Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2649 |
8.8 (3.1)
|
Integer overflow in V8 in Google Chrome prior to … |
Google |
Chrome |
2026-02-18T21:39:03.873Z | 2026-02-19T04:55:52.326Z |
| CVE-2026-2648 |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-02-18T21:39:03.100Z | 2026-02-19T11:18:50.122Z |
| CVE-2026-2672 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Tsinghua Unigroup Electronic Archives System downLoad … |
Tsinghua Unigroup |
Electronic Archives System |
2026-02-18T21:32:07.412Z | 2026-02-19T15:03:03.632Z |
| CVE-2026-27181 |
8.7 (4.0)
7.5 (3.1)
|
MajorDoMo Unauthenticated Module Uninstall via Market … |
sergejey |
MajorDoMo |
2026-02-18T21:10:41.878Z | 2026-02-18T21:27:03.900Z |
| CVE-2026-27180 |
9.3 (4.0)
9.8 (3.1)
|
MajorDoMo Supply Chain Remote Code Execution via Updat… |
sergejey |
MajorDoMo |
2026-02-18T21:10:41.057Z | 2026-02-20T18:58:28.508Z |
| CVE-2026-27179 |
8.8 (4.0)
8.2 (3.1)
|
MajorDoMo Unauthenticated SQL Injection in Commands Module |
sergejey |
MajorDoMo |
2026-02-18T21:10:40.242Z | 2026-02-20T19:01:28.949Z |
| CVE-2026-27178 |
5.3 (4.0)
7.2 (3.1)
|
MajorDoMo Stored Cross-Site Scripting via Method Param… |
sergejey |
MajorDoMo |
2026-02-18T21:10:39.441Z | 2026-02-20T19:02:22.949Z |
| CVE-2026-27177 |
5.3 (4.0)
7.2 (3.1)
|
MajorDoMo Stored Cross-Site Scripting via Property Set… |
sergejey |
MajorDoMo |
2026-02-18T21:10:38.555Z | 2026-02-20T19:27:41.613Z |
| CVE-2026-27176 |
5.1 (4.0)
6.1 (3.1)
|
MajorDoMo Reflected Cross-Site Scripting in command.php |
sergejey |
MajorDoMo |
2026-02-18T21:10:37.784Z | 2026-02-20T19:31:22.056Z |
| CVE-2026-27175 |
9.2 (4.0)
9.8 (3.1)
|
MajorDoMo Command Injection in rc/index.php via Race C… |
sergejey |
MajorDoMo |
2026-02-18T21:10:36.987Z | 2026-02-18T21:10:36.987Z |
| CVE-2026-27174 |
9.3 (4.0)
9.8 (3.1)
|
MajorDoMo Unauthenticated Remote Code Execution via Ad… |
sergejey |
MajorDoMo |
2026-02-18T21:10:36.113Z | 2026-02-18T21:10:36.113Z |
| CVE-2026-2670 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
Advantech WISE-6610 Background Management openvpn_appl… |
Advantech |
WISE-6610 |
2026-02-18T21:02:08.426Z | 2026-02-20T19:32:51.761Z |
| CVE-2026-2669 |
6.9 (4.0)
6.5 (3.1)
6.5 (3.0)
|
Rongzhitong Visual Integrated Command and Dispatch Pla… |
Rongzhitong |
Visual Integrated Command and Dispatch Platform |
2026-02-18T21:02:06.522Z | 2026-02-20T19:34:16.364Z |
| CVE-2026-24744 |
5.7 (3.1)
|
InvoicePlane has a Stored Cross-Site Scripting (XSS) issue |
InvoicePlane |
InvoicePlane |
2026-02-18T21:01:27.566Z | 2026-02-20T19:35:24.797Z |
| CVE-2026-24743 |
5.7 (3.1)
|
InvoicePlane has a Stored Cross-Site Scripting (XSS) issue |
InvoicePlane |
InvoicePlane |
2026-02-18T20:59:16.103Z | 2026-02-19T14:58:46.031Z |
| CVE-2026-27182 |
8.6 (4.0)
8.4 (3.1)
|
Saturn Remote Mouse Server UDP Command Injection RCE |
saturnremote |
Saturn Remote Mouse Server |
2026-02-18T20:59:12.092Z | 2026-02-19T14:57:25.386Z |
| CVE-2019-25400 |
4.8 (4.0)
5.4 (3.1)
|
IPFire 2.21 Core Update 127 Multiple XSS via fwhosts.cgi |
Ipfire |
IPFire |
2026-02-18T20:59:11.293Z | 2026-02-19T14:55:01.065Z |
| CVE-2019-25399 |
5.1 (4.0)
6.4 (3.1)
|
IPFire 2.21 Core Update 127 Stored XSS via extrahd.cgi |
Ipfire |
IPFire |
2026-02-18T20:59:10.495Z | 2026-02-19T14:54:11.086Z |
| CVE-2019-25398 |
5.1 (4.0)
6.1 (3.1)
|
IPFire 2.21 Core Update 127 Cross-Site Scripting via o… |
Ipfire |
IPFire |
2026-02-18T20:59:09.712Z | 2026-02-19T14:43:29.706Z |
| CVE-2019-25397 |
5.1 (4.0)
6.1 (3.1)
|
IPFire 2.21 Core Update 127 Cross-Site Scripting via h… |
Ipfire |
IPFire |
2026-02-18T20:59:08.864Z | 2026-02-19T14:41:22.035Z |
| CVE-2019-25396 |
5.1 (4.0)
6.1 (3.1)
|
IPFire 2.21 Core Update 127 Reflected XSS via updatexl… |
Ipfire |
IPFire |
2026-02-18T20:59:07.991Z | 2026-02-19T14:39:20.005Z |
| CVE-2026-24746 |
5.7 (3.1)
|
InvoicePlane has a Stored Cross-Site Scripting (XSS) issue |
InvoicePlane |
InvoicePlane |
2026-02-18T20:51:20.813Z | 2026-02-18T21:23:14.039Z |
| CVE-2026-0665 |
6.5 (3.1)
|
Qemu-kvm: heap off-by-one in kvm xen physdevop_map_pirq |
|
|
2026-02-18T20:50:03.724Z | 2026-02-18T21:27:14.216Z |
| CVE-2025-8860 |
3.3 (3.1)
|
Qemu-kvm: uefi-vars: information disclosure vulnerabil… |
|
|
2026-02-18T20:49:06.186Z | 2026-02-19T14:35:51.033Z |
| CVE-2025-14876 |
5.5 (3.1)
|
Qemu-kvm: unbounded allocation in virtio-crypto |
|
|
2026-02-18T20:47:54.302Z | 2026-02-19T14:33:52.744Z |
| CVE-2026-1999 |
7.1 (4.0)
|
Incorrect Authorization vulnerability was identified i… |
GitHub |
Enterprise Server |
2026-02-18T20:44:51.396Z | 2026-02-19T14:32:12.248Z |
| CVE-2026-1355 |
6 (4.0)
|
Missing Authorization Check in GitHub Enterprise Serve… |
GitHub |
Enterprise Server |
2026-02-18T20:42:07.180Z | 2026-02-20T19:36:28.885Z |
| CVE-2026-0573 |
7.6 (4.0)
|
Improper Handling of HTTP Redirects vulnerability was … |
GitHub |
Enterprise Server |
2026-02-18T20:37:39.601Z | 2026-02-18T21:20:02.732Z |
| CVE-2026-2668 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Rongzhitong Visual Integrated Command and Dispatch Pla… |
Rongzhitong |
Visual Integrated Command and Dispatch Platform |
2026-02-18T20:32:08.579Z | 2026-02-18T21:23:14.670Z |
| CVE-2026-2667 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Rongzhitong Visual Integrated Command and Dispatch Pla… |
Rongzhitong |
Visual Integrated Command and Dispatch Platform |
2026-02-18T20:32:06.746Z | 2026-02-18T20:32:06.746Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2669 |
6.9 (4.0)
6.5 (3.1)
6.5 (3.0)
|
Rongzhitong Visual Integrated Command and Dispatch Pla… |
Rongzhitong |
Visual Integrated Command and Dispatch Platform |
2026-02-18T21:02:06.522Z | 2026-02-20T19:34:16.364Z |
| CVE-2026-27182 |
8.6 (4.0)
8.4 (3.1)
|
Saturn Remote Mouse Server UDP Command Injection RCE |
saturnremote |
Saturn Remote Mouse Server |
2026-02-18T20:59:12.092Z | 2026-02-19T14:57:25.386Z |
| CVE-2026-27181 |
8.7 (4.0)
7.5 (3.1)
|
MajorDoMo Unauthenticated Module Uninstall via Market … |
sergejey |
MajorDoMo |
2026-02-18T21:10:41.878Z | 2026-02-18T21:27:03.900Z |
| CVE-2026-27180 |
9.3 (4.0)
9.8 (3.1)
|
MajorDoMo Supply Chain Remote Code Execution via Updat… |
sergejey |
MajorDoMo |
2026-02-18T21:10:41.057Z | 2026-02-20T18:58:28.508Z |
| CVE-2026-2650 |
8.8 (3.1)
|
Heap buffer overflow in Media in Google Chrome pr… |
Google |
Chrome |
2026-02-18T21:39:04.464Z | 2026-02-19T04:55:53.151Z |
| CVE-2026-2649 |
8.8 (3.1)
|
Integer overflow in V8 in Google Chrome prior to … |
Google |
Chrome |
2026-02-18T21:39:03.873Z | 2026-02-19T04:55:52.326Z |
| CVE-2026-2648 |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-02-18T21:39:03.100Z | 2026-02-19T11:18:50.122Z |
| CVE-2026-27179 |
8.8 (4.0)
8.2 (3.1)
|
MajorDoMo Unauthenticated SQL Injection in Commands Module |
sergejey |
MajorDoMo |
2026-02-18T21:10:40.242Z | 2026-02-20T19:01:28.949Z |
| CVE-2026-27178 |
5.3 (4.0)
7.2 (3.1)
|
MajorDoMo Stored Cross-Site Scripting via Method Param… |
sergejey |
MajorDoMo |
2026-02-18T21:10:39.441Z | 2026-02-20T19:02:22.949Z |
| CVE-2026-27177 |
5.3 (4.0)
7.2 (3.1)
|
MajorDoMo Stored Cross-Site Scripting via Property Set… |
sergejey |
MajorDoMo |
2026-02-18T21:10:38.555Z | 2026-02-20T19:27:41.613Z |
| CVE-2026-27176 |
5.1 (4.0)
6.1 (3.1)
|
MajorDoMo Reflected Cross-Site Scripting in command.php |
sergejey |
MajorDoMo |
2026-02-18T21:10:37.784Z | 2026-02-20T19:31:22.056Z |
| CVE-2026-27175 |
9.2 (4.0)
9.8 (3.1)
|
MajorDoMo Command Injection in rc/index.php via Race C… |
sergejey |
MajorDoMo |
2026-02-18T21:10:36.987Z | 2026-02-18T21:10:36.987Z |
| CVE-2026-27174 |
9.3 (4.0)
9.8 (3.1)
|
MajorDoMo Unauthenticated Remote Code Execution via Ad… |
sergejey |
MajorDoMo |
2026-02-18T21:10:36.113Z | 2026-02-18T21:10:36.113Z |
| CVE-2026-24744 |
5.7 (3.1)
|
InvoicePlane has a Stored Cross-Site Scripting (XSS) issue |
InvoicePlane |
InvoicePlane |
2026-02-18T21:01:27.566Z | 2026-02-20T19:35:24.797Z |
| CVE-2026-24743 |
5.7 (3.1)
|
InvoicePlane has a Stored Cross-Site Scripting (XSS) issue |
InvoicePlane |
InvoicePlane |
2026-02-18T20:59:16.103Z | 2026-02-19T14:58:46.031Z |
| CVE-2019-25401 |
8.7 (4.0)
7.5 (3.1)
|
Bematech Printer MP-4200 TH Denial of Service |
Bematech |
MP-4200 |
2026-02-18T21:55:11.819Z | 2026-02-19T20:08:28.965Z |
| CVE-2019-25400 |
4.8 (4.0)
5.4 (3.1)
|
IPFire 2.21 Core Update 127 Multiple XSS via fwhosts.cgi |
Ipfire |
IPFire |
2026-02-18T20:59:11.293Z | 2026-02-19T14:55:01.065Z |
| CVE-2019-25399 |
5.1 (4.0)
6.4 (3.1)
|
IPFire 2.21 Core Update 127 Stored XSS via extrahd.cgi |
Ipfire |
IPFire |
2026-02-18T20:59:10.495Z | 2026-02-19T14:54:11.086Z |
| CVE-2019-25398 |
5.1 (4.0)
6.1 (3.1)
|
IPFire 2.21 Core Update 127 Cross-Site Scripting via o… |
Ipfire |
IPFire |
2026-02-18T20:59:09.712Z | 2026-02-19T14:43:29.706Z |
| CVE-2019-25397 |
5.1 (4.0)
6.1 (3.1)
|
IPFire 2.21 Core Update 127 Cross-Site Scripting via h… |
Ipfire |
IPFire |
2026-02-18T20:59:08.864Z | 2026-02-19T14:41:22.035Z |
| CVE-2019-25396 |
5.1 (4.0)
6.1 (3.1)
|
IPFire 2.21 Core Update 127 Reflected XSS via updatexl… |
Ipfire |
IPFire |
2026-02-18T20:59:07.991Z | 2026-02-19T14:39:20.005Z |
| CVE-2019-25365 |
8.4 (4.0)
9.8 (3.1)
|
ChaosPro 2.0 - Buffer Overflow |
Chaospro |
ChaosPro |
2026-02-18T21:55:11.104Z | 2026-02-19T20:08:42.024Z |
| CVE-2019-25364 |
9.3 (4.0)
9.8 (3.1)
|
Win10 MailCarrier 2.51 - 'POP3 User' Remote Buffer Overflow |
TABS Laboratories Corporation |
Win10 MailCarrier |
2026-02-18T21:55:10.094Z | 2026-02-19T20:08:53.368Z |
| CVE-2019-25363 |
8.4 (4.0)
7.5 (3.1)
|
WMV to AVI MPEG DVD WMV Convertor 4.6.1217 - Denial of… |
Alloksoft |
WMV to AVI MPEG DVD WMV Convertor |
2026-02-18T21:55:09.268Z | 2026-02-19T20:09:07.038Z |
| CVE-2019-25362 |
9.3 (4.0)
9.8 (3.1)
|
WMV to AVI MPEG DVD WMV Convertor 4.6.1217 - Buffer OverFlow |
Alloksoft |
WMV to AVI MPEG DVD WMV Convertor |
2026-02-18T21:55:08.448Z | 2026-02-19T20:09:18.092Z |
| CVE-2019-25361 |
8.6 (4.0)
9.8 (3.1)
|
Ayukov NFTP client 1.71 - 'SYST' Buffer Overflow |
Ayukov |
Ayukov NFTP client |
2026-02-18T21:55:07.501Z | 2026-02-19T20:09:29.375Z |
| CVE-2019-25360 |
8.4 (4.0)
9.8 (3.1)
|
Aida64 6.10.5200 - Buffer Overflow |
FinalWire Ltd. |
Aida64 |
2026-02-18T21:55:06.734Z | 2026-02-19T20:09:41.717Z |
| CVE-2019-25359 |
8.8 (4.0)
8.2 (3.1)
|
SD.NET RIM 4.7.3c - 'idtyp' SQL Injection |
Sitzungsdienst |
SD.NET RIM |
2026-02-18T21:55:05.859Z | 2026-02-19T20:09:53.575Z |
| CVE-2019-25358 |
8.7 (4.0)
7.5 (3.1)
|
FileOptimizer 14.00.2524 - Denial of Service |
nikkhokkho |
FileOptimizer |
2026-02-18T21:55:04.412Z | 2026-02-19T20:10:06.522Z |
| CVE-2019-25357 |
8.4 (4.0)
8.4 (3.1)
|
Control Center PRO 6.2.9 - Local Stack Based BufferOverflow |
WEBGATE Inc. |
Control Center PRO |
2026-02-18T21:55:03.509Z | 2026-02-19T20:10:17.924Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2021-26381 | Improper system call parameter validation in the Trusted OS may allow a malicious driver to perform… | 2026-02-10T20:16:41.110 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-26009 | Catalyst is a platform built for enterprise game server hosts, game communities, and billing panel … | 2026-02-10T19:16:04.437 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-25613 | An authorized user may disable the MongoDB server by issuing a query against a collection that cont… | 2026-02-10T19:16:04.267 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-25610 | An authorized user may trigger a server crash by running a $geoNear pipeline with certain invalid i… | 2026-02-10T19:16:04.037 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-2302 | Under specific conditions when processing a maliciously crafted value of type Hash r, Mongoid::Crit… | 2026-02-10T19:16:04.677 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-25609 | Incorrect validation of the profile command may result in the determination that a request altering… | 2026-02-10T19:16:03.877 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-25506 | MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17… | 2026-02-10T19:16:03.720 | 2026-02-17T19:21:57.227 |
| fkie_cve-2026-21355 | DNG SDK versions 1.7.1 2410 and earlier are affected by an out-of-bounds read vulnerability that co… | 2026-02-10T19:15:59.503 | 2026-02-13T20:37:41.920 |
| fkie_cve-2026-21354 | DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or Wraparound vulnerabi… | 2026-02-10T19:15:59.140 | 2026-02-13T20:37:36.883 |
| fkie_cve-2026-21353 | DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or Wraparound vulnerabi… | 2026-02-10T19:15:58.373 | 2026-02-13T20:37:33.567 |
| fkie_cve-2026-21352 | DNG SDK versions 1.7.1 2410 and earlier are affected by an out-of-bounds write vulnerability that c… | 2026-02-10T19:15:58.107 | 2026-02-13T20:37:27.767 |
| fkie_cve-2026-21347 | Bridge versions 15.1.3, 16.0.1 and earlier are affected by an Integer Overflow or Wraparound vulner… | 2026-02-10T19:15:57.890 | 2026-02-11T17:14:59.750 |
| fkie_cve-2026-21346 | Bridge versions 15.1.3, 16.0.1 and earlier are affected by an out-of-bounds write vulnerability tha… | 2026-02-10T19:15:57.657 | 2026-02-11T17:15:14.187 |
| fkie_cve-2026-21345 | Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability… | 2026-02-10T19:15:57.457 | 2026-02-11T17:15:24.487 |
| fkie_cve-2026-21344 | Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability… | 2026-02-10T19:15:57.190 | 2026-02-11T17:15:39.107 |
| fkie_cve-2026-21343 | Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability… | 2026-02-10T19:15:56.857 | 2026-02-11T17:16:03.557 |
| fkie_cve-2026-21342 | Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds write vulnerabilit… | 2026-02-10T19:15:56.613 | 2026-02-11T16:40:22.233 |
| fkie_cve-2026-21341 | Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds write vulnerabilit… | 2026-02-10T19:15:55.267 | 2026-02-11T16:40:15.260 |
| fkie_cve-2026-1850 | Complex queries can cause excessive memory usage in MongoDB Query Planner resulting in an Out-Of-Me… | 2026-02-10T19:15:51.633 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-1849 | MongoDB Server may experience an out-of-memory failure while evaluating expressions that produce de… | 2026-02-10T19:15:51.477 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-1848 | Connections received from the proxy port may not count towards total accepted connections, resultin… | 2026-02-10T19:15:51.333 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-1847 | Inserting certain large documents into a replica set could lead to replica set secondaries not bein… | 2026-02-10T19:15:51.160 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-26003 | FastGPT is an AI Agent building platform. From 4.14.0 to 4.14.5, attackers can directly access the … | 2026-02-10T18:16:39.107 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-25993 | EverShop is a TypeScript-first eCommerce platform. During category update and deletion event handli… | 2026-02-10T18:16:38.957 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-25992 | SiYuan is a personal knowledge management system. Prior to 3.5.5, the /api/file/getFile endpoint us… | 2026-02-10T18:16:38.807 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-25956 | Frappe is a full-stack web application framework. Prior to 14.99.14 and 15.94.0, an attacker could … | 2026-02-10T18:16:38.653 | 2026-02-17T15:05:39.610 |
| fkie_cve-2026-25950 | Rejected reason: Further research determined the issue is not a vulnerability. | 2026-02-10T18:16:38.593 | 2026-02-10T18:16:38.593 |
| fkie_cve-2026-25947 | Worklenz is a project management tool. Prior to 2.1.7, there are multiple SQL injection vulnerabili… | 2026-02-10T18:16:38.423 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-25805 | Zed is a multiplayer code editor. Prior to 0.219.4, Zed does not show with which parameters a tool … | 2026-02-10T18:16:38.200 | 2026-02-19T15:08:32.990 |
| fkie_cve-2026-25728 | ClipBucket v5 is an open source video sharing platform. Prior to 5.5.3 - #40, a Time-of-Check to Ti… | 2026-02-10T18:16:38.053 | 2026-02-18T15:02:02.293 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-f7pj-q7w5-89fg |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Validate sp bef… | 2026-02-18T18:30:40Z | 2026-02-19T18:31:44Z |
| ghsa-chpq-fr33-gp2m |
7.5 (3.1)
8.7 (4.0)
|
When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate. Not… | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-9wwr-2jh3-482p |
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix infinite loop cause… | 2026-02-18T18:30:40Z | 2026-02-19T18:31:44Z |
| ghsa-8rqj-9226-cwx7 |
8.8 (3.1)
|
code-projects Scholars Tracking System 1.0 allows an authenticated attacker to achieve remote code … | 2026-02-18T18:30:40Z | 2026-02-18T21:31:22Z |
| ghsa-8j5g-3q2r-xfjh |
|
In the Linux kernel, the following vulnerability has been resolved: erofs: fix UAF issue for file-… | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-876r-52fj-4pxf |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Delay module un… | 2026-02-18T18:30:40Z | 2026-02-19T18:31:43Z |
| ghsa-7p94-766c-hgjp |
10.0 (3.1)
|
NLTK has a Zip Slip Vulnerability | 2026-02-18T18:30:40Z | 2026-02-19T20:27:43Z |
| ghsa-7fjm-558r-4j8r |
7.5 (3.1)
|
Missing authentication and authorization in print_membership_card.php in CodeAstro Membership Manag… | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-78xc-39m5-v2c6 |
|
In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Avoid creating … | 2026-02-18T18:30:40Z | 2026-02-19T18:31:43Z |
| ghsa-6rjp-j8mc-4f57 |
3.3 (3.1)
1.9 (4.0)
|
A vulnerability has been found in wren-lang wren up to 0.4.0. This impacts the function printError … | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-64jv-v62f-2xrg |
4.3 (3.1)
|
In Splunk Enterprise versions below 10.0.2, 10.0.3, 9.4.8, and 9.3.9, a low-privileged user who doe… | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-5qf3-3gp9-pjx6 |
|
In the Linux kernel, the following vulnerability has been resolved: crypto: omap - Allocate OMAP_C… | 2026-02-18T18:30:40Z | 2026-02-19T18:31:44Z |
| ghsa-5q5x-wqxc-vv25 |
9.8 (3.1)
|
CodeAstro Membership Management System 1.0 contains a missing authentication vulnerability in delet… | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-5pqm-c33h-22jc |
9.1 (3.1)
|
Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Onl… | 2026-02-18T18:30:40Z | 2026-02-18T21:31:22Z |
| ghsa-5jgq-pv8m-5cx7 |
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: add chann_lock to prote… | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-55vh-w3p8-qq9g |
9.4 (3.1)
|
SourceCodester Customer Support System 1.0 contains an incorrect access control vulnerability in aj… | 2026-02-18T18:30:40Z | 2026-02-18T21:31:22Z |
| ghsa-4vmx-r9fj-4cm5 |
4.3 (3.1)
|
In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.8, 9.3.9, and 9.2.12, and Splunk Cloud Plat… | 2026-02-18T18:30:40Z | 2026-02-19T21:30:44Z |
| ghsa-4v8p-q39m-4pj8 |
3.5 (3.1)
|
In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.5, 9.3.7, and 9.2.9, and Splunk Cloud Platf… | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-3w2g-4qx3-2mmw |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Free sp in erro… | 2026-02-18T18:30:40Z | 2026-02-19T18:31:43Z |
| ghsa-365g-rr2h-rx65 |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: rtl8xxxu: fix slab-out-o… | 2026-02-18T18:30:40Z | 2026-02-18T18:30:40Z |
| ghsa-xw73-fccw-fgc4 |
9.8 (3.1)
|
ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application pass… | 2026-02-18T18:30:39Z | 2026-02-18T18:30:39Z |
| ghsa-w94g-pmcx-r454 |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: Fix alignment fau… | 2026-02-18T18:30:39Z | 2026-02-18T18:30:39Z |
| ghsa-fqrv-m9rv-j33j |
9.8 (3.1)
|
UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default cr… | 2026-02-18T18:30:39Z | 2026-02-18T18:30:39Z |
| ghsa-f2fg-5m3g-hqwv |
6.5 (3.1)
|
mayswind ezbookkeeping versions 1.2.0 and earlier contain a critical vulnerability in JSON and XML … | 2026-02-18T18:30:39Z | 2026-02-18T18:30:39Z |
| ghsa-6xrx-3vj8-2rjc |
|
In the Linux kernel, the following vulnerability has been resolved: hfs: ensure sb->s_fs_info is a… | 2026-02-18T18:30:39Z | 2026-02-18T18:30:39Z |
| ghsa-5qq8-6gv4-wmcc |
9.5 (4.0)
|
Deserialization of Untrusted Data vulnerability in OpenText™ Directory Services allows Object Injec… | 2026-02-18T18:30:39Z | 2026-02-18T18:30:39Z |
| ghsa-97f8-7cmv-76j2 |
7.1 (4.0)
|
Picklescan (scan_pytorch) Bypass via dynamic eval MAGIC_NUMBER | 2026-02-18T17:45:52Z | 2026-02-18T17:45:52Z |
| ghsa-h9g4-589h-68xv |
7.1 (3.1)
|
OpenClaw has an authentication bypass in sandbox browser bridge server | 2026-02-18T17:45:31Z | 2026-02-18T17:45:31Z |
| ghsa-x22m-j5qq-j49m |
8.6 (3.1)
|
OpenClaw has two SSRF via sendMediaFeishu and markdown image fetching in Feishu extension | 2026-02-18T17:45:12Z | 2026-02-18T17:45:12Z |
| ghsa-rwj8-p9vq-25gv |
7.5 (3.1)
|
OpenClaw has a LFI in BlueBubbles media path handling | 2026-02-18T17:44:58Z | 2026-02-18T17:44:58Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-42999 |
|
** DISPUTED ** In the python-libnmap package through 0.7.2 for Python, remote command exe… | python-libnmap | 2022-05-04T22:15:00Z | 2023-05-04T04:29:28.652969Z |
| pysec-2022-183 |
|
Encode OSS httpx <=1.0.0.beta0 is affected by improper input validation in `httpx.URL`, `… | httpx | 2022-04-28T14:15:00Z | 2022-05-17T21:40:52.405453Z |
| pysec-2022-43150 |
7.5 (3.1)
|
Apache Doris, prior to 1.0.0, used a hardcoded key and IV to initialize the cipher used f… | pydoris | 2022-04-26T16:15:00+00:00 | 2022-05-06T13:40:00+00:00 |
| pysec-2022-193 |
|
flask-session-captcha is a package which allows users to extend Flask by adding an image … | flask-session-captcha | 2022-04-25T22:15:00Z | 2022-05-17T23:28:25.264091Z |
| pysec-2022-43167 |
8.8 (3.1)
|
Selenium Server (Grid) before 4 allows CSRF because it permits non-JSON content types suc… | selenium | 2022-04-19T03:15:00+00:00 | 2024-11-21T14:23:01.289420+00:00 |
| pysec-2022-194 |
|
PyPDF2 is an open source python PDF library capable of splitting, merging, cropping, and … | pypdf2 | 2022-04-18T19:15:00Z | 2022-05-17T23:28:27.580433Z |
| pysec-2022-43153 |
5.5 (3.1)
|
Wasm3 0.5.0 has a heap-based buffer overflow in NewCodePage in m3_code.c (called indirect… | pywasm3 | 2022-04-16T16:15:00Z | 2024-11-21T14:23:00.113164Z |
| pysec-2022-192 |
|
django-mfa3 is a library that implements multi factor authentication for the django web f… | django-mfa3 | 2022-04-15T19:15:00Z | 2022-05-17T23:28:24.608119Z |
| pysec-2022-198 |
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In affected… | vyper | 2022-04-13T22:15:00Z | 2022-05-17T23:28:35.566517Z |
| pysec-2022-197 |
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Versions of… | vyper | 2022-04-13T19:15:00Z | 2022-05-17T23:28:35.533012Z |
| pysec-2022-188 |
|
Apache Superset before 1.4.2 is vulnerable to SQL injection in chart data requests. Users… | apache-superset | 2022-04-13T19:15:00Z | 2022-05-17T23:28:23.962872Z |
| pysec-2022-191 |
|
A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3… | django | 2022-04-12T05:15:00Z | 2022-05-17T23:28:24.874544Z |
| pysec-2022-190 |
|
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.… | django | 2022-04-12T05:15:00Z | 2022-05-17T23:28:24.739985Z |
| pysec-2022-196 |
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. In version … | vyper | 2022-04-04T18:15:00Z | 2022-05-17T23:28:35.497395Z |
| pysec-2022-195 |
|
Twisted is an event-based framework for internet applications, supporting Python 3.6+. Pr… | twisted | 2022-04-04T18:15:00Z | 2022-05-17T23:28:35.399117Z |
| pysec-2022-189 |
|
A Python format string issue leading to information disclosure and potentially remote cod… | consoleme | 2022-04-01T23:15:00Z | 2022-05-17T23:28:24.480886Z |
| pysec-2022-180 |
|
The Jupyter notebook is a web-based notebook environment for interactive computing. Prior… | notebook | 2022-03-31T23:15:00Z | 2022-04-11T00:47:31.258157Z |
| pysec-2022-178 |
|
Internet Routing Registry daemon version 4 is an IRR database server, processing IRR obje… | irrd | 2022-03-31T23:15:00Z | 2022-04-11T00:47:25.619560Z |
| pysec-2022-176 |
|
Apache DolphinScheduler user registration is vulnerable to Regular express Denial of Serv… | apache-dolphinscheduler | 2022-03-30T10:15:00Z | 2022-04-11T00:47:23.902690Z |
| pysec-2022-174 |
|
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When… | salt | 2022-03-29T17:15:00Z | 2022-03-29T18:37:44.070893Z |
| pysec-2022-173 |
|
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Job … | salt | 2022-03-29T17:15:00Z | 2022-03-29T18:37:44.021549Z |
| pysec-2022-172 |
|
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. A mi… | salt | 2022-03-29T17:15:00Z | 2022-03-29T18:37:43.967592Z |
| pysec-2022-171 |
|
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Salt… | salt | 2022-03-29T17:15:00Z | 2022-03-29T18:37:43.897944Z |
| pysec-2022-168 |
|
Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathname… | pillow | 2022-03-28T02:15:00Z | 2022-03-28T05:28:10.602682Z |
| pysec-2022-43141 |
7.5 (3.1)
|
MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET re… | motioneye | 2022-03-24T17:15:00+00:00 | 2024-11-21T14:22:55.422153+00:00 |
| pysec-2022-175 |
|
Insecure Temporary File in GitHub repository horovod/horovod prior to 0.24.0. | horovod | 2022-03-24T09:15:00Z | 2022-03-31T20:31:44.168006Z |
| pysec-2022-179 |
|
The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints… | jupyter-server | 2022-03-23T21:15:00Z | 2022-04-11T00:47:25.682046Z |
| pysec-2022-234 |
|
Poetry v1.1.9 and below was discovered to contain an untrusted search path which causes t… | poetry | 2022-03-21T22:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-170 |
|
mitmproxy is an interactive, SSL/TLS-capable intercepting proxy. In mitmproxy 7.0.4 and b… | mitmproxy | 2022-03-21T19:15:00Z | 2022-03-29T18:37:43.309818Z |
| pysec-2022-166 |
|
In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_pri… | paramiko | 2022-03-17T22:15:00Z | 2022-05-17T03:06:38.700744Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-491 | Malicious code in test-on-other-again (npm) | 2026-01-23T12:02:07Z | 2026-01-23T18:48:56Z |
| MAL-2026-491 | Malicious code in test-on-other-again (npm) | 2026-01-23T12:02:07Z | 2026-01-23T18:48:56Z |
| mal-2026-490 | Malicious code in tabletes (PyPI) | 2026-01-23T10:19:25Z | 2026-01-28T19:13:29Z |
| MAL-2026-490 | Malicious code in tabletes (PyPI) | 2026-01-23T10:19:25Z | 2026-01-28T19:13:29Z |
| mal-2026-489 | Malicious code in rank4222wun (npm) | 2026-01-23T08:25:42Z | 2026-01-28T06:49:15Z |
| MAL-2026-489 | Malicious code in rank4222wun (npm) | 2026-01-23T08:25:42Z | 2026-01-28T06:49:15Z |
| mal-2026-488 | Malicious code in ntwsx (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:55Z |
| mal-2026-487 | Malicious code in ntwsc (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:55Z |
| mal-2026-486 | Malicious code in a5xm (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:54Z |
| MAL-2026-488 | Malicious code in ntwsx (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:55Z |
| MAL-2026-487 | Malicious code in ntwsc (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:55Z |
| MAL-2026-486 | Malicious code in a5xm (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:54Z |
| mal-2026-485 | Malicious code in a4wu (npm) | 2026-01-23T06:32:36Z | 2026-01-23T18:48:54Z |
| MAL-2026-485 | Malicious code in a4wu (npm) | 2026-01-23T06:32:36Z | 2026-01-23T18:48:54Z |
| mal-2026-484 | Malicious code in translation-note (npm) | 2026-01-23T01:13:12Z | 2026-01-28T08:26:42Z |
| mal-2026-483 | Malicious code in public-site-cms-ui (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-482 | Malicious code in public-site-boostmoney-ui (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-481 | Malicious code in oasis-os-provider-messaging (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-480 | Malicious code in kwp-shared-components-production-system (npm) | 2026-01-23T01:13:12Z | 2026-01-27T08:27:32Z |
| mal-2026-479 | Malicious code in integromat-ui (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-478 | Malicious code in domino-elements (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-477 | Malicious code in bttr-devs (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-476 | Malicious code in @transaction-list/transaction-list-xs (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-475 | Malicious code in @transaction-list/transaction-list-sm (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-474 | Malicious code in @transaction-list/transaction-list-md (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-473 | Malicious code in @transaction-list/transaction-list-lg (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-472 | Malicious code in @landing-platform/data-bridge (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-471 | Malicious code in @acqui-calm-library/acqui-hero-carousel-section (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| MAL-2026-484 | Malicious code in translation-note (npm) | 2026-01-23T01:13:12Z | 2026-01-28T08:26:42Z |
| MAL-2026-483 | Malicious code in public-site-cms-ui (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1057 | PaloAlto Networks Prisma Cloud Compute Edition: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1056 | IBM Semeru Runtime: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-05-14T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1055 | Node.js: Mehrere Schwachstellen | 2025-05-14T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1054 | SonicWall SMA: Schwachstelle ermöglicht Manipulation | 2025-05-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1053 | Progress Software Sitefinity: Schwachstelle ermöglicht Denial of Service | 2025-05-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1052 | Jenkins Plugins: Mehrere Schwachstellen | 2025-05-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1051 | IBM WebSphere Application Server: Schwachstelle ermöglicht Cross-Site Scripting | 2025-05-14T22:00:00.000+00:00 | 2025-05-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1050 | Microsoft Windows Server: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-05-13T22:00:00.000+00:00 | 2025-06-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1049 | Intel PROSet Wireless WiFi Software: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1048 | Microsoft Defender: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1047 | Red Hat Enterprise Linux (exiv2): Schwachstelle ermöglicht Codeausführung | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1046 | Adobe Creative Cloud Applikationen: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1045 | Adobe Dreamweaver: Schwachstelle ermöglicht Codeausführung | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1044 | Adobe Connect: Mehrere Schwachstellen ermöglichen Cross-Site Scripting und Rechteerweiterung | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1043 | sudo-rs: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1042 | Adobe ColdFusion: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1041 | Red Hat Enterprise Linux (corosync): Schwachstelle ermöglicht Codeausführung | 2025-05-13T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1040 | Red Hat Enterprise Linux (perl-Module-ScanDeps): Schwachstelle ermöglicht Privilegieneskalation | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1039 | Adobe Photoshop: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1038 | Insyde UEFI Firmware: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-05-13T22:00:00.000+00:00 | 2025-05-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1037 | Ivanti Neurons for MDM: Schwachstelle ermöglicht Manipulation von Dateien | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1036 | Red Hat Enterprise Linux (Aardvark-dns): Schwachstelle ermöglicht Denial of Service | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1035 | Xerox FreeFlow Print Server: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1034 | screen: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1033 | Ivanti Endpoint Manager Mobile: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1032 | Ivanti Cloud Services Application: Schwachstelle ermöglicht Privilegieneskalation | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1031 | Intel Server Board D50DNP und M50FCP: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1030 | Intel Prozessoren: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-06-19T22:00:00.000+00:00 |
| wid-sec-w-2025-1029 | Intel Graphics Driver: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1028 | Intel Ethernet Controller (Network Adapter und Connections Boot): Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-05-13T22:00:00.000+00:00 | 2025-05-15T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:23342 | Red Hat Security Advisory: python3.9 security update | 2025-12-18T13:21:05+00:00 | 2026-02-04T19:40:15+00:00 |
| rhsa-2025:23343 | Red Hat Security Advisory: binutils security update | 2025-12-18T13:20:28+00:00 | 2026-02-12T13:26:47+00:00 |
| rhsa-2025:23325 | Red Hat Security Advisory: podman security update | 2025-12-18T13:20:27+00:00 | 2026-02-22T13:34:13+00:00 |
| rhsa-2025:23309 | Red Hat Security Advisory: php:8.3 security update | 2025-12-18T13:20:27+00:00 | 2026-02-11T01:03:30+00:00 |
| rhsa-2025:23323 | Red Hat Security Advisory: python3.12 security update | 2025-12-18T13:19:52+00:00 | 2026-02-03T20:56:45+00:00 |
| rhsa-2025:23400 | Red Hat Security Advisory: binutils security update | 2025-12-18T13:18:49+00:00 | 2026-02-12T13:26:49+00:00 |
| rhsa-2025:23336 | Red Hat Security Advisory: gcc-toolset-13-binutils security update | 2025-12-18T13:18:49+00:00 | 2026-02-12T13:26:49+00:00 |
| rhsa-2025:23326 | Red Hat Security Advisory: skopeo security update | 2025-12-18T13:18:48+00:00 | 2026-02-22T13:34:14+00:00 |
| rhsa-2025:23394 | Red Hat Security Advisory: skopeo security update | 2025-12-18T13:16:28+00:00 | 2026-02-22T13:34:17+00:00 |
| rhsa-2025:23374 | Red Hat Security Advisory: container-tools:rhel8 security update | 2025-12-18T13:15:55+00:00 | 2026-02-22T13:34:16+00:00 |
| rhsa-2025:23382 | Red Hat Security Advisory: binutils security update | 2025-12-18T13:15:25+00:00 | 2026-02-12T13:26:46+00:00 |
| rhsa-2025:23383 | Red Hat Security Advisory: curl security update | 2025-12-18T13:14:50+00:00 | 2026-02-11T14:40:57+00:00 |
| rhsa-2025:23359 | Red Hat Security Advisory: binutils security update | 2025-12-18T12:02:01+00:00 | 2026-02-12T13:26:49+00:00 |
| rhsa-2025:23644 | Red Hat Security Advisory: Red Hat multicluster global hub 1.4.3 security update | 2025-12-18T10:46:11+00:00 | 2026-02-18T08:48:17+00:00 |
| rhsa-2025:23306 | Red Hat Security Advisory: binutils security update | 2025-12-18T10:23:33+00:00 | 2026-02-12T13:26:48+00:00 |
| rhsa-2025:23628 | Red Hat Security Advisory: keylime security update | 2025-12-18T10:20:07+00:00 | 2025-12-22T20:41:22+00:00 |
| rhsa-2025:23295 | Red Hat Security Advisory: podman security update | 2025-12-18T10:17:02+00:00 | 2026-02-22T13:34:10+00:00 |
| rhsa-2025:23294 | Red Hat Security Advisory: skopeo security update | 2025-12-18T10:13:42+00:00 | 2026-02-22T13:34:09+00:00 |
| rhsa-2025:23405 | Red Hat Security Advisory: binutils security update | 2025-12-18T10:12:37+00:00 | 2026-02-12T13:26:47+00:00 |
| rhsa-2025:23347 | Red Hat Security Advisory: podman security update | 2025-12-18T10:09:41+00:00 | 2026-02-22T13:34:14+00:00 |
| rhsa-2025:23348 | Red Hat Security Advisory: skopeo security update | 2025-12-18T10:08:06+00:00 | 2026-02-22T13:34:15+00:00 |
| rhsa-2025:23583 | Red Hat Security Advisory: webkitgtk4 security update | 2025-12-18T09:30:34+00:00 | 2026-02-06T20:10:29+00:00 |
| rhsa-2025:23591 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-12-18T09:21:56+00:00 | 2026-02-06T20:10:29+00:00 |
| rhsa-2025:23457 | Red Hat Security Advisory: audiofile security update | 2025-12-18T08:05:51+00:00 | 2025-12-18T11:16:27+00:00 |
| rhsa-2025:23483 | Red Hat Security Advisory: libssh security update | 2025-12-18T08:04:21+00:00 | 2026-02-05T19:39:03+00:00 |
| rhsa-2025:23543 | Red Hat Security Advisory: container-tools:rhel8 security update | 2025-12-18T04:34:31+00:00 | 2026-02-22T13:34:25+00:00 |
| rhsa-2025:23530 | Red Hat Security Advisory: python39:3.9 security update | 2025-12-18T01:35:54+00:00 | 2026-02-04T19:40:31+00:00 |
| rhsa-2025:23550 | Red Hat Security Advisory: RHSA 4.8.7 security and bug fix update | 2025-12-17T20:50:30+00:00 | 2026-02-05T19:47:49+00:00 |
| rhsa-2025:23484 | Red Hat Security Advisory: libssh security update | 2025-12-17T18:40:13+00:00 | 2026-02-05T19:39:01+00:00 |
| rhsa-2025:23546 | Red Hat Security Advisory: Red Hat Quay 3.16.0 | 2025-12-17T18:13:48+00:00 | 2026-02-22T13:34:23+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-102-01 | Siemens SIMATIC S7-1500 | 2024-04-09T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-24-095-02 | Schweitzer Engineering Laboratories SEL 700 series relays | 2024-04-04T06:00:00.000000Z | 2024-04-04T06:00:00.000000Z |
| icsa-24-095-01 | Hitachi Energy Asset Suite 9 | 2024-04-04T06:00:00.000000Z | 2024-04-04T06:00:00.000000Z |
| icsa-24-093-01 | IOSIX IO-1020 Micro ELD | 2024-04-02T06:00:00.000000Z | 2024-04-02T06:00:00.000000Z |
| icsa-24-116-02 | Hitachi Energy MACH SCM (Update A) | 2024-03-26T11:32:43.000000Z | 2025-09-30T11:32:43.000000Z |
| icsa-24-086-04 | Rockwell Automation FactoryTalk View ME | 2024-03-26T06:00:00.000000Z | 2024-03-26T06:00:00.000000Z |
| icsa-24-086-03 | Rockwell Automation Arena Simulation | 2024-03-26T06:00:00.000000Z | 2024-03-26T06:00:00.000000Z |
| icsa-24-086-02 | Rockwell Automation PowerFlex 527 | 2024-03-26T06:00:00.000000Z | 2024-03-26T06:00:00.000000Z |
| icsa-24-086-01 | AutomationDirect C-MORE EA9 HMI | 2024-03-26T06:00:00.000000Z | 2024-03-26T06:00:00.000000Z |
| icsa-24-081-01 | Advantech WebAccess/SCADA | 2024-03-21T06:00:00.000000Z | 2024-03-21T06:00:00.000000Z |
| icsa-24-079-01 | Franklin Fueling System EVO 550/5000 | 2024-03-19T06:00:00.000000Z | 2024-03-19T06:00:00.000000Z |
| icsa-24-074-14 | Mitsubishi Electric MELSEC-Q/L Series (Update B) | 2024-03-14T06:00:00.000000Z | 2024-06-13T06:00:00.000000Z |
| icsa-24-074-13 | Softing edgeConnector | 2024-03-14T06:00:00.000000Z | 2024-03-14T06:00:00.000000Z |
| icsa-24-074-12 | Delta Electronics DIAEnergie | 2024-03-14T06:00:00.000000Z | 2024-03-14T06:00:00.000000Z |
| icsa-24-074-07 | Siemens SIMATIC | 2024-03-14T06:00:00.000000Z | 2024-03-14T06:00:00.000000Z |
| icsa-24-072-01 | Schneider Electric EcoStruxure Power Design | 2024-03-12T06:00:00.000000Z | 2024-03-12T06:00:00.000000Z |
| icsa-24-074-11 | Siemens RUGGEDCOM APE1808 with Fortigate NGFW Devices | 2024-03-12T00:00:00.000000Z | 2026-01-14T22:00:10.660779Z |
| icsa-24-074-10 | Siemens Siveillance Control | 2024-03-12T00:00:00.000000Z | 2024-03-12T00:00:00.000000Z |
| icsa-24-074-09 | Siemens Sinteso EN Cerberus PRO EN Fire Protection Systems | 2024-03-12T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-074-08 | Siemens SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-074-06 | Siemens SENTRON | 2024-03-12T00:00:00.000000Z | 2024-03-12T00:00:00.000000Z |
| icsa-24-074-05 | Siemens RUGGEDCOM APE1808 | 2024-03-12T00:00:00.000000Z | 2026-01-14T22:00:12.208787Z |
| icsa-24-074-04 | Siemens SINEMA Remote Connect Client | 2024-03-12T00:00:00.000000Z | 2024-03-12T00:00:00.000000Z |
| icsa-24-074-03 | Siemens SINEMA Remote Connect Server | 2024-03-12T00:00:00.000000Z | 2024-03-12T00:00:00.000000Z |
| icsa-24-074-02 | Siemens Solid Edge | 2024-03-12T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-074-01 | Siemens SENTRON 7KM PAC3x20 | 2024-03-12T00:00:00.000000Z | 2024-09-10T00:00:00.000000Z |
| icsa-24-067-01 | Chirp Systems Chirp Access (Update C) | 2024-03-07T07:00:00.000000Z | 2024-05-02T06:00:00.000000Z |
| icsma-24-065-01 | Santesoft Sante FFT Imaging | 2024-03-05T07:00:00.000000Z | 2024-03-05T07:00:00.000000Z |
| icsa-24-065-01 | Nice Linear eMerge E3-Series | 2024-03-05T07:00:00.000000Z | 2024-03-05T07:00:00.000000Z |
| icsma-24-060-01 | MicroDicom DICOM Viewer | 2024-02-29T07:00:00.000000Z | 2024-02-29T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-nxos-ngoam-dos-ltdb9hv | Cisco NX-OS Software VXLAN OAM (NGOAM) Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-nxos-mpls-oam-dos-sgo9x5gm | Cisco NX-OS Software MPLS OAM Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2022-09-02T17:41:51+00:00 |
| cisco-sa-nxos-login-blockfor-rwjgvecu | Cisco NX-OS Software system login block-for Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-nexus-acl-vrvqypve | Cisco Nexus 9500 Series Switches Access Control List Bypass Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-naci-mdvul-vrkvgnu | Cisco Nexus 9000 Series Fabric Switches ACI Mode Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-naci-afr-utjfo2d7 | Cisco Nexus 9000 Series Fabric Switches ACI Mode Arbitrary File Read Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-n9kaci-tcp-dos-yxukt6gm | Cisco Nexus 9000 Series Fabric Switches ACI Mode Multi-Pod and Multi-Site TCP Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2022-02-23T15:56:25+00:00 |
| cisco-sa-n9kaci-queue-wedge-clddefkf | Cisco Nexus 9000 Series Fabric Switches ACI Mode Queue Wedge Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-capic-scss-bft75yrm | Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-capic-pesc-pkmgk4j | Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-capic-mdvul-hbsjbuvw | Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities | 2021-08-25T16:00:00+00:00 | 2022-03-08T16:52:49+00:00 |
| cisco-sa-capic-frw-nt3ryxr2 | Cisco Application Policy Infrastructure Controller Arbitrary File Read and Write Vulnerability | 2021-08-25T16:00:00+00:00 | 2022-03-08T16:52:47+00:00 |
| cisco-sa-capic-chvul-ckfgybh8 | Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2022-06-07T17:29:33+00:00 |
| cisco-sa-sni-data-exfil-mfgzxqln | Multiple Cisco Products Server Name Identification Data Exfiltration Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-09-27T16:31:35+00:00 |
| cisco-sa-sma-spam-jpxuxmk | Cisco Secure Email and Web Manager Spam Quarantine Unauthorized Access Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-qnx-toxjvpdl | BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021 | 2021-08-18T16:00:00+00:00 | 2021-08-25T14:44:04+00:00 |
| cisco-sa-ipcamera-lldp-dos-ofp7j9j | Cisco Video Surveillance 7000 Series IP Cameras Link Layer Discovery Protocol Double-Free Denial of Service Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ewver-c6wzpxrx | Cisco Expressway Series and TelePresence Video Communication Server Image Verification Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ewrce-qpynncjh | Cisco Expressway Series and TelePresence Video Communication Server Remote Code Execution Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-cisco-sb-rv-overflow-htpymmb5 | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-rv340-cmdinj-rcedos-py8j3qfy | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Web Management Vulnerabilities | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-rv-code-execution-9uvjr7k4 | Cisco Small Business RV160 and RV260 Series VPN Routers Remote Command Execution Vulnerability | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-packettracer-dll-inj-qv8mk5jx | Cisco Packet Tracer for Windows DLL Injection Vulnerability | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-nso-priv-esc-xxqrttft | Cisco Network Services Orchestrator CLI Secure Shell Server Privilege Escalation Vulnerability | 2021-08-04T16:00:00+00:00 | 2023-10-25T16:01:08+00:00 |
| cisco-sa-epnm-info-disc-pjtz5r6c | Cisco Evolved Programmable Network Manager Sensitive Information Disclosure Vulnerability | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-confd-priv-esc-lsgtcrx4 | ConfD CLI Secure Shell Server Privilege Escalation Vulnerability | 2021-08-04T16:00:00+00:00 | 2023-10-04T16:00:12+00:00 |
| cisco-sa-cmx-gkcvfd4 | Cisco Connected Mobile Experiences Strong Authentication Requirements Enforcement Bypass | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-ucsi2-iptaclbp-l8dzs8m8 | Cisco Intersight Virtual Appliance IPv4 and IPv6 Forwarding Vulnerabilities | 2021-07-21T16:00:00+00:00 | 2021-07-21T16:00:00+00:00 |
| cisco-sa-ucsi2-dtcinj-yh5u4rsx | Cisco Intersight Virtual Appliance Vulnerabilities | 2021-07-21T16:00:00+00:00 | 2021-07-21T16:00:00+00:00 |
| cisco-sa-sdwan-vmanage-infdis-lggop9se | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2021-07-21T16:00:00+00:00 | 2021-07-21T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-58737 | Remote Desktop Protocol Remote Code Execution Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58736 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58735 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58734 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58733 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58732 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58731 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58730 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58729 | Windows Local Session Manager (LSM) Denial of Service Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58728 | Windows Bluetooth Service Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58727 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58726 | Windows SMB Server Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58725 | Windows COM+ Event System Service Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58724 | Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-15T00:00:00.000Z |
| msrc_cve-2025-58722 | Microsoft DWM Core Library Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58720 | Windows Cryptographic Services Information Disclosure Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58719 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58718 | Remote Desktop Client Remote Code Execution Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58717 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58716 | Windows Speech Runtime Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58715 | Windows Speech Runtime Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-58714 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-55701 | Windows Authentication Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-55700 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-55699 | Windows Kernel Information Disclosure Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-55698 | DirectX Graphics Kernel Denial of Service Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-55697 | Azure Local Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-55696 | NtQueryInformation Token function (ntifs.h) Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-55695 | Windows WLAN AutoConfig Service Information Disclosure Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| msrc_cve-2025-55694 | Windows Error Reporting Service Elevation of Privilege Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-14T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-462 | Heap-buffer-overflow in IEC104Stats::processPacket | 2023-06-07T14:02:18.785565Z | 2023-06-07T14:02:18.785836Z |
| osv-2023-460 | Segv on unknown address in config__bridge_cleanup | 2023-06-06T14:00:25.983874Z | 2024-04-29T14:12:09.500082Z |
| osv-2023-458 | Invalid-free in hb_free_impl | 2023-06-05T14:01:54.285948Z | 2023-06-05T14:01:54.286189Z |
| osv-2023-455 | Heap-buffer-overflow in bit_TV_to_utf8 | 2023-06-05T14:00:16.339269Z | 2023-08-05T14:19:01.096560Z |
| osv-2023-453 | UNKNOWN READ in ih264e_cabac_put_byte | 2023-06-04T14:00:11.680354Z | 2023-09-14T14:09:18.630220Z |
| osv-2023-452 | Heap-buffer-overflow in json_write_TF | 2023-06-03T14:02:13.459131Z | 2023-10-31T14:21:55.530747Z |
| osv-2023-451 | Heap-buffer-overflow in BundlePacket | 2023-06-02T14:02:19.303950Z | 2023-06-22T14:25:02.611556Z |
| osv-2023-445 | Heap-buffer-overflow in LossyDctDecoder_execute | 2023-06-01T14:00:09.278335Z | 2023-06-01T14:00:09.278588Z |
| osv-2023-444 | Heap-buffer-overflow in opj_jp2_apply_pclr | 2023-05-31T14:02:00.753503Z | 2025-12-31T14:18:46.286556Z |
| osv-2023-443 | Use-after-poison in file_is_simh | 2023-05-31T14:00:37.979797Z | 2023-05-31T14:00:37.980057Z |
| osv-2023-440 | Heap-double-free in dwg_free_object | 2023-05-30T14:01:20.251610Z | 2023-09-19T14:20:36.212389Z |
| osv-2023-437 | Heap-buffer-overflow in internal_huf_decompress | 2023-05-29T14:00:22.989224Z | 2023-05-29T14:00:22.989493Z |
| osv-2023-436 | Heap-buffer-overflow in ndpi_check_punycode_string | 2023-05-29T14:00:17.226789Z | 2023-05-29T14:00:17.227055Z |
| osv-2022-1275 | Security exception in java.desktop/java.awt.image.DataBufferInt.<init> | 2023-05-28T14:00:35.487433Z | 2024-08-27T14:11:30.518706Z |
| osv-2023-430 | Heap-buffer-overflow in H5MM_xstrdup | 2023-05-26T14:00:26.078002Z | 2026-02-21T14:59:46.714683Z |
| osv-2023-426 | Heap-buffer-overflow in libdeflate_zlib_decompress_ex | 2023-05-25T14:00:33.323239Z | 2023-05-25T14:00:33.323513Z |
| osv-2023-425 | Heap-buffer-overflow in ICMPinfo::dissectICMP | 2023-05-23T14:01:00.402025Z | 2023-05-23T14:01:00.402221Z |
| osv-2023-423 | Heap-buffer-overflow in NetworkInterface::dissectPacket | 2023-05-23T14:00:31.211803Z | 2023-05-23T14:00:31.212007Z |
| osv-2023-422 | Heap-use-after-free in wmem_memdup | 2023-05-22T14:01:21.886121Z | 2023-05-22T14:01:21.886307Z |
| osv-2023-421 | Global-buffer-overflow in hf_adjustment | 2023-05-22T14:01:06.910126Z | 2023-05-22T14:01:06.910307Z |
| osv-2023-420 | Heap-use-after-free in fragment_addresses_equal | 2023-05-22T14:00:41.156918Z | 2023-05-22T14:00:41.157099Z |
| osv-2023-418 | Heap-buffer-overflow in bfd_getl32 | 2023-05-21T14:02:30.263252Z | 2023-05-21T14:02:30.263496Z |
| osv-2023-416 | UNKNOWN READ in dxf_fixup_string | 2023-05-20T14:01:12.859492Z | 2023-06-11T14:21:08.017435Z |
| osv-2023-415 | UNKNOWN READ in dxf_fixup_string | 2023-05-20T14:01:02.465780Z | 2023-06-11T14:15:45.072848Z |
| osv-2023-412 | UNKNOWN READ in dxf_fixup_string | 2023-05-20T14:00:35.493084Z | 2023-06-11T14:14:00.715264Z |
| osv-2023-409 | Heap-use-after-free in zval_call_destructor | 2023-05-19T14:02:26.026882Z | 2023-05-19T14:02:26.027150Z |
| osv-2023-408 | Security exception in org.apache.lucene.util.ArrayUtil.growExact | 2023-05-19T14:02:24.308895Z | 2023-05-19T14:02:24.309176Z |
| osv-2023-407 | Stack-buffer-overflow in DwaCompressor_readChannelRules | 2023-05-19T14:02:24.198097Z | 2023-05-19T14:02:24.198372Z |
| osv-2023-405 | Heap-buffer-overflow in _lou_stringHash | 2023-05-19T14:00:18.190498Z | 2024-08-31T14:18:34.306703Z |
| osv-2023-404 | Invalid-free in Assimp::FBX::Scope::Scope | 2023-05-19T14:00:12.710256Z | 2023-05-19T14:00:12.710610Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-pgpool-2025-22248 | 2025-05-13T07:30:00.000Z | 2025-05-13T07:30:00.000Z | |
| bit-gitlab-2025-1278 | Insufficient Granularity of Access Control in GitLab | 2025-05-13T06:11:59.150Z | 2025-08-11T00:06:06.142Z |
| bit-gitlab-2025-0549 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2025-05-13T06:11:47.084Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-8973 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-05-13T06:11:22.852Z | 2025-08-11T00:06:06.142Z |
| bit-postgresql-2025-4207 | PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation | 2025-05-10T08:51:38.412Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2025-46821 | Envoy vulnerable to bypass of RBAC uri_template permission | 2025-05-09T05:41:53.497Z | 2025-09-04T09:06:08.228Z |
| bit-mastodon-2023-49952 | 2025-05-08T05:43:30.042Z | 2025-05-08T06:11:50.963Z | |
| bit-logstash-2025-37730 | Logstash Improper Certificate Validation in TCP output | 2025-05-08T05:42:10.346Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2025-25014 | Kibana arbitrary code execution via prototype pollution | 2025-05-08T05:41:37.442Z | 2025-10-03T09:07:39.166Z |
| bit-elk-2025-25014 | Kibana arbitrary code execution via prototype pollution | 2025-05-08T05:37:10.649Z | 2025-10-03T09:07:39.166Z |
| bit-vault-2025-4166 | Vault May Include Sensitive Data in Error Logs When Using the KV v2 Plugin | 2025-05-07T05:56:55.608Z | 2025-08-13T06:08:53.695Z |
| bit-vault-2025-3879 | Vault’s Azure Authentication Method bound_location Restriction Could be Bypassed on Login | 2025-05-07T05:56:52.014Z | 2025-08-13T06:08:53.695Z |
| bit-mastodon-2024-34535 | 2025-05-07T05:43:55.990Z | 2025-05-07T06:11:12.279Z | |
| bit-kibana-2025-25016 | Kibana Unrestricted Upload of File | 2025-05-03T05:46:27.247Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2024-11390 | Kibana Unrestricted Upload of File with Dangerous Type Can Lead to XSS | 2025-05-03T05:44:59.249Z | 2025-05-20T10:02:07.006Z |
| bit-elasticsearch-2024-52979 | Elasticsearch Uncontrolled Resource Consumption vulnerability | 2025-05-03T05:41:02.354Z | 2025-10-03T09:07:39.166Z |
| bit-elk-2025-25016 | Kibana Unrestricted Upload of File | 2025-05-03T05:39:08.441Z | 2025-05-20T10:02:07.006Z |
| bit-elk-2024-11390 | Kibana Unrestricted Upload of File with Dangerous Type Can Lead to XSS | 2025-05-03T05:37:15.652Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2025-32376 | Discourse DM limits aren’t always properly enforced | 2025-05-02T11:13:20.595Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43440 | Moodle: lfi vulnerability when restoring malformed block backups | 2025-05-02T06:19:00.410Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43435 | Moodle: can create global glossary without being admin | 2025-05-02T06:18:56.485Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43434 | Moodle: csrf risk in feedback non-respondents report | 2025-05-02T06:18:55.145Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43433 | Moodle: matrix user/power level management not always working as expected with suspended users | 2025-05-02T06:18:53.795Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43432 | Moodle: authorization headers preserved between "emulated redirects" | 2025-05-02T06:18:52.499Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43431 | Moodle: idor in badges allows deletion of arbitrary badges | 2025-05-02T06:18:51.186Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43430 | Moodle: lack of access control when using external methods for quiz overrides | 2025-05-02T06:18:49.899Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43429 | Moodle: user information visibility control issues in gradebook reports | 2025-05-02T06:18:48.592Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43428 | Moodle: cache poisoning via injection into storage | 2025-05-02T06:18:47.252Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43427 | Moodle: admin presets export tool includes some secrets that should not be exported | 2025-05-02T06:18:45.967Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-43425 | Moodle: remote code execution via calculated question types | 2025-05-02T06:18:44.557Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-200505-0354 | Buffer overflow in the Foundation framework for Mac OS X 10.3.9 allows local users to exe… | 2024-07-23T20:17:16.312000Z |
| var-201206-0054 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T20:17:15.929000Z |
| var-200901-0726 | Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.0, iPhone OS 1.0… | 2024-07-23T20:17:14.213000Z |
| var-200904-0800 | The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before… | 2024-07-23T20:17:13.895000Z |
| var-201809-0686 | curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication c… | 2024-07-23T20:17:09.201000Z |
| var-201705-3873 | In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 me… | 2024-07-23T20:17:09.711000Z |
| var-201006-1234 | Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X… | 2024-07-23T20:17:09.441000Z |
| var-201903-0442 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:17:08.574000Z |
| var-200811-0321 | The plug-in interface in WebKit in Apple Safari before 3.2 does not prevent plug-ins from… | 2024-07-23T20:17:08.920000Z |
| var-202004-0345 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T20:17:07.679000Z |
| var-202109-1966 | There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a mal… | 2024-07-23T20:16:30.843000Z |
| var-200701-0341 | The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428… | 2024-07-23T20:16:29.180000Z |
| var-201904-1411 | A cross-origin issue existed with "iframe" elements. This was addressed with improved tra… | 2024-07-23T20:16:28.429000Z |
| var-201912-0532 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed … | 2024-07-23T20:16:27.834000Z |
| var-201805-0967 | Systems with microprocessors utilizing speculative execution and that perform speculative… | 2024-07-23T20:16:27.316000Z |
| var-201409-1147 | The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remot… | 2024-07-23T20:16:26.490000Z |
| var-201403-0275 | sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd… | 2024-07-23T20:15:55.666000Z |
| var-202112-1782 | Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not pro… | 2024-07-23T20:15:54.690000Z |
| var-200505-0350 | The AppleScript Editor in Mac OS X 10.3.9 does not properly display script code for an ap… | 2024-07-23T20:15:49.782000Z |
| var-201707-0556 | Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whites… | 2024-07-23T20:15:16.169000Z |
| var-201806-1456 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. iOS befor… | 2024-07-23T20:15:15.076000Z |
| var-201011-0178 | The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and poss… | 2024-07-23T20:15:12.423000Z |
| var-200505-0351 | Bluetooth-enabled systems in Mac OS X 10.3.9 enables the Bluetooth file exchange service … | 2024-07-23T20:15:10.160000Z |
| var-200701-0518 | The CFUserNotificationSendRequest function in UserNotificationCenter.app in Apple Mac OS … | 2024-07-23T20:15:09.518000Z |
| var-202204-0432 | Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based … | 2024-07-23T20:15:05.279000Z |
| var-201912-0496 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:15:05.516000Z |
| var-200901-0714 | OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFi… | 2024-07-23T20:15:05.042000Z |
| var-200709-0495 | Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server bef… | 2024-07-23T20:15:05.431000Z |
| var-202210-1202 | Git is an open source, scalable, distributed revision control system. Versions prior to 2… | 2024-07-23T20:15:03.784000Z |
| var-201306-0256 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T20:15:01.919000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2021-000015 | FileZen vulnerable to OS command injection | 2021-02-16T15:07+09:00 | 2021-03-05T17:31+09:00 |
| jvndb-2021-000014 | Calsos CSDJ fails to restrict access permissions | 2021-02-15T15:52+09:00 | 2021-02-15T15:52+09:00 |
| jvndb-2021-000013 | Wekan vulnerable to cross-site scripting | 2021-02-10T14:01+09:00 | 2021-02-10T14:01+09:00 |
| jvndb-2021-001022 | Cross-site Scripting Vulnerability in Hitachi Application Server Help | 2021-02-09T15:08+09:00 | 2021-02-09T15:08+09:00 |
| jvndb-2021-001021 | Improper access control vulnerability in JP1/IT Desktop Management 2 - Manager and JP1/NETM/Asset Information Manager | 2021-02-09T15:08+09:00 | 2021-02-09T15:08+09:00 |
| jvndb-2021-000012 | WordPress Plugin "Name Directory" vulnerable to cross-site request forgery | 2021-02-05T16:24+09:00 | 2021-02-05T16:24+09:00 |
| jvndb-2021-001017 | Trend Micro HouseCall for Home Networks (Windows Edition) may insecurely load Dynamic Link Libraries | 2021-02-04T15:42+09:00 | 2021-02-04T15:42+09:00 |
| jvndb-2021-000011 | Panasonic Video Insight VMS vulnerable to arbitrary code execution | 2021-02-04T15:39+09:00 | 2021-02-04T15:39+09:00 |
| jvndb-2021-001014 | Vulnerability in JP1/VERITAS | 2021-02-01T16:49+09:00 | 2021-02-01T16:49+09:00 |
| jvndb-2021-000007 | OS command injection vulnerability in multiple Infoscience Corporation log management tools | 2021-01-27T18:31+09:00 | 2022-07-26T15:53+09:00 |
| jvndb-2021-000009 | Android App "ELECOM File Manager" vulnerable to directory traversal | 2021-01-27T17:38+09:00 | 2021-01-27T17:38+09:00 |
| jvndb-2021-000008 | Multiple vulnerabilities in multiple ELECOM products | 2021-01-26T16:33+09:00 | 2021-01-26T16:33+09:00 |
| jvndb-2021-000010 | Multiple vulnerabilities in multiple LOGITEC products | 2021-01-26T16:26+09:00 | 2021-01-26T16:26+09:00 |
| jvndb-2021-001010 | TP-Link TL-WR841N V13 (JP) vulnerable to OS command injection | 2021-01-25T16:21+09:00 | 2021-01-25T16:21+09:00 |
| jvndb-2021-000006 | Multiple vulnerabilities in Aterm WF800HP, Aterm WG2600HP, and Aterm WG2600HP2 | 2021-01-22T17:55+09:00 | 2021-02-03T12:05+09:00 |
| jvndb-2021-000005 | GROWI vulnerable to cross-site scripting | 2021-01-19T14:05+09:00 | 2021-01-19T14:05+09:00 |
| jvndb-2021-000004 | Multiple vulnerabilities in acmailer | 2021-01-14T16:22+09:00 | 2021-01-14T16:22+09:00 |
| jvndb-2021-000003 | The installer of SKYSEA Client View may insecurely load Dynamic Link Libraries | 2021-01-12T15:53+09:00 | 2021-01-12T15:53+09:00 |
| jvndb-2021-000002 | Multiple NEC Products vulnerable to authentication bypass | 2021-01-04T17:24+09:00 | 2021-01-08T12:22+09:00 |
| jvndb-2021-000001 | Multiple vulnerabilities in UNIVERGE SV9500/SV8500 series | 2021-01-04T14:37+09:00 | 2021-01-04T14:37+09:00 |
| jvndb-2020-009965 | Cleartext Transmission of Sensitive Information Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2020-12-21T17:48+09:00 | 2020-12-21T17:48+09:00 |
| jvndb-2020-009964 | Improper certificate validation vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2020-12-21T17:48+09:00 | 2020-12-21T17:48+09:00 |
| jvndb-2020-010072 | Cross-site Scripting Vulnerability in Hitachi Command Suite | 2020-12-21T14:20+09:00 | 2020-12-21T14:20+09:00 |
| jvndb-2020-000087 | Management software for NEC Storage disk array system vulnerable to improper server certificate verification | 2020-12-18T17:00+09:00 | 2021-07-21T16:21+09:00 |
| jvndb-2020-000086 | Self-Extracting files created by multiple SEIKO EPSON products may insecurely load Dynamic Link Libraries | 2020-12-18T16:47+09:00 | 2020-12-18T16:47+09:00 |
| jvndb-2020-000085 | Multiple vulnerabilities in GROWI | 2020-12-15T15:41+09:00 | 2021-08-30T16:29+09:00 |
| jvndb-2020-000083 | Multiple vulnerabilities in Aterm SA3500G | 2020-12-11T16:59+09:00 | 2020-12-11T16:59+09:00 |
| jvndb-2020-000084 | Apache Struts 2 vulnerable to remote code execution (S2-061) | 2020-12-11T15:09+09:00 | 2022-08-09T13:55+09:00 |
| jvndb-2020-000082 | FileZen vulnerable to directory traversal | 2020-12-10T15:21+09:00 | 2020-12-10T15:21+09:00 |
| jvndb-2020-009771 | ServerProtect for Linux vulnerable to heap-based buffer overflow | 2020-12-08T12:34+09:00 | 2020-12-08T12:34+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:3899-1 | Security update for colord | 2025-10-31T14:56:12Z | 2025-10-31T14:56:12Z |
| suse-su-2025:3897-1 | Security update for libssh | 2025-10-31T14:55:41Z | 2025-10-31T14:55:41Z |
| suse-su-2025:1771-1 | Security update for iputils | 2025-10-31T09:58:20Z | 2025-10-31T09:58:20Z |
| suse-su-2025:3892-1 | Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) | 2025-10-31T08:56:44Z | 2025-10-31T08:56:44Z |
| suse-su-2025:3888-1 | Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7) | 2025-10-31T07:04:06Z | 2025-10-31T07:04:06Z |
| suse-su-2025:3889-1 | Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP7) | 2025-10-31T06:34:00Z | 2025-10-31T06:34:00Z |
| suse-su-2025:3886-1 | Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP7) | 2025-10-31T06:05:31Z | 2025-10-31T06:05:31Z |
| suse-su-2025:3880-1 | Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6) | 2025-10-31T05:35:32Z | 2025-10-31T05:35:32Z |
| suse-su-2025:3878-1 | Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6) | 2025-10-31T05:11:42Z | 2025-10-31T05:11:42Z |
| suse-su-2025:3875-1 | Security update for libxslt | 2025-10-30T15:27:08Z | 2025-10-30T15:27:08Z |
| suse-su-2025:3874-1 | Security update for xwayland | 2025-10-30T15:25:37Z | 2025-10-30T15:25:37Z |
| suse-su-2025:3873-1 | Security update for strongswan | 2025-10-30T15:10:54Z | 2025-10-30T15:10:54Z |
| suse-su-2025:3872-1 | Security update for xorg-x11-server | 2025-10-30T15:09:46Z | 2025-10-30T15:09:46Z |
| suse-su-2025:3869-1 | Security update for himmelblau | 2025-10-30T13:45:10Z | 2025-10-30T13:45:10Z |
| suse-su-2025:3868-1 | Security update for chrony | 2025-10-30T13:44:59Z | 2025-10-30T13:44:59Z |
| suse-su-2025:3867-1 | Security update for ImageMagick | 2025-10-30T13:41:13Z | 2025-10-30T13:41:13Z |
| suse-su-2025:3866-1 | Security update for xorg-x11-server | 2025-10-30T13:40:40Z | 2025-10-30T13:40:40Z |
| suse-su-2025:3865-1 | Security update for xorg-x11-server | 2025-10-30T13:40:16Z | 2025-10-30T13:40:16Z |
| suse-su-2025:3864-1 | Security update for xorg-x11-server | 2025-10-30T13:40:00Z | 2025-10-30T13:40:00Z |
| suse-su-2025:3863-1 | Security update for xwayland | 2025-10-30T13:39:29Z | 2025-10-30T13:39:29Z |
| suse-su-2025:20965-1 | Security update for libsoup | 2025-10-30T13:31:46Z | 2025-10-30T13:31:46Z |
| suse-su-2025:20964-1 | Security update for colord | 2025-10-30T12:29:30Z | 2025-10-30T12:29:30Z |
| suse-su-2025:3859-1 | Security update for java-21-openjdk | 2025-10-29T15:10:24Z | 2025-10-29T15:10:24Z |
| suse-su-2025:3858-1 | Security update for xorg-x11-server | 2025-10-29T15:09:00Z | 2025-10-29T15:09:00Z |
| suse-su-2025:3857-1 | Security update for strongswan | 2025-10-29T14:16:52Z | 2025-10-29T14:16:52Z |
| suse-su-2025:3856-1 | Security update for strongswan | 2025-10-29T14:16:31Z | 2025-10-29T14:16:31Z |
| suse-su-2025:3855-1 | Security update for strongswan | 2025-10-29T14:15:40Z | 2025-10-29T14:15:40Z |
| suse-su-2025:3845-1 | Security update for fetchmail | 2025-10-28T16:42:49Z | 2025-10-28T16:42:49Z |
| suse-su-2025:3844-1 | Security update for ImageMagick | 2025-10-28T16:41:56Z | 2025-10-28T16:41:56Z |
| suse-su-2025:3843-1 | Security update for xen | 2025-10-28T16:40:49Z | 2025-10-28T16:40:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-30214 | Cisco Catalyst Center Virtual Appliance访问控制错误漏洞 | 2025-11-28 | 2025-12-04 |
| cnvd-2025-29956 | WordPress TAX SERVICE Electronic HDM缺少授权漏洞 | 2025-11-28 | 2025-12-04 |
| cnvd-2025-29934 | WordPress houzez跨站脚本漏洞 | 2025-11-28 | 2025-12-03 |
| cnvd-2025-30580 | Apache Syncope信任管理问题漏洞 | 2025-11-27 | 2025-12-12 |
| cnvd-2025-30365 | Online Shopping Portal不安全的直接对象引用漏洞 | 2025-11-27 | 2025-12-10 |
| cnvd-2025-30359 | Hostel Management System register-complaint.php文件跨站脚本漏洞 | 2025-11-27 | 2025-12-09 |
| cnvd-2025-30258 | WordPress插件YouTube Subscribe跨站脚本漏洞 | 2025-11-27 | 2025-12-08 |
| cnvd-2025-30257 | WordPress插件Zweb Social Mobile跨站脚本漏洞 | 2025-11-27 | 2025-12-08 |
| cnvd-2025-30208 | Blog Site admin.php文件授权不当漏洞 | 2025-11-27 | 2025-12-05 |
| cnvd-2025-30207 | Blog Site blog.php文件SQL注入漏洞 | 2025-11-27 | 2025-12-05 |
| cnvd-2025-29967 | WordPress插件Blog2Social: Social Media Auto Post & Scheduler存在未明漏洞 | 2025-11-27 | 2025-12-04 |
| cnvd-2025-29966 | WordPress插件atec Duplicate Page & Post存在未明漏洞 | 2025-11-27 | 2025-12-04 |
| cnvd-2025-29959 | WordPress Refund Request for WooCommerce plugin未经授权的数据修改漏洞 | 2025-11-27 | 2025-12-04 |
| cnvd-2025-29958 | WordPress ProjectList plugin任意文件上传漏洞 | 2025-11-27 | 2025-12-04 |
| cnvd-2025-29957 | WordPress ProjectList plugin SQL注入漏洞 | 2025-11-27 | 2025-12-04 |
| cnvd-2025-29938 | ASUS Router堆栈缓冲区溢出漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29937 | ASUS Router路径遍历漏洞(CNVD-2025-29937) | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29936 | ASUS Router身份验证绕过漏洞(CNVD-2025-29936) | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29935 | ASUS Router整数下溢漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29870 | Library System return.php文件SQL注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29869 | Library System index.php文件SQL注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29868 | Library System mail.php文件SQL注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29783 | ASUS Router路径遍历漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29782 | ASUS Router命令注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29781 | ASUS Router身份验证绕过漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29780 | ASUS Router SQL注入漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29744 | AMD XOCL driver输入验证不当漏洞(CNVD-2025-29744) | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29743 | AMD Xilinx Run Time权限提升漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29742 | AMD Xilinx Run Time缓冲区溢出漏洞 | 2025-11-27 | 2025-12-03 |
| cnvd-2025-29741 | AMD Xilinx Run Time锁定保护不足漏洞 | 2025-11-27 | 2025-12-03 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0861 | Multiples vulnérabilités dans les produits IBM | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0860 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0859 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0858 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0862 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0861 | Multiples vulnérabilités dans les produits IBM | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0860 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0859 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0858 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0857 | Vulnérabilité dans Wireshark | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0856 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0855 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0854 | Vulnérabilité dans les produits Moxa | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0853 | Multiples vulnérabilités dans GitLab | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0852 | Vulnérabilité dans Tenable Security Center | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0857 | Vulnérabilité dans Wireshark | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0856 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0855 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0854 | Vulnérabilité dans les produits Moxa | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0853 | Multiples vulnérabilités dans GitLab | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0852 | Vulnérabilité dans Tenable Security Center | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0851 | Vulnérabilité dans Python | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0850 | Multiples vulnérabilités dans Google Chrome | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| CERTFR-2025-AVI-0851 | Vulnérabilité dans Python | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| CERTFR-2025-AVI-0850 | Multiples vulnérabilités dans Google Chrome | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0849 | Multiples vulnérabilités dans les produits Elastic | 2025-10-07T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| CERTFR-2025-AVI-0849 | Multiples vulnérabilités dans les produits Elastic | 2025-10-07T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0848 | Vulnérabilité dans OpenSSH | 2025-10-06T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0847 | Vulnérabilité dans les produits Liferay | 2025-10-06T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0846 | Multiples vulnérabilités dans les produits Qnap | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |