Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-28425 |
8 (3.1)
|
Statamic vulnerable to remote code execution via Antle… |
statamic |
cms |
2026-02-27T22:20:39.735Z | 2026-02-27T22:20:39.735Z |
| CVE-2026-27759 |
5.3 (4.0)
|
Featured Image from Content < 1.7 Authenticated SSRF v… |
Dhrumil Kumbhani |
Featured Image from Content |
2026-02-27T22:17:11.669Z | 2026-02-27T22:17:11.669Z |
| CVE-2026-28424 |
6.5 (3.1)
|
Statamic's missing authorization allows access to emai… |
statamic |
cms |
2026-02-27T22:14:01.779Z | 2026-02-27T22:14:01.779Z |
| CVE-2026-28517 |
9.3 (4.0)
|
openDCIM <= 23.04 OS Command Injection via dot Configu… |
openDCIM |
openDCIM |
2026-02-27T22:12:08.889Z | 2026-02-27T22:12:08.889Z |
| CVE-2026-28423 |
6.8 (3.1)
|
Statamic Vulnerable to Server-Side Request Forgery via Glide |
statamic |
cms |
2026-02-27T22:11:55.802Z | 2026-02-27T22:11:55.802Z |
| CVE-2026-28516 |
9.3 (4.0)
|
openDCIM <= 23.04 SQL Injection in Config::UpdateParameter |
openDCIM |
openDCIM |
2026-02-27T22:11:52.246Z | 2026-02-27T22:11:52.246Z |
| CVE-2026-28515 |
9.3 (4.0)
|
openDCIM <= 23.04 Missing Authorization in install.php |
openDCIM |
openDCIM |
2026-02-27T22:11:37.303Z | 2026-02-27T22:11:37.303Z |
| CVE-2026-28422 |
2.2 (3.1)
|
Vim has stack-buffer-overflow in build_stl_str_hl() |
vim |
vim |
2026-02-27T22:08:11.384Z | 2026-02-27T22:08:11.384Z |
| CVE-2026-28421 |
5.3 (3.1)
|
Vim has a heap-buffer-overflow and a segmentation fault |
vim |
vim |
2026-02-27T22:06:34.312Z | 2026-02-27T22:06:34.312Z |
| CVE-2026-28420 |
4.4 (3.1)
|
Vim has Heap-based Buffer Overflow and OOB Read in :terminal |
vim |
vim |
2026-02-27T22:04:36.189Z | 2026-02-27T22:04:36.189Z |
| CVE-2026-28419 |
5.3 (3.1)
|
Vim has Heap-based Buffer Underflow in Emacs tags parsing |
vim |
vim |
2026-02-27T22:02:55.952Z | 2026-02-27T22:02:55.952Z |
| CVE-2026-28418 |
4.4 (3.1)
|
Vim has Heap-based Buffer Overflow in Emacs tags parsing |
vim |
vim |
2026-02-27T21:58:37.277Z | 2026-02-27T21:58:37.277Z |
| CVE-2026-28417 |
4.4 (3.1)
|
Vim has OS Command Injection in netrw |
vim |
vim |
2026-02-27T21:54:35.196Z | 2026-02-27T21:54:35.196Z |
| CVE-2026-28411 |
9.8 (3.1)
|
WeGIA Vulnerable to Authentication Bypass via `extract… |
LabRedesCefetRJ |
WeGIA |
2026-02-27T21:52:05.032Z | 2026-02-27T21:52:05.032Z |
| CVE-2026-28409 |
10 (3.1)
|
WeGIA Vulnerable to Remote Code Execution (RCE) via OS… |
LabRedesCefetRJ |
WeGIA |
2026-02-27T21:50:21.849Z | 2026-02-27T21:50:21.849Z |
| CVE-2026-28408 |
9.8 (3.1)
|
WeGIA lacks authentication verification in adicionar_t… |
LabRedesCefetRJ |
WeGIA |
2026-02-27T21:49:14.747Z | 2026-02-27T21:49:14.747Z |
| CVE-2026-28416 |
8.2 (3.1)
|
Gradio has SSRF via Malicious `proxy_url` Injection in… |
gradio-app |
gradio |
2026-02-27T21:47:04.975Z | 2026-02-27T21:47:04.975Z |
| CVE-2026-28415 |
4.3 (3.1)
|
Gradio has Open Redirect in OAuth Flow |
gradio-app |
gradio |
2026-02-27T21:44:51.956Z | 2026-02-27T21:44:51.956Z |
| CVE-2026-28414 |
7.5 (3.1)
|
Gradio has Absolute Path Traversal on Windows with Pyt… |
gradio-app |
gradio |
2026-02-27T21:43:28.453Z | 2026-02-27T21:43:28.453Z |
| CVE-2026-27167 |
0 (3.1)
|
Gradio: Mocked OAuth Login Exposes Server Credentials … |
gradio-app |
gradio |
2026-02-27T21:40:57.917Z | 2026-02-27T21:40:57.917Z |
| CVE-2026-27939 |
8.8 (3.1)
|
Statamic allows Authenticated Control Panel users to e… |
statamic |
cms |
2026-02-27T21:34:39.107Z | 2026-02-27T21:34:39.107Z |
| CVE-2026-28407 |
6.9 (4.0)
|
malcontent's nested archive extraction failure can dro… |
chainguard-dev |
malcontent |
2026-02-27T21:28:06.258Z | 2026-02-27T21:28:06.258Z |
| CVE-2026-28406 |
8.2 (3.1)
|
kaniko has tar archive path traversal in build context… |
chainguard-forks |
kaniko |
2026-02-27T21:20:52.764Z | 2026-02-27T21:20:52.764Z |
| CVE-2026-28402 |
7.1 (3.1)
|
nimiq/core-rs-albatross's nimiq-blockchain missing pro… |
nimiq |
core-rs-albatross |
2026-02-27T21:08:53.573Z | 2026-02-27T21:08:53.573Z |
| CVE-2026-28400 |
7.6 (3.1)
|
Docker Model Runner Unauthenticated Runtime Flag Injec… |
docker |
model-runner |
2026-02-27T21:06:12.418Z | 2026-02-27T21:06:12.418Z |
| CVE-2026-28355 |
1.3 (4.0)
|
"PWA" Canarytoken Vulnerable to Stored Self Cross-Site… |
thinkst |
canarytokens |
2026-02-27T21:04:13.445Z | 2026-02-27T21:04:13.445Z |
| CVE-2026-28352 |
6.5 (3.1)
|
Indico missing access check in event series management API |
indico |
indico |
2026-02-27T21:01:45.740Z | 2026-02-27T21:01:45.740Z |
| CVE-2026-28351 |
6.9 (4.0)
|
Manipulated RunLengthDecode streams can exhaust RAM |
py-pdf |
pypdf |
2026-02-27T20:59:16.839Z | 2026-02-27T20:59:16.839Z |
| CVE-2026-28338 |
6.8 (3.1)
|
PMD Designer has Stored XSS in VBHTMLRenderer and YAHT… |
pmd |
pmd |
2026-02-27T20:28:05.739Z | 2026-02-27T20:28:05.739Z |
| CVE-2026-28288 |
5.5 (4.0)
|
Dify has a user enumeration issue |
langgenius |
dify |
2026-02-27T20:25:24.599Z | 2026-02-27T20:45:44.126Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-28422 |
2.2 (3.1)
|
Vim has stack-buffer-overflow in build_stl_str_hl() |
vim |
vim |
2026-02-27T22:08:11.384Z | 2026-02-27T22:08:11.384Z |
| CVE-2026-28421 |
5.3 (3.1)
|
Vim has a heap-buffer-overflow and a segmentation fault |
vim |
vim |
2026-02-27T22:06:34.312Z | 2026-02-27T22:06:34.312Z |
| CVE-2026-28420 |
4.4 (3.1)
|
Vim has Heap-based Buffer Overflow and OOB Read in :terminal |
vim |
vim |
2026-02-27T22:04:36.189Z | 2026-02-27T22:04:36.189Z |
| CVE-2026-28419 |
5.3 (3.1)
|
Vim has Heap-based Buffer Underflow in Emacs tags parsing |
vim |
vim |
2026-02-27T22:02:55.952Z | 2026-02-27T22:02:55.952Z |
| CVE-2026-28418 |
4.4 (3.1)
|
Vim has Heap-based Buffer Overflow in Emacs tags parsing |
vim |
vim |
2026-02-27T21:58:37.277Z | 2026-02-27T21:58:37.277Z |
| CVE-2026-28417 |
4.4 (3.1)
|
Vim has OS Command Injection in netrw |
vim |
vim |
2026-02-27T21:54:35.196Z | 2026-02-27T21:54:35.196Z |
| CVE-2026-28416 |
8.2 (3.1)
|
Gradio has SSRF via Malicious `proxy_url` Injection in… |
gradio-app |
gradio |
2026-02-27T21:47:04.975Z | 2026-02-27T21:47:04.975Z |
| CVE-2026-28415 |
4.3 (3.1)
|
Gradio has Open Redirect in OAuth Flow |
gradio-app |
gradio |
2026-02-27T21:44:51.956Z | 2026-02-27T21:44:51.956Z |
| CVE-2026-28414 |
7.5 (3.1)
|
Gradio has Absolute Path Traversal on Windows with Pyt… |
gradio-app |
gradio |
2026-02-27T21:43:28.453Z | 2026-02-27T21:43:28.453Z |
| CVE-2026-28411 |
9.8 (3.1)
|
WeGIA Vulnerable to Authentication Bypass via `extract… |
LabRedesCefetRJ |
WeGIA |
2026-02-27T21:52:05.032Z | 2026-02-27T21:52:05.032Z |
| CVE-2026-28409 |
10 (3.1)
|
WeGIA Vulnerable to Remote Code Execution (RCE) via OS… |
LabRedesCefetRJ |
WeGIA |
2026-02-27T21:50:21.849Z | 2026-02-27T21:50:21.849Z |
| CVE-2026-28408 |
9.8 (3.1)
|
WeGIA lacks authentication verification in adicionar_t… |
LabRedesCefetRJ |
WeGIA |
2026-02-27T21:49:14.747Z | 2026-02-27T21:49:14.747Z |
| CVE-2026-28407 |
6.9 (4.0)
|
malcontent's nested archive extraction failure can dro… |
chainguard-dev |
malcontent |
2026-02-27T21:28:06.258Z | 2026-02-27T21:28:06.258Z |
| CVE-2026-28406 |
8.2 (3.1)
|
kaniko has tar archive path traversal in build context… |
chainguard-forks |
kaniko |
2026-02-27T21:20:52.764Z | 2026-02-27T21:20:52.764Z |
| CVE-2026-28402 |
7.1 (3.1)
|
nimiq/core-rs-albatross's nimiq-blockchain missing pro… |
nimiq |
core-rs-albatross |
2026-02-27T21:08:53.573Z | 2026-02-27T21:08:53.573Z |
| CVE-2026-28400 |
7.6 (3.1)
|
Docker Model Runner Unauthenticated Runtime Flag Injec… |
docker |
model-runner |
2026-02-27T21:06:12.418Z | 2026-02-27T21:06:12.418Z |
| CVE-2026-27939 |
8.8 (3.1)
|
Statamic allows Authenticated Control Panel users to e… |
statamic |
cms |
2026-02-27T21:34:39.107Z | 2026-02-27T21:34:39.107Z |
| CVE-2026-27167 |
0 (3.1)
|
Gradio: Mocked OAuth Login Exposes Server Credentials … |
gradio-app |
gradio |
2026-02-27T21:40:57.917Z | 2026-02-27T21:40:57.917Z |
| CVE-2026-28355 |
1.3 (4.0)
|
"PWA" Canarytoken Vulnerable to Stored Self Cross-Site… |
thinkst |
canarytokens |
2026-02-27T21:04:13.445Z | 2026-02-27T21:04:13.445Z |
| CVE-2026-28352 |
6.5 (3.1)
|
Indico missing access check in event series management API |
indico |
indico |
2026-02-27T21:01:45.740Z | 2026-02-27T21:01:45.740Z |
| CVE-2026-28351 |
6.9 (4.0)
|
Manipulated RunLengthDecode streams can exhaust RAM |
py-pdf |
pypdf |
2026-02-27T20:59:16.839Z | 2026-02-27T20:59:16.839Z |
| CVE-2026-28338 |
6.8 (3.1)
|
PMD Designer has Stored XSS in VBHTMLRenderer and YAHT… |
pmd |
pmd |
2026-02-27T20:28:05.739Z | 2026-02-27T20:28:05.739Z |
| CVE-2026-28288 |
5.5 (4.0)
|
Dify has a user enumeration issue |
langgenius |
dify |
2026-02-27T20:25:24.599Z | 2026-02-27T20:45:44.126Z |
| CVE-2026-28272 |
8.1 (3.1)
|
Kiteworks Email Protection Gateway has a Cross-site Sc… |
kiteworks |
security-advisories |
2026-02-27T20:22:59.656Z | 2026-02-27T20:22:59.656Z |
| CVE-2026-28271 |
6.5 (3.1)
|
Kiteworks Core is vulnerable to Server-Side Request Fo… |
kiteworks |
security-advisories |
2026-02-27T20:21:12.194Z | 2026-02-27T20:21:29.444Z |
| CVE-2026-28270 |
4.9 (3.1)
|
Kiteworks Core has an Unrestricted Upload of File with… |
kiteworks |
security-advisories |
2026-02-27T20:19:54.611Z | 2026-02-27T20:19:54.611Z |
| CVE-2026-28268 |
9.8 (3.1)
|
Vikunja Vulnerable to Account Takeover via Password Re… |
go-vikunja |
vikunja |
2026-02-27T20:16:29.842Z | 2026-02-27T20:16:29.842Z |
| CVE-2018-25160 |
N/A
|
HTTP::Session2 versions through 1.09 for Perl does not… |
TOKUHIROM |
HTTP::Session2 |
2026-02-27T20:15:31.418Z | 2026-02-27T20:15:31.418Z |
| CVE-2026-3255 |
N/A
|
HTTP::Session2 versions before 1.12 for Perl may gener… |
TOKUHIROM |
HTTP::Session2 |
2026-02-27T20:12:35.414Z | 2026-02-27T20:12:35.414Z |
| CVE-2026-28354 |
5.7 (4.0)
|
ClipBucket v5 has IDOR in Collection Item Management |
MacWarrior |
clipbucket-v5 |
2026-02-27T19:18:25.500Z | 2026-02-27T20:23:22.876Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-j273-m5qq-6825 |
5.9 (3.1)
|
Junrar has an arbitrary file write due to backslash Path Traversal bypass in LocalFolderExtractor o… | 2026-02-27T22:09:27Z | 2026-02-27T22:09:27Z |
| ghsa-7jx5-9fjg-hp4m |
6.0 (4.0)
|
OpenClaw ACP client has permission auto-approval bypass via untrusted tool metadata | 2026-02-27T22:08:36Z | 2026-02-27T22:08:36Z |
| ghsa-82g8-464f-2mv7 |
5.1 (4.0)
|
OpenClaw: Skill env override host env injection via applySkillConfigEnvOverrides (defense-in-depth) | 2026-02-27T21:36:17Z | 2026-02-27T21:36:17Z |
| ghsa-rw9x-pxqx-q789 |
8.8 (3.1)
|
Statamic allows Authenticated Control Panel users to escalate privileges via elevated session bypass | 2026-02-27T21:35:00Z | 2026-02-27T21:35:00Z |
| ghsa-7777-fhq9-592v |
2.1 (4.0)
|
ZITADEL has potential SSRF via Actions | 2026-02-27T21:33:54Z | 2026-02-27T21:33:54Z |
| ghsa-hg4g-pqvm-c557 |
|
HTTP::Session2 versions through 1.09 for Perl does not validate the format of user provided session… | 2026-02-27T21:31:22Z | 2026-02-27T21:31:22Z |
| ghsa-9m8f-2x73-hmhp |
4.3 (3.1)
5.1 (4.0)
|
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a cross-site request forgery vul… | 2026-02-27T21:31:22Z | 2026-02-27T21:31:22Z |
| ghsa-5cgj-fvvm-2jc2 |
2.7 (3.1)
|
Out-of-bound read vulnerability in VMware Workstation 25H1 and below on any platform allows an acto… | 2026-02-27T21:31:22Z | 2026-02-27T21:31:22Z |
| ghsa-4gmm-r9mc-3p3g |
7.1 (3.1)
7.1 (4.0)
|
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain an authentication vulnerability … | 2026-02-27T21:31:22Z | 2026-02-27T21:31:22Z |
| ghsa-2p7f-7xjf-8q9q |
|
HTTP::Session2 versions before 1.12 for Perl for Perl may generate weak session ids using the rand(… | 2026-02-27T21:31:22Z | 2026-02-27T21:31:22Z |
| ghsa-x27g-4qrq-h538 |
6.5 (3.1)
6.9 (4.0)
|
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 use the cryptographically broken MD5 has… | 2026-02-27T21:31:21Z | 2026-02-27T21:31:21Z |
| ghsa-pgqj-4vx9-9f56 |
9.8 (3.1)
9.3 (4.0)
|
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a weak session identifier genera… | 2026-02-27T21:31:21Z | 2026-02-27T21:31:21Z |
| ghsa-jm5v-cr99-76mr |
5.0 (3.1)
|
Out-of-bound write vulnerability in VMware Workstation 25H1 and below on any platform allows an act… | 2026-02-27T21:31:21Z | 2026-02-27T21:31:21Z |
| ghsa-8m37-836g-p9g7 |
6.1 (3.1)
5.1 (4.0)
|
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a reflected cross-site scripting… | 2026-02-27T21:31:21Z | 2026-02-27T21:31:21Z |
| ghsa-282g-fhmx-xf54 |
8.2 (4.0)
|
ZITADEL Users Can Self-Verify Email/Phone via UpdateHumanUser API | 2026-02-27T21:26:46Z | 2026-02-27T21:26:46Z |
| ghsa-6mq3-xmgp-pjm5 |
4.3 (3.1)
|
ZITADEL's truncated opaque tokens are still valid | 2026-02-27T21:22:00Z | 2026-02-27T21:22:00Z |
| ghsa-w22q-m2fm-x9f4 |
7.5 (3.1)
|
phpMyFAQ Allows Unauthenticated Account Creation via WebAuthn Prepare Endpoint | 2026-02-27T21:01:58Z | 2026-02-27T21:01:58Z |
| ghsa-phwh-4f42-gwf3 |
6.5 (3.1)
|
Beszel: Docker API has a Path Traversal Vulnerability via Unsanitized Container ID | 2026-02-27T21:01:05Z | 2026-02-27T21:01:05Z |
| ghsa-qmjj-p7m9-wjrv |
5.7 (4.0)
|
@actual-app/sync-server: Missing authorization in sync endpoints allows cross-user budget file acce… | 2026-02-27T19:29:46Z | 2026-02-27T19:29:46Z |
| ghsa-86vq-ccwf-rm62 |
7.5 (3.1)
|
Umbraco.Engage.Forms Allows Unauthorized Access to Multiple API Endpoints | 2026-02-27T18:35:57Z | 2026-02-27T18:35:57Z |
| ghsa-prjf-86w9-mfqv |
6.1 (3.1)
7.0 (4.0)
|
Angular i18n vulnerable to Cross-Site Scripting | 2026-02-27T18:33:16Z | 2026-02-27T18:33:16Z |
| ghsa-xxc3-jv86-6hxx |
8.2 (3.1)
8.8 (4.0)
|
osCommerce 2.3.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to … | 2026-02-27T18:31:06Z | 2026-02-27T18:31:06Z |
| ghsa-xp4w-rp7m-jgwq |
5.9 (3.1)
8.2 (4.0)
|
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over… | 2026-02-27T18:31:06Z | 2026-02-27T18:31:06Z |
| ghsa-pr7p-x9q9-qph3 |
8.2 (3.1)
8.8 (4.0)
|
osCommerce 2.3.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to … | 2026-02-27T18:31:06Z | 2026-02-27T18:31:06Z |
| ghsa-p7f5-m66f-fmfw |
8.2 (3.1)
8.8 (4.0)
|
Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manip… | 2026-02-27T18:31:06Z | 2026-02-27T18:31:06Z |
| ghsa-jw6x-gh8v-8x7w |
8.2 (3.1)
8.8 (4.0)
|
Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manip… | 2026-02-27T18:31:06Z | 2026-02-27T18:31:06Z |
| ghsa-jq67-r98p-22qp |
6.5 (3.1)
6.9 (4.0)
|
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain an authentication bypass vulnera… | 2026-02-27T18:31:06Z | 2026-02-27T18:31:06Z |
| ghsa-jfrq-hj9f-c8qx |
8.3 (3.1)
|
CleverTap Web SDK version 1.15.2 and earlier is vulnerable to DOM-based Cross-Site Scripting (XSS) … | 2026-02-27T18:31:06Z | 2026-02-27T21:31:21Z |
| ghsa-j5mf-6rh3-rhgg |
8.3 (3.1)
|
CleverTap Web SDK version 1.15.2 and earlier is vulnerable to Cross-Site Scripting (XSS) via window… | 2026-02-27T18:31:06Z | 2026-02-27T21:31:21Z |
| ghsa-j48f-gjx4-8g9f |
9.8 (3.1)
9.3 (4.0)
|
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a default credentials vulnerabil… | 2026-02-27T18:31:06Z | 2026-02-27T18:31:06Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2026-1 |
|
A PyPI user account compromised by an attacker and was able to upload a malicious version… | dydx-v4-client | 2026-01-28T21:09:02+00:00 | |
| pysec-2025-72 |
|
The `num2words` project was compromised via a phishing attack and two new versions were u… | num2words | 2025-07-31T14:34:47+00:00 | |
| pysec-2025-71 |
|
Cadwyn creates production-ready community-driven modern Stripe-like API versioning in Fas… | cadwyn | 2025-07-21T21:15:25+00:00 | 2025-07-23T15:24:03.825615+00:00 |
| pysec-2025-69 |
|
In Roundup before 2.5.0, XSS can occur via interaction between URLs and issue tracker tem… | roundup | 2025-07-13T20:15:25+00:00 | 2025-07-13T21:23:01.161315+00:00 |
| pysec-2025-65 |
|
A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0… | llama-index | 2025-07-07T13:15:28+00:00 | 2025-07-07T15:23:42.730681+00:00 |
| pysec-2025-61 |
|
Pillow is a Python imaging library. In versions 11.2.0 to before 11.3.0, there is a heap … | pillow | 2025-07-01T19:15:27Z | 2025-07-07T14:12:46.226030Z |
| pysec-2025-51 |
|
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) v… | apache-airflow-providers-snowflake | 2025-06-24T08:15:24+00:00 | 2025-06-26T21:23:03.132527+00:00 |
| pysec-2025-70 |
10.0 (3.1)
|
A Server-Side Request Forgery (SSRF) vulnerability exists in the RequestsToolkit componen… | langchain-community | 2025-06-23T21:15:25+00:00 | 2025-07-16T21:23:40.211079+00:00 |
| pysec-2025-52 |
|
gateway_proxy_handler in MLflow before 3.1.0 lacks gateway_path validation. | mlflow | 2025-06-23T15:15:29Z | 2025-12-05T13:25:55.146081Z |
| pysec-2025-68 |
8.0 (3.1)
|
A vulnerability, which was classified as critical, has been found in Upsonic up to 0.55.6… | upsonic | 2025-06-19T21:15:27+00:00 | 2025-07-08T19:22:27.449399+00:00 |
| pysec-2025-67 |
9.8 (3.1)
|
A vulnerability classified as critical was found in Upsonic up to 0.55.6. This vulnerabil… | upsonic | 2025-06-19T21:15:27+00:00 | 2025-07-08T19:22:27.385619+00:00 |
| pysec-2025-64 |
9.8 (3.1)
|
A vulnerability classified as critical has been found in themanojdesai python-a2a up to 0… | python-a2a | 2025-06-17T07:15:18+00:00 | 2025-07-02T21:23:13.806273+00:00 |
| pysec-2025-47 |
|
An issue was discovered in Django 5.2 before 5.2.2, 5.1 before 5.1.10, and 4.2 before 4.2… | django | 2025-06-05T03:15:25+00:00 | 2025-06-05T05:23:28.296596+00:00 |
| pysec-2025-44 |
|
django-helpdesk before 1.0.0 allows Sensitive Data Exposure because of os.umask(0) in mod… | django-helpdesk | 2025-05-31T01:15:19+00:00 | 2025-05-31T03:09:35.357757+00:00 |
| pysec-2025-55 |
|
vLLM is an inference and serving engine for large language models (LLMs). Version 0.8.0 u… | vllm | 2025-05-30T19:15:30+00:00 | 2025-06-26T21:23:06.407481+00:00 |
| pysec-2025-54 |
|
vLLM is an inference and serving engine for large language models (LLMs). In versions 0.8… | vllm | 2025-05-30T19:15:30+00:00 | 2025-06-26T21:23:06.319321+00:00 |
| pysec-2025-50 |
|
vLLM, an inference and serving engine for large language models (LLMs), has a Regular Exp… | vllm | 2025-05-30T18:15:32+00:00 | 2025-06-19T03:02:28.572160+00:00 |
| pysec-2025-53 |
|
vLLM is an inference and serving engine for large language models (LLMs). Prior to versio… | vllm | 2025-05-29T17:15:21+00:00 | 2025-06-26T21:23:06.231251+00:00 |
| pysec-2025-43 |
|
vLLM is an inference and serving engine for large language models (LLMs). In versions sta… | vllm | 2025-05-29T17:15:21+00:00 | 2025-05-29T19:21:01.611587+00:00 |
| pysec-2025-46 |
5.5 (3.1)
|
A vulnerability was found in erdogant pypickle up to 1.1.5. It has been classified as cri… | pypickle | 2025-05-26T08:15:19+00:00 | 2025-06-03T17:36:58.579358+00:00 |
| pysec-2025-45 |
7.8 (3.1)
|
A vulnerability was found in erdogant pypickle up to 1.1.5 and classified as problematic.… | pypickle | 2025-05-26T07:15:26+00:00 | 2025-06-03T17:36:58.528116+00:00 |
| pysec-2025-40 |
7.5 (3.1)
|
A vulnerability in the `preprocess_string()` function of the `transformers.testing_utils`… | transformers | 2025-05-19T12:15:19+00:00 | 2025-05-21T19:22:10.801823+00:00 |
| pysec-2025-49 |
8.8 (3.1)
|
setuptools is a package that allows users to download, build, install, upgrade, and unins… | setuptools | 2025-05-17T16:15:19+00:00 | 2025-06-12T22:23:11.115559+00:00 |
| pysec-2025-39 |
|
motionEye is an online interface for the software motion, a video surveillance program wi… | motioneye | 2025-05-14T16:15:29+00:00 | 2025-05-14T17:22:51.050788+00:00 |
| pysec-2025-60 |
|
Exposure of Sensitive Information to an Unauthorized Actor, Insertion of Sensitive Inform… | apache-iotdb | 2025-05-14T11:16:28+00:00 | 2025-07-01T21:22:47.232036+00:00 |
| pysec-2025-59 |
|
Remote Code Execution with untrusted URI of UDF vulnerability in Apache IoTDB. The attack… | apache-iotdb | 2025-05-14T11:15:47+00:00 | 2025-07-01T21:22:47.177405+00:00 |
| pysec-2025-38 |
|
OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during im… | ironic | 2025-05-08T17:16:01Z | 2025-05-13T04:24:03.083929Z |
| pysec-2025-37 |
|
An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2… | django | 2025-05-08T04:17:18+00:00 | 2025-05-08T05:23:16.210893+00:00 |
| pysec-2025-42 |
9.8 (3.1)
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Ver… | vllm | 2025-04-30T01:15:51+00:00 | 2025-05-28T21:23:12.396609+00:00 |
| pysec-2025-34 |
|
The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_… | picklescan | 2025-04-24T01:15:49+00:00 | 2025-04-24T03:08:15.436691+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1082 | Malicious code in cdf-clients (PyPI) | 2026-02-27T21:33:39Z | 2026-02-27T21:33:39Z |
| mal-2026-1081 | Malicious code in marionette-react-view (npm) | 2026-02-27T20:57:39Z | 2026-02-27T20:57:39Z |
| mal-2026-1080 | Malicious code in hashtools32 (PyPI) | 2026-02-27T19:50:28Z | 2026-02-27T19:50:28Z |
| mal-2026-1078 | Malicious code in socket-dgxeon (npm) | 2026-02-27T16:29:28Z | 2026-02-27T16:29:28Z |
| mal-2026-1072 | Malicious code in @dgxeon/libsignal-node (npm) | 2026-02-27T16:29:28Z | 2026-02-27T16:29:28Z |
| mal-2026-1079 | Malicious code in sokettry (npm) | 2026-02-27T16:29:27Z | 2026-02-27T16:29:28Z |
| mal-2026-1077 | Malicious code in dgxeon-soket4 (npm) | 2026-02-27T16:29:27Z | 2026-02-27T16:29:28Z |
| mal-2026-1076 | Malicious code in dgxeon-soket3 (npm) | 2026-02-27T16:29:27Z | 2026-02-27T16:29:28Z |
| mal-2026-1075 | Malicious code in dgxeon-soket2 (npm) | 2026-02-27T16:29:27Z | 2026-02-27T16:29:28Z |
| mal-2026-1074 | Malicious code in dgxeon-soket (npm) | 2026-02-27T16:29:27Z | 2026-02-27T16:29:27Z |
| mal-2026-1073 | Malicious code in baileys-xeonbot (npm) | 2026-02-27T16:29:27Z | 2026-02-27T16:29:28Z |
| mal-2026-1071 | Malicious code in libsignal-skyzopedia (npm) | 2026-02-27T16:13:46Z | 2026-02-27T16:13:46Z |
| mal-2026-1070 | Malicious code in @skyzopedia/ubot (npm) | 2026-02-27T16:13:46Z | 2026-02-27T16:13:47Z |
| mal-2026-1069 | Malicious code in @skyzopedia/libsignal-node (npm) | 2026-02-27T16:13:46Z | 2026-02-27T16:13:47Z |
| mal-2026-1068 | Malicious code in @skyzopedia/brat (npm) | 2026-02-27T16:13:46Z | 2026-02-27T16:13:47Z |
| mal-2026-1067 | Malicious code in @skyzopedia/baileys-pro (npm) | 2026-02-27T16:13:46Z | 2026-02-27T16:13:47Z |
| mal-2026-1066 | Malicious code in @skyzopedia/baileys-mod (npm) | 2026-02-27T16:13:46Z | 2026-02-27T16:13:54Z |
| mal-2026-1065 | Malicious code in @skyzopedia/baileys (npm) | 2026-02-27T16:13:46Z | 2026-02-27T16:13:47Z |
| mal-2026-1064 | Malicious code in cicd-ppe-redteam-test02 (PyPI) | 2026-02-27T13:50:48Z | 2026-02-27T15:19:51Z |
| mal-2026-1063 | Malicious code in cicd-ppe-redteam-test01 (PyPI) | 2026-02-27T13:42:21Z | 2026-02-27T14:49:19Z |
| mal-2026-1060 | Malicious code in @zinley/orion (npm) | 2026-02-27T12:04:26Z | 2026-02-27T20:13:17Z |
| mal-2026-1061 | Malicious code in newman-reporter-genuinepoc (npm) | 2026-02-27T11:55:41Z | 2026-02-27T11:55:41Z |
| mal-2026-1062 | Malicious code in express-core-validator (npm) | 2026-02-27T11:51:42Z | 2026-02-27T11:51:42Z |
| mal-2026-1059 | Malicious code in nuget-task-common (npm) | 2026-02-27T09:55:28Z | 2026-02-27T10:18:30Z |
| mal-2026-1052 | Malicious code in foundry-toolkit (npm) | 2026-02-26T20:50:45Z | 2026-02-26T22:14:36Z |
| mal-2026-1050 | Malicious code in launch-darkly-js (npm) | 2026-02-26T20:10:47Z | 2026-02-26T20:10:47Z |
| mal-2026-1057 | Malicious code in windowston (npm) | 2026-02-26T17:51:38Z | 2026-02-26T17:51:38Z |
| mal-2026-1049 | Malicious code in flycord (PyPI) | 2026-02-26T15:38:34Z | 2026-02-26T15:38:34Z |
| mal-2026-1048 | Malicious code in edx-salesforce (PyPI) | 2026-02-26T13:55:39Z | 2026-02-26T14:07:49Z |
| mal-2026-1055 | Malicious code in jslint-config (npm) | 2026-02-26T13:41:14Z | 2026-02-26T13:41:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0514 | FreeRDP: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-02-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0484 | ImageMagick: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-02-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0448 | Red Hat Enterprise Linux (MUNGE): Schwachstelle ermöglicht Privilegieneskalation | 2026-02-17T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0446 | libssh: Mehrere Schwachstellen ermöglichen Manipulation von Dateien und DoS | 2026-02-17T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0437 | Dell RecoverPoint for Virtual Machines: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und potenziell Privilegieneskalation | 2026-02-17T23:00:00.000+00:00 | 2026-02-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0427 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2026-02-16T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0425 | SmarterTools SmarterMail: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0424 | OpenClaw: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0423 | Gogs: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0422 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0421 | Linux Kernel: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0420 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-02-17T23:00:00.000+00:00 |
| wid-sec-w-2026-0419 | vim (NetBeans): Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0418 | Google Cloud Platform (Apigee): Schwachstelle ermöglicht Privilegieneskalation | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0417 | IBM Sterling Connect:Direct: Schwachstelle ermöglicht Denial of Service | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0416 | Keycloak: Schwachstelle ermöglicht Denial of Service | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0410 | HAProxy Enterprise, Community und ALOHA (QUIC): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-12T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0409 | PostgreSQL: Mehrere Schwachstellen | 2026-02-12T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0407 | OPNsense: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-02-12T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0406 | Nagios Enterprises Nagios XI: Mehrere Schwachstellen ermöglichen Codeausführung | 2026-02-12T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0401 | Google Chrome: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0383 | AMD Radeon: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0378 | IBM WebSphere Application Server: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-02-10T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0377 | Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2026-02-10T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0369 | Microsoft Windows: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0367 | Microsoft DeveloperTools (Visual Studio Code und .NET): Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0362 | Red Hat Enterprise Linux (Lodash): Schwachstelle ermöglicht Denial of Service | 2026-02-10T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0359 | GnuTLS: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0355 | PowerDNS Recursor: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0353 | libpng: Schwachstelle ermöglicht Codeausführung | 2026-02-09T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0073 | Kwetsbaarheid verholpen in Juniper Junos OS Evolved | 2026-02-27T09:48:51.845864Z | 2026-02-27T09:48:51.845864Z |
| ncsc-2026-0072 | Kwetsbaarheden verholpen in GitLab | 2026-02-27T07:15:18.318821Z | 2026-02-27T07:15:18.318821Z |
| ncsc-2026-0071 | Kwetsbaarheden verholpen in Cisco Catalyst SD-WAN Manager | 2026-02-25T17:11:09.013125Z | 2026-02-25T17:11:09.013125Z |
| ncsc-2026-0070 | Kwetsbaarheden verholpen in VMware Aria Operations | 2026-02-25T11:24:46.807867Z | 2026-02-25T11:24:46.807867Z |
| ncsc-2026-0069 | Kwetsbaarheden verholpen in SolarWinds Serv-U | 2026-02-25T10:39:38.154815Z | 2026-02-25T10:39:38.154815Z |
| ncsc-2026-0068 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2026-02-23T14:27:28.865278Z | 2026-02-23T14:27:28.865278Z |
| ncsc-2026-0067 | Kwetsbaarheden verholpen in GitHub Enterprise Server | 2026-02-20T10:13:39.540778Z | 2026-02-20T10:13:39.540778Z |
| ncsc-2026-0066 | Kwetsbaarheid verholpen in Google Chrome | 2026-02-19T08:29:30.712590Z | 2026-02-19T08:29:30.712590Z |
| ncsc-2026-0065 | Kwetsbaarheid verholpen in Dell RecoverPoint for Virtual Machines | 2026-02-18T13:18:23.815384Z | 2026-02-18T13:18:23.815384Z |
| ncsc-2026-0064 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2026-02-13T13:35:03.870920Z | 2026-02-13T13:35:03.870920Z |
| ncsc-2026-0063 | Kwetsbaarheden verholpen in Apple macOS | 2026-02-13T13:24:06.433550Z | 2026-02-13T13:24:06.433550Z |
| ncsc-2026-0062 | Kwetsbaarheden verholpen in GitLab CE/EE | 2026-02-11T11:45:05.986313Z | 2026-02-11T11:45:05.986313Z |
| ncsc-2026-0061 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2026-02-11T11:34:50.888067Z | 2026-02-11T11:34:50.888067Z |
| ncsc-2026-0060 | Kwetsbaarheden verholpen in Fortinet FortiSandbox, FortiAuthenticator en FortiClient | 2026-02-11T11:34:36.684955Z | 2026-02-11T11:34:36.684955Z |
| ncsc-2026-0059 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2026-02-11T08:16:27.583936Z | 2026-02-11T08:16:27.583936Z |
| ncsc-2026-0058 | Kwetsbaarheden verholpen in Microsoft Office | 2026-02-10T19:11:42.825147Z | 2026-02-10T19:11:42.825147Z |
| ncsc-2026-0057 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-02-10T19:08:27.878305Z | 2026-02-10T19:08:27.878305Z |
| ncsc-2026-0056 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2026-02-10T19:07:16.028511Z | 2026-02-10T19:07:16.028511Z |
| ncsc-2026-0055 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-02-10T19:05:45.729972Z | 2026-02-10T19:05:45.729972Z |
| ncsc-2026-0054 | Kwetsbaarheid verholpen in Microsoft Exchange | 2026-02-10T19:04:51.366294Z | 2026-02-10T19:04:51.366294Z |
| ncsc-2026-0053 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-02-10T19:01:45.561771Z | 2026-02-10T19:01:45.561771Z |
| ncsc-2026-0052 | Kwetsbaarheden verholpen in SAP producten | 2026-02-10T12:28:40.531069Z | 2026-02-10T12:28:40.531069Z |
| ncsc-2026-0051 | Kwetsbaarheden verholpen in Siemens producten | 2026-02-10T12:27:40.637581Z | 2026-02-10T12:27:40.637581Z |
| ncsc-2026-0050 | Kwetsbaarheid verholpen in PEAR | 2026-02-09T10:41:43.856342Z | 2026-02-09T10:41:43.856342Z |
| ncsc-2026-0049 | Kwetsbaarheden verholpen in n8n | 2026-02-09T10:39:40.792744Z | 2026-02-09T10:39:40.792744Z |
| ncsc-2026-0048 | Kwetsbaarheid verholpen in BeyondTrust Remote Support | 2026-02-09T10:27:57.867529Z | 2026-02-13T12:54:32.614217Z |
| ncsc-2026-0047 | Kwetsbaarheid verholpen in Fortinet FortiClient EMS | 2026-02-09T10:16:18.048622Z | 2026-02-09T10:16:18.048622Z |
| ncsc-2026-0046 | Kwetsbaarheden verholpen in Samsung mobile | 2026-02-09T07:48:28.751473Z | 2026-02-09T07:48:28.751473Z |
| ncsc-2026-0045 | Kwetsbaarheid verholpen in Cisco Meeting Management | 2026-02-06T09:22:16.831778Z | 2026-02-06T09:22:16.831778Z |
| ncsc-2026-0044 | Kwetsbaarheid verholpen in Cisco TelePresence Collaboration Endpoint | 2026-02-06T09:20:11.629058Z | 2026-02-06T09:20:11.629058Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| tssa-2025-00001 | Project CSAF document | 2025-10-06T11:54:52.856Z | 2025-10-06T11:54:52.856Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-965753 | SSA-965753: Multiple File Parsing Vulnerabilities in Simcenter Femap and Nastran Before V2512 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-625934 | SSA-625934: Improper Access Control Vulnerability in the Webhooks Implementation of Siveillance Video Management Servers | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-535115 | SSA-535115: Data Validation Vulnerability in NX Before V2512 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-507364 | SSA-507364: Heap Based Buffer Overflow Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-445819 | SSA-445819: Out of Bounds Read in PS/IGES Parasolid Translator Component in Solid Edge | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-311973 | SSA-311973: Multiple Local Privilege Escalation Vulnerabilities in SINEC NMS and User Management Component (UMC) | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-035571 | SSA-035571: Cross Site Scripting Vulnerability in Polarion Before V2506 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-089022 | SSA-089022: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.3 | 2026-01-28T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-827968 | SSA-827968: Vulnerability in Nozomi Guardian/CMC on RUGGEDCOM APE1808 Devices | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-674753 | SSA-674753: Denial-of-Service Vulnerability in ET 200 Devices | 2026-01-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-192617 | SSA-192617: Local Privilege Escalation Vulnerability in TeleControl Server Basic Before V3.1.2.4 | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-014678 | SSA-014678: Authorization Bypass Vulnerability in Industrial Edge Device Kit | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-001536 | SSA-001536: Authorization Bypass Vulnerability in Siemens Industrial Edge Devices | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-512988 | SSA-512988: File Parsing Vulnerability in Simcenter Femap Before V2512 | 2025-12-12T00:00:00Z | 2025-12-12T00:00:00Z |
| ssa-915282 | SSA-915282: Denial of service Vulnerability in Interniche IP-Stack based Industrial Devices | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-912274 | SSA-912274: Multiple Vulnerabilities in RUGGEDCOM ROX Before V2.17 | 2025-12-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-882673 | SSA-882673: Multiple Vulnerabilities in SINEC Security Monitor before V4.10.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-868571 | SSA-868571: Missing Server Certificate Validation in IAM Client | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-763474 | SSA-763474: Denial of Service Vulnerability in Ruggedcom ROS devices before V5.10.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-734261 | SSA-734261: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-710408 | SSA-710408: Missing Server Certificate Validation in Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-626856 | SSA-626856: Multiple Vulnerabilities in SINEMA Remote Connect Sever Before V3.2 SP4 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-471761 | SSA-471761: Multiple Vulnerabilities in SICAM T Before V3.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-420375 | SSA-420375: Improper Integrity Check of Firmware Updates in Building X - Security Manager Edge Controller (ACC-AP) | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-416652 | SSA-416652: Multiple Vulnerabilities in SIMATIC CN 4100 Before V4.0.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-356310 | SSA-356310: Multiple Vulnerabilities in Gridscale X Prepay | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-212953 | SSA-212953: Multiple Vulnerabilities in COMOS | 2025-12-09T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-202008 | SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-241605 | SSA-241605: Out of Bounds Read in PS/IGES Parasolid Translator Component Before V29.0.258 | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-190588 | SSA-190588: Cross-Site Scripting Vulnerability in Mendix Rich Text Widget | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2816 | Red Hat Security Advisory: pcs security update | 2026-02-17T12:26:26+00:00 | 2026-02-17T12:26:58+00:00 |
| rhsa-2026:2818 | Red Hat Security Advisory: pcs security update | 2026-02-17T12:24:53+00:00 | 2026-02-17T12:26:58+00:00 |
| rhsa-2026:2786 | Red Hat Security Advisory: glibc security update | 2026-02-17T10:36:36+00:00 | 2026-02-17T10:37:35+00:00 |
| rhsa-2026:2783 | Red Hat Security Advisory: nodejs:20 security update | 2026-02-17T09:32:33+00:00 | 2026-02-17T09:33:24+00:00 |
| rhsa-2026:2800 | Red Hat Security Advisory: Red Hat Ceph Storage | 2026-02-17T09:23:04+00:00 | 2026-02-17T09:28:06+00:00 |
| rhsa-2026:2770 | Red Hat Security Advisory: freerdp security update | 2026-02-17T03:29:34+00:00 | 2026-02-17T07:24:19+00:00 |
| rhsa-2026:2768 | Red Hat Security Advisory: nodejs:20 security update | 2026-02-17T01:05:30+00:00 | 2026-02-17T09:33:24+00:00 |
| rhsa-2026:2766 | Red Hat Security Advisory: kernel security update | 2026-02-17T01:03:19+00:00 | 2026-02-17T07:24:16+00:00 |
| rhsa-2026:2769 | Red Hat Security Advisory: Red Hat Ceph Storage 7.1 security and bug fix updates | 2026-02-17T00:55:59+00:00 | 2026-02-17T12:41:47+00:00 |
| rhsa-2026:2767 | Red Hat Security Advisory: nodejs:20 security update | 2026-02-17T00:48:09+00:00 | 2026-02-17T09:33:24+00:00 |
| rhsa-2026:2765 | Red Hat Security Advisory: Satellite 6.16.6.1 Async Update | 2026-02-16T21:33:28+00:00 | 2026-02-17T12:41:50+00:00 |
| rhsa-2026:2764 | Red Hat Security Advisory: Satellite 6.17.6.3 Async Update | 2026-02-16T19:06:28+00:00 | 2026-02-17T12:41:47+00:00 |
| rhsa-2026:2763 | Red Hat Security Advisory: wireshark security update | 2026-02-16T18:48:23+00:00 | 2026-02-17T02:20:33+00:00 |
| rhsa-2026:2761 | Red Hat Security Advisory: kernel security update | 2026-02-16T18:04:38+00:00 | 2026-02-17T07:24:13+00:00 |
| rhsa-2026:2759 | Red Hat Security Advisory: kernel security update | 2026-02-16T17:51:18+00:00 | 2026-02-17T07:24:09+00:00 |
| rhsa-2026:2762 | Red Hat Security Advisory: Red Hat Quay 3.10.18 | 2026-02-16T17:44:31+00:00 | 2026-02-17T12:41:47+00:00 |
| rhsa-2026:2760 | Red Hat Security Advisory: Satellite 6.18.3 Async Update | 2026-02-16T16:52:18+00:00 | 2026-02-17T12:41:47+00:00 |
| rhsa-2026:2758 | Red Hat Security Advisory: resource-agents security update | 2026-02-16T16:40:34+00:00 | 2026-02-16T19:52:50+00:00 |
| rhsa-2026:2753 | Red Hat Security Advisory: gnupg2 security update | 2026-02-16T16:01:43+00:00 | 2026-02-16T19:46:09+00:00 |
| rhsa-2026:2754 | Red Hat Security Advisory: Red Hat Quay 3.9.18 | 2026-02-16T15:43:51+00:00 | 2026-02-17T12:41:46+00:00 |
| rhsa-2026:2719 | Red Hat Security Advisory: gnupg2 security update | 2026-02-16T14:36:42+00:00 | 2026-02-16T19:54:56+00:00 |
| rhsa-2026:2736 | Red Hat Security Advisory: freerdp security update | 2026-02-16T13:12:12+00:00 | 2026-02-17T07:24:17+00:00 |
| rhsa-2026:2737 | Red Hat Security Advisory: Red Hat Ceph Storage | 2026-02-16T12:56:05+00:00 | 2026-02-17T09:28:02+00:00 |
| rhsa-2026:2722 | Red Hat Security Advisory: kernel security update | 2026-02-16T12:28:13+00:00 | 2026-02-17T07:23:57+00:00 |
| rhsa-2026:2721 | Red Hat Security Advisory: kernel security update | 2026-02-16T12:13:02+00:00 | 2026-02-17T07:24:10+00:00 |
| rhsa-2026:2726 | Red Hat Security Advisory: pki-deps:10.6 security update | 2026-02-16T12:04:57+00:00 | 2026-02-16T14:38:10+00:00 |
| rhsa-2026:2720 | Red Hat Security Advisory: kernel security update | 2026-02-16T12:04:07+00:00 | 2026-02-17T07:24:13+00:00 |
| rhsa-2026:2728 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-16T11:56:59+00:00 | 2026-02-17T12:41:46+00:00 |
| rhsa-2026:2724 | Red Hat Security Advisory: pki-deps:10.6 security update | 2026-02-16T11:56:58+00:00 | 2026-02-16T14:38:06+00:00 |
| rhsa-2026:2714 | Red Hat Security Advisory: freerdp security update | 2026-02-16T11:45:27+00:00 | 2026-02-17T07:24:17+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-057-10 | Copeland XWEB and XWEB Pro | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-09 | Yokogawa CENTUM VP R6, R7 | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-08 | Mobility46 mobility46.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-07 | EV Energy ev.energy | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-06 | SWITCH EV swtchenergy.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-05 | Chargemap chargemap.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-04 | EV2GO ev2go.io | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-03 | CloudCharge cloudcharge.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-02 | Pelco, Inc. Sarix Pro 3 Series IP Cameras | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-01 | Johnson Controls, Inc. Frick Controls Quantum HD | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-055-01 | InSAT MasterSCADA BUK-TS | 2026-02-24T07:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-26-055-03 | Gardyn Home Kit | 2026-02-24T06:00:00.000000Z | 2026-02-24T06:00:00.000000Z |
| icsa-26-048-04 | Honeywell HIB2PI and HDZ Series CCTV Cameras (Update A) | 2026-02-17T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-048-03 | GE Vernova Enervista UR Setup | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-02 | Delta Electronics ASDA-Soft | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-043-10 | Airleader Master | 2026-02-12T07:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-055-02 | Schneider Electric EcoStruxure Building Operation Workstation | 2026-02-10T08:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsma-26-041-01 | ZOLL ePCR IOS Mobile Application | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-04 | AVEVA PI to CONNECT Agent | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-03 | AVEVA PI Data Archive | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-02 | ZLAN Information Technology Co. ZLAN5143D | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-01 | Yokogawa FAST/TOOLS | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-048-01 | Siemens Simcenter Femap and Nastran | 2026-02-10T00:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-043-08 | Siemens NX | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-07 | Siemens Siveillance Video Management Servers | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-05 | Siemens Solid Edge | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-04 | Siemens Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-02 | Siemens Polarion | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-01 | Siemens SINEC NMS | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-036-04 | Ilevia EVE X1 Server | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ucsm-cmdinj-gvxlpesb | Cisco UCS Manager Software Command Injection Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsm-afwae-mogufyln | Cisco UCS Manager Software Privilege Escalation Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsfxosxss-7skve8zv | Cisco FXOS and UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsciv-wgytc78q | Cisco FXOS and UCS Manager Software Command Injection Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-sdwan-rpa-ehchtzk | Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-sdwan-authbp-qwcx8d4v | Cisco Catalyst SD-WAN Vulnerabilities | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-ether-dos-kv8ynwz4 | Cisco Nexus 3600 and 9500-R Series Switching Platforms Layer 2 Loop Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-dsnmp-cnn39uh | Cisco Nexus 9000 Series Fabric Switches in ACI Mode SNMP Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-cpdos-qlsv6pfd | Cisco Nexus 9000 Series Fabric Switches in ACI Mode Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-n3kn9k_aci_lldp_dos-ndgrrra3 | Cisco NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-apic-dos-rnus8efw | Cisco Application Policy Infrastructure Controller Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-wsa-archive-bypass-scx2e8zf | Cisco Secure Web Appliance Real-Time Scanning Archive File Bypass Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-20T21:08:47+00:00 |
| cisco-sa-tce-roomos-dos-9v9jrc2q | Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-12T17:37:39+00:00 |
| cisco-sa-pi-xss-byevkcd | Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-epnm-pi-redirect-6sx82dn | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Open Redirect Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-cmm-file-up-ky47n8kk | Cisco Meeting Management Arbitrary File Upload Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-voice-rce-morhqy4b | Cisco Unified Communications Products Remote Code Execution Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-02-13T15:21:01+00:00 |
| cisco-sa-ucce-pcce-xss-2jvyg3ud | Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-intersight-privesc-p6tbm6jk | Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-iec6400-pem5uq7v | Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-ise-xss-9tdh2kx | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-ise-xss-964cdxw5 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-gekx8ywk | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-snort3-dcerpc-vulns-j9hnf4th | Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities | 2026-01-07T16:00:00+00:00 | 2026-02-10T20:42:07+00:00 |
| cisco-sa-ise-xxe-jwsbsdkt | Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability | 2026-01-07T16:00:00+00:00 | 2026-01-07T16:00:00+00:00 |
| cisco-sa-sma-attack-n9bf4 | Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager | 2025-12-17T16:00:00+00:00 | 2026-01-15T16:01:43+00:00 |
| cisco-sa-react-flight-tyw32ddb | Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 | 2025-12-04T16:00:00+00:00 | 2025-12-17T22:37:17+00:00 |
| cisco-sa-privesc-catc-ryjreelu | Cisco Catalyst Center Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-xss-wextvz59 | Cisco Catalyst Center Cross-Site Scripting Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-ci-zwlqvswt | Cisco Catalyst Center REST API Command Injection Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2026-0005 | Vulnerabilities affecting SICK LMS1000 and SICK MRS1000 | 2026-02-27T14:00:00.000Z | 2026-02-27T14:00:00.000Z |
| sca-2026-0004 | Eclipse Cyclone DDS Vulnerabilities have no impact on SICK picoScan150 & SICK picoScan120 products | 2026-02-13T14:00:00.000Z | 2026-02-13T14:00:00.000Z |
| sca-2026-0003 | Vulnerability affecting SICK nanoScan3 and microScan3 | 2026-01-26T14:00:00.000Z | 2026-01-26T14:00:00.000Z |
| sca-2026-0002 | Vulnerabilities affecting SICK Incoming Goods Suite | 2026-01-15T14:00:00.000Z | 2026-01-22T19:00:00.000Z |
| sca-2026-0001 | Vulnerabilities affecting SICK TDC-X401GL | 2026-01-15T14:00:00.000Z | 2026-01-15T14:00:00.000Z |
| sca-2025-0014 | CodeMeter vulnerablity affects SICK CODE-LOC and SICK LIDAR-LOC | 2025-11-03T11:00:00.000Z | 2025-11-03T14:00:00.000Z |
| sca-2025-0013 | Vulnerabilities affecting SICK TLOC100-100 | 2025-10-27T14:00:00.000Z | 2025-11-11T14:00:00.000Z |
| sca-2025-0012 | Sudo vulnerability affects SICK SID products | 2025-10-27T11:00:00.000Z | 2025-10-27T14:00:00.000Z |
| sca-2025-0011 | Vulnerabilities affecting Endress+Hauser SSG-E210GC | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0010 | Multiple vulnerabilities in SICK Enterprise Analytics and SICK Logistic Analytics Products | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0009 | Vulnerabilities affecting SICK TDC-E210GC | 2025-08-01T13:00:00.000Z | 2025-08-01T13:00:00.000Z |
| sca-2025-0008 | Multiple vulnerabilities in Endress+Hauser MEAC300-FNADE4 | 2025-07-03T13:00:00.000Z | 2025-07-03T13:00:00.000Z |
| sca-2025-0007 | Multiple vulnerabilities in SICK Field Analytics and SICK Media Server | 2025-06-12T13:00:00.000Z | 2025-06-12T13:00:00.000Z |
| sca-2025-0006 | Vulnerability affecting picoScan and multiScan | 2025-04-28T13:00:00.000Z | 2025-04-28T13:00:00.000Z |
| sca-2025-0005 | Vulnerabilities in SICK Flexi Compact | 2025-04-28T10:00:00.000Z | 2025-04-28T10:00:00.000Z |
| sca-2025-0004 | Critical vulnerabilities in SICK DL100-2xxxxxxx | 2025-03-14T11:00:00.000Z | 2025-03-14T11:00:00.000Z |
| sca-2025-0003 | FreeRTOS Vulnerabilities have no impact on SICK Products | 2025-02-28T00:00:00.000Z | 2025-05-20T11:00:00.000Z |
| sca-2025-0001 | Multiple vulnerabilities in SICK MEAC300 | 2025-02-14T14:00:00.000Z | 2025-02-21T14:00:00.000Z |
| sca-2025-0002 | Vulnerability in SICK Lector8xx and SICK InspectorP8xx | 2025-02-14T10:19:00.000Z | 2025-02-14T10:19:00.000Z |
| sca-2024-0007 | Vulnerability in SICK OLM | 2024-12-31T00:00:00.000Z | 2024-12-31T00:00:00.000Z |
| sca-2024-0006 | Critical vulnerabilities in SICK InspectorP61x, InspectorP62x and TiM3xx | 2024-12-06T00:00:00.000Z | 2024-12-06T00:00:00.000Z |
| sca-2024-0005 | Vulnerability in SICK Incoming Goods Suite | 2024-11-19T00:00:00.000Z | 2024-11-19T00:00:00.000Z |
| sca-2024-0004 | Third party vulnerabilities in SICK CDE-100 | 2024-11-07T12:00:00.000Z | 2024-11-07T12:00:00.000Z |
| sca-2024-0003 | Critical vulnerability in multiple SICK products | 2024-10-17T13:00:00.000Z | 2024-10-17T13:00:00.000Z |
| sca-2024-0002 | Vulnerability in SICK MSC800 | 2024-09-11T23:00:00.000Z | 2024-09-11T23:00:00.000Z |
| sca-2024-0001 | Vulnerability in SICK Logistics Analytics Products and SICK Field Analytics | 2024-01-29T00:00:00.000Z | 2024-01-29T00:00:00.000Z |
| sca-2023-0011 | Vulnerability in multiple SICK Flexi Soft Gateways | 2023-10-23T11:00:00.000Z | 2023-10-23T11:00:00.000Z |
| sca-2023-0010 | Vulnerabilities in SICK Application Processing Unit | 2023-10-09T11:00:00.000Z | 2023-10-09T11:00:00.000Z |
| sca-2023-0008 | Vulnerability in SICK SIM1012 | 2023-09-29T13:00:00.000Z | 2023-09-29T13:00:00.000Z |
| sca-2023-0009 | Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products | 2023-09-29T10:00:00.000Z | 2023-09-29T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2025:15-01 | Path traversal in Import Arc data archive functionality in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:14-01 | HTML injection in Asset List in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:13-01 | Stored Cross-Site Scripting (XSS) in Reports in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:12-01 | HTML injection in in Time Machine functionality in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:11-01 | Stored Cross-Site Scripting (XSS) in Dashboards in Guardian/CMC before 25.4.0 | 2025-11-25T11:00:00.000Z | 2025-11-26T11:00:00.000Z |
| nn-2025:9-01 | Path traversal in Time Machine functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:8-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:7-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:6-01 | Authenticated SQL Injection on Smart Polling functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:5-01 | Incorrect authorization for CLI in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:4-01 | Client-side path traversal in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:10-01 | Authenticated SQL Injection on CLI functionality in Guardian/CMC before 25.3.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:3-01 | Incorrect authorization for traces request/download in CMC before 25.1.0 | 2025-08-26T11:00:00.000Z | 2025-08-26T11:00:00.000Z |
| nn-2025:2-01 | Privilege escalation in Guardian/CMC before 24.6.0 | 2025-06-10T11:00:00.000Z | 2025-06-10T11:00:00.000Z |
| nn-2025:1-01 | Authenticated RCE in update functionality in Guardian/CMC before 24.6.0 | 2025-06-10T11:00:00.000Z | 2025-06-10T11:00:00.000Z |
| nn-2024:2-01 | Incorrect authorization for Reports configuration in Guardian/CMC before 24.2.0 | 2024-09-11T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:16-01 | Path traversal via 'zip slip' in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2023:15-01 | Sensitive data exfiltration via unsafe permissions on Windows systems in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:14-01 | Unsafe temporary data privileges on Unix systems in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2023:13-01 | Missing authentication for local web interface in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2024:1-01 | DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:17-01 | Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:12-01 | Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 | 2024-01-15T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:9-01 | Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:11-01 | SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:10-01 | DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:8-01 | Session Fixation in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:7-01 | DoS via SAML configuration in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:6-01 | Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:5-01 | Information disclosure via the debug function in assertions in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| oxdc-adv-2025-0001 | OX Dovecot Pro Security Advisory OXDC-ADV-2025-0001 | 2025-10-31T00:00:00+00:00 | 2025-11-27T00:00:00+00:00 |
| oxas-adv-2025-0003 | OX App Suite Security Advisory OXAS-ADV-2025-0003 | 2025-09-24T00:00:00+02:00 | 2025-11-27T00:00:00+00:00 |
| oxas-adv-2025-0002 | OX App Suite Security Advisory OXAS-ADV-2025-0002 | 2025-08-12T00:00:00+02:00 | 2025-10-31T00:00:00+00:00 |
| oxas-adv-2025-0001 | OX App Suite Security Advisory OXAS-ADV-2025-0001 | 2025-01-27T00:00:00+01:00 | 2025-04-07T00:00:00+00:00 |
| oxdc-adv-2024-0003 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0003 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxdc-adv-2024-0002 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0002 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxdc-adv-2024-0001 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0001 | 2024-09-02T00:00:00+02:00 | 2024-09-06T00:00:00+00:00 |
| oxas-adv-2024-0005 | OX App Suite Security Advisory OXAS-ADV-2024-0005 | 2024-07-08T00:00:00+02:00 | 2024-09-09T00:00:00+00:00 |
| oxas-adv-2024-0004 | OX App Suite Security Advisory OXAS-ADV-2024-0004 | 2024-06-13T00:00:00+02:00 | 2024-08-19T00:00:00+00:00 |
| oxas-adv-2024-0003 | OX App Suite Security Advisory OXAS-ADV-2024-0003 | 2024-04-24T00:00:00+02:00 | 2024-08-19T00:00:00+00:00 |
| oxas-adv-2024-0002 | OX App Suite Security Advisory OXAS-ADV-2024-0002 | 2024-03-06T00:00:00+01:00 | 2024-05-06T00:00:00+00:00 |
| oxas-adv-2024-0001 | OX App Suite Security Advisory OXAS-ADV-2024-0001 | 2024-02-08T00:00:00+01:00 | 2024-04-25T00:00:00+00:00 |
| oxas-adv-2023-0007 | OX App Suite Security Advisory OXAS-ADV-2023-0007 | 2023-12-11T00:00:00+01:00 | 2024-02-16T00:00:00+00:00 |
| oxas-adv-2023-0006 | OX App Suite Security Advisory OXAS-ADV-2023-0006 | 2023-09-25T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0005 | OX App Suite Security Advisory OXAS-ADV-2023-0005 | 2023-09-19T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0004 | OX App Suite Security Advisory OXAS-ADV-2023-0004 | 2023-08-01T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0003 | OX App Suite Security Advisory OXAS-ADV-2023-0003 | 2023-05-02T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0002 | OX App Suite Security Advisory OXAS-ADV-2023-0002 | 2023-03-20T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0001 | OX App Suite Security Advisory OXAS-ADV-2023-0001 | 2023-02-06T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2022-0002 | OX App Suite Security Advisory OXAS-ADV-2022-0002 | 2022-11-02T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2022-0001 | OX App Suite Security Advisory OXAS-ADV-2022-0001 | 2022-08-10T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-26119 | Windows Admin Center Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-17T08:00:00.000Z |
| msrc_cve-2026-24302 | Azure Arc Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-05T08:00:00.000Z |
| msrc_cve-2026-24300 | Azure Front Door Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-05T08:00:00.000Z |
| msrc_cve-2026-23655 | Microsoft ACI Confidential Containers Information Disclosure Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21537 | Microsoft Defender for Endpoint Linux Extension Remote Code Execution Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21535 | Microsoft Teams Information Disclosure Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-19T08:00:00.000Z |
| msrc_cve-2026-21533 | Windows Remote Desktop Services Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21532 | Azure Function Information Disclosure Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-05T08:00:00.000Z |
| msrc_cve-2026-21531 | Azure SDK for Python Remote Code Execution Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21529 | Azure HDInsight Spoofing Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21528 | Azure IoT Explorer Information Disclosure Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-19T08:00:00.000Z |
| msrc_cve-2026-21527 | Microsoft Exchange Server Spoofing Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21525 | Windows Remote Access Connection Manager Denial of Service Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21523 | GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21522 | Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21519 | Desktop Window Manager Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21518 | GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-27T08:00:00.000Z |
| msrc_cve-2026-21516 | GitHub Copilot for Jetbrains Remote Code Execution Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21514 | Microsoft Word Security Feature Bypass Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21513 | MSHTML Framework Security Feature Bypass Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21512 | Azure DevOps Server Cross-Site Scripting Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21511 | Microsoft Outlook Spoofing Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-11T08:00:00.000Z |
| msrc_cve-2026-21510 | Windows Shell Security Feature Bypass Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21508 | Windows Storage Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21261 | Microsoft Excel Information Disclosure Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21260 | Microsoft Outlook Spoofing Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21259 | Microsoft Excel Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21258 | Microsoft Excel Information Disclosure Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21257 | GitHub Copilot and Visual Studio Elevation of Privilege Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| msrc_cve-2026-21256 | GitHub Copilot and Visual Studio Remote Code Execution Vulnerability | 2026-02-10T08:00:00.000Z | 2026-02-11T08:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| 3adr011525 | ABB Automation Builder Gateway for Windows with insecure defaults | 2026-02-24T00:30:00.000Z | 2026-02-24T00:30:00.000Z |
| 3adr011524 | AC500 V3 Multiple vulnerabilities | 2026-02-24T00:30:00.000Z | 2026-02-24T00:30:00.000Z |
| sa25p007 | B&R Automation Studio Update of SQLite version | 2026-02-18T00:30:00.000Z | 2026-02-18T00:30:00.000Z |
| sa26p001 | PVI Insertion of Sensitive Information into Logfile | 2026-01-29T00:30:00.000Z | 2026-01-29T00:30:00.000Z |
| sa24p003 | B&R PCs vulnerable to PixieFail attack | 2026-01-29T00:30:00.000Z | 2026-01-29T00:30:00.000Z |
| sa25p005 | B&R Automation Runtime Improper Handling of Flooding conditions on ANSL Server | 2026-01-19T00:30:00.000Z | 2026-01-19T00:30:00.000Z |
| sa25p004 | Automation Studio Insufficient Server Certificate Validation | 2026-01-19T00:30:00.000Z | 2026-01-19T00:30:00.000Z |
| 9akk108472a1331 | ABB Ability™ OPTIMAX® Authentication Bypass in Single-Sign On with Azure Active Directory | 2026-01-16T00:30:00.000Z | 2026-01-16T00:30:00.000Z |
| 2crt000009 | WebPro SNMP Card PowerValue Multiple Vulnerabilities | 2026-01-07T00:30:00.000Z | 2026-01-07T00:30:00.000Z |
| 4hzm000603 | ABB Ability Camera Connect Vulnerabilities in outdated 3rd party component (VLC) | 2025-11-27T00:30:00.000Z | 2025-11-28T00:30:00.000Z |
| 7paa022088 | Edgenius Management Portal Authentication Bypass | 2025-11-20T00:30:00.000Z | 2025-11-20T00:30:00.000Z |
| 2nga002813 | PCM600 SharpZip library vulnerability | 2025-11-03T00:30:00.000Z | 2025-11-03T00:30:00.000Z |
| 9akk108471a8948 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-10-20T00:30:00.000Z | 2025-10-21T00:30:00.000Z |
| 4tz00000006007 | ALS-mini-S4/S8 IP Missing Authentication Vulnerability and its Mitigations | 2025-10-20T00:30:00.000Z | 2025-10-23T00:30:00.000Z |
| 4tz00000006008 | LVS MConfig Insecure memory handling | 2025-10-08T00:30:00.000Z | 2025-10-08T00:30:00.000Z |
| sa25p003 | B&R Automation Runtime Vulnerabilities in System Diagnostic Manager (SDM) | 2025-10-07T00:30:00.000Z | 2025-10-14T00:30:00.000Z |
| sa25p002 | B&R Automation Runtime DoS Vulnerability in System Diagnostics Manager (SDM) | 2025-10-07T00:30:00.000Z | 2025-10-07T00:30:00.000Z |
| 9akk108471a7808 | EIBPORT Reflected XSS | 2025-10-07T00:30:00.000Z | 2025-10-07T00:30:00.000Z |
| 9akk108471a8107 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-09-16T00:30:00.000Z | 2025-11-28T08:00:00.000Z |
| 9akk108471a7121 | FLXeon Controllers Multiple vulnerabilities | 2025-09-09T00:30:00.000Z | 2025-09-18T00:30:00.000Z |
| 2nga002743 | ABB AbilityTM zenon Remote Transport Vulnerability | 2025-08-12T00:30:00.000Z | 2025-08-12T00:30:00.000Z |
| 9akk108471a4462 | ELSB/BLBA ASPECT advisory several CVEs | 2025-08-11T00:30:00.000Z | 2025-09-04T00:30:00.000Z |
| 3adr011432 | AC500 V2 Buffer overread on Modbus protocol | 2025-07-23T00:30:00.000Z | 2025-07-23T00:30:00.000Z |
| 9akk108471a4556 | Busch-Welcome® 2 wire Door opener actuator by default in compatibility mode. | 2025-07-21T00:30:00.000Z | 2025-07-21T00:30:00.000Z |
| 9akk108471a3623 | RMC - 100 Vulnerabilities in web UI (REST Interface) | 2025-07-03T00:30:00.000Z | 2025-08-18T00:30:00.000Z |
| 2crt000008 | Lite Panel Pro Vulnerability in Session Management | 2025-06-26T00:30:00.000Z | 2025-06-26T00:30:00.000Z |
| 9akk108471a1621 | EIBPORT Session Management Fail | 2025-06-02T00:30:00.000Z | 2025-06-04T00:30:00.000Z |
| 9akk108470a8948 | ELSB/Home Solutions Outdated SW Components in ABB Welcome IP-Gateway. | 2025-05-29T00:30:00.000Z | 2025-06-05T00:30:00.000Z |
| 9akk108471a0021 | ELSB/BLBA ASPECT advisory several CVEs | 2025-05-22T00:30:00.000Z | 2025-05-23T10:30:00.000Z |
| 2crt000006 | ANC – ABB Network Card Multiple vulnerabilities in ANC | 2025-04-30T00:30:00.000Z | 2025-04-30T00:30:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201507-0645 | D-Link is an internationally renowned provider of network equipment and solutions, includ… | 2025-12-23T00:12:08.164000Z |
| var-201011-0225 | Multiple stack-based buffer overflows in agent.exe in Setup Manager in Cisco Intelligent … | 2025-12-23T00:11:40.995000Z |
| var-201109-0089 | Multiple unspecified vulnerabilities in Cisco Unified Service Monitor before 8.6, as used… | 2025-12-23T00:10:18.602000Z |
| var-201112-0173 | The default configuration of the HP CM8060 Color MFP with Edgeline; Color LaserJet 3xxx, … | 2025-12-23T00:05:56.162000Z |
| var-201103-0371 | SAP Crystal Reports Server is a complete reporting solution for creating, managing, and d… | 2025-12-23T00:04:00.173000Z |
| var-201807-0341 | ABB Panel Builder 800 all versions has an improper input validation vulnerability which m… | 2025-12-23T00:03:51.024000Z |
| var-200702-0378 | Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 … | 2025-12-23T00:03:37.932000Z |
| var-201805-1147 | WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length heap buffe… | 2025-12-23T00:01:35.037000Z |
| var-200607-0396 | Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) b… | 2025-12-23T00:00:47.326000Z |
| var-201208-0222 | Multiple stack-based buffer overflows in msg_server.exe in SAP NetWeaver ABAP 7.x allow r… | 2025-12-23T00:00:27.061000Z |
| var-202001-0832 | A Buffer Overflow vulnerability exists in the Message Server service _MsJ2EE_AddStatistic… | 2025-12-23T00:00:23.174000Z |
| var-202001-0833 | A Denial of Service vulnerability exists in the WRITE_C function in the msg_server.exe mo… | 2025-12-23T00:00:23.098000Z |
| var-201702-0423 | An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft… | 2025-12-22T23:59:50.708000Z |
| var-201109-0081 | Buffer overflow in the gopherToHTML function in gopher.cc in the Gopher reply parser in S… | 2025-12-22T23:57:06.902000Z |
| var-201112-0097 | Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 a… | 2025-12-22T23:57:03.107000Z |
| var-201904-0181 | Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow… | 2025-12-22T23:55:40.719000Z |
| var-202407-0233 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data … | 2025-12-22T23:55:32.693000Z |
| var-200202-0006 | Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause… | 2025-12-22T23:55:29.383000Z |
| var-201407-0233 | Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote atta… | 2025-12-22T23:54:37.672000Z |
| var-201806-1058 | Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices befo… | 2025-12-22T23:54:32.706000Z |
| var-201810-0396 | Advantech WebAccess 8.3.1 and earlier has several stack-based buffer overflow vulnerabili… | 2025-12-22T23:54:32.435000Z |
| var-201402-0026 | Buffer overflow in the process_ra function in the router advertisement daemon (radvd) bef… | 2025-12-22T23:52:50.537000Z |
| var-201402-0028 | The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when Uni… | 2025-12-22T23:52:50.479000Z |
| var-201402-0027 | The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows re… | 2025-12-22T23:52:50.408000Z |
| var-201803-1810 | A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial … | 2025-12-22T23:52:40.263000Z |
| var-201906-1029 | In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulne… | 2025-12-22T23:52:37.978000Z |
| var-201908-0863 | Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE… | 2025-12-22T23:52:37.116000Z |
| var-202005-0008 | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buf… | 2025-12-22T23:52:36.251000Z |
| var-200512-0643 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2025-12-22T23:51:40.221000Z |
| var-200512-0297 | Integer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbit… | 2025-12-22T23:51:40.129000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-000031 | Improper file access permission settings in the installers for multiple Soliton Systems products | 2026-02-27T15:41+09:00 | 2026-02-27T15:41+09:00 |
| jvndb-2026-000030 | IM-LogicDesigner module of intra-mart Accel Platform vulnerable to untrusted data deserialization | 2026-02-27T15:41+09:00 | 2026-02-27T15:41+09:00 |
| jvndb-2026-000029 | Multiple vulnerabilities in the installer of FinalCode Client | 2026-02-26T14:24+09:00 | 2026-02-26T14:24+09:00 |
| jvndb-2026-004811 | Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager | 2026-02-26T11:02+09:00 | 2026-02-26T11:02+09:00 |
| jvndb-2026-004810 | Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager | 2026-02-26T11:02+09:00 | 2026-02-26T11:02+09:00 |
| jvndb-2026-000026 | Lanscope Endpoint Manager (On-Premises) vulnerable to path traversal | 2026-02-25T15:14+09:00 | 2026-02-25T15:14+09:00 |
| jvndb-2026-004359 | Security information for Hitachi Disk Array Systems | 2026-02-20T18:35+09:00 | 2026-02-20T18:35+09:00 |
| jvndb-2026-000027 | WordPress Plugin "Survey Maker" vulnerable to cross-site scripting | 2026-02-20T12:32+09:00 | 2026-02-20T12:32+09:00 |
| jvndb-2026-000028 | Installer for Job log aggregation/analysis software RICOH Job Log Aggregation Tool may insecurely load Dynamic Link Libraries | 2026-02-20T12:31+09:00 | 2026-02-20T12:31+09:00 |
| jvndb-2026-003912 | Vulnerability in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003911 | Vulnerability in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003910 | Multiple Vulnerabilities in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003909 | Multiple Vulnerabilities in Hitachi Command Suite products | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003908 | Multiple Vulnerabilities in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003907 | Multiple Vulnerabilities in JP1 | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003906 | Multiple Vulnerabilities in Cosminexus | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003905 | Multiple Vulnerabilities in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-000025 | Joomla! CMS vulnerable to cross-site scripting | 2026-02-17T12:46+09:00 | 2026-02-17T12:46+09:00 |
| jvndb-2026-000023 | FileZen vulnerable to OS command injection | 2026-02-13T16:51+09:00 | 2026-02-13T17:08+09:00 |
| jvndb-2026-000024 | Installer of M-Audio M-Track Duo HD may insecurely load Dynamic Link Libraries | 2026-02-12T13:32+09:00 | 2026-02-12T13:32+09:00 |
| jvndb-2026-000022 | Oki Electric Industry products and OEM products register Windows services with unquoted file paths | 2026-02-09T15:21+09:00 | 2026-02-09T15:21+09:00 |
| jvndb-2026-000021 | web2py vulnerable to open redirect | 2026-02-05T15:01+09:00 | 2026-02-05T15:01+09:00 |
| jvndb-2026-000020 | Multiple vulnerabilities in Movable Type | 2026-02-04T16:15+09:00 | 2026-02-04T16:15+09:00 |
| jvndb-2026-000019 | Multiple vulnerabilities in ELECOM wireless LAN products | 2026-02-03T14:57+09:00 | 2026-02-03T14:57+09:00 |
| jvndb-2026-000017 | Improper file access permission settings in Mitsubishi Small-Capacity UPS Shutdown Software FREQSHIP-mini for Windows | 2026-02-03T14:57+09:00 | 2026-02-05T14:41+09:00 |
| jvndb-2026-000016 | Installer for Roland Cloud Manager may insecurely load Dynamic Link Libraries | 2026-02-03T14:57+09:00 | 2026-02-04T12:39+09:00 |
| jvndb-2026-000015 | Sonatype Nexus Repository vulnerable to server-side request forgery | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000014 | OS command injection in raspap-webgui | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000013 | Multiple Microsoft Office products vulnerable to untrusted search path | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000012 | Multiple vulnerabilities in Cybozu Garoon | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0670-1 | Security update for ucode-intel | 2026-02-26T15:21:41Z | 2026-02-26T15:21:41Z |
| suse-su-2026:0669-1 | Security update for ucode-intel | 2026-02-26T15:21:31Z | 2026-02-26T15:21:31Z |
| suse-su-2026:0668-1 | Security update for ucode-intel | 2026-02-26T15:21:13Z | 2026-02-26T15:21:13Z |
| suse-su-2026:0667-1 | Security update for redis7 | 2026-02-26T15:19:55Z | 2026-02-26T15:19:55Z |
| suse-su-2026:0666-1 | Security update for docker | 2026-02-26T15:17:25Z | 2026-02-26T15:17:25Z |
| suse-su-2026:0665-1 | Security update for frr | 2026-02-26T15:16:24Z | 2026-02-26T15:16:24Z |
| suse-su-2026:0664-1 | Security update for python3 | 2026-02-26T15:15:20Z | 2026-02-26T15:15:20Z |
| suse-su-2026:0663-1 | Security update for python | 2026-02-26T15:13:11Z | 2026-02-26T15:13:11Z |
| suse-su-2026:0662-1 | Security update for qemu | 2026-02-26T15:12:26Z | 2026-02-26T15:12:26Z |
| suse-su-2026:0661-1 | Security update for erlang | 2026-02-26T15:10:09Z | 2026-02-26T15:10:09Z |
| suse-su-2026:0659-1 | Security update for docker-stable | 2026-02-26T15:08:37Z | 2026-02-26T15:08:37Z |
| suse-su-2026:0658-1 | Security update for libsoup | 2026-02-26T15:07:42Z | 2026-02-26T15:07:42Z |
| suse-su-2026:0657-1 | Security update for libsoup2 | 2026-02-26T15:07:11Z | 2026-02-26T15:07:11Z |
| suse-su-2026:0656-1 | Security update for freerdp | 2026-02-26T15:06:36Z | 2026-02-26T15:06:36Z |
| suse-su-2026:0642-1 | Security update for python313 | 2026-02-26T11:53:34Z | 2026-02-26T11:53:34Z |
| suse-su-2026:0650-1 | Security update for redis | 2026-02-25T16:33:31Z | 2026-02-25T16:33:31Z |
| suse-su-2026:0649-1 | Security update for freerdp | 2026-02-25T16:31:37Z | 2026-02-25T16:31:37Z |
| suse-su-2026:0648-1 | Security update for libjxl | 2026-02-25T16:30:57Z | 2026-02-25T16:30:57Z |
| suse-su-2026:0647-1 | Security update for expat | 2026-02-25T16:30:09Z | 2026-02-25T16:30:09Z |
| suse-su-2026:0646-1 | Security update for expat | 2026-02-25T16:29:24Z | 2026-02-25T16:29:24Z |
| suse-su-2026:0645-1 | Security update for python3 | 2026-02-25T16:29:02Z | 2026-02-25T16:29:02Z |
| suse-su-2026:0644-1 | Security update for python312 | 2026-02-25T16:28:23Z | 2026-02-25T16:28:23Z |
| suse-su-2026:0643-1 | Security update for python39 | 2026-02-25T16:27:51Z | 2026-02-25T16:27:51Z |
| suse-su-2026:0641-1 | Security update for docker-stable | 2026-02-25T16:25:10Z | 2026-02-25T16:25:10Z |
| suse-su-2026:0619-1 | Security update for openvswitch | 2026-02-24T15:36:20Z | 2026-02-24T15:36:20Z |
| suse-su-2026:0618-1 | Security update for protobuf | 2026-02-24T15:35:39Z | 2026-02-24T15:35:39Z |
| suse-su-2026:0617-1 | Security update for the Linux Kernel | 2026-02-24T15:19:04Z | 2026-02-24T15:19:04Z |
| suse-su-2026:0616-1 | Security update for postgresql14 | 2026-02-24T15:16:11Z | 2026-02-24T15:16:11Z |
| suse-su-2026:0615-1 | Security update for postgresql15 | 2026-02-24T15:15:59Z | 2026-02-24T15:15:59Z |
| suse-su-2026:0614-1 | Security update for postgresql16 | 2026-02-24T15:15:47Z | 2026-02-24T15:15:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10256-1 | regclient-0.11.2-1.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10255-1 | docker-stable-24.0.9_ce-17.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10254-1 | cockpit-tukit-0.1.7~git0.61e54f1-3.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10253-1 | cockpit-subscriptions-14.4-4.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10252-1 | cockpit-repos-4.7-4.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10251-1 | cockpit-packages-4.1-4.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10250-1 | cockpit-machines-348-1.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10249-1 | cmctl-2.4.1-1.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10248-1 | MozillaThunderbird-140.8.0-1.1 on GA media | 2026-02-25T00:00:00Z | 2026-02-25T00:00:00Z |
| opensuse-su-2026:10240-1 | weblate-5.16-1.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10239-1 | warewulf4-4.6.5-2.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10238-1 | python311-PyPDF2-2.11.1-4.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10237-1 | libopenssl-3-devel-3.5.3-2.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10236-1 | heroic-games-launcher-2.20.0-1.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10235-1 | cosign-3.0.5-1.1 on GA media | 2026-02-23T00:00:00Z | 2026-02-23T00:00:00Z |
| opensuse-su-2026:10233-1 | kyverno-1.17.1-1.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:10232-1 | cosign-3.0.4-2.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:10231-1 | busybox-1.37.0-9.1 on GA media | 2026-02-20T00:00:00Z | 2026-02-20T00:00:00Z |
| opensuse-su-2026:10224-1 | rclone-1.73.1-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10223-1 | python313-3.13.12-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10222-1 | python312-3.12.12-5.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10221-1 | python311-3.11.14-4.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10220-1 | istioctl-1.28.4-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10219-1 | dnsdist-2.0.2-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10218-1 | MozillaThunderbird-140.7.2-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10210-1 | python311-pip-26.0.1-1.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10209-1 | libsoup-2_4-1-2.74.3-16.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10208-1 | libsoup-3_0-0-3.6.5-13.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10207-1 | frr-10.2.1-4.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10200-1 | python310-3.10.19-4.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2026-041-02 | Multiple Vulnerabilities on EcoStruxure™ Building Operation Workstation and EcoStruxure™ Building Operation Webstation | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2026-041-01 | Improper Check for Unusual or Exceptional Conditions on Multiple Products | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2026-013-04 | Multiple Vulnerabilities on EcoStruxure Power Build Rapsody | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2026-013-03 | Multiple Vulnerabilities on Zigbee Products | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2026-013-02 | Incorrect Default Permissions Vulnerability on EcoStruxure™ Process Expert | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2026-013-01 | Multiple Third-Party Vulnerabilities on ProLeiT Plant iT/Brewmaxx | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2025-343-02 | EcoStruxure™ Foxboro DCS Advisor | 2025-12-09T08:00:00.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2025-343-01 | EcoStruxure™ Foxboro DCS | 2025-12-09T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-315-02 | EcoStruxure™ Machine SCADA Expert & Pro-face BLUE Open Studio | 2025-11-11T08:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-315-01 | PowerChute™ Serial Shutdown | 2025-11-11T08:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-287-01 | EcoStruxure™ OPC UA Server Expert and EcoStruxure™ Modicon Communication Server | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2025-252-02 | Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-09T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-252-01 | Multiple Altivar Process Drives and Communication Modules | 2025-09-09T04:00:00.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2025-224-05 | Modicon M340 Controller and Communication Modules | 2025-08-12T04:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-224-04 | EcoStruxure™ Building Operation Enterprise Server, EcoStruxure™ Building Operation Enterprise Central, and EcoStruxure™ Workstation | 2025-08-12T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-03 | Schneider Electric Software Update | 2025-08-12T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-02 | EcoStruxure™ Power Monitoring Expert Software & EcoStruxure™ Power Operation (EPO) and EcoStruxure™ Power SCADA Operation (PSO) | 2025-08-12T04:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-224-01 | Saitel DR & Saitel DP Remote Terminal Unit | 2025-08-12T04:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-189-04 | EcoStruxure™ Power Monitoring Expert (PME) and EcoStruxure™ Power Operation (EPO) with Advanced Reporting and Dashboards | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-189-03 | EcoStruxure™ Power Operation | 2025-07-08T04:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-189-02 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-189-01 | EcoStruxure™ IT Data Center Expert | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-03 | EVLink WallBox | 2025-06-10T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-02 | Modicon Controllers M241/M251/M258/LMC058/M262 | 2025-06-10T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-01 | Insight Home and Insight Facility | 2025-06-10T04:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2025-133-05 | Galaxy VS, Galaxy VL, Galaxy VXL | 2025-05-13T04:00:00.000Z | 2025-09-24T04:00:00.000Z |
| sevd-2025-133-04 | Schneider Electric PrismaSeT Active - Wireless Panel Server | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-03 | EcoStruxure Power Build Rapsody | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-02 | Wiser Home Automation | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-01 | Modicon Controllers M241/M251/M258/LMC058 | 2025-05-13T04:00:00.000Z | 2025-10-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-pytorch-2025-2149 | PyTorch Quantized Sigmoid Module nnq_Sigmoid initialization | 2026-02-26T15:23:05.500Z | 2026-02-26T15:46:51.306Z |
| bit-pytorch-2025-2148 | PyTorch Tuple torch.ops.profiler._call_end_callbacks_on_jit_fut memory corruption | 2026-02-26T15:23:02.496Z | 2026-02-26T15:46:51.306Z |
| bit-neo4j-2026-1337 | Insufficient escaping of unicode characters in query log | 2026-02-26T15:16:17.899Z | 2026-02-26T15:46:51.306Z |
| bit-superset-2026-23983 | Apache Superset: Sensitive Data Exposure via REST API (disabled by default) | 2026-02-26T08:54:03.107Z | 2026-02-26T09:13:58.886Z |
| bit-superset-2026-23982 | Apache Superset: Improper Authorization in Dataset Creation Allows Access Control Bypass | 2026-02-26T08:54:01.397Z | 2026-02-26T09:13:58.886Z |
| bit-superset-2026-23980 | Apache Superset: Improper Neutralization of Special Elements used in a SQL Command | 2026-02-26T08:53:59.760Z | 2026-02-26T09:13:58.886Z |
| bit-valkey-2026-27623 | Valkey has Pre-Authentication DOS from malformed RESP request | 2026-02-26T08:53:22.415Z | 2026-02-26T09:13:58.886Z |
| bit-valkey-2026-21863 | Malformed Valkey Cluster bus message can lead to Remote DoS | 2026-02-26T08:53:20.799Z | 2026-02-26T09:13:58.886Z |
| bit-valkey-2025-67733 | Valkey Affected by RESP Protocol Injection via Lua error_reply | 2026-02-26T08:53:18.978Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-25613 | An unsafe cast in the MongoDB query planner can result in a segmentation fault. | 2026-02-26T08:47:48.322Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-25610 | Invalid $geoNear index hint may cause server crash | 2026-02-26T08:47:46.620Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-25609 | profile command may permit unauthorized configuration | 2026-02-26T08:47:44.983Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-1850 | An authorized user may disable the MongoDB server by issuing a certain type of complex query due to boolean expression simplification | 2026-02-26T08:47:43.390Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-1849 | Mongod can run out of stack memory when expressions create deeply nested documents | 2026-02-26T08:47:41.788Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-1848 | Connections received from the proxy port may not count towards total accepted connections | 2026-02-26T08:47:40.094Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-1847 | MongoDB Server may crash when inserting large documents | 2026-02-26T08:47:38.190Z | 2026-02-26T09:13:58.886Z |
| bit-airflow-2025-27555 | Apache Airflow: Connection Secrets not masked in UI when Connection are added via Airflow cli | 2026-02-26T08:39:17.851Z | 2026-02-26T09:13:58.886Z |
| bit-airflow-2024-56373 | Apache Airflow: SSTI to Code Execution in Airflow through Shared DB Information | 2026-02-26T08:39:15.266Z | 2026-02-26T09:13:58.886Z |
| bit-airflow-2025-65995 | Apache Airflow: Disclosure of secrets to UI via kwargs | 2026-02-24T08:38:47.831Z | 2026-02-24T09:11:39.593Z |
| bit-ghost-2026-26980 | Ghost has a SQL Injection in its Content API | 2026-02-21T08:39:22.999Z | 2026-02-21T09:08:21.332Z |
| bit-cilium-2026-26963 | Cilium may not enforce host firewall policies when Native Routing, WireGuard and Node Encryption are enabled | 2026-02-21T08:36:53.368Z | 2026-02-21T09:08:21.332Z |
| bit-cosign-2026-24122 | Cosign Certificate Chain Expiry Validation Issue Allows Issuing Certificate Expiry to Be Overlooked | 2026-02-21T08:36:39.661Z | 2026-02-21T09:08:21.332Z |
| bit-tomcat-2026-24734 | Apache Tomcat Native, Apache Tomcat: OCSP revocation bypass | 2026-02-20T09:53:00.269Z | 2026-02-20T10:18:37.619Z |
| bit-tomcat-2026-24733 | Apache Tomcat: Security constraint bypass with HTTP/0.9 | 2026-02-20T09:52:58.708Z | 2026-02-24T09:11:39.593Z |
| bit-tomcat-2025-66614 | Apache Tomcat: Client certificate verification bypass due to virtual host mapping | 2026-02-20T09:52:57.300Z | 2026-02-24T09:11:39.593Z |
| bit-nifi-2026-25903 | Apache NiFi: Missing Authorization of Restricted Permissions for Component Updates | 2026-02-20T08:45:57.883Z | 2026-02-20T09:09:49.097Z |
| bit-jenkins-2026-27100 | 2026-02-20T08:43:34.823Z | 2026-02-20T09:09:49.097Z | |
| bit-milvus-2025-64513 | Milvus Proxy has Critical Authentication Bypass Vulnerability | 2026-02-20T08:43:34.608Z | 2026-02-20T09:09:49.097Z |
| bit-jenkins-2026-27099 | 2026-02-20T08:43:33.019Z | 2026-02-20T09:09:49.097Z | |
| bit-grafana-2026-21722 | Public Dashboards time range restriction on annotations can be bypassed | 2026-02-20T08:41:29.411Z | 2026-02-20T09:09:49.097Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-vu62737 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-26T00:41:56.473097Z | 2026-02-25T07:34:17Z |
| cleanstart-2026-rd09851 | net/url package does not set a limit on the number of query parameters in a query | 2026-02-25T00:53:44.039015Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-uk11127 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:52:43.391940Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-wk32717 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:52:13.178542Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-pm90259 | Cancelling a query (e | 2026-02-25T00:50:43.010672Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-oo47906 | Security fixes for GHSA-vc5p-v9hr-52mj applied in versions: 4.1.1-r0 | 2026-02-25T00:49:14.177631Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-zs11519 | Security fixes for GHSA-vc5p-v9hr-52mj applied in versions: 4.1.1-r0 | 2026-02-25T00:49:13.663387Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-ds30740 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-25T00:46:12.495329Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-dc27717 | OpenVPN version 2 | 2026-02-25T00:39:42.192253Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-dn18334 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:39:41.622120Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-xk29348 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 8.4.0-r0 | 2026-02-25T00:39:11.477214Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-yq79300 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-24T00:45:20.890998Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-sp64433 | Security fixes for GHSA-6rw7-vpxm-498p, GHSA-73rr-hh4g-fpgx, GHSA-8qq5-rm4j-mr97 applied in versions: 4.2.1.1-r1 | 2026-02-24T00:44:51.180009Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-lm41397 | node-tar is a full-featured Tar for Node | 2026-02-24T00:40:50.950958Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-ln12820 | vulnerability has been identified in Node | 2026-02-19T00:58:49.154512Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-kn34553 | vulnerability has been identified in Node | 2026-02-19T00:58:48.926519Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-nn87556 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.29.0-r0 | 2026-02-19T00:39:07.788394Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-oj16660 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0 | 2026-02-19T00:39:07.225007Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-kn30288 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-rhfx-m35p-ff5j, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0 | 2026-02-19T00:39:07.163109Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-yn08405 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 7.1.1-r7 | 2026-02-19T00:39:05.944714Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-zt77083 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-02-18T00:40:43.959662Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-dt95939 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.674179Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-lr19699 | Within HostnameError | 2026-02-18T00:37:41.636616Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-rs39538 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.553514Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-at88149 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.548996Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-gg58376 | Within HostnameError | 2026-02-17T00:41:15.939977Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-xv54160 | Within HostnameError | 2026-02-17T00:41:15.330012Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-uh39784 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-17T00:40:45.017480Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-vg57433 | Within HostnameError | 2026-02-17T00:39:45.599344Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-jr03360 | Within HostnameError | 2026-02-17T00:39:45.300172Z | 2026-02-16T09:23:22Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2026-019 | 2026-02-25T18:51:43.000Z | 2026-02-25T18:51:43.000Z | |
| drupal-contrib-2026-018 | 2026-02-25T18:51:26.000Z | 2026-02-25T18:51:26.000Z | |
| drupal-contrib-2026-017 | 2026-02-25T18:51:01.000Z | 2026-02-25T18:51:01.000Z | |
| drupal-contrib-2026-016 | 2026-02-25T18:49:59.000Z | 2026-02-25T18:49:59.000Z | |
| drupal-contrib-2026-015 | 2026-02-25T18:47:57.000Z | 2026-02-25T18:47:57.000Z | |
| drupal-contrib-2026-014 | 2026-02-25T18:46:10.000Z | 2026-02-25T18:46:10.000Z | |
| drupal-contrib-2026-013 | 2026-02-25T18:45:13.000Z | 2026-02-25T18:45:13.000Z | |
| drupal-contrib-2026-012 | 2026-02-25T18:44:38.000Z | 2026-02-25T18:44:38.000Z | |
| drupal-contrib-2026-011 | 2026-02-25T18:43:32.000Z | 2026-02-25T18:43:32.000Z | |
| drupal-contrib-2026-010 | 2026-02-11T16:54:18.000Z | 2026-02-25T17:17:46.000Z | |
| drupal-contrib-2026-009 | 2026-02-11T16:53:32.000Z | 2026-02-12T15:37:20.000Z | |
| drupal-contrib-2026-008 | 2026-02-04T17:23:40.000Z | 2026-02-04T17:23:40.000Z | |
| drupal-contrib-2026-007 | 2026-01-28T17:29:32.000Z | 2026-01-28T17:29:32.000Z | |
| drupal-contrib-2026-006 | 2026-01-28T17:28:31.000Z | 2026-01-28T17:28:31.000Z | |
| drupal-contrib-2026-005 | 2026-01-14T17:57:31.000Z | 2026-01-14T18:33:02.000Z | |
| drupal-contrib-2026-004 | 2026-01-14T17:56:28.000Z | 2026-01-14T17:56:28.000Z | |
| drupal-contrib-2026-003 | 2026-01-14T17:55:41.000Z | 2026-01-14T17:55:41.000Z | |
| drupal-contrib-2026-002 | 2026-01-14T17:54:33.000Z | 2026-01-14T17:54:33.000Z | |
| drupal-contrib-2026-001 | 2026-01-14T17:53:33.000Z | 2026-01-14T17:53:33.000Z | |
| drupal-contrib-2025-126 | 2025-12-17T17:47:13.000Z | 2025-12-17T17:47:13.000Z | |
| drupal-contrib-2025-125 | 2025-12-10T17:53:01.000Z | 2025-12-10T19:09:57.000Z | |
| drupal-contrib-2025-124 | 2025-12-03T18:49:57.000Z | 2025-12-03T18:49:57.000Z | |
| drupal-contrib-2025-123 | 2025-12-03T18:49:40.000Z | 2025-12-03T18:49:40.000Z | |
| drupal-contrib-2025-122 | 2025-12-03T18:49:18.000Z | 2025-12-03T18:49:18.000Z | |
| drupal-contrib-2025-121 | 2025-12-03T18:48:57.000Z | 2025-12-03T18:48:57.000Z | |
| drupal-contrib-2025-120 | 2025-12-03T18:48:37.000Z | 2025-12-03T18:48:37.000Z | |
| drupal-contrib-2025-119 | 2025-12-03T18:48:23.000Z | 2025-12-03T19:05:53.000Z | |
| drupal-contrib-2025-118 | 2025-12-03T18:48:10.000Z | 2025-12-03T18:48:10.000Z | |
| drupal-contrib-2025-117 | 2025-12-03T18:47:37.000Z | 2025-12-03T18:47:37.000Z | |
| drupal-contrib-2025-116 | 2025-11-05T18:09:13.000Z | 2025-11-05T18:09:13.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-10652 | Google Chrome代码执行漏洞(CNVD-2026-10652) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10651 | Google SentencePiece缓冲区溢出漏洞 | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10650 | Google Go代码执行漏洞(CNVD-2026-10650) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10649 | Google Go拒绝服务漏洞(CNVD-2026-10649) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10648 | Google Go代码执行漏洞 | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10647 | Google Go拒绝服务漏洞(CNVD-2026-10647) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10646 | Google Go信息泄露漏洞(CNVD-2026-10646) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10645 | Google Chrome信息泄露漏洞(CNVD-2026-10645) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10641 | Google Android信息泄露漏洞(CNVD-2026-10641) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10356 | TOTOLINK X6000R命令注入漏洞(CNVD-2026-10356) | 2026-02-05 | 2026-02-05 |
| cnvd-2026-10871 | WordPress插件metasync存在未明漏洞 | 2026-02-04 | 2026-02-12 |
| cnvd-2026-10870 | WordPress插件Simple User Registration访问控制错误漏洞 | 2026-02-04 | 2026-02-12 |
| cnvd-2026-10893 | WordPress插件WP FullCalendar信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10892 | WordPress插件WP Directory Kit信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10891 | WordPress插件CubeWP – All-in-One Dynamic Content Framework信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10890 | WordPress插件Contact Form 7 GetResponse Extension信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10889 | WordPress插件Cargus信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10888 | WordPress插件Booking Ultra Pro信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10855 | Rockwell Automation CompactLogix 5370拒绝服务漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10854 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10854) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10852 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10852) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10851 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10851) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10850 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10850) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10849 | Rockwell Automation ArmorStart LT拒绝服务漏洞(CNVD-2026-10849) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10848 | Rockwell Automation ArmorStart LT拒绝服务漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10666 | MedDream PACS Premium任意文件读取漏洞 | 2026-01-30 | 2026-02-11 |
| cnvd-2026-10665 | MedDream PACS Premium跨站脚本漏洞 | 2026-01-30 | 2026-02-11 |
| cnvd-2026-10664 | IBM Aspera Console日志信息泄露漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10663 | IBM Concert代码问题漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10662 | IBM Concert信息泄露漏洞(CNVD-2026-10662) | 2026-01-30 | 2026-02-10 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0227 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0226 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0225 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0224 | Multiples vulnérabilités dans les produits IBM | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0223 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0222 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0221 | Multiples vulnérabilités dans les produits Centreon | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0220 | Multiples vulnérabilités dans les produits Elastic | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0219 | Vulnérabilité dans Stormshield Network Security | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0218 | Multiples vulnérabilités dans les produits VMware | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0217 | Multiples vulnérabilités dans SPIP | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0216 | Vulnérabilité dans PostgreSQL | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0215 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0214 | Vulnérabilité dans Juniper Networks Junos OS Evolved | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0213 | Multiples vulnérabilités dans les produits Cisco | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0212 | Multiples vulnérabilités dans les produits Centreon | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0211 | Multiples vulnérabilités dans Wireshark | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0210 | Multiples vulnérabilités dans Cisco Catalyst SD-WAN | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0209 | Multiples vulnérabilités dans les produits VMware | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0208 | Vulnérabilité dans les produits Synology | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0207 | Multiples vulnérabilités dans GitLab | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0206 | Multiples vulnérabilités dans les produits Trend Micro | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0205 | Multiples vulnérabilités dans SolarWinds Serv-U | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0204 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0203 | Vulnérabilité dans Microsoft Azure Linux | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0202 | Multiples vulnérabilités dans les produits SonicWall | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0201 | Multiples vulnérabilités dans Mattermost Server | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0200 | Vulnérabilité dans Centreon open tickets | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0199 | Multiples vulnérabilités dans les produits VMware | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0198 | Multiples vulnérabilités dans Google Chrome | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-ale-002 | [MàJ] Vulnérabilité dans Cisco Catalyst SD-WAN | 2026-02-25T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-ale-001 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2026-01-30T00:00:00.000000 | 2026-02-03T00:00:00.000000 |
| certfr-2025-ale-014 | [MàJ] Vulnérabilité dans React Server Components | 2025-12-05T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2025-ale-013 | [MàJ] Multiples vulnérabilités dans Cisco ASA et FTD | 2025-09-25T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-ale-012 | Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2025-08-26T00:00:00.000000 | 2025-09-26T00:00:00.000000 |
| certfr-2025-ale-011 | Incidents de sécurité dans les pare-feux SonicWall | 2025-08-05T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| certfr-2025-ale-010 | [MàJ] Multiples vulnérabilités dans Microsoft SharePoint | 2025-07-21T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| certfr-2025-ale-009 | Multiples vulnérabilités dans Citrix NetScaler ADC et NetScaler Gateway | 2025-07-01T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| certfr-2025-ale-008 | [MàJ] Vulnérabilité dans Roundcube | 2025-06-05T00:00:00.000000 | 2025-07-21T00:00:00.000000 |
| certfr-2025-ale-007 | Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile (EPMM) | 2025-05-14T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-006 | Vulnérabilité dans les produits Fortinet | 2025-05-13T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-002 | [MàJ] Vulnérabilité dans les produits Fortinet | 2025-05-07T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| certfr-2025-ale-005 | Vulnérabilité dans SAP NetWeaver | 2025-04-28T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-004 | Activités de post-exploitation dans Fortinet FortiGate | 2025-04-11T00:00:00.000000 | 2025-08-07T00:00:00.000000 |
| certfr-2025-ale-003 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-04-04T00:00:00.000000 | 2025-04-11T00:00:00.000000 |
| certfr-2024-ale-013 | Exploitations de vulnérabilités dans Ivanti Cloud Services Appliance (CSA) | 2025-03-31T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| certfr-2025-ale-001 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| certfr-2024-ale-015 | [MàJ] Multiples vulnérabilités sur l'interface d'administration des équipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-ale-014 | [MàJ] Multiples vulnérabilités dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-ale-012 | [MàJ] Vulnérabilités affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-011 | Vulnérabilité dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-010 | Multiples vulnérabilités dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| certfr-2024-ale-009 | Vulnérabilité dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| certfr-2024-ale-008 | [MàJ] Vulnérabilité dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-007 | Multiples vulnérabilités dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-006 | [MàJ] Vulnérabilité dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-005 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2024-02-15T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-004 | [MàJ] Vulnérabilité dans Fortinet FortiOS | 2024-02-09T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-003 | [MàJ] Incident affectant les solutions AnyDesk | 2024-02-05T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2026-0015 |
7.2 (4.0)
|
Threat actors use FortiCloud SSO bypass to collect LDA… |
fortinet |
fortios |
2026-02-09T09:09:00.000Z | 2026-02-09T09:14:59.004089Z |
| GCVE-1-2026-0014 |
7.4 (4.0)
|
Missing Authorization Check Allows Unauthorized Modifi… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:32:14.341383Z | 2026-02-04T19:32:14.341383Z |
| GCVE-1-2026-0013 |
2.1 (4.0)
|
Flask Application Username Route Collision Allows Rese… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:27:00.000Z | 2026-02-04T19:32:49.787763Z |
| GCVE-1-2026-0012 |
2.1 (4.0)
|
Authentication Error Message Allows Email Address Enum… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:21:34.411344Z | 2026-02-04T19:21:34.411344Z |
| GCVE-1-2026-0011 |
8.7 (4.0)
|
Out-of-bounds memory write in the network packet … |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:37:00.000Z | 2026-01-29T14:39:17.728822Z |
| GCVE-1-2026-0010 |
9.3 (4.0)
|
Improper input validation in the file transfer ha… |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:33:18.822829Z | 2026-01-29T14:33:18.822829Z |
| GCVE-1-2026-0009 |
9.3 (4.0)
|
Stack-based buffer overflow in the multiplayer ne… |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:30:38.596928Z | 2026-01-29T14:30:38.596928Z |
| GCVE-1-2026-0008 |
10 (4.0)
|
gpg-agent stack buffer overflow in pkdecrypt using KEM |
gnupg |
gpg-agent |
2026-01-28T13:48:12.350509Z | 2026-01-28T13:48:12.350509Z |
| GCVE-1-2026-0007 |
10 (4.0)
|
GNU InetUtils Security Advisory: remote authentication… |
gnu |
InetUtils |
2026-01-20T20:57:00.000Z | 2026-01-26T16:32:40.831364Z |
| GCVE-1-2026-0006 |
8.5 (4.0)
|
Improper Access Control in Cerebrate AuthKey and Encry… |
cerebrate |
cerebrate |
2026-01-13T15:37:17.337254Z | 2026-01-13T15:37:17.337254Z |
| GCVE-1-2026-0005 |
8.5 (4.0)
|
Improper Access Control in Cerebrate Alignment Model A… |
cerebrate |
cerebrate |
2026-01-13T15:31:00.000Z | 2026-01-13T15:38:02.888546Z |
| GCVE-1-2026-0004 |
8.5 (4.0)
|
Authorization Bypass in Cerebrate IndividualsControlle… |
cerebrate |
cerebrate |
2026-01-13T15:28:00.000Z | 2026-01-13T15:38:37.744618Z |
| GCVE-1-2026-0003 |
6.3 (4.0)
|
Stored/Reflected XSS via Unsanitized Parameters in URL… |
misp |
misp |
2026-01-13T10:50:00.000Z | 2026-01-13T10:54:13.659223Z |
| GCVE-1-2026-0002 |
10 (4.0)
|
Heap-buffer-overflow in EXIF writer for extra IFD tags |
ffmpeg |
ffmpeg |
2026-01-02T19:50:00.000Z | 2026-01-02T20:05:27.269877Z |
| GCVE-1-2026-0001 |
N/A
|
Bundle reference to gpg.fail |
gnupg |
gnupg |
2026-01-02T10:20:00.000Z | 2026-01-02T13:31:14.359346Z |
| GCVE-1-2025-0041 |
6.4 (4.0)
|
[online services] Reflected Cross-Site Scripting (XSS)… |
typo3 |
typo3 |
2025-12-19T14:25:00.000Z | 2025-12-19T14:54:51.594645Z |
| GCVE-1-2025-0040 |
7.2 (4.0)
|
A cross-site scripting (XSS) vulnerability was id… |
misp |
misp |
2025-12-13T08:44:32.378924Z | 2025-12-13T08:44:32.378924Z |
| GCVE-1-2025-0039 |
8.5 (4.0)
|
XSS Reintroduced in MISP Dashboard World Map Widget Du… |
misp |
misp |
2025-12-10T14:33:52.856734Z | 2025-12-10T14:33:52.856734Z |
| GCVE-1-2025-0038 |
5 (4.0)
|
Reflected XSS in MISP Template Tag Removal and MISP Ad… |
misp |
misp |
2025-12-10T14:10:00.000Z | 2025-12-10T14:16:55.918270Z |
| GCVE-1-2025-0037 |
7 (4.0)
|
Reflected XSS in MISP Dashboard Widgets via Unescaped … |
misp |
misp |
2025-12-10T14:01:03.200804Z | 2025-12-10T14:01:03.200804Z |
| GCVE-1-2025-0036 |
8.3 (4.0)
|
A reflected cross-site scripting (XSS) vulnerability w… |
misp |
misp |
2025-12-10T13:46:07.170083Z | 2025-12-10T13:46:07.170083Z |
| GCVE-1-2025-0035 |
8.3 (4.0)
|
Insufficient sanitization of bundle metadata (availabl… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:25:00.000Z | 2025-12-08T12:14:06.307298Z |
| GCVE-1-2025-0034 |
7 (4.0)
|
Missing CSRF protection on state-changing endpoints in… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:19:00.000Z | 2025-12-08T12:13:24.197294Z |
| GCVE-1-2025-0033 |
8.1 (4.0)
|
Vulnerability-lookup did not track or limit failed One… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:11:00.000Z | 2025-12-08T12:12:53.235996Z |
| GCVE-1-2025-0032 |
10 (4.0)
|
The default configuration of WatchGuard Firebox device… |
watchguard |
firebox |
2025-12-03T16:25:00.000Z | 2025-12-19T13:48:34.570799Z |
| GCVE-1-2025-0031 |
7.1 (4.0)
|
A cross-site scripting (XSS) vulnerability was identif… |
misp |
misp |
2025-12-03T10:58:00.000Z | 2025-12-16T09:36:09.594750Z |
| GCVE-1-2025-0030 |
6.2 (4.0)
|
A cross-site scripting (XSS) vulnerability in the MISP… |
misp |
misp |
2025-12-03T10:53:00.000Z | 2025-12-03T10:58:55.845341Z |
| GCVE-1-2025-0029 |
6.3 (4.0)
|
Reflected cross-site scripting (XSS) vulnerabilities i… |
misp |
misp |
2025-11-27T12:41:00.000Z | 2025-11-27T12:48:51.085860Z |
| GCVE-1-2025-0028 |
8.5 (4.0)
|
Information leakage vulnerability in the MISP Feed con… |
misp |
misp |
2025-11-27T07:23:00.000Z | 2025-12-02T08:51:35.429494Z |
| GCVE-1-2025-0027 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in … |
misp |
misp |
2025-11-27T07:17:00.000Z | 2025-12-02T08:51:04.323899Z |