Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-24445 |
7.5 (3.1)
|
EV Energy ev.energy Improper Restriction of Excessive … |
EV Energy |
ev.energy |
2026-02-27T00:11:15.055Z | 2026-02-27T00:11:15.055Z |
| CVE-2026-27772 |
9.4 (3.1)
|
EV Energy ev.energy Missing Authentication for Critica… |
EV Energy |
ev.energy |
2026-02-27T00:09:12.986Z | 2026-02-27T00:09:12.986Z |
| CVE-2026-27773 |
6.5 (3.1)
|
SWITCH EV swtchenergy.com Insufficiently Protected Cre… |
SWITCH EV |
swtchenergy.com |
2026-02-27T00:03:43.458Z | 2026-02-27T00:03:43.458Z |
| CVE-2026-25778 |
7.3 (3.1)
|
SWITCH EV swtchenergy.com Insufficient Session Expiration |
SWITCH EV |
swtchenergy.com |
2026-02-27T00:02:20.479Z | 2026-02-27T00:02:20.479Z |
| CVE-2026-27767 |
9.4 (3.1)
|
SWITCH EV swtchenergy.com Missing Authentication for C… |
SWITCH EV |
swtchenergy.com |
2026-02-26T23:57:51.070Z | 2026-02-27T00:00:53.815Z |
| CVE-2026-25113 |
7.5 (3.1)
|
SWITCH EV swtchenergy.com Improper Restriction of Exce… |
SWITCH EV |
swtchenergy.com |
2026-02-26T23:59:46.758Z | 2026-02-26T23:59:46.758Z |
| CVE-2026-24731 |
9.4 (3.1)
|
EV2GO ev2go.io Missing Authentication for Critical Function |
EV2GO |
ev2go.io |
2026-02-26T23:43:51.003Z | 2026-02-26T23:52:30.793Z |
| CVE-2026-20895 |
7.3 (3.1)
|
EV2GO ev2go.io Insufficient Session Expiration |
EV2GO |
ev2go.io |
2026-02-26T23:48:03.827Z | 2026-02-26T23:51:53.584Z |
| CVE-2026-22890 |
6.5 (3.1)
|
EV2GO ev2go.io Insufficiently Protected Credentials |
EV2GO |
ev2go.io |
2026-02-26T23:50:56.274Z | 2026-02-26T23:50:56.274Z |
| CVE-2026-25945 |
7.5 (3.1)
|
EV2GO ev2go.io Improper Restriction of Excessive Authe… |
EV2GO |
ev2go.io |
2026-02-26T23:46:14.876Z | 2026-02-26T23:46:14.876Z |
| CVE-2026-20733 |
6.5 (3.1)
|
CloudCharge cloudcharge.se Insufficiently Protected Cr… |
CloudCharge |
cloudcharge.se |
2026-02-26T23:38:02.525Z | 2026-02-26T23:38:02.525Z |
| CVE-2026-27652 |
7.3 (3.1)
|
CloudCharge cloudcharge.se Insufficient Session Expiration |
CloudCharge |
cloudcharge.se |
2026-02-26T23:36:33.131Z | 2026-02-26T23:36:33.131Z |
| CVE-2026-25114 |
7.5 (3.1)
|
CloudCharge cloudcharge.se Improper Restriction of Exc… |
CloudCharge |
cloudcharge.se |
2026-02-26T23:27:18.456Z | 2026-02-26T23:27:18.456Z |
| CVE-2026-20781 |
9.4 (3.1)
|
CloudCharge cloudcharge.se Missing Authentication for … |
CloudCharge |
cloudcharge.se |
2026-02-26T23:24:00.964Z | 2026-02-26T23:24:00.964Z |
| CVE-2026-20791 |
6.5 (3.1)
|
Chargemap chargemap.com Insufficiently Protected Credentials |
Chargemap |
chargemap.com |
2026-02-26T23:10:16.841Z | 2026-02-26T23:10:16.841Z |
| CVE-2025-71226 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-18T14:21:47.369Z | 2026-02-26T23:08:49.357Z |
| CVE-2026-25711 |
7.3 (3.1)
|
Chargemap chargemap.com Insufficient Session Expiration |
Chargemap |
chargemap.com |
2026-02-26T23:08:22.088Z | 2026-02-26T23:08:22.088Z |
| CVE-2025-71228 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-18T14:21:49.570Z | 2026-02-26T23:07:42.270Z |
| CVE-2026-20792 |
7.5 (3.1)
|
Chargemap chargemap.com Improper Restriction of Excess… |
Chargemap |
chargemap.com |
2026-02-26T23:06:29.969Z | 2026-02-26T23:06:29.969Z |
| CVE-2026-25851 |
9.4 (3.1)
|
Chargemap chargemap.com Missing Authentication for Cri… |
Chargemap |
chargemap.com |
2026-02-26T23:04:13.166Z | 2026-02-26T23:04:13.166Z |
| CVE-2026-28280 |
6.1 (3.1)
|
`osctrl-admin` has Stored Cross-Site Scripting (XSS) i… |
jmpsec |
osctrl |
2026-02-26T23:00:58.040Z | 2026-02-26T23:00:58.040Z |
| CVE-2026-28215 |
9.1 (3.1)
|
hoppscotch Vulnerable to Unauthenticated Onboarding Co… |
hoppscotch |
hoppscotch |
2026-02-26T22:34:46.524Z | 2026-02-26T22:34:46.524Z |
| CVE-2026-28208 |
5.9 (3.1)
|
Junrar has arbitrary file write due to backslash path … |
junrar |
junrar |
2026-02-26T22:20:03.765Z | 2026-02-26T22:20:03.765Z |
| CVE-2026-27638 |
5.7 (4.0)
|
ActualBudget missing authorization in sync endpoints a… |
actualbudget |
actual |
2026-02-26T22:14:21.481Z | 2026-02-26T22:14:21.481Z |
| CVE-2024-22021 |
6.5 (3.0)
|
Vulnerability CVE-2024-22021 allows a Veeam Recov… |
Veeam |
Recovery Orchestrator |
2024-02-07T00:53:30.493Z | 2026-02-26T22:13:01.221Z |
| CVE-2024-42056 |
6.5 (3.1)
|
Retool (self-hosted enterprise) through 3.40.0 in… |
n/a |
n/a |
2024-08-22T00:00:00.000Z | 2026-02-26T22:11:58.765Z |
| CVE-2022-45179 |
5.4 (3.1)
|
An issue was discovered in LIVEBOX Collaboration … |
n/a |
n/a |
2024-02-21T00:00:00.000Z | 2026-02-26T22:10:53.379Z |
| CVE-2023-26323 |
7.6 (3.1)
|
Xiaomi App Market has a code execution vulnerability |
Xiaomi |
App Market |
2024-08-28T07:53:42.801Z | 2026-02-26T22:08:53.877Z |
| CVE-2024-3331 |
6.8 (3.1)
|
Spotfire: NTLM token leakage |
Spotfire |
Spotfire Enterprise Runtime for R - Server Edition |
2024-06-27T18:50:13.758Z | 2026-02-26T22:08:29.272Z |
| CVE-2026-27839 |
4.3 (3.1)
|
wger: IDOR in nutritional_values endpoints exposes pri… |
wger-project |
wger |
2026-02-26T22:07:43.640Z | 2026-02-26T22:07:43.640Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-27902 |
5.3 (4.0)
|
Svelte Vulnerable to XSS via HTML Comment Injection in… |
sveltejs |
svelte |
2026-02-26T00:58:54.604Z | 2026-02-26T18:51:39.142Z |
| CVE-2026-27901 |
5.3 (4.0)
|
Svelte vulnerable to XSS during SSR with contenteditab… |
sveltejs |
svelte |
2026-02-26T00:57:40.269Z | 2026-02-26T14:31:00.714Z |
| CVE-2026-27900 |
5 (3.1)
|
Terraform Provider Debug Logs Vulnerable to Sensitive … |
linode |
terraform-provider-linode |
2026-02-26T00:53:19.168Z | 2026-02-26T14:35:31.565Z |
| CVE-2026-27899 |
8.8 (3.1)
|
WireGuard Portal Vulnerable to Privilege Escalation to… |
h44z |
wg-portal |
2026-02-26T00:50:00.278Z | 2026-02-26T16:02:52.876Z |
| CVE-2026-27896 |
7 (4.0)
|
MCP Go SDK Vulnerable to Improper Handling of Case Sen… |
modelcontextprotocol |
go-sdk |
2026-02-26T00:47:46.967Z | 2026-02-26T17:06:41.150Z |
| CVE-2026-27887 |
6.9 (4.0)
|
Spin has memory leaks in various WIT interfaces |
spinframework |
spin |
2026-02-26T00:55:53.360Z | 2026-02-26T14:34:29.169Z |
| CVE-2026-27884 |
5.3 (3.1)
|
NetExec vulnerable to arbitrary file write via path tr… |
Pennyw0rth |
NetExec |
2026-02-26T00:39:15.832Z | 2026-02-26T16:18:09.879Z |
| CVE-2026-27850 |
7.5 (3.1)
|
Improper verification in Linksys MR9600, Linksys MX4200 |
Linksys |
MR9600 |
2026-02-25T16:58:06.450Z | 2026-02-25T19:11:29.416Z |
| CVE-2026-27849 |
9.8 (3.1)
|
Missing neutralization in Linksys MR9600, Linksys MX4200 |
Linksys |
MR9600 |
2026-02-25T16:20:25.395Z | 2026-02-26T16:47:01.147Z |
| CVE-2026-27848 |
9.8 (3.1)
|
Missing neutralization in Linksys MR9600, Linksys MX4200 |
Linksys |
MR9600 |
2026-02-25T15:15:16.186Z | 2026-02-26T16:51:13.433Z |
| CVE-2026-27847 |
9.8 (3.1)
|
Missing authentication in Linksys MR9600, Linksys MX4200 |
Linksys |
MR9600 |
2026-02-25T15:10:30.771Z | 2026-02-26T16:56:23.595Z |
| CVE-2026-27846 |
6.2 (3.1)
|
Missing authentication in Linksys MR9600, Linksys MX4200 |
Linksys |
MR9600 |
2026-02-25T15:03:58.616Z | 2026-02-25T18:36:03.925Z |
| CVE-2026-27840 |
4.3 (3.1)
|
ZITADEL's truncated opaque tokens are still valid |
zitadel |
zitadel |
2026-02-26T00:27:08.933Z | 2026-02-26T17:00:29.815Z |
| CVE-2026-27830 |
8.9 (4.0)
|
c3p0 vulnerable to Remote Code Execution via unsafe de… |
swaldman |
c3p0 |
2026-02-26T00:45:18.222Z | 2026-02-27T16:25:52.917Z |
| CVE-2026-27829 |
6.5 (3.1)
|
Astro is vulnerable to SSRF due to missing allowlist e… |
withastro |
astro |
2026-02-26T00:36:40.497Z | 2026-02-26T16:21:44.676Z |
| CVE-2026-27821 |
7.7 (4.0)
|
GPAC NHML Demuxer (dmx_nhml.c) Vulnerable to Stack Buf… |
gpac |
gpac |
2026-02-26T00:08:39.924Z | 2026-02-26T15:15:39.671Z |
| CVE-2026-27819 |
7.2 (3.1)
|
Vikunja has Path Traversal in CLI Restore |
go-vikunja |
vikunja |
2026-02-25T21:40:38.703Z | 2026-02-26T20:24:45.237Z |
| CVE-2026-27818 |
8.7 (4.0)
|
TerriaJS-Server has a domain validation bypass vulnera… |
TerriaJS |
terriajs-server |
2026-02-26T00:02:45.127Z | 2026-02-26T15:16:30.580Z |
| CVE-2026-27812 |
8 (4.0)
|
Sub2API Vulnerable to Password Reset Poisoning via Hos… |
Wei-Shaw |
sub2api |
2026-02-26T00:00:10.239Z | 2026-02-26T14:53:58.840Z |
| CVE-2026-27809 |
6.8 (4.0)
|
psd-tools: Compression module has unguarded zlib decom… |
psd-tools |
psd-tools |
2026-02-25T23:57:00.760Z | 2026-02-26T15:17:34.807Z |
| CVE-2026-27804 |
9.3 (4.0)
|
Parse Server: Account takeover via JWT algorithm confu… |
parse-community |
parse-server |
2026-02-25T23:48:20.858Z | 2026-02-26T17:03:50.903Z |
| CVE-2026-27800 |
7.4 (3.1)
|
Zed has Zip Slip Path Traversal in Extension Archive E… |
zed-industries |
zed |
2026-02-25T23:25:45.400Z | 2026-02-26T17:04:50.704Z |
| CVE-2026-27795 |
4.1 (3.1)
|
LangChain Community: redirect chaining can lead to SSR… |
langchain-ai |
langchainjs |
2026-02-25T17:30:01.106Z | 2026-02-25T18:42:52.277Z |
| CVE-2026-27794 |
6.6 (3.1)
|
LangGraph: BaseCache Deserialization of Untrusted Data… |
langchain-ai |
langgraph-checkpoint |
2026-02-25T16:53:47.176Z | 2026-02-25T21:00:24.430Z |
| CVE-2026-27739 |
9.2 (4.0)
|
Angular SSR is vulnerable to SSRF and Header Injection… |
angular |
angular-cli |
2026-02-25T16:47:29.705Z | 2026-02-27T17:59:11.328Z |
| CVE-2026-27736 |
6.1 (3.1)
|
BigBlueButton has Open Redirect vulnerability in ApiCo… |
bigbluebutton |
bigbluebutton |
2026-02-25T16:27:01.507Z | 2026-02-26T21:33:41.504Z |
| CVE-2026-27735 |
6.4 (4.0)
|
mcp-server-git : Path traversal in git_add allows stag… |
modelcontextprotocol |
servers |
2026-02-25T23:45:52.077Z | 2026-02-26T17:04:59.103Z |
| CVE-2026-27728 |
10 (3.1)
|
OneUptime: OS Command Injection in Probe NetworkPathMo… |
OneUptime |
oneuptime |
2026-02-25T16:25:09.698Z | 2026-02-25T20:19:55.906Z |
| CVE-2026-27727 |
8.9 (4.0)
|
mchange-commons-java: Remote Code Execution via JNDI R… |
swaldman |
mchange-commons-java |
2026-02-25T16:01:04.187Z | 2026-02-25T20:15:05.299Z |
| CVE-2026-27704 |
6.6 (4.0)
|
Dart SDK and Flutter SDK have Zip slip in Dart Pub pac… |
dart-lang |
sdk |
2026-02-25T15:17:26.243Z | 2026-02-25T20:27:35.486Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-27901 | Svelte performance oriented web framework. Prior to version 5.53.5, the contents of `bind:innerText… | 2026-02-26T02:16:20.967 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27900 | The Terraform Provider for Linode versions prior to v3.9.0 logged sensitive information including s… | 2026-02-26T02:16:20.770 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27899 | WireGuard Portal (or wg-portal) is a web-based configuration portal for WireGuard server management… | 2026-02-26T02:16:20.557 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27896 | The Go MCP SDK used Go's standard encoding/json.Unmarshal for JSON-RPC and MCP protocol message par… | 2026-02-26T01:16:25.630 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27887 | Spin is an open source developer tool for building and running serverless applications powered by W… | 2026-02-26T02:16:20.360 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27884 | NetExec is a network execution tool. Prior to version 1.5.1, the module spider_plus improperly crea… | 2026-02-26T01:16:25.293 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27850 | Due to an improperly configured firewall rule, the router will accept any connection on the WAN por… | 2026-02-25T18:23:41.350 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27849 | Due to missing neutralization of special elements, OS commands can be injected via the update funct… | 2026-02-25T17:25:40.903 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27848 | Due to missing neutralization of special elements, OS commands can be injected via the handshake of… | 2026-02-25T16:23:29.037 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27847 | Due to improper neutralization of special elements, SQL statements can be injected via the handshak… | 2026-02-25T16:23:28.833 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27846 | Due to missing authentication, a user with physical access to the device can misuse the mesh functi… | 2026-02-25T16:23:28.710 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27840 | ZITADEL is an open source identity management platform. Starting in version 2.31.0 and prior to ver… | 2026-02-26T01:16:25.103 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27830 | c3p0, a JDBC Connection pooling library, is vulnerable to attack via maliciously crafted Java-seria… | 2026-02-26T01:16:24.583 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27829 | Astro is a web framework. In versions 9.0.0 through 9.5.3, a bug in Astro's image pipeline allows b… | 2026-02-26T01:16:24.390 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27821 | GPAC is an open-source multimedia framework. In versions up to and including 26.02.0, a stack buffe… | 2026-02-26T00:16:26.813 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27819 | Vikunja is an open-source self-hosted task management platform. Prior to version 2.0.0, the restore… | 2026-02-25T22:16:27.127 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27818 | TerriaJS-Server is a NodeJS Express server for TerriaJS, a library for building web-based geospatia… | 2026-02-26T00:16:26.653 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27812 | Sub2API is an AI API gateway platform designed to distribute and manage API quotas from AI product … | 2026-02-26T00:16:26.467 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27809 | psd-tools is a Python package for working with Adobe Photoshop PSD files. Prior to version 1.12.2, … | 2026-02-26T00:16:26.233 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27804 | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node… | 2026-02-26T00:16:25.793 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27800 | Zed, a code editor, has a Zip Slip (Path Traversal) vulnerability exists in its extension archive e… | 2026-02-26T00:16:25.590 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27795 | LangChain is a framework for building LLM-powered applications. Prior to version 1.1.8, a redirect-… | 2026-02-25T18:23:41.153 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27794 | LangGraph Checkpoint defines the base interface for LangGraph checkpointers. Prior to version 4.0.0… | 2026-02-25T18:23:40.980 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27739 | The Angular SSR is a server-rise rendering tool for Angular applications. Versions prior to 21.2.0-… | 2026-02-25T18:23:40.800 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27736 | BigBlueButton is an open-source virtual classroom. In versions on the 3.x branch prior to 3.0.20, t… | 2026-02-25T17:25:40.283 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27735 | Model Context Protocol Servers is a collection of reference implementations for the model context p… | 2026-02-26T00:16:25.017 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27728 | OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.7, an OS… | 2026-02-25T17:25:40.103 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27727 | mchange-commons-java, a library that provides Java utilities, includes code that mirrors early impl… | 2026-02-25T17:25:39.910 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27704 | The Dart and Flutter SDKs provide software development kits for the Dart programming language. In v… | 2026-02-25T16:23:26.960 | 2026-02-27T14:06:59.787 |
| fkie_cve-2026-27702 | Budibase is a low code platform for creating internal tools, workflows, and admin panels. Prior to … | 2026-02-25T16:23:26.777 | 2026-02-27T14:06:59.787 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-682g-r279-6gq6 |
9.8 (3.1)
9.3 (4.0)
|
Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior ship with defau… | 2026-02-24T21:31:47Z | 2026-02-26T18:31:38Z |
| ghsa-3224-p867-265f |
6.5 (3.1)
8.3 (4.0)
|
Improper Certificate Validation vulnerability in ASUSTOR ADM FTP Backup on Linux, x86, ARM, 64 bit … | 2026-02-25T06:31:15Z | 2026-02-26T18:31:38Z |
| ghsa-xjx5-8v38-q6gh |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix NULL pointer der… | 2026-01-25T15:30:26Z | 2026-02-26T18:31:35Z |
| ghsa-r233-7m73-5h45 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't store mlx5e_p… | 2026-01-25T15:30:26Z | 2026-02-26T18:31:35Z |
| ghsa-hm7g-g733-g35g |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ublk: fix use-after-free in ub… | 2026-01-23T18:31:29Z | 2026-02-26T18:31:35Z |
| ghsa-g96x-q37f-x894 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: dmaengine: tegra-adma: Fix use… | 2026-01-25T15:30:26Z | 2026-02-26T18:31:35Z |
| ghsa-ff5w-pjxm-v3rr |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: libceph: replace overzealous B… | 2026-01-23T18:31:29Z | 2026-02-26T18:31:35Z |
| ghsa-8r55-jh7v-855p |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix reference count leak … | 2026-01-23T18:31:29Z | 2026-02-26T18:31:35Z |
| ghsa-86mf-f3rq-8369 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: can: j1939: j1939_xtp_rx_… | 2026-01-25T15:30:26Z | 2026-02-26T18:31:35Z |
| ghsa-7pgx-8vw6-gxgv |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: fix device le… | 2026-01-25T15:30:26Z | 2026-02-26T18:31:35Z |
| ghsa-42mq-7943-cj3h |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: idpf: Fix RSS LUT NULL ptr iss… | 2026-01-23T18:31:29Z | 2026-02-26T18:31:35Z |
| ghsa-3phq-r8q7-gf9j |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: do not fre… | 2026-01-25T15:30:26Z | 2026-02-26T18:31:35Z |
| ghsa-xw74-3hjf-3xpv |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix possible deadlo… | 2025-12-22T18:30:25Z | 2026-02-26T18:31:34Z |
| ghsa-v6c5-9mp4-mwq4 |
7.7 (3.1)
|
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer s… | 2025-11-26T15:34:12Z | 2026-02-26T18:31:34Z |
| ghsa-r76g-qww9-ch8r |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bound… | 2025-10-28T12:30:17Z | 2026-02-26T18:31:34Z |
| ghsa-qv7h-6r58-hcx8 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: delete radeon_fenc… | 2025-12-16T15:30:46Z | 2026-02-26T18:31:34Z |
| ghsa-qhqr-mc3h-hmjp |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksm: use range-walk function t… | 2025-12-16T15:30:45Z | 2026-02-26T18:31:34Z |
| ghsa-q35m-cwfx-j6jx |
4.7 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: timers: Fix NULL function poin… | 2025-12-16T15:30:45Z | 2026-02-26T18:31:34Z |
| ghsa-m33j-r627-qphr |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix recursive locking i… | 2025-10-30T12:31:09Z | 2026-02-26T18:31:34Z |
| ghsa-jmpj-vqww-cqc8 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: team: Move team device type ch… | 2025-12-23T15:30:40Z | 2026-02-26T18:31:34Z |
| ghsa-f2w5-mmwp-c76h |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: tls: Use __sk_dst_get() and ds… | 2025-11-12T12:30:27Z | 2026-02-26T18:31:34Z |
| ghsa-f2f6-pqf4-6hg9 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: usbnet: Fix using smp_processo… | 2025-11-12T12:30:28Z | 2026-02-26T18:31:34Z |
| ghsa-4fxr-v6jm-9j9m |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: devlink: rate: Unset parent po… | 2025-12-04T18:30:53Z | 2026-02-26T18:31:34Z |
| ghsa-4f82-h634-f877 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: exfat: fix refcount leak in ex… | 2025-12-24T12:30:29Z | 2026-02-26T18:31:34Z |
| ghsa-3q4f-fwrg-cw4x |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mm/ksm: fix flag-dropping beha… | 2025-10-28T12:30:16Z | 2026-02-26T18:31:34Z |
| ghsa-g4vw-3hq5-q7gr |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: spi: cadence-quadspi: Implemen… | 2025-10-20T18:30:32Z | 2026-02-26T18:31:33Z |
| ghsa-258w-3pq9-4jh3 |
4.7 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix race condition in R… | 2025-10-28T12:30:16Z | 2026-02-26T18:31:33Z |
| ghsa-mqpr-49jj-32rc |
4.0 (3.1)
6.3 (4.0)
|
n8n: Webhook Forgery on Github Webhook Trigger | 2026-02-26T15:58:34Z | 2026-02-26T15:58:34Z |
| ghsa-f3f2-mcxc-pwjx |
8.2 (3.1)
5.3 (4.0)
|
n8n: SQL Injection in MySQL, PostgreSQL, and Microsoft SQL nodes | 2026-02-26T15:56:31Z | 2026-02-26T15:56:31Z |
| ghsa-4r4r-4jp4-wwf9 |
9.8 (3.1)
|
FUXA has JWT Authentication Bypass via HTTP Referer header spoofing | 2026-02-24T18:31:02Z | 2026-02-26T15:45:40Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43100 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | democritus-grammars | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.665816Z |
| pysec-2022-43099 |
9.8 (3.1)
|
The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution back… | democritus-file-system | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.616362Z |
| pysec-2022-43098 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-file-system | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.564135Z |
| pysec-2022-43097 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-domains | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.511664Z |
| pysec-2022-43096 |
8.8 (3.1)
|
The d8s-timer for python, as distributed on PyPI, included a potential code-execution bac… | democritus-dates | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.46136Z |
| pysec-2022-43095 |
9.8 (3.1)
|
The d8s-ip-addresses package for Python, as distributed on PyPI, included a potential cod… | democritus-csv | 2022-10-11T22:15:00Z | 2024-11-21T14:22:43.41112Z |
| pysec-2022-43094 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | democritus-algorithms | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.361191Z |
| pysec-2022-43093 |
9.8 (3.1)
|
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backd… | d8s-xml | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.253271Z |
| pysec-2022-43092 |
9.8 (3.1)
|
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backd… | d8s-xml | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.200942Z |
| pysec-2022-43091 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | d8s-urls | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.149086Z |
| pysec-2022-43090 |
8.8 (3.1)
|
The d8s-timer for python, as distributed on PyPI, included a potential code-execution bac… | d8s-timer | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.097689Z |
| pysec-2022-43089 |
9.8 (3.1)
|
The d8s-timer for python, as distributed on PyPI, included a potential code-execution bac… | d8s-timer | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.045759Z |
| pysec-2022-43088 |
9.8 (3.1)
|
The d8s-strings for python, as distributed on PyPI, included a potential code-execution b… | d8s-strings | 2022-11-07T15:15:00Z | 2024-11-21T14:22:42.994084Z |
| pysec-2022-43087 |
9.8 (3.1)
|
The d8s-strings for python, as distributed on PyPI, included a potential code-execution b… | d8s-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.944804Z |
| pysec-2022-43086 |
9.8 (3.1)
|
The d8s-stats for python, as distributed on PyPI, included a potential code-execution bac… | d8s-stats | 2022-11-07T15:15:00Z | 2024-11-21T14:22:42.892924Z |
| pysec-2022-43085 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | d8s-python | 2022-11-07T15:15:00Z | 2024-11-21T14:22:42.829791Z |
| pysec-2022-43084 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | d8s-python | 2022-11-07T15:15:00Z | 2024-11-21T14:22:42.776996Z |
| pysec-2022-43083 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | d8s-python | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.723606Z |
| pysec-2022-43082 |
9.8 (3.1)
|
The d8s-networking for python, as distributed on PyPI, included a potential code-executio… | d8s-networking | 2022-11-07T15:15:00Z | 2024-11-21T14:22:42.668916Z |
| pysec-2022-43081 |
9.8 (3.1)
|
The d8s-networking for python, as distributed on PyPI, included a potential code-executio… | d8s-networking | 2022-11-07T15:15:00Z | 2024-11-21T14:22:42.613124Z |
| pysec-2022-43080 |
9.8 (3.1)
|
The d8s-netstrings for python, as distributed on PyPI, included a potential code-executio… | d8s-netstrings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.556543Z |
| pysec-2022-43079 |
9.8 (3.1)
|
The d8s-math for python, as distributed on PyPI, included a potential code-execution back… | d8s-math | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.499117Z |
| pysec-2022-43078 |
9.8 (3.1)
|
The d8s-json for python, as distributed on PyPI, included a potential code-execution back… | d8s-json | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.439723Z |
| pysec-2022-43077 |
9.8 (3.1)
|
The d8s-ip-addresses package for Python, as distributed on PyPI, included a potential cod… | d8s-ip-addresses | 2022-10-11T22:15:00Z | 2024-11-21T14:22:42.385746Z |
| pysec-2022-43076 |
9.8 (3.1)
|
The d8s-grammars for python, as distributed on PyPI, included a potential code-execution … | d8s-grammars | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.333517Z |
| pysec-2022-43075 |
9.8 (3.1)
|
The d8s-dates for python, as distributed on PyPI, included a potential code-execution bac… | d8s-dates | 2022-11-07T15:15:00Z | 2024-11-21T14:22:42.280201Z |
| pysec-2022-43074 |
9.8 (3.1)
|
The d8s-archives for python, as distributed on PyPI, included a potential code-execution … | d8s-archives | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.229096Z |
| pysec-2022-43073 |
9.8 (3.1)
|
The cloudlabeling package in PyPI v0.0.1 was discovered to contain a code execution backd… | cloudlabeling | 2022-06-24T21:15:00Z | 2024-11-21T14:22:42.118573Z |
| pysec-2017-113 |
8.8 (3.1)
|
Integer overflow in the cs_winkernel_malloc function in winkernel_mm.c in Capstone 3.0.4 … | capstone | 2017-03-16T21:59:00+00:00 | 2024-11-21T14:22:41.607839+00:00 |
| pysec-2021-880 |
7.5 (3.1)
|
Null pointer reference in CMS_Conservative_increment_obj in RaRe-Technologies bounter ver… | bounter | 2021-12-17T21:15:00Z | 2024-11-21T14:22:41.448775Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33530 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.519432Z |
| gsd-2024-33558 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.517690Z |
| gsd-2024-31156 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:09.611319Z |
| gsd-2024-4111 | A vulnerability was found in Tenda TX9 22.03.02.10. It has been rated as critical. Affect… | 2024-04-25T05:02:08.607990Z |
| gsd-2024-4134 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.607699Z |
| gsd-2024-4135 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.607498Z |
| gsd-2024-4123 | A vulnerability, which was classified as critical, has been found in Tenda W15E 15.11.0.1… | 2024-04-25T05:02:08.605274Z |
| gsd-2024-4159 | Brocade SANnav before Brocade SANnav v2.3.1 lacks protection mechanisms on port 2377/TCP… | 2024-04-25T05:02:08.603616Z |
| gsd-2024-4132 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.603383Z |
| gsd-2024-4155 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.601522Z |
| gsd-2024-4141 | Out-of-bounds array write in Xpdf 4.05 and earlier, triggered by an invalid character cod… | 2024-04-25T05:02:08.599260Z |
| gsd-2024-4140 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.598688Z |
| gsd-2024-4125 | A vulnerability has been found in Tenda W15E 15.11.0.14 and classified as critical. This … | 2024-04-25T05:02:08.598016Z |
| gsd-2024-4161 | In Brocade SANnav, before Brocade SANnav v2.3.0, syslog traffic received clear text. Thi… | 2024-04-25T05:02:08.597600Z |
| gsd-2024-4124 | A vulnerability, which was classified as critical, was found in Tenda W15E 15.11.0.14. Th… | 2024-04-25T05:02:08.595964Z |
| gsd-2024-4145 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.595097Z |
| gsd-2024-4136 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.593613Z |
| gsd-2024-4157 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.593416Z |
| gsd-2024-4129 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.593215Z |
| gsd-2024-4127 | A vulnerability was found in Tenda W15E 15.11.0.14. It has been classified as critical. A… | 2024-04-25T05:02:08.589629Z |
| gsd-2024-4149 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.587714Z |
| gsd-2024-4139 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.586673Z |
| gsd-2024-4154 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.584972Z |
| gsd-2024-4115 | A vulnerability, which was classified as critical, was found in Tenda W15E 15.11.0.14. Af… | 2024-04-25T05:02:08.583677Z |
| gsd-2024-4162 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.583385Z |
| gsd-2024-4113 | A vulnerability classified as critical was found in Tenda TX9 22.03.02.10. This vulnerabi… | 2024-04-25T05:02:08.582728Z |
| gsd-2024-4160 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.580915Z |
| gsd-2024-4143 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.577665Z |
| gsd-2024-4137 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:08.577471Z |
| gsd-2024-4163 | The Skylab IGX IIoT Gateway allowed users to connect to it via a limited shell terminal (… | 2024-04-25T05:02:08.576986Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-617 | Malicious code in roots-cms-client (npm) | 2026-01-31T17:27:21Z | 2026-02-03T03:16:53Z |
| mal-2025-49435 | Malicious code in something-not-in-cache (npm) | 2025-11-09T00:17:09Z | 2026-02-03T03:16:53Z |
| mal-2026-637 | Malicious code in launchdarkly-cpp-networking (npm) | 2026-02-02T05:19:43Z | 2026-02-03T03:16:52Z |
| mal-2024-2834 | Malicious code in pap-client (npm) | 2024-06-25T12:55:07Z | 2026-02-03T03:16:52Z |
| mal-2026-655 | Malicious code in pipeline-poision-test (PyPI) | 2026-02-02T21:53:29Z | 2026-02-02T21:53:29Z |
| mal-2026-648 | Malicious code in yazxzpedia (npm) | 2026-02-02T08:27:24Z | 2026-02-02T18:50:28Z |
| mal-2026-647 | Malicious code in react-native-expofp (npm) | 2026-02-02T08:30:15Z | 2026-02-02T18:50:26Z |
| mal-2026-646 | Malicious code in picking-miniapp (npm) | 2026-02-02T08:30:53Z | 2026-02-02T18:50:26Z |
| mal-2026-645 | Malicious code in libsignal-yazxzpedia (npm) | 2026-02-02T08:27:24Z | 2026-02-02T18:50:25Z |
| mal-2026-644 | Malicious code in dise-pkt (npm) | 2026-02-02T08:29:38Z | 2026-02-02T18:50:24Z |
| mal-2026-643 | Malicious code in @hemanshu_patil/xcode-windows-x64 (npm) | 2026-02-02T08:28:43Z | 2026-02-02T18:50:22Z |
| mal-2026-642 | Malicious code in @hemanshu_patil/xcode (npm) | 2026-02-02T08:28:43Z | 2026-02-02T18:50:22Z |
| mal-2026-651 | Malicious code in cat-admin-tool (PyPI) | 2026-02-02T14:44:25Z | 2026-02-02T14:44:25Z |
| mal-2026-652 | Malicious code in chia-pool-reference (PyPI) | 2026-02-02T14:43:22Z | 2026-02-02T14:43:22Z |
| mal-2026-653 | Malicious code in credit-decision-metrics (PyPI) | 2026-02-02T14:42:50Z | 2026-02-02T14:42:50Z |
| mal-2026-654 | Malicious code in zabitog (PyPI) | 2026-02-02T14:41:04Z | 2026-02-02T14:41:04Z |
| mal-2026-650 | Malicious code in tableapy (PyPI) | 2026-02-02T12:56:55Z | 2026-02-02T12:56:55Z |
| mal-2026-649 | Malicious code in callapirequests (PyPI) | 2026-02-02T09:08:10Z | 2026-02-02T09:08:10Z |
| mal-2026-641 | Malicious code in connections-api-requests (PyPI) | 2026-02-02T06:54:40Z | 2026-02-02T06:54:40Z |
| mal-2026-640 | Malicious code in connections-api-request (PyPI) | 2026-02-02T06:52:24Z | 2026-02-02T06:52:24Z |
| mal-2026-639 | Malicious code in connection-api-requests (PyPI) | 2026-02-02T06:49:31Z | 2026-02-02T06:49:31Z |
| mal-2026-616 | Malicious code in c11dff444 (npm) | 2026-01-31T16:58:54Z | 2026-02-02T06:41:02Z |
| mal-2026-598 | Malicious code in wallet-icon-font (npm) | 2026-01-29T03:47:06Z | 2026-02-02T05:56:31Z |
| mal-2026-596 | Malicious code in turbotax (npm) | 2026-01-29T00:03:56Z | 2026-02-02T05:56:31Z |
| mal-2026-583 | Malicious code in vuejavascript (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:31Z |
| mal-2026-577 | Malicious code in transform-vue-jsx (npm) | 2026-01-28T07:43:54Z | 2026-02-02T05:56:31Z |
| mal-2026-561 | Malicious code in transform-regenerator (npm) | 2026-01-28T06:44:48Z | 2026-02-02T05:56:31Z |
| mal-2026-560 | Malicious code in transform-async-to-generator (npm) | 2026-01-28T06:44:48Z | 2026-02-02T05:56:31Z |
| mal-2026-546 | Malicious code in xhjxhjhiagent (npm) | 2026-01-27T08:09:00Z | 2026-02-02T05:56:31Z |
| mal-2026-507 | Malicious code in tripica-library (npm) | 2026-01-26T15:31:06Z | 2026-02-02T05:56:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2923 | GStreamer: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-28T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2922 | NetApp Data ONTAP: Schwachstelle ermöglicht Denial of Service | 2025-12-28T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2921 | Cacti: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2025-12-28T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2919 | Eaton UPS Companion Software: Schwachstelle ermöglicht Codeausführung | 2025-12-23T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2905 | MongoDB: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-18T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2734 | PgBouncer: Schwachstelle ermöglicht SQL injection | 2025-12-03T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2708 | Angular: Schwachstelle ermöglicht Cross-Site Scripting | 2025-12-01T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1822 | Ruby on Rails: Mehrere Schwachstellen | 2025-08-13T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1817 | NGINX: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-08-13T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1529 | Apache HTTP Server: Mehrere Schwachstellen | 2025-07-10T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1318 | Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-12T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1231 | Python: Mehrere Schwachstellen | 2025-06-03T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1171 | GStreamer: Mehrere Schwachstellen | 2025-05-29T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-1080 | CPython: Schwachstelle ermöglicht Denial of Service | 2025-05-15T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-0729 | Red Hat JBoss Enterprise Application Platform und WildFly: Schwachstelle ermöglicht Codeausführung | 2025-04-07T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-0233 | Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-02-02T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2024-3463 | Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-11-13T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2024-3270 | Python: Schwachstelle ermöglicht Codeausführung | 2024-10-24T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2024-1504 | Apache HTTP Server: Mehrere Schwachstellen | 2024-07-01T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2024-0801 | Apache HTTP Server: Mehrere Schwachstellen ermöglichen Manipulation von Daten | 2024-04-04T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2023-2712 | Apache HTTP Server: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-10-18T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2023-2618 | http/2 Implementierungen: Schwachstelle ermöglicht Denial of Service | 2023-10-10T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2023-1238 | Red Hat Enterprise Linux: Mehrere Schwachstellen in verschiedenen Komponenten | 2023-05-16T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2023-0583 | Apache HTTP Server: Mehrere Schwachstellen ermöglichen HTTP Response Splitting | 2023-03-07T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2023-0167 | MariaDB: Schwachstelle ermöglicht Denial of Service | 2023-01-22T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2023-0035 | PHP: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-01-05T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2022-1934 | PHP: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-11-01T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2022-1816 | SHA-3 Implementierungen: Schwachstelle ermöglicht Codeausführung | 2022-10-23T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2022-1567 | PHP: Mehrere Schwachstellen | 2022-09-28T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2022-1504 | expat: Schwachstelle ermöglicht Codeausführung | 2022-09-22T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0447 | Kwetsbaarheden verholpen in GitLab CE/EE | 2024-11-15T12:29:35.775993Z | 2024-11-15T12:29:35.775993Z |
| ncsc-2024-0423 | Kwetsbaarheid ontdekt in Fortinet FortiManager | 2024-10-23T16:51:38.477778Z | 2024-11-15T10:52:37.440334Z |
| ncsc-2024-0446 | Kwetsbaarheid verholpen in Schneider Electric Ecostruxture | 2024-11-14T12:46:16.737874Z | 2024-11-14T12:46:16.737874Z |
| ncsc-2024-0445 | Kwetsbaarheden verholpen in Fortinet FortiClient | 2024-11-14T12:42:00.899040Z | 2024-11-14T12:42:00.899040Z |
| ncsc-2024-0444 | Kwetsbaarheden verholpen in Palo Alto PAN-OS | 2024-11-14T12:38:50.941039Z | 2024-11-14T12:38:50.941039Z |
| ncsc-2024-0443 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en NetScaler Gateway | 2024-11-13T15:10:45.265209Z | 2024-11-13T15:10:45.265209Z |
| ncsc-2024-0442 | Kwetsbaarheden verholpen in Ivanti Connect Secure en Policy Secure | 2024-11-13T12:38:13.252957Z | 2024-11-13T12:38:13.252957Z |
| ncsc-2024-0441 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2024-11-13T10:42:35.387490Z | 2024-11-13T10:42:35.387490Z |
| ncsc-2024-0440 | Kwetsbaarheden verholpen in Citrix Session Recording | 2024-11-13T08:51:17.257998Z | 2024-11-13T08:51:17.257998Z |
| ncsc-2024-0439 | Kwetsbaarheden verholpen in Microsoft Office | 2024-11-12T18:57:09.604321Z | 2024-11-12T18:57:09.604321Z |
| ncsc-2024-0438 | Kwetsbaarheid verholpen in Microsoft Exchange Server | 2024-11-12T18:56:25.729148Z | 2024-11-12T18:56:25.729148Z |
| ncsc-2024-0437 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2024-11-12T18:55:39.363057Z | 2024-11-12T18:55:39.363057Z |
| ncsc-2024-0436 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-11-12T18:54:41.456199Z | 2024-11-12T18:54:41.456199Z |
| ncsc-2024-0435 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-11-12T18:54:00.107773Z | 2024-11-12T18:54:00.107773Z |
| ncsc-2024-0434 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-11-12T18:53:07.914094Z | 2024-11-12T18:53:07.914094Z |
| ncsc-2024-0433 | Kwetsbaarheden verholpen in Siemens producten | 2024-11-12T14:19:20.051128Z | 2024-11-12T14:19:20.051128Z |
| ncsc-2024-0432 | Kwetsbaarheden verholpen in Cisco Identity Services Engine | 2024-11-07T08:55:49.899244Z | 2024-11-07T08:55:49.899244Z |
| ncsc-2024-0431 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2024-11-07T08:51:16.689034Z | 2024-11-07T08:51:16.689034Z |
| ncsc-2024-0430 | Kwetsbaarheid verholpen in Cisco Catalyst Access points | 2024-11-07T08:47:41.650502Z | 2024-11-07T08:47:41.650502Z |
| ncsc-2024-0429 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-11-05T14:09:27.373651Z | 2024-11-05T14:09:27.373651Z |
| ncsc-2024-0428 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-10-30T11:39:26.910666Z | 2024-10-30T11:39:26.910666Z |
| ncsc-2024-0427 | Kwetsbaarheden verholpen in Google Chrome | 2024-10-30T11:36:05.615865Z | 2024-10-30T11:36:05.615865Z |
| ncsc-2024-0426 | Kwetsbaarheden verholpen in Apple MacOS | 2024-10-30T11:26:13.535716Z | 2024-10-30T11:26:13.535716Z |
| ncsc-2024-0425 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2024-10-30T10:53:07.348476Z | 2024-10-30T10:53:07.348476Z |
| ncsc-2024-0424 | Kwetsbaarheden verholpen in Cisco Adaptive Security Appliance en Firepower Threat Defense | 2024-10-24T08:37:15.013231Z | 2024-10-24T08:37:15.013231Z |
| ncsc-2024-0422 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2024-10-18T09:26:29.690794Z | 2024-10-18T09:26:29.690794Z |
| ncsc-2024-0421 | Kwetsbaarheden verholpen in SolarWinds Serv-U | 2024-10-18T09:10:48.856424Z | 2024-10-18T09:10:48.856424Z |
| ncsc-2024-0420 | Kwetsbaarheden verholpen in Oracle MySQL | 2024-10-17T13:20:42.437738Z | 2024-10-17T13:20:42.437738Z |
| ncsc-2024-0419 | Kwetsbaarheden verholpen in Oracle Java | 2024-10-17T13:20:07.759085Z | 2024-10-17T13:20:07.759085Z |
| ncsc-2024-0418 | Kwetsbaarheden verholpen in Oracle Analytics | 2024-10-17T13:19:50.583299Z | 2024-10-17T13:19:50.583299Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-535380 | SSA-535380: Command Injection Vulnerability in Siveillance OIS Affecting Several Building Management Systems | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-453715 | SSA-453715: Deserialization Vulnerability in CCOM Communication Component of Desigo CC Family | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-434536 | SSA-434536: Memory Protection Bypass Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2021-07-13T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-434535 | SSA-434535: Memory Protection Bypass Vulnerability in SINAMICS PERFECT HARMONY GH180 Drives | 2021-07-13T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-434534 | SSA-434534: Memory Protection Bypass Vulnerability in SIMATIC S7-1200 and S7-1500 CPU Families | 2021-05-28T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-428051 | SSA-428051: Privilege Escalation Vulnerability in TIA Administrator | 2021-02-09T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-413407 | SSA-413407: Path Traversal Vulnerability in Teamcenter Active Workspace | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-334944 | SSA-334944: Vulnerability in SINEMA Remote Connect Server | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-330339 | SSA-330339: Web Vulnerabilities in SINEC NMS | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-288459 | SSA-288459: Heap Overflow Vulnerability in RFID terminals | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-208530 | SSA-208530: File parsing vulnerabilities in IFC adapter in NX | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-187092 | SSA-187092: Several Buffer-Overflow Vulnerabilities in Web Server of SCALANCE X-200 | 2021-04-13T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-139628 | SSA-139628: Vulnerabilities in Web Server for Scalance X Products | 2021-01-12T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-109294 | SSA-109294: Scene File Parsing Vulnerability in Simcenter STAR-CCM+ Viewer | 2021-09-14T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-816035 | SSA-816035: Code Execution Vulnerability in SINEMA Remote Connect Client | 2021-08-19T00:00:00Z | 2021-08-19T00:00:00Z |
| ssa-818688 | SSA-818688: Multiple Vulnerabilities in Solid Edge before SE2021MP7 | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-752103 | SSA-752103: Telnet Authentication Vulnerability in SINAMICS Medium Voltage Products | 2021-05-11T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-553445 | SSA-553445: DNS "Name:Wreck" Vulnerabilities in Multiple Siemens Energy AGT and SGT solutions | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-365397 | SSA-365397: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2.0.1 | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-286838 | SSA-286838: Multiple Vulnerabilities in SINAMICS Medium Voltage Products | 2021-05-11T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-158827 | SSA-158827: Denial-of-Service Vulnerability in Automation License Manager | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-729965 | SSA-729965: TLS Certificate Validation Vulnerability in SINUMERIK Integrate Operate Client | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-641963 | SSA-641963: Remote Code Execution Vulnerability in Multiple SIMATIC Software Products | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-622535 | SSA-622535: Multiple Vulnerabilities in Teamcenter Active Workspace | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-483182 | SSA-483182: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2 | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-209268 | SSA-209268: Multiple JT File Parsing Vulnerabilities in JT Utilities before V13.0.2.0 | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-173615 | SSA-173615: Multiple PAR and ASM File Parsing Vulnerabilities in Solid Edge | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-645530 | SSA-645530: TIFF File Parsing Vulnerability in JT2Go and Teamcenter Visualization before V13.1.0.3 | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-574442 | SSA-574442: Multiple PAR and DFT File Parsing Vulnerabilities in Solid Edge | 2021-04-13T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-542525 | SSA-542525: Authentication Vulnerabilities in SIMATIC HMI Products | 2020-09-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:7416 | Red Hat Security Advisory: gvisor-tap-vsock security update | 2025-05-13T13:59:06+00:00 | 2026-02-17T07:59:51+00:00 |
| rhsa-2025:7407 | Red Hat Security Advisory: opentelemetry-collector security update | 2025-05-13T13:53:53+00:00 | 2026-02-17T07:59:49+00:00 |
| rhsa-2025:7404 | Red Hat Security Advisory: grafana security update | 2025-05-13T13:59:07+00:00 | 2026-02-17T07:59:49+00:00 |
| rhsa-2025:7397 | Red Hat Security Advisory: skopeo security update | 2025-05-13T13:31:37+00:00 | 2026-02-17T07:59:48+00:00 |
| rhsa-2025:7391 | Red Hat Security Advisory: podman security update | 2025-05-13T13:31:19+00:00 | 2026-02-17T07:59:47+00:00 |
| rhsa-2025:7389 | Red Hat Security Advisory: buildah security update | 2025-05-13T13:28:19+00:00 | 2026-02-17T07:59:46+00:00 |
| rhsa-2025:7326 | Red Hat Security Advisory: rhc security update | 2025-05-13T08:44:22+00:00 | 2026-02-17T07:59:39+00:00 |
| rhsa-2025:4810 | Red Hat Security Advisory: RHSA: Submariner 0.18.5 - bug and security update | 2025-05-12T15:04:37+00:00 | 2026-02-17T07:59:38+00:00 |
| rhsa-2025:4731 | Red Hat Security Advisory: OpenShift Container Platform 4.16.40 bug fix and security update | 2025-05-15T00:44:29+00:00 | 2026-02-17T07:59:37+00:00 |
| rhsa-2025:4730 | Red Hat Security Advisory: OpenShift Container Platform 4.16.40 security and extras update | 2025-05-15T00:27:35+00:00 | 2026-02-17T07:59:35+00:00 |
| rhsa-2025:4712 | Red Hat Security Advisory: OpenShift Container Platform 4.18.13 bug fix and security update | 2025-05-14T02:10:27+00:00 | 2026-02-17T07:59:35+00:00 |
| rhsa-2025:4677 | Red Hat Security Advisory: OpenShift Container Platform 4.13.58 bug fix and security update | 2025-05-15T16:34:38+00:00 | 2026-02-17T07:59:34+00:00 |
| rhsa-2025:4669 | Red Hat Security Advisory: osbuild-composer security update | 2025-05-07T14:59:09+00:00 | 2026-02-17T07:59:33+00:00 |
| rhsa-2025:4667 | Red Hat Security Advisory: Updated 7.1 container image is now available in the Red Hat Ecosystem Catalog. | 2025-05-07T12:55:17+00:00 | 2026-02-17T07:59:33+00:00 |
| rhsa-2025:4666 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.7 container updates | 2025-05-07T16:17:54+00:00 | 2026-02-17T07:59:31+00:00 |
| rhsa-2025:4605 | Red Hat Security Advisory: multicluster Engine for Kubernetes 2.6.7 container updates | 2025-05-07T03:32:30+00:00 | 2026-02-17T07:59:30+00:00 |
| rhsa-2025:4576 | Red Hat Security Advisory: Satellite 6.17.0 release | 2025-05-06T20:31:21+00:00 | 2026-02-17T07:59:30+00:00 |
| rhsa-2025:4511 | Red Hat Security Advisory: RHODF-4.18-RHEL-9 security update | 2025-05-06T07:14:59+00:00 | 2026-02-17T07:59:30+00:00 |
| rhsa-2025:4569 | Red Hat Security Advisory: osbuild-composer security update | 2025-05-06T16:43:52+00:00 | 2026-02-17T07:59:29+00:00 |
| rhsa-2025:4502 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.10.8 container updates | 2025-05-06T06:29:57+00:00 | 2026-02-17T07:59:28+00:00 |
| rhsa-2025:4473 | Red Hat Security Advisory: multicluster Engine for Kubernetes 2.5.9 container updates | 2025-05-05T23:34:14+00:00 | 2026-02-17T07:59:27+00:00 |
| rhsa-2025:4462 | Red Hat Security Advisory: osbuild-composer security update | 2025-05-05T14:35:59+00:00 | 2026-02-17T07:59:26+00:00 |
| rhsa-2025:4431 | Red Hat Security Advisory: OpenShift Container Platform 4.17.28 bug fix and security update | 2025-05-09T04:33:03+00:00 | 2026-02-17T07:59:24+00:00 |
| rhsa-2025:4422 | Red Hat Security Advisory: OpenShift Container Platform 4.15.50 bug fix and security update | 2025-05-08T19:55:32+00:00 | 2026-02-17T07:59:23+00:00 |
| rhsa-2025:4211 | Red Hat Security Advisory: OpenShift Container Platform 4.18.11 bug fix and security update | 2025-05-01T03:08:42+00:00 | 2026-02-17T07:59:23+00:00 |
| rhsa-2025:4427 | Red Hat Security Advisory: OpenShift Container Platform 4.18.12 bug fix and security update | 2025-05-09T04:31:09+00:00 | 2026-02-17T07:59:22+00:00 |
| rhsa-2025:4409 | Red Hat Security Advisory: OpenShift Container Platform 4.12.76 bug fix and security update | 2025-05-08T19:54:33+00:00 | 2026-02-17T07:59:20+00:00 |
| rhsa-2025:4408 | Red Hat Security Advisory: OpenShift Container Platform 4.12.76 security and extras update | 2025-05-08T19:30:19+00:00 | 2026-02-17T07:59:20+00:00 |
| rhsa-2025:4250 | Red Hat Security Advisory: RHSA: Submariner 0.19.4 - bug fix and enhancement update | 2025-04-28T16:10:25+00:00 | 2026-02-17T07:59:18+00:00 |
| rhsa-2025:4204 | Red Hat Security Advisory: OpenShift Container Platform 4.17.27 bug fix and security update | 2025-04-30T03:47:47+00:00 | 2026-02-17T07:59:18+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-10-322-02a | Automated Solutions OPC Vulnerability | 2010-08-21T06:00:00.000000Z | 2025-06-17T16:50:13.013737Z |
| icsa-16-343-01 | Moxa MiiNePort Session Hijack Vulnerabilities | 2016-09-11T06:00:00.000000Z | 2025-06-17T16:50:00.161907Z |
| icsa-12-047-01a | Advantech WebAccess Vulnerabilities | 2012-11-19T07:00:00.000000Z | 2025-06-17T15:46:30.792399Z |
| icsa-12-150-01 | Honeywell HMIWeb Browser Buffer Overflow Vulnerability | 2012-03-02T07:00:00.000000Z | 2025-06-17T15:46:24.572627Z |
| icsa-12-146-01a | RuggedCom Weak Cryptography for Password Vulnerability | 2012-02-26T07:00:00.000000Z | 2025-06-17T15:46:18.307459Z |
| icsa-12-138-01 | Emerson DeltaV Multiple Vulnerabilities | 2012-02-18T07:00:00.000000Z | 2025-06-17T15:45:47.164093Z |
| icsa-12-062-01 | Wonderware Information Server Multiple Vulnerabilities | 2012-12-04T07:00:00.000000Z | 2025-06-17T15:45:28.468819Z |
| icsa-12-059-01 | ABB Robot Communications Runtime Buffer Overflow | 2012-12-01T07:00:00.000000Z | 2025-06-17T15:45:21.808130Z |
| icsa-25-168-05 | Dover Fueling Solutions ProGauge MagLink LX consoles | 2025-06-17T06:00:00.000000Z | 2025-06-17T06:00:00.000000Z |
| icsa-25-168-04 | Fuji Electric Smart Editor | 2025-06-17T06:00:00.000000Z | 2025-06-17T06:00:00.000000Z |
| icsa-25-168-02 | LS Electric GMWin 4 | 2025-06-17T06:00:00.000000Z | 2025-06-17T06:00:00.000000Z |
| va-25-136-01 | IBM Security Guardium stored cross-site scripting | 2025-05-16T20:14:51Z | 2025-06-16T00:00:00Z |
| icsa-13-352-01 | NovaTech Orion DNP3 Improper Input Validation Vulnerability | 2013-09-20T06:00:00.000000Z | 2025-06-12T21:23:06.621585Z |
| icsa-13-113-01 | Wonderware Information Server Vulnerabilities | 2013-01-25T07:00:00.000000Z | 2025-06-12T18:45:02.717561Z |
| icsa-14-205-02a | Siemens SIMATIC WinCC Vulnerabilities (Update A) | 2014-04-26T06:00:00.000000Z | 2025-06-12T18:44:31.147692Z |
| icsa-14-105-01 | Progea Movicon SCADA Information Disclosure Vulnerability | 2014-01-16T07:00:00.000000Z | 2025-06-12T18:44:24.886887Z |
| icsa-13-219-01 | Schweitzer Engineering Laboratories Improper Input Validation | 2013-05-10T06:00:00.000000Z | 2025-06-12T18:44:12.073139Z |
| icsa-25-162-10 | PTZOptics and Other Pan-Tilt-Zoom Cameras | 2025-06-12T06:00:00.000000Z | 2025-06-12T06:00:00.000000Z |
| icsa-25-162-09 | AVEVA PI Connector for CygNet | 2025-06-12T06:00:00.000000Z | 2025-06-12T06:00:00.000000Z |
| icsa-25-162-08 | AVEVA PI Web API | 2025-06-12T06:00:00.000000Z | 2025-06-12T06:00:00.000000Z |
| icsa-25-162-07 | AVEVA PI Data Archive | 2025-06-12T06:00:00.000000Z | 2025-06-12T06:00:00.000000Z |
| icsma-25-160-01 | MicroDicom DICOM Viewer | 2025-06-10T06:00:00.000000Z | 2025-06-10T06:00:00.000000Z |
| icsa-25-140-11 | Assured Telematics Inc (ATI) Fleet Management System (Update A) | 2025-05-20T06:00:00.000000Z | 2025-06-10T06:00:00.000000Z |
| icsa-24-030-01 | Emerson Rosemount GC370XA, GC700XA, GC1500XA | 2024-01-30T07:00:00.000000Z | 2025-06-10T06:00:00.000000Z |
| icsa-25-160-01 | SinoTrack GPS Receiver | 2025-06-10T05:00:00.000000Z | 2025-06-10T05:00:00.000000Z |
| icsa-25-162-06 | Siemens Energy Services | 2025-06-10T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-162-03 | Siemens SCALANCE and RUGGEDCOM | 2025-06-10T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-162-01 | Siemens Tecnomatix Plant Simulation | 2025-06-10T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-105-01 | Siemens Mendix Runtime | 2025-04-08T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-044-07 | Siemens Teamcenter | 2025-02-11T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-uccx-wcp-jjeqdt3s | Cisco Unified Contact Center Express Finesse Portal Web Cache Poisoning Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-pi-epnm-storedxss-ttjo62r | Cisco Prime Infrastructure and Evolved Programmable Network Manager Stored Cross-Site Scripting Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-pi-epnm-bfjsrjp5 | Cisco Prime Infrastructure and Evolved Programmable Network Manager Cross-Site Scripting Vulnerabilities | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ivpa-cmdinj-c5xrbboy | Cisco Intersight Private Virtual Appliance Command Injection Vulnerabilities | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ise-credentials-tkto3h3 | Cisco Identity Services Engine Device Credential Information Disclosure Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ipphone-csrf-hocmxw2c | Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-intersight-forward-c45ncgqb | Cisco Intersight Virtual Appliance Unauthenticated Port Forwarding Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-expressway-injection-x475ebtq | Cisco Expressway Series and Cisco TelePresence Video Communication Server Command Injection Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-duo-dha-filewrite-xpmbmzak | Cisco Duo Device Health Application for Windows Arbitrary File Write Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-cucm-injection-g6mbwh2 | Cisco Unified Communications Manager SQL Injection Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-cucm-imp-xss-qtt4vdsk | Cisco Unified Communications Products Cross-Site Scripting Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-clamav-dos-ftkhqmwz | ClamAV AutoIt Module Denial of Service Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ac-leak-sew6g2kd | Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables Affecting Cisco AnyConnect Secure Mobility Client and Cisco Secure Client | 2023-08-08T15:00:00+00:00 | 2023-08-08T15:00:00+00:00 |
| cisco-sa-ucm-file-read-h8h4hej3 | Cisco Unified Communications Products Arbitrary File Read Vulnerability | 2022-04-20T16:00:00+00:00 | 2023-08-02T20:18:45+00:00 |
| cisco-sa-asaftd-aclconfig-wvk52f3z | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software ACLs Not Installed upon Reload | 2023-07-27T16:00:00+00:00 | 2023-07-27T16:38:54+00:00 |
| cisco-sa-bw-priv-esc-qtguzosq | Cisco BroadWorks Privilege Escalation Vulnerability | 2023-07-19T16:00:00+00:00 | 2023-07-20T17:42:21+00:00 |
| cisco-sa-spa-web-multi-7kvpmu2f | Cisco Small Business SPA500 Series IP Phones Web UI Vulnerabilities | 2023-07-19T16:00:00+00:00 | 2023-07-19T16:00:00+00:00 |
| cisco-sa-esa-sma-wsa-xss-cp9duemq | Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities | 2023-06-21T16:00:00+00:00 | 2023-07-11T16:43:10+00:00 |
| cisco-sa-aci-cloudsec-enc-vs5wn2sx | Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability | 2023-07-05T16:00:00+00:00 | 2023-07-08T14:43:43+00:00 |
| cisco-sa-duo-auth-info-jgkswblz | Cisco Duo Authentication Proxy Information Disclosure Vulnerability | 2023-07-05T16:00:00+00:00 | 2023-07-07T15:45:19+00:00 |
| cisco-sa-ac-csc-privesc-wx4u4kw | Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows Privilege Escalation Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-07-05T16:20:46+00:00 |
| cisco-sa-sxsscsrf-2l24bbx6 | Cisco Webex Meetings Web UI Vulnerabilities | 2023-07-05T16:00:00+00:00 | 2023-07-05T16:00:00+00:00 |
| cisco-sa-bw-privesc-yw4ekrxw | Cisco BroadWorks Privilege Escalation Vulnerability | 2023-07-05T16:00:00+00:00 | 2023-07-05T16:00:00+00:00 |
| cisco-sa-duo-replay-knunkd | Cisco Duo Authentication for macOS and Duo Authentication for Windows Logon Offline Credentials Replay Vulnerability | 2023-04-05T16:00:00+00:00 | 2023-06-23T16:48:56+00:00 |
| cisco-sa-duo-mac-bypass-oyzpvpnx | Cisco Duo Two-Factor Authentication for macOS Authentication Bypass Vulnerability | 2023-06-21T16:00:00+00:00 | 2023-06-21T16:00:00+00:00 |
| cisco-sa-sd-wan-fhqh8pkx | Cisco SD-WAN Software Information Disclosure Vulnerability | 2021-09-22T16:00:00+00:00 | 2023-06-16T19:11:51+00:00 |
| cisco-sa-smb-sxss-opyjzume | Cisco Small Business 200, 300, and 500 Series Switches Web-Based Management Stored Cross-Site Scripting Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-expressway-priv-esc-ls2b9t7b | Cisco Expressway Series and Cisco TelePresence Video Communication Server Privilege Escalation Vulnerabilities | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-cucm-imp-dos-49gl7rzt | Cisco Unified Communications Manager IM & Presence Service Denial of Service Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-cucm-dos-4ag3ywbd | Cisco Unified Communications Manager Denial of Service Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-32910 | Libsoup: null pointer deference on libsoup via /auth/soup-auth-digest.c through "soup_auth_digest_authenticate" on client when server omits the "realm" parameter in an unauthorized response with digest authentication | 2025-04-02T00:00:00.000Z | 2026-02-21T02:53:13.000Z |
| msrc_cve-2025-21723 | scsi: mpi3mr: Fix possible crash when setting up bsg fails | 2025-02-02T00:00:00.000Z | 2026-02-21T02:53:04.000Z |
| msrc_cve-2025-0633 | Heap Overflow in iniparser.c | 2025-02-02T00:00:00.000Z | 2026-02-21T02:52:47.000Z |
| msrc_cve-2025-4802 | Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo). | 2025-05-02T00:00:00.000Z | 2026-02-21T02:52:45.000Z |
| msrc_cve-2025-21692 | net: sched: fix ets qdisc OOB Indexing | 2025-02-02T00:00:00.000Z | 2026-02-21T02:52:03.000Z |
| msrc_cve-2025-32913 | Libsoup: null pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in content-disposition header | 2025-04-02T00:00:00.000Z | 2026-02-21T02:52:02.000Z |
| msrc_cve-2024-46751 | btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info() | 2024-09-01T07:00:00.000Z | 2026-02-21T02:51:59.000Z |
| msrc_cve-2025-4516 | Use-after-free in "unicode_escape" decoder with error handler | 2025-05-02T00:00:00.000Z | 2026-02-21T02:51:37.000Z |
| msrc_cve-2024-46730 | drm/amd/display: Ensure array index tg_inst won't be -1 | 2024-09-01T07:00:00.000Z | 2026-02-21T02:50:57.000Z |
| msrc_cve-2024-56406 | Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes | 2025-04-02T00:00:00.000Z | 2026-02-21T02:50:56.000Z |
| msrc_cve-2025-4432 | Ring: some aes functions may panic when overflow checking is enabled in ring | 2025-05-02T00:00:00.000Z | 2026-02-21T02:50:21.000Z |
| msrc_cve-2024-38796 | Integer overflow in PeCoffLoaderRelocateImage | 2024-09-01T07:00:00.000Z | 2026-02-21T02:50:11.000Z |
| msrc_cve-2025-0624 | Grub2: net: out-of-bounds write in grub_net_search_config_file() | 2025-02-02T00:00:00.000Z | 2026-02-21T02:49:52.000Z |
| msrc_cve-2025-32906 | Libsoup: out of bounds reads in soup_headers_parse_request() | 2025-04-02T00:00:00.000Z | 2026-02-21T02:49:51.000Z |
| msrc_cve-2025-32914 | Libsoup: oob read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process | 2025-04-02T00:00:00.000Z | 2026-02-21T02:48:47.000Z |
| msrc_cve-2025-4574 | Crossbeam-channel: crossbeam-channel vulnerable to double free on drop | 2025-05-02T00:00:00.000Z | 2026-02-21T02:48:25.000Z |
| msrc_cve-2024-57950 | drm/amd/display: Initialize denominator defaults to 1 | 2025-02-02T00:00:00.000Z | 2026-02-21T02:48:25.000Z |
| msrc_cve-2024-49958 | ocfs2: reserve space for inline xattr before attaching reflink tree | 2024-10-01T07:00:00.000Z | 2026-02-21T02:47:59.000Z |
| msrc_cve-2024-46786 | fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF | 2024-09-01T07:00:00.000Z | 2026-02-21T02:47:50.000Z |
| msrc_cve-2024-46755 | wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() | 2024-09-01T07:00:00.000Z | 2026-02-21T02:47:01.000Z |
| msrc_cve-2024-50008 | wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() | 2024-10-01T07:00:00.000Z | 2026-02-21T02:46:55.000Z |
| msrc_cve-2025-21898 | ftrace: Avoid potential division by zero in function_stat_show() | 2025-04-02T00:00:00.000Z | 2026-02-21T02:46:50.000Z |
| msrc_cve-2025-46712 | Erlang/OTP SSH Has Strict KEX Violations | 2025-05-02T00:00:00.000Z | 2026-02-21T02:46:10.000Z |
| msrc_cve-2024-46731 | drm/amd/pm: fix the Out-of-bounds read warning | 2024-09-01T07:00:00.000Z | 2026-02-21T02:46:01.000Z |
| msrc_cve-2025-3277 | An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution. | 2025-04-02T00:00:00.000Z | 2026-02-21T02:45:54.000Z |
| msrc_cve-2024-49954 | static_call: Replace pointless WARN_ON() in static_call_module_notify() | 2024-10-01T07:00:00.000Z | 2026-02-21T02:45:35.000Z |
| msrc_cve-2025-1365 | GNU elfutils eu-readelf readelf.c process_symtab buffer overflow | 2025-02-02T00:00:00.000Z | 2026-02-21T02:45:07.000Z |
| msrc_cve-2025-4207 | PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation | 2025-05-02T00:00:00.000Z | 2026-02-21T02:45:06.000Z |
| msrc_cve-2024-49965 | ocfs2: remove unreasonable unlock in ocfs2_read_blocks | 2024-10-01T07:00:00.000Z | 2026-02-21T02:44:29.000Z |
| msrc_cve-2025-27113 | libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c. | 2025-02-02T00:00:00.000Z | 2026-02-21T02:44:24.000Z |
| ID | Description | Updated |
|---|---|---|
| var-200906-0617 | The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly ini… | 2025-12-22T22:13:25.576000Z |
| var-202109-1790 | A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when … | 2025-12-22T22:13:25.343000Z |
| var-201601-0495 | Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x bef… | 2025-12-22T22:13:21.379000Z |
| var-201908-0266 | Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a den… | 2025-12-22T22:13:19.610000Z |
| var-200805-0585 | OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the… | 2025-12-22T22:13:18.068000Z |
| var-201806-1439 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2025-12-22T22:13:17.826000Z |
| var-202205-1953 | A logic issue was addressed with improved state management. This issue is fixed in Securi… | 2025-12-22T22:13:09.282000Z |
| var-201205-0393 | Multiple stack-based buffer overflows in Apple QuickTime before 7.7.2 on Windows allow re… | 2025-12-22T22:13:08.125000Z |
| var-201505-0337 | The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorit… | 2025-12-22T22:13:07.939000Z |
| var-201302-0332 | The TLS implementation in Mozilla Network Security Services (NSS) does not properly consi… | 2025-12-22T22:13:07.602000Z |
| var-201204-0112 | The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before … | 2025-12-22T22:13:07.476000Z |
| var-201202-0066 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T22:13:06.587000Z |
| var-201506-0497 | The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 … | 2025-12-22T22:13:05.849000Z |
| var-202202-0906 | valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes. -----BE… | 2025-12-22T22:13:05.513000Z |
| var-202204-0855 | There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, … | 2025-12-22T22:13:05.435000Z |
| var-201707-1241 | In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]A… | 2025-12-22T22:13:05.111000Z |
| var-202204-0692 | Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability … | 2025-12-22T22:12:58.383000Z |
| var-200106-0149 | Buffer overflow in IPSwitch IMail SMTP server 6.06 and possibly prior versions allows rem… | 2025-12-22T22:12:27.521000Z |
| var-201805-0950 | A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Softw… | 2025-12-22T22:12:27.389000Z |
| var-201912-0602 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T22:11:56.845000Z |
| var-202109-0277 | A logic issue was addressed with improved state management. This issue is fixed in iTunes… | 2025-12-22T22:11:56.375000Z |
| var-202203-0005 | The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can… | 2025-12-22T22:11:54.518000Z |
| var-202101-1926 | Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer o… | 2025-12-22T22:11:15.713000Z |
| var-201110-0451 | The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d i… | 2025-12-22T22:11:15.207000Z |
| var-202205-1370 | Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote … | 2025-12-22T22:11:15.106000Z |
| var-201110-0476 | Use-after-free vulnerability in Google Chrome before 15.0.874.102 allows remote attackers… | 2025-12-22T22:11:12.431000Z |
| var-202308-2021 | .NET and Visual Studio Denial of Service Vulnerability. =================================… | 2025-12-22T22:11:03.478000Z |
| var-201601-0016 | Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before … | 2025-12-22T22:11:02.935000Z |
| var-202205-1299 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2025-12-22T22:11:02.403000Z |
| var-200809-0566 | Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2… | 2025-12-22T22:10:53.229000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000054 | EC-Orange vulnerable to authorization bypass | 2024-05-29T14:06+09:00 | 2024-05-29T14:06+09:00 |
| jvndb-2024-003249 | ELECOM wireless LAN routers vulnerable to OS command injection | 2024-05-29T12:33+09:00 | 2024-05-29T12:33+09:00 |
| jvndb-2023-000040 | WordPress Plugin "Appointment and Event Booking Calendar for WordPress - Amelia" vulnerable to cross-site scripting | 2023-04-24T13:41+09:00 | 2024-05-28T16:59+09:00 |
| jvndb-2023-000039 | WordPress plugin "LIQUID SPEECH BALLOON" vulnerable to cross-site request forgery | 2023-04-19T14:24+09:00 | 2024-05-28T16:56+09:00 |
| jvndb-2024-000053 | Multiple vulnerabilities in Unifier and Unifier Cast | 2024-05-28T14:47+09:00 | 2024-05-28T14:47+09:00 |
| jvndb-2024-000052 | Multiple vulnerabilities in UTAU | 2024-05-28T14:23+09:00 | 2024-05-28T14:23+09:00 |
| jvndb-2023-001639 | Heap-based buffer overflow vulnerability in OMRON CX-Drive | 2023-04-25T14:31+09:00 | 2024-05-27T18:11+09:00 |
| jvndb-2023-000029 | Multiple vulnerabilities in Seiko Solutions SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210 | 2023-03-31T15:54+09:00 | 2024-05-27T17:08+09:00 |
| jvndb-2023-000059 | Multiple vulnerabilities in Inaba Denki Sangyo Wi-Fi AP UNIT | 2023-06-09T15:18+09:00 | 2024-05-27T16:38+09:00 |
| jvndb-2023-000043 | Multiple vulnerabilities in MicroEngine Mailform | 2023-05-10T13:57+09:00 | 2024-05-24T17:07+09:00 |
| jvndb-2023-000045 | WordPress Plugin "VK Blocks" and "VK All in One Expansion Unit" vulnerable to cross-site scripting | 2023-05-09T15:14+09:00 | 2024-05-24T17:05+09:00 |
| jvndb-2023-001926 | Cross-site Scripting Vulnerability in Hitachi Ops Center Analyzer | 2023-05-24T11:40+09:00 | 2024-05-24T17:01+09:00 |
| jvndb-2023-000047 | Beekeeper Studio vulnerable to code injection | 2023-05-12T16:42+09:00 | 2024-05-24T16:17+09:00 |
| jvndb-2023-000046 | SR-7100VN vulnerable to privilege escalation | 2023-05-09T13:58+09:00 | 2024-05-24T16:13+09:00 |
| jvndb-2023-000061 | Chatwork Desktop Application (Mac) vulnerable to code injection | 2023-06-13T13:38+09:00 | 2024-05-24T16:02+09:00 |
| jvndb-2023-002055 | Multiple vulnerabilities in KbDevice digital video recorders | 2023-06-07T11:52+09:00 | 2024-05-24T15:57+09:00 |
| jvndb-2023-000049 | Multiple vulnerabilities in Cybozu Garoon | 2023-05-15T14:29+09:00 | 2024-05-24T15:26+09:00 |
| jvndb-2024-000051 | Splunk Config Explorer vulnerable to cross-site scripting | 2024-05-24T13:50+09:00 | 2024-05-24T13:50+09:00 |
| jvndb-2024-000050 | WordPress Plugin "WP Booking" vulnerable to cross-site scripting | 2024-05-24T13:41+09:00 | 2024-05-24T13:41+09:00 |
| jvndb-2023-001534 | Security Issues in FINS protocol | 2023-04-18T13:58+09:00 | 2024-05-23T17:35+09:00 |
| jvndb-2023-000057 | "Jiyu Kukan Toku-Toku coupon" App vulnerable to improper server certificate verification | 2023-06-01T14:51+09:00 | 2024-05-23T17:19+09:00 |
| jvndb-2023-000026 | Qrio Smart Lock Q-SL2 vulnerable to authentication bypass by capture-replay | 2023-05-18T14:13+09:00 | 2024-05-23T17:18+09:00 |
| jvndb-2023-000051 | Multiple vulnerabilities in T&D and ESPEC MIC data logger products | 2023-05-19T15:21+09:00 | 2024-05-23T17:03+09:00 |
| jvndb-2023-000041 | LINE WORKS Drive Explorer vulnerable to code injection | 2023-05-08T15:16+09:00 | 2024-05-23T17:03+09:00 |
| jvndb-2023-002111 | Printer Driver Packager NX creates driver installation packages without modification detection | 2023-06-15T16:06+09:00 | 2024-05-23T15:45+09:00 |
| jvndb-2023-002072 | Multiple vulnerabilities in Fuji Electric products | 2023-06-09T12:23+09:00 | 2024-05-23T15:33+09:00 |
| jvndb-2023-002100 | Security updates for multiple Trend Micro products for enterprises (June 2023) | 2023-06-14T14:47+09:00 | 2024-05-23T15:23+09:00 |
| jvndb-2023-000066 | Multiple vulnerabilities in Aterm series | 2023-06-27T15:12+09:00 | 2024-05-22T18:16+09:00 |
| jvndb-2023-003767 | Multiple vulnerabilities in multiple FURUNO SYSTEMS wireless LAN access point devices in ST(Standalone) mode | 2023-10-03T14:26+09:00 | 2024-05-22T18:01+09:00 |
| jvndb-2023-000101 | web2py vulnerable to OS command injection | 2023-10-16T16:11+09:00 | 2024-05-22T17:58+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:4511-1 | Security update for rsync | 2025-12-23T12:14:35Z | 2025-12-23T12:14:35Z |
| suse-su-2025:4507-1 | Security update for the Linux Kernel | 2025-12-22T16:46:54Z | 2025-12-22T16:46:54Z |
| suse-su-2025:4506-1 | Security update for the Linux Kernel | 2025-12-22T16:39:00Z | 2025-12-22T16:39:00Z |
| suse-su-2025:4505-1 | Security update for the Linux Kernel | 2025-12-22T16:35:13Z | 2025-12-22T16:35:13Z |
| suse-su-2025:4504-1 | Security update for glib2 | 2025-12-22T16:30:38Z | 2025-12-22T16:30:38Z |
| suse-su-2026:20008-1 | Security update for qemu | 2025-12-22T15:42:55Z | 2025-12-22T15:42:55Z |
| suse-su-2026:20007-1 | Security update for python-tornado6 | 2025-12-22T13:31:07Z | 2025-12-22T13:31:07Z |
| suse-su-2025:4502-1 | Security update for mariadb | 2025-12-22T11:28:30Z | 2025-12-22T11:28:30Z |
| suse-su-2026:20018-1 | Security update for mariadb | 2025-12-22T11:13:12Z | 2025-12-22T11:13:12Z |
| suse-su-2026:20016-1 | Security update for fontforge | 2025-12-22T10:05:05Z | 2025-12-22T10:05:05Z |
| suse-su-2025:4501-1 | Security update for taglib | 2025-12-19T17:00:20Z | 2025-12-19T17:00:20Z |
| suse-su-2026:20015-1 | Security update for the Linux Kernel | 2025-12-19T16:46:47Z | 2025-12-19T16:46:47Z |
| suse-su-2026:20012-1 | Security update for the Linux Kernel | 2025-12-19T16:46:47Z | 2025-12-19T16:46:47Z |
| suse-su-2026:20021-1 | Security update for the Linux Kernel | 2025-12-19T16:19:41Z | 2025-12-19T16:19:41Z |
| suse-su-2025:4494-1 | Security update for libpng16 | 2025-12-19T13:14:13Z | 2025-12-19T13:14:13Z |
| suse-su-2025:4493-1 | Security update for mariadb | 2025-12-19T13:01:17Z | 2025-12-19T13:01:17Z |
| suse-su-2025:4491-1 | Security update for mariadb | 2025-12-19T11:40:47Z | 2025-12-19T11:40:47Z |
| suse-su-2025:4490-1 | Security update for xen | 2025-12-19T11:17:12Z | 2025-12-19T11:17:12Z |
| suse-su-2025:4489-1 | Security update for netty | 2025-12-19T11:01:56Z | 2025-12-19T11:01:56Z |
| suse-su-2025:4488-1 | Security update for apache2 | 2025-12-18T17:17:26Z | 2025-12-18T17:17:26Z |
| suse-su-2025:4487-1 | Security update for python36 | 2025-12-18T14:44:30Z | 2025-12-18T14:44:30Z |
| suse-su-2025:4486-1 | Security update for postgresql13 | 2025-12-18T14:42:43Z | 2025-12-18T14:42:43Z |
| suse-su-2025:4485-1 | Security update for postgresql14 | 2025-12-18T14:41:51Z | 2025-12-18T14:41:51Z |
| suse-su-2025:4484-1 | Security update for postgresql15 | 2025-12-18T14:39:58Z | 2025-12-18T14:39:58Z |
| suse-su-2025:21233-1 | Security update for qemu | 2025-12-18T12:38:54Z | 2025-12-18T12:38:54Z |
| suse-su-2025:21230-1 | Security update for qemu | 2025-12-18T12:38:54Z | 2025-12-18T12:38:54Z |
| suse-su-2025:4483-1 | Security update for colord | 2025-12-18T12:29:27Z | 2025-12-18T12:29:27Z |
| suse-su-2025:4482-1 | Security update for grafana | 2025-12-18T12:22:20Z | 2025-12-18T12:22:20Z |
| suse-su-2025:4481-1 | Security update for golang-github-prometheus-alertmanager | 2025-12-18T12:18:50Z | 2025-12-18T12:18:50Z |
| suse-su-2025:4479-1 | Security update 4.3.16.2 for Multi-Linux Manager Server LTS | 2025-12-18T12:15:07Z | 2025-12-18T12:15:07Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:20135-1 | Security update for mozjs128 | 2025-12-03T20:41:04Z | 2025-12-03T20:41:04Z |
| opensuse-su-2025:15795-1 | go1.25-1.25.5-1.1 on GA media | 2025-12-03T00:00:00Z | 2025-12-03T00:00:00Z |
| opensuse-su-2025:15794-1 | chromedriver-143.0.7499.40-2.1 on GA media | 2025-12-03T00:00:00Z | 2025-12-03T00:00:00Z |
| opensuse-su-2025:20133-1 | Security update for python-cbor2 | 2025-12-02T13:51:41Z | 2025-12-02T13:51:41Z |
| opensuse-su-2025:20132-1 | Security update for strongswan | 2025-12-02T13:11:59Z | 2025-12-02T13:11:59Z |
| opensuse-su-2025:15793-1 | gegl-0.4.64-3.1 on GA media | 2025-12-02T00:00:00Z | 2025-12-02T00:00:00Z |
| opensuse-su-2025:15792-1 | python39-3.9.24-2.1 on GA media | 2025-12-01T00:00:00Z | 2025-12-01T00:00:00Z |
| opensuse-su-2025:15791-1 | python315-3.15.0~a1-2.1 on GA media | 2025-12-01T00:00:00Z | 2025-12-01T00:00:00Z |
| opensuse-su-2025:15790-1 | python-mistralclient-doc-6.1.0-1.1 on GA media | 2025-12-01T00:00:00Z | 2025-12-01T00:00:00Z |
| opensuse-su-2025:15789-1 | libecpg6-18.1-1.1 on GA media | 2025-12-01T00:00:00Z | 2025-12-01T00:00:00Z |
| opensuse-su-2025:15788-1 | lightdm-kde-greeter-6.0.5-1.1 on GA media | 2025-12-01T00:00:00Z | 2025-12-01T00:00:00Z |
| opensuse-su-2025:20125-1 | Security update for java-17-openjdk | 2025-11-28T10:27:02Z | 2025-11-28T10:27:02Z |
| opensuse-su-2025:20123-1 | Security update for java-21-openjdk | 2025-11-28T09:35:08Z | 2025-11-28T09:35:08Z |
| opensuse-su-2025:20122-1 | Security update for openssh | 2025-11-28T07:46:24Z | 2025-11-28T07:46:24Z |
| opensuse-su-2025:15787-1 | python311-salt-3006.0-52.1 on GA media | 2025-11-28T00:00:00Z | 2025-11-28T00:00:00Z |
| opensuse-su-2025:15786-1 | postgresql17-17.7-1.1 on GA media | 2025-11-28T00:00:00Z | 2025-11-28T00:00:00Z |
| opensuse-su-2025:15785-1 | postgresql16-16.11-1.1 on GA media | 2025-11-28T00:00:00Z | 2025-11-28T00:00:00Z |
| opensuse-su-2025:15784-1 | postgresql15-15.15-1.1 on GA media | 2025-11-28T00:00:00Z | 2025-11-28T00:00:00Z |
| opensuse-su-2025:15783-1 | postgresql14-14.20-1.1 on GA media | 2025-11-28T00:00:00Z | 2025-11-28T00:00:00Z |
| opensuse-su-2025:15782-1 | postgresql13-13.23-1.1 on GA media | 2025-11-28T00:00:00Z | 2025-11-28T00:00:00Z |
| opensuse-su-2025:15781-1 | libpng16-16-1.6.51-1.1 on GA media | 2025-11-28T00:00:00Z | 2025-11-28T00:00:00Z |
| opensuse-su-2025:15780-1 | libcoap-devel-4.3.5a-1.1 on GA media | 2025-11-28T00:00:00Z | 2025-11-28T00:00:00Z |
| opensuse-su-2025:15779-1 | helm3-3.19.2-1.1 on GA media | 2025-11-28T00:00:00Z | 2025-11-28T00:00:00Z |
| opensuse-su-2025:20113-1 | Security update for dovecot24 | 2025-11-27T20:17:17Z | 2025-11-27T20:17:17Z |
| opensuse-su-2025:20114-1 | Security update for himmelblau | 2025-11-27T20:16:29Z | 2025-11-27T20:16:29Z |
| opensuse-su-2025:20106-1 | Security update for tomcat11 | 2025-11-27T15:43:26Z | 2025-11-27T15:43:26Z |
| opensuse-su-2025:20116-1 | Security update for rnp | 2025-11-27T12:39:03Z | 2025-11-27T12:39:03Z |
| opensuse-su-2025:20118-1 | Security update for gitea-tea | 2025-11-27T12:30:27Z | 2025-11-27T12:30:27Z |
| opensuse-su-2025:20119-1 | Security update for tcpreplay | 2025-11-27T12:29:40Z | 2025-11-27T12:29:40Z |
| opensuse-su-2025:20115-1 | Security update for pnpm | 2025-11-27T12:28:46Z | 2025-11-27T12:28:46Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tomcat-2020-11996 | 2024-03-06T11:11:51.472Z | 2025-11-06T13:25:46.476Z | |
| bit-tensorflow-2022-41883 | Out of bounds segmentation fault due to unequal op inputs in Tensorflow | 2024-03-06T11:11:35.699Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2025-55675 | Apache Superset: Incorrect datasource authorization on REST API | 2025-08-18T08:13:52.905Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2025-55674 | Apache Superset: Improper SQL authorisation, parse not checking for specific engine functions | 2025-08-18T08:13:51.077Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2025-55673 | Apache Superset: Metadata exposure in embedded charts | 2025-08-18T08:13:49.073Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2025-55672 | Apache Superset: Stored XSS on charts metadata | 2025-08-18T08:13:46.716Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-45438 | Apache Superset: Dashboard metadata information leak | 2025-02-05T07:28:48.307Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43721 | Apache Superset: Open Redirect Vulnerability | 2025-02-05T07:28:53.604Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43720 | Apache Superset: Improper rendering of user input | 2025-02-05T07:28:59.302Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43719 | Apache Superset: Cross Site Request Forgery (CSRF) on accept, request access API | 2025-02-05T07:29:05.011Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43718 | Apache Superset: Cross-Site Scripting vulnerability on upload forms | 2025-02-05T07:29:11.197Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43717 | Apache Superset: Cross-Site Scripting on dashboards | 2025-02-05T07:29:16.011Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-41703 | Apache Superset: SQL injection vulnerability in adhoc clauses | 2025-02-05T07:29:20.796Z | 2025-11-06T13:25:46.476Z |
| bit-sqlite-2025-6965 | Integer Truncation on SQLite | 2025-07-16T18:03:02.187Z | 2025-11-06T13:25:46.476Z |
| bit-sqlite-2023-7104 | SQLite SQLite3 make alltest sqlite3session.c sessionReadRecord heap-based overflow | 2024-03-06T11:05:41.196Z | 2025-11-06T13:25:46.476Z |
| bit-sqlite-2021-36690 | 2024-03-06T11:06:24.567Z | 2025-11-06T13:25:46.476Z | |
| bit-setuptools-2022-40897 | 2024-03-06T11:04:50.199Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2024-27282 | 2024-06-04T09:56:49.809Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2023-28756 | 2024-03-06T11:04:05.363Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2022-28739 | 2024-03-06T11:04:15.708Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2021-33621 | 2024-03-06T11:05:00.460Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2020-5247 | HTTP Response Splitting in Puma | 2024-03-06T11:05:50.672Z | 2025-11-06T13:25:46.476Z |
| bit-redis-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:18:53.323Z | 2025-11-06T13:25:46.476Z |
| bit-redis-2025-46819 | Redis is vulnerable to DoS via specially crafted LUA scripts | 2025-10-08T08:51:28.594Z | 2025-11-06T13:25:46.476Z |
| bit-redis-2024-31228 | Denial-of-service due to unbounded pattern matching in Redis | 2024-10-09T16:41:13.129Z | 2025-11-06T13:25:46.476Z |
| bit-redis-2022-35977 | Integer overflow in certain command arguments can drive Redis to OOM panic | 2024-03-06T11:05:24.585Z | 2025-11-06T13:25:46.476Z |
| bit-python-2025-0938 | URL parser allowed square brackets in domain names | 2025-04-14T11:35:18.242Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-9287 | Virtual environment (venv) activation scripts don't quote paths | 2024-12-13T12:39:42.210Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-8088 | Infinite loop when iterating over zip archive entry names from zipfile.Path | 2025-04-14T11:34:52.441Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-7592 | Quadratic complexity parsing cookies with backslashes | 2024-09-16T12:03:55.576Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-05331 | Complete Online Beauty Parlor Management System /search-invoices.php文件SQL注入漏洞 | 2025-12-25 | 2026-01-21 |
| cnvd-2026-05330 | Complete Online Beauty Parlor Management System /view-appointment.php文件SQL注入漏洞 | 2025-12-25 | 2026-01-21 |
| cnvd-2026-05329 | Complete Online Beauty Parlor Management System /search-invoices.php文件跨站脚本漏洞 | 2026-01-14 | 2026-01-21 |
| cnvd-2026-05174 | Huawei Smart Screen授权问题漏洞 | 2023-12-08 | 2026-01-21 |
| cnvd-2026-05173 | Huawei NetEngine AR617VW访问控制不当漏洞 | 2023-12-22 | 2026-01-21 |
| cnvd-2026-05172 | Huawei NetEngine AR617VW命令注入漏洞 | 2023-12-22 | 2026-01-21 |
| cnvd-2026-05171 | Huawei HarmonyOS和EMUI device authentication模块越界访问漏洞 | 2024-01-23 | 2026-01-21 |
| cnvd-2026-05170 | Huawei HarmonyOS和EMUI WMS模块权限校验不严格漏洞 | 2024-01-23 | 2026-01-21 |
| cnvd-2026-05169 | Huawei HarmonyOS和EMUI AMS模块存在未明漏洞 | 2024-01-23 | 2026-01-21 |
| cnvd-2026-05168 | Huawei EMUI存在未明漏洞(CNVD-2026-05168) | 2024-04-11 | 2026-01-21 |
| cnvd-2026-05167 | Huawei PC Manager访问控制不当漏洞 | 2024-05-30 | 2026-01-21 |
| cnvd-2026-05166 | Huawei HarmonyOS和EMUI NearLink模块权限验证不足漏洞 | 2024-06-18 | 2026-01-21 |
| cnvd-2026-05165 | Huawei Technologies存在未明漏洞 | 2024-07-25 | 2026-01-21 |
| cnvd-2026-05164 | Huawei HarmonyOS和EMUI account模块存在未明漏洞 | 2024-08-12 | 2026-01-21 |
| cnvd-2026-05163 | Huawei HarmonyOS和EMUI Camera驱动模块访问权限漏洞 | 2024-09-10 | 2026-01-21 |
| cnvd-2026-04817 | 用友网络科技股份有限公司U8 Cloud存在命令执行漏洞(CNVD-C-2026-26052) | 2026-01-04 | 2026-01-21 |
| cnvd-2026-04806 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在命令执行漏洞(CNVD-C-2025-1018960) | 2025-12-10 | 2026-01-21 |
| cnvd-2026-04470 | 北京神州视翰科技有限公司远程医疗综合服务平台存在SQL注入漏洞(CNVD-C-2026-35542) | 2026-01-08 | 2026-01-21 |
| cnvd-2026-04469 | 北京神州视翰科技有限公司远程医疗综合服务平台存在SQL注入漏洞(CNVD-C-2025-987341) | 2025-12-08 | 2026-01-21 |
| cnvd-2026-04468 | 北京神州视翰科技有限公司远程医疗综合服务平台存在SQL注入漏洞(CNVD-C-2025-980402) | 2025-12-04 | 2026-01-21 |
| cnvd-2026-04457 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2026-33516) | 2026-01-07 | 2026-01-21 |
| cnvd-2026-04456 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-1206330) | 2025-12-29 | 2026-01-21 |
| cnvd-2026-04455 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-1203509) | 2025-12-27 | 2026-01-21 |
| cnvd-2026-04454 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-1134083) | 2025-12-22 | 2026-01-21 |
| cnvd-2026-04452 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-986300) | 2025-12-07 | 2026-01-21 |
| cnvd-2026-04451 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-986298) | 2025-12-07 | 2026-01-21 |
| cnvd-2026-04449 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976472) | 2025-12-03 | 2026-01-21 |
| cnvd-2026-04448 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976469) | 2025-12-03 | 2026-01-21 |
| cnvd-2026-04447 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976466) | 2025-12-03 | 2026-01-21 |
| cnvd-2026-04446 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976462) | 2025-12-03 | 2026-01-21 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0865 | Vulnérabilité dans Oracle E-Business Suite | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| certfr-2025-avi-0864 | Multiples vulnérabilités dans VMware Tanzu | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| certfr-2025-avi-0863 | Vulnérabilité dans Belden HiOS Switch Platform | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| certfr-2025-avi-0862 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0861 | Multiples vulnérabilités dans les produits IBM | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0860 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0859 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0858 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0857 | Vulnérabilité dans Wireshark | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0856 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0855 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0854 | Vulnérabilité dans les produits Moxa | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0853 | Multiples vulnérabilités dans GitLab | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0852 | Vulnérabilité dans Tenable Security Center | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0851 | Vulnérabilité dans Python | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0850 | Multiples vulnérabilités dans Google Chrome | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0847 | Vulnérabilité dans les produits Liferay | 2025-10-06T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0849 | Multiples vulnérabilités dans les produits Elastic | 2025-10-07T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0848 | Vulnérabilité dans OpenSSH | 2025-10-06T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0846 | Multiples vulnérabilités dans les produits Qnap | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-avi-0845 | Multiples vulnérabilités dans Zabbix | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-avi-0844 | Multiples vulnérabilités dans IBM Sterling Connect | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0843 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0842 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0841 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0840 | Multiples vulnérabilités dans Zabbix | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0839 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0838 | Multiples vulnérabilités dans les produits Splunk | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| certfr-2025-avi-0837 | Multiples vulnérabilités dans Google Chrome | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| certfr-2025-avi-0836 | Multiples vulnérabilités dans les produits Tenable | 2025-10-01T00:00:00.000000 | 2025-10-01T00:00:00.000000 |