Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-21990 |
8.2 (3.1)
|
Vulnerability in the Oracle VM VirtualBox product… |
Oracle Corporation |
Oracle VM VirtualBox |
2026-01-20T21:56:42.077Z | 2026-02-26T14:44:36.012Z |
| CVE-2026-21328 |
7.8 (3.1)
|
After Effects | Out-of-bounds Write (CWE-787) |
Adobe |
After Effects |
2026-02-10T17:53:00.426Z | 2026-02-26T14:44:35.871Z |
| CVE-2026-24061 |
9.8 (3.1)
|
telnetd in GNU Inetutils through 2.7 allows remot… |
GNU |
Inetutils |
2026-01-21T06:42:17.134Z | 2026-02-26T14:44:35.722Z |
| CVE-2026-21318 |
7.8 (3.1)
|
After Effects | Out-of-bounds Write (CWE-787) |
Adobe |
After Effects |
2026-02-10T17:53:01.373Z | 2026-02-26T14:44:35.501Z |
| CVE-2026-20092 |
6 (3.1)
|
Cisco Intersight Virtual Appliance Privilege Escalatio… |
Cisco |
Cisco Intersight Virtual Appliance |
2026-01-21T16:26:05.298Z | 2026-02-26T14:44:35.281Z |
| CVE-2026-21322 |
7.8 (3.1)
|
After Effects | Out-of-bounds Read (CWE-125) |
Adobe |
After Effects |
2026-02-10T17:53:02.265Z | 2026-02-26T14:44:35.120Z |
| CVE-2026-20045 |
8.2 (3.1)
|
Cisco Unified Communications Products Remote Code Exec… |
Cisco |
Cisco Unified Communications Manager |
2026-01-21T16:26:20.312Z | 2026-02-26T14:44:34.950Z |
| CVE-2026-21326 |
7.8 (3.1)
|
After Effects | Use After Free (CWE-416) |
Adobe |
After Effects |
2026-02-10T17:53:03.097Z | 2026-02-26T14:44:34.519Z |
| CVE-2026-0834 |
7.2 (4.0)
|
Logic Vulnerability on TP-Link Archer C20 and Archer AX53 |
TP-Link Systems Inc. |
Archer C20 v6.0, Archer AX53 v1.0 |
2026-01-21T17:14:55.179Z | 2026-02-26T14:44:34.299Z |
| CVE-2026-21324 |
7.8 (3.1)
|
After Effects | Out-of-bounds Read (CWE-125) |
Adobe |
After Effects |
2026-02-10T17:53:03.917Z | 2026-02-26T14:44:34.141Z |
| CVE-2026-23516 |
8.6 (4.0)
|
CVAT vulnerable to XSS via skeleton SVG images |
cvat-ai |
cvat |
2026-01-21T21:38:32.971Z | 2026-02-26T14:44:33.999Z |
| CVE-2026-21323 |
7.8 (3.1)
|
After Effects | Use After Free (CWE-416) |
Adobe |
After Effects |
2026-02-10T17:53:04.726Z | 2026-02-26T14:44:33.860Z |
| CVE-2026-23526 |
8.5 (4.0)
|
CVAT vulnerable to privilege escalation of users with … |
cvat-ai |
cvat |
2026-01-21T21:40:25.214Z | 2026-02-26T14:44:33.583Z |
| CVE-2026-21329 |
7.8 (3.1)
|
After Effects | Use After Free (CWE-416) |
Adobe |
After Effects |
2026-02-10T17:53:05.522Z | 2026-02-26T14:44:33.361Z |
| CVE-2026-0723 |
7.4 (3.1)
|
Unchecked Return Value in GitLab |
GitLab |
GitLab |
2026-01-22T13:34:08.340Z | 2026-02-26T14:44:33.144Z |
| CVE-2026-21357 |
7.8 (3.1)
|
InDesign Desktop | Heap-based Buffer Overflow (CWE-122) |
Adobe |
InDesign Desktop |
2026-02-10T17:59:53.700Z | 2026-02-26T14:44:32.963Z |
| CVE-2026-23760 |
9.3 (4.0)
|
SmarterTools SmarterMail < Build 9511 Authentication B… |
SmarterTools |
SmarterMail |
2026-01-22T14:35:17.235Z | 2026-02-26T14:44:32.820Z |
| CVE-2026-21334 |
7.8 (3.1)
|
Substance3D - Designer | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Designer |
2026-02-10T18:08:09.123Z | 2026-02-26T14:44:32.666Z |
| CVE-2025-36588 |
8.8 (3.1)
|
Dell Unisphere for PowerMax, version(s) 10.2.0.x,… |
Dell |
Unisphere for PowerMax |
2026-01-22T15:52:01.141Z | 2026-02-26T14:44:32.520Z |
| CVE-2026-21335 |
7.8 (3.1)
|
Substance3D - Designer | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Designer |
2026-02-10T18:08:10.712Z | 2026-02-26T14:44:32.361Z |
| CVE-2026-22278 |
8.1 (3.1)
|
Dell PowerScale OneFS versions prior to 9.13.0.0 … |
Dell |
PowerScale OneFS |
2026-01-22T16:16:51.354Z | 2026-02-26T14:44:32.181Z |
| CVE-2026-21342 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:27.134Z | 2026-02-26T14:44:31.961Z |
| CVE-2026-0533 |
7.1 (3.1)
|
Stored XSS in Fusion desktop when attempting to delete… |
Autodesk |
Fusion |
2026-01-22T16:58:43.084Z | 2026-02-26T14:44:31.809Z |
| CVE-2026-21345 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Read (CWE-125) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:27.925Z | 2026-02-26T14:44:31.668Z |
| CVE-2026-0534 |
7.1 (3.1)
|
Stored XSS in the value of a part attribute |
Autodesk |
Fusion |
2026-01-22T16:59:01.906Z | 2026-02-26T14:44:31.522Z |
| CVE-2026-21341 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:28.733Z | 2026-02-26T14:44:31.356Z |
| CVE-2026-0535 |
7.1 (3.1)
|
Stored XSS in Electronic Library Component Description |
Autodesk |
Fusion |
2026-01-22T16:59:34.236Z | 2026-02-26T14:44:31.213Z |
| CVE-2026-21343 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Read (CWE-125) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:29.603Z | 2026-02-26T14:44:31.075Z |
| CVE-2026-24124 |
8.9 (4.0)
|
Dragonfly Manager Job API Allows Unauthenticated Access |
dragonflyoss |
dragonfly |
2026-01-22T22:20:20.820Z | 2026-02-26T14:44:30.933Z |
| CVE-2026-21344 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Read (CWE-125) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:30.445Z | 2026-02-26T14:44:30.786Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2681 |
5.3 (3.1)
|
Github.com/supranational/blst: blst cryptographic libr… |
|
|
2026-02-19T06:58:47.090Z | 2026-02-19T21:32:34.940Z |
| CVE-2026-2504 |
4.3 (3.1)
|
Dealia – Request a quote <= 1.0.6 - Missing Authorizat… |
dealia |
Dealia – Request a quote |
2026-02-19T04:36:23.492Z | 2026-02-19T21:14:23.380Z |
| CVE-2026-2502 |
6.1 (3.1)
|
xmlrpc attacks blocker <= 1.0 - Unauthenticated Stored… |
yehudah |
xmlrpc attacks blocker |
2026-02-19T04:36:05.011Z | 2026-02-19T17:40:06.750Z |
| CVE-2026-25004 |
N/A
|
WordPress CM Business Directory plugin <= 1.5.3 - Cros… |
CreativeMindsSolutions |
CM Business Directory |
2026-02-19T08:26:51.689Z | 2026-02-19T08:26:51.689Z |
| CVE-2026-23541 |
N/A
|
WordPress Mail Mint plugin <= 1.19.4 - Broken Access C… |
WPFunnels |
Mail Mint |
2026-02-19T08:26:48.368Z | 2026-02-26T20:51:38.720Z |
| CVE-2026-2284 |
5.4 (3.1)
|
News Element Elementor Blog Magazine <= 1.0.8 - Missin… |
webangon |
News Element Elementor Blog Magazine |
2026-02-19T04:36:26.287Z | 2026-02-19T21:27:00.808Z |
| CVE-2026-2282 |
4.4 (3.1)
|
Slidorion <= 1.0.2 - Authenticated (Administrator+) St… |
hollandben |
Slidorion |
2026-02-19T04:36:11.156Z | 2026-02-19T17:37:46.092Z |
| CVE-2026-1994 |
9.8 (3.1)
|
s2Member <= 260127 - Unauthenticated Privilege Escalat… |
clavaque |
s2Member – Excellent for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions |
2026-02-19T06:49:43.503Z | 2026-02-19T21:20:40.661Z |
| CVE-2026-1646 |
6.4 (3.1)
|
Advance Block Extend <= 1.0.4 - Authenticated (Contrib… |
iamjaydip |
Advance Block Extend |
2026-02-19T04:36:08.200Z | 2026-02-19T17:38:57.467Z |
| CVE-2026-1461 |
6.5 (3.1)
|
Simple Membership <= 4.7.0 - Unauthenticated Improper … |
wpinsider-1 |
Simple Membership |
2026-02-19T09:26:34.833Z | 2026-02-20T20:40:36.644Z |
| CVE-2026-1455 |
4.3 (3.1)
|
Whatsiplus Scheduled Notification for Woocommerce <= 1… |
whatsiplus |
Whatsiplus Scheduled Notification for Woocommerce |
2026-02-19T04:36:25.835Z | 2026-02-19T21:28:00.278Z |
| CVE-2026-1405 |
9.8 (3.1)
|
Slider Future <= 1.0.5 - Unauthenticated Arbitrary Fil… |
franchidesign |
Slider Future |
2026-02-19T04:36:09.197Z | 2026-02-19T17:38:32.984Z |
| CVE-2026-1219 |
5.3 (3.1)
|
MP3 Audio Player – Music Player, Podcast Player & Radi… |
sonaar |
MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar |
2026-02-19T09:26:36.530Z | 2026-02-20T20:37:50.944Z |
| CVE-2025-9953 |
9.8 (3.1)
|
SQLi in Database Software's Databank Accreditation Software |
DATABASE Software Training Consulting Ltd. |
Databank Accreditation Software |
2026-02-19T11:55:10.191Z | 2026-02-20T20:27:06.998Z |
| CVE-2025-9062 |
7.3 (3.1)
|
IDOR in MeCODE Informatics' Envanty |
MeCODE Informatics and Engineering Services Ltd. |
Envanty |
2026-02-19T10:57:15.180Z | 2026-02-20T20:36:16.170Z |
| CVE-2025-8350 |
9.8 (3.1)
|
Authentication Bypass with Redirect in BiEticaret Soft… |
Inrove Software and Internet Services |
BiEticaret CMS |
2026-02-19T11:30:04.046Z | 2026-02-20T20:35:41.879Z |
| CVE-2025-41023 |
6.9 (4.0)
|
Authentication bypass in AutoGPT de Thesamur |
Thesamur |
AutoGPT |
2026-02-19T08:50:36.880Z | 2026-02-23T18:33:12.573Z |
| CVE-2025-40697 |
5.1 (4.0)
|
Reflected Cross-Site Scripting (XSS) in Lewe WebMeasure |
Lewe |
WebMeasure |
2026-02-19T08:44:16.386Z | 2026-02-24T13:26:55.909Z |
| CVE-2025-68952 |
9.3 (4.0)
|
1-click Remote Code Execution (RCE) vulnerability in Eigent |
eigent-ai |
eigent |
2025-12-27T00:37:08.917Z | 2025-12-29T15:53:36.804Z |
| CVE-2026-0102 |
3.1 (3.1)
|
Microsoft Edge (Chromium-based) Defense in Depth Vulne… |
Microsoft |
Microsoft Edge (Chromium-based) |
2026-02-17T19:14:32.901Z | 2026-02-27T20:09:37.479Z |
| CVE-2026-25152 |
5.3 (3.1)
|
@backstage/plugin-techdocs-node vulnerable to possible… |
backstage |
backstage |
2026-01-30T21:51:22.277Z | 2026-02-02T16:29:27.963Z |
| CVE-2026-25153 |
7.7 (3.1)
|
@backstage/plugin-techdocs-node vulnerable to arbitrar… |
backstage |
backstage |
2026-01-30T21:31:58.870Z | 2026-02-02T16:29:34.938Z |
| CVE-2026-25227 |
9.1 (3.1)
|
authentik affected by Remote Code Execution via Contex… |
goauthentik |
authentik |
2026-02-12T19:25:26.932Z | 2026-02-17T15:43:53.801Z |
| CVE-2026-25748 |
8.6 (3.1)
|
authentik has a forward authentication bypass with bro… |
goauthentik |
authentik |
2026-02-12T19:36:45.631Z | 2026-02-17T15:53:01.301Z |
| CVE-2026-2744 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-19T13:58:39.176Z | 2026-02-19T14:08:34.194Z |
| CVE-2025-70560 |
8.4 (3.1)
|
Boltz 2.0.0 contains an insecure deserialization … |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-19T14:23:48.012Z |
| CVE-2025-65753 |
7.5 (3.1)
|
An issue in the TLS certification mechanism of Gu… |
n/a |
n/a |
2026-02-17T00:00:00.000Z | 2026-02-19T14:25:42.668Z |
| CVE-2026-25154 |
6.1 (3.1)
|
LocalSend has Stored XSS in Web Share Interface via Filename |
localsend |
localsend |
2026-01-30T21:59:30.234Z | 2026-02-02T16:29:18.825Z |
| CVE-2025-68432 |
7.8 (3.1)
|
Zed IDE LSP Binary Configuration Arbitrary Code Execution |
zed-industries |
zed |
2025-12-17T22:45:42.228Z | 2025-12-18T15:34:07.066Z |
| CVE-2026-25156 |
7.3 (3.1)
|
HotCRP vulnerable to stored XSS via comment attachments |
kohler |
hotcrp |
2026-01-30T22:11:35.480Z | 2026-02-02T17:42:38.247Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-25153 | Backstage is an open framework for building developer portals, and @backstage/plugin-techdocs-node … | 2026-01-30T22:15:56.343 | 2026-02-19T15:26:37.430 |
| fkie_cve-2026-25227 | authentik is an open-source identity provider. From 2021.3.1 to before 2025.8.6, 2025.10.4, and 202… | 2026-02-12T20:16:10.313 | 2026-02-19T15:25:12.283 |
| fkie_cve-2026-25748 | authentik is an open-source identity provider. Prior to 2025.10.4 and 2025.12.4, with a malformed c… | 2026-02-12T20:16:10.473 | 2026-02-19T15:23:42.360 |
| fkie_cve-2026-2744 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-19T14:16:15.073 | 2026-02-19T15:16:12.483 |
| fkie_cve-2025-70560 | Boltz 2.0.0 contains an insecure deserialization vulnerability in its molecule loading functionalit… | 2026-02-03T18:16:17.900 | 2026-02-19T15:16:11.520 |
| fkie_cve-2025-65753 | An issue in the TLS certification mechanism of Guardian Gryphon v01.06.0006.22 allows attackers to … | 2026-02-17T16:20:24.477 | 2026-02-19T15:16:11.337 |
| fkie_cve-2026-25154 | LocalSend is a free, open-source app that allows users to share files and messages with nearby devi… | 2026-01-30T22:15:56.490 | 2026-02-19T15:15:33.287 |
| fkie_cve-2025-68432 | Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre.… | 2025-12-17T23:16:05.303 | 2026-02-19T15:10:51.383 |
| fkie_cve-2026-25156 | HotCRP is conference review software. HotCRP versions from October 2025 through January 2026 delive… | 2026-01-30T23:16:12.333 | 2026-02-19T15:10:01.723 |
| fkie_cve-2026-25805 | Zed is a multiplayer code editor. Prior to 0.219.4, Zed does not show with which parameters a tool … | 2026-02-10T18:16:38.200 | 2026-02-19T15:08:32.990 |
| fkie_cve-2026-20711 | Cross-site scripting vulnerability exists in E-mail function of Cybozu Garoon 5.0.0 to 6.0.3, which… | 2026-02-02T07:16:45.100 | 2026-02-19T15:06:02.143 |
| fkie_cve-2025-68433 | Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre.… | 2025-12-17T23:16:05.453 | 2026-02-19T15:05:59.037 |
| fkie_cve-2026-22881 | Cross-site scripting vulnerability exists in Message function of Cybozu Garoon 5.15.0 to 6.0.3, whi… | 2026-02-02T07:16:45.337 | 2026-02-19T15:00:54.530 |
| fkie_cve-2026-22888 | Improper input verification issue exists in Cybozu Garoon 5.0.0 to 6.0.3, which may lead to unautho… | 2026-02-02T07:16:45.523 | 2026-02-19T14:53:03.017 |
| fkie_cve-2025-36194 | IBM PowerVM Hypervisor FW1110.00 through FW1110.03, FW1060.00 through FW1060.51, and FW950.00 throu… | 2026-02-02T23:15:59.210 | 2026-02-19T14:46:37.653 |
| fkie_cve-2025-36238 | IBM PowerVM Hypervisor FW1110.00 through FW1110.03, FW1060.00 through FW1060.51, and FW950.00 throu… | 2026-02-02T23:15:59.383 | 2026-02-19T14:41:41.713 |
| fkie_cve-2025-36436 | IBM Cloud Pak for Business Automation 25.0.0 through 25.0.0 Interim Fix 002, 24.0.1 through 24.0.1 … | 2026-02-02T23:15:59.710 | 2026-02-19T13:48:21.817 |
| fkie_cve-2026-26119 | Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges… | 2026-02-17T23:16:22.880 | 2026-02-19T13:10:49.550 |
| fkie_cve-2025-0752 | A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control … | 2025-01-28T10:15:09.493 | 2026-02-19T09:16:09.923 |
| fkie_cve-2026-25592 | Semantic Kernel is an SDK used to build, orchestrate, and deploy AI agents and multi-agent systems.… | 2026-02-06T21:16:17.647 | 2026-02-19T00:16:21.663 |
| fkie_cve-2025-45769 | php-jwt v6.11.0 was discovered to contain weak encryption. NOTE: this issue has been disputed on th… | 2025-07-31T20:15:33.150 | 2026-02-18T22:16:24.073 |
| fkie_cve-2026-2547 | A vulnerability was detected in LigeroSmart up to 6.1.26. The impacted element is the function Agen… | 2026-02-16T09:16:08.660 | 2026-02-18T21:45:21.910 |
| fkie_cve-2025-13821 | Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 fail to sanitize sensiti… | 2026-02-16T12:16:21.423 | 2026-02-18T21:44:27.573 |
| fkie_cve-2026-2555 | A weakness has been identified in JeecgBoot 3.9.1. This vulnerability affects the function importDo… | 2026-02-16T12:16:22.667 | 2026-02-18T21:43:53.793 |
| fkie_cve-2026-22892 | Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 fail to validate user pe… | 2026-02-13T11:16:10.693 | 2026-02-18T21:34:16.227 |
| fkie_cve-2026-26187 | lakeFS is an open-source tool that transforms object storage into a Git-like repositories. Prior to… | 2026-02-13T19:17:29.100 | 2026-02-18T21:32:15.033 |
| fkie_cve-2026-26269 | Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnera… | 2026-02-13T20:17:41.377 | 2026-02-18T21:29:03.767 |
| fkie_cve-2025-70347 | An issue in mquickjs before commit 74b7e (2026-01-15) allows a local attacker to cause a denial of … | 2026-02-10T16:16:09.800 | 2026-02-18T21:16:21.753 |
| fkie_cve-2025-14282 | A flaw was found in Dropbear. When running in multi-user mode and authenticating users, the dropbea… | 2026-02-12T22:16:03.373 | 2026-02-18T21:16:20.770 |
| fkie_cve-2024-54192 | An issue inTcpreplay v4.5.1 allows a local attacker to cause a denial of service via a crafted file… | 2026-02-10T16:16:07.073 | 2026-02-18T21:16:19.413 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-f378-hr82-h75p |
4.8 (3.1)
|
SAP BusinessObjects Enterprise does not sufficiently encode user-controlled inputs, leading to Stor… | 2026-02-10T06:30:39Z | 2026-02-10T06:30:39Z |
| ghsa-c6mg-969x-wq39 |
|
Rejected reason: Not used | 2026-02-10T06:30:39Z | 2026-02-10T06:30:39Z |
| ghsa-c5x9-g76v-5jf9 |
6.5 (3.1)
|
SAP BusinessObjects Business Intelligence Platform (AdminTools) allows an authenticated attacker wi… | 2026-02-10T06:30:39Z | 2026-02-10T06:30:39Z |
| ghsa-9v69-wg3m-pj38 |
7.2 (3.1)
7.3 (4.0)
|
A vulnerability was found in D-Link DCS-931L up to 1.13.0. This affects an unknown part of the file… | 2026-02-10T06:30:39Z | 2026-02-10T06:30:39Z |
| ghsa-8p92-c9m5-rrq9 |
7.1 (3.1)
|
The VAPIX API mediaclip.cgi that did not have a sufficient input validation allowing for a possible… | 2026-02-10T06:30:39Z | 2026-02-10T06:30:39Z |
| ghsa-8m82-qh8j-vqhh |
|
Rejected reason: Not used | 2026-02-10T06:30:39Z | 2026-02-10T06:30:39Z |
| ghsa-43ph-2f3g-c5f6 |
4.3 (3.1)
|
Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense & Se… | 2026-02-10T06:30:39Z | 2026-02-10T06:30:39Z |
| ghsa-xpv9-9vrq-v7c4 |
5.3 (3.1)
|
SAP Commerce Cloud exposes multiple API endpoints to unauthenticated users, allowing them to submit… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-rj9r-f39x-h33w |
9.9 (3.1)
|
An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could exploit a flaw in a g… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-rfxm-73cg-f6jv |
4.3 (3.1)
|
Due to missing authorization check in a function module in SAP Support Tools Plug-In, an authentica… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-g3pc-2885-cj35 |
7.7 (3.1)
|
Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated att… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-fwvv-mv4g-pq78 |
7.7 (3.1)
|
SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary a… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-fj5w-23f4-pvw6 |
7.3 (3.1)
|
The SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker with high p… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-chrf-wqq3-mxvp |
7.5 (3.1)
|
SAP BusinessObjects BI Platform allows an unauthenticated attacker to craft a specific network requ… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-ccw7-5mwj-q9wj |
4.4 (3.1)
|
Due to a Deserialization vulnerability in SAP NetWeaver (JMS service), an attacker authenticated as… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-cccp-r76h-97r3 |
5.0 (3.1)
|
In ABAP based SAP systems a remote enabled function module does not perform necessary authorization… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-9x42-qr2j-m3w4 |
4.3 (3.1)
|
SAP Fiori App Manage Service Entry Sheets does not perform necessary authorization checks for an au… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-9c7v-cw9q-4fpc |
3.4 (3.1)
|
Due to a CRLF Injection vulnerability in SAP NetWeaver Application Server Java, an authenticated at… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-8grj-8rrm-8934 |
6.1 (3.1)
|
The BSP applications allow an unauthenticated user to manipulate user-controlled URL parameters tha… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-4wp4-8c2w-49hv |
5.9 (3.1)
|
A race condition vulnerability exists in the SAP Commerce cloud. Because of this when an attacker a… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-464q-7rxg-4rqx |
9.6 (3.1)
|
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated, low-privileged use… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-464m-h7w2-29w7 |
8.8 (3.1)
|
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with norma… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-44gc-5cr3-vhmh |
5.2 (3.1)
|
An erroneous authorization check in SAP Business Workflow leads to privilege escalation. An authent… | 2026-02-10T06:30:38Z | 2026-02-10T06:30:38Z |
| ghsa-97xg-2mgm-r8gr |
7.5 (3.1)
|
SAP BusinessObjects BI Platform allows an unauthenticated attacker to send specially crafted reques… | 2026-02-10T06:30:37Z | 2026-02-10T06:30:37Z |
| ghsa-56mv-mq74-fqqv |
6.5 (3.1)
|
Due to missing authorization check in SAP NetWeaver Application Server ABAP and SAP S/4HANA, an aut… | 2026-02-10T06:30:37Z | 2026-02-10T06:30:37Z |
| ghsa-v4p5-w6r3-2x4f |
9.5 (4.0)
|
FUXA Unauthenticated Remote Code Execution in Node-RED Integration | 2026-02-10T00:27:31Z | 2026-02-10T02:57:49Z |
| ghsa-88qh-cphv-996c |
9.5 (4.0)
|
FUXA Unauthenticated Remote Code Execution via Arbitrary File Write in Upload API | 2026-02-05T00:37:30Z | 2026-02-10T02:57:44Z |
| ghsa-9vph-2hvm-x66g |
6.5 (3.1)
|
Cube Core is vulnerable to Denial of Service (DoS) via crafted request | 2026-02-10T00:29:13Z | 2026-02-10T02:57:38Z |
| ghsa-v226-32c7-x2v7 |
7.7 (3.1)
|
Cube Core is vulnerable to privilege escalation via a specially crafted request | 2026-02-10T00:29:07Z | 2026-02-10T02:57:34Z |
| ghsa-37cx-329c-33x3 |
4.3 (3.1)
|
go-git improperly verifies data integrity values for .idx and .pack files | 2026-02-10T00:28:53Z | 2026-02-10T02:57:13Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-29878 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.635698Z |
| gsd-2024-29985 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability | 2024-04-03T05:02:30.634860Z |
| gsd-2024-29991 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 2024-04-03T05:02:30.633627Z |
| gsd-2024-29856 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.632184Z |
| gsd-2024-29890 | DataLens is a business intelligence and data visualization system. A specifically crafted… | 2024-04-03T05:02:30.631083Z |
| gsd-2024-29869 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.625006Z |
| gsd-2024-29827 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.623999Z |
| gsd-2024-29900 | Electron Packager bundles Electron-based application source code with a renamed Electron … | 2024-04-03T05:02:30.617596Z |
| gsd-2024-29994 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.614864Z |
| gsd-2024-29910 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.605830Z |
| gsd-2024-29871 | SQL injection vulnerability in Sentrifugo 3.2, through /sentrifugo/index.php/index/getdep… | 2024-04-03T05:02:30.603413Z |
| gsd-2024-29952 | A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a could allow an authenticated … | 2024-04-03T05:02:30.602100Z |
| gsd-2024-29986 | Microsoft Edge for Android (Chromium-based) Information Disclosure Vulnerability | 2024-04-03T05:02:30.601072Z |
