Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-25037 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:59:14.738Z | 2026-02-27T00:59:14.738Z |
| CVE-2026-25196 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:58:08.674Z | 2026-02-27T00:58:08.674Z |
| CVE-2026-20764 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:56:47.460Z | 2026-02-27T00:56:47.460Z |
| CVE-2026-25721 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:55:28.813Z | 2026-02-27T00:55:28.813Z |
| CVE-2026-23702 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:54:21.133Z | 2026-02-27T00:54:21.133Z |
| CVE-2026-24452 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:53:22.352Z | 2026-02-27T00:53:22.352Z |
| CVE-2026-25105 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:52:21.154Z | 2026-02-27T00:52:21.154Z |
| CVE-2026-24695 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:51:01.649Z | 2026-02-27T00:51:01.649Z |
| CVE-2026-20902 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:49:44.858Z | 2026-02-27T00:49:44.858Z |
| CVE-2026-25109 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:48:41.531Z | 2026-02-27T00:48:41.531Z |
| CVE-2026-24689 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:47:26.332Z | 2026-02-27T00:47:26.332Z |
| CVE-2026-20910 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:46:14.644Z | 2026-02-27T00:46:14.644Z |
| CVE-2026-25195 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:45:04.949Z | 2026-02-27T00:45:04.949Z |
| CVE-2026-24517 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:43:35.813Z | 2026-02-27T00:43:35.813Z |
| CVE-2026-20742 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:42:12.910Z | 2026-02-27T00:42:12.910Z |
| CVE-2026-25111 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:40:37.734Z | 2026-02-27T00:40:37.734Z |
| CVE-2026-21389 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:38:51.109Z | 2026-02-27T00:38:51.109Z |
| CVE-2026-24663 |
9 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:36:49.215Z | 2026-02-27T00:36:49.215Z |
| CVE-2026-21718 |
10 (3.1)
|
Copeland XWEB and XWEB Pro Use of a Broken or Risky Cr… |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:34:55.895Z | 2026-02-27T00:34:55.895Z |
| CVE-2026-25085 |
8.6 (3.1)
|
Copeland XWEB and XWEB Pro Unexpected Status Code or R… |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:33:06.657Z | 2026-02-27T00:33:06.657Z |
| CVE-2026-3273 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 httpd AdvSetWrlsafeset formWrlsafeset buffe… |
Tenda |
F453 |
2026-02-27T00:32:09.615Z | 2026-02-27T00:32:09.615Z |
| CVE-2026-22878 |
6.5 (3.1)
|
Mobility46 mobility46.se Insufficiently Protected Cred… |
Mobility46 |
mobility46.se |
2026-02-27T00:25:23.952Z | 2026-02-27T00:25:23.952Z |
| CVE-2026-27647 |
7.3 (3.1)
|
Mobility46 mobility46.se Insufficient Session Expiration |
Mobility46 |
mobility46.se |
2026-02-27T00:23:50.315Z | 2026-02-27T00:23:50.315Z |
| CVE-2026-26305 |
7.5 (3.1)
|
Mobility46 mobility46.se Improper Restriction of Exces… |
Mobility46 |
mobility46.se |
2026-02-27T00:22:24.167Z | 2026-02-27T00:22:24.167Z |
| CVE-2026-27028 |
9.4 (3.1)
|
Mobility46 mobility46.se Missing Authentication for Cr… |
Mobility46 |
mobility46.se |
2026-02-27T00:20:52.288Z | 2026-02-27T00:20:52.288Z |
| CVE-2021-4456 |
6.5 (3.1)
|
Net::CIDR versions before 0.24 for Perl mishandle lead… |
MRSAM |
Net::CIDR |
2026-02-27T00:16:36.383Z | 2026-02-27T16:53:23.671Z |
| CVE-2026-25774 |
6.5 (3.1)
|
EV Energy ev.energy Insufficiently Protected Credentials |
EV Energy |
ev.energy |
2026-02-27T00:15:14.924Z | 2026-02-27T00:15:14.924Z |
| CVE-2026-26290 |
7.3 (3.1)
|
EV Energy ev.energy Insufficient Session Expiration |
EV Energy |
ev.energy |
2026-02-27T00:13:16.357Z | 2026-02-27T00:13:16.357Z |
| CVE-2026-24445 |
7.5 (3.1)
|
EV Energy ev.energy Improper Restriction of Excessive … |
EV Energy |
ev.energy |
2026-02-27T00:11:15.055Z | 2026-02-27T00:11:15.055Z |
| CVE-2026-27772 |
9.4 (3.1)
|
EV Energy ev.energy Missing Authentication for Critica… |
EV Energy |
ev.energy |
2026-02-27T00:09:12.986Z | 2026-02-27T00:09:12.986Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-28363 |
9.9 (3.1)
|
In OpenClaw before 2026.2.23, tools.exec.safeBins… |
OpenClaw |
OpenClaw |
2026-02-27T03:17:37.343Z | 2026-02-27T15:47:06.970Z |
| CVE-2026-3285 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
berry-lang berry be_lexer.c scan_string out-of-bounds |
berry-lang |
berry |
2026-02-27T03:02:13.772Z | 2026-02-27T18:50:12.298Z |
| CVE-2026-3284 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
libvips extract.c vips_extract_area_build integer overflow |
n/a |
libvips |
2026-02-27T03:02:09.219Z | 2026-02-27T18:49:42.929Z |
| CVE-2026-3283 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
libvips extract.c vips_extract_band_build out-of-bounds |
n/a |
libvips |
2026-02-27T02:32:12.328Z | 2026-02-27T18:49:14.477Z |
| CVE-2026-3282 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
libvips unpremultiply.c vips_unpremultiply_build out-o… |
n/a |
libvips |
2026-02-27T02:32:09.109Z | 2026-02-27T18:55:47.355Z |
| CVE-2026-3281 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
libvips bandrank.c vips_bandrank_build heap-based overflow |
n/a |
libvips |
2026-02-27T02:02:10.922Z | 2026-02-27T18:56:21.995Z |
| CVE-2026-3275 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 httpd addressNat fromAddressNat buffer overflow |
Tenda |
F453 |
2026-02-27T01:32:10.129Z | 2026-02-27T18:55:21.322Z |
| CVE-2026-3274 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 httpd L7Prot frmL7ProtForm buffer overflow |
Tenda |
F453 |
2026-02-27T01:02:09.187Z | 2026-02-27T01:02:09.187Z |
| CVE-2026-3037 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T01:06:42.223Z | 2026-02-27T19:09:35.935Z |
| CVE-2026-25721 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:55:28.813Z | 2026-02-27T00:55:28.813Z |
| CVE-2026-25196 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:58:08.674Z | 2026-02-27T00:58:08.674Z |
| CVE-2026-25105 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:52:21.154Z | 2026-02-27T00:52:21.154Z |
| CVE-2026-25037 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:59:14.738Z | 2026-02-27T00:59:14.738Z |
| CVE-2026-24498 |
6 (4.0)
|
Exposure of Sensitive Information to an Unauthori… |
EFM-Networks, Inc. |
ipTIME T5008 |
2026-02-27T02:01:12.377Z | 2026-02-27T16:03:35.360Z |
| CVE-2026-24497 |
8.4 (4.0)
|
Stack-based Buffer Overflow vulnerability in SimT… |
SimTech Systems, Inc. |
ThinkWise |
2026-02-27T01:52:58.847Z | 2026-02-27T16:07:55.454Z |
| CVE-2026-24452 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:53:22.352Z | 2026-02-27T00:53:22.352Z |
| CVE-2026-23702 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:54:21.133Z | 2026-02-27T00:54:21.133Z |
| CVE-2026-22877 |
3.7 (3.1)
|
Copeland XWEB and XWEB Pro Path Traversal |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T01:01:25.949Z | 2026-02-27T01:07:24.994Z |
| CVE-2026-20797 |
4.3 (3.1)
|
Copeland XWEB and XWEB Pro Stack-based Buffer Overflow |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T01:03:18.783Z | 2026-02-27T01:03:18.783Z |
| CVE-2026-20764 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:56:47.460Z | 2026-02-27T00:56:47.460Z |
| CVE-2026-3273 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 httpd AdvSetWrlsafeset formWrlsafeset buffe… |
Tenda |
F453 |
2026-02-27T00:32:09.615Z | 2026-02-27T00:32:09.615Z |
| CVE-2026-27647 |
7.3 (3.1)
|
Mobility46 mobility46.se Insufficient Session Expiration |
Mobility46 |
mobility46.se |
2026-02-27T00:23:50.315Z | 2026-02-27T00:23:50.315Z |
| CVE-2026-27028 |
9.4 (3.1)
|
Mobility46 mobility46.se Missing Authentication for Cr… |
Mobility46 |
mobility46.se |
2026-02-27T00:20:52.288Z | 2026-02-27T00:20:52.288Z |
| CVE-2026-26305 |
7.5 (3.1)
|
Mobility46 mobility46.se Improper Restriction of Exces… |
Mobility46 |
mobility46.se |
2026-02-27T00:22:24.167Z | 2026-02-27T00:22:24.167Z |
| CVE-2026-26290 |
7.3 (3.1)
|
EV Energy ev.energy Insufficient Session Expiration |
EV Energy |
ev.energy |
2026-02-27T00:13:16.357Z | 2026-02-27T00:13:16.357Z |
| CVE-2026-25774 |
6.5 (3.1)
|
EV Energy ev.energy Insufficiently Protected Credentials |
EV Energy |
ev.energy |
2026-02-27T00:15:14.924Z | 2026-02-27T00:15:14.924Z |
| CVE-2026-25195 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:45:04.949Z | 2026-02-27T00:45:04.949Z |
| CVE-2026-25111 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:40:37.734Z | 2026-02-27T00:40:37.734Z |
| CVE-2026-25109 |
8 (3.1)
|
Copeland XWEB and XWEB Pro OS Command Injection |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:48:41.531Z | 2026-02-27T00:48:41.531Z |
| CVE-2026-25085 |
8.6 (3.1)
|
Copeland XWEB and XWEB Pro Unexpected Status Code or R… |
Copeland |
Copeland XWEB 300D PRO |
2026-02-27T00:33:06.657Z | 2026-02-27T00:33:06.657Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-c5jp-99qm-76h7 |
8.0 (3.1)
|
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an au… | 2026-02-27T03:30:26Z | 2026-02-27T03:30:27Z |
| ghsa-9vp3-cxq9-72jh |
6.5 (3.1)
|
Charging station authentication identifiers are publicly accessible via web-based mapping platforms. | 2026-02-27T03:30:26Z | 2026-02-27T03:30:26Z |
| ghsa-92fm-h5h6-cjf9 |
8.0 (3.1)
|
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an au… | 2026-02-27T03:30:26Z | 2026-02-27T03:30:26Z |
| ghsa-7r34-g88h-g49f |
10.0 (3.1)
|
An authentication bypass vulnerability exists in Copeland XWEB Pro version 1.12.1 and prior, enabl… | 2026-02-27T03:30:26Z | 2026-02-27T03:30:26Z |
| ghsa-6xjh-63ff-92mc |
6.5 (3.1)
|
Net::CIDR versions before 0.24 for Perl mishandle leading zeros in IP CIDR addresses, which may hav… | 2026-02-27T03:30:26Z | 2026-02-27T18:31:05Z |
| ghsa-6pvr-hxgm-74hg |
8.0 (3.1)
|
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an au… | 2026-02-27T03:30:26Z | 2026-02-27T03:30:26Z |
| ghsa-5m2v-c6pj-9qqh |
9.0 (3.1)
|
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an una… | 2026-02-27T03:30:26Z | 2026-02-27T03:30:26Z |
| ghsa-28pj-7rwg-vxrf |
6.5 (3.1)
|
Charging station authentication identifiers are publicly accessible via web-based mapping platforms. | 2026-02-27T03:30:26Z | 2026-02-27T03:30:26Z |
| ghsa-xc6x-6xp8-3frw |
7.3 (3.1)
|
The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows … | 2026-02-27T00:31:46Z | 2026-02-27T00:31:46Z |
| ghsa-rx6w-2w6h-r346 |
4.3 (3.1)
2.1 (4.0)
|
PSI Probe: Broken access control can lead to DoS | 2026-02-27T00:31:46Z | 2026-02-28T02:09:13Z |
| ghsa-rvf2-2r2v-x27p |
9.4 (3.1)
|
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthori… | 2026-02-27T00:31:46Z | 2026-02-27T00:31:46Z |
| ghsa-rpp6-x48q-7fq5 |
7.5 (3.1)
|
Crypt::SysRandom::XS versions before 0.010 for Perl is vulnerable to a heap buffer overflow in the … | 2026-02-27T00:31:46Z | 2026-02-27T21:31:21Z |
| ghsa-qc92-5v9v-hh5w |
7.3 (3.1)
|
The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows … | 2026-02-27T00:31:46Z | 2026-02-27T00:31:46Z |
| ghsa-pf83-65gp-c24p |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was determined in Tenda F453 1.0.0.3. Affected is the function fromDhcpListClient o… | 2026-02-27T00:31:46Z | 2026-02-27T00:31:46Z |
| ghsa-j7ww-pvc6-ph97 |
7.3 (3.1)
|
The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows … | 2026-02-27T00:31:46Z | 2026-02-27T00:31:46Z |
| ghsa-j4fg-v368-8838 |
7.5 (3.1)
|
The WebSocket Application Programming Interface lacks restrictions on the number of authentication… | 2026-02-27T00:31:46Z | 2026-02-27T00:31:46Z |
| ghsa-cr9w-4p8w-56h8 |
9.4 (3.1)
|
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthori… | 2026-02-27T00:31:46Z | 2026-02-27T00:31:46Z |
| ghsa-9348-37vp-f2h3 |
9.4 (3.1)
|
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthori… | 2026-02-27T00:31:46Z | 2026-02-27T00:31:46Z |
| ghsa-429m-9874-rx9w |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in psi-probe PSI Probe up to 5.3.0. This affects the function lookup… | 2026-02-27T00:31:46Z | 2026-02-27T00:31:46Z |
| ghsa-3fx3-vmv7-fxc7 |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was found in Tenda F453 1.0.0.3. This impacts the function fromP2pListFilter of the… | 2026-02-27T00:31:46Z | 2026-02-27T00:31:46Z |
| ghsa-3frc-jf93-6v8p |
6.5 (3.1)
|
Charging station authentication identifiers are publicly accessible via web-based mapping platforms. | 2026-02-27T00:31:46Z | 2026-02-27T00:31:46Z |
| ghsa-2xph-9rqm-66cr |
7.5 (3.1)
|
The WebSocket Application Programming Interface lacks restrictions on the number of authentication… | 2026-02-27T00:31:46Z | 2026-02-27T00:31:46Z |
| ghsa-w6cc-5826-4fq3 |
7.3 (3.1)
|
The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows … | 2026-02-27T00:31:45Z | 2026-02-27T00:31:45Z |
| ghsa-v843-wj8h-jm5r |
6.7 (3.1)
8.4 (4.0)
|
An unquoted Windows service executable path vulnerability in IJ Scan Utility for Windows versions 1… | 2026-02-27T00:31:45Z | 2026-02-27T00:31:45Z |
| ghsa-qjgj-45g7-3rp5 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in go2ismail Free-CRM up to b83c40a90726d5e58f0cc680ffdcaa28a03fb5d1… | 2026-02-27T00:31:45Z | 2026-02-27T00:31:45Z |
| ghsa-prr9-fcgf-vpxx |
8.2 (3.1)
|
Apache::SessionX versions through 2.01 for Perl create insecure session id. Apache::SessionX gener… | 2026-02-27T00:31:45Z | 2026-02-27T21:31:21Z |
| ghsa-p8jq-98c2-8ggq |
5.4 (3.1)
2.1 (4.0)
|
A vulnerability was detected in psi-probe PSI Probe up to 5.3.0. The affected element is an unknown… | 2026-02-27T00:31:45Z | 2026-02-27T00:31:45Z |
| ghsa-m9p8-mq88-4q4g |
7.5 (3.1)
|
The WebSocket Application Programming Interface lacks restrictions on the number of authentication… | 2026-02-27T00:31:45Z | 2026-02-27T00:31:45Z |
| ghsa-m43j-vx3f-qc3c |
6.3 (3.1)
5.3 (4.0)
|
A vulnerability was found in go2ismail Asp.Net-Core-Inventory-Order-Management-System up to 9.20250… | 2026-02-27T00:31:45Z | 2026-02-27T00:31:45Z |
| ghsa-jqg2-vwg3-wvhv |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in go2ismail Free-CRM up to b83c40a90726d5e58f0cc680ffdcaa28a03fb5d1… | 2026-02-27T00:31:45Z | 2026-02-27T00:31:45Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-212 |
|
Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add… | apache-airflow | 2024-09-07T08:15:11+00:00 | 2025-01-19T22:22:22.289672+00:00 |
| pysec-2024-74 |
9.1 (3.1)
|
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to… | mindsdb | 2024-09-05T17:15:00+00:00 | 2024-09-06T15:22:53.971446+00:00 |
| pysec-2024-90 |
6.1 (3.1)
|
Indico is an event management system that uses Flask-Multipass, a multi-backend authentic… | indico | 2024-09-04T20:15:00+00:00 | 2024-09-25T06:23:55.564403+00:00 |
| pysec-2024-180 |
5.4 (3.1)
|
Stored XSS in organizer and event settings of pretix up to 2024.7.0 allows malicious even… | pretix | 2024-08-23T15:15:17+00:00 | 2025-01-19T01:52:24.493530+00:00 |
| pysec-2024-192 |
|
An issue was discovered in llama_index before 0.10.38. download/integration.py includes a… | llama-index | 2024-08-22T20:15:10+00:00 | 2025-01-19T13:22:29.175614+00:00 |
| pysec-2024-181 |
6.1 (3.1)
|
Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of… | apache-airflow | 2024-08-21T16:15:08+00:00 | 2025-01-19T04:22:59.351008+00:00 |
| pysec-2024-72 |
8.8 (3.1)
|
LF Edge eKuiper is a lightweight IoT data analytics and stream processing engine running … | ekuiper | 2024-08-20T15:15:00Z | 2024-09-18T07:04:07.042699Z |
| pysec-2024-71 |
7.5 (3.1)
|
A vulnerability in corydolphin/flask-cors up to version 4.0.1 allows the `Access-Control-… | flask-cors | 2024-08-18T19:15:00Z | 2024-09-09T07:59:30.591275Z |
| pysec-2024-188 |
6.1 (3.1)
|
WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Lo… | webob | 2024-08-14T21:15:17+00:00 | 2025-01-19T04:23:01.908824+00:00 |
| pysec-2024-153 |
6.5 (3.1)
|
Streamlit is a data oriented application development framework for python. Snowflake Stre… | streamlit | 2024-08-12T17:15:17+00:00 | 2024-11-25T21:22:50.933853+00:00 |
| pysec-2024-200 |
7.2 (3.1)
|
JupyterHub is software that allows one to create a multi-user server for Jupyter notebook… | jupyterhub | 2024-08-08T15:15:17+00:00 | 2025-01-19T16:22:58.171761+00:00 |
| pysec-2024-70 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.804411+00:00 |
| pysec-2024-69 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and … | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.745844+00:00 |
| pysec-2024-68 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() an… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.682679+00:00 |
| pysec-2024-67 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.613440+00:00 |
| pysec-2024-73 |
9.1 (3.1)
|
A vulnerability in the JSON file handling of gaizhenbiao/chuanhuchatgpt version 20240410 … | chuanhuchatgpt | 2024-07-31T01:15:00+00:00 | 2024-08-27T15:22:40.259109+00:00 |
| pysec-2024-75 |
6.1 (3.1)
|
Twisted is an event-based framework for internet applications, supporting Python 3.6+. Th… | twisted | 2024-07-29T16:15:00+00:00 | 2024-09-11T19:19:18.005250+00:00 |
| pysec-2024-203 |
7.5 (3.1)
|
DuckDB is a SQL database management system. In versions 1.0.0 and prior, content in files… | duckdb | 2024-07-24T18:15:05+00:00 | 2025-01-19T19:18:58.299130+00:00 |
| pysec-2024-65 |
|
Roundup before 2.4.0 allows XSS via JavaScript in PDF, XML, and SVG documents. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:05.024899+00:00 |
| pysec-2024-64 |
|
Roundup before 2.4.0 allows XSS via a SCRIPT element in an HTTP Referer header. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:04.987078+00:00 |
| pysec-2024-63 |
|
In Roundup before 2.4.0, classhelpers (_generic.help.html) allow XSS. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:04.949977+00:00 |
| pysec-2024-173 |
8.8 (3.1)
|
Unrestricted Upload of File with dangerous type vulnerability in Apache StreamPipes. Such… | streampipes | 2024-07-17T10:15:01+00:00 | 2025-01-18T22:21:43.618882+00:00 |
| pysec-2024-174 |
4.3 (3.1)
|
Server-Side Request Forgery (SSRF) vulnerability in Apache StreamPipes during installatio… | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.678475+00:00 |
| pysec-2024-172 |
3.7 (3.1)
|
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache StreamPipes in … | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.557516+00:00 |
| pysec-2024-190 |
8.8 (3.1)
|
Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenti… | apache-airflow | 2024-07-17T08:15:02+00:00 | 2025-01-19T07:21:16.859034+00:00 |
| pysec-2024-189 |
5.4 (3.1)
|
Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated at… | apache-airflow | 2024-07-17T08:15:01+00:00 | 2025-01-19T07:21:16.796301+00:00 |
| pysec-2024-66 |
7.8 (3.1)
|
dbt enables data analysts and engineers to transform their data using the same practices … | dbt-core | 2024-07-16T23:15:00+00:00 | 2024-07-19T17:21:49.664320+00:00 |
| pysec-2024-62 |
|
Versions of the package langchain-experimental from 0.0.15 and before 0.0.21 are vulnerab… | langchain-experimental | 2024-07-15T05:15:00+00:00 | 2024-07-15T11:19:36.686972+00:00 |
| pysec-2024-86 |
4.9 (3.1)
|
Wagtail is an open source content management system built on Django. A bug in Wagtail's `… | wagtail | 2024-07-11T16:15:00+00:00 | 2024-09-19T19:20:17.668744+00:00 |
| pysec-2024-61 |
6.1 (3.1)
|
A Stored Cross-Site Scripting (XSS) vulnerability exists in gaizhenbiao/chuanhuchatgpt ve… | chuanhuchatgpt | 2024-07-11T11:15:00+00:00 | 2024-07-12T21:33:00.657381+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-928 | Malicious code in polyutil (PyPI) | 2026-02-17T04:31:14Z | 2026-02-26T09:50:46Z |
| mal-2026-927 | Malicious code in polyclawd (PyPI) | 2026-02-16T23:40:13Z | 2026-02-26T09:50:46Z |
| mal-2026-922 | Malicious code in compass-e2e-tests (npm) | 2026-02-16T19:55:51Z | 2026-02-23T04:21:32Z |
| mal-2026-921 | Malicious code in cicibot-fix-message-naming (PyPI) | 2026-02-16T17:55:41Z | 2026-02-19T22:47:48Z |
| mal-2026-920 | Malicious code in ambar-src (npm) | 2026-02-16T17:03:16Z | 2026-02-23T04:21:31Z |
| mal-2026-919 | Malicious code in mds-webcomponents (npm) | 2026-02-16T15:20:34Z | 2026-02-23T04:21:34Z |
| mal-2026-918 | Malicious code in webpack-vite (npm) | 2026-02-16T15:03:26Z | 2026-02-23T04:21:36Z |
| mal-2026-917 | Malicious code in aliyun-python-sdk-v2 (PyPI) | 2026-02-16T11:28:09Z | 2026-02-16T11:28:09Z |
| mal-2026-916 | Malicious code in alibabacloude (PyPI) | 2026-02-16T11:20:53Z | 2026-02-16T11:20:53Z |
| mal-2026-915 | Malicious code in alibabacloud-code-tool (PyPI) | 2026-02-16T11:19:13Z | 2026-02-16T11:19:13Z |
| mal-2026-914 | Malicious code in @qualys/react-web (npm) | 2026-02-16T08:50:48Z | 2026-02-23T04:21:31Z |
| mal-2026-913 | Malicious code in groq-ppe-pkg (PyPI) | 2026-02-16T07:09:54Z | 2026-02-16T07:09:54Z |
| mal-2026-912 | Malicious code in http-request-toolkit (PyPI) | 2026-02-16T07:03:21Z | 2026-02-16T07:03:21Z |
| mal-2026-911 | Malicious code in malpkgv2-0 (PyPI) | 2026-02-16T00:00:09Z | 2026-02-16T00:00:09Z |
| mal-2026-910 | Malicious code in dns-execution-test (PyPI) | 2026-02-15T23:20:54Z | 2026-02-17T11:48:47Z |
| mal-2026-909 | Malicious code in clawdist (PyPI) | 2026-02-15T21:58:17Z | 2026-02-26T09:50:46Z |
| mal-2026-943 | Malicious code in ethereums-lint (npm) | 2026-02-15T16:24:02Z | 2026-02-23T04:21:32Z |
| mal-2026-942 | Malicious code in ethereum-lint (npm) | 2026-02-15T16:20:05Z | 2026-02-23T04:21:32Z |
| mal-2026-908 | Malicious code in hops-preset-jest (npm) | 2026-02-15T15:57:34Z | 2026-02-23T04:21:33Z |
| mal-2026-907 | Malicious code in tronpad (PyPI) | 2026-02-15T15:24:18Z | 2026-02-15T15:24:18Z |
| mal-2026-906 | Malicious code in cucumber_json_schema (RubyGems) | 2026-02-15T14:20:25Z | 2026-02-15T14:20:25Z |
| mal-2026-905 | Malicious code in marshmellows (PyPI) | 2026-02-15T09:25:56Z | 2026-02-19T22:47:48Z |
| mal-2026-904 | Malicious code in strands-agents-anthropic (PyPI) | 2026-02-15T07:34:00Z | 2026-02-15T07:34:00Z |
| mal-2026-903 | Malicious code in requests-toolkit (PyPI) | 2026-02-15T00:02:57Z | 2026-02-15T00:02:57Z |
| mal-2026-902 | Malicious code in crc32fast (PyPI) | 2026-02-14T13:26:41Z | 2026-02-14T14:13:09Z |
| mal-2026-900 | Malicious code in cubaflixdownload (PyPI) | 2026-02-14T12:34:41Z | 2026-02-14T12:34:41Z |
| mal-2026-901 | Malicious code in platforms (PyPI) | 2026-02-14T12:29:36Z | 2026-02-14T12:29:36Z |
| mal-2026-899 | Malicious code in dzuseragents (PyPI) | 2026-02-14T11:56:39Z | 2026-02-14T11:56:39Z |
| mal-2024-12375 | Malicious code in langraph (PyPI) | 2026-02-14T05:25:23Z | 2026-02-14T18:48:58Z |
| mal-2026-898 | Malicious code in magicwolf (PyPI) | 2026-02-14T02:02:26Z | 2026-02-26T09:50:46Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0006 | OpenCTI: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen, Manipulation von Daten, Denial of Service | 2026-01-04T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0005 | NetApp Data ONTAP: Schwachstelle ermöglicht Manipulation von Daten und Denial of Service | 2026-01-04T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0004 | JFrog Artifactory: Schwachstelle ermöglicht Cross-Site Scripting | 2026-01-04T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0003 | Vaadin: Schwachstelle ermöglicht Cross-Site Scripting | 2026-01-04T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0002 | Moxa NPort: Mehrere Schwachstellen | 2026-01-01T23:00:00.000+00:00 | 2026-01-01T23:00:00.000+00:00 |
| wid-sec-w-2026-0001 | Gitea: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-01T23:00:00.000+00:00 | 2026-01-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2941 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-30T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2940 | Pega Platform: Schwachstelle ermöglicht Codeausführung | 2025-12-30T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2939 | Dell Computer: Mehrere Schwachstellen | 2025-12-30T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2938 | Arista EOS: Schwachstelle ermöglicht Denial of Service | 2025-12-30T23:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-2937 | Moxa NPort 5000 Series: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-30T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2936 | LangChain: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-12-29T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2935 | wget: Mehrere Schwachstellen | 2025-12-29T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2934 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-29T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2933 | binutils: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-29T23:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2932 | Nagios Enterprises Nagios XI: Mehrere Schwachstellen | 2025-12-29T23:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2931 | GIMP: Schwachstelle ermöglicht Codeausführung | 2025-12-29T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2929 | Linux Kernel: Mehrere Schwachstellen | 2025-12-28T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2025-2928 | GnuPG: Mehrere Schwachstellen | 2025-12-28T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2927 | NetApp ActiveIQ Unified Manager: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-28T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2926 | Eaton UPS Companion Software: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-12-28T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2925 | Gitea: Mehrere Schwachstellen | 2025-12-28T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2924 | Sitecore Experience Manager: Schwachstelle ermöglicht Codeausführung | 2025-12-28T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2923 | GStreamer: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-28T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2922 | NetApp Data ONTAP: Schwachstelle ermöglicht Denial of Service | 2025-12-28T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2921 | Cacti: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2025-12-28T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2920 | Linux Kernel: Mehrere Schwachstellen | 2025-12-23T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2919 | Eaton UPS Companion Software: Schwachstelle ermöglicht Codeausführung | 2025-12-23T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2918 | Linksys E5600 Router: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-12-23T23:00:00.000+00:00 | 2025-12-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2917 | Linksys E9450-SG Router: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und Ausführen von beliebigem Programmcode mit Administratorrechten | 2025-12-23T23:00:00.000+00:00 | 2025-12-23T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0328 | Kwetsbaarheden verholpen in Oracle Database producten | 2025-10-23T07:19:57.652532Z | 2025-10-23T07:19:57.652532Z |
| ncsc-2025-0327 | Kwetsbaarheden verholpen in Zohocorp's ManageEngine | 2025-10-23T07:18:47.274781Z | 2025-10-23T07:18:47.274781Z |
| ncsc-2025-0326 | Kwetsbaarheden verholpen in Moxa’s netwerkbeveiligingsapparaten | 2025-10-20T13:03:34.436477Z | 2025-10-20T13:03:34.436477Z |
| ncsc-2025-0325 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-10-20T12:59:06.729067Z | 2025-10-20T12:59:06.729067Z |
| ncsc-2025-0324 | Kwetsbaarheid verholpen in FortiOS | 2025-10-17T08:42:51.624827Z | 2025-10-17T08:42:51.624827Z |
| ncsc-2025-0323 | Kwetsbaarheden verholpen in SAP Producten | 2025-10-17T08:04:54.828451Z | 2025-10-17T08:04:54.828451Z |
| ncsc-2025-0322 | Kwetsbaarheden verholpen in Adobe Commerce | 2025-10-16T06:32:33.597617Z | 2025-10-16T06:32:33.597617Z |
| ncsc-2025-0321 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-10-16T06:27:14.019367Z | 2025-10-16T06:27:14.019367Z |
| ncsc-2025-0320 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-10-16T06:25:05.618348Z | 2025-10-16T06:25:05.618348Z |
| ncsc-2025-0319 | Kwetsbaarheden verholpen in F5 Networks BIG-IP, F5OS en NGINX App Protect WAF | 2025-10-15T15:21:14.871532Z | 2025-10-15T15:21:14.871532Z |
| ncsc-2025-0318 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-10-15T06:22:07.027110Z | 2025-10-15T06:22:07.027110Z |
| ncsc-2025-0317 | Kwetsbaarheden verholpen in Veeam Backup & Replication | 2025-10-15T06:13:55.126030Z | 2025-10-15T06:13:55.126030Z |
| ncsc-2025-0316 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-10-14T18:52:06.487996Z | 2025-10-14T18:52:06.487996Z |
| ncsc-2025-0315 | Kwetsbaarheden verholpen in Microsoft Office | 2025-10-14T18:38:05.692251Z | 2025-10-14T18:38:05.692251Z |
| ncsc-2025-0314 | Kwetsbaarheden verholpen in Microsoft System Center | 2025-10-14T18:27:56.075338Z | 2025-10-14T18:27:56.075338Z |
| ncsc-2025-0313 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-10-14T18:21:47.576457Z | 2025-10-14T18:21:47.576457Z |
| ncsc-2025-0312 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-10-14T18:16:12.274468Z | 2025-10-14T18:16:12.274468Z |
| ncsc-2025-0311 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-10-14T18:13:41.244373Z | 2025-10-14T18:13:41.244373Z |
| ncsc-2025-0310 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-10-14T18:03:45.875739Z | 2025-10-24T11:09:29.790442Z |
| ncsc-2025-0309 | Kwetsbaarheden verholpen in Siemens producten | 2025-10-14T11:22:10.254089Z | 2025-10-14T11:22:10.254089Z |
| ncsc-2025-0308 | Kwetsbaarheden verholpen in Juniper Networks Junos Space | 2025-10-13T08:31:03.235596Z | 2025-10-13T08:31:03.235596Z |
| ncsc-2025-0307 | Kwetsbaarheid verholpen in Oracle E-Business Suite | 2025-10-13T07:52:22.500853Z | 2025-10-13T07:52:22.500853Z |
| ncsc-2025-0306 | Kwetsbaarheden verholpen in GitLab | 2025-10-13T07:25:32.225768Z | 2025-10-13T07:25:32.225768Z |
| ncsc-2025-0305 | Kwetsbaarheden verholpen in Juniper Networks Junos OS | 2025-10-13T07:17:00.445318Z | 2025-10-13T07:17:00.445318Z |
| ncsc-2025-0304 | Kwetsbaarheden verholpen in Redis | 2025-10-08T11:43:37.331971Z | 2025-10-08T11:43:37.331971Z |
| ncsc-2025-0303 | Kwetsbaarheid verholpen in Oracle E-Business Suite | 2025-10-05T09:07:57.122302Z | 2025-10-08T13:03:30.836713Z |
| ncsc-2025-0302 | Kwetsbaarheid verholpen in IBM InfoSphere | 2025-09-30T08:31:27.582962Z | 2025-09-30T08:31:27.582962Z |
| ncsc-2025-0301 | Kwetsbaarheden verholpen in VMware NSX | 2025-09-30T08:29:24.969885Z | 2025-09-30T08:29:24.969885Z |
| ncsc-2025-0300 | Kwetsbaarheden verholpen in GitLab EE & CE | 2025-09-29T09:40:53.033373Z | 2025-09-29T09:40:53.033373Z |
| ncsc-2025-0299 | Kwetsbaarheden verholpen in Zenitel ICX500 en ICX510 Gateway | 2025-09-26T07:00:18.729367Z | 2025-09-26T07:00:18.729367Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-871704 | SSA-871704: Multiple Vulnerabilities in SICAM Products | 2024-05-14T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-661579 | SSA-661579: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-589937 | SSA-589937: Multiple Memory Corruption Vulnerabilities in Solid Edge | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-489698 | SSA-489698: X_T File Parsing Vulnerability in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-292022 | SSA-292022: Vulnerability in Nozomi Guardian/CMC before 23.4.1 on RUGGEDCOM APE1808 devices | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-273900 | SSA-273900: Multiple Vulnerabilities in SIMATIC CN 4100 before V3.0 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-258494 | SSA-258494: Stack Overflow Vulnerability in Simcenter Nastran before 2406.90 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-093430 | SSA-093430: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager before V3.0 | 2024-05-14T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-046364 | SSA-046364: X_T File Parsing Vulnerabilities in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-750274 | SSA-750274: Impact of CVE-2024-3400 on RUGGEDCOM APE1808 devices configured with Palo Alto Networks Virtual NGFW | 2024-04-19T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-885980 | SSA-885980: Multiple Vulnerabilities in Scalance W1750D | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-730482 | SSA-730482: Denial of Service Vulnerability in SIMATIC WinCC | 2024-04-09T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-556635 | SSA-556635: Multiple Vulnerabilities in Telecontrol Server Basic before V3.1.2.0 | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-265688 | SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 | 2024-04-09T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-222019 | SSA-222019: X_T File Parsing Vulnerabilities in Parasolid | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-128433 | SSA-128433: Multiple Vulnerabilities in SINEC NMS before V2.0 SP2 | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-918992 | SSA-918992: Unused HTTP Service on SENTRON 3KC ATC6 Ethernet Module | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-832273 | SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-792319 | SSA-792319: Missing Read Out Protection in SENTRON 7KM PAC3x20 Devices | 2024-03-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-770721 | SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-653855 | SSA-653855: Information Disclosure vulnerability in SINEMA Remote Connect Client before V3.1 SP1 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-576771 | SSA-576771: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-382651 | SSA-382651: File Parsing Vulnerability in Solid Edge | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-366067 | SSA-366067: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-225840 | SSA-225840: Vulnerabilities in the Network Communication Stack in Sinteso EN and Cerberus PRO EN Fire Protection Systems | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-145196 | SSA-145196: Authorization Bypass Vulnerability in Siveillance Control | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-943925 | SSA-943925: Multiple Vulnerabilities in SINEC NMS before V2.0 SP1 | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-871717 | SSA-871717: Multiple Vulnerabilities in Polarion ALM | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2282 | Red Hat Security Advisory: kernel security update | 2026-02-09T09:51:59+00:00 | 2026-02-17T07:23:59+00:00 |
| rhsa-2026:2298 | Red Hat Security Advisory: keylime security update | 2026-02-09T09:44:33+00:00 | 2026-02-09T15:28:56+00:00 |
| rhsa-2026:2286 | Red Hat Security Advisory: thunderbird security update | 2026-02-09T09:34:18+00:00 | 2026-02-09T13:27:21+00:00 |
| rhsa-2026:2279 | Red Hat Security Advisory: fence-agents security update | 2026-02-09T09:01:45+00:00 | 2026-02-17T09:27:54+00:00 |
| rhsa-2026:2275 | Red Hat Security Advisory: python3.9 security update | 2026-02-09T08:36:37+00:00 | 2026-02-16T14:15:16+00:00 |
| rhsa-2026:2276 | Red Hat Security Advisory: python3.9 security update | 2026-02-09T08:26:57+00:00 | 2026-02-16T14:15:16+00:00 |
| rhsa-2026:2271 | Red Hat Security Advisory: firefox security update | 2026-02-09T07:38:02+00:00 | 2026-02-09T13:27:21+00:00 |
| rhsa-2026:2265 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-02-09T05:56:42+00:00 | 2026-02-17T12:41:40+00:00 |
| rhsa-2026:2264 | Red Hat Security Advisory: kernel security update | 2026-02-09T04:51:02+00:00 | 2026-02-17T07:23:52+00:00 |
| rhsa-2026:2220 | Red Hat Security Advisory: thunderbird security update | 2026-02-09T03:07:56+00:00 | 2026-02-09T13:27:21+00:00 |
| rhsa-2026:2216 | Red Hat Security Advisory: libsoup security update | 2026-02-09T02:55:11+00:00 | 2026-02-12T13:28:17+00:00 |
| rhsa-2026:2224 | Red Hat Security Advisory: keylime security update | 2026-02-09T02:49:17+00:00 | 2026-02-09T15:28:53+00:00 |
| rhsa-2026:2215 | Red Hat Security Advisory: libsoup security update | 2026-02-09T02:41:31+00:00 | 2026-02-12T13:28:17+00:00 |
| rhsa-2026:2212 | Red Hat Security Advisory: kernel security update | 2026-02-09T02:40:06+00:00 | 2026-02-17T07:23:49+00:00 |
| rhsa-2026:2227 | Red Hat Security Advisory: brotli security update | 2026-02-09T02:38:28+00:00 | 2026-02-17T09:27:54+00:00 |
| rhsa-2026:2229 | Red Hat Security Advisory: brotli security update | 2026-02-09T02:33:11+00:00 | 2026-02-17T09:27:53+00:00 |
| rhsa-2026:2228 | Red Hat Security Advisory: brotli security update | 2026-02-09T02:21:46+00:00 | 2026-02-17T09:27:53+00:00 |
| rhsa-2026:2214 | Red Hat Security Advisory: spice-client-win security update | 2026-02-09T02:17:51+00:00 | 2026-02-12T13:28:18+00:00 |
| rhsa-2026:2233 | Red Hat Security Advisory: python3.12 security update | 2026-02-09T02:15:36+00:00 | 2026-02-16T14:22:42+00:00 |
| rhsa-2026:2221 | Red Hat Security Advisory: fence-agents security update | 2026-02-09T02:07:01+00:00 | 2026-02-16T19:43:37+00:00 |
| rhsa-2026:2231 | Red Hat Security Advisory: firefox security update | 2026-02-09T02:05:51+00:00 | 2026-02-09T13:27:22+00:00 |
| rhsa-2026:2218 | Red Hat Security Advisory: golang security update | 2026-02-09T01:55:26+00:00 | 2026-02-17T12:41:39+00:00 |
| rhsa-2026:2256 | Red Hat Security Advisory: Red Hat multicluster global hub 1.5.3 security update | 2026-02-09T01:49:44+00:00 | 2026-02-17T12:41:40+00:00 |
| rhsa-2026:2219 | Red Hat Security Advisory: golang security update | 2026-02-09T01:48:16+00:00 | 2026-02-17T12:41:39+00:00 |
| rhsa-2026:2213 | Red Hat Security Advisory: fontforge security update | 2026-02-09T01:43:26+00:00 | 2026-02-11T18:59:00+00:00 |
| rhsa-2026:2222 | Red Hat Security Advisory: freerdp security update | 2026-02-09T01:41:56+00:00 | 2026-02-17T07:24:07+00:00 |
| rhsa-2026:2226 | Red Hat Security Advisory: brotli security update | 2026-02-09T01:39:26+00:00 | 2026-02-17T09:27:52+00:00 |
| rhsa-2026:2230 | Red Hat Security Advisory: fontforge security update | 2026-02-09T01:37:26+00:00 | 2026-02-11T18:58:40+00:00 |
| rhsa-2026:2232 | Red Hat Security Advisory: fontforge security update | 2026-02-09T01:35:56+00:00 | 2026-02-11T18:58:05+00:00 |
| rhsa-2026:2223 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-09T01:34:56+00:00 | 2026-02-17T12:41:40+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-317-13 | Siemens LOGO! 8 BM Devices | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-310-03 | ABB FLXeon Controllers | 2025-11-06T07:00:00.000000Z | 2025-11-06T07:00:00.000000Z |
| icsa-25-310-02 | Ubia Ubox (Update A) | 2025-11-06T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-310-01 | Advantech DeviceOn/iEdge | 2025-11-06T07:00:00.000000Z | 2025-11-06T07:00:00.000000Z |
| icsa-25-308-05 | IDIS ICM Viewer | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-04 | Radiometrics VizAir | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-03 | Delta Electronics CNCSoft-G2 | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-02 | Survision License Plate Recognition Camera | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-01 | Fuji Electric Monitouch V-SFT-6 (Update A) | 2025-11-04T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| va-25-304-02 | Restaurant Brands International assistant platform multiple vulnerabilities | 2025-10-31T17:02:13Z | 2025-10-31T17:02:13Z |
| va-25-304-01 | ELOG multiple vulnerabilities | 2025-10-31T16:57:24Z | 2025-10-31T16:57:24Z |
| icsa-25-303-02 | Hitachi Energy TropOS | 2025-10-30T06:00:00.000000Z | 2025-10-30T06:00:00.000000Z |
| icsa-25-303-01 | International Standards Organization ISO 15118 | 2025-10-30T05:00:00.000000Z | 2025-10-30T05:00:00.000000Z |
| icsma-25-301-01 | Vertikal Systems Hospital Manager Backend Services | 2025-10-28T06:00:00.000000Z | 2025-10-28T06:00:00.000000Z |
| icsma-25-296-01 | NIHON KOHDEN Central Monitor CNS-6201 | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-04 | Delta Electronics ASDA-Soft | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-03 | Veeder-Root TLS4B Automatic Tank Gauge System | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-02 | ASKI Energy ALS-Mini-S8 and ALS-Mini-S4 | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-01 | AutomationDirect Productivity Suite | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| va-25-296-01 | Frontier Airlines website publicly available email address validation | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| va-25-297-01 | IBM DOORS Next Generation multiple vulnerabilities | 2025-10-22T18:45:47Z | 2026-02-18T00:00:00Z |
| icsma-25-294-01 | Oxford Nanopore Technologies MinKNOW | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-06 | Raisecomm RAX701-GC Series | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-05 | CloudEdge Online Cameras and App | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-02 | Rockwell Automation Compact GuardLogix 5370 | 2025-10-21T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-294-01 | Rockwell Automation 1783-NATR | 2025-10-21T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| va-25-289-01 | OPEXUS FOIAXpress unauthenticated administrator password reset | 2025-10-16T16:43:55Z | 2025-10-16T16:43:55Z |
| icsa-25-289-04 | Rockwell Automation ArmorStart AOP | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-289-03 | Rockwell Automation FactoryTalk ViewPoint | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-289-02 | Rockwell Automation FactoryTalk Linx | 2025-10-16T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-sdwan-priviesc-wck7bmmt | Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sdwan-fileoverwrite-uc9txwh | Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-08T15:55:57+00:00 |
| cisco-sa-netconf-nacm-bypass-tgzv9pmq | Cisco IOS XE Software Model-Driven Programmability Authorization Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-multiprod-ikev2-dos-gpctuqv2 | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IKEv2 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ipsgacl-pg6qfzk | Cisco IOS Software on Cisco Catalyst 1000 and 2960L Switches Access Control List Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iox-dos-95fqnf7b | Cisco IOx Application Hosting Environment Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-privesc-su7scvdp | Cisco IOS XE Software Privilege Escalation Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-ikev1-dos-xhk3hzfc | Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-dhcpsn-dos-xbn8mtks | Cisco IOS XE Software DHCP Snooping Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ios-http-privesc-wcrd5e3 | Cisco IOS Software Industrial Ethernet Switch Device Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ewlc-user-del-hqxmpudj | Cisco IOS XE Wireless Controller Software Unauthorized User Deletion Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ewlc-cdp-dos-fpeks9k | Cisco IOS XE Wireless Controller Software Cisco Discovery Protocol Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-dnac-api-nbpzcjcm | Cisco Catalyst Center Unauthenticated API Access Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-03-26T16:00:00+00:00 |
| cisco-sa-catc-insec-acc-mtt8eheb | Cisco Catalyst Center Insufficient Access Control Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-catalyst-tls-pqnd5kej | Cisco Catalyst SD-WAN Manager Certificate Validation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-c2960-3560-sboot-ztqadrhq | Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches Secure Boot Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-bootstrap-kfgxygdh | Cisco IOS XE Software Bootstrap Arbitrary File Write Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-asr903-rsp3-arp-dos-wmfzdvjz | Cisco IOS XE Software for Cisco ASR 903 Aggregation Services Routers ARP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-erlang-otp-ssh-xyzzy | Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server: April 2025 | 2025-04-22T21:45:00+00:00 | 2025-06-11T14:40:37+00:00 |
| cisco-sa-webex-app-client-rce-ufymmylc | Cisco Webex App Client-Side Remote Code Execution Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-sna-prvesc-4bqmk33z | Cisco Secure Network Analytics Privilege Escalation Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-nd-unenum-2xffh472 | Cisco Nexus Dashboard LDAP Username Enumeration Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-vnrpdvfb | Cisco Meraki MX and Z Series AnyConnect VPN Denial of Service Vulnerability | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-gsscpgy4 | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-ece-dos-tc6m9gz8 | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-xrike-9wygprgq | Cisco IOS XR Software Internet Key Exchange Version 2 Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-xr792-bwfvdpy | Cisco IOS XR Software Release 7.9.2 Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-sb-lkm-znerzjbz | Cisco IOS XR Software Secure Boot Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ncs-hybridacl-crmzffkq | Cisco IOS XR Software Hybrid Access Control List Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-multicast-ermrsvq7 | Cisco IOS XR Software for ASR 9000 Series Routers Layer 3 Multicast Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-20943 | Microsoft Office Click-To-Run Remote Code Execution Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-20T08:00:00.000Z |
| msrc_cve-2026-20941 | Host Process for Windows Tasks Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20940 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20939 | Windows File Explorer Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20938 | Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20937 | Windows File Explorer Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20936 | Windows NDIS Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20935 | Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20934 | Windows SMB Server Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20932 | Windows File Explorer Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20931 | Windows Telephony Service Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20929 | Windows HTTP.sys Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20927 | Windows SMB Server Denial of Service Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20926 | Windows SMB Server Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20925 | NTLM Hash Disclosure Spoofing Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20924 | Windows Management Services Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20923 | Windows Management Services Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20922 | Windows NTFS Remote Code Execution Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20921 | Windows SMB Server Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20920 | Win32k Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20919 | Windows SMB Server Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20918 | Windows Management Services Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20877 | Windows Management Services Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20876 | Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20875 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20874 | Windows Management Services Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20873 | Windows Management Services Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20872 | NTLM Hash Disclosure Spoofing Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20871 | Desktop Windows Manager Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20870 | Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-200110-0429 | Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox … | 2025-12-22T23:19:47.551000Z |
| var-201011-0174 | ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute … | 2025-12-22T23:19:47.176000Z |
| var-202110-1685 | This issue was addressed with improved checks. This issue is fixed in Security Update 202… | 2025-12-22T23:18:55.560000Z |
| var-202203-0111 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2025-12-22T23:18:51.835000Z |
| var-201408-0090 | The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0… | 2025-12-22T23:18:49.546000Z |
| var-201202-0070 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:18:47.721000Z |
| var-200809-0193 | Time Machine in Apple Mac OS X 10.5 through 10.5.4 uses weak permissions for Time Machine… | 2025-12-22T23:18:47.206000Z |
| var-202010-0251 | In Network Security Services (NSS) before 3.46, several cryptographic primitives had miss… | 2025-12-22T23:18:05.511000Z |
| var-201302-0232 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:18:04.865000Z |
| var-200609-1208 | The FTP server in Apple Mac OS X 10.4.8 and earlier, when FTP Access is enabled, will cra… | 2025-12-22T23:18:04.731000Z |
| var-201006-1151 | The Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 5.0 on M… | 2025-12-22T23:18:03.663000Z |
| var-201304-0372 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:18:02.463000Z |
| var-201102-0097 | Google Chrome before 9.0.597.94 does not properly handle anonymous blocks, which allows r… | 2025-12-22T23:17:55.195000Z |
| var-201705-3788 | In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a ca… | 2025-12-22T23:17:48.852000Z |
| var-201203-0198 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2025-12-22T23:17:45.998000Z |
| var-201210-0270 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:16:35.049000Z |
| var-201912-0635 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T23:16:33.891000Z |
| var-201505-0233 | The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server bu… | 2025-12-22T23:16:33.731000Z |
| var-201505-0417 | The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allow… | 2025-12-22T23:15:31.867000Z |
| var-200608-0031 | Stack-based buffer overflow in bootpd in the DHCP component for Apple Mac OS X 10.3.9 and… | 2025-12-22T23:15:31.398000Z |
| var-201203-0193 | Google Chrome before 17.0.963.65 does not properly perform casts of unspecified variables… | 2025-12-22T23:15:23.357000Z |
| var-201211-0365 | Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on … | 2025-12-22T23:15:23.187000Z |
| var-201912-0640 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T23:15:23.116000Z |
| var-201404-0374 | Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 an… | 2025-12-22T23:15:22.006000Z |
| var-201904-1403 | The issue was addressed by removing origin information. This issue affected versions prio… | 2025-12-22T23:15:21.550000Z |
| var-200704-0214 | fsck, as used by the AirPort Disk feature of the AirPort Extreme Base Station with 802.11… | 2025-12-22T23:15:20.268000Z |
| var-201512-0008 | The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent at… | 2025-12-22T23:15:20.095000Z |
| var-201912-0552 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2025-12-22T23:15:19.763000Z |
| var-201504-0361 | The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x befor… | 2025-12-22T23:15:19.454000Z |
| var-202212-1751 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2025-12-22T23:15:17.574000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-008105 | Windows shortcut following (.LNK) vulnerability in Trend Micro Security for Windows (CVE-2025-52521) | 2025-07-07T16:04+09:00 | 2025-07-07T16:04+09:00 |
| jvndb-2025-000047 | Multiple vulnerabilities in Nimesa Backup and Recovery | 2025-07-07T15:26+09:00 | 2025-07-07T15:26+09:00 |
| jvndb-2025-007978 | Multiple vulnerabilities in Trend Micro Password Manager for Windows (CVE-2025-48443, CVE-2025-52837) | 2025-07-04T13:28+09:00 | 2025-07-04T13:28+09:00 |
| jvndb-2025-000045 | Multiple vulnerabilities in Active! mail | 2025-07-02T14:13+09:00 | 2025-07-02T14:13+09:00 |
| jvndb-2025-007754 | Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) | 2025-07-02T11:31+09:00 | 2025-07-02T11:31+09:00 |
| jvndb-2025-007607 | Pass-Back Attack vulnerability in Konica Minorta bizhub series | 2025-07-01T14:09+09:00 | 2025-07-01T14:09+09:00 |
| jvndb-2025-007595 | Multiple vulnerabilities in Web Connection of Konica Minolta MFPs | 2025-07-01T14:02+09:00 | 2025-07-01T14:02+09:00 |
| jvndb-2025-000046 | SLNX Help Documentation of RICOH Streamline NX vulnerable to reflected cross-site scripting | 2025-06-30T15:45+09:00 | 2025-06-30T15:45+09:00 |
| jvndb-2025-007552 | Multiple vulnerabilities in TB-eye network recorders and AHD recorders | 2025-06-30T14:45+09:00 | 2025-06-30T14:45+09:00 |
| jvndb-2025-007521 | Multiple Brother driver installers for Windows vulnerable to privilege escalation | 2025-06-27T09:37+09:00 | 2025-08-19T11:29+09:00 |
| jvndb-2025-007519 | Multiple vulnerabilities in multiple BROTHER products | 2025-06-26T18:15+09:00 | 2025-09-22T10:16+09:00 |
| jvndb-2025-000043 | Multiple vulnerabilities in iroha Board | 2025-06-26T15:13+09:00 | 2025-06-26T15:13+09:00 |
| jvndb-2025-000044 | Denial-of-service (DoS) vulnerabilities in multiple Apache products | 2025-06-26T14:41+09:00 | 2025-10-01T14:18+09:00 |
| jvndb-2025-000042 | Inefficient regular expressions in GROWI | 2025-06-24T15:25+09:00 | 2025-06-24T15:25+09:00 |
| jvndb-2025-000041 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-06-24T14:50+09:00 | 2026-02-03T15:35+09:00 |
| jvndb-2025-007390 | Trend Micro Internet Security and Trend Micro Maximum Security vulnerable to link following local privilege escalation (CVE-2025-49384, CVE-2025-49385) | 2025-06-24T11:18+09:00 | 2025-06-24T11:18+09:00 |
| jvndb-2025-000040 | KCM3100 vulnerable to authentication bypass using an alternate path or channel | 2025-06-18T13:42+09:00 | 2025-06-18T13:42+09:00 |
| jvndb-2025-000039 | Multiple vulnerabilities in RICOH Streamline NX PC Client | 2025-06-13T16:09+09:00 | 2025-06-13T16:09+09:00 |
| jvndb-2025-000038 | UpdateNavi vulnerable to improper restriction of communication channel to intended endpoints | 2025-06-12T15:56+09:00 | 2025-06-12T15:56+09:00 |
| jvndb-2025-000037 | Multiple surveillance cameras provided by i-PRO Co., Ltd. vulnerable to cross-site request forgery | 2025-06-06T13:56+09:00 | 2025-06-06T13:56+09:00 |
| jvndb-2025-000036 | TimeWorks vulnerable to path traversal | 2025-06-03T15:35+09:00 | 2025-06-03T15:35+09:00 |
| jvndb-2025-000035 | Improper file access permission settings in PC Time Tracer | 2025-06-03T14:40+09:00 | 2025-06-03T14:40+09:00 |
| jvndb-2025-000034 | Multiple vulnerabilities in wivia 5 | 2025-05-30T15:57+09:00 | 2025-05-30T15:57+09:00 |
| jvndb-2025-000032 | Mailform Pro CGI generating error messages containing sensitive information | 2025-05-26T14:22+09:00 | 2025-05-26T14:22+09:00 |
| jvndb-2025-000033 | Improper pattern file validation in i-FILTER optional feature 'Anti-Virus & Sandbox' | 2025-05-23T15:36+09:00 | 2025-05-23T15:36+09:00 |
| jvndb-2025-005467 | Passback vulnerabilities in Canon Production Printers, Office/Small Office Multifunction Printers, and Laser Printers | 2025-05-22T15:03+09:00 | 2025-05-22T15:03+09:00 |
| jvndb-2025-005107 | Multiple vulnerabilities in V-SFT | 2025-05-16T14:32+09:00 | 2025-05-16T14:32+09:00 |
| jvndb-2025-005057 | Multiple vulnerabilities in I-O DATA network attached hard disk 'HDL-T Series' | 2025-05-15T18:27+09:00 | 2025-05-15T18:27+09:00 |
| jvndb-2025-005050 | Multiple vulnerabilities in a-blog cms | 2025-05-15T18:11+09:00 | 2025-05-15T18:11+09:00 |
| jvndb-2025-000031 | Pgpool-II vulnerable to authentication bypass by primary weakness | 2025-05-15T16:14+09:00 | 2025-05-15T16:14+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20179-1 | Security update for gpg2 | 2026-01-29T16:09:32Z | 2026-01-29T16:09:32Z |
| suse-su-2026:20176-1 | Security update for elemental-register, elemental-toolkit | 2026-01-29T15:32:26Z | 2026-01-29T15:32:26Z |
| suse-su-2026:0342-1 | Security update for java-25-openjdk | 2026-01-29T14:59:30Z | 2026-01-29T14:59:30Z |
| suse-su-2026:0341-1 | Security update for java-11-openjdk | 2026-01-29T14:58:19Z | 2026-01-29T14:58:19Z |
| suse-su-2026:20194-1 | Security update for postgresql17 and postgresql18 | 2026-01-29T13:17:41Z | 2026-01-29T13:17:41Z |
| suse-su-2026:20193-1 | Security update for postgresql16 | 2026-01-29T10:56:55Z | 2026-01-29T10:56:55Z |
| suse-su-2026:0338-1 | Security update for abseil-cpp | 2026-01-29T10:35:48Z | 2026-01-29T10:35:48Z |
| suse-su-2026:0337-1 | Security update for python | 2026-01-29T10:34:17Z | 2026-01-29T10:34:17Z |
| suse-su-2026:0336-1 | Security update for libxml2 | 2026-01-29T10:16:20Z | 2026-01-29T10:16:20Z |
| suse-su-2026:0335-1 | Security update for python-filelock | 2026-01-29T10:15:42Z | 2026-01-29T10:15:42Z |
| suse-su-2026:0334-1 | Security update for libxml2 | 2026-01-29T10:01:36Z | 2026-01-29T10:01:36Z |
| suse-su-2026:0333-1 | Security update for openssl-1_0_0 | 2026-01-29T08:16:22Z | 2026-01-29T08:16:22Z |
| suse-su-2026:0332-1 | Security update for openssl-1_0_0 | 2026-01-29T06:04:36Z | 2026-01-29T06:04:36Z |
| suse-su-2026:0331-1 | Security update for openssl-1_1 | 2026-01-28T17:13:03Z | 2026-01-28T17:13:03Z |
| suse-su-2026:20190-1 | Security update for java-21-openjdk | 2026-01-28T17:01:51Z | 2026-01-28T17:01:51Z |
| suse-su-2026:0330-1 | Security update for openjpeg2 | 2026-01-28T16:27:12Z | 2026-01-28T16:27:12Z |
| suse-su-2026:20189-1 | Security update for python-urllib3 | 2026-01-28T16:03:29Z | 2026-01-28T16:03:29Z |
| suse-su-2026:20188-1 | Security update for python-python-multipart | 2026-01-28T16:03:29Z | 2026-01-28T16:03:29Z |
| suse-su-2026:20175-1 | Security update for python-urllib3 | 2026-01-28T16:03:29Z | 2026-01-28T16:03:29Z |
| suse-su-2026:20203-1 | Security update for ucode-amd | 2026-01-28T16:01:59Z | 2026-01-28T16:01:59Z |
| suse-su-2026:20173-1 | Security update for ucode-amd | 2026-01-28T16:01:59Z | 2026-01-28T16:01:59Z |
| suse-su-2026:20187-1 | Security update for python-h2 | 2026-01-28T15:47:48Z | 2026-01-28T15:47:48Z |
| suse-su-2026:20186-1 | Security update for xkbcomp | 2026-01-28T15:47:14Z | 2026-01-28T15:47:14Z |
| suse-su-2026:0329-1 | Security update for xen | 2026-01-28T15:39:40Z | 2026-01-28T15:39:40Z |
| suse-su-2026:0328-1 | Security update for xen | 2026-01-28T15:39:28Z | 2026-01-28T15:39:28Z |
| suse-su-2026:0327-1 | Security update for alloy | 2026-01-28T15:38:58Z | 2026-01-28T15:38:58Z |
| suse-su-2026:0326-1 | Security update for helm | 2026-01-28T14:55:01Z | 2026-01-28T14:55:01Z |
| suse-su-2026:0325-1 | Security update for kubernetes | 2026-01-28T14:54:08Z | 2026-01-28T14:54:08Z |
| suse-su-2026:0320-1 | Security update for openjpeg2 | 2026-01-28T14:40:09Z | 2026-01-28T14:40:09Z |
| suse-su-2026:0319-1 | Security update for container-suseconnect | 2026-01-28T14:40:01Z | 2026-01-28T14:40:01Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20097-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-01-23T16:43:58Z | 2026-01-23T16:43:58Z |
| opensuse-su-2026:20095-1 | Security update for python-jaraco.context | 2026-01-23T10:43:43Z | 2026-01-23T10:43:43Z |
| opensuse-su-2026:20105-1 | Security update for sbctl | 2026-01-23T10:02:42Z | 2026-01-23T10:02:42Z |
| opensuse-su-2026:10087-1 | tdom-0.9.6-1.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| opensuse-su-2026:10086-1 | openCryptoki-3.26.0-4.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| opensuse-su-2026:10085-1 | libxml2-16-2.14.5-2.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| opensuse-su-2026:10084-1 | chromedriver-144.0.7559.96-1.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| opensuse-su-2026:20091-1 | Security update for bind | 2026-01-22T16:45:35Z | 2026-01-22T16:45:35Z |
| opensuse-su-2026:20090-1 | Security update for busybox | 2026-01-22T16:45:35Z | 2026-01-22T16:45:35Z |
| opensuse-su-2026:20089-1 | Security update for python-pyasn1 | 2026-01-22T16:42:14Z | 2026-01-22T16:42:14Z |
| opensuse-su-2026:20088-1 | Security update for python-urllib3 | 2026-01-22T15:55:37Z | 2026-01-22T15:55:37Z |
| opensuse-su-2026:20086-1 | Security update for python-virtualenv | 2026-01-22T15:55:37Z | 2026-01-22T15:55:37Z |
| opensuse-su-2026:20087-1 | Security update for python-marshmallow | 2026-01-22T15:55:36Z | 2026-01-22T15:55:36Z |
| opensuse-su-2026:20085-1 | Security update for go1.25 | 2026-01-22T15:49:20Z | 2026-01-22T15:49:20Z |
| opensuse-su-2026:20084-1 | Security update for gdk-pixbuf | 2026-01-22T14:36:57Z | 2026-01-22T14:36:57Z |
| opensuse-su-2026:20083-1 | Security update for libpng16 | 2026-01-22T14:29:42Z | 2026-01-22T14:29:42Z |
| opensuse-su-2026:20082-1 | Security update for rabbitmq-server | 2026-01-22T13:47:27Z | 2026-01-22T13:47:27Z |
| opensuse-su-2026:20081-1 | Security update for python313 | 2026-01-22T13:47:27Z | 2026-01-22T13:47:27Z |
| opensuse-su-2026:20080-1 | Security update for buildah | 2026-01-22T13:00:13Z | 2026-01-22T13:00:13Z |
| opensuse-su-2026:20077-1 | Security update for go1.24 | 2026-01-22T12:53:33Z | 2026-01-22T12:53:33Z |
| opensuse-su-2026:20076-1 | Security update for libheif | 2026-01-22T11:00:42Z | 2026-01-22T11:00:42Z |
| opensuse-su-2026:20075-1 | Security update for libpcap | 2026-01-22T10:13:12Z | 2026-01-22T10:13:12Z |
| opensuse-su-2026:10083-1 | vlang-0.5-2.1 on GA media | 2026-01-22T00:00:00Z | 2026-01-22T00:00:00Z |
| opensuse-su-2026:10082-1 | libsuricata8_0_3-8.0.3-1.1 on GA media | 2026-01-22T00:00:00Z | 2026-01-22T00:00:00Z |
| opensuse-su-2026:10081-1 | libsubid-devel-4.19.2-2.1 on GA media | 2026-01-22T00:00:00Z | 2026-01-22T00:00:00Z |
| opensuse-su-2026:10080-1 | bind-9.20.18-1.1 on GA media | 2026-01-22T00:00:00Z | 2026-01-22T00:00:00Z |
| opensuse-su-2026:20100-1 | Security update for gimp | 2026-01-21T13:31:29Z | 2026-01-21T13:31:29Z |
| opensuse-su-2026:20072-1 | Security update for podman | 2026-01-21T11:06:30Z | 2026-01-21T11:06:30Z |
| opensuse-su-2026:10079-1 | python311-weasyprint-68.0-1.1 on GA media | 2026-01-21T00:00:00Z | 2026-01-21T00:00:00Z |
| opensuse-su-2026:10078-1 | python311-pyasn1-0.6.2-1.1 on GA media | 2026-01-21T00:00:00Z | 2026-01-21T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2022-130-01 | PowerLogic ION Setup | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-102-01 | IGSS (Interactive Graphical SCADA System) | 2022-04-12T08:47:25.000Z | 2022-07-12T08:47:25.000Z |
| sevd-2022-102-02 | Modicon M340 Controller and Communication Modules | 2022-04-12T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2022-087-01 | SCADAPack Workbench | 2022-03-28T13:51:11.000Z | 2023-04-11T13:51:11.000Z |
| sevd-2022-067-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2022-03-08T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-067-03 | Ritto Wiser™ Door | 2022-03-08T10:12:35.000Z | 2022-03-08T10:12:35.000Z |
| sevd-2022-067-02 | APC Smart-UPS SMT, SMC, SMX, SCL, SRC, XU, XP, CSH2, SURTD, SMTL, SRT, and select SRTL Series | 2022-03-08T06:30:00.000Z | 2022-06-16T18:30:00.000Z |
| sevd-2022-039-06 | Harmony/Magelis iPC Series HMI, Vijeo Designer and Vijeo Designer Basic | 2022-02-08T23:25:23.000Z | 2022-02-08T23:25:23.000Z |
| sevd-2022-039-04 | spaceLYnk, Wiser For KNX, fellerLYnk | 2022-02-08T20:32:52.000Z | 2022-03-08T20:32:52.000Z |
| sevd-2022-039-03 | Easergy P40 | 2022-02-08T17:58:55.000Z | 2022-02-08T17:58:55.000Z |
| sevd-2022-039-05 | EcoStruxure Geo SCADA Expert | 2022-02-08T17:33:44.000Z | 2022-02-08T17:33:44.000Z |
| sevd-2022-039-02 | EcoStruxure EV Charging Expert | 2022-02-08T12:36:59.000Z | 2022-02-08T12:36:59.000Z |
| sevd-2022-039-01 | IGSS (Interactive Graphical SCADA System) | 2022-02-08T07:29:58.000Z | 2022-02-08T07:29:58.000Z |
| sevd-2022-011-07 | EcoStruxure™ Power Monitoring Expert | 2022-01-11T13:20:28.000Z | 2022-01-11T13:20:28.000Z |
| sevd-2022-011-05 | ConneXium Tofino Firewall and Loadable Security Modules | 2022-01-11T12:53:54.000Z | 2022-01-11T12:53:54.000Z |
| sevd-2022-011-04 | Easergy P3 | 2022-01-11T11:28:56.000Z | 2022-01-11T11:28:56.000Z |
| sevd-2022-011-03 | Easergy P5 | 2022-01-11T11:05:25.000Z | 2022-03-02T11:05:25.000Z |
| sevd-2022-011-02 | Easergy T300 | 2022-01-11T10:48:02.000Z | 2022-01-11T10:48:02.000Z |
| sevd-2022-011-01 | Ethernet and Web server on Modicon M340 controller and Communication Modules | 2022-01-11T07:53:07.000Z | 2022-01-11T07:53:07.000Z |
| sevd-2022-011-06 | CODESYS V3 Runtime, Development System, and Gateway Vulnerabilities | 2022-01-11T07:08:13.000Z | 2023-04-11T11:30:00.000Z |
| sevd-2021-348-04 | APC by Schneider Electric Rack PDU | 2021-12-14T00:00:00.000Z | 2021-12-21T00:00:00.000Z |
| sevd-2021-348-02 | EVlink City / Parking / Smart Wallbox Charging Stations | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-348-01 | IGSS (Interactive Graphical SCADA System) | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sesb-2021-347-01 | Apache Log4j Vulnerabilities (Log4Shell) | 2021-12-13T09:22:58.000Z | 2022-08-09T09:22:58.000Z |
| sevd-2021-313-04 | Windows Print Spooler embedded in EcoStruxure™ Process Expert | 2021-11-09T08:45:48.000Z | 2022-03-08T08:45:48.000Z |
| sevd-2021-313-03 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2021-11-09T06:30:00.000Z | 2022-05-10T00:00:00.00Z |
| sevd-2021-313-05 | BadAlloc Vulnerabilities | 2021-11-09T05:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2021-313-07 | Eurotherm GUIcon | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-02 | Schneider Electric Software Update | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-01 | SCADAPack 300E Series RTU | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-python-2025-11468 | Folding email comments of unfoldable characters doesn't preserve parenthesis | 2026-01-26T14:49:32.088Z | 2026-02-20T15:52:56.451Z |
| bit-moodle-2025-3625 | Moodle: user dos and name disclosure via idor in moodle mfa email factor revoke action | 2026-01-26T14:49:31.897Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-32045 | Moodle: hidden grades shown to users without permission on some grade reports | 2026-01-26T14:49:30.385Z | 2026-01-26T15:09:56.435Z |
| bit-moodle-2025-32044 | Moodle: unauthenticated rest api user data exposure | 2026-01-26T14:49:29.093Z | 2026-01-26T15:09:56.435Z |
| bit-node-2026-21637 | 2026-01-26T14:48:02.384Z | 2026-01-31T09:09:11.750Z | |
| bit-node-2026-21636 | 2026-01-26T14:48:00.613Z | 2026-01-31T09:09:11.750Z | |
| bit-node-2025-59466 | 2026-01-26T14:47:58.830Z | 2026-01-31T09:09:11.750Z | |
| bit-node-2025-59465 | 2026-01-26T14:47:56.981Z | 2026-01-26T15:09:56.435Z | |
| bit-node-2025-59464 | 2026-01-26T14:47:55.131Z | 2026-01-31T09:09:11.750Z | |
| bit-node-2025-55132 | 2026-01-26T14:47:53.358Z | 2026-02-04T10:19:33.233Z | |
| bit-node-2025-55131 | 2026-01-26T14:47:51.686Z | 2026-01-26T15:09:56.435Z | |
| bit-node-2025-55130 | 2026-01-26T14:47:49.864Z | 2026-02-04T10:19:33.233Z | |
| bit-libpython-2026-0865 | wsgiref.headers.Headers allows header newline injection | 2026-01-26T14:43:33.890Z | 2026-02-24T09:11:39.593Z |
| bit-libpython-2026-0672 | Header injection in http.cookies.Morsel | 2026-01-26T14:43:32.238Z | 2026-02-20T15:52:56.451Z |
| bit-libpython-2025-15367 | POP3 command injection in user-controlled commands | 2026-01-26T14:43:12.088Z | 2026-01-26T15:09:56.435Z |
| bit-libpython-2025-15366 | IMAP command injection in user-controlled commands | 2026-01-26T14:43:10.455Z | 2026-01-26T15:09:56.435Z |
| bit-libpython-2025-15282 | Header injection via newlines in data URL mediatype | 2026-01-26T14:43:08.856Z | 2026-02-23T12:55:58.474Z |
| bit-libpython-2025-12781 | base64.b64decode() always accepts "+/" characters, despite setting altchars | 2026-01-26T14:43:03.724Z | 2026-01-26T15:09:56.435Z |
| bit-libpython-2025-11468 | Folding email comments of unfoldable characters doesn't preserve parenthesis | 2026-01-26T14:42:59.991Z | 2026-02-20T15:52:56.451Z |
| bit-harbor-2024-22261 | SQL Injection in Harbor scan log API | 2026-01-26T14:40:06.365Z | 2026-01-26T15:09:56.435Z |
| bit-harbor-2022-31666 | Harbor fails to validate user permissions while Viewing, updating and deleting Webhook policies | 2026-01-26T14:39:52.521Z | 2026-01-26T15:09:56.435Z |
| bit-crossplane-2023-38495 | Crossplane vulnerable to possible image tampering from missing image validation for Packages | 2026-01-26T14:36:56.233Z | 2026-01-26T15:09:56.435Z |
| bit-crossplane-2023-37900 | Crossplane vulnerable to denial of service from large image | 2026-01-26T14:36:54.817Z | 2026-01-26T15:09:56.435Z |
| bit-gradle-2026-22865 | Gradle's failure to disable repositories failing to answer can expose builds to malicious artifacts | 2026-01-21T08:41:11.981Z | 2026-01-21T09:22:22.325Z |
| bit-gradle-2026-22816 | Gradle fails to disable repositories which can expose builds to malicious artifacts | 2026-01-21T08:41:10.153Z | 2026-01-21T09:22:22.325Z |
| bit-airflow-2025-68675 | Apache Airflow: proxy credentials for various providers might leak in task logs | 2026-01-21T08:39:24.383Z | 2026-02-26T09:13:58.886Z |
| bit-airflow-2025-68438 | Apache Airflow: Secrets in rendered templates could contain parts of sensitive values when truncated | 2026-01-21T08:39:22.633Z | 2026-01-21T09:22:22.325Z |
| bit-gitlab-2025-11224 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-01-16T09:05:53.033Z | 2026-01-22T09:11:07.452Z |
| bit-kibana-2026-0543 | Improper Input Validation in Kibana Email Connector Leading to Excessive Allocation | 2026-01-16T08:42:18.049Z | 2026-01-16T09:10:29.256Z |
| bit-kibana-2026-0532 | External Control of File Name or Path and Server-Side Request Forgery (SSRF) in Kibana Google Gemini Connector | 2026-01-16T08:42:16.599Z | 2026-01-16T09:10:29.256Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-xp58111 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:18:55.480183Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sj80413 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:16:55.110567Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cd66042 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:16:25.085708Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ku65968 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:15:25.445497Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xp03839 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:14:55.099611Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qm19832 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T16:13:25.141915Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-um63521 | Within HostnameError | 2026-01-30T16:12:25.029065Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cz81512 | Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes | 2026-01-30T16:11:25.451968Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jr48309 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:11:25.334563Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr17407 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.270681Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uz73015 | Cancelling a query (e | 2026-01-30T16:09:25.315533Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk69606 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:08:25.435888Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gl70025 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:08:25.191230Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ps30901 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes | 2026-01-30T16:07:55.053827Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wp20592 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.814830Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wa03785 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.799763Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-we92783 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:05:24.753007Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nv34418 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:04:54.566695Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qv26039 | Within HostnameError | 2026-01-30T16:03:24.653963Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mf93723 | Within HostnameError | 2026-01-30T16:03:24.521286Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr85161 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.934169Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bd53293 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.709597Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wq07901 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:01:54.911193Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-np17404 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:58:24.395667Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oa33370 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:57:24.977544Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yc48827 | Within HostnameError | 2026-01-30T15:56:24.532632Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hv28992 | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3 | 2026-01-30T15:55:24.450018Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dp30290 | processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input | 2026-01-30T15:52:54.729374Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oh86281 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:52:25.054249Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ll43287 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:50:54.603931Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2024-071 | 2024-12-04T16:20:57.000Z | 2025-02-20T20:07:52.000Z | |
| drupal-contrib-2024-070 | 2024-12-04T15:51:12.000Z | 2025-02-20T20:07:46.000Z | |
| drupal-contrib-2024-069 | 2024-12-04T15:13:14.000Z | 2025-02-20T20:07:35.000Z | |
| drupal-contrib-2024-068 | 2024-12-04T14:46:03.000Z | 2025-02-20T20:07:26.000Z | |
| drupal-contrib-2024-067 | 2024-12-04T14:40:50.000Z | 2025-02-20T20:07:11.000Z | |
| drupal-contrib-2024-064 | 2024-11-27T16:41:51.000Z | 2025-02-20T20:06:49.000Z | |
| drupal-contrib-2024-062 | 2024-11-20T17:36:55.000Z | 2025-02-20T20:06:35.000Z | |
| drupal-contrib-2024-060 | 2024-11-13T17:37:36.000Z | 2025-02-20T20:06:18.000Z | |
| drupal-contrib-2024-059 | 2024-11-13T17:36:48.000Z | 2025-02-20T20:06:05.000Z | |
| drupal-contrib-2024-058 | 2024-11-06T16:28:56.000Z | 2025-02-20T20:05:57.000Z | |
| drupal-contrib-2024-056 | 2024-10-30T17:11:24.000Z | 2025-02-20T20:05:41.000Z | |
| drupal-contrib-2024-055 | 2024-10-30T17:07:09.000Z | 2025-02-20T20:05:30.000Z | |
| drupal-contrib-2024-052 | 2024-10-23T15:45:47.000Z | 2025-02-20T20:05:19.000Z | |
| drupal-contrib-2024-051 | 2024-10-23T15:45:41.000Z | 2025-02-20T20:08:44.000Z | |
| drupal-contrib-2024-050 | 2024-10-23T12:09:48.000Z | 2025-02-20T19:25:41.000Z | |
| drupal-contrib-2024-049 | 2024-10-09T16:40:07.000Z | 2025-02-20T19:25:53.000Z | |
| drupal-contrib-2024-048 | 2024-10-09T15:56:35.000Z | 2025-02-20T19:26:05.000Z | |
| drupal-contrib-2024-047 | 2024-10-09T15:54:27.000Z | 2025-02-20T19:26:17.000Z | |
| drupal-contrib-2024-046 | 2024-10-09T15:48:11.000Z | 2025-02-20T19:26:30.000Z | |
| drupal-contrib-2024-045 | 2024-10-09T15:48:10.000Z | 2025-02-20T19:26:40.000Z | |
| drupal-contrib-2024-044 | 2024-10-02T16:27:12.000Z | 2025-02-20T19:26:51.000Z | |
| drupal-contrib-2024-043 | 2024-10-02T16:20:48.000Z | 2025-02-20T19:27:03.000Z | |
| drupal-contrib-2024-042 | 2024-10-02T16:15:59.000Z | 2025-02-20T19:27:15.000Z | |
| drupal-contrib-2024-039 | 2024-09-11T16:21:22.000Z | 2025-02-20T19:22:14.000Z | |
| drupal-contrib-2024-038 | 2024-09-04T16:20:17.000Z | 2025-02-20T19:22:30.000Z | |
| drupal-contrib-2024-037 | 2024-09-04T16:15:41.000Z | 2025-02-20T19:22:50.000Z | |
| drupal-contrib-2024-036 | 2024-09-04T15:42:05.000Z | 2025-02-20T19:23:09.000Z | |
| drupal-contrib-2024-035 | 2024-09-04T15:40:44.000Z | 2025-02-20T19:23:27.000Z | |
| drupal-contrib-2024-034 | 2024-09-04T15:35:55.000Z | 2025-02-20T19:23:44.000Z | |
| drupal-contrib-2024-033 | 2024-08-28T15:32:41.000Z | 2025-02-20T19:24:02.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-07552 | WordPress插件PDF Resume Parser信息泄露漏洞 | 2026-01-19 | 2026-01-28 |
| cnvd-2026-07551 | WordPress插件LottieFiles – Lottie block for Gutenberg信息泄露漏洞 | 2026-01-19 | 2026-01-28 |
| cnvd-2026-07206 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2026-07206) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07205 | Microsoft SharePoint Server欺骗漏洞(CNVD-2026-07205) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07204 | Microsoft SharePoint远程代码执行漏洞(CNVD-2026-07204) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07203 | Microsoft SharePoint信息泄露漏洞(CNVD-2026-07203) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07202 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2026-07202) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07201 | Microsoft Office代码执行漏洞(CNVD-2026-07201) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07200 | Microsoft Office代码执行漏洞(CNVD-2026-07200) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07199 | Microsoft Office Click-To-Run代码执行漏洞 | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07198 | Microsoft Excel代码执行漏洞(CNVD-2026-07198) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07197 | Microsoft Excel代码执行漏洞(CNVD-2026-07197) | 2026-01-19 | 2026-01-27 |
| cnvd-2026-07196 | Microsoft Excel代码执行漏洞(CNVD-2026-07196) | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07195 | Adobe Substance3D Stager资源管理错误漏洞(CNVD-2026-07195) | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07194 | Adobe Substance3D Modeler越界读取漏洞(CNVD-2026-07194) | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07193 | Adobe Substance3D Modeler越界读取漏洞(CNVD-2026-07193) | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07192 | Adobe Substance3D Designer越界读取漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07191 | Adobe Substance3D Designer缓冲区溢出漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07190 | Adobe Illustrator代码问题漏洞(CNVD-2026-07190) | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07189 | Adobe Illustrator代码问题漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07188 | Adobe Dreamweaver Desktop输入验证错误漏洞(CNVD-2026-07188) | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07187 | Adobe Dreamweaver Desktop输入验证错误漏洞 | 2026-01-19 | 2026-01-26 |
| cnvd-2026-07159 | Intern Membership Management System /add_admin.php文件SQL注入漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-07158 | Intern Membership Management System /add_activity.php文件SQL注入漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-07040 | WordPress WP-Members Membership plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-07039 | WordPress WP-CRM System plugin未经授权访问漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-07027 | WordPress Uploadify plugin代码问题漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-07026 | WordPress Testimonials Creator plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-07025 | WordPress Supreme Modules Lite plugin代码问题漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-07012 | WordPress Stopwords for comments plugin跨站请求伪造漏洞 | 2026-01-19 | 2026-01-23 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0077 | Multiples vulnérabilités dans les produits Symantec | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0076 | Vulnérabilité dans les produits Cisco | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0075 | Multiples vulnérabilités dans GitLab | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0074 | Multiples vulnérabilités dans Oracle Weblogic | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0073 | Multiples vulnérabilités dans Oracle Virtualization | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0072 | Multiples vulnérabilités dans Oracle Systems | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0071 | Multiples vulnérabilités dans Oracle PeopleSoft | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0070 | Multiples vulnérabilités dans Oracle MySQL | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0069 | Multiples vulnérabilités dans Oracle Java SE | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0068 | Multiples vulnérabilités dans Oracle Database Server | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0067 | Multiples vulnérabilités dans Python | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0066 | Vulnérabilité dans Google Chrome | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0065 | Multiples vulnérabilités dans les produits Atlassian | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0064 | Vulnérabilité Microsoft Power Apps | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| certfr-2026-avi-0063 | Multiples vulnérabilités dans Microsoft Edge | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| certfr-2026-avi-0062 | Vulnérabilité dans Mattermost Desktop App | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| certfr-2026-avi-0061 | Multiples vulnérabilités dans les produits IBM | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0060 | Vulnérabilité dans Apache Struts | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0059 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0058 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0057 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0056 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0055 | Multiples vulnérabilités dans GLPI | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0054 | Multiples vulnérabilités dans Centreon Infra Monitoring | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0053 | Vulnérabilité dans Traefik | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| certfr-2026-avi-0051 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0050 | Multiples vulnérabilités dans les produits Juniper Networks | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0049 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0048 | Multiples vulnérabilités dans Wireshark | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2017-ale-005 | Vulnérabilité dans les commutateurs Cisco | 2017-03-20T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| certfr-2017-ale-004 | Vulnérabilité dans Apache Struts | 2017-03-10T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| certfr-2017-ale-003 | Vulnérabilité dans les navigateurs Microsoft | 2017-02-27T00:00:00.000000 | 2017-03-15T00:00:00.000000 |
| certfr-2017-ale-002 | Vulnérabilité dans Microsoft Windows | 2017-02-20T00:00:00.000000 | 2017-03-15T00:00:00.000000 |
| certfr-2017-ale-001 | Vulnérabilité dans Cisco WebEx | 2017-01-25T00:00:00.000000 | 2017-01-31T00:00:00.000000 |
| certfr-2016-ale-010 | Vulnérabilité dans les routeurs Netgear | 2016-12-13T00:00:00.000000 | 2016-12-26T00:00:00.000000 |
| certfr-2016-ale-009 | Campagne d'attaque contre des routeurs DSL | 2016-12-01T00:00:00.000000 | 2017-01-26T00:00:00.000000 |
| certfr-2016-ale-008 | Vulnérabilité dans Microsoft Windows | 2016-11-02T00:00:00.000000 | 2016-11-09T00:00:00.000000 |
| certfr-2016-ale-007 | Vulnérabilité dans Cisco IOS, IOS XE et IOS XR | 2016-09-19T00:00:00.000000 | 2016-09-19T00:00:00.000000 |
| certfr-2016-ale-006 | Campagne de messages électroniques non sollicités de type Zepto/Odin | 2016-09-05T00:00:00.000000 | 2016-11-17T00:00:00.000000 |
| certfr-2016-ale-005 | Multiples vulnérabilités dans les pare-feux Cisco | 2016-08-18T00:00:00.000000 | 2016-09-05T00:00:00.000000 |
| certfr-2016-ale-004 | Vulnérabilité dans Adobe Flash Player | 2016-06-15T00:00:00.000000 | 2016-06-16T00:00:00.000000 |
| certfr-2016-ale-003 | Vulnérabilité dans Adobe Flash Player | 2016-05-11T00:00:00.000000 | 2016-05-12T00:00:00.000000 |
| certfr-2016-ale-002 | Vulnérabilité dans Adobe Flash Player | 2016-04-06T00:00:00.000000 | 2016-04-08T00:00:00.000000 |
| certfr-2016-ale-001 | Campagne de messages électroniques non sollicités de type Locky | 2016-02-19T00:00:00.000000 | 2016-04-07T00:00:00.000000 |
| certfr-2015-ale-015 | Campagne de messages électroniques non sollicités de type TeslaCrypt | 2015-12-21T00:00:00.000000 | 2016-03-10T00:00:00.000000 |
| certfr-2015-ale-014 | Vulnérabilité dans Juniper ScreenOS | 2015-12-18T00:00:00.000000 | 2016-04-11T00:00:00.000000 |
| certfr-2015-ale-013 | Vulnérabilité dans Joomla! | 2015-12-14T00:00:00.000000 | 2016-08-01T00:00:00.000000 |
| certfr-2015-ale-012 | Campagne de messages électroniques non sollicités de type Dridex | 2015-10-23T00:00:00.000000 | 2015-11-26T00:00:00.000000 |
| certfr-2015-ale-011 | Vulnérabilité dans Adobe Flash Player | 2015-10-14T00:00:00.000000 | 2015-10-19T00:00:00.000000 |
| certfr-2015-ale-010 | Multiples vulnérabilités dans Google Android | 2015-07-28T00:00:00.000000 | 2015-10-06T00:00:00.000000 |
| certfr-2015-ale-009 | Vulnérabilité dans Apple Mac OS X | 2015-07-24T00:00:00.000000 | 2015-12-22T00:00:00.000000 |
| certfr-2015-ale-008 | Vulnérabilité dans le pilote de gestion des polices de caractères de Microsoft Windows | 2015-07-20T00:00:00.000000 | 2015-07-30T00:00:00.000000 |
| certfr-2015-ale-007 | Vulnérabilité dans Oracle Java SE | 2015-07-13T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| certfr-2015-ale-006 | Vulnérabilité dans Adobe Flash Player | 2015-07-11T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| certfr-2015-ale-005 | Vulnérabilité dans Adobe Flash Player | 2015-07-08T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| certfr-2015-ale-004 | Vulnérabilité dans Microsoft Internet Explorer | 2015-02-10T00:00:00.000000 | 2015-03-31T00:00:00.000000 |
| certfr-2015-ale-003 | Nouvelle campagne d'hameçonnage de type rançongiciel | 2015-02-05T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| certfr-2015-ale-002 | Vulnérabilité dans Adobe Flash Player | 2015-02-02T00:00:00.000000 | 2015-02-05T00:00:00.000000 |
| certfr-2015-ale-001 | Vulnérabilité dans Adobe Flash Player | 2015-01-22T00:00:00.000000 | 2015-01-30T00:00:00.000000 |