Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-62676 |
6.4 (3.1)
|
An Improper Link Resolution Before File Access ('… |
Fortinet |
FortiClientWindows |
2026-02-10T15:39:12.816Z | 2026-02-16T08:45:31.916Z |
| CVE-2026-2547 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
LigeroSmart index.pl AgentDashboard cross site scripting |
n/a |
LigeroSmart |
2026-02-16T08:32:07.484Z | 2026-02-16T08:32:07.484Z |
| CVE-2026-2546 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
LigeroSmart index.pl cross site scripting |
n/a |
LigeroSmart |
2026-02-16T08:02:07.017Z | 2026-02-16T08:02:07.017Z |
| CVE-2026-24858 |
9.4 (3.1)
|
An Authentication Bypass Using an Alternate Path … |
Fortinet |
FortiManager |
2026-01-27T19:18:23.591Z | 2026-02-16T07:46:19.465Z |
| CVE-2026-2545 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
LigeroSmart index.pl cross site scripting |
n/a |
LigeroSmart |
2026-02-16T07:32:08.515Z | 2026-02-16T07:32:08.515Z |
| CVE-2026-2544 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
yued-fe LuLu UI run.js child_process.exec os command i… |
yued-fe |
LuLu UI |
2026-02-16T07:32:06.183Z | 2026-02-16T07:32:06.183Z |
| CVE-2026-2543 |
5.1 (4.0)
2.7 (3.1)
2.7 (3.0)
|
vichan-devel vichan Password Change pages.php unverifi… |
vichan-devel |
vichan |
2026-02-16T07:02:06.623Z | 2026-02-16T07:02:06.623Z |
| CVE-2026-2542 |
7.3 (4.0)
7 (3.1)
7 (3.0)
|
Total VPN win-service.exe unquoted search path |
n/a |
Total VPN |
2026-02-16T06:32:06.931Z | 2026-02-16T06:32:06.931Z |
| CVE-2026-2538 |
7.3 (4.0)
7 (3.1)
7 (3.0)
|
Flos Freeware Notepad2 Msimg32.dll uncontrolled search path |
Flos Freeware |
Notepad2 |
2026-02-16T06:02:06.344Z | 2026-02-16T06:02:06.344Z |
| CVE-2026-0929 |
N/A
|
RegistrationMagic < 6.0.7.2 - Subscriber+ Form Creation |
Unknown |
RegistrationMagic |
2026-02-16T06:00:01.611Z | 2026-02-16T06:00:01.611Z |
| CVE-2026-2537 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Comfast CF-E4 HTTP POST Request mbox-config command in… |
Comfast |
CF-E4 |
2026-02-16T05:32:05.986Z | 2026-02-16T05:32:05.986Z |
| CVE-2026-2536 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
opencc JFlow Workflow WF_Admin_AttrFlow.java Imp_Done … |
opencc |
JFlow |
2026-02-16T05:02:14.100Z | 2026-02-16T05:02:14.100Z |
| CVE-2026-2535 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Comfast CF-N1 V2 mbox-config sub_44AB9C command injection |
Comfast |
CF-N1 V2 |
2026-02-16T04:32:06.965Z | 2026-02-16T04:32:06.965Z |
| CVE-2026-2534 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Comfast CF-N1 V2 mbox-config sub_44AC4C command injection |
Comfast |
CF-N1 V2 |
2026-02-16T04:02:06.616Z | 2026-02-16T04:02:06.616Z |
| CVE-2026-2533 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Tosei Self-service Washing Machine tosei_datasend.php … |
Tosei |
Self-service Washing Machine |
2026-02-16T03:32:08.901Z | 2026-02-16T03:32:08.901Z |
| CVE-2026-2532 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
lintsinghua DeepAudit IP Address embedding_config.py s… |
lintsinghua |
DeepAudit |
2026-02-16T03:02:09.038Z | 2026-02-16T03:02:09.038Z |
| CVE-2026-2531 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
MindsDB File Upload security.py clear_filename server-… |
n/a |
MindsDB |
2026-02-16T02:32:10.743Z | 2026-02-16T02:32:10.743Z |
| CVE-2026-2530 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 wireless.cgi AddMac command injection |
Wavlink |
WL-WN579A3 |
2026-02-16T02:32:06.862Z | 2026-02-16T02:32:06.862Z |
| CVE-2026-2529 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 wireless.cgi DeleteMac command injection |
Wavlink |
WL-WN579A3 |
2026-02-16T02:02:08.617Z | 2026-02-16T02:02:08.617Z |
| CVE-2026-2528 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 wireless.cgi Delete_Mac_list comman… |
Wavlink |
WL-WN579A3 |
2026-02-16T02:02:07.067Z | 2026-02-16T02:02:07.067Z |
| CVE-2026-2527 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 login.cgi command injection |
Wavlink |
WL-WN579A3 |
2026-02-16T01:32:05.801Z | 2026-02-16T01:32:05.801Z |
| CVE-2026-2526 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 wireless.cgi multi_ssid command injection |
Wavlink |
WL-WN579A3 |
2026-02-16T01:02:08.386Z | 2026-02-16T01:02:08.386Z |
| CVE-2026-2525 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Free5GC PFCP UDP Endpoint denial of service |
n/a |
Free5GC |
2026-02-16T01:02:06.733Z | 2026-02-16T01:02:06.733Z |
| CVE-2026-2524 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS MME mme_s11_handle_create_session_response den… |
n/a |
Open5GS |
2026-02-16T00:32:07.343Z | 2026-02-16T00:32:07.343Z |
| CVE-2026-2523 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SMF gn-handler.c smf_gn_handle_create_pdp_cont… |
n/a |
Open5GS |
2026-02-16T00:02:07.539Z | 2026-02-16T00:02:07.539Z |
| CVE-2026-2522 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS MME esm-build.c memory corruption |
n/a |
Open5GS |
2026-02-15T23:32:06.700Z | 2026-02-15T23:32:06.700Z |
| CVE-2026-2521 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SGW-C sgwc_s5c_handle_create_session_response … |
n/a |
Open5GS |
2026-02-15T23:02:07.287Z | 2026-02-15T23:02:07.287Z |
| CVE-2026-26369 |
9.3 (4.0)
9.8 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Privilege Esca… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:56.204Z | 2026-02-15T15:29:56.204Z |
| CVE-2026-26368 |
8.7 (4.0)
8.8 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Account Takeov… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:55.403Z | 2026-02-15T15:29:55.403Z |
| CVE-2026-26367 |
7.1 (4.0)
6.5 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Arbitrary User… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:54.646Z | 2026-02-15T15:29:54.646Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2522 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS MME esm-build.c memory corruption |
n/a |
Open5GS |
2026-02-15T23:32:06.700Z | 2026-02-15T23:32:06.700Z |
| CVE-2026-2521 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SGW-C sgwc_s5c_handle_create_session_response … |
n/a |
Open5GS |
2026-02-15T23:02:07.287Z | 2026-02-15T23:02:07.287Z |
| CVE-2026-26369 |
9.3 (4.0)
9.8 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Privilege Esca… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:56.204Z | 2026-02-15T15:29:56.204Z |
| CVE-2026-26368 |
8.7 (4.0)
8.8 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Account Takeov… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:55.403Z | 2026-02-15T15:29:55.403Z |
| CVE-2026-26367 |
7.1 (4.0)
6.5 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Arbitrary User… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:54.646Z | 2026-02-15T15:29:54.646Z |
| CVE-2026-26366 |
9.3 (4.0)
9.8 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:53.866Z | 2026-02-15T15:29:53.866Z |
| CVE-2019-25377 |
4.8 (4.0)
5.4 (3.1)
|
OPNsense 19.1 Reflected XSS via system_advanced_sysctl.php |
Opnsense |
OPNsense |
2026-02-15T13:58:58.193Z | 2026-02-15T13:58:58.193Z |
| CVE-2019-25376 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via proxy endpoint |
Opnsense |
OPNsense |
2026-02-15T13:58:57.461Z | 2026-02-15T13:58:57.461Z |
| CVE-2019-25375 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via monit interface |
Opnsense |
OPNsense |
2026-02-15T13:58:56.731Z | 2026-02-15T13:58:56.731Z |
| CVE-2019-25374 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via vpn_ipsec_settings.php |
Opnsense |
OPNsense |
2026-02-15T13:58:55.932Z | 2026-02-15T13:58:55.932Z |
| CVE-2019-25373 |
5.1 (4.0)
6.4 (3.1)
|
OPNsense 19.1 Stored XSS via firewall_rules_edit.php |
Opnsense |
OPNsense |
2026-02-15T13:58:55.157Z | 2026-02-15T13:58:55.157Z |
| CVE-2019-25372 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via diag_traceroute.php |
Opnsense |
OPNsense |
2026-02-15T13:58:54.354Z | 2026-02-15T13:58:54.354Z |
| CVE-2019-25371 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via diag_ping.php |
Opnsense |
OPNsense |
2026-02-15T13:58:53.595Z | 2026-02-15T13:58:53.595Z |
| CVE-2019-25370 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via interfaces_vlan_edit.php |
Opnsense |
OPNsense |
2026-02-15T13:58:52.849Z | 2026-02-15T13:58:52.849Z |
| CVE-2019-25369 |
5.1 (4.0)
6.4 (3.1)
|
OPNsense 19.1 Stored XSS via system_advanced_sysctl.php |
Opnsense |
OPNsense |
2026-02-15T13:58:52.074Z | 2026-02-15T13:58:52.074Z |
| CVE-2019-25368 |
4.8 (4.0)
5.4 (3.1)
|
OPNsense 19.1 Reflected XSS via diag_backup.php |
Opnsense |
OPNsense |
2026-02-15T13:58:51.292Z | 2026-02-15T13:58:51.292Z |
| CVE-2019-25367 |
4.8 (4.0)
5.4 (3.1)
|
ArangoDB Community Edition 3.4.2-1 XSS via aardvark ad… |
Arangodb |
ArangoDB Community Edition |
2026-02-15T13:58:50.426Z | 2026-02-15T13:58:50.426Z |
| CVE-2026-2517 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SMF types.c ogs_gtp2_parse_tft denial of service |
n/a |
Open5GS |
2026-02-15T12:32:08.127Z | 2026-02-15T12:32:08.127Z |
| CVE-2026-2516 |
7.3 (4.0)
7 (3.1)
7 (3.0)
|
Unidocs ezPDF DRM Reader/ezPDF Reader SHFOLDER.dll unc… |
Unidocs |
ezPDF DRM Reader |
2026-02-15T12:02:06.101Z | 2026-02-15T12:02:06.101Z |
| CVE-2026-2541 |
6.4 (4.0)
|
Micca KE700 Brute-force vulnerability due to low entropy |
Micca Auto Electronics Co., Ltd. |
Car Alarm System KE700 |
2026-02-15T11:07:40.539Z | 2026-02-15T11:07:40.539Z |
| CVE-2026-2540 |
8.4 (4.0)
|
Micca KE700 Acceptance of previously used rolling codes |
Micca Auto Electronics Co., Ltd. |
Car Alarm System KE700 |
2026-02-15T11:03:26.051Z | 2026-02-15T11:03:26.051Z |
| CVE-2026-2539 |
5.7 (4.0)
|
Micca KE700 Cleartext transmission of key fob ID |
Micca Auto Electronics Co., Ltd. |
Car Alarm System KE700 |
2026-02-15T10:58:38.397Z | 2026-02-15T10:58:38.397Z |
| CVE-2025-32063 |
6.8 (3.1)
|
Enabling SSH server on Infotainment ECU |
Bosch |
Infotainment system ECU |
2026-02-15T10:48:34.125Z | 2026-02-15T10:48:34.125Z |
| CVE-2025-32062 |
8.8 (3.1)
|
Stack Buffer Overflow leading to RCE in Bluetooth stac… |
Bosch |
Infotainment system ECU |
2026-02-15T10:47:57.740Z | 2026-02-15T10:47:57.740Z |
| CVE-2025-32061 |
8.8 (3.1)
|
Stack Buffer Overflow leading to RCE in Bluetooth stac… |
Bosch |
Infotainment system ECU |
2026-02-15T10:47:15.555Z | 2026-02-15T10:47:15.555Z |
| CVE-2025-32060 |
6.7 (3.1)
|
Absence of Kernel Module Signature Verification on Lin… |
Bosch |
Infotainment system ECU |
2026-02-15T10:46:23.570Z | 2026-02-15T10:46:23.570Z |
| CVE-2025-32059 |
8.8 (3.1)
|
Stack Buffer Overflow leading to RCE in Bluetooth stac… |
Bosch |
Infotainment system ECU |
2026-02-15T10:45:42.900Z | 2026-02-15T10:45:42.900Z |
| CVE-2025-32058 |
9.3 (3.1)
|
Stack Overflow in processing requests over INC interfa… |
Bosch |
Infotainment system ECU |
2026-02-15T10:44:48.125Z | 2026-02-15T10:44:48.125Z |
| CVE-2026-1793 |
6.5 (3.1)
|
Element Pack Addons for Elementor <= 8.3.17 - Authenti… |
bdthemes |
Element Pack Addons for Elementor |
2026-02-15T03:24:34.335Z | 2026-02-15T03:24:34.335Z |
| CVE-2026-1750 |
8.8 (3.1)
|
Ecwid by Lightspeed Ecommerce Shopping Cart <= 7.0.7 -… |
ecwid |
Ecwid by Lightspeed Ecommerce Shopping Cart |
2026-02-15T03:24:33.787Z | 2026-02-15T03:24:33.787Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2019-25373 | OPNsense 19.1 contains a stored cross-site scripting vulnerability that allows authenticated attack… | 2026-02-15T14:16:07.067 | 2026-02-15T14:16:07.067 |
| fkie_cve-2019-25372 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-15T14:16:06.897 | 2026-02-15T14:16:06.897 |
| fkie_cve-2019-25371 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-15T14:16:06.723 | 2026-02-15T14:16:06.723 |
| fkie_cve-2019-25370 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows attackers to inje… | 2026-02-15T14:16:06.550 | 2026-02-15T14:16:06.550 |
| fkie_cve-2019-25369 | OPNsense 19.1 contains a stored cross-site scripting vulnerability in the system_advanced_sysctl.ph… | 2026-02-15T14:16:06.370 | 2026-02-15T14:16:06.370 |
| fkie_cve-2019-25368 | OPNsense 19.1 contains multiple cross-site scripting vulnerabilities in the diag_backup.php endpoin… | 2026-02-15T14:16:06.190 | 2026-02-15T14:16:06.190 |
| fkie_cve-2019-25367 | ArangoDB Community Edition 3.4.2-1 contains multiple cross-site scripting vulnerabilities in the Aa… | 2026-02-15T14:16:05.083 | 2026-02-15T14:16:05.083 |
| fkie_cve-2026-2517 | A security flaw has been discovered in Open5GS up to 2.7.6. This vulnerability affects the function… | 2026-02-15T13:16:16.690 | 2026-02-15T13:16:16.690 |
| fkie_cve-2026-2516 | A vulnerability was identified in Unidocs ezPDF DRM Reader and ezPDF Reader 2.0/3.0.0.4 on 32-bit. … | 2026-02-15T13:16:16.423 | 2026-02-15T13:16:16.423 |
| fkie_cve-2026-2541 | The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling… | 2026-02-15T11:15:55.223 | 2026-02-15T11:15:55.223 |
| fkie_cve-2026-2540 | The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks.… | 2026-02-15T11:15:55.070 | 2026-02-15T11:15:55.070 |
| fkie_cve-2026-2539 | The RF communication protocol in the Micca KE700 car alarm system does not encrypt its data frames.… | 2026-02-15T11:15:54.897 | 2026-02-15T11:15:54.897 |
| fkie_cve-2025-32063 | There is a misconfiguration vulnerability inside the Infotainment ECU manufactured by BOSCH. The vu… | 2026-02-15T11:15:54.443 | 2026-02-15T11:15:54.443 |
| fkie_cve-2025-32062 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T11:15:54.307 | 2026-02-15T11:15:54.307 |
| fkie_cve-2025-32061 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T11:15:54.170 | 2026-02-15T11:15:54.170 |
| fkie_cve-2025-32060 | The system suffers from the absence of a kernel module signature verification. If an attacker can e… | 2026-02-15T11:15:54.023 | 2026-02-15T11:15:54.023 |
| fkie_cve-2025-32059 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T11:15:53.880 | 2026-02-15T11:15:53.880 |
| fkie_cve-2025-32058 | The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is conn… | 2026-02-15T11:15:52.773 | 2026-02-15T11:15:52.773 |
| fkie_cve-2026-1793 | The Element Pack Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in… | 2026-02-15T04:15:54.260 | 2026-02-15T04:15:54.260 |
| fkie_cve-2026-1750 | The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Esc… | 2026-02-15T04:15:54.113 | 2026-02-15T04:15:54.113 |
| fkie_cve-2026-1490 | The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unautho… | 2026-02-15T04:15:53.783 | 2026-02-15T04:15:53.783 |
| fkie_cve-2026-23766 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2026-01-15T20:16:06.057 | 2026-02-14T18:16:10.087 |
| fkie_cve-2026-23210 | In the Linux kernel, the following vulnerability has been resolved: ice: Fix PTP NULL pointer dere… | 2026-02-14T17:15:58.910 | 2026-02-14T17:15:58.910 |
| fkie_cve-2026-23209 | In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in… | 2026-02-14T17:15:58.803 | 2026-02-14T17:15:58.803 |
| fkie_cve-2026-23207 | In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect cu… | 2026-02-14T17:15:58.610 | 2026-02-14T17:15:58.610 |
| fkie_cve-2026-23206 | In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: prevent ZERO_SIZ… | 2026-02-14T17:15:58.507 | 2026-02-14T17:15:58.507 |
| fkie_cve-2026-23205 | In the Linux kernel, the following vulnerability has been resolved: smb/client: fix memory leak in… | 2026-02-14T17:15:58.403 | 2026-02-14T17:15:58.403 |
| fkie_cve-2026-23204 | In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_he… | 2026-02-14T17:15:58.297 | 2026-02-14T17:15:58.297 |
| fkie_cve-2026-23203 | In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set… | 2026-02-14T17:15:58.177 | 2026-02-14T17:15:58.177 |
| fkie_cve-2026-23202 | In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect cu… | 2026-02-14T17:15:58.050 | 2026-02-14T17:15:58.050 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-8v3q-9fpq-83mr |
6.1 (3.1)
5.1 (4.0)
|
OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-15T15:31:31Z | 2026-02-15T15:31:31Z |
| ghsa-6rfq-gmm4-49p9 |
6.1 (3.1)
5.1 (4.0)
|
OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-15T15:31:31Z | 2026-02-15T15:31:31Z |
| ghsa-6333-cc9f-9589 |
6.1 (3.1)
5.1 (4.0)
|
OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-15T15:31:31Z | 2026-02-15T15:31:31Z |
| ghsa-58cm-5853-qxj5 |
6.1 (3.1)
5.1 (4.0)
|
OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows attackers to inje… | 2026-02-15T15:31:31Z | 2026-02-15T15:31:31Z |
| ghsa-48j5-wgv3-9c7p |
5.4 (3.1)
4.8 (4.0)
|
OPNsense 19.1 contains multiple cross-site scripting vulnerabilities in the diag_backup.php endpoin… | 2026-02-15T15:31:31Z | 2026-02-15T15:31:31Z |
| ghsa-2wpq-gf9v-758w |
5.4 (3.1)
4.8 (4.0)
|
ArangoDB Community Edition 3.4.2-1 contains multiple cross-site scripting vulnerabilities in the Aa… | 2026-02-15T15:31:31Z | 2026-02-15T15:31:31Z |
| ghsa-2444-5vx9-4q2f |
6.1 (3.1)
5.1 (4.0)
|
OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-15T15:31:31Z | 2026-02-15T15:31:31Z |
| ghsa-x78v-9635-m8h6 |
6.7 (3.1)
|
The system suffers from the absence of a kernel module signature verification. If an attacker can e… | 2026-02-15T12:30:25Z | 2026-02-15T12:30:25Z |
| ghsa-x677-27jv-v4hg |
9.3 (3.1)
|
The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is conn… | 2026-02-15T12:30:25Z | 2026-02-15T12:30:25Z |
| ghsa-rh27-rh4c-2g53 |
8.8 (3.1)
|
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T12:30:25Z | 2026-02-15T12:30:25Z |
| ghsa-p4c6-vgj5-cp35 |
6.8 (3.1)
|
There is a misconfiguration vulnerability inside the Infotainment ECU manufactured by BOSCH. The vu… | 2026-02-15T12:30:25Z | 2026-02-15T12:30:25Z |
| ghsa-m26w-8h7j-ggp7 |
8.8 (3.1)
|
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T12:30:25Z | 2026-02-15T12:30:25Z |
| ghsa-h385-cwmv-vj9f |
6.4 (4.0)
|
The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling… | 2026-02-15T12:30:25Z | 2026-02-15T12:30:25Z |
| ghsa-95x5-2fg3-wr5q |
8.8 (3.1)
|
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T12:30:25Z | 2026-02-15T12:30:25Z |
| ghsa-88gg-5jpf-jc8f |
5.7 (4.0)
|
The RF communication protocol in the Micca KE700 car alarm system does not encrypt its data frames.… | 2026-02-15T12:30:25Z | 2026-02-15T12:30:25Z |
| ghsa-822c-h5gx-7pw7 |
8.4 (4.0)
|
The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks.… | 2026-02-15T12:30:25Z | 2026-02-15T12:30:25Z |
| ghsa-wp7f-392c-hj4c |
8.8 (3.1)
|
The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Esc… | 2026-02-15T06:31:35Z | 2026-02-15T06:31:35Z |
| ghsa-r6q3-r9p8-6prh |
9.8 (3.1)
|
The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unautho… | 2026-02-15T06:31:35Z | 2026-02-15T06:31:35Z |
| ghsa-9xfq-99mh-jq67 |
6.5 (3.1)
|
The Element Pack Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in… | 2026-02-15T06:31:35Z | 2026-02-15T06:31:35Z |
| ghsa-xwq7-47qj-qwwf |
|
In the Linux kernel, the following vulnerability has been resolved: mm, shmem: prevent infinite lo… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:16Z |
| ghsa-xcg5-9p3p-fgrj |
|
In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: avoid pool UAF A… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-x3gh-q355-f5px |
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access a… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-x2mr-3x78-f97g |
|
In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: prevent ZERO_SIZ… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-wr52-6c6f-x6gv |
|
In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-vm5x-8w9j-f2rm |
|
In the Linux kernel, the following vulnerability has been resolved: platform/x86: toshiba_haps: Fi… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-rwhg-vqv9-mjpv |
|
In the Linux kernel, the following vulnerability has been resolved: spi: tegra: Fix a memory leak … | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-rhhh-mwpc-m2qj |
|
In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: fix potential bu… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-rf63-9f5h-hhg6 |
|
In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_he… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-r35m-5r25-v2fx |
|
In the Linux kernel, the following vulnerability has been resolved: ceph: fix NULL pointer derefer… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-q6cr-hchj-9qvc |
|
In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: fix NULL pointer … | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-245 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated user… | apache-airflow | 2024-02-29T11:15:08+00:00 | 2025-05-01T21:22:38.598048+00:00 |
| pysec-2025-35 |
7.5 (3.1)
|
Weblate is a web based localization tool. Prior to version 5.11, when creating a new comp… | weblate | 2025-04-15T21:16:04+00:00 | 2025-04-30T17:22:51.467257+00:00 |
| pysec-2025-34 |
|
The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_… | picklescan | 2025-04-24T01:15:49+00:00 | 2025-04-24T03:08:15.436691+00:00 |
| pysec-2025-33 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the… | vyper | 2025-01-14T18:16:05+00:00 | 2025-04-23T21:23:01.322686+00:00 |
| pysec-2025-32 |
9.8 (3.1)
|
BentoML is a Python library for building online serving systems optimized for AI apps and… | bentoml | 2025-04-09T16:15:25+00:00 | 2025-04-22T19:21:34.073355+00:00 |
| pysec-2025-31 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statemen… | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.116292+00:00 |
| pysec-2025-30 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.064106+00:00 |
| pysec-2025-29 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.005382+00:00 |
| pysec-2025-28 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
| pysec-2025-27 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
| pysec-2025-26 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.645758+00:00 |
| pysec-2025-25 |
6.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middle… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.532849+00:00 |
| pysec-2025-24 |
7.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the /api/remove… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.486485+00:00 |
| pysec-2025-23 |
|
Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Inform… | ray | 2025-03-06T05:15:16+00:00 | 2025-04-09T17:27:27.434099+00:00 |
| pysec-2025-22 |
9.8 (3.1)
|
A vulnerability, that could result in Remote Code Execution (RCE), has been found in Plot… | plotai | 2025-03-10T14:15:24+00:00 | 2025-04-09T17:27:27.203714+00:00 |
| pysec-2025-21 |
9.8 (3.1)
|
picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model arch… | picklescan | 2025-03-10T12:15:12+00:00 | 2025-04-09T17:27:27.016747+00:00 |
| pysec-2023-311 |
5.4 (3.1)
|
plone.namedfile allows users to handle `File` and `Image` fields targeting, but not depen… | plone-namedfile | 2023-09-21T15:15:10+00:00 | 2025-04-09T17:27:27.153848+00:00 |
| pysec-2022-43179 |
7.3 (3.1)
|
Poetry is a dependency manager for Python. To handle dependencies that come from a Git re… | poetry | 2022-09-07T19:15:08+00:00 | 2025-04-09T17:27:27.255151+00:00 |
| pysec-2021-891 |
7.8 (3.1)
|
CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 S… | salt | 2021-03-03T10:15:13+00:00 | 2025-04-09T17:27:27.582884+00:00 |
| pysec-2025-20 |
6.5 (3.1)
|
picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes i… | picklescan | 2025-03-10T12:15:10+00:00 | 2025-04-09T17:27:26.966215+00:00 |
| pysec-2025-19 |
9.8 (3.1)
|
picklescan before 0.0.22 only considers standard pickle file extensions in the scope for … | picklescan | 2025-03-03T19:15:34+00:00 | 2025-04-09T17:27:26.916350+00:00 |
| pysec-2025-18 |
|
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craf… | picklescan | 2025-02-26T15:15:24+00:00 | 2025-04-09T17:27:26.867210+00:00 |
| pysec-2025-17 |
5.5 (3.1)
|
In mlflow/mlflow version 2.18, an admin is able to create a new user account without sett… | mlflow | 2025-03-20T10:15:54+00:00 | 2025-04-09T17:27:26.322333+00:00 |
| pysec-2023-310 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NO… | mobsf | 2023-09-21T22:15:11+00:00 | 2025-04-09T17:27:26.663665+00:00 |
| pysec-2023-309 |
8.8 (3.1)
|
Path Traversal in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-13T00:15:07+00:00 | 2025-04-09T17:27:26.271200+00:00 |
| pysec-2023-308 |
10.0 (3.1)
|
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0. | mlflow | 2023-07-19T01:15:10+00:00 | 2025-04-09T17:27:26.223213+00:00 |
| pysec-2025-16 |
7.5 (3.1)
|
LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vu… | lnbits | 2025-04-06T20:15:15+00:00 | 2025-04-09T17:27:25.872691+00:00 |
| pysec-2025-15 |
5.3 (3.1)
|
Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilde… | flask-appbuilder | 2025-03-03T16:15:41+00:00 | 2025-04-09T17:27:25.227116+00:00 |
| pysec-2025-14 |
|
An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normal… | django | 2025-04-02T13:15:44+00:00 | 2025-04-09T17:27:25.169049+00:00 |
| pysec-2025-13 |
|
An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2… | django | 2025-03-06T19:15:27+00:00 | 2025-04-09T17:27:25.095679+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33851 | phpecc, as used in paragonie/phpecc before 2.0.1, has a branch-based timing leak in Point… | 2024-04-28T05:02:07.732559Z |
| gsd-2024-33850 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.952536Z |
| gsd-2024-33849 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.924449Z |
| gsd-2024-4295 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:06.068263Z |
| gsd-2024-4294 | A vulnerability, which was classified as critical, has been found in PHPGurukul Doctor Ap… | 2024-04-28T05:02:06.079201Z |
| gsd-2024-4293 | A vulnerability classified as problematic was found in PHPGurukul Doctor Appointment Mana… | 2024-04-28T05:02:06.052534Z |
| gsd-2024-4292 | A vulnerability classified as critical has been found in Contemporary Controls BASrouter … | 2024-04-28T05:02:06.073286Z |
| gsd-2024-4291 | A vulnerability was found in Tenda A301 15.13.08.12_multi_TDE01. It has been rated as cri… | 2024-04-28T05:02:06.058388Z |
| gsd-2023-52722 | An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER … | 2024-04-28T05:01:28.746814Z |
| gsd-2022-48685 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.870720Z |
| gsd-2022-48684 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.715598Z |
| gsd-2024-24777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:24.547536Z |
| gsd-2024-28875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:20.401696Z |
| gsd-2024-33846 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.353086Z |
| gsd-2024-33845 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.569462Z |
| gsd-2024-33844 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.384822Z |
| gsd-2024-33843 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393431Z |
| gsd-2024-33842 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.286185Z |
| gsd-2024-33841 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393169Z |
| gsd-2024-33840 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.586722Z |
| gsd-2024-33839 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.579161Z |
| gsd-2024-33838 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.585807Z |
| gsd-2024-33837 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.377806Z |
| gsd-2024-33836 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.309729Z |
| gsd-2024-33835 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.550838Z |
| gsd-2024-33834 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.333945Z |
| gsd-2024-33833 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.551960Z |
| gsd-2024-33832 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.298682Z |
| gsd-2024-33831 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.326184Z |
| gsd-2024-33830 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.395389Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-868 | Malicious code in pydantics (PyPI) | 2026-02-12T08:42:04Z | 2026-02-12T08:42:04Z |
| mal-2026-863 | Malicious code in krbutils (PyPI) | 2026-02-12T08:40:10Z | 2026-02-12T08:40:10Z |
| mal-2026-862 | Malicious code in get-incorrect-name-bob (PyPI) | 2026-02-12T00:01:39Z | 2026-02-12T00:01:39Z |
| mal-2026-860 | Malicious code in osopackagepy (PyPI) | 2026-02-11T15:50:58Z | 2026-02-11T16:53:59Z |
| mal-2025-6515 | Malicious code in graphdict (PyPI) | 2025-07-09T18:18:10Z | 2026-02-11T16:53:59Z |
| mal-2025-192430 | Malicious code in bigpyx (PyPI) | 2025-12-10T08:44:43Z | 2026-02-11T16:53:59Z |
| mal-2025-192391 | Malicious code in bignum (PyPI) | 2025-12-09T16:32:42Z | 2026-02-11T16:53:59Z |
| mal-2025-192385 | Malicious code in graphsync (PyPI) | 2025-12-09T08:01:54Z | 2026-02-11T16:53:59Z |
| mal-2025-192376 | Malicious code in graphnode (PyPI) | 2025-12-08T14:14:35Z | 2026-02-11T16:53:59Z |
| mal-2026-861 | Malicious code in express-gueues (npm) | 2026-02-11T16:43:01Z | 2026-02-11T16:43:01Z |
| mal-2026-857 | Malicious code in osopackage (npm) | 2026-02-11T15:13:28Z | 2026-02-11T15:13:29Z |
| mal-2026-859 | Malicious code in systemtest-network (npm) | 2026-02-11T15:13:28Z | 2026-02-11T15:13:28Z |
| mal-2026-858 | Malicious code in systemtest-information (npm) | 2026-02-11T15:13:28Z | 2026-02-11T15:13:28Z |
| mal-2026-856 | Malicious code in chai-prop (npm) | 2026-02-11T14:19:52Z | 2026-02-11T14:19:53Z |
| mal-2026-855 | Malicious code in config-toolkit (PyPI) | 2026-02-11T14:08:58Z | 2026-02-11T14:08:58Z |
| mal-2026-854 | Malicious code in sinon-node (npm) | 2026-02-11T10:54:37Z | 2026-02-11T10:54:42Z |
| mal-2026-853 | Malicious code in node-dotenv-cli (npm) | 2026-02-11T10:54:37Z | 2026-02-11T10:54:37Z |
| mal-2026-852 | Malicious code in chai-await (npm) | 2026-02-11T10:54:36Z | 2026-02-11T10:54:37Z |
| mal-2026-851 | Malicious code in python-files-mod (PyPI) | 2026-02-11T10:40:53Z | 2026-02-11T10:40:53Z |
| mal-2026-850 | Malicious code in ntoctfutils (PyPI) | 2026-02-11T08:58:36Z | 2026-02-11T08:58:36Z |
| mal-2026-848 | Malicious code in npm_cimetadata (npm) | 2026-02-11T03:35:51Z | 2026-02-11T08:21:22Z |
| mal-2026-849 | Malicious code in jsonconfig-utils (PyPI) | 2026-02-11T06:56:16Z | 2026-02-11T06:56:16Z |
| mal-2026-846 | Malicious code in cryptowallethash (PyPI) | 2026-02-10T23:03:29Z | 2026-02-10T23:05:44Z |
| mal-2026-847 | Malicious code in requests-auth-toolkit (PyPI) | 2026-02-10T22:45:40Z | 2026-02-10T22:45:40Z |
| mal-2026-845 | Malicious code in rzr-home (PyPI) | 2026-02-10T20:45:52Z | 2026-02-10T20:45:52Z |
| mal-2026-842 | Malicious code in amplify-python-logging (PyPI) | 2026-02-10T19:22:57Z | 2026-02-10T19:22:57Z |
| mal-2026-844 | Malicious code in vllm-plugins (PyPI) | 2026-02-10T19:19:17Z | 2026-02-10T19:19:17Z |
| mal-2026-843 | Malicious code in requests-core-plugin (PyPI) | 2026-02-10T19:14:49Z | 2026-02-10T19:14:49Z |
| mal-2026-841 | Malicious code in lyroxpy (PyPI) | 2026-02-10T19:02:39Z | 2026-02-10T19:02:39Z |
| mal-2026-839 | Malicious code in search-newfrontier-podlet (npm) | 2026-02-10T17:16:51Z | 2026-02-10T17:16:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2431 | Linux Kernel: Mehrere Schwachstellen | 2025-10-28T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2430 | Linux Kernel: Mehrere Schwachstellen | 2025-10-27T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2407 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-26T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2394 | Linux Kernel: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2350 | Linux Kernel: Mehrere Schwachstellen | 2025-10-20T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2340 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-19T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2298 | Linux Kernel: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2268 | Linux Kernel: Mehrere Schwachstellen | 2025-10-13T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2246 | Linux Kernel: Mehrere Schwachstellen | 2025-10-08T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2229 | Linux Kernel: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2227 | Golang Go: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2194 | Linux Kernel: Mehrere Schwachstellen | 2025-10-05T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2187 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-01T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2186 | Django: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-10-01T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0383 | AMD Radeon: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0377 | Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2026-02-10T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0369 | Microsoft Windows: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0309 | NGINX OSS und NGINX Plus: Schwachstelle ermöglicht Manipulation von Dateien | 2026-02-04T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0194 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0184 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0114 | Red Hat OpenShift (github.com/sirupsen/logrus): Schwachstelle ermöglicht Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0098 | Node.js: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0080 | Microsoft Azure: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0009 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-04T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2914 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-22T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2904 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-18T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2737 | libpng: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-12-03T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2024-1008 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-05-01T22:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2024-0920 | Linux Kernel: Mehrere Schwachstellen | 2024-04-17T22:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2024-0749 | Linux Kernel: Mehrere Schwachstellen | 2024-04-01T22:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0005 | Kwetsbaarheden verholpen in Siemens producten | 2026-01-13T12:05:57.353070Z | 2026-01-13T12:05:57.353070Z |
| ncsc-2026-0004 | Kwetsbaarheden verholpen in Trend Micro Apex Central | 2026-01-09T11:14:58.910197Z | 2026-01-09T11:14:58.910197Z |
| ncsc-2026-0003 | Kwetsbaarheden verholpen in GitLab | 2026-01-09T11:11:48.308357Z | 2026-01-09T11:11:48.308357Z |
| ncsc-2026-0002 | Kwetsbaarheid verholpen in n8n | 2026-01-08T12:34:29.315681Z | 2026-01-08T12:34:29.315681Z |
| ncsc-2026-0001 | Kwetsbaarheden verholpen in Hanwha camera systemen | 2026-01-08T12:28:21.446188Z | 2026-01-08T12:28:21.446188Z |
| ncsc-2025-0405 | Kwetsbaarheid verholpen in Roundcube Webmail | 2025-12-31T14:29:26.821576Z | 2025-12-31T14:29:26.821576Z |
| ncsc-2025-0404 | Kwetsbaarheid verholpen in SmarterMail | 2025-12-31T14:19:01.847364Z | 2025-12-31T14:19:01.847364Z |
| ncsc-2025-0403 | Kwetsbaarheden verholpen in QNAP besturingssystemen | 2025-12-29T09:17:28.385450Z | 2025-12-29T09:17:28.385450Z |
| ncsc-2025-0402 | Kwetsbaarheid verholpen in MongoDB | 2025-12-27T11:38:11.514349Z | 2025-12-27T11:38:11.514349Z |
| ncsc-2025-0399 | Kwetsbaarheid verholpen in HPE OneView Software | 2025-12-18T18:38:20.794784Z | 2025-12-24T11:29:46.123674Z |
| ncsc-2025-0401 | Kwetsbaarheden verholpen in Foxit PDF Reader | 2025-12-24T09:14:56.590353Z | 2025-12-24T09:14:56.590353Z |
| ncsc-2025-0400 | Kwetsbaarheid verholpen in WatchGuard Firebox | 2025-12-19T11:16:01.438518Z | 2025-12-19T11:16:01.438518Z |
| ncsc-2025-0398 | Kwetsbaarheid in Cisco AsyncOS | 2025-12-17T19:47:00.346651Z | 2025-12-17T19:47:00.346651Z |
| ncsc-2025-0397 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-12-15T09:08:39.804149Z | 2025-12-15T09:08:39.804149Z |
| ncsc-2025-0396 | Kwetsbaarheden verholpen in Apple macOS | 2025-12-15T09:06:36.450655Z | 2025-12-15T09:06:36.450655Z |
| ncsc-2025-0394 | Kwetsbaarheden verholpen in React Server Components | 2025-12-12T09:04:19.324080Z | 2025-12-12T10:46:34.688189Z |
| ncsc-2025-0395 | Kwetsbaarheden verholpen in SAP Software | 2025-12-12T09:29:08.429888Z | 2025-12-12T09:29:08.429888Z |
| ncsc-2025-0393 | Kwetsbaarheid verholpen in GeoServer | 2025-12-12T08:12:18.831044Z | 2025-12-12T09:02:27.681292Z |
| ncsc-2025-0392 | Kwetsbaarheid verholpen in Barracuda Service Center | 2025-12-11T13:53:23.819008Z | 2025-12-11T13:53:23.819008Z |
| ncsc-2025-0391 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-12-11T13:51:55.178462Z | 2025-12-11T13:51:55.178462Z |
| ncsc-2025-0390 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-12-11T09:22:54.841848Z | 2025-12-11T09:22:54.841848Z |
| ncsc-2025-0389 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-12-10T14:59:57.911864Z | 2025-12-10T14:59:57.911864Z |
| ncsc-2025-0388 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-12-10T13:35:58.314547Z | 2025-12-10T13:35:58.314547Z |
| ncsc-2025-0387 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-12-10T13:34:08.908897Z | 2025-12-10T13:34:08.908897Z |
| ncsc-2025-0385 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-12-09T18:42:32.332749Z | 2025-12-09T18:42:32.332749Z |
| ncsc-2025-0384 | Kwetsbaarheden verholpen in Microsoft Office | 2025-12-09T18:40:33.839342Z | 2025-12-09T18:40:33.839342Z |
| ncsc-2025-0383 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-12-09T18:39:18.152251Z | 2025-12-09T18:39:18.152251Z |
| ncsc-2025-0382 | Kwetsbaarheden verholpen in Siemens producten | 2025-12-09T13:15:05.391966Z | 2025-12-09T13:15:05.391966Z |
| ncsc-2025-0381 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-12-08T08:23:21.965599Z | 2025-12-08T08:23:21.965599Z |
| ncsc-2025-0380 | Kwetsbaarheden verholpen in React Server Components | 2025-12-03T20:11:57.728117Z | 2025-12-05T12:13:36.590522Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-750499 | SSA-750499: Weak Encryption Vulnerability in SIPROTEC 5 Devices | 2024-07-09T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-726617 | SSA-726617: Incorrect Privilege Assignment Vulnerability in Mendix OIDC SSO Module | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-711309 | SSA-711309: Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products | 2023-09-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-687955 | SSA-687955: Accessible Development Shell via Physical Interface in SIPROTEC 5 | 2025-02-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-682326 | SSA-682326: Multiple Vulnerabilities in COMOS before V10.4.5 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-631336 | SSA-631336: Multiple Web Server Vulnerabilities in SICAM GridEdge Before V2.6.6 | 2022-06-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-522291 | SSA-522291: Improper Certificate Validation Vulnerability in Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-514895 | SSA-514895: Multiple Vulnerabilities in Altair Grid Engine V2025.1.0 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-365596 | SSA-365596: DLL Hijacking Vulnerability in Siemens Software Center and Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-339694 | SSA-339694: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-322980 | SSA-322980: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2023-04-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-267056 | SSA-267056: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-225578 | SSA-225578: Improper Access Control Vulnerability in SICAM GridEdge Before V2.7.3 | 2022-07-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-201498 | SSA-201498: Multiple Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices Before V3.11 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-194557 | SSA-194557: Improper Limitation of Filesystem Access through Web Server Vulnerability in SIPROTEC 5 | 2025-01-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-876787 | SSA-876787: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-722410 | SSA-722410: Multiple Vulnerabilities in User Management Component (UMC) | 2025-09-09T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-625789 | SSA-625789: Multiple Vulnerabilities in SIMATIC S7-1200 CPU V1/V2 Devices | 2011-06-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-614723 | SSA-614723: Denial of Service Vulnerabilities in User Management Component (UMC) | 2025-05-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-541582 | SSA-541582: Multiple File Parsing Vulnerabilities in Solid Edge | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-486936 | SSA-486936: Authentication Vulnerability in SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-373591 | SSA-373591: Buffer Overflow Vulnerability in RUGGEDCOM ROS Devices | 2021-07-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-367714 | SSA-367714: Improper Integrity Check of Firmware Updates in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-05-23T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-318832 | SSA-318832: SQL Injection Vulnerability in SINEC NMS | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-279823 | SSA-279823: Cross-Site Scripting Vulnerability in SIMATIC S7-1200 CPU V2/V3 Before V3.0.2 | 2012-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-240718 | SSA-240718: Insecure Storage of HTTPS CA Certificate in SIMATIC S7-1200 CPU V2 | 2012-09-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-186293 | SSA-186293: XML External Entity (XXE) Injection Vulnerability in SIMOTION SCOUT, SIMOTION SCOUT TIA and SINAMICS STARTER | 2025-08-12T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-083019 | SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices | 2025-07-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:22743 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.1 | 2025-12-04T09:52:50+00:00 | 2026-02-16T15:08:05+00:00 |
| rhsa-2025:22738 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.5.2 | 2025-12-04T08:53:28+00:00 | 2026-02-16T15:08:05+00:00 |
| rhsa-2025:22684 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.12.6 security update | 2025-12-03T23:53:32+00:00 | 2026-02-16T15:08:02+00:00 |
| rhsa-2025:22668 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2025-12-03T14:58:33+00:00 | 2026-02-16T15:08:02+00:00 |
| rhsa-2025:22345 | Red Hat Security Advisory: Red Hat OpenShift Developer Tools - Source-to-Image 1.5.2 | 2025-11-27T22:06:09+00:00 | 2026-02-16T15:08:00+00:00 |
| rhsa-2025:22287 | Red Hat Security Advisory: Red Hat Quay 3.9 | 2025-11-27T14:54:51+00:00 | 2026-02-16T15:07:59+00:00 |
| rhsa-2025:22275 | Red Hat Security Advisory: OpenShift Container Platform 4.13.62 bug fix and security update | 2025-12-05T13:28:34+00:00 | 2026-02-16T15:07:57+00:00 |
| rhsa-2025:22255 | Red Hat Security Advisory: OpenShift Container Platform 4.20.6 packages and security update | 2025-12-02T14:45:43+00:00 | 2026-02-16T15:07:49+00:00 |
| rhsa-2025:22182 | Red Hat Security Advisory: Red Hat Quay 3.10.16 | 2025-11-26T14:52:57+00:00 | 2026-02-16T15:07:41+00:00 |
| rhsa-2025:22181 | Red Hat Security Advisory: golang security update | 2025-11-26T15:05:54+00:00 | 2026-02-16T15:07:39+00:00 |
| rhsa-2025:22030 | Red Hat Security Advisory: podman security update | 2025-11-25T08:02:25+00:00 | 2026-02-16T15:07:36+00:00 |
| rhsa-2025:22014 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.15.2 | 2025-11-25T05:10:51+00:00 | 2026-02-16T15:07:34+00:00 |
| rhsa-2025:22012 | Red Hat Security Advisory: buildah security update | 2025-11-25T05:03:24+00:00 | 2026-02-16T15:07:32+00:00 |
| rhsa-2025:22011 | Red Hat Security Advisory: buildah security update | 2025-11-25T05:23:44+00:00 | 2026-02-16T15:07:29+00:00 |
| rhsa-2025:21964 | Red Hat Security Advisory: buildah security update | 2025-11-24T15:01:52+00:00 | 2026-02-16T15:07:26+00:00 |
| rhsa-2025:21856 | Red Hat Security Advisory: golang security update | 2025-11-20T15:48:22+00:00 | 2026-02-16T15:07:23+00:00 |
| rhsa-2025:21824 | Red Hat Security Advisory: OpenShift Container Platform 4.16.53 bug fix and security update | 2025-11-27T11:08:51+00:00 | 2026-02-16T15:07:21+00:00 |
| rhsa-2025:21816 | Red Hat Security Advisory: delve and golang security update | 2025-11-20T06:24:08+00:00 | 2026-02-16T15:07:18+00:00 |
| rhsa-2025:21815 | Red Hat Security Advisory: delve and golang security update | 2025-11-20T08:45:31+00:00 | 2026-02-16T15:07:12+00:00 |
| rhsa-2025:21795 | Red Hat Security Advisory: OpenShift Container Platform 4.18.29 bug fix and security update | 2025-11-27T04:24:21+00:00 | 2026-02-16T15:07:10+00:00 |
| rhsa-2025:21779 | Red Hat Security Advisory: golang security update | 2025-11-20T00:22:25+00:00 | 2026-02-16T15:07:07+00:00 |
| rhsa-2025:21778 | Red Hat Security Advisory: golang security update | 2025-11-20T00:35:26+00:00 | 2026-02-16T15:07:05+00:00 |
| rhsa-2025:21704 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.20 security, enhancement & bug fix update | 2025-11-18T15:13:35+00:00 | 2026-02-16T15:07:02+00:00 |
| rhsa-2025:21702 | Red Hat Security Advisory: podman security update | 2025-11-18T15:34:16+00:00 | 2026-02-16T15:05:52+00:00 |
| rhsa-2025:21634 | Red Hat Security Advisory: buildah security update | 2025-11-18T00:31:14+00:00 | 2026-02-16T15:05:49+00:00 |
| rhsa-2025:21633 | Red Hat Security Advisory: buildah security update | 2025-11-18T00:16:49+00:00 | 2026-02-16T15:05:47+00:00 |
| rhsa-2025:21328 | Red Hat Security Advisory: OpenShift Container Platform 4.14.59 packages and security update | 2025-11-20T07:57:21+00:00 | 2026-02-16T15:05:37+00:00 |
| rhsa-2025:21232 | Red Hat Security Advisory: container-tools:rhel8 security update | 2025-11-13T10:51:18+00:00 | 2026-02-16T15:05:25+00:00 |
| rhsa-2025:21220 | Red Hat Security Advisory: podman security update | 2025-11-13T09:10:41+00:00 | 2026-02-16T15:05:23+00:00 |
| rhsa-2025:20957 | Red Hat Security Advisory: runc security update | 2025-11-11T15:07:24+00:00 | 2026-02-16T15:05:23+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-022-04 | Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-03 | Rockwell Automation CompactLogix 5370 | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-02 | AutomationDirect CLICK Programmable Logic Controller | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-25-352-08 | Axis Communications Camera Station Pro, Camera Station, and Device Manager (Update B) | 2025-12-18T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-24-326-04 | Schneider Electric Modicon M340, MC80, and Momentum Unity M1E (Update B) | 2024-11-12T05:00:00.000000Z | 2026-01-20T15:49:53.166459Z |
| icsa-26-020-01 | Schneider Electric EcoStruxure Foxboro DCS | 2025-12-09T08:00:00.000000Z | 2026-01-20T15:49:52.728135Z |
| icsa-25-070-01 | Schneider Electric Uni-Telway Driver (Update B) | 2025-02-11T05:00:00.000000Z | 2026-01-20T15:49:52.295431Z |
| icsa-26-020-02 | Schneider Electric devices using CODESYS Runtime | 2023-07-11T07:15:18.000000Z | 2026-01-20T15:49:51.778731Z |
| icsa-26-020-03 | Rockwell Automation Verve Asset Manager | 2026-01-20T07:00:00.000000Z | 2026-01-20T07:00:00.000000Z |
| va-26-015-01 | NOAA PMEL Live Access Server (LAS) command injection | 2026-01-15T19:59:37Z | 2026-01-15T19:59:37Z |
| icsa-26-015-01 | AVEVA Process Optimization | 2026-01-15T07:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-24-135-04 | Mitsubishi Electric Multiple FA Engineering Software Products (Update E) | 2024-05-14T06:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-22-202-04 | ICONICS Suite and Mitsubishi Electric MC Works64 Products (Update B) | 2022-07-26T06:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-26-015-08 | Siemens Industrial Edge Devices | 2026-01-13T00:00:00.000000Z | 2026-01-14T23:03:52.355094Z |
| icsa-26-015-02 | Festo Firmware | 2022-11-29T11:49:00.000000Z | 2026-01-14T22:46:49.184310Z |
| icsa-26-015-07 | Siemens RUGGEDCOM APE1808 Devices | 2026-01-13T00:00:00.000000Z | 2026-01-14T22:35:44.478578Z |
| icsa-26-015-06 | Siemens SINEC Security Monitor | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.907344Z |
| icsa-26-015-05 | Siemens RUGGEDCOM ROS | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.058931Z |
| icsa-26-015-10 | Schneider Electric EcoStruxure Power Build Rapsody | 2026-01-13T08:00:00.000000Z | 2026-01-14T22:35:43.622072Z |
| icsa-26-015-03 | Siemens TeleControl Server Basic | 2026-01-13T00:00:00.000000Z | 2026-01-14T22:32:36.777247Z |
| icsa-25-226-09 | Siemens RUGGEDCOM APE1808 | 2025-08-12T00:00:00.000000Z | 2026-01-14T22:05:42.880807Z |
| icsa-25-072-09 | Siemens OPC UA | 2025-03-11T00:00:00.000000Z | 2026-01-14T22:05:42.018496Z |
| icsa-24-354-04 | Siemens User Management Component | 2024-12-16T00:00:00.000000Z | 2026-01-14T22:05:42.437898Z |
| icsa-25-289-10 | Siemens HyperLynx and Industrial Edge App Publisher | 2025-10-14T00:00:00.000000Z | 2026-01-14T22:05:41.165529Z |
| icsa-25-162-04 | Siemens SCALANCE and RUGGEDCOM | 2025-06-10T00:00:00.000000Z | 2026-01-14T22:05:41.593078Z |
| icsa-25-231-02 | Siemens Mendix SAML Module | 2025-08-14T00:00:00.000000Z | 2026-01-14T22:05:40.193680Z |
| icsa-24-074-05 | Siemens RUGGEDCOM APE1808 | 2024-03-12T00:00:00.000000Z | 2026-01-14T22:00:12.208787Z |
| icsa-24-193-02 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:11.677616Z |
| icsa-24-074-11 | Siemens RUGGEDCOM APE1808 with Fortigate NGFW Devices | 2024-03-12T00:00:00.000000Z | 2026-01-14T22:00:10.660779Z |
| icsa-24-193-11 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:09.701376Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-epnm-info-dis-zhppmfgz | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Information Disclosure Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epni-arb-file-upload-jjdm2p83 | Cisco Evolved Programmable Network Manager Arbitrary File Upload Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-cucm-csrf-w762pryd | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-3100_4200_tlsdos-2ynscd54 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 3100 and 4200 Series TLS 1.3 Cipher Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-03T13:37:50+00:00 |
| cisco-sa-ucs-xss-ey6xhyps | Cisco UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-vkvmorv-cnkrv7hk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Open Redirect Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-multi-cmdinj-e4ukjyrz | Cisco UCS Manager Software Command Injection Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-kvmsxss-6h7anuyk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxospc-pim6-vg4jfph | Cisco Nexus 3000 and 9000 Series Switches Protocol Independent Multicast Version 6 Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-infodis-tectysfg | Cisco NX-OS Software Sensitive Log Information Disclosure Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-qhnze5ss | Cisco NX-OS Software Command Injection Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nshs-urapi-gjubvfpu | Cisco Nexus Dashboard and Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nd-ptrs-xu2fm2wb | Cisco Nexus Dashboard Path Traversal Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-n39k-isis-dos-jhja8rfx | Cisco Nexus 3000 and 9000 Series Switches Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ise-file-upload-qksx6c8g | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:43:01+00:00 |
| cisco-sa-pi-epnm-tet4gxbx | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Sensitive Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-authproxlog-sxczxq63 | Cisco Duo Authentication Proxy Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-20180328-smi2 | Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability | 2018-03-28T16:00:00+00:00 | 2025-08-20T14:26:26+00:00 |
| cisco-sa-asaftd-ssltls-dos-ehw76vze | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SSL/TLS Certificate Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-19T16:32:05+00:00 |
| cisco-sa-ftd-ravpn-geobypass-9h38m37z | Cisco Secure Firewall Threat Defense Software Geolocation Remote Access VPN Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-ftd-dos-svkhtjgt | Cisco Secure Firewall Threat Defense Software Snort 3 Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-xss-jtnmcusp | Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-xpathinj-corthdmb | Cisco Secure Firewall Management Center Software XPATH Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-radius-rce-tnbkf79 | Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-html-inj-mqjrzrny | Cisco Secure Firewall Management Center Software HTML Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-ftd-cmdinj-phe7kmt | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-hcrlpfyn | Cisco Secure Firewall Management Center Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-authz-bypass-m7xhnau | Cisco Secure Firewall Management Center Software Authorization Bypass Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpnwebs-dos-hjbhmbsx | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpn-dos-mfpeka6e | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2021-0003 | SICK Security Advisory for Apache Log4j (CVE-2021-44228) | 2021-12-14T17:00:00.000Z | 2021-12-17T12:00:00.000Z |
| sca-2021-0004 | Vulnerabilities in SICK SOPAS ET | 2021-12-16T08:00:00.000Z | 2021-12-17T08:00:00.000Z |
| sca-2021-0002 | MEAC affected by Windows SMBv1 vulnerability | 2021-08-04T10:00:00.000Z | 2021-08-04T10:00:00.000Z |
| sca-2021-0001 | Inadequate SSH configuration in SICK Visionary-S CX | 2021-06-25T10:00:00.000Z | 2021-06-25T10:00:00.000Z |
| sca-2020-0005 | Package Analytics affected by Windows TCP/IP vulnerability | 2020-10-29T11:00:00.000Z | 2020-10-29T11:00:00.000Z |
| sca-2020-0004 | Vulnerability in Platform Mechanism AutoIP | 2020-08-31T10:00:00.000Z | 2020-08-31T10:00:00.000Z |
| sca-2020-0003 | MEAC affected by Windows SMBv3 vulnerability | 2020-08-07T10:00:00.000Z | 2020-08-07T10:00:00.000Z |
| sca-2020-0002 | Vulnerabilities in SICK Package Analytics | 2020-08-07T10:00:00.000Z | 2020-07-28T10:00:00.000Z |
| sca-2020-0001 | Security Information Regarding "Profile Programming" | 2020-05-31T10:00:00.000Z | 2020-05-31T10:00:00.000Z |
| sca-2019-0002 | Vulnerability in SICK FX0-GENT00000 and SICK FX0-GPNT00000 | 2019-09-20T10:00:00.000Z | 2019-09-20T10:00:00.000Z |
| sca-2019-0001 | MSC800 affected by hard-coded credentials vulnerability | 2019-06-21T10:00:00.000Z | 2019-06-21T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-0391 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-05T00:00:00.000Z |
| msrc_cve-2025-6965 | Integer Truncation on SQLite | 2025-07-02T00:00:00.000Z | 2026-02-04T08:00:00.000Z |
| msrc_cve-2026-21509 | Microsoft Office Security Feature Bypass Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-29T08:00:00.000Z |
| msrc_cve-2026-20960 | PowerApps Desktop Client Remote Code Execution Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-29T08:00:00.000Z |
| msrc_cve-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-27T08:00:00.000Z |
| msrc_cve-2026-24307 | M365 Copilot Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-24306 | Azure Front Door Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-24305 | Azure Entra ID Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-24304 | Azure Resource Manager Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21524 | Azure Data Explorer Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21521 | Word Copilot Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21520 | Copilot Studio Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21264 | Microsoft Account Spoofing Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21227 | Azure Logic Apps Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2025-39828 | atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control(). | 2025-09-02T00:00:00.000Z | 2026-01-21T01:42:47.000Z |
| msrc_cve-2025-39826 | net: rose: convert 'use' field to refcount_t | 2025-09-02T00:00:00.000Z | 2026-01-21T01:42:37.000Z |
| msrc_cve-2025-39790 | bus: mhi: host: Detect events pointing to unexpected TREs | 2025-09-02T00:00:00.000Z | 2026-01-21T01:42:25.000Z |
| msrc_cve-2025-39788 | scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE | 2025-09-02T00:00:00.000Z | 2026-01-21T01:42:15.000Z |
| msrc_cve-2025-9230 | Out-of-bounds read & write in RFC 3211 KEK Unwrap | 2025-09-02T00:00:00.000Z | 2026-01-21T01:06:47.000Z |
| msrc_cve-2025-9232 | Out-of-bounds read in HTTP client no_proxy handling | 2025-09-02T00:00:00.000Z | 2026-01-21T01:06:20.000Z |
| msrc_cve-2025-4575 | The x509 application adds trusted use instead of rejected use | 2025-05-02T00:00:00.000Z | 2026-01-21T01:06:08.000Z |
| msrc_cve-2025-4207 | PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation | 2025-05-02T00:00:00.000Z | 2026-01-21T01:05:40.000Z |
| msrc_cve-2025-39853 | i40e: Fix potential invalid access when MAC list is empty | 2025-09-02T00:00:00.000Z | 2026-01-21T01:04:23.000Z |
| msrc_cve-2025-39848 | ax25: properly unshare skbs in ax25_kiss_rcv() | 2025-09-02T00:00:00.000Z | 2026-01-21T01:04:15.000Z |
| msrc_cve-2025-39847 | ppp: fix memory leak in pad_compress_skb | 2025-09-02T00:00:00.000Z | 2026-01-21T01:04:06.000Z |
| msrc_cve-2025-39846 | pcmcia: Fix a NULL pointer dereference in __iodyn_find_io_region() | 2025-09-02T00:00:00.000Z | 2026-01-21T01:03:58.000Z |
| msrc_cve-2025-39845 | x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() | 2025-09-02T00:00:00.000Z | 2026-01-21T01:03:49.000Z |
| msrc_cve-2025-39844 | mm: move page table sync declarations to linux/pgtable.h | 2025-09-02T00:00:00.000Z | 2026-01-21T01:03:40.000Z |
| msrc_cve-2025-39841 | scsi: lpfc: Fix buffer free/clear order in deferred receive path | 2025-09-02T00:00:00.000Z | 2026-01-21T01:03:31.000Z |
| msrc_cve-2025-39839 | batman-adv: fix OOB read/write in network-coding decode | 2025-09-02T00:00:00.000Z | 2026-01-21T01:03:23.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10114-1 | logback-1.2.13-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10113-1 | icinga2-2.15.2-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10112-1 | dirmngr-2.5.17-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10111-1 | gio-branding-upstream-2.86.3-3.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10110-1 | python311-salt-3006.0-55.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:10109-1 | python311-sse-starlette-3.2.0-1.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:10108-1 | java-25-openjdk-25.0.2.0-1.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:10107-1 | freerdp-3.21.0-1.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:10106-1 | assertj-core-3.27.7-1.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:10105-1 | teleport-17.7.14-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:10104-1 | python311-sigstore-4.2.0-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:10103-1 | python311-orjson-3.11.5-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:10102-1 | libopencc1_2-1.2.0-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:10101-1 | coredns-1.14.1-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:20113-1 | Security update for php8 | 2026-01-26T12:37:41Z | 2026-01-26T12:37:41Z |
| opensuse-su-2026:20112-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-01-26T11:03:44Z | 2026-01-26T11:03:44Z |
| opensuse-su-2026:20110-1 | Security update for avahi | 2026-01-26T10:20:39Z | 2026-01-26T10:20:39Z |
| opensuse-su-2026:20108-1 | Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-01-26T09:12:02Z | 2026-01-26T09:12:02Z |
| opensuse-su-2026:10100-1 | zot-registry-2.1.14-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10099-1 | zli-2.1.14-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10098-1 | tlp-1.8.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10097-1 | qemu-10.2.0-2.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10096-1 | python311-urllib3_1-1.26.20-5.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10095-1 | libopenjp2-7-2.5.4-2.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10094-1 | libmatio-devel-1.5.30-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10093-1 | java-21-openjdk-21.0.10.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10092-1 | java-17-openjdk-17.0.18.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10091-1 | java-11-openjdk-11.0.30.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10090-1 | google-osconfig-agent-20260119.00-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10089-1 | gio-branding-upstream-2.86.3-2.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2024-345-02 | Harmony HMI and Pro-face HMI products | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-345-01 | PowerChute Serial Shutdown | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-317-04 | EcoStruxure™ IT Gateway | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-02 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-01 | PowerLogic PM5300 Series | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2021-159-02 | PowerLogic PM5500 and PowerLogic PM8ECC | 2021-06-08T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-282-08 | EcoStruxure EV Charging Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-07 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-06 | Zelio Soft 2 | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-04 | EVlink Home Smart and Schneider Charge | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-03 | Easergy Studio | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-02 | Harmony iPC – HMIBSC IIoT Edge Box Core | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-01 | Data Center Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2022-102-02 | Modicon M340 Controller and Communication Modules | 2022-04-12T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-254-02 | EcoStruxure™ Power Monitoring Expert and EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation with Advanced Reporting and Dashboards | 2024-09-10T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2024-163-02 | PowerLogic P5 | 2024-06-11T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-073-01 | EcoStruxure™ Power Monitoring Expert | 2023-03-14T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-192-02 | EcoStruxure™ OPC UA Server Expert | 2023-07-11T07:01:56.000Z | 2024-08-13T07:00:00.000Z |
| sevd-2024-226-02 | EcoStruxure™ Machine SCADA Expert / BLUE Open Studio | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-226-01 | Accutech Manager | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-101-05 | Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-04-11T09:46:26.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-06 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 CPU Safety | 2023-01-10T15:17:09.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-05 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-01-10T15:41:57.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-04 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-02 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, and Modicon Controllers M580 and M340 | 2022-08-09T10:58:35.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-222-04 | Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert | 2021-08-10T02:27:39.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-194-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340 | 2021-07-13T08:22:02.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2019-281-02 | Modicon Controllers | 2019-09-26T12:53:28.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2018-081-01 | Embedded FTP Servers for Modicon PAC Controllers | 2018-03-22T03:39:21.000Z | 2024-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-1003 | Index-out-of-bounds in LibRaw::ahd_interpolate_r_and_b_in_rgb_and_convert_to_cielab | 2022-09-30T00:02:10.026151Z | 2026-01-31T14:08:33.420267Z |
| osv-2026-167 | Use-of-uninitialized-value in aivdm_analyze | 2026-01-31T00:10:49.750917Z | 2026-01-31T00:10:49.751204Z |
| osv-2026-166 | Use-of-uninitialized-value in ntrip_parse_url | 2026-01-31T00:10:39.163525Z | 2026-01-31T00:10:39.163931Z |
| osv-2025-62 | UNKNOWN READ in RDKit::Dict::reset | 2025-01-27T00:01:51.692636Z | 2026-01-30T14:29:51.817835Z |
| osv-2024-838 | Bad-cast to RDKit::AtomRDKit::ROMol::initFromOther | 2024-08-16T00:03:32.029853Z | 2026-01-30T14:28:51.040311Z |
| osv-2022-1288 | Stack-buffer-overflow in bool SmilesParseOps::parser::parse_atom_props<std::__1::__wrap_iter<char const*> | 2024-11-04T00:16:22.516312Z | 2026-01-30T14:23:19.786593Z |
| osv-2022-675 | Heap-buffer-overflow in void RDKit::ParseV3000AtomProps<std::__1::vector<std::__1::basic_string_view<cha | 2022-08-06T00:00:51.363676Z | 2026-01-30T14:19:45.980447Z |
| osv-2025-312 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2025-05-02T00:14:14.459388Z | 2026-01-29T14:23:29.688478Z |
| osv-2023-606 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2023-07-23T14:01:02.159160Z | 2026-01-29T14:15:23.692004Z |
| osv-2023-1350 | Heap-buffer-overflow in inflate | 2023-12-23T00:12:38.562149Z | 2026-01-29T14:14:55.841286Z |
| osv-2023-319 | Heap-buffer-overflow in ZSTD_decompressSequencesLong_bmi2 | 2023-04-16T14:01:58.406534Z | 2026-01-29T14:14:53.604312Z |
| osv-2023-235 | Use-of-uninitialized-value in complexity_RC_reset_marking | 2023-03-26T13:00:16.681780Z | 2026-01-29T14:14:41.215909Z |
| osv-2023-234 | Use-of-uninitialized-value in ihevce_enc_frm_proc_slave_thrd | 2023-03-26T13:00:12.135289Z | 2026-01-29T14:14:40.129452Z |
| osv-2023-239 | Use-of-uninitialized-value in ihevce_strm_fill_done | 2023-03-26T13:02:03.445119Z | 2026-01-29T14:14:38.558891Z |
| osv-2022-776 | Heap-buffer-overflow in do_job | 2022-08-24T00:00:48.440951Z | 2026-01-29T14:13:36.232274Z |
| osv-2022-1134 | Heap-buffer-overflow in ndlz8_decompress | 2022-11-04T00:02:11.463429Z | 2026-01-29T14:10:23.427741Z |
| osv-2021-1070 | Heap-buffer-overflow in ZSTD_decompressBlock_internal | 2021-07-29T00:01:10.187569Z | 2026-01-29T14:10:02.243833Z |
| osv-2021-1672 | Heap-buffer-overflow in blosc_d | 2021-12-12T00:01:29.747137Z | 2026-01-29T14:09:48.329310Z |
| osv-2026-97 | Heap-buffer-overflow in vpx_wb_write_literal | 2026-01-21T00:09:09.897624Z | 2026-01-28T14:23:52.198239Z |
| osv-2024-245 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-04-08T00:11:03.595756Z | 2026-01-28T14:16:25.369488Z |
| osv-2026-156 | Segv on unknown address in aivdm_analyze | 2026-01-28T00:06:24.327227Z | 2026-01-28T00:06:24.327712Z |
| osv-2025-266 | Heap-buffer-overflow in lj_buf_ruleb128 | 2025-04-08T00:17:06.279554Z | 2026-01-27T14:24:04.437262Z |
| osv-2023-395 | Stack-buffer-overflow in sc_path_print | 2023-05-14T14:00:57.078498Z | 2026-01-26T14:22:38.521669Z |
| osv-2022-1201 | Stack-buffer-overflow in msc_zero_object | 2022-11-24T13:00:10.344351Z | 2026-01-26T14:18:09.031253Z |
| osv-2022-1188 | Stack-buffer-overflow in authentic_get_tagged_data | 2022-11-20T13:01:57.719130Z | 2026-01-26T14:18:03.347416Z |
| osv-2026-144 | Use-of-uninitialized-value in initFilter | 2026-01-26T00:05:57.473672Z | 2026-01-26T00:05:57.473958Z |
| osv-2026-141 | Segv on unknown address in yuv2rgb4_X_c | 2026-01-26T00:03:47.552290Z | 2026-01-26T00:03:47.552807Z |
| osv-2025-280 | Heap-buffer-overflow in Assimp::SceneCombiner::CopyScene | 2025-04-15T00:04:03.423453Z | 2026-01-25T14:19:05.873424Z |
| osv-2025-580 | UNKNOWN READ in signed char Assimp::StreamReader<false, false>::Get<signed char> | 2025-07-29T00:16:41.422221Z | 2026-01-25T14:18:57.285875Z |
| osv-2024-1220 | UNKNOWN READ in Assimp::NDOImporter::InternReadFile | 2024-10-14T00:17:45.088625Z | 2026-01-25T14:14:41.961973Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0115 | tandem_http_server is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0114 | tandem_http_client is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0113 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-11-04T06:10:22Z |
| rustsec-2025-0109 | Out-of-bounds memory access in binary_read_to_ref and binary_write_from_ref | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0108 | Uninitialized memory exposure in string reading functions | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0107 | Uninitialized memory exposure in any_as_u8_slice | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0106 | Undefined behavior in index_of_ptr with empty slices | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0105 | Uninitialized memory exposure in create_ring_buffer | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0072 | soundness issue and unmaintained | 2025-10-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0071 | Incorrect handling of embedded SVG and MathML leads to mutation XSS after removal | 2025-09-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0068 | serde_yml crate is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0067 | `libyml::string::yaml_string_extend` is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0063 | Possible unsound public API | 2025-04-25T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0062 | Heap Buffer Overflow in the DrainCol Destructor | 2025-05-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0054 | ArrayQueue::push_front is not panic-safe | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0053 | Multiple memory corruption vulnerabilities in safe APIs | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0051 | `xcb::Connection::connect_to_fd*` functions violate I/O safety | 2025-08-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0050 | IdMap::from_iter may lead to uninitialized memory being freed on drop | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0049 | User-defined implementations of the safe trait scratchpad::Tracking can cause heap buffer overflows | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0044 | Four unique double-free vulnerabilities triggered via safe APIs | 2025-06-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0042 | Uninitialized read after allocating MemBump | 2025-07-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0040 | `root` appended to group listings | 2025-01-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0039 | Lack of sufficient checks in public API | 2025-05-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0038 | Out of bounds access in public safe API | 2025-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0037 | Pingora Request Smuggling and Cache Poisoning | 2025-05-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0035 | Multiple soundness issues in `macroquad` | 2025-04-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0034 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0033 | Public API without sufficient bounds checking | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0032 | Safe API can cause heap-buffer-overflow | 2025-03-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0031 | Unsound public API in unmaintained crate | 2025-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-golang-2025-68121 | Unexpected session resumption in crypto/tls | 2026-02-10T10:05:16.474Z | 2026-02-11T09:09:18.507Z |
| bit-golang-2023-44487 | 2024-03-06T10:53:14.274Z | 2026-02-11T09:09:18.507Z | |
| bit-envoy-2023-44487 | 2024-03-06T10:52:27.702Z | 2026-02-11T09:09:18.507Z | |
| bit-dotnet-2023-44487 | 2024-03-06T10:52:07.879Z | 2026-02-11T09:09:18.507Z | |
| bit-django-2024-27351 | 2024-07-02T07:16:49.319Z | 2026-02-11T09:09:18.507Z | |
| bit-contour-2023-44487 | 2024-03-06T10:50:58.800Z | 2026-02-11T09:09:18.507Z | |
| bit-apisix-2023-44487 | 2024-03-06T10:50:34.863Z | 2026-02-11T09:09:18.507Z | |
| bit-apache-2023-27522 | Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting | 2024-03-06T10:51:05.888Z | 2026-02-11T09:09:18.507Z |
| bit-nginx-2026-1642 | 2026-02-10T18:00:00.000Z | 2026-02-10T18:00:00.000Z | |
| bit-prestashop-2026-25597 | PrestaShop has a time based enumeration in FO login form | 2026-02-10T10:02:58.336Z | 2026-02-10T10:34:11.934Z |
| bit-golang-2025-61732 | Potential code smuggling via doc comments in cmd/cgo | 2026-02-10T08:48:31.170Z | 2026-02-10T09:16:50.296Z |
| bit-discourse-2025-67723 | Discourse vulnerable to stored Cross-site Scripting via Katex in discourse-math plugin | 2026-02-02T08:42:10.509Z | 2026-02-10T09:16:50.296Z |
| bit-checkov-2021-3040 | Bridgecrew Checkov: Unsafe deserialization of Terraform files allows code execution | 2026-02-09T11:36:28.864Z | 2026-02-09T12:10:11.303Z |
| bit-checkov-2021-3035 | Bridgecrew Checkov: Unsafe deserialization of Terraform files allows code execution | 2026-02-09T11:36:27.254Z | 2026-02-09T12:10:11.303Z |
| bit-mastodon-2026-25540 | Mastodon's signature-dependent ActivityPub collection responses cached under signature-independent keys (Web Cache Poisoning via `Rails.cache`) | 2026-02-06T08:46:33.665Z | 2026-02-06T09:20:48.186Z |
| bit-golang-2025-22873 | Improper access to parent directory of root in os | 2026-02-06T08:45:38.334Z | 2026-02-06T09:20:48.186Z |
| bit-valkey-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:07:58.321Z | 2026-02-05T09:10:30.960Z |
| bit-redis-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:06:41.782Z | 2026-02-05T09:10:30.960Z |
| bit-keydb-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:00:41.031Z | 2026-02-05T09:10:30.960Z |
| bit-gitlab-2026-1751 | Missing Authorization in GitLab | 2026-02-05T09:09:05.467Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1312 | Potential SQL injection via QuerySet.order_by and FilteredRelation | 2026-02-05T08:38:43.002Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1287 | Potential SQL injection in column aliases via control characters | 2026-02-05T08:38:41.246Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1285 | Potential denial-of-service vulnerability in django.utils.text.Truncator HTML methods | 2026-02-05T08:38:39.228Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1207 | Potential SQL injection via raster lookups on PostGIS | 2026-02-05T08:38:37.158Z | 2026-02-05T09:10:30.960Z |
| bit-django-2025-14550 | Potential denial-of-service vulnerability via repeated headers when using ASGI | 2026-02-05T08:38:18.195Z | 2026-02-05T09:10:30.960Z |
| bit-django-2025-13473 | Username enumeration through timing difference in mod_wsgi authentication handler | 2026-02-05T08:38:16.508Z | 2026-02-05T09:10:30.960Z |
| bit-node-2025-55132 | 2026-01-26T14:47:53.358Z | 2026-02-04T10:19:33.233Z | |
| bit-node-2025-55130 | 2026-01-26T14:47:49.864Z | 2026-02-04T10:19:33.233Z | |
| bit-gitlab-2021-39935 | 2024-03-06T11:17:28.508Z | 2026-02-04T10:19:33.233Z | |
| bit-airflow-2025-68675 | Apache Airflow: proxy credentials for various providers might leak in task logs | 2026-01-21T08:39:24.383Z | 2026-02-04T10:19:33.233Z |
| ID | Description | Updated |
|---|---|---|
| var-201402-0026 | Buffer overflow in the process_ra function in the router advertisement daemon (radvd) bef… | 2024-07-23T22:25:48.682000Z |
| var-201805-1144 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.529000Z |
| var-201805-1143 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.635000Z |
| var-202005-0008 | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buf… | 2024-07-23T22:25:28.455000Z |
| var-202407-0704 | A vulnerability has been identified in CPCI85 Central Processing/Communication (All versi… | 2024-07-23T22:25:01.735000Z |
| var-200107-0035 | slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cau… | 2024-07-23T22:24:58.858000Z |
| var-200512-0643 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.371000Z |
| var-200512-0611 | Multiple heap-based buffer overflows in QuickTime.qts in Apple QuickTime Player 7.0.3 and… | 2024-07-23T22:24:53.455000Z |
| var-200512-0300 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.297000Z |
| var-200512-0297 | Integer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbit… | 2024-07-23T22:24:53.525000Z |
| var-200512-0294 | Buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitr… | 2024-07-23T22:24:53.234000Z |
| var-201407-0233 | Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote atta… | 2024-07-23T22:22:21.013000Z |
| var-201601-0038 | Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote atta… | 2024-07-23T22:22:04.421000Z |
| var-201801-0394 | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbi… | 2024-07-23T22:21:46.499000Z |
| var-201904-0181 | Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow… | 2024-07-23T22:21:36.530000Z |
| var-202108-1160 | Description: A permissions issue was addressed with improved validation. This issue is fi… | 2024-07-23T22:20:46.081000Z |
| var-202305-0218 | D-Link DAP-1360 webproc WEB_DisplayPage Stack-based Buffer Overflow Remote Code Execution… | 2024-07-23T22:20:18.349000Z |
| var-202305-0217 | D-Link DAP-1360 Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerabi… | 2024-07-23T22:20:18.369000Z |
| var-202305-0216 | D-Link DAP-1360 Multiple Parameters Stack-Based Buffer Overflow Remote Code Execution Vul… | 2024-07-23T22:20:18.413000Z |
| var-202305-0177 | D-Link DAP-1360 webproc Stack-based Buffer Overflow Remote Code Execution Vulnerability. … | 2024-07-23T22:20:18.434000Z |
| var-202305-0176 | D-Link DAP-1360 webproc var:sys_Token Heap-based Buffer Overflow Remote Code Execution Vu… | 2024-07-23T22:20:18.458000Z |
| var-202305-0166 | D-Link DAP-1360 webproc var:menu Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.326000Z |
| var-202305-0154 | D-Link DAP-1360 webproc var:page Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.503000Z |
| var-202305-0153 | D-Link DAP-1360 webupg UPGCGI_CheckAuth Numeric Truncation Remote Code Execution Vulnerab… | 2024-07-23T22:20:18.392000Z |
| var-202305-0071 | D-Link DAP-1360 webproc Heap-based Buffer Overflow Remote Code Execution Vulnerability. T… | 2024-07-23T22:20:18.481000Z |
| var-202305-0070 | D-Link DAP-1360 webproc COMM_MakeCustomMsg Stack-based Buffer Overflow Remote Code Execut… | 2024-07-23T22:20:18.303000Z |
| var-202308-3323 | D-Link DAP-2622 DDP Change ID Password Auth Username Stack-based Buffer Overflow Remote C… | 2024-07-23T22:20:12.387000Z |
| var-202308-3185 | D-Link DAP-2622 DDP Configuration Backup Filename Stack-based Buffer Overflow Remote Code… | 2024-07-23T22:20:12.455000Z |
| var-202308-3131 | D-Link DAP-2622 DDP Reset Factory Auth Password Stack-based Buffer Overflow Remote Code E… | 2024-07-23T22:20:12.487000Z |
| var-202308-3130 | D-Link DAP-2622 DDP Configuration Restore Auth Username Stack-based Buffer Overflow Remot… | 2024-07-23T22:20:12.431000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000105 | NCP-HG100 vulnerable to OS command injection | 2025-11-14T15:26+09:00 | 2025-11-14T15:26+09:00 |
| jvndb-2025-000104 | Multiple vulnerabilities in GNU Libmicrohttpd | 2025-11-10T15:07+09:00 | 2025-11-10T15:07+09:00 |
| jvndb-2025-000103 | Use of password hash with insufficient computational effort vulnerability in BUFFALO Wi-Fi router "WSR-1800AX4 series" | 2025-11-07T15:39+09:00 | 2025-11-07T15:39+09:00 |
| jvndb-2025-000102 | CLUSTERPRO X and EXPRESSCLUSTER X vulnerable to OS command injection | 2025-11-07T14:55+09:00 | 2025-11-07T14:55+09:00 |
| jvndb-2025-000101 | GROWI vulnerable to stored cross-site scripting | 2025-11-06T13:45+09:00 | 2025-11-06T13:45+09:00 |
| jvndb-2024-013260 | Multiple vulnerabilities in Edgecross Basic Software for Windows | 2024-11-22T10:59+09:00 | 2025-11-04T16:41+09:00 |
| jvndb-2025-017972 | Multiple vulnerabilities in Century Systems FutureNet MA and IP-K series | 2025-11-04T16:37+09:00 | 2025-11-04T16:37+09:00 |
| jvndb-2025-000100 | Multiple Roboticsware products register Windows services with unquoted file paths | 2025-11-04T14:17+09:00 | 2025-11-04T14:17+09:00 |
| jvndb-2025-000098 | Optical Disc Archive Software (for Windows) registers a Windows service with an unquoted file path | 2025-11-04T13:51+09:00 | 2025-11-04T13:51+09:00 |
| jvndb-2025-000099 | Progress Flowmon vulnerable to authenticated OS command injection | 2025-11-04T12:47+09:00 | 2025-11-04T12:47+09:00 |
| jvndb-2025-000096 | Installer of WTW EAGLE (for Windows) may insecurely load Dynamic Link Libraries | 2025-10-29T14:17+09:00 | 2025-10-29T14:17+09:00 |
| jvndb-2025-000095 | MZK-DP300N uses hard-coded credentials | 2025-10-28T14:04+09:00 | 2025-10-28T14:04+09:00 |
| jvndb-2025-014793 | NIHON KOHDEN Central Monitor CNS-6201 vulnerable to NULL pointer dereference | 2025-10-01T11:35+09:00 | 2025-10-27T12:28+09:00 |
| jvndb-2025-000093 | Multiple stored cross-site scripting vulnerabilities in Pleasanter | 2025-10-24T15:11+09:00 | 2025-10-24T15:11+09:00 |
| jvndb-2025-000084 | GROWI vulnerable to cross-site scripting | 2025-10-22T15:44+09:00 | 2025-10-22T15:44+09:00 |
| jvndb-2025-000090 | Multiple stored cross-site scripting vulnerabilities in Movable Type | 2025-10-22T13:54+09:00 | 2025-10-22T13:54+09:00 |
| jvndb-2025-000088 | Lanscope Endpoint Manager (On-Premises) vulnerable to improper verification of source of a communication channel | 2025-10-20T16:17+09:00 | 2025-10-22T10:06+09:00 |
| jvndb-2025-000092 | ETERNUS SF vulnerable to incorrect default permissions | 2025-10-20T14:20+09:00 | 2025-10-20T14:20+09:00 |
| jvndb-2025-000089 | Installer of AutoDownloader may insecurely load Dynamic Link Libraries | 2025-10-17T13:38+09:00 | 2025-10-17T13:38+09:00 |
| jvndb-2025-000074 | Multiple vulnerabilities in desknet's NEO | 2025-10-16T17:30+09:00 | 2025-10-16T17:30+09:00 |
| jvndb-2025-000076 | Multiple vulnerabilities in ChatLuck | 2025-10-16T17:17+09:00 | 2025-10-16T17:17+09:00 |
| jvndb-2025-000087 | Ruijie Networks RG-EST300 undocumented SSH functionality | 2025-10-16T14:19+09:00 | 2025-10-16T14:19+09:00 |
| jvndb-2025-016124 | Buffalo Wi-Fi router WXR9300BE6P series vulnerable to path traversal | 2025-10-16T11:16+09:00 | 2025-10-16T11:16+09:00 |
| jvndb-2025-000085 | Multiple RSUPPORT products may insecurely load Dynamic Link Libraries | 2025-10-15T15:55+09:00 | 2025-10-15T15:55+09:00 |
| jvndb-2025-000086 | Phoenix Contact CHARX SEC-3xxx vulnerable to code injection | 2025-10-15T15:54+09:00 | 2025-10-15T15:54+09:00 |
| jvndb-2025-000083 | BUFFALO NAS Navigator2 registers a Windows service with an unquoted file path | 2025-10-10T13:56+09:00 | 2025-10-10T13:56+09:00 |
| jvndb-2025-015451 | Multiple vulnerabilities in FUJI Electric V-SFT | 2025-10-09T13:39+09:00 | 2025-10-09T13:39+09:00 |
| jvndb-2025-000081 | DataSpider Servista improper restriction of XML external entity references | 2025-09-29T14:44+09:00 | 2025-10-07T16:54+09:00 |
| jvndb-2025-000082 | The installers of DENSO TEN drive recorder viewer may insecurely load Dynamic Link Libraries | 2025-10-06T15:38+09:00 | 2025-10-06T15:38+09:00 |
| jvndb-2025-015061 | Trend Micro Antivirus for Mac vulnerable to Local Privilege Escalation | 2025-10-06T13:52+09:00 | 2025-10-06T13:52+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0334-1 | Security update for libxml2 | 2026-01-29T10:01:36Z | 2026-01-29T10:01:36Z |
| suse-su-2026:0333-1 | Security update for openssl-1_0_0 | 2026-01-29T08:16:22Z | 2026-01-29T08:16:22Z |
| suse-su-2026:0332-1 | Security update for openssl-1_0_0 | 2026-01-29T06:04:36Z | 2026-01-29T06:04:36Z |
| suse-su-2026:0331-1 | Security update for openssl-1_1 | 2026-01-28T17:13:03Z | 2026-01-28T17:13:03Z |
| suse-su-2026:0330-1 | Security update for openjpeg2 | 2026-01-28T16:27:12Z | 2026-01-28T16:27:12Z |
| suse-su-2026:20175-1 | Security update for python-urllib3 | 2026-01-28T16:03:29Z | 2026-01-28T16:03:29Z |
| suse-su-2026:20173-1 | Security update for ucode-amd | 2026-01-28T16:01:59Z | 2026-01-28T16:01:59Z |
| suse-su-2026:0329-1 | Security update for xen | 2026-01-28T15:39:40Z | 2026-01-28T15:39:40Z |
| suse-su-2026:0328-1 | Security update for xen | 2026-01-28T15:39:28Z | 2026-01-28T15:39:28Z |
| suse-su-2026:0327-1 | Security update for alloy | 2026-01-28T15:38:58Z | 2026-01-28T15:38:58Z |
| suse-su-2026:0326-1 | Security update for helm | 2026-01-28T14:55:01Z | 2026-01-28T14:55:01Z |
| suse-su-2026:0325-1 | Security update for kubernetes | 2026-01-28T14:54:08Z | 2026-01-28T14:54:08Z |
| suse-su-2026:0320-1 | Security update for openjpeg2 | 2026-01-28T14:40:09Z | 2026-01-28T14:40:09Z |
| suse-su-2026:0319-1 | Security update for container-suseconnect | 2026-01-28T14:40:01Z | 2026-01-28T14:40:01Z |
| suse-su-2026:0317-1 | Security update for the Linux Kernel | 2026-01-28T14:37:02Z | 2026-01-28T14:37:02Z |
| suse-su-2026:0316-1 | Security update for the Linux Kernel | 2026-01-28T14:35:14Z | 2026-01-28T14:35:14Z |
| suse-su-2026:0315-1 | Security update for the Linux Kernel | 2026-01-28T14:34:30Z | 2026-01-28T14:34:30Z |
| suse-su-2026:0314-1 | Security update for python311 | 2026-01-28T13:28:48Z | 2026-01-28T13:28:48Z |
| suse-su-2026:20171-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-01-28T10:27:58Z | 2026-01-28T10:27:58Z |
| suse-su-2026:0313-1 | Security update for gimp | 2026-01-28T10:13:29Z | 2026-01-28T10:13:29Z |
| suse-su-2026:0312-1 | Security update for openssl-3 | 2026-01-28T09:37:56Z | 2026-01-28T09:37:56Z |
| suse-su-2026:0311-1 | Security update for openssl-3 | 2026-01-28T09:37:48Z | 2026-01-28T09:37:48Z |
| suse-su-2026:0310-1 | Security update for openssl-3 | 2026-01-28T09:37:26Z | 2026-01-28T09:37:26Z |
| suse-su-2026:0309-1 | Security update for openssl-3 | 2026-01-28T09:36:37Z | 2026-01-28T09:36:37Z |
| suse-su-2026:0308-1 | Security update for go1.24-openssl | 2026-01-28T08:38:40Z | 2026-01-28T08:38:40Z |
| suse-su-2026:20170-1 | Security update for cockpit-subscriptions | 2026-01-27T20:40:44Z | 2026-01-27T20:40:44Z |
| suse-su-2026:0307-1 | Security update for python-python-multipart | 2026-01-27T16:36:58Z | 2026-01-27T16:36:58Z |
| suse-su-2026:0306-1 | Security update for xen | 2026-01-27T16:15:19Z | 2026-01-27T16:15:19Z |
| suse-su-2026:0305-1 | Recommended update for kernel-firmware | 2026-01-27T16:15:14Z | 2026-01-27T16:15:14Z |
| suse-su-2026:0304-1 | Security update for xen | 2026-01-27T16:14:51Z | 2026-01-27T16:14:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-06824 | D-Link DIR-823G信息泄露漏洞 | 2024-09-11 | 2026-01-23 |
| cnvd-2026-06823 | D-Link DIR-823G命令注入漏洞 | 2025-11-18 | 2026-01-23 |
| cnvd-2026-06813 | D-Link DWR-M920 sub_41C7FC函数缓冲区溢出漏洞 | 2025-11-24 | 2026-01-23 |
| cnvd-2026-06812 | D-Link DWR-M920 sub_423848函数缓冲区溢出漏洞 | 2026-01-14 | 2026-01-23 |
| cnvd-2026-06811 | D-Link DWR-M920 sub_464794函数缓冲区溢出漏洞 | 2026-01-14 | 2026-01-23 |
| cnvd-2026-06810 | D-Link DWR-M920命令注入漏洞 | 2026-01-14 | 2026-01-23 |
| cnvd-2026-06809 | D-Link DWR-M920 sub_42261C函数堆栈缓冲区溢出漏洞 | 2026-01-14 | 2026-01-23 |
| cnvd-2026-06604 | 上海锐昉科技有限公司RB企业管理系统存在SQL注入漏洞 | 2025-11-25 | 2026-01-23 |
| cnvd-2026-06362 | 瑞斯康达科技发展股份有限公司RAISECOM DR5374存在命令注入漏洞 | 2025-09-10 | 2026-01-23 |
| cnvd-2026-06289 | 用友网络科技股份有限公司用友U9多组织企业互联网应用平台存在任意文件下载漏洞 | 2025-11-24 | 2026-01-23 |
| cnvd-2026-06274 | 用友网络科技股份有限公司用友BIP数据应用服务存在SQL注入漏洞(CNVD-C-2025-879635) | 2025-11-18 | 2026-01-23 |
| cnvd-2026-06271 | 用友网络科技股份有限公司用友BIP数据应用服务存在目录遍历漏洞 | 2025-11-18 | 2026-01-23 |
| cnvd-2026-05793 | 深圳市绿联科技股份有限公司DH2100+ NAS存在命令执行漏洞 | 2025-11-21 | 2026-01-23 |
| cnvd-2026-05792 | 深圳市绿联科技股份有限公司DH2100+存在二进制漏洞 | 2025-11-20 | 2026-01-23 |
| cnvd-2026-08750 | Microsoft Graphics Kernel竞争条件问题漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08749 | Microsoft Graphics Component资源管理错误漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08748 | Microsoft Excel访问控制错误漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08747 | Microsoft Excel代码执行漏洞(CNVD-2026-08747) | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08746 | Microsoft Excel代码执行漏洞(CNVD-2026-08746) | 2026-01-19 | 2026-01-22 |
| cnvd-2026-07247 | Google Chrome堆缓冲区溢出漏洞 | 2025-10-30 | 2026-01-22 |
| cnvd-2026-07246 | Google Chrome实现不当漏洞(CNVD-2026-07246) | 2025-11-11 | 2026-01-22 |
| cnvd-2026-07245 | Google Chrome释放后使用漏洞(CNVD-2026-07245) | 2025-12-05 | 2026-01-22 |
| cnvd-2026-07244 | Google Chrome实现不当漏洞 | 2025-12-08 | 2026-01-22 |
| cnvd-2026-07243 | Google Chrome类型混淆漏洞 | 2025-12-08 | 2026-01-22 |
| cnvd-2026-07242 | Google Chrome释放后重用漏洞 | 2025-12-15 | 2026-01-22 |
| cnvd-2026-07241 | Google Chrome策略执行不足漏洞 | 2026-01-09 | 2026-01-22 |
| cnvd-2026-07159 | Intern Membership Management System /add_admin.php文件SQL注入漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-07158 | Intern Membership Management System /add_activity.php文件SQL注入漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-07151 | Tenda M3 R7WebsSecurityHandler方法栈缓冲区溢出漏洞 | 2023-12-28 | 2026-01-22 |
| cnvd-2026-07150 | Tenda M3 fromSetLocalVlanInfo函数栈缓冲区溢出漏洞 | 2023-12-28 | 2026-01-22 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0114 | Multiples vulnérabilités dans Google Chrome | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0113 | Vulnérabilité dans Google Pixel | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0112 | Multiples vulnérabilités dans les produits VMware | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| certfr-2026-avi-0111 | Vulnérabilité dans ESET Inspect Connector | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| certfr-2026-avi-0110 | Multiples vulnérabilités Ivanti Endpoint Manager Mobile (EPMM) | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0109 | Multiples vulnérabilités dans les produits IBM | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0108 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0107 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0106 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0105 | Vulnérabilité dans Microsoft Edge | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0104 | Vulnérabilité dans Qnap QTS | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0103 | Multiples vulnérabilités dans Node.js | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0102 | Vulnérabilité dans Splunk Enterprise | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0101 | Multiples vulnérabilités dans les produits Siemens | 2026-01-29T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| certfr-2026-avi-0100 | Multiples vulnérabilités dans les produits WithSecure | 2026-01-29T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| certfr-2026-avi-0099 | Multiples vulnérabilités dans SolarWinds Web Help Desk | 2026-01-28T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| certfr-2026-avi-0098 | Vulnérabilité dans les produits Symfony | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0097 | Vulnérabilité dans les produits Fortinet | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0096 | Multiples vulnérabilités dans OpenSSL | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0095 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0094 | Multiples vulnérabilités dans HPE Aruba Networking Fabric Composer | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0093 | Multiples vulnérabilités dans Tenable Network Monitor | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0092 | Vulnérabilité dans Google Chrome | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2025-avi-0618 | Multiples vulnérabilités dans les produits Mitel | 2025-07-24T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0091 | Multiples vulnérabilités dans Xen | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0090 | Multiples vulnérabilités dans Citrix XenServer | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0089 | Vulnérabilité dans Microsoft Office | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0088 | Vulnérabilité dans MariaDB | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0087 | Vulnérabilité dans les produits Belden | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| certfr-2026-avi-0086 | Vulnérabilité dans CPython | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2023-ale-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| CERTFR-2023-ALE-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| certfr-2023-ale-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| CERTFR-2023-ALE-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| certfr-2023-ale-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2022-ale-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2022-ALE-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| CERTFR-2023-ALE-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| certfr-2023-ale-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| CERTFR-2023-ALE-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| certfr-2023-ale-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-ale-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-010 | Multiples vulnérabilités dans GLPI | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-009 | [MaJ] Vulnérabilité dans Zimbra Collaboration | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |