Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-65037 |
10 (3.1)
|
Azure Container Apps Remote Code Execution Vulnerability |
Microsoft |
Azure Container Apps |
2025-12-18T22:02:06.737Z | 2026-02-20T15:59:41.936Z |
| CVE-2025-64663 |
9.9 (3.1)
|
Custom Question Answering Elevation of Privilege Vulne… |
Microsoft |
Azure Cognitive Service for Language |
2025-12-18T22:02:05.377Z | 2026-02-20T15:59:40.872Z |
| CVE-2025-54100 |
7.8 (3.1)
|
PowerShell Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:09.562Z | 2026-02-20T15:59:40.386Z |
| CVE-2025-64680 |
7.8 (3.1)
|
Windows DWM Core Library Elevation of Privilege Vulner… |
Microsoft |
Windows 10 Version 1507 |
2025-12-09T17:56:08.904Z | 2026-02-20T15:59:39.816Z |
| CVE-2025-64679 |
7.8 (3.1)
|
Windows DWM Core Library Elevation of Privilege Vulner… |
Microsoft |
Windows 10 Version 1507 |
2025-12-09T17:56:08.304Z | 2026-02-20T15:59:39.320Z |
| CVE-2025-64678 |
8.8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Remot… |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:07.648Z | 2026-02-20T15:59:38.794Z |
| CVE-2025-64672 |
8.8 (3.1)
|
Microsoft SharePoint Server Spoofing Vulnerability |
Microsoft |
Microsoft SharePoint Server Subscription Edition |
2025-12-09T17:56:06.979Z | 2026-02-20T15:59:38.190Z |
| CVE-2025-64671 |
8.4 (3.1)
|
GitHub Copilot for Jetbrains Remote Code Execution Vul… |
Microsoft |
GitHub Copilot Plugin for JetBrains IDEs |
2025-12-09T17:56:06.407Z | 2026-02-20T15:59:37.589Z |
| CVE-2025-64661 |
7.8 (3.1)
|
Windows Shell Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:05.748Z | 2026-02-20T15:59:37.038Z |
| CVE-2025-62565 |
7.3 (3.1)
|
Windows File Explorer Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:05.233Z | 2026-02-20T15:59:36.459Z |
| CVE-2025-62570 |
7.1 (3.1)
|
Windows Camera Frame Server Monitor Information Disclo… |
Microsoft |
Windows 11 Version 24H2 |
2025-12-09T17:56:04.617Z | 2026-02-20T15:59:35.989Z |
| CVE-2025-62569 |
7 (3.1)
|
Microsoft Brokering File System Elevation of Privilege… |
Microsoft |
Windows 11 Version 24H2 |
2025-12-09T17:56:04.070Z | 2026-02-20T15:59:35.250Z |
| CVE-2025-62567 |
5.3 (3.1)
|
Windows Hyper-V Denial of Service Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:03.534Z | 2026-02-20T15:59:34.220Z |
| CVE-2025-62560 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:56:01.139Z | 2026-02-20T15:59:33.671Z |
| CVE-2025-62559 |
7.8 (3.1)
|
Microsoft Word Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:59.808Z | 2026-02-20T15:59:33.072Z |
| CVE-2025-62558 |
7.8 (3.1)
|
Microsoft Word Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:59.203Z | 2026-02-20T15:59:32.484Z |
| CVE-2025-62557 |
8.4 (3.1)
|
Microsoft Office Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:58.494Z | 2026-02-20T15:59:31.969Z |
| CVE-2025-62556 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:57.872Z | 2026-02-20T15:59:31.271Z |
| CVE-2025-62555 |
7 (3.1)
|
Microsoft Word Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:57.189Z | 2026-02-20T15:59:30.660Z |
| CVE-2025-62554 |
8.4 (3.1)
|
Microsoft Office Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:56.579Z | 2026-02-20T15:59:29.932Z |
| CVE-2025-62553 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:55.901Z | 2026-02-20T15:59:29.361Z |
| CVE-2025-62552 |
7.8 (3.1)
|
Microsoft Access Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:55.308Z | 2026-02-20T15:59:28.828Z |
| CVE-2025-62550 |
8.8 (3.1)
|
Azure Monitor Agent Remote Code Execution Vulnerability |
Microsoft |
Azure Monitor |
2025-12-09T17:55:54.642Z | 2026-02-20T15:59:28.230Z |
| CVE-2025-62474 |
7.8 (3.1)
|
Windows Remote Access Connection Manager Elevation of … |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:55:53.947Z | 2026-02-20T15:59:27.667Z |
| CVE-2025-62468 |
5.5 (3.1)
|
Windows Defender Firewall Service Information Disclosu… |
Microsoft |
Windows 11 version 22H3 |
2025-12-09T17:55:53.221Z | 2026-02-20T15:59:26.984Z |
| CVE-2025-62467 |
7.8 (3.1)
|
Windows Projected File System Elevation of Privilege V… |
Microsoft |
Windows 10 Version 1809 |
2025-12-09T17:55:52.435Z | 2026-02-20T15:59:26.319Z |
| CVE-2025-62465 |
6.5 (3.1)
|
DirectX Graphics Kernel Denial of Service Vulnerability |
Microsoft |
Windows 11 version 22H3 |
2025-12-09T17:55:51.174Z | 2026-02-20T15:59:25.080Z |
| CVE-2025-55233 |
7.8 (3.1)
|
Windows Projected File System Elevation of Privilege V… |
Microsoft |
Windows 10 Version 1809 |
2025-12-09T17:55:51.668Z | 2026-02-20T15:59:25.693Z |
| CVE-2025-62464 |
7.8 (3.1)
|
Windows Projected File System Elevation of Privilege V… |
Microsoft |
Windows 10 Version 1809 |
2025-12-09T17:55:50.511Z | 2026-02-20T15:59:24.324Z |
| CVE-2025-62463 |
6.5 (3.1)
|
DirectX Graphics Kernel Denial of Service Vulnerability |
Microsoft |
Windows 10 Version 21H2 |
2025-12-09T17:55:49.867Z | 2026-02-20T15:59:23.225Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-13689 |
8.8 (3.1)
|
DataStage on Cloud Pak for Data is vulnerable to arbit… |
IBM |
DataStage on Cloud Pak |
2026-02-17T22:26:20.866Z | 2026-02-19T04:55:49.939Z |
| CVE-2026-27171 |
2.9 (3.1)
|
zlib before 1.3.2 allows CPU consumption via crc3… |
zlib |
zlib |
2026-02-18T02:36:19.509Z | 2026-02-18T13:38:55.713Z |
| CVE-2026-26065 |
9.3 (4.0)
|
calibre: Path Traversal can Lead to Arbitrary File Wri… |
kovidgoyal |
calibre |
2026-02-20T01:54:03.128Z | 2026-02-20T16:41:32.281Z |
| CVE-2020-37100 |
8.5 (4.0)
7.8 (3.1)
|
Sync Breeze Enterprise 12.4.18 - Unquoted Service Path |
SyncBreeze |
Sync Breeze Enterprise |
2026-02-03T14:49:22.876Z | 2026-02-03T17:06:35.960Z |
| CVE-2025-66412 |
8.5 (4.0)
|
Angular Stored XSS Vulnerability via SVG Animation, SV… |
angular |
angular |
2025-12-01T22:35:59.211Z | 2025-12-02T14:13:07.801Z |
| CVE-2026-22269 |
4.7 (3.1)
|
Dell PowerProtect Data Manager, version(s) prior … |
Dell |
PowerProtect Data Manager |
2026-02-19T09:00:56.035Z | 2026-02-20T16:09:36.834Z |
| CVE-2026-22266 |
4.7 (3.1)
|
Dell PowerProtect Data Manager, version(s) prior … |
Dell |
PowerProtect Data Manager |
2026-02-19T09:06:21.289Z | 2026-02-20T16:10:51.265Z |
| CVE-2026-22267 |
8.1 (3.1)
|
Dell PowerProtect Data Manager, version(s) prior … |
Dell |
PowerProtect Data Manager |
2026-02-19T09:16:54.151Z | 2026-02-21T04:56:31.271Z |
| CVE-2026-26977 |
6.9 (4.0)
|
Frappe Learning Management System exposes details of u… |
frappe |
lms |
2026-02-20T00:56:42.680Z | 2026-02-20T15:35:48.470Z |
| CVE-2026-26987 |
5.3 (4.0)
|
LibreNMS affected by reflected XSS via email field |
librenms |
librenms |
2026-02-20T01:11:13.925Z | 2026-02-20T15:35:18.059Z |
| CVE-2019-25395 |
5.3 (4.0)
7.2 (3.1)
|
Smoothwall Express 3.1 'preferences.cgi' Cross-Site Sc… |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:07.943Z | 2026-02-17T14:48:00.873Z |
| CVE-2026-26988 |
9.3 (4.0)
|
LibreNMS: SQL Injection in ajax_table.php spreads thro… |
librenms |
librenms |
2026-02-20T01:17:15.699Z | 2026-02-20T15:35:06.925Z |
| CVE-2019-25394 |
5.3 (4.0)
7.2 (3.1)
|
Smoothwall Express 3.1 'modem.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:07.096Z | 2026-02-17T14:50:19.914Z |
| CVE-2019-25393 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'smoothinfo.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:06.185Z | 2026-02-17T14:51:08.648Z |
| CVE-2019-25392 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'iptools.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:05.287Z | 2026-02-17T16:45:08.369Z |
| CVE-2019-25390 |
4.8 (4.0)
5.4 (3.1)
|
Smoothwall Express 3.1 'interfaces.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:04.134Z | 2026-02-17T14:56:58.987Z |
| CVE-2019-25389 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'timedaccess.cgi' Cross-Site Sc… |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:03.304Z | 2026-02-17T14:58:09.041Z |
| CVE-2019-25379 |
5.3 (4.0)
7.2 (3.1)
|
Smoothwall Express 3.1 'urlfilter.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:54.146Z | 2026-02-17T16:49:23.149Z |
| CVE-2019-25388 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'ipblock.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:02.339Z | 2026-02-17T14:59:00.951Z |
| CVE-2019-25387 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'xtaccess.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:00.882Z | 2026-02-17T14:59:43.686Z |
| CVE-2019-25386 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'dmzholes.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:59.952Z | 2026-02-17T15:00:17.142Z |
| CVE-2019-25385 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'outgoing.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:59.120Z | 2026-02-17T15:00:51.195Z |
| CVE-2019-25384 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'portfw.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:58.295Z | 2026-02-17T16:45:24.262Z |
| CVE-2019-25383 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'apcupsd.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:57.460Z | 2026-02-17T16:45:38.976Z |
| CVE-2019-25381 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'hosts.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:55.894Z | 2026-02-17T16:48:42.411Z |
| CVE-2019-25380 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'dhcp.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:54.998Z | 2026-02-17T16:48:57.484Z |
| CVE-2026-26989 |
4.3 (3.1)
|
LibreNMS has Stored XSS in Alert Rule |
librenms |
librenms |
2026-02-20T01:25:31.936Z | 2026-02-20T15:34:55.873Z |
| CVE-2026-26990 |
8.8 (3.1)
|
LibreNMS has Time-Based Blind SQL Injection in address… |
librenms |
librenms |
2026-02-20T01:29:33.838Z | 2026-02-20T15:34:46.036Z |
| CVE-2026-27059 |
6.5 (3.1)
|
WordPress Penci Recipe plugin <= 4.1 - Cross Site Scri… |
PenciDesign |
Penci Recipe |
2026-02-19T08:27:10.820Z | 2026-02-20T15:03:21.043Z |
| CVE-2026-27057 |
6.5 (3.1)
|
WordPress Penci Filter Everything plugin <= 1.7 - Cros… |
PenciDesign |
Penci Filter Everything |
2026-02-19T08:27:10.448Z | 2026-02-20T15:08:44.961Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-66412 | Angular is a development platform for building mobile and desktop web applications using TypeScript… | 2025-12-01T23:15:53.890 | 2026-02-20T16:37:23.807 |
| fkie_cve-2026-22269 | Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Improper Verification of S… | 2026-02-19T09:16:11.430 | 2026-02-20T16:36:41.030 |
| fkie_cve-2026-22266 | Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Improper Verification of S… | 2026-02-19T10:16:11.630 | 2026-02-20T16:36:07.650 |
| fkie_cve-2026-22267 | Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Incorrect Privilege Assign… | 2026-02-19T10:16:11.800 | 2026-02-20T16:33:47.890 |
| fkie_cve-2026-26977 | Frappe Learning Management System (LMS) is a learning system that helps users structure their conte… | 2026-02-20T02:16:54.057 | 2026-02-20T16:33:11.057 |
| fkie_cve-2026-26987 | LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and … | 2026-02-20T02:16:54.383 | 2026-02-20T16:32:16.380 |
| fkie_cve-2019-25395 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple stored cross-site scripting vulne… | 2026-02-16T18:19:44.480 | 2026-02-20T16:31:49.890 |
| fkie_cve-2026-26988 | LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and … | 2026-02-20T02:16:54.550 | 2026-02-20T16:31:42.897 |
| fkie_cve-2019-25394 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple stored cross-site scripting vulne… | 2026-02-16T18:19:44.313 | 2026-02-20T16:31:34.660 |
| fkie_cve-2019-25393 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:19:44.147 | 2026-02-20T16:31:23.993 |
| fkie_cve-2019-25392 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:19:43.980 | 2026-02-20T16:31:18.553 |
| fkie_cve-2019-25390 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:19:43.810 | 2026-02-20T16:31:10.263 |
| fkie_cve-2019-25389 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:19:43.643 | 2026-02-20T16:30:56.780 |
| fkie_cve-2019-25379 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains stored and reflected cross-site scripting … | 2026-02-16T18:19:41.987 | 2026-02-20T16:30:43.613 |
| fkie_cve-2019-25388 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:19:43.473 | 2026-02-20T16:27:01.120 |
| fkie_cve-2019-25387 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:19:43.303 | 2026-02-20T16:26:53.380 |
| fkie_cve-2019-25386 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:19:43.133 | 2026-02-20T16:26:47.313 |
| fkie_cve-2019-25385 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:19:42.967 | 2026-02-20T16:26:41.493 |
| fkie_cve-2019-25384 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:19:42.803 | 2026-02-20T16:26:36.247 |
| fkie_cve-2019-25383 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:19:42.640 | 2026-02-20T16:26:19.230 |
| fkie_cve-2019-25381 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:19:42.317 | 2026-02-20T16:26:07.903 |
| fkie_cve-2019-25380 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:19:42.153 | 2026-02-20T16:25:48.847 |
| fkie_cve-2026-26989 | LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and … | 2026-02-20T02:16:54.710 | 2026-02-20T16:25:20.917 |
| fkie_cve-2026-26990 | LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and … | 2026-02-20T02:16:54.870 | 2026-02-20T16:24:36.787 |
| fkie_cve-2026-27059 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T09:16:27.227 | 2026-02-20T16:22:44.857 |
| fkie_cve-2026-27057 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T09:16:26.960 | 2026-02-20T16:22:44.673 |
| fkie_cve-2026-26214 | Galaxy FDS Android SDK (XiaoMi/galaxy-fds-sdk-android) version 3.0.8 and prior disable TLS hostname… | 2026-02-12T16:16:17.183 | 2026-02-20T16:22:41.230 |
| fkie_cve-2026-25472 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T09:16:25.137 | 2026-02-20T16:22:40.820 |
| fkie_cve-2026-25451 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T09:16:24.580 | 2026-02-20T16:22:40.637 |
| fkie_cve-2026-25420 | Missing Authorization vulnerability in MailerLite MailerLite official-mailerlite-sign-up-forms allo… | 2026-02-19T09:16:23.740 | 2026-02-20T16:22:40.453 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-5qf3-3gp9-pjx6 |
|
In the Linux kernel, the following vulnerability has been resolved: crypto: omap - Allocate OMAP_C… | 2026-02-18T18:30:40Z | 2026-02-19T18:31:44Z |
| ghsa-r3f7-9rj4-j5fm |
|
In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race in mptcp_pm_nl… | 2026-02-14T18:30:15Z | 2026-02-19T18:31:43Z |
| ghsa-mmqq-p5mv-jc88 |
5.6 (3.1)
6.3 (4.0)
|
A third-party NAT traversal module fails to validate SSL/TLS certificates when connecting to the si… | 2026-02-03T03:30:28Z | 2026-02-19T18:31:43Z |
| ghsa-jf4c-6xg3-hjc6 |
4.9 (3.1)
6.9 (4.0)
|
In Quick.Cart user passwords are stored in plaintext form. An attacker with high privileges can dis… | 2026-02-05T12:30:26Z | 2026-02-19T18:31:43Z |
| ghsa-h85p-pj9x-mcrr |
5.9 (3.1)
8.9 (4.0)
|
The API communication component fails to validate the SSL/TLS certificate when sending HTTPS reques… | 2026-02-03T03:30:27Z | 2026-02-19T18:31:43Z |
| ghsa-fm67-x2fw-2g76 |
9.8 (3.1)
9.3 (4.0)
|
Vulnerability in root-project root (builtins/zlib modules). This vulnerability is associated with p… | 2026-01-27T09:30:30Z | 2026-02-19T18:31:43Z |
| ghsa-876r-52fj-4pxf |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Delay module un… | 2026-02-18T18:30:40Z | 2026-02-19T18:31:43Z |
| ghsa-78xc-39m5-v2c6 |
|
In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Avoid creating … | 2026-02-18T18:30:40Z | 2026-02-19T18:31:43Z |
| ghsa-78vp-42ph-7f4v |
5.9 (3.1)
8.9 (4.0)
|
The DDNS update function in ADM fails to properly validate the hostname of the DDNS server's TLS/SS… | 2026-02-03T03:30:27Z | 2026-02-19T18:31:43Z |
| ghsa-75g2-xj79-xvcw |
9.8 (3.1)
9.5 (4.0)
|
When a specific function is enabled while joining a AD Domain from ADM, an improper input parameter… | 2026-02-03T06:31:05Z | 2026-02-19T18:31:43Z |
| ghsa-5xhg-pwmp-mxj2 |
|
In the Linux kernel, the following vulnerability has been resolved: mptcp: ensure context reset on… | 2026-01-14T15:33:02Z | 2026-02-19T18:31:43Z |
| ghsa-53xr-2xx3-73wm |
3.7 (3.1)
6.3 (4.0)
|
The DDNS function uses an insecure HTTP connection or fails to validate the SSL/TLS certificate whe… | 2026-02-03T03:30:27Z | 2026-02-19T18:31:43Z |
| ghsa-4rhr-9xj2-x9gx |
|
In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix hugetlb_pmd_sh… | 2026-02-04T18:30:44Z | 2026-02-19T18:31:43Z |
| ghsa-3w2g-4qx3-2mmw |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Free sp in erro… | 2026-02-18T18:30:40Z | 2026-02-19T18:31:43Z |
| ghsa-3qgq-r69m-f2f7 |
9.3 (4.0)
|
Vulnerability in root-project root (builtins/zlib modules). This vulnerability is associated with p… | 2026-01-27T09:30:30Z | 2026-02-19T18:31:43Z |
| ghsa-xrr8-p4pf-hfwr |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: nfsd: don't ignore the return … | 2025-04-16T15:34:39Z | 2026-02-19T18:31:42Z |
| ghsa-w4x2-878r-xjgp |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: stmmac: Fix accessing fre… | 2025-05-01T15:31:41Z | 2026-02-19T18:31:42Z |
| ghsa-mw57-63xv-7mx2 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Add missing lo… | 2025-08-22T18:31:22Z | 2026-02-19T18:31:42Z |
| ghsa-jf3w-82f5-fq58 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix invalid derefence… | 2025-10-07T18:31:08Z | 2026-02-19T18:31:42Z |
| ghsa-hp7p-hw7m-prxm |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: fix of_iomap me… | 2025-09-18T18:30:27Z | 2026-02-19T18:31:42Z |
| ghsa-gvh3-4cff-qfpj |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: set ATTR_CTIME flags wh… | 2025-01-15T15:31:25Z | 2026-02-19T18:31:42Z |
| ghsa-g7f2-49vp-j5f7 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ACPI: APEI: send SIGBUS to cur… | 2025-09-11T18:35:52Z | 2026-02-19T18:31:42Z |
| ghsa-7mv8-qr93-j282 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: dsa: free routing table o… | 2025-05-01T15:31:44Z | 2026-02-19T18:31:42Z |
| ghsa-5gcf-h7r6-w82j |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: smb: client: set correct id, u… | 2024-04-17T12:32:02Z | 2026-02-19T18:31:42Z |
| ghsa-5c8q-r66v-f4fc |
7.5 (3.1)
8.3 (4.0)
|
Exposure of Private Personal Information to an Unauthorized Actor vulnerability in RTI Connext Prof… | 2025-12-16T18:31:32Z | 2026-02-19T18:31:42Z |
| ghsa-4qc6-52f6-6vgr |
4.7 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: xsk: Fix race condition in AF_… | 2025-05-20T18:30:54Z | 2026-02-19T18:31:42Z |
| ghsa-4fxr-v6jm-9j9m |
|
In the Linux kernel, the following vulnerability has been resolved: devlink: rate: Unset parent po… | 2025-12-04T18:30:53Z | 2026-02-19T18:31:42Z |
| ghsa-2v48-hmwv-qpj8 |
7.8 (3.1)
7.3 (4.0)
|
Uncontrolled Search Path Element vulnerability in Yandex Telemost on MacOS allows Search Order Hija… | 2025-12-09T18:30:37Z | 2026-02-19T18:31:42Z |
| ghsa-2m44-r2x5-4q79 |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix racy bitfield write… | 2025-12-24T12:30:29Z | 2026-02-19T18:31:42Z |
| ghsa-2jg8-5xcc-qjcx |
8.8 (3.1)
7.1 (4.0)
|
Authentication Bypass by Spoofing vulnerability in HYPR Server allows Identity Spoofing.This issue … | 2025-12-11T18:30:45Z | 2026-02-19T18:31:42Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43035 |
|
The d8s-urls package for Python, as distributed on PyPI, included a potential code-execut… | democritus-csv | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.835906Z |
| pysec-2022-43034 |
|
The d8s-yaml package for Python, as distributed on PyPI, included a potential code-execut… | d8s-yaml | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.718747Z |
| pysec-2022-43033 |
|
The d8s-xml package for Python, as distributed on PyPI, included a potential code-executi… | d8s-xml | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.587712Z |
| pysec-2022-43032 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | d8s-utility | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.473097Z |
| pysec-2022-43031 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | d8s-utility | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.395893Z |
| pysec-2022-43030 |
|
The d8s-urls package for Python, as distributed on PyPI, included a potential code-execut… | d8s-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.291206Z |
| pysec-2022-43029 |
|
The d8s-pdfs package for Python, as distributed on PyPI, included a potential code-execut… | d8s-pdfs | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.177857Z |
| pysec-2022-43028 |
|
The d8s-networking package for Python, as distributed on PyPI, included a potential code-… | d8s-networking | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.075232Z |
| pysec-2022-43027 |
|
The d8s-lists package for Python, as distributed on PyPI, included a potential code-execu… | d8s-lists | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.913872Z |
| pysec-2022-43026 |
|
The d8s-json package for Python, as distributed on PyPI, included a potential code-execut… | d8s-json | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.769675Z |
| pysec-2022-43025 |
|
The d8s-html package for Python, as distributed on PyPI, included a potential code-execut… | d8s-html | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.578719Z |
| pysec-2022-43024 |
|
The d8s-file-system package for Python, as distributed on PyPI, included a potential code… | d8s-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.460219Z |
| pysec-2022-43023 |
|
The d8s-domains package for Python, as distributed on PyPI, included a potential code-exe… | d8s-domains | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.349619Z |
| pysec-2022-43022 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | d8s-asns | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.247277Z |
| pysec-2022-43021 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | d8s-asns | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.172299Z |
| pysec-2022-43020 |
|
The d8s-archives package for Python, as distributed on PyPI, included a potential code-ex… | d8s-archives | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.057391Z |
| pysec-2022-43019 |
|
The d8s-algorithms package for Python, as distributed on PyPI, included a potential code-… | d8s-algorithms | 2022-10-11T22:15:00Z | 2023-06-05T01:12:47.946780Z |
| pysec-2023-60 |
|
Task instance details page in the UI is vulnerable to a stored XSS.This issue affects Apa… | apache-airflow | 2023-05-08T10:15:00Z | 2023-06-05T01:12:45.763850Z |
| pysec-2023-59 |
|
Privilege Context Switching Error vulnerability in Apache Software Foundation Apache Airf… | apache-airflow | 2023-05-08T12:15:00Z | 2023-06-05T01:12:45.655810Z |
| pysec-2021-427 |
|
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Mpmath v1.… | mpmath | 2021-06-21T20:15:00Z | 2023-05-31T06:15:00Z |
| pysec-2022-42980 |
|
Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL. | pillow | 2022-11-14T07:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-234 |
|
Poetry v1.1.9 and below was discovered to contain an untrusted search path which causes t… | poetry | 2022-03-21T22:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-233 |
|
openssh_key_parser is an open source Python package providing utilities to parse and pack… | openssh-key-parser | 2022-07-06T18:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-230 |
|
NULL Pointer Dereference allows attackers to cause a denial of service (or application cr… | lxml | 2022-07-05T10:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-229 |
|
`gradio` is an open source framework for building interactive machine learning models and… | gradio | 2022-03-17T21:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-228 |
|
An Access Control vunerabiity exists in Gerapy v 0.9.7 via the spider parameter in projec… | gerapy | 2022-03-10T21:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-227 |
|
Bottle before 0.12.20 mishandles errors during early request binding. | bottle | 2022-06-02T14:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2021-874 |
|
pytorch-lightning is vulnerable to Deserialization of Untrusted Data | pytorch-lightning | 2021-12-23T18:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2021-873 |
|
Gradio is an open source framework for building interactive machine learning models and d… | gradio | 2021-12-15T20:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2021-872 |
|
An issue was discovered in the Dask distributed package before 2021.10.0 for Python. Sing… | distributed | 2021-10-26T11:15:00Z | 2023-05-25T05:07:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33163 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.691394Z |
| gsd-2024-33162 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.736744Z |
| gsd-2024-33161 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.747995Z |
| gsd-2024-33160 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.698437Z |
| gsd-2024-33159 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.732504Z |
| gsd-2024-33158 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.688050Z |
| gsd-2024-33157 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.746799Z |
| gsd-2024-33156 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.718799Z |
| gsd-2024-33155 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.707542Z |
| gsd-2024-33154 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.704633Z |
| gsd-2024-33153 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.662915Z |
| gsd-2024-33152 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.669552Z |
| gsd-2024-33151 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.706908Z |
| gsd-2024-33150 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.617332Z |
| gsd-2024-33149 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.633232Z |
| gsd-2024-33148 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.705420Z |
| gsd-2024-33147 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.758533Z |
| gsd-2024-33146 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.703789Z |
| gsd-2024-33145 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.603403Z |
| gsd-2024-33144 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.671183Z |
| gsd-2024-33143 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.755388Z |
| gsd-2024-33142 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.695922Z |
| gsd-2024-33141 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.694744Z |
| gsd-2024-33140 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.690890Z |
| gsd-2024-33139 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.720304Z |
| gsd-2024-33138 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.712826Z |
| gsd-2024-33137 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.732911Z |
| gsd-2024-33136 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.757468Z |
| gsd-2024-33135 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.734589Z |
| gsd-2024-33134 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.754805Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2025-3475 | Malicious code in timekeeper-verifier (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| MAL-2025-3006 | Malicious code in tcloud-python-test (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| MAL-2025-191905 | Malicious code in time-service-checker (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| MAL-2025-191904 | Malicious code in time-server-test (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| MAL-2025-191903 | Malicious code in time-server-analyzer (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| MAL-2025-191902 | Malicious code in time-server-analysis (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| MAL-2025-191901 | Malicious code in time-check-server-get (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| MAL-2025-191900 | Malicious code in time-check-server (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| MAL-2025-191887 | Malicious code in tcloud-python-sdks (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| MAL-2025-191886 | Malicious code in tclients-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| MAL-2025-191871 | Malicious code in snapshot-photo (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:46Z |
| mal-2025-2950 | Malicious code in credential-python-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-2929 | Malicious code in acloud-client (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191721 | Malicious code in enumer-iam (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191687 | Malicious code in awscloud-clients-core (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191679 | Malicious code in amzclients-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191677 | Malicious code in alicloud-client-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191676 | Malicious code in alicloud-client (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191673 | Malicious code in acloud-clients (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191672 | Malicious code in acloud-client-uses (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191671 | Malicious code in aclient-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-2950 | Malicious code in credential-python-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-2929 | Malicious code in acloud-client (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191721 | Malicious code in enumer-iam (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191687 | Malicious code in awscloud-clients-core (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191679 | Malicious code in amzclients-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191677 | Malicious code in alicloud-client-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191676 | Malicious code in alicloud-client (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191673 | Malicious code in acloud-clients (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191672 | Malicious code in acloud-client-uses (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-0965 | pgAdmin: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-04-13T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1818 | Palo Alto Networks Cortex XDR: Schwachstelle ermöglicht Umgehen von Sicherheitsmechanismen | 2025-08-13T22:00:00.000+00:00 | 2025-08-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1775 | Ivanti Avalanche: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1774 | Ivanti Connect Secure und Policy Secure: Mehrere Schwachstelle | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1773 | Microsoft Teams Geräte: Schwachstelle ermöglicht Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1772 | Siemens SICAM: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1771 | Mehrere Siemens-Produkte: Schwachstelle ermöglicht Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1770 | AMD Prozessoren: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1769 | Siemens SIMATIC S7: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1768 | Siemens SIPROTEC: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1767 | AMD Radeon Graphics Products: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1766 | Liferay Portal und DXP: Schwachstelle ermöglicht Denial of Service | 2025-08-11T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1764 | Bouncy Castle: Schwachstelle ermöglicht Denial of Service | 2025-08-11T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1667 | Google Chrome / Microsoft Edge: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-07-29T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1622 | Google Chrome / Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-07-22T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1298 | AMD Prozessoren: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-10T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1278 | AMD Prozessoren: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-06-10T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1277 | Microsoft Windows: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1215 | OWASP ModSecurity: Schwachstelle ermöglicht Denial of Service | 2025-06-02T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1076 | Wibu-Systems CodeMeter: Schwachstelle ermöglicht Privilegieneskalation | 2025-05-15T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0573 | TianoCore EDK2: Schwachstelle ermöglicht Denial of Service und Infogewinn | 2025-03-16T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0542 | Webkit/Apple : Schwachstelle ermöglicht Umgehung von Sicherheitsmechanismen | 2025-03-11T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0105 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-15T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0016 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-06T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2024-1721 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-07-28T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2023-3182 | OpenSSH: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2023-12-19T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1749 | win.rar WinRAR: Schwachstelle ermöglicht Codeausführung | 2025-08-10T22:00:00.000+00:00 | 2025-08-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1731 | Eaton Power Distribution Unit: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-08-05T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1725 | IBM Tivoli Monitoring: Mehrere Schwachstellen | 2025-08-05T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1466 | Red Hat Enterprise Linux (socat): Schwachstelle ermöglicht Manipulation von Dateien | 2025-07-06T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:9069 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2025-06-16T01:51:52+00:00 | 2026-02-21T07:35:38+00:00 |
| rhsa-2025:9067 | Red Hat Security Advisory: grafana-pcp security update | 2025-06-16T01:41:32+00:00 | 2026-02-21T07:35:38+00:00 |
| rhsa-2025:9061 | Red Hat Security Advisory: containernetworking-plugins security update | 2025-06-16T01:40:18+00:00 | 2026-02-21T07:35:38+00:00 |
| rhsa-2025:9065 | Red Hat Security Advisory: skopeo security update | 2025-06-16T01:50:12+00:00 | 2026-02-21T07:35:36+00:00 |
| rhsa-2025:9064 | Red Hat Security Advisory: podman security update | 2025-06-16T01:50:12+00:00 | 2026-02-21T07:35:36+00:00 |
| rhsa-2025:9063 | Red Hat Security Advisory: git-lfs security update | 2025-06-16T01:34:37+00:00 | 2026-02-21T07:35:36+00:00 |
| rhsa-2025:9062 | Red Hat Security Advisory: buildah security update | 2025-06-16T01:41:32+00:00 | 2026-02-21T07:35:35+00:00 |
| rhsa-2025:9060 | Red Hat Security Advisory: git-lfs security update | 2025-06-16T01:50:17+00:00 | 2026-02-21T07:35:34+00:00 |
| rhsa-2025:9059 | Red Hat Security Advisory: grafana security update | 2025-06-16T01:29:22+00:00 | 2026-02-21T07:35:33+00:00 |
| rhsa-2025:9043 | Red Hat Security Advisory: golang security update | 2025-06-12T19:28:04+00:00 | 2026-02-21T07:35:33+00:00 |
| rhsa-2025:9025 | Red Hat Security Advisory: container-tools:rhel8 security update | 2025-06-12T15:35:13+00:00 | 2026-02-21T07:35:32+00:00 |
| rhsa-2025:9020 | Red Hat Security Advisory: podman security update | 2025-06-12T14:08:34+00:00 | 2026-02-21T07:35:32+00:00 |
| rhsa-2025:9019 | Red Hat Security Advisory: containernetworking-plugins security update | 2025-06-12T14:08:23+00:00 | 2026-02-21T07:35:31+00:00 |
| rhsa-2025:9018 | Red Hat Security Advisory: skopeo security update | 2025-06-12T14:03:23+00:00 | 2026-02-21T07:35:31+00:00 |
| rhsa-2025:9017 | Red Hat Security Advisory: buildah security update | 2025-06-12T13:57:18+00:00 | 2026-02-21T07:35:31+00:00 |
| rhsa-2025:8918 | Red Hat Security Advisory: grafana-pcp security update | 2025-06-11T16:05:50+00:00 | 2026-02-21T07:35:30+00:00 |
| rhsa-2025:8984 | Red Hat Security Advisory: grafana-pcp security update | 2025-06-12T06:34:27+00:00 | 2026-02-21T07:35:29+00:00 |
| rhsa-2025:8983 | Red Hat Security Advisory: grafana-pcp security update | 2025-06-12T06:32:37+00:00 | 2026-02-21T07:35:29+00:00 |
| rhsa-2025:8982 | Red Hat Security Advisory: grafana-pcp security update | 2025-06-12T06:30:57+00:00 | 2026-02-21T07:35:29+00:00 |
| rhsa-2025:8975 | Red Hat Security Advisory: grafana-pcp security update | 2025-06-12T05:54:57+00:00 | 2026-02-21T07:35:27+00:00 |
| rhsa-2025:8974 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2025-06-12T05:41:22+00:00 | 2026-02-21T07:35:27+00:00 |
| rhsa-2025:8916 | Red Hat Security Advisory: grafana-pcp security update | 2025-06-11T15:46:48+00:00 | 2026-02-21T07:35:26+00:00 |
| rhsa-2025:8915 | Red Hat Security Advisory: grafana-pcp security update | 2025-06-11T15:46:44+00:00 | 2026-02-21T07:35:26+00:00 |
| rhsa-2025:8737 | Red Hat Security Advisory: golang security update | 2025-06-10T16:52:37+00:00 | 2026-02-21T07:35:25+00:00 |
| rhsa-2025:8689 | Red Hat Security Advisory: golang security update | 2025-06-09T14:35:25+00:00 | 2026-02-21T07:35:24+00:00 |
| rhsa-2025:8685 | Red Hat Security Advisory: grafana security update | 2025-06-09T13:44:39+00:00 | 2026-02-21T07:35:23+00:00 |
| rhsa-2025:8682 | Red Hat Security Advisory: grafana security update | 2025-06-09T14:22:44+00:00 | 2026-02-21T07:35:22+00:00 |
| rhsa-2025:8680 | Red Hat Security Advisory: grafana security update | 2025-06-09T14:11:50+00:00 | 2026-02-21T07:35:22+00:00 |
| rhsa-2025:8670 | Red Hat Security Advisory: Release of OpenShift Serverless Logic 1.36.0 security update & enhancements | 2025-06-09T10:12:51+00:00 | 2026-02-21T07:35:22+00:00 |
| rhsa-2025:8634 | Red Hat Security Advisory: podman security update | 2025-06-09T03:29:53+00:00 | 2026-02-21T07:35:21+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-15-064-03 | Siemens SPC Controller Series Denial-of-Service Vulnerability | 2015-12-06T07:00:00.000000Z | 2025-06-05T22:05:58.585431Z |
| icsma-16-279-01 | Animas OneTouch Ping Insulin Pump Vulnerabilities | 2016-07-09T06:00:00.000000Z | 2025-06-05T22:05:39.885072Z |
| icsa-16-357-02 | WAGO Ethernet Web-based Management Authentication Bypass Vulnerability | 2016-09-25T06:00:00.000000Z | 2025-06-05T22:05:33.606250Z |
| icsa-16-357-01 | Fidelix FX-20 Series Controllers Path Traversal Vulnerability | 2016-09-25T06:00:00.000000Z | 2025-06-05T22:05:19.325133Z |
| icsa-16-355-01 | Siemens Desigo PX Web Module Insufficient Entropy Vulnerability | 2016-09-23T06:00:00.000000Z | 2025-06-05T22:05:04.729768Z |
| icsa-16-350-02 | OmniMetrix OmniView Vulnerabilities | 2016-09-18T06:00:00.000000Z | 2025-06-05T22:04:46.712389Z |
| icsa-16-350-01 | FATEK Automation PLC WinProladder Stack-Based Buffer Overflow Vulnerability | 2016-09-18T06:00:00.000000Z | 2025-06-05T22:04:36.703364Z |
| icsa-16-348-04 | Siemens SIMATIC WinCC and SIMATIC PCS 7 ActiveX Vulnerability | 2016-09-16T06:00:00.000000Z | 2025-06-05T22:04:30.476125Z |
| icsa-16-348-03 | Delta Electronics WPLSoft, ISPSoft, and PMSoft Vulnerabilities | 2016-09-16T06:00:00.000000Z | 2025-06-05T22:04:14.714722Z |
| icsa-16-348-02 | Moxa DACenter Vulnerabilities | 2016-09-16T06:00:00.000000Z | 2025-06-05T22:04:01.652622Z |
| icsa-16-348-01 | Visonic PowerLink2 Vulnerabilities | 2016-09-16T06:00:00.000000Z | 2025-06-05T22:03:49.178165Z |
| icsa-16-343-03 | Adcon Telemetry A850 Telemetry Gateway Base Station Vulnerabilities | 2016-09-11T06:00:00.000000Z | 2025-06-05T22:03:42.940815Z |
| icsa-16-343-02 | Sauter NovaWeb Web HMI Authentication Bypass Vulnerability | 2016-09-11T06:00:00.000000Z | 2025-06-05T22:03:36.733125Z |
| icsa-16-341-01 | Tesla Gateway ECU Vulnerability | 2016-09-09T06:00:00.000000Z | 2025-06-05T22:03:30.461381Z |
| icsa-16-336-03 | Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module Vulnerabilities | 2016-09-04T06:00:00.000000Z | 2025-06-05T22:03:18.001347Z |
| icsa-16-334-03 | Emerson DeltaV Wireless I/O Card Open SSH Port Vulnerability | 2016-09-02T06:00:00.000000Z | 2025-06-05T22:03:11.738502Z |
| icsa-16-334-01 | Emerson Liebert SiteScan XML External Entity Vulnerability | 2016-09-02T06:00:00.000000Z | 2025-06-05T22:03:05.507055Z |
| icsa-16-322-02 | Moxa SoftCMS Vulnerabilities | 2016-08-21T06:00:00.000000Z | 2025-06-05T22:02:46.777740Z |
| icsa-16-322-01 | Vanderbilt Industries Siemens IP CCTV Cameras Vulnerability | 2016-08-21T06:00:00.000000Z | 2025-06-05T22:02:40.536934Z |
| icsa-16-320-01 | Lynxspring JENEsys BAS Bridge Vulnerabilities | 2016-08-19T06:00:00.000000Z | 2025-06-05T22:02:15.149456Z |
| icsa-16-315-01b | CA Unified Infrastructure Management Directory Traversal Vulnerability (Update B) | 2016-08-14T06:00:00.000000Z | 2025-06-05T22:02:08.926022Z |
| icsa-16-313-03 | OSIsoft PI System Incomplete Model of Endpoint Features Vulnerability | 2016-08-12T06:00:00.000000Z | 2025-06-05T22:02:02.695028Z |
| icsa-16-313-01 | Phoenix Contact ILC PLC Authentication Vulnerabilities | 2016-08-12T06:00:00.000000Z | 2025-06-05T22:01:49.839605Z |
| icsa-16-308-02b | Schneider Electric Magelis HMI Resource Consumption Vulnerabilities (Update B) | 2016-08-07T06:00:00.000000Z | 2025-06-05T22:01:37.316376Z |
| icsa-16-308-01 | Moxa OnCell Security Vulnerabilities | 2016-08-07T06:00:00.000000Z | 2025-06-05T22:01:24.817023Z |
| icsa-16-306-03 | Schneider Electric Unity PRO Control Flow Management Vulnerability | 2016-08-05T06:00:00.000000Z | 2025-06-05T22:01:18.546151Z |
| icsa-16-306-01 | Schneider Electric ConneXium Buffer Overflow Vulnerability | 2016-08-05T06:00:00.000000Z | 2025-06-05T22:01:05.732440Z |
| icsa-16-301-01 | Honeywell Experion PKS Improper Input Validation Vulnerability | 2016-07-31T06:00:00.000000Z | 2025-06-05T22:00:59.524749Z |
| icsa-16-299-01 | Siemens SICAM RTU Devices Denial-of-Service Vulnerability | 2016-07-29T06:00:00.000000Z | 2025-06-05T22:00:53.302460Z |
| icsa-16-294-01 | Moxa EDR-810 Industrial Secure Router Privilege Escalation Vulnerability | 2016-07-24T06:00:00.000000Z | 2025-06-05T22:00:47.061524Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-wifi-ffeb-22epcEWu | Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues Affecting Multiple Cisco Products | 2023-03-27T05:00:00+00:00 | 2023-03-27T05:00:00+00:00 |
| cisco-sa-iosxe-priv-esc-sabd8hcu | Cisco IOS XE Software Privilege Escalation Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-24T19:59:49+00:00 |
| cisco-sa-iosxe-priv-esc-sABD8hcU | Cisco IOS XE Software Privilege Escalation Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-24T19:59:49+00:00 |
| cisco-sa-ucsm-bkpsky-h8fcqgsa | Cisco FXOS Software and UCS Manager Software Configuration Backup Static Key Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-03-24T18:16:56+00:00 |
| cisco-sa-ucsm-bkpsky-H8FCQgsA | Cisco FXOS Software and UCS Manager Software Configuration Backup Static Key Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-03-24T18:16:56+00:00 |
| cisco-sa-ipv4-vfr-dos-cxxtfacb | Cisco IOS XE Software Virtual Fragmentation Reassembly Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-23T21:42:01+00:00 |
| cisco-sa-ipv4-vfr-dos-CXxtFacb | Cisco IOS XE Software Virtual Fragmentation Reassembly Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-23T21:42:01+00:00 |
| cisco-sa-webui-pthtrv-es7gsb9v | Cisco IOS XE Software Web UI Path Traversal Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-webui-pthtrv-es7GSb9V | Cisco IOS XE Software Web UI Path Traversal Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ios-xe-sdwan-vqahejyw | Cisco IOS XE SD-WAN Software Command Injection Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ios-xe-sdwan-VQAhEjYw | Cisco IOS XE SD-WAN Software Command Injection Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ios-gre-crash-p6ne5sq5 | Cisco IOS XE Software Fragmented Tunnel Protocol Packet Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ios-gre-crash-p6nE5Sq5 | Cisco IOS XE Software Fragmented Tunnel Protocol Packet Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ios-dhcpv6-dos-44cmvddk | Cisco IOS and IOS XE Software IPv6 DHCP (DHCPv6) Relay and Server Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ios-dhcpv6-dos-44cMvdDK | Cisco IOS and IOS XE Software IPv6 DHCP (DHCPv6) Relay and Server Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ewlc-dos-wfujbhkw | Cisco IOS XE Software for Wireless LAN Controllers HTTP Client Profiling Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ewlc-dos-wFujBHKw | Cisco IOS XE Software for Wireless LAN Controllers HTTP Client Profiling Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-dnac-privesc-qfxe74rs | Cisco DNA Center Privilege Escalation Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-dnac-privesc-QFXe74RS | Cisco DNA Center Privilege Escalation Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-dnac-infodisc-pe7zabdr | Cisco DNA Center Information Disclosure Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-dnac-infodisc-pe7zAbdR | Cisco DNA Center Information Disclosure Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-c9800-apjoin-dos-nxrhkt5 | Cisco IOS XE Software for Wireless LAN Controllers CAPWAP Join Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-c9800-apjoin-dos-nXRHkt5 | Cisco IOS XE Software for Wireless LAN Controllers CAPWAP Join Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-asaftdios-dhcpv6-cli-zf3ztv | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IPv6 DHCP (DHCPv6) Client Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-asaftdios-dhcpv6-cli-Zf3zTv | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IPv6 DHCP (DHCPv6) Client Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-asa5500x-entropy-6v9bhvyp | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Low-Entropy Keys Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-asa5500x-entropy-6v9bHVYP | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Low-Entropy Keys Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ap-cli-dos-tc2ekepu | Cisco Access Point Software Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ap-cli-dos-tc2EKEpu | Cisco Access Point Software Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ap-assoc-dos-d2sunwk2 | Cisco Access Point Software Association Request Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-21739 | scsi: ufs: core: Fix use-after free in init error and remove paths | 2025-02-02T00:00:00.000Z | 2026-02-18T15:12:52.000Z |
| msrc_cve-2024-42093 | net/dpaa2: Avoid explicit cpumask var allocation on stack | 2024-07-01T07:00:00.000Z | 2026-02-18T15:12:46.000Z |
| msrc_cve-2023-23915 | A cleartext transmission of sensitive information vulnerability exists in curl <v7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recentlycompleted transfer. A later HTTP-only transfer to the earlier host name would then *not* get upgraded properly to HSTS. | 2023-02-01T00:00:00.000Z | 2026-02-18T15:12:46.000Z |
| msrc_cve-2024-41049 | filelock: fix potential use-after-free in posix_lock_inode | 2024-07-01T07:00:00.000Z | 2026-02-18T15:12:34.000Z |
| msrc_cve-2025-21714 | RDMA/mlx5: Fix implicit ODP use after free | 2025-02-02T00:00:00.000Z | 2026-02-18T15:12:25.000Z |
| msrc_cve-2024-43398 | REXML denial of service vulnerability | 2024-08-02T00:00:00.000Z | 2026-02-18T15:12:23.000Z |
| msrc_cve-2023-28322 | An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send even when the `CURLOPT_POSTFIELDS` option has been set if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST. | 2023-05-01T00:00:00.000Z | 2026-02-18T15:12:11.000Z |
| msrc_cve-2024-50280 | dm cache: fix flushing uninitialized delayed_work on cache_ctr error | 2024-11-02T00:00:00.000Z | 2026-02-18T15:12:09.000Z |
| msrc_cve-2022-49063 | ice: arfs: fix use-after-free when freeing @rx_cpu_rmap | 2025-02-02T00:00:00.000Z | 2026-02-18T15:11:58.000Z |
| msrc_cve-2024-42140 | riscv: kexec: Avoid deadlock in kexec crash path | 2024-07-01T07:00:00.000Z | 2026-02-18T15:11:48.000Z |
| msrc_cve-2025-21756 | vsock: Keep the binding until socket destruction | 2025-02-02T00:00:00.000Z | 2026-02-18T15:11:43.000Z |
| msrc_cve-2021-32715 | Lenient Parsing of Content-Length Header When Prefixed with Plus Sign | 2021-07-02T00:00:00.000Z | 2026-02-18T15:11:39.000Z |
| msrc_cve-2023-5678 | Excessive time spent in DH check / generation with large Q parameter value | 2023-11-01T07:00:00.000Z | 2026-02-18T15:11:35.000Z |
| msrc_cve-2024-57979 | pps: Fix a use-after-free | 2025-02-02T00:00:00.000Z | 2026-02-18T15:11:23.000Z |
| msrc_cve-2025-21693 | mm: zswap: properly synchronize freeing resources during CPU hotunplug | 2025-02-02T00:00:00.000Z | 2026-02-18T15:11:10.000Z |
| msrc_cve-2022-49535 | scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI | 2025-02-02T00:00:00.000Z | 2026-02-18T15:10:55.000Z |
| msrc_cve-2024-41094 | drm/fbdev-dma: Only set smem_start is enable per module option | 2024-07-01T07:00:00.000Z | 2026-02-18T15:10:48.000Z |
| msrc_cve-2024-53177 | smb: prevent use-after-free due to open_cached_dir error paths | 2024-12-02T00:00:00.000Z | 2026-02-18T15:10:39.000Z |
| msrc_cve-2024-41054 | scsi: ufs: core: Fix ufshcd_clear_cmd racing issue | 2024-07-01T07:00:00.000Z | 2026-02-18T15:10:36.000Z |
| msrc_cve-2024-39486 | drm/drm_file: Fix pid refcounting race | 2024-07-01T07:00:00.000Z | 2026-02-18T15:10:24.000Z |
| msrc_cve-2024-57857 | RDMA/siw: Remove direct link to net_device | 2025-01-02T00:00:00.000Z | 2026-02-18T15:10:23.000Z |
| msrc_cve-2024-41097 | usb: atm: cxacru: fix endpoint checking in cxacru_bind() | 2024-07-01T07:00:00.000Z | 2026-02-18T15:10:12.000Z |
| msrc_cve-2025-21759 | ipv6: mcast: extend RCU protection in igmp6_send() | 2025-02-02T00:00:00.000Z | 2026-02-18T15:10:04.000Z |
| msrc_cve-2024-41084 | cxl/region: Avoid null pointer dereference in region lookup | 2024-07-01T07:00:00.000Z | 2026-02-18T15:10:01.000Z |
| msrc_cve-2024-41057 | cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() | 2024-07-01T07:00:00.000Z | 2026-02-18T15:09:48.000Z |
| msrc_cve-2025-21703 | netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() | 2025-02-02T00:00:00.000Z | 2026-02-18T15:09:46.000Z |
| msrc_cve-2023-47108 | DoS vulnerability in otelgrpc (uncontrolled resource consumption) due to unbound cardinality metrics | 2023-11-01T07:00:00.000Z | 2026-02-18T15:09:42.000Z |
| msrc_cve-2025-21760 | ndisc: extend RCU protection in ndisc_send_skb() | 2025-02-02T00:00:00.000Z | 2026-02-18T15:09:33.000Z |
| msrc_cve-2024-43857 | f2fs: fix null reference error when checking end of zone | 2024-08-02T00:00:00.000Z | 2026-02-18T15:09:28.000Z |
| msrc_cve-2024-42316 | mm/mglru: fix div-by-zero in vmpressure_calc_level() | 2024-08-02T00:00:00.000Z | 2026-02-18T15:09:16.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15297-1 | libspdlog1_15-1.15.3-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15296-1 | ctdb-4.22.2+git.396.c752843dcf4-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15295-1 | python311-salt-3006.0-41.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15294-1 | keylime-ima-policy-0.2.7+70-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15293-1 | redis-8.0.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15292-1 | radare2-5.9.8-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15291-1 | erlang-rabbitmq-client-3.13.7-4.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15290-1 | python39-3.9.23-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15289-1 | python314-3.14.0~b3-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15288-1 | python313-3.13.5-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15287-1 | python312-3.12.11-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15286-1 | python311-3.11.13-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15285-1 | python310-3.10.18-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15284-1 | python311-urllib3_1-1.26.20-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15283-1 | python311-urllib3-2.5.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15282-1 | python311-rfc3161-client-1.0.3-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15281-1 | python311-requests-2.32.4-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15280-1 | python311-pytest-html-4.1.1-6.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15279-1 | python311-pydata-sphinx-theme-0.16.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15278-1 | jupyter-plotly-6.1.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15277-1 | jupyter-panel-1.7.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15276-1 | jupyter-nbdime-7.0.2-20.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15275-1 | jupyter-nbclassic-1.3.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15274-1 | jupyter-jupyterlab-templates-0.5.2-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15273-1 | python311-jupyter-ydoc-3.1.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15272-1 | python311-jupyter-core-5.8.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15271-1 | jupyter-matplotlib-0.11.4-15.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15270-1 | python-furo-doc-2024.8.6-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15269-1 | jupyter-bqplot-jupyterlab-0.5.44-10.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15268-1 | python311-Django4-4.2.22-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-1016 | Use-of-uninitialized-value in Render_Single_Pass | 2023-10-14T13:02:55.073559Z | 2023-10-14T13:02:55.074040Z |
| osv-2023-1014 | Security exception in org.jsoup.parser.HtmlTreeBuilder.process | 2023-10-14T13:02:26.762298Z | 2023-10-14T13:02:26.762736Z |
| osv-2023-1012 | Global-buffer-overflow in iusace_quantize_lines | 2023-10-14T13:01:02.229783Z | 2023-10-14T13:01:02.230173Z |
| osv-2023-1009 | Security exception in net.jsign.bouncycastle.asn1.ASN1StreamParser.readVector | 2023-10-13T13:00:25.417249Z | 2023-10-13T13:00:25.417557Z |
| osv-2023-1008 | Heap-use-after-free in gx_image_enum_begin | 2023-10-12T13:03:53.274905Z | 2023-10-12T13:03:53.275223Z |
| osv-2023-1004 | Heap-buffer-overflow in ndpi_snprintf | 2023-10-12T13:00:14.575456Z | 2023-10-12T13:00:14.575776Z |
| osv-2023-1002 | Heap-buffer-overflow in iasecc_parse_get_tlv | 2023-10-11T13:02:47.831617Z | 2023-10-11T13:02:47.831905Z |
| osv-2023-1000 | Heap-use-after-free in xmlParserPrintFileContextInternal | 2023-10-11T13:01:01.023722Z | 2023-10-11T13:01:01.024042Z |
| osv-2023-970 | Heap-use-after-free in gx_device_forward_finalize | 2023-10-06T13:02:56.047818Z | 2023-10-10T15:17:30.632991Z |
| osv-2023-999 | Heap-buffer-overflow in xmlParseCommentComplex | 2023-10-10T13:03:42.825694Z | 2023-10-10T13:03:42.827194Z |
| osv-2023-997 | Heap-buffer-overflow in dxf_fixup_string | 2023-10-10T13:00:49.774042Z | 2023-10-10T13:00:49.774346Z |
| osv-2022-478 | Segv on unknown address | 2022-06-14T00:01:10.335839Z | 2023-10-09T14:11:11.908246Z |
| osv-2023-993 | Stack-buffer-overflow in entersafe_reverse_buffer | 2023-10-09T13:01:24.534357Z | 2023-10-09T13:01:24.534726Z |
| osv-2023-990 | Heap-use-after-free in __xmlRaiseError | 2023-10-08T13:03:35.608592Z | 2023-10-08T13:03:35.608892Z |
| osv-2023-989 | Heap-buffer-overflow in load_sections_64 | 2023-10-08T13:03:15.702919Z | 2023-10-08T13:03:15.703238Z |
| osv-2023-988 | Heap-buffer-overflow in xmlCopyCharMultiByte | 2023-10-08T13:03:08.264286Z | 2023-10-08T13:03:08.264696Z |
| osv-2023-980 | UNKNOWN READ in skip_chunk | 2023-10-07T13:03:05.608321Z | 2023-10-07T13:03:05.608627Z |
| osv-2023-978 | UNKNOWN READ in google::ParseTemplateArg | 2023-10-07T13:00:49.277768Z | 2023-10-07T13:00:49.278063Z |
| osv-2023-977 | Heap-buffer-overflow in _dwarf_memcpy_noswap_bytes | 2023-10-07T13:00:43.405502Z | 2023-10-07T13:00:43.405825Z |
| osv-2023-976 | Heap-buffer-overflow in Flow::dissectMDNS | 2023-10-07T13:00:27.532116Z | 2023-10-07T13:00:27.532412Z |
| osv-2023-974 | UNKNOWN READ in r_str_ncpy | 2023-10-07T13:00:25.541624Z | 2023-10-07T13:00:25.541917Z |
| osv-2023-547 | UNKNOWN READ in r_str_ncpy | 2023-07-08T14:00:22.061855Z | 2023-10-06T14:21:12.777567Z |
| osv-2023-971 | Out-of-memory in IndexSearchFuzzer | 2023-10-06T13:02:59.699745Z | 2023-10-06T13:02:59.700094Z |
| osv-2023-969 | Heap-use-after-free in xmlStaticCopyNode | 2023-10-06T13:01:29.969398Z | 2023-10-06T13:01:29.969714Z |
| osv-2023-965 | Heap-buffer-overflow in bit_TV_to_utf8 | 2023-10-05T13:03:03.441557Z | 2023-10-05T13:03:03.441853Z |
| osv-2023-962 | Security exception in java.base/java.util.regex.Pattern$GroupHead.match | 2023-10-05T13:00:30.156971Z | 2023-10-05T13:00:30.157534Z |
| osv-2022-511 | UNKNOWN READ in zfp_getcell | 2022-06-26T00:00:31.850695Z | 2023-10-04T14:10:02.526571Z |
| osv-2023-961 | Security exception in java.base/java.util.Arrays.copyOf | 2023-10-04T13:03:08.034505Z | 2023-10-04T13:03:08.034845Z |
| osv-2023-959 | Heap-buffer-overflow in _dwarf_memcpy_noswap_bytes | 2023-10-04T13:01:26.999017Z | 2023-10-04T13:01:26.999380Z |
| osv-2023-953 | Heap-buffer-overflow in xmlDictLookupInternal | 2023-10-03T13:01:18.896337Z | 2023-10-03T13:01:18.896661Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-cilium-2025-30163 | Node based network policies may incorrectly allow workload traffic | 2025-03-26T07:07:58.967Z | 2025-09-09T06:08:46.021Z |
| bit-cilium-2025-30162 | East-west traffic not subject to egress policy enforcement for requests via Gateway API load balancers | 2025-03-26T07:08:03.178Z | 2025-09-09T06:08:46.021Z |
| bit-powershell-2025-30399 | .NET and Visual Studio Remote Code Execution Vulnerability | 2025-09-04T17:48:59.298Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2025-21171 | .NET Remote Code Execution Vulnerability | 2025-09-04T17:48:57.882Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2024-30045 | .NET and Visual Studio Remote Code Execution Vulnerability | 2025-09-04T17:48:56.455Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2024-26190 | Microsoft QUIC Denial of Service Vulnerability | 2025-09-04T17:48:54.862Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2024-21409 | .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability | 2025-09-04T17:48:53.456Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2024-21392 | .NET and Visual Studio Denial of Service Vulnerability | 2025-09-04T17:48:52.052Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2023-36013 | PowerShell Information Disclosure Vulnerability | 2025-09-04T17:48:49.020Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2023-21538 | .NET Denial of Service Vulnerability | 2025-09-04T17:48:47.524Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2022-41121 | Windows Graphics Component Elevation of Privilege Vulnerability | 2025-09-04T17:48:45.951Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2022-41076 | PowerShell Remote Code Execution Vulnerability | 2025-09-04T17:48:44.658Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2022-34716 | .NET Spoofing Vulnerability | 2025-09-04T17:48:43.155Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2022-26788 | PowerShell Elevation of Privilege Vulnerability | 2025-09-04T17:48:41.821Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2022-24512 | .NET and Visual Studio Remote Code Execution Vulnerability | 2025-09-04T17:48:40.428Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2022-23267 | .NET and Visual Studio Denial of Service Vulnerability | 2025-09-04T17:48:39.121Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2021-43896 | Microsoft PowerShell Spoofing Vulnerability | 2025-09-04T17:48:37.745Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2021-41355 | .NET Core and Visual Studio Information Disclosure Vulnerability | 2025-09-04T17:48:36.166Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2020-8927 | Buffer overflow in Brotli library | 2025-09-04T17:48:34.485Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2020-1108 | 2025-09-04T17:48:33.089Z | 2025-09-04T18:07:55.535Z | |
| bit-powershell-2020-0951 | Windows Defender Application Control Security Feature Bypass Vulnerability | 2025-09-04T17:48:31.593Z | 2025-09-04T18:07:55.535Z |
| bit-kibana-2025-25010 | Kibana privilege escalation via reporting_user role | 2025-08-30T08:41:00.026Z | 2025-09-04T09:06:08.228Z |
| bit-helm-2025-53547 | Helm Chart Dependency Updating With Malicious Chart.yaml Content And Symlink Can Lead To Code Execution | 2025-07-10T05:43:09.073Z | 2025-09-04T09:06:08.228Z |
| bit-envoy-2025-46821 | Envoy vulnerable to bypass of RBAC uri_template permission | 2025-05-09T05:41:53.497Z | 2025-09-04T09:06:08.228Z |
| bit-elk-2025-25010 | Kibana privilege escalation via reporting_user role | 2025-08-30T08:38:09.297Z | 2025-09-04T09:06:08.228Z |
| bit-cilium-2024-42486 | Cilium vulnerable to information leakage via incorrect ReferenceGrant update logic in Gateway API | 2024-08-20T07:17:08.114Z | 2025-09-04T09:06:08.228Z |
| bit-prestashop-2025-25692 | 2025-08-07T08:58:52.761Z | 2025-09-03T11:06:29.028Z | |
| bit-prestashop-2025-25691 | 2025-08-07T08:58:51.176Z | 2025-09-03T11:06:29.028Z | |
| bit-prestashop-2024-41651 | 2024-10-04T07:18:17.936Z | 2025-09-03T11:06:29.028Z | |
| bit-moodle-2024-48901 | Moodle: idor when fetching report schedules | 2024-11-21T07:13:17.796Z | 2025-09-03T11:06:29.028Z |
| ID | Description | Updated |
|---|---|---|
| var-200505-0354 | Buffer overflow in the Foundation framework for Mac OS X 10.3.9 allows local users to exe… | 2024-07-23T20:17:16.312000Z |
| var-201206-0054 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T20:17:15.929000Z |
| var-200901-0726 | Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.0, iPhone OS 1.0… | 2024-07-23T20:17:14.213000Z |
| var-200904-0800 | The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before… | 2024-07-23T20:17:13.895000Z |
| var-201809-0686 | curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication c… | 2024-07-23T20:17:09.201000Z |
| var-201705-3873 | In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 me… | 2024-07-23T20:17:09.711000Z |
| var-201006-1234 | Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X… | 2024-07-23T20:17:09.441000Z |
| var-201903-0442 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:17:08.574000Z |
| var-200811-0321 | The plug-in interface in WebKit in Apple Safari before 3.2 does not prevent plug-ins from… | 2024-07-23T20:17:08.920000Z |
| var-202004-0345 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T20:17:07.679000Z |
| var-202109-1966 | There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a mal… | 2024-07-23T20:16:30.843000Z |
| var-200701-0341 | The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428… | 2024-07-23T20:16:29.180000Z |
| var-201904-1411 | A cross-origin issue existed with "iframe" elements. This was addressed with improved tra… | 2024-07-23T20:16:28.429000Z |
| var-201912-0532 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed … | 2024-07-23T20:16:27.834000Z |
| var-201805-0967 | Systems with microprocessors utilizing speculative execution and that perform speculative… | 2024-07-23T20:16:27.316000Z |
| var-201409-1147 | The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remot… | 2024-07-23T20:16:26.490000Z |
| var-201403-0275 | sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd… | 2024-07-23T20:15:55.666000Z |
| var-202112-1782 | Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not pro… | 2024-07-23T20:15:54.690000Z |
| var-200505-0350 | The AppleScript Editor in Mac OS X 10.3.9 does not properly display script code for an ap… | 2024-07-23T20:15:49.782000Z |
| var-201707-0556 | Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whites… | 2024-07-23T20:15:16.169000Z |
| var-201806-1456 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. iOS befor… | 2024-07-23T20:15:15.076000Z |
| var-201011-0178 | The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and poss… | 2024-07-23T20:15:12.423000Z |
| var-200505-0351 | Bluetooth-enabled systems in Mac OS X 10.3.9 enables the Bluetooth file exchange service … | 2024-07-23T20:15:10.160000Z |
| var-200701-0518 | The CFUserNotificationSendRequest function in UserNotificationCenter.app in Apple Mac OS … | 2024-07-23T20:15:09.518000Z |
| var-202204-0432 | Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based … | 2024-07-23T20:15:05.279000Z |
| var-201912-0496 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:15:05.516000Z |
| var-200901-0714 | OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFi… | 2024-07-23T20:15:05.042000Z |
| var-200709-0495 | Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server bef… | 2024-07-23T20:15:05.431000Z |
| var-202210-1202 | Git is an open source, scalable, distributed revision control system. Versions prior to 2… | 2024-07-23T20:15:03.784000Z |
| var-201306-0256 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T20:15:01.919000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2020-000008 | AWMS Mobile App vulnerable to improper server certificate verification | 2020-01-31T12:30+09:00 | 2021-04-12T13:30+09:00 |
| jvndb-2019-000052 | ApeosWare Management Suite and ApeosWare Management Suite 2 contain open redirect vulnerability | 2019-08-15T14:29+09:00 | 2021-04-12T13:30+09:00 |
| jvndb-2017-000219 | Multiple Fuji Xerox products may insecurely load Dynamic Link Libraries | 2017-08-31T16:35+09:00 | 2021-04-12T13:30+09:00 |
| jvndb-2021-000028 | Multiple vulnerabilities in multiple Aterm products | 2021-04-09T17:16+09:00 | 2021-04-09T17:16+09:00 |
| jvndb-2021-000030 | Multiple vulnerabilities in Aterm WF1200CR, Aterm WG1200CR, Aterm WG2600HS, and Aterm WX3000HP | 2021-04-09T16:42+09:00 | 2021-04-09T16:42+09:00 |
| jvndb-2021-000029 | Archive collectively operation utility vulnerable to directory traversal | 2021-04-01T14:44+09:00 | 2021-04-01T14:44+09:00 |
| jvndb-2021-000027 | Multiple vulnerabilities in baserCMS | 2021-03-26T14:25+09:00 | 2021-03-26T14:25+09:00 |
| jvndb-2021-000908 | rNote vulnerable to cross-site scripting | 2021-03-25T18:14+09:00 | 2021-03-25T18:14+09:00 |
| jvndb-2021-000907 | Yomi-Search vulnerable to cross-site scripting | 2021-03-25T18:12+09:00 | 2021-03-25T18:12+09:00 |
| jvndb-2021-000906 | Yomi-Search vulnerable to cross-site scripting | 2021-03-25T18:06+09:00 | 2021-03-25T18:06+09:00 |
| jvndb-2021-000905 | Yomi-Search vulnerable to cross-site scripting | 2021-03-25T18:01+09:00 | 2021-03-25T18:01+09:00 |
| jvndb-2021-000904 | Click Ranker vulnerable to cross-site scripting | 2021-03-25T17:52+09:00 | 2021-03-25T17:52+09:00 |
| jvndb-2021-000903 | Kagemai vulnerable to cross-site request forgery | 2021-03-25T17:50+09:00 | 2021-03-25T17:50+09:00 |
| jvndb-2021-000902 | Kagemai vulnerable to cross-site scripting | 2021-03-25T17:46+09:00 | 2021-03-25T17:46+09:00 |
| jvndb-2021-000901 | Kagemai vulnerable to cross-site scripting | 2021-03-25T17:43+09:00 | 2021-03-25T17:43+09:00 |
| jvndb-2021-000900 | MagazinegerZ vulnerable to cross-site scripting | 2021-03-25T17:32+09:00 | 2021-03-25T17:32+09:00 |
| jvndb-2021-000023 | UNIVERGE Aspire series PBX vulnerable to denial-of-service (DoS) | 2021-03-22T14:57+09:00 | 2021-03-22T14:57+09:00 |
| jvndb-2021-000025 | WordPress plugin "Paid Memberships Pro" vulnerable to SQL injection | 2021-03-17T16:24+09:00 | 2021-03-17T16:24+09:00 |
| jvndb-2021-000021 | M-System DL8 contains multiple vulnerabilities | 2021-03-12T15:59+09:00 | 2021-03-12T15:59+09:00 |
| jvndb-2021-000020 | Installer of MagicConnect Client program may insecurely load Dynamic Link Libraries | 2021-03-11T14:53+09:00 | 2021-03-11T14:53+09:00 |
| jvndb-2021-000019 | Multiple cross-site scripting vulnerabilities in GROWI | 2021-03-10T16:11+09:00 | 2021-03-10T16:11+09:00 |
| jvndb-2021-001122 | Trend Micro Security (Consumer) vulnerable to code injection | 2021-03-08T17:26+09:00 | 2021-03-08T17:26+09:00 |
| jvndb-2021-000015 | FileZen vulnerable to OS command injection | 2021-02-16T15:07+09:00 | 2021-03-05T17:31+09:00 |
| jvndb-2021-000016 | Multiple vulnerabilities in SolarView Compact | 2021-02-19T16:44+09:00 | 2021-02-25T15:31+09:00 |
| jvndb-2021-000017 | Multiple cross-site scripting vulnerabilities in Movable Type | 2021-02-24T15:20+09:00 | 2021-02-24T15:20+09:00 |
| jvndb-2021-001026 | Multiple Vulnerabilities in JP1/Automatic Operation | 2021-02-16T17:23+09:00 | 2021-02-16T17:23+09:00 |
| jvndb-2021-000014 | Calsos CSDJ fails to restrict access permissions | 2021-02-15T15:52+09:00 | 2021-02-15T15:52+09:00 |
| jvndb-2021-000013 | Wekan vulnerable to cross-site scripting | 2021-02-10T14:01+09:00 | 2021-02-10T14:01+09:00 |
| jvndb-2021-001022 | Cross-site Scripting Vulnerability in Hitachi Application Server Help | 2021-02-09T15:08+09:00 | 2021-02-09T15:08+09:00 |
| jvndb-2021-001021 | Improper access control vulnerability in JP1/IT Desktop Management 2 - Manager and JP1/NETM/Asset Information Manager | 2021-02-09T15:08+09:00 | 2021-02-09T15:08+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:3899-1 | Security update for colord | 2025-10-31T14:56:12Z | 2025-10-31T14:56:12Z |
| suse-su-2025:3897-1 | Security update for libssh | 2025-10-31T14:55:41Z | 2025-10-31T14:55:41Z |
| suse-su-2025:1771-1 | Security update for iputils | 2025-10-31T09:58:20Z | 2025-10-31T09:58:20Z |
| suse-su-2025:3892-1 | Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) | 2025-10-31T08:56:44Z | 2025-10-31T08:56:44Z |
| suse-su-2025:3888-1 | Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7) | 2025-10-31T07:04:06Z | 2025-10-31T07:04:06Z |
| suse-su-2025:3889-1 | Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP7) | 2025-10-31T06:34:00Z | 2025-10-31T06:34:00Z |
| suse-su-2025:3886-1 | Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP7) | 2025-10-31T06:05:31Z | 2025-10-31T06:05:31Z |
| suse-su-2025:3880-1 | Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6) | 2025-10-31T05:35:32Z | 2025-10-31T05:35:32Z |
| suse-su-2025:3878-1 | Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6) | 2025-10-31T05:11:42Z | 2025-10-31T05:11:42Z |
| suse-su-2025:3875-1 | Security update for libxslt | 2025-10-30T15:27:08Z | 2025-10-30T15:27:08Z |
| suse-su-2025:3874-1 | Security update for xwayland | 2025-10-30T15:25:37Z | 2025-10-30T15:25:37Z |
| suse-su-2025:3873-1 | Security update for strongswan | 2025-10-30T15:10:54Z | 2025-10-30T15:10:54Z |
| suse-su-2025:3872-1 | Security update for xorg-x11-server | 2025-10-30T15:09:46Z | 2025-10-30T15:09:46Z |
| suse-su-2025:3869-1 | Security update for himmelblau | 2025-10-30T13:45:10Z | 2025-10-30T13:45:10Z |
| suse-su-2025:3868-1 | Security update for chrony | 2025-10-30T13:44:59Z | 2025-10-30T13:44:59Z |
| suse-su-2025:3867-1 | Security update for ImageMagick | 2025-10-30T13:41:13Z | 2025-10-30T13:41:13Z |
| suse-su-2025:3866-1 | Security update for xorg-x11-server | 2025-10-30T13:40:40Z | 2025-10-30T13:40:40Z |
| suse-su-2025:3865-1 | Security update for xorg-x11-server | 2025-10-30T13:40:16Z | 2025-10-30T13:40:16Z |
| suse-su-2025:3864-1 | Security update for xorg-x11-server | 2025-10-30T13:40:00Z | 2025-10-30T13:40:00Z |
| suse-su-2025:3863-1 | Security update for xwayland | 2025-10-30T13:39:29Z | 2025-10-30T13:39:29Z |
| suse-su-2025:20965-1 | Security update for libsoup | 2025-10-30T13:31:46Z | 2025-10-30T13:31:46Z |
| suse-su-2025:20964-1 | Security update for colord | 2025-10-30T12:29:30Z | 2025-10-30T12:29:30Z |
| suse-su-2025:3859-1 | Security update for java-21-openjdk | 2025-10-29T15:10:24Z | 2025-10-29T15:10:24Z |
| suse-su-2025:3858-1 | Security update for xorg-x11-server | 2025-10-29T15:09:00Z | 2025-10-29T15:09:00Z |
| suse-su-2025:3857-1 | Security update for strongswan | 2025-10-29T14:16:52Z | 2025-10-29T14:16:52Z |
| suse-su-2025:3856-1 | Security update for strongswan | 2025-10-29T14:16:31Z | 2025-10-29T14:16:31Z |
| suse-su-2025:3855-1 | Security update for strongswan | 2025-10-29T14:15:40Z | 2025-10-29T14:15:40Z |
| suse-su-2025:3845-1 | Security update for fetchmail | 2025-10-28T16:42:49Z | 2025-10-28T16:42:49Z |
| suse-su-2025:3844-1 | Security update for ImageMagick | 2025-10-28T16:41:56Z | 2025-10-28T16:41:56Z |
| suse-su-2025:3843-1 | Security update for xen | 2025-10-28T16:40:49Z | 2025-10-28T16:40:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-02682 | Orangescrum跨站脚本漏洞(CNVD-2026-02682) | 2023-02-13 | 2026-01-09 |
| cnvd-2026-02681 | Orangescrum跨站脚本漏洞(CNVD-2026-02681) | 2023-04-07 | 2026-01-09 |
| cnvd-2026-02680 | Orangescrum跨站脚本漏洞(CNVD-2026-02680) | 2023-06-30 | 2026-01-09 |
| cnvd-2026-02679 | Orangescrum跨站脚本漏洞(CNVD-2026-02679) | 2025-02-08 | 2026-01-09 |
| cnvd-2026-00691 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00691) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00690 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00690) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00689 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00689) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00688 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00688) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00687 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00687) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00686 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00686) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00685 | Adobe Experience Manager跨站脚本洞(CNVD-2026-00685) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00684 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00684) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-02660 | CMSimple目录遍历漏洞 | 2022-04-15 | 2026-01-08 |
| cnvd-2026-02659 | CMSimple_XH代码执行漏洞 | 2022-05-11 | 2026-01-08 |
| cnvd-2026-02655 | CMSimple_XH跨站脚本漏洞(CNVD-2026-02655) | 2024-06-28 | 2026-01-08 |
| cnvd-2026-02646 | CMSimple不安全权限漏洞 | 2025-02-18 | 2026-01-08 |
| cnvd-2026-02645 | UTT 进取 750W未经验证的密码更改漏洞 | 2025-07-08 | 2026-01-08 |
| cnvd-2026-02644 | UTT 进取 750W缓冲区溢出漏洞(CNVD-2026-02644) | 2025-07-08 | 2026-01-08 |
| cnvd-2026-02643 | UTT 进取 750W缓冲区溢出漏洞(CNVD-2026-02643) | 2025-07-15 | 2026-01-08 |
| cnvd-2026-02642 | CMSimple_XH跨站脚本漏洞(CNVD-2026-02642) | 2025-11-11 | 2026-01-08 |
| cnvd-2026-02641 | CMSimple_XH跨站脚本漏洞 | 2025-11-11 | 2026-01-08 |
| cnvd-2026-02639 | CMSimple_XH代码执行漏洞 | 2025-12-29 | 2026-01-08 |
| cnvd-2026-00820 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00820) | 2025-07-01 | 2026-01-08 |
| cnvd-2026-00819 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00819) | 2025-07-01 | 2026-01-08 |
| cnvd-2026-00818 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00818) | 2025-07-01 | 2026-01-08 |
| cnvd-2026-00817 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00817) | 2025-07-11 | 2026-01-08 |
| cnvd-2026-00816 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00816) | 2025-07-11 | 2026-01-08 |
| cnvd-2026-00815 | UTT HiPER 840G aspRemoteApConfTempSend文件缓冲区溢出漏洞 | 2025-07-21 | 2026-01-08 |
| cnvd-2026-00814 | UTT HiPER 840G aspApBasicConfigUrcp文件缓冲区溢出漏洞 | 2025-07-21 | 2026-01-08 |
| cnvd-2026-00813 | UTT 1200GW缓冲区溢出漏洞 | 2025-09-11 | 2026-01-08 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0867 | Multiples vulnérabilités dans les produits SAP | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| CERTFR-2025-AVI-0866 | Vulnérabilité dans Elastic Cloud Enterprise | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| certfr-2025-avi-0865 | Vulnérabilité dans Oracle E-Business Suite | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| certfr-2025-avi-0864 | Multiples vulnérabilités dans VMware Tanzu | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| certfr-2025-avi-0863 | Vulnérabilité dans Belden HiOS Switch Platform | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| CERTFR-2025-AVI-0865 | Vulnérabilité dans Oracle E-Business Suite | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| CERTFR-2025-AVI-0864 | Multiples vulnérabilités dans VMware Tanzu | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| CERTFR-2025-AVI-0863 | Vulnérabilité dans Belden HiOS Switch Platform | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| certfr-2025-avi-0862 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0861 | Multiples vulnérabilités dans les produits IBM | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0860 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0859 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0858 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0862 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0861 | Multiples vulnérabilités dans les produits IBM | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0860 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0859 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0858 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0857 | Vulnérabilité dans Wireshark | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0856 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0855 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0854 | Vulnérabilité dans les produits Moxa | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0853 | Multiples vulnérabilités dans GitLab | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0852 | Vulnérabilité dans Tenable Security Center | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0857 | Vulnérabilité dans Wireshark | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0856 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0855 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0854 | Vulnérabilité dans les produits Moxa | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0853 | Multiples vulnérabilités dans GitLab | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0852 | Vulnérabilité dans Tenable Security Center | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |