Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-24993 |
7.8 (3.1)
|
Windows NTFS Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-03-11T16:59:20.302Z | 2026-02-26T19:09:39.072Z |
| CVE-2025-26633 |
7 (3.1)
|
Microsoft Management Console Security Feature Bypass V… |
Microsoft |
Windows 10 Version 1507 |
2025-03-11T16:59:24.607Z | 2026-02-26T19:09:38.916Z |
| CVE-2025-24450 |
7.8 (3.1)
|
Substance3D - Painter | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Painter |
2025-03-11T17:31:43.911Z | 2026-02-26T19:09:38.768Z |
| CVE-2025-24451 |
7.8 (3.1)
|
Substance3D - Painter | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Painter |
2025-03-11T17:31:44.729Z | 2026-02-26T19:09:38.632Z |
| CVE-2025-24440 |
7.8 (3.1)
|
Substance3D - Sampler | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Sampler |
2025-03-11T17:36:13.813Z | 2026-02-26T19:09:38.488Z |
| CVE-2025-24452 |
7.8 (3.1)
|
InDesign Desktop | Out-of-bounds Write (CWE-787) |
Adobe |
InDesign Desktop |
2025-03-11T17:43:16.396Z | 2026-02-26T19:09:38.327Z |
| CVE-2025-24453 |
7.8 (3.1)
|
InDesign Desktop | Heap-based Buffer Overflow (CWE-122) |
Adobe |
InDesign Desktop |
2025-03-11T17:43:17.399Z | 2026-02-26T19:09:38.173Z |
| CVE-2025-27178 |
7.8 (3.1)
|
InDesign Desktop | Out-of-bounds Write (CWE-787) |
Adobe |
InDesign Desktop |
2025-03-11T17:43:19.108Z | 2026-02-26T19:09:37.985Z |
| CVE-2025-27177 |
7.8 (3.1)
|
InDesign Desktop | Heap-based Buffer Overflow (CWE-122) |
Adobe |
InDesign Desktop |
2025-03-11T17:43:19.882Z | 2026-02-26T19:09:37.848Z |
| CVE-2025-27175 |
7.8 (3.1)
|
InDesign Desktop | Out-of-bounds Write (CWE-787) |
Adobe |
InDesign Desktop |
2025-03-11T17:43:20.698Z | 2026-02-26T19:09:37.699Z |
| CVE-2025-27166 |
7.8 (3.1)
|
InDesign Desktop | Out-of-bounds Write (CWE-787) |
Adobe |
InDesign Desktop |
2025-03-11T17:43:21.562Z | 2026-02-26T19:09:37.559Z |
| CVE-2025-27169 |
7.8 (3.1)
|
Illustrator | Out-of-bounds Write (CWE-787) |
Adobe |
Illustrator |
2025-03-11T18:00:30.150Z | 2026-02-26T19:09:37.395Z |
| CVE-2025-27163 |
5.5 (3.1)
|
Acrobat Reader | Out-of-bounds Read (CWE-125) |
Adobe |
Acrobat Reader |
2025-03-11T18:10:09.475Z | 2026-02-26T19:09:37.235Z |
| CVE-2025-27159 |
7.8 (3.1)
|
Acrobat Reader | Use After Free (CWE-416) |
Adobe |
Acrobat Reader |
2025-03-11T18:10:10.399Z | 2026-02-26T19:09:37.078Z |
| CVE-2025-27160 |
7.8 (3.1)
|
Acrobat Reader | Use After Free (CWE-416) |
Adobe |
Acrobat Reader |
2025-03-11T18:10:11.438Z | 2026-02-26T19:09:36.939Z |
| CVE-2025-27162 |
7.8 (3.1)
|
Acrobat Reader | Access of Uninitialized Pointer (CWE-824) |
Adobe |
Acrobat Reader |
2025-03-11T18:10:12.272Z | 2026-02-26T19:09:36.812Z |
| CVE-2025-27174 |
7.8 (3.1)
|
Acrobat Reader | Use After Free (CWE-416) |
Adobe |
Acrobat Reader |
2025-03-11T18:10:13.126Z | 2026-02-26T19:09:36.669Z |
| CVE-2025-27164 |
5.5 (3.1)
|
Acrobat Reader | Out-of-bounds Read (CWE-125) |
Adobe |
Acrobat Reader |
2025-03-11T18:10:14.018Z | 2026-02-26T19:09:36.509Z |
| CVE-2025-27161 |
7.8 (3.1)
|
Acrobat Reader | Out-of-bounds Read (CWE-125) |
Adobe |
Acrobat Reader |
2025-03-11T18:10:14.806Z | 2026-02-26T19:09:36.365Z |
| CVE-2025-27158 |
7.8 (3.1)
|
Acrobat Reader | Access of Uninitialized Pointer (CWE-824) |
Adobe |
Acrobat Reader |
2025-03-11T18:10:15.676Z | 2026-02-26T19:09:36.221Z |
| CVE-2025-24431 |
5.5 (3.1)
|
Acrobat Reader | Out-of-bounds Read (CWE-125) |
Adobe |
Acrobat Reader |
2025-03-11T18:10:16.624Z | 2026-02-26T19:09:36.070Z |
| CVE-2025-2233 |
8.8 (3.0)
|
Samsung SmartThings Improper Verification of Cryptogra… |
Samsung |
SmartThings |
2025-03-11T22:30:44.003Z | 2026-02-26T19:09:35.917Z |
| CVE-2025-27915 |
5.4 (3.1)
|
An issue was discovered in Zimbra Collaboration (… |
n/a |
n/a |
2025-03-12T00:00:00.000Z | 2026-02-26T19:09:35.780Z |
| CVE-2025-21590 |
4.4 (3.1)
6.7 (4.0)
|
Junos OS: An local attacker with shell access can exec… |
Juniper Networks |
Junos OS |
2025-03-12T13:59:43.038Z | 2026-02-26T19:09:35.631Z |
| CVE-2025-20138 |
8.8 (3.1)
|
Cisco IOS XR Software CLI Privilege Escalation Vulnerability |
Cisco |
Cisco IOS XR Software |
2025-03-12T16:12:06.736Z | 2026-02-26T19:09:35.478Z |
| CVE-2025-20143 |
6.7 (3.1)
|
Cisco IOS XR Software Secure Boot Bypass Vulnerability |
Cisco |
Cisco IOS XR Software |
2025-03-12T16:12:31.135Z | 2026-02-26T19:09:35.340Z |
| CVE-2025-20177 |
6.7 (3.1)
|
Cisco IOS XR Software Image Verification Bypass Vulner… |
Cisco |
Cisco IOS XR Software |
2025-03-12T16:13:04.362Z | 2026-02-26T19:09:35.194Z |
| CVE-2025-0117 |
7.1 (4.0)
|
GlobalProtect App: Local Privilege Escalation (PE) Vul… |
Palo Alto Networks |
GlobalProtect App |
2025-03-12T18:35:35.409Z | 2026-02-26T19:09:35.030Z |
| CVE-2025-1427 |
7.8 (3.1)
|
CATPRODUCT File Parsing Uninitialized Variable Vulnerability |
Autodesk |
AutoCAD |
2025-03-13T16:46:05.612Z | 2026-02-26T19:09:34.877Z |
| CVE-2025-1428 |
7.8 (3.1)
|
CATPRODUCT File Parsing Out-of-Bounds Read Vulnerability |
Autodesk |
AutoCAD |
2025-03-13T16:46:22.348Z | 2026-02-26T19:09:34.702Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-14262 |
5.3 (4.0)
|
Jobs can be saved as workflows with wrong permissions … |
KNIME |
KNIME Business Hub |
2025-12-08T09:34:45.784Z | 2025-12-08T17:19:30.677Z |
| CVE-2025-53786 |
8 (3.1)
|
Microsoft Exchange Server Hybrid Deployment Elevation … |
Microsoft |
Microsoft Exchange Server 2016 Cumulative Update 23 |
2025-08-06T16:02:05.764Z | 2026-02-26T17:49:52.527Z |
| CVE-2024-34193 |
7.5 (3.1)
|
smanga 3.2.7 does not filter the file parameter a… |
n/a |
n/a |
2024-05-20T17:32:46.532Z | 2025-02-13T15:53:02.995Z |
| CVE-2026-21725 |
2.6 (3.1)
|
Authorization Bypass via TOCTOU in Grafana Datasource … |
Grafana |
Grafana |
2026-02-25T12:35:43.104Z | 2026-02-25T15:13:57.618Z |
| CVE-2025-5781 |
5.2 (3.1)
|
Information Exposure Vulnerability in Hitachi Configur… |
Hitachi |
Hitachi Ops Center API Configuration Manager |
2026-02-25T03:01:21.623Z | 2026-02-26T17:00:34.754Z |
| CVE-2026-25891 |
7.7 (4.0)
|
Fiber has an Arbitrary File Read in Static Middleware … |
gofiber |
fiber |
2026-02-24T21:08:48.675Z | 2026-02-24T21:39:11.118Z |
| CVE-2026-25882 |
5.5 (4.0)
|
Fiber has a Denial of Service Vulnerability via Route … |
gofiber |
fiber |
2026-02-24T21:05:28.211Z | 2026-02-24T21:39:51.170Z |
| CVE-2026-22553 |
9.8 (3.1)
9.3 (4.0)
|
InSAT MasterSCADA BUK-TS OS Command Injection |
InSAT |
MasterSCADA BUK-TS |
2026-02-24T20:56:14.099Z | 2026-02-26T19:39:01.753Z |
| CVE-2026-21410 |
9.8 (3.1)
9.3 (4.0)
|
InSAT MasterSCADA BUK-TS SQL Injection |
InSAT |
MasterSCADA BUK-TS |
2026-02-24T20:53:55.150Z | 2026-02-26T19:41:40.457Z |
| CVE-2026-3105 |
7.6 (3.1)
|
SQL Injection in Contact Activity API Sorting |
Mautic |
Mautic |
2026-02-24T18:39:03.352Z | 2026-02-26T20:07:06.187Z |
| CVE-2026-26342 |
8.7 (4.0)
|
Tattile Smart+ / Vega / Basic <= 1.181.5 Insufficient … |
Tattile s.r.l. |
Smart+ |
2026-02-24T18:41:09.935Z | 2026-02-26T19:58:40.958Z |
| CVE-2025-71228 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-18T14:21:49.570Z | 2026-02-26T23:07:42.270Z |
| CVE-2025-71226 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-18T14:21:47.369Z | 2026-02-26T23:08:49.357Z |
| CVE-2026-22979 |
N/A
|
net: fix memory leak in skb_segment_list for GRO packets |
Linux |
Linux |
2026-01-23T15:24:01.340Z | 2026-02-09T08:36:29.263Z |
| CVE-2026-22187 |
6.8 (4.0)
|
Bio-Formats <= 8.3.0 Memoizer Unsafe Deserialization v… |
Open Microscopy Environment |
Bio-Formats |
2026-01-07T20:27:06.679Z | 2026-01-07T21:34:15.949Z |
| CVE-2026-22186 |
4.6 (4.0)
|
Bio-Formats <= 8.3.0 XXE in Leica XLEF Metadata Parser |
Open Microscopy Environment |
Bio-Formats |
2026-01-07T20:26:48.324Z | 2026-01-07T21:17:25.927Z |
| CVE-2025-13876 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Rareprob HD Video Player All Formats App com.rocks.mus… |
Rareprob |
HD Video Player All Formats App |
2025-12-02T15:02:08.239Z | 2025-12-02T15:18:50.334Z |
| CVE-2019-25338 |
6.9 (4.0)
7.5 (3.1)
|
Dokuwiki 2018-04-22b - Username Enumeration |
Dokuwiki |
Dokuwiki |
2026-02-12T22:48:46.640Z | 2026-02-13T17:05:43.384Z |
| CVE-2019-25344 |
8.5 (4.0)
7.8 (3.1)
|
MobileGo 8.5.0 - Insecure File Permissions |
Wondershare |
MobileGo |
2026-02-12T19:02:34.097Z | 2026-02-12T19:53:21.720Z |
| CVE-2026-25999 |
7.1 (3.1)
|
Klaw has an improper authorisation check on /resetMemo… |
Aiven-Open |
klaw |
2026-02-11T21:00:30.271Z | 2026-02-12T21:21:30.163Z |
| CVE-2026-1669 |
7.1 (4.0)
|
Arbitrary File Read in Keras via HDF5 External Datasets |
Google |
Keras |
2026-02-11T22:10:10.031Z | 2026-02-12T14:53:02.502Z |
| CVE-2020-37212 |
4.6 (4.0)
7.5 (3.1)
|
SpotMSN 2.4.6 - 'Name' Denial of Service |
Nsasoft |
Nsauditor SpotMSN |
2026-02-11T20:37:30.697Z | 2026-02-12T15:49:28.820Z |
| CVE-2020-37211 |
4.6 (4.0)
7.5 (3.1)
|
SpotIM 2.2 - 'Name' Denial Of Service |
Nsasoft |
Nsauditor SpotIM |
2026-02-11T20:37:29.844Z | 2026-02-12T15:50:24.153Z |
| CVE-2020-37210 |
4.6 (4.0)
7.5 (3.1)
|
SpotIE 2.9.5 - 'Key' Denial of Service |
Nsasoft |
Nsauditor SpotIE |
2026-02-11T20:37:29.044Z | 2026-02-12T15:57:10.147Z |
| CVE-2020-37207 |
4.6 (4.0)
7.5 (3.1)
|
SpotDialup 1.6.7 - 'Key' Denial of Service |
Nsasoft |
Nsauditor SpotDialup |
2026-02-11T20:37:26.712Z | 2026-02-12T14:43:22.093Z |
| CVE-2020-37206 |
4.6 (4.0)
7.5 (3.1)
|
ShareAlarmPro Advanced Network Access Control - 'Key' … |
Nsasoft |
Nsauditor ShareAlarmPro Advanced Network Access Control |
2026-02-11T20:37:25.735Z | 2026-02-12T14:39:42.827Z |
| CVE-2020-37197 |
4.6 (4.0)
7.5 (3.1)
|
Dnss Domain Name Search Software - 'Name' Denial of Service |
Nsasoft |
Nsauditor Dnss Domain Name Search Software |
2026-02-11T20:37:18.127Z | 2026-02-12T14:27:54.924Z |
| CVE-2020-37199 |
4.6 (4.0)
7.5 (3.1)
|
NBMonitor 1.6.6.0 - 'Key' Denial of Service |
Nsasoft |
Nsauditor NBMonitor |
2026-02-11T20:37:19.695Z | 2026-02-12T14:30:22.833Z |
| CVE-2022-50552 |
N/A
|
blk-mq: use quiesced elevator switch when reinitializi… |
Linux |
Linux |
2025-10-07T15:21:14.060Z | 2025-12-23T13:29:55.028Z |
| CVE-2022-50551 |
N/A
|
wifi: brcmfmac: Fix potential shift-out-of-bounds in b… |
Linux |
Linux |
2025-10-07T15:21:13.391Z | 2025-12-23T13:29:53.692Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-25882 | Fiber is an Express inspired web framework written in Go. A denial of service vulnerability exists … | 2026-02-24T21:16:29.640 | 2026-02-27T03:18:05.253 |
| fkie_cve-2026-22553 | All versions of InSAT MasterSCADA BUK-TS are susceptible to OS command injection through a field in… | 2026-02-24T21:16:28.713 | 2026-02-27T03:15:54.487 |
| fkie_cve-2026-21410 | InSAT MasterSCADA BUK-TS is susceptible to SQL Injection through its main web interface. Malicious … | 2026-02-24T21:16:25.790 | 2026-02-27T03:13:28.340 |
| fkie_cve-2026-3105 | SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint used for retrievin… | 2026-02-24T20:27:50.713 | 2026-02-27T03:11:21.447 |
| fkie_cve-2026-26342 | Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior implement an au… | 2026-02-24T20:27:48.310 | 2026-02-27T03:10:51.703 |
| fkie_cve-2025-71228 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-18T15:18:40.670 | 2026-02-27T00:16:55.367 |
| fkie_cve-2025-71226 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-18T15:18:40.453 | 2026-02-27T00:16:55.283 |
| fkie_cve-2026-22979 | In the Linux kernel, the following vulnerability has been resolved: net: fix memory leak in skb_se… | 2026-01-23T16:15:53.893 | 2026-02-26T23:37:06.353 |
| fkie_cve-2026-22187 | Bio-Formats versions up to and including 8.3.0 perform unsafe Java deserialization of attacker-cont… | 2026-01-07T21:16:02.600 | 2026-02-26T23:36:40.770 |
| fkie_cve-2026-22186 | Bio-Formats versions up to and including 8.3.0 contain an XML External Entity (XXE) vulnerability i… | 2026-01-07T21:16:02.433 | 2026-02-26T23:36:18.317 |
| fkie_cve-2025-13876 | A security vulnerability has been detected in Rareprob HD Video Player All Formats App 12.1.372 on … | 2025-12-02T15:15:50.350 | 2026-02-26T23:30:03.733 |
| fkie_cve-2019-25338 | DokuWiki 2018-04-22b contains a username enumeration vulnerability in its password reset functional… | 2026-02-12T23:16:07.670 | 2026-02-26T23:27:50.380 |
| fkie_cve-2019-25344 | Wondershare MobileGo 8.5.0 contains an insecure file permissions vulnerability that allows local us… | 2026-02-12T20:16:01.233 | 2026-02-26T23:26:16.010 |
| fkie_cve-2026-25999 | Klaw is a self-service Apache Kafka Topic Management/Governance tool/portal. Prior to 2.10.2, there… | 2026-02-11T21:16:20.963 | 2026-02-26T23:25:10.173 |
| fkie_cve-2026-1669 | Arbitrary file read in the model loading mechanism (HDF5 integration) in Keras versions 3.0.0 throu… | 2026-02-11T23:16:03.750 | 2026-02-26T23:23:59.430 |
| fkie_cve-2020-37212 | SpotMSN 2.4.6 contains a denial of service vulnerability in the registration name input field that … | 2026-02-11T21:16:16.840 | 2026-02-26T23:23:31.830 |
| fkie_cve-2020-37211 | SpotIM 2.2 contains a denial of service vulnerability that allows attackers to crash the applicatio… | 2026-02-11T21:16:16.673 | 2026-02-26T23:23:09.800 |
| fkie_cve-2020-37210 | SpotIE 2.9.5 contains a denial of service vulnerability in the registration key input that allows a… | 2026-02-11T21:16:16.483 | 2026-02-26T23:22:38.663 |
| fkie_cve-2020-37207 | SpotDialup 1.6.7 contains a denial of service vulnerability in the registration key input field tha… | 2026-02-11T21:16:15.963 | 2026-02-26T23:22:15.940 |
| fkie_cve-2020-37206 | ShareAlarmPro contains a denial of service vulnerability that allows attackers to crash the applica… | 2026-02-11T21:16:15.797 | 2026-02-26T23:21:44.870 |
| fkie_cve-2020-37197 | Dnss Domain Name Search Software contains a denial of service vulnerability that allows attackers t… | 2026-02-11T21:16:14.297 | 2026-02-26T23:21:11.890 |
| fkie_cve-2020-37199 | NBMonitor 1.6.6.0 contains a denial of service vulnerability in its registration key input that all… | 2026-02-11T21:16:14.623 | 2026-02-26T23:20:24.633 |
| fkie_cve-2022-50552 | In the Linux kernel, the following vulnerability has been resolved: blk-mq: use quiesced elevator … | 2025-10-07T16:15:41.910 | 2026-02-26T23:17:59.900 |
| fkie_cve-2022-50551 | In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Fix potential … | 2025-10-07T16:15:41.397 | 2026-02-26T23:17:54.647 |
| fkie_cve-2022-50550 | In the Linux kernel, the following vulnerability has been resolved: blk-iolatency: Fix memory leak… | 2025-10-07T16:15:40.790 | 2026-02-26T23:17:48.157 |
| fkie_cve-2022-50549 | In the Linux kernel, the following vulnerability has been resolved: dm thin: Fix ABBA deadlock bet… | 2025-10-07T16:15:39.897 | 2026-02-26T23:17:42.357 |
| fkie_cve-2022-50548 | In the Linux kernel, the following vulnerability has been resolved: media: i2c: hi846: Fix memory … | 2025-10-07T16:15:39.620 | 2026-02-26T23:17:36.147 |
| fkie_cve-2022-50547 | In the Linux kernel, the following vulnerability has been resolved: media: solo6x10: fix possible … | 2025-10-07T16:15:39.353 | 2026-02-26T23:17:30.507 |
| fkie_cve-2022-50546 | In the Linux kernel, the following vulnerability has been resolved: ext4: fix uninititialized valu… | 2025-10-07T16:15:39.147 | 2026-02-26T23:17:25.710 |
| fkie_cve-2022-50545 | In the Linux kernel, the following vulnerability has been resolved: r6040: Fix kmemleak in probe a… | 2025-10-07T16:15:38.943 | 2026-02-26T23:17:18.533 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-hq36-j573-g8vp |
9.0 (3.1)
|
IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels pri… | 2023-07-06T21:15:07Z | 2026-02-25T18:31:22Z |
| ghsa-9v76-fx89-wh58 |
8.8 (3.1)
|
IBM Db2U 3.5, 4.0, and 4.5 is vulnerable to cross-site request forgery which could allow an attacke… | 2022-12-12T09:30:36Z | 2026-02-25T18:31:21Z |
| ghsa-jfw8-prg7-m323 |
5.5 (3.1)
|
In verifyBufferObject of Parcel.cpp, there is a possible out of bounds read due to an improper inpu… | 2022-05-24T19:11:24Z | 2026-02-25T18:31:18Z |
| ghsa-98cj-v6w2-849r |
5.5 (3.1)
|
In onResume of VoicemailSettingsFragment.java, there is a possible way to retrieve a trackable iden… | 2022-05-24T19:11:23Z | 2026-02-25T18:31:18Z |
| ghsa-8r42-h5pm-2vw2 |
7.8 (3.1)
|
An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-aft… | 2022-05-24T17:40:39Z | 2026-02-25T18:31:18Z |
| ghsa-6q4v-vwc9-rgq7 |
5.5 (3.1)
|
In getAvailableSubscriptionInfoList of SubscriptionController.java, there is a possible disclosure … | 2022-05-24T19:11:24Z | 2026-02-25T18:31:18Z |
| ghsa-69w4-9w32-v3qh |
7.8 (3.1)
|
A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to c… | 2022-05-24T22:28:18Z | 2026-02-25T18:31:18Z |
| ghsa-429q-mrc4-38fr |
7.1 (4.0)
|
Apache Camel Deserializes Untrusted Data in its LevelDB Component | 2026-02-23T09:31:23Z | 2026-02-25T18:07:17Z |
| ghsa-c3f3-cc42-xr9v |
9.1 (3.1)
|
Apache Camel: KeycloakSecurityPolicy does not validate issuer of JWT tokens against configured realm | 2026-02-23T09:31:23Z | 2026-02-25T18:04:33Z |
| ghsa-hg58-x52p-859c |
4.6 (3.1)
1.2 (4.0)
|
datapizza-ai has unsafe deserialization via pickle.loads() in RedisCache | 2026-02-23T06:30:18Z | 2026-02-25T17:58:36Z |
| ghsa-q5xx-fxv3-xxqf |
4.7 (3.1)
2.0 (4.0)
|
datapizza-ai: Server-Side Template Injection in ChatPromptTemplate via Jinja2 Template Handler | 2026-02-23T06:30:18Z | 2026-02-25T17:52:48Z |
| ghsa-f229-3862-4942 |
10.0 (3.1)
|
@enclave-vm/core is vulnerable to Sandbox Escape | 2026-02-25T17:26:23Z | 2026-02-25T17:26:23Z |
| ghsa-2rw7-x74f-jg35 |
1.2 (4.0)
|
pypdf has a possible infinite loop when loading circular /Prev entries in cross-reference streams | 2026-02-25T16:09:03Z | 2026-02-25T16:09:03Z |
| ghsa-xfvg-8v67-j7wp |
6.8 (4.0)
|
TypiCMS Core has Stored Cross-Site Scripting (XSS) via SVG File Upload | 2026-02-25T16:06:59Z | 2026-02-25T16:06:59Z |
| ghsa-vp6q-7m36-pq3w |
9.3 (3.1)
|
Bugsink is vulnerable to Stored XSS via Pygments fallback in stacktrace rendering | 2026-02-25T16:06:00Z | 2026-02-25T16:06:00Z |
| ghsa-fm8c-6m29-rp6j |
6.1 (3.1)
|
repostat: Reflected Cross-Site Scripting (XSS) via repo prop in RepoCard | 2026-02-25T16:04:41Z | 2026-02-25T16:04:41Z |
| ghsa-ggxq-2mg9-8966 |
7.2 (3.1)
|
Moodle has a Remote Code Execution risk via file restore | 2026-02-21T06:30:16Z | 2026-02-25T15:52:47Z |
| ghsa-gfw7-2v73-69wg |
6.5 (3.1)
|
Apache Airflow error reporting may expose full kwargs | 2026-02-21T03:31:39Z | 2026-02-25T15:42:56Z |
| ghsa-vx9q-rhv9-3jvg |
8.2 (4.0)
|
aircompressor Snappy and LZ4 Java-based decompressor implementation can leak information from reuse… | 2025-12-12T22:12:22Z | 2026-02-25T15:32:27Z |
| ghsa-qrr9-2772-633f |
5.5 (3.1)
|
RF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denia… | 2026-02-25T15:31:43Z | 2026-02-25T15:31:43Z |
| ghsa-g4x4-mr34-3pw3 |
4.7 (3.1)
|
NTS-KE protocol dissector crash in Wireshark 4.6.0 to 4.6.3 allows denial of service | 2026-02-25T15:31:43Z | 2026-02-25T15:31:43Z |
| ghsa-8p92-v8gg-gvcv |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this is… | 2026-02-25T15:31:43Z | 2026-02-25T15:31:43Z |
| ghsa-3g96-v3mg-9xp9 |
4.7 (3.1)
|
USB HID protocol dissector memory exhaustion in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows… | 2026-02-25T15:31:43Z | 2026-02-25T15:31:43Z |
| ghsa-whqp-34xh-xmxr |
4.3 (3.1)
|
In JetBrains TeamCity before 2025.11.3 missing authorization allowed project developers to add para… | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-px6f-q5hr-gqcp |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this vu… | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-c7jf-2rmf-hc7w |
4.3 (3.1)
|
In JetBrains TeamCity before 2025.11.3 open redirect was possible in the React project creation flow | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-4x44-gf2f-7mh8 |
2.3 (3.1)
|
In JetBrains TeamCity before 2025.11.3 disabling versioned settings left a credentials config on disk | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-26wv-wm3r-6rvc |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected is an unknown f… | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-w36g-f98m-wm99 |
2.6 (3.1)
|
A time-of-create-to-time-of-use (TOCTOU) vulnerability lets recently deleted-then-recreated data so… | 2026-02-25T15:31:39Z | 2026-02-25T15:31:39Z |
| ghsa-jqcj-pmgf-5g3q |
9.8 (3.1)
|
Missing Authentication for Critical Function vulnerability in ePati Cyber Security Technologies I… | 2026-02-25T15:31:39Z | 2026-02-25T15:31:39Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-186 |
8.8 (3.1)
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffwe… | rdiffweb | 2023-09-29T14:15:00+00:00 | 2023-10-02T20:24:26.790735+00:00 |
| pysec-2023-185 |
3.7 (3.1)
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-09-27T15:19:00+00:00 | 2023-09-30T05:24:54.158504+00:00 |
| pysec-2023-172 |
4.3 (3.1)
|
The Create Single Payment application of SAP S/4HANA - versions 100, 101, 102, 103, 104, … | hana-ml | 2023-09-12T02:15:00Z | 2023-09-29T22:26:12.812435Z |
| pysec-2023-183 |
|
opencv-python versions before v4.8.1.78 bundled libwebp binaries in wheels that are vulne… | opencv-python | 2023-09-29T21:15:28.039030+00:00 | |
| pysec-2023-184 |
|
opencv-python-headless versions before v4.8.1.78 bundled libwebp binaries in wheels that … | opencv-python-headless | 2023-09-29T21:15:27.980982+00:00 | |
| pysec-2023-181 |
|
opencv-contrib-python versions before v4.8.1.78 bundled libwebp binaries in wheels that a… | opencv-contrib-python | 2023-09-29T21:15:27.924031+00:00 | |
| pysec-2023-182 |
|
opencv-contrib-python-headless versions before v4.8.1.78 bundled libwebp binaries in whee… | opencv-contrib-python-headless | 2023-09-29T21:15:27.863960+00:00 | |
| pysec-2023-180 |
4.3 (3.1)
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-09-27T15:19:00+00:00 | 2023-09-29T20:23:39.578838+00:00 |
| pysec-2023-179 |
|
This affects versions of the package pydash before 6.0.0. A number of pydash methods such… | pydash | 2023-09-28T05:15:00+00:00 | 2023-09-28T10:29:02.604249+00:00 |
| pysec-2023-175 |
|
Pillow versions before v10.0.1 bundled libwebp binaries in wheels that are vulnerable to … | pillow | 2023-09-25T17:25:13.946374Z | |
| pysec-2023-177 |
|
An issue in Gevent before version 23.9.0 allows a remote attacker to escalate privileges … | gevent | 2023-09-25T12:15:00+00:00 | 2023-09-25T14:28:09.019811+00:00 |
| pysec-2023-176 |
6.5 (3.1)
|
GeoNode is an open source platform that facilitates the creation, sharing, and collaborat… | geonode | 2023-09-15T21:15:00+00:00 | 2023-09-20T17:25:44.504117+00:00 |
| pysec-2023-174 |
|
imagecodecs versions before v2023.9.18 bundled libwebp binaries in wheels that are vulner… | imagecodecs | 2023-09-20T05:12:42.403706+00:00 | |
| pysec-2023-173 |
5.3 (3.1)
|
Piccolo is an ORM and query builder which supports asyncio. In versions 0.120.0 and prior… | piccolo | 2023-09-12T21:15:00+00:00 | 2023-09-19T05:26:00.954782+00:00 |
| pysec-2023-171 |
|
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authent… | apache-airflow | 2023-09-12T12:15:00+00:00 | 2023-09-12T14:27:23.735580+00:00 |
| pysec-2023-170 |
|
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authent… | apache-airflow | 2023-09-12T12:15:00+00:00 | 2023-09-12T14:27:23.660908+00:00 |
| pysec-2023-169 |
7.8 (3.1)
|
Git Providers can read from the wrong environment because they get the same cache directo… | salt | 2023-09-05T11:15:00+00:00 | 2023-09-08T20:23:17.288300+00:00 |
| pysec-2023-168 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language. In affected versions the order of evaluation… | vyper | 2023-09-04T18:15:00+00:00 | 2023-09-08T16:30:59.497777+00:00 |
| pysec-2023-167 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language. For the following (probably non-exhaustive) … | vyper | 2023-09-04T18:15:00+00:00 | 2023-09-08T15:22:00.929480+00:00 |
| pysec-2023-166 |
5.3 (3.1)
|
Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving se… | salt | 2023-09-05T11:15:00+00:00 | 2023-09-07T20:23:20.197102+00:00 |
| pysec-2023-141 |
5.4 (3.1)
|
A stored cross-site scripting (XSS) vulnerability in Netbox v3.4.7 allows attackers to ex… | pynetbox | 2023-08-10T20:15:00Z | 2023-09-07T15:50:00.665697Z |
| pysec-2023-165 |
6.5 (3.1)
|
GitPython is a python library used to interact with Git repositories. In order to resolv… | gitpython | 2023-08-30T22:15:00+00:00 | 2023-09-07T14:33:25.683922+00:00 |
| pysec-2023-164 |
4.7 (3.1)
|
borgbackup is an opensource, deduplicating archiver with compression and authenticated en… | borgbackup | 2023-08-30T18:15:00+00:00 | 2023-09-06T16:31:20.448538+00:00 |
| pysec-2023-161 |
7.8 (3.1)
|
GitPython is a python library used to interact with Git repositories. When resolving a p… | gitpython | 2023-08-28T18:15:00+00:00 | 2023-09-05T22:26:14.587281+00:00 |
| pysec-2023-160 |
6.5 (3.1)
|
A flaw was found in the Keylime registrar that could allow a bypass of the challenge-resp… | keylime | 2023-08-25T17:15:00+00:00 | 2023-09-05T20:22:36.414406+00:00 |
| pysec-2023-159 |
7.7 (3.1)
|
RestrictedPython is a restricted execution environment for Python to run untrusted code. … | restrictedpython | 2023-08-30T18:15:00+00:00 | 2023-09-05T16:32:17.658660+00:00 |
| pysec-2023-158 |
8.0 (3.1)
|
The session fixation vulnerability allowed the authenticated user to continue accessing A… | apache-airflow | 2023-08-23T16:15:00+00:00 | 2023-09-04T08:29:37.781470+00:00 |
| pysec-2023-157 |
6.1 (3.1)
|
jupyter-server is the backend for Jupyter web applications. Improper cross-site credentia… | jupyter-server | 2023-08-28T21:15:00+00:00 | 2023-09-01T20:23:47.344401+00:00 |
| pysec-2023-156 |
8.8 (3.1)
|
Deserialization of Untrusted Data, Inclusion of Functionality from Untrusted Control Sphe… | apache-airflow-providers-apache-spark | 2023-08-28T08:15:00+00:00 | 2023-09-01T18:27:11.679668+00:00 |
| pysec-2023-155 |
6.1 (3.1)
|
jupyter-server is the backend for Jupyter web applications. Open Redirect Vulnerability. … | jupyter-server | 2023-08-28T21:15:00+00:00 | 2023-09-01T16:31:48.441782+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33112 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.711610Z |
| gsd-2024-33017 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.711408Z |
| gsd-2024-33214 | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vu… | 2024-04-24T05:02:09.710943Z |
| gsd-2024-33425 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.710668Z |
| gsd-2024-33232 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.710450Z |
| gsd-2024-33348 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.710252Z |
| gsd-2024-33442 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.710054Z |
| gsd-2024-33048 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.709832Z |
| gsd-2024-33020 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.709634Z |
| gsd-2024-33060 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.709441Z |
| gsd-2024-33243 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.709233Z |
| gsd-2024-33427 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.709032Z |
| gsd-2024-33019 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.708836Z |
| gsd-2024-33244 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.708588Z |
| gsd-2024-33122 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.708386Z |
| gsd-2024-33046 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.708183Z |
| gsd-2024-33246 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.707963Z |
| gsd-2024-33314 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.707734Z |
| gsd-2024-33155 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.707542Z |
| gsd-2024-33207 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.707334Z |
| gsd-2024-33514 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.707115Z |
| gsd-2024-33151 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.706908Z |
| gsd-2024-33223 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.706662Z |
| gsd-2024-33354 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.706465Z |
| gsd-2024-33291 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.706255Z |
| gsd-2024-33324 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.706012Z |
| gsd-2024-33086 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.705818Z |
| gsd-2024-33004 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.705613Z |
| gsd-2024-33148 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.705420Z |
| gsd-2024-33424 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.705230Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-418 | Malicious code in nanoid-js (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:39:02Z |
| mal-2026-395 | Malicious code in natateste (npm) | 2026-01-21T03:56:27Z | 2026-01-23T01:39:02Z |
| mal-2026-394 | Malicious code in n8n-nodes-zl-vietts (npm) | 2026-01-21T03:58:08Z | 2026-01-23T01:39:02Z |
| mal-2026-393 | Malicious code in manage-root (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:02Z |
| mal-2026-374 | Malicious code in mised-discordjs-selfbot-v14 (npm) | 2026-01-20T07:54:05Z | 2026-01-23T01:39:02Z |
| mal-2026-369 | Malicious code in mw-shared-utils (npm) | 2026-01-20T06:13:03Z | 2026-01-23T01:39:02Z |
| mal-2026-368 | Malicious code in mw-proto-models (npm) | 2026-01-20T06:13:03Z | 2026-01-23T01:39:02Z |
| mal-2026-344 | Malicious code in ofjaaah-security-lib (npm) | 2026-01-19T00:59:52Z | 2026-01-23T01:39:02Z |
| mal-2026-343 | Malicious code in ofjaaah-internal-utils (npm) | 2026-01-19T00:59:52Z | 2026-01-23T01:39:02Z |
| mal-2026-342 | Malicious code in ofjaaah-build-tools (npm) | 2026-01-19T00:59:52Z | 2026-01-23T01:39:02Z |
| mal-2026-341 | Malicious code in ofjaaah-auth-module (npm) | 2026-01-19T00:59:52Z | 2026-01-23T01:39:02Z |
| mal-2026-340 | Malicious code in libsignal-yazxzcode (npm) | 2026-01-19T00:46:52Z | 2026-01-23T01:39:02Z |
| mal-2026-327 | Malicious code in mapkit-example-vanillajs (npm) | 2026-01-17T07:00:15Z | 2026-01-23T01:39:02Z |
| mal-2026-436 | Malicious code in jquery-ajaxchimp (npm) | 2026-01-21T07:13:50Z | 2026-01-23T01:39:01Z |
| mal-2026-417 | Malicious code in kanban-webcomponent (npm) | 2026-01-21T04:39:38Z | 2026-01-23T01:39:01Z |
| mal-2026-416 | Malicious code in hw-app-eth (npm) | 2026-01-21T04:34:17Z | 2026-01-23T01:39:01Z |
| mal-2026-392 | Malicious code in jsonwebauth (npm) | 2026-01-21T04:26:22Z | 2026-01-23T01:39:01Z |
| mal-2026-391 | Malicious code in internallib_v962 (npm) | 2026-01-21T04:28:02Z | 2026-01-23T01:39:01Z |
| mal-2026-390 | Malicious code in internallib_v325 (npm) | 2026-01-21T04:28:02Z | 2026-01-23T01:39:01Z |
| mal-2026-362 | Malicious code in health-check-node (npm) | 2026-01-20T03:55:11Z | 2026-01-23T01:39:01Z |
| mal-2026-339 | Malicious code in internallib_v355 (npm) | 2026-01-19T01:00:08Z | 2026-01-23T01:39:01Z |
| mal-2026-338 | Malicious code in internal-company-sdk (npm) | 2026-01-19T00:59:52Z | 2026-01-23T01:39:01Z |
| mal-2026-415 | Malicious code in dotenv-expanded (npm) | 2026-01-21T04:51:10Z | 2026-01-23T01:39:00Z |
| mal-2026-389 | Malicious code in genki-analytics (npm) | 2026-01-21T04:02:04Z | 2026-01-23T01:39:00Z |
| mal-2026-361 | Malicious code in gu-global-ec-uikit (npm) | 2026-01-20T04:16:09Z | 2026-01-23T01:39:00Z |
| mal-2026-360 | Malicious code in excel-to-json-test (npm) | 2026-01-20T04:16:09Z | 2026-01-23T01:39:00Z |
| mal-2026-359 | Malicious code in dreame-claude (npm) | 2026-01-20T04:20:58Z | 2026-01-23T01:39:00Z |
| mal-2026-358 | Malicious code in dot-env-buffer (npm) | 2026-01-20T03:53:30Z | 2026-01-23T01:39:00Z |
| mal-2026-355 | Malicious code in dux-portal-privacy (npm) | 2026-01-20T03:43:51Z | 2026-01-23T01:39:00Z |
| mal-2026-354 | Malicious code in dux-portal (npm) | 2026-01-20T03:43:52Z | 2026-01-23T01:39:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2748 | Red Hat Enterprise Linux (ABRT): Schwachstelle ermöglicht Privilegieneskalation | 2025-12-04T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2704 | Apache Struts: Schwachstelle ermöglicht Denial of Service | 2025-12-01T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2607 | Red Hat Enterprise Linux (lasso): Eine Schwachstelle ermöglichen Codeausführung | 2025-11-16T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2439 | Dovecot IMAP Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und Offenlegung von Informationen | 2025-10-28T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2427 | strongSwan (eap-mschapv2 plugin): Schwachstelle ermöglicht Codeausführung und DoS | 2025-10-27T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2260 | poppler: Schwachstelle ermöglicht Codeausführung | 2025-10-12T22:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2075 | Podman: Schwachstelle ermöglicht Manipulation von Dateien | 2025-09-16T22:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-1866 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-1638 | Nvidia Treiber: Mehrere Schwachstellen | 2025-07-23T22:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-1623 | Mozilla Firefox , Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2025-07-22T22:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-1395 | Mozilla Firefox: Mehrere Schwachstellen | 2025-06-24T22:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-1160 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2025-05-27T22:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-1140 | Red Hat Enterprise Linux (libsoup): Mehrere Schwachstellen | 2025-05-25T22:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0954 | Apache ActiveMQ: Schwachstelle ermöglicht Denial of Service | 2025-05-06T22:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0362 | Linux Kernel: Mehrere Schwachstellen | 2025-02-12T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0112 | Nvidia Treiber: Mehrere Schwachstellen | 2025-01-16T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0104 | Kubernetes: Schwachstelle ermöglicht Codeausführung | 2025-01-15T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3754 | shadow: Schwachstelle ermöglicht Erlangen von Benutzerrechten | 2024-12-26T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3436 | GNOME: Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-0558 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2024-03-05T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-0404 | QT: Schwachstelle ermöglicht Denial of Service | 2024-02-15T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-0219 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-01-25T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2022-0497 | libsndfile: Schwachstelle ermöglicht Denial of Service | 2022-01-05T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-2809 | AMD- und Intel-Prozessoren (PCIe IDE): Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2806 | Fortinet FortiAuthenticator: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-12-09T23:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2803 | MongoDB: Schwachstelle ermöglicht Beeinträchtigung von Integrität und Verfügbarkeit | 2025-12-09T23:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2801 | Adobe Acrobat und Reader: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2800 | Adobe ColdFusion: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2799 | Docker Desktop: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-09T23:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2796 | Ivanti Endpoint Manager: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:6239 | Red Hat Security Advisory: resource-agents security update | 2024-09-03T18:17:04+00:00 | 2026-02-17T07:51:14+00:00 |
| rhsa-2024:6211 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.6.1 security update | 2024-09-03T10:05:20+00:00 | 2026-02-17T07:51:14+00:00 |
| rhsa-2024:6210 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.4 security update | 2024-09-03T10:05:02+00:00 | 2026-02-17T07:51:13+00:00 |
| rhsa-2024:6209 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.10 security update | 2024-09-03T10:04:55+00:00 | 2026-02-17T07:51:12+00:00 |
| rhsa-2024:6162 | Red Hat Security Advisory: python-urllib3 security update | 2024-09-03T06:05:32+00:00 | 2026-02-17T07:51:12+00:00 |
| rhsa-2024:5633 | Red Hat Security Advisory: fence-agents security update | 2024-08-20T16:12:34+00:00 | 2026-02-17T07:51:07+00:00 |
| rhsa-2024:5627 | Red Hat Security Advisory: fence-agents security update | 2024-08-20T15:50:18+00:00 | 2026-02-17T07:51:07+00:00 |
| rhsa-2024:5622 | Red Hat Security Advisory: fence-agents security update | 2024-08-20T15:55:27+00:00 | 2026-02-17T07:51:06+00:00 |
| rhsa-2024:5547 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.1 bug fix and security update | 2024-08-19T07:41:38+00:00 | 2026-02-17T07:51:04+00:00 |
| rhsa-2024:5526 | Red Hat Security Advisory: python-urllib3 security update | 2024-08-19T02:06:49+00:00 | 2026-02-17T07:51:02+00:00 |
| rhsa-2024:5309 | Red Hat Security Advisory: python-urllib3 security update | 2024-08-13T15:39:29+00:00 | 2026-02-17T07:51:01+00:00 |
| rhsa-2024:5258 | Red Hat Security Advisory: container-tools:rhel8 security update | 2024-08-13T09:16:53+00:00 | 2026-02-17T07:51:00+00:00 |
| rhsa-2024:5041 | Red Hat Security Advisory: python-urllib3 security update | 2024-08-06T15:23:30+00:00 | 2026-02-17T07:50:59+00:00 |
| rhsa-2024:4746 | Red Hat Security Advisory: fence-agents update | 2024-07-23T15:32:48+00:00 | 2026-02-17T07:50:56+00:00 |
| rhsa-2024:4730 | Red Hat Security Advisory: fence-agents update | 2024-07-23T14:58:03+00:00 | 2026-02-17T07:50:54+00:00 |
| rhsa-2024:4744 | Red Hat Security Advisory: resource-agents update | 2024-07-23T15:29:38+00:00 | 2026-02-17T07:50:53+00:00 |
| rhsa-2024:4591 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.0 security, enhancement & bug fix update | 2024-07-17T13:09:39+00:00 | 2026-02-17T07:50:50+00:00 |
| rhsa-2024:4422 | Red Hat Security Advisory: fence-agents security update | 2024-07-09T11:04:40+00:00 | 2026-02-17T07:50:48+00:00 |
| rhsa-2024:11381 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.4 security enhancements and bug fixes | 2024-12-18T16:28:31+00:00 | 2026-02-17T07:50:46+00:00 |
| rhsa-2024:11293 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.6.4 security enhancements and bug fixes | 2024-12-17T19:52:29+00:00 | 2026-02-17T07:50:43+00:00 |
| rhsa-2024:10990 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.9.10 | 2025-01-15T10:46:45+00:00 | 2026-02-17T07:50:39+00:00 |
| rhsa-2024:11023 | Red Hat Security Advisory: HawtIO 4.1.0 for Red Hat build of Apache Camel 4 Release and security update. | 2024-12-12T20:00:23+00:00 | 2026-02-17T07:50:38+00:00 |
| rhsa-2024:10962 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Jaeger) 3.4 release | 2024-12-11T16:47:10+00:00 | 2026-02-17T07:50:35+00:00 |
| rhsa-2024:10917 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Jaeger) 3.4 release | 2024-12-10T11:04:35+00:00 | 2026-02-17T07:50:35+00:00 |
| rhsa-2024:10906 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.5 security and bug fix update | 2024-12-10T01:37:19+00:00 | 2026-02-17T07:50:33+00:00 |
| rhsa-2024:10865 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.12.1 bug fixes and container updates | 2024-12-05T19:46:00+00:00 | 2026-02-17T07:50:32+00:00 |
| rhsa-2024:10857 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.7.2 security updates and bug fixes | 2024-12-05T16:41:20+00:00 | 2026-02-17T07:50:30+00:00 |
| rhsa-2024:10762 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 2024-12-03T16:20:16+00:00 | 2026-02-17T07:50:28+00:00 |
| rhsa-2024:10236 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.17.0 release | 2024-11-25T19:44:38+00:00 | 2026-02-17T07:50:27+00:00 |
| rhsa-2024:10186 | Red Hat Security Advisory: ACS 4.5 enhancement update | 2024-11-22T01:06:56+00:00 | 2026-02-17T07:50:26+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-15-013-04a | GE Multilink Switch Vulnerabilities (Update A) | 2015-10-16T06:00:00.000000Z | 2025-06-06T22:32:44.963520Z |
| icsa-15-013-03 | Phoenix Contact Software ProConOs and MultiProg Authentication Vulnerability | 2015-10-16T06:00:00.000000Z | 2025-06-06T22:32:38.508014Z |
| icsa-15-013-02 | Clorius Controls A/S ISC SCADA Insecure Java Client Web Authentication | 2015-10-16T06:00:00.000000Z | 2025-06-06T22:32:32.033557Z |
| icsa-15-013-01 | Siemens SIMATIC WinCC Sm@rtClient iOS Application Authentication Vulnerabilities | 2015-10-16T06:00:00.000000Z | 2025-06-06T22:32:12.568337Z |
| icsa-15-012-01c | CodeWrights GmbH HART Device DTM Vulnerability (Update C) | 2015-10-15T06:00:00.000000Z | 2025-06-06T22:32:06.053252Z |
| icsa-15-012-01b | CodeWrights GmbH HART DTM Vulnerability (Update B) | 2015-10-15T06:00:00.000000Z | 2025-06-06T22:31:59.580273Z |
| icsa-15-012-01a | CodeWrights GmbH HART DTM Vulnerability (Update A) | 2015-10-15T06:00:00.000000Z | 2025-06-06T22:31:53.116696Z |
| icsa-15-012-01 | CodeWrights GmbH HART DTM Vulnerability | 2015-10-15T06:00:00.000000Z | 2025-06-06T22:31:46.333944Z |
| icsa-12-129-01 | WellinTech KingSCADA Insecure Password Encryption | 2012-02-09T07:00:00.000000Z | 2025-06-06T21:45:26.636405Z |
| icsa-12-122-01 | WellinTech KingView DLL Hijack Vulnerability | 2012-02-02T07:00:00.000000Z | 2025-06-06T21:45:20.208792Z |
| icsa-12-102-05 | Siemens Scalance S Multiple Security Vulnerabilities | 2012-01-13T07:00:00.000000Z | 2025-06-06T21:45:13.758298Z |
| icsa-12-102-04 | Siemens Scalance X Buffer Overflow Vulnerability | 2012-01-13T07:00:00.000000Z | 2025-06-06T21:45:07.306451Z |
| icsa-12-102-03 | MICROSYS PROMOTIC Use After Free Vulnerability | 2012-01-13T07:00:00.000000Z | 2025-06-06T21:45:00.844061Z |
| icsa-12-102-02 | Koyo Ecom Modules Vulnerabilities | 2012-01-13T07:00:00.000000Z | 2025-06-06T21:44:54.405200Z |
| icsa-12-102-01 | Certec atvise webMI2ADS Vulnerabilities | 2012-01-13T07:00:00.000000Z | 2025-06-06T21:44:47.952815Z |
| icsa-12-095-01a | ABB Multiple Components Buffer Overflow | 2012-01-06T07:00:00.000000Z | 2025-06-06T21:44:41.492952Z |
| icsa-12-088-01a | Rockwell Automation FactoryTalk RNADiagReceiver | 2012-12-30T07:00:00.000000Z | 2025-06-06T21:44:35.026913Z |
| icsa-12-083-01 | Ecava IntegraXor ActiveX Directory Traversal | 2012-12-25T07:00:00.000000Z | 2025-06-06T21:44:28.588784Z |
| icsa-12-032-02 | GE Intelligent Platforms Proficy Plant Applications Memory Corruption Vulnerabilities | 2012-11-04T06:00:00.000000Z | 2025-06-06T21:44:08.900302Z |
| icsa-12-032-01 | GE Proficy Historian ihDataArchiver | 2012-11-04T06:00:00.000000Z | 2025-06-06T21:44:02.422128Z |
| icsa-15-223-01 | Schneider Electric IMT25 DTM Vulnerability | 2015-05-14T06:00:00.000000Z | 2025-06-06T21:43:55.748554Z |
| icsa-15-211-01 | Schneider Electric InduSoft Web Studio and InTouch Machine Edition 2014 Password Storage Vulnerability | 2015-05-02T06:00:00.000000Z | 2025-06-06T21:43:48.989760Z |
| icsa-15-202-03b | Siemens RUGGEDCOM ROS and ROX-based Devices TLS POODLE Vulnerability (Update B) | 2015-04-23T06:00:00.000000Z | 2025-06-06T21:43:42.534859Z |
| icsa-15-195-01 | Siemens SICAM MIC Authentication Bypass Vulnerability | 2015-04-16T06:00:00.000000Z | 2025-06-06T21:43:23.165608Z |
| icsa-15-181-01 | Baxter SIGMA Spectrum Infusion System Vulnerabilities | 2015-04-02T06:00:00.000000Z | 2025-06-06T21:43:16.616537Z |
| icsa-15-176-02 | PACTware Exceptional Conditions Vulnerability | 2015-03-28T06:00:00.000000Z | 2025-06-06T21:43:10.139031Z |
| icsa-15-176-01 | Siemens Climatix BACnet/IP Communication Module Cross-site Scripting Vulnerability | 2015-03-28T06:00:00.000000Z | 2025-06-06T21:43:03.687724Z |
| icsa-15-174-01 | Hospira Symbiq Infusion System Vulnerability | 2015-03-26T06:00:00.000000Z | 2025-06-06T21:42:57.240178Z |
| icsa-15-167-01 | Schneider Electric StruxureWare Building Expert Plaintext Credentials Vulnerability | 2015-03-19T06:00:00.000000Z | 2025-06-06T21:42:37.652958Z |
| icsa-15-162-01a | RLE Nova-Wind Turbine HMI Unsecure Credentials Vulnerability (Update A) | 2015-03-14T06:00:00.000000Z | 2025-06-06T21:42:31.195189Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-asa-ssl-vpn-heap-zlx3fdx | Cisco Adaptive Security Appliance Software Clientless SSL VPN Heap Overflow Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T16:25:45+00:00 |
| cisco-sa-ucs-xss-uqsme3l7 | Cisco UCS Director JavaScript Cross-Site Scripting Vulnerability | 2022-05-18T16:00:00+00:00 | 2022-05-18T16:00:00+00:00 |
| cisco-sa-snort-app-bypass-csbycatq | Multiple Cisco Products Snort Application Detection Engine Policy Bypass Vulnerability | 2021-01-13T16:00:00+00:00 | 2022-05-16T18:45:16+00:00 |
| cisco-sa-ewlc-priv-esc-ybvhko5 | Cisco IOS XE Software for Cisco Catalyst 9000 Family Switches and Catalyst 9000 Family Wireless Controllers Privilege Escalation Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-05-12T19:35:11+00:00 |
| cisco-sa-iox-yuxq6hfj | Cisco IOx Application Hosting Environment Vulnerabilities | 2022-04-13T16:00:00+00:00 | 2022-05-12T15:50:29+00:00 |
| cisco-sa-ros-dos-x7h7xhkk | Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-06T20:13:28+00:00 |
| cisco-sa-clamav-dos-vl9x58p4 | ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: May 2022 | 2022-05-04T16:00:00+00:00 | 2022-05-04T20:36:47+00:00 |
| cisco-sa-vmge-infodc-wpskamhp | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-smb-rv-cmd-inj-8pv9jmjd | Cisco Small Business RV Series Routers Command Injection Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-sbrv-rce-oylqbl9u | Cisco Small Business RV Series Routers Remote Code Execution Vulnerability | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-nfvis-mul-7dysrx9 | Cisco Enterprise NFV Infrastructure Software Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-vpndtls-dos-tunzlev | Cisco Adaptive Security Appliance and Cisco Firepower Threat Defense Software AnyConnect SSL VPN Denial of Service Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-05-02T17:17:11+00:00 |
| cisco-sa-uswg-fdbps-xttrkpp6 | Cisco Umbrella Secure Web Gateway File Decryption Bypass Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-04-29T19:14:17+00:00 |
| cisco-sa-lsplus-z6aqeojk | Cisco IOS XR Software for ASR 9000 Series Routers Lightspeed-Plus Line Cards Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-28T21:28:53+00:00 |
| cisco-sa-fmc-security-bypass-jhod29gg | Cisco Firepower Management Center File Upload Security Bypass Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-28T16:29:27+00:00 |
| cisco-sa-fmc-xss-sfpecvgt | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-28T16:24:30+00:00 |
| cisco-sa-ftd-xmlinj-8gwjgzke | Cisco Firepower Threat Defense Software XML Injection Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-tcp-dos-km9shhou | Cisco Firepower Threat Defense Software TCP Proxy Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-snort3-dos-aq38lvdm | Cisco Firepower Threat Defense Software DNS Enforcement Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-snort-dos-hd2hfgm | Cisco Firepower Threat Defense Software Snort Out of Memory Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-sidns-bypass-3pza5po | Cisco Firepower Threat Defense Software Security Intelligence DNS Feed Bypass Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-dos-jnnjm4wb | Cisco Firepower Threat Defense Software Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-amp-local-dos-cufwrjxt | Cisco Firepower Threat Defense Software Local Malware Analysis Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-fmc-xss-qxz4uakm | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-fmc-infdisc-gujwrwqu | Cisco Firepower Management Center Software Information Disclosure Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-snort-dos-9d3hjluj | Multiple Cisco Products Snort Modbus Denial of Service Vulnerability | 2022-01-19T16:00:00+00:00 | 2022-04-26T19:41:55+00:00 |
| cisco-sa-webex-xss-w47amqak | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-04-20T16:00:00+00:00 |
| cisco-sa-vim-privesc-t2tsfuf | Cisco Virtualized Infrastructure Manager Privilege Escalation Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-04-20T16:00:00+00:00 |
| cisco-sa-uva-static-key-6rqtrs4c | Cisco Umbrella Virtual Appliance Static SSH Host Key Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-04-20T16:00:00+00:00 |
| cisco-sa-ucm-dos-zhs9x9kd | Cisco Unified Communications Products Denial of Service Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-04-20T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-42308 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2024-08-02T00:00:00.000Z | 2026-02-21T00:52:44.000Z |
| msrc_cve-2024-43819 | kvm: s390: Reject memory region operations for ucontrol VMs | 2024-08-02T00:00:00.000Z | 2026-02-21T00:51:28.000Z |
| msrc_cve-2024-43872 | RDMA/hns: Fix soft lockup under heavy CEQE load | 2024-08-02T00:00:00.000Z | 2026-02-21T00:50:41.000Z |
| msrc_cve-2022-3996 | X.509 Policy Constraints Double Locking | 2022-12-02T00:00:00.000Z | 2026-02-21T00:50:29.000Z |
| msrc_cve-2024-44944 | netfilter: ctnetlink: use helper function to calculate expect ID | 2024-08-02T00:00:00.000Z | 2026-02-21T00:49:41.000Z |
| msrc_cve-2024-43871 | devres: Fix memory leakage caused by driver API devm_free_percpu() | 2024-08-02T00:00:00.000Z | 2026-02-21T00:48:52.000Z |
| msrc_cve-2023-7256 | Double-free in libpcap before 1.10.5 with remote packet capture support. | 2024-08-02T00:00:00.000Z | 2026-02-21T00:48:04.000Z |
| msrc_cve-2024-8006 | NULL pointer dereference in libpcap before 1.10.5 with remote packet capture support | 2024-08-02T00:00:00.000Z | 2026-02-21T00:46:02.000Z |
| msrc_cve-2024-33877 | HDF5 Library through 1.14.3 has a heap-based buffer overflow in H5T__conv_struct_opt in H5Tconv.c. | 2024-05-02T07:00:00.000Z | 2026-02-21T00:27:19.000Z |
| msrc_cve-2024-33873 | HDF5 Library through 1.14.3 has a heap-based buffer overflow in H5D__scatter_mem in H5Dscatgath.c. | 2024-05-02T07:00:00.000Z | 2026-02-21T00:25:40.000Z |
| msrc_cve-2024-32624 | HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5T__ref_mem_setnull in H5Tref.c (called from H5T__conv_ref in H5Tconv.c) resulting in the corruption of the instruction pointer. | 2024-05-02T07:00:00.000Z | 2026-02-21T00:24:30.000Z |
| msrc_cve-2024-26993 | fs: sysfs: Fix reference leak in sysfs_break_active_protection() | 2024-05-02T07:00:00.000Z | 2026-02-21T00:19:46.000Z |
| msrc_cve-2024-26951 | wireguard: netlink: check for dangling peer via is_dead instead of empty list | 2024-05-02T07:00:00.000Z | 2026-02-21T00:14:58.000Z |
| msrc_cve-2024-26961 | mac802154: fix llsec key resources release in mac802154_llsec_key_del | 2024-05-02T07:00:00.000Z | 2026-02-21T00:13:24.000Z |
| msrc_cve-2024-26973 | fat: fix uninitialized field in nostale filehandles | 2024-05-02T07:00:00.000Z | 2026-02-21T00:10:05.000Z |
| msrc_cve-2024-27000 | serial: mxs-auart: add spinlock around changing cts state | 2024-05-02T07:00:00.000Z | 2026-02-21T00:08:09.000Z |
| msrc_cve-2024-26965 | clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays | 2024-05-02T07:00:00.000Z | 2026-02-21T00:05:05.000Z |
| msrc_cve-2024-26984 | nouveau: fix instmem race condition around ptr stores | 2024-05-02T07:00:00.000Z | 2026-02-21T00:03:09.000Z |
| msrc_cve-2024-26966 | clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays | 2024-05-02T07:00:00.000Z | 2026-02-21T00:01:02.000Z |
| msrc_cve-2024-26977 | pci_iounmap(): Fix MMIO mapping leak | 2024-05-02T07:00:00.000Z | 2026-02-20T23:59:17.000Z |
| msrc_cve-2024-4418 | Libvirt: stack use-after-free in virnetclientioeventloop() | 2024-05-02T07:00:00.000Z | 2026-02-20T23:56:18.000Z |
| msrc_cve-2024-34250 | A heap buffer overflow vulnerability was discovered in Bytecode Alliance wasm-micro-runtime v2.0.0 which allows a remote attacker to cause at least a denial of service via the "wasm_loader_check_br" function in core/iwasm/interpreter/wasm_loader.c. | 2024-05-02T07:00:00.000Z | 2026-02-20T23:54:27.000Z |
| msrc_cve-2024-24788 | Malformed DNS message can cause infinite loop in net | 2024-05-02T07:00:00.000Z | 2026-02-20T23:50:48.000Z |
| msrc_cve-2024-34064 | Jinja vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter | 2024-05-02T07:00:00.000Z | 2026-02-20T23:45:43.000Z |
| msrc_cve-2024-34069 | Werkzeug's improper usage of a pathname and improper CSRF protection results in the remote command execution | 2024-05-02T07:00:00.000Z | 2026-02-20T23:41:41.000Z |
| msrc_cve-2023-51779 | bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition. | 2023-12-01T08:00:00.000Z | 2026-02-20T23:38:03.000Z |
| msrc_cve-2024-32886 | Vitess vulnerable to infinite memory consumption and vtgate crash | 2024-05-02T07:00:00.000Z | 2026-02-20T23:37:40.000Z |
| msrc_cve-2024-1151 | Kernel: stack overflow problem in open vswitch kernel module leading to dos | 2024-02-02T08:00:00.000Z | 2026-02-20T23:36:40.000Z |
| msrc_cve-2024-24787 | Arbitrary code execution during build on Darwin in cmd/go | 2024-05-02T07:00:00.000Z | 2026-02-20T23:35:27.000Z |
| msrc_cve-2024-26583 | tls: fix race between async notify and socket close | 2024-02-02T08:00:00.000Z | 2026-02-20T23:34:20.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202302-1621 | Apache Commons FileUpload before 1.5 does not limit the number of request parts to be pro… | 2025-12-22T21:33:38.115000Z |
| var-201408-0092 | The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, … | 2025-12-22T21:33:37.910000Z |
| var-202109-1368 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2025-12-22T21:33:37.675000Z |
| var-200009-0023 | VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x b… | 2025-12-22T21:33:35.891000Z |
| var-201904-1325 | A memory corruption issue was addressed with improved memory handling. This issue affecte… | 2025-12-22T21:33:31.766000Z |
| var-201011-0043 | The WebCore::HTMLLinkElement::process function in WebCore/html/HTMLLinkElement.cpp in Web… | 2025-12-22T21:31:52.213000Z |
| var-202105-1475 | An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implement… | 2025-12-22T21:31:52.133000Z |
| var-202002-1191 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i… | 2025-12-22T21:31:51.864000Z |
| var-202110-1513 | This issue was addressed with improved checks. This issue is fixed in iOS 14.8 and iPadOS… | 2025-12-22T21:31:50.577000Z |
| var-200703-0009 | Integer overflow in Apple QuickTime before 7.1.5, when installed on Windows operating sys… | 2025-12-22T21:31:50.120000Z |
| var-200809-0402 | Heap-based buffer overflow in Apple Type Services (ATS) in Apple Mac OS X 10.4.11 and 10.… | 2025-12-22T21:31:16.956000Z |
| var-202205-1319 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2025-12-22T21:31:07.633000Z |
| var-201008-0170 | Array index error in the t42_parse_sfnts function in type42/t42parse.c in FreeType before… | 2025-12-22T21:31:06.732000Z |
| var-201210-0132 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T21:31:06.118000Z |
| var-202002-1479 | A denial of service issue was addressed with improved memory handling. This issue is fixe… | 2025-12-22T21:30:35.093000Z |
| var-201904-0742 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T21:29:57.556000Z |
| var-201008-1004 | The loginDefaultEncrypt algorithm in loginLib in Wind River VxWorks before 6.9 does not p… | 2025-12-22T21:29:26.751000Z |
| var-201905-1248 | Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some m… | 2025-12-22T21:29:25.023000Z |
| var-202112-0562 | It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete… | 2025-12-22T21:29:24.076000Z |
| var-201804-1180 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2025-12-22T21:29:15.174000Z |
| var-201006-1241 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2025-12-22T21:29:14.689000Z |
| var-201211-0370 | Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on … | 2025-12-22T21:29:14.577000Z |
| var-200801-0561 | Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 th… | 2025-12-22T21:29:14.408000Z |
| var-200703-0007 | Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and … | 2025-12-22T21:29:05.205000Z |
| var-202105-0131 | A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packe… | 2025-12-22T21:29:05.048000Z |
| var-201605-0076 | Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL bef… | 2025-12-22T21:28:34.421000Z |
| var-201201-0259 | Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash value… | 2025-12-22T21:28:34.141000Z |
| var-202205-1304 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2025-12-22T21:28:03.111000Z |
| var-201006-1139 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2025-12-22T21:27:58.672000Z |
| var-201912-0544 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T21:27:58.073000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-002691 | Multiple vulnerabilities in OMRON products | 2022-11-10T09:46+09:00 | 2022-11-10T09:46+09:00 |
| jvndb-2022-002444 | Multiple vulnerabilities in Buffalo network devices | 2022-10-05T17:44+09:00 | 2022-10-13T16:28+09:00 |
| jvndb-2022-002443 | Privilege Escalation Vulnerability in Hitachi Storage Plug-in for VMware vCenter | 2022-10-05T17:28+09:00 | 2022-10-05T17:28+09:00 |
| jvndb-2022-002364 | DoS Vulnerability in uCosminexus TP1/Client/J and Cosminexus Service Coordinator | 2022-09-14T11:34+09:00 | 2022-09-14T11:34+09:00 |
| jvndb-2022-002346 | Multiple vulnerabilities in Contec FLEXLAN FX3000 and FX2000 series | 2022-09-02T18:08+09:00 | 2022-09-02T18:08+09:00 |
| jvndb-2022-002295 | Multiple vulnerabilities in Trend Micro Security | 2022-08-19T11:42+09:00 | 2022-08-19T11:42+09:00 |
| jvndb-2016-000113 | Apache Struts vulnerable to input validation bypass | 2016-06-20T17:20+09:00 | 2022-08-09T14:10+09:00 |
| jvndb-2016-000112 | Apache Struts vulnerable to validation bypass in Getter method | 2016-06-20T17:19+09:00 | 2022-08-09T14:08+09:00 |
| jvndb-2016-000111 | Apache Struts vulnerable to cross-site request forgery | 2016-06-20T17:18+09:00 | 2022-08-09T14:05+09:00 |
| jvndb-2020-000055 | Apache Struts 2 vulnerable to denial-of-service (DoS) | 2020-08-25T13:59+09:00 | 2022-08-09T13:57+09:00 |
| jvndb-2020-000084 | Apache Struts 2 vulnerable to remote code execution (S2-061) | 2020-12-11T15:09+09:00 | 2022-08-09T13:55+09:00 |
| jvndb-2022-000062 | Kaitai Struct: compiler vulnerable to denial-of-service (DoS) | 2022-08-04T15:14+09:00 | 2022-08-04T15:14+09:00 |
| jvndb-2022-002143 | Information Disclosure Vulnerability in Hitachi Automation Director and Hitachi Ops Center Automator | 2022-08-01T17:10+09:00 | 2022-08-01T17:10+09:00 |
| jvndb-2022-000061 | "JustSystems JUST Online Update for J-License" starts a program with an unquoted file path | 2022-07-28T13:40+09:00 | 2022-07-28T13:40+09:00 |
| jvndb-2021-000007 | OS command injection vulnerability in multiple Infoscience Corporation log management tools | 2021-01-27T18:31+09:00 | 2022-07-26T15:53+09:00 |
| jvndb-2022-001953 | Growi vulnerable to weak password requirements | 2022-06-15T17:47+09:00 | 2022-06-15T17:47+09:00 |
| jvndb-2021-000073 | Multiple vulnerabilities in Cybozu Garoon | 2021-08-02T16:42+09:00 | 2022-05-24T15:16+09:00 |
| jvndb-2022-001800 | Installer of Trend Micro HouseCall for Home Networks may insecurely load Dynamic Link Libraries | 2022-05-13T16:24+09:00 | 2022-05-13T16:24+09:00 |
| jvndb-2021-000097 | Multiple vulnerabilities in CLUSTERPRO X and EXPRESSCLUSTER X | 2021-10-29T15:22+09:00 | 2022-04-20T14:03+09:00 |
| jvndb-2022-001526 | Trend Micro Antivirus for Mac vulnerable to privilege escalation | 2022-04-07T16:58+09:00 | 2022-04-07T16:58+09:00 |
| jvndb-2017-000174 | Self-Extracting Encrypted Files created by AttacheCase may insecurely load Dynamic Link Libraries | 2017-07-14T13:38+09:00 | 2022-03-31T17:43+09:00 |
| jvndb-2022-001494 | Trend Micro Apex Central and Trend Micro Apex Central as a Service vulnerable to improper check for file contents | 2022-03-31T17:25+09:00 | 2022-03-31T17:25+09:00 |
| jvndb-2021-004912 | Multiple vulnerabilities in multiple ELECOM routers | 2021-12-02T17:16+09:00 | 2022-03-30T16:11+09:00 |
| jvndb-2021-000108 | Multiple vulnerabilities in multiple ELECOM LAN routers | 2021-11-30T16:23+09:00 | 2022-03-29T16:18+09:00 |
| jvndb-2022-001477 | Netcommunity OG410X and OG810X VoIP gateway/Hikari VoIP adapter for business offices vulnerable to OS command injection | 2022-03-23T12:08+09:00 | 2022-03-23T12:08+09:00 |
| jvndb-2022-000021 | Multiple vulnerabilities in KINGSOFT "WPS Office" and "KINGSOFT Internet Security" | 2022-03-16T14:46+09:00 | 2022-03-16T14:46+09:00 |
| jvndb-2021-008345 | Installer of Trend Micro Portable Security may insecurely load Dynamic Link Libraries | 2022-03-14T16:43+09:00 | 2022-03-14T16:43+09:00 |
| jvndb-2022-001404 | Installer of Trend Micro Password Manager may insecurely load Dynamic Link Libraries | 2022-03-11T15:55+09:00 | 2022-03-11T15:55+09:00 |
| jvndb-2022-000016 | UNIVERGE WA Series vulnerable to OS command injection | 2022-03-10T14:31+09:00 | 2022-03-10T14:31+09:00 |
| jvndb-2022-001383 | Directory Permission Vulnerability in Hitachi Ops Center Viewpoint | 2022-03-07T15:45+09:00 | 2022-03-07T15:45+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:4092-1 | Security update for elfutils | 2025-11-24T09:08:35Z | 2025-11-24T09:08:35Z |
| suse-ru-2025:4092-1 | Security update for elfutils | 2025-11-24T09:08:35Z | 2025-11-24T09:08:35Z |
| suse-su-2025:4187-1 | Security update for nvidia-container-toolkit | 2025-11-24T07:58:47Z | 2025-11-24T07:58:47Z |
| suse-su-2025:4186-1 | Security update for glib2 | 2025-11-24T07:57:58Z | 2025-11-24T07:57:58Z |
| suse-su-2025:4185-1 | Security update for podman | 2025-11-24T07:57:21Z | 2025-11-24T07:57:21Z |
| suse-su-2025:4184-1 | Security update for tomcat | 2025-11-24T07:56:53Z | 2025-11-24T07:56:53Z |
| suse-su-2025:4183-1 | Security update for sssd | 2025-11-24T07:56:37Z | 2025-11-24T07:56:37Z |
| suse-su-2025:4182-1 | Security update for sssd | 2025-11-24T07:56:25Z | 2025-11-24T07:56:25Z |
| suse-su-2025:4181-1 | Security update for sssd | 2025-11-24T07:55:46Z | 2025-11-24T07:55:46Z |
| suse-su-2025:4180-1 | Security update for curl | 2025-11-24T07:54:49Z | 2025-11-24T07:54:49Z |
| suse-su-2025:4174-1 | Security update for MozillaFirefox | 2025-11-24T02:51:09Z | 2025-11-24T02:51:09Z |
| suse-su-2025:4173-1 | Security update for MozillaFirefox | 2025-11-24T02:50:06Z | 2025-11-24T02:50:06Z |
| suse-su-2025:4073-2 | Security update for runc | 2025-11-24T02:49:00Z | 2025-11-24T02:49:00Z |
| suse-su-2025:4172-1 | Security update for the Linux Kernel (Live Patch 60 for SUSE Linux Enterprise 15 SP3) | 2025-11-23T20:04:58Z | 2025-11-23T20:04:58Z |
| suse-su-2025:4171-1 | Security update for the Linux Kernel (Live Patch 51 for SUSE Linux Enterprise 15 SP3) | 2025-11-23T13:34:34Z | 2025-11-23T13:34:34Z |
| suse-su-2025:4170-1 | Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5) | 2025-11-23T11:34:32Z | 2025-11-23T11:34:32Z |
| suse-su-2025:4169-1 | Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2025-11-22T08:34:35Z | 2025-11-22T08:34:35Z |
| suse-su-2025:4164-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2025-11-22T08:34:31Z | 2025-11-22T08:34:31Z |
| suse-su-2025:4167-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2025-11-22T08:05:38Z | 2025-11-22T08:05:38Z |
| suse-su-2025:4161-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise 15 SP6) | 2025-11-22T08:05:20Z | 2025-11-22T08:05:20Z |
| suse-su-2025:4160-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise 15 SP6) | 2025-11-22T07:34:28Z | 2025-11-22T07:34:28Z |
| suse-su-2025:4159-1 | Security update for tomcat | 2025-11-21T14:31:51Z | 2025-11-21T14:31:51Z |
| suse-su-2025:4158-1 | Security update for cups-filters | 2025-11-21T14:30:38Z | 2025-11-21T14:30:38Z |
| suse-su-2025:4157-1 | Security update for podman | 2025-11-21T14:30:17Z | 2025-11-21T14:30:17Z |
| suse-su-2025:4156-1 | Security update for podman | 2025-11-21T14:29:28Z | 2025-11-21T14:29:28Z |
| suse-su-2025:21063-1 | Security update for glib2 | 2025-11-21T13:14:32Z | 2025-11-21T13:14:32Z |
| suse-su-2025:21062-1 | Security update for grub2 | 2025-11-21T13:08:14Z | 2025-11-21T13:08:14Z |
| suse-su-2025:4152-1 | Security update for grub2 | 2025-11-21T09:10:39Z | 2025-11-21T09:10:39Z |
| suse-su-2025:21137-1 | Security update for alloy | 2025-11-20T17:15:36Z | 2025-11-20T17:15:36Z |
| suse-su-2025:21136-1 | Security update for runc | 2025-11-20T16:43:58Z | 2025-11-20T16:43:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15568-1 | ognl-3.4.7-1.1 on GA media | 2025-09-19T00:00:00Z | 2025-09-19T00:00:00Z |
| opensuse-su-2025:15567-1 | mybatis-3.5.19-1.1 on GA media | 2025-09-19T00:00:00Z | 2025-09-19T00:00:00Z |
| opensuse-su-2025:15566-1 | govulncheck-vulndb-0.0.20250918T182144-1.1 on GA media | 2025-09-19T00:00:00Z | 2025-09-19T00:00:00Z |
| opensuse-su-2025:15565-1 | MozillaFirefox-143.0-1.1 on GA media | 2025-09-19T00:00:00Z | 2025-09-19T00:00:00Z |
| opensuse-su-2025:15564-1 | govulncheck-vulndb-0.0.20250917T170349-1.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15563-1 | cups-filters-1.28.17-5.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15562-1 | cups-2.4.14-1.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15561-1 | coredns-1.12.4-2.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15560-1 | MozillaThunderbird-140.3.0-1.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15559-1 | element-web-1.11.112-1.1 on GA media | 2025-09-17T00:00:00Z | 2025-09-17T00:00:00Z |
| opensuse-su-2025:15558-1 | element-desktop-1.11.112-1.1 on GA media | 2025-09-17T00:00:00Z | 2025-09-17T00:00:00Z |
| opensuse-su-2025:15557-1 | autogen-5.18.16-8.1 on GA media | 2025-09-17T00:00:00Z | 2025-09-17T00:00:00Z |
| opensuse-su-2025:15556-1 | tkimg-2.1.0-1.1 on GA media | 2025-09-16T00:00:00Z | 2025-09-16T00:00:00Z |
| opensuse-su-2025:15555-1 | firefox-esr-140.3.0-1.1 on GA media | 2025-09-16T00:00:00Z | 2025-09-16T00:00:00Z |
| opensuse-su-2025:15554-1 | watchexec-2.3.2-2.1 on GA media | 2025-09-15T00:00:00Z | 2025-09-15T00:00:00Z |
| opensuse-su-2025:15553-1 | kernel-devel-6.16.7-1.1 on GA media | 2025-09-14T00:00:00Z | 2025-09-14T00:00:00Z |
| opensuse-su-2025:15552-1 | cargo-packaging-1.3.0+0-2.1 on GA media | 2025-09-14T00:00:00Z | 2025-09-14T00:00:00Z |
| opensuse-su-2025:15551-1 | cargo-c-0.10.3~git0.ee7d7ef-4.1 on GA media | 2025-09-14T00:00:00Z | 2025-09-14T00:00:00Z |
| opensuse-su-2025:15550-1 | cargo-audit-0.21.2~git0.18e58c2-2.1 on GA media | 2025-09-14T00:00:00Z | 2025-09-14T00:00:00Z |
| opensuse-su-2025:15549-1 | liblog4cxx-devel-1.5.0-1.1 on GA media | 2025-09-12T00:00:00Z | 2025-09-12T00:00:00Z |
| opensuse-su-2025:15548-1 | chromedriver-140.0.7339.127-1.1 on GA media | 2025-09-12T00:00:00Z | 2025-09-12T00:00:00Z |
| opensuse-su-2025:15547-1 | xen-4.20.1_04-1.1 on GA media | 2025-09-11T00:00:00Z | 2025-09-11T00:00:00Z |
| opensuse-su-2025:15546-1 | orthanc-gdcm-1.7-1.1 on GA media | 2025-09-11T00:00:00Z | 2025-09-11T00:00:00Z |
| opensuse-su-2025:15545-1 | libssh-config-0.11.3-1.1 on GA media | 2025-09-11T00:00:00Z | 2025-09-11T00:00:00Z |
| opensuse-su-2025:15544-1 | kernel-devel-6.16.6-1.1 on GA media | 2025-09-11T00:00:00Z | 2025-09-11T00:00:00Z |
| opensuse-su-2025:15543-1 | ImageMagick-7.1.2.3-1.1 on GA media | 2025-09-11T00:00:00Z | 2025-09-11T00:00:00Z |
| opensuse-su-2025:15542-1 | trivy-0.66.0-1.1 on GA media | 2025-09-10T00:00:00Z | 2025-09-10T00:00:00Z |
| opensuse-su-2025:15541-1 | libtiff-devel-32bit-4.7.0-9.1 on GA media | 2025-09-10T00:00:00Z | 2025-09-10T00:00:00Z |
| opensuse-su-2025:15540-1 | rustup-1.28.2~0-2.1 on GA media | 2025-09-10T00:00:00Z | 2025-09-10T00:00:00Z |
| opensuse-su-2025:15539-1 | python311-xmltodict-0.15.1-1.1 on GA media | 2025-09-10T00:00:00Z | 2025-09-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-apisix-2025-62232 | Apache APISIX: basic-auth logs plaintext credentials at info level | 2025-11-06T12:47:05.456Z | 2025-11-06T13:25:46.476Z |
| bit-apisix-2025-46647 | Apache APISIX: improper validation of issuer from introspection discovery url in plugin openid-connect | 2025-07-04T07:28:48.965Z | 2025-11-06T13:25:46.476Z |
| bit-apisix-2025-27446 | Apache APISIX Java Plugin Runner: Local listening file permissions in APISIX plugin runner allow a local attacker to elevate privileges | 2025-07-16T07:50:40.089Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2025-54090 | Apache HTTP Server: 'RewriteCond expr' always evaluates to true in 2.4.64 | 2025-07-29T05:38:18.535Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2025-53020 | Apache HTTP Server: HTTP/2 DoS by Memory Increase | 2025-07-16T07:56:41.763Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2025-49812 | Apache HTTP Server: mod_ssl TLS upgrade attack | 2025-07-16T07:56:35.377Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2025-49630 | Apache HTTP Server: mod_proxy_http2 denial of service | 2025-07-16T07:56:28.763Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2025-23048 | Apache HTTP Server: mod_ssl access control bypass with session resumption | 2025-07-16T07:56:19.860Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2024-47252 | Apache HTTP Server: mod_ssl error log variable escaping | 2025-07-16T07:56:11.862Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2024-43394 | Apache HTTP Server: SSRF on Windows due to UNC paths | 2025-07-16T07:56:03.162Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2024-43204 | Apache HTTP Server: SSRF with mod_headers setting Content-Type header | 2025-07-16T07:55:53.967Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2024-42516 | Apache HTTP Server: HTTP response splitting | 2025-07-16T07:55:45.463Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2024-39573 | Apache HTTP Server: mod_rewrite proxy handler substitution | 2024-07-03T07:16:17.249Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2024-38477 | Apache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious request | 2024-07-03T07:16:30.955Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2024-38476 | Apache HTTP Server may use exploitable/malicious backend application output to run local handlers via internal redirect | 2024-07-03T07:16:44.458Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2024-38475 | Apache HTTP Server weakness in mod_rewrite when first segment of substitution matches filesystem path. | 2024-07-03T07:17:00.654Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2024-27316 | Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames | 2024-04-06T18:17:01.271Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2023-38709 | Apache HTTP Server: HTTP response splitting | 2024-04-06T18:17:43.564Z | 2025-11-06T13:25:46.476Z |
| bit-airflow-2025-62503 | Apache Airflow: Privilege boundary bypass in bulk APIs (create action can upsert existing Pools/Connections/Variables) | 2025-11-06T12:53:02.259Z | 2025-11-06T13:25:46.476Z |
| bit-airflow-2025-62402 | Apache Airflow: Airflow 3 API: /api/v2/dagReports executes DAG Python in API | 2025-11-06T12:52:57.926Z | 2025-11-06T13:25:46.476Z |
| bit-airflow-2025-54941 | Apache Airflow: Command injection in "example_dag_decorator" | 2025-11-06T12:52:52.554Z | 2025-11-06T13:25:46.476Z |
| bit-airflow-2025-54831 | Apache Airflow: Connection sensitive details exposed to users with READ permissions | 2025-10-01T14:39:16.556Z | 2025-11-06T13:25:46.476Z |
| bit-vault-2025-12044 | Vault Vulnerable to Denial of Service Due to Rate Limit Regression | 2025-10-28T11:51:06.109Z | 2025-10-28T12:07:16.062Z |
| bit-vault-2025-11621 | Vault AWS auth method bypass due to AWS client cache | 2025-10-28T11:51:04.350Z | 2025-10-28T12:07:16.062Z |
| bit-gitlab-2025-11974 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-10-28T12:03:52.509Z | 2025-10-28T12:07:16.062Z |
| bit-gitlab-2025-11447 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-10-28T12:03:49.010Z | 2025-10-28T12:07:16.062Z |
| bit-gitlab-2025-10497 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-10-28T12:03:32.925Z | 2025-10-28T12:07:16.062Z |
| bit-minio-2025-62506 | MinIO vulnerable to privilege escalation via session policy bypass in service accounts and STS | 2025-10-21T09:34:30.739Z | 2025-10-24T15:07:36.996Z |
| bit-dotnet-2025-55248 | .NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability | 2025-10-24T14:39:43.546Z | 2025-10-24T15:07:36.996Z |
| bit-dotnet-2025-55247 | .NET Elevation of Privilege Vulnerability | 2025-10-24T14:39:42.027Z | 2025-10-24T15:07:36.996Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-03481 | Google Android逻辑错误漏洞(CNVD-2026-0348103) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03480 | Google Android逻辑错误漏洞(CNVD-2026-0348004) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03479 | Google Android逻辑错误漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-05019 | TOTOLINK T10缓冲区溢出漏洞 | 2025-12-25 | 2026-01-14 |
| cnvd-2026-05014 | Tenda WH450 goform/PPTPUserSetting文件缓冲区溢出漏洞 | 2026-01-09 | 2026-01-14 |
| cnvd-2026-04916 | Land Record System /aboutus.php文件SQL注入漏洞 | 2025-05-14 | 2026-01-14 |
| cnvd-2026-04133 | Online Security Guards Hiring System search-request.php文件跨站点脚本漏洞 | 2023-02-09 | 2026-01-14 |
| cnvd-2026-04132 | Men Salon Management System index.php组件SQL注入漏洞 | 2024-04-10 | 2026-01-14 |
| cnvd-2026-04131 | Men Salon Management System index.php文件SQL注入漏洞 | 2024-05-30 | 2026-01-14 |
| cnvd-2026-03478 | Land Record System admin-profile.php文件跨站脚本漏洞 | 2025-01-06 | 2026-01-14 |
| cnvd-2026-03477 | Land Record System aboutus.php文件跨站脚本漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03476 | Land Record System property-details.php文件SQL注入漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03475 | Land Record System contactus.php文件跨站脚本漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03474 | Land Record System login.php文件SQL注入漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03473 | Land Record System /index.php文件SQL注入漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03472 | Land Record System edit-propertytype.php文件跨站脚本漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03471 | Land Record System search-property.php文件SQL注入漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03470 | Land Record System search-property.php文件跨站脚本漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03469 | Land Record System add-property.php文件跨站脚本漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03468 | Land Record System /index.php文件跨站脚本漏洞 | 2025-01-10 | 2026-01-14 |
| cnvd-2026-03467 | Land Record System contactus.php文件跨站脚本漏洞 | 2025-01-21 | 2026-01-14 |
| cnvd-2026-03466 | Land Record System manage-propertytype.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03188 | Land Record System forgot-password.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03187 | Land Record System edit-propertytype.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03186 | Land Record System /contactus.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03185 | Land Record System todate参数SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03184 | Land Record System bwdates-reports-details.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03183 | Land Record System admin-profile.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03165 | Online Security Guards Hiring System search-request.php文件SQL注入漏洞 | 2025-03-27 | 2026-01-14 |
| cnvd-2026-03164 | Online Security Guards Hiring System bwdates-reports-details.php文件SQL注入漏洞 | 2025-03-27 | 2026-01-14 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0599 | Multiples vulnérabilités dans Oracle Database Server | 2025-07-18T00:00:00.000000 | 2025-07-18T00:00:00.000000 |
| certfr-2025-avi-0597 | Multiples vulnérabilités dans Grafana | 2025-07-18T00:00:00.000000 | 2025-07-18T00:00:00.000000 |
| certfr-2025-avi-0596 | Multiples vulnérabilités dans ISC BIND | 2025-07-17T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| certfr-2025-avi-0595 | Vulnérabilité dans Cisco Unified Intelligence Center | 2025-07-17T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| certfr-2025-avi-0594 | Multiples vulnérabilités dans Microsoft Edge | 2025-07-17T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| certfr-2025-avi-0577 | Multiples vulnérabilités dans Microsoft Windows | 2025-07-09T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| certfr-2025-avi-0593 | Multiples vulnérabilités dans les produits Atlassian | 2025-07-16T00:00:00.000000 | 2025-07-16T00:00:00.000000 |
| certfr-2025-avi-0592 | Multiples vulnérabilités dans les produits VMware | 2025-07-16T00:00:00.000000 | 2025-07-16T00:00:00.000000 |
| certfr-2025-avi-0591 | Multiples vulnérabilités dans Google Chrome | 2025-07-16T00:00:00.000000 | 2025-07-16T00:00:00.000000 |
| certfr-2025-avi-0590 | Multiples vulnérabilités dans les produits IBM | 2025-07-11T00:00:00.000000 | 2025-07-11T00:00:00.000000 |
| certfr-2025-avi-0589 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-07-11T00:00:00.000000 | 2025-07-11T00:00:00.000000 |
| certfr-2025-avi-0588 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-07-11T00:00:00.000000 | 2025-07-11T00:00:00.000000 |
| certfr-2025-avi-0587 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-07-11T00:00:00.000000 | 2025-07-11T00:00:00.000000 |
| certfr-2025-avi-0586 | Multiples vulnérabilités dans Apache HTTP Server | 2025-07-11T00:00:00.000000 | 2025-07-11T00:00:00.000000 |
| certfr-2025-avi-0585 | Multiples vulnérabilités dans VMware Tanzu | 2025-07-11T00:00:00.000000 | 2025-07-11T00:00:00.000000 |
| certfr-2025-avi-0584 | Multiples vulnérabilités dans Apache Tomcat | 2025-07-11T00:00:00.000000 | 2025-07-11T00:00:00.000000 |
| certfr-2025-avi-0583 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-07-10T00:00:00.000000 | 2025-07-10T00:00:00.000000 |
| certfr-2025-avi-0582 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-07-10T00:00:00.000000 | 2025-07-10T00:00:00.000000 |
| certfr-2025-avi-0581 | Multiples vulnérabilités dans GitLab | 2025-07-10T00:00:00.000000 | 2025-07-10T00:00:00.000000 |
| certfr-2025-avi-0580 | Multiples vulnérabilités dans VMware Tanzu | 2025-07-10T00:00:00.000000 | 2025-07-10T00:00:00.000000 |
| certfr-2025-avi-0579 | Multiples vulnérabilités dans les produits Microsoft | 2025-07-09T00:00:00.000000 | 2025-07-09T00:00:00.000000 |
| certfr-2025-avi-0578 | Multiples vulnérabilités dans Microsoft Azure | 2025-07-09T00:00:00.000000 | 2025-07-09T00:00:00.000000 |
| certfr-2025-avi-0576 | Multiples vulnérabilités dans Microsoft Office | 2025-07-09T00:00:00.000000 | 2025-07-09T00:00:00.000000 |
| certfr-2025-avi-0575 | Multiples vulnérabilités dans les produits Fortinet | 2025-07-09T00:00:00.000000 | 2025-07-09T00:00:00.000000 |
| certfr-2025-avi-0574 | Multiples vulnérabilités dans les produits Ivanti | 2025-07-09T00:00:00.000000 | 2025-07-09T00:00:00.000000 |
| certfr-2025-avi-0573 | Multiples vulnérabilités dans Node.js | 2025-07-09T00:00:00.000000 | 2025-07-09T00:00:00.000000 |
| certfr-2025-avi-0572 | Multiples vulnérabilités dans Suricata | 2025-07-09T00:00:00.000000 | 2025-07-09T00:00:00.000000 |
| certfr-2025-avi-0571 | Multiples vulnérabilités dans Xen | 2025-07-09T00:00:00.000000 | 2025-07-09T00:00:00.000000 |
| certfr-2025-avi-0570 | Multiples vulnérabilités dans MongoDB | 2025-07-09T00:00:00.000000 | 2025-07-09T00:00:00.000000 |
| certfr-2025-avi-0569 | Multiples vulnérabilités dans Adobe ColdFusion | 2025-07-09T00:00:00.000000 | 2025-07-09T00:00:00.000000 |