Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1434 |
5.1 (4.0)
|
Reflected XSS in Omega-PSIR |
Politechnika Warszawska |
Omega-PSIR |
2026-02-27T10:32:53.339Z | 2026-02-27T15:38:38.137Z |
| CVE-2026-1305 |
5.3 (3.1)
|
Japanized for WooCommerce <= 2.8.4 - Missing Authoriza… |
shoheitanaka |
Japanized for WooCommerce |
2026-02-27T09:23:43.326Z | 2026-02-27T15:39:31.362Z |
| CVE-2025-14142 |
6.4 (3.1)
|
Electric Enquiries <= 1.1 - Authenticated (Contributor… |
electriccode |
Electric Enquiries |
2026-02-27T09:23:42.947Z | 2026-02-27T15:56:02.212Z |
| CVE-2024-10938 |
6.5 (3.1)
|
OVRI Payment 1.7.0 - Malicious .htaccess directive |
moneytigo |
OVRI Payment |
2026-02-27T09:23:42.427Z | 2026-02-27T16:15:28.956Z |
| CVE-2026-21660 |
6.9 (4.0)
|
Johnson Controls-Frick Quantum HD-Hardcoded Email Cred… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T09:18:49.186Z | 2026-02-27T16:17:45.915Z |
| CVE-2026-21659 |
8.7 (4.0)
|
Johnson Controls -Frick Quantum HD-Unauthenticated Rem… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T09:08:50.498Z | 2026-02-27T09:27:51.944Z |
| CVE-2026-21658 |
8.8 (4.0)
|
Johnson Controls -Frick Quantum HD- Unauthenticated Re… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T08:59:13.878Z | 2026-02-27T13:07:55.620Z |
| CVE-2026-21657 |
8.8 (4.0)
|
Johnson Controls -Frick Quantum HD- Unauthenticated Re… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T08:54:28.236Z | 2026-02-27T08:54:28.236Z |
| CVE-2026-21656 |
8.8 (4.0)
|
Johnson Controls -Frick Quantum HD- Unauthenticated Re… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T08:47:21.490Z | 2026-02-27T08:47:21.490Z |
| CVE-2026-1627 |
6.5 (3.1)
|
An attacker may exploit the use of outdated and w… |
SICK AG |
SICK LMS1000 |
2026-02-27T08:43:30.581Z | 2026-02-27T08:43:30.581Z |
| CVE-2026-1626 |
6.5 (3.1)
|
An attacker may exploit the use of weak CBC-based… |
SICK AG |
SICK LMS1000 |
2026-02-27T08:40:53.328Z | 2026-02-27T08:40:53.328Z |
| CVE-2026-21654 |
8.8 (4.0)
|
Johnson Controls -Frick Quantum HD- Unauthenticated Re… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T08:38:42.472Z | 2026-02-27T09:24:44.300Z |
| CVE-2026-2362 |
6.4 (3.1)
|
WP Accessibility <= 2.3.1 - Authenticated (Contributor… |
joedolson |
WP Accessibility |
2026-02-27T08:24:19.792Z | 2026-02-27T08:24:19.792Z |
| CVE-2026-2383 |
6.4 (3.1)
|
Simple Download Monitor <= 4.0.5 - Authenticated (Cont… |
mra13 |
Simple Download Monitor |
2026-02-27T08:24:19.262Z | 2026-02-27T08:24:19.262Z |
| CVE-2026-2252 |
7.5 (3.1)
|
XML External Entity (XXE) vulnerability resulting in S… |
Xerox |
FreeFlow Core |
2026-02-27T08:18:17.816Z | 2026-02-27T08:18:38.491Z |
| CVE-2025-12150 |
3.1 (3.1)
|
Org.keycloak/keycloak-services: webauthn attestation s… |
Keycloak |
keycloak |
2026-02-27T08:10:15.448Z | 2026-02-27T08:10:15.448Z |
| CVE-2026-2251 |
9.8 (3.1)
|
Path Traversal leading to Remote Code Execution (RCE) |
Xerox |
FreeFlow Core |
2026-02-27T08:08:52.263Z | 2026-02-27T08:18:56.212Z |
| CVE-2026-27776 |
7.2 (3.0)
8.6 (4.0)
|
IM-LogicDesigner module of intra-mart Accel Platf… |
NTT DATA INTRAMART Corporation |
intra-mart Accel Platform |
2026-02-27T07:50:42.103Z | 2026-02-27T07:50:42.103Z |
| CVE-2026-0980 |
8.3 (3.1)
|
Rubyipmi: red hat satellite: remote code execution in … |
Red Hat |
Red Hat Satellite 6 |
2026-02-27T07:30:42.657Z | 2026-02-27T07:30:42.657Z |
| CVE-2026-0871 |
4.9 (3.1)
|
Org.keycloak/keycloak-services: keycloak: unauthorized… |
Red Hat |
Red Hat build of Keycloak 26.4 |
2026-02-27T07:30:26.766Z | 2026-02-27T07:30:26.766Z |
| CVE-2025-13327 |
6.3 (3.1)
|
Uv: uv: specially crafted zip archives lead to arbitra… |
astral-sh |
uv |
2026-02-27T07:30:20.131Z | 2026-02-27T07:30:20.131Z |
| CVE-2025-9909 |
6.7 (3.1)
|
Aap-gateway: improper path validation in gateway allow… |
Red Hat |
Red Hat Ansible Automation Platform 2.5 for RHEL 8 |
2026-02-27T07:30:00.885Z | 2026-02-27T18:43:09.098Z |
| CVE-2025-9908 |
6.7 (3.1)
|
Event-driven-ansible: sensitive internal headers discl… |
Red Hat |
Red Hat Ansible Automation Platform 2.5 for RHEL 8 |
2026-02-27T07:29:32.368Z | 2026-02-27T07:29:32.368Z |
| CVE-2025-9907 |
6.7 (3.1)
|
Event-driven-ansible: event stream test mode exposes s… |
Red Hat |
Red Hat Ansible Automation Platform 2.5 for RHEL 8 |
2026-02-27T07:29:06.070Z | 2026-02-27T14:42:36.482Z |
| CVE-2025-9572 |
5 (3.1)
|
Foreman: satellite: graphql api permission bypass lead… |
The Foreman |
Foreman |
2026-02-27T07:28:44.391Z | 2026-02-27T18:42:37.881Z |
| CVE-2025-15567 |
5.1 (4.0)
|
Insufficient protection mechanisms in the Health … |
vivo |
Health |
2026-02-27T06:54:29.817Z | 2026-02-27T18:41:41.980Z |
| CVE-2025-15509 |
7.1 (4.0)
|
The SmartRemote module has insufficient restricti… |
vivo |
SmartRemote |
2026-02-27T06:52:34.399Z | 2026-02-27T18:47:32.496Z |
| CVE-2025-12981 |
9.8 (3.1)
|
Listee <= 1.1.6 - Unauthenticated Privilege Escalation |
dreamstechnologies |
Listee |
2026-02-27T06:43:49.771Z | 2026-02-27T18:47:00.498Z |
| CVE-2025-14149 |
6.4 (3.1)
|
Xpro Addons — 140+ Widgets for Elementor <= 1.4.24 - A… |
xpro |
Xpro Addons — 140+ Widgets for Elementor |
2026-02-27T06:43:49.345Z | 2026-02-27T18:46:17.461Z |
| CVE-2025-14040 |
6.4 (3.1)
|
Automotive Car Dealership Business WordPress Theme <= … |
themesuite |
Automotive Car Dealership Business WordPress Theme |
2026-02-27T06:43:48.758Z | 2026-02-27T18:45:51.725Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2359 |
8.7 (4.0)
|
Multer vulnerable to Denial of Service via resource ex… |
expressjs |
multer |
2026-02-27T15:42:08.088Z | 2026-02-27T17:13:17.930Z |
| CVE-2026-3327 |
4.8 (4.0)
|
Authenticated DatoCMS Web Previews Plugin Iframe Injection |
DatoCMS |
Web Previews |
2026-02-27T14:09:38.150Z | 2026-02-27T18:44:26.847Z |
| CVE-2026-3223 |
8.4 (4.0)
|
Zip Slip leading to Arbitrary File Write and Privilege… |
Google |
Web Designer |
2026-02-27T13:12:38.809Z | 2026-02-27T14:37:58.045Z |
| CVE-2026-2751 |
8.3 (3.1)
|
Blind SQL Injection |
Centreon |
Centreon Web on Central Server |
2026-02-27T13:33:44.787Z | 2026-02-27T14:26:21.910Z |
| CVE-2025-15498 |
9.3 (4.0)
|
SQL Injection in Pro3W CMS |
Pro3W |
Pro3W CMS |
2026-02-27T13:51:53.006Z | 2026-02-27T14:19:48.682Z |
| CVE-2025-10990 |
7.5 (3.1)
|
Rexml: rexml: denial of service via inefficient regex … |
|
|
2026-02-27T13:32:02.309Z | 2026-02-27T18:43:57.501Z |
| CVE-2025-11950 |
6.3 (3.1)
|
Reflected XSS in Knowhy's EduAsist |
KNOWHY Advanced Technology Trading Ltd. Co. |
EduAsist |
2026-02-27T12:55:36.793Z | 2026-02-27T12:55:36.793Z |
| CVE-2025-11252 |
9.8 (3.1)
|
SQLi in Signum Technologies' windesk.fm |
Signum Technology Promotion and Training Inc. |
windesk.fm |
2026-02-27T12:32:33.594Z | 2026-02-27T12:32:33.594Z |
| CVE-2026-2831 |
4.9 (3.1)
|
MailArchiver <= 4.5.0 - Authenticated (Admininistrator… |
pierrelannoy |
MailArchiver |
2026-02-27T11:22:49.958Z | 2026-02-27T15:37:32.548Z |
| CVE-2026-24352 |
4.8 (4.0)
|
Session Fixation in PluXml CMS |
PluXml |
PluXml CMS |
2026-02-27T11:35:27.107Z | 2026-02-27T15:05:15.633Z |
| CVE-2026-24351 |
5.1 (4.0)
|
Stored XSS in PluXml CMS |
PluXml |
PluXml CMS |
2026-02-27T11:35:23.141Z | 2026-02-27T15:14:57.021Z |
| CVE-2026-24350 |
5.1 (4.0)
|
Stored XSS in PluXml CMS |
PluXml |
PluXml CMS |
2026-02-27T11:35:08.802Z | 2026-02-27T15:16:22.413Z |
| CVE-2025-11251 |
9.8 (3.1)
|
SQLi in Dayneks Software's E-Commerce Platform |
Dayneks Software Industry and Trade Inc. |
E-Commerce Platform |
2026-02-27T11:58:02.619Z | 2026-02-27T12:39:46.160Z |
| CVE-2026-1434 |
5.1 (4.0)
|
Reflected XSS in Omega-PSIR |
Politechnika Warszawska |
Omega-PSIR |
2026-02-27T10:32:53.339Z | 2026-02-27T15:38:38.137Z |
| CVE-2026-21660 |
6.9 (4.0)
|
Johnson Controls-Frick Quantum HD-Hardcoded Email Cred… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T09:18:49.186Z | 2026-02-27T16:17:45.915Z |
| CVE-2026-21659 |
8.7 (4.0)
|
Johnson Controls -Frick Quantum HD-Unauthenticated Rem… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T09:08:50.498Z | 2026-02-27T09:27:51.944Z |
| CVE-2026-1305 |
5.3 (3.1)
|
Japanized for WooCommerce <= 2.8.4 - Missing Authoriza… |
shoheitanaka |
Japanized for WooCommerce |
2026-02-27T09:23:43.326Z | 2026-02-27T15:39:31.362Z |
| CVE-2025-14142 |
6.4 (3.1)
|
Electric Enquiries <= 1.1 - Authenticated (Contributor… |
electriccode |
Electric Enquiries |
2026-02-27T09:23:42.947Z | 2026-02-27T15:56:02.212Z |
| CVE-2024-10938 |
6.5 (3.1)
|
OVRI Payment 1.7.0 - Malicious .htaccess directive |
moneytigo |
OVRI Payment |
2026-02-27T09:23:42.427Z | 2026-02-27T16:15:28.956Z |
| CVE-2026-2383 |
6.4 (3.1)
|
Simple Download Monitor <= 4.0.5 - Authenticated (Cont… |
mra13 |
Simple Download Monitor |
2026-02-27T08:24:19.262Z | 2026-02-27T08:24:19.262Z |
| CVE-2026-2362 |
6.4 (3.1)
|
WP Accessibility <= 2.3.1 - Authenticated (Contributor… |
joedolson |
WP Accessibility |
2026-02-27T08:24:19.792Z | 2026-02-27T08:24:19.792Z |
| CVE-2026-2252 |
7.5 (3.1)
|
XML External Entity (XXE) vulnerability resulting in S… |
Xerox |
FreeFlow Core |
2026-02-27T08:18:17.816Z | 2026-02-27T08:18:38.491Z |
| CVE-2026-2251 |
9.8 (3.1)
|
Path Traversal leading to Remote Code Execution (RCE) |
Xerox |
FreeFlow Core |
2026-02-27T08:08:52.263Z | 2026-02-27T08:18:56.212Z |
| CVE-2026-21658 |
8.8 (4.0)
|
Johnson Controls -Frick Quantum HD- Unauthenticated Re… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T08:59:13.878Z | 2026-02-27T13:07:55.620Z |
| CVE-2026-21657 |
8.8 (4.0)
|
Johnson Controls -Frick Quantum HD- Unauthenticated Re… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T08:54:28.236Z | 2026-02-27T08:54:28.236Z |
| CVE-2026-21656 |
8.8 (4.0)
|
Johnson Controls -Frick Quantum HD- Unauthenticated Re… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T08:47:21.490Z | 2026-02-27T08:47:21.490Z |
| CVE-2026-21654 |
8.8 (4.0)
|
Johnson Controls -Frick Quantum HD- Unauthenticated Re… |
Johnson Controls |
Frick Controls Quantum HD |
2026-02-27T08:38:42.472Z | 2026-02-27T09:24:44.300Z |
| CVE-2026-1627 |
6.5 (3.1)
|
An attacker may exploit the use of outdated and w… |
SICK AG |
SICK LMS1000 |
2026-02-27T08:43:30.581Z | 2026-02-27T08:43:30.581Z |
| CVE-2026-1626 |
6.5 (3.1)
|
An attacker may exploit the use of weak CBC-based… |
SICK AG |
SICK LMS1000 |
2026-02-27T08:40:53.328Z | 2026-02-27T08:40:53.328Z |
| CVE-2025-12150 |
3.1 (3.1)
|
Org.keycloak/keycloak-services: webauthn attestation s… |
Keycloak |
keycloak |
2026-02-27T08:10:15.448Z | 2026-02-27T08:10:15.448Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-5hwv-xjx8-73mr |
6.5 (3.1)
|
An attacker may exploit the use of weak CBC-based cipher suites in the device’s SSH service to pote… | 2026-02-27T09:30:29Z | 2026-02-27T09:30:29Z |
| ghsa-42rf-xhpv-2c8q |
6.4 (3.1)
|
The Xpro Addons — 140+ Widgets for Elementor plugin for WordPress is vulnerable to Stored Cross-Sit… | 2026-02-27T09:30:29Z | 2026-02-27T09:30:29Z |
| ghsa-3mcc-r9wq-f9g6 |
6.7 (3.1)
|
A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Strea… | 2026-02-27T09:30:29Z | 2026-02-27T09:30:29Z |
| ghsa-3j9h-rxgh-gc62 |
4.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in SourceCodester Doctor Appointment System 1.0. Affected by this is… | 2026-02-27T09:30:29Z | 2026-02-27T09:30:29Z |
| ghsa-38mc-hhxh-4rgq |
7.2 (3.1)
8.6 (4.0)
|
IM-LogicDesigner module of intra-mart Accel Platform contains insecure deserialization issue. This … | 2026-02-27T09:30:29Z | 2026-02-27T09:30:29Z |
| ghsa-2fx4-vwf2-pw99 |
6.7 (3.1)
|
A flaw was found in the Red Hat Ansible Automation Platform Gateway route creation component. This … | 2026-02-27T09:30:29Z | 2026-02-27T09:30:29Z |
| ghsa-rwvh-hmmf-wpqx |
6.3 (3.1)
2.1 (4.0)
|
A security vulnerability has been detected in jizhiCMS up to 2.5.6. Affected is the function findAl… | 2026-02-27T06:31:28Z | 2026-02-27T06:31:28Z |
| ghsa-pw4j-xhwf-vgmr |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in Sanluan PublicCMS 6.202506.d. This impacts the function saveMetad… | 2026-02-27T06:31:28Z | 2026-02-27T06:31:29Z |
| ghsa-m56j-8cwc-qgv8 |
6.7 (3.1)
5.4 (4.0)
|
The installers for multiple products provided by Soliton Systems K.K. contain an issue with incorre… | 2026-02-27T06:31:28Z | 2026-02-27T06:31:28Z |
| ghsa-jppp-pmhm-3cp9 |
9.8 (3.1)
8.9 (4.0)
|
A security flaw has been discovered in Totolink N300RH 6.1c.1353_B20190305. Affected by this vulner… | 2026-02-27T06:31:28Z | 2026-02-27T06:31:28Z |
| ghsa-j682-47rx-fxrp |
7.4 (3.1)
|
telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing s… | 2026-02-27T06:31:28Z | 2026-02-27T21:31:21Z |
| ghsa-gx6c-pv62-9mcf |
3.3 (3.1)
1.9 (4.0)
|
A weakness has been identified in snowflakedb snowflake-jdbc up to 4.0.1. Impacted is the function … | 2026-02-27T06:31:28Z | 2026-02-27T06:31:29Z |
| ghsa-g54x-7hpm-29q8 |
7.9 (3.1)
|
In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime… | 2026-02-27T06:31:28Z | 2026-02-27T06:31:28Z |
| ghsa-99wf-f9rf-jh8p |
7.8 (3.1)
|
Since the encryption algorithm used to protect firmware updates is itself encrypted using key mater… | 2026-02-27T06:31:28Z | 2026-02-27T06:31:28Z |
| ghsa-8xwf-cr4r-856r |
9.1 (3.1)
|
In the query parser in OpenStack Vitrage before 12.0.1, 13.0.0, 14.0.0, and 15.0.0, a user allowed … | 2026-02-27T06:31:28Z | 2026-02-27T06:31:28Z |
| ghsa-7mf8-hqh9-29fx |
6.3 (3.1)
2.1 (4.0)
|
A security flaw has been discovered in youlaitech youlai-mall 2.0.0. This affects the function list… | 2026-02-27T06:31:28Z | 2026-02-27T06:31:28Z |
| ghsa-7cj7-hvph-vvv7 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in itwanger paicoding 1.0.0/1.0.1/1.0.2/1.0.3. The impacted element … | 2026-02-27T06:31:28Z | 2026-02-27T06:31:28Z |
| ghsa-7977-c43c-xpwj |
9.9 (3.1)
|
OpenClaw is vulnerable to validation bypass through GNU long-option abbreviations in allowlist mode | 2026-02-27T06:31:28Z | 2026-02-28T02:17:24Z |
| ghsa-2r7h-m6jv-58qc |
5.3 (3.1)
|
The WP Recipe Maker plugin for WordPress is vulnerable to an Insecure Direct Object Reference (IDOR… | 2026-02-27T06:31:28Z | 2026-02-27T06:31:29Z |
| ghsa-23j5-87fx-hgc9 |
7.5 (3.1)
|
The Fluent Forms Pro Add On Pack plugin for WordPress is vulnerable to Insufficient Verification of… | 2026-02-27T06:31:28Z | 2026-02-27T06:31:28Z |
| ghsa-w79v-r93f-2r96 |
8.0 (3.1)
|
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an … | 2026-02-27T03:30:27Z | 2026-02-27T03:30:27Z |
| ghsa-vgf3-g7rx-ppgm |
8.8 (3.1)
7.4 (4.0)
|
A weakness has been identified in Tenda F453 1.0.0.3. This affects the function fromAddressNat of t… | 2026-02-27T03:30:27Z | 2026-02-27T03:30:27Z |
| ghsa-rgf4-44r9-4r27 |
4.3 (3.1)
|
A stack based buffer overflow exists in an API route of XWEB Pro version 1.12.1 and prior, enablin… | 2026-02-27T03:30:27Z | 2026-02-27T03:30:27Z |
| ghsa-pg5c-mhhq-cqhh |
3.3 (3.1)
1.9 (4.0)
|
A flaw has been found in libvips 8.19.0. This vulnerability affects the function vips_unpremultiply… | 2026-02-27T03:30:27Z | 2026-02-27T03:30:27Z |
| ghsa-pcpr-68v2-x3jj |
8.8 (3.1)
7.4 (4.0)
|
A security flaw has been discovered in Tenda F453 1.0.0.3. Affected by this issue is the function f… | 2026-02-27T03:30:27Z | 2026-02-27T03:30:27Z |
| ghsa-hvfh-m3g5-cq92 |
8.0 (3.1)
|
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an a… | 2026-02-27T03:30:27Z | 2026-02-27T03:30:27Z |
| ghsa-hv3r-jwfx-pvqr |
8.0 (3.1)
|
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an au… | 2026-02-27T03:30:27Z | 2026-02-27T03:30:27Z |
| ghsa-hjmm-353v-47h8 |
3.3 (3.1)
1.9 (4.0)
|
A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of th… | 2026-02-27T03:30:27Z | 2026-02-27T03:30:27Z |
| ghsa-gpj8-9gm3-6ppq |
8.4 (4.0)
|
Stack-based Buffer Overflow vulnerability in SimTech Systems, Inc. ThinkWise allows Remote Code Inc… | 2026-02-27T03:30:27Z | 2026-02-27T03:30:27Z |
| ghsa-fxcq-vv53-p6q5 |
3.7 (3.1)
|
An arbitrary file-read vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling unauthe… | 2026-02-27T03:30:27Z | 2026-02-27T03:30:27Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-182 |
|
Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive… | apache-airflow | 2024-11-15T09:15:14+00:00 | 2025-01-19T04:22:59.398988+00:00 |
| pysec-2024-204 |
8.1 (3.1)
|
TorchGeo Remote Code Execution Vulnerability | torchgeo | 2024-11-12T18:15:45+00:00 | 2025-01-19T19:19:01.299352+00:00 |
| pysec-2024-231 |
8.1 (3.1)
|
LightGBM Remote Code Execution Vulnerability | lightgbm | 2024-11-12T18:15:28+00:00 | 2025-02-15T07:20:34.246161+00:00 |
| pysec-2024-238 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-04-08T10:23:23.857960+00:00 |
| pysec-2024-183 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-01-19T04:22:59.576907+00:00 |
| pysec-2024-202 |
6.5 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:07+00:00 | 2025-01-19T16:22:59.212853+00:00 |
| pysec-2024-201 |
6.1 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:05+00:00 | 2025-01-19T16:22:59.154645+00:00 |
| pysec-2024-115 |
9.8 (3.1)
|
A vulnerability in the GraphCypherQAChain class of langchain-ai/langchain-community versi… | langchain | 2024-11-05T16:04:14Z | 2024-11-12T19:19:57.535206Z |
| pysec-2024-259 |
9.8 (3.1)
|
In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by m… | torch | 2024-10-29T21:15:04+00:00 | 2025-07-16T03:09:57.748865+00:00 |
| pysec-2024-211 |
7.5 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote clien… | waitress | 2024-10-29T15:15:12+00:00 | 2025-01-19T19:19:01.852094+00:00 |
| pysec-2024-210 |
4.8 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may… | waitress | 2024-10-29T15:15:11+00:00 | 2025-01-19T19:19:01.811922+00:00 |
| pysec-2024-119 |
7.5 (3.1)
|
A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Ser… | chuanhuchatgpt | 2024-10-29T13:15:00+00:00 | 2024-11-04T22:22:08.835024+00:00 |
| pysec-2024-116 |
9.0 (3.1)
|
A vulnerability in the discussion image upload function of the Lollms application, versio… | lollms | 2024-10-29T13:15:00+00:00 | 2024-11-01T21:22:09.060172+00:00 |
| pysec-2024-114 |
9.8 (3.1)
|
A vulnerability in the GraphCypherQAChain class of langchain-ai/langchainjs versions 0.2.… | langchain | 2024-10-29T13:15:00Z | 2024-11-04T19:21:44.923698Z |
| pysec-2024-113 |
4.3 (3.1)
|
In the latest version (20240628) of gaizhenbiao/chuanhuchatgpt, an issue exists in the /f… | chuanhuchatgpt | 2024-10-29T13:15:00+00:00 | 2024-10-31T19:20:49.353218+00:00 |
| pysec-2024-112 |
7.5 (3.1)
|
An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 2024062… | chuanhuchatgpt | 2024-10-29T13:15:00+00:00 | 2024-10-31T19:20:49.309758+00:00 |
| pysec-2024-111 |
9.1 (3.1)
|
A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langcha… | langchain | 2024-10-29T13:15:00Z | 2025-05-02T18:39:47.588215Z |
| pysec-2024-191 |
5.5 (3.1)
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2024-10-24T22:15:04+00:00 | 2025-01-19T10:22:29.812605+00:00 |
| pysec-2024-120 |
7.8 (3.1)
|
An issue in assimp v.5.4.3 allows a local attacker to execute arbitrary code via the Call… | pyassimp | 2024-10-24T21:15:00+00:00 | 2024-11-05T20:22:53.185968+00:00 |
| pysec-2024-248 |
7.8 (3.1)
|
OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its … | opencanary | 2024-10-14T21:15:12+00:00 | 2025-05-16T14:23:05.150356+00:00 |
| pysec-2024-122 |
4.4 (3.1)
|
A path traversal vulnerability exists in the api open_personality_folder endpoint of pari… | lollms | 2024-10-11T16:15:00+00:00 | 2024-11-15T20:23:01.816492+00:00 |
| pysec-2024-220 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.972580+00:00 |
| pysec-2024-219 |
9.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.897787+00:00 |
| pysec-2024-218 |
8.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.803143+00:00 |
| pysec-2024-217 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This is a **data … | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.723816+00:00 |
| pysec-2024-216 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.549944+00:00 |
| pysec-2024-199 |
3.7 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T16:22:57.938459+00:00 |
| pysec-2024-215 |
9.8 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T22:22:23.471780+00:00 |
| pysec-2024-198 |
4.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T16:22:57.845317+00:00 |
| pysec-2024-214 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.399444+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-992 | Malicious code in vl-ui-button (npm) | 2026-02-22T20:34:14Z | 2026-02-23T04:21:36Z |
| mal-2026-991 | Malicious code in vl-ui-breadcrumb (npm) | 2026-02-22T20:34:10Z | 2026-02-23T04:21:36Z |
| mal-2026-990 | Malicious code in vl-ui-body (npm) | 2026-02-22T20:34:10Z | 2026-02-23T04:21:36Z |
| mal-2026-993 | Malicious code in vl-ui-checkbox (npm) | 2026-02-22T20:34:08Z | 2026-02-23T04:21:36Z |
| mal-2026-987 | Malicious code in vl-ui-accessibility (npm) | 2026-02-22T20:10:05Z | 2026-02-23T04:21:36Z |
| mal-2026-989 | Malicious code in vl-ui-alert (npm) | 2026-02-22T19:59:59Z | 2026-02-23T04:21:36Z |
| mal-2026-984 | Malicious code in myasicapi (PyPI) | 2026-02-22T19:42:08Z | 2026-02-22T19:42:08Z |
| mal-2026-983 | Malicious code in tensorflow-opt (PyPI) | 2026-02-22T16:53:45Z | 2026-02-22T16:53:45Z |
| mal-2026-982 | Malicious code in trunket-dev-driver (PyPI) | 2026-02-22T14:51:28Z | 2026-02-22T14:51:28Z |
| mal-2026-981 | Malicious code in dt-fe-t2d-marketplace (npm) | 2026-02-22T07:22:23Z | 2026-02-23T04:21:32Z |
| mal-2026-980 | Malicious code in the-storyverse (npm) | 2026-02-22T06:15:43Z | 2026-02-23T04:21:36Z |
| mal-2026-979 | Malicious code in home-robot (PyPI) | 2026-02-22T04:48:51Z | 2026-02-22T04:48:51Z |
| mal-2026-978 | Malicious code in microsoft-cms-client (npm) | 2026-02-21T17:38:28Z | 2026-02-25T16:43:01Z |
| mal-2026-977 | Malicious code in airbnb-identity (PyPI) | 2026-02-20T19:56:56Z | 2026-02-20T19:56:56Z |
| mal-2026-975 | Malicious code in azure-postgresql-auth (npm) | 2026-02-20T17:55:01Z | 2026-02-23T04:21:31Z |
| mal-2026-976 | Malicious code in rollup-plugin-polyfill-swc (npm) | 2026-02-20T17:35:46Z | 2026-02-23T04:21:35Z |
| mal-2026-967 | Malicious code in parse-compat (npm) | 2026-02-20T16:59:56Z | 2026-02-23T04:21:35Z |
| mal-2026-972 | Malicious code in uudi (npm) | 2026-02-20T16:59:55Z | 2026-02-23T04:21:36Z |
| mal-2026-969 | Malicious code in scan-store (npm) | 2026-02-20T16:59:55Z | 2026-02-23T04:21:35Z |
| mal-2026-964 | Malicious code in naniod (npm) | 2026-02-20T16:59:55Z | 2026-02-23T04:21:34Z |
| mal-2026-963 | Malicious code in locale-loader-pro (npm) | 2026-02-20T16:59:55Z | 2026-02-23T04:21:34Z |
| mal-2026-957 | Malicious code in detect-cache (npm) | 2026-02-20T16:59:55Z | 2026-02-23T04:21:32Z |
| mal-2026-955 | Malicious code in crypto-locale (npm) | 2026-02-20T16:59:55Z | 2026-02-23T04:21:32Z |
| mal-2026-974 | Malicious code in yarsg (npm) | 2026-02-20T16:59:54Z | 2026-02-23T04:21:37Z |
| mal-2026-973 | Malicious code in veim (npm) | 2026-02-20T16:59:54Z | 2026-02-23T04:21:36Z |
| mal-2026-958 | Malicious code in ethres (npm) | 2026-02-20T16:59:54Z | 2026-02-23T04:21:32Z |
| mal-2026-970 | Malicious code in secp256 (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:35Z |
| mal-2026-968 | Malicious code in rimarf (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:35Z |
| mal-2026-965 | Malicious code in node-native-bridge (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:34Z |
| mal-2026-960 | Malicious code in hardhta (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:33Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0145 | FreeRDP: Mehrere Schwachstellen ermöglichen DoS und Codeausführung | 2026-01-19T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0144 | n8n: Schwachstelle ermöglicht Codeausführung | 2026-01-18T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0138 | Red Hat Enterprise Linux (gpsd): Mehrere Schwachstellen | 2026-01-18T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0136 | AMD EPYC-Prozessoren: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-15T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0135 | Google Fast Pair Bluetooth Protokoll: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-15T23:00:00.000+00:00 | 2026-01-20T23:00:00.000+00:00 |
| wid-sec-w-2026-0132 | GNU libc: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-15T23:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| wid-sec-w-2026-0129 | Golang Go: Mehrere Schwachstellen | 2026-01-15T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0125 | Red Hat Enterprise Linux (transfig): Schwachstelle ermöglicht Codeausführung | 2026-01-14T23:00:00.000+00:00 | 2026-01-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0121 | Drupal Module: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0119 | Linux Kernel: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0118 | GNU libc: Schwachstelle ermöglicht Codeausführung | 2026-01-14T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0116 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0114 | Red Hat OpenShift (github.com/sirupsen/logrus): Schwachstelle ermöglicht Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0113 | Red Hat Enterprise Linux (vsftpd): Schwachstelle ermöglicht Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-01-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0111 | FreeRDP: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0106 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0105 | Red Hat Developer Hub: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0098 | Node.js: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0096 | Google Android Pixel: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-01-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0090 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0088 | Fortinet FortiSandbox: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-01-13T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0086 | Linux Kernel: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0083 | Microsoft Windows : Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0080 | Microsoft Azure: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0068 | libpng (API-Funktionen): Mehrere Schwachstellen ermöglichen DoS und Offenlegung von Informationen | 2026-01-12T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0066 | avahi-daemon: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-12T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0062 | Red Hat Enterprise Linux (libsoup): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und Datenmanipulation | 2026-01-11T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0056 | MailPit: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-11T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0047 | CoreDNS: Schwachstelle ermöglicht Denial of Service | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0044 | libtasn1: Schwachstelle ermöglicht Denial of Service | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0388 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-12-10T13:35:58.314547Z | 2025-12-10T13:35:58.314547Z |
| ncsc-2025-0387 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-12-10T13:34:08.908897Z | 2025-12-10T13:34:08.908897Z |
| ncsc-2025-0386 | Kwetsbaarheden verholpen in Fortinet producten | 2025-12-10T09:51:34.918202Z | 2026-01-28T15:46:10.814803Z |
| ncsc-2025-0385 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-12-09T18:42:32.332749Z | 2025-12-09T18:42:32.332749Z |
| ncsc-2025-0384 | Kwetsbaarheden verholpen in Microsoft Office | 2025-12-09T18:40:33.839342Z | 2025-12-09T18:40:33.839342Z |
| ncsc-2025-0383 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-12-09T18:39:18.152251Z | 2025-12-09T18:39:18.152251Z |
| ncsc-2025-0382 | Kwetsbaarheden verholpen in Siemens producten | 2025-12-09T13:15:05.391966Z | 2025-12-09T13:15:05.391966Z |
| ncsc-2025-0381 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-12-08T08:23:21.965599Z | 2025-12-08T08:23:21.965599Z |
| ncsc-2025-0380 | Kwetsbaarheden verholpen in React Server Components | 2025-12-03T20:11:57.728117Z | 2025-12-05T12:13:36.590522Z |
| ncsc-2025-0379 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-12-02T13:25:17.745981Z | 2025-12-02T13:25:17.745981Z |
| ncsc-2025-0378 | Kwetsbaarheden verholpen in Mattermost | 2025-11-28T09:53:42.334621Z | 2025-11-28T09:53:42.334621Z |
| ncsc-2025-0377 | Kwetsbaarheden verholpen in GitLab | 2025-11-27T13:35:09.121804Z | 2025-11-27T13:35:09.121804Z |
| ncsc-2025-0376 | Kwetsbaarheden verholpen in SonicWall Email Security appliances | 2025-11-21T16:06:33.949861Z | 2025-11-21T16:06:33.949861Z |
| ncsc-2025-0375 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-21T16:06:14.387571Z | 2025-11-21T16:06:14.387571Z |
| ncsc-2025-0374 | Kwetsbaarheden verholpen in Arista EOS | 2025-11-20T11:48:20.126141Z | 2025-11-20T11:48:20.126141Z |
| ncsc-2025-0373 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2025-11-19T08:35:31.999400Z | 2025-11-19T08:35:31.999400Z |
| ncsc-2025-0372 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-19T08:34:59.616354Z | 2025-11-19T08:34:59.616354Z |
| ncsc-2025-0371 | Kwetsbaarheden verholpen in Google Chrome | 2025-11-18T09:01:31.984222Z | 2025-11-18T09:01:31.984222Z |
| ncsc-2025-0370 | Kwetsbaarheden verholpen in Cisco Unified Contact Center Express | 2025-11-18T07:04:55.173157Z | 2025-11-18T07:04:55.173157Z |
| ncsc-2025-0369 | Kwetsbaarheden verholpen in IBM AIX | 2025-11-18T07:03:55.766335Z | 2025-11-18T07:03:55.766335Z |
| ncsc-2025-0368 | Kwetsbaarheden verholpen in Zoom Workplace en Zoom Clients | 2025-11-18T07:02:36.696426Z | 2025-11-18T07:02:36.696426Z |
| ncsc-2025-0367 | Kwetsbaarheden verholpen in GitLab | 2025-11-18T07:01:35.502522Z | 2025-11-18T07:01:35.502522Z |
| ncsc-2025-0366 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-15T14:57:33.774388Z | 2025-11-15T14:57:33.774388Z |
| ncsc-2025-0365 | Kwetsbaarheden verholpen in Cisco Catalyst Center | 2025-11-14T12:55:27.227262Z | 2025-11-14T12:55:27.227262Z |
| ncsc-2025-0364 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-11-12T12:17:16.207233Z | 2025-11-12T12:17:16.207233Z |
| ncsc-2025-0363 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-11-12T11:52:08.634593Z | 2025-11-12T11:56:09.924799Z |
| ncsc-2025-0362 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-11-11T18:35:40.376220Z | 2025-11-11T18:35:40.376220Z |
| ncsc-2025-0361 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-11-11T18:34:39.453615Z | 2025-11-11T18:34:39.453615Z |
| ncsc-2025-0360 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2025-11-11T18:33:13.936830Z | 2025-11-11T18:33:13.936830Z |
| ncsc-2025-0359 | Kwetsbaarheden verholpen in Microsoft Office | 2025-11-11T18:31:27.092072Z | 2025-11-11T18:31:27.092072Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-626178 | SSA-626178: Stack-Based Buffer Overflow Vulnerability in JT2Go Before V2406.0003 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-540493 | SSA-540493: Kiosk Mode Escape Vulnerability in HiMed Cockpit Devices Before V11.6.2 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-430425 | SSA-430425: Multiple Vulnerabilities in SINEC Security Monitor before V4.9.0 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-368868 | SSA-368868: Multiple Vulnerabilities in WibuKey for Windows | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-254396 | SSA-254396: Vulnerability in Nozomi Guardian/CMC Before 24.3.1 on RUGGEDCOM APE1808 Devices | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-054046 | SSA-054046: Unauthenticated Information Disclosure in Web Server of SIMATIC S7-1500 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-969738 | SSA-969738: Denial of Service Vulnerability in SIMATIC S7-200 SMART Devices | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-869574 | SSA-869574: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-773256 | SSA-773256: Impact of Socket.IO CVE-2024-38355 on Siemens Industrial Products | 2024-09-10T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-765405 | SSA-765405: Multiple Vulnerabilities in SIMATIC RFID Readers | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-721642 | SSA-721642: Injection Vulnerability in SCALANCE W700 802.11 AX Family Before V2.4 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-673996 | SSA-673996: Buffer Overflow Vulnerability in Third-Party Component in SICAM and SITIPE Products | 2024-09-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-629254 | SSA-629254: Remote Code Execution Vulnerability in SIMATIC SCADA and PCS 7 systems | 2024-09-10T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-427715 | SSA-427715: Stack-Based Buffer Overflow Vulnerability in Tecnomatix Plant Simulation | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-423808 | SSA-423808: Multiple NULL Pointer Dereference Vulnerabilities in Industrial Products | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-417159 | SSA-417159: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-359713 | SSA-359713: Authorization Bypass Vulnerability in Industrial Edge Management | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-342438 | SSA-342438: Privilege Escalation Vulnerability in SINUMERIK ONE, SINUMERIK 840D and SINUMERIK 828D | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-039007 | SSA-039007: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-09-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-856475 | SSA-856475: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-784301 | SSA-784301: Multiple Vulnerabilities in SINEC NMS Before V3.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-720392 | SSA-720392: Multiple Vulnerabilities in Third-Party Components in Location Intelligence Before V4.4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-716317 | SSA-716317: Multiple Vulnerability in SINEC Traffic Analyzer Before V2.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-659443 | SSA-659443: Local Code Execution Vulnerabilities in COMOS Before V10.5 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-417547 | SSA-417547: Multiple Vulnerabilities in INTRALOG WMS Before V4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-357412 | SSA-357412: PRT File Parsing Vulnerability in NX Before V2406.3000 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-087301 | SSA-087301: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.1 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-857368 | SSA-857368: Multiple Vulnerabilities in Omnivise T3000 | 2024-08-02T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-071402 | SSA-071402: Multiple Vulnerabilities in SICAM Products | 2024-07-22T00:00:00Z | 2024-07-22T00:00:00Z |
| ssa-998949 | SSA-998949: Hard-coded Default Encryption Key in Mendix Encryption Module V10.0.0 and V10.0.1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2485 | Red Hat Security Advisory: Insights proxy Container Image | 2026-02-10T20:29:13+00:00 | 2026-02-17T09:27:57+00:00 |
| rhsa-2026:2483 | Red Hat Security Advisory: fence-agents security update | 2026-02-10T20:28:54+00:00 | 2026-02-16T19:48:45+00:00 |
| rhsa-2026:2470 | Red Hat Security Advisory: php:7.4 security update | 2026-02-10T20:28:13+00:00 | 2026-02-11T01:04:08+00:00 |
| rhsa-2026:2484 | Red Hat Security Advisory: pcs security update | 2026-02-10T20:17:03+00:00 | 2026-02-17T12:26:55+00:00 |
| rhsa-2026:2469 | Red Hat Security Advisory: pcs security update | 2026-02-10T19:17:43+00:00 | 2026-02-17T12:26:55+00:00 |
| rhsa-2026:2455 | Red Hat Security Advisory: brotli security update | 2026-02-10T18:32:23+00:00 | 2026-02-17T09:27:56+00:00 |
| rhsa-2026:2465 | Red Hat Security Advisory: pcs security update | 2026-02-10T18:26:38+00:00 | 2026-02-17T12:26:54+00:00 |
| rhsa-2026:2462 | Red Hat Security Advisory: pcs security update | 2026-02-10T17:54:59+00:00 | 2026-02-17T12:26:57+00:00 |
| rhsa-2026:2460 | Red Hat Security Advisory: resource-agents security update | 2026-02-10T17:46:24+00:00 | 2026-02-16T19:48:45+00:00 |
| rhsa-2026:2456 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.26.0 Release. | 2026-02-10T17:06:01+00:00 | 2026-02-17T12:41:43+00:00 |
| rhsa-2026:2452 | Red Hat Security Advisory: pcs security update | 2026-02-10T15:37:57+00:00 | 2026-02-17T12:26:53+00:00 |
| rhsa-2026:2454 | Red Hat Security Advisory: DevWorkspace Operator 0.39.0 release. | 2026-02-10T15:32:22+00:00 | 2026-02-17T12:41:43+00:00 |
| rhsa-2026:2453 | Red Hat Security Advisory: resource-agents security update | 2026-02-10T15:19:08+00:00 | 2026-02-16T19:48:46+00:00 |
| rhsa-2026:2449 | Red Hat Security Advisory: iperf3 security update | 2026-02-10T14:57:38+00:00 | 2026-02-10T19:02:49+00:00 |
| rhsa-2026:2448 | Red Hat Security Advisory: iperf3 security update | 2026-02-10T14:52:11+00:00 | 2026-02-10T19:02:48+00:00 |
| rhsa-2026:2441 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-10T13:45:07+00:00 | 2026-02-17T12:41:43+00:00 |
| rhsa-2026:2421 | Red Hat Security Advisory: nodejs:22 security update | 2026-02-10T12:58:58+00:00 | 2026-02-17T09:33:21+00:00 |
| rhsa-2026:2420 | Red Hat Security Advisory: nodejs:24 security update | 2026-02-10T12:54:52+00:00 | 2026-02-17T09:33:19+00:00 |
| rhsa-2026:2422 | Red Hat Security Advisory: nodejs:20 security update | 2026-02-10T12:54:32+00:00 | 2026-02-17T09:33:22+00:00 |
| rhsa-2026:2419 | Red Hat Security Advisory: python3.12 security update | 2026-02-10T12:54:11+00:00 | 2026-02-11T14:41:37+00:00 |
| rhsa-2026:2438 | Red Hat Security Advisory: pcs security update | 2026-02-10T12:35:01+00:00 | 2026-02-17T12:26:52+00:00 |
| rhsa-2026:2082 | Red Hat Security Advisory: OpenShift Container Platform 4.21.1 packages and security update | 2026-02-10T11:30:56+00:00 | 2026-02-17T08:02:11+00:00 |
| rhsa-2026:2410 | Red Hat Security Advisory: libsoup3 security update | 2026-02-10T11:21:51+00:00 | 2026-02-12T13:28:20+00:00 |
| rhsa-2026:2129 | Red Hat Security Advisory: OpenShift Container Platform 4.21.1 bug fix and security update | 2026-02-10T09:39:14+00:00 | 2026-02-17T08:02:17+00:00 |
| rhsa-2026:2400 | Red Hat Security Advisory: brotli security update | 2026-02-10T09:17:16+00:00 | 2026-02-17T09:27:56+00:00 |
| rhsa-2026:2399 | Red Hat Security Advisory: brotli security update | 2026-02-10T09:11:31+00:00 | 2026-02-17T09:27:59+00:00 |
| rhsa-2026:2402 | Red Hat Security Advisory: libsoup security update | 2026-02-10T09:11:21+00:00 | 2026-02-12T13:28:18+00:00 |
| rhsa-2026:2401 | Red Hat Security Advisory: brotli security update | 2026-02-10T09:06:53+00:00 | 2026-02-17T09:27:56+00:00 |
| rhsa-2026:2130 | Red Hat Security Advisory: OpenShift Container Platform 4.21.1 security and extras update | 2026-02-10T08:58:36+00:00 | 2026-02-17T08:02:18+00:00 |
| rhsa-2026:2396 | Red Hat Security Advisory: libsoup security update | 2026-02-10T08:45:31+00:00 | 2026-02-12T13:28:18+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-345-01 | Johnson Controls iSTAR | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| va-25-343-01 | Windscribe for Linux 'changeMTU' local privilege escalation | 2025-12-10T16:46:41Z | 2025-12-10T16:46:41Z |
| icsa-26-020-01 | Schneider Electric EcoStruxure Foxboro DCS (Update A) | 2025-12-09T08:00:00.000000Z | 2026-02-24T06:00:00.000000Z |
| icsa-25-352-02 | Schneider Electric EcoStruxure Foxboro DCS Advisor | 2025-12-09T08:00:00.000000Z | 2025-12-18T18:23:06.311869Z |
| icsa-25-343-01 | Universal Boot Loader (U-Boot) | 2025-12-09T07:00:00.000000Z | 2025-12-09T07:00:00.000000Z |
| icsa-25-343-03 | Multiple India-based CCTV Cameras (Update A)** | 2025-12-09T06:00:00.000000Z | 2026-02-05T06:00:00.000000Z |
| icsa-26-043-03 | Siemens COMOS | 2025-12-09T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-015-12 | Siemens SIMATIC CN 4100 | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-26-015-11 | Siemens RUGGEDCOM ROX II | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-26-015-06 | Siemens SINEC Security Monitor | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.907344Z |
| icsa-26-015-05 | Siemens RUGGEDCOM ROS | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.058931Z |
| icsa-26-008-01 | Hitachi Energy Asset Suite | 2025-12-09T00:00:00.000000Z | 2026-01-07T21:26:16.381953Z |
| icsa-25-352-05 | Siemens Interniche IP-Stack | 2025-12-09T00:00:00.000000Z | 2025-12-18T18:13:59.515670Z |
| icsa-25-345-09 | Siemens Gridscale X Prepay | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-08 | Siemens Energy Services | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-07 | Siemens Building X - Security Manager Edge Controller | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-06 | Siemens SINEMA Remote Connect Server | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-05 | Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-04 | Siemens IAM Client | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-338-07 | Advantech iView | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-06 | SolisCloud Monitoring Platform | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-05 | Sunbird DCIM dcTrack and Power IQ | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-04 | Johnson Controls iSTAR | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-03 | Johnson Controls OpenBlue Mobile Web Application for OpenBlue Workplace | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-02 | MAXHUB Pivot | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-01 | Mitsubishi Electric GX Works2 | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsma-25-336-01 | Mirion Medical EC2 Software NMIS BioDose | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-336-02 | Iskra iHUB and iHUB Lite | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-336-01 | Industrial Video & Control Longwatch | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-329-06 | SiRcom SMART Alert (SiSA) | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-fmc-html-inj-mqjrzrny | Cisco Secure Firewall Management Center Software HTML Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-ftd-cmdinj-phe7kmt | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-hcrlpfyn | Cisco Secure Firewall Management Center Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-authz-bypass-m7xhnau | Cisco Secure Firewall Management Center Software Authorization Bypass Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpnwebs-dos-hjbhmbsx | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpn-dos-mfpeka6e | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-ssltls-dos-ehw76vze | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SSL/TLS Certificate Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-19T16:32:05+00:00 |
| cisco-sa-asaftd-nat-dns-dos-bqhynhtm | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Network Address Translation DNS Inspection Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-http-file-huyx2jl4 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-dhcp-qj7ngs4n | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software DHCP Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-cmdinj-vehfezq3 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Authenticated Command Injection Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-ftd-ios-dos-doeshwhy | Cisco IOS, IOS XE, Secure Firewall Adaptive Security Appliance, and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-ftd-acl-bypass-mtpze9yh | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Access Control Rules Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-buffer-overflow-pyruhwbc | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Web Services Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-3100_4200_tlsdos-2ynscd54 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 3100 and 4200 Series TLS 1.3 Cipher Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-03T13:37:50+00:00 |
| cisco-sa-webex-join-ynxfqhk4 | Cisco Webex Meeting Client Join Certificate Validation Vulnerability | 2025-08-06T16:00:00+00:00 | 2025-08-06T16:00:00+00:00 |
| cisco-sa-ise_xss_acc_cont-ysr4ut4u | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2025-08-06T16:00:00+00:00 | 2025-08-06T16:00:00+00:00 |
| cisco-sa-piepnm-bsi-25jjqsbb | Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-ise-multi-3vpsxoxo | Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-cuis-ssrf-jsudjev | Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-cuis-file-upload-uhnetstm | Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-spaces-conn-privesc-kgd2ccdu | Cisco Spaces Connector Privilege Escalation Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-ece-xss-cbtkteyc | Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-cucm-ssh-m4ubdpe7 | Cisco Unified Communications Manager Static SSH Credentials Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-broadworks-xss-o696ymra | Cisco BroadWorks CommPilot Application Software Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-10-21T15:13:31+00:00 |
| cisco-sa-ise-unauth-rce-zad2gnj6 | Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities | 2025-06-25T16:00:00+00:00 | 2025-07-24T23:30:31+00:00 |
| cisco-sa-ise-auth-bypass-mvfkvqau | Cisco Identity Services Engine Authorization Bypass Vulnerability | 2025-06-25T16:00:00+00:00 | 2025-06-25T16:00:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-sm5gcfm7 | Cisco Meraki MX and Z Series AnyConnect VPN with Client Certificate Authentication Denial of Service Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-clamav-udf-hmwd9ndy | ClamAV UDF File Parsing Out-of-Bounds Read Information Disclosure Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-vos-command-inject-65s2ucyy | Cisco Unified Communications Products Command Injection Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-2243 | Qemu-kvm: heap buffer out-of-bounds read in vmdk compressed grain parsing | 2026-02-02T00:00:00.000Z | 2026-02-24T14:04:04.000Z |
| msrc_cve-2026-21863 | Malformed Valkey Cluster bus message can lead to Remote DoS | 2026-02-02T00:00:00.000Z | 2026-02-26T14:36:37.000Z |
| msrc_cve-2026-21620 | TFTP Path Traversal | 2026-02-02T00:00:00.000Z | 2026-02-27T01:36:54.000Z |
| msrc_cve-2026-1979 | mruby JMPNOT-to-JMPIF Optimization vm.c mrb_vm_exec use after free | 2026-02-02T00:00:00.000Z | 2026-02-21T04:27:59.000Z |
| msrc_cve-2026-1703 | Limited path traversal when installing wheel archives | 2026-02-02T00:00:00.000Z | 2026-02-21T04:28:04.000Z |
| msrc_cve-2025-71237 | nilfs2: Fix potential block overflow that cause system hang | 2026-02-02T00:00:00.000Z | 2026-02-21T04:29:34.000Z |
| msrc_cve-2025-71236 | scsi: qla2xxx: Validate sp before freeing associated memory | 2026-02-02T00:00:00.000Z | 2026-02-21T04:29:23.000Z |
| msrc_cve-2025-71235 | scsi: qla2xxx: Delay module unload while fabric scan in progress | 2026-02-02T00:00:00.000Z | 2026-02-21T04:28:51.000Z |
| msrc_cve-2025-71234 | wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add | 2026-02-02T00:00:00.000Z | 2026-02-21T04:29:07.000Z |
| msrc_cve-2025-71233 | PCI: endpoint: Avoid creating sub-groups asynchronously | 2026-02-02T00:00:00.000Z | 2026-02-21T04:29:18.000Z |
| msrc_cve-2025-71232 | scsi: qla2xxx: Free sp in error path to fix system crash | 2026-02-02T00:00:00.000Z | 2026-02-21T04:29:39.000Z |
| msrc_cve-2025-71231 | crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode | 2026-02-02T00:00:00.000Z | 2026-02-21T04:28:41.000Z |
| msrc_cve-2025-71230 | hfs: ensure sb->s_fs_info is always cleaned up | 2026-02-02T00:00:00.000Z | 2026-02-26T01:37:27.000Z |
| msrc_cve-2025-71229 | wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon() | 2026-02-02T00:00:00.000Z | 2026-02-21T04:29:13.000Z |
| msrc_cve-2025-71228 | LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED | 2026-02-02T00:00:00.000Z | 2026-02-21T04:26:37.000Z |
| msrc_cve-2025-71227 | wifi: mac80211: don't WARN for connections on invalid channels | 2026-02-02T00:00:00.000Z | 2026-02-21T04:27:25.000Z |
| msrc_cve-2025-71226 | wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP | 2026-02-02T00:00:00.000Z | 2026-02-21T04:27:30.000Z |
| msrc_cve-2025-71225 | md: suspend array while updating raid_disks via sysfs | 2026-02-02T00:00:00.000Z | 2026-02-21T04:27:13.000Z |
| msrc_cve-2025-69873 | ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., "^(a|a)*$") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation. | 2026-02-02T00:00:00.000Z | 2026-02-27T01:01:37.000Z |
| msrc_cve-2025-69299 | WordPress Oxygen theme <= 6.0.8 - Server Side Request Forgery (SSRF) vulnerability | 2026-02-02T00:00:00.000Z | 2026-02-24T14:03:49.000Z |
| msrc_cve-2025-67733 | Valkey Affected by RESP Protocol Injection via Lua error_reply | 2026-02-02T00:00:00.000Z | 2026-02-26T14:36:30.000Z |
| msrc_cve-2025-62878 | Local Path Provisioner vulnerable to Path Traversal via parameters.pathPattern | 2026-02-02T00:00:00.000Z | 2026-02-26T01:02:12.000Z |
| msrc_cve-2025-61145 | libtiff up to v4.7.1 was discovered to contain a double free via the component tools/tiffcrop.c. | 2026-02-02T00:00:00.000Z | 2026-02-26T01:01:48.000Z |
| msrc_cve-2025-61144 | libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function. | 2026-02-02T00:00:00.000Z | 2026-02-26T14:36:23.000Z |
| msrc_cve-2025-61143 | libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via the component libtiff/tif_open.c. | 2026-02-02T00:00:00.000Z | 2026-02-26T14:36:13.000Z |
| msrc_cve-2025-11563 | wcurl path traversal with percent-encoded slashes | 2026-02-02T00:00:00.000Z | 2026-02-26T01:02:25.000Z |
| msrc_cve-2026-24307 | M365 Copilot Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-24306 | Azure Front Door Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-24305 | Azure Entra ID Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-24304 | Azure Resource Manager Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201001-0692 | The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on… | 2025-12-22T23:33:45.162000Z |
| var-201410-1144 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0… | 2025-12-22T23:33:44.307000Z |
| var-200809-0182 | ImageIO in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows context-dependent attack… | 2025-12-22T23:33:41.897000Z |
| var-201806-1437 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2025-12-22T23:33:41.467000Z |
| var-201006-1240 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2025-12-22T23:33:35.537000Z |
| var-201703-0328 | The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0… | 2025-12-22T23:32:53.965000Z |
| var-201905-0095 | A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execut… | 2025-12-22T23:32:53.178000Z |
| var-201211-0319 | Race condition in WebKit in Apple iOS before 6.0.1 and Safari before 6.0.2 allows remote … | 2025-12-22T23:32:50.508000Z |
| var-202002-1478 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T23:32:50.434000Z |
| var-201702-0868 | An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari … | 2025-12-22T23:31:12.205000Z |
| var-200806-0425 | Unspecified vulnerability in WebKit in Apple Safari before 3.1.2, as distributed in Mac O… | 2025-12-22T23:31:11.969000Z |
| var-201304-0379 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:31:11.435000Z |
| var-201912-0610 | A memory corruption issue was addressed by removing the vulnerable code. This issue is fi… | 2025-12-22T23:31:11.351000Z |
| var-201205-0297 | The Linux kernel before 3.3.1, when KVM is used, allows guest OS users to cause a denial … | 2025-12-22T23:31:11.075000Z |
| var-202105-0257 | An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and… | 2025-12-22T23:30:32.809000Z |
| var-200611-0487 | com.apple.AppleDiskImageController in Apple Mac OS X 10.4.8, and possibly other versions,… | 2025-12-22T23:30:31.842000Z |
| var-202206-1106 | Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an… | 2025-12-22T23:30:31.306000Z |
| var-200704-0226 | Apple File Protocol (AFP) Client in Apple Mac OS X 10.3.9 through 10.4.9 does not properl… | 2025-12-22T23:30:24.327000Z |
| var-201904-1460 | A cross-site scripting issue existed in Safari. This issue was addressed with improved UR… | 2025-12-22T23:30:10.190000Z |
| var-200704-0219 | The Login Window in Apple Mac OS X 10.4 through 10.4.9 displays the software update windo… | 2025-12-22T23:30:08.645000Z |
| var-202105-1311 | A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in … | 2025-12-22T23:30:08.009000Z |
| var-201310-0353 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, a… | 2025-12-22T23:29:53.196000Z |
| var-200505-0310 | The x-man-page: URI handler for Apple Terminal 1.4.4 in Mac OS X 10.3.9 does not cleanse … | 2025-12-22T23:28:18.822000Z |
| var-201904-1405 | A consistency issue existed in the handling of application snapshots. The issue was addre… | 2025-12-22T23:28:11.093000Z |
| var-202002-1182 | A logic issue was addressed with improved state management. This issue is fixed in iOS 13… | 2025-12-22T23:28:09.983000Z |
| var-201912-1851 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T23:27:26.859000Z |
| var-201412-0613 | Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers … | 2025-12-22T23:26:55.953000Z |
| var-200210-0102 | Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a deni… | 2025-12-22T23:25:54.843000Z |
| var-201206-0058 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:25:24.235000Z |
| var-200704-0213 | load_webdav in Apple Mac OS X 10.3.9 through 10.4.9 does not properly clean the environme… | 2025-12-22T23:25:23.632000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000074 | Multiple vulnerabilities in desknet's NEO | 2025-10-16T17:30+09:00 | 2025-10-16T17:30+09:00 |
| jvndb-2025-000076 | Multiple vulnerabilities in ChatLuck | 2025-10-16T17:17+09:00 | 2025-10-16T17:17+09:00 |
| jvndb-2025-000087 | Ruijie Networks RG-EST300 undocumented SSH functionality | 2025-10-16T14:19+09:00 | 2025-10-16T14:19+09:00 |
| jvndb-2025-016124 | Buffalo Wi-Fi router WXR9300BE6P series vulnerable to path traversal | 2025-10-16T11:16+09:00 | 2025-10-16T11:16+09:00 |
| jvndb-2025-000085 | Multiple RSUPPORT products may insecurely load Dynamic Link Libraries | 2025-10-15T15:55+09:00 | 2025-10-15T15:55+09:00 |
| jvndb-2025-000086 | Phoenix Contact CHARX SEC-3xxx vulnerable to code injection | 2025-10-15T15:54+09:00 | 2025-10-15T15:54+09:00 |
| jvndb-2025-000083 | BUFFALO NAS Navigator2 registers a Windows service with an unquoted file path | 2025-10-10T13:56+09:00 | 2025-10-10T13:56+09:00 |
| jvndb-2025-015451 | Multiple vulnerabilities in FUJI Electric V-SFT | 2025-10-09T13:39+09:00 | 2025-10-09T13:39+09:00 |
| jvndb-2025-000082 | The installers of DENSO TEN drive recorder viewer may insecurely load Dynamic Link Libraries | 2025-10-06T15:38+09:00 | 2025-10-06T15:38+09:00 |
| jvndb-2025-015061 | Trend Micro Antivirus for Mac vulnerable to Local Privilege Escalation | 2025-10-06T13:52+09:00 | 2025-10-06T13:52+09:00 |
| jvndb-2025-014967 | Multiple vulnerabilities in multiple Keyence products | 2025-10-03T11:19+09:00 | 2025-12-23T14:36+09:00 |
| jvndb-2025-014793 | NIHON KOHDEN Central Monitor CNS-6201 vulnerable to NULL pointer dereference | 2025-10-01T11:35+09:00 | 2025-10-27T12:28+09:00 |
| jvndb-2025-014642 | Multiple vulnerabilities in Canon Printer Drivers for Production Printers, Office/Small Office Multifunction Printers and Laser Printers | 2025-09-30T11:50+09:00 | 2025-09-30T11:50+09:00 |
| jvndb-2025-000081 | DataSpider Servista improper restriction of XML external entity references | 2025-09-29T14:44+09:00 | 2025-10-07T16:54+09:00 |
| jvndb-2025-014105 | OMRON SOCIAL SOLUTIONS Uninterruptible Power Supply (UPS) management application registers a Windows service with an unquoted file path | 2025-09-19T16:21+09:00 | 2025-09-19T16:21+09:00 |
| jvndb-2025-014104 | Multiple vulnerabilities in I-O DATA wireless LAN routers | 2025-09-19T14:58+09:00 | 2025-09-19T14:58+09:00 |
| jvndb-2025-014081 | Multiple Brother and its OEM products with weak initial administrator passwords | 2025-09-19T10:52+09:00 | 2025-09-19T10:52+09:00 |
| jvndb-2025-000079 | UNIVERGE IX/IX-R/IX-V series routers provided by NEC Corporation vulnerable to cross-site scripting | 2025-09-18T17:43+09:00 | 2025-09-18T17:43+09:00 |
| jvndb-2025-000078 | Century HW RAID Manager registers a Windows service with an unquoted file path | 2025-09-17T13:45+09:00 | 2025-09-17T13:45+09:00 |
| jvndb-2025-000048 | WTW-EAGLE App vulnerable to improper server certificate validation | 2025-09-12T13:57+09:00 | 2025-09-12T13:57+09:00 |
| jvndb-2025-000077 | RICOH Streamline NX vulnerable to tampering with operation history | 2025-09-08T13:42+09:00 | 2025-09-24T16:53+09:00 |
| jvndb-2025-000072 | Obsidian GitHub Copilot Plugin stores sensitive information in cleartext | 2025-09-05T16:52+09:00 | 2025-09-05T16:52+09:00 |
| jvndb-2025-000073 | RATOC RAID Monitoring Manager for Windows registers a Windows service with an unquoted file path | 2025-09-05T16:20+09:00 | 2025-09-05T16:20+09:00 |
| jvndb-2025-000071 | "Yahoo! Shopping" App for Android fails to restrict custom URL schemes properly | 2025-09-05T15:12+09:00 | 2025-09-05T15:12+09:00 |
| jvndb-2025-000075 | Multiple vulnerabilities in TkEasyGUI | 2025-09-05T14:53+09:00 | 2025-09-05T14:53+09:00 |
| jvndb-2025-000069 | Web Caster V130 vulnerable to cross-site request forgery | 2025-09-03T14:23+09:00 | 2025-09-03T14:23+09:00 |
| jvndb-2025-000070 | "Gunosy" App vulnerable to insertion of sensitive information into sent data | 2025-09-02T14:20+09:00 | 2025-09-09T09:51+09:00 |
| jvndb-2025-000068 | Seiko Solutions SkyBridge BASIC MB-A130 vulnerable to OS command injection | 2025-09-01T16:21+09:00 | 2025-09-01T16:21+09:00 |
| jvndb-2025-012659 | Denial-of-service (DoS) vulnerability in Konica Minolta bizhub series | 2025-09-01T15:22+09:00 | 2025-09-01T15:22+09:00 |
| jvndb-2025-000067 | Multiple vulnerabilities in multiple iND products | 2025-08-29T14:47+09:00 | 2025-08-29T14:47+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0420-1 | Security update for python-pip | 2026-02-10T14:18:13Z | 2026-02-10T14:18:13Z |
| suse-su-2026:0419-1 | Security update for libsoup2 | 2026-02-10T14:15:53Z | 2026-02-10T14:15:53Z |
| suse-su-2026:0418-1 | Security update for libsoup2 | 2026-02-10T14:15:42Z | 2026-02-10T14:15:42Z |
| suse-su-2026:0417-1 | Security update for freerdp | 2026-02-10T14:14:15Z | 2026-02-10T14:14:15Z |
| suse-su-2026:0415-1 | Security update for java-17-openjdk | 2026-02-10T08:35:23Z | 2026-02-10T08:35:23Z |
| suse-su-2026:0414-1 | Security update for java-11-openjdk | 2026-02-10T08:33:15Z | 2026-02-10T08:33:15Z |
| suse-su-2026:0412-1 | Security update for abseil-cpp | 2026-02-10T06:43:35Z | 2026-02-10T06:43:35Z |
| suse-su-2026:0411-1 | Security update for the Linux Kernel | 2026-02-09T14:51:43Z | 2026-02-09T14:51:43Z |
| suse-su-2026:0399-1 | Security update for kubernetes-old | 2026-02-06T12:06:39Z | 2026-02-06T12:06:39Z |
| suse-su-2026:0397-1 | Security update for cockpit-machines | 2026-02-06T08:02:32Z | 2026-02-06T08:02:32Z |
| suse-su-2026:0396-1 | Security update for cockpit-machines | 2026-02-06T08:02:20Z | 2026-02-06T08:02:20Z |
| suse-su-2026:0395-1 | Security update for sqlite3 | 2026-02-06T08:02:10Z | 2026-02-06T08:02:10Z |
| suse-su-2026:0385-1 | Security update for the Linux Kernel | 2026-02-04T12:55:07Z | 2026-02-04T12:55:07Z |
| suse-su-2026:0384-1 | Security update for ImageMagick | 2026-02-04T12:46:45Z | 2026-02-04T12:46:45Z |
| suse-su-2026:0383-1 | Security update for rekor | 2026-02-04T12:46:28Z | 2026-02-04T12:46:28Z |
| suse-su-2026:0382-1 | Security update for java-1_8_0-ibm | 2026-02-04T12:45:58Z | 2026-02-04T12:45:58Z |
| suse-su-2026:0381-1 | Security update for abseil-cpp | 2026-02-04T09:34:53Z | 2026-02-04T09:34:53Z |
| suse-su-2026:0379-1 | Security update for cockpit-podman | 2026-02-04T07:38:28Z | 2026-02-04T07:38:28Z |
| suse-su-2026:0378-1 | Security update for gpg2 | 2026-02-04T07:38:13Z | 2026-02-04T07:38:13Z |
| suse-su-2026:0377-1 | Security update for libheif | 2026-02-04T07:37:59Z | 2026-02-04T07:37:59Z |
| suse-su-2026:0375-1 | Security update for libvirt | 2026-02-04T07:37:40Z | 2026-02-04T07:37:40Z |
| suse-su-2026:0374-1 | Security update for protobuf | 2026-02-04T07:03:36Z | 2026-02-04T07:03:36Z |
| suse-su-2026:0373-1 | Security update for glib2 | 2026-02-04T02:50:42Z | 2026-02-04T02:50:42Z |
| suse-su-2026:0372-1 | Security update for glib2 | 2026-02-04T01:43:44Z | 2026-02-04T01:43:44Z |
| suse-su-2026:0371-1 | Security update for glibc | 2026-02-03T18:08:50Z | 2026-02-03T18:08:50Z |
| suse-su-2026:0369-1 | Security update for the Linux Kernel | 2026-02-03T13:42:47Z | 2026-02-03T13:42:47Z |
| suse-su-2026:0368-1 | Security update for libsodium | 2026-02-03T13:40:57Z | 2026-02-03T13:40:57Z |
| suse-su-2026:0367-1 | Security update for python-urllib3 | 2026-02-03T13:09:47Z | 2026-02-03T13:09:47Z |
| suse-su-2026:0366-1 | Security update for util-linux | 2026-02-03T12:53:11Z | 2026-02-03T12:53:11Z |
| suse-su-2026:0364-1 | Security update for libpng16 | 2026-02-03T09:50:54Z | 2026-02-03T09:50:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10124-1 | golang-github-prometheus-prometheus-3.9.1-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10123-1 | freerdp-3.21.0-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10122-1 | fontforge-20251009-4.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10121-1 | chromedriver-144.0.7559.109-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10120-1 | MozillaFirefox-147.0.2-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10119-1 | ImageMagick-7.1.2.13-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:20134-1 | Security update for java-17-openjdk | 2026-01-29T17:44:57Z | 2026-01-29T17:44:57Z |
| opensuse-su-2026:20133-1 | Security update for glibc | 2026-01-29T17:44:57Z | 2026-01-29T17:44:57Z |
| opensuse-su-2026:20137-1 | Security update for openvpn | 2026-01-29T16:14:38Z | 2026-01-29T16:14:38Z |
| opensuse-su-2026:20136-1 | Security update for gpg2 | 2026-01-29T16:14:38Z | 2026-01-29T16:14:38Z |
| opensuse-su-2026:20132-1 | Security update for elemental-register, elemental-toolkit | 2026-01-29T15:32:26Z | 2026-01-29T15:32:26Z |
| opensuse-su-2026:20127-1 | Security update for python-urllib3 | 2026-01-29T14:48:50Z | 2026-01-29T14:48:50Z |
| opensuse-su-2026:20131-1 | Security update for postgresql17 and postgresql18 | 2026-01-29T13:21:20Z | 2026-01-29T13:21:20Z |
| opensuse-su-2026:20130-1 | Security update for postgresql16 | 2026-01-29T10:55:17Z | 2026-01-29T10:55:17Z |
| opensuse-su-2026:10118-1 | xen-4.21.0_04-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10117-1 | python314-3.14.2-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10116-1 | python311-pypdf-6.6.2-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10115-1 | python311-djangorestframework-3.16.1-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10114-1 | logback-1.2.13-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10113-1 | icinga2-2.15.2-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10112-1 | dirmngr-2.5.17-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10111-1 | gio-branding-upstream-2.86.3-3.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:20126-1 | Security update for java-21-openjdk | 2026-01-28T16:43:12Z | 2026-01-28T16:43:12Z |
| opensuse-su-2026:20125-1 | Security update for python-python-multipart | 2026-01-28T16:07:51Z | 2026-01-28T16:07:51Z |
| opensuse-su-2026:20124-1 | Security update for ucode-amd | 2026-01-28T16:01:59Z | 2026-01-28T16:01:59Z |
| opensuse-su-2026:20122-1 | Security update for python-h2 | 2026-01-28T15:52:29Z | 2026-01-28T15:52:29Z |
| opensuse-su-2026:20123-1 | Security update for xkbcomp | 2026-01-28T15:47:30Z | 2026-01-28T15:47:30Z |
| opensuse-su-2026:20120-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-01-28T10:27:58Z | 2026-01-28T10:27:58Z |
| opensuse-su-2026:20119-1 | Security update for python-FontTools | 2026-01-28T09:58:53Z | 2026-01-28T09:58:53Z |
| opensuse-su-2026:20118-1 | Security update for ImageMagick | 2026-01-28T08:27:48Z | 2026-01-28T08:27:48Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2023-283-01 | SpaceLogic C-Bus Toolkit | 2023-10-10T12:00:34.000Z | 2023-10-10T12:00:34.000Z |
| sevd-2023-255-01 | IGSS (Interactive Graphical SCADA System) | 2023-09-12T10:52:23.000Z | 2023-09-12T10:52:23.000Z |
| sevd-2023-220-01 | Pro-face GP-Pro EX | 2023-08-08T06:32:38.000Z | 2023-08-08T06:32:38.000Z |
| sevd-2023-192-01 | StruxureWare Data Center Expert | 2023-07-11T07:37:38.000Z | 2023-07-11T07:37:38.000Z |
| sevd-2023-192-04 | CODESYS Runtime Vulnerabilities | 2023-07-11T07:15:18.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2023-192-02 | EcoStruxure™ OPC UA Server Expert | 2023-07-11T07:01:56.000Z | 2024-08-13T07:00:00.000Z |
| sevd-2023-192-03 | Accutech Manager | 2023-07-11T06:49:15.000Z | 2023-07-11T06:49:15.000Z |
| sevd-2023-164-03 | Foxboro SCADA | 2023-06-13T12:34:32.000Z | 2023-06-13T12:34:32.000Z |
| sevd-2023-164-02 | IGSS (Interactive Graphical SCADA System) | 2023-06-13T11:43:59.000Z | 2023-06-13T11:43:59.000Z |
| sevd-2023-164-04 | EcoStruxureTM Foxboro DCS Control Core Services | 2023-06-13T09:20:49.000Z | 2023-06-13T09:20:49.000Z |
| sevd-2023-164-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2023-06-13T09:08:30.000Z | 2023-06-13T09:08:30.000Z |
| sevd-2023-129-01 | OPC Factory Server | 2023-05-09T16:33:38.000Z | 2023-05-09T16:33:38.000Z |
| sevd-2023-129-03 | PowerLogic ION7400 / PM8000 / ION9000 Power Meters | 2023-05-09T16:02:26.000Z | 2023-05-09T16:02:26.000Z |
| sevd-2023-129-02 | EcoStruxure™ Power SCADA Operation | 2023-05-09T11:52:40.000Z | 2023-05-09T11:52:40.000Z |
| sevd-2023-129-04 | Power SCADA Anywhere | 2023-05-09T08:00:55.000Z | 2023-05-09T08:00:55.000Z |
| sevd-2023-101-06 | Easergy Builder | 2023-04-11T14:20:02.000Z | 2023-04-11T14:20:02.000Z |
| sevd-2023-101-04 | Easy UPS Online Monitoring Software | 2023-04-11T14:09:13.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2023-101-02 | Conext™ Gateway/ InsightHome and InsightFacility | 2023-04-11T14:01:38.000Z | 2023-04-11T14:01:38.000Z |
| sevd-2023-101-01 | CODESYS Runtime Vulnerabilities | 2023-04-11T13:31:49.000Z | 2024-01-09T13:31:00.000Z |
| sevd-2023-101-03 | EcoStruxure™ Control Expert | 2023-04-11T10:14:15.000Z | 2024-01-09T10:14:00.000Z |
| sevd-2023-101-05 | Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-04-11T09:46:26.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-073-04 | IGSS (Interactive Graphical SCADA System) | 2023-03-14T10:58:24.000Z | 2023-03-14T10:58:24.000Z |
| sevd-2023-073-02 | PowerLogic™ HDPM6000 | 2023-03-14T09:26:56.000Z | 2023-03-14T09:26:56.000Z |
| sevd-2023-073-01 | EcoStruxure™ Power Monitoring Expert | 2023-03-14T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-045-02 | StruxureWare Data Center Expert | 2023-02-14T08:05:19.000Z | 2023-02-14T08:05:19.000Z |
| sevd-2023-045-03 | Merten KNX devices | 2023-02-14T07:24:05.000Z | 2023-02-14T07:24:05.000Z |
| sevd-2023-045-01 | EcoStruxureTM Geo SCADA Expert | 2023-02-14T06:02:05.000Z | 2023-02-14T06:02:05.000Z |
| sevd-2023-010-03 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2023-01-10T17:44:20.000Z | 2023-01-10T17:44:20.000Z |
| sevd-2023-010-02 | EcoStruxure Geo SCADA Expert | 2023-01-10T16:24:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2023-010-05 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-01-10T15:41:57.000Z | 2024-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2026-21865 | Discourse topic conversion permission vulnerability for moderators | 2026-02-02T08:42:28.354Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-69289 | Discourse has insecure default configuration that allows non-admin moderators to takeover any non-staff account via email change | 2026-02-02T08:42:26.675Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-69218 | Discourse moderators can access admin-only reports exposing private upload URLs | 2026-02-02T08:42:24.998Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68934 | Discourse Has Denial of Service (DoS) Vulnerability in Drafts Creation Endpoint | 2026-02-02T08:42:23.259Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68933 | Discourse non-admin moderators can exfiltrate private content via post ownership transfer | 2026-02-02T08:42:21.302Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68666 | Discourse users archives leaked to users with moderation privileges | 2026-02-02T08:42:19.452Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68662 | FinalDestination hostname matching allows SSRF protection bypass | 2026-02-02T08:42:17.844Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68660 | Discourse AI Discover's continue conversation allows threat actor to impersonate user | 2026-02-02T08:42:16.289Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68659 | Discourse has DoS vulnerability in username change endpoint | 2026-02-02T08:42:14.606Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68479 | Discourse subscriptions are susceptible to takeover | 2026-02-02T08:42:12.613Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-67723 | Discourse vulnerable to stored Cross-site Scripting via Katex in discourse-math plugin | 2026-02-02T08:42:10.509Z | 2026-02-10T09:16:50.296Z |
| bit-discourse-2025-66488 | Discourse allows script execution in uploaded HTML/XML files on S3 | 2026-02-02T08:42:08.194Z | 2026-02-02T09:12:04.887Z |
| bit-golang-2025-68119 | Unexpected code execution when invoking toolchain in cmd/go | 2026-01-31T08:43:40.539Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61731 | Arbitrary file write using cgo pkg-config directive in cmd/go | 2026-01-31T08:43:38.643Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61730 | Handshake messages may be processed at the incorrect encryption level in crypto/tls | 2026-01-31T08:43:36.684Z | 2026-02-03T09:12:55.720Z |
| bit-joomla-2025-63083 | Joomla! Core - [20260102] - XSS vector in the pagebreak plugin | 2026-01-31T08:43:33.433Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61728 | Excessive CPU consumption when building archive index in archive/zip | 2026-01-31T08:43:32.870Z | 2026-01-31T09:09:11.750Z |
| bit-joomla-2025-63082 | Joomla! Core - [20260101] - Inadequate content filtering for data URLs | 2026-01-31T08:43:31.962Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61726 | Memory exhaustion in query parameter parsing in net/url | 2026-01-31T08:43:29.079Z | 2026-01-31T09:09:11.750Z |
| bit-mastodon-2026-23964 | Mastodon has insufficient access control to push notification settings | 2026-01-31T08:43:24.123Z | 2026-02-03T09:12:55.720Z |
| bit-discourse-2026-23743 | Discourse allows permalinks to restricted resources to leak resource slugs to unauthorized users | 2026-01-31T08:42:04.050Z | 2026-01-31T09:09:11.750Z |
| bit-gitea-2026-20912 | Gitea: Cross-Repository Authorization Bypass via Release Attachment Linking Leads to Private Attachment Disclosure | 2026-01-30T08:40:49.607Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20904 | Gitea: Broken access control in OpenID visibility toggle enables cross-user visibility changes | 2026-01-30T08:40:47.849Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20897 | Gitea Git LFS Lock Deletion Broken Access Control (Cross-Repo IDOR) | 2026-01-30T08:40:45.840Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20888 | Gitea Pull Requests Auto-Merge: Read-Only Users Can Cancel Scheduled Auto-Merge via Web Endpoint (Authorization Bypass) | 2026-01-30T08:40:43.950Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20883 | Gitea Stopwatch API Missing Authorization Check Leads to Post-Revocation Information Disclosure | 2026-01-30T08:40:41.879Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20800 | Notification API Leaks Private Repository Issue Titles After Collaborator Permission Revocation | 2026-01-30T08:40:39.688Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20750 | Gitea Organization Projects Cross-Organization Authorization Bypass via Project ID (IDOR) | 2026-01-30T08:40:37.768Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20736 | Gitea Web Attachment Deletion: Cross-Repository Unauthorized Deletion via Missing Repo Ownership Check | 2026-01-30T08:40:35.702Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-0798 | Gitea Release Email Notifications Leak Private Repository Release Details After Access Revocation | 2026-01-30T08:40:33.870Z | 2026-01-30T09:12:31.676Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-jm16286 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-01-30T16:56:26.537390Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bn11148 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T16:54:56.412220Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jd48541 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T16:52:56.596548Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hl71566 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:50:56.129322Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tk38210 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:46:25.995358Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sb25660 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T16:44:27.197226Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pz62650 | Cancelling a query (e | 2026-01-30T16:41:55.453512Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-lz10721 | Within HostnameError | 2026-01-30T16:40:55.517816Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hj34439 | Go before 1 | 2026-01-30T16:39:55.415446Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kz30232 | Go before 1 | 2026-01-30T16:39:25.872575Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-iy17697 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:37:55.497960Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oj15484 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:37:55.388839Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-on38469 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:37:25.667594Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fp29743 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:37:25.443687Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gl18398 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:36:55.508939Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qd78411 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:36:25.408698Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vv68546 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:35:55.883570Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ax77726 | vulnerability was found in PAM | 2026-01-30T16:35:55.808062Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-na36743 | Within HostnameError | 2026-01-30T16:35:55.379246Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ty78539 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T16:35:55.295657Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pw02676 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:35:26.383203Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vs64679 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T16:35:25.680295Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gj12884 | Within HostnameError | 2026-01-30T16:31:25.827659Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nl96892 | Within HostnameError | 2026-01-30T16:31:25.336110Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk54840 | Within HostnameError | 2026-01-30T16:30:55.324232Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-so17846 | Within HostnameError | 2026-01-30T16:30:25.764771Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dn37053 | Within HostnameError | 2026-01-30T16:30:25.711037Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rt10702 | Within HostnameError | 2026-01-30T16:30:25.697056Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ib84500 | security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion | 2026-01-30T16:29:55.343868Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-au31441 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:29:25.997506Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2025-055 | 2025-05-07T17:07:46.000Z | 2025-05-07T17:16:36.000Z | |
| drupal-contrib-2025-054 | 2025-05-07T17:07:32.000Z | 2025-05-07T17:16:32.000Z | |
| drupal-contrib-2025-053 | 2025-05-07T17:07:22.000Z | 2025-05-07T17:16:27.000Z | |
| drupal-contrib-2025-052 | 2025-05-07T17:07:14.000Z | 2025-05-07T17:16:21.000Z | |
| drupal-contrib-2025-051 | 2025-05-07T17:07:03.000Z | 2025-05-29T18:19:36.000Z | |
| drupal-contrib-2025-050 | 2025-05-07T17:06:52.000Z | 2025-05-29T18:19:50.000Z | |
| drupal-contrib-2025-049 | 2025-05-07T17:06:36.000Z | 2025-05-29T18:20:00.000Z | |
| drupal-contrib-2025-048 | 2025-05-07T17:06:26.000Z | 2025-05-29T18:20:11.000Z | |
| drupal-contrib-2025-047 | 2025-05-07T17:06:16.000Z | 2025-05-07T17:06:16.000Z | |
| drupal-contrib-2025-046 | 2025-04-23T16:59:33.000Z | 2025-04-23T16:59:33.000Z | |
| drupal-contrib-2025-045 | 2025-04-23T16:59:19.000Z | 2025-04-23T16:59:19.000Z | |
| drupal-contrib-2025-044 | 2025-04-23T16:59:11.000Z | 2025-04-23T16:59:11.000Z | |
| drupal-contrib-2025-043 | 2025-04-23T16:59:01.000Z | 2025-04-23T16:59:01.000Z | |
| drupal-contrib-2025-042 | 2025-04-23T16:58:51.000Z | 2025-04-23T16:58:51.000Z | |
| drupal-contrib-2025-041 | 2025-04-23T16:58:39.000Z | 2025-05-29T18:23:44.000Z | |
| drupal-contrib-2025-040 | 2025-04-16T16:26:13.000Z | 2025-04-16T16:26:13.000Z | |
| drupal-contrib-2025-039 | 2025-04-16T16:25:56.000Z | 2025-04-16T16:25:56.000Z | |
| drupal-contrib-2025-038 | 2025-04-16T16:25:45.000Z | 2025-04-16T16:25:45.000Z | |
| drupal-contrib-2025-037 | 2025-04-16T16:25:35.000Z | 2025-04-16T16:25:35.000Z | |
| drupal-contrib-2025-036 | 2025-04-16T16:25:27.000Z | 2025-04-16T16:25:27.000Z | |
| drupal-contrib-2025-035 | 2025-04-16T16:25:12.000Z | 2025-04-16T16:25:12.000Z | |
| drupal-contrib-2025-034 | 2025-04-16T16:24:49.000Z | 2025-05-29T18:24:01.000Z | |
| drupal-contrib-2025-033 | 2025-04-09T17:04:56.000Z | 2025-04-29T07:18:22.000Z | |
| drupal-contrib-2025-032 | 2025-04-09T17:04:46.000Z | 2025-04-09T17:04:46.000Z | |
| drupal-contrib-2025-031 | 2025-04-09T17:04:15.000Z | 2025-04-10T16:01:51.000Z | |
| drupal-contrib-2025-030 | 2025-04-09T17:04:09.000Z | 2025-04-09T17:04:09.000Z | |
| drupal-contrib-2025-029 | 2025-04-02T17:03:15.000Z | 2025-04-02T17:03:15.000Z | |
| drupal-contrib-2025-028 | 2025-04-02T17:02:32.000Z | 2025-04-02T17:02:32.000Z | |
| drupal-contrib-2025-027 | 2025-04-02T17:01:45.000Z | 2025-04-02T17:01:45.000Z | |
| drupal-contrib-2025-026 | 2025-03-19T18:53:42.000Z | 2025-03-31T22:07:23.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-10678 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10678) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10677 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10677) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10675 | Microsoft Windows File Explorer信息泄露漏洞(CNVD-2026-10675) | 2026-01-19 | 2026-02-11 |
| cnvd-2026-10674 | Microsoft Windows File Explorer信息泄露漏洞(CNVD-2026-10674) | 2026-01-19 | 2026-02-11 |
| cnvd-2026-10673 | Microsoft Windows File Explorer信息泄露漏洞(CNVD-2026-10673) | 2026-01-19 | 2026-02-11 |
| cnvd-2026-10672 | Microsoft Windows File Explorer信息泄露漏洞 | 2026-01-19 | 2026-02-11 |
| cnvd-2026-10639 | D-Link DI-8200G命令注入漏洞 | 2026-01-19 | 2026-02-09 |
| cnvd-2026-09802 | Adobe Dreamweaver命令注入漏洞 | 2026-01-19 | 2026-01-30 |
| cnvd-2026-09801 | Adobe Substance 3D Sampler缓冲区溢出漏洞 | 2026-01-19 | 2026-01-30 |
| cnvd-2026-09800 | Adobe Substance 3D Painter缓冲区溢出漏洞(CNVD-2026-09800) | 2026-01-19 | 2026-01-30 |
| cnvd-2026-09799 | Adobe InCopy缓冲区溢出漏洞(CNVD-2026-09799) | 2026-01-19 | 2026-01-30 |
| cnvd-2026-09796 | Apache Uniffle信任管理问题漏洞 | 2026-01-19 | 2026-01-30 |
| cnvd-2026-09795 | Apache NimBLE代码问题漏洞 | 2026-01-19 | 2026-02-04 |
| cnvd-2026-08750 | Microsoft Graphics Kernel竞争条件问题漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08749 | Microsoft Graphics Component资源管理错误漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08748 | Microsoft Excel访问控制错误漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08747 | Microsoft Excel代码执行漏洞(CNVD-2026-08747) | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08746 | Microsoft Excel代码执行漏洞(CNVD-2026-08746) | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08444 | Online Course Registration System /manage-students.php文件SQL注入漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08443 | Online Course Registration System /enroll.php文件SQL注入漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08435 | iccDEV CIccSingleSampledeCurveXml类的类型混淆漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08434 | iccDEV CIccCLUT::Init函数未定义行为漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08433 | iccDEV未定义行为漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08432 | iccDEV内存泄漏漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08431 | iccDEV CIccXmlArrayType::ParseTextCountNum函数整数溢出漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08430 | iccDEV CIccXform::Create函数释放后重用漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-08429 | iccDEV Unicode缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08428 | iccDEV CIccTagText::Read函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08427 | iccDEV CIccTagLut8::Validate函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-08426 | iccDEV CIccTagLut16::Validate函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0137 | Multiples vulnérabilités dans GnuTLS | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0136 | Vulnérabilité dans Fortinet FortiClientEMS | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0135 | Vulnérabilité dans GitLab AI Gateway | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0134 | Vulnérabilité dans Microsoft Edge | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0132 | Multiples vulnérabilités dans VMware Tanzu Greenplum | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0131 | Multiples vulnérabilités dans les produits IBM | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0130 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0129 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0128 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0127 | Vulnérabilité dans NetApp ONTAP 9 | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0126 | Vulnérabilité dans ESET Management Agent | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0125 | Multiples vulnérabilités dans les produits Moxa | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0124 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0123 | Multiples vulnérabilités dans Asterisk | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0122 | Multiples vulnérabilités dans Tenable Nessus | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0121 | Vulnérabilité dans les produits Juniper Networks | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0120 | Multiples vulnérabilités dans les produits F5 | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0119 | Multiples vulnérabilités dans les produits Cisco | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0118 | Multiples vulnérabilités dans les produits Splunk | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0117 | Multiples vulnérabilités dans GLPI | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0116 | Vulnérabilité dans les produits Moxa | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0115 | Multiples vulnérabilités dans Tenable Identity Exposure | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0114 | Multiples vulnérabilités dans Google Chrome | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0113 | Vulnérabilité dans Google Pixel | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0112 | Multiples vulnérabilités dans les produits VMware | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| certfr-2026-avi-0111 | Vulnérabilité dans ESET Inspect Connector | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| certfr-2026-avi-0110 | Multiples vulnérabilités Ivanti Endpoint Manager Mobile (EPMM) | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0109 | Multiples vulnérabilités dans les produits IBM | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0108 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2020-ale-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| certfr-2020-ale-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| certfr-2020-ale-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-005 | Multiples vulnérabilités dans le serveur de passerelle RDP de Windows | 2020-01-14T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-004 | Vulnérabilité dans Microsoft Windows | 2020-01-14T00:00:00.000000 | 2020-01-17T00:00:00.000000 |
| certfr-2020-ale-003 | Vulnérabilité dans les produits Mozilla | 2020-01-09T00:00:00.000000 | 2020-01-20T00:00:00.000000 |
| certfr-2020-ale-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2019-ale-015 | Multiples vulnérabilités dans Google Chrome | 2019-11-04T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2019-ale-014 | Vulnérabilité dans PHP | 2019-10-29T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2019-ale-013 | Vulnérabilité dans Microsoft Internet Explorer | 2019-09-24T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-012 | Multiples vulnérabilités dans Microsoft Remote Desktop Services | 2019-08-14T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-011 | Vulnérabilité dans Oracle WebLogic | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-010 | Vulnérabilité dans Mozilla Firefox | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-009 | Vulnérabilité dans Exim | 2019-06-11T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-008 | Vulnérabilité dans Microsoft SharePoint Server | 2019-05-29T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-006 | Vulnérabilité dans Microsoft Remote Desktop Services | 2019-05-22T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-007 | Vulnérabilité dans le serveur DHCP de Windows | 2019-05-15T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-005 | Vulnérabilité dans Oracle WebLogic | 2019-04-26T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-004 | Multiples vulnérabilités dans Microsoft Edge et Internet Explorer | 2019-04-01T00:00:00.000000 | 2019-04-17T00:00:00.000000 |
| certfr-2019-ale-003 | Campagnes de rançongiciels | 2019-01-31T00:00:00.000000 | 2019-06-20T00:00:00.000000 |