Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23596 |
6.5 (3.1)
|
Unauthenticated Improper Access Control in management … |
Hewlett Packard Enterprise (HPE) |
HPE Aruba Networking Private 5G Core |
2026-02-17T20:46:12.694Z | 2026-02-18T15:15:27.361Z |
| CVE-2026-2656 |
2 (4.0)
2.5 (3.1)
2.5 (3.0)
|
ChaiScript type_info.hpp bare_equal use after free |
n/a |
ChaiScript |
2026-02-18T14:32:07.335Z | 2026-02-18T15:11:04.454Z |
| CVE-2026-20661 |
4.6 (3.1)
|
An authorization issue was addressed with improve… |
Apple |
iOS and iPadOS |
2026-02-11T22:58:13.600Z | 2026-02-18T15:09:21.208Z |
| CVE-2026-20656 |
3.3 (3.1)
|
A logic issue was addressed with improved validat… |
Apple |
Safari |
2026-02-11T22:58:23.667Z | 2026-02-18T15:07:43.284Z |
| CVE-2026-20621 |
5.5 (3.1)
|
The issue was addressed with improved memory hand… |
Apple |
macOS |
2026-02-11T22:58:26.506Z | 2026-02-18T15:06:07.326Z |
| CVE-2026-20618 |
5.5 (3.1)
|
An issue was addressed with improved handling of … |
Apple |
macOS |
2026-02-11T22:58:33.319Z | 2026-02-18T15:03:35.205Z |
| CVE-2026-20680 |
5.5 (3.1)
|
The issue was addressed with additional restricti… |
Apple |
macOS |
2026-02-11T22:58:35.657Z | 2026-02-18T14:59:48.597Z |
| CVE-2026-20655 |
5.5 (3.1)
|
An authorization issue was addressed with improve… |
Apple |
iOS and iPadOS |
2026-02-11T22:58:37.366Z | 2026-02-18T14:56:57.256Z |
| CVE-2026-27099 |
8 (3.1)
|
Jenkins 2.483 through 2.550 (both inclusive), LTS… |
Jenkins Project |
Jenkins |
2026-02-18T14:17:43.911Z | 2026-02-18T14:56:27.973Z |
| CVE-2026-20602 |
5.5 (3.1)
|
The issue was addressed with improved handling of… |
Apple |
macOS |
2026-02-11T22:58:38.199Z | 2026-02-18T14:55:49.456Z |
| CVE-2026-23230 |
N/A
|
smb: client: split cached_fid bitfields to avoid share… |
Linux |
Linux |
2026-02-18T14:53:34.078Z | 2026-02-18T14:53:34.078Z |
| CVE-2026-27100 |
4.3 (3.1)
|
Jenkins 2.550 and earlier, LTS 2.541.1 and earlie… |
Jenkins Project |
Jenkins |
2026-02-18T14:17:44.672Z | 2026-02-18T14:53:33.264Z |
| CVE-2026-23229 |
N/A
|
crypto: virtio - Add spinlock protection with virtqueu… |
Linux |
Linux |
2026-02-18T14:53:33.015Z | 2026-02-18T14:53:33.015Z |
| CVE-2026-23228 |
N/A
|
smb: server: fix leak of active_num_conn in ksmbd_tcp_… |
Linux |
Linux |
2026-02-18T14:53:31.882Z | 2026-02-18T14:53:31.882Z |
| CVE-2026-23227 |
N/A
|
drm/exynos: vidi: use ctx->lock to protect struct vidi… |
Linux |
Linux |
2026-02-18T14:53:30.784Z | 2026-02-18T14:53:30.784Z |
| CVE-2026-23226 |
N/A
|
ksmbd: add chann_lock to protect ksmbd_chann_list xarray |
Linux |
Linux |
2026-02-18T14:53:29.562Z | 2026-02-18T14:53:29.562Z |
| CVE-2026-23225 |
N/A
|
sched/mmcid: Don't assume CID is CPU owned on mode switch |
Linux |
Linux |
2026-02-18T14:53:28.387Z | 2026-02-18T14:53:28.387Z |
| CVE-2026-23224 |
N/A
|
erofs: fix UAF issue for file-backed mounts w/ directi… |
Linux |
Linux |
2026-02-18T14:53:27.462Z | 2026-02-18T14:53:27.462Z |
| CVE-2026-23223 |
N/A
|
xfs: fix UAF in xchk_btree_check_block_owner |
Linux |
Linux |
2026-02-18T14:53:26.603Z | 2026-02-18T14:53:26.603Z |
| CVE-2026-23222 |
N/A
|
crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatter… |
Linux |
Linux |
2026-02-18T14:53:25.504Z | 2026-02-18T14:53:25.504Z |
| CVE-2026-23221 |
N/A
|
bus: fsl-mc: fix use-after-free in driver_override_show() |
Linux |
Linux |
2026-02-18T14:53:24.391Z | 2026-02-18T14:53:24.391Z |
| CVE-2026-23220 |
N/A
|
ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_o… |
Linux |
Linux |
2026-02-18T14:53:23.376Z | 2026-02-18T14:53:23.376Z |
| CVE-2025-71237 |
N/A
|
nilfs2: Fix potential block overflow that cause system hang |
Linux |
Linux |
2026-02-18T14:53:22.436Z | 2026-02-18T14:53:22.436Z |
| CVE-2025-71236 |
N/A
|
scsi: qla2xxx: Validate sp before freeing associated memory |
Linux |
Linux |
2026-02-18T14:53:21.339Z | 2026-02-18T14:53:21.339Z |
| CVE-2025-71235 |
N/A
|
scsi: qla2xxx: Delay module unload while fabric scan i… |
Linux |
Linux |
2026-02-18T14:53:20.222Z | 2026-02-18T14:53:20.222Z |
| CVE-2025-71234 |
N/A
|
wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add |
Linux |
Linux |
2026-02-18T14:53:18.893Z | 2026-02-18T14:53:18.893Z |
| CVE-2025-71233 |
N/A
|
PCI: endpoint: Avoid creating sub-groups asynchronously |
Linux |
Linux |
2026-02-18T14:53:17.926Z | 2026-02-18T14:53:17.926Z |
| CVE-2025-71232 |
N/A
|
scsi: qla2xxx: Free sp in error path to fix system crash |
Linux |
Linux |
2026-02-18T14:53:16.709Z | 2026-02-18T14:53:16.709Z |
| CVE-2025-71231 |
N/A
|
crypto: iaa - Fix out-of-bounds index in find_empty_ia… |
Linux |
Linux |
2026-02-18T14:53:15.668Z | 2026-02-18T14:53:15.668Z |
| CVE-2025-71230 |
N/A
|
hfs: ensure sb->s_fs_info is always cleaned up |
Linux |
Linux |
2026-02-18T14:53:14.519Z | 2026-02-18T14:53:14.519Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-0550 |
6.4 (3.1)
|
myCred <= 2.9.7.3 - Authenticated (Contributor+) Store… |
saadiqbal |
myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program. |
2026-02-14T08:26:47.816Z | 2026-02-17T15:44:18.785Z |
| CVE-2025-8572 |
9.8 (3.1)
|
Truelysell Core <= 1.8.7 - Unauthenticated Privilege E… |
dreamstechnologies |
Truelysell Core |
2026-02-14T08:26:47.464Z | 2026-02-17T15:44:26.791Z |
| CVE-2025-71202 |
N/A
|
iommu/sva: invalidate stale IOTLB entries for kernel a… |
Linux |
Linux |
2026-02-14T15:36:06.588Z | 2026-02-16T08:58:38.840Z |
| CVE-2025-71201 |
N/A
|
netfs: Fix early read unlock of page with EOF in middle |
Linux |
Linux |
2026-02-14T15:22:21.233Z | 2026-02-14T15:22:21.233Z |
| CVE-2025-71200 |
N/A
|
mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction… |
Linux |
Linux |
2026-02-14T15:09:45.689Z | 2026-02-14T15:09:45.689Z |
| CVE-2025-70957 |
7.5 (3.1)
|
A Denial of Service (DoS) vulnerability was disco… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-18T14:31:20.150Z |
| CVE-2025-70956 |
7.5 (3.1)
|
A State Pollution vulnerability was discovered in… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-17T15:15:36.481Z |
| CVE-2025-70955 |
7.5 (3.1)
|
A Stack Overflow vulnerability was discovered in … |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-18T14:33:54.465Z |
| CVE-2025-70954 |
7.5 (3.1)
|
A Null Pointer Dereference vulnerability exists i… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-17T18:29:09.899Z |
| CVE-2025-70866 |
8.8 (3.1)
|
LavaLite CMS 10.1.0 is vulnerable to Incorrect Ac… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-17T15:14:47.415Z |
| CVE-2025-69633 |
9.8 (3.1)
|
A SQL Injection vulnerability in the Advanced Pop… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-17T15:09:45.962Z |
| CVE-2025-6792 |
5.3 (3.1)
|
One to one user Chat by WPGuppy <= 1.1.4 - Unauthentic… |
amentotechpvtltd |
One to one user Chat by WPGuppy |
2026-02-14T06:42:25.584Z | 2026-02-18T20:16:00.898Z |
| CVE-2025-15483 |
4.4 (3.1)
|
Link Hopper <= 2.5 - Authenticated (Administrator+) St… |
ajferg |
Link Hopper |
2026-02-14T06:42:34.100Z | 2026-02-17T15:45:39.813Z |
| CVE-2025-15157 |
8.8 (3.1)
|
Starfish Review Generation & Marketing for WordPress <… |
starfishwp |
Starfish Review Generation & Marketing for WordPress |
2026-02-13T21:23:04.343Z | 2026-02-17T20:31:39.854Z |
| CVE-2025-14873 |
4.3 (3.1)
|
LatePoint – Calendar Booking Plugin for Appointments a… |
latepoint |
LatePoint – Calendar Booking Plugin for Appointments and Events |
2026-02-14T06:42:26.760Z | 2026-02-17T15:47:42.250Z |
| CVE-2025-14852 |
4.3 (3.1)
|
MDirector Newsletter <= 4.5.8 - Cross-Site Request For… |
antevenio |
MDirector Newsletter |
2026-02-14T06:42:30.914Z | 2026-02-17T15:46:46.455Z |
| CVE-2025-14608 |
5.3 (3.1)
|
WP Last Modified Info <= 1.9.5 - Insecure Direct Objec… |
infosatech |
WP Last Modified Info |
2026-02-14T03:25:28.248Z | 2026-02-17T15:04:02.381Z |
| CVE-2025-14067 |
5.3 (3.1)
|
Easy Form Builder <= 3.9.3 - Missing Authorization to … |
hassantafreshi |
Easy Form Builder by WhiteStudio — Drag & Drop Form Builder |
2026-02-14T03:25:27.883Z | 2026-02-17T15:04:36.362Z |
| CVE-2025-13973 |
5.3 (3.1)
|
StickEasy Protected Contact Form <= 1.0.1 - Unauthenti… |
kasuga16 |
StickEasy Protected Contact Form |
2026-02-14T03:25:27.497Z | 2026-02-17T15:06:04.122Z |
| CVE-2025-13681 |
4.9 (3.1)
|
BFG Tools – Extension Zipper <= 1.0.7 - Authenticated … |
thebaldfatguy |
BFG Tools – Extension Zipper |
2026-02-14T03:25:26.938Z | 2026-02-17T15:06:55.368Z |
| CVE-2026-26930 |
7.2 (3.1)
|
SmarterTools SmarterMail before 9526 allows XSS v… |
SmarterTools |
SmarterMail |
2026-02-16T16:27:14.946Z | 2026-02-17T14:47:01.870Z |
| CVE-2026-26369 |
9.3 (4.0)
9.8 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Privilege Esca… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:56.204Z | 2026-02-17T16:50:04.129Z |
| CVE-2026-26368 |
8.7 (4.0)
8.8 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Account Takeov… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:55.403Z | 2026-02-17T16:50:34.868Z |
| CVE-2026-26367 |
7.1 (4.0)
6.5 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Arbitrary User… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:54.646Z | 2026-02-17T16:50:52.127Z |
| CVE-2026-26366 |
9.3 (4.0)
9.8 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:53.866Z | 2026-02-17T16:51:25.025Z |
| CVE-2026-26220 |
9.3 (4.0)
|
LightLLM <= 1.1.0 PD Mode Unsafe Deserialization RCE |
ModelTC |
LightLLM |
2026-02-17T01:52:03.650Z | 2026-02-17T14:37:46.080Z |
| CVE-2026-2618 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
Beetel 777VR1 SSH Service risky encryption |
Beetel |
777VR1 |
2026-02-17T16:32:06.477Z | 2026-02-17T17:14:55.824Z |
| CVE-2026-2617 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Beetel 777VR1 Telnet Service/SSH Service insecure defa… |
Beetel |
777VR1 |
2026-02-17T15:32:06.089Z | 2026-02-17T15:46:49.526Z |
| CVE-2026-2616 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Beetel 777VR1 Web Management hard-coded credentials |
Beetel |
777VR1 |
2026-02-17T15:02:07.133Z | 2026-02-17T15:21:26.533Z |
| CVE-2026-2608 |
4.3 (3.1)
|
Gutenberg Blocks by Kadence Blocks <= 3.5.32 - Missing… |
stellarwp |
Kadence Blocks — Page Builder Toolkit for Gutenberg Editor |
2026-02-17T11:20:37.133Z | 2026-02-17T14:28:19.816Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-0550 | The myCred plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mycr… | 2026-02-14T09:16:11.683 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-8572 | The Truelysell Core plugin for WordPress is vulnerable to privilege escalation in versions less tha… | 2026-02-14T09:16:11.490 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-71202 | In the Linux kernel, the following vulnerability has been resolved: iommu/sva: invalidate stale IO… | 2026-02-14T16:15:52.790 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-71201 | In the Linux kernel, the following vulnerability has been resolved: netfs: Fix early read unlock o… | 2026-02-14T16:15:52.647 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-71200 | In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-of-dwcmshc: Prevent… | 2026-02-14T15:16:05.980 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-70957 | A Denial of Service (DoS) vulnerability was discovered in the TON Lite Server before v2024.09. The … | 2026-02-13T22:16:10.413 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-70956 | A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. Th… | 2026-02-13T22:16:10.290 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-70955 | A Stack Overflow vulnerability was discovered in the TON Virtual Machine (TVM) before v2024.10. The… | 2026-02-13T22:16:10.170 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-70954 | A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blo… | 2026-02-13T22:16:10.047 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-70866 | LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level… | 2026-02-13T22:16:09.923 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-69633 | A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreator) module for Prest… | 2026-02-13T22:16:09.650 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-6792 | The One to one user Chat by WPGuppy plugin for WordPress is vulnerable to unauthorized access of da… | 2026-02-14T07:16:07.270 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-15483 | The Link Hopper plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘hop_name… | 2026-02-14T07:16:07.067 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-15157 | The Starfish Review Generation & Marketing for WordPress plugin for WordPress is vulnerable to unau… | 2026-02-13T22:16:08.427 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-14873 | The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnera… | 2026-02-14T07:16:06.887 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-14852 | The MDirector Newsletter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all ve… | 2026-02-14T07:16:06.433 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-14608 | The WP Last Modified Info plugin for WordPress is vulnerable to Insecure Direct Object Reference in… | 2026-02-14T04:15:56.643 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-14067 | The Easy Form Builder plugin for WordPress is vulnerable to unauthorized access of data due to a mi… | 2026-02-14T04:15:56.480 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-13973 | The StickEasy Protected Contact Form plugin for WordPress is vulnerable to Sensitive Information Di… | 2026-02-14T04:15:56.313 | 2026-02-18T17:52:44.520 |
| fkie_cve-2025-13681 | The BFG Tools – Extension Zipper plugin for WordPress is vulnerable to Path Traversal in all versio… | 2026-02-14T04:15:56.123 | 2026-02-18T17:52:44.520 |
| fkie_cve-2026-26930 | SmarterTools SmarterMail before 9526 allows XSS via MAPI requests. | 2026-02-16T17:18:08.813 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-26369 | eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insuffi… | 2026-02-15T16:15:54.407 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-26368 | eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the resetU… | 2026-02-15T16:15:54.237 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-26367 | eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the delete… | 2026-02-15T16:15:54.060 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-26366 | eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that… | 2026-02-15T16:15:53.870 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-26220 | LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in … | 2026-02-17T03:16:01.893 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2618 | A vulnerability was determined in Beetel 777VR1 up to 01.00.09. This impacts an unknown function of… | 2026-02-17T17:21:06.490 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2617 | A vulnerability was found in Beetel 777VR1 up to 01.00.09. This affects an unknown function of the … | 2026-02-17T16:20:29.987 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2616 | A vulnerability has been found in Beetel 777VR1 up to 01.00.09. The impacted element is an unknown … | 2026-02-17T15:16:24.717 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2608 | The Kadence Blocks — Page Builder Toolkit for Gutenberg Editor plugin for WordPress is vulnerable t… | 2026-02-17T12:16:15.600 | 2026-02-18T17:52:22.253 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-pjwm-rvh2-c87w |
8.8 (3.1)
|
Embedded malware in ua-parser-js | 2021-10-22T20:38:14Z | 2026-02-17T21:57:43Z |
| ghsa-87r5-mp6g-5w5j |
9.8 (3.1)
8.2 (4.0)
|
jsonpath has Arbitrary Code Injection via Unsafe Evaluation of JSON Path Expressions | 2026-02-09T06:30:28Z | 2026-02-17T21:47:32Z |
| ghsa-8mh7-phf8-xgfm |
5.3 (4.0)
|
OpenClaw skills.status could leak secrets to operator.read clients | 2026-02-17T21:43:41Z | 2026-02-17T21:43:41Z |
| ghsa-h3f9-mjwj-w476 |
7.2 (3.1)
|
OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals | 2026-02-17T21:42:49Z | 2026-02-17T21:42:49Z |
| ghsa-jrvc-8ff5-2f9f |
7.5 (3.1)
|
OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reachable) | 2026-02-17T21:42:40Z | 2026-02-17T21:42:40Z |
| ghsa-g6q9-8fvw-f7rf |
7.6 (3.1)
|
OpenClaw Gateway tool allowed unrestricted gatewayUrl override | 2026-02-17T21:42:15Z | 2026-02-17T21:42:15Z |
| ghsa-8jpq-5h99-ff5r |
7.5 (3.1)
|
OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension | 2026-02-17T21:41:52Z | 2026-02-17T21:41:52Z |
| ghsa-7q2j-c4q5-rm27 |
7.1 (4.0)
|
OpenClaw macOS deep link confirmation truncation can conceal executed agent message | 2026-02-17T21:41:40Z | 2026-02-17T21:41:40Z |
| ghsa-4hg8-92x6-h2f3 |
7.5 (3.1)
|
OpenClaw is Missing Webhook Authentication in Telnyx Provider Allows Unauthenticated Requests | 2026-02-17T21:40:46Z | 2026-02-17T21:40:47Z |
| ghsa-236c-vhj4-gfxg |
8.8 (3.1)
|
Duplicate Advisory: Embedded malware in ua-parser-js | 2022-05-25T00:00:31Z | 2026-02-17T21:40:20Z |
| ghsa-qrq5-wjgg-rvqw |
9.3 (3.1)
|
OpenClaw has a Path Traversal in Plugin Installation | 2026-02-17T21:39:24Z | 2026-02-17T21:39:24Z |
| ghsa-mqpw-46fh-299h |
7.2 (3.1)
|
OpenClaw authorization bypass: operator.write can resolve exec approvals via chat.send -> /approve | 2026-02-17T21:39:11Z | 2026-02-17T21:39:11Z |
| ghsa-7vwx-582j-j332 |
7.4 (3.1)
|
OpenClaw MS Teams inbound attachment downloader leaks bearer tokens to allowlisted suffix domains | 2026-02-17T21:38:14Z | 2026-02-17T21:38:14Z |
| ghsa-33rq-m5x2-fvgf |
7.3 (3.1)
|
OpenClaw Twitch allowFrom is not enforced in optional plugin, unauthorized chat users can trigger a… | 2026-02-17T21:37:55Z | 2026-02-17T21:37:55Z |
| ghsa-4rj2-gpmh-qq5x |
9.4 (3.1)
|
OpenClaw has an inbound allowlist policy bypass in voice-call extension (empty caller ID + suffix m… | 2026-02-17T21:36:34Z | 2026-02-17T21:36:34Z |
| ghsa-r5h9-vjqc-hq3r |
9.3 (4.0)
|
Nextcloud Talk allowlist bypass via actor.name display name spoofing | 2026-02-17T21:36:15Z | 2026-02-17T21:36:15Z |
| ghsa-fhvm-j76f-qmjv |
9.1 (4.0)
|
OpenClaw has a potential access-group authorization bypass if channel type lookup fails | 2026-02-17T21:34:36Z | 2026-02-17T21:34:36Z |
| ghsa-rmxw-jxxx-4cpc |
6.5 (3.1)
|
OpenClaw has a Matrix allowlist bypass via displayName and cross-homeserver localpart matching | 2026-02-17T21:34:17Z | 2026-02-17T21:34:17Z |
| ghsa-pchc-86f6-8758 |
7.5 (3.1)
|
OpenClaw BlueBubbles webhook auth bypass via loopback proxy trust | 2026-02-17T21:33:51Z | 2026-02-17T21:33:51Z |
| ghsa-3m3q-x3gj-f79x |
5.9 (3.1)
|
OpenClaw optional voice-call plugin: webhook verification may be bypassed behind certain proxy conf… | 2026-02-17T21:31:58Z | 2026-02-17T21:31:58Z |
| ghsa-g27f-9qjv-22pm |
3.1 (3.1)
|
OpenClaw log poisoning (indirect prompt injection) via WebSocket headers | 2026-02-17T21:31:39Z | 2026-02-17T21:31:39Z |
| ghsa-mv9j-6xhh-g383 |
6.3 (4.0)
|
OpenClaw's unauthenticated Nostr profile HTTP endpoints allow remote profile/config tampering | 2026-02-17T21:31:17Z | 2026-02-17T21:31:17Z |
| ghsa-v929-j8mj-vc74 |
6.5 (3.1)
|
Vulnerabilities in the API error handling of an HPE Aruba Networking 5G Core server API could allo… | 2026-02-17T21:31:15Z | 2026-02-17T21:31:15Z |
| ghsa-rm24-2x6v-8w7f |
3.5 (3.1)
2.0 (4.0)
|
A vulnerability was detected in Blossom up to 1.17.1. This vulnerability affects the function conte… | 2026-02-17T21:31:15Z | 2026-02-17T21:31:15Z |
| ghsa-mrc8-4r2p-q3ww |
7.3 (3.1)
5.5 (4.0)
|
A security vulnerability has been detected in Sciyon Koyuan Thermoelectricity Heat Network Manageme… | 2026-02-17T21:31:15Z | 2026-02-17T21:31:15Z |
| ghsa-8rh3-rvv2-3mr4 |
6.5 (3.1)
|
A vulnerability in the management API of the affected product could allow an unauthenticated remote… | 2026-02-17T21:31:14Z | 2026-02-17T21:31:15Z |
| ghsa-74jq-6q38-p5wf |
8.8 (3.1)
|
An authentication bypass in the application API allows an unauthorized administrative account to be… | 2026-02-17T21:31:15Z | 2026-02-17T21:31:15Z |
| ghsa-5fc6-h8m7-2wfc |
6.5 (3.1)
|
Vulnerabilities in the API error handling of an HPE Aruba Networking 5G Core server API could allo… | 2026-02-17T21:31:14Z | 2026-02-17T21:31:15Z |
| ghsa-wrqj-g5w9-qq86 |
6.5 (3.1)
|
IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 IBM Db2 Recovery Expert for Linux, UNIX and Win… | 2026-02-17T21:31:14Z | 2026-02-17T21:31:14Z |
| ghsa-wrgv-jmfr-c4gr |
5.9 (3.1)
|
IBM Security QRadar EDR 3.12 through 3.12.23 IBM Security ReaQta uses weaker than expected cryptogr… | 2026-02-17T21:31:14Z | 2026-02-17T21:31:14Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-287 |
4.3 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-12-22T17:15:00+00:00 | 2024-11-21T14:22:55.764934+00:00 |
| pysec-2023-286 |
5.3 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-12-12T23:15:00+00:00 | 2024-11-21T14:22:55.664554+00:00 |
| pysec-2023-285 |
5.4 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-11-22T16:15:00+00:00 | 2024-11-21T14:22:55.567982+00:00 |
| pysec-2023-284 |
6.5 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-23T14:15:00+00:00 | 2024-11-21T14:22:55.160710+00:00 |
| pysec-2023-283 |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-19T18:15:00+00:00 | 2024-11-21T14:22:55.105976+00:00 |
| pysec-2023-282 |
6.5 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-19T09:15:00+00:00 | 2024-11-21T14:22:55.051300+00:00 |
| pysec-2022-43141 |
7.5 (3.1)
|
MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET re… | motioneye | 2022-03-24T17:15:00+00:00 | 2024-11-21T14:22:55.422153+00:00 |
| pysec-2012-37 |
|
The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), … | nova | 2012-06-21T15:55:00Z | 2024-11-21T14:22:55.891133Z |
| pysec-2012-36 |
|
Openstack Compute (Nova) Folsom, 2012.1, and 2011.3 does not limit the number of security… | nova | 2012-06-07T19:55:00Z | 2024-11-21T14:22:55.825436Z |
| pysec-2023-281 |
8.8 (3.1)
|
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repositor… | mlflow | 2023-12-12T04:15:00+00:00 | 2024-11-21T14:22:54.938745+00:00 |
| pysec-2023-280 |
7.8 (3.1)
|
OS Command Injection in GitHub repository mlflow/mlflow prior to 2.6.0. | mlflow | 2023-08-01T01:15:00+00:00 | 2024-11-21T14:22:54.880705+00:00 |
| pysec-2023-279 |
9.1 (3.1)
|
MindsDB is a SQL Server for artificial intelligence. Prior to version 23.11.4.1, the `put… | mindsdb | 2023-12-22T21:15:00+00:00 | 2024-11-21T14:22:54.549778+00:00 |
| pysec-2023-277 |
5.3 (3.1)
|
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.1… | mindsdb | 2023-12-11T19:15:00+00:00 | 2024-11-21T14:22:54.391272+00:00 |
| pysec-2014-110 |
|
Multiple cross-site scripting (XSS) vulnerabilities in apps/common/templates/calculate_fo… | mayan-edms | 2014-05-27T13:55:00Z | 2024-11-21T14:22:54.240407Z |
| pysec-2024-128 |
6.1 (3.1)
|
Label Studio, an open source data labeling tool had a remote import feature allowed users… | label-studio | 2024-01-24T00:15:00+00:00 | 2024-11-21T14:22:53.406222+00:00 |
| pysec-2024-127 |
5.3 (3.1)
|
Label Studio is a popular open source data labeling tool. The vulnerability affects all v… | label-studio | 2024-01-31T17:15:00+00:00 | 2024-11-21T14:22:53.294472+00:00 |
| pysec-2024-126 |
5.4 (3.1)
|
Label Studio is an a popular open source data labeling tool. Versions prior to 1.9.2 have… | label-studio | 2024-01-23T23:15:00+00:00 | 2024-11-21T14:22:53.235341+00:00 |
| pysec-2023-275 |
7.5 (3.1)
|
Label Studio is an open source data labeling tool. In all current versions of Label Studi… | label-studio | 2023-11-13T21:15:00+00:00 | 2024-11-21T14:22:53.350760+00:00 |
| pysec-2023-274 |
8.8 (3.1)
|
Label Studio is a multi-type data labeling and annotation tool with standardized output f… | label-studio | 2023-11-09T15:15:00+00:00 | 2024-11-21T14:22:53.173192+00:00 |
| pysec-2023-273 |
8.8 (3.1)
|
Kiwi TCMS is an open source test management system. In kiwitcms/Kiwi v12.2 and prior and … | kiwitcms | 2023-04-24T22:15:00+00:00 | 2024-11-21T14:22:53.063160+00:00 |
| pysec-2022-43137 |
5.5 (3.1)
|
LIEF commit 365a16a was discovered to contain a reachable assertion abort via the compone… | lief | 2022-09-13T21:15:00+00:00 | 2024-11-21T14:22:53.842904+00:00 |
| pysec-2017-144 |
7.5 (3.1)
|
Koji 1.13.0 does not properly validate SCM paths, allowing an attacker to work around bla… | koji | 2017-10-06T17:29:00Z | 2024-11-21T14:22:53.117821Z |
| pysec-2023-272 |
4.3 (3.1)
|
The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints… | jupyter-server | 2023-12-04T21:15:00+00:00 | 2024-11-21T14:22:52.227754+00:00 |
| pysec-2018-151 |
8.8 (3.1)
|
An issue was discovered in Project Jupyter JupyterHub OAuthenticator 0.6.x before 0.6.2 a… | jupyterhub | 2018-02-18T03:29:00Z | 2024-11-21T14:22:52.286953Z |
| pysec-2018-150 |
7.5 (3.1)
|
Hyperledger Iroha versions v1.0_beta and v1.0.0_beta-1 are vulnerable to transaction and … | iroha | 2018-06-01T19:29:00Z | 2024-11-21T14:22:52.162008Z |
| pysec-2014-104 |
|
FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote att… | ipa | 2014-11-19T18:59:00Z | 2024-11-21T14:22:52.00819Z |
| pysec-2013-40 |
|
OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs … | keystone | 2013-05-21T18:55:00Z | 2024-11-21T14:22:52.515884Z |
| pysec-2012-35 |
|
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens… | keystone | 2012-12-18T01:55:00Z | 2024-11-21T14:22:52.404569Z |
| pysec-2012-34 |
|
OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenS… | keystone | 2012-07-31T10:45:00Z | 2024-11-21T14:22:52.344123Z |
| pysec-2023-271 |
5.3 (3.1)
|
Hail is an open-source, general-purpose, Python-based data analysis tool with additional … | hail | 2023-12-29T17:16:00+00:00 | 2024-11-21T14:22:51.672042+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-4224 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414154Z |
| gsd-2024-4223 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.423284Z |
| gsd-2024-4222 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.363699Z |
| gsd-2024-4221 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.433755Z |
| gsd-2024-4220 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.384898Z |
| gsd-2024-4219 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.359066Z |
| gsd-2024-4218 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.369587Z |
| gsd-2024-4217 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.397245Z |
| gsd-2024-4216 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414356Z |
| gsd-2024-4215 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.378015Z |
| gsd-2024-4214 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.390841Z |
| gsd-2024-4213 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.379947Z |
| gsd-2024-4212 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.440122Z |
| gsd-2024-4211 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414864Z |
| gsd-2024-4210 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.431459Z |
| gsd-2024-4209 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.403437Z |
| gsd-2024-4208 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.386660Z |
| gsd-2024-4207 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.376954Z |
| gsd-2024-4206 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.423074Z |
| gsd-2024-4205 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.362130Z |
| gsd-2024-4204 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.429356Z |
| gsd-2024-4203 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.393641Z |
| gsd-2024-4202 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.405198Z |
| gsd-2024-4201 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.401052Z |
| gsd-2024-4200 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.430960Z |
| gsd-2024-4199 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.422865Z |
| gsd-2024-4198 | Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully vali… | 2024-04-26T05:02:17.420758Z |
| gsd-2024-4197 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.437306Z |
| gsd-2024-4196 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.385450Z |
| gsd-2024-4195 | Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully vali… | 2024-04-26T05:02:17.392645Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2026-695 | Malicious code in tsconfig-stitch (npm) | 2026-02-03T07:48:27Z | 2026-02-06T03:05:27Z |
| MAL-2026-694 | Malicious code in tarax (npm) | 2026-02-03T07:42:06Z | 2026-02-06T03:05:27Z |
| MAL-2026-669 | Malicious code in vite-ui-components (npm) | 2026-02-03T03:42:39Z | 2026-02-06T03:05:27Z |
| MAL-2026-668 | Malicious code in typescript-react-apollo (npm) | 2026-02-03T03:57:51Z | 2026-02-06T03:05:27Z |
| MAL-2026-667 | Malicious code in typed-document-node (npm) | 2026-02-03T03:57:51Z | 2026-02-06T03:05:27Z |
| MAL-2026-666 | Malicious code in transform-react-display-name (npm) | 2026-02-03T03:57:51Z | 2026-02-06T03:05:27Z |
| MAL-2026-665 | Malicious code in transform-exponentiation-operator (npm) | 2026-02-03T03:57:51Z | 2026-02-06T03:05:27Z |
| MAL-2026-664 | Malicious code in transform-es2015-modules-amd (npm) | 2026-02-03T03:57:51Z | 2026-02-06T03:05:27Z |
| MAL-2026-663 | Malicious code in transform-async-generator-functions (npm) | 2026-02-03T03:57:51Z | 2026-02-06T03:05:27Z |
| mal-2026-758 | Malicious code in tailwindcss-forms-starter (npm) | 2026-02-05T02:03:44Z | 2026-02-06T03:05:26Z |
| mal-2026-754 | Malicious code in tailwindcss-animation-modern (npm) | 2026-02-05T01:06:23Z | 2026-02-06T03:05:26Z |
| mal-2026-747 | Malicious code in react-vite-sync (npm) | 2026-02-04T23:44:25Z | 2026-02-06T03:05:26Z |
| mal-2026-746 | Malicious code in react-count-sync (npm) | 2026-02-04T23:44:24Z | 2026-02-06T03:05:26Z |
| mal-2026-737 | Malicious code in remark-gfm-v4 (npm) | 2026-02-04T09:46:59Z | 2026-02-06T03:05:26Z |
| mal-2026-716 | Malicious code in si-wsl (npm) | 2026-02-04T04:41:11Z | 2026-02-06T03:05:26Z |
| mal-2026-715 | Malicious code in rreact-sdk (npm) | 2026-02-04T04:41:11Z | 2026-02-06T03:05:26Z |
| mal-2026-714 | Malicious code in reactt-sdkk (npm) | 2026-02-04T04:41:11Z | 2026-02-06T03:05:26Z |
| mal-2026-713 | Malicious code in react-sdkk (npm) | 2026-02-04T04:41:11Z | 2026-02-06T03:05:26Z |
| mal-2026-693 | Malicious code in tailwindcss-forms-kit (npm) | 2026-02-03T07:51:18Z | 2026-02-06T03:05:26Z |
| mal-2026-685 | Malicious code in strengthifys (npm) | 2026-02-03T07:27:10Z | 2026-02-06T03:05:26Z |
| mal-2026-684 | Malicious code in react-responsive-carousel-v4 (npm) | 2026-02-03T07:27:10Z | 2026-02-06T03:05:26Z |
| mal-2026-675 | Malicious code in supun-baileys (npm) | 2026-02-03T05:01:33Z | 2026-02-06T03:05:26Z |
| mal-2026-662 | Malicious code in researchpoc (npm) | 2026-02-03T03:25:19Z | 2026-02-06T03:05:26Z |
| mal-2026-657 | Malicious code in react-dnd-legacy-html5-backend (npm) | 2026-02-03T02:23:48Z | 2026-02-06T03:05:26Z |
| MAL-2026-758 | Malicious code in tailwindcss-forms-starter (npm) | 2026-02-05T02:03:44Z | 2026-02-06T03:05:26Z |
| MAL-2026-754 | Malicious code in tailwindcss-animation-modern (npm) | 2026-02-05T01:06:23Z | 2026-02-06T03:05:26Z |
| MAL-2026-747 | Malicious code in react-vite-sync (npm) | 2026-02-04T23:44:25Z | 2026-02-06T03:05:26Z |
| MAL-2026-746 | Malicious code in react-count-sync (npm) | 2026-02-04T23:44:24Z | 2026-02-06T03:05:26Z |
| MAL-2026-737 | Malicious code in remark-gfm-v4 (npm) | 2026-02-04T09:46:59Z | 2026-02-06T03:05:26Z |
| MAL-2026-716 | Malicious code in si-wsl (npm) | 2026-02-04T04:41:11Z | 2026-02-06T03:05:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0679 | Golang Go: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-04-01T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0411 | Linux Kernel: Mehrere Schwachstellen | 2025-02-18T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0378 | Linux Kernel: Mehrere Schwachstellen | 2025-02-13T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0265 | Linux Kernel: Mehrere Schwachstellen | 2025-02-04T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0188 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-01-23T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0047 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-12T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0035 | Linux Kernel: Mehrere Schwachstellen | 2025-01-08T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2024-3619 | Linux Kernel: Mehrere Schwachstellen | 2024-12-05T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2024-3608 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-12-04T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2024-3509 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-11-19T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2024-2173 | Linux Kernel: Mehrere Schwachstellen | 2024-09-17T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2024-1402 | Linux Kernel: Mehrere Schwachstellen | 2024-06-18T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2024-1235 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe | 2024-05-26T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2023-1367 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-06-05T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-2400 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-12-22T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-2132 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-11-20T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-2038 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-11-14T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-1201 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-08-28T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-0997 | Linux Kernel: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2022-08-09T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-0540 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-05-11T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0083 | Microsoft Windows : Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-01-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0096 | Google Android Pixel: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-01-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2196 | Redis: Mehrere Schwachstellen | 2025-10-05T22:00:00.000+00:00 | 2026-01-14T23:00:00.000+00:00 |
| wid-sec-w-2026-0017 | Veeam Backup & Replication: Mehrere Schwachstellen | 2026-01-05T23:00:00.000+00:00 | 2026-01-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0020 | Google Chrome/Microsoft Edge: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-01-06T23:00:00.000+00:00 | 2026-01-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0047 | CoreDNS: Schwachstelle ermöglicht Denial of Service | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0044 | libtasn1: Schwachstelle ermöglicht Denial of Service | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0043 | Trend Micro Apex Central: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0040 | n8n: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0036 | OpenLDAP: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0110 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-04-08T18:54:30.631706Z | 2025-04-08T18:54:30.631706Z |
| ncsc-2025-0109 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-04-08T18:53:20.624247Z | 2025-04-08T18:53:20.624247Z |
| ncsc-2025-0108 | Kwetsbaarheid verholpen in Microsoft System Center | 2025-04-08T18:52:22.999321Z | 2025-04-08T18:52:22.999321Z |
| ncsc-2025-0107 | Kwetsbaarheden verholpen in Microsoft Office | 2025-04-08T18:50:53.931519Z | 2025-04-08T18:50:53.931519Z |
| ncsc-2025-0106 | Kwetsbaarheden verholpen in Siemens producten | 2025-04-08T13:57:11.959816Z | 2025-04-08T13:57:11.959816Z |
| ncsc-2025-0101 | Kwetsbaarheid verholpen in CrushFTP | 2025-04-01T07:47:50.425419Z | 2025-04-07T14:03:59.372671Z |
| ncsc-2025-0105 | Kwetsbaarheid verholpen in Ivanti Connect Secure, Policy Secure en ZTA Gateways | 2025-04-03T14:19:37.560619Z | 2025-04-03T14:19:37.560619Z |
| ncsc-2025-0104 | Kwetsbaarheid verholpen in Cisco Enterprise Chat and Email | 2025-04-03T08:04:22.928655Z | 2025-04-03T08:04:22.928655Z |
| ncsc-2025-0103 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-04-01T08:42:27.059536Z | 2025-04-01T08:42:27.059536Z |
| ncsc-2025-0102 | Kwetsbaarheden verholpen in Apple macOS | 2025-04-01T08:41:09.934597Z | 2025-04-01T08:41:09.934597Z |
| ncsc-2025-0100 | Kwetsbaarheden verholpen in GitLab EE/CE | 2025-03-27T14:49:34.316050Z | 2025-03-27T14:49:34.316050Z |
| ncsc-2025-0095 | Kwetsbaarheden verholpen in Kubernetes Ingress NGINX Controller | 2025-03-25T07:13:08.093318Z | 2025-03-27T14:41:30.387171Z |
| ncsc-2025-0099 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-03-27T09:18:30.331072Z | 2025-03-27T09:18:30.331072Z |
| ncsc-2025-0098 | Kwetsbaarheid verholpen in Google Chrome | 2025-03-26T12:45:59.434386Z | 2025-03-26T12:45:59.434386Z |
| ncsc-2025-0097 | Kwetsbaarheid verholpen in NetApp SnapCenter | 2025-03-25T08:41:39.996819Z | 2025-03-25T08:41:39.996819Z |
| ncsc-2025-0096 | Kwetsbaarheid verholpen in Next.js | 2025-03-25T08:38:53.524904Z | 2025-03-25T08:38:53.524904Z |
| ncsc-2025-0094 | Kwetsbaarheid verholpen in Veeam Backup & Replication | 2025-03-20T14:10:16.806777Z | 2025-03-20T14:10:16.806777Z |
| ncsc-2025-0093 | Kwetsbaarheid verholpen in IBM InfoSphere Information Server | 2025-03-20T13:17:45.897480Z | 2025-03-20T13:17:45.897480Z |
| ncsc-2025-0092 | Kwetsbaarheden verholpen in IBM AIX | 2025-03-20T13:13:43.163579Z | 2025-03-20T13:13:43.163579Z |
| ncsc-2025-0091 | Kwetsbaarheid verholpen in Synology DiskStation Manager | 2025-03-19T15:03:23.414509Z | 2025-03-19T15:03:23.414509Z |
| ncsc-2025-0090 | Kwetsbaarheid verholpen in Synology Replication Service en Synology Unified Controller | 2025-03-19T15:02:46.122619Z | 2025-03-19T15:02:46.122619Z |
| ncsc-2025-0089 | Kwetsbaarheid verholpen in Apache Tomcat | 2025-03-17T18:36:12.978021Z | 2025-03-17T18:36:12.978021Z |
| ncsc-2025-0088 | Kwetsbaarheden verholpen in Autodesk AutoCAD | 2025-03-14T10:10:13.263645Z | 2025-03-14T10:10:13.263645Z |
| ncsc-2025-0087 | Kwetsbaarheden verholpen in GitLab | 2025-03-14T09:14:59.775984Z | 2025-03-14T09:14:59.775984Z |
| ncsc-2025-0086 | Kwetsbaarheid verholpen in Apple iOS, iPadOS, macOS Sequoia, visionOS en Safari | 2025-03-12T13:48:59.223945Z | 2025-03-12T13:48:59.223945Z |
| ncsc-2025-0085 | Kwetsbaarheid verholpen in Ivanti Secure Access Client | 2025-03-12T11:00:45.614633Z | 2025-03-12T11:00:45.614633Z |
| ncsc-2025-0084 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-03-12T10:56:00.883114Z | 2025-03-12T10:56:00.883114Z |
| ncsc-2025-0083 | Kwetsbaarheden verholpen in Fortinet FortiSandbox | 2025-03-12T10:51:18.487649Z | 2025-03-12T10:51:18.487649Z |
| ncsc-2025-0082 | Kwetsbaarheden verholpen in FortiOS, FortiProxy, FortiPAM, FortiSRA en FortiWeb. | 2025-03-12T10:46:38.451715Z | 2025-03-12T10:46:38.451715Z |
| ncsc-2025-0081 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-03-11T18:45:19.628300Z | 2025-03-11T18:45:19.628300Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-968170 | SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products | 2023-06-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-953710 | SSA-953710: Vulnerabilities in the Network Communication Stack in Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-925850 | SSA-925850: Improper Access Control in Polarion ALM | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-871717 | SSA-871717: Multiple Vulnerabilities in Polarion ALM | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-665034 | SSA-665034: Vulnerability in Nozomi Guardian/CMC before 23.3.0 on RUGGEDCOM APE1808 devices | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-661579 | SSA-661579: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-647455 | SSA-647455: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.2 on RUGGEDCOM APE1808 devices | 2023-10-10T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-592380 | SSA-592380: Denial of Service Vulnerability in SIMATIC S7-1500 CPUs and related products | 2023-12-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-589937 | SSA-589937: Multiple Memory Corruption Vulnerabilities in Solid Edge | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-489698 | SSA-489698: X_T File Parsing Vulnerability in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-382651 | SSA-382651: File Parsing Vulnerability in Solid Edge | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-292063 | SSA-292063: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.3 and 23.1.0 on RUGGEDCOM APE1808 devices | 2023-11-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-292022 | SSA-292022: Vulnerability in Nozomi Guardian/CMC before 23.4.1 on RUGGEDCOM APE1808 devices | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-273900 | SSA-273900: Multiple Vulnerabilities in SIMATIC CN 4100 before V3.0 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-258494 | SSA-258494: Stack Overflow Vulnerability in Simcenter Nastran before 2406.90 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-240541 | SSA-240541: WIBU Systems CodeMeter Heap Buffer Overflow Vulnerability in Industrial Products | 2023-09-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-225840 | SSA-225840: Vulnerabilities in the Network Communication Stack in Sinteso EN and Cerberus PRO EN Fire Protection Systems | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-046364 | SSA-046364: X_T File Parsing Vulnerabilities in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-999588 | SSA-999588: Multiple Vulnerabilities in User Management Component (UMC) Before V2.11.2 | 2023-12-12T00:00:00Z | 2025-01-14T00:00:00Z |
| SSA-976324 | SSA-976324: Multiple IGS File Parsing Vulnerabilities in PS/IGES Parasolid Translator Component before V27.1.215 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-968170 | SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products | 2023-06-13T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-962515 | SSA-962515: Out of Bounds Read Vulnerability in Industrial Products | 2024-05-14T00:00:00Z | 2024-12-10T00:00:00Z |
| SSA-953710 | SSA-953710: Vulnerabilities in the Network Communication Stack in Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-935500 | SSA-935500: Denial of Service Vulnerability in FTP Server of Nucleus RTOS based APOGEE, TALON and Desigo PXC/PXM Products | 2022-10-11T00:00:00Z | 2025-05-13T00:00:00Z |
| SSA-925850 | SSA-925850: Improper Access Control in Polarion ALM | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-871717 | SSA-871717: Multiple Vulnerabilities in Polarion ALM | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:3928 | Red Hat Security Advisory: ACS 4.5 enhancement and security update | 2025-04-15T19:46:07+00:00 | 2026-02-19T01:49:40+00:00 |
| rhsa-2025:3907 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.1.5 | 2025-04-16T21:35:18+00:00 | 2026-02-19T01:49:40+00:00 |
| rhsa-2025:3906 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.9.13 | 2025-04-16T10:29:32+00:00 | 2026-02-19T01:49:39+00:00 |
| rhsa-2025:3905 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.0.7 | 2025-04-16T14:51:29+00:00 | 2026-02-19T01:49:39+00:00 |
| rhsa-2025:3886 | Red Hat Security Advisory: RHOAI 2.19.0 - Red Hat OpenShift AI | 2025-04-15T07:52:02+00:00 | 2026-02-19T01:49:38+00:00 |
| rhsa-2025:3863 | Red Hat Security Advisory: Red Hat multicluster global hub 1.3.3 bug fixes and container update | 2025-04-14T18:00:47+00:00 | 2026-02-19T01:49:37+00:00 |
| rhsa-2025:3833 | Red Hat Security Advisory: gvisor-tap-vsock security update | 2025-04-14T09:21:59+00:00 | 2026-02-19T01:49:37+00:00 |
| rhsa-2025:3820 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T17:22:43+00:00 | 2026-02-19T01:49:36+00:00 |
| rhsa-2025:3814 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T15:20:44+00:00 | 2026-02-19T01:49:35+00:00 |
| rhsa-2025:3813 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T14:56:45+00:00 | 2026-02-19T01:49:35+00:00 |
| rhsa-2025:3811 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T14:32:08+00:00 | 2026-02-19T01:49:34+00:00 |
| rhsa-2025:3808 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T14:26:28+00:00 | 2026-02-19T01:49:33+00:00 |
| rhsa-2025:3798 | Red Hat Security Advisory: OpenShift Container Platform 4.17.25 bug fix and security update | 2025-04-16T17:46:00+00:00 | 2026-02-19T01:49:30+00:00 |
| rhsa-2025:3790 | Red Hat Security Advisory: OpenShift Container Platform 4.15.49 bug fix and security update | 2025-04-17T04:03:56+00:00 | 2026-02-19T01:49:29+00:00 |
| rhsa-2025:3775 | Red Hat Security Advisory: OpenShift Container Platform 4.18.9 bug fix and security update | 2025-04-16T06:12:24+00:00 | 2026-02-19T01:49:28+00:00 |
| rhsa-2025:3763 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.13.2 container image updates | 2025-04-09T16:37:37+00:00 | 2026-02-19T01:49:27+00:00 |
| rhsa-2025:3685 | Red Hat Security Advisory: Red Hat Edge Manager Version 0.5.1 (Technology Preview) security fixes | 2025-04-08T13:01:54+00:00 | 2026-02-19T01:49:27+00:00 |
| rhsa-2025:3743 | Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.5.1 release | 2025-04-09T09:53:12+00:00 | 2026-02-19T01:49:26+00:00 |
| rhsa-2025:3740 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.5.1 release | 2025-04-09T08:52:08+00:00 | 2026-02-19T01:49:25+00:00 |
| rhsa-2025:3720 | Red Hat Security Advisory: multicluster engine for Kubernetes 2.8.1 container image updates | 2025-04-08T23:25:49+00:00 | 2026-02-19T01:49:23+00:00 |
| rhsa-2025:3698 | Red Hat Security Advisory: opentelemetry-collector security update | 2025-04-08T15:23:59+00:00 | 2026-02-19T01:49:22+00:00 |
| rhsa-2025:3618 | Red Hat Security Advisory: grafana security update | 2025-04-07T02:07:30+00:00 | 2026-02-19T01:49:20+00:00 |
| rhsa-2025:3616 | Red Hat Security Advisory: grafana security update | 2025-04-07T01:59:15+00:00 | 2026-02-19T01:49:20+00:00 |
| rhsa-2025:3607 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.5.1 release | 2025-04-04T13:38:55+00:00 | 2026-02-19T01:49:18+00:00 |
| rhsa-2025:3569 | Red Hat Security Advisory: OpenShift Container Platform 4.14.50 bug fix and security update | 2025-04-09T20:55:32+00:00 | 2026-02-19T01:49:18+00:00 |
| rhsa-2025:3593 | Red Hat Security Advisory: opentelemetry-collector security update | 2025-04-03T13:38:52+00:00 | 2026-02-19T01:49:16+00:00 |
| rhsa-2025:3577 | Red Hat Security Advisory: OpenShift Container Platform 4.18.8 bug fix and security update | 2025-04-10T11:37:31+00:00 | 2026-02-19T01:49:16+00:00 |
| rhsa-2025:3565 | Red Hat Security Advisory: OpenShift Container Platform 4.17.24 bug fix and security update | 2025-04-09T04:47:09+00:00 | 2026-02-19T01:49:14+00:00 |
| rhsa-2025:3560 | Red Hat Security Advisory: RHODF-4.14-RHEL-9 security update | 2025-04-03T05:09:02+00:00 | 2026-02-19T01:49:13+00:00 |
| rhsa-2025:3542 | Red Hat Security Advisory: RHODF-4.15-RHEL-9 security update | 2025-04-02T19:51:02+00:00 | 2026-02-19T01:49:13+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-254-09 | Schneider Electric Modicon M340, BMXNOE0100, and BMXNOE0110 | 2024-06-11T00:00:00.000000Z | 2025-08-12T04:00:00.000000Z |
| icsa-25-240-03 | Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit | 2025-08-12T04:00:00.000000Z | 2025-08-12T04:00:00.000000Z |
| icsa-25-238-03 | Schneider Electric Modicon M340 Controller and Communication Modules | 2025-08-12T04:00:00.000000Z | 2025-08-12T04:00:00.000000Z |
| icsa-25-035-06 | Schneider Electric Modicon M340 and BMXNOE0100/0110, BMXNOR0200H | 2025-01-14T00:00:00.000000Z | 2025-08-12T04:00:00.000000Z |
| icsa-25-266-17 | Siemens SINEC Traffic Analyzer | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-21 | Siemens BFCClient | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-20 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-19 | Siemens SINUMERIK | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-17 | Siemens SINEC Traffic Analyzer | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-16 | Siemens SICAM Q100/Q200 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-15 | Siemens SINEC OS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-14 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-13 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-12 | Siemens SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-10 | Siemens SIPROTEC 5 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-08 | Siemens RUGGEDCOM CROSSBOW Station Access Controller | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-07 | Siemens Third-Party Components in SINEC OS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-06 | Siemens Opcenter Quality | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-04 | Siemens Simcenter Femap | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-02 | Siemens COMOS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-01 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-191-05 | Siemens TIA Project-Server and TIA Portal | 2025-07-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-135-07 | Siemens SIMATIC IPC RS-828A | 2025-05-13T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-044-05 | Siemens SIPROTEC 5 Devices | 2025-02-11T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-347-05 | Siemens Siemens Engineering Platforms | 2024-12-10T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-319-12 | Siemens Mendix Runtime | 2024-11-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-256-05 | Siemens Mendix Runtime | 2024-09-10T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-193-06 | Siemens RUGGEDCOM | 2024-07-09T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-074-08 | Siemens SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-23-348-10 | Siemens SIMATIC S7-1500 | 2023-12-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-rsvp-dos-oypvgvzf | Cisco IOS and IOS XE Software Resource Reservation Protocol Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-rsvp-dos-OypvgVZf | Cisco IOS and IOS XE Software Resource Reservation Protocol Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-repacl-9exgnbpd | Cisco IOS Software on Cisco Industrial Ethernet Series Switches Access Control List Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-repacl-9eXgnBpD | Cisco IOS Software on Cisco Industrial Ethernet Series Switches Access Control List Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-pim-apbvfysj | Cisco IOS XE Software Protocol Independent Multicast Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-pim-APbVfySJ | Cisco IOS XE Software Protocol Independent Multicast Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-xe-sda-edge-dos-mbcbg9k | Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-xe-sda-edge-dos-MBcbG9k | Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-webui-hfwnrgk | Cisco IOS and IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-webui-HfwnRgk | Cisco IOS and IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-httpsrvr-dos-yozthut | Cisco IOS XE Software HTTP Server Telephony Services Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-httpsrvr-dos-yOZThut | Cisco IOS XE Software HTTP Server Telephony Services Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-dnac-ssh-e4uodasj | Cisco Catalyst Center Static SSH Host Key Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-dnac-ssh-e4uOdASj | Cisco Catalyst Center Static SSH Host Key Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-cpp-vfr-dos-nhhkggo | Cisco IOS XE Software IPv4 Fragmentation Reassembly Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-cpp-vfr-dos-nhHKGgO | Cisco IOS XE Software IPv4 Fragmentation Reassembly Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-c9800-cwa-acl-npsbhsna | Cisco IOS XE Software for Wireless Controllers CWA Pre-Authentication ACL Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-c9800-cwa-acl-nPSbHSnA | Cisco IOS XE Software for Wireless Controllers CWA Pre-Authentication ACL Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-nso-auth-bypass-qnteesp | Multiple Cisco Products Web-Based Management Interface Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-25T13:05:54+00:00 |
| cisco-sa-nso-auth-bypass-QnTEesp | Multiple Cisco Products Web-Based Management Interface Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-25T13:05:54+00:00 |
| cisco-sa-cucm-xss-9zmfhyz | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-09-20T15:48:56+00:00 |
| cisco-sa-cucm-xss-9zmfHyZ | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-09-20T15:48:56+00:00 |
| cisco-sa-nxos-cmd-injection-xd9ohyop | Cisco NX-OS Software CLI Command Injection Vulnerability | 2024-07-01T16:00:00+00:00 | 2024-09-17T18:05:20+00:00 |
| cisco-sa-nxos-cmd-injection-xD9OhyOP | Cisco NX-OS Software CLI Command Injection Vulnerability | 2024-07-01T16:00:00+00:00 | 2024-09-17T18:05:20+00:00 |
| cisco-sa-openssh-rce-2024 | Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server (regreSSHion): July 2024 | 2024-07-02T16:00:00+00:00 | 2024-09-13T14:43:44+00:00 |
| cisco-sa-pak-mem-exhst-3ke9fefy | Cisco IOS XR Software UDP Packet Memory Exhaustion Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-pak-mem-exhst-3ke9FeFy | Cisco IOS XR Software UDP Packet Memory Exhaustion Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-l2services-2mvhdnuc | Cisco IOS XR Software Network Convergence System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-l2services-2mvHdNuC | Cisco IOS XR Software Network Convergence System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-isis-xehpbvne | Cisco IOS XR Software Segment Routing for Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38184 | tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer | 2025-07-02T00:00:00.000Z | 2026-02-18T02:54:42.000Z |
| msrc_cve-2023-39319 | Improper handling of special tags within script contexts in html/template | 2023-09-01T00:00:00.000Z | 2026-02-18T02:54:40.000Z |
| msrc_cve-2024-49991 | drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer | 2024-10-01T07:00:00.000Z | 2026-02-18T02:54:27.000Z |
| msrc_cve-2024-42228 | drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc | 2024-07-01T07:00:00.000Z | 2026-02-18T02:54:25.000Z |
| msrc_cve-2024-26885 | bpf: Fix DEVMAP_HASH overflow check on 32-bit arches | 2024-04-02T07:00:00.000Z | 2026-02-18T02:54:25.000Z |
| msrc_cve-2019-14199 | An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call. | 2019-07-02T00:00:00.000Z | 2026-02-18T02:54:24.000Z |
| msrc_cve-2025-23135 | RISC-V: KVM: Teardown riscv specific bits after kvm_exit | 2025-04-02T00:00:00.000Z | 2026-02-18T02:54:23.000Z |
| msrc_cve-2024-46733 | btrfs: fix qgroup reserve leaks in cow_file_range | 2024-09-01T07:00:00.000Z | 2026-02-18T02:54:17.000Z |
| msrc_cve-2025-68756 | block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock | 2026-01-02T00:00:00.000Z | 2026-02-18T02:54:14.000Z |
| msrc_cve-2025-38197 | platform/x86: dell_rbu: Fix list usage | 2025-07-02T00:00:00.000Z | 2026-02-18T02:54:12.000Z |
| msrc_cve-2025-21649 | net: hns3: fix kernel crash when 1588 is sent on HIP08 devices | 2025-01-02T00:00:00.000Z | 2026-02-18T02:54:09.000Z |
| msrc_cve-2024-26903 | Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security | 2024-04-02T07:00:00.000Z | 2026-02-18T02:53:53.000Z |
| msrc_cve-2024-57258 | Integer overflows in memory allocation in Das U-Boot before 2025.01-rc1 occur for a crafted squashfs filesystem via sbrk, via request2size, or because ptrdiff_t is mishandled on x86_64. | 2025-02-02T00:00:00.000Z | 2026-02-18T02:53:42.000Z |
| msrc_cve-2025-38227 | media: vidtv: Terminating the subsequent process of initialization failure | 2025-07-02T00:00:00.000Z | 2026-02-18T02:53:40.000Z |
| msrc_cve-2025-37956 | ksmbd: prevent rename with empty string | 2025-05-02T00:00:00.000Z | 2026-02-18T02:53:39.000Z |
| msrc_cve-2024-42077 | ocfs2: fix DIO failure due to insufficient transaction credits | 2024-07-01T07:00:00.000Z | 2026-02-18T02:53:37.000Z |
| msrc_cve-2025-68757 | drm/vgem-fence: Fix potential deadlock on release | 2026-01-02T00:00:00.000Z | 2026-02-18T02:53:29.000Z |
| msrc_cve-2024-49995 | tipc: guard against string buffer overrun | 2024-10-01T07:00:00.000Z | 2026-02-18T02:53:22.000Z |
| msrc_cve-2024-26898 | aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts | 2024-04-02T07:00:00.000Z | 2026-02-18T02:53:21.000Z |
| msrc_cve-2023-51781 | An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition. | 2023-12-01T08:00:00.000Z | 2026-02-18T02:53:08.000Z |
| msrc_cve-2025-38212 | ipc: fix to protect IPCS lookups using RCU | 2025-07-02T00:00:00.000Z | 2026-02-18T02:53:07.000Z |
| msrc_cve-2024-57926 | drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err | 2025-01-02T00:00:00.000Z | 2026-02-18T02:53:05.000Z |
| msrc_cve-2024-57259 | sqfs_search_dir in Das U-Boot before 2025.01-rc1 exhibits an off-by-one error and resultant heap memory corruption for squashfs directory listing because the path separator is not considered in a size calculation. | 2025-02-02T00:00:00.000Z | 2026-02-18T02:53:04.000Z |
| msrc_cve-2025-23140 | misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error | 2025-05-02T00:00:00.000Z | 2026-02-18T02:53:01.000Z |
| msrc_cve-2024-26901 | do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak | 2024-04-02T07:00:00.000Z | 2026-02-18T02:52:51.000Z |
| msrc_cve-2025-61099 | FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the opaque_info_detail function at ospf_opaque.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted LS Update packet. | 2025-10-02T00:00:00.000Z | 2026-02-18T02:52:47.000Z |
| msrc_cve-2024-42080 | RDMA/restrack: Fix potential invalid address access | 2024-07-01T07:00:00.000Z | 2026-02-18T02:52:47.000Z |
| msrc_cve-2025-38229 | media: cxusb: no longer judge rbuf when the write fails | 2025-07-02T00:00:00.000Z | 2026-02-18T02:52:36.000Z |
| msrc_cve-2023-51782 | An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition. | 2023-12-01T08:00:00.000Z | 2026-02-18T02:52:36.000Z |
| msrc_cve-2025-37773 | virtiofs: add filesystem context source name check | 2025-05-02T00:00:00.000Z | 2026-02-18T02:52:34.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025-20114-1 | Security update for himmelblau | 2025-11-27T20:16:29Z | 2025-11-27T20:16:29Z |
| opensuse-su-2025-20121-1 | Security update for redis | 2025-11-27T15:53:18Z | 2025-11-27T15:53:18Z |
| opensuse-su-2025:20106-1 | Security update for tomcat11 | 2025-11-27T15:43:26Z | 2025-11-27T15:43:26Z |
| opensuse-su-2025-20106-1 | Security update for tomcat11 | 2025-11-27T15:43:26Z | 2025-11-27T15:43:26Z |
| opensuse-su-2025:20116-1 | Security update for rnp | 2025-11-27T12:39:03Z | 2025-11-27T12:39:03Z |
| opensuse-su-2025-20116-1 | Security update for rnp | 2025-11-27T12:39:03Z | 2025-11-27T12:39:03Z |
| opensuse-su-2025:20118-1 | Security update for gitea-tea | 2025-11-27T12:30:27Z | 2025-11-27T12:30:27Z |
| opensuse-su-2025-20118-1 | Security update for gitea-tea | 2025-11-27T12:30:27Z | 2025-11-27T12:30:27Z |
| opensuse-su-2025:20119-1 | Security update for tcpreplay | 2025-11-27T12:29:40Z | 2025-11-27T12:29:40Z |
| opensuse-su-2025-20119-1 | Security update for tcpreplay | 2025-11-27T12:29:40Z | 2025-11-27T12:29:40Z |
| opensuse-su-2025:20115-1 | Security update for pnpm | 2025-11-27T12:28:46Z | 2025-11-27T12:28:46Z |
| opensuse-su-2025-20115-1 | Security update for pnpm | 2025-11-27T12:28:46Z | 2025-11-27T12:28:46Z |
| opensuse-su-2025:20117-1 | Security update for trivy | 2025-11-27T12:27:44Z | 2025-11-27T12:27:44Z |
| opensuse-su-2025-20117-1 | Security update for trivy | 2025-11-27T12:27:44Z | 2025-11-27T12:27:44Z |
| opensuse-su-2025:20100-1 | Security update for libvirt | 2025-11-27T10:23:20Z | 2025-11-27T10:23:20Z |
| opensuse-su-2025-20100-1 | Security update for libvirt | 2025-11-27T10:23:20Z | 2025-11-27T10:23:20Z |
| opensuse-su-2025:20099-1 | Security update for xwayland | 2025-11-27T10:11:16Z | 2025-11-27T10:11:16Z |
| opensuse-su-2025-20099-1 | Security update for xwayland | 2025-11-27T10:11:16Z | 2025-11-27T10:11:16Z |
| opensuse-su-2025:15778-1 | libwireshark19-4.6.1-2.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15777-1 | python311-spotipy-2.25.2-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15776-1 | python311-pypdf-6.4.0-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15775-1 | opa-1.11.0-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15774-1 | netbird-0.60.3-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15773-1 | cheat-4.4.2-3.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:20091-1 | Security update for the Linux Kernel | 2025-11-26T17:04:24Z | 2025-11-26T17:04:24Z |
| opensuse-su-2025-20091-1 | Security update for the Linux Kernel | 2025-11-26T17:04:24Z | 2025-11-26T17:04:24Z |
| opensuse-su-2025:20090-1 | Security update for curl | 2025-11-26T14:30:14Z | 2025-11-26T14:30:14Z |
| opensuse-su-2025-20090-1 | Security update for curl | 2025-11-26T14:30:14Z | 2025-11-26T14:30:14Z |
| opensuse-su-2025-20097-1 | Security update for helmfile | 2025-11-26T14:11:10Z | 2025-11-26T14:11:10Z |
| opensuse-su-2025:20089-1 | Security update for mysql-connector-java | 2025-11-26T08:12:25Z | 2025-11-26T08:12:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-408 | Heap-buffer-overflow in sav_parse_long_variable_names_record | 2025-05-27T00:12:59.401698Z | 2025-05-27T00:12:59.402180Z |
| osv-2025-406 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2025-05-27T00:01:44.628210Z | 2025-05-27T00:01:44.628747Z |
| osv-2024-655 | Stack-buffer-overflow in UnrollChunkyBytes | 2024-07-17T00:06:15.877340Z | 2025-05-23T07:44:18.608203Z |
| osv-2025-404 | Use-of-uninitialized-value in JS_FreeRuntime | 2025-05-23T00:14:00.218149Z | 2025-05-23T00:14:00.218494Z |
| osv-2025-401 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-23T00:07:37.622395Z | 2025-05-23T00:07:37.622817Z |
| osv-2025-396 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-22T00:16:08.210127Z | 2025-05-22T00:16:08.210510Z |
| osv-2025-384 | Segv on unknown address in rtpp_refcnt_decref | 2025-05-20T00:04:47.616424Z | 2025-05-20T00:04:47.617104Z |
| osv-2024-371 | UNKNOWN READ in jv_array_set | 2024-04-30T00:08:27.982063Z | 2025-05-18T14:24:27.459047Z |
| osv-2025-31 | Heap-buffer-overflow in Assimp::FBXExporter::WriteObjects | 2025-01-15T00:14:05.357161Z | 2025-05-17T14:21:13.704657Z |
| osv-2025-374 | Use-of-uninitialized-value in pcpp::SomeIpSdEntry::SomeIpSdEntry | 2025-05-17T00:16:26.661924Z | 2025-05-17T00:16:26.662355Z |
| osv-2025-371 | Index-out-of-bounds in tcp_analyze_sequence_number | 2025-05-16T00:16:16.300219Z | 2025-05-16T00:16:16.300689Z |
| osv-2022-360 | Invalid-free in igl::MshLoader::~MshLoader | 2022-04-20T00:01:28.065887Z | 2025-05-15T14:37:25.846667Z |
| osv-2020-1807 | UNKNOWN READ in __libcpp_memchr | 2020-09-18T00:00:38.027965Z | 2025-05-15T14:34:05.077689Z |
| osv-2025-369 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-15T00:19:04.752117Z | 2025-05-15T00:19:04.752522Z |
| osv-2025-368 | Heap-buffer-overflow in __parse_options | 2025-05-15T00:03:04.543640Z | 2025-05-15T00:03:04.544159Z |
| osv-2024-341 | UNKNOWN READ in PointerVector.h | 2024-04-30T00:02:07.034555Z | 2025-05-14T14:20:00.536472Z |
| osv-2024-382 | UNKNOWN READ in pcpp::Packet::destructPacketData | 2024-04-30T00:12:20.588223Z | 2025-05-14T14:16:53.222952Z |
| osv-2023-1259 | Use-of-uninitialized-value in std::__1::__stdoutbuf<char>::xsputn | 2023-12-06T04:45:58.561174Z | 2025-05-14T14:15:48.653022Z |
| osv-2023-1147 | Heap-buffer-overflow in parse_by_block_type | 2023-11-13T13:00:50.800524Z | 2025-05-14T14:15:31.789989Z |
| osv-2020-2285 | Bad-cast to pcpp::Layer from invalid vptr | 2020-12-25T00:01:03.941509Z | 2025-05-14T14:08:11.306127Z |
| osv-2025-363 | Heap-buffer-overflow in jv_string_vfmt | 2025-05-14T00:03:23.388719Z | 2025-05-14T00:03:23.389224Z |
| osv-2024-1186 | UNKNOWN READ in cfl_sds_len | 2024-10-08T00:15:47.433219Z | 2025-05-13T14:48:36.393777Z |
| osv-2025-354 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement | 2025-05-11T00:17:30.348393Z | 2025-05-11T00:17:30.348809Z |
| osv-2025-352 | Use-of-uninitialized-value in JS_FreeRuntime | 2025-05-10T00:17:01.243609Z | 2025-05-10T00:17:01.243981Z |
| osv-2025-346 | Heap-buffer-overflow in JS_CallInternal | 2025-05-09T00:16:48.213077Z | 2025-05-09T00:16:48.213425Z |
| osv-2025-326 | Heap-use-after-free in __JS_FreeValueRT | 2025-05-05T00:17:02.285374Z | 2025-05-05T00:17:02.285666Z |
| osv-2025-324 | Index-out-of-bounds in dwg_decode_eed | 2025-05-05T00:11:42.580777Z | 2025-05-05T00:11:42.581345Z |
| osv-2025-323 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-04T00:19:17.568436Z | 2025-05-04T00:19:17.568755Z |
| osv-2025-321 | Use-of-uninitialized-value in JS_DefineProperty | 2025-05-04T00:16:03.249115Z | 2025-05-04T00:16:03.249427Z |
| osv-2024-1375 | Index-out-of-bounds in dwg_decode_eed | 2024-12-15T00:01:20.442440Z | 2025-05-03T14:23:13.369570Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2023-0059 | Unaligned read of `*const *const c_char` pointer | 2023-09-10T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0058 | Exposes reference to non-Sync data to an arbitrary thread | 2023-09-10T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0057 | Fails to prohibit standard library access prior to initialization of Rust standard library runtime | 2023-09-10T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2020-0079 | `socket2` invalidly assumes the memory layout of std::net::SocketAddr | 2020-11-06T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2020-0036 | failure is officially deprecated/unmaintained | 2020-05-02T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2018-0020 | Possible use-after-free with `proplist::Iterator` | 2018-12-22T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2024-0009 | Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') | 2024-01-23T12:00:00Z | 2024-01-24T17:00:49Z |
| rustsec-2024-0008 | Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') | 2024-01-23T12:00:00Z | 2024-01-24T17:00:49Z |
| rustsec-2024-0004 | `cosmwasm` is unmaintained | 2024-01-20T12:00:00Z | 2024-01-21T14:51:38Z |
| rustsec-2024-0002 | `serde` deserialization for `FamStructWrapper` lacks bound checks that could potentially lead to out-of-bounds memory access | 2024-01-02T12:00:00Z | 2024-01-14T03:39:46Z |
| rustsec-2023-0076 | `cpython` is unmaintained | 2023-11-14T12:00:00Z | 2023-12-20T22:34:55Z |
| rustsec-2023-0071 | Marvin Attack: potential key recovery through timing sidechannels | 2023-11-22T12:00:00Z | 2023-12-15T14:57:06Z |
| rustsec-2023-0073 | Infinite decoding loop through specially crafted payload | 2023-12-08T12:00:00Z | 2023-12-09T10:05:32Z |
| rustsec-2023-0029 | TLS certificate common name validation bypass | 2023-03-24T12:00:00Z | 2023-11-08T09:57:41Z |
| rustsec-2023-0069 | sudo-rs: Path Traversal vulnerability | 2023-11-01T12:00:00Z | 2023-11-06T12:48:19Z |
| rustsec-2019-0030 | Incorrect implementation of the Streebog hash functions | 2019-10-06T12:00:00Z | 2023-11-02T13:03:48Z |
| rustsec-2022-0040 | Multiple soundness issues in `owning_ref` | 2022-01-26T12:00:00Z | 2023-10-14T21:21:18Z |
| rustsec-2023-0067 | `fehler` is unmaintained; use `culpa` instead | 2023-10-12T12:00:00Z | 2023-10-14T15:01:02Z |
| rustsec-2023-0052 | webpki: CPU denial of service in certificate path building | 2023-08-22T12:00:00Z | 2023-09-30T20:13:23Z |
| rustsec-2023-0065 | Tungstenite allows remote attackers to cause a denial of service | 2023-09-25T12:00:00Z | 2023-09-29T12:03:03Z |
| rustsec-2021-0139 | ansi_term is Unmaintained | 2021-08-18T12:00:00Z | 2023-09-06T22:52:31Z |
| rustsec-2023-0056 | Default functions in VolatileMemory trait lack bounds checks, potentially leading to out-of-bounds memory accesses | 2023-09-01T12:00:00Z | 2023-09-06T17:18:09Z |
| rustsec-2023-0054 | Use-after-free in `vec_insert_bytes` | 2023-08-07T12:00:00Z | 2023-08-27T15:52:52Z |
| rustsec-2023-0053 | rustls-webpki: CPU denial of service in certificate path building | 2023-08-22T12:00:00Z | 2023-08-27T15:52:52Z |
| rustsec-2022-0081 | json is unmaintained | 2022-02-01T12:00:00Z | 2023-08-25T17:52:15Z |
| rustsec-2023-0040 | `users` crate is unmaintained | 2023-06-01T12:00:00Z | 2023-08-21T10:35:45Z |
| rustsec-2023-0051 | `dlopen_derive` is unmaintained | 2023-07-30T12:00:00Z | 2023-08-19T10:29:52Z |
| rustsec-2023-0050 | multipart is Unmaintained | 2023-04-11T12:00:00Z | 2023-08-18T20:38:40Z |
| rustsec-2023-0049 | `tui` is unmaintained; use `ratatui` instead | 2023-08-07T12:00:00Z | 2023-08-07T13:27:47Z |
| rustsec-2023-0048 | Unsoundness in `intern` methods on `intaglio` symbol interners | 2023-07-26T12:00:00Z | 2023-07-29T17:20:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-activemq-2021-21345 | XStream is vulnerable to a Remote Command Execution attack | 2025-12-03T14:35:24.382Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21344 | XStream is vulnerable to an Arbitrary Code Execution attack | 2025-12-03T14:35:22.678Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21343 | XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights | 2025-12-03T14:35:21.073Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21342 | A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host | 2025-12-03T14:35:19.481Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2021-21341 | XStream can cause a Denial of Service | 2025-12-03T14:35:17.881Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2020-26217 | Remote Code Execution in XStream | 2025-12-03T14:35:16.352Z | 2025-12-03T15:08:24.036Z |
| bit-activemq-2020-1941 | 2025-12-03T14:35:14.779Z | 2025-12-03T15:08:24.036Z | |
| bit-activemq-2020-13947 | 2025-12-03T14:35:13.393Z | 2025-12-03T15:08:24.036Z | |
| bit-activemq-2020-13920 | 2025-12-03T14:35:12.171Z | 2025-12-03T15:08:24.036Z | |
| bit-activemq-2020-11998 | 2025-12-03T14:35:10.504Z | 2025-12-03T15:08:24.036Z | |
| bit-gitlab-2025-9825 | Missing Authorization in GitLab | 2025-11-25T18:25:02.547Z | 2025-12-03T12:08:06.927Z |
| bit-flux-2022-39272 | Flux2 vulnerable to Denial of Service due to Improper use of metav1.Duration | 2025-12-02T17:37:01.043Z | 2025-12-02T18:06:28.296Z |
| bit-flux-2022-36049 | Flux2 Helm Controller denial of service | 2025-12-02T17:36:59.799Z | 2025-12-02T18:06:28.296Z |
| bit-flux-2022-36035 | Flux CLI Workload Injection | 2025-12-02T17:36:58.339Z | 2025-12-02T18:06:28.296Z |
| bit-flux-2022-24878 | Improper path handling in Kustomization files allows for denial of service | 2025-12-02T17:36:56.954Z | 2025-12-02T18:06:28.296Z |
| bit-flux-2022-24877 | Improper path handling in kustomization files allows path traversal | 2025-12-02T17:36:55.459Z | 2025-12-02T18:06:28.296Z |
| bit-flux-2022-24817 | Improper kubeconfig validation allows arbitrary code execution | 2025-12-02T17:36:53.808Z | 2025-12-02T18:06:28.296Z |
| bit-pytorch-2025-32434 | PyTorch: `torch.load` with `weights_only=True` leads to remote code execution | 2025-04-22T07:19:45.992Z | 2025-12-01T21:08:19.180Z |
| bit-gitlab-2024-10925 | Authorization Bypass Through User-Controlled Key in GitLab | 2025-03-05T07:30:40.739Z | 2025-11-25T18:26:29.568Z |
| bit-drupal-2025-13082 | Drupal core - Moderately critical - Defacement - SA-CORE-2025-007 | 2025-11-25T17:56:45.040Z | 2025-11-25T18:26:29.568Z |
| bit-drupal-2025-13081 | Drupal core - Moderately critical - Gadget chain - SA-CORE-2025-006 | 2025-11-25T17:56:43.353Z | 2025-11-25T18:26:29.568Z |
| bit-drupal-2025-13080 | Drupal core - Moderately critical - Denial of Service - SA-CORE-2025-005 | 2025-11-25T17:56:41.671Z | 2025-11-25T18:26:29.568Z |
| bit-postgresql-2025-12818 | PostgreSQL libpq undersizes allocations, via integer wraparound | 2025-11-21T08:47:38.070Z | 2025-11-21T09:06:15.683Z |
| bit-postgresql-2025-12817 | PostgreSQL CREATE STATISTICS does not check for schema CREATE privilege | 2025-11-21T08:47:36.690Z | 2025-11-21T09:06:15.683Z |
| bit-golang-2025-58187 | Quadratic complexity when checking name constraints in crypto/x509 | 2025-11-06T12:58:22.304Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-7736 | Incorrect Authorization in GitLab | 2025-11-20T09:05:14.844Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-7000 | Insertion of Sensitive Information Into Sent Data in GitLab | 2025-11-21T09:04:35.128Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-6945 | Improper Neutralization of Special Elements used in a Command ('Command Injection') in GitLab | 2025-11-21T09:04:31.573Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-6171 | Missing Authorization in GitLab | 2025-11-21T09:04:22.209Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-2615 | Insertion of Sensitive Information Into Sent Data in GitLab | 2025-11-20T09:04:09.576Z | 2025-11-21T09:06:15.683Z |
| ID | Description | Updated |
|---|---|---|
| var-200512-0299 | Heap-based buffer overflow in rsync in Mac OS X 10.4 through 10.4.5 allows remote authent… | 2024-07-23T21:40:52.289000Z |
| var-202212-2277 | An integer underflow in Organization Specific TLV was found in various versions of OpenvS… | 2024-07-23T21:40:51.741000Z |
| var-200912-0756 | The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Wind… | 2024-07-23T21:40:51.958000Z |
| var-201210-0456 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:40:50.864000Z |
| var-200712-0433 | Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) f… | 2024-07-23T21:40:50.122000Z |
| var-201904-1460 | A cross-site scripting issue existed in Safari. This issue was addressed with improved UR… | 2024-07-23T21:40:45.159000Z |
| var-201806-1466 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:40:45.074000Z |
| var-201501-0436 | The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1… | 2024-07-23T21:40:45.003000Z |
| var-200704-0226 | Apple File Protocol (AFP) Client in Apple Mac OS X 10.3.9 through 10.4.9 does not properl… | 2024-07-23T21:40:44.831000Z |
| var-201605-0465 | The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple … | 2024-07-23T21:40:43.806000Z |
| var-202010-1510 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T21:40:40.672000Z |
| var-201103-0114 | The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x be… | 2024-07-23T21:40:40.823000Z |
| var-201302-0262 | Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.… | 2024-07-23T21:40:39.972000Z |
| var-201109-0201 | Use-after-free vulnerability in the document loader in Google Chrome before 14.0.835.163 … | 2024-07-23T21:40:39.355000Z |
| var-200505-1240 | The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a d… | 2024-07-23T21:40:35.490000Z |
| var-201912-1857 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:39:57.528000Z |
| var-202104-0752 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2024-07-23T21:39:56.465000Z |
| var-200902-0880 | International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in A… | 2024-07-23T21:39:24.164000Z |
| var-201908-1958 | The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently l… | 2024-07-23T21:39:23.746000Z |
| var-200102-0052 | Cisco Catalyst 6000, 5000, or 4000 switches allow remote attackers to cause a denial of s… | 2024-07-23T21:39:23.577000Z |
| var-201708-0038 | The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 al… | 2024-07-23T21:39:15.769000Z |
| var-200901-0706 | WebKit in Apple Safari before 4.0 does not prevent remote loading of local Java applets, … | 2024-07-23T21:39:10.742000Z |
| var-202112-1608 | A carefully crafted request body can cause a buffer overflow in the mod_lua multipart par… | 2024-07-23T21:38:29.659000Z |
| var-202301-1703 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2024-07-23T21:38:27.556000Z |
| var-202103-0287 | A flaw possibility of race condition and incorrect initialization of the process id was f… | 2024-07-23T21:38:27.231000Z |
| var-201011-0174 | ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute … | 2024-07-23T21:37:24.567000Z |
| var-202106-0343 | Improper isolation of shared resources in some Intel(R) Processors may allow an authentic… | 2024-07-23T21:37:23.721000Z |
| var-201506-0268 | The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before… | 2024-07-23T21:36:44.513000Z |
| var-201904-0744 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:36:28.176000Z |
| var-201606-0329 | Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/us… | 2024-07-23T21:36:28.630000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-000024 | Zero-channel BBS Plus vulnerable to cross-site scripting | 2022-03-30T15:36+09:00 | 2024-06-20T17:34+09:00 |
| jvndb-2022-000019 | pfSense-pkg-WireGuard vulnerable to directory traversal | 2022-03-03T15:08+09:00 | 2024-06-20T16:51+09:00 |
| jvndb-2022-000018 | MarkText vulnerable to cross-site scripting | 2022-03-03T14:40+09:00 | 2024-06-20T16:46+09:00 |
| jvndb-2022-000046 | Gitlab vulnerable to server-side request forgery | 2022-06-17T12:26+09:00 | 2024-06-20T15:39+09:00 |
| jvndb-2024-003645 | Multiple vulnerabilities in multiple Trend Micro products | 2024-06-20T14:59+09:00 | 2024-06-20T14:59+09:00 |
| jvndb-2022-000027 | Hammock AssetView missing authentication for critical functions | 2022-04-22T13:53+09:00 | 2024-06-20T12:15+09:00 |
| jvndb-2022-000037 | Spring Security OAuth (spring-security-oauth2) vulnerable to denial-of-service (DoS) | 2022-05-20T17:04+09:00 | 2024-06-20T12:09+09:00 |
| jvndb-2022-001923 | Multiple vulnerabilities in CONTEC SolarView Compact | 2022-05-27T15:28+09:00 | 2024-06-20T11:34+09:00 |
| jvndb-2022-001795 | Command injection vulnerability in QNAP VioStar series NVR | 2022-05-12T18:07+09:00 | 2024-06-20T11:31+09:00 |
| jvndb-2024-000065 | "ZOZOTOWN" App for Android fails to restrict custom URL schemes properly | 2024-06-19T16:04+09:00 | 2024-06-19T16:04+09:00 |
| jvndb-2022-000029 | KOYO Electronics Screen Creator Advance2 vulnerable to authentication bypass | 2022-05-09T14:43+09:00 | 2024-06-19T16:03+09:00 |
| jvndb-2022-000028 | Multiple vulnerabilities in multiple MEIKYO ELECTRIC products | 2022-05-09T14:31+09:00 | 2024-06-19T15:55+09:00 |
| jvndb-2024-000064 | WordPress plugin "SiteGuard WP Plugin" may leak the customized path to the login page | 2024-06-19T14:25+09:00 | 2024-06-19T14:25+09:00 |
| jvndb-2022-001809 | Trend Micro Password Manager vulnerable to privilege escalation | 2022-05-24T15:27+09:00 | 2024-06-18T17:52+09:00 |
| jvndb-2022-000032 | Installer of Trend Micro Password Manager may insecurely load Dynamic Link Libraries | 2022-05-11T15:21+09:00 | 2024-06-18T17:46+09:00 |
| jvndb-2022-000039 | RevoWorks incomplete filtering of MS Office v4 macros | 2022-05-27T16:09+09:00 | 2024-06-18T16:31+09:00 |
| jvndb-2022-001948 | Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service | 2022-06-03T12:17+09:00 | 2024-06-18T16:30+09:00 |
| jvndb-2022-001931 | Multiple vulnerabilities in Fuji Electric V-SFT, V-Server and V-Server Lite | 2022-05-27T15:37+09:00 | 2024-06-18T16:28+09:00 |
| jvndb-2022-000038 | WordPress plugin "WP Statistics" vulnerable to cross-site scripting | 2022-05-24T15:00+09:00 | 2024-06-18T15:41+09:00 |
| jvndb-2022-000031 | GENEREX RCCMD vulnerable to directory traversal | 2022-05-10T15:47+09:00 | 2024-06-18T15:35+09:00 |
| jvndb-2024-000061 | Multiple vulnerabilities in Ricoh Streamline NX PC Client | 2024-06-18T14:56+09:00 | 2024-06-18T14:56+09:00 |
| jvndb-2022-001929 | Multiple vulnerabilities in Fuji Electric V-SFT | 2022-05-27T15:39+09:00 | 2024-06-18T13:44+09:00 |
| jvndb-2024-000063 | Multiple vulnerabilities in ID Link Manager and FUJITSU Software TIME CREATOR | 2024-06-18T13:43+09:00 | 2024-06-18T13:43+09:00 |
| jvndb-2022-000034 | EC-CUBE plugin "Easy Blog for EC-CUBE4" vulnerable to cross-site request forgery | 2022-05-13T16:31+09:00 | 2024-06-18T12:13+09:00 |
| jvndb-2022-000036 | Multiple vulnerabilities in Rakuten Casa | 2022-05-19T15:13+09:00 | 2024-06-18T12:09+09:00 |
| jvndb-2022-000053 | Django Extract and Trunc functions vulnerable to SQL injection | 2022-07-12T13:47+09:00 | 2024-06-18T11:57+09:00 |
| jvndb-2022-000057 | WordPress Plugin "Newsletter" vulnerable to cross-site scripting | 2022-07-25T14:30+09:00 | 2024-06-18T11:21+09:00 |
| jvndb-2022-000033 | Strapi vulnerable to cross-site scripting | 2022-05-13T16:45+09:00 | 2024-06-18T11:17+09:00 |
| jvndb-2022-000043 | SHIRASAGI vulnerable to cross-site scripting | 2022-06-09T13:31+09:00 | 2024-06-18T11:13+09:00 |
| jvndb-2022-000040 | Mobaoku-Auction & Flea Market App for iOS vulnerable to improper server certificate verification | 2022-05-27T15:48+09:00 | 2024-06-18T11:06+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0042-1 | Security update for usbmuxd | 2026-01-06T10:34:56Z | 2026-01-06T10:34:56Z |
| suse-su-2026:0041-1 | Security update for rsync | 2026-01-06T10:33:33Z | 2026-01-06T10:33:33Z |
| suse-su-2026:0039-1 | Security update for qemu | 2026-01-06T10:31:23Z | 2026-01-06T10:31:23Z |
| suse-su-2026:0036-1 | Security update for libpcap | 2026-01-06T10:22:41Z | 2026-01-06T10:22:41Z |
| suse-su-2026:0034-1 | Security update for the Linux Kernel | 2026-01-05T19:29:28Z | 2026-01-05T19:29:28Z |
| suse-su-2026:0033-1 | Security update for the Linux Kernel | 2026-01-05T19:26:53Z | 2026-01-05T19:26:53Z |
| suse-su-2026:0032-1 | Security update for the Linux Kernel | 2026-01-05T19:24:53Z | 2026-01-05T19:24:53Z |
| suse-su-2026:0029-1 | Security update for the Linux Kernel | 2026-01-05T12:59:48Z | 2026-01-05T12:59:48Z |
| suse-su-2026:0028-1 | Security update for alloy | 2026-01-05T12:53:11Z | 2026-01-05T12:53:11Z |
| suse-su-2026:0027-1 | Security update for python3 | 2026-01-05T12:47:16Z | 2026-01-05T12:47:16Z |
| suse-su-2026:0025-1 | Security update for python312 | 2026-01-05T12:11:09Z | 2026-01-05T12:11:09Z |
| suse-su-2026:0024-1 | Security update for python313 | 2026-01-05T12:10:23Z | 2026-01-05T12:10:23Z |
| suse-su-2026:0023-1 | Security update for erlang26 | 2026-01-05T12:06:04Z | 2026-01-05T12:06:04Z |
| suse-su-2026:0022-1 | Security update for qemu | 2026-01-05T11:18:23Z | 2026-01-05T11:18:23Z |
| suse-su-2026:0021-1 | Security update for webkit2gtk3 | 2026-01-05T11:12:33Z | 2026-01-05T11:12:33Z |
| suse-su-2026:0020-1 | Security update for apache2 | 2026-01-05T11:08:42Z | 2026-01-05T11:08:42Z |
| suse-su-2026:0019-1 | Security update for apache2 | 2026-01-05T11:08:00Z | 2026-01-05T11:08:00Z |
| suse-su-2026:0018-1 | Security update for glib2 | 2026-01-05T10:52:26Z | 2026-01-05T10:52:26Z |
| suse-su-2026:0017-1 | Security update for libsoup | 2026-01-05T10:52:01Z | 2026-01-05T10:52:01Z |
| suse-su-2026:0016-1 | Security update for pgadmin4 | 2026-01-05T10:48:08Z | 2026-01-05T10:48:08Z |
| suse-su-2026:0015-1 | Security update for pgadmin4 | 2026-01-05T10:40:59Z | 2026-01-05T10:40:59Z |
| suse-su-2026:0014-1 | Security update for buildah | 2026-01-05T10:39:01Z | 2026-01-05T10:39:01Z |
| suse-su-2026:0013-1 | Security update for ImageMagick | 2026-01-05T10:36:11Z | 2026-01-05T10:36:11Z |
| suse-su-2026:0012-1 | Security update for xen | 2026-01-05T10:31:27Z | 2026-01-05T10:31:27Z |
| suse-su-2026:0011-1 | Security update for ImageMagick | 2026-01-05T10:28:55Z | 2026-01-05T10:28:55Z |
| suse-su-2026:0010-1 | Security update for python-tornado6 | 2026-01-05T10:26:32Z | 2026-01-05T10:26:32Z |
| suse-su-2026:20019-1 | Security update for sssd | 2026-01-02T16:58:52Z | 2026-01-02T16:58:52Z |
| suse-su-2026:20014-1 | Security update for sssd | 2026-01-02T16:58:52Z | 2026-01-02T16:58:52Z |
| suse-su-2026:0005-1 | Security update for rsync | 2026-01-02T12:30:51Z | 2026-01-02T12:30:51Z |
| suse-su-2026:20058-1 | Security update for rsync | 2026-01-02T11:13:05Z | 2026-01-02T11:13:05Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-06986 | WordPress Short Link plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06985 | WordPress Shipping Rate By Cities plugin SQL注入漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06984 | WordPress SearchWiz plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06913 | WordPress Responsive Accordion Slider plugin未经授权的数据修改漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06912 | WordPress LinkedIn SC plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06911 | WordPress Kunze Law plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06910 | WordPress Internal Link Builder plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06909 | WordPress Gotham Block Extra Light plugin路径遍历漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06908 | WordPress Gotham Block Extra Light plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06907 | WordPress GetContentFromURL plugin服务端请求伪造漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06906 | WordPress Float Payment Gateway plugin未经授权的数据修改漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06905 | WordPress Flat Shipping Rate by City for WooCommerce plugin SQL注入漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06904 | WordPress Electric Studio Download Counter plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06903 | WordPress Aplazo Payment Gateway plugin缺少权限漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06902 | WordPress AJS Footnotes plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06831 | D-Link DIR-823G操作系统命令注入漏洞 | 2022-04-01 | 2026-01-23 |
| cnvd-2026-06830 | D-Link DIR-823G密码重置漏洞 | 2023-06-30 | 2026-01-23 |
| cnvd-2026-06829 | D-Link DIR-823G URL字段缓冲区溢出漏洞 | 2023-07-03 | 2026-01-23 |
| cnvd-2026-06828 | D-Link DIR-823G HostName字段缓冲区溢出漏洞 | 2023-07-03 | 2026-01-23 |
| cnvd-2026-06827 | D-Link DIR-823G堆栈缓冲区溢出漏洞 | 2023-09-25 | 2026-01-23 |
| cnvd-2026-06826 | D-Link DIR-823G SetWifiDownSettings函数栈缓冲区溢出漏洞 | 2023-09-25 | 2026-01-23 |
| cnvd-2026-06825 | D-Link DIR-823G空指针取消引用漏洞 | 2024-05-07 | 2026-01-23 |
| cnvd-2026-06824 | D-Link DIR-823G信息泄露漏洞 | 2024-09-11 | 2026-01-23 |
| cnvd-2026-06823 | D-Link DIR-823G命令注入漏洞 | 2025-11-18 | 2026-01-23 |
| cnvd-2026-06813 | D-Link DWR-M920 sub_41C7FC函数缓冲区溢出漏洞 | 2025-11-24 | 2026-01-23 |
| cnvd-2026-06812 | D-Link DWR-M920 sub_423848函数缓冲区溢出漏洞 | 2026-01-14 | 2026-01-23 |
| cnvd-2026-06811 | D-Link DWR-M920 sub_464794函数缓冲区溢出漏洞 | 2026-01-14 | 2026-01-23 |
| cnvd-2026-06810 | D-Link DWR-M920命令注入漏洞 | 2026-01-14 | 2026-01-23 |
| cnvd-2026-06809 | D-Link DWR-M920 sub_42261C函数堆栈缓冲区溢出漏洞 | 2026-01-14 | 2026-01-23 |
| cnvd-2026-06604 | 上海锐昉科技有限公司RB企业管理系统存在SQL注入漏洞 | 2025-11-25 | 2026-01-23 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0003 | Multiples vulnérabilités dans les produits Qnap | 2026-01-05T00:00:00.000000 | 2026-01-05T00:00:00.000000 |
| certfr-2025-avi-1111 | Multiples vulnérabilités dans Roundcube | 2025-12-15T00:00:00.000000 | 2026-01-05T00:00:00.000000 |
| CERTFR-2026-AVI-0004 | Vulnérabilité dans MariaDB | 2026-01-05T00:00:00.000000 | 2026-01-05T00:00:00.000000 |
| CERTFR-2026-AVI-0003 | Multiples vulnérabilités dans les produits Qnap | 2026-01-05T00:00:00.000000 | 2026-01-05T00:00:00.000000 |
| CERTFR-2025-AVI-1111 | Multiples vulnérabilités dans Roundcube | 2025-12-15T00:00:00.000000 | 2026-01-05T00:00:00.000000 |
| certfr-2026-avi-0002 | Multiples vulnérabilités dans les produits IBM | 2026-01-02T00:00:00.000000 | 2026-01-02T00:00:00.000000 |
| certfr-2026-avi-0001 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-02T00:00:00.000000 | 2026-01-02T00:00:00.000000 |
| CERTFR-2026-AVI-0002 | Multiples vulnérabilités dans les produits IBM | 2026-01-02T00:00:00.000000 | 2026-01-02T00:00:00.000000 |
| CERTFR-2026-AVI-0001 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-02T00:00:00.000000 | 2026-01-02T00:00:00.000000 |
| certfr-2025-avi-1142 | Multiples vulnérabilités dans Moxa NPort | 2025-12-31T00:00:00.000000 | 2025-12-31T00:00:00.000000 |
| CERTFR-2025-AVI-1142 | Multiples vulnérabilités dans Moxa NPort | 2025-12-31T00:00:00.000000 | 2025-12-31T00:00:00.000000 |
| certfr-2025-avi-1141 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1140 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1139 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1138 | Multiples vulnérabilités dans VMware Tanzu Platform | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1137 | Multiples vulnérabilités dans les produits IBM | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1141 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1140 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1139 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1138 | Multiples vulnérabilités dans VMware Tanzu Platform | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1137 | Multiples vulnérabilités dans les produits IBM | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1076 | Multiples vulnérabilités dans MISP | 2025-12-08T00:00:00.000000 | 2025-12-24T00:00:00.000000 |
| CERTFR-2025-AVI-1076 | Multiples vulnérabilités dans MISP | 2025-12-08T00:00:00.000000 | 2025-12-24T00:00:00.000000 |
| certfr-2025-avi-1126 | Multiples vulnérabilités dans PHP | 2025-12-19T00:00:00.000000 | 2025-12-22T00:00:00.000000 |
| CERTFR-2025-AVI-1126 | Multiples vulnérabilités dans PHP | 2025-12-19T00:00:00.000000 | 2025-12-22T00:00:00.000000 |
| certfr-2025-avi-1136 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1135 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1134 | Multiples vulnérabilités dans MongoDB Server | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1133 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1132 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2015-ALE-001 | Vulnérabilité dans Adobe Flash Player | 2015-01-22T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-011 | Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows | 2014-11-18T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| CERTFR-2014-ALE-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| certfr-2014-ale-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| CERTFR-2014-ALE-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| certfr-2014-ale-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| CERTFR-2014-ALE-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| certfr-2014-ale-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| CERTFR-2014-ALE-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| certfr-2014-ale-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| CERTFR-2014-ALE-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| certfr-2014-ale-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| CERTFR-2014-ALE-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| certfr-2014-ale-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| CERTFR-2014-ALE-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| certfr-2014-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| CERTFR-2014-ALE-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| certa-2013-ale-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| CERTA-2013-ALE-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| certa-2013-ale-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| CERTA-2013-ALE-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| certa-2013-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| CERTA-2013-ALE-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| certa-2005-ale-013 | Vulnérabilité dans Citrix Metaframe Presentation | 2005-10-07T00:00:00.000000 | 2013-06-06T00:00:00.000000 |
| CERTA-2005-ALE-013 | Vulnérabilité dans Citrix Metaframe Presentation | 2005-10-07T00:00:00.000000 | 2013-06-06T00:00:00.000000 |
| certa-2013-ale-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |
| CERTA-2013-ALE-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |