Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-65046 |
3.1 (3.1)
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Microsoft |
Microsoft Edge for Android |
2025-12-18T22:01:43.462Z | 2026-02-20T15:59:44.671Z |
| CVE-2025-62221 |
7.8 (3.1)
|
Windows Cloud Files Mini Filter Driver Elevation of Pr… |
Microsoft |
Windows 10 Version 1809 |
2025-12-09T17:56:10.169Z | 2026-02-20T15:59:44.128Z |
| CVE-2025-64677 |
8.2 (3.1)
|
Office Out-of-Box Experience Spoofing Vulnerability |
Microsoft |
Office Out-of-Box Experience |
2025-12-18T22:02:08.421Z | 2026-02-20T15:59:43.534Z |
| CVE-2025-64676 |
7.2 (3.1)
|
Microsoft Purview eDiscovery Remote Code Execution Vul… |
Microsoft |
Microsoft Purview |
2025-12-18T22:02:07.323Z | 2026-02-20T15:59:42.469Z |
| CVE-2025-64675 |
8.3 (3.1)
|
Azure Cosmos DB Spoofing Vulnerability |
Microsoft |
Azure Cosmos DB |
2025-12-18T23:15:31.241Z | 2026-02-20T15:59:42.938Z |
| CVE-2025-65041 |
10 (3.1)
|
Microsoft Partner Center Elevation of Privilege Vulner… |
Microsoft |
Microsoft Partner Center |
2025-12-18T22:02:06.021Z | 2026-02-20T15:59:41.412Z |
| CVE-2025-65037 |
10 (3.1)
|
Azure Container Apps Remote Code Execution Vulnerability |
Microsoft |
Azure Container Apps |
2025-12-18T22:02:06.737Z | 2026-02-20T15:59:41.936Z |
| CVE-2025-64663 |
9.9 (3.1)
|
Custom Question Answering Elevation of Privilege Vulne… |
Microsoft |
Azure Cognitive Service for Language |
2025-12-18T22:02:05.377Z | 2026-02-20T15:59:40.872Z |
| CVE-2025-54100 |
7.8 (3.1)
|
PowerShell Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:09.562Z | 2026-02-20T15:59:40.386Z |
| CVE-2025-64680 |
7.8 (3.1)
|
Windows DWM Core Library Elevation of Privilege Vulner… |
Microsoft |
Windows 10 Version 1507 |
2025-12-09T17:56:08.904Z | 2026-02-20T15:59:39.816Z |
| CVE-2025-64679 |
7.8 (3.1)
|
Windows DWM Core Library Elevation of Privilege Vulner… |
Microsoft |
Windows 10 Version 1507 |
2025-12-09T17:56:08.304Z | 2026-02-20T15:59:39.320Z |
| CVE-2025-64678 |
8.8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Remot… |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:07.648Z | 2026-02-20T15:59:38.794Z |
| CVE-2025-64672 |
8.8 (3.1)
|
Microsoft SharePoint Server Spoofing Vulnerability |
Microsoft |
Microsoft SharePoint Server Subscription Edition |
2025-12-09T17:56:06.979Z | 2026-02-20T15:59:38.190Z |
| CVE-2025-64671 |
8.4 (3.1)
|
GitHub Copilot for Jetbrains Remote Code Execution Vul… |
Microsoft |
GitHub Copilot Plugin for JetBrains IDEs |
2025-12-09T17:56:06.407Z | 2026-02-20T15:59:37.589Z |
| CVE-2025-64661 |
7.8 (3.1)
|
Windows Shell Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:05.748Z | 2026-02-20T15:59:37.038Z |
| CVE-2025-62565 |
7.3 (3.1)
|
Windows File Explorer Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:05.233Z | 2026-02-20T15:59:36.459Z |
| CVE-2025-62570 |
7.1 (3.1)
|
Windows Camera Frame Server Monitor Information Disclo… |
Microsoft |
Windows 11 Version 24H2 |
2025-12-09T17:56:04.617Z | 2026-02-20T15:59:35.989Z |
| CVE-2025-62569 |
7 (3.1)
|
Microsoft Brokering File System Elevation of Privilege… |
Microsoft |
Windows 11 Version 24H2 |
2025-12-09T17:56:04.070Z | 2026-02-20T15:59:35.250Z |
| CVE-2025-62567 |
5.3 (3.1)
|
Windows Hyper-V Denial of Service Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:03.534Z | 2026-02-20T15:59:34.220Z |
| CVE-2025-62560 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:56:01.139Z | 2026-02-20T15:59:33.671Z |
| CVE-2025-62559 |
7.8 (3.1)
|
Microsoft Word Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:59.808Z | 2026-02-20T15:59:33.072Z |
| CVE-2025-62558 |
7.8 (3.1)
|
Microsoft Word Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:59.203Z | 2026-02-20T15:59:32.484Z |
| CVE-2025-62557 |
8.4 (3.1)
|
Microsoft Office Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:58.494Z | 2026-02-20T15:59:31.969Z |
| CVE-2025-62556 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:57.872Z | 2026-02-20T15:59:31.271Z |
| CVE-2025-62555 |
7 (3.1)
|
Microsoft Word Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:57.189Z | 2026-02-20T15:59:30.660Z |
| CVE-2025-62554 |
8.4 (3.1)
|
Microsoft Office Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:56.579Z | 2026-02-20T15:59:29.932Z |
| CVE-2025-62553 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:55.901Z | 2026-02-20T15:59:29.361Z |
| CVE-2025-62552 |
7.8 (3.1)
|
Microsoft Access Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:55.308Z | 2026-02-20T15:59:28.828Z |
| CVE-2025-62550 |
8.8 (3.1)
|
Azure Monitor Agent Remote Code Execution Vulnerability |
Microsoft |
Azure Monitor |
2025-12-09T17:55:54.642Z | 2026-02-20T15:59:28.230Z |
| CVE-2025-62474 |
7.8 (3.1)
|
Windows Remote Access Connection Manager Elevation of … |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:55:53.947Z | 2026-02-20T15:59:27.667Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-26216 |
10 (4.0)
10 (3.1)
|
Crawl4AI < 0.8.0 Docker API Unauthenticated Remote Cod… |
unclecode |
Crawl4AI |
2026-02-12T15:31:20.810Z | 2026-02-12T21:01:12.851Z |
| CVE-2026-2623 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Blossom File Upload BLOSManager.java put path traversal |
n/a |
Blossom |
2026-02-17T21:02:39.562Z | 2026-02-17T21:36:00.355Z |
| CVE-2025-65036 |
8.3 (3.1)
|
XWiki Remote Macros vulnerable to remote code executio… |
xwikisas |
xwiki-pro-macros |
2025-12-05T16:10:08.595Z | 2025-12-05T16:27:31.564Z |
| CVE-2025-25257 |
9.6 (3.1)
|
An improper neutralization of special elements us… |
Fortinet |
FortiWeb |
2025-07-17T15:10:04.532Z | 2026-02-20T15:41:15.908Z |
| CVE-2025-13333 |
4.4 (3.1)
|
IBM WebSphere Application Server could provide weaker … |
IBM |
WebSphere Application Server |
2026-02-17T22:45:10.891Z | 2026-02-18T20:41:58.252Z |
| CVE-2025-13689 |
8.8 (3.1)
|
DataStage on Cloud Pak for Data is vulnerable to arbit… |
IBM |
DataStage on Cloud Pak |
2026-02-17T22:26:20.866Z | 2026-02-19T04:55:49.939Z |
| CVE-2026-27171 |
2.9 (3.1)
|
zlib before 1.3.2 allows CPU consumption via crc3… |
zlib |
zlib |
2026-02-18T02:36:19.509Z | 2026-02-18T13:38:55.713Z |
| CVE-2026-26065 |
9.3 (4.0)
|
calibre: Path Traversal can Lead to Arbitrary File Wri… |
kovidgoyal |
calibre |
2026-02-20T01:54:03.128Z | 2026-02-20T16:41:32.281Z |
| CVE-2020-37100 |
8.5 (4.0)
7.8 (3.1)
|
Sync Breeze Enterprise 12.4.18 - Unquoted Service Path |
SyncBreeze |
Sync Breeze Enterprise |
2026-02-03T14:49:22.876Z | 2026-02-03T17:06:35.960Z |
| CVE-2025-66412 |
8.5 (4.0)
|
Angular Stored XSS Vulnerability via SVG Animation, SV… |
angular |
angular |
2025-12-01T22:35:59.211Z | 2025-12-02T14:13:07.801Z |
| CVE-2026-22269 |
4.7 (3.1)
|
Dell PowerProtect Data Manager, version(s) prior … |
Dell |
PowerProtect Data Manager |
2026-02-19T09:00:56.035Z | 2026-02-20T16:09:36.834Z |
| CVE-2026-22266 |
4.7 (3.1)
|
Dell PowerProtect Data Manager, version(s) prior … |
Dell |
PowerProtect Data Manager |
2026-02-19T09:06:21.289Z | 2026-02-20T16:10:51.265Z |
| CVE-2026-22267 |
8.1 (3.1)
|
Dell PowerProtect Data Manager, version(s) prior … |
Dell |
PowerProtect Data Manager |
2026-02-19T09:16:54.151Z | 2026-02-21T04:56:31.271Z |
| CVE-2026-26977 |
6.9 (4.0)
|
Frappe Learning Management System exposes details of u… |
frappe |
lms |
2026-02-20T00:56:42.680Z | 2026-02-20T15:35:48.470Z |
| CVE-2026-26987 |
5.3 (4.0)
|
LibreNMS affected by reflected XSS via email field |
librenms |
librenms |
2026-02-20T01:11:13.925Z | 2026-02-20T15:35:18.059Z |
| CVE-2019-25395 |
5.3 (4.0)
7.2 (3.1)
|
Smoothwall Express 3.1 'preferences.cgi' Cross-Site Sc… |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:07.943Z | 2026-02-17T14:48:00.873Z |
| CVE-2026-26988 |
9.3 (4.0)
|
LibreNMS: SQL Injection in ajax_table.php spreads thro… |
librenms |
librenms |
2026-02-20T01:17:15.699Z | 2026-02-20T15:35:06.925Z |
| CVE-2019-25394 |
5.3 (4.0)
7.2 (3.1)
|
Smoothwall Express 3.1 'modem.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:07.096Z | 2026-02-17T14:50:19.914Z |
| CVE-2019-25393 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'smoothinfo.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:06.185Z | 2026-02-17T14:51:08.648Z |
| CVE-2019-25392 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'iptools.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:05.287Z | 2026-02-17T16:45:08.369Z |
| CVE-2019-25390 |
4.8 (4.0)
5.4 (3.1)
|
Smoothwall Express 3.1 'interfaces.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:04.134Z | 2026-02-17T14:56:58.987Z |
| CVE-2019-25389 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'timedaccess.cgi' Cross-Site Sc… |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:03.304Z | 2026-02-17T14:58:09.041Z |
| CVE-2019-25379 |
5.3 (4.0)
7.2 (3.1)
|
Smoothwall Express 3.1 'urlfilter.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:54.146Z | 2026-02-17T16:49:23.149Z |
| CVE-2019-25388 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'ipblock.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:02.339Z | 2026-02-17T14:59:00.951Z |
| CVE-2019-25387 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'xtaccess.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:00.882Z | 2026-02-17T14:59:43.686Z |
| CVE-2019-25386 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'dmzholes.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:59.952Z | 2026-02-17T15:00:17.142Z |
| CVE-2019-25385 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'outgoing.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:59.120Z | 2026-02-17T15:00:51.195Z |
| CVE-2019-25384 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'portfw.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:58.295Z | 2026-02-17T16:45:24.262Z |
| CVE-2019-25383 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'apcupsd.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:57.460Z | 2026-02-17T16:45:38.976Z |
| CVE-2019-25381 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'hosts.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:55.894Z | 2026-02-17T16:48:42.411Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-65036 | XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Con… | 2025-12-05T17:16:03.780 | 2026-02-20T16:51:07.327 |
| fkie_cve-2025-25257 | An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerabili… | 2025-07-17T16:15:34.723 | 2026-02-20T16:49:01.030 |
| fkie_cve-2025-13333 | IBM WebSphere Application Server 9.0, and 8.5 could provide weaker than expected security during sy… | 2026-02-17T23:16:18.150 | 2026-02-20T16:49:01.233 |
| fkie_cve-2025-13689 | IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands… | 2026-02-17T23:16:18.740 | 2026-02-20T16:47:33.860 |
| fkie_cve-2026-27171 | zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmod… | 2026-02-18T04:16:01.263 | 2026-02-20T16:45:28.827 |
| fkie_cve-2026-26065 | calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books… | 2026-02-20T02:16:53.730 | 2026-02-20T16:45:18.507 |
| fkie_cve-2020-37100 | Sync Breeze Enterprise 12.4.18 contains an unquoted service path vulnerability that allows local at… | 2026-02-03T15:16:10.780 | 2026-02-20T16:38:24.573 |
| fkie_cve-2025-66412 | Angular is a development platform for building mobile and desktop web applications using TypeScript… | 2025-12-01T23:15:53.890 | 2026-02-20T16:37:23.807 |
| fkie_cve-2026-22269 | Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Improper Verification of S… | 2026-02-19T09:16:11.430 | 2026-02-20T16:36:41.030 |
| fkie_cve-2026-22266 | Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Improper Verification of S… | 2026-02-19T10:16:11.630 | 2026-02-20T16:36:07.650 |
| fkie_cve-2026-22267 | Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Incorrect Privilege Assign… | 2026-02-19T10:16:11.800 | 2026-02-20T16:33:47.890 |
| fkie_cve-2026-26977 | Frappe Learning Management System (LMS) is a learning system that helps users structure their conte… | 2026-02-20T02:16:54.057 | 2026-02-20T16:33:11.057 |
| fkie_cve-2026-26987 | LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and … | 2026-02-20T02:16:54.383 | 2026-02-20T16:32:16.380 |
| fkie_cve-2019-25395 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple stored cross-site scripting vulne… | 2026-02-16T18:19:44.480 | 2026-02-20T16:31:49.890 |
| fkie_cve-2026-26988 | LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and … | 2026-02-20T02:16:54.550 | 2026-02-20T16:31:42.897 |
| fkie_cve-2019-25394 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple stored cross-site scripting vulne… | 2026-02-16T18:19:44.313 | 2026-02-20T16:31:34.660 |
| fkie_cve-2019-25393 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:19:44.147 | 2026-02-20T16:31:23.993 |
| fkie_cve-2019-25392 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:19:43.980 | 2026-02-20T16:31:18.553 |
| fkie_cve-2019-25390 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:19:43.810 | 2026-02-20T16:31:10.263 |
| fkie_cve-2019-25389 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:19:43.643 | 2026-02-20T16:30:56.780 |
| fkie_cve-2019-25379 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains stored and reflected cross-site scripting … | 2026-02-16T18:19:41.987 | 2026-02-20T16:30:43.613 |
| fkie_cve-2019-25388 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:19:43.473 | 2026-02-20T16:27:01.120 |
| fkie_cve-2019-25387 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:19:43.303 | 2026-02-20T16:26:53.380 |
| fkie_cve-2019-25386 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:19:43.133 | 2026-02-20T16:26:47.313 |
| fkie_cve-2019-25385 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:19:42.967 | 2026-02-20T16:26:41.493 |
| fkie_cve-2019-25384 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:19:42.803 | 2026-02-20T16:26:36.247 |
| fkie_cve-2019-25383 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:19:42.640 | 2026-02-20T16:26:19.230 |
| fkie_cve-2019-25381 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:19:42.317 | 2026-02-20T16:26:07.903 |
| fkie_cve-2019-25380 | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:19:42.153 | 2026-02-20T16:25:48.847 |
| fkie_cve-2026-26989 | LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and … | 2026-02-20T02:16:54.710 | 2026-02-20T16:25:20.917 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-r3f7-9rj4-j5fm |
|
In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race in mptcp_pm_nl… | 2026-02-14T18:30:15Z | 2026-02-19T18:31:43Z |
| ghsa-mmqq-p5mv-jc88 |
5.6 (3.1)
6.3 (4.0)
|
A third-party NAT traversal module fails to validate SSL/TLS certificates when connecting to the si… | 2026-02-03T03:30:28Z | 2026-02-19T18:31:43Z |
| ghsa-jf4c-6xg3-hjc6 |
4.9 (3.1)
6.9 (4.0)
|
In Quick.Cart user passwords are stored in plaintext form. An attacker with high privileges can dis… | 2026-02-05T12:30:26Z | 2026-02-19T18:31:43Z |
| ghsa-h85p-pj9x-mcrr |
5.9 (3.1)
8.9 (4.0)
|
The API communication component fails to validate the SSL/TLS certificate when sending HTTPS reques… | 2026-02-03T03:30:27Z | 2026-02-19T18:31:43Z |
| ghsa-fm67-x2fw-2g76 |
9.8 (3.1)
9.3 (4.0)
|
Vulnerability in root-project root (builtins/zlib modules). This vulnerability is associated with p… | 2026-01-27T09:30:30Z | 2026-02-19T18:31:43Z |
| ghsa-78vp-42ph-7f4v |
5.9 (3.1)
8.9 (4.0)
|
The DDNS update function in ADM fails to properly validate the hostname of the DDNS server's TLS/SS… | 2026-02-03T03:30:27Z | 2026-02-19T18:31:43Z |
| ghsa-75g2-xj79-xvcw |
9.8 (3.1)
9.5 (4.0)
|
When a specific function is enabled while joining a AD Domain from ADM, an improper input parameter… | 2026-02-03T06:31:05Z | 2026-02-19T18:31:43Z |
| ghsa-5xhg-pwmp-mxj2 |
|
In the Linux kernel, the following vulnerability has been resolved: mptcp: ensure context reset on… | 2026-01-14T15:33:02Z | 2026-02-19T18:31:43Z |
| ghsa-53xr-2xx3-73wm |
3.7 (3.1)
6.3 (4.0)
|
The DDNS function uses an insecure HTTP connection or fails to validate the SSL/TLS certificate whe… | 2026-02-03T03:30:27Z | 2026-02-19T18:31:43Z |
| ghsa-4rhr-9xj2-x9gx |
|
In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix hugetlb_pmd_sh… | 2026-02-04T18:30:44Z | 2026-02-19T18:31:43Z |
| ghsa-3qgq-r69m-f2f7 |
9.3 (4.0)
|
Vulnerability in root-project root (builtins/zlib modules). This vulnerability is associated with p… | 2026-01-27T09:30:30Z | 2026-02-19T18:31:43Z |
| ghsa-xrr8-p4pf-hfwr |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: nfsd: don't ignore the return … | 2025-04-16T15:34:39Z | 2026-02-19T18:31:42Z |
| ghsa-w4x2-878r-xjgp |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: stmmac: Fix accessing fre… | 2025-05-01T15:31:41Z | 2026-02-19T18:31:42Z |
| ghsa-mw57-63xv-7mx2 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: Add missing lo… | 2025-08-22T18:31:22Z | 2026-02-19T18:31:42Z |
| ghsa-jf3w-82f5-fq58 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix invalid derefence… | 2025-10-07T18:31:08Z | 2026-02-19T18:31:42Z |
| ghsa-hp7p-hw7m-prxm |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: fix of_iomap me… | 2025-09-18T18:30:27Z | 2026-02-19T18:31:42Z |
| ghsa-gvh3-4cff-qfpj |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: set ATTR_CTIME flags wh… | 2025-01-15T15:31:25Z | 2026-02-19T18:31:42Z |
| ghsa-g7f2-49vp-j5f7 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ACPI: APEI: send SIGBUS to cur… | 2025-09-11T18:35:52Z | 2026-02-19T18:31:42Z |
| ghsa-7mv8-qr93-j282 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: dsa: free routing table o… | 2025-05-01T15:31:44Z | 2026-02-19T18:31:42Z |
| ghsa-5gcf-h7r6-w82j |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: smb: client: set correct id, u… | 2024-04-17T12:32:02Z | 2026-02-19T18:31:42Z |
| ghsa-5c8q-r66v-f4fc |
7.5 (3.1)
8.3 (4.0)
|
Exposure of Private Personal Information to an Unauthorized Actor vulnerability in RTI Connext Prof… | 2025-12-16T18:31:32Z | 2026-02-19T18:31:42Z |
| ghsa-4qc6-52f6-6vgr |
4.7 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: xsk: Fix race condition in AF_… | 2025-05-20T18:30:54Z | 2026-02-19T18:31:42Z |
| ghsa-4fxr-v6jm-9j9m |
|
In the Linux kernel, the following vulnerability has been resolved: devlink: rate: Unset parent po… | 2025-12-04T18:30:53Z | 2026-02-19T18:31:42Z |
| ghsa-2v48-hmwv-qpj8 |
7.8 (3.1)
7.3 (4.0)
|
Uncontrolled Search Path Element vulnerability in Yandex Telemost on MacOS allows Search Order Hija… | 2025-12-09T18:30:37Z | 2026-02-19T18:31:42Z |
| ghsa-2m44-r2x5-4q79 |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix racy bitfield write… | 2025-12-24T12:30:29Z | 2026-02-19T18:31:42Z |
| ghsa-2jg8-5xcc-qjcx |
8.8 (3.1)
7.1 (4.0)
|
Authentication Bypass by Spoofing vulnerability in HYPR Server allows Identity Spoofing.This issue … | 2025-12-11T18:30:45Z | 2026-02-19T18:31:42Z |
| ghsa-ww95-r66q-v2hh |
|
SoftVision webPDF before 10.0.2 is vulnerable to Server-Side Request Forgery (SSRF). The PDF conver… | 2026-02-19T15:30:35Z | 2026-02-19T15:30:35Z |
| ghsa-rf92-7gjw-vm2g |
6.1 (3.1)
5.1 (4.0)
|
Comodo Dome Firewall 2.7.0 contains a reflected cross-site scripting vulnerability that allows atta… | 2026-02-19T15:30:35Z | 2026-02-19T15:30:35Z |
| ghsa-qx2f-v62g-3w7p |
6.1 (3.1)
5.1 (4.0)
|
Comodo Dome Firewall 2.7.0 contains multiple reflected cross-site scripting vulnerabilities in the … | 2026-02-19T15:30:35Z | 2026-02-19T15:30:35Z |
| ghsa-p5q9-gghv-g686 |
6.1 (3.1)
5.1 (4.0)
|
Comodo Dome Firewall 2.7.0 contains a reflected cross-site scripting vulnerability that allows atta… | 2026-02-19T15:30:35Z | 2026-02-19T15:30:35Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43018 |
|
WsgiDAV is a generic and extendable WebDAV server based on WSGI. Implementations using th… | wsgidav | 2022-11-11T21:15:00Z | 2023-05-04T04:29:31.369774Z |
| pysec-2021-875 |
|
The module `AccessControl` defines security policies for Python code used in restricted c… | zope | 2021-07-30T22:15:00Z | 2023-05-04T04:29:31.501472Z |
| pysec-2022-43016 |
|
A vulnerability, which was classified as problematic, has been found in UBI Reader up to … | ubi-reader | 2022-12-17T02:15:00Z | 2023-05-04T04:29:30.474506Z |
| pysec-2022-43013 |
|
Slixmpp before 1.8.3 lacks SSL Certificate hostname validation in XMLStream, allowing an … | slixmpp | 2022-12-25T05:15:00Z | 2023-05-04T04:29:29.928881Z |
| pysec-2022-43012 |
|
Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cau… | setuptools | 2022-12-23T00:15:00Z | 2023-05-04T04:29:29.797493Z |
| pysec-2022-43011 |
|
Sentry is an error tracking and performance monitoring platform. In versions of the sentr… | sentry | 2022-12-10T01:15:00Z | 2023-05-04T04:29:29.699170Z |
| pysec-2022-43002 |
|
Improper Privilege Management in GitHub repository ikus060/rdiffweb prior to 2.5.2. | rdiffweb | 2022-12-12T18:15:00Z | 2023-05-04T04:29:29.006053Z |
| pysec-2022-43001 |
|
Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior … | rdiffweb | 2022-11-16T13:15:00Z | 2023-05-04T04:29:28.960174Z |
| pysec-2022-43000 |
|
Insufficient Session Expiration in GitHub repository ikus060/rdiffweb prior to 2.5.0. | rdiffweb | 2022-11-14T21:15:00Z | 2023-05-04T04:29:28.911542Z |
| pysec-2022-42999 |
|
** DISPUTED ** In the python-libnmap package through 0.7.2 for Python, remote command exe… | python-libnmap | 2022-05-04T22:15:00Z | 2023-05-04T04:29:28.652969Z |
| pysec-2022-42998 |
|
A directory traversal vulnerability in the SevenZipFile.extractall() function of the pyth… | py7zr | 2022-12-06T20:15:00Z | 2023-05-04T04:29:28.497759Z |
| pysec-2022-42997 |
|
Passeo is an open source python password generator. Versions prior to 1.0.5 rely on the p… | passeo | 2022-12-06T18:15:00Z | 2023-05-04T04:29:27.942516Z |
| pysec-2022-42996 |
|
MPXJ is an open source library to read and write project plans from a variety of file for… | mpxj | 2022-11-25T19:15:00Z | 2023-05-04T04:29:27.436392Z |
| pysec-2022-42995 |
|
A vulnerability was found in keylime. This security issue happens in some circumstances, … | keylime | 2022-11-22T19:15:00Z | 2023-05-04T04:29:25.773897Z |
| pysec-2022-42994 |
|
GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to 0.1.5 are v… | guarddog | 2022-12-17T00:15:00Z | 2023-05-04T04:29:25.595529Z |
| pysec-2022-42993 |
|
GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to v0.1.8 are … | guarddog | 2022-12-16T23:15:00Z | 2023-05-04T04:29:25.550921Z |
| pysec-2022-42990 |
|
A vulnerability was found in collective.task up to 3.0.9. It has been classified as probl… | collective-task | 2022-12-15T21:15:00Z | 2023-05-04T04:29:24.403566Z |
| pysec-2022-42988 |
|
A vulnerability classified as problematic was found in collective.contact.widget up to 1.… | collective-contact-widget | 2022-12-21T22:15:00Z | 2023-05-04T04:29:24.049172Z |
| pysec-2022-42987 |
|
CKAN through 2.9.6 account takeovers by unauthenticated users when an existing user id is… | ckan | 2022-11-22T01:15:00Z | 2023-05-04T04:29:23.890366Z |
| pysec-2022-42985 |
|
Arches is a web platform for creating, managing, & visualizing geospatial data. Versions … | arches | 2022-11-11T04:15:00Z | 2023-05-04T04:29:23.524968Z |
| pysec-2022-42984 |
|
In Apache Airflow versions prior to 2.4.3, there was an open redirect in the webserver's … | apache-airflow | 2022-11-15T09:15:00Z | 2023-05-04T04:29:22.748527Z |
| pysec-2022-42983 |
|
In Apache Airflow, prior to version 2.4.1, deactivating a user wouldn't prevent an alread… | apache-airflow | 2022-10-07T07:15:00Z | 2023-05-04T04:29:22.696589Z |
| pysec-2022-42982 |
|
A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who c… | apache-airflow | 2022-11-14T10:15:00Z | 2023-05-04T04:29:22.645854Z |
| pysec-2022-42981 |
|
A vulnerability in UI of Apache Airflow allows an attacker to view unmasked secrets in re… | apache-airflow | 2022-11-14T10:15:00Z | 2023-05-04T04:29:22.592547Z |
| pysec-2022-43017 |
|
An issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier allows … | wheel | 2022-12-23T00:15:00Z | 2023-05-04T03:49:49.039483Z |
| pysec-2023-58 |
|
Werkzeug is a comprehensive WSGI web application library. Prior to version 2.2.3, Werkzeu… | werkzeug | 2023-02-14T20:15:00Z | 2023-05-04T03:49:48.987713Z |
| pysec-2023-57 |
|
Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" c… | werkzeug | 2023-02-14T20:15:00Z | 2023-05-04T03:49:48.931463Z |
| pysec-2023-56 |
|
Wagtail is an open source content management system built on Django. Prior to versions 4.… | wagtail | 2023-04-03T17:15:00Z | 2023-05-04T03:49:48.874145Z |
| pysec-2023-55 |
|
Wagtail is an open source content management system built on Django. Starting in version … | wagtail | 2023-04-03T17:15:00Z | 2023-05-04T03:49:48.764275Z |
| pysec-2023-54 |
|
vantage6 is a privacy preserving federated learning infrastructure for secure insight exc… | vantage6 | 2023-03-04T00:15:00Z | 2023-05-04T03:49:48.653810Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33133 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.727626Z |
| gsd-2024-33132 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.616439Z |
| gsd-2024-33131 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.613712Z |
| gsd-2024-33130 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.698885Z |
| gsd-2024-33129 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.616240Z |
| gsd-2024-33128 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.754393Z |
| gsd-2024-33127 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.725067Z |
| gsd-2024-33126 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.719194Z |
| gsd-2024-33125 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.749323Z |
| gsd-2024-33124 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.739634Z |
| gsd-2024-33123 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.736950Z |
| gsd-2024-33122 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.708386Z |
| gsd-2024-33121 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.714356Z |
| gsd-2024-33120 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.620196Z |
| gsd-2024-33119 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.733754Z |
| gsd-2024-33118 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.754600Z |
| gsd-2024-33117 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.660987Z |
| gsd-2024-33116 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.611077Z |
| gsd-2024-33115 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.618152Z |
| gsd-2024-33114 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.666856Z |
| gsd-2024-33113 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.743114Z |
| gsd-2024-33112 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.711610Z |
| gsd-2024-33111 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.693473Z |
| gsd-2024-33110 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.697620Z |
| gsd-2024-33109 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.667980Z |
| gsd-2024-33108 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.678810Z |
| gsd-2024-33107 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.609863Z |
| gsd-2024-33106 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.695334Z |
| gsd-2024-33105 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.716445Z |
| gsd-2024-33104 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.712218Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191679 | Malicious code in amzclients-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191677 | Malicious code in alicloud-client-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191676 | Malicious code in alicloud-client (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191673 | Malicious code in acloud-clients (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191672 | Malicious code in acloud-client-uses (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191671 | Malicious code in aclient-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-2950 | Malicious code in credential-python-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-2929 | Malicious code in acloud-client (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191721 | Malicious code in enumer-iam (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191687 | Malicious code in awscloud-clients-core (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191679 | Malicious code in amzclients-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191677 | Malicious code in alicloud-client-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191676 | Malicious code in alicloud-client (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191673 | Malicious code in acloud-clients (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191672 | Malicious code in acloud-client-uses (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191671 | Malicious code in aclient-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2026-610 | Malicious code in snapshot-date (PyPI) | 2026-01-30T19:09:41Z | 2026-01-30T19:09:41Z |
| MAL-2026-610 | Malicious code in snapshot-date (PyPI) | 2026-01-30T19:09:41Z | 2026-01-30T19:09:41Z |
| mal-2026-606 | Malicious code in userver-requires-at-least-python-3-10 (PyPI) | 2026-01-30T10:14:10Z | 2026-01-30T10:14:10Z |
| MAL-2026-606 | Malicious code in userver-requires-at-least-python-3-10 (PyPI) | 2026-01-30T10:14:10Z | 2026-01-30T10:14:10Z |
| mal-2024-12348 | Malicious code in spiderai (PyPI) | 2024-10-02T09:16:00Z | 2026-01-30T00:34:33Z |
| MAL-2024-12348 | Malicious code in spiderai (PyPI) | 2024-10-02T09:16:00Z | 2026-01-30T00:34:33Z |
| mal-2026-604 | Malicious code in securedrop-workstation-dom0-config (PyPI) | 2026-01-29T13:50:57Z | 2026-01-29T13:50:57Z |
| MAL-2026-604 | Malicious code in securedrop-workstation-dom0-config (PyPI) | 2026-01-29T13:50:57Z | 2026-01-29T13:50:57Z |
| mal-2026-603 | Malicious code in mcp-pdftool-plus (PyPI) | 2026-01-29T13:25:53Z | 2026-01-29T13:25:53Z |
| MAL-2026-603 | Malicious code in mcp-pdftool-plus (PyPI) | 2026-01-29T13:25:53Z | 2026-01-29T13:25:53Z |
| mal-2026-602 | Malicious code in tableasets (PyPI) | 2026-01-29T11:22:50Z | 2026-01-29T11:22:50Z |
| MAL-2026-602 | Malicious code in tableasets (PyPI) | 2026-01-29T11:22:50Z | 2026-01-29T11:22:50Z |
| mal-2026-601 | Malicious code in tableautes (PyPI) | 2026-01-29T10:08:47Z | 2026-01-29T11:16:21Z |
| MAL-2026-601 | Malicious code in tableautes (PyPI) | 2026-01-29T10:08:47Z | 2026-01-29T11:16:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1450 | poppler: Schwachstelle ermöglicht Denial of Service | 2025-07-02T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1398 | IBM WebSphere Application Server: Schwachstelle ermöglicht Codeausführung | 2025-06-25T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1266 | libarchive: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-09T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1265 | Red Hat Enterprise Linux (libxslt): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-09T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1165 | Apache Tomcat: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-29T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1720 | Adobe Experience Manager Forms: Mehrere Schwachstellen | 2025-08-05T22:00:00.000+00:00 | 2025-08-05T22:00:00.000+00:00 |
| wid-sec-w-2025-1705 | CODESYS: Mehrere Schwachstellen | 2025-08-03T22:00:00.000+00:00 | 2025-08-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1704 | Grafana (Infinity datasource plugin): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-08-03T22:00:00.000+00:00 | 2025-08-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1662 | Dell ECS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-07-28T22:00:00.000+00:00 | 2025-08-04T22:00:00.000+00:00 |
| wid-sec-w-2025-1677 | Absolute Secure Access: Mehrere Schwachstellen | 2025-07-29T22:00:00.000+00:00 | 2025-07-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1406 | International Components for Unicode (icu): Schwachstelle ermöglicht Codeausführung | 2025-06-25T22:00:00.000+00:00 | 2025-07-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1661 | Palo Alto Networks GlobalProtect App: Schwachstelle ermöglicht Denial of Service | 2025-07-28T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1539 | Red Hat Enterprise Linux (cloud-init): Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-07-13T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1041 | Red Hat Enterprise Linux (corosync): Schwachstelle ermöglicht Codeausführung | 2025-05-13T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1005 | Varnish HTTP Cache: Schwachstelle ermöglicht Manipulation von Dateien | 2025-05-12T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-0943 | Red Hat Enterprise Linux (node.js): Mehrere Schwachstellen | 2025-05-05T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-0901 | Mozilla Firefox, Firefox ESR, Thunderbird and Thunderbird ESR: Mehrere Schwachstellen | 2025-04-29T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-0734 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-04-07T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-0728 | WebKitGTK und WPE WebKit: Mehrere Schwachstellen | 2025-04-07T22:00:00.000+00:00 | 2025-07-29T22:00:00.000+00:00 |
| wid-sec-w-2025-1643 | xwiki: Mehrere Schwachstelle ermöglicht eine SQL Injection | 2025-07-24T22:00:00.000+00:00 | 2025-07-28T22:00:00.000+00:00 |
| wid-sec-w-2025-1593 | Grafana: Mehrere Schwachstellen | 2025-07-17T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1580 | Google Chrome / Microsoft Edge: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1449 | Microsoft Edge: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Benutzerrechten | 2025-07-02T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1436 | Google Chrome / Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2025-06-30T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1397 | Google Chrome / Microsoft Edge: Mehrere Schwachstellen | 2025-06-24T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1354 | Verschiedene Linux Distributionen: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2025-06-17T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1340 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2025-06-17T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1325 | libxml2: Schwachstelle ermöglicht Denial of Service | 2025-06-15T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1321 | SaltStack Salt: Mehrere Schwachstellen | 2025-06-12T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1296 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhba-2023:6364 | Red Hat Bug Fix Advisory: golang and delve bug fix and enhancement update | 2023-11-07T08:50:26+00:00 | 2026-02-21T13:04:16+00:00 |
| rhsa-2025:9986 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2025-06-30T21:23:51+00:00 | 2026-02-21T07:36:16+00:00 |
| rhsa-2025:9975 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 2025-06-30T17:50:04+00:00 | 2026-02-21T07:36:16+00:00 |
| rhsa-2025:9845 | Red Hat Security Advisory: weldr-client security update | 2025-06-26T16:57:30+00:00 | 2026-02-21T07:36:14+00:00 |
| rhsa-2025:9844 | Red Hat Security Advisory: osbuild-composer security update | 2025-06-26T16:57:43+00:00 | 2026-02-21T07:36:14+00:00 |
| rhsa-2025:9756 | Red Hat Security Advisory: opentelemetry-collector security update | 2025-06-26T07:53:59+00:00 | 2026-02-21T07:36:12+00:00 |
| rhsa-2025:9715 | Red Hat Security Advisory: osbuild-composer security update | 2025-06-26T00:19:58+00:00 | 2026-02-21T07:36:12+00:00 |
| rhsa-2025:9714 | Red Hat Security Advisory: weldr-client security update | 2025-06-26T00:29:48+00:00 | 2026-02-21T07:36:11+00:00 |
| rhsa-2025:9713 | Red Hat Security Advisory: osbuild-composer security update | 2025-06-26T00:25:48+00:00 | 2026-02-21T07:36:11+00:00 |
| rhsa-2025:9712 | Red Hat Security Advisory: weldr-client security update | 2025-06-26T00:30:53+00:00 | 2026-02-21T07:36:10+00:00 |
| rhsa-2025:9711 | Red Hat Security Advisory: osbuild-composer security update | 2025-06-26T00:23:18+00:00 | 2026-02-21T07:36:10+00:00 |
| rhsa-2025:9642 | Red Hat Security Advisory: osbuild-composer security update | 2025-06-25T14:01:42+00:00 | 2026-02-21T07:36:08+00:00 |
| rhsa-2025:9641 | Red Hat Security Advisory: osbuild-composer security update | 2025-06-25T14:16:56+00:00 | 2026-02-21T07:36:08+00:00 |
| rhsa-2025:9635 | Red Hat Security Advisory: weldr-client security update | 2025-06-25T12:17:36+00:00 | 2026-02-21T07:36:08+00:00 |
| rhsa-2025:9640 | Red Hat Security Advisory: osbuild-composer security update | 2025-06-25T14:13:41+00:00 | 2026-02-21T07:36:07+00:00 |
| rhsa-2025:9639 | Red Hat Security Advisory: weldr-client security update | 2025-06-25T13:37:57+00:00 | 2026-02-21T07:36:07+00:00 |
| rhsa-2025:9638 | Red Hat Security Advisory: weldr-client security update | 2025-06-25T13:57:01+00:00 | 2026-02-21T07:36:06+00:00 |
| rhsa-2025:9637 | Red Hat Security Advisory: weldr-client security update | 2025-06-25T13:49:23+00:00 | 2026-02-21T07:36:05+00:00 |
| rhsa-2025:9634 | Red Hat Security Advisory: osbuild-composer security update | 2025-06-25T12:20:31+00:00 | 2026-02-21T07:36:03+00:00 |
| rhsa-2025:9623 | Red Hat Security Advisory: osbuild-composer security update | 2025-06-25T10:18:36+00:00 | 2026-02-21T07:36:02+00:00 |
| rhsa-2025:9342 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.8 security and bug fix update | 2025-06-23T02:54:30+00:00 | 2026-02-21T07:36:01+00:00 |
| rhsa-2025:9319 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2025-06-23T02:44:02+00:00 | 2026-02-21T07:35:59+00:00 |
| rhsa-2025:9317 | Red Hat Security Advisory: delve security update | 2025-06-23T02:48:01+00:00 | 2026-02-21T07:35:58+00:00 |
| rhsa-2025:9313 | Red Hat Security Advisory: git-lfs security update | 2025-06-23T01:59:52+00:00 | 2026-02-21T07:35:58+00:00 |
| rhsa-2025:9312 | Red Hat Security Advisory: container-tools:rhel8 security update | 2025-06-23T03:01:15+00:00 | 2026-02-21T07:35:55+00:00 |
| rhsa-2025:9311 | Red Hat Security Advisory: grafana security update | 2025-06-23T01:58:34+00:00 | 2026-02-21T07:35:53+00:00 |
| rhsa-2025:9279 | Red Hat Security Advisory: OpenShift Container Platform 4.19.1 packages and security update | 2025-06-24T12:31:43+00:00 | 2026-02-21T07:35:53+00:00 |
| rhsa-2025:9278 | Red Hat Security Advisory: OpenShift Container Platform 4.19.1 bug fix and security update | 2025-06-24T09:38:02+00:00 | 2026-02-21T07:35:53+00:00 |
| rhsa-2025:9207 | Red Hat Security Advisory: grafana security update | 2025-06-17T15:20:32+00:00 | 2026-02-21T07:35:51+00:00 |
| rhsa-2025:9206 | Red Hat Security Advisory: grafana-pcp security update | 2025-06-17T15:20:52+00:00 | 2026-02-21T07:35:51+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-16-292-01 | Schneider Electric PowerLogic PM8ECC Hard-coded Password Vulnerability | 2016-07-22T06:00:00.000000Z | 2025-06-05T22:00:40.751040Z |
| icsa-16-287-06 | FATEK Automation Designer Memory Corruption Vulnerabilities | 2016-07-17T06:00:00.000000Z | 2025-06-05T21:59:56.623803Z |
| icsa-16-287-04 | Rockwell Automation Stratix Denial-of-Service and Memory Leak Vulnerabilities | 2016-07-17T06:00:00.000000Z | 2025-06-05T21:59:31.113649Z |
| icsa-16-287-02 | Siemens Automation License Manager Vulnerabilities | 2016-07-17T06:00:00.000000Z | 2025-06-05T21:59:12.415634Z |
| icsa-11-094-02b | Advantech/Broadwin WebAccess RPC Vulnerability | 2011-01-05T07:00:00.000000Z | 2025-06-05T21:58:59.981629Z |
| icsa-12-205-01 | Siemens WinCC Insecure SQL Server Authentication | 2012-04-26T06:00:00.000000Z | 2025-06-05T21:58:53.729851Z |
| icsa-15-342-01c | XZERES 442SR Wind Turbine Cross-site Scripting Vulnerability | 2015-09-10T06:00:00.000000Z | 2025-06-05T21:58:47.508743Z |
| icsa-12-283-01 | Siemens S7-1200 Web Application Cross Site Scripting | 2012-07-13T06:00:00.000000Z | 2025-06-05T21:58:41.272530Z |
| icsa-12-271-02 | Optimalog Optima PLC Multiple Vulnerabilities | 2012-07-01T06:00:00.000000Z | 2025-06-05T21:58:28.836669Z |
| icsa-12-251-01 | RealFlex RealWinDemo DLL Hijack | 2012-06-11T06:00:00.000000Z | 2025-06-05T21:58:22.608280Z |
| icsa-12-145-01 | Measuresoft ScadaPro DLL Hijack | 2012-02-25T07:00:00.000000Z | 2025-06-05T21:58:16.398215Z |
| icsa-12-025-02a | 7-Technologies Termis DLL Hijacking | 2012-10-28T06:00:00.000000Z | 2025-06-05T21:58:10.182246Z |
| icsa-12-249-01 | Arbiter Systems Power Sentinel Denial-of-Service Vulnerability | 2012-06-09T06:00:00.000000Z | 2025-06-05T21:58:03.958858Z |
| icsa-12-212-02 | Siemens SIMATIC S7-400 PN CPU DoS | 2012-05-03T06:00:00.000000Z | 2025-06-05T21:57:57.435398Z |
| icsa-15-258-01 | Schneider Electric StruxureWare Building Expert Plaintext Credentials Vulnerability | 2015-06-18T06:00:00.000000Z | 2025-06-05T21:57:20.047982Z |
| icsa-12-283-02 | WellinTech KingView User Credentials Not Securely Hashed | 2012-07-13T06:00:00.000000Z | 2025-06-05T21:57:13.809905Z |
| icsa-12-263-01 | Siemens S7-1200 Insecure Storage of HTTPS CA Certificate | 2012-06-23T06:00:00.000000Z | 2025-06-05T21:57:07.520195Z |
| icsa-16-287-03 | Siemens SIMATIC STEP 7 (TIA Portal) Information Disclosure Vulnerabilities | 2016-07-17T06:00:00.000000Z | 2025-06-05T21:56:54.919275Z |
| icsma-16-306-01 | Smiths Medical CADD-Solis Medication Safety Software Vulnerabilities | 2016-08-05T06:00:00.000000Z | 2025-06-05T21:56:42.285844Z |
| icsa-16-334-02 | Emerson DeltaV Easy Security Management Application Vulnerability | 2016-09-02T06:00:00.000000Z | 2025-06-05T21:56:36.069112Z |
| icsa-16-287-01 | OSIsoft PI Web API 2015 R2 Service Account Permissions Vulnerability | 2016-07-17T06:00:00.000000Z | 2025-06-05T21:56:04.663419Z |
| icsa-12-214-01 | Siemens Synco OZW Default Password | 2012-05-05T06:00:00.000000Z | 2025-06-05T21:55:39.640975Z |
| icsa-12-212-01 | ICONICS GENESIS32/BizViz Security Configurator Authentication Bypass Vulnerability | 2012-05-03T06:00:00.000000Z | 2025-06-05T21:55:33.425172Z |
| icsa-12-263-02 | ORing Industrial Networking IDS-5042/5042+ Hard-Coded Credential Vulnerability | 2012-06-23T06:00:00.000000Z | 2025-06-05T21:55:20.894201Z |
| icsa-12-249-02 | WAGO IO 758 Default Linux Credentials | 2012-06-09T06:00:00.000000Z | 2025-06-05T21:55:14.635429Z |
| icsa-12-243-01 | GarrettCom - Use of Hard-Coded Password | 2012-06-03T06:00:00.000000Z | 2025-06-05T21:55:08.385462Z |
| icsa-16-336-01a | Siemens SICAM PAS Vulnerabilities | 2016-09-04T06:00:00.000000Z | 2025-06-05T21:54:43.517387Z |
| icsa-11-356-01 | Siemens Simatic HMI Authentication Vulnerabilities | 2011-09-24T06:00:00.000000Z | 2025-06-05T21:54:31.029394Z |
| icsa-12-227-01 | Siemens COMOS Database Privilege Escalation Vulnerability | 2012-05-18T06:00:00.000000Z | 2025-06-05T21:54:24.813649Z |
| icsa-15-258-03 | GE MDS PulseNET Vulnerabilities | 2015-06-18T06:00:00.000000Z | 2025-06-05T21:54:12.344535Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ap-assoc-dos-D2SunWK2 | Cisco Access Point Software Association Request Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-aironetap-cmdinj-6bjt4fl8 | Cisco Access Point Software Command Injection Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-aironetap-cmdinj-6bjT4FL8 | Cisco Access Point Software Command Injection Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ip-phone-cmd-inj-kmfynvcp | Cisco IP Phone 6800, 7800, and 8800 Series Web UI Vulnerabilities | 2023-03-01T16:00:00+00:00 | 2023-03-20T20:45:17+00:00 |
| cisco-sa-ip-phone-cmd-inj-KMFynVcP | Cisco IP Phone 6800, 7800, and 8800 Series Web UI Vulnerabilities | 2023-03-01T16:00:00+00:00 | 2023-03-20T20:45:17+00:00 |
| cisco-sa-sbr042-multi-vuln-ej76Pke5 | Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers Vulnerabilities | 2023-01-11T16:00:00+00:00 | 2025-03-07T17:33:55+00:00 |
| cisco-sa-bfd-xmrescbt | Cisco IOS XR Software for ASR 9000 Series Routers Bidirectional Forwarding Detection Denial of Service Vulnerability | 2023-03-08T16:00:00+00:00 | 2023-03-08T16:00:00+00:00 |
| cisco-sa-bfd-XmRescbT | Cisco IOS XR Software for ASR 9000 Series Routers Bidirectional Forwarding Detection Denial of Service Vulnerability | 2023-03-08T16:00:00+00:00 | 2023-03-08T16:00:00+00:00 |
| cisco-sa-roomos-dkjgfgrk | Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities | 2023-01-11T16:00:00+00:00 | 2023-03-07T14:21:36+00:00 |
| cisco-sa-roomos-dkjGFgRK | Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities | 2023-01-11T16:00:00+00:00 | 2023-03-07T14:21:36+00:00 |
| cisco-sa-finesse-proxy-dos-vy5dqhrv | Cisco Finesse Reverse Proxy VPN-less Access to Finesse Desktop Denial of Service Vulnerability | 2023-03-01T16:00:00+00:00 | 2023-03-02T20:35:00+00:00 |
| cisco-sa-finesse-proxy-dos-vY5dQhrV | Cisco Finesse Reverse Proxy VPN-less Access to Finesse Desktop Denial of Service Vulnerability | 2023-03-01T16:00:00+00:00 | 2023-03-02T20:35:00+00:00 |
| cisco-sa-webex-xss-yn8hhsmj | Cisco Webex App for Web Cross-Site Scripting Vulnerability | 2023-03-01T16:00:00+00:00 | 2023-03-01T16:00:00+00:00 |
| cisco-sa-webex-xss-Yn8HHsMJ | Cisco Webex App for Web Cross-Site Scripting Vulnerability | 2023-03-01T16:00:00+00:00 | 2023-03-01T16:00:00+00:00 |
| cisco-sa-cuic-infodisc-ssrf-84zbmwvk | Cisco Unified Intelligence Center Vulnerabilities | 2023-03-01T16:00:00+00:00 | 2023-03-01T16:00:00+00:00 |
| cisco-sa-cuic-infodisc-ssrf-84ZBmwVk | Cisco Unified Intelligence Center Vulnerabilities | 2023-03-01T16:00:00+00:00 | 2023-03-01T16:00:00+00:00 |
| cisco-sa-webex-app-qrto6yc2 | Cisco Webex Meetings App Character Interface Manipulation Vulnerability | 2022-09-07T16:00:00+00:00 | 2023-02-24T15:40:30+00:00 |
| cisco-sa-webex-app-qrtO6YC2 | Cisco Webex Meetings App Character Interface Manipulation Vulnerability | 2022-09-07T16:00:00+00:00 | 2023-02-24T15:40:30+00:00 |
| cisco-sa-nxos-x509v3-unsupportedconfig-scrtabuk | Cisco NX-OS Software SSH X.509v3 Certificate Authentication with Unsupported Remote Authorization Method Privilege Escalation Issues | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-nxos-x509v3-unsupportedconfig-ScRtAbUk | Cisco NX-OS Software SSH X.509v3 Certificate Authentication with Unsupported Remote Authorization Method Privilege Escalation Issues | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-nxos-cli-cmdinject-euqvk9u | Cisco NX-OS Software CLI Command Injection Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-nxos-cli-cmdinject-euQVK9u | Cisco NX-OS Software CLI Command Injection Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-nxfp-cmdinj-xxbzjtr | Cisco Firepower 4100 Series, Firepower 9300 Security Appliances, and UCS Fabric Interconnects Command Injection Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-nxfp-cmdinj-XXBZjtR | Cisco Firepower 4100 Series, Firepower 9300 Security Appliances, and UCS Fabric Interconnects Command Injection Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-elyfex-dos-gfvcbyx | Cisco Nexus 9300-FX3 Series Fabric Extender for UCS Fabric Interconnects Authentication Bypass Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-elyfex-dos-gfvcByx | Cisco Nexus 9300-FX3 Series Fabric Extender for UCS Fabric Interconnects Authentication Bypass Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-aci-lldp-dos-yscnzopx | Cisco Nexus 9000 Series Fabric Switches in ACI Mode Link Layer Discovery Protocol Memory Leak Denial of Service Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-aci-lldp-dos-ySCNZOpX | Cisco Nexus 9000 Series Fabric Switches in ACI Mode Link Layer Discovery Protocol Memory Leak Denial of Service Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-02-22T16:00:00+00:00 |
| cisco-sa-clamav-q8dthcy | ClamAV HFS+ Partition Scanning Buffer Overflow Vulnerability Affecting Cisco Products: February 2023 | 2023-02-15T16:00:00+00:00 | 2023-02-22T14:09:19+00:00 |
| cisco-sa-clamav-q8DThCy | ClamAV HFS+ Partition Scanning Buffer Overflow Vulnerability Affecting Cisco Products: February 2023 | 2023-02-15T16:00:00+00:00 | 2023-02-22T14:09:19+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-7598 | Network restriction bypass via race condition during namespace termination | 2025-03-02T00:00:00.000Z | 2026-02-18T15:09:15.000Z |
| msrc_cve-2024-43859 | f2fs: fix to truncate preallocated blocks in f2fs_file_open() | 2024-08-02T00:00:00.000Z | 2026-02-18T15:09:05.000Z |
| msrc_cve-2025-30348 | encodeText in QDom in Qt before 6.8.0 has a complex algorithm involving XML string copy and inline replacement of parts of a string (with relocation of later data). | 2025-03-02T00:00:00.000Z | 2026-02-18T15:08:57.000Z |
| msrc_cve-2024-43833 | media: v4l: async: Fix NULL pointer dereference in adding ancillary links | 2024-08-02T00:00:00.000Z | 2026-02-18T15:08:53.000Z |
| msrc_cve-2024-42315 | exfat: fix potential deadlock on __exfat_get_dentry_set | 2024-08-02T00:00:00.000Z | 2026-02-18T15:08:42.000Z |
| msrc_cve-2025-2588 | Hercules Augeas fa.c re_case_expand null pointer dereference | 2025-03-02T00:00:00.000Z | 2026-02-18T15:08:41.000Z |
| msrc_cve-2024-42314 | btrfs: fix extent map use-after-free when adding pages to compressed bio | 2024-08-02T00:00:00.000Z | 2026-02-18T15:08:30.000Z |
| msrc_cve-2025-30258 | In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS." | 2025-03-02T00:00:00.000Z | 2026-02-18T15:08:24.000Z |
| msrc_cve-2024-43837 | bpf: Fix null pointer dereference in resolve_prog_type() for BPF_PROG_TYPE_EXT | 2024-08-02T00:00:00.000Z | 2026-02-18T15:08:19.000Z |
| msrc_cve-2024-41073 | nvme: avoid double free special payload | 2024-07-01T07:00:00.000Z | 2026-02-18T15:08:06.000Z |
| msrc_cve-2025-21763 | neighbour: use RCU protection in __neigh_notify() | 2025-02-02T00:00:00.000Z | 2026-02-18T15:08:02.000Z |
| msrc_cve-2023-48795 | The SSH transport protocol with certain OpenSSH extensions found in OpenSSH before 9.6 and other products allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message) and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP) implemented by these extensions mishandles the handshake phase and mishandles use of sequence numbers. For example there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT Dropbear through 2022.83 Ssh before 5.1.1 in Erlang/OTP PuTTY before 0.80 AsyncSSH before 2.14.2 golang.org/x/crypto before 0.17.0 libssh before 0.10.6 libssh2 | 2023-12-01T08:00:00.000Z | 2026-02-18T15:07:55.000Z |
| msrc_cve-2024-41055 | mm: prevent derefencing NULL ptr in pfn_section_valid() | 2024-07-01T07:00:00.000Z | 2026-02-18T15:07:44.000Z |
| msrc_cve-2025-21811 | nilfs2: protect access to buffers with no active references | 2025-02-02T00:00:00.000Z | 2026-02-18T15:07:39.000Z |
| msrc_cve-2025-21796 | nfsd: clear acl_access/acl_default after releasing them | 2025-02-02T00:00:00.000Z | 2026-02-18T15:07:25.000Z |
| msrc_cve-2024-41070 | KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() | 2024-07-01T07:00:00.000Z | 2026-02-18T15:07:22.000Z |
| msrc_cve-2025-21812 | ax25: rcu protect dev->ax25_ptr | 2025-02-02T00:00:00.000Z | 2026-02-18T15:07:00.000Z |
| msrc_cve-2024-42309 | drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes | 2024-08-02T00:00:00.000Z | 2026-02-18T15:06:56.000Z |
| msrc_cve-2024-58034 | memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code() | 2025-02-02T00:00:00.000Z | 2026-02-18T15:06:47.000Z |
| msrc_cve-2025-21764 | ndisc: use RCU protection in ndisc_alloc_skb() | 2025-02-02T00:00:00.000Z | 2026-02-18T15:06:33.000Z |
| msrc_cve-2024-41080 | io_uring: fix possible deadlock in io_register_iowq_max_workers() | 2024-07-01T07:00:00.000Z | 2026-02-18T15:06:33.000Z |
| msrc_cve-2024-41088 | can: mcp251xfd: fix infinite loop when xmit fails | 2024-07-01T07:00:00.000Z | 2026-02-18T15:06:12.000Z |
| msrc_cve-2025-21762 | arp: use RCU protection in arp_xmit() | 2025-02-02T00:00:00.000Z | 2026-02-18T15:06:05.000Z |
| msrc_cve-2018-25032 | zlib before 1.2.12 allows memory corruption when deflating (i.e. when compressing) if the input has many distant matches. | 2022-03-02T00:00:00.000Z | 2026-02-18T15:06:05.000Z |
| msrc_cve-2022-40897 | Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py. | 2022-12-02T00:00:00.000Z | 2026-02-18T15:06:03.000Z |
| msrc_cve-2024-41076 | NFSv4: Fix memory leak in nfs4_set_security_label | 2024-07-01T07:00:00.000Z | 2026-02-18T15:05:53.000Z |
| msrc_cve-2025-21786 | workqueue: Put the pwq after detaching the rescuer from the pool | 2025-02-02T00:00:00.000Z | 2026-02-18T15:05:43.000Z |
| msrc_cve-2025-67873 | Capstone doesn't check Skipdata length, leading to cs_insn.bytes heap buffer overflow | 2025-12-02T00:00:00.000Z | 2026-02-18T15:05:33.000Z |
| msrc_cve-2024-43860 | remoteproc: imx_rproc: Skip over memory region when node value is NULL | 2024-08-02T00:00:00.000Z | 2026-02-18T15:05:32.000Z |
| msrc_cve-2022-48646 | sfc/siena: fix null pointer dereference in efx_hard_start_xmit | 2024-04-02T07:00:00.000Z | 2026-02-18T15:05:23.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15267-1 | python311-Django-5.2.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15266-1 | pure-ftpd-1.0.51-5.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15265-1 | libprotobuf-lite31_1_0-31.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15264-1 | postgresql-jdbc-42.7.7-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15263-1 | polaris-9.6.4-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15262-1 | podman-5.5.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15261-1 | perl-YAML-LibYAML-0.904.0-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15260-1 | perl-File-Find-Rule-0.350.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15259-1 | perl-CryptX-0.87.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15258-1 | perl-32bit-5.40.2-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15257-1 | pam_pkcs11-0.6.13-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15256-1 | pam-1.7.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15255-1 | ovmf-202505-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15254-1 | openbao-2.3.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15253-1 | opa-1.6.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15252-1 | oci-cli-3.61.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15251-1 | nova-3.11.4-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15250-1 | corepack22-22.15.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15249-1 | nodejs-electron-35.6.0-1.2 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15248-1 | nix-2.29.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15247-1 | moarvm-2025.05-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15246-1 | mirrorsorcerer-0.1.3~1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15245-1 | ggml-devel-5699-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15244-1 | libtpms-devel-0.10.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15243-1 | libssh-config-0.11.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15242-1 | libsoup-2_4-1-2.74.3-12.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15241-1 | libsoup-3_0-0-3.6.5-6.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15240-1 | libQt5Bootstrap-devel-static-32bit-5.15.17+kde122-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15239-1 | libgcrypt-devel-1.11.1-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15238-1 | libetebase-devel-0.5.8-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-948 | Global-buffer-overflow in isvce_write_coeff4x4_cavlc | 2023-10-02T13:02:26.227614Z | 2023-10-02T13:02:26.227921Z |
| osv-2023-940 | Heap-buffer-overflow in _dwarf_memcpy_swap_bytes | 2023-10-01T13:00:41.142203Z | 2023-10-01T13:00:41.142498Z |
| osv-2023-937 | Heap-buffer-overflow in pack_unpack | 2023-09-30T14:02:34.957735Z | 2023-09-30T14:02:34.958072Z |
| osv-2023-936 | Heap-buffer-overflow in Gfx::decode_bmp_pixel_data | 2023-09-30T14:00:38.870417Z | 2023-09-30T14:00:38.870801Z |
| osv-2023-930 | Heap-buffer-overflow in OT::cvar::decompile_tuple_variations | 2023-09-29T14:02:21.147998Z | 2023-09-29T14:02:21.148306Z |
| osv-2023-920 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2023-09-28T14:00:20.646633Z | 2023-09-28T14:00:20.647008Z |
| osv-2022-37 | Heap-buffer-overflow in stringProcess | 2022-01-13T00:01:03.929984Z | 2023-09-25T14:30:41.938585Z |
| osv-2023-905 | Segv on unknown address in icu_74::UnicodeString::copyFrom | 2023-09-24T14:02:51.344190Z | 2023-09-24T14:02:51.344511Z |
| osv-2023-903 | Heap-double-free in snmp_e2e_fuzzer.c | 2023-09-23T14:02:30.314018Z | 2023-09-23T14:02:30.314305Z |
| osv-2023-901 | UNKNOWN READ in icu_74::RelativeDateTimeFormatter::formatRelativeImpl | 2023-09-23T14:01:24.733487Z | 2023-09-23T14:01:24.733779Z |
| osv-2023-899 | Heap-buffer-overflow in cosm_create_key | 2023-09-23T14:00:56.859961Z | 2023-09-23T14:00:56.860254Z |
| osv-2023-896 | UNKNOWN READ in deliver_chunked_chunks | 2023-09-23T14:00:44.781770Z | 2023-09-23T14:00:44.782064Z |
| osv-2023-894 | Heap-double-free in dwg_free_object | 2023-09-22T14:01:18.317891Z | 2023-09-22T14:01:18.318214Z |
| osv-2023-890 | Heap-use-after-free in dwarf_dealloc | 2023-09-21T14:01:03.576514Z | 2023-09-21T14:01:03.576815Z |
| osv-2023-889 | Heap-double-free in regcomp | 2023-09-21T14:00:59.739088Z | 2023-09-21T14:00:59.739382Z |
| osv-2023-885 | UNKNOWN READ in bytes1_char_at | 2023-09-20T14:02:30.557328Z | 2023-09-20T14:02:30.557630Z |
| osv-2023-883 | Security exception in org.apache.lucene.util.ArrayUtil.copyOfSubArray | 2023-09-20T14:01:10.331831Z | 2023-09-20T14:01:10.332151Z |
| osv-2023-440 | Heap-double-free in dwg_free_object | 2023-05-30T14:01:20.251610Z | 2023-09-19T14:20:36.212389Z |
| osv-2023-881 | Heap-buffer-overflow in read_tmpl | 2023-09-19T14:01:22.611246Z | 2023-09-19T14:01:22.611560Z |
| osv-2023-874 | Memcpy-param-overlap in bit_u_expand | 2023-09-18T14:01:11.020858Z | 2023-09-18T14:01:11.021190Z |
| osv-2023-873 | UNKNOWN WRITE in icu_74::Calendar::set | 2023-09-18T14:00:31.769072Z | 2023-09-18T14:00:31.769380Z |
| osv-2023-872 | Security exception in org.springframework.expression.spel.ast.OpPlus.getValueInternal | 2023-09-18T14:00:10.451327Z | 2023-09-18T14:00:10.451623Z |
| osv-2023-870 | Heap-buffer-overflow in icu_74::SimpleDateFormat::subFormat | 2023-09-17T14:01:25.114159Z | 2023-09-17T14:01:25.114447Z |
| osv-2021-1241 | Heap-buffer-overflow in wabt::string_view::compare | 2021-09-12T00:01:27.535685Z | 2023-09-16T14:07:19.262111Z |
| osv-2023-867 | Negative-size-param in http_cb | 2023-09-16T14:02:46.648990Z | 2023-09-16T14:02:46.649266Z |
| osv-2023-865 | UNKNOWN in WasmEdge::Loader::SharedLibrary::load | 2023-09-16T14:02:40.468661Z | 2023-09-16T14:02:40.468956Z |
| osv-2023-857 | Segv on unknown address in FunctionCompiler::compileReturn | 2023-09-15T14:02:42.221599Z | 2023-09-15T14:02:42.222010Z |
| osv-2023-850 | Heap-buffer-overflow in bit_TV_to_utf8 | 2023-09-15T14:00:33.303768Z | 2023-09-15T14:00:33.304088Z |
| osv-2023-849 | Stack-buffer-overflow in ulocimp_toLanguageTag_74 | 2023-09-15T14:00:28.699483Z | 2023-09-15T14:00:28.699782Z |
| osv-2023-453 | UNKNOWN READ in ih264e_cabac_put_byte | 2023-06-04T14:00:11.680354Z | 2023-09-14T14:09:18.630220Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-moodle-2024-48898 | Moodle: some users can delete audiences of other reports | 2024-11-21T07:13:24.286Z | 2025-09-03T11:06:29.028Z |
| bit-moodle-2024-48897 | Moodle: idor in edit/delete rss feed | 2024-11-21T07:13:31.891Z | 2025-09-03T11:06:29.028Z |
| bit-moodle-2024-48896 | Moodle: users' names returned in messaging error message | 2024-11-21T07:13:38.787Z | 2025-09-03T11:06:29.028Z |
| bit-gitlab-2025-2867 | Improper Control of Generation of Code ('Code Injection') in GitLab | 2025-08-13T06:06:56.962Z | 2025-09-03T11:06:29.028Z |
| bit-ghost-2024-34451 | 2025-06-23T05:41:01.674Z | 2025-09-03T11:06:29.028Z | |
| bit-django-2025-32873 | 2025-06-18T14:40:22.794Z | 2025-09-03T11:06:29.028Z | |
| bit-django-2024-45231 | 2024-10-19T07:08:43.877Z | 2025-09-03T11:06:29.028Z | |
| bit-django-2024-45230 | 2024-10-19T07:08:51.488Z | 2025-09-03T11:06:29.028Z | |
| bit-jupyterhub-2024-28233 | XSS in JupyterHub via Self-XSS leveraged by Cookie Tossing | 2024-04-03T10:52:35.170Z | 2025-09-03T09:06:51.338Z |
| bit-gitlab-2025-4225 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-08-30T09:04:10.462Z | 2025-09-03T09:06:51.338Z |
| bit-gitlab-2025-2246 | Missing Authorization in GitLab | 2025-08-30T09:03:36.978Z | 2025-09-03T09:06:51.338Z |
| bit-envoy-2024-39305 | Envoy Proxy use after free when route hash policy is configured with cookie attributes | 2024-07-03T07:17:43.459Z | 2025-09-03T09:06:51.338Z |
| bit-superset-2025-27696 | Apache Superset: Incorrect authorization leading to resource ownership takeover | 2025-05-16T06:13:17.089Z | 2025-09-02T09:09:29.426Z |
| bit-vault-2025-6203 | Vault unauthenticated denial of service through complex json payload | 2025-08-30T08:51:09.044Z | 2025-08-30T09:06:08.850Z |
| bit-gitlab-2025-5819 | Incorrect Permission Assignment for Critical Resource in GitLab | 2025-08-18T08:34:18.150Z | 2025-08-30T09:06:08.850Z |
| bit-gitlab-2025-5101 | Improper Control of Generation of Code ('Code Injection') in GitLab | 2025-08-30T09:04:23.084Z | 2025-08-30T09:06:08.850Z |
| bit-gitlab-2025-3601 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-08-30T09:04:08.676Z | 2025-08-30T09:06:08.850Z |
| bit-envoy-2024-53269 | Happy Eyeballs: Validate that additional_address are IP addresses instead of crashing when sorting in envoy | 2024-12-20T07:08:41.110Z | 2025-08-29T09:06:49.175Z |
| bit-mastodon-2025-54879 | Mastodon e‑mail throttle misconfiguration allows unlimited email confirmations against unconfirmed emails | 2025-08-08T05:54:51.134Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2025-22602 | Stored DOM-based XSS (without CSP) via video placeholders in Discourse | 2025-02-20T10:31:17.404Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2024-56328 | HTMLi(XSS without CSP) via Onebox urls in Discourse | 2025-02-20T10:31:29.492Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2024-56197 | Users can see other user's tagged PMs in Discourse | 2025-02-20T10:31:38.504Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2024-53991 | Potential Backup file leaked via Nginx in Discourse | 2024-12-23T19:10:14.117Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2024-53851 | Partial denial of service via inline oneboxes in Discourse | 2025-02-20T10:32:14.095Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2024-53266 | Cross-site Scripting (XSS) via topic titles when CSP disabled in Discourse | 2025-02-20T10:32:23.108Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2024-52794 | Magnific lightbox susceptible to Cross-site Scripting in Discourse | 2024-12-23T19:10:22.128Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2024-52589 | Moderators can view Screened emails even when the “moderators view emails” option is disabled in Discourse | 2024-12-23T19:10:30.112Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2024-49765 | Bypass of Discourse Connect using other login paths if enabled in Discourse | 2024-12-23T19:10:38.115Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2024-28242 | Disclosure of the existence of secret categories with custom backgrounds in Discourse | 2024-04-01T14:04:02.275Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2024-24827 | No rate limits on POST /uploads endpoint in Discourse | 2024-04-01T14:04:36.691Z | 2025-08-27T09:06:48.117Z |
| ID | Description | Updated |
|---|---|---|
| var-202006-1824 | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between seriali… | 2024-07-23T20:14:56.331000Z |
| var-201909-1526 | There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the … | 2024-07-23T20:14:55.872000Z |
| var-201110-0451 | The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d i… | 2024-07-23T20:14:55.799000Z |
| var-200803-0027 | KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message type… | 2024-07-23T20:14:54.642000Z |
| var-200611-0471 | Integer overflow in the fatfile_getarch2 in Apple Mac OS X allows local users to cause a … | 2024-07-23T20:14:50.515000Z |
| var-201110-0393 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2024-07-23T20:14:49.325000Z |
| var-200807-0061 | Safari on Apple iPhone before 2.0 and iPod touch before 2.0 misinterprets a menu button p… | 2024-07-23T20:14:49.143000Z |
| var-202010-1265 | A command injection issue existed in Web Inspector. This issue was addressed with improve… | 2024-07-23T20:14:13.271000Z |
| var-201912-0605 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:13:35.955000Z |
| var-201912-0125 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:13:35.008000Z |
| var-201205-0305 | sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI… | 2024-07-23T20:13:35.528000Z |
| var-202002-1478 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:13:29.090000Z |
| var-200608-0038 | Unspecified vulnerability in AFP Server in Apple Mac OS X 10.3.9 allows remote attackers … | 2024-07-23T20:13:26.513000Z |
| var-201108-0185 | Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and… | 2024-07-23T20:13:20.068000Z |
| var-200909-0399 | The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass inte… | 2024-07-23T20:13:19.191000Z |
| var-200608-0031 | Stack-based buffer overflow in bootpd in the DHCP component for Apple Mac OS X 10.3.9 and… | 2024-07-23T20:13:19.005000Z |
| var-201304-0378 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T20:13:17.085000Z |
| var-201202-0072 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T20:13:17.350000Z |
| var-200408-0145 | TCP, when using a large Window Size, makes it easier for remote attackers to guess sequen… | 2024-07-23T20:13:17.983000Z |
| var-202108-2072 | A race condition was addressed with improved locking. This issue is fixed in Security Upd… | 2024-07-23T20:13:16.701000Z |
| var-200808-0154 | Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.… | 2024-07-23T20:13:16.218000Z |
| var-201801-1711 | Systems with microprocessors utilizing speculative execution and indirect branch predicti… | 2024-07-23T20:13:15.740000Z |
| var-201106-0192 | The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.… | 2024-07-23T20:13:11.130000Z |
| var-202010-0251 | In Network Security Services (NSS) before 3.46, several cryptographic primitives had miss… | 2024-07-23T20:13:10.179000Z |
| var-201706-0334 | glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to ma… | 2024-07-23T20:13:10.518000Z |
| var-201904-0747 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:13:09.792000Z |
| var-201912-0602 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:13:04.684000Z |
| var-201109-0200 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers… | 2024-07-23T20:13:03.972000Z |
| var-200609-1413 | The Online Certificate Status Protocol (OCSP) service in the Security Framework in Apple … | 2024-07-23T20:13:03.726000Z |
| var-202101-1926 | Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer o… | 2024-07-23T20:13:02.874000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2021-000012 | WordPress Plugin "Name Directory" vulnerable to cross-site request forgery | 2021-02-05T16:24+09:00 | 2021-02-05T16:24+09:00 |
| jvndb-2021-001017 | Trend Micro HouseCall for Home Networks (Windows Edition) may insecurely load Dynamic Link Libraries | 2021-02-04T15:42+09:00 | 2021-02-04T15:42+09:00 |
| jvndb-2021-000011 | Panasonic Video Insight VMS vulnerable to arbitrary code execution | 2021-02-04T15:39+09:00 | 2021-02-04T15:39+09:00 |
| jvndb-2021-000006 | Multiple vulnerabilities in Aterm WF800HP, Aterm WG2600HP, and Aterm WG2600HP2 | 2021-01-22T17:55+09:00 | 2021-02-03T12:05+09:00 |
| jvndb-2021-001014 | Vulnerability in JP1/VERITAS | 2021-02-01T16:49+09:00 | 2021-02-01T16:49+09:00 |
| jvndb-2021-000009 | Android App "ELECOM File Manager" vulnerable to directory traversal | 2021-01-27T17:38+09:00 | 2021-01-27T17:38+09:00 |
| jvndb-2021-000008 | Multiple vulnerabilities in multiple ELECOM products | 2021-01-26T16:33+09:00 | 2021-01-26T16:33+09:00 |
| jvndb-2021-000010 | Multiple vulnerabilities in multiple LOGITEC products | 2021-01-26T16:26+09:00 | 2021-01-26T16:26+09:00 |
| jvndb-2021-001010 | TP-Link TL-WR841N V13 (JP) vulnerable to OS command injection | 2021-01-25T16:21+09:00 | 2021-01-25T16:21+09:00 |
| jvndb-2021-000005 | GROWI vulnerable to cross-site scripting | 2021-01-19T14:05+09:00 | 2021-01-19T14:05+09:00 |
| jvndb-2021-000004 | Multiple vulnerabilities in acmailer | 2021-01-14T16:22+09:00 | 2021-01-14T16:22+09:00 |
| jvndb-2021-000003 | The installer of SKYSEA Client View may insecurely load Dynamic Link Libraries | 2021-01-12T15:53+09:00 | 2021-01-12T15:53+09:00 |
| jvndb-2021-000002 | Multiple NEC Products vulnerable to authentication bypass | 2021-01-04T17:24+09:00 | 2021-01-08T12:22+09:00 |
| jvndb-2021-000001 | Multiple vulnerabilities in UNIVERGE SV9500/SV8500 series | 2021-01-04T14:37+09:00 | 2021-01-04T14:37+09:00 |
| jvndb-2020-009965 | Cleartext Transmission of Sensitive Information Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2020-12-21T17:48+09:00 | 2020-12-21T17:48+09:00 |
| jvndb-2020-009964 | Improper certificate validation vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2020-12-21T17:48+09:00 | 2020-12-21T17:48+09:00 |
| jvndb-2020-010072 | Cross-site Scripting Vulnerability in Hitachi Command Suite | 2020-12-21T14:20+09:00 | 2020-12-21T14:20+09:00 |
| jvndb-2020-000086 | Self-Extracting files created by multiple SEIKO EPSON products may insecurely load Dynamic Link Libraries | 2020-12-18T16:47+09:00 | 2020-12-18T16:47+09:00 |
| jvndb-2020-000083 | Multiple vulnerabilities in Aterm SA3500G | 2020-12-11T16:59+09:00 | 2020-12-11T16:59+09:00 |
| jvndb-2020-000082 | FileZen vulnerable to directory traversal | 2020-12-10T15:21+09:00 | 2020-12-10T15:21+09:00 |
| jvndb-2020-009771 | ServerProtect for Linux vulnerable to heap-based buffer overflow | 2020-12-08T12:34+09:00 | 2020-12-08T12:34+09:00 |
| jvndb-2020-000081 | Apache Cordova Plugin camera vulnerable to information exposure | 2020-12-07T16:34+09:00 | 2020-12-07T16:34+09:00 |
| jvndb-2020-000080 | Multiple vulnerabilities in EC-CUBE | 2020-12-03T18:15+09:00 | 2020-12-03T18:15+09:00 |
| jvndb-2020-000077 | Multiple vulnerabilities in GROWI | 2020-11-25T14:54+09:00 | 2020-11-25T14:54+09:00 |
| jvndb-2020-000076 | NETGEAR GS108Ev3 vulnerable to cross-site request forgery | 2020-11-24T14:32+09:00 | 2020-11-24T14:32+09:00 |
| jvndb-2020-000075 | The installers of multiple SEIKO EPSON products may insecurely load Dynamic Link Libraries | 2020-11-20T15:39+09:00 | 2020-11-20T15:39+09:00 |
| jvndb-2020-009590 | Trend Micro Security 2020 (Consumer) is vulnerable to arbitrary file deletion | 2020-11-19T18:03+09:00 | 2020-11-19T18:03+09:00 |
| jvndb-2020-000074 | Hibernate ORM vulnerable to SQL injection | 2020-11-19T14:33+09:00 | 2020-11-19T14:33+09:00 |
| jvndb-2020-009584 | Multiple vulnerabilities in KonaWiki3 | 2020-11-18T18:13+09:00 | 2020-11-18T18:13+09:00 |
| jvndb-2020-000073 | Movable Type Premium vulnerable to cross-site scripting | 2020-11-18T18:01+09:00 | 2020-11-18T18:01+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:3842-1 | Security update for python-Authlib | 2025-10-28T16:39:39Z | 2025-10-28T16:39:39Z |
| suse-su-2025:3839-1 | Security update 5.1.1 for Multi-Linux Manager Server | 2025-10-28T14:41:29Z | 2025-10-28T14:41:29Z |
| suse-su-2025:3835-1 | Security update for java-11-openjdk | 2025-10-28T10:31:12Z | 2025-10-28T10:31:12Z |
| suse-su-2025:3834-1 | Security update for strongswan | 2025-10-28T10:30:15Z | 2025-10-28T10:30:15Z |
| suse-su-2025:3827-1 | Security update 4.3.16.1 for SUSE Manager Server Release Notes | 2025-10-28T07:26:58Z | 2025-10-28T07:26:58Z |
| suse-su-2025:3826-1 | Security update 4.3.16.1 for SUSE Manager Server 4.3 LTS | 2025-10-28T07:26:47Z | 2025-10-28T07:26:47Z |
| suse-su-2025:3825-1 | Recommended update 5.0.5.1 for Multi-Linux Manager Server | 2025-10-28T07:26:09Z | 2025-10-28T07:26:09Z |
| suse-su-2025:3819-1 | Security update 5.1.1 for Multi-Linux Manager Client Tools | 2025-10-28T07:20:07Z | 2025-10-28T07:20:07Z |
| suse-su-2025:3817-1 | Security update 5.1.1 for Multi-Linux Manager Client Tools | 2025-10-28T07:19:09Z | 2025-10-28T07:19:09Z |
| suse-su-2025:3812-1 | Security update for cmake | 2025-10-27T16:13:22Z | 2025-10-27T16:13:22Z |
| suse-su-2025:3811-1 | Security update for wireshark | 2025-10-27T16:12:20Z | 2025-10-27T16:12:20Z |
| suse-su-2025:3810-1 | Security update for ffmpeg-4 | 2025-10-27T16:11:38Z | 2025-10-27T16:11:38Z |
| suse-ru-2025:20961-1 | Recommended update for afterburn | 2025-10-27T15:32:17Z | 2025-10-27T15:32:17Z |
| suse-su-2025:3809-1 | Security update for rabbitmq-server | 2025-10-27T13:11:28Z | 2025-10-27T13:11:28Z |
| suse-su-2025:3808-1 | Security update for MozillaFirefox | 2025-10-27T13:09:48Z | 2025-10-27T13:09:48Z |
| suse-su-2025:3807-1 | Security update for erlang | 2025-10-27T12:58:41Z | 2025-10-27T12:58:41Z |
| suse-su-2025:3804-1 | Security update for mozilla-nss | 2025-10-27T11:35:18Z | 2025-10-27T11:35:18Z |
| suse-su-2025:3798-1 | Security update for xen | 2025-10-27T07:58:15Z | 2025-10-27T07:58:15Z |
| suse-su-2025:3797-1 | Security update for xen | 2025-10-27T07:58:09Z | 2025-10-27T07:58:09Z |
| suse-su-2025:3796-1 | Security update for ImageMagick | 2025-10-27T07:58:00Z | 2025-10-27T07:58:00Z |
| suse-su-2025:3794-1 | Security update for chrony | 2025-10-24T15:36:39Z | 2025-10-24T15:36:39Z |
| suse-su-2025:3793-1 | Security update for xen | 2025-10-24T15:35:30Z | 2025-10-24T15:35:30Z |
| suse-su-2025:3791-1 | Security update for p7zip | 2025-10-24T14:56:33Z | 2025-10-24T14:56:33Z |
| suse-su-2025:3788-1 | Security update for libssh | 2025-10-24T13:28:58Z | 2025-10-24T13:28:58Z |
| suse-su-2025:3787-1 | Security update for libssh | 2025-10-24T13:28:40Z | 2025-10-24T13:28:40Z |
| suse-su-2025:3786-1 | Security update for afterburn | 2025-10-24T13:28:30Z | 2025-10-24T13:28:30Z |
| suse-su-2025:3785-1 | Security update for afterburn | 2025-10-24T13:28:23Z | 2025-10-24T13:28:23Z |
| suse-su-2025:3784-1 | Security update for afterburn | 2025-10-24T13:28:17Z | 2025-10-24T13:28:17Z |
| suse-su-2025:3783-1 | Security update for afterburn | 2025-10-24T13:28:12Z | 2025-10-24T13:28:12Z |
| suse-su-2025:3782-1 | Security update for podman | 2025-10-24T13:27:40Z | 2025-10-24T13:27:40Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-00812 | UTT 1200GW缓冲区溢出漏洞 | 2025-09-11 | 2026-01-08 |
| cnvd-2026-00811 | UTT 1200GW缓冲区溢出漏洞(CNVD-2026-00811) | 2025-09-25 | 2026-01-08 |
| cnvd-2026-00810 | UTT 1250GW缓冲区溢出漏洞 | 2025-09-11 | 2026-01-08 |
| cnvd-2026-00809 | UTT 750W缓冲区溢出漏洞 | 2025-09-11 | 2026-01-08 |
| cnvd-2026-00808 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00808) | 2025-09-25 | 2026-01-08 |
| cnvd-2026-00807 | UTT HiPER 840G缓冲区溢出漏洞 | 2025-10-15 | 2026-01-08 |
| cnvd-2026-00806 | UTT 1250GW缓冲区溢出漏洞 | 2025-10-15 | 2026-01-08 |
| cnvd-2026-00805 | UTT 1250GW缓冲区溢出漏洞(CNVD-2026-00805) | 2025-10-15 | 2026-01-08 |
| cnvd-2026-00804 | UTT HiPER 2620G缓冲区溢出漏洞 | 2025-10-17 | 2026-01-08 |
| cnvd-2026-00803 | UTT 进取 518G缓冲区溢出漏洞(CNVD-2026-00803) | 2025-10-17 | 2026-01-08 |
| cnvd-2026-00802 | UTT 进取 518G缓冲区溢出漏洞 | 2025-10-17 | 2026-01-08 |
| cnvd-2026-00801 | UTT 进取 750W命令注入漏洞 | 2025-11-24 | 2026-01-08 |
| cnvd-2026-00800 | UTT 进取 520W缓冲区溢出漏洞 | 2025-12-10 | 2026-01-08 |
| cnvd-2026-00799 | UTT 进取 520W缓冲区溢出漏洞(CNVD-2026-0079988) | 2025-12-10 | 2026-01-08 |
| cnvd-2026-00798 | UTT 进取 520W缓冲区溢出漏洞(CNVD-2026-0079889) | 2025-12-10 | 2026-01-08 |
| cnvd-2026-00797 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079790) | 2025-12-10 | 2026-01-08 |
| cnvd-2026-00796 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079609) | 2025-12-18 | 2026-01-08 |
| cnvd-2026-00795 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079510) | 2025-12-18 | 2026-01-08 |
| cnvd-2026-00794 | UTT 进取 512W内存损坏漏洞 | 2025-12-25 | 2026-01-08 |
| cnvd-2026-00793 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079375) | 2025-12-29 | 2026-01-08 |
| cnvd-2026-00792 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079277) | 2025-12-29 | 2026-01-08 |
| cnvd-2026-00791 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079178) | 2025-12-29 | 2026-01-08 |
| cnvd-2026-02654 | Online Class and Exam Scheduling System class_update.php文件SQL注入漏洞 | 2024-12-13 | 2026-01-07 |
| cnvd-2026-02653 | Online Class and Exam Scheduling System teacher_save.php文件SQL注入漏洞 | 2024-12-18 | 2026-01-07 |
| cnvd-2026-02652 | Online Class and Exam Scheduling System room_update.php文件SQL注入漏洞 | 2024-12-18 | 2026-01-07 |
| cnvd-2026-02651 | Online Class and Exam Scheduling System term.php文件SQL注入漏洞 | 2024-12-20 | 2026-01-07 |
| cnvd-2026-02650 | Online Class and Exam Scheduling System subject_update.php文件SQL注入漏洞 | 2024-12-20 | 2026-01-07 |
| cnvd-2026-02649 | Online Class and Exam Scheduling System rank_update.php文件SQL注入漏洞 | 2024-12-20 | 2026-01-07 |
| cnvd-2026-02648 | Online Class and Exam Scheduling System department.php文件SQL注入漏洞 | 2024-12-20 | 2026-01-07 |
| cnvd-2026-00821 | UTT 进取 512W缓冲区溢出漏洞 | 2025-12-29 | 2026-01-07 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0851 | Vulnérabilité dans Python | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0850 | Multiples vulnérabilités dans Google Chrome | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0847 | Vulnérabilité dans les produits Liferay | 2025-10-06T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| CERTFR-2025-AVI-0851 | Vulnérabilité dans Python | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| CERTFR-2025-AVI-0850 | Multiples vulnérabilités dans Google Chrome | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| CERTFR-2025-AVI-0847 | Vulnérabilité dans les produits Liferay | 2025-10-06T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0849 | Multiples vulnérabilités dans les produits Elastic | 2025-10-07T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0848 | Vulnérabilité dans OpenSSH | 2025-10-06T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| CERTFR-2025-AVI-0849 | Multiples vulnérabilités dans les produits Elastic | 2025-10-07T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| CERTFR-2025-AVI-0848 | Vulnérabilité dans OpenSSH | 2025-10-06T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0846 | Multiples vulnérabilités dans les produits Qnap | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-avi-0845 | Multiples vulnérabilités dans Zabbix | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| CERTFR-2025-AVI-0846 | Multiples vulnérabilités dans les produits Qnap | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| CERTFR-2025-AVI-0845 | Multiples vulnérabilités dans Zabbix | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-avi-0844 | Multiples vulnérabilités dans IBM Sterling Connect | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0843 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0842 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0841 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0840 | Multiples vulnérabilités dans Zabbix | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0839 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0844 | Multiples vulnérabilités dans IBM Sterling Connect | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0843 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0842 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0841 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0840 | Multiples vulnérabilités dans Zabbix | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| CERTFR-2025-AVI-0839 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0838 | Multiples vulnérabilités dans les produits Splunk | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| certfr-2025-avi-0837 | Multiples vulnérabilités dans Google Chrome | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| CERTFR-2025-AVI-0838 | Multiples vulnérabilités dans les produits Splunk | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| CERTFR-2025-AVI-0837 | Multiples vulnérabilités dans Google Chrome | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |