Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2733 |
3.8 (3.1)
|
Org.keycloak/keycloak-services: keycloak: missing chec… |
Red Hat |
Red Hat Build of Keycloak |
2026-02-19T07:48:08.910Z | 2026-02-19T21:31:19.914Z |
| CVE-2026-2711 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
zhutoutoutousan worldquant-miner URL ssrf_proxy.py ser… |
zhutoutoutousan |
worldquant-miner |
2026-02-19T07:02:07.848Z | 2026-02-19T21:31:56.333Z |
| CVE-2026-2681 |
5.3 (3.1)
|
Github.com/supranational/blst: blst cryptographic libr… |
|
|
2026-02-19T06:58:47.090Z | 2026-02-19T21:32:34.940Z |
| CVE-2026-1994 |
9.8 (3.1)
|
s2Member <= 260127 - Unauthenticated Privilege Escalat… |
clavaque |
s2Member – Excellent for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions |
2026-02-19T06:49:43.503Z | 2026-02-19T21:20:40.661Z |
| CVE-2026-2731 |
10 (4.0)
|
Unauthenticated RCE in Dynamicweb 9 and Dynamicweb 8 |
DynamicWeb |
DynamicWeb 9 |
2026-02-19T06:46:52.763Z | 2026-02-19T21:21:36.185Z |
| CVE-2026-2709 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
busy Callback app.js redirect |
n/a |
busy |
2026-02-19T06:32:06.498Z | 2026-02-19T06:32:06.498Z |
| CVE-2026-2706 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Patient Record Management System fecalys… |
code-projects |
Patient Record Management System |
2026-02-19T06:02:06.881Z | 2026-02-19T06:02:06.881Z |
| CVE-2026-2705 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open Babel MOL2 File atom.h SetFormalCharge out-of-bounds |
n/a |
Open Babel |
2026-02-19T05:02:07.101Z | 2026-02-19T05:02:07.101Z |
| CVE-2026-1055 |
4.4 (3.1)
|
TalkJS <= 0.1.15 - Authenticated (Administrator+) Stor… |
talkjs |
TalkJS |
2026-02-19T04:36:28.335Z | 2026-02-19T04:36:28.335Z |
| CVE-2026-0722 |
6.5 (3.1)
|
Shield Security <= 21.0.8 - Cross-Site Request Forgery… |
paultgoodchild |
Shield: Blocks Bots, Protects Users, and Prevents Security Breaches |
2026-02-19T04:36:27.820Z | 2026-02-19T04:36:27.820Z |
| CVE-2025-13851 |
9.8 (3.1)
|
Buyent Theme (with Buyent Classified Plugin) <= 1.0.7 … |
scriptsbundle |
Buyent |
2026-02-19T04:36:27.334Z | 2026-02-19T21:24:16.175Z |
| CVE-2026-2284 |
5.4 (3.1)
|
News Element Elementor Blog Magazine <= 1.0.8 - Missin… |
webangon |
News Element Elementor Blog Magazine |
2026-02-19T04:36:26.287Z | 2026-02-19T21:27:00.808Z |
| CVE-2026-1373 |
6.4 (3.1)
|
Easy Author Image <= 1.7 - Authenticated (Subscriber+)… |
lawsonry |
Easy Author Image |
2026-02-19T04:36:26.857Z | 2026-02-19T21:25:54.071Z |
| CVE-2026-1455 |
4.3 (3.1)
|
Whatsiplus Scheduled Notification for Woocommerce <= 1… |
whatsiplus |
Whatsiplus Scheduled Notification for Woocommerce |
2026-02-19T04:36:25.835Z | 2026-02-19T21:28:00.278Z |
| CVE-2025-14445 |
6.4 (3.1)
|
Image Hotspot by DevVN <= 1.2.9 - Authenticated (Autho… |
levantoan |
Image Hotspot by DevVN |
2026-02-19T04:36:25.358Z | 2026-02-19T21:28:58.239Z |
| CVE-2026-0926 |
9.8 (3.1)
|
Prodigy Commerce <= 3.2.9 - Unauthenticated Local File… |
prodigycommerce |
Prodigy Commerce |
2026-02-19T04:36:24.867Z | 2026-02-19T21:11:51.648Z |
| CVE-2025-14357 |
5.3 (3.1)
|
Mega Store Woocommerce <= 5.9 - Missing Authorization … |
misbahwp |
Mega Store Woocommerce |
2026-02-19T04:36:24.395Z | 2026-02-19T21:18:31.802Z |
| CVE-2026-2504 |
4.3 (3.1)
|
Dealia – Request a quote <= 1.0.6 - Missing Authorizat… |
dealia |
Dealia – Request a quote |
2026-02-19T04:36:23.492Z | 2026-02-19T21:14:23.380Z |
| CVE-2026-0561 |
6.1 (3.1)
|
Shield Security <= 21.0.8 - Unauthenticated Reflected … |
paultgoodchild |
Shield: Blocks Bots, Protects Users, and Prevents Security Breaches |
2026-02-19T04:36:23.952Z | 2026-02-19T21:14:59.387Z |
| CVE-2025-14452 |
7.2 (3.1)
|
WP Customer Reviews <= 3.7.5 - Reflected Cross-Site Sc… |
bompus |
WP Customer Reviews |
2026-02-19T04:36:23.007Z | 2026-02-19T21:12:29.224Z |
| CVE-2025-14983 |
6.4 (3.1)
|
Advanced Custom Fields: Font Awesome <= 5.0.1 - Authen… |
mattkeys |
Advanced Custom Fields: Font Awesome Field |
2026-02-19T04:36:22.512Z | 2026-02-19T04:36:22.512Z |
| CVE-2026-0974 |
8.8 (3.1)
|
Orderable <= 1.20.0 - Missing Authorization to Authent… |
orderable |
Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin |
2026-02-19T04:36:21.529Z | 2026-02-19T04:36:21.529Z |
| CVE-2025-14270 |
2.7 (3.1)
|
OneClick Chat to Order <= 1.0.9 - Missing Authorizatio… |
walterpinem |
OneClick Chat to Order |
2026-02-19T04:36:21.072Z | 2026-02-19T04:36:21.072Z |
| CVE-2025-14167 |
4.3 (3.1)
|
Remove Post Type Slug <= 1.0.2 - Cross-Site Request Fo… |
akshayshah5189 |
Remove Post Type Slug |
2026-02-19T04:36:21.975Z | 2026-02-19T04:36:21.975Z |
| CVE-2025-14851 |
6.4 (3.1)
|
YaMaps for WordPress <= 0.6.40 - Authenticated (Contri… |
yhunter |
YaMaps for WordPress Plugin |
2026-02-19T04:36:20.136Z | 2026-02-19T04:36:20.136Z |
| CVE-2025-13563 |
9.8 (3.1)
|
Lizza LMS Pro <= 1.0.3 - Unauthenticated Privilege Esc… |
BuddhaThemes |
Lizza LMS Pro |
2026-02-19T04:36:20.596Z | 2026-02-19T04:36:20.596Z |
| CVE-2026-1044 |
4.4 (3.1)
|
Tennis Court Bookings <= 1.2.7 - Authenticated (Admini… |
renoiriii |
Tennis Court Bookings |
2026-02-19T04:36:19.648Z | 2026-02-19T21:05:09.781Z |
| CVE-2025-14427 |
4.3 (3.1)
|
Shield Security: Blocks Bots, Protects Users, and Prev… |
paultgoodchild |
Shield: Blocks Bots, Protects Users, and Prevents Security Breaches |
2026-02-19T04:36:19.188Z | 2026-02-19T21:08:14.561Z |
| CVE-2025-14864 |
4.3 (3.1)
|
Virusdie <= 1.1.7 - Missing Authorization to Authentic… |
virusdie |
Virusdie – One-click website security |
2026-02-19T04:36:18.706Z | 2026-02-19T21:09:20.114Z |
| CVE-2025-13091 |
4.3 (3.1)
|
Shopire <= 1.0.57 - Missing Authorization to Authentic… |
wpfable |
Shopire |
2026-02-19T04:36:18.231Z | 2026-02-19T21:10:09.099Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-25006 |
N/A
|
WordPress XStore theme <= 9.6.4 - Arbitrary Shortcode … |
8theme |
XStore |
2026-02-19T08:26:52.080Z | 2026-02-19T08:26:52.080Z |
| CVE-2026-25005 |
5.3 (3.1)
|
WordPress Frontend File Manager plugin <= 23.5 - Insec… |
N-Media |
Frontend File Manager |
2026-02-19T08:26:51.878Z | 2026-02-20T17:02:37.033Z |
| CVE-2026-25004 |
N/A
|
WordPress CM Business Directory plugin <= 1.5.3 - Cros… |
CreativeMindsSolutions |
CM Business Directory |
2026-02-19T08:26:51.689Z | 2026-02-19T08:26:51.689Z |
| CVE-2026-25003 |
4.3 (3.1)
|
WordPress Client Portal plugin <= 1.2.1 - Broken Acces… |
madalin.ungureanu |
Client Portal |
2026-02-19T08:26:51.515Z | 2026-02-19T21:11:07.060Z |
| CVE-2026-25000 |
5.3 (3.1)
|
WordPress Wheel of Life plugin <= 1.2.0 - Broken Acces… |
Kraft Plugins |
Wheel of Life |
2026-02-19T08:26:51.332Z | 2026-02-19T21:43:00.862Z |
| CVE-2026-24999 |
5.3 (3.1)
|
WordPress Alma plugin <= 5.16.1 - Broken Access Contro… |
Alma |
Alma |
2026-02-19T08:26:51.141Z | 2026-02-19T21:15:17.759Z |
| CVE-2026-24392 |
5.9 (3.1)
|
WordPress HurryTimer plugin <= 2.14.2 - Cross Site Scr… |
Nabil Lemsieh |
HurryTimer |
2026-02-19T08:26:50.918Z | 2026-02-19T21:44:23.174Z |
| CVE-2026-24375 |
5.3 (3.1)
|
WordPress Ultimate Gift Cards For WooCommerce plugin <… |
WP Swings |
Ultimate Gift Cards For WooCommerce |
2026-02-19T08:26:50.736Z | 2026-02-19T21:18:33.469Z |
| CVE-2026-23805 |
N/A
|
WordPress Media Search Enhanced plugin <= 0.9.1 - SQL … |
Yoren Chang |
Media Search Enhanced |
2026-02-19T08:26:50.551Z | 2026-02-19T08:26:50.551Z |
| CVE-2026-23804 |
5.4 (3.1)
|
WordPress Better Business Reviews plugin <= 0.1.1 - Br… |
BBR Plugins |
Better Business Reviews |
2026-02-19T08:26:50.356Z | 2026-02-19T21:21:30.061Z |
| CVE-2026-23803 |
N/A
|
WordPress Smart Auto Upload Images plugin <= 1.2.2 - S… |
Burhan Nasir |
Smart Auto Upload Images |
2026-02-19T08:26:50.148Z | 2026-02-19T08:26:50.148Z |
| CVE-2026-23549 |
9.8 (3.1)
|
WordPress WpEvently plugin <= 5.1.1 - PHP Object Injec… |
magepeopleteam |
WpEvently |
2026-02-19T08:26:49.962Z | 2026-02-19T21:24:34.333Z |
| CVE-2026-23548 |
N/A
|
WordPress DirectoryPress plugin <= 3.6.25 - Broken Acc… |
designinvento |
DirectoryPress |
2026-02-19T08:26:49.731Z | 2026-02-19T08:26:49.731Z |
| CVE-2026-23547 |
7.1 (3.1)
|
WordPress CMSMasters Content Composer plugin <= 2.5.8 … |
cmsmasters |
CMSMasters Content Composer |
2026-02-19T08:26:49.398Z | 2026-02-20T17:09:24.060Z |
| CVE-2026-23545 |
N/A
|
WordPress Aruba HiSpeed Cache plugin <= 3.0.4 - Broken… |
Aruba.it Dev |
Aruba HiSpeed Cache |
2026-02-19T08:26:49.211Z | 2026-02-19T08:26:49.211Z |
| CVE-2026-23544 |
8.8 (3.1)
|
WordPress Valenti theme <= 5.6.3.5 - PHP Object Inject… |
codetipi |
Valenti |
2026-02-19T08:26:49.016Z | 2026-02-19T21:32:54.087Z |
| CVE-2026-23543 |
N/A
|
WordPress Essential Addons for Elementor plugin <= 6.5… |
WPDeveloper |
Essential Addons for Elementor |
2026-02-19T08:26:48.831Z | 2026-02-19T08:26:48.831Z |
| CVE-2026-23542 |
9.8 (3.1)
|
WordPress Grand Restaurant theme <= 7.0.10 - PHP Objec… |
ThemeGoods |
Grand Restaurant |
2026-02-19T08:26:48.592Z | 2026-02-19T21:35:26.008Z |
| CVE-2026-23541 |
N/A
|
WordPress Mail Mint plugin <= 1.19.4 - Broken Access C… |
WPFunnels |
Mail Mint |
2026-02-19T08:26:48.368Z | 2026-02-19T08:26:48.368Z |
| CVE-2026-22422 |
5.3 (3.1)
|
WordPress Everest Forms plugin <= 3.4.1 - Arbitrary Sh… |
wpeverest |
Everest Forms |
2026-02-19T08:26:48.111Z | 2026-02-20T17:23:45.787Z |
| CVE-2026-22333 |
N/A
|
WordPress YITH WooCommerce Compare plugin <= 3.6.0 - D… |
YITHEMES |
YITH WooCommerce Compare |
2026-02-19T08:26:47.849Z | 2026-02-19T08:26:47.849Z |
| CVE-2026-22269 |
4.7 (3.1)
|
Dell PowerProtect Data Manager, version(s) prior … |
Dell |
PowerProtect Data Manager |
2026-02-19T09:00:56.035Z | 2026-02-20T16:09:36.834Z |
| CVE-2025-41023 |
6.9 (4.0)
|
Authentication bypass in AutoGPT de Thesamur |
Thesamur |
AutoGPT |
2026-02-19T08:50:36.880Z | 2026-02-19T08:50:36.880Z |
| CVE-2025-40697 |
5.1 (4.0)
|
Reflected Cross-Site Scripting (XSS) in Lewe WebMeasure |
Lewe |
WebMeasure |
2026-02-19T08:44:16.386Z | 2026-02-20T16:08:24.444Z |
| CVE-2026-2733 |
3.8 (3.1)
|
Org.keycloak/keycloak-services: keycloak: missing chec… |
Red Hat |
Red Hat Build of Keycloak |
2026-02-19T07:48:08.910Z | 2026-02-19T21:31:19.914Z |
| CVE-2026-2711 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
zhutoutoutousan worldquant-miner URL ssrf_proxy.py ser… |
zhutoutoutousan |
worldquant-miner |
2026-02-19T07:02:07.848Z | 2026-02-19T21:31:56.333Z |
| CVE-2026-2731 |
10 (4.0)
|
Unauthenticated RCE in Dynamicweb 9 and Dynamicweb 8 |
DynamicWeb |
DynamicWeb 9 |
2026-02-19T06:46:52.763Z | 2026-02-19T21:21:36.185Z |
| CVE-2026-2709 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
busy Callback app.js redirect |
n/a |
busy |
2026-02-19T06:32:06.498Z | 2026-02-19T06:32:06.498Z |
| CVE-2026-2706 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Patient Record Management System fecalys… |
code-projects |
Patient Record Management System |
2026-02-19T06:02:06.881Z | 2026-02-19T06:02:06.881Z |
| CVE-2026-2705 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open Babel MOL2 File atom.h SetFormalCharge out-of-bounds |
n/a |
Open Babel |
2026-02-19T05:02:07.101Z | 2026-02-19T05:02:07.101Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2318 | Inappropriate implementation in PictureInPicture in Google Chrome prior to 145.0.7632.45 allowed a … | 2026-02-11T19:15:51.920 | 2026-02-13T17:29:01.080 |
| fkie_cve-2026-2317 | Inappropriate implementation in Animation in Google Chrome prior to 145.0.7632.45 allowed a remote … | 2026-02-11T19:15:51.817 | 2026-02-13T17:28:48.870 |
| fkie_cve-2026-2316 | Insufficient policy enforcement in Frames in Google Chrome prior to 145.0.7632.45 allowed a remote … | 2026-02-11T19:15:51.717 | 2026-02-13T17:28:37.780 |
| fkie_cve-2026-2315 | Inappropriate implementation in WebGPU in Google Chrome prior to 145.0.7632.45 allowed a remote att… | 2026-02-11T19:15:51.617 | 2026-02-13T17:27:56.897 |
| fkie_cve-2026-2314 | Heap buffer overflow in Codecs in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to… | 2026-02-11T19:15:51.427 | 2026-02-13T17:27:49.190 |
| fkie_cve-2026-2313 | Use after free in CSS in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentia… | 2026-02-11T19:15:51.220 | 2026-02-13T17:27:42.300 |
| fkie_cve-2025-70297 | A stored cross-site scripting (XSS) vulnerability in the recipe asset upload and media serving comp… | 2026-02-11T19:15:50.690 | 2026-02-12T21:16:01.993 |
| fkie_cve-2025-70296 | A stored HTML injection vulnerability in the Recipe Notes rendering component in Mealie 3.3.1 allow… | 2026-02-11T19:15:50.580 | 2026-02-12T21:16:01.833 |
| fkie_cve-2025-69873 | ajv (Another JSON Schema Validator) through version 8.17.1 is vulnerable to Regular Expression Deni… | 2026-02-11T19:15:50.467 | 2026-02-12T16:16:05.583 |
| fkie_cve-2025-69872 | DiskCache (python-diskcache) through 5.6.3 uses Python pickle for serialization by default. An atta… | 2026-02-11T19:15:50.360 | 2026-02-12T16:16:05.423 |
| fkie_cve-2025-69871 | A race condition vulnerability exists in MedusaJS Medusa v2.12.2 and earlier in the registerUsage()… | 2026-02-11T19:15:50.230 | 2026-02-12T16:16:05.280 |
| fkie_cve-2026-2361 | PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by c… | 2026-02-11T18:16:08.313 | 2026-02-12T15:11:02.290 |
| fkie_cve-2026-2360 | PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by c… | 2026-02-11T18:16:08.153 | 2026-02-12T15:11:02.290 |
| fkie_cve-2026-0229 | A denial-of-service (DoS) vulnerability in the Advanced DNS Security (ADNS) feature of Palo Alto Ne… | 2026-02-11T18:16:07.897 | 2026-02-12T15:11:02.290 |
| fkie_cve-2026-0228 | An improper certificate validation vulnerability in PAN-OS allows users to connect Terminal Server … | 2026-02-11T18:16:07.720 | 2026-02-12T15:11:02.290 |
| fkie_cve-2025-70085 | An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. … | 2026-02-11T18:16:06.600 | 2026-02-17T15:02:22.943 |
| fkie_cve-2025-70084 | Directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to gain access to sensitive … | 2026-02-11T18:16:06.483 | 2026-02-17T15:03:33.090 |
| fkie_cve-2025-70083 | An issue was discovered in OpenSatKit 2.2.1. The DirName field in the telecommand is provided by th… | 2026-02-11T18:16:06.337 | 2026-02-17T15:03:48.430 |
| fkie_cve-2025-70029 | An issue in Sunbird-Ed SunbirdEd-portal v1.13.4 allows attackers to obtain sensitive information. T… | 2026-02-11T18:16:06.170 | 2026-02-12T15:16:04.567 |
| fkie_cve-2025-69874 | nanotar through 0.2.0 has a path traversal vulnerability in parseTar() and parseTarGzip() that allo… | 2026-02-11T18:16:05.430 | 2026-02-12T15:16:04.343 |
| fkie_cve-2025-65480 | An issue was discovered in Pacom Unison Client 5.13.1. Authenticated users can inject malicious scr… | 2026-02-11T18:16:04.907 | 2026-02-12T15:16:04.167 |
| fkie_cve-2025-65128 | A missing authentication mechanism in the web management API components of Shenzhen Zhibotong Elect… | 2026-02-11T18:16:04.353 | 2026-02-17T22:18:44.197 |
| fkie_cve-2026-25084 | Authentication for ZLAN5143D can be bypassed by directly accessing internal URLs. | 2026-02-11T17:16:13.243 | 2026-02-11T18:06:04.010 |
| fkie_cve-2026-24789 | An unprotected API endpoint allows an attacker to remotely change the device password without provi… | 2026-02-11T17:16:13.040 | 2026-02-11T18:06:04.010 |
| fkie_cve-2025-65127 | A lack of session validation in the web API component of Shenzhen Zhibotong Electronics ZBT WE2001 … | 2026-02-11T17:16:07.710 | 2026-02-17T22:18:44.020 |
| fkie_cve-2025-13391 | The Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium) plugin for W… | 2026-02-11T17:16:06.500 | 2026-02-11T18:06:04.010 |
| fkie_cve-2026-25869 | MiniGal Nano versions 0.3.5 and prior contain a path traversal vulnerability in index.php via the d… | 2026-02-11T16:16:06.813 | 2026-02-11T18:06:04.010 |
| fkie_cve-2026-25868 | MiniGal Nano version 0.3.5 and prior contain a reflected cross-site scripting (XSS) vulnerability i… | 2026-02-11T16:16:06.657 | 2026-02-11T18:06:04.010 |
| fkie_cve-2026-1837 | A specially-crafted file can cause libjxl's decoder to write pixel data to uninitialized unallocate… | 2026-02-11T16:16:04.697 | 2026-02-11T20:16:07.710 |
| fkie_cve-2025-64075 | A path traversal vulnerability in the check_token function of Shenzhen Zhibotong Electronics ZBT WE… | 2026-02-11T16:15:57.250 | 2026-02-11T18:06:04.010 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-96rp-cm97-g7qx |
6.1 (3.1)
5.1 (4.0)
|
Comodo Dome Firewall 2.7.0 contains a reflected cross-site scripting vulnerability that allows atta… | 2026-02-19T15:30:34Z | 2026-02-19T15:30:34Z |
| ghsa-87cq-987f-f298 |
6.1 (3.1)
5.1 (4.0)
|
Comodo Dome Firewall 2.7.0 contains a reflected cross-site scripting vulnerability that allows atta… | 2026-02-19T15:30:34Z | 2026-02-19T15:30:34Z |
| ghsa-4gmh-q9c8-hqhf |
6.1 (3.1)
5.1 (4.0)
|
Comodo Dome Firewall 2.7.0 contains a reflected cross-site scripting vulnerability that allows atta… | 2026-02-19T15:30:34Z | 2026-02-19T15:30:34Z |
| ghsa-4cfc-4jgv-f8wc |
6.1 (3.1)
5.1 (4.0)
|
Comodo Dome Firewall 2.7.0 contains a reflected cross-site scripting vulnerability that allows atta… | 2026-02-19T15:30:34Z | 2026-02-19T15:30:34Z |
| ghsa-wwj6-vghv-5p64 |
5.2 (4.0)
|
Kata Container to Guest micro VM privilege escalation | 2026-02-19T15:25:54Z | 2026-02-19T21:30:20Z |
| ghsa-67pg-wm7f-q7fj |
8.7 (4.0)
|
jsPDF Affected by Client-Side/Server-Side Denial of Service via Malicious GIF Dimensions | 2026-02-19T15:25:48Z | 2026-02-19T20:58:08Z |
| ghsa-m56q-vw4c-c2cp |
5.1 (4.0)
|
Svelte SSR does not validate dynamic element tag names in `<svelte:element>` | 2026-02-19T15:18:42Z | 2026-02-19T15:18:42Z |
| ghsa-f7gr-6p89-r883 |
5.1 (4.0)
|
Svelte affected by cross-site scripting via spread attributes in Svelte SSR | 2026-02-19T15:18:33Z | 2026-02-19T15:18:33Z |
| ghsa-h7h7-mm68-gmrc |
5.1 (4.0)
|
Svelte affected by XSS in SSR `<option>` element | 2026-02-19T15:18:19Z | 2026-02-19T15:18:19Z |
| ghsa-9pq4-5hcf-288c |
5.3 (4.0)
|
Cache poisoning in @sveltejs/adapter-vercel | 2026-02-19T15:18:02Z | 2026-02-19T15:18:02Z |
| ghsa-3288-p39f-rqpv |
0.5 (4.0)
|
Unsoundness in opt-in ARMv8 assembly backend for `keccak` | 2026-02-19T15:17:41Z | 2026-02-19T15:17:41Z |
| ghsa-9ppg-jx86-fqw7 |
|
Unauthorized npm publish of cline@2.3.0 with modified postinstall script | 2026-02-19T15:17:10Z | 2026-02-19T15:17:10Z |
| ghsa-7g9x-cp9g-92mr |
9.4 (4.0)
|
Kargo has an Authorization Bypass Vulnerability in Batch Resource Creation API Endpoints | 2026-02-19T15:16:46Z | 2026-02-19T15:16:46Z |
| ghsa-5vvm-67pj-72g4 |
5.3 (4.0)
|
Kargo has Missing Authorization Vulnerabilities in Approval & Promotion REST API Endpoints | 2026-02-19T15:16:31Z | 2026-02-19T15:16:31Z |
| ghsa-mvg3-r374-jg32 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in Tsinghua Unigroup Electronic Archives System up to 3.2.210802(625… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-fq57-8j4v-2xq2 |
6.7 (4.0)
|
Fileflows versions before 25.05.2 are affected by an authenticated SQL injection vulnerability in t… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-87c2-mcff-93mr |
9.8 (3.1)
8.9 (4.0)
|
A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the fu… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-6rxp-px53-8xf6 |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). The af… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-63wr-vhhf-qrpx |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in GoogTech sms-ssm up to e8534c766fd13f5f94c01dab475d75f286918a8d. … | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-3428-qfh5-9x74 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was determined in Tsinghua Unigroup Electronic Archives System up to 3.2.210802(625… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-w366-h875-fm53 |
8.2 (3.1)
8.8 (4.0)
|
MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in th… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-m568-c33v-g59q |
8.8 (3.1)
|
Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potent… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-h5vr-w6qh-ffwp |
8.8 (3.1)
|
Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-grp8-p6j9-9x5f |
9.8 (3.1)
9.3 (4.0)
|
MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution throug… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-ggv8-8p4m-x2fc |
4.3 (3.1)
2.1 (4.0)
|
A security flaw has been discovered in Tsinghua Unigroup Electronic Archives System 3.2.210802(6253… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-g4hf-7q6p-whw3 |
8.4 (3.1)
8.6 (4.0)
|
Saturn Remote Mouse Server contains a command injection vulnerability that allows unauthenticated a… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-9vw8-375m-pj63 |
6.5 (3.1)
5.5 (4.0)
|
A vulnerability was determined in Rongzhitong Visual Integrated Command and Dispatch Platform up to… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-6f4f-6mw4-9rmf |
5.3 (4.0)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Delinea Inc… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-654q-5mj4-74h4 |
6.9 (4.0)
|
Improper Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') in Delinea Inc. Cl… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-5v24-5hr7-xg26 |
7.5 (3.1)
8.7 (4.0)
|
MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation throug… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43043 |
|
The d8s-file-system package for Python, as distributed on PyPI, included a potential code… | democritus-hashes | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.575571Z |
| pysec-2022-43042 |
|
The d8s-archives package for Python, as distributed on PyPI, included a potential code-ex… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.463544Z |
| pysec-2022-43041 |
|
The d8s-json package for Python, as distributed on PyPI, included a potential code-execut… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.395602Z |
| pysec-2022-43040 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.328726Z |
| pysec-2022-43039 |
|
The d8s-yaml package for Python, as distributed on PyPI, included a potential code-execut… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.196757Z |
| pysec-2022-43038 |
|
The d8s-algorithms package for Python, as distributed on PyPI, included a potential code-… | democritus-dicts | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.098821Z |
| pysec-2022-43037 |
|
The d8s-lists package for Python, as distributed on PyPI, included a potential code-execu… | democritus-dicts | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.022993Z |
| pysec-2022-43036 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | democritus-csv | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.913597Z |
| pysec-2022-43035 |
|
The d8s-urls package for Python, as distributed on PyPI, included a potential code-execut… | democritus-csv | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.835906Z |
| pysec-2022-43034 |
|
The d8s-yaml package for Python, as distributed on PyPI, included a potential code-execut… | d8s-yaml | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.718747Z |
| pysec-2022-43033 |
|
The d8s-xml package for Python, as distributed on PyPI, included a potential code-executi… | d8s-xml | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.587712Z |
| pysec-2022-43032 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | d8s-utility | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.473097Z |
| pysec-2022-43031 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | d8s-utility | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.395893Z |
| pysec-2022-43030 |
|
The d8s-urls package for Python, as distributed on PyPI, included a potential code-execut… | d8s-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.291206Z |
| pysec-2022-43029 |
|
The d8s-pdfs package for Python, as distributed on PyPI, included a potential code-execut… | d8s-pdfs | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.177857Z |
| pysec-2022-43028 |
|
The d8s-networking package for Python, as distributed on PyPI, included a potential code-… | d8s-networking | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.075232Z |
| pysec-2022-43027 |
|
The d8s-lists package for Python, as distributed on PyPI, included a potential code-execu… | d8s-lists | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.913872Z |
| pysec-2022-43026 |
|
The d8s-json package for Python, as distributed on PyPI, included a potential code-execut… | d8s-json | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.769675Z |
| pysec-2022-43025 |
|
The d8s-html package for Python, as distributed on PyPI, included a potential code-execut… | d8s-html | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.578719Z |
| pysec-2022-43024 |
|
The d8s-file-system package for Python, as distributed on PyPI, included a potential code… | d8s-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.460219Z |
| pysec-2022-43023 |
|
The d8s-domains package for Python, as distributed on PyPI, included a potential code-exe… | d8s-domains | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.349619Z |
| pysec-2022-43022 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | d8s-asns | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.247277Z |
| pysec-2022-43021 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | d8s-asns | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.172299Z |
| pysec-2022-43020 |
|
The d8s-archives package for Python, as distributed on PyPI, included a potential code-ex… | d8s-archives | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.057391Z |
| pysec-2022-43019 |
|
The d8s-algorithms package for Python, as distributed on PyPI, included a potential code-… | d8s-algorithms | 2022-10-11T22:15:00Z | 2023-06-05T01:12:47.946780Z |
| pysec-2022-303 |
|
mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack th… | django-mfa2 | 2022-10-11T14:15:00Z | 2022-10-11T19:05:00Z |
| pysec-2022-43158 |
6.1 (3.1)
|
Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.0a4. | rdiffweb | 2022-10-10T12:15:00+00:00 | 2024-11-21T14:23:00.394851+00:00 |
| pysec-2022-42983 |
|
In Apache Airflow, prior to version 2.4.1, deactivating a user wouldn't prevent an alread… | apache-airflow | 2022-10-07T07:15:00Z | 2023-05-04T04:29:22.696589Z |
| pysec-2022-43157 |
5.3 (3.1)
|
Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.5.0a4. | rdiffweb | 2022-10-06T18:16:00+00:00 | 2024-11-21T14:23:00.333240+00:00 |
| pysec-2022-43156 |
9.8 (3.1)
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffwe… | rdiffweb | 2022-10-06T18:16:00+00:00 | 2024-11-21T14:23:00.273706+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2026-593 | Malicious code in pypi-package-explore (PyPI) | 2026-01-28T17:56:33Z | 2026-01-28T17:56:33Z |
| mal-2026-592 | Malicious code in lvldragdrop (npm) | 2026-01-28T16:39:23Z | 2026-02-02T05:56:28Z |
| mal-2026-591 | Malicious code in kol7a (npm) | 2026-01-28T16:39:23Z | 2026-02-02T05:56:28Z |
| MAL-2026-592 | Malicious code in lvldragdrop (npm) | 2026-01-28T16:39:23Z | 2026-02-02T05:56:28Z |
| MAL-2026-591 | Malicious code in kol7a (npm) | 2026-01-28T16:39:23Z | 2026-02-02T05:56:28Z |
| mal-2026-590 | Malicious code in pytorch-mutex (PyPI) | 2026-01-28T16:28:32Z | 2026-01-28T17:47:09Z |
| MAL-2026-590 | Malicious code in pytorch-mutex (PyPI) | 2026-01-28T16:28:32Z | 2026-01-28T17:47:09Z |
| mal-2026-584 | Malicious code in chai-as-extended (npm) | 2026-01-28T15:06:22Z | 2026-02-02T05:56:26Z |
| MAL-2026-584 | Malicious code in chai-as-extended (npm) | 2026-01-28T15:06:22Z | 2026-02-02T05:56:26Z |
| mal-2026-589 | Malicious code in dotenv-embed (npm) | 2026-01-28T14:56:54Z | 2026-02-02T05:56:27Z |
| mal-2026-585 | Malicious code in chai-async-tests (npm) | 2026-01-28T14:56:54Z | 2026-02-02T05:56:26Z |
| MAL-2026-589 | Malicious code in dotenv-embed (npm) | 2026-01-28T14:56:54Z | 2026-02-02T05:56:27Z |
| MAL-2026-585 | Malicious code in chai-async-tests (npm) | 2026-01-28T14:56:54Z | 2026-02-02T05:56:26Z |
| mal-2026-588 | Malicious code in chai-sub (npm) | 2026-01-28T14:53:28Z | 2026-02-02T05:56:26Z |
| MAL-2026-588 | Malicious code in chai-sub (npm) | 2026-01-28T14:53:28Z | 2026-02-02T05:56:26Z |
| mal-2026-587 | Malicious code in chai-px (npm) | 2026-01-28T14:48:04Z | 2026-02-02T05:56:26Z |
| MAL-2026-587 | Malicious code in chai-px (npm) | 2026-01-28T14:48:04Z | 2026-02-02T05:56:26Z |
| mal-2026-586 | Malicious code in chai-chains-async (npm) | 2026-01-28T14:46:57Z | 2026-02-02T05:56:26Z |
| MAL-2026-586 | Malicious code in chai-chains-async (npm) | 2026-01-28T14:46:57Z | 2026-02-02T05:56:26Z |
| mal-2026-583 | Malicious code in vuejavascript (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:31Z |
| mal-2026-582 | Malicious code in somsodamsd (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| mal-2026-581 | Malicious code in somesomesomesome (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| mal-2026-580 | Malicious code in somesomesome (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| mal-2026-579 | Malicious code in skndkjasndkjan (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| mal-2026-578 | Malicious code in @pukpuk1/somsodamsd (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:25Z |
| MAL-2026-583 | Malicious code in vuejavascript (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:31Z |
| MAL-2026-582 | Malicious code in somsodamsd (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| MAL-2026-581 | Malicious code in somesomesomesome (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| MAL-2026-580 | Malicious code in somesomesome (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| MAL-2026-579 | Malicious code in skndkjasndkjan (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1304 | IBM Security Guardium: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-11T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1303 | Perl (IBM AIX): Schwachstelle ermöglicht Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1302 | Kibana: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1301 | Mozilla Thunderbird: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-06-10T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1300 | Insyde UEFI Firmware: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1299 | Apache CloudStack: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1298 | AMD Prozessoren: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-10T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1297 | Mozilla Firefox: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1296 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1295 | Fortinet FortiOS und FortiProxy: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1294 | GeoServer: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1293 | IBM DataPower Gateway: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1292 | Trend Micro Apex Central: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1291 | Pixel Patchday Juni 2025: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1290 | Fortinet FortiOS, FortiProxy, FortiWeb: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1289 | Fortinet FortiClient EMS: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1288 | IBM Security Verify Access: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1287 | Adobe Creative Cloud Anwendungen: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1286 | Fortinet FortiClient Windows: Schwachstelle ermöglicht Manipulation | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1285 | Adobe Experience Manager: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-06-10T22:00:00.000+00:00 | 2025-07-24T22:00:00.000+00:00 |
| wid-sec-w-2025-1284 | Adobe Magento: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1283 | Fortinet FortiOS: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1282 | Fortinet FortiPortal: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1281 | Adobe: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1280 | Intel Firmware: Schwachstelle ermöglicht Denial of Service | 2025-06-10T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1279 | Broadcom Fabric OS: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2025-1278 | AMD Prozessoren: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-06-10T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1277 | Microsoft Windows: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1276 | Microsoft Office Produkte: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1275 | Microsoft Azure: Schwachstelle ermöglicht Darstellen falscher Informationen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0252 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2024-06-11T18:23:19.082621Z | 2024-06-11T18:23:19.082621Z |
| ncsc-2024-0251 | Kwetsbaarheden verholpen in Microsoft Office | 2024-06-11T18:20:51.628241Z | 2024-06-11T18:20:51.628241Z |
| ncsc-2024-0250 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2024-06-11T18:18:10.131111Z | 2024-06-11T18:18:10.131111Z |
| ncsc-2024-0249 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-06-11T18:15:29.806897Z | 2024-06-11T18:15:29.806897Z |
| ncsc-2024-0248 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-06-11T18:06:57.087085Z | 2024-06-11T18:11:31.381556Z |
| ncsc-2024-0246 | Kwetsbaarheden verholpen in Siemens producten | 2024-06-11T13:29:25.912614Z | 2024-06-11T13:29:25.912614Z |
| ncsc-2024-0247 | Kwetsbaarheden verholpen in SAP producten | 2024-06-11T12:37:09.525507Z | 2024-06-11T12:37:09.525507Z |
| ncsc-2024-0245 | Kwetsbaarheden verholpen in Trend Micro Apex One | 2024-06-11T11:51:02.976099Z | 2024-06-11T11:51:02.976099Z |
| ncsc-2024-0244 | Kwetsbaarheden verholpen in Schneider Electric Sage RTU systemen | 2024-06-11T11:33:48.933251Z | 2024-06-11T11:33:48.933251Z |
| ncsc-2024-0243 | Kwetsbaarheden verholpen in PHP | 2024-06-10T07:02:05.106950Z | 2024-06-10T07:02:05.106950Z |
| ncsc-2024-0242 | Kwetsbaarheden verholpen in RoundCube Webmail | 2024-06-07T11:01:13.397121Z | 2024-06-07T11:01:13.397121Z |
| ncsc-2024-0241 | Kwetsbaarheden verholpen in FortiNet FortiWebManager | 2024-06-07T07:22:27.233971Z | 2024-06-07T07:22:27.233971Z |
| ncsc-2024-0240 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-06-07T07:21:29.492650Z | 2024-06-07T07:21:29.492650Z |
| ncsc-2024-0239 | Kwetsbaarheden verholpen in Solarwinds Platform | 2024-06-07T06:26:01.172456Z | 2024-06-07T06:26:01.172456Z |
| ncsc-2024-0238 | Kwetsbaarheid verholpen in Check Point VPN producten | 2024-05-30T07:56:46.220112Z | 2024-05-30T07:56:46.220112Z |
| ncsc-2024-0237 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-05-27T11:26:30.888877Z | 2024-05-27T11:26:30.888877Z |
| ncsc-2024-0236 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2024-05-27T07:11:10.705670Z | 2024-06-14T09:37:49.413035Z |
| ncsc-2024-0235 | Kwetsbaarheid verholpen in Google Chrome | 2024-05-27T07:10:26.268379Z | 2024-05-27T07:50:35.517237Z |
| ncsc-2024-0234 | Kwetsbaarheid verholpen in Github Enterprise Server | 2024-05-23T10:57:36.609416Z | 2024-05-23T10:57:36.609416Z |
| ncsc-2024-0233 | Kwetsbaarheden verholpen in Cisco producten | 2024-05-23T10:56:24.310012Z | 2024-05-23T10:56:24.310012Z |
| ncsc-2024-0232 | Kwetsbaarheden verholpen in Veeam Backup Enterprise Manager | 2024-05-22T11:42:48.155465Z | 2024-06-11T11:33:12.845658Z |
| ncsc-2024-0231 | Kwetsbaarheden verholpen in Atlassian producten | 2024-05-22T11:13:07.693855Z | 2024-05-22T11:13:07.693855Z |
| ncsc-2024-0230 | Kwetsbaarheden verholpen in QNAP QTS en QTS Hero | 2024-05-22T08:02:19.922765Z | 2024-05-22T08:02:19.922765Z |
| ncsc-2024-0229 | Kwetsbaarheid verholpen in QlikSense Enterprise | 2024-05-22T05:33:44.910098Z | 2024-05-22T05:33:44.910098Z |
| ncsc-2024-0228 | Kwetsbaarheden verholpen in SAP producten | 2024-05-17T11:28:01.264255Z | 2024-05-17T11:28:01.264255Z |
| ncsc-2024-0227 | Kwetsbaarheden verholpen in Adobe Illustrator | 2024-05-16T12:59:04.595951Z | 2024-05-16T12:59:04.595951Z |
| ncsc-2024-0226 | Kwetsbaarheden verholpen in Adobe Animate | 2024-05-16T12:55:49.361352Z | 2024-05-16T12:55:49.361352Z |
| ncsc-2024-0225 | Kwetsbaarheden verholpen in Adobe FrameMaker | 2024-05-16T12:54:55.359838Z | 2024-05-16T12:54:55.359838Z |
| ncsc-2024-0224 | Kwetsbaarheid verholpen in Adobe Dreamweaver | 2024-05-16T12:45:03.866353Z | 2024-05-16T12:45:03.866353Z |
| ncsc-2024-0223 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2024-05-16T12:44:31.298431Z | 2024-05-16T12:44:31.298431Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-689942 | SSA-689942: Denial-of-Service and DLL Hijacking Vulnerabilities in Multiple SIMATIC Software Products | 2020-06-09T00:00:00Z | 2021-04-13T00:00:00Z |
| ssa-312271 | SSA-312271: Unquoted Search Path Vulnerability in Windows-based Industrial Software Applications | 2020-06-09T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-593272 | SSA-593272: SegmentSmack in Interniche IP-Stack based Industrial Devices | 2020-04-14T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-162506 | SSA-162506: DHCP Client Vulnerability in SIMOTICS CONNECT 400, Desigo PXC/PXM, APOGEE MEC/MBC/PXC, APOGEE PXC Series, and TALON TC Series | 2020-04-14T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-102233 | SSA-102233: SegmentSmack in VxWorks-based Industrial Devices | 2020-04-14T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-844761 | SSA-844761: Multiple Vulnerabilities in SiNVR/SiVMS Video Server | 2020-03-10T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-978220 | SSA-978220: Denial of Service Vulnerability over SNMP in Multiple Industrial Products | 2020-02-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-951513 | SSA-951513: Clickjacking Vulnerability in SCALANCE S, SCALANCE X-300, X-200IRT, X-200RNA and X-200 Switch Families | 2020-02-11T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-780073 | SSA-780073: Denial of Service Vulnerability in PROFINET Devices via DCE-RPC Packets | 2020-02-11T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-591405 | SSA-591405: Web Vulnerabilities in SCALANCE S-600 Family | 2020-02-11T00:00:00Z | 2021-04-13T00:00:00Z |
| ssa-431678 | SSA-431678: Denial of Service Vulnerability in SIMATIC S7 CPU Families | 2020-02-11T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-270778 | SSA-270778: Denial-of-Service Vulnerability in SIMATIC PCS 7, SIMATIC WinCC and SIMATIC NET PC Software | 2020-02-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-629512 | SSA-629512: Local Privilege Escalation Vulnerability in TIA Portal | 2020-01-14T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-443566 | SSA-443566: Authentication Bypass in SCALANCE X Switches Families | 2020-01-14T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-761617 | SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server | 2019-12-10T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-618620 | SSA-618620: Vulnerabilities in Boot Loader (U-Boot) of RUGGEDCOM ROS Devices | 2019-12-10T00:00:00Z | 2023-12-12T00:00:00Z |
| ssa-273799 | SSA-273799: Message Integrity Protection Bypass Vulnerability in SIMATIC Products | 2019-12-10T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-434032 | SSA-434032: Input Validation Vulnerability in the DHCP Client of Nucleus RTOS | 2019-11-12T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-473245 | SSA-473245: Denial of Service Vulnerability in Profinet Devices | 2019-10-08T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-349422 | SSA-349422: Denial of Service Vulnerability in Industrial Real-Time (IRT) Devices | 2019-10-08T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-462066 | SSA-462066: Vulnerability known as TCP SACK PANIC in Industrial Products | 2019-09-10T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-232418 | SSA-232418: Vulnerabilities in SIMATIC S7-1200 and SIMATIC S7-1500 CPU Families | 2019-08-13T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-100232 | SSA-100232: Denial-of-Service vulnerability in SCALANCE X Switches | 2019-08-13T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-480230 | SSA-480230: Denial of Service Vulnerability in Webserver of Industrial Products | 2019-04-09T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-557804 | SSA-557804: Mirror Port Isolation Vulnerability in SCALANCE X Switches | 2019-03-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-113131 | SSA-113131: Denial of Service Vulnerabilities in SIMATIC S7-400 CPUs | 2018-11-13T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-480829 | SSA-480829: Cross-Site Scripting Vulnerabilities in SCALANCE X Switches | 2018-06-12T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-348629 | SSA-348629: Denial-of-Service Vulnerability in SIMATIC PCS 7, SIMATIC WinCC, SIMATIC WinCC Runtime Professional and SIMATIC NET PC Software | 2018-03-27T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-592007 | SSA-592007: Denial of Service Vulnerability in Industrial Products | 2018-03-20T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-203306 | SSA-203306: Password Vulnerabilities in SIPROTEC 4 and SIPROTEC Compact Relay Families | 2018-03-08T00:00:00Z | 2021-07-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0425 | Red Hat Security Advisory: runc security update | 2026-01-12T03:43:04+00:00 | 2026-02-21T07:36:29+00:00 |
| rhsa-2026:0444 | Red Hat Security Advisory: kernel security update | 2026-01-12T03:40:43+00:00 | 2026-02-19T07:03:27+00:00 |
| rhsa-2026:0426 | Red Hat Security Advisory: buildah security update | 2026-01-12T03:32:03+00:00 | 2026-02-21T07:36:31+00:00 |
| rhsa-2026:0422 | Red Hat Security Advisory: libsoup security update | 2026-01-12T02:53:33+00:00 | 2026-01-29T15:24:22+00:00 |
| rhsa-2026:0443 | Red Hat Security Advisory: kernel-rt security update | 2026-01-12T02:42:33+00:00 | 2026-02-19T07:03:26+00:00 |
| rhsa-2026:0435 | Red Hat Security Advisory: tar security update | 2026-01-12T02:39:28+00:00 | 2026-02-11T12:55:27+00:00 |
| rhsa-2026:0428 | Red Hat Security Advisory: libssh security update | 2026-01-12T02:35:33+00:00 | 2026-02-05T19:39:49+00:00 |
| rhsa-2026:0434 | Red Hat Security Advisory: tar security update | 2026-01-12T02:30:08+00:00 | 2026-02-11T12:55:30+00:00 |
| rhsa-2026:0424 | Red Hat Security Advisory: podman security update | 2026-01-12T02:26:08+00:00 | 2026-02-21T07:36:28+00:00 |
| rhsa-2026:0421 | Red Hat Security Advisory: libsoup security update | 2026-01-12T02:24:03+00:00 | 2026-01-29T15:24:21+00:00 |
| rhsa-2026:0427 | Red Hat Security Advisory: libssh security update | 2026-01-12T02:12:23+00:00 | 2026-02-05T19:39:54+00:00 |
| rhsa-2026:0430 | Red Hat Security Advisory: libssh security update | 2026-01-12T02:08:48+00:00 | 2026-02-05T19:39:47+00:00 |
| rhsa-2026:0436 | Red Hat Security Advisory: buildah security update | 2026-01-12T02:06:04+00:00 | 2026-02-18T12:29:44+00:00 |
| rhsa-2026:0429 | Red Hat Security Advisory: keylime security update | 2026-01-12T02:05:04+00:00 | 2026-01-13T22:41:43+00:00 |
| rhsa-2026:0433 | Red Hat Security Advisory: wireshark security update | 2026-01-12T02:00:34+00:00 | 2026-01-13T22:41:44+00:00 |
| rhsa-2026:0423 | Red Hat Security Advisory: libsoup3 security update | 2026-01-12T01:38:59+00:00 | 2026-01-29T15:24:20+00:00 |
| rhsa-2026:0304 | Red Hat Security Advisory: mariadb:10.3 security update | 2026-01-09T08:07:12+00:00 | 2026-01-15T16:00:56+00:00 |
| rhsa-2026:0414 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2026-01-08T22:34:17+00:00 | 2026-02-21T07:36:27+00:00 |
| rhsa-2026:0409 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2026-01-08T19:41:55+00:00 | 2026-02-19T14:53:14+00:00 |
| rhsa-2026:0408 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-01-08T19:38:23+00:00 | 2026-02-19T14:53:13+00:00 |
| rhsa-2026:0406 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Update | 2026-01-08T19:34:46+00:00 | 2026-02-19T14:53:17+00:00 |
| rhsa-2026:0384 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.1.3 security update | 2026-01-08T16:57:30+00:00 | 2026-02-18T16:51:39+00:00 |
| rhsa-2026:0383 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.1.3 security update | 2026-01-08T16:57:24+00:00 | 2026-02-18T16:51:39+00:00 |
| rhsa-2026:0386 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.1.3 security update | 2026-01-08T16:53:51+00:00 | 2026-02-18T16:51:41+00:00 |
| rhsa-2026:0376 | Red Hat Security Advisory: mariadb10.11 security update | 2026-01-08T16:41:25+00:00 | 2026-01-15T16:00:58+00:00 |
| rhsa-2026:0367 | Red Hat Security Advisory: mariadb security update | 2026-01-08T15:48:20+00:00 | 2026-01-15T16:01:05+00:00 |
| rhsa-2026:0355 | Red Hat Security Advisory: python3.12 security update | 2026-01-08T14:45:29+00:00 | 2026-02-03T20:56:53+00:00 |
| rhsa-2026:0354 | Red Hat Security Advisory: python3.12 security update | 2026-01-08T14:33:54+00:00 | 2026-02-03T20:56:53+00:00 |
| rhsa-2026:0356 | Red Hat Security Advisory: gimp:2.8 security update | 2026-01-08T14:27:05+00:00 | 2026-01-13T22:41:38+00:00 |
| rhsa-2026:0361 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security Update | 2026-01-08T14:13:04+00:00 | 2026-01-13T22:41:39+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-254-01 | Viessmann Climate Solutions SE Vitogate 300 | 2024-09-10T06:00:00.000000Z | 2024-09-10T06:00:00.000000Z |
| icsa-25-014-03 | Schneider Electric EcoStruxure | 2024-09-10T00:00:00.000000Z | 2024-09-10T00:00:00.000000Z |
| icsa-25-014-02 | Schneider Electric Vijeo Designer and EcoStruxureâ„¢ Machine Expert (Update A) | 2024-09-10T00:00:00.000000Z | 2025-07-08T04:00:00.000000Z |
| icsa-24-261-01 | Siemens SIMATIC S7-200 SMART Devices | 2024-09-10T00:00:00.000000Z | 2024-09-10T00:00:00.000000Z |
| icsa-24-256-16 | Siemens Third-Party Component in SICAM and SITIPE Products | 2024-09-10T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-256-15 | Siemens Industrial Products | 2024-09-10T00:00:00.000000Z | 2025-07-08T00:00:00.000000Z |
| icsa-24-256-14 | Siemens SIMATIC SCADA and PCS 7 Systems | 2024-09-10T00:00:00.000000Z | 2025-01-14T00:00:00.000000Z |
| icsa-24-256-13 | Siemens SCALANCE W700 | 2024-09-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-256-12 | Siemens Tecnomatix Plant Simulation | 2024-09-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-256-11 | Siemens Industrial Edge Management | 2024-09-10T00:00:00.000000Z | 2024-09-10T00:00:00.000000Z |
| icsa-24-256-10 | Siemens SINEMA | 2024-09-10T00:00:00.000000Z | 2024-09-10T00:00:00.000000Z |
| icsa-24-256-09 | Siemens SIMATIC, SIPLUS, and TIM | 2024-09-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-256-08 | Siemens Industrial Products | 2024-09-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-256-07 | Siemens SIMATIC RFID Readers | 2024-09-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-256-06 | Siemens Automation License Manager | 2024-09-10T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-24-256-05 | Siemens Mendix Runtime | 2024-09-10T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-256-04 | Siemens SINUMERIK Systems | 2024-09-10T00:00:00.000000Z | 2024-09-10T00:00:00.000000Z |
| icsa-24-256-03 | Siemens User Management Component (UMC) | 2024-09-10T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-24-256-02 | Siemens SINUMERIK ONE, SINUMERIK 840D and SINUMERIK 828D | 2024-09-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-256-01 | Siemens SINEMA Remote Connect Server | 2024-09-10T00:00:00.000000Z | 2024-09-10T00:00:00.000000Z |
| icsa-25-182-01 | FESTO Didactic CP, MPS 200, and MPS 400 Firmware | 2024-09-09T07:00:00.000000Z | 2024-09-09T07:00:00.000000Z |
| icsma-24-249-01 | Baxter Connex Health Portal | 2024-09-05T06:00:00.000000Z | 2024-09-05T06:00:00.000000Z |
| icsa-24-249-01 | Hughes Network Systems WL3000 Fusion Software | 2024-09-05T06:00:00.000000Z | 2024-09-05T06:00:00.000000Z |
| icsa-24-247-01 | LOYTEC Electronics LINX Series | 2024-09-03T06:00:00.000000Z | 2024-09-03T06:00:00.000000Z |
| icsa-24-242-02 | Delta Electronics DTN Soft | 2024-08-29T06:00:00.000000Z | 2024-08-29T06:00:00.000000Z |
| icsa-24-242-01 | Rockwell Automation ThinManager ThinServer | 2024-08-29T06:00:00.000000Z | 2024-08-29T06:00:00.000000Z |
| icsa-24-331-04 | Hitachi Energy MicroSCADA Pro/X SYS600 (Update A) | 2024-08-27T12:30:00.000000Z | 2025-03-25T13:30:00.000000Z |
| icsa-24-235-03 | Authenticated Remote Code Execution affects Mobotix P3 and Mx6 cameras | 2024-08-22T10:00:00.000000Z | 2024-08-22T10:00:00.000000Z |
| icsa-24-235-04 | Avtec Outpost 0810 | 2024-08-22T06:00:00.000000Z | 2024-08-22T06:00:00.000000Z |
| icsa-24-235-02 | Rockwell Automation 5015 - AENFTXT | 2024-08-22T06:00:00.000000Z | 2024-08-22T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-vmge-infodc-wpskamhp | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-smb-rv-cmd-inj-8pv9jmjd | Cisco Small Business RV Series Routers Command Injection Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-sbrv-rce-oylqbl9u | Cisco Small Business RV Series Routers Remote Code Execution Vulnerability | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-ros-dos-x7h7xhkk | Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-06T20:13:28+00:00 |
| cisco-sa-nfvis-mul-7dysrx9 | Cisco Enterprise NFV Infrastructure Software Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-clamav-html-xauok8mr | ClamAV HTML Scanning Memory Leak Vulnerability Affecting Cisco Products: May 2022 | 2022-05-04T16:00:00+00:00 | 2022-12-15T19:13:16+00:00 |
| cisco-sa-clamav-dos-zazbwrvg | ClamAV TIFF File Parsing Denial of Service Vulnerability Affecting Cisco Products: May 2022 | 2022-05-04T16:00:00+00:00 | 2022-12-15T19:03:44+00:00 |
| cisco-sa-clamav-dos-vl9x58p4 | ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: May 2022 | 2022-05-04T16:00:00+00:00 | 2022-05-04T20:36:47+00:00 |
| cisco-sa-clamav-dos-prvgchld | ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: May 2022 | 2022-05-04T16:00:00+00:00 | 2022-12-14T18:46:44+00:00 |
| cisco-sa-ftd-xmlinj-8gwjgzke | Cisco Firepower Threat Defense Software XML Injection Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-tcp-dos-km9shhou | Cisco Firepower Threat Defense Software TCP Proxy Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-snort3-dos-aq38lvdm | Cisco Firepower Threat Defense Software DNS Enforcement Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-snort-dos-hd2hfgm | Cisco Firepower Threat Defense Software Snort Out of Memory Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-sidns-bypass-3pza5po | Cisco Firepower Threat Defense Software Security Intelligence DNS Feed Bypass Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-dos-jnnjm4wb | Cisco Firepower Threat Defense Software Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-amp-local-dos-cufwrjxt | Cisco Firepower Threat Defense Software Local Malware Analysis Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-fmc-xss-sfpecvgt | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-28T16:24:30+00:00 |
| cisco-sa-fmc-xss-qxz4uakm | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-fmc-security-bypass-jhod29gg | Cisco Firepower Management Center File Upload Security Bypass Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-28T16:29:27+00:00 |
| cisco-sa-fmc-infdisc-gujwrwqu | Cisco Firepower Management Center Software Information Disclosure Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-asaftd-mgmt-privesc-bmfmuvye | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Privilege Escalation Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T16:39:47+00:00 |
| cisco-sa-asaftd-ipsec-mitm-cknlr4 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IPsec IKEv2 VPN Information Disclosure Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T17:03:06+00:00 |
| cisco-sa-asaftd-dos-njvawoeq | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software DNS Inspection Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2024-05-22T15:57:10+00:00 |
| cisco-sa-asafdt-webvpn-dos-tzpsyern | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-11-09T16:02:33+00:00 |
| cisco-sa-asa-ssl-vpn-heap-zlx3fdx | Cisco Adaptive Security Appliance Software Clientless SSL VPN Heap Overflow Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T16:25:45+00:00 |
| cisco-sa-asa-dos-tl4ua4aa | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-08-10T19:07:55+00:00 |
| cisco-sa-webex-xss-w47amqak | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-04-20T16:00:00+00:00 |
| cisco-sa-vpndtls-dos-tunzlev | Cisco Adaptive Security Appliance and Cisco Firepower Threat Defense Software AnyConnect SSL VPN Denial of Service Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-05-02T17:17:11+00:00 |
| cisco-sa-vim-privesc-t2tsfuf | Cisco Virtualized Infrastructure Manager Privilege Escalation Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-04-20T16:00:00+00:00 |
| cisco-sa-uva-static-key-6rqtrs4c | Cisco Umbrella Virtual Appliance Static SSH Host Key Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-04-20T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-59507 | Windows Speech Runtime Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59506 | DirectX Graphics Kernel Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59505 | Windows Smart Card Reader Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59504 | Azure Monitor Agent Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59499 | Microsoft SQL Server Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59245 | Microsoft SharePoint Online Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-20T00:00:00.000Z |
| msrc_cve-2025-59240 | Microsoft Excel Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-49752 | Azure Bastion Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-21T00:00:00.000Z |
| msrc_cve-2025-47179 | Configuration Manager Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-30398 | Nuance PowerScribe 360 Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-66382 | In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time. | 2025-11-02T00:00:00.000Z | 2026-02-21T03:59:21.000Z |
| msrc_cve-2025-66221 | Werkzeug safe_join() allows Windows special device names | 2025-11-02T00:00:00.000Z | 2025-12-09T01:37:04.000Z |
| msrc_cve-2025-66031 | node-forge ASN.1 Unbounded Recursion | 2025-11-02T00:00:00.000Z | 2025-12-04T14:36:01.000Z |
| msrc_cve-2025-66030 | node-forge ASN.1 OID Integer Truncation | 2025-11-02T00:00:00.000Z | 2025-12-04T14:35:55.000Z |
| msrc_cve-2025-65018 | LIBPNG is vulnerable to a heap buffer overflow in `png_combine_row` triggered via `png_image_finish_read` | 2025-11-02T00:00:00.000Z | 2025-12-02T01:40:36.000Z |
| msrc_cve-2025-64720 | LIBPNG is vulnerable to a buffer overflow in `png_image_read_composite` via incorrect palette premultiplication | 2025-11-02T00:00:00.000Z | 2025-12-02T01:40:57.000Z |
| msrc_cve-2025-64713 | WebAssembly Micro Runtime frame_offset_bottom array bounds overflow in fast Interpreter mode when handling GET_GLOBAL(I32) followed by if opcode | 2025-11-02T00:00:00.000Z | 2025-12-01T14:38:21.000Z |
| msrc_cve-2025-64704 | WebAssembly Micro Runtime vulnerable to a segmentation fault in v128.store instruction | 2025-11-02T00:00:00.000Z | 2025-12-01T14:38:13.000Z |
| msrc_cve-2025-64506 | LIBPNG is vulnerable to a heap buffer over-read in `png_write_image_8bit` with grayscale+alpha or RGB/RGBA images | 2025-11-02T00:00:00.000Z | 2025-12-03T01:38:33.000Z |
| msrc_cve-2025-64505 | LIBPNG is vulnerable to a heap buffer overflow in `png_do_quantize` via malformed palette index | 2025-11-02T00:00:00.000Z | 2025-12-03T01:38:21.000Z |
| msrc_cve-2025-64437 | KubeVirt Isolation Detection Flaw Allows Arbitrary File Permission Changes | 2025-11-02T00:00:00.000Z | 2026-01-02T14:39:46.000Z |
| msrc_cve-2025-64436 | KubeVirt Excessive Role Permissions Could Enable Unauthorized VMI Migrations Between Nodes | 2025-11-02T00:00:00.000Z | 2026-02-18T03:01:44.000Z |
| msrc_cve-2025-64435 | KubeVirt VMI Denial-of-Service (DoS) Using Pod Impersonation | 2025-11-02T00:00:00.000Z | 2026-01-08T14:37:49.000Z |
| msrc_cve-2025-64434 | KubeVirt Improper TLS Certificate Management Handling Allows API Identity Spoofing | 2025-11-02T00:00:00.000Z | 2026-01-13T01:40:10.000Z |
| msrc_cve-2025-64433 | KubeVirt Arbitrary Container File Read | 2025-11-02T00:00:00.000Z | 2026-01-02T14:39:25.000Z |
| msrc_cve-2025-64432 | KubeVirt Affected by an Authentication Bypass in Kubernetes Aggregation Layer | 2025-11-02T00:00:00.000Z | 2026-01-02T14:39:19.000Z |
| msrc_cve-2025-64329 | containerd CRI server: Host memory exhaustion through Attach goroutine leak | 2025-11-02T00:00:00.000Z | 2025-12-07T01:47:05.000Z |
| msrc_cve-2025-64324 | KubeVirt Vulnerable to Arbitrary Host File Read and Write | 2025-11-02T00:00:00.000Z | 2025-12-17T14:35:11.000Z |
| msrc_cve-2025-62689 | NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition. | 2025-11-02T00:00:00.000Z | 2025-11-25T01:40:58.000Z |
| msrc_cve-2025-61915 | OpenPrinting CUPS vulnerable to stack based out-of-bound write | 2025-11-02T00:00:00.000Z | 2026-01-02T14:40:04.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15434-1 | govulncheck-vulndb-0.0.20250811T192933-1.1 on GA media | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| opensuse-su-2025:15433-1 | framework-inputmodule-control-0.2.0-3.1 on GA media | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| opensuse-su-2025:15431-1 | nvidia-open-driver-G06-signed-default-devel-570.172.08-2.1 on GA media | 2025-08-10T00:00:00Z | 2025-08-10T00:00:00Z |
| opensuse-su-2025:15426-1 | keylime-ima-policy-0.2.7+141-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15425-1 | himmelblau-1.2.0+git.0.6befefc-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15424-1 | govulncheck-vulndb-0.0.20250807T150727-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15423-1 | go1.24-1.24.6-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15422-1 | go1.23-1.23.12-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15421-1 | chromedriver-139.0.7258.66-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15419-1 | traefik2-2.11.28-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15418-1 | traefik-3.5.0-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15417-1 | libtiff-devel-32bit-4.7.0-7.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15416-1 | libpoppler-cpp2-25.08.0-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15415-1 | libIex-3_3-32-3.3.5-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15414-1 | iperf-3.19.1-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15413-1 | ghostscript-10.05.1-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15412-1 | agama-17+60.68fdb92ec-26.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15410-1 | erlang-rabbitmq-client-3.13.7-5.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15409-1 | python313-3.13.5-4.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15408-1 | python312-3.12.11-4.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15407-1 | python311-3.11.13-4.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15406-1 | kubeshark-cli-52.8.0-1.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15405-1 | govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15398-1 | kwctl-1.27.1-1.1 on GA media | 2025-07-31T00:00:00Z | 2025-07-31T00:00:00Z |
| opensuse-su-2025:15397-1 | gdk-pixbuf-devel-2.42.12-4.1 on GA media | 2025-07-31T00:00:00Z | 2025-07-31T00:00:00Z |
| opensuse-su-2025:15393-1 | java-21-openj9-21.0.8.0-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| opensuse-su-2025:15392-1 | java-1_8_0-openj9-1.8.0.462-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| opensuse-su-2025:15391-1 | java-17-openj9-17.0.16.0-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| opensuse-su-2025:15390-1 | java-11-openj9-11.0.28.0-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| opensuse-su-2025:15389-1 | forgejo-longterm-11.0.3-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-1110 | Stack-buffer-overflow in dynapi_set_helper | 2023-11-04T13:01:06.700754Z | 2023-11-04T13:01:06.701003Z |
| osv-2023-1104 | Heap-buffer-overflow in bit_read_RC | 2023-11-03T13:00:39.940872Z | 2023-11-03T13:00:39.941107Z |
| osv-2023-1103 | Heap-buffer-overflow in OpenType::be_u32 | 2023-11-03T13:00:16.931853Z | 2023-11-03T13:00:16.932069Z |
| osv-2023-1101 | Heap-buffer-overflow in decode_preR13_entities | 2023-11-02T13:00:18.006273Z | 2023-11-02T13:00:18.006480Z |
| osv-2023-1099 | Heap-buffer-overflow in dwg_geojson_object | 2023-11-01T13:01:34.665175Z | 2023-11-01T13:01:34.665590Z |
| osv-2023-1098 | Segv on unknown address in ZEND_HANDLE_EXCEPTION_SPEC_HANDLER | 2023-11-01T13:01:21.266355Z | 2023-11-01T13:01:21.266677Z |
| osv-2023-1097 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2023-11-01T13:00:52.071904Z | 2023-11-01T13:00:52.072463Z |
| osv-2023-1095 | Heap-use-after-free in zend_jit_trace_execute | 2023-10-31T13:03:18.357724Z | 2023-11-01T17:42:22.538231Z |
| osv-2023-1093 | Stack-buffer-overflow in ndpi_handle_rule | 2023-10-31T13:02:51.707592Z | 2023-10-31T13:02:51.707857Z |
| osv-2023-1091 | Heap-buffer-overflow in H5F_addr_decode | 2023-10-31T13:01:22.289748Z | 2025-03-18T00:45:36.194874Z |
| osv-2023-1088 | Heap-buffer-overflow in arrow::Status arrow::Result<std::__1::unique_ptr<arrow::Buffer, std::__1::defaul | 2023-10-30T13:03:09.754708Z | 2023-11-29T14:16:28.700148Z |
| osv-2023-1079 | Heap-buffer-overflow in Calc_Length | 2023-10-28T13:02:49.535222Z | 2023-11-02T14:24:53.849577Z |
| osv-2023-1075 | Segv on unknown address in cleanup_live_vars | 2023-10-27T13:01:43.631205Z | 2023-11-04T18:09:50.793423Z |
| osv-2023-1073 | Heap-buffer-overflow in H5D__scatter_mem | 2023-10-27T13:00:49.296462Z | 2026-01-13T04:40:23.305571Z |
| osv-2023-1072 | UNKNOWN READ in igraph_strvector_set_len | 2023-10-27T13:00:37.573999Z | 2023-10-27T13:00:37.574322Z |
| osv-2023-1071 | Heap-use-after-free in igraph_pajek_yyparse | 2023-10-27T13:00:18.491498Z | 2023-10-27T13:00:18.492768Z |
| osv-2023-1070 | Segv on unknown address in igraph_strvector_set_len | 2023-10-26T13:02:51.638597Z | 2023-10-26T13:02:51.638896Z |
| osv-2023-1069 | Heap-use-after-free in igraph_pajek_yyparse | 2023-10-26T13:02:48.628038Z | 2023-10-26T13:02:48.628308Z |
| osv-2023-1068 | Heap-buffer-overflow in iasecc_parse_size | 2023-10-26T13:02:23.112449Z | 2023-10-26T13:02:23.112686Z |
| osv-2023-1063 | Heap-double-free in dwg_free_object | 2023-10-25T13:02:24.836979Z | 2023-10-25T13:02:24.837236Z |
| osv-2023-1062 | Heap-buffer-overflow in H5MM_xstrdup | 2023-10-25T13:01:17.608747Z | 2024-04-29T11:24:44.447081Z |
| osv-2023-1051 | Heap-buffer-overflow in dwg_json_VPORT_private | 2023-10-23T13:00:32.282560Z | 2023-10-23T13:00:32.282807Z |
| osv-2023-1050 | Heap-buffer-overflow in H5D__scatter_mem | 2023-10-23T13:00:17.701572Z | 2023-10-23T13:00:17.701814Z |
| osv-2023-1048 | Heap-buffer-overflow in decode_preR13_entities | 2023-10-22T13:01:31.381359Z | 2023-10-22T13:01:31.381601Z |
| osv-2023-1033 | Heap-buffer-overflow in Gfx::InputStreamer::read_u32 | 2023-10-20T13:00:25.024359Z | 2023-10-20T13:00:25.024683Z |
| osv-2023-1024 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2023-10-17T13:03:34.273057Z | 2023-10-17T13:03:34.273365Z |
| osv-2023-1016 | Use-of-uninitialized-value in Render_Single_Pass | 2023-10-14T13:02:55.073559Z | 2023-10-14T13:02:55.074040Z |
| osv-2023-1014 | Security exception in org.jsoup.parser.HtmlTreeBuilder.process | 2023-10-14T13:02:26.762298Z | 2023-10-14T13:02:26.762736Z |
| osv-2023-1012 | Global-buffer-overflow in iusace_quantize_lines | 2023-10-14T13:01:02.229783Z | 2023-10-14T13:01:02.230173Z |
| osv-2023-1009 | Security exception in net.jsign.bouncycastle.asn1.ASN1StreamParser.readVector | 2023-10-13T13:00:25.417249Z | 2023-10-13T13:00:25.417557Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0131 | Send/Sync bound needed on T for Send/Sync impl of RcuCell<T> | 2020-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0092 | Send/Sync bound needed on V in `impl Send/Sync for ARCache<K, V>` | 2020-11-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0080 | `miow` invalidly assumes the memory layout of std::net::SocketAddr | 2020-11-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0130 | Bunch<T> unconditionally implements Send/Sync | 2020-11-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0073 | Mutable reference with immutable provenance | 2020-11-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0069 | Argument injection in sendmail transport | 2020-11-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0159 | Potential segfault in `localtime_r` invocations | 2020-11-10T12:00:00Z | 2022-08-04T19:52:46Z |
| rustsec-2020-0140 | `Shared` can cause a data race | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0138 | ReaderResult should be bounded by Sync | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0137 | AtomicBox<T> lacks bound on its Send and Sync traits allowing data races | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0121 | AtomicBox<T> implements Send/Sync for any `T: Sized` | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0120 | `Decoder<R>` can carry `R: !Send` to other threads | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0111 | may_queue's Queue lacks Send/Sync bound for its Send/Sync trait. | 2020-11-10T12:00:00Z | 2024-10-25T18:45:36Z |
| rustsec-2020-0107 | hashconsing's HConsed lacks Send/Sync bound for its Send/Sync trait. | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0102 | LateStatic has incorrect Sync bound | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0096 | TreeFocus lacks bounds on its Send and Sync traits | 2020-11-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0070 | Some lock_api lock guard objects can cause data races | 2020-11-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0068 | Unexpected panic in multihash `from_slice` parsing code | 2020-11-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0078 | `net2` invalidly assumes the memory layout of std::net::SocketAddr | 2020-11-07T12:00:00Z | 2023-07-08T12:30:19Z |
| rustsec-2020-0079 | `socket2` invalidly assumes the memory layout of std::net::SocketAddr | 2020-11-06T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2020-0163 | `term_size` is unmaintained; use `terminal_size` instead | 2020-11-03T12:00:00Z | 2022-08-02T14:03:23Z |
| rustsec-2020-0145 | Use-after-free when cloning a partially consumed `Vec` iterator | 2020-11-02T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0081 | `mio` invalidly assumes the memory layout of std::net::SocketAddr | 2020-11-02T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0076 | crate has been renamed to `sn_routing` | 2020-11-02T12:00:00Z | 2020-12-02T17:59:27Z |
| rustsec-2020-0067 | crate has been renamed to `qp2p` | 2020-11-02T12:00:00Z | 2020-11-02T14:50:19Z |
| rustsec-2020-0066 | crate has been renamed to `sn_bindgen` | 2020-11-02T12:00:00Z | 2020-11-02T14:48:54Z |
| rustsec-2020-0065 | crate has been renamed to `sn_fake_clock` | 2020-11-02T12:00:00Z | 2020-11-02T14:46:33Z |
| rustsec-2020-0064 | crate has been renamed to `sn_ffi_utils` | 2020-11-02T12:00:00Z | 2020-11-02T14:45:15Z |
| rustsec-2020-0063 | crate has been renamed to `safe-nd` | 2020-11-02T12:00:00Z | 2020-11-02T14:43:36Z |
| rustsec-2020-0113 | AtomicOption should have Send + Sync bound on its type argument. | 2020-10-31T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-vault-2025-6015 | Vault Login MFA Bypass of Rate Limiting and TOTP Code Reuse | 2025-08-05T08:53:03.218Z | 2025-08-05T09:07:53.274Z |
| bit-vault-2025-6014 | Vault TOTP Secrets Engine Code Reuse | 2025-08-05T08:53:01.354Z | 2025-08-05T09:07:53.274Z |
| bit-vault-2025-6011 | Timing Side-Channel in Vault’s Userpass Auth Method | 2025-08-05T08:52:59.512Z | 2025-08-05T09:07:53.274Z |
| bit-vault-2025-6004 | Vault Userpass and LDAP User Lockout Bypass | 2025-08-05T08:52:57.711Z | 2025-08-05T09:07:53.274Z |
| bit-vault-2025-6000 | Arbitrary Remote Code Execution via Plugin Catalog Abuse | 2025-08-05T08:52:55.970Z | 2025-08-05T09:07:53.274Z |
| bit-vault-2025-5999 | Vault Root Namespace Operator May Elevate Token Privileges | 2025-08-05T08:52:54.433Z | 2025-08-05T09:07:53.274Z |
| bit-discourse-2025-53102 | Discourse's WebAuthn challenge isn't cleared from user session after authentication | 2025-07-31T08:44:37.045Z | 2025-07-31T09:12:45.664Z |
| bit-sqlite-2025-7458 | SQLite integer overflow in key info allocation may lead to information disclosure. | 2025-07-31T05:52:24.171Z | 2025-07-31T06:10:21.058Z |
| bit-golang-2025-4674 | Unexpected command execution in untrusted VCS repositories in cmd/go | 2025-07-31T05:44:23.042Z | 2025-11-06T13:25:46.476Z |
| bit-tomcat-2024-34750 | Apache Tomcat: HTTP/2 excess header handling DoS | 2025-07-29T14:30:29.115Z | 2026-02-11T09:09:18.507Z |
| bit-gitlab-2025-7001 | Insufficient Granularity of Access Control in GitLab | 2025-07-29T06:06:36.622Z | 2025-07-29T06:07:59.028Z |
| bit-gitlab-2025-4976 | Exposure of Sensitive Information Due to Incompatible Policies in GitLab | 2025-07-29T06:06:17.064Z | 2025-07-29T06:07:59.028Z |
| bit-gitlab-2025-4700 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-07-29T06:06:13.200Z | 2025-08-11T00:06:06.142Z |
| bit-gitlab-2025-4439 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-07-29T06:06:11.308Z | 2025-08-11T00:06:06.142Z |
| bit-gitlab-2025-1299 | Missing Authorization in GitLab | 2025-07-29T06:05:26.308Z | 2025-07-29T06:07:59.028Z |
| bit-gitlab-2025-0765 | Incorrect Authorization in GitLab | 2025-07-29T06:05:06.878Z | 2025-07-29T06:07:59.028Z |
| bit-harbor-2025-32019 | Harbor's repository description page allows for XSS | 2025-07-29T05:40:29.320Z | 2025-11-06T13:25:46.476Z |
| bit-apache-2025-54090 | Apache HTTP Server: 'RewriteCond expr' always evaluates to true in 2.4.64 | 2025-07-29T05:38:18.535Z | 2025-11-06T13:25:46.476Z |
| bit-wordpress-2025-41240 | 2025-07-23T14:00:00.000Z | 2025-07-23T14:00:00.000Z | |
| bit-drupal-2025-41240 | 2025-07-23T14:00:00.000Z | 2025-07-23T14:00:00.000Z | |
| bit-appsmith-2025-41240 | 2025-07-23T14:00:00.000Z | 2025-07-23T14:00:00.000Z | |
| bit-node-2025-27210 | 2025-07-22T16:44:59.921Z | 2025-11-06T13:25:46.476Z | |
| bit-node-2025-27209 | 2025-07-22T05:47:27.570Z | 2025-11-06T13:25:46.476Z | |
| bit-grafana-2025-6197 | 2025-07-22T05:41:23.514Z | 2025-07-22T06:07:25.512Z | |
| bit-grafana-2025-6023 | 2025-07-22T05:41:22.082Z | 2025-07-22T06:07:25.512Z | |
| bit-grafana-2025-3415 | 2025-07-22T05:41:15.588Z | 2025-07-22T06:07:25.512Z | |
| bit-tomcat-2024-24549 | Apache Tomcat: HTTP/2 header handling DoS | 2025-07-17T08:09:49.355Z | 2025-11-06T13:25:46.476Z |
| bit-tomcat-2024-23672 | Apache Tomcat: WebSocket DoS with incomplete closing handshake | 2025-07-17T08:09:47.503Z | 2025-11-06T13:25:46.476Z |
| bit-tomcat-2023-44487 | 2025-07-17T08:09:39.495Z | 2026-02-11T09:09:18.507Z | |
| bit-sqlite-2025-6965 | Integer Truncation on SQLite | 2025-07-16T18:03:02.187Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Updated |
|---|---|---|
| var-200706-0666 | Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apac… | 2024-07-23T20:50:38.808000Z |
| var-200803-0169 | The Cisco PIX/ASA Finesse Operation System 7.1 and 7.2 allows local users to gain privile… | 2024-07-23T20:50:33.392000Z |
| var-200110-0176 | Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox … | 2024-07-23T20:50:33.705000Z |
| var-201605-0075 | Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL befor… | 2024-07-23T20:50:28.659000Z |
| var-201008-1004 | The loginDefaultEncrypt algorithm in loginLib in Wind River VxWorks before 6.9 does not p… | 2024-07-23T20:50:25.420000Z |
| var-200505-1436 | zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users… | 2024-07-23T20:50:25.579000Z |
| var-202012-1546 | A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. d… | 2024-07-23T20:50:20.423000Z |
| var-200609-0782 | Multiple buffer overflows in the Apple Type Services (ATS) server in Mac OS X 10.4 throug… | 2024-07-23T20:49:47.183000Z |
| var-201503-0052 | Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in O… | 2024-07-23T20:49:46.592000Z |
| var-200905-0155 | Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denia… | 2024-07-23T20:49:45.261000Z |
| var-200707-0577 | Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used i… | 2024-07-23T20:49:41.081000Z |
| var-202103-1554 | Netty is an open-source, asynchronous event-driven network application framework for rapi… | 2024-07-23T20:49:40.283000Z |
| var-201504-0361 | The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x befor… | 2024-07-23T20:49:39.732000Z |
| var-200102-0027 | CBOS 2.4.1 and earlier in Cisco 600 routers allows remote attackers to cause a denial of … | 2024-07-23T20:49:36.601000Z |
| var-202011-0444 | Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker… | 2024-07-23T20:49:35.185000Z |
| var-201912-1849 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:49:34.258000Z |
| var-202005-0223 | SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shado… | 2024-07-23T20:49:32.020000Z |
| var-200811-0015 | Apple Safari before 3.2 does not properly prevent caching of form data for form fields th… | 2024-07-23T20:49:28.186000Z |
| var-202105-1306 | The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-… | 2024-07-23T20:49:26.394000Z |
| var-200505-0163 | Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when h… | 2024-07-23T20:48:54.841000Z |
| var-201211-0368 | Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS … | 2024-07-23T20:48:23.186000Z |
| var-201108-0149 | Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and … | 2024-07-23T20:47:46.652000Z |
| var-200505-0311 | Stack-based buffer overflow in the VPN daemon (vpnd) for Mac OS X before 10.3.9 allows lo… | 2024-07-23T20:47:42.176000Z |
| var-200504-0292 | Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote … | 2024-07-23T20:47:38.700000Z |
| var-201006-0051 | Cross-site request forgery (CSRF) vulnerability in the web interface in CUPS before 1.4.4… | 2024-07-23T20:46:54.348000Z |
| var-202201-0355 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. vim/vim Exists in a… | 2024-07-23T20:45:27.502000Z |
| var-201804-1210 | An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS b… | 2024-07-23T20:45:24.222000Z |
| var-200701-0400 | crashdump in Apple Mac OS X 10.4.8 allows local users in the admin group to modify arbitr… | 2024-07-23T20:45:22.440000Z |
| var-200701-0398 | Format string vulnerability in Apple Installer 2.1.5 on Mac OS X 10.4.8 allows user-assis… | 2024-07-23T20:45:19.199000Z |
| var-202005-1052 | When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.… | 2024-07-23T20:45:17.285000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-000049 | HOME SPOT CUBE2 vulnerable to OS command injection | 2022-06-29T13:42+09:00 | 2024-06-17T10:45+09:00 |
| jvndb-2022-000048 | L2Blocker Sensor setup screen vulnerable to authentication bypass | 2022-06-24T14:21+09:00 | 2024-06-18T10:45+09:00 |
| jvndb-2022-000047 | web2py vulnerable to open redirect | 2022-06-23T14:21+09:00 | 2024-06-18T10:48+09:00 |
| jvndb-2022-000046 | Gitlab vulnerable to server-side request forgery | 2022-06-17T12:26+09:00 | 2024-06-20T15:39+09:00 |
| jvndb-2022-001953 | Growi vulnerable to weak password requirements | 2022-06-15T17:47+09:00 | 2022-06-15T17:47+09:00 |
| jvndb-2022-000045 | FreeBSD vulnerable to denial-of-service (DoS) | 2022-06-15T12:28+09:00 | 2024-06-13T16:31+09:00 |
| jvndb-2022-000044 | Cisco Catalyst 2940 Series Switches vulnerable to cross-site scripting | 2022-06-14T13:46+09:00 | 2024-06-18T10:51+09:00 |
| jvndb-2022-000043 | SHIRASAGI vulnerable to cross-site scripting | 2022-06-09T13:31+09:00 | 2024-06-18T11:13+09:00 |
| jvndb-2022-001948 | Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service | 2022-06-03T12:17+09:00 | 2024-06-18T16:30+09:00 |
| jvndb-2022-000042 | T&D Data Server and THERMO RECORDER DATA SERVER contain a directory traversal vulnerability. | 2022-06-01T16:12+09:00 | 2024-06-18T10:34+09:00 |
| jvndb-2022-000041 | WordPress Plugin "Modern Events Calendar Lite" vulnerable to cross-site scripting | 2022-06-01T13:39+09:00 | 2024-06-18T10:42+09:00 |
| jvndb-2022-000039 | RevoWorks incomplete filtering of MS Office v4 macros | 2022-05-27T16:09+09:00 | 2024-06-18T16:31+09:00 |
| jvndb-2022-000040 | Mobaoku-Auction & Flea Market App for iOS vulnerable to improper server certificate verification | 2022-05-27T15:48+09:00 | 2024-06-18T11:06+09:00 |
| jvndb-2022-001929 | Multiple vulnerabilities in Fuji Electric V-SFT | 2022-05-27T15:39+09:00 | 2024-06-18T13:44+09:00 |
| jvndb-2022-001931 | Multiple vulnerabilities in Fuji Electric V-SFT, V-Server and V-Server Lite | 2022-05-27T15:37+09:00 | 2024-06-18T16:28+09:00 |
| jvndb-2022-001923 | Multiple vulnerabilities in CONTEC SolarView Compact | 2022-05-27T15:28+09:00 | 2024-06-20T11:34+09:00 |
| jvndb-2022-001809 | Trend Micro Password Manager vulnerable to privilege escalation | 2022-05-24T15:27+09:00 | 2024-06-18T17:52+09:00 |
| jvndb-2022-000038 | WordPress plugin "WP Statistics" vulnerable to cross-site scripting | 2022-05-24T15:00+09:00 | 2024-06-18T15:41+09:00 |
| jvndb-2022-000037 | Spring Security OAuth (spring-security-oauth2) vulnerable to denial-of-service (DoS) | 2022-05-20T17:04+09:00 | 2024-06-20T12:09+09:00 |
| jvndb-2022-000036 | Multiple vulnerabilities in Rakuten Casa | 2022-05-19T15:13+09:00 | 2024-06-18T12:09+09:00 |
| jvndb-2022-000035 | Multiple vulnerabilities in Cybozu Garoon | 2022-05-16T14:25+09:00 | 2024-06-17T16:34+09:00 |
| jvndb-2022-000033 | Strapi vulnerable to cross-site scripting | 2022-05-13T16:45+09:00 | 2024-06-18T11:17+09:00 |
| jvndb-2022-000034 | EC-CUBE plugin "Easy Blog for EC-CUBE4" vulnerable to cross-site request forgery | 2022-05-13T16:31+09:00 | 2024-06-18T12:13+09:00 |
| jvndb-2022-001800 | Installer of Trend Micro HouseCall for Home Networks may insecurely load Dynamic Link Libraries | 2022-05-13T16:24+09:00 | 2022-05-13T16:24+09:00 |
| jvndb-2022-001795 | Command injection vulnerability in QNAP VioStar series NVR | 2022-05-12T18:07+09:00 | 2024-06-20T11:31+09:00 |
| jvndb-2022-000032 | Installer of Trend Micro Password Manager may insecurely load Dynamic Link Libraries | 2022-05-11T15:21+09:00 | 2024-06-18T17:46+09:00 |
| jvndb-2022-000031 | GENEREX RCCMD vulnerable to directory traversal | 2022-05-10T15:47+09:00 | 2024-06-18T15:35+09:00 |
| jvndb-2022-000030 | Multiple vulnerabilities in Operation management interface of FUJITSU Network IPCOM | 2022-05-09T15:02+09:00 | 2024-07-18T16:30+09:00 |
| jvndb-2022-000029 | KOYO Electronics Screen Creator Advance2 vulnerable to authentication bypass | 2022-05-09T14:43+09:00 | 2024-06-19T16:03+09:00 |
| jvndb-2022-000028 | Multiple vulnerabilities in multiple MEIKYO ELECTRIC products | 2022-05-09T14:31+09:00 | 2024-06-19T15:55+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:4170-1 | Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5) | 2025-11-23T11:34:32Z | 2025-11-23T11:34:32Z |
| suse-su-2025:4169-1 | Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2025-11-22T08:34:35Z | 2025-11-22T08:34:35Z |
| suse-su-2025:4164-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2025-11-22T08:34:31Z | 2025-11-22T08:34:31Z |
| suse-su-2025:4167-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2025-11-22T08:05:38Z | 2025-11-22T08:05:38Z |
| suse-su-2025:4161-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise 15 SP6) | 2025-11-22T08:05:20Z | 2025-11-22T08:05:20Z |
| suse-su-2025:4160-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise 15 SP6) | 2025-11-22T07:34:28Z | 2025-11-22T07:34:28Z |
| suse-su-2025:4159-1 | Security update for tomcat | 2025-11-21T14:31:51Z | 2025-11-21T14:31:51Z |
| suse-su-2025:4158-1 | Security update for cups-filters | 2025-11-21T14:30:38Z | 2025-11-21T14:30:38Z |
| suse-su-2025:4157-1 | Security update for podman | 2025-11-21T14:30:17Z | 2025-11-21T14:30:17Z |
| suse-su-2025:4156-1 | Security update for podman | 2025-11-21T14:29:28Z | 2025-11-21T14:29:28Z |
| suse-su-2025:21063-1 | Security update for glib2 | 2025-11-21T13:14:32Z | 2025-11-21T13:14:32Z |
| suse-su-2025:21062-1 | Security update for grub2 | 2025-11-21T13:08:14Z | 2025-11-21T13:08:14Z |
| suse-su-2025:4152-1 | Security update for grub2 | 2025-11-21T09:10:39Z | 2025-11-21T09:10:39Z |
| suse-su-2025:21137-1 | Security update for alloy | 2025-11-20T17:15:36Z | 2025-11-20T17:15:36Z |
| suse-su-2025:21136-1 | Security update for runc | 2025-11-20T16:43:58Z | 2025-11-20T16:43:58Z |
| suse-su-2025:21072-1 | Security update for runc | 2025-11-20T16:43:58Z | 2025-11-20T16:43:58Z |
| suse-su-2025:4149-1 | Security update for the Linux Kernel | 2025-11-20T15:41:46Z | 2025-11-20T15:41:46Z |
| suse-su-2025:21132-1 | Security update for poppler | 2025-11-20T13:33:08Z | 2025-11-20T13:33:08Z |
| suse-su-2025:21050-1 | Security update for unbound | 2025-11-20T11:36:47Z | 2025-11-20T11:36:47Z |
| suse-su-2025:4148-1 | Security update for ghostscript | 2025-11-20T10:14:20Z | 2025-11-20T10:14:20Z |
| suse-su-2025:4143-1 | Security update for grub2 | 2025-11-20T07:54:03Z | 2025-11-20T07:54:03Z |
| suse-su-2025:21021-1 | Security update for MozillaFirefox | 2025-11-19T18:22:27Z | 2025-11-19T18:22:27Z |
| suse-su-2025:4141-1 | Security update for the Linux Kernel | 2025-11-19T14:06:18Z | 2025-11-19T14:06:18Z |
| suse-su-2025:4140-1 | Security update for the Linux Kernel | 2025-11-19T13:15:27Z | 2025-11-19T13:15:27Z |
| suse-su-2025:4139-1 | Security update for the Linux Kernel | 2025-11-19T13:12:14Z | 2025-11-19T13:12:14Z |
| suse-su-2025:21016-1 | Security update for ongres-scram | 2025-11-19T10:17:29Z | 2025-11-19T10:17:29Z |
| suse-su-2025:4137-1 | Security update for gimp | 2025-11-19T10:01:00Z | 2025-11-19T10:01:00Z |
| suse-su-2025:21014-1 | Security update for openexr | 2025-11-19T09:46:11Z | 2025-11-19T09:46:11Z |
| suse-su-2025:21032-1 | Security update for tiff | 2025-11-19T09:41:55Z | 2025-11-19T09:41:55Z |
| suse-su-2025:21009-1 | Security update for tiff | 2025-11-19T09:41:55Z | 2025-11-19T09:41:55Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-03501 | Google Android缺少权限检查漏洞(CNVD-2026-0350183) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03500 | Google Android拒绝服务漏洞(CNVD-2026-0350084) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03499 | Google Android输入验证不当漏洞(CNVD-2026-0349985) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03498 | Google Android拒绝服务漏洞(CNVD-2026-0349886) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03497 | Google Android点击劫持漏洞(CNVD-2026-0349787) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03496 | Google Android输入验证不当漏洞(CNVD-2026-0349688) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03495 | Google Android逻辑错误漏洞(CNVD-2026-0349589) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03494 | Google Android拒绝服务漏洞(CNVD-2026-0349490) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03493 | Google Android缺少权限检查漏洞(CNVD-2026-0349391) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03492 | Google Android逻辑错误漏洞(CNVD-2026-0349292) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03491 | Google Android权限绕过漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03490 | Google Android缺少权限检查漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03489 | Google Android输入验证不当漏洞(CNVD-2026-0348995) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03488 | Google Android逻辑错误漏洞(CNVD-2026-0348896) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03487 | Google Android点击劫持漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03486 | Google Android拒绝服务漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03485 | Google Android逻辑错误漏洞(CNVD-2026-0348599) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03484 | Google Android混淆代理漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03483 | Google Android输入验证不当漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03482 | Google Android权限提升漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03481 | Google Android逻辑错误漏洞(CNVD-2026-0348103) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03480 | Google Android逻辑错误漏洞(CNVD-2026-0348004) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03479 | Google Android逻辑错误漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03058 | Google Android混淆代理漏洞 | 2025-12-10 | 2026-01-14 |
| cnvd-2026-02976 | Google Android权限提升漏洞(CNVD-2026-02976) | 2025-12-10 | 2026-01-13 |
| cnvd-2026-02975 | Google Android拒绝服务漏洞(CNVD-2026-02975) | 2025-12-10 | 2026-01-13 |
| cnvd-2026-02974 | Google Android权限提升漏洞(CNVD-2026-02974) | 2025-12-10 | 2026-01-13 |
| cnvd-2026-02964 | Google Android拒绝服务漏洞(CNVD-2026-02964) | 2025-12-10 | 2026-01-13 |
| cnvd-2026-02962 | Google Android拒绝服务漏洞(CNVD-2026-02962) | 2025-12-10 | 2026-01-13 |
| cnvd-2026-02949 | Google Android权限提升漏洞(CNVD-2026-02949) | 2025-12-10 | 2026-01-13 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0966 | Multiples vulnérabilités dans les produits Microsoft | 2025-11-05T00:00:00.000000 | 2025-11-05T00:00:00.000000 |
| certfr-2025-avi-0965 | Multiples vulnérabilités dans MISP | 2025-11-05T00:00:00.000000 | 2025-11-05T00:00:00.000000 |
| certfr-2025-avi-0964 | Vulnérabilité dans Curl | 2025-11-05T00:00:00.000000 | 2025-11-05T00:00:00.000000 |
| CERTFR-2025-AVI-0967 | Multiples vulnérabilités dans les produits VMware | 2025-11-05T00:00:00.000000 | 2025-11-05T00:00:00.000000 |
| CERTFR-2025-AVI-0966 | Multiples vulnérabilités dans les produits Microsoft | 2025-11-05T00:00:00.000000 | 2025-11-05T00:00:00.000000 |
| CERTFR-2025-AVI-0965 | Multiples vulnérabilités dans MISP | 2025-11-05T00:00:00.000000 | 2025-11-05T00:00:00.000000 |
| CERTFR-2025-AVI-0964 | Vulnérabilité dans Curl | 2025-11-05T00:00:00.000000 | 2025-11-05T00:00:00.000000 |
| certfr-2025-avi-0963 | Multiples vulnérabilités dans Google Android | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| certfr-2025-avi-0962 | Vulnérabilité dans Dovecot | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| certfr-2025-avi-0961 | Multiples vulnérabilités dans les produits Apple | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| certfr-2025-avi-0960 | Multiples vulnérabilités dans VMware Tanzu | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| certfr-2025-avi-0959 | Vulnérabilité dans Python | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| certfr-2025-avi-0958 | Multiples vulnérabilités dans Tenable Identity Exposure | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| CERTFR-2025-AVI-0963 | Multiples vulnérabilités dans Google Android | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| CERTFR-2025-AVI-0962 | Vulnérabilité dans Dovecot | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| CERTFR-2025-AVI-0961 | Multiples vulnérabilités dans les produits Apple | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| CERTFR-2025-AVI-0960 | Multiples vulnérabilités dans VMware Tanzu | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| CERTFR-2025-AVI-0959 | Vulnérabilité dans Python | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| CERTFR-2025-AVI-0958 | Multiples vulnérabilités dans Tenable Identity Exposure | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| certfr-2025-avi-0957 | Multiples vulnérabilités dans Moodle | 2025-11-03T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| certfr-2025-avi-0956 | Multiples vulnérabilités dans MariaDB | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| certfr-2025-avi-0955 | Multiples vulnérabilités dans Microsoft Edge | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| certfr-2025-avi-0954 | Multiples vulnérabilités dans Liferay | 2025-11-03T00:00:00.000000 | 2025-11-14T00:00:00.000000 |
| certfr-2025-avi-0953 | Vulnérabilité dans Elastic Cloud Enterprise | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| certfr-2025-avi-0952 | Vulnérabilité dans Mattermost Server | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| certfr-2025-avi-0951 | Multiples vulnérabilités dans Axis OS | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| CERTFR-2025-AVI-0957 | Multiples vulnérabilités dans Moodle | 2025-11-03T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| CERTFR-2025-AVI-0956 | Multiples vulnérabilités dans MariaDB | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| CERTFR-2025-AVI-0955 | Multiples vulnérabilités dans Microsoft Edge | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| CERTFR-2025-AVI-0954 | Multiples vulnérabilités dans Liferay | 2025-11-03T00:00:00.000000 | 2025-11-14T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2001-ale-009 | Propagation importante du virus SirCam | 2001-07-24T00:00:00.000000 | 2001-07-26T00:00:00.000000 |
| CERTA-2001-ALE-009 | Propagation importante du virus SirCam | 2001-07-24T00:00:00.000000 | 2001-07-26T00:00:00.000000 |
| certa-2001-ale-008 | Propagation du ver « Code Red » | 2001-07-18T00:00:00.000000 | 2001-08-13T00:00:00.000000 |
| CERTA-2001-ALE-008 | Propagation du ver « Code Red » | 2001-07-18T00:00:00.000000 | 2001-08-13T00:00:00.000000 |
| certa-2001-ale-007 | Propagation d'un ver affectant sadmind et IIS | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| certa-2001-ale-006 | Prolifération en Europe du virus HOMEPAGE | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| CERTA-2001-ALE-007 | Propagation d'un ver affectant sadmind et IIS | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| CERTA-2001-ALE-006 | Prolifération en Europe du virus HOMEPAGE | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| certa-2001-ale-005 | Vulnérabilités dans les modems ADSL d'Alcatel | 2001-04-11T00:00:00.000000 | 2001-04-11T00:00:00.000000 |
| CERTA-2001-ALE-005 | Vulnérabilités dans les modems ADSL d'Alcatel | 2001-04-11T00:00:00.000000 | 2001-04-11T00:00:00.000000 |
| certa-2001-ale-004 | Vulnérabilité dans le démon snmpXdmid sous Sun Solaris | 2001-03-30T00:00:00.000000 | 2001-03-30T00:00:00.000000 |
| CERTA-2001-ALE-004 | Vulnérabilité dans le démon snmpXdmid sous Sun Solaris | 2001-03-30T00:00:00.000000 | 2001-03-30T00:00:00.000000 |
| certa-2001-ale-003 | Prolifération du ver Li0n | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| certa-2001-ale-002 | Risque d'exploitation des ressources partagées sous Windows | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| CERTA-2001-ALE-003 | Prolifération du ver Li0n | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| CERTA-2001-ALE-002 | Risque d'exploitation des ressources partagées sous Windows | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| certa-2001-ale-001 | Propagation du ver Ramen sous Linux. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| CERTA-2001-ALE-001 | Propagation du ver Ramen sous Linux. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| certa-2000-ale-016 | Connexion à Wanadoo | 2000-11-30T00:00:00.000000 | 2000-11-30T00:00:00.000000 |
| CERTA-2000-ALE-016 | Connexion à Wanadoo | 2000-11-30T00:00:00.000000 | 2000-11-30T00:00:00.000000 |
| certa-2000-ale-015 | Risque d'usurpation de l'identité de Sun Microsystems | 2000-10-25T00:00:00.000000 | 2000-10-25T00:00:00.000000 |
| CERTA-2000-ALE-015 | Risque d'usurpation de l'identité de Sun Microsystems | 2000-10-25T00:00:00.000000 | 2000-10-25T00:00:00.000000 |
| certa-2000-ale-013 | Virus VBS Quatro-A | 2000-09-18T00:00:00.000000 | 2000-09-18T00:00:00.000000 |
| CERTA-2000-ALE-013 | Virus VBS Quatro-A | 2000-09-18T00:00:00.000000 | 2000-09-18T00:00:00.000000 |
| certa-2000-ale-014 | Vulnérabilité dans la bibliothèque glibc sous Unix | 2000-09-14T00:00:00.000000 | 2000-09-14T00:00:00.000000 |
| CERTA-2000-ALE-014 | Vulnérabilité dans la bibliothèque glibc sous Unix | 2000-09-14T00:00:00.000000 | 2000-09-14T00:00:00.000000 |
| certa-2000-ale-012 | Mauvaise compatibilité des scanners de virus avec NTFS | 2000-09-08T00:00:00.000000 | 2000-09-08T00:00:00.000000 |
| CERTA-2000-ALE-012 | Mauvaise compatibilité des scanners de virus avec NTFS | 2000-09-08T00:00:00.000000 | 2000-09-08T00:00:00.000000 |
| certa-2000-ale-011 | Trojan Simpsons | 2000-06-29T00:00:00.000000 | 2000-06-29T00:00:00.000000 |
| CERTA-2000-ALE-011 | Trojan Simpsons | 2000-06-29T00:00:00.000000 | 2000-06-29T00:00:00.000000 |