| gsd-2024-29907 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.598978Z |
| gsd-2024-29949 | There is a command injection vulnerability in some Hikvision NVRs. This could allow an au… | 2024-04-03T05:02:30.596883Z |
| gsd-2024-29954 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.592674Z |
| gsd-2024-29897 | CreateWiki is Miraheze's MediaWiki extension for requesting & creating wikis. It is possi… | 2024-04-03T05:02:30.592088Z |
| gsd-2024-29960 | In the Brocade SANnav server versions before v2.3.1 and v2.3.0a, the SSH keys inside the … | 2024-04-03T05:02:30.589086Z |
| gsd-2024-29974 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.588632Z |
| gsd-2024-29889 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.584385Z |
| gsd-2024-29825 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.583225Z |
| gsd-2024-29898 | CreateWiki is Miraheze's MediaWiki extension for requesting & creating wikis. An oversigh… | 2024-04-03T05:02:30.582399Z |
| gsd-2024-29873 | SQL injection vulnerability in Sentrifugo 3.2, through /sentrifugo/index.php/reports/busi… | 2024-04-03T05:02:30.581718Z |
| gsd-2024-29894 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.579622Z |
| gsd-2024-29905 | DIRAC is an interware, meaning a software framework for distributed computing. Prior to v… | 2024-04-03T05:02:30.571691Z |
| gsd-2024-29868 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.568786Z |
| gsd-2024-29863 | A race condition in the installer executable in Qlik Qlikview before versions May 2022 SR… | 2024-04-03T05:02:30.562391Z |
| gsd-2024-29940 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.559404Z |
| gsd-2024-29906 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:30.558487Z |
| gsd-2024-29976 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:30.554504Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191978 | Malicious code in elf-stats-cranberry-sleigh-853 (npm) | 2025-12-03T13:55:27Z | 2025-12-03T16:11:39Z |
| mal-2025-192197 | Malicious code in elf-stats-wintry-icicle-283 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192195 | Malicious code in elf-stats-wintry-hammer-196 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192186 | Malicious code in elf-stats-velvet-ornament-935 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192185 | Malicious code in elf-stats-velvet-cocoa-992 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192184 | Malicious code in elf-stats-twinkling-wreath-730 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192183 | Malicious code in elf-stats-twinkling-sled-276 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192182 | Malicious code in elf-stats-twinkling-reindeer-382 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192180 | Malicious code in elf-stats-twinkling-ledger-989 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192179 | Malicious code in elf-stats-twinkling-ledger-863 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192177 | Malicious code in elf-stats-tinsel-giftbox-192 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192176 | Malicious code in elf-stats-tinsel-drum-369 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192175 | Malicious code in elf-stats-sugarplum-workshop-950 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192174 | Malicious code in elf-stats-sugarplum-stockpile-238 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192172 | Malicious code in elf-stats-sugarplum-saddlebag-236 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192170 | Malicious code in elf-stats-storybook-stocking-662 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192168 | Malicious code in elf-stats-storybook-marshmallow-729 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192164 | Malicious code in elf-stats-starlit-train-195 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192161 | Malicious code in elf-stats-starlit-mitten-980 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192159 | Malicious code in elf-stats-sprucey-snowman-250 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192158 | Malicious code in elf-stats-sprucey-mitten-825 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192156 | Malicious code in elf-stats-sparkly-snowflake-139 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192155 | Malicious code in elf-stats-sparkly-cushion-340 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192154 | Malicious code in elf-stats-sparkly-cocoa-863 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192153 | Malicious code in elf-stats-sparkly-bow-901 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192151 | Malicious code in elf-stats-snuggly-workbench-425 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192147 | Malicious code in elf-stats-snowy-train-565 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192143 | Malicious code in elf-stats-snowy-candy-850 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192142 | Malicious code in elf-stats-snowdusted-stocking-130 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| mal-2025-192141 | Malicious code in elf-stats-snowdusted-saddlebag-790 (npm) | 2025-12-03T15:59:29Z | 2025-12-03T15:59:29Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0793 | Microsoft Visual Studio Code: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Benutzerrechten | 2025-04-13T22:00:00.000+00:00 | 2025-04-13T22:00:00.000+00:00 |
| wid-sec-w-2025-0792 | Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2025-04-13T22:00:00.000+00:00 | 2025-04-13T22:00:00.000+00:00 |
| wid-sec-w-2025-0673 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2025-04-01T22:00:00.000+00:00 | 2025-04-13T22:00:00.000+00:00 |
| wid-sec-w-2025-0355 | hostapd: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-02-11T23:00:00.000+00:00 | 2025-04-13T22:00:00.000+00:00 |
| wid-sec-w-2024-2199 | pgAdmin: Schwachstelle ermöglicht Privilegieneskalation | 2024-09-23T22:00:00.000+00:00 | 2025-04-13T22:00:00.000+00:00 |
| wid-sec-w-2024-1452 | pgAdmin: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-06-25T22:00:00.000+00:00 | 2025-04-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2521 | wpa_supplicant: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-01-27T23:00:00.000+00:00 | 2025-04-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2454 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2023-09-26T22:00:00.000+00:00 | 2025-04-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2453 | Apple macOS: Mehrere Schwachstellen | 2023-09-26T22:00:00.000+00:00 | 2025-04-13T22:00:00.000+00:00 |
| wid-sec-w-2025-0785 | Flowise: Schwachstelle ermöglicht Manipulation von Dateien | 2025-04-10T22:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2025-0428 | Mattermost Mobile: Schwachstelle ermöglicht Denial of Service | 2025-02-23T23:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2025-0410 | Mattermost: Mehrere Schwachstellen | 2025-02-18T23:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2024-0289 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-02-04T23:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2024-0079 | QEMU: Schwachstelle ermöglicht Denial of Service | 2024-01-14T23:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2024-0064 | Juniper Produkte: Mehrere Schwachstellen | 2024-01-10T23:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2023-2302 | QEMU: Schwachstelle ermöglicht Denial of Service | 2023-09-10T22:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2023-1662 | QEMU: Schwachstelle ermöglicht Denial of Service | 2023-07-04T22:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2022-1955 | OpenSSL: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2016-08-28T22:00:00.000+00:00 | 2025-04-10T22:00:00.000+00:00 |
| wid-sec-w-2025-0784 | Jenkins jenkins/ssh-agent / jenkins/ssh-slave: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0783 | Drupal: Mehrere Schwachstellen | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0782 | NATS Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0780 | PaloAlto Networks PAN-OS: Mehrere Schwachstellen | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0779 | PaloAlto Networks GlobalProtect: Schwachstelle ermöglicht Privilegieneskalation | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0778 | GitLab: Mehrere Schwachstellen | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0777 | Juniper JUNOS: Mehrere Schwachstellen | 2025-04-09T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0711 | Red Hat OpenShift (Tempo): Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-04-06T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0544 | Microsoft Azure: Mehrere Schwachstellen | 2025-03-11T23:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0346 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-02-11T23:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0232 | Linux Kernel: Mehrere Schwachstellen | 2024-01-28T23:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2023-2620 | Samba: Mehrere Schwachstellen | 2023-10-10T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:8683 | Red Hat Security Advisory: OpenShift Container Platform 4.16.20 bug fix and security update | 2024-11-06T03:29:21+00:00 | 2026-02-03T20:07:18+00:00 |
| rhsa-2024:10988 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.6.27 | 2025-01-15T20:08:42+00:00 | 2026-02-03T20:07:17+00:00 |
| rhsa-2024:8935 | Red Hat Security Advisory: edk2 security update | 2024-11-06T12:06:09+00:00 | 2026-02-03T20:06:50+00:00 |
| rhsa-2024:7846 | Red Hat Security Advisory: openssl security update | 2024-10-09T11:25:24+00:00 | 2026-02-03T20:06:49+00:00 |
| rhsa-2024:7848 | Red Hat Security Advisory: openssl security update | 2024-10-09T11:48:08+00:00 | 2026-02-03T20:06:45+00:00 |
| rhsa-2024:7847 | Red Hat Security Advisory: openssl security update | 2024-10-09T11:26:24+00:00 | 2026-02-03T20:06:45+00:00 |
| rhsa-2024:6703 | Red Hat Security Advisory: pcs security update | 2024-09-16T18:08:33+00:00 | 2026-02-03T20:06:27+00:00 |
| rhsa-2024:6702 | Red Hat Security Advisory: pcs security update | 2024-09-16T18:08:19+00:00 | 2026-02-03T20:06:26+00:00 |
| rhsa-2024:6785 | Red Hat Security Advisory: ruby:3.3 security update | 2024-09-18T21:15:14+00:00 | 2026-02-03T20:06:23+00:00 |
| rhsa-2024:6784 | Red Hat Security Advisory: ruby:3.3 security update | 2024-09-18T21:15:21+00:00 | 2026-02-03T20:06:20+00:00 |
| rhsa-2024:7994 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.3 bug fixes and container updates | 2024-10-11T01:43:45+00:00 | 2026-02-03T20:06:19+00:00 |
| rhsa-2024:6779 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.10.6 bug fixes and container updates | 2024-09-18T19:22:01+00:00 | 2026-02-03T20:06:19+00:00 |
| rhsa-2024:6670 | Red Hat Security Advisory: pcs security update | 2024-09-16T01:51:27+00:00 | 2026-02-03T20:06:19+00:00 |
| rhsa-2024:7759 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.6.3 security updates | 2024-10-10T16:53:04+00:00 | 2026-02-03T20:06:18+00:00 |
| rhsa-2024:6783 | Red Hat Security Advisory: openssl security update | 2024-09-18T21:18:31+00:00 | 2026-02-03T20:06:17+00:00 |
| rhsa-2024:4392 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.2 Security update | 2024-07-08T22:19:06+00:00 | 2026-02-03T20:05:25+00:00 |
| rhsa-2024:4390 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update | 2024-07-08T21:31:05+00:00 | 2026-02-03T20:05:25+00:00 |
| rhsa-2024:4504 | Red Hat Security Advisory: httpd security update | 2024-07-11T12:22:17+00:00 | 2026-02-03T20:05:21+00:00 |
| rhsa-2024:4126 | Red Hat Security Advisory: Red Hat Service Interconnect 1.4.5 Release security update | 2024-06-26T14:31:27+00:00 | 2026-02-03T20:05:13+00:00 |
| rhsa-2024:2891 | Red Hat Security Advisory: httpd:2.4 security update | 2024-05-16T18:23:12+00:00 | 2026-02-03T20:05:03+00:00 |
| rhsa-2024:2907 | Red Hat Security Advisory: httpd:2.4 security update | 2024-05-20T01:58:01+00:00 | 2026-02-03T20:05:00+00:00 |
| rhsa-2024:3417 | Red Hat Security Advisory: mod_http2 security update | 2024-05-28T14:09:14+00:00 | 2026-02-03T20:04:58+00:00 |
| rhsa-2024:3402 | Red Hat Security Advisory: mod_http2 security update | 2024-05-28T14:34:07+00:00 | 2026-02-03T20:04:58+00:00 |
| rhsa-2024:2694 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP4 security update | 2024-05-07T15:44:38+00:00 | 2026-02-03T20:04:58+00:00 |
| rhsa-2024:9333 | Red Hat Security Advisory: openssl and openssl-fips-provider security update | 2024-11-12T09:22:03+00:00 | 2026-02-03T20:04:57+00:00 |
| rhsa-2024:2693 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP4 security update | 2024-05-07T15:50:35+00:00 | 2026-02-03T20:04:57+00:00 |
| rhsa-2024:2564 | Red Hat Security Advisory: mod_http2 security update | 2024-04-30T13:37:06+00:00 | 2026-02-03T20:04:56+00:00 |
| rhsa-2024:1872 | Red Hat Security Advisory: mod_http2 security update | 2024-04-18T01:43:19+00:00 | 2026-02-03T20:04:56+00:00 |
| rhsa-2024:1786 | Red Hat Security Advisory: httpd:2.4/mod_http2 security update | 2024-04-11T16:31:01+00:00 | 2026-02-03T20:04:55+00:00 |
| rhsa-2024:5147 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.18 Security update | 2024-08-08T17:23:37+00:00 | 2026-02-03T20:04:54+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-24302 | Azure Arc Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-05T08:00:00.000Z |
| msrc_cve-2026-24300 | Azure Front Door Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-05T08:00:00.000Z |
| msrc_cve-2026-21532 | Azure Function Information Disclosure Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-05T08:00:00.000Z |
| msrc_cve-2026-0391 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-05T08:00:00.000Z |
| msrc_cve-2026-21509 | Microsoft Office Security Feature Bypass Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-29T08:00:00.000Z |
| msrc_cve-2026-20960 | PowerApps Desktop Client Remote Code Execution Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-29T08:00:00.000Z |
| msrc_cve-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-27T08:00:00.000Z |
| msrc_cve-2026-24307 | M365 Copilot Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-24306 | Azure Front Door Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-24305 | Azure Entra ID Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-24304 | Azure Resource Manager Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21524 | Azure Data Explorer Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21521 | Word Copilot Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21520 | Copilot Studio Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21264 | Microsoft Account Spoofing Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21227 | Azure Logic Apps Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-22695 | LIBPNG has a heap buffer over-read in png_image_read_direct_scaled (regression from CVE-2025-65018 fix) | 2026-01-02T00:00:00.000Z | 2026-01-21T14:36:38.000Z |
