Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2024-53023 |
7.8 (3.1)
|
Use After Free in Automotive Android OS |
Qualcomm, Inc. |
Snapdragon |
2025-03-03T10:07:37.488Z | 2026-02-26T19:09:49.321Z |
| CVE-2024-53024 |
7.8 (3.1)
|
NULL Pointer Dereference in Display |
Qualcomm, Inc. |
Snapdragon |
2025-03-03T10:07:38.609Z | 2026-02-26T19:09:49.149Z |
| CVE-2024-53028 |
7.8 (3.1)
|
Time-of-check Time-of-use (TOCTOU) Race Condition in A… |
Qualcomm, Inc. |
Snapdragon |
2025-03-03T10:07:42.051Z | 2026-02-26T19:09:48.984Z |
| CVE-2024-53029 |
7.8 (3.1)
|
Improper Input Validation in Automotive OS Platform |
Qualcomm, Inc. |
Snapdragon |
2025-03-03T10:07:43.190Z | 2026-02-26T19:09:48.829Z |
| CVE-2024-53030 |
7.8 (3.1)
|
Improper Input Validation in Automotive OS Platform |
Qualcomm, Inc. |
Snapdragon |
2025-03-03T10:07:44.376Z | 2026-02-26T19:09:48.697Z |
| CVE-2024-53031 |
7.8 (3.1)
|
Improper Input Validation in Automotive OS Platform |
Qualcomm, Inc. |
Snapdragon |
2025-03-03T10:07:45.524Z | 2026-02-26T19:09:48.564Z |
| CVE-2024-53032 |
7.8 (3.1)
|
Time-of-check Time-of-use (TOCTOU) Race Condition in A… |
Qualcomm, Inc. |
Snapdragon |
2025-03-03T10:07:46.637Z | 2026-02-26T19:09:48.429Z |
| CVE-2024-53033 |
7.8 (3.1)
|
Untrusted Pointer Dereference in DSP_Services |
Qualcomm, Inc. |
Snapdragon |
2025-03-03T10:07:47.750Z | 2026-02-26T19:09:48.273Z |
| CVE-2024-53034 |
7.8 (3.1)
|
Untrusted Pointer Dereference in DSP_Services |
Qualcomm, Inc. |
Snapdragon |
2025-03-03T10:07:48.882Z | 2026-02-26T19:09:48.107Z |
| CVE-2025-21424 |
7.8 (3.1)
|
Use After Free in NPU |
Qualcomm, Inc. |
Snapdragon |
2025-03-03T10:07:50.316Z | 2026-02-26T19:09:47.896Z |
| CVE-2024-43169 |
8.8 (3.1)
|
IBM Engineering Requirements Management DOORS Next fil… |
IBM |
Engineering Requirements Management DOORS Next |
2025-03-03T15:27:29.620Z | 2026-02-26T19:09:47.716Z |
| CVE-2025-22224 |
9.3 (3.1)
|
VMware ESXi, and Workstation contain a TOCTOU (Ti… |
VMware |
ESXi |
2025-03-04T11:56:12.317Z | 2026-02-26T19:09:47.563Z |
| CVE-2025-22225 |
8.2 (3.1)
|
VMware ESXi contains an arbitrary write vulnerabi… |
n/a |
VMware ESXi |
2025-03-04T11:56:27.537Z | 2026-02-26T19:09:47.409Z |
| CVE-2025-22226 |
7.1 (3.1)
|
VMware ESXi, Workstation, and Fusion contain an i… |
n/a |
ESXi |
2025-03-04T11:56:57.541Z | 2026-02-26T19:09:47.240Z |
| CVE-2025-1937 |
7.5 (3.1)
|
Memory safety bugs present in Firefox 135, Thunde… |
Mozilla |
Firefox |
2025-03-04T13:31:26.780Z | 2026-02-26T19:09:47.092Z |
| CVE-2025-1938 |
6.5 (3.1)
|
Memory safety bugs present in Firefox 135, Thunde… |
Mozilla |
Firefox |
2025-03-04T13:31:27.167Z | 2026-02-26T19:09:46.937Z |
| CVE-2025-1943 |
8.2 (3.1)
|
Memory safety bugs present in Firefox 135 and Thu… |
Mozilla |
Firefox |
2025-03-04T13:31:27.514Z | 2026-02-26T19:09:46.779Z |
| CVE-2024-0114 |
8.1 (3.1)
|
NVIDIA Hopper HGX for 8-GPU contains a vulnerabil… |
NVIDIA |
NVIDIA Hopper HGX 8-GPU |
2025-03-05T01:34:16.941Z | 2026-02-26T19:09:46.596Z |
| CVE-2025-1914 |
8.8 (3.1)
|
Out of bounds read in V8 in Google Chrome prior t… |
Google |
Chrome |
2025-03-05T03:48:35.445Z | 2026-02-26T19:09:46.451Z |
| CVE-2025-1915 |
8.1 (3.1)
|
Improper Limitation of a Pathname to a Restricted… |
Google |
Chrome |
2025-03-05T03:48:35.884Z | 2026-02-26T19:09:46.216Z |
| CVE-2025-1916 |
8.8 (3.1)
|
Use after free in Profiles in Google Chrome prior… |
Google |
Chrome |
2025-03-05T03:48:36.146Z | 2026-02-26T19:09:46.066Z |
| CVE-2025-1918 |
8.8 (3.1)
|
Out of bounds read in PDFium in Google Chrome pri… |
Google |
Chrome |
2025-03-05T03:48:36.637Z | 2026-02-26T19:09:45.917Z |
| CVE-2025-1919 |
8.8 (3.1)
|
Out of bounds read in Media in Google Chrome prio… |
Google |
Chrome |
2025-03-05T03:48:36.844Z | 2026-02-26T19:09:45.775Z |
| CVE-2025-25015 |
9.9 (3.1)
|
Kibana arbitrary code execution via prototype pollution |
Elastic |
Kibana |
2025-03-05T09:46:34.481Z | 2026-02-26T19:09:45.621Z |
| CVE-2025-20206 |
7.1 (3.1)
|
Cisco Secure Client for Windows with VPN Posture (Host… |
Cisco |
Cisco Secure Client |
2025-03-05T16:14:00.258Z | 2026-02-26T19:09:45.472Z |
| CVE-2025-27516 |
5.4 (4.0)
|
Jinja sandbox breakout through attr filter selecting f… |
pallets |
jinja |
2025-03-05T20:40:06.568Z | 2026-02-26T19:09:45.280Z |
| CVE-2025-20903 |
7.3 (3.1)
|
Improper access control in SecSettingsIntelligenc… |
Samsung Mobile |
Samsung Mobile Devices |
2025-03-06T05:04:08.909Z | 2026-02-26T19:09:44.879Z |
| CVE-2025-20929 |
7.3 (3.1)
|
Out-of-bounds write in parsing jpeg image in Sams… |
Samsung Mobile |
Samsung Notes |
2025-03-06T05:04:37.663Z | 2026-02-26T19:09:44.722Z |
| CVE-2025-20931 |
7.3 (3.1)
|
Out-of-bounds write in parsing bmp image in Samsu… |
Samsung Mobile |
Samsung Notes |
2025-03-06T05:04:39.891Z | 2026-02-26T19:09:44.570Z |
| CVE-2025-26331 |
7.8 (3.1)
|
Dell ThinOS 2411 and prior, contains an Improper … |
Dell |
Wyse Proprietary OS (Modern ThinOS) |
2025-03-07T08:06:12.680Z | 2026-02-26T19:09:44.393Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-22722 |
6.1 (3.1)
|
VMware Workstation for Windows null pointer dereferenc… |
VMware |
Workstation |
2026-02-26T18:35:20.563Z | 2026-02-27T17:54:16.126Z |
| CVE-2026-2252 |
7.5 (3.1)
|
XML External Entity (XXE) vulnerability resulting in S… |
Xerox |
FreeFlow Core |
2026-02-27T08:18:17.816Z | 2026-02-27T08:18:38.491Z |
| CVE-2026-2251 |
9.8 (3.1)
|
Path Traversal leading to Remote Code Execution (RCE) |
Xerox |
FreeFlow Core |
2026-02-27T08:08:52.263Z | 2026-02-28T04:55:29.310Z |
| CVE-2026-2244 |
8.4 (4.0)
|
Sensitive Data Exposure in Google Cloud Vertex AI Workbench |
Google Cloud |
Vertex AI Workbench |
2026-02-26T14:14:46.460Z | 2026-02-26T14:59:56.045Z |
| CVE-2026-21660 |
6.9 (4.0)
|
Johnson Controls-Frick Quantum HD-Hardcoded Email Cred… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T09:18:49.186Z | 2026-02-27T16:17:45.915Z |
| CVE-2026-21659 |
8.7 (4.0)
|
Johnson Controls -Frick Quantum HD-Unauthenticated Rem… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T09:08:50.498Z | 2026-02-27T09:27:51.944Z |
| CVE-2026-21658 |
8.8 (4.0)
|
Johnson Controls -Frick Quantum HD- Unauthenticated Re… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T08:59:13.878Z | 2026-02-27T13:07:55.620Z |
| CVE-2026-21657 |
8.8 (4.0)
|
Johnson Controls -Frick Quantum HD- Unauthenticated Re… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T08:54:28.236Z | 2026-02-27T08:54:28.236Z |
| CVE-2026-21656 |
8.8 (4.0)
|
Johnson Controls -Frick Quantum HD- Unauthenticated Re… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T08:47:21.490Z | 2026-02-27T08:47:21.490Z |
| CVE-2026-21654 |
8.8 (4.0)
|
Johnson Controls -Frick Quantum HD- Unauthenticated Re… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T08:38:42.472Z | 2026-02-27T09:24:44.300Z |
| CVE-2026-20895 |
7.3 (3.1)
|
EV2GO ev2go.io Insufficient Session Expiration |
EV2GO |
ev2go.io |
2026-02-26T23:48:03.827Z | 2026-02-26T23:51:53.584Z |
| CVE-2026-20792 |
7.5 (3.1)
|
Chargemap chargemap.com Improper Restriction of Excess… |
Chargemap |
chargemap.com |
2026-02-26T23:06:29.969Z | 2026-02-26T23:06:29.969Z |
| CVE-2026-20791 |
6.5 (3.1)
|
Chargemap chargemap.com Insufficiently Protected Credentials |
Chargemap |
chargemap.com |
2026-02-26T23:10:16.841Z | 2026-02-26T23:10:16.841Z |
| CVE-2026-20781 |
9.4 (3.1)
|
CloudCharge cloudcharge.se Missing Authentication for … |
CloudCharge |
cloudcharge.se |
2026-02-26T23:24:00.964Z | 2026-02-26T23:24:00.964Z |
| CVE-2026-20733 |
6.5 (3.1)
|
CloudCharge cloudcharge.se Insufficiently Protected Cr… |
CloudCharge |
cloudcharge.se |
2026-02-26T23:38:02.525Z | 2026-02-26T23:38:02.525Z |
| CVE-2026-1627 |
6.5 (3.1)
|
An attacker may exploit the use of outdated and w… |
SICK AG |
SICK LMS1000 |
2026-02-27T08:43:30.581Z | 2026-02-27T08:43:30.581Z |
| CVE-2026-1626 |
6.5 (3.1)
|
An attacker may exploit the use of weak CBC-based… |
SICK AG |
SICK LMS1000 |
2026-02-27T08:40:53.328Z | 2026-02-27T08:40:53.328Z |
| CVE-2026-1585 |
8.4 (4.0)
6.7 (3.1)
|
An unquoted Windows service executable path vulne… |
Canon Inc. |
IJ Scan Utility |
2026-02-26T23:39:13.778Z | 2026-02-27T16:38:57.696Z |
| CVE-2026-1565 |
8.8 (3.1)
|
User Frontend: AI Powered Frontend Posting, User Direc… |
wedevs |
User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration |
2026-02-26T19:23:09.638Z | 2026-02-26T20:45:54.082Z |
| CVE-2026-1558 |
5.3 (3.1)
|
WP Recipe Maker <= 10.3.2 - Insecure Direct Object Ref… |
brechtvds |
WP Recipe Maker |
2026-02-27T04:33:03.419Z | 2026-02-27T15:44:54.096Z |
| CVE-2026-1442 |
7.8 (3.1)
|
Unitree UPK files Hard-Coded Key |
Unitree |
UPK |
2026-02-27T04:28:46.955Z | 2026-02-27T15:58:20.444Z |
| CVE-2026-1305 |
5.3 (3.1)
|
Japanized for WooCommerce <= 2.8.4 - Missing Authoriza… |
shoheitanaka |
Japanized for WooCommerce |
2026-02-27T09:23:43.326Z | 2026-02-27T15:39:31.362Z |
| CVE-2026-1241 |
8.7 (4.0)
|
Authentication Bypass Using an Alternate Path or Chann… |
Pelco, Inc. |
Sarix Professional IMP 3 Series |
2026-02-26T19:21:26.754Z | 2026-02-26T20:43:53.216Z |
| CVE-2026-0980 |
8.3 (3.1)
|
Rubyipmi: red hat satellite: remote code execution in … |
Red Hat |
Red Hat Satellite 6 |
2026-02-27T07:30:42.657Z | 2026-02-27T07:30:42.657Z |
| CVE-2026-0871 |
4.9 (3.1)
|
Org.keycloak/keycloak-services: keycloak: unauthorized… |
Red Hat |
Red Hat build of Keycloak 26.4 |
2026-02-27T07:30:26.766Z | 2026-02-27T07:30:26.766Z |
| CVE-2025-9909 |
6.7 (3.1)
|
Aap-gateway: improper path validation in gateway allow… |
Red Hat |
Red Hat Ansible Automation Platform 2.5 for RHEL 8 |
2026-02-27T07:30:00.885Z | 2026-02-27T18:43:09.098Z |
| CVE-2025-9908 |
6.7 (3.1)
|
Event-driven-ansible: sensitive internal headers discl… |
Red Hat |
Red Hat Ansible Automation Platform 2.5 for RHEL 8 |
2026-02-27T07:29:32.368Z | 2026-02-28T04:55:37.926Z |
| CVE-2025-9907 |
6.7 (3.1)
|
Event-driven-ansible: event stream test mode exposes s… |
Red Hat |
Red Hat Ansible Automation Platform 2.5 for RHEL 8 |
2026-02-27T07:29:06.070Z | 2026-02-28T04:55:39.096Z |
| CVE-2025-9572 |
5 (3.1)
|
Foreman: satellite: graphql api permission bypass lead… |
The Foreman |
Foreman |
2026-02-27T07:28:44.391Z | 2026-02-27T18:42:37.881Z |
| CVE-2025-71057 |
8.2 (3.1)
|
Improper session management in D-Link Wireless N … |
n/a |
n/a |
2026-02-26T00:00:00.000Z | 2026-02-26T19:01:48.362Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-21656 | Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick C… | 2026-02-27T09:16:16.417 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-21654 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerab… | 2026-02-27T09:16:16.223 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-20895 | The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows … | 2026-02-27T00:16:56.350 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-20792 | The WebSocket Application Programming Interface lacks restrictions on the number of authentication… | 2026-02-27T00:16:56.180 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-20791 | Charging station authentication identifiers are publicly accessible via web-based mapping platforms. | 2026-02-27T00:16:56.010 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-20781 | WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthori… | 2026-02-27T00:16:55.807 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-20733 | Charging station authentication identifiers are publicly accessible via web-based mapping platforms. | 2026-02-27T00:16:55.620 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-1627 | An attacker may exploit the use of outdated and weak MAC algorithms in the device’s SSH service to … | 2026-02-27T09:16:16.050 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-1626 | An attacker may exploit the use of weak CBC-based cipher suites in the device’s SSH service to pote… | 2026-02-27T09:16:15.863 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-1585 | An unquoted Windows service executable path vulnerability in IJ Scan Utility for Windows versions 1… | 2026-02-27T00:16:55.430 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-1565 | The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registra… | 2026-02-26T20:31:34.317 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-1558 | The WP Recipe Maker plugin for WordPress is vulnerable to an Insecure Direct Object Reference (IDOR… | 2026-02-27T05:18:19.950 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-1442 | Since the encryption algorithm used to protect firmware updates is itself encrypted using key mater… | 2026-02-27T05:18:18.713 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-1305 | The Japanized for WooCommerce plugin for WordPress is vulnerable to Improper Authentication in vers… | 2026-02-27T10:16:21.863 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-1241 | The Pelco, Inc. Sarix Professional 3 Series Cameras are vulnerable to an authentication bypass issu… | 2026-02-26T20:31:33.657 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-0980 | A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of … | 2026-02-27T08:17:09.647 | 2026-02-27T14:06:37.987 |
| fkie_cve-2026-0871 | A flaw was found in Keycloak. An administrator with `manage-users` permission can bypass the "Only … | 2026-02-27T08:17:09.410 | 2026-02-27T14:06:37.987 |
| fkie_cve-2025-9909 | A flaw was found in the Red Hat Ansible Automation Platform Gateway route creation component. This … | 2026-02-27T08:17:08.510 | 2026-02-27T14:06:37.987 |
| fkie_cve-2025-9908 | A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Strea… | 2026-02-27T08:17:07.580 | 2026-02-27T14:06:37.987 |
| fkie_cve-2025-9907 | A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Strea… | 2026-02-27T08:17:06.703 | 2026-02-27T14:06:37.987 |
| fkie_cve-2025-9572 | n authorization flaw in Foreman's GraphQL API allows low-privileged users to access metadata beyond… | 2026-02-27T08:17:06.373 | 2026-02-27T14:06:37.987 |
| fkie_cve-2025-71057 | Improper session management in D-Link Wireless N 300 ADSL2+ Modem Router DSL-124 ME_1.00 allows att… | 2026-02-26T16:23:28.297 | 2026-02-27T14:06:37.987 |
| fkie_cve-2025-56605 | A reflected Cross-Site Scripting (XSS) vulnerability exists in the register.php backend script of P… | 2026-02-26T16:23:23.587 | 2026-02-27T14:06:37.987 |
| fkie_cve-2025-50857 | ZenTaoPMS v18.11 through v21.6.beta is vulnerable to Directory Traversal in /module/ai/control.php.… | 2026-02-26T17:22:49.187 | 2026-02-27T14:06:37.987 |
| fkie_cve-2025-15567 | Insufficient protection mechanisms in the Health Module may lead to partial information disclosure. | 2026-02-27T07:17:10.290 | 2026-02-27T14:06:37.987 |
| fkie_cve-2025-15509 | The SmartRemote module has insufficient restrictions on loading URLs, which may lead to some inform… | 2026-02-27T07:17:10.090 | 2026-02-27T14:06:37.987 |
| fkie_cve-2025-14343 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-26T13:16:16.377 | 2026-02-27T14:06:37.987 |
| fkie_cve-2025-14149 | The Xpro Addons — 140+ Widgets for Elementor plugin for WordPress is vulnerable to Stored Cross-Sit… | 2026-02-27T07:17:09.903 | 2026-02-27T14:06:37.987 |
| fkie_cve-2025-14142 | The Electric Enquiries plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'b… | 2026-02-27T10:16:21.670 | 2026-02-27T14:06:37.987 |
| fkie_cve-2025-14040 | The Automotive Car Dealership Business WordPress Theme for WordPress is vulnerable to Stored Cross-… | 2026-02-27T07:17:09.710 | 2026-02-27T14:06:37.987 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-p4fg-vw73-vr29 |
9.8 (3.1)
|
Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 148 and Fire… | 2026-02-24T15:30:32Z | 2026-02-25T18:31:35Z |
| ghsa-m65f-px5x-xq9x |
9.8 (3.1)
|
Undefined behavior in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Fir… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:35Z |
| ghsa-jj9w-3m27-jg69 |
8.1 (3.1)
8.6 (4.0)
|
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior expose user passwor… | 2026-02-24T18:31:02Z | 2026-02-25T18:31:35Z |
| ghsa-hjq8-wc3q-9xf3 |
9.8 (3.1)
|
Privilege escalation in the Messaging System component. This vulnerability affects Firefox < 148, F… | 2026-02-24T15:30:32Z | 2026-02-25T18:31:35Z |
| ghsa-h3qc-gf9h-42g6 |
9.8 (3.1)
|
Mitigation bypass in the DOM: HTML Parser component. This vulnerability affects Firefox < 148, Fire… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:35Z |
| ghsa-gxg5-574v-j5f6 |
9.8 (3.1)
|
Use-after-free in the Audio/Video: Playback component. This vulnerability affects Firefox < 148, Fi… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:35Z |
| ghsa-g9cv-cvhp-755f |
9.8 (3.1)
|
Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148 and Fire… | 2026-02-24T15:30:32Z | 2026-02-25T18:31:35Z |
| ghsa-c5fj-xq9f-fjxm |
9.8 (3.1)
|
Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148 and Fir… | 2026-02-24T15:30:32Z | 2026-02-25T18:31:35Z |
| ghsa-94rx-4fcc-c849 |
9.8 (3.1)
|
Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox … | 2026-02-24T15:30:32Z | 2026-02-25T18:31:35Z |
| ghsa-839v-3vpr-fpgf |
9.8 (3.1)
|
Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148 and Fire… | 2026-02-24T15:30:32Z | 2026-02-25T18:31:35Z |
| ghsa-7xqm-gm4h-p23x |
7.5 (3.1)
|
Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vuln… | 2026-02-24T15:30:32Z | 2026-02-25T18:31:35Z |
| ghsa-76rw-rj58-mpqc |
10.0 (3.1)
|
Sandbox escape in the Storage: IndexedDB component. This vulnerability affects Firefox < 148 and Fi… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:35Z |
| ghsa-6rcf-f85p-pmgj |
9.8 (3.1)
|
Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird… | 2026-02-24T15:30:32Z | 2026-02-25T18:31:35Z |
| ghsa-59x3-pvmj-2pw2 |
9.8 (3.1)
|
Use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148 an… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:35Z |
| ghsa-48q6-99pr-mcvm |
9.8 (3.1)
|
Memory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox… | 2026-02-24T15:30:32Z | 2026-02-25T18:31:35Z |
| ghsa-3qgm-jcxp-m9m6 |
10.0 (3.1)
|
Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component. This vulnera… | 2026-02-24T15:30:32Z | 2026-02-25T18:31:35Z |
| ghsa-3px2-2xc4-mxr2 |
9.8 (3.1)
|
Invalid pointer in the JavaScript Engine component. This vulnerability affects Firefox < 148 and Fi… | 2026-02-24T15:30:32Z | 2026-02-25T18:31:35Z |
| ghsa-qmr7-46p8-4c5r |
9.8 (3.1)
|
Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefo… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:34Z |
| ghsa-gjwv-rvwj-p62j |
9.8 (3.1)
|
Incorrect boundary conditions in the Web Audio component. This vulnerability affects Firefox < 148,… | 2026-02-24T15:30:32Z | 2026-02-25T18:31:34Z |
| ghsa-99p8-j693-qhpc |
9.8 (3.1)
|
Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148 and Fir… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:34Z |
| ghsa-5mg4-r7qx-2frp |
9.8 (3.1)
|
Use-after-free in the DOM: Bindings (WebIDL) component. This vulnerability affects Firefox < 148, F… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:34Z |
| ghsa-3jr5-gwfp-7mfw |
9.8 (3.1)
|
JIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability affe… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:34Z |
| ghsa-v49m-r4w3-2p5x |
9.8 (3.1)
|
Integer overflow in the JavaScript: Standard Library component. This vulnerability affects Firefox … | 2026-02-24T15:30:31Z | 2026-02-25T18:31:33Z |
| ghsa-g5w7-69g8-vcwp |
10.0 (3.1)
|
Sandbox escape in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Fire… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:33Z |
| ghsa-3hhv-j9r2-hr9c |
9.8 (3.1)
|
Incorrect boundary conditions in the Graphics: ImageLib component. This vulnerability affects Firef… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:32Z |
| ghsa-3cg8-wjp5-4rm6 |
9.8 (3.1)
|
Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148, Firefox E… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:32Z |
| ghsa-2255-92v8-4pvj |
10.0 (3.1)
|
Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vuln… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:32Z |
| ghsa-r2q9-885m-j92q |
9.8 (3.1)
|
Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability affects Fire… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:31Z |
| ghsa-gwgg-r543-4wvw |
9.8 (3.1)
|
Malicious scripts could cause desynchronization between the address bar and web content before a re… | 2026-02-24T15:30:31Z | 2026-02-25T18:31:31Z |
| ghsa-rvcv-xmp5-qv44 |
7.5 (3.1)
|
Authentication Bypass by Spoofing vulnerability in mdalabar WooODT Lite byconsole-woo-order-deliver… | 2026-02-20T18:31:38Z | 2026-02-25T18:31:29Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43065 |
5.5 (3.1)
|
GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFro… | gdal | 2022-01-01T01:15:00+00:00 | 2023-11-13T19:19:43.960137+00:00 |
| pysec-2019-241 |
9.8 (3.1)
|
GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp … | gdal | 2019-10-14T02:15:00+00:00 | 2023-11-13T19:19:43.892449+00:00 |
| pysec-2023-232 |
|
We failed to apply CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed the… | apache-airflow | 2023-11-12T14:15:00+00:00 | 2023-11-12T16:29:15.404665+00:00 |
| pysec-2023-231 |
|
Apache Airflow, versions before 2.7.3, has a vulnerability that allows an authorized user… | apache-airflow | 2023-11-12T14:15:00+00:00 | 2023-11-12T16:29:15.321733+00:00 |
| pysec-2023-230 |
5.3 (3.1)
|
Synapse is an open-source Matrix homeserver Prior to versions 1.95.1 and 1.96.0rc1, cache… | matrix-synapse | 2023-10-31T17:15:00+00:00 | 2023-11-08T20:24:49.199333+00:00 |
| pysec-2023-221 |
7.5 (3.1)
|
Werkzeug is a comprehensive WSGI web application library. If an upload of a file that sta… | werkzeug | 2023-10-25T18:17:00Z | 2023-11-08T18:38:34.170214Z |
| pysec-2022-43064 |
8.8 (3.1)
|
The User-Defined Functions (UDF) feature in TigerGraph 3.6.0 allows installation of a que… | pytigergraph | 2022-09-05T16:15:00+00:00 | 2023-11-07T20:24:26.101389+00:00 |
| pysec-2022-43062 |
7.8 (3.1)
|
A vulnerability classified as problematic was found in pacparser up to 1.3.x. Affected by… | pacparser | 2022-12-13T18:15:00+00:00 | 2023-11-07T20:24:25.809231+00:00 |
| pysec-2012-21 |
|
virt/disk/api.py in OpenStack Compute (Nova) 2012.1.x before 2012.1.2 and Folsom before F… | nova | 2012-08-20T18:55:00+00:00 | 2023-11-07T20:24:25.753827+00:00 |
| pysec-2012-20 |
|
OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token… | keystone | 2012-12-18T01:55:00+00:00 | 2023-11-07T20:24:25.260316+00:00 |
| pysec-2012-19 |
|
OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (20… | keystone | 2012-09-05T23:55:00+00:00 | 2023-11-07T20:24:25.208233+00:00 |
| pysec-2012-18 |
|
Open redirect vulnerability in views/auth_forms.py in OpenStack Dashboard (Horizon) Essex… | horizon | 2012-09-05T23:55:00+00:00 | 2023-11-07T20:24:25.109703+00:00 |
| pysec-2022-43061 |
6.1 (3.1)
|
A vulnerability was found in django-photologue up to 3.15.1 and classified as problematic… | django-photologue | 2022-12-15T21:15:00+00:00 | 2023-11-07T20:24:24.147635+00:00 |
| pysec-2020-342 |
9.8 (3.1)
|
**Resolved** Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL i… | apache-skywalking | 2020-08-05T14:15:00+00:00 | 2023-11-07T20:24:23.946863+00:00 |
| pysec-2021-876 |
6.5 (3.1)
|
Versions of Apache DolphinScheduler prior to 1.3.2 allowed an ordinary user under any ten… | apache-dolphinscheduler | 2021-01-11T10:15:00+00:00 | 2023-11-07T20:24:23.899306+00:00 |
| pysec-2022-43060 |
5.9 (3.1)
|
The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the conn… | apache-bookkeeper-client | 2022-12-15T19:15:00+00:00 | 2023-11-07T20:24:23.853507+00:00 |
| pysec-2023-229 |
5.4 (3.1)
|
ArchiveBox is an open source self-hosted web archiving system. Any users who are using th… | archivebox | 2023-10-19T22:15:00+00:00 | 2023-11-04T04:27:37.550377+00:00 |
| pysec-2023-228 |
3.3 (3.1)
|
When installing a package from a Mercurial VCS URL (ie "pip install hg+...") with pip p… | pip | 2023-10-25T18:17:00+00:00 | 2023-11-03T16:28:41.538340+00:00 |
| pysec-2023-227 |
|
An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrol… | pillow | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:41.505456+00:00 |
| pysec-2023-226 |
|
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.te… | django | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:40.328470+00:00 |
| pysec-2023-225 |
|
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encodi… | django | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:40.160394+00:00 |
| pysec-2023-224 |
5.3 (3.1)
|
Twisted is an event-based framework for internet applications. Prior to version 23.10.0rc… | twisted | 2023-10-25T21:15:00+00:00 | 2023-11-02T16:33:16.395026+00:00 |
| pysec-2023-223 |
|
Unsafe YAML deserialization in yaml.Loader in transmute-core before 1.13.5 allows attacke… | transmute-core | 2023-11-02T06:15:00+00:00 | 2023-11-02T10:30:07.951105+00:00 |
| pysec-2023-222 |
|
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.… | django | 2023-11-02T06:15:00+00:00 | 2023-11-02T10:30:06.341485+00:00 |
| pysec-2023-220 |
6.5 (3.1)
|
Nautobot is a Network Automation Platform built as a web application atop the Django Pyth… | nautobot | 2023-10-25T18:17:00+00:00 | 2023-11-01T18:30:02.084237+00:00 |
| pysec-2023-219 |
2.7 (3.1)
|
Wagtail is an open source content management system built on Django. A user with a limite… | wagtail | 2023-10-19T19:15:00+00:00 | 2023-10-31T20:23:51.857051+00:00 |
| pysec-2023-178 |
7.5 (3.1)
|
plone.rest allows users to use HTTP verbs such as GET, POST, PUT, DELETE, etc. in Plone. … | plone-rest | 2023-09-21T15:15:00Z | 2023-10-28T20:22:08.431825Z |
| pysec-2023-218 |
4.3 (3.1)
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Airflo… | apache-airflow | 2023-10-23T19:15:00+00:00 | 2023-10-28T05:24:46.485079+00:00 |
| pysec-2023-217 |
8.8 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.2.2. | modoboa | 2023-10-20T17:15:00+00:00 | 2023-10-27T20:23:07.873996+00:00 |
| pysec-2023-216 |
5.4 (3.1)
|
Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa prior to 2.2.2. | modoboa | 2023-10-20T17:15:00+00:00 | 2023-10-27T20:23:07.820957+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33127 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.725067Z |
| gsd-2024-33174 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.724871Z |
| gsd-2024-33102 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.724614Z |
| gsd-2024-33445 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.724418Z |
| gsd-2024-33036 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.724217Z |
| gsd-2024-33290 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.723985Z |
| gsd-2024-33005 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.723751Z |
| gsd-2024-33018 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.723557Z |
| gsd-2024-33082 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.723351Z |
| gsd-2024-33414 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.723146Z |
| gsd-2024-33035 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.722939Z |
| gsd-2024-33083 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.722724Z |
| gsd-2024-33261 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.722494Z |
| gsd-2024-33364 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.722261Z |
| gsd-2024-33220 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.721987Z |
| gsd-2024-33175 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.721785Z |
| gsd-2024-33234 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.721580Z |
| gsd-2024-33413 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.721359Z |
| gsd-2024-33217 | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vu… | 2024-04-24T05:02:09.720970Z |
| gsd-2024-33316 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.720706Z |
| gsd-2024-33181 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.720504Z |
| gsd-2024-33139 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.720304Z |
| gsd-2024-33024 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.720105Z |
| gsd-2024-33440 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.719884Z |
| gsd-2024-33515 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.719673Z |
| gsd-2024-33410 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.719470Z |
| gsd-2024-33126 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.719194Z |
| gsd-2024-33406 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.718995Z |
| gsd-2024-33156 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.718799Z |
| gsd-2024-33268 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.718577Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-503 | Malicious code in test-poc-package-for-session-2 (PyPI) | 2026-01-25T10:04:44Z | 2026-01-25T10:04:44Z |
| mal-2026-498 | Malicious code in instascan-pro (PyPI) | 2026-01-24T16:15:55Z | 2026-01-24T16:15:55Z |
| mal-2026-491 | Malicious code in test-on-other-again (npm) | 2026-01-23T12:02:07Z | 2026-01-23T18:48:56Z |
| mal-2026-488 | Malicious code in ntwsx (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:55Z |
| mal-2026-487 | Malicious code in ntwsc (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:55Z |
| mal-2026-486 | Malicious code in a5xm (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:54Z |
| mal-2026-485 | Malicious code in a4wu (npm) | 2026-01-23T06:32:36Z | 2026-01-23T18:48:54Z |
| mal-2026-497 | Malicious code in test-on-other (npm) | 2026-01-23T18:12:42Z | 2026-01-23T18:12:42Z |
| mal-2025-192877 | Malicious code in tdm-react (npm) | 2025-12-23T08:32:44Z | 2026-01-23T15:44:07Z |
| mal-2026-434 | Malicious code in weaviate-js (npm) | 2026-01-21T04:49:30Z | 2026-01-23T01:39:05Z |
| mal-2026-433 | Malicious code in wallet-adapter-react (npm) | 2026-01-21T04:37:07Z | 2026-01-23T01:39:05Z |
| mal-2026-404 | Malicious code in worldposition (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:05Z |
| mal-2026-403 | Malicious code in worldnormal (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:05Z |
| mal-2026-402 | Malicious code in vworldviewdir (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:05Z |
| mal-2026-373 | Malicious code in webmd-debug (npm) | 2026-01-20T06:13:03Z | 2026-01-23T01:39:05Z |
| mal-2026-372 | Malicious code in webmd-cookie (npm) | 2026-01-20T06:13:02Z | 2026-01-23T01:39:05Z |
| mal-2026-346 | Malicious code in zod-js (npm) | 2026-01-19T00:46:16Z | 2026-01-23T01:39:05Z |
| mal-2026-335 | Malicious code in wac-react-relay (npm) | 2026-01-19T00:45:11Z | 2026-01-23T01:39:05Z |
| mal-2026-466 | Malicious code in uuu8lgd (npm) | 2026-01-22T17:51:00Z | 2026-01-23T01:39:04Z |
| mal-2026-459 | Malicious code in un112 (npm) | 2026-01-22T09:55:45Z | 2026-01-23T01:39:04Z |
| mal-2026-439 | Malicious code in tv-admin-commons (npm) | 2026-01-21T07:40:29Z | 2026-01-23T01:39:04Z |
| mal-2026-438 | Malicious code in ts-tweetnacl-utils (npm) | 2026-01-21T07:37:23Z | 2026-01-23T01:39:04Z |
| mal-2026-432 | Malicious code in universal-provider (npm) | 2026-01-21T04:34:17Z | 2026-01-23T01:39:04Z |
| mal-2026-431 | Malicious code in testpkg-yilider690 (npm) | 2026-01-21T04:44:58Z | 2026-01-23T01:39:04Z |
| mal-2026-430 | Malicious code in storage-types (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:39:04Z |
| mal-2026-401 | Malicious code in victim-package-c (npm) | 2026-01-21T03:54:46Z | 2026-01-23T01:39:04Z |
| mal-2026-400 | Malicious code in victim-package-b (npm) | 2026-01-21T03:54:46Z | 2026-01-23T01:39:04Z |
| mal-2026-399 | Malicious code in torbaileys (npm) | 2026-01-21T04:11:24Z | 2026-01-23T01:39:04Z |
| mal-2026-398 | Malicious code in tor-libsignal (npm) | 2026-01-21T04:11:24Z | 2026-01-23T01:39:04Z |
| mal-2026-371 | Malicious code in theme-neutral (npm) | 2026-01-20T06:19:57Z | 2026-01-23T01:39:04Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2824 | pgAdmin: Schwachstelle ermöglicht Codeausführung | 2025-12-10T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-2820 | Red Hat Enterprise Linux (luksmeta): Schwachstelle ermöglicht Manipulation von Dateien | 2025-12-10T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-2705 | Kubernetes: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-01T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-2580 | Google Chrome/Microsoft Edge: Schwachstelle ermöglicht nicht näher beschriebene Auswirkungen | 2025-11-11T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-2563 | Microsoft Azure Linux: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-2508 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Denial of Service | 2025-11-06T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-2363 | Oracle MySQL: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-2215 | Ruby: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-10-06T22:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-1940 | Liferay Portal: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2025-09-01T22:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-1352 | X.Org X11 und Xwayland: Mehrere Schwachstellen | 2025-06-17T22:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0815 | Oracle Java SE: Mehrere Schwachstellen | 2025-04-15T22:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0556 | Ghostscript: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-03-12T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0435 | X.Org X11: Mehrere Schwachstellen ermöglichen nicht näher spezifizierte Auswirkungen, möglicherweise Codeausführung | 2025-02-25T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0292 | Moxa Switch (EDS, ICS, IKS und SDS): Schwachstelle ermöglicht Denial of Service | 2025-02-06T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0209 | Moxa Switch: Schwachstelle ermöglicht Denial of Service | 2025-01-28T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0127 | Moxa Switch: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-19T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2024-3154 | Moxa Router: Mehrere Schwachstellen ermöglichen Dateimanipulation und Codeausführung | 2024-10-13T22:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2024-3134 | Linux Kernel: Mehrere Schwachstellen | 2024-10-09T22:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2024-1888 | Linux Kernel: Mehrere Schwachstellen | 2024-08-20T22:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2024-1755 | Gitea: Mehrere Schwachstellen | 2024-08-04T22:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2024-0722 | Linux Kernel: Mehrere Schwachstellen | 2024-03-26T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2023-2723 | Red Hat Satellite: Mehrere Schwachstellen | 2023-10-22T22:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2023-1352 | TLS Implementierungen: Schwachstelle ermöglicht Denial of Service | 2021-12-13T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-2220 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-12-04T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-2059 | Ruby: Schwachstelle ermöglicht Codeausführung | 2022-04-27T22:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-2835 | Vercel Next.js und React Server Components: Mehrere Schwachstellen | 2025-12-11T23:00:00.000+00:00 | 2025-12-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2832 | JetBrains TeamCity: Mehrere Schwachstellen | 2025-12-11T23:00:00.000+00:00 | 2025-12-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2831 | ConnectWise ScreenConnect: Schwachstelle ermöglicht Codeausführung | 2025-12-11T23:00:00.000+00:00 | 2025-12-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2829 | AnyDesk: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2025-12-11T23:00:00.000+00:00 | 2025-12-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2828 | Netgate pfSense: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und potenziell Denial of Service | 2025-12-11T23:00:00.000+00:00 | 2025-12-11T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0238 | Kwetsbaarheid verholpen in Check Point VPN producten | 2024-05-30T07:56:46.220112Z | 2024-05-30T07:56:46.220112Z |
| ncsc-2024-0237 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-05-27T11:26:30.888877Z | 2024-05-27T11:26:30.888877Z |
| ncsc-2024-0235 | Kwetsbaarheid verholpen in Google Chrome | 2024-05-27T07:10:26.268379Z | 2024-05-27T07:50:35.517237Z |
| ncsc-2024-0234 | Kwetsbaarheid verholpen in Github Enterprise Server | 2024-05-23T10:57:36.609416Z | 2024-05-23T10:57:36.609416Z |
| ncsc-2024-0233 | Kwetsbaarheden verholpen in Cisco producten | 2024-05-23T10:56:24.310012Z | 2024-05-23T10:56:24.310012Z |
| ncsc-2024-0231 | Kwetsbaarheden verholpen in Atlassian producten | 2024-05-22T11:13:07.693855Z | 2024-05-22T11:13:07.693855Z |
| ncsc-2024-0230 | Kwetsbaarheden verholpen in QNAP QTS en QTS Hero | 2024-05-22T08:02:19.922765Z | 2024-05-22T08:02:19.922765Z |
| ncsc-2024-0229 | Kwetsbaarheid verholpen in QlikSense Enterprise | 2024-05-22T05:33:44.910098Z | 2024-05-22T05:33:44.910098Z |
| ncsc-2024-0228 | Kwetsbaarheden verholpen in SAP producten | 2024-05-17T11:28:01.264255Z | 2024-05-17T11:28:01.264255Z |
| ncsc-2024-0227 | Kwetsbaarheden verholpen in Adobe Illustrator | 2024-05-16T12:59:04.595951Z | 2024-05-16T12:59:04.595951Z |
| ncsc-2024-0226 | Kwetsbaarheden verholpen in Adobe Animate | 2024-05-16T12:55:49.361352Z | 2024-05-16T12:55:49.361352Z |
| ncsc-2024-0225 | Kwetsbaarheden verholpen in Adobe FrameMaker | 2024-05-16T12:54:55.359838Z | 2024-05-16T12:54:55.359838Z |
| ncsc-2024-0224 | Kwetsbaarheid verholpen in Adobe Dreamweaver | 2024-05-16T12:45:03.866353Z | 2024-05-16T12:45:03.866353Z |
| ncsc-2024-0223 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2024-05-16T12:44:31.298431Z | 2024-05-16T12:44:31.298431Z |
| ncsc-2024-0222 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2024-05-16T12:43:57.240443Z | 2024-05-16T12:43:57.240443Z |
| ncsc-2024-0221 | Kwetsbaarheden verholpen in Google Chrome | 2024-05-16T12:42:36.777137Z | 2024-05-16T12:42:36.777137Z |
| ncsc-2024-0220 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2024-05-16T12:41:16.031110Z | 2024-05-16T12:41:16.031110Z |
| ncsc-2024-0219 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-05-15T12:47:39.940581Z | 2024-05-15T12:47:39.940581Z |
| ncsc-2024-0218 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2024-05-15T12:29:43.620890Z | 2024-05-15T12:29:43.620890Z |
| ncsc-2024-0217 | Kwetsbaarheden verholpen in Apple MacOS | 2024-05-15T10:50:09.062571Z | 2024-05-15T11:18:13.188010Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:0951 | Red Hat Security Advisory: python-jinja2 security update | 2025-02-04T08:57:58+00:00 | 2026-02-17T07:53:43+00:00 |
| rhsa-2025:0950 | Red Hat Security Advisory: python-jinja2 security update | 2025-02-04T08:39:43+00:00 | 2026-02-17T07:53:41+00:00 |
| rhsa-2025:0883 | Red Hat Security Advisory: python-jinja2 security update | 2025-02-03T01:14:39+00:00 | 2026-02-17T07:53:39+00:00 |
| rhsa-2025:0876 | Red Hat Security Advisory: OpenShift Container Platform 4.17.15 bug fix and security update | 2025-02-05T13:37:42+00:00 | 2026-02-17T07:53:36+00:00 |
| rhsa-2025:0850 | Red Hat Security Advisory: python-jinja2 security update | 2025-01-30T18:06:01+00:00 | 2026-02-17T07:53:35+00:00 |
| rhsa-2025:0842 | Red Hat Security Advisory: OpenShift Container Platform 4.14.46 security update | 2025-02-06T15:46:39+00:00 | 2026-02-17T07:53:34+00:00 |
| rhsa-2025:0834 | Red Hat Security Advisory: OpenShift Container Platform 4.12.72 packages and security update | 2025-02-06T01:16:18+00:00 | 2026-02-17T07:53:25+00:00 |
| rhsa-2025:0830 | Red Hat Security Advisory: OpenShift Container Platform 4.16.33 packages and security update | 2025-02-10T06:29:38+00:00 | 2026-02-17T07:53:25+00:00 |
| rhsa-2025:0777 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2025-01-28T19:20:06+00:00 | 2026-02-17T07:53:14+00:00 |
| rhsa-2025:0753 | Red Hat Security Advisory: Red Hat Ansible Automation Platform Execution Environments Container Release Update | 2025-01-28T01:03:48+00:00 | 2026-02-17T07:53:14+00:00 |
| rhsa-2025:0722 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Update | 2025-01-27T22:39:15+00:00 | 2026-02-17T07:53:12+00:00 |
| rhsa-2025:0721 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 2025-01-27T19:32:54+00:00 | 2026-02-17T07:53:11+00:00 |
| rhsa-2025:0711 | Red Hat Security Advisory: python-jinja2 security update | 2025-01-27T13:33:03+00:00 | 2026-02-17T07:53:09+00:00 |
| rhsa-2025:0667 | Red Hat Security Advisory: python-jinja2 security update | 2025-01-23T16:02:09+00:00 | 2026-02-17T07:53:07+00:00 |
| rhsa-2025:0664 | Red Hat Security Advisory: Release of OpenShift Serverless Logic 1.35.0 security update & enhancements | 2025-01-23T13:02:37+00:00 | 2026-02-17T07:53:07+00:00 |
| rhsa-2025:0656 | Red Hat Security Advisory: OpenShift Container Platform 4.17.14 packages and security update | 2025-01-28T04:59:21+00:00 | 2026-02-17T07:53:04+00:00 |
| rhsa-2025:0345 | Red Hat Security Advisory: fence-agents security update | 2025-01-15T21:41:54+00:00 | 2026-02-17T07:52:44+00:00 |
| rhsa-2025:0341 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2025-01-15T19:34:31+00:00 | 2026-02-17T07:52:43+00:00 |
| rhsa-2025:0340 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2025-01-15T16:54:28+00:00 | 2026-02-17T07:52:38+00:00 |
| rhsa-2025:0338 | Red Hat Security Advisory: fence-agents security update | 2025-01-15T15:42:03+00:00 | 2026-02-17T07:52:37+00:00 |
| rhsa-2025:0335 | Red Hat Security Advisory: fence-agents security update | 2025-01-15T14:57:53+00:00 | 2026-02-17T07:52:31+00:00 |
| rhsa-2025:0323 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.14.13 Bug Fix Update | 2025-01-15T01:19:29+00:00 | 2026-02-17T07:52:27+00:00 |
| rhsa-2025:0308 | Red Hat Security Advisory: fence-agents security update | 2025-01-14T09:02:29+00:00 | 2026-02-17T07:52:22+00:00 |
| rhsa-2025:0164 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.15.9 Bug Fix Update | 2025-01-09T11:27:57+00:00 | 2026-02-17T07:52:19+00:00 |
| rhsa-2025:0082 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.5 Bug Fix Update | 2025-01-08T11:31:01+00:00 | 2026-02-17T07:52:14+00:00 |
| rhsa-2025:0079 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17.2 Bug Fix Update | 2025-01-08T10:04:05+00:00 | 2026-02-17T07:52:11+00:00 |
| rhsa-2024:9985 | Red Hat Security Advisory: RHOSP 17.1.4 (python-urllib3) security update | 2024-11-21T09:30:00+00:00 | 2026-02-17T07:52:09+00:00 |
| rhsa-2024:9923 | Red Hat Security Advisory: python3.12-urllib3 security update | 2024-11-19T01:25:27+00:00 | 2026-02-17T07:52:07+00:00 |
| rhsa-2024:9922 | Red Hat Security Advisory: python3.11-urllib3 security update | 2024-11-19T01:27:02+00:00 | 2026-02-17T07:52:05+00:00 |
| rhsa-2024:9885 | Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.2.0 | 2024-11-18T15:17:19+00:00 | 2026-02-17T07:52:02+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-14-294-01 | Rockwell Automation Connected Components Workbench ActiveX Component Vulnerabilities | 2014-07-24T06:00:00.000000Z | 2025-06-06T22:51:01.469791Z |
| icsa-14-289-02 | GE Proficy HMI/SCADA CIMPLICITY CimView Memory Access Violation | 2014-07-19T06:00:00.000000Z | 2025-06-06T22:50:54.817836Z |
| icsa-14-289-01 | IOServer Resource Exhaustion Vulnerability | 2014-07-19T06:00:00.000000Z | 2025-06-06T22:50:48.380867Z |
| icsa-14-288-01 | CareFusion Pyxis SupplyStation System Vulnerabilities | 2014-07-18T06:00:00.000000Z | 2025-06-06T22:50:22.557418Z |
| icsa-14-287-01 | GE Proficy HMI/SCADA DNP3 Driver Input Validation | 2014-07-17T06:00:00.000000Z | 2025-06-06T22:50:16.095529Z |
| icsa-14-275-02 | Accuenergy Acuvim II Authentication Vulnerabilities | 2014-07-05T06:00:00.000000Z | 2025-06-06T22:50:03.174225Z |
| icsa-14-275-01 | Meinberg Radio Clocks LANTIME M-Series XSS | 2014-07-05T06:00:00.000000Z | 2025-06-06T22:49:56.704328Z |
| icsa-14-269-02 | Fox DataDiode Proxy Server CSRF Vulnerability | 2014-06-29T06:00:00.000000Z | 2025-06-06T22:49:50.228012Z |
| icsa-14-261-01 | Advantech WebAccess Vulnerabilities | 2014-06-21T06:00:00.000000Z | 2025-06-06T22:48:58.295004Z |
| icsa-14-260-01a | Yokogawa CENTUM and Exaopc Vulnerability (Update A) | 2014-06-20T06:00:00.000000Z | 2025-06-06T22:48:51.805857Z |
| icsa-14-259-01a | Schneider Electric SCADA Expert ClearSCADA Vulnerabilities (Update A) | 2014-06-19T06:00:00.000000Z | 2025-06-06T22:48:32.407633Z |
| icsa-14-254-02 | Rockwell Micrologix 1400 DNP3 DOS Vulnerability | 2014-06-14T06:00:00.000000Z | 2025-06-06T22:48:25.978305Z |
| icsa-14-254-01 | Schneider Electric VAMPSET Buffer Overflow | 2014-06-14T06:00:00.000000Z | 2025-06-06T22:48:19.541393Z |
| icsa-14-247-01a | Sensys Networks Traffic Sensor Vulnerabilities (Update A) | 2014-06-07T06:00:00.000000Z | 2025-06-06T22:48:06.463498Z |
| icsa-14-238-01 | CG Automation Improper Input Validation | 2014-05-29T06:00:00.000000Z | 2025-06-06T22:47:53.555337Z |
| icsa-14-226-01 | Siemens SIMATIC S7-1500 CPU Denial of Service | 2014-05-17T06:00:00.000000Z | 2025-06-06T22:47:47.106108Z |
| icsa-14-224-01 | Ecava Integraxor SCADA Server Vulnerabilities | 2014-05-15T06:00:00.000000Z | 2025-06-06T22:47:21.277370Z |
| icsa-14-203-01 | Omron NS Series HMI Vulnerabilities | 2014-04-24T06:00:00.000000Z | 2025-06-06T22:46:35.467432Z |
| icsa-14-198-02 | Advantech WebAccess Vulnerabilities | 2014-04-19T06:00:00.000000Z | 2025-06-06T22:46:03.132898Z |
| icsa-14-198-01 | Cogent DataHub Code Injection Vulnerability | 2014-04-19T06:00:00.000000Z | 2025-06-06T22:45:56.681631Z |
| icsa-14-196-01 | SubSTATION Server Telegyr 8979 Master Vulnerabilities | 2014-04-17T06:00:00.000000Z | 2025-06-06T22:45:50.215260Z |
| icsa-14-189-02 | Innominate mGuard Unauthorized Leakage of System Data | 2014-04-10T06:00:00.000000Z | 2025-06-06T22:45:43.410774Z |
| icsa-13-077-01b | Schneider Electric PLCs Vulnerabilities | 2013-12-20T07:00:00.000000Z | 2025-06-06T22:40:07.027146Z |
| icsa-13-016-01 | Schneider Electric Authenticated Communication Risk Vulnerability | 2013-10-20T06:00:00.000000Z | 2025-06-06T22:39:47.591594Z |
| icsa-13-014-01 | Siemens SIMATIC RF Manager ActiveX Buffer Overflow | 2013-10-18T06:00:00.000000Z | 2025-06-06T22:39:41.115500Z |
| icsa-13-011-03 | Rockwell Automation ControlLogix PLC Vulnerabilities | 2013-10-15T06:00:00.000000Z | 2025-06-06T22:38:48.956870Z |
| icsa-12-205-02 | Siemens SIMATIC STEP 7 DLL Vulnerability | 2012-04-26T06:00:00.000000Z | 2025-06-06T22:38:22.736168Z |
| icsa-12-185-01 | WellinTech KingView Multiple Vulnerabilities | 2012-04-06T06:00:00.000000Z | 2025-06-06T22:37:50.390140Z |
| icsa-12-177-02 | Invensys Wonderware InTouch 10 DLL Hijack | 2012-03-29T06:00:00.000000Z | 2025-06-06T22:37:43.923140Z |
| icsa-12-167-01 | Innominate MGuard Weak HTTPS and SSH Keys | 2012-03-19T06:00:00.000000Z | 2025-06-06T22:37:37.465622Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-iosxe-cip-dos-9rtbklt9 | Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-6vpe-dos-tjbtf5zv | Cisco IOS XE Software IPv6 VPN over MPLS Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ios-xe-cat-verify-d4neqa6q | Cisco IOS XE Software for Catalyst 9200 Series Switches Arbitrary Code Execution Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ewc-priv-esc-nderyltk | Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-cwlc-snmpidv-rnyyqzuz | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Information Disclosure Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-c9800-mob-dos-342yac6j | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Mobility Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-arb-file-delete-vb2rvcqv | Cisco SD-WAN Arbitrary File Deletion Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ap-assoc-dos-egvqton8 | Cisco Catalyst 9100 Series Access Points Association Request Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-alg-dos-ku9z8kfx | Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-vmanage-msg-serv-aqtup7vs | Cisco SD-WAN vManage Software Unauthenticated Access to Messaging Services Vulnerability | 2022-09-07T16:00:00+00:00 | 2022-09-27T21:40:31+00:00 |
| cisco-sa-20180620-nxosbgp | Cisco NX-OS Software Border Gateway Protocol Denial of Service Vulnerability | 2018-06-20T16:00:00+00:00 | 2022-09-22T20:15:18+00:00 |
| cisco-sa-xr-cdp-wnalzvt2 | Cisco IOS XR Software Cisco Discovery Protocol Denial of Service Vulnerability | 2022-09-14T16:00:00+00:00 | 2022-09-14T16:00:00+00:00 |
| cisco-sa-ncs4k-tl1-gnnlwc6 | Cisco Network Convergence System 4000 Series TL1 Denial of Service Vulnerability | 2022-09-14T16:00:00+00:00 | 2022-09-14T16:00:00+00:00 |
| cisco-sa-iosxr-bng-gmg5gxt | Cisco IOS XR Software Broadband Network Gateway PPP over Ethernet Denial of Service Vulnerability | 2022-09-14T16:00:00+00:00 | 2022-09-14T16:00:00+00:00 |
| cisco-sa-sb-rv-vpnbypass-cpheup9o | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers IPSec VPN Server Authentication Bypass Vulnerability | 2022-09-07T16:00:00+00:00 | 2022-09-07T16:00:00+00:00 |
| cisco-sa-mlx5-jbpcrqd8 | Vulnerability in NVIDIA Data Plane Development Kit Affecting Cisco Products: August 2022 | 2022-09-07T16:00:00+00:00 | 2022-09-07T16:00:00+00:00 |
| cisco-sa-meraki-config-ab3da | Cisco Meraki MR Series Splash Page Insecure Configuration Option | 2022-09-07T16:00:00+00:00 | 2022-09-07T16:00:00+00:00 |
| cisco-sa-nxos-mpls-oam-dos-sgo9x5gm | Cisco NX-OS Software MPLS OAM Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2022-09-02T17:41:51+00:00 |
| cisco-sa-asdm-rce-gqjshxw | Cisco Adaptive Security Device Manager Remote Code Execution Vulnerability | 2021-07-07T16:00:00+00:00 | 2022-08-25T14:41:06+00:00 |
| cisco-sa-nxos-ospfv3-dos-48qutcu | Cisco NX-OS Software OSPFv3 Denial of Service Vulnerability | 2022-08-24T16:00:00+00:00 | 2022-08-24T16:00:00+00:00 |
| cisco-sa-nxos-cdp-dos-ce-wwvpucc9 | Cisco FXOS and NX-OS Software Cisco Discovery Protocol Denial of Service and Arbitrary Code Execution Vulnerability | 2022-08-24T16:00:00+00:00 | 2022-08-24T16:00:00+00:00 |
| cisco-sa-mso-prvesc-bpfp9czs | Cisco ACI Multi-Site Orchestrator Privilege Escalation Vulnerability | 2022-08-24T16:00:00+00:00 | 2022-08-24T16:00:00+00:00 |
| cisco-sa-fxos-cmdinj-txclnznh | Cisco FXOS Software Command Injection Vulnerability | 2022-08-24T16:00:00+00:00 | 2022-08-24T16:00:00+00:00 |
| cisco-sa-asa-asdm-sig-npkvwdjm | Cisco Adaptive Security Device Manager and Adaptive Security Appliance Software Client-side Arbitrary Code Execution Vulnerability | 2022-06-22T16:00:00+00:00 | 2022-08-17T12:48:01+00:00 |
| cisco-sa-asa-dos-tl4ua4aa | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-08-10T19:07:55+00:00 |
| cisco-sa-asaftd-rsa-key-leak-ms7uefzz | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software RSA Private Key Leak Vulnerability | 2022-08-10T16:00:00+00:00 | 2022-08-10T16:00:00+00:00 |
| cisco-sa-webex-xss-frmhijck-ko3wmkus | Cisco Webex Meetings Web Interface Vulnerabilities | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-sb-mult-vuln-cbvp4sur | Cisco Small Business RV Series Routers Vulnerabilities | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-ise-pwd-wh64ahqf | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-cucm-file-delete-n2vpmone | Cisco Unified Communications Manager Arbitrary File Deletion Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-46711 | mptcp: pm: fix ID 0 endp usage after multiple re-creations | 2024-09-01T07:00:00.000Z | 2026-02-21T01:33:21.000Z |
| msrc_cve-2024-46695 | selinuxsmack: don't bypass permissions check in inode_setsecctx hook | 2024-09-01T07:00:00.000Z | 2026-02-21T01:32:19.000Z |
| msrc_cve-2024-8508 | Unbounded name compression could lead to Denial of Service | 2024-10-01T07:00:00.000Z | 2026-02-21T01:31:00.000Z |
| msrc_cve-2024-46707 | KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 | 2024-09-01T07:00:00.000Z | 2026-02-21T01:30:52.000Z |
| msrc_cve-2024-46848 | perf/x86/intel: Limit the period on Haswell | 2024-09-01T07:00:00.000Z | 2026-02-21T01:29:22.000Z |
| msrc_cve-2024-46702 | thunderbolt: Mark XDomain as unplugged when router is removed | 2024-09-01T07:00:00.000Z | 2026-02-21T01:29:13.000Z |
| msrc_cve-2024-46810 | drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ | 2024-09-01T07:00:00.000Z | 2026-02-21T01:28:00.000Z |
| msrc_cve-2024-38588 | ftrace: Fix possible use-after-free issue in ftrace_location() | 2024-06-02T07:00:00.000Z | 2026-02-21T01:27:29.000Z |
| msrc_cve-2024-46821 | drm/amd/pm: Fix negative array index read | 2024-09-01T07:00:00.000Z | 2026-02-21T01:26:19.000Z |
| msrc_cve-2024-46710 | drm/vmwgfx: Prevent unmapping active read buffers | 2024-09-01T07:00:00.000Z | 2026-02-21T01:25:24.000Z |
| msrc_cve-2024-46803 | drm/amdkfd: Check debug trap enable before write dbg_ev_file | 2024-09-01T07:00:00.000Z | 2026-02-21T01:24:50.000Z |
| msrc_cve-2024-46864 | x86/hyperv: fix kexec crash due to VP assist page corruption | 2024-09-01T07:00:00.000Z | 2026-02-21T01:23:26.000Z |
| msrc_cve-2024-46863 | ASoC: Intel: soc-acpi-intel-lnl-match: add missing empty item | 2024-09-01T07:00:00.000Z | 2026-02-21T01:22:18.000Z |
| msrc_cve-2024-42122 | drm/amd/display: Add NULL pointer check for kzalloc | 2024-07-01T07:00:00.000Z | 2026-02-21T01:20:59.000Z |
| msrc_cve-2024-46859 | platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses | 2024-09-01T07:00:00.000Z | 2026-02-21T01:20:26.000Z |
| msrc_cve-2024-50005 | mac802154: Fix potential RCU dereference issue in mac802154_scan_worker | 2024-10-01T07:00:00.000Z | 2026-02-21T01:20:18.000Z |
| msrc_cve-2024-44996 | vsock: fix recursive ->recvmsg calls | 2024-09-01T07:00:00.000Z | 2026-02-21T01:19:17.000Z |
| msrc_cve-2024-44969 | s390/sclp: Prevent release of buffer in I/O | 2024-09-01T07:00:00.000Z | 2026-02-21T01:18:42.000Z |
| msrc_cve-2024-44947 | fuse: Initialize beyond-EOF page contents before setting uptodate | 2024-09-01T07:00:00.000Z | 2026-02-21T01:18:02.000Z |
| msrc_cve-2024-46861 | usbnet: ipheth: do not stop RX on failing RX callback | 2024-09-01T07:00:00.000Z | 2026-02-21T01:17:32.000Z |
| msrc_cve-2024-46687 | btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk() | 2024-09-01T07:00:00.000Z | 2026-02-21T01:16:22.000Z |
| msrc_cve-2024-46686 | smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() | 2024-09-01T07:00:00.000Z | 2026-02-21T01:15:06.000Z |
| msrc_cve-2024-46685 | pinctrl: single: fix potential NULL dereference in pcs_get_function() | 2024-09-01T07:00:00.000Z | 2026-02-21T01:13:55.000Z |
| msrc_cve-2024-46845 | tracing/timerlat: Only clear timer if a kthread exists | 2024-09-01T07:00:00.000Z | 2026-02-21T01:11:29.000Z |
| msrc_cve-2024-46692 | firmware: qcom: scm: Mark get_wq_ctx() as atomic call | 2024-09-01T07:00:00.000Z | 2026-02-21T01:10:58.000Z |
| msrc_cve-2024-50130 | netfilter: bpf: must hold reference on net namespace | 2024-11-02T00:00:00.000Z | 2026-02-21T01:10:30.000Z |
| msrc_cve-2024-46847 | mm: vmalloc: ensure vmap_block is initialised before adding to queue | 2024-09-01T07:00:00.000Z | 2026-02-21T01:10:18.000Z |
| msrc_cve-2024-45019 | net/mlx5e: Take state lock during tx timeout reporter | 2024-09-01T07:00:00.000Z | 2026-02-21T01:09:41.000Z |
| msrc_cve-2024-46831 | net: microchip: vcap: Fix use-after-free error in kunit test | 2024-09-01T07:00:00.000Z | 2026-02-21T01:09:11.000Z |
| msrc_cve-2024-50010 | exec: don't WARN for racy path_noexec check | 2024-10-01T07:00:00.000Z | 2026-02-21T01:08:38.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201707-1176 | An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari … | 2025-12-22T21:46:29.362000Z |
| var-201105-0197 | Unspecified vulnerability in the Java Embedding Plugin (JEP) in Mozilla Firefox before 3.… | 2025-12-22T21:46:27.962000Z |
| var-200501-0287 | Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a… | 2025-12-22T21:46:27.257000Z |
| var-201302-0239 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T21:46:25.532000Z |
| var-202201-0496 | An unprivileged write to the file handler flaw in the Linux kernel's control groups and n… | 2025-12-22T21:46:23.137000Z |
| var-202103-1001 | An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G… | 2025-12-22T21:46:19.670000Z |
| var-201205-0195 | Off-by-one error in libxml2, as used in Google Chrome before 19.0.1084.46 and other produ… | 2025-12-22T21:45:48.006000Z |
| var-200603-0273 | automount in Mac OS X 10.4.5 and earlier allows remote file servers to cause a denial of … | 2025-12-22T21:45:39.226000Z |
| var-201609-0592 | The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remot… | 2025-12-22T21:45:06.501000Z |
| var-202109-1966 | There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a mal… | 2025-12-22T21:44:34.724000Z |
| var-201606-0478 | OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary check… | 2025-12-22T21:44:34.364000Z |
| var-201806-1436 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2025-12-22T21:44:33.727000Z |
| var-202002-0332 | In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by th… | 2025-12-22T21:44:24.713000Z |
| var-201302-0143 | Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.… | 2025-12-22T21:43:21.421000Z |
| var-200102-0040 | Mac OS Runtime for Java (MRJ) 2.2.3 allows remote attackers to use malicious applets to r… | 2025-12-22T21:43:21.087000Z |
| var-201006-1124 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2025-12-22T21:43:18.581000Z |
| var-202004-1994 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.4 a… | 2025-12-22T21:43:16.853000Z |
| var-201707-1197 | An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari … | 2025-12-22T21:43:13.402000Z |
| var-200106-0035 | Buffer overflow in Internet Printing ISAPI extension in Windows 2000 allows remote attack… | 2025-12-22T21:42:10.089000Z |
| var-201011-0019 | libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and … | 2025-12-22T21:41:37.799000Z |
| var-202204-0593 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle … | 2025-12-22T21:41:04.292000Z |
| var-200808-0154 | Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.… | 2025-12-22T21:40:52.004000Z |
| var-202201-0498 | nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overfl… | 2025-12-22T21:40:51.238000Z |
| var-201912-0484 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2025-12-22T21:40:24.290000Z |
| var-200511-0018 | The Internet Key Exchange version 1 (IKEv1) implementation in Stonesoft StoneGate Firewal… | 2025-12-22T21:40:19.195000Z |
| var-201705-3649 | There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1… | 2025-12-22T21:40:15.523000Z |
| var-201912-0579 | A logic issue existed in the handling of synchronous page loads. This issue was addressed… | 2025-12-22T21:39:41.550000Z |
| var-200602-0446 | The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remot… | 2025-12-22T21:38:07.402000Z |
| var-201211-0368 | Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS … | 2025-12-22T21:38:07.195000Z |
| var-202004-2202 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2025-12-22T21:36:54.971000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-009619 | OS command injection vulnerability in DT900 | 2023-12-06T14:43+09:00 | 2023-12-06T14:43+09:00 |
| jvndb-2023-000117 | Multiple vulnerabilities in LuxCal Web Calendar | 2023-11-20T17:15+09:00 | 2023-11-20T17:15+09:00 |
| jvndb-2021-000018 | The installers of E START products may insecurely load Dynamic Link Libraries | 2021-03-05T17:03+09:00 | 2023-11-16T15:41+09:00 |
| jvndb-2020-000025 | Toshiba Electronic Devices & Storage software registers unquoted service paths | 2020-04-20T17:13+09:00 | 2023-11-08T16:44+09:00 |
| jvndb-2019-000023 | Multiple vulnerabilities in Cybozu Garoon | 2019-04-25T17:13+09:00 | 2023-11-08T16:39+09:00 |
| jvndb-2023-004790 | Multiple Vulnerabilities in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2023-11-02T12:14+09:00 | 2023-11-02T12:14+09:00 |
| jvndb-2023-004754 | MCL Technologies MCL-Net vulnerable to directory traversal | 2023-11-01T16:49+09:00 | 2023-11-01T16:49+09:00 |
| jvndb-2020-000906 | WL-Enq (WEB Enquete) vulnerable to cross-site scripting | 2020-03-24T18:29+09:00 | 2023-10-30T17:52+09:00 |
| jvndb-2023-000100 | Scanning evasion issue in Cisco Secure Email Gateway | 2023-10-16T16:11+09:00 | 2023-10-27T15:52+09:00 |
| jvndb-2023-000103 | HP ThinUpdate vulnerable to improper server certificate verification | 2023-10-23T14:26+09:00 | 2023-10-23T14:26+09:00 |
| jvndb-2023-003771 | File and Directory Permissions Vulnerability in JP1/Performance Management | 2023-10-04T15:23+09:00 | 2023-10-04T15:23+09:00 |
| jvndb-2023-003764 | Multiple vulnerabilities in Panasonic KW Watcher | 2023-09-27T14:44+09:00 | 2023-09-27T14:44+09:00 |
| jvndb-2023-003592 | Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software | 2023-09-13T15:02+09:00 | 2023-09-13T15:02+09:00 |
| jvndb-2023-003023 | Vulnerability in HiRDB | 2023-08-29T15:55+09:00 | 2023-09-06T15:45+09:00 |
| jvndb-2023-003335 | Vulnerability in JP1/VERITAS | 2023-09-06T15:35+09:00 | 2023-09-06T15:35+09:00 |
| jvndb-2023-000092 | "direct" Desktop App for macOS fails to restrict access permissions | 2023-09-06T14:33+09:00 | 2023-09-06T14:33+09:00 |
| jvndb-2023-000090 | Multiple vulnerabilities in CGIs of PMailServer and PMailServer2 | 2023-09-05T14:55+09:00 | 2023-09-05T14:55+09:00 |
| jvndb-2023-002787 | OMRON CJ series and CS/CJ Series EtherNet/IT unit vulnerable to Denial-of-Service (DoS) | 2023-08-03T13:45+09:00 | 2023-08-03T13:45+09:00 |
| jvndb-2023-002510 | Multiple Vulnerabilities in Hitachi Device Manager | 2023-07-19T14:48+09:00 | 2023-07-19T14:48+09:00 |
| jvndb-2023-000065 | Multiple vulnerabilities in WAVLINK WL-WN531AX2 | 2023-06-27T16:50+09:00 | 2023-06-27T16:50+09:00 |
| jvndb-2023-000063 | Multiple vulnerabilities in Panasonic AiSEG2 | 2023-06-16T14:05+09:00 | 2023-06-16T14:05+09:00 |
| jvndb-2023-000054 | Wacom Tablet Driver installer for macOS vulnerable to improper link resolution before file access | 2023-05-25T13:40+09:00 | 2023-05-25T13:40+09:00 |
| jvndb-2023-001894 | Android App "Brother iPrint&Scan" vulnerable to improper access control | 2023-05-19T15:40+09:00 | 2023-05-19T15:40+09:00 |
| jvndb-2023-001852 | OS command injection vulnerability in Inaba Denki Sangyo Wi-Fi AP UNIT | 2023-05-17T15:09+09:00 | 2023-05-17T15:09+09:00 |
| jvndb-2023-000036 | API server of TONE Family vulnerable to authentication bypass using an alternate path | 2023-04-17T14:04+09:00 | 2023-04-17T14:04+09:00 |
| jvndb-2023-001492 | Vulnerability in JP1/VERITAS | 2023-04-12T15:01+09:00 | 2023-04-12T15:01+09:00 |
| jvndb-2023-001400 | CONPROSYS HMI System(CHS) vulnerable to SQL injection | 2023-04-03T16:19+09:00 | 2023-04-03T16:19+09:00 |
| jvndb-2021-000070 | Multiple vulnerabilities in GroupSession | 2021-07-19T15:41+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2021-000068 | Multiple vulnerabilities in Retty App | 2021-07-13T14:34+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2021-000033 | Hot Pepper Gourmet App fails to restrict access permissions | 2021-04-27T17:10+09:00 | 2023-03-08T17:02+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:4273-1 | Security update for rubygem-rack | 2025-11-27T08:12:25Z | 2025-11-27T08:12:25Z |
| suse-su-2025:4272-1 | Security update for gnutls | 2025-11-27T08:11:48Z | 2025-11-27T08:11:48Z |
| suse-su-2025:4271-1 | Security update for gnutls | 2025-11-27T08:11:37Z | 2025-11-27T08:11:37Z |
| suse-su-2025:4269-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6) | 2025-11-26T21:10:56Z | 2025-11-26T21:10:56Z |
| suse-su-2025:4268-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6) | 2025-11-26T19:33:47Z | 2025-11-26T19:33:47Z |
| suse-su-2025:4265-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2025-11-26T19:33:40Z | 2025-11-26T19:33:40Z |
| suse-su-2025:21147-1 | Security update for the Linux Kernel | 2025-11-26T15:59:00Z | 2025-11-26T15:59:00Z |
| suse-su-2025:21080-1 | Security update for the Linux Kernel | 2025-11-26T15:59:00Z | 2025-11-26T15:59:00Z |
| suse-su-2025:4264-1 | Security update for ruby2.5 | 2025-11-26T15:52:44Z | 2025-11-26T15:52:44Z |
| suse-su-2025:21180-1 | Security update for the Linux Kernel | 2025-11-26T15:35:38Z | 2025-11-26T15:35:38Z |
| suse-su-2025:4262-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6) | 2025-11-26T15:07:47Z | 2025-11-26T15:07:47Z |
| suse-su-2025:4261-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6) | 2025-11-26T15:07:28Z | 2025-11-26T15:07:28Z |
| suse-su-2025:2169-1 | Security update for yelp | 2025-11-26T14:47:36Z | 2025-11-26T14:47:36Z |
| suse-su-2025:21145-1 | Security update for curl | 2025-11-26T14:28:47Z | 2025-11-26T14:28:47Z |
| suse-su-2025:21077-1 | Security update for curl | 2025-11-26T14:28:47Z | 2025-11-26T14:28:47Z |
| suse-su-2025:21066-1 | Security update for sssd | 2025-11-26T14:26:51Z | 2025-11-26T14:26:51Z |
| suse-su-2025:21065-1 | Security update for unbound | 2025-11-26T14:26:20Z | 2025-11-26T14:26:20Z |
| suse-su-2025:4258-1 | Security update for python312 | 2025-11-26T13:44:40Z | 2025-11-26T13:44:40Z |
| suse-su-2025:4257-1 | Security update for python311 | 2025-11-26T13:43:01Z | 2025-11-26T13:43:01Z |
| suse-su-2025:4256-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2025-11-26T13:04:23Z | 2025-11-26T13:04:23Z |
| suse-su-2025:4254-1 | Security update for dpdk | 2025-11-26T11:33:12Z | 2025-11-26T11:33:12Z |
| suse-su-2025:4255-1 | Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5) | 2025-11-26T09:35:19Z | 2025-11-26T09:35:19Z |
| suse-su-2025:4247-1 | Security update for sssd | 2025-11-26T08:56:55Z | 2025-11-26T08:56:55Z |
| suse-su-2025:4245-1 | Security update for buildah | 2025-11-26T08:39:12Z | 2025-11-26T08:39:12Z |
| suse-su-2025:4244-1 | Security update for amazon-ssm-agent | 2025-11-26T08:38:47Z | 2025-11-26T08:38:47Z |
| suse-su-2025:21144-1 | Security update for mysql-connector-java | 2025-11-26T08:13:19Z | 2025-11-26T08:13:19Z |
| suse-su-2025:4243-1 | Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5) | 2025-11-25T22:06:17Z | 2025-11-25T22:06:17Z |
| suse-su-2025:4242-1 | Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4) | 2025-11-25T21:11:35Z | 2025-11-25T21:11:35Z |
| suse-su-2025:4239-1 | Security update for the Linux Kernel (Live Patch 39 for SUSE Linux Enterprise 15 SP4) | 2025-11-25T17:04:05Z | 2025-11-25T17:04:05Z |
| suse-su-2025:4237-1 | Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4) | 2025-11-25T16:04:17Z | 2025-11-25T16:04:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15628-1 | lsd-1.2.0-1.1 on GA media | 2025-10-13T00:00:00Z | 2025-10-13T00:00:00Z |
| opensuse-su-2025:15627-1 | libcryptopp-devel-8.9.0-4.1 on GA media | 2025-10-13T00:00:00Z | 2025-10-13T00:00:00Z |
| opensuse-su-2025:15626-1 | exim-4.98.2-4.1 on GA media | 2025-10-13T00:00:00Z | 2025-10-13T00:00:00Z |
| opensuse-su-2025:15625-1 | perl-CGI-Simple-1.282.0-1.1 on GA media | 2025-10-11T00:00:00Z | 2025-10-11T00:00:00Z |
| opensuse-su-2025:15624-1 | golang-github-v2fly-v2ray-core-5.40.0-1.1 on GA media | 2025-10-10T00:00:00Z | 2025-10-10T00:00:00Z |
| opensuse-su-2025:15623-1 | ruby3.4-rubygem-rack-session-2.1.1-1.1 on GA media | 2025-10-10T00:00:00Z | 2025-10-10T00:00:00Z |
| opensuse-su-2025:15622-1 | chromedriver-141.0.7390.65-1.1 on GA media | 2025-10-10T00:00:00Z | 2025-10-10T00:00:00Z |
| opensuse-su-2025:15621-1 | ruby3.4-rubygem-rack-2.2-2.2.19-1.1 on GA media | 2025-10-09T00:00:00Z | 2025-10-09T00:00:00Z |
| opensuse-su-2025:15620-1 | headscale-0.26.1-2.1 on GA media | 2025-10-09T00:00:00Z | 2025-10-09T00:00:00Z |
| opensuse-su-2025:15619-1 | gitea-tea-0.11.0-2.1 on GA media | 2025-10-09T00:00:00Z | 2025-10-09T00:00:00Z |
| opensuse-su-2025:15618-1 | forgejo-longterm-11.0.6-2.1 on GA media | 2025-10-09T00:00:00Z | 2025-10-09T00:00:00Z |
| opensuse-su-2025:15617-1 | forgejo-12.0.4-2.1 on GA media | 2025-10-09T00:00:00Z | 2025-10-09T00:00:00Z |
| opensuse-su-2025:15616-1 | distrobuilder-3.2-4.1 on GA media | 2025-10-09T00:00:00Z | 2025-10-09T00:00:00Z |
| opensuse-su-2025:15615-1 | weblate-5.13.3-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15614-1 | libruby3_4-3_4-3.4.7-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15613-1 | python311-python-socketio-5.14.1-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15612-1 | pgadmin4-9.8-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15611-1 | libexslt0-1.1.43-3.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15610-1 | grafana-11.6.6-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15609-1 | go1.25-1.25.2-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15608-1 | go1.24-1.24.8-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15607-1 | glow-2.1.1-2.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15606-1 | digger-cli-0.6.127-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15605-1 | ansible-11-11.11.0-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15604-1 | valkey-8.1.4-1.1 on GA media | 2025-10-07T00:00:00Z | 2025-10-07T00:00:00Z |
| opensuse-su-2025:15603-1 | matrix-synapse-1.139.1-1.1 on GA media | 2025-10-07T00:00:00Z | 2025-10-07T00:00:00Z |
| opensuse-su-2025:15602-1 | gimp-3.0.4-4.1 on GA media | 2025-10-06T00:00:00Z | 2025-10-06T00:00:00Z |
| opensuse-su-2025:15601-1 | chromedriver-141.0.7390.54-1.1 on GA media | 2025-10-05T00:00:00Z | 2025-10-05T00:00:00Z |
| opensuse-su-2025:15600-1 | redis-8.2.2-1.1 on GA media | 2025-10-04T00:00:00Z | 2025-10-04T00:00:00Z |
| opensuse-su-2025:15599-1 | haproxy-3.2.6+git0.81568b2d1-1.1 on GA media | 2025-10-04T00:00:00Z | 2025-10-04T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2025-6601 | Business Logic Errors in GitLab | 2025-10-28T12:05:34.442Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-25293 | ruby-saml vulnerable to Remote Denial of Service (DoS) with compressed SAML responses | 2025-04-14T11:55:21.293Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-25292 | Ruby SAML vulnerable to SAML authentication bypass due to namespace handling (parser differential) | 2025-04-14T11:55:19.936Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-25291 | ruby-saml vulnerable to SAML authentication bypass due to DOCTYPE handling (parser differential) | 2025-04-14T11:55:18.579Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-11989 | Missing Authorization in GitLab | 2025-10-28T12:03:56.032Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-11971 | Incorrect Authorization in GitLab | 2025-10-28T12:03:50.762Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-11702 | Missing Authorization in GitLab | 2025-11-06T13:22:05.051Z | 2025-11-06T13:25:46.476Z |
| bit-git-2025-48386 | Git allows a buffer overflow in 'wincred' credential helper | 2025-07-10T05:40:43.979Z | 2025-11-06T13:25:46.476Z |
| bit-git-2025-48385 | Git alllows arbitrary file writes via bundle-uri parameter injection | 2025-07-10T05:40:40.066Z | 2025-11-06T13:25:46.476Z |
| bit-git-2025-48384 | Git allows arbitrary code execution through broken config quoting | 2025-07-10T05:40:36.268Z | 2025-11-06T13:25:46.476Z |
| bit-git-2024-52006 | Newline confusion in credential helpers can lead to credential exfiltration in git | 2025-04-14T11:03:27.651Z | 2025-11-06T13:25:46.476Z |
| bit-git-2024-50349 | Git does not sanitize URLs when asking for credentials interactively | 2025-04-14T11:03:09.254Z | 2025-11-06T13:25:46.476Z |
| bit-git-2024-32002 | Git's recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Execution | 2024-05-24T07:19:17.151Z | 2025-11-06T13:25:46.476Z |
| bit-ghost-2022-47197 | 2024-03-06T10:52:52.881Z | 2025-11-06T13:25:46.476Z | |
| bit-ghost-2022-47196 | 2024-03-06T10:53:02.275Z | 2025-11-06T13:25:46.476Z | |
| bit-ghost-2022-47195 | 2024-03-06T10:53:13.671Z | 2025-11-06T13:25:46.476Z | |
| bit-ghost-2022-47194 | 2024-03-06T10:53:22.782Z | 2025-11-06T13:25:46.476Z | |
| bit-envoy-2025-62504 | Envoy Lua filter use-after-free when oversized rewritten response body causes crash | 2025-10-21T08:41:18.087Z | 2025-11-06T13:25:46.476Z |
| bit-envoy-2024-30255 | HTTP/2: CPU exhaustion due to CONTINUATION frame flood | 2024-04-06T18:17:53.965Z | 2025-11-06T13:25:46.476Z |
| bit-envoy-2024-27919 | HTTP/2: memory exhaustion due to CONTINUATION frame flood | 2024-04-06T18:18:06.284Z | 2025-11-06T13:25:46.476Z |
| bit-elk-2025-25018 | Kibana Stored Cross-Site Scripting (XSS) | 2025-10-14T08:39:59.187Z | 2025-11-06T13:25:46.476Z |
| bit-elk-2025-25017 | Kibana Stored Cross-Site Scripting (XSS) | 2025-10-14T08:39:57.577Z | 2025-11-06T13:25:46.476Z |
| bit-elk-2025-25009 | Kibana Cross-Site Scripting (XSS) | 2025-10-09T08:39:52.493Z | 2025-11-06T13:25:46.476Z |
| bit-drupal-2021-41184 | XSS in the `of` option of the `.position()` util | 2024-03-06T10:54:31.396Z | 2025-11-06T13:25:46.476Z |
| bit-django-2025-59682 | 2025-10-23T08:40:14.229Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2025-59681 | 2025-10-08T08:40:24.312Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2025-57833 | 2025-09-25T08:40:38.586Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2024-42005 | 2024-08-08T07:17:01.495Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2024-41991 | 2024-08-08T07:17:15.604Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2024-41990 | 2024-08-08T07:17:28.897Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-04113 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411303) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04112 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411204) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04111 | Adobe Experience Manager跨站脚本漏洞 | 2025-12-15 | 2026-01-15 |
| cnvd-2026-03712 | TOTOLINK X5000R代码执行漏洞 | 2025-12-18 | 2026-01-15 |
| cnvd-2026-03617 | Dell ControlVault3和Dell ControlVault3 Plus越界读写漏洞(CNVD-2026-03617) | 2025-07-25 | 2026-01-15 |
| cnvd-2026-03570 | Dell ControlVault3和Dell ControlVault3 Plus越界读写漏洞(CNVD-2026-03570) | 2025-11-20 | 2026-01-15 |
| cnvd-2026-03558 | Dell ControlVault3和Dell ControlVault3 Plus越界读写漏洞(CNVD-2026-03558) | 2025-11-20 | 2026-01-15 |
| cnvd-2026-03550 | Dell ControlVault3和Dell ControlVault3 Plus权限提升漏洞 | 2025-11-20 | 2026-01-15 |
| cnvd-2026-03549 | Dell ControlVault3和Dell ControlVault3 Plus越界读写漏洞(CNVD-2026-03549) | 2025-11-20 | 2026-01-15 |
| cnvd-2026-03548 | Dell ControlVault3和Dell ControlVault3 Plus越界读写漏洞 | 2025-11-20 | 2026-01-15 |
| cnvd-2026-03547 | Dell ControlVault3和Dell ControlVault3 Plus硬编码密码漏洞 | 2025-11-20 | 2026-01-15 |
| cnvd-2026-03546 | Dell ControlVault3和Dell ControlVault3 Plus CvManager功能缓冲区溢出漏洞 | 2025-11-20 | 2026-01-15 |
| cnvd-2026-03545 | Dell ControlVault3和Dell ControlVault3 Plus CvManager_SBI功能缓冲区溢出漏洞 | 2025-11-20 | 2026-01-15 |
| cnvd-2026-03544 | Blood Bank Management System rprofile.php组件跨站脚本漏洞 | 2025-12-03 | 2026-01-15 |
| cnvd-2026-03543 | Blood Bank Management System receiverLogin.php组件SQL注入漏洞 | 2025-12-03 | 2026-01-15 |
| cnvd-2026-03542 | Blood Bank Management System login.php组件跨站脚本漏洞 | 2025-12-03 | 2026-01-15 |
| cnvd-2026-03541 | Blood Bank Management System hprofile.php组件跨站脚本漏洞 | 2025-12-03 | 2026-01-15 |
| cnvd-2026-03540 | Blood Bank Management System cancel.php组件SQL注入漏洞 | 2025-12-03 | 2026-01-15 |
| cnvd-2026-03539 | Blood Bank Management System blooddinfo.php组件跨站脚本漏洞 | 2025-12-03 | 2026-01-15 |
| cnvd-2026-03538 | Blood Bank Management System abs.php组件跨站脚本漏洞 | 2025-12-03 | 2026-01-15 |
| cnvd-2026-03537 | Blood Bank Management System abs.php组件SQL注入漏洞 | 2025-12-03 | 2026-01-15 |
| cnvd-2026-03536 | Google Android权限提升漏洞(CNVD-2026-03536) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03535 | Google Android信息泄露漏洞(CNVD-2026-03535) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03534 | Mozilla Firefox信息泄露漏洞(CNVD-2026-03534) | 2025-04-09 | 2026-01-15 |
| cnvd-2026-03533 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-03533) | 2025-03-13 | 2026-01-15 |
| cnvd-2026-03532 | Mozilla Firefox for iOS欺骗漏洞(CNVD-2026-03532) | 2025-03-13 | 2026-01-15 |
| cnvd-2026-03531 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-03531) | 2025-03-13 | 2026-01-15 |
| cnvd-2026-03530 | 多款Mozilla产品代码执行漏洞(CNVD-2026-03530) | 2025-03-13 | 2026-01-15 |
| cnvd-2026-03529 | 多款Mozilla产品代码执行漏洞(CNVD-2026-03529) | 2025-03-13 | 2026-01-15 |
| cnvd-2026-03528 | Google Android越界写入漏洞 | 2025-12-10 | 2026-01-15 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0660 | Vulnérabilité dans Tenable Identity Exposure | 2025-08-07T00:00:00.000000 | 2025-08-07T00:00:00.000000 |
| certfr-2025-avi-0659 | Vulnérabilité dans Microsoft Exchange Server | 2025-08-07T00:00:00.000000 | 2025-08-07T00:00:00.000000 |
| certfr-2025-avi-0658 | Multiples vulnérabilités dans Trend Micro Apex One | 2025-08-06T00:00:00.000000 | 2025-08-06T00:00:00.000000 |
| certfr-2025-avi-0657 | Multiples vulnérabilités dans Google Chrome | 2025-08-06T00:00:00.000000 | 2025-08-06T00:00:00.000000 |
| certfr-2025-avi-0656 | Vulnérabilité dans Google Pixel | 2025-08-06T00:00:00.000000 | 2025-08-06T00:00:00.000000 |
| certfr-2025-avi-0655 | Multiples vulnérabilités dans les produits Liferay | 2025-08-05T00:00:00.000000 | 2025-08-05T00:00:00.000000 |
| certfr-2025-avi-0654 | Multiples vulnérabilités dans les produits Netgate | 2025-08-05T00:00:00.000000 | 2025-08-05T00:00:00.000000 |
| certfr-2025-avi-0653 | Multiples vulnérabilités dans Google Android | 2025-08-05T00:00:00.000000 | 2025-08-05T00:00:00.000000 |
| certfr-2025-avi-0652 | Vulnérabilité dans le greffon "WASM Client" pour Traefik | 2025-08-04T00:00:00.000000 | 2025-08-04T00:00:00.000000 |
| certfr-2025-avi-0651 | Multiples vulnérabilités dans les produits IBM | 2025-08-01T00:00:00.000000 | 2025-08-01T00:00:00.000000 |
| certfr-2025-avi-0650 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-08-01T00:00:00.000000 | 2025-08-01T00:00:00.000000 |
| certfr-2025-avi-0649 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-08-01T00:00:00.000000 | 2025-08-01T00:00:00.000000 |
| certfr-2025-avi-0648 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-08-01T00:00:00.000000 | 2025-08-01T00:00:00.000000 |
| certfr-2025-avi-0647 | Vulnérabilité dans Squid | 2025-08-01T00:00:00.000000 | 2025-08-01T00:00:00.000000 |
| certfr-2025-avi-0646 | Vulnérabilité dans Microsoft Edge | 2025-08-01T00:00:00.000000 | 2025-08-01T00:00:00.000000 |
| certfr-2025-avi-0645 | Multiples vulnérabilités dans Asterisk | 2025-08-01T00:00:00.000000 | 2025-08-01T00:00:00.000000 |
| certfr-2025-avi-0644 | Vulnérabilité dans Progress MOVEit Transfer | 2025-08-01T00:00:00.000000 | 2025-08-01T00:00:00.000000 |
| certfr-2025-avi-0539 | Multiples vulnérabilités dans Cisco Identity Services Engine | 2025-06-26T00:00:00.000000 | 2025-08-01T00:00:00.000000 |
| certfr-2025-avi-0642 | Multiples vulnérabilités dans Apple Safari | 2025-07-31T00:00:00.000000 | 2025-07-31T00:00:00.000000 |
| certfr-2025-avi-0641 | Multiples vulnérabilités dans les produits Splunk | 2025-07-31T00:00:00.000000 | 2025-07-31T00:00:00.000000 |
| certfr-2025-avi-0640 | Multiples vulnérabilités dans les produits Apple | 2025-07-30T00:00:00.000000 | 2025-07-31T00:00:00.000000 |
| certfr-2025-avi-0639 | Multiples vulnérabilités dans Google Chrome | 2025-07-30T00:00:00.000000 | 2025-07-30T00:00:00.000000 |
| certfr-2025-avi-0638 | Vulnérabilité dans les produits Sonicwall | 2025-07-30T00:00:00.000000 | 2025-07-30T00:00:00.000000 |
| certfr-2025-avi-0637 | Vulnérabilité dans SolarWinds Web Help Desk | 2025-07-30T00:00:00.000000 | 2025-07-30T00:00:00.000000 |
| certfr-2025-avi-0636 | Multiples vulnérabilités dans les produits Elastic | 2025-07-30T00:00:00.000000 | 2025-07-30T00:00:00.000000 |
| certfr-2025-avi-0635 | Vulnérabilité dans VMware vCenter | 2025-07-30T00:00:00.000000 | 2025-07-30T00:00:00.000000 |
| certfr-2025-avi-0634 | Vulnérabilité dans Python | 2025-07-30T00:00:00.000000 | 2025-07-30T00:00:00.000000 |
| certfr-2025-avi-0633 | Vulnérabilité dans Tenable Patch Management | 2025-07-30T00:00:00.000000 | 2025-07-30T00:00:00.000000 |
| certfr-2025-avi-0632 | Multiples vulnérabilités dans GLPI | 2025-07-30T00:00:00.000000 | 2025-07-30T00:00:00.000000 |
| certfr-2025-avi-0631 | Vulnérabilité dans SolarWinds SWOSH | 2025-07-29T00:00:00.000000 | 2025-07-29T00:00:00.000000 |