Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23180 |
N/A
|
dpaa2-switch: add bounds check for if_id in IRQ handler |
Linux |
Linux |
2026-02-14T16:27:11.463Z | 2026-02-14T16:27:11.463Z |
| CVE-2026-23179 |
N/A
|
nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() |
Linux |
Linux |
2026-02-14T16:27:10.778Z | 2026-02-14T16:27:10.778Z |
| CVE-2026-23178 |
N/A
|
HID: i2c-hid: fix potential buffer overflow in i2c_hid… |
Linux |
Linux |
2026-02-14T16:27:10.108Z | 2026-02-14T16:27:10.108Z |
| CVE-2026-23177 |
N/A
|
mm, shmem: prevent infinite loop on truncate race |
Linux |
Linux |
2026-02-14T16:27:09.429Z | 2026-02-14T16:27:09.429Z |
| CVE-2026-23176 |
N/A
|
platform/x86: toshiba_haps: Fix memory leaks in add/re… |
Linux |
Linux |
2026-02-14T16:27:08.764Z | 2026-02-14T16:27:08.764Z |
| CVE-2026-23175 |
N/A
|
net: cpsw: Execute ndo_set_rx_mode callback in a work queue |
Linux |
Linux |
2026-02-14T16:27:08.104Z | 2026-02-14T16:27:08.104Z |
| CVE-2026-23174 |
N/A
|
nvme-pci: handle changing device dma map requirements |
Linux |
Linux |
2026-02-14T16:27:07.421Z | 2026-02-14T16:27:07.421Z |
| CVE-2025-71224 |
N/A
|
wifi: mac80211: ocb: skip rx_no_sta when interface is … |
Linux |
Linux |
2026-02-14T16:27:06.752Z | 2026-02-14T16:27:06.752Z |
| CVE-2025-71223 |
N/A
|
smb/server: fix refcount leak in smb2_open() |
Linux |
Linux |
2026-02-14T16:27:06.060Z | 2026-02-14T16:27:06.060Z |
| CVE-2025-71222 |
N/A
|
wifi: wlcore: ensure skb headroom before skb_push |
Linux |
Linux |
2026-02-14T16:27:05.363Z | 2026-02-14T16:27:05.363Z |
| CVE-2025-71221 |
N/A
|
dmaengine: mmp_pdma: Fix race condition in mmp_pdma_re… |
Linux |
Linux |
2026-02-14T16:27:04.631Z | 2026-02-14T16:27:04.631Z |
| CVE-2025-71220 |
N/A
|
smb/server: call ksmbd_session_rpc_close() on error pa… |
Linux |
Linux |
2026-02-14T16:27:03.946Z | 2026-02-14T16:27:03.946Z |
| CVE-2025-71204 |
N/A
|
smb/server: fix refcount leak in parse_durable_handle_… |
Linux |
Linux |
2026-02-14T16:27:03.252Z | 2026-02-14T16:27:03.252Z |
| CVE-2025-71203 |
N/A
|
riscv: Sanitize syscall table indexing under speculation |
Linux |
Linux |
2026-02-14T16:27:02.513Z | 2026-02-14T16:27:02.513Z |
| CVE-2026-23173 |
N/A
|
net/mlx5e: TC, delete flows only for existing peers |
Linux |
Linux |
2026-02-14T16:01:34.842Z | 2026-02-14T16:01:34.842Z |
| CVE-2026-23172 |
N/A
|
net: wwan: t7xx: fix potential skb->frags overflow in … |
Linux |
Linux |
2026-02-14T16:01:34.165Z | 2026-02-14T16:01:34.165Z |
| CVE-2026-23171 |
N/A
|
bonding: fix use-after-free due to enslave fail after … |
Linux |
Linux |
2026-02-14T16:01:33.489Z | 2026-02-14T16:01:33.489Z |
| CVE-2026-23170 |
N/A
|
drm/imx/tve: fix probe device leak |
Linux |
Linux |
2026-02-14T16:01:32.833Z | 2026-02-14T16:01:32.833Z |
| CVE-2026-23169 |
N/A
|
mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() |
Linux |
Linux |
2026-02-14T16:01:32.139Z | 2026-02-14T16:01:32.139Z |
| CVE-2026-23168 |
N/A
|
flex_proportions: make fprop_new_period() hardirq safe |
Linux |
Linux |
2026-02-14T16:01:31.465Z | 2026-02-14T16:01:31.465Z |
| CVE-2026-23167 |
N/A
|
nfc: nci: Fix race between rfkill and nci_unregister_d… |
Linux |
Linux |
2026-02-14T16:01:30.755Z | 2026-02-14T16:01:30.755Z |
| CVE-2026-23166 |
N/A
|
ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues |
Linux |
Linux |
2026-02-14T16:01:30.059Z | 2026-02-14T16:01:30.059Z |
| CVE-2026-23165 |
N/A
|
sfc: fix deadlock in RSS config read |
Linux |
Linux |
2026-02-14T16:01:29.336Z | 2026-02-14T16:01:29.336Z |
| CVE-2026-23164 |
N/A
|
rocker: fix memory leak in rocker_world_port_post_fini() |
Linux |
Linux |
2026-02-14T16:01:28.624Z | 2026-02-14T16:01:28.624Z |
| CVE-2026-23163 |
N/A
|
drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc… |
Linux |
Linux |
2026-02-14T16:01:27.912Z | 2026-02-14T16:01:27.912Z |
| CVE-2026-23162 |
N/A
|
drm/xe/nvm: Fix double-free on aux add failure |
Linux |
Linux |
2026-02-14T16:01:27.243Z | 2026-02-14T16:01:27.243Z |
| CVE-2026-23161 |
N/A
|
mm/shmem, swap: fix race of truncate and swap entry split |
Linux |
Linux |
2026-02-14T16:01:26.569Z | 2026-02-14T16:01:26.569Z |
| CVE-2026-23160 |
N/A
|
octeon_ep: Fix memory leak in octep_device_setup() |
Linux |
Linux |
2026-02-14T16:01:25.900Z | 2026-02-14T16:01:25.900Z |
| CVE-2026-23159 |
N/A
|
perf: sched: Fix perf crash with new is_user_task() helper |
Linux |
Linux |
2026-02-14T16:01:25.229Z | 2026-02-14T16:01:25.229Z |
| CVE-2026-23158 |
N/A
|
gpio: virtuser: fix UAF in configfs release path |
Linux |
Linux |
2026-02-14T16:01:24.568Z | 2026-02-14T16:01:24.568Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23180 |
N/A
|
dpaa2-switch: add bounds check for if_id in IRQ handler |
Linux |
Linux |
2026-02-14T16:27:11.463Z | 2026-02-14T16:27:11.463Z |
| CVE-2026-23179 |
N/A
|
nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() |
Linux |
Linux |
2026-02-14T16:27:10.778Z | 2026-02-14T16:27:10.778Z |
| CVE-2026-23178 |
N/A
|
HID: i2c-hid: fix potential buffer overflow in i2c_hid… |
Linux |
Linux |
2026-02-14T16:27:10.108Z | 2026-02-14T16:27:10.108Z |
| CVE-2026-23177 |
N/A
|
mm, shmem: prevent infinite loop on truncate race |
Linux |
Linux |
2026-02-14T16:27:09.429Z | 2026-02-14T16:27:09.429Z |
| CVE-2026-23176 |
N/A
|
platform/x86: toshiba_haps: Fix memory leaks in add/re… |
Linux |
Linux |
2026-02-14T16:27:08.764Z | 2026-02-14T16:27:08.764Z |
| CVE-2026-23175 |
N/A
|
net: cpsw: Execute ndo_set_rx_mode callback in a work queue |
Linux |
Linux |
2026-02-14T16:27:08.104Z | 2026-02-14T16:27:08.104Z |
| CVE-2026-23174 |
N/A
|
nvme-pci: handle changing device dma map requirements |
Linux |
Linux |
2026-02-14T16:27:07.421Z | 2026-02-14T16:27:07.421Z |
| CVE-2025-71224 |
N/A
|
wifi: mac80211: ocb: skip rx_no_sta when interface is … |
Linux |
Linux |
2026-02-14T16:27:06.752Z | 2026-02-14T16:27:06.752Z |
| CVE-2025-71223 |
N/A
|
smb/server: fix refcount leak in smb2_open() |
Linux |
Linux |
2026-02-14T16:27:06.060Z | 2026-02-14T16:27:06.060Z |
| CVE-2025-71222 |
N/A
|
wifi: wlcore: ensure skb headroom before skb_push |
Linux |
Linux |
2026-02-14T16:27:05.363Z | 2026-02-14T16:27:05.363Z |
| CVE-2025-71221 |
N/A
|
dmaengine: mmp_pdma: Fix race condition in mmp_pdma_re… |
Linux |
Linux |
2026-02-14T16:27:04.631Z | 2026-02-14T16:27:04.631Z |
| CVE-2025-71220 |
N/A
|
smb/server: call ksmbd_session_rpc_close() on error pa… |
Linux |
Linux |
2026-02-14T16:27:03.946Z | 2026-02-14T16:27:03.946Z |
| CVE-2025-71204 |
N/A
|
smb/server: fix refcount leak in parse_durable_handle_… |
Linux |
Linux |
2026-02-14T16:27:03.252Z | 2026-02-14T16:27:03.252Z |
| CVE-2025-71203 |
N/A
|
riscv: Sanitize syscall table indexing under speculation |
Linux |
Linux |
2026-02-14T16:27:02.513Z | 2026-02-14T16:27:02.513Z |
| CVE-2026-23173 |
N/A
|
net/mlx5e: TC, delete flows only for existing peers |
Linux |
Linux |
2026-02-14T16:01:34.842Z | 2026-02-14T16:01:34.842Z |
| CVE-2026-23172 |
N/A
|
net: wwan: t7xx: fix potential skb->frags overflow in … |
Linux |
Linux |
2026-02-14T16:01:34.165Z | 2026-02-14T16:01:34.165Z |
| CVE-2026-23171 |
N/A
|
bonding: fix use-after-free due to enslave fail after … |
Linux |
Linux |
2026-02-14T16:01:33.489Z | 2026-02-14T16:01:33.489Z |
| CVE-2026-23170 |
N/A
|
drm/imx/tve: fix probe device leak |
Linux |
Linux |
2026-02-14T16:01:32.833Z | 2026-02-14T16:01:32.833Z |
| CVE-2026-23169 |
N/A
|
mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() |
Linux |
Linux |
2026-02-14T16:01:32.139Z | 2026-02-14T16:01:32.139Z |
| CVE-2026-23168 |
N/A
|
flex_proportions: make fprop_new_period() hardirq safe |
Linux |
Linux |
2026-02-14T16:01:31.465Z | 2026-02-14T16:01:31.465Z |
| CVE-2026-23167 |
N/A
|
nfc: nci: Fix race between rfkill and nci_unregister_d… |
Linux |
Linux |
2026-02-14T16:01:30.755Z | 2026-02-14T16:01:30.755Z |
| CVE-2026-23166 |
N/A
|
ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues |
Linux |
Linux |
2026-02-14T16:01:30.059Z | 2026-02-14T16:01:30.059Z |
| CVE-2026-23165 |
N/A
|
sfc: fix deadlock in RSS config read |
Linux |
Linux |
2026-02-14T16:01:29.336Z | 2026-02-14T16:01:29.336Z |
| CVE-2026-23164 |
N/A
|
rocker: fix memory leak in rocker_world_port_post_fini() |
Linux |
Linux |
2026-02-14T16:01:28.624Z | 2026-02-14T16:01:28.624Z |
| CVE-2026-23163 |
N/A
|
drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc… |
Linux |
Linux |
2026-02-14T16:01:27.912Z | 2026-02-14T16:01:27.912Z |
| CVE-2026-23162 |
N/A
|
drm/xe/nvm: Fix double-free on aux add failure |
Linux |
Linux |
2026-02-14T16:01:27.243Z | 2026-02-14T16:01:27.243Z |
| CVE-2026-23161 |
N/A
|
mm/shmem, swap: fix race of truncate and swap entry split |
Linux |
Linux |
2026-02-14T16:01:26.569Z | 2026-02-14T16:01:26.569Z |
| CVE-2026-23160 |
N/A
|
octeon_ep: Fix memory leak in octep_device_setup() |
Linux |
Linux |
2026-02-14T16:01:25.900Z | 2026-02-14T16:01:25.900Z |
| CVE-2026-23159 |
N/A
|
perf: sched: Fix perf crash with new is_user_task() helper |
Linux |
Linux |
2026-02-14T16:01:25.229Z | 2026-02-14T16:01:25.229Z |
| CVE-2026-23158 |
N/A
|
gpio: virtuser: fix UAF in configfs release path |
Linux |
Linux |
2026-02-14T16:01:24.568Z | 2026-02-14T16:01:24.568Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-13393 | The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to Server-Side Request Forger… | 2026-01-10T14:15:49.907 | 2026-01-13T14:03:18.990 |
| fkie_cve-2025-12379 | The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cros… | 2026-01-10T14:15:49.690 | 2026-01-13T14:03:18.990 |
| fkie_cve-2026-0821 | A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the f… | 2026-01-10T13:15:49.040 | 2026-01-15T22:22:36.770 |
| fkie_cve-2025-14555 | The Countdown Timer – Widget Countdown plugin for WordPress is vulnerable to Stored Cross-Site Scri… | 2026-01-10T13:15:48.353 | 2026-01-13T14:03:18.990 |
| fkie_cve-2025-15504 | A security flaw has been discovered in lief-project LIEF up to 0.17.1. Affected by this issue is th… | 2026-01-10T12:15:49.570 | 2026-01-22T21:36:45.240 |
| fkie_cve-2025-14506 | The ConvertForce Popup Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting vi… | 2026-01-10T12:15:48.563 | 2026-01-13T14:03:18.990 |
| fkie_cve-2026-0831 | The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, an… | 2026-01-10T10:15:50.960 | 2026-01-13T14:03:18.990 |
| fkie_cve-2025-62235 | Authentication Bypass by Spoofing vulnerability in Apache NimBLE. Receiving specially crafted Secu… | 2026-01-10T10:15:50.820 | 2026-01-14T17:45:58.133 |
| fkie_cve-2025-53477 | NULL Pointer Dereference vulnerability in Apache Nimble. Missing validation of HCI connection comp… | 2026-01-10T10:15:50.660 | 2026-01-14T17:38:58.047 |
| fkie_cve-2025-53470 | Out-of-bounds Read vulnerability in Apache NimBLE HCI H4 driver. Specially crafted HCI event could… | 2026-01-10T10:15:50.493 | 2026-01-14T17:38:48.897 |
| fkie_cve-2025-52435 | J2EE Misconfiguration: Data Transmission Without Encryption vulnerability in Apache NimBLE. Improp… | 2026-01-10T10:15:50.320 | 2026-01-14T16:30:55.960 |
| fkie_cve-2025-15503 | A security flaw has been discovered in Sangfor Operation and Maintenance Management System up to 3.… | 2026-01-10T09:15:49.850 | 2026-01-22T19:47:37.580 |
| fkie_cve-2025-14976 | The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Prof… | 2026-01-10T09:15:48.863 | 2026-01-13T14:03:18.990 |
| fkie_cve-2025-15502 | A vulnerability was identified in Sangfor Operation and Maintenance Management System up to 3.0.8. … | 2026-01-10T08:15:48.753 | 2026-01-22T19:43:53.410 |
| fkie_cve-2026-22777 | ComfyUI-Manager is an extension designed to enhance the usability of ComfyUI. Prior to versions 3.3… | 2026-01-10T07:16:03.680 | 2026-02-05T21:02:05.997 |
| fkie_cve-2026-22773 | vLLM is an inference and serving engine for large language models (LLMs). In versions from 0.6.4 to… | 2026-01-10T07:16:03.527 | 2026-01-27T21:03:47.017 |
| fkie_cve-2026-22705 | RustCrypto: Signatures offers support for digital signatures, which provide authentication of data … | 2026-01-10T07:16:03.363 | 2026-01-13T14:03:18.990 |
| fkie_cve-2026-22704 | HAX CMS helps manage microsite universe with PHP or NodeJs backends. In versions 11.0.6 to before 2… | 2026-01-10T07:16:03.200 | 2026-02-05T20:59:55.283 |
| fkie_cve-2026-22703 | Cosign provides code signing and transparency for containers and binaries. Prior to versions 2.6.2 … | 2026-01-10T07:16:03.030 | 2026-02-05T20:59:07.633 |
| fkie_cve-2026-22702 | virtualenv is a tool for creating isolated virtual python environments. Prior to version 20.36.1, T… | 2026-01-10T07:16:02.857 | 2026-01-13T14:03:18.990 |
| fkie_cve-2025-14948 | The miniOrange OTP Verification and SMS Notification for WooCommerce plugin for WordPress is vulner… | 2026-01-10T07:16:02.673 | 2026-01-13T14:03:18.990 |
| fkie_cve-2025-14943 | The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to Sensitive… | 2026-01-10T07:16:02.343 | 2026-01-13T14:03:18.990 |
| fkie_cve-2026-22701 | filelock is a platform-independent file lock for Python. Prior to version 3.20.3, a TOCTOU race con… | 2026-01-10T06:15:52.673 | 2026-01-13T14:03:18.990 |
| fkie_cve-2026-22700 | RustCrypto: Elliptic Curves is general purpose Elliptic Curve Cryptography (ECC) support, including… | 2026-01-10T06:15:52.517 | 2026-01-22T14:53:48.393 |
| fkie_cve-2026-22699 | RustCrypto: Elliptic Curves is general purpose Elliptic Curve Cryptography (ECC) support, including… | 2026-01-10T06:15:52.377 | 2026-01-22T14:53:30.840 |
| fkie_cve-2026-22698 | RustCrypto: Elliptic Curves is general purpose Elliptic Curve Cryptography (ECC) support, including… | 2026-01-10T06:15:52.220 | 2026-01-13T14:03:18.990 |
| fkie_cve-2026-22693 | HarfBuzz is a text shaping engine. Prior to version 12.3.0, a null pointer dereference vulnerabilit… | 2026-01-10T06:15:52.063 | 2026-01-13T14:03:18.990 |
| fkie_cve-2026-22689 | Mailpit is an email testing tool and API for developers. Prior to version 1.28.2, the Mailpit WebSo… | 2026-01-10T06:15:51.900 | 2026-01-13T14:03:18.990 |
| fkie_cve-2026-22685 | DevToys is a desktop app for developers. In versions from 2.0.0.0 to before 2.0.9.0, a path travers… | 2026-01-10T06:15:51.743 | 2026-01-13T14:03:18.990 |
| fkie_cve-2026-22611 | AWS SDK for .NET works with Amazon Web Services to help build scalable solutions with Amazon S3, Am… | 2026-01-10T06:15:51.270 | 2026-01-13T14:03:18.990 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-3mg9-9f72-h562 |
|
In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid … | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-3jpp-f2wm-pcvv |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mld: cancel mlo… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-2m65-7fpj-78p9 |
|
In the Linux kernel, the following vulnerability has been resolved: hwmon: (acpi_power_meter) Fix … | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-xwq7-47qj-qwwf |
|
In the Linux kernel, the following vulnerability has been resolved: mm, shmem: prevent infinite lo… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:16Z |
| ghsa-xph2-5pq4-m7jp |
|
In the Linux kernel, the following vulnerability has been resolved: riscv: Sanitize syscall table … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-wrw7-63r4-jj3j |
|
In the Linux kernel, the following vulnerability has been resolved: nvme-pci: handle changing devi… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-wc6c-368q-8vvv |
|
In the Linux kernel, the following vulnerability has been resolved: smb/server: fix refcount leak … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-rm73-jpvr-q26q |
|
In the Linux kernel, the following vulnerability has been resolved: smb/server: fix refcount leak … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-r6pf-fx8p-436v |
|
In the Linux kernel, the following vulnerability has been resolved: efivarfs: fix error propagatio… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-r3f7-9rj4-j5fm |
|
In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race in mptcp_pm_nl… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-qrjv-2grw-rfj4 |
|
In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-q8wj-qfj9-vjfp |
|
In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix UAF in con… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-pw2v-cmfh-x2p3 |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: do not strictly require… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-phfr-35gx-vf86 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/xe/nvm: Fix double-free on… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-mg8f-6pj8-cf5j |
|
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix race between rfk… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-m5mw-gf4c-pwc3 |
|
In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: fix potential… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-h3xv-g92m-m7cv |
|
In the Linux kernel, the following vulnerability has been resolved: drm/imx/tve: fix probe device … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-9vc4-746x-p2rf |
|
In the Linux kernel, the following vulnerability has been resolved: sfc: fix deadlock in RSS confi… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-9j4j-wgpf-5mxc |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: wlcore: ensure skb headr… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-959m-9w2w-7jxc |
|
In the Linux kernel, the following vulnerability has been resolved: dmaengine: mmp_pdma: Fix race … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-7xmm-c998-f7c9 |
|
In the Linux kernel, the following vulnerability has been resolved: flex_proportions: make fprop_n… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-7g88-w646-8r4r |
|
In the Linux kernel, the following vulnerability has been resolved: octeon_ep: Fix memory leak in … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-6rr8-q652-pwgf |
|
In the Linux kernel, the following vulnerability has been resolved: net: cpsw: Execute ndo_set_rx_… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-6hxq-g3f7-5m89 |
|
In the Linux kernel, the following vulnerability has been resolved: smb/server: call ksmbd_session… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-5w3w-6qf9-5hqm |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: ocb: skip rx_n… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-5vr5-28pm-p634 |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: TC, delete flows on… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-5r72-p4cv-h344 |
|
In the Linux kernel, the following vulnerability has been resolved: bonding: fix use-after-free du… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-5p9c-24w4-pq6q |
|
In the Linux kernel, the following vulnerability has been resolved: ice: Fix NULL pointer derefere… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-4rgv-cpg8-f3hr |
|
In the Linux kernel, the following vulnerability has been resolved: mm/shmem, swap: fix race of tr… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-4fxm-jm89-7f7q |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: sync read disk super an… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:16Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-41 |
9.8 (3.1)
|
PyTorch is a Python package that provides tensor computation with strong GPU acceleration… | torch | 2025-04-18T16:15:23+00:00 | 2025-05-28T15:23:37.843138+00:00 |
| pysec-2025-35 |
7.5 (3.1)
|
Weblate is a web based localization tool. Prior to version 5.11, when creating a new comp… | weblate | 2025-04-15T21:16:04+00:00 | 2025-04-30T17:22:51.467257+00:00 |
| pysec-2025-32 |
9.8 (3.1)
|
BentoML is a Python library for building online serving systems optimized for AI apps and… | bentoml | 2025-04-09T16:15:25+00:00 | 2025-04-22T19:21:34.073355+00:00 |
| pysec-2025-36 |
9.8 (3.1)
|
Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/valida… | langflow | 2025-04-07T15:15:44+00:00 | 2025-05-07T19:22:44.993642+00:00 |
| pysec-2025-16 |
7.5 (3.1)
|
LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vu… | lnbits | 2025-04-06T20:15:15+00:00 | 2025-04-09T17:27:25.872691+00:00 |
| pysec-2025-14 |
|
An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normal… | django | 2025-04-02T13:15:44+00:00 | 2025-04-09T17:27:25.169049+00:00 |
| pysec-2025-48 |
9.8 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2025-03-31T17:15:42+00:00 | 2025-06-12T22:23:10.476087+00:00 |
| pysec-2025-17 |
5.5 (3.1)
|
In mlflow/mlflow version 2.18, an admin is able to create a new user account without sett… | mlflow | 2025-03-20T10:15:54+00:00 | 2025-04-09T17:27:26.322333+00:00 |
| pysec-2025-57 |
|
A Denial of Service (DoS) vulnerability in zenml-io/zenml version 0.66.0 allows unauthent… | zenml | 2025-03-20T10:15:48+00:00 | 2025-06-27T17:22:55.175431+00:00 |
| pysec-2025-10 |
9.1 (3.1)
|
A vulnerability in the `download_model` function of the onnx/onnx framework, before and i… | onnx | 2025-03-20T10:15:37+00:00 | 2025-03-26T19:21:38.843396+00:00 |
| pysec-2025-11 |
5.9 (3.1)
|
A vulnerability in the `KnowledgeBaseWebReader` class of the run-llama/llama_index reposi… | llama-index | 2025-03-20T10:15:31+00:00 | 2025-04-01T23:22:47.294256+00:00 |
| pysec-2025-9 |
|
A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through… | invokeai | 2025-03-20T10:15:26+00:00 | 2025-03-20T11:21:37.872971+00:00 |
| pysec-2025-63 |
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Whe… | vllm | 2025-03-19T16:15:32+00:00 | 2025-07-01T23:22:49.176005+00:00 |
| pysec-2025-22 |
9.8 (3.1)
|
A vulnerability, that could result in Remote Code Execution (RCE), has been found in Plot… | plotai | 2025-03-10T14:15:24+00:00 | 2025-04-09T17:27:27.203714+00:00 |
| pysec-2025-21 |
9.8 (3.1)
|
picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model arch… | picklescan | 2025-03-10T12:15:12+00:00 | 2025-04-09T17:27:27.016747+00:00 |
| pysec-2025-20 |
6.5 (3.1)
|
picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes i… | picklescan | 2025-03-10T12:15:10+00:00 | 2025-04-09T17:27:26.966215+00:00 |
| pysec-2025-13 |
|
An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2… | django | 2025-03-06T19:15:27+00:00 | 2025-04-09T17:27:25.095679+00:00 |
| pysec-2025-23 |
|
Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Inform… | ray | 2025-03-06T05:15:16+00:00 | 2025-04-09T17:27:27.434099+00:00 |
| pysec-2025-19 |
9.8 (3.1)
|
picklescan before 0.0.22 only considers standard pickle file extensions in the scope for … | picklescan | 2025-03-03T19:15:34+00:00 | 2025-04-09T17:27:26.916350+00:00 |
| pysec-2025-25 |
6.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middle… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.532849+00:00 |
| pysec-2025-24 |
7.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the /api/remove… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.486485+00:00 |
| pysec-2025-15 |
5.3 (3.1)
|
Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilde… | flask-appbuilder | 2025-03-03T16:15:41+00:00 | 2025-04-09T17:27:25.227116+00:00 |
| pysec-2025-66 |
|
Improper privilege management in a REST interface allowed registered users to access unau… | streampipes | 2025-03-03T11:15:11+00:00 | 2025-07-08T15:23:46.628375+00:00 |
| pysec-2025-18 |