| msrc_cve-2025-62813 | LZ4 through 1.10.0 allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact when the application processes untrusted LZ4 frames. For example, LZ4F_createCDict_advanced in lib/lz4frame.c mishandles NULL checks. | 2025-10-02T00:00:00.000Z | 2026-01-21T01:43:26.000Z |
| msrc_cve-2025-39828 | atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control(). | 2025-09-02T00:00:00.000Z | 2026-01-21T01:42:47.000Z |
| msrc_cve-2025-39826 | net: rose: convert 'use' field to refcount_t | 2025-09-02T00:00:00.000Z | 2026-01-21T01:42:37.000Z |
| msrc_cve-2025-14180 | NULL Pointer Dereference in PDO quoting | 2025-12-02T00:00:00.000Z | 2026-01-21T01:40:22.000Z |
| msrc_cve-2025-40332 | drm/amdkfd: Fix mmap write lock not release | 2025-12-02T00:00:00.000Z | 2026-01-20T14:51:28.000Z |
| msrc_cve-2025-40335 | drm/amdgpu: validate userq input args | 2025-12-02T00:00:00.000Z | 2026-01-20T14:51:11.000Z |
| msrc_cve-2025-12863 | Libxml2: namespace use-after-free in xmlsettreedoc() function of libxml2 | 2025-11-02T00:00:00.000Z | 2026-01-20T14:48:39.000Z |
| msrc_cve-2026-21895 | rsa crate has potential panic on a prime being equal to 1 | 2026-01-02T00:00:00.000Z | 2026-01-20T14:47:37.000Z |
| msrc_cve-2026-22693 | Null Pointer Dereference in SubtableUnicodesCache::create leading to DoS | 2026-01-02T00:00:00.000Z | 2026-01-20T14:47:26.000Z |
| msrc_cve-2025-69195 | Wget2: gnu wget2: memory corruption and crash via filename sanitization logic with attacker-controlled urls | 2026-01-02T00:00:00.000Z | 2026-01-20T14:47:11.000Z |
| msrc_cve-2025-69194 | Wget2: arbitrary file write via metalink path traversal in gnu wget2 | 2026-01-02T00:00:00.000Z | 2026-01-20T14:46:58.000Z |
| msrc_cve-2025-39800 | btrfs: abort transaction on unexpected eb generation at btrfs_copy_root() | 2025-09-02T00:00:00.000Z | 2026-01-20T14:46:52.000Z |
| msrc_cve-2025-62518 | astral-tokio-tar Vulnerable to PAX Header Desynchronization | 2025-10-02T00:00:00.000Z | 2026-01-20T14:45:03.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202507-0217 | A vulnerability, which was classified as critical, has been found in D-Link DIR-825 2.10.… | 2025-08-15T23:34:23.311000Z |
| var-202404-0831 | Tenda FH1205 V2.0.0.7(775) firmware has a stack overflow vulnerability located via the ad… | 2025-08-15T23:33:48.134000Z |
| var-202503-0324 | Samsung SmartThings Improper Verification of Cryptographic Signature Authentication Bypas… | 2025-08-15T23:33:42.900000Z |
| var-202308-3086 | ASUS RT-AX92U lighttpd mod_webdav.so SQL Injection Information Disclosure Vulnerability. … | 2025-08-15T23:32:53.316000Z |
| var-202507-0536 | A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critica… | 2025-08-15T23:32:49.843000Z |
| var-202507-3073 | D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the yyxz_dlink_asp function… | 2025-08-15T23:32:49.725000Z |
| var-202303-0418 | NETGEAR CAX30S SSO Command Injection Remote Code Execution Vulnerability. This vulnerabil… | 2025-08-15T23:31:05.545000Z |
| var-202403-3050 | Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the security_5g paramete… | 2025-08-15T23:31:03.713000Z |
| var-202312-1136 | Tenda AX12 V22.03.01.46 was discovered to contain a stack overflow via the deviceList par… | 2025-08-15T23:30:37.274000Z |
| var-202408-2395 | D-Link DI_8004W 16.07.26A1 contains a command execution vulnerability in jhttpd msp_info_… | 2025-08-15T23:30:36.043000Z |
| var-202409-0401 | D-Link DI-8100G 17.12.20A1 is vulnerable to Command Injection via sub47A60C function in t… | 2025-08-15T23:30:35.974000Z |
| var-202507-2896 | D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_net_asp function … | 2025-08-15T23:27:55.022000Z |
| var-202408-2536 | D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vu… | 2025-08-15T23:26:56.619000Z |
| var-202507-2448 | A vulnerability classified as critical was found in D-Link DI-8100 1.0. This vulnerabilit… | 2025-08-15T23:26:51.149000Z |
| var-202408-2666 | D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vu… | 2025-08-15T23:26:25.521000Z |
| var-202308-3003 | 3CX Uncontrolled Search Path Local Privilege Escalation Vulnerability. This vulnerability… | 2025-08-15T23:22:07.014000Z |
| var-202407-1303 | An issue in Tenda AX12 v.16.03.49.18_cn+ allows a remote attacker to cause a denial of se… | 2025-08-15T23:22:04.347000Z |
| var-202308-3520 | TP-Link Tapo C210 ActiveCells Stack-based Buffer Overflow Remote Code Execution Vulnerabi… | 2025-08-15T23:20:32.977000Z |
| var-202308-3624 | NETGEAR Orbi 760 SOAP API Authentication Bypass Vulnerability. This vulnerability allows … | 2025-08-15T23:19:59.481000Z |
| var-202407-1619 | Tenda AX12 v1.0 v22.03.01.46 contains a stack overflow in the deviceList parameter of the… | 2025-08-15T23:17:31.009000Z |
| var-202507-0602 | A vulnerability was found in D-Link DI-8100 16.07.26A1 and classified as critical. This i… | 2025-08-15T23:17:28.854000Z |
| var-202403-3248 | Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the security parameter f… | 2025-08-15T23:13:40.678000Z |
| var-202507-0585 | A vulnerability classified as critical has been found in D-Link DIR-818LW up to 20191215.… | 2025-08-15T23:13:38.002000Z |
| var-202312-1807 | Tenda AX12 V22.03.01.46 was discovered to contain a stack overflow via the list parameter… | 2025-08-15T23:10:40.195000Z |
| var-202409-0358 | D-Link DI-8100G 17.12.20A1 is vulnerable to Command Injection via msp_info.htm. D-Link Sy… | 2025-08-15T23:10:34.987000Z |
| var-202507-2551 | A vulnerability, which was classified as critical, was found in TOTOLINK A702R 4.0.0-B202… | 2025-08-15T23:10:32.974000Z |
| var-202311-0659 | TP-Link TL-WR841N ated_tp Command Injection Remote Code Execution Vulnerability. This vul… | 2025-08-15T23:02:45.560000Z |
| var-202312-2175 | Tenda AX12 V22.03.01.46 was discovered to contain a stack overflow via the list parameter… | 2025-08-15T23:02:45.141000Z |
| var-202404-1756 | Tenda FH1205 V2.0.0.7(775) firmware has a stack overflow vulnerability located via the PP… | 2025-08-15T23:02:44.343000Z |
| var-202409-0012 | A vulnerability, which was classified as problematic, has been found in D-Link DNS-320 2.… | 2025-08-15T23:02:39.639000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:0091-1 | Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) | 2025-01-14T07:33:39Z | 2025-01-14T07:33:39Z |
| suse-su-2025:0090-1 | Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5) | 2025-01-14T06:03:58Z | 2025-01-14T06:03:58Z |
| suse-su-2025:0089-1 | Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5) | 2025-01-14T06:03:47Z | 2025-01-14T06:03:47Z |
| suse-su-2025:0085-1 | Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6) | 2025-01-14T03:33:48Z | 2025-01-14T03:33:48Z |
| suse-su-2025:0084-1 | Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) | 2025-01-14T03:33:43Z | 2025-01-14T03:33:43Z |
| suse-su-2025:0083-1 | Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 2025-01-14T03:33:37Z | 2025-01-14T03:33:37Z |
| suse-su-2025:0081-1 | Security update for redis | 2025-01-13T16:49:44Z | 2025-01-13T16:49:44Z |
| suse-su-2025:0080-1 | Security update for MozillaThunderbird | 2025-01-13T15:30:55Z | 2025-01-13T15:30:55Z |
| suse-su-2025:0072-1 | Security update for logback | 2025-01-10T18:33:33Z | 2025-01-10T18:33:33Z |
| suse-su-2025:0071-1 | Security update for dnsmasq | 2025-01-10T16:54:22Z | 2025-01-10T16:54:22Z |
| suse-su-2025:0070-1 | Security update for gstreamer | 2025-01-10T16:52:53Z | 2025-01-10T16:52:53Z |
| suse-su-2025:0069-1 | Security update for gstreamer-plugins-base | 2025-01-10T16:52:16Z | 2025-01-10T16:52:16Z |
| suse-su-2025:0067-1 | Security update for gstreamer-plugins-good | 2025-01-10T16:48:42Z | 2025-01-10T16:48:42Z |
| suse-su-2025:0066-1 | Security update for apptainer | 2025-01-10T14:49:12Z | 2025-01-10T14:49:12Z |
| suse-su-2025:0065-1 | Security update for gstreamer-plugins-base | 2025-01-10T14:42:36Z | 2025-01-10T14:42:36Z |
| suse-su-2025:0064-1 | Security update for gstreamer-plugins-good | 2025-01-10T13:48:33Z | 2025-01-10T13:48:33Z |
| suse-su-2025:0062-1 | Security update for gstreamer | 2025-01-10T12:53:32Z | 2025-01-10T12:53:32Z |
| suse-su-2025:0060-1 | Security update for govulncheck-vulndb | 2025-01-10T11:33:29Z | 2025-01-10T11:33:29Z |
| suse-su-2025:0059-1 | Security update for MozillaFirefox | 2025-01-10T07:36:31Z | 2025-01-10T07:36:31Z |
| suse-su-2025:0056-1 | Security update for MozillaFirefox | 2025-01-09T16:59:11Z | 2025-01-09T16:59:11Z |
| suse-su-2025:0055-1 | Security update for gstreamer-plugins-good | 2025-01-09T16:36:54Z | 2025-01-09T16:36:54Z |
| suse-su-2025:0054-1 | Security update for gstreamer-plugins-base | 2025-01-09T16:36:41Z | 2025-01-09T16:36:41Z |
| suse-su-2025:0053-1 | Security update for gstreamer | 2025-01-09T16:36:08Z | 2025-01-09T16:36:08Z |
| suse-su-2025:0052-1 | Security update for gstreamer-plugins-base | 2025-01-09T16:35:38Z | 2025-01-09T16:35:38Z |
| suse-su-2025:0051-1 | Security update for gstreamer | 2025-01-09T16:35:23Z | 2025-01-09T16:35:23Z |
| suse-su-2025:0050-1 | Security update for libmfx | 2025-01-09T16:07:00Z | 2025-01-09T16:07:00Z |
| suse-su-2025:0049-1 | Security update for python310 | 2025-01-09T15:37:07Z | 2025-01-09T15:37:07Z |
| suse-su-2025:0048-1 | Security update for python312 | 2025-01-09T15:36:51Z | 2025-01-09T15:36:51Z |
| suse-su-2025:0047-1 | Security update for python39 | 2025-01-09T15:36:39Z | 2025-01-09T15:36:39Z |
| suse-su-2025:0044-1 | Security update for openjpeg2 | 2025-01-09T15:04:57Z | 2025-01-09T15:04:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:12578-1 | libosip2-15-5.3.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12577-1 | MozillaFirefox-108.0.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12576-1 | libsystemd0-252.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12575-1 | python310-mitmproxy-9.0.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12574-1 | libsqlite3-0-3.40.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12573-1 | libopenssl-3-devel-3.0.7-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12572-1 | helm-3.10.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12571-1 | MozillaThunderbird-102.6.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12570-1 | xwayland-22.1.5-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12569-1 | xorg-x11-server-21.1.4-6.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12568-1 | libmozjs-102-0-102.6.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12567-1 | jettison-1.5.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12566-1 | chromedriver-108.0.5359.124-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12565-1 | libproc2-0-4.0.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12564-1 | grafana-8.5.15-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12563-1 | python310-3.10.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12562-1 | librpmbuild9-4.18.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12561-1 | xen-4.17.0_02-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12560-1 | kernel-devel-6.0.12-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12559-1 | python39-3.9.16-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12558-1 | containerd-1.6.12-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12557-1 | python310-pycapnp-1.2.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12556-1 | podman-4.3.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12555-1 | phoronix-test-suite-10.8.4-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12554-1 | nodejs-electron-21.3.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12553-1 | go1.19-1.19.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12552-1 | go1.18-1.18.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12551-1 | python310-slixmpp-1.8.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12550-1 | containerd-1.6.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12549-1 | apache-commons-net-3.9.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-joomla-2020-15698 | 2025-04-03T14:10:33.102Z | 2025-04-03T14:40:37.652Z | |
| bit-joomla-2020-15697 | 2025-04-03T14:10:28.588Z | 2025-04-03T14:40:37.652Z | |
| bit-joomla-2020-15696 | 2025-04-03T14:10:24.507Z | 2025-04-03T14:40:37.652Z | |
| bit-joomla-2020-15695 | 2025-04-03T14:10:20.603Z | 2025-04-03T14:40:37.652Z | |
| bit-joomla-2020-13762 | 2025-04-03T14:10:12.607Z | 2025-04-03T14:40:37.652Z | |
| bit-joomla-2020-11891 | 2025-04-03T14:10:00.912Z | 2025-04-03T14:40:37.652Z | |
| bit-joomla-2020-11890 | 2025-04-03T14:09:56.804Z | 2025-04-03T14:40:37.652Z | |
| bit-joomla-2020-11889 | 2025-04-03T14:09:52.491Z | 2025-04-03T14:40:37.652Z | |
| bit-joomla-2020-10243 | 2025-04-03T14:09:48.487Z | 2025-04-03T14:40:37.652Z | |
| bit-joomla-2020-10242 | 2025-04-03T14:09:45.193Z | 2025-04-03T14:40:37.652Z | |
| bit-joomla-2020-10241 | 2025-04-03T14:09:41.599Z | 2025-04-03T14:40:37.652Z | |
| bit-joomla-2020-10240 | 2025-04-03T14:09:37.802Z | 2025-04-03T14:40:37.652Z | |
| bit-joomla-2020-10239 | 2025-04-03T14:09:34.111Z | 2025-04-03T14:40:37.652Z | |
| bit-joomla-2020-10238 | 2025-04-03T14:09:30.406Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2024-47804 | 2024-10-04T07:09:09.019Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2024-47803 | 2024-10-04T07:09:20.135Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2024-43045 | 2024-08-09T07:22:49.547Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2024-43044 | 2024-08-09T07:23:05.050Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2024-23898 | 2024-03-06T10:53:43.665Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2023-43498 | 2024-03-06T10:54:16.360Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2023-43497 | 2024-03-06T10:54:26.403Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2023-43496 | 2024-03-06T10:54:39.081Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2023-43495 | 2024-03-06T10:54:50.968Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2023-43494 | 2024-03-06T10:55:02.887Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2023-39151 | 2024-03-06T10:55:13.466Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2023-35141 | 2024-03-06T10:55:33.188Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2023-27904 | 2024-03-06T10:55:45.766Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2023-27903 | 2024-03-06T10:55:57.289Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2023-27902 | 2024-03-06T10:56:09.492Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2023-27901 | 2024-03-06T10:56:20.197Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-23462 | WordPress插件AllInOne - Banner Rotator SQL注入漏洞 | 2025-09-29 | 2025-10-13 |
| cnvd-2025-23461 | WordPress插件Acclectic Media Organizer授权缺失漏洞 | 2025-09-29 | 2025-10-13 |
| cnvd-2025-23379 | Bank Locker Management System edit-subadmin.php?said=3文件SQL注入漏洞 | 2025-03-26 | 2025-10-11 |
| cnvd-2025-23378 | Bank Locker Management System search-locker-details.php文件SQL注入漏洞 | 2025-03-27 | 2025-10-11 |
| cnvd-2025-23377 | Bank Locker Management System search-report-details.php文件SQL注入漏洞 | 2025-03-28 | 2025-10-11 |
| cnvd-2025-23376 | Bank Locker Management System profile.php文件SQL注入漏洞 | 2025-03-28 | 2025-10-11 |
| cnvd-2025-23375 | Bank Locker Management System edit-locker.php?ltid=6文件SQL注入漏洞 | 2025-03-28 | 2025-10-11 |
| cnvd-2025-23374 | Bank Locker Management System changeimage1.php文件SQL注入漏洞 | 2025-03-28 | 2025-10-11 |
| cnvd-2025-23373 | WordPress插件Advanced Views存在未明漏洞 | 2025-09-25 | 2025-10-11 |
| cnvd-2025-23372 | D-Link DIR-823X命令注入漏洞(CNVD-2025-23372) | 2025-09-29 | 2025-10-11 |
| cnvd-2025-23371 | D-Link DIR-823X命令注入漏洞(CNVD-2025-23371) | 2025-09-29 | 2025-10-11 |
| cnvd-2025-23370 | D-Link DIR-823X命令注入漏洞(CNVD-2025-23370) | 2025-09-29 | 2025-10-11 |
| cnvd-2025-23369 | D-Link DIR-823X命令注入漏洞(CNVD-2025-23369) | 2025-09-29 | 2025-10-11 |
| cnvd-2025-23368 | D-Link DIR-823X命令注入漏洞(CNVD-2025-23368) | 2025-09-29 | 2025-10-11 |
| cnvd-2025-23367 | D-Link DIR-823X命令注入漏洞(CNVD-2025-23367) | 2025-09-29 | 2025-10-11 |
| cnvd-2025-23366 | Doctor Appointment Management System appointment-bwdates-reports-details.php文件SQL注入漏洞 | 2025-03-27 | 2025-10-11 |
| cnvd-2025-23365 | Bank Locker Management System changeidproof.php文件SQL注入漏洞 | 2025-03-28 | 2025-10-11 |
| cnvd-2025-23364 | e-Diary Management System view-note.php文件SQL注入漏洞 | 2025-04-09 | 2025-10-11 |
| cnvd-2025-23363 | e-Diary Management System search-result.php文件SQL注入漏洞 | 2025-04-09 | 2025-10-11 |
| cnvd-2025-23362 | e-Diary Management System registration.php文件SQL注入漏洞 | 2025-04-09 | 2025-10-11 |
| cnvd-2025-23361 | e-Diary Management System password-recovery.php文件SQL注入漏洞 | 2025-04-09 | 2025-10-11 |
| cnvd-2025-23360 | e-Diary Management System login.php文件SQL注入漏洞 | 2025-04-09 | 2025-10-11 |
| cnvd-2025-23359 | e-Diary Management System dashboard.php文件SQL注入漏洞 | 2025-04-09 | 2025-10-11 |
| cnvd-2025-23358 | e-Diary Management System add-notes.php文件SQL注入漏洞 | 2025-04-09 | 2025-10-11 |
| cnvd-2025-23357 | Bank Locker Management System会话劫持漏洞 | 2025-07-30 | 2025-10-11 |
| cnvd-2025-23356 | Pytorch-Lightning代码问题漏洞 | 2025-03-27 | 2025-10-11 |
| cnvd-2025-23355 | PyTorch拒绝服务漏洞(CNVD-2025-23355) | 2025-04-03 | 2025-10-11 |
| cnvd-2025-23354 | PyTorch torch.jit.jit_module_from_flatbuffer函数存在未明漏洞 | 2025-04-08 | 2025-10-11 |
| cnvd-2025-23353 | PyTorch拒绝服务漏洞(CNVD-2025-23353) | 2025-04-25 | 2025-10-11 |
| cnvd-2025-23352 | PyTorch远程命令执行漏洞 | 2025-04-30 | 2025-10-11 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2022-avi-893 | Vulnérabilité dans Apple iOS | 2022-10-11T00:00:00.000000 | 2022-10-11T00:00:00.000000 |
| certfr-2022-avi-892 | Multiples vulnérabilités dans les produits VMWare | 2022-10-10T00:00:00.000000 | 2022-10-10T00:00:00.000000 |
| certfr-2022-avi-891 | Multiples vulnérabilités dans IBM QRadar | 2022-10-10T00:00:00.000000 | 2022-10-10T00:00:00.000000 |
| certfr-2022-avi-890 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2022-10-07T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-avi-889 | Multiples vulnérabilités dans IBM Security QRadar Analyst Workflow | 2022-10-07T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-avi-888 | Vulnérabilité dans les produits F5 | 2022-10-07T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-avi-887 | Multiples vulnérabilités dans Microsoft Edge | 2022-10-07T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-avi-886 | Multiples vulnérabilités dans les produits IBM | 2022-10-06T00:00:00.000000 | 2022-10-06T00:00:00.000000 |
| certfr-2022-avi-885 | Multiples vulnérabilités dans les produits Cisco | 2022-10-06T00:00:00.000000 | 2022-10-06T00:00:00.000000 |
| certfr-2022-avi-884 | Multiples vulnérabilités dans Trend Micro Apex One | 2022-10-06T00:00:00.000000 | 2022-10-06T00:00:00.000000 |
| certfr-2022-avi-883 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2022-10-05T00:00:00.000000 | 2022-10-05T00:00:00.000000 |
| certfr-2022-avi-882 | Multiples vulnérabilités dans OpenSSH | 2022-10-05T00:00:00.000000 | 2022-10-05T00:00:00.000000 |
| certfr-2022-avi-881 | Multiples vulnérabilités dans Google Android | 2022-10-04T00:00:00.000000 | 2022-10-04T00:00:00.000000 |
| certfr-2022-avi-880 | Multiples vulnérabilités dans Microsoft Edge | 2022-10-04T00:00:00.000000 | 2022-10-04T00:00:00.000000 |
| certfr-2022-avi-879 | Vulnérabilité dans strongSwan | 2022-10-04T00:00:00.000000 | 2022-10-04T00:00:00.000000 |
| certfr-2022-avi-878 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2022-10-04T00:00:00.000000 | 2022-10-04T00:00:00.000000 |
| certfr-2022-avi-877 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-10-04T00:00:00.000000 | 2022-10-04T00:00:00.000000 |
| certfr-2022-avi-874 | Multiples vulnérabilités dans Google Chrome | 2022-10-03T00:00:00.000000 | 2022-10-04T00:00:00.000000 |
| certfr-2022-avi-876 | Multiples vulnérabilités dans Microsoft Exchange Server | 2022-10-03T00:00:00.000000 | 2022-10-03T00:00:00.000000 |
| certfr-2022-avi-875 | Multiples vulnérabilités dans le noyau Linux de Debian | 2022-10-03T00:00:00.000000 | 2022-10-03T00:00:00.000000 |
| certfr-2022-avi-873 | Multiples vulnérabilités dans les produits GitLab | 2022-09-30T00:00:00.000000 | 2022-09-30T00:00:00.000000 |
| certfr-2022-avi-872 | Multiples vulnérabilités dans PHP | 2022-09-30T00:00:00.000000 | 2022-09-30T00:00:00.000000 |
| certfr-2022-avi-871 | Multiples vulnérabilités dans les produits IBM | 2022-09-30T00:00:00.000000 | 2022-09-30T00:00:00.000000 |
| certfr-2022-avi-870 | Vulnérabilité dans le noyau Linux de Red Hat | 2022-09-30T00:00:00.000000 | 2022-09-30T00:00:00.000000 |
| certfr-2022-avi-869 | Multiples vulnérabilités dans Thunderbird | 2022-09-30T00:00:00.000000 | 2022-09-30T00:00:00.000000 |
| certfr-2022-avi-868 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-09-30T00:00:00.000000 | 2022-09-30T00:00:00.000000 |
| certfr-2022-avi-867 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2022-09-30T00:00:00.000000 | 2022-09-30T00:00:00.000000 |
| certfr-2022-avi-866 | Vulnérabilité dans Drupal core | 2022-09-29T00:00:00.000000 | 2022-09-29T00:00:00.000000 |
| certfr-2022-avi-865 | Vulnérabilité dans Elastic Cloud Enterprise | 2022-09-29T00:00:00.000000 | 2022-09-29T00:00:00.000000 |
| certfr-2022-avi-864 | Multiples vulnérabilités dans les produits SolarWinds | 2022-09-29T00:00:00.000000 | 2022-09-29T00:00:00.000000 |