Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-28426 |
8.7 (3.1)
|
Statamic vulnerable to privilege escalation via stored… |
statamic |
cms |
2026-02-27T22:23:42.660Z | 2026-02-27T22:23:42.660Z |
| CVE-2026-28425 |
8 (3.1)
|
Statamic vulnerable to remote code execution via Antle… |
statamic |
cms |
2026-02-27T22:20:39.735Z | 2026-02-27T22:20:39.735Z |
| CVE-2026-2647 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-27T22:19:25.559Z | |
| CVE-2026-27759 |
5.3 (4.0)
|
Featured Image from Content < 1.7 Authenticated SSRF v… |
Dhrumil Kumbhani |
Featured Image from Content |
2026-02-27T22:17:11.669Z | 2026-02-27T22:17:11.669Z |
| CVE-2026-28424 |
6.5 (3.1)
|
Statamic's missing authorization allows access to emai… |
statamic |
cms |
2026-02-27T22:14:01.779Z | 2026-02-27T22:14:01.779Z |
| CVE-2026-28517 |
9.3 (4.0)
|
openDCIM <= 23.04 OS Command Injection via dot Configu… |
openDCIM |
openDCIM |
2026-02-27T22:12:08.889Z | 2026-02-27T22:12:08.889Z |
| CVE-2026-28423 |
6.8 (3.1)
|
Statamic Vulnerable to Server-Side Request Forgery via Glide |
statamic |
cms |
2026-02-27T22:11:55.802Z | 2026-02-27T22:11:55.802Z |
| CVE-2026-28516 |
9.3 (4.0)
|
openDCIM <= 23.04 SQL Injection in Config::UpdateParameter |
openDCIM |
openDCIM |
2026-02-27T22:11:52.246Z | 2026-02-27T22:11:52.246Z |
| CVE-2026-28515 |
9.3 (4.0)
|
openDCIM <= 23.04 Missing Authorization in install.php |
openDCIM |
openDCIM |
2026-02-27T22:11:37.303Z | 2026-02-27T22:11:37.303Z |
| CVE-2026-28411 |
9.8 (3.1)
|
WeGIA Vulnerable to Authentication Bypass via `extract… |
LabRedesCefetRJ |
WeGIA |
2026-02-27T21:52:05.032Z | 2026-02-27T21:52:05.032Z |
| CVE-2026-28409 |
10 (3.1)
|
WeGIA Vulnerable to Remote Code Execution (RCE) via OS… |
LabRedesCefetRJ |
WeGIA |
2026-02-27T21:50:21.849Z | 2026-02-27T21:50:21.849Z |
| CVE-2026-28408 |
9.8 (3.1)
|
WeGIA lacks authentication verification in adicionar_t… |
LabRedesCefetRJ |
WeGIA |
2026-02-27T21:49:14.747Z | 2026-02-27T21:49:14.747Z |
| CVE-2026-28416 |
8.2 (3.1)
|
Gradio has SSRF via Malicious `proxy_url` Injection in… |
gradio-app |
gradio |
2026-02-27T21:47:04.975Z | 2026-02-27T21:47:04.975Z |
| CVE-2025-15579 |
9.5 (4.0)
|
An Insecure Deserialization vulnerability has been dis… |
OpenText™ |
Directory Services |
2026-02-18T14:57:04.010Z | 2026-02-27T21:46:44.623Z |
| CVE-2026-28415 |
4.3 (3.1)
|
Gradio has Open Redirect in OAuth Flow |
gradio-app |
gradio |
2026-02-27T21:44:51.956Z | 2026-02-27T21:44:51.956Z |
| CVE-2026-28414 |
7.5 (3.1)
|
Gradio has Absolute Path Traversal on Windows with Pyt… |
gradio-app |
gradio |
2026-02-27T21:43:28.453Z | 2026-02-27T21:43:28.453Z |
| CVE-2026-27167 |
0 (3.1)
|
Gradio: Mocked OAuth Login Exposes Server Credentials … |
gradio-app |
gradio |
2026-02-27T21:40:57.917Z | 2026-02-27T21:40:57.917Z |
| CVE-2026-27939 |
8.8 (3.1)
|
Statamic allows Authenticated Control Panel users to e… |
statamic |
cms |
2026-02-27T21:34:39.107Z | 2026-02-27T21:34:39.107Z |
| CVE-2026-28407 |
6.9 (4.0)
|
malcontent's nested archive extraction failure can dro… |
chainguard-dev |
malcontent |
2026-02-27T21:28:06.258Z | 2026-02-27T21:28:06.258Z |
| CVE-2020-37167 |
8.6 (4.0)
8.4 (3.1)
|
ClamAV ClamBC < 0.103.0-rc - 'ClamBC' Executable Regul… |
ClamAV |
ClamBC |
2026-02-12T22:48:50.169Z | 2026-02-27T21:23:18.537Z |
| CVE-2026-28406 |
8.2 (3.1)
|
kaniko has tar archive path traversal in build context… |
chainguard-forks |
kaniko |
2026-02-27T21:20:52.764Z | 2026-02-27T21:20:52.764Z |
| CVE-2026-28402 |
7.1 (3.1)
|
nimiq/core-rs-albatross's nimiq-blockchain missing pro… |
nimiq |
core-rs-albatross |
2026-02-27T21:08:53.573Z | 2026-02-27T21:08:53.573Z |
| CVE-2024-3727 |
8.3 (3.1)
|
Containers/image: digest type does not guarantee valid type |
|
|
2024-05-09T14:57:21.327Z | 2026-02-27T21:07:30.936Z |
| CVE-2026-28400 |
7.6 (3.1)
|
Docker Model Runner Unauthenticated Runtime Flag Injec… |
docker |
model-runner |
2026-02-27T21:06:12.418Z | 2026-02-27T21:06:12.418Z |
| CVE-2026-28355 |
1.3 (4.0)
|
"PWA" Canarytoken Vulnerable to Stored Self Cross-Site… |
thinkst |
canarytokens |
2026-02-27T21:04:13.445Z | 2026-02-27T21:04:13.445Z |
| CVE-2026-28352 |
6.5 (3.1)
|
Indico missing access check in event series management API |
indico |
indico |
2026-02-27T21:01:45.740Z | 2026-02-27T21:01:45.740Z |
| CVE-2026-28351 |
6.9 (4.0)
|
Manipulated RunLengthDecode streams can exhaust RAM |
py-pdf |
pypdf |
2026-02-27T20:59:16.839Z | 2026-02-27T20:59:16.839Z |
| CVE-2026-27593 |
9.3 (3.1)
|
Statamic is vulnerable to account takeover via passwor… |
statamic |
cms |
2026-02-24T21:38:17.354Z | 2026-02-27T20:56:07.561Z |
| CVE-2026-2634 |
9.8 (3.1)
|
Spoofed web content presented under trusted domains us… |
Mozilla |
Firefox for iOS |
2026-02-24T13:33:24.725Z | 2026-02-27T20:55:35.483Z |
| CVE-2026-27572 |
6.9 (4.0)
|
Wasmtime can panic when adding excessive fields to a `… |
bytecodealliance |
wasmtime |
2026-02-24T21:31:50.186Z | 2026-02-27T20:55:29.879Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-0752 |
8 (3.1)
|
Improper Neutralization of Input During Web Page Gener… |
GitLab |
GitLab |
2026-02-25T20:05:19.818Z | 2026-02-26T14:44:05.136Z |
| CVE-2025-14511 |
7.5 (3.1)
|
Improper Validation of Specified Quantity in Input in GitLab |
GitLab |
GitLab |
2026-02-25T20:05:24.799Z | 2026-02-26T15:57:25.416Z |
| CVE-2026-3221 |
4.9 (3.1)
|
Sensitive user account information is not encryp… |
Devolutions |
Server |
2026-02-25T18:29:11.939Z | 2026-02-26T16:03:04.217Z |
| CVE-2026-25476 |
7.5 (3.1)
|
OpenEMR has Session Timeout Bypass via skip_timeout_reset |
openemr |
openemr |
2026-02-25T18:28:29.881Z | 2026-02-26T16:04:10.627Z |
| CVE-2026-2532 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
lintsinghua DeepAudit IP Address embedding_config.py s… |
lintsinghua |
DeepAudit |
2026-02-16T03:02:09.038Z | 2026-02-23T10:04:56.694Z |
| CVE-2026-1979 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
mruby JMPNOT-to-JMPIF Optimization vm.c mrb_vm_exec us… |
n/a |
mruby |
2026-02-06T04:32:09.200Z | 2026-02-23T09:21:06.088Z |
| CVE-2026-25729 |
2.1 (4.0)
|
DeepAudit Affected by User Enumeration via Broken Acce… |
lintsinghua |
DeepAudit |
2026-02-06T20:30:17.112Z | 2026-02-06T20:50:17.216Z |
| CVE-2026-25804 |
8 (4.0)
|
Antrea has invalid enforcement order for network polic… |
antrea-io |
antrea |
2026-02-06T22:58:35.041Z | 2026-02-09T15:25:44.301Z |
| CVE-2025-15564 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
Mapnik value.cpp operator divide by zero |
n/a |
Mapnik |
2026-02-07T21:32:07.437Z | 2026-02-23T09:21:21.123Z |
| CVE-2025-66630 |
9.2 (4.0)
|
Fiber insecurely fallsback in utils.UUIDv4() / utils.U… |
gofiber |
fiber |
2026-02-09T18:04:47.713Z | 2026-02-10T16:02:43.238Z |
| CVE-2026-25598 |
6.3 (4.0)
|
Bypassing Logging of Outbound Connections Using sendto… |
step-security |
harden-runner |
2026-02-09T18:58:57.074Z | 2026-02-10T16:00:59.966Z |
| CVE-2026-25761 |
8.8 (3.1)
|
Command injection via crafted filenames in Super-linte… |
super-linter |
super-linter |
2026-02-09T20:27:01.887Z | 2026-02-10T15:59:33.745Z |
| CVE-2026-25878 |
6.9 (4.0)
|
FroshAdminer Adminer UI is accessible without admin session |
FriendsOfShopware |
FroshPlatformAdminer |
2026-02-09T20:53:23.818Z | 2026-02-10T15:58:56.777Z |
| CVE-2026-25808 |
7.5 (3.1)
|
Hollo DMs get leaked and can be seen on Webfinger Browser |
fedify-dev |
hollo |
2026-02-09T21:50:10.579Z | 2026-02-10T21:23:34.888Z |
| CVE-2026-25918 |
5.9 (4.0)
|
unity-cli Exposes Plaintext Credentials in Debug Logs … |
RageAgainstThePixel |
unity-cli |
2026-02-09T21:29:55.970Z | 2026-02-10T15:57:40.799Z |
| CVE-2026-25925 |
7.8 (3.1)
|
PowerDocu Affected by Remote Code Execution via Insecu… |
modery |
PowerDocu |
2026-02-09T21:59:08.335Z | 2026-02-11T21:22:45.286Z |
| CVE-2025-11142 |
7.1 (3.1)
|
The VAPIX API mediaclip.cgi that did not have a s… |
Axis Communications AB |
AXIS OS |
2026-02-10T05:32:19.555Z | 2026-02-26T15:04:12.975Z |
| CVE-2026-26338 |
6.9 (4.0)
6.5 (3.1)
|
Hyland Alfresco Transformation Service SSRF |
Hyland |
Alfresco Transformation Service (Enterprise) |
2026-02-19T17:03:23.521Z | 2026-02-20T19:11:04.416Z |
| CVE-2026-26339 |
9.3 (4.0)
9.8 (3.1)
|
Hyland Alfresco Transformation Service Argument Inject… |
Hyland |
Alfresco Transformation Service (Enterprise) |
2026-02-19T17:04:46.617Z | 2026-02-20T20:31:03.964Z |
| CVE-2025-13671 |
5.9 (4.0)
|
Cross Site request forgery vulnerability discovered in… |
OpenText™ |
Web Site Management Server |
2026-02-19T22:36:49.083Z | 2026-02-24T14:39:58.281Z |
| CVE-2025-13672 |
7 (4.0)
|
Reflected Cross-Site Scripting discovered in OpenText … |
OpenText™ |
Web Site Management Server |
2026-02-19T22:36:33.467Z | 2026-02-24T14:42:46.727Z |
| CVE-2025-8054 |
7.1 (4.0)
|
Path Traversal vulnerability have been discovered in O… |
OpenText™ |
XM Fax |
2026-02-19T22:21:22.483Z | 2026-02-23T18:14:02.775Z |
| CVE-2025-8055 |
5.3 (4.0)
|
SSRF vulnerability have been discovered in OpenText™ XM Fax |
OpenText™ |
XM Fax |
2026-02-19T22:21:06.831Z | 2026-02-23T18:12:27.145Z |
| CVE-2025-9208 |
7.5 (4.0)
|
Stored-XSS vulnerability discovered in OpenText WSM Ma… |
OpenText™ |
Web Site Management Server |
2026-02-19T22:37:19.208Z | 2026-02-24T14:34:34.043Z |
| CVE-2026-1292 |
6.5 (3.1)
|
Tanium addressed an insertion of sensitive information… |
Tanium |
Trends |
2026-02-19T23:10:23.372Z | 2026-02-19T23:10:23.372Z |
| CVE-2026-2350 |
6.5 (3.1)
|
Tanium addressed an insertion of sensitive information… |
Tanium |
Interact |
2026-02-19T23:10:33.951Z | 2026-02-19T23:14:23.480Z |
| CVE-2026-2647 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-27T22:19:25.559Z | |
| CVE-2026-28517 |
9.3 (4.0)
|
openDCIM <= 23.04 OS Command Injection via dot Configu… |
openDCIM |
openDCIM |
2026-02-27T22:12:08.889Z | 2026-02-27T22:12:08.889Z |
| CVE-2026-28516 |
9.3 (4.0)
|
openDCIM <= 23.04 SQL Injection in Config::UpdateParameter |
openDCIM |
openDCIM |
2026-02-27T22:11:52.246Z | 2026-02-27T22:11:52.246Z |
| CVE-2026-28515 |
9.3 (4.0)
|
openDCIM <= 23.04 Missing Authorization in install.php |
openDCIM |
openDCIM |
2026-02-27T22:11:37.303Z | 2026-02-27T22:11:37.303Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-0752 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.2 before 18.7.5, 18.8… | 2026-02-25T21:16:36.330 | 2026-02-28T00:44:58.627 |
| fkie_cve-2025-14511 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 12.2 before 18.7.5, 18.8… | 2026-02-25T21:16:30.453 | 2026-02-28T00:44:30.647 |
| fkie_cve-2026-3221 | Sensitive user account information is not encrypted in the database in Devolutions Server 2025.3.1… | 2026-02-25T19:43:26.530 | 2026-02-28T00:43:23.320 |
| fkie_cve-2026-25476 | OpenEMR is a free and open source electronic health records and medical practice management applica… | 2026-02-25T19:43:22.157 | 2026-02-28T00:42:46.193 |
| fkie_cve-2026-2532 | A vulnerability was detected in lintsinghua DeepAudit up to 3.0.3. This issue affects some unknown … | 2026-02-16T04:15:52.093 | 2026-02-28T00:38:08.223 |
| fkie_cve-2026-1979 | A flaw has been found in mruby up to 3.4.0. This affects the function mrb_vm_exec of the file src/v… | 2026-02-06T05:16:12.667 | 2026-02-28T00:33:39.090 |
| fkie_cve-2026-25729 | DeepAudit is a multi-agent system for code vulnerability discovery. In 3.0.4 and earlier, there is … | 2026-02-06T21:16:19.313 | 2026-02-28T00:31:36.967 |
| fkie_cve-2026-25804 | Antrea is a Kubernetes networking solution intended to be Kubernetes native. Prior to versions 2.3.… | 2026-02-06T23:15:55.123 | 2026-02-28T00:30:06.540 |
| fkie_cve-2025-15564 | A vulnerability has been found in Mapnik up to 4.2.0. This vulnerability affects the function mapni… | 2026-02-07T22:16:01.127 | 2026-02-28T00:27:08.120 |
| fkie_cve-2025-66630 | Fiber is an Express inspired web framework written in Go. Before 2.52.11, on Go versions prior to 1… | 2026-02-09T18:16:04.680 | 2026-02-28T00:26:20.080 |
| fkie_cve-2026-25598 | Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. Prior to… | 2026-02-09T20:15:58.653 | 2026-02-28T00:23:47.940 |
| fkie_cve-2026-25761 | Super-linter is a combination of multiple linters to run as a GitHub Action or standalone. From 6.0… | 2026-02-09T21:15:49.323 | 2026-02-28T00:21:30.757 |
| fkie_cve-2026-25878 | FroshAdminer is the Adminer plugin for Shopware Platform. Prior to 2.2.1, the Adminer route (/admin… | 2026-02-09T21:15:50.380 | 2026-02-28T00:18:44.953 |
| fkie_cve-2026-25808 | Hollo is a federated single-user microblogging software designed to be federated through ActivityPu… | 2026-02-09T22:16:02.440 | 2026-02-28T00:17:33.850 |
| fkie_cve-2026-25918 | unity-cli is a command line utility for the Unity Game Engine. Prior to 1.8.2 , the sign-package co… | 2026-02-09T22:16:04.177 | 2026-02-28T00:16:27.647 |
| fkie_cve-2026-25925 | PowerDocu contains a Windows GUI executable to perform technical documentations. Prior to 2.4.0, Po… | 2026-02-09T22:16:04.607 | 2026-02-28T00:13:57.360 |
| fkie_cve-2025-11142 | The VAPIX API mediaclip.cgi that did not have a sufficient input validation allowing for a possible… | 2026-02-10T06:15:52.430 | 2026-02-28T00:09:21.760 |
| fkie_cve-2026-26338 | Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve server-side requ… | 2026-02-19T18:24:59.930 | 2026-02-28T00:02:51.347 |
| fkie_cve-2026-26339 | Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve remote code exec… | 2026-02-19T18:25:00.133 | 2026-02-28T00:00:16.837 |
| fkie_cve-2025-13671 | Cross-Site Request Forgery (CSRF) vulnerability in OpenText™ Web Site Management Server allows Cros… | 2026-02-19T23:16:14.853 | 2026-02-27T23:56:23.997 |
| fkie_cve-2025-13672 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-19T23:16:15.090 | 2026-02-27T23:55:48.210 |
| fkie_cve-2025-8054 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Ope… | 2026-02-19T23:16:15.290 | 2026-02-27T23:54:16.233 |
| fkie_cve-2025-8055 | Server-Side Request Forgery (SSRF) vulnerability in OpenText™ XM Fax allows Server Side Request For… | 2026-02-19T23:16:15.483 | 2026-02-27T23:53:31.540 |
| fkie_cve-2025-9208 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-19T23:16:15.663 | 2026-02-27T23:49:59.073 |
| fkie_cve-2026-1292 | Tanium addressed an insertion of sensitive information into log file vulnerability in Trends. | 2026-02-20T00:16:14.520 | 2026-02-27T23:48:33.440 |
| fkie_cve-2026-2350 | Tanium addressed an insertion of sensitive information into log file vulnerability in Interact and TDS. | 2026-02-20T00:16:17.780 | 2026-02-27T23:48:19.057 |
| fkie_cve-2026-2647 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-27T23:16:06.543 | 2026-02-27T23:16:06.543 |
| fkie_cve-2026-28517 | openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in … | 2026-02-27T23:16:06.357 | 2026-02-27T23:16:06.357 |
| fkie_cve-2026-28516 | openDCIM version 23.04, through commit 4467e9c4, contains a SQL injection vulnerability in Config::… | 2026-02-27T23:16:06.180 | 2026-02-27T23:16:06.180 |
| fkie_cve-2026-28515 | openDCIM version 23.04, through commit 4467e9c4, contains a missing authorization vulnerability in … | 2026-02-27T23:16:05.960 | 2026-02-27T23:16:05.960 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-vpcf-gvg4-6qwr |
9.9 (3.1)
9.4 (4.0)
|
n8n: Expression Sandbox Escape Leads to RCE | 2026-02-25T22:05:09Z | 2026-02-27T21:51:58Z |
| ghsa-3ccg-x393-96v8 |
9.1 (3.1)
|
Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change | 2026-02-25T22:02:37Z | 2026-02-27T21:51:50Z |
| ghsa-x2mw-7j39-93xq |
8.5 (3.1)
9.0 (4.0)
|
n8n has Arbitrary Command Execution via File Write and Git Operations | 2026-02-25T21:54:19Z | 2026-02-27T21:51:38Z |
| ghsa-wxx7-mcgf-j869 |
9.9 (3.1)
9.4 (4.0)
|
n8n has Potential Remote Code Execution via Merge Node | 2026-02-25T21:23:30Z | 2026-02-27T21:51:29Z |
| ghsa-jjpj-p2wh-qf23 |
9.4 (4.0)
|
n8n has a Sandbox Escape in its JavaScript Task Runner | 2026-02-25T21:23:15Z | 2026-02-27T21:51:21Z |
| ghsa-mmgg-m5j7-f83h |
9.9 (3.1)
7.1 (4.0)
|
n8n has Arbitrary File Read via Python Code Node Sandbox Escape | 2026-02-25T21:22:39Z | 2026-02-27T21:51:13Z |
| ghsa-75g8-rv7v-32f7 |
9.0 (3.1)
9.5 (4.0)
|
n8n has Unauthenticated Expression Evaluation via Form Node | 2026-02-25T21:21:36Z | 2026-02-27T21:51:05Z |
| ghsa-4qgr-4h56-8895 |
6.1 (3.1)
|
Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module | 2026-02-25T22:01:25Z | 2026-02-27T21:50:55Z |
| ghsa-fq4f-4738-rqxm |
6.1 (3.1)
|
Rucio WebUI has a Stored Cross-site Scripting (XSS) Vulnerability in its Custom RSE Attribute | 2026-02-25T19:37:27Z | 2026-02-27T21:50:31Z |
| ghsa-8wpv-6x3f-3rm5 |
6.1 (3.1)
|
Rucio WebUI has a Stored Cross-site Scripting (XSS) vulnerability its Identity Name | 2026-02-25T19:29:37Z | 2026-02-27T21:50:24Z |
| ghsa-h9fp-p2p9-873q |
6.1 (3.1)
|
Rucio WebUI has Stored Cross-site Scripting (XSS) in RSE Metadata | 2026-02-25T19:29:22Z | 2026-02-27T21:50:14Z |
| ghsa-rwj9-7j48-9f7q |
7.3 (3.1)
|
Rucio WebUI Vulnerable to Stored Cross-site Scripting (XSS) through Custom Rule Function | 2026-02-25T18:58:20Z | 2026-02-27T21:50:07Z |
| ghsa-38wq-6q2w-hcf9 |
5.3 (3.1)
|
Rucio WebUI has Username Enumeration via Login Error Message | 2026-02-25T18:53:42Z | 2026-02-27T21:49:59Z |
| ghsa-h79m-5jjm-jm4q |
8.1 (3.1)
|
Rucio WebUI has a Reflected Cross-site Scripting Vulnerability | 2026-02-25T18:53:29Z | 2026-02-27T21:49:51Z |
| ghsa-gp2f-7wcm-5fhx |
7.0 (4.0)
|
Craft CMS has Cloud Metadata SSRF Protection Bypass via DNS Rebinding | 2026-02-23T22:16:01Z | 2026-02-27T21:49:23Z |
| ghsa-9fj4-3849-rv9g |
0.0 (3.1)
|
OpenKruise PodProbeMarker is Vulnerable to SSRF via Unrestricted Host Field | 2026-02-25T18:30:40Z | 2026-02-27T21:48:39Z |
| ghsa-5c9c-6x87-f9vm |
7.5 (3.1)
|
zstd vulnerable to buffer overrun | 2023-03-31T21:30:37Z | 2026-02-27T21:48:26Z |
| ghsa-2phg-qgmm-r638 |
7.7 (4.0)
|
Sliver has Potential Zip Bomb Denial of Service in GzipEncoder | 2026-02-25T17:36:44Z | 2026-02-27T21:46:08Z |
| ghsa-49gm-hh7w-wfvf |
9.9 (3.1)
|
OliveTin: OS Command Injection via `password` argument type and webhook JSON extraction bypasses sh… | 2026-02-25T16:18:22Z | 2026-02-27T21:45:19Z |
| ghsa-8vrh-3pm2-v4v6 |
6.5 (3.1)
7.1 (4.0)
|
FileBrowser Quantum: Password Protection Not Enforced on Shared File Links | 2026-02-25T16:00:49Z | 2026-02-27T21:42:54Z |
| ghsa-w6x6-9fp7-fqm4 |
7.1 (4.0)
|
New API has an SQL LIKE Wildcard Injection DoS via Token Search | 2026-02-23T21:56:47Z | 2026-02-27T21:42:31Z |
| ghsa-gx3x-vq4p-mhhv |
5.9 (3.1)
|
cert-manager-controller DoS via Specially Crafted DNS Response | 2026-02-02T22:11:06Z | 2026-02-27T21:41:50Z |
| ghsa-299v-8pq9-5gjq |
7.6 (3.1)
|
New API has Potential XSS in its MarkdownRenderer component | 2026-02-23T22:10:25Z | 2026-02-27T21:41:05Z |
| ghsa-9h8m-3fm2-qjrq |
7.0 (3.1)
|
OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking | 2026-02-02T20:07:46Z | 2026-02-27T21:39:46Z |
| ghsa-9442-gm4v-r222 |
7.5 (3.1)
8.7 (4.0)
|
Undertow's url-encoded request path information can be broken on ajp-listener | 2024-06-20T15:31:19Z | 2026-02-27T21:38:27Z |
| ghsa-c32p-wcqj-j677 |
7.1 (4.0)
|
CometBFT has inconsistencies between how commit signatures are verified and how block time is derived | 2026-01-23T16:56:23Z | 2026-02-27T21:37:55Z |
| ghsa-fcv2-xgw5-pqxf |
5.8 (3.1)
|
sigstore legacy TUF client allows for arbitrary file writes with target cache path traversal | 2026-01-22T20:28:56Z | 2026-02-27T21:37:24Z |
| ghsa-82g8-464f-2mv7 |
5.1 (4.0)
|
OpenClaw: Skill env override host env injection via applySkillConfigEnvOverrides (defense-in-depth) | 2026-02-27T21:36:17Z | 2026-02-27T21:36:17Z |
| ghsa-rw9x-pxqx-q789 |
8.8 (3.1)
|
Statamic allows Authenticated Control Panel users to escalate privileges via elevated session bypass | 2026-02-27T21:35:00Z | 2026-02-27T21:35:00Z |
| ghsa-7777-fhq9-592v |
2.1 (4.0)
|
ZITADEL has potential SSRF via Actions | 2026-02-27T21:33:54Z | 2026-02-27T21:33:54Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-111 |
9.1 (3.1)
|
A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langcha… | langchain | 2024-10-29T13:15:00Z | 2025-05-02T18:39:47.588215Z |
| pysec-2024-245 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated user… | apache-airflow | 2024-02-29T11:15:08+00:00 | 2025-05-01T21:22:38.598048+00:00 |
| pysec-2025-35 |
7.5 (3.1)
|
Weblate is a web based localization tool. Prior to version 5.11, when creating a new comp… | weblate | 2025-04-15T21:16:04+00:00 | 2025-04-30T17:22:51.467257+00:00 |
| pysec-2025-34 |
|
The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_… | picklescan | 2025-04-24T01:15:49+00:00 | 2025-04-24T03:08:15.436691+00:00 |
| pysec-2025-33 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the… | vyper | 2025-01-14T18:16:05+00:00 | 2025-04-23T21:23:01.322686+00:00 |
| pysec-2025-32 |
9.8 (3.1)
|
BentoML is a Python library for building online serving systems optimized for AI apps and… | bentoml | 2025-04-09T16:15:25+00:00 | 2025-04-22T19:21:34.073355+00:00 |
| pysec-2025-31 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statemen… | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.116292+00:00 |
| pysec-2025-30 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.064106+00:00 |
| pysec-2025-29 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.005382+00:00 |
| pysec-2025-28 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
| pysec-2025-27 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
| pysec-2025-26 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.645758+00:00 |
| pysec-2021-891 |
7.8 (3.1)
|
CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 S… | salt | 2021-03-03T10:15:13+00:00 | 2025-04-09T17:27:27.582884+00:00 |
| pysec-2025-25 |
6.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middle… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.532849+00:00 |
| pysec-2025-24 |
7.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the /api/remove… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.486485+00:00 |
| pysec-2025-23 |
|
Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Inform… | ray | 2025-03-06T05:15:16+00:00 | 2025-04-09T17:27:27.434099+00:00 |
| pysec-2022-43179 |
7.3 (3.1)
|
Poetry is a dependency manager for Python. To handle dependencies that come from a Git re… | poetry | 2022-09-07T19:15:08+00:00 | 2025-04-09T17:27:27.255151+00:00 |
| pysec-2025-22 |
9.8 (3.1)
|
A vulnerability, that could result in Remote Code Execution (RCE), has been found in Plot… | plotai | 2025-03-10T14:15:24+00:00 | 2025-04-09T17:27:27.203714+00:00 |
| pysec-2023-311 |
5.4 (3.1)
|
plone.namedfile allows users to handle `File` and `Image` fields targeting, but not depen… | plone-namedfile | 2023-09-21T15:15:10+00:00 | 2025-04-09T17:27:27.153848+00:00 |
| pysec-2025-21 |
9.8 (3.1)
|
picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model arch… | picklescan | 2025-03-10T12:15:12+00:00 | 2025-04-09T17:27:27.016747+00:00 |
| pysec-2025-20 |
6.5 (3.1)
|
picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes i… | picklescan | 2025-03-10T12:15:10+00:00 | 2025-04-09T17:27:26.966215+00:00 |
| pysec-2025-19 |
9.8 (3.1)
|
picklescan before 0.0.22 only considers standard pickle file extensions in the scope for … | picklescan | 2025-03-03T19:15:34+00:00 | 2025-04-09T17:27:26.916350+00:00 |
| pysec-2025-18 |
|
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craf… | picklescan | 2025-02-26T15:15:24+00:00 | 2025-04-09T17:27:26.867210+00:00 |
| pysec-2023-310 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NO… | mobsf | 2023-09-21T22:15:11+00:00 | 2025-04-09T17:27:26.663665+00:00 |
| pysec-2025-17 |
5.5 (3.1)
|
In mlflow/mlflow version 2.18, an admin is able to create a new user account without sett… | mlflow | 2025-03-20T10:15:54+00:00 | 2025-04-09T17:27:26.322333+00:00 |
| pysec-2023-309 |
8.8 (3.1)
|
Path Traversal in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-13T00:15:07+00:00 | 2025-04-09T17:27:26.271200+00:00 |
| pysec-2023-308 |
10.0 (3.1)
|
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0. | mlflow | 2023-07-19T01:15:10+00:00 | 2025-04-09T17:27:26.223213+00:00 |
| pysec-2025-16 |
7.5 (3.1)
|
LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vu… | lnbits | 2025-04-06T20:15:15+00:00 | 2025-04-09T17:27:25.872691+00:00 |
| pysec-2025-15 |
5.3 (3.1)
|
Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilde… | flask-appbuilder | 2025-03-03T16:15:41+00:00 | 2025-04-09T17:27:25.227116+00:00 |
| pysec-2025-14 |
|
An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normal… | django | 2025-04-02T13:15:44+00:00 | 2025-04-09T17:27:25.169049+00:00 |
| ID | Description | Type |
|---|---|---|
| tid-205 | If a threat actor has access to a valid OS account, they can utilize existing OS tools an… | system-software |
| tid-204 | Without a correctly enforced operating system privilege model, a compromised or untrusted… | system-software |
| tid-203 | Threat actors may be able to install a driver or kernel module with malicious code to loa… | system-software |
| tid-202 | Devices may have vulnerabilities within software used to parse various network protocols.… | system-software |
| tid-201 | Some devices utilize bootloaders that are either stored in writable memory or memory that… | system-software |
| tid-119 | Hardware debugging ports (e.g., JTAG, SWD, etc.) oftentimes have high privileges or direc… | hardware |
| tid-118 | If a threat actor has physical access to a device, they may be able to cause physical dam… | hardware |
| tid-116 | If a device has a latent user access port, it may be possible for attackers to leverage p… | hardware |
| tid-115 | Unprotected programming or debugging interfaces may be used to extract device firmware, e… | hardware |
| tid-114 | Messages and data passing between discrete sub-components and peripherals may be intercep… | hardware |
| tid-113 | A threat actor could manipulate the firmware associated with a device’s peripheral or oth… | hardware |
| tid-111 | An untrusted storage peripheral (e.g., USB) could be connected to the device. If maliciou… | hardware |
| tid-110 | Certain software-executed attacks can introduce a fault to the physical hardware of the d… | hardware |
| tid-109 | If a threat actor can physically access a RAM chip, they may be able to readout the conte… | hardware |
| tid-108 | Contents of non-volatile memory chips or non-fixed storage (e.g., SD cards, Compact Flash… | hardware |
| tid-107 | If separate discrete chips/peripherals that have access to the same physical memory, a th… | hardware |
| tid-106 | A threat actor could intercept data across a data bus used to connect a process to either… | hardware |
| tid-105 | A threat actor with physical access to a device may be able to manipulate the processor’s… | hardware |
| tid-103 | Operating system memory safety models rely on processor hardware to enforce separation be… | hardware |
| tid-102 | Devices will oftentimes emit different electromagnetic signals during different operation… | hardware |
| tid-101 | Devices will oftentimes consume variable amounts of power depending on the operations the… | hardware |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33855 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.741239Z |
| gsd-2024-33851 | phpecc, as used in paragonie/phpecc before 2.0.1, has a branch-based timing leak in Point… | 2024-04-28T05:02:07.732559Z |
| gsd-2024-33879 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.727068Z |
| gsd-2024-4294 | A vulnerability, which was classified as critical, has been found in PHPGurukul Doctor Ap… | 2024-04-28T05:02:06.079201Z |
| gsd-2024-4292 | A vulnerability classified as critical has been found in Contemporary Controls BASrouter … | 2024-04-28T05:02:06.073286Z |
| gsd-2024-4295 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:06.068263Z |
| gsd-2024-4291 | A vulnerability was found in Tenda A301 15.13.08.12_multi_TDE01. It has been rated as cri… | 2024-04-28T05:02:06.058388Z |
| gsd-2024-4293 | A vulnerability classified as problematic was found in PHPGurukul Doctor Appointment Mana… | 2024-04-28T05:02:06.052534Z |
| gsd-2023-52722 | An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER … | 2024-04-28T05:01:28.746814Z |
| gsd-2022-48685 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.870720Z |
| gsd-2022-48684 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.715598Z |
| gsd-2024-24777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:24.547536Z |
| gsd-2024-28875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:20.401696Z |
| gsd-2024-33786 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.606155Z |
| gsd-2024-33697 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.598872Z |
| gsd-2024-33722 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.598142Z |
| gsd-2024-33784 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.595808Z |
| gsd-2024-33788 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.591276Z |
| gsd-2024-33814 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.590797Z |
| gsd-2024-33701 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.589032Z |
| gsd-2024-33776 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.587852Z |
| gsd-2024-33712 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.587066Z |
| gsd-2024-33840 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.586722Z |
| gsd-2024-33838 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.585807Z |
| gsd-2024-33749 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.584613Z |
| gsd-2024-33839 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.579161Z |
| gsd-2024-33733 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.577869Z |
| gsd-2024-33845 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.569462Z |
| gsd-2024-33741 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.568527Z |
| gsd-2024-33738 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.562140Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-237 | Malicious code in formater (PyPI) | 2026-01-12T23:05:42Z | 2026-02-26T09:50:46Z |
| mal-2026-236 | Malicious code in graponater (PyPI) | 2026-01-12T20:55:06Z | 2026-02-26T09:50:46Z |
| mal-2025-193011 | Malicious code in requeses (PyPI) | 2025-12-31T16:40:04Z | 2026-02-26T09:50:46Z |
| mal-2025-193010 | Malicious code in pyrogrqm (PyPI) | 2025-12-31T16:09:30Z | 2026-02-26T09:50:46Z |
| mal-2025-193008 | Malicious code in telegreph (PyPI) | 2025-12-31T15:00:17Z | 2026-02-26T09:50:46Z |
| mal-2025-193007 | Malicious code in aiogrem (PyPI) | 2025-12-31T14:49:05Z | 2026-02-26T09:50:46Z |
| mal-2025-192991 | Malicious code in pyrogrem (PyPI) | 2025-12-31T11:49:56Z | 2026-02-26T09:50:46Z |
| mal-2025-192958 | Malicious code in smtmlib (PyPI) | 2025-12-29T10:04:23Z | 2026-02-26T09:50:46Z |
| mal-2025-192956 | Malicious code in cryptozip (PyPI) | 2025-12-28T19:49:40Z | 2026-02-26T09:50:46Z |
| mal-2025-192948 | Malicious code in extrazip (PyPI) | 2025-12-27T09:41:01Z | 2026-02-26T09:50:46Z |
| mal-2025-192943 | Malicious code in telegrem (PyPI) | 2025-12-26T20:03:22Z | 2026-02-26T09:50:46Z |
| mal-2025-192942 | Malicious code in telebot-bot (PyPI) | 2025-12-26T20:04:06Z | 2026-02-26T09:50:46Z |
| mal-2025-192690 | Malicious code in smtrlib (PyPI) | 2025-12-22T17:15:11Z | 2026-02-26T09:50:46Z |
| mal-2025-192689 | Malicious code in unizip (PyPI) | 2025-12-22T14:02:40Z | 2026-02-26T09:50:46Z |
| mal-2025-192579 | Malicious code in smtblib (PyPI) | 2025-12-15T15:24:47Z | 2026-02-26T09:50:46Z |
| mal-2025-192468 | Malicious code in yzip (PyPI) | 2025-12-11T15:53:42Z | 2026-02-26T09:50:46Z |
| mal-2025-192467 | Malicious code in gxzip (PyPI) | 2025-12-10T22:53:31Z | 2026-02-26T09:50:46Z |
| mal-2025-192432 | Malicious code in kzip (PyPI) | 2025-12-10T08:56:08Z | 2026-02-26T09:50:46Z |
| mal-2025-192323 | Malicious code in rendom (PyPI) | 2025-12-05T16:58:12Z | 2026-02-26T09:50:46Z |
| mal-2025-191919 | Malicious code in uzip (PyPI) | 2025-11-22T16:53:45Z | 2026-02-26T09:50:46Z |
| mal-2025-191918 | Malicious code in uuzip (PyPI) | 2025-11-22T20:55:03Z | 2026-02-26T09:50:46Z |
| mal-2025-191876 | Malicious code in speedd-testing-bot (PyPI) | 2025-10-28T19:23:53Z | 2026-02-26T09:50:46Z |
| mal-2025-191875 | Malicious code in speed-testing-vps (PyPI) | 2025-11-23T16:18:01Z | 2026-02-26T09:50:46Z |
| mal-2025-191874 | Malicious code in speed-testing-nt (PyPI) | 2025-10-31T00:13:41Z | 2026-02-26T09:50:46Z |
| mal-2025-191799 | Malicious code in mzip (PyPI) | 2025-11-22T17:01:17Z | 2026-02-26T09:50:46Z |
| mal-2025-191792 | Malicious code in minizip (PyPI) | 2025-11-23T12:20:46Z | 2026-02-26T09:50:46Z |
| mal-2026-1041 | Malicious code in secure-monkey (npm) | 2026-02-23T11:30:57Z | 2026-02-26T01:40:06Z |
| mal-2026-1040 | Malicious code in react-markdown-canvas (npm) | 2026-02-23T22:01:02Z | 2026-02-26T01:40:06Z |
| mal-2026-986 | Malicious code in en-thrift-internal (npm) | 2026-02-22T21:50:01Z | 2026-02-26T01:40:03Z |
| mal-2026-941 | Malicious code in ether-lint (npm) | 2026-02-12T16:02:40Z | 2026-02-26T01:40:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0231 | GnuPG und Gpg4win: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0215 | Linux Kernel: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0213 | expat: Schwachstelle ermöglicht Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0207 | Red Hat Enterprise Linux (urllib3): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0199 | Red Hat OpenShift Pipelines Operator (Fulcio): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0198 | Red Hat OpenShift und OpenShift AI (urllib3): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0145 | FreeRDP: Mehrere Schwachstellen ermöglichen DoS und Codeausführung | 2026-01-19T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0136 | AMD EPYC-Prozessoren: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-15T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0116 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0105 | Red Hat Developer Hub: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0098 | Node.js: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0008 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2026-01-04T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2920 | Linux Kernel: Mehrere Schwachstellen | 2025-12-23T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2886 | Red Hat Enterprise Linux (git-lfs, opentelemetry-collector): Mehrere Schwachstellen | 2025-12-18T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2798 | Red Hat OpenShift Service Mesh: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2756 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-07T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2755 | util-linux: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-12-07T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2730 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-02T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2651 | GnuTLS: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-19T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2643 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-19T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2637 | Rsync: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-18T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2595 | Linux Kernel: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2584 | Red Hat Enterprise Linux Ceph Storage: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2579 | Linux Kernel: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2518 | Red Hat Enterprise Linux (runc): Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-11-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2242 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2025-10-08T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2194 | Linux Kernel: Mehrere Schwachstellen | 2025-10-05T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2150 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-29T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2045 | expat: Schwachstelle ermöglicht Denial of Service | 2025-09-14T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1422 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-06-20T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0014 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-01-15T12:16:05.427141Z | 2026-01-15T12:16:05.427141Z |
| ncsc-2026-0013 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2026-01-14T13:45:48.530782Z | 2026-01-14T13:45:48.530782Z |
| ncsc-2026-0012 | Kwetsbaarheden verholpen in Adobe Dreamweaver Desktop | 2026-01-14T13:41:56.261778Z | 2026-01-14T13:41:56.261778Z |
| ncsc-2026-0011 | Kwetsbaarheid verholpen in Microsoft Developer Tools | 2026-01-13T19:19:27.690900Z | 2026-01-13T19:19:27.690900Z |
| ncsc-2026-0010 | Kwetsbaarheden verholpen in Microsoft Office | 2026-01-13T19:18:45.984019Z | 2026-01-13T19:18:45.984019Z |
| ncsc-2026-0009 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-01-13T19:17:59.629364Z | 2026-01-13T19:17:59.629364Z |
| ncsc-2026-0008 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-01-13T19:17:18.848673Z | 2026-01-13T19:17:18.848673Z |
| ncsc-2026-0007 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-01-13T19:16:30.720079Z | 2026-01-13T19:16:30.720079Z |
| ncsc-2026-0006 | Kwetsbaarheden verholpen in SAP producten | 2026-01-13T14:42:24.621603Z | 2026-01-13T14:42:24.621603Z |
| ncsc-2026-0005 | Kwetsbaarheden verholpen in Siemens producten | 2026-01-13T12:05:57.353070Z | 2026-01-13T12:05:57.353070Z |
| ncsc-2026-0004 | Kwetsbaarheden verholpen in Trend Micro Apex Central | 2026-01-09T11:14:58.910197Z | 2026-01-09T11:14:58.910197Z |
| ncsc-2026-0003 | Kwetsbaarheden verholpen in GitLab | 2026-01-09T11:11:48.308357Z | 2026-01-09T11:11:48.308357Z |
| ncsc-2026-0002 | Kwetsbaarheid verholpen in n8n | 2026-01-08T12:34:29.315681Z | 2026-01-08T12:34:29.315681Z |
| ncsc-2026-0001 | Kwetsbaarheden verholpen in Hanwha camera systemen | 2026-01-08T12:28:21.446188Z | 2026-01-08T12:28:21.446188Z |
| ncsc-2025-0405 | Kwetsbaarheid verholpen in Roundcube Webmail | 2025-12-31T14:29:26.821576Z | 2025-12-31T14:29:26.821576Z |
| ncsc-2025-0404 | Kwetsbaarheid verholpen in SmarterMail | 2025-12-31T14:19:01.847364Z | 2025-12-31T14:19:01.847364Z |
| ncsc-2025-0403 | Kwetsbaarheden verholpen in QNAP besturingssystemen | 2025-12-29T09:17:28.385450Z | 2025-12-29T09:17:28.385450Z |
| ncsc-2025-0402 | Kwetsbaarheid verholpen in MongoDB | 2025-12-27T11:38:11.514349Z | 2025-12-27T11:38:11.514349Z |
| ncsc-2025-0399 | Kwetsbaarheid verholpen in HPE OneView Software | 2025-12-18T18:38:20.794784Z | 2025-12-24T11:29:46.123674Z |
| ncsc-2025-0401 | Kwetsbaarheden verholpen in Foxit PDF Reader | 2025-12-24T09:14:56.590353Z | 2025-12-24T09:14:56.590353Z |
| ncsc-2025-0400 | Kwetsbaarheid verholpen in WatchGuard Firebox | 2025-12-19T11:16:01.438518Z | 2025-12-19T11:16:01.438518Z |
| ncsc-2025-0398 | Kwetsbaarheid in Cisco AsyncOS | 2025-12-17T19:47:00.346651Z | 2025-12-17T19:47:00.346651Z |
| ncsc-2025-0397 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-12-15T09:08:39.804149Z | 2025-12-15T09:08:39.804149Z |
| ncsc-2025-0396 | Kwetsbaarheden verholpen in Apple macOS | 2025-12-15T09:06:36.450655Z | 2025-12-15T09:06:36.450655Z |
| ncsc-2025-0394 | Kwetsbaarheden verholpen in React Server Components | 2025-12-12T09:04:19.324080Z | 2025-12-12T10:46:34.688189Z |
| ncsc-2025-0395 | Kwetsbaarheden verholpen in SAP Software | 2025-12-12T09:29:08.429888Z | 2025-12-12T09:29:08.429888Z |
| ncsc-2025-0393 | Kwetsbaarheid verholpen in GeoServer | 2025-12-12T08:12:18.831044Z | 2025-12-12T09:02:27.681292Z |
| ncsc-2025-0392 | Kwetsbaarheid verholpen in Barracuda Service Center | 2025-12-11T13:53:23.819008Z | 2025-12-11T13:53:23.819008Z |
| ncsc-2025-0391 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-12-11T13:51:55.178462Z | 2025-12-11T13:51:55.178462Z |
| ncsc-2025-0390 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-12-11T09:22:54.841848Z | 2025-12-11T09:22:54.841848Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-750499 | SSA-750499: Weak Encryption Vulnerability in SIPROTEC 5 Devices | 2024-07-09T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-726617 | SSA-726617: Incorrect Privilege Assignment Vulnerability in Mendix OIDC SSO Module | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-711309 | SSA-711309: Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products | 2023-09-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-687955 | SSA-687955: Accessible Development Shell via Physical Interface in SIPROTEC 5 | 2025-02-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-682326 | SSA-682326: Multiple Vulnerabilities in COMOS before V10.4.5 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-631336 | SSA-631336: Multiple Web Server Vulnerabilities in SICAM GridEdge Before V2.6.6 | 2022-06-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-522291 | SSA-522291: Improper Certificate Validation Vulnerability in Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-514895 | SSA-514895: Multiple Vulnerabilities in Altair Grid Engine V2025.1.0 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-365596 | SSA-365596: DLL Hijacking Vulnerability in Siemens Software Center and Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-339694 | SSA-339694: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-322980 | SSA-322980: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2023-04-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-267056 | SSA-267056: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-225578 | SSA-225578: Improper Access Control Vulnerability in SICAM GridEdge Before V2.7.3 | 2022-07-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-201498 | SSA-201498: Multiple Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices Before V3.11 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-194557 | SSA-194557: Improper Limitation of Filesystem Access through Web Server Vulnerability in SIPROTEC 5 | 2025-01-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-876787 | SSA-876787: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-722410 | SSA-722410: Multiple Vulnerabilities in User Management Component (UMC) | 2025-09-09T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-625789 | SSA-625789: Multiple Vulnerabilities in SIMATIC S7-1200 CPU V1/V2 Devices | 2011-06-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-614723 | SSA-614723: Denial of Service Vulnerabilities in User Management Component (UMC) | 2025-05-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-541582 | SSA-541582: Multiple File Parsing Vulnerabilities in Solid Edge | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-486936 | SSA-486936: Authentication Vulnerability in SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-373591 | SSA-373591: Buffer Overflow Vulnerability in RUGGEDCOM ROS Devices | 2021-07-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-367714 | SSA-367714: Improper Integrity Check of Firmware Updates in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-05-23T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-318832 | SSA-318832: SQL Injection Vulnerability in SINEC NMS | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-279823 | SSA-279823: Cross-Site Scripting Vulnerability in SIMATIC S7-1200 CPU V2/V3 Before V3.0.2 | 2012-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-240718 | SSA-240718: Insecure Storage of HTTPS CA Certificate in SIMATIC S7-1200 CPU V2 | 2012-09-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-186293 | SSA-186293: XML External Entity (XXE) Injection Vulnerability in SIMOTION SCOUT, SIMOTION SCOUT TIA and SINAMICS STARTER | 2025-08-12T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-083019 | SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices | 2025-07-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:1813 | Red Hat Security Advisory: golang security update | 2026-02-03T14:57:18+00:00 | 2026-02-17T12:41:30+00:00 |
| rhsa-2026:1805 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T10:17:28+00:00 | 2026-02-17T12:41:30+00:00 |
| rhsa-2026:1792 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T07:25:42+00:00 | 2026-02-17T12:41:30+00:00 |
| rhsa-2026:1706 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T12:38:43+00:00 | 2026-02-17T12:41:30+00:00 |
| rhsa-2026:1803 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T09:45:07+00:00 | 2026-02-17T12:41:29+00:00 |
| rhsa-2026:1794 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T07:18:11+00:00 | 2026-02-17T12:41:29+00:00 |
| rhsa-2026:1793 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T07:17:26+00:00 | 2026-02-17T12:41:29+00:00 |
| rhsa-2026:1791 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T07:21:33+00:00 | 2026-02-17T12:41:28+00:00 |
| rhsa-2026:1736 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2026-02-02T17:31:06+00:00 | 2026-02-17T12:41:28+00:00 |
| rhsa-2026:1735 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T17:50:59+00:00 | 2026-02-17T12:41:27+00:00 |
| rhsa-2026:1734 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T17:45:39+00:00 | 2026-02-17T12:41:27+00:00 |
| rhsa-2026:1730 | Red Hat Security Advisory: Red Hat Quay 3.12.13 | 2026-02-02T15:52:56+00:00 | 2026-02-17T12:41:27+00:00 |
| rhsa-2026:1729 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T15:49:34+00:00 | 2026-02-17T12:41:26+00:00 |
| rhsa-2026:1726 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T15:25:44+00:00 | 2026-02-17T12:41:26+00:00 |
| rhsa-2026:1717 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T14:17:19+00:00 | 2026-02-17T12:41:26+00:00 |
| rhsa-2026:1715 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-02-02T13:10:53+00:00 | 2026-02-17T12:41:26+00:00 |
| rhsa-2026:1712 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T13:10:47+00:00 | 2026-02-17T12:41:25+00:00 |
| rhsa-2026:1704 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T11:50:53+00:00 | 2026-02-17T12:41:25+00:00 |
| rhsa-2026:1693 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T10:02:03+00:00 | 2026-02-17T12:41:25+00:00 |
| rhsa-2026:1619 | Red Hat Security Advisory: python3.12-urllib3 security update | 2026-02-02T01:58:41+00:00 | 2026-02-17T12:41:25+00:00 |
| rhsa-2026:1676 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T06:53:02+00:00 | 2026-02-17T12:41:24+00:00 |
| rhsa-2026:1674 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T06:47:53+00:00 | 2026-02-17T12:41:24+00:00 |
| rhsa-2026:1652 | Red Hat Security Advisory: Red Hat Ceph Storage | 2026-02-02T02:51:27+00:00 | 2026-02-17T12:41:24+00:00 |
| rhsa-2026:1618 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T01:17:06+00:00 | 2026-02-17T12:41:23+00:00 |
| rhsa-2026:1609 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2026-01-30T15:48:57+00:00 | 2026-02-17T12:41:23+00:00 |
| rhsa-2026:1599 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Update | 2026-01-29T19:16:21+00:00 | 2026-02-17T12:41:22+00:00 |
| rhsa-2026:1596 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-01-29T18:40:37+00:00 | 2026-02-17T12:41:22+00:00 |
| rhsa-2026:1546 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-01-29T09:08:25+00:00 | 2026-02-17T12:41:22+00:00 |
| rhsa-2026:1540 | Red Hat Security Advisory: OpenShift Container Platform 4.15.61 packages and security update | 2026-02-05T16:39:36+00:00 | 2026-02-17T12:41:22+00:00 |
| rhsa-2026:1518 | Red Hat Security Advisory: grafana-pcp security update | 2026-01-28T23:26:14+00:00 | 2026-02-17T12:41:21+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-036-01 | TP-Link Systems Inc. VIGI Series IP Camera | 2026-02-05T06:00:00.000000Z | 2026-02-05T06:00:00.000000Z |
| icsa-25-343-03 | Multiple India-based CCTV Cameras (Update A)** | 2025-12-09T06:00:00.000000Z | 2026-02-05T06:00:00.000000Z |
| icsa-26-034-04 | Synectix LAN 232 TRIO | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-03 | RISS SRL MOMA Seismic Station | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-02 | *Avation Light Engine Pro * | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-01 | Mitsubishi Electric FREQSHIP-mini for Windows | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-310-02 | Ubia Ubox (Update A) | 2025-11-06T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-128-03 | Mitsubishi Electric Multiple FA Products (Update B) | 2025-05-08T06:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-24-345-06 | Rockwell Automation Arena (Update B) | 2024-12-10T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-089-01 | Hitachi Energy IEC 61850 MMS-Server (Update B) | 2023-02-14T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-068-05 | Hitachi Energy Relion 670, 650 and SAM600-IO Series | 2023-02-28T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-112-03 | Schneider Electric Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000000Z | 2026-01-30T07:00:00.000000Z |
| icsa-26-029-03 | Rockwell Automation ControlLogix | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-029-02 | Rockwell Automation ArmorStart LT | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-205-01 | Mitsubishi Electric CNC Series (Update B) | 2025-07-24T06:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-126-03 | BrightSign Players (Update A) | 2025-05-06T06:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-028-06 | Schneider Electric RemoteConnect and SCADAPack x70 Utilities (Update A) | 2025-01-14T00:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-027-03 | Schneider Electric Zigbee Products | 2026-01-13T08:00:00.000000Z | 2026-01-27T20:13:34.637968Z |
| icsa-26-027-02 | Festo Didactic SE MES PC | 2024-02-27T12:00:00.000000Z | 2026-01-27T16:20:28.099631Z |
| icsa-26-027-04 | Johnson Controls Metasys Products | 2026-01-27T07:00:00.000000Z | 2026-01-27T07:00:00.000000Z |
| icsa-26-022-01 | Schneider Electric | 2026-01-13T08:00:00.000000Z | 2026-01-22T17:29:46.950679Z |
| icsa-26-022-08 | EVMAPA | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-07 | Delta Electronics DIAView | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-06 | Hubitat Elevation Hubs | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-05 | Weintek cMT X Series HMI EasyWeb Service | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-04 | Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-03 | Rockwell Automation CompactLogix 5370 | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-02 | AutomationDirect CLICK Programmable Logic Controller | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-25-352-08 | Axis Communications Camera Station Pro, Camera Station, and Device Manager (Update B) | 2025-12-18T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-24-326-04 | Schneider Electric Modicon M340, MC80, and Momentum Unity M1E (Update B) | 2024-11-12T05:00:00.000000Z | 2026-01-20T15:49:53.166459Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-9800cl-openscep-sb4xtxzp | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controller for Cloud Unauthenticated Access to Certificate Enrollment Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-snmp-bypass-hhuvujdn | Cisco IOS XE SD-WAN Software Packet Filtering Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-09-22T14:12:28+00:00 |
| cisco-sa-xrsig-uy4zrucg | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-iosxr-arp-storm-ejuu55ym | Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-acl-packetio-swjhhbtz | Cisco IOS XR Software Management Interface ACL Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-fp2k-ipsec-dos-tjwgdzco | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 2100 Series IPv6 over IPsec Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-09T21:22:34+00:00 |
| cisco-sa-webex-xss-55bv8hhm | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-webex-urlredirect-uk8ddjsz | Cisco Webex Meetings URL Redirection Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-phone-write-g3kcc5df | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-imp-xss-xqgu4hsg | Cisco Unified Communications Manager IM & Presence Service Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-xjqzsycp | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-info-dis-zhppmfgz | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Information Disclosure Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epni-arb-file-upload-jjdm2p83 | Cisco Evolved Programmable Network Manager Arbitrary File Upload Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-cucm-csrf-w762pryd | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-3100_4200_tlsdos-2ynscd54 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 3100 and 4200 Series TLS 1.3 Cipher Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-03T13:37:50+00:00 |
| cisco-sa-ucs-xss-ey6xhyps | Cisco UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-vkvmorv-cnkrv7hk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Open Redirect Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-multi-cmdinj-e4ukjyrz | Cisco UCS Manager Software Command Injection Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-kvmsxss-6h7anuyk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxospc-pim6-vg4jfph | Cisco Nexus 3000 and 9000 Series Switches Protocol Independent Multicast Version 6 Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-infodis-tectysfg | Cisco NX-OS Software Sensitive Log Information Disclosure Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-qhnze5ss | Cisco NX-OS Software Command Injection Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nshs-urapi-gjubvfpu | Cisco Nexus Dashboard and Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nd-ptrs-xu2fm2wb | Cisco Nexus Dashboard Path Traversal Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-n39k-isis-dos-jhja8rfx | Cisco Nexus 3000 and 9000 Series Switches Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ise-file-upload-qksx6c8g | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:43:01+00:00 |
| cisco-sa-pi-epnm-tet4gxbx | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Sensitive Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-authproxlog-sxczxq63 | Cisco Duo Authentication Proxy Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-20180328-smi2 | Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability | 2018-03-28T16:00:00+00:00 | 2025-08-20T14:26:26+00:00 |
| cisco-sa-asaftd-ssltls-dos-ehw76vze | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SSL/TLS Certificate Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-19T16:32:05+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2020-0001 | Security Information Regarding "Profile Programming" | 2020-05-31T10:00:00.000Z | 2020-05-31T10:00:00.000Z |
| sca-2019-0002 | Vulnerability in SICK FX0-GENT00000 and SICK FX0-GPNT00000 | 2019-09-20T10:00:00.000Z | 2019-09-20T10:00:00.000Z |
| sca-2019-0001 | MSC800 affected by hard-coded credentials vulnerability | 2019-06-21T10:00:00.000Z | 2019-06-21T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38515 | drm/sched: Increment job count before swapping tail spsc queue | 2025-08-02T00:00:00.000Z | 2026-02-24T14:42:51.000Z |
| msrc_cve-2025-38513 | wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev() | 2025-08-02T00:00:00.000Z | 2026-02-24T14:42:44.000Z |
| msrc_cve-2025-39923 | dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees | 2025-10-02T00:00:00.000Z | 2026-02-24T14:42:37.000Z |
| msrc_cve-2025-38639 | netfilter: xt_nfacct: don't assume acct name is null-terminated | 2025-08-02T00:00:00.000Z | 2026-02-24T14:42:37.000Z |
| msrc_cve-2025-39853 | i40e: Fix potential invalid access when MAC list is empty | 2025-09-02T00:00:00.000Z | 2026-02-24T14:42:30.000Z |
| msrc_cve-2025-38635 | clk: davinci: Add NULL check in davinci_lpsc_clk_register() | 2025-08-02T00:00:00.000Z | 2026-02-24T14:42:30.000Z |
| msrc_cve-2025-39847 | ppp: fix memory leak in pad_compress_skb | 2025-09-02T00:00:00.000Z | 2026-02-24T14:42:23.000Z |
| msrc_cve-2025-38630 | fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref | 2025-08-02T00:00:00.000Z | 2026-02-24T14:42:23.000Z |
| msrc_cve-2025-39845 | x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() | 2025-09-02T00:00:00.000Z | 2026-02-24T14:42:16.000Z |
| msrc_cve-2025-38502 | bpf: Fix oob access in cgroup local storage | 2025-08-02T00:00:00.000Z | 2026-02-24T14:42:16.000Z |
| msrc_cve-2025-39844 | mm: move page table sync declarations to linux/pgtable.h | 2025-09-02T00:00:00.000Z | 2026-02-24T14:42:08.000Z |
| msrc_cve-2025-38499 | clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns | 2025-08-02T00:00:00.000Z | 2026-02-24T14:42:08.000Z |
| msrc_cve-2025-38495 | HID: core: ensure the allocated report buffer can contain the reserved report ID | 2025-07-02T00:00:00.000Z | 2026-02-24T14:42:00.000Z |
| msrc_cve-2025-39841 | scsi: lpfc: Fix buffer free/clear order in deferred receive path | 2025-09-02T00:00:00.000Z | 2026-02-24T14:41:59.000Z |
| msrc_cve-2025-38488 | smb: client: fix use-after-free in crypt_message when using async crypto | 2025-07-02T00:00:00.000Z | 2026-02-24T14:41:53.000Z |
| msrc_cve-2025-39839 | batman-adv: fix OOB read/write in network-coding decode | 2025-09-02T00:00:00.000Z | 2026-02-24T14:41:52.000Z |
| msrc_cve-2025-40300 | x86/vmscape: Add conditional IBPB mitigation | 2025-09-02T00:00:00.000Z | 2026-02-24T14:41:44.000Z |
| msrc_cve-2025-39913 | tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. | 2025-10-02T00:00:00.000Z | 2026-02-24T14:41:37.000Z |
| msrc_cve-2025-38477 | net/sched: sch_qfq: Fix race condition on qfq_aggregate | 2025-07-02T00:00:00.000Z | 2026-02-24T14:41:37.000Z |
| msrc_cve-2025-39911 | i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path | 2025-10-02T00:00:00.000Z | 2026-02-24T14:41:30.000Z |
| msrc_cve-2025-38412 | platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks | 2025-07-02T00:00:00.000Z | 2026-02-24T14:41:30.000Z |
| msrc_cve-2025-39894 | netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm | 2025-10-02T00:00:00.000Z | 2026-02-24T14:41:23.000Z |
| msrc_cve-2025-38410 | drm/msm: Fix a fence leak in submit error path | 2025-07-02T00:00:00.000Z | 2026-02-24T14:41:23.000Z |
| msrc_cve-2025-39883 | mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory | 2025-09-02T00:00:00.000Z | 2026-02-24T14:41:16.000Z |
| msrc_cve-2025-38403 | vsock/vmci: Clear the vmci transport packet properly when initializing it | 2025-07-02T00:00:00.000Z | 2026-02-24T14:41:16.000Z |
| msrc_cve-2025-39835 | xfs: do not propagate ENODATA disk errors into xattr code | 2025-09-02T00:00:00.000Z | 2026-02-24T14:41:08.000Z |
| msrc_cve-2025-38401 | mtk-sd: Prevent memory corruption from DMA map failure | 2025-07-02T00:00:00.000Z | 2026-02-24T14:41:08.000Z |
| msrc_cve-2025-39824 | HID: asus: fix UAF via HID_CLAIMED_INPUT validation | 2025-09-02T00:00:00.000Z | 2026-02-24T14:41:01.000Z |
| msrc_cve-2025-38400 | nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails. | 2025-07-02T00:00:00.000Z | 2026-02-24T14:41:01.000Z |
| msrc_cve-2025-39823 | KVM: x86: use array_index_nospec with indices that come from guest | 2025-09-02T00:00:00.000Z | 2026-02-24T14:40:54.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201304-0385 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:38:16.278000Z |
| var-201904-0755 | A use after free issue was addressed with improved memory management. This issue affected… | 2025-12-22T23:38:16.003000Z |
| var-200505-0193 | Buffer overflow in the Netinfo Setup Tool (NeST) allows local users to execute arbitrary … | 2025-12-22T23:38:14.233000Z |
| var-202112-2539 | vim is vulnerable to Out-of-bounds Read. SourceCoster Online Covid Vaccination Scheduler … | 2025-12-22T23:38:13.627000Z |
| var-200701-0396 | Format string vulnerability in Apple Software Update 2.0.5 on Mac OS X 10.4.8 allows remo… | 2025-12-22T23:37:39.067000Z |
| var-200809-0006 | Directory Services in Apple Mac OS X 10.5 through 10.5.4, when Active Directory is used, … | 2025-12-22T23:37:38.921000Z |
| var-200609-1415 | Buffer overflow in PPP on Apple Mac OS X 10.4.x up to 10.4.8 and 10.3.x up to 10.3.9, whe… | 2025-12-22T23:37:20.684000Z |
| var-200603-0272 | IPSec when used with VPN networks in Mac OS X 10.4 through 10.4.5 allows remote attackers… | 2025-12-22T23:37:20.411000Z |
| var-201912-0615 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i… | 2025-12-22T23:37:19.793000Z |
| var-201912-0643 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T23:37:14.392000Z |
| var-200906-0591 | The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util befor… | 2025-12-22T23:37:13.846000Z |
| var-200809-0187 | Finder in Apple Mac OS X 10.5.2 through 10.5.4 allows remote attackers to cause a denial … | 2025-12-22T23:37:13.464000Z |
| var-202301-1703 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2025-12-22T23:37:13.194000Z |
| var-202012-1279 | curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation … | 2025-12-22T23:37:05.921000Z |
| var-201304-0184 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:36:49.148000Z |
| var-200608-0042 | OpenSSH in Apple Mac OS X 10.4.7 allows remote attackers to cause a denial of service or … | 2025-12-22T23:36:49.065000Z |
| var-201908-0264 | Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a den… | 2025-12-22T23:36:48.411000Z |
| var-201710-0974 | Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the G… | 2025-12-22T23:36:17.894000Z |
| var-201912-0633 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T23:36:04.194000Z |
| var-201211-0364 | Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on … | 2025-12-22T23:36:03.936000Z |
| var-200809-0194 | VideoConference in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows remote attackers… | 2025-12-22T23:36:03.286000Z |
| var-201302-0049 | Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in t… | 2025-12-22T23:35:57.723000Z |
| var-201007-0321 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 thro… | 2025-12-22T23:35:54.449000Z |
| var-201008-1003 | The INCLUDE_SECURITY functionality in Wind River VxWorks 6.x, 5.x, and earlier uses the L… | 2025-12-22T23:35:49.081000Z |
| var-201912-1850 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T23:35:23.528000Z |
| var-201605-0077 | The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consi… | 2025-12-22T23:34:11.751000Z |
| var-200106-0092 | Cisco PIX Firewall 515 and 520 with 5.1.4 OS running aaa authentication to a TACACS+ serv… | 2025-12-22T23:34:11.274000Z |
| var-202105-1325 | In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHC… | 2025-12-22T23:34:02.898000Z |
| var-202206-1428 | In addition to the c_rehash shell command injection identified in CVE-2022-1292, further … | 2025-12-22T23:33:57.915000Z |
| var-201508-0365 | The xmlreader in libxml allows remote attackers to cause a denial of service (memory cons… | 2025-12-22T23:33:57.555000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000118 | GROWI vulnerable to cross-site request forgery | 2025-12-17T13:04+09:00 | 2025-12-17T13:04+09:00 |
| jvndb-2025-022062 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-12-17T11:28+09:00 | 2025-12-17T11:28+09:00 |
| jvndb-2025-000115 | QND vulnerable to privilege escalation | 2025-12-11T14:33+09:00 | 2025-12-11T14:33+09:00 |
| jvndb-2025-000113 | Multiple vulnerabilities in GroupSession | 2025-12-08T17:48+09:00 | 2025-12-11T11:30+09:00 |
| jvndb-2025-000091 | Multiple I-O DATA NAS management applications register Windows services with unquoted file paths | 2025-10-22T15:04+09:00 | 2025-12-10T16:20+09:00 |
| jvndb-2021-000081 | Multiple vulnerabilities in Sharp NEC Display Solutions' public displays | 2021-09-17T15:13+09:00 | 2025-12-10T10:24+09:00 |
| jvndb-2025-021305 | Android App "Brother iPrint&Scan" improper use of an external cache directory | 2025-12-09T17:25+09:00 | 2025-12-09T17:25+09:00 |
| jvndb-2025-000114 | ELECOM Clone for Windows registers a Windows service with an unquoted file path | 2025-12-09T17:16+09:00 | 2025-12-09T17:16+09:00 |
| jvndb-2025-000116 | GS Yuasa FULLBACK Manager Pro registers Windows services with unquoted file paths | 2025-12-08T14:06+09:00 | 2025-12-08T14:06+09:00 |
| jvndb-2025-000094 | Multiple vulnerabilities in ABB Terra AC Wallbox | 2025-12-05T14:12+09:00 | 2025-12-05T14:12+09:00 |
| jvndb-2025-000112 | Installer of INZONE Hub may insecurely load Dynamic Link Libraries | 2025-11-28T13:36+09:00 | 2025-11-28T13:36+09:00 |
| jvndb-2025-000111 | SwitchBot Smart Video Doorbell vulnerable to active debug code | 2025-11-26T14:35+09:00 | 2025-11-26T14:35+09:00 |
| jvndb-2025-000110 | Multiple vulnerabilities in Security Point (Windows) of MaLion | 2025-11-25T17:17+09:00 | 2025-11-25T17:17+09:00 |
| jvndb-2025-000109 | Multiple vulnerabilities in SNC-CX600W | 2025-11-25T14:59+09:00 | 2025-11-25T14:59+09:00 |
| jvndb-2025-000108 | "FOD" App uses hard-coded cryptographic keys | 2025-11-25T14:15+09:00 | 2025-11-25T14:15+09:00 |
| jvndb-2025-000106 | Multiple vulnerabilities in LogStare Collector | 2025-11-21T16:27+09:00 | 2025-11-21T16:27+09:00 |
| jvndb-2025-000107 | Installer of RakurakuMusen Start EX for Windows may insecurely load Dynamic Link Libraries | 2025-11-19T16:22+09:00 | 2025-11-19T16:22+09:00 |
| jvndb-2025-000097 | "Dejira" App for iOS vulnerable to improper server certificate verification | 2025-11-17T14:09+09:00 | 2025-11-17T14:09+09:00 |
| jvndb-2025-000105 | NCP-HG100 vulnerable to OS command injection | 2025-11-14T15:26+09:00 | 2025-11-14T15:26+09:00 |
| jvndb-2025-000104 | Multiple vulnerabilities in GNU Libmicrohttpd | 2025-11-10T15:07+09:00 | 2025-11-10T15:07+09:00 |
| jvndb-2025-000103 | Use of password hash with insufficient computational effort vulnerability in BUFFALO Wi-Fi router "WSR-1800AX4 series" | 2025-11-07T15:39+09:00 | 2025-11-07T15:39+09:00 |
| jvndb-2025-000102 | CLUSTERPRO X and EXPRESSCLUSTER X vulnerable to OS command injection | 2025-11-07T14:55+09:00 | 2025-11-07T14:55+09:00 |
| jvndb-2025-000101 | GROWI vulnerable to stored cross-site scripting | 2025-11-06T13:45+09:00 | 2025-11-06T13:45+09:00 |
| jvndb-2024-013260 | Multiple vulnerabilities in Edgecross Basic Software for Windows | 2024-11-22T10:59+09:00 | 2025-11-04T16:41+09:00 |
| jvndb-2025-017972 | Multiple vulnerabilities in Century Systems FutureNet MA and IP-K series | 2025-11-04T16:37+09:00 | 2025-11-04T16:37+09:00 |
| jvndb-2025-000100 | Multiple Roboticsware products register Windows services with unquoted file paths | 2025-11-04T14:17+09:00 | 2025-11-04T14:17+09:00 |
| jvndb-2025-000098 | Optical Disc Archive Software (for Windows) registers a Windows service with an unquoted file path | 2025-11-04T13:51+09:00 | 2025-11-04T13:51+09:00 |
| jvndb-2025-000099 | Progress Flowmon vulnerable to authenticated OS command injection | 2025-11-04T12:47+09:00 | 2025-11-04T12:47+09:00 |
| jvndb-2025-000096 | Installer of WTW EAGLE (for Windows) may insecurely load Dynamic Link Libraries | 2025-10-29T14:17+09:00 | 2025-10-29T14:17+09:00 |
| jvndb-2025-000095 | MZK-DP300N uses hard-coded credentials | 2025-10-28T14:04+09:00 | 2025-10-28T14:04+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0555-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T09:04:29Z | 2026-02-16T09:04:29Z |
| suse-su-2026:0554-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T08:33:36Z | 2026-02-16T08:33:36Z |
| suse-su-2026:0551-1 | Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T06:33:35Z | 2026-02-16T06:33:35Z |
| suse-su-2026:0550-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T05:33:34Z | 2026-02-16T05:33:34Z |
| suse-su-2026:0548-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T03:33:34Z | 2026-02-16T03:33:34Z |
| suse-su-2026:0546-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6) | 2026-02-15T19:33:42Z | 2026-02-15T19:33:42Z |
| suse-su-2026:0544-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T18:03:51Z | 2026-02-15T18:03:51Z |
| suse-su-2026:0543-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6) | 2026-02-15T17:33:36Z | 2026-02-15T17:33:36Z |
| suse-su-2026:0542-1 | Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T16:03:51Z | 2026-02-15T16:03:51Z |
| suse-su-2026:0539-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T13:33:40Z | 2026-02-15T13:33:40Z |
| suse-su-2026:0535-1 | Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T11:04:06Z | 2026-02-15T11:04:06Z |
| suse-su-2026:0528-1 | Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T06:33:50Z | 2026-02-15T06:33:50Z |
| suse-su-2026:0533-1 | Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4) | 2026-02-15T06:33:38Z | 2026-02-15T06:33:38Z |
| suse-su-2026:0526-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4) | 2026-02-14T19:33:43Z | 2026-02-14T19:33:43Z |
| suse-su-2026:0525-1 | Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) | 2026-02-14T17:04:03Z | 2026-02-14T17:04:03Z |
| suse-su-2026:0524-1 | Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) | 2026-02-14T17:03:57Z | 2026-02-14T17:03:57Z |
| suse-su-2026:0514-1 | Security update for cargo-auditable | 2026-02-13T14:57:18Z | 2026-02-13T14:57:18Z |
| suse-su-2026:0510-1 | Security update for util-linux | 2026-02-13T14:52:46Z | 2026-02-13T14:52:46Z |
| suse-su-2026:0508-1 | Security update for curl | 2026-02-13T14:50:33Z | 2026-02-13T14:50:33Z |
| suse-su-2026:0506-1 | Security update for cargo-auditable | 2026-02-13T14:32:17Z | 2026-02-13T14:32:17Z |
| suse-su-2026:0505-1 | Security update for cargo-auditable | 2026-02-13T14:31:50Z | 2026-02-13T14:31:50Z |
| suse-su-2026:0504-1 | Security update for java-1_8_0-openjdk | 2026-02-13T14:24:00Z | 2026-02-13T14:24:00Z |
| suse-su-2026:0503-1 | Security update for ImageMagick | 2026-02-13T14:23:00Z | 2026-02-13T14:23:00Z |
| suse-su-2026:0480-1 | Security update for helm | 2026-02-12T15:35:07Z | 2026-02-12T15:35:07Z |
| suse-su-2026:0479-1 | Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container, virt-synchronization-controller-container | 2026-02-12T15:34:08Z | 2026-02-12T15:34:08Z |
| suse-su-2026:0450-1 | Security update for munge | 2026-02-11T15:46:23Z | 2026-02-11T15:46:23Z |
| suse-su-2026:0449-1 | Security update for freerdp2 | 2026-02-11T14:53:55Z | 2026-02-11T14:53:55Z |
| suse-su-2026:0448-1 | Security update for munge | 2026-02-11T14:51:56Z | 2026-02-11T14:51:56Z |
| suse-su-2026:0447-1 | Security update for the Linux Kernel | 2026-02-11T14:05:07Z | 2026-02-11T14:05:07Z |
| suse-su-2026:0421-1 | Security update for freerdp | 2026-02-10T15:28:56Z | 2026-02-10T15:28:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10140-1 | patch-2.8-2.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10139-1 | libsoup-3_0-0-3.6.5-12.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10138-1 | java-25-openj9-25.0.2.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10137-1 | java-21-openj9-21.0.10.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10136-1 | java-1_8_0-openjdk-1.8.0.482-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10135-1 | java-1_8_0-openj9-1.8.0.482-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10134-1 | java-17-openj9-17.0.18.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10133-1 | java-11-openj9-11.0.30.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10132-1 | freerdp-3.22.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:20156-1 | Security update for chromium | 2026-02-02T17:20:43Z | 2026-02-02T17:20:43Z |
| opensuse-su-2026:20152-1 | Security update for openssl-3 | 2026-02-02T13:00:02Z | 2026-02-02T13:00:02Z |
| opensuse-su-2026:20151-1 | Security update for wireshark | 2026-02-02T12:56:02Z | 2026-02-02T12:56:02Z |
| opensuse-su-2026:20150-1 | Security update for glib2 | 2026-02-02T12:41:24Z | 2026-02-02T12:41:24Z |
| opensuse-su-2026:20145-1 | Security update for the Linux Kernel | 2026-02-02T11:54:26Z | 2026-02-02T11:54:26Z |
| opensuse-su-2026:20148-1 | Security update for dpdk | 2026-02-02T11:12:33Z | 2026-02-02T11:12:33Z |
| opensuse-su-2026:20147-1 | Security update for python-wheel | 2026-02-02T09:49:12Z | 2026-02-02T09:49:12Z |
| opensuse-su-2026:10131-1 | trivy-0.69.0-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10130-1 | python311-PyNaCl-1.6.2-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10129-1 | libmlt++-7-7-7.36.1-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10128-1 | MozillaThunderbird-140.7.1-1.1 on GA media | 2026-01-31T00:00:00Z | 2026-01-31T00:00:00Z |
| opensuse-su-2026:20144-1 | Security update for python-filelock | 2026-01-30T21:24:37Z | 2026-01-30T21:24:37Z |
| opensuse-su-2026:20143-1 | Security update for java-25-openjdk | 2026-01-30T15:55:47Z | 2026-01-30T15:55:47Z |
| opensuse-su-2026:20140-1 | Security update for alloy | 2026-01-30T14:38:31Z | 2026-01-30T14:38:31Z |
| opensuse-su-2026:20141-1 | Security update for udisks2 | 2026-01-30T14:30:57Z | 2026-01-30T14:30:57Z |
| opensuse-su-2026:20142-1 | Security update for libsoup | 2026-01-30T14:27:58Z | 2026-01-30T14:27:58Z |
| opensuse-su-2026:20139-1 | Security update for unbound | 2026-01-30T10:05:07Z | 2026-01-30T10:05:07Z |
| opensuse-su-2026:20138-1 | Security update for jasper | 2026-01-30T09:59:14Z | 2026-01-30T09:59:14Z |
| opensuse-su-2026:10127-1 | rekor-1.5.0-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10126-1 | python315-3.15.0~a3-3.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10125-1 | python311-django-storages-1.14.6-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2024-345-02 | Harmony HMI and Pro-face HMI products | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-345-01 | PowerChute Serial Shutdown | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-317-04 | EcoStruxure™ IT Gateway | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-02 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-01 | PowerLogic PM5300 Series | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2021-159-02 | PowerLogic PM5500 and PowerLogic PM8ECC | 2021-06-08T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-282-08 | EcoStruxure EV Charging Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-07 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-06 | Zelio Soft 2 | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-04 | EVlink Home Smart and Schneider Charge | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-03 | Easergy Studio | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-02 | Harmony iPC – HMIBSC IIoT Edge Box Core | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-01 | Data Center Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2022-102-02 | Modicon M340 Controller and Communication Modules | 2022-04-12T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-254-02 | EcoStruxure™ Power Monitoring Expert and EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation with Advanced Reporting and Dashboards | 2024-09-10T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2024-163-02 | PowerLogic P5 | 2024-06-11T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-073-01 | EcoStruxure™ Power Monitoring Expert | 2023-03-14T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-192-02 | EcoStruxure™ OPC UA Server Expert | 2023-07-11T07:01:56.000Z | 2024-08-13T07:00:00.000Z |
| sevd-2024-226-02 | EcoStruxure™ Machine SCADA Expert / BLUE Open Studio | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-226-01 | Accutech Manager | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-101-05 | Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-04-11T09:46:26.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-06 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 CPU Safety | 2023-01-10T15:17:09.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-05 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-01-10T15:41:57.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-04 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-02 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, and Modicon Controllers M580 and M340 | 2022-08-09T10:58:35.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-222-04 | Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert | 2021-08-10T02:27:39.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-194-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340 | 2021-07-13T08:22:02.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2019-281-02 | Modicon Controllers | 2019-09-26T12:53:28.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2018-081-01 | Embedded FTP Servers for Modicon PAC Controllers | 2018-03-22T03:39:21.000Z | 2024-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-pillow-2026-25990 | Pillow has an out-of-bounds write when loading PSD images | 2026-02-16T16:02:06.871Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1458 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-02-16T16:31:06.973Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1456 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-02-16T16:31:05.146Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1282 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab | 2026-02-16T16:31:03.017Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1094 | Improper Validation of Unsafe Equivalence in Input in GitLab | 2026-02-16T16:30:59.417Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-0958 | Interpretation Conflict in GitLab | 2026-02-16T16:30:57.233Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-0595 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-02-16T16:30:53.679Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-8099 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-02-16T16:30:40.312Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-7659 | Origin Validation Error in GitLab | 2026-02-16T16:30:29.449Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-14594 | Authorization Bypass Through User-Controlled Key in GitLab | 2026-02-16T16:28:35.547Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-14592 | Missing Authorization in GitLab | 2026-02-16T16:28:33.785Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-14560 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-02-16T16:28:32.048Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-12073 | Server-Side Request Forgery (SSRF) in GitLab | 2026-02-16T16:27:53.661Z | 2026-02-16T16:32:40.318Z |
| bit-dotnet-2026-21218 | .NET Spoofing Vulnerability | 2026-02-16T15:58:16.593Z | 2026-02-16T16:32:40.318Z |
| bit-moodle-2025-67857 | Moodle: moodle: data exposure of user identifiers in urls | 2026-02-12T08:51:13.591Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67856 | Moodle: moodle: privilege escalation via incomplete role checks in badge awarding | 2026-02-12T08:51:12.105Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67855 | Mooodle: mooodle: information disclosure and script execution via reflected cross-site scripting | 2026-02-12T08:51:10.563Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67853 | Moodle: moodle: brute-force facilitation due to missing rate limiting in confirmation email service | 2026-02-12T08:51:08.996Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67852 | Moodle: moodle: open redirect vulnerability in oauth login flow allows redirection to malicious sites. | 2026-02-12T08:51:07.525Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67851 | Moodle: moodle: formula injection allows arbitrary formula execution via unescaped data export | 2026-02-12T08:51:05.950Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67850 | Moodle: moodle: cross-site scripting vulnerability via inadequate input filtering in formula editor | 2026-02-12T08:51:04.289Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67849 | Moodle: moodle: cross-site scripting (xss) via improper sanitization of ai prompt responses | 2026-02-12T08:51:02.532Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67848 | Moodle: moodle: authentication bypass via lti provider allows suspended users to gain unauthorized access. | 2026-02-12T08:51:00.880Z | 2026-02-12T09:10:24.600Z |
| bit-airflow-2026-24098 | Apache Airflow: Assigning single DAG permission leaked all DAGs Import Errors | 2026-02-12T08:39:03.920Z | 2026-02-12T09:10:24.600Z |
| bit-airflow-2026-22922 | Apache Airflow: Airflow externalLogUrl Permission Bypass | 2026-02-12T08:39:02.281Z | 2026-02-12T09:10:24.600Z |
| bit-wildfly-2025-23367 | Org.wildfly.core:wildfly-server: wildfly improper rbac permission | 2025-10-15T08:51:55.776Z | 2026-02-11T09:09:18.507Z |
| bit-varnish-2023-44487 | 2024-03-06T11:07:44.095Z | 2026-02-11T09:09:18.507Z | |
| bit-valkey-2025-49112 | 2025-10-16T09:19:52.847Z | 2026-02-11T09:09:18.507Z | |
| bit-valkey-2025-21605 | Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client | 2025-04-25T07:27:01.789Z | 2026-02-11T09:09:18.507Z |
| bit-valkey-2024-51741 | Redis allows denial-of-service due to malformed ACL selectors | 2025-01-08T07:22:23.019Z | 2026-02-11T09:09:18.507Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-qn16013 | Cancelling a query (e | 2026-02-03T16:02:29.512503Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-nb26505 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 4.5.1-r0 | 2026-02-03T16:02:27.744077Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-my73913 | Security fixes for GHSA-r6j8-c6r2-37rr applied in versions: 4.12.1-r0 | 2026-02-03T16:02:28.659120Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-fc21713 | Cancelling a query (e | 2026-02-03T16:02:29.570272Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-cc08655 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 0.8.4-r0 | 2026-02-03T00:36:29.405423Z | 2026-02-02T12:32:10Z |
| cleanstart-2026-am95501 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-02-03T00:37:00.849369Z | 2026-02-02T12:32:10Z |
| cleanstart-2026-zz61324 | Hunspell 1 | 2026-01-30T17:14:26.562334Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zr62045 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-01-30T16:56:56.696859Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zp68963 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:47:54.288582Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zo91195 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:30:24.594235Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zc18474 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-01-30T17:04:56.559720Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yt18139 | issue was discovered in libexpat before 2 | 2026-01-30T17:26:57.202658Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ys66739 | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3 | 2026-01-30T15:00:53.250874Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ym75307 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:34:22.430652Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ym28538 | Prometheus Blackbox Exporter through 0 | 2026-01-30T14:06:20.601766Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yl27116 | tar | 2026-01-30T14:08:51.064236Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk82785 | Within HostnameError | 2026-01-30T14:01:20.108833Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk54840 | Within HostnameError | 2026-01-30T16:30:55.324232Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yj61997 | Cancelling a query (e | 2026-01-30T14:59:52.788649Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yd87381 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:55.178631Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yd51202 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:23.124967Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yc48827 | Within HostnameError | 2026-01-30T15:56:24.532632Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yb44027 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T17:04:26.396860Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xz45798 | Within HostnameError | 2026-01-30T14:05:20.961893Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xx70537 | Cancelling a query (e | 2026-01-30T15:32:24.053481Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xs24366 | Cancelling a query (e | 2026-01-30T15:00:52.862887Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr85161 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.934169Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr17407 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.270681Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xp58111 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:18:55.480183Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xp03839 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:14:55.099611Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2025-085 | 2025-07-02T17:37:03.000Z | 2025-07-02T17:37:03.000Z | |
| drupal-contrib-2025-081 | 2025-06-25T18:42:06.000Z | 2025-06-26T18:17:29.000Z | |
| drupal-contrib-2025-084 | 2025-06-25T18:43:00.000Z | 2025-06-25T18:43:00.000Z | |
| drupal-contrib-2025-083 | 2025-06-25T18:42:38.000Z | 2025-06-25T18:42:38.000Z | |
| drupal-contrib-2025-082 | 2025-06-25T18:42:17.000Z | 2025-06-25T18:42:17.000Z | |
| drupal-contrib-2025-080 | 2025-06-25T18:41:56.000Z | 2025-06-25T18:41:56.000Z | |
| drupal-contrib-2025-079 | 2025-06-25T18:41:34.000Z | 2025-06-25T18:41:34.000Z | |
| drupal-contrib-2025-078 | 2025-06-25T18:41:20.000Z | 2025-06-25T18:41:20.000Z | |
| drupal-contrib-2025-077 | 2025-06-25T18:41:06.000Z | 2025-06-25T18:41:06.000Z | |
| drupal-contrib-2025-001 | 2025-01-08T17:22:11.000Z | 2025-06-19T22:05:09.000Z | |
| drupal-contrib-2025-004 | 2025-01-22T16:50:12.000Z | 2025-05-29T18:26:44.000Z | |
| drupal-contrib-2025-034 | 2025-04-16T16:24:49.000Z | 2025-05-29T18:24:01.000Z | |
| drupal-contrib-2025-041 | 2025-04-23T16:58:39.000Z | 2025-05-29T18:23:44.000Z | |
| drupal-contrib-2025-048 | 2025-05-07T17:06:26.000Z | 2025-05-29T18:20:11.000Z | |
| drupal-contrib-2025-049 | 2025-05-07T17:06:36.000Z | 2025-05-29T18:20:00.000Z | |
| drupal-contrib-2025-050 | 2025-05-07T17:06:52.000Z | 2025-05-29T18:19:50.000Z | |
| drupal-contrib-2025-051 | 2025-05-07T17:07:03.000Z | 2025-05-29T18:19:36.000Z | |
| drupal-contrib-2025-058 | 2025-05-14T18:04:44.000Z | 2025-05-29T18:19:12.000Z | |
| drupal-contrib-2025-059 | 2025-05-14T18:04:52.000Z | 2025-05-29T18:18:54.000Z | |
| drupal-contrib-2025-069 | 2025-05-21T17:29:25.000Z | 2025-05-29T18:17:38.000Z | |
| drupal-contrib-2025-070 | 2025-05-28T17:41:20.000Z | 2025-05-29T18:17:25.000Z | |
| drupal-contrib-2025-071 | 2025-05-28T17:43:23.000Z | 2025-05-29T18:17:12.000Z | |
| drupal-contrib-2025-072 | 2025-05-28T17:43:44.000Z | 2025-05-29T18:16:59.000Z | |
| drupal-contrib-2025-073 | 2025-05-28T17:44:12.000Z | 2025-05-29T18:16:49.000Z | |
| drupal-contrib-2025-074 | 2025-05-28T17:44:33.000Z | 2025-05-29T18:16:36.000Z | |
| drupal-contrib-2025-075 | 2025-05-28T17:45:37.000Z | 2025-05-29T18:16:19.000Z | |
| drupal-contrib-2025-076 | 2025-05-28T17:46:09.000Z | 2025-05-29T18:15:56.000Z | |
| drupal-contrib-2025-068 | 2025-05-21T17:29:14.000Z | 2025-05-21T17:29:14.000Z | |
| drupal-contrib-2025-067 | 2025-05-21T17:28:55.000Z | 2025-05-21T17:28:55.000Z | |
| drupal-contrib-2025-066 | 2025-05-21T17:28:47.000Z | 2025-05-21T17:28:47.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-10663 | IBM Concert代码问题漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10662 | IBM Concert信息泄露漏洞(CNVD-2026-10662) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10661 | IBM Concert信息泄露漏洞(CNVD-2026-10661) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10660 | IBM ApplinX数据伪造问题漏洞 | 2026-01-26 | 2026-02-10 |
| cnvd-2026-10656 | IBM ApplinX跨站请求伪造漏洞(CNVD-2026-10656) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10655 | IBM ApplinX跨站脚本漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10654 | IBM ApplinX未授权访问漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10653 | IBM ApplinX信息泄露漏洞(CNVD-2026-10653) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10652 | Google Chrome代码执行漏洞(CNVD-2026-10652) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10651 | Google SentencePiece缓冲区溢出漏洞 | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10650 | Google Go代码执行漏洞(CNVD-2026-10650) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10649 | Google Go拒绝服务漏洞(CNVD-2026-10649) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10648 | Google Go代码执行漏洞 | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10647 | Google Go拒绝服务漏洞(CNVD-2026-10647) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10646 | Google Go信息泄露漏洞(CNVD-2026-10646) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10645 | Google Chrome信息泄露漏洞(CNVD-2026-10645) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10644 | Google Android权限提升漏洞(CNVD-2026-10644) | 2025-09-08 | 2026-02-09 |
| cnvd-2026-10643 | Google Android权限提升漏洞(CNVD-2026-10643) | 2025-09-04 | 2026-02-09 |
| cnvd-2026-10642 | Google Android权限提升漏洞(CNVD-2026-10642) | 2025-09-04 | 2026-02-09 |
| cnvd-2026-10641 | Google Android信息泄露漏洞(CNVD-2026-10641) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10640 | D-Link DNS-343 ShareCenter命令执行漏洞 | 2025-11-05 | 2026-02-09 |
| cnvd-2026-10639 | D-Link DI-8200G命令注入漏洞 | 2026-01-19 | 2026-02-09 |
| cnvd-2026-10638 | Tenda AX1803缓冲区溢出漏洞(CNVD-2026-10638) | 2026-01-30 | 2026-02-09 |
| cnvd-2026-06416 | 深圳市广联智通科技有限公司AR300M16路由器存在命令执行漏洞(CNVD-C-2025-1171570) | 2025-12-24 | 2026-02-07 |
| cnvd-2026-10344 | Siemens RUGGEDCOM输入验证错误漏洞 | 2025-12-15 | 2026-02-06 |
| cnvd-2026-10341 | Rockwell Automation FactoryTalk Services Platform授权问题漏洞 | 2023-06-19 | 2026-02-06 |
| cnvd-2026-10328 | Google Pixel gxp_fence_manager.cc文件输入验证错误漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10327 | Google Pixel aoc_ipc_core.c文件输入验证错误漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10326 | Google Pixel授权问题漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10325 | Google Pixel protocolpsadapter.cpp文件缓冲区溢出漏洞 | 2025-12-18 | 2026-02-06 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0162 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0161 | Vulnérabilité dans Tenable Nessus Agent | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0144 | Multiples vulnérabilités dans Ivanti Endpoint Manager | 2026-02-11T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0160 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0159 | Multiples vulnérabilités dans Keycloak | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0158 | Multiples vulnérabilités dans les produits Apple | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0157 | Multiples vulnérabilités dans les produits Qnap | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0156 | Multiples vulnérabilités dans Google Chrome | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0154 | Vulnérabilité dans Traefik | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0153 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0152 | Multiples vulnérabilités dans Microsoft Azure | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0151 | Vulnérabilité dans Microsoft .Net | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0150 | Multiples vulnérabilités dans Microsoft Windows | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0149 | Multiples vulnérabilités dans Microsoft Office | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0148 | Multiples vulnérabilités dans les produits Intel | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0147 | Multiples vulnérabilités dans les produits Fortinet | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0146 | Multiples vulnérabilités dans GitLab | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0145 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0143 | Multiples vulnérabilités dans Synology Storage Manager | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0142 | Multiples vulnérabilités dans MongoDB | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0141 | Multiples vulnérabilités dans les produits SAP | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-ale-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-ale-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| certfr-2021-ale-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-ale-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| certfr-2021-ale-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| certfr-2021-ale-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2020-ale-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2021-ale-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| certfr-2020-ale-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| certfr-2020-ale-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| certfr-2020-ale-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |