Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-22703 |
5.5 (3.1)
|
Cosign verification accepts any valid Rekor entry unde… |
sigstore |
cosign |
2026-01-10T06:11:09.426Z | 2026-01-12T16:43:57.302Z |
| CVE-2026-22702 |
4.5 (3.1)
|
virtualenv Has TOCTOU Vulnerabilities in Directory Creation |
pypa |
virtualenv |
2026-01-10T06:05:53.281Z | 2026-01-12T16:44:12.734Z |
| CVE-2026-22701 |
5.3 (3.1)
|
filelock Time-of-Check-Time-of-Use (TOCTOU) Symlink Vu… |
tox-dev |
filelock |
2026-01-10T05:59:28.872Z | 2026-01-12T16:45:50.638Z |
| CVE-2026-22693 |
5.3 (3.1)
|
Null Pointer Dereference in SubtableUnicodesCache::cre… |
harfbuzz |
harfbuzz |
2026-01-10T05:53:21.019Z | 2026-01-12T16:47:17.715Z |
| CVE-2026-22689 |
6.5 (3.1)
|
Mailpit is vulnerable to Cross-Site WebSocket Hijackin… |
axllent |
mailpit |
2026-01-10T05:46:13.771Z | 2026-01-12T16:47:34.722Z |
| CVE-2026-22685 |
8.8 (3.1)
|
DevToys Path Traversal (“Zip Slip”) Vulnerability in D… |
DevToys-app |
DevToys |
2026-01-10T05:43:19.856Z | 2026-01-12T14:39:28.330Z |
| CVE-2026-22611 |
3.7 (3.1)
|
AWS SDK for .NET V4 adopted defense in depth enhanceme… |
aws |
aws-sdk-net |
2026-01-10T05:37:08.297Z | 2026-01-12T14:39:57.770Z |
| CVE-2026-22700 |
7.5 (3.1)
|
RustCrypto Has Insufficient Length Validation in decry… |
RustCrypto |
elliptic-curves |
2026-01-10T05:17:25.583Z | 2026-01-12T14:46:46.227Z |
| CVE-2026-22699 |
7.5 (3.1)
|
RustCrypto SM2-PKE has Unchecked AffinePoint Decoding … |
RustCrypto |
elliptic-curves |
2026-01-10T05:17:22.818Z | 2026-01-12T14:59:18.634Z |
| CVE-2026-22698 |
8.7 (4.0)
|
RustCrypto SM2-PKE has 32-bit Biased Nonce Vulnerability |
RustCrypto |
elliptic-curves |
2026-01-10T05:17:19.993Z | 2026-01-12T16:48:30.706Z |
| CVE-2026-22691 |
2.7 (4.0)
|
pypdf has possible long runtimes for malformed startxref |
py-pdf |
pypdf |
2026-01-10T04:46:12.423Z | 2026-01-12T16:48:53.503Z |
| CVE-2026-22690 |
2.7 (4.0)
|
pypdf has possible long runtimes for missing /Root obj… |
py-pdf |
pypdf |
2026-01-10T04:41:20.773Z | 2026-01-12T17:07:00.323Z |
| CVE-2026-22688 |
10 (3.1)
|
WeKnora has Command Injection in MCP stdio test |
Tencent |
WeKnora |
2026-01-10T03:41:59.952Z | 2026-01-12T17:20:43.431Z |
| CVE-2026-22687 |
8.1 (3.1)
|
WeKnora vulnerable to SQL Injection |
Tencent |
WeKnora |
2026-01-10T03:41:43.862Z | 2026-01-12T17:21:25.675Z |
| CVE-2026-22610 |
8.5 (4.0)
|
Angular has XSS Vulnerability via Unsanitized SVG Scri… |
angular |
angular |
2026-01-10T03:35:40.727Z | 2026-01-13T04:55:48.905Z |
| CVE-2025-13457 |
7.5 (3.1)
|
WooCommerce Square <= 5.1.1 - Unauthenticated Insecure… |
woocommerce |
WooCommerce Square |
2026-01-10T03:21:01.113Z | 2026-01-12T16:49:14.896Z |
| CVE-2026-22589 |
7.5 (3.1)
|
Spree API has Unauthenticated IDOR - Guest Address |
spree |
spree |
2026-01-10T03:17:58.494Z | 2026-01-12T17:32:46.777Z |
| CVE-2025-61674 |
6.1 (3.1)
|
October CMS Vulnerable to Stored XSS via Editor and Br… |
octobercms |
october |
2026-01-10T03:14:11.185Z | 2026-01-12T17:33:33.662Z |
| CVE-2025-61676 |
6.1 (3.1)
|
October CMS Vulnerable to Stored XSS via Branding Styles |
octobercms |
october |
2026-01-10T03:14:00.708Z | 2026-01-12T17:34:13.595Z |
| CVE-2025-65091 |
10 (3.1)
|
XWiki Full Calendar Macro vulnerable to SQL injection … |
xwiki-contrib |
macro-fullcalendar |
2026-01-10T03:06:16.775Z | 2026-01-12T17:35:19.706Z |
| CVE-2025-65090 |
5.3 (3.1)
|
XWiki Full Calendar Macro vulnerable to data leak thro… |
xwiki-contrib |
macro-fullcalendar |
2026-01-10T03:05:06.531Z | 2026-01-12T17:36:38.233Z |
| CVE-2026-22597 |
5.1 (4.0)
|
Ghost has SSRF via External Media Inliner |
TryGhost |
Ghost |
2026-01-10T02:57:36.898Z | 2026-01-12T16:23:47.163Z |
| CVE-2026-22596 |
6.7 (3.1)
|
Ghost has SQL Injection in Members Activity Feed |
TryGhost |
Ghost |
2026-01-10T02:57:19.792Z | 2026-01-12T17:37:41.086Z |
| CVE-2026-22595 |
8.1 (3.1)
|
Ghost has Staff Token permission bypass |
TryGhost |
Ghost |
2026-01-10T02:57:08.131Z | 2026-01-12T17:51:41.017Z |
| CVE-2026-22594 |
8.1 (3.1)
|
Ghost has Staff 2FA bypass |
TryGhost |
Ghost |
2026-01-10T02:56:47.226Z | 2026-01-12T17:53:57.181Z |
| CVE-2026-22030 |
6.5 (3.1)
|
React Router has CSRF issue in Action/Server Action Re… |
remix-run |
react-router |
2026-01-10T02:42:44.603Z | 2026-01-12T18:09:39.441Z |
| CVE-2026-22029 |
8 (3.1)
|
React Router vulnerable to XSS via Open Redirects |
remix-run |
react-router |
2026-01-10T02:42:32.736Z | 2026-01-13T04:55:52.374Z |
| CVE-2026-21884 |
8.2 (3.1)
|
React Router SSR XSS in ScrollRestoration |
remix-run |
react-router |
2026-01-10T02:41:44.944Z | 2026-01-13T04:55:51.268Z |
| CVE-2025-61686 |
9.1 (3.1)
|
React Router has Path Traversal in File Session Storage |
remix-run |
react-router |
2026-01-10T02:41:22.741Z | 2026-01-10T02:41:22.741Z |
| CVE-2025-59057 |
7.6 (3.1)
|
React Router has XSS Vulnerability |
remix-run |
react-router |
2026-01-10T02:40:25.142Z | 2026-01-12T18:12:43.462Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-69276 |
2.3 (4.0)
|
Spectrum insecure deserialiation |
Broadcom |
DX NetOps Spectrum |
2026-01-12T04:53:09.752Z | 2026-01-12T14:56:58.184Z |
| CVE-2025-69275 |
7.1 (4.0)
|
Spectrum outdated java library in class-path |
Broadcom |
DX NetOps Spectrum |
2026-01-12T04:47:07.893Z | 2026-01-12T14:57:23.830Z |
| CVE-2025-69274 |
2.3 (4.0)
|
Spectrum broken authorization scheme |
Broadcom |
DX NetOps Spectrum |
2026-01-12T04:42:39.547Z | 2026-01-12T14:58:15.237Z |
| CVE-2025-69273 |
8.7 (4.0)
|
Spectrum broken authentication |
Broadcom |
DX NetOps Spectrum |
2026-01-12T04:38:53.570Z | 2026-01-12T15:16:40.609Z |
| CVE-2025-69272 |
5.3 (4.0)
|
Spectrum password returned in clear |
Broadcom |
DX NetOps Spectrum |
2026-01-12T04:33:37.988Z | 2026-01-12T15:19:26.775Z |
| CVE-2025-69271 |
2.3 (4.0)
|
Spectrum basic authentication in use |
Broadcom |
DX NetOps Spectrum |
2026-01-12T04:27:55.507Z | 2026-01-12T15:20:41.443Z |
| CVE-2025-69270 |
2.3 (4.0)
|
Spectrum session token in URL |
Broadcom |
DX NetOps Spectrum |
2026-01-12T04:20:13.446Z | 2026-01-12T15:21:09.808Z |
| CVE-2025-69269 |
7.1 (4.0)
|
Spectrum command injection in NCM service |
Broadcom |
DX NetOps Spectrum |
2026-01-12T04:10:44.802Z | 2026-01-12T15:51:36.355Z |
| CVE-2025-69268 |
5.3 (4.0)
|
Spectrum reflected XSS |
Broadcom |
DX NetOps Spectrum |
2026-01-12T03:59:17.522Z | 2026-01-12T15:52:46.499Z |
| CVE-2025-69267 |
8.8 (4.0)
|
Spectrum directory path traversal |
Broadcom |
DX NetOps Spectrum |
2026-01-12T03:53:00.624Z | 2026-01-12T15:53:40.392Z |
| CVE-2026-0853 |
6.9 (4.0)
5.3 (3.1)
|
A-Plus Video Technologies|NVR - Sensitive Data Exposure |
A-Plus Video Technologies |
AP-RM864P |
2026-01-12T03:26:47.546Z | 2026-01-12T15:54:38.969Z |
| CVE-2025-52694 |
10 (3.1)
|
Execution of arbitrary SQL commands |
Advantech |
IoTSuite and IoT Edge Products |
2026-01-12T02:27:16.744Z | 2026-01-15T09:32:25.933Z |
| CVE-2026-0852 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Online Music Site AdminUpdateUser.php sq… |
code-projects |
Online Music Site |
2026-01-12T00:02:06.128Z | 2026-01-12T15:58:49.390Z |
| CVE-2026-0851 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Online Music Site AdminAddUser.php sql i… |
code-projects |
Online Music Site |
2026-01-11T23:32:07.010Z | 2026-01-12T16:37:46.944Z |
| CVE-2026-0850 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
code-projects Intern Membership Management System dele… |
code-projects |
Intern Membership Management System |
2026-01-11T23:02:06.162Z | 2026-01-12T16:50:15.555Z |
| CVE-2025-68493 |
N/A
|
Apache Struts, Apache Struts: XXE vulnerability in out… |
Apache Software Foundation |
Apache Struts |
2026-01-11T13:05:36.894Z | 2026-01-12T13:52:58.210Z |
| CVE-2025-15506 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
AcademySoftwareFoundation OpenColorIO FileRules.cpp Co… |
AcademySoftwareFoundation |
OpenColorIO |
2026-01-11T11:02:09.187Z | 2026-01-12T17:03:17.278Z |
| CVE-2026-0843 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
jiujiujia/victor123/wxw850227 jjjfood/jjjshop_food ind… |
jiujiujia |
jjjfood |
2026-01-11T09:02:05.907Z | 2026-01-12T17:09:55.150Z |
| CVE-2026-0842 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Flycatcher Toys smART Sketcher Bluetooth Low Energy mi… |
Flycatcher Toys |
smART Sketcher |
2026-01-11T08:02:06.221Z | 2026-01-12T17:50:26.288Z |
| CVE-2026-0841 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
UTT 进取 520W formPictureUrl strcpy buffer overflow |
UTT |
进取 520W |
2026-01-11T07:32:07.736Z | 2026-01-12T14:33:15.407Z |
| CVE-2026-0840 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
UTT 进取 520W formConfigNoticeConfig strcpy buffer overflow |
UTT |
进取 520W |
2026-01-11T06:32:06.734Z | 2026-01-12T14:34:38.435Z |
| CVE-2026-0839 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
UTT 进取 520W APSecurity strcpy buffer overflow |
UTT |
进取 520W |
2026-01-11T06:02:05.798Z | 2026-01-12T14:35:14.535Z |
| CVE-2026-0838 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
UTT 进取 520W ConfigWirelessBase strcpy buffer overflow |
UTT |
进取 520W |
2026-01-11T05:32:06.225Z | 2026-01-12T14:35:49.763Z |
| CVE-2026-0837 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
UTT 进取 520W formFireWall strcpy buffer overflow |
UTT |
进取 520W |
2026-01-11T05:02:06.048Z | 2026-01-12T14:36:14.234Z |
| CVE-2026-0836 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
UTT 进取 520W formConfigFastDirectionW strcpy buffer overflow |
UTT |
进取 520W |
2026-01-11T04:32:06.535Z | 2026-01-12T18:13:16.566Z |
| CVE-2025-15505 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
Luxul XWR-600 Web Administration cross site scripting |
Luxul |
XWR-600 |
2026-01-11T01:32:07.400Z | 2026-01-12T18:15:20.196Z |
| CVE-2026-0824 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
questdb ui Web Console cross site scripting |
questdb |
ui |
2026-01-10T14:32:08.724Z | 2026-01-12T18:26:21.294Z |
| CVE-2026-0822 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
quickjs-ng quickjs quickjs.c js_typed_array_sort heap-… |
quickjs-ng |
quickjs |
2026-01-10T13:32:08.881Z | 2026-01-12T18:30:50.158Z |
| CVE-2025-13393 |
4.3 (3.1)
|
Featured Image from URL (FIFU) <= 5.3.1 - Authenticate… |
marceljm |
Featured Image from URL (FIFU) |
2026-01-10T13:47:35.750Z | 2026-01-12T18:28:15.408Z |
| CVE-2025-12379 |
6.4 (3.1)
|
Shortcodes and extra features for Phlox theme <= 2.17.… |
averta |
Shortcodes and extra features for Phlox theme |
2026-01-10T13:47:35.146Z | 2026-01-12T18:29:20.473Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-mw8h-g64c-rxv4 |
6.5 (3.1)
|
Shiori is vulnerable to authentication bypass via a brute force attack | 2026-01-09T21:31:35Z | 2026-01-13T14:58:03Z |
| ghsa-j3jp-gmvh-ppvr |
8.2 (3.1)
|
A vulnerability exists in Intelbras CFTV IP NVD 9032 R Ftd V2.800.00IB00C.0.T, which allows an unau… | 2026-01-09T21:31:35Z | 2026-01-10T00:30:29Z |
| ghsa-88jg-rrgx-r8v9 |
6.5 (3.1)
|
SQL injection vulnerability in pss.sale.com 1.0 via the id parameter to the userfiles/php/cancel_or… | 2026-01-09T21:31:35Z | 2026-01-10T00:30:29Z |
| ghsa-7xjv-wf6r-872r |
7.8 (3.1)
8.4 (4.0)
|
Processing specially crafted workspace folder names could allow for arbitrary command injection in … | 2026-01-09T21:31:35Z | 2026-01-09T21:31:35Z |
| ghsa-7r2g-px2q-wrcx |
6.5 (3.1)
|
In Area9 Rhapsode 1.47.3, an authenticated attacker can exploit the operation, url, and filename pa… | 2026-01-09T21:31:35Z | 2026-01-10T00:30:29Z |
| ghsa-2v8h-5826-r95p |
6.5 (3.1)
|
A DLL hijacking vulnerability in Axtion ODISSAAS ODIS v1.8.4 allows attackers to execute arbitrary … | 2026-01-09T21:31:35Z | 2026-01-10T00:30:29Z |
| ghsa-q5qq-mvfm-j35x |
8.9 (4.0)
|
Fickling has Static Analysis Bypass via Incomplete Dangerous Module Blocklist | 2026-01-09T21:12:00Z | 2026-01-11T14:55:13Z |
| ghsa-5hvc-6wx8-mvv4 |
8.9 (4.0)
|
Fickling vulnerable to use of ctypes and pydoc gadget chain to bypass detection | 2026-01-09T21:05:13Z | 2026-01-11T14:55:08Z |
| ghsa-p523-jq9w-64x9 |
8.9 (4.0)
|
Fickling Blocklist Bypass: cProfile.run() | 2026-01-09T21:04:22Z | 2026-01-11T14:54:55Z |
| ghsa-wfq2-52f7-7qvj |
8.9 (4.0)
|
Fickling has a bypass via runpy.run_path() and runpy.run_module() | 2026-01-09T20:52:40Z | 2026-01-11T14:54:44Z |
| ghsa-wvpq-h33f-8rp6 |
6.1 (3.1)
|
October CMS Vulnerable to Stored XSS via Branding Styles | 2026-01-09T20:12:24Z | 2026-01-11T14:55:37Z |
| ghsa-585q-cm62-757j |
2.0 (4.0)
|
mnl has segmentation fault and invalid memory read in `mnl::cb_run` | 2026-01-09T19:53:23Z | 2026-01-09T19:53:23Z |
| ghsa-4f6g-68pf-7vhv |
2.7 (4.0)
|
pypdf has possible long runtimes for malformed startxref | 2026-01-09T19:48:57Z | 2026-01-11T14:53:40Z |
| ghsa-4xc4-762w-m6cg |
2.7 (4.0)
|
pypdf has possible long runtimes for missing /Root object with large /Size values | 2026-01-09T19:48:22Z | 2026-01-11T14:53:34Z |
| ghsa-88q6-jcjg-hvmw |
8.8 (4.0)
|
jose-swift has JWT Signature Verification Bypass via None Algorithm | 2026-01-09T19:39:30Z | 2026-01-09T19:39:30Z |
| ghsa-78h3-63c4-5fqc |
9.9 (3.1)
|
WeKnora has Command Injection in MCP stdio test | 2026-01-09T19:21:22Z | 2026-01-11T14:53:28Z |
| ghsa-pcwc-3fw3-8cqv |
8.1 (3.1)
|
WeKnora vulnerable to SQL Injection | 2026-01-09T19:19:57Z | 2026-01-11T14:53:23Z |
| ghsa-9cvc-h2w8-phrp |
3.7 (3.1)
|
AWS SDK for .NET V4 adopted defense in depth enhancement for region parameter value | 2026-01-09T18:56:21Z | 2026-01-11T14:56:00Z |
| ghsa-jrmj-c5cx-3cw6 |
8.5 (4.0)
|
Angular has XSS Vulnerability via Unsanitized SVG Script Attributes | 2026-01-09T18:52:14Z | 2026-01-11T14:55:54Z |
| ghsa-2g22-wg49-fgv5 |
10.0 (3.1)
|
XWiki Full Calendar Macro vulnerable to SQL injection through Calendar.JSONService | 2026-01-09T18:41:47Z | 2026-01-11T14:55:48Z |
| ghsa-637h-ch24-xp9m |
5.3 (3.1)
|
XWiki Full Calendar Macro vulnerable to data leak through Calendar.JSONService | 2026-01-09T18:35:57Z | 2026-01-11T14:55:42Z |
| ghsa-qv4c-5j2h-4442 |
8.1 (3.1)
7.5 (4.0)
|
GestSup versions up to and including 3.2.56 contain multiple SQL injection vulnerabilities in the a… | 2026-01-09T18:31:37Z | 2026-01-14T21:34:07Z |
| ghsa-mr2r-3ff7-jfw5 |
6.1 (3.1)
5.1 (4.0)
|
GestSup versions up to and including 3.2.56 contain a pre-authentication stored cross-site scriptin… | 2026-01-09T18:31:37Z | 2026-01-14T21:34:08Z |
| ghsa-mjmr-r67g-p2m7 |
4.7 (3.1)
2.0 (4.0)
|
A vulnerability was found in BiggiDroid Simple PHP CMS 1.0. This impacts an unknown function of the… | 2026-01-09T18:31:37Z | 2026-01-09T18:31:37Z |
| ghsa-gfvg-q74f-527q |
10.0 (4.0)
|
The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) expose a command execution … | 2026-01-09T18:31:37Z | 2026-01-09T18:31:37Z |
| ghsa-fwm4-r23r-5x9x |
8.1 (3.1)
7.7 (4.0)
|
GestSup versions up to and including 3.2.56 contain a SQL injection vulnerability in ticket creatio… | 2026-01-09T18:31:37Z | 2026-01-14T21:34:07Z |
| ghsa-fghm-7m2h-m8rp |
8.8 (3.1)
8.9 (4.0)
|
GestSup versions up to and including 3.2.56 contain a cross-site request forgery (CSRF) vulnerabili… | 2026-01-09T18:31:37Z | 2026-01-14T21:34:06Z |
| ghsa-c99x-xcf4-fhgm |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in guchengwuyue yshopmall up to 1.9.1. Affected is the function getP… | 2026-01-09T18:31:37Z | 2026-01-09T18:31:37Z |
| ghsa-c5rf-v4g6-p7vf |
8.1 (3.1)
7.7 (4.0)
|
GestSup versions up to and including 3.2.56 contain a SQL injection vulnerability in the search bar… | 2026-01-09T18:31:37Z | 2026-01-14T21:34:06Z |
| ghsa-75mq-3gf9-64wc |
9.8 (3.1)
|
A Command Injection Vulnerability has been discovered in the DHCP daemon service of D-Link DIR895LA… | 2026-01-09T18:31:37Z | 2026-01-12T18:30:29Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-758 |
|
TensorFlow is an end-to-end open source platform for machine learning. When a user does n… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:36.390179Z |
| pysec-2021-754 |
|
TensorFlow is an end-to-end open source platform for machine learning. If a user does not… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:36.031970Z |
| pysec-2021-750 |
|
TensorFlow is an end-to-end open source platform for machine learning. When restoring ten… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:35.665255Z |
| pysec-2021-749 |
|
TensorFlow is an end-to-end open source platform for machine learning. Sending invalid ar… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:35.577694Z |
| pysec-2021-748 |
|
TensorFlow is an end-to-end open source platform for machine learning. It is possible to … | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:35.492639Z |
| pysec-2021-562 |
|
TensorFlow is an end-to-end open source platform for machine learning. The code for `tf.r… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:03.183506Z |
| pysec-2021-560 |
|
TensorFlow is an end-to-end open source platform for machine learning. When a user does n… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:03.005830Z |
| pysec-2021-556 |
|
TensorFlow is an end-to-end open source platform for machine learning. If a user does not… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:02.665889Z |
| pysec-2021-552 |
|
TensorFlow is an end-to-end open source platform for machine learning. When restoring ten… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:02.331501Z |
| pysec-2021-551 |
|
TensorFlow is an end-to-end open source platform for machine learning. Sending invalid ar… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:02.233432Z |
| pysec-2021-550 |
|
TensorFlow is an end-to-end open source platform for machine learning. It is possible to … | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:02.145086Z |
| pysec-2021-271 |
|
TensorFlow is an end-to-end open source platform for machine learning. The code for `tf.r… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.879548Z |
| pysec-2021-269 |
|
TensorFlow is an end-to-end open source platform for machine learning. When a user does n… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.708163Z |
| pysec-2021-265 |
|
TensorFlow is an end-to-end open source platform for machine learning. If a user does not… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.365129Z |
| pysec-2021-261 |
|
TensorFlow is an end-to-end open source platform for machine learning. When restoring ten… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.020795Z |
| pysec-2021-260 |
|
TensorFlow is an end-to-end open source platform for machine learning. Sending invalid ar… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:42.935785Z |
| pysec-2021-259 |
|
TensorFlow is an end-to-end open source platform for machine learning. It is possible to … | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:42.844418Z |
| pysec-2021-771 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:37.526889Z |
| pysec-2021-764 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:36.903192Z |
| pysec-2021-753 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:35.943696Z |
| pysec-2021-751 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:35.756075Z |
| pysec-2021-747 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:35.406311Z |
| pysec-2021-573 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:04.091418Z |
| pysec-2021-566 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:03.512666Z |
| pysec-2021-555 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:02.576943Z |
| pysec-2021-553 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:02.412159Z |
| pysec-2021-549 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:02.050023Z |
| pysec-2021-282 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T18:15:00Z | 2021-08-27T03:22:44.908068Z |
| pysec-2021-275 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T18:15:00Z | 2021-08-27T03:22:44.260808Z |
| pysec-2021-264 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T18:15:00Z | 2021-08-27T03:22:43.277267Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191544 | Malicious code in tdspt-helper (npm) | 2025-12-02T04:33:37Z | 2025-12-02T21:37:33Z |
| mal-2025-191542 | Malicious code in nodenetbanxsdk (npm) | 2025-12-02T04:30:47Z | 2025-12-24T10:09:29Z |
| mal-2025-191541 | Malicious code in bignumx (npm) | 2025-12-02T04:29:23Z | 2025-12-23T16:10:05Z |
| mal-2025-191536 | Malicious code in @wxi-dev/serverless-tsc-config (npm) | 2025-12-02T04:21:28Z | 2025-12-02T21:37:28Z |
| mal-2025-191537 | Malicious code in cyber-fca (npm) | 2025-12-02T04:19:46Z | 2025-12-02T21:37:29Z |
| mal-2025-191840 | Malicious code in python-doenv (PyPI) | 2025-12-01T19:24:56Z | 2025-12-31T02:45:15Z |
| mal-2025-191532 | Malicious code in yq-go (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191531 | Malicious code in usb_dev (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191530 | Malicious code in tilt-ui (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191529 | Malicious code in terrain-sample (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191528 | Malicious code in telesis (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191527 | Malicious code in solana-dev-mcp (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191526 | Malicious code in silentcipherui (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191525 | Malicious code in ripiocoin (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191524 | Malicious code in render-stage (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191523 | Malicious code in privy-frames-v2-demo (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191522 | Malicious code in privy-farcaster-demo (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191521 | Malicious code in nova-angular-project (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191520 | Malicious code in nnc-web (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191519 | Malicious code in mongodb-stitch-server-testutils (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191518 | Malicious code in mongodb-compass (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191517 | Malicious code in mongodb-atlas-cli-toc-generator (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191516 | Malicious code in markdownlint-cli2-action (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191515 | Malicious code in leafygreen-docs (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191514 | Malicious code in kubernetes-helm (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191513 | Malicious code in kubernetes-controller-tools (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191512 | Malicious code in kubebuilder (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191511 | Malicious code in iife-sample (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191510 | Malicious code in hpi-porsche-app (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191509 | Malicious code in debug-common (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1378 | Red Hat Enterprise Linux (mod_proxy_cluster): Schwachstelle ermöglicht Manipulation von Daten | 2025-06-23T22:00:00.000+00:00 | 2025-06-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1377 | Red Hat OpenShift: Schwachstelle ermöglicht Manipulation von Dateien | 2025-06-23T22:00:00.000+00:00 | 2025-06-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1376 | OpenVPN: Schwachstelle ermöglicht Denial of Service | 2025-06-23T22:00:00.000+00:00 | 2025-06-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1375 | WinRAR: Schwachstelle ermöglicht Codeausführung | 2025-06-23T22:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2025-1374 | Notepad++: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-23T22:00:00.000+00:00 | 2025-06-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1372 | Linux Kernel: Schwachstelle ermöglicht Manipulation von Daten und Denial of Service | 2025-06-22T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-1371 | FreeRDP: Schwachstelle ermöglicht Denial of Service | 2025-06-22T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1370 | Red Hat Enterprise Linux (yaml-libyam): Schwachstelle ermöglicht Manipulation von Dateien | 2025-06-22T22:00:00.000+00:00 | 2025-10-05T22:00:00.000+00:00 |
