 2026-02-26T15:04:17.742Z |
| CVE-2026-0106 |
9.3 (3.1)
|
In vpu_mmap of vpu_ioctl, there is a possible arb… |
Google |
Android |
2026-02-05T20:19:20.588Z | 2026-02-26T15:04:17.593Z |
| CVE-2026-21272 |
8.6 (3.1)
|
Dreamweaver Desktop | Improper Input Validation (CWE-20) |
Adobe |
Dreamweaver Desktop |
2026-01-13T18:25:34.935Z | 2026-02-26T15:04:17.424Z |
| CVE-2026-21274 |
7.8 (3.1)
|
Dreamweaver Desktop | Incorrect Authorization (CWE-863) |
Adobe |
Dreamweaver Desktop |
2026-01-13T18:25:35.669Z | 2026-02-26T15:04:17.051Z |
| CVE-2026-21271 |
8.6 (3.1)
|
Dreamweaver Desktop | Improper Input Validation (CWE-20) |
Adobe |
Dreamweaver Desktop |
2026-01-13T18:25:36.417Z | 2026-02-26T15:04:16.780Z |
| CVE-2025-15566 |
8.8 (3.1)
|
ingress-nginx auth-proxy-set-headers nginx configurati… |
Kubernetes |
ingress-nginx |
2026-02-06T03:13:51.717Z | 2026-02-26T15:04:16.591Z |
| CVE-2026-21267 |
8.6 (3.1)
|
Dreamweaver Desktop | Improper Neutralization of Speci… |
Adobe |
Dreamweaver Desktop |
2026-01-13T18:25:37.183Z | 2026-02-26T15:04:16.463Z |
| CVE-2026-21643 |
9.1 (3.1)
|
An improper neutralization of special elements us… |
Fortinet |
FortiClientEMS |
2026-02-06T08:24:43.877Z | 2026-02-26T15:04:16.332Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2650 |
8.8 (3.1)
|
Heap buffer overflow in Media in Google Chrome pr… |
Google |
Chrome |
2026-02-18T21:39:04.464Z | 2026-02-26T14:44:15.157Z |
| CVE-2026-24126 |
6.6 (3.1)
|
Weblate has an argument injection in management console |
WeblateOrg |
weblate |
2026-02-18T23:05:03.478Z | 2026-02-19T17:13:53.353Z |
| CVE-2025-67683 |
5.1 (4.0)
|
Reflected XSS in Quick.Cart |
OpenSolution |
Quick.Cart |
2026-01-22T11:57:24.067Z | 2026-01-22T21:17:30.272Z |
| CVE-2025-67684 |
9.4 (4.0)
|
Remote Code Execution via Local File Inclusion in Quick.Cart |
OpenSolution |
Quick.Cart |
2026-01-22T11:57:28.806Z | 2026-01-22T20:36:55.360Z |
| CVE-2026-25926 |
7.3 (3.1)
|
Notepad++ has an Untrusted Search Path |
notepad-plus-plus |
notepad-plus-plus |
2026-02-18T23:07:36.383Z | 2026-02-19T17:45:27.028Z |
| CVE-2026-23796 |
4.8 (4.0)
|
Session Fixation in Quick.Cart |
OpenSolution |
Quick.Cart |
2026-02-05T11:07:59.954Z | 2026-02-05T14:19:55.348Z |
| CVE-2026-24764 |
3.7 (3.1)
|
OpenClaw has Remote Code Execution via System Prompt I… |
clawdbot |
clawdbot |
2026-02-19T01:10:17.540Z | 2026-02-19T17:45:16.959Z |
| CVE-2026-23797 |
6.9 (4.0)
|
Plaintext password display in Quick.Cart |
OpenSolution |
Quick.Cart |
2026-02-05T11:07:55.241Z | 2026-02-05T14:29:00.428Z |
| CVE-2026-22860 |
7.5 (3.1)
|
Rack has a Directory Traversal via Rack:Directory |
rack |
rack |
2026-02-18T18:45:02.095Z | 2026-02-18T19:28:38.445Z |
| CVE-2026-25500 |
5.4 (3.1)
|
Rack's Stored XSS in Rack::Directory via javascript: f… |
rack |
rack |
2026-02-18T18:59:31.964Z | 2026-02-18T19:42:35.101Z |
| CVE-2026-25473 |
5.4 (3.1)
|
WordPress WZone plugin <= 14.0.31 - Broken Access Cont… |
AA-Team |
WZone |
2026-02-19T08:27:09.151Z | 2026-02-19T16:56:05.907Z |
| CVE-2026-25441 |
5.3 (3.1)
|
WordPress LeadConnector plugin <= 3.0.21 - Broken Acce… |
LeadConnector |
LeadConnector |
2026-02-19T08:27:08.043Z | 2026-02-19T17:00:22.990Z |
| CVE-2026-25428 |
4.4 (3.1)
|
WordPress TS Poll plugin <= 2.5.5 - Server Side Reques… |
totalsoft |
TS Poll |
2026-02-19T08:27:07.662Z | 2026-02-19T17:04:22.215Z |
| CVE-2026-0106 |
9.3 (3.1)
|
In vpu_mmap of vpu_ioctl, there is a possible arb… |
Google |
Android |
2026-02-05T20:19:20.588Z | 2026-02-26T15:04:17.593Z |
| CVE-2025-70828 |
8.8 (3.1)
|
An issue in Datart v1.0.0-rc.3 allows attackers t… |
n/a |
n/a |
2026-02-17T00:00:00.000Z | 2026-02-19T17:47:20.507Z |
| CVE-2025-70397 |
7.2 (3.1)
|
jizhicms 2.5.6 is vulnerable to SQL Injection in … |
n/a |
n/a |
2026-02-17T00:00:00.000Z | 2026-02-19T17:24:23.597Z |
| CVE-2026-24935 |
6.3 (4.0)
|
An improper certificate validation vulnerability was f… |
ASUSTOR |
ADM |
2026-02-03T02:28:56.413Z | 2026-02-03T15:30:54.564Z |
| CVE-2026-24934 |
6.3 (4.0)
|
An improper certificate validation vulnerability was f… |
ASUSTOR |
ADM |
2026-02-03T02:26:55.995Z | 2026-02-03T15:31:00.835Z |
| CVE-2026-24933 |
8.9 (4.0)
|
An improper certificate validation vulnerability was f… |
ASUSTOR |
ADM |
2026-02-03T02:22:01.943Z | 2026-02-03T15:31:09.436Z |
| CVE-2026-24932 |
8.9 (4.0)
|
An improper certificate validation vulnerability was f… |
ASUSTOR |
ADM |
2026-02-03T02:19:41.915Z | 2026-02-03T15:31:15.303Z |
| CVE-2020-37165 |
6.7 (4.0)
6.2 (3.1)
|
AbsoluteTelnet 11.12 - "license name" Denial of Service |
Celestial Software |
AbsoluteTelnet |
2026-02-06T23:14:12.517Z | 2026-02-17T16:55:13.150Z |
| CVE-2026-25760 |
6.5 (3.1)
|
Website Path Traversal / Arbitrary File Read (Authenti… |
BishopFox |
sliver |
2026-02-06T21:32:27.276Z | 2026-02-09T15:26:46.263Z |
| CVE-2026-25758 |
7.7 (4.0)
|
Spree allows unauthenticated users can access all gues… |
spree |
spree |
2026-02-06T21:29:20.846Z | 2026-02-09T15:26:51.129Z |
| CVE-2026-25634 |
7.8 (3.1)
|
iccDEV memcpy-param-overlap in CIccTagMultiProcessElem… |
InternationalColorConsortium |
iccDEV |
2026-02-06T20:21:40.108Z | 2026-02-06T20:53:17.123Z |
| CVE-2026-25631 |
5.3 (4.0)
|
Domain allowlist bypass enables credential exfiltration |
n8n-io |
n8n |
2026-02-06T20:34:53.650Z | 2026-02-06T21:08:06.638Z |
| CVE-2026-21349 |
7.8 (3.1)
|
Lightroom Desktop | Out-of-bounds Write (CWE-787) |
Adobe |
Lightroom Desktop |
2026-02-10T19:43:23.584Z | 2026-02-26T14:44:28.867Z |
| CVE-2026-25628 |
8.6 (3.1)
|
Qdrant affected by arbitrary file write via `/logger` … |
qdrant |
qdrant |
2026-02-06T20:44:13.487Z | 2026-02-06T21:11:27.721Z |
| CVE-2024-23329 |
3.7 (3.1)
|
changedetection.io API endpoint is not secured with AP… |
dgtlmoon |
changedetection.io |
2024-01-19T19:49:54.624Z | 2024-11-13T17:15:21.418Z |
| CVE-2023-24769 |
5.4 (3.1)
|
Changedetection.io before v0.40.1.1 was discovere… |
n/a |
n/a |
2023-02-17T00:00:00.000Z | 2025-03-18T15:53:35.859Z |
| CVE-2026-24936 |
9.5 (4.0)
|
An improper input validation vulnerability was found i… |
ASUSTOR |
ADM |
2026-02-03T03:50:18.773Z | 2026-02-04T16:12:51.388Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2650 | Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to… | 2026-02-18T22:16:26.980 | 2026-02-19T18:35:11.697 |
| fkie_cve-2026-24126 | Weblate is a web based localization tool. Prior to 5.16.0, the SSH management console did not valid… | 2026-02-19T00:16:21.483 | 2026-02-19T18:34:57.413 |
| fkie_cve-2025-67683 | Quick.Cart is vulnerable to reflected XSS via the sSort parameter. An attacker can craft a maliciou… | 2026-01-22T12:15:55.260 | 2026-02-19T18:33:51.230 |
| fkie_cve-2025-67684 | Quick.Cart is vulnerable to Local File Inclusion and Path Traversal issues in the theme selection m… | 2026-01-22T12:15:55.417 | 2026-02-19T18:33:15.860 |
| fkie_cve-2026-25926 | Notepad++ is a free and open-source source code editor. An Unsafe Search Path vulnerability (CWE-42… | 2026-02-19T00:16:21.787 | 2026-02-19T18:32:34.863 |
| fkie_cve-2026-23796 | Quick.Cart allows a user's session identifier to be set before authentication. The value of this se… | 2026-02-05T12:16:01.743 | 2026-02-19T18:31:45.827 |
| fkie_cve-2026-24764 | OpenClaw (formerly Clawdbot) is a personal AI assistant users run on their own devices. In versions… | 2026-02-19T07:17:44.957 | 2026-02-19T18:30:39.867 |
| fkie_cve-2026-23797 | In Quick.Cart user passwords are stored in plaintext form. An attacker with high privileges can dis… | 2026-02-05T12:16:01.897 | 2026-02-19T18:30:15.370 |
| fkie_cve-2026-22860 | Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Di… | 2026-02-18T19:21:43.933 | 2026-02-19T18:27:09.117 |
| fkie_cve-2026-25500 | Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Di… | 2026-02-18T20:18:36.110 | 2026-02-19T18:26:27.523 |
| fkie_cve-2026-25473 | Missing Authorization vulnerability in AA-Team WZone woozone allows Exploiting Incorrectly Configur… | 2026-02-19T09:16:25.273 | 2026-02-19T18:24:58.897 |
| fkie_cve-2026-25441 | Missing Authorization vulnerability in LeadConnector LeadConnector leadconnector allows Exploiting … | 2026-02-19T09:16:24.440 | 2026-02-19T18:24:58.717 |
| fkie_cve-2026-25428 | Server-Side Request Forgery (SSRF) vulnerability in totalsoft TS Poll poll-wp allows Server Side Re… | 2026-02-19T09:16:24.163 | 2026-02-19T18:24:58.543 |
| fkie_cve-2026-0106 | In vpu_mmap of vpu_ioctl, there is a possible arbitrary address mmap due to a missing bounds check.… | 2026-02-05T21:15:52.597 | 2026-02-19T18:24:53.930 |
| fkie_cve-2025-70828 | An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via the url parameter in … | 2026-02-17T16:20:25.577 | 2026-02-19T18:24:53.683 |
| fkie_cve-2025-70397 | jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the d… | 2026-02-17T16:20:25.467 | 2026-02-19T18:24:53.093 |
| fkie_cve-2026-24935 | A third-party NAT traversal module fails to validate SSL/TLS certificates when connecting to the si… | 2026-02-03T03:15:53.507 | 2026-02-19T18:19:51.097 |
| fkie_cve-2026-24934 | The DDNS function uses an insecure HTTP connection or fails to validate the SSL/TLS certificate whe… | 2026-02-03T03:15:53.383 | 2026-02-19T18:18:18.590 |
| fkie_cve-2026-24933 | The API communication component fails to validate the SSL/TLS certificate when sending HTTPS reques… | 2026-02-03T03:15:53.240 | 2026-02-19T18:17:38.983 |
| fkie_cve-2026-24932 | The DDNS update function in ADM fails to properly validate the hostname of the DDNS server's TLS/SS… | 2026-02-03T03:15:53.080 | 2026-02-19T18:16:57.583 |
| fkie_cve-2020-37165 | AbsoluteTelnet 11.12 contains a denial of service vulnerability that allows local attackers to cras… | 2026-02-07T00:15:56.953 | 2026-02-19T18:11:38.037 |
| fkie_cve-2026-25760 | Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to 1.6.11, a… | 2026-02-06T22:16:12.277 | 2026-02-19T18:02:59.793 |
| fkie_cve-2026-25758 | Spree is an open source e-commerce solution built with Ruby on Rails. A critical IDOR vulnerability… | 2026-02-06T22:16:12.133 | 2026-02-19T18:01:26.760 |
| fkie_cve-2026-25634 | iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and appl… | 2026-02-06T21:16:18.530 | 2026-02-19T17:55:29.617 |
| fkie_cve-2026-25631 | n8n is an open source workflow automation platform. Prior to 1.121.0, there is a vulnerability in t… | 2026-02-06T21:16:18.230 | 2026-02-19T17:51:02.697 |
| fkie_cve-2026-21349 | Lightroom Desktop versions 15.1 and earlier are affected by an out-of-bounds write vulnerability th… | 2026-02-10T20:16:55.590 | 2026-02-19T17:50:30.293 |
| fkie_cve-2026-25628 | Qdrant is a vector similarity search engine and vector database. From 1.9.3 to before 1.16.0, it is… | 2026-02-06T21:16:18.083 | 2026-02-19T17:45:58.093 |
| fkie_cve-2024-23329 | changedetection.io is an open source tool designed to monitor websites for content changes. In aff… | 2024-01-19T20:15:13.827 | 2026-02-19T17:44:46.277 |
| fkie_cve-2023-24769 | Changedetection.io before v0.40.1.1 was discovered to contain a stored cross-site scripting (XSS) v… | 2023-02-17T22:15:14.407 | 2026-02-19T17:44:46.277 |
| fkie_cve-2026-24936 | When a specific function is enabled while joining a AD Domain from ADM, an improper input parameter… | 2026-02-03T04:15:56.357 | 2026-02-19T17:39:07.473 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-88xm-3gm8-p46c |
6.0 (3.1)
6.7 (4.0)
|
Loop with unreachable exit condition ('infinite loop') for some Intel(R) Platform within Ring 0: Ke… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-825g-7fc6-x78h |
4.4 (3.1)
5.6 (4.0)
|
Out-of-bounds read for some TDX before version tdx module 1.5.24 within Ring 0: Hypervisor may allo… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-7qxp-c5wr-2c8j |
6.7 (3.1)
5.4 (4.0)
|
Incorrect default permissions for some Intel(R) Chipset Software before version 10.1.20266.8668 or … | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-7crr-fmh8-7463 |
6.5 (3.1)
6.8 (4.0)
|
Improper authorization in the Intel(R) Quick Assist Technology for some Intel(R) Platforms within R… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-599r-v5wv-mv2j |
6.7 (3.1)
5.4 (4.0)
|
Incorrect permission assignment for critical resource for some System Firmware Update Utility (SysF… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-556f-j5x6-83x8 |
6.7 (3.1)
5.4 (4.0)
|
Insecure inherited permissions for some Intel(R) Graphics Software before version 25.30.1702.0 with… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-3hfp-x6f5-mjw5 |
6.7 (3.1)
5.4 (4.0)
|
Incorrect default permissions for some Intel(R) Memory and Storage Tool before version 2.5.2 within… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-3636-c8rc-p2rf |
6.7 (3.1)
5.4 (4.0)
|
Incorrect default permissions for some Intel(R) Battery Life Diagnostic Tool within Ring 3: User Ap… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-2xw2-f246-g27c |
7.9 (3.1)
7.0 (4.0)
|
Missing protection mechanism for alternate hardware interface in the Intel(R) Quick Assist Technolo… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-2fhx-5jj5-pjhv |
3.3 (3.1)
2.0 (4.0)
|
Improper conditions check in some firmware for some Intel(R) NPU Drivers within Ring 3: User Applic… | 2026-02-10T18:30:40Z | 2026-02-10T18:30:40Z |
| ghsa-qjv2-cr97-hmw3 |
6.7 (3.1)
5.4 (4.0)
|
Incorrect default permissions for the Intel(R) Optane(TM) PMem management software before versions … | 2026-02-10T18:30:39Z | 2026-02-10T18:30:39Z |
| ghsa-pw96-688c-5hrv |
6.0 (3.1)
6.7 (4.0)
|
Uncaught exception in the firmware for some 100GbE Intel(R) Ethernet Controller E810 before version… | 2026-02-10T18:30:39Z | 2026-02-10T18:30:39Z |
| ghsa-p2r3-58qh-phf8 |
8.1 (3.1)
|
An Authentication Bypass by Primary Weakness vulnerability [CWE-305] vulnerability in Fortinet Fort… | 2026-02-10T18:30:39Z | 2026-02-10T18:30:39Z |
| ghsa-h262-6rwr-phf2 |
6.7 (3.1)
5.4 (4.0)
|
Uncontrolled search path in some software installer for some VTune(TM) Profiler software and Intel(… | 2026-02-10T18:30:39Z | 2026-02-10T18:30:39Z |
| ghsa-gx58-3j86-r6j6 |
7.5 (3.1)
7.1 (4.0)
|
Improper input validation for some Server Firmware Update Utility(SysFwUpdt) before version 16.0.12… | 2026-02-10T18:30:39Z | 2026-02-10T18:30:39Z |
| ghsa-gq25-2cxw-wfmp |
5.3 (3.1)
5.6 (4.0)
|
Exposed ioctl with insufficient access control in the firmware for some Intel(R) Ethernet Connectio… | 2026-02-10T18:30:39Z | 2026-02-10T18:30:39Z |
| ghsa-frvm-h4ch-rwjr |
4.7 (3.1)
5.7 (4.0)
|
Improper buffer restrictions in the firmware for the TDX Module may allow an escalation of privileg… | 2026-02-10T18:30:39Z | 2026-02-10T18:30:39Z |
| ghsa-95x2-9xvr-3xpw |
6.0 (3.1)
6.7 (4.0)
|
Out-of-bounds write in the firmware for some Intel(R) Ethernet Controller E810 before version cvl f… | 2026-02-10T18:30:39Z | 2026-02-10T18:30:39Z |
| ghsa-7pp5-9g38-33w2 |
8.2 (3.1)
7.1 (4.0)
|
Improper input validation for some Server Firmware Update Utility(SysFwUpdt) before version 16.0.12… | 2026-02-10T18:30:39Z | 2026-02-10T18:30:39Z |
| ghsa-4c4h-qr43-f924 |
6.8 (3.1)
8.2 (4.0)
|
Null pointer dereference in the firmware for some Intel(R) AMT and Intel(R) Standard Manageability … | 2026-02-10T18:30:39Z | 2026-02-10T18:30:39Z |
| ghsa-49jr-g5j4-39j9 |
3.3 (3.1)
2.0 (4.0)
|
Improper initialization for some ESXi kernel mode driver for the Intel(R) Ethernet 800-Series befor… | 2026-02-10T18:30:39Z | 2026-02-10T18:30:39Z |
| ghsa-3vj6-jfr6-4cf4 |
6.7 (3.1)
5.4 (4.0)
|
Improper conditions check for the Intel(R) Optane(TM) PMem management software before versions CR_M… | 2026-02-10T18:30:39Z | 2026-02-10T18:30:39Z |
| ghsa-wh95-q2jr-gp4h |
6.5 (3.1)
|
SQL injection in Ivanti Endpoint Manager before version 2024 SU5 allows a remote authenticated atta… | 2026-02-10T18:30:38Z | 2026-02-10T18:30:38Z |
| ghsa-gq6x-9gv4-v98h |
6.7 (3.1)
|
A use of externally-controlled format string vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4,… | 2026-02-10T18:30:38Z | 2026-02-10T18:30:38Z |
| ghsa-8cg4-rqg8-pcg3 |
7.1 (3.1)
|
An Improper Link Resolution Before File Access ('Link Following') vulnerability [CWE-59] vulnerabil… | 2026-02-10T18:30:38Z | 2026-02-10T18:30:38Z |
| ghsa-839g-m33x-3w78 |
5.9 (3.1)
|
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability [CWE-200] vulnerability… | 2026-02-10T18:30:38Z | 2026-02-10T18:30:38Z |
| ghsa-73jp-396j-hc6q |
7.2 (3.1)
|
A missing authorization vulnerability in Fortinet FortiAuthenticator 6.6.0 through 6.6.6, FortiAuth… | 2026-02-10T18:30:38Z | 2026-02-10T18:30:38Z |
| ghsa-2j3g-j6qj-x9q2 |
8.6 (3.1)
|
An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthe… | 2026-02-10T18:30:38Z | 2026-02-10T18:30:38Z |
| ghsa-chwm-wv7v-hv3q |
8.8 (3.1)
|
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerabili… | 2026-02-10T18:30:37Z | 2026-02-10T18:30:37Z |
| ghsa-7hxv-xg9w-4xg7 |
5.8 (3.1)
|
An inconsistent interpretation of http requests ('http request smuggling') vulnerability in Fortine… | 2026-02-10T18:30:37Z | 2026-02-10T18:30:37Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-29892 | ZITADEL, open source authentication management software, uses Go templates to render the … | 2024-04-03T05:02:30.741746Z |
| gsd-2024-29824 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.740990Z |
| gsd-2024-29939 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.740056Z |
| gsd-2024-29961 | A vulnerability affects Brocade SANnav before v2.3.1 and v2.3.0a. It allows a Brocade SAN… | 2024-04-03T05:02:30.737345Z |
| gsd-2024-29984 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability | 2024-04-03T05:02:30.737126Z |
| gsd-2024-29926 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.736021Z |
| gsd-2024-29899 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.733799Z |
| gsd-2024-29990 | Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability | 2024-04-03T05:02:30.733009Z |
| gsd-2024-29989 | Azure Monitor Agent Elevation of Privilege Vulnerability | 2024-04-03T05:02:30.730902Z |
| gsd-2024-29846 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.730702Z |
| gsd-2024-29996 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.730491Z |
| gsd-2024-29998 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.728561Z |
| gsd-2024-29855 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.728364Z |
| gsd-2024-29908 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.726795Z |
| gsd-2024-29919 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.725359Z |
| gsd-2024-29881 | TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability w… | 2024-04-03T05:02:30.724611Z |
| gsd-2024-29870 | SQL injection vulnerability in Sentrifugo 3.2, through /sentrifugo/index.php/index/getdep… | 2024-04-03T05:02:30.723535Z |
| gsd-2024-29921 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.722564Z |
| gsd-2024-29839 | The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains… | 2024-04-03T05:02:30.721086Z |
| gsd-2024-29822 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.719871Z |
| gsd-2024-29876 | SQL injection vulnerability in Sentrifugo 3.2, through /sentrifugo/index.php/reports/ac… | 2024-04-03T05:02:30.719066Z |
| gsd-2024-29912 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.717171Z |
| gsd-2024-29830 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.714531Z |
| gsd-2024-29896 | Astro-Shield is a library to compute the subresource integrity hashes for your JS scripts… | 2024-04-03T05:02:30.712780Z |
| gsd-2024-29975 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.709962Z |
| gsd-2024-29987 | Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | 2024-04-03T05:02:30.709277Z |
| gsd-2024-29997 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.707586Z |
| gsd-2024-29957 | When Brocade SANnav before v2.3.1 and v2.3.0a servers are configured in Disaster Recovery… | 2024-04-03T05:02:30.707389Z |
| gsd-2024-29947 | There is a NULL dereference pointer vulnerability in some Hikvision NVRs. Due to an insuf… | 2024-04-03T05:02:30.705851Z |
| gsd-2024-29864 | Distrobox before 1.7.0.1 allows attackers to execute arbitrary code via command injection… | 2024-04-03T05:02:30.703261Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-192287 | Malicious code in elf-stats-twinkling-ribbon-344 (npm) | 2025-12-03T19:36:04Z | 2025-12-05T20:41:17Z |
| mal-2025-192296 | Malicious code in beep-types (npm) | 2025-12-04T07:15:49Z | 2025-12-05T20:41:16Z |
| mal-2025-192305 | Malicious code in dell-recovery (PyPI) | 2025-12-04T22:01:57Z | 2025-12-04T22:01:57Z |
| mal-2025-192306 | Malicious code in dell-restore-system (PyPI) | 2025-12-04T21:59:37Z | 2025-12-04T21:59:37Z |
| mal-2025-192302 | Malicious code in coremsft (PyPI) | 2025-12-04T12:39:04Z | 2025-12-04T15:10:43Z |
| mal-2025-192117 | Malicious code in elf-stats-piney-icicle-501 (npm) | 2025-12-03T15:59:29Z | 2025-12-04T10:25:39Z |
| mal-2025-192052 | Malicious code in elf-stats-ginger-icicle-707 (npm) | 2025-12-03T15:59:29Z | 2025-12-04T10:25:39Z |
| mal-2025-191995 | Malicious code in elf-stats-candlelit-reindeer-881 (npm) | 2025-12-03T15:59:29Z | 2025-12-04T09:25:56Z |
| mal-2025-192222 | Malicious code in elf-stats-mulled-stocking-538 (npm) | 2025-12-03T17:22:10Z | 2025-12-04T08:26:39Z |
| mal-2025-192259 | Malicious code in unified11 (npm) | 2025-12-03T18:25:39Z | 2025-12-04T07:25:06Z |
| mal-2025-192254 | Malicious code in unified10 (npm) | 2025-12-03T18:06:52Z | 2025-12-04T07:25:06Z |
| mal-2025-192253 | Malicious code in remark-stringify10 (npm) | 2025-12-03T17:50:51Z | 2025-12-04T07:25:05Z |
| mal-2025-192246 | Malicious code in remark-parse10 (npm) | 2025-12-03T17:35:41Z | 2025-12-04T07:25:05Z |
| mal-2025-192245 | Malicious code in remark-mdx2.3 (npm) | 2025-12-03T17:31:24Z | 2025-12-04T07:25:05Z |
| mal-2025-192244 | Malicious code in hast-util-to-mdast9 (npm) | 2025-12-03T17:15:49Z | 2025-12-04T07:25:03Z |
| mal-2025-192122 | Malicious code in elf-stats-rooftop-giftbox-464 (npm) | 2025-12-03T13:38:44Z | 2025-12-04T00:29:22Z |
| mal-2025-192078 | Malicious code in elf-stats-lanternlit-sled-571 (npm) | 2025-12-03T13:27:37Z | 2025-12-04T00:29:22Z |
| mal-2025-192284 | Malicious code in elf-stats-sprucey-fireplace-355 (npm) | 2025-12-03T19:45:17Z | 2025-12-03T20:10:12Z |
| mal-2025-192274 | Malicious code in elf-stats-mulled-nightcap-782 (npm) | 2025-12-03T19:35:48Z | 2025-12-03T20:10:12Z |
| mal-2025-192268 | Malicious code in elf-stats-snowdusted-stockpile-595 (npm) | 2025-12-03T19:05:41Z | 2025-12-03T19:37:58Z |
| mal-2025-192261 | Malicious code in elf-stats-jolly-workshop-110 (npm) | 2025-12-03T18:59:26Z | 2025-12-03T19:37:58Z |
| mal-2025-192277 | Malicious code in elf-stats-sugarplum-ribbon-151 (npm) | 2025-12-03T19:19:14Z | 2025-12-03T19:19:14Z |
| mal-2025-192257 | Malicious code in elf-stats-midnight-saddlebag-720 (npm) | 2025-12-03T18:40:37Z | 2025-12-03T19:09:03Z |
| mal-2025-192255 | Malicious code in elf-stats-festive-workshop-566 (npm) | 2025-12-03T18:43:29Z | 2025-12-03T19:09:03Z |
| mal-2025-192269 | Malicious code in elf-stats-snowdusted-train-837 (npm) | 2025-12-03T18:48:03Z | 2025-12-03T18:48:03Z |
| mal-2025-192262 | Malicious code in elf-stats-joyous-hollyberry-121 (npm) | 2025-12-03T18:48:03Z | 2025-12-03T18:48:03Z |
| mal-2025-192258 | Malicious code in stats-engine (npm) | 2025-12-03T18:12:57Z | 2025-12-03T18:12:57Z |
| mal-2025-192225 | Malicious code in elf-stats-nutmeg-stockpile-999 (npm) | 2025-12-03T17:28:13Z | 2025-12-03T18:11:50Z |
| mal-2025-192249 | Malicious code in elf-stats-shimmering-muffin-598 (npm) | 2025-12-03T17:55:47Z | 2025-12-03T17:55:47Z |
| mal-2025-192250 | Malicious code in elf-stats-shimmering-workbench-301 (npm) | 2025-12-03T17:53:05Z | 2025-12-03T17:53:05Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0851 | OpenText Enterprise Security Manager: Schwachstelle ermöglicht Darstellen falscher Informationen | 2025-04-21T22:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| wid-sec-w-2025-0850 | IBM Power Hardware Management Console: Mehrere Schwachstellen | 2025-04-21T22:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| wid-sec-w-2025-0800 | Mozilla Firefox: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-04-15T22:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| wid-sec-w-2025-0594 | Progress Software MOVEit: Schwachstelle ermöglicht Privilegieneskalation | 2025-03-19T23:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| wid-sec-w-2025-0419 | Erlang/OTP: Schwachstelle ermöglicht Denial of Service | 2025-02-20T23:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| wid-sec-w-2025-0256 | Xerox WorkCentre / Phaser: Mehrere Schwachstellen | 2025-02-03T23:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| wid-sec-w-2024-0034 | OpenSSL: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-01-09T23:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| wid-sec-w-2023-2357 | shadow: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-09-14T22:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| wid-sec-w-2025-0848 | xwiki: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-04-16T22:00:00.000+00:00 | 2025-04-16T22:00:00.000+00:00 |
| wid-sec-w-2025-0847 | Drupal Plugins Mehrere Schwachstellen | 2025-04-16T22:00:00.000+00:00 | 2025-04-16T22:00:00.000+00:00 |
| wid-sec-w-2025-0846 | Apple iOS, iPadOS und macOS: Mehrere Schwachstellen | 2025-04-16T22:00:00.000+00:00 | 2025-04-16T22:00:00.000+00:00 |
| wid-sec-w-2025-0845 | Cisco Nexus Dashboard: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-04-16T22:00:00.000+00:00 | 2025-04-16T22:00:00.000+00:00 |
| wid-sec-w-2025-0843 | Cisco WebEx App: Schwachstelle ermöglicht Codeausführung | 2025-04-16T22:00:00.000+00:00 | 2025-04-16T22:00:00.000+00:00 |
| wid-sec-w-2025-0840 | Microsoft Power Automate Desktop: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-04-16T22:00:00.000+00:00 | 2025-04-16T22:00:00.000+00:00 |
| wid-sec-w-2025-0839 | PyTorch: Schwachstelle ermöglicht Denial of Service | 2025-04-16T22:00:00.000+00:00 | 2025-04-16T22:00:00.000+00:00 |
| wid-sec-w-2025-0578 | Mattermost Plugins: Schwachstelle ermöglicht Offenlegung von Daten | 2025-03-17T23:00:00.000+00:00 | 2025-04-16T22:00:00.000+00:00 |
| wid-sec-w-2025-0408 | vim: Schwachstelle ermöglicht Manipulation von Dateien | 2025-02-18T23:00:00.000+00:00 | 2025-04-16T22:00:00.000+00:00 |
| wid-sec-w-2025-0040 | Red Hat Enterprise Linux (dpdk): Schwachstelle ermöglicht Denial of Service | 2025-01-09T23:00:00.000+00:00 | 2025-04-16T22:00:00.000+00:00 |
| wid-sec-w-2023-2719 | PHP: Mehrere Schwachstellen | 2017-06-18T22:00:00.000+00:00 | 2025-04-16T22:00:00.000+00:00 |
| wid-sec-w-2023-1970 | PHP: Mehrere Schwachstellen | 2023-08-06T22:00:00.000+00:00 | 2025-04-16T22:00:00.000+00:00 |
| wid-sec-w-2023-0383 | PHP: Mehrere Schwachstellen | 2023-02-14T23:00:00.000+00:00 | 2025-04-16T22:00:00.000+00:00 |
| wid-sec-w-2022-1613 | git: Mehrere Schwachstellen | 2019-12-10T23:00:00.000+00:00 | 2025-04-16T22:00:00.000+00:00 |
| wid-sec-w-2025-0835 | Atlassian Jira: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-04-15T22:00:00.000+00:00 | 2025-04-15T22:00:00.000+00:00 |
| wid-sec-w-2025-0834 | ESRI ArcGIS: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2025-04-15T22:00:00.000+00:00 | 2025-04-15T22:00:00.000+00:00 |
| wid-sec-w-2025-0833 | Axis OS: Schwachstelle ermöglicht Denial of Service | 2025-04-15T22:00:00.000+00:00 | 2025-04-15T22:00:00.000+00:00 |
| wid-sec-w-2025-0832 | Autodesk AutoCAD und Civil 3D: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-04-15T22:00:00.000+00:00 | 2025-04-15T22:00:00.000+00:00 |
| wid-sec-w-2025-0829 | HCL BigFix: Mehrere Schwachstellen | 2025-04-15T22:00:00.000+00:00 | 2025-04-15T22:00:00.000+00:00 |
| wid-sec-w-2025-0827 | Oracle Secure Backup: Schwachstelle gefährdet Vertraulichkeit, Integrität und Verfügbarkeit | 2025-04-15T22:00:00.000+00:00 | 2025-04-15T22:00:00.000+00:00 |
| wid-sec-w-2025-0826 | Oracle TimesTen In-Memory Database: Mehrere Schwachstellen | 2025-04-15T22:00:00.000+00:00 | 2025-04-15T22:00:00.000+00:00 |
| wid-sec-w-2025-0825 | Oracle Commerce: Mehrere Schwachstellen | 2025-04-15T22:00:00.000+00:00 | 2025-04-15T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:10818 | Red Hat Security Advisory: OpenShift Container Platform 4.17.8 security update | 2024-12-11T01:09:03+00:00 | 2026-02-03T20:08:07+00:00 |
| rhsa-2024:10964 | Red Hat Security Advisory: ruby security update | 2024-12-11T17:18:57+00:00 | 2026-02-03T20:08:06+00:00 |
| rhsa-2024:10834 | Red Hat Security Advisory: ruby:3.1 security update | 2024-12-05T10:23:01+00:00 | 2026-02-03T20:08:06+00:00 |
| rhsa-2024:10806 | Red Hat Security Advisory: Satellite 6.15.5 Async Update | 2024-12-04T20:43:54+00:00 | 2026-02-03T20:08:05+00:00 |
| rhsa-2024:10777 | Red Hat Security Advisory: pcs security update | 2024-12-04T02:47:07+00:00 | 2026-02-03T20:08:05+00:00 |
| rhsa-2024:10860 | Red Hat Security Advisory: ruby:3.1 security update | 2024-12-05T16:33:52+00:00 | 2026-02-03T20:08:04+00:00 |
| rhsa-2024:10850 | Red Hat Security Advisory: ruby:2.5 security update | 2024-12-05T14:28:53+00:00 | 2026-02-03T20:08:04+00:00 |
| rhsa-2024:10858 | Red Hat Security Advisory: ruby security update | 2024-12-05T15:42:37+00:00 | 2026-02-03T20:08:03+00:00 |
| rhsa-2025:7085 | Red Hat Security Advisory: pcs security update | 2025-05-13T08:24:53+00:00 | 2026-02-03T20:07:57+00:00 |
| rhsa-2024:10869 | Red Hat Security Advisory: redis:7 security update | 2024-12-05T21:45:12+00:00 | 2026-02-03T20:07:56+00:00 |
| rhsa-2025:22284 | Red Hat Security Advisory: OpenShift Container Platform 4.13.62 bug fix and security update | 2025-12-05T00:05:11+00:00 | 2026-02-03T20:07:55+00:00 |
| rhsa-2025:19895 | Red Hat Security Advisory: OpenShift Container Platform 4.12.82 bug fix and security update | 2025-11-13T09:09:20+00:00 | 2026-02-03T20:07:54+00:00 |
| rhsa-2025:19314 | Red Hat Security Advisory: OpenShift Container Platform 4.17.43 bug fix and security update | 2025-11-05T11:57:29+00:00 | 2026-02-03T20:07:52+00:00 |
| rhsa-2025:19058 | Red Hat Security Advisory: OpenShift Container Platform 4.14.58 bug fix and security update | 2025-10-30T02:38:11+00:00 | 2026-02-03T20:07:52+00:00 |
| rhsa-2025:19047 | Red Hat Security Advisory: OpenShift Container Platform 4.18.27 bug fix and security update | 2025-10-29T08:31:22+00:00 | 2026-02-03T20:07:51+00:00 |
| rhsa-2025:19017 | Red Hat Security Advisory: OpenShift Container Platform 4.16.51 bug fix and security update | 2025-10-29T09:00:32+00:00 | 2026-02-03T20:07:49+00:00 |
| rhsa-2025:19003 | Red Hat Security Advisory: OpenShift Container Platform 4.20.1 bug fix and security update | 2025-10-30T03:02:15+00:00 | 2026-02-03T20:07:49+00:00 |
| rhsa-2025:18233 | Red Hat Security Advisory: OpenShift Container Platform 4.19.17 bug fix and security update | 2025-10-21T13:18:19+00:00 | 2026-02-03T20:07:48+00:00 |
| rhsa-2024:8179 | Red Hat Security Advisory: resource-agents security update | 2024-10-16T12:06:34+00:00 | 2026-02-03T20:07:44+00:00 |
| rhsa-2024:8173 | Red Hat Security Advisory: resource-agents security update | 2024-10-16T06:29:08+00:00 | 2026-02-03T20:07:44+00:00 |
| rhsa-2024:8172 | Red Hat Security Advisory: resource-agents security update | 2024-10-16T06:29:08+00:00 | 2026-02-03T20:07:43+00:00 |
| rhsa-2024:8171 | Red Hat Security Advisory: fence-agents security update | 2024-10-16T06:48:43+00:00 | 2026-02-03T20:07:43+00:00 |
| rhsa-2024:8170 | Red Hat Security Advisory: fence-agents security update | 2024-10-16T06:42:58+00:00 | 2026-02-03T20:07:43+00:00 |
| rhsa-2024:8168 | Red Hat Security Advisory: fence-agents security update | 2024-10-16T06:53:33+00:00 | 2026-02-03T20:07:43+00:00 |
| rhsa-2024:7374 | Red Hat Security Advisory: Security update for service-interconnect rhel9 container images | 2024-09-30T14:30:36+00:00 | 2026-02-03T20:07:42+00:00 |
| rhsa-2024:7213 | Red Hat Security Advisory: Updated service-interconnect rhel9 container images for 1.4 LTS | 2024-09-26T13:26:32+00:00 | 2026-02-03T20:07:41+00:00 |
| rhsa-2024:6907 | Red Hat Security Advisory: python-setuptools security update | 2024-09-23T01:52:45+00:00 | 2026-02-03T20:07:41+00:00 |
| rhsa-2024:6726 | Red Hat Security Advisory: fence-agents security update | 2024-09-17T13:07:27+00:00 | 2026-02-03T20:07:40+00:00 |
| rhsa-2024:6662 | Red Hat Security Advisory: python-setuptools security update | 2024-09-13T03:19:24+00:00 | 2026-02-03T20:07:38+00:00 |
| rhsa-2024:6661 | Red Hat Security Advisory: python3-setuptools security update | 2024-09-12T18:34:41+00:00 | 2026-02-03T20:07:38+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-32989 | Gnutls: vulnerability in gnutls sct extension parsing | 2025-07-02T00:00:00.000Z | 2026-02-18T01:05:35.000Z |
| msrc_cve-2020-25657 | A flaw was found in all released versions of m2crypto where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality. | 2021-01-02T00:00:00.000Z | 2026-02-18T01:05:28.000Z |
| msrc_cve-2024-26982 | Squashfs: check the inode number is not the invalid value of zero | 2024-05-02T07:00:00.000Z | 2026-02-18T01:05:24.000Z |
| msrc_cve-2024-57852 | firmware: qcom: scm: smc: Handle missing SCM device | 2025-02-02T00:00:00.000Z | 2026-02-18T01:05:01.000Z |
| msrc_cve-2024-28110 | Go SDK for CloudEvents's use of WithRoundTripper to create a Client leaks credentials | 2024-03-02T08:00:00.000Z | 2026-02-18T01:04:57.000Z |
| msrc_cve-2022-43552 | A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET curl would use a heap-allocated struct after it had been freed in its transfer shutdown code path. | 2023-02-01T00:00:00.000Z | 2026-02-18T01:04:52.000Z |
| msrc_cve-2016-9179 | It was found that Lynx doesn't parse the authority component of the URL correctly | 2016-12-02T00:00:00.000Z | 2026-02-18T01:04:48.000Z |
| msrc_cve-2025-4563 | Nodes can bypass dynamic resource allocation authorization checks | 2025-06-02T00:00:00.000Z | 2026-02-18T01:04:47.000Z |
| msrc_cve-2025-32988 | Gnutls: vulnerability in gnutls othername san export | 2025-07-02T00:00:00.000Z | 2026-02-18T01:04:33.000Z |
| msrc_cve-2024-46729 | drm/amd/display: Fix incorrect size calculation for loop | 2024-09-01T07:00:00.000Z | 2026-02-18T01:04:23.000Z |
| msrc_cve-1999-0817 | Lynx WWW client allows a remote attacker to specify command-line parameters which Lynx uses when calling external programs to handle certain protocols, e.g. telnet. | 2000-01-02T00:00:00.000Z | 2026-02-18T01:04:13.000Z |
| msrc_cve-2025-4598 | Systemd-coredump: race condition that allows a local attacker to crash a suid program and gain read access to the resulting core dump | 2025-05-02T00:00:00.000Z | 2026-02-18T01:04:10.000Z |
| msrc_cve-2024-53103 | hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer | 2024-12-02T00:00:00.000Z | 2026-02-18T01:04:03.000Z |
| msrc_cve-2025-25724 | list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale. | 2025-03-02T00:00:00.000Z | 2026-02-18T01:03:55.000Z |
| msrc_cve-2024-27289 | pgx SQL Injection via Line Comment Creation | 2024-03-02T08:00:00.000Z | 2026-02-18T01:03:52.000Z |
| msrc_cve-2022-33099 | An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs. | 2022-07-02T00:00:00.000Z | 2026-02-18T01:03:38.000Z |
| msrc_cve-2025-21753 | btrfs: fix use-after-free when attempting to join an aborted transaction | 2025-02-02T00:00:00.000Z | 2026-02-18T01:03:28.000Z |
| msrc_cve-2024-43863 | drm/vmwgfx: Fix a deadlock in dma buf fence polling | 2024-08-02T00:00:00.000Z | 2026-02-18T01:03:15.000Z |
| msrc_cve-2023-27537 | A double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate "handles". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks two threads sharing the same HSTS data could end up doing a double-free or use-after-free. | 2023-03-10T00:00:00.000Z | 2026-02-18T01:03:13.000Z |
| msrc_cve-2024-57850 | jffs2: Prevent rtime decompress memory corruption | 2025-01-02T00:00:00.000Z | 2026-02-18T01:03:01.000Z |
| msrc_cve-2024-27308 | Mio's tokens for named pipes may be delivered after deregistration | 2024-03-02T08:00:00.000Z | 2026-02-18T01:02:56.000Z |
| msrc_cve-2024-3567 | Qemu-kvm: net: assertion failure in update_sctp_checksum() | 2024-04-02T07:00:00.000Z | 2026-02-18T01:02:55.000Z |
| msrc_cve-2024-53156 | wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() | 2024-12-02T00:00:00.000Z | 2026-02-18T01:02:43.000Z |
| msrc_cve-2024-43873 | vhost/vsock: always initialize seqpacket_allow | 2024-08-02T00:00:00.000Z | 2026-02-18T01:02:41.000Z |
| msrc_cve-2021-40633 | A memory leak (out-of-memory) in gif2rgb in util/gif2rgb.c in giflib 5.1.4 allows remote attackers trigger an out of memory exception or denial of service via a gif format file. | 2022-06-02T00:00:00.000Z | 2026-02-18T01:02:37.000Z |
| msrc_cve-2024-49862 | powercap: intel_rapl: Fix off by one in get_rpi() | 2024-10-01T07:00:00.000Z | 2026-02-18T01:02:28.000Z |
| msrc_cve-2017-14867 | Git before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x before 2.13.6, and 2.14.x before 2.14.2 uses unsafe Perl scripts to support subcommands such as cvsserver, which allows attackers to execute arbitrary OS commands via shell metacharacters in a module name. The vulnerable code is reachable via git-shell even without CVS support. | 2017-09-02T00:00:00.000Z | 2026-02-18T01:02:28.000Z |
| msrc_cve-2022-28805 | singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code. | 2022-04-02T00:00:00.000Z | 2026-02-18T01:02:18.000Z |
| msrc_cve-2015-8472 | Buffer overflow in libpng allows remote attackers to cause a denial of service | 2016-01-02T00:00:00.000Z | 2026-02-18T01:02:08.000Z |
| msrc_cve-2021-26291 | block repositories using http by default | 2021-04-02T00:00:00.000Z | 2026-02-18T01:02:06.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202507-3676 | Vicon Industries specializes in the development and production of security and surveillan… | 2025-08-17T23:45:43.990000Z |
| var-202502-2912 | D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulne… | 2025-08-17T23:44:46.811000Z |
| var-202507-3600 | Sharp Technology (Shanghai) Co., Ltd. is a world-renowned developer and manufacturer of c… | 2025-08-17T23:44:45.559000Z |
| var-202506-3429 | D-Link DIR-823-Pro 1.02 has improper permission control, allowing unauthorized users to t… | 2025-08-17T23:44:11.033000Z |
| var-202506-3450 | An issue D-Link DIR-816-A2 DIR-816A2_FWv1.10CNB05_R1B011D88210 allows a remote attacker t… | 2025-08-17T23:44:11.012000Z |
| var-202507-3204 | ioLogik E1210 is an Ethernet I/O module that supports daisy chain topology and is mainly … | 2025-08-17T23:44:10.711000Z |
| var-202507-3351 | The D-Link DI-500WF is a panel-mounted wireless access point. The D-Link DI-500WF, manuf… | 2025-08-17T23:44:10.627000Z |
| var-202507-3435 | The UTT nv640E is an enterprise-class router. The UTT nv640E, manufactured by Shanghai A… | 2025-08-17T23:44:10.586000Z |
| var-202507-3603 | The Honeywell PM43 is an industrial-grade label printer. The Honeywell PM43 has a comman… | 2025-08-17T23:44:10.499000Z |
| var-202502-2111 | D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulne… | 2025-08-17T23:43:48.665000Z |
| var-202507-3915 | Shenzhen Jixiang Tengda Technology Co., Ltd. (Tenda) is a high-tech enterprise specializi… | 2025-08-17T23:43:47.139000Z |
| var-202508-0742 | Multiple relative path traversal vulnerabilities [CWE-23] in Fortinet FortiMail version 7… | 2025-08-17T23:41:41.748000Z |
| var-202508-1861 | The ioLogik E1210-T is an industrial Ethernet module. The ioLogik E1210-T from Mosa Tech… | 2025-08-17T23:40:47.078000Z |
| var-202507-3839 | Shenzhen Jixiang Tengda Technology Co., Ltd. (Tenda) is a high-tech enterprise specializi… | 2025-08-17T23:39:50.961000Z |
| var-202507-3601 | Shenzhen Jixiang Tengda Technology Co., Ltd. (Tenda) is a high-tech enterprise specializi… | 2025-08-17T23:37:49.436000Z |
| var-202507-3916 | The CH22 is a network device. The CH22 of Shenzhen Jixiang Tengda Technology Co., Ltd. h… | 2025-08-17T23:37:49.284000Z |
| var-202507-3674 | The BL-AC2100 is a Wi-Fi 6 wireless router. Shenzhen Bilian Electronics Co., Ltd.'s BL-A… | 2025-08-17T23:36:45.112000Z |
| var-202508-1860 | The H3C BR3000W is a WiFi 6 dual-band Gigabit wireless router designed for home and enter… | 2025-08-17T23:36:44.268000Z |
| var-202507-3675 | The Honeywell PD43 is an industrial-grade label printer. The Honeywell PD43, manufacture… | 2025-08-17T23:34:25.018000Z |
| var-202508-1859 | The MOXA ioLogik E1213 is an industrial-grade remote Ethernet I/O module. The MOXA ioLog… | 2025-08-17T23:34:24.195000Z |
| var-202301-0098 | Out-of-bounds write vulnerability in V-Server v4.0.12.0 and earlier allows a local attack… | 2025-08-17T23:31:57.855000Z |
| var-202301-0096 | Stack-based buffer overflow vulnerability in V-Server v4.0.12.0 and earlier allows a loca… | 2025-08-17T23:31:57.823000Z |
| var-202301-0097 | Out-of-bounds read vulnerability in V-Server v4.0.12.0 and earlier allows a local attacke… | 2025-08-17T23:31:57.792000Z |
| var-202506-1204 | A vulnerability has been found in HDF5 up to 1.14.6 and classified as critical. This vuln… | 2025-08-17T23:25:26.875000Z |
| var-202507-3838 | The D-Link DI-500WF is a panel-mounted wireless access point. The D-Link DI-500WF, manuf… | 2025-08-17T23:25:25.910000Z |
| var-202311-0455 | Multiple improper restriction of operations within the bounds of a memory buffer issues e… | 2025-08-17T23:23:18.841000Z |
| var-202311-0453 | Out-of-bounds read vulnerability exists in TELLUS V4.0.17.0 and earlier and TELLUS Lite V… | 2025-08-17T23:23:18.818000Z |
| var-202311-0456 | Multiple out-of-bounds read vulnerabilities exist in TELLUS Simulator V4.0.17.0 and earli… | 2025-08-17T23:23:18.791000Z |
| var-202507-3352 | The Dell 2350dn is a monochrome laser printer. A vulnerability exists in the Dell 2350dn… | 2025-08-17T23:23:14.909000Z |
| var-202507-3436 | SecFox operation and maintenance security management and audit system is an operation and… | 2025-08-17T23:23:14.866000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:0187-1 | Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) | 2025-01-18T02:03:58Z | 2025-01-18T02:03:58Z |
| suse-su-2025:0185-1 | Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4) | 2025-01-17T22:13:26Z | 2025-01-17T22:13:26Z |
| suse-su-2025:0180-1 | Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) | 2025-01-17T20:39:03Z | 2025-01-17T20:39:03Z |
| suse-su-2025:0181-1 | Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) | 2025-01-17T20:03:46Z | 2025-01-17T20:03:46Z |
| suse-su-2025:0179-1 | Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) | 2025-01-17T19:33:42Z | 2025-01-17T19:33:42Z |
| suse-su-2025:0173-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 2025-01-17T19:33:34Z | 2025-01-17T19:33:34Z |
| suse-su-2025:0177-1 | Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) | 2025-01-17T19:03:40Z | 2025-01-17T19:03:40Z |
| suse-su-2025:0172-1 | Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | 2025-01-17T17:33:30Z | 2025-01-17T17:33:30Z |
| suse-su-2025:0168-1 | Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) | 2025-01-17T17:03:49Z | 2025-01-17T17:03:49Z |
| suse-su-2025:0167-1 | Security update for pam_u2f | 2025-01-17T16:09:54Z | 2025-01-17T16:09:54Z |
| suse-su-2025:0166-1 | Security update for rsync | 2025-01-17T16:09:43Z | 2025-01-17T16:09:43Z |
| suse-su-2025:0165-1 | Security update for rsync | 2025-01-17T16:09:34Z | 2025-01-17T16:09:34Z |
| suse-su-2025:0164-1 | Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5) | 2025-01-17T15:33:32Z | 2025-01-17T15:33:32Z |
| suse-su-2025:0163-1 | Security update for redis | 2025-01-17T14:39:59Z | 2025-01-17T14:39:59Z |
| suse-su-2025:0162-1 | Security update for redis | 2025-01-17T14:39:47Z | 2025-01-17T14:39:47Z |
| suse-su-2025:0161-1 | Security update for redis7 | 2025-01-17T14:38:46Z | 2025-01-17T14:38:46Z |
| suse-su-2025:0160-1 | Security update for redis7 | 2025-01-17T14:38:37Z | 2025-01-17T14:38:37Z |
| suse-su-2025:0158-1 | Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) | 2025-01-17T12:33:51Z | 2025-01-17T12:33:51Z |
| suse-su-2025:0157-1 | Security update for rsync | 2025-01-17T11:59:43Z | 2025-01-17T11:59:43Z |
| suse-su-2025:0156-1 | Security update for rsync | 2025-01-17T11:59:08Z | 2025-01-17T11:59:08Z |
| suse-su-2025:0154-1 | Security update for the Linux Kernel | 2025-01-17T09:15:09Z | 2025-01-17T09:15:09Z |
| suse-su-2025:0153-1 | Security update for the Linux Kernel | 2025-01-17T09:14:12Z | 2025-01-17T09:14:12Z |
| suse-su-2025:0152-1 | Security update for the Linux Kernel | 2025-01-17T09:13:58Z | 2025-01-17T09:13:58Z |
| suse-su-2025:0150-1 | Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) | 2025-01-16T17:33:48Z | 2025-01-16T17:33:48Z |
| suse-su-2025:0149-1 | Security update for python-Django | 2025-01-16T17:03:39Z | 2025-01-16T17:03:39Z |
| suse-su-2025:0146-1 | Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | 2025-01-16T15:03:41Z | 2025-01-16T15:03:41Z |
| suse-ru-2025:0145-1 | Recommended update for bubblewrap, flatpak, wayland-protocols | 2025-01-16T14:27:33Z | 2025-01-16T14:27:33Z |
| suse-su-2025:0144-1 | Security update for git | 2025-01-16T13:30:18Z | 2025-01-16T13:30:18Z |
| suse-su-2025:0143-1 | Security update for apache2-mod_jk | 2025-01-16T13:25:32Z | 2025-01-16T13:25:32Z |
| suse-su-2025:0142-1 | Security update for xen | 2025-01-16T13:20:10Z | 2025-01-16T13:20:10Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:12646-1 | tmux-3.3a-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12645-1 | python310-ciscoconfparse-1.7.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12644-1 | xen-4.17.0_04-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12643-1 | libtiff-devel-32bit-4.5.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12642-1 | chromedriver-109.0.5414.119-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12641-1 | bind-9.18.11-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12640-1 | python3-virtualbox-7.0.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12639-1 | aws-efs-utils-1.34.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12638-1 | sudo-1.9.12p2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12637-1 | golang-github-prometheus-node_exporter-1.5.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12636-1 | ffmpeg-4-4.4.3-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12635-1 | apache2-2.4.55-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12634-1 | ruby3.1-rubygem-rack-2.2-2.2.6.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12633-1 | ruby3.1-rubygem-rack-3.0.4.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12632-1 | libgit2-1.5.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12631-1 | binutils-2.39-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12630-1 | EternalTerminal-6.2.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12629-1 | libtss2-esys0-3.2.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12628-1 | pdns-recursor-4.8.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12627-1 | libmozjs-102-0-102.7.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12626-1 | libzypp-plugin-appdata-1.0.1+git.20220816-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12625-1 | git-2.39.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12624-1 | ctags-5.8-12.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12623-1 | MozillaFirefox-109.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12622-1 | libwbxml2-1-0.11.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12621-1 | python310-mechanize-0.4.8-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12620-1 | libtree-sitter0-0.20.7-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12619-1 | redis-7.0.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12618-1 | mpd-0.23.12-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12617-1 | libXpm-devel-3.5.14-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-mariadb-2020-14789 | 2024-03-06T11:09:35.377Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2020-14776 | 2024-03-06T11:09:42.368Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2020-14765 | 2024-03-06T11:09:47.397Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2020-14550 | 2024-03-06T11:09:53.080Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9692 | 2024-03-06T11:02:18.569Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9691 | 2024-03-06T11:02:27.491Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9690 | 2024-03-06T11:02:37.502Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9689 | 2024-03-06T11:02:48.883Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9632 | 2024-03-06T11:03:02.861Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9631 | 2024-03-06T11:03:14.196Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9630 | 2024-03-06T11:03:25.974Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9591 | 2024-03-06T11:03:37.402Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9588 | 2024-03-06T11:03:48.494Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9587 | 2024-03-06T11:03:59.998Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9585 | 2024-03-06T11:04:10.009Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9584 | 2024-03-06T11:04:22.700Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9583 | 2024-03-06T11:04:33.560Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9582 | 2024-03-06T11:04:45.606Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9581 | 2024-03-06T11:04:57.604Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9580 | 2024-03-06T11:05:09.898Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9579 | 2024-03-06T11:05:19.768Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9578 | 2024-03-06T11:05:29.409Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9577 | 2024-03-06T11:05:42.198Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-9576 | 2024-03-06T11:05:51.994Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-3758 | 2024-03-06T11:06:03.362Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-3719 | 2024-03-06T11:06:15.514Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-3718 | 2024-03-06T11:06:24.686Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-3717 | 2024-03-06T11:06:36.675Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-3716 | 2024-03-06T11:06:48.386Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-3715 | 2024-03-06T11:06:59.179Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-23549 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23549) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23548 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23548) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23547 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23547) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23546 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23546) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23545 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23545) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23544 | AndSoft e-TMS操作系统命令注入漏洞(CNVD-2025-23544) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23543 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23543) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23542 | AndSoft e-TMS操作系统命令注入漏洞(CNVD-2025-23542) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23541 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23541) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23540 | AndSoft e-TMS操作系统命令注入漏洞(CNVD-2025-23540) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23539 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23539) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23538 | AndSoft e-TMS操作系统命令注入漏洞 | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23537 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23537) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23536 | AndSoft e-TMS跨站脚本漏洞(CNVD-2025-23536) | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23535 | AndSoft e-TMS跨站脚本漏洞 | 2025-10-13 | 2025-10-14 |
| cnvd-2025-23745 | TOTOLINK X2000R Gh formParentControl方法缓冲区溢出漏洞 | 2023-10-27 | 2025-10-13 |
| cnvd-2025-23744 | TOTOLINK X2000R Gh formNtp方法缓冲区溢出漏洞 | 2023-10-27 | 2025-10-13 |
| cnvd-2025-23743 | TOTOLINK X2000R Gh formMultiAP方法缓冲区溢出漏洞 | 2023-10-27 | 2025-10-13 |
| cnvd-2025-23742 | TOTOLINK X2000R Gh formMultiAPVLAN方法缓冲区溢出漏洞 | 2023-10-27 | 2025-10-13 |
| cnvd-2025-23741 | TOTOLINK X2000R Gh formMeshUploadConfig方法缓冲区溢出漏洞 | 2023-10-27 | 2025-10-13 |
| cnvd-2025-23730 | TOTOLINK X2000R Gh formStats方法缓冲区溢出漏洞 | 2023-10-27 | 2025-10-13 |
| cnvd-2025-23729 | TOTOLINK X2000R Gh formSetLg方法缓冲区溢出漏洞 | 2023-10-27 | 2025-10-13 |
| cnvd-2025-23728 | TOTOLINK X2000R Gh formReflashClientTbl方法缓冲区溢出漏洞 | 2023-10-27 | 2025-10-13 |
| cnvd-2025-23727 | TOTOLINK X2000R Gh formPortFw方法缓冲区溢出漏洞 | 2023-10-27 | 2025-10-13 |
| cnvd-2025-23640 | QNAP Qsync Central路径遍历漏洞(CNVD-2025-23640) | 2025-09-02 | 2025-10-13 |
| cnvd-2025-23639 | QNAP Qsync Central路径遍历漏洞 | 2025-09-02 | 2025-10-13 |
| cnvd-2025-23638 | QNAP Qsync Central空指针取消引用漏洞(CNVD-2025-23638) | 2025-09-02 | 2025-10-13 |
| cnvd-2025-23637 | QNAP Qsync Central空指针取消引用漏洞(CNVD-2025-23637) | 2025-09-02 | 2025-10-13 |
| cnvd-2025-23625 | Dell PowerScale OneFS拒绝服务漏洞 | 2025-01-24 | 2025-10-13 |
| cnvd-2025-23624 | QNAP Qsync Central空指针取消引用漏洞 | 2025-09-02 | 2025-10-13 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2022-avi-954 | Multiples vulnérabilités dans Joomla | 2022-10-26T00:00:00.000000 | 2022-10-26T00:00:00.000000 |
| certfr-2022-avi-953 | Multiples vulnérabilités dans Google Chrome | 2022-10-26T00:00:00.000000 | 2022-10-26T00:00:00.000000 |
| certfr-2022-avi-952 | Multiples vulnérabilités dans IBM QRadar | 2022-10-26T00:00:00.000000 | 2022-10-26T00:00:00.000000 |
| certfr-2022-avi-951 | Multiples vulnérabilités dans VMware Cloud Foundation | 2022-10-26T00:00:00.000000 | 2022-10-26T00:00:00.000000 |
| certfr-2022-avi-950 | Multiples vulnérabilités dans les produits Aruba | 2022-10-26T00:00:00.000000 | 2022-10-26T00:00:00.000000 |
| certfr-2022-avi-949 | Multiples vulnérabilités dans Samba | 2022-10-25T00:00:00.000000 | 2022-10-25T00:00:00.000000 |
| certfr-2022-avi-948 | Multiples vulnérabilités dans Mozilla Thunderbird | 2022-10-25T00:00:00.000000 | 2022-10-25T00:00:00.000000 |
| certfr-2022-avi-947 | Multiples vulnérabilités dans les produits Apple | 2022-10-25T00:00:00.000000 | 2022-10-25T00:00:00.000000 |
| certfr-2022-avi-946 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2022-10-24T00:00:00.000000 | 2022-10-24T00:00:00.000000 |
| certfr-2022-avi-945 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-10-24T00:00:00.000000 | 2022-10-24T00:00:00.000000 |
| certfr-2022-avi-944 | Multiples vulnérabilités dans les produits Synology | 2022-10-24T00:00:00.000000 | 2022-10-24T00:00:00.000000 |
| certfr-2022-avi-943 | Vulnérabilité dans Siemens Siveillance Video Mobile Server V2022 R2 | 2022-10-24T00:00:00.000000 | 2022-10-24T00:00:00.000000 |
| certfr-2022-avi-942 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-10-21T00:00:00.000000 | 2022-10-21T00:00:00.000000 |
| certfr-2022-avi-941 | Multiples vulnérabilités dans le noyau Linux de Debian | 2022-10-21T00:00:00.000000 | 2022-10-21T00:00:00.000000 |
| certfr-2022-avi-940 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2022-10-21T00:00:00.000000 | 2022-10-21T00:00:00.000000 |
| certfr-2022-avi-939 | Multiples vulnérabilités dans les produits SolarWinds | 2022-10-20T00:00:00.000000 | 2022-10-20T00:00:00.000000 |
| certfr-2022-avi-938 | Multiples vulnérabilités dans les produits Cisco | 2022-10-20T00:00:00.000000 | 2022-10-20T00:00:00.000000 |
| certfr-2022-avi-937 | Multiples vulnérabilités dans les produits F5 | 2022-10-20T00:00:00.000000 | 2022-10-20T00:00:00.000000 |
| certfr-2022-avi-936 | Vulnérabilité dans OwnCloud | 2022-10-20T00:00:00.000000 | 2022-10-20T00:00:00.000000 |
| certfr-2022-avi-935 | Multiples vulnérabilités dans Oracle WebLogic Server | 2022-10-19T00:00:00.000000 | 2022-10-19T00:00:00.000000 |
| certfr-2022-avi-934 | Multiples vulnérabilités dans Oracle Virtualization | 2022-10-19T00:00:00.000000 | 2022-10-19T00:00:00.000000 |
| certfr-2022-avi-933 | Multiples vulnérabilités dans Oracle Systems | 2022-10-19T00:00:00.000000 | 2022-10-19T00:00:00.000000 |
| certfr-2022-avi-932 | Multiples vulnérabilités dans Oracle PeopleSoft | 2022-10-19T00:00:00.000000 | 2022-10-19T00:00:00.000000 |
| certfr-2022-avi-931 | Multiples vulnérabilités dans Oracle MySQL | 2022-10-19T00:00:00.000000 | 2022-10-19T00:00:00.000000 |
| certfr-2022-avi-930 | Multiples vulnérabilités dans Oracle Java SE | 2022-10-19T00:00:00.000000 | 2022-10-19T00:00:00.000000 |
| certfr-2022-avi-929 | Multiples vulnérabilités dans Oracle Database Server | 2022-10-19T00:00:00.000000 | 2022-10-19T00:00:00.000000 |
| certfr-2022-avi-928 | Multiples vulnérabilités dans les produits IBM | 2022-10-19T00:00:00.000000 | 2022-10-19T00:00:00.000000 |
| certfr-2022-avi-927 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2022-10-19T00:00:00.000000 | 2022-10-19T00:00:00.000000 |
| certfr-2022-avi-926 | Multiples vulnérabilités dans les produits Mozilla | 2022-10-19T00:00:00.000000 | 2022-10-19T00:00:00.000000 |
| certfr-2022-avi-925 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-10-19T00:00:00.000000 | 2022-10-19T00:00:00.000000 |