|
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craf… | picklescan | 2025-02-26T15:15:24+00:00 | 2025-04-09T17:27:26.867210+00:00 |
| pysec-2025-31 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statemen… | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.116292+00:00 |
| pysec-2025-30 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.064106+00:00 |
| pysec-2025-29 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.005382+00:00 |
| pysec-2025-62 |
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Mal… | vllm | 2025-02-07T20:15:34+00:00 | 2025-07-01T23:22:49.083695+00:00 |
| pysec-2025-28 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
| pysec-2025-27 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-873 | Malicious code in @depro0x/despicable-me (npm) | 2026-02-12T20:40:54Z | 2026-02-12T22:47:49Z |
| mal-2026-872 | Malicious code in stylelint-recommended (npm) | 2026-02-12T18:18:29Z | 2026-02-12T18:18:30Z |
| mal-2026-871 | Malicious code in envoy1 (npm) | 2026-02-12T16:50:57Z | 2026-02-13T14:31:34Z |
| mal-2026-870 | Malicious code in b10connoisseur (PyPI) | 2026-02-12T12:10:26Z | 2026-02-12T12:10:26Z |
| mal-2026-866 | Malicious code in oraceldb (PyPI) | 2026-02-12T08:45:36Z | 2026-02-12T08:45:36Z |
| mal-2026-869 | Malicious code in ritch (PyPI) | 2026-02-12T08:45:10Z | 2026-02-12T08:45:10Z |
| mal-2026-867 | Malicious code in pandaai (PyPI) | 2026-02-12T08:44:41Z | 2026-02-12T08:44:41Z |
| mal-2026-865 | Malicious code in opentelematry-api (PyPI) | 2026-02-12T08:44:11Z | 2026-02-12T08:44:11Z |
| mal-2026-864 | Malicious code in marshmellow (PyPI) | 2026-02-12T08:43:45Z | 2026-02-12T08:43:45Z |
| mal-2026-868 | Malicious code in pydantics (PyPI) | 2026-02-12T08:42:04Z | 2026-02-12T08:42:04Z |
| mal-2026-863 | Malicious code in krbutils (PyPI) | 2026-02-12T08:40:10Z | 2026-02-12T08:40:10Z |
| mal-2026-862 | Malicious code in get-incorrect-name-bob (PyPI) | 2026-02-12T00:01:39Z | 2026-02-12T00:01:39Z |
| mal-2026-861 | Malicious code in express-gueues (npm) | 2026-02-11T16:43:01Z | 2026-02-11T16:43:01Z |
| mal-2026-860 | Malicious code in osopackagepy (PyPI) | 2026-02-11T15:50:58Z | 2026-02-11T16:53:59Z |
| mal-2026-859 | Malicious code in systemtest-network (npm) | 2026-02-11T15:13:28Z | 2026-02-11T15:13:28Z |
| mal-2026-858 | Malicious code in systemtest-information (npm) | 2026-02-11T15:13:28Z | 2026-02-11T15:13:28Z |
| mal-2026-857 | Malicious code in osopackage (npm) | 2026-02-11T15:13:28Z | 2026-02-11T15:13:29Z |
| mal-2026-856 | Malicious code in chai-prop (npm) | 2026-02-11T14:19:52Z | 2026-02-11T14:19:53Z |
| mal-2026-855 | Malicious code in config-toolkit (PyPI) | 2026-02-11T14:08:58Z | 2026-02-11T14:08:58Z |
| mal-2026-854 | Malicious code in sinon-node (npm) | 2026-02-11T10:54:37Z | 2026-02-11T10:54:42Z |
| mal-2026-853 | Malicious code in node-dotenv-cli (npm) | 2026-02-11T10:54:37Z | 2026-02-11T10:54:37Z |
| mal-2026-852 | Malicious code in chai-await (npm) | 2026-02-11T10:54:36Z | 2026-02-11T10:54:37Z |
| mal-2026-851 | Malicious code in python-files-mod (PyPI) | 2026-02-11T10:40:53Z | 2026-02-11T10:40:53Z |
| mal-2026-850 | Malicious code in ntoctfutils (PyPI) | 2026-02-11T08:58:36Z | 2026-02-11T08:58:36Z |
| mal-2026-849 | Malicious code in jsonconfig-utils (PyPI) | 2026-02-11T06:56:16Z | 2026-02-11T06:56:16Z |
| mal-2026-848 | Malicious code in npm_cimetadata (npm) | 2026-02-11T03:35:51Z | 2026-02-11T08:21:22Z |
| mal-2026-846 | Malicious code in cryptowallethash (PyPI) | 2026-02-10T23:03:29Z | 2026-02-10T23:05:44Z |
| mal-2026-847 | Malicious code in requests-auth-toolkit (PyPI) | 2026-02-10T22:45:40Z | 2026-02-10T22:45:40Z |
| mal-2026-845 | Malicious code in rzr-home (PyPI) | 2026-02-10T20:45:52Z | 2026-02-10T20:45:52Z |
| mal-2026-842 | Malicious code in amplify-python-logging (PyPI) | 2026-02-10T19:22:57Z | 2026-02-10T19:22:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0234 | OpenSSL: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0233 | vllm: Schwachstelle ermöglicht Offenlegung von Informationen und DoS | 2026-01-27T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0231 | GnuPG und Gpg4win: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0230 | Mozilla Thunderbird: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-27T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0229 | Citrix Systems XenServer und Xen: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-27T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0225 | Xen: Mehrere Schwachstellen | 2026-01-26T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0224 | Grafana: Mehrere Schwachstellen | 2026-01-26T23:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| wid-sec-w-2026-0222 | PyTorch: Schwachstelle ermöglicht Codeausführung | 2026-01-26T23:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| wid-sec-w-2026-0219 | Vercel Next.js: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-26T23:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| wid-sec-w-2026-0215 | Linux Kernel: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0214 | dormakaba Access Manager: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-01-27T23:00:00.000+00:00 |
| wid-sec-w-2026-0210 | IBM DB2 Big SQL: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0207 | Red Hat Enterprise Linux (urllib3): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0202 | Logback: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-22T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0199 | Red Hat OpenShift Pipelines Operator (Fulcio): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0198 | Red Hat OpenShift und OpenShift AI (urllib3): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0194 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0190 | vllm: Mehrere Schwachstellen | 2026-01-21T23:00:00.000+00:00 | 2026-01-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0188 | Internet Systems Consortium BIND: Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0187 | Red Hat Enterprise Linux (glib): Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0185 | M-Files M-Files Server: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0184 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0183 | InetUtils (telnetd): Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-01-20T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0182 | Apache Solr: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0179 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0177 | Atlassian Bamboo, Bitbucket, Confluence und Jira: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0176 | Google Chrome/Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2026-01-20T23:00:00.000+00:00 | 2026-01-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0174 | Oracle Systems: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0172 | Oracle Virtualization: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0168 | Oracle MySQL: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0034 | Kwetsbaarheden verholpen in Atlassian producten | 2026-01-22T09:03:42.667958Z | 2026-01-22T09:03:42.667958Z |
| ncsc-2026-0033 | Kwetsbaarheid verholpen in GNU Inetutils telnetd | 2026-01-21T14:15:46.424529Z | 2026-01-21T14:15:46.424529Z |
| ncsc-2026-0032 | Kwetsbaarheden verholpen in Oracle MySQL | 2026-01-21T10:12:24.844869Z | 2026-01-21T10:12:24.844869Z |
| ncsc-2026-0031 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2026-01-21T10:12:00.674214Z | 2026-01-21T10:12:00.674214Z |
| ncsc-2026-0030 | Kwetsbaarheden verholpen in Oracle Java | 2026-01-21T10:11:39.759123Z | 2026-01-21T10:11:39.759123Z |
| ncsc-2026-0029 | Kwetsbaarheden verholpen in Oracle Hyperion | 2026-01-21T10:10:46.297433Z | 2026-01-21T10:10:46.297433Z |
| ncsc-2026-0028 | Kwetsbaarheden verholpen in Oracle Analytics | 2026-01-21T10:10:15.985753Z | 2026-01-21T10:10:15.985753Z |
| ncsc-2026-0027 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2026-01-21T10:08:59.379774Z | 2026-01-21T10:08:59.379774Z |
| ncsc-2026-0026 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2026-01-21T10:06:27.920991Z | 2026-01-21T10:06:27.920991Z |
| ncsc-2026-0025 | Kwetsbaarheden verholpen in Oracle Financial Services | 2026-01-21T09:55:33.889125Z | 2026-01-21T09:55:33.889125Z |
| ncsc-2026-0024 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2026-01-21T09:29:38.334428Z | 2026-01-21T09:29:38.334428Z |
| ncsc-2026-0023 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2026-01-21T09:27:58.715578Z | 2026-01-21T09:27:58.715578Z |
| ncsc-2026-0022 | Kwetsbaarheden verholpen in Oracle Communications producten | 2026-01-21T09:25:39.876330Z | 2026-01-21T09:25:39.876330Z |
| ncsc-2026-0021 | Kwetsbaarheden verholpen in Oracle Database Server producten | 2026-01-21T09:19:00.000449Z | 2026-01-21T09:19:00.000449Z |
| ncsc-2026-0020 | Kwetsbaarheden verholpen in Oracle Commerce | 2026-01-21T09:18:16.268788Z | 2026-01-21T09:18:16.268788Z |
| ncsc-2026-0019 | Kwetsbaarheid verholpen in Fortinet FortiSIEM | 2026-01-16T13:34:34.467426Z | 2026-01-16T13:34:34.467426Z |
| ncsc-2026-0018 | Kwetsbaarheden verholpen in TYPO3 CMS | 2026-01-16T10:11:37.524826Z | 2026-01-16T10:11:37.524826Z |
| ncsc-2026-0017 | Kwetsbaarheden verholpen in Juniper Networks JunOS | 2026-01-16T10:07:39.310560Z | 2026-01-16T10:07:39.310560Z |
| ncsc-2026-0016 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2026-01-16T09:44:20.575860Z | 2026-01-16T09:44:20.575860Z |
| ncsc-2026-0015 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2026-01-15T12:31:57.265723Z | 2026-01-15T12:31:57.265723Z |
| ncsc-2026-0014 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-01-15T12:16:05.427141Z | 2026-01-15T12:16:05.427141Z |
| ncsc-2026-0013 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2026-01-14T13:45:48.530782Z | 2026-01-14T13:45:48.530782Z |
| ncsc-2026-0012 | Kwetsbaarheden verholpen in Adobe Dreamweaver Desktop | 2026-01-14T13:41:56.261778Z | 2026-01-14T13:41:56.261778Z |
| ncsc-2026-0011 | Kwetsbaarheid verholpen in Microsoft Developer Tools | 2026-01-13T19:19:27.690900Z | 2026-01-13T19:19:27.690900Z |
| ncsc-2026-0010 | Kwetsbaarheden verholpen in Microsoft Office | 2026-01-13T19:18:45.984019Z | 2026-01-13T19:18:45.984019Z |
| ncsc-2026-0009 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-01-13T19:17:59.629364Z | 2026-01-13T19:17:59.629364Z |
| ncsc-2026-0008 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-01-13T19:17:18.848673Z | 2026-01-13T19:17:18.848673Z |
| ncsc-2026-0007 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-01-13T19:16:30.720079Z | 2026-01-13T19:16:30.720079Z |
| ncsc-2026-0006 | Kwetsbaarheden verholpen in SAP producten | 2026-01-13T14:42:24.621603Z | 2026-01-13T14:42:24.621603Z |
| ncsc-2026-0005 | Kwetsbaarheden verholpen in Siemens producten | 2026-01-13T12:05:57.353070Z | 2026-01-13T12:05:57.353070Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-682326 | SSA-682326: Multiple Vulnerabilities in COMOS before V10.4.5 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-522291 | SSA-522291: Improper Certificate Validation Vulnerability in Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-514895 | SSA-514895: Multiple Vulnerabilities in Altair Grid Engine V2025.1.0 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-365596 | SSA-365596: DLL Hijacking Vulnerability in Siemens Software Center and Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-339694 | SSA-339694: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-267056 | SSA-267056: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-201498 | SSA-201498: Multiple Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices Before V3.11 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-599451 | SSA-599451: Multiple Vulnerabilities in SiPass integrated | 2025-10-14T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-541582 | SSA-541582: Multiple File Parsing Vulnerabilities in Solid Edge | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-486936 | SSA-486936: Authentication Vulnerability in SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-365200 | SSA-365200: Google Chrome Type Confusion Vulnerability in Siemens Products | 2025-10-14T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-318832 | SSA-318832: SQL Injection Vulnerability in SINEC NMS | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-062309 | SSA-062309: Information Disclosure Vulnerability in TeleControl Server Basic V3.1 | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-916339 | SSA-916339: Information Disclosure Vulnerability in Apogee PXC and Talon TC Devices | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-722410 | SSA-722410: Multiple Vulnerabilities in User Management Component (UMC) | 2025-09-09T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-640476 | SSA-640476: Denial of Service Vulnerability in Industrial Edge Management | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-563922 | SSA-563922: Local Privilege Escalation Vulnerability in SIMOTION Tools | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-534283 | SSA-534283: Insecure File Share Vulnerability in SIMATIC Virtualization as a Service (SIVaaS) | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-494539 | SSA-494539: Multiple Vulnerabilities in SINEC OS | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-027652 | SSA-027652: Privilege Escalation Vulnerability in SINAMICS Drives | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-395458 | SSA-395458: Account Hijacking Vulnerability in Mendix SAML Module | 2025-08-14T00:00:00Z | 2025-08-14T00:00:00Z |
| ssa-201595 | SSA-201595: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2025-08-14T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-994087 | SSA-994087: Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.7 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-978177 | SSA-978177: Vulnerability in Nozomi Guardian/CMC Before 25.4.0 on RUGGEDCOM APE1808 Devices | 2025-08-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-894058 | SSA-894058: Improper Bandwidth Limitation of Network Packets Over Local USB Port Vulnerability in SIPROTEC 5 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-769791 | SSA-769791: Local Arbitrary Code Execution Vulnerability in COMOS Before V10.6 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-707630 | SSA-707630: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager Before V3.3 | 2025-08-12T00:00:00Z | 2025-08-26T00:00:00Z |
| ssa-693808 | SSA-693808: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-674084 | SSA-674084: File Parsing Vulnerabilities in Simcenter Femap Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-665108 | SSA-665108: Arbitrary File Upload Vulnerability in RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2520 | Red Hat Security Advisory: toolbox security update | 2026-02-11T09:49:41+00:00 | 2026-02-13T17:14:47+00:00 |
| rhsa-2026:2519 | Red Hat Security Advisory: toolbox security update | 2026-02-11T09:37:40+00:00 | 2026-02-13T17:14:44+00:00 |
| rhsa-2026:2514 | Red Hat Security Advisory: spice-client-win security update | 2026-02-11T08:06:25+00:00 | 2026-02-12T13:28:21+00:00 |
| rhsa-2026:2512 | Red Hat Security Advisory: libsoup security update | 2026-02-11T07:51:37+00:00 | 2026-02-12T13:28:19+00:00 |
| rhsa-2026:2513 | Red Hat Security Advisory: spice-client-win security update | 2026-02-11T07:51:25+00:00 | 2026-02-12T13:28:21+00:00 |
| rhsa-2026:2446 | Red Hat Security Advisory: kpatch-patch-4_18_0-553_30_1, kpatch-patch-4_18_0-553_40_1, kpatch-patch-4_18_0-553_53_1, kpatch-patch-4_18_0-553_72_1, and kpatch-patch-4_18_0-553_85_1 security update | 2026-02-11T07:31:25+00:00 | 2026-02-11T18:58:49+00:00 |
| rhsa-2026:2500 | Red Hat Security Advisory: Red Hat multicluster global hub 1.4.4 security update | 2026-02-11T05:02:44+00:00 | 2026-02-15T01:32:56+00:00 |
| rhsa-2026:2071 | Red Hat Security Advisory: OpenShift Container Platform 4.18.33 packages and security update | 2026-02-11T04:55:25+00:00 | 2026-02-14T01:42:17+00:00 |
| rhsa-2026:2072 | Red Hat Security Advisory: OpenShift Container Platform 4.18.33 bug fix and security update | 2026-02-11T04:49:09+00:00 | 2026-02-13T19:06:53+00:00 |
| rhsa-2026:2077 | Red Hat Security Advisory: OpenShift Container Platform 4.20.14 bug fix and security update | 2026-02-11T04:41:05+00:00 | 2026-02-12T19:30:21+00:00 |
| rhsa-2026:2079 | Red Hat Security Advisory: OpenShift Container Platform 4.18.33 security and extras update | 2026-02-11T04:27:43+00:00 | 2026-02-13T17:14:33+00:00 |
| rhsa-2026:2078 | Red Hat Security Advisory: OpenShift Container Platform 4.18.33 bug fix and security update | 2026-02-11T04:27:02+00:00 | 2026-02-13T17:14:33+00:00 |
| rhsa-2026:2119 | Red Hat Security Advisory: OpenShift Container Platform 4.20.14 bug fix and security update | 2026-02-11T04:25:53+00:00 | 2026-02-13T17:14:34+00:00 |
| rhsa-2026:2120 | Red Hat Security Advisory: OpenShift Container Platform 4.20.14 security and extras update | 2026-02-11T02:51:09+00:00 | 2026-02-13T17:14:34+00:00 |
| rhsa-2026:2490 | Red Hat Security Advisory: kernel security update | 2026-02-11T00:25:39+00:00 | 2026-02-12T19:28:20+00:00 |
| rhsa-2026:2486 | Red Hat Security Advisory: fence-agents security update | 2026-02-10T21:02:35+00:00 | 2026-02-11T01:33:50+00:00 |
| rhsa-2026:2485 | Red Hat Security Advisory: Insights proxy Container Image | 2026-02-10T20:29:13+00:00 | 2026-02-13T16:55:47+00:00 |
| rhsa-2026:2483 | Red Hat Security Advisory: fence-agents security update | 2026-02-10T20:28:54+00:00 | 2026-02-11T01:33:50+00:00 |
| rhsa-2026:2470 | Red Hat Security Advisory: php:7.4 security update | 2026-02-10T20:28:13+00:00 | 2026-02-11T01:04:08+00:00 |
| rhsa-2026:2484 | Red Hat Security Advisory: pcs security update | 2026-02-10T20:17:03+00:00 | 2026-02-12T22:34:56+00:00 |
| rhsa-2026:2469 | Red Hat Security Advisory: pcs security update | 2026-02-10T19:17:43+00:00 | 2026-02-12T22:34:55+00:00 |
| rhsa-2026:2455 | Red Hat Security Advisory: brotli security update | 2026-02-10T18:32:23+00:00 | 2026-02-12T19:30:17+00:00 |
| rhsa-2026:2465 | Red Hat Security Advisory: pcs security update | 2026-02-10T18:26:38+00:00 | 2026-02-12T22:34:55+00:00 |
| rhsa-2026:2462 | Red Hat Security Advisory: pcs security update | 2026-02-10T17:54:59+00:00 | 2026-02-12T22:34:54+00:00 |
| rhsa-2026:2460 | Red Hat Security Advisory: resource-agents security update | 2026-02-10T17:46:24+00:00 | 2026-02-11T01:33:48+00:00 |
| rhsa-2026:2456 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.26.0 Release. | 2026-02-10T17:06:01+00:00 | 2026-02-15T01:32:56+00:00 |
| rhsa-2026:2452 | Red Hat Security Advisory: pcs security update | 2026-02-10T15:37:57+00:00 | 2026-02-12T22:34:54+00:00 |
| rhsa-2026:2454 | Red Hat Security Advisory: DevWorkspace Operator 0.39.0 release. | 2026-02-10T15:32:22+00:00 | 2026-02-15T01:32:56+00:00 |
| rhsa-2026:2453 | Red Hat Security Advisory: resource-agents security update | 2026-02-10T15:19:08+00:00 | 2026-02-11T01:33:48+00:00 |
| rhsa-2026:2449 | Red Hat Security Advisory: iperf3 security update | 2026-02-10T14:57:38+00:00 | 2026-02-10T19:02:49+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-022-07 | Delta Electronics DIAView | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-06 | Hubitat Elevation Hubs | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-05 | Weintek cMT X Series HMI EasyWeb Service | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-04 | Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-03 | Rockwell Automation CompactLogix 5370 | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-02 | AutomationDirect CLICK Programmable Logic Controller | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-020-03 | Rockwell Automation Verve Asset Manager | 2026-01-20T07:00:00.000000Z | 2026-01-20T07:00:00.000000Z |
| va-26-015-01 | NOAA PMEL Live Access Server (LAS) command injection | 2026-01-15T19:59:37Z | 2026-01-15T19:59:37Z |
| icsa-26-015-01 | AVEVA Process Optimization | 2026-01-15T07:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-26-027-03 | Schneider Electric Zigbee Products | 2026-01-13T08:00:00.000000Z | 2026-01-27T20:13:34.637968Z |
| icsa-26-022-01 | Schneider Electric | 2026-01-13T08:00:00.000000Z | 2026-01-22T17:29:46.950679Z |
| icsa-26-015-10 | Schneider Electric EcoStruxure Power Build Rapsody | 2026-01-13T08:00:00.000000Z | 2026-01-14T22:35:43.622072Z |
| icsa-26-013-03 | YoSmart YoLink Smart Hub | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-02 | Rockwell Automation FactoryTalk DataMosaix Private Cloud | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-01 | Rockwell Automation 432ES-IG3 Series A | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| va-26-013-01 | NSecKrnl driver terminates system processes with crafted IOCTL requests | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| icsa-26-015-09 | Siemens Industrial Edge Device Kit | 2026-01-13T00:00:00.000000Z | 2026-01-14T21:54:58.722065Z |
| icsa-26-015-08 | Siemens Industrial Edge Devices | 2026-01-13T00:00:00.000000Z | 2026-01-14T23:03:52.355094Z |
| icsa-26-015-07 | Siemens RUGGEDCOM APE1808 Devices | 2026-01-13T00:00:00.000000Z | 2026-01-14T22:35:44.478578Z |
| icsa-26-015-04 | Siemens SIMATIC and SIPLUS products | 2026-01-13T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-015-03 | Siemens TeleControl Server Basic | 2026-01-13T00:00:00.000000Z | 2026-01-14T22:32:36.777247Z |
| va-26-008-01 | OPEXUS eCASE | 2026-01-08T16:36:15Z | 2026-01-08T16:36:15Z |
| va-26-008-03 | Ideagen DevonWay stored XSS | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| va-26-008-02 | OPEXUS eComplaint and eCasePortal IDOR | 2026-01-07T16:35:11Z | 2026-01-07T16:35:11Z |
| icsa-26-006-01 | Columbia Weather Systems MicroServer | 2026-01-06T07:00:00.000000Z | 2026-01-06T07:00:00.000000Z |
| icsma-25-364-01 | WHILL Model C2 Electric Wheelchairs and Model F Power Chairs | 2025-12-30T07:00:00.000000Z | 2025-12-30T07:00:00.000000Z |
| icsa-25-352-08 | Axis Communications Camera Station Pro, Camera Station, and Device Manager (Update B) | 2025-12-18T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-25-352-07 | Rockwell Automation Micro820, Micro850, Micro870 | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-06 | Advantech WebAccess/SCADA | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electrics Products | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-http-code-exec-wmfp3h3o | Cisco Secure Firewall Adaptive Security Appliance Software, Secure Firewall Threat Defense Software, IOS Software, IOS XE Software, and IOS XR Software Web Services Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:51+00:00 |
| cisco-sa-asaftd-webvpn-z5xp8eub | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:54+00:00 |
| cisco-sa-asaftd-webvpn-yrootuw | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Unauthorized Access Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:55+00:00 |
| cisco-sa-webui-xss-vwydgjou | Cisco IOS XE Software Web Authentication Reflected Cross-Site Scripting Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:50+00:00 |
| cisco-sa-snmpwred-x3mjyf5m | Cisco IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-snmp-x4lphte | Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-06T18:27:02+00:00 |
| cisco-sa-secboot-uqfd8avc | Cisco IOS XE Software Secure Boot Bypass Vulnerabilities | 2025-09-24T16:00:00+00:00 | 2025-10-15T15:57:29+00:00 |
| cisco-sa-nbar-dos-lavwtmet | Cisco IOS XE Software Network-Based Application Recognition Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-arg-inject-eyddbh4e | Cisco IOS XE Software CLI Argument Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-cmd-inject-rpjm8bgl | Cisco IOS XE Software HTTP API Command Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-tacacs-hdb7thjw | Cisco IOS and IOS XE Software TACACS+ Authentication Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-01T16:39:50+00:00 |
| cisco-sa-ios-invalid-url-dos-nvxszf6u | Cisco IOS Software Industrial Ethernet Switch Device Manager Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-cli-eb7cz6yo | Cisco IOS and IOS XE Software CLI Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-defaultacl-psjk9nvf | Cisco SD-WAN vEdge Software Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-cat9k-ptmd7bgy | Cisco IOS XE Software for Catalyst 9000 Series Switches Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-30T14:26:46+00:00 |
| cisco-sa-cat9k-acl-l4k7vxgd | Cisco IOS XE Software on Cisco Catalyst 9500X and 9600X Series Switches Virtual Interface Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ap-ipv6-gw-tuazpn9o | Cisco Access Point Software Intermittent IPv6 Gateway Change Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:51+00:00 |
| cisco-sa-action-frame-inj-qqcncz8h | Cisco Wireless Access Point Software Device Analytics Action Frame Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-9800cl-openscep-sb4xtxzp | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controller for Cloud Unauthenticated Access to Certificate Enrollment Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-xrsig-uy4zrucg | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-iosxr-arp-storm-ejuu55ym | Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-acl-packetio-swjhhbtz | Cisco IOS XR Software Management Interface ACL Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-webex-xss-55bv8hhm | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-webex-urlredirect-uk8ddjsz | Cisco Webex Meetings URL Redirection Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-phone-write-g3kcc5df | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-imp-xss-xqgu4hsg | Cisco Unified Communications Manager IM & Presence Service Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-xjqzsycp | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-info-dis-zhppmfgz | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Information Disclosure Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epni-arb-file-upload-jjdm2p83 | Cisco Evolved Programmable Network Manager Arbitrary File Upload Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-cucm-csrf-w762pryd | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2023-0006 | Vulnerabilities in SICK ICR890-4 | 2023-07-10T13:00:00.000Z | 2023-07-10T13:00:00.000Z |
| sca-2023-0005 | Vulnerabilities in SICK EventCam App | 2023-06-19T11:00:00.000Z | 2023-06-19T11:00:00.000Z |
| sca-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| sca-2023-0003 | Vulnerability in SICK Flexi Soft and Flexi Classic Gateways | 2023-05-03T13:00:00.000Z | 2023-05-03T13:00:00.000Z |
| sca-2023-0002 | Use of Telnet in multiple SICK Flexi Soft and Flexi Classic Gateways | 2023-04-11T10:00:00.000Z | 2023-04-11T10:00:00.000Z |
| sca-2023-0001 | Bootloader mode vulnerability in Flexi Soft Gateways v3 | 2023-02-20T14:00:00.000Z | 2023-02-20T14:00:00.000Z |
| sca-2022-0015 | Use of a Broken or Risky Cryptographic Algorithm in SICK RFU6xx RADIO FREQUEN. SENSOR | 2022-12-08T16:00:00.000Z | 2022-12-08T16:00:00.000Z |
| sca-2022-0014 | SICK FlexiCompact affected by Denial of Service vulnerability | 2022-10-31T11:00:00.000Z | 2022-10-31T11:00:00.000Z |
| sca-2022-0013 | Password recovery vulnerability affects multiple SICK SIMs | 2022-10-21T13:00:00.000Z | 2022-11-04T14:00:00.000Z |
| sca-2022-0012 | OpenSSL vulnerability affects multiple SICK SIMs | 2022-08-08T13:00:00.000Z | 2022-08-03T13:00:00.000Z |
| sca-2022-0011 | Vulnerabilities in SICK Package Analytics | 2022-06-08T15:00:00.000Z | 2022-06-08T15:00:00.000Z |
| sca-2022-0010 | Vulnerability in SICK Flexi Soft Designer & Safety Designer | 2022-05-16T10:00:00.000Z | 2022-07-19T10:00:00.000Z |
| sca-2022-0009 | Vulnerability in SICK Flexi Soft PROFINET IO Gateway FX0-GPNT and SICK microScan3 PROFINET | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0008 | Vulnerability in SICK Gateways for Flexi Soft, Flexi Compact, SICK EFI Gateway UE4740, SICK microScan3 and outdoorScan3 | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0007 | Vulnerabilities in SICK MARSIC300 | 2022-04-21T15:00:00.000Z | 2022-04-21T15:00:00.000Z |
| sca-2022-0006 | Vulnerability in SICK MSC800 | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0005 | Vulnerability in SICK Overall Equipment Effectiveness (OEE) | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0004 | Microsoft vulnerability affects multiple SICK IPCs with SICK MEAC | 2022-04-11T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
| sca-2022-0003 | Vulnerabilities in SICK FTMg | 2022-03-31T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
| sca-2022-0002 | PwnKit vulnerability affects multiple SICK IPCs | 2022-02-23T16:00:00.000Z | 2022-02-23T16:00:00.000Z |
| sca-2022-0001 | Vulnerability in SICK FieldEcho | 2022-02-17T16:00:00.000Z | 2022-02-17T16:00:00.000Z |
| sca-2021-0004 | Vulnerabilities in SICK SOPAS ET | 2021-12-16T08:00:00.000Z | 2021-12-17T08:00:00.000Z |
| sca-2021-0003 | SICK Security Advisory for Apache Log4j (CVE-2021-44228) | 2021-12-14T17:00:00.000Z | 2021-12-17T12:00:00.000Z |
| sca-2021-0002 | MEAC affected by Windows SMBv1 vulnerability | 2021-08-04T10:00:00.000Z | 2021-08-04T10:00:00.000Z |
| sca-2021-0001 | Inadequate SSH configuration in SICK Visionary-S CX | 2021-06-25T10:00:00.000Z | 2021-06-25T10:00:00.000Z |
| sca-2020-0005 | Package Analytics affected by Windows TCP/IP vulnerability | 2020-10-29T11:00:00.000Z | 2020-10-29T11:00:00.000Z |
| sca-2020-0004 | Vulnerability in Platform Mechanism AutoIP | 2020-08-31T10:00:00.000Z | 2020-08-31T10:00:00.000Z |
| sca-2020-0003 | MEAC affected by Windows SMBv3 vulnerability | 2020-08-07T10:00:00.000Z | 2020-08-07T10:00:00.000Z |
| sca-2020-0002 | Vulnerabilities in SICK Package Analytics | 2020-08-07T10:00:00.000Z | 2020-07-28T10:00:00.000Z |
| sca-2020-0001 | Security Information Regarding "Profile Programming" | 2020-05-31T10:00:00.000Z | 2020-05-31T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2023_5-01 | Information disclosure via the debug function in assertions in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_4-01 | Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_3-01 | Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_2-01 | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:8-01 | Session Fixation in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:7-01 | DoS via SAML configuration in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:6-01 | Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:5-01 | Information disclosure via the debug function in assertions in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:4-01 | Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:3-01 | Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:2-01 | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_1-01 | Authenticated SQL Injection on Alerts in Guardian/CMC before 22.5.2 | 2023-05-03T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:1-01 | Authenticated SQL Injection on Alerts in Guardian/CMC before 22.5.2 | 2023-05-03T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022_2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022_2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022:2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022:2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021_2-01 | Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021_1-01 | Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021:2-01 | Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021:1-01 | Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020_3-01 | Angular template injection on custom report name field | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020_2-01 | Cross-site request forgery attack on change password form | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020:3-01 | Angular template injection on custom report name field | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020:2-01 | Cross-site request forgery attack on change password form | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019_2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019_1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019:2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019:1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-21255 | Windows Hyper-V Security Feature Bypass Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21253 | Mailslot File System Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21251 | Cluster Client Failover (CCF) Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21250 | Windows HTTP.sys Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21249 | Windows NTLM Spoofing Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21248 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21247 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21246 | Windows Graphics Component Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21245 | Windows Kernel Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21244 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21243 | Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21242 | Windows Subsystem for Linux Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21241 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21240 | Windows HTTP.sys Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21239 | Windows Kernel Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21238 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21237 | Windows Subsystem for Linux Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21236 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21235 | Windows Graphics Component Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21234 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21232 | Windows HTTP.sys Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21231 | Windows Kernel Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21229 | Power BI Remote Code Execution Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21228 | Azure Local Remote Code Execution Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21222 | Windows Kernel Information Disclosure Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21218 | .NET Spoofing Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-20846 | GDI+ Denial of Service Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-20841 | Windows Notepad App Remote Code Execution Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-12T00:00:00.000Z |
| msrc_cve-2026-0391 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-05T00:00:00.000Z |
| msrc_cve-2026-24307 | M365 Copilot Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| 9akk108470a9989 | ABB MV Drives Affected by CODESYS RTS (Runtime System) Vulnerabilities | 2025-04-10T08:30:00.000Z | 2025-04-10T08:30:00.000Z |
| 2nga002579 | ABB Arctic communication solution ARM600 Vulnerabilities | 2025-04-07T10:30:00.000Z | 2025-04-07T10:30:00.000Z |
| 2nga002427 | ABB Arctic ARG600, ARC600, ARR600, ARP600 Arctic Wireless Gateway Modem Module and OpenSSH vulnerabilities | 2025-04-07T10:30:00.000Z | 2025-04-07T10:30:00.000Z |
| 9akk108470a9494 | Low Voltage DC Drives and Power Controllers CODESYS RTS Vulnerabilities | 2025-03-26T00:30:00.000Z | 2025-03-27T00:30:00.000Z |
| 9akk108470a9491 | ABB ACS880 +N8010 Drives CODESYS RTS Vulnerabilities | 2025-03-26T00:30:00.000Z | 2025-03-27T00:30:00.000Z |
| sa24p015 | B&R APROL Potential Privilege Escalation and Information Disclosure | 2025-03-24T00:30:00.000Z | 2025-03-24T00:30:00.000Z |
| 9akk108470a8565 | RMC-100 Vulnerability in the Web UI (REST Interface) | 2025-03-11T00:30:00.000Z | 2025-03-11T00:30:00.000Z |
| 7paa012159 | System 800xA 5.1.x, 6.0.3.x, 6.1.1.x, 6.2.x - VideONet Camera passwords stored in clear text | 2025-02-10T00:30:00.000Z | 2025-02-10T00:30:00.000Z |
| 9akk108470a6775 | Hardcoded credentials in ASPECT Energy Management System | 2025-02-05T00:30:00.000Z | 2025-02-06T00:30:00.000Z |
| 9akk108470a5466 | Drive Composer Path Traversal Vulnerability | 2025-02-05T00:30:00.000Z | 2025-01-10T00:30:00.000Z |
| 9akk108470a5684 | FLXeon Controllers Cyber Security Advisory | 2025-01-20T00:30:00.000Z | 2025-02-14T00:30:00.000Z |
| sa25p001 | Automation Runtime and mapp View Use of insecure algorithm for self-signed certificates | 2025-01-15T00:30:00.000Z | 2025-01-16T00:30:00.000Z |
| 3adr011377 | AC500 V3 Multiple vulnerabilities | 2025-01-07T00:30:00.000Z | 2025-01-07T00:30:00.000Z |
| 7paa013309 | System 800xA SECURITY Advisory - ABB 800xA Base 6.0.x, 6.1.x CSLib communication DoS vulnerability | 2024-06-05T00:30:00.000Z | 2026-01-23T00:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10155-1 | cockpit-podman-119.1-2.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10154-1 | cockpit-354-3.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10153-1 | chromedriver-144.0.7559.132-1.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:20180-1 | Security update for python-maturin | 2026-02-05T20:51:59Z | 2026-02-05T20:51:59Z |
| opensuse-su-2026:20178-1 | Security update for libxml2 | 2026-02-05T11:26:20Z | 2026-02-05T11:26:20Z |
| opensuse-su-2026:20177-1 | Security update for golang-github-prometheus-prometheus | 2026-02-05T10:44:24Z | 2026-02-05T10:44:24Z |
| opensuse-su-2026:10152-1 | python315-3.15.0~a3-4.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10151-1 | python311-wheel-0.46.3-1.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10150-1 | cockpit-subscriptions-14.4-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10149-1 | cockpit-repos-4.7-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10148-1 | cockpit-packages-4.1-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10147-1 | cockpit-machines-346-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:20172-1 | Security update for cups | 2026-02-04T11:37:13Z | 2026-02-04T11:37:13Z |
| opensuse-su-2026:10131-1 | trivy-0.69.0-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10130-1 | python311-PyNaCl-1.6.2-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10129-1 | libmlt++-7-7-7.36.1-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10128-1 | MozillaThunderbird-140.7.1-1.1 on GA media | 2026-01-31T00:00:00Z | 2026-01-31T00:00:00Z |
| opensuse-su-2026:10127-1 | rekor-1.5.0-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10126-1 | python315-3.15.0~a3-3.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10125-1 | python311-django-storages-1.14.6-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10124-1 | golang-github-prometheus-prometheus-3.9.1-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10123-1 | freerdp-3.21.0-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10122-1 | fontforge-20251009-4.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10121-1 | chromedriver-144.0.7559.109-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10120-1 | MozillaFirefox-147.0.2-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10119-1 | ImageMagick-7.1.2.13-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10118-1 | xen-4.21.0_04-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10117-1 | python314-3.14.2-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10116-1 | python311-pypdf-6.6.2-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10115-1 | python311-djangorestframework-3.16.1-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2025-098-02 | Trio™ Q Licensed Data Radios | 2025-04-08T04:00:00.000Z | 2025-04-08T04:00:00.000Z |
| sevd-2025-098-01 | ConneXium Network Manager Software | 2025-04-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-070-03 | WebHMI Component For EcoStruxure™ Power Automation System User Interface and EcoStruxure™ Microgrid Operation Large | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-070-02 | EPAS-UI & EcoSUI | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-070-01 | EcoStruxure™ Panel Server | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-042-04 | Enerlin'X IFE and eIFE | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-03 | EcoStruxure™ Process Expert, EcoStruxure™ Process Expert for AVEVA System Platform | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-01 | ASCO 5310 / 5350 Remote Annunciator | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-02 | Improper Input Validation Vulnerability in Uni-Telway Driver | 2025-02-11T05:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-014-07 | FlexNet Publisher Vulnerability | 2025-01-14T07:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-014-03 | Wind River VxWorks DHCP Server Vulnerability | 2025-01-14T05:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-014-01 | Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC | 2025-01-14T05:00:00.000Z | 2025-04-08T04:00:00.000Z |
| sevd-2025-014-09 | EcoStruxure™ Power Build Rapsody | 2025-01-14T00:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-014-08 | Power Logic HDPM6000 High-Density Metering System | 2025-01-14T00:00:00.000Z | 2025-01-14T00:00:00.000Z |
| sevd-2025-014-06 | RemoteConnect and SCADAPack™ x70 Utilities | 2025-01-14T00:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2025-014-05 | Web Server on Modicon M340, Modbus/TCP Ethernet Modicon M340 module, Modbus/TCP Ethernet Modicon M340 FactoryCast module and Ethernet / Serial RTU communication modules | 2025-01-14T00:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-014-04 | Web Designer for Modicon Communication Modules | 2025-01-14T00:00:00.000Z | 2025-01-14T00:00:00.000Z |
| sevd-2025-014-02 | Pro-face GP-Pro EX and Remote HMI | 2025-01-14T00:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2024-345-03 | Modicon M241 / M251 / M258 / LMC058 | 2024-12-10T05:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2024-345-02 | Harmony HMI and Pro-face HMI products | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-345-01 | PowerChute Serial Shutdown | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-317-03 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T05:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2024-317-04 | EcoStruxure™ IT Gateway | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-02 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-01 | PowerLogic PM5300 Series | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-282-05 | EcoStruxure™ Power Monitoring Expert (PME) | 2024-10-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2024-282-08 | EcoStruxure EV Charging Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-07 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-06 | Zelio Soft 2 | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-04 | EVlink Home Smart and Schneider Charge | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-mastodon-2026-23962 | Mastodon vulnerable to Denial of Service from a single post (client/server) | 2026-02-03T08:44:37.076Z | 2026-02-03T09:12:55.720Z |
| bit-mastodon-2026-23961 | Mastodon may allow a remote suspension bypass | 2026-02-03T08:44:35.033Z | 2026-02-03T09:12:55.720Z |
| bit-kyverno-2026-23881 | Kyverno Denial of Service via Context Variable Amplification in Policy Engine | 2026-02-03T08:42:39.101Z | 2026-02-03T09:12:55.720Z |
| bit-kyverno-2026-22039 | Kyverno Cross-Namespace Privilege Escalation via Policy apiCall | 2026-02-03T08:42:37.380Z | 2026-02-03T09:12:55.720Z |
| bit-ghost-2026-24778 | Ghost vulnerable to XSS via malicious Portal preview links | 2026-02-03T08:40:51.583Z | 2026-02-03T09:12:55.720Z |
| bit-discourse-2026-24742 | Discourse staff action logs expose sensitive information to moderators | 2026-02-02T08:42:31.943Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2026-21865 | Discourse topic conversion permission vulnerability for moderators | 2026-02-02T08:42:28.354Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-69289 | Discourse has insecure default configuration that allows non-admin moderators to takeover any non-staff account via email change | 2026-02-02T08:42:26.675Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-69218 | Discourse moderators can access admin-only reports exposing private upload URLs | 2026-02-02T08:42:24.998Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68934 | Discourse Has Denial of Service (DoS) Vulnerability in Drafts Creation Endpoint | 2026-02-02T08:42:23.259Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68933 | Discourse non-admin moderators can exfiltrate private content via post ownership transfer | 2026-02-02T08:42:21.302Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68666 | Discourse users archives leaked to users with moderation privileges | 2026-02-02T08:42:19.452Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68662 | FinalDestination hostname matching allows SSRF protection bypass | 2026-02-02T08:42:17.844Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68660 | Discourse AI Discover's continue conversation allows threat actor to impersonate user | 2026-02-02T08:42:16.289Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68659 | Discourse has DoS vulnerability in username change endpoint | 2026-02-02T08:42:14.606Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68479 | Discourse subscriptions are susceptible to takeover | 2026-02-02T08:42:12.613Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-67723 | Discourse vulnerable to stored Cross-site Scripting via Katex in discourse-math plugin | 2026-02-02T08:42:10.509Z | 2026-02-10T09:16:50.296Z |
| bit-discourse-2025-66488 | Discourse allows script execution in uploaded HTML/XML files on S3 | 2026-02-02T08:42:08.194Z | 2026-02-02T09:12:04.887Z |
| bit-golang-2025-68119 | Unexpected code execution when invoking toolchain in cmd/go | 2026-01-31T08:43:40.539Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61731 | Arbitrary file write using cgo pkg-config directive in cmd/go | 2026-01-31T08:43:38.643Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61730 | Handshake messages may be processed at the incorrect encryption level in crypto/tls | 2026-01-31T08:43:36.684Z | 2026-02-03T09:12:55.720Z |
| bit-joomla-2025-63083 | Joomla! Core - [20260102] - XSS vector in the pagebreak plugin | 2026-01-31T08:43:33.433Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61728 | Excessive CPU consumption when building archive index in archive/zip | 2026-01-31T08:43:32.870Z | 2026-01-31T09:09:11.750Z |
| bit-joomla-2025-63082 | Joomla! Core - [20260101] - Inadequate content filtering for data URLs | 2026-01-31T08:43:31.962Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61726 | Memory exhaustion in query parameter parsing in net/url | 2026-01-31T08:43:29.079Z | 2026-01-31T09:09:11.750Z |
| bit-mastodon-2026-23964 | Mastodon has insufficient access control to push notification settings | 2026-01-31T08:43:24.123Z | 2026-02-03T09:12:55.720Z |
| bit-discourse-2026-23743 | Discourse allows permalinks to restricted resources to leak resource slugs to unauthorized users | 2026-01-31T08:42:04.050Z | 2026-01-31T09:09:11.750Z |
| bit-gitea-2026-20912 | Gitea: Cross-Repository Authorization Bypass via Release Attachment Linking Leads to Private Attachment Disclosure | 2026-01-30T08:40:49.607Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20904 | Gitea: Broken access control in OpenID visibility toggle enables cross-user visibility changes | 2026-01-30T08:40:47.849Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20897 | Gitea Git LFS Lock Deletion Broken Access Control (Cross-Repo IDOR) | 2026-01-30T08:40:45.840Z | 2026-01-30T09:12:31.676Z |
| ID | Description | Updated |
|---|---|---|
| var-202001-0832 | A Buffer Overflow vulnerability exists in the Message Server service _MsJ2EE_AddStatistic… | 2024-07-23T22:37:43.319000Z |
| var-201208-0222 | Multiple stack-based buffer overflows in msg_server.exe in SAP NetWeaver ABAP 7.x allow r… | 2024-07-23T22:37:43.393000Z |
| var-202108-1148 | An access issue was addressed with improved access restrictions. This issue is fixed in m… | 2024-07-23T22:36:01.656000Z |
| var-200202-0006 | Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause… | 2024-07-23T22:34:48.127000Z |
| var-202007-0395 | Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities … | 2024-07-23T22:33:57.481000Z |
| var-201805-1147 | WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length heap buffe… | 2024-07-23T22:32:10.966000Z |
| var-201902-0647 | LCDS Laquis SCADA prior to version 4.1.0.4150 allows execution of script code by opening … | 2024-07-23T22:32:09.990000Z |
| var-201908-0863 | Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE… | 2024-07-23T22:30:33.144000Z |
| var-201912-0120 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2024-07-23T22:30:32.761000Z |
| var-201912-0114 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2024-07-23T22:30:32.792000Z |
| var-202305-1589 | D-Link DIR-2150 SetSysEmailSettings EmailTo Command Injection Remote Code Execution Vulne… | 2024-07-23T22:30:26.856000Z |
| var-202407-0235 | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can res… | 2024-07-23T22:30:24.825000Z |
| var-202407-0234 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data … | 2024-07-23T22:30:24.699000Z |
| var-202407-0233 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data … | 2024-07-23T22:30:24.731000Z |
| var-202407-0232 | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can res… | 2024-07-23T22:30:24.657000Z |
| var-201112-0097 | Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 a… | 2024-07-23T22:29:05.132000Z |
| var-201801-0152 | An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions pri… | 2024-07-23T22:28:30.754000Z |
| var-201801-0151 | A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior … | 2024-07-23T22:28:30.640000Z |
| var-201807-0341 | ABB Panel Builder 800 all versions has an improper input validation vulnerability which m… | 2024-07-23T22:28:27.949000Z |
| var-201806-1058 | Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices befo… | 2024-07-23T22:28:27.641000Z |
| var-201906-1029 | In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulne… | 2024-07-23T22:28:26.009000Z |
| var-202004-0077 | There are multiple ways an unauthenticated attacker could perform SQL injection on WebAcc… | 2024-07-23T22:28:24.545000Z |
| var-202206-2050 | The affected product is vulnerable to multiple SQL injections, which may allow an unautho… | 2024-07-23T22:27:49.515000Z |
| var-202305-1981 | D-Link DIR-2150 SetSysEmailSettings AccountName Command Injection Remote Code Execution V… | 2024-07-23T22:27:44.287000Z |
| var-202305-0214 | D-Link DIR-2640 HNAP LoginPassword Authentication Bypass Vulnerability. This vulnerabilit… | 2024-07-23T22:27:44.496000Z |
| var-202305-0130 | D-Link DIR-2640 EmailFrom Command Injection Remote Code Execution Vulnerability. This vul… | 2024-07-23T22:27:44.522000Z |
| var-202407-0441 | A vulnerability has been identified in SIMATIC PCS 7 V9.1 (All versions), SIMATIC WinCC R… | 2024-07-23T22:27:41.577000Z |
| var-201105-0156 | Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 30… | 2024-07-23T22:25:52.955000Z |
| var-201402-0028 | The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when Uni… | 2024-07-23T22:25:48.624000Z |
| var-201402-0027 | The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows re… | 2024-07-23T22:25:48.742000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-000004 | The installers for multiple PIONEER products may insecurely load Dynamic Link Libraries | 2026-01-08T13:47+09:00 | 2026-01-08T13:47+09:00 |
| jvndb-2026-000001 | Origin validation error vulnerability in Fujitsu Security Solution AuthConductor Client Basic V2 | 2026-01-07T14:19+09:00 | 2026-01-07T14:19+09:00 |
| jvndb-2026-000002 | Multiple vulnerabilities in multiple NEC branded projectors manufactured by Sharp Display Solutions, Ltd. | 2026-01-07T14:10+09:00 | 2026-01-14T16:54+09:00 |
| jvndb-2026-001001 | Authentication bypass vulnerability in OpenBlocks series | 2026-01-07T10:46+09:00 | 2026-01-07T10:46+09:00 |
| jvndb-2025-022878 | Media Player MP-01 vulnerable to Missing Authentication for Critical Function | 2025-12-24T11:10+09:00 | 2026-01-15T11:10+09:00 |
| jvndb-2025-022400 | Ruijie Networks AP180 Series vulnerable to OS command injection | 2025-12-19T12:33+09:00 | 2025-12-19T12:33+09:00 |
| jvndb-2025-000118 | GROWI vulnerable to cross-site request forgery | 2025-12-17T13:04+09:00 | 2025-12-17T13:04+09:00 |
| jvndb-2025-022062 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-12-17T11:28+09:00 | 2025-12-17T11:28+09:00 |
| jvndb-2025-000117 | SEIKO EPSON printer Web Config vulnerable to stack-based buffer overflow | 2025-12-16T15:31+09:00 | 2025-12-23T11:57+09:00 |
| jvndb-2025-000115 | QND vulnerable to privilege escalation | 2025-12-11T14:33+09:00 | 2025-12-11T14:33+09:00 |
| jvndb-2025-021305 | Android App "Brother iPrint&Scan" improper use of an external cache directory | 2025-12-09T17:25+09:00 | 2025-12-09T17:25+09:00 |
| jvndb-2025-000114 | ELECOM Clone for Windows registers a Windows service with an unquoted file path | 2025-12-09T17:16+09:00 | 2025-12-09T17:16+09:00 |
| jvndb-2025-000113 | Multiple vulnerabilities in GroupSession | 2025-12-08T17:48+09:00 | 2025-12-11T11:30+09:00 |
| jvndb-2025-000116 | GS Yuasa FULLBACK Manager Pro registers Windows services with unquoted file paths | 2025-12-08T14:06+09:00 | 2025-12-08T14:06+09:00 |
| jvndb-2025-000094 | Multiple vulnerabilities in ABB Terra AC Wallbox | 2025-12-05T14:12+09:00 | 2025-12-05T14:12+09:00 |
| jvndb-2025-000112 | Installer of INZONE Hub may insecurely load Dynamic Link Libraries | 2025-11-28T13:36+09:00 | 2025-11-28T13:36+09:00 |
| jvndb-2025-000111 | SwitchBot Smart Video Doorbell vulnerable to active debug code | 2025-11-26T14:35+09:00 | 2025-11-26T14:35+09:00 |
| jvndb-2025-000110 | Multiple vulnerabilities in Security Point (Windows) of MaLion | 2025-11-25T17:17+09:00 | 2025-11-25T17:17+09:00 |
| jvndb-2025-000109 | Multiple vulnerabilities in SNC-CX600W | 2025-11-25T14:59+09:00 | 2025-11-25T14:59+09:00 |
| jvndb-2025-000108 | "FOD" App uses hard-coded cryptographic keys | 2025-11-25T14:15+09:00 | 2025-11-25T14:15+09:00 |
| jvndb-2025-000106 | Multiple vulnerabilities in LogStare Collector | 2025-11-21T16:27+09:00 | 2025-11-21T16:27+09:00 |
| jvndb-2025-019621 | EPSON WebConfig / Epson Web Control for SEIKO EPSON Projector Products do not restrict excessive authentication attempts | 2025-11-21T15:31+09:00 | 2025-12-24T10:54+09:00 |
| jvndb-2025-000107 | Installer of RakurakuMusen Start EX for Windows may insecurely load Dynamic Link Libraries | 2025-11-19T16:22+09:00 | 2025-11-19T16:22+09:00 |
| jvndb-2025-000097 | "Dejira" App for iOS vulnerable to improper server certificate verification | 2025-11-17T14:09+09:00 | 2025-11-17T14:09+09:00 |
| jvndb-2025-000105 | NCP-HG100 vulnerable to OS command injection | 2025-11-14T15:26+09:00 | 2025-11-14T15:26+09:00 |
| jvndb-2025-000104 | Multiple vulnerabilities in GNU Libmicrohttpd | 2025-11-10T15:07+09:00 | 2025-11-10T15:07+09:00 |
| jvndb-2025-000103 | Use of password hash with insufficient computational effort vulnerability in BUFFALO Wi-Fi router "WSR-1800AX4 series" | 2025-11-07T15:39+09:00 | 2025-11-07T15:39+09:00 |
| jvndb-2025-000102 | CLUSTERPRO X and EXPRESSCLUSTER X vulnerable to OS command injection | 2025-11-07T14:55+09:00 | 2025-11-07T14:55+09:00 |
| jvndb-2025-000101 | GROWI vulnerable to stored cross-site scripting | 2025-11-06T13:45+09:00 | 2025-11-06T13:45+09:00 |
| jvndb-2025-017972 | Multiple vulnerabilities in Century Systems FutureNet MA and IP-K series | 2025-11-04T16:37+09:00 | 2025-11-04T16:37+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0385-1 | Security update for the Linux Kernel | 2026-02-04T12:55:07Z | 2026-02-04T12:55:07Z |
| suse-su-2026:0384-1 | Security update for ImageMagick | 2026-02-04T12:46:45Z | 2026-02-04T12:46:45Z |
| suse-su-2026:0383-1 | Security update for rekor | 2026-02-04T12:46:28Z | 2026-02-04T12:46:28Z |
| suse-su-2026:0382-1 | Security update for java-1_8_0-ibm | 2026-02-04T12:45:58Z | 2026-02-04T12:45:58Z |
| suse-su-2026:0381-1 | Security update for abseil-cpp | 2026-02-04T09:34:53Z | 2026-02-04T09:34:53Z |
| suse-su-2026:0361-1 | Security update for logback | 2026-02-02T13:20:41Z | 2026-02-02T13:20:41Z |
| suse-su-2026:0360-1 | Security update for openssl-1_1 | 2026-02-02T09:55:48Z | 2026-02-02T09:55:48Z |
| suse-su-2026:0359-1 | Security update for openssl-1_1 | 2026-02-02T09:55:09Z | 2026-02-02T09:55:09Z |
| suse-su-2026:0358-1 | Security update for openssl-1_1 | 2026-02-02T09:54:23Z | 2026-02-02T09:54:23Z |
| suse-su-2026:0356-1 | Security update for qemu | 2026-02-01T21:18:57Z | 2026-02-01T21:18:57Z |
| suse-su-2026:0355-1 | Security update for glib2 | 2026-01-31T02:04:37Z | 2026-01-31T02:04:37Z |
| suse-su-2026:0352-1 | Security update for the Linux Kernel | 2026-01-30T14:05:23Z | 2026-01-30T14:05:23Z |
| suse-su-2026:0351-1 | Security update for openCryptoki | 2026-01-30T14:04:38Z | 2026-01-30T14:04:38Z |
| suse-su-2026:0350-1 | Security update for the Linux Kernel | 2026-01-30T13:42:59Z | 2026-01-30T13:42:59Z |
| suse-su-2026:0348-1 | Security update for bind | 2026-01-30T11:17:07Z | 2026-01-30T11:17:07Z |
| suse-su-2026:0347-1 | Security update for glibc-livepatches | 2026-01-30T10:36:11Z | 2026-01-30T10:36:11Z |
| suse-su-2026:20180-1 | Security update for unbound | 2026-01-30T10:04:18Z | 2026-01-30T10:04:18Z |
| suse-su-2026:0346-1 | Security update for openssl-1_1 | 2026-01-30T09:01:28Z | 2026-01-30T09:01:28Z |
| suse-su-2026:0345-1 | Security update for freerdp | 2026-01-30T07:18:43Z | 2026-01-30T07:18:43Z |
| suse-su-2026:0344-1 | Security update for assertj-core | 2026-01-29T20:04:07Z | 2026-01-29T20:04:07Z |
| suse-su-2026:0343-1 | Security update for openssl-1_1 | 2026-01-29T18:34:02Z | 2026-01-29T18:34:02Z |
| suse-su-2026:20178-1 | Security update for glibc | 2026-01-29T16:36:29Z | 2026-01-29T16:36:29Z |
| suse-su-2026:20179-1 | Security update for gpg2 | 2026-01-29T16:09:32Z | 2026-01-29T16:09:32Z |
| suse-su-2026:20176-1 | Security update for elemental-register, elemental-toolkit | 2026-01-29T15:32:26Z | 2026-01-29T15:32:26Z |
| suse-su-2026:0342-1 | Security update for java-25-openjdk | 2026-01-29T14:59:30Z | 2026-01-29T14:59:30Z |
| suse-su-2026:0341-1 | Security update for java-11-openjdk | 2026-01-29T14:58:19Z | 2026-01-29T14:58:19Z |
| suse-su-2026:0338-1 | Security update for abseil-cpp | 2026-01-29T10:35:48Z | 2026-01-29T10:35:48Z |
| suse-su-2026:0337-1 | Security update for python | 2026-01-29T10:34:17Z | 2026-01-29T10:34:17Z |
| suse-su-2026:0336-1 | Security update for libxml2 | 2026-01-29T10:16:20Z | 2026-01-29T10:16:20Z |
| suse-su-2026:0335-1 | Security update for python-filelock | 2026-01-29T10:15:42Z | 2026-01-29T10:15:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-06903 | WordPress Aplazo Payment Gateway plugin缺少权限漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06902 | WordPress AJS Footnotes plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06808 | Cyber Cafe Management System add-users.php端点跨站脚本漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-06807 | Cyber Cafe Management System add-users.php端点跨站脚本漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-06806 | Cyber Cafe Management System add-users.php端点SQL注入漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-06805 | Cyber Cafe Management System adminprofile.php端点SQL注入漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-06433 | D-Link DIR-806A命令注入漏洞 | 2026-01-19 | 2026-01-19 |
| cnvd-2026-06093 | Tenda AX-3 fromAdvSetMacMtuWan函数栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06092 | Tenda AX-3 fromAdvSetMacMtuWan函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06091 | Tenda AX-3 fromAdvSetMacMtuWan函数栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06090 | Tenda AX-3 fromAdvSetMacMtuWan函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06089 | Tenda AX-3 fromAdvSetMacMtuWan函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06088 | Tenda AX1806 sub_4CA50函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06087 | Tenda AX1806 sub_65B5C函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06086 | Tenda AX1806 sub_65B5C函数栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06085 | Tenda AX1806 sub_65B5C函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06084 | Tenda AX1806 sub_65A28函数栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06082 | GPAC vobsub_get_subpic_duration函数缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06081 | GPAC uncv_parse_config函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06080 | GPAC dump_ttxt_sample函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06079 | GPAC pcmreframe_flush_packet函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06078 | GPAC oggdmx_parse_tags函数越界读取漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06077 | GPAC avi_parse_input_file函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06076 | GPAC ghi_dmx_declare_opid_bin函数堆缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06075 | GPAC越界读取漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06074 | GPAC vorbis_to_intern函数堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-06073 | GPAC堆栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| cnvd-2026-05118 | Kentico Xperience跨站脚本漏洞(CNVD-2026-05118) | 2026-01-19 | 2026-01-20 |
| cnvd-2026-04539 | Tenda AX-1806路由器栈溢出漏洞 | 2026-01-16 | 2026-01-16 |
| cnvd-2026-04663 | PHPEMS跨站请求伪造漏洞 | 2026-01-15 | 2026-01-16 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0141 | Multiples vulnérabilités dans les produits SAP | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0140 | Multiples vulnérabilités dans les produits Axis | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0139 | Multiples vulnérabilités dans les produits Siemens | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0138 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0137 | Multiples vulnérabilités dans GnuTLS | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0136 | Vulnérabilité dans Fortinet FortiClientEMS | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0135 | Vulnérabilité dans GitLab AI Gateway | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0134 | Vulnérabilité dans Microsoft Edge | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0132 | Multiples vulnérabilités dans VMware Tanzu Greenplum | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0131 | Multiples vulnérabilités dans les produits IBM | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0130 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0129 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0128 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0127 | Vulnérabilité dans NetApp ONTAP 9 | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0126 | Vulnérabilité dans ESET Management Agent | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0125 | Multiples vulnérabilités dans les produits Moxa | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0124 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0123 | Multiples vulnérabilités dans Asterisk | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0122 | Multiples vulnérabilités dans Tenable Nessus | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0121 | Vulnérabilité dans les produits Juniper Networks | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0120 | Multiples vulnérabilités dans les produits F5 | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0119 | Multiples vulnérabilités dans les produits Cisco | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0118 | Multiples vulnérabilités dans les produits Splunk | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0117 | Multiples vulnérabilités dans GLPI | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0116 | Vulnérabilité dans les produits Moxa | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0115 | Multiples vulnérabilités dans Tenable Identity Exposure | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0114 | Multiples vulnérabilités dans Google Chrome | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0113 | Vulnérabilité dans Google Pixel | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0112 | Multiples vulnérabilités dans les produits VMware | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-ALE-001 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| certfr-2024-ale-015 | [MàJ] Multiples vulnérabilités sur l'interface d'administration des équipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| CERTFR-2024-ALE-015 | [MàJ] Multiples vulnérabilités sur l'interface d'administration des équipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-ale-014 | [MàJ] Multiples vulnérabilités dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| CERTFR-2024-ALE-014 | [MàJ] Multiples vulnérabilités dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-ale-012 | [MàJ] Vulnérabilités affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| CERTFR-2024-ALE-012 | [MàJ] Vulnérabilités affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-011 | Vulnérabilité dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| CERTFR-2024-ALE-011 | Vulnérabilité dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-010 | Multiples vulnérabilités dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| CERTFR-2024-ALE-010 | Multiples vulnérabilités dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| certfr-2024-ale-009 | Vulnérabilité dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| CERTFR-2024-ALE-009 | Vulnérabilité dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| certfr-2024-ale-008 | [MàJ] Vulnérabilité dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-008 | [MàJ] Vulnérabilité dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-007 | Multiples vulnérabilités dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-007 | Multiples vulnérabilités dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-006 | [MàJ] Vulnérabilité dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-006 | [MàJ] Vulnérabilité dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-005 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2024-02-15T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| CERTFR-2024-ALE-005 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2024-02-15T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-004 | [MàJ] Vulnérabilité dans Fortinet FortiOS | 2024-02-09T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-004 | [MàJ] Vulnérabilité dans Fortinet FortiOS | 2024-02-09T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-003 | [MàJ] Incident affectant les solutions AnyDesk | 2024-02-05T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| CERTFR-2024-ALE-003 | [MàJ] Incident affectant les solutions AnyDesk | 2024-02-05T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| CERTFR-2024-ALE-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| certfr-2024-ale-001 | [MàJ] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| CERTFR-2024-ALE-001 | [MàJ] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2023-ale-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2025-0013 |
9.4 (4.0)
|
Vulnerability in sharing group blueprints allowing sha… |
misp |
misp |
2025-11-04T08:49:21.558087Z | 2025-11-04T08:49:21.558087Z |
| GCVE-1-2025-0012 |
N/A
|
Potential vulnerability in file check upload but non-e… |
misp |
misp |
2025-11-04T07:20:00.000Z | 2025-11-28T07:16:21.589449Z |
| GCVE-1-2025-0011 |
9.4 (4.0)
|
Arbitrary file inclusion / deletion via import modules… |
misp |
misp |
2025-11-04T07:01:25.464225Z | 2025-11-04T07:01:25.464225Z |
| GCVE-1-2025-0010 |
6.3 (4.0)
|
Arbitrary file hash inclusion via templates accessible… |
misp |
misp |
2025-11-04T06:25:11.108987Z | 2025-11-04T06:25:11.108987Z |
| GCVE-1-2025-0009 |
6.4 (4.0)
|
A pre-auth user could self-assign a reporter without b… |
CIRCL |
vulnerability-lookup |
2025-10-13T09:20:24.800890Z | 2025-10-13T09:20:24.800890Z |
| GCVE-1-2025-0008 |
7 (4.0)
|
Logged users can view vulnerability disclosure comment… |
CIRCL |
vulnerability-lookup |
2025-10-13T09:10:00.000Z | 2025-10-13T09:15:31.637686Z |
| GCVE-1-2025-0007 |
4.5 (4.0)
|
Missing email validation on user management |
CIRCL |
vulnerability-lookup |
2025-10-13T08:37:00.000Z | 2025-10-13T08:51:37.408861Z |
| GCVE-1-2025-0006 |
9.3 (4.0)
|
Potential XSS in admin CPE in organization model |
CIRCL |
vulnerability-lookup |
2025-10-13T08:29:00.000Z | 2025-10-13T08:52:23.411325Z |
| GCVE-1-2025-0005 |
9.4 (4.0)
|
Reflected XSS due to insecure use of Markup |
CIRCL |
vulnerability-lookup |
2025-10-13T08:23:29.812914Z | 2025-10-13T08:23:29.812914Z |
| GCVE-1-2025-0004 |
10 (4.0)
|
XSS in Comments, Bundles, and Sightings component of v… |
CIRCL |
vulnerability-lookup |
2025-09-25T14:10:00.000Z | 2025-11-19T10:16:47.656802Z |
| GCVE-1-2025-0003 |
9.3 (4.0)
|
Incorrect ACL for user settings edit, which previ… |
cerebrate |
cerebrate |
2025-08-22T12:33:00.000Z | 2025-08-23T07:55:10.950332Z |
| GCVE-1-2025-0002 |
8.9 (4.0)
|
Command Injection in Cl0p Exfiltration Python Script |
Cl0p ransomware |
exfiltration |
2025-07-01T08:19:00.000Z | 2025-07-01T10:58:58.443468Z |
| GCVE-1-2025-0001 |
5.3 (4.0)
|
The absence of a password confirmation step when deact… |
CIRCL |
Vulnerability-Lookup |
2025-05-27T08:58:00.000Z | 2025-05-30T14:27:56.273945Z |