Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-21218 |
7.5 (3.1)
|
.NET Spoofing Vulnerability |
Microsoft |
.NET 10.0 |
2026-02-10T17:51:23.973Z | 2026-02-27T20:54:57.849Z |
| CVE-2026-21236 |
7.8 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:23.374Z | 2026-02-27T20:54:56.933Z |
| CVE-2026-21234 |
7 (3.1)
|
Windows Connected Devices Platform Service Elevation o… |
Microsoft |
Windows 10 Version 1809 |
2026-02-10T17:51:22.765Z | 2026-02-27T20:54:56.379Z |
| CVE-2026-21235 |
7.3 (3.1)
|
Windows Graphics Component Elevation of Privilege Vuln… |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:22.100Z | 2026-02-27T20:54:55.754Z |
| CVE-2026-21242 |
7 (3.1)
|
Windows Subsystem for Linux Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 21H2 |
2026-02-10T17:51:21.565Z | 2026-02-27T20:54:55.146Z |
| CVE-2026-21246 |
7.8 (3.1)
|
Windows Graphics Component Elevation of Privilege Vuln… |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:20.911Z | 2026-02-27T20:54:54.390Z |
| CVE-2026-21247 |
7.3 (3.1)
|
Windows Hyper-V Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:20.245Z | 2026-02-27T20:54:53.779Z |
| CVE-2026-21248 |
7.3 (3.1)
|
Windows Hyper-V Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:19.526Z | 2026-02-27T20:54:53.104Z |
| CVE-2026-21260 |
7.5 (3.1)
|
Microsoft Outlook Spoofing Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:18.891Z | 2026-02-27T20:54:52.319Z |
| CVE-2026-21258 |
5.5 (3.1)
|
Microsoft Excel Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:18.057Z | 2026-02-27T20:54:51.573Z |
| CVE-2026-21259 |
7.8 (3.1)
|
Microsoft Excel Elevation of Privilege Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:17.445Z | 2026-02-27T20:54:50.433Z |
| CVE-2026-21512 |
6.5 (3.1)
|
Azure DevOps Server Cross-Site Scripting Vulnerability |
Microsoft |
Azure DevOps Server 2022 |
2026-02-10T17:51:16.670Z | 2026-02-27T20:54:49.339Z |
| CVE-2026-27204 |
6.9 (4.0)
|
Wasmtime WASI implementations are vulnerable to guest-… |
bytecodealliance |
wasmtime |
2026-02-24T21:23:47.007Z | 2026-02-27T20:54:48.839Z |
| CVE-2026-21517 |
4.7 (3.1)
|
Windows App for Mac Installer Elevation of Privilege V… |
Microsoft |
Windows App for Mac |
2026-02-10T17:51:15.940Z | 2026-02-27T20:54:48.351Z |
| CVE-2026-21519 |
7.8 (3.1)
|
Desktop Window Manager Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:13.956Z | 2026-02-27T20:54:47.357Z |
| CVE-2026-26351 |
4.8 (4.0)
|
GetSimpleCMS-CE < 3.3.22 Stored XSS via components.php |
GetSimpleCMS-CE |
GetSimpleCMS-CE |
2026-02-24T22:05:54.420Z | 2026-02-27T20:54:05.464Z |
| CVE-2026-26222 |
10 (4.0)
|
DocLink .NET Remoting Unauthenticated Arbitrary File R… |
Beyond Limits Inc. |
Altec DocLink |
2026-02-24T17:33:12.136Z | 2026-02-27T20:53:32.186Z |
| CVE-2024-48928 |
2.7 (4.0)
|
Piwigo's secret key can be brute forced |
Piwigo |
Piwigo |
2026-02-24T16:39:56.944Z | 2026-02-27T20:52:54.685Z |
| CVE-2025-62512 |
5.5 (4.0)
|
Piwigo Vulnerable to User Enumeration via Password Res… |
Piwigo |
Piwigo |
2026-02-24T16:43:28.919Z | 2026-02-27T20:52:30.148Z |
| CVE-2026-2796 |
9.8 (3.1)
|
JIT miscompilation in the JavaScript: WebAssembly component |
Mozilla |
Firefox |
2026-02-24T13:33:26.775Z | 2026-02-27T20:52:22.502Z |
| CVE-2026-27590 |
8.9 (4.0)
|
Caddy: Unicode case-folding length expansion causes in… |
caddyserver |
caddy |
2026-02-24T16:33:41.353Z | 2026-02-27T20:52:00.327Z |
| CVE-2026-27589 |
6.9 (4.0)
|
Caddy vulnerable to cross-origin config application vi… |
caddyserver |
caddy |
2026-02-24T16:30:52.016Z | 2026-02-27T20:51:24.110Z |
| CVE-2026-27468 |
4.8 (4.0)
|
Mastodon may allow unconfirmed FASP to make subscriptions |
mastodon |
mastodon |
2026-02-24T17:12:40.349Z | 2026-02-27T20:50:52.856Z |
| CVE-2026-27208 |
9.2 (3.1)
|
api-gateway-deploy Affected by Exploitable Command Inj… |
bleon-ethical |
api-gateway-deploy |
2026-02-24T13:52:43.155Z | 2026-02-27T20:50:16.436Z |
| CVE-2026-27732 |
8.6 (4.0)
|
AVideo has Authenticated Server-Side Request Forgery v… |
WWBN |
AVideo |
2026-02-24T14:56:55.372Z | 2026-02-27T20:49:38.424Z |
| CVE-2026-27584 |
9.2 (4.0)
|
ActualBudget server is Missing Authentication for Simp… |
actualbudget |
actual |
2026-02-24T14:59:21.175Z | 2026-02-27T20:48:57.689Z |
| CVE-2026-27587 |
7.7 (4.0)
|
Caddy: MatchPath %xx (escaped-path) branch skips case … |
caddyserver |
caddy |
2026-02-24T16:26:40.222Z | 2026-02-27T20:48:09.775Z |
| CVE-2026-27588 |
7.7 (4.0)
|
Caddy: MatchHost becomes case-sensitive for large host… |
caddyserver |
caddy |
2026-02-24T16:28:28.106Z | 2026-02-27T20:47:36.164Z |
| CVE-2026-27738 |
6.9 (4.0)
|
Angular SSR has an Open Redirect via X-Forwarded-Prefix |
angular |
angular-cli |
2026-02-25T16:40:44.724Z | 2026-02-27T20:46:26.917Z |
| CVE-2026-28288 |
5.5 (4.0)
|
Dify has a user enumeration issue |
langgenius |
dify |
2026-02-27T20:25:24.599Z | 2026-02-27T20:45:44.126Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2023-34153 |
7.8 (3.1)
|
A vulnerability was found in ImageMagick. This se… |
n/a |
ImageMagick |
2023-05-30T00:00:00.000Z | 2025-01-10T21:02:45.598Z |
| CVE-2026-2796 |
9.8 (3.1)
|
JIT miscompilation in the JavaScript: WebAssembly component |
Mozilla |
Firefox |
2026-02-24T13:33:26.775Z | 2026-02-27T20:52:22.502Z |
| CVE-2026-2634 |
9.8 (3.1)
|
Spoofed web content presented under trusted domains us… |
Mozilla |
Firefox for iOS |
2026-02-24T13:33:24.725Z | 2026-02-27T20:55:35.483Z |
| CVE-2026-28355 |
1.3 (4.0)
|
"PWA" Canarytoken Vulnerable to Stored Self Cross-Site… |
thinkst |
canarytokens |
2026-02-27T21:04:13.445Z | 2026-02-27T21:04:13.445Z |
| CVE-2026-28352 |
6.5 (3.1)
|
Indico missing access check in event series management API |
indico |
indico |
2026-02-27T21:01:45.740Z | 2026-02-27T21:01:45.740Z |
| CVE-2026-28351 |
6.9 (4.0)
|
Manipulated RunLengthDecode streams can exhaust RAM |
py-pdf |
pypdf |
2026-02-27T20:59:16.839Z | 2026-02-27T20:59:16.839Z |
| CVE-2026-28338 |
6.8 (3.1)
|
PMD Designer has Stored XSS in VBHTMLRenderer and YAHT… |
pmd |
pmd |
2026-02-27T20:28:05.739Z | 2026-02-27T20:28:05.739Z |
| CVE-2026-28288 |
5.5 (4.0)
|
Dify has a user enumeration issue |
langgenius |
dify |
2026-02-27T20:25:24.599Z | 2026-02-27T20:45:44.126Z |
| CVE-2026-28272 |
8.1 (3.1)
|
Kiteworks Email Protection Gateway has a Cross-site Sc… |
kiteworks |
security-advisories |
2026-02-27T20:22:59.656Z | 2026-02-27T20:22:59.656Z |
| CVE-2026-28271 |
6.5 (3.1)
|
Kiteworks Core is vulnerable to Server-Side Request Fo… |
kiteworks |
security-advisories |
2026-02-27T20:21:12.194Z | 2026-02-27T20:21:29.444Z |
| CVE-2026-28270 |
4.9 (3.1)
|
Kiteworks Core has an Unrestricted Upload of File with… |
kiteworks |
security-advisories |
2026-02-27T20:19:54.611Z | 2026-02-27T20:19:54.611Z |
| CVE-2026-28268 |
9.8 (3.1)
|
Vikunja Vulnerable to Account Takeover via Password Re… |
go-vikunja |
vikunja |
2026-02-27T20:16:29.842Z | 2026-02-27T20:16:29.842Z |
| CVE-2026-27738 |
6.9 (4.0)
|
Angular SSR has an Open Redirect via X-Forwarded-Prefix |
angular |
angular-cli |
2026-02-25T16:40:44.724Z | 2026-02-27T20:46:26.917Z |
| CVE-2026-27745 |
8.7 (4.0)
8.8 (3.1)
|
SPIP interface_traduction_objets < 2.2.2 Authenticated RCE |
SPIP |
interface_traduction_objets |
2026-02-25T03:08:11.502Z | 2026-02-26T19:56:06.952Z |
| CVE-2026-27747 |
7.1 (4.0)
6.5 (3.1)
|
SPIP interface_traduction_objets < 2.2.2 Authenticated… |
SPIP |
interface_traduction_objets |
2026-02-25T03:07:44.532Z | 2026-02-26T19:56:56.048Z |
| CVE-2026-25129 |
6.7 (3.1)
|
PsySH has Local Privilege Escalation via CWD .psysh.ph… |
bobthecow |
psysh |
2026-01-30T20:12:48.651Z | 2026-02-02T15:45:55.276Z |
| CVE-2025-69207 |
5.4 (3.1)
|
Khoj has an IDOR in Notion OAuth Flow Enables Index Po… |
khoj-ai |
khoj |
2026-02-02T21:16:49.041Z | 2026-02-03T15:45:38.393Z |
| CVE-2026-24051 |
7 (3.1)
|
OpenTelemetry-Go Affected by Arbitrary Code Execution … |
open-telemetry |
opentelemetry-go |
2026-02-02T19:49:10.038Z | 2026-02-03T14:54:41.668Z |
| CVE-2025-64712 |
9.8 (3.1)
|
Unstructured has Path Traversal via Malicious MSG Atta… |
Unstructured-IO |
unstructured |
2026-02-04T17:34:51.426Z | 2026-02-04T19:24:12.411Z |
| CVE-2026-24884 |
8.4 (3.1)
|
Compressing Vulnerable to Arbitrary File Write via Sym… |
node-modules |
compressing |
2026-02-04T19:35:56.357Z | 2026-02-05T14:32:51.788Z |
| CVE-2026-25505 |
9.8 (3.1)
|
Bambuddy Uses Hardcoded Secret Key + Many API Endpoint… |
maziggy |
bambuddy |
2026-02-04T20:06:30.538Z | 2026-02-06T18:41:07.205Z |
| CVE-2026-25128 |
7.5 (3.1)
|
fast-xml-parser has RangeError DoS Numeric Entities Bug |
NaturalIntelligence |
fast-xml-parser |
2026-01-30T15:14:58.244Z | 2026-02-11T18:38:40.192Z |
| CVE-2026-28354 |
5.7 (4.0)
|
ClipBucket v5 has IDOR in Collection Item Management |
MacWarrior |
clipbucket-v5 |
2026-02-27T19:18:25.500Z | 2026-02-27T20:23:22.876Z |
| CVE-2026-28231 |
5.5 (4.0)
|
pillow_heif Has Integer Overflow in Encode Path Buffer… |
bigcat88 |
pillow_heif |
2026-02-27T20:13:45.195Z | 2026-02-27T20:13:45.195Z |
| CVE-2026-27947 |
9.4 (4.0)
|
Group-Office Vulnerable to Remote Code Execution (RCE) |
Intermesh |
groupoffice |
2026-02-27T19:52:41.592Z | 2026-02-27T19:52:41.592Z |
| CVE-2026-27836 |
7.5 (3.1)
|
phpMyFAQ Allows Unauthenticated Account Creation via W… |
thorsten |
phpMyFAQ |
2026-02-27T19:54:51.992Z | 2026-02-27T19:54:51.992Z |
| CVE-2026-27832 |
7.1 (4.0)
|
Group-Office Has Authenticated SQL Injection in advanc… |
Intermesh |
groupoffice |
2026-02-27T19:49:57.867Z | 2026-02-27T19:49:57.867Z |
| CVE-2026-27824 |
5.3 (3.1)
|
calibre has IP Ban Bypass via X-Forwarded-For Header S… |
kovidgoyal |
calibre |
2026-02-27T19:46:07.612Z | 2026-02-27T19:46:07.612Z |
| CVE-2026-27810 |
6.4 (3.1)
|
calibre Vulnerable to HTTP Response Header Injection |
kovidgoyal |
calibre |
2026-02-27T19:44:39.106Z | 2026-02-27T19:44:39.106Z |
| CVE-2026-27793 |
6.5 (3.1)
|
Seerr has Broken Object-Level Authorization in User Pr… |
seerr-team |
seerr |
2026-02-27T19:38:49.589Z | 2026-02-27T19:38:49.589Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2796 | JIT miscompilation in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 1… | 2026-02-24T14:16:28.100 | 2026-02-27T21:16:19.923 |
| fkie_cve-2026-2634 | Malicious scripts could cause desynchronization between the address bar and web content before a re… | 2026-02-24T14:16:23.810 | 2026-02-27T21:16:19.743 |
| fkie_cve-2026-28355 | Canarytokens help track activity and actions on a network. Versions prior to `sha-7ff0e12` have a S… | 2026-02-27T21:16:19.563 | 2026-02-27T21:16:19.563 |
| fkie_cve-2026-28352 | Indico is an event management system that uses Flask-Multipass, a multi-backend authentication syst… | 2026-02-27T21:16:19.323 | 2026-02-27T21:16:19.323 |
| fkie_cve-2026-28351 | pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.4, an attacker who us… | 2026-02-27T21:16:19.177 | 2026-02-27T21:16:19.177 |
| fkie_cve-2026-28338 | PMD is an extensible multilanguage static code analyzer. Prior to version 7.22.0, PMD's `vbhtml` an… | 2026-02-27T21:16:19.017 | 2026-02-27T21:16:19.017 |
| fkie_cve-2026-28288 | Dify is an open-source LLM app development platform. Prior to 1.9.0, responses from the Dify API to… | 2026-02-27T21:16:18.853 | 2026-02-27T21:16:18.853 |
| fkie_cve-2026-28272 | Kiteworks is a private data network (PDN). Prior to version 9.2.0, a vulnerability in Kiteworks Ema… | 2026-02-27T21:16:18.703 | 2026-02-27T21:16:18.703 |
| fkie_cve-2026-28271 | Kiteworks is a private data network (PDN). Prior to version 9.2.0, a vulnerability in Kiteworks con… | 2026-02-27T21:16:18.550 | 2026-02-27T21:16:18.550 |
| fkie_cve-2026-28270 | Kiteworks is a private data network (PDN). Prior to version 9.2.0, a vulnerability in Kiteworks con… | 2026-02-27T21:16:18.397 | 2026-02-27T21:16:18.397 |
| fkie_cve-2026-28268 | Vikunja is an open-source self-hosted task management platform. Versions prior to 2.1.0 have a busi… | 2026-02-27T21:16:18.233 | 2026-02-27T21:16:18.233 |
| fkie_cve-2026-27738 | The Angular SSR is a server-rise rendering tool for Angular applications. An Open Redirect vulnerab… | 2026-02-25T17:25:40.463 | 2026-02-27T21:16:18.013 |
| fkie_cve-2026-27745 | The SPIP interface_traduction_objets plugin versions prior to 2.2.2 contain an authenticated remote… | 2026-02-25T04:16:05.140 | 2026-02-27T20:40:35.660 |
| fkie_cve-2026-27747 | The SPIP interface_traduction_objets plugin versions prior to 2.2.2 contain an authenticated SQL in… | 2026-02-25T04:16:05.493 | 2026-02-27T20:40:14.737 |
| fkie_cve-2026-25129 | PsySH is a runtime developer console, interactive debugger, and REPL for PHP. Prior to versions 0.1… | 2026-01-30T21:15:58.260 | 2026-02-27T20:36:55.680 |
| fkie_cve-2025-69207 | Khoj is a self-hostable artificial intelligence app. Prior to 2.0.0-beta.23, an IDOR in the Notion … | 2026-02-02T23:16:01.030 | 2026-02-27T20:34:28.550 |
| fkie_cve-2026-24051 | OpenTelemetry-Go is the Go implementation of OpenTelemetry. The OpenTelemetry Go SDK in version v1.… | 2026-02-02T23:16:07.963 | 2026-02-27T20:32:10.693 |
| fkie_cve-2025-64712 | The unstructured library provides open-source components for ingesting and pre-processing images an… | 2026-02-04T18:16:07.370 | 2026-02-27T20:30:48.700 |
| fkie_cve-2026-24884 | Compressing is a compressing and uncompressing lib for node. In version 2.0.0 and 1.10.3 and prior,… | 2026-02-04T20:16:05.703 | 2026-02-27T20:27:32.587 |
| fkie_cve-2026-25505 | Bambuddy is a self-hosted print archive and management system for Bambu Lab 3D printers. Prior to v… | 2026-02-04T20:16:07.707 | 2026-02-27T20:25:05.510 |
| fkie_cve-2026-25128 | fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object w… | 2026-01-30T16:16:14.123 | 2026-02-27T20:22:44.700 |
| fkie_cve-2026-28354 | ClipBucket v5 is an open source video sharing platform. Prior to version 5.5.3 #59, collection item… | 2026-02-27T20:21:40.883 | 2026-02-27T20:21:40.883 |
| fkie_cve-2026-28231 | pillow_heif is a Python library for working with HEIF images and plugin for Pillow. Prior to versio… | 2026-02-27T20:21:40.697 | 2026-02-27T20:21:40.697 |
| fkie_cve-2026-27947 | Group-Office is an enterprise customer relationship management and groupware tool. Versions prior t… | 2026-02-27T20:21:40.513 | 2026-02-27T20:21:40.513 |
| fkie_cve-2026-27836 | phpMyFAQ is an open source FAQ web application. Prior to version 4.0.18, the WebAuthn prepare endpo… | 2026-02-27T20:21:40.330 | 2026-02-27T20:21:40.330 |
| fkie_cve-2026-27832 | Group-Office is an enterprise customer relationship management and groupware tool. Versions prior t… | 2026-02-27T20:21:40.150 | 2026-02-27T20:21:40.150 |
| fkie_cve-2026-27824 | calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books… | 2026-02-27T20:21:39.973 | 2026-02-27T20:21:39.973 |
| fkie_cve-2026-27810 | calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books… | 2026-02-27T20:21:39.780 | 2026-02-27T20:21:39.780 |
| fkie_cve-2026-27793 | Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. Prior to … | 2026-02-27T20:21:39.587 | 2026-02-27T20:21:39.587 |
| fkie_cve-2026-27792 | Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. A missing… | 2026-02-27T20:21:39.403 | 2026-02-27T20:21:39.403 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2mr3-m5q5-wgp6 |
7.5 (3.1)
|
Fiber is Vulnerable to Denial of Service via Flash Cookie Unbounded Allocation | 2026-02-24T20:57:25Z | 2026-02-27T20:37:07Z |
| ghsa-jxq9-79vj-rgvw |
9.3 (3.1)
|
Statamic is vulnerable to account takeover via password reset link injection | 2026-02-24T21:09:23Z | 2026-02-27T20:36:21Z |
| ghsa-mrq8-rjmw-wpq3 |
6.9 (4.0)
|
Fiber has a Denial of Service Vulnerability via Route Parameter Overflow | 2026-02-24T21:04:07Z | 2026-02-27T20:33:49Z |
| ghsa-243v-98vx-264h |
6.9 (4.0)
|
Wasmtime can panic when adding excessive fields to a `wasi:http/types.fields` instance | 2026-02-24T21:08:06Z | 2026-02-27T20:25:44Z |
| ghsa-852m-cvvp-9p4w |
5.9 (4.0)
|
Wasmtime WASI implementations are vulnerable to guest-controlled resource exhaustion | 2026-02-24T20:47:08Z | 2026-02-27T20:25:10Z |
| ghsa-xjhv-v822-pf94 |
6.9 (4.0)
|
Wasmtime is vulnerable to panic when dropping a `[Typed]Func::call_async` future | 2026-02-24T20:44:46Z | 2026-02-27T20:24:27Z |
| ghsa-254q-rqmw-vx45 |
6.5 (3.1)
|
Missing Authorization in librenms/librenms | 2022-02-16T00:01:52Z | 2026-02-27T20:21:10Z |
| ghsa-qpv2-jxc7-3638 |
4.3 (3.1)
|
Exposure of Sensitive Information in snipe/snipe-it | 2022-02-15T00:02:47Z | 2026-02-27T20:20:07Z |
| ghsa-39ph-wr67-j4xq |
4.3 (3.1)
5.3 (4.0)
|
loguru logs sensitive information | 2022-01-26T00:01:50Z | 2026-02-27T20:17:55Z |
| ghsa-h9vc-2p9g-63gp |
6.4 (3.1)
|
Cross-site Scripting in pimcore | 2022-02-15T00:02:47Z | 2026-02-27T20:14:49Z |
| ghsa-p5hj-xxfr-pwc3 |
7.5 (3.1)
|
Code Injection in microweber | 2022-01-21T18:02:39Z | 2026-02-27T20:10:28Z |
| ghsa-pmqp-h87c-mr78 |
7.5 (3.1)
|
XML Entity Expansion and Improper Input Validation in Kubernetes API server | 2021-05-18T15:38:48Z | 2026-02-27T20:08:47Z |
| ghsa-m3c2-496v-cw3v |
8.7 (4.0)
|
Fiber has an Arbitrary File Read in Static Middleware on Windows | 2026-02-24T20:51:01Z | 2026-02-27T20:04:39Z |
| ghsa-qrvq-68c2-7grw |
5.9 (3.1)
|
nats-server websockets are vulnerable to pre-auth memory DoS | 2026-02-24T16:04:53Z | 2026-02-27T20:03:26Z |
| ghsa-5r3v-vc8m-m96g |
8.9 (4.0)
|
Caddy: Unicode case-folding length expansion causes incorrect split_path index in FastCGI transport | 2026-02-24T20:39:08Z | 2026-02-27T19:55:10Z |
| ghsa-879p-475x-rqh2 |
6.9 (4.0)
|
Caddy is vulnerable to cross-origin config application via local admin API /load | 2026-02-24T20:37:35Z | 2026-02-27T19:54:36Z |
| ghsa-x76f-jf84-rqj8 |
7.7 (4.0)
|
Caddy: MatchHost becomes case-sensitive for large host lists (>100), enabling host-based route/auth… | 2026-02-24T20:34:01Z | 2026-02-27T19:53:54Z |
| ghsa-g7pc-pc7g-h8jh |
7.7 (4.0)
|
Caddy: MatchPath %xx (escaped-path) branch skips case normalization, enabling path-based route/auth… | 2026-02-24T20:31:31Z | 2026-02-27T19:53:17Z |
| ghsa-hffm-g8v7-wrv7 |
8.8 (4.0)
|
Caddy: mTLS client authentication silently fails open when CA certificate file is missing or malformed | 2026-02-24T20:22:53Z | 2026-02-27T19:52:41Z |
| ghsa-4xrr-hq4w-6vf4 |
6.9 (4.0)
|
Caddy: Improper sanitization of glob characters in file matcher may lead to bypassing security prot… | 2026-02-24T20:16:55Z | 2026-02-27T19:51:57Z |
| ghsa-qmjj-p7m9-wjrv |
5.7 (4.0)
|
@actual-app/sync-server: Missing authorization in sync endpoints allows cross-user budget file acce… | 2026-02-27T19:29:46Z | 2026-02-27T19:29:46Z |
| ghsa-2x45-7fc3-mxwq |
6.5 (3.1)
2.7 (4.0)
|
php-jwt contains weak encryption | 2025-07-31T21:31:53Z | 2026-02-27T18:57:12Z |
| ghsa-86vq-ccwf-rm62 |
7.5 (3.1)
|
Umbraco.Engage.Forms Allows Unauthorized Access to Multiple API Endpoints | 2026-02-27T18:35:57Z | 2026-02-27T18:35:57Z |
| ghsa-prjf-86w9-mfqv |
6.1 (3.1)
7.0 (4.0)
|
Angular i18n vulnerable to Cross-Site Scripting | 2026-02-27T18:33:16Z | 2026-02-27T18:33:16Z |
| ghsa-xxc3-jv86-6hxx |
8.2 (3.1)
8.8 (4.0)
|
osCommerce 2.3.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to … | 2026-02-27T18:31:06Z | 2026-02-27T18:31:06Z |
| ghsa-xp4w-rp7m-jgwq |
5.9 (3.1)
8.2 (4.0)
|
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over… | 2026-02-27T18:31:06Z | 2026-02-27T18:31:06Z |
| ghsa-pr7p-x9q9-qph3 |
8.2 (3.1)
8.8 (4.0)
|
osCommerce 2.3.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to … | 2026-02-27T18:31:06Z | 2026-02-27T18:31:06Z |
| ghsa-p7f5-m66f-fmfw |
8.2 (3.1)
8.8 (4.0)
|
Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manip… | 2026-02-27T18:31:06Z | 2026-02-27T18:31:06Z |
| ghsa-jw6x-gh8v-8x7w |
8.2 (3.1)
8.8 (4.0)
|
Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manip… | 2026-02-27T18:31:06Z | 2026-02-27T18:31:06Z |
| ghsa-jq67-r98p-22qp |
6.5 (3.1)
6.9 (4.0)
|
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain an authentication bypass vulnera… | 2026-02-27T18:31:06Z | 2026-02-27T18:31:06Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-202 |
6.5 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:07+00:00 | 2025-01-19T16:22:59.212853+00:00 |
| pysec-2024-201 |
6.1 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:05+00:00 | 2025-01-19T16:22:59.154645+00:00 |
| pysec-2024-200 |
7.2 (3.1)
|
JupyterHub is software that allows one to create a multi-user server for Jupyter notebook… | jupyterhub | 2024-08-08T15:15:17+00:00 | 2025-01-19T16:22:58.171761+00:00 |
| pysec-2024-199 |
3.7 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T16:22:57.938459+00:00 |
| pysec-2024-198 |
4.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T16:22:57.845317+00:00 |
| pysec-2024-197 |
5.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.732726+00:00 |
| pysec-2024-196 |
8.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.640183+00:00 |
| pysec-2024-195 |
5.5 (3.1)
|
Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow… | apache-airflow | 2024-06-14T09:15:09+00:00 | 2025-01-19T16:22:56.419822+00:00 |
| pysec-2024-194 |
6.1 (3.1)
|
A clickjacking vulnerability exists in zenml-io/zenml versions up to and including 0.55.5… | zenml | 2024-06-06T19:15:54+00:00 | 2025-01-19T13:22:31.835293+00:00 |
| pysec-2024-193 |
3.3 (3.1)
|
An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to imp… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-19T13:22:31.701775+00:00 |
| pysec-2024-192 |
|
An issue was discovered in llama_index before 0.10.38. download/integration.py includes a… | llama-index | 2024-08-22T20:15:10+00:00 | 2025-01-19T13:22:29.175614+00:00 |
| pysec-2024-191 |
5.5 (3.1)
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2024-10-24T22:15:04+00:00 | 2025-01-19T10:22:29.812605+00:00 |
| pysec-2024-190 |
8.8 (3.1)
|
Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenti… | apache-airflow | 2024-07-17T08:15:02+00:00 | 2025-01-19T07:21:16.859034+00:00 |
| pysec-2024-189 |
5.4 (3.1)
|
Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated at… | apache-airflow | 2024-07-17T08:15:01+00:00 | 2025-01-19T07:21:16.796301+00:00 |
| pysec-2024-188 |
6.1 (3.1)
|
WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Lo… | webob | 2024-08-14T21:15:17+00:00 | 2025-01-19T04:23:01.908824+00:00 |
| pysec-2024-187 |
9.8 (3.1)
|
virtualenv before 20.26.6 allows command injection through the activation scripts for a v… | virtualenv | 2024-11-24T16:15:06+00:00 | 2025-01-19T04:23:01.784352+00:00 |
| pysec-2024-186 |
6.5 (3.1)
|
RestrictedPython is a restricted execution environment for Python to run untrusted code. … | restrictedpython | 2024-09-30T16:15:09+00:00 | 2025-01-19T04:23:01.259448+00:00 |
| pysec-2024-185 |
|
Nebari through 2024.4.1 prints the temporary Keycloak root password. | nebari | 2024-05-06T00:15:10+00:00 | 2025-01-19T04:23:00.951638+00:00 |
| pysec-2024-184 |
7.5 (3.1)
|
A local file inclusion vulnerability exists in the JSON component of gradio-app/gradio ve… | gradio | 2024-06-06T18:15:18+00:00 | 2025-01-19T04:23:00.017053+00:00 |
| pysec-2024-183 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-01-19T04:22:59.576907+00:00 |
| pysec-2024-182 |
|
Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive… | apache-airflow | 2024-11-15T09:15:14+00:00 | 2025-01-19T04:22:59.398988+00:00 |
| pysec-2024-181 |
6.1 (3.1)
|
Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of… | apache-airflow | 2024-08-21T16:15:08+00:00 | 2025-01-19T04:22:59.351008+00:00 |
| pysec-2024-180 |
5.4 (3.1)
|
Stored XSS in organizer and event settings of pretix up to 2024.7.0 allows malicious even… | pretix | 2024-08-23T15:15:17+00:00 | 2025-01-19T01:52:24.493530+00:00 |
| pysec-2024-179 |
4.8 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-03-18T22:15:07+00:00 | 2025-01-19T01:52:24.377662+00:00 |
| pysec-2024-178 |
7.5 (3.1)
|
Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to version 2… | litestar | 2024-11-20T21:15:08+00:00 | 2025-01-19T01:52:23.772726+00:00 |
| pysec-2024-177 |
9.8 (3.1)
|
Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach… | langflow | 2024-06-10T20:15:15+00:00 | 2025-01-19T01:52:23.722576+00:00 |
| pysec-2024-176 |
6.1 (3.1)
|
A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml ver… | zenml | 2024-06-30T16:15:03+00:00 | 2025-01-18T22:21:45.122426+00:00 |
| pysec-2024-175 |
|
WordOps through 3.20.0 has a wo/cli/plugins/stack_pref.py TOCTOU race condition because t… | wordops | 2024-05-06T00:15:10+00:00 | 2025-01-18T22:21:44.991242+00:00 |
| pysec-2024-174 |
4.3 (3.1)
|
Server-Side Request Forgery (SSRF) vulnerability in Apache StreamPipes during installatio… | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.678475+00:00 |
| pysec-2024-173 |
8.8 (3.1)
|
Unrestricted Upload of File with dangerous type vulnerability in Apache StreamPipes. Such… | streampipes | 2024-07-17T10:15:01+00:00 | 2025-01-18T22:21:43.618882+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33683 | Cross-Site Request Forgery (CSRF) vulnerability in WP Republic Hide Dashboard Notificatio… | 2024-04-27T05:02:18.438205Z |
| gsd-2024-33755 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.436135Z |
| gsd-2024-33687 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.432624Z |
| gsd-2024-33753 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.430763Z |
| gsd-2024-33756 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.430035Z |
| gsd-2024-33717 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.429699Z |
| gsd-2024-33724 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.429383Z |
| gsd-2024-33706 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.427436Z |
| gsd-2024-33787 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424661Z |
| gsd-2024-33799 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424348Z |
| gsd-2024-33813 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424031Z |
| gsd-2024-33735 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.410261Z |
| gsd-2024-33721 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.408369Z |
| gsd-2024-33695 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.407619Z |
| gsd-2024-33752 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.406190Z |
| gsd-2024-33692 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.404770Z |
| gsd-2024-33696 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:18.403548Z |
| gsd-2024-33761 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.399777Z |
| gsd-2024-33689 | Cross-Site Request Forgery (CSRF) vulnerability in Tony Zeoli, Tony Hayes Radio Station.T… | 2024-04-27T05:02:18.398121Z |
| gsd-2024-33730 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.396940Z |
| gsd-2024-33708 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.395735Z |
| gsd-2024-33830 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.395389Z |
| gsd-2024-33843 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393431Z |
| gsd-2024-33841 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393169Z |
| gsd-2024-33686 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.392053Z |
| gsd-2024-33816 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.388757Z |
| gsd-2024-33785 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.387543Z |
| gsd-2024-33703 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.386761Z |
| gsd-2024-33705 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.385891Z |
| gsd-2024-33824 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.385552Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-991 | Malicious code in vl-ui-breadcrumb (npm) | 2026-02-22T20:34:10Z | 2026-02-23T04:21:36Z |
| mal-2026-990 | Malicious code in vl-ui-body (npm) | 2026-02-22T20:34:10Z | 2026-02-23T04:21:36Z |
| mal-2026-989 | Malicious code in vl-ui-alert (npm) | 2026-02-22T19:59:59Z | 2026-02-23T04:21:36Z |
| mal-2026-988 | Malicious code in vl-ui-action-group (npm) | 2026-02-22T20:34:16Z | 2026-02-23T04:21:36Z |
| mal-2026-987 | Malicious code in vl-ui-accessibility (npm) | 2026-02-22T20:10:05Z | 2026-02-23T04:21:36Z |
| mal-2026-980 | Malicious code in the-storyverse (npm) | 2026-02-22T06:15:43Z | 2026-02-23T04:21:36Z |
| mal-2026-973 | Malicious code in veim (npm) | 2026-02-20T16:59:54Z | 2026-02-23T04:21:36Z |
| mal-2026-972 | Malicious code in uudi (npm) | 2026-02-20T16:59:55Z | 2026-02-23T04:21:36Z |
| mal-2026-971 | Malicious code in suport-color (npm) | 2026-02-20T16:56:11Z | 2026-02-23T04:21:36Z |
| mal-2026-945 | Malicious code in ui5-cap-event-app-server (npm) | 2026-02-18T19:20:54Z | 2026-02-23T04:21:36Z |
| mal-2026-929 | Malicious code in vds-monarch (npm) | 2026-02-17T15:55:37Z | 2026-02-23T04:21:36Z |
| mal-2026-918 | Malicious code in webpack-vite (npm) | 2026-02-16T15:03:26Z | 2026-02-23T04:21:36Z |
| mal-2026-892 | Malicious code in wropz-module (npm) | 2026-02-13T13:57:37Z | 2026-02-23T04:21:36Z |
| mal-2026-891 | Malicious code in wropz-6module (npm) | 2026-02-13T13:57:38Z | 2026-02-23T04:21:36Z |
| mal-2026-872 | Malicious code in stylelint-recommended (npm) | 2026-02-12T18:18:29Z | 2026-02-23T04:21:36Z |
| mal-2026-859 | Malicious code in systemtest-network (npm) | 2026-02-11T15:13:28Z | 2026-02-23T04:21:36Z |
| mal-2026-858 | Malicious code in systemtest-information (npm) | 2026-02-11T15:13:28Z | 2026-02-23T04:21:36Z |
| mal-2026-999 | Malicious code in react-dropzone-truffle (npm) | 2026-02-23T02:22:35Z | 2026-02-23T04:21:35Z |
| mal-2026-998 | Malicious code in rbxm-tools (npm) | 2026-02-23T02:14:37Z | 2026-02-23T04:21:35Z |
| mal-2026-976 | Malicious code in rollup-plugin-polyfill-swc (npm) | 2026-02-20T17:35:46Z | 2026-02-23T04:21:35Z |
| mal-2026-970 | Malicious code in secp256 (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:35Z |
| mal-2026-969 | Malicious code in scan-store (npm) | 2026-02-20T16:59:55Z | 2026-02-23T04:21:35Z |
| mal-2026-968 | Malicious code in rimarf (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:35Z |
| mal-2026-967 | Malicious code in parse-compat (npm) | 2026-02-20T16:59:56Z | 2026-02-23T04:21:35Z |
| mal-2026-966 | Malicious code in opencraw (npm) | 2026-02-20T16:56:11Z | 2026-02-23T04:21:35Z |
| mal-2026-944 | Malicious code in realestate-ask (npm) | 2026-02-17T10:30:44Z | 2026-02-23T04:21:35Z |
| mal-2026-896 | Malicious code in sinon-web3-chain (npm) | 2026-02-13T17:36:45Z | 2026-02-23T04:21:35Z |
| mal-2026-890 | Malicious code in responsible-ai (npm) | 2026-02-13T14:01:25Z | 2026-02-23T04:21:35Z |
| mal-2026-889 | Malicious code in responses-starter-app (npm) | 2026-02-13T14:01:24Z | 2026-02-23T04:21:35Z |
| mal-2026-888 | Malicious code in pyright-root (npm) | 2026-02-13T14:01:24Z | 2026-02-23T04:21:35Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1931 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-28T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1921 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-08-27T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1898 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-24T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1869 | Linux Kernel: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1862 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-08-18T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1858 | Linux Kernel: Mehrere Schwachstellen | 2025-08-17T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1810 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-08-12T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1757 | Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsmechanismen | 2025-08-11T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1754 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-10T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1753 | vim: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-10T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1679 | Linux Kernel: Schwachstelle ermöglicht Manipulation und Dos | 2025-07-29T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1665 | Linux Kernel: Mehrere Schwachstellen | 2025-07-28T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1620 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-07-21T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1613 | Linux Kernel: Mehrere Schwachstellen | 2025-07-20T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1596 | Linux Kernel: Schwachstelle ermöglicht Denial of Service und nicht spezifizierten Angriff | 2025-07-17T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1575 | vim (.tar and .zip): Mehrere Schwachstellen ermöglichen Codeausführung | 2025-07-15T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1522 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-09T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1502 | AMD Prozessor: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-07-08T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1501 | GNOME Remote Desktop: Schwachstelle ermöglicht Denial of Service | 2025-07-08T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1481 | Linux Kernel: Mehrere Schwachstellen | 2025-07-07T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1465 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-06T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1461 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-03T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1417 | Linux Kernel: Mehrere Schwachstellen | 2025-06-29T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1372 | Linux Kernel: Schwachstelle ermöglicht Manipulation von Daten und Denial of Service | 2025-06-22T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1350 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-17T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1270 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-09T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1245 | Django: Schwachstelle ermöglicht Manipulation von Dateien | 2025-06-04T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1204 | systemd-coredump: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-01T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1201 | Linux Kernel: Mehrere Schwachstellen | 2025-05-29T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1145 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-05-26T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0329 | Kwetsbaarheden verholpen in Oracle Commerce | 2025-10-23T07:20:51.213314Z | 2025-10-23T07:20:51.213314Z |
| ncsc-2025-0328 | Kwetsbaarheden verholpen in Oracle Database producten | 2025-10-23T07:19:57.652532Z | 2025-10-23T07:19:57.652532Z |
| ncsc-2025-0327 | Kwetsbaarheden verholpen in Zohocorp's ManageEngine | 2025-10-23T07:18:47.274781Z | 2025-10-23T07:18:47.274781Z |
| ncsc-2025-0326 | Kwetsbaarheden verholpen in Moxa’s netwerkbeveiligingsapparaten | 2025-10-20T13:03:34.436477Z | 2025-10-20T13:03:34.436477Z |
| ncsc-2025-0325 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-10-20T12:59:06.729067Z | 2025-10-20T12:59:06.729067Z |
| ncsc-2025-0241 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-08-06T12:11:46.234849Z | 2025-10-17T10:44:55.312550Z |
| ncsc-2025-0324 | Kwetsbaarheid verholpen in FortiOS | 2025-10-17T08:42:51.624827Z | 2025-10-17T08:42:51.624827Z |
| ncsc-2025-0296 | Kwetsbaarheid verholpen in WatchGuard Fireware OS | 2025-09-19T13:31:26.392203Z | 2025-10-17T08:19:28.145953Z |
| ncsc-2025-0323 | Kwetsbaarheden verholpen in SAP Producten | 2025-10-17T08:04:54.828451Z | 2025-10-17T08:04:54.828451Z |
| ncsc-2025-0322 | Kwetsbaarheden verholpen in Adobe Commerce | 2025-10-16T06:32:33.597617Z | 2025-10-16T06:32:33.597617Z |
| ncsc-2025-0321 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-10-16T06:27:14.019367Z | 2025-10-16T06:27:14.019367Z |
| ncsc-2025-0320 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-10-16T06:25:05.618348Z | 2025-10-16T06:25:05.618348Z |
| ncsc-2025-0319 | Kwetsbaarheden verholpen in F5 Networks BIG-IP, F5OS en NGINX App Protect WAF | 2025-10-15T15:21:14.871532Z | 2025-10-15T15:21:14.871532Z |
| ncsc-2025-0318 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-10-15T06:22:07.027110Z | 2025-10-15T06:22:07.027110Z |
| ncsc-2025-0317 | Kwetsbaarheden verholpen in Veeam Backup & Replication | 2025-10-15T06:13:55.126030Z | 2025-10-15T06:13:55.126030Z |
| ncsc-2025-0316 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-10-14T18:52:06.487996Z | 2025-10-14T18:52:06.487996Z |
| ncsc-2025-0315 | Kwetsbaarheden verholpen in Microsoft Office | 2025-10-14T18:38:05.692251Z | 2025-10-14T18:38:05.692251Z |
| ncsc-2025-0314 | Kwetsbaarheden verholpen in Microsoft System Center | 2025-10-14T18:27:56.075338Z | 2025-10-14T18:27:56.075338Z |
| ncsc-2025-0313 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-10-14T18:21:47.576457Z | 2025-10-14T18:21:47.576457Z |
| ncsc-2025-0312 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-10-14T18:16:12.274468Z | 2025-10-14T18:16:12.274468Z |
| ncsc-2025-0311 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-10-14T18:13:41.244373Z | 2025-10-14T18:13:41.244373Z |
| ncsc-2025-0309 | Kwetsbaarheden verholpen in Siemens producten | 2025-10-14T11:22:10.254089Z | 2025-10-14T11:22:10.254089Z |
| ncsc-2025-0308 | Kwetsbaarheden verholpen in Juniper Networks Junos Space | 2025-10-13T08:31:03.235596Z | 2025-10-13T08:31:03.235596Z |
| ncsc-2025-0307 | Kwetsbaarheid verholpen in Oracle E-Business Suite | 2025-10-13T07:52:22.500853Z | 2025-10-13T07:52:22.500853Z |
| ncsc-2025-0306 | Kwetsbaarheden verholpen in GitLab | 2025-10-13T07:25:32.225768Z | 2025-10-13T07:25:32.225768Z |
| ncsc-2025-0305 | Kwetsbaarheden verholpen in Juniper Networks Junos OS | 2025-10-13T07:17:00.445318Z | 2025-10-13T07:17:00.445318Z |
| ncsc-2025-0303 | Kwetsbaarheid verholpen in Oracle E-Business Suite | 2025-10-05T09:07:57.122302Z | 2025-10-08T13:03:30.836713Z |
| ncsc-2025-0304 | Kwetsbaarheden verholpen in Redis | 2025-10-08T11:43:37.331971Z | 2025-10-08T11:43:37.331971Z |
| ncsc-2025-0302 | Kwetsbaarheid verholpen in IBM InfoSphere | 2025-09-30T08:31:27.582962Z | 2025-09-30T08:31:27.582962Z |
| ncsc-2025-0301 | Kwetsbaarheden verholpen in VMware NSX | 2025-09-30T08:29:24.969885Z | 2025-09-30T08:29:24.969885Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-720392 | SSA-720392: Multiple Vulnerabilities in Third-Party Components in Location Intelligence Before V4.4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-716317 | SSA-716317: Multiple Vulnerability in SINEC Traffic Analyzer Before V2.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-659443 | SSA-659443: Local Code Execution Vulnerabilities in COMOS Before V10.5 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-640968 | SSA-640968: Untrusted Search Path Vulnerability in TIA Project-Server formerly known as TIA Multiuser Server | 2023-02-14T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-625850 | SSA-625850: Multiple WIBU Systems CodeMeter Vulnerabilities Affecting the Desigo CC Product Family and SENTRON powermanager | 2023-11-14T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-417547 | SSA-417547: Multiple Vulnerabilities in INTRALOG WMS Before V4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-407785 | SSA-407785: Multiple X_T File Parsing Vulnerabilities in Parasolid and Teamcenter Visualization | 2023-08-08T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-357412 | SSA-357412: PRT File Parsing Vulnerability in NX Before V2406.3000 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-180704 | SSA-180704: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.0 | 2023-12-12T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-116924 | SSA-116924: Path Traversal Vulnerability in TIA Portal | 2023-04-11T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-087301 | SSA-087301: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.1 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-068047 | SSA-068047: Multiple Vulnerabilities in SCALANCE M-800 Family Before V7.2.2 | 2023-12-12T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-071402 | SSA-071402: Multiple Vulnerabilities in SICAM Products | 2024-07-22T00:00:00Z | 2024-07-22T00:00:00Z |
| ssa-998949 | SSA-998949: Hard-coded Default Encryption Key in Mendix Encryption Module V10.0.0 and V10.0.1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-928781 | SSA-928781: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 HF1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-868282 | SSA-868282: Multiple Vulnerabilities in SINEMA Remote Connect Client before V3.2 HF1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-825651 | SSA-825651: Deserialization Vulnerability in SIMATIC STEP 7 (TIA Portal) before V18 Update 2 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-824889 | SSA-824889: XML File Parsing Vulnerabilities in JT Open and PLM XML SDK | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-780073 | SSA-780073: Denial of Service Vulnerability in PROFINET Devices via DCE-RPC Packets | 2020-02-11T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-779936 | SSA-779936: Catalog-Profile Deserialization Vulnerability in Siemens Engineering Platforms before V19 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-750274 | SSA-750274: Impact of CVE-2024-3400 on RUGGEDCOM APE1808 devices configured with Palo Alto Networks Virtual NGFW | 2024-04-19T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-484086 | SSA-484086: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.1 | 2022-06-14T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-473245 | SSA-473245: Denial of Service Vulnerability in Profinet Devices | 2019-10-08T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-381581 | SSA-381581: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 SP1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-346262 | SSA-346262: Denial of Service Vulnerability in SNMP Interface of Industrial Products | 2017-11-23T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-337522 | SSA-337522: Multiple Vulnerabilities in TIM 1531 IRC before V2.4.8 | 2024-06-11T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-313039 | SSA-313039: Deserialization Vulnerability in STEP 7 Safety before V19 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-160243 | SSA-160243: Multiple Vulnerabilities in SINEC NMS before V2.0 | 2023-10-10T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-064222 | SSA-064222: Multiple File Parsing Vulnerabilities in Simcenter Femap before V2406 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-900277 | SSA-900277: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0012 and V2024.0001 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:22030 | Red Hat Security Advisory: podman security update | 2025-11-25T08:02:25+00:00 | 2026-02-17T12:41:02+00:00 |
| rhsa-2025:22012 | Red Hat Security Advisory: buildah security update | 2025-11-25T05:03:24+00:00 | 2026-02-17T12:41:02+00:00 |
| rhsa-2025:22011 | Red Hat Security Advisory: buildah security update | 2025-11-25T05:23:44+00:00 | 2026-02-17T12:41:02+00:00 |
| rhsa-2025:21885 | Red Hat Security Advisory: OpenShift Compliance Operator bug fix and enhancement update | 2025-11-20T19:56:52+00:00 | 2026-02-17T12:41:01+00:00 |
| rhsa-2025:21824 | Red Hat Security Advisory: OpenShift Container Platform 4.16.53 bug fix and security update | 2025-11-27T11:08:51+00:00 | 2026-02-17T12:41:00+00:00 |
| rhsa-2025:21702 | Red Hat Security Advisory: podman security update | 2025-11-18T15:34:16+00:00 | 2026-02-17T12:40:58+00:00 |
| rhsa-2025:21634 | Red Hat Security Advisory: buildah security update | 2025-11-18T00:31:14+00:00 | 2026-02-17T12:40:58+00:00 |
| rhsa-2025:21633 | Red Hat Security Advisory: buildah security update | 2025-11-18T00:16:49+00:00 | 2026-02-17T12:40:57+00:00 |
| rhsa-2025:21368 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.18 security, enhancement & bug fix update | 2025-11-13T17:36:32+00:00 | 2026-02-17T12:40:56+00:00 |
| rhsa-2025:21328 | Red Hat Security Advisory: OpenShift Container Platform 4.14.59 packages and security update | 2025-11-20T07:57:21+00:00 | 2026-02-17T12:40:55+00:00 |
| rhsa-2025:21232 | Red Hat Security Advisory: container-tools:rhel8 security update | 2025-11-13T10:51:18+00:00 | 2026-02-17T12:40:55+00:00 |
| rhsa-2025:21220 | Red Hat Security Advisory: podman security update | 2025-11-13T09:10:41+00:00 | 2026-02-17T12:40:54+00:00 |
| rhsa-2025:20957 | Red Hat Security Advisory: runc security update | 2025-11-11T15:07:24+00:00 | 2026-02-17T12:40:54+00:00 |
| rhsa-2025:19961 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.12.6 security update | 2025-11-10T01:30:28+00:00 | 2026-02-17T12:40:53+00:00 |
| rhsa-2025:19958 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.7.7 security update | 2025-11-10T01:14:14+00:00 | 2026-02-17T12:40:52+00:00 |
| rhsa-2025:19927 | Red Hat Security Advisory: runc security update | 2025-11-07T18:11:41+00:00 | 2026-02-17T12:40:51+00:00 |
| rhsa-2025:19335 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.14.1 security update | 2025-10-30T12:58:23+00:00 | 2026-02-17T12:40:51+00:00 |
| rhsa-2025:19332 | Red Hat Security Advisory: multicluster engine for Kubernetes 2.9.1 security update | 2025-10-30T12:27:36+00:00 | 2026-02-17T12:40:49+00:00 |
| rhea-2026:0129 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.17.39 Images | 2026-01-06T11:25:38+00:00 | 2026-02-17T12:40:48+00:00 |
| rhea-2025:23478 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.18.25 Images | 2025-12-17T11:33:21+00:00 | 2026-02-17T12:40:46+00:00 |
| rhea-2025:23406 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.20.3 Images | 2025-12-16T21:20:03+00:00 | 2026-02-17T12:40:46+00:00 |
| rhsa-2026:2818 | Red Hat Security Advisory: pcs security update | 2026-02-17T12:24:53+00:00 | 2026-02-17T12:26:58+00:00 |
| rhsa-2026:2816 | Red Hat Security Advisory: pcs security update | 2026-02-17T12:26:26+00:00 | 2026-02-17T12:26:58+00:00 |
| rhsa-2026:2694 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2026-02-12T22:32:47+00:00 | 2026-02-17T12:26:57+00:00 |
| rhsa-2026:2462 | Red Hat Security Advisory: pcs security update | 2026-02-10T17:54:59+00:00 | 2026-02-17T12:26:57+00:00 |
| rhsa-2026:2484 | Red Hat Security Advisory: pcs security update | 2026-02-10T20:17:03+00:00 | 2026-02-17T12:26:55+00:00 |
| rhsa-2026:2469 | Red Hat Security Advisory: pcs security update | 2026-02-10T19:17:43+00:00 | 2026-02-17T12:26:55+00:00 |
| rhsa-2026:2465 | Red Hat Security Advisory: pcs security update | 2026-02-10T18:26:38+00:00 | 2026-02-17T12:26:54+00:00 |
| rhsa-2026:2452 | Red Hat Security Advisory: pcs security update | 2026-02-10T15:37:57+00:00 | 2026-02-17T12:26:53+00:00 |
| rhsa-2026:2438 | Red Hat Security Advisory: pcs security update | 2026-02-10T12:35:01+00:00 | 2026-02-17T12:26:52+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| va-25-343-01 | Windscribe for Linux 'changeMTU' local privilege escalation | 2025-12-10T16:46:41Z | 2025-12-10T16:46:41Z |
| icsa-25-343-01 | Universal Boot Loader (U-Boot) | 2025-12-09T07:00:00.000000Z | 2025-12-09T07:00:00.000000Z |
| icsa-26-015-12 | Siemens SIMATIC CN 4100 | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-26-015-11 | Siemens RUGGEDCOM ROX II | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-09 | Siemens Gridscale X Prepay | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-08 | Siemens Energy Services | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-07 | Siemens Building X - Security Manager Edge Controller | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-06 | Siemens SINEMA Remote Connect Server | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-05 | Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-04 | Siemens IAM Client | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-226-11 | Siemens SIMATIC S7-PLCSIM | 2025-08-12T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-226-03 | Siemens SIMATIC S7-PLCSIM | 2025-08-12T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-347-02 | Siemens Engineering Platforms | 2024-12-10T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-256-16 | Siemens Third-Party Component in SICAM and SITIPE Products | 2024-09-10T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-193-05 | Siemens SCALANCE, RUGGEDCOM | 2024-07-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-22-349-09 | Siemens OpenSSL 3.0 Affecting Products | 2022-12-13T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-338-07 | Advantech iView | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-06 | SolisCloud Monitoring Platform | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-05 | Sunbird DCIM dcTrack and Power IQ | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-04 | Johnson Controls iSTAR | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-03 | Johnson Controls OpenBlue Mobile Web Application for OpenBlue Workplace | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-02 | MAXHUB Pivot | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-01 | Mitsubishi Electric GX Works2 | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-219-02 | Johnson Controls FX Server, FX80 and FX90 (Update A) | 2025-08-07T06:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-148-03 | Consilium Safety CS5000 Fire Panel (Update A) | 2025-05-29T06:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsma-25-336-01 | Mirion Medical EC2 Software NMIS BioDose | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-336-02 | Iskra iHUB and iHUB Lite | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-336-01 | Industrial Video & Control Longwatch | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-23-157-02 | Mitsubishi Electric MELSEC iQ-R Series/iQ-F Series (Update C) | 2023-06-06T06:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-329-06 | SiRcom SMART Alert (SiSA) | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-webui-cmdinj-gvn3oknc | Cisco IOS XE Software Web-Based Management Interface Command Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-xss-xhn8m5jt | Cisco Catalyst SD-WAN Manager Stored Cross-Site Scripting Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-html-inj-gxvtk6zj | Cisco Catalyst SD-WAN Manager Reflected HTML Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-twamp-kv4fhugn | Cisco IOS, IOS XE, and IOS XR Software TWAMP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-snmpv3-qkeyvzsy | Cisco IOS and IOS XE Software SNMPv3 Configuration Restriction Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sisf-dos-zgwt4ddy | Multiple Cisco Products Switch Integrated Security Features DHCPv6 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sdwan-priviesc-wck7bmmt | Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-netconf-nacm-bypass-tgzv9pmq | Cisco IOS XE Software Model-Driven Programmability Authorization Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-multiprod-ikev2-dos-gpctuqv2 | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IKEv2 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ipsgacl-pg6qfzk | Cisco IOS Software on Cisco Catalyst 1000 and 2960L Switches Access Control List Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iox-dos-95fqnf7b | Cisco IOx Application Hosting Environment Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-privesc-su7scvdp | Cisco IOS XE Software Privilege Escalation Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-ikev1-dos-xhk3hzfc | Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-dhcpsn-dos-xbn8mtks | Cisco IOS XE Software DHCP Snooping Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ios-http-privesc-wcrd5e3 | Cisco IOS Software Industrial Ethernet Switch Device Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ewlc-user-del-hqxmpudj | Cisco IOS XE Wireless Controller Software Unauthorized User Deletion Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ewlc-cdp-dos-fpeks9k | Cisco IOS XE Wireless Controller Software Cisco Discovery Protocol Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-catc-insec-acc-mtt8eheb | Cisco Catalyst Center Insufficient Access Control Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-catalyst-tls-pqnd5kej | Cisco Catalyst SD-WAN Manager Certificate Validation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-c2960-3560-sboot-ztqadrhq | Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches Secure Boot Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-bootstrap-kfgxygdh | Cisco IOS XE Software Bootstrap Arbitrary File Write Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-asr903-rsp3-arp-dos-wmfzdvjz | Cisco IOS XE Software for Cisco ASR 903 Aggregation Services Routers ARP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webex-app-client-rce-ufymmylc | Cisco Webex App Client-Side Remote Code Execution Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-sna-prvesc-4bqmk33z | Cisco Secure Network Analytics Privilege Escalation Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-nd-unenum-2xffh472 | Cisco Nexus Dashboard LDAP Username Enumeration Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
| cisco-sa-nxos-image-sig-bypas-pqdrqvjl | Cisco NX-OS Software Image Verification Bypass Vulnerability | 2024-12-04T16:00:00+00:00 | 2025-04-07T16:43:32+00:00 |
| cisco-sa-cslu-7ghmzwmw | Cisco Smart Licensing Utility Vulnerabilities | 2024-09-04T16:00:00+00:00 | 2025-04-04T17:44:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-vnrpdvfb | Cisco Meraki MX and Z Series AnyConnect VPN Denial of Service Vulnerability | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-gsscpgy4 | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| cisco-sa-ece-dos-tc6m9gz8 | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2025-04-02T16:00:00+00:00 | 2025-04-02T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38400 | nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails. | 2025-07-02T00:00:00.000Z | 2026-02-24T14:41:01.000Z |
| msrc_cve-2025-39823 | KVM: x86: use array_index_nospec with indices that come from guest | 2025-09-02T00:00:00.000Z | 2026-02-24T14:40:54.000Z |
| msrc_cve-2025-38399 | scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() | 2025-07-02T00:00:00.000Z | 2026-02-24T14:40:54.000Z |
| msrc_cve-2025-38395 | regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods | 2025-07-02T00:00:00.000Z | 2026-02-24T14:40:47.000Z |
| msrc_cve-2025-39817 | efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare | 2025-09-02T00:00:00.000Z | 2026-02-24T14:40:45.000Z |
| msrc_cve-2025-38393 | NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN | 2025-07-02T00:00:00.000Z | 2026-02-24T14:40:39.000Z |
| msrc_cve-2025-39813 | ftrace: Fix potential warning in trace_printk_seq during ftrace_dump | 2025-09-02T00:00:00.000Z | 2026-02-24T14:40:38.000Z |
| msrc_cve-2025-38391 | usb: typec: altmodes/displayport: do not index invalid pin_assignments | 2025-07-02T00:00:00.000Z | 2026-02-24T14:40:32.000Z |
| msrc_cve-2025-39812 | sctp: initialize more fields in sctp_v6_from_sk() | 2025-09-02T00:00:00.000Z | 2026-02-24T14:40:30.000Z |
| msrc_cve-2025-38474 | usb: net: sierra: check for no status endpoint | 2025-07-02T00:00:00.000Z | 2026-02-24T14:40:25.000Z |
| msrc_cve-2025-39808 | HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() | 2025-09-02T00:00:00.000Z | 2026-02-24T14:40:23.000Z |
| msrc_cve-2025-38473 | Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb() | 2025-07-02T00:00:00.000Z | 2026-02-24T14:40:18.000Z |
| msrc_cve-2025-39806 | HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() | 2025-09-02T00:00:00.000Z | 2026-02-24T14:40:16.000Z |
| msrc_cve-2025-38470 | net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime | 2025-07-02T00:00:00.000Z | 2026-02-24T14:40:11.000Z |
| msrc_cve-2025-39798 | NFS: Fix the setting of capabilities when automounting a new filesystem | 2025-09-02T00:00:00.000Z | 2026-02-24T14:40:09.000Z |
| msrc_cve-2025-38468 | net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree | 2025-07-02T00:00:00.000Z | 2026-02-24T14:40:03.000Z |
| msrc_cve-2025-39795 | block: avoid possible overflow for chunk_sectors check in blk_stack_limits() | 2025-09-02T00:00:00.000Z | 2026-02-24T14:40:02.000Z |
| msrc_cve-2025-38466 | perf: Revert to requiring CAP_SYS_ADMIN for uprobes | 2025-07-02T00:00:00.000Z | 2026-02-24T14:39:56.000Z |
| msrc_cve-2025-39787 | soc: qcom: mdt_loader: Ensure we don't read past the ELF header | 2025-09-02T00:00:00.000Z | 2026-02-24T14:39:54.000Z |
| msrc_cve-2025-38465 | netlink: Fix wraparounds of sk->sk_rmem_alloc. | 2025-07-02T00:00:00.000Z | 2026-02-24T14:39:49.000Z |
| msrc_cve-2025-39783 | PCI: endpoint: Fix configfs group list head handling | 2025-09-02T00:00:00.000Z | 2026-02-24T14:39:47.000Z |
| msrc_cve-2025-38464 | tipc: Fix use-after-free in tipc_conn_close(). | 2025-07-02T00:00:00.000Z | 2026-02-24T14:39:42.000Z |
| msrc_cve-2025-39782 | jbd2: prevent softlockup in jbd2_log_do_checkpoint() | 2025-09-02T00:00:00.000Z | 2026-02-24T14:39:40.000Z |
| msrc_cve-2025-38462 | vsock: Fix transport_{g2h,h2g} TOCTOU | 2025-07-02T00:00:00.000Z | 2026-02-24T14:39:35.000Z |
| msrc_cve-2025-39776 | mm/debug_vm_pgtable: clear page table entries at destroy_args() | 2025-09-02T00:00:00.000Z | 2026-02-24T14:39:33.000Z |
| msrc_cve-2025-38461 | vsock: Fix transport_* TOCTOU | 2025-07-02T00:00:00.000Z | 2026-02-24T14:39:26.000Z |
| msrc_cve-2025-39773 | net: bridge: fix soft lockup in br_multicast_query_expired() | 2025-09-02T00:00:00.000Z | 2026-02-24T14:39:22.000Z |
| msrc_cve-2025-38460 | atm: clip: Fix potential null-ptr-deref in to_atmarpd(). | 2025-07-02T00:00:00.000Z | 2026-02-24T14:39:19.000Z |
| msrc_cve-2025-39772 | drm/hisilicon/hibmc: fix the hibmc loaded failed bug | 2025-09-02T00:00:00.000Z | 2026-02-24T14:39:14.000Z |
| msrc_cve-2025-38459 | atm: clip: Fix infinite recursive call of clip_push(). | 2025-07-02T00:00:00.000Z | 2026-02-24T14:39:12.000Z |
| ID | Description | Updated |
|---|---|---|
| var-200110-0429 | Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox … | 2025-12-22T23:19:47.551000Z |
| var-201011-0174 | ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute … | 2025-12-22T23:19:47.176000Z |
| var-202110-1685 | This issue was addressed with improved checks. This issue is fixed in Security Update 202… | 2025-12-22T23:18:55.560000Z |
| var-202203-0111 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2025-12-22T23:18:51.835000Z |
| var-201408-0090 | The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0… | 2025-12-22T23:18:49.546000Z |
| var-201202-0070 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:18:47.721000Z |
| var-200809-0193 | Time Machine in Apple Mac OS X 10.5 through 10.5.4 uses weak permissions for Time Machine… | 2025-12-22T23:18:47.206000Z |
| var-202010-0251 | In Network Security Services (NSS) before 3.46, several cryptographic primitives had miss… | 2025-12-22T23:18:05.511000Z |
| var-201302-0232 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:18:04.865000Z |
| var-200609-1208 | The FTP server in Apple Mac OS X 10.4.8 and earlier, when FTP Access is enabled, will cra… | 2025-12-22T23:18:04.731000Z |
| var-201006-1151 | The Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 5.0 on M… | 2025-12-22T23:18:03.663000Z |
| var-201304-0372 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:18:02.463000Z |
| var-201102-0097 | Google Chrome before 9.0.597.94 does not properly handle anonymous blocks, which allows r… | 2025-12-22T23:17:55.195000Z |
| var-201705-3788 | In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a ca… | 2025-12-22T23:17:48.852000Z |
| var-201203-0198 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2025-12-22T23:17:45.998000Z |
| var-201210-0270 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:16:35.049000Z |
| var-201912-0635 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T23:16:33.891000Z |
| var-201505-0233 | The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server bu… | 2025-12-22T23:16:33.731000Z |
| var-201505-0417 | The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allow… | 2025-12-22T23:15:31.867000Z |
| var-200608-0031 | Stack-based buffer overflow in bootpd in the DHCP component for Apple Mac OS X 10.3.9 and… | 2025-12-22T23:15:31.398000Z |
| var-201203-0193 | Google Chrome before 17.0.963.65 does not properly perform casts of unspecified variables… | 2025-12-22T23:15:23.357000Z |
| var-201211-0365 | Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on … | 2025-12-22T23:15:23.187000Z |
| var-201912-0640 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2025-12-22T23:15:23.116000Z |
| var-201404-0374 | Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 an… | 2025-12-22T23:15:22.006000Z |
| var-201904-1403 | The issue was addressed by removing origin information. This issue affected versions prio… | 2025-12-22T23:15:21.550000Z |
| var-200704-0214 | fsck, as used by the AirPort Disk feature of the AirPort Extreme Base Station with 802.11… | 2025-12-22T23:15:20.268000Z |
| var-201512-0008 | The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent at… | 2025-12-22T23:15:20.095000Z |
| var-201912-0552 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2025-12-22T23:15:19.763000Z |
| var-201504-0361 | The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x befor… | 2025-12-22T23:15:19.454000Z |
| var-202212-1751 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2025-12-22T23:15:17.574000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-009576 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-07-23T11:13+09:00 | 2025-07-23T11:13+09:00 |
| jvndb-2025-000050 | "region PAY" App for Android vulnerable to insertion of sensitive information into log file | 2025-07-22T13:33+09:00 | 2025-07-22T13:33+09:00 |
| jvndb-2025-009150 | Security updates for Trend Micro products (June 2025) | 2025-07-17T17:03+09:00 | 2025-07-17T17:03+09:00 |
| jvndb-2025-000030 | Reflected cross-site scripting vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2025-05-12T18:00+09:00 | 2025-07-17T10:06+09:00 |
| jvndb-2025-000049 | ZWX-2000CSW2-HN and ZWX-2000CS2-HN vulnerable to use of hard-coded credentials | 2025-07-16T13:54+09:00 | 2025-07-16T13:54+09:00 |
| jvndb-2025-008881 | Least Privilege Violation Vulnerability in the communications functions of NJ/NX series Machine Automation Controllers | 2025-07-15T15:54+09:00 | 2025-07-15T15:54+09:00 |
| jvndb-2025-008783 | Firebox T15 contains an issue with hidden functionality | 2025-07-14T17:22+09:00 | 2025-07-14T17:22+09:00 |
| jvndb-2025-008145 | Epson Web Installer for Mac vulnerable to missing authentication for critical function | 2025-07-08T14:08+09:00 | 2025-07-08T14:08+09:00 |
| jvndb-2025-008106 | Heap-based buffer overflow vulnerability in V-SFT and TELLUS | 2025-07-07T16:26+09:00 | 2025-07-07T16:26+09:00 |
| jvndb-2025-008105 | Windows shortcut following (.LNK) vulnerability in Trend Micro Security for Windows (CVE-2025-52521) | 2025-07-07T16:04+09:00 | 2025-07-07T16:04+09:00 |
| jvndb-2025-000047 | Multiple vulnerabilities in Nimesa Backup and Recovery | 2025-07-07T15:26+09:00 | 2025-07-07T15:26+09:00 |
| jvndb-2025-007978 | Multiple vulnerabilities in Trend Micro Password Manager for Windows (CVE-2025-48443, CVE-2025-52837) | 2025-07-04T13:28+09:00 | 2025-07-04T13:28+09:00 |
| jvndb-2025-000045 | Multiple vulnerabilities in Active! mail | 2025-07-02T14:13+09:00 | 2025-07-02T14:13+09:00 |
| jvndb-2025-007754 | Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) | 2025-07-02T11:31+09:00 | 2025-07-02T11:31+09:00 |
| jvndb-2025-007607 | Pass-Back Attack vulnerability in Konica Minorta bizhub series | 2025-07-01T14:09+09:00 | 2025-07-01T14:09+09:00 |
| jvndb-2025-007595 | Multiple vulnerabilities in Web Connection of Konica Minolta MFPs | 2025-07-01T14:02+09:00 | 2025-07-01T14:02+09:00 |
| jvndb-2025-000046 | SLNX Help Documentation of RICOH Streamline NX vulnerable to reflected cross-site scripting | 2025-06-30T15:45+09:00 | 2025-06-30T15:45+09:00 |
| jvndb-2025-007552 | Multiple vulnerabilities in TB-eye network recorders and AHD recorders | 2025-06-30T14:45+09:00 | 2025-06-30T14:45+09:00 |
| jvndb-2024-004595 | Multiple vulnerabilities in FutureNet NXR series, VXR series and WXR series | 2024-07-29T17:51+09:00 | 2025-06-30T09:56+09:00 |
| jvndb-2025-000043 | Multiple vulnerabilities in iroha Board | 2025-06-26T15:13+09:00 | 2025-06-26T15:13+09:00 |
| jvndb-2025-000042 | Inefficient regular expressions in GROWI | 2025-06-24T15:25+09:00 | 2025-06-24T15:25+09:00 |
| jvndb-2025-007390 | Trend Micro Internet Security and Trend Micro Maximum Security vulnerable to link following local privilege escalation (CVE-2025-49384, CVE-2025-49385) | 2025-06-24T11:18+09:00 | 2025-06-24T11:18+09:00 |
| jvndb-2025-000040 | KCM3100 vulnerable to authentication bypass using an alternate path or channel | 2025-06-18T13:42+09:00 | 2025-06-18T13:42+09:00 |
| jvndb-2025-000039 | Multiple vulnerabilities in RICOH Streamline NX PC Client | 2025-06-13T16:09+09:00 | 2025-06-13T16:09+09:00 |
| jvndb-2025-000038 | UpdateNavi vulnerable to improper restriction of communication channel to intended endpoints | 2025-06-12T15:56+09:00 | 2025-06-12T15:56+09:00 |
| jvndb-2025-000037 | Multiple surveillance cameras provided by i-PRO Co., Ltd. vulnerable to cross-site request forgery | 2025-06-06T13:56+09:00 | 2025-06-06T13:56+09:00 |
| jvndb-2025-000036 | TimeWorks vulnerable to path traversal | 2025-06-03T15:35+09:00 | 2025-06-03T15:35+09:00 |
| jvndb-2025-000035 | Improper file access permission settings in PC Time Tracer | 2025-06-03T14:40+09:00 | 2025-06-03T14:40+09:00 |
| jvndb-2025-000034 | Multiple vulnerabilities in wivia 5 | 2025-05-30T15:57+09:00 | 2025-05-30T15:57+09:00 |
| jvndb-2025-001238 | Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers | 2025-01-29T13:41+09:00 | 2025-05-27T16:06+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20179-1 | Security update for gpg2 | 2026-01-29T16:09:32Z | 2026-01-29T16:09:32Z |
| suse-su-2026:20176-1 | Security update for elemental-register, elemental-toolkit | 2026-01-29T15:32:26Z | 2026-01-29T15:32:26Z |
| suse-su-2026:0342-1 | Security update for java-25-openjdk | 2026-01-29T14:59:30Z | 2026-01-29T14:59:30Z |
| suse-su-2026:0341-1 | Security update for java-11-openjdk | 2026-01-29T14:58:19Z | 2026-01-29T14:58:19Z |
| suse-su-2026:20194-1 | Security update for postgresql17 and postgresql18 | 2026-01-29T13:17:41Z | 2026-01-29T13:17:41Z |
| suse-su-2026:20193-1 | Security update for postgresql16 | 2026-01-29T10:56:55Z | 2026-01-29T10:56:55Z |
| suse-su-2026:0338-1 | Security update for abseil-cpp | 2026-01-29T10:35:48Z | 2026-01-29T10:35:48Z |
| suse-su-2026:0337-1 | Security update for python | 2026-01-29T10:34:17Z | 2026-01-29T10:34:17Z |
| suse-su-2026:0336-1 | Security update for libxml2 | 2026-01-29T10:16:20Z | 2026-01-29T10:16:20Z |
| suse-su-2026:0335-1 | Security update for python-filelock | 2026-01-29T10:15:42Z | 2026-01-29T10:15:42Z |
| suse-su-2026:0334-1 | Security update for libxml2 | 2026-01-29T10:01:36Z | 2026-01-29T10:01:36Z |
| suse-su-2026:0333-1 | Security update for openssl-1_0_0 | 2026-01-29T08:16:22Z | 2026-01-29T08:16:22Z |
| suse-su-2026:0332-1 | Security update for openssl-1_0_0 | 2026-01-29T06:04:36Z | 2026-01-29T06:04:36Z |
| suse-su-2026:0331-1 | Security update for openssl-1_1 | 2026-01-28T17:13:03Z | 2026-01-28T17:13:03Z |
| suse-su-2026:20190-1 | Security update for java-21-openjdk | 2026-01-28T17:01:51Z | 2026-01-28T17:01:51Z |
| suse-su-2026:0330-1 | Security update for openjpeg2 | 2026-01-28T16:27:12Z | 2026-01-28T16:27:12Z |
| suse-su-2026:20189-1 | Security update for python-urllib3 | 2026-01-28T16:03:29Z | 2026-01-28T16:03:29Z |
| suse-su-2026:20188-1 | Security update for python-python-multipart | 2026-01-28T16:03:29Z | 2026-01-28T16:03:29Z |
| suse-su-2026:20175-1 | Security update for python-urllib3 | 2026-01-28T16:03:29Z | 2026-01-28T16:03:29Z |
| suse-su-2026:20203-1 | Security update for ucode-amd | 2026-01-28T16:01:59Z | 2026-01-28T16:01:59Z |
| suse-su-2026:20173-1 | Security update for ucode-amd | 2026-01-28T16:01:59Z | 2026-01-28T16:01:59Z |
| suse-su-2026:20187-1 | Security update for python-h2 | 2026-01-28T15:47:48Z | 2026-01-28T15:47:48Z |
| suse-su-2026:20186-1 | Security update for xkbcomp | 2026-01-28T15:47:14Z | 2026-01-28T15:47:14Z |
| suse-su-2026:0329-1 | Security update for xen | 2026-01-28T15:39:40Z | 2026-01-28T15:39:40Z |
| suse-su-2026:0328-1 | Security update for xen | 2026-01-28T15:39:28Z | 2026-01-28T15:39:28Z |
| suse-su-2026:0327-1 | Security update for alloy | 2026-01-28T15:38:58Z | 2026-01-28T15:38:58Z |
| suse-su-2026:0326-1 | Security update for helm | 2026-01-28T14:55:01Z | 2026-01-28T14:55:01Z |
| suse-su-2026:0325-1 | Security update for kubernetes | 2026-01-28T14:54:08Z | 2026-01-28T14:54:08Z |
| suse-su-2026:0320-1 | Security update for openjpeg2 | 2026-01-28T14:40:09Z | 2026-01-28T14:40:09Z |
| suse-su-2026:0319-1 | Security update for container-suseconnect | 2026-01-28T14:40:01Z | 2026-01-28T14:40:01Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10093-1 | java-21-openjdk-21.0.10.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10092-1 | java-17-openjdk-17.0.18.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10091-1 | java-11-openjdk-11.0.30.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10090-1 | google-osconfig-agent-20260119.00-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10089-1 | gio-branding-upstream-2.86.3-2.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10088-1 | cups-2.4.16-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:20099-1 | Security update for coredns | 2026-01-24T09:09:32Z | 2026-01-24T09:09:32Z |
| opensuse-su-2026:20103-1 | Security update for chromium | 2026-01-24T01:00:21Z | 2026-01-24T01:00:21Z |
| opensuse-su-2026:20097-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-01-23T16:43:58Z | 2026-01-23T16:43:58Z |
| opensuse-su-2026:20095-1 | Security update for python-jaraco.context | 2026-01-23T10:43:43Z | 2026-01-23T10:43:43Z |
| opensuse-su-2026:20105-1 | Security update for sbctl | 2026-01-23T10:02:42Z | 2026-01-23T10:02:42Z |
| opensuse-su-2026:10087-1 | tdom-0.9.6-1.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| opensuse-su-2026:10086-1 | openCryptoki-3.26.0-4.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| opensuse-su-2026:10085-1 | libxml2-16-2.14.5-2.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| opensuse-su-2026:10084-1 | chromedriver-144.0.7559.96-1.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| opensuse-su-2026:20091-1 | Security update for bind | 2026-01-22T16:45:35Z | 2026-01-22T16:45:35Z |
| opensuse-su-2026:20090-1 | Security update for busybox | 2026-01-22T16:45:35Z | 2026-01-22T16:45:35Z |
| opensuse-su-2026:20089-1 | Security update for python-pyasn1 | 2026-01-22T16:42:14Z | 2026-01-22T16:42:14Z |
| opensuse-su-2026:20088-1 | Security update for python-urllib3 | 2026-01-22T15:55:37Z | 2026-01-22T15:55:37Z |
| opensuse-su-2026:20086-1 | Security update for python-virtualenv | 2026-01-22T15:55:37Z | 2026-01-22T15:55:37Z |
| opensuse-su-2026:20087-1 | Security update for python-marshmallow | 2026-01-22T15:55:36Z | 2026-01-22T15:55:36Z |
| opensuse-su-2026:20085-1 | Security update for go1.25 | 2026-01-22T15:49:20Z | 2026-01-22T15:49:20Z |
| opensuse-su-2026:20084-1 | Security update for gdk-pixbuf | 2026-01-22T14:36:57Z | 2026-01-22T14:36:57Z |
| opensuse-su-2026:20083-1 | Security update for libpng16 | 2026-01-22T14:29:42Z | 2026-01-22T14:29:42Z |
| opensuse-su-2026:20082-1 | Security update for rabbitmq-server | 2026-01-22T13:47:27Z | 2026-01-22T13:47:27Z |
| opensuse-su-2026:20081-1 | Security update for python313 | 2026-01-22T13:47:27Z | 2026-01-22T13:47:27Z |
| opensuse-su-2026:20080-1 | Security update for buildah | 2026-01-22T13:00:13Z | 2026-01-22T13:00:13Z |
| opensuse-su-2026:20077-1 | Security update for go1.24 | 2026-01-22T12:53:33Z | 2026-01-22T12:53:33Z |
| opensuse-su-2026:20076-1 | Security update for libheif | 2026-01-22T11:00:42Z | 2026-01-22T11:00:42Z |
| opensuse-su-2026:20075-1 | Security update for libpcap | 2026-01-22T10:13:12Z | 2026-01-22T10:13:12Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2021-130-04 | homeLYnk (Wiser For KNX) and spaceLYnk | 2021-05-11T07:30:55.000Z | 2022-11-08T07:30:55.000Z |
| sevd-2022-284-04 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2022-10-11T10:45:15.000Z | 2022-10-14T10:45:15.000Z |
| sevd-2022-284-02 | EcoStruxure™ Panel Server Box (PAS900) | 2022-10-11T10:05:49.000Z | 2022-10-11T10:05:49.000Z |
| sevd-2022-284-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2022-10-11T09:48:46.000Z | 2022-10-11T09:48:46.000Z |
| sevd-2020-343-05 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and Associated Communication Modules | 2020-12-08T21:04:43.000Z | 2022-09-13T20:04:43.000Z |
| sevd-2020-343-07 | SNMP Service on Modicon M340 and Associated Communication Modules | 2020-12-08T05:49:51.000Z | 2022-09-13T05:49:51.000Z |
| sevd-2022-256-01 | EcoStruxure Machine SCADA Expert and Pro-face BLUE Open Studio | 2022-09-13T05:45:41.000Z | 2022-09-13T05:45:41.000Z |
| sesb-2019-214-01 | Wind River VxWorks Vulnerabilities (URGENT/11) | 2019-08-02T00:00:00.000Z | 2022-09-13T00:00:00.000Z |
| sevd-2022-193-01 | OPC UA and X80 advanced RTU Modicon Communication Modules | 2022-07-12T04:00:00.000Z | 2022-08-19T06:30:00.000Z |
| sesb-2021-347-01 | Apache Log4j Vulnerabilities (Log4Shell) | 2021-12-13T09:22:58.000Z | 2022-08-09T09:22:58.000Z |
| sevd-2022-221-03 | EcoStruxure™ Control Expert | 2022-08-09T09:14:27.000Z | 2022-08-09T09:14:27.000Z |
| sevd-2020-175-01 | Treck TCP/IP Vulnerabilities (Ripple20) | 2020-06-23T16:00:00.000Z | 2022-08-08T13:57:08.970Z |
| sevd-2022-193-03 | Acti9 PowerTag Link C | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-02 | SpaceLogic C-Bus Home Controller, formerly known as C-Bus Wiser Home Controller MK2 | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-257-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2021-09-14T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-222-02 | AT&T Labs Compressor (XMilI) and Decompressor (XDemill) used by EcoStruxureTM Control Expert, EcoStruxureTM Process Expert and SCADAPack RemoteConnect™ for x70 | 2021-08-01T07:25:51.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-04 | Easergy P5 | 2022-07-12T08:55:42.000Z | 2022-07-12T08:55:42.000Z |
| sevd-2022-102-01 | IGSS (Interactive Graphical SCADA System) | 2022-04-12T08:47:25.000Z | 2022-07-12T08:47:25.000Z |
| sevd-2022-067-02 | APC Smart-UPS SMT, SMC, SMX, SCL, SRC, XU, XP, CSH2, SURTD, SMTL, SRT, and select SRTL Series | 2022-03-08T06:30:00.000Z | 2022-06-16T18:30:00.000Z |
| sevd-2022-165-08 | EcoStruxure™ Cybersecurity Admin Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-07 | CanBRASS | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-06 | Schneider Electric C-Bus Home Automation Products | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-05 | EcoStruxure Power Commission | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-04 | Data Center Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-03 | Conext™ Combox | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-02 | Geo SCADA Mobile | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-067-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2022-03-08T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2021-012-02 | EcoStruxure Power Build - Rapsody | 2021-01-12T08:32:35.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-130-03 | Wiser Smart | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-02 | Saitel DP RTU | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-valkey-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:07:58.321Z | 2026-02-05T09:10:30.960Z |
| bit-redis-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:06:41.782Z | 2026-02-05T09:10:30.960Z |
| bit-keydb-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:00:41.031Z | 2026-02-05T09:10:30.960Z |
| bit-gitlab-2026-1751 | Missing Authorization in GitLab | 2026-02-05T09:09:05.467Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1312 | Potential SQL injection via QuerySet.order_by and FilteredRelation | 2026-02-05T08:38:43.002Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1287 | Potential SQL injection in column aliases via control characters | 2026-02-05T08:38:41.246Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1285 | Potential denial-of-service vulnerability in django.utils.text.Truncator HTML methods | 2026-02-05T08:38:39.228Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1207 | Potential SQL injection via raster lookups on PostGIS | 2026-02-05T08:38:37.158Z | 2026-02-05T09:10:30.960Z |
| bit-django-2025-14550 | Potential denial-of-service vulnerability via repeated headers when using ASGI | 2026-02-05T08:38:18.195Z | 2026-02-05T09:10:30.960Z |
| bit-django-2025-13473 | Username enumeration through timing difference in mod_wsgi authentication handler | 2026-02-05T08:38:16.508Z | 2026-02-05T09:10:30.960Z |
| bit-node-2025-55132 | 2026-01-26T14:47:53.358Z | 2026-02-04T10:19:33.233Z | |
| bit-node-2025-55130 | 2026-01-26T14:47:49.864Z | 2026-02-04T10:19:33.233Z | |
| bit-gitlab-2021-39935 | 2024-03-06T11:17:28.508Z | 2026-02-04T10:19:33.233Z | |
| bit-python-2007-4559 | 2026-02-03T16:04:06.884Z | 2026-02-03T16:04:06.884Z | |
| bit-mastodon-2026-23964 | Mastodon has insufficient access control to push notification settings | 2026-01-31T08:43:24.123Z | 2026-02-03T09:12:55.720Z |
| bit-mastodon-2026-23963 | Mastodon missing length limits on list names, filter names, and filter keywords | 2026-02-03T08:44:38.949Z | 2026-02-03T09:12:55.720Z |
| bit-mastodon-2026-23962 | Mastodon vulnerable to Denial of Service from a single post (client/server) | 2026-02-03T08:44:37.076Z | 2026-02-03T09:12:55.720Z |
| bit-mastodon-2026-23961 | Mastodon may allow a remote suspension bypass | 2026-02-03T08:44:35.033Z | 2026-02-03T09:12:55.720Z |
| bit-kyverno-2026-23881 | Kyverno Denial of Service via Context Variable Amplification in Policy Engine | 2026-02-03T08:42:39.101Z | 2026-02-03T09:12:55.720Z |
| bit-kyverno-2026-22039 | Kyverno Cross-Namespace Privilege Escalation via Policy apiCall | 2026-02-03T08:42:37.380Z | 2026-02-03T09:12:55.720Z |
| bit-golang-2025-61730 | Handshake messages may be processed at the incorrect encryption level in crypto/tls | 2026-01-31T08:43:36.684Z | 2026-02-03T09:12:55.720Z |
| bit-ghost-2026-24778 | Ghost vulnerable to XSS via malicious Portal preview links | 2026-02-03T08:40:51.583Z | 2026-02-03T09:12:55.720Z |
| bit-discourse-2026-24742 | Discourse staff action logs expose sensitive information to moderators | 2026-02-02T08:42:31.943Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2026-21865 | Discourse topic conversion permission vulnerability for moderators | 2026-02-02T08:42:28.354Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-69289 | Discourse has insecure default configuration that allows non-admin moderators to takeover any non-staff account via email change | 2026-02-02T08:42:26.675Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-69218 | Discourse moderators can access admin-only reports exposing private upload URLs | 2026-02-02T08:42:24.998Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68934 | Discourse Has Denial of Service (DoS) Vulnerability in Drafts Creation Endpoint | 2026-02-02T08:42:23.259Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68933 | Discourse non-admin moderators can exfiltrate private content via post ownership transfer | 2026-02-02T08:42:21.302Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68666 | Discourse users archives leaked to users with moderation privileges | 2026-02-02T08:42:19.452Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68662 | FinalDestination hostname matching allows SSRF protection bypass | 2026-02-02T08:42:17.844Z | 2026-02-02T09:12:04.887Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-rb28539 | Within HostnameError | 2026-01-30T14:43:52.571458Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qz70444 | Within HostnameError | 2026-01-30T17:24:26.605623Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qw16951 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:48:54.464404Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qv26039 | Within HostnameError | 2026-01-30T16:03:24.653963Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qm19832 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T16:13:25.141915Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qk01721 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:32:54.211133Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qj89068 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:34:54.378061Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qe58701 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:55.193625Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qd78411 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:36:25.408698Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pz62650 | Cancelling a query (e | 2026-01-30T16:41:55.453512Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-py88758 | Cancelling a query (e | 2026-01-30T15:02:53.130919Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-py85990 | tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing | 2026-01-30T14:07:50.722290Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pw33232 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:53.441606Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pw02676 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:35:26.383203Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pt11267 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:25.604414Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ps30901 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes | 2026-01-30T16:07:55.053827Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-po40318 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:31:53.772564Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk92575 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T14:35:52.456913Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk69606 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:08:25.435888Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk62208 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:20:55.127319Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ph90623 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:49:52.682724Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pg91940 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:31:24.365282Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pd99018 | Within HostnameError | 2026-01-30T14:02:50.913977Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pd17156 | Cancelling a query (e | 2026-01-30T15:00:22.872625Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pc16040 | Within HostnameError | 2026-01-30T15:37:23.991168Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pb78859 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T17:25:56.763674Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pa85871 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:42:24.099846Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-os18490 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T16:58:26.304466Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oo42606 | Cancelling a query (e | 2026-01-30T15:00:52.876848Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oo14630 | tar | 2026-01-30T14:47:23.043882Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2024-072 | 2024-12-11T07:44:40.000Z | 2025-02-20T20:08:00.000Z | |
| drupal-contrib-2024-071 | 2024-12-04T16:20:57.000Z | 2025-02-20T20:07:52.000Z | |
| drupal-contrib-2024-070 | 2024-12-04T15:51:12.000Z | 2025-02-20T20:07:46.000Z | |
| drupal-contrib-2024-069 | 2024-12-04T15:13:14.000Z | 2025-02-20T20:07:35.000Z | |
| drupal-contrib-2024-068 | 2024-12-04T14:46:03.000Z | 2025-02-20T20:07:26.000Z | |
| drupal-contrib-2024-067 | 2024-12-04T14:40:50.000Z | 2025-02-20T20:07:11.000Z | |
| drupal-contrib-2024-064 | 2024-11-27T16:41:51.000Z | 2025-02-20T20:06:49.000Z | |
| drupal-contrib-2024-062 | 2024-11-20T17:36:55.000Z | 2025-02-20T20:06:35.000Z | |
| drupal-contrib-2024-060 | 2024-11-13T17:37:36.000Z | 2025-02-20T20:06:18.000Z | |
| drupal-contrib-2024-059 | 2024-11-13T17:36:48.000Z | 2025-02-20T20:06:05.000Z | |
| drupal-contrib-2024-058 | 2024-11-06T16:28:56.000Z | 2025-02-20T20:05:57.000Z | |
| drupal-contrib-2024-056 | 2024-10-30T17:11:24.000Z | 2025-02-20T20:05:41.000Z | |
| drupal-contrib-2024-055 | 2024-10-30T17:07:09.000Z | 2025-02-20T20:05:30.000Z | |
| drupal-contrib-2024-052 | 2024-10-23T15:45:47.000Z | 2025-02-20T20:05:19.000Z | |
| drupal-contrib-2024-042 | 2024-10-02T16:15:59.000Z | 2025-02-20T19:27:15.000Z | |
| drupal-contrib-2024-043 | 2024-10-02T16:20:48.000Z | 2025-02-20T19:27:03.000Z | |
| drupal-contrib-2024-044 | 2024-10-02T16:27:12.000Z | 2025-02-20T19:26:51.000Z | |
| drupal-contrib-2024-045 | 2024-10-09T15:48:10.000Z | 2025-02-20T19:26:40.000Z | |
| drupal-contrib-2024-046 | 2024-10-09T15:48:11.000Z | 2025-02-20T19:26:30.000Z | |
| drupal-contrib-2024-047 | 2024-10-09T15:54:27.000Z | 2025-02-20T19:26:17.000Z | |
| drupal-contrib-2024-048 | 2024-10-09T15:56:35.000Z | 2025-02-20T19:26:05.000Z | |
| drupal-contrib-2024-049 | 2024-10-09T16:40:07.000Z | 2025-02-20T19:25:53.000Z | |
| drupal-contrib-2024-050 | 2024-10-23T12:09:48.000Z | 2025-02-20T19:25:41.000Z | |
| drupal-contrib-2024-033 | 2024-08-28T15:32:41.000Z | 2025-02-20T19:24:02.000Z | |
| drupal-contrib-2024-034 | 2024-09-04T15:35:55.000Z | 2025-02-20T19:23:44.000Z | |
| drupal-contrib-2024-035 | 2024-09-04T15:40:44.000Z | 2025-02-20T19:23:27.000Z | |
| drupal-contrib-2024-036 | 2024-09-04T15:42:05.000Z | 2025-02-20T19:23:09.000Z | |
| drupal-contrib-2024-037 | 2024-09-04T16:15:41.000Z | 2025-02-20T19:22:50.000Z | |
| drupal-contrib-2024-038 | 2024-09-04T16:20:17.000Z | 2025-02-20T19:22:30.000Z | |
| drupal-contrib-2024-039 | 2024-09-11T16:21:22.000Z | 2025-02-20T19:22:14.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-09791 | Apache Linkis授权问题漏洞 | 2026-01-30 | 2026-01-30 |
| cnvd-2026-09790 | Apache Airflow信息泄露漏洞 | 2026-01-30 | 2026-01-30 |
| cnvd-2026-09789 | Apache Hadoop HDFS越界写入漏洞 | 2026-01-30 | 2026-01-30 |
| cnvd-2026-08344 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08344) | 2025-10-15 | 2026-01-30 |
| cnvd-2026-08340 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08340) | 2025-10-15 | 2026-01-30 |
| cnvd-2026-08339 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08339) | 2025-10-15 | 2026-01-30 |
| cnvd-2026-08338 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08338) | 2025-10-15 | 2026-01-30 |
| cnvd-2026-08337 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08337) | 2025-10-15 | 2026-01-30 |
| cnvd-2026-08336 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08336) | 2025-10-15 | 2026-01-30 |
| cnvd-2026-08335 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08335) | 2025-10-15 | 2026-01-30 |
| cnvd-2026-08334 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08334) | 2025-10-15 | 2026-01-30 |
| cnvd-2026-08333 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08333) | 2025-10-15 | 2026-01-30 |
| cnvd-2026-08332 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08332) | 2025-10-15 | 2026-01-30 |
| cnvd-2026-08331 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08331) | 2025-10-15 | 2026-01-30 |
| cnvd-2026-08330 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08330) | 2025-10-15 | 2026-01-30 |
| cnvd-2026-08329 | Juniper Networks Junos Space跨站脚本漏洞(CNVD-2026-08329) | 2025-10-15 | 2026-01-30 |
| cnvd-2026-08359 | Google Android拒绝服务漏洞(CNVD-2026-08359) | 2025-09-04 | 2026-01-29 |
| cnvd-2026-08358 | Google Android权限提升漏洞(CNVD-2026-08358) | 2025-09-04 | 2026-01-29 |
| cnvd-2026-08357 | Google Android信息泄露漏洞(CNVD-2026-08357) | 2025-09-04 | 2026-01-29 |
| cnvd-2026-08356 | Google Android权限提升漏洞(CNVD-2026-08356) | 2025-09-04 | 2026-01-29 |
| cnvd-2026-08355 | Google Android权限提升漏洞(CNVD-2026-08355) | 2025-09-04 | 2026-01-29 |
| cnvd-2026-08354 | Google Android信息泄露漏洞(CNVD-2026-08354) | 2025-09-04 | 2026-01-29 |
| cnvd-2026-08353 | Google Android权限提升漏洞(CNVD-2026-08353) | 2025-09-04 | 2026-01-29 |
| cnvd-2026-08352 | Google Android权限提升漏洞(CNVD-2026-08352) | 2025-09-04 | 2026-01-29 |
| cnvd-2026-08351 | Google Android信息泄露漏洞(CNVD-2026-08351) | 2025-09-08 | 2026-01-29 |
| cnvd-2026-08350 | Google Android权限提升漏洞(CNVD-2026-08350) | 2025-09-08 | 2026-01-29 |
| cnvd-2026-08349 | Google Android权限提升漏洞(CNVD-2026-08349) | 2025-09-08 | 2026-01-29 |
| cnvd-2026-08348 | Google Android权限提升漏洞(CNVD-2026-08348) | 2025-09-08 | 2026-01-29 |
| cnvd-2026-08347 | Google Android权限提升漏洞(CNVD-2026-08347) | 2025-09-08 | 2026-01-29 |
| cnvd-2026-08346 | Google Android权限提升漏洞(CNVD-2026-08346) | 2025-09-08 | 2026-01-29 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0081 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2026-avi-0080 | Vulnérabilité dans Broadcom Web Security Services Agent | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2025-avi-0970 | Multiples vulnérabilités dans Synacor Zimbra Collaboration | 2025-11-06T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2026-avi-0079 | Vulnérabilité dans Python | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0078 | Vulnérabilité dans Ceph | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0077 | Multiples vulnérabilités dans les produits Symantec | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0076 | Vulnérabilité dans les produits Cisco | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0075 | Multiples vulnérabilités dans GitLab | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0074 | Multiples vulnérabilités dans Oracle Weblogic | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0073 | Multiples vulnérabilités dans Oracle Virtualization | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0072 | Multiples vulnérabilités dans Oracle Systems | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0071 | Multiples vulnérabilités dans Oracle PeopleSoft | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0070 | Multiples vulnérabilités dans Oracle MySQL | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0069 | Multiples vulnérabilités dans Oracle Java SE | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0068 | Multiples vulnérabilités dans Oracle Database Server | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0067 | Multiples vulnérabilités dans Python | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0066 | Vulnérabilité dans Google Chrome | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0065 | Multiples vulnérabilités dans les produits Atlassian | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0064 | Vulnérabilité Microsoft Power Apps | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| certfr-2026-avi-0063 | Multiples vulnérabilités dans Microsoft Edge | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| certfr-2026-avi-0062 | Vulnérabilité dans Mattermost Desktop App | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| certfr-2026-avi-0061 | Multiples vulnérabilités dans les produits IBM | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0060 | Vulnérabilité dans Apache Struts | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0059 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0058 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0057 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0056 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0055 | Multiples vulnérabilités dans GLPI | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0054 | Multiples vulnérabilités dans Centreon Infra Monitoring | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0053 | Vulnérabilité dans Traefik | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2017-ale-007 | Vulnérabilité dans Microsoft Office | 2017-04-10T00:00:00.000000 | 2017-04-12T00:00:00.000000 |
| certfr-2017-ale-006 | Multiples vulnérabilités dans SCADA Siemens RUGGEDCOM ROX I | 2017-03-29T00:00:00.000000 | 2017-03-29T00:00:00.000000 |
| certfr-2017-ale-003 | Vulnérabilité dans les navigateurs Microsoft | 2017-02-27T00:00:00.000000 | 2017-03-15T00:00:00.000000 |
| certfr-2017-ale-002 | Vulnérabilité dans Microsoft Windows | 2017-02-20T00:00:00.000000 | 2017-03-15T00:00:00.000000 |
| certfr-2017-ale-001 | Vulnérabilité dans Cisco WebEx | 2017-01-25T00:00:00.000000 | 2017-01-31T00:00:00.000000 |
| certfr-2016-ale-009 | Campagne d'attaque contre des routeurs DSL | 2016-12-01T00:00:00.000000 | 2017-01-26T00:00:00.000000 |
| certfr-2016-ale-010 | Vulnérabilité dans les routeurs Netgear | 2016-12-13T00:00:00.000000 | 2016-12-26T00:00:00.000000 |
| certfr-2016-ale-006 | Campagne de messages électroniques non sollicités de type Zepto/Odin | 2016-09-05T00:00:00.000000 | 2016-11-17T00:00:00.000000 |
| certfr-2016-ale-008 | Vulnérabilité dans Microsoft Windows | 2016-11-02T00:00:00.000000 | 2016-11-09T00:00:00.000000 |
| certfr-2016-ale-007 | Vulnérabilité dans Cisco IOS, IOS XE et IOS XR | 2016-09-19T00:00:00.000000 | 2016-09-19T00:00:00.000000 |
| certfr-2016-ale-005 | Multiples vulnérabilités dans les pare-feux Cisco | 2016-08-18T00:00:00.000000 | 2016-09-05T00:00:00.000000 |
| certfr-2015-ale-013 | Vulnérabilité dans Joomla! | 2015-12-14T00:00:00.000000 | 2016-08-01T00:00:00.000000 |
| certfr-2016-ale-004 | Vulnérabilité dans Adobe Flash Player | 2016-06-15T00:00:00.000000 | 2016-06-16T00:00:00.000000 |
| certfr-2016-ale-003 | Vulnérabilité dans Adobe Flash Player | 2016-05-11T00:00:00.000000 | 2016-05-12T00:00:00.000000 |
| certfr-2015-ale-014 | Vulnérabilité dans Juniper ScreenOS | 2015-12-18T00:00:00.000000 | 2016-04-11T00:00:00.000000 |
| certfr-2016-ale-002 | Vulnérabilité dans Adobe Flash Player | 2016-04-06T00:00:00.000000 | 2016-04-08T00:00:00.000000 |
| certfr-2016-ale-001 | Campagne de messages électroniques non sollicités de type Locky | 2016-02-19T00:00:00.000000 | 2016-04-07T00:00:00.000000 |
| certfr-2015-ale-015 | Campagne de messages électroniques non sollicités de type TeslaCrypt | 2015-12-21T00:00:00.000000 | 2016-03-10T00:00:00.000000 |
| certfr-2015-ale-009 | Vulnérabilité dans Apple Mac OS X | 2015-07-24T00:00:00.000000 | 2015-12-22T00:00:00.000000 |
| certfr-2015-ale-012 | Campagne de messages électroniques non sollicités de type Dridex | 2015-10-23T00:00:00.000000 | 2015-11-26T00:00:00.000000 |
| certfr-2015-ale-011 | Vulnérabilité dans Adobe Flash Player | 2015-10-14T00:00:00.000000 | 2015-10-19T00:00:00.000000 |
| certfr-2015-ale-010 | Multiples vulnérabilités dans Google Android | 2015-07-28T00:00:00.000000 | 2015-10-06T00:00:00.000000 |
| certfr-2015-ale-008 | Vulnérabilité dans le pilote de gestion des polices de caractères de Microsoft Windows | 2015-07-20T00:00:00.000000 | 2015-07-30T00:00:00.000000 |
| certfr-2015-ale-007 | Vulnérabilité dans Oracle Java SE | 2015-07-13T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| certfr-2015-ale-006 | Vulnérabilité dans Adobe Flash Player | 2015-07-11T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| certfr-2015-ale-005 | Vulnérabilité dans Adobe Flash Player | 2015-07-08T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| certfr-2015-ale-003 | Nouvelle campagne d'hameçonnage de type rançongiciel | 2015-02-05T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| certfr-2015-ale-004 | Vulnérabilité dans Microsoft Internet Explorer | 2015-02-10T00:00:00.000000 | 2015-03-31T00:00:00.000000 |
| certfr-2015-ale-002 | Vulnérabilité dans Adobe Flash Player | 2015-02-02T00:00:00.000000 | 2015-02-05T00:00:00.000000 |
| certfr-2015-ale-001 | Vulnérabilité dans Adobe Flash Player | 2015-01-22T00:00:00.000000 | 2015-01-30T00:00:00.000000 |