Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1721 |
6.2 (4.0)
|
Reflected Cross-Site Scripting (XSS) vulnerability in … |
|
|
2026-02-13T01:46:48.674Z | 2026-02-13T13:14:26.837Z |
| CVE-2025-9293 |
7.7 (4.0)
|
Insufficient Certificate Validation in Multiple Mobile… |
TP-Link Systems Inc. |
Tapo App |
2026-02-13T00:22:27.459Z | 2026-02-13T22:10:15.723Z |
| CVE-2025-9292 |
2 (4.0)
|
Permissive Web Security Policy Allows Cross-Origin Acc… |
TP-Link Systems Inc. |
Omada Cloud Controller |
2026-02-13T00:21:24.168Z | 2026-02-13T22:09:17.957Z |
| CVE-2025-70957 |
N/A
|
A Denial of Service (DoS) vulnerability was disco… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T21:38:42.391Z |
| CVE-2025-70956 |
7.5 (3.1)
|
A State Pollution vulnerability was discovered in… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-17T15:15:36.481Z |
| CVE-2025-70955 |
N/A
|
A Stack Overflow vulnerability was discovered in … |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T21:36:34.624Z |
| CVE-2025-70954 |
7.5 (3.1)
|
A Null Pointer Dereference vulnerability exists i… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-17T15:10:29.388Z |
| CVE-2025-70866 |
8.8 (3.1)
|
LavaLite CMS 10.1.0 is vulnerable to Incorrect Ac… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-17T15:14:47.415Z |
| CVE-2025-70123 |
7.5 (3.1)
|
An improper input validation and protocol complia… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T20:58:52.885Z |
| CVE-2025-70122 |
7.5 (3.1)
|
A heap buffer overflow vulnerability in the UPF c… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T20:59:50.895Z |
| CVE-2025-70121 |
7.5 (3.1)
|
An array index out of bounds vulnerability in the… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T21:00:54.446Z |
| CVE-2025-70095 |
6.5 (3.1)
|
A cross-site scripting (XSS) vulnerability in the… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T16:33:57.399Z |
| CVE-2025-70094 |
6.5 (3.1)
|
A cross-site scripting (XSS) vulnerability in the… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T16:36:56.152Z |
| CVE-2025-70093 |
7.4 (3.1)
|
An issue in OpenSourcePOS v3.4.1 allows attackers… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T21:04:14.693Z |
| CVE-2025-70091 |
6.5 (3.1)
|
A cross-site scripting (XSS) vulnerability in the… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T16:35:01.441Z |
| CVE-2025-69770 |
10 (3.1)
|
A zip slip vulnerability in the /DesignTools/Skin… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T19:00:24.386Z |
| CVE-2025-69633 |
9.8 (3.1)
|
A SQL Injection vulnerability in the Advanced Pop… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-17T15:09:45.962Z |
| CVE-2025-66676 |
6.2 (3.1)
|
An issue in IObit Unlocker v1.3.0.11 allows attac… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T19:08:05.864Z |
| CVE-2024-21961 |
6 (4.0)
|
Improper restriction of operations within the bou… |
AMD |
AMD EPYC™ 7002 Series Processors |
2026-02-12T23:45:09.575Z | 2026-02-13T13:19:41.189Z |
| CVE-2025-40905 |
7.3 (3.1)
|
WWW::OAuth 1.000 and earlier for Perl uses insecure ra… |
DBOOK |
WWW::OAuth |
2026-02-12T23:39:28.994Z | 2026-02-17T15:05:12.318Z |
| CVE-2026-26188 |
5.1 (4.0)
|
Solspace Freeform plugin affected by Stored Cross-Site… |
solspace |
craft-freeform |
2026-02-12T22:55:19.859Z | 2026-02-13T15:05:01.855Z |
| CVE-2019-25335 |
8.8 (4.0)
7.5 (3.1)
|
PRO-7070 Hazır Profesyonel Web Sitesi 1.0 - Authentica… |
Websitem |
7070 Hazır Profesyonel Web Sitesi |
2026-02-12T22:49:47.357Z | 2026-02-13T17:04:47.440Z |
| CVE-2020-37167 |
8.6 (4.0)
9.8 (3.1)
|
ClamAV ClamBC <= 0.102.0 - 'ClamBC' Executable Regular… |
ClamAV |
ClamBC |
2026-02-12T22:48:50.169Z | 2026-02-13T17:08:48.384Z |
| CVE-2019-25342 |
7.1 (4.0)
7.5 (3.1)
|
Centova Cast 3.2.12 - Denial of Service |
Centova Technologies Inc. |
Centova Cast |
2026-02-12T22:48:49.447Z | 2026-02-13T17:08:16.428Z |
| CVE-2019-25341 |
6.7 (4.0)
7.5 (3.1)
|
iNetTools for iOS 8.20 - 'Whois' Denial of Service |
inettools |
iNetTools for iOS |
2026-02-12T22:48:48.798Z | 2026-02-13T17:07:35.544Z |
| CVE-2019-25340 |
6.7 (4.0)
7.5 (3.1)
|
SpotAuditor 5.3.2 - 'Base64' Denial Of Service |
Nsasoft |
Nsauditor SpotAuditor |
2026-02-12T22:48:48.045Z | 2026-02-13T17:59:14.954Z |
| CVE-2019-25339 |
6.7 (4.0)
7.5 (3.1)
|
GHIA CamIP 1.2 for iOS - 'Password' Denial of Service |
ghia-camip |
GHIA CamIP |
2026-02-12T22:48:47.349Z | 2026-02-13T17:06:15.410Z |
| CVE-2019-25338 |
6.9 (4.0)
7.5 (3.1)
|
Dokuwiki 2018-04-22b - Username Enumeration |
Dokuwiki |
Dokuwiki |
2026-02-12T22:48:46.640Z | 2026-02-13T17:05:43.384Z |
| CVE-2019-25337 |
5.3 (4.0)
9.8 (3.1)
|
OwnCloud 8.1.8 - Username Disclosure |
OwnCloud |
OwnCloud |
2026-02-12T22:48:45.879Z | 2026-02-13T17:11:58.109Z |
| CVE-2019-25336 |
8.4 (4.0)
8.4 (3.1)
|
SpotAuditor 5.3.2 - 'Base64' Local Buffer Overflow (SEH) |
Nsasoft |
Nsauditor SpotAuditor |
2026-02-12T22:48:45.169Z | 2026-02-13T17:11:32.676Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-35993 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:26.165Z | |
| CVE-2025-35976 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:27.321Z | |
| CVE-2025-35962 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:28.254Z | |
| CVE-2025-35961 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:29.217Z | |
| CVE-2025-35960 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:30.163Z | |
| CVE-2025-32734 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:31.105Z | |
| CVE-2025-32733 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:32.086Z | |
| CVE-2025-32090 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:33.149Z | |
| CVE-2025-32085 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:34.052Z | |
| CVE-2025-32082 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:34.967Z | |
| CVE-2025-32009 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:35.908Z | |
| CVE-2025-31942 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:36.831Z | |
| CVE-2025-31364 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:37.827Z | |
| CVE-2025-31358 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:38.910Z | |
| CVE-2025-31145 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:39.809Z | |
| CVE-2025-30517 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:40.775Z | |
| CVE-2025-29869 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:41.830Z | |
| CVE-2025-27941 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:42.759Z | |
| CVE-2025-27928 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:43.689Z | |
| CVE-2025-27573 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:44.839Z | |
| CVE-2025-27569 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:45.780Z | |
| CVE-2025-27251 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:46.735Z | |
| CVE-2025-26471 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:47.696Z | |
| CVE-2025-25049 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:48.644Z | |
| CVE-2025-24524 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:49.635Z | |
| CVE-2025-24518 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:50.751Z | |
| CVE-2025-24492 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:51.689Z | |
| CVE-2025-24321 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:52.650Z | |
| CVE-2025-24300 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:53.577Z | |
| CVE-2025-22845 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:54.533Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-27573 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.387 | 2026-02-13T19:16:29.387 |
| fkie_cve-2025-27569 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.327 | 2026-02-13T19:16:29.327 |
| fkie_cve-2025-27251 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.253 | 2026-02-13T19:16:29.253 |
| fkie_cve-2025-26471 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:28.970 | 2026-02-13T19:16:28.970 |
| fkie_cve-2025-25049 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:28.900 | 2026-02-13T19:16:28.900 |
| fkie_cve-2025-24524 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:28.103 | 2026-02-13T19:16:28.103 |
| fkie_cve-2025-24518 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:28.043 | 2026-02-13T19:16:28.043 |
| fkie_cve-2025-24492 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.983 | 2026-02-13T19:16:27.983 |
| fkie_cve-2025-24321 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.927 | 2026-02-13T19:16:27.927 |
| fkie_cve-2025-24300 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.860 | 2026-02-13T19:16:27.860 |
| fkie_cve-2025-22845 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.457 | 2026-02-13T19:16:27.457 |
| fkie_cve-2025-20110 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.397 | 2026-02-13T19:16:27.397 |
| fkie_cve-2025-20107 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.337 | 2026-02-13T19:16:27.337 |
| fkie_cve-2025-20098 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.277 | 2026-02-13T19:16:27.277 |
| fkie_cve-2025-20089 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.217 | 2026-02-13T19:16:27.217 |
| fkie_cve-2025-20078 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.153 | 2026-02-13T19:16:27.153 |
| fkie_cve-2025-20066 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.083 | 2026-02-13T19:16:27.083 |
| fkie_cve-2025-20038 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.013 | 2026-02-13T19:16:27.013 |
| fkie_cve-2025-20007 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:26.430 | 2026-02-13T19:16:26.430 |
| fkie_cve-2026-21870 | BACnet Protocol Stack library provides a BACnet application layer, network layer and media access (… | 2026-02-13T18:16:19.783 | 2026-02-13T21:43:11.137 |
| fkie_cve-2025-69770 | A zip slip vulnerability in the /DesignTools/SkinList.aspx endpoint of MojoPortal CMS v2.9.0.1 allo… | 2026-02-13T18:16:18.043 | 2026-02-13T21:43:11.137 |
| fkie_cve-2025-66676 | An issue in IObit Unlocker v1.3.0.11 allows attackers to cause a Denial of Service (DoS) via a craf… | 2026-02-13T18:16:17.923 | 2026-02-13T21:43:11.137 |
| fkie_cve-2026-26268 | Cursor is a code editor built for programming with AI. Sandbox escape via writing .git configuratio… | 2026-02-13T17:16:14.227 | 2026-02-13T21:43:11.137 |
| fkie_cve-2026-26226 | beautiful-mermaid versions prior to 0.1.3 contain an SVG attribute injection issue that can lead to… | 2026-02-13T17:16:14.073 | 2026-02-13T21:43:11.137 |
| fkie_cve-2026-2026 | A vulnerability has been identified where weak file permissions in the Nessus Agent directory on Wi… | 2026-02-13T17:16:14.383 | 2026-02-13T21:43:11.137 |
| fkie_cve-2025-70123 | An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote … | 2026-02-13T17:16:12.210 | 2026-02-13T21:43:11.137 |
| fkie_cve-2025-70122 | A heap buffer overflow vulnerability in the UPF component of free5GC v4.0.1 allows remote attackers… | 2026-02-13T17:16:12.090 | 2026-02-13T21:43:11.137 |
| fkie_cve-2025-70121 | An array index out of bounds vulnerability in the AMF component of free5GC v4.0.1 allows remote att… | 2026-02-13T17:16:11.933 | 2026-02-13T21:43:11.137 |
| fkie_cve-2025-1790 | Local privilege escalation in Genetec Sipelia Plugin. An authenticated low-privileged Windows user … | 2026-02-13T17:16:10.917 | 2026-02-13T21:43:11.137 |
| fkie_cve-2026-26221 | Hyland OnBase contains an unauthenticated .NET Remoting exposure in the OnBase Workflow Timer Servi… | 2026-02-13T16:16:11.683 | 2026-02-13T21:43:11.137 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-jvv7-w8wf-x5qf |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-j92v-6hj3-w3px |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-cv4w-3fxv-46qj |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-92pw-f528-rpv6 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-8jm4-qgjh-cx27 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-8fwh-8xq3-5p9g |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-84mp-8vq7-xv2j |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-759c-r8q3-h34c |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-62rf-3264-3g9f |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-59f7-pjhm-qcjr |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-37hx-vm8w-5g3h |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-26mx-cf39-24h8 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-xfxj-2mg2-fwpr |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-x9j2-qgwm-3hg3 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-w3r7-h5w7-jf97 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-qxhj-mrxj-g3gj |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-q5w8-336h-87cx |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-q242-7m47-x6fv |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-ppq7-wpmg-vgf2 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-pp3p-7vvq-9rj5 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-p56f-rc6p-7g84 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-m8gj-86pv-vqc2 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-jjq7-xhxj-wv3f |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-jcgj-pf6v-86q7 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-j93p-9qr7-vrfj |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-hhwf-v47h-h4hj |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-gmg3-fwxv-jmx3 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-f525-ph34-rggg |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-9wxp-h452-vpxm |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-8gf7-v8vv-8c6j |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-244 |
|
Apache Software Foundation Apache Submarine has an SQL injection vulnerability when a use… | apache-submarine | 2023-11-22T10:15:00+00:00 | 2023-11-22T11:21:52.095543+00:00 |
| pysec-2023-288 |
6.5 (3.1)
|
The Nautobot Device Onboarding plugin uses the netmiko and NAPALM libraries to simplify t… | nautobot-device-onboarding | 2023-11-21T23:15:00+00:00 | 2024-11-21T14:22:55.475794+00:00 |
| pysec-2023-302 |
7.5 (3.1)
|
An issue in /upydev/keygen.py in upydev v0.4.3 allows attackers to decrypt sensitive info… | upydev | 2023-11-20T23:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2023-240 |
|
Apache Software Foundation Apache Submarine has a bug when serializing against yaml. The … | apache-submarine | 2023-11-20T09:15:00+00:00 | 2023-11-20T11:21:41.073991+00:00 |
| pysec-2023-245 |
7.5 (3.1)
|
PyPinkSign v0.5.1 uses a non-random or static IV for Cipher Block Chaining (CBC) mode in … | pypinksign | 2023-11-16T18:15:00+00:00 | 2023-11-22T19:19:42.405614+00:00 |
| pysec-2023-243 |
7.4 (3.1)
|
Missing SSL certificate validation in localstack v2.3.2 allows attackers to eavesdrop on … | localstack | 2023-11-16T18:15:00Z | 2024-10-09T12:05:48.156835Z |
| pysec-2023-242 |
7.4 (3.1)
|
Missing SSL certificate validation in HTTPie v3.2.2 allows attackers to eavesdrop on comm… | httpie | 2023-11-16T18:15:00+00:00 | 2023-11-22T02:43:48.390438+00:00 |
| pysec-2023-304 |
8.8 (3.1)
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federate… | vantage6-server | 2023-11-14T21:15:00+00:00 | 2024-11-21T14:23:02.641254+00:00 |
| pysec-2023-303 |
8.8 (3.1)
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federate… | vantage6-node | 2023-11-14T21:15:00+00:00 | 2024-11-21T14:23:02.574095+00:00 |
| pysec-2023-247 |
6.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Affected … | aiohttp | 2023-11-14T21:15:00+00:00 | 2023-11-22T23:23:57.631856+00:00 |
| pysec-2023-246 |
7.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP … | aiohttp | 2023-11-14T21:15:00+00:00 | 2023-11-22T23:23:57.547793+00:00 |
| pysec-2023-239 |
6.8 (3.1)
|
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the remote end of an… | asyncssh | 2023-11-14T03:15:00+00:00 | 2023-11-20T09:25:38.326328+00:00 |
| pysec-2023-237 |
5.9 (3.1)
|
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the extension info m… | asyncssh | 2023-11-14T03:15:00+00:00 | 2023-11-17T17:27:01.919743+00:00 |
| pysec-2023-275 |
7.5 (3.1)
|
Label Studio is an open source data labeling tool. In all current versions of Label Studi… | label-studio | 2023-11-13T21:15:00+00:00 | 2024-11-21T14:22:53.350760+00:00 |
| pysec-2023-236 |
7.5 (3.1)
|
Remarshal prior to v0.17.1 expands YAML alias nodes unlimitedly, hence Remarshal is vulne… | remarshal | 2023-11-13T03:15:00+00:00 | 2023-11-16T20:25:23.801345+00:00 |
| pysec-2023-232 |
|
We failed to apply CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed the… | apache-airflow | 2023-11-12T14:15:00+00:00 | 2023-11-12T16:29:15.404665+00:00 |
| pysec-2023-231 |
|
Apache Airflow, versions before 2.7.3, has a vulnerability that allows an authorized user… | apache-airflow | 2023-11-12T14:15:00+00:00 | 2023-11-12T16:29:15.321733+00:00 |
| pysec-2023-241 |
9.1 (3.1)
|
Piccolo is an object-relational mapping and query builder which supports asyncio. Prior t… | piccolo | 2023-11-10T18:15:00Z | 2024-01-23T23:21:13.409656Z |
| pysec-2023-234 |
7.5 (3.1)
|
An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via w… | esptool | 2023-11-09T16:15:00Z | 2024-01-02T13:04:16.284694Z |
| pysec-2023-274 |
8.8 (3.1)
|
Label Studio is a multi-type data labeling and annotation tool with standardized output f… | label-studio | 2023-11-09T15:15:00+00:00 | 2024-11-21T14:22:53.173192+00:00 |
| pysec-2023-235 |
7.5 (3.1)
|
An issue was discovered in Couchbase Server 7.2.0. There is a private key leak in debug.l… | couchbase | 2023-11-08T21:15:00Z | 2024-01-03T21:03:33.010228Z |
| pysec-2023-233 |
8.8 (3.1)
|
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif,… | exiv2 | 2023-11-06T18:15:00Z | 2024-01-02T15:20:59.435740Z |
| pysec-2023-227 |
|
An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrol… | pillow | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:41.505456+00:00 |
| pysec-2023-226 |
|
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.te… | django | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:40.328470+00:00 |
| pysec-2023-225 |
|
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encodi… | django | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:40.160394+00:00 |
| pysec-2023-223 |
|
Unsafe YAML deserialization in yaml.Loader in transmute-core before 1.13.5 allows attacke… | transmute-core | 2023-11-02T06:15:00+00:00 | 2023-11-02T10:30:07.951105+00:00 |
| pysec-2023-222 |
|
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.… | django | 2023-11-02T06:15:00+00:00 | 2023-11-02T10:30:06.341485+00:00 |
| pysec-2023-230 |
5.3 (3.1)
|
Synapse is an open-source Matrix homeserver Prior to versions 1.95.1 and 1.96.0rc1, cache… | matrix-synapse | 2023-10-31T17:15:00+00:00 | 2023-11-08T20:24:49.199333+00:00 |
| pysec-2023-224 |
5.3 (3.1)
|
Twisted is an event-based framework for internet applications. Prior to version 23.10.0rc… | twisted | 2023-10-25T21:15:00+00:00 | 2023-11-02T16:33:16.395026+00:00 |
| pysec-2023-228 |
3.3 (3.1)
|
When installing a package from a Mercurial VCS URL (ie "pip install hg+...") with pip p… | pip | 2023-10-25T18:17:00+00:00 | 2023-11-03T16:28:41.538340+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2026-750 | Malicious code in dspmobile (npm) | 2026-02-05T01:07:59Z | 2026-02-06T03:05:23Z |
| mal-2026-754 | Malicious code in tailwindcss-animation-modern (npm) | 2026-02-05T01:06:23Z | 2026-02-06T03:05:26Z |
| MAL-2026-754 | Malicious code in tailwindcss-animation-modern (npm) | 2026-02-05T01:06:23Z | 2026-02-06T03:05:26Z |
| mal-2026-747 | Malicious code in react-vite-sync (npm) | 2026-02-04T23:44:25Z | 2026-02-06T03:05:26Z |
| MAL-2026-747 | Malicious code in react-vite-sync (npm) | 2026-02-04T23:44:25Z | 2026-02-06T03:05:26Z |
| mal-2026-748 | Malicious code in web3-chain-sync (npm) | 2026-02-04T23:44:24Z | 2026-02-06T03:05:27Z |
| mal-2026-746 | Malicious code in react-count-sync (npm) | 2026-02-04T23:44:24Z | 2026-02-06T03:05:26Z |
| MAL-2026-748 | Malicious code in web3-chain-sync (npm) | 2026-02-04T23:44:24Z | 2026-02-06T03:05:27Z |
| MAL-2026-746 | Malicious code in react-count-sync (npm) | 2026-02-04T23:44:24Z | 2026-02-06T03:05:26Z |
| mal-2026-745 | Malicious code in statssol (PyPI) | 2026-02-04T19:47:20Z | 2026-02-04T19:47:20Z |
| MAL-2026-745 | Malicious code in statssol (PyPI) | 2026-02-04T19:47:20Z | 2026-02-04T19:47:20Z |
| mal-2026-742 | Malicious code in dcf-commons (npm) | 2026-02-04T17:26:21Z | 2026-02-06T03:05:23Z |
| MAL-2026-742 | Malicious code in dcf-commons (npm) | 2026-02-04T17:26:21Z | 2026-02-06T03:05:23Z |
| mal-2026-740 | Malicious code in @msecscc/gaia (npm) | 2026-02-04T17:18:05Z | 2026-02-06T03:05:22Z |
| MAL-2026-740 | Malicious code in @msecscc/gaia (npm) | 2026-02-04T17:18:05Z | 2026-02-06T03:05:22Z |
| mal-2026-743 | Malicious code in internationalized (npm) | 2026-02-04T17:13:32Z | 2026-02-06T03:05:24Z |
| MAL-2026-743 | Malicious code in internationalized (npm) | 2026-02-04T17:13:32Z | 2026-02-06T03:05:24Z |
| mal-2026-744 | Malicious code in mdp-client-web (npm) | 2026-02-04T17:08:45Z | 2026-02-06T03:05:25Z |
| mal-2026-741 | Malicious code in confluence-analytics-support (npm) | 2026-02-04T17:08:45Z | 2026-02-06T03:05:23Z |
| MAL-2026-744 | Malicious code in mdp-client-web (npm) | 2026-02-04T17:08:45Z | 2026-02-06T03:05:25Z |
| MAL-2026-741 | Malicious code in confluence-analytics-support (npm) | 2026-02-04T17:08:45Z | 2026-02-06T03:05:23Z |
| mal-2026-739 | Malicious code in test-for-ppe (PyPI) | 2026-02-04T14:57:08Z | 2026-02-04T14:57:08Z |
| MAL-2026-739 | Malicious code in test-for-ppe (PyPI) | 2026-02-04T14:57:08Z | 2026-02-04T14:57:08Z |
| mal-2026-738 | Malicious code in tablescene (PyPI) | 2026-02-04T10:24:43Z | 2026-02-04T18:51:22Z |
| MAL-2026-738 | Malicious code in tablescene (PyPI) | 2026-02-04T10:24:43Z | 2026-02-04T18:51:22Z |
| mal-2026-737 | Malicious code in remark-gfm-v4 (npm) | 2026-02-04T09:46:59Z | 2026-02-06T03:05:26Z |
| mal-2026-736 | Malicious code in ggajsvjsg (npm) | 2026-02-04T09:46:59Z | 2026-02-06T03:05:24Z |
| mal-2026-735 | Malicious code in docusaurus-plugin-launchdarkly (npm) | 2026-02-04T09:46:59Z | 2026-02-06T03:05:23Z |
| MAL-2026-737 | Malicious code in remark-gfm-v4 (npm) | 2026-02-04T09:46:59Z | 2026-02-06T03:05:26Z |
| MAL-2026-736 | Malicious code in ggajsvjsg (npm) | 2026-02-04T09:46:59Z | 2026-02-06T03:05:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2170 | Linux Kernel: Mehrere Schwachstellen | 2025-09-30T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2166 | OpenSSL und LibreSSL: Mehrere Schwachstellen | 2025-09-30T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2164 | Red Hat Enterprise Linux (FreeIPA): Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-09-30T22:00:00.000+00:00 | 2025-10-01T22:00:00.000+00:00 |
| wid-sec-w-2025-2157 | Apple iOS, iPadOS and macOS (Font Parser): Schwachstelle ermöglicht Denial of Service | 2025-09-29T22:00:00.000+00:00 | 2025-09-30T22:00:00.000+00:00 |
| wid-sec-w-2025-2153 | VMware Cloud Foundation, vSphere, Aria Operations und Tools: Mehrere Schwachstellen | 2025-09-29T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2152 | IBM WebSphere Application Server: Schwachstelle ermöglicht Denial of Service | 2025-09-29T22:00:00.000+00:00 | 2025-11-20T23:00:00.000+00:00 |
| wid-sec-w-2025-2150 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-29T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2149 | IBM License Metric Tool: Mehrere Schwachstellen | 2025-09-28T22:00:00.000+00:00 | 2025-09-29T22:00:00.000+00:00 |
| wid-sec-w-2025-2144 | binutils: Mehrere Schwachstellen | 2025-09-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2140 | GitLab: Mehrere Schwachstellen | 2025-09-25T22:00:00.000+00:00 | 2025-09-28T22:00:00.000+00:00 |
| wid-sec-w-2025-2134 | Red Hat Enterprise Linux (Developer Hub): Schwachstelle ermöglicht Denial of Service | 2025-09-25T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2133 | Nagios Enterprises Nagios XI: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2025-09-25T22:00:00.000+00:00 | 2025-09-25T22:00:00.000+00:00 |
| wid-sec-w-2025-2132 | Linux Kernel: Mehrere Schwachstellen | 2025-09-24T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2129 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-09-24T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2126 | Drupal Module: Mehrere Schwachstellen | 2025-09-24T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2122 | Cisco Aironet Access Point: Schwachstelle ermöglicht Darstellen falscher Informationen | 2025-09-24T22:00:00.000+00:00 | 2025-09-24T22:00:00.000+00:00 |
| wid-sec-w-2025-2121 | Cisco Aironet Access Point: Schwachstelle ermöglicht Manipulation | 2025-09-24T22:00:00.000+00:00 | 2025-09-24T22:00:00.000+00:00 |
| wid-sec-w-2025-2120 | Cisco SD-WAN: Schwachstelle ermöglicht Umgehung von Sicherheitsmaßnahmen | 2025-09-24T22:00:00.000+00:00 | 2025-09-24T22:00:00.000+00:00 |
| wid-sec-w-2025-2119 | Cisco Industrial Ethernet Switches: Schwachstelle ermöglicht Denial of Service | 2025-09-24T22:00:00.000+00:00 | 2025-09-24T22:00:00.000+00:00 |
| wid-sec-w-2025-2117 | Google Chrome / Microsoft Edge: Mehrere Schwachstellen | 2025-09-23T22:00:00.000+00:00 | 2025-09-29T22:00:00.000+00:00 |
| wid-sec-w-2025-2115 | WordPress Core: Mehrere Schwachstellen | 2025-09-23T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2114 | Dell PowerEdge BIOS und iDRAC9: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-09-23T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2111 | Proxmox Virtual Environment: Schwachstelle ermöglicht unbekannte Auswirkungen | 2025-09-22T22:00:00.000+00:00 | 2025-09-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2110 | LibTiff: Schwachstelle ermöglicht Codeausführung | 2025-09-22T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2109 | Autodesk Produkte: Schwachstelle ermöglicht Codeausführung | 2025-09-22T22:00:00.000+00:00 | 2025-11-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2107 | Linux Kernel: Mehrere Schwachstellen | 2025-09-22T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2104 | WebKitGTK: Mehrere Schwachstellen | 2025-09-22T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2101 | Ghostscript: Schwachstellen ermöglichen Codeausführung | 2025-09-21T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2099 | Linux Kernel: Mehrere Schwachstellen | 2025-09-21T22:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-2098 | IBM SPSS: Mehrere Schwachstellen | 2025-09-21T22:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0109 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-04-08T18:53:20.624247Z | 2025-04-08T18:53:20.624247Z |
| ncsc-2025-0108 | Kwetsbaarheid verholpen in Microsoft System Center | 2025-04-08T18:52:22.999321Z | 2025-04-08T18:52:22.999321Z |
| ncsc-2025-0107 | Kwetsbaarheden verholpen in Microsoft Office | 2025-04-08T18:50:53.931519Z | 2025-04-08T18:50:53.931519Z |
| ncsc-2025-0106 | Kwetsbaarheden verholpen in Siemens producten | 2025-04-08T13:57:11.959816Z | 2025-04-08T13:57:11.959816Z |
| ncsc-2025-0105 | Kwetsbaarheid verholpen in Ivanti Connect Secure, Policy Secure en ZTA Gateways | 2025-04-03T14:19:37.560619Z | 2025-04-03T14:19:37.560619Z |
| ncsc-2025-0104 | Kwetsbaarheid verholpen in Cisco Enterprise Chat and Email | 2025-04-03T08:04:22.928655Z | 2025-04-03T08:04:22.928655Z |
| ncsc-2025-0103 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-04-01T08:42:27.059536Z | 2025-04-01T08:42:27.059536Z |
| ncsc-2025-0102 | Kwetsbaarheden verholpen in Apple macOS | 2025-04-01T08:41:09.934597Z | 2025-04-01T08:41:09.934597Z |
| ncsc-2025-0101 | Kwetsbaarheid verholpen in CrushFTP | 2025-04-01T07:47:50.425419Z | 2025-04-07T14:03:59.372671Z |
| ncsc-2025-0100 | Kwetsbaarheden verholpen in GitLab EE/CE | 2025-03-27T14:49:34.316050Z | 2025-03-27T14:49:34.316050Z |
| ncsc-2025-0099 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-03-27T09:18:30.331072Z | 2025-03-27T09:18:30.331072Z |
| ncsc-2025-0098 | Kwetsbaarheid verholpen in Google Chrome | 2025-03-26T12:45:59.434386Z | 2025-03-26T12:45:59.434386Z |
| ncsc-2025-0097 | Kwetsbaarheid verholpen in NetApp SnapCenter | 2025-03-25T08:41:39.996819Z | 2025-03-25T08:41:39.996819Z |
| ncsc-2025-0096 | Kwetsbaarheid verholpen in Next.js | 2025-03-25T08:38:53.524904Z | 2025-03-25T08:38:53.524904Z |
| ncsc-2025-0095 | Kwetsbaarheden verholpen in Kubernetes Ingress NGINX Controller | 2025-03-25T07:13:08.093318Z | 2025-03-27T14:41:30.387171Z |
| ncsc-2025-0094 | Kwetsbaarheid verholpen in Veeam Backup & Replication | 2025-03-20T14:10:16.806777Z | 2025-03-20T14:10:16.806777Z |
| ncsc-2025-0093 | Kwetsbaarheid verholpen in IBM InfoSphere Information Server | 2025-03-20T13:17:45.897480Z | 2025-03-20T13:17:45.897480Z |
| ncsc-2025-0092 | Kwetsbaarheden verholpen in IBM AIX | 2025-03-20T13:13:43.163579Z | 2025-03-20T13:13:43.163579Z |
| ncsc-2025-0091 | Kwetsbaarheid verholpen in Synology DiskStation Manager | 2025-03-19T15:03:23.414509Z | 2025-03-19T15:03:23.414509Z |
| ncsc-2025-0090 | Kwetsbaarheid verholpen in Synology Replication Service en Synology Unified Controller | 2025-03-19T15:02:46.122619Z | 2025-03-19T15:02:46.122619Z |
| ncsc-2025-0089 | Kwetsbaarheid verholpen in Apache Tomcat | 2025-03-17T18:36:12.978021Z | 2025-03-17T18:36:12.978021Z |
| ncsc-2025-0088 | Kwetsbaarheden verholpen in Autodesk AutoCAD | 2025-03-14T10:10:13.263645Z | 2025-03-14T10:10:13.263645Z |
| ncsc-2025-0087 | Kwetsbaarheden verholpen in GitLab | 2025-03-14T09:14:59.775984Z | 2025-03-14T09:14:59.775984Z |
| ncsc-2025-0086 | Kwetsbaarheid verholpen in Apple iOS, iPadOS, macOS Sequoia, visionOS en Safari | 2025-03-12T13:48:59.223945Z | 2025-03-12T13:48:59.223945Z |
| ncsc-2025-0085 | Kwetsbaarheid verholpen in Ivanti Secure Access Client | 2025-03-12T11:00:45.614633Z | 2025-03-12T11:00:45.614633Z |
| ncsc-2025-0084 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-03-12T10:56:00.883114Z | 2025-03-12T10:56:00.883114Z |
| ncsc-2025-0083 | Kwetsbaarheden verholpen in Fortinet FortiSandbox | 2025-03-12T10:51:18.487649Z | 2025-03-12T10:51:18.487649Z |
| ncsc-2025-0082 | Kwetsbaarheden verholpen in FortiOS, FortiProxy, FortiPAM, FortiSRA en FortiWeb. | 2025-03-12T10:46:38.451715Z | 2025-03-12T10:46:38.451715Z |
| ncsc-2025-0081 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-03-11T18:45:19.628300Z | 2025-03-11T18:45:19.628300Z |
| ncsc-2025-0080 | Kwetsbaarheden verholpen in Microsoft Office | 2025-03-11T18:44:43.336447Z | 2025-03-11T18:44:43.336447Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-811403 | SSA-811403: Multiple File Parsing Vulnerabilities in Solid Edge before V223 Update 7 | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-770902 | SSA-770902: Denial of Service Vulnerability in the Web Server of RUGGEDCOM ROS Devices | 2023-08-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-472630 | SSA-472630: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.4 | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-407785 | SSA-407785: Multiple X_T File Parsing Vulnerabilities in Parasolid and Teamcenter Visualization | 2023-08-08T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-264815 | SSA-264815: Type Confusion Vulnerability in OpenSSL X.400 Address Processing in SIMATIC Products | 2023-08-08T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-264814 | SSA-264814: Timing Based Side Channel Vulnerability in the OpenSSL RSA Decryption in SIMATIC Products | 2023-08-08T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-188491 | SSA-188491: DLL Hijacking Vulnerabilities in Siemens Software Center | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-131450 | SSA-131450: File parsing Vulnerabilities in Solid Edge, JT2Go and Teamcenter Visualization | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-116172 | SSA-116172: Nullsoft Scriptable Install System (NSIS) Vulnerability (CVE-2023-37378) in Parasolid Installer | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-001569 | SSA-001569: JT File Parsing Vulnerabilities in JT Open, JT Utilities and Parasolid | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-924149 | SSA-924149: Stack Overflow Vulnerability in SiPass Integrated before V2.90.3.8 | 2023-07-11T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-764801 | SSA-764801: File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2023-07-11T00:00:00Z | 2023-09-12T00:00:00Z |
| ssa-561322 | SSA-561322: Multiple Vulnerabilities in SIMATIC MV500 Devices before V3.3.4 | 2023-07-11T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-313488 | SSA-313488: Multiple Vulnerabilities in SIMATIC CN 4100 before V2.5 | 2023-07-11T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-146325 | SSA-146325: Multiple Vulnerabilities in RUGGEDCOM ROX before V2.16 | 2023-07-11T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-975766 | SSA-975766: Open Design Alliance Drawings SDK Vulnerability in Solid Edge | 2023-06-13T00:00:00Z | 2023-11-14T00:00:00Z |
| ssa-968170 | SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products | 2023-06-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-942865 | SSA-942865: Multiple Vulnerabilities in the Integrated SCALANCE S615 of SINAMICS Medium Voltage Products | 2023-06-13T00:00:00Z | 2023-06-14T00:00:00Z |
| ssa-914026 | SSA-914026: Local Code Execution Vulnerability in SIMATIC WinCC V7 | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-887249 | SSA-887249: Multiple Vulnerabilities in the Web Interface of SICAM Q200 Devices | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-831302 | SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 | 2023-06-13T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-794697 | SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 | 2023-06-13T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-731916 | SSA-731916: Multiple Vulnerabilities in CPCI85 Firmware of SICAM A8000 Devices | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-538795 | SSA-538795: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-508677 | SSA-508677: Use of Obsolete Function Vulnerability in SIMATIC WinCC before V8 | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-482956 | SSA-482956: Information Disclosure Vulnerability in SIMOTION before V5.5 | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-042050 | SSA-042050: Know-How Protection Mechanism Failure in TIA Portal | 2023-06-13T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-932528 | SSA-932528: Multiple File Parsing Vulnerabilities in Solid Edge | 2023-05-09T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-892048 | SSA-892048: Third-Party Component Vulnerabilities in SINEC NMS before V1.0.3.1 | 2023-05-09T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-789345 | SSA-789345: Code Execution Vulnerabilities in Siveillance Video Event and Management Servers | 2023-05-09T00:00:00Z | 2023-05-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:1594 | Red Hat Security Advisory: openssl security update | 2026-01-29T17:22:14+00:00 | 2026-02-12T19:28:13+00:00 |
| rhsa-2026:1592 | Red Hat Security Advisory: iperf3 security update | 2026-01-29T16:46:50+00:00 | 2026-02-10T19:02:34+00:00 |
| rhsa-2026:1586 | Red Hat Security Advisory: gimp security update | 2026-01-29T16:33:33+00:00 | 2026-01-29T21:09:33+00:00 |
| rhsa-2026:1583 | Red Hat Security Advisory: python3.12 security update | 2026-01-29T16:33:33+00:00 | 2026-02-16T14:15:20+00:00 |
| rhsa-2026:1582 | Red Hat Security Advisory: python3.12 security update | 2026-01-29T14:28:17+00:00 | 2026-02-16T14:15:20+00:00 |
| rhsa-2026:1590 | Red Hat Security Advisory: gimp security update | 2026-01-29T14:17:57+00:00 | 2026-01-29T21:07:54+00:00 |
| rhsa-2026:1588 | Red Hat Security Advisory: gimp:2.8 security update | 2026-01-29T14:17:19+00:00 | 2026-01-29T21:09:15+00:00 |
| rhsa-2026:1589 | Red Hat Security Advisory: gimp:2.8 security update | 2026-01-29T14:15:05+00:00 | 2026-01-29T21:09:19+00:00 |
| rhsa-2026:1584 | Red Hat Security Advisory: gimp:2.8 security update | 2026-01-29T14:14:40+00:00 | 2026-01-29T21:09:12+00:00 |
| rhsa-2026:1591 | Red Hat Security Advisory: gimp:2.8 security update | 2026-01-29T14:14:17+00:00 | 2026-01-29T21:09:20+00:00 |
| rhsa-2026:1587 | Red Hat Security Advisory: gimp security update | 2026-01-29T14:13:02+00:00 | 2026-01-29T21:09:34+00:00 |
| rhsa-2026:1585 | Red Hat Security Advisory: gimp security update | 2026-01-29T13:59:32+00:00 | 2026-01-29T21:09:32+00:00 |
| rhsa-2026:1581 | Red Hat Security Advisory: kernel security update | 2026-01-29T13:44:23+00:00 | 2026-02-05T01:33:56+00:00 |
| rhsa-2026:1574 | Red Hat Security Advisory: gimp:2.8 security update | 2026-01-29T12:03:06+00:00 | 2026-01-29T21:09:30+00:00 |
| rhsa-2026:1569 | Red Hat Security Advisory: spice-client-win security update | 2026-01-29T11:29:52+00:00 | 2026-01-29T15:24:56+00:00 |
| rhsa-2026:1570 | Red Hat Security Advisory: spice-client-win security update | 2026-01-29T11:28:02+00:00 | 2026-01-29T15:24:57+00:00 |
| rhsa-2026:1572 | Red Hat Security Advisory: spice-client-win security update | 2026-01-29T11:23:57+00:00 | 2026-01-29T15:24:57+00:00 |
| rhsa-2026:1571 | Red Hat Security Advisory: spice-client-win security update | 2026-01-29T11:17:55+00:00 | 2026-01-29T15:24:57+00:00 |
| rhsa-2026:1558 | Red Hat Security Advisory: python3 security update | 2026-01-29T09:44:52+00:00 | 2026-02-16T14:22:36+00:00 |
| rhsa-2026:1546 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-01-29T09:08:25+00:00 | 2026-02-17T18:10:31+00:00 |
| rhsa-2026:1537 | Red Hat Security Advisory: python security update | 2026-01-29T07:12:28+00:00 | 2026-02-16T14:22:37+00:00 |
| rhsa-2026:1536 | Red Hat Security Advisory: Red Hat Ceph Storage 9.0 Security and Enhancement update | 2026-01-29T07:02:14+00:00 | 2026-02-17T13:06:09+00:00 |
| rhsa-2026:1520 | Red Hat Security Advisory: Red Hat multicluster global hub 1.6.1 security update | 2026-01-29T01:14:38+00:00 | 2026-02-17T17:28:32+00:00 |
| rhsa-2026:1519 | Red Hat Security Advisory: openssl security update | 2026-01-29T00:24:19+00:00 | 2026-02-12T19:28:07+00:00 |
| rhsa-2026:1518 | Red Hat Security Advisory: grafana-pcp security update | 2026-01-28T23:26:14+00:00 | 2026-02-17T17:28:32+00:00 |
| rhsa-2026:1517 | Red Hat Security Advisory: RHACS 4.8.8 security and bug fix update | 2026-01-28T22:40:02+00:00 | 2026-02-17T11:15:38+00:00 |
| rhsa-2026:1511 | Red Hat Security Advisory: gimp security update | 2026-01-28T20:23:44+00:00 | 2026-01-29T21:09:29+00:00 |
| rhsa-2026:1509 | Red Hat Security Advisory: spice-client-win security update | 2026-01-28T19:28:53+00:00 | 2026-01-30T08:44:05+00:00 |
| rhsa-2026:1512 | Red Hat Security Advisory: kernel security update | 2026-01-28T19:17:58+00:00 | 2026-02-11T18:55:27+00:00 |
| rhsa-2026:1506 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2026-01-28T17:34:52+00:00 | 2026-02-17T17:55:48+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-162-01 | Siemens Tecnomatix Plant Simulation | 2025-06-10T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-155-01 | CyberData 011209 SIP Emergency Intercom | 2025-06-05T06:00:00.000000Z | 2025-06-05T06:00:00.000000Z |
| icsa-25-153-03 | Mitsubishi Electric MELSEC iQ-F Series | 2025-06-03T06:00:00.000000Z | 2025-06-03T06:00:00.000000Z |
| icsa-25-153-01 | Schneider Electric Wiser Home Automation | 2025-06-03T06:00:00.000000Z | 2025-06-03T06:00:00.000000Z |
| icsma-25-148-01 | Santesoft Sante DICOM Viewer Pro | 2025-05-29T06:00:00.000000Z | 2025-05-29T06:00:00.000000Z |
| icsa-25-148-04 | Instantel Micromate (Update A) | 2025-05-29T06:00:00.000000Z | 2025-08-07T06:00:00.000000Z |
| icsa-25-148-03 | Consilium Safety CS5000 Fire Panel (Update A) | 2025-05-29T06:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| va-25-147-01 | Craft CMS stores user-provided content session files | 2025-05-28T20:57:43Z | 2025-05-28T20:57:43Z |
| va-25-148-01 | ZKTeco BioTime multiple vulnerabilities | 2025-05-28T15:28:55Z | 2025-05-28T15:28:55Z |
| icsa-25-146-01 | Johnson Controls iSTAR Configuration Utility (ICU) tool | 2025-05-27T06:00:00.000000Z | 2025-05-27T06:00:00.000000Z |
| icsa-25-148-01 | Siemens SiPass | 2025-05-23T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-142-02 | Rockwell Automation FactoryTalk Historian ThingWorx | 2025-05-22T06:00:00.000000Z | 2025-05-22T06:00:00.000000Z |
| icsa-25-142-01 | Lantronix Device Installer | 2025-05-22T06:00:00.000000Z | 2025-05-22T06:00:00.000000Z |
| icsa-25-140-11 | Assured Telematics Inc (ATI) Fleet Management System (Update A) | 2025-05-20T06:00:00.000000Z | 2025-06-10T06:00:00.000000Z |
| icsa-25-140-10 | Vertiv Liebert RDU101 and UNITY | 2025-05-20T06:00:00.000000Z | 2025-05-20T06:00:00.000000Z |
| icsa-25-140-09 | AutomationDirect MB-Gateway | 2025-05-20T06:00:00.000000Z | 2025-05-20T06:00:00.000000Z |
| icsa-25-140-03 | Danfoss AK-SM 8xxA Series (Update A) | 2025-05-20T06:00:00.000000Z | 2025-08-26T06:00:00.000000Z |
| icsa-25-140-02 | National Instruments Circuit Design Suite | 2025-05-20T06:00:00.000000Z | 2025-05-20T06:00:00.000000Z |
| icsa-25-140-01 | ABUP IoT Cloud Platform | 2025-05-20T06:00:00.000000Z | 2025-05-20T06:00:00.000000Z |
| icsa-25-140-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update E) | 2025-05-20T04:00:00.000000Z | 2026-02-12T05:00:00.000000Z |
| va-25-136-01 | IBM Security Guardium stored cross-site scripting | 2025-05-16T20:14:51Z | 2025-06-16T00:00:00Z |
| icsa-25-135-20 | Schneider Electric EcoStruxure Power Build Rapsody | 2025-05-15T06:00:00.000000Z | 2025-05-15T06:00:00.000000Z |
| icsa-25-135-19 | ECOVACS DEEBOT Vacuum and Base Station (Update A) | 2025-05-15T06:00:00.000000Z | 2025-07-10T06:00:00.000000Z |
| icsa-25-140-05 | Siemens Siveillance Video | 2025-05-14T00:00:00.000000Z | 2025-05-14T00:00:00.000000Z |
| icsa-25-133-04 | ABB Automation Builder | 2025-05-13T06:00:00.000000Z | 2025-05-13T06:00:00.000000Z |
| icsa-25-153-02 | Schneider Electric EcoStruxure Power Build Rapsody | 2025-05-13T04:00:00.000000Z | 2025-05-13T04:00:00.000000Z |
| icsa-25-140-08 | Schneider Electric Modicon Controllers (Update B) | 2025-05-13T04:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-140-07 | Schneider Electric Galaxy VS, Galaxy VL, Galaxy VXL (Update A) | 2025-05-13T04:00:00.000000Z | 2025-09-24T04:00:00.000000Z |
| icsa-25-140-06 | Schneider Electric PrismaSeT Active - Wireless Panel Server | 2025-05-13T04:00:00.000000Z | 2025-05-13T04:00:00.000000Z |
| icsa-25-148-02 | Siemens SiPass Integrated | 2025-05-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-iosxe-utd-cmd-jbl8kvht | Cisco IOS XE Software Unified Threat Defense Command Injection Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-04-02T20:11:04+00:00 |
| cisco-sa-iosxe-priv-esc-seax6nlx | Cisco IOS XE Software Privilege Escalation Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-iosxe-ospf-dos-dr9sfrxp | Cisco IOS XE Software OSPFv2 Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ios-xe-sda-edge-dos-qzwuwxwg | Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ios-dos-hq4d3tzg | Cisco IOS Software for Catalyst 6000 Series Switches Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-04-04T15:31:55+00:00 |
| cisco-sa-ikev1-no2ccfwz | Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Fragmentation Denial of Service Vulnerabilities | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-dmi-acl-bypass-xv8fo8vz | Cisco IOS XE Software NETCONF/RESTCONF IPv4 Access Control List Bypass Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-dhcp-dos-t3cxpo9z | Cisco IOS XE Software DHCP Snooping with Endpoint Analytics Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ccc-authz-bypass-5ekchjrb | Cisco Catalyst Center Authorization Bypass Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-aux-333wbz8f | Cisco IOS XE Software Auxiliary Asynchronous Port Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ap-secureboot-bypass-zt5vjksd | Cisco Access Point Software Secure Boot Bypass Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ap-dos-h9tggx6w | Cisco Access Point Software Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-airo-ap-dos-ppptcvw | Cisco Aironet Access Point Software Resource Exhaustion Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-xrl2vpn-jesru3fc | Cisco IOS XR Software Layer 2 Services Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-snmp-uhv6zdef | Cisco IOS XR Software SNMP Management Plane Protection ACL Bypass Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-ssh-privesc-ewdmkew3 | Cisco IOS XR Software SSH Privilege Escalation Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-scp-dos-kb6suuhw | Cisco IOS XR Software Authenticated CLI Secure Copy Protocol and SFTP Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-pppma-jkwfgnew | Cisco IOS XR Software for ASR 9000 Series Aggregation Services Routers PPPoE Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-dhcp-dos-3tgpkrdm | Cisco IOS XR Software DHCP Version 4 Server Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-acl-bypass-rzu5nl3e | Cisco IOS XR Software MPLS and Pseudowire Interfaces Access Control List Bypass Vulnerabilities | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-secure-privesc-syxqo6ds | Cisco Secure Client for Linux with ISE Posture Module Privilege Escalation Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-secure-client-crlf-w43v4g7 | Cisco Secure Client Carriage Return Line Feed Injection Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-12T14:17:07+00:00 |
| cisco-sa-sb-wap-multi-85g83crb | Cisco Small Business 100, 300, and 500 Series Wireless Access Points Command Injection and Buffer Overflow Vulnerabilities | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-duo-win-bypass-pn42kkbm | Cisco Duo Authentication for Windows Logon and RDP Authentication Bypass Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-duo-infodisc-rlceqm6t | Cisco Duo Authentication for Windows Logon and RDP Information Disclosure Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-08T18:23:38+00:00 |
| cisco-sa-appd-xss-3jwqsmnt | Cisco AppDynamics Controller Cross-Site Scripting Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-appd-traversal-m7n8mzpf | Cisco AppDynamics Controller Path Traversal Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-ucsfi-imm-syn-p6kztdqc | Cisco UCS 6400 and 6500 Series Fabric Interconnects Intersight Managed Mode Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-po-acl-tkyepgvl | Cisco Nexus 3000 and 9000 Series Switches Port Channel ACL Programming Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-lldp-dos-z7pnctgt | Cisco FXOS and NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-68233 | drm/tegra: Add call to put_pid() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:38:58.000Z |
| msrc_cve-2025-68231 | mm/mempool: fix poisoning order>0 pages with HIGHMEM | 2025-12-02T00:00:00.000Z | 2026-01-07T14:37:52.000Z |
| msrc_cve-2025-68230 | drm/amdgpu: fix gpu page fault after hibernation on PF passthrough | 2025-12-02T00:00:00.000Z | 2025-12-17T01:02:52.000Z |
| msrc_cve-2025-68229 | scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:38:12.000Z |
| msrc_cve-2025-68227 | mptcp: Fix proto fallback detection with BPF | 2025-12-02T00:00:00.000Z | 2026-01-07T14:38:32.000Z |
| msrc_cve-2025-68224 | scsi: core: Fix a regression triggered by scsi_host_busy() | 2025-12-02T00:00:00.000Z | 2025-12-17T01:01:38.000Z |
| msrc_cve-2025-68223 | drm/radeon: delete radeon_fence_process in is_signaled, no deadlock | 2025-12-02T00:00:00.000Z | 2025-12-17T01:02:04.000Z |
| msrc_cve-2025-68222 | pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc | 2025-12-02T00:00:00.000Z | 2026-01-07T14:38:51.000Z |
| msrc_cve-2025-68220 | net: ethernet: ti: netcp: Standardize knav_dma_open_channel to return NULL on error | 2025-12-02T00:00:00.000Z | 2026-01-07T14:38:45.000Z |
| msrc_cve-2025-68219 | cifs: fix memory leak in smb3_fs_context_parse_param error path | 2025-12-02T00:00:00.000Z | 2026-01-07T14:38:05.000Z |
| msrc_cve-2025-68217 | Input: pegasus-notetaker - fix potential out-of-bounds access | 2025-12-02T00:00:00.000Z | 2026-01-07T14:39:04.000Z |
| msrc_cve-2025-68214 | timers: Fix NULL function pointer race in timer_shutdown_sync() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:38:19.000Z |
| msrc_cve-2025-68211 | ksm: use range-walk function to jump over holes in scan_get_next_rmap_item | 2025-12-02T00:00:00.000Z | 2025-12-17T01:01:53.000Z |
| msrc_cve-2025-68209 | mlx5: Fix default values in create CQ | 2025-12-02T00:00:00.000Z | 2025-12-17T01:04:47.000Z |
| msrc_cve-2025-68206 | netfilter: nft_ct: add seqadj extension for natted connections | 2025-12-02T00:00:00.000Z | 2025-12-17T01:04:31.000Z |
| msrc_cve-2025-68204 | pmdomain: arm: scmi: Fix genpd leak on provider registration failure | 2025-12-02T00:00:00.000Z | 2026-01-07T14:38:25.000Z |
| msrc_cve-2025-68203 | drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process | 2025-12-02T00:00:00.000Z | 2025-12-17T01:02:10.000Z |
| msrc_cve-2025-68201 | drm/amdgpu: remove two invalid BUG_ON()s | 2025-12-02T00:00:00.000Z | 2025-12-17T01:02:20.000Z |
| msrc_cve-2025-68198 | crash: fix crashkernel resource shrink | 2025-12-02T00:00:00.000Z | 2026-01-07T14:37:45.000Z |
| msrc_cve-2025-68196 | drm/amd/display: Cache streams targeting link when performing LT automation | 2025-12-02T00:00:00.000Z | 2025-12-17T01:02:15.000Z |
| msrc_cve-2025-68193 | drm/xe/guc: Add devm release action to safely tear down CT | 2025-12-02T00:00:00.000Z | 2025-12-17T01:01:43.000Z |
| msrc_cve-2025-68190 | drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked() | 2025-12-02T00:00:00.000Z | 2025-12-17T01:01:48.000Z |
| msrc_cve-2025-68188 | tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() | 2025-12-02T00:00:00.000Z | 2025-12-17T01:05:25.000Z |
| msrc_cve-2025-68175 | media: nxp: imx8-isi: Fix streaming cleanup on release | 2025-12-02T00:00:00.000Z | 2025-12-17T01:03:49.000Z |
| msrc_cve-2025-68174 | amd/amdkfd: enhance kfd process check in switch partition | 2025-12-02T00:00:00.000Z | 2025-12-17T01:03:38.000Z |
| msrc_cve-2025-68161 | Apache Log4j Core: Missing TLS hostname verification in Socket appender | 2025-12-02T00:00:00.000Z | 2025-12-23T01:37:29.000Z |
| msrc_cve-2025-68156 | Expr has Denial of Service via Unbounded Recursion in Builtin Functions | 2025-12-02T00:00:00.000Z | 2026-01-08T01:39:14.000Z |
| msrc_cve-2025-68146 | filelock has TOCTOU race condition that allows symlink attacks during lock file creation | 2025-12-02T00:00:00.000Z | 2026-01-03T01:41:03.000Z |
| msrc_cve-2025-68114 | Capstone doesn't check vsnprintf return in SStream_concat, allows stack buffer underflow and overflow | 2025-12-02T00:00:00.000Z | 2025-12-23T01:37:34.000Z |
| msrc_cve-2025-67897 | In Sequoia before 2.1.0, aes_key_unwrap panics if passed a ciphertext that is too short. A remote attacker can take advantage of this issue to crash an application by sending a victim an encrypted message with a crafted PKESK or SKESK packet. | 2025-12-02T00:00:00.000Z | 2025-12-17T01:05:50.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025-20114-1 | Security update for himmelblau | 2025-11-27T20:16:29Z | 2025-11-27T20:16:29Z |
| opensuse-su-2025-20121-1 | Security update for redis | 2025-11-27T15:53:18Z | 2025-11-27T15:53:18Z |
| opensuse-su-2025:20106-1 | Security update for tomcat11 | 2025-11-27T15:43:26Z | 2025-11-27T15:43:26Z |
| opensuse-su-2025-20106-1 | Security update for tomcat11 | 2025-11-27T15:43:26Z | 2025-11-27T15:43:26Z |
| opensuse-su-2025:20116-1 | Security update for rnp | 2025-11-27T12:39:03Z | 2025-11-27T12:39:03Z |
| opensuse-su-2025-20116-1 | Security update for rnp | 2025-11-27T12:39:03Z | 2025-11-27T12:39:03Z |
| opensuse-su-2025:20118-1 | Security update for gitea-tea | 2025-11-27T12:30:27Z | 2025-11-27T12:30:27Z |
| opensuse-su-2025-20118-1 | Security update for gitea-tea | 2025-11-27T12:30:27Z | 2025-11-27T12:30:27Z |
| opensuse-su-2025:20119-1 | Security update for tcpreplay | 2025-11-27T12:29:40Z | 2025-11-27T12:29:40Z |
| opensuse-su-2025-20119-1 | Security update for tcpreplay | 2025-11-27T12:29:40Z | 2025-11-27T12:29:40Z |
| opensuse-su-2025:20115-1 | Security update for pnpm | 2025-11-27T12:28:46Z | 2025-11-27T12:28:46Z |
| opensuse-su-2025-20115-1 | Security update for pnpm | 2025-11-27T12:28:46Z | 2025-11-27T12:28:46Z |
| opensuse-su-2025:20117-1 | Security update for trivy | 2025-11-27T12:27:44Z | 2025-11-27T12:27:44Z |
| opensuse-su-2025-20117-1 | Security update for trivy | 2025-11-27T12:27:44Z | 2025-11-27T12:27:44Z |
| opensuse-su-2025:20100-1 | Security update for libvirt | 2025-11-27T10:23:20Z | 2025-11-27T10:23:20Z |
| opensuse-su-2025-20100-1 | Security update for libvirt | 2025-11-27T10:23:20Z | 2025-11-27T10:23:20Z |
| opensuse-su-2025:20099-1 | Security update for xwayland | 2025-11-27T10:11:16Z | 2025-11-27T10:11:16Z |
| opensuse-su-2025-20099-1 | Security update for xwayland | 2025-11-27T10:11:16Z | 2025-11-27T10:11:16Z |
| opensuse-su-2025:15778-1 | libwireshark19-4.6.1-2.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15777-1 | python311-spotipy-2.25.2-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15776-1 | python311-pypdf-6.4.0-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15775-1 | opa-1.11.0-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15774-1 | netbird-0.60.3-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15773-1 | cheat-4.4.2-3.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:20091-1 | Security update for the Linux Kernel | 2025-11-26T17:04:24Z | 2025-11-26T17:04:24Z |
| opensuse-su-2025-20091-1 | Security update for the Linux Kernel | 2025-11-26T17:04:24Z | 2025-11-26T17:04:24Z |
| opensuse-su-2025:20090-1 | Security update for curl | 2025-11-26T14:30:14Z | 2025-11-26T14:30:14Z |
| opensuse-su-2025-20090-1 | Security update for curl | 2025-11-26T14:30:14Z | 2025-11-26T14:30:14Z |
| opensuse-su-2025-20097-1 | Security update for helmfile | 2025-11-26T14:11:10Z | 2025-11-26T14:11:10Z |
| opensuse-su-2025:20089-1 | Security update for mysql-connector-java | 2025-11-26T08:12:25Z | 2025-11-26T08:12:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-963 | Heap-buffer-overflow in GfxTilingPattern::scanXObjectForBlendMode | 2024-08-16T00:14:14.315705Z | 2024-08-16T00:14:14.316160Z |
| osv-2024-957 | Heap-buffer-overflow in pcpp::computeChecksum | 2024-08-16T00:13:51.457458Z | 2025-10-22T18:24:27.257255Z |
| osv-2024-955 | Use-of-uninitialized-value in pcpp::IPv6Address::toString | 2024-08-16T00:13:46.718533Z | 2024-08-16T00:13:46.718830Z |
| osv-2024-954 | Use-of-uninitialized-value in pcpp::MplsLayer::toString | 2024-08-16T00:13:43.824630Z | 2025-12-22T14:21:33.246456Z |
| osv-2024-953 | UNKNOWN READ in pcpp::PcapNgFileReaderDevice::getNextPacket | 2024-08-16T00:13:41.933683Z | 2025-12-22T14:21:34.886075Z |
| osv-2024-951 | Index-out-of-bounds in hevc_ref_pic_lists_modification | 2024-08-16T00:13:38.322516Z | 2024-08-16T00:13:38.322849Z |
| osv-2024-947 | Heap-buffer-overflow in pcpp::SomeIpSdEntry::SomeIpSdEntry | 2024-08-16T00:13:30.824621Z | 2025-04-03T14:42:12.138019Z |
| osv-2024-939 | Security exception in org.apache.poi.util.LZWDecompresser.decompress | 2024-08-16T00:13:05.088720Z | 2024-08-16T00:13:05.089105Z |
| osv-2024-925 | Index-out-of-bounds in derive_collocated_motion_vectors | 2024-08-16T00:11:02.964872Z | 2024-08-16T00:11:02.965320Z |
| osv-2024-919 | Heap-buffer-overflow in validate_relpath | 2024-08-16T00:09:34.461792Z | 2025-03-06T14:20:56.754046Z |
| osv-2024-914 | UNKNOWN READ in boost::re_detail_500::basic_regex_formatter<std::__1::ostream_iterator<char, cha | 2024-08-16T00:08:20.277708Z | 2025-12-11T14:11:53.186916Z |
| osv-2024-883 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2024-08-16T00:06:29.139503Z | 2024-08-16T00:06:29.139893Z |
| osv-2024-879 | Security exception in java.base/java.util.Arrays.copyOf | 2024-08-16T00:06:11.887593Z | 2024-08-16T00:06:11.888006Z |
| osv-2024-867 | Use-of-uninitialized-value in std::__1::ostreambuf_iterator<char, std::__1::char_traits<char>> std::__1::__pad | 2024-08-16T00:05:38.614485Z | 2025-03-19T14:29:11.494602Z |
| osv-2024-861 | UNKNOWN READ in chunk_free_object | 2024-08-16T00:05:25.024909Z | 2024-08-16T00:05:25.025249Z |
| osv-2024-859 | Heap-double-free in libssh2_default_free | 2024-08-16T00:05:16.221580Z | 2024-08-16T00:05:16.221993Z |
| osv-2024-856 | Use-of-uninitialized-value in cups_fill | 2024-08-16T00:05:10.919440Z | 2024-08-16T00:05:10.919721Z |
| osv-2024-853 | UNKNOWN READ in chunk_free_object | 2024-08-16T00:04:58.897243Z | 2025-01-10T05:30:16.360095Z |
| osv-2024-852 | UNKNOWN READ in jvp_object_free | 2024-08-16T00:04:43.641868Z | 2024-08-16T00:04:43.642269Z |
| osv-2024-847 | Null-dereference READ in _libssh2_packet_add | 2024-08-16T00:04:07.189033Z | 2025-02-01T14:27:03.602163Z |
| osv-2024-838 | Bad-cast to RDKit::AtomRDKit::ROMol::initFromOther | 2024-08-16T00:03:32.029853Z | 2026-01-30T14:28:51.040311Z |
| osv-2024-833 | UNKNOWN READ in chunk_free_object | 2024-08-16T00:03:18.896326Z | 2024-08-16T00:03:18.896644Z |
| osv-2024-832 | UNKNOWN READ in Pistache::Http::Header::Expect::parseRaw | 2024-08-16T00:03:13.834235Z | 2025-01-10T05:18:27.558670Z |
| osv-2024-831 | Heap-buffer-overflow in jv_parse | 2024-08-16T00:03:12.871175Z | 2025-03-07T14:24:40.166702Z |
| osv-2024-830 | UNKNOWN READ in ShadingImage::generateAxialBitmap | 2024-08-16T00:03:09.951294Z | 2024-08-16T00:03:09.951596Z |
| osv-2024-828 | Use-of-uninitialized-value in packet_parse | 2024-08-16T00:03:08.665359Z | 2024-08-16T00:03:08.665719Z |
| osv-2024-817 | Use-of-uninitialized-value in pcapint_filter_with_aux_data | 2024-08-16T00:02:39.185747Z | 2025-01-08T14:19:40.985698Z |
| osv-2024-816 | Use-of-uninitialized-value in pcpp::SSLClientHelloMessage::ClientHelloTLSFingerprint::toString | 2024-08-16T00:02:36.618439Z | 2025-12-22T14:21:20.173609Z |
| osv-2024-812 | Use-of-uninitialized-value in pcpp::PcapFileWriterDevice::writePacket | 2024-08-16T00:02:26.387902Z | 2025-12-22T14:21:19.473015Z |
| osv-2024-805 | Use-of-uninitialized-value in pcpp::NflogLayer::parseNextLayer | 2024-08-16T00:02:19.436836Z | 2024-08-16T00:02:19.437200Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2023-0033 | Parsing borsh messages with ZST which are not-copy/clone is unsound | 2023-04-12T12:00:00Z | 2024-09-23T15:02:17Z |
| rustsec-2023-0050 | multipart is Unmaintained | 2023-04-11T12:00:00Z | 2023-08-18T20:38:40Z |
| rustsec-2023-0036 | tree_magic is Unmaintained | 2023-04-11T12:00:00Z | 2023-04-25T03:08:42Z |
| rustsec-2023-0031 | Initialisation failure in `Once::try_call_once` can lead to undefined behaviour for other initialisers | 2023-03-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0030 | `Versionize::deserialize` implementation for `FamStructWrapper<T>` is lacking bound checks, potentially leading to out of bounds memory accesses | 2023-03-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0029 | TLS certificate common name validation bypass | 2023-03-24T12:00:00Z | 2023-11-08T09:57:41Z |
| rustsec-2023-0027 | TLS certificate common name validation bypass | 2023-03-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0024 | `openssl` `X509Extension::new` and `X509Extension::new_nid` null pointer dereference | 2023-03-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0023 | `openssl` `SubjectAlternativeName` and `ExtendedKeyUsage::other` allow arbitrary file read | 2023-03-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0022 | `openssl` `X509NameBuilder::build` returned object is not thread safe | 2023-03-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0032 | Unsound FFI: Wrong API usage causes write past allocated area | 2023-03-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0021 | NULL pointer dereference in `stb_image` | 2023-03-19T12:00:00Z | 2023-07-15T15:07:13Z |
| rustsec-2023-0026 | Gitoxide has renamed its crates. | 2023-03-14T12:00:00Z | 2023-03-24T15:33:49Z |
| rustsec-2023-0025 | Gitoxide has renamed its crates. | 2023-03-14T12:00:00Z | 2023-03-24T15:33:49Z |
| rustsec-2023-0020 | const-cstr is Unmaintained | 2023-03-12T12:00:00Z | 2023-03-12T18:38:56Z |
| rustsec-2023-0017 | `maligned::align_first` causes incorrect deallocation | 2023-03-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0093 | Miscompilation of `i8x16.select` with the same inputs on x86\_64 | 2023-03-03T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0090 | Guest-controlled out-of-bounds read/write on x86\_64 | 2023-03-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0015 | Ascii allows out-of-bounds array indexing in safe code | 2023-02-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0018 | Race Condition Enabling Link Following and Time-of-check Time-of-use (TOCTOU) | 2023-02-24T12:00:00Z | 2023-03-04T21:50:30Z |
| rustsec-2023-0043 | ftp is unmaintained, use suppaftp instead | 2023-02-20T12:00:00Z | 2023-06-14T13:23:36Z |
| rustsec-2023-0016 | Possible out-of-bounds read in release mode | 2023-02-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0081 | safemem is unmaintained | 2023-02-14T12:00:00Z | 2024-03-04T18:47:07Z |
| rustsec-2023-0014 | Miscompilation in cortex-m-rt 0.7.1 and 0.7.2 | 2023-02-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0013 | `NULL` dereference during PKCS7 data verification | 2023-02-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0012 | `NULL` dereference validating DSA public key | 2023-02-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0011 | Invalid pointer dereference in `d2i_PKCS7` functions | 2023-02-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0010 | Double free after calling `PEM_read_bio_ex` | 2023-02-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0009 | Use-after-free following `BIO_new_NDEF` | 2023-02-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0008 | X.509 Name Constraints Read Buffer Overflow | 2023-02-07T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-valkey-2025-48367 | Redis DoS Vulnerability due to bad connection error handling | 2025-10-16T12:08:13.783Z | 2025-11-06T13:25:46.476Z |
| bit-valkey-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:07:58.321Z | 2026-02-05T09:10:30.960Z |
| bit-redis-2025-48367 | Redis DoS Vulnerability due to bad connection error handling | 2025-10-16T12:07:00.720Z | 2025-10-16T12:31:38.153Z |
| bit-redis-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:06:41.782Z | 2026-02-05T09:10:30.960Z |
| bit-keydb-2025-48367 | Redis DoS Vulnerability due to bad connection error handling | 2025-10-16T12:00:55.638Z | 2025-10-16T12:31:38.153Z |
| bit-keydb-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:00:41.031Z | 2026-02-05T09:10:30.960Z |
| bit-valkey-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:19:55.260Z | 2025-11-06T13:25:46.476Z |
| bit-valkey-2025-49112 | 2025-10-16T09:19:52.847Z | 2026-02-11T09:09:18.507Z | |
| bit-redis-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:18:53.323Z | 2025-11-06T13:25:46.476Z |
| bit-keydb-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:12:52.562Z | 2025-11-06T13:25:46.476Z |
| bit-wildfly-2025-23367 | Org.wildfly.core:wildfly-server: wildfly improper rbac permission | 2025-10-15T08:51:55.776Z | 2026-02-11T09:09:18.507Z |
| bit-pytorch-2025-55560 | 2025-10-15T08:50:02.845Z | 2025-10-15T09:08:35.035Z | |
| bit-mastodon-2025-62176 | Mastadon streaming server allows OAuth clients without the `read` scope to subscribe to public channels | 2025-10-15T08:44:06.235Z | 2026-01-08T18:07:34.629Z |
| bit-mastodon-2025-62175 | Mastodon streaming API fails to disconnect disabled and suspended users | 2025-10-15T08:44:04.530Z | 2026-01-08T18:07:34.629Z |
| bit-mastodon-2025-62174 | Mastodon allows continued access after password reset via CLI | 2025-10-15T08:44:02.890Z | 2026-01-08T18:07:34.629Z |
| bit-python-2025-8291 | ZIP64 End of Central Directory (EOCD) Locator record offset not checked | 2025-10-14T09:30:19.669Z | 2025-12-04T12:07:39.656Z |
| bit-python-2024-5642 | Buffer overread when using an empty list with SSLContext.set_npn_protocols() | 2025-10-14T09:29:29.557Z | 2025-10-14T09:53:39.450Z |
| bit-libpython-2025-8291 | ZIP64 End of Central Directory (EOCD) Locator record offset not checked | 2025-10-14T09:25:48.465Z | 2025-12-04T12:07:39.656Z |
| bit-libpython-2024-5642 | Buffer overread when using an empty list with SSLContext.set_npn_protocols() | 2025-10-14T09:24:35.254Z | 2025-10-14T09:53:39.450Z |
| bit-kibana-2025-25018 | Kibana Stored Cross-Site Scripting (XSS) | 2025-10-14T08:43:02.190Z | 2025-11-06T13:25:46.476Z |
| bit-kibana-2025-25017 | Kibana Stored Cross-Site Scripting (XSS) | 2025-10-14T08:43:00.623Z | 2025-11-06T13:25:46.476Z |
| bit-elk-2025-25018 | Kibana Stored Cross-Site Scripting (XSS) | 2025-10-14T08:39:59.187Z | 2025-11-06T13:25:46.476Z |
| bit-elk-2025-25017 | Kibana Stored Cross-Site Scripting (XSS) | 2025-10-14T08:39:57.577Z | 2025-11-06T13:25:46.476Z |
| bit-elasticsearch-2025-37727 | Elasticsearch Insertion of sensitive information in log file | 2025-10-14T08:39:50.514Z | 2025-10-14T09:09:11.030Z |
| bit-gitlab-2025-2934 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-10-11T09:05:29.864Z | 2025-10-21T09:07:40.239Z |
| bit-gitlab-2025-11340 | Incorrect Authorization in GitLab | 2025-10-11T09:04:34.616Z | 2025-10-11T09:07:57.990Z |
| bit-gitlab-2025-10004 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-10-11T09:04:16.301Z | 2025-10-11T09:07:57.990Z |
| bit-ejbca-2025-3027 | Open Redirect vulnerability in EJBCA | 2025-10-10T08:38:43.953Z | 2025-10-10T09:07:15.482Z |
| bit-ejbca-2025-3026 | Improper Neutralization of Special Elements vulnerability in EJBCA | 2025-10-10T08:38:42.126Z | 2025-10-10T09:07:15.482Z |
| bit-kibana-2025-37728 | Kibana Insufficiently Protected Credentials in the CrowdStrike Connector | 2025-10-09T08:43:25.053Z | 2025-10-09T09:08:03.236Z |
| ID | Description | Updated |
|---|---|---|
| var-200512-0299 | Heap-based buffer overflow in rsync in Mac OS X 10.4 through 10.4.5 allows remote authent… | 2024-07-23T21:40:52.289000Z |
| var-202212-2277 | An integer underflow in Organization Specific TLV was found in various versions of OpenvS… | 2024-07-23T21:40:51.741000Z |
| var-200912-0756 | The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Wind… | 2024-07-23T21:40:51.958000Z |
| var-201210-0456 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:40:50.864000Z |
| var-200712-0433 | Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) f… | 2024-07-23T21:40:50.122000Z |
| var-201904-1460 | A cross-site scripting issue existed in Safari. This issue was addressed with improved UR… | 2024-07-23T21:40:45.159000Z |
| var-201806-1466 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:40:45.074000Z |
| var-201501-0436 | The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1… | 2024-07-23T21:40:45.003000Z |
| var-200704-0226 | Apple File Protocol (AFP) Client in Apple Mac OS X 10.3.9 through 10.4.9 does not properl… | 2024-07-23T21:40:44.831000Z |
| var-201605-0465 | The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple … | 2024-07-23T21:40:43.806000Z |
| var-202010-1510 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T21:40:40.672000Z |
| var-201103-0114 | The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x be… | 2024-07-23T21:40:40.823000Z |
| var-201302-0262 | Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.… | 2024-07-23T21:40:39.972000Z |
| var-201109-0201 | Use-after-free vulnerability in the document loader in Google Chrome before 14.0.835.163 … | 2024-07-23T21:40:39.355000Z |
| var-200505-1240 | The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a d… | 2024-07-23T21:40:35.490000Z |
| var-201912-1857 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:39:57.528000Z |
| var-202104-0752 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2024-07-23T21:39:56.465000Z |
| var-200902-0880 | International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in A… | 2024-07-23T21:39:24.164000Z |
| var-201908-1958 | The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently l… | 2024-07-23T21:39:23.746000Z |
| var-200102-0052 | Cisco Catalyst 6000, 5000, or 4000 switches allow remote attackers to cause a denial of s… | 2024-07-23T21:39:23.577000Z |
| var-201708-0038 | The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 al… | 2024-07-23T21:39:15.769000Z |
| var-200901-0706 | WebKit in Apple Safari before 4.0 does not prevent remote loading of local Java applets, … | 2024-07-23T21:39:10.742000Z |
| var-202112-1608 | A carefully crafted request body can cause a buffer overflow in the mod_lua multipart par… | 2024-07-23T21:38:29.659000Z |
| var-202301-1703 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2024-07-23T21:38:27.556000Z |
| var-202103-0287 | A flaw possibility of race condition and incorrect initialization of the process id was f… | 2024-07-23T21:38:27.231000Z |
| var-201011-0174 | ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute … | 2024-07-23T21:37:24.567000Z |
| var-202106-0343 | Improper isolation of shared resources in some Intel(R) Processors may allow an authentic… | 2024-07-23T21:37:23.721000Z |
| var-201506-0268 | The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before… | 2024-07-23T21:36:44.513000Z |
| var-201904-0744 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:36:28.176000Z |
| var-201606-0329 | Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/us… | 2024-07-23T21:36:28.630000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000040 | Multiple vulnerabilities in BUFFALO wireless LAN routers | 2024-04-15T16:29+09:00 | 2024-04-15T16:29+09:00 |
| jvndb-2024-000039 | Multiple vulnerabilities in a-blog cms | 2024-04-10T13:55+09:00 | 2024-04-10T13:55+09:00 |
| jvndb-2024-000038 | Multiple vulnerabilities in WordPress Plugin "Ninja Forms" | 2024-04-08T13:44+09:00 | 2024-04-08T13:44+09:00 |
| jvndb-2024-003068 | Multiple vulnerabilities in Cente middleware | 2024-04-05T15:36+09:00 | 2024-09-24T15:00+09:00 |
| jvndb-2024-000037 | Multiple vulnerabilities in NEC Aterm series | 2024-04-05T14:53+09:00 | 2024-04-05T14:53+09:00 |
| jvndb-2024-003067 | Multiple vulnerabilities in PLANEX COMMUNICATIONS wireless LAN routers | 2024-04-05T14:17+09:00 | 2024-04-05T14:17+09:00 |
| jvndb-2024-003051 | FURUNO SYSTEMS Managed Switch ACERA 9010 running in non MS mode with the initial configuration has no password | 2024-04-02T18:03+09:00 | 2024-04-02T18:03+09:00 |
| jvndb-2024-003050 | KEYENCE VT STUDIO may insecurely load Dynamic Link Libraries | 2024-04-01T14:44+09:00 | 2024-04-01T14:44+09:00 |
| jvndb-2024-003049 | Multiple vulnerabilities in KEYENCE KV STUDIO, KV REPLAY VIEWER, and VT5-WX15/WX12 | 2024-04-01T12:31+09:00 | 2024-09-25T13:51+09:00 |
| jvndb-2024-000036 | "Yahoo! JAPAN" App vulnerable to cross-site scripting | 2024-03-29T13:28+09:00 | 2024-03-29T13:28+09:00 |
| jvndb-2024-003047 | SEEnergy SVR-116 vulnerable to OS command injection | 2024-03-28T11:38+09:00 | 2024-03-28T11:38+09:00 |
| jvndb-2024-003026 | Security information for Hitachi Disk Array Systems | 2024-03-27T15:52+09:00 | 2024-03-27T15:52+09:00 |
| jvndb-2024-000035 | Multiple vulnerabilities in WordPress Plugin "Survey Maker" | 2024-03-27T14:48+09:00 | 2024-03-27T14:48+09:00 |
| jvndb-2024-000034 | SonicDICOM Media Viewer may insecurely load Dynamic Link Libraries | 2024-03-27T14:31+09:00 | 2024-03-27T14:31+09:00 |
| jvndb-2024-003025 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2024-03-27T14:26+09:00 | 2024-11-27T14:34+09:00 |
| jvndb-2024-000905 | Mini Thread vulnerable to cross-site scripting | 2024-03-26T17:43+09:00 | 2024-03-26T17:43+09:00 |
| jvndb-2024-000906 | ffBull vulnerable to OS command injection | 2024-03-26T16:07+09:00 | 2024-03-26T16:07+09:00 |
| jvndb-2024-000900 | "EasyRange" may insecurely load executable files | 2024-03-26T15:50+09:00 | 2024-03-26T15:50+09:00 |
| jvndb-2024-000907 | 0ch BBS Script (0ch) vulnerable to cross-site scripting | 2024-03-26T15:35+09:00 | 2024-03-26T15:35+09:00 |
| jvndb-2024-000902 | TvRock vulnerable to cross-site scripting | 2024-03-26T14:27+09:00 | 2024-03-26T14:27+09:00 |
| jvndb-2024-000904 | WebProxy vulnerable to OS command injection | 2024-03-26T14:19+09:00 | 2024-03-26T14:19+09:00 |
| jvndb-2023-025113 | BUFFALO LinkStation 200 series vulnerable to arbitrary code execution | 2024-03-25T18:16+09:00 | 2024-03-25T18:16+09:00 |
| jvndb-2024-003016 | Multiple vulnerabilities in home gateway HGW BL1500HM | 2024-03-25T17:28+09:00 | 2025-03-28T12:01+09:00 |
| jvndb-2024-000033 | WordPress Plugin "easy-popup-show" vulnerable to cross-site request forgery | 2024-03-25T13:31+09:00 | 2024-03-25T13:31+09:00 |
| jvndb-2024-003008 | Sangoma Technologies CG/MG family driver cg6kwin2k.sys vulnerable to insufficient access control on its IOCTL | 2024-03-22T13:50+09:00 | 2024-04-24T11:45+09:00 |
| jvndb-2024-000032 | Multiple vulnerabilities in FitNesse | 2024-03-18T14:08+09:00 | 2024-03-19T11:02+09:00 |
| jvndb-2024-000031 | "ABEMA" App for Android fails to restrict access permissions | 2024-03-15T16:37+09:00 | 2024-03-15T16:37+09:00 |
| jvndb-2024-002961 | Information Exposure Vulnerability in Cosminexus Component Container | 2024-03-13T12:10+09:00 | 2024-03-13T12:10+09:00 |
| jvndb-2024-000030 | a-blog cms vulnerable to directory traversal | 2024-03-08T15:27+09:00 | 2024-03-08T15:27+09:00 |
| jvndb-2024-002942 | OMRON NJ/NX series vulnerable to path traversal | 2024-03-08T14:16+09:00 | 2024-03-08T14:16+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0034-1 | Security update for the Linux Kernel | 2026-01-05T19:29:28Z | 2026-01-05T19:29:28Z |
| suse-su-2026:0033-1 | Security update for the Linux Kernel | 2026-01-05T19:26:53Z | 2026-01-05T19:26:53Z |
| suse-su-2026:0032-1 | Security update for the Linux Kernel | 2026-01-05T19:24:53Z | 2026-01-05T19:24:53Z |
| suse-su-2026:0029-1 | Security update for the Linux Kernel | 2026-01-05T12:59:48Z | 2026-01-05T12:59:48Z |
| suse-su-2026:0028-1 | Security update for alloy | 2026-01-05T12:53:11Z | 2026-01-05T12:53:11Z |
| suse-su-2026:0027-1 | Security update for python3 | 2026-01-05T12:47:16Z | 2026-01-05T12:47:16Z |
| suse-su-2026:0025-1 | Security update for python312 | 2026-01-05T12:11:09Z | 2026-01-05T12:11:09Z |
| suse-su-2026:0024-1 | Security update for python313 | 2026-01-05T12:10:23Z | 2026-01-05T12:10:23Z |
| suse-su-2026:0023-1 | Security update for erlang26 | 2026-01-05T12:06:04Z | 2026-01-05T12:06:04Z |
| suse-su-2026:0022-1 | Security update for qemu | 2026-01-05T11:18:23Z | 2026-01-05T11:18:23Z |
| suse-su-2026:0021-1 | Security update for webkit2gtk3 | 2026-01-05T11:12:33Z | 2026-01-05T11:12:33Z |
| suse-su-2026:0020-1 | Security update for apache2 | 2026-01-05T11:08:42Z | 2026-01-05T11:08:42Z |
| suse-su-2026:0019-1 | Security update for apache2 | 2026-01-05T11:08:00Z | 2026-01-05T11:08:00Z |
| suse-su-2026:0018-1 | Security update for glib2 | 2026-01-05T10:52:26Z | 2026-01-05T10:52:26Z |
| suse-su-2026:0017-1 | Security update for libsoup | 2026-01-05T10:52:01Z | 2026-01-05T10:52:01Z |
| suse-su-2026:0016-1 | Security update for pgadmin4 | 2026-01-05T10:48:08Z | 2026-01-05T10:48:08Z |
| suse-su-2026:0015-1 | Security update for pgadmin4 | 2026-01-05T10:40:59Z | 2026-01-05T10:40:59Z |
| suse-su-2026:0014-1 | Security update for buildah | 2026-01-05T10:39:01Z | 2026-01-05T10:39:01Z |
| suse-su-2026:0013-1 | Security update for ImageMagick | 2026-01-05T10:36:11Z | 2026-01-05T10:36:11Z |
| suse-su-2026:0012-1 | Security update for xen | 2026-01-05T10:31:27Z | 2026-01-05T10:31:27Z |
| suse-su-2026:0011-1 | Security update for ImageMagick | 2026-01-05T10:28:55Z | 2026-01-05T10:28:55Z |
| suse-su-2026:0010-1 | Security update for python-tornado6 | 2026-01-05T10:26:32Z | 2026-01-05T10:26:32Z |
| suse-su-2026:20019-1 | Security update for sssd | 2026-01-02T16:58:52Z | 2026-01-02T16:58:52Z |
| suse-su-2026:20014-1 | Security update for sssd | 2026-01-02T16:58:52Z | 2026-01-02T16:58:52Z |
| suse-su-2026:0005-1 | Security update for rsync | 2026-01-02T12:30:51Z | 2026-01-02T12:30:51Z |
| suse-su-2026:20058-1 | Security update for rsync | 2026-01-02T11:13:05Z | 2026-01-02T11:13:05Z |
| suse-su-2026:20057-1 | Security update for libmicrohttpd | 2026-01-02T11:07:26Z | 2026-01-02T11:07:26Z |
| suse-ru-2026:20056-1 | Recommended update for shim | 2026-01-01T13:54:36Z | 2026-01-01T13:54:36Z |
| suse-su-2025:4539-1 | Security update for python36 | 2025-12-31T15:05:33Z | 2025-12-31T15:05:33Z |
| suse-su-2025:4538-1 | Security update for python3 | 2025-12-31T15:05:25Z | 2025-12-31T15:05:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-04121 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412189) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04120 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412090) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04119 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411991) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04118 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411892) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04117 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411793) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04116 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411699) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04115 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411501) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04114 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411402) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04113 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411303) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04112 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0411204) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04111 | Adobe Experience Manager跨站脚本漏洞 | 2025-12-15 | 2026-01-15 |
| cnvd-2026-03527 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0352794) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-03526 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0352695) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-03525 | Adobe Experience Manager跨站脚本漏洞 | 2025-12-15 | 2026-01-15 |
| cnvd-2026-03524 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0352497) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-03523 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0352398) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-02931 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02931) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02930 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02930) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02929 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02929) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02928 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02928) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02927 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02927) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02926 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02926) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02925 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02925) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02924 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02924) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02923 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02923) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02922 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-02922) | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02912 | Ivanti Endpoint Manager路径遍历漏洞 | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02911 | Ivanti Endpoint Manager数据伪造问题漏洞 | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02910 | Ivanti Endpoint Manager跨站脚本漏洞 | 2025-12-15 | 2026-01-12 |
| cnvd-2026-02909 | Ivanti Endpoint Manager代码执行漏洞 | 2025-12-15 | 2026-01-12 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-1138 | Multiples vulnérabilités dans VMware Tanzu Platform | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1137 | Multiples vulnérabilités dans les produits IBM | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1136 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1135 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1134 | Multiples vulnérabilités dans MongoDB Server | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1133 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1132 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1131 | Multiples vulnérabilités dans les produits IBM | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1130 | Multiples vulnérabilités dans les produits Foxit | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1129 | Multiples vulnérabilités dans les produits VMware | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1128 | Multiples vulnérabilités dans Mozilla Firefox | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1127 | Multiples vulnérabilités dans Centreon Web | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1126 | Multiples vulnérabilités dans PHP | 2025-12-19T00:00:00.000000 | 2025-12-22T00:00:00.000000 |
| certfr-2025-avi-1125 | Vulnérabilité dans les produits NetApp | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1124 | Multiples vulnérabilités dans Microsoft Edge | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1123 | Multiples vulnérabilités dans les produits Elastic | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1136 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1135 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1134 | Multiples vulnérabilités dans MongoDB Server | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1133 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1132 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1131 | Multiples vulnérabilités dans les produits IBM | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1130 | Multiples vulnérabilités dans les produits Foxit | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1129 | Multiples vulnérabilités dans les produits VMware | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1128 | Multiples vulnérabilités dans Mozilla Firefox | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1127 | Multiples vulnérabilités dans Centreon Web | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1126 | Multiples vulnérabilités dans PHP | 2025-12-19T00:00:00.000000 | 2025-12-22T00:00:00.000000 |
| CERTFR-2025-AVI-1125 | Vulnérabilité dans les produits NetApp | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1124 | Multiples vulnérabilités dans Microsoft Edge | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1123 | Multiples vulnérabilités dans les produits Elastic | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2014-ale-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| CERTFR-2014-ALE-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| certfr-2014-ale-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| CERTFR-2014-ALE-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| certfr-2014-ale-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| CERTFR-2014-ALE-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| certfr-2014-ale-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| CERTFR-2014-ALE-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| certfr-2014-ale-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| CERTFR-2014-ALE-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| certfr-2014-ale-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| CERTFR-2014-ALE-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| certfr-2014-ale-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| CERTFR-2014-ALE-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| certfr-2014-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| CERTFR-2014-ALE-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| certa-2013-ale-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| CERTA-2013-ALE-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| certa-2013-ale-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| CERTA-2013-ALE-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| certa-2013-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| CERTA-2013-ALE-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| certa-2013-ale-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |
| CERTA-2013-ALE-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |
| certa-2013-ale-004 | Vulnérabilité dans Adobe ColdFusion | 2013-05-10T00:00:00.000000 | 2013-05-15T00:00:00.000000 |
| CERTA-2013-ALE-004 | Vulnérabilité dans Adobe ColdFusion | 2013-05-10T00:00:00.000000 | 2013-05-15T00:00:00.000000 |