| wid-sec-w-2025-1369 | Red Hat Enterprise Linux (mpfr): Schwachstelle ermöglicht Denial of Service | 2025-06-22T22:00:00.000+00:00 | 2025-07-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1368 | IBM Spectrum Protect: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-22T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1367 | IBM InfoSphere Information Server: Mehrere Schwachstellen | 2025-06-22T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1366 | F5 BIG-IP: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-22T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1365 | IBM QRadar SIEM: Mehrere Schwachstellen | 2025-06-19T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1364 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-06-19T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1363 | RabbitMQ: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-19T22:00:00.000+00:00 | 2025-10-27T23:00:00.000+00:00 |
| wid-sec-w-2025-1362 | ClamAV: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-19T22:00:00.000+00:00 | 2025-09-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1361 | Cisco Meraki MX: Schwachstelle ermöglicht Denial of Service | 2025-06-19T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1360 | Ubiquiti UniFi Network Application: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-19T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1359 | IBM Security Guardium: Schwachstelle ermöglicht Offenlegung oder Manipulation von Informationen | 2025-06-19T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1358 | Grafana: Schwachstelle ermöglicht Denial of Service | 2025-06-19T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1357 | Kubernetes: Schwachstelle ermöglicht umgehen von Sicherheitsmechanismen. | 2025-06-19T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1355 | Apache Traffic Server: Mehrere Schwachstellen | 2025-06-17T22:00:00.000+00:00 | 2025-06-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1354 | Verschiedene Linux Distributionen: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-06-17T22:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1353 | Moodle: Mehrere Schwachstellen | 2025-06-17T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1352 | X.Org X11 und Xwayland: Mehrere Schwachstellen | 2025-06-17T22:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-1351 | Red Hat Enterprise Linux (kea): Mehrere Schwachstellen | 2025-06-17T22:00:00.000+00:00 | 2025-06-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1350 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-17T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-1349 | Citrix Systems ADC: Mehrere Schwachstellen | 2025-06-17T22:00:00.000+00:00 | 2025-08-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1348 | Citrix Systems NetScaler: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-17T22:00:00.000+00:00 | 2025-06-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1347 | Citrix Systems Secure Access client: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-17T22:00:00.000+00:00 | 2025-06-17T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:15387 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | 2025-09-04T19:38:44+00:00 | 2025-11-21T19:38:31+00:00 |
| rhsa-2025:15388 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | 2025-09-04T19:38:37+00:00 | 2025-11-21T19:38:32+00:00 |
| rhsa-2025:14858 | Red Hat Security Advisory: OpenShift Container Platform 4.16.47 bug fix and security update | 2025-09-04T17:05:36+00:00 | 2026-01-13T22:44:42+00:00 |
| rhsa-2025:14853 | Red Hat Security Advisory: OpenShift Container Platform 4.14.56 bug fix and security update | 2025-09-04T17:05:30+00:00 | 2026-01-13T22:44:42+00:00 |
| rhsa-2025:14818 | Red Hat Security Advisory: OpenShift Container Platform 4.18.23 bug fix and security update | 2025-09-04T17:03:51+00:00 | 2026-01-13T22:44:42+00:00 |
| rhsa-2025:15358 | Red Hat Security Advisory: updated RHEL-8 based Middleware Containers container images | 2025-09-04T16:29:43+00:00 | 2026-01-16T16:13:06+00:00 |
| rhsa-2025:15371 | Red Hat Security Advisory: Satellite 6 Client Bug Fix Update | 2025-09-04T15:54:46+00:00 | 2025-11-21T19:25:03+00:00 |
| rhsa-2025:15359 | Red Hat Security Advisory: postgresql:13 security update | 2025-09-04T14:50:26+00:00 | 2025-11-21T19:25:02+00:00 |
| rhsa-2025:14820 | Red Hat Security Advisory: OpenShift Container Platform 4.18.23 bug fix and security update | 2025-09-04T14:47:49+00:00 | 2026-01-21T11:15:19+00:00 |
| rhsa-2025:15361 | Red Hat Security Advisory: postgresql:12 security update | 2025-09-04T14:39:07+00:00 | 2025-11-21T19:25:03+00:00 |
| rhsa-2025:14859 | Red Hat Security Advisory: OpenShift Container Platform 4.16.47 bug fix and security update | 2025-09-04T13:50:12+00:00 | 2026-01-21T11:15:21+00:00 |
| rhsa-2025:15348 | Red Hat Security Advisory: python3.12 security update | 2025-09-04T13:09:46+00:00 | 2025-12-19T10:02:41+00:00 |
| rhsa-2025:15347 | Red Hat Security Advisory: qt5-qt3d security update | 2025-09-04T12:51:16+00:00 | 2025-11-21T19:25:01+00:00 |
| rhsa-2025:15337 | Red Hat Security Advisory: Red Hat build of Keycloak 26.0.15 Images Update | 2025-09-04T11:24:04+00:00 | 2026-01-13T22:06:37+00:00 |
| rhsa-2025:15338 | Red Hat Security Advisory: Red Hat build of Keycloak 26.2.8 Images Security Update | 2025-09-04T11:22:48+00:00 | 2026-01-13T22:08:32+00:00 |
| rhsa-2025:15339 | Red Hat Security Advisory: Red Hat build of Keycloak 26.2.8 Security Update | 2025-09-04T11:13:13+00:00 | 2026-01-13T22:09:44+00:00 |
| rhsa-2025:15336 | Red Hat Security Advisory: Red Hat build of Keycloak 26.0.15 Update | 2025-09-04T11:09:19+00:00 | 2026-01-13T22:10:13+00:00 |
| rhsa-2025:14855 | Red Hat Security Advisory: OpenShift Container Platform 4.14.56 bug fix and security update | 2025-09-04T04:22:43+00:00 | 2026-01-21T11:15:20+00:00 |
| rhsa-2025:14856 | Red Hat Security Advisory: OpenShift Container Platform 4.14.56 security and extras update | 2025-09-04T03:47:46+00:00 | 2026-01-21T11:04:54+00:00 |
| rhsa-2025:15227 | Red Hat Security Advisory: kernel security update | 2025-09-04T01:50:25+00:00 | 2025-12-22T19:53:56+00:00 |
| rhsa-2025:15224 | Red Hat Security Advisory: kernel-rt security update | 2025-09-04T01:18:44+00:00 | 2025-12-22T19:53:56+00:00 |
| rhsa-2025:14821 | Red Hat Security Advisory: OpenShift Container Platform 4.18.23 security and extras update | 2025-09-03T18:51:10+00:00 | 2026-01-21T11:04:56+00:00 |
| rhsa-2025:14860 | Red Hat Security Advisory: OpenShift Container Platform 4.16.47 security and extras update | 2025-09-03T14:26:28+00:00 | 2026-01-21T11:04:56+00:00 |
| rhsa-2025:15123 | Red Hat Security Advisory: httpd:2.4 security update | 2025-09-03T13:23:28+00:00 | 2026-01-16T00:55:35+00:00 |
| rhsa-2025:15122 | Red Hat Security Advisory: python-requests security update | 2025-09-03T13:23:28+00:00 | 2026-01-15T15:59:59+00:00 |
| rhsa-2025:15124 | Red Hat Security Advisory: Satellite 6.16.5.3 Async Update | 2025-09-03T13:15:43+00:00 | 2025-11-21T19:24:53+00:00 |
| rhsa-2025:15121 | Red Hat Security Advisory: python-requests security update | 2025-09-03T13:15:23+00:00 | 2026-01-15T15:59:57+00:00 |
| rhsa-2025:15115 | Red Hat Security Advisory: postgresql:12 security update | 2025-09-03T08:34:17+00:00 | 2025-11-21T19:24:52+00:00 |
| rhsa-2025:15114 | Red Hat Security Advisory: postgresql security update | 2025-09-03T05:40:37+00:00 | 2025-11-21T19:24:51+00:00 |
| rhsa-2025:14919 | Red Hat Security Advisory: Red Hat build of Cryostat 4.0.2: new RHEL 9 container image security update | 2025-09-03T02:15:18+00:00 | 2026-01-19T03:55:06+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-202-01 | ABB Drive Composer, Automation Builder, Mint Workbench | 2022-07-21T00:00:00.000000Z | 2022-07-21T00:00:00.000000Z |
| icsa-22-200-01 | MiCODUS MV720 GPS tracker | 2022-07-19T00:00:00.000000Z | 2022-09-20T00:00:00.000000Z |
| icsa-22-195-18 | Siemens RUGGEDCOM ROS Code Injection | 2022-07-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-22-195-17 | Siemens Opcenter Quality | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-16 | Siemens EN100 Ethernet Module | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-15 | Siemens SIMATIC eaSie Core Package | 2022-07-12T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-195-14 | Siemens CPC80 Firmware of SICAM A8000 | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-13 | Siemens Mendix | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-12 | Siemens SRCS VPN Feature in SIMATIC CP Devices | 2022-07-12T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-22-195-11 | Open Design Alliance Drawings SDK | 2022-07-12T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsa-22-195-10 | Siemens Mendix Applications | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-09 | Simcenter Femap and Parasolid | 2022-07-12T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsa-22-195-08 | Siemens PADS Standard/Plus Viewer | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-07 | Siemens Datalogics File Parsing Vulnerability | 2022-07-12T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-22-195-06 | Siemens Mendix Excel Importer | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-05 | Siemens RUGGEDCOM ROX | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-04 | Siemens Simcenter Femap | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-03 | Siemens SIMATIC MV500 Devices | 2022-07-12T00:00:00.000000Z | 2022-07-12T00:00:00.000000Z |
| icsa-22-195-02 | Siemens SICAM GridEdge | 2022-07-12T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-22-195-01 | Siemens SCALANCE X Switch Devices | 2022-07-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-193-01 | Dahua ASI7213X-T1 (Update A) | 2022-07-12T00:00:00.000000Z | 2022-07-19T00:00:00.000000Z |
| icsa-22-188-02 | Bently Nevada ADAPT 3701/4X Series and 60M100 | 2022-07-07T00:00:00.000000Z | 2022-07-07T00:00:00.000000Z |
| icsa-22-188-01 | Rockwell Automation MicroLogix | 2022-07-07T00:00:00.000000Z | 2022-07-07T00:00:00.000000Z |
| icsa-25-182-04 | FESTO Hardware Controller, Hardware Servo Press Kit | 2022-07-06T07:00:00.000000Z | 2025-06-23T08:00:00.000000Z |
| icsa-22-181-04 | Distributed Data Systems WebHMI | 2022-06-30T00:00:00.000000Z | 2022-06-30T00:00:00.000000Z |
| icsa-22-181-03 | Emerson DeltaV Distributed Control System | 2022-06-30T00:00:00.000000Z | 2022-06-30T00:00:00.000000Z |
| icsa-22-181-02 | Yokogawa Wide Area Communication Router | 2022-06-30T00:00:00.000000Z | 2022-06-30T00:00:00.000000Z |
| icsa-22-181-01 | Exemys RME1 | 2022-06-30T00:00:00.000000Z | 2022-06-30T00:00:00.000000Z |
| icsa-22-179-06 | Motorola Solutions ACE1000 | 2022-06-28T00:00:00.000000Z | 2022-06-28T00:00:00.000000Z |
| icsa-22-179-05 | Motorola Solutions MDLC | 2022-06-28T00:00:00.000000Z | 2022-06-28T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-asr920-abjclmef | Cisco ASR 920 Series Aggregation Services Router Model 12SZ-IM SNMP Denial of Service Vulnerability | 2020-06-03T16:00:00+00:00 | 2020-06-03T16:00:00+00:00 |
| cisco-sa-apic-ksv-3wzbhyt4 | Cisco Application Services Engine Software Authorization Vulnerability | 2020-06-03T16:00:00+00:00 | 2020-06-03T16:00:00+00:00 |
| cisco-sa-apic-epu-f8y5kuop | Cisco Application Services Engine Software Unauthenticated Event Policies Update Vulnerability | 2020-06-03T16:00:00+00:00 | 2020-06-03T16:00:00+00:00 |
| cisco-sa-nxos-ipip-dos-kct9x4 | Cisco NX-OS Software Unexpected IP in IP Packet Processing Vulnerability | 2020-06-01T16:00:00+00:00 | 2020-06-01T16:00:00+00:00 |
| cisco-sa-salt-2vx545ag | SaltStack FrameWork Vulnerabilities Affecting Cisco Products | 2020-05-28T16:00:00+00:00 | 2020-06-16T15:17:35+00:00 |
| cisco-sa-uccx-rce-gmsc6rkn | Cisco Unified Contact Center Express Remote Code Execution Vulnerability | 2020-05-20T16:00:00+00:00 | 2020-05-20T16:00:00+00:00 |
| cisco-sa-pcp-sql-inj-22auwt66 | Cisco Prime Collaboration Provisioning Software SQL Injection Vulnerability | 2020-05-20T16:00:00+00:00 | 2020-05-20T16:00:00+00:00 |
| cisco-sa-cpnr-dhcp-dos-bkezfhlp | Cisco Prime Network Registrar DHCP Denial of Service Vulnerability | 2020-05-20T16:00:00+00:00 | 2020-05-20T16:00:00+00:00 |
| cisco-sa-amp4emac-dos-kfkjugtm | Cisco AMP for Endpoints Mac Connector Software File Scan Denial of Service Vulnerability | 2020-05-20T16:00:00+00:00 | 2020-05-20T16:00:00+00:00 |
| cisco-sa-amp4elinux-h33dkrvb | Cisco AMP for Endpoints Linux Connector and AMP for Endpoints Mac Connector Software Memory Buffer Vulnerability | 2020-05-20T16:00:00+00:00 | 2020-05-20T16:00:00+00:00 |
| cisco-sa-xpftd-gydxyn8h | Cisco Firepower Device Manager On-Box Software XML Parsing Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-umbrella-head-inject-n4qarjh | Cisco Umbrella Carriage Return Line Feed Injection Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-ucsd-ar6baguz | Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Role-Based Access Control Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-ssl-bypass-o5tgum2n | Cisco Firepower Threat Defense Software SSL/TLS URL Category Bypass Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-snort_filepolbypass-m4x5dgop | Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-08T15:54:59+00:00 |
| cisco-sa-sma-opn-rdrct-yppmdsmq | Cisco Content Security Management Appliance Open Redirect Vulnerabilities | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-sigbypass-fcvppcep | Cisco Firepower Threat Defense Software Signature Verification Bypass Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-hcmf-xxe-qqcmauj2 | Cisco Hosted Collaboration Mediation Fulfillment XML External Expansion Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-ftd-tls-dos-4v5nmwtz | Cisco Firepower 1000 Series SSL/TLS Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T20:40:35+00:00 |
| cisco-sa-ftd-shell-9rhjf68k | Cisco Firepower Threat Defense Software Shell Access Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-ftd-mgmt-interface-dos-fkg4mutu | Cisco Firepower Threat Defense Software Management Interface Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T21:00:50+00:00 |
| cisco-sa-ftd-infodis-kzxgtujd | Cisco Firepower Threat Defense Software Information Disclosure Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-ftd-dos-rdpe34sd8 | Cisco Firepower Threat Defense Software VPN System Logging Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T21:11:10+00:00 |
| cisco-sa-ftd-dos-n2vqzasr | Cisco Firepower Threat Defense Software Packet Flood Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T20:53:05+00:00 |
| cisco-sa-ftd-dos-2-ss2h7awe | Cisco Firepower Threat Defense Software Generic Routing Encapsulation Tunnel IPv6 Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-06-02T21:15:25+00:00 |
| cisco-sa-ftd-accesslist-bypass-5dzs5qzp | Cisco Firepower Threat Defense Software Management Access List Bypass Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-fp2100-arp-dos-kldck8ks | Cisco Firepower 2100 Series Security Appliances ARP Denial of Service Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-11T15:48:19+00:00 |
| cisco-sa-fmcxss-ut3bmx9k | Cisco Firepower Management Center Cross-Site Scripting Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-fmcua-statcred-weecczct | Cisco Firepower Management Center Static Credential Vulnerabilities | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| cisco-sa-fmcai-z5dqobvn | Cisco Firepower Management Center File Overwrite Vulnerability | 2020-05-06T16:00:00+00:00 | 2020-05-06T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-4877 | Libssh: write beyond bounds in binary to base64 conversion functions | 2025-08-02T00:00:00.000Z | 2025-09-03T21:53:59.000Z |
| msrc_cve-2025-47907 | Incorrect results returned from Rows.Scan in database/sql | 2025-08-02T00:00:00.000Z | 2025-09-03T22:18:29.000Z |
| msrc_cve-2025-38677 | f2fs: fix to avoid out-of-boundary access in dnode page | 2025-08-02T00:00:00.000Z | 2025-09-04T01:06:37.000Z |
| msrc_cve-2025-38676 | iommu/amd: Avoid stack buffer overflow from kernel cmdline | 2025-08-02T00:00:00.000Z | 2025-09-03T23:53:01.000Z |
| msrc_cve-2025-38671 | i2c: qup: jump out of the loop in case of timeout | 2025-08-02T00:00:00.000Z | 2025-09-03T22:19:35.000Z |
| msrc_cve-2025-38670 | arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() | 2025-08-02T00:00:00.000Z | 2025-09-03T23:20:26.000Z |
| msrc_cve-2025-38668 | regulator: core: fix NULL dereference on unbind due to stale coupling data | 2025-08-02T00:00:00.000Z | 2025-09-03T22:04:02.000Z |
| msrc_cve-2025-38666 | net: appletalk: Fix use-after-free in AARP proxy probe | 2025-08-02T00:00:00.000Z | 2025-09-03T23:29:24.000Z |
| msrc_cve-2025-38665 | can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode | 2025-08-02T00:00:00.000Z | 2025-09-03T22:16:52.000Z |
| msrc_cve-2025-38664 | ice: Fix a null pointer dereference in ice_copy_and_init_pkg() | 2025-08-02T00:00:00.000Z | 2025-09-03T23:00:09.000Z |
| msrc_cve-2025-38663 | nilfs2: reject invalid file types when reading inodes | 2025-08-02T00:00:00.000Z | 2025-09-03T22:51:05.000Z |
| msrc_cve-2025-38660 | [ceph] parse_longname(): strrchr() expects NUL-terminated string | 2025-08-02T00:00:00.000Z | 2025-12-07T01:48:19.000Z |
| msrc_cve-2025-38659 | gfs2: No more self recovery | 2025-08-02T00:00:00.000Z | 2025-12-03T01:38:39.000Z |
| msrc_cve-2025-38656 | wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() | 2025-08-02T00:00:00.000Z | 2025-12-07T01:38:41.000Z |
| msrc_cve-2025-38653 | proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al | 2025-08-02T00:00:00.000Z | 2025-09-03T22:05:46.000Z |
| msrc_cve-2025-38652 | f2fs: fix to avoid out-of-boundary access in devs.path | 2025-08-02T00:00:00.000Z | 2025-09-03T22:24:43.000Z |
| msrc_cve-2025-38650 | hfsplus: remove mutex_lock check in hfsplus_free_extents | 2025-08-02T00:00:00.000Z | 2025-09-03T22:46:10.000Z |
| msrc_cve-2025-38648 | spi: stm32: Check for cfg availability in stm32_spi_probe | 2025-08-02T00:00:00.000Z | 2025-09-03T22:48:28.000Z |
| msrc_cve-2025-38646 | wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band | 2025-08-02T00:00:00.000Z | 2025-09-03T23:14:25.000Z |
| msrc_cve-2025-38645 | net/mlx5: Check device memory pointer before usage | 2025-08-02T00:00:00.000Z | 2025-09-03T23:23:33.000Z |
| msrc_cve-2025-38644 | wifi: mac80211: reject TDLS operations when station is not associated | 2025-08-02T00:00:00.000Z | 2026-01-08T01:02:42.000Z |
| msrc_cve-2025-38643 | wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() | 2025-08-02T00:00:00.000Z | 2026-01-07T14:35:40.000Z |
| msrc_cve-2025-38640 | bpf: Disable migration in nf_hook_run_bpf(). | 2025-08-02T00:00:00.000Z | 2025-09-03T23:09:33.000Z |
| msrc_cve-2025-38639 | netfilter: xt_nfacct: don't assume acct name is null-terminated | 2025-08-02T00:00:00.000Z | 2026-01-08T01:02:37.000Z |
| msrc_cve-2025-38636 | rv: Use strings in da monitors tracepoints | 2025-08-02T00:00:00.000Z | 2025-12-07T01:49:07.000Z |
| msrc_cve-2025-38635 | clk: davinci: Add NULL check in davinci_lpsc_clk_register() | 2025-08-02T00:00:00.000Z | 2026-01-08T01:02:32.000Z |
| msrc_cve-2025-38634 | power: supply: cpcap-charger: Fix null check for power_supply_get_by_name | 2025-08-02T00:00:00.000Z | 2026-01-08T01:02:27.000Z |
| msrc_cve-2025-38630 | fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref | 2025-08-02T00:00:00.000Z | 2026-01-08T01:02:22.000Z |
| msrc_cve-2025-38627 | f2fs: compress: fix UAF of f2fs_inode_info in f2fs_free_dic | 2025-08-02T00:00:00.000Z | 2026-01-07T14:35:33.000Z |
| msrc_cve-2025-38626 | f2fs: fix to trigger foreground gc during f2fs_map_blocks() in lfs mode | 2025-08-02T00:00:00.000Z | 2025-12-03T01:38:53.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202512-0021 | In AzeoTech DAQFactory release 20.7 (Build 2555), a Stack-Based Buffer Overflow vulnerabi… | 2025-12-20T19:39:02.662000Z |
| var-202512-0023 | In AzeoTech DAQFactory release 20.7 (Build 2555), an Access of Resource Using Incompatibl… | 2025-12-20T19:39:02.634000Z |
| var-202512-0022 | In AzeoTech DAQFactory release 20.7 (Build 2555), a Use After Free vulnerability can be e… | 2025-12-20T19:39:02.612000Z |
| var-202512-0018 | In AzeoTech DAQFactory release 20.7 (Build 2555), an Access of Uninitialized Pointer vuln… | 2025-12-20T19:39:02.595000Z |
| var-202512-0017 | In AzeoTech DAQFactory release 20.7 (Build 2555), the affected application is vulnerable … | 2025-12-20T19:39:02.575000Z |
| var-202512-0019 | In AzeoTech DAQFactory release 20.7 (Build 2555), an Out-of-bounds Read vulnerability can… | 2025-12-20T19:39:02.534000Z |
| var-202512-0020 | In AzeoTech DAQFactory release 20.7 (Build 2555), an Out-of-bounds Write vulnerability ca… | 2025-12-20T19:39:02.502000Z |
| var-202209-1073 | TOTOLINK-720R v4.1.5cu.374 was discovered to contain a remote code execution (RCE) vulner… | 2025-12-19T23:03:12.310000Z |
| var-202401-0298 | A vulnerability, which was classified as critical, has been found in Totolink LR1200GB 9.… | 2025-12-19T23:03:10.058000Z |
| var-202403-2073 | Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the schedStartTime para… | 2025-12-19T23:03:09.700000Z |
| var-202511-2421 | A command injection vulnerability has been identified in bwdpi. A remote, authenticated a… | 2025-12-19T23:03:06.080000Z |
| var-202512-0002 | A security flaw has been discovered in Tenda CH22 1.0.0.1. This affects the function frmL… | 2025-12-19T23:03:05.839000Z |
| var-202401-0476 | A vulnerability classified as critical was found in Totolink LR1200GB 9.1.0u.6619_B202301… | 2025-12-19T23:02:31.688000Z |
| var-202403-3020 | Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability in the page parameter of fr… | 2025-12-19T23:02:31.223000Z |
| var-202511-2406 | Out-of-bounds read in Application Gateway allows an unauthorized attacker to elevate priv… | 2025-12-19T23:02:27.251000Z |
| var-202512-1793 | In Modem, there is a possible application crash due to improper input validation. This co… | 2025-12-19T23:02:22.191000Z |
| var-202403-3051 | Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the time parameter from … | 2025-12-19T23:01:35.219000Z |
| var-202511-1845 | An unauthenticated command injection vulnerability exists in the ToToLink LR1200GB Router… | 2025-12-19T23:01:31.950000Z |
| var-202403-3269 | Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedStartTime param… | 2025-12-19T23:01:09.608000Z |
| var-202511-0855 | TOTOLink A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow in the … | 2025-12-19T23:01:06.206000Z |
| var-202511-2413 | A path traversal vulnerability has been identified in certain router models. A remote, au… | 2025-12-19T23:00:11.660000Z |
| var-202512-0754 | In Modem, there is a possible system crash due to an uncaught exception. This could lead … | 2025-12-19T23:00:11.066000Z |
| var-202512-0920 | An improper neutralization of special elements used in an sql command ('sql injection') v… | 2025-12-19T23:00:10.768000Z |
| var-202307-1097 | The Rockwell Automation Enhanced HIM software contains an API that the application uses… | 2025-12-19T22:59:42.381000Z |
| var-202401-0454 | A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been rated a… | 2025-12-19T22:59:41.647000Z |
| var-202403-3049 | Tenda F1202 v1.2.0.20(408) has a command injection vulnerablility in the formWriteFacMac … | 2025-12-19T22:59:41.207000Z |
| var-202512-2040 | In Modem, there is a possible system crash due to improper input validation. This could l… | 2025-12-19T22:59:32.401000Z |
| var-202208-2067 | TOTOLINK A950RG V4.1.2cu.5204_B20210112 was discovered to contain a hardcoded password fo… | 2025-12-19T22:58:15.355000Z |
| var-202311-1187 | Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an att… | 2025-12-19T22:58:13.256000Z |
| var-202401-2281 | An issue discovered in TOTOLINK X6000R v9.4.0cu.852_B20230719 allows attackers to run arb… | 2025-12-19T22:58:12.967000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2017-000022 | Multiple cross-site scripting vulnerabilities in Webmin | 2017-02-09T14:06+09:00 | 2017-06-02T18:04+09:00 |
| jvndb-2017-000017 | Business LaLa Call App for Android fails to verify SSL server certificates | 2017-02-03T13:58+09:00 | 2017-06-06T11:52+09:00 |
| jvndb-2017-000016 | LaLa Call App for Android fails to verify SSL server certificates | 2017-02-03T13:31+09:00 | 2017-06-06T11:52+09:00 |
| jvndb-2017-000014 | CubeCart vulnerable to directory traversal | 2017-01-27T13:49+09:00 | 2017-06-01T11:30+09:00 |
| jvndb-2017-000011 | Knowledge vulnerable to cross-site request forgery | 2017-01-24T14:12+09:00 | 2017-06-06T14:38+09:00 |
| jvndb-2017-000013 | Nessus vulnerable to cross-site scripting | 2017-01-24T13:38+09:00 | 2017-02-20T17:44+09:00 |
| jvndb-2017-000010 | smalruby-editor vulnerable to OS command injection | 2017-01-24T13:34+09:00 | 2017-06-06T15:40+09:00 |
| jvndb-2017-001054 | Arbitrary file upload vulnerability in GigaCC OFFICE | 2017-01-23T17:57+09:00 | 2018-02-28T11:25+09:00 |
| jvndb-2017-001053 | Mis-configuration of Apache Velocity template engine used to send emails in GigaCC OFFICE | 2017-01-23T17:57+09:00 | 2018-02-28T11:35+09:00 |
| jvndb-2017-000012 | Java (OGNL) code execution in Apache Struts 2 when devMode is enabled | 2017-01-20T14:01+09:00 | 2017-01-20T14:01+09:00 |
| jvndb-2017-000009 | MaruUo Factory's multiple AttacheCase products vulnerable to directory traversal | 2017-01-16T14:41+09:00 | 2017-06-06T16:13+09:00 |
| jvndb-2017-000008 | AttacheCase vulnerable to directory traversal | 2017-01-16T14:35+09:00 | 2017-06-06T16:13+09:00 |
| jvndb-2017-000007 | Cybozu Remote Service Manager fails to verify client certificates | 2017-01-11T13:46+09:00 | 2017-06-06T15:52+09:00 |
| jvndb-2017-000003 | Olive Diary DX vulnerable to cross-site scripting | 2017-01-06T14:02+09:00 | 2017-06-01T15:58+09:00 |
| jvndb-2017-000002 | WEB SCHEDULE vulnerable to cross-site scripting | 2017-01-06T14:01+09:00 | 2017-06-01T15:58+09:00 |
| jvndb-2017-000001 | Olive Blog vulnerable to cross-site scripting | 2017-01-06T13:56+09:00 | 2017-06-01T15:58+09:00 |
| jvndb-2016-000251 | WinSparkle issue where registry value is not validated | 2016-12-26T14:45+09:00 | 2018-02-16T16:00+09:00 |
| jvndb-2016-000250 | Wireshark for Windows issue where an arbitrary file may be deleted | 2016-12-26T14:45+09:00 | 2018-02-16T16:00+09:00 |
| jvndb-2016-000249 | SKYSEA Client View vulnerable to arbitrary code execution | 2016-12-22T14:26+09:00 | 2017-11-27T16:53+09:00 |
| jvndb-2016-000248 | H2O use-after-free vulnerability | 2016-12-22T14:26+09:00 | 2017-11-27T16:53+09:00 |
| jvndb-2016-000247 | BlueZ userland utilities vulnerable to buffer overflow | 2016-12-22T14:26+09:00 | 2017-11-27T16:47+09:00 |
| jvndb-2016-000226 | Cybozu Garoon fails to restrict access permission in To-Dos of Space function | 2016-12-19T14:38+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000225 | Cybozu Garoon fails to restrict access permission in MultiReport filters | 2016-12-19T14:32+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000224 | Cybozu Garoon fails to restrict access permission in the RSS settings | 2016-12-19T14:29+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000229 | Cybozu Garoon vulnerable to SQL injection | 2016-12-19T14:19+09:00 | 2017-11-27T17:11+09:00 |
| jvndb-2016-000228 | Cybozu Garoon vulnerable to directory traversal | 2016-12-19T13:44+09:00 | 2017-11-27T17:11+09:00 |
| jvndb-2016-000227 | Cybozu Garoon vulnerable to cross-site request forgery | 2016-12-19T13:36+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000223 | Cybozu Garoon vulnerable to information disclosure | 2016-12-19T12:29+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000222 | Cybozu Garoon vulnerable to cross-site scripting | 2016-12-19T12:22+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000246 | Mutiple SONY Videoconference Systems do not properly perform authentication | 2016-12-16T14:11+09:00 | 2018-01-17T14:03+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:02765-1 | Security update for webkit2gtk3 | 2025-08-12T12:59:26Z | 2025-08-12T12:59:26Z |
| suse-su-2025:02762-1 | Security update for eclipse-jgit | 2025-08-12T12:45:02Z | 2025-08-12T12:45:02Z |
| suse-su-2025:02760-1 | Security update for go1.24 | 2025-08-12T12:08:24Z | 2025-08-12T12:08:24Z |
| suse-su-2025:02759-1 | Security update for go1.23 | 2025-08-12T12:06:25Z | 2025-08-12T12:06:25Z |
| suse-su-2025:02758-1 | Security update for libxml2 | 2025-08-12T10:05:26Z | 2025-08-12T10:05:26Z |
| suse-su-2025:02756-1 | Security update for libgcrypt | 2025-08-12T08:23:08Z | 2025-08-12T08:23:08Z |
| suse-su-2025:02755-1 | Security update for libssh | 2025-08-12T07:35:23Z | 2025-08-12T07:35:23Z |
| suse-su-2025:02754-1 | Security update for opensc | 2025-08-12T07:35:08Z | 2025-08-12T07:35:08Z |
| suse-su-2025:02752-1 | Security update for libgcrypt | 2025-08-11T13:15:24Z | 2025-08-11T13:15:24Z |
| suse-su-2025:02751-1 | Security update for ImageMagick | 2025-08-11T13:14:11Z | 2025-08-11T13:14:11Z |
| suse-su-2025:01786-2 | Security update for postgresql14 | 2025-08-11T12:43:59Z | 2025-08-11T12:43:59Z |
| suse-su-2025:01782-2 | Security update for postgresql16 | 2025-08-11T12:42:58Z | 2025-08-11T12:42:58Z |
| suse-su-2025:02749-1 | Security update for iperf | 2025-08-11T07:06:39Z | 2025-08-11T07:06:39Z |
| suse-su-2025:02746-1 | Security update for zabbix | 2025-08-11T06:20:26Z | 2025-08-11T06:20:26Z |
| suse-su-2025:02745-1 | Security update for tomcat | 2025-08-11T06:20:12Z | 2025-08-11T06:20:12Z |
| suse-su-2025:02744-1 | Security update for sqlite3 | 2025-08-08T12:41:39Z | 2025-08-08T12:41:39Z |
| suse-su-2025:20591-1 | Security update for jq | 2025-08-08T10:28:21Z | 2025-08-08T10:28:21Z |
| suse-su-2025:20590-1 | Security update for xz | 2025-08-08T10:26:17Z | 2025-08-08T10:26:17Z |
| suse-su-2025:20553-1 | Security update for xz | 2025-08-08T10:14:29Z | 2025-08-08T10:14:29Z |
| suse-su-2025:02740-1 | Security update for tgt | 2025-08-08T09:11:54Z | 2025-08-08T09:11:54Z |
| suse-su-2025:02739-1 | Security update for ruby2.5 | 2025-08-08T09:11:19Z | 2025-08-08T09:11:19Z |
| suse-su-2025:02736-1 | Security update for python-urllib3 | 2025-08-08T08:06:29Z | 2025-08-08T08:06:29Z |
| suse-su-2025:02735-1 | Security update for python-urllib3 | 2025-08-08T08:06:11Z | 2025-08-08T08:06:11Z |
| suse-su-2025:02734-1 | Security update for dpkg | 2025-08-08T08:05:13Z | 2025-08-08T08:05:13Z |
| suse-su-2025:02727-1 | Security update for grub2 | 2025-08-07T09:02:11Z | 2025-08-07T09:02:11Z |
| suse-su-2025:02725-1 | Security update for grub2 | 2025-08-07T09:01:46Z | 2025-08-07T09:01:46Z |
| suse-su-2025:02724-1 | Security update for grub2 | 2025-08-07T09:01:39Z | 2025-08-07T09:01:39Z |
| suse-su-2025:02719-1 | Security update for libgcrypt | 2025-08-07T03:38:36Z | 2025-08-07T03:38:36Z |
| suse-su-2025:02718-1 | Security update for libarchive | 2025-08-06T13:55:09Z | 2025-08-06T13:55:09Z |
| suse-su-2025:02717-1 | Security update for python311 | 2025-08-06T13:39:47Z | 2025-08-06T13:39:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:14502-1 | postgresql13-13.17-1.1 on GA media | 2024-11-15T00:00:00Z | 2024-11-15T00:00:00Z |
| opensuse-su-2024:14501-1 | postgresql12-12.21-1.1 on GA media | 2024-11-15T00:00:00Z | 2024-11-15T00:00:00Z |
| opensuse-su-2024:14500-1 | kernel-devel-6.11.8-1.1 on GA media | 2024-11-15T00:00:00Z | 2024-11-15T00:00:00Z |
| opensuse-su-2024:14499-1 | ansible-core-2.16-2.16.13-1.1 on GA media | 2024-11-15T00:00:00Z | 2024-11-15T00:00:00Z |
| opensuse-su-2024:14498-1 | ansible-core-2.17.6-1.1 on GA media | 2024-11-15T00:00:00Z | 2024-11-15T00:00:00Z |
| opensuse-su-2024:14497-1 | MozillaThunderbird-128.4.3-1.1 on GA media | 2024-11-15T00:00:00Z | 2024-11-15T00:00:00Z |
| opensuse-su-2024:14496-1 | ucode-intel-20241112-1.1 on GA media | 2024-11-14T00:00:00Z | 2024-11-14T00:00:00Z |
| opensuse-su-2024:14495-1 | rclone-1.68.1-2.1 on GA media | 2024-11-14T00:00:00Z | 2024-11-14T00:00:00Z |
| opensuse-su-2024:14494-1 | nodejs-electron-31.7.4-1.1 on GA media | 2024-11-14T00:00:00Z | 2024-11-14T00:00:00Z |
| opensuse-su-2024:14493-1 | icinga2-2.14.3-1.1 on GA media | 2024-11-14T00:00:00Z | 2024-11-14T00:00:00Z |
| opensuse-su-2024:14492-1 | wget-1.25.0-1.1 on GA media | 2024-11-13T00:00:00Z | 2024-11-13T00:00:00Z |
| opensuse-su-2024:14491-1 | libnghttp2-14-1.64.0-1.1 on GA media | 2024-11-13T00:00:00Z | 2024-11-13T00:00:00Z |
| opensuse-su-2024:14490-1 | libvirt-10.9.0-3.1 on GA media | 2024-11-13T00:00:00Z | 2024-11-13T00:00:00Z |
| opensuse-su-2024:14489-1 | libsoup-2_4-1-2.74.3-4.1 on GA media | 2024-11-13T00:00:00Z | 2024-11-13T00:00:00Z |
| opensuse-su-2024:14488-1 | libsoup-3_0-0-3.6.0-2.1 on GA media | 2024-11-13T00:00:00Z | 2024-11-13T00:00:00Z |
| opensuse-su-2024:14487-1 | gio-branding-upstream-2.82.2-2.1 on GA media | 2024-11-13T00:00:00Z | 2024-11-13T00:00:00Z |
| opensuse-su-2024:0366-1 | Security update for python-PyPDF2 | 2024-11-12T17:01:19Z | 2024-11-12T17:01:19Z |
| opensuse-su-2024:14486-1 | switchboard-plug-bluetooth-8.0.1-1.1 on GA media | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| opensuse-su-2024:14485-1 | jujutsu-0.23.0-1.1 on GA media | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| opensuse-su-2024:14484-1 | govulncheck-vulndb-0.0.20241112T145010-1.1 on GA media | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| opensuse-su-2024:14483-1 | MozillaFirefox-132.0.1-1.1 on GA media | 2024-11-11T00:00:00Z | 2024-11-11T00:00:00Z |
| opensuse-su-2024:0364-1 | Security update for virtualbox | 2024-11-10T09:55:36Z | 2024-11-10T09:55:36Z |
| opensuse-su-2024:14482-1 | govulncheck-vulndb-0.0.20241108T172500-1.1 on GA media | 2024-11-09T00:00:00Z | 2024-11-09T00:00:00Z |
| opensuse-su-2024:14481-1 | coredns-1.11.3+git129.387f34d-1.1 on GA media | 2024-11-09T00:00:00Z | 2024-11-09T00:00:00Z |
| opensuse-su-2024:0358-1 | Security update for qbittorrent | 2024-11-08T15:01:42Z | 2024-11-08T15:01:42Z |
| opensuse-su-2024:0357-1 | Security update for chromium | 2024-11-08T08:42:46Z | 2024-11-08T08:42:46Z |
| opensuse-su-2024:0356-1 | Security update for chromium | 2024-11-08T08:41:21Z | 2024-11-08T08:41:21Z |
| opensuse-su-2024:14480-1 | xstream-1.4.21-1.1 on GA media | 2024-11-08T00:00:00Z | 2024-11-08T00:00:00Z |
| opensuse-su-2024:14479-1 | ruby3.3-rubygem-rails-7.0-7.0.8.6-1.1 on GA media | 2024-11-08T00:00:00Z | 2024-11-08T00:00:00Z |
| opensuse-su-2024:14478-1 | httpcomponents-client-4.5.14-1.1 on GA media | 2024-11-08T00:00:00Z | 2024-11-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-24102 | Simple Scheduling System add.home.php文件SQL注入漏洞 | 2025-09-29 | 2025-10-16 |
| cnvd-2025-24101 | Hostel Management System mod_users/index.php文件SQL注入漏洞 | 2025-09-29 | 2025-10-16 |
| cnvd-2025-24072 | WordPress插件Authorsy跨站脚本漏洞 | 2025-09-29 | 2025-10-17 |
| cnvd-2025-23968 | E-Commerce Website pages/admin_product_details.php文件SQL注入漏洞 | 2025-09-29 | 2025-10-15 |
| cnvd-2025-23967 | E-Commerce Website admin_index_search.php文件SQL注入漏洞 | 2025-09-29 | 2025-10-15 |
| cnvd-2025-23966 | E-Commerce Website admin_account_update.php文件SQL注入漏洞 | 2025-09-29 | 2025-10-15 |
| cnvd-2025-23707 | IBM Watsonx.data日志信息泄露漏洞 | 2025-09-29 | 2025-10-15 |
| cnvd-2025-23473 | GNU Binutils elf_swap_shdr函数缓冲区溢出漏洞 | 2025-09-29 | 2025-10-13 |
| cnvd-2025-23472 | GNU Binutils bfd/elf-eh-frame.c文件堆缓冲区溢出漏洞 | 2025-09-29 | 2025-10-13 |
| cnvd-2025-23467 | D-Link DIR-823X命令注入漏洞(CNVD-2025-23467) | 2025-09-29 | 2025-10-13 |
| cnvd-2025-23466 | D-Link DIR-823X命令执行漏洞 | 2025-09-29 | 2025-10-13 |
| cnvd-2025-23464 | WordPress插件aThemes Addons for Elementor跨站脚本漏洞 | 2025-09-29 | 2025-10-13 |
| cnvd-2025-23463 | WordPress插件AR For WordPress跨站请求伪造漏洞 | 2025-09-29 | 2025-10-13 |
| cnvd-2025-23462 | WordPress插件AllInOne - Banner Rotator SQL注入漏洞 | 2025-09-29 | 2025-10-13 |
| cnvd-2025-23461 | WordPress插件Acclectic Media Organizer授权缺失漏洞 | 2025-09-29 | 2025-10-13 |
| cnvd-2025-23372 | D-Link DIR-823X命令注入漏洞(CNVD-2025-23372) | 2025-09-29 | 2025-10-11 |
| cnvd-2025-23371 | D-Link DIR-823X命令注入漏洞(CNVD-2025-23371) | 2025-09-29 | 2025-10-11 |
| cnvd-2025-23370 | D-Link DIR-823X命令注入漏洞(CNVD-2025-23370) | 2025-09-29 | 2025-10-11 |
| cnvd-2025-23369 | D-Link DIR-823X命令注入漏洞(CNVD-2025-23369) | 2025-09-29 | 2025-10-11 |
| cnvd-2025-23368 | D-Link DIR-823X命令注入漏洞(CNVD-2025-23368) | 2025-09-29 | 2025-10-11 |
| cnvd-2025-23367 | D-Link DIR-823X命令注入漏洞(CNVD-2025-23367) | 2025-09-29 | 2025-10-11 |
| cnvd-2025-23326 | Employee Record Management System myprofile.php文件跨站脚本漏洞 | 2025-09-29 | 2025-10-11 |
| cnvd-2025-23114 | Tenda AC18命令注入漏洞 | 2025-09-29 | 2025-10-09 |
| cnvd-2025-23113 | Tenda AC18缓冲区溢出漏洞 | 2025-09-29 | 2025-10-09 |
| cnvd-2025-23112 | Small CRM SQL注入漏洞 | 2025-09-29 | 2025-10-09 |
| cnvd-2025-23708 | IBM Cognos Controller和IBM Controller加密问题漏洞 | 2025-09-28 | 2025-10-15 |
| cnvd-2025-23587 | TOTOLINK N600R空指针取消引用漏洞 | 2025-09-28 | 2025-10-14 |
| cnvd-2025-23475 | DELL PowerScale OneFS信息泄露漏洞 | 2025-09-28 | 2025-10-13 |
| cnvd-2025-23474 | DELL BSAFE Crypto-J信息泄露漏洞 | 2025-09-28 | 2025-10-13 |
| cnvd-2025-23288 | PyTorch torch.linalg.lu组件存在未明漏洞 | 2025-09-28 | 2025-10-10 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-avi-0786 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2024-09-18T00:00:00.000000 | 2024-09-18T00:00:00.000000 |
| certfr-2024-avi-0785 | Multiples vulnérabilités dans les produits Apple | 2024-09-17T00:00:00.000000 | 2024-09-17T00:00:00.000000 |
| certfr-2024-avi-0784 | Vulnérabilité dans Ivanti Cloud Service Appliance | 2024-09-17T00:00:00.000000 | 2024-09-20T00:00:00.000000 |
| certfr-2024-avi-0783 | Vulnérabilité dans MISP | 2024-09-16T00:00:00.000000 | 2024-09-16T00:00:00.000000 |
| certfr-2024-avi-0782 | Vulnérabilité dans SolarWinds Access Rights Manager | 2024-09-16T00:00:00.000000 | 2024-09-16T00:00:00.000000 |
| certfr-2024-avi-0781 | Multiples vulnérabilités dans les produits Juniper Networks | 2024-09-16T00:00:00.000000 | 2024-10-15T00:00:00.000000 |
| certfr-2024-avi-0780 | Multiples vulnérabilités dans les produits IBM | 2024-09-13T00:00:00.000000 | 2024-09-13T00:00:00.000000 |
| certfr-2024-avi-0779 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-09-13T00:00:00.000000 | 2024-09-13T00:00:00.000000 |
| certfr-2024-avi-0778 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-09-13T00:00:00.000000 | 2024-09-13T00:00:00.000000 |
| certfr-2024-avi-0777 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-09-13T00:00:00.000000 | 2024-09-13T00:00:00.000000 |
| certfr-2024-avi-0776 | Vulnérabilité dans Spring Framework | 2024-09-13T00:00:00.000000 | 2024-09-13T00:00:00.000000 |
| certfr-2024-avi-0775 | Multiples vulnérabilités dans Microsoft Edge | 2024-09-13T00:00:00.000000 | 2024-09-13T00:00:00.000000 |
| certfr-2024-avi-0774 | Vulnérabilité dans les produits Juniper Networks | 2024-09-12T00:00:00.000000 | 2024-09-12T00:00:00.000000 |
| certfr-2024-avi-0773 | Multiples vulnérabilités dans Microsoft Edge | 2024-09-12T00:00:00.000000 | 2024-09-12T00:00:00.000000 |
| certfr-2024-avi-0772 | Multiples vulnérabilités dans les produits Cisco | 2024-09-12T00:00:00.000000 | 2024-09-12T00:00:00.000000 |
| certfr-2024-avi-0771 | Multiples vulnérabilités dans les produits Tenable | 2024-09-12T00:00:00.000000 | 2024-09-12T00:00:00.000000 |
| certfr-2024-avi-0770 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2024-09-12T00:00:00.000000 | 2024-09-12T00:00:00.000000 |
| certfr-2024-avi-0769 | Multiples vulnérabilités dans GitLab | 2024-09-12T00:00:00.000000 | 2024-09-12T00:00:00.000000 |
| certfr-2024-avi-0768 | Multiples vulnérabilités dans les produits Intel | 2024-09-11T00:00:00.000000 | 2024-09-11T00:00:00.000000 |
| certfr-2024-avi-0767 | Multiples vulnérabilités dans Ivanti Endpoint Manager | 2024-09-11T00:00:00.000000 | 2024-09-11T00:00:00.000000 |
| certfr-2024-avi-0766 | Multiples vulnérabilités dans Google Chrome | 2024-09-11T00:00:00.000000 | 2024-09-11T00:00:00.000000 |
| certfr-2024-avi-0765 | Vulnérabilité dans MongoDB Server | 2024-09-11T00:00:00.000000 | 2024-09-11T00:00:00.000000 |
| certfr-2024-avi-0764 | Multiples vulnérabilités dans les produits Adobe | 2024-09-11T00:00:00.000000 | 2024-09-11T00:00:00.000000 |
| certfr-2024-avi-0763 | Multiples vulnérabilités dans les produits Fortinet | 2024-09-11T00:00:00.000000 | 2024-09-11T00:00:00.000000 |
| certfr-2024-avi-0762 | Multiples vulnérabilités dans les produits Citrix | 2024-09-11T00:00:00.000000 | 2024-09-11T00:00:00.000000 |
| certfr-2024-avi-0761 | Multiples vulnérabilités dans les produits Microsoft | 2024-09-11T00:00:00.000000 | 2024-09-11T00:00:00.000000 |
| certfr-2024-avi-0760 | Multiples vulnérabilités dans Microsoft Azure | 2024-09-11T00:00:00.000000 | 2024-09-11T00:00:00.000000 |
| certfr-2024-avi-0759 | Multiples vulnérabilités dans Microsoft Windows | 2024-09-11T00:00:00.000000 | 2024-09-11T00:00:00.000000 |
| certfr-2024-avi-0758 | Multiples vulnérabilités dans Microsoft Office | 2024-09-11T00:00:00.000000 | 2024-09-11T00:00:00.000000 |
| certfr-2024-avi-0757 | Multiples vulnérabilités dans les produits Siemens | 2024-09-10T00:00:00.000000 | 2024-09-10T00:00:00.000000 |