Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-28426 |
8.7 (3.1)
|
Statamic vulnerable to privilege escalation via stored… |
statamic |
cms |
2026-02-27T22:23:42.660Z | 2026-02-27T22:23:42.660Z |
| CVE-2026-28425 |
8 (3.1)
|
Statamic vulnerable to remote code execution via Antle… |
statamic |
cms |
2026-02-27T22:20:39.735Z | 2026-02-27T22:20:39.735Z |
| CVE-2026-2647 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-27T22:19:25.559Z | |
| CVE-2026-27759 |
5.3 (4.0)
|
Featured Image from Content < 1.7 Authenticated SSRF v… |
Dhrumil Kumbhani |
Featured Image from Content |
2026-02-27T22:17:11.669Z | 2026-02-27T22:17:11.669Z |
| CVE-2026-28424 |
6.5 (3.1)
|
Statamic's missing authorization allows access to emai… |
statamic |
cms |
2026-02-27T22:14:01.779Z | 2026-02-27T22:14:01.779Z |
| CVE-2026-28517 |
9.3 (4.0)
|
openDCIM <= 23.04 OS Command Injection via dot Configu… |
openDCIM |
openDCIM |
2026-02-27T22:12:08.889Z | 2026-02-27T22:12:08.889Z |
| CVE-2026-28423 |
6.8 (3.1)
|
Statamic Vulnerable to Server-Side Request Forgery via Glide |
statamic |
cms |
2026-02-27T22:11:55.802Z | 2026-02-27T22:11:55.802Z |
| CVE-2026-28516 |
9.3 (4.0)
|
openDCIM <= 23.04 SQL Injection in Config::UpdateParameter |
openDCIM |
openDCIM |
2026-02-27T22:11:52.246Z | 2026-02-27T22:11:52.246Z |
| CVE-2026-28515 |
9.3 (4.0)
|
openDCIM <= 23.04 Missing Authorization in install.php |
openDCIM |
openDCIM |
2026-02-27T22:11:37.303Z | 2026-02-27T22:11:37.303Z |
| CVE-2026-28411 |
9.8 (3.1)
|
WeGIA Vulnerable to Authentication Bypass via `extract… |
LabRedesCefetRJ |
WeGIA |
2026-02-27T21:52:05.032Z | 2026-02-27T21:52:05.032Z |
| CVE-2026-28409 |
10 (3.1)
|
WeGIA Vulnerable to Remote Code Execution (RCE) via OS… |
LabRedesCefetRJ |
WeGIA |
2026-02-27T21:50:21.849Z | 2026-02-27T21:50:21.849Z |
| CVE-2026-28408 |
9.8 (3.1)
|
WeGIA lacks authentication verification in adicionar_t… |
LabRedesCefetRJ |
WeGIA |
2026-02-27T21:49:14.747Z | 2026-02-27T21:49:14.747Z |
| CVE-2026-28416 |
8.2 (3.1)
|
Gradio has SSRF via Malicious `proxy_url` Injection in… |
gradio-app |
gradio |
2026-02-27T21:47:04.975Z | 2026-02-27T21:47:04.975Z |
| CVE-2025-15579 |
9.5 (4.0)
|
An Insecure Deserialization vulnerability has been dis… |
OpenText™ |
Directory Services |
2026-02-18T14:57:04.010Z | 2026-02-27T21:46:44.623Z |
| CVE-2026-28415 |
4.3 (3.1)
|
Gradio has Open Redirect in OAuth Flow |
gradio-app |
gradio |
2026-02-27T21:44:51.956Z | 2026-02-27T21:44:51.956Z |
| CVE-2026-28414 |
7.5 (3.1)
|
Gradio has Absolute Path Traversal on Windows with Pyt… |
gradio-app |
gradio |
2026-02-27T21:43:28.453Z | 2026-02-27T21:43:28.453Z |
| CVE-2026-27167 |
0 (3.1)
|
Gradio: Mocked OAuth Login Exposes Server Credentials … |
gradio-app |
gradio |
2026-02-27T21:40:57.917Z | 2026-02-27T21:40:57.917Z |
| CVE-2026-27939 |
8.8 (3.1)
|
Statamic allows Authenticated Control Panel users to e… |
statamic |
cms |
2026-02-27T21:34:39.107Z | 2026-02-27T21:34:39.107Z |
| CVE-2026-28407 |
6.9 (4.0)
|
malcontent's nested archive extraction failure can dro… |
chainguard-dev |
malcontent |
2026-02-27T21:28:06.258Z | 2026-02-27T21:28:06.258Z |
| CVE-2020-37167 |
8.6 (4.0)
8.4 (3.1)
|
ClamAV ClamBC < 0.103.0-rc - 'ClamBC' Executable Regul… |
ClamAV |
ClamBC |
2026-02-12T22:48:50.169Z | 2026-02-27T21:23:18.537Z |
| CVE-2026-28406 |
8.2 (3.1)
|
kaniko has tar archive path traversal in build context… |
chainguard-forks |
kaniko |
2026-02-27T21:20:52.764Z | 2026-02-27T21:20:52.764Z |
| CVE-2026-28402 |
7.1 (3.1)
|
nimiq/core-rs-albatross's nimiq-blockchain missing pro… |
nimiq |
core-rs-albatross |
2026-02-27T21:08:53.573Z | 2026-02-27T21:08:53.573Z |
| CVE-2024-3727 |
8.3 (3.1)
|
Containers/image: digest type does not guarantee valid type |
|
|
2024-05-09T14:57:21.327Z | 2026-02-27T21:07:30.936Z |
| CVE-2026-28400 |
7.6 (3.1)
|
Docker Model Runner Unauthenticated Runtime Flag Injec… |
docker |
model-runner |
2026-02-27T21:06:12.418Z | 2026-02-27T21:06:12.418Z |
| CVE-2026-28355 |
1.3 (4.0)
|
"PWA" Canarytoken Vulnerable to Stored Self Cross-Site… |
thinkst |
canarytokens |
2026-02-27T21:04:13.445Z | 2026-02-27T21:04:13.445Z |
| CVE-2026-28352 |
6.5 (3.1)
|
Indico missing access check in event series management API |
indico |
indico |
2026-02-27T21:01:45.740Z | 2026-02-27T21:01:45.740Z |
| CVE-2026-28351 |
6.9 (4.0)
|
Manipulated RunLengthDecode streams can exhaust RAM |
py-pdf |
pypdf |
2026-02-27T20:59:16.839Z | 2026-02-27T20:59:16.839Z |
| CVE-2026-27593 |
9.3 (3.1)
|
Statamic is vulnerable to account takeover via passwor… |
statamic |
cms |
2026-02-24T21:38:17.354Z | 2026-02-27T20:56:07.561Z |
| CVE-2026-2634 |
9.8 (3.1)
|
Spoofed web content presented under trusted domains us… |
Mozilla |
Firefox for iOS |
2026-02-24T13:33:24.725Z | 2026-02-27T20:55:35.483Z |
| CVE-2026-27572 |
6.9 (4.0)
|
Wasmtime can panic when adding excessive fields to a `… |
bytecodealliance |
wasmtime |
2026-02-24T21:31:50.186Z | 2026-02-27T20:55:29.879Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-0752 |
8 (3.1)
|
Improper Neutralization of Input During Web Page Gener… |
GitLab |
GitLab |
2026-02-25T20:05:19.818Z | 2026-02-26T14:44:05.136Z |
| CVE-2025-14511 |
7.5 (3.1)
|
Improper Validation of Specified Quantity in Input in GitLab |
GitLab |
GitLab |
2026-02-25T20:05:24.799Z | 2026-02-26T15:57:25.416Z |
| CVE-2026-3221 |
4.9 (3.1)
|
Sensitive user account information is not encryp… |
Devolutions |
Server |
2026-02-25T18:29:11.939Z | 2026-02-26T16:03:04.217Z |
| CVE-2026-25476 |
7.5 (3.1)
|
OpenEMR has Session Timeout Bypass via skip_timeout_reset |
openemr |
openemr |
2026-02-25T18:28:29.881Z | 2026-02-26T16:04:10.627Z |
| CVE-2026-2532 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
lintsinghua DeepAudit IP Address embedding_config.py s… |
lintsinghua |
DeepAudit |
2026-02-16T03:02:09.038Z | 2026-02-23T10:04:56.694Z |
| CVE-2026-1979 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
mruby JMPNOT-to-JMPIF Optimization vm.c mrb_vm_exec us… |
n/a |
mruby |
2026-02-06T04:32:09.200Z | 2026-02-23T09:21:06.088Z |
| CVE-2026-25729 |
2.1 (4.0)
|
DeepAudit Affected by User Enumeration via Broken Acce… |
lintsinghua |
DeepAudit |
2026-02-06T20:30:17.112Z | 2026-02-06T20:50:17.216Z |
| CVE-2026-25804 |
8 (4.0)
|
Antrea has invalid enforcement order for network polic… |
antrea-io |
antrea |
2026-02-06T22:58:35.041Z | 2026-02-09T15:25:44.301Z |
| CVE-2025-15564 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
Mapnik value.cpp operator divide by zero |
n/a |
Mapnik |
2026-02-07T21:32:07.437Z | 2026-02-23T09:21:21.123Z |
| CVE-2025-66630 |
9.2 (4.0)
|
Fiber insecurely fallsback in utils.UUIDv4() / utils.U… |
gofiber |
fiber |
2026-02-09T18:04:47.713Z | 2026-02-10T16:02:43.238Z |
| CVE-2026-25598 |
6.3 (4.0)
|
Bypassing Logging of Outbound Connections Using sendto… |
step-security |
harden-runner |
2026-02-09T18:58:57.074Z | 2026-02-10T16:00:59.966Z |
| CVE-2026-25761 |
8.8 (3.1)
|
Command injection via crafted filenames in Super-linte… |
super-linter |
super-linter |
2026-02-09T20:27:01.887Z | 2026-02-10T15:59:33.745Z |
| CVE-2026-25878 |
6.9 (4.0)
|
FroshAdminer Adminer UI is accessible without admin session |
FriendsOfShopware |
FroshPlatformAdminer |
2026-02-09T20:53:23.818Z | 2026-02-10T15:58:56.777Z |
| CVE-2026-25808 |
7.5 (3.1)
|
Hollo DMs get leaked and can be seen on Webfinger Browser |
fedify-dev |
hollo |
2026-02-09T21:50:10.579Z | 2026-02-10T21:23:34.888Z |
| CVE-2026-25918 |
5.9 (4.0)
|
unity-cli Exposes Plaintext Credentials in Debug Logs … |
RageAgainstThePixel |
unity-cli |
2026-02-09T21:29:55.970Z | 2026-02-10T15:57:40.799Z |
| CVE-2026-25925 |
7.8 (3.1)
|
PowerDocu Affected by Remote Code Execution via Insecu… |
modery |
PowerDocu |
2026-02-09T21:59:08.335Z | 2026-02-11T21:22:45.286Z |
| CVE-2025-11142 |
7.1 (3.1)
|
The VAPIX API mediaclip.cgi that did not have a s… |
Axis Communications AB |
AXIS OS |
2026-02-10T05:32:19.555Z | 2026-02-26T15:04:12.975Z |
| CVE-2026-26338 |
6.9 (4.0)
6.5 (3.1)
|
Hyland Alfresco Transformation Service SSRF |
Hyland |
Alfresco Transformation Service (Enterprise) |
2026-02-19T17:03:23.521Z | 2026-02-20T19:11:04.416Z |
| CVE-2026-26339 |
9.3 (4.0)
9.8 (3.1)
|
Hyland Alfresco Transformation Service Argument Inject… |
Hyland |
Alfresco Transformation Service (Enterprise) |
2026-02-19T17:04:46.617Z | 2026-02-20T20:31:03.964Z |
| CVE-2025-13671 |
5.9 (4.0)
|
Cross Site request forgery vulnerability discovered in… |
OpenText™ |
Web Site Management Server |
2026-02-19T22:36:49.083Z | 2026-02-24T14:39:58.281Z |
| CVE-2025-13672 |
7 (4.0)
|
Reflected Cross-Site Scripting discovered in OpenText … |
OpenText™ |
Web Site Management Server |
2026-02-19T22:36:33.467Z | 2026-02-24T14:42:46.727Z |
| CVE-2025-8054 |
7.1 (4.0)
|
Path Traversal vulnerability have been discovered in O… |
OpenText™ |
XM Fax |
2026-02-19T22:21:22.483Z | 2026-02-23T18:14:02.775Z |
| CVE-2025-8055 |
5.3 (4.0)
|
SSRF vulnerability have been discovered in OpenText™ XM Fax |
OpenText™ |
XM Fax |
2026-02-19T22:21:06.831Z | 2026-02-23T18:12:27.145Z |
| CVE-2025-9208 |
7.5 (4.0)
|
Stored-XSS vulnerability discovered in OpenText WSM Ma… |
OpenText™ |
Web Site Management Server |
2026-02-19T22:37:19.208Z | 2026-02-24T14:34:34.043Z |
| CVE-2026-1292 |
6.5 (3.1)
|
Tanium addressed an insertion of sensitive information… |
Tanium |
Trends |
2026-02-19T23:10:23.372Z | 2026-02-19T23:10:23.372Z |
| CVE-2026-2350 |
6.5 (3.1)
|
Tanium addressed an insertion of sensitive information… |
Tanium |
Interact |
2026-02-19T23:10:33.951Z | 2026-02-19T23:14:23.480Z |
| CVE-2026-2647 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-27T22:19:25.559Z | |
| CVE-2026-28517 |
9.3 (4.0)
|
openDCIM <= 23.04 OS Command Injection via dot Configu… |
openDCIM |
openDCIM |
2026-02-27T22:12:08.889Z | 2026-02-27T22:12:08.889Z |
| CVE-2026-28516 |
9.3 (4.0)
|
openDCIM <= 23.04 SQL Injection in Config::UpdateParameter |
openDCIM |
openDCIM |
2026-02-27T22:11:52.246Z | 2026-02-27T22:11:52.246Z |
| CVE-2026-28515 |
9.3 (4.0)
|
openDCIM <= 23.04 Missing Authorization in install.php |
openDCIM |
openDCIM |
2026-02-27T22:11:37.303Z | 2026-02-27T22:11:37.303Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-0752 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.2 before 18.7.5, 18.8… | 2026-02-25T21:16:36.330 | 2026-02-28T00:44:58.627 |
| fkie_cve-2025-14511 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 12.2 before 18.7.5, 18.8… | 2026-02-25T21:16:30.453 | 2026-02-28T00:44:30.647 |
| fkie_cve-2026-3221 | Sensitive user account information is not encrypted in the database in Devolutions Server 2025.3.1… | 2026-02-25T19:43:26.530 | 2026-02-28T00:43:23.320 |
| fkie_cve-2026-25476 | OpenEMR is a free and open source electronic health records and medical practice management applica… | 2026-02-25T19:43:22.157 | 2026-02-28T00:42:46.193 |
| fkie_cve-2026-2532 | A vulnerability was detected in lintsinghua DeepAudit up to 3.0.3. This issue affects some unknown … | 2026-02-16T04:15:52.093 | 2026-02-28T00:38:08.223 |
| fkie_cve-2026-1979 | A flaw has been found in mruby up to 3.4.0. This affects the function mrb_vm_exec of the file src/v… | 2026-02-06T05:16:12.667 | 2026-02-28T00:33:39.090 |
| fkie_cve-2026-25729 | DeepAudit is a multi-agent system for code vulnerability discovery. In 3.0.4 and earlier, there is … | 2026-02-06T21:16:19.313 | 2026-02-28T00:31:36.967 |
| fkie_cve-2026-25804 | Antrea is a Kubernetes networking solution intended to be Kubernetes native. Prior to versions 2.3.… | 2026-02-06T23:15:55.123 | 2026-02-28T00:30:06.540 |
| fkie_cve-2025-15564 | A vulnerability has been found in Mapnik up to 4.2.0. This vulnerability affects the function mapni… | 2026-02-07T22:16:01.127 | 2026-02-28T00:27:08.120 |
| fkie_cve-2025-66630 | Fiber is an Express inspired web framework written in Go. Before 2.52.11, on Go versions prior to 1… | 2026-02-09T18:16:04.680 | 2026-02-28T00:26:20.080 |
| fkie_cve-2026-25598 | Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. Prior to… | 2026-02-09T20:15:58.653 | 2026-02-28T00:23:47.940 |
| fkie_cve-2026-25761 | Super-linter is a combination of multiple linters to run as a GitHub Action or standalone. From 6.0… | 2026-02-09T21:15:49.323 | 2026-02-28T00:21:30.757 |
| fkie_cve-2026-25878 | FroshAdminer is the Adminer plugin for Shopware Platform. Prior to 2.2.1, the Adminer route (/admin… | 2026-02-09T21:15:50.380 | 2026-02-28T00:18:44.953 |
| fkie_cve-2026-25808 | Hollo is a federated single-user microblogging software designed to be federated through ActivityPu… | 2026-02-09T22:16:02.440 | 2026-02-28T00:17:33.850 |
| fkie_cve-2026-25918 | unity-cli is a command line utility for the Unity Game Engine. Prior to 1.8.2 , the sign-package co… | 2026-02-09T22:16:04.177 | 2026-02-28T00:16:27.647 |
| fkie_cve-2026-25925 | PowerDocu contains a Windows GUI executable to perform technical documentations. Prior to 2.4.0, Po… | 2026-02-09T22:16:04.607 | 2026-02-28T00:13:57.360 |
| fkie_cve-2025-11142 | The VAPIX API mediaclip.cgi that did not have a sufficient input validation allowing for a possible… | 2026-02-10T06:15:52.430 | 2026-02-28T00:09:21.760 |
| fkie_cve-2026-26338 | Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve server-side requ… | 2026-02-19T18:24:59.930 | 2026-02-28T00:02:51.347 |
| fkie_cve-2026-26339 | Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve remote code exec… | 2026-02-19T18:25:00.133 | 2026-02-28T00:00:16.837 |
| fkie_cve-2025-13671 | Cross-Site Request Forgery (CSRF) vulnerability in OpenText™ Web Site Management Server allows Cros… | 2026-02-19T23:16:14.853 | 2026-02-27T23:56:23.997 |
| fkie_cve-2025-13672 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-19T23:16:15.090 | 2026-02-27T23:55:48.210 |
| fkie_cve-2025-8054 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Ope… | 2026-02-19T23:16:15.290 | 2026-02-27T23:54:16.233 |
| fkie_cve-2025-8055 | Server-Side Request Forgery (SSRF) vulnerability in OpenText™ XM Fax allows Server Side Request For… | 2026-02-19T23:16:15.483 | 2026-02-27T23:53:31.540 |
| fkie_cve-2025-9208 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-19T23:16:15.663 | 2026-02-27T23:49:59.073 |
| fkie_cve-2026-1292 | Tanium addressed an insertion of sensitive information into log file vulnerability in Trends. | 2026-02-20T00:16:14.520 | 2026-02-27T23:48:33.440 |
| fkie_cve-2026-2350 | Tanium addressed an insertion of sensitive information into log file vulnerability in Interact and TDS. | 2026-02-20T00:16:17.780 | 2026-02-27T23:48:19.057 |
| fkie_cve-2026-2647 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-27T23:16:06.543 | 2026-02-27T23:16:06.543 |
| fkie_cve-2026-28517 | openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in … | 2026-02-27T23:16:06.357 | 2026-02-27T23:16:06.357 |
| fkie_cve-2026-28516 | openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::… | 2026-02-27T23:16:06.180 | 2026-02-27T23:16:06.180 |
| fkie_cve-2026-28515 | openDCIM version 23.04, through commit 4467e9c4, contains a missing authorization vulnerability in … | 2026-02-27T23:16:05.960 | 2026-02-27T23:16:05.960 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-7jp5-298q-jg98 |
7.3 (3.1)
|
Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure | 2026-02-25T22:40:15Z | 2026-02-27T21:52:14Z |
| ghsa-2p9h-rqjw-gm92 |
5.4 (3.1)
8.5 (4.0)
|
n8n Vulnerable to Stored XSS via Various Nodes | 2026-02-25T22:28:57Z | 2026-02-27T21:52:06Z |
| ghsa-vpcf-gvg4-6qwr |
9.9 (3.1)
9.4 (4.0)
|
n8n: Expression Sandbox Escape Leads to RCE | 2026-02-25T22:05:09Z | 2026-02-27T21:51:58Z |
| ghsa-3ccg-x393-96v8 |
9.1 (3.1)
|
Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change | 2026-02-25T22:02:37Z | 2026-02-27T21:51:50Z |
| ghsa-x2mw-7j39-93xq |
8.5 (3.1)
9.0 (4.0)
|
n8n has Arbitrary Command Execution via File Write and Git Operations | 2026-02-25T21:54:19Z | 2026-02-27T21:51:38Z |
| ghsa-wxx7-mcgf-j869 |
9.9 (3.1)
9.4 (4.0)
|
n8n has Potential Remote Code Execution via Merge Node | 2026-02-25T21:23:30Z | 2026-02-27T21:51:29Z |
| ghsa-jjpj-p2wh-qf23 |
9.4 (4.0)
|
n8n has a Sandbox Escape in its JavaScript Task Runner | 2026-02-25T21:23:15Z | 2026-02-27T21:51:21Z |
| ghsa-mmgg-m5j7-f83h |
9.9 (3.1)
7.1 (4.0)
|
n8n has Arbitrary File Read via Python Code Node Sandbox Escape | 2026-02-25T21:22:39Z | 2026-02-27T21:51:13Z |
| ghsa-75g8-rv7v-32f7 |
9.0 (3.1)
9.5 (4.0)
|
n8n has Unauthenticated Expression Evaluation via Form Node | 2026-02-25T21:21:36Z | 2026-02-27T21:51:05Z |
| ghsa-4qgr-4h56-8895 |
6.1 (3.1)
|
Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module | 2026-02-25T22:01:25Z | 2026-02-27T21:50:55Z |
| ghsa-fq4f-4738-rqxm |
6.1 (3.1)
|
Rucio WebUI has a Stored Cross-site Scripting (XSS) Vulnerability in its Custom RSE Attribute | 2026-02-25T19:37:27Z | 2026-02-27T21:50:31Z |
| ghsa-8wpv-6x3f-3rm5 |
6.1 (3.1)
|
Rucio WebUI has a Stored Cross-site Scripting (XSS) vulnerability its Identity Name | 2026-02-25T19:29:37Z | 2026-02-27T21:50:24Z |
| ghsa-h9fp-p2p9-873q |
6.1 (3.1)
|
Rucio WebUI has Stored Cross-site Scripting (XSS) in RSE Metadata | 2026-02-25T19:29:22Z | 2026-02-27T21:50:14Z |
| ghsa-rwj9-7j48-9f7q |
7.3 (3.1)
|
Rucio WebUI Vulnerable to Stored Cross-site Scripting (XSS) through Custom Rule Function | 2026-02-25T18:58:20Z | 2026-02-27T21:50:07Z |
| ghsa-38wq-6q2w-hcf9 |
5.3 (3.1)
|
Rucio WebUI has Username Enumeration via Login Error Message | 2026-02-25T18:53:42Z | 2026-02-27T21:49:59Z |
| ghsa-h79m-5jjm-jm4q |
8.1 (3.1)
|
Rucio WebUI has a Reflected Cross-site Scripting Vulnerability | 2026-02-25T18:53:29Z | 2026-02-27T21:49:51Z |
| ghsa-gp2f-7wcm-5fhx |
7.0 (4.0)
|
Craft CMS has Cloud Metadata SSRF Protection Bypass via DNS Rebinding | 2026-02-23T22:16:01Z | 2026-02-27T21:49:23Z |
| ghsa-9fj4-3849-rv9g |
0.0 (3.1)
|
OpenKruise PodProbeMarker is Vulnerable to SSRF via Unrestricted Host Field | 2026-02-25T18:30:40Z | 2026-02-27T21:48:39Z |
| ghsa-5c9c-6x87-f9vm |
7.5 (3.1)
|
zstd vulnerable to buffer overrun | 2023-03-31T21:30:37Z | 2026-02-27T21:48:26Z |
| ghsa-2phg-qgmm-r638 |
7.7 (4.0)
|
Sliver has Potential Zip Bomb Denial of Service in GzipEncoder | 2026-02-25T17:36:44Z | 2026-02-27T21:46:08Z |
| ghsa-49gm-hh7w-wfvf |
9.9 (3.1)
|
OliveTin: OS Command Injection via `password` argument type and webhook JSON extraction bypasses sh… | 2026-02-25T16:18:22Z | 2026-02-27T21:45:19Z |
| ghsa-8vrh-3pm2-v4v6 |
6.5 (3.1)
7.1 (4.0)
|
FileBrowser Quantum: Password Protection Not Enforced on Shared File Links | 2026-02-25T16:00:49Z | 2026-02-27T21:42:54Z |
| ghsa-w6x6-9fp7-fqm4 |
7.1 (4.0)
|
New API has an SQL LIKE Wildcard Injection DoS via Token Search | 2026-02-23T21:56:47Z | 2026-02-27T21:42:31Z |
| ghsa-gx3x-vq4p-mhhv |
5.9 (3.1)
|
cert-manager-controller DoS via Specially Crafted DNS Response | 2026-02-02T22:11:06Z | 2026-02-27T21:41:50Z |
| ghsa-299v-8pq9-5gjq |
7.6 (3.1)
|
New API has Potential XSS in its MarkdownRenderer component | 2026-02-23T22:10:25Z | 2026-02-27T21:41:05Z |
| ghsa-9h8m-3fm2-qjrq |
7.0 (3.1)
|
OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking | 2026-02-02T20:07:46Z | 2026-02-27T21:39:46Z |
| ghsa-9442-gm4v-r222 |
7.5 (3.1)
8.7 (4.0)
|
Undertow's url-encoded request path information can be broken on ajp-listener | 2024-06-20T15:31:19Z | 2026-02-27T21:38:27Z |
| ghsa-c32p-wcqj-j677 |
7.1 (4.0)
|
CometBFT has inconsistencies between how commit signatures are verified and how block time is derived | 2026-01-23T16:56:23Z | 2026-02-27T21:37:55Z |
| ghsa-fcv2-xgw5-pqxf |
5.8 (3.1)
|
sigstore legacy TUF client allows for arbitrary file writes with target cache path traversal | 2026-01-22T20:28:56Z | 2026-02-27T21:37:24Z |
| ghsa-82g8-464f-2mv7 |
5.1 (4.0)
|
OpenClaw: Skill env override host env injection via applySkillConfigEnvOverrides (defense-in-depth) | 2026-02-27T21:36:17Z | 2026-02-27T21:36:17Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-111 |
9.1 (3.1)
|
A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langcha… | langchain | 2024-10-29T13:15:00Z | 2025-05-02T18:39:47.588215Z |
| pysec-2024-245 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated user… | apache-airflow | 2024-02-29T11:15:08+00:00 | 2025-05-01T21:22:38.598048+00:00 |
| pysec-2025-35 |
7.5 (3.1)
|
Weblate is a web based localization tool. Prior to version 5.11, when creating a new comp… | weblate | 2025-04-15T21:16:04+00:00 | 2025-04-30T17:22:51.467257+00:00 |
| pysec-2025-34 |
|
The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_… | picklescan | 2025-04-24T01:15:49+00:00 | 2025-04-24T03:08:15.436691+00:00 |
| pysec-2025-33 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the… | vyper | 2025-01-14T18:16:05+00:00 | 2025-04-23T21:23:01.322686+00:00 |
| pysec-2025-32 |
9.8 (3.1)
|
BentoML is a Python library for building online serving systems optimized for AI apps and… | bentoml | 2025-04-09T16:15:25+00:00 | 2025-04-22T19:21:34.073355+00:00 |
| pysec-2025-31 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statemen… | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.116292+00:00 |
| pysec-2025-30 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.064106+00:00 |
| pysec-2025-29 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.005382+00:00 |
| pysec-2025-28 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
| pysec-2025-27 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
| pysec-2025-26 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.645758+00:00 |
| pysec-2021-891 |
7.8 (3.1)
|
CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 S… | salt | 2021-03-03T10:15:13+00:00 | 2025-04-09T17:27:27.582884+00:00 |
| pysec-2025-25 |
6.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middle… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.532849+00:00 |
| pysec-2025-24 |
7.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the /api/remove… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.486485+00:00 |
| pysec-2025-23 |
|
Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Inform… | ray | 2025-03-06T05:15:16+00:00 | 2025-04-09T17:27:27.434099+00:00 |
| pysec-2022-43179 |
7.3 (3.1)
|
Poetry is a dependency manager for Python. To handle dependencies that come from a Git re… | poetry | 2022-09-07T19:15:08+00:00 | 2025-04-09T17:27:27.255151+00:00 |
| pysec-2025-22 |
9.8 (3.1)
|
A vulnerability, that could result in Remote Code Execution (RCE), has been found in Plot… | plotai | 2025-03-10T14:15:24+00:00 | 2025-04-09T17:27:27.203714+00:00 |
| pysec-2023-311 |
5.4 (3.1)
|
plone.namedfile allows users to handle `File` and `Image` fields targeting, but not depen… | plone-namedfile | 2023-09-21T15:15:10+00:00 | 2025-04-09T17:27:27.153848+00:00 |
| pysec-2025-21 |
9.8 (3.1)
|
picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model arch… | picklescan | 2025-03-10T12:15:12+00:00 | 2025-04-09T17:27:27.016747+00:00 |
| pysec-2025-20 |
6.5 (3.1)
|
picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes i… | picklescan | 2025-03-10T12:15:10+00:00 | 2025-04-09T17:27:26.966215+00:00 |
| pysec-2025-19 |
9.8 (3.1)
|
picklescan before 0.0.22 only considers standard pickle file extensions in the scope for … | picklescan | 2025-03-03T19:15:34+00:00 | 2025-04-09T17:27:26.916350+00:00 |
| pysec-2025-18 |
|
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craf… | picklescan | 2025-02-26T15:15:24+00:00 | 2025-04-09T17:27:26.867210+00:00 |
| pysec-2023-310 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NO… | mobsf | 2023-09-21T22:15:11+00:00 | 2025-04-09T17:27:26.663665+00:00 |
| pysec-2025-17 |
5.5 (3.1)
|
In mlflow/mlflow version 2.18, an admin is able to create a new user account without sett… | mlflow | 2025-03-20T10:15:54+00:00 | 2025-04-09T17:27:26.322333+00:00 |
| pysec-2023-309 |
8.8 (3.1)
|
Path Traversal in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-13T00:15:07+00:00 | 2025-04-09T17:27:26.271200+00:00 |
| pysec-2023-308 |
10.0 (3.1)
|
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0. | mlflow | 2023-07-19T01:15:10+00:00 | 2025-04-09T17:27:26.223213+00:00 |
| pysec-2025-16 |
7.5 (3.1)
|
LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vu… | lnbits | 2025-04-06T20:15:15+00:00 | 2025-04-09T17:27:25.872691+00:00 |
| pysec-2025-15 |
5.3 (3.1)
|
Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilde… | flask-appbuilder | 2025-03-03T16:15:41+00:00 | 2025-04-09T17:27:25.227116+00:00 |
| pysec-2025-14 |
|
An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normal… | django | 2025-04-02T13:15:44+00:00 | 2025-04-09T17:27:25.169049+00:00 |
| ID | Description | Type |
|---|---|---|
| tid-205 | If a threat actor has access to a valid OS account, they can utilize existing OS tools an… | system-software |
| tid-204 | Without a correctly enforced operating system privilege model, a compromised or untrusted… | system-software |
| tid-203 | Threat actors may be able to install a driver or kernel module with malicious code to loa… | system-software |
| tid-202 | Devices may have vulnerabilities within software used to parse various network protocols.… | system-software |
| tid-201 | Some devices utilize bootloaders that are either stored in writable memory or memory that… | system-software |
| tid-119 | Hardware debugging ports (e.g., JTAG, SWD, etc.) oftentimes have high privileges or direc… | hardware |
| tid-118 | If a threat actor has physical access to a device, they may be able to cause physical dam… | hardware |
| tid-116 | If a device has a latent user access port, it may be possible for attackers to leverage p… | hardware |
| tid-115 | Unprotected programming or debugging interfaces may be used to extract device firmware, e… | hardware |
| tid-114 | Messages and data passing between discrete sub-components and peripherals may be intercep… | hardware |
| tid-113 | A threat actor could manipulate the firmware associated with a device’s peripheral or oth… | hardware |
| tid-111 | An untrusted storage peripheral (e.g., USB) could be connected to the device. If maliciou… | hardware |
| tid-110 | Certain software-executed attacks can introduce a fault to the physical hardware of the d… | hardware |
| tid-109 | If a threat actor can physically access a RAM chip, they may be able to readout the conte… | hardware |
| tid-108 | Contents of non-volatile memory chips or non-fixed storage (e.g., SD cards, Compact Flash… | hardware |
| tid-107 | If separate discrete chips/peripherals that have access to the same physical memory, a th… | hardware |
| tid-106 | A threat actor could intercept data across a data bus used to connect a process to either… | hardware |
| tid-105 | A threat actor with physical access to a device may be able to manipulate the processor’s… | hardware |
| tid-103 | Operating system memory safety models rely on processor hardware to enforce separation be… | hardware |
| tid-102 | Devices will oftentimes emit different electromagnetic signals during different operation… | hardware |
| tid-101 | Devices will oftentimes consume variable amounts of power depending on the operations the… | hardware |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33855 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.741239Z |
| gsd-2024-33851 | phpecc, as used in paragonie/phpecc before 2.0.1, has a branch-based timing leak in Point… | 2024-04-28T05:02:07.732559Z |
| gsd-2024-33879 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.727068Z |
| gsd-2024-4294 | A vulnerability, which was classified as critical, has been found in PHPGurukul Doctor Ap… | 2024-04-28T05:02:06.079201Z |
| gsd-2024-4292 | A vulnerability classified as critical has been found in Contemporary Controls BASrouter … | 2024-04-28T05:02:06.073286Z |
| gsd-2024-4295 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:06.068263Z |
| gsd-2024-4291 | A vulnerability was found in Tenda A301 15.13.08.12_multi_TDE01. It has been rated as cri… | 2024-04-28T05:02:06.058388Z |
| gsd-2024-4293 | A vulnerability classified as problematic was found in PHPGurukul Doctor Appointment Mana… | 2024-04-28T05:02:06.052534Z |
| gsd-2023-52722 | An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER … | 2024-04-28T05:01:28.746814Z |
| gsd-2022-48685 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.870720Z |
| gsd-2022-48684 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.715598Z |
| gsd-2024-24777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:24.547536Z |
| gsd-2024-28875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:20.401696Z |
| gsd-2024-33786 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.606155Z |
| gsd-2024-33697 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.598872Z |
| gsd-2024-33722 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.598142Z |
| gsd-2024-33784 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.595808Z |
| gsd-2024-33788 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.591276Z |
| gsd-2024-33814 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.590797Z |
| gsd-2024-33701 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.589032Z |
| gsd-2024-33776 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.587852Z |
| gsd-2024-33712 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.587066Z |
| gsd-2024-33840 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.586722Z |
| gsd-2024-33838 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.585807Z |
| gsd-2024-33749 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.584613Z |
| gsd-2024-33839 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.579161Z |
| gsd-2024-33733 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.577869Z |
| gsd-2024-33845 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.569462Z |
| gsd-2024-33741 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.568527Z |
| gsd-2024-33738 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.562140Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-325 | Malicious code in marshel (PyPI) | 2026-01-18T22:56:09Z | 2026-02-26T09:50:46Z |
| mal-2026-237 | Malicious code in formater (PyPI) | 2026-01-12T23:05:42Z | 2026-02-26T09:50:46Z |
| mal-2026-236 | Malicious code in graponater (PyPI) | 2026-01-12T20:55:06Z | 2026-02-26T09:50:46Z |
| mal-2025-193011 | Malicious code in requeses (PyPI) | 2025-12-31T16:40:04Z | 2026-02-26T09:50:46Z |
| mal-2025-193010 | Malicious code in pyrogrqm (PyPI) | 2025-12-31T16:09:30Z | 2026-02-26T09:50:46Z |
| mal-2025-193008 | Malicious code in telegreph (PyPI) | 2025-12-31T15:00:17Z | 2026-02-26T09:50:46Z |
| mal-2025-193007 | Malicious code in aiogrem (PyPI) | 2025-12-31T14:49:05Z | 2026-02-26T09:50:46Z |
| mal-2025-192991 | Malicious code in pyrogrem (PyPI) | 2025-12-31T11:49:56Z | 2026-02-26T09:50:46Z |
| mal-2025-192958 | Malicious code in smtmlib (PyPI) | 2025-12-29T10:04:23Z | 2026-02-26T09:50:46Z |
| mal-2025-192956 | Malicious code in cryptozip (PyPI) | 2025-12-28T19:49:40Z | 2026-02-26T09:50:46Z |
| mal-2025-192948 | Malicious code in extrazip (PyPI) | 2025-12-27T09:41:01Z | 2026-02-26T09:50:46Z |
| mal-2025-192943 | Malicious code in telegrem (PyPI) | 2025-12-26T20:03:22Z | 2026-02-26T09:50:46Z |
| mal-2025-192942 | Malicious code in telebot-bot (PyPI) | 2025-12-26T20:04:06Z | 2026-02-26T09:50:46Z |
| mal-2025-192690 | Malicious code in smtrlib (PyPI) | 2025-12-22T17:15:11Z | 2026-02-26T09:50:46Z |
| mal-2025-192689 | Malicious code in unizip (PyPI) | 2025-12-22T14:02:40Z | 2026-02-26T09:50:46Z |
| mal-2025-192579 | Malicious code in smtblib (PyPI) | 2025-12-15T15:24:47Z | 2026-02-26T09:50:46Z |
| mal-2025-192468 | Malicious code in yzip (PyPI) | 2025-12-11T15:53:42Z | 2026-02-26T09:50:46Z |
| mal-2025-192467 | Malicious code in gxzip (PyPI) | 2025-12-10T22:53:31Z | 2026-02-26T09:50:46Z |
| mal-2025-192432 | Malicious code in kzip (PyPI) | 2025-12-10T08:56:08Z | 2026-02-26T09:50:46Z |
| mal-2025-192323 | Malicious code in rendom (PyPI) | 2025-12-05T16:58:12Z | 2026-02-26T09:50:46Z |
| mal-2025-191919 | Malicious code in uzip (PyPI) | 2025-11-22T16:53:45Z | 2026-02-26T09:50:46Z |
| mal-2025-191918 | Malicious code in uuzip (PyPI) | 2025-11-22T20:55:03Z | 2026-02-26T09:50:46Z |
| mal-2025-191876 | Malicious code in speedd-testing-bot (PyPI) | 2025-10-28T19:23:53Z | 2026-02-26T09:50:46Z |
| mal-2025-191875 | Malicious code in speed-testing-vps (PyPI) | 2025-11-23T16:18:01Z | 2026-02-26T09:50:46Z |
| mal-2025-191874 | Malicious code in speed-testing-nt (PyPI) | 2025-10-31T00:13:41Z | 2026-02-26T09:50:46Z |
| mal-2025-191799 | Malicious code in mzip (PyPI) | 2025-11-22T17:01:17Z | 2026-02-26T09:50:46Z |
| mal-2025-191792 | Malicious code in minizip (PyPI) | 2025-11-23T12:20:46Z | 2026-02-26T09:50:46Z |
| mal-2026-1041 | Malicious code in secure-monkey (npm) | 2026-02-23T11:30:57Z | 2026-02-26T01:40:06Z |
| mal-2026-1040 | Malicious code in react-markdown-canvas (npm) | 2026-02-23T22:01:02Z | 2026-02-26T01:40:06Z |
| mal-2026-986 | Malicious code in en-thrift-internal (npm) | 2026-02-22T21:50:01Z | 2026-02-26T01:40:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0231 | GnuPG und Gpg4win: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0215 | Linux Kernel: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0213 | expat: Schwachstelle ermöglicht Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0207 | Red Hat Enterprise Linux (urllib3): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0199 | Red Hat OpenShift Pipelines Operator (Fulcio): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0198 | Red Hat OpenShift und OpenShift AI (urllib3): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0145 | FreeRDP: Mehrere Schwachstellen ermöglichen DoS und Codeausführung | 2026-01-19T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0136 | AMD EPYC-Prozessoren: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-15T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0116 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0105 | Red Hat Developer Hub: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0098 | Node.js: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0008 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2026-01-04T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2920 | Linux Kernel: Mehrere Schwachstellen | 2025-12-23T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2886 | Red Hat Enterprise Linux (git-lfs, opentelemetry-collector): Mehrere Schwachstellen | 2025-12-18T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2798 | Red Hat OpenShift Service Mesh: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2756 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-07T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2755 | util-linux: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-12-07T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2730 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-02T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2651 | GnuTLS: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-19T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2643 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-19T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2637 | Rsync: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-18T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2595 | Linux Kernel: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2584 | Red Hat Enterprise Linux Ceph Storage: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2579 | Linux Kernel: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2518 | Red Hat Enterprise Linux (runc): Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-11-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2242 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2025-10-08T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2194 | Linux Kernel: Mehrere Schwachstellen | 2025-10-05T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2150 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-29T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2045 | expat: Schwachstelle ermöglicht Denial of Service | 2025-09-14T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1422 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-06-20T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0014 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-01-15T12:16:05.427141Z | 2026-01-15T12:16:05.427141Z |
| ncsc-2026-0013 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2026-01-14T13:45:48.530782Z | 2026-01-14T13:45:48.530782Z |
| ncsc-2026-0012 | Kwetsbaarheden verholpen in Adobe Dreamweaver Desktop | 2026-01-14T13:41:56.261778Z | 2026-01-14T13:41:56.261778Z |
| ncsc-2026-0011 | Kwetsbaarheid verholpen in Microsoft Developer Tools | 2026-01-13T19:19:27.690900Z | 2026-01-13T19:19:27.690900Z |
| ncsc-2026-0010 | Kwetsbaarheden verholpen in Microsoft Office | 2026-01-13T19:18:45.984019Z | 2026-01-13T19:18:45.984019Z |
| ncsc-2026-0009 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-01-13T19:17:59.629364Z | 2026-01-13T19:17:59.629364Z |
| ncsc-2026-0008 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-01-13T19:17:18.848673Z | 2026-01-13T19:17:18.848673Z |
| ncsc-2026-0007 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-01-13T19:16:30.720079Z | 2026-01-13T19:16:30.720079Z |
| ncsc-2026-0006 | Kwetsbaarheden verholpen in SAP producten | 2026-01-13T14:42:24.621603Z | 2026-01-13T14:42:24.621603Z |
| ncsc-2026-0005 | Kwetsbaarheden verholpen in Siemens producten | 2026-01-13T12:05:57.353070Z | 2026-01-13T12:05:57.353070Z |
| ncsc-2026-0004 | Kwetsbaarheden verholpen in Trend Micro Apex Central | 2026-01-09T11:14:58.910197Z | 2026-01-09T11:14:58.910197Z |
| ncsc-2026-0003 | Kwetsbaarheden verholpen in GitLab | 2026-01-09T11:11:48.308357Z | 2026-01-09T11:11:48.308357Z |
| ncsc-2026-0002 | Kwetsbaarheid verholpen in n8n | 2026-01-08T12:34:29.315681Z | 2026-01-08T12:34:29.315681Z |
| ncsc-2026-0001 | Kwetsbaarheden verholpen in Hanwha camera systemen | 2026-01-08T12:28:21.446188Z | 2026-01-08T12:28:21.446188Z |
| ncsc-2025-0405 | Kwetsbaarheid verholpen in Roundcube Webmail | 2025-12-31T14:29:26.821576Z | 2025-12-31T14:29:26.821576Z |
| ncsc-2025-0404 | Kwetsbaarheid verholpen in SmarterMail | 2025-12-31T14:19:01.847364Z | 2025-12-31T14:19:01.847364Z |
| ncsc-2025-0403 | Kwetsbaarheden verholpen in QNAP besturingssystemen | 2025-12-29T09:17:28.385450Z | 2025-12-29T09:17:28.385450Z |
| ncsc-2025-0402 | Kwetsbaarheid verholpen in MongoDB | 2025-12-27T11:38:11.514349Z | 2025-12-27T11:38:11.514349Z |
| ncsc-2025-0399 | Kwetsbaarheid verholpen in HPE OneView Software | 2025-12-18T18:38:20.794784Z | 2025-12-24T11:29:46.123674Z |
| ncsc-2025-0401 | Kwetsbaarheden verholpen in Foxit PDF Reader | 2025-12-24T09:14:56.590353Z | 2025-12-24T09:14:56.590353Z |
| ncsc-2025-0400 | Kwetsbaarheid verholpen in WatchGuard Firebox | 2025-12-19T11:16:01.438518Z | 2025-12-19T11:16:01.438518Z |
| ncsc-2025-0398 | Kwetsbaarheid in Cisco AsyncOS | 2025-12-17T19:47:00.346651Z | 2025-12-17T19:47:00.346651Z |
| ncsc-2025-0397 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-12-15T09:08:39.804149Z | 2025-12-15T09:08:39.804149Z |
| ncsc-2025-0396 | Kwetsbaarheden verholpen in Apple macOS | 2025-12-15T09:06:36.450655Z | 2025-12-15T09:06:36.450655Z |
| ncsc-2025-0394 | Kwetsbaarheden verholpen in React Server Components | 2025-12-12T09:04:19.324080Z | 2025-12-12T10:46:34.688189Z |
| ncsc-2025-0395 | Kwetsbaarheden verholpen in SAP Software | 2025-12-12T09:29:08.429888Z | 2025-12-12T09:29:08.429888Z |
| ncsc-2025-0393 | Kwetsbaarheid verholpen in GeoServer | 2025-12-12T08:12:18.831044Z | 2025-12-12T09:02:27.681292Z |
| ncsc-2025-0392 | Kwetsbaarheid verholpen in Barracuda Service Center | 2025-12-11T13:53:23.819008Z | 2025-12-11T13:53:23.819008Z |
| ncsc-2025-0391 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-12-11T13:51:55.178462Z | 2025-12-11T13:51:55.178462Z |
| ncsc-2025-0390 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-12-11T09:22:54.841848Z | 2025-12-11T09:22:54.841848Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-750499 | SSA-750499: Weak Encryption Vulnerability in SIPROTEC 5 Devices | 2024-07-09T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-726617 | SSA-726617: Incorrect Privilege Assignment Vulnerability in Mendix OIDC SSO Module | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-711309 | SSA-711309: Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products | 2023-09-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-687955 | SSA-687955: Accessible Development Shell via Physical Interface in SIPROTEC 5 | 2025-02-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-682326 | SSA-682326: Multiple Vulnerabilities in COMOS before V10.4.5 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-631336 | SSA-631336: Multiple Web Server Vulnerabilities in SICAM GridEdge Before V2.6.6 | 2022-06-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-522291 | SSA-522291: Improper Certificate Validation Vulnerability in Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-514895 | SSA-514895: Multiple Vulnerabilities in Altair Grid Engine V2025.1.0 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-365596 | SSA-365596: DLL Hijacking Vulnerability in Siemens Software Center and Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-339694 | SSA-339694: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-322980 | SSA-322980: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2023-04-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-267056 | SSA-267056: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-225578 | SSA-225578: Improper Access Control Vulnerability in SICAM GridEdge Before V2.7.3 | 2022-07-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-201498 | SSA-201498: Multiple Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices Before V3.11 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-194557 | SSA-194557: Improper Limitation of Filesystem Access through Web Server Vulnerability in SIPROTEC 5 | 2025-01-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-876787 | SSA-876787: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-722410 | SSA-722410: Multiple Vulnerabilities in User Management Component (UMC) | 2025-09-09T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-625789 | SSA-625789: Multiple Vulnerabilities in SIMATIC S7-1200 CPU V1/V2 Devices | 2011-06-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-614723 | SSA-614723: Denial of Service Vulnerabilities in User Management Component (UMC) | 2025-05-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-541582 | SSA-541582: Multiple File Parsing Vulnerabilities in Solid Edge | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-486936 | SSA-486936: Authentication Vulnerability in SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-373591 | SSA-373591: Buffer Overflow Vulnerability in RUGGEDCOM ROS Devices | 2021-07-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-367714 | SSA-367714: Improper Integrity Check of Firmware Updates in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-05-23T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-318832 | SSA-318832: SQL Injection Vulnerability in SINEC NMS | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-279823 | SSA-279823: Cross-Site Scripting Vulnerability in SIMATIC S7-1200 CPU V2/V3 Before V3.0.2 | 2012-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-240718 | SSA-240718: Insecure Storage of HTTPS CA Certificate in SIMATIC S7-1200 CPU V2 | 2012-09-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-186293 | SSA-186293: XML External Entity (XXE) Injection Vulnerability in SIMOTION SCOUT, SIMOTION SCOUT TIA and SINAMICS STARTER | 2025-08-12T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-083019 | SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices | 2025-07-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:1813 | Red Hat Security Advisory: golang security update | 2026-02-03T14:57:18+00:00 | 2026-02-17T12:41:30+00:00 |
| rhsa-2026:1805 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T10:17:28+00:00 | 2026-02-17T12:41:30+00:00 |
| rhsa-2026:1792 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T07:25:42+00:00 | 2026-02-17T12:41:30+00:00 |
| rhsa-2026:1706 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T12:38:43+00:00 | 2026-02-17T12:41:30+00:00 |
| rhsa-2026:1803 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T09:45:07+00:00 | 2026-02-17T12:41:29+00:00 |
| rhsa-2026:1794 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T07:18:11+00:00 | 2026-02-17T12:41:29+00:00 |
| rhsa-2026:1793 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T07:17:26+00:00 | 2026-02-17T12:41:29+00:00 |
| rhsa-2026:1791 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T07:21:33+00:00 | 2026-02-17T12:41:28+00:00 |
| rhsa-2026:1736 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2026-02-02T17:31:06+00:00 | 2026-02-17T12:41:28+00:00 |
| rhsa-2026:1735 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T17:50:59+00:00 | 2026-02-17T12:41:27+00:00 |
| rhsa-2026:1734 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T17:45:39+00:00 | 2026-02-17T12:41:27+00:00 |
| rhsa-2026:1730 | Red Hat Security Advisory: Red Hat Quay 3.12.13 | 2026-02-02T15:52:56+00:00 | 2026-02-17T12:41:27+00:00 |
| rhsa-2026:1729 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T15:49:34+00:00 | 2026-02-17T12:41:26+00:00 |
| rhsa-2026:1726 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T15:25:44+00:00 | 2026-02-17T12:41:26+00:00 |
| rhsa-2026:1717 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T14:17:19+00:00 | 2026-02-17T12:41:26+00:00 |
| rhsa-2026:1715 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-02-02T13:10:53+00:00 | 2026-02-17T12:41:26+00:00 |
| rhsa-2026:1712 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T13:10:47+00:00 | 2026-02-17T12:41:25+00:00 |
| rhsa-2026:1704 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T11:50:53+00:00 | 2026-02-17T12:41:25+00:00 |
| rhsa-2026:1693 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T10:02:03+00:00 | 2026-02-17T12:41:25+00:00 |
| rhsa-2026:1619 | Red Hat Security Advisory: python3.12-urllib3 security update | 2026-02-02T01:58:41+00:00 | 2026-02-17T12:41:25+00:00 |
| rhsa-2026:1676 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T06:53:02+00:00 | 2026-02-17T12:41:24+00:00 |
| rhsa-2026:1674 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T06:47:53+00:00 | 2026-02-17T12:41:24+00:00 |
| rhsa-2026:1652 | Red Hat Security Advisory: Red Hat Ceph Storage | 2026-02-02T02:51:27+00:00 | 2026-02-17T12:41:24+00:00 |
| rhsa-2026:1618 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T01:17:06+00:00 | 2026-02-17T12:41:23+00:00 |
| rhsa-2026:1609 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2026-01-30T15:48:57+00:00 | 2026-02-17T12:41:23+00:00 |
| rhsa-2026:1599 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Update | 2026-01-29T19:16:21+00:00 | 2026-02-17T12:41:22+00:00 |
| rhsa-2026:1596 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-01-29T18:40:37+00:00 | 2026-02-17T12:41:22+00:00 |
| rhsa-2026:1546 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-01-29T09:08:25+00:00 | 2026-02-17T12:41:22+00:00 |
| rhsa-2026:1540 | Red Hat Security Advisory: OpenShift Container Platform 4.15.61 packages and security update | 2026-02-05T16:39:36+00:00 | 2026-02-17T12:41:22+00:00 |
| rhsa-2026:1518 | Red Hat Security Advisory: grafana-pcp security update | 2026-01-28T23:26:14+00:00 | 2026-02-17T12:41:21+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-036-01 | TP-Link Systems Inc. VIGI Series IP Camera | 2026-02-05T06:00:00.000000Z | 2026-02-05T06:00:00.000000Z |
| icsa-25-343-03 | Multiple India-based CCTV Cameras (Update A)** | 2025-12-09T06:00:00.000000Z | 2026-02-05T06:00:00.000000Z |
| icsa-26-034-04 | Synectix LAN 232 TRIO | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-03 | RISS SRL MOMA Seismic Station | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-02 | *Avation Light Engine Pro * | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-01 | Mitsubishi Electric FREQSHIP-mini for Windows | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-310-02 | Ubia Ubox (Update A) | 2025-11-06T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-128-03 | Mitsubishi Electric Multiple FA Products (Update B) | 2025-05-08T06:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-24-345-06 | Rockwell Automation Arena (Update B) | 2024-12-10T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-089-01 | Hitachi Energy IEC 61850 MMS-Server (Update B) | 2023-02-14T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-068-05 | Hitachi Energy Relion 670, 650 and SAM600-IO Series | 2023-02-28T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-112-03 | Schneider Electric Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000000Z | 2026-01-30T07:00:00.000000Z |
| icsa-26-029-03 | Rockwell Automation ControlLogix | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-029-02 | Rockwell Automation ArmorStart LT | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-205-01 | Mitsubishi Electric CNC Series (Update B) | 2025-07-24T06:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-126-03 | BrightSign Players (Update A) | 2025-05-06T06:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-028-06 | Schneider Electric RemoteConnect and SCADAPack x70 Utilities (Update A) | 2025-01-14T00:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-027-03 | Schneider Electric Zigbee Products | 2026-01-13T08:00:00.000000Z | 2026-01-27T20:13:34.637968Z |
| icsa-26-027-02 | Festo Didactic SE MES PC | 2024-02-27T12:00:00.000000Z | 2026-01-27T16:20:28.099631Z |
| icsa-26-027-04 | Johnson Controls Metasys Products | 2026-01-27T07:00:00.000000Z | 2026-01-27T07:00:00.000000Z |
| icsa-26-022-01 | Schneider Electric | 2026-01-13T08:00:00.000000Z | 2026-01-22T17:29:46.950679Z |
| icsa-26-022-08 | EVMAPA | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-07 | Delta Electronics DIAView | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-06 | Hubitat Elevation Hubs | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-05 | Weintek cMT X Series HMI EasyWeb Service | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-04 | Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-03 | Rockwell Automation CompactLogix 5370 | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-02 | AutomationDirect CLICK Programmable Logic Controller | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-25-352-08 | Axis Communications Camera Station Pro, Camera Station, and Device Manager (Update B) | 2025-12-18T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-24-326-04 | Schneider Electric Modicon M340, MC80, and Momentum Unity M1E (Update B) | 2024-11-12T05:00:00.000000Z | 2026-01-20T15:49:53.166459Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-9800cl-openscep-sb4xtxzp | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controller for Cloud Unauthenticated Access to Certificate Enrollment Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-snmp-bypass-hhuvujdn | Cisco IOS XE SD-WAN Software Packet Filtering Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-09-22T14:12:28+00:00 |
| cisco-sa-xrsig-uy4zrucg | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-iosxr-arp-storm-ejuu55ym | Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-acl-packetio-swjhhbtz | Cisco IOS XR Software Management Interface ACL Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-fp2k-ipsec-dos-tjwgdzco | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 2100 Series IPv6 over IPsec Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-09T21:22:34+00:00 |
| cisco-sa-webex-xss-55bv8hhm | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-webex-urlredirect-uk8ddjsz | Cisco Webex Meetings URL Redirection Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-phone-write-g3kcc5df | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-imp-xss-xqgu4hsg | Cisco Unified Communications Manager IM & Presence Service Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-xjqzsycp | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-info-dis-zhppmfgz | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Information Disclosure Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epni-arb-file-upload-jjdm2p83 | Cisco Evolved Programmable Network Manager Arbitrary File Upload Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-cucm-csrf-w762pryd | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-3100_4200_tlsdos-2ynscd54 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 3100 and 4200 Series TLS 1.3 Cipher Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-03T13:37:50+00:00 |
| cisco-sa-ucs-xss-ey6xhyps | Cisco UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-vkvmorv-cnkrv7hk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Open Redirect Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-multi-cmdinj-e4ukjyrz | Cisco UCS Manager Software Command Injection Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-kvmsxss-6h7anuyk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxospc-pim6-vg4jfph | Cisco Nexus 3000 and 9000 Series Switches Protocol Independent Multicast Version 6 Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-infodis-tectysfg | Cisco NX-OS Software Sensitive Log Information Disclosure Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-qhnze5ss | Cisco NX-OS Software Command Injection Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nshs-urapi-gjubvfpu | Cisco Nexus Dashboard and Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nd-ptrs-xu2fm2wb | Cisco Nexus Dashboard Path Traversal Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-n39k-isis-dos-jhja8rfx | Cisco Nexus 3000 and 9000 Series Switches Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ise-file-upload-qksx6c8g | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:43:01+00:00 |
| cisco-sa-pi-epnm-tet4gxbx | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Sensitive Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-authproxlog-sxczxq63 | Cisco Duo Authentication Proxy Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-20180328-smi2 | Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability | 2018-03-28T16:00:00+00:00 | 2025-08-20T14:26:26+00:00 |
| cisco-sa-asaftd-ssltls-dos-ehw76vze | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SSL/TLS Certificate Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-19T16:32:05+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2020-0001 | Security Information Regarding "Profile Programming" | 2020-05-31T10:00:00.000Z | 2020-05-31T10:00:00.000Z |
| sca-2019-0002 | Vulnerability in SICK FX0-GENT00000 and SICK FX0-GPNT00000 | 2019-09-20T10:00:00.000Z | 2019-09-20T10:00:00.000Z |
| sca-2019-0001 | MSC800 affected by hard-coded credentials vulnerability | 2019-06-21T10:00:00.000Z | 2019-06-21T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-2739 | This affects versions of the package bn.js before 5.2.3. Calling maskn(0) on any BN instance corrupts the internal state, causing toString(), divmod(), and other methods to enter an infinite loop, hanging the process indefinitely. | 2026-02-02T00:00:00.000Z | 2026-02-25T01:03:52.000Z |
| msrc_cve-2025-38656 | wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() | 2025-08-02T00:00:00.000Z | 2026-02-25T01:03:29.000Z |
| msrc_cve-2023-53543 | vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check | 2025-10-02T00:00:00.000Z | 2026-02-25T01:03:25.000Z |
| msrc_cve-2026-27199 | Werkzeug safe_join() allows Windows special device names | 2026-02-02T00:00:00.000Z | 2026-02-25T01:03:19.000Z |
| msrc_cve-2025-38553 | net/sched: Restrict conditions for adding duplicating netems to qdisc tree | 2025-08-02T00:00:00.000Z | 2026-02-24T14:46:20.000Z |
| msrc_cve-2025-39703 | net, hsr: reject HSR frame if skb can't hold tag | 2025-09-02T00:00:00.000Z | 2026-02-24T14:46:14.000Z |
| msrc_cve-2025-39702 | ipv6: sr: Fix MAC comparison to be constant-time | 2025-09-02T00:00:00.000Z | 2026-02-24T14:46:07.000Z |
| msrc_cve-2025-39697 | NFS: Fix a race when updating an existing write | 2025-09-02T00:00:00.000Z | 2026-02-24T14:46:01.000Z |
| msrc_cve-2025-39691 | fs/buffer: fix use-after-free when call bh_read() helper | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:54.000Z |
| msrc_cve-2025-39689 | ftrace: Also allocate and copy hash for reading of filter files | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:48.000Z |
| msrc_cve-2025-39683 | tracing: Limit access to parser->buffer when trace_get_user failed | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:41.000Z |
| msrc_cve-2025-39681 | x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:34.000Z |
| msrc_cve-2025-39693 | drm/amd/display: Avoid a NULL pointer dereference | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:28.000Z |
| msrc_cve-2025-39676 | scsi: qla4xxx: Prevent a potential error pointer dereference | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:21.000Z |
| msrc_cve-2025-39673 | ppp: fix race conditions in ppp_fill_forward_path | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:14.000Z |
| msrc_cve-2025-38699 | scsi: bfa: Double-free fix | 2025-09-02T00:00:00.000Z | 2026-02-24T14:45:08.000Z |
| msrc_cve-2025-38666 | net: appletalk: Fix use-after-free in AARP proxy probe | 2025-08-02T00:00:00.000Z | 2026-02-24T14:45:01.000Z |
| msrc_cve-2025-38664 | ice: Fix a null pointer dereference in ice_copy_and_init_pkg() | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:55.000Z |
| msrc_cve-2025-38645 | net/mlx5: Check device memory pointer before usage | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:48.000Z |
| msrc_cve-2025-38622 | net: drop UFO packets in udp_rcv_segment() | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:41.000Z |
| msrc_cve-2025-38618 | vsock: Do not allow binding to VMADDR_PORT_ANY | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:35.000Z |
| msrc_cve-2025-38617 | net/packet: fix a race in packet_set_ring() and packet_notifier() | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:24.000Z |
| msrc_cve-2025-38612 | staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:18.000Z |
| msrc_cve-2025-38609 | PM / devfreq: Check governor before using governor->name | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:11.000Z |
| msrc_cve-2025-38608 | bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls | 2025-08-02T00:00:00.000Z | 2026-02-24T14:44:04.000Z |
| msrc_cve-2025-38604 | wifi: rtl818x: Kill URBs before clearing tx status queue | 2025-08-02T00:00:00.000Z | 2026-02-24T14:43:57.000Z |
| msrc_cve-2025-38602 | iwlwifi: Add missing check for alloc_ordered_workqueue | 2025-08-02T00:00:00.000Z | 2026-02-24T14:43:51.000Z |
| msrc_cve-2025-38550 | ipv6: mcast: Delay put pmc->idev in mld_del_delrec() | 2025-08-02T00:00:00.000Z | 2026-02-24T14:43:44.000Z |
| msrc_cve-2025-38546 | atm: clip: Fix memory leak of struct clip_vcc. | 2025-08-02T00:00:00.000Z | 2026-02-24T14:43:38.000Z |
| msrc_cve-2025-38542 | net: appletalk: Fix device refcount leak in atrtr_create() | 2025-08-02T00:00:00.000Z | 2026-02-24T14:43:31.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201304-0385 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:38:16.278000Z |
| var-201904-0755 | A use after free issue was addressed with improved memory management. This issue affected… | 2025-12-22T23:38:16.003000Z |
| var-200505-0193 | Buffer overflow in the Netinfo Setup Tool (NeST) allows local users to execute arbitrary … | 2025-12-22T23:38:14.233000Z |
| var-202112-2539 | vim is vulnerable to Out-of-bounds Read. SourceCoster Online Covid Vaccination Scheduler … | 2025-12-22T23:38:13.627000Z |
| var-200701-0396 | Format string vulnerability in Apple Software Update 2.0.5 on Mac OS X 10.4.8 allows remo… | 2025-12-22T23:37:39.067000Z |
| var-200809-0006 | Directory Services in Apple Mac OS X 10.5 through 10.5.4, when Active Directory is used, … | 2025-12-22T23:37:38.921000Z |
| var-200609-1415 | Buffer overflow in PPP on Apple Mac OS X 10.4.x up to 10.4.8 and 10.3.x up to 10.3.9, whe… | 2025-12-22T23:37:20.684000Z |
| var-200603-0272 | IPSec when used with VPN networks in Mac OS X 10.4 through 10.4.5 allows remote attackers… | 2025-12-22T23:37:20.411000Z |
| var-201912-0615 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i… | 2025-12-22T23:37:19.793000Z |
| var-201912-0643 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T23:37:14.392000Z |
| var-200906-0591 | The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util befor… | 2025-12-22T23:37:13.846000Z |
| var-200809-0187 | Finder in Apple Mac OS X 10.5.2 through 10.5.4 allows remote attackers to cause a denial … | 2025-12-22T23:37:13.464000Z |
| var-202301-1703 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2025-12-22T23:37:13.194000Z |
| var-202012-1279 | curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation … | 2025-12-22T23:37:05.921000Z |
| var-201304-0184 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:36:49.148000Z |
| var-200608-0042 | OpenSSH in Apple Mac OS X 10.4.7 allows remote attackers to cause a denial of service or … | 2025-12-22T23:36:49.065000Z |
| var-201908-0264 | Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a den… | 2025-12-22T23:36:48.411000Z |
| var-201710-0974 | Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the G… | 2025-12-22T23:36:17.894000Z |
| var-201912-0633 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T23:36:04.194000Z |
| var-201211-0364 | Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on … | 2025-12-22T23:36:03.936000Z |
| var-200809-0194 | VideoConference in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows remote attackers… | 2025-12-22T23:36:03.286000Z |
| var-201302-0049 | Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in t… | 2025-12-22T23:35:57.723000Z |
| var-201007-0321 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 thro… | 2025-12-22T23:35:54.449000Z |
| var-201008-1003 | The INCLUDE_SECURITY functionality in Wind River VxWorks 6.x, 5.x, and earlier uses the L… | 2025-12-22T23:35:49.081000Z |
| var-201912-1850 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T23:35:23.528000Z |
| var-201605-0077 | The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consi… | 2025-12-22T23:34:11.751000Z |
| var-200106-0092 | Cisco PIX Firewall 515 and 520 with 5.1.4 OS running aaa authentication to a TACACS+ serv… | 2025-12-22T23:34:11.274000Z |
| var-202105-1325 | In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHC… | 2025-12-22T23:34:02.898000Z |
| var-202206-1428 | In addition to the c_rehash shell command injection identified in CVE-2022-1292, further … | 2025-12-22T23:33:57.915000Z |
| var-201508-0365 | The xmlreader in libxml allows remote attackers to cause a denial of service (memory cons… | 2025-12-22T23:33:57.555000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000118 | GROWI vulnerable to cross-site request forgery | 2025-12-17T13:04+09:00 | 2025-12-17T13:04+09:00 |
| jvndb-2025-022062 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-12-17T11:28+09:00 | 2025-12-17T11:28+09:00 |
| jvndb-2025-000115 | QND vulnerable to privilege escalation | 2025-12-11T14:33+09:00 | 2025-12-11T14:33+09:00 |
| jvndb-2025-000113 | Multiple vulnerabilities in GroupSession | 2025-12-08T17:48+09:00 | 2025-12-11T11:30+09:00 |
| jvndb-2025-000091 | Multiple I-O DATA NAS management applications register Windows services with unquoted file paths | 2025-10-22T15:04+09:00 | 2025-12-10T16:20+09:00 |
| jvndb-2021-000081 | Multiple vulnerabilities in Sharp NEC Display Solutions' public displays | 2021-09-17T15:13+09:00 | 2025-12-10T10:24+09:00 |
| jvndb-2025-021305 | Android App "Brother iPrint&Scan" improper use of an external cache directory | 2025-12-09T17:25+09:00 | 2025-12-09T17:25+09:00 |
| jvndb-2025-000114 | ELECOM Clone for Windows registers a Windows service with an unquoted file path | 2025-12-09T17:16+09:00 | 2025-12-09T17:16+09:00 |
| jvndb-2025-000116 | GS Yuasa FULLBACK Manager Pro registers Windows services with unquoted file paths | 2025-12-08T14:06+09:00 | 2025-12-08T14:06+09:00 |
| jvndb-2025-000094 | Multiple vulnerabilities in ABB Terra AC Wallbox | 2025-12-05T14:12+09:00 | 2025-12-05T14:12+09:00 |
| jvndb-2025-000112 | Installer of INZONE Hub may insecurely load Dynamic Link Libraries | 2025-11-28T13:36+09:00 | 2025-11-28T13:36+09:00 |
| jvndb-2025-000111 | SwitchBot Smart Video Doorbell vulnerable to active debug code | 2025-11-26T14:35+09:00 | 2025-11-26T14:35+09:00 |
| jvndb-2025-000110 | Multiple vulnerabilities in Security Point (Windows) of MaLion | 2025-11-25T17:17+09:00 | 2025-11-25T17:17+09:00 |
| jvndb-2025-000109 | Multiple vulnerabilities in SNC-CX600W | 2025-11-25T14:59+09:00 | 2025-11-25T14:59+09:00 |
| jvndb-2025-000108 | "FOD" App uses hard-coded cryptographic keys | 2025-11-25T14:15+09:00 | 2025-11-25T14:15+09:00 |
| jvndb-2025-000106 | Multiple vulnerabilities in LogStare Collector | 2025-11-21T16:27+09:00 | 2025-11-21T16:27+09:00 |
| jvndb-2025-000107 | Installer of RakurakuMusen Start EX for Windows may insecurely load Dynamic Link Libraries | 2025-11-19T16:22+09:00 | 2025-11-19T16:22+09:00 |
| jvndb-2025-000097 | "Dejira" App for iOS vulnerable to improper server certificate verification | 2025-11-17T14:09+09:00 | 2025-11-17T14:09+09:00 |
| jvndb-2025-000105 | NCP-HG100 vulnerable to OS command injection | 2025-11-14T15:26+09:00 | 2025-11-14T15:26+09:00 |
| jvndb-2025-000104 | Multiple vulnerabilities in GNU Libmicrohttpd | 2025-11-10T15:07+09:00 | 2025-11-10T15:07+09:00 |
| jvndb-2025-000103 | Use of password hash with insufficient computational effort vulnerability in BUFFALO Wi-Fi router "WSR-1800AX4 series" | 2025-11-07T15:39+09:00 | 2025-11-07T15:39+09:00 |
| jvndb-2025-000102 | CLUSTERPRO X and EXPRESSCLUSTER X vulnerable to OS command injection | 2025-11-07T14:55+09:00 | 2025-11-07T14:55+09:00 |
| jvndb-2025-000101 | GROWI vulnerable to stored cross-site scripting | 2025-11-06T13:45+09:00 | 2025-11-06T13:45+09:00 |
| jvndb-2024-013260 | Multiple vulnerabilities in Edgecross Basic Software for Windows | 2024-11-22T10:59+09:00 | 2025-11-04T16:41+09:00 |
| jvndb-2025-017972 | Multiple vulnerabilities in Century Systems FutureNet MA and IP-K series | 2025-11-04T16:37+09:00 | 2025-11-04T16:37+09:00 |
| jvndb-2025-000100 | Multiple Roboticsware products register Windows services with unquoted file paths | 2025-11-04T14:17+09:00 | 2025-11-04T14:17+09:00 |
| jvndb-2025-000098 | Optical Disc Archive Software (for Windows) registers a Windows service with an unquoted file path | 2025-11-04T13:51+09:00 | 2025-11-04T13:51+09:00 |
| jvndb-2025-000099 | Progress Flowmon vulnerable to authenticated OS command injection | 2025-11-04T12:47+09:00 | 2025-11-04T12:47+09:00 |
| jvndb-2025-000096 | Installer of WTW EAGLE (for Windows) may insecurely load Dynamic Link Libraries | 2025-10-29T14:17+09:00 | 2025-10-29T14:17+09:00 |
| jvndb-2025-000095 | MZK-DP300N uses hard-coded credentials | 2025-10-28T14:04+09:00 | 2025-10-28T14:04+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0555-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T09:04:29Z | 2026-02-16T09:04:29Z |
| suse-su-2026:0554-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T08:33:36Z | 2026-02-16T08:33:36Z |
| suse-su-2026:0551-1 | Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T06:33:35Z | 2026-02-16T06:33:35Z |
| suse-su-2026:0550-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T05:33:34Z | 2026-02-16T05:33:34Z |
| suse-su-2026:0548-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T03:33:34Z | 2026-02-16T03:33:34Z |
| suse-su-2026:0546-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6) | 2026-02-15T19:33:42Z | 2026-02-15T19:33:42Z |
| suse-su-2026:0544-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T18:03:51Z | 2026-02-15T18:03:51Z |
| suse-su-2026:0543-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6) | 2026-02-15T17:33:36Z | 2026-02-15T17:33:36Z |
| suse-su-2026:0542-1 | Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T16:03:51Z | 2026-02-15T16:03:51Z |
| suse-su-2026:0539-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T13:33:40Z | 2026-02-15T13:33:40Z |
| suse-su-2026:0535-1 | Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T11:04:06Z | 2026-02-15T11:04:06Z |
| suse-su-2026:0528-1 | Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T06:33:50Z | 2026-02-15T06:33:50Z |
| suse-su-2026:0533-1 | Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4) | 2026-02-15T06:33:38Z | 2026-02-15T06:33:38Z |
| suse-su-2026:0526-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4) | 2026-02-14T19:33:43Z | 2026-02-14T19:33:43Z |
| suse-su-2026:0525-1 | Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) | 2026-02-14T17:04:03Z | 2026-02-14T17:04:03Z |
| suse-su-2026:0524-1 | Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) | 2026-02-14T17:03:57Z | 2026-02-14T17:03:57Z |
| suse-su-2026:0514-1 | Security update for cargo-auditable | 2026-02-13T14:57:18Z | 2026-02-13T14:57:18Z |
| suse-su-2026:0510-1 | Security update for util-linux | 2026-02-13T14:52:46Z | 2026-02-13T14:52:46Z |
| suse-su-2026:0508-1 | Security update for curl | 2026-02-13T14:50:33Z | 2026-02-13T14:50:33Z |
| suse-su-2026:0506-1 | Security update for cargo-auditable | 2026-02-13T14:32:17Z | 2026-02-13T14:32:17Z |
| suse-su-2026:0505-1 | Security update for cargo-auditable | 2026-02-13T14:31:50Z | 2026-02-13T14:31:50Z |
| suse-su-2026:0504-1 | Security update for java-1_8_0-openjdk | 2026-02-13T14:24:00Z | 2026-02-13T14:24:00Z |
| suse-su-2026:0503-1 | Security update for ImageMagick | 2026-02-13T14:23:00Z | 2026-02-13T14:23:00Z |
| suse-su-2026:0480-1 | Security update for helm | 2026-02-12T15:35:07Z | 2026-02-12T15:35:07Z |
| suse-su-2026:0479-1 | Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container, virt-synchronization-controller-container | 2026-02-12T15:34:08Z | 2026-02-12T15:34:08Z |
| suse-su-2026:0450-1 | Security update for munge | 2026-02-11T15:46:23Z | 2026-02-11T15:46:23Z |
| suse-su-2026:0449-1 | Security update for freerdp2 | 2026-02-11T14:53:55Z | 2026-02-11T14:53:55Z |
| suse-su-2026:0448-1 | Security update for munge | 2026-02-11T14:51:56Z | 2026-02-11T14:51:56Z |
| suse-su-2026:0447-1 | Security update for the Linux Kernel | 2026-02-11T14:05:07Z | 2026-02-11T14:05:07Z |
| suse-su-2026:0421-1 | Security update for freerdp | 2026-02-10T15:28:56Z | 2026-02-10T15:28:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20181-1 | Security update for cockpit-subscriptions | 2026-02-06T02:48:38Z | 2026-02-06T02:48:38Z |
| opensuse-su-2026:10146-1 | libpainter0-0.9.27-1.1 on GA media | 2026-02-04T00:00:00Z | 2026-02-04T00:00:00Z |
| opensuse-su-2026:10145-1 | python312-Django6-6.0.2-1.1 on GA media | 2026-02-04T00:00:00Z | 2026-02-04T00:00:00Z |
| opensuse-su-2026:10144-1 | expat-2.7.4-1.1 on GA media | 2026-02-04T00:00:00Z | 2026-02-04T00:00:00Z |
| opensuse-su-2026:20167-1 | Security update for xrdp | 2026-02-03T15:00:07Z | 2026-02-03T15:00:07Z |
| opensuse-su-2026:10143-1 | traefik2-2.11.35-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10142-1 | traefik-3.6.7-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10141-1 | rizin-0.8.2-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10140-1 | patch-2.8-2.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10139-1 | libsoup-3_0-0-3.6.5-12.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10138-1 | java-25-openj9-25.0.2.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10137-1 | java-21-openj9-21.0.10.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10136-1 | java-1_8_0-openjdk-1.8.0.482-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10135-1 | java-1_8_0-openj9-1.8.0.482-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10134-1 | java-17-openj9-17.0.18.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10133-1 | java-11-openj9-11.0.30.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10132-1 | freerdp-3.22.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:20156-1 | Security update for chromium | 2026-02-02T17:20:43Z | 2026-02-02T17:20:43Z |
| opensuse-su-2026:20152-1 | Security update for openssl-3 | 2026-02-02T13:00:02Z | 2026-02-02T13:00:02Z |
| opensuse-su-2026:20151-1 | Security update for wireshark | 2026-02-02T12:56:02Z | 2026-02-02T12:56:02Z |
| opensuse-su-2026:20150-1 | Security update for glib2 | 2026-02-02T12:41:24Z | 2026-02-02T12:41:24Z |
| opensuse-su-2026:20145-1 | Security update for the Linux Kernel | 2026-02-02T11:54:26Z | 2026-02-02T11:54:26Z |
| opensuse-su-2026:20148-1 | Security update for dpdk | 2026-02-02T11:12:33Z | 2026-02-02T11:12:33Z |
| opensuse-su-2026:20147-1 | Security update for python-wheel | 2026-02-02T09:49:12Z | 2026-02-02T09:49:12Z |
| opensuse-su-2026:10131-1 | trivy-0.69.0-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10130-1 | python311-PyNaCl-1.6.2-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10129-1 | libmlt++-7-7-7.36.1-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10128-1 | MozillaThunderbird-140.7.1-1.1 on GA media | 2026-01-31T00:00:00Z | 2026-01-31T00:00:00Z |
| opensuse-su-2026:20144-1 | Security update for python-filelock | 2026-01-30T21:24:37Z | 2026-01-30T21:24:37Z |
| opensuse-su-2026:20143-1 | Security update for java-25-openjdk | 2026-01-30T15:55:47Z | 2026-01-30T15:55:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2024-345-02 | Harmony HMI and Pro-face HMI products | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-345-01 | PowerChute Serial Shutdown | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-317-04 | EcoStruxure™ IT Gateway | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-02 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-01 | PowerLogic PM5300 Series | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2021-159-02 | PowerLogic PM5500 and PowerLogic PM8ECC | 2021-06-08T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-282-08 | EcoStruxure EV Charging Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-07 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-06 | Zelio Soft 2 | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-04 | EVlink Home Smart and Schneider Charge | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-03 | Easergy Studio | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-02 | Harmony iPC – HMIBSC IIoT Edge Box Core | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-01 | Data Center Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2022-102-02 | Modicon M340 Controller and Communication Modules | 2022-04-12T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-254-02 | EcoStruxure™ Power Monitoring Expert and EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation with Advanced Reporting and Dashboards | 2024-09-10T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2024-163-02 | PowerLogic P5 | 2024-06-11T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-073-01 | EcoStruxure™ Power Monitoring Expert | 2023-03-14T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-192-02 | EcoStruxure™ OPC UA Server Expert | 2023-07-11T07:01:56.000Z | 2024-08-13T07:00:00.000Z |
| sevd-2024-226-02 | EcoStruxure™ Machine SCADA Expert / BLUE Open Studio | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-226-01 | Accutech Manager | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-101-05 | Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-04-11T09:46:26.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-06 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 CPU Safety | 2023-01-10T15:17:09.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-05 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-01-10T15:41:57.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-04 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-02 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, and Modicon Controllers M580 and M340 | 2022-08-09T10:58:35.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-222-04 | Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert | 2021-08-10T02:27:39.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-194-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340 | 2021-07-13T08:22:02.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2019-281-02 | Modicon Controllers | 2019-09-26T12:53:28.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2018-081-01 | Embedded FTP Servers for Modicon PAC Controllers | 2018-03-22T03:39:21.000Z | 2024-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-pillow-2026-25990 | Pillow has an out-of-bounds write when loading PSD images | 2026-02-16T16:02:06.871Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1458 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-02-16T16:31:06.973Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1456 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-02-16T16:31:05.146Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1282 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab | 2026-02-16T16:31:03.017Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1094 | Improper Validation of Unsafe Equivalence in Input in GitLab | 2026-02-16T16:30:59.417Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-0958 | Interpretation Conflict in GitLab | 2026-02-16T16:30:57.233Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-0595 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-02-16T16:30:53.679Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-8099 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-02-16T16:30:40.312Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-7659 | Origin Validation Error in GitLab | 2026-02-16T16:30:29.449Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-14594 | Authorization Bypass Through User-Controlled Key in GitLab | 2026-02-16T16:28:35.547Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-14592 | Missing Authorization in GitLab | 2026-02-16T16:28:33.785Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-14560 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-02-16T16:28:32.048Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-12073 | Server-Side Request Forgery (SSRF) in GitLab | 2026-02-16T16:27:53.661Z | 2026-02-16T16:32:40.318Z |
| bit-dotnet-2026-21218 | .NET Spoofing Vulnerability | 2026-02-16T15:58:16.593Z | 2026-02-16T16:32:40.318Z |
| bit-moodle-2025-67857 | Moodle: moodle: data exposure of user identifiers in urls | 2026-02-12T08:51:13.591Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67856 | Moodle: moodle: privilege escalation via incomplete role checks in badge awarding | 2026-02-12T08:51:12.105Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67855 | Mooodle: mooodle: information disclosure and script execution via reflected cross-site scripting | 2026-02-12T08:51:10.563Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67853 | Moodle: moodle: brute-force facilitation due to missing rate limiting in confirmation email service | 2026-02-12T08:51:08.996Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67852 | Moodle: moodle: open redirect vulnerability in oauth login flow allows redirection to malicious sites. | 2026-02-12T08:51:07.525Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67851 | Moodle: moodle: formula injection allows arbitrary formula execution via unescaped data export | 2026-02-12T08:51:05.950Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67850 | Moodle: moodle: cross-site scripting vulnerability via inadequate input filtering in formula editor | 2026-02-12T08:51:04.289Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67849 | Moodle: moodle: cross-site scripting (xss) via improper sanitization of ai prompt responses | 2026-02-12T08:51:02.532Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67848 | Moodle: moodle: authentication bypass via lti provider allows suspended users to gain unauthorized access. | 2026-02-12T08:51:00.880Z | 2026-02-12T09:10:24.600Z |
| bit-airflow-2026-24098 | Apache Airflow: Assigning single DAG permission leaked all DAGs Import Errors | 2026-02-12T08:39:03.920Z | 2026-02-12T09:10:24.600Z |
| bit-airflow-2026-22922 | Apache Airflow: Airflow externalLogUrl Permission Bypass | 2026-02-12T08:39:02.281Z | 2026-02-12T09:10:24.600Z |
| bit-wildfly-2025-23367 | Org.wildfly.core:wildfly-server: wildfly improper rbac permission | 2025-10-15T08:51:55.776Z | 2026-02-11T09:09:18.507Z |
| bit-varnish-2023-44487 | 2024-03-06T11:07:44.095Z | 2026-02-11T09:09:18.507Z | |
| bit-valkey-2025-49112 | 2025-10-16T09:19:52.847Z | 2026-02-11T09:09:18.507Z | |
| bit-valkey-2025-21605 | Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client | 2025-04-25T07:27:01.789Z | 2026-02-11T09:09:18.507Z |
| bit-valkey-2024-51741 | Redis allows denial-of-service due to malformed ACL selectors | 2025-01-08T07:22:23.019Z | 2026-02-11T09:09:18.507Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-qn16013 | Cancelling a query (e | 2026-02-03T16:02:29.512503Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-nb26505 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 4.5.1-r0 | 2026-02-03T16:02:27.744077Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-my73913 | Security fixes for GHSA-r6j8-c6r2-37rr applied in versions: 4.12.1-r0 | 2026-02-03T16:02:28.659120Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-fc21713 | Cancelling a query (e | 2026-02-03T16:02:29.570272Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-cc08655 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 0.8.4-r0 | 2026-02-03T00:36:29.405423Z | 2026-02-02T12:32:10Z |
| cleanstart-2026-am95501 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-02-03T00:37:00.849369Z | 2026-02-02T12:32:10Z |
| cleanstart-2026-zz61324 | Hunspell 1 | 2026-01-30T17:14:26.562334Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zr62045 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-01-30T16:56:56.696859Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zp68963 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:47:54.288582Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zo91195 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:30:24.594235Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zc18474 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-01-30T17:04:56.559720Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yt18139 | issue was discovered in libexpat before 2 | 2026-01-30T17:26:57.202658Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ys66739 | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3 | 2026-01-30T15:00:53.250874Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ym75307 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:34:22.430652Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ym28538 | Prometheus Blackbox Exporter through 0 | 2026-01-30T14:06:20.601766Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yl27116 | tar | 2026-01-30T14:08:51.064236Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk82785 | Within HostnameError | 2026-01-30T14:01:20.108833Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk54840 | Within HostnameError | 2026-01-30T16:30:55.324232Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yj61997 | Cancelling a query (e | 2026-01-30T14:59:52.788649Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yd87381 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:55.178631Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yd51202 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:23.124967Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yc48827 | Within HostnameError | 2026-01-30T15:56:24.532632Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yb44027 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T17:04:26.396860Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xz45798 | Within HostnameError | 2026-01-30T14:05:20.961893Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xx70537 | Cancelling a query (e | 2026-01-30T15:32:24.053481Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xs24366 | Cancelling a query (e | 2026-01-30T15:00:52.862887Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr85161 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.934169Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr17407 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.270681Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xp58111 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:18:55.480183Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xp03839 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:14:55.099611Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2025-085 | 2025-07-02T17:37:03.000Z | 2025-07-02T17:37:03.000Z | |
| drupal-contrib-2025-081 | 2025-06-25T18:42:06.000Z | 2025-06-26T18:17:29.000Z | |
| drupal-contrib-2025-084 | 2025-06-25T18:43:00.000Z | 2025-06-25T18:43:00.000Z | |
| drupal-contrib-2025-083 | 2025-06-25T18:42:38.000Z | 2025-06-25T18:42:38.000Z | |
| drupal-contrib-2025-082 | 2025-06-25T18:42:17.000Z | 2025-06-25T18:42:17.000Z | |
| drupal-contrib-2025-080 | 2025-06-25T18:41:56.000Z | 2025-06-25T18:41:56.000Z | |
| drupal-contrib-2025-079 | 2025-06-25T18:41:34.000Z | 2025-06-25T18:41:34.000Z | |
| drupal-contrib-2025-078 | 2025-06-25T18:41:20.000Z | 2025-06-25T18:41:20.000Z | |
| drupal-contrib-2025-077 | 2025-06-25T18:41:06.000Z | 2025-06-25T18:41:06.000Z | |
| drupal-contrib-2025-001 | 2025-01-08T17:22:11.000Z | 2025-06-19T22:05:09.000Z | |
| drupal-contrib-2025-004 | 2025-01-22T16:50:12.000Z | 2025-05-29T18:26:44.000Z | |
| drupal-contrib-2025-034 | 2025-04-16T16:24:49.000Z | 2025-05-29T18:24:01.000Z | |
| drupal-contrib-2025-041 | 2025-04-23T16:58:39.000Z | 2025-05-29T18:23:44.000Z | |
| drupal-contrib-2025-048 | 2025-05-07T17:06:26.000Z | 2025-05-29T18:20:11.000Z | |
| drupal-contrib-2025-049 | 2025-05-07T17:06:36.000Z | 2025-05-29T18:20:00.000Z | |
| drupal-contrib-2025-050 | 2025-05-07T17:06:52.000Z | 2025-05-29T18:19:50.000Z | |
| drupal-contrib-2025-051 | 2025-05-07T17:07:03.000Z | 2025-05-29T18:19:36.000Z | |
| drupal-contrib-2025-058 | 2025-05-14T18:04:44.000Z | 2025-05-29T18:19:12.000Z | |
| drupal-contrib-2025-059 | 2025-05-14T18:04:52.000Z | 2025-05-29T18:18:54.000Z | |
| drupal-contrib-2025-069 | 2025-05-21T17:29:25.000Z | 2025-05-29T18:17:38.000Z | |
| drupal-contrib-2025-070 | 2025-05-28T17:41:20.000Z | 2025-05-29T18:17:25.000Z | |
| drupal-contrib-2025-071 | 2025-05-28T17:43:23.000Z | 2025-05-29T18:17:12.000Z | |
| drupal-contrib-2025-072 | 2025-05-28T17:43:44.000Z | 2025-05-29T18:16:59.000Z | |
| drupal-contrib-2025-073 | 2025-05-28T17:44:12.000Z | 2025-05-29T18:16:49.000Z | |
| drupal-contrib-2025-074 | 2025-05-28T17:44:33.000Z | 2025-05-29T18:16:36.000Z | |
| drupal-contrib-2025-075 | 2025-05-28T17:45:37.000Z | 2025-05-29T18:16:19.000Z | |
| drupal-contrib-2025-076 | 2025-05-28T17:46:09.000Z | 2025-05-29T18:15:56.000Z | |
| drupal-contrib-2025-068 | 2025-05-21T17:29:14.000Z | 2025-05-21T17:29:14.000Z | |
| drupal-contrib-2025-067 | 2025-05-21T17:28:55.000Z | 2025-05-21T17:28:55.000Z | |
| drupal-contrib-2025-066 | 2025-05-21T17:28:47.000Z | 2025-05-21T17:28:47.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-10663 | IBM Concert代码问题漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10662 | IBM Concert信息泄露漏洞(CNVD-2026-10662) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10661 | IBM Concert信息泄露漏洞(CNVD-2026-10661) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10660 | IBM ApplinX数据伪造问题漏洞 | 2026-01-26 | 2026-02-10 |
| cnvd-2026-10656 | IBM ApplinX跨站请求伪造漏洞(CNVD-2026-10656) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10655 | IBM ApplinX跨站脚本漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10654 | IBM ApplinX未授权访问漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10653 | IBM ApplinX信息泄露漏洞(CNVD-2026-10653) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10652 | Google Chrome代码执行漏洞(CNVD-2026-10652) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10651 | Google SentencePiece缓冲区溢出漏洞 | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10650 | Google Go代码执行漏洞(CNVD-2026-10650) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10649 | Google Go拒绝服务漏洞(CNVD-2026-10649) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10648 | Google Go代码执行漏洞 | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10647 | Google Go拒绝服务漏洞(CNVD-2026-10647) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10646 | Google Go信息泄露漏洞(CNVD-2026-10646) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10645 | Google Chrome信息泄露漏洞(CNVD-2026-10645) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10644 | Google Android权限提升漏洞(CNVD-2026-10644) | 2025-09-08 | 2026-02-09 |
| cnvd-2026-10643 | Google Android权限提升漏洞(CNVD-2026-10643) | 2025-09-04 | 2026-02-09 |
| cnvd-2026-10642 | Google Android权限提升漏洞(CNVD-2026-10642) | 2025-09-04 | 2026-02-09 |
| cnvd-2026-10641 | Google Android信息泄露漏洞(CNVD-2026-10641) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10640 | D-Link DNS-343 ShareCenter命令执行漏洞 | 2025-11-05 | 2026-02-09 |
| cnvd-2026-10639 | D-Link DI-8200G命令注入漏洞 | 2026-01-19 | 2026-02-09 |
| cnvd-2026-10638 | Tenda AX1803缓冲区溢出漏洞(CNVD-2026-10638) | 2026-01-30 | 2026-02-09 |
| cnvd-2026-06416 | 深圳市广联智通科技有限公司AR300M16路由器存在命令执行漏洞(CNVD-C-2025-1171570) | 2025-12-24 | 2026-02-07 |
| cnvd-2026-10344 | Siemens RUGGEDCOM输入验证错误漏洞 | 2025-12-15 | 2026-02-06 |
| cnvd-2026-10341 | Rockwell Automation FactoryTalk Services Platform授权问题漏洞 | 2023-06-19 | 2026-02-06 |
| cnvd-2026-10328 | Google Pixel gxp_fence_manager.cc文件输入验证错误漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10327 | Google Pixel aoc_ipc_core.c文件输入验证错误漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10326 | Google Pixel授权问题漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10325 | Google Pixel protocolpsadapter.cpp文件缓冲区溢出漏洞 | 2025-12-18 | 2026-02-06 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0162 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0161 | Vulnérabilité dans Tenable Nessus Agent | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0144 | Multiples vulnérabilités dans Ivanti Endpoint Manager | 2026-02-11T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0160 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0159 | Multiples vulnérabilités dans Keycloak | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0158 | Multiples vulnérabilités dans les produits Apple | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0157 | Multiples vulnérabilités dans les produits Qnap | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0156 | Multiples vulnérabilités dans Google Chrome | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0154 | Vulnérabilité dans Traefik | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0153 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0152 | Multiples vulnérabilités dans Microsoft Azure | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0151 | Vulnérabilité dans Microsoft .Net | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0150 | Multiples vulnérabilités dans Microsoft Windows | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0149 | Multiples vulnérabilités dans Microsoft Office | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0148 | Multiples vulnérabilités dans les produits Intel | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0147 | Multiples vulnérabilités dans les produits Fortinet | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0146 | Multiples vulnérabilités dans GitLab | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0145 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0143 | Multiples vulnérabilités dans Synology Storage Manager | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0142 | Multiples vulnérabilités dans MongoDB | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0141 | Multiples vulnérabilités dans les produits SAP | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-ale-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-ale-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| certfr-2021-ale-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-ale-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| certfr-2021-ale-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| certfr-2021-ale-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2020-ale-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2021-ale-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| certfr-2020-ale-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| certfr-2020-ale-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| certfr-2020-ale-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |