Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-28279 |
7.4 (3.1)
|
`osctrl-admin` Vulnerable to OS Command Injection via … |
jmpsec |
osctrl |
2026-02-26T22:59:29.972Z | 2026-02-27T17:33:49.803Z |
| CVE-2026-28276 |
7.5 (3.1)
|
Initiative Allows Unauthenticated Access to Uploaded D… |
Morelitea |
initiative |
2026-02-26T22:57:36.406Z | 2026-02-27T17:40:15.760Z |
| CVE-2026-28275 |
8.1 (3.1)
|
Initiative Vulnerable to Improper Session Invalidation… |
Morelitea |
initiative |
2026-02-26T22:56:07.815Z | 2026-02-27T17:44:23.728Z |
| CVE-2026-28274 |
8.7 (3.1)
|
Initiative Vulnerable to Token Theft via Stored XSS in… |
Morelitea |
initiative |
2026-02-26T22:55:01.751Z | 2026-02-27T17:48:34.045Z |
| CVE-2026-28269 |
5.9 (3.1)
|
Kiteworks Core has an OS Command Injection |
kiteworks |
security-advisories |
2026-02-26T22:52:26.688Z | 2026-02-27T17:53:05.993Z |
| CVE-2026-28230 |
5.7 (4.0)
|
In SteVe, any authenticated charger can terminate any … |
steve-community |
steve |
2026-02-26T22:49:33.613Z | 2026-02-27T18:17:19.675Z |
| CVE-2026-28226 |
6.5 (3.1)
|
Phishing Club has Authenticated Blind SQL Injection in… |
phishingclub |
phishingclub |
2026-02-26T22:43:05.629Z | 2026-02-27T18:18:06.714Z |
| CVE-2026-28225 |
5.3 (3.1)
|
Manyfold has IDOR in ModelFilesController |
manyfold3d |
manyfold |
2026-02-26T22:40:17.996Z | 2026-02-27T18:33:16.833Z |
| CVE-2026-28217 |
6.5 (3.1)
|
IDOR in GraphQL userCollection Query Exposes Other Use… |
hoppscotch |
hoppscotch |
2026-02-26T22:38:33.854Z | 2026-02-27T18:42:07.857Z |
| CVE-2026-28216 |
8.3 (3.1)
|
hoppscotch has IDOR in updateUserEnvironment / deleteU… |
hoppscotch |
hoppscotch |
2026-02-26T22:36:50.539Z | 2026-02-27T18:43:16.218Z |
| CVE-2026-28215 |
9.1 (3.1)
|
hoppscotch Vulnerable to Unauthenticated Onboarding Co… |
hoppscotch |
hoppscotch |
2026-02-26T22:34:46.524Z | 2026-02-26T22:34:46.524Z |
| CVE-2026-3265 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
go2ismail Free-CRM Security API improper authorization |
go2ismail |
Free-CRM |
2026-02-26T22:32:08.486Z | 2026-02-27T18:49:54.918Z |
| CVE-2026-28213 |
9.8 (3.1)
|
EverShop Vulnerable to Arbitrary Customer Account Take… |
evershopcommerce |
evershop |
2026-02-26T22:31:47.122Z | 2026-02-27T18:51:10.647Z |
| CVE-2026-28211 |
7.8 (3.1)
|
Arbitrary code execution in log reader via untrusted l… |
CyrilleB79 |
NVDA-Dev-Test-Toolbox |
2026-02-26T22:29:36.164Z | 2026-02-27T18:52:30.864Z |
| CVE-2026-28208 |
5.9 (3.1)
|
Junrar has arbitrary file write due to backslash path … |
junrar |
junrar |
2026-02-26T22:20:03.765Z | 2026-02-26T22:20:03.765Z |
| CVE-2026-28207 |
6.6 (3.1)
|
Zen-C Vulnerable to Command Injection via Malicious Ou… |
z-libs |
Zen-C |
2026-02-26T22:17:58.898Z | 2026-02-27T16:57:44.054Z |
| CVE-2026-27638 |
5.7 (4.0)
|
ActualBudget missing authorization in sync endpoints a… |
actualbudget |
actual |
2026-02-26T22:14:21.481Z | 2026-02-26T22:14:21.481Z |
| CVE-2026-27839 |
4.3 (3.1)
|
wger: IDOR in nutritional_values endpoints exposes pri… |
wger-project |
wger |
2026-02-26T22:07:43.640Z | 2026-02-26T22:07:43.640Z |
| CVE-2026-27838 |
3.1 (3.1)
|
wger: IDOR via user-unscoped cache keys on routine API… |
wger-project |
wger |
2026-02-26T22:04:57.968Z | 2026-02-26T22:04:57.968Z |
| CVE-2026-3264 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
go2ismail Free-CRM Administrative redirect |
go2ismail |
Free-CRM |
2026-02-26T22:02:07.996Z | 2026-02-27T20:02:33.352Z |
| CVE-2026-27835 |
4.3 (3.1)
|
wger: IDOR in RepetitionsConfig and MaxRepetitionsConf… |
wger-project |
wger |
2026-02-26T22:00:23.768Z | 2026-02-26T22:00:23.768Z |
| CVE-2026-27457 |
4.3 (3.1)
|
Weblate: Missing access control for the AddonViewSet A… |
WeblateOrg |
weblate |
2026-02-26T21:56:03.220Z | 2026-02-26T21:56:03.220Z |
| CVE-2026-27449 |
7.5 (3.1)
|
Umbraco.Engage.Forms Allows Unauthorized Access to Mul… |
umbraco |
Umbraco.Engage.Forms |
2026-02-26T21:51:14.512Z | 2026-02-26T21:51:14.512Z |
| CVE-2026-25741 |
7.1 (3.1)
|
Zulip Vulnerable to Modification of Payment Method (St… |
zulip |
zulip |
2026-02-26T21:44:34.398Z | 2026-02-26T21:44:34.398Z |
| CVE-2026-3263 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
go2ismail Asp.Net-Core-Inventory-Order-Management-Syst… |
go2ismail |
Asp.Net-Core-Inventory-Order-Management-System |
2026-02-26T21:32:08.766Z | 2026-02-26T21:32:08.766Z |
| CVE-2026-28227 |
1.2 (4.0)
|
Discourse Vulnerable to Unauthorized Topic Creation in… |
discourse |
discourse |
2026-02-26T21:27:38.926Z | 2026-02-26T21:27:38.926Z |
| CVE-2026-28219 |
1.3 (4.0)
|
Privilege Escalation via Mass Assignment Allows Regula… |
discourse |
discourse |
2026-02-26T21:25:36.635Z | 2026-02-26T21:25:36.635Z |
| CVE-2026-28218 |
5.3 (4.0)
|
Discourse's Fail-Open Access Control in Data Explorer … |
discourse |
discourse |
2026-02-26T21:23:32.354Z | 2026-02-26T21:23:32.354Z |
| CVE-2026-27154 |
1.3 (4.0)
|
Discourse has XSS when editing a malicious post |
discourse |
discourse |
2026-02-26T21:20:25.181Z | 2026-02-26T21:20:25.181Z |
| CVE-2026-27153 |
1.3 (4.0)
|
Discourse doesn't prevent moderators from exporting us… |
discourse |
discourse |
2026-02-26T21:16:41.077Z | 2026-02-26T21:18:26.613Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-22890 |
6.5 (3.1)
|
EV2GO ev2go.io Insufficiently Protected Credentials |
EV2GO |
ev2go.io |
2026-02-26T23:50:56.274Z | 2026-02-26T23:50:56.274Z |
| CVE-2026-20895 |
7.3 (3.1)
|
EV2GO ev2go.io Insufficient Session Expiration |
EV2GO |
ev2go.io |
2026-02-26T23:48:03.827Z | 2026-02-26T23:51:53.584Z |
| CVE-2026-20792 |
7.5 (3.1)
|
Chargemap chargemap.com Improper Restriction of Excess… |
Chargemap |
chargemap.com |
2026-02-26T23:06:29.969Z | 2026-02-26T23:06:29.969Z |
| CVE-2026-20791 |
6.5 (3.1)
|
Chargemap chargemap.com Insufficiently Protected Credentials |
Chargemap |
chargemap.com |
2026-02-26T23:10:16.841Z | 2026-02-26T23:10:16.841Z |
| CVE-2026-20781 |
9.4 (3.1)
|
CloudCharge cloudcharge.se Missing Authentication for … |
CloudCharge |
cloudcharge.se |
2026-02-26T23:24:00.964Z | 2026-02-26T23:24:00.964Z |
| CVE-2026-20733 |
6.5 (3.1)
|
CloudCharge cloudcharge.se Insufficiently Protected Cr… |
CloudCharge |
cloudcharge.se |
2026-02-26T23:38:02.525Z | 2026-02-26T23:38:02.525Z |
| CVE-2026-1585 |
8.4 (4.0)
6.7 (3.1)
|
An unquoted Windows service executable path vulne… |
Canon Inc. |
IJ Scan Utility |
2026-02-26T23:39:13.778Z | 2026-02-27T16:38:57.696Z |
| CVE-2025-40932 |
8.2 (3.1)
|
Apache::SessionX versions through 2.01 for Perl create… |
GRICHTER |
Apache::SessionX |
2026-02-26T23:33:37.083Z | 2026-02-27T18:41:24.407Z |
| CVE-2026-3268 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
psi-probe PSI Probe Session Attribute RemoveSessAttrib… |
psi-probe |
PSI Probe |
2026-02-26T23:02:08.067Z | 2026-02-27T17:27:38.521Z |
| CVE-2026-3265 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
go2ismail Free-CRM Security API improper authorization |
go2ismail |
Free-CRM |
2026-02-26T22:32:08.486Z | 2026-02-27T18:49:54.918Z |
| CVE-2026-3264 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
go2ismail Free-CRM Administrative redirect |
go2ismail |
Free-CRM |
2026-02-26T22:02:07.996Z | 2026-02-27T20:02:33.352Z |
| CVE-2026-28280 |
6.1 (3.1)
|
`osctrl-admin` has Stored Cross-Site Scripting (XSS) i… |
jmpsec |
osctrl |
2026-02-26T23:00:58.040Z | 2026-02-26T23:00:58.040Z |
| CVE-2026-28279 |
7.4 (3.1)
|
`osctrl-admin` Vulnerable to OS Command Injection via … |
jmpsec |
osctrl |
2026-02-26T22:59:29.972Z | 2026-02-27T17:33:49.803Z |
| CVE-2026-28276 |
7.5 (3.1)
|
Initiative Allows Unauthenticated Access to Uploaded D… |
Morelitea |
initiative |
2026-02-26T22:57:36.406Z | 2026-02-27T17:40:15.760Z |
| CVE-2026-28275 |
8.1 (3.1)
|
Initiative Vulnerable to Improper Session Invalidation… |
Morelitea |
initiative |
2026-02-26T22:56:07.815Z | 2026-02-27T17:44:23.728Z |
| CVE-2026-28274 |
8.7 (3.1)
|
Initiative Vulnerable to Token Theft via Stored XSS in… |
Morelitea |
initiative |
2026-02-26T22:55:01.751Z | 2026-02-27T17:48:34.045Z |
| CVE-2026-28269 |
5.9 (3.1)
|
Kiteworks Core has an OS Command Injection |
kiteworks |
security-advisories |
2026-02-26T22:52:26.688Z | 2026-02-27T17:53:05.993Z |
| CVE-2026-28230 |
5.7 (4.0)
|
In SteVe, any authenticated charger can terminate any … |
steve-community |
steve |
2026-02-26T22:49:33.613Z | 2026-02-27T18:17:19.675Z |
| CVE-2026-28226 |
6.5 (3.1)
|
Phishing Club has Authenticated Blind SQL Injection in… |
phishingclub |
phishingclub |
2026-02-26T22:43:05.629Z | 2026-02-27T18:18:06.714Z |
| CVE-2026-28225 |
5.3 (3.1)
|
Manyfold has IDOR in ModelFilesController |
manyfold3d |
manyfold |
2026-02-26T22:40:17.996Z | 2026-02-27T18:33:16.833Z |
| CVE-2026-28217 |
6.5 (3.1)
|
IDOR in GraphQL userCollection Query Exposes Other Use… |
hoppscotch |
hoppscotch |
2026-02-26T22:38:33.854Z | 2026-02-27T18:42:07.857Z |
| CVE-2026-28216 |
8.3 (3.1)
|
hoppscotch has IDOR in updateUserEnvironment / deleteU… |
hoppscotch |
hoppscotch |
2026-02-26T22:36:50.539Z | 2026-02-27T18:43:16.218Z |
| CVE-2026-28215 |
9.1 (3.1)
|
hoppscotch Vulnerable to Unauthenticated Onboarding Co… |
hoppscotch |
hoppscotch |
2026-02-26T22:34:46.524Z | 2026-02-26T22:34:46.524Z |
| CVE-2026-28213 |
9.8 (3.1)
|
EverShop Vulnerable to Arbitrary Customer Account Take… |
evershopcommerce |
evershop |
2026-02-26T22:31:47.122Z | 2026-02-27T18:51:10.647Z |
| CVE-2026-28211 |
7.8 (3.1)
|
Arbitrary code execution in log reader via untrusted l… |
CyrilleB79 |
NVDA-Dev-Test-Toolbox |
2026-02-26T22:29:36.164Z | 2026-02-27T18:52:30.864Z |
| CVE-2026-28208 |
5.9 (3.1)
|
Junrar has arbitrary file write due to backslash path … |
junrar |
junrar |
2026-02-26T22:20:03.765Z | 2026-02-26T22:20:03.765Z |
| CVE-2026-28207 |
6.6 (3.1)
|
Zen-C Vulnerable to Command Injection via Malicious Ou… |
z-libs |
Zen-C |
2026-02-26T22:17:58.898Z | 2026-02-27T16:57:44.054Z |
| CVE-2026-27839 |
4.3 (3.1)
|
wger: IDOR in nutritional_values endpoints exposes pri… |
wger-project |
wger |
2026-02-26T22:07:43.640Z | 2026-02-26T22:07:43.640Z |
| CVE-2026-27838 |
3.1 (3.1)
|
wger: IDOR via user-unscoped cache keys on routine API… |
wger-project |
wger |
2026-02-26T22:04:57.968Z | 2026-02-26T22:04:57.968Z |
| CVE-2026-27638 |
5.7 (4.0)
|
ActualBudget missing authorization in sync endpoints a… |
actualbudget |
actual |
2026-02-26T22:14:21.481Z | 2026-02-26T22:14:21.481Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-23c5-xmqv-rm74 |
7.5 (3.1)
|
minimatch ReDoS: nested *() extglobs generate catastrophically backtracking regular expressions | 2026-02-26T22:07:15Z | 2026-02-26T22:07:15Z |
| ghsa-xxv2-rmf4-wfx2 |
8.3 (4.0)
|
Improper handling of direct memory writes in the input-output memory management unit could allow a … | 2026-02-26T21:31:31Z | 2026-02-26T21:31:31Z |
| ghsa-x79r-7fxv-8xh2 |
8.7 (4.0)
|
The Pelco, Inc. Sarix Professional 3 Series Cameras are vulnerable to an authentication bypass issu… | 2026-02-26T21:31:31Z | 2026-02-26T21:31:31Z |
| ghsa-vx6h-g6hq-6fxf |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-26T21:31:31Z | 2026-02-26T21:31:31Z |
| ghsa-q2v6-vpwh-m5q9 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-26T21:31:31Z | 2026-02-26T21:31:31Z |
| ghsa-mpqv-244m-cf9r |
9.8 (3.1)
9.3 (4.0)
|
OpenViking through version 0.1.18, prior to commit 0251c70, contains a broken access control vulner… | 2026-02-26T21:31:31Z | 2026-02-27T21:31:21Z |
| ghsa-hcv4-2wj7-9p5g |
8.0 (3.1)
8.5 (4.0)
|
Unitree Go2 firmware versions V1.1.7 through V1.1.9 and V1.1.11 (EDU) do not implement DDS authenti… | 2026-02-26T21:31:31Z | 2026-02-27T21:31:20Z |
| ghsa-gxmj-pr3w-6wmh |
7.5 (3.1)
8.7 (4.0)
|
SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability caused by PHP type jug… | 2026-02-26T21:31:31Z | 2026-02-27T21:31:21Z |
| ghsa-fpp3-pj38-w59c |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-26T21:31:31Z | 2026-02-26T21:31:31Z |
| ghsa-c2p8-28pf-f3mr |
9.6 (3.1)
6.4 (4.0)
|
Unitree Go2 firmware versions 1.1.7 through 1.1.11, when used with the Unitree Go2 Android applicat… | 2026-02-26T21:31:31Z | 2026-02-27T21:31:21Z |
| ghsa-9mgh-ggpg-9hq5 |
8.8 (3.1)
|
The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registra… | 2026-02-26T21:31:31Z | 2026-02-26T21:31:31Z |
| ghsa-9cqh-whf3-4326 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-26T21:31:31Z | 2026-02-26T21:31:31Z |
| ghsa-9674-77c9-4xpr |
8.6 (3.1)
|
Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336) exists in Workflow… | 2026-02-26T21:31:31Z | 2026-02-26T21:31:31Z |
| ghsa-8fj7-8h3w-xwfm |
7.5 (3.1)
|
Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic | 2026-02-26T21:31:31Z | 2026-02-27T21:31:20Z |
| ghsa-48x6-97gc-jx62 |
8.8 (3.1)
8.7 (4.0)
|
SPIP versions prior to 4.4.10 contain a SQL injection vulnerability that allows authenticated low-p… | 2026-02-26T21:31:31Z | 2026-02-27T21:31:21Z |
| ghsa-wgqq-4524-pjw8 |
6.1 (3.1)
|
A malicious actor with authenticated user privileges on a Windows based Workstation host may be abl… | 2026-02-26T21:31:30Z | 2026-02-26T21:31:30Z |
| ghsa-r6f6-7cf6-c3cg |
5.9 (3.1)
|
VMWare Workstation and Fusion contain a logic flaw in the management of network packets. Known at… | 2026-02-26T21:31:30Z | 2026-02-27T18:31:04Z |
| ghsa-4m27-pqhx-2rfv |
6.5 (3.1)
|
Uncontrolled Resource Consumption (CWE-400) in the Timelion component in Kibana can lead Denial of … | 2026-02-26T21:31:30Z | 2026-02-26T21:31:31Z |
| ghsa-5rc7-2jj6-mp64 |
5.0 (3.1)
|
Terraform Provider for Linode Debug Logs Vulnerable to Sensitive Information Exposure | 2026-02-26T20:00:12Z | 2026-02-26T20:00:12Z |
| ghsa-x7hp-r3qg-r3cj |
6.6 (4.0)
|
pypdf: Manipulated FlateDecode XFA streams can exhaust RAM | 2026-02-26T19:55:33Z | 2026-02-26T19:55:33Z |
| ghsa-r5mx-6wc6-7h9w |
6.3 (3.1)
|
dottie is vulnerable to Prototype Pollution bypass via non-first path segments in set() and transform() | 2026-02-26T19:54:34Z | 2026-02-26T19:54:34Z |
| ghsa-2v6m-6xw3-6467 |
7.1 (4.0)
|
Fleet: Sensitive Google Calendar credentials disclosed to low-privileged users | 2026-02-26T19:53:30Z | 2026-02-26T19:53:30Z |
| ghsa-wppc-7cq7-cgfv |
4.3 (3.1)
|
Weblate: Missing access control for the AddonViewSet API exposes all addon configurations | 2026-02-26T19:45:06Z | 2026-02-27T21:59:14Z |
| ghsa-5jvp-m9h4-253h |
5.0 (4.0)
|
Fleet: Authorization Bypass in certificate template batch deletion for team administrators | 2026-02-26T19:40:10Z | 2026-02-26T19:40:10Z |
| ghsa-9pm7-6g36-6j78 |
6.3 (4.0)
|
Fleet: Unauthenticated Android device disenrollment vulnerability via Pub/Sub endpoint | 2026-02-26T19:38:56Z | 2026-02-26T19:38:56Z |
| ghsa-ppwx-5jq7-px2w |
4.1 (4.0)
|
Fleet: Device lock PIN can be predicted if lock time is known | 2026-02-26T19:35:29Z | 2026-02-26T19:35:29Z |
| ghsa-rr4q-h87q-gm3v |
4.9 (3.1)
|
Inefficient Regular Expression Complexity (CWE-1333) in the AI Inference Anonymization Engine in Ki… | 2026-02-26T18:31:42Z | 2026-02-26T18:31:42Z |
| ghsa-5rmp-wvrc-g6g5 |
6.5 (3.1)
|
Improper Input Validation (CWE-20) in the internal Content Connectors search endpoint in Kibana can… | 2026-02-26T18:31:42Z | 2026-02-26T18:31:42Z |
| ghsa-xcg8-xp62-9p7g |
8.1 (3.1)
7.2 (4.0)
|
Golioth Pouch version 0.1.0 prior to [INSERT FIXED VERSION], fixed in commit 1b2219a1, contain a he… | 2026-02-26T18:31:41Z | 2026-02-27T15:34:17Z |
| ghsa-wv77-3ff9-m96q |
8.2 (3.1)
|
Improper session management in D-Link Wireless N 300 ADSL2+ Modem Router DSL-124 ME_1.00 allows att… | 2026-02-26T18:31:41Z | 2026-02-26T21:31:30Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-166 |
|
Nautobot is a Network Source of Truth and Network Automation Platform. A user with permis… | nautobot | 2024-05-28T23:15:17+00:00 | 2025-01-18T19:19:06.277166+00:00 |
| pysec-2024-258 |
|
In scrapy/scrapy, an issue was identified where the Authorization header is not removed d… | scrapy | 2024-05-20T08:15:08+00:00 | 2025-07-15T17:37:50.051730+00:00 |
| pysec-2024-244 |
7.5 (3.1)
|
A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a by… | mlflow | 2024-05-16T09:15:14+00:00 | 2025-04-08T10:23:25.092581+00:00 |
| pysec-2024-51 |
|
A broken access control vulnerability exists in mlflow/mlflow versions before 2.10.1, whe… | mlflow | 2024-05-16T09:15:00+00:00 | 2024-05-16T11:19:52.866536+00:00 |
| pysec-2024-237 |
9.4 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-05-14T16:17:12+00:00 | 2025-03-05T17:22:29.121263+00:00 |
| pysec-2024-185 |
|
Nebari through 2024.4.1 prints the temporary Keycloak root password. | nebari | 2024-05-06T00:15:10+00:00 | 2025-01-19T04:23:00.951638+00:00 |
| pysec-2024-175 |
|
WordOps through 3.20.0 has a wo/cli/plugins/stack_pref.py TOCTOU race condition because t… | wordops | 2024-05-06T00:15:10+00:00 | 2025-01-18T22:21:44.991242+00:00 |
| pysec-2024-255 |
|
Gradio before 4.20 allows credential leakage on Windows. | gradio | 2024-05-05T20:15:07+00:00 | 2025-06-17T19:21:48.983901+00:00 |
| pysec-2024-233 |
|
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consump… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.511369+00:00 |
| pysec-2024-232 |
|
python-jose through 3.3.0 has algorithm confusion with OpenSSH ECDSA keys and other key f… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.468012+00:00 |
| pysec-2024-209 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-19T19:19:01.689044+00:00 |
| pysec-2024-163 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to ve… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-14T05:22:23.036505+00:00 |
| pysec-2024-208 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.647736+00:00 |
| pysec-2024-207 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.605918+00:00 |
| pysec-2024-206 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.566553+00:00 |
| pysec-2024-246 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Starting in… | vyper | 2024-04-25T17:15:50+00:00 | 2025-05-05T19:21:20.899426+00:00 |
| pysec-2024-50 |
|
Synapse is an open-source Matrix homeserver. A remote Matrix user with malicious intent, … | matrix-synapse | 2024-04-23T18:15:00+00:00 | 2024-04-23T21:18:51.688096+00:00 |
| pysec-2024-250 |
|
Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csr… | torch | 2024-04-19T21:15:08+00:00 | 2025-06-03T15:23:56.072490+00:00 |
| pysec-2024-252 |
|
PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in t… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T19:22:08.948962+00:00 |
| pysec-2024-251 |
|
Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T03:12:59.077932+00:00 |
| pysec-2024-243 |
9.3 (3.1)
|
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs… | mlflow | 2024-04-16T00:15:12+00:00 | 2025-04-08T10:23:25.044416+00:00 |
| pysec-2024-254 |
4.2 (3.1)
|
A session fixation vulnerability exists in the zenml-io/zenml application, where JWT toke… | zenml | 2024-04-16T00:15:11+00:00 | 2025-06-13T00:48:41.806476+00:00 |
| pysec-2024-247 |
9.9 (3.1)
|
A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically… | zenml | 2024-04-16T00:15:11+00:00 | 2025-05-12T15:23:53.861001+00:00 |
| pysec-2024-49 |
|
Lektor before 3.3.11 does not sanitize DB path traversal. Thus, shell commands might be e… | lektor | 2024-03-27T06:15:00+00:00 | 2024-03-27T11:18:36.506150+00:00 |
| pysec-2024-257 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-03-22T23:15:07+00:00 | 2025-06-30T15:23:50.085549+00:00 |
| pysec-2024-234 |
9.8 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their Jup… | jupyter-server-proxy | 2024-03-20T20:15:08+00:00 | 2025-02-21T18:23:35.992501+00:00 |
| pysec-2024-48 |
|
Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial o… | black | 2024-03-19T05:15:00+00:00 | 2024-03-19T11:18:50.379002+00:00 |
| pysec-2024-179 |
4.8 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-03-18T22:15:07+00:00 | 2025-01-19T01:52:24.377662+00:00 |
| pysec-2024-47 |
|
In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.te… | django | 2024-03-15T20:15:00+00:00 | 2024-03-15T23:20:34.975097+00:00 |
| pysec-2024-46 |
|
Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenti… | apache-airflow | 2024-03-14T09:15:00+00:00 | 2024-03-14T11:19:09.515892+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-877 | Malicious code in arrayvec (PyPI) | 2026-02-13T10:27:10Z | 2026-02-13T10:27:10Z |
| mal-2026-874 | Malicious code in google-search-result (PyPI) | 2026-02-12T23:27:54Z | 2026-02-13T00:38:45Z |
| mal-2026-873 | Malicious code in @depro0x/despicable-me (npm) | 2026-02-12T20:40:54Z | 2026-02-23T04:21:31Z |
| mal-2026-872 | Malicious code in stylelint-recommended (npm) | 2026-02-12T18:18:29Z | 2026-02-23T04:21:36Z |
| mal-2026-871 | Malicious code in envoy1 (npm) | 2026-02-12T16:50:57Z | 2026-02-23T04:21:32Z |
| mal-2026-941 | Malicious code in ether-lint (npm) | 2026-02-12T16:02:40Z | 2026-02-26T01:40:03Z |
| mal-2026-870 | Malicious code in b10connoisseur (PyPI) | 2026-02-12T12:10:26Z | 2026-02-12T12:10:26Z |
| mal-2026-869 | Malicious code in ritch (PyPI) | 2026-02-12T08:10:35Z | 2026-02-19T22:47:48Z |
| mal-2026-866 | Malicious code in oraceldb (PyPI) | 2026-02-12T08:03:03Z | 2026-02-19T22:47:48Z |
| mal-2026-863 | Malicious code in krbutils (PyPI) | 2026-02-12T08:00:39Z | 2026-02-19T22:47:48Z |
| mal-2026-868 | Malicious code in pydantics (PyPI) | 2026-02-12T07:55:49Z | 2026-02-19T22:47:48Z |
| mal-2026-867 | Malicious code in pandaai (PyPI) | 2026-02-12T07:51:33Z | 2026-02-19T22:47:48Z |
| mal-2026-865 | Malicious code in opentelematry-api (PyPI) | 2026-02-12T07:30:47Z | 2026-02-19T22:47:48Z |
| mal-2026-864 | Malicious code in marshmellow (PyPI) | 2026-02-12T07:10:57Z | 2026-02-19T22:47:48Z |
| mal-2026-946 | Malicious code in lala6992 (PyPI) | 2026-02-12T05:30:51Z | 2026-02-19T22:47:48Z |
| mal-2026-862 | Malicious code in get-incorrect-name-bob (PyPI) | 2026-02-12T00:01:39Z | 2026-02-12T00:01:39Z |
| mal-2026-861 | Malicious code in express-gueues (npm) | 2026-02-11T16:43:01Z | 2026-02-23T04:21:32Z |
| mal-2026-860 | Malicious code in osopackagepy (PyPI) | 2026-02-11T15:50:58Z | 2026-02-11T16:53:59Z |
| mal-2026-859 | Malicious code in systemtest-network (npm) | 2026-02-11T15:13:28Z | 2026-02-23T04:21:36Z |
| mal-2026-858 | Malicious code in systemtest-information (npm) | 2026-02-11T15:13:28Z | 2026-02-23T04:21:36Z |
| mal-2026-857 | Malicious code in osopackage (npm) | 2026-02-11T15:13:28Z | 2026-02-23T04:21:35Z |
| mal-2026-856 | Malicious code in chai-prop (npm) | 2026-02-11T14:19:52Z | 2026-02-23T04:21:32Z |
| mal-2026-855 | Malicious code in config-toolkit (PyPI) | 2026-02-11T14:08:58Z | 2026-02-11T14:08:58Z |
| mal-2026-854 | Malicious code in sinon-node (npm) | 2026-02-11T10:54:37Z | 2026-02-23T04:21:35Z |
| mal-2026-853 | Malicious code in node-dotenv-cli (npm) | 2026-02-11T10:54:37Z | 2026-02-23T04:21:34Z |
| mal-2026-852 | Malicious code in chai-await (npm) | 2026-02-11T10:54:36Z | 2026-02-23T04:21:32Z |
| mal-2026-851 | Malicious code in python-files-mod (PyPI) | 2026-02-11T10:40:53Z | 2026-02-11T10:40:53Z |
| mal-2024-12374 | Malicious code in ci-metadata-python-logging (PyPI) | 2026-02-11T10:26:41Z | 2026-02-14T18:48:58Z |
| mal-2025-193013 | Malicious code in tablixs (PyPI) | 2026-02-11T10:04:22Z | 2026-02-14T18:48:58Z |
| mal-2026-850 | Malicious code in ntoctfutils (PyPI) | 2026-02-11T08:58:36Z | 2026-02-11T08:58:36Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2886 | Red Hat Enterprise Linux (git-lfs, opentelemetry-collector): Mehrere Schwachstellen | 2025-12-18T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2885 | Mozilla Firefox: Mehrere Schwachstellen | 2025-12-18T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2884 | QEMU (virtio-crypto): Schwachstelle ermöglicht Denial of Service | 2025-12-18T23:00:00.000+00:00 | 2025-12-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2883 | Red Hat Enterprise AI Inference Server (vLLM): Schwachstelle ermöglicht Codeausführung | 2025-12-18T23:00:00.000+00:00 | 2025-12-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2882 | Red Hat Enterprise Linux (audiofile): Schwachstelle ermöglicht Denial of Service | 2025-12-17T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2881 | Red Hat Enterprise Linux (multicluster global hub): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-17T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2880 | Mattermost Server und Desktop: Mehrere Schwachstellen | 2025-12-17T23:00:00.000+00:00 | 2025-12-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2879 | DriveLock: Mehrere Schwachstellen | 2025-12-17T23:00:00.000+00:00 | 2025-12-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2878 | M-Files Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-17T23:00:00.000+00:00 | 2025-12-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2877 | FreeRDP: Schwachstelle ermöglicht Denial of Service | 2025-12-17T23:00:00.000+00:00 | 2025-12-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2876 | HCL BigFix Remote Control: Mehrere Schwachstellen | 2025-12-17T23:00:00.000+00:00 | 2025-12-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2875 | KeePassXC-Browser: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-17T23:00:00.000+00:00 | 2025-12-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2874 | FreeBSD Project FreeBSD OS: Mehrere Schwachstellen | 2025-12-17T23:00:00.000+00:00 | 2025-12-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2873 | SonicWall SMA1000 (AMC): Schwachstelle ermöglicht Privilegieneskalation | 2025-12-17T23:00:00.000+00:00 | 2025-12-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2872 | Drupal HTTP Client Manager: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-17T23:00:00.000+00:00 | 2025-12-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2871 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-12-17T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2870 | Cisco AsyncOS für Secure Email Gateway: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2025-12-17T23:00:00.000+00:00 | 2025-12-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2869 | Mozilla Firefox für iOS: Schwachstelle ermöglicht Darstellen falscher Informationen | 2025-12-16T23:00:00.000+00:00 | 2025-12-18T23:00:00.000+00:00 |
| wid-sec-w-2025-2868 | Linux Kernel: Mehrere Schwachstellen | 2025-12-16T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2867 | HPE OneView: Schwachstelle ermöglicht Codeausführung | 2025-12-16T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-2866 | Dropbear SSH: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-12-16T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2865 | TYPO3 Extension (Single Sign-on SAML): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-16T23:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2864 | Sonatype Nexus Repository Manager: Mehrere Schwachstellen | 2025-12-16T23:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2863 | Arista EOS: Schwachstelle ermöglicht Denial of Service | 2025-12-16T23:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2862 | Nagios Enterprises Nagios XI: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2025-12-16T23:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2861 | Red Hat OpenShift GitOps: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-12-16T23:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2860 | JetBrains TeamCity: Mehrere Schwachstellen | 2025-12-16T23:00:00.000+00:00 | 2025-12-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2859 | JetBrains IntelliJ IDEA: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-16T23:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2858 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2025-12-16T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2857 | Claris FileMaker Server: Schwachstelle ermöglicht Codeausführung | 2025-12-16T23:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0268 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en Gateway | 2025-08-26T13:11:42.925280Z | 2025-08-26T17:34:30.428328Z |
| ncsc-2025-0267 | Kwetsbaarheden verholpen in Foxit Reader | 2025-08-25T11:26:17.380689Z | 2025-08-25T11:26:17.380689Z |
| ncsc-2025-0266 | Kwetsbaarheid verholpen in Apple MacOS, iOS en iPadOS | 2025-08-22T05:49:07.556948Z | 2025-08-25T12:16:10.430485Z |
| ncsc-2025-0265 | Kwetsbaarheden verholpen in Commvault | 2025-08-20T12:15:48.655099Z | 2025-08-20T12:15:48.655099Z |
| ncsc-2025-0264 | Kwetsbaarheden verholpen in Cisco Secure Firewall Software | 2025-08-15T08:52:41.012811Z | 2025-08-15T08:52:41.012811Z |
| ncsc-2025-0263 | Kwetsbaarheden verholpen in N-able N-Central | 2025-08-14T12:38:27.349283Z | 2025-08-14T12:38:27.349283Z |
| ncsc-2025-0262 | Kwetsbaarheden verholpen in Xerox FreeFlow Core | 2025-08-14T07:00:50.843871Z | 2025-08-14T07:00:50.843871Z |
| ncsc-2025-0261 | Kwetsbaarheden verholpen in Adobe InCopy | 2025-08-13T10:13:59.220398Z | 2025-08-13T10:13:59.220398Z |
| ncsc-2025-0260 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-08-13T10:12:35.130811Z | 2025-08-13T10:12:35.130811Z |
| ncsc-2025-0259 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2025-08-13T10:11:22.733287Z | 2025-08-13T10:11:22.733287Z |
| ncsc-2025-0258 | Kwetsbaarheden verholpen in Adobe InDesign | 2025-08-13T10:05:31.442414Z | 2025-08-13T10:05:31.442414Z |
| ncsc-2025-0257 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-08-13T10:00:18.181867Z | 2025-08-13T10:00:18.181867Z |
| ncsc-2025-0256 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-08-13T09:59:45.240348Z | 2025-08-13T09:59:45.240348Z |
| ncsc-2025-0255 | Kwetsbaarheden verholpen in Fortinet producten | 2025-08-13T09:16:29.067287Z | 2025-08-13T09:35:40.587034Z |
| ncsc-2025-0254 | Kwetsbaarheden verholpen in Zoom | 2025-08-13T09:09:21.491424Z | 2025-08-13T09:09:21.491424Z |
| ncsc-2025-0253 | Kwetsbaarheden verholpen in Ivanti Connect Secure, Policy Secure en ZTA Gateways | 2025-08-13T09:06:58.420498Z | 2025-08-13T09:06:58.420498Z |
| ncsc-2025-0252 | Kwetsbaarheden verholpen in Microsoft Exchange Server | 2025-08-13T07:29:24.639524Z | 2025-08-13T07:29:24.639524Z |
| ncsc-2025-0251 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-08-13T07:25:08.789693Z | 2025-08-13T07:25:08.789693Z |
| ncsc-2025-0250 | Kwetsbaarheden verholpen in Microsoft Office | 2025-08-13T07:23:56.395786Z | 2025-08-13T07:23:56.395786Z |
| ncsc-2025-0249 | Kwetsbaarheden verholpen in Azure-producten | 2025-08-13T07:22:17.432067Z | 2025-08-13T07:22:17.432067Z |
| ncsc-2025-0248 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-08-13T07:21:52.836899Z | 2025-08-13T07:21:52.836899Z |
| ncsc-2025-0247 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-08-13T07:19:19.911308Z | 2025-08-13T07:19:19.911308Z |
| ncsc-2025-0246 | Kwetsbaarheden verholpen in Siemens producten | 2025-08-12T13:03:08.211775Z | 2025-08-12T13:03:08.211775Z |
| ncsc-2025-0245 | Kwetsbaarheden verholpen in SAP producten | 2025-08-12T11:10:21.111816Z | 2025-09-05T11:12:05.722381Z |
| ncsc-2025-0244 | Kwetsbaarheid verholpen in WinRAR | 2025-08-11T07:36:12.848669Z | 2025-08-11T07:36:12.848669Z |
| ncsc-2025-0243 | Kwetsbaarheid verholpen in Microsoft Exchange | 2025-08-07T09:15:22.461434Z | 2025-08-07T09:15:22.461434Z |
| ncsc-2025-0242 | Kwetsbaarheden verholpen in Trend Micro Apex One | 2025-08-06T13:21:03.156432Z | 2025-08-06T13:21:03.156432Z |
| ncsc-2025-0241 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-08-06T12:11:46.234849Z | 2025-10-17T10:44:55.312550Z |
| ncsc-2025-0240 | Kwetsbaarheden verholpen in Rockwell Automation Arena | 2025-08-06T07:55:23.705278Z | 2025-08-06T07:55:23.705278Z |
| ncsc-2025-0239 | Kwetsbaarheid verholpen in SonicWall SonicOS | 2025-07-31T11:12:42.653547Z | 2025-07-31T11:12:42.653547Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-699386 | SSA-699386: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family before V4.5 | 2023-11-14T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-625850 | SSA-625850: Multiple WIBU Systems CodeMeter Vulnerabilities Affecting the Desigo CC Product Family and SENTRON powermanager | 2023-11-14T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-617233 | SSA-617233: Urgent/11 TCP/IP Stack Vulnerabilities in SIPROTEC 4 7SJ66 Devices | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-478780 | SSA-478780: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-457702 | SSA-457702: Wi-Fi Encryption Bypass Vulnerabilities in SCALANCE W700 Product Family | 2023-11-14T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-456933 | SSA-456933: Multiple Vulnerabilities in SIMATIC PCS neo before V4.1 | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-292063 | SSA-292063: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.3 and 23.1.0 on RUGGEDCOM APE1808 devices | 2023-11-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-268517 | SSA-268517: Code Execution Vulnerability (libwebp CVE-2023-4863) in Mendix Studio Pro | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-197270 | SSA-197270: Information Disclosure Vulnerability in Siemens OPC UA Modeling Editor (SiOME) | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-150063 | SSA-150063: Multiple Vulnerabilities in SINEC PNI before V2.0 | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-137900 | SSA-137900: Multiple Vulnerabilities in COMOS | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-099606 | SSA-099606: Multiple Vulnerabilities in SIMATIC MV500 before V3.3.5 | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-084182 | SSA-084182: Privilege Escalation Vulnerability in Mendix Runtime | 2023-11-14T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-843070 | SSA-843070: Multiple Vulnerabilities in SCALANCE W1750D | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-829656 | SSA-829656: Stack Overflow Vulnerability in Xpedition Layout Browser | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-784849 | SSA-784849: Direct Memory Access Vulnerabilities in SIMATIC CP Devices | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-770890 | SSA-770890: Path Traversal Vulnerability in the Web Server of CPCI85 Firmware of SICAM A8000 Devices | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-647455 | SSA-647455: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.2 on RUGGEDCOM APE1808 devices | 2023-10-10T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-594373 | SSA-594373: Cross-Site-Scripting (XSS) Vulnerability in SINEMA Server V14 | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-524778 | SSA-524778: File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-386812 | SSA-386812: Remote Code Execution Vulnerability in Simcenter Amesim before V2021.1 | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-295483 | SSA-295483: User Enumeration Vulnerability in Mendix Forgot Password Module | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-160243 | SSA-160243: Multiple Vulnerabilities in SINEC NMS before V2.0 | 2023-10-10T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-134651 | SSA-134651: Hard Coded SSH ID in CPCI85 Firmware of SICAM A8000 Devices | 2023-10-10T00:00:00Z | 2023-10-10T00:00:00Z |
| ssa-035466 | SSA-035466: Incorrect Permission Assignment in SICAM PAS/PQS | 2023-10-10T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-646240 | SSA-646240: Sensitive Information Disclosure in SIMATIC PCS neo Administration Console | 2023-09-14T00:00:00Z | 2023-09-14T00:00:00Z |
| ssa-357182 | SSA-357182: Local Privilege Escalation Vulnerability in Spectrum Power 7 | 2023-09-14T00:00:00Z | 2023-09-14T00:00:00Z |
| ssa-957369 | SSA-957369: Insyde BIOS Vulnerabilities in RUGGEDCOM APE1808 Product Family | 2023-09-12T00:00:00Z | 2023-09-12T00:00:00Z |
| ssa-711309 | SSA-711309: Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products | 2023-09-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-278349 | SSA-278349: Multiple WRL File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2023-09-12T00:00:00Z | 2023-09-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2124 | Red Hat Security Advisory: osbuild-composer security update | 2026-02-05T14:55:40+00:00 | 2026-02-17T12:41:34+00:00 |
| rhsa-2026:2126 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T14:55:08+00:00 | 2026-02-17T12:41:39+00:00 |
| rhsa-2026:1965 | Red Hat Security Advisory: Red Hat build of Quarkus 3.27.2 release and security update | 2026-02-05T14:53:30+00:00 | 2026-02-05T19:49:02+00:00 |
| rhsa-2026:1899 | Red Hat Security Advisory: Red Hat build of Quarkus 3.20.5 release and security update | 2026-02-05T14:43:16+00:00 | 2026-02-05T20:05:39+00:00 |
| rhsa-2026:2123 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.0 | 2026-02-05T14:26:23+00:00 | 2026-02-17T12:41:33+00:00 |
| rhsa-2026:2115 | Red Hat Security Advisory: kpatch-patch-5_14_0-284_104_1, kpatch-patch-5_14_0-284_117_1, kpatch-patch-5_14_0-284_134_1, kpatch-patch-5_14_0-284_148_1, and kpatch-patch-5_14_0-284_92_1 security update | 2026-02-05T14:10:15+00:00 | 2026-02-11T18:58:09+00:00 |
| rhsa-2026:2109 | Red Hat Security Advisory: kpatch-patch-5_14_0-427_100_1, kpatch-patch-5_14_0-427_44_1, kpatch-patch-5_14_0-427_55_1, kpatch-patch-5_14_0-427_68_2, and kpatch-patch-5_14_0-427_84_1 security update | 2026-02-05T14:06:15+00:00 | 2026-02-11T18:58:09+00:00 |
| rhsa-2026:2096 | Red Hat Security Advisory: kpatch-patch-5_14_0-570_17_1, kpatch-patch-5_14_0-570_39_1, and kpatch-patch-5_14_0-570_66_1 security update | 2026-02-05T13:49:50+00:00 | 2026-02-11T18:58:08+00:00 |
| rhsa-2026:2106 | Red Hat Security Advisory: RHOAI 2.25.2 - Red Hat OpenShift AI | 2026-02-05T13:38:32+00:00 | 2026-02-17T12:41:33+00:00 |
| rhsa-2026:2090 | Red Hat Security Advisory: python3.12-wheel security update | 2026-02-05T13:26:00+00:00 | 2026-02-16T17:59:16+00:00 |
| rhsa-2026:2084 | Red Hat Security Advisory: python3.11 security update | 2026-02-05T11:58:50+00:00 | 2026-02-16T14:24:43+00:00 |
| rhsa-2026:2081 | Red Hat Security Advisory: freerdp security update | 2026-02-05T11:53:40+00:00 | 2026-02-17T07:24:08+00:00 |
| rhsa-2026:2074 | Red Hat Security Advisory: firefox security update | 2026-02-05T10:53:04+00:00 | 2026-02-09T13:27:20+00:00 |
| rhsa-2026:2073 | Red Hat Security Advisory: firefox security update | 2026-02-05T10:50:14+00:00 | 2026-02-09T13:27:20+00:00 |
| rhsa-2026:2070 | Red Hat Security Advisory: firefox security update | 2026-02-05T10:46:50+00:00 | 2026-02-09T13:27:19+00:00 |
| rhsa-2026:2069 | Red Hat Security Advisory: firefox security update | 2026-02-05T10:39:09+00:00 | 2026-02-09T13:27:18+00:00 |
| rhsa-2026:2048 | Red Hat Security Advisory: freerdp security update | 2026-02-05T10:29:20+00:00 | 2026-02-17T07:24:07+00:00 |
| rhsa-2026:2049 | Red Hat Security Advisory: libsoup security update | 2026-02-05T10:09:21+00:00 | 2026-02-12T13:28:16+00:00 |
| rhsa-2026:2042 | Red Hat Security Advisory: brotli security update | 2026-02-05T09:50:39+00:00 | 2026-02-17T09:27:48+00:00 |
| rhsa-2026:2043 | Red Hat Security Advisory: firefox security update | 2026-02-05T09:43:00+00:00 | 2026-02-09T13:27:16+00:00 |
| rhsa-2026:2060 | Red Hat Security Advisory: python-s3transfer security update | 2026-02-05T09:42:45+00:00 | 2026-02-17T09:27:49+00:00 |
| rhsa-2026:2047 | Red Hat Security Advisory: firefox security update | 2026-02-05T09:31:05+00:00 | 2026-02-09T13:27:18+00:00 |
| rhsa-2026:2044 | Red Hat Security Advisory: firefox security update | 2026-02-05T09:15:14+00:00 | 2026-02-09T13:27:18+00:00 |
| rhsa-2026:2041 | Red Hat Security Advisory: firefox security update | 2026-02-05T08:47:44+00:00 | 2026-02-09T13:26:59+00:00 |
| rhsa-2026:2039 | Red Hat Security Advisory: fontforge security update | 2026-02-05T07:44:49+00:00 | 2026-02-11T18:58:53+00:00 |
| rhsa-2026:2034 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.20 security, enhancement & bug fix update | 2026-02-05T06:37:04+00:00 | 2026-02-17T12:41:32+00:00 |
| rhsa-2026:2007 | Red Hat Security Advisory: libsoup security update | 2026-02-05T04:12:08+00:00 | 2026-02-12T13:28:14+00:00 |
| rhsa-2026:2008 | Red Hat Security Advisory: libsoup security update | 2026-02-05T03:46:53+00:00 | 2026-02-12T13:28:14+00:00 |
| rhsa-2026:2006 | Red Hat Security Advisory: libsoup3 security update | 2026-02-05T03:37:38+00:00 | 2026-02-12T13:28:15+00:00 |
| rhsa-2026:2005 | Red Hat Security Advisory: libsoup security update | 2026-02-05T03:34:18+00:00 | 2026-02-12T13:28:16+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-261-07 | Dover Fueling Solutions ProGauge MagLink LX4 Devices | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-06 | Cognex In-Sight Explorer and In-Sight Camera Firmware | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-03 | Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-02 | Westermo Network Technologies WeOS 5 | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-01 | Westermo Network Technologies WeOS 5 | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-259-07 | Delta Electronics DIALink | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-05 | Siemens OpenSSL Vulnerability in Industrial Products | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-03 | Siemens SIMATIC NET CP, SINEMA and SCALANCE | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-02 | Hitachi Energy RTU500 series | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| va-25-259-01 | CISA Thorium multiple vulnerabilities | 2025-09-16T00:00:00Z | 2025-09-16T00:00:00Z |
| va-25-258-01 | psPAS does not enforce TLS 1.2 within Get-PASSAMLResponse | 2025-09-15T18:41:08Z | 2025-09-15T18:41:08Z |
| icsa-25-254-10 | Daikin Europe N.V Security Gateway | 2025-09-11T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| va-25-252-01 | OPEXUS FOIAXpress Public Access Link (PAL) SQL injection | 2025-09-09T20:48:26Z | 2025-09-09T20:48:26Z |
| icsa-25-252-09 | Rockwell Automation 1783-NATR | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-08 | Rockwell Automation Analytics LogixAI | 2025-09-09T06:00:00.000000Z | 2025-10-10T06:00:00.000000Z |
| icsa-25-252-07 | Rockwell Automation ControlLogix 5580 | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-06 | Rockwell Automation CompactLogix® 5480 | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-05 | Rockwell Automation FactoryTalk Activation Manager | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-04 | Rockwell Automation FactoryTalk Optix | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-03 | Rockwell Automation Stratix IOS | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-01 | Rockwell Automation ThinManager | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-02 | ABB Cylon Aspect BMS/BAS | 2025-09-09T05:00:00.000000Z | 2025-09-09T05:00:00.000000Z |
| icsa-25-259-01 | Schneider Electric Altivar products ATVdPAC module ILC992 InterLink Converter (Update A) | 2025-09-09T04:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-254-07 | Siemens User Management Component (UMC) | 2025-09-09T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-254-06 | Siemens Industrial Edge Management | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-254-05 | Siemens Apogee PXC and Talon TC Devices | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-254-04 | Siemens SINEC OS | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-254-03 | Siemens SINAMICS Drives | 2025-09-09T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-254-02 | Siemens SIMATIC Virtualization as a Service (SIVaaS) | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-254-01 | Siemens SIMOTION Tools | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ndfc-sqli-cyppaxrl | Cisco Nexus Dashboard Fabric Controller SQL Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-mpp-xss-8tav2tvf | Cisco 6800, 7800, 8800, and 9800 Series Phones with Multiplatform Firmware Stored Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vulns-af544ed5 | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vuln-dbqdwry | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-auth-bypass-bbrf7mke | Cisco Identity Services Engine Authorization Bypass and Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-imp-inf-disc-cupkua5n | Cisco Unified Communications Manager IM & Presence Service Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-esa-wsa-sma-xss-zym3f49n | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-yyf2zkxs | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ece-dos-oqb9ufev | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cucm-xss-svckmmw | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cmm-info-disc-9zemahga | Cisco Meeting Management Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ccmp-sxss-qbtdbzdd | Cisco Unified Contact Center Management Portal Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-backhaul-ap-cmdinj-r7e28ecs | Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-3550-acl-bypass-mhskzc2q | Cisco Nexus 3550-F Switches Access Control List Programming Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-snort-rf-bypass-oy8f3pnm | Multiple Cisco Products Snort Rate Filter Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2025-01-13T16:44:31+00:00 |
| cisco-sa-snort-bypass-ptry37fx | Cisco Firepower Threat Defense Software TCP Snort 3 Detection Engine Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-sa-ftd-snort-fw-bcjtzpmu | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services TCP/IP Traffic with Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd2100-snort-dos-m9humt75 | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Appliances TCP UDP Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-vdb-snort-djj4cnbr | Cisco Firepower Threat Defense Software Vulnerability Database with Snort Detection Engine Security Policy Bypass and Denial of Service Issue | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-tls-dos-qxye5ufy | Cisco Firepower Threat Defense Software for Firepower 2100 Series TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-statcred-dfc8txt5 | Cisco Firepower Threat Defense Software for Firepower 1000, 2100, 3100, and 4200 Series Static Credential Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-geoip-bypass-mb4zrdu | Cisco Firepower Threat Defense Software Geolocation ACL Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-xss-infodisc-rl4mjfer | Cisco Secure Firewall Management Center Software Cross-Site Scripting and Information Disclosure Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-24T11:52:38+00:00 |
| cisco-sa-fmc-xss-dhjxqyzs | Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-sql-inject-2enmtc8v | Cisco Secure Firewall Management Center Software SQL Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-sql-inj-loyafcfq | Cisco Secure Firewall Management Center Software SQL Injection Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-priv-esc-cmq4s6m7 | Cisco Secure Firewall Management Center Privilege Escalation Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-html-inj-nfjeyhxz | Cisco Secure Firewall Management Center Software HTML Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-file-read-5q4mqrn | Cisco Secure Firewall Management Center Software Arbitrary File Read Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-v3awdqn7 | Cisco Secure Firewall Management Center Software Command Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-20835 | Capability Access Management Service (camsvc) Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20834 | Windows Spoofing Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20833 | Windows Kerberos Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20832 | Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20831 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20830 | Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-20T08:00:00.000Z |
| msrc_cve-2026-20829 | TPM Trustlet Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20828 | Windows rndismp6.sys Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20827 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20826 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20825 | Windows Hyper-V Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20824 | Windows Remote Assistance Security Feature Bypass Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20823 | Windows File Explorer Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20822 | Windows Graphics Component Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20821 | Remote Procedure Call Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20820 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20819 | Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20818 | Windows Kernel Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-20T08:00:00.000Z |
| msrc_cve-2026-20817 | Windows Error Reporting Service Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20816 | Windows Installer Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20815 | Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20814 | DirectX Graphics Kernel Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20812 | LDAP Tampering Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20811 | Win32k Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20810 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20809 | Windows Kernel Memory Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20808 | Windows File Explorer Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-27T08:00:00.000Z |
| msrc_cve-2026-20804 | Windows Hello Tampering Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| msrc_cve-2026-20803 | Microsoft SQL Server Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-200711-0064 | Mail in Apple Mac OS X Leopard (10.5.1) allows user-assisted remote attackers to execute … | 2025-12-22T23:07:56.228000Z |
| var-200901-0742 | WebKit in Apple Safari before 4.0 does not properly initialize memory for Attr DOM object… | 2025-12-22T23:07:56.067000Z |
| var-201108-0146 | Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before … | 2025-12-22T23:07:55.107000Z |
| var-201806-1458 | An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. macOS b… | 2025-12-22T23:07:49.193000Z |
| var-202010-1294 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2025-12-22T23:07:49.088000Z |
| var-202003-1779 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2025-12-22T23:07:48.558000Z |
| var-200609-0665 | The Online Certificate Status Protocol (OCSP) service in the Security Framework in Apple … | 2025-12-22T23:07:47.805000Z |
| var-201211-0356 | Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml… | 2025-12-22T23:07:45.364000Z |
| var-201210-0266 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:07:45.164000Z |
| var-202010-1296 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2025-12-22T23:07:41.752000Z |
| var-201707-1195 | An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari … | 2025-12-22T23:07:08.378000Z |
| var-201211-0168 | Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0… | 2025-12-22T23:07:08.315000Z |
| var-202201-0304 | A logic issue was addressed with improved state management. This issue is fixed in iOS 15… | 2025-12-22T23:07:07.954000Z |
| var-201003-1082 | The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x befo… | 2025-12-22T23:06:17.999000Z |
| var-201904-1352 | A type confusion issue was addressed with improved memory handling. This issue affected v… | 2025-12-22T23:06:16.833000Z |
| var-201208-0108 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:05:38.963000Z |
| var-200901-0756 | The JavaScript garbage collector in WebKit in Apple Safari before 4.0, iPhone OS 1.0 thro… | 2025-12-22T23:05:31.698000Z |
| var-201810-0932 | The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side chan… | 2025-12-22T23:05:30.728000Z |
| var-201904-1406 | A use after free issue was addressed with improved memory management. This issue affected… | 2025-12-22T23:05:29.192000Z |
| var-201302-0398 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2025-12-22T23:05:27.025000Z |
| var-202012-1277 | A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into co… | 2025-12-22T23:04:56.454000Z |
| var-200609-1325 | Unspecified vulnerability in CFNetwork in Mac OS 10.4.8 and earlier allows user-assisted … | 2025-12-22T23:04:56.358000Z |
| var-201808-0958 | Systems with microprocessors utilizing speculative execution and address translations may… | 2025-12-22T23:04:54.567000Z |
| var-201611-0386 | Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local … | 2025-12-22T23:04:53.271000Z |
| var-201201-0170 | Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK i… | 2025-12-22T23:04:52.183000Z |
| var-200701-0518 | The CFUserNotificationSendRequest function in UserNotificationCenter.app in Apple Mac OS … | 2025-12-22T23:04:51.938000Z |
| var-201503-0388 | Use-after-free vulnerability in the _zend_shared_memdup function in zend_shared_alloc.c i… | 2025-12-22T23:04:51.361000Z |
| var-200904-0800 | The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before… | 2025-12-22T23:04:51.134000Z |
| var-201006-1142 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2025-12-22T23:04:14.753000Z |
| var-201912-0584 | A memory corruption issue was addressed with improved input validation. This issue is fix… | 2025-12-22T23:04:10.399000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-001562 | Out-of-bounds read vulnerability in OMRON CX-Programmer | 2025-02-18T16:24+09:00 | 2025-02-18T16:24+09:00 |
| jvndb-2025-001548 | Out-of-bounds read vulnerability in Cente middleware | 2025-02-17T18:22+09:00 | 2025-02-17T18:22+09:00 |
| jvndb-2025-000012 | Multiple vulnerabilities in The LuxCal Web Calendar | 2025-02-17T13:43+09:00 | 2025-02-17T13:43+09:00 |
| jvndb-2025-000013 | acmailer CGI and acmailer DB vulnerable to OS command injection | 2025-02-14T16:39+09:00 | 2025-02-14T16:39+09:00 |
| jvndb-2025-000002 | Multiple vulnerabilities in NEC Aterm series (NV25-003) | 2025-02-14T15:48+09:00 | 2025-02-14T15:48+09:00 |
| jvndb-2025-000011 | Multiple vulnerabilities in FileMegane | 2025-02-13T13:39+09:00 | 2025-02-13T13:39+09:00 |
| jvndb-2025-000010 | acmailer vulnerable to cross-site scripting | 2025-02-12T15:05+09:00 | 2025-02-12T15:05+09:00 |
| jvndb-2025-001017 | Multiple vulnerabilities in STEALTHONE D220/D340/D440 | 2025-02-06T18:27+09:00 | 2025-02-06T18:27+09:00 |
| jvndb-2025-001016 | OMRON NJ/NX series vulnerable to path traversal | 2025-02-06T18:27+09:00 | 2025-05-08T17:44+09:00 |
| jvndb-2025-001018 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON NB-Designer | 2025-02-06T18:26+09:00 | 2025-02-06T18:26+09:00 |
| jvndb-2025-000008 | Multiple vulnerabilities in Defense Platform Home Edition | 2025-02-05T14:06+09:00 | 2025-02-05T14:06+09:00 |
| jvndb-2025-000009 | WordPress Plugin "Activity Log WinterLock" vulnerable to cross-site request forgery | 2025-02-04T13:58+09:00 | 2025-02-04T13:58+09:00 |
| jvndb-2025-001244 | Clickjacking Vulnerability in JP1/ServerConductor/Deployment Manager | 2025-01-30T18:19+09:00 | 2025-01-30T18:19+09:00 |
| jvndb-2025-000007 | SXF Common Library vulnerable to improper input data handling | 2025-01-29T14:57+09:00 | 2025-01-29T14:57+09:00 |
| jvndb-2025-001238 | Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers | 2025-01-29T13:41+09:00 | 2025-05-27T16:06+09:00 |
| jvndb-2025-000006 | WordPress Plugin "Simple Image Sizes" vulnerable to cross-site scripting | 2025-01-28T13:44+09:00 | 2025-01-28T13:44+09:00 |
| jvndb-2025-000005 | EXIF Viewer Classic vulnerable to cross-site scripting | 2025-01-27T14:25+09:00 | 2025-01-27T14:25+09:00 |
| jvndb-2025-000004 | Multiple vulnerabilities in I-O DATA router UD-LT2 | 2025-01-22T13:55+09:00 | 2025-02-20T15:55+09:00 |
| jvndb-2025-000003 | FortiWeb vulnerable to SQL injection | 2025-01-21T15:59+09:00 | 2025-01-21T15:59+09:00 |
| jvndb-2025-001027 | Linux Ratfor vulnerable to stack-based buffer overflow | 2025-01-16T13:27+09:00 | 2025-01-16T13:27+09:00 |
| jvndb-2025-000001 | PLANEX COMMUNICATIONS MZK-DP300N vulnerable to cross-site scripting | 2025-01-08T17:08+09:00 | 2025-01-08T17:08+09:00 |
| jvndb-2024-015471 | Trend Micro Deep Security 20.0 Agent (for Windows) vulnerable to uncontrolled search path element | 2024-12-25T11:28+09:00 | 2024-12-25T11:28+09:00 |
| jvndb-2024-015393 | Multiple security updates for Trend Micro Apex One and Apex One as a Service (December 2024) | 2024-12-23T12:52+09:00 | 2024-12-23T12:52+09:00 |
| jvndb-2024-014918 | Authentication Bypass Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2024-12-17T15:23+09:00 | 2024-12-17T15:23+09:00 |
| jvndb-2024-000128 | Multiple vulnerabilities in SHARP routers | 2024-12-17T07:54+09:00 | 2024-12-17T07:54+09:00 |
| jvndb-2024-000127 | "Shonen Jump+" App for Android fails to restrict custom URL schemes properly | 2024-12-16T15:07+09:00 | 2024-12-16T15:07+09:00 |
| jvndb-2024-014825 | WordPress Plugin "My WP Customize Admin/Frontend" vulnerable to cross-site scripting | 2024-12-16T13:57+09:00 | 2024-12-16T13:57+09:00 |
| jvndb-2024-014793 | Multiple vulnerabilities in FXC AE1021 and AE1021PE | 2024-12-16T11:51+09:00 | 2024-12-16T11:51+09:00 |
| jvndb-2024-014079 | Trend Micro Deep Security Agent for Windows and Deep Security Notifier on DSVA vulnerable to OS command injection | 2024-12-06T12:11+09:00 | 2024-12-06T12:11+09:00 |
| jvndb-2024-000125 | Multiple vulnerabilities in I-O DATA routers UD-LT1 and UD-LT1/EX | 2024-12-04T15:22+09:00 | 2024-12-18T15:20+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20169-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-01-26T11:24:31Z | 2026-01-26T11:24:31Z |
| suse-su-2026:20149-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-01-26T11:24:31Z | 2026-01-26T11:24:31Z |
| suse-su-2026:0291-1 | Security update for openCryptoki | 2026-01-26T11:11:40Z | 2026-01-26T11:11:40Z |
| suse-su-2026:20168-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-01-26T11:03:44Z | 2026-01-26T11:03:44Z |
| suse-su-2026:0290-1 | Security update for openvswitch3 | 2026-01-26T10:34:13Z | 2026-01-26T10:34:13Z |
| suse-su-2026:20167-1 | Security update for avahi | 2026-01-26T09:42:41Z | 2026-01-26T09:42:41Z |
| suse-su-2026:20145-1 | Security update for avahi | 2026-01-26T09:42:41Z | 2026-01-26T09:42:41Z |
| suse-su-2026:20165-1 | Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-01-26T09:12:02Z | 2026-01-26T09:12:02Z |
| suse-su-2026:20164-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-01-26T09:12:02Z | 2026-01-26T09:12:02Z |
| suse-su-2026:0288-1 | Security update for qemu | 2026-01-26T09:04:46Z | 2026-01-26T09:04:46Z |
| suse-su-2026:0287-1 | Security update for harfbuzz | 2026-01-23T23:35:49Z | 2026-01-23T23:35:49Z |
| suse-su-2026:0286-1 | Security update for glib2 | 2026-01-23T23:35:36Z | 2026-01-23T23:35:36Z |
| suse-su-2026:0284-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-01-23T20:04:18Z | 2026-01-23T20:04:18Z |
| suse-su-2026:0283-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-01-23T17:33:31Z | 2026-01-23T17:33:31Z |
| suse-su-2026:20163-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-01-23T16:43:58Z | 2026-01-23T16:43:58Z |
| suse-su-2026:20148-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-01-23T16:43:58Z | 2026-01-23T16:43:58Z |
| suse-su-2026:0281-1 | Security update for the Linux Kernel | 2026-01-23T16:03:47Z | 2026-01-23T16:03:47Z |
| suse-su-2026:0280-1 | Security update for openvswitch | 2026-01-23T15:33:56Z | 2026-01-23T15:33:56Z |
| suse-su-2026:0279-1 | Security update for libvirt | 2026-01-23T15:09:05Z | 2026-01-23T15:09:05Z |
| suse-su-2026:0278-1 | Security update for the Linux Kernel | 2026-01-23T15:08:32Z | 2026-01-23T15:08:32Z |
| suse-su-2026:0274-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2026-01-23T12:04:25Z | 2026-01-23T12:04:25Z |
| suse-su-2026:0273-1 | Security update for azure-cli-core | 2026-01-23T11:26:43Z | 2026-01-23T11:26:43Z |
| suse-su-2026:20139-1 | Security update for python-jaraco.context | 2026-01-23T10:43:48Z | 2026-01-23T10:43:48Z |
| suse-su-2026:0270-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6) | 2026-01-23T10:33:38Z | 2026-01-23T10:33:38Z |
| suse-su-2026:0269-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6) | 2026-01-23T10:04:12Z | 2026-01-23T10:04:12Z |
| suse-su-2026:0268-1 | Security update for python | 2026-01-23T09:40:47Z | 2026-01-23T09:40:47Z |
| suse-su-2026:0267-1 | Recommended update for kernel-firmware | 2026-01-23T09:40:29Z | 2026-01-23T09:40:29Z |
| suse-su-2026:0266-1 | Security update for glib2 | 2026-01-23T08:55:04Z | 2026-01-23T08:55:04Z |
| suse-su-2026:0265-1 | Security update for libsoup | 2026-01-23T07:08:44Z | 2026-01-23T07:08:44Z |
| suse-su-2026:0264-1 | Security update for glib2 | 2026-01-23T04:33:57Z | 2026-01-23T04:33:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20058-1 | Security update for go-sendxmpp | 2026-01-17T09:30:33Z | 2026-01-17T09:30:33Z |
| opensuse-su-2026:20054-1 | Security update for chromium | 2026-01-17T06:48:43Z | 2026-01-17T06:48:43Z |
| opensuse-su-2026:10062-1 | corepack24-24.13.0-1.1 on GA media | 2026-01-17T00:00:00Z | 2026-01-17T00:00:00Z |
| opensuse-su-2026:10061-1 | libsndfile-devel-1.2.2-4.1 on GA media | 2026-01-17T00:00:00Z | 2026-01-17T00:00:00Z |
| opensuse-su-2026:10060-1 | libpng16-16-1.6.54-1.1 on GA media | 2026-01-17T00:00:00Z | 2026-01-17T00:00:00Z |
| opensuse-su-2026:10059-1 | freerdp-3.20.2-1.1 on GA media | 2026-01-17T00:00:00Z | 2026-01-17T00:00:00Z |
| opensuse-su-2026:10058-1 | MozillaThunderbird-140.7.0-1.1 on GA media | 2026-01-17T00:00:00Z | 2026-01-17T00:00:00Z |
| opensuse-su-2026:20055-1 | Security update for gimp | 2026-01-16T16:13:02Z | 2026-01-16T16:13:02Z |
| opensuse-su-2026:20046-1 | Security update for MozillaThunderbird | 2026-01-16T12:09:04Z | 2026-01-16T12:09:04Z |
| opensuse-su-2026:10057-1 | chromedriver-144.0.7559.59-1.1 on GA media | 2026-01-16T00:00:00Z | 2026-01-16T00:00:00Z |
| opensuse-su-2026:20056-1 | Security update for cpp-httplib | 2026-01-15T22:11:25Z | 2026-01-15T22:11:25Z |
| opensuse-su-2026:20044-1 | Security update for alloy | 2026-01-15T17:56:17Z | 2026-01-15T17:56:17Z |
| opensuse-su-2026:20043-1 | Security update for erlang | 2026-01-15T17:21:23Z | 2026-01-15T17:21:23Z |
| opensuse-su-2026:20041-1 | Security update for MozillaFirefox | 2026-01-15T16:28:43Z | 2026-01-15T16:28:43Z |
| opensuse-su-2026:20039-1 | Security update for bind | 2026-01-15T10:43:49Z | 2026-01-15T10:43:49Z |
| opensuse-su-2026:10056-1 | libwireshark19-4.6.3-1.1 on GA media | 2026-01-15T00:00:00Z | 2026-01-15T00:00:00Z |
| opensuse-su-2026:10055-1 | python311-virtualenv-20.36.1-1.1 on GA media | 2026-01-15T00:00:00Z | 2026-01-15T00:00:00Z |
| opensuse-su-2026:10054-1 | php-composer2-2.9.3-1.1 on GA media | 2026-01-15T00:00:00Z | 2026-01-15T00:00:00Z |
| opensuse-su-2026:10053-1 | ffmpeg-4-4.4.6-11.1 on GA media | 2026-01-15T00:00:00Z | 2026-01-15T00:00:00Z |
| opensuse-su-2026:10052-1 | avahi-0.8-41.1 on GA media | 2026-01-15T00:00:00Z | 2026-01-15T00:00:00Z |
| opensuse-su-2026:10051-1 | NetworkManager-applet-l2tp-1.52.0-1.1 on GA media | 2026-01-15T00:00:00Z | 2026-01-15T00:00:00Z |
| opensuse-su-2026:20038-1 | Security update for wget2 | 2026-01-14T13:23:53Z | 2026-01-14T13:23:53Z |
| opensuse-su-2026:20034-1 | Security update for tomcat | 2026-01-14T13:14:54Z | 2026-01-14T13:14:54Z |
| opensuse-su-2026:20031-1 | Security update for curl | 2026-01-14T11:01:44Z | 2026-01-14T11:01:44Z |
| opensuse-su-2026:20032-1 | Security update for haproxy | 2026-01-14T10:56:00Z | 2026-01-14T10:56:00Z |
| opensuse-su-2026:20030-1 | Security update for apache2 | 2026-01-14T10:49:51Z | 2026-01-14T10:49:51Z |
| opensuse-su-2026:20029-1 | Security update for gpg2 | 2026-01-14T10:23:16Z | 2026-01-14T10:23:16Z |
| opensuse-su-2026:20027-1 | Security update for squid | 2026-01-14T08:39:17Z | 2026-01-14T08:39:17Z |
| opensuse-su-2026:10050-1 | rke2-1.34-1.34.3+rke2r1-1.1 on GA media | 2026-01-14T00:00:00Z | 2026-01-14T00:00:00Z |
| opensuse-su-2026:10049-1 | python311-urllib3-2.6.3-1.1 on GA media | 2026-01-14T00:00:00Z | 2026-01-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2021-012-02 | EcoStruxure Power Build - Rapsody | 2021-01-12T08:32:35.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2020-353-02 | Treck HTTP Server Vulnerability on TM3 Bus Coupler Modules (V2.0) | 2020-12-18T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-05 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and Associated Communication Modules | 2020-12-08T21:04:43.000Z | 2022-09-13T20:04:43.000Z |
| sevd-2020-343-06 | Web Server on Modicon M340, Legacy Offers Modicon Quantum Modicon Premium and associated Communication Modules | 2020-12-08T09:08:01.000Z | 2020-12-08T09:08:01.000Z |
| sevd-2020-343-07 | SNMP Service on Modicon M340 and Associated Communication Modules | 2020-12-08T05:49:51.000Z | 2022-09-13T05:49:51.000Z |
| sevd-2020-343-09 | Modicon M258 Logic Controllers and SoMachine/ SoMachine Motion Software | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-08 | Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-04 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules | 2020-12-08T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-03 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (V2.0) | 2020-12-08T00:00:00.000Z | 2021-08-10T00:00:00.000Z |
| sevd-2020-343-02 | EcoStruxure Geo SCADA Expert | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-01 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and RemoteConnect™ | 2020-12-08T00:00:00.000Z | 2021-07-13T00:00:00.000Z |
| sevd-2020-315-07 | PLC Simulator on EcoStruxure™ Control Expert and Process Expert | 2020-11-10T15:07:11.000Z | 2023-03-14T15:07:11.000Z |
| sevd-2020-315-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-11-10T12:05:04.000Z | 2023-02-14T12:05:00.000Z |
| sevd-2020-315-06 | Easergy T300 | 2020-11-10T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-315-05 | Modicon M100/M200/M221 Programmable Logic Controller | 2020-11-10T00:00:00.000Z | 2021-01-12T00:00:00.000Z |
| sevd-2020-315-04 | EcoStruxure Building Operation (EBO) | 2020-11-10T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| sevd-2020-315-03 | Interactive Graphical SCADA System (IGSS) | 2020-11-10T00:00:00.000Z | 2021-04-15T00:00:00.000Z |
| sevd-2020-315-02 | EcoStruxure™ Operator Terminal Expert (Vijeo XD), Pro-face BLUE and WinGP runtime | 2020-11-09T00:00:00.000Z | 2021-01-11T00:00:00.000Z |
| sevd-2020-287-04 | EcoStruxure™ and SmartStruxure™ Power Monitoring and SCADA Software | 2020-10-13T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-287-03 | Smartlink, PowerTag, and Wiser Series Gateways | 2020-10-13T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-287-02 | Wibu-Systems CodeMeter Vulnerabilities | 2020-10-13T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-287-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-10-13T00:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2020-252-01 | SCADAPack x70 Remote Connect and SCADAPack x70 Security Administrator | 2020-09-08T00:00:00.000Z | 2021-02-09T00:00:00.000Z |
| sevd-2020-224-08 | Schneider Electric PACTware | 2020-08-11T00:00:00.000Z | 2020-08-13T00:00:00.000Z |
| sevd-2020-224-07 | SoMove | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-06 | Harmony® eXLhoist | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-05 | PowerChute Business Edition | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-04 | APC Easy UPS On-Line Software | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-03 | Modicon M218 Logic Controller | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-02 | spaceLYnk & Wiser for KNX (formerly homeLYnk) | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitea-2025-69413 | 2026-01-07T12:00:07.972Z | 2026-01-07T12:31:01.344Z | |
| bit-pytorch-2025-63396 | 2026-01-03T11:47:28.014Z | 2026-01-03T12:07:32.193Z | |
| bit-gitea-2025-68942 | 2026-01-03T11:37:48.385Z | 2026-01-03T12:07:32.193Z | |
| bit-gitea-2025-68941 | 2026-01-03T11:37:46.756Z | 2026-01-03T12:07:32.193Z | |
| bit-gitea-2025-68940 | 2026-01-03T11:37:45.335Z | 2026-01-03T12:07:32.193Z | |
| bit-gitea-2025-68939 | 2026-01-03T11:37:43.934Z | 2026-01-03T12:07:32.193Z | |
| bit-gitea-2025-68938 | 2026-01-03T11:37:42.629Z | 2026-01-03T12:07:32.193Z | |
| bit-pebble-2024-3250 | 2026-01-02T17:44:20.392Z | 2026-01-02T18:06:33.396Z | |
| bit-gitea-2025-68946 | 2026-01-01T11:37:50.117Z | 2026-01-01T12:06:33.381Z | |
| bit-gitea-2025-68945 | 2026-01-01T11:37:48.522Z | 2026-01-01T12:06:33.381Z | |
| bit-gitea-2025-68944 | 2026-01-01T11:37:47.146Z | 2026-01-01T12:06:33.381Z | |
| bit-gitea-2025-68943 | 2026-01-01T11:37:45.731Z | 2026-01-01T12:06:33.381Z | |
| bit-nifi-2025-66524 | Apache NiFi: Deserialization of Untrusted Data in GetAsanaObject Processor | 2025-12-23T11:44:08.985Z | 2025-12-23T12:07:14.245Z |
| bit-kibana-2025-68422 | Kibana Improper Authorization | 2025-12-20T11:39:27.247Z | 2025-12-20T12:06:39.262Z |
| bit-kibana-2025-68389 | Kibana Allocation of Resources Without Limits or Throttling | 2025-12-20T11:39:25.644Z | 2025-12-20T12:06:39.262Z |
| bit-kibana-2025-68387 | Kibana Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 2025-12-20T11:39:24.143Z | 2025-12-20T12:06:39.262Z |
| bit-kibana-2025-68386 | Kibana Improper Authorization | 2025-12-20T11:39:22.798Z | 2025-12-20T12:06:39.262Z |
| bit-kibana-2025-68385 | Kibana Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 2025-12-20T11:39:21.164Z | 2025-12-24T12:08:49.467Z |
| bit-haproxy-2025-11230 | Denial of service vulnerability in HAProxy mjson library | 2025-12-20T11:38:08.173Z | 2025-12-20T12:06:39.262Z |
| bit-elk-2025-68422 | Kibana Improper Authorization | 2025-12-20T11:36:41.895Z | 2025-12-20T12:06:39.262Z |
| bit-elk-2025-68389 | Kibana Allocation of Resources Without Limits or Throttling | 2025-12-20T11:36:40.368Z | 2025-12-20T12:06:39.262Z |
| bit-elk-2025-68387 | Kibana Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 2025-12-20T11:36:38.841Z | 2025-12-20T12:06:39.262Z |
| bit-elk-2025-68386 | Kibana Improper Authorization | 2025-12-20T11:36:37.419Z | 2025-12-20T12:06:39.262Z |
| bit-elasticsearch-2025-68390 | Elasticsearch Allocation of Resources Without Limits or Throttling | 2025-12-20T11:36:36.080Z | 2025-12-20T12:06:39.262Z |
| bit-elk-2025-68385 | Kibana Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 2025-12-20T11:36:36.041Z | 2025-12-24T12:08:49.467Z |
| bit-elasticsearch-2025-68384 | Elasticsearch Allocation of Resources Without Limits or Throttling | 2025-12-20T11:36:34.496Z | 2025-12-20T12:06:39.262Z |
| bit-mongodb-2025-14847 | Zlib compressed protocol header length confusion may allow memory read | 2025-12-19T11:15:49.277Z | 2025-12-30T00:15:51.160Z |
| bit-gitlab-2025-8405 | Improper Encoding or Escaping of Output in GitLab | 2025-12-18T12:06:48.009Z | 2025-12-18T12:08:20.703Z |
| bit-gitlab-2025-4097 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-12-18T12:05:44.981Z | 2025-12-18T12:08:20.703Z |
| bit-gitlab-2025-14157 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-12-18T12:04:46.334Z | 2025-12-18T12:08:20.703Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-av38242 | Cancelling a query (e | 2026-01-30T15:33:23.662793Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oi08379 | Cancelling a query (e | 2026-01-30T15:32:54.729863Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qk01721 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:32:54.211133Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rr90125 | Cancelling a query (e | 2026-01-30T15:32:53.790454Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xx70537 | Cancelling a query (e | 2026-01-30T15:32:24.053481Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-po40318 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:31:53.772564Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ry09679 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:31:53.660443Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pg91940 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:31:24.365282Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ct39828 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:31:23.928259Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ur80185 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:30:24.609590Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zo91195 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:30:24.594235Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ts42581 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:29:23.600518Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sy95837 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:28:53.594094Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fs64938 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:24:53.185811Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hx78047 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:24:23.175483Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jr37040 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:23:53.534475Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tl71584 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:23:53.438748Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-el98016 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:23:23.257385Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gs02052 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:22:23.453780Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cy03855 | tar | 2026-01-30T15:18:53.133348Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ns41924 | Within HostnameError | 2026-01-30T15:18:53.115636Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ts12850 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:17:53.937628Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rq53330 | Within HostnameError | 2026-01-30T15:17:53.658995Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rd08428 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:17:23.554517Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uu56048 | Within HostnameError | 2026-01-30T15:16:53.077326Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oj41940 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:13:53.428815Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mu17611 | tar | 2026-01-30T15:13:23.048582Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cr41732 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:12:53.150833Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kc06686 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:10:53.141957Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fn26367 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:10:23.074072Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2023-052 | 2023-11-15T14:24:12.000Z | 2023-11-15T17:19:15.000Z | |
| drupal-contrib-2023-051 | 2023-11-08T15:33:12.000Z | 2023-11-08T17:10:24.000Z | |
| drupal-contrib-2023-050 | 2023-11-08T15:30:45.000Z | 2023-11-08T17:10:18.000Z | |
| drupal-contrib-2023-049 | 2023-11-01T16:56:37.000Z | 2023-11-06T14:25:23.000Z | |
| drupal-contrib-2023-048 | 2023-10-04T15:41:34.000Z | 2023-10-04T16:35:18.000Z | |
| drupal-contrib-2023-047 | 2023-09-27T16:33:34.000Z | 2023-09-28T21:17:46.000Z | |
| drupal-contrib-2023-045 | 2023-09-13T15:47:17.000Z | 2023-09-13T17:42:33.000Z | |
| drupal-contrib-2023-044 | 2023-09-06T16:33:36.000Z | 2023-09-18T14:27:44.000Z | |
| drupal-contrib-2023-043 | 2023-09-06T15:23:32.000Z | 2023-09-06T16:48:26.000Z | |
| drupal-contrib-2023-042 | 2023-08-30T16:23:18.000Z | 2023-08-30T18:51:57.000Z | |
| drupal-contrib-2023-041 | 2023-08-30T16:22:06.000Z | 2023-08-30T18:51:23.000Z | |
| drupal-contrib-2023-040 | 2023-08-23T17:24:02.000Z | 2023-08-23T18:28:12.000Z | |
| drupal-contrib-2023-039 | 2023-08-23T17:06:18.000Z | 2023-08-23T18:28:35.000Z | |
| drupal-contrib-2023-038 | 2023-08-23T17:00:14.000Z | 2023-08-23T18:47:17.000Z | |
| drupal-contrib-2023-037 | 2023-08-23T16:54:32.000Z | 2023-08-23T18:29:48.000Z | |
| drupal-contrib-2023-035 | 2023-08-23T14:54:52.000Z | 2023-08-23T18:45:59.000Z | |
| drupal-contrib-2023-034 | 2023-08-23T14:51:16.000Z | 2023-08-23T18:45:47.000Z | |
| drupal-contrib-2023-033 | 2023-08-02T18:59:27.000Z | 2023-08-02T19:52:35.000Z | |
| drupal-contrib-2023-032 | 2023-07-26T19:19:38.000Z | 2023-07-26T20:00:09.000Z | |
| drupal-contrib-2023-031 | 2023-07-26T19:15:46.000Z | 2023-07-27T16:05:03.000Z | |
| drupal-contrib-2023-030 | 2023-07-12T18:19:42.000Z | 2023-07-12T18:39:39.000Z | |
| drupal-contrib-2023-029 | 2023-06-28T17:34:47.000Z | 2023-07-31T21:18:37.000Z | |
| drupal-contrib-2023-028 | 2023-06-28T17:21:37.000Z | 2023-07-31T21:17:11.000Z | |
| drupal-contrib-2023-027 | 2023-06-28T17:15:03.000Z | 2023-07-31T21:17:46.000Z | |
| drupal-contrib-2023-026 | 2023-06-28T17:11:07.000Z | 2023-08-10T13:49:56.000Z | |
| drupal-contrib-2023-025 | 2023-06-28T17:10:15.000Z | 2023-10-26T13:22:52.000Z | |
| drupal-contrib-2023-024 | 2023-06-28T17:03:36.000Z | 2023-08-10T13:40:55.000Z | |
| drupal-contrib-2023-023 | 2023-06-28T17:02:13.000Z | 2023-08-10T13:53:00.000Z | |
| drupal-contrib-2023-021 | 2023-06-21T17:03:14.000Z | 2023-08-10T13:53:57.000Z | |
| drupal-contrib-2023-020 | 2023-06-14T14:52:36.000Z | 2023-08-10T13:54:32.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-06086 | Tenda AX1806 sub_65B5C函数栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06085 | Tenda AX1806 sub_65B5C函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06084 | Tenda AX1806 sub_65A28函数栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06082 | GPAC vobsub_get_subpic_duration函数缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06081 | GPAC uncv_parse_config函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06080 | GPAC dump_ttxt_sample函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06079 | GPAC pcmreframe_flush_packet函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06078 | GPAC oggdmx_parse_tags函数越界读取漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06077 | GPAC avi_parse_input_file函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06076 | GPAC ghi_dmx_declare_opid_bin函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06075 | GPAC越界读取漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06074 | GPAC vorbis_to_intern函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06073 | GPAC堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-05118 | Kentico Xperience跨站脚本漏洞(CNVD-2026-05118) | 2026-01-19 | 2026-01-20 |
| cnvd-2026-04539 | Tenda AX-1806路由器栈溢出漏洞 | 2026-01-16 | 2026-01-16 |
| cnvd-2026-09797 | Apache SIS XML外部实体注入漏洞 | 2026-01-15 | 2026-02-04 |
| cnvd-2026-04663 | PHPEMS跨站请求伪造漏洞 | 2026-01-15 | 2026-01-16 |
| cnvd-2026-04541 | Open5GS GTPv2-C拒绝服务漏洞 | 2026-01-15 | 2026-01-16 |
| cnvd-2026-04540 | Open5GS GTPv2-C F-TEID s11-handler.c sgwc_s11_handle_create_session_request拒绝服务漏洞 | 2026-01-15 | 2026-01-16 |
| cnvd-2026-09798 | Apache NiFi代码问题漏洞(CNVD-2026-09798) | 2026-01-14 | 2026-02-04 |
| cnvd-2026-08442 | iccDEV SIccCalcOp::ArgsPushed函数类型混淆漏洞 | 2026-01-14 | 2026-01-26 |
| cnvd-2026-08441 | iccDEV CIccProfileXml::ParseBasic函数类型混淆漏洞 | 2026-01-14 | 2026-01-26 |
| cnvd-2026-08440 | iccDEV CIccTagXmlTagData::ToXml函数类型混淆漏洞 | 2026-01-14 | 2026-01-26 |
| cnvd-2026-08439 | iccDEV CIccTag:IsTypeCompressed函数类型混淆漏洞 | 2026-01-14 | 2026-01-26 |
| cnvd-2026-08438 | iccDEV ToXmlCurve函数类型混淆漏洞 | 2026-01-14 | 2026-01-26 |
| cnvd-2026-08437 | iccDEV CIccSegmentedCurveXml::ToXml函数类型混淆漏洞 | 2026-01-14 | 2026-01-26 |
| cnvd-2026-08436 | iccDEV icStatusCMM::CIccEvalCompare::EvaluateProfile函数类型混淆漏洞 | 2026-01-14 | 2026-01-26 |
| cnvd-2026-07956 | iccDEV CIccProfileXml::ParseBasic函数堆缓冲区溢出漏洞 | 2026-01-14 | 2026-01-27 |
| cnvd-2026-07955 | iccDEV SIccCalcOp::Describe函数堆缓冲区溢出漏洞 | 2026-01-14 | 2026-01-27 |
| cnvd-2026-07112 | IBM Concert信息泄露漏洞 | 2026-01-14 | 2026-01-23 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0017 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| certfr-2026-avi-0016 | Vulnérabilité dans les produits Moxa | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| certfr-2026-avi-0015 | Multiples vulnérabilités dans les produits Centreon | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| certfr-2026-avi-0014 | Multiples vulnérabilités dans GitLab | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| certfr-2026-avi-0013 | Vulnérabilité dans Tenable Nessus Agent | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| certfr-2026-avi-0012 | Multiples vulnérabilités dans Trend Micro Apex Central | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| certfr-2026-avi-0011 | Vulnérabilité dans Google Android | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| certfr-2026-avi-0010 | Multiples vulnérabilités dans Curl | 2026-01-07T00:00:00.000000 | 2026-01-07T00:00:00.000000 |
| certfr-2026-avi-0009 | Vulnérabilité dans Google Chrome | 2026-01-07T00:00:00.000000 | 2026-01-07T00:00:00.000000 |
| certfr-2026-avi-0008 | Multiples vulnérabilités dans Joomla! | 2026-01-07T00:00:00.000000 | 2026-01-07T00:00:00.000000 |
| certfr-2026-avi-0007 | Vulnérabilité dans Stormshield Network Security | 2026-01-06T00:00:00.000000 | 2026-01-06T00:00:00.000000 |
| certfr-2026-avi-0006 | Multiples vulnérabilités dans Veeam Backup & Replication | 2026-01-06T00:00:00.000000 | 2026-01-06T00:00:00.000000 |
| certfr-2026-avi-0005 | Multiples vulnérabilités dans Centreon Open Tickets | 2026-01-06T00:00:00.000000 | 2026-01-06T00:00:00.000000 |
| certfr-2026-avi-0004 | Vulnérabilité dans MariaDB | 2026-01-05T00:00:00.000000 | 2026-01-05T00:00:00.000000 |
| certfr-2026-avi-0003 | Multiples vulnérabilités dans les produits Qnap | 2026-01-05T00:00:00.000000 | 2026-01-05T00:00:00.000000 |
| certfr-2026-avi-0002 | Multiples vulnérabilités dans les produits IBM | 2026-01-02T00:00:00.000000 | 2026-01-02T00:00:00.000000 |
| certfr-2026-avi-0001 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-02T00:00:00.000000 | 2026-01-02T00:00:00.000000 |
| certfr-2025-avi-1142 | Multiples vulnérabilités dans Moxa NPort | 2025-12-31T00:00:00.000000 | 2025-12-31T00:00:00.000000 |
| certfr-2025-avi-1141 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1140 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1139 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1138 | Multiples vulnérabilités dans VMware Tanzu Platform | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1137 | Multiples vulnérabilités dans les produits IBM | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1136 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1135 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1134 | Multiples vulnérabilités dans MongoDB Server | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1133 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1132 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1131 | Multiples vulnérabilités dans les produits IBM | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1130 | Multiples vulnérabilités dans les produits Foxit | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2011-ale-007 | Vulnérabilité dans ftpd et ProFTPD sur FreeBSD | 2011-12-02T00:00:00.000000 | 2011-12-26T00:00:00.000000 |
| certa-2011-ale-006 | Exploitation d'une vulnérabilité dans la gestion des polices TrueType sur Windows | 2011-11-04T00:00:00.000000 | 2011-12-14T00:00:00.000000 |
| certa-2011-ale-005 | Exploitation malveillante d'une fonctionnalité du protocole SSL afin de provoquer un déni de service | 2011-10-27T00:00:00.000000 | 2011-10-27T00:00:00.000000 |
| certa-2011-ale-004 | Vulnérabilités dans Apple iOS | 2011-07-05T00:00:00.000000 | 2011-07-18T00:00:00.000000 |
| certa-2011-ale-003 | Vulnérabilité dans Adobe Flash Player, Adobe Reader et Acrobat | 2011-04-12T00:00:00.000000 | 2011-06-20T00:00:00.000000 |
| certa-2011-ale-002 | Vulnérabilité dans Adobe Flash Player, Adobe Reader et Acrobat | 2011-03-15T00:00:00.000000 | 2011-03-22T00:00:00.000000 |
| certa-2011-ale-001 | Vulnérabilité dans le moteur de rendu graphique de Windows | 2011-01-05T00:00:00.000000 | 2011-02-10T00:00:00.000000 |
| certa-2010-ale-021 | Vulnérabilité dans Microsoft Internet Explorer | 2010-12-22T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2010-ale-020 | Vulnérabilité dans Adobe Reader et Acrobat | 2010-11-05T00:00:00.000000 | 2010-11-17T00:00:00.000000 |
| certa-2010-ale-019 | Vulnérabilité dans Microsoft Internet Explorer | 2010-11-03T00:00:00.000000 | 2010-12-17T00:00:00.000000 |
| certa-2010-ale-018 | Vulnérabilité dans Adobe Flash Player, Adobe Reader et Acrobat | 2010-10-28T00:00:00.000000 | 2010-11-18T00:00:00.000000 |
| certa-2010-ale-017 | Vulnérabilité dans Mozilla Firefox | 2010-10-27T00:00:00.000000 | 2010-10-28T00:00:00.000000 |
| certa-2010-ale-016 | Vulnérabilité Adobe Shockwave Player | 2010-10-22T00:00:00.000000 | 2010-10-29T00:00:00.000000 |
| certa-2010-ale-015 | Vulnérabilité dans Adobe Flash Player | 2010-09-14T00:00:00.000000 | 2010-09-21T00:00:00.000000 |
| certa-2010-ale-014 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-09-09T00:00:00.000000 | 2010-10-06T00:00:00.000000 |
| certa-2010-ale-013 | Vulnérabilité dans le contrôle ActiveX Apple QuickTime | 2010-08-31T00:00:00.000000 | 2010-09-17T00:00:00.000000 |
| certa-2010-ale-012 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-08-06T00:00:00.000000 | 2010-08-20T00:00:00.000000 |
| certa-2010-ale-011 | Vulnérabilités dans Apple iOS | 2010-08-04T00:00:00.000000 | 2010-08-12T00:00:00.000000 |
| certa-2010-ale-010 | Vulnérabilité dans le Shell de Microsoft Windows | 2010-07-19T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| certa-2010-ale-009 | Exploitation par un code malveillant d'une vulnérabilité Microsoft Windows non corrigée | 2010-07-16T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| certa-2010-ale-008 | Vulnérabilité dans le Centre d'aide et de support Windows | 2010-06-10T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| certa-2010-ale-007 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2010-06-05T00:00:00.000000 | 2010-06-30T00:00:00.000000 |
| certa-2010-ale-006 | Vulnérabilité de Safari | 2010-05-14T00:00:00.000000 | 2010-05-27T00:00:00.000000 |
| certa-2010-ale-005 | Vulnérabilité dans Java Deployment Toolkit | 2010-04-09T00:00:00.000000 | 2010-04-16T00:00:00.000000 |
| certa-2010-ale-004 | Vulnérabilité dans Microsoft Internet Explorer | 2010-03-10T00:00:00.000000 | 2010-03-31T00:00:00.000000 |
| certa-2010-ale-003 | Vulnérabilité dans Microsoft VBScript | 2010-03-02T00:00:00.000000 | 2010-04-13T00:00:00.000000 |
| certa-2010-ale-002 | Vulnérabilité dans le sous-système MS-DOS de Microsoft Windows | 2010-01-21T00:00:00.000000 | 2010-02-10T00:00:00.000000 |
| certa-2010-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2010-01-15T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| certa-2009-ale-023 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-12-15T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2009-ale-022 | Vulnérabilité dans TANDBERG MXP | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |