Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23182 |
N/A
|
spi: tegra: Fix a memory leak in tegra_slink_probe() |
Linux |
Linux |
2026-02-14T16:27:12.806Z | 2026-02-14T16:27:12.806Z |
| CVE-2026-23181 |
N/A
|
btrfs: sync read disk super and set block size |
Linux |
Linux |
2026-02-14T16:27:12.137Z | 2026-02-14T16:27:12.137Z |
| CVE-2026-23180 |
N/A
|
dpaa2-switch: add bounds check for if_id in IRQ handler |
Linux |
Linux |
2026-02-14T16:27:11.463Z | 2026-02-14T16:27:11.463Z |
| CVE-2026-23179 |
N/A
|
nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() |
Linux |
Linux |
2026-02-14T16:27:10.778Z | 2026-02-14T16:27:10.778Z |
| CVE-2026-23178 |
N/A
|
HID: i2c-hid: fix potential buffer overflow in i2c_hid… |
Linux |
Linux |
2026-02-14T16:27:10.108Z | 2026-02-14T16:27:10.108Z |
| CVE-2026-23177 |
N/A
|
mm, shmem: prevent infinite loop on truncate race |
Linux |
Linux |
2026-02-14T16:27:09.429Z | 2026-02-14T16:27:09.429Z |
| CVE-2026-23176 |
N/A
|
platform/x86: toshiba_haps: Fix memory leaks in add/re… |
Linux |
Linux |
2026-02-14T16:27:08.764Z | 2026-02-14T16:27:08.764Z |
| CVE-2026-23175 |
N/A
|
net: cpsw: Execute ndo_set_rx_mode callback in a work queue |
Linux |
Linux |
2026-02-14T16:27:08.104Z | 2026-02-14T16:27:08.104Z |
| CVE-2026-23174 |
N/A
|
nvme-pci: handle changing device dma map requirements |
Linux |
Linux |
2026-02-14T16:27:07.421Z | 2026-02-14T16:27:07.421Z |
| CVE-2025-71224 |
N/A
|
wifi: mac80211: ocb: skip rx_no_sta when interface is … |
Linux |
Linux |
2026-02-14T16:27:06.752Z | 2026-02-14T16:27:06.752Z |
| CVE-2025-71223 |
N/A
|
smb/server: fix refcount leak in smb2_open() |
Linux |
Linux |
2026-02-14T16:27:06.060Z | 2026-02-14T16:27:06.060Z |
| CVE-2025-71222 |
N/A
|
wifi: wlcore: ensure skb headroom before skb_push |
Linux |
Linux |
2026-02-14T16:27:05.363Z | 2026-02-14T16:27:05.363Z |
| CVE-2025-71221 |
N/A
|
dmaengine: mmp_pdma: Fix race condition in mmp_pdma_re… |
Linux |
Linux |
2026-02-14T16:27:04.631Z | 2026-02-14T16:27:04.631Z |
| CVE-2025-71220 |
N/A
|
smb/server: call ksmbd_session_rpc_close() on error pa… |
Linux |
Linux |
2026-02-14T16:27:03.946Z | 2026-02-14T16:27:03.946Z |
| CVE-2025-71204 |
N/A
|
smb/server: fix refcount leak in parse_durable_handle_… |
Linux |
Linux |
2026-02-14T16:27:03.252Z | 2026-02-14T16:27:03.252Z |
| CVE-2025-71203 |
N/A
|
riscv: Sanitize syscall table indexing under speculation |
Linux |
Linux |
2026-02-14T16:27:02.513Z | 2026-02-14T16:27:02.513Z |
| CVE-2026-23173 |
N/A
|
net/mlx5e: TC, delete flows only for existing peers |
Linux |
Linux |
2026-02-14T16:01:34.842Z | 2026-02-14T16:01:34.842Z |
| CVE-2026-23172 |
N/A
|
net: wwan: t7xx: fix potential skb->frags overflow in … |
Linux |
Linux |
2026-02-14T16:01:34.165Z | 2026-02-14T16:01:34.165Z |
| CVE-2026-23171 |
N/A
|
bonding: fix use-after-free due to enslave fail after … |
Linux |
Linux |
2026-02-14T16:01:33.489Z | 2026-02-14T16:01:33.489Z |
| CVE-2026-23170 |
N/A
|
drm/imx/tve: fix probe device leak |
Linux |
Linux |
2026-02-14T16:01:32.833Z | 2026-02-14T16:01:32.833Z |
| CVE-2026-23169 |
N/A
|
mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() |
Linux |
Linux |
2026-02-14T16:01:32.139Z | 2026-02-14T16:01:32.139Z |
| CVE-2026-23168 |
N/A
|
flex_proportions: make fprop_new_period() hardirq safe |
Linux |
Linux |
2026-02-14T16:01:31.465Z | 2026-02-14T16:01:31.465Z |
| CVE-2026-23167 |
N/A
|
nfc: nci: Fix race between rfkill and nci_unregister_d… |
Linux |
Linux |
2026-02-14T16:01:30.755Z | 2026-02-14T16:01:30.755Z |
| CVE-2026-23166 |
N/A
|
ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues |
Linux |
Linux |
2026-02-14T16:01:30.059Z | 2026-02-14T16:01:30.059Z |
| CVE-2026-23165 |
N/A
|
sfc: fix deadlock in RSS config read |
Linux |
Linux |
2026-02-14T16:01:29.336Z | 2026-02-14T16:01:29.336Z |
| CVE-2026-23164 |
N/A
|
rocker: fix memory leak in rocker_world_port_post_fini() |
Linux |
Linux |
2026-02-14T16:01:28.624Z | 2026-02-14T16:01:28.624Z |
| CVE-2026-23163 |
N/A
|
drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc… |
Linux |
Linux |
2026-02-14T16:01:27.912Z | 2026-02-14T16:01:27.912Z |
| CVE-2026-23162 |
N/A
|
drm/xe/nvm: Fix double-free on aux add failure |
Linux |
Linux |
2026-02-14T16:01:27.243Z | 2026-02-14T16:01:27.243Z |
| CVE-2026-23161 |
N/A
|
mm/shmem, swap: fix race of truncate and swap entry split |
Linux |
Linux |
2026-02-14T16:01:26.569Z | 2026-02-14T16:01:26.569Z |
| CVE-2026-23160 |
N/A
|
octeon_ep: Fix memory leak in octep_device_setup() |
Linux |
Linux |
2026-02-14T16:01:25.900Z | 2026-02-14T16:01:25.900Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23181 |
N/A
|
btrfs: sync read disk super and set block size |
Linux |
Linux |
2026-02-14T16:27:12.137Z | 2026-02-14T16:27:12.137Z |
| CVE-2026-23180 |
N/A
|
dpaa2-switch: add bounds check for if_id in IRQ handler |
Linux |
Linux |
2026-02-14T16:27:11.463Z | 2026-02-14T16:27:11.463Z |
| CVE-2026-23179 |
N/A
|
nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() |
Linux |
Linux |
2026-02-14T16:27:10.778Z | 2026-02-14T16:27:10.778Z |
| CVE-2026-23178 |
N/A
|
HID: i2c-hid: fix potential buffer overflow in i2c_hid… |
Linux |
Linux |
2026-02-14T16:27:10.108Z | 2026-02-14T16:27:10.108Z |
| CVE-2026-23177 |
N/A
|
mm, shmem: prevent infinite loop on truncate race |
Linux |
Linux |
2026-02-14T16:27:09.429Z | 2026-02-14T16:27:09.429Z |
| CVE-2026-23176 |
N/A
|
platform/x86: toshiba_haps: Fix memory leaks in add/re… |
Linux |
Linux |
2026-02-14T16:27:08.764Z | 2026-02-14T16:27:08.764Z |
| CVE-2026-23175 |
N/A
|
net: cpsw: Execute ndo_set_rx_mode callback in a work queue |
Linux |
Linux |
2026-02-14T16:27:08.104Z | 2026-02-14T16:27:08.104Z |
| CVE-2026-23174 |
N/A
|
nvme-pci: handle changing device dma map requirements |
Linux |
Linux |
2026-02-14T16:27:07.421Z | 2026-02-14T16:27:07.421Z |
| CVE-2025-71224 |
N/A
|
wifi: mac80211: ocb: skip rx_no_sta when interface is … |
Linux |
Linux |
2026-02-14T16:27:06.752Z | 2026-02-14T16:27:06.752Z |
| CVE-2025-71223 |
N/A
|
smb/server: fix refcount leak in smb2_open() |
Linux |
Linux |
2026-02-14T16:27:06.060Z | 2026-02-14T16:27:06.060Z |
| CVE-2025-71222 |
N/A
|
wifi: wlcore: ensure skb headroom before skb_push |
Linux |
Linux |
2026-02-14T16:27:05.363Z | 2026-02-14T16:27:05.363Z |
| CVE-2025-71221 |
N/A
|
dmaengine: mmp_pdma: Fix race condition in mmp_pdma_re… |
Linux |
Linux |
2026-02-14T16:27:04.631Z | 2026-02-14T16:27:04.631Z |
| CVE-2025-71220 |
N/A
|
smb/server: call ksmbd_session_rpc_close() on error pa… |
Linux |
Linux |
2026-02-14T16:27:03.946Z | 2026-02-14T16:27:03.946Z |
| CVE-2025-71204 |
N/A
|
smb/server: fix refcount leak in parse_durable_handle_… |
Linux |
Linux |
2026-02-14T16:27:03.252Z | 2026-02-14T16:27:03.252Z |
| CVE-2025-71203 |
N/A
|
riscv: Sanitize syscall table indexing under speculation |
Linux |
Linux |
2026-02-14T16:27:02.513Z | 2026-02-14T16:27:02.513Z |
| CVE-2026-23173 |
N/A
|
net/mlx5e: TC, delete flows only for existing peers |
Linux |
Linux |
2026-02-14T16:01:34.842Z | 2026-02-14T16:01:34.842Z |
| CVE-2026-23172 |
N/A
|
net: wwan: t7xx: fix potential skb->frags overflow in … |
Linux |
Linux |
2026-02-14T16:01:34.165Z | 2026-02-14T16:01:34.165Z |
| CVE-2026-23171 |
N/A
|
bonding: fix use-after-free due to enslave fail after … |
Linux |
Linux |
2026-02-14T16:01:33.489Z | 2026-02-14T16:01:33.489Z |
| CVE-2026-23170 |
N/A
|
drm/imx/tve: fix probe device leak |
Linux |
Linux |
2026-02-14T16:01:32.833Z | 2026-02-14T16:01:32.833Z |
| CVE-2026-23169 |
N/A
|
mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() |
Linux |
Linux |
2026-02-14T16:01:32.139Z | 2026-02-14T16:01:32.139Z |
| CVE-2026-23168 |
N/A
|
flex_proportions: make fprop_new_period() hardirq safe |
Linux |
Linux |
2026-02-14T16:01:31.465Z | 2026-02-14T16:01:31.465Z |
| CVE-2026-23167 |
N/A
|
nfc: nci: Fix race between rfkill and nci_unregister_d… |
Linux |
Linux |
2026-02-14T16:01:30.755Z | 2026-02-14T16:01:30.755Z |
| CVE-2026-23166 |
N/A
|
ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues |
Linux |
Linux |
2026-02-14T16:01:30.059Z | 2026-02-14T16:01:30.059Z |
| CVE-2026-23165 |
N/A
|
sfc: fix deadlock in RSS config read |
Linux |
Linux |
2026-02-14T16:01:29.336Z | 2026-02-14T16:01:29.336Z |
| CVE-2026-23164 |
N/A
|
rocker: fix memory leak in rocker_world_port_post_fini() |
Linux |
Linux |
2026-02-14T16:01:28.624Z | 2026-02-14T16:01:28.624Z |
| CVE-2026-23163 |
N/A
|
drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc… |
Linux |
Linux |
2026-02-14T16:01:27.912Z | 2026-02-14T16:01:27.912Z |
| CVE-2026-23162 |
N/A
|
drm/xe/nvm: Fix double-free on aux add failure |
Linux |
Linux |
2026-02-14T16:01:27.243Z | 2026-02-14T16:01:27.243Z |
| CVE-2026-23161 |
N/A
|
mm/shmem, swap: fix race of truncate and swap entry split |
Linux |
Linux |
2026-02-14T16:01:26.569Z | 2026-02-14T16:01:26.569Z |
| CVE-2026-23160 |
N/A
|
octeon_ep: Fix memory leak in octep_device_setup() |
Linux |
Linux |
2026-02-14T16:01:25.900Z | 2026-02-14T16:01:25.900Z |
| CVE-2026-23159 |
N/A
|
perf: sched: Fix perf crash with new is_user_task() helper |
Linux |
Linux |
2026-02-14T16:01:25.229Z | 2026-02-14T16:01:25.229Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-23143 | In the Linux kernel, the following vulnerability has been resolved: virtio_net: Fix misalignment b… | 2026-02-14T16:15:54.383 | 2026-02-14T16:15:54.383 |
| fkie_cve-2026-23142 | In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs-scheme: cleanup… | 2026-02-14T16:15:54.273 | 2026-02-14T16:15:54.273 |
| fkie_cve-2026-23141 | In the Linux kernel, the following vulnerability has been resolved: btrfs: send: check for inline … | 2026-02-14T16:15:54.163 | 2026-02-14T16:15:54.163 |
| fkie_cve-2026-23140 | In the Linux kernel, the following vulnerability has been resolved: bpf, test_run: Subtract size o… | 2026-02-14T16:15:54.060 | 2026-02-14T16:15:54.060 |
| fkie_cve-2026-23139 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: updat… | 2026-02-14T16:15:53.950 | 2026-02-14T16:15:53.950 |
| fkie_cve-2026-23138 | In the Linux kernel, the following vulnerability has been resolved: tracing: Add recursion protect… | 2026-02-14T16:15:53.830 | 2026-02-14T16:15:53.830 |
| fkie_cve-2026-23137 | In the Linux kernel, the following vulnerability has been resolved: of: unittest: Fix memory leak … | 2026-02-14T16:15:53.703 | 2026-02-14T16:15:53.703 |
| fkie_cve-2026-23136 | In the Linux kernel, the following vulnerability has been resolved: libceph: reset sparse-read sta… | 2026-02-14T16:15:53.590 | 2026-02-14T16:15:53.590 |
| fkie_cve-2026-23135 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dma_free_coh… | 2026-02-14T16:15:53.483 | 2026-02-14T16:15:53.483 |
| fkie_cve-2026-23134 | In the Linux kernel, the following vulnerability has been resolved: slab: fix kmalloc_nolock() con… | 2026-02-14T16:15:53.377 | 2026-02-14T16:15:53.377 |
| fkie_cve-2026-23133 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: fix dma_free_coh… | 2026-02-14T16:15:53.270 | 2026-02-14T16:15:53.270 |
| fkie_cve-2026-23132 | In the Linux kernel, the following vulnerability has been resolved: drm/bridge: synopsys: dw-dp: f… | 2026-02-14T16:15:53.163 | 2026-02-14T16:15:53.163 |
| fkie_cve-2025-71202 | In the Linux kernel, the following vulnerability has been resolved: iommu/sva: invalidate stale IO… | 2026-02-14T16:15:52.790 | 2026-02-14T16:15:52.790 |
| fkie_cve-2025-71201 | In the Linux kernel, the following vulnerability has been resolved: netfs: Fix early read unlock o… | 2026-02-14T16:15:52.647 | 2026-02-14T16:15:52.647 |
| fkie_cve-2026-23131 | In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix … | 2026-02-14T15:16:08.387 | 2026-02-14T15:16:08.387 |
| fkie_cve-2026-23130 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dead lock wh… | 2026-02-14T15:16:08.277 | 2026-02-14T15:16:08.277 |
| fkie_cve-2026-23129 | In the Linux kernel, the following vulnerability has been resolved: dpll: Prevent duplicate regist… | 2026-02-14T15:16:08.173 | 2026-02-14T15:16:08.173 |
| fkie_cve-2026-23128 | In the Linux kernel, the following vulnerability has been resolved: arm64: Set __nocfi on swsusp_a… | 2026-02-14T15:16:08.060 | 2026-02-14T15:16:08.060 |
| fkie_cve-2026-23127 | In the Linux kernel, the following vulnerability has been resolved: perf: Fix refcount warning on … | 2026-02-14T15:16:07.963 | 2026-02-14T15:16:07.963 |
| fkie_cve-2026-23126 | In the Linux kernel, the following vulnerability has been resolved: netdevsim: fix a race issue re… | 2026-02-14T15:16:07.853 | 2026-02-14T15:16:07.853 |
| fkie_cve-2026-23125 | In the Linux kernel, the following vulnerability has been resolved: sctp: move SCTP_CMD_ASSOC_SHKE… | 2026-02-14T15:16:07.740 | 2026-02-14T15:16:07.740 |
| fkie_cve-2026-23124 | In the Linux kernel, the following vulnerability has been resolved: ipv6: annotate data-race in nd… | 2026-02-14T15:16:07.633 | 2026-02-14T15:16:07.633 |
| fkie_cve-2026-23123 | In the Linux kernel, the following vulnerability has been resolved: interconnect: debugfs: initial… | 2026-02-14T15:16:07.500 | 2026-02-14T15:16:07.500 |
| fkie_cve-2026-23122 | In the Linux kernel, the following vulnerability has been resolved: igc: Reduce TSN TX packet buff… | 2026-02-14T15:16:07.390 | 2026-02-14T15:16:07.390 |
| fkie_cve-2026-23121 | In the Linux kernel, the following vulnerability has been resolved: mISDN: annotate data-race arou… | 2026-02-14T15:16:07.280 | 2026-02-14T15:16:07.280 |
| fkie_cve-2026-23120 | In the Linux kernel, the following vulnerability has been resolved: l2tp: avoid one data-race in l… | 2026-02-14T15:16:07.157 | 2026-02-14T15:16:07.157 |
| fkie_cve-2026-23119 | In the Linux kernel, the following vulnerability has been resolved: bonding: provide a net pointer… | 2026-02-14T15:16:07.043 | 2026-02-14T15:16:07.043 |
| fkie_cve-2026-23118 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix data-race warning a… | 2026-02-14T15:16:06.933 | 2026-02-14T15:16:06.933 |
| fkie_cve-2026-23117 | In the Linux kernel, the following vulnerability has been resolved: ice: add missing ice_deinit_hw… | 2026-02-14T15:16:06.830 | 2026-02-14T15:16:06.830 |
| fkie_cve-2026-23116 | In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: Remo… | 2026-02-14T15:16:06.713 | 2026-02-14T15:16:06.713 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-4fxm-jm89-7f7q |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: sync read disk super an… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:16Z |
| ghsa-48gf-xj76-5v9h |
|
In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: fix … | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-3mg9-9f72-h562 |
|
In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid … | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-3jpp-f2wm-pcvv |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mld: cancel mlo… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-2m65-7fpj-78p9 |
|
In the Linux kernel, the following vulnerability has been resolved: hwmon: (acpi_power_meter) Fix … | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-xph2-5pq4-m7jp |
|
In the Linux kernel, the following vulnerability has been resolved: riscv: Sanitize syscall table … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-wrw7-63r4-jj3j |
|
In the Linux kernel, the following vulnerability has been resolved: nvme-pci: handle changing devi… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-wc6c-368q-8vvv |
|
In the Linux kernel, the following vulnerability has been resolved: smb/server: fix refcount leak … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-rm73-jpvr-q26q |
|
In the Linux kernel, the following vulnerability has been resolved: smb/server: fix refcount leak … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-r6pf-fx8p-436v |
|
In the Linux kernel, the following vulnerability has been resolved: efivarfs: fix error propagatio… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-r3f7-9rj4-j5fm |
|
In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race in mptcp_pm_nl… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-qrjv-2grw-rfj4 |
|
In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-q8wj-qfj9-vjfp |
|
In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix UAF in con… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-pw2v-cmfh-x2p3 |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: do not strictly require… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-phfr-35gx-vf86 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/xe/nvm: Fix double-free on… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-mg8f-6pj8-cf5j |
|
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix race between rfk… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-m5mw-gf4c-pwc3 |
|
In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: fix potential… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-h3xv-g92m-m7cv |
|
In the Linux kernel, the following vulnerability has been resolved: drm/imx/tve: fix probe device … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-fg9w-2hrh-3rjq |
|
In the Linux kernel, the following vulnerability has been resolved: net: fix segmentation of forwa… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:15Z |
| ghsa-9vc4-746x-p2rf |
|
In the Linux kernel, the following vulnerability has been resolved: sfc: fix deadlock in RSS confi… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-9j4j-wgpf-5mxc |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: wlcore: ensure skb headr… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-959m-9w2w-7jxc |
|
In the Linux kernel, the following vulnerability has been resolved: dmaengine: mmp_pdma: Fix race … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-7xmm-c998-f7c9 |
|
In the Linux kernel, the following vulnerability has been resolved: flex_proportions: make fprop_n… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-7g88-w646-8r4r |
|
In the Linux kernel, the following vulnerability has been resolved: octeon_ep: Fix memory leak in … | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-6rr8-q652-pwgf |
|
In the Linux kernel, the following vulnerability has been resolved: net: cpsw: Execute ndo_set_rx_… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-6hxq-g3f7-5m89 |
|
In the Linux kernel, the following vulnerability has been resolved: smb/server: call ksmbd_session… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-5w3w-6qf9-5hqm |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: ocb: skip rx_n… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-5vr5-28pm-p634 |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: TC, delete flows on… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-5r72-p4cv-h344 |
|
In the Linux kernel, the following vulnerability has been resolved: bonding: fix use-after-free du… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-5p9c-24w4-pq6q |
|
In the Linux kernel, the following vulnerability has been resolved: ice: Fix NULL pointer derefere… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-54 |
|
vLLM is an inference and serving engine for large language models (LLMs). In versions 0.8… | vllm | 2025-05-30T19:15:30+00:00 | 2025-06-26T21:23:06.319321+00:00 |
| pysec-2025-53 |
|
vLLM is an inference and serving engine for large language models (LLMs). Prior to versio… | vllm | 2025-05-29T17:15:21+00:00 | 2025-06-26T21:23:06.231251+00:00 |
| pysec-2025-51 |
|
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) v… | apache-airflow-providers-snowflake | 2025-06-24T08:15:24+00:00 | 2025-06-26T21:23:03.132527+00:00 |
| pysec-2025-50 |
|
vLLM, an inference and serving engine for large language models (LLMs), has a Regular Exp… | vllm | 2025-05-30T18:15:32+00:00 | 2025-06-19T03:02:28.572160+00:00 |
| pysec-2024-255 |
|
Gradio before 4.20 allows credential leakage on Windows. | gradio | 2024-05-05T20:15:07+00:00 | 2025-06-17T19:21:48.983901+00:00 |
| pysec-2024-254 |
4.2 (3.1)
|
A session fixation vulnerability exists in the zenml-io/zenml application, where JWT toke… | zenml | 2024-04-16T00:15:11+00:00 | 2025-06-13T00:48:41.806476+00:00 |
| pysec-2025-49 |
8.8 (3.1)
|
setuptools is a package that allows users to download, build, install, upgrade, and unins… | setuptools | 2025-05-17T16:15:19+00:00 | 2025-06-12T22:23:11.115559+00:00 |
| pysec-2025-48 |
9.8 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2025-03-31T17:15:42+00:00 | 2025-06-12T22:23:10.476087+00:00 |
| pysec-2024-253 |
|
pretix before 2024.1.1 mishandles file validation. | pretix | 2024-02-26T16:28:00+00:00 | 2025-06-11T15:23:51.683422+00:00 |
| pysec-2024-252 |
|
PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in t… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T19:22:08.948962+00:00 |
| pysec-2024-251 |
|
Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T03:12:59.077932+00:00 |
| pysec-2025-47 |
|
An issue was discovered in Django 5.2 before 5.2.2, 5.1 before 5.1.10, and 4.2 before 4.2… | django | 2025-06-05T03:15:25+00:00 | 2025-06-05T05:23:28.296596+00:00 |
| pysec-2025-46 |
5.5 (3.1)
|
A vulnerability was found in erdogant pypickle up to 1.1.5. It has been classified as cri… | pypickle | 2025-05-26T08:15:19+00:00 | 2025-06-03T17:36:58.579358+00:00 |
| pysec-2025-45 |
7.8 (3.1)
|
A vulnerability was found in erdogant pypickle up to 1.1.5 and classified as problematic.… | pypickle | 2025-05-26T07:15:26+00:00 | 2025-06-03T17:36:58.528116+00:00 |
| pysec-2024-250 |
|
Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csr… | torch | 2024-04-19T21:15:08+00:00 | 2025-06-03T15:23:56.072490+00:00 |
| pysec-2023-312 |
5.9 (3.1)
|
Redis before 6cbea7d allows a replica to cause an assertion failure in a primary server b… | redis | 2023-07-15T23:15:09Z | 2025-06-02T11:48:06.372423Z |
| pysec-2025-44 |
|
django-helpdesk before 1.0.0 allows Sensitive Data Exposure because of os.umask(0) in mod… | django-helpdesk | 2025-05-31T01:15:19+00:00 | 2025-05-31T03:09:35.357757+00:00 |
| pysec-2025-43 |
|
vLLM is an inference and serving engine for large language models (LLMs). In versions sta… | vllm | 2025-05-29T17:15:21+00:00 | 2025-05-29T19:21:01.611587+00:00 |
| pysec-2025-42 |
9.8 (3.1)
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Ver… | vllm | 2025-04-30T01:15:51+00:00 | 2025-05-28T21:23:12.396609+00:00 |
| pysec-2025-41 |
9.8 (3.1)
|
PyTorch is a Python package that provides tensor computation with strong GPU acceleration… | torch | 2025-04-18T16:15:23+00:00 | 2025-05-28T15:23:37.843138+00:00 |
| pysec-2025-40 |
7.5 (3.1)
|
A vulnerability in the `preprocess_string()` function of the `transformers.testing_utils`… | transformers | 2025-05-19T12:15:19+00:00 | 2025-05-21T19:22:10.801823+00:00 |
| pysec-2024-249 |
6.1 (3.1)
|
### Summary On all Label Studio versions prior to 1.11.0, data imported via file upload f… | label-studio | 2024-02-22T22:15:47+00:00 | 2025-05-19T11:22:35.312280+00:00 |
| pysec-2024-248 |
7.8 (3.1)
|
OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its … | opencanary | 2024-10-14T21:15:12+00:00 | 2025-05-16T14:23:05.150356+00:00 |
| pysec-2025-39 |
|
motionEye is an online interface for the software motion, a video surveillance program wi… | motioneye | 2025-05-14T16:15:29+00:00 | 2025-05-14T17:22:51.050788+00:00 |
| pysec-2025-38 |
|
OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during im… | ironic | 2025-05-08T17:16:01Z | 2025-05-13T04:24:03.083929Z |
| pysec-2024-247 |
9.9 (3.1)
|
A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically… | zenml | 2024-04-16T00:15:11+00:00 | 2025-05-12T15:23:53.861001+00:00 |
| pysec-2025-37 |
|
An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2… | django | 2025-05-08T04:17:18+00:00 | 2025-05-08T05:23:16.210893+00:00 |
| pysec-2025-36 |
9.8 (3.1)
|
Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/valida… | langflow | 2025-04-07T15:15:44+00:00 | 2025-05-07T19:22:44.993642+00:00 |
| pysec-2024-246 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Starting in… | vyper | 2024-04-25T17:15:50+00:00 | 2025-05-05T19:21:20.899426+00:00 |
| pysec-2024-111 |
9.1 (3.1)
|
A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langcha… | langchain | 2024-10-29T13:15:00Z | 2025-05-02T18:39:47.588215Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33881 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.886591Z |
| gsd-2024-33880 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.882744Z |
| gsd-2024-33879 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.727068Z |
| gsd-2024-33878 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.850311Z |
| gsd-2024-33877 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.871220Z |
| gsd-2024-33876 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.990196Z |
| gsd-2024-33875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.862083Z |
| gsd-2024-33874 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.959238Z |
| gsd-2024-33873 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.870402Z |
| gsd-2024-33872 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.839468Z |
| gsd-2024-33871 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.800751Z |
| gsd-2024-33870 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.943118Z |
| gsd-2024-33869 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.784255Z |
| gsd-2024-33868 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.896638Z |
| gsd-2024-33867 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.808129Z |
| gsd-2024-33866 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.819755Z |
| gsd-2024-33865 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.790923Z |
| gsd-2024-33864 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.792101Z |
| gsd-2024-33863 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.824810Z |
| gsd-2024-33862 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.799465Z |
| gsd-2024-33861 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.958057Z |
| gsd-2024-33860 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.777612Z |
| gsd-2024-33859 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.867340Z |
| gsd-2024-33858 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.848478Z |
| gsd-2024-33857 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.834866Z |
| gsd-2024-33856 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.944669Z |
| gsd-2024-33855 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.741239Z |
| gsd-2024-33854 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.916266Z |
| gsd-2024-33853 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.825026Z |
| gsd-2024-33852 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.824312Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-874 | Malicious code in google-search-result (PyPI) | 2026-02-12T23:27:54Z | 2026-02-13T00:38:45Z |
| mal-2026-873 | Malicious code in @depro0x/despicable-me (npm) | 2026-02-12T20:40:54Z | 2026-02-12T22:47:49Z |
| mal-2026-872 | Malicious code in stylelint-recommended (npm) | 2026-02-12T18:18:29Z | 2026-02-12T18:18:30Z |
| mal-2026-870 | Malicious code in b10connoisseur (PyPI) | 2026-02-12T12:10:26Z | 2026-02-12T12:10:26Z |
| mal-2026-866 | Malicious code in oraceldb (PyPI) | 2026-02-12T08:45:36Z | 2026-02-12T08:45:36Z |
| mal-2026-869 | Malicious code in ritch (PyPI) | 2026-02-12T08:45:10Z | 2026-02-12T08:45:10Z |
| mal-2026-867 | Malicious code in pandaai (PyPI) | 2026-02-12T08:44:41Z | 2026-02-12T08:44:41Z |
| mal-2026-865 | Malicious code in opentelematry-api (PyPI) | 2026-02-12T08:44:11Z | 2026-02-12T08:44:11Z |
| mal-2026-864 | Malicious code in marshmellow (PyPI) | 2026-02-12T08:43:45Z | 2026-02-12T08:43:45Z |
| mal-2026-868 | Malicious code in pydantics (PyPI) | 2026-02-12T08:42:04Z | 2026-02-12T08:42:04Z |
| mal-2026-863 | Malicious code in krbutils (PyPI) | 2026-02-12T08:40:10Z | 2026-02-12T08:40:10Z |
| mal-2026-862 | Malicious code in get-incorrect-name-bob (PyPI) | 2026-02-12T00:01:39Z | 2026-02-12T00:01:39Z |
| mal-2026-860 | Malicious code in osopackagepy (PyPI) | 2026-02-11T15:50:58Z | 2026-02-11T16:53:59Z |
| mal-2025-6515 | Malicious code in graphdict (PyPI) | 2025-07-09T18:18:10Z | 2026-02-11T16:53:59Z |
| mal-2025-192430 | Malicious code in bigpyx (PyPI) | 2025-12-10T08:44:43Z | 2026-02-11T16:53:59Z |
| mal-2025-192391 | Malicious code in bignum (PyPI) | 2025-12-09T16:32:42Z | 2026-02-11T16:53:59Z |
| mal-2025-192385 | Malicious code in graphsync (PyPI) | 2025-12-09T08:01:54Z | 2026-02-11T16:53:59Z |
| mal-2025-192376 | Malicious code in graphnode (PyPI) | 2025-12-08T14:14:35Z | 2026-02-11T16:53:59Z |
| mal-2026-861 | Malicious code in express-gueues (npm) | 2026-02-11T16:43:01Z | 2026-02-11T16:43:01Z |
| mal-2026-857 | Malicious code in osopackage (npm) | 2026-02-11T15:13:28Z | 2026-02-11T15:13:29Z |
| mal-2026-859 | Malicious code in systemtest-network (npm) | 2026-02-11T15:13:28Z | 2026-02-11T15:13:28Z |
| mal-2026-858 | Malicious code in systemtest-information (npm) | 2026-02-11T15:13:28Z | 2026-02-11T15:13:28Z |
| mal-2026-856 | Malicious code in chai-prop (npm) | 2026-02-11T14:19:52Z | 2026-02-11T14:19:53Z |
| mal-2026-855 | Malicious code in config-toolkit (PyPI) | 2026-02-11T14:08:58Z | 2026-02-11T14:08:58Z |
| mal-2026-854 | Malicious code in sinon-node (npm) | 2026-02-11T10:54:37Z | 2026-02-11T10:54:42Z |
| mal-2026-853 | Malicious code in node-dotenv-cli (npm) | 2026-02-11T10:54:37Z | 2026-02-11T10:54:37Z |
| mal-2026-852 | Malicious code in chai-await (npm) | 2026-02-11T10:54:36Z | 2026-02-11T10:54:37Z |
| mal-2026-851 | Malicious code in python-files-mod (PyPI) | 2026-02-11T10:40:53Z | 2026-02-11T10:40:53Z |
| mal-2024-12374 | Malicious code in ci-metadata-python-logging (PyPI) | 2024-07-26T16:53:30Z | 2026-02-11T10:26:41Z |
| mal-2025-193013 | Malicious code in tablixs (PyPI) | 2025-11-15T18:48:30Z | 2026-02-11T10:04:22Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0444 | Linux Kernel: Mehrere Schwachstellen | 2024-02-20T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2836 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2025-12-14T23:00:00.000+00:00 | 2026-02-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0364 | Microsoft Defender für Endpoint Linux Extension: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-02-10T23:00:00.000+00:00 | 2026-02-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0363 | Microsoft Power BI: Schwachstelle ermöglicht Erlangen von Benutzerrechten und Codeausführung | 2026-02-10T23:00:00.000+00:00 | 2026-02-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0362 | Red Hat Enterprise Linux (Lodash): Schwachstelle ermöglicht Denial of Service | 2026-02-10T23:00:00.000+00:00 | 2026-02-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0331 | BeyondTrust Privileged Remote Access und Remote Support: Schwachstelle ermöglicht Codeausführung | 2026-02-05T23:00:00.000+00:00 | 2026-02-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3250 | Red Hat OpenShift: Mehrere Schwachstellen | 2024-10-21T22:00:00.000+00:00 | 2026-02-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0318 | n8n: Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-02-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0310 | Cisco TelePresence Collaboration Endpoint Software: Schwachstelle ermöglicht Denial of Service | 2026-02-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0308 | Cisco Evolved Programmable Network Manager und Prime Infrastructure: Schwachstelle ermöglicht Darstellen falscher Informationen | 2026-02-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0307 | Cisco Prime Infrastructure: Schwachstelle ermöglicht Cross-Site Scripting | 2026-02-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0306 | Red Hat Enterprise Linux (pyasn1): Schwachstelle ermöglicht Denial of Service | 2026-02-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0305 | Red Hat Enterprise Linux (libsoup): Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0304 | patch: Schwachstelle ermöglicht Denial of Service | 2021-12-22T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0303 | OpenClaw: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-02-03T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0297 | Django: Mehrere Schwachstellen | 2026-02-03T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0291 | OpenClaw/Clawdbot: Mehrere Schwachstellen ermöglichen Codeausführung | 2026-02-02T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0290 | Samsung Android: Mehrere Schwachstellen | 2026-02-02T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0289 | Kubernetes (ingress-nginx): Mehrere Schwachstellen | 2026-02-02T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0258 | Red Hat Enterprise Linux (iperf3): Schwachstelle ermöglicht Codeausführung | 2026-01-29T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0250 | Drupal Canvas und CAS: Mehrere Schwachstellen | 2026-01-28T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0246 | Lexmark Laser Printers: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode mit Benutzerrechten | 2026-01-28T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0244 | FreeRDP: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0234 | OpenSSL: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0210 | IBM DB2 Big SQL: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0207 | Red Hat Enterprise Linux (urllib3): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0199 | Red Hat OpenShift Pipelines Operator (Fulcio): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0164 | Oracle Java SE: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0148 | ImageMagick: Mehrere Schwachstellen | 2026-01-19T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0121 | Drupal Module: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0035 | Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS | 2026-01-22T09:22:36.433609Z | 2026-01-22T09:22:36.433609Z |
| ncsc-2026-0034 | Kwetsbaarheden verholpen in Atlassian producten | 2026-01-22T09:03:42.667958Z | 2026-01-22T09:03:42.667958Z |
| ncsc-2026-0033 | Kwetsbaarheid verholpen in GNU Inetutils telnetd | 2026-01-21T14:15:46.424529Z | 2026-01-21T14:15:46.424529Z |
| ncsc-2026-0032 | Kwetsbaarheden verholpen in Oracle MySQL | 2026-01-21T10:12:24.844869Z | 2026-01-21T10:12:24.844869Z |
| ncsc-2026-0031 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2026-01-21T10:12:00.674214Z | 2026-01-21T10:12:00.674214Z |
| ncsc-2026-0030 | Kwetsbaarheden verholpen in Oracle Java | 2026-01-21T10:11:39.759123Z | 2026-01-21T10:11:39.759123Z |
| ncsc-2026-0029 | Kwetsbaarheden verholpen in Oracle Hyperion | 2026-01-21T10:10:46.297433Z | 2026-01-21T10:10:46.297433Z |
| ncsc-2026-0028 | Kwetsbaarheden verholpen in Oracle Analytics | 2026-01-21T10:10:15.985753Z | 2026-01-21T10:10:15.985753Z |
| ncsc-2026-0027 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2026-01-21T10:08:59.379774Z | 2026-01-21T10:08:59.379774Z |
| ncsc-2026-0026 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2026-01-21T10:06:27.920991Z | 2026-01-21T10:06:27.920991Z |
| ncsc-2026-0025 | Kwetsbaarheden verholpen in Oracle Financial Services | 2026-01-21T09:55:33.889125Z | 2026-01-21T09:55:33.889125Z |
| ncsc-2026-0024 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2026-01-21T09:29:38.334428Z | 2026-01-21T09:29:38.334428Z |
| ncsc-2026-0023 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2026-01-21T09:27:58.715578Z | 2026-01-21T09:27:58.715578Z |
| ncsc-2026-0022 | Kwetsbaarheden verholpen in Oracle Communications producten | 2026-01-21T09:25:39.876330Z | 2026-01-21T09:25:39.876330Z |
| ncsc-2026-0021 | Kwetsbaarheden verholpen in Oracle Database Server producten | 2026-01-21T09:19:00.000449Z | 2026-01-21T09:19:00.000449Z |
| ncsc-2026-0020 | Kwetsbaarheden verholpen in Oracle Commerce | 2026-01-21T09:18:16.268788Z | 2026-01-21T09:18:16.268788Z |
| ncsc-2026-0019 | Kwetsbaarheid verholpen in Fortinet FortiSIEM | 2026-01-16T13:34:34.467426Z | 2026-01-16T13:34:34.467426Z |
| ncsc-2026-0018 | Kwetsbaarheden verholpen in TYPO3 CMS | 2026-01-16T10:11:37.524826Z | 2026-01-16T10:11:37.524826Z |
| ncsc-2026-0017 | Kwetsbaarheden verholpen in Juniper Networks JunOS | 2026-01-16T10:07:39.310560Z | 2026-01-16T10:07:39.310560Z |
| ncsc-2026-0016 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2026-01-16T09:44:20.575860Z | 2026-01-16T09:44:20.575860Z |
| ncsc-2026-0015 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2026-01-15T12:31:57.265723Z | 2026-01-15T12:31:57.265723Z |
| ncsc-2026-0014 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-01-15T12:16:05.427141Z | 2026-01-15T12:16:05.427141Z |
| ncsc-2026-0013 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2026-01-14T13:45:48.530782Z | 2026-01-14T13:45:48.530782Z |
| ncsc-2026-0012 | Kwetsbaarheden verholpen in Adobe Dreamweaver Desktop | 2026-01-14T13:41:56.261778Z | 2026-01-14T13:41:56.261778Z |
| ncsc-2026-0011 | Kwetsbaarheid verholpen in Microsoft Developer Tools | 2026-01-13T19:19:27.690900Z | 2026-01-13T19:19:27.690900Z |
| ncsc-2026-0010 | Kwetsbaarheden verholpen in Microsoft Office | 2026-01-13T19:18:45.984019Z | 2026-01-13T19:18:45.984019Z |
| ncsc-2026-0009 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-01-13T19:17:59.629364Z | 2026-01-13T19:17:59.629364Z |
| ncsc-2026-0008 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-01-13T19:17:18.848673Z | 2026-01-13T19:17:18.848673Z |
| ncsc-2026-0007 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-01-13T19:16:30.720079Z | 2026-01-13T19:16:30.720079Z |
| ncsc-2026-0006 | Kwetsbaarheden verholpen in SAP producten | 2026-01-13T14:42:24.621603Z | 2026-01-13T14:42:24.621603Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-365200 | SSA-365200: Google Chrome Type Confusion Vulnerability in Siemens Products | 2025-10-14T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-364175 | SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-201595 | SSA-201595: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2025-08-14T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-192617 | SSA-192617: Local Privilege Escalation Vulnerability in TeleControl Server Basic Before V3.1.2.4 | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-014678 | SSA-014678: Authorization Bypass Vulnerability in Industrial Edge Device Kit | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-001536 | SSA-001536: Authorization Bypass Vulnerability in Siemens Industrial Edge Devices | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-512988 | SSA-512988: File Parsing Vulnerability in Simcenter Femap Before V2512 | 2025-12-12T00:00:00Z | 2025-12-12T00:00:00Z |
| ssa-915282 | SSA-915282: Denial of service Vulnerability in Interniche IP-Stack based Industrial Devices | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-882673 | SSA-882673: Multiple Vulnerabilities in SINEC Security Monitor before V4.10.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-868571 | SSA-868571: Missing Server Certificate Validation in IAM Client | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-800126 | SSA-800126: Deserialization Vulnerability in Siemens Engineering Platforms before V20 | 2024-12-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-763474 | SSA-763474: Denial of Service Vulnerability in Ruggedcom ROS devices before V5.10.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-734261 | SSA-734261: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-723487 | SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products | 2024-07-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-710408 | SSA-710408: Missing Server Certificate Validation in Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-693808 | SSA-693808: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-673996 | SSA-673996: Buffer Overflow Vulnerability in Third-Party Component in SICAM and SITIPE Products | 2024-09-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-626856 | SSA-626856: Multiple Vulnerabilities in SINEMA Remote Connect Sever Before V3.2 SP4 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-493396 | SSA-493396: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-471761 | SSA-471761: Multiple Vulnerabilities in SICAM T Before V3.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-420375 | SSA-420375: Improper Integrity Check of Firmware Updates in Building X - Security Manager Edge Controller (ACC-AP) | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-416652 | SSA-416652: Multiple Vulnerabilities in SIMATIC CN 4100 Before V4.0.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-408105 | SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products | 2022-12-13T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-392859 | SSA-392859: Local Arbitrary Code Execution Vulnerability in Siemens Engineering Platforms before V20 | 2024-12-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-356310 | SSA-356310: Multiple Vulnerabilities in Gridscale X Prepay | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-202008 | SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-241605 | SSA-241605: Out of Bounds Read in PS/IGES Parasolid Translator Component Before V29.0.258 | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-190588 | SSA-190588: Cross-Site Scripting Vulnerability in Mendix Rich Text Widget | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-794185 | SSA-794185: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-770770 | SSA-770770: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.7 on RUGGEDCOM APE1808 Devices | 2025-02-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2256 | Red Hat Security Advisory: Red Hat multicluster global hub 1.5.3 security update | 2026-02-09T01:49:44+00:00 | 2026-02-14T13:27:13+00:00 |
| rhsa-2026:2172 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.15 security, enhancement & bug fix update | 2026-02-05T18:06:29+00:00 | 2026-02-14T13:27:12+00:00 |
| rhsa-2026:2164 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16 security, enhancement & bug fix update | 2026-02-05T17:49:21+00:00 | 2026-02-14T13:27:11+00:00 |
| rhsa-2026:2155 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17 security, enhancement & bug fix update | 2026-02-05T17:17:50+00:00 | 2026-02-14T13:27:11+00:00 |
| rhsa-2026:2144 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:45:43+00:00 | 2026-02-14T13:27:11+00:00 |
| rhsa-2026:1957 | Red Hat Security Advisory: python3.12-urllib3 security update | 2026-02-04T19:16:17+00:00 | 2026-02-14T13:27:11+00:00 |
| rhsa-2026:2139 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:35:09+00:00 | 2026-02-14T13:27:10+00:00 |
| rhsa-2026:2137 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:26:20+00:00 | 2026-02-14T13:27:09+00:00 |
| rhsa-2026:1942 | Red Hat Security Advisory: Red Hat Quay 3.15.3 | 2026-02-04T15:43:51+00:00 | 2026-02-14T13:27:09+00:00 |
| rhsa-2026:2126 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T14:55:08+00:00 | 2026-02-14T13:27:08+00:00 |
| rhsa-2026:2106 | Red Hat Security Advisory: RHOAI 2.25.2 - Red Hat OpenShift AI | 2026-02-05T13:38:32+00:00 | 2026-02-14T13:27:07+00:00 |
| rhsa-2026:2034 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.20 security, enhancement & bug fix update | 2026-02-05T06:37:04+00:00 | 2026-02-14T13:27:07+00:00 |
| rhsa-2026:1805 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T10:17:28+00:00 | 2026-02-14T13:27:05+00:00 |
| rhsa-2026:1803 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T09:45:07+00:00 | 2026-02-14T13:27:04+00:00 |
| rhsa-2026:1794 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T07:18:11+00:00 | 2026-02-14T13:27:04+00:00 |
| rhsa-2026:1793 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T07:17:26+00:00 | 2026-02-14T13:27:03+00:00 |
| rhsa-2026:1792 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T07:25:42+00:00 | 2026-02-14T13:27:01+00:00 |
| rhsa-2026:1736 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2026-02-02T17:31:06+00:00 | 2026-02-14T13:27:01+00:00 |
| rhsa-2026:1791 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T07:21:33+00:00 | 2026-02-14T13:27:00+00:00 |
| rhsa-2026:1735 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T17:50:59+00:00 | 2026-02-14T13:26:59+00:00 |
| rhsa-2026:1734 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T17:45:39+00:00 | 2026-02-14T13:26:58+00:00 |
| rhsa-2026:1730 | Red Hat Security Advisory: Red Hat Quay 3.12.13 | 2026-02-02T15:52:56+00:00 | 2026-02-14T13:26:58+00:00 |
| rhsa-2026:1729 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T15:49:34+00:00 | 2026-02-14T13:26:58+00:00 |
| rhsa-2026:1726 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-02T15:25:44+00:00 | 2026-02-14T13:26:57+00:00 |
| rhsa-2026:1717 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T14:17:19+00:00 | 2026-02-14T13:26:57+00:00 |
| rhsa-2026:1712 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T13:10:47+00:00 | 2026-02-14T13:26:56+00:00 |
| rhsa-2026:1706 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T12:38:43+00:00 | 2026-02-14T13:26:54+00:00 |
| rhsa-2026:1704 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-02-02T11:50:53+00:00 | 2026-02-14T13:26:54+00:00 |
| rhsa-2026:1702 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T10:57:18+00:00 | 2026-02-14T13:26:53+00:00 |
| rhsa-2026:1701 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T10:53:47+00:00 | 2026-02-14T13:26:53+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-036-03 | o6 Automation GmbH Open62541 | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-02 | Mitsubishi Electric MELSEC iQ-R Series | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-029-01 | KiloView Encoder Series (Update A) | 2026-01-29T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-184-03 | Mitsubishi Electric MELSOFT Update Manager (Update B) | 2025-07-03T06:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-184-01 | Hitachi Energy Relion 670/650 and SAM600-IO Series | 2025-06-24T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-343-03 | Multiple India-based CCTV Cameras (Update A)** | 2025-12-09T06:00:00.000000Z | 2026-02-05T06:00:00.000000Z |
| icsa-26-034-04 | Synectix LAN 232 TRIO | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-03 | RISS SRL MOMA Seismic Station | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-02 | *Avation Light Engine Pro * | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-01 | Mitsubishi Electric FREQSHIP-mini for Windows | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-310-02 | Ubia Ubox (Update A) | 2025-11-06T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-128-03 | Mitsubishi Electric Multiple FA Products (Update B) | 2025-05-08T06:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-24-345-06 | Rockwell Automation Arena (Update B) | 2024-12-10T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-089-01 | Hitachi Energy IEC 61850 MMS-Server (Update B) | 2023-02-14T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-068-05 | Hitachi Energy Relion 670, 650 and SAM600-IO Series | 2023-02-28T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-112-03 | Schneider Electric Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000000Z | 2026-01-30T07:00:00.000000Z |
| icsa-26-029-03 | Rockwell Automation ControlLogix | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-029-02 | Rockwell Automation ArmorStart LT | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-205-01 | Mitsubishi Electric CNC Series (Update B) | 2025-07-24T06:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-126-03 | BrightSign Players (Update A) | 2025-05-06T06:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-028-06 | Schneider Electric RemoteConnect and SCADAPack x70 Utilities (Update A) | 2025-01-14T00:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-027-03 | Schneider Electric Zigbee Products | 2026-01-13T08:00:00.000000Z | 2026-01-27T20:13:34.637968Z |
| icsa-26-027-02 | Festo Didactic SE MES PC | 2024-02-27T12:00:00.000000Z | 2026-01-27T16:20:28.099631Z |
| icsa-26-027-04 | Johnson Controls Metasys Products | 2026-01-27T07:00:00.000000Z | 2026-01-27T07:00:00.000000Z |
| icsa-26-027-01 | iba Systems ibaPDA | 2026-01-27T07:00:00.000000Z | 2026-01-27T07:00:00.000000Z |
| icsa-26-022-01 | Schneider Electric | 2026-01-13T08:00:00.000000Z | 2026-01-22T17:29:46.950679Z |
| icsa-26-022-08 | EVMAPA | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-07 | Delta Electronics DIAView | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-06 | Hubitat Elevation Hubs | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-05 | Weintek cMT X Series HMI EasyWeb Service | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-roomos-inf-disc-qggsbxam | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-phone-dos-fpyjlv7a | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-secboot-uqfd8avc | Cisco IOS XE Software Secure Boot Bypass Vulnerabilities | 2025-09-24T16:00:00+00:00 | 2025-10-15T15:57:29+00:00 |
| cisco-sa-snmp-x4lphte | Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-06T18:27:02+00:00 |
| cisco-sa-ios-tacacs-hdb7thjw | Cisco IOS and IOS XE Software TACACS+ Authentication Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-01T16:39:50+00:00 |
| cisco-sa-cv-xss-rwrakaj9 | Cisco Cyber Vision Center Stored Cross-Site Scripting Vulnerabilities | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cucm-stored-xss-fnj66yly | Cisco Unified Communications Manager Stored Cross-Site Scripting Vulnerability | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cat9k-ptmd7bgy | Cisco IOS XE Software for Catalyst 9000 Series Switches Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-30T14:26:46+00:00 |
| cisco-sa-ap-ipv6-gw-tuazpn9o | Cisco Access Point Software Intermittent IPv6 Gateway Change Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:51+00:00 |
| cisco-sa-webui-xss-vwydgjou | Cisco IOS XE Software Web Authentication Reflected Cross-Site Scripting Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:50+00:00 |
| cisco-sa-snmpwred-x3mjyf5m | Cisco IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-nbar-dos-lavwtmet | Cisco IOS XE Software Network-Based Application Recognition Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-arg-inject-eyddbh4e | Cisco IOS XE Software CLI Argument Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-cmd-inject-rpjm8bgl | Cisco IOS XE Software HTTP API Command Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-invalid-url-dos-nvxszf6u | Cisco IOS Software Industrial Ethernet Switch Device Manager Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-cli-eb7cz6yo | Cisco IOS and IOS XE Software CLI Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-defaultacl-psjk9nvf | Cisco SD-WAN vEdge Software Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-cat9k-acl-l4k7vxgd | Cisco IOS XE Software on Cisco Catalyst 9500X and 9600X Series Switches Virtual Interface Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-action-frame-inj-qqcncz8h | Cisco Wireless Access Point Software Device Analytics Action Frame Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-9800cl-openscep-sb4xtxzp | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controller for Cloud Unauthenticated Access to Certificate Enrollment Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-snmp-bypass-hhuvujdn | Cisco IOS XE SD-WAN Software Packet Filtering Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-09-22T14:12:28+00:00 |
| cisco-sa-xrsig-uy4zrucg | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-iosxr-arp-storm-ejuu55ym | Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-acl-packetio-swjhhbtz | Cisco IOS XR Software Management Interface ACL Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-fp2k-ipsec-dos-tjwgdzco | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 2100 Series IPv6 over IPsec Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-09T21:22:34+00:00 |
| cisco-sa-webex-xss-55bv8hhm | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-webex-urlredirect-uk8ddjsz | Cisco Webex Meetings URL Redirection Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-phone-write-g3kcc5df | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-imp-xss-xqgu4hsg | Cisco Unified Communications Manager IM & Presence Service Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-xjqzsycp | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| SCA-2023-0008 | Vulnerability in SICK SIM1012 | 2023-09-29T13:00:00.000Z | 2023-09-29T13:00:00.000Z |
| sca-2023-0009 | Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products | 2023-09-29T10:00:00.000Z | 2023-09-29T10:00:00.000Z |
| SCA-2023-0009 | Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products | 2023-09-29T10:00:00.000Z | 2023-09-29T10:00:00.000Z |
| sca-2023-0007 | Vulnerabilities in SICK LMS5xx | 2023-08-25T11:00:00.000Z | 2023-08-25T11:00:00.000Z |
| SCA-2023-0007 | Vulnerabilities in SICK LMS5xx | 2023-08-25T11:00:00.000Z | 2023-08-25T11:00:00.000Z |
| sca-2023-0006 | Vulnerabilities in SICK ICR890-4 | 2023-07-10T13:00:00.000Z | 2023-07-10T13:00:00.000Z |
| SCA-2023-0006 | Vulnerabilities in SICK ICR890-4 | 2023-07-10T13:00:00.000Z | 2023-07-10T13:00:00.000Z |
| sca-2023-0005 | Vulnerabilities in SICK EventCam App | 2023-06-19T11:00:00.000Z | 2023-06-19T11:00:00.000Z |
| SCA-2023-0005 | Vulnerabilities in SICK EventCam App | 2023-06-19T11:00:00.000Z | 2023-06-19T11:00:00.000Z |
| sca-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| SCA-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| sca-2023-0003 | Vulnerability in SICK Flexi Soft and Flexi Classic Gateways | 2023-05-03T13:00:00.000Z | 2023-05-03T13:00:00.000Z |
| SCA-2023-0003 | Vulnerability in SICK Flexi Soft and Flexi Classic Gateways | 2023-05-03T13:00:00.000Z | 2023-05-03T13:00:00.000Z |
| sca-2023-0002 | Use of Telnet in multiple SICK Flexi Soft and Flexi Classic Gateways | 2023-04-11T10:00:00.000Z | 2023-04-11T10:00:00.000Z |
| sca-2023-0001 | Bootloader mode vulnerability in Flexi Soft Gateways v3 | 2023-02-20T14:00:00.000Z | 2023-02-20T14:00:00.000Z |
| sca-2022-0015 | Use of a Broken or Risky Cryptographic Algorithm in SICK RFU6xx RADIO FREQUEN. SENSOR | 2022-12-08T16:00:00.000Z | 2022-12-08T16:00:00.000Z |
| sca-2022-0013 | Password recovery vulnerability affects multiple SICK SIMs | 2022-10-21T13:00:00.000Z | 2022-11-04T14:00:00.000Z |
| sca-2022-0014 | SICK FlexiCompact affected by Denial of Service vulnerability | 2022-10-31T11:00:00.000Z | 2022-10-31T11:00:00.000Z |
| sca-2022-0012 | OpenSSL vulnerability affects multiple SICK SIMs | 2022-08-08T13:00:00.000Z | 2022-08-03T13:00:00.000Z |
| sca-2022-0010 | Vulnerability in SICK Flexi Soft Designer & Safety Designer | 2022-05-16T10:00:00.000Z | 2022-07-19T10:00:00.000Z |
| sca-2022-0011 | Vulnerabilities in SICK Package Analytics | 2022-06-08T15:00:00.000Z | 2022-06-08T15:00:00.000Z |
| sca-2022-0009 | Vulnerability in SICK Flexi Soft PROFINET IO Gateway FX0-GPNT and SICK microScan3 PROFINET | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0008 | Vulnerability in SICK Gateways for Flexi Soft, Flexi Compact, SICK EFI Gateway UE4740, SICK microScan3 and outdoorScan3 | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0007 | Vulnerabilities in SICK MARSIC300 | 2022-04-21T15:00:00.000Z | 2022-04-21T15:00:00.000Z |
| sca-2022-0006 | Vulnerability in SICK MSC800 | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0005 | Vulnerability in SICK Overall Equipment Effectiveness (OEE) | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0004 | Microsoft vulnerability affects multiple SICK IPCs with SICK MEAC | 2022-04-11T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
| sca-2022-0003 | Vulnerabilities in SICK FTMg | 2022-03-31T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
| sca-2022-0002 | PwnKit vulnerability affects multiple SICK IPCs | 2022-02-23T16:00:00.000Z | 2022-02-23T16:00:00.000Z |
| sca-2022-0001 | Vulnerability in SICK FieldEcho | 2022-02-17T16:00:00.000Z | 2022-02-17T16:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2023_10-01 | DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_1-01 | Authenticated SQL Injection on Alerts in Guardian/CMC before 22.5.2 | 2023-05-03T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:9-01 | Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:8-01 | Session Fixation in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:7-01 | DoS via SAML configuration in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:6-01 | Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:5-01 | Information disclosure via the debug function in assertions in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:4-01 | Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:3-01 | Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:2-01 | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:11-01 | SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:10-01 | DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:1-01 | Authenticated SQL Injection on Alerts in Guardian/CMC before 22.5.2 | 2023-05-03T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022_2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022_2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022:2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022:2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021_2-01 | Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021_1-01 | Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021:2-01 | Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021:1-01 | Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020_3-01 | Angular template injection on custom report name field | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020_2-01 | Cross-site request forgery attack on change password form | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020:3-01 | Angular template injection on custom report name field | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020:2-01 | Cross-site request forgery attack on change password form | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019_2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019_1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019:2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019:1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-21255 | Windows Hyper-V Security Feature Bypass Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21253 | Mailslot File System Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21251 | Cluster Client Failover (CCF) Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21250 | Windows HTTP.sys Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21249 | Windows NTLM Spoofing Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21248 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21247 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21246 | Windows Graphics Component Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21245 | Windows Kernel Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21244 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21243 | Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21242 | Windows Subsystem for Linux Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21241 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21240 | Windows HTTP.sys Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21239 | Windows Kernel Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21238 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21237 | Windows Subsystem for Linux Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21236 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21235 | Windows Graphics Component Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21234 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21232 | Windows HTTP.sys Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21231 | Windows Kernel Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21229 | Power BI Remote Code Execution Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21228 | Azure Local Remote Code Execution Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21222 | Windows Kernel Information Disclosure Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-21218 | .NET Spoofing Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-20846 | GDI+ Denial of Service Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-10T00:00:00.000Z |
| msrc_cve-2026-24302 | Azure Arc Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-05T00:00:00.000Z |
| msrc_cve-2026-24300 | Azure Front Door Elevation of Privilege Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-05T00:00:00.000Z |
| msrc_cve-2026-21532 | Azure Function Information Disclosure Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-05T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| 2crt000007 | Ekip Com IEC61850 Vulnerability in 3rd Party Library | 2025-04-29T00:30:00.000Z | 2025-04-29T00:30:00.000Z |
| 9akk108470a9989 | ABB MV Drives Affected by CODESYS RTS (Runtime System) Vulnerabilities | 2025-04-10T08:30:00.000Z | 2025-04-10T08:30:00.000Z |
| 2nga002579 | ABB Arctic communication solution ARM600 Vulnerabilities | 2025-04-07T10:30:00.000Z | 2025-04-07T10:30:00.000Z |
| 2nga002427 | ABB Arctic ARG600, ARC600, ARR600, ARP600 Arctic Wireless Gateway Modem Module and OpenSSH vulnerabilities | 2025-04-07T10:30:00.000Z | 2025-04-07T10:30:00.000Z |
| 9akk108470a9494 | Low Voltage DC Drives and Power Controllers CODESYS RTS Vulnerabilities | 2025-03-26T00:30:00.000Z | 2025-03-27T00:30:00.000Z |
| 9akk108470a9491 | ABB ACS880 +N8010 Drives CODESYS RTS Vulnerabilities | 2025-03-26T00:30:00.000Z | 2025-03-27T00:30:00.000Z |
| sa24p015 | B&R APROL Potential Privilege Escalation and Information Disclosure | 2025-03-24T00:30:00.000Z | 2025-03-24T00:30:00.000Z |
| 9akk108470a8565 | RMC-100 Vulnerability in the Web UI (REST Interface) | 2025-03-11T00:30:00.000Z | 2025-03-11T00:30:00.000Z |
| 9akk108470a5684 | FLXeon Controllers Cyber Security Advisory | 2025-01-20T00:30:00.000Z | 2025-02-14T00:30:00.000Z |
| 7paa012159 | System 800xA 5.1.x, 6.0.3.x, 6.1.1.x, 6.2.x - VideONet Camera passwords stored in clear text | 2025-02-10T00:30:00.000Z | 2025-02-10T00:30:00.000Z |
| 9akk108470a6775 | Hardcoded credentials in ASPECT Energy Management System | 2025-02-05T00:30:00.000Z | 2025-02-06T00:30:00.000Z |
| sa25p001 | Automation Runtime and mapp View Use of insecure algorithm for self-signed certificates | 2025-01-15T00:30:00.000Z | 2025-01-16T00:30:00.000Z |
| 9akk108470a5466 | Drive Composer Path Traversal Vulnerability | 2025-02-05T00:30:00.000Z | 2025-01-10T00:30:00.000Z |
| 3adr011377 | AC500 V3 Multiple vulnerabilities | 2025-01-07T00:30:00.000Z | 2025-01-07T00:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10155-1 | cockpit-podman-119.1-2.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10154-1 | cockpit-354-3.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10153-1 | chromedriver-144.0.7559.132-1.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:20180-1 | Security update for python-maturin | 2026-02-05T20:51:59Z | 2026-02-05T20:51:59Z |
| opensuse-su-2026:20178-1 | Security update for libxml2 | 2026-02-05T11:26:20Z | 2026-02-05T11:26:20Z |
| opensuse-su-2026:20177-1 | Security update for golang-github-prometheus-prometheus | 2026-02-05T10:44:24Z | 2026-02-05T10:44:24Z |
| opensuse-su-2026:10152-1 | python315-3.15.0~a3-4.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10151-1 | python311-wheel-0.46.3-1.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10150-1 | cockpit-subscriptions-14.4-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10149-1 | cockpit-repos-4.7-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10148-1 | cockpit-packages-4.1-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10147-1 | cockpit-machines-346-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:20172-1 | Security update for cups | 2026-02-04T11:37:13Z | 2026-02-04T11:37:13Z |
| opensuse-su-2026:10131-1 | trivy-0.69.0-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10130-1 | python311-PyNaCl-1.6.2-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10129-1 | libmlt++-7-7-7.36.1-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10128-1 | MozillaThunderbird-140.7.1-1.1 on GA media | 2026-01-31T00:00:00Z | 2026-01-31T00:00:00Z |
| opensuse-su-2026:10127-1 | rekor-1.5.0-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10126-1 | python315-3.15.0~a3-3.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10125-1 | python311-django-storages-1.14.6-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10124-1 | golang-github-prometheus-prometheus-3.9.1-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10123-1 | freerdp-3.21.0-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10122-1 | fontforge-20251009-4.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10121-1 | chromedriver-144.0.7559.109-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10120-1 | MozillaFirefox-147.0.2-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10119-1 | ImageMagick-7.1.2.13-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10118-1 | xen-4.21.0_04-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10117-1 | python314-3.14.2-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10116-1 | python311-pypdf-6.6.2-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10115-1 | python311-djangorestframework-3.16.1-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2021-313-05 | BadAlloc Vulnerabilities | 2021-11-09T05:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-05 | Modicon M340 Controller and Communication Modules | 2025-08-12T04:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-014-05 | Web Server on Modicon M340, Modbus/TCP Ethernet Modicon M340 module, Modbus/TCP Ethernet Modicon M340 FactoryCast module and Ethernet / Serial RTU communication modules | 2025-01-14T00:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-014-03 | Wind River VxWorks DHCP Server Vulnerability | 2025-01-14T05:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2024-163-01 | Modicon M340, Modbus/TCP Ethernet Modicon M340 module, and Modbus/TCP Ethernet Modicon M340 FactoryCast module | 2024-06-11T00:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-189-04 | EcoStruxure™ Power Monitoring Expert (PME) and EcoStruxure™ Power Operation (EPO) with Advanced Reporting and Dashboards | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-189-02 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-189-01 | EcoStruxure™ IT Data Center Expert | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-03 | EVLink WallBox | 2025-06-10T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-02 | Modicon Controllers M241/M251/M258/LMC058/M262 | 2025-06-10T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2024-254-01 | Vijeo Designer | 2024-09-10T00:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-01 | Insight Home and Insight Facility | 2025-06-10T04:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2020-287-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-10-13T00:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2025-133-04 | Schneider Electric PrismaSeT Active - Wireless Panel Server | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-03 | EcoStruxure Power Build Rapsody | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-02 | Wiser Home Automation | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-098-01 | ConneXium Network Manager Software | 2025-04-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-014-09 | EcoStruxure™ Power Build Rapsody | 2025-01-14T00:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2024-282-05 | EcoStruxure™ Power Monitoring Expert (PME) | 2024-10-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-098-02 | Trio™ Q Licensed Data Radios | 2025-04-08T04:00:00.000Z | 2025-04-08T04:00:00.000Z |
| sevd-2025-014-01 | Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC | 2025-01-14T05:00:00.000Z | 2025-04-08T04:00:00.000Z |
| sevd-2025-070-03 | WebHMI Component For EcoStruxure™ Power Automation System User Interface and EcoStruxure™ Microgrid Operation Large | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-070-02 | EPAS-UI & EcoSUI | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-070-01 | EcoStruxure™ Panel Server | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-042-04 | Enerlin'X IFE and eIFE | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-03 | EcoStruxure™ Process Expert, EcoStruxure™ Process Expert for AVEVA System Platform | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-01 | ASCO 5310 / 5350 Remote Annunciator | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2019-134-11 | Modicon Controllers | 2019-05-14T08:31:22.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-014-08 | Power Logic HDPM6000 High-Density Metering System | 2025-01-14T00:00:00.000Z | 2025-01-14T00:00:00.000Z |
| sevd-2025-014-04 | Web Designer for Modicon Communication Modules | 2025-01-14T00:00:00.000Z | 2025-01-14T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-node-2024-27983 | 2024-06-04T09:49:21.510Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-27982 | 2024-06-04T09:49:37.511Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-22025 | 2024-06-04T09:49:52.511Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-22020 | 2024-07-11T07:28:44.706Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-22019 | 2024-05-24T07:26:57.950Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-22018 | 2024-07-12T07:29:02.117Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-22017 | 2024-11-29T14:03:41.826Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-21896 | 2024-06-04T09:50:22.403Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-21892 | 2024-05-24T07:27:13.552Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-21891 | 2024-06-04T09:50:51.602Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-21890 | 2024-06-04T09:51:05.804Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2023-44487 | 2024-03-06T10:58:56.877Z | 2026-02-11T09:09:18.507Z | |
| bit-nginx-2023-44487 | 2024-03-06T10:58:49.980Z | 2026-02-11T09:09:18.507Z | |
| bit-mlflow-2024-27133 | Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset. | 2024-03-31T18:21:40.530Z | 2026-02-11T09:09:18.507Z |
| bit-mlflow-2024-27132 | Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe. | 2024-03-31T18:21:50.638Z | 2026-02-11T09:09:18.507Z |
| bit-memcached-2021-37519 | 2024-11-08T19:14:19.674Z | 2026-02-11T09:09:18.507Z | |
| bit-mariadb-2024-21096 | 2024-10-05T07:09:39.139Z | 2026-02-11T09:09:18.507Z | |
| bit-mariadb-2023-22084 | 2024-10-05T07:10:03.039Z | 2026-02-11T09:09:18.507Z | |
| bit-mariadb-2022-21595 | 2024-03-06T11:02:57.167Z | 2026-02-11T09:09:18.507Z | |
| bit-mariadb-2022-21451 | 2024-03-06T11:03:07.365Z | 2026-02-11T09:09:18.507Z | |
| bit-mariadb-2022-21427 | 2024-03-06T11:03:19.770Z | 2026-02-11T09:09:18.507Z | |
| bit-libpython-2025-8194 | Tarfile infinite loop during parsing with negative member offset | 2025-08-11T15:33:34.813Z | 2026-02-11T09:09:18.507Z |
| bit-libpython-2024-50602 | 2025-08-11T13:52:47.408Z | 2026-02-11T09:09:18.507Z | |
| bit-libpython-2022-45061 | 2025-08-11T13:52:09.011Z | 2026-02-11T09:09:18.507Z | |
| bit-libphp-2022-4900 | Potential buffer overflow in php_cli_server_startup_workers | 2025-08-11T13:53:48.387Z | 2026-02-11T09:09:18.507Z |
| bit-keydb-2025-21605 | Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client | 2025-04-25T07:14:30.296Z | 2026-02-11T09:09:18.507Z |
| bit-keydb-2024-51741 | Redis allows denial-of-service due to malformed ACL selectors | 2025-01-08T07:13:13.917Z | 2026-02-11T09:09:18.507Z |
| bit-keydb-2024-46981 | Redis' Lua library commands may lead to remote code execution | 2025-01-08T07:13:21.212Z | 2026-02-11T09:09:18.507Z |
| bit-jenkins-2023-44487 | 2024-03-06T10:54:03.578Z | 2026-02-11T09:09:18.507Z | |
| bit-grafana-2024-10452 | 2024-10-31T07:09:47.399Z | 2026-02-11T09:09:18.507Z |
| ID | Description | Updated |
|---|---|---|
| var-202001-0832 | A Buffer Overflow vulnerability exists in the Message Server service _MsJ2EE_AddStatistic… | 2024-07-23T22:37:43.319000Z |
| var-201208-0222 | Multiple stack-based buffer overflows in msg_server.exe in SAP NetWeaver ABAP 7.x allow r… | 2024-07-23T22:37:43.393000Z |
| var-202108-1148 | An access issue was addressed with improved access restrictions. This issue is fixed in m… | 2024-07-23T22:36:01.656000Z |
| var-200202-0006 | Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause… | 2024-07-23T22:34:48.127000Z |
| var-202007-0395 | Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities … | 2024-07-23T22:33:57.481000Z |
| var-201805-1147 | WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length heap buffe… | 2024-07-23T22:32:10.966000Z |
| var-201902-0647 | LCDS Laquis SCADA prior to version 4.1.0.4150 allows execution of script code by opening … | 2024-07-23T22:32:09.990000Z |
| var-201908-0863 | Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE… | 2024-07-23T22:30:33.144000Z |
| var-201912-0120 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2024-07-23T22:30:32.761000Z |
| var-201912-0114 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2024-07-23T22:30:32.792000Z |
| var-202305-1589 | D-Link DIR-2150 SetSysEmailSettings EmailTo Command Injection Remote Code Execution Vulne… | 2024-07-23T22:30:26.856000Z |
| var-202407-0235 | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can res… | 2024-07-23T22:30:24.825000Z |
| var-202407-0234 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data … | 2024-07-23T22:30:24.699000Z |
| var-202407-0233 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data … | 2024-07-23T22:30:24.731000Z |
| var-202407-0232 | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can res… | 2024-07-23T22:30:24.657000Z |
| var-201112-0097 | Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 a… | 2024-07-23T22:29:05.132000Z |
| var-201801-0152 | An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions pri… | 2024-07-23T22:28:30.754000Z |
| var-201801-0151 | A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior … | 2024-07-23T22:28:30.640000Z |
| var-201807-0341 | ABB Panel Builder 800 all versions has an improper input validation vulnerability which m… | 2024-07-23T22:28:27.949000Z |
| var-201806-1058 | Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices befo… | 2024-07-23T22:28:27.641000Z |
| var-201906-1029 | In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulne… | 2024-07-23T22:28:26.009000Z |
| var-202004-0077 | There are multiple ways an unauthenticated attacker could perform SQL injection on WebAcc… | 2024-07-23T22:28:24.545000Z |
| var-202206-2050 | The affected product is vulnerable to multiple SQL injections, which may allow an unautho… | 2024-07-23T22:27:49.515000Z |
| var-202305-1981 | D-Link DIR-2150 SetSysEmailSettings AccountName Command Injection Remote Code Execution V… | 2024-07-23T22:27:44.287000Z |
| var-202305-0214 | D-Link DIR-2640 HNAP LoginPassword Authentication Bypass Vulnerability. This vulnerabilit… | 2024-07-23T22:27:44.496000Z |
| var-202305-0130 | D-Link DIR-2640 EmailFrom Command Injection Remote Code Execution Vulnerability. This vul… | 2024-07-23T22:27:44.522000Z |
| var-202407-0441 | A vulnerability has been identified in SIMATIC PCS 7 V9.1 (All versions), SIMATIC WinCC R… | 2024-07-23T22:27:41.577000Z |
| var-201105-0156 | Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 30… | 2024-07-23T22:25:52.955000Z |
| var-201402-0028 | The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when Uni… | 2024-07-23T22:25:48.624000Z |
| var-201402-0027 | The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows re… | 2024-07-23T22:25:48.742000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-022878 | Media Player MP-01 vulnerable to Missing Authentication for Critical Function | 2025-12-24T11:10+09:00 | 2026-01-15T11:10+09:00 |
| jvndb-2026-000006 | Chainlit vulnerable to improper access restriction | 2026-01-14T17:03+09:00 | 2026-01-14T17:03+09:00 |
| jvndb-2026-000002 | Multiple vulnerabilities in multiple NEC branded projectors manufactured by Sharp Display Solutions, Ltd. | 2026-01-07T14:10+09:00 | 2026-01-14T16:54+09:00 |
| jvndb-2026-000005 | Multiple vulnerabilities in EATON UPS Companion | 2026-01-13T19:01+09:00 | 2026-01-13T19:01+09:00 |
| jvndb-2026-000003 | RICOH Streamline NX vulnerable to improper authorization | 2026-01-09T18:17+09:00 | 2026-01-09T18:17+09:00 |
| jvndb-2026-000004 | The installers for multiple PIONEER products may insecurely load Dynamic Link Libraries | 2026-01-08T13:47+09:00 | 2026-01-08T13:47+09:00 |
| jvndb-2026-000001 | Origin validation error vulnerability in Fujitsu Security Solution AuthConductor Client Basic V2 | 2026-01-07T14:19+09:00 | 2026-01-07T14:19+09:00 |
| jvndb-2026-001001 | Authentication bypass vulnerability in OpenBlocks series | 2026-01-07T10:46+09:00 | 2026-01-07T10:46+09:00 |
| jvndb-2025-019621 | EPSON WebConfig / Epson Web Control for SEIKO EPSON Projector Products do not restrict excessive authentication attempts | 2025-11-21T15:31+09:00 | 2025-12-24T10:54+09:00 |
| jvndb-2025-014967 | Multiple vulnerabilities in multiple Keyence products | 2025-10-03T11:19+09:00 | 2025-12-23T14:36+09:00 |
| jvndb-2025-000117 | SEIKO EPSON printer Web Config vulnerable to stack-based buffer overflow | 2025-12-16T15:31+09:00 | 2025-12-23T11:57+09:00 |
| jvndb-2025-022400 | Ruijie Networks AP180 Series vulnerable to OS command injection | 2025-12-19T12:33+09:00 | 2025-12-19T12:33+09:00 |
| jvndb-2025-000118 | GROWI vulnerable to cross-site request forgery | 2025-12-17T13:04+09:00 | 2025-12-17T13:04+09:00 |
| jvndb-2025-022062 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-12-17T11:28+09:00 | 2025-12-17T11:28+09:00 |
| jvndb-2025-000115 | QND vulnerable to privilege escalation | 2025-12-11T14:33+09:00 | 2025-12-11T14:33+09:00 |
| jvndb-2025-000113 | Multiple vulnerabilities in GroupSession | 2025-12-08T17:48+09:00 | 2025-12-11T11:30+09:00 |
| jvndb-2025-000091 | Multiple I-O DATA NAS management applications register Windows services with unquoted file paths | 2025-10-22T15:04+09:00 | 2025-12-10T16:20+09:00 |
| jvndb-2021-000081 | Multiple vulnerabilities in Sharp NEC Display Solutions' public displays | 2021-09-17T15:13+09:00 | 2025-12-10T10:24+09:00 |
| jvndb-2025-021305 | Android App "Brother iPrint&Scan" improper use of an external cache directory | 2025-12-09T17:25+09:00 | 2025-12-09T17:25+09:00 |
| jvndb-2025-000114 | ELECOM Clone for Windows registers a Windows service with an unquoted file path | 2025-12-09T17:16+09:00 | 2025-12-09T17:16+09:00 |
| jvndb-2025-000116 | GS Yuasa FULLBACK Manager Pro registers Windows services with unquoted file paths | 2025-12-08T14:06+09:00 | 2025-12-08T14:06+09:00 |
| jvndb-2025-000094 | Multiple vulnerabilities in ABB Terra AC Wallbox | 2025-12-05T14:12+09:00 | 2025-12-05T14:12+09:00 |
| jvndb-2025-000112 | Installer of INZONE Hub may insecurely load Dynamic Link Libraries | 2025-11-28T13:36+09:00 | 2025-11-28T13:36+09:00 |
| jvndb-2025-000111 | SwitchBot Smart Video Doorbell vulnerable to active debug code | 2025-11-26T14:35+09:00 | 2025-11-26T14:35+09:00 |
| jvndb-2025-000110 | Multiple vulnerabilities in Security Point (Windows) of MaLion | 2025-11-25T17:17+09:00 | 2025-11-25T17:17+09:00 |
| jvndb-2025-000109 | Multiple vulnerabilities in SNC-CX600W | 2025-11-25T14:59+09:00 | 2025-11-25T14:59+09:00 |
| jvndb-2025-000108 | "FOD" App uses hard-coded cryptographic keys | 2025-11-25T14:15+09:00 | 2025-11-25T14:15+09:00 |
| jvndb-2025-000106 | Multiple vulnerabilities in LogStare Collector | 2025-11-21T16:27+09:00 | 2025-11-21T16:27+09:00 |
| jvndb-2025-000107 | Installer of RakurakuMusen Start EX for Windows may insecurely load Dynamic Link Libraries | 2025-11-19T16:22+09:00 | 2025-11-19T16:22+09:00 |
| jvndb-2025-000097 | "Dejira" App for iOS vulnerable to improper server certificate verification | 2025-11-17T14:09+09:00 | 2025-11-17T14:09+09:00 |
| ID | Description | Updated |
|---|---|---|
| ts-2023-001 | TS-2023-001 | 2023-01-17T00:00 |
| ts-2022-005 | TS-2022-005 | 2022-11-21T00:00 |
| ts-2022-004 | TS-2022-004 | 2022-11-21T00:00 |
| ts-2022-003 | TS-2022-003 | 2022-06-14T00:00 |
| ts-2022-002 | TS-2022-002 | 2022-05-11T00:00 |
| ts-2022-001 | TS-2022-001 | 2022-02-07T00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0385-1 | Security update for the Linux Kernel | 2026-02-04T12:55:07Z | 2026-02-04T12:55:07Z |
| suse-su-2026:0384-1 | Security update for ImageMagick | 2026-02-04T12:46:45Z | 2026-02-04T12:46:45Z |
| suse-su-2026:0383-1 | Security update for rekor | 2026-02-04T12:46:28Z | 2026-02-04T12:46:28Z |
| suse-su-2026:0382-1 | Security update for java-1_8_0-ibm | 2026-02-04T12:45:58Z | 2026-02-04T12:45:58Z |
| suse-su-2026:0381-1 | Security update for abseil-cpp | 2026-02-04T09:34:53Z | 2026-02-04T09:34:53Z |
| suse-su-2026:0361-1 | Security update for logback | 2026-02-02T13:20:41Z | 2026-02-02T13:20:41Z |
| suse-su-2026:0360-1 | Security update for openssl-1_1 | 2026-02-02T09:55:48Z | 2026-02-02T09:55:48Z |
| suse-su-2026:0359-1 | Security update for openssl-1_1 | 2026-02-02T09:55:09Z | 2026-02-02T09:55:09Z |
| suse-su-2026:0358-1 | Security update for openssl-1_1 | 2026-02-02T09:54:23Z | 2026-02-02T09:54:23Z |
| suse-su-2026:0356-1 | Security update for qemu | 2026-02-01T21:18:57Z | 2026-02-01T21:18:57Z |
| suse-su-2026:0355-1 | Security update for glib2 | 2026-01-31T02:04:37Z | 2026-01-31T02:04:37Z |
| suse-su-2026:0352-1 | Security update for the Linux Kernel | 2026-01-30T14:05:23Z | 2026-01-30T14:05:23Z |
| suse-su-2026:0351-1 | Security update for openCryptoki | 2026-01-30T14:04:38Z | 2026-01-30T14:04:38Z |
| suse-su-2026:0350-1 | Security update for the Linux Kernel | 2026-01-30T13:42:59Z | 2026-01-30T13:42:59Z |
| suse-su-2026:0348-1 | Security update for bind | 2026-01-30T11:17:07Z | 2026-01-30T11:17:07Z |
| suse-su-2026:0347-1 | Security update for glibc-livepatches | 2026-01-30T10:36:11Z | 2026-01-30T10:36:11Z |
| suse-su-2026:20180-1 | Security update for unbound | 2026-01-30T10:04:18Z | 2026-01-30T10:04:18Z |
| suse-su-2026:0346-1 | Security update for openssl-1_1 | 2026-01-30T09:01:28Z | 2026-01-30T09:01:28Z |
| suse-su-2026:0345-1 | Security update for freerdp | 2026-01-30T07:18:43Z | 2026-01-30T07:18:43Z |
| suse-su-2026:0344-1 | Security update for assertj-core | 2026-01-29T20:04:07Z | 2026-01-29T20:04:07Z |
| suse-su-2026:0343-1 | Security update for openssl-1_1 | 2026-01-29T18:34:02Z | 2026-01-29T18:34:02Z |
| suse-su-2026:20178-1 | Security update for glibc | 2026-01-29T16:36:29Z | 2026-01-29T16:36:29Z |
| suse-su-2026:20179-1 | Security update for gpg2 | 2026-01-29T16:09:32Z | 2026-01-29T16:09:32Z |
| suse-su-2026:20176-1 | Security update for elemental-register, elemental-toolkit | 2026-01-29T15:32:26Z | 2026-01-29T15:32:26Z |
| suse-su-2026:0342-1 | Security update for java-25-openjdk | 2026-01-29T14:59:30Z | 2026-01-29T14:59:30Z |
| suse-su-2026:0341-1 | Security update for java-11-openjdk | 2026-01-29T14:58:19Z | 2026-01-29T14:58:19Z |
| suse-su-2026:0338-1 | Security update for abseil-cpp | 2026-01-29T10:35:48Z | 2026-01-29T10:35:48Z |
| suse-su-2026:0337-1 | Security update for python | 2026-01-29T10:34:17Z | 2026-01-29T10:34:17Z |
| suse-su-2026:0336-1 | Security update for libxml2 | 2026-01-29T10:16:20Z | 2026-01-29T10:16:20Z |
| suse-su-2026:0335-1 | Security update for python-filelock | 2026-01-29T10:15:42Z | 2026-01-29T10:15:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-07039 | WordPress WP-CRM System plugin未经授权访问漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-07027 | WordPress Uploadify plugin代码问题漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-07026 | WordPress Testimonials Creator plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-07025 | WordPress Supreme Modules Lite plugin代码问题漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-07012 | WordPress Stopwords for comments plugin跨站请求伪造漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-07004 | WordPress SpiceForms Form Builder plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06988 | WordPress Sosh Share Buttons plugin跨站请求伪造漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06987 | WordPress SocialChamp with WordPress plugin跨站请求伪造漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06986 | WordPress Short Link plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06985 | WordPress Shipping Rate By Cities plugin SQL注入漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06984 | WordPress SearchWiz plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06913 | WordPress Responsive Accordion Slider plugin未经授权的数据修改漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06912 | WordPress LinkedIn SC plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06911 | WordPress Kunze Law plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06910 | WordPress Internal Link Builder plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06909 | WordPress Gotham Block Extra Light plugin路径遍历漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06908 | WordPress Gotham Block Extra Light plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06907 | WordPress GetContentFromURL plugin服务端请求伪造漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06906 | WordPress Float Payment Gateway plugin未经授权的数据修改漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06905 | WordPress Flat Shipping Rate by City for WooCommerce plugin SQL注入漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06904 | WordPress Electric Studio Download Counter plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06903 | WordPress Aplazo Payment Gateway plugin缺少权限漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06902 | WordPress AJS Footnotes plugin跨站脚本漏洞 | 2026-01-19 | 2026-01-23 |
| cnvd-2026-06831 | D-Link DIR-823G操作系统命令注入漏洞 | 2022-04-01 | 2026-01-23 |
| cnvd-2026-06830 | D-Link DIR-823G密码重置漏洞 | 2023-06-30 | 2026-01-23 |
| cnvd-2026-06829 | D-Link DIR-823G URL字段缓冲区溢出漏洞 | 2023-07-03 | 2026-01-23 |
| cnvd-2026-06828 | D-Link DIR-823G HostName字段缓冲区溢出漏洞 | 2023-07-03 | 2026-01-23 |
| cnvd-2026-06827 | D-Link DIR-823G堆栈缓冲区溢出漏洞 | 2023-09-25 | 2026-01-23 |
| cnvd-2026-06826 | D-Link DIR-823G SetWifiDownSettings函数栈缓冲区溢出漏洞 | 2023-09-25 | 2026-01-23 |
| cnvd-2026-06825 | D-Link DIR-823G空指针取消引用漏洞 | 2024-05-07 | 2026-01-23 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0141 | Multiples vulnérabilités dans les produits SAP | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0140 | Multiples vulnérabilités dans les produits Axis | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0139 | Multiples vulnérabilités dans les produits Siemens | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0138 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0137 | Multiples vulnérabilités dans GnuTLS | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0136 | Vulnérabilité dans Fortinet FortiClientEMS | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0135 | Vulnérabilité dans GitLab AI Gateway | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0134 | Vulnérabilité dans Microsoft Edge | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0132 | Multiples vulnérabilités dans VMware Tanzu Greenplum | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0131 | Multiples vulnérabilités dans les produits IBM | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0130 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0129 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0128 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0127 | Vulnérabilité dans NetApp ONTAP 9 | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0126 | Vulnérabilité dans ESET Management Agent | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0125 | Multiples vulnérabilités dans les produits Moxa | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0124 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0123 | Multiples vulnérabilités dans Asterisk | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0122 | Multiples vulnérabilités dans Tenable Nessus | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0121 | Vulnérabilité dans les produits Juniper Networks | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0120 | Multiples vulnérabilités dans les produits F5 | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0119 | Multiples vulnérabilités dans les produits Cisco | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0118 | Multiples vulnérabilités dans les produits Splunk | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0117 | Multiples vulnérabilités dans GLPI | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0116 | Vulnérabilité dans les produits Moxa | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0115 | Multiples vulnérabilités dans Tenable Identity Exposure | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0114 | Multiples vulnérabilités dans Google Chrome | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0113 | Vulnérabilité dans Google Pixel | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0112 | Multiples vulnérabilités dans les produits VMware | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-ale-013 | Exploitations de vulnérabilités dans Ivanti Cloud Services Appliance (CSA) | 2025-03-31T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| CERTFR-2024-ALE-014 | [MàJ] Multiples vulnérabilités dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| CERTFR-2024-ALE-013 | Exploitations de vulnérabilités dans Ivanti Cloud Services Appliance (CSA) | 2025-03-31T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| certfr-2024-ale-015 | [MàJ] Multiples vulnérabilités sur l'interface d'administration des équipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| CERTFR-2024-ALE-015 | [MàJ] Multiples vulnérabilités sur l'interface d'administration des équipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-ale-012 | [MàJ] Vulnérabilités affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-011 | Vulnérabilité dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| CERTFR-2024-ALE-012 | [MàJ] Vulnérabilités affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| CERTFR-2024-ALE-011 | Vulnérabilité dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-010 | Multiples vulnérabilités dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| certfr-2024-ale-009 | Vulnérabilité dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| CERTFR-2024-ALE-010 | Multiples vulnérabilités dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| CERTFR-2024-ALE-009 | Vulnérabilité dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| certfr-2024-ale-008 | [MàJ] Vulnérabilité dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-007 | Multiples vulnérabilités dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-006 | [MàJ] Vulnérabilité dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-004 | [MàJ] Vulnérabilité dans Fortinet FortiOS | 2024-02-09T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-008 | [MàJ] Vulnérabilité dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-007 | Multiples vulnérabilités dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-006 | [MàJ] Vulnérabilité dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-004 | [MàJ] Vulnérabilité dans Fortinet FortiOS | 2024-02-09T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-005 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2024-02-15T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-003 | [MàJ] Incident affectant les solutions AnyDesk | 2024-02-05T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-001 | [MàJ] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| CERTFR-2024-ALE-005 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2024-02-15T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| CERTFR-2024-ALE-003 | [MàJ] Incident affectant les solutions AnyDesk | 2024-02-05T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| CERTFR-2024-ALE-001 | [MàJ] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| CERTFR-2024-ALE-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| certfr-2023-ale-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2025-0027 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in … |
misp |
misp |
2025-11-27T07:17:00.000Z | 2025-12-02T08:51:04.323899Z |
| GCVE-1-2025-0028 |
8.5 (4.0)
|
Information leakage vulnerability in the MISP Feed con… |
misp |
misp |
2025-11-27T07:23:00.000Z | 2025-12-02T08:51:35.429494Z |
| GCVE-1-2025-0026 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in … |
misp |
misp |
2025-11-26T16:35:00.000Z | 2025-12-02T08:50:46.381572Z |
| GCVE-1-2025-0025 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in … |
misp |
misp |
2025-11-26T16:27:00.000Z | 2025-12-02T08:50:18.897756Z |
| GCVE-1-2025-0024 |
9.4 (4.0)
|
cross-site scripting (XSS) vulnerability in the MISP s… |
misp |
misp |
2025-11-26T16:14:00.000Z | 2025-12-02T08:50:01.482327Z |
| GCVE-1-2025-0023 |
9.4 (4.0)
|
XSS in MISP server comparison tool |
misp |
misp |
2025-11-26T16:10:00.000Z | 2025-12-02T08:49:24.626168Z |
| GCVE-1-2025-0022 |
9.4 (4.0)
|
Clarified setting's impact on download_attachments_on_load |
misp |
misp |
2025-11-26T16:04:00.000Z | 2025-12-02T08:49:04.510294Z |
| GCVE-1-2025-0021 |
9.4 (4.0)
|
XSS in MISP ReST client in HTML view |
misp |
misp |
2025-11-26T15:55:00.000Z | 2025-12-02T08:48:41.869838Z |
| GCVE-1-2025-0020 |
9.4 (4.0)
|
cross-site scripting (XSS) in Galaxy element JSON view |
misp |
misp |
2025-11-26T15:49:00.000Z | 2025-12-02T08:47:41.151429Z |
| GCVE-1-2025-0018 |
9.4 (4.0)
|
HTML injection issue was identified in Lookyloo’s web … |
lookyloo |
lookyloo |
2025-11-18T15:33:00.000Z | 2025-11-18T20:39:45.579295Z |
| GCVE-1-2025-0016 |
6 (4.0)
|
Local file inclusion in [ImportFromUrl() URL hand… |
misp |
misp |
2025-11-04T09:20:00.000Z | 2025-11-04T09:56:38.383646Z |
| GCVE-1-2025-0015 |
9 (4.0)
|
Potential XSS in decaying simulation tool |
misp |
misp |
2025-11-04T09:06:00.000Z | 2025-11-04T09:06:59.216121Z |
| GCVE-1-2025-0014 |
9.4 (4.0)
|
XSS in event report via Mermaid diagram |
misp |
misp |
2025-11-04T08:58:00.024516Z | 2025-11-04T08:58:00.024516Z |
| GCVE-1-2025-0013 |
9.4 (4.0)
|
Vulnerability in sharing group blueprints allowing sha… |
misp |
misp |
2025-11-04T08:49:21.558087Z | 2025-11-04T08:49:21.558087Z |
| GCVE-1-2025-0012 |
N/A
|
Potential vulnerability in file check upload but non-e… |
misp |
misp |
2025-11-04T07:20:00.000Z | 2025-11-28T07:16:21.589449Z |
| GCVE-1-2025-0011 |
9.4 (4.0)
|
Arbitrary file inclusion / deletion via import modules… |
misp |
misp |
2025-11-04T07:01:25.464225Z | 2025-11-04T07:01:25.464225Z |
| GCVE-1-2025-0010 |
6.3 (4.0)
|
Arbitrary file hash inclusion via templates accessible… |
misp |
misp |
2025-11-04T06:25:11.108987Z | 2025-11-04T06:25:11.108987Z |
| GCVE-1-2025-0009 |
6.4 (4.0)
|
A pre-auth user could self-assign a reporter without b… |
CIRCL |
vulnerability-lookup |
2025-10-13T09:20:24.800890Z | 2025-10-13T09:20:24.800890Z |
| GCVE-1-2025-0008 |
7 (4.0)
|
Logged users can view vulnerability disclosure comment… |
CIRCL |
vulnerability-lookup |
2025-10-13T09:10:00.000Z | 2025-10-13T09:15:31.637686Z |
| GCVE-1-2025-0007 |
4.5 (4.0)
|
Missing email validation on user management |
CIRCL |
vulnerability-lookup |
2025-10-13T08:37:00.000Z | 2025-10-13T08:51:37.408861Z |
| GCVE-1-2025-0006 |
9.3 (4.0)
|
Potential XSS in admin CPE in organization model |
CIRCL |
vulnerability-lookup |
2025-10-13T08:29:00.000Z | 2025-10-13T08:52:23.411325Z |
| GCVE-1-2025-0005 |
9.4 (4.0)
|
Reflected XSS due to insecure use of Markup |
CIRCL |
vulnerability-lookup |
2025-10-13T08:23:29.812914Z | 2025-10-13T08:23:29.812914Z |
| GCVE-1-2025-0004 |
10 (4.0)
|
XSS in Comments, Bundles, and Sightings component of v… |
CIRCL |
vulnerability-lookup |
2025-09-25T14:10:00.000Z | 2025-11-19T10:16:47.656802Z |
| GCVE-1-2025-0003 |
9.3 (4.0)
|
Incorrect ACL for user settings edit, which previ… |
cerebrate |
cerebrate |
2025-08-22T12:33:00.000Z | 2025-08-23T07:55:10.950332Z |
| GCVE-1-2025-0002 |
8.9 (4.0)
|
Command Injection in Cl0p Exfiltration Python Script |
Cl0p ransomware |
exfiltration |
2025-07-01T08:19:00.000Z | 2025-07-01T10:58:58.443468Z |
| GCVE-1-2025-0001 |
5.3 (4.0)
|
The absence of a password confirmation step when deact… |
CIRCL |
Vulnerability-Lookup |
2025-05-27T08:58:00.000Z | 2025-05-30T14:27:56.273945Z |