Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-27848 |
9.8 (3.1)
|
Missing neutralization in Linksys MR9600, Linksys MX4200 |
Linksys |
MR9600 |
2026-02-25T15:15:16.186Z | 2026-02-26T16:51:13.433Z |
| CVE-2026-3206 |
1.3 (4.0)
|
Improper management of context cancelations |
KrakenD |
KrakenD-CE |
2026-02-25T15:12:23.336Z | 2026-02-25T20:21:08.239Z |
| CVE-2026-27702 |
9.9 (3.1)
|
Budibase Vulnerable to Remote Code Execution via Unsaf… |
Budibase |
budibase |
2026-02-25T15:11:16.324Z | 2026-02-25T20:43:35.833Z |
| CVE-2026-27847 |
9.8 (3.1)
|
Missing authentication in Linksys MR9600, Linksys MX4200 |
Linksys |
MR9600 |
2026-02-25T15:10:30.771Z | 2026-02-26T16:56:23.595Z |
| CVE-2026-27701 |
8.8 (4.0)
|
LiveCodes vulnerable to JavaScript Injection via untru… |
live-codes |
livecodes |
2026-02-25T15:06:17.617Z | 2026-02-27T17:00:20.183Z |
| CVE-2026-27846 |
6.2 (3.1)
|
Missing authentication in Linksys MR9600, Linksys MX4200 |
Linksys |
MR9600 |
2026-02-25T15:03:58.616Z | 2026-02-25T18:36:03.925Z |
| CVE-2026-27700 |
8.2 (3.1)
|
Hono is Vulnerable to Authentication Bypass by IP Spoo… |
honojs |
hono |
2026-02-25T15:01:44.681Z | 2026-02-27T17:01:28.403Z |
| CVE-2026-27699 |
9.1 (3.1)
|
Basic FTP has Path Traversal Vulnerability in its down… |
patrickjuchli |
basic-ftp |
2026-02-25T14:58:56.815Z | 2026-02-27T17:04:33.751Z |
| CVE-2026-27695 |
4.3 (3.1)
|
zae-limiter: DynamoDB hot partition throttling enables… |
zeroae |
zae-limiter |
2026-02-25T14:56:27.221Z | 2026-02-26T21:33:41.329Z |
| CVE-2026-2878 |
5.3 (3.1)
|
Insufficient Entropy Vulnerability in Telerik UI for A… |
Progress Software |
Telerik UI for ASP.NET AJAX |
2026-02-25T14:45:11.142Z | 2026-02-27T17:06:16.616Z |
| CVE-2026-27692 |
7.1 (3.1)
|
iccDEV has HBO in CIccTagTextDescription::Release() |
InternationalColorConsortium |
iccDEV |
2026-02-25T14:40:22.740Z | 2026-02-25T20:42:56.820Z |
| CVE-2026-27691 |
6.2 (3.1)
|
iccDEV has SIO in parse3DTable() at iccFromCube.cpp Line 218 |
InternationalColorConsortium |
iccDEV |
2026-02-25T14:36:16.803Z | 2026-02-25T20:42:19.363Z |
| CVE-2026-3203 |
5.5 (3.1)
|
Buffer Over-read in Wireshark |
Wireshark Foundation |
Wireshark |
2026-02-25T14:36:00.984Z | 2026-02-25T20:37:14.893Z |
| CVE-2026-3202 |
4.7 (3.1)
|
NULL Pointer Dereference in Wireshark |
Wireshark Foundation |
Wireshark |
2026-02-25T14:35:55.986Z | 2026-02-25T20:35:16.293Z |
| CVE-2026-3201 |
4.7 (3.1)
|
Improperly Controlled Sequential Memory Allocation in … |
Wireshark Foundation |
Wireshark |
2026-02-25T14:35:50.969Z | 2026-02-25T20:56:34.266Z |
| CVE-2026-3187 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
feiyuchuixue sz-boot-parent API Endpoint upload unrest… |
feiyuchuixue |
sz-boot-parent |
2026-02-25T14:32:09.116Z | 2026-02-25T20:55:38.723Z |
| CVE-2026-3186 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
feiyuchuixue sz-boot-parent Password Reset password de… |
feiyuchuixue |
sz-boot-parent |
2026-02-25T13:32:12.352Z | 2026-02-25T14:28:19.370Z |
| CVE-2026-3185 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
feiyuchuixue sz-boot-parent API Endpoint sys-message a… |
feiyuchuixue |
sz-boot-parent |
2026-02-25T13:32:09.902Z | 2026-02-25T14:38:26.797Z |
| CVE-2026-28196 |
2.3 (3.1)
|
In JetBrains TeamCity before 2025.11.3 disabling … |
JetBrains |
TeamCity |
2026-02-25T12:57:29.497Z | 2026-02-25T14:40:40.502Z |
| CVE-2026-28195 |
4.3 (3.1)
|
In JetBrains TeamCity before 2025.11.3 missing au… |
JetBrains |
TeamCity |
2026-02-25T12:57:28.907Z | 2026-02-25T14:42:36.845Z |
| CVE-2026-28194 |
4.3 (3.1)
|
In JetBrains TeamCity before 2025.11.3 open redir… |
JetBrains |
TeamCity |
2026-02-25T12:57:28.241Z | 2026-02-25T14:49:54.635Z |
| CVE-2026-28193 |
8.8 (3.1)
|
In JetBrains YouTrack before 2025.3.121962 apps w… |
JetBrains |
YouTrack |
2026-02-25T12:57:27.463Z | 2026-02-26T14:44:06.777Z |
| CVE-2026-2624 |
9.8 (3.1)
|
Authentication Bypass in ePati's Antikor NGFW |
ePati Cyber Security Technologies Inc. |
Antikor Next Generation Firewall (NGFW) |
2026-02-25T12:39:47.312Z | 2026-02-25T15:12:39.466Z |
| CVE-2026-21725 |
2.6 (3.1)
|
Authorization Bypass via TOCTOU in Grafana Datasource … |
Grafana |
Grafana |
2026-02-25T12:35:43.104Z | 2026-02-25T15:13:57.618Z |
| CVE-2026-0704 |
5.9 (4.0)
|
In affected version of Octopus Deploy it was poss… |
Octopus Deploy |
Octopus Server |
2026-02-25T12:22:18.328Z | 2026-02-27T14:48:18.334Z |
| CVE-2026-3118 |
6.5 (3.1)
|
Rhdh: graphql injection leading to platform-wide denia… |
Red Hat |
Red Hat Developer Hub |
2026-02-25T11:25:55.016Z | 2026-02-25T16:29:48.062Z |
| CVE-2026-25701 |
7 (4.0)
|
An Insecure Temporary File vulnerability in openS… |
openSUSE |
sdbootutil |
2026-02-25T10:59:58.372Z | 2026-02-25T20:50:09.650Z |
| CVE-2026-26104 |
5.5 (3.1)
|
Udisks: missing authorization check allows unprivilege… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-02-25T10:51:15.204Z | 2026-02-25T20:49:19.895Z |
| CVE-2025-62878 |
9.9 (3.1)
|
Local Path Provisioner vulnerable to Path Traversal vi… |
SUSE |
Rancher |
2026-02-25T10:49:29.596Z | 2026-02-26T14:44:06.924Z |
| CVE-2025-67601 |
8.3 (3.1)
|
Rancher CLI skips TLS verification on Rancher CLI logi… |
SUSE |
rancher |
2026-02-25T10:36:57.771Z | 2026-02-26T14:44:07.081Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-20107 |
5.5 (3.1)
|
Cisco Application Policy Infrastructure Controller Den… |
Cisco |
Cisco Application Policy Infrastructure Controller (APIC) |
2026-02-25T16:14:33.988Z | 2026-02-25T19:05:49.359Z |
| CVE-2026-20099 |
6.7 (3.1)
|
Cisco UCS Manager and FXOS Software Command Injection … |
Cisco |
Cisco Firepower Extensible Operating System (FXOS) |
2026-02-25T16:25:38.517Z | 2026-02-26T14:44:05.716Z |
| CVE-2026-20091 |
4.8 (3.1)
|
Cisco UCS Manager and FXOS Software Stored Cross-Site … |
Cisco |
Cisco Firepower Extensible Operating System (FXOS) |
2026-02-25T16:24:44.412Z | 2026-02-25T19:05:48.712Z |
| CVE-2026-20051 |
7.4 (3.1)
|
Cisco Nexus 3600-R and 9500-R Series Switching Platfor… |
Cisco |
Cisco NX-OS Software |
2026-02-25T16:14:33.859Z | 2026-02-25T19:05:49.650Z |
| CVE-2026-20048 |
7.7 (3.1)
|
Cisco NX-OS Software SNMP Denial of Service Vulnerability |
Cisco |
Cisco NX-OS System Software in ACI Mode |
2026-02-25T16:26:28.329Z | 2026-02-25T19:05:48.366Z |
| CVE-2026-20037 |
4.4 (3.1)
|
Cisco UCS Manager File Write Vulnerability |
Cisco |
Cisco Unified Computing System (Managed) |
2026-02-25T16:24:09.650Z | 2026-02-25T19:05:48.855Z |
| CVE-2026-20036 |
6.5 (3.1)
|
Cisco UCS Manager Software Command Injection Vulnerability |
Cisco |
Cisco Unified Computing System (Managed) |
2026-02-25T16:14:43.296Z | 2026-02-26T14:44:05.885Z |
| CVE-2026-20033 |
7.4 (3.1)
|
Cisco NX-OS Software Denial of Service Vulnerability |
Cisco |
Cisco NX-OS System Software in ACI Mode |
2026-02-25T16:26:29.215Z | 2026-02-25T19:05:48.146Z |
| CVE-2026-20010 |
7.4 (3.1)
|
Cisco Nexus 3000 and 9000 Series Switches Link Layer D… |
Cisco |
Cisco NX-OS Software |
2026-02-25T16:18:14.561Z | 2026-02-25T19:05:49.108Z |
| CVE-2026-3206 |
1.3 (4.0)
|
Improper management of context cancelations |
KrakenD |
KrakenD-CE |
2026-02-25T15:12:23.336Z | 2026-02-25T20:21:08.239Z |
| CVE-2026-3188 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
feiyuchuixue sz-boot-parent API templates path traversal |
feiyuchuixue |
sz-boot-parent |
2026-02-25T15:32:09.025Z | 2026-02-27T16:52:23.121Z |
| CVE-2026-27848 |
9.8 (3.1)
|
Missing neutralization in Linksys MR9600, Linksys MX4200 |
Linksys |
MR9600 |
2026-02-25T15:15:16.186Z | 2026-02-26T16:51:13.433Z |
| CVE-2026-27847 |
9.8 (3.1)
|
Missing authentication in Linksys MR9600, Linksys MX4200 |
Linksys |
MR9600 |
2026-02-25T15:10:30.771Z | 2026-02-26T16:56:23.595Z |
| CVE-2026-27846 |
6.2 (3.1)
|
Missing authentication in Linksys MR9600, Linksys MX4200 |
Linksys |
MR9600 |
2026-02-25T15:03:58.616Z | 2026-02-25T18:36:03.925Z |
| CVE-2026-27730 |
8.6 (3.0)
|
esm.sh has SSRF localhost/private-network bypass in `/… |
esm-dev |
esm.sh |
2026-02-25T15:37:01.753Z | 2026-02-25T20:32:05.079Z |
| CVE-2026-27704 |
6.6 (4.0)
|
Dart SDK and Flutter SDK have Zip slip in Dart Pub pac… |
dart-lang |
sdk |
2026-02-25T15:17:26.243Z | 2026-02-25T20:27:35.486Z |
| CVE-2026-27702 |
9.9 (3.1)
|
Budibase Vulnerable to Remote Code Execution via Unsaf… |
Budibase |
budibase |
2026-02-25T15:11:16.324Z | 2026-02-25T20:43:35.833Z |
| CVE-2026-27701 |
8.8 (4.0)
|
LiveCodes vulnerable to JavaScript Injection via untru… |
live-codes |
livecodes |
2026-02-25T15:06:17.617Z | 2026-02-27T17:00:20.183Z |
| CVE-2026-27700 |
8.2 (3.1)
|
Hono is Vulnerable to Authentication Bypass by IP Spoo… |
honojs |
hono |
2026-02-25T15:01:44.681Z | 2026-02-27T17:01:28.403Z |
| CVE-2026-22866 |
2.7 (4.0)
|
ENS DNSSEC Oracle Vulnerable to RSA Signature Forgery … |
ensdomains |
ens-contracts |
2026-02-25T15:47:16.230Z | 2026-02-25T20:34:05.144Z |
| CVE-2025-69771 |
9.6 (3.1)
|
An arbitrary file upload vulnerability in the sub… |
n/a |
n/a |
2026-02-25T00:00:00.000Z | 2026-02-26T19:36:16.836Z |
| CVE-2025-50180 |
8.7 (4.0)
|
esm.sh is vulnerable to full-response SSRF |
esm-dev |
esm.sh |
2026-02-25T15:32:56.449Z | 2026-02-27T18:22:28.728Z |
| CVE-2025-1242 |
9.3 (4.0)
9.1 (3.1)
|
Administrative Credentials Can Be Extracted Through Ga… |
Gardyn |
Home Kit |
2026-02-25T15:21:48.369Z | 2026-02-25T20:30:46.714Z |
| CVE-2026-3203 |
5.5 (3.1)
|
Buffer Over-read in Wireshark |
Wireshark Foundation |
Wireshark |
2026-02-25T14:36:00.984Z | 2026-02-25T20:37:14.893Z |
| CVE-2026-3202 |
4.7 (3.1)
|
NULL Pointer Dereference in Wireshark |
Wireshark Foundation |
Wireshark |
2026-02-25T14:35:55.986Z | 2026-02-25T20:35:16.293Z |
| CVE-2026-3201 |
4.7 (3.1)
|
Improperly Controlled Sequential Memory Allocation in … |
Wireshark Foundation |
Wireshark |
2026-02-25T14:35:50.969Z | 2026-02-25T20:56:34.266Z |
| CVE-2026-3197 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-02-25T14:01:00.880Z | |
| CVE-2026-3187 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
feiyuchuixue sz-boot-parent API Endpoint upload unrest… |
feiyuchuixue |
sz-boot-parent |
2026-02-25T14:32:09.116Z | 2026-02-25T20:55:38.723Z |
| CVE-2026-2878 |
5.3 (3.1)
|
Insufficient Entropy Vulnerability in Telerik UI for A… |
Progress Software |
Telerik UI for ASP.NET AJAX |
2026-02-25T14:45:11.142Z | 2026-02-27T17:06:16.616Z |
| CVE-2026-27699 |
9.1 (3.1)
|
Basic FTP has Path Traversal Vulnerability in its down… |
patrickjuchli |
basic-ftp |
2026-02-25T14:58:56.815Z | 2026-02-27T17:04:33.751Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-852m-cvvp-9p4w |
5.9 (4.0)
|
Wasmtime WASI implementations are vulnerable to guest-controlled resource exhaustion | 2026-02-24T20:47:08Z | 2026-02-27T20:25:10Z |
| ghsa-xjhv-v822-pf94 |
6.9 (4.0)
|
Wasmtime is vulnerable to panic when dropping a `[Typed]Func::call_async` future | 2026-02-24T20:44:46Z | 2026-02-27T20:24:27Z |
| ghsa-5r3v-vc8m-m96g |
8.9 (4.0)
|
Caddy: Unicode case-folding length expansion causes incorrect split_path index in FastCGI transport | 2026-02-24T20:39:08Z | 2026-02-27T19:55:10Z |
| ghsa-879p-475x-rqh2 |
6.9 (4.0)
|
Caddy is vulnerable to cross-origin config application via local admin API /load | 2026-02-24T20:37:35Z | 2026-02-27T19:54:36Z |
| ghsa-x76f-jf84-rqj8 |
7.7 (4.0)
|
Caddy: MatchHost becomes case-sensitive for large host lists (>100), enabling host-based route/auth… | 2026-02-24T20:34:01Z | 2026-02-27T19:53:54Z |
| ghsa-g7pc-pc7g-h8jh |
7.7 (4.0)
|
Caddy: MatchPath %xx (escaped-path) branch skips case normalization, enabling path-based route/auth… | 2026-02-24T20:31:31Z | 2026-02-27T19:53:17Z |
| ghsa-hffm-g8v7-wrv7 |
8.8 (4.0)
|
Caddy: mTLS client authentication silently fails open when CA certificate file is missing or malformed | 2026-02-24T20:22:53Z | 2026-02-27T19:52:41Z |
| ghsa-4xrr-hq4w-6vf4 |
6.9 (4.0)
|
Caddy: Improper sanitization of glob characters in file matcher may lead to bypassing security prot… | 2026-02-24T20:16:55Z | 2026-02-27T19:51:57Z |
| ghsa-m2cq-xjgm-f668 |
9.2 (4.0)
|
ActualBudget server is Missing Authentication for SimpleFIN and Pluggy AI bank sync endpoints | 2026-02-24T20:13:30Z | 2026-02-24T20:13:30Z |
| ghsa-hhfx-5x8j-f5f6 |
6.5 (3.1)
|
Payload: Server-Side Request Forgery (SSRF) in External File URL Uploads | 2026-02-24T20:10:32Z | 2026-02-24T20:10:32Z |
| ghsa-4894-xqv6-vrfq |
8.8 (3.1)
|
MindsDB: Path Traversal in /api/files Leading to Remote Code Execution | 2026-02-24T20:07:58Z | 2026-02-24T20:07:59Z |
| ghsa-vxg3-v4p6-f3fp |
6.9 (4.0)
|
Pimcore vulnerable to SQL injection via unsanitized filter value in Dependency Dao RLIKE clause | 2026-02-24T20:03:23Z | 2026-02-24T20:03:23Z |
| ghsa-78qv-3mpx-9cqq |
6.1 (3.1)
8.6 (4.0)
|
NiceGUI vulnerable to XSS via Code Injection during client-side element function execution | 2026-02-24T19:56:18Z | 2026-02-24T19:56:18Z |
| ghsa-gfvx-3cf3-5x6x |
9.8 (3.1)
10.0 (4.0)
|
Altec DocLink (now maintained by Beyond Limits Inc.) version 4.0.336.0 exposes insecure .NET Remoti… | 2026-02-24T18:31:03Z | 2026-02-27T21:31:19Z |
| ghsa-8fr6-83vj-w7xh |
7.8 (3.1)
6.2 (4.0)
|
A vulnerability identified in the Trellix HX Agent driver file fekern.sys allowed a threat actor w… | 2026-02-24T18:31:03Z | 2026-02-26T21:31:30Z |
| ghsa-6xhx-53c5-f9qr |
6.6 (3.1)
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Lin… | 2026-02-24T18:31:03Z | 2026-02-24T21:31:45Z |
| ghsa-xjw5-9f76-gvpv |
7.5 (3.1)
8.7 (4.0)
|
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior use RC4 with a hard… | 2026-02-24T18:31:02Z | 2026-02-24T18:31:02Z |
| ghsa-xfph-w5p7-mhh4 |
5.4 (3.1)
5.1 (4.0)
|
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior reflect unsanitized… | 2026-02-24T18:31:02Z | 2026-02-25T18:31:36Z |
| ghsa-vrfc-p4p2-v8r2 |
8.8 (3.1)
|
Privilege escalation and improper access control in GCOM EPON 1GE C00R371V00B01 allows remote authe… | 2026-02-24T18:31:02Z | 2026-02-25T18:31:35Z |
| ghsa-m84g-fpm8-mqg8 |
7.5 (3.1)
8.7 (4.0)
|
Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 store a user passwo… | 2026-02-24T18:31:02Z | 2026-02-24T18:31:02Z |
| ghsa-jj9w-3m27-jg69 |
8.1 (3.1)
8.6 (4.0)
|
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior expose user passwor… | 2026-02-24T18:31:02Z | 2026-02-25T18:31:35Z |
| ghsa-hjg3-g5mq-q5qp |
7.1 (3.1)
8.6 (4.0)
|
Multiple Finka programs use hard-coded Firebird database credentials (shared across all instances o… | 2026-02-24T18:31:02Z | 2026-02-26T21:31:29Z |
| ghsa-gvwq-qfp3-3pvf |
8.8 (3.1)
8.7 (4.0)
|
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain a command i… | 2026-02-24T18:31:02Z | 2026-02-24T18:31:02Z |
| ghsa-gmfh-mhfh-2g3q |
4.3 (3.1)
5.1 (4.0)
|
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior lack CSRF protectio… | 2026-02-24T18:31:02Z | 2026-02-24T18:31:02Z |
| ghsa-9wv6-vw4x-jjg6 |
5.7 (4.0)
|
Download of Code Without Integrity Check vulnerability in Microchip Time Provider 4100 allows Malic… | 2026-02-24T18:31:02Z | 2026-02-24T18:31:02Z |
| ghsa-7c8p-f6jq-w42v |
9.8 (3.1)
9.3 (4.0)
|
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain hard-coded … | 2026-02-24T18:31:02Z | 2026-02-24T18:31:02Z |
| ghsa-69fx-mvcm-v5g3 |
9.1 (3.1)
9.3 (4.0)
|
Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 generate predictabl… | 2026-02-24T18:31:02Z | 2026-02-24T18:31:02Z |
| ghsa-4r4r-4jp4-wwf9 |
9.8 (3.1)
|
FUXA has JWT Authentication Bypass via HTTP Referer header spoofing | 2026-02-24T18:31:02Z | 2026-02-26T15:45:40Z |
| ghsa-3547-c34m-73j3 |
6.5 (3.1)
6.9 (4.0)
|
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior do not implement ra… | 2026-02-24T18:31:02Z | 2026-02-25T18:31:36Z |
| ghsa-qrvq-68c2-7grw |
5.9 (3.1)
|
nats-server websockets are vulnerable to pre-auth memory DoS | 2026-02-24T16:04:53Z | 2026-02-27T20:03:26Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-112 |
|
The cryptography package before 41.0.2 for Python mishandles SSH certificates that have c… | cryptography | 2023-07-14T20:15:00+00:00 | 2023-08-21T15:28:13.372385+00:00 |
| pysec-2023-119 |
|
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows unautho… | apache-airflow | 2023-07-12T10:15:00+00:00 | 2023-07-20T19:19:47.109731+00:00 |
| pysec-2023-106 |
|
Apache Airflow, versions before 2.6.3, has a vulnerability where an authenticated user ca… | apache-airflow | 2023-07-12T10:15:00+00:00 | 2023-07-12T12:59:56.816194+00:00 |
| pysec-2023-105 |
|
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an atta… | apache-airflow | 2023-07-12T10:15:00+00:00 | 2023-07-12T12:59:56.733680+00:00 |
| pysec-2023-104 |
|
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an atta… | apache-airflow | 2023-07-12T10:15:00+00:00 | 2023-07-12T12:59:56.649145+00:00 |
| pysec-2023-103 |
|
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an unau… | apache-airflow | 2023-07-12T10:15:00+00:00 | 2023-07-12T12:59:56.564522+00:00 |
| pysec-2023-118 |
|
RestrictedPython is a tool that helps to define a subset of the Python language which all… | restrictedpython | 2023-07-11T18:15:00+00:00 | 2023-07-19T20:24:12.944004+00:00 |
| pysec-2023-116 |
|
xalpha v0.11.4 is vulnerable to Remote Command Execution (RCE). | xalpha | 2023-07-11T15:15:00+00:00 | 2023-07-18T16:37:19.127985+00:00 |
| pysec-2023-115 |
|
Sentry is an error tracking and performance monitoring platform. Starting in version 23.6… | sentry | 2023-07-06T23:15:00+00:00 | 2023-07-17T20:27:52.414117+00:00 |
| pysec-2023-114 |
|
** DISPUTED ** A use-after-free issue was discovered in Py_FindObjects() function in SciP… | scipy | 2023-07-06T21:15:00+00:00 | 2023-07-17T20:27:52.117232+00:00 |
| pysec-2023-111 |
|
SQLFluff is a SQL linter. Prior to version 2.1.2, in environments where untrusted users h… | sqlfluff | 2023-07-06T16:15:00+00:00 | 2023-07-13T21:23:24.026294+00:00 |
| pysec-2023-110 |
|
SQL injection vulnerability in langchain v.0.0.64 allows a remote attacker to obtain sens… | langchain | 2023-07-06T14:15:00Z | 2023-08-28T16:50:24.862628Z |
| pysec-2023-109 |
|
An issue in langchain v.0.0.64 allows a remote attacker to execute arbitrary code via the… | langchain | 2023-07-06T14:15:00Z | 2023-08-29T16:42:00.000000Z |
| pysec-2023-107 |
|
Fides is an open-source privacy engineering platform for managing the fulfillment of data… | ethyca-fides | 2023-07-05T22:15:00+00:00 | 2023-07-12T16:35:41.463418+00:00 |
| pysec-2023-108 |
|
MechanicalSoup is a Python library for automating interaction with websites. Starting in … | mechanicalsoup | 2023-07-05T20:15:00+00:00 | 2023-07-12T18:32:48.148340+00:00 |
| pysec-2023-101 |
|
A cross-site scripting (XSS) vulnerability in Selenium Grid v3.141.59 allows attackers to… | selenium | 2023-07-05T18:15:00Z | 2023-08-31T20:11:41.543920Z |
| pysec-2023-102 |
|
A refcounting issue which leads to potential memory leak was discovered in scipy commit 8… | scipy | 2023-07-05T17:15:00Z | 2023-08-17T13:32:44.929651Z |
| pysec-2023-98 |
|
An issue in langchain v.0.0.199 allows an attacker to execute arbitrary code via the PALC… | langchain | 2023-07-03T21:15:00Z | 2023-08-29T16:40:00.000000Z |
| pysec-2023-113 |
|
Products.CMFCore are the key framework services for the Zope Content Management Framework… | products-cmfcore | 2023-07-03T17:15:00+00:00 | 2023-07-17T20:27:51.578279+00:00 |
| pysec-2023-100 |
|
In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and UR… | django | 2023-07-03T13:15:00+00:00 | 2023-07-11T16:37:11.407533+00:00 |
| pysec-2023-99 |
|
A dependency confusion in pipreqs v0.3.0 to v0.4.11 allows attackers to execute arbitrary… | pipreqs | 2023-06-30T20:15:00+00:00 | 2023-07-10T18:33:06.804092+00:00 |
| pysec-2023-93 |
|
pacparser_find_proxy in Pacparser before 1.4.2 allows JavaScript injection, and possibly … | pacparser | 2023-06-30T18:15:00+00:00 | 2023-06-30T20:25:46.450877+00:00 |
| pysec-2023-97 |
|
easy-parse v0.1.1 was discovered to contain a XML External Entity Injection (XXE) vulnera… | easy-parse | 2023-06-29T21:15:00+00:00 | 2023-07-07T02:41:36.549732+00:00 |
| pysec-2023-96 |
|
requests-xml v0.2.3 was discovered to contain an XML External Entity Injection (XXE) vuln… | requests-xml | 2023-06-29T21:15:00+00:00 | 2023-07-06T22:29:19.818007+00:00 |
| pysec-2023-95 |
|
py-xml v1.0 was discovered to contain an XML External Entity Injection (XXE) vulnerabilit… | py-xml | 2023-06-29T21:15:00+00:00 | 2023-07-06T22:29:19.184837+00:00 |
| pysec-2023-94 |
|
Flask-AppBuilder is an application development framework, built on top of Flask. Prior to… | flask-appbuilder | 2023-06-22T23:15:00+00:00 | 2023-07-03T20:28:23.811646+00:00 |
| pysec-2023-92 |
|
Langchain 0.0.171 is vulnerable to Arbitrary code execution in load_prompt. | langchain | 2023-06-20T15:15:00Z | 2023-08-29T18:59:00.000000Z |
| pysec-2023-89 |
|
In Apache Airflow, some potentially sensitive values were being shown to the user in cert… | apache-airflow | 2023-06-19T09:15:00Z | 2023-06-19T10:29:28.607914Z |
| pysec-2023-91 |
|
Langchain 0.0.171 is vulnerable to Arbitrary Code Execution. | langchain | 2023-06-14T15:15:00Z | 2023-08-28T16:50:25.676144Z |
| pysec-2023-88 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2023-06-08T21:15:00Z | 2023-06-16T18:28:10.272383Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-584 | Malicious code in chai-as-extended (npm) | 2026-01-28T15:06:22Z | 2026-02-02T05:56:26Z |
| mal-2026-589 | Malicious code in dotenv-embed (npm) | 2026-01-28T14:56:54Z | 2026-02-02T05:56:27Z |
| mal-2026-585 | Malicious code in chai-async-tests (npm) | 2026-01-28T14:56:54Z | 2026-02-02T05:56:26Z |
| mal-2026-588 | Malicious code in chai-sub (npm) | 2026-01-28T14:53:28Z | 2026-02-02T05:56:26Z |
| mal-2026-587 | Malicious code in chai-px (npm) | 2026-01-28T14:48:04Z | 2026-02-02T05:56:26Z |
| mal-2026-586 | Malicious code in chai-chains-async (npm) | 2026-01-28T14:46:57Z | 2026-02-02T05:56:26Z |
| mal-2026-583 | Malicious code in vuejavascript (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:31Z |
| mal-2026-582 | Malicious code in somsodamsd (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| mal-2026-581 | Malicious code in somesomesomesome (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| mal-2026-580 | Malicious code in somesomesome (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| mal-2026-579 | Malicious code in skndkjasndkjan (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| mal-2026-578 | Malicious code in @pukpuk1/somsodamsd (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:25Z |
| mal-2026-626 | Malicious code in react-toast-cold (npm) | 2026-01-28T08:21:01Z | 2026-02-04T05:37:06Z |
| mal-2026-570 | Malicious code in lyatly-utils (npm) | 2026-01-28T07:58:35Z | 2026-02-02T05:56:28Z |
| mal-2026-571 | Malicious code in okijuh (npm) | 2026-01-28T07:56:55Z | 2026-02-02T05:56:29Z |
| mal-2026-564 | Malicious code in chai-as-hashed (npm) | 2026-01-28T07:53:44Z | 2026-02-02T05:56:26Z |
| mal-2026-565 | Malicious code in converse-rn-lib (npm) | 2026-01-28T07:50:39Z | 2026-02-02T05:56:26Z |
| mal-2026-576 | Malicious code in teslaone (npm) | 2026-01-28T07:49:34Z | 2026-02-02T05:56:30Z |
| mal-2026-569 | Malicious code in ern-picking2-api (npm) | 2026-01-28T07:48:24Z | 2026-02-02T05:56:27Z |
| mal-2026-577 | Malicious code in transform-vue-jsx (npm) | 2026-01-28T07:43:54Z | 2026-02-02T05:56:31Z |
| mal-2026-575 | Malicious code in syntax-jsx (npm) | 2026-01-28T07:43:54Z | 2026-02-02T05:56:30Z |
| mal-2026-574 | Malicious code in syntax-flow (npm) | 2026-01-28T07:43:54Z | 2026-02-02T05:56:30Z |
| mal-2026-568 | Malicious code in equimper (npm) | 2026-01-28T07:43:53Z | 2026-02-02T05:56:27Z |
| mal-2026-562 | Malicious code in tabullates (PyPI) | 2026-01-28T07:42:32Z | 2026-01-28T19:13:29Z |
| mal-2026-572 | Malicious code in pino-debugger (npm) | 2026-01-28T07:37:08Z | 2026-02-02T05:56:29Z |
| mal-2026-567 | Malicious code in debug-glitz (npm) | 2026-01-28T07:37:08Z | 2026-02-02T05:56:27Z |
| mal-2026-566 | Malicious code in debug-fmt (npm) | 2026-01-28T07:37:08Z | 2026-02-02T05:56:27Z |
| mal-2026-573 | Malicious code in primebeem-db (npm) | 2026-01-28T07:27:26Z | 2026-02-02T05:56:29Z |
| mal-2026-563 | Malicious code in @nayzak51/primebeem-db (npm) | 2026-01-28T07:27:26Z | 2026-02-02T05:56:25Z |
| mal-2026-555 | Malicious code in acuitymobileapp (npm) | 2026-01-28T07:13:15Z | 2026-02-02T05:56:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2571 | Citrix Systems ADC und NetScaler: Schwachstelle ermöglicht Cross-Site Scripting | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2570 | Arista EOS: Schwachstelle ermöglicht Denial of Service | 2025-11-11T23:00:00.000+00:00 | 2025-11-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2569 | AMD EPYC-Prozessoren und Arm Trusted Firmware: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2025-11-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2568 | Red Hat Enterprise Linux (kea): Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-11T23:00:00.000+00:00 | 2025-12-03T23:00:00.000+00:00 |
| wid-sec-w-2025-2567 | Grafana: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2566 | Mozilla Firefox und Firefox ESR: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2565 | Adobe Creative Cloud Applikationen: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2025-11-13T23:00:00.000+00:00 |
| wid-sec-w-2025-2564 | Microsoft Windows und Windows Server: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2025-12-22T23:00:00.000+00:00 |
| wid-sec-w-2025-2563 | Microsoft Azure Linux: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-2562 | Microsoft SQL Server: Schwachstelle ermöglicht Privilegieneskalation | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2561 | Microsoft Office Produkte: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2560 | Microsoft Dynamics 365: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2559 | Microsoft Visual Studio Produkte: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2558 | Microsoft Azure: Schwachstelle ermöglicht Codeausführung | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2557 | Microsoft Configuration Manager: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2556 | Intel Graphics Driver: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2555 | Intel Rapid Storage Technology: Schwachstelle ermöglicht Privilegieneskalation | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2554 | Intel Driver and Support Assistant: Schwachstelle ermöglicht Privilegieneskalation | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2553 | Intel Server Configuration Utility: Schwachstelle ermöglicht Privilegieneskalation | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2552 | UEFI Server Firmware (Xeon 6): Schwachstelle ermöglicht Privilegieneskalation und DoS | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2551 | Intel oneAPI Math Kernel Library: Schwachstelle ermöglicht Denial of Service | 2025-11-11T23:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2550 | Intel 800 Series Ethernet (ESXi RDMA): Schwachstelle ermöglicht Denial of Service | 2025-11-11T23:00:00.000+00:00 | 2025-11-13T23:00:00.000+00:00 |
| wid-sec-w-2025-2549 | Intel PROSet Wireless WiFi Software: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-11T23:00:00.000+00:00 | 2025-11-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2546 | Axis Axis OS: Mehrere Schwachstellen | 2025-11-10T23:00:00.000+00:00 | 2025-11-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2545 | Apache OFBiz: Mehrere Schwachstellen | 2025-11-10T23:00:00.000+00:00 | 2025-11-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2544 | Gladinet Triofox: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und potenziell Codeausführung | 2025-11-10T23:00:00.000+00:00 | 2025-11-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2543 | Dell PowerScale OneFS: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-10T23:00:00.000+00:00 | 2025-11-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2542 | Microsoft GitHub Enterprise Server: Mehrere Schwachstellen | 2025-11-10T23:00:00.000+00:00 | 2025-11-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2541 | Zoom Video Communications Workplace und Rooms: Mehrere Schwachstellen | 2025-11-10T23:00:00.000+00:00 | 2025-11-13T23:00:00.000+00:00 |
| wid-sec-w-2025-2540 | IBM Cognos Analytics: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-10T23:00:00.000+00:00 | 2025-11-10T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0446 | Kwetsbaarheid verholpen in Schneider Electric Ecostruxture | 2024-11-14T12:46:16.737874Z | 2024-11-14T12:46:16.737874Z |
| ncsc-2024-0445 | Kwetsbaarheden verholpen in Fortinet FortiClient | 2024-11-14T12:42:00.899040Z | 2024-11-14T12:42:00.899040Z |
| ncsc-2024-0444 | Kwetsbaarheden verholpen in Palo Alto PAN-OS | 2024-11-14T12:38:50.941039Z | 2024-11-14T12:38:50.941039Z |
| ncsc-2024-0443 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en NetScaler Gateway | 2024-11-13T15:10:45.265209Z | 2024-11-13T15:10:45.265209Z |
| ncsc-2024-0442 | Kwetsbaarheden verholpen in Ivanti Connect Secure en Policy Secure | 2024-11-13T12:38:13.252957Z | 2024-11-13T12:38:13.252957Z |
| ncsc-2024-0441 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2024-11-13T10:42:35.387490Z | 2024-11-13T10:42:35.387490Z |
| ncsc-2024-0440 | Kwetsbaarheden verholpen in Citrix Session Recording | 2024-11-13T08:51:17.257998Z | 2024-11-13T08:51:17.257998Z |
| ncsc-2024-0439 | Kwetsbaarheden verholpen in Microsoft Office | 2024-11-12T18:57:09.604321Z | 2024-11-12T18:57:09.604321Z |
| ncsc-2024-0438 | Kwetsbaarheid verholpen in Microsoft Exchange Server | 2024-11-12T18:56:25.729148Z | 2024-11-12T18:56:25.729148Z |
| ncsc-2024-0437 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2024-11-12T18:55:39.363057Z | 2024-11-12T18:55:39.363057Z |
| ncsc-2024-0436 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-11-12T18:54:41.456199Z | 2024-11-12T18:54:41.456199Z |
| ncsc-2024-0435 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-11-12T18:54:00.107773Z | 2024-11-12T18:54:00.107773Z |
| ncsc-2024-0434 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-11-12T18:53:07.914094Z | 2024-11-12T18:53:07.914094Z |
| ncsc-2024-0433 | Kwetsbaarheden verholpen in Siemens producten | 2024-11-12T14:19:20.051128Z | 2024-11-12T14:19:20.051128Z |
| ncsc-2024-0432 | Kwetsbaarheden verholpen in Cisco Identity Services Engine | 2024-11-07T08:55:49.899244Z | 2024-11-07T08:55:49.899244Z |
| ncsc-2024-0431 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2024-11-07T08:51:16.689034Z | 2024-11-07T08:51:16.689034Z |
| ncsc-2024-0430 | Kwetsbaarheid verholpen in Cisco Catalyst Access points | 2024-11-07T08:47:41.650502Z | 2024-11-07T08:47:41.650502Z |
| ncsc-2024-0429 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-11-05T14:09:27.373651Z | 2024-11-05T14:09:27.373651Z |
| ncsc-2024-0428 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-10-30T11:39:26.910666Z | 2024-10-30T11:39:26.910666Z |
| ncsc-2024-0427 | Kwetsbaarheden verholpen in Google Chrome | 2024-10-30T11:36:05.615865Z | 2024-10-30T11:36:05.615865Z |
| ncsc-2024-0426 | Kwetsbaarheden verholpen in Apple MacOS | 2024-10-30T11:26:13.535716Z | 2024-10-30T11:26:13.535716Z |
| ncsc-2024-0425 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2024-10-30T10:53:07.348476Z | 2024-10-30T10:53:07.348476Z |
| ncsc-2024-0424 | Kwetsbaarheden verholpen in Cisco Adaptive Security Appliance en Firepower Threat Defense | 2024-10-24T08:37:15.013231Z | 2024-10-24T08:37:15.013231Z |
| ncsc-2024-0423 | Kwetsbaarheid ontdekt in Fortinet FortiManager | 2024-10-23T16:51:38.477778Z | 2024-11-15T10:52:37.440334Z |
| ncsc-2024-0422 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2024-10-18T09:26:29.690794Z | 2024-10-18T09:26:29.690794Z |
| ncsc-2024-0421 | Kwetsbaarheden verholpen in SolarWinds Serv-U | 2024-10-18T09:10:48.856424Z | 2024-10-18T09:10:48.856424Z |
| ncsc-2024-0420 | Kwetsbaarheden verholpen in Oracle MySQL | 2024-10-17T13:20:42.437738Z | 2024-10-17T13:20:42.437738Z |
| ncsc-2024-0419 | Kwetsbaarheden verholpen in Oracle Java | 2024-10-17T13:20:07.759085Z | 2024-10-17T13:20:07.759085Z |
| ncsc-2024-0418 | Kwetsbaarheden verholpen in Oracle Analytics | 2024-10-17T13:19:50.583299Z | 2024-10-17T13:19:50.583299Z |
| ncsc-2024-0417 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2024-10-17T13:19:16.185510Z | 2024-10-17T13:19:16.185510Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-983300 | SSA-983300: Vulnerabilities in LOGO! Soft Comfort | 2021-04-13T00:00:00Z | 2023-12-12T00:00:00Z |
| ssa-853866 | SSA-853866: User Credentials Disclosure Vulnerability in Siveillance Video Open Network Bridge (ONVIF) | 2021-04-13T00:00:00Z | 2021-04-13T00:00:00Z |
| ssa-788287 | SSA-788287: Disclosure of Private Data | 2021-04-13T00:00:00Z | 2021-04-13T00:00:00Z |
| ssa-761844 | SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) | 2021-04-13T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-705111 | SSA-705111: Multiple Vulnerabilities (NAME:WRECK) in the DNS Module of Nucleus RTOS | 2021-04-13T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-669158 | SSA-669158: DNS Client Vulnerabilities in SIMOTICS CONNECT 400 | 2021-04-13T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-574442 | SSA-574442: Multiple PAR and DFT File Parsing Vulnerabilities in Solid Edge | 2021-04-13T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-292794 | SSA-292794: Multiple Denial-of-Service Vulnerabilities in SINEMA Remote Connect Server | 2021-04-13T00:00:00Z | 2021-04-13T00:00:00Z |
| ssa-187092 | SSA-187092: Several Buffer-Overflow Vulnerabilities in Web Server of SCALANCE X-200 | 2021-04-13T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-163226 | SSA-163226: CELL File Parsing Vulnerability in Tecnomatix RobotExpert | 2021-04-13T00:00:00Z | 2021-04-13T00:00:00Z |
| ssa-979775 | SSA-979775: Stack Overflow Vulnerability in SCALANCE and RUGGEDCOM Devices | 2021-03-09T00:00:00Z | 2021-04-13T00:00:00Z |
| ssa-936080 | SSA-936080: Multiple Vulnerabilities in Third-Party Component libcurl | 2021-03-09T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-783481 | SSA-783481: Denial-of-Service Vulnerability in LOGO! 8 BM | 2021-03-09T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-296266 | SSA-296266: Denial-of-Service Vulnerability in SCALANCE and RUGGEDCOM Devices | 2021-03-09T00:00:00Z | 2021-04-13T00:00:00Z |
| ssa-794542 | SSA-794542: Insecure Folder Permissions in SIMARIS Configuration | 2021-02-09T00:00:00Z | 2021-05-11T00:00:00Z |
| ssa-663999 | SSA-663999: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.1.0.1 | 2021-02-09T00:00:00Z | 2021-05-17T00:00:00Z |
| ssa-428051 | SSA-428051: Privilege Escalation Vulnerability in TIA Administrator | 2021-02-09T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-362164 | SSA-362164: Predictable Initial Sequence Numbers in the TCP/IP Stack of Nucleus RTOS | 2021-02-09T00:00:00Z | 2022-11-08T00:00:00Z |
| ssa-646763 | SSA-646763: DNSpooq - Dnsmasq Vulnerabilities in SCALANCE and RUGGEDCOM Devices | 2021-01-19T00:00:00Z | 2021-05-11T00:00:00Z |
| ssa-622830 | SSA-622830: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.1.0 | 2021-01-12T00:00:00Z | 2021-05-17T00:00:00Z |
| ssa-139628 | SSA-139628: Vulnerabilities in Web Server for Scalance X Products | 2021-01-12T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-478893 | SSA-478893: TightVNC Vulnerabilities in Industrial Products (Revoked) | 2020-12-08T00:00:00Z | 2021-05-11T00:00:00Z |
| ssa-492828 | SSA-492828: Denial-of-Service Vulnerability in SIMATIC S7-300 CPUs and SINUMERIK Controller | 2020-11-10T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-542525 | SSA-542525: Authentication Vulnerabilities in SIMATIC HMI Products | 2020-09-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-455843 | SSA-455843: WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens Products | 2020-09-08T00:00:00Z | 2022-02-17T00:00:00Z |
| ssa-689942 | SSA-689942: Denial-of-Service and DLL Hijacking Vulnerabilities in Multiple SIMATIC Software Products | 2020-06-09T00:00:00Z | 2021-04-13T00:00:00Z |
| ssa-312271 | SSA-312271: Unquoted Search Path Vulnerability in Windows-based Industrial Software Applications | 2020-06-09T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-102233 | SSA-102233: SegmentSmack in VxWorks-based Industrial Devices | 2020-04-14T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-844761 | SSA-844761: Multiple Vulnerabilities in SiNVR/SiVMS Video Server | 2020-03-10T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-978220 | SSA-978220: Denial of Service Vulnerability over SNMP in Multiple Industrial Products | 2020-02-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0974 | Red Hat Security Advisory: gnupg2 security update | 2026-01-22T06:57:36+00:00 | 2026-02-11T15:13:17+00:00 |
| rhsa-2026:0973 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T05:34:26+00:00 | 2026-02-17T08:01:03+00:00 |
| rhsa-2026:0934 | Red Hat Security Advisory: Release of OpenShift Serverless Logic 1.36.0 security update & enhancements | 2026-01-22T04:35:39+00:00 | 2026-02-10T16:53:48+00:00 |
| rhsa-2026:0663 | Red Hat Security Advisory: OpenShift Container Platform 4.20.11 bug fix and security update | 2026-01-22T03:28:29+00:00 | 2026-02-17T08:01:02+00:00 |
| rhsa-2026:0950 | Red Hat Security Advisory: OpenShift Virtualization 4.19.17 Images | 2026-01-22T02:56:54+00:00 | 2026-01-26T19:36:47+00:00 |
| rhsa-2026:0936 | Red Hat Security Advisory: glib2 security update | 2026-01-21T19:53:19+00:00 | 2026-02-13T19:06:50+00:00 |
| rhsa-2026:0935 | Red Hat Security Advisory: gnupg2 security update | 2026-01-21T19:09:27+00:00 | 2026-02-11T15:13:16+00:00 |
| rhsa-2026:0930 | Red Hat Security Advisory: pcs security update | 2026-01-21T15:59:50+00:00 | 2026-02-11T01:04:03+00:00 |
| rhsa-2026:0847 | Red Hat Security Advisory: java-11-openjdk ELS security update | 2026-01-21T14:09:25+00:00 | 2026-02-03T20:02:50+00:00 |
| rhsa-2026:0849 | Red Hat Security Advisory: OpenJDK 11.0.30 ELS Security Update for Windows Builds | 2026-01-21T13:47:54+00:00 | 2026-02-03T20:02:52+00:00 |
| rhsa-2026:0848 | Red Hat Security Advisory: OpenJDK 11.0.30 ELS Security Update for Portable Linux Builds | 2026-01-21T13:39:28+00:00 | 2026-02-03T20:02:51+00:00 |
| rhsa-2026:0926 | Red Hat Security Advisory: net-snmp security update | 2026-01-21T13:18:40+00:00 | 2026-01-21T15:55:22+00:00 |
| rhsa-2026:0925 | Red Hat Security Advisory: libsoup security update | 2026-01-21T12:55:50+00:00 | 2026-01-29T15:24:44+00:00 |
| rhsa-2026:0923 | Red Hat Security Advisory: golang security update | 2026-01-21T12:11:33+00:00 | 2026-02-17T12:41:13+00:00 |
| rhsa-2026:0924 | Red Hat Security Advisory: thunderbird security update | 2026-01-21T12:03:00+00:00 | 2026-02-09T13:25:57+00:00 |
| rhsa-2026:0917 | Red Hat Security Advisory: kernel security update | 2026-01-21T10:12:07+00:00 | 2026-02-12T19:26:38+00:00 |
| rhsa-2026:0921 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-01-21T10:01:30+00:00 | 2026-02-17T12:41:14+00:00 |
| rhsa-2026:0922 | Red Hat Security Advisory: golang security update | 2026-01-21T09:50:39+00:00 | 2026-02-17T12:41:13+00:00 |
| rhsa-2026:0914 | Red Hat Security Advisory: gimp security update | 2026-01-21T07:41:14+00:00 | 2026-01-29T21:07:52+00:00 |
| rhsa-2026:0911 | Red Hat Security Advisory: libsoup security update | 2026-01-21T06:39:49+00:00 | 2026-01-29T15:24:39+00:00 |
| rhsa-2026:0908 | Red Hat Security Advisory: libsoup security update | 2026-01-21T05:40:16+00:00 | 2026-01-29T15:24:37+00:00 |
| rhsa-2026:0907 | Red Hat Security Advisory: libsoup security update | 2026-01-21T05:40:05+00:00 | 2026-01-29T15:24:36+00:00 |
| rhsa-2026:0905 | Red Hat Security Advisory: libsoup security update | 2026-01-21T05:26:02+00:00 | 2026-01-29T15:24:36+00:00 |
| rhsa-2026:0906 | Red Hat Security Advisory: libsoup security update | 2026-01-21T05:17:45+00:00 | 2026-01-29T15:24:35+00:00 |
| rhsa-2026:0909 | Red Hat Security Advisory: libsoup security update | 2026-01-21T05:13:10+00:00 | 2026-01-29T15:24:34+00:00 |
| rhsa-2026:0887 | Red Hat Security Advisory: openssl security update | 2026-01-20T16:12:12+00:00 | 2026-02-04T01:03:37+00:00 |
| rhsa-2026:0867 | Red Hat Security Advisory: libsoup security update | 2026-01-20T15:37:11+00:00 | 2026-01-29T15:24:36+00:00 |
| rhsa-2026:0868 | Red Hat Security Advisory: libsoup security update | 2026-01-20T15:33:17+00:00 | 2026-01-29T15:24:37+00:00 |
| rhsa-2026:0865 | Red Hat Security Advisory: libpq security update | 2026-01-20T14:52:12+00:00 | 2026-02-02T21:27:34+00:00 |
| rhba-2026:0860 | Red Hat Bug Fix Advisory: open-vm-tools bug fix and enhancement update | 2026-01-20T14:46:22+00:00 | 2026-01-22T12:57:05+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsma-25-051-01 | Medixant RadiAnt DICOM Viewer | 2025-02-20T07:00:00.000000Z | 2025-02-20T07:00:00.000000Z |
| icsa-25-051-05 | Rapid Response Monitoring My Security Account App | 2025-02-20T07:00:00.000000Z | 2025-02-20T07:00:00.000000Z |
| icsa-25-051-03 | Carrier Block Load | 2025-02-20T07:00:00.000000Z | 2025-02-20T07:00:00.000000Z |
| icsa-25-051-06 | Elseta Vinci Protocol Analyzer | 2025-02-18T07:00:00.000000Z | 2025-02-18T07:00:00.000000Z |
| icsa-25-051-04 | Siemens SiPass Integrated | 2025-02-17T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsma-25-044-01 | Qardio Heart Health IOS and Android Application and QardioARM A100 | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| icsa-25-044-18 | Dingtian DT-R0 Series | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| icsa-25-044-17 | Outback Power Mojave Inverter | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| icsa-25-044-16 | mySCADA myPRO Manager | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| icsa-25-044-15 | ORing IAP-420 | 2025-02-13T07:00:00.000000Z | 2025-02-13T07:00:00.000000Z |
| va-25-043-01 | Ivanti Connect Secure and Ivanti Policy Secure external file control vulnerability | 2025-02-12T19:44:47Z | 2025-02-20T00:00:00Z |
| icsa-25-079-02 | Schneider Electric Enerlin’X IFE and eIFE | 2025-02-11T06:00:00.000000Z | 2025-02-11T06:00:00.000000Z |
| icsa-25-079-01 | Schneider Electric EcoStruxureâ„¢ | 2025-02-11T06:00:00.000000Z | 2025-02-11T06:00:00.000000Z |
| icsa-25-077-05 | Schneider Electric ASCO 5310/5350 Remote Annunciator | 2025-02-11T06:00:00.000000Z | 2025-02-11T06:00:00.000000Z |
| icsa-25-070-01 | Schneider Electric Uni-Telway Driver (Update C) | 2025-02-11T05:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-25-044-14 | Siemens Opcenter Intelligence | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-13 | Siemens SIMATIC PCS neo, TIA Administrator, and TIA Portal | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-12 | Siemens SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor | 2025-02-11T00:00:00.000000Z | 2025-04-08T00:00:00.000000Z |
| icsa-25-044-11 | Siemens Apogee PXC100 Devices | 2025-02-11T00:00:00.000000Z | 2025-02-11T00:00:00.000000Z |
| icsa-25-044-10 | Siemens Questa and ModelSim | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-09 | Siemens SCALANCE W700 IEEE 802.11ax | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-08 | Siemens OpenV2G | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-07 | Siemens Teamcenter | 2025-02-11T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-044-06 | Siemens RUGGEDCOM APE1808 Devices | 2025-02-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-044-05 | Siemens SIPROTEC 5 Devices | 2025-02-11T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-044-04 | Siemens SIPROTEC 5 | 2025-02-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-044-03 | Siemens SIPROTEC 5 | 2025-02-11T00:00:00.000000Z | 2025-02-11T00:00:00.000000Z |
| icsa-25-044-02 | Siemens SIMATIC | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-044-01 | Siemens SIMATIC S7-1200 CPU Family | 2025-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsma-25-037-02 | Orthanc Server | 2025-02-06T07:00:00.000000Z | 2025-02-06T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-vmanage-unauthapi-sphclypa | Cisco SD-WAN vManage Unauthenticated REST API Access Vulnerability | 2023-07-12T16:00:00+00:00 | 2024-03-12T18:21:23+00:00 |
| cisco-sa-sxsscsrf-2l24bbx6 | Cisco Webex Meetings Web UI Vulnerabilities | 2023-07-05T16:00:00+00:00 | 2023-07-05T16:00:00+00:00 |
| cisco-sa-duo-auth-info-jgkswblz | Cisco Duo Authentication Proxy Information Disclosure Vulnerability | 2023-07-05T16:00:00+00:00 | 2023-07-07T15:45:19+00:00 |
| cisco-sa-bw-privesc-yw4ekrxw | Cisco BroadWorks Privilege Escalation Vulnerability | 2023-07-05T16:00:00+00:00 | 2023-07-05T16:00:00+00:00 |
| cisco-sa-aci-cloudsec-enc-vs5wn2sx | Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability | 2023-07-05T16:00:00+00:00 | 2023-07-08T14:43:43+00:00 |
| cisco-sa-esa-sma-wsa-xss-cp9duemq | Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities | 2023-06-21T16:00:00+00:00 | 2023-07-11T16:43:10+00:00 |
| cisco-sa-duo-mac-bypass-oyzpvpnx | Cisco Duo Two-Factor Authentication for macOS Authentication Bypass Vulnerability | 2023-06-21T16:00:00+00:00 | 2023-06-21T16:00:00+00:00 |
| cisco-sa-smb-sxss-opyjzume | Cisco Small Business 200, 300, and 500 Series Switches Web-Based Management Stored Cross-Site Scripting Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-expressway-priv-esc-ls2b9t7b | Cisco Expressway Series and Cisco TelePresence Video Communication Server Privilege Escalation Vulnerabilities | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-cucm-imp-dos-49gl7rzt | Cisco Unified Communications Manager IM & Presence Service Denial of Service Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-cucm-dos-4ag3ywbd | Cisco Unified Communications Manager Denial of Service Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-csw-auth-openapi-ktndjdnx | Cisco Secure Workload Authenticated OpenAPI Privilege Escalation Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-asaftd-ssl-dos-uu7mv5p6 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 2100 Series Appliances SSL/TLS Denial of Service Vulnerability | 2023-06-07T16:00:00+00:00 | 2024-05-22T16:37:00+00:00 |
| cisco-sa-ac-csc-privesc-wx4u4kw | Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows Privilege Escalation Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-07-05T16:20:46+00:00 |
| cisco-sa-ssm-sql-x9mmjsyh | Cisco Smart Software Manager On-Prem SQL Injection Vulnerability | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-sg-web-multi-s9g4nkgv | Cisco Small Business Series Switches Buffer Overflow Vulnerabilities | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-ise-xxe-inj-696oztcm | Cisco Identity Services Engine XML External Entity Injection Vulnerabilities | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-ise-traversal-ztugmyhu | Cisco Identity Services Engine Path Traversal Vulnerabilities | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-ise-injection-srqnseu9 | Cisco Identity Services Engine Command Injection Vulnerabilities | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-ise-file-dwnld-srcdnkd2 | Cisco Identity Services Engine Arbitrary File Download Vulnerabilities | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-ise-file-delete-read-pk5ghddd | Cisco Identity Services Engine Arbitrary File Delete and File Read Vulnerabilities | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-dnac-multiple-ktqkgu3 | Cisco DNA Center Software API Vulnerabilities | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-cbw-auth-bypass-ggnafdz | Cisco Business Wireless Access Points Social Login Guest User Authentication Bypass Vulnerability | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-spa-unauth-upgrade-uqhytww | Cisco SPA112 2-Port Phone Adapters Remote Command Execution Vulnerability | 2023-05-03T16:00:00+00:00 | 2023-05-03T16:00:00+00:00 |
| cisco-sa-pcd-xss-jdxpjm7 | Cisco Prime Collaboration Deployment Cross-Site Scripting Vulnerability | 2023-04-26T16:00:00+00:00 | 2023-04-26T16:00:00+00:00 |
| cisco-sa-staros-ssh-privesc-bmwejc3h | Cisco StarOS Software Key-Based SSH Authentication Privilege Escalation Vulnerability | 2023-04-19T16:00:00+00:00 | 2023-04-19T16:00:00+00:00 |
| cisco-sa-sdwan-vmanage-wfnqmyhn | Cisco SD-WAN vManage Software Arbitrary File Deletion Vulnerability | 2023-04-19T16:00:00+00:00 | 2023-04-19T16:00:00+00:00 |
| cisco-sa-roomos-file-write-rhkwegkf | Cisco TelePresence Collaboration Endpoint and RoomOS Arbitrary File Write Vulnerabilities | 2023-04-19T16:00:00+00:00 | 2023-04-19T16:00:00+00:00 |
| cisco-sa-ind-caelfk6v | Cisco Industrial Network Director Vulnerabilities | 2023-04-19T16:00:00+00:00 | 2023-04-19T16:00:00+00:00 |
| cisco-sa-cml-auth-bypass-4fucceg5 | Cisco Modeling Labs External Authentication Bypass Vulnerability | 2023-04-19T16:00:00+00:00 | 2023-04-19T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-68364 | ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent() | 2025-12-02T00:00:00.000Z | 2026-01-13T01:43:41.000Z |
| msrc_cve-2025-68363 | bpf: Check skb->transport_header is set in bpf_skb_check_mtu | 2025-12-02T00:00:00.000Z | 2026-02-18T02:34:53.000Z |
| msrc_cve-2025-68362 | wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb() | 2025-12-02T00:00:00.000Z | 2026-02-18T02:20:04.000Z |
| msrc_cve-2025-68358 | btrfs: fix racy bitfield write in btrfs_clear_space_info_full() | 2025-12-02T00:00:00.000Z | 2026-02-28T01:37:37.000Z |
| msrc_cve-2025-68357 | iomap: allocate s_dio_done_wq for async reads as well | 2025-12-02T00:00:00.000Z | 2026-01-08T14:37:11.000Z |
| msrc_cve-2025-68356 | gfs2: Prevent recursive memory reclaim | 2025-12-02T00:00:00.000Z | 2026-02-18T02:29:44.000Z |
| msrc_cve-2025-68354 | regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex | 2025-12-02T00:00:00.000Z | 2026-02-18T02:19:05.000Z |
| msrc_cve-2025-68349 | NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid | 2025-12-02T00:00:00.000Z | 2026-02-18T02:18:05.000Z |
| msrc_cve-2025-68347 | ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events | 2025-12-02T00:00:00.000Z | 2026-02-18T02:27:52.000Z |
| msrc_cve-2025-68346 | ALSA: dice: fix buffer overflow in detect_stream_formats() | 2025-12-02T00:00:00.000Z | 2026-01-08T14:40:32.000Z |
| msrc_cve-2025-68345 | ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi() | 2025-12-02T00:00:00.000Z | 2026-02-18T02:21:04.000Z |
| msrc_cve-2025-68344 | ALSA: wavefront: Fix integer overflow in sample size validation | 2025-12-02T00:00:00.000Z | 2026-01-13T01:43:07.000Z |
| msrc_cve-2025-68343 | can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing header | 2025-12-02T00:00:00.000Z | 2026-01-07T14:41:20.000Z |
| msrc_cve-2025-68342 | can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data | 2025-12-02T00:00:00.000Z | 2026-01-07T14:41:13.000Z |
| msrc_cve-2025-68340 | team: Move team device type change at the end of team_port_add | 2025-12-02T00:00:00.000Z | 2026-02-28T01:02:07.000Z |
| msrc_cve-2025-68339 | atm/fore200e: Fix possible data race in fore200e_open() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:41:07.000Z |
| msrc_cve-2025-68338 | net: dsa: microchip: Don't free uninitialized ksz_irq | 2025-12-02T00:00:00.000Z | 2026-02-18T02:13:30.000Z |
| msrc_cve-2025-68337 | jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted | 2025-12-02T00:00:00.000Z | 2026-02-18T02:05:22.000Z |
| msrc_cve-2025-68336 | locking/spinlock/debug: Fix data-race in do_raw_write_lock | 2025-12-02T00:00:00.000Z | 2026-02-18T02:08:21.000Z |
| msrc_cve-2025-68335 | comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() | 2025-12-02T00:00:00.000Z | 2026-01-13T01:41:16.000Z |
| msrc_cve-2025-68334 | platform/x86/amd/pmc: Add support for Van Gogh SoC | 2025-12-02T00:00:00.000Z | 2026-02-18T02:10:16.000Z |
| msrc_cve-2025-68333 | sched_ext: Fix possible deadlock in the deferred_irq_workfn() | 2025-12-02T00:00:00.000Z | 2026-01-13T14:37:47.000Z |
| msrc_cve-2025-68332 | comedi: c6xdigio: Fix invalid PNP driver unregistration | 2025-12-02T00:00:00.000Z | 2026-01-13T01:41:09.000Z |
| msrc_cve-2025-68331 | usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer | 2025-12-02T00:00:00.000Z | 2026-01-07T14:40:40.000Z |
| msrc_cve-2025-68330 | iio: accel: bmc150: Fix irq assumption regression | 2025-12-02T00:00:00.000Z | 2026-01-13T01:41:31.000Z |
| msrc_cve-2025-68328 | firmware: stratix10-svc: fix bug in saving controller data | 2025-12-02T00:00:00.000Z | 2026-01-13T01:41:38.000Z |
| msrc_cve-2025-68327 | usb: renesas_usbhs: Fix synchronous external abort on unbind | 2025-12-02T00:00:00.000Z | 2026-01-07T14:40:47.000Z |
| msrc_cve-2025-68324 | scsi: imm: Fix use-after-free bug caused by unfinished delayed work | 2025-12-02T00:00:00.000Z | 2026-02-18T01:56:58.000Z |
| msrc_cve-2025-68322 | parisc: Avoid crash due to unaligned access in unwinder | 2025-12-02T00:00:00.000Z | 2026-01-13T01:39:07.000Z |
| msrc_cve-2025-68318 | clk: thead: th1520-ap: set all AXI clocks to CLK_IS_CRITICAL | 2025-12-02T00:00:00.000Z | 2026-01-13T14:37:11.000Z |
| ID | Description | Updated |
|---|---|---|
| var-200906-0617 | The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly ini… | 2025-12-22T22:13:25.576000Z |
| var-202109-1790 | A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when … | 2025-12-22T22:13:25.343000Z |
| var-201601-0495 | Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x bef… | 2025-12-22T22:13:21.379000Z |
| var-201908-0266 | Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a den… | 2025-12-22T22:13:19.610000Z |
| var-200805-0585 | OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the… | 2025-12-22T22:13:18.068000Z |
| var-201806-1439 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2025-12-22T22:13:17.826000Z |
| var-202205-1953 | A logic issue was addressed with improved state management. This issue is fixed in Securi… | 2025-12-22T22:13:09.282000Z |
| var-201205-0393 | Multiple stack-based buffer overflows in Apple QuickTime before 7.7.2 on Windows allow re… | 2025-12-22T22:13:08.125000Z |
| var-201505-0337 | The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorit… | 2025-12-22T22:13:07.939000Z |
| var-201302-0332 | The TLS implementation in Mozilla Network Security Services (NSS) does not properly consi… | 2025-12-22T22:13:07.602000Z |
| var-201204-0112 | The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before … | 2025-12-22T22:13:07.476000Z |
| var-201202-0066 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T22:13:06.587000Z |
| var-201506-0497 | The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 … | 2025-12-22T22:13:05.849000Z |
| var-202202-0906 | valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes. -----BE… | 2025-12-22T22:13:05.513000Z |
| var-202204-0855 | There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, … | 2025-12-22T22:13:05.435000Z |
| var-201707-1241 | In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]A… | 2025-12-22T22:13:05.111000Z |
| var-202204-0692 | Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability … | 2025-12-22T22:12:58.383000Z |
| var-200106-0149 | Buffer overflow in IPSwitch IMail SMTP server 6.06 and possibly prior versions allows rem… | 2025-12-22T22:12:27.521000Z |
| var-201805-0950 | A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Softw… | 2025-12-22T22:12:27.389000Z |
| var-201912-0602 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T22:11:56.845000Z |
| var-202109-0277 | A logic issue was addressed with improved state management. This issue is fixed in iTunes… | 2025-12-22T22:11:56.375000Z |
| var-202203-0005 | The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can… | 2025-12-22T22:11:54.518000Z |
| var-202101-1926 | Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer o… | 2025-12-22T22:11:15.713000Z |
| var-201110-0451 | The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d i… | 2025-12-22T22:11:15.207000Z |
| var-202205-1370 | Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote … | 2025-12-22T22:11:15.106000Z |
| var-201110-0476 | Use-after-free vulnerability in Google Chrome before 15.0.874.102 allows remote attackers… | 2025-12-22T22:11:12.431000Z |
| var-202308-2021 | .NET and Visual Studio Denial of Service Vulnerability. =================================… | 2025-12-22T22:11:03.478000Z |
| var-201601-0016 | Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before … | 2025-12-22T22:11:02.935000Z |
| var-202205-1299 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2025-12-22T22:11:02.403000Z |
| var-200809-0566 | Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2… | 2025-12-22T22:10:53.229000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-000089 | Multiple vulnerabilities in i-PRO VI Web Client | 2023-08-31T14:13+09:00 | 2024-05-14T18:05+09:00 |
| jvndb-2023-003028 | Phoenix Technologies Windows kernel driver vulnerable to insufficient access control on its IOCTL | 2023-08-30T10:05+09:00 | 2024-04-24T11:43+09:00 |
| jvndb-2023-003023 | Vulnerability in HiRDB | 2023-08-29T15:55+09:00 | 2023-09-06T15:45+09:00 |
| jvndb-2023-000087 | SYNCK GRAPHICA Mailform Pro CGI vulnerable to Regular expression Denial-of-Service (ReDoS) | 2023-08-24T14:12+09:00 | 2024-05-15T17:12+09:00 |
| jvndb-2023-000085 | "Skylark" App fails to restrict custom URL schemes properly | 2023-08-24T13:34+09:00 | 2024-12-03T15:51+09:00 |
| jvndb-2023-000086 | Rakuten WiFi Pocket vulnerable to improper authentication | 2023-08-23T12:42+09:00 | 2024-03-27T13:43+09:00 |
| jvndb-2023-002906 | Multiple vulnerabilities in Panasonic Control FPWIN Pro7 | 2023-08-22T18:02+09:00 | 2024-04-18T17:31+09:00 |
| jvndb-2023-002905 | Multiple vulnerabilities in CBC digital video recorders | 2023-08-22T17:35+09:00 | 2024-04-10T17:39+09:00 |
| jvndb-2023-000084 | WordPress Plugin "Advanced Custom Fields" vulnerable to cross-site scripting | 2023-08-21T14:05+09:00 | 2024-03-25T17:55+09:00 |
| jvndb-2023-000083 | Multiple vulnerabilities in LuxCal Web Calendar | 2023-08-21T13:29+09:00 | 2024-03-26T17:09+09:00 |
| jvndb-2023-000078 | Multiple vulnerabilities in Proself | 2023-08-18T13:47+09:00 | 2024-03-28T17:43+09:00 |
| jvndb-2023-000082 | EC-CUBE 2 series vulnerable to cross-site scripting | 2023-08-17T15:12+09:00 | 2024-03-25T18:07+09:00 |
| jvndb-2023-002797 | Multiple vulnerabilities in ELECOM and LOGITEC network devices | 2023-08-15T11:54+09:00 | 2025-02-13T15:21+09:00 |
| jvndb-2023-002796 | Multiple server-side request forgery vulnerabilities in Trend Micro Apex Central (July 2023) | 2023-08-10T16:04+09:00 | 2024-03-13T17:58+09:00 |
| jvndb-2023-000081 | "Rikunabi NEXT" App for Android fails to restrict custom URL schemes properly | 2023-08-09T12:45+09:00 | 2024-03-28T18:01+09:00 |
| jvndb-2023-000080 | "FFRI yarai" and "FFRI yarai Home and Business Edition" handle exceptional conditions improperly | 2023-08-07T17:39+09:00 | 2024-03-28T17:54+09:00 |
| jvndb-2023-000079 | Multiple vulnerabilities in Special Interest Group Network for Analysis and Liaison's API | 2023-08-07T15:15+09:00 | 2024-03-28T18:08+09:00 |
| jvndb-2023-000077 | Fujitsu Software Infrastructure Manager (ISM) stores sensitive information in cleartext | 2023-08-04T17:31+09:00 | 2024-04-03T17:19+09:00 |
| jvndb-2023-002787 | OMRON CJ series and CS/CJ Series EtherNet/IT unit vulnerable to Denial-of-Service (DoS) | 2023-08-03T13:45+09:00 | 2023-08-03T13:45+09:00 |
| jvndb-2023-002786 | Multiple vulnerabilities in OMRON CX-Programmer | 2023-08-03T13:42+09:00 | 2024-04-05T17:39+09:00 |
| jvndb-2023-000076 | SEIKO EPSON printer Web Config vulnerable to denial-of-service (DoS) | 2023-08-02T14:55+09:00 | 2024-04-19T17:27+09:00 |
| jvndb-2023-002725 | Multiple vulnerabilities in Command Center RX (CCRX) of Kyocera Document Solutions MFPs and printers | 2023-07-28T18:24+09:00 | 2024-05-07T18:15+09:00 |
| jvndb-2023-002722 | Fujitsu network devices Si-R series and SR-M series vulnerable to authentication bypass | 2023-07-27T18:12+09:00 | 2024-04-19T18:07+09:00 |
| jvndb-2023-000074 | Fujitsu Real-time Video Transmission Gear "IP series" uses a hard-coded credentials | 2023-07-26T18:00+09:00 | 2024-04-12T18:04+09:00 |
| jvndb-2023-000075 | Improper restriction of XML external entity references (XXE) in Applicant Programme | 2023-07-24T15:44+09:00 | 2024-04-22T14:20+09:00 |
| jvndb-2023-000073 | GBrowse vulnerable to unrestricted upload of files with dangerous types | 2023-07-21T15:02+09:00 | 2024-04-12T17:31+09:00 |
| jvndb-2023-000070 | Multiple vulnerabilities in WordPress Plugin "TS Webfonts for SAKURA" | 2023-07-20T16:05+09:00 | 2024-04-17T17:20+09:00 |
| jvndb-2023-002512 | EL Injection Vulnerability in Hitachi Replication Manager | 2023-07-19T14:48+09:00 | 2024-04-26T12:24+09:00 |
| jvndb-2023-002511 | File and Directory Permissions Vulnerability in Hitachi Command Suite | 2023-07-19T14:48+09:00 | 2024-04-26T12:29+09:00 |
| jvndb-2023-002510 | Multiple Vulnerabilities in Hitachi Device Manager | 2023-07-19T14:48+09:00 | 2023-07-19T14:48+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:4511-1 | Security update for rsync | 2025-12-23T12:14:35Z | 2025-12-23T12:14:35Z |
| suse-su-2025:4507-1 | Security update for the Linux Kernel | 2025-12-22T16:46:54Z | 2025-12-22T16:46:54Z |
| suse-su-2025:4506-1 | Security update for the Linux Kernel | 2025-12-22T16:39:00Z | 2025-12-22T16:39:00Z |
| suse-su-2025:4505-1 | Security update for the Linux Kernel | 2025-12-22T16:35:13Z | 2025-12-22T16:35:13Z |
| suse-su-2025:4504-1 | Security update for glib2 | 2025-12-22T16:30:38Z | 2025-12-22T16:30:38Z |
| suse-su-2026:20008-1 | Security update for qemu | 2025-12-22T15:42:55Z | 2025-12-22T15:42:55Z |
| suse-su-2026:20007-1 | Security update for python-tornado6 | 2025-12-22T13:31:07Z | 2025-12-22T13:31:07Z |
| suse-su-2025:4502-1 | Security update for mariadb | 2025-12-22T11:28:30Z | 2025-12-22T11:28:30Z |
| suse-su-2026:20018-1 | Security update for mariadb | 2025-12-22T11:13:12Z | 2025-12-22T11:13:12Z |
| suse-su-2026:20016-1 | Security update for fontforge | 2025-12-22T10:05:05Z | 2025-12-22T10:05:05Z |
| suse-su-2025:4501-1 | Security update for taglib | 2025-12-19T17:00:20Z | 2025-12-19T17:00:20Z |
| suse-su-2026:20015-1 | Security update for the Linux Kernel | 2025-12-19T16:46:47Z | 2025-12-19T16:46:47Z |
| suse-su-2026:20012-1 | Security update for the Linux Kernel | 2025-12-19T16:46:47Z | 2025-12-19T16:46:47Z |
| suse-su-2026:20021-1 | Security update for the Linux Kernel | 2025-12-19T16:19:41Z | 2025-12-19T16:19:41Z |
| suse-su-2025:4494-1 | Security update for libpng16 | 2025-12-19T13:14:13Z | 2025-12-19T13:14:13Z |
| suse-su-2025:4493-1 | Security update for mariadb | 2025-12-19T13:01:17Z | 2025-12-19T13:01:17Z |
| suse-su-2025:4491-1 | Security update for mariadb | 2025-12-19T11:40:47Z | 2025-12-19T11:40:47Z |
| suse-su-2025:4490-1 | Security update for xen | 2025-12-19T11:17:12Z | 2025-12-19T11:17:12Z |
| suse-su-2025:4489-1 | Security update for netty | 2025-12-19T11:01:56Z | 2025-12-19T11:01:56Z |
| suse-su-2025:4488-1 | Security update for apache2 | 2025-12-18T17:17:26Z | 2025-12-18T17:17:26Z |
| suse-su-2025:4487-1 | Security update for python36 | 2025-12-18T14:44:30Z | 2025-12-18T14:44:30Z |
| suse-su-2025:4486-1 | Security update for postgresql13 | 2025-12-18T14:42:43Z | 2025-12-18T14:42:43Z |
| suse-su-2025:4485-1 | Security update for postgresql14 | 2025-12-18T14:41:51Z | 2025-12-18T14:41:51Z |
| suse-su-2025:4484-1 | Security update for postgresql15 | 2025-12-18T14:39:58Z | 2025-12-18T14:39:58Z |
| suse-su-2025:21233-1 | Security update for qemu | 2025-12-18T12:38:54Z | 2025-12-18T12:38:54Z |
| suse-su-2025:21230-1 | Security update for qemu | 2025-12-18T12:38:54Z | 2025-12-18T12:38:54Z |
| suse-su-2025:4483-1 | Security update for colord | 2025-12-18T12:29:27Z | 2025-12-18T12:29:27Z |
| suse-su-2025:4482-1 | Security update for grafana | 2025-12-18T12:22:20Z | 2025-12-18T12:22:20Z |
| suse-su-2025:4481-1 | Security update for golang-github-prometheus-alertmanager | 2025-12-18T12:18:50Z | 2025-12-18T12:18:50Z |
| suse-su-2025:4479-1 | Security update 4.3.16.2 for Multi-Linux Manager Server LTS | 2025-12-18T12:15:07Z | 2025-12-18T12:15:07Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15708-1 | python311-Django4-4.2.26-1.1 on GA media | 2025-11-06T00:00:00Z | 2025-11-06T00:00:00Z |
| opensuse-su-2025:15707-1 | ghostscript-10.06.0-2.1 on GA media | 2025-11-06T00:00:00Z | 2025-11-06T00:00:00Z |
| opensuse-su-2025:15706-1 | erlang-28.1.1-1.1 on GA media | 2025-11-06T00:00:00Z | 2025-11-06T00:00:00Z |
| opensuse-su-2025:15705-1 | runc-1.3.3-1.1 on GA media | 2025-11-05T00:00:00Z | 2025-11-05T00:00:00Z |
| opensuse-su-2025:15704-1 | zellij-0.43.1-2.1 on GA media | 2025-11-04T00:00:00Z | 2025-11-04T00:00:00Z |
| opensuse-su-2025:15703-1 | kubecolor-0.5.3-1.1 on GA media | 2025-11-04T00:00:00Z | 2025-11-04T00:00:00Z |
| opensuse-su-2025:15702-1 | kernel-devel-6.17.7-1.1 on GA media | 2025-11-04T00:00:00Z | 2025-11-04T00:00:00Z |
| opensuse-su-2025:15701-1 | java-1_8_0-openjdk-1.8.0.472-1.1 on GA media | 2025-11-04T00:00:00Z | 2025-11-04T00:00:00Z |
| opensuse-su-2025:15700-1 | OpenSMTPD-7.8.0p0-1.1 on GA media | 2025-11-04T00:00:00Z | 2025-11-04T00:00:00Z |
| opensuse-su-2025:15699-1 | python311-djangorestframework-simplejwt-5.5.1-1.1 on GA media | 2025-11-03T00:00:00Z | 2025-11-03T00:00:00Z |
| opensuse-su-2025:15698-1 | redis-8.2.3-1.1 on GA media | 2025-11-02T00:00:00Z | 2025-11-02T00:00:00Z |
| opensuse-su-2025:15697-1 | kumactl-2.12.3-1.1 on GA media | 2025-11-02T00:00:00Z | 2025-11-02T00:00:00Z |
| opensuse-su-2025:15696-1 | python311-starlette-0.49.1-1.1 on GA media | 2025-11-01T00:00:00Z | 2025-11-01T00:00:00Z |
| opensuse-su-2025:15695-1 | govulncheck-vulndb-0.0.20251029T215107-1.1 on GA media | 2025-11-01T00:00:00Z | 2025-11-01T00:00:00Z |
| opensuse-su-2025:20022-1 | Security update for python-Django | 2025-10-31T08:58:03Z | 2025-10-31T08:58:03Z |
| opensuse-su-2025:15694-1 | java-25-openj9-25.0.1.0-1.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| opensuse-su-2025:15693-1 | java-21-openj9-21.0.9.0-1.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| opensuse-su-2025:15692-1 | java-1_8_0-openj9-1.8.0.472-1.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| opensuse-su-2025:15691-1 | java-17-openj9-17.0.17.0-1.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| opensuse-su-2025:15690-1 | java-11-openj9-11.0.29.0-1.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| opensuse-su-2025:15689-1 | gomuks-0.3.1-2.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| opensuse-su-2025:15688-1 | libmozjs-140-0-140.4.0-2.1 on GA media | 2025-10-30T00:00:00Z | 2025-10-30T00:00:00Z |
| opensuse-su-2025:15687-1 | chromedriver-142.0.7444.59-2.1 on GA media | 2025-10-30T00:00:00Z | 2025-10-30T00:00:00Z |
| opensuse-su-2025:15686-1 | MozillaFirefox-144.0.2-1.1 on GA media | 2025-10-30T00:00:00Z | 2025-10-30T00:00:00Z |
| opensuse-su-2025:15685-1 | ImageMagick-7.1.2.8-1.1 on GA media | 2025-10-30T00:00:00Z | 2025-10-30T00:00:00Z |
| opensuse-su-2025:20021-1 | Security update for MozillaThunderbird | 2025-10-29T17:54:20Z | 2025-10-29T17:54:20Z |
| opensuse-su-2025:15684-1 | xwayland-24.1.8-4.1 on GA media | 2025-10-29T00:00:00Z | 2025-10-29T00:00:00Z |
| opensuse-su-2025:15683-1 | xorg-x11-server-21.1.15-7.1 on GA media | 2025-10-29T00:00:00Z | 2025-10-29T00:00:00Z |
| opensuse-su-2025:15682-1 | libtiff-devel-32bit-4.7.1-3.1 on GA media | 2025-10-29T00:00:00Z | 2025-10-29T00:00:00Z |
| opensuse-su-2025:15681-1 | strongswan-6.0.3-1.1 on GA media | 2025-10-29T00:00:00Z | 2025-10-29T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-mongodb-2025-6709 | Pre-Authentication Denial of Service Vulnerability in MongoDB Server's OIDC Authentication | 2025-09-16T08:47:34.334Z | 2025-09-16T09:10:21.105Z |
| bit-mongodb-2025-6707 | Race condition in privilege cache invalidation cycle | 2025-09-16T08:47:32.697Z | 2025-09-27T09:09:19.773Z |
| bit-mongodb-2025-6706 | Running certain aggregation operations with the SBE engine may lead to unexpected behavior on MongoDB Server | 2025-09-16T08:47:30.842Z | 2025-09-16T09:10:21.105Z |
| bit-prestashop-2025-51586 | 2025-09-15T05:49:14.417Z | 2025-09-15T06:06:53.428Z | |
| bit-nifi-2024-56512 | Apache NiFi: Missing Complete Authorization for Parameter and Service References | 2025-09-12T11:47:06.460Z | 2025-09-12T12:08:23.743Z |
| bit-nifi-2024-45477 | Apache NiFi: Improper Neutralization of Input in Parameter Description | 2025-09-12T11:47:04.858Z | 2025-11-06T13:25:46.476Z |
| bit-nifi-2023-49145 | Apache NiFi: Improper Neutralization of Input in Advanced User Interface for Jolt | 2025-09-12T11:47:03.168Z | 2025-09-12T12:08:23.743Z |
| bit-nifi-2023-40037 | Apache NiFi: Incomplete Validation of JDBC and JNDI Connection URLs | 2025-09-12T11:47:01.518Z | 2025-09-12T12:08:23.743Z |
| bit-nifi-2023-36542 | Apache NiFi: Potential Code Injection with Properties Referencing Remote Resources | 2025-09-12T11:46:59.981Z | 2025-09-12T12:08:23.743Z |
| bit-nifi-2023-34468 | Apache NiFi: Potential Code Injection with Database Services using H2 | 2025-09-12T11:46:58.598Z | 2025-09-12T12:08:23.743Z |
| bit-nifi-2023-34212 | Apache NiFi: Potential Deserialization of Untrusted Data with JNDI in JMS Components | 2025-09-12T11:46:56.875Z | 2025-09-12T12:08:23.743Z |
| bit-nifi-2023-22832 | Apache NiFi: Improper Restriction of XML External Entity References in ExtractCCDAAttributes | 2025-09-12T11:46:55.074Z | 2025-09-12T12:08:23.743Z |
| bit-nifi-2022-33140 | Improper Neutralization of Command Elements in Shell User Group Provider | 2025-09-12T11:46:53.437Z | 2025-09-12T12:08:23.743Z |
| bit-nifi-2022-29265 | Improper Restriction of XML External Entity References in Multiple Components | 2025-09-12T11:46:51.873Z | 2025-09-12T12:08:23.743Z |
| bit-nifi-2022-26850 | Insufficiently protected credentials | 2025-09-12T11:46:50.402Z | 2025-09-12T12:08:23.743Z |
| bit-nifi-2021-44145 | Apache NiFi information disclosure by XXE | 2025-09-12T11:46:48.807Z | 2025-09-12T12:08:23.743Z |
| bit-nifi-2021-20190 | 2025-09-12T11:46:47.409Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-9491 | 2025-09-12T11:46:46.000Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-9487 | 2025-09-12T11:46:44.344Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-9486 | 2025-09-12T11:46:42.745Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-27223 | 2025-09-12T11:46:41.115Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-1942 | 2025-09-12T11:46:39.379Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-1933 | 2025-09-12T11:46:37.920Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-1928 | 2025-09-12T11:46:36.422Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-13940 | 2025-09-12T11:46:34.845Z | 2025-09-12T12:08:23.743Z | |
| bit-kyverno-2025-47281 | Kyverno's Improper JMESPath Variable Evaluation Leads to Denial of Service | 2025-09-12T11:43:05.940Z | 2025-09-12T12:08:23.743Z |
| bit-kyverno-2025-46342 | Kyverno vulnerable to bypass of policy rules that use namespace selectors in match statements | 2025-09-12T11:43:04.352Z | 2026-01-08T18:07:34.629Z |
| bit-kyverno-2025-29778 | Kyverno ignores subjectRegExp and IssuerRegExp | 2025-09-12T11:43:02.825Z | 2026-01-08T18:07:34.629Z |
| bit-kyverno-2024-48921 | Kyverno's PolicyException objects can be created in any namespace by default | 2025-09-12T11:43:01.195Z | 2025-09-12T12:08:23.743Z |
| bit-kyverno-2023-47630 | Attacker can cause Kyverno user to unintentionally consume insecure image | 2025-09-12T11:42:59.488Z | 2025-09-12T12:08:23.743Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-30834 | 帆软软件有限公司FineReport、FineBI及FineDataLink存在命令注入漏洞 | 2025-12-16 | 2025-12-17 |
| cnvd-2026-10898 | Adobe Creative Cloud Desktop Application拒绝服务漏洞(CNVD-2026-10898) | 2025-12-15 | 2026-02-10 |
| cnvd-2026-10344 | Siemens RUGGEDCOM输入验证错误漏洞 | 2025-12-15 | 2026-02-06 |
| cnvd-2026-07962 | Soda PDF Desktop目录遍历漏洞 | 2025-12-15 | 2026-01-27 |
| cnvd-2026-07961 | Soda PDF Desktop越界写入漏洞 | 2025-12-15 | 2026-01-27 |
| cnvd-2026-07566 | Siemens SINEMA Remote Connect Server安全绕过漏洞 | 2025-12-15 | 2026-01-28 |
| cnvd-2026-07565 | Siemens SINEMA Remote Connect Server存在未明漏洞(CNVD-2026-07565) | 2025-12-15 | 2026-01-28 |
| cnvd-2026-07564 | Siemens SINEC Security Monitor输入验证错误漏洞 | 2025-12-15 | 2026-01-28 |
| cnvd-2026-07563 | Siemens SINEC Security Monitor授权问题漏洞 | 2025-12-15 | 2026-01-28 |
| cnvd-2026-07562 | Siemens SIMATIC CN 4100信息泄露漏洞(CNVD-2026-07562) | 2025-12-15 | 2026-01-28 |
| cnvd-2026-07561 | Siemens SIMATIC CN 4100信息泄露漏洞 | 2025-12-15 | 2026-01-28 |
| cnvd-2026-07560 | Siemens SIMATIC CN 4100信任管理问题漏洞 | 2025-12-15 | 2026-01-28 |
| cnvd-2026-07242 | Google Chrome释放后重用漏洞 | 2025-12-15 | 2026-01-22 |
| cnvd-2026-06106 | 湖南强智科技发展有限公司教务管理系统存在SQL注入漏洞(CNVD-2026-06106 ) | 2025-12-15 | 2026-01-26 |
| cnvd-2026-04945 | Adobe ColdFusion输入验证不当漏洞(CNVD-2026-0494539) | 2025-12-15 | 2026-01-19 |
| cnvd-2026-04944 | Adobe ColdFusion XML外部实体引用限制不当漏洞(CNVD-2026-0494441) | 2025-12-15 | 2026-01-19 |
| cnvd-2026-04943 | Adobe ColdFusion XML外部实体引用限制不当漏洞(CNVD-2026-0494343) | 2025-12-15 | 2026-01-19 |
| cnvd-2026-04942 | Adobe ColdFusion输入验证不当漏洞 | 2025-12-15 | 2026-01-19 |
| cnvd-2026-04941 | Adobe ColdFusion XML外部实体引用限制不当漏洞 | 2025-12-15 | 2026-01-19 |
| cnvd-2026-04940 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0494065) | 2025-12-15 | 2026-01-19 |
| cnvd-2026-04939 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0493967) | 2025-12-15 | 2026-01-19 |
| cnvd-2026-04938 | Adobe Experience Manager跨站脚本漏洞 | 2025-12-15 | 2026-01-19 |
| cnvd-2026-04937 | Adobe ColdFusion访问控制不当漏洞 | 2025-12-15 | 2026-01-19 |
| cnvd-2026-04936 | Adobe ColdFusion凭据保护不足漏洞 | 2025-12-15 | 2026-01-19 |
| cnvd-2026-04226 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-04226) | 2025-12-15 | 2026-01-16 |
| cnvd-2026-04225 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-04225) | 2025-12-15 | 2026-01-16 |
| cnvd-2026-04224 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-04224) | 2025-12-15 | 2026-01-16 |
| cnvd-2026-04223 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-04223) | 2025-12-15 | 2026-01-16 |
| cnvd-2026-04222 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-04222) | 2025-12-15 | 2026-01-16 |
| cnvd-2026-04221 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-04221) | 2025-12-15 | 2026-01-16 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0859 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0858 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0857 | Vulnérabilité dans Wireshark | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0856 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0855 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0854 | Vulnérabilité dans les produits Moxa | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0853 | Multiples vulnérabilités dans GitLab | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0852 | Vulnérabilité dans Tenable Security Center | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0851 | Vulnérabilité dans Python | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0850 | Multiples vulnérabilités dans Google Chrome | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0849 | Multiples vulnérabilités dans les produits Elastic | 2025-10-07T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0848 | Vulnérabilité dans OpenSSH | 2025-10-06T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0847 | Vulnérabilité dans les produits Liferay | 2025-10-06T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0846 | Multiples vulnérabilités dans les produits Qnap | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-avi-0845 | Multiples vulnérabilités dans Zabbix | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-avi-0844 | Multiples vulnérabilités dans IBM Sterling Connect | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0843 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0842 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0841 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0840 | Multiples vulnérabilités dans Zabbix | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0839 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0838 | Multiples vulnérabilités dans les produits Splunk | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| certfr-2025-avi-0837 | Multiples vulnérabilités dans Google Chrome | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| certfr-2025-avi-0836 | Multiples vulnérabilités dans les produits Tenable | 2025-10-01T00:00:00.000000 | 2025-10-01T00:00:00.000000 |
| certfr-2025-avi-0835 | Multiples vulnérabilités dans OpenSSL | 2025-10-01T00:00:00.000000 | 2025-10-01T00:00:00.000000 |
| certfr-2025-avi-0834 | Multiples vulnérabilités dans Mozilla Firefox | 2025-10-01T00:00:00.000000 | 2025-10-01T00:00:00.000000 |
| certfr-2025-avi-0833 | Multiples vulnérabilités dans Joomla! | 2025-10-01T00:00:00.000000 | 2025-10-01T00:00:00.000000 |
| certfr-2025-avi-0832 | Multiples vulnérabilités dans les produits VMware | 2025-09-30T00:00:00.000000 | 2025-09-30T00:00:00.000000 |
| certfr-2025-avi-0831 | Vulnérabilité dans les produits Apple | 2025-09-30T00:00:00.000000 | 2025-09-30T00:00:00.000000 |
| certfr-2025-avi-0830 | Vulnérabilité dans Tenable Patch Management | 2025-09-29T00:00:00.000000 | 2025-09-29T00:00:00.000000 |