Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-21248 |
7.3 (3.1)
|
Windows Hyper-V Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:19.526Z | 2026-02-23T16:22:54.454Z |
| CVE-2026-21260 |
7.5 (3.1)
|
Microsoft Outlook Spoofing Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:18.891Z | 2026-02-23T16:22:53.607Z |
| CVE-2026-21258 |
5.5 (3.1)
|
Microsoft Excel Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:18.057Z | 2026-02-23T16:22:52.752Z |
| CVE-2026-21512 |
6.5 (3.1)
|
Azure DevOps Server Cross-Site Scripting Vulnerability |
Microsoft |
Azure DevOps Server 2022 |
2026-02-10T17:51:16.670Z | 2026-02-23T16:22:51.169Z |
| CVE-2026-21259 |
7.8 (3.1)
|
Microsoft Excel Elevation of Privilege Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:17.445Z | 2026-02-23T16:22:51.865Z |
| CVE-2026-21517 |
4.7 (3.1)
|
Windows App for Mac Installer Elevation of Privilege V… |
Microsoft |
Windows App for Mac |
2026-02-10T17:51:15.940Z | 2026-02-23T16:22:50.391Z |
| CVE-2026-21518 |
8.8 (3.1)
|
GitHub Copilot and Visual Studio Code Security Feature… |
Microsoft |
Visual Studio Code |
2026-02-10T17:51:15.121Z | 2026-02-23T16:22:49.459Z |
| CVE-2026-21519 |
7.8 (3.1)
|
Desktop Window Manager Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:13.956Z | 2026-02-23T16:22:48.337Z |
| CVE-2025-70043 |
9.1 (3.1)
|
An issue pertaining to CWE-295: Improper Certific… |
n/a |
n/a |
2026-02-23T00:00:00.000Z | 2026-02-23T15:59:10.410Z |
| CVE-2025-70044 |
6.5 (3.1)
|
An issue pertaining to CWE-295: Improper Certific… |
n/a |
n/a |
2026-02-23T00:00:00.000Z | 2026-02-23T15:55:32.410Z |
| CVE-2025-65995 |
N/A
|
Apache Airflow: Disclosure of secrets to UI via kwargs |
Apache Software Foundation |
Apache Airflow |
2026-02-21T02:14:25.730Z | 2026-02-23T15:47:34.917Z |
| CVE-2025-70058 |
N/A
|
An issue pertaining to CWE-295: Improper Certific… |
n/a |
n/a |
2026-02-23T00:00:00.000Z | 2026-02-23T15:45:48.836Z |
| CVE-2026-2874 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda A21 fast_setting_wifi_set form_fast_setting_wifi… |
Tenda |
A21 |
2026-02-21T17:32:08.108Z | 2026-02-23T15:41:47.302Z |
| CVE-2026-2876 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda A18 setBlackRule parse_macfilter_rule stack-base… |
Tenda |
A18 |
2026-02-21T17:32:11.364Z | 2026-02-23T15:41:12.127Z |
| CVE-2026-23552 |
N/A
|
Apache Camel: Camel-Keycloak: Cross-Realm Token Accept… |
Apache Software Foundation |
Apache Camel |
2026-02-23T08:45:36.154Z | 2026-02-23T15:40:59.201Z |
| CVE-2026-2877 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda A18 Httpd Service WifiExtraSet strcpy stack-base… |
Tenda |
A18 |
2026-02-21T18:32:08.125Z | 2026-02-23T15:40:18.876Z |
| CVE-2026-3016 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
UTT HiPER 810G formP2PLimitConfig strcpy buffer overflow |
UTT |
HiPER 810G |
2026-02-23T15:02:07.556Z | 2026-02-23T15:38:52.078Z |
| CVE-2026-0865 |
5.9 (4.0)
|
wsgiref.headers.Headers allows header newline injection |
Python Software Foundation |
CPython |
2026-01-20T21:26:15.274Z | 2026-02-23T14:49:35.432Z |
| CVE-2026-27072 |
7.1 (3.1)
|
WordPress PixelYourSite – Your smart PIXEL (TAG) Manag… |
PixelYourSite |
PixelYourSite – Your smart PIXEL (TAG) Manager |
2026-02-20T15:47:09.356Z | 2026-02-23T14:38:15.514Z |
| CVE-2026-2957 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
qinming99 dst-admin File BackupController.java deleteB… |
qinming99 |
dst-admin |
2026-02-22T23:02:42.798Z | 2026-02-23T14:34:05.937Z |
| CVE-2025-67305 |
9.8 (3.1)
|
In RUCKUS Network Director (RND) < 4.5.0.56, the … |
n/a |
n/a |
2026-02-19T00:00:00.000Z | 2026-02-23T14:06:57.026Z |
| CVE-2025-67304 |
9.8 (3.1)
|
In Ruckus Network Director (RND) < 4.5.0.54, the … |
n/a |
n/a |
2026-02-19T00:00:00.000Z | 2026-02-23T14:03:21.884Z |
| CVE-2026-2971 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
a466350665 Smart-SSO Login login.html cross site scripting |
a466350665 |
Smart-SSO |
2026-02-23T04:32:08.559Z | 2026-02-23T13:59:00.367Z |
| CVE-2025-69725 |
4.7 (3.1)
|
An Open Redirect vulnerability in the go-chi/chi … |
n/a |
n/a |
2026-02-19T00:00:00.000Z | 2026-02-23T13:58:39.270Z |
| CVE-2025-69674 |
9.8 (3.1)
|
Buffer Overflow vulnerability in CDATA FD614GS3-R… |
n/a |
n/a |
2026-02-19T00:00:00.000Z | 2026-02-23T13:53:04.110Z |
| CVE-2026-2963 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Jinher OA C6 OfficeSupplyTypeRight.aspx sql injection |
Jinher |
OA C6 |
2026-02-23T00:32:13.932Z | 2026-02-23T13:50:26.894Z |
| CVE-2025-55853 |
9.1 (3.1)
|
SoftVision webPDF before 10.0.2 is vulnerable to … |
n/a |
n/a |
2026-02-19T00:00:00.000Z | 2026-02-23T13:50:12.035Z |
| CVE-2026-2964 |
2.3 (4.0)
5 (3.1)
5 (3.0)
|
higuma web-audio-recorder-js Dynamic Config Handling W… |
higuma |
web-audio-recorder-js |
2026-02-23T01:02:10.387Z | 2026-02-23T13:49:40.324Z |
| CVE-2026-24494 |
9.8 (3.1)
|
SQL injection vulnerability in Order Up Online Orderin… |
Order Up |
Online Ordering System |
2026-02-23T01:24:47.676Z | 2026-02-23T13:47:41.202Z |
| CVE-2026-2965 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
07FLYCMS/07FLY-CMS/07FlyCRM System Extension edit.html… |
n/a |
07FLYCMS |
2026-02-23T01:32:08.157Z | 2026-02-23T13:46:48.205Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2020-1182 |
7.3 (3.1)
|
Microsoft Dynamics 365 for Finance and Operations (on-… |
Microsoft |
Dynamics 365 for Finance and Operations |
2020-08-17T19:12:58.000Z | 2024-08-04T06:25:01.279Z |
| CVE-2020-1180 |
4.2 (3.1)
|
Scripting Engine Memory Corruption Vulnerability |
Microsoft |
ChakraCore |
2020-09-11T17:09:05.000Z | 2024-08-04T06:25:01.398Z |
| CVE-2020-1172 |
4.2 (3.1)
|
Scripting Engine Memory Corruption Vulnerability |
Microsoft |
ChakraCore |
2020-09-11T17:09:04.000Z | 2024-08-04T06:25:01.101Z |
| CVE-2020-1169 |
7.8 (3.1)
|
Windows Runtime Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:09:03.000Z | 2024-08-04T06:25:01.238Z |
| CVE-2020-1167 |
7.8 (3.1)
|
Microsoft Graphics Components Remote Code Execution Vu… |
Microsoft |
Windows 10 Version 1803 |
2020-10-16T22:18:14.000Z | 2024-11-15T16:54:23.785Z |
| CVE-2020-1159 |
6.6 (3.1)
|
Windows Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1909 |
2020-09-11T17:09:03.000Z | 2024-08-04T06:25:01.215Z |
| CVE-2020-1152 |
5.8 (3.1)
|
Windows Win32k Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:02.000Z | 2024-08-04T06:25:01.287Z |
| CVE-2020-1146 |
6.6 (3.1)
|
Microsoft Store Runtime Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:02.000Z | 2024-08-04T06:25:01.291Z |
| CVE-2020-1133 |
5.5 (3.1)
|
Diagnostics Hub Standard Collector Elevation of Privil… |
Microsoft |
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) |
2020-09-11T17:09:01.000Z | 2024-08-04T06:25:01.292Z |
| CVE-2020-1130 |
6.6 (3.1)
|
Diagnostics Hub Standard Collector Elevation of Privil… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:01.000Z | 2024-08-04T06:25:01.223Z |
| CVE-2020-1129 |
8.8 (3.1)
|
Microsoft Windows Codecs Library Remote Code Execution… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:00.000Z | 2024-11-18T17:41:55.269Z |
| CVE-2020-1122 |
5.5 (3.1)
|
Windows Language Pack Installer Elevation of Privilege… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:00.000Z | 2024-08-04T06:25:01.245Z |
| CVE-2020-1119 |
5.5 (3.1)
|
Windows Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1909 |
2020-09-11T17:08:59.000Z | 2024-08-04T06:25:01.291Z |
| CVE-2020-1115 |
7.8 (3.1)
|
Windows Common Log File System Driver Elevation of Pri… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:59.000Z | 2024-08-04T06:25:01.077Z |
| CVE-2020-1098 |
7.8 (3.1)
|
Windows Shell Infrastructure Component Elevation of Pr… |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:08:58.000Z | 2024-08-04T06:25:01.095Z |
| CVE-2020-1097 |
6.5 (3.1)
|
Windows Graphics Component Information Disclosure Vuln… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:58.000Z | 2024-10-01T15:57:12.774Z |
| CVE-2020-1091 |
6.5 (3.1)
|
Windows Graphics Component Information Disclosure Vuln… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:57.000Z | 2024-08-04T06:25:00.934Z |
| CVE-2020-1083 |
5.5 (3.1)
|
Microsoft Graphics Component Information Disclosure Vu… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:57.000Z | 2024-08-04T06:25:00.832Z |
| CVE-2020-1080 |
8.8 (3.1)
|
Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-10-16T22:18:13.000Z | 2024-08-04T06:25:01.083Z |
| CVE-2020-1074 |
7.8 (3.1)
|
Jet Database Engine Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:56.000Z | 2024-08-04T06:25:01.073Z |
| CVE-2020-1057 |
4.2 (3.1)
|
Scripting Engine Memory Corruption Vulnerability |
Microsoft |
ChakraCore |
2020-09-11T17:08:56.000Z | 2024-08-04T06:25:00.990Z |
| CVE-2020-1053 |
7.8 (3.1)
|
DirectX Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:08:55.000Z | 2024-08-04T06:25:01.093Z |
| CVE-2020-1052 |
7.8 (3.1)
|
Windows Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:08:55.000Z | 2024-08-04T06:25:00.978Z |
| CVE-2020-1047 |
7.8 (3.1)
|
Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-10-16T22:18:13.000Z | 2024-08-04T06:25:01.114Z |
| CVE-2020-1046 |
N/A
|
.NET Framework Remote Code Execution Vulnerability |
Microsoft |
Microsoft .NET Framework 3.5 |
2020-08-17T19:12:57.000Z | 2024-08-04T06:25:00.884Z |
| CVE-2020-1045 |
7.5 (3.1)
|
Microsoft ASP.NET Core Security Feature Bypass Vulnerability |
Microsoft |
ASP.NET Core 2.1 |
2020-09-11T00:00:00.000Z | 2024-11-18T16:25:38.621Z |
| CVE-2020-1044 |
4.3 (3.1)
|
SQL Server Reporting Services Security Feature Bypass … |
Microsoft |
SQL Server 2017 Reporting Services |
2020-09-11T17:08:54.000Z | 2024-08-04T06:25:00.771Z |
| CVE-2020-1039 |
7.8 (3.1)
|
Jet Database Engine Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:54.000Z | 2024-10-01T15:57:18.205Z |
| CVE-2020-1038 |
5.5 (3.1)
|
Windows Routing Utilities Denial of Service |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:53.000Z | 2024-08-04T06:25:00.671Z |
| CVE-2020-1034 |
6.8 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:53.000Z | 2024-08-04T06:25:01.282Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2020-1057 | <p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine han… | 2020-09-11T17:15:18.463 | 2026-02-23T18:23:17.813 |
| fkie_cve-2020-1053 | <p>An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory… | 2020-09-11T17:15:18.417 | 2026-02-23T18:23:15.290 |
| fkie_cve-2020-1052 | <p>An elevation of privilege vulnerability exists in the way that the ssdpsrv.dll handles objects i… | 2020-09-11T17:15:18.357 | 2026-02-23T18:23:09.233 |
| fkie_cve-2020-1047 | <p>An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to pr… | 2020-10-16T23:15:17.523 | 2026-02-23T18:23:08.323 |
| fkie_cve-2020-1046 | A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An atta… | 2020-08-17T19:15:14.083 | 2026-02-23T18:23:08.147 |
| fkie_cve-2020-1045 | <p>A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded … | 2020-09-11T17:15:18.307 | 2026-02-23T18:23:07.950 |
| fkie_cve-2020-1044 | <p>A security feature bypass vulnerability exists in SQL Server Reporting Services (SSRS) when the … | 2020-09-11T17:15:18.260 | 2026-02-23T18:23:07.817 |
| fkie_cve-2020-1039 | <p>A remote code execution vulnerability exists when the Windows Jet Database Engine improperly han… | 2020-09-11T17:15:18.200 | 2026-02-23T18:23:07.000 |
| fkie_cve-2020-1038 | <p>A denial of service vulnerability exists when Windows Routing Utilities improperly handles objec… | 2020-09-11T17:15:18.153 | 2026-02-23T18:23:06.480 |
| fkie_cve-2020-1034 | <p>An elevation of privilege vulnerability exists in the way that the Windows Kernel handles object… | 2020-09-11T17:15:18.107 | 2026-02-23T18:23:05.603 |
| fkie_cve-2020-1033 | <p>An information disclosure vulnerability exists when the Windows kernel improperly handles object… | 2020-09-11T17:15:18.057 | 2026-02-23T18:23:05.360 |
| fkie_cve-2020-1031 | <p>An information disclosure vulnerability exists in the way that the Windows Server DHCP service i… | 2020-09-11T17:15:17.997 | 2026-02-23T18:23:04.930 |
| fkie_cve-2020-1030 | <p>An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly… | 2020-09-11T17:15:17.950 | 2026-02-23T18:23:04.587 |
| fkie_cve-2020-1025 | An elevation of privilege vulnerability exists when Microsoft SharePoint Server and Skype for Busin… | 2020-07-14T23:15:11.447 | 2026-02-23T18:23:01.917 |
| fkie_cve-2020-1013 | <p>An elevation of privilege vulnerability exists when Microsoft Windows processes group policy upd… | 2020-09-11T17:15:17.857 | 2026-02-23T18:22:59.423 |
| fkie_cve-2020-1012 | <p>An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects i… | 2020-09-11T17:15:17.807 | 2026-02-23T18:22:59.233 |
| fkie_cve-2025-27550 | IBM Jazz Reporting Service could allow an authenticated user on the host network to obtain sensitiv… | 2026-02-04T21:15:57.753 | 2026-02-23T18:22:37.800 |
| fkie_cve-2026-26315 | go-ethereum (Geth) is a golang execution layer implementation of the Ethereum protocol. Prior to ve… | 2026-02-19T22:16:46.967 | 2026-02-23T18:21:52.770 |
| fkie_cve-2020-17023 | <p>A remote code execution vulnerability exists in Visual Studio Code when a user is tricked into o… | 2020-10-16T23:15:17.460 | 2026-02-23T18:21:42.607 |
| fkie_cve-2020-17022 | <p>A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library ha… | 2020-10-16T23:15:17.400 | 2026-02-23T18:21:42.437 |
| fkie_cve-2020-17003 | <p>A remote code execution vulnerability exists when the Base3D rendering engine improperly handles… | 2020-10-16T23:15:17.353 | 2026-02-23T18:21:39.750 |
| fkie_cve-2020-16995 | <p>An elevation of privilege vulnerability exists in Network Watcher Agent virtual machine extensio… | 2020-10-16T23:15:17.290 | 2026-02-23T18:21:37.967 |
| fkie_cve-2020-16980 | <p>An elevation of privilege vulnerability exists when the Windows iSCSI Target Service improperly … | 2020-10-16T23:15:17.227 | 2026-02-23T18:21:36.940 |
| fkie_cve-2020-16978 | <p>A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not p… | 2020-10-16T23:15:17.163 | 2026-02-23T18:21:36.730 |
| fkie_cve-2020-16977 | <p>A remote code execution vulnerability exists in Visual Studio Code when the Python extension loa… | 2020-10-16T23:15:17.103 | 2026-02-23T18:21:36.593 |
| fkie_cve-2020-16976 | <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handle… | 2020-10-16T23:15:17.040 | 2026-02-23T18:21:36.287 |
| fkie_cve-2020-16975 | <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handle… | 2020-10-16T23:15:16.977 | 2026-02-23T18:21:36.010 |
| fkie_cve-2020-16974 | <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handle… | 2020-10-16T23:15:16.913 | 2026-02-23T18:21:35.727 |
| fkie_cve-2020-16973 | <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handle… | 2020-10-16T23:15:16.853 | 2026-02-23T18:21:35.447 |
| fkie_cve-2020-16972 | <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handle… | 2020-10-16T23:15:16.807 | 2026-02-23T18:21:35.157 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-m5w7-8p57-p7r3 |
5.3 (3.1)
|
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in rtCamp … | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-jwh4-2xr6-36qf |
5.3 (3.1)
|
Missing Authorization vulnerability in Kraft Plugins Wheel of Life wheel-of-life allows Exploiting … | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-hm7p-gwh2-3jfm |
5.3 (3.1)
|
Missing Authorization vulnerability in alttextai Download Alt Text AI alttext-ai allows Exploiting … | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-g6g2-qr88-w8qf |
5.4 (3.1)
|
Missing Authorization vulnerability in BBR Plugins Better Business Reviews better-business-reviews … | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-fw5x-26p7-22pv |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in wpzita Zita Elementor Site Library zita-site-lib… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-fv8p-2x46-62xh |
5.3 (3.1)
|
Missing Authorization vulnerability in PSM Plugins SupportCandy supportcandy allows Exploiting Inco… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-cppf-28gj-rgc8 |
5.4 (3.1)
|
Missing Authorization vulnerability in 10up Autoshare for Twitter autoshare-for-twitter allows Expl… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-97jx-r35c-g98x |
5.3 (3.1)
|
Missing Authorization vulnerability in Ays Pro AI ChatBot with ChatGPT and Content Generator by AYS… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-92wf-6p4m-jhgj |
5.9 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-89gr-885m-3hc3 |
5.3 (3.1)
|
Missing Authorization vulnerability in WP Swings Ultimate Gift Cards For WooCommerce woo-gift-cards… | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-739q-666p-vgj7 |
5.3 (3.1)
|
Missing Authorization vulnerability in Alma Alma alma-gateway-for-woocommerce allows Exploiting Inc… | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-5h6j-gr7x-5qpg |
9.8 (3.1)
|
Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Restaurant grandrestaurant allo… | 2026-02-19T18:31:51Z | 2026-02-20T00:31:52Z |
| ghsa-528q-f4x8-fm57 |
5.3 (3.1)
|
Missing Authorization vulnerability in wpcoachify Coachify coachify allows Exploiting Incorrectly C… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-4234-jpgj-67fv |
4.3 (3.1)
|
Missing Authorization vulnerability in wp.insider Simple Membership simple-membership allows Exploi… | 2026-02-19T18:31:52Z | 2026-02-20T00:31:52Z |
| ghsa-3h3m-wx6r-9g3v |
5.3 (3.1)
|
Missing Authorization vulnerability in DevsBlink EduBlink edublink allows Exploiting Incorrectly Co… | 2026-02-19T21:30:48Z | 2026-02-20T00:31:52Z |
| ghsa-2q3j-wj77-9934 |
6.5 (3.1)
6.0 (4.0)
|
A Missing Authorization vulnerability was identified in GitHub Enterprise Server that allowed an at… | 2026-02-18T21:31:23Z | 2026-02-20T00:31:52Z |
| ghsa-p6jf-79j3-33f3 |
9.1 (3.1)
|
carbon-apimgt does not properly restrict uploaded files | 2026-02-19T18:31:54Z | 2026-02-19T22:11:44Z |
| ghsa-g22f-v6f7-2hrh |
8.9 (4.0)
|
Langflow affected by Remote Code Execution via validate_code() exec() | 2026-01-23T06:31:24Z | 2026-02-19T22:09:30Z |
| ghsa-rp46-r563-jrc7 |
6.9 (4.0)
|
Apache Avro Java SDK is Vulnerable to Code Injection | 2026-02-13T12:31:21Z | 2026-02-19T22:08:31Z |
| ghsa-j9wf-6r2x-hqmx |
|
Centrifugo v6.6.0 dependency vulnerabilities | 2026-02-19T22:07:13Z | 2026-02-19T22:07:13Z |
| ghsa-fjf4-6f34-w64q |
3.8 (3.1)
|
Keycloak: Missing Check on Disabled Client for Docker Registry Protocol | 2026-02-19T18:31:51Z | 2026-02-19T22:06:37Z |
| ghsa-6c9j-x93c-rw6j |
4.3 (3.1)
|
OpenClaw safeBins file-existence oracle information disclosure | 2026-02-19T22:06:26Z | 2026-02-19T22:06:26Z |
| ghsa-4685-c5cp-vp95 |
3.6 (3.1)
|
OpenClaw safeBins stdin-only bypass via sort output and recursive grep flags | 2026-02-19T22:06:00Z | 2026-02-19T22:06:00Z |
| ghsa-fwxx-wv44-7qfg |
7.5 (3.1)
|
Spring Cloud Gateway Server Webflux is vulnerable to Expression Language Injection | 2025-10-16T15:30:43Z | 2026-02-19T22:00:41Z |
| ghsa-hfvx-25r5-qc3w |
7.6 (3.1)
|
Fabric.js Affected by Stored XSS via SVG Export | 2026-02-18T22:44:58Z | 2026-02-19T21:57:26Z |
| ghsa-5vv4-hvf7-2h46 |
8.8 (3.1)
|
Command Injection via Unsanitized `locate` Output in `versions()` — systeminformation | 2026-02-18T22:36:50Z | 2026-02-19T21:57:18Z |
| ghsa-689v-6xwf-5jf3 |
6.9 (4.0)
|
Go Ethereum affected by DoS via malicious p2p message | 2026-02-18T22:34:49Z | 2026-02-19T21:57:09Z |
| ghsa-9c88-49p5-5ggf |
8.4 (3.1)
|
Systeminformation has a Command Injection via unsanitized interface parameter in wifi.js retry path | 2026-02-18T21:51:26Z | 2026-02-19T21:57:02Z |
| ghsa-jmr7-xgp7-cmfj |
7.5 (3.1)
|
fast-xml-parser affected by DoS through entity expansion in DOCTYPE (no expansion limit) | 2026-02-17T21:30:10Z | 2026-02-19T21:56:54Z |
| ghsa-4chv-4c6w-w254 |
7.5 (3.1)
|
The rs-soroban-sdk #[contractimpl] macro calls inherent function instead of trait function when nam… | 2026-02-17T21:29:05Z | 2026-02-19T21:56:47Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-202 |
|
PyJWT is a Python implementation of RFC 7519. PyJWT supports multiple different JWT signi… | pyjwt | 2022-05-24T15:15:00Z | 2022-06-07T16:57:16.566102Z |
| pysec-2022-201 |
|
Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0. | octoprint | 2022-05-18T14:15:00Z | 2022-05-25T22:34:11.424461Z |
| pysec-2022-200 |
|
Cross-site Scripting (XSS) - DOM in GitHub repository octoprint/octoprint prior to 1.8.0. | octoprint | 2022-05-18T14:15:00Z | 2022-05-25T22:34:11.363909Z |
| pysec-2022-199 |
|
The ctx hosted project on PyPI was taken over via user account compromise and replaced wi… | ctx | 2022-05-24T17:55:00.000000Z | 2022-05-24T17:55:00.000000Z |
| pysec-2022-157 |
|
Tensorflow is an Open Source Machine Learning Framework. The `simplifyBroadcast` function… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-05-23T17:22:17.622844Z |
| pysec-2022-156 |
|
Tensorflow is an Open Source Machine Learning Framework. TensorFlow's type inference can … | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-05-23T17:22:17.496974Z |
| pysec-2022-154 |
|
Tensorflow is an Open Source Machine Learning Framework. A `GraphDef` from a TensorFlow `… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-05-23T17:22:17.175044Z |
| pysec-2022-99 |
|
Tensorflow is an Open Source Machine Learning Framework. A `GraphDef` from a TensorFlow `… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-05-23T17:22:06.927466Z |
| pysec-2022-102 |
|
Tensorflow is an Open Source Machine Learning Framework. The `simplifyBroadcast` function… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-05-23T17:21:57.130120Z |
| pysec-2022-101 |
|
Tensorflow is an Open Source Machine Learning Framework. TensorFlow's type inference can … | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-05-23T17:21:57.046527Z |
| pysec-2022-198 |
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In affected… | vyper | 2022-04-13T22:15:00Z | 2022-05-17T23:28:35.566517Z |
| pysec-2022-197 |
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Versions of… | vyper | 2022-04-13T19:15:00Z | 2022-05-17T23:28:35.533012Z |
| pysec-2022-196 |
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. In version … | vyper | 2022-04-04T18:15:00Z | 2022-05-17T23:28:35.497395Z |
| pysec-2022-195 |
|
Twisted is an event-based framework for internet applications, supporting Python 3.6+. Pr… | twisted | 2022-04-04T18:15:00Z | 2022-05-17T23:28:35.399117Z |
| pysec-2022-194 |
|
PyPDF2 is an open source python PDF library capable of splitting, merging, cropping, and … | pypdf2 | 2022-04-18T19:15:00Z | 2022-05-17T23:28:27.580433Z |
| pysec-2022-193 |
|
flask-session-captcha is a package which allows users to extend Flask by adding an image … | flask-session-captcha | 2022-04-25T22:15:00Z | 2022-05-17T23:28:25.264091Z |
| pysec-2022-192 |
|
django-mfa3 is a library that implements multi factor authentication for the django web f… | django-mfa3 | 2022-04-15T19:15:00Z | 2022-05-17T23:28:24.608119Z |
| pysec-2022-191 |
|
A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3… | django | 2022-04-12T05:15:00Z | 2022-05-17T23:28:24.874544Z |
| pysec-2022-190 |
|
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.… | django | 2022-04-12T05:15:00Z | 2022-05-17T23:28:24.739985Z |
| pysec-2022-189 |
|
A Python format string issue leading to information disclosure and potentially remote cod… | consoleme | 2022-04-01T23:15:00Z | 2022-05-17T23:28:24.480886Z |
| pysec-2022-188 |
|
Apache Superset before 1.4.2 is vulnerable to SQL injection in chart data requests. Users… | apache-superset | 2022-04-13T19:15:00Z | 2022-05-17T23:28:23.962872Z |
| pysec-2022-187 |
|
TkVideoplayer is a simple library to play video files in tkinter. Uncontrolled memory con… | tkvideoplayer | 2022-05-06T00:15:00Z | 2022-05-17T21:41:01.217686Z |
| pysec-2022-186 |
|
Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" a… | pyspark | 2022-03-10T09:15:00Z | 2022-05-17T21:40:53.336457Z |
| pysec-2022-184 |
|
Keylime does not enforce that the agent registrar data is the same when the tenant uses i… | keylime | 2022-05-06T17:15:00Z | 2022-05-17T21:40:52.506546Z |
| pysec-2022-183 |
|
Encode OSS httpx <=1.0.0.beta0 is affected by improper input validation in `httpx.URL`, `… | httpx | 2022-04-28T14:15:00Z | 2022-05-17T21:40:52.405453Z |
| pysec-2022-182 |
|
ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_remove_1 (… | admesh | 2022-05-08T06:15:00Z | 2022-05-17T21:40:50.660206Z |
| pysec-2022-185 |
|
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor. | marcador | 2022-05-08T20:15:00Z | 2022-05-17T18:33:00Z |
| pysec-2022-166 |
|
In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_pri… | paramiko | 2022-03-17T22:15:00Z | 2022-05-17T03:06:38.700744Z |
| pysec-2022-43150 |
7.5 (3.1)
|
Apache Doris, prior to 1.0.0, used a hardcoded key and IV to initialize the cipher used f… | pydoris | 2022-04-26T16:15:00+00:00 | 2022-05-06T13:40:00+00:00 |
| pysec-2022-181 |
|
Code Injection in GitHub repository pytorchlightning/pytorch-lightning prior to 1.6.0. | pytorch-lightning | 2022-03-05T22:15:00Z | 2022-04-11T00:47:32.240193Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-4034 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:11.169419Z |
| gsd-2024-4033 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:11.165686Z |
| gsd-2024-4032 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:11.172002Z |
| gsd-2024-4031 | Unquoted Search Path or Element vulnerability in Logitech MEVO WEBCAM APP on Windows allo… | 2024-04-23T05:02:11.176124Z |
| gsd-2024-4030 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:11.163669Z |
| gsd-2024-4029 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:11.173931Z |
| gsd-2024-4028 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:11.175053Z |
| gsd-2024-4027 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:11.166136Z |
| gsd-2024-4026 | Cross-Site Scripting (XSS) vulnerability in the Holded application. This vulnerability co… | 2024-04-23T05:02:11.173120Z |
| gsd-2024-4025 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:11.167296Z |
| gsd-2024-4024 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.8 bef… | 2024-04-23T05:02:11.171542Z |
| gsd-2024-32999 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.598524Z |
| gsd-2024-32998 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.529613Z |
| gsd-2024-32997 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.481992Z |
| gsd-2024-32996 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.492591Z |
| gsd-2024-32995 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.354158Z |
| gsd-2024-32994 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.327905Z |
| gsd-2024-32993 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.470521Z |
| gsd-2024-32992 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.561713Z |
| gsd-2024-32991 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.530627Z |
| gsd-2024-32990 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.464827Z |
| gsd-2024-32989 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.457455Z |
| gsd-2024-32988 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.629009Z |
| gsd-2024-32987 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.464359Z |
| gsd-2024-32986 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.442325Z |
| gsd-2024-32985 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.620074Z |
| gsd-2024-32984 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.475323Z |
| gsd-2024-32983 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.521511Z |
| gsd-2024-32982 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.568862Z |
| gsd-2024-32981 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.638018Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2026-349 | Malicious code in tutor_table (npm) | 2026-01-19T06:07:51Z | 2026-01-23T01:39:04Z |
| MAL-2026-334 | Malicious code in viem-js (npm) | 2026-01-19T00:43:31Z | 2026-01-23T01:39:04Z |
| MAL-2026-333 | Malicious code in tronweb-tool (npm) | 2026-01-19T00:34:59Z | 2026-01-23T01:39:04Z |
| MAL-2026-332 | Malicious code in tailwin (npm) | 2026-01-19T00:43:31Z | 2026-01-23T01:39:04Z |
| MAL-2026-324 | Malicious code in typedoc-plugin-fuel-variants (npm) | 2026-01-17T22:15:00Z | 2026-01-23T01:39:04Z |
| mal-2026-448 | Malicious code in rank253222 (npm) | 2026-01-22T07:50:51Z | 2026-01-23T01:39:03Z |
| mal-2026-429 | Malicious code in sign-client (npm) | 2026-01-21T04:34:17Z | 2026-01-23T01:39:03Z |
| mal-2026-428 | Malicious code in shroom-kit (npm) | 2026-01-21T04:39:39Z | 2026-01-23T01:39:03Z |
| mal-2026-427 | Malicious code in replicate-js (npm) | 2026-01-21T04:49:30Z | 2026-01-23T01:39:03Z |
| mal-2026-426 | Malicious code in qdrant-js (npm) | 2026-01-21T04:49:30Z | 2026-01-23T01:39:03Z |
| mal-2026-425 | Malicious code in plugin-vue (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:39:03Z |
| mal-2026-424 | Malicious code in plugin-react-swc (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:39:03Z |
| mal-2026-397 | Malicious code in recaptcha-cors (npm) | 2026-01-21T03:59:51Z | 2026-01-23T01:39:03Z |
| mal-2026-396 | Malicious code in private-internal-sdk (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:03Z |
| mal-2026-377 | Malicious code in potdf (npm) | 2026-01-21T02:31:57Z | 2026-01-23T01:39:03Z |
| mal-2026-370 | Malicious code in sezzle (npm) | 2026-01-20T06:18:17Z | 2026-01-23T01:39:03Z |
| mal-2026-364 | Malicious code in shared-global-ec-uikit (npm) | 2026-01-20T04:16:09Z | 2026-01-23T01:39:03Z |
| mal-2026-363 | Malicious code in pl-global-ec-uikit (npm) | 2026-01-20T04:16:09Z | 2026-01-23T01:39:03Z |
| mal-2026-356 | Malicious code in react-server-dom-unbundled (npm) | 2026-01-20T03:42:30Z | 2026-01-23T01:39:03Z |
| mal-2026-348 | Malicious code in react-native-webview-forked (npm) | 2026-01-19T05:24:56Z | 2026-01-23T01:39:03Z |
| mal-2026-345 | Malicious code in private-payment-lib (npm) | 2026-01-19T00:59:52Z | 2026-01-23T01:39:03Z |
| MAL-2026-448 | Malicious code in rank253222 (npm) | 2026-01-22T07:50:51Z | 2026-01-23T01:39:03Z |
| MAL-2026-429 | Malicious code in sign-client (npm) | 2026-01-21T04:34:17Z | 2026-01-23T01:39:03Z |
| MAL-2026-428 | Malicious code in shroom-kit (npm) | 2026-01-21T04:39:39Z | 2026-01-23T01:39:03Z |
| MAL-2026-427 | Malicious code in replicate-js (npm) | 2026-01-21T04:49:30Z | 2026-01-23T01:39:03Z |
| MAL-2026-426 | Malicious code in qdrant-js (npm) | 2026-01-21T04:49:30Z | 2026-01-23T01:39:03Z |
| MAL-2026-425 | Malicious code in plugin-vue (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:39:03Z |
| MAL-2026-424 | Malicious code in plugin-react-swc (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:39:03Z |
| MAL-2026-397 | Malicious code in recaptcha-cors (npm) | 2026-01-21T03:59:51Z | 2026-01-23T01:39:03Z |
| MAL-2026-396 | Malicious code in private-internal-sdk (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0362 | Linux Kernel: Mehrere Schwachstellen | 2025-02-12T23:00:00.000+00:00 | 2025-06-16T22:00:00.000+00:00 |
| wid-sec-w-2025-0309 | Linux Kernel: Mehrere Schwachstellen | 2025-02-10T23:00:00.000+00:00 | 2025-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-3758 | Grub: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-12-29T23:00:00.000+00:00 | 2025-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-3756 | Linux Kernel: Mehrere Schwachstellen | 2024-12-26T23:00:00.000+00:00 | 2025-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-3575 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-12-02T23:00:00.000+00:00 | 2025-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-3367 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-11-06T23:00:00.000+00:00 | 2025-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-1607 | Linux Kernel: Mehrere Schwachstellen | 2024-07-14T22:00:00.000+00:00 | 2025-06-16T22:00:00.000+00:00 |
| wid-sec-w-2023-2552 | Grub2: Mehrere Schwachstellen ermöglichen Codeausführung | 2023-10-03T22:00:00.000+00:00 | 2025-06-16T22:00:00.000+00:00 |
| wid-sec-w-2023-0748 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-03-26T22:00:00.000+00:00 | 2025-06-16T22:00:00.000+00:00 |
| wid-sec-w-2022-1823 | Linux Kernel: Mehrere Schwachstellen | 2022-10-23T22:00:00.000+00:00 | 2025-06-16T22:00:00.000+00:00 |
| wid-sec-w-2022-1812 | Linux Kernel: Mehrere Schwachstellen | 2022-10-20T22:00:00.000+00:00 | 2025-06-16T22:00:00.000+00:00 |
| wid-sec-w-2025-1329 | OTRS: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-06-15T22:00:00.000+00:00 | 2025-06-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1327 | Grafana: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-15T22:00:00.000+00:00 | 2025-06-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1274 | Microsoft Developer Tools: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-15T22:00:00.000+00:00 |
| wid-sec-w-2025-0626 | Red Hat Enterprise Linux (libxslt): Schwachstelle ermöglicht Codeausführung oder Manipulation von Dateien | 2025-03-24T23:00:00.000+00:00 | 2025-06-15T22:00:00.000+00:00 |
| wid-sec-w-2025-0294 | libtasn1: Schwachstelle ermöglicht Denial of Service | 2025-02-06T23:00:00.000+00:00 | 2025-06-15T22:00:00.000+00:00 |
| wid-sec-w-2025-0218 | MIT Kerberos: Schwachstelle ermöglicht Denial of Service | 2025-01-29T23:00:00.000+00:00 | 2025-06-15T22:00:00.000+00:00 |
| wid-sec-w-2024-2033 | Red Hat Enterprise Linux (CPython): Schwachstelle ermöglicht Manipulation von Dateien | 2024-09-02T22:00:00.000+00:00 | 2025-06-15T22:00:00.000+00:00 |
| wid-sec-w-2024-0880 | less: Schwachstelle ermöglicht Codeausführung | 2024-04-14T22:00:00.000+00:00 | 2025-06-15T22:00:00.000+00:00 |
| wid-sec-w-2023-3043 | Bluetooth Spezifikation: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-11-30T23:00:00.000+00:00 | 2025-06-15T22:00:00.000+00:00 |
| wid-sec-w-2023-2810 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-11-01T23:00:00.000+00:00 | 2025-06-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1324 | xwiki: Mehrere Schwachstellen | 2025-06-12T22:00:00.000+00:00 | 2025-06-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1322 | GIMP: Schwachstelle ermöglicht Denial of Service und potenziell Codeausführung | 2025-06-12T22:00:00.000+00:00 | 2025-06-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1320 | Tenable Security Nessus: Mehrere Schwachstellen | 2025-06-12T22:00:00.000+00:00 | 2025-06-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1317 | xwiki: Schwachstelle ermöglicht SQL Injection | 2025-06-12T22:00:00.000+00:00 | 2025-06-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1316 | Dell integrated Dell Remote Access Controller: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-12T22:00:00.000+00:00 | 2025-06-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1273 | Perl: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-09T22:00:00.000+00:00 | 2025-06-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1097 | Mozilla Firefox / Thunderbird: Mehrere Schwachstellen | 2025-05-18T22:00:00.000+00:00 | 2025-06-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1000 | VMware Tools: Schwachstelle ermöglicht Manipulation von Dateien | 2025-05-11T22:00:00.000+00:00 | 2025-06-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0986 | PostgreSQL: Schwachstelle ermöglicht Denial of Service | 2025-05-08T22:00:00.000+00:00 | 2025-06-12T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:0766 | Red Hat Security Advisory: OpenShift Container Platform 4.15.0 security update | 2024-02-28T08:10:56+00:00 | 2026-02-24T23:06:21+00:00 |
| rhsa-2024:0789 | Red Hat Security Advisory: Red Hat Build of Apache Camel 4.0 for Quarkus 3.2 release (RHBQ 3.2.10.Final) | 2024-02-12T16:02:02+00:00 | 2026-02-24T23:06:20+00:00 |
| rhsa-2024:0628 | Red Hat Security Advisory: libssh security update | 2024-01-31T08:48:54+00:00 | 2026-02-24T23:06:18+00:00 |
| rhsa-2024:0499 | Red Hat Security Advisory: libssh security update | 2024-01-25T15:36:48+00:00 | 2026-02-24T23:06:18+00:00 |
| rhsa-2024:0625 | Red Hat Security Advisory: libssh security update | 2024-01-31T08:36:02+00:00 | 2026-02-24T23:06:17+00:00 |
| rhsa-2024:0606 | Red Hat Security Advisory: openssh security update | 2024-01-30T14:59:23+00:00 | 2026-02-24T23:06:17+00:00 |
| rhsa-2024:0594 | Red Hat Security Advisory: openssh security update | 2024-01-30T14:13:55+00:00 | 2026-02-24T23:06:15+00:00 |
| rhsa-2024:0538 | Red Hat Security Advisory: libssh security update | 2024-01-29T11:50:44+00:00 | 2026-02-24T23:06:15+00:00 |
| rhsa-2024:0455 | Red Hat Security Advisory: openssh security update | 2024-01-25T09:21:45+00:00 | 2026-02-24T23:06:12+00:00 |
| rhsa-2024:0429 | Red Hat Security Advisory: openssh security update | 2024-01-25T08:14:09+00:00 | 2026-02-24T23:06:09+00:00 |
| rhsa-2024:0041 | Red Hat Security Advisory: OpenShift Container Platform 4.16.0 bug fix and security update | 2024-06-27T11:23:01+00:00 | 2026-02-24T23:06:05+00:00 |
| rhsa-2024:0040 | Red Hat Security Advisory: OpenShift Container Platform 4.16.0 security and extras update | 2024-06-27T10:52:21+00:00 | 2026-02-24T23:06:04+00:00 |
| rhsa-2023:7201 | Red Hat Security Advisory: OpenShift Container Platform 4.15.0 packages and security update | 2024-02-27T22:34:13+00:00 | 2026-02-24T23:06:02+00:00 |
| rhsa-2023:7198 | Red Hat Security Advisory: OpenShift Container Platform 4.15.0 bug fix and security update | 2024-02-27T20:49:10+00:00 | 2026-02-24T23:06:02+00:00 |
| rhsa-2023:7197 | Red Hat Security Advisory: OpenShift Container Platform 4.15.0 security and extras update | 2024-02-27T19:47:37+00:00 | 2026-02-24T23:06:01+00:00 |
| rhba-2024:1136 | Red Hat Bug Fix Advisory: podman bug fix update | 2024-03-05T20:05:51+00:00 | 2026-02-24T23:06:00+00:00 |
| rhba-2024:1127 | Red Hat Bug Fix Advisory: libssh bug fix update | 2024-03-05T18:22:05+00:00 | 2026-02-24T23:05:57+00:00 |
| rhsa-2024:5077 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2024-08-07T10:58:53+00:00 | 2026-02-24T23:05:53+00:00 |
| rhsa-2024:4893 | Red Hat Security Advisory: rhc-worker-script security update | 2024-07-29T00:19:42+00:00 | 2026-02-24T23:05:52+00:00 |
| rhsa-2024:3781 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 2024-06-10T18:41:58+00:00 | 2026-02-24T23:05:52+00:00 |
| rhsa-2024:4850 | Red Hat Security Advisory: OpenShift Container Platform 4.15.24 bug fix and security update | 2024-07-31T00:28:34+00:00 | 2026-02-24T23:05:50+00:00 |
| rhsa-2024:4159 | Red Hat Security Advisory: OpenShift Container Platform 4.16.1 packages and security update | 2024-07-03T11:45:54+00:00 | 2026-02-24T23:05:50+00:00 |
| rhsa-2024:7725 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.5 | 2024-10-07T09:24:53+00:00 | 2026-02-24T23:05:49+00:00 |
| rhsa-2024:4520 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.16 security and bug fix update | 2024-07-11T17:32:34+00:00 | 2026-02-24T23:05:49+00:00 |
| rhsa-2024:3831 | Red Hat Security Advisory: containernetworking-plugins security and bug fix update | 2024-06-11T19:48:32+00:00 | 2026-02-24T23:05:46+00:00 |
| rhsa-2024:3621 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.2.0 operator/operand containers update | 2024-06-05T05:15:15+00:00 | 2026-02-24T23:05:45+00:00 |
| rhsa-2024:3316 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | 2024-05-23T06:39:32+00:00 | 2026-02-24T23:05:44+00:00 |
| rhsa-2024:3830 | Red Hat Security Advisory: gvisor-tap-vsock security and bug fix update | 2024-06-11T19:54:52+00:00 | 2026-02-24T23:05:43+00:00 |
| rhsa-2024:3827 | Red Hat Security Advisory: buildah security and bug fix update | 2024-06-11T20:07:13+00:00 | 2026-02-24T23:05:43+00:00 |
| rhsa-2024:3826 | Red Hat Security Advisory: podman security and bug fix update | 2024-06-11T19:55:42+00:00 | 2026-02-24T23:05:37+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-193-07 | Siemens SIMATIC and SIMIT | 2024-07-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-165-13 | Siemens SINEC Traffic Analyzer | 2024-06-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-348-11 | Siemens SINUMERIK | 2023-12-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-348-04 | Siemens LOGO! and SIPLUS LOGO! | 2023-12-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-331-01 | Delta Electronics InfraSuite Device Master | 2023-11-28T07:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-264-02 | Siemens Spectrum Power 7 | 2023-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-257-05 | Siemens SIMATIC IPCs | 2023-09-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-257-03 | Siemans QMS Automotive | 2023-09-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-257-02 | Siemens Parasolid | 2023-09-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-222-10 | Siemens SICAM TOOLBOX II | 2023-08-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-222-09 | Siemens SIMATIC | 2023-08-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-222-07 | Siemens SIMATIC | 2023-08-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-222-05 | Siemens RUGGEDCOM CROSSBOW | 2023-08-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-222-04 | ​Siemens Software Center | 2023-08-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-222-03 | ​Siemens JT Open, JT Utilities, and Parasolid | 2023-08-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-222-01 | Siemens Solid Edge, JT2Go, and Teamcenter Visualization | 2023-08-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-194-04 | Siemens SIMATIC MV500 Devices | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-194-03 | Siemens SIMATIC CN 4100 | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-194-02 | Siemens SiPass Integrated | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-194-01 | Siemens RUGGEDCOM ROX | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-166-14 | Siemens Teamcenter Visualization and JT2Go | 2023-06-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-166-07 | Siemens SIMATIC WinCC V7 | 2023-06-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-166-04 | Siemens SIMOTION | 2023-06-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-166-03 | Siemens SICAM Q200 Devices | 2023-06-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-131-06 | Siemens SCALANCE LPE9403 | 2023-05-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-131-05 | Siemens SINEC NMS Third-Party | 2023-05-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-131-04 | Siemens SIMATIC Cloud Connect 7 | 2023-05-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-12 | Siemens Polarion ALM | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-11 | Siemens Teamcenter Visualization and JT2Go | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-103-10 | Siemens Industrial Products | 2023-04-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ssh-excpt-dos-FzOBQTnk | Cisco IOS and IOS XE Software SSH Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-sdwan-avc-nddsgb8 | Cisco Software-Defined Application Visibility and Control on Cisco vManage Authentication Bypass Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-sdwan-avc-NddSGB8 | Cisco Software-Defined Application Visibility and Control on Cisco vManage Authentication Bypass Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-sdavc-za5fpxx2 | Cisco Software-Defined Application Visibility and Control on Cisco vManage Static Username and Password Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-sdavc-ZA5fpXX2 | Cisco Software-Defined Application Visibility and Control on Cisco vManage Static Username and Password Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-mpls-dos-ab4oul3 | Cisco IOS XE Software for Catalyst Switches MPLS Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-mpls-dos-Ab4OUL3 | Cisco IOS XE Software for Catalyst Switches MPLS Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-cip-dos-9rtbklt9 | Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-cip-dos-9rTbKLt9 | Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-6vpe-dos-tjbtf5zv | Cisco IOS XE Software IPv6 VPN over MPLS Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-iosxe-6vpe-dos-tJBtf5Zv | Cisco IOS XE Software IPv6 VPN over MPLS Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ios-xe-cat-verify-d4neqa6q | Cisco IOS XE Software for Catalyst 9200 Series Switches Arbitrary Code Execution Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ios-xe-cat-verify-D4NEQA6q | Cisco IOS XE Software for Catalyst 9200 Series Switches Arbitrary Code Execution Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ewc-priv-esc-nderyltk | Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ewc-priv-esc-nderYLtK | Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-cwlc-snmpidv-rnyyqzuz | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Information Disclosure Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-cwlc-snmpidv-rnyyQzUZ | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Information Disclosure Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-c9800-mob-dos-342yac6j | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Mobility Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-c9800-mob-dos-342YAc6J | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Mobility Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-arb-file-delete-vb2rvcqv | Cisco SD-WAN Arbitrary File Deletion Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-arb-file-delete-VB2rVcQv | Cisco SD-WAN Arbitrary File Deletion Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ap-assoc-dos-egvqton8 | Cisco Catalyst 9100 Series Access Points Association Request Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-ap-assoc-dos-EgVqtON8 | Cisco Catalyst 9100 Series Access Points Association Request Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-alg-dos-ku9z8kfx | Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-alg-dos-KU9Z8kFX | Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service Vulnerability | 2022-09-28T16:00:00+00:00 | 2022-09-28T16:00:00+00:00 |
| cisco-sa-vmanage-msg-serv-aqtup7vs | Cisco SD-WAN vManage Software Unauthenticated Access to Messaging Services Vulnerability | 2022-09-07T16:00:00+00:00 | 2022-09-27T21:40:31+00:00 |
| cisco-sa-vmanage-msg-serv-AqTup7vs | Cisco SD-WAN vManage Software Unauthenticated Access to Messaging Services Vulnerability | 2022-09-07T16:00:00+00:00 | 2022-09-27T21:40:31+00:00 |
| cisco-sa-20180620-nxosbgp | Cisco NX-OS Software Border Gateway Protocol Denial of Service Vulnerability | 2018-06-20T16:00:00+00:00 | 2022-09-22T20:15:18+00:00 |
| cisco-sa-xr-cdp-wnalzvt2 | Cisco IOS XR Software Cisco Discovery Protocol Denial of Service Vulnerability | 2022-09-14T16:00:00+00:00 | 2022-09-14T16:00:00+00:00 |
| cisco-sa-xr-cdp-wnALzvT2 | Cisco IOS XR Software Cisco Discovery Protocol Denial of Service Vulnerability | 2022-09-14T16:00:00+00:00 | 2022-09-14T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-53089 | LoongArch: KVM: Mark hrtimer to expire in hard interrupt context | 2024-11-02T00:00:00.000Z | 2026-02-18T14:55:17.000Z |
| msrc_cve-2025-38022 | RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem | 2025-06-02T00:00:00.000Z | 2026-02-18T14:55:04.000Z |
| msrc_cve-2024-40961 | ipv6: prevent possible NULL deref in fib6_nh_init() | 2024-07-01T07:00:00.000Z | 2026-02-18T14:55:02.000Z |
| msrc_cve-2024-26656 | drm/amdgpu: fix use-after-free bug | 2024-04-02T07:00:00.000Z | 2026-02-18T14:54:41.000Z |
| msrc_cve-2024-53090 | afs: Fix lock recursion | 2024-11-02T00:00:00.000Z | 2026-02-18T14:54:38.000Z |
| msrc_cve-2023-52429 | dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes and crash because of a missing check for struct dm_ioctl.target_count. | 2024-02-02T08:00:00.000Z | 2026-02-18T14:54:38.000Z |
| msrc_cve-2025-38081 | spi-rockchip: Fix register out of bounds access | 2025-06-02T00:00:00.000Z | 2026-02-18T14:54:29.000Z |
| msrc_cve-2024-42102 | Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits() again" | 2024-07-01T07:00:00.000Z | 2026-02-18T14:54:29.000Z |
| msrc_cve-2024-47693 | IB/core: Fix ib_cache_setup_one error flow cleanup | 2024-10-01T07:00:00.000Z | 2026-02-18T14:54:04.000Z |
| msrc_cve-2024-53098 | drm/xe/ufence: Prefetch ufence addr to catch bogus address | 2024-11-02T00:00:00.000Z | 2026-02-18T14:54:03.000Z |
| msrc_cve-2024-26756 | md: Don't register sync_thread for reshape directly | 2024-04-02T07:00:00.000Z | 2026-02-18T14:53:55.000Z |
| msrc_cve-2025-38037 | vxlan: Annotate FDB data races | 2025-06-02T00:00:00.000Z | 2026-02-18T14:53:46.000Z |
| msrc_cve-2024-40995 | net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() | 2024-07-01T07:00:00.000Z | 2026-02-18T14:53:46.000Z |
| msrc_cve-2024-27319 | Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds Read as the ONNX_ASSERT and ONNX_ASSERTM functions have an off by one string copy. | 2024-02-02T08:00:00.000Z | 2026-02-18T14:53:37.000Z |
| msrc_cve-2022-1996 | Authorization Bypass Through User-Controlled Key in emicklei/go-restful | 2022-06-02T00:00:00.000Z | 2026-02-18T14:53:30.000Z |
| msrc_cve-2025-38066 | dm cache: prevent BUG_ON by blocking retries on failed device resumes | 2025-06-02T00:00:00.000Z | 2026-02-18T14:53:27.000Z |
| msrc_cve-2025-62291 | In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow. | 2026-01-02T00:00:00.000Z | 2026-02-18T14:53:23.000Z |
| msrc_cve-2024-47698 | drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error | 2024-10-01T07:00:00.000Z | 2026-02-18T14:53:20.000Z |
| msrc_cve-2024-40994 | ptp: fix integer overflow in max_vclocks_store | 2024-07-01T07:00:00.000Z | 2026-02-18T14:53:18.000Z |
| msrc_cve-2025-38011 | drm/amdgpu: csa unmap use uninterruptible lock | 2025-06-02T00:00:00.000Z | 2026-02-18T14:53:16.000Z |
| msrc_cve-2024-26718 | dm-crypt, dm-verity: disable tasklets | 2024-04-02T07:00:00.000Z | 2026-02-18T14:53:05.000Z |
| msrc_cve-2025-38072 | libnvdimm/labels: Fix divide error in nd_label_data_init() | 2025-06-02T00:00:00.000Z | 2026-02-18T14:53:00.000Z |
| msrc_cve-2023-5088 | Qemu: improper ide controller reset can lead to mbr overwrite | 2023-11-01T07:00:00.000Z | 2026-02-18T14:52:59.000Z |
| msrc_cve-2024-27318 | Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vulnerability occurs as a bypass for the patch added for CVE-2022-25882. | 2024-02-02T08:00:00.000Z | 2026-02-18T14:52:52.000Z |
| msrc_cve-2025-38040 | serial: mctrl_gpio: split disable_ms into sync and no_sync APIs | 2025-06-02T00:00:00.000Z | 2026-02-18T14:52:50.000Z |
| msrc_cve-2024-41001 | io_uring/sqpoll: work around a potential audit memory leak | 2024-07-01T07:00:00.000Z | 2026-02-18T14:52:49.000Z |
| msrc_cve-2022-49496 | media: mediatek: vcodec: prevent kernel crash when rmmod mtk-vcodec-dec.ko | 2025-02-02T00:00:00.000Z | 2026-02-18T14:52:39.000Z |
| msrc_cve-2024-49852 | scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() | 2024-10-01T07:00:00.000Z | 2026-02-18T14:52:36.000Z |
| msrc_cve-2023-3019 | Qemu: e1000e: heap use-after-free in e1000e_write_packet_to_guest() | 2023-07-01T07:00:00.000Z | 2026-02-18T14:52:31.000Z |
| msrc_cve-2025-38043 | firmware: arm_ffa: Set dma_mask for ffa devices | 2025-06-02T00:00:00.000Z | 2026-02-18T14:52:30.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15067-1 | ruby3.4-rubygem-rack-2.2-2.2.14-1.1 on GA media | 2025-05-08T00:00:00Z | 2025-05-08T00:00:00Z |
| opensuse-su-2025:15066-1 | ldap-proxy-0.1.0~90-1.1 on GA media | 2025-05-08T00:00:00Z | 2025-05-08T00:00:00Z |
| opensuse-su-2025:15065-1 | wasm-bindgen-0.2.97~0-3.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15064-1 | transfig-3.2.9a-2.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15063-1 | tealdeer-1.7.1-2.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15062-1 | sccache-0.9.1~22-2.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15061-1 | rustup-1.28.1~0-2.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15060-1 | kanidm-1.6.0~git0.d7ae0f336-1.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15059-1 | govulncheck-vulndb-0.0.20250506T153719-1.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15058-1 | go1.24-1.24.3-1.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15057-1 | cargo-c-0.10.3~git0.ee7d7ef-3.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15056-1 | 389-ds-3.1.2~git90.2bc7250be-1.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:0145-1 | Security update for chromium | 2025-05-06T06:05:59Z | 2025-05-06T06:05:59Z |
| opensuse-su-2025:15055-1 | weblate-5.11.3-1.1 on GA media | 2025-05-06T00:00:00Z | 2025-05-06T00:00:00Z |
| opensuse-su-2025:15054-1 | rclone-1.69.2-1.1 on GA media | 2025-05-05T00:00:00Z | 2025-05-05T00:00:00Z |
| opensuse-su-2025:15053-1 | java-1_8_0-openjdk-1.8.0.452-1.1 on GA media | 2025-05-05T00:00:00Z | 2025-05-05T00:00:00Z |
| opensuse-su-2025:15052-1 | grafana-11.5.4-1.1 on GA media | 2025-05-05T00:00:00Z | 2025-05-05T00:00:00Z |
| opensuse-su-2025:15051-1 | chromedriver-136.0.7103.59-1.1 on GA media | 2025-05-04T00:00:00Z | 2025-05-04T00:00:00Z |
| opensuse-su-2025:15050-1 | audiofile-0.3.6-15.1 on GA media | 2025-05-03T00:00:00Z | 2025-05-03T00:00:00Z |
| opensuse-su-2025:15049-1 | tomcat10-10.1.40-1.1 on GA media | 2025-05-02T00:00:00Z | 2025-05-02T00:00:00Z |
| opensuse-su-2025:15048-1 | tomcat-9.0.104-1.1 on GA media | 2025-05-02T00:00:00Z | 2025-05-02T00:00:00Z |
| opensuse-su-2025:15047-1 | hauler-1.2.4-1.1 on GA media | 2025-05-02T00:00:00Z | 2025-05-02T00:00:00Z |
| opensuse-su-2025:15046-1 | docker-28.1.1_ce-16.1 on GA media | 2025-05-02T00:00:00Z | 2025-05-02T00:00:00Z |
| opensuse-su-2025:15045-1 | MozillaFirefox-138.0-1.1 on GA media | 2025-05-02T00:00:00Z | 2025-05-02T00:00:00Z |
| opensuse-su-2025:15044-1 | libsoup-2_4-1-2.74.3-9.1 on GA media | 2025-05-01T00:00:00Z | 2025-05-01T00:00:00Z |
| opensuse-su-2025:15043-1 | libsoup-3_0-0-3.6.5-3.1 on GA media | 2025-05-01T00:00:00Z | 2025-05-01T00:00:00Z |
| opensuse-su-2025:15042-1 | MozillaThunderbird-128.10.0-1.1 on GA media | 2025-05-01T00:00:00Z | 2025-05-01T00:00:00Z |
| opensuse-su-2025:0139-1 | Security update for libjxl | 2025-04-30T12:01:35Z | 2025-04-30T12:01:35Z |
| opensuse-su-2025:15041-1 | golang-github-prometheus-node_exporter-1.9.1-2.1 on GA media | 2025-04-30T00:00:00Z | 2025-04-30T00:00:00Z |
| opensuse-su-2025:15040-1 | firefox-esr-128.10.0-1.1 on GA media | 2025-04-30T00:00:00Z | 2025-04-30T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-357 | Heap-buffer-overflow in flac__analyze_frame | 2023-05-01T14:01:05.606039Z | 2023-05-01T14:01:05.606339Z |
| osv-2023-142 | Heap-buffer-overflow in pdf14_preserve_backdrop | 2023-03-03T13:02:19.918280Z | 2023-04-30T14:24:04.617671Z |
| osv-2023-350 | UNKNOWN READ in cli_html_normalise | 2023-04-29T14:01:02.900884Z | 2023-04-30T14:20:30.195844Z |
| osv-2022-802 | Heap-use-after-free in UA_Server_networkCallback | 2022-08-29T00:02:04.585826Z | 2023-04-29T14:17:55.891692Z |
| osv-2023-79 | Heap-buffer-overflow in H5O__fsinfo_decode | 2023-02-18T13:01:01.580923Z | 2023-04-27T14:30:07.165171Z |
| osv-2023-316 | Segv on unknown address in dwg_ref_get_object | 2023-04-15T14:02:19.562348Z | 2023-04-26T14:15:55.803644Z |
| osv-2023-344 | Heap-buffer-overflow in tok_get_normal_mode | 2023-04-25T14:01:18.715805Z | 2023-04-25T14:01:18.716085Z |
| osv-2023-56 | Heap-buffer-overflow in git_oid_raw_cmp | 2023-02-07T13:00:10.989656Z | 2023-04-24T14:22:48.200282Z |
| osv-2023-342 | Heap-use-after-free in ih264_inter_pred_luma_vert_ssse3 | 2023-04-24T14:02:30.818849Z | 2023-04-24T14:02:30.819120Z |
| osv-2023-321 | Heap-use-after-free in ucl_hash_func | 2023-04-17T14:02:19.313369Z | 2023-04-22T14:12:41.755116Z |
| osv-2022-1261 | UNKNOWN WRITE in void std::__1::allocator_traits<std::__1::allocator<wabt::interp::HandlerDesc> > | 2022-12-13T13:01:10.970571Z | 2023-04-22T14:12:13.057968Z |
| osv-2023-337 | Heap-buffer-overflow in PyBytes_FromStringAndSize | 2023-04-22T14:02:16.429774Z | 2023-04-22T14:02:16.430016Z |
| osv-2023-335 | Security exception in org.json.JSONArray.writeTo | 2023-04-22T14:00:41.470858Z | 2023-04-22T14:00:41.471103Z |
| osv-2023-334 | Heap-buffer-overflow in unicode_decode_utf8 | 2023-04-22T14:00:15.547819Z | 2023-04-22T14:00:15.548065Z |
| osv-2023-312 | UNKNOWN READ in udev_rule_parse_value | 2023-04-14T14:02:26.223630Z | 2023-04-22T05:58:14.572688Z |
| osv-2023-310 | UNKNOWN READ in memdup_suffix0 | 2023-04-13T14:02:21.435674Z | 2023-04-22T05:58:14.572688Z |
| osv-2023-309 | UNKNOWN READ in fmemopen_unlocked | 2023-04-13T14:02:20.584809Z | 2023-04-22T05:58:14.572688Z |
| osv-2023-308 | UNKNOWN READ in memdup | 2023-04-13T14:02:13.551148Z | 2023-04-22T05:58:14.572688Z |
| osv-2023-305 | UNKNOWN READ in page_size | 2023-04-13T14:01:51.011233Z | 2023-04-22T05:58:14.572688Z |
| osv-2023-304 | UNKNOWN READ in _hashmap_free | 2023-04-13T14:01:33.310424Z | 2023-04-22T05:58:14.572688Z |
| osv-2023-301 | UNKNOWN READ in sd_event_default | 2023-04-13T14:00:16.210750Z | 2023-04-22T05:58:14.572688Z |
| osv-2023-300 | UNKNOWN READ in sd_event_new | 2023-04-13T14:00:09.823407Z | 2023-04-22T05:58:14.572688Z |
| osv-2023-299 | UNKNOWN READ in log_set_max_level | 2023-04-13T14:00:09.121565Z | 2023-04-22T05:58:14.572688Z |
| osv-2023-327 | Heap-double-free in HashMgr::~HashMgr | 2023-04-19T14:02:23.673618Z | 2023-04-21T14:16:34.114513Z |
| osv-2023-333 | Heap-buffer-overflow in ih264d_get_bits_h264 | 2023-04-21T14:00:45.626123Z | 2023-04-21T14:00:45.626363Z |
| osv-2023-332 | Heap-buffer-overflow in RegionGeometry_Polygon::parse | 2023-04-21T14:00:12.631857Z | 2023-04-21T14:00:12.632090Z |
| osv-2020-902 | Index-out-of-bounds in QUnicodeTables::qGetProp | 2020-07-21T00:00:16.344765Z | 2023-04-21T01:16:49.636521Z |
| osv-2020-769 | Heap-buffer-overflow in perfetto::trace_processor::ClockTracker::ConvertSlowpath | 2020-07-10T00:00:21.254899Z | 2023-04-20T22:59:35.504666Z |
| osv-2022-943 | UNKNOWN WRITE in perfetto::trace_processor::TrackEventParser::ParseTrackDescriptor | 2022-09-24T00:00:47.318199Z | 2023-04-20T22:58:12.414397Z |
| osv-2022-331 | Stack-buffer-overflow in void unwindstack::Symbols::BuildRemapTable<Elf64_Sym> | 2022-04-11T00:00:39.202876Z | 2023-04-20T22:56:13.048149Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2023-6386 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-02-07T07:28:12.605Z | 2025-08-06T06:08:07.957Z |
| bit-gitlab-2023-6195 | Server-Side Request Forgery (SSRF) in GitLab | 2025-02-01T07:29:24.815Z | 2025-08-06T06:08:07.957Z |
| bit-vault-2025-6037 | Vault Certificate Auth Method Did Not Validate Common Name For Non-CA Certificates | 2025-08-05T08:53:05.016Z | 2025-08-05T09:07:53.274Z |
| bit-vault-2025-6015 | Vault Login MFA Bypass of Rate Limiting and TOTP Code Reuse | 2025-08-05T08:53:03.218Z | 2025-08-05T09:07:53.274Z |
| bit-vault-2025-6014 | Vault TOTP Secrets Engine Code Reuse | 2025-08-05T08:53:01.354Z | 2025-08-05T09:07:53.274Z |
| bit-vault-2025-6011 | Timing Side-Channel in Vault’s Userpass Auth Method | 2025-08-05T08:52:59.512Z | 2025-08-05T09:07:53.274Z |
| bit-vault-2025-6004 | Vault Userpass and LDAP User Lockout Bypass | 2025-08-05T08:52:57.711Z | 2025-08-05T09:07:53.274Z |
| bit-vault-2025-6000 | Arbitrary Remote Code Execution via Plugin Catalog Abuse | 2025-08-05T08:52:55.970Z | 2025-08-05T09:07:53.274Z |
| bit-vault-2025-5999 | Vault Root Namespace Operator May Elevate Token Privileges | 2025-08-05T08:52:54.433Z | 2025-08-05T09:07:53.274Z |
| bit-vault-2024-9180 | Vault Operators in Root Namespace May Elevate Their Privileges | 2024-10-13T19:17:50.102Z | 2025-08-05T09:07:53.274Z |
| bit-vault-2024-8365 | Vault Leaks AppRole Client Tokens And Accessor in Audit Log | 2024-09-04T07:26:12.647Z | 2025-08-05T09:07:53.274Z |
| bit-vault-2024-8185 | Vault Vulnerable to Denial of Service When Processing Raft Join Requests | 2024-11-02T07:20:15.411Z | 2025-08-05T09:07:53.274Z |
| bit-discourse-2025-53102 | Discourse's WebAuthn challenge isn't cleared from user session after authentication | 2025-07-31T08:44:37.045Z | 2025-07-31T09:12:45.664Z |
| bit-sqlite-2025-7458 | SQLite integer overflow in key info allocation may lead to information disclosure. | 2025-07-31T05:52:24.171Z | 2025-07-31T06:10:21.058Z |
| bit-gitlab-2025-7001 | Insufficient Granularity of Access Control in GitLab | 2025-07-29T06:06:36.622Z | 2025-07-29T06:07:59.028Z |
| bit-gitlab-2025-4976 | Exposure of Sensitive Information Due to Incompatible Policies in GitLab | 2025-07-29T06:06:17.064Z | 2025-07-29T06:07:59.028Z |
| bit-gitlab-2025-1299 | Missing Authorization in GitLab | 2025-07-29T06:05:26.308Z | 2025-07-29T06:07:59.028Z |
| bit-gitlab-2025-0765 | Incorrect Authorization in GitLab | 2025-07-29T06:05:06.878Z | 2025-07-29T06:07:59.028Z |
| bit-gitlab-2025-6948 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-07-16T08:36:38.309Z | 2025-07-26T15:05:50.024Z |
| bit-gdal-2025-29480 | 2025-04-16T07:10:31.241Z | 2025-07-24T06:06:56.663Z | |
| bit-wordpress-2025-41240 | 2025-07-23T14:00:00.000Z | 2025-07-23T14:00:00.000Z | |
| bit-drupal-2025-41240 | 2025-07-23T14:00:00.000Z | 2025-07-23T14:00:00.000Z | |
| bit-appsmith-2025-41240 | 2025-07-23T14:00:00.000Z | 2025-07-23T14:00:00.000Z | |
| bit-node-2025-23083 | 2025-01-27T07:15:43.637Z | 2025-07-23T06:06:57.881Z | |
| bit-grafana-2025-6197 | 2025-07-22T05:41:23.514Z | 2025-07-22T06:07:25.512Z | |
| bit-grafana-2025-6023 | 2025-07-22T05:41:22.082Z | 2025-07-22T06:07:25.512Z | |
| bit-grafana-2025-3415 | 2025-07-22T05:41:15.588Z | 2025-07-22T06:07:25.512Z | |
| bit-node-2025-23090 | 2025-01-27T07:15:14.518Z | 2025-07-19T06:08:14.411Z | |
| bit-pytorch-2024-48063 | 2025-07-16T08:07:39.762Z | 2025-07-16T08:37:34.844Z | |
| bit-parse-2025-53364 | Parse Server exposes the data schema via GraphQL API | 2025-07-16T08:08:21.164Z | 2025-07-16T08:37:34.844Z |
| ID | Description | Updated |
|---|---|---|
| var-202206-1428 | In addition to the c_rehash shell command injection identified in CVE-2022-1292, further … | 2024-07-23T19:47:22.503000Z |
| var-201211-0369 | Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS … | 2024-07-23T19:47:22.569000Z |
| var-201006-1153 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2024-07-23T19:46:40.492000Z |
| var-201912-0626 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T19:46:39.270000Z |
| var-200608-0034 | Integer overflow in ImageIO for Apple Mac OS X 10.4.7 allows user-assisted attackers to c… | 2024-07-23T19:46:35.450000Z |
| var-201912-0479 | A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, Sa… | 2024-07-23T19:46:31.211000Z |
| var-201511-0087 | The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression e… | 2024-07-23T19:46:31.147000Z |
| var-201912-0627 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T19:46:30.625000Z |
| var-201711-0923 | There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL b… | 2024-07-23T19:46:29.715000Z |
| var-201912-0596 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T19:46:28.733000Z |
| var-201310-0362 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, J… | 2024-07-23T19:46:28.410000Z |
| var-202202-0009 | An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.09.11, 5.1 before 05.17.… | 2024-07-23T19:45:56.033000Z |
| var-201203-0192 | Google Chrome before 17.0.963.65 does not properly perform a cast of an unspecified varia… | 2024-07-23T19:45:54.997000Z |
| var-201306-0259 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T19:45:43.310000Z |
| var-201501-0442 | OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce cer… | 2024-07-23T19:45:42.984000Z |
| var-202201-0499 | Heap-based Buffer Overflow in vim/vim prior to 8.2. vim Exists in an out-of-bounds write … | 2024-07-23T19:45:35.957000Z |
| var-201412-0519 | The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j … | 2024-07-23T19:45:35.004000Z |
| var-201201-0259 | Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash value… | 2024-07-23T19:45:33.833000Z |
| var-201007-0329 | Multiple use-after-free vulnerabilities in WebKit in Apple Safari before 5.0.1 on Mac OS … | 2024-07-23T19:45:26.271000Z |
| var-201904-0743 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T19:45:25.313000Z |
| var-200609-1344 | The FTP server in Apple Mac OS X 10.4.8 and earlier, when FTP Access is enabled, will cra… | 2024-07-23T19:45:25.246000Z |
| var-202202-0163 | In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_m… | 2024-07-23T19:45:24.516000Z |
| var-200608-0037 | The Download Validation in LaunchServices for Apple Mac OS X 10.4.7 can identify certain … | 2024-07-23T19:45:17.247000Z |
| var-201205-0246 | sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI… | 2024-07-23T19:45:16.206000Z |
| var-200608-0055 | WebKit in Apple Mac OS X 10.3.9 and 10.4.7 allows remote attackers to cause a denial of s… | 2024-07-23T19:45:16.429000Z |
| var-201607-0235 | Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52… | 2024-07-23T19:45:15.361000Z |
| var-202308-2021 | .NET and Visual Studio Denial of Service Vulnerability. 9) - aarch64, ppc64le, s390x, x86… | 2024-07-23T19:44:50.831000Z |
| var-202302-1621 | Apache Commons FileUpload before 1.5 does not limit the number of request parts to be pro… | 2024-07-23T19:44:50.669000Z |
| var-201903-0437 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T19:44:50.891000Z |
| var-201107-0102 | Off-by-one error in libxml in Apple Safari before 5.0.6 allows remote attackers to execut… | 2024-07-23T19:44:50.334000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2019-000005 | The installers of UNLHA32.DLL, UNARJ32.DLL and LHMelting may insecurely load Dynamic Link Libraries | 2019-01-31T15:35+09:00 | 2019-08-28T12:08+09:00 |
| jvndb-2019-000007 | OpenAM (Open Source Edition) vulnerable to open redirect | 2019-02-06T15:45+09:00 | 2019-08-28T11:00+09:00 |
| jvndb-2018-000132 | Multiple vulnerabilities in Toshiba Lighting & Technology Corporation Home gateway | 2018-12-19T15:20+09:00 | 2019-08-28T10:45+09:00 |
| jvndb-2018-000133 | cordova-plugin-ionic-webview vulnerable to path traversal | 2018-12-21T14:17+09:00 | 2019-08-28T10:04+09:00 |
| jvndb-2018-000125 | The installer of MARKET SPEED may insecurely load Dynamic Link Libraries | 2018-11-28T17:27+09:00 | 2019-08-28T10:01+09:00 |
| jvndb-2019-000001 | WordPress plugin "spam-byebye" vulnerable to cross-site scripting | 2019-01-10T15:45+09:00 | 2019-08-28T09:54+09:00 |
| jvndb-2018-000092 | Multiple vulnerabilities in INplc | 2018-09-07T16:49+09:00 | 2019-08-28T09:51+09:00 |
| jvndb-2018-000127 | EC-CUBE vulnerable to open redirect | 2018-11-28T17:24+09:00 | 2019-08-28T09:42+09:00 |
| jvndb-2018-000118 | The installer of Windows10 Fall Creators Update Modify module for Security Measures tool may insecurely load Dynamic Link Libraries | 2018-11-09T16:13+09:00 | 2019-08-27T18:03+09:00 |
| jvndb-2018-000093 | Multiple script injection vulnerabilities in multiple Yamaha network devices | 2018-08-29T18:01+09:00 | 2019-08-27T17:53+09:00 |
| jvndb-2018-000122 | Multiple vulnerabilities in Panasonic BN-SDWBP3 | 2019-06-28T18:28+09:00 | 2019-08-27T17:46+09:00 |
| jvndb-2018-000134 | PgpoolAdmin fails to restrict access permissions | 2018-12-21T14:10+09:00 | 2019-08-27T17:41+09:00 |
| jvndb-2018-000100 | +Message App fails to verify SSL server certificates | 2018-09-27T16:52+09:00 | 2019-08-27T17:22+09:00 |
| jvndb-2018-000124 | Multiple vulnerabilities in RICOH Interactive Whiteboard | 2018-11-27T15:26+09:00 | 2019-08-27T17:01+09:00 |
| jvndb-2018-000076 | Multiple vulnerabilities in Aterm W300P | 2018-07-12T15:04+09:00 | 2019-08-27T16:56+09:00 |
| jvndb-2018-000130 | Cybozu Garoon access restriction bypass vulnerability | 2018-12-10T14:14+09:00 | 2019-08-27T16:54+09:00 |
| jvndb-2018-009387 | Mizuho Bank Mizuho Direct App for Android fails to verify SSL server certificates | 2018-11-19T15:44+09:00 | 2019-08-27T16:48+09:00 |
| jvndb-2018-000136 | Installer of Mapping Tool may insecurely load Dynamic Link Libraries | 2018-12-25T16:18+09:00 | 2019-08-27T16:36+09:00 |
| jvndb-2018-000115 | WordPress plugin "Event Calendar WD" vulnerable to cross-site scripting | 2018-11-02T14:56+09:00 | 2019-08-27T15:15+09:00 |
| jvndb-2018-000135 | WordPress plugin "Google XML Sitemaps" vulnerable to cross-site scripting | 2018-12-25T16:19+09:00 | 2019-08-27T15:12+09:00 |
| jvndb-2018-000137 | GROWI vulnerable to cross-site scripting | 2018-12-26T16:36+09:00 | 2019-08-27T15:07+09:00 |
| jvndb-2018-000077 | Multiple vulnerabilities in Aterm HC100RC | 2018-07-12T15:04+09:00 | 2019-08-27T13:52+09:00 |
| jvndb-2018-000075 | Multiple OS command injection vulnerabilities in Aterm WG1200HP | 2018-07-12T15:04+09:00 | 2019-08-27T13:44+09:00 |
| jvndb-2018-000119 | Cybozu Mailwise vulnerable to directory traversal | 2018-11-14T15:34+09:00 | 2019-08-27T13:37+09:00 |
| jvndb-2018-000120 | Multiple directory traversal vulnerabilities in Cybozu Office | 2018-11-14T15:38+09:00 | 2019-08-27T12:28+09:00 |
| jvndb-2018-000121 | Cybozu Dezie vulnerable to directory traversal | 2018-11-14T15:42+09:00 | 2019-08-27T12:25+09:00 |
| jvndb-2018-000126 | Multiple vulnerabilities in Cybozu Remote Service | 2018-12-10T14:26+09:00 | 2019-08-27T11:48+09:00 |
| jvndb-2018-000129 | Multiple vulnerabilities in i-FILTER | 2018-12-07T14:30+09:00 | 2019-08-27T11:45+09:00 |
| jvndb-2018-000117 | Multiple vulnerabilities in WordPress plugin "LearnPress" | 2018-11-09T16:13+09:00 | 2019-08-27T11:35+09:00 |
| jvndb-2018-000131 | Multiple vulnerabilities in Aterm WF1200CR and Aterm WG1200CR | 2018-12-14T14:53+09:00 | 2019-08-27T11:33+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:03575-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) | 2025-10-12T15:04:11Z | 2025-10-12T15:04:11Z |
| suse-su-2025:03572-1 | Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7) | 2025-10-12T13:33:30Z | 2025-10-12T13:33:30Z |
| suse-su-2025:03571-1 | Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) | 2025-10-12T11:33:33Z | 2025-10-12T11:33:33Z |
| suse-su-2025:03569-1 | Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6) | 2025-10-12T10:04:07Z | 2025-10-12T10:04:07Z |
| suse-su-2025:03568-1 | Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6) | 2025-10-12T08:33:33Z | 2025-10-12T08:33:33Z |
| suse-su-2025:03567-1 | Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6) | 2025-10-12T08:04:03Z | 2025-10-12T08:04:03Z |
| suse-su-2025:03566-1 | Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) | 2025-10-12T07:04:09Z | 2025-10-12T07:04:09Z |
| suse-su-2025:03563-1 | Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) | 2025-10-12T04:33:28Z | 2025-10-12T04:33:28Z |
| suse-su-2025:03561-1 | Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5) | 2025-10-12T03:04:45Z | 2025-10-12T03:04:45Z |
| suse-su-2025:03559-1 | Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP5) | 2025-10-12T01:04:07Z | 2025-10-12T01:04:07Z |
| suse-su-2025:03562-1 | Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5) | 2025-10-11T22:33:45Z | 2025-10-11T22:33:45Z |
| suse-su-2025:03557-1 | Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5) | 2025-10-11T22:33:38Z | 2025-10-11T22:33:38Z |
| suse-su-2025:03555-1 | Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5) | 2025-10-11T20:33:39Z | 2025-10-11T20:33:39Z |
| suse-su-2025:03554-1 | Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5) | 2025-10-11T18:33:41Z | 2025-10-11T18:33:41Z |
| suse-su-2025:03553-1 | Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5) | 2025-10-11T18:33:34Z | 2025-10-11T18:33:34Z |
| suse-su-2025:03552-1 | Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP4) | 2025-10-11T16:04:03Z | 2025-10-11T16:04:03Z |
| suse-su-2025:03551-1 | Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP4) | 2025-10-11T16:03:56Z | 2025-10-11T16:03:56Z |
| suse-su-2025:03550-1 | Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4) | 2025-10-11T07:04:07Z | 2025-10-11T07:04:07Z |
| suse-su-2025:03548-1 | Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4) | 2025-10-11T04:04:15Z | 2025-10-11T04:04:15Z |
| suse-su-2025:03547-1 | Security update for go1.25 | 2025-10-11T01:22:18Z | 2025-10-11T01:22:18Z |
| suse-su-2025:03546-1 | Security update for openssl-3 | 2025-10-11T01:21:37Z | 2025-10-11T01:21:37Z |
| suse-su-2025:03545-1 | Security update for docker-stable | 2025-10-11T01:20:50Z | 2025-10-11T01:20:50Z |
| suse-su-2025:03543-1 | Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4) | 2025-10-10T23:33:44Z | 2025-10-10T23:33:44Z |
| suse-su-2025:03541-1 | Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP4) | 2025-10-10T20:33:43Z | 2025-10-10T20:33:43Z |
| suse-su-2025:03540-1 | Security update for docker-stable | 2025-10-10T19:04:02Z | 2025-10-10T19:04:02Z |
| suse-su-2025:03539-1 | Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4) | 2025-10-10T18:33:52Z | 2025-10-10T18:33:52Z |
| suse-su-2025:03538-1 | Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) | 2025-10-10T18:03:53Z | 2025-10-10T18:03:53Z |
| suse-su-2025:03537-1 | Security update for expat | 2025-10-10T15:21:54Z | 2025-10-10T15:21:54Z |
| suse-su-2025:03536-1 | Security update for expat | 2025-10-10T15:20:27Z | 2025-10-10T15:20:27Z |
| suse-su-2025:03535-1 | Security update for open-vm-tools | 2025-10-10T15:15:12Z | 2025-10-10T15:15:12Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-00001 | WordPress插件Appointment Booking Calendar信息泄露漏洞 | 2025-12-25 | 2026-01-04 |
| cnvd-2025-31567 | D-Link DAP-2622堆栈缓冲区溢出远程代码执行漏洞(CNVD-2025-31567) | 2023-08-28 | 2025-12-31 |
| cnvd-2025-31566 | D-Link DAP-2622栈缓冲区溢出远程代码执行漏洞(CNVD-2025-31566) | 2023-08-28 | 2025-12-31 |
| cnvd-2025-31565 | D-Link DAP-2622栈缓冲区溢出远程代码执行漏洞(CNVD-2025-31565) | 2023-08-28 | 2025-12-31 |
| cnvd-2025-31564 | D-Link DAP-2622堆栈缓冲区溢出远程代码执行漏洞 | 2023-08-28 | 2025-12-31 |
| cnvd-2025-31563 | D-Link DAP-2622栈缓冲区溢出远程代码执行漏洞 | 2023-10-07 | 2025-12-31 |
| cnvd-2025-31562 | D-Link DIR-2640堆栈缓冲区溢出远程代码执行漏洞 | 2024-07-12 | 2025-12-31 |
| cnvd-2025-31561 | D-Link DIR-2640身份验证绕过漏洞 | 2024-07-12 | 2025-12-31 |
| cnvd-2025-31560 | D-Link DIR-2640命令注入远程代码执行漏洞 | 2024-07-12 | 2025-12-31 |
| cnvd-2025-31559 | D-Link DAP-2622硬编码凭据身份验证绕过漏洞 | 2024-07-12 | 2025-12-31 |
| cnvd-2025-31558 | D-Link DAP-2622命令注入远程代码执行漏洞 | 2024-08-13 | 2025-12-31 |
| cnvd-2025-31568 | D-Link DIR-882 sub_477AA0函数堆栈缓冲区溢出漏洞 | 2024-01-25 | 2025-12-30 |
| cnvd-2025-31556 | Online Nurse Hiring System edit-nurse.php文件SQL注入漏洞 | 2025-05-07 | 2025-12-30 |
| cnvd-2025-31555 | IBM Security Verify Information Queue权限提升漏洞 | 2025-09-12 | 2025-12-30 |
| cnvd-2025-31554 | IBM Security Verify Information Queue拒绝服务漏洞 | 2025-09-12 | 2025-12-30 |
| cnvd-2025-31553 | IBM Transformation Extender Advanced访问控制不当漏洞 | 2025-10-21 | 2025-12-30 |
| cnvd-2025-31552 | IBM Transformation Extender Advanced注销后未使会话失效漏洞 | 2025-10-21 | 2025-12-30 |
| cnvd-2025-31551 | IBM Transformation Extender Advanced弱口令漏洞 | 2025-10-21 | 2025-12-30 |
| cnvd-2025-31550 | IBM Cloud Pak for Business Automation所有权分配不当漏洞 | 2025-11-10 | 2025-12-30 |
| cnvd-2025-31549 | IBM Cloud Pak for Business Automation访问控制不当漏洞 | 2025-11-10 | 2025-12-30 |
| cnvd-2025-31548 | IBM Cloud Pak for Business Automation拒绝服务漏洞 | 2025-11-10 | 2025-12-30 |
| cnvd-2025-31547 | IBM Aspera Orchestrator拒绝服务漏洞 | 2025-12-18 | 2025-12-30 |
| cnvd-2025-31546 | IBM Aspera Orchestrator未验证的密码更改漏洞 | 2025-12-18 | 2025-12-30 |
| cnvd-2025-31557 | Online Nurse Hiring System view-request.php文件SQL注入漏洞 | 2025-05-07 | 2025-12-29 |
| cnvd-2025-31482 | DELL Wyse ThinOS输入验证错误漏洞 | 2021-04-21 | 2025-12-29 |
| cnvd-2025-31481 | DELL Wyse ThinOS信息泄露漏洞(CNVD-2025-31481) | 2023-07-21 | 2025-12-29 |
| cnvd-2025-31480 | DELL Wyse ThinOS信息泄露漏洞(CNVD-2025-31480) | 2023-07-27 | 2025-12-29 |
| cnvd-2025-31479 | DELL Wyse ThinOS信息泄露漏洞 | 2023-07-27 | 2025-12-29 |
| cnvd-2025-31471 | Google Android竞争条件漏洞 | 2025-12-10 | 2025-12-29 |
| cnvd-2025-31470 | Google Android不安全默认设置漏洞 | 2025-12-10 | 2025-12-29 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0751 | Multiples vulnérabilités dans les produits VMware | 2025-09-03T00:00:00.000000 | 2025-09-03T00:00:00.000000 |
| CERTFR-2025-AVI-0750 | Multiples vulnérabilités dans Google Android | 2025-09-03T00:00:00.000000 | 2025-09-03T00:00:00.000000 |
| CERTFR-2025-AVI-0749 | Multiples vulnérabilités dans Google Chrome | 2025-09-03T00:00:00.000000 | 2025-09-03T00:00:00.000000 |
| certfr-2025-avi-0748 | Vulnérabilité dans les produits Liferay | 2025-09-02T00:00:00.000000 | 2025-09-02T00:00:00.000000 |
| CERTFR-2025-AVI-0748 | Vulnérabilité dans les produits Liferay | 2025-09-02T00:00:00.000000 | 2025-09-02T00:00:00.000000 |
| certfr-2025-avi-0747 | Multiples vulnérabilités dans les produits Qnap | 2025-09-01T00:00:00.000000 | 2025-09-01T00:00:00.000000 |
| CERTFR-2025-AVI-0747 | Multiples vulnérabilités dans les produits Qnap | 2025-09-01T00:00:00.000000 | 2025-09-01T00:00:00.000000 |
| certfr-2025-avi-0746 | Multiples vulnérabilités dans les produits IBM | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0745 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0744 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0743 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0742 | Vulnérabilité dans Microsoft Edge | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0741 | Vulnérabilité dans Wireshark | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0740 | Multiples vulnérabilités dans Tenable Security Center | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0739 | Multiples vulnérabilités dans Asterisk | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0738 | Multiples vulnérabilités dans les produits Elastic | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0746 | Multiples vulnérabilités dans les produits IBM | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0745 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0744 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0743 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0742 | Vulnérabilité dans Microsoft Edge | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0741 | Vulnérabilité dans Wireshark | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0740 | Multiples vulnérabilités dans Tenable Security Center | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0739 | Multiples vulnérabilités dans Asterisk | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| CERTFR-2025-AVI-0738 | Multiples vulnérabilités dans les produits Elastic | 2025-08-29T00:00:00.000000 | 2025-08-29T00:00:00.000000 |
| certfr-2025-avi-0737 | Multiples vulnérabilités dans les produits Cisco | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| certfr-2025-avi-0736 | Multiples vulnérabilités dans GitLab | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| certfr-2025-avi-0735 | Vulnérabilité dans GLPI | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| certfr-2025-avi-0734 | Vulnérabilité dans ISC Kea DHCP | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |
| certfr-2025-avi-0733 | Vulnérabilité dans Nagios XI | 2025-08-28T00:00:00.000000 | 2025-08-28T00:00:00.000000 |