Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-21256 |
8.8 (3.1)
|
GitHub Copilot and Visual Studio Remote Code Execution… |
Microsoft |
Microsoft Visual Studio 2022 version 17.14 |
2026-02-10T17:51:38.364Z | 2026-02-23T16:23:16.259Z |
| CVE-2026-21255 |
8.8 (3.1)
|
Windows Hyper-V Security Feature Bypass Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:38.926Z | 2026-02-23T16:23:16.862Z |
| CVE-2026-21261 |
5.5 (3.1)
|
Microsoft Excel Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:37.088Z | 2026-02-23T16:23:15.200Z |
| CVE-2026-21257 |
8 (3.1)
|
GitHub Copilot and Visual Studio Elevation of Privileg… |
Microsoft |
Microsoft Visual Studio 2022 version 17.14 |
2026-02-10T17:51:37.741Z | 2026-02-23T16:23:15.746Z |
| CVE-2026-21508 |
7 (3.1)
|
Windows Storage Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:36.479Z | 2026-02-23T16:23:14.672Z |
| CVE-2026-21516 |
8.8 (3.1)
|
GitHub Copilot for Jetbrains Remote Code Execution Vul… |
Microsoft |
GitHub Copilot Plugin for JetBrains IDEs |
2026-02-10T17:51:35.340Z | 2026-02-23T16:23:13.378Z |
| CVE-2026-21511 |
7.5 (3.1)
|
Microsoft Outlook Spoofing Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:35.908Z | 2026-02-23T16:23:13.926Z |
| CVE-2026-21525 |
6.2 (3.1)
|
Windows Remote Access Connection Manager Denial of Ser… |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:34.755Z | 2026-02-23T16:23:12.686Z |
| CVE-2026-21514 |
7.8 (3.1)
|
Microsoft Word Security Feature Bypass Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:34.153Z | 2026-02-23T16:23:12.138Z |
| CVE-2026-21529 |
5.7 (3.1)
|
Azure HDInsight Spoofing Vulnerability |
Microsoft |
Azure HDInsight |
2026-02-10T17:51:33.525Z | 2026-02-23T16:23:11.514Z |
| CVE-2026-21537 |
8.8 (3.1)
|
Microsoft Defender for Endpoint Linux Extension Remote… |
Microsoft |
Microsoft Defender for Endpoint for Linux |
2026-02-10T17:51:32.870Z | 2026-02-23T16:23:10.920Z |
| CVE-2026-21510 |
8.8 (3.1)
|
Windows Shell Security Feature Bypass Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:32.210Z | 2026-02-23T16:23:10.175Z |
| CVE-2026-21531 |
9.8 (3.1)
|
Azure SDK for Python Remote Code Execution Vulnerability |
Microsoft |
Azure AI Language Authoring |
2026-02-10T17:51:31.660Z | 2026-02-23T16:23:09.620Z |
| CVE-2026-21528 |
6.5 (3.1)
|
Azure IoT Explorer Information Disclosure Vulnerability |
Microsoft |
Azure IoT Explorer |
2026-02-10T17:51:30.773Z | 2026-02-23T16:23:09.005Z |
| CVE-2026-21527 |
6.5 (3.1)
|
Microsoft Exchange Server Spoofing Vulnerability |
Microsoft |
Microsoft Exchange Server 2016 Cumulative Update 23 |
2026-02-10T17:51:30.280Z | 2026-02-23T16:23:08.515Z |
| CVE-2026-0102 |
3.1 (3.1)
|
Microsoft Edge (Chromium-based) Defense in Depth Vulne… |
Microsoft |
Microsoft Edge (Chromium-based) |
2026-02-17T19:14:32.901Z | 2026-02-23T16:23:07.390Z |
| CVE-2026-21532 |
8.2 (3.1)
|
Azure Function Information Disclosure Vulnerability |
Microsoft |
Azure Functions |
2026-02-05T22:13:24.102Z | 2026-02-23T16:23:06.157Z |
| CVE-2026-21522 |
6.7 (3.1)
|
Microsoft ACI Confidential Containers Elevation of Pri… |
Microsoft |
Microsoft ACI Confidential Containers |
2026-02-10T17:51:29.618Z | 2026-02-23T16:23:06.698Z |
| CVE-2026-24302 |
8.6 (3.1)
|
Azure Arc Elevation of Privilege Vulnerability |
Microsoft |
Azure ARC |
2026-02-05T22:13:22.975Z | 2026-02-23T16:23:05.319Z |
| CVE-2026-24300 |
9.8 (3.1)
|
Azure Front Door Elevation of Privilege Vulnerability |
Microsoft |
Azure Front Door |
2026-02-05T22:13:25.676Z | 2026-02-23T16:23:03.725Z |
| CVE-2026-0391 |
6.5 (3.1)
|
Microsoft Edge (Chromium-based) for Android Spoofing V… |
Microsoft |
Microsoft Edge (Chromium-based) |
2026-02-05T22:13:26.387Z | 2026-02-23T16:23:03.121Z |
| CVE-2026-21513 |
8.8 (3.1)
|
MSHTML Framework Security Feature Bypass Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:26.733Z | 2026-02-23T16:23:02.450Z |
| CVE-2026-21533 |
7.8 (3.1)
|
Windows Remote Desktop Services Elevation of Privilege… |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:26.211Z | 2026-02-23T16:23:01.846Z |
| CVE-2026-21523 |
8 (3.1)
|
GitHub Copilot and Visual Studio Code Remote Code Exec… |
Microsoft |
Visual Studio Code |
2026-02-10T17:51:25.077Z | 2026-02-23T16:23:00.319Z |
| CVE-2026-21229 |
8 (3.1)
|
Power BI Remote Code Execution Vulnerability |
Microsoft |
Power BI Report Server |
2026-02-10T17:51:25.595Z | 2026-02-23T16:23:00.839Z |
| CVE-2026-23655 |
6.5 (3.1)
|
Microsoft ACI Confidential Containers Information Disc… |
Microsoft |
Microsoft ACI Confidential Containers |
2026-02-10T17:51:24.484Z | 2026-02-23T16:22:59.523Z |
| CVE-2026-21236 |
7.8 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:23.374Z | 2026-02-23T16:22:58.172Z |
| CVE-2026-21218 |
7.5 (3.1)
|
.NET Spoofing Vulnerability |
Microsoft |
.NET 10.0 |
2026-02-10T17:51:23.973Z | 2026-02-23T16:22:58.901Z |
| CVE-2026-21234 |
7 (3.1)
|
Windows Connected Devices Platform Service Elevation o… |
Microsoft |
Windows 10 Version 1809 |
2026-02-10T17:51:22.765Z | 2026-02-23T16:22:57.498Z |
| CVE-2026-21242 |
7 (3.1)
|
Windows Subsystem for Linux Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 21H2 |
2026-02-10T17:51:21.565Z | 2026-02-23T16:22:56.351Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2020-1169 |
7.8 (3.1)
|
Windows Runtime Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:09:03.000Z | 2024-08-04T06:25:01.238Z |
| CVE-2020-1167 |
7.8 (3.1)
|
Microsoft Graphics Components Remote Code Execution Vu… |
Microsoft |
Windows 10 Version 1803 |
2020-10-16T22:18:14.000Z | 2024-11-15T16:54:23.785Z |
| CVE-2020-1159 |
6.6 (3.1)
|
Windows Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1909 |
2020-09-11T17:09:03.000Z | 2024-08-04T06:25:01.215Z |
| CVE-2020-1152 |
5.8 (3.1)
|
Windows Win32k Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:02.000Z | 2024-08-04T06:25:01.287Z |
| CVE-2020-1146 |
6.6 (3.1)
|
Microsoft Store Runtime Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:02.000Z | 2024-08-04T06:25:01.291Z |
| CVE-2020-1133 |
5.5 (3.1)
|
Diagnostics Hub Standard Collector Elevation of Privil… |
Microsoft |
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) |
2020-09-11T17:09:01.000Z | 2024-08-04T06:25:01.292Z |
| CVE-2020-1130 |
6.6 (3.1)
|
Diagnostics Hub Standard Collector Elevation of Privil… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:01.000Z | 2024-08-04T06:25:01.223Z |
| CVE-2020-1129 |
8.8 (3.1)
|
Microsoft Windows Codecs Library Remote Code Execution… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:00.000Z | 2024-11-18T17:41:55.269Z |
| CVE-2020-1122 |
5.5 (3.1)
|
Windows Language Pack Installer Elevation of Privilege… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:09:00.000Z | 2024-08-04T06:25:01.245Z |
| CVE-2020-1119 |
5.5 (3.1)
|
Windows Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1909 |
2020-09-11T17:08:59.000Z | 2024-08-04T06:25:01.291Z |
| CVE-2020-1115 |
7.8 (3.1)
|
Windows Common Log File System Driver Elevation of Pri… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:59.000Z | 2024-08-04T06:25:01.077Z |
| CVE-2020-1098 |
7.8 (3.1)
|
Windows Shell Infrastructure Component Elevation of Pr… |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:08:58.000Z | 2024-08-04T06:25:01.095Z |
| CVE-2020-1097 |
6.5 (3.1)
|
Windows Graphics Component Information Disclosure Vuln… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:58.000Z | 2024-10-01T15:57:12.774Z |
| CVE-2020-1091 |
6.5 (3.1)
|
Windows Graphics Component Information Disclosure Vuln… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:57.000Z | 2024-08-04T06:25:00.934Z |
| CVE-2020-1083 |
5.5 (3.1)
|
Microsoft Graphics Component Information Disclosure Vu… |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:57.000Z | 2024-08-04T06:25:00.832Z |
| CVE-2020-1080 |
8.8 (3.1)
|
Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-10-16T22:18:13.000Z | 2024-08-04T06:25:01.083Z |
| CVE-2020-1074 |
7.8 (3.1)
|
Jet Database Engine Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:56.000Z | 2024-08-04T06:25:01.073Z |
| CVE-2020-1057 |
4.2 (3.1)
|
Scripting Engine Memory Corruption Vulnerability |
Microsoft |
ChakraCore |
2020-09-11T17:08:56.000Z | 2024-08-04T06:25:00.990Z |
| CVE-2020-1053 |
7.8 (3.1)
|
DirectX Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:08:55.000Z | 2024-08-04T06:25:01.093Z |
| CVE-2020-1052 |
7.8 (3.1)
|
Windows Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:08:55.000Z | 2024-08-04T06:25:00.978Z |
| CVE-2020-1047 |
7.8 (3.1)
|
Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-10-16T22:18:13.000Z | 2024-08-04T06:25:01.114Z |
| CVE-2020-1046 |
N/A
|
.NET Framework Remote Code Execution Vulnerability |
Microsoft |
Microsoft .NET Framework 3.5 |
2020-08-17T19:12:57.000Z | 2024-08-04T06:25:00.884Z |
| CVE-2020-1045 |
7.5 (3.1)
|
Microsoft ASP.NET Core Security Feature Bypass Vulnerability |
Microsoft |
ASP.NET Core 2.1 |
2020-09-11T00:00:00.000Z | 2024-11-18T16:25:38.621Z |
| CVE-2020-1044 |
4.3 (3.1)
|
SQL Server Reporting Services Security Feature Bypass … |
Microsoft |
SQL Server 2017 Reporting Services |
2020-09-11T17:08:54.000Z | 2024-08-04T06:25:00.771Z |
| CVE-2020-1039 |
7.8 (3.1)
|
Jet Database Engine Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:54.000Z | 2024-10-01T15:57:18.205Z |
| CVE-2020-1038 |
5.5 (3.1)
|
Windows Routing Utilities Denial of Service |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:53.000Z | 2024-08-04T06:25:00.671Z |
| CVE-2020-1034 |
6.8 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:53.000Z | 2024-08-04T06:25:01.282Z |
| CVE-2020-1033 |
4 (3.1)
|
Windows Kernel Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1803 |
2020-09-11T17:08:52.000Z | 2024-08-04T06:25:00.992Z |
| CVE-2020-1031 |
7.5 (3.1)
|
Windows DHCP Server Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:08:52.000Z | 2024-08-04T06:25:00.842Z |
| CVE-2020-1030 |
7.8 (3.1)
|
Windows Print Spooler Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 2004 |
2020-09-11T17:08:51.000Z | 2024-08-04T06:25:00.888Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2020-1129 | <p>A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library ha… | 2020-09-11T17:15:18.980 | 2026-02-23T18:23:38.927 |
| fkie_cve-2020-1122 | <p>An elevation of privilege vulnerability exists when the Windows Language Pack Installer improper… | 2020-09-11T17:15:18.917 | 2026-02-23T18:23:37.897 |
| fkie_cve-2020-1119 | <p>An information disclosure vulnerability exists when StartTileData.dll improperly handles objects… | 2020-09-11T17:15:18.870 | 2026-02-23T18:23:37.473 |
| fkie_cve-2020-1115 | <p>An elevation of privilege vulnerability exists when the <a href="https://technet.microsoft.com/l… | 2020-09-11T17:15:18.823 | 2026-02-23T18:23:36.483 |
| fkie_cve-2020-1098 | <p>An elevation of privilege vulnerability exists when the Shell infrastructure component improperl… | 2020-09-11T17:15:18.777 | 2026-02-23T18:23:33.650 |
| fkie_cve-2020-1097 | <p>An information disclosure vulnerability exists when the Windows GDI component improperly disclos… | 2020-09-11T17:15:18.713 | 2026-02-23T18:23:33.300 |
| fkie_cve-2020-1091 | <p>An information disclosure vulnerability exists when the Windows GDI component improperly disclos… | 2020-09-11T17:15:18.667 | 2026-02-23T18:23:32.110 |
| fkie_cve-2020-1083 | <p>An information disclosure vulnerability exists when the Microsoft Windows Graphics Component imp… | 2020-09-11T17:15:18.620 | 2026-02-23T18:23:30.480 |
| fkie_cve-2020-1080 | <p>An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to pr… | 2020-10-16T23:15:17.570 | 2026-02-23T18:23:29.823 |
| fkie_cve-2020-1074 | <p>A remote code execution vulnerability exists when the Windows Jet Database Engine improperly han… | 2020-09-11T17:15:18.557 | 2026-02-23T18:23:27.790 |
| fkie_cve-2020-1057 | <p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine han… | 2020-09-11T17:15:18.463 | 2026-02-23T18:23:17.813 |
| fkie_cve-2020-1053 | <p>An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory… | 2020-09-11T17:15:18.417 | 2026-02-23T18:23:15.290 |
| fkie_cve-2020-1052 | <p>An elevation of privilege vulnerability exists in the way that the ssdpsrv.dll handles objects i… | 2020-09-11T17:15:18.357 | 2026-02-23T18:23:09.233 |
| fkie_cve-2020-1047 | <p>An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to pr… | 2020-10-16T23:15:17.523 | 2026-02-23T18:23:08.323 |
| fkie_cve-2020-1046 | A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An atta… | 2020-08-17T19:15:14.083 | 2026-02-23T18:23:08.147 |
| fkie_cve-2020-1045 | <p>A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded … | 2020-09-11T17:15:18.307 | 2026-02-23T18:23:07.950 |
| fkie_cve-2020-1044 | <p>A security feature bypass vulnerability exists in SQL Server Reporting Services (SSRS) when the … | 2020-09-11T17:15:18.260 | 2026-02-23T18:23:07.817 |
| fkie_cve-2020-1039 | <p>A remote code execution vulnerability exists when the Windows Jet Database Engine improperly han… | 2020-09-11T17:15:18.200 | 2026-02-23T18:23:07.000 |
| fkie_cve-2020-1038 | <p>A denial of service vulnerability exists when Windows Routing Utilities improperly handles objec… | 2020-09-11T17:15:18.153 | 2026-02-23T18:23:06.480 |
| fkie_cve-2020-1034 | <p>An elevation of privilege vulnerability exists in the way that the Windows Kernel handles object… | 2020-09-11T17:15:18.107 | 2026-02-23T18:23:05.603 |
| fkie_cve-2020-1033 | <p>An information disclosure vulnerability exists when the Windows kernel improperly handles object… | 2020-09-11T17:15:18.057 | 2026-02-23T18:23:05.360 |
| fkie_cve-2020-1031 | <p>An information disclosure vulnerability exists in the way that the Windows Server DHCP service i… | 2020-09-11T17:15:17.997 | 2026-02-23T18:23:04.930 |
| fkie_cve-2020-1030 | <p>An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly… | 2020-09-11T17:15:17.950 | 2026-02-23T18:23:04.587 |
| fkie_cve-2020-1025 | An elevation of privilege vulnerability exists when Microsoft SharePoint Server and Skype for Busin… | 2020-07-14T23:15:11.447 | 2026-02-23T18:23:01.917 |
| fkie_cve-2020-1013 | <p>An elevation of privilege vulnerability exists when Microsoft Windows processes group policy upd… | 2020-09-11T17:15:17.857 | 2026-02-23T18:22:59.423 |
| fkie_cve-2020-1012 | <p>An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects i… | 2020-09-11T17:15:17.807 | 2026-02-23T18:22:59.233 |
| fkie_cve-2025-27550 | IBM Jazz Reporting Service could allow an authenticated user on the host network to obtain sensitiv… | 2026-02-04T21:15:57.753 | 2026-02-23T18:22:37.800 |
| fkie_cve-2026-26315 | go-ethereum (Geth) is a golang execution layer implementation of the Ethereum protocol. Prior to ve… | 2026-02-19T22:16:46.967 | 2026-02-23T18:21:52.770 |
| fkie_cve-2020-17023 | <p>A remote code execution vulnerability exists in Visual Studio Code when a user is tricked into o… | 2020-10-16T23:15:17.460 | 2026-02-23T18:21:42.607 |
| fkie_cve-2020-17022 | <p>A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library ha… | 2020-10-16T23:15:17.400 | 2026-02-23T18:21:42.437 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-fjf4-6f34-w64q |
3.8 (3.1)
|
Keycloak: Missing Check on Disabled Client for Docker Registry Protocol | 2026-02-19T18:31:51Z | 2026-02-19T22:06:37Z |
| ghsa-6c9j-x93c-rw6j |
4.3 (3.1)
|
OpenClaw safeBins file-existence oracle information disclosure | 2026-02-19T22:06:26Z | 2026-02-19T22:06:26Z |
| ghsa-4685-c5cp-vp95 |
3.6 (3.1)
|
OpenClaw safeBins stdin-only bypass via sort output and recursive grep flags | 2026-02-19T22:06:00Z | 2026-02-19T22:06:00Z |
| ghsa-fwxx-wv44-7qfg |
7.5 (3.1)
|
Spring Cloud Gateway Server Webflux is vulnerable to Expression Language Injection | 2025-10-16T15:30:43Z | 2026-02-19T22:00:41Z |
| ghsa-hfvx-25r5-qc3w |
7.6 (3.1)
|
Fabric.js Affected by Stored XSS via SVG Export | 2026-02-18T22:44:58Z | 2026-02-19T21:57:26Z |
| ghsa-5vv4-hvf7-2h46 |
8.8 (3.1)
|
Command Injection via Unsanitized `locate` Output in `versions()` — systeminformation | 2026-02-18T22:36:50Z | 2026-02-19T21:57:18Z |
| ghsa-689v-6xwf-5jf3 |
6.9 (4.0)
|
Go Ethereum affected by DoS via malicious p2p message | 2026-02-18T22:34:49Z | 2026-02-19T21:57:09Z |
| ghsa-9c88-49p5-5ggf |
8.4 (3.1)
|
Systeminformation has a Command Injection via unsanitized interface parameter in wifi.js retry path | 2026-02-18T21:51:26Z | 2026-02-19T21:57:02Z |
| ghsa-jmr7-xgp7-cmfj |
7.5 (3.1)
|
fast-xml-parser affected by DoS through entity expansion in DOCTYPE (no expansion limit) | 2026-02-17T21:30:10Z | 2026-02-19T21:56:54Z |
| ghsa-4chv-4c6w-w254 |
7.5 (3.1)
|
The rs-soroban-sdk #[contractimpl] macro calls inherent function instead of trait function when nam… | 2026-02-17T21:29:05Z | 2026-02-19T21:56:47Z |
| ghsa-9f29-v6mm-pw6w |
7.1 (4.0)
|
opa-envoy-plugin has an Authorization Bypass via Double-Slash Path Misinterpretation in input.parsed_path | 2026-02-18T15:25:04Z | 2026-02-19T21:56:34Z |
| ghsa-f5p9-j34q-pwcc |
7.0 (4.0)
|
emp3r0r Affected by Concurrent Map Access DoS (panic/crash) | 2026-02-17T21:27:58Z | 2026-02-19T21:56:27Z |
| ghsa-9p44-j4g5-cfx5 |
5.9 (3.1)
|
Trivy Action has a script injection via sourced env file in composite action | 2026-02-18T15:24:43Z | 2026-02-19T21:56:21Z |
| ghsa-wvr6-395c-5pxr |
8.8 (4.0)
|
CediPay Affected by Improper Input Validation in Payment Processing | 2026-02-12T17:04:50Z | 2026-02-19T21:56:14Z |
| ghsa-ppfx-73j5-fhxc |
6.5 (3.1)
|
Skill-scanner Unsecured Network Binding Vulnerability | 2026-02-17T18:55:39Z | 2026-02-19T21:56:06Z |
| ghsa-f6m7-39fm-3hwq |
|
Missing Authorization vulnerability in YayCommerce YayMail – WooCommerce Email Customizer yaymail a… | 2026-02-19T21:30:48Z | 2026-02-19T21:30:48Z |
| ghsa-4jg5-735x-q4x2 |
5.6 (4.0)
|
Buffer overflow in ovpn‑dco‑win version 2.8.0 allows local attackers to cause a system crash by sen… | 2026-02-19T21:30:48Z | 2026-02-19T21:30:48Z |
| ghsa-2fw7-qxr6-mwq7 |
9.8 (3.1)
9.3 (4.0)
|
RustFly 2.0.0 contains a command injection vulnerability in its remote UI control mechanism that ac… | 2026-02-19T21:30:48Z | 2026-02-19T21:30:48Z |
| ghsa-vp99-6r6x-6v3c |
4.3 (3.1)
5.3 (4.0)
|
GFI MailEssentials AI versions prior to 22.4 contain an arbitrary file existence enumeration vulner… | 2026-02-19T18:31:55Z | 2026-02-19T21:30:47Z |
| ghsa-pcxg-vcf2-rp56 |
4.3 (3.1)
5.3 (4.0)
|
GFI MailEssentials AI versions prior to 22.4 contain an arbitrary directory existence enumeration v… | 2026-02-19T21:30:47Z | 2026-02-19T21:30:47Z |
| ghsa-jg7m-pjj3-mqmq |
4.3 (3.1)
5.3 (4.0)
|
SPIP before 4.4.9 allows Blind Server-Side Request Forgery (SSRF) via syndicated sites in the priva… | 2026-02-19T21:30:47Z | 2026-02-19T21:30:47Z |
| ghsa-hxjp-v4qc-fcjg |
8.1 (3.1)
9.2 (4.0)
|
SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filte… | 2026-02-19T21:30:47Z | 2026-02-19T21:30:47Z |
| ghsa-fgj6-7f58-836m |
6.4 (3.1)
5.1 (4.0)
|
SPIP before 4.4.9 allows Stored Cross-Site Scripting (XSS) via syndicated sites in the private area… | 2026-02-19T21:30:47Z | 2026-02-19T21:30:47Z |
| ghsa-c33v-v6jp-566m |
5.4 (3.1)
4.8 (4.0)
|
SPIP before 4.4.9 allows Cross-Site Scripting (XSS) in the private area, complementing an incomplet… | 2026-02-19T21:30:47Z | 2026-02-19T21:30:47Z |
| ghsa-xwc9-vwhh-qfwc |
5.4 (3.1)
5.1 (4.0)
|
GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in… | 2026-02-19T18:31:55Z | 2026-02-19T21:30:46Z |
| ghsa-xjfr-756p-4phv |
5.4 (3.1)
5.1 (4.0)
|
GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in… | 2026-02-19T18:31:55Z | 2026-02-19T21:30:46Z |
| ghsa-wmpp-2v6j-mq33 |
5.4 (3.1)
5.1 (4.0)
|
GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in… | 2026-02-19T18:31:55Z | 2026-02-19T21:30:46Z |
| ghsa-wc8x-254r-w3mh |
7.5 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-02-19T18:31:53Z | 2026-02-19T21:30:46Z |
| ghsa-rrcr-4pq7-hrcc |
5.4 (3.1)
5.1 (4.0)
|
GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in… | 2026-02-19T18:31:55Z | 2026-02-19T21:30:46Z |
| ghsa-qxv5-rwp8-8gff |
5.4 (3.1)
5.1 (4.0)
|
GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in… | 2026-02-19T18:31:55Z | 2026-02-19T21:30:46Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-149 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding PNG images TensorF… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:29.163401Z |
| pysec-2022-148 |
|
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a use… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.987872Z |
| pysec-2022-147 |
|
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a den… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.843331Z |
| pysec-2022-146 |
|
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a den… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.710235Z |
| pysec-2022-145 |
|
Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in Tensor… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.561700Z |
| pysec-2022-144 |
|
Tensorflow is an Open Source Machine Learning Framework. During shape inference, TensorFl… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.435695Z |
| pysec-2022-143 |
|
Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in Tensor… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.283580Z |
| pysec-2022-142 |
|
Tensorflow is an Open Source Machine Learning Framework. If a graph node is invalid, Tens… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.101919Z |
| pysec-2022-141 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.968735Z |
| pysec-2022-140 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCo… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.816300Z |
| pysec-2022-139 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCo… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.680857Z |
| pysec-2022-138 |
|
Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's … | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.547711Z |
| pysec-2022-137 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp`… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.416732Z |
| pysec-2022-136 |
|
Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, TensorF… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.267952Z |
| pysec-2022-135 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from prot… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.136787Z |
| pysec-2022-134 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from prot… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.999978Z |
| pysec-2022-133 |
|
Tensorflow is an Open Source Machine Learning Framework. Multiple operations in TensorFlo… | tensorflow-gpu | 2022-02-03T13:15:00Z | 2022-03-09T00:18:26.852426Z |
| pysec-2022-132 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySp… | tensorflow-gpu | 2022-02-03T12:15:00Z | 2022-03-09T00:18:26.728990Z |
| pysec-2022-131 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*C… | tensorflow-gpu | 2022-02-03T12:15:00Z | 2022-03-09T00:18:26.570322Z |
| pysec-2022-130 |
|
Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a he… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.438942Z |
| pysec-2022-129 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial o… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.310749Z |
| pysec-2022-128 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a resource handle … | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.187094Z |
| pysec-2022-127 |
|
Tensorflow is an Open Source Machine Learning Framework. In multiple places, TensorFlow u… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.055433Z |
| pysec-2022-126 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` su… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.916972Z |
| pysec-2022-125 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.786755Z |
| pysec-2022-124 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.643457Z |
| pysec-2022-123 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.518342Z |
| pysec-2022-122 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.380350Z |
| pysec-2022-121 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.246505Z |
| pysec-2022-120 |
|
Tensorflow is an Open Source Machine Learning Framework. ### Impact An attacker can craft… | tensorflow-gpu | 2022-02-03T15:15:00Z | 2022-03-09T00:18:25.119172Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32950 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-23T05:02:10.453773Z |
| gsd-2024-32949 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.470315Z |
| gsd-2024-32948 | Missing Authorization vulnerability in Repute Infosystems ARMember.This issue affects ARM… | 2024-04-23T05:02:10.490887Z |
| gsd-2024-32947 | Cross-Site Request Forgery (CSRF) vulnerability in AlumniOnline Web Services LLC WP ADA C… | 2024-04-23T05:02:10.448626Z |
| gsd-2023-52721 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:01:35.589969Z |
| gsd-2023-52720 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:01:35.330143Z |
| gsd-2023-52719 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:01:35.384447Z |
| gsd-2024-4023 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-22T05:02:08.676402Z |
| gsd-2018-25101 | A vulnerability, which was classified as problematic, has been found in l2c2technologies … | 2024-04-21T05:02:45.593909Z |
| gsd-2024-4022 | A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up t… | 2024-04-21T05:02:03.520941Z |
| gsd-2024-4021 | A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up t… | 2024-04-21T05:02:03.524179Z |
| gsd-2024-4020 | A vulnerability was found in Tenda FH1206 1.2.0.8(8155) and classified as critical. This … | 2024-04-21T05:02:03.519205Z |
| gsd-2015-10132 | A vulnerability classified as problematic was found in Thimo Grauerholz WP-Spreadplugin u… | 2024-04-21T05:00:54.861505Z |
| gsd-2024-3998 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.160987Z |
| gsd-2024-3996 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.060075Z |
| gsd-2024-3994 | The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable t… | 2024-04-20T05:02:06.154525Z |
| gsd-2024-3993 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.066057Z |
| gsd-2024-3990 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.133590Z |
| gsd-2024-3985 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.139392Z |
| gsd-2024-3981 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.047097Z |
| gsd-2024-29223 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.608333Z |
| gsd-2024-29079 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.789437Z |
| gsd-2024-29077 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.706305Z |
| gsd-2024-27461 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.418108Z |
| gsd-2024-3999 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.798446Z |
| gsd-2024-3997 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.864650Z |
| gsd-2024-3995 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.859161Z |
| gsd-2024-3992 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.918291Z |
| gsd-2024-3991 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.870318Z |
| gsd-2024-3989 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.894049Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2026-421 | Malicious code in oce-freecoin (npm) | 2026-01-21T04:39:39Z | 2026-01-23T01:39:02Z |
| MAL-2026-420 | Malicious code in oce-components (npm) | 2026-01-21T04:39:39Z | 2026-01-23T01:39:02Z |
| MAL-2026-419 | Malicious code in oce-collaborate (npm) | 2026-01-21T04:39:39Z | 2026-01-23T01:39:02Z |
| MAL-2026-418 | Malicious code in nanoid-js (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:39:02Z |
| MAL-2026-395 | Malicious code in natateste (npm) | 2026-01-21T03:56:27Z | 2026-01-23T01:39:02Z |
| MAL-2026-394 | Malicious code in n8n-nodes-zl-vietts (npm) | 2026-01-21T03:58:08Z | 2026-01-23T01:39:02Z |
| MAL-2026-393 | Malicious code in manage-root (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:02Z |
| MAL-2026-374 | Malicious code in mised-discordjs-selfbot-v14 (npm) | 2026-01-20T07:54:05Z | 2026-01-23T01:39:02Z |
| MAL-2026-369 | Malicious code in mw-shared-utils (npm) | 2026-01-20T06:13:03Z | 2026-01-23T01:39:02Z |
| MAL-2026-368 | Malicious code in mw-proto-models (npm) | 2026-01-20T06:13:03Z | 2026-01-23T01:39:02Z |
| MAL-2026-344 | Malicious code in ofjaaah-security-lib (npm) | 2026-01-19T00:59:52Z | 2026-01-23T01:39:02Z |
| MAL-2026-343 | Malicious code in ofjaaah-internal-utils (npm) | 2026-01-19T00:59:52Z | 2026-01-23T01:39:02Z |
| MAL-2026-342 | Malicious code in ofjaaah-build-tools (npm) | 2026-01-19T00:59:52Z | 2026-01-23T01:39:02Z |
| MAL-2026-341 | Malicious code in ofjaaah-auth-module (npm) | 2026-01-19T00:59:52Z | 2026-01-23T01:39:02Z |
| MAL-2026-340 | Malicious code in libsignal-yazxzcode (npm) | 2026-01-19T00:46:52Z | 2026-01-23T01:39:02Z |
| MAL-2026-327 | Malicious code in mapkit-example-vanillajs (npm) | 2026-01-17T07:00:15Z | 2026-01-23T01:39:02Z |
| mal-2026-436 | Malicious code in jquery-ajaxchimp (npm) | 2026-01-21T07:13:50Z | 2026-01-23T01:39:01Z |
| mal-2026-417 | Malicious code in kanban-webcomponent (npm) | 2026-01-21T04:39:38Z | 2026-01-23T01:39:01Z |
| mal-2026-416 | Malicious code in hw-app-eth (npm) | 2026-01-21T04:34:17Z | 2026-01-23T01:39:01Z |
| mal-2026-392 | Malicious code in jsonwebauth (npm) | 2026-01-21T04:26:22Z | 2026-01-23T01:39:01Z |
| mal-2026-391 | Malicious code in internallib_v962 (npm) | 2026-01-21T04:28:02Z | 2026-01-23T01:39:01Z |
| mal-2026-390 | Malicious code in internallib_v325 (npm) | 2026-01-21T04:28:02Z | 2026-01-23T01:39:01Z |
| mal-2026-362 | Malicious code in health-check-node (npm) | 2026-01-20T03:55:11Z | 2026-01-23T01:39:01Z |
| mal-2026-339 | Malicious code in internallib_v355 (npm) | 2026-01-19T01:00:08Z | 2026-01-23T01:39:01Z |
| mal-2026-338 | Malicious code in internal-company-sdk (npm) | 2026-01-19T00:59:52Z | 2026-01-23T01:39:01Z |
| MAL-2026-436 | Malicious code in jquery-ajaxchimp (npm) | 2026-01-21T07:13:50Z | 2026-01-23T01:39:01Z |
