Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1459 |
7.2 (3.1)
|
A post-authentication command injection vulnerabi… |
Zyxel |
VMG3625-T50B firmware |
2026-02-24T02:48:35.439Z | 2026-02-26T14:44:10.011Z |
| CVE-2025-40538 |
9.1 (3.1)
|
SolarWinds Serv-U Broken Access Control Remote Code Ex… |
SolarWinds |
Serv-U |
2026-02-24T07:40:12.958Z | 2026-02-26T14:44:09.848Z |
| CVE-2025-40539 |
9.1 (3.1)
|
SolarWinds Serv-U Type Confusion Remote Code Execution… |
SolarWinds |
Serv-U |
2026-02-24T07:40:46.244Z | 2026-02-26T14:44:09.712Z |
| CVE-2025-40540 |
9.1 (3.1)
|
SolarWinds Serv-U Type Confusion Remote Code Execution… |
SolarWinds |
Serv-U |
2026-02-24T07:41:17.517Z | 2026-02-26T14:44:09.561Z |
| CVE-2025-40541 |
9.1 (3.1)
|
SolarWinds Serv-U Insecure Direct Object Reference (ID… |
SolarWinds |
Serv-U |
2026-02-24T07:41:49.921Z | 2026-02-26T14:44:09.404Z |
| CVE-2024-56373 |
N/A
|
Apache Airflow: SSTI to Code Execution in Airflow thro… |
Apache Software Foundation |
Apache Airflow |
2026-02-24T10:06:41.162Z | 2026-02-26T14:44:09.219Z |
| CVE-2026-2777 |
9.8 (3.1)
|
Privilege escalation in the Messaging System component |
Mozilla |
Firefox |
2026-02-24T13:33:12.869Z | 2026-02-26T14:44:09.085Z |
| CVE-2026-2780 |
8.8 (3.1)
|
Privilege escalation in the Netmonitor component |
Mozilla |
Firefox |
2026-02-24T13:33:14.850Z | 2026-02-26T14:44:08.941Z |
| CVE-2026-2782 |
8.8 (3.1)
|
Privilege escalation in the Netmonitor component |
Mozilla |
Firefox |
2026-02-24T13:33:16.262Z | 2026-02-26T14:44:08.795Z |
| CVE-2026-2792 |
9.8 (3.1)
|
Memory safety bugs fixed in Firefox ESR 140.8, Thunder… |
Mozilla |
Firefox |
2026-02-24T13:33:22.842Z | 2026-02-26T14:44:08.644Z |
| CVE-2026-2793 |
9.8 (3.1)
|
Memory safety bugs fixed in Firefox ESR 115.33, Firefo… |
Mozilla |
Firefox |
2026-02-24T13:33:23.571Z | 2026-02-26T14:44:08.469Z |
| CVE-2026-2807 |
9.8 (3.1)
|
Memory safety bugs fixed in Firefox 148 and Thunderbird 148 |
Mozilla |
Firefox |
2026-02-24T13:33:34.035Z | 2026-02-26T14:44:08.263Z |
| CVE-2025-14963 |
6.2 (4.0)
|
A vulnerability identified in the HX Agent driver… |
Trellix |
Endpoint HX Agent (xAgent) |
2026-02-24T17:11:06.812Z | 2026-02-26T14:44:08.034Z |
| CVE-2025-1787 |
5.8 (4.0)
|
Local admin could to leak information from the Ge… |
Genetec Inc. |
Genetec Update Service |
2026-02-24T18:44:36.705Z | 2026-02-26T14:44:07.839Z |
| CVE-2025-1789 |
5.8 (4.0)
|
Local privilege escalation in Genetec Update Serv… |
Genetec Inc. |
Genetec Update Service |
2026-02-24T18:47:24.913Z | 2026-02-26T14:44:07.658Z |
| CVE-2026-22765 |
8.8 (3.1)
|
Dell Wyse Management Suite, versions prior to WMS… |
Dell |
Wyse Management Suite |
2026-02-24T19:24:21.497Z | 2026-02-26T14:44:07.504Z |
| CVE-2026-22766 |
7.2 (3.1)
|
Dell Wyse Management Suite, versions prior to WMS… |
Dell |
Wyse Management Suite |
2026-02-24T19:28:14.566Z | 2026-02-26T14:44:07.365Z |
| CVE-2025-67601 |
8.3 (3.1)
|
Rancher CLI skips TLS verification on Rancher CLI logi… |
SUSE |
rancher |
2026-02-25T10:36:57.771Z | 2026-02-26T14:44:07.081Z |
| CVE-2025-62878 |
9.9 (3.1)
|
Local Path Provisioner vulnerable to Path Traversal vi… |
SUSE |
Rancher |
2026-02-25T10:49:29.596Z | 2026-02-26T14:44:06.924Z |
| CVE-2026-28193 |
8.8 (3.1)
|
In JetBrains YouTrack before 2025.3.121962 apps w… |
JetBrains |
YouTrack |
2026-02-25T12:57:27.463Z | 2026-02-26T14:44:06.777Z |
| CVE-2026-20126 |
8.8 (3.1)
|
Cisco Catalyst SD-WAN Manager Privilege Escalation Vul… |
Cisco |
Cisco Catalyst SD-WAN Manager |
2026-02-25T16:13:58.856Z | 2026-02-26T14:44:06.591Z |
| CVE-2026-20129 |
9.8 (3.1)
|
Cisco Catayst SD-WAN Authentication Bypass Vulnerability |
Cisco |
Cisco Catalyst SD-WAN Manager |
2026-02-25T16:14:09.046Z | 2026-02-26T14:44:06.393Z |
| CVE-2026-20128 |
7.5 (3.1)
|
Cisco Catalyst SD-WAN Manager Information Disclosure V… |
Cisco |
Cisco Catalyst SD-WAN Manager |
2026-02-25T16:14:12.353Z | 2026-02-26T14:44:06.220Z |
| CVE-2026-20127 |
10 (3.1)
|
Cisco Catalyst SD-WAN Controller Authentication Bypass… |
Cisco |
Cisco Catalyst SD-WAN Manager |
2026-02-25T16:14:20.137Z | 2026-02-26T14:44:06.050Z |
| CVE-2026-20036 |
6.5 (3.1)
|
Cisco UCS Manager Software Command Injection Vulnerability |
Cisco |
Cisco Unified Computing System (Managed) |
2026-02-25T16:14:43.296Z | 2026-02-26T14:44:05.885Z |
| CVE-2026-20099 |
6.7 (3.1)
|
Cisco UCS Manager and FXOS Software Command Injection … |
Cisco |
Cisco Firepower Extensible Operating System (FXOS) |
2026-02-25T16:25:38.517Z | 2026-02-26T14:44:05.716Z |
| CVE-2026-21902 |
9.8 (3.1)
9.3 (4.0)
|
Junos OS Evolved: PTX Series: A vulnerability allows a… |
Juniper Networks |
Junos OS Evolved |
2026-02-25T16:59:10.672Z | 2026-02-26T14:44:05.553Z |
| CVE-2026-22720 |
8 (3.1)
|
VMware Aria Operations stored cross-site scripting vul… |
VMware |
VMware Aria Operations |
2026-02-25T19:33:14.729Z | 2026-02-26T14:44:05.372Z |
| CVE-2026-0752 |
8 (3.1)
|
Improper Neutralization of Input During Web Page Gener… |
GitLab |
GitLab |
2026-02-25T20:05:19.818Z | 2026-02-26T14:44:05.136Z |
| CVE-2026-26965 |
8.8 (3.1)
|
FreeRDP has Out-of-bounds Write |
FreeRDP |
FreeRDP |
2026-02-25T20:59:17.828Z | 2026-02-26T14:44:04.865Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2022-31346 |
N/A
|
Online Car Wash Booking System v1.0 is vulnerable… |
n/a |
n/a |
2022-06-01T13:36:17.000Z | 2024-08-03T07:19:05.404Z |
| CVE-2022-31345 |
N/A
|
Online Car Wash Booking System v1.0 is vulnerable… |
n/a |
n/a |
2022-06-01T13:37:30.000Z | 2024-08-03T07:19:05.629Z |
| CVE-2022-31344 |
N/A
|
Online Car Wash Booking System v1.0 is vulnerable… |
n/a |
n/a |
2022-06-01T13:38:55.000Z | 2024-08-03T07:19:05.695Z |
| CVE-2022-31343 |
N/A
|
Online Car Wash Booking System v1.0 is vulnerable… |
n/a |
n/a |
2022-06-01T13:40:10.000Z | 2024-08-03T07:19:05.563Z |
| CVE-2022-31342 |
N/A
|
Online Car Wash Booking System v1.0 is vulnerable… |
n/a |
n/a |
2022-06-01T13:42:05.000Z | 2024-08-03T07:19:05.528Z |
| CVE-2026-25639 |
7.5 (3.1)
|
Axios affected by Denial of Service via __proto__ Key … |
axios |
axios |
2026-02-09T20:11:22.374Z | 2026-02-18T17:16:16.391Z |
| CVE-2023-6546 |
7 (3.1)
|
Kernel: gsm multiplexing race condition leads to privi… |
Red Hat |
Red Hat Enterprise Linux 8 |
2023-12-21T20:01:03.217Z | 2026-02-18T17:14:39.905Z |
| CVE-2023-6270 |
7 (3.1)
|
Kernel: aoe: improper reference count leads to use-aft… |
Red Hat |
Red Hat Enterprise Linux 6 |
2024-01-04T17:01:51.165Z | 2026-02-18T17:15:03.341Z |
| CVE-2023-5178 |
8.8 (3.1)
|
Kernel: use after free in nvmet_tcp_free_crypto in nvme |
Red Hat |
Red Hat Enterprise Linux 8 |
2023-11-01T16:32:20.350Z | 2026-02-18T17:14:34.116Z |
| CVE-2023-4194 |
5.5 (3.1)
|
Kernel: tap: tap_open(): correctly initialize socket u… |
Red Hat |
Red Hat Enterprise Linux 9 |
2023-08-07T13:19:44.215Z | 2026-02-18T17:16:51.343Z |
| CVE-2023-39198 |
7.5 (3.1)
|
Kernel: qxl: race condition leading to use-after-free … |
Red Hat |
Red Hat Enterprise Linux 8 |
2023-11-09T19:15:47.605Z | 2026-02-18T17:15:18.148Z |
| CVE-2023-33951 |
6.7 (3.1)
|
Kernel: vmwgfx: race condition leading to information … |
Red Hat |
Red Hat Enterprise Linux 8 |
2023-07-24T15:19:24.967Z | 2026-02-18T19:19:06.849Z |
| CVE-2023-29131 |
7.4 (3.1)
|
A vulnerability has been identified in SIMATIC CN… |
Siemens |
SIMATIC CN 4100 |
2023-07-11T09:07:07.238Z | 2024-11-12T17:00:15.582Z |
| CVE-2023-29130 |
9.9 (3.1)
|
A vulnerability has been identified in SIMATIC CN… |
Siemens |
SIMATIC CN 4100 |
2023-07-11T09:07:06.193Z | 2024-11-12T17:03:34.510Z |
| CVE-2025-66624 |
7.5 (3.1)
|
BACnet-stack MS/TP reply matcher OOB read |
bacnet-stack |
bacnet-stack |
2025-12-05T18:36:26.280Z | 2025-12-08T17:28:39.912Z |
| CVE-2026-25585 |
7.8 (3.1)
|
iccDEV vulnerable to OOB in CIccXform3DLut::Apply() |
InternationalColorConsortium |
iccDEV |
2026-02-04T22:13:30.803Z | 2026-02-05T15:07:43.492Z |
| CVE-2025-64111 |
9.3 (4.0)
|
Gogs's update .git/config file allows remote command e… |
gogs |
gogs |
2026-02-06T16:58:01.853Z | 2026-02-26T15:04:16.022Z |
| CVE-2020-37125 |
9.3 (4.0)
9.8 (3.1)
|
Edimax Technology EW-7438RPn-v3 Mini 1.27 - Remote Cod… |
EDIMAX Technology |
EW-7438RPn Mini |
2026-02-05T16:13:32.799Z | 2026-02-05T21:20:25.972Z |
| CVE-2020-37149 |
5.1 (4.0)
8.1 (3.1)
|
Edimax Technology EW-7438RPn-v3 Mini 1.27 - Cross-Site… |
EDIMAX Technology |
EW-7438RPn Mini |
2026-02-05T16:13:42.106Z | 2026-02-05T17:26:20.988Z |
| CVE-2026-25123 |
5.3 (3.1)
|
Homarr affected by Unauthenticated SSRF / Port-Scan Pr… |
homarr-labs |
homarr |
2026-02-06T21:19:40.212Z | 2026-02-09T15:27:03.275Z |
| CVE-2026-25881 |
9.1 (3.1)
|
@nyariv/sandboxjs has host prototype pollution from sa… |
nyariv |
SandboxJS |
2026-02-09T21:12:58.981Z | 2026-02-10T15:58:08.474Z |
| CVE-2024-25846 |
9.1 (3.1)
|
In the module "Product Catalog (CSV, Excel) Impor… |
n/a |
n/a |
2024-02-27T00:00:00.000Z | 2024-08-08T20:10:19.815Z |
| CVE-2023-39677 |
N/A
|
MyPrestaModules Prestashop Module v6.2.9 and Upda… |
n/a |
n/a |
2023-09-20T00:00:00.000Z | 2024-09-25T14:21:56.390Z |
| CVE-2023-39675 |
N/A
|
SimpleImportProduct Prestashop Module v6.2.9 was … |
n/a |
n/a |
2023-09-20T00:00:00.000Z | 2024-09-25T14:22:34.115Z |
| CVE-2026-26268 |
8.1 (3.1)
|
Cursor sandbox escape via Git hooks |
cursor |
cursor |
2026-02-13T16:54:04.712Z | 2026-02-13T21:12:35.045Z |
| CVE-2020-37150 |
8.7 (4.0)
7.5 (3.1)
|
Edimax Technology EW-7438RPn-v3 Mini 1.27 - Unauthoriz… |
EDIMAX Technology |
EW-7438RPn Mini |
2026-02-05T16:13:42.574Z | 2026-02-05T16:46:43.306Z |
| CVE-2026-25847 |
8.2 (3.1)
|
In JetBrains PyCharm before 2025.3.2 a DOM-based … |
JetBrains |
PyCharm |
2026-02-09T10:39:00.791Z | 2026-02-26T15:04:15.134Z |
| CVE-2026-25848 |
9.1 (3.1)
|
In JetBrains Hub before 2025.3.119807 authenticat… |
JetBrains |
Hub |
2026-02-09T10:39:02.452Z | 2026-02-26T15:04:14.813Z |
| CVE-2026-0714 |
7 (4.0)
|
A physical attack vulnerability exists in certain… |
Moxa |
UC-1200A Series |
2026-02-05T16:58:50.181Z | 2026-02-05T17:28:18.287Z |
| CVE-2026-2469 |
7.6 (3.1)
|
Versions of the package directorytree/imapengine … |
n/a |
directorytree/imapengine |
2026-02-14T05:00:05.646Z | 2026-02-17T20:01:40.343Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2024-25846 | In the module "Product Catalog (CSV, Excel) Import" (simpleimportproduct) <= 6.7.0 from MyPrestaMod… | 2024-02-27T17:15:12.287 | 2026-02-18T17:59:41.517 |
| fkie_cve-2023-39677 | MyPrestaModules Prestashop Module v6.2.9 and UpdateProducts Prestashop Module v3.6.9 were discovere… | 2023-09-20T21:15:11.627 | 2026-02-18T17:59:41.517 |
| fkie_cve-2023-39675 | SimpleImportProduct Prestashop Module v6.2.9 was discovered to contain a SQL injection vulnerabilit… | 2023-09-20T22:15:13.243 | 2026-02-18T17:59:41.517 |
| fkie_cve-2026-26268 | Cursor is a code editor built for programming with AI. Sandbox escape via writing .git configuratio… | 2026-02-13T17:16:14.227 | 2026-02-18T17:59:35.067 |
| fkie_cve-2020-37150 | Edimax EW-7438RPn-v3 Mini 1.27 allows unauthenticated attackers to access the /wizard_reboot.asp pa… | 2026-02-05T17:16:10.730 | 2026-02-18T17:57:00.387 |
| fkie_cve-2026-25847 | In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter viewer page was possible | 2026-02-09T11:16:15.003 | 2026-02-18T17:56:53.790 |
| fkie_cve-2026-25848 | In JetBrains Hub before 2025.3.119807 authentication bypass allowing administrative actions was possible | 2026-02-09T11:16:15.150 | 2026-02-18T17:56:13.647 |
| fkie_cve-2026-0714 | A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS f… | 2026-02-05T17:16:13.203 | 2026-02-18T17:55:46.557 |
| fkie_cve-2026-2469 | Versions of the package directorytree/imapengine before 1.22.3 are vulnerable to Improper Neutraliz… | 2026-02-14T05:16:22.270 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23173 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: TC, delete flows on… | 2026-02-14T16:15:57.560 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23172 | In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: fix potential… | 2026-02-14T16:15:57.457 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23171 | In the Linux kernel, the following vulnerability has been resolved: bonding: fix use-after-free du… | 2026-02-14T16:15:57.353 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23170 | In the Linux kernel, the following vulnerability has been resolved: drm/imx/tve: fix probe device … | 2026-02-14T16:15:57.247 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23168 | In the Linux kernel, the following vulnerability has been resolved: flex_proportions: make fprop_n… | 2026-02-14T16:15:57.023 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23167 | In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix race between rfk… | 2026-02-14T16:15:56.910 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23166 | In the Linux kernel, the following vulnerability has been resolved: ice: Fix NULL pointer derefere… | 2026-02-14T16:15:56.797 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23165 | In the Linux kernel, the following vulnerability has been resolved: sfc: fix deadlock in RSS confi… | 2026-02-14T16:15:56.693 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23164 | In the Linux kernel, the following vulnerability has been resolved: rocker: fix memory leak in roc… | 2026-02-14T16:15:56.590 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23163 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix NULL pointer d… | 2026-02-14T16:15:56.483 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23162 | In the Linux kernel, the following vulnerability has been resolved: drm/xe/nvm: Fix double-free on… | 2026-02-14T16:15:56.383 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23161 | In the Linux kernel, the following vulnerability has been resolved: mm/shmem, swap: fix race of tr… | 2026-02-14T16:15:56.277 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23160 | In the Linux kernel, the following vulnerability has been resolved: octeon_ep: Fix memory leak in … | 2026-02-14T16:15:56.177 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23159 | In the Linux kernel, the following vulnerability has been resolved: perf: sched: Fix perf crash wi… | 2026-02-14T16:15:56.070 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23158 | In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix UAF in con… | 2026-02-14T16:15:55.967 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23157 | In the Linux kernel, the following vulnerability has been resolved: btrfs: do not strictly require… | 2026-02-14T16:15:55.863 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23156 | In the Linux kernel, the following vulnerability has been resolved: efivarfs: fix error propagatio… | 2026-02-14T16:15:55.760 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23155 | In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-02-14T16:15:55.653 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23154 | In the Linux kernel, the following vulnerability has been resolved: net: fix segmentation of forwa… | 2026-02-14T16:15:55.550 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23153 | In the Linux kernel, the following vulnerability has been resolved: firewire: core: fix race condi… | 2026-02-14T16:15:55.443 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-23152 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly deco… | 2026-02-14T16:15:55.340 | 2026-02-18T17:52:44.520 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-jf8c-97vf-m8j5 |
6.9 (4.0)
|
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This pro… | 2026-02-09T06:30:28Z | 2026-02-09T06:30:28Z |
| ghsa-h4q7-r4fx-5q4m |
2.4 (3.1)
1.9 (4.0)
|
A weakness has been identified in code-projects for Plugin 1.0. This affects an unknown part of the… | 2026-02-09T06:30:28Z | 2026-02-09T06:30:28Z |
| ghsa-gx8g-pw4x-wmmv |
2.1 (4.0)
|
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This pro… | 2026-02-09T06:30:28Z | 2026-02-09T06:30:28Z |
| ghsa-g656-6xfv-vcqx |
6.3 (4.0)
|
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The resp… | 2026-02-09T06:30:28Z | 2026-02-09T06:30:28Z |
| ghsa-fp59-gwjf-4gq6 |
5.7 (3.1)
|
The server identity check mechanism for firmware upgrade performed via command shell is insecurely … | 2026-02-09T06:30:28Z | 2026-02-09T06:30:28Z |
| ghsa-7mvw-jq5j-mjx4 |
8.8 (4.0)
|
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This pro… | 2026-02-09T06:30:28Z | 2026-02-09T06:30:28Z |
| ghsa-6gwc-xrpv-xj38 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in itsourcecode Event Management System 1.0. The impacted element is an u… | 2026-02-09T06:30:28Z | 2026-02-09T06:30:28Z |
| ghsa-4rf7-rfqf-gw8j |
3.7 (3.1)
2.9 (4.0)
|
A vulnerability was detected in rachelos WeRSS we-mp-rss up to 1.4.8. This issue affects some unkno… | 2026-02-09T06:30:28Z | 2026-02-09T06:30:28Z |
| ghsa-4r8r-m45w-c7cj |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in D-Link DCS-933L up to 1.14.11. This affects an unknown function o… | 2026-02-09T06:30:28Z | 2026-02-09T06:30:28Z |
| ghsa-46vf-j75v-84xj |
6.9 (4.0)
|
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Detailed m… | 2026-02-09T06:30:28Z | 2026-02-09T06:30:28Z |
| ghsa-3fmv-v8mj-99r5 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was identified in code-projects Online Music Site 1.0. Affected by this vulnerabili… | 2026-02-09T06:30:28Z | 2026-02-09T06:30:28Z |
| ghsa-264x-w2cv-phgq |
4.7 (3.1)
2.0 (4.0)
|
A security flaw has been discovered in code-projects Online Music Site 1.0. Affected by this issue … | 2026-02-09T06:30:28Z | 2026-02-09T06:30:28Z |
| ghsa-qg2g-5gcg-rch7 |
2.1 (4.0)
|
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Since th… | 2026-02-09T06:30:27Z | 2026-02-09T06:30:27Z |
| ghsa-pv6p-86wr-j7hp |
6.9 (4.0)
|
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Physical… | 2026-02-09T06:30:27Z | 2026-02-09T06:30:27Z |
| ghsa-pc5p-g2cg-mr66 |
6.3 (4.0)
|
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This pro… | 2026-02-09T06:30:27Z | 2026-02-09T06:30:27Z |
| ghsa-g8q7-r3f2-x8cw |
2.1 (4.0)
|
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web … | 2026-02-09T06:30:27Z | 2026-02-09T06:30:27Z |
| ghsa-8582-9v9f-8xjx |
8.8 (4.0)
|
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This pro… | 2026-02-09T06:30:27Z | 2026-02-09T06:30:27Z |
| ghsa-84hr-4cwh-x64m |
2.1 (4.0)
|
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The libr… | 2026-02-09T06:30:27Z | 2026-02-09T06:30:27Z |
| ghsa-55cf-6jj6-233p |
6.9 (4.0)
|
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web … | 2026-02-09T06:30:27Z | 2026-02-09T06:30:27Z |
| ghsa-q922-v4r9-2x72 |
7.2 (3.1)
7.3 (4.0)
|
A vulnerability has been found in D-Link DIR-823X 250416. This affects the function sub_4211C8 of t… | 2026-02-09T03:31:16Z | 2026-02-09T03:31:16Z |
| ghsa-xhf6-49gh-77cw |
2.4 (3.1)
1.9 (4.0)
|
A weakness has been identified in heyewei JFinalCMS 5.0.0. This affects an unknown function of the … | 2026-02-09T03:31:15Z | 2026-02-09T03:31:15Z |
| ghsa-x4hh-75v6-mcw6 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was determined in code-projects Online Reviewer System 1.0. Impacted is an unknown … | 2026-02-09T03:31:15Z | 2026-02-09T03:31:15Z |
| ghsa-pqj4-4247-4fhc |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in code-projects Online Reviewer System 1.0. This issue affects some unkn… | 2026-02-09T03:31:15Z | 2026-02-09T03:31:15Z |
| ghsa-jq2x-3px8-wfh6 |
2.4 (3.1)
1.9 (4.0)
|
A security vulnerability has been detected in ZeroWdd studentmanager up to 2151560fc0a50ec00426785e… | 2026-02-09T03:31:15Z | 2026-02-09T03:31:15Z |
| ghsa-hxf8-xcpr-jpxf |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was identified in code-projects Online Reviewer System 1.0. The affected element is… | 2026-02-09T03:31:15Z | 2026-02-09T03:31:15Z |
| ghsa-f887-3rq8-49xw |
7.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in code-projects Online Reviewer System 1.0. The impacted eleme… | 2026-02-09T03:31:15Z | 2026-02-09T03:31:15Z |
| ghsa-7c2w-rcv7-7qf9 |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was detected in Tenda AC8 16.03.33.05. Affected is the function fromSetWifiGusetBas… | 2026-02-09T03:31:15Z | 2026-02-09T03:31:15Z |
| ghsa-527g-r3hr-w3j8 |
8.8 (3.1)
7.4 (4.0)
|
A flaw has been found in Tenda AC8 16.03.33.05. Affected by this vulnerability is an unknown functi… | 2026-02-09T03:31:15Z | 2026-02-09T03:31:15Z |
| ghsa-vwhp-x6px-ffxf |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability has been found in code-projects Online Reviewer System 1.0. This vulnerability affe… | 2026-02-09T00:30:29Z | 2026-02-09T00:30:29Z |
| ghsa-w4cm-cm57-x2hp |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was identified in itsourcecode School Management System 1.0. This affects an unknow… | 2026-02-09T00:30:28Z | 2026-02-09T00:30:28Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-3221 | A vulnerability classified as critical was found in SourceCodester PHP Task Management Sy… | 2024-04-03T05:02:29.941387Z |
| gsd-2024-3080 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.941098Z |
| gsd-2024-3155 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.940902Z |
| gsd-2024-3052 | Malformed S2 Nonce Get command classes can be sent to crash the gateway. A hard reset is… | 2024-04-03T05:02:29.940701Z |
| gsd-2024-3175 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.940499Z |
| gsd-2024-3174 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.940289Z |
| gsd-2024-3092 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.9 be… | 2024-04-03T05:02:29.940077Z |
| gsd-2024-3207 | A vulnerability was found in ermig1979 Simd up to 6.0.134. It has been declared as critic… | 2024-04-03T05:02:29.939423Z |
| gsd-2024-3204 | A vulnerability has been found in c-blosc2 up to 2.13.2 and classified as critical. Affec… | 2024-04-03T05:02:29.938630Z |
| gsd-2024-3185 | A key used in logging.json does not follow the least privilege principle by default and … | 2024-04-03T05:02:29.938351Z |
| gsd-2024-3038 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.938110Z |
| gsd-2024-3228 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.937915Z |
| gsd-2024-3215 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.937717Z |
| gsd-2024-3212 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.937516Z |
| gsd-2024-3043 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.937319Z |
| gsd-2024-3233 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.937122Z |
| gsd-2024-3190 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.936919Z |
| gsd-2024-3188 | The WP Shortcodes Plugin — Shortcodes Ultimate WordPress plugin before 7.1.0 does not val… | 2024-04-03T05:02:29.936707Z |
| gsd-2024-3226 | A vulnerability was found in Campcodes Online Patient Record Management System 1.0. It ha… | 2024-04-03T05:02:29.936043Z |
| gsd-2024-3230 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.935760Z |
| gsd-2024-3241 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.935556Z |
| gsd-2024-3103 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.935273Z |
| gsd-2024-3006 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.934735Z |
| gsd-2024-3021 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.934444Z |
| gsd-2024-3149 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.934221Z |
| gsd-2024-3085 | A vulnerability classified as critical has been found in PHPGurukul Emergency Ambulance H… | 2024-04-03T05:02:29.933542Z |
| gsd-2024-3042 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.932954Z |
| gsd-2024-3203 | A vulnerability, which was classified as critical, was found in c-blosc2 up to 2.13.2. Af… | 2024-04-03T05:02:29.932201Z |
| gsd-2024-3209 | A vulnerability was found in UPX up to 4.2.2. It has been rated as critical. This issue a… | 2024-04-03T05:02:29.931430Z |
| gsd-2024-3050 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.931134Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191665 | Malicious code in windowsrequir (PyPI) | 2025-10-26T19:27:04Z | 2025-12-03T00:04:28Z |
| mal-2025-191664 | Malicious code in unclesky5910 (PyPI) | 2025-10-19T16:45:35Z | 2025-12-03T00:04:28Z |
| mal-2025-191663 | Malicious code in syschecker (PyPI) | 2025-10-26T19:28:00Z | 2025-12-03T00:04:28Z |
| mal-2025-191659 | Malicious code in rizco09 (PyPI) | 2025-10-19T16:29:09Z | 2025-12-03T00:04:28Z |
| mal-2025-191657 | Malicious code in requests-os (PyPI) | 2025-10-22T16:22:18Z | 2025-12-03T00:04:28Z |
| mal-2025-939 | Malicious code in kotlin-stdlib-jdk8 (PyPI) | 2024-11-29T13:03:21Z | 2025-12-03T00:04:27Z |
| mal-2025-48891 | Malicious code in final-osint (PyPI) | 2025-09-22T19:28:09Z | 2025-12-03T00:04:27Z |
| mal-2025-48890 | Malicious code in emoted (PyPI) | 2025-10-02T05:41:39Z | 2025-12-03T00:04:27Z |
| mal-2025-47820 | Malicious code in propeller-solver-core (PyPI) | 2025-09-28T15:35:42Z | 2025-12-03T00:04:27Z |
| mal-2025-47796 | Malicious code in python-amazon-doc-utils (PyPI) | 2025-08-20T16:30:57Z | 2025-12-03T00:04:27Z |
| mal-2025-47794 | Malicious code in py-sys-utils (PyPI) | 2025-08-23T17:37:17Z | 2025-12-03T00:04:27Z |
| mal-2025-47793 | Malicious code in pacakegenow (PyPI) | 2025-08-21T09:13:24Z | 2025-12-03T00:04:27Z |
| mal-2025-47792 | Malicious code in osanlizer (PyPI) | 2025-08-29T18:41:35Z | 2025-12-03T00:04:27Z |
| mal-2025-47791 | Malicious code in nukeport (PyPI) | 2025-08-22T20:53:00Z | 2025-12-03T00:04:27Z |
| mal-2025-47790 | Malicious code in nukecount (PyPI) | 2025-08-20T15:45:03Z | 2025-12-03T00:04:27Z |
| mal-2025-47789 | Malicious code in nukebount (PyPI) | 2025-08-22T20:54:40Z | 2025-12-03T00:04:27Z |
| mal-2025-47787 | Malicious code in mevguard (PyPI) | 2025-09-14T13:24:21Z | 2025-12-03T00:04:27Z |
| mal-2025-47786 | Malicious code in medoen (PyPI) | 2025-08-21T09:14:01Z | 2025-12-03T00:04:27Z |
| mal-2025-47785 | Malicious code in lolcrazy (PyPI) | 2025-08-21T15:30:55Z | 2025-12-03T00:04:27Z |
| mal-2025-47781 | Malicious code in krakenvirus (PyPI) | 2025-08-28T22:07:34Z | 2025-12-03T00:04:27Z |
| mal-2025-47780 | Malicious code in kraken-virus (PyPI) | 2025-08-28T22:26:27Z | 2025-12-03T00:04:27Z |
| mal-2025-47779 | Malicious code in kimportsetup (PyPI) | 2025-08-24T08:29:02Z | 2025-12-03T00:04:27Z |
| mal-2025-47776 | Malicious code in k7eeel (PyPI) | 2025-08-21T09:08:07Z | 2025-12-03T00:04:27Z |
| mal-2025-47774 | Malicious code in importsetup (PyPI) | 2025-08-21T15:30:01Z | 2025-12-03T00:04:27Z |
| mal-2025-47773 | Malicious code in iamenumerat (PyPI) | 2025-08-28T18:45:22Z | 2025-12-03T00:04:27Z |
| mal-2025-47772 | Malicious code in hydenmj (PyPI) | 2025-08-24T14:02:51Z | 2025-12-03T00:04:27Z |
| mal-2025-47771 | Malicious code in hacktool (PyPI) | 2025-08-21T15:33:04Z | 2025-12-03T00:04:27Z |
| mal-2025-47770 | Malicious code in fuckyoubitch (PyPI) | 2025-08-24T08:30:15Z | 2025-12-03T00:04:27Z |
| mal-2025-47769 | Malicious code in fucknukerbro (PyPI) | 2025-08-24T08:29:50Z | 2025-12-03T00:04:27Z |
| mal-2025-47768 | Malicious code in fucknuker (PyPI) | 2025-08-24T08:31:35Z | 2025-12-03T00:04:27Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-2269 | vim: Schwachstelle ermöglicht Codeausführung, Dos oder Speicheränderung | 2023-09-05T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2249 | vim: Mehrere Schwachstellen | 2023-09-03T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-1170 | vim: Mehrere Schwachstellen ermöglichen Denial of Service und Codeausführung | 2023-05-09T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-0566 | vim: Mehrere Schwachstellen | 2023-03-05T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-0025 | vim: Mehrere Schwachstellen | 2023-01-04T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-2177 | vim: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-11-27T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1584 | vim: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-09-29T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1324 | vim: Schwachstelle ermöglicht Codeausführung | 2022-09-06T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1284 | vim: Schwachstelle ermöglicht Codeausführung | 2022-09-04T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1127 | vim: Schwachstelle ermöglicht Codeausführung | 2021-12-29T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1126 | vim: Schwachstelle ermöglicht Codeausführung | 2021-12-28T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0909 | IBM DB2: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-08-03T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0790 | Linux Kernel: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-01-10T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0583 | vim: Schwachstelle ermöglicht Manipulation von Speicher | 2022-07-05T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0397 | vim: Mehrere Schwachstellen | 2022-06-19T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0369 | vim: Schwachstelle ermöglicht Codeausführung | 2022-06-16T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0349 | vim: Mehrere Schwachstellen | 2021-12-01T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0345 | vim: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2021-10-19T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0248 | vim: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-01-24T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0132 | vim: Schwachstelle ermöglicht Codeausführung | 2022-05-31T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0124 | vim: Mehrere Schwachstellen | 2022-05-08T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0107 | vim: Schwachstelle ermöglicht Codeausführung | 2022-02-14T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0059 | vim: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Benutzerrechten | 2022-02-02T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0056 | vim: Mehrere Schwachstellen | 2022-01-30T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0054 | vim: Mehrere Schwachstellen | 2022-01-26T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-0652 | Shibboleth Identity Provider: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-03-27T23:00:00.000+00:00 | 2025-03-27T23:00:00.000+00:00 |
| wid-sec-w-2025-0648 | JetBrains TeamCity: Mehrere Schwachstellen | 2025-03-27T23:00:00.000+00:00 | 2025-03-27T23:00:00.000+00:00 |
| wid-sec-w-2024-1725 | Apple macOS: Mehrere Schwachstellen | 2024-07-29T22:00:00.000+00:00 | 2025-03-27T23:00:00.000+00:00 |
| wid-sec-w-2025-0646 | Devolutions Remote Desktop Manager: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-03-26T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0644 | IBM App Connect Enterprise: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-03-26T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:5360 | Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update | 2023-09-26T14:59:37+00:00 | 2026-02-03T19:50:18+00:00 |
| rhsa-2023:4341 | Red Hat Security Advisory: Logging Subsystem 5.7.4 - Red Hat OpenShift bug fix and security update | 2023-08-02T13:49:36+00:00 | 2026-02-03T19:50:16+00:00 |
| rhsa-2022:0308 | Red Hat Security Advisory: OpenShift Container Storage 3.11.z security and bug fix update | 2022-01-27T13:14:43+00:00 | 2026-02-03T19:49:04+00:00 |
| rhsa-2021:4226 | Red Hat Security Advisory: grafana security, bug fix, and enhancement update | 2021-11-09T18:42:22+00:00 | 2026-02-03T19:48:56+00:00 |
| rhsa-2021:4103 | Red Hat Security Advisory: OpenShift Virtualization 4.9.0 RPMs security and bug fix update | 2021-11-02T17:36:11+00:00 | 2026-02-03T19:48:56+00:00 |
| rhsa-2021:2437 | Red Hat Security Advisory: OpenShift Container Platform 4.8.2 packages and security update | 2021-07-27T22:36:55+00:00 | 2026-02-03T19:48:56+00:00 |
| rhsa-2021:2021 | Red Hat Security Advisory: Release of OpenShift Serverless 1.10.2 security update | 2021-05-19T04:00:43+00:00 | 2026-02-03T19:48:55+00:00 |
| rhsa-2021:3748 | Red Hat Security Advisory: OpenShift Container Storage 3.11.z Container Images Security and Bug Fix Update | 2021-10-07T14:17:37+00:00 | 2026-02-03T19:48:54+00:00 |
| rhsa-2021:3119 | Red Hat Security Advisory: OpenShift Virtualization 2.6.6 Images security and bug fix update | 2021-08-10T17:32:31+00:00 | 2026-02-03T19:48:53+00:00 |
| rhsa-2021:1746 | Red Hat Security Advisory: go-toolset:rhel8 security, bug fix, and enhancement update | 2021-05-18T16:08:10+00:00 | 2026-02-03T19:48:53+00:00 |
| rhsa-2021:2095 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.14.1 security update | 2021-05-24T16:07:39+00:00 | 2026-02-03T19:48:52+00:00 |
| rhsa-2021:2093 | Red Hat Security Advisory: Release of OpenShift Serverless 1.14.1 security update | 2021-05-24T13:04:23+00:00 | 2026-02-03T19:48:51+00:00 |
| rhsa-2021:1339 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.14.0 and security update | 2021-04-22T18:20:37+00:00 | 2026-02-03T19:48:49+00:00 |
| rhsa-2021:1338 | Red Hat Security Advisory: Release of OpenShift Serverless 1.14.0 security update | 2021-04-22T19:07:25+00:00 | 2026-02-03T19:48:49+00:00 |
| rhsa-2021:1006 | Red Hat Security Advisory: OpenShift Container Platform 4.7.5 security and bug fix update | 2021-04-05T13:18:31+00:00 | 2026-02-03T19:48:48+00:00 |
| rhsa-2021:0958 | Red Hat Security Advisory: OpenShift Container Platform 4.7.4 security update | 2021-03-30T04:22:21+00:00 | 2026-02-03T19:48:48+00:00 |
| rhsa-2021:0957 | Red Hat Security Advisory: OpenShift Container Platform 4.7.4 security update | 2021-03-30T04:45:43+00:00 | 2026-02-03T19:48:47+00:00 |
| rhba-2021:1522 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6.29 security update | 2021-05-20T12:03:47+00:00 | 2026-02-03T19:48:42+00:00 |
| rhba-2021:1167 | Red Hat Bug Fix Advisory: Openshift Logging Bug Fix Release (5.0.2) | 2021-04-12T18:02:50+00:00 | 2026-02-03T19:48:41+00:00 |
| rhba-2021:0959 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.4 extras update | 2021-03-30T05:04:34+00:00 | 2026-02-03T19:48:40+00:00 |
| rhsa-2023:4694 | Red Hat Security Advisory: Release of containers for OSP 16.2.z (Train) director Operator | 2023-08-22T00:09:37+00:00 | 2026-02-03T19:44:38+00:00 |
| rhsa-2023:3610 | Red Hat Security Advisory: jenkins and jenkins-2-plugins security update | 2023-06-15T00:17:42+00:00 | 2026-02-03T19:44:38+00:00 |
| rhsa-2023:4582 | Red Hat Security Advisory: Release of containers for Red Hat OpenStack Platform 17.1 director Operator | 2023-08-16T00:19:46+00:00 | 2026-02-03T19:44:34+00:00 |
| rhsa-2023:4053 | Red Hat Security Advisory: OpenShift Container Platform 4.11.45 bug fix and security update | 2023-07-19T01:16:20+00:00 | 2026-02-03T19:44:33+00:00 |
| rhsa-2023:6403 | Red Hat Security Advisory: httpd and mod_http2 security, bug fix, and enhancement update | 2023-11-07T08:33:03+00:00 | 2026-02-03T19:43:48+00:00 |
| rhsa-2023:7672 | Red Hat Security Advisory: OpenShift Virtualization 4.14.1 RPMs security and bug fix update | 2023-12-06T14:39:54+00:00 | 2026-02-03T19:40:05+00:00 |
| rhsa-2023:6380 | Red Hat Security Advisory: runc security update | 2023-11-07T08:47:52+00:00 | 2026-02-03T19:40:05+00:00 |
| rhsa-2023:6316 | Red Hat Security Advisory: pcs security, bug fix, and enhancement update | 2023-11-07T08:32:01+00:00 | 2026-02-03T19:40:03+00:00 |
| rhsa-2023:3303 | Red Hat Security Advisory: OpenShift Container Platform 4.13.1 packages and security update | 2023-05-30T20:28:17+00:00 | 2026-02-03T19:39:39+00:00 |
| rhsa-2023:1744 | Red Hat Security Advisory: rh-nodejs14-nodejs security, bug fix, and enhancement update | 2023-04-12T15:10:50+00:00 | 2026-02-03T19:39:34+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-20809 | Windows Kernel Memory Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20808 | Windows File Explorer Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20804 | Windows Hello Tampering Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20803 | Microsoft SQL Server Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-0386 | Windows Deployment Services Remote Code Execution Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-0719 | Libsoup: signed to unsigned conversion error leading to stack-based buffer overflow in libsoup ntlm authentication | 2026-01-02T00:00:00.000Z | 2026-01-13T01:45:18.000Z |
| msrc_cve-2025-39756 | fs: Prevent file descriptor table allocations exceeding INT_MAX | 2025-09-02T00:00:00.000Z | 2026-01-13T01:45:03.000Z |
| msrc_cve-2025-38696 | MIPS: Don't crash in stack_top() for tasks without ABI or vDSO | 2025-09-02T00:00:00.000Z | 2026-01-13T01:44:34.000Z |
| msrc_cve-2025-38687 | comedi: fix race between polling and detaching | 2025-09-02T00:00:00.000Z | 2026-01-13T01:44:19.000Z |
| msrc_cve-2025-39736 | mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock | 2025-09-02T00:00:00.000Z | 2026-01-13T01:44:14.000Z |
| msrc_cve-2025-38714 | hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() | 2025-09-02T00:00:00.000Z | 2026-01-13T01:44:09.000Z |
| msrc_cve-2025-68972 | In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line. | 2025-12-02T00:00:00.000Z | 2026-01-13T01:44:08.000Z |
| msrc_cve-2025-38711 | smb/server: avoid deadlock when linking with ReplaceIfExists | 2025-09-02T00:00:00.000Z | 2026-01-13T01:44:03.000Z |
| msrc_cve-2025-38707 | fs/ntfs3: Add sanity check for file name | 2025-09-02T00:00:00.000Z | 2026-01-13T01:43:57.000Z |
| msrc_cve-2025-68376 | coresight: ETR: Fix ETR buffer use-after-free issue | 2025-12-02T00:00:00.000Z | 2026-01-13T01:43:52.000Z |
| msrc_cve-2025-38581 | crypto: ccp - Fix crash when rebind ccp device for ccp.ko | 2025-08-02T00:00:00.000Z | 2026-01-13T01:43:52.000Z |
| msrc_cve-2025-68727 | ntfs3: Fix uninit buffer allocated by __getname() | 2025-12-02T00:00:00.000Z | 2026-01-13T01:43:46.000Z |
| msrc_cve-2025-68364 | ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent() | 2025-12-02T00:00:00.000Z | 2026-01-13T01:43:41.000Z |
| msrc_cve-2025-38578 | f2fs: fix to avoid UAF in f2fs_sync_inode_meta() | 2025-08-02T00:00:00.000Z | 2026-01-13T01:43:41.000Z |
| msrc_cve-2025-38577 | f2fs: fix to avoid panic in f2fs_evict_inode | 2025-08-02T00:00:00.000Z | 2026-01-13T01:43:35.000Z |
| msrc_cve-2025-38576 | powerpc/eeh: Make EEH driver device hotplug safe | 2025-08-02T00:00:00.000Z | 2026-01-13T01:43:30.000Z |
| msrc_cve-2025-68728 | ntfs3: fix uninit memory after failed mi_read in mi_format_new | 2025-12-02T00:00:00.000Z | 2026-01-13T01:43:26.000Z |
| msrc_cve-2025-68365 | fs/ntfs3: Initialize allocated memory before use | 2025-12-02T00:00:00.000Z | 2026-01-13T01:43:20.000Z |
| msrc_cve-2025-38681 | mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() | 2025-09-02T00:00:00.000Z | 2026-01-13T01:43:09.000Z |
| msrc_cve-2025-68344 | ALSA: wavefront: Fix integer overflow in sample size validation | 2025-12-02T00:00:00.000Z | 2026-01-13T01:43:07.000Z |
| msrc_cve-2025-38562 | ksmbd: fix null pointer dereference error in generate_encryptionkey | 2025-08-02T00:00:00.000Z | 2026-01-13T01:42:56.000Z |
| msrc_cve-2024-7883 | CMSE secure state may leak from stack to floating-point registers | 2024-10-01T07:00:00.000Z | 2026-01-13T01:42:19.000Z |
| msrc_cve-2025-68340 | team: Move team device type change at the end of team_port_add | 2025-12-02T00:00:00.000Z | 2026-01-13T01:42:07.000Z |
| msrc_cve-2025-38467 | drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling | 2025-07-02T00:00:00.000Z | 2026-01-13T01:41:52.000Z |
| msrc_cve-2025-39709 | media: venus: protect against spurious interrupts during probe | 2025-09-02T00:00:00.000Z | 2026-01-13T01:41:51.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202507-2463 | A vulnerability classified as critical was found in TOTOLINK T6 4.1.5cu.748. This vulnera… | 2025-08-09T23:12:41.058000Z |
| var-202507-0577 | A vulnerability was found in TOTOLINK T6 4.1.5cu.748_B20211015. It has been declared as c… | 2025-08-09T23:11:05.687000Z |
| var-202507-2330 | A vulnerability has been found in TOTOLINK T6 4.1.5cu.748_B20211015 and classified as cri… | 2025-08-09T23:11:05.605000Z |
| var-202312-1263 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command … | 2025-08-09T23:09:31.315000Z |
| var-202312-1595 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command … | 2025-08-09T23:09:31.281000Z |
| var-202405-0217 | D-Link DIR-2640 HTTP Referer Stack-Based Buffer Overflow Remote Code Execution Vulnerabil… | 2025-08-09T23:09:30.491000Z |
| var-202507-2636 | A vulnerability, which was classified as critical, has been found in D-Link DIR-890L up t… | 2025-08-09T23:08:10.677000Z |
| var-202403-1815 | A vulnerability in the web-based user interface of Cisco Small Business 100, 300, and 500… | 2025-08-09T23:06:09.976000Z |
| var-202507-0626 | A vulnerability classified as critical has been found in TOTOLINK T6 4.1.5cu.748. Affecte… | 2025-08-09T23:06:07.404000Z |
| var-202303-1296 | TP-Link Archer AX21 tmpServer Command 0x422 Stack-based Buffer Overflow Remote Code Execu… | 2025-08-09T23:05:01.185000Z |
| var-202405-4030 | TOTOLINK LR350 V9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the … | 2025-08-09T23:04:05.406000Z |
| var-202507-2367 | A vulnerability, which was classified as critical, has been found in TOTOLINK T6 up to 4.… | 2025-08-09T23:03:59.107000Z |
| var-202507-2273 | A hidden remote support feature protected by a static secret in TOTOLINK N300RB firmware … | 2025-08-09T22:59:27.115000Z |
| var-202305-0214 | D-Link DIR-2640 HNAP LoginPassword Authentication Bypass Vulnerability. This vulnerabilit… | 2025-08-09T22:53:51.883000Z |
| var-202305-0130 | D-Link DIR-2640 EmailFrom Command Injection Remote Code Execution Vulnerability. This vul… | 2025-08-09T22:53:51.736000Z |
| var-202308-4331 | D-Link DAP-2622 DDP Firmware Upgrade Filename Stack-based Buffer Overflow Remote Code Exe… | 2025-08-09T22:53:50.220000Z |
| var-202308-3319 | D-Link DAP-2622 DDP Set SSID List Missing Authentication Vulnerability. This vulnerabilit… | 2025-08-09T22:53:50.150000Z |
| var-202308-3104 | D-Link DAP-2622 DDP Firmware Upgrade Server IPv6 Address Stack-based Buffer Overflow Remo… | 2025-08-09T22:53:50.106000Z |
| var-202501-2383 | A improper limitation of a pathname to a restricted directory ('path traversal') in Forti… | 2025-08-09T19:42:09.204000Z |
| var-202507-2691 | A vulnerability was found in TOTOLINK A702R 4.0.0-B20230721.1521. It has been declared as… | 2025-08-09T19:36:36.212000Z |
| var-201302-0538 | An OS command injection vulnerability exists in multiple Raidsonic NAS devices—specifical… | 2025-08-07T23:30:12.294000Z |
| var-202507-2583 | In Netgear RAX30 V1.0.10.94_3, the USERLIMIT_GLOBAL option is set to 0 in multiple bftpd-… | 2025-08-07T23:29:15.130000Z |
| var-202505-1598 | A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All version… | 2025-08-07T22:57:42.482000Z |
| var-202505-1604 | A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All version… | 2025-08-07T22:35:50.457000Z |
| var-202505-1593 | A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All version… | 2025-08-07T22:04:19.968000Z |
| var-202505-1599 | A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All version… | 2025-08-07T21:49:04.752000Z |
| var-202505-1602 | A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All version… | 2025-08-07T21:30:52.217000Z |
| var-202505-1594 | A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All version… | 2025-08-07T21:14:49.281000Z |
| var-202505-1600 | A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All version… | 2025-08-07T21:12:41.456000Z |
| var-202505-1596 | A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All version… | 2025-08-07T21:00:07.805000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:4240-1 | Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) | 2024-12-06T12:33:45Z | 2024-12-06T12:33:45Z |
| suse-su-2024:4239-1 | Security update for the Linux Kernel (Live Patch 51 for SLE 12 SP5) | 2024-12-06T12:33:34Z | 2024-12-06T12:33:34Z |
| suse-su-2024:4237-1 | Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3) | 2024-12-06T10:35:20Z | 2024-12-06T10:35:20Z |
| suse-su-2024:4236-1 | Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4) | 2024-12-06T10:35:06Z | 2024-12-06T10:35:06Z |
| suse-su-2024:4235-1 | Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) | 2024-12-06T10:34:48Z | 2024-12-06T10:34:48Z |
| suse-su-2024:4234-1 | Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4) | 2024-12-06T10:34:27Z | 2024-12-06T10:34:27Z |
| suse-su-2024:4230-1 | Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3) | 2024-12-06T10:34:03Z | 2024-12-06T10:34:03Z |
| suse-su-2024:4231-1 | Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP2) | 2024-12-06T10:33:51Z | 2024-12-06T10:33:51Z |
| suse-su-2024:4228-1 | Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 2024-12-06T10:04:03Z | 2024-12-06T10:04:03Z |
| suse-su-2024:4227-1 | Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) | 2024-12-06T10:03:53Z | 2024-12-06T10:03:53Z |
| suse-su-2024:4226-1 | Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) | 2024-12-06T10:03:40Z | 2024-12-06T10:03:40Z |
| suse-su-2024:4225-1 | Security update for avahi | 2024-12-06T09:36:01Z | 2024-12-06T09:36:01Z |
| suse-su-2024:4221-1 | Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5) | 2024-12-05T23:40:50Z | 2024-12-05T23:40:50Z |
| suse-su-2024:4220-1 | Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5) | 2024-12-05T21:09:29Z | 2024-12-05T21:09:29Z |
| suse-su-2024:4219-1 | Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5) | 2024-12-05T21:09:17Z | 2024-12-05T21:09:17Z |
| suse-su-2024:4218-1 | Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) | 2024-12-05T20:39:57Z | 2024-12-05T20:39:57Z |
| suse-su-2024:4217-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 2024-12-05T18:03:43Z | 2024-12-05T18:03:43Z |
| suse-su-2024:4216-1 | Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) | 2024-12-05T17:33:35Z | 2024-12-05T17:33:35Z |
| suse-su-2024:4215-1 | Security update for php8 | 2024-12-05T17:31:50Z | 2024-12-05T17:31:50Z |
| suse-su-2024:4214-1 | Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5) | 2024-12-05T17:03:51Z | 2024-12-05T17:03:51Z |
| suse-su-2024:4212-1 | Security update for obs-scm-bridge | 2024-12-05T16:04:31Z | 2024-12-05T16:04:31Z |
| suse-su-2024:4210-1 | Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) | 2024-12-05T15:34:14Z | 2024-12-05T15:34:14Z |
| suse-su-2024:4209-1 | Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | 2024-12-05T15:34:04Z | 2024-12-05T15:34:04Z |
| suse-su-2024:4208-1 | Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) | 2024-12-05T15:33:55Z | 2024-12-05T15:33:55Z |
| suse-su-2024:4207-1 | Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5) | 2024-12-05T15:33:44Z | 2024-12-05T15:33:44Z |
| suse-su-2024:4206-1 | Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) | 2024-12-05T15:33:33Z | 2024-12-05T15:33:33Z |
| suse-su-2024:4205-1 | Security update for docker-stable | 2024-12-05T14:58:02Z | 2024-12-05T14:58:02Z |
| suse-su-2024:4204-1 | Security update for docker-stable | 2024-12-05T14:57:37Z | 2024-12-05T14:57:37Z |
| suse-su-2024:4202-1 | Security update for java-1_8_0-openjdk | 2024-12-05T14:03:15Z | 2024-12-05T14:03:15Z |
| suse-su-2024:4197-1 | Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5) | 2024-12-05T13:33:54Z | 2024-12-05T13:33:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:12428-1 | xwayland-22.1.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12427-1 | xorg-x11-server-21.1.4-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12426-1 | starboard-0.15.11-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12425-1 | libmozjs-102-0-102.4.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12424-1 | libX11-6-1.8.1-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12423-1 | libexslt0-1.1.37-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12422-1 | exim-4.96-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12421-1 | docker-compose-2.12.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12420-1 | libtiff-devel-32bit-4.4.0-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12419-1 | libxml2-2-2.10.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12418-1 | libksba-devel-1.6.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12417-1 | git-bug-0.7.2+git.1665512451.0eef939-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12416-1 | erlang-25.1.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12415-1 | busybox-1.35.0-6.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12414-1 | python-lxml-doc-4.9.1-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12413-1 | jsoup-1.15.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12412-1 | jackson-databind-2.13.4.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12411-1 | ardour-6.9.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12410-1 | dex-oidc-2.35.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12409-1 | apache-commons-text-1.10.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12408-1 | python310-httptools-0.5.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12407-1 | kernel-devel-6.0.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12406-1 | libspice-client-glib-2_0-8-0.41-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12405-1 | exiv2-0.27.5-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12404-1 | chromedriver-106.0.5249.119-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12403-1 | xmlgraphics-commons-2.6-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12402-1 | xmlgraphics-batik-1.15-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12401-1 | python310-joblib-1.2.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12400-1 | podman-4.2.1-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12399-1 | exiv2-0.27.5-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-golang-2022-24675 | 2024-03-06T11:02:18.584Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2022-23806 | 2024-03-06T11:02:30.475Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2022-23773 | 2024-03-06T11:02:41.589Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2022-23772 | 2024-03-06T11:02:51.191Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-44717 | 2024-03-06T11:03:19.793Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-44716 | 2024-03-06T11:03:30.095Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-41772 | 2024-03-06T11:03:41.271Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-41771 | 2024-03-06T11:03:51.776Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-39293 | 2024-03-06T11:04:03.178Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-38297 | 2024-03-06T11:04:15.408Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-36221 | 2024-03-06T11:04:26.670Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-34558 | 2024-03-06T11:04:35.975Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-33198 | 2024-03-06T11:04:44.276Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-33197 | 2024-03-06T11:04:55.405Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-33196 | 2024-03-06T11:05:05.863Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-33195 | 2024-03-06T11:05:14.379Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-31525 | 2024-03-06T11:05:35.370Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-3115 | 2024-03-06T11:05:46.661Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-3114 | 2024-03-06T11:05:58.109Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-29923 | 2024-03-06T11:06:07.577Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-27919 | 2024-03-06T11:06:19.200Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2021-27918 | 2024-03-06T11:06:30.000Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2020-7919 | 2024-03-06T11:06:39.371Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2020-29511 | 2024-03-06T11:06:49.171Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2020-29510 | 2024-03-06T11:07:00.167Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2020-29509 | 2024-03-06T11:07:09.710Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2020-28851 | 2024-03-06T11:07:21.401Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2020-28362 | 2024-03-06T11:07:49.873Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2020-24553 | 2024-03-06T11:07:58.692Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2020-16845 | 2024-03-06T11:08:08.182Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-23144 | NVIDIA Triton Inference Server目录遍历漏洞 | 2024-03-05 | 2025-10-09 |
| cnvd-2025-23143 | NVIDIA Triton Inference Server拒绝服务漏洞 | 2024-05-24 | 2025-10-09 |
| cnvd-2025-23142 | NVIDIA Triton Inference Server权限提升漏洞 | 2024-05-24 | 2025-10-09 |
| cnvd-2025-23141 | NVIDIA Triton Inference Server存在未明漏洞(CNVD-2025-23141) | 2024-05-24 | 2025-10-09 |
| cnvd-2025-23140 | NVIDIA Triton Inference Server存在未明漏洞(CNVD-2025-23140) | 2024-06-17 | 2025-10-09 |
| cnvd-2025-23139 | NVIDIA Triton Inference Server存在未明漏洞 | 2024-06-17 | 2025-10-09 |
| cnvd-2025-23138 | NVIDIA Triton Inference Server越界读取漏洞 | 2024-10-17 | 2025-10-09 |
| cnvd-2025-23137 | NVIDIA Triton Inference Server输入验证错误漏洞(CNVD-2025-23137) | 2025-02-17 | 2025-10-09 |
| cnvd-2025-23136 | NVIDIA Triton Inference Server输入验证错误漏洞(CNVD-2025-23136) | 2025-09-19 | 2025-10-09 |
| cnvd-2025-23135 | NVIDIA Triton Inference Server输入验证错误漏洞 | 2025-09-19 | 2025-10-09 |
| cnvd-2025-23134 | NVIDIA Triton Inference Server越界写入漏洞 | 2025-09-19 | 2025-10-09 |
| cnvd-2025-23133 | NVIDIA Triton Inference Server访问控制错误漏洞 | 2025-09-19 | 2025-10-09 |
| cnvd-2025-23132 | Grav CMS远程代码执行漏洞 | 2025-08-18 | 2025-10-09 |
| cnvd-2025-23131 | Tigo Energy Cloud Connect Advanced命令注入漏洞 | 2025-08-18 | 2025-10-09 |
| cnvd-2025-23130 | Belkin F9K1009和Belkin F9K1010硬编码凭据漏洞 | 2025-08-15 | 2025-10-09 |
| cnvd-2025-23129 | Ghost目录遍历漏洞 | 2023-05-11 | 2025-10-09 |
| cnvd-2025-23128 | Ghost任意文件读取漏洞 | 2023-08-17 | 2025-10-09 |
| cnvd-2025-23127 | BigAntSoft BigAnt office messenger SQL注入漏洞 | 2025-01-16 | 2025-10-09 |
| cnvd-2025-23126 | Tenda AC18 form_fast_setting_wifi_set方法缓冲区溢出漏洞 | 2024-03-27 | 2025-10-09 |
| cnvd-2025-23125 | Tenda AC18 formsetUsbUnload方法命令注入漏洞 | 2024-03-27 | 2025-10-09 |
| cnvd-2025-23124 | Tenda AC18 /goform/exeCommand命令注入漏洞 | 2024-04-10 | 2025-10-09 |
| cnvd-2025-23123 | Tenda AC18堆栈缓冲区溢出漏洞 | 2024-07-18 | 2025-10-09 |
| cnvd-2025-23122 | Tenda AC18 ip/goform/saveParentControlInfo接口缓冲区溢出漏洞 | 2024-07-19 | 2025-10-09 |
| cnvd-2025-23121 | Small CRM /admin/change-password.php文件SQL注入漏洞 | 2025-05-30 | 2025-10-09 |
| cnvd-2025-23120 | Tenda AC18弱密码漏洞 | 2025-07-28 | 2025-10-09 |
| cnvd-2025-23119 | Small CRM会话劫持漏洞 | 2025-07-30 | 2025-10-09 |
| cnvd-2025-23118 | Small CRM /registration.php文件跨站脚本漏洞 | 2025-09-04 | 2025-10-09 |
| cnvd-2025-23117 | Small CRM /get-quote.php文件SQL注入漏洞 | 2025-09-10 | 2025-10-09 |
| cnvd-2025-23116 | Small CRM /profile.php文件SQL注入漏洞 | 2025-09-11 | 2025-10-09 |
| cnvd-2025-23115 | Small CRM /create-ticket.php文件SQL注入漏洞 | 2025-09-23 | 2025-10-09 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2022-avi-746 | Multiples vulnérabilités dans Splunk | 2022-08-17T00:00:00.000000 | 2022-08-17T00:00:00.000000 |
| certfr-2022-avi-745 | Multiples vulnérabilités dans Microsoft Windows | 2022-08-16T00:00:00.000000 | 2022-08-16T00:00:00.000000 |
| certfr-2022-avi-744 | Multiples vulnérabilités dans Apache OpenOffice | 2022-08-16T00:00:00.000000 | 2022-08-16T00:00:00.000000 |
| certfr-2022-avi-743 | Vulnérabilité dans PostgreSQL JDBC | 2022-08-16T00:00:00.000000 | 2022-08-16T00:00:00.000000 |
| certfr-2022-avi-742 | Multiples vulnérabilités dans Qnap QTS | 2022-08-16T00:00:00.000000 | 2022-08-16T00:00:00.000000 |
| certfr-2022-avi-736 | Multiples vulnérabilités dans Zimbra | 2022-08-11T00:00:00.000000 | 2022-08-16T00:00:00.000000 |
| certfr-2022-avi-741 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-08-12T00:00:00.000000 | 2022-08-12T00:00:00.000000 |
| certfr-2022-avi-740 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2022-08-12T00:00:00.000000 | 2022-08-12T00:00:00.000000 |
| certfr-2022-avi-739 | Multiples vulnérabilités dans PostgreSQL | 2022-08-12T00:00:00.000000 | 2022-08-12T00:00:00.000000 |
| certfr-2022-avi-738 | Multiples vulnérabilités dans Tenable Nessus | 2022-08-11T00:00:00.000000 | 2022-08-11T00:00:00.000000 |
| certfr-2022-avi-737 | Vulnérabilité dans Palo Alto PAN-OS | 2022-08-11T00:00:00.000000 | 2022-08-11T00:00:00.000000 |
| certfr-2022-avi-735 | Vulnérabilité dans les produits Cisco | 2022-08-11T00:00:00.000000 | 2022-08-11T00:00:00.000000 |
| certfr-2022-avi-734 | Vulnérabilité dans Citrix XenServer | 2022-08-11T00:00:00.000000 | 2022-08-11T00:00:00.000000 |
| certfr-2022-avi-733 | Multiples vulnérabilités dans SonicWall SMA1000 | 2022-08-11T00:00:00.000000 | 2022-08-11T00:00:00.000000 |
| certfr-2022-avi-732 | Multiples vulnérabilités dans les produits Microsoft | 2022-08-10T00:00:00.000000 | 2022-08-10T00:00:00.000000 |
| certfr-2022-avi-731 | Multiples vulnérabilités dans Microsoft Azure | 2022-08-10T00:00:00.000000 | 2022-08-10T00:00:00.000000 |
| certfr-2022-avi-730 | Vulnérabilité dans Microsoft .Net | 2022-08-10T00:00:00.000000 | 2022-08-10T00:00:00.000000 |
| certfr-2022-avi-729 | Multiples vulnérabilités dans Microsoft Windows | 2022-08-10T00:00:00.000000 | 2022-08-10T00:00:00.000000 |
| certfr-2022-avi-728 | Multiples vulnérabilités dans Microsoft Office | 2022-08-10T00:00:00.000000 | 2022-08-10T00:00:00.000000 |
| certfr-2022-avi-727 | Multiples vulnérabilités dans les produits Intel | 2022-08-10T00:00:00.000000 | 2022-08-10T00:00:00.000000 |
| certfr-2022-avi-726 | Multiples vulnérabilités dans les produits Adobe | 2022-08-10T00:00:00.000000 | 2022-08-10T00:00:00.000000 |
| certfr-2022-avi-725 | Multiples vulnérabilités dans les produits SAP | 2022-08-10T00:00:00.000000 | 2022-08-10T00:00:00.000000 |
| certfr-2022-avi-724 | Multiples vulnérabilités dans les produits VMware | 2022-08-10T00:00:00.000000 | 2022-08-10T00:00:00.000000 |
| certfr-2022-avi-723 | Multiples vulnérabilités dans IBM MQ | 2022-08-10T00:00:00.000000 | 2022-08-10T00:00:00.000000 |
| certfr-2022-avi-722 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2022-08-10T00:00:00.000000 | 2022-08-10T00:00:00.000000 |
| certfr-2022-avi-721 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-08-10T00:00:00.000000 | 2022-08-10T00:00:00.000000 |
| certfr-2022-avi-720 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2022-08-10T00:00:00.000000 | 2022-08-10T00:00:00.000000 |
| certfr-2022-avi-719 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2022-08-09T00:00:00.000000 | 2022-08-09T00:00:00.000000 |
| certfr-2022-avi-718 | Multiples vulnérabilités dans les produits Siemens | 2022-08-09T00:00:00.000000 | 2022-08-09T00:00:00.000000 |
| certfr-2022-avi-716 | Multiples vulnérabilités dans IBM Cloud Pak System | 2022-08-09T00:00:00.000000 | 2022-08-09T00:00:00.000000 |