Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-33181 |
7.3 (3.1)
|
NVIDIA Cumulus Linux and NVOS products contain a … |
NVIDIA |
Cumulus Linux GA |
2026-02-24T18:42:04.490Z | 2026-02-24T21:29:14.387Z |
| CVE-2025-33180 |
8 (3.1)
|
NVIDIA Cumulus Linux and NVOS products contain a … |
NVIDIA |
Cumulus Linux GA |
2026-02-24T18:41:48.632Z | 2026-02-24T21:31:41.482Z |
| CVE-2025-33179 |
8 (3.1)
|
NVIDIA Cumulus Linux and NVOS products contain a … |
NVIDIA |
Cumulus Linux GA |
2026-02-24T18:41:32.821Z | 2026-02-26T19:31:35.173Z |
| CVE-2026-26342 |
8.7 (4.0)
|
Tattile Smart+ / Vega / Basic <= 1.181.5 Insufficient … |
Tattile s.r.l. |
Smart+ |
2026-02-24T18:41:09.935Z | 2026-02-26T19:58:40.958Z |
| CVE-2026-26341 |
9.3 (4.0)
|
Tattile Smart+ / Vega / Basic <= 1.181.5 Default Credentials |
Tattile s.r.l. |
Smart+ |
2026-02-24T18:40:54.212Z | 2026-02-24T21:33:18.810Z |
| CVE-2026-26340 |
8.7 (4.0)
|
Tattile Smart+ / Vega / Basic <= 1.181.5 Unauthenticat… |
Tattile s.r.l. |
Smart+ |
2026-02-24T18:40:35.393Z | 2026-02-24T21:34:06.523Z |
| CVE-2026-3105 |
7.6 (3.1)
|
SQL Injection in Contact Activity API Sorting |
Mautic |
Mautic |
2026-02-24T18:39:03.352Z | 2026-02-26T20:07:06.187Z |
| CVE-2026-26222 |
10 (4.0)
|
DocLink .NET Remoting Unauthenticated Arbitrary File R… |
Beyond Limits Inc. |
Altec DocLink |
2026-02-24T17:33:12.136Z | 2026-02-27T20:53:32.186Z |
| CVE-2026-25603 |
6.6 (3.1)
|
Path Traversal vulnerability in Linksys MR9600, Linksy… |
Linksys |
MR9600 |
2026-02-24T17:14:36.141Z | 2026-02-24T18:13:33.449Z |
| CVE-2026-27468 |
4.8 (4.0)
|
Mastodon may allow unconfirmed FASP to make subscriptions |
mastodon |
mastodon |
2026-02-24T17:12:40.349Z | 2026-02-27T20:50:52.856Z |
| CVE-2025-14963 |
6.2 (4.0)
|
A vulnerability identified in the HX Agent driver… |
Trellix |
Endpoint HX Agent (xAgent) |
2026-02-24T17:11:06.812Z | 2026-02-26T14:44:08.034Z |
| CVE-2026-27156 |
6.1 (3.1)
|
NiceGUI has XSS via Code Injection |
zauberzeug |
nicegui |
2026-02-24T17:00:21.628Z | 2026-02-26T21:33:40.507Z |
| CVE-2025-62512 |
5.5 (4.0)
|
Piwigo Vulnerable to User Enumeration via Password Res… |
Piwigo |
Piwigo |
2026-02-24T16:43:28.919Z | 2026-02-27T20:52:30.148Z |
| CVE-2024-48928 |
2.7 (4.0)
|
Piwigo's secret key can be brute forced |
Piwigo |
Piwigo |
2026-02-24T16:39:56.944Z | 2026-02-27T20:52:54.685Z |
| CVE-2026-27590 |
8.9 (4.0)
|
Caddy: Unicode case-folding length expansion causes in… |
caddyserver |
caddy |
2026-02-24T16:33:41.353Z | 2026-02-27T20:52:00.327Z |
| CVE-2026-27589 |
6.9 (4.0)
|
Caddy vulnerable to cross-origin config application vi… |
caddyserver |
caddy |
2026-02-24T16:30:52.016Z | 2026-02-27T20:51:24.110Z |
| CVE-2026-27588 |
7.7 (4.0)
|
Caddy: MatchHost becomes case-sensitive for large host… |
caddyserver |
caddy |
2026-02-24T16:28:28.106Z | 2026-02-27T20:47:36.164Z |
| CVE-2026-27587 |
7.7 (4.0)
|
Caddy: MatchPath %xx (escaped-path) branch skips case … |
caddyserver |
caddy |
2026-02-24T16:26:40.222Z | 2026-02-27T20:48:09.775Z |
| CVE-2026-27586 |
8.8 (4.0)
|
Caddy's mTLS client authentication silently fails open… |
caddyserver |
caddy |
2026-02-24T16:08:20.569Z | 2026-02-26T20:56:20.526Z |
| CVE-2026-27585 |
6.9 (4.0)
|
Caddy's improper sanitization of glob characters in fi… |
caddyserver |
caddy |
2026-02-24T16:06:05.030Z | 2026-02-26T21:17:36.422Z |
| CVE-2026-27571 |
5.9 (3.1)
|
nats-server websockets are vulnerable to pre-auth memory DoS |
nats-io |
nats-server |
2026-02-24T15:59:17.926Z | 2026-02-26T21:33:40.372Z |
| CVE-2025-13776 |
8.6 (4.0)
|
Hard-coded database credentials in Finka software |
TIK-SOFT |
Finka-FK |
2026-02-24T15:58:30.096Z | 2026-02-26T19:49:53.565Z |
| CVE-2025-47904 |
5.7 (4.0)
|
Unsigned upgrade package |
Microchip |
Time Provider 4100 |
2026-02-24T15:34:20.905Z | 2026-02-26T19:53:24.404Z |
| CVE-2026-27521 |
6.9 (4.0)
6.5 (3.1)
|
Binardat 10G08-0800GSM Network Switch Missing Login Ra… |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:08:14.170Z | 2026-02-26T21:19:50.599Z |
| CVE-2026-27520 |
8.7 (4.0)
7.5 (3.1)
|
Binardat 10G08-0800GSM Network Switch Base64-encoded P… |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:07:41.085Z | 2026-02-26T21:28:10.307Z |
| CVE-2026-27519 |
8.7 (4.0)
7.5 (3.1)
|
Binardat 10G08-0800GSM Network Switch Hard-coded RC4 E… |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:07:10.410Z | 2026-02-27T16:27:19.626Z |
| CVE-2026-27518 |
5.1 (4.0)
4.3 (3.1)
|
Binardat 10G08-0800GSM Network Switch CSRF |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:06:39.513Z | 2026-02-27T16:27:58.158Z |
| CVE-2026-27517 |
5.1 (4.0)
5.4 (3.1)
|
Binardat 10G08-0800GSM Network Switch XSS |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:06:08.974Z | 2026-02-26T18:27:12.209Z |
| CVE-2026-27516 |
8.6 (4.0)
8.1 (3.1)
|
Binardat 10G08-0800GSM Network Switch Plaintext Passwo… |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:05:12.384Z | 2026-02-26T19:45:40.975Z |
| CVE-2026-27515 |
9.3 (4.0)
9.1 (3.1)
|
Binardat 10G08-0800GSM Network Switch Predictable Sess… |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:04:41.427Z | 2026-02-27T18:58:38.289Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-25882 |
5.5 (4.0)
|
Fiber has a Denial of Service Vulnerability via Route … |
gofiber |
fiber |
2026-02-24T21:05:28.211Z | 2026-02-24T21:39:51.170Z |
| CVE-2026-24443 |
8.6 (4.0)
|
EventSentry < 6.0.1.20 Web Reports Unverified Password… |
NETIKUS.NET ltd |
EventSentry |
2026-02-24T20:14:44.688Z | 2026-02-24T21:40:48.632Z |
| CVE-2026-22553 |
9.8 (3.1)
9.3 (4.0)
|
InSAT MasterSCADA BUK-TS OS Command Injection |
InSAT |
MasterSCADA BUK-TS |
2026-02-24T20:56:14.099Z | 2026-02-26T19:39:01.753Z |
| CVE-2026-21410 |
9.8 (3.1)
9.3 (4.0)
|
InSAT MasterSCADA BUK-TS SQL Injection |
InSAT |
MasterSCADA BUK-TS |
2026-02-24T20:53:55.150Z | 2026-02-26T19:41:40.457Z |
| CVE-2025-46320 |
6.1 (3.1)
|
A cross-site scripting (XSS) vulnerability in a F… |
Claris |
FileMaker Server |
2026-02-24T20:30:26.139Z | 2026-02-24T21:19:06.285Z |
| CVE-2026-3131 |
6.5 (3.1)
|
Improper access control in multiple DVLS REST AP… |
Devolutions |
Server |
2026-02-24T19:01:29.096Z | 2026-02-26T16:09:13.047Z |
| CVE-2026-3105 |
7.6 (3.1)
|
SQL Injection in Contact Activity API Sorting |
Mautic |
Mautic |
2026-02-24T18:39:03.352Z | 2026-02-26T20:07:06.187Z |
| CVE-2026-27477 |
4.6 (4.0)
|
Mastodon has SSRF via unvalidated FASP Provider base_url |
mastodon |
mastodon |
2026-02-24T19:00:20.590Z | 2026-02-26T19:29:12.052Z |
| CVE-2026-26342 |
8.7 (4.0)
|
Tattile Smart+ / Vega / Basic <= 1.181.5 Insufficient … |
Tattile s.r.l. |
Smart+ |
2026-02-24T18:41:09.935Z | 2026-02-26T19:58:40.958Z |
| CVE-2026-26341 |
9.3 (4.0)
|
Tattile Smart+ / Vega / Basic <= 1.181.5 Default Credentials |
Tattile s.r.l. |
Smart+ |
2026-02-24T18:40:54.212Z | 2026-02-24T21:33:18.810Z |
| CVE-2026-26340 |
8.7 (4.0)
|
Tattile Smart+ / Vega / Basic <= 1.181.5 Unauthenticat… |
Tattile s.r.l. |
Smart+ |
2026-02-24T18:40:35.393Z | 2026-02-24T21:34:06.523Z |
| CVE-2026-24241 |
4.3 (3.1)
|
NVIDIA Delegated Licensing Service for all applia… |
NVIDIA |
DLS component of NVIDIA License System |
2026-02-24T18:42:56.703Z | 2026-02-24T21:26:40.416Z |
| CVE-2026-23859 |
2.7 (3.1)
|
Dell Wyse Management Suite, versions prior to WMS… |
Dell |
Wyse Management Suite |
2026-02-24T19:35:02.937Z | 2026-02-24T21:41:09.368Z |
| CVE-2026-23858 |
5.4 (3.1)
|
Dell Wyse Management Suite, versions prior to WMS… |
Dell |
Wyse Management Suite |
2026-02-24T19:31:31.325Z | 2026-02-24T21:45:53.723Z |
| CVE-2026-22766 |
7.2 (3.1)
|
Dell Wyse Management Suite, versions prior to WMS… |
Dell |
Wyse Management Suite |
2026-02-24T19:28:14.566Z | 2026-02-26T14:44:07.365Z |
| CVE-2026-22765 |
8.8 (3.1)
|
Dell Wyse Management Suite, versions prior to WMS… |
Dell |
Wyse Management Suite |
2026-02-24T19:24:21.497Z | 2026-02-26T14:44:07.504Z |
| CVE-2026-1768 |
4.3 (3.1)
|
A permission cache poisoning vulnerability in Dev… |
Devolutions |
Devolutions Server |
2026-02-24T19:01:07.640Z | 2026-02-26T16:12:31.144Z |
| CVE-2025-33181 |
7.3 (3.1)
|
NVIDIA Cumulus Linux and NVOS products contain a … |
NVIDIA |
Cumulus Linux GA |
2026-02-24T18:42:04.490Z | 2026-02-24T21:29:14.387Z |
| CVE-2025-33180 |
8 (3.1)
|
NVIDIA Cumulus Linux and NVOS products contain a … |
NVIDIA |
Cumulus Linux GA |
2026-02-24T18:41:48.632Z | 2026-02-24T21:31:41.482Z |
| CVE-2025-33179 |
8 (3.1)
|
NVIDIA Cumulus Linux and NVOS products contain a … |
NVIDIA |
Cumulus Linux GA |
2026-02-24T18:41:32.821Z | 2026-02-26T19:31:35.173Z |
| CVE-2025-1789 |
5.8 (4.0)
|
Local privilege escalation in Genetec Update Serv… |
Genetec Inc. |
Genetec Update Service |
2026-02-24T18:47:24.913Z | 2026-02-26T14:44:07.658Z |
| CVE-2025-1787 |
5.8 (4.0)
|
Local admin could to leak information from the Ge… |
Genetec Inc. |
Genetec Update Service |
2026-02-24T18:44:36.705Z | 2026-02-26T14:44:07.839Z |
| CVE-2026-27468 |
4.8 (4.0)
|
Mastodon may allow unconfirmed FASP to make subscriptions |
mastodon |
mastodon |
2026-02-24T17:12:40.349Z | 2026-02-27T20:50:52.856Z |
| CVE-2026-27156 |
6.1 (3.1)
|
NiceGUI has XSS via Code Injection |
zauberzeug |
nicegui |
2026-02-24T17:00:21.628Z | 2026-02-26T21:33:40.507Z |
| CVE-2026-26222 |
10 (4.0)
|
DocLink .NET Remoting Unauthenticated Arbitrary File R… |
Beyond Limits Inc. |
Altec DocLink |
2026-02-24T17:33:12.136Z | 2026-02-27T20:53:32.186Z |
| CVE-2026-25603 |
6.6 (3.1)
|
Path Traversal vulnerability in Linksys MR9600, Linksy… |
Linksys |
MR9600 |
2026-02-24T17:14:36.141Z | 2026-02-24T18:13:33.449Z |
| CVE-2025-62512 |
5.5 (4.0)
|
Piwigo Vulnerable to User Enumeration via Password Res… |
Piwigo |
Piwigo |
2026-02-24T16:43:28.919Z | 2026-02-27T20:52:30.148Z |
| CVE-2025-14963 |
6.2 (4.0)
|
A vulnerability identified in the HX Agent driver… |
Trellix |
Endpoint HX Agent (xAgent) |
2026-02-24T17:11:06.812Z | 2026-02-26T14:44:08.034Z |
| CVE-2026-27590 |
8.9 (4.0)
|
Caddy: Unicode case-folding length expansion causes in… |
caddyserver |
caddy |
2026-02-24T16:33:41.353Z | 2026-02-27T20:52:00.327Z |
| CVE-2026-27589 |
6.9 (4.0)
|
Caddy vulnerable to cross-origin config application vi… |
caddyserver |
caddy |
2026-02-24T16:30:52.016Z | 2026-02-27T20:51:24.110Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-v2vh-hr2h-f29r |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in DataLinkDC dinky up to 1.2.5. The impacted element is the function pro… | 2026-02-24T03:30:20Z | 2026-02-24T03:30:20Z |
| ghsa-qhmq-843h-9vq8 |
4.9 (3.1)
|
A null pointer dereference vulnerability in the IP settings CGI program of the Zyxel VMG3625-T50B f… | 2026-02-24T03:30:20Z | 2026-02-24T03:30:20Z |
| ghsa-mg73-f2jm-wph7 |
8.8 (3.1)
|
A post-authentication command injection vulnerability in the log file download function of the Zyxe… | 2026-02-24T03:30:20Z | 2026-02-24T03:30:20Z |
| ghsa-m8fj-fqgq-fj22 |
4.9 (3.1)
|
A null pointer dereference vulnerability in the Wake-on-LAN CGI program of the Zyxel VMG3625-T50B f… | 2026-02-24T03:30:20Z | 2026-02-24T03:30:20Z |
| ghsa-fj46-cfm8-7pc4 |
6.7 (3.1)
|
An uncontrolled search path element vulnerability in Synology Presto Client before 2.1.3-0672 allow… | 2026-02-24T03:30:20Z | 2026-02-24T03:30:20Z |
| ghsa-934v-v4wh-rf2c |
9.8 (3.1)
|
A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions thr… | 2026-02-24T03:30:20Z | 2026-02-24T03:30:20Z |
| ghsa-47ph-5j6m-fmgx |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in Alinto SOGo 5.12.3/5.12.4. This impacts an unknown function. The … | 2026-02-24T03:30:20Z | 2026-02-24T03:30:20Z |
| ghsa-38jp-gj76-pm7x |
6.3 (3.1)
2.1 (4.0)
|
A security vulnerability has been detected in HummerRisk up to 1.5.0. Affected by this issue is som… | 2026-02-24T03:30:20Z | 2026-02-24T03:30:20Z |
| ghsa-vv96-h3xf-q33j |
3.5 (3.1)
2.0 (4.0)
|
A flaw has been found in horilla-opensource horilla up to 1.0.2. Impacted is an unknown function of… | 2026-02-24T03:30:19Z | 2026-02-24T03:30:19Z |
| ghsa-r8mv-7fwh-cfvr |
4.9 (3.1)
|
A null pointer dereference vulnerability in the account settings CGI program of the Zyxel VMG3625-T… | 2026-02-24T03:30:19Z | 2026-02-24T03:30:19Z |
| ghsa-f256-j3x2-h7wh |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in DataLinkDC dinky up to 1.2.5. The affected element is the functio… | 2026-02-24T03:30:19Z | 2026-02-24T03:30:19Z |
| ghsa-cqj6-j4f4-mcpp |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was detected in horilla-opensource horilla up to 1.0.2. This issue affects the func… | 2026-02-24T03:30:19Z | 2026-02-24T03:30:19Z |
| ghsa-7w2h-4285-9pwr |
8.6 (4.0)
|
Improper Control of Generation of Code ('Code Injection') vulnerability in OpenText™ Carbonite Safe… | 2026-02-24T03:30:19Z | 2026-02-24T03:30:19Z |
| ghsa-57jm-2xq8-jwj3 |
7.3 (3.1)
5.5 (4.0)
|
A security vulnerability has been detected in itsourcecode E-Logbook with Health Monitoring System … | 2026-02-24T03:30:19Z | 2026-02-24T03:30:19Z |
| ghsa-2fmw-p7gw-97jj |
4.9 (3.1)
|
A null pointer dereference vulnerability in the certificate downloader CGI program of the Zyxel VMG… | 2026-02-24T03:30:19Z | 2026-02-24T03:30:19Z |
| ghsa-vmmw-c3hw-gvm3 |
9.8 (3.1)
|
Out of bounds read and write in Tint in Google Chrome on Mac prior to 145.0.7632.116 allowed a remo… | 2026-02-24T00:31:34Z | 2026-02-25T15:31:37Z |
| ghsa-rg2h-mq39-66pf |
4.3 (3.1)
2.1 (4.0)
|
A flaw has been found in itsourcecode Event Management System 1.0. The impacted element is an unkno… | 2026-02-24T00:31:34Z | 2026-02-24T00:31:34Z |
| ghsa-qvmx-rqmx-pvfg |
9.1 (3.1)
|
Out of bounds read in Media in Google Chrome prior to 145.0.7632.116 allowed a remote attacker to p… | 2026-02-24T00:31:34Z | 2026-02-25T15:31:37Z |
| ghsa-h68v-wm52-cjcj |
7.7 (4.0)
|
The Print Service component of Fiserv Originate Loans Peripherals (formerly Velocity Services) in u… | 2026-02-24T00:31:34Z | 2026-02-24T00:31:34Z |
| ghsa-972x-fv77-xf59 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was detected in itsourcecode Event Management System 1.0. The affected element is a… | 2026-02-24T00:31:34Z | 2026-02-24T00:31:34Z |
| ghsa-6hhh-7cj8-7mp2 |
9.1 (3.1)
|
Smolder versions through 1.51 for Perl uses insecure rand() function for cryptographic functions. … | 2026-02-24T00:31:34Z | 2026-02-24T18:31:01Z |
| ghsa-3m9c-j7xc-gc2c |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability has been found in Tenda AC8 16.03.34.06. This affects the function webCgiGetUploadF… | 2026-02-24T00:31:34Z | 2026-02-24T00:31:34Z |
| ghsa-33jq-j95r-2gpj |
5.4 (3.1)
|
Inappropriate implementation in DevTools in Google Chrome prior to 145.0.7632.116 allowed an attack… | 2026-02-24T00:31:34Z | 2026-02-25T15:31:37Z |
| ghsa-xw6c-ffpm-fgcm |
4.3 (3.1)
5.1 (4.0)
|
Bludit version 3.16.1 contains a cross-site request forgery (CSRF) vulnerability in the /admin/unin… | 2026-02-24T00:31:33Z | 2026-02-24T00:31:33Z |
| ghsa-wg93-hp69-vv5w |
5.4 (3.1)
5.1 (4.0)
|
Bludit version 3.16.2 contains a stored cross-site scripting (XSS) vulnerability in the post conten… | 2026-02-24T00:31:33Z | 2026-02-24T00:31:33Z |
| ghsa-pqpv-94jx-68vg |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in erzhongxmu JEEWMS up to 3.7. This vulnerability affects the funct… | 2026-02-24T00:31:33Z | 2026-02-24T00:31:33Z |
| ghsa-9xx2-jmjv-w5vp |
4.7 (3.1)
2.0 (4.0)
|
A vulnerability was identified in DrayTek Vigor 300B up to 1.5.1.6. This affects the function cgiGe… | 2026-02-24T00:31:33Z | 2026-02-24T00:31:33Z |
| ghsa-34rh-x3gg-rqg4 |
2.4 (3.1)
1.9 (4.0)
|
A security vulnerability has been detected in xingfuggz BaykeShop up to 1.3.20. Impacted is an unkn… | 2026-02-24T00:31:33Z | 2026-02-24T00:31:34Z |
| ghsa-6fx5-5cw5-4897 |
6.9 (4.0)
|
Craft CMS Race condition in Token Service potentially allows for token usage greater than the token limit | 2026-02-23T22:16:22Z | 2026-02-24T16:08:48Z |
| ghsa-gp2f-7wcm-5fhx |
7.0 (4.0)
|
Craft CMS has Cloud Metadata SSRF Protection Bypass via DNS Rebinding | 2026-02-23T22:16:01Z | 2026-02-27T21:49:23Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-42994 |
|
GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to 0.1.5 are v… | guarddog | 2022-12-17T00:15:00Z | 2023-05-04T04:29:25.595529Z |
| pysec-2022-42993 |
|
GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to v0.1.8 are … | guarddog | 2022-12-16T23:15:00Z | 2023-05-04T04:29:25.550921Z |
| pysec-2022-43061 |
6.1 (3.1)
|
A vulnerability was found in django-photologue up to 3.15.1 and classified as problematic… | django-photologue | 2022-12-15T21:15:00+00:00 | 2023-11-07T20:24:24.147635+00:00 |
| pysec-2022-42990 |
|
A vulnerability was found in collective.task up to 3.0.9. It has been classified as probl… | collective-task | 2022-12-15T21:15:00Z | 2023-05-04T04:29:24.403566Z |
| pysec-2022-43060 |
5.9 (3.1)
|
The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the conn… | apache-bookkeeper-client | 2022-12-15T19:15:00+00:00 | 2023-11-07T20:24:23.853507+00:00 |
| pysec-2022-42989 |
|
A vulnerability, which was classified as problematic, has been found in collective.dms.ba… | collective-dms-basecontent | 2022-12-14T15:15:00Z | 2023-05-04T03:49:45.138352Z |
| pysec-2022-43155 |
5.5 (3.1)
|
wasm3 commit 7890a2097569fde845881e0b352d813573e371f9 was discovered to contain a segment… | pywasm3 | 2022-12-13T23:15:00Z | 2024-11-21T14:23:00.213494Z |
| pysec-2022-43062 |
7.8 (3.1)
|
A vulnerability classified as problematic was found in pacparser up to 1.3.x. Affected by… | pacparser | 2022-12-13T18:15:00+00:00 | 2023-11-07T20:24:25.809231+00:00 |
| pysec-2022-43002 |
|
Improper Privilege Management in GitHub repository ikus060/rdiffweb prior to 2.5.2. | rdiffweb | 2022-12-12T18:15:00Z | 2023-05-04T04:29:29.006053Z |
| pysec-2022-43011 |
|
Sentry is an error tracking and performance monitoring platform. In versions of the sentr… | sentry | 2022-12-10T01:15:00Z | 2023-05-04T04:29:29.699170Z |
| pysec-2022-42986 |
|
Certifi is a curated collection of Root Certificates for validating the trustworthiness o… | certifi | 2022-12-07T22:15:00Z | 2023-05-04T03:49:45.039819Z |
| pysec-2022-43063 |
9.8 (3.1)
|
Code injection in paddle.audio.functional.get_window in PaddlePaddle 2.4.0-rc0 allows arb… | paddlepaddle | 2022-12-07T09:15:00+00:00 | 2024-11-22T12:27:25.862098+00:00 |
| pysec-2022-42998 |
|
A directory traversal vulnerability in the SevenZipFile.extractall() function of the pyth… | py7zr | 2022-12-06T20:15:00Z | 2023-05-04T04:29:28.497759Z |
| pysec-2022-42997 |
|
Passeo is an open source python password generator. Versions prior to 1.0.5 rely on the p… | passeo | 2022-12-06T18:15:00Z | 2023-05-04T04:29:27.942516Z |
| pysec-2022-42992 |
|
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to im… | gitpython | 2022-12-06T05:15:00Z | 2023-05-04T03:49:45.777062Z |
| pysec-2022-43175 |
6.1 (3.1)
|
Drag and Drop XBlock v2 implements a drag-and-drop style problem, where a learner has to … | xblock-drag-and-drop-v2 | 2022-11-28T21:15:00+00:00 | 2024-11-21T14:23:03.352390+00:00 |
| pysec-2022-43015 |
|
In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary … | torch | 2022-11-26T02:15:00Z | 2023-05-04T03:49:48.383740Z |
| pysec-2022-42996 |
|
MPXJ is an open source library to read and write project plans from a variety of file for… | mpxj | 2022-11-25T19:15:00Z | 2023-05-04T04:29:27.436392Z |
| pysec-2022-42995 |
|
A vulnerability was found in keylime. This security issue happens in some circumstances, … | keylime | 2022-11-22T19:15:00Z | 2023-05-04T04:29:25.773897Z |
| pysec-2022-42987 |
|
CKAN through 2.9.6 account takeovers by unauthenticated users when an existing user id is… | ckan | 2022-11-22T01:15:00Z | 2023-05-04T04:29:23.890366Z |
| pysec-2022-43140 |
6.5 (3.1)
|
A heap buffer overflow in the LIEF::MachO::BinaryParser::parse_dyldinfo_generic_bind func… | lief | 2022-11-17T23:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43001 |
|
Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior … | rdiffweb | 2022-11-16T13:15:00Z | 2023-05-04T04:29:28.960174Z |
| pysec-2022-42984 |
|
In Apache Airflow versions prior to 2.4.3, there was an open redirect in the webserver's … | apache-airflow | 2022-11-15T09:15:00Z | 2023-05-04T04:29:22.748527Z |
| pysec-2022-43000 |
|
Insufficient Session Expiration in GitHub repository ikus060/rdiffweb prior to 2.5.0. | rdiffweb | 2022-11-14T21:15:00Z | 2023-05-04T04:29:28.911542Z |
| pysec-2022-42982 |
|
A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who c… | apache-airflow | 2022-11-14T10:15:00Z | 2023-05-04T04:29:22.645854Z |
| pysec-2022-42981 |
|
A vulnerability in UI of Apache Airflow allows an attacker to view unmasked secrets in re… | apache-airflow | 2022-11-14T10:15:00Z | 2023-05-04T04:29:22.592547Z |
| pysec-2022-42980 |
|
Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL. | pillow | 2022-11-14T07:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-42979 |
|
Pillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplif… | pillow | 2022-11-14T07:15:00Z | 2022-11-14T11:29:25.508491Z |
| pysec-2022-43055 |
7.5 (3.1)
|
Hyperledger Fabric 2.3 allows attackers to cause a denial of service (orderer crash) by r… | hyperledger | 2022-11-12T20:15:00+00:00 | 2023-08-17T03:22:31.453589+00:00 |
| pysec-2022-43018 |
|
WsgiDAV is a generic and extendable WebDAV server based on WSGI. Implementations using th… | wsgidav | 2022-11-11T21:15:00Z | 2023-05-04T04:29:31.369774Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-452 | Malicious code in @brl-laiwb/ng-laiwb-api (npm) | 2026-01-22T09:07:19Z | 2026-01-23T01:38:58Z |
| mal-2026-451 | Malicious code in @alluxio/common-ui (npm) | 2026-01-22T09:07:19Z | 2026-01-23T01:38:58Z |
| mal-2026-458 | Malicious code in csv-parsing-xz (npm) | 2026-01-22T09:02:30Z | 2026-01-23T01:38:59Z |
| mal-2026-457 | Malicious code in csv-parsing-xx (npm) | 2026-01-22T09:02:29Z | 2026-01-23T01:38:59Z |
| mal-2026-450 | Malicious code in sympy-dev (PyPI) | 2026-01-22T08:18:08Z | 2026-01-22T08:18:08Z |
| mal-2026-448 | Malicious code in rank253222 (npm) | 2026-01-22T07:50:51Z | 2026-01-23T01:39:03Z |
| mal-2026-449 | Malicious code in icloudprocessor (PyPI) | 2026-01-22T07:31:50Z | 2026-01-22T07:31:50Z |
| mal-2026-447 | Malicious code in ttam-ploy (PyPI) | 2026-01-21T20:49:21Z | 2026-01-21T20:58:30Z |
| mal-2026-445 | Malicious code in code-transfering-3 (PyPI) | 2026-01-21T20:21:24Z | 2026-01-21T20:21:24Z |
| mal-2026-446 | Malicious code in code-transfering-4 (PyPI) | 2026-01-21T20:20:41Z | 2026-01-21T20:20:41Z |
| mal-2026-444 | Malicious code in terminalbrush (PyPI) | 2026-01-21T19:31:32Z | 2026-01-21T19:31:32Z |
| mal-2026-443 | Malicious code in 1q847 (PyPI) | 2026-01-21T18:25:06Z | 2026-01-21T18:25:06Z |
| mal-2026-442 | Malicious code in xadauiom (PyPI) | 2026-01-21T11:36:46Z | 2026-01-21T11:40:59Z |
| mal-2026-440 | Malicious code in anduril-lattice-sdk-grpc-python (PyPI) | 2026-01-21T08:18:39Z | 2026-01-21T08:18:39Z |
| mal-2026-441 | Malicious code in spellcheckpy (PyPI) | 2026-01-21T08:10:26Z | 2026-01-28T19:13:29Z |
| mal-2026-439 | Malicious code in tv-admin-commons (npm) | 2026-01-21T07:40:29Z | 2026-01-23T01:39:04Z |
| mal-2026-438 | Malicious code in ts-tweetnacl-utils (npm) | 2026-01-21T07:37:23Z | 2026-01-23T01:39:04Z |
| mal-2026-437 | Malicious code in lumo-api-client (npm) | 2026-01-21T07:13:50Z | 2026-01-23T01:39:02Z |
| mal-2026-436 | Malicious code in jquery-ajaxchimp (npm) | 2026-01-21T07:13:50Z | 2026-01-23T01:39:01Z |
| mal-2026-435 | Malicious code in aligntype (npm) | 2026-01-21T06:49:59Z | 2026-01-23T01:38:59Z |
| mal-2026-409 | Malicious code in chai-async-test (npm) | 2026-01-21T04:51:11Z | 2026-01-23T01:38:59Z |
| mal-2026-415 | Malicious code in dotenv-expanded (npm) | 2026-01-21T04:51:10Z | 2026-01-23T01:39:00Z |
| mal-2026-434 | Malicious code in weaviate-js (npm) | 2026-01-21T04:49:30Z | 2026-01-23T01:39:05Z |
| mal-2026-427 | Malicious code in replicate-js (npm) | 2026-01-21T04:49:30Z | 2026-01-23T01:39:03Z |
| mal-2026-426 | Malicious code in qdrant-js (npm) | 2026-01-21T04:49:30Z | 2026-01-23T01:39:03Z |
| mal-2026-430 | Malicious code in storage-types (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:39:04Z |
| mal-2026-425 | Malicious code in plugin-vue (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:39:03Z |
| mal-2026-424 | Malicious code in plugin-react-swc (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:39:03Z |
| mal-2026-418 | Malicious code in nanoid-js (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:39:02Z |
| mal-2026-407 | Malicious code in babel-js (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:38:59Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2401 | Keycloak: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-10-23T22:00:00.000+00:00 | 2025-11-13T23:00:00.000+00:00 |
| wid-sec-w-2025-2400 | Red Hat Build von Apache Camel für Quarkus: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-10-23T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2399 | IBM App Connect Enterprise: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-10-23T22:00:00.000+00:00 | 2025-10-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2398 | Moxa Switch: Mehrere Schwachstellen | 2025-10-23T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2397 | Liferay Portal und DXP: Mehrere Schwachstellen | 2025-10-23T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2396 | Hashicorp Vault: Mehrere Schwachstellen | 2025-10-23T22:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2025-2395 | Rancher Manager: Mehrere Schwachstellen | 2025-10-23T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2394 | Linux Kernel: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2393 | Liferay Portal: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2025-10-22T22:00:00.000+00:00 |
| wid-sec-w-2025-2392 | Internet Systems Consortium BIND: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-2391 | OpenBao: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2025-10-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2390 | PowerDNS Recursor: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-10-22T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2389 | FreeBSD Project FreeBSD OS (netinet): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-10-22T22:00:00.000+00:00 | 2025-10-22T22:00:00.000+00:00 |
| wid-sec-w-2025-2388 | MongoDB: Schwachstelle ermöglicht Privilegieneskalation | 2025-10-22T22:00:00.000+00:00 | 2025-10-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2387 | Devolutions Server: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2025-10-22T22:00:00.000+00:00 |
| wid-sec-w-2025-2386 | Unbound: Schwachstelle ermöglicht Manipulation von Dateien | 2025-10-22T22:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-2385 | Drupal Module: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2383 | Zoho ManageEngine Endpoint Central: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| wid-sec-w-2025-2382 | Synacor Zimbra: Schwachstelle ermöglicht Manipulation von Dateien | 2025-10-21T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| wid-sec-w-2025-2381 | MediaWiki: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2025-10-22T22:00:00.000+00:00 |
| wid-sec-w-2025-2380 | Xen: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2379 | Dell BIOS: Schwachstelle ermöglicht Manipulation von Daten | 2025-10-21T22:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2025-2378 | Atlassian Confluence: Schwachstelle ermöglicht Denial of Service | 2025-10-21T22:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2377 | Atlassian Jira: Schwachstelle ermöglicht Manipulation von Dateien | 2025-10-21T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| wid-sec-w-2025-2376 | GitLab: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2025-10-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2375 | Google Chrome: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-10-21T22:00:00.000+00:00 | 2025-11-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2374 | Liferay Portal und DXP: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| wid-sec-w-2025-2373 | Oracle Retail Applications: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| wid-sec-w-2025-2372 | Oracle Siebel CRM: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| wid-sec-w-2025-2371 | Oracle Supply Chain: Schwachstelle gefährdet Verfügbarkeit | 2025-10-21T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0296 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2024-07-17T13:53:28.440252Z | 2024-07-17T13:53:28.440252Z |
| ncsc-2024-0295 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2024-07-17T13:53:22.662201Z | 2024-07-17T13:53:22.662201Z |
| ncsc-2024-0294 | Kwetsbaarheden verholpen in Oracle Communications | 2024-07-17T13:52:53.293003Z | 2024-07-17T13:52:53.293003Z |
| ncsc-2024-0293 | Kwetsbaarheden verholpen in Oracle Communications Applications | 2024-07-17T13:52:33.045762Z | 2024-07-17T13:52:33.045762Z |
| ncsc-2024-0292 | Kwetsbaarheden verholpen in Oracle Essbase | 2024-07-17T13:52:18.885359Z | 2024-07-17T13:52:18.885359Z |
| ncsc-2024-0291 | Kwetsbaarheden verholpen in Oracle Database Server | 2024-07-17T13:51:54.185475Z | 2024-07-17T13:51:54.185475Z |
| ncsc-2024-0290 | Kwetsbaarheden verholpen in Juniper Junos OS en Junos OS Evolved | 2024-07-12T11:43:27.625950Z | 2024-07-12T11:43:27.625950Z |
| ncsc-2024-0289 | Kwetsbaarheid verholpen in GitLab CE/EE | 2024-07-11T08:22:44.417794Z | 2024-07-11T08:22:44.417794Z |
| ncsc-2024-0288 | Kwetsbaarheden verholpen in Citrix Workspace, NetScaler ADC en NetScaler Gateway | 2024-07-10T13:54:21.933605Z | 2024-07-11T15:05:36.608570Z |
| ncsc-2024-0287 | Kwetsbaarheden verholpen in Fortinet | 2024-07-10T08:27:35.622919Z | 2024-07-10T08:27:35.622919Z |
| ncsc-2024-0286 | Kwetsbaarheid verholpen in Microsoft System Center Defender for IoT | 2024-07-09T19:39:17.911628Z | 2024-07-09T19:39:17.911628Z |
| ncsc-2024-0285 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-07-09T19:38:21.052004Z | 2024-07-09T19:38:21.052004Z |
| ncsc-2024-0284 | Kwetsbaarheden verholpen in Microsoft Office | 2024-07-09T19:37:26.015768Z | 2024-07-09T19:37:26.015768Z |
| ncsc-2024-0283 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-07-09T18:46:27.237285Z | 2024-07-09T18:46:27.237285Z |
| ncsc-2024-0282 | Kwetsbaarheden verholpen in Siemens Producten | 2024-07-09T18:40:57.534939Z | 2024-07-09T18:40:57.534939Z |
| ncsc-2024-0281 | Kwetsbaarheden verholpen in Microsoft Windows SQL Server | 2024-07-09T18:40:47.989197Z | 2024-07-09T18:40:47.989197Z |
| ncsc-2024-0280 | Kwetsbaarheid verholpen in Microsoft Dynamics | 2024-07-09T18:40:31.321704Z | 2024-07-09T18:40:31.321704Z |
| ncsc-2024-0279 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-07-09T18:40:21.043319Z | 2024-07-09T18:40:21.043319Z |
| ncsc-2024-0278 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-07-03T07:21:50.013074Z | 2024-07-03T07:21:50.013074Z |
| ncsc-2024-0277 | Kwetsbaarheid verholpen in Juniper JunOS | 2024-07-03T07:16:21.498075Z | 2024-07-03T07:16:21.498075Z |
| ncsc-2024-0276 | Kwetsbaarheden verholpen in Splunk | 2024-07-02T13:15:06.374293Z | 2024-07-02T13:15:06.374293Z |
| ncsc-2024-0275 | Kwetsbaarheden verholpen in Apache HHTP-server | 2024-07-02T11:44:22.653047Z | 2024-07-02T11:44:22.653047Z |
| ncsc-2024-0274 | Kwetsbaarheid verholpen in GeoServer | 2024-07-02T11:40:34.048090Z | 2024-07-05T09:41:10.197056Z |
| ncsc-2024-0273 | Kwetsbaarheden ontdekt in Kiloview P1 4G Video Encoder en P2 4G Video Encoder | 2024-07-02T07:04:39.395441Z | 2024-07-02T07:04:39.395441Z |
| ncsc-2024-0272 | Kwetsbaarheid verholpen in OpenSSH | 2024-07-01T12:21:57.127505Z | 2024-07-01T15:37:23.231069Z |
| ncsc-2024-0271 | Kwetsbaarheid verholpen in Juniper Session Smart Router | 2024-06-28T09:55:17.082602Z | 2024-06-28T09:55:17.082602Z |
| ncsc-2024-0270 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-06-27T13:09:06.950898Z | 2024-07-04T06:45:26.935999Z |
| ncsc-2024-0269 | Kwetsbaarheden verholpen in VMware ESXi en vCenter Server | 2024-06-26T09:02:10.988453Z | 2024-07-30T09:32:13.311694Z |
| ncsc-2024-0268 | Kwetsbaarheden verholpen in Progress WhatsUp Gold | 2024-06-26T07:43:11.795773Z | 2024-08-08T07:50:41.453544Z |
| ncsc-2024-0267 | Kwetsbaarheden verholpen in Progress MOVEit | 2024-06-26T07:27:55.195431Z | 2024-06-26T08:58:01.371553Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0454 | Red Hat Security Advisory: wireshark security update | 2026-01-12T10:50:54+00:00 | 2026-01-13T22:41:47+00:00 |
| rhsa-2026:0453 | Red Hat Security Advisory: kernel security update | 2026-01-12T09:30:19+00:00 | 2026-02-16T23:40:41+00:00 |
| rhsa-2026:0452 | Red Hat Security Advisory: wireshark security update | 2026-01-12T09:13:04+00:00 | 2026-01-13T22:41:47+00:00 |
| rhsa-2026:0445 | Red Hat Security Advisory: kernel security update | 2026-01-12T05:08:44+00:00 | 2026-02-16T23:40:41+00:00 |
| rhsa-2026:0431 | Red Hat Security Advisory: libssh security update | 2026-01-12T03:55:43+00:00 | 2026-02-05T19:39:45+00:00 |
| rhsa-2026:0437 | Red Hat Security Advisory: buildah security update | 2026-01-12T03:51:03+00:00 | 2026-02-17T07:22:49+00:00 |
| rhsa-2026:0432 | Red Hat Security Advisory: wireshark security update | 2026-01-12T03:46:43+00:00 | 2026-01-13T22:41:44+00:00 |
| rhsa-2026:0425 | Red Hat Security Advisory: runc security update | 2026-01-12T03:43:04+00:00 | 2026-02-17T12:41:09+00:00 |
| rhsa-2026:0444 | Red Hat Security Advisory: kernel security update | 2026-01-12T03:40:43+00:00 | 2026-02-16T23:40:41+00:00 |
| rhsa-2026:0426 | Red Hat Security Advisory: buildah security update | 2026-01-12T03:32:03+00:00 | 2026-02-17T12:41:09+00:00 |
| rhsa-2026:0422 | Red Hat Security Advisory: libsoup security update | 2026-01-12T02:53:33+00:00 | 2026-01-29T15:24:22+00:00 |
| rhsa-2026:0443 | Red Hat Security Advisory: kernel-rt security update | 2026-01-12T02:42:33+00:00 | 2026-02-16T23:40:41+00:00 |
| rhsa-2026:0435 | Red Hat Security Advisory: tar security update | 2026-01-12T02:39:28+00:00 | 2026-02-11T12:55:27+00:00 |
| rhsa-2026:0428 | Red Hat Security Advisory: libssh security update | 2026-01-12T02:35:33+00:00 | 2026-02-05T19:39:49+00:00 |
| rhsa-2026:0434 | Red Hat Security Advisory: tar security update | 2026-01-12T02:30:08+00:00 | 2026-02-11T12:55:30+00:00 |
| rhsa-2026:0424 | Red Hat Security Advisory: podman security update | 2026-01-12T02:26:08+00:00 | 2026-02-17T12:41:10+00:00 |
| rhsa-2026:0421 | Red Hat Security Advisory: libsoup security update | 2026-01-12T02:24:03+00:00 | 2026-01-29T15:24:21+00:00 |
| rhsa-2026:0427 | Red Hat Security Advisory: libssh security update | 2026-01-12T02:12:23+00:00 | 2026-02-05T19:39:54+00:00 |
| rhsa-2026:0430 | Red Hat Security Advisory: libssh security update | 2026-01-12T02:08:48+00:00 | 2026-02-05T19:39:47+00:00 |
| rhsa-2026:0436 | Red Hat Security Advisory: buildah security update | 2026-01-12T02:06:04+00:00 | 2026-02-17T07:22:49+00:00 |
| rhsa-2026:0429 | Red Hat Security Advisory: keylime security update | 2026-01-12T02:05:04+00:00 | 2026-01-13T22:41:43+00:00 |
| rhsa-2026:0433 | Red Hat Security Advisory: wireshark security update | 2026-01-12T02:00:34+00:00 | 2026-01-13T22:41:44+00:00 |
| rhsa-2026:0423 | Red Hat Security Advisory: libsoup3 security update | 2026-01-12T01:38:59+00:00 | 2026-01-29T15:24:20+00:00 |
| rhsa-2026:0304 | Red Hat Security Advisory: mariadb:10.3 security update | 2026-01-09T08:07:12+00:00 | 2026-01-15T16:00:56+00:00 |
| rhsa-2026:0414 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2026-01-08T22:34:17+00:00 | 2026-02-17T09:27:08+00:00 |
| rhsa-2026:0409 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2026-01-08T19:41:55+00:00 | 2026-02-17T09:57:37+00:00 |
| rhsa-2026:0408 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-01-08T19:38:23+00:00 | 2026-02-17T09:57:37+00:00 |
| rhsa-2026:0406 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Update | 2026-01-08T19:34:46+00:00 | 2026-02-17T09:57:37+00:00 |
| rhsa-2026:0384 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.1.3 security update | 2026-01-08T16:57:30+00:00 | 2026-02-09T14:32:20+00:00 |
| rhsa-2026:0383 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.1.3 security update | 2026-01-08T16:57:24+00:00 | 2026-02-09T14:32:20+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-291-04 | HMS Networks EWON FLEXY 202 | 2024-10-17T06:00:00.000000Z | 2024-10-17T06:00:00.000000Z |
| icsa-24-291-03 | Mitsubishi Electric CNC Series (Update C) | 2024-10-17T06:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-24-291-02 | LCDS LAquis SCADA | 2024-10-17T06:00:00.000000Z | 2024-10-17T06:00:00.000000Z |
| icsa-24-291-01 | Elvaco M-Bus Metering Gateway CMe3100 (Update A) | 2024-10-17T06:00:00.000000Z | 2024-11-14T07:00:00.000000Z |
| icsa-24-284-21 | Delta Electronics CNCSoft-G2 | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-284-20 | Rockwell Automation ControlLogix | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-284-19 | Rockwell Automation PowerFlex 6000T | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-284-18 | Rockwell Automation Logix Controllers | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-284-17 | Rockwell Automation Verve Asset Manager | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-284-16 | Rockwell Automation DataMosaix Private Cloud | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-284-15 | Rockwell Automation DataMosaix Private Cloud | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-284-14 | Schneider Electric Zelio Soft 2 | 2024-10-10T06:00:00.000000Z | 2024-10-10T06:00:00.000000Z |
| icsa-24-289-01 | Siemens Siveillance Video Camera | 2024-10-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-25-037-01 | Schneider Electric EcoStruxure Power Monitoring Expert (PME) (Update B) | 2024-10-08T04:00:00.000000Z | 2025-05-13T04:00:00.000000Z |
| icsa-25-030-03 | Schneider Electric System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-25-023-04 | Schneider Electric Easergy Studio | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-25-023-03 | Schneider Electric EVlink Home Smart and Schneider Charge | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-25-016-08 | Schneider Electric Data Center Expert | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-24-289-02 | Schneider Electric Data Center Expert | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-24-284-13 | Siemens Tecnomatix Plant Simulation | 2024-10-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-284-12 | Siemens Sentron Powercenter 1000 | 2024-10-08T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-24-284-11 | Siemens RUGGEDCOM APE1808 | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-24-284-10 | Siemens SIMATIC S7-1500 CPUs | 2024-10-08T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-24-284-09 | Siemens PSS SINCAL | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-24-284-08 | Siemens HiMed Cockpit | 2024-10-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-284-07 | Siemens JT2Go | 2024-10-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-284-06 | Siemens SINEC Security Monitor | 2024-10-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-284-05 | Siemens Questa and ModelSim | 2024-10-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-284-04 | Siemens SENTRON PAC3200 Devices | 2024-10-08T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-24-284-03 | Siemens Teamcenter Visualization and JT2Go | 2024-10-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-webui-cmdinj-gje47emn | Cisco IOS XE Software Web UI Command Injection Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ssh-excpt-dos-fzobqtnk | Cisco IOS and IOS XE Software SSH Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-sdwan-privesc-cli-xkgwmqku | Cisco SD-WAN Software Arbitrary File Corruption Vulnerability | 2022-09-28T16:00:00+00:00 | 2024-01-23T23:05:35+00:00 |
| cisco-sa-sdwan-avc-nddsgb8 | Cisco Software-Defined Application Visibility and Control on Cisco vManage Authentication Bypass Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-sdavc-za5fpxx2 | Cisco Software-Defined Application Visibility and Control on Cisco vManage Static Username and Password Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-sd-wan-priv-e6e8tedf | Cisco SD-WAN Software Privilege Escalation Vulnerabilities | 2022-09-28T16:00:00+00:00 | 2022-09-29T21:59:32+00:00 |
| cisco-sa-iosxe-mpls-dos-ab4oul3 | Cisco IOS XE Software for Catalyst Switches MPLS Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-info-disc-nrorxjo | Cisco IOS XE ROM Monitor Software for Catalyst Switches Information Disclosure Vulnerability | 2022-09-28T16:00:00+00:00 | 2023-05-17T18:23:37+00:00 |
| cisco-sa-iosxe-cip-dos-9rtbklt9 | Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-6vpe-dos-tjbtf5zv | Cisco IOS XE Software IPv6 VPN over MPLS Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ios-xe-cat-verify-d4neqa6q | Cisco IOS XE Software for Catalyst 9200 Series Switches Arbitrary Code Execution Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ewc-priv-esc-nderyltk | Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-duo-macos-bypass-ukznpxe6 | Cisco Duo for macOS Authentication Bypass Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-29T21:21:01+00:00 |
| cisco-sa-cwlc-snmpidv-rnyyqzuz | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Information Disclosure Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-c9800-mob-dos-342yac6j | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Mobility Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-arb-file-delete-vb2rvcqv | Cisco SD-WAN Arbitrary File Deletion Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ap-assoc-dos-egvqton8 | Cisco Catalyst 9100 Series Access Points Association Request Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-alg-dos-ku9z8kfx | Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-vu855201-j3z8cktx | Vulnerabilities in Layer 2 Network Security Controls Affecting Cisco Products: September 2022 | 2022-09-27T16:00:00+00:00 | 2022-10-05T18:16:08+00:00 |
| cisco-sa-apvlan-tdttb4fy | Cisco Access Points VLAN Bypass from Native VLAN Vulnerability | 2022-09-27T16:00:00+00:00 | 2022-10-04T13:22:46+00:00 |
| cisco-sa-xr-cdp-wnalzvt2 | Cisco IOS XR Software Cisco Discovery Protocol Denial of Service Vulnerability | 2022-09-14T16:00:00+00:00 | 2022-09-14T16:00:00+00:00 |
| cisco-sa-ncs4k-tl1-gnnlwc6 | Cisco Network Convergence System 4000 Series TL1 Denial of Service Vulnerability | 2022-09-14T16:00:00+00:00 | 2022-09-14T16:00:00+00:00 |
| cisco-sa-iosxr-bng-gmg5gxt | Cisco IOS XR Software Broadband Network Gateway PPP over Ethernet Denial of Service Vulnerability | 2022-09-14T16:00:00+00:00 | 2022-09-14T16:00:00+00:00 |
| cisco-sa-webex-app-qrto6yc2 | Cisco Webex Meetings App Character Interface Manipulation Vulnerability | 2022-09-07T16:00:00+00:00 | 2023-02-24T15:40:30+00:00 |
| cisco-sa-vmanage-msg-serv-aqtup7vs | Cisco SD-WAN vManage Software Unauthenticated Access to Messaging Services Vulnerability | 2022-09-07T16:00:00+00:00 | 2022-09-27T21:40:31+00:00 |
| cisco-sa-sb-rv-vpnbypass-cpheup9o | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers IPSec VPN Server Authentication Bypass Vulnerability | 2022-09-07T16:00:00+00:00 | 2022-09-07T16:00:00+00:00 |
| cisco-sa-mlx5-jbpcrqd8 | Vulnerability in NVIDIA Data Plane Development Kit Affecting Cisco Products: August 2022 | 2022-09-07T16:00:00+00:00 | 2022-09-07T16:00:00+00:00 |
| cisco-sa-meraki-config-ab3da | Cisco Meraki MR Series Splash Page Insecure Configuration Option | 2022-09-07T16:00:00+00:00 | 2022-09-07T16:00:00+00:00 |
| cisco-sa-nxos-ospfv3-dos-48qutcu | Cisco NX-OS Software OSPFv3 Denial of Service Vulnerability | 2022-08-24T16:00:00+00:00 | 2022-08-24T16:00:00+00:00 |
| cisco-sa-nxos-cdp-dos-ce-wwvpucc9 | Cisco FXOS and NX-OS Software Cisco Discovery Protocol Denial of Service and Arbitrary Code Execution Vulnerability | 2022-08-24T16:00:00+00:00 | 2022-08-24T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-40308 | Bluetooth: bcsp: receive data only if registered | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:38.000Z |
| msrc_cve-2025-40307 | exfat: validate cluster allocation bits of the allocation bitmap | 2025-12-02T00:00:00.000Z | 2025-12-09T01:01:26.000Z |
| msrc_cve-2025-40306 | orangefs: fix xattr related buffer overflow... | 2025-12-02T00:00:00.000Z | 2025-12-09T01:01:58.000Z |
| msrc_cve-2025-40305 | 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN | 2025-12-02T00:00:00.000Z | 2025-12-09T01:01:42.000Z |
| msrc_cve-2025-40304 | fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:10.000Z |
| msrc_cve-2025-40303 | btrfs: ensure no dirty metadata is written back for an fs with errors | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:56.000Z |
| msrc_cve-2025-40301 | Bluetooth: hci_event: validate skb length for unknown CC opcode | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:04.000Z |
| msrc_cve-2025-40297 | net: bridge: fix use-after-free due to MST port state bypass | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:49.000Z |
| msrc_cve-2025-40294 | Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() | 2025-12-02T00:00:00.000Z | 2025-12-16T14:39:17.000Z |
| msrc_cve-2025-40293 | iommufd: Don't overflow during division for dirty tracking | 2025-12-02T00:00:00.000Z | 2025-12-09T01:01:47.000Z |
| msrc_cve-2025-40292 | virtio-net: fix received length check in big packets | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:45.000Z |
| msrc_cve-2025-40289 | drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM | 2025-12-02T00:00:00.000Z | 2026-02-21T03:48:27.000Z |
| msrc_cve-2025-40288 | drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:34.000Z |
| msrc_cve-2025-40287 | exfat: fix improper check of dentry.stream.valid_size | 2025-12-02T00:00:00.000Z | 2025-12-09T01:40:07.000Z |
| msrc_cve-2025-40286 | smb/server: fix possible memory leak in smb2_read() | 2025-12-02T00:00:00.000Z | 2025-12-09T01:40:46.000Z |
| msrc_cve-2025-40285 | smb/server: fix possible refcount leak in smb2_sess_setup() | 2025-12-02T00:00:00.000Z | 2025-12-09T01:40:41.000Z |
| msrc_cve-2025-40284 | Bluetooth: MGMT: cancel mesh send timer when hdev removed | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:40.000Z |
| msrc_cve-2025-40283 | Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:47.000Z |
| msrc_cve-2025-40282 | Bluetooth: 6lowpan: reset link-local header on ipv6 recv path | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:00.000Z |
| msrc_cve-2025-40281 | sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:25.000Z |
| msrc_cve-2025-40280 | tipc: Fix use-after-free in tipc_mon_reinit_self(). | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:19.000Z |
| msrc_cve-2025-40279 | net: sched: act_connmark: initialize struct tc_ife to fix kernel leak | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:53.000Z |
| msrc_cve-2025-40278 | net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak | 2025-12-02T00:00:00.000Z | 2025-12-09T01:40:12.000Z |
| msrc_cve-2025-40277 | drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:13.000Z |
| msrc_cve-2025-40275 | ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:27.000Z |
| msrc_cve-2025-40273 | NFSD: free copynotify stateid in nfs4_free_ol_stateid() | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:06.000Z |
| msrc_cve-2025-40272 | mm/secretmem: fix use-after-free race in fault handler | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:21.000Z |
| msrc_cve-2025-40269 | ALSA: usb-audio: Fix potential overflow of PCM transfer buffer | 2025-12-02T00:00:00.000Z | 2025-12-16T14:38:32.000Z |
| msrc_cve-2025-40268 | cifs: client: fix memory leak in smb3_fs_context_parse_param | 2025-12-02T00:00:00.000Z | 2025-12-16T14:37:14.000Z |
| msrc_cve-2025-40266 | KVM: arm64: Check the untrusted offset in FF-A memory share | 2025-12-02T00:00:00.000Z | 2026-01-07T14:37:17.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201112-0046 | Google Chrome before 16.0.912.63 does not properly parse SVG documents, which allows remo… | 2025-12-22T21:52:30.608000Z |
| var-200807-0659 | ipnat in IP Filter in Sun Solaris 10 and OpenSolaris before snv_96, when running on a DNS… | 2025-12-22T21:52:30.295000Z |
| var-200705-0681 | Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to… | 2025-12-22T21:51:54.214000Z |
| var-202108-2072 | A race condition was addressed with improved locking. This issue is fixed in Security Upd… | 2025-12-22T21:51:22.025000Z |
| var-201512-0007 | Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 al… | 2025-12-22T21:51:19.576000Z |
| var-201912-0511 | A logic issue existed in the handling of document loads. This issue was addressed with im… | 2025-12-22T21:51:14.924000Z |
| var-201711-0455 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2025-12-22T21:51:14.825000Z |
| var-200706-0666 | Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apac… | 2025-12-22T21:51:14.425000Z |
| var-201710-0207 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GT… | 2025-12-22T21:51:09.603000Z |
| var-200701-0510 | The Adobe PDF specification 1.3, as implemented by Apple Mac OS X Preview, allows remote … | 2025-12-22T21:51:08.747000Z |
| var-201801-1708 | The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before… | 2025-12-22T21:51:07.921000Z |
| var-200904-0794 | Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows rem… | 2025-12-22T21:51:06.825000Z |
| var-201103-0114 | The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x be… | 2025-12-22T21:51:04.422000Z |
| var-201903-0388 | An integer overflow flaw which could lead to an out of bounds write was discovered in lib… | 2025-12-22T21:51:03.499000Z |
| var-202203-0043 | A flaw was found in the way the "flags" member of the new pipe buffer structure was lacki… | 2025-12-22T21:51:02.622000Z |
| var-202010-1236 | An access issue existed in Content Security Policy. This issue was addressed with improve… | 2025-12-22T21:51:01.820000Z |
| var-200102-0104 | "Multiple Users" Control Panel in Mac OS 9 allows Normal users to gain Owner privileges b… | 2025-12-22T21:51:01.420000Z |
| var-200609-0313 | Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to… | 2025-12-22T21:51:01.300000Z |
| var-201205-0246 | sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI… | 2025-12-22T21:50:52.724000Z |
| var-201904-0985 | SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remot… | 2025-12-22T21:50:52.629000Z |
| var-201203-0191 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2025-12-22T21:50:21.242000Z |
| var-201808-1004 | Bluetooth firmware or operating system software drivers in macOS versions before 10.13, H… | 2025-12-22T21:50:21.160000Z |
| var-201409-1147 | The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remot… | 2025-12-22T21:50:17.644000Z |
| var-202006-1832 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2025-12-22T21:50:17.264000Z |
| var-200504-0292 | Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote … | 2025-12-22T21:50:17.195000Z |
| var-202109-1900 | An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be explo… | 2025-12-22T21:50:17.010000Z |
| var-202112-1608 | A carefully crafted request body can cause a buffer overflow in the mod_lua multipart par… | 2025-12-22T21:50:16.169000Z |
| var-201110-0291 | The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64… | 2025-12-22T21:50:16.091000Z |
| var-200802-0651 | modules/libpr0n/decoders/bmp/nsBMPDecoder.cpp in Mozilla Firefox before 2.0.0.12, Thunder… | 2025-12-22T21:50:15.170000Z |
| var-201210-0179 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T21:50:08.186000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-002768 | Multiple vulnerabilities in UNIMO Technology digital video recorders | 2022-12-02T14:57+09:00 | 2024-06-03T16:55+09:00 |
| jvndb-2022-002765 | Multiple vulnerabilities in OMRON CX-Programmer | 2022-11-28T15:40+09:00 | 2024-04-05T18:15+09:00 |
| jvndb-2022-000095 | Cybozu Remote Service vulnerable to Uncontrolled Resource Consumption | 2022-11-25T14:15+09:00 | 2024-06-03T16:08+09:00 |
| jvndb-2022-000094 | Multiple cross-site scripting vulnerabilities in baserCMS | 2022-11-25T13:42+09:00 | 2024-05-31T18:17+09:00 |
| jvndb-2022-000093 | TP-Link RE300 V1 tdpServer vulnerable to improper processing of its input | 2022-11-24T14:46+09:00 | 2024-06-03T16:41+09:00 |
| jvndb-2022-002761 | Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service | 2022-11-21T18:25+09:00 | 2024-05-31T17:43+09:00 |
| jvndb-2022-000092 | Typora fails to properly neutralize JavaScript code. | 2022-11-21T15:31+09:00 | 2024-06-03T15:13+09:00 |
| jvndb-2022-000091 | WordPress Plugin "WordPress Popular Posts" accepts untrusted external inputs to update certain internal variables | 2022-11-18T15:14+09:00 | 2022-11-18T15:14+09:00 |
| jvndb-2022-000089 | RICOH Aficio SP 4210N vulnerable to cross-site scripting | 2022-11-17T11:15+09:00 | 2022-11-17T11:15+09:00 |
| jvndb-2022-000090 | Multiple vulnerabilities in Movable Type | 2022-11-16T17:07+09:00 | 2024-06-03T15:31+09:00 |
| jvndb-2022-000088 | TERASOLUNA Global Framework and TERASOLUNA Server Framework for Java (Rich) vulnerable to ClassLoader manipulation | 2022-11-14T16:45+09:00 | 2024-06-06T16:11+09:00 |
| jvndb-2022-000086 | Aiphone Video Multi-Tenant System Entrance Stations vulnerable to information disclosure | 2022-11-10T13:40+09:00 | 2024-06-06T17:37+09:00 |
| jvndb-2022-002691 | Multiple vulnerabilities in OMRON products | 2022-11-10T09:46+09:00 | 2022-11-10T09:46+09:00 |
| jvndb-2022-000085 | WordPress Plugin "Salon booking system" vulnerable to cross-site scripting | 2022-11-08T15:07+09:00 | 2024-06-05T18:07+09:00 |
| jvndb-2022-000087 | Multiple vulnerabilities in WordPress | 2022-11-08T14:59+09:00 | 2024-06-06T16:27+09:00 |
| jvndb-2022-000079 | Multiple vulnerabilities in the web interfaces of Kyocera Document Solutions MFPs and printers | 2022-11-01T14:51+09:00 | 2024-06-06T17:01+09:00 |
| jvndb-2022-000084 | Multiple vulnerabilities in FUJI SOFT network devices | 2022-10-28T15:12+09:00 | 2024-06-06T16:48+09:00 |
| jvndb-2022-000083 | Multiple vulnerabilities in SHIRASAGI | 2022-10-25T15:10+09:00 | 2024-06-05T16:06+09:00 |
| jvndb-2022-000082 | Multiple vulnerabilities in nadesiko3 | 2022-10-20T16:58+09:00 | 2024-06-05T17:28+09:00 |
| jvndb-2022-002544 | Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service | 2022-10-20T16:18+09:00 | 2024-06-13T13:58+09:00 |
| jvndb-2022-002537 | Stack-based buffer overflow vulnerability in Yokogawa Test & Measurement WTViewerE | 2022-10-19T16:23+09:00 | 2024-06-12T16:54+09:00 |
| jvndb-2022-000081 | Lemon8 App fails to restrict access permissions | 2022-10-19T14:08+09:00 | 2024-06-12T16:39+09:00 |
| jvndb-2022-000080 | Android App "IIJ SmartKey" vulnerable to information disclosure | 2022-10-14T13:57+09:00 | 2024-06-27T13:40+09:00 |
| jvndb-2022-002451 | Multiple vulnerabilities in SVMPC1 and SVMPC2 | 2022-10-13T17:27+09:00 | 2024-05-30T16:38+09:00 |
| jvndb-2022-000078 | bingo!CMS vulnerable to authentication bypass | 2022-10-11T17:49+09:00 | 2024-05-30T17:57+09:00 |
| jvndb-2022-002448 | Multiple vulnerabilities in Trend Micro Deep Security and Cloud One - Workload Security agents for Windows | 2022-10-11T17:02+09:00 | 2024-06-13T14:30+09:00 |
| jvndb-2022-000077 | The installer of Sony Content Transfer may insecurely load Dynamic Link Libraries | 2022-10-11T15:08+09:00 | 2024-06-12T12:12+09:00 |
| jvndb-2022-000076 | Growi vulnerable to improper access control | 2022-10-07T14:30+09:00 | 2024-06-12T12:04+09:00 |
| jvndb-2022-000075 | IPFire WebUI vulnerable to cross-site scripting | 2022-10-06T13:05+09:00 | 2024-06-12T14:28+09:00 |
| jvndb-2022-002444 | Multiple vulnerabilities in Buffalo network devices | 2022-10-05T17:44+09:00 | 2022-10-13T16:28+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:4291-1 | Security update for libmicrohttpd | 2025-11-28T09:06:47Z | 2025-11-28T09:06:47Z |
| suse-su-2025:4290-1 | Security update for cups | 2025-11-28T09:04:34Z | 2025-11-28T09:04:34Z |
| suse-su-2025:4289-1 | Security update for cups | 2025-11-28T08:50:37Z | 2025-11-28T08:50:37Z |
| suse-su-2025:4288-1 | Security update for containerd | 2025-11-28T08:25:49Z | 2025-11-28T08:25:49Z |
| suse-su-2025:4287-1 | Security update for java-25-openjdk | 2025-11-28T08:23:45Z | 2025-11-28T08:23:45Z |
| suse-su-2025:21124-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_12 | 2025-11-28T08:21:31Z | 2025-11-28T08:21:31Z |
| suse-su-2025:21123-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 | 2025-11-28T08:21:31Z | 2025-11-28T08:21:31Z |
| suse-su-2025:21104-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_12 | 2025-11-28T08:21:31Z | 2025-11-28T08:21:31Z |
| suse-su-2025:21103-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 | 2025-11-28T08:21:31Z | 2025-11-28T08:21:31Z |
| suse-su-2025:21122-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 | 2025-11-28T08:21:02Z | 2025-11-28T08:21:02Z |
| suse-su-2025:21099-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 | 2025-11-28T08:21:02Z | 2025-11-28T08:21:02Z |
| suse-su-2025:21115-1 | Security update for kernel-livepatch-MICRO-6-0_Update_12 | 2025-11-28T08:20:42Z | 2025-11-28T08:20:42Z |
| suse-su-2025:21102-1 | Security update for kernel-livepatch-MICRO-6-0_Update_12 | 2025-11-28T08:20:42Z | 2025-11-28T08:20:42Z |
| suse-su-2025:21114-1 | Security update for kernel-livepatch-MICRO-6-0_Update_10 | 2025-11-28T08:20:28Z | 2025-11-28T08:20:28Z |
| suse-su-2025:21100-1 | Security update for kernel-livepatch-MICRO-6-0_Update_10 | 2025-11-28T08:20:28Z | 2025-11-28T08:20:28Z |
| suse-su-2025:21113-1 | Security update for kernel-livepatch-MICRO-6-0_Update_11 | 2025-11-28T08:20:11Z | 2025-11-28T08:20:11Z |
| suse-su-2025:21101-1 | Security update for kernel-livepatch-MICRO-6-0_Update_11 | 2025-11-28T08:20:11Z | 2025-11-28T08:20:11Z |
| suse-su-2025:21121-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21120-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21119-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21118-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21117-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21116-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21091-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21090-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21089-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21088-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21087-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21086-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21112-1 | Security update for kernel-livepatch-MICRO-6-0_Update_9 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15683-1 | xorg-x11-server-21.1.15-7.1 on GA media | 2025-10-29T00:00:00Z | 2025-10-29T00:00:00Z |
| opensuse-su-2025:15682-1 | libtiff-devel-32bit-4.7.1-3.1 on GA media | 2025-10-29T00:00:00Z | 2025-10-29T00:00:00Z |
| opensuse-su-2025:15681-1 | strongswan-6.0.3-1.1 on GA media | 2025-10-29T00:00:00Z | 2025-10-29T00:00:00Z |
| opensuse-su-2025:15680-1 | ongres-scram-3.2-7.1 on GA media | 2025-10-29T00:00:00Z | 2025-10-29T00:00:00Z |
| opensuse-su-2025:15679-1 | libmozjs-128-0-128.14.0-2.1 on GA media | 2025-10-29T00:00:00Z | 2025-10-29T00:00:00Z |
| opensuse-su-2025:15678-1 | libmozjs-115-0-115.15.0-6.1 on GA media | 2025-10-29T00:00:00Z | 2025-10-29T00:00:00Z |
| opensuse-su-2025:15677-1 | kea-3.0.2-1.1 on GA media | 2025-10-29T00:00:00Z | 2025-10-29T00:00:00Z |
| opensuse-su-2025:15676-1 | dovecot24-2.4.2-1.1 on GA media | 2025-10-29T00:00:00Z | 2025-10-29T00:00:00Z |
| opensuse-su-2025:15675-1 | coreboot-utils-25.09-2.1 on GA media | 2025-10-29T00:00:00Z | 2025-10-29T00:00:00Z |
| opensuse-su-2025:20032-1 | Security update for chromium | 2025-10-28T06:36:32Z | 2025-10-28T06:36:32Z |
| opensuse-su-2025:15674-1 | java-25-openjdk-25.0.1.0-1.1 on GA media | 2025-10-28T00:00:00Z | 2025-10-28T00:00:00Z |
| opensuse-su-2025:20031-1 | Security update for warewulf4 | 2025-10-27T09:58:12Z | 2025-10-27T09:58:12Z |
| opensuse-su-2025:20027-1 | Security update for chromium | 2025-10-27T09:16:17Z | 2025-10-27T09:16:17Z |
| opensuse-su-2025:15673-1 | xen-4.20.1_06-1.1 on GA media | 2025-10-27T00:00:00Z | 2025-10-27T00:00:00Z |
| opensuse-su-2025:15672-1 | libluajit-5_1-2-2.1.20250826-1.1 on GA media | 2025-10-27T00:00:00Z | 2025-10-27T00:00:00Z |
| opensuse-su-2025:15671-1 | kernel-devel-6.17.5-1.1 on GA media | 2025-10-27T00:00:00Z | 2025-10-27T00:00:00Z |
| opensuse-su-2025:15670-1 | java-21-openjdk-21.0.9.0-1.1 on GA media | 2025-10-27T00:00:00Z | 2025-10-27T00:00:00Z |
| opensuse-su-2025:15669-1 | grafana-11.6.7-1.1 on GA media | 2025-10-27T00:00:00Z | 2025-10-27T00:00:00Z |
| opensuse-su-2025:15668-1 | libunbound8-1.24.1-1.1 on GA media | 2025-10-24T00:00:00Z | 2025-10-24T00:00:00Z |
| opensuse-su-2025:15667-1 | netty-4.1.128-1.1 on GA media | 2025-10-24T00:00:00Z | 2025-10-24T00:00:00Z |
| opensuse-su-2025:15666-1 | govulncheck-vulndb-0.0.20251023T162509-1.1 on GA media | 2025-10-24T00:00:00Z | 2025-10-24T00:00:00Z |
| opensuse-su-2025:15665-1 | chromedriver-141.0.7390.122-1.1 on GA media | 2025-10-24T00:00:00Z | 2025-10-24T00:00:00Z |
| opensuse-su-2025:15664-1 | python311-pypdf-6.1.3-1.1 on GA media | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| opensuse-su-2025:15663-1 | openbao-2.4.3-1.1 on GA media | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| opensuse-su-2025:15662-1 | micropython-1.26.0-2.1 on GA media | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| opensuse-su-2025:15661-1 | java-17-openjdk-17.0.17.0-1.1 on GA media | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| opensuse-su-2025:15660-1 | java-11-openjdk-11.0.29.0-1.1 on GA media | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| opensuse-su-2025:15659-1 | bind-9.20.15-1.1 on GA media | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| opensuse-su-2025:15658-1 | python311-uv-0.9.5-1.1 on GA media | 2025-10-22T00:00:00Z | 2025-10-22T00:00:00Z |
| opensuse-su-2025:15657-1 | bleachbit-5.0.0-1.1 on GA media | 2025-10-22T00:00:00Z | 2025-10-22T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-libpython-2025-4330 | Extraction filter bypass for linking outside extraction directory | 2025-08-11T13:53:09.546Z | 2025-08-11T14:19:40.295Z |
| bit-libphp-2020-7065 | mb_strtolower (UTF-32LE): stack-buffer-overflow at php_unicode_tolower_full | 2025-08-11T13:53:07.698Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2025-4138 | Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory | 2025-08-11T13:53:07.492Z | 2025-08-11T14:19:40.295Z |
| bit-libphp-2020-7064 | Use-of-uninitialized-value in exif | 2025-08-11T13:53:05.834Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2025-1795 | Mishandling of comma during folding and unicode-encoding of email headers | 2025-08-11T13:53:05.339Z | 2025-12-04T12:07:39.656Z |
| bit-libphp-2020-7063 | Files added to tar with Phar::buildFromIterator have all-access permissions | 2025-08-11T13:53:03.834Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2025-0938 | URL parser allowed square brackets in domain names | 2025-08-11T13:53:03.173Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2020-7062 | Null Pointer Dereference in PHP Session Upload Progress | 2025-08-11T13:53:01.649Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2024-9287 | Virtual environment (venv) activation scripts don't quote paths | 2025-08-11T13:53:00.985Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2020-7061 | heap-buffer-overflow in phar_extract_file | 2025-08-11T13:52:59.804Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2024-8088 | Infinite loop when iterating over zip archive entry names from zipfile.Path | 2025-08-11T13:52:58.648Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2020-7060 | global buffer-overflow in mbfl_filt_conv_big5_wchar | 2025-08-11T13:52:57.902Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2024-7592 | Quadratic complexity parsing cookies with backslashes | 2025-08-11T13:52:56.070Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2020-7059 | OOB read in php_strip_tags_ex | 2025-08-11T13:52:55.929Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2024-6923 | Email header injection due to unquoted newlines | 2025-08-11T13:52:53.987Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-6232 | Regular-expression DoS when parsing TarFile headers | 2025-08-11T13:52:51.685Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-50602 | 2025-08-11T13:52:47.408Z | 2026-02-11T09:09:18.507Z | |
| bit-libpython-2024-4032 | Incorrect IPv4 and IPv6 private ranges | 2025-08-11T13:52:45.426Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-12718 | Bypass extraction filter to modify file metadata outside extraction directory | 2025-08-11T13:52:42.384Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2024-12254 | Unbounded memory buffering in SelectorSocketTransport.writelines() | 2025-08-11T13:52:40.569Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2024-11168 | Improper validation of IPv6 and IPvFuture addresses | 2025-08-11T13:52:38.571Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-0450 | Quoted zip-bomb protection for zipfile | 2025-08-11T13:52:36.704Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-0397 | Memory race condition in ssl.SSLContext certificate store methods | 2025-08-11T13:52:34.942Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2023-6597 | 2025-08-11T13:52:33.085Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2023-6507 | Groups not dropped before running subprocess when using empty 'extra_groups' parameter | 2025-08-11T13:52:31.237Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2023-41105 | 2025-08-11T13:52:29.288Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2023-40217 | 2025-08-11T13:52:27.063Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2023-36632 | 2025-08-11T13:52:24.684Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2023-27043 | 2025-08-11T13:52:20.772Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2023-24329 | 2025-08-11T13:52:18.649Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-30872 | MailEnable Id参数跨站脚本漏洞 | 2025-12-12 | 2025-12-17 |
| cnvd-2025-30871 | MailEnable Message参数跨站脚本漏洞 | 2025-12-12 | 2025-12-17 |
| cnvd-2025-30870 | MailEnable InstanceScope参数跨站脚本漏洞 | 2025-12-12 | 2025-12-17 |
| cnvd-2025-30869 | MailEnable FieldTo参数跨站脚本漏洞 | 2025-12-12 | 2025-12-17 |
| cnvd-2025-30868 | MailEnable FieldCc参数跨站脚本漏洞 | 2025-12-12 | 2025-12-17 |
| cnvd-2025-30867 | MailEnable FieldBcc参数跨站脚本漏洞 | 2025-12-12 | 2025-12-17 |
| cnvd-2025-30866 | MailEnable AddressesTo参数跨站脚本漏洞 | 2025-12-12 | 2025-12-17 |
| cnvd-2025-30865 | MailEnable AddressesCc参数跨站脚本漏洞 | 2025-12-12 | 2025-12-17 |
| cnvd-2025-30864 | MailEnable AddressesBcc参数跨站脚本漏洞 | 2025-12-12 | 2025-12-17 |
| cnvd-2025-30863 | MailEnable Failed参数跨站脚本漏洞 | 2025-12-12 | 2025-12-17 |
| cnvd-2025-30862 | MailEnable Added参数跨站脚本漏洞 | 2025-12-12 | 2025-12-17 |
| cnvd-2025-30770 | Tenda CH22缓冲区溢出漏洞(CNVD-2025-30770) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30741 | WordPress Essential Widgets plugin跨站脚本漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30740 | WordPress Donation Thermometer plugin跨站脚本漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30739 | WordPress Debug Log Viewer plugin缺少授权漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30738 | WordPress Chartify plugin跨站请求伪造漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30737 | WordPress Business Directory Plugin跨站请求伪造漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30736 | WordPress Basel plugin缺失授权漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30735 | WordPress Animation Addons for Elementor plugin SQL注入漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30734 | WordPress Advanced FAQ Manager plugin跨站脚本漏洞(CNVD-2025-3073485) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30733 | WordPress Advanced FAQ Manager plugin跨站脚本漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30732 | WordPress AdForest plugin缺失授权漏洞 | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30663 | Microsoft Word代码执行漏洞(CNVD-2025-30663) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30662 | Microsoft Word代码执行漏洞(CNVD-2025-30662) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30661 | Microsoft Word代码执行漏洞(CNVD-2025-30661) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30660 | Microsoft Office代码执行漏洞(CNVD-2025-30660) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30659 | Microsoft Office代码执行漏洞(CNVD-2025-30659) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30658 | Microsoft Excel代码执行漏洞(CNVD-2025-30658) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30657 | Microsoft Excel代码执行漏洞(CNVD-2025-30657) | 2025-12-12 | 2025-12-15 |
| cnvd-2025-30656 | Microsoft Excel代码执行漏洞(CNVD-2025-30656) | 2025-12-12 | 2025-12-15 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0709 | Multiples vulnérabilités dans les produits Liferay | 2025-08-19T00:00:00.000000 | 2025-08-19T00:00:00.000000 |
| certfr-2025-avi-0708 | Multiples vulnérabilités dans les produits Cisco | 2025-08-18T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| certfr-2025-avi-0707 | Multiples vulnérabilités dans Mattermost Server | 2025-08-18T00:00:00.000000 | 2025-09-16T00:00:00.000000 |
| certfr-2025-avi-0706 | Multiples vulnérabilités dans Matrix | 2025-08-18T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| certfr-2025-avi-0705 | Multiples vulnérabilités dans Microsoft Edge | 2025-08-18T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| certfr-2025-avi-0704 | Vulnérabilité dans les produits Siemens | 2025-08-18T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| certfr-2025-avi-0703 | Vulnérabilité dans Synology BeeDrive | 2025-08-18T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| certfr-2025-avi-0702 | Multiples vulnérabilités dans PostgreSQL | 2025-08-18T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| certfr-2025-avi-0701 | Vulnérabilité dans IBM WebSphere | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0700 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0699 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0698 | Multiples vulnérabilités dans le noyau Linux de Debian | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0697 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0696 | Vulnérabilité dans Spring Framework | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0695 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0694 | Vulnérabilité dans Apache Tomcat | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0693 | Multiples vulnérabilités dans VMware Tanzu | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0692 | Multiples vulnérabilités dans Ruby on Rails | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0691 | Vulnérabilité dans Nginx | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0690 | Multiples vulnérabilités dans GitLab | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0689 | Multiples vulnérabilités dans les produits Microsoft | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0688 | Multiples vulnérabilités dans Microsoft Azure | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0687 | Multiples vulnérabilités dans Microsoft Windows | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0686 | Multiples vulnérabilités dans Microsoft Office | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0685 | Multiples vulnérabilités dans Microsoft Edge | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0684 | Multiples vulnérabilités dans les produits Intel | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0683 | Multiples vulnérabilités dans les produits Ivanti | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0682 | Multiples vulnérabilités dans Liferay | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0681 | Multiples vulnérabilités dans Google Chrome | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0680 | Multiples vulnérabilités dans les produits FoxIT | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |