Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2024-3727 |
8.3 (3.1)
|
Containers/image: digest type does not guarantee valid type |
|
|
2024-05-09T14:57:21.327Z | 2026-02-27T21:07:30.936Z |
| CVE-2026-28400 |
7.6 (3.1)
|
Docker Model Runner Unauthenticated Runtime Flag Injec… |
docker |
model-runner |
2026-02-27T21:06:12.418Z | 2026-02-27T21:06:12.418Z |
| CVE-2026-28355 |
1.3 (4.0)
|
"PWA" Canarytoken Vulnerable to Stored Self Cross-Site… |
thinkst |
canarytokens |
2026-02-27T21:04:13.445Z | 2026-02-27T21:04:13.445Z |
| CVE-2026-28352 |
6.5 (3.1)
|
Indico missing access check in event series management API |
indico |
indico |
2026-02-27T21:01:45.740Z | 2026-02-27T21:01:45.740Z |
| CVE-2026-28351 |
6.9 (4.0)
|
Manipulated RunLengthDecode streams can exhaust RAM |
py-pdf |
pypdf |
2026-02-27T20:59:16.839Z | 2026-02-27T20:59:16.839Z |
| CVE-2026-27593 |
9.3 (3.1)
|
Statamic is vulnerable to account takeover via passwor… |
statamic |
cms |
2026-02-24T21:38:17.354Z | 2026-02-27T20:56:07.561Z |
| CVE-2026-2634 |
9.8 (3.1)
|
Spoofed web content presented under trusted domains us… |
Mozilla |
Firefox for iOS |
2026-02-24T13:33:24.725Z | 2026-02-27T20:55:35.483Z |
| CVE-2026-27572 |
6.9 (4.0)
|
Wasmtime can panic when adding excessive fields to a `… |
bytecodealliance |
wasmtime |
2026-02-24T21:31:50.186Z | 2026-02-27T20:55:29.879Z |
| CVE-2026-21523 |
8 (3.1)
|
GitHub Copilot and Visual Studio Code Remote Code Exec… |
Microsoft |
Microsoft Visual Studio Code CoPilot Chat Extension |
2026-02-10T17:51:25.077Z | 2026-02-27T20:55:27.536Z |
| CVE-2026-21518 |
8.8 (3.1)
|
GitHub Copilot and Visual Studio Code Security Feature… |
Microsoft |
Microsoft Visual Studio Code CoPilot Chat Extension |
2026-02-10T17:51:15.121Z | 2026-02-27T20:55:26.967Z |
| CVE-2026-26119 |
8.8 (3.1)
|
Windows Admin Center Elevation of Privilege Vulnerability |
Microsoft |
Windows Admin Center |
2026-02-17T22:56:03.973Z | 2026-02-27T20:55:26.444Z |
| CVE-2026-20841 |
7.8 (3.1)
|
Windows Notepad App Remote Code Execution Vulnerability |
Microsoft |
Windows Notepad |
2026-02-10T17:51:50.412Z | 2026-02-27T20:55:25.907Z |
| CVE-2026-20846 |
7.5 (3.1)
|
GDI+ Denial of Service Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:49.875Z | 2026-02-27T20:55:25.328Z |
| CVE-2026-21222 |
5.5 (3.1)
|
Windows Kernel Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:49.321Z | 2026-02-27T20:55:24.756Z |
| CVE-2026-21228 |
8.1 (3.1)
|
Azure Local Remote Code Execution Vulnerability |
Microsoft |
Azure Local |
2026-02-10T17:51:48.818Z | 2026-02-27T20:55:24.108Z |
| CVE-2026-21231 |
7.8 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:48.230Z | 2026-02-27T20:55:23.461Z |
| CVE-2026-21232 |
7.8 (3.1)
|
Windows HTTP.sys Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 version 22H3 |
2026-02-10T17:51:47.717Z | 2026-02-27T20:55:22.834Z |
| CVE-2026-21237 |
7 (3.1)
|
Windows Subsystem for Linux Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 21H2 |
2026-02-10T17:51:47.120Z | 2026-02-27T20:55:22.218Z |
| CVE-2026-21238 |
7.8 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:46.513Z | 2026-02-27T20:55:21.677Z |
| CVE-2026-21239 |
7.8 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:45.888Z | 2026-02-27T20:55:21.062Z |
| CVE-2026-21241 |
7 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 11 version 22H3 |
2026-02-10T17:51:45.304Z | 2026-02-27T20:55:20.512Z |
| CVE-2026-21240 |
7.8 (3.1)
|
Windows HTTP.sys Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2026-02-10T17:51:44.627Z | 2026-02-27T20:55:19.862Z |
| CVE-2026-21243 |
7.5 (3.1)
|
Windows Lightweight Directory Access Protocol (LDAP) D… |
Microsoft |
Windows Server 2019 |
2026-02-10T17:51:43.963Z | 2026-02-27T20:55:19.181Z |
| CVE-2026-21244 |
7.3 (3.1)
|
Windows Hyper-V Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:43.396Z | 2026-02-27T20:55:18.584Z |
| CVE-2026-21245 |
7.8 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2026-02-10T17:51:42.716Z | 2026-02-27T20:55:18.047Z |
| CVE-2026-21249 |
3.3 (3.1)
|
Windows NTLM Spoofing Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:42.124Z | 2026-02-27T20:55:17.425Z |
| CVE-2026-21250 |
7.8 (3.1)
|
Windows HTTP.sys Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2026-02-10T17:51:41.521Z | 2026-02-27T20:55:16.818Z |
| CVE-2026-21251 |
7.8 (3.1)
|
Cluster Client Failover (CCF) Elevation of Privilege V… |
Microsoft |
Windows Server 2016 |
2026-02-10T17:51:40.939Z | 2026-02-27T20:55:15.977Z |
| CVE-2026-21253 |
7 (3.1)
|
Mailslot File System Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:39.411Z | 2026-02-27T20:55:15.376Z |
| CVE-2026-21255 |
8.8 (3.1)
|
Windows Hyper-V Security Feature Bypass Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:38.926Z | 2026-02-27T20:55:14.628Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-27808 |
5.8 (3.1)
|
Mailpit is Vulnerable to Server-Side Request Forgery (… |
axllent |
mailpit |
2026-02-25T23:51:20.365Z | 2026-02-26T15:47:56.826Z |
| CVE-2026-27837 |
6.3 (3.1)
|
Dottie vulnerable to prototype pollution bypass via no… |
mickhansen |
dottie.js |
2026-02-26T00:19:24.289Z | 2026-02-26T14:40:07.451Z |
| CVE-2026-27948 |
5.4 (3.1)
|
Copyparty vulnerable to eflected cross-site scripting … |
9001 |
copyparty |
2026-02-26T01:32:15.184Z | 2026-02-26T15:07:56.702Z |
| CVE-2026-27954 |
4.9 (4.0)
|
LiveHelperChat has department-level authorization bypa… |
LiveHelperChat |
livehelperchat |
2026-02-26T01:42:38.225Z | 2026-02-26T19:30:20.351Z |
| CVE-2026-27959 |
7.5 (3.1)
|
Koa has Host Header Injection via `ctx.hostname` |
koajs |
koa |
2026-02-26T01:45:45.668Z | 2026-02-26T19:32:00.105Z |
| CVE-2026-27966 |
9.8 (3.1)
|
Langflow has Remote Code Execution in CSV Agent |
langflow-ai |
langflow |
2026-02-26T01:55:18.580Z | 2026-02-27T14:15:31.509Z |
| CVE-2026-1388 |
7.5 (3.1)
|
Inefficient Regular Expression Complexity in GitLab |
GitLab |
GitLab |
2026-02-25T20:05:05.289Z | 2026-02-26T15:07:56.004Z |
| CVE-2026-1662 |
7.5 (3.1)
|
Allocation of Resources Without Limits or Throttling i… |
GitLab |
GitLab |
2026-02-25T20:04:59.913Z | 2026-02-26T15:10:46.924Z |
| CVE-2026-0752 |
8 (3.1)
|
Improper Neutralization of Input During Web Page Gener… |
GitLab |
GitLab |
2026-02-25T20:05:19.818Z | 2026-02-26T14:44:05.136Z |
| CVE-2025-14511 |
7.5 (3.1)
|
Improper Validation of Specified Quantity in Input in GitLab |
GitLab |
GitLab |
2026-02-25T20:05:24.799Z | 2026-02-26T15:57:25.416Z |
| CVE-2026-3221 |
4.9 (3.1)
|
Sensitive user account information is not encryp… |
Devolutions |
Server |
2026-02-25T18:29:11.939Z | 2026-02-26T16:03:04.217Z |
| CVE-2026-25476 |
7.5 (3.1)
|
OpenEMR has Session Timeout Bypass via skip_timeout_reset |
openemr |
openemr |
2026-02-25T18:28:29.881Z | 2026-02-26T16:04:10.627Z |
| CVE-2026-2532 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
lintsinghua DeepAudit IP Address embedding_config.py s… |
lintsinghua |
DeepAudit |
2026-02-16T03:02:09.038Z | 2026-02-23T10:04:56.694Z |
| CVE-2026-1979 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
mruby JMPNOT-to-JMPIF Optimization vm.c mrb_vm_exec us… |
n/a |
mruby |
2026-02-06T04:32:09.200Z | 2026-02-23T09:21:06.088Z |
| CVE-2026-25729 |
2.1 (4.0)
|
DeepAudit Affected by User Enumeration via Broken Acce… |
lintsinghua |
DeepAudit |
2026-02-06T20:30:17.112Z | 2026-02-06T20:50:17.216Z |
| CVE-2026-25804 |
8 (4.0)
|
Antrea has invalid enforcement order for network polic… |
antrea-io |
antrea |
2026-02-06T22:58:35.041Z | 2026-02-09T15:25:44.301Z |
| CVE-2025-15564 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
Mapnik value.cpp operator divide by zero |
n/a |
Mapnik |
2026-02-07T21:32:07.437Z | 2026-02-23T09:21:21.123Z |
| CVE-2025-66630 |
9.2 (4.0)
|
Fiber insecurely fallsback in utils.UUIDv4() / utils.U… |
gofiber |
fiber |
2026-02-09T18:04:47.713Z | 2026-02-10T16:02:43.238Z |
| CVE-2026-25598 |
6.3 (4.0)
|
Bypassing Logging of Outbound Connections Using sendto… |
step-security |
harden-runner |
2026-02-09T18:58:57.074Z | 2026-02-10T16:00:59.966Z |
| CVE-2026-25761 |
8.8 (3.1)
|
Command injection via crafted filenames in Super-linte… |
super-linter |
super-linter |
2026-02-09T20:27:01.887Z | 2026-02-10T15:59:33.745Z |
| CVE-2026-25878 |
6.9 (4.0)
|
FroshAdminer Adminer UI is accessible without admin session |
FriendsOfShopware |
FroshPlatformAdminer |
2026-02-09T20:53:23.818Z | 2026-02-10T15:58:56.777Z |
| CVE-2026-25808 |
7.5 (3.1)
|
Hollo DMs get leaked and can be seen on Webfinger Browser |
fedify-dev |
hollo |
2026-02-09T21:50:10.579Z | 2026-02-10T21:23:34.888Z |
| CVE-2026-25918 |
5.9 (4.0)
|
unity-cli Exposes Plaintext Credentials in Debug Logs … |
RageAgainstThePixel |
unity-cli |
2026-02-09T21:29:55.970Z | 2026-02-10T15:57:40.799Z |
| CVE-2026-25925 |
7.8 (3.1)
|
PowerDocu Affected by Remote Code Execution via Insecu… |
modery |
PowerDocu |
2026-02-09T21:59:08.335Z | 2026-02-11T21:22:45.286Z |
| CVE-2025-11142 |
7.1 (3.1)
|
The VAPIX API mediaclip.cgi that did not have a s… |
Axis Communications AB |
AXIS OS |
2026-02-10T05:32:19.555Z | 2026-02-26T15:04:12.975Z |
| CVE-2026-26338 |
6.9 (4.0)
6.5 (3.1)
|
Hyland Alfresco Transformation Service SSRF |
Hyland |
Alfresco Transformation Service (Enterprise) |
2026-02-19T17:03:23.521Z | 2026-02-20T19:11:04.416Z |
| CVE-2026-26339 |
9.3 (4.0)
9.8 (3.1)
|
Hyland Alfresco Transformation Service Argument Inject… |
Hyland |
Alfresco Transformation Service (Enterprise) |
2026-02-19T17:04:46.617Z | 2026-02-20T20:31:03.964Z |
| CVE-2025-13671 |
5.9 (4.0)
|
Cross Site request forgery vulnerability discovered in… |
OpenText™ |
Web Site Management Server |
2026-02-19T22:36:49.083Z | 2026-02-24T14:39:58.281Z |
| CVE-2025-13672 |
7 (4.0)
|
Reflected Cross-Site Scripting discovered in OpenText … |
OpenText™ |
Web Site Management Server |
2026-02-19T22:36:33.467Z | 2026-02-24T14:42:46.727Z |
| CVE-2025-8054 |
7.1 (4.0)
|
Path Traversal vulnerability have been discovered in O… |
OpenText™ |
XM Fax |
2026-02-19T22:21:22.483Z | 2026-02-23T18:14:02.775Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-28517 | openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in … | 2026-02-27T23:16:06.357 | 2026-02-27T23:16:06.357 |
| fkie_cve-2026-28516 | openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::… | 2026-02-27T23:16:06.180 | 2026-02-27T23:16:06.180 |
| fkie_cve-2026-28515 | openDCIM version 23.04, through commit 4467e9c4, contains a missing authorization vulnerability in … | 2026-02-27T23:16:05.960 | 2026-02-27T23:16:05.960 |
| fkie_cve-2026-28426 | Statmatic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.11 a… | 2026-02-27T23:16:05.780 | 2026-02-27T23:16:05.780 |
| fkie_cve-2026-28425 | Statmatic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.11 a… | 2026-02-27T23:16:05.607 | 2026-02-27T23:16:05.607 |
| fkie_cve-2026-28424 | Statmatic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.11 a… | 2026-02-27T23:16:05.447 | 2026-02-27T23:16:05.447 |
| fkie_cve-2026-28423 | Statmatic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.11 a… | 2026-02-27T23:16:05.283 | 2026-02-27T23:16:05.283 |
| fkie_cve-2026-27759 | Featured Image from Content (featured-image-from-content) WordPress plugin versions prior to 1.7 co… | 2026-02-27T23:16:04.187 | 2026-02-27T23:16:04.187 |
| fkie_cve-2026-20742 | An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an a… | 2026-02-27T01:16:17.317 | 2026-02-27T23:13:46.087 |
| fkie_cve-2026-20902 | An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an … | 2026-02-27T01:16:17.520 | 2026-02-27T23:13:13.603 |
| fkie_cve-2026-20910 | An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an au… | 2026-02-27T01:16:17.707 | 2026-02-27T23:12:37.947 |
| fkie_cve-2026-21389 | An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an au… | 2026-02-27T01:16:17.890 | 2026-02-27T23:12:14.313 |
| fkie_cve-2026-21718 | An authentication bypass vulnerability exists in Copeland XWEB Pro version 1.12.1 and prior, enabl… | 2026-02-27T01:16:18.073 | 2026-02-27T23:11:48.947 |
| fkie_cve-2026-20764 | An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an au… | 2026-02-27T02:16:18.140 | 2026-02-27T23:11:05.393 |
| fkie_cve-2026-20797 | A stack based buffer overflow exists in an API route of XWEB Pro version 1.12.1 and prior, enablin… | 2026-02-27T02:16:18.343 | 2026-02-27T23:10:35.547 |
| fkie_cve-2026-22877 | An arbitrary file-read vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling unauthe… | 2026-02-27T02:16:18.507 | 2026-02-27T23:09:41.677 |
| fkie_cve-2026-23702 | An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an au… | 2026-02-27T02:16:18.700 | 2026-02-27T23:08:42.743 |
| fkie_cve-2026-24452 | An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an a… | 2026-02-27T02:16:18.897 | 2026-02-27T23:08:17.530 |
| fkie_cve-2026-25037 | An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an a… | 2026-02-27T02:16:19.603 | 2026-02-27T23:07:40.717 |
| fkie_cve-2026-25105 | An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling a… | 2026-02-27T02:16:19.800 | 2026-02-27T23:07:06.143 |
| fkie_cve-2026-25196 | An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an au… | 2026-02-27T02:16:20.000 | 2026-02-27T23:06:36.453 |
| fkie_cve-2026-25721 | An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an au… | 2026-02-27T02:16:20.170 | 2026-02-27T23:06:02.867 |
| fkie_cve-2026-28422 | Vim is an open source, command line text editor. Prior to version 9.2.0078, a stack-buffer-overflow… | 2026-02-27T22:16:25.667 | 2026-02-27T22:16:25.667 |
| fkie_cve-2026-28421 | Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-over… | 2026-02-27T22:16:25.493 | 2026-02-27T22:16:25.493 |
| fkie_cve-2026-28420 | Vim is an open source, command line text editor. Prior to version 9.2.0076, a heap-based buffer ove… | 2026-02-27T22:16:25.330 | 2026-02-27T22:16:25.330 |
| fkie_cve-2026-28419 | Vim is an open source, command line text editor. Prior to version 9.2.0075, a heap-based buffer und… | 2026-02-27T22:16:25.163 | 2026-02-27T22:16:25.163 |
| fkie_cve-2026-28418 | Vim is an open source, command line text editor. Prior to version 9.2.0074, a heap-based buffer ove… | 2026-02-27T22:16:25.003 | 2026-02-27T22:16:25.003 |
| fkie_cve-2026-28417 | Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection… | 2026-02-27T22:16:24.833 | 2026-02-27T22:16:24.833 |
| fkie_cve-2026-28416 | Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.6.0, a S… | 2026-02-27T22:16:24.667 | 2026-02-27T22:16:24.667 |
| fkie_cve-2026-28415 | Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.6.0, the… | 2026-02-27T22:16:24.497 | 2026-02-27T22:16:24.497 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-vww6-79rv-3j4x |
4.1 (3.1)
|
Mattermost doesn't verify that post actions invoking `/share-issue-publicly` were created by the Ji… | 2025-12-24T09:30:22Z | 2026-02-27T22:04:50Z |
| ghsa-fmqf-pmcm-8cx9 |
4.3 (3.1)
|
Mattermost doesn't validate user channel membership when attaching Mattermost posts as comments to … | 2025-12-24T09:30:22Z | 2026-02-27T22:04:19Z |
| ghsa-4r5r-ccr6-q6f6 |
7.1 (4.0)
|
Fleet has an Access Control vulnerability in debug/pprof endpoints | 2026-01-20T20:55:14Z | 2026-02-27T22:03:20Z |
| ghsa-63m5-974w-448v |
9.3 (4.0)
|
Fleet has a JWT signature bypass vulnerability in Azure AD MDM enrollment | 2026-01-20T20:55:17Z | 2026-02-27T22:02:58Z |
| ghsa-g8gc-6c4h-jg86 |
4.3 (3.1)
|
wger: IDOR in nutritional_values endpoints exposes private dietary data via direct ORM lookup | 2026-02-26T22:15:51Z | 2026-02-27T21:59:53Z |
| ghsa-42cr-w2gr-m54q |
3.1 (3.1)
|
wger: IDOR via user-unscoped cache keys on routine API actions exposes workout data | 2026-02-26T22:15:30Z | 2026-02-27T21:59:39Z |
| ghsa-xf68-8hjw-7mpm |
4.3 (3.1)
|
wger: IDOR in RepetitionsConfig and MaxRepetitionsConfig API leak other users' workout data | 2026-02-26T22:13:13Z | 2026-02-27T21:59:25Z |
| ghsa-wppc-7cq7-cgfv |
4.3 (3.1)
|
Weblate: Missing access control for the AddonViewSet API exposes all addon configurations | 2026-02-26T19:45:06Z | 2026-02-27T21:59:14Z |
| ghsa-cg8j-5cr2-568q |
6.5 (3.1)
|
Moodle TeX formula editor is vulnerable to DoS through lack of execution time limits | 2026-02-21T06:30:16Z | 2026-02-27T21:57:20Z |
| ghsa-6c9j-x93c-rw6j |
4.3 (3.1)
|
OpenClaw safeBins file-existence oracle information disclosure | 2026-02-19T22:06:26Z | 2026-02-27T21:55:45Z |
| ghsa-4685-c5cp-vp95 |
3.6 (3.1)
|
OpenClaw safeBins stdin-only bypass via sort output and recursive grep flags | 2026-02-19T22:06:00Z | 2026-02-27T21:54:41Z |
| ghsa-5476-xc4j-rqcv |
8.9 (4.0)
|
c3p0 vulnerable to Remote Code Execution via unsafe deserialization of userOverridesAsString property | 2026-02-25T18:35:23Z | 2026-02-27T21:53:39Z |
| ghsa-cj9f-h6r6-4cx2 |
6.5 (3.1)
|
Astro is vulnerable to SSRF due to missing allowlist enforcement in remote image inferSize | 2026-02-25T18:11:47Z | 2026-02-27T21:53:27Z |
| ghsa-4q3h-vp4r-prv2 |
9.3 (4.0)
|
Parse Server: Account takeover via JWT algorithm confusion in Google auth adapter | 2026-02-25T23:00:49Z | 2026-02-27T21:52:22Z |
| ghsa-7jp5-298q-jg98 |
7.3 (3.1)
|
Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure | 2026-02-25T22:40:15Z | 2026-02-27T21:52:14Z |
| ghsa-2p9h-rqjw-gm92 |
5.4 (3.1)
8.5 (4.0)
|
n8n Vulnerable to Stored XSS via Various Nodes | 2026-02-25T22:28:57Z | 2026-02-27T21:52:06Z |
| ghsa-vpcf-gvg4-6qwr |
9.9 (3.1)
9.4 (4.0)
|
n8n: Expression Sandbox Escape Leads to RCE | 2026-02-25T22:05:09Z | 2026-02-27T21:51:58Z |
| ghsa-3ccg-x393-96v8 |
9.1 (3.1)
|
Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change | 2026-02-25T22:02:37Z | 2026-02-27T21:51:50Z |
| ghsa-x2mw-7j39-93xq |
8.5 (3.1)
9.0 (4.0)
|
n8n has Arbitrary Command Execution via File Write and Git Operations | 2026-02-25T21:54:19Z | 2026-02-27T21:51:38Z |
| ghsa-wxx7-mcgf-j869 |
9.9 (3.1)
9.4 (4.0)
|
n8n has Potential Remote Code Execution via Merge Node | 2026-02-25T21:23:30Z | 2026-02-27T21:51:29Z |
| ghsa-jjpj-p2wh-qf23 |
9.4 (4.0)
|
n8n has a Sandbox Escape in its JavaScript Task Runner | 2026-02-25T21:23:15Z | 2026-02-27T21:51:21Z |
| ghsa-mmgg-m5j7-f83h |
9.9 (3.1)
7.1 (4.0)
|
n8n has Arbitrary File Read via Python Code Node Sandbox Escape | 2026-02-25T21:22:39Z | 2026-02-27T21:51:13Z |
| ghsa-75g8-rv7v-32f7 |
9.0 (3.1)
9.5 (4.0)
|
n8n has Unauthenticated Expression Evaluation via Form Node | 2026-02-25T21:21:36Z | 2026-02-27T21:51:05Z |
| ghsa-4qgr-4h56-8895 |
6.1 (3.1)
|
Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module | 2026-02-25T22:01:25Z | 2026-02-27T21:50:55Z |
| ghsa-fq4f-4738-rqxm |
6.1 (3.1)
|
Rucio WebUI has a Stored Cross-site Scripting (XSS) Vulnerability in its Custom RSE Attribute | 2026-02-25T19:37:27Z | 2026-02-27T21:50:31Z |
| ghsa-8wpv-6x3f-3rm5 |
6.1 (3.1)
|
Rucio WebUI has a Stored Cross-site Scripting (XSS) vulnerability its Identity Name | 2026-02-25T19:29:37Z | 2026-02-27T21:50:24Z |
| ghsa-h9fp-p2p9-873q |
6.1 (3.1)
|
Rucio WebUI has Stored Cross-site Scripting (XSS) in RSE Metadata | 2026-02-25T19:29:22Z | 2026-02-27T21:50:14Z |
| ghsa-rwj9-7j48-9f7q |
7.3 (3.1)
|
Rucio WebUI Vulnerable to Stored Cross-site Scripting (XSS) through Custom Rule Function | 2026-02-25T18:58:20Z | 2026-02-27T21:50:07Z |
| ghsa-38wq-6q2w-hcf9 |
5.3 (3.1)
|
Rucio WebUI has Username Enumeration via Login Error Message | 2026-02-25T18:53:42Z | 2026-02-27T21:49:59Z |
| ghsa-h79m-5jjm-jm4q |
8.1 (3.1)
|
Rucio WebUI has a Reflected Cross-site Scripting Vulnerability | 2026-02-25T18:53:29Z | 2026-02-27T21:49:51Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-55 |
|
vLLM is an inference and serving engine for large language models (LLMs). Version 0.8.0 u… | vllm | 2025-05-30T19:15:30+00:00 | 2025-06-26T21:23:06.407481+00:00 |
| pysec-2025-54 |
|
vLLM is an inference and serving engine for large language models (LLMs). In versions 0.8… | vllm | 2025-05-30T19:15:30+00:00 | 2025-06-26T21:23:06.319321+00:00 |
| pysec-2025-53 |
|
vLLM is an inference and serving engine for large language models (LLMs). Prior to versio… | vllm | 2025-05-29T17:15:21+00:00 | 2025-06-26T21:23:06.231251+00:00 |
| pysec-2025-51 |
|
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) v… | apache-airflow-providers-snowflake | 2025-06-24T08:15:24+00:00 | 2025-06-26T21:23:03.132527+00:00 |
| pysec-2025-50 |
|
vLLM, an inference and serving engine for large language models (LLMs), has a Regular Exp… | vllm | 2025-05-30T18:15:32+00:00 | 2025-06-19T03:02:28.572160+00:00 |
| pysec-2024-255 |
|
Gradio before 4.20 allows credential leakage on Windows. | gradio | 2024-05-05T20:15:07+00:00 | 2025-06-17T19:21:48.983901+00:00 |
| pysec-2024-254 |
4.2 (3.1)
|
A session fixation vulnerability exists in the zenml-io/zenml application, where JWT toke… | zenml | 2024-04-16T00:15:11+00:00 | 2025-06-13T00:48:41.806476+00:00 |
| pysec-2025-49 |
8.8 (3.1)
|
setuptools is a package that allows users to download, build, install, upgrade, and unins… | setuptools | 2025-05-17T16:15:19+00:00 | 2025-06-12T22:23:11.115559+00:00 |
| pysec-2025-48 |
9.8 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2025-03-31T17:15:42+00:00 | 2025-06-12T22:23:10.476087+00:00 |
| pysec-2024-253 |
|
pretix before 2024.1.1 mishandles file validation. | pretix | 2024-02-26T16:28:00+00:00 | 2025-06-11T15:23:51.683422+00:00 |
| pysec-2024-252 |
|
PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in t… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T19:22:08.948962+00:00 |
| pysec-2024-251 |
|
Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T03:12:59.077932+00:00 |
| pysec-2025-47 |
|
An issue was discovered in Django 5.2 before 5.2.2, 5.1 before 5.1.10, and 4.2 before 4.2… | django | 2025-06-05T03:15:25+00:00 | 2025-06-05T05:23:28.296596+00:00 |
| pysec-2025-46 |
5.5 (3.1)
|
A vulnerability was found in erdogant pypickle up to 1.1.5. It has been classified as cri… | pypickle | 2025-05-26T08:15:19+00:00 | 2025-06-03T17:36:58.579358+00:00 |
| pysec-2025-45 |
7.8 (3.1)
|
A vulnerability was found in erdogant pypickle up to 1.1.5 and classified as problematic.… | pypickle | 2025-05-26T07:15:26+00:00 | 2025-06-03T17:36:58.528116+00:00 |
| pysec-2024-250 |
|
Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csr… | torch | 2024-04-19T21:15:08+00:00 | 2025-06-03T15:23:56.072490+00:00 |
| pysec-2023-312 |
5.9 (3.1)
|
Redis before 6cbea7d allows a replica to cause an assertion failure in a primary server b… | redis | 2023-07-15T23:15:09Z | 2025-06-02T11:48:06.372423Z |
| pysec-2025-44 |
|
django-helpdesk before 1.0.0 allows Sensitive Data Exposure because of os.umask(0) in mod… | django-helpdesk | 2025-05-31T01:15:19+00:00 | 2025-05-31T03:09:35.357757+00:00 |
| pysec-2025-43 |
|
vLLM is an inference and serving engine for large language models (LLMs). In versions sta… | vllm | 2025-05-29T17:15:21+00:00 | 2025-05-29T19:21:01.611587+00:00 |
| pysec-2025-42 |
9.8 (3.1)
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Ver… | vllm | 2025-04-30T01:15:51+00:00 | 2025-05-28T21:23:12.396609+00:00 |
| pysec-2025-41 |
9.8 (3.1)
|
PyTorch is a Python package that provides tensor computation with strong GPU acceleration… | torch | 2025-04-18T16:15:23+00:00 | 2025-05-28T15:23:37.843138+00:00 |
| pysec-2025-40 |
7.5 (3.1)
|
A vulnerability in the `preprocess_string()` function of the `transformers.testing_utils`… | transformers | 2025-05-19T12:15:19+00:00 | 2025-05-21T19:22:10.801823+00:00 |
| pysec-2024-249 |
6.1 (3.1)
|
### Summary On all Label Studio versions prior to 1.11.0, data imported via file upload f… | label-studio | 2024-02-22T22:15:47+00:00 | 2025-05-19T11:22:35.312280+00:00 |
| pysec-2024-248 |
7.8 (3.1)
|
OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its … | opencanary | 2024-10-14T21:15:12+00:00 | 2025-05-16T14:23:05.150356+00:00 |
| pysec-2025-39 |
|
motionEye is an online interface for the software motion, a video surveillance program wi… | motioneye | 2025-05-14T16:15:29+00:00 | 2025-05-14T17:22:51.050788+00:00 |
| pysec-2025-38 |
|
OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during im… | ironic | 2025-05-08T17:16:01Z | 2025-05-13T04:24:03.083929Z |
| pysec-2024-247 |
9.9 (3.1)
|
A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically… | zenml | 2024-04-16T00:15:11+00:00 | 2025-05-12T15:23:53.861001+00:00 |
| pysec-2025-37 |
|
An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2… | django | 2025-05-08T04:17:18+00:00 | 2025-05-08T05:23:16.210893+00:00 |
| pysec-2025-36 |
9.8 (3.1)
|
Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/valida… | langflow | 2025-04-07T15:15:44+00:00 | 2025-05-07T19:22:44.993642+00:00 |
| pysec-2024-246 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Starting in… | vyper | 2024-04-25T17:15:50+00:00 | 2025-05-05T19:21:20.899426+00:00 |
| ID | Description | Type |
|---|---|---|
| tid-309 | If the integrated development environment (IDE) or vendor software that is used to manage… | application-software |
| tid-308 | The threat actor can overwrite a previously deployed/installed malicious program with a d… | application-software |
| tid-307 | Many devices that allow the execution of custom application programs, such as IEC 61131 b… | application-software |
| tid-306 | While restricting the execution of external programs within a sandboxed execution environ… | application-software |
| tid-305 | If the device allows the downloading and execution of native binaries on the device, a th… | application-software |
| tid-304 | A threat actor can manipulate the runtime environments on a device to maintain persistenc… | application-software |
| tid-303 | If device management is intended to be performed by a dedicated engineering software plat… | application-software |
| tid-302 | A threat actor can install a malicious program to the device to manipulate its operations… | application-software |
| tid-301 | A threat actor could modify application-level binaries or libraries on the device to intr… | application-software |
| tid-226 | Some devise will login information that can be exploited by attackers to further their at… | system-software |
| tid-225 | Threat actors may try to manipulate logs on the device to evade defenses, confuse inciden… | system-software |
| tid-224 | If a device has debugging capabilities (e.g., diagnostic tools, debug logs, etc.) that ar… | system-software |
| tid-223 | If the threat actor can obtain sufficient privileges on the devices, they may be able to … | system-software |
| tid-222 | Various devices and associated services are necessary to support communications and conne… | system-software |
| tid-221 | Some devices will allow for authentication over the network, but do not implement mechani… | system-software |
| tid-220 | Hardware roots of trust can be used to support many desirable device security functions, … | system-software |
| tid-219 | Operating Systems and Kernels frequently run at the highest levels of permissions. If pro… | system-software |
| tid-218 | A threat actor may be able to install a rootkit that can manipulate the operating system … | system-software |
| tid-217 | When firmware/software update process is initiated on a device, it may enter a different … | system-software |
| tid-216 | Firmware updates will oftentimes include fixes to security vulnerabilities, meaning that … | system-software |
| tid-215 | If the firmware/software update is not encrypted at rest in storage it can be reverse eng… | system-software |
| tid-214 | Some device have mutable or immutable secure Roots of Trust (ROTs) that may store keys or… | system-software |
| tid-213 | To avoid the weaknesses of a shared secret verification (see TID-212), devices may utiliz… | system-software |
| tid-212 | Some devices utilize a shared secret authentication scheme to verify firmware updates. Th… | system-software |
| tid-211 | If a device does not have a mechanism to authenticate firmware updates, a threat actor ma… | system-software |
| tid-210 | Threat actors will frequently target device components, like firmware, that have already … | system-software |
| tid-209 | If a threat actor can access a hypervisor’s host infrastructure, such as through existing… | system-software |
| tid-208 | Virtualization mechanisms allow multiple operating sytem instances to share the same unde… | system-software |
| tid-207 | Container environments, such as Docker and Kubernetes, share the same underlying kernel a… | system-software |
| tid-206 | While the use of memory permissions, such as non-executable stack and heap memory, can pr… | system-software |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33874 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.959238Z |
| gsd-2024-33861 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.958057Z |
| gsd-2024-33850 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.952536Z |
| gsd-2024-33856 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.944669Z |
| gsd-2024-33870 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.943118Z |
| gsd-2024-33849 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.924449Z |
| gsd-2024-33854 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.916266Z |
| gsd-2024-33868 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.896638Z |
| gsd-2024-33881 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.886591Z |
| gsd-2024-33880 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.882744Z |
| gsd-2024-33877 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.871220Z |
| gsd-2024-33873 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.870402Z |
| gsd-2024-33859 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.867340Z |
| gsd-2024-33875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.862083Z |
| gsd-2024-33878 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.850311Z |
| gsd-2024-33858 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.848478Z |
| gsd-2024-33872 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.839468Z |
| gsd-2024-33857 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.834866Z |
| gsd-2024-33853 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.825026Z |
| gsd-2024-33863 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.824810Z |
| gsd-2024-33852 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.824312Z |
| gsd-2024-33866 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.819755Z |
| gsd-2024-33867 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.808129Z |
| gsd-2024-33882 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.803998Z |
| gsd-2024-33871 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.800751Z |
| gsd-2024-33862 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.799465Z |
| gsd-2024-33864 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.792101Z |
| gsd-2024-33865 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.790923Z |
| gsd-2024-33869 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.784255Z |
| gsd-2024-33860 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.777612Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1055 | Malicious code in jslint-config (npm) | 2026-02-26T13:41:14Z | 2026-02-26T13:41:14Z |
| mal-2026-1058 | Malicious code in zoddle (npm) | 2026-02-26T13:21:03Z | 2026-02-26T13:21:03Z |
| mal-2026-1047 | Malicious code in ts-packer (npm) | 2026-02-26T11:22:38Z | 2026-02-26T11:22:39Z |
| mal-2026-1046 | Malicious code in jest-param-validator (npm) | 2026-02-26T11:22:38Z | 2026-02-26T11:22:39Z |
| mal-2026-1045 | Malicious code in jest-node-paramset (npm) | 2026-02-26T11:22:38Z | 2026-02-26T11:22:39Z |
| mal-2026-1051 | Malicious code in corstoken (npm) | 2026-02-26T10:50:36Z | 2026-02-26T10:50:36Z |
| mal-2026-1054 | Malicious code in iosysredis (npm) | 2026-02-26T10:34:36Z | 2026-02-26T10:34:36Z |
| mal-2026-1056 | Malicious code in undicy-lint (npm) | 2026-02-26T10:17:13Z | 2026-02-26T10:17:13Z |
| mal-2026-1044 | Malicious code in awareness-demo-pkg (PyPI) | 2026-02-26T10:11:33Z | 2026-02-26T10:11:33Z |
| mal-2026-96 | Malicious code in pycolorom (PyPI) | 2026-01-06T14:21:10Z | 2026-02-26T09:50:46Z |
| mal-2026-937 | Malicious code in telebot-infee (PyPI) | 2026-02-18T19:32:14Z | 2026-02-26T09:50:46Z |
| mal-2026-935 | Malicious code in telebot-infoo (PyPI) | 2026-02-18T18:36:00Z | 2026-02-26T09:50:46Z |
| mal-2026-934 | Malicious code in telebot-infoe (PyPI) | 2026-02-18T18:42:29Z | 2026-02-26T09:50:46Z |
| mal-2026-931 | Malicious code in telebot-infe (PyPI) | 2026-02-17T20:36:23Z | 2026-02-26T09:50:46Z |
| mal-2026-930 | Malicious code in telebot-info (PyPI) | 2026-02-17T20:18:25Z | 2026-02-26T09:50:46Z |
| mal-2026-928 | Malicious code in polyutil (PyPI) | 2026-02-17T04:31:14Z | 2026-02-26T09:50:46Z |
| mal-2026-927 | Malicious code in polyclawd (PyPI) | 2026-02-16T23:40:13Z | 2026-02-26T09:50:46Z |
| mal-2026-909 | Malicious code in clawdist (PyPI) | 2026-02-15T21:58:17Z | 2026-02-26T09:50:46Z |
| mal-2026-898 | Malicious code in magicwolf (PyPI) | 2026-02-14T02:02:26Z | 2026-02-26T09:50:46Z |
| mal-2026-897 | Malicious code in clawdest (PyPI) | 2026-02-13T23:10:47Z | 2026-02-26T09:50:46Z |
| mal-2026-878 | Malicious code in magichat (PyPI) | 2026-02-13T10:56:11Z | 2026-02-26T09:50:46Z |
| mal-2026-811 | Malicious code in grokwrapper (PyPI) | 2026-02-08T10:34:16Z | 2026-02-26T09:50:46Z |
| mal-2026-623 | Malicious code in marshl (PyPI) | 2026-02-01T19:10:30Z | 2026-02-26T09:50:46Z |
| mal-2026-6 | Malicious code in ziphash (PyPI) | 2026-01-01T22:08:29Z | 2026-02-26T09:50:46Z |
| mal-2026-470 | Malicious code in urlsssser (PyPI) | 2026-01-22T21:34:39Z | 2026-02-26T09:50:46Z |
| mal-2026-468 | Malicious code in urlsser (PyPI) | 2026-01-22T20:16:29Z | 2026-02-26T09:50:46Z |
| mal-2026-42 | Malicious code in pyrogrom (PyPI) | 2026-01-05T01:09:06Z | 2026-02-26T09:50:46Z |
| mal-2026-326 | Malicious code in urlssser (PyPI) | 2026-01-18T23:14:24Z | 2026-02-26T09:50:46Z |
| mal-2026-325 | Malicious code in marshel (PyPI) | 2026-01-18T22:56:09Z | 2026-02-26T09:50:46Z |
| mal-2026-237 | Malicious code in formater (PyPI) | 2026-01-12T23:05:42Z | 2026-02-26T09:50:46Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2166 | OpenSSL und LibreSSL: Mehrere Schwachstellen | 2025-09-30T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2129 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-09-24T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2040 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-11T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2002 | libssh: Schwachstelle ermöglicht Denial of Service | 2025-09-09T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-1976 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-04T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-1653 | Linux Kernel: Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-1517 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-08T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-1452 | Linux Kernel: Mehrere Schwachstellen | 2025-07-02T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-0734 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-04-07T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0203 | SmarterTools SmarterMail: Schwachstelle ermöglicht Umgehung | 2026-01-22T23:00:00.000+00:00 | 2026-02-22T23:00:00.000+00:00 |
| wid-sec-w-2025-2854 | Roundcube: Mehrere Schwachstellen | 2025-12-15T23:00:00.000+00:00 | 2026-02-22T23:00:00.000+00:00 |
| wid-sec-w-2025-1208 | Roundcube: Schwachstelle ermöglicht Codeausführung | 2025-06-01T22:00:00.000+00:00 | 2026-02-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0427 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2026-02-16T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0347 | Red Hat Build of Keycloak: Mehrere Schwachstellen | 2026-02-09T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0305 | Red Hat Enterprise Linux (libsoup): Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0297 | Django: Mehrere Schwachstellen | 2026-02-03T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0209 | Cpython: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0196 | CPython: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-01-21T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0083 | Microsoft Windows : Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2025-2929 | Linux Kernel: Mehrere Schwachstellen | 2025-12-28T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0437 | Dell RecoverPoint for Virtual Machines: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und potenziell Privilegieneskalation | 2026-02-17T23:00:00.000+00:00 | 2026-02-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0420 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-02-17T23:00:00.000+00:00 |
| wid-sec-w-2026-0401 | Google Chrome: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0378 | IBM WebSphere Application Server: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-02-10T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0367 | Microsoft DeveloperTools (Visual Studio Code und .NET): Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0359 | GnuTLS: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0306 | Red Hat Enterprise Linux (pyasn1): Schwachstelle ermöglicht Denial of Service | 2026-02-04T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0302 | Red Hat Enterprise Linux (python-wheel): Schwachstelle ermöglicht Privilegieneskalation und Codeausführung | 2026-02-03T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0265 | expat: Schwachstelle ermöglicht Codeausführung | 2026-01-29T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0243 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Denial of Service | 2026-01-27T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0045 | Kwetsbaarheid verholpen in Cisco Meeting Management | 2026-02-06T09:22:16.831778Z | 2026-02-06T09:22:16.831778Z |
| ncsc-2026-0044 | Kwetsbaarheid verholpen in Cisco TelePresence Collaboration Endpoint | 2026-02-06T09:20:11.629058Z | 2026-02-06T09:20:11.629058Z |
| ncsc-2026-0042 | Kwetsbaarheden verholpen in SolarWinds Web Help Desk | 2026-01-28T16:37:21.114054Z | 2026-02-02T09:47:54.857445Z |
| ncsc-2025-0386 | Kwetsbaarheden verholpen in Fortinet producten | 2025-12-10T09:51:34.918202Z | 2026-01-28T15:46:10.814803Z |
| ncsc-2026-0041 | Kwetsbaarheid verholpen in Fortinet producten | 2026-01-28T09:32:41.752905Z | 2026-01-28T09:32:41.752905Z |
| ncsc-2026-0039 | ZeroDay kwetsbaarheid verholpen in Microsoft Office | 2026-01-27T07:27:52.867415Z | 2026-01-27T07:27:52.867415Z |
| ncsc-2026-0038 | Kwetsbaarheid verholpen in BIND 9 | 2026-01-23T08:54:43.506215Z | 2026-01-23T08:54:43.506215Z |
| ncsc-2026-0037 | Kwetsbaarheden verholpen in GitLab Community Edition en Enterprise Edition | 2026-01-22T12:35:30.505659Z | 2026-01-22T12:35:30.505659Z |
| ncsc-2026-0036 | Kwetsbaarheden verholpen in Cisco Unified Communications producten | 2026-01-22T09:49:39.156365Z | 2026-01-22T09:49:39.156365Z |
| ncsc-2026-0035 | Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS | 2026-01-22T09:22:36.433609Z | 2026-01-22T09:22:36.433609Z |
| ncsc-2026-0034 | Kwetsbaarheden verholpen in Atlassian producten | 2026-01-22T09:03:42.667958Z | 2026-01-22T09:03:42.667958Z |
| ncsc-2026-0033 | Kwetsbaarheid verholpen in GNU Inetutils telnetd | 2026-01-21T14:15:46.424529Z | 2026-01-21T14:15:46.424529Z |
| ncsc-2026-0032 | Kwetsbaarheden verholpen in Oracle MySQL | 2026-01-21T10:12:24.844869Z | 2026-01-21T10:12:24.844869Z |
| ncsc-2026-0031 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2026-01-21T10:12:00.674214Z | 2026-01-21T10:12:00.674214Z |
| ncsc-2026-0030 | Kwetsbaarheden verholpen in Oracle Java | 2026-01-21T10:11:39.759123Z | 2026-01-21T10:11:39.759123Z |
| ncsc-2026-0029 | Kwetsbaarheden verholpen in Oracle Hyperion | 2026-01-21T10:10:46.297433Z | 2026-01-21T10:10:46.297433Z |
| ncsc-2026-0028 | Kwetsbaarheden verholpen in Oracle Analytics | 2026-01-21T10:10:15.985753Z | 2026-01-21T10:10:15.985753Z |
| ncsc-2026-0027 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2026-01-21T10:08:59.379774Z | 2026-01-21T10:08:59.379774Z |
| ncsc-2026-0026 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2026-01-21T10:06:27.920991Z | 2026-01-21T10:06:27.920991Z |
| ncsc-2026-0025 | Kwetsbaarheden verholpen in Oracle Financial Services | 2026-01-21T09:55:33.889125Z | 2026-01-21T09:55:33.889125Z |
| ncsc-2026-0024 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2026-01-21T09:29:38.334428Z | 2026-01-21T09:29:38.334428Z |
| ncsc-2026-0023 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2026-01-21T09:27:58.715578Z | 2026-01-21T09:27:58.715578Z |
| ncsc-2026-0022 | Kwetsbaarheden verholpen in Oracle Communications producten | 2026-01-21T09:25:39.876330Z | 2026-01-21T09:25:39.876330Z |
| ncsc-2026-0021 | Kwetsbaarheden verholpen in Oracle Database Server producten | 2026-01-21T09:19:00.000449Z | 2026-01-21T09:19:00.000449Z |
| ncsc-2026-0020 | Kwetsbaarheden verholpen in Oracle Commerce | 2026-01-21T09:18:16.268788Z | 2026-01-21T09:18:16.268788Z |
| ncsc-2026-0019 | Kwetsbaarheid verholpen in Fortinet FortiSIEM | 2026-01-16T13:34:34.467426Z | 2026-01-16T13:34:34.467426Z |
| ncsc-2026-0018 | Kwetsbaarheden verholpen in TYPO3 CMS | 2026-01-16T10:11:37.524826Z | 2026-01-16T10:11:37.524826Z |
| ncsc-2026-0017 | Kwetsbaarheden verholpen in Juniper Networks JunOS | 2026-01-16T10:07:39.310560Z | 2026-01-16T10:07:39.310560Z |
| ncsc-2026-0016 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2026-01-16T09:44:20.575860Z | 2026-01-16T09:44:20.575860Z |
| ncsc-2026-0015 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2026-01-15T12:31:57.265723Z | 2026-01-15T12:31:57.265723Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-365200 | SSA-365200: Google Chrome Type Confusion Vulnerability in Siemens Products | 2025-10-14T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-364175 | SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-201595 | SSA-201595: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2025-08-14T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-192617 | SSA-192617: Local Privilege Escalation Vulnerability in TeleControl Server Basic Before V3.1.2.4 | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-014678 | SSA-014678: Authorization Bypass Vulnerability in Industrial Edge Device Kit | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-001536 | SSA-001536: Authorization Bypass Vulnerability in Siemens Industrial Edge Devices | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-512988 | SSA-512988: File Parsing Vulnerability in Simcenter Femap Before V2512 | 2025-12-12T00:00:00Z | 2025-12-12T00:00:00Z |
| ssa-915282 | SSA-915282: Denial of service Vulnerability in Interniche IP-Stack based Industrial Devices | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-882673 | SSA-882673: Multiple Vulnerabilities in SINEC Security Monitor before V4.10.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-868571 | SSA-868571: Missing Server Certificate Validation in IAM Client | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-800126 | SSA-800126: Deserialization Vulnerability in Siemens Engineering Platforms before V20 | 2024-12-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-763474 | SSA-763474: Denial of Service Vulnerability in Ruggedcom ROS devices before V5.10.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-734261 | SSA-734261: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-723487 | SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products | 2024-07-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-710408 | SSA-710408: Missing Server Certificate Validation in Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-693808 | SSA-693808: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-673996 | SSA-673996: Buffer Overflow Vulnerability in Third-Party Component in SICAM and SITIPE Products | 2024-09-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-626856 | SSA-626856: Multiple Vulnerabilities in SINEMA Remote Connect Sever Before V3.2 SP4 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-493396 | SSA-493396: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-471761 | SSA-471761: Multiple Vulnerabilities in SICAM T Before V3.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-420375 | SSA-420375: Improper Integrity Check of Firmware Updates in Building X - Security Manager Edge Controller (ACC-AP) | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-416652 | SSA-416652: Multiple Vulnerabilities in SIMATIC CN 4100 Before V4.0.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-408105 | SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products | 2022-12-13T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-392859 | SSA-392859: Local Arbitrary Code Execution Vulnerability in Siemens Engineering Platforms before V20 | 2024-12-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-356310 | SSA-356310: Multiple Vulnerabilities in Gridscale X Prepay | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-202008 | SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-241605 | SSA-241605: Out of Bounds Read in PS/IGES Parasolid Translator Component Before V29.0.258 | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-190588 | SSA-190588: Cross-Site Scripting Vulnerability in Mendix Rich Text Widget | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-794185 | SSA-794185: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-770770 | SSA-770770: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.7 on RUGGEDCOM APE1808 Devices | 2025-02-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2265 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-02-09T05:56:42+00:00 | 2026-02-17T12:41:40+00:00 |
| rhsa-2026:2256 | Red Hat Security Advisory: Red Hat multicluster global hub 1.5.3 security update | 2026-02-09T01:49:44+00:00 | 2026-02-17T12:41:40+00:00 |
| rhsa-2026:2223 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-09T01:34:56+00:00 | 2026-02-17T12:41:40+00:00 |
| rhsa-2026:2219 | Red Hat Security Advisory: golang security update | 2026-02-09T01:48:16+00:00 | 2026-02-17T12:41:39+00:00 |
| rhsa-2026:2218 | Red Hat Security Advisory: golang security update | 2026-02-09T01:55:26+00:00 | 2026-02-17T12:41:39+00:00 |
| rhsa-2026:2138 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:35:02+00:00 | 2026-02-17T12:41:39+00:00 |
| rhsa-2026:2126 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T14:55:08+00:00 | 2026-02-17T12:41:39+00:00 |
| rhsa-2026:2217 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-09T01:27:56+00:00 | 2026-02-17T12:41:38+00:00 |
| rhsa-2026:2201 | Red Hat Security Advisory: Red Hat Lightspeed (formerly Insights) for Runtimes security update | 2026-02-05T22:10:05+00:00 | 2026-02-17T12:41:38+00:00 |
| rhsa-2026:2149 | Red Hat Security Advisory: Kiali 2.17.3 for Red Hat OpenShift Service Mesh 3.2 | 2026-02-05T16:16:04+00:00 | 2026-02-17T12:41:38+00:00 |
| rhsa-2026:2148 | Red Hat Security Advisory: Kiali 2.11.6 for Red Hat OpenShift Service Mesh 3.1 | 2026-02-05T15:58:24+00:00 | 2026-02-17T12:41:37+00:00 |
| rhsa-2026:2147 | Red Hat Security Advisory: Kiali 2.4.12 for Red Hat OpenShift Service Mesh 3.0 | 2026-02-05T15:58:12+00:00 | 2026-02-17T12:41:37+00:00 |
| rhsa-2026:2146 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:54:06+00:00 | 2026-02-17T12:41:37+00:00 |
| rhsa-2026:2144 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:45:43+00:00 | 2026-02-17T12:41:36+00:00 |
| rhsa-2026:2139 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:35:09+00:00 | 2026-02-17T12:41:36+00:00 |
| rhsa-2026:1957 | Red Hat Security Advisory: python3.12-urllib3 security update | 2026-02-04T19:16:17+00:00 | 2026-02-17T12:41:36+00:00 |
| rhsa-2026:2137 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:26:20+00:00 | 2026-02-17T12:41:35+00:00 |
| rhsa-2026:2136 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:17:09+00:00 | 2026-02-17T12:41:35+00:00 |
| rhsa-2026:1896 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.3 | 2026-02-04T07:12:33+00:00 | 2026-02-17T12:41:35+00:00 |
| rhsa-2026:2133 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:02:51+00:00 | 2026-02-17T12:41:34+00:00 |
| rhsa-2026:2124 | Red Hat Security Advisory: osbuild-composer security update | 2026-02-05T14:55:40+00:00 | 2026-02-17T12:41:34+00:00 |
| rhsa-2026:2123 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.0 | 2026-02-05T14:26:23+00:00 | 2026-02-17T12:41:33+00:00 |
| rhsa-2026:2106 | Red Hat Security Advisory: RHOAI 2.25.2 - Red Hat OpenShift AI | 2026-02-05T13:38:32+00:00 | 2026-02-17T12:41:33+00:00 |
| rhsa-2026:2034 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.20 security, enhancement & bug fix update | 2026-02-05T06:37:04+00:00 | 2026-02-17T12:41:32+00:00 |
| rhsa-2026:1942 | Red Hat Security Advisory: Red Hat Quay 3.15.3 | 2026-02-04T15:43:51+00:00 | 2026-02-17T12:41:32+00:00 |
| rhsa-2026:1938 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.0 | 2026-02-04T15:12:01+00:00 | 2026-02-17T12:41:32+00:00 |
| rhsa-2026:1908 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-02-04T16:10:41+00:00 | 2026-02-17T12:41:32+00:00 |
| rhsa-2026:1907 | Red Hat Security Advisory: opentelemetry-collector security update | 2026-02-04T11:48:06+00:00 | 2026-02-17T12:41:32+00:00 |
| rhsa-2026:1845 | Red Hat Security Advisory: Red Hat build of Cryostat security update | 2026-02-03T16:03:10+00:00 | 2026-02-17T12:41:31+00:00 |
| rhsa-2026:1814 | Red Hat Security Advisory: golang security update | 2026-02-03T12:29:57+00:00 | 2026-02-17T12:41:30+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-043-07 | Siemens Siveillance Video Management Servers | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-05 | Siemens Solid Edge | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-04 | Siemens Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-03 | Siemens COMOS | 2025-12-09T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-02 | Siemens Polarion | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-01 | Siemens SINEC NMS | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-015-04 | Siemens SIMATIC and SIPLUS products | 2026-01-13T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-289-06 | Siemens SiPass Integrated | 2025-10-14T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-254-03 | Siemens SINAMICS Drives | 2025-09-09T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-226-22 | Siemens Web Installer | 2025-08-12T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-162-05 | Siemens SIMATIC S7-1500 CPU Family | 2025-06-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-162-02 | Siemens RUGGEDCOM APE1808 | 2025-06-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-135-01 | Siemens RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-072-11 | Siemens SIMATIC IPC Family, ITP1000, and Field PGs | 2025-03-11T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-24-102-01 | Siemens SIMATIC S7-1500 | 2024-04-09T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-12-349-01 | Siemens Automation License Manager Uncontrolled Resource Consumption | 2012-12-12T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-140-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update E) | 2025-05-20T04:00:00.000000Z | 2026-02-12T05:00:00.000000Z |
| icsma-26-041-01 | ZOLL ePCR IOS Mobile Application | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-04 | AVEVA PI to CONNECT Agent | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-03 | AVEVA PI Data Archive | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-02 | ZLAN Information Technology Co. ZLAN5143D | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-01 | Yokogawa FAST/TOOLS | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-036-06 | Hitachi Energy FOX61x | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-05 | Hitachi Energy XMC20 | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-04 | Ilevia EVE X1 Server | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-03 | o6 Automation GmbH Open62541 | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-02 | Mitsubishi Electric MELSEC iQ-R Series | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-029-01 | KiloView Encoder Series (Update A) | 2026-01-29T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-184-03 | Mitsubishi Electric MELSOFT Update Manager (Update B) | 2025-07-03T06:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-184-01 | Hitachi Energy Relion 670/650 and SAM600-IO Series | 2025-06-24T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-privesc-catc-ryjreelu | Cisco Catalyst Center Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-xss-wextvz59 | Cisco Catalyst Center Cross-Site Scripting Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-ci-zwlqvswt | Cisco Catalyst Center REST API Command Injection Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-priv-esc-vs8eecux | Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-open-redirect-3w5bk3je | Cisco Catalyst Center Virtual Appliance HTTP Open Redirect Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-cc-unauth-rce-qen8h7mq | Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-13T12:48:42+00:00 |
| cisco-sa-asaftd-webvpn-yrootuw | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Unauthorized Access Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:55+00:00 |
| cisco-sa-asaftd-webvpn-z5xp8eub | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:54+00:00 |
| cisco-sa-http-code-exec-wmfp3h3o | Cisco Secure Firewall Adaptive Security Appliance Software, Secure Firewall Threat Defense Software, IOS Software, IOS XE Software, and IOS XR Software Web Services Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:51+00:00 |
| cisco-sa-ise-radsupress-dos-8yf3jthh | Cisco Identity Services Engine RADIUS Suppression Denial of Service Vulnerability | 2025-11-05T16:00:00+00:00 | 2025-11-05T16:00:00+00:00 |
| cisco-sa-broadworks-xss-o696ymra | Cisco BroadWorks CommPilot Application Software Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-10-21T15:13:31+00:00 |
| cisco-sa-roomos-inf-disc-qggsbxam | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-phone-dos-fpyjlv7a | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-secboot-uqfd8avc | Cisco IOS XE Software Secure Boot Bypass Vulnerabilities | 2025-09-24T16:00:00+00:00 | 2025-10-15T15:57:29+00:00 |
| cisco-sa-snmp-x4lphte | Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-06T18:27:02+00:00 |
| cisco-sa-ios-tacacs-hdb7thjw | Cisco IOS and IOS XE Software TACACS+ Authentication Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-01T16:39:50+00:00 |
| cisco-sa-cv-xss-rwrakaj9 | Cisco Cyber Vision Center Stored Cross-Site Scripting Vulnerabilities | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cucm-stored-xss-fnj66yly | Cisco Unified Communications Manager Stored Cross-Site Scripting Vulnerability | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cat9k-ptmd7bgy | Cisco IOS XE Software for Catalyst 9000 Series Switches Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-30T14:26:46+00:00 |
| cisco-sa-ap-ipv6-gw-tuazpn9o | Cisco Access Point Software Intermittent IPv6 Gateway Change Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:51+00:00 |
| cisco-sa-webui-xss-vwydgjou | Cisco IOS XE Software Web Authentication Reflected Cross-Site Scripting Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:50+00:00 |
| cisco-sa-snmpwred-x3mjyf5m | Cisco IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-nbar-dos-lavwtmet | Cisco IOS XE Software Network-Based Application Recognition Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-arg-inject-eyddbh4e | Cisco IOS XE Software CLI Argument Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-cmd-inject-rpjm8bgl | Cisco IOS XE Software HTTP API Command Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-invalid-url-dos-nvxszf6u | Cisco IOS Software Industrial Ethernet Switch Device Manager Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-cli-eb7cz6yo | Cisco IOS and IOS XE Software CLI Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-defaultacl-psjk9nvf | Cisco SD-WAN vEdge Software Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-cat9k-acl-l4k7vxgd | Cisco IOS XE Software on Cisco Catalyst 9500X and 9600X Series Switches Virtual Interface Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-action-frame-inj-qqcncz8h | Cisco Wireless Access Point Software Device Analytics Action Frame Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2023-0007 | Vulnerabilities in SICK LMS5xx | 2023-08-25T11:00:00.000Z | 2023-08-25T11:00:00.000Z |
| sca-2023-0006 | Vulnerabilities in SICK ICR890-4 | 2023-07-10T13:00:00.000Z | 2023-07-10T13:00:00.000Z |
| sca-2023-0005 | Vulnerabilities in SICK EventCam App | 2023-06-19T11:00:00.000Z | 2023-06-19T11:00:00.000Z |
| sca-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| sca-2023-0003 | Vulnerability in SICK Flexi Soft and Flexi Classic Gateways | 2023-05-03T13:00:00.000Z | 2023-05-03T13:00:00.000Z |
| sca-2023-0002 | Use of Telnet in multiple SICK Flexi Soft and Flexi Classic Gateways | 2023-04-11T10:00:00.000Z | 2023-04-11T10:00:00.000Z |
| sca-2023-0001 | Bootloader mode vulnerability in Flexi Soft Gateways v3 | 2023-02-20T14:00:00.000Z | 2023-02-20T14:00:00.000Z |
| sca-2022-0015 | Use of a Broken or Risky Cryptographic Algorithm in SICK RFU6xx RADIO FREQUEN. SENSOR | 2022-12-08T16:00:00.000Z | 2022-12-08T16:00:00.000Z |
| sca-2022-0013 | Password recovery vulnerability affects multiple SICK SIMs | 2022-10-21T13:00:00.000Z | 2022-11-04T14:00:00.000Z |
| sca-2022-0014 | SICK FlexiCompact affected by Denial of Service vulnerability | 2022-10-31T11:00:00.000Z | 2022-10-31T11:00:00.000Z |
| sca-2022-0012 | OpenSSL vulnerability affects multiple SICK SIMs | 2022-08-08T13:00:00.000Z | 2022-08-03T13:00:00.000Z |
| sca-2022-0010 | Vulnerability in SICK Flexi Soft Designer & Safety Designer | 2022-05-16T10:00:00.000Z | 2022-07-19T10:00:00.000Z |
| sca-2022-0011 | Vulnerabilities in SICK Package Analytics | 2022-06-08T15:00:00.000Z | 2022-06-08T15:00:00.000Z |
| sca-2022-0009 | Vulnerability in SICK Flexi Soft PROFINET IO Gateway FX0-GPNT and SICK microScan3 PROFINET | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0008 | Vulnerability in SICK Gateways for Flexi Soft, Flexi Compact, SICK EFI Gateway UE4740, SICK microScan3 and outdoorScan3 | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0007 | Vulnerabilities in SICK MARSIC300 | 2022-04-21T15:00:00.000Z | 2022-04-21T15:00:00.000Z |
| sca-2022-0006 | Vulnerability in SICK MSC800 | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0005 | Vulnerability in SICK Overall Equipment Effectiveness (OEE) | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0004 | Microsoft vulnerability affects multiple SICK IPCs with SICK MEAC | 2022-04-11T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
| sca-2022-0003 | Vulnerabilities in SICK FTMg | 2022-03-31T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
| sca-2022-0002 | PwnKit vulnerability affects multiple SICK IPCs | 2022-02-23T16:00:00.000Z | 2022-02-23T16:00:00.000Z |
| sca-2022-0001 | Vulnerability in SICK FieldEcho | 2022-02-17T16:00:00.000Z | 2022-02-17T16:00:00.000Z |
| sca-2021-0003 | SICK Security Advisory for Apache Log4j (CVE-2021-44228) | 2021-12-14T17:00:00.000Z | 2021-12-17T12:00:00.000Z |
| sca-2021-0004 | Vulnerabilities in SICK SOPAS ET | 2021-12-16T08:00:00.000Z | 2021-12-17T08:00:00.000Z |
| sca-2021-0002 | MEAC affected by Windows SMBv1 vulnerability | 2021-08-04T10:00:00.000Z | 2021-08-04T10:00:00.000Z |
| sca-2021-0001 | Inadequate SSH configuration in SICK Visionary-S CX | 2021-06-25T10:00:00.000Z | 2021-06-25T10:00:00.000Z |
| sca-2020-0005 | Package Analytics affected by Windows TCP/IP vulnerability | 2020-10-29T11:00:00.000Z | 2020-10-29T11:00:00.000Z |
| sca-2020-0004 | Vulnerability in Platform Mechanism AutoIP | 2020-08-31T10:00:00.000Z | 2020-08-31T10:00:00.000Z |
| sca-2020-0003 | MEAC affected by Windows SMBv3 vulnerability | 2020-08-07T10:00:00.000Z | 2020-08-07T10:00:00.000Z |
| sca-2020-0002 | Vulnerabilities in SICK Package Analytics | 2020-08-07T10:00:00.000Z | 2020-07-28T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2022:2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:5-01 | Information disclosure via the debug function in assertions in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2023:16-01 | Path traversal via 'zip slip' in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2023:14-01 | Unsafe temporary data privileges on Unix systems in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2023:13-01 | Missing authentication for local web interface in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2023:1-01 | Authenticated SQL Injection on Alerts in Guardian/CMC before 22.5.2 | 2023-05-03T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2021:2-01 | Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2021:1-01 | Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2020:3-01 | Angular template injection on custom report name field | 2020-05-26T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2020:2-01 | Cross-site request forgery attack on change password form | 2020-05-26T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2019:2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2019:1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-39703 | net, hsr: reject HSR frame if skb can't hold tag | 2025-09-02T00:00:00.000Z | 2026-02-24T14:46:14.000Z |
| msrc_cve-2025-39702 | ipv6: sr: Fix MAC comparison to be constant-time | 2025-09-02T00:00:00.000Z | 2026-02-24T14:46:07.000Z |
| msrc_cve-2025-39697 | NFS: Fix a race when updating an existing write | 2025-09-02T00:00:00.000Z | 2026-02-24T14:46:01.000Z |
| msrc_cve-2025-39691 | fs/buffer: fix use-after-free when call bh_read() helper | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:54.000Z |
| msrc_cve-2025-39689 | ftrace: Also allocate and copy hash for reading of filter files | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:48.000Z |
| msrc_cve-2025-39683 | tracing: Limit access to parser->buffer when trace_get_user failed | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:41.000Z |
| msrc_cve-2025-39681 | x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:34.000Z |
| msrc_cve-2025-39693 | drm/amd/display: Avoid a NULL pointer dereference | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:28.000Z |
| msrc_cve-2025-39676 | scsi: qla4xxx: Prevent a potential error pointer dereference | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:21.000Z |
| msrc_cve-2025-39673 | ppp: fix race conditions in ppp_fill_forward_path | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:14.000Z |
| msrc_cve-2025-38699 | scsi: bfa: Double-free fix | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:08.000Z |
| msrc_cve-2025-38666 | net: appletalk: Fix use-after-free in AARP proxy probe | 2025-08-02T00:00:00.000Z | 2026-02-24T14:45:01.000Z |
| msrc_cve-2025-38664 | ice: Fix a null pointer dereference in ice_copy_and_init_pkg() | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:55.000Z |
| msrc_cve-2025-38645 | net/mlx5: Check device memory pointer before usage | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:48.000Z |
| msrc_cve-2025-38622 | net: drop UFO packets in udp_rcv_segment() | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:41.000Z |
| msrc_cve-2025-38618 | vsock: Do not allow binding to VMADDR_PORT_ANY | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:35.000Z |
| msrc_cve-2025-38617 | net/packet: fix a race in packet_set_ring() and packet_notifier() | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:24.000Z |
| msrc_cve-2025-38612 | staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:18.000Z |
| msrc_cve-2025-38609 | PM / devfreq: Check governor before using governor->name | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:11.000Z |
| msrc_cve-2025-38608 | bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:04.000Z |
| msrc_cve-2025-38604 | wifi: rtl818x: Kill URBs before clearing tx status queue | 2025-08-02T00:00:00.000Z | 2026-02-24T14:43:57.000Z |
| msrc_cve-2025-38602 | iwlwifi: Add missing check for alloc_ordered_workqueue | 2025-08-02T00:00:00.000Z | 2026-02-24T14:43:51.000Z |
| msrc_cve-2025-38550 | ipv6: mcast: Delay put pmc->idev in mld_del_delrec() | 2025-08-02T00:00:00.000Z | 2026-02-24T14:43:44.000Z |
| msrc_cve-2025-38546 | atm: clip: Fix memory leak of struct clip_vcc. | 2025-08-02T00:00:00.000Z | 2026-02-24T14:43:38.000Z |
| msrc_cve-2025-38542 | net: appletalk: Fix device refcount leak in atrtr_create() | 2025-08-02T00:00:00.000Z | 2026-02-24T14:43:31.000Z |
| msrc_cve-2025-38539 | tracing: Add down_write(trace_event_sem) when adding trace event | 2025-08-02T00:00:00.000Z | 2026-02-24T14:43:24.000Z |
| msrc_cve-2025-38529 | comedi: aio_iiro_16: Fix bit shift out of bounds | 2025-08-02T00:00:00.000Z | 2026-02-24T14:43:18.000Z |
| msrc_cve-2025-38528 | bpf: Reject %p% format string in bprintf-like helpers | 2025-08-02T00:00:00.000Z | 2026-02-24T14:43:11.000Z |
| msrc_cve-2025-38527 | smb: client: fix use-after-free in cifs_oplock_break | 2025-08-02T00:00:00.000Z | 2026-02-24T14:43:04.000Z |
| msrc_cve-2025-38516 | pinctrl: qcom: msm: mark certain pins as invalid for interrupts | 2025-08-02T00:00:00.000Z | 2026-02-24T14:42:58.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| 9akk108471a1621 | EIBPORT Session Management Fail | 2025-06-02T00:30:00.000Z | 2025-06-04T00:30:00.000Z |
| 9akk108471a0021 | ELSB/BLBA ASPECT advisory several CVEs | 2025-05-22T00:30:00.000Z | 2025-05-23T10:30:00.000Z |
| 2crt000006 | ANC – ABB Network Card Multiple vulnerabilities in ANC | 2025-04-30T00:30:00.000Z | 2025-04-30T00:30:00.000Z |
| 2crt000007 | Ekip Com IEC61850 Vulnerability in 3rd Party Library | 2025-04-29T00:30:00.000Z | 2025-04-29T00:30:00.000Z |
| 9akk108470a9989 | ABB MV Drives Affected by CODESYS RTS (Runtime System) Vulnerabilities | 2025-04-10T08:30:00.000Z | 2025-04-10T08:30:00.000Z |
| 2nga002579 | ABB Arctic communication solution ARM600 Vulnerabilities | 2025-04-07T10:30:00.000Z | 2025-04-07T10:30:00.000Z |
| 2nga002427 | ABB Arctic ARG600, ARC600, ARR600, ARP600 Arctic Wireless Gateway Modem Module and OpenSSH vulnerabilities | 2025-04-07T10:30:00.000Z | 2025-04-07T10:30:00.000Z |
| 9akk108470a9494 | Low Voltage DC Drives and Power Controllers CODESYS RTS Vulnerabilities | 2025-03-26T00:30:00.000Z | 2025-03-27T00:30:00.000Z |
| 9akk108470a9491 | ABB ACS880 +N8010 Drives CODESYS RTS Vulnerabilities | 2025-03-26T00:30:00.000Z | 2025-03-27T00:30:00.000Z |
| sa24p015 | B&R APROL Potential Privilege Escalation and Information Disclosure | 2025-03-24T00:30:00.000Z | 2025-03-24T00:30:00.000Z |
| 9akk108470a8565 | RMC-100 Vulnerability in the Web UI (REST Interface) | 2025-03-11T00:30:00.000Z | 2025-03-11T00:30:00.000Z |
| 9akk108470a5684 | FLXeon Controllers Cyber Security Advisory | 2025-01-20T00:30:00.000Z | 2025-02-14T00:30:00.000Z |
| 7paa012159 | System 800xA 5.1.x, 6.0.3.x, 6.1.1.x, 6.2.x - VideONet Camera passwords stored in clear text | 2025-02-10T00:30:00.000Z | 2025-02-10T00:30:00.000Z |
| 9akk108470a6775 | Hardcoded credentials in ASPECT Energy Management System | 2025-02-05T00:30:00.000Z | 2025-02-06T00:30:00.000Z |
| sa25p001 | Automation Runtime and mapp View Use of insecure algorithm for self-signed certificates | 2025-01-15T00:30:00.000Z | 2025-01-16T00:30:00.000Z |
| 9akk108470a5466 | Drive Composer Path Traversal Vulnerability | 2025-02-05T00:30:00.000Z | 2025-01-10T00:30:00.000Z |
| 3adr011377 | AC500 V3 Multiple vulnerabilities | 2025-01-07T00:30:00.000Z | 2025-01-07T00:30:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-200512-0300 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2025-12-22T23:51:40.062000Z |
| var-200512-0611 | Multiple heap-based buffer overflows in QuickTime.qts in Apple QuickTime Player 7.0.3 and… | 2025-12-22T23:51:39.990000Z |
| var-200512-0294 | Buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitr… | 2025-12-22T23:51:39.922000Z |
| var-201601-0038 | Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote atta… | 2025-12-22T23:49:01.892000Z |
| var-201801-0151 | A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior … | 2025-12-22T23:48:57.831000Z |
| var-201801-0152 | An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions pri… | 2025-12-22T23:48:57.732000Z |
| var-201805-1143 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2025-12-22T23:48:56.039000Z |
| var-201805-1144 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2025-12-22T23:48:55.924000Z |
| var-202206-2050 | The affected product is vulnerable to multiple SQL injections, which may allow an unautho… | 2025-12-22T23:48:47.890000Z |
| var-200107-0035 | slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cau… | 2025-12-22T23:48:28.809000Z |
| var-201105-0156 | Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 30… | 2025-12-22T23:45:15.166000Z |
| var-201112-0297 | Multiple cross-site scripting (XSS) vulnerabilities in the Virus Scan Interface in SAP Ne… | 2025-12-22T23:44:53.453000Z |
| var-201801-0394 | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbi… | 2025-12-22T23:43:40.772000Z |
| var-201809-0087 | WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vul… | 2025-12-22T23:43:09.284000Z |
| var-201902-0647 | LCDS Laquis SCADA prior to version 4.1.0.4150 allows execution of script code by opening … | 2025-12-22T23:43:06.976000Z |
| var-202004-0077 | There are multiple ways an unauthenticated attacker could perform SQL injection on WebAcc… | 2025-12-22T23:42:52.255000Z |
| var-200603-0283 | Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 1… | 2025-12-22T23:41:21.128000Z |
| var-201202-0245 | Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, L… | 2025-12-22T23:41:18.968000Z |
| var-201801-1712 | Systems with microprocessors utilizing speculative execution and branch prediction may al… | 2025-12-22T23:41:18.264000Z |
| var-200505-1436 | zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users… | 2025-12-22T23:41:09.495000Z |
| var-202012-1529 | A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion se… | 2025-12-22T23:41:08.737000Z |
| var-200607-0664 | Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to … | 2025-12-22T23:41:08.009000Z |
| var-201904-1410 | A use after free issue was addressed with improved memory management. This issue affected… | 2025-12-22T23:41:01.954000Z |
| var-201710-0206 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key… | 2025-12-22T23:41:01.766000Z |
| var-200608-0028 | AFP Server in Apple Mac OS X 10.3.9 and 10.4.7 stores reconnect keys in a world-readable … | 2025-12-22T23:40:00.035000Z |
| var-201808-1002 | Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo… | 2025-12-22T23:39:27.228000Z |
| var-201202-0067 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:38:55.200000Z |
| var-201110-0450 | The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to c… | 2025-12-22T23:38:54.765000Z |
| var-201201-0018 | Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allow… | 2025-12-22T23:38:54.673000Z |
| var-202202-0081 | In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames. Desc… | 2025-12-22T23:38:21.079000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-000014 | OS command injection in raspap-webgui | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000013 | Multiple Microsoft Office products vulnerable to untrusted search path | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000012 | Multiple vulnerabilities in Cybozu Garoon | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000018 | Undocumented "TelnetEnable" functionality of End of Service NETGEAR products | 2026-01-30T14:23+09:00 | 2026-01-30T14:23+09:00 |
| jvndb-2026-002119 | Multiple vulnerabilities in BROTHER MFPs (multifunction printers) | 2026-01-30T11:26+09:00 | 2026-01-30T11:26+09:00 |
| jvndb-2026-002030 | Multiple Vulnerabilities in Cosminexus | 2026-01-29T10:32+09:00 | 2026-01-29T10:32+09:00 |
| jvndb-2026-001972 | Archer MR600 vulnerable to OS command injection | 2026-01-28T10:41+09:00 | 2026-01-28T10:41+09:00 |
| jvndb-2026-000011 | beat-access for Windows may insecurely load Dynamic Link Libraries | 2026-01-27T18:22+09:00 | 2026-01-27T18:22+09:00 |
| jvndb-2026-001732 | Multiple Brother software installers may insecurely load Dynamic Link Libraries | 2026-01-26T16:04+09:00 | 2026-01-26T16:04+09:00 |
| jvndb-2026-000010 | Command injection vulnerability in ASUS routers | 2026-01-23T15:22+09:00 | 2026-01-23T15:22+09:00 |
| jvndb-2026-001663 | "iRMC S5/S6" implemented in PRIMERGY vulnerable to incorrect authorization | 2026-01-23T11:29+09:00 | 2026-01-23T11:29+09:00 |
| jvndb-2026-001662 | Multiple vulnerabilities in Trend Micro Apex Central (January 2026) | 2026-01-23T11:29+09:00 | 2026-01-23T11:29+09:00 |
| jvndb-2026-000009 | Installer of Fujitsu ServerView Agents for Windows may insecurely load Dynamic Link Libraries | 2026-01-21T15:17+09:00 | 2026-01-21T15:17+09:00 |
| jvndb-2026-000008 | Ruijie Networks AP180 series vulnerable to OS command injection | 2026-01-21T15:17+09:00 | 2026-01-21T15:17+09:00 |
| jvndb-2026-001582 | Security information for Hitachi Disk Array Systems | 2026-01-21T12:11+09:00 | 2026-01-21T12:11+09:00 |
| jvndb-2026-001578 | ETERNUS SF vulnerable to insertion of sensitive information into maintenance data | 2026-01-20T20:00+09:00 | 2026-01-20T20:00+09:00 |
| jvndb-2026-001380 | Multiple vulnerabilities in Canon Small Office Multifunction Printers and Laser Printers | 2026-01-19T10:08+09:00 | 2026-01-19T10:08+09:00 |
| jvndb-2026-000007 | Multiple Vulnerabilities in TOA Network Cameras TRIFORA 3 series | 2026-01-16T15:06+09:00 | 2026-01-16T15:06+09:00 |
| jvndb-2025-022878 | Media Player MP-01 vulnerable to Missing Authentication for Critical Function | 2025-12-24T11:10+09:00 | 2026-01-15T11:10+09:00 |
| jvndb-2026-000006 | Chainlit vulnerable to improper access restriction | 2026-01-14T17:03+09:00 | 2026-01-14T17:03+09:00 |
| jvndb-2026-000002 | Multiple vulnerabilities in multiple NEC branded projectors manufactured by Sharp Display Solutions, Ltd. | 2026-01-07T14:10+09:00 | 2026-01-14T16:54+09:00 |
| jvndb-2026-000005 | Multiple vulnerabilities in EATON UPS Companion | 2026-01-13T19:01+09:00 | 2026-01-13T19:01+09:00 |
| jvndb-2026-000003 | RICOH Streamline NX vulnerable to improper authorization | 2026-01-09T18:17+09:00 | 2026-01-09T18:17+09:00 |
| jvndb-2026-000004 | The installers for multiple PIONEER products may insecurely load Dynamic Link Libraries | 2026-01-08T13:47+09:00 | 2026-01-08T13:47+09:00 |
| jvndb-2026-000001 | Origin validation error vulnerability in Fujitsu Security Solution AuthConductor Client Basic V2 | 2026-01-07T14:19+09:00 | 2026-01-07T14:19+09:00 |
| jvndb-2026-001001 | Authentication bypass vulnerability in OpenBlocks series | 2026-01-07T10:46+09:00 | 2026-01-07T10:46+09:00 |
| jvndb-2025-019621 | EPSON WebConfig / Epson Web Control for SEIKO EPSON Projector Products do not restrict excessive authentication attempts | 2025-11-21T15:31+09:00 | 2025-12-24T10:54+09:00 |
| jvndb-2025-014967 | Multiple vulnerabilities in multiple Keyence products | 2025-10-03T11:19+09:00 | 2025-12-23T14:36+09:00 |
| jvndb-2025-000117 | SEIKO EPSON printer Web Config vulnerable to stack-based buffer overflow | 2025-12-16T15:31+09:00 | 2025-12-23T11:57+09:00 |
| jvndb-2025-022400 | Ruijie Networks AP180 Series vulnerable to OS command injection | 2025-12-19T12:33+09:00 | 2025-12-19T12:33+09:00 |
| ID | Description | Updated |
|---|---|---|
| ts-2023-001 | TS-2023-001 | 2023-01-17T00:00 |
| ts-2022-005 | TS-2022-005 | 2022-11-21T00:00 |
| ts-2022-004 | TS-2022-004 | 2022-11-21T00:00 |
| ts-2022-003 | TS-2022-003 | 2022-06-14T00:00 |
| ts-2022-002 | TS-2022-002 | 2022-05-11T00:00 |
| ts-2022-001 | TS-2022-001 | 2022-02-07T00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0613-1 | Security update for python310 | 2026-02-24T15:14:45Z | 2026-02-24T15:14:45Z |
| suse-su-2026:0612-1 | Security update for python36 | 2026-02-24T15:14:18Z | 2026-02-24T15:14:18Z |
| suse-su-2026:0606-1 | Security update for libxml2 | 2026-02-24T11:19:39Z | 2026-02-24T11:19:39Z |
| suse-su-2026:0605-1 | Security update for libxml2 | 2026-02-24T11:19:20Z | 2026-02-24T11:19:20Z |
| suse-su-2026:0604-1 | Security update for gimp | 2026-02-24T11:16:24Z | 2026-02-24T11:16:24Z |
| suse-su-2026:0598-1 | Security update for libpng12 | 2026-02-23T15:58:31Z | 2026-02-23T15:58:31Z |
| suse-su-2026:0597-1 | Security update for libpng16 | 2026-02-23T15:58:09Z | 2026-02-23T15:58:09Z |
| suse-su-2026:0596-1 | Security update for libpng16 | 2026-02-23T15:57:24Z | 2026-02-23T15:57:24Z |
| suse-su-2026:0592-1 | Security update for vexctl | 2026-02-20T14:27:24Z | 2026-02-20T14:27:24Z |
| suse-su-2026:0590-1 | Security update for python | 2026-02-20T10:05:50Z | 2026-02-20T10:05:50Z |
| suse-su-2026:0589-1 | Security update for xen | 2026-02-20T10:05:27Z | 2026-02-20T10:05:27Z |
| suse-su-2026:0588-1 | Security update for postgresql16 | 2026-02-20T10:05:15Z | 2026-02-20T10:05:15Z |
| suse-su-2026:0587-1 | Security update for the Linux Kernel | 2026-02-20T10:04:28Z | 2026-02-20T10:04:28Z |
| suse-su-2026:0586-1 | Security update for postgresql17 | 2026-02-20T10:04:16Z | 2026-02-20T10:04:16Z |
| suse-su-2026:0585-1 | Security update for postgresql18 | 2026-02-20T10:03:34Z | 2026-02-20T10:03:34Z |
| suse-su-2026:0584-1 | Security update for postgresql18 | 2026-02-20T10:03:22Z | 2026-02-20T10:03:22Z |
| suse-su-2026:0583-1 | Security update for libpng16 | 2026-02-20T10:02:34Z | 2026-02-20T10:02:34Z |
| suse-su-2026:0582-1 | Security update for snpguest | 2026-02-20T10:02:23Z | 2026-02-20T10:02:23Z |
| suse-su-2026:0581-1 | Security update for openCryptoki | 2026-02-20T06:38:26Z | 2026-02-20T06:38:26Z |
| suse-su-2026:0577-1 | Security update for avahi | 2026-02-18T15:49:23Z | 2026-02-18T15:49:23Z |
| suse-su-2026:0573-1 | Security update for kubernetes-old | 2026-02-17T18:47:26Z | 2026-02-17T18:47:26Z |
| suse-su-2026:0572-1 | Security update for kubernetes | 2026-02-17T18:47:08Z | 2026-02-17T18:47:08Z |
| suse-su-2026:0571-1 | Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer | 2026-02-17T18:46:54Z | 2026-02-17T18:46:54Z |
| suse-su-2026:0570-1 | Security update for libxml2 | 2026-02-17T16:38:51Z | 2026-02-17T16:38:51Z |
| suse-su-2026:0561-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T12:33:41Z | 2026-02-16T12:33:41Z |
| suse-su-2026:0560-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T12:03:47Z | 2026-02-16T12:03:47Z |
| suse-su-2026:0559-1 | Security update for freerdp | 2026-02-16T11:43:04Z | 2026-02-16T11:43:04Z |
| suse-su-2026:0558-1 | Security update for libnvidia-container | 2026-02-16T11:42:25Z | 2026-02-16T11:42:25Z |
| suse-su-2026:0557-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T10:33:36Z | 2026-02-16T10:33:36Z |
| suse-su-2026:0556-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T10:03:47Z | 2026-02-16T10:03:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10199-1 | python311-pymssql-2.3.12-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10198-1 | python311-Pillow-12.1.1-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10197-1 | libecpg6-18.2-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10196-1 | matrix-synapse-1.147.1-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10195-1 | gimp-3.0.8-2.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10194-1 | cargo-audit-advisory-db-20260213-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10182-1 | snpguest-0.10.0-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10181-1 | sccache-0.13.0~1-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10180-1 | rustup-1.28.2~0-3.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10179-1 | python311-maturin-1.11.5-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10178-1 | libmunge2-0.5.18-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10177-1 | gnutls-3.8.12-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10176-1 | freerdp2-2.11.7-4.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10175-1 | cargo-audit-0.22.1~git0.efcde93-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10174-1 | assimp-devel-6.0.4-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10173-1 | apptainer-1.4.5-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:20193-1 | Security update for orthanc, gdcm, orthanc-authorization, orthanc-dicomweb, orthanc-gdcm, orthanc-indexer, orthanc-mysql, orthanc-neuro, orthanc-postgresql, orthanc-python, orthanc-stl, orthanc-tcia, orthanc-wsi, python-pyorthanc | 2026-02-10T22:29:40Z | 2026-02-10T22:29:40Z |
| opensuse-su-2026:20191-1 | Security update for trivy | 2026-02-10T21:52:10Z | 2026-02-10T21:52:10Z |
| opensuse-su-2026:20192-1 | Security update for tailscale | 2026-02-10T21:45:05Z | 2026-02-10T21:45:05Z |
| opensuse-su-2026:20183-1 | Security update for chromium | 2026-02-07T14:42:36Z | 2026-02-07T14:42:36Z |
| opensuse-su-2026:20184-1 | Security update for python-Django | 2026-02-07T13:45:17Z | 2026-02-07T13:45:17Z |
| opensuse-su-2026:20182-1 | Security update for cockpit | 2026-02-06T03:08:03Z | 2026-02-06T03:08:03Z |
| opensuse-su-2026:20181-1 | Security update for cockpit-subscriptions | 2026-02-06T02:48:38Z | 2026-02-06T02:48:38Z |
| opensuse-su-2026:10146-1 | libpainter0-0.9.27-1.1 on GA media | 2026-02-04T00:00:00Z | 2026-02-04T00:00:00Z |
| opensuse-su-2026:10145-1 | python312-Django6-6.0.2-1.1 on GA media | 2026-02-04T00:00:00Z | 2026-02-04T00:00:00Z |
| opensuse-su-2026:10144-1 | expat-2.7.4-1.1 on GA media | 2026-02-04T00:00:00Z | 2026-02-04T00:00:00Z |
| opensuse-su-2026:20167-1 | Security update for xrdp | 2026-02-03T15:00:07Z | 2026-02-03T15:00:07Z |
| opensuse-su-2026:10143-1 | traefik2-2.11.35-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10142-1 | traefik-3.6.7-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10141-1 | rizin-0.8.2-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2021-313-05 | BadAlloc Vulnerabilities | 2021-11-09T05:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-05 | Modicon M340 Controller and Communication Modules | 2025-08-12T04:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-014-05 | Web Server on Modicon M340, Modbus/TCP Ethernet Modicon M340 module, Modbus/TCP Ethernet Modicon M340 FactoryCast module and Ethernet / Serial RTU communication modules | 2025-01-14T00:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-014-03 | Wind River VxWorks DHCP Server Vulnerability | 2025-01-14T05:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2024-163-01 | Modicon M340, Modbus/TCP Ethernet Modicon M340 module, and Modbus/TCP Ethernet Modicon M340 FactoryCast module | 2024-06-11T00:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-189-04 | EcoStruxure™ Power Monitoring Expert (PME) and EcoStruxure™ Power Operation (EPO) with Advanced Reporting and Dashboards | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-189-02 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-189-01 | EcoStruxure™ IT Data Center Expert | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-03 | EVLink WallBox | 2025-06-10T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-02 | Modicon Controllers M241/M251/M258/LMC058/M262 | 2025-06-10T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2024-254-01 | Vijeo Designer | 2024-09-10T00:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-01 | Insight Home and Insight Facility | 2025-06-10T04:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2020-287-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-10-13T00:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2025-133-04 | Schneider Electric PrismaSeT Active - Wireless Panel Server | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-03 | EcoStruxure Power Build Rapsody | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-02 | Wiser Home Automation | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-098-01 | ConneXium Network Manager Software | 2025-04-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-014-09 | EcoStruxure™ Power Build Rapsody | 2025-01-14T00:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2024-282-05 | EcoStruxure™ Power Monitoring Expert (PME) | 2024-10-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-098-02 | Trio™ Q Licensed Data Radios | 2025-04-08T04:00:00.000Z | 2025-04-08T04:00:00.000Z |
| sevd-2025-014-01 | Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC | 2025-01-14T05:00:00.000Z | 2025-04-08T04:00:00.000Z |
| sevd-2025-070-03 | WebHMI Component For EcoStruxure™ Power Automation System User Interface and EcoStruxure™ Microgrid Operation Large | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-070-02 | EPAS-UI & EcoSUI | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-070-01 | EcoStruxure™ Panel Server | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-042-04 | Enerlin'X IFE and eIFE | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-03 | EcoStruxure™ Process Expert, EcoStruxure™ Process Expert for AVEVA System Platform | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-01 | ASCO 5310 / 5350 Remote Annunciator | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2019-134-11 | Modicon Controllers | 2019-05-14T08:31:22.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-014-08 | Power Logic HDPM6000 High-Density Metering System | 2025-01-14T00:00:00.000Z | 2025-01-14T00:00:00.000Z |
| sevd-2025-014-04 | Web Designer for Modicon Communication Modules | 2025-01-14T00:00:00.000Z | 2025-01-14T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-libpython-2026-0865 | wsgiref.headers.Headers allows header newline injection | 2026-01-26T14:43:33.890Z | 2026-02-24T09:11:39.593Z |
| bit-grafana-2025-41117 | XSS in Grafana Explore stack trace | 2026-02-20T08:41:19.089Z | 2026-02-24T09:11:39.593Z |
| bit-airflow-2025-65995 | Apache Airflow: Disclosure of secrets to UI via kwargs | 2026-02-24T08:38:47.831Z | 2026-02-24T09:11:39.593Z |
| bit-python-2026-1299 | email BytesGenerator header injection due to unquoted newlines | 2026-02-03T08:53:00.053Z | 2026-02-23T12:55:58.474Z |
| bit-python-2025-15282 | Header injection via newlines in data URL mediatype | 2026-01-26T14:49:40.631Z | 2026-02-23T12:55:58.474Z |
| bit-libpython-2026-1299 | email BytesGenerator header injection due to unquoted newlines | 2026-02-03T08:45:06.015Z | 2026-02-23T12:55:58.474Z |
| bit-libpython-2025-15282 | Header injection via newlines in data URL mediatype | 2026-01-26T14:43:08.856Z | 2026-02-23T12:55:58.474Z |
| bit-ghost-2026-26980 | Ghost has a SQL Injection in its Content API | 2026-02-21T08:39:22.999Z | 2026-02-21T09:08:21.332Z |
| bit-cosign-2026-24122 | Cosign Certificate Chain Expiry Validation Issue Allows Issuing Certificate Expiry to Be Overlooked | 2026-02-21T08:36:39.661Z | 2026-02-21T09:08:21.332Z |
| bit-cilium-2026-26963 | Cilium may not enforce host firewall policies when Native Routing, WireGuard and Node Encryption are enabled | 2026-02-21T08:36:53.368Z | 2026-02-21T09:08:21.332Z |
| bit-python-2026-0672 | Header injection in http.cookies.Morsel | 2026-01-26T14:50:03.015Z | 2026-02-20T15:52:56.451Z |
| bit-python-2025-11468 | Folding email comments of unfoldable characters doesn't preserve parenthesis | 2026-01-26T14:49:32.088Z | 2026-02-20T15:52:56.451Z |
| bit-libpython-2026-0672 | Header injection in http.cookies.Morsel | 2026-01-26T14:43:32.238Z | 2026-02-20T15:52:56.451Z |
| bit-libpython-2025-11468 | Folding email comments of unfoldable characters doesn't preserve parenthesis | 2026-01-26T14:42:59.991Z | 2026-02-20T15:52:56.451Z |
| bit-tomcat-2026-24734 | Apache Tomcat Native, Apache Tomcat: OCSP revocation bypass | 2026-02-20T09:53:00.269Z | 2026-02-20T10:18:37.619Z |
| bit-nifi-2026-25903 | Apache NiFi: Missing Authorization of Restricted Permissions for Component Updates | 2026-02-20T08:45:57.883Z | 2026-02-20T09:09:49.097Z |
| bit-milvus-2025-64513 | Milvus Proxy has Critical Authentication Bypass Vulnerability | 2026-02-20T08:43:34.608Z | 2026-02-20T09:09:49.097Z |
| bit-jenkins-2026-27100 | 2026-02-20T08:43:34.823Z | 2026-02-20T09:09:49.097Z | |
| bit-jenkins-2026-27099 | 2026-02-20T08:43:33.019Z | 2026-02-20T09:09:49.097Z | |
| bit-grafana-2026-21722 | Public Dashboards time range restriction on annotations can be bypassed | 2026-02-20T08:41:29.411Z | 2026-02-20T09:09:49.097Z |
| bit-grafana-2026-21721 | Dashboard Permissions Scope Bypass Enables Cross‑Dashboard Privilege Escalation | 2026-02-20T08:41:27.652Z | 2026-02-20T09:09:49.097Z |
| bit-milvus-2026-26190 | Milvus Allows Unauthenticated Access to Restful API on Metrics Port (9091) Leads to Critical System Compromise | 2026-02-19T08:47:10.808Z | 2026-02-19T09:13:37.164Z |
| bit-gitlab-2021-22175 | 2024-03-06T11:20:35.887Z | 2026-02-19T09:13:37.164Z | |
| bit-grafana-2026-21720 | Unauthenticated DoS: avatar cache leaks goroutines when /avatar/:hash requests time out | 2026-02-18T17:41:21.379Z | 2026-02-18T18:09:39.057Z |
| bit-postgresql-2026-2007 | PostgreSQL pg_trgm heap buffer overflow writes pattern onto server memory | 2026-02-16T16:03:46.313Z | 2026-02-16T16:32:40.318Z |
| bit-postgresql-2026-2006 | PostgreSQL missing validation of multibyte character length executes arbitrary code | 2026-02-16T16:03:41.880Z | 2026-02-16T16:32:40.318Z |
| bit-postgresql-2026-2005 | PostgreSQL pgcrypto heap buffer overflow executes arbitrary code | 2026-02-16T16:03:36.943Z | 2026-02-16T16:32:40.318Z |
| bit-postgresql-2026-2004 | PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code | 2026-02-16T16:03:32.935Z | 2026-02-16T16:32:40.318Z |
| bit-postgresql-2026-2003 | PostgreSQL oidvector discloses a few bytes of memory | 2026-02-16T16:03:27.354Z | 2026-02-16T16:32:40.318Z |
| bit-pip-2026-1703 | Limited path traversal when installing wheel archives | 2026-02-16T15:59:06.080Z | 2026-02-16T16:32:40.318Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-bs57244 | Within HostnameError | 2026-02-17T00:39:44.907078Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-pr84319 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-r6v5-fh4h-64xc, GHSA-rhfx-m35p-ff5j, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0 | 2026-02-14T00:37:23.085740Z | 2026-02-13T12:28:27Z |
| cleanstart-2026-kk07808 | issue has been found in third-party PNM decoding associated with libpng 1 | 2026-02-14T00:37:45.311656Z | 2026-02-13T12:28:27Z |
| cleanstart-2026-wv76464 | libexpat in Expat before 2 | 2026-02-13T00:43:45.311968Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-tr92727 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-13T00:41:14.875956Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-qi35149 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-13T00:39:44.259950Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-mh09144 | issue was discovered in libexpat before 2 | 2026-02-13T00:45:17.459930Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-jb30245 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 0.47.2-r0 | 2026-02-13T00:39:45.274258Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-gv85693 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-13T00:40:14.240914Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-fi29887 | During the TLS 1 | 2026-02-13T00:39:44.225771Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-ca79883 | Security fixes for GHSA-6v2p-p943-phr9, GHSA-c6gw-w398-hv78, GHSA-f6x5-jh6r-wrfv, GHSA-hcg3-p754-cr77, GHSA-j5w8-q4qc-rx2x, GHSA-qxp5-gw88-xv66, GHSA-v778-237x-gjrc, GHSA-vvgc-356p-c3xw applied in versions: 1.15.0-r1 | 2026-02-13T00:40:14.901695Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-xb34574 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-11T00:40:59.223419Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-ls08172 | Within HostnameError | 2026-02-11T00:41:59.030674Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-im73098 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-11T00:40:59.052841Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-cv28298 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-11T00:41:59.034081Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-by71381 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-11T00:41:59.117560Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-tj33788 | Within HostnameError | 2026-02-10T00:39:24.476012Z | 2026-02-09T12:51:17Z |
| cleanstart-2026-gp14462 | Security fixes for GHSA-vvgc-356p-c3xw applied in versions: 0.18.0-r0 | 2026-02-10T00:39:23.397354Z | 2026-02-09T12:51:17Z |
| cleanstart-2026-wk88787 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-06T00:41:29.451524Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-rr78450 | Within HostnameError | 2026-02-06T00:39:29.463576Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-jn44153 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-gx3x-vq4p-mhhv, GHSA-j5w8-q4qc-rx2x applied in versions: 1.18.0-r0, 1.19.0-r1 | 2026-02-06T00:39:29.662228Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-bz58799 | Within HostnameError | 2026-02-06T00:39:29.590361Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-zm20570 | Moby is an open-source project created by Docker for software containerization | 2026-02-06T00:54:29.621254Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-xe32069 | Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a ... | 2026-02-06T01:10:32.733224Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-wx01708 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-02-06T01:10:02.024980Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-td34476 | Moby is an open-source project created by Docker for software containerization | 2026-02-06T00:51:29.459800Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-tc95380 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-02-06T01:06:01.062694Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-sp51034 | Moby is an open-source project created by Docker for software containerization | 2026-02-06T00:52:59.619100Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-ps82605 | Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a ... | 2026-02-06T01:09:01.544353Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-xr99875 | Security fixes for GHSA-389x-839f-4rhx, GHSA-3p8m-j85q-pgmj, GHSA-5jpm-x58v-624v, GHSA-84h7-rjj3-6jx4, GHSA-fghv-69vj-qj49, GHSA-jq43-27x9-3v86, GHSA-qqpg-mvqg-649v applied in versions: 0.1.109-r0, 0.1.113-r1 | 2026-02-03T16:02:30.597873Z | 2026-02-03T11:13:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2025-116 | 2025-11-05T18:09:13.000Z | 2025-11-05T18:09:13.000Z | |
| drupal-contrib-2025-115 | 2025-11-05T18:08:01.000Z | 2025-11-05T18:08:01.000Z | |
| drupal-contrib-2025-114 | 2025-10-29T16:44:39.000Z | 2025-10-29T20:15:52.000Z | |
| drupal-contrib-2025-113 | 2025-10-22T16:35:12.000Z | 2025-10-22T16:35:12.000Z | |
| drupal-contrib-2025-112 | 2025-10-22T16:34:46.000Z | 2025-10-22T16:34:46.000Z | |
| drupal-contrib-2025-111 | 2025-09-24T17:28:05.000Z | 2025-09-24T17:28:05.000Z | |
| drupal-contrib-2025-110 | 2025-09-24T17:27:41.000Z | 2025-09-24T17:27:41.000Z | |
| drupal-contrib-2025-109 | 2025-09-24T17:27:33.000Z | 2025-09-24T17:27:33.000Z | |
| drupal-contrib-2025-108 | 2025-09-24T17:27:20.000Z | 2025-09-24T17:27:20.000Z | |
| drupal-contrib-2025-107 | 2025-09-24T17:18:08.000Z | 2025-09-24T17:18:08.000Z | |
| drupal-contrib-2025-106 | 2025-09-24T17:16:20.000Z | 2025-09-24T17:16:20.000Z | |
| drupal-contrib-2025-101 | 2025-08-27T17:19:59.000Z | 2025-09-03T18:55:46.000Z | |
| drupal-contrib-2025-097 | 2025-08-13T17:33:34.000Z | 2025-09-03T18:53:10.000Z | |
| drupal-contrib-2025-105 | 2025-09-03T16:15:48.000Z | 2025-09-03T16:15:48.000Z | |
| drupal-contrib-2025-100 | 2025-08-27T17:19:45.000Z | 2025-08-27T17:23:11.000Z | |
| drupal-contrib-2025-104 | 2025-08-27T17:20:41.000Z | 2025-08-27T17:20:41.000Z | |
| drupal-contrib-2025-103 | 2025-08-27T17:20:16.000Z | 2025-08-27T17:20:16.000Z | |
| drupal-contrib-2025-102 | 2025-08-27T17:20:11.000Z | 2025-08-27T17:20:11.000Z | |
| drupal-contrib-2025-099 | 2025-08-27T17:19:24.000Z | 2025-08-27T17:19:24.000Z | |
| drupal-contrib-2025-098 | 2025-08-27T17:19:14.000Z | 2025-08-27T17:19:14.000Z | |
| drupal-contrib-2025-096 | 2025-08-13T17:33:24.000Z | 2025-08-13T20:10:05.000Z | |
| drupal-contrib-2025-095 | 2025-08-06T16:50:43.000Z | 2025-08-06T16:50:43.000Z | |
| drupal-contrib-2025-094 | 2025-07-30T16:31:23.000Z | 2025-07-30T16:31:23.000Z | |
| drupal-contrib-2025-093 | 2025-07-30T16:30:44.000Z | 2025-07-30T16:30:44.000Z | |
| drupal-contrib-2025-092 | 2025-07-23T17:10:19.000Z | 2025-07-23T17:10:19.000Z | |
| drupal-contrib-2025-091 | 2025-07-16T16:46:49.000Z | 2025-07-17T14:42:36.000Z | |
| drupal-contrib-2025-090 | 2025-07-16T16:46:26.000Z | 2025-07-16T16:46:26.000Z | |
| drupal-contrib-2025-089 | 2025-07-16T16:46:08.000Z | 2025-07-16T16:46:08.000Z | |
| drupal-contrib-2025-087 | 2025-07-09T16:37:27.000Z | 2025-07-09T16:37:27.000Z | |
| drupal-contrib-2025-086 | 2025-07-02T17:37:13.000Z | 2025-07-02T17:37:13.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-10856 | Rockwell Automation FactoryTalk Linx权限提升漏洞 | 2025-10-17 | 2026-02-12 |
| cnvd-2026-10682 | Microsoft Windows SMB Server拒绝服务漏洞 | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10681 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10681) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10680 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10680) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10679 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10679) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10678 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10678) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10677 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10677) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-06390 | 北京星网锐捷网络技术有限公司RG-EST350 V2存在命令执行漏洞 | 2025-12-30 | 2026-02-12 |
| cnvd-2026-10676 | Microsoft Windows File Explorer欺骗漏洞(CNVD-2026-10676) | 2025-10-17 | 2026-02-11 |
| cnvd-2026-10675 | Microsoft Windows File Explorer信息泄露漏洞(CNVD-2026-10675) | 2026-01-19 | 2026-02-11 |
| cnvd-2026-10674 | Microsoft Windows File Explorer信息泄露漏洞(CNVD-2026-10674) | 2026-01-19 | 2026-02-11 |
| cnvd-2026-10673 | Microsoft Windows File Explorer信息泄露漏洞(CNVD-2026-10673) | 2026-01-19 | 2026-02-11 |
| cnvd-2026-10672 | Microsoft Windows File Explorer信息泄露漏洞 | 2026-01-19 | 2026-02-11 |
| cnvd-2026-10671 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-10671) | 2025-07-30 | 2026-02-11 |
| cnvd-2026-10670 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-10670) | 2026-01-26 | 2026-02-11 |
| cnvd-2026-10669 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-10669) | 2026-01-26 | 2026-02-11 |
| cnvd-2026-10668 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-10668) | 2026-01-26 | 2026-02-11 |
| cnvd-2026-10667 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-10667) | 2026-01-29 | 2026-02-11 |
| cnvd-2026-10666 | MedDream PACS Premium任意文件读取漏洞 | 2026-01-30 | 2026-02-11 |
| cnvd-2026-10665 | MedDream PACS Premium跨站脚本漏洞 | 2026-01-30 | 2026-02-11 |
| cnvd-2026-10898 | Adobe Creative Cloud Desktop Application拒绝服务漏洞(CNVD-2026-10898) | 2025-12-15 | 2026-02-10 |
| cnvd-2026-10855 | Rockwell Automation CompactLogix 5370拒绝服务漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10854 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10854) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10852 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10852) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10851 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10851) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10850 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10850) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10849 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10849) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10848 | Rockwell Automation ArmorStart LT拒绝服务漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10846 | Rockwell Automation FactoryTalk View Machine Edition路径遍历漏洞 | 2025-10-17 | 2026-02-10 |
| cnvd-2026-10664 | IBM Aspera Console日志信息泄露漏洞 | 2026-01-30 | 2026-02-10 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0200 | Vulnérabilité dans Centreon open tickets | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0199 | Multiples vulnérabilités dans les produits VMware | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0198 | Multiples vulnérabilités dans Google Chrome | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0197 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-23T00:00:00.000000 | 2026-02-23T00:00:00.000000 |
| certfr-2026-avi-0187 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-19T00:00:00.000000 | 2026-02-23T00:00:00.000000 |
| certfr-2026-avi-0196 | Multiples vulnérabilités dans les produits IBM | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0195 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0194 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0193 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0192 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0191 | Vulnérabilité dans Traefik | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0190 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0189 | Vulnérabilité dans F5 BIG-IP | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0188 | Multiples vulnérabilités dans les produits Splunk | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0186 | Multiples vulnérabilités dans Google Chrome | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0185 | Vulnérabilité dans Microsoft Windows | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0184 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0183 | Vulnérabilité dans HPE Aruba Networking ClearPass Policy Manager | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0182 | Multiples vulnérabilités dans Atlassian Confluence | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0181 | Vulnérabilité dans Apache Tomcat | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0180 | Vulnérabilité dans NetApp StorageGRID | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0178 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0177 | Multiples vulnérabilités dans Moodle | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0176 | Vulnérabilité dans Mattermost Server | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0175 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0174 | Multiples vulnérabilités dans LibreNMS | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2024-avi-0858 | Multiples vulnérabilités dans Mitel Micollab | 2024-10-10T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| certfr-2026-avi-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| certfr-2026-avi-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-ale-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| certfr-2023-ale-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| certfr-2023-ale-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| certfr-2023-ale-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2022-ale-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| certfr-2023-ale-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| certfr-2023-ale-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-ale-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-010 | Multiples vulnérabilités dans GLPI | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-009 | [MaJ] Vulnérabilité dans Zimbra Collaboration | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-008 | [MaJ] Multiples vulnérabilités dans Microsoft Exchange | 2022-09-30T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-007 | Multiples vulnérabilités dans Microsoft Windows | 2022-09-16T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-012 | [MàJ] Vulnérabilité dans FortiOS SSL-VPN | 2022-12-13T00:00:00.000000 | 2022-12-20T00:00:00.000000 |
| certfr-2022-ale-011 | Vulnérabilité dans les produits Fortinet | 2022-10-14T00:00:00.000000 | 2022-10-14T00:00:00.000000 |
| certfr-2022-ale-006 | [MàJ] Vulnérabilité dans Atlassian Confluence | 2022-06-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-ale-002 | Vulnérabilité dans VMware Spring Cloud Gateway | 2022-03-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-ale-005 | [MàJ] Vulnérabilité dans Microsoft Windows | 2022-05-31T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| certfr-2022-ale-004 | Vulnérabilité dans F5 BIG-IP | 2022-05-11T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| certfr-2022-ale-003 | [MàJ] Vulnérabilité dans l'implémentation du protocole RPC par Microsoft | 2022-04-13T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2022-ale-001 | [MaJ] Vulnérabilité dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-022 | [MaJ] Vulnérabilité dans Apache Log4j | 2021-12-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2025-0025 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in … |
misp |
misp |
2025-11-26T16:27:00.000Z | 2025-12-02T08:50:18.897756Z |
| GCVE-1-2025-0024 |
9.4 (4.0)
|
cross-site scripting (XSS) vulnerability in the MISP s… |
misp |
misp |
2025-11-26T16:14:00.000Z | 2025-12-02T08:50:01.482327Z |
| GCVE-1-2025-0023 |
9.4 (4.0)
|
XSS in MISP server comparison tool |
misp |
misp |
2025-11-26T16:10:00.000Z | 2025-12-02T08:49:24.626168Z |
| GCVE-1-2025-0022 |
9.4 (4.0)
|
Clarified setting's impact on download_attachments_on_load |
misp |
misp |
2025-11-26T16:04:00.000Z | 2025-12-02T08:49:04.510294Z |
| GCVE-1-2025-0021 |
9.4 (4.0)
|
XSS in MISP ReST client in HTML view |
misp |
misp |
2025-11-26T15:55:00.000Z | 2025-12-02T08:48:41.869838Z |
| GCVE-1-2025-0020 |
9.4 (4.0)
|
cross-site scripting (XSS) in Galaxy element JSON view |
misp |
misp |
2025-11-26T15:49:00.000Z | 2025-12-02T08:47:41.151429Z |
| GCVE-1-2025-0019 |
4 (4.0)
|
Path traversal vulnerability in EventReport for site-admin |
misp |
misp |
2025-11-26T14:47:00.000Z | 2025-11-28T07:27:42.721350Z |
| GCVE-1-2025-0017 |
9.4 (4.0)
|
Privilege escalation in Cerebrate allows an authentica… |
cerebrate |
cerebrate |
2025-11-12T08:15:00.000Z | 2025-11-28T07:22:08.205835Z |
| GCVE-1-2025-0029 |
6.3 (4.0)
|
Reflected cross-site scripting (XSS) vulnerabilities i… |
misp |
misp |
2025-11-27T12:41:00.000Z | 2025-11-27T12:48:51.085860Z |
| GCVE-1-2025-0018 |
9.4 (4.0)
|
HTML injection issue was identified in Lookyloo’s web … |
lookyloo |
lookyloo |
2025-11-18T15:33:00.000Z | 2025-11-18T20:39:45.579295Z |
| GCVE-1-2025-0016 |
6 (4.0)
|
Local file inclusion in [ImportFromUrl() URL hand… |
misp |
misp |
2025-11-04T09:20:00.000Z | 2025-11-04T09:56:38.383646Z |