| MAL-2026-417 | Malicious code in kanban-webcomponent (npm) | 2026-01-21T04:39:38Z | 2026-01-23T01:39:01Z |
| MAL-2026-416 | Malicious code in hw-app-eth (npm) | 2026-01-21T04:34:17Z | 2026-01-23T01:39:01Z |
| MAL-2026-392 | Malicious code in jsonwebauth (npm) | 2026-01-21T04:26:22Z | 2026-01-23T01:39:01Z |
| MAL-2026-391 | Malicious code in internallib_v962 (npm) | 2026-01-21T04:28:02Z | 2026-01-23T01:39:01Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1006 | Mattermost: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-05-12T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0931 | Red Hat Enterprise Linux (yelp): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-04T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0905 | Mattermost: Mehrere Schwachstellen | 2025-04-29T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0668 | Apple macOS: Mehrere Schwachstellen | 2025-03-31T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0663 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2025-03-31T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0430 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-02-23T23:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0257 | AMD Prozessor: Schwachstelle ermöglicht das Umgehen von Sicherheitsmaßnahmen | 2025-02-03T23:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-3487 | wget: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und Offenlegung von Informationen | 2024-11-18T23:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-3436 | GNOME: Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-3124 | Microsoft Entwicklerwerkzeuge: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2024-10-08T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1171 | OpenSSL: Schwachstelle ermöglicht Denial of Service | 2024-05-16T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-0280 | libxml2: Schwachstelle ermöglicht Denial of Service | 2024-02-04T23:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2023-0690 | cURL: Mehrere Schwachstellen | 2023-03-19T23:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2022-0929 | zlib: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-08-04T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2022-0005 | zlib: Schwachstelle ermöglicht Codeausführung | 2022-04-03T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2025-1303 | Perl (IBM AIX): Schwachstelle ermöglicht Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1302 | Kibana: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1299 | Apache CloudStack: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1297 | Mozilla Firefox: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1295 | Fortinet FortiOS und FortiProxy: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1294 | GeoServer: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1293 | IBM DataPower Gateway: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1292 | Trend Micro Apex Central: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1291 | Pixel Patchday Juni 2025: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1290 | Fortinet FortiOS, FortiProxy, FortiWeb: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1289 | Fortinet FortiClient EMS: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1288 | IBM Security Verify Access: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1287 | Adobe Creative Cloud Anwendungen: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1286 | Fortinet FortiClient Windows: Schwachstelle ermöglicht Manipulation | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1284 | Adobe Magento: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-06-10T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:1050 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.14 | 2025-02-05T08:56:35+00:00 | 2026-02-24T23:11:56+00:00 |
| rhsa-2025:1013 | Red Hat Security Advisory: RHSA: Submariner 0.19.2 - bug fix and enhancement update | 2025-02-04T18:36:21+00:00 | 2026-02-24T23:11:56+00:00 |
| rhsa-2025:0907 | Red Hat Security Advisory: ACS 4.6.2 enhancement and security update | 2025-02-03T22:40:53+00:00 | 2026-02-24T23:11:55+00:00 |
| rhsa-2025:0875 | Red Hat Security Advisory: OpenShift Container Platform 4.17.15 security and extras update | 2025-02-05T10:48:52+00:00 | 2026-02-24T23:11:55+00:00 |
| rhsa-2025:0905 | Red Hat Security Advisory: RHOAI 2.16.0 - Red Hat OpenShift AI | 2025-02-03T17:17:02+00:00 | 2026-02-24T23:11:54+00:00 |
| rhsa-2025:0840 | Red Hat Security Advisory: OpenShift Container Platform 4.14.46 security update | 2025-02-06T05:05:41+00:00 | 2026-02-24T23:11:52+00:00 |
| rhsa-2025:0831 | Red Hat Security Advisory: OpenShift Container Platform 4.12.72 security and extras update | 2025-02-06T00:36:22+00:00 | 2026-02-24T23:11:51+00:00 |
| rhsa-2025:0827 | Red Hat Security Advisory: OpenShift Container Platform 4.16.33 security and extras update | 2025-02-06T01:28:28+00:00 | 2026-02-24T23:11:51+00:00 |
| rhsa-2025:0754 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.2 | 2025-01-28T06:43:08+00:00 | 2026-02-24T23:11:51+00:00 |
| rhsa-2025:0821 | Red Hat Security Advisory: RHSA: Submariner 0.17.5 - bug and security fixes | 2025-01-29T20:29:11+00:00 | 2026-02-24T23:11:50+00:00 |
| rhsa-2025:0775 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17.3 Bug Fix Update | 2025-01-28T19:16:43+00:00 | 2026-02-24T23:11:49+00:00 |
| rhsa-2025:0783 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.6 Bug fix update | 2025-01-28T20:26:27+00:00 | 2026-02-24T23:11:48+00:00 |
| rhsa-2025:0715 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.1 | 2025-01-27T17:03:08+00:00 | 2026-02-24T23:11:47+00:00 |
| rhsa-2025:0678 | Red Hat Security Advisory: RHSA: Submariner 0.16.8 - bug and security fixes | 2025-01-23T20:25:51+00:00 | 2026-02-24T23:11:46+00:00 |
| rhsa-2025:0650 | Red Hat Security Advisory: OpenShift Container Platform 4.16.32 bug fix and security update | 2025-01-29T00:56:20+00:00 | 2026-02-24T23:11:45+00:00 |
| rhsa-2025:0646 | Red Hat Security Advisory: OpenShift Container Platform 4.15.44 security update | 2025-01-29T19:06:58+00:00 | 2026-02-24T23:11:44+00:00 |
| rhsa-2025:0384 | Red Hat Security Advisory: RHSA: Submariner 0.18.4 - bug and security fixes | 2025-01-16T18:46:52+00:00 | 2026-02-24T23:11:38+00:00 |
| rhsa-2025:0364 | Red Hat Security Advisory: OpenShift Container Platform 4.14.45 bug fix and security update | 2025-01-22T03:22:29+00:00 | 2026-02-24T23:11:37+00:00 |
| rhsa-2025:0224 | Red Hat Security Advisory: Red Hat build of Cryostat security update | 2025-01-09T17:48:40+00:00 | 2026-02-24T23:11:36+00:00 |
| rhsa-2025:0140 | Red Hat Security Advisory: OpenShift Container Platform 4.16.30 bug fix and security update | 2025-01-15T00:51:07+00:00 | 2026-02-24T23:11:36+00:00 |
| rhsa-2025:0121 | Red Hat Security Advisory: OpenShift Container Platform 4.15.43 bug fix and security update | 2025-01-15T02:21:47+00:00 | 2026-02-24T23:11:35+00:00 |
| rhsa-2025:0115 | Red Hat Security Advisory: OpenShift Container Platform 4.17.12 bug fix and security update | 2025-01-14T09:52:44+00:00 | 2026-02-24T23:11:34+00:00 |
| rhsa-2025:0048 | Red Hat Security Advisory: OpenShift Virtualization 4.17.3 Images | 2025-01-07T21:44:39+00:00 | 2026-02-24T23:11:34+00:00 |
| rhba-2025:0409 | Red Hat Bug Fix Advisory: Red Hat Developer Hub 1.4.1 release. | 2025-01-20T12:54:15+00:00 | 2026-02-24T23:11:33+00:00 |
| rhsa-2024:7944 | Red Hat Security Advisory: OpenShift Container Platform 4.16.17 security update | 2024-10-16T16:51:49+00:00 | 2026-02-24T23:10:58+00:00 |
| rhsa-2024:7174 | Red Hat Security Advisory: OpenShift Container Platform 4.16.15 bug fix and security update | 2024-10-02T05:27:44+00:00 | 2026-02-24T23:10:52+00:00 |
| rhsa-2026:0845 | Red Hat Security Advisory: brotli security update | 2026-01-20T12:13:35+00:00 | 2026-02-24T23:10:49+00:00 |
| rhsa-2026:0008 | Red Hat Security Advisory: brotli security update | 2026-01-05T01:26:08+00:00 | 2026-02-24T23:10:49+00:00 |
| rhsa-2025:1673 | Red Hat Security Advisory: mysql:8.0 security update | 2025-02-19T11:10:11+00:00 | 2026-02-24T23:10:48+00:00 |
| rhsa-2025:1671 | Red Hat Security Advisory: mysql security update | 2025-02-19T10:31:41+00:00 | 2026-02-24T23:10:47+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-132-09 | Siemens JT2GO and Teamcenter Visualization | 2022-05-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-132-07 | Siemens SICAM P850 and SICAM P855 | 2022-05-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-17 | Siemens Mendix | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-15 | Siemens Simcenter Femap | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-14 | Siemens SIMATIC STEP 7 (TIA Portal) | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-11 | Siemens SIMATIC Energy Manager | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-10 | Siemens SICAM A8000 | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-09 | Siemens SCALANCE X-300 Switches | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-08 | Siemens SCALANCE W1700 | 2022-04-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-13 | Siemens Mendix | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-11 | Siemens SINUMERIK MC | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-10 | Siemens Simcenter Femap | 2022-02-17T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-09 | Siemens SINEC INS | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-08 | Siemens Polarion ALM | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-07 | Siemens Climatix POL909 | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-06 | Siemens COMOS | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-05 | Siemens Simcenter STAR-CCM+ Viewer | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-04 | Siemens SINEMA Mendix Forgot Password Appstore | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-069-02 | Siemens SIMOTICS CONNECT 400 | 2022-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-041-06 | Siemens Spectrum Power 4 | 2022-02-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-041-04 | Siemens SINEMA Remote Connect Server | 2022-02-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-041-03 | Siemens Simcenter Femap | 2022-02-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-041-01 | Siemens SIMATIC Industrial Products (Update A) | 2022-02-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-013-06 | Siemens SICAM PQ Analyzer | 2022-01-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-013-05 | Siemens COMOS Web (Update A) | 2022-01-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-013-04 | Siemens SIPROTEC 5 Devices | 2022-01-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-013-03 | Siemens Energy PLUSCONTROL | 2022-01-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-013-02 | Siemens SICAM A8000 | 2022-01-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-350-20 | Siemens JTTK and JT Utilities | 2021-12-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-350-19 | Siemens SiPass Integrated | 2021-12-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-sb-mult-vuln-CbVp4SUR | Cisco Small Business RV Series Routers Vulnerabilities | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-ise-pwd-wh64ahqf | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-ise-pwd-WH64AhQF | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-cucm-file-delete-n2vpmone | Cisco Unified Communications Manager Arbitrary File Deletion Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-cucm-file-delete-N2VPmOnE | Cisco Unified Communications Manager Arbitrary File Deletion Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-broadworks-xss-xbhfr4cd | Cisco BroadWorks Application Delivery Platform Software Cross-Site Scripting Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-broadworks-xss-xbhfr4cD | Cisco BroadWorks Application Delivery Platform Software Cross-Site Scripting Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-sma-esa-auth-bypass-66kecxqd | Cisco Email Security Appliance and Cisco Secure Email and Web Manager External Authentication Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-08-02T13:07:47+00:00 |
| cisco-sa-sma-esa-auth-bypass-66kEcxQD | Cisco Email Security Appliance and Cisco Secure Email and Web Manager External Authentication Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-08-02T13:07:47+00:00 |
| cisco-sa-sb-rv-rce-overflow-yghbyak | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-sb-rv-rce-overflow-ygHByAK | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-mprvesc-emhdgxe5 | Cisco Nexus Dashboard Privilege Escalation Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-mprvesc-EMhDgXe5 | Cisco Nexus Dashboard Privilege Escalation Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-mhcvuln-vpsbpj9y | Cisco Nexus Dashboard Unauthorized Access Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-mhcvuln-vpsBPJ9y | Cisco Nexus Dashboard Unauthorized Access Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-afw-2mt9tb99 | Cisco Nexus Dashboard Arbitrary File Write Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-afw-2MT9tb99 | Cisco Nexus Dashboard Arbitrary File Write Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-nd-tlsvld-tbaqlp3n | Cisco Nexus Dashboard SSL Certificate Validation Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-nd-tlsvld-TbAQLp3N | Cisco Nexus Dashboard SSL Certificate Validation Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ise-lifetime-pwd-gpcs76mb | Cisco Identity Services Engine Administrator Password Lifetime Expiration Issue | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ise-lifetime-pwd-GpCs76mb | Cisco Identity Services Engine Administrator Password Lifetime Expiration Issue | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-iotcc-xss-wqrclrvd | Cisco IoT Control Center Cross-Site Scripting Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-iotcc-xss-WQrCLRVd | Cisco IoT Control Center Cross-Site Scripting Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ise-saml-nuukmpf9 | Cisco Identity Services Engine Authentication Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-07-13T14:42:14+00:00 |
| cisco-sa-ISE-SAML-nuukMPf9 | Cisco Identity Services Engine Authentication Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-07-13T14:42:14+00:00 |
| cisco-sa-ucm-timing-jvbhecok | Cisco Unified Communications Products Timing Attack Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-ucm-timing-JVbHECOK | Cisco Unified Communications Products Timing Attack Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-ucm-file-read-qgjhec3a | Cisco Unified Communications Manager Arbitrary File Read Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-ucm-file-read-qgjhEc3A | Cisco Unified Communications Manager Arbitrary File Read Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| cisco-sa-ucm-access-dmkvv2dy | Cisco Unified Communications Products Access Control Vulnerability | 2022-07-06T16:00:00+00:00 | 2022-07-06T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-50276 | net: vertexcom: mse102x: Fix possible double free of TX skb | 2024-11-02T00:00:00.000Z | 2026-02-19T01:09:15.000Z |
| msrc_cve-2022-48174 | There is a stack overflow vulnerability in ash.c:6030 in busybox before 1.35. In the environment of Internet of Vehicles, this vulnerability can be executed from command to arbitrary code execution. | 2023-08-01T00:00:00.000Z | 2026-02-19T01:09:13.000Z |
| msrc_cve-2024-42156 | s390/pkey: Wipe copies of clear-key structures on failure | 2024-07-01T07:00:00.000Z | 2026-02-19T01:09:06.000Z |
| msrc_cve-2021-20194 | There is a vulnerability in the linux kernel versions higher than 5.2 (if kernel compiled with config params CONFIG_BPF_SYSCALL=y CONFIG_BPF=y CONFIG_CGROUPS=y CONFIG_CGROUP_BPF=y CONFIG_HARDENED_USERCOPY not set and BPF hook to getsockopt is registered). As result of BPF execution the local user can trigger bug in __cgroup_bpf_run_filter_getsockopt() function that can lead to heap overflow (because of non-hardened usercopy). The impact of attack could be deny of service or possibly privileges escalation. | 2021-02-02T00:00:00.000Z | 2026-02-19T01:09:06.000Z |
| msrc_cve-2024-50282 | drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() | 2024-11-02T00:00:00.000Z | 2026-02-19T01:09:04.000Z |
| msrc_cve-2025-23419 | TLS Session Resumption Vulnerability | 2025-02-02T00:00:00.000Z | 2026-02-19T01:08:54.000Z |
| msrc_cve-2020-27815 | A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality integrity as well as system availability. | 2021-05-02T00:00:00.000Z | 2026-02-19T01:08:54.000Z |
| msrc_cve-2024-41965 | Vim < v9.1.0648 has a double-free in dialog_changed() | 2024-08-02T00:00:00.000Z | 2026-02-19T01:08:51.000Z |
| msrc_cve-2024-50158 | RDMA/bnxt_re: Fix out of bound check | 2024-11-02T00:00:00.000Z | 2026-02-19T01:08:45.000Z |
| msrc_cve-2020-25672 | A memory leak vulnerability was found in Linux kernel in llcp_sock_connect | 2021-05-02T00:00:00.000Z | 2026-02-19T01:08:42.000Z |
| msrc_cve-2024-42157 | s390/pkey: Wipe sensitive data on failure | 2024-07-01T07:00:00.000Z | 2026-02-19T01:08:33.000Z |
| msrc_cve-2019-3887 | A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that L1 guest could access L0's APIC register values via L2 guest when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue. | 2019-04-02T00:00:00.000Z | 2026-02-19T01:08:30.000Z |
| msrc_cve-2024-50162 | bpf: devmap: provide rxq after redirect | 2024-11-02T00:00:00.000Z | 2026-02-19T01:08:24.000Z |
| msrc_cve-2025-0167 | netrc and default credential leak | 2025-02-02T00:00:00.000Z | 2026-02-19T01:08:19.000Z |
| msrc_cve-2019-3819 | A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ("root") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable. | 2019-01-02T00:00:00.000Z | 2026-02-19T01:08:18.000Z |
| msrc_cve-2024-42160 | f2fs: check validation of fault attrs in f2fs_build_fault_attr() | 2024-07-01T07:00:00.000Z | 2026-02-19T01:08:14.000Z |
| msrc_cve-2024-50287 | media: v4l2-tpg: prevent the risk of a division by zero | 2024-11-02T00:00:00.000Z | 2026-02-19T01:08:07.000Z |
| msrc_cve-2019-3016 | In a Linux KVM guest that has PV TLB enabled a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out. | 2020-01-02T00:00:00.000Z | 2026-02-19T01:08:06.000Z |
| msrc_cve-2024-6923 | Email header injection due to unquoted newlines | 2024-08-02T00:00:00.000Z | 2026-02-19T01:07:57.000Z |
| msrc_cve-2010-4563 | The Linux kernel when using IPv6 allows remote attackers to determine whether a host is sniffing the network by sending an ICMPv6 Echo Request to a multicast address and determining whether an Echo Reply is sent as demonstrated by thcping. | 2012-02-02T00:00:00.000Z | 2026-02-19T01:07:54.000Z |
| msrc_cve-2024-11234 | Configuring a proxy in a stream context might allow for CRLF injection in URIs | 2024-11-02T00:00:00.000Z | 2026-02-19T01:07:50.000Z |
| msrc_cve-2010-0298 | The x86 emulator in KVM 83 does not use the Current Privilege Level (CPL) and I/O Privilege Level (IOPL) in determining the memory access available to CPL3 code which allows guest OS users to cause a denial of service (guest OS crash) or gain privileges on the guest OS by leveraging access to a (1) IO port or (2) MMIO region a related issue to CVE-2010-0306. | 2010-02-02T00:00:00.000Z | 2026-02-19T01:07:42.000Z |
| msrc_cve-2007-4998 | cp when running with an option to preserve symlinks on multiple OSes allows local user-assisted attackers to overwrite arbitrary files via a symlink attack using crafted directories containing multiple source files that are copied to the same destination. | 2008-01-02T00:00:00.000Z | 2026-02-19T01:07:31.000Z |
| msrc_cve-2024-8932 | OOB access in ldap_escape | 2024-11-02T00:00:00.000Z | 2026-02-19T01:07:21.000Z |
| msrc_cve-1999-0656 | The ugidd RPC interface by design allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names. | 2000-02-02T00:00:00.000Z | 2026-02-19T01:07:19.000Z |
| msrc_cve-2024-41957 | Vim double free in src/alloc.c:616 | 2024-08-02T00:00:00.000Z | 2026-02-19T01:07:18.000Z |
| msrc_cve-2025-0725 | gzip integer overflow | 2025-02-02T00:00:00.000Z | 2026-02-19T01:07:09.000Z |
| msrc_cve-2010-0309 | The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file. | 2010-02-02T00:00:00.000Z | 2026-02-19T01:07:06.000Z |
| msrc_cve-2024-53858 | Recursive repository cloning can leak authentication tokens to non-GitHub submodule hosts in the gh cli | 2024-11-02T00:00:00.000Z | 2026-02-19T01:07:01.000Z |
| msrc_cve-2024-42224 | net: dsa: mv88e6xxx: Correct check for empty list | 2024-07-01T07:00:00.000Z | 2026-02-19T01:06:57.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:0131-1 | Security update for coredns | 2025-04-19T22:01:42Z | 2025-04-19T22:01:42Z |
| opensuse-su-2025:15010-1 | ffmpeg-6-6.1.2-3.1 on GA media | 2025-04-18T00:00:00Z | 2025-04-18T00:00:00Z |
| opensuse-su-2025:0129-1 | Security update for rubygem-rexml | 2025-04-17T04:01:39Z | 2025-04-17T04:01:39Z |
| opensuse-su-2025:15009-1 | libmozjs-128-0-128.9.0-2.1 on GA media | 2025-04-17T00:00:00Z | 2025-04-17T00:00:00Z |
| opensuse-su-2025:15008-1 | govulncheck-vulndb-0.0.20250416T165455-1.1 on GA media | 2025-04-17T00:00:00Z | 2025-04-17T00:00:00Z |
| opensuse-su-2025:15007-1 | gio-branding-upstream-2.84.1-2.1 on GA media | 2025-04-17T00:00:00Z | 2025-04-17T00:00:00Z |
| opensuse-su-2025:15006-1 | argocd-cli-2.14.10-1.1 on GA media | 2025-04-17T00:00:00Z | 2025-04-17T00:00:00Z |
| opensuse-su-2025:15005-1 | MozillaFirefox-137.0.2-1.1 on GA media | 2025-04-17T00:00:00Z | 2025-04-17T00:00:00Z |
| opensuse-su-2025:0123-1 | Security update for perl-Data-Entropy | 2025-04-16T14:02:07Z | 2025-04-16T14:02:07Z |
| opensuse-su-2025:15004-1 | subfinder-2.7.0-2.1 on GA media | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| opensuse-su-2025:15003-1 | perl-32bit-5.40.2-1.1 on GA media | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| opensuse-su-2025:15002-1 | libmozjs-115-0-115.15.0-5.1 on GA media | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| opensuse-su-2025:15001-1 | forgejo-10.0.3-2.1 on GA media | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| opensuse-su-2025:15000-1 | MozillaThunderbird-128.9.2-1.1 on GA media | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| opensuse-su-2025:14999-1 | python-lxml-doc-5.3.2-1.1 on GA media | 2025-04-15T00:00:00Z | 2025-04-15T00:00:00Z |
| opensuse-su-2025:14998-1 | python311-aiohttp-3.11.16-1.1 on GA media | 2025-04-15T00:00:00Z | 2025-04-15T00:00:00Z |
| opensuse-su-2025:14997-1 | oci-cli-3.54.1-1.1 on GA media | 2025-04-15T00:00:00Z | 2025-04-15T00:00:00Z |
| opensuse-su-2025:14996-1 | hauler-1.2.2-1.1 on GA media | 2025-04-15T00:00:00Z | 2025-04-15T00:00:00Z |
| opensuse-su-2025:14995-1 | govulncheck-vulndb-0.0.20250410T162706-1.1 on GA media | 2025-04-15T00:00:00Z | 2025-04-15T00:00:00Z |
| opensuse-su-2025:14994-1 | gitoxide-0.42.0-1.1 on GA media | 2025-04-15T00:00:00Z | 2025-04-15T00:00:00Z |
| opensuse-su-2025:14993-1 | GraphicsMagick-1.3.45-3.1 on GA media | 2025-04-15T00:00:00Z | 2025-04-15T00:00:00Z |
| opensuse-su-2025:14992-1 | libvarnishapi3-7.7.0-1.1 on GA media | 2025-04-14T00:00:00Z | 2025-04-14T00:00:00Z |
| opensuse-su-2025:14991-1 | libsqlite3-0-3.49.1-3.1 on GA media | 2025-04-14T00:00:00Z | 2025-04-14T00:00:00Z |
| opensuse-su-2025:14990-1 | rekor-1.3.10-1.1 on GA media | 2025-04-14T00:00:00Z | 2025-04-14T00:00:00Z |
| opensuse-su-2025:14989-1 | flannel-0.26.6-1.1 on GA media | 2025-04-14T00:00:00Z | 2025-04-14T00:00:00Z |
| opensuse-su-2025:14988-1 | cosign-2.5.0-1.1 on GA media | 2025-04-14T00:00:00Z | 2025-04-14T00:00:00Z |
| opensuse-su-2025:0120-1 | Security update for chromium | 2025-04-13T13:37:12Z | 2025-04-13T13:37:12Z |
| opensuse-su-2025:14987-1 | python311-PyJWT-2.10.1-2.1 on GA media | 2025-04-11T00:00:00Z | 2025-04-11T00:00:00Z |
| opensuse-su-2025:14986-1 | python311-Django-5.1.8-1.1 on GA media | 2025-04-11T00:00:00Z | 2025-04-11T00:00:00Z |
| opensuse-su-2025:14985-1 | docker-27.5.1_ce-15.1 on GA media | 2025-04-11T00:00:00Z | 2025-04-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-284 | Global-buffer-overflow in dwg_codepage_dxfstr | 2023-04-07T14:00:08.323496Z | 2023-04-07T14:00:08.323744Z |
| osv-2023-282 | Heap-use-after-free in mrb_gc_mark | 2023-04-06T14:00:33.294122Z | 2023-04-06T14:00:33.294356Z |
| osv-2023-281 | Heap-buffer-overflow in unsigned long simdutf::haswell::convert_masked_utf8_to_utf16< | 2023-04-05T14:01:50.220529Z | 2023-04-05T14:01:50.220752Z |
| osv-2023-280 | Heap-use-after-free in mrb_str_hash_m | 2023-04-05T14:01:11.848863Z | 2023-04-05T14:01:11.849139Z |
| osv-2023-279 | Heap-use-after-free in filename_cmp | 2023-04-05T14:00:58.581945Z | 2023-04-05T14:00:58.582171Z |
| osv-2023-278 | Heap-buffer-overflow in simdutf::haswell::implementation::convert_utf8_to_utf32 | 2023-04-05T14:00:45.731081Z | 2023-04-05T14:00:45.731310Z |
| osv-2023-272 | Heap-buffer-overflow in unsigned long simdutf::haswell::convert_masked_utf8_to_utf16< | 2023-04-03T14:00:08.697953Z | 2023-04-04T14:10:41.334668Z |
| osv-2023-273 | Heap-buffer-overflow in add_complete_typeobj | 2023-04-03T14:02:08.154670Z | 2023-04-03T14:02:08.154918Z |
| osv-2023-271 | Heap-buffer-overflow in bit_utf8_to_TU | 2023-04-02T14:01:58.656302Z | 2023-04-02T14:01:58.656539Z |
| osv-2023-270 | Heap-buffer-overflow in bit_utf8_to_TU | 2023-04-02T14:01:04.734545Z | 2023-04-02T14:01:04.734833Z |
| osv-2023-269 | Heap-buffer-overflow in bit_utf8_to_TU | 2023-04-02T14:01:01.834337Z | 2023-04-02T14:01:01.834603Z |
| osv-2023-265 | Heap-double-free in xmlHashDefaultDeallocator | 2023-04-01T13:02:22.848837Z | 2023-04-01T13:02:22.849084Z |
| osv-2023-252 | UNKNOWN READ in iv_put | 2023-03-30T13:00:35.046945Z | 2023-03-30T13:00:35.047201Z |
| osv-2023-251 | Stack-buffer-overflow in ext11_work_out_bundles | 2023-03-30T13:00:33.543215Z | 2023-03-30T13:00:33.543462Z |
| osv-2023-249 | Global-buffer-overflow in xmlStrndup | 2023-03-28T13:00:29.942556Z | 2023-03-28T13:00:29.942832Z |
| osv-2023-222 | Heap-buffer-overflow in hb_subset_plan_t::hb_subset_plan_t | 2023-03-24T13:00:38.968605Z | 2023-03-27T14:20:39.491568Z |
| osv-2023-248 | Heap-double-free in _dwarf_read_line_table_header | 2023-03-27T13:01:51.351691Z | 2023-03-27T13:01:51.351903Z |
| osv-2023-246 | Heap-double-free in _dwarf_read_line_table_header | 2023-03-27T13:00:51.152187Z | 2023-03-27T13:00:51.152441Z |
| osv-2023-243 | UNKNOWN WRITE in processCertificateElements | 2023-03-27T13:00:39.112912Z | 2023-03-27T13:00:39.113130Z |
| osv-2023-242 | Use-of-uninitialized-value in xmlSwitchEncoding | 2023-03-27T13:00:27.197749Z | 2023-03-27T13:00:27.197986Z |
| osv-2023-240 | Invalid-free in fuzz_die_cu_attrs.c | 2023-03-27T13:00:21.287359Z | 2023-03-27T13:00:21.287635Z |
| osv-2023-229 | Heap-buffer-overflow in ndpi_workflow_process_packet | 2023-03-25T13:00:30.521932Z | 2023-03-25T13:00:30.522156Z |
| osv-2023-221 | Heap-use-after-free in flac__analyze_frame | 2023-03-24T13:00:26.024981Z | 2023-03-24T13:00:26.025239Z |
| osv-2023-219 | UNKNOWN WRITE in processCertificateElements | 2023-03-23T13:02:18.996765Z | 2023-03-23T13:02:18.996982Z |
| osv-2023-215 | Global-buffer-overflow in htmlParsePI | 2023-03-23T13:00:45.604359Z | 2023-03-23T13:00:45.604628Z |
| osv-2023-213 | Global-buffer-overflow in htmlParseDocument | 2023-03-22T13:01:53.257203Z | 2023-03-22T13:01:53.257458Z |
| osv-2023-212 | Global-buffer-overflow in xmlParseEntityDecl | 2023-03-22T13:01:34.391238Z | 2023-03-22T13:01:34.391485Z |
| osv-2023-211 | Global-buffer-overflow in xmlStrndup | 2023-03-22T13:00:29.358592Z | 2023-03-22T13:00:29.358840Z |
| osv-2023-184 | UNKNOWN READ in LibRaw::sget4 | 2023-03-17T13:00:06.635055Z | 2023-03-20T14:21:04.285680Z |
| osv-2023-206 | Global-buffer-overflow in xmlParseContentInternal | 2023-03-19T13:02:12.599313Z | 2023-03-19T13:02:12.599543Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-modsecurity-2021-42717 | 2024-03-06T10:57:07.180Z | 2025-07-04T08:10:20.098Z | |
| bit-tensorflow-2022-29196 | Missing validation causes denial of service in TensorFlow via `Conv3DBackpropFilterV2` | 2024-03-06T11:14:35.143Z | 2025-07-03T16:13:03.424Z |
| bit-haproxy-2025-32464 | 2025-04-11T19:12:38.400Z | 2025-07-02T06:33:01.619Z | |
| bit-discourse-2025-49845 | Discourse users are able to see their own whispers even after being removed from a group that has been configured to see whispers | 2025-07-01T08:03:12.143Z | 2025-07-01T08:34:59.038Z |
| bit-gitlab-2025-5315 | Missing Authorization in GitLab | 2025-06-30T15:16:30.030Z | 2025-06-30T15:17:30.405Z |
| bit-gitlab-2025-3279 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-06-30T15:16:22.902Z | 2025-06-30T15:17:30.405Z |
| bit-gitlab-2025-1754 | Missing Authentication for Critical Function in GitLab | 2025-06-30T15:16:00.562Z | 2025-06-30T15:17:30.405Z |
| bit-contour-2024-36539 | 2025-06-28T05:36:10.957Z | 2025-06-28T06:16:35.133Z | |
| bit-rabbitmq-2025-50200 | RabbitMQ Node can log Basic Auth header from an HTTP request | 2025-06-24T14:58:31.787Z | 2025-06-24T15:16:56.580Z |
| bit-gitlab-2024-4994 | Cross-Site Request Forgery (CSRF) in GitLab | 2025-06-24T15:13:03.565Z | 2025-06-24T15:16:56.580Z |
| bit-gitlab-2023-5600 | Missing Authorization in GitLab | 2025-06-24T15:10:28.696Z | 2025-06-24T15:16:56.580Z |
| bit-python-2025-4516 | Use-after-free in "unicode_escape" decoder with error handler | 2025-06-20T09:48:08.494Z | 2025-06-20T10:07:57.809Z |
| bit-grafana-2025-1088 | Very long unicode dashboard title or panel name can hang the frontend | 2025-06-20T05:44:52.153Z | 2025-06-20T06:16:43.559Z |
| bit-seaweedfs-2024-40120 | 2025-06-18T15:00:48.818Z | 2025-06-18T15:17:39.937Z | |
| bit-node-2024-3566 | Command injection vulnerability in programing languages on Microsoft Windows operating system. | 2025-06-18T14:56:46.820Z | 2025-06-18T15:17:39.937Z |
| bit-modsecurity-2024-46292 | 2025-06-18T14:49:01.714Z | 2025-06-18T15:17:39.937Z | |
| bit-moodle-2025-3638 | Moodle: csrf risk in brickfield tool's analysis request action | 2025-06-17T05:59:41.165Z | 2025-06-17T06:16:01.751Z |
| bit-kafka-2025-27819 | Apache Kafka: Possible RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration | 2025-06-14T05:43:46.786Z | 2025-06-14T06:16:31.200Z |
| bit-kafka-2025-27818 | Apache Kafka: Possible RCE attack via SASL JAAS LdapLoginModule configuration | 2025-06-14T05:43:43.718Z | 2025-06-14T06:16:31.200Z |
| bit-gitlab-2025-5996 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-06-14T06:15:35.859Z | 2025-06-14T06:16:31.200Z |
| bit-gitlab-2025-5195 | Authorization Bypass Through User-Controlled Key in GitLab | 2025-06-14T06:15:33.067Z | 2025-06-14T06:16:31.200Z |
| bit-gitlab-2025-4278 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab | 2025-06-14T06:15:30.019Z | 2025-06-14T06:16:31.200Z |
| bit-gitlab-2025-0673 | Loop with Unreachable Exit Condition ('Infinite Loop') in GitLab | 2025-06-14T06:14:51.122Z | 2025-06-14T06:16:31.200Z |
| bit-setuptools-2025-47273 | setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write | 2025-06-13T06:13:15.751Z | 2025-06-13T06:33:01.663Z |
| bit-moodle-2024-48900 | Moodle: idor when accessing list of badge recipients | 2025-06-13T06:12:34.451Z | 2025-06-13T06:33:01.663Z |
| bit-discourse-2025-48877 | Discourse vulnerable to auto-executing of third-party code in embedded CodePen iframe | 2025-06-11T11:45:07.067Z | 2025-06-11T12:17:36.925Z |
| bit-discourse-2025-48053 | Discourse vulnerable to DoS via large URL payload in PM to a bot | 2025-06-11T11:45:01.073Z | 2025-06-11T12:17:36.925Z |
| bit-pytorch-2024-31583 | 2025-06-11T05:57:26.054Z | 2025-06-11T06:16:36.747Z | |
| bit-pytorch-2024-31580 | 2025-06-11T05:57:22.768Z | 2025-06-11T06:16:36.747Z | |
| bit-grafana-2025-2703 | 2025-04-25T07:14:58.193Z | 2025-06-11T06:16:36.747Z |
| ID | Description | Updated |
|---|---|---|
| var-201404-0288 | Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Str… | 2024-07-23T19:41:23.375000Z |
| var-200702-0109 | The Bonjour functionality in iChat in Apple Mac OS X 10.3.9 allows remote attackers to ca… | 2024-07-23T19:41:23.897000Z |
| var-201302-0247 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T19:41:17.213000Z |
| var-201804-1149 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T19:40:26.377000Z |
| var-201302-0302 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2024-07-23T19:40:26.237000Z |
| var-200608-0028 | AFP Server in Apple Mac OS X 10.3.9 and 10.4.7 stores reconnect keys in a world-readable … | 2024-07-23T19:40:26.826000Z |
| var-200809-0188 | Integer overflow in Apple QuickTime before 7.5.5 on Windows allows remote attackers to ex… | 2024-07-23T19:40:25.118000Z |
| var-200604-0209 | Unspecified vulnerability in Microsoft Internet Explorer 5.01 through 6 allows remote att… | 2024-07-23T19:40:25.577000Z |
| var-202003-1777 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T19:40:07.001000Z |
| var-201905-0095 | A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execut… | 2024-07-23T19:40:01.950000Z |
| var-200904-0824 | Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9, and probably other pr… | 2024-07-23T19:39:31.753000Z |
| var-201904-1394 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T19:39:25.754000Z |
| var-200810-0138 | The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote at… | 2024-07-23T19:39:25.606000Z |
| var-200503-0010 | Windows Server 2003 and XP SP2, with Windows Firewall turned off, allows remote attackers… | 2024-07-23T19:39:25.692000Z |
| var-202010-1296 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T19:39:24.802000Z |
| var-201003-1114 | The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9,… | 2024-07-23T19:39:23.837000Z |
| var-200810-0139 | Buffer overflow in ColorSync in Mac OS X 10.4.11 and 10.5.5 allows remote attackers to ca… | 2024-07-23T19:39:23.927000Z |
| var-200712-0599 | Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in M… | 2024-07-23T19:39:21.599000Z |
| var-201006-0308 | The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1… | 2024-07-23T19:39:20.960000Z |
| var-201109-0211 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers… | 2024-07-23T19:39:18.314000Z |
| var-201702-0466 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari be… | 2024-07-23T19:38:47.804000Z |
| var-201907-1547 | undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps… | 2024-07-23T19:38:13.489000Z |
| var-200904-0808 | Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 an… | 2024-07-23T19:38:13.575000Z |
| var-201509-0438 | Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C L… | 2024-07-23T19:37:44Z |
| var-201507-0348 | The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b… | 2024-07-23T19:37:42.535000Z |
| var-200705-0688 | The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module i… | 2024-07-23T19:37:40.957000Z |
| var-202012-1279 | curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation … | 2024-07-23T19:37:06.068000Z |
| var-202108-2222 | libcurl keeps previously used connections in a connection pool for subsequenttransfers to… | 2024-07-23T19:37:05.808000Z |
| var-201606-0477 | The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not p… | 2024-07-23T19:37:05.973000Z |
| var-201105-0095 | lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 d… | 2024-07-23T19:37:05.868000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2018-006236 | Information Disclosure Vulnerability in Hitachi Command Suite | 2018-08-14T10:04+09:00 | 2019-07-24T17:02+09:00 |
| jvndb-2018-000067 | Mailman vulnerable to cross-site scripting | 2018-06-28T12:30+09:00 | 2019-07-24T15:21+09:00 |
| jvndb-2018-000068 | Multiple vulnerabilities in Calsos CSDX and CSDJ series products | 2018-07-02T15:22+09:00 | 2019-07-24T14:31+09:00 |
| jvndb-2018-000106 | User-friendly SVN vulnerable to cross-site scripting | 2018-10-09T16:27+09:00 | 2019-07-11T18:00+09:00 |
| jvndb-2018-000102 | Multiple vulnerabilities in Denbun | 2018-10-04T16:11+09:00 | 2019-07-11T16:02+09:00 |
| jvndb-2019-000046 | Intel Dual Band Wireless-AC 8260 vulnerable to denial-of-service (DoS) | 2019-07-10T14:07+09:00 | 2019-07-10T14:07+09:00 |
| jvndb-2018-000066 | MemoCGI vulnerable to directory traversal | 2018-06-27T14:44+09:00 | 2019-07-05T17:58+09:00 |
| jvndb-2018-000069 | Cybozu Garoon vulnerable to SQL injection | 2018-07-02T15:22+09:00 | 2019-07-05T17:55+09:00 |
| jvndb-2018-000070 | Installer of Glary Utilities may insecurely load Dynamic Link Libraries | 2018-07-03T13:42+09:00 | 2019-07-05T17:52+09:00 |
| jvndb-2018-000072 | The installers of multiple Logicool software programs may insecurely load Dynamic Link Libraries | 2018-07-06T14:36+09:00 | 2019-07-05T17:38+09:00 |
| jvndb-2018-000071 | DHC Online Shop App for Android fails to verify SSL server certificates | 2018-07-06T14:36+09:00 | 2019-07-05T17:35+09:00 |
| jvndb-2018-000085 | Multiple cross-site scripting vulnerabilities in GROWI | 2018-08-03T15:04+09:00 | 2019-07-05T17:13+09:00 |
| jvndb-2018-000051 | The installer of Visual C++ Redistributable may insecurely load Dynamic Link Libraries | 2018-05-17T14:57+09:00 | 2019-07-05T16:41+09:00 |
| jvndb-2018-000049 | Multiple Microsoft Windows applications and installers may insecurely load Dynamic Link Libraries | 2018-05-17T15:18+09:00 | 2019-07-05T16:40+09:00 |
| jvndb-2019-000045 | Multiple vulnerabilities in Access analysis CGI An-Analyzer | 2019-07-05T15:28+09:00 | 2019-07-05T15:28+09:00 |
| jvndb-2018-000056 | Susie plug-in "axpdfium" may insecurely load Dynamic Link Libraries | 2018-05-24T15:15+09:00 | 2019-07-02T14:53+09:00 |
| jvndb-2018-000058 | WordPress plugin "Email Subscribers & Newsletters" vulnerable to cross-site scripting | 2018-05-28T14:11+09:00 | 2019-07-02T14:50+09:00 |
| jvndb-2018-000046 | The installer of PlayMemories Home for Windows may insecurely load Dynamic Link Libraries | 2018-05-24T15:25+09:00 | 2019-07-02T14:31+09:00 |
| jvndb-2018-000059 | WordPress plugin "Site Reviews" vulnerable to cross-site scripting | 2018-05-28T14:11+09:00 | 2019-07-02T14:25+09:00 |
| jvndb-2019-004441 | Vulnerability in Cosminexus HTTP Server and Hitachi Web Server | 2019-06-03T13:55+09:00 | 2019-06-03T13:55+09:00 |
| jvndb-2019-003539 | DoS Vulnerability in Hitachi IT Operations Director, JP1/IT Desktop Management - Manager and JP1/IT Desktop Management 2 - Manager | 2019-05-20T15:38+09:00 | 2019-05-20T15:38+09:00 |
| jvndb-2019-003194 | Multiple Vulnerabilities in Hitachi Command Suite and Hitachi Infrastructure Analytics Advisor | 2019-05-13T15:25+09:00 | 2019-05-13T15:25+09:00 |
| jvndb-2019-002892 | Multiple Vulnerabilities in Cosminexus | 2019-04-25T15:13+09:00 | 2019-04-25T15:13+09:00 |
| jvndb-2019-000021 | API server used by JR East Japan train operation information push notification App for Android fails to restrict access permissions | 2019-04-01T15:42+09:00 | 2019-04-01T15:42+09:00 |
| jvndb-2019-001285 | DoS Vulnerability in JP1/Base | 2019-02-25T17:13+09:00 | 2019-02-25T17:13+09:00 |
| jvndb-2019-000010 | azure-umqtt-c vulnerable to denial-of-service (DoS) | 2019-02-20T16:59+09:00 | 2019-02-20T16:59+09:00 |
| jvndb-2019-000008 | A vulnerability in V20 PRO L-01J that may cause a crash | 2019-02-12T17:23+09:00 | 2019-02-12T17:23+09:00 |
| jvndb-2019-001094 | Information Disclosure Vulnerability in Hitachi Command Suite and Hitachi Infrastructure Analytics Advisor | 2019-01-22T11:47+09:00 | 2019-01-24T18:39+09:00 |
| jvndb-2019-001095 | Cross-site Scripting Vulnerability in Hitachi Device Manager | 2019-01-22T11:47+09:00 | 2019-01-24T18:38+09:00 |
| jvndb-2018-010851 | Clickjacking Vulnerability in Hitachi Automation Director | 2018-12-26T12:09+09:00 | 2019-01-24T18:37+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:03495-1 | Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP6) | 2025-10-08T12:58:58Z | 2025-10-08T12:58:58Z |
| suse-su-2025:03494-1 | Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6) | 2025-10-08T12:58:55Z | 2025-10-08T12:58:55Z |
| suse-su-2025:03491-1 | Security update for libxslt | 2025-10-08T07:37:40Z | 2025-10-08T07:37:40Z |
| suse-su-2025:03490-1 | Security update for cairo | 2025-10-08T07:36:44Z | 2025-10-08T07:36:44Z |
| suse-su-2025:03485-1 | Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5) | 2025-10-08T00:36:00Z | 2025-10-08T00:36:00Z |
| suse-su-2025:03483-1 | Security update for the Linux Kernel (Live Patch 67 for SLE 12 SP5) | 2025-10-07T23:58:50Z | 2025-10-07T23:58:50Z |
| suse-su-2025:03482-1 | Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) | 2025-10-07T21:33:48Z | 2025-10-07T21:33:48Z |
| suse-su-2025:03480-1 | Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP7) | 2025-10-07T17:05:18Z | 2025-10-07T17:05:18Z |
| suse-su-2025:03479-1 | Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP7) | 2025-10-07T16:36:03Z | 2025-10-07T16:36:03Z |
| suse-su-2025:20842-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 | 2025-10-07T15:45:17Z | 2025-10-07T15:45:17Z |
| suse-su-2025:20841-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 | 2025-10-07T15:45:17Z | 2025-10-07T15:45:17Z |
| suse-su-2025:20820-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 | 2025-10-07T15:45:17Z | 2025-10-07T15:45:17Z |
| suse-su-2025:20840-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 | 2025-10-07T15:45:16Z | 2025-10-07T15:45:16Z |
| suse-su-2025:20819-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 | 2025-10-07T15:45:16Z | 2025-10-07T15:45:16Z |
| suse-su-2025:20831-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 | 2025-10-07T15:38:32Z | 2025-10-07T15:38:32Z |
| suse-su-2025:20830-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 | 2025-10-07T15:38:32Z | 2025-10-07T15:38:32Z |
| suse-su-2025:20829-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 | 2025-10-07T15:38:32Z | 2025-10-07T15:38:32Z |
| suse-su-2025:20828-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 | 2025-10-07T15:38:32Z | 2025-10-07T15:38:32Z |
| suse-su-2025:20827-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-10-07T15:38:32Z | 2025-10-07T15:38:32Z |
| suse-su-2025:20826-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-10-07T15:38:32Z | 2025-10-07T15:38:32Z |
| suse-su-2025:20818-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 | 2025-10-07T15:38:32Z | 2025-10-07T15:38:32Z |
| suse-su-2025:20817-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 | 2025-10-07T15:38:32Z | 2025-10-07T15:38:32Z |
| suse-su-2025:20816-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 | 2025-10-07T15:38:32Z | 2025-10-07T15:38:32Z |
| suse-su-2025:20815-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 | 2025-10-07T15:38:32Z | 2025-10-07T15:38:32Z |
| suse-su-2025:20814-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-10-07T15:38:32Z | 2025-10-07T15:38:32Z |
| suse-su-2025:20813-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-10-07T15:38:32Z | 2025-10-07T15:38:32Z |
| suse-su-2025:20839-1 | Security update for kernel-livepatch-MICRO-6-0_Update_9 | 2025-10-07T15:38:23Z | 2025-10-07T15:38:23Z |
| suse-su-2025:20838-1 | Security update for kernel-livepatch-MICRO-6-0_Update_8 | 2025-10-07T15:38:23Z | 2025-10-07T15:38:23Z |
| suse-su-2025:20837-1 | Security update for kernel-livepatch-MICRO-6-0_Update_7 | 2025-10-07T15:38:23Z | 2025-10-07T15:38:23Z |
| suse-su-2025:20836-1 | Security update for kernel-livepatch-MICRO-6-0_Update_6 | 2025-10-07T15:38:23Z | 2025-10-07T15:38:23Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-31391 | Apache OpenOffice外部文件加载漏洞 | 2025-11-18 | 2025-12-25 |
| cnvd-2025-31388 | Apache StreamPark弱算法漏洞 | 2025-12-25 | 2025-12-25 |
| cnvd-2025-31387 | Apache HugeGraph-Server反序列化漏洞 | 2025-12-25 | 2025-12-25 |
| cnvd-2025-31334 | WordPress Header Footer Script Adder plugin跨站脚本漏洞 | 2025-12-22 | 2025-12-25 |
| cnvd-2025-31333 | WordPress Grider for Elementor plugin缺少授权漏洞 | 2025-12-22 | 2025-12-25 |
| cnvd-2025-31332 | WordPress GPXpress plugin跨站脚本漏洞 | 2025-12-22 | 2025-12-25 |
| cnvd-2025-31331 | WordPress FX Currency Converter plugin跨站脚本漏洞 | 2025-12-22 | 2025-12-25 |
| cnvd-2025-31330 | WordPress Freshchat plugin跨站请求伪造漏洞 | 2025-12-22 | 2025-12-25 |
| cnvd-2025-31329 | WordPress Fix Media Library plugin信息泄露漏洞 | 2025-12-22 | 2025-12-25 |
| cnvd-2025-31328 | WordPress Filebird Plugin缺少授权漏洞 | 2025-12-22 | 2025-12-25 |
| cnvd-2025-31327 | WordPress FileBird Pro plugin缺失授权漏洞 | 2025-12-22 | 2025-12-25 |
| cnvd-2025-31393 | Apache Tomcat资源管理错误漏洞(CNVD-2025-31393) | 2025-10-31 | 2025-12-24 |
| cnvd-2025-31389 | Apache Hive SQL注入漏洞 | 2025-11-28 | 2025-12-24 |
| cnvd-2025-31336 | WordPress Hide Email Address plugin跨站脚本漏洞 | 2025-12-22 | 2025-12-24 |
| cnvd-2025-31335 | WordPress HelloLeads CRM Form Shortcode plugin缺少授权漏洞 | 2025-12-22 | 2025-12-24 |
| cnvd-2025-31218 | Company Visitor Management System search-visitor.php文件跨站脚本漏洞 | 2024-01-24 | 2025-12-24 |
| cnvd-2025-31217 | Company Visitor Management System search-visitor.php文件SQL注入漏洞 | 2024-01-24 | 2025-12-24 |
| cnvd-2025-31216 | Company Visitor Management System /index.php文件SQL注入漏洞 | 2025-03-19 | 2025-12-24 |
| cnvd-2025-31215 | Company Visitor Management System /visitor-detail.php文件SQL注入漏洞 | 2025-05-13 | 2025-12-24 |
| cnvd-2025-31214 | Company Visitor Management System /admin-profile.php文件SQL注入漏洞 | 2025-05-13 | 2025-12-24 |
| cnvd-2025-31213 | Company Visitor Management System /department.php文件SQL注入漏洞 | 2025-05-14 | 2025-12-24 |
| cnvd-2025-31212 | Company Visitor Management System /visitors-form.php文件SQL注入漏洞 | 2025-05-20 | 2025-12-24 |
| cnvd-2025-31211 | Company Visitor Management System /forgot-password.php文件SQL注入漏洞 | 2025-05-30 | 2025-12-24 |
| cnvd-2025-31210 | Company Visitor Management System /bwdates-reports-details.php文件SQL注入漏洞 | 2025-05-30 | 2025-12-24 |
| cnvd-2025-31141 | Huawei HarmonyOS/EMUI数据校验错误漏洞(CNVD-2025-31141) | 2024-04-11 | 2025-12-24 |
| cnvd-2025-31390 | Apache OpenOffice越界写漏洞 | 2025-11-18 | 2025-12-23 |
| cnvd-2025-31167 | Tenda FH1203 fromSetRouteStatic方法堆栈缓冲区溢出漏洞 | 2024-03-29 | 2025-12-23 |
| cnvd-2025-31166 | Tenda FH1203 fromNatStaticSetting方法堆栈缓冲区溢出漏洞 | 2024-03-29 | 2025-12-23 |
| cnvd-2025-31165 | Tenda FH1202 formSetSpeedWan方法堆栈缓冲区溢出漏洞 | 2024-03-29 | 2025-12-23 |
| cnvd-2025-31164 | Tenda FH1202 formSetClientState方法堆栈缓冲区溢出漏洞 | 2024-03-29 | 2025-12-23 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0724 | Multiples vulnérabilités dans les produits IBM | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| CERTFR-2025-AVI-0723 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| CERTFR-2025-AVI-0722 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| CERTFR-2025-AVI-0721 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| CERTFR-2025-AVI-0720 | Multiples vulnérabilités dans Microsoft Windows | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| CERTFR-2025-AVI-0719 | Vulnérabilité dans Microsoft Edge | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| CERTFR-2025-AVI-0718 | Multiples vulnérabilités dans les produits Liferay | 2025-08-22T00:00:00.000000 | 2025-08-22T00:00:00.000000 |
| certfr-2025-avi-0717 | Vulnérabilité dans Elastic Beats | 2025-08-21T00:00:00.000000 | 2025-08-21T00:00:00.000000 |
| certfr-2025-avi-0716 | Vulnérabilité dans les produits Apple | 2025-08-21T00:00:00.000000 | 2025-08-21T00:00:00.000000 |
| certfr-2025-avi-0715 | Multiples vulnérabilités dans les produits Liferay | 2025-08-21T00:00:00.000000 | 2025-08-21T00:00:00.000000 |
| certfr-2025-avi-0614 | Multiples vulnérabilités dans les produits Mattermost | 2025-07-23T00:00:00.000000 | 2025-08-21T00:00:00.000000 |
| CERTFR-2025-AVI-0717 | Vulnérabilité dans Elastic Beats | 2025-08-21T00:00:00.000000 | 2025-08-21T00:00:00.000000 |
| CERTFR-2025-AVI-0716 | Vulnérabilité dans les produits Apple | 2025-08-21T00:00:00.000000 | 2025-08-21T00:00:00.000000 |
| CERTFR-2025-AVI-0715 | Multiples vulnérabilités dans les produits Liferay | 2025-08-21T00:00:00.000000 | 2025-08-21T00:00:00.000000 |
| CERTFR-2025-AVI-0614 | Multiples vulnérabilités dans les produits Mattermost | 2025-07-23T00:00:00.000000 | 2025-08-21T00:00:00.000000 |
| certfr-2025-avi-0714 | Multiples vulnérabilités dans les produits Mozilla | 2025-08-20T00:00:00.000000 | 2025-08-20T00:00:00.000000 |
| certfr-2025-avi-0713 | Multiples vulnérabilités dans les produits Liferay | 2025-08-20T00:00:00.000000 | 2025-08-20T00:00:00.000000 |
| certfr-2025-avi-0712 | Vulnérabilité dans Apereo CAS | 2025-08-20T00:00:00.000000 | 2025-08-20T00:00:00.000000 |
| certfr-2025-avi-0711 | Vulnérabilité dans Google Chrome | 2025-08-20T00:00:00.000000 | 2025-08-20T00:00:00.000000 |
| CERTFR-2025-AVI-0714 | Multiples vulnérabilités dans les produits Mozilla | 2025-08-20T00:00:00.000000 | 2025-08-20T00:00:00.000000 |
| CERTFR-2025-AVI-0713 | Multiples vulnérabilités dans les produits Liferay | 2025-08-20T00:00:00.000000 | 2025-08-20T00:00:00.000000 |
| CERTFR-2025-AVI-0712 | Vulnérabilité dans Apereo CAS | 2025-08-20T00:00:00.000000 | 2025-08-20T00:00:00.000000 |
| CERTFR-2025-AVI-0711 | Vulnérabilité dans Google Chrome | 2025-08-20T00:00:00.000000 | 2025-08-20T00:00:00.000000 |
| certfr-2025-avi-0710 | Multiples vulnérabilités dans les produits F5 | 2025-08-19T00:00:00.000000 | 2025-08-19T00:00:00.000000 |
| certfr-2025-avi-0709 | Multiples vulnérabilités dans les produits Liferay | 2025-08-19T00:00:00.000000 | 2025-08-19T00:00:00.000000 |
| certfr-2025-avi-0525 | Multiples vulnérabilités dans Mattermost Server | 2025-06-19T00:00:00.000000 | 2025-08-19T00:00:00.000000 |
| certfr-2025-avi-0453 | Vulnérabilité dans Mattermost Server | 2025-05-27T00:00:00.000000 | 2025-08-19T00:00:00.000000 |
| certfr-2025-avi-0441 | Vulnérabilité dans Mattermost Server | 2025-05-22T00:00:00.000000 | 2025-08-19T00:00:00.000000 |
| certfr-2025-avi-0355 | Multiples vulnérabilités dans Mattermost Server | 2025-04-30T00:00:00.000000 | 2025-08-19T00:00:00.000000 |
| CERTFR-2025-AVI-0710 | Multiples vulnérabilités dans les produits F5 | 2025-08-19T00:00:00.000000 | 2025-08-19T00:00:00.000000 |