Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-15007 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Tenda WH450 HTTP Request L7Im stack-based overflow |
Tenda |
WH450 |
2025-12-22T01:32:06.531Z | 2026-02-24T06:02:02.140Z |
| CVE-2025-15006 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Tenda WH450 HTTP Request CheckTools stack-based overflow |
Tenda |
WH450 |
2025-12-22T01:02:06.922Z | 2026-02-24T06:01:47.799Z |
| CVE-2025-15005 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
CouchCMS reCAPTCHA config.example.php hard-coded key |
n/a |
CouchCMS |
2025-12-22T00:32:07.346Z | 2026-02-24T06:01:34.995Z |
| CVE-2025-15004 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
DedeCMS freelist_main.php sql injection |
n/a |
DedeCMS |
2025-12-22T00:02:08.556Z | 2026-02-24T06:01:20.070Z |
| CVE-2025-15003 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
SeaCMS admin_video.php sql injection |
n/a |
SeaCMS |
2025-12-21T23:32:07.728Z | 2026-02-24T06:01:02.597Z |
| CVE-2025-15002 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SeaCMS mysqli.class.php sql injection |
n/a |
SeaCMS |
2025-12-21T23:02:07.960Z | 2026-02-24T06:00:46.373Z |
| CVE-2025-14995 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda FH1201 SetIpBind sprintf stack-based overflow |
Tenda |
FH1201 |
2025-12-21T08:32:07.268Z | 2026-02-24T06:00:26.438Z |
| CVE-2025-14993 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC18 HTTP Request SetDlnaCfg sprintf stack-based… |
Tenda |
AC18 |
2025-12-21T04:32:06.259Z | 2026-02-24T06:00:07.404Z |
| CVE-2025-14992 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC18 HTTP Request GetParentControlInfo strcpy st… |
Tenda |
AC18 |
2025-12-21T04:02:07.535Z | 2026-02-24T05:59:49.072Z |
| CVE-2025-14991 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
Campcodes Complete Online Beauty Parlor Management Sys… |
Campcodes |
Complete Online Beauty Parlor Management System |
2025-12-21T03:32:08.281Z | 2026-02-24T05:59:34.876Z |
| CVE-2025-14990 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Campcodes Complete Online Beauty Parlor Management Sys… |
Campcodes |
Complete Online Beauty Parlor Management System |
2025-12-21T03:02:06.319Z | 2026-02-24T05:59:21.928Z |
| CVE-2025-14989 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Campcodes Complete Online Beauty Parlor Management Sys… |
Campcodes |
Complete Online Beauty Parlor Management System |
2025-12-20T23:32:06.196Z | 2026-02-24T05:59:10.097Z |
| CVE-2025-14968 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple Stock System update.php sql injection |
code-projects |
Simple Stock System |
2025-12-19T20:02:06.387Z | 2026-02-24T05:58:57.185Z |
| CVE-2025-14966 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
FastAdmin Backend Controller Backend.php selectpage sq… |
n/a |
FastAdmin |
2025-12-19T19:32:08.599Z | 2026-02-24T05:58:44.319Z |
| CVE-2025-14964 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
TOTOLINK T10 cstecgi.cgi sprintf stack-based overflow |
TOTOLINK |
T10 |
2025-12-19T19:02:07.049Z | 2026-02-24T05:58:29.773Z |
| CVE-2025-14962 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
code-projects Simple Stock System chatuser.php cross s… |
code-projects |
Simple Stock System |
2025-12-19T18:32:08.426Z | 2026-02-24T05:58:08.680Z |
| CVE-2025-14959 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple Stock System signup.php sql injection |
code-projects |
Simple Stock System |
2025-12-19T18:02:06.093Z | 2026-02-24T05:57:57.140Z |
| CVE-2025-14957 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
WebAssembly Binaryen IRBuilder wasm-ir-builder.cpp mak… |
WebAssembly |
Binaryen |
2025-12-19T17:02:16.843Z | 2026-02-24T05:57:44.642Z |
| CVE-2025-14956 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
WebAssembly Binaryen wasm-binary.cpp readExport heap-b… |
WebAssembly |
Binaryen |
2025-12-19T16:32:12.536Z | 2026-02-24T05:57:29.961Z |
| CVE-2025-14955 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
Open5GS PFCP handler.c ogs_pfcp_handle_create_pdr init… |
n/a |
Open5GS |
2025-12-19T16:32:08.036Z | 2026-02-24T05:57:13.107Z |
| CVE-2025-14954 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
Open5GS QER/FAR/URR/PDR context.c ogs_pfcp_qer_find_or… |
n/a |
Open5GS |
2025-12-19T16:02:11.110Z | 2026-02-24T05:56:58.734Z |
| CVE-2025-14953 |
2.3 (4.0)
3.1 (3.1)
3.1 (3.0)
|
Open5GS FAR-ID handler.c ogs_pfcp_handle_create_pdr nu… |
n/a |
Open5GS |
2025-12-19T16:02:07.234Z | 2026-02-24T05:56:46.475Z |
| CVE-2025-14952 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Campcodes Supplier Management System add_category.php … |
Campcodes |
Supplier Management System |
2025-12-19T14:32:09.058Z | 2026-02-24T05:56:32.610Z |
| CVE-2025-14951 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Scholars Tracking System home.php sql in… |
code-projects |
Scholars Tracking System |
2025-12-19T14:32:06.003Z | 2026-02-24T05:56:19.799Z |
| CVE-2025-14950 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Scholars Tracking System delete_post.php… |
code-projects |
Scholars Tracking System |
2025-12-19T13:32:06.549Z | 2026-02-24T05:56:08.240Z |
| CVE-2025-14940 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Scholars Tracking System delete_user.php… |
code-projects |
Scholars Tracking System |
2025-12-19T04:02:08.625Z | 2026-02-24T05:55:55.720Z |
| CVE-2025-14910 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Edimax BR-6208AC FTP Daemon Service handle_retr path t… |
Edimax |
BR-6208AC |
2025-12-19T01:32:06.853Z | 2026-02-24T05:55:44.183Z |
| CVE-2025-14900 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
CodeAstro Real Estate Management System Administrator … |
CodeAstro |
Real Estate Management System |
2025-12-19T00:02:10.611Z | 2026-02-24T05:55:29.667Z |
| CVE-2025-14899 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
CodeAstro Real Estate Management System Administrator … |
CodeAstro |
Real Estate Management System |
2025-12-19T00:02:08.232Z | 2026-02-24T05:55:16.453Z |
| CVE-2025-14898 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
CodeAstro Real Estate Management System Administrator … |
CodeAstro |
Real Estate Management System |
2025-12-18T23:32:09.382Z | 2026-02-24T05:55:01.823Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-69296 |
7.1 (3.1)
|
WordPress Aardvark theme <= 4.6.3 - Reflected Cross Si… |
GhostPool |
Aardvark |
2026-02-20T15:46:45.930Z | 2026-02-23T21:38:01.784Z |
| CVE-2025-68880 |
7.1 (3.1)
|
WordPress Simple Archive Generator plugin <= 5.2 - Ref… |
peterwsterling |
Simple Archive Generator |
2026-02-20T15:46:44.624Z | 2026-02-23T21:48:01.693Z |
| CVE-2025-68863 |
7.1 (3.1)
|
WordPress iContact for Gravity Forms plugin <= 1.3.2 -… |
Zack Katz |
iContact for Gravity Forms |
2026-02-20T15:46:44.401Z | 2026-02-23T21:48:02.760Z |
| CVE-2025-68856 |
7.1 (3.1)
|
WordPress Mopinion Feedback Form plugin <= 1.1.1 - Ref… |
keeswolters |
Mopinion Feedback Form |
2026-02-20T15:46:44.011Z | 2026-02-23T21:48:02.937Z |
| CVE-2025-68852 |
7.1 (3.1)
|
WordPress Court Reservation plugin <= 1.10.9 - Cross S… |
webmuehle |
Court Reservation |
2026-02-20T15:46:43.282Z | 2026-02-23T21:48:03.134Z |
| CVE-2025-68848 |
7.1 (3.1)
|
WordPress amr cron manager plugin <= 2.3 - Reflecte dC… |
anmari |
amr cron manager |
2026-02-20T15:46:43.083Z | 2026-02-23T21:48:03.275Z |
| CVE-2025-68847 |
7.1 (3.1)
|
WordPress iSape plugin <= 0.72 - Reflected Cross Site … |
itex |
iSape |
2026-02-20T15:46:42.884Z | 2026-02-23T21:48:03.435Z |
| CVE-2025-68846 |
7.1 (3.1)
|
WordPress Asynchronous Javascript plugin <= 1.3.5 - Re… |
Paris Holley |
Asynchronous Javascript |
2026-02-20T15:46:42.712Z | 2026-02-23T21:48:03.675Z |
| CVE-2025-68845 |
7.1 (3.1)
|
WordPress eDS Responsive Menu plugin <= 1.2 - Reflecte… |
aThemeArt Translations |
eDS Responsive Menu |
2026-02-20T15:46:42.521Z | 2026-02-23T21:48:03.842Z |
| CVE-2025-68844 |
7.1 (3.1)
|
WordPress Membee Login plugin <= 2.3.6 - Cross Site Sc… |
DaleAB |
Membee Login |
2026-02-20T15:46:42.323Z | 2026-02-23T21:48:03.999Z |
| CVE-2025-68843 |
7.1 (3.1)
|
WordPress FeedWordPress Advanced Filters plugin <= 0.6… |
Bas Schuiling |
FeedWordPress Advanced Filters |
2026-02-20T15:46:42.104Z | 2026-02-23T21:48:04.149Z |
| CVE-2025-68842 |
7.1 (3.1)
|
WordPress Widget Logic Visual plugin <= 1.52 - Reflect… |
totalbounty |
Widget Logic Visual |
2026-02-20T15:46:41.871Z | 2026-02-23T21:48:04.312Z |
| CVE-2025-68501 |
7.1 (3.1)
|
WordPress Mollie Payments for WooCommerce plugin <= 8.… |
Mollie |
Mollie Payments for WooCommerce |
2026-02-20T15:46:38.572Z | 2026-02-23T21:48:04.608Z |
| CVE-2025-68495 |
7.1 (3.1)
|
WordPress JetEngine plugin <= 3.8.0 - Reflected Cross … |
Crocoblock |
JetEngine |
2026-02-20T15:46:38.333Z | 2026-02-23T21:48:04.885Z |
| CVE-2025-68031 |
7.1 (3.1)
|
WordPress افزونه پیامک حرفه ای فراز اس ام اس plugin <=… |
faraz sms |
افزونه پیامک حرفه ای فراز اس ام اس |
2026-02-20T15:46:36.305Z | 2026-02-23T21:48:05.070Z |
| CVE-2025-67991 |
7.1 (3.1)
|
WordPress User Extra Fields plugin <= 16.8 - Cross Sit… |
vanquish |
User Extra Fields |
2026-02-20T15:46:32.315Z | 2026-02-23T21:48:05.306Z |
| CVE-2025-67990 |
7.1 (3.1)
|
WordPress GMap Targeting plugin <= 1.1.7 - Cross Site … |
RealMag777 |
GMap Targeting |
2026-02-20T15:46:32.120Z | 2026-02-23T21:48:05.571Z |
| CVE-2025-67984 |
7.1 (3.1)
|
WordPress NPS computy plugin <= 2.8.2 - Cross Site Scr… |
calliko |
NPS computy |
2026-02-20T15:46:31.564Z | 2026-02-23T21:48:05.709Z |
| CVE-2025-67978 |
7.1 (3.1)
|
WordPress Educare plugin <= 1.6.1 - Cross Site Scripti… |
FixBD |
Educare |
2026-02-20T15:46:30.665Z | 2026-02-23T21:48:05.850Z |
| CVE-2025-67972 |
7.1 (3.1)
|
WordPress Prague plugin <= 2.2.8 - Cross Site Scriptin… |
fox-themes |
Prague |
2026-02-20T15:46:29.103Z | 2026-02-23T21:48:05.989Z |
| CVE-2025-67971 |
7.1 (3.1)
|
WordPress FluentCart plugin < 1.3.0 - Cross Site Scrip… |
WPManageNinja |
FluentCart |
2026-02-20T15:46:28.917Z | 2026-02-23T21:48:06.125Z |
| CVE-2025-53237 |
7.1 (3.1)
|
WordPress WP Wizard Cloak Plugin <= 1.0.1 - Cross Site… |
Soflyy |
WP Wizard Cloak |
2026-02-20T15:46:27.310Z | 2026-02-23T21:48:06.274Z |
| CVE-2025-53233 |
7.1 (3.1)
|
WordPress Storyform plugin <= 0.6.14 - Cross Site Scri… |
RylanH |
Storyform |
2026-02-20T15:46:27.120Z | 2026-02-23T21:48:06.436Z |
| CVE-2026-26747 |
9.1 (3.1)
|
A Host Header Poisoning vulnerability exists in M… |
n/a |
n/a |
2026-02-20T00:00:00.000Z | 2026-02-23T20:37:29.313Z |
| CVE-2026-26725 |
9.8 (3.1)
|
An issue in edu Business Solutions Print Shop Pro… |
n/a |
n/a |
2026-02-20T00:00:00.000Z | 2026-02-23T20:17:40.905Z |
| CVE-2026-26724 |
7.6 (3.1)
|
Cross Site Scripting vulnerability in Key Systems… |
n/a |
n/a |
2026-02-20T00:00:00.000Z | 2026-02-23T20:01:27.359Z |
| CVE-2026-26722 |
9.4 (3.1)
|
An issue in Key Systems Inc Global Facilities Man… |
n/a |
n/a |
2026-02-20T00:00:00.000Z | 2026-02-23T20:28:40.578Z |
| CVE-2026-26721 |
7.1 (3.1)
|
An issue in Key Systems Inc Global Facilities Man… |
n/a |
n/a |
2026-02-20T00:00:00.000Z | 2026-02-23T20:23:23.839Z |
| CVE-2026-22351 |
6.5 (3.1)
|
WordPress WP FullCalendar plugin <= 1.6 - Broken Acces… |
Marcus (aka @msykes) |
WP FullCalendar |
2026-02-20T15:47:00.722Z | 2026-02-23T20:57:03.618Z |
| CVE-2025-70831 |
9.8 (3.1)
|
A Remote Code Execution (RCE) vulnerability was f… |
n/a |
n/a |
2026-02-20T00:00:00.000Z | 2026-02-23T19:56:57.701Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2886 | A weakness has been identified in Tenda A21 1.0.0.0. This affects the function set_device_name of t… | 2026-02-21T21:16:11.217 | 2026-02-23T21:00:35.513 |
| fkie_cve-2026-2870 | A security flaw has been discovered in Tenda A21 1.0.0.0. Affected by this issue is the function se… | 2026-02-21T15:15:59.643 | 2026-02-23T21:00:00.257 |
| fkie_cve-2026-2871 | A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of … | 2026-02-21T16:16:05.133 | 2026-02-23T20:59:13.240 |
| fkie_cve-2026-2872 | A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerability affects the fun… | 2026-02-21T16:16:05.390 | 2026-02-23T20:57:59.307 |
| fkie_cve-2026-2873 | A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the function setSchedWifi of … | 2026-02-21T17:15:58.987 | 2026-02-23T20:56:58.853 |
| fkie_cve-2026-27119 | svelte performance oriented web framework. From 5.39.3, <=5.51.4, in certain circumstances, the ser… | 2026-02-20T23:16:02.360 | 2026-02-23T20:54:04.723 |
| fkie_cve-2026-27121 | svelte performance oriented web framework. Versions of svelte prior to 5.51.5 are vulnerable to cro… | 2026-02-20T23:16:02.503 | 2026-02-23T20:53:34.367 |
| fkie_cve-2026-27122 | svelte performance oriented web framework. Prior to 5.51.5, when using <svelte:element this={tag}> … | 2026-02-20T23:16:02.640 | 2026-02-23T20:53:01.857 |
| fkie_cve-2026-27125 | svelte performance oriented web framework. Prior to 5.51.5, in server-side rendering, attribute spr… | 2026-02-20T23:16:02.780 | 2026-02-23T20:52:23.960 |
| fkie_cve-2026-23643 | CakePHP is a rapid development framework for PHP. The PaginatorHelper::limitControl() method has a … | 2026-01-16T21:15:51.543 | 2026-02-23T20:51:11.360 |
| fkie_cve-2026-27169 | OpenSift is an AI study tool that sifts through large datasets using semantic search and generative… | 2026-02-21T00:16:16.810 | 2026-02-23T20:50:36.870 |
| fkie_cve-2026-27170 | OpenSift is an AI study tool that sifts through large datasets using semantic search and generative… | 2026-02-21T00:16:16.980 | 2026-02-23T20:50:25.223 |
| fkie_cve-2026-27189 | OpenSift is an AI study tool that sifts through large datasets using semantic search and generative… | 2026-02-21T00:16:17.140 | 2026-02-23T20:48:59.453 |
| fkie_cve-2026-24050 | Zulip is an open-source team collaboration tool. From 5.0 to before 11.5, some administrative actio… | 2026-02-06T19:16:08.640 | 2026-02-23T20:48:10.037 |
| fkie_cve-2026-27194 | D-Tale is a visualizer for pandas data structures. Versions prior to 3.20.0 are vulnerable to Remot… | 2026-02-21T05:17:29.123 | 2026-02-23T20:47:29.423 |
| fkie_cve-2026-27197 | Sentry is a developer-first error tracking and performance monitoring tool. Versions 21.12.0 throug… | 2026-02-21T05:17:29.510 | 2026-02-23T20:45:01.957 |
| fkie_cve-2026-27484 | OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the Discord moderation action… | 2026-02-21T10:16:12.557 | 2026-02-23T20:44:09.190 |
| fkie_cve-2026-27485 | OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, skills/skill-creator/scripts/… | 2026-02-21T10:16:12.723 | 2026-02-23T20:43:11.533 |
| fkie_cve-2026-27487 | OpenClaw is a personal AI assistant. In versions 2026.2.13 and below, when using macOS, the Claude … | 2026-02-21T10:16:13.100 | 2026-02-23T20:41:59.130 |
| fkie_cve-2026-27488 | OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, Cron webhook delivery in src/… | 2026-02-21T10:16:13.267 | 2026-02-23T20:41:07.240 |
| fkie_cve-2026-27576 | OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the ACP bridge accepts very l… | 2026-02-21T10:16:13.437 | 2026-02-23T20:39:31.980 |
| fkie_cve-2026-27574 | OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, … | 2026-02-21T11:15:57.443 | 2026-02-23T20:36:09.117 |
| fkie_cve-2026-2867 | A vulnerability was determined in itsourcecode Vehicle Management System 1.0. Affected is an unknow… | 2026-02-21T14:15:57.983 | 2026-02-23T20:33:18.727 |
| fkie_cve-2026-2876 | A vulnerability was determined in Tenda A18 15.13.07.13. This affects the function parse_macfilter_… | 2026-02-21T18:16:00.933 | 2026-02-23T20:33:02.043 |
| fkie_cve-2020-0878 | <p>A remote code execution vulnerability exists in the way that Microsoft browsers access objects i… | 2020-09-11T17:15:14.370 | 2026-02-23T20:30:46.833 |
| fkie_cve-2020-1380 | A remote code execution vulnerability exists in the way that the scripting engine handles objects i… | 2020-08-17T19:15:14.553 | 2026-02-23T20:30:44.613 |
| fkie_cve-2020-1464 | A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who… | 2020-08-17T19:15:14.867 | 2026-02-23T20:30:39.947 |
| fkie_cve-2020-1472 | An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon s… | 2020-08-17T19:15:15.117 | 2026-02-23T20:30:36.010 |
| fkie_cve-2026-24007 | Tuleap is an Open Source Suite for management of software development and collaboration. Tuleap is … | 2026-02-02T23:16:07.500 | 2026-02-23T20:29:40.347 |
| fkie_cve-2026-2853 | A vulnerability was detected in D-Link DWR-M960 1.01.07. This affects the function sub_462E14 of th… | 2026-02-20T20:25:25.270 | 2026-02-23T20:29:33.487 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-3fqr-4cg8-h96q |
7.1 (3.1)
|
OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints | 2026-02-18T00:53:59Z | 2026-02-20T16:46:03Z |
| ghsa-m7x8-2w3w-pr42 |
8.6 (4.0)
|
OpenClaw has a command injection in maintainer clawtributors updater | 2026-02-18T00:46:54Z | 2026-02-20T16:45:55Z |
| ghsa-cv7m-c9jx-vg7q |
7.1 (4.0)
|
OpenClaw has a path traversal in browser upload allows local file read | 2026-02-18T00:46:49Z | 2026-02-20T16:45:47Z |
| ghsa-g34w-4xqq-h79m |
6.5 (3.1)
|
OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities | 2026-02-18T00:43:54Z | 2026-02-20T16:45:39Z |
| ghsa-pv58-549p-qh99 |
7.1 (4.0)
|
OpenClaw allows unauthenticated discovery TXT records to steer routing and TLS pinning | 2026-02-18T00:33:35Z | 2026-02-20T16:45:30Z |
| ghsa-8mh7-phf8-xgfm |
5.3 (4.0)
|
OpenClaw skills.status could leak secrets to operator.read clients | 2026-02-17T21:43:41Z | 2026-02-20T16:45:23Z |
| ghsa-h3f9-mjwj-w476 |
7.2 (3.1)
|
OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals | 2026-02-17T21:42:49Z | 2026-02-20T16:44:54Z |
| ghsa-jrvc-8ff5-2f9f |
7.5 (3.1)
|
OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reachable) | 2026-02-17T21:42:40Z | 2026-02-20T16:44:46Z |
| ghsa-g6q9-8fvw-f7rf |
7.6 (3.1)
|
OpenClaw Gateway tool allowed unrestricted gatewayUrl override | 2026-02-17T21:42:15Z | 2026-02-20T16:44:39Z |
| ghsa-8jpq-5h99-ff5r |
7.5 (3.1)
|
OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension | 2026-02-17T21:41:52Z | 2026-02-20T16:44:32Z |
| ghsa-7q2j-c4q5-rm27 |
7.1 (4.0)
|
OpenClaw macOS deep link confirmation truncation can conceal executed agent message | 2026-02-17T21:41:40Z | 2026-02-20T16:44:25Z |
| ghsa-4hg8-92x6-h2f3 |
7.5 (3.1)
|
OpenClaw is Missing Webhook Authentication in Telnyx Provider Allows Unauthenticated Requests | 2026-02-17T21:40:46Z | 2026-02-20T16:44:19Z |
| ghsa-pchc-86f6-8758 |
7.5 (3.1)
|
OpenClaw BlueBubbles webhook auth bypass via loopback proxy trust | 2026-02-17T21:33:51Z | 2026-02-20T16:44:12Z |
| ghsa-7v42-g35v-xrch |
7.5 (3.1)
|
Improper Digest Verification in httpsig-hyper May Allow Message Integrity Bypass | 2026-02-17T21:29:34Z | 2026-02-20T16:44:04Z |
| ghsa-wfqv-66vq-46rm |
3.7 (3.1)
|
Cosign considered signatures valid with expired intermediate certificates when transparency log ver… | 2026-02-19T22:09:12Z | 2026-02-20T16:43:55Z |
| ghsa-wc6r-7g4j-c7x4 |
9.5 (4.0)
|
The vulnerability was rooted in how the Tassos Framework plugin handled specific AJAX requests thro… | 2026-02-20T15:31:03Z | 2026-02-20T15:31:03Z |
| ghsa-7cp9-3m8m-4jv3 |
2.3 (4.0)
|
An integer underflow vulnerability is present in Silicon Lab’s implementation of PSA Crypto and SE … | 2026-02-20T15:31:03Z | 2026-02-20T15:31:03Z |
| ghsa-2m3f-m6mg-cvqf |
2.4 (4.0)
|
An integer underflow vulnerability in Silicon Labs Secure NCP host implementation allows a buffer o… | 2026-02-20T15:31:03Z | 2026-02-20T15:31:03Z |
| ghsa-w8hr-79rx-368j |
9.8 (3.1)
9.3 (4.0)
|
Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve remote code exec… | 2026-02-19T18:31:55Z | 2026-02-20T15:31:00Z |
| ghsa-v8wf-h34r-55f7 |
6.8 (3.1)
|
In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11, a user of a Splunk Se… | 2026-02-18T18:30:40Z | 2026-02-20T15:31:00Z |
| ghsa-qvhf-98cj-8779 |
8.8 (3.1)
|
TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via … | 2026-02-17T21:31:13Z | 2026-02-20T15:31:00Z |
| ghsa-pqh8-xq2x-mwg2 |
8.8 (3.1)
|
TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via … | 2026-02-17T21:31:14Z | 2026-02-20T15:31:00Z |
| ghsa-p97j-p47c-p6g9 |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T18:31:54Z | 2026-02-20T15:31:00Z |
| ghsa-j59q-24q8-ggc7 |
7.5 (3.1)
8.7 (4.0)
|
Hyland Alfresco allows unauthenticated attackers to read arbitrary files from protected directories… | 2026-02-19T18:31:55Z | 2026-02-20T15:31:00Z |
| ghsa-cg7h-phwj-q3qc |
6.5 (3.1)
6.9 (4.0)
|
Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve server-side requ… | 2026-02-19T18:31:55Z | 2026-02-20T15:31:00Z |
| ghsa-8fxh-mvg9-6cmm |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-19T18:31:54Z | 2026-02-20T15:31:00Z |
| ghsa-5jg4-px58-ghq6 |
8.8 (3.1)
|
TOTOLINK A3002RU_V3 V3.0.0-B20220304.1804 was discovered to contain a stack-based buffer overflow v… | 2026-02-17T21:31:13Z | 2026-02-20T15:31:00Z |
| ghsa-3453-mrqq-23pm |
8.2 (3.1)
8.8 (4.0)
|
Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve both arbitrary f… | 2026-02-19T18:31:55Z | 2026-02-20T15:31:00Z |
| ghsa-w4wv-h996-6v9c |
6.4 (3.1)
|
The Master Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting v… | 2026-02-20T12:31:25Z | 2026-02-20T12:31:25Z |
| ghsa-4jf6-4wfh-g46g |
9.8 (3.1)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-02-20T12:31:25Z | 2026-02-20T12:31:25Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-86 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.536542Z |
| pysec-2022-85 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCo… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.416658Z |
| pysec-2022-84 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCo… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.290009Z |
| pysec-2022-83 |
|
Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's … | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.161202Z |
| pysec-2022-82 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp`… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.035553Z |
| pysec-2022-81 |
|
Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, TensorF… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.923211Z |
| pysec-2022-80 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from prot… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.801262Z |
| pysec-2022-79 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from prot… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.672987Z |
| pysec-2022-78 |
|
Tensorflow is an Open Source Machine Learning Framework. Multiple operations in TensorFlo… | tensorflow-cpu | 2022-02-03T13:15:00Z | 2022-03-09T00:17:33.554776Z |
| pysec-2022-77 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySp… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:33.439630Z |
| pysec-2022-76 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*C… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:33.310692Z |
| pysec-2022-75 |
|
Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a he… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.179728Z |
| pysec-2022-74 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial o… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.047887Z |
| pysec-2022-73 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a resource handle … | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.923545Z |
| pysec-2022-72 |
|
Tensorflow is an Open Source Machine Learning Framework. In multiple places, TensorFlow u… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.797622Z |
| pysec-2022-71 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` su… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.679005Z |
| pysec-2022-70 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.561735Z |
| pysec-2022-69 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.438434Z |
| pysec-2022-68 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.298949Z |
| pysec-2022-67 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.167293Z |
| pysec-2022-66 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.048410Z |
| pysec-2022-65 |
|
Tensorflow is an Open Source Machine Learning Framework. ### Impact An attacker can craft… | tensorflow-cpu | 2022-02-03T15:15:00Z | 2022-03-09T00:17:31.924375Z |
| pysec-2022-64 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCou… | tensorflow-cpu | 2022-02-03T15:15:00Z | 2022-03-09T00:17:31.800762Z |
| pysec-2022-63 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Quantized… | tensorflow-cpu | 2022-02-03T14:15:00Z | 2022-03-09T00:17:31.682282Z |
| pysec-2022-62 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCou… | tensorflow-cpu | 2022-02-03T14:15:00Z | 2022-03-09T00:17:31.553710Z |
| pysec-2022-61 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `*Bincount… | tensorflow-cpu | 2022-02-03T14:15:00Z | 2022-03-09T00:17:31.433747Z |
| pysec-2022-60 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseTen… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:31.305252Z |
| pysec-2022-59 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Fractiona… | tensorflow-cpu | 2022-02-03T13:15:00Z | 2022-03-09T00:17:31.174803Z |
| pysec-2022-58 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage`… | tensorflow-cpu | 2022-02-03T13:15:00Z | 2022-03-09T00:17:31.053811Z |
| pysec-2022-57 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGr… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:30.939427Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-4002 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.107469Z |
| gsd-2024-4001 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.110677Z |
| gsd-2024-4000 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.108433Z |
| gsd-2024-31858 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.878898Z |
| gsd-2024-31407 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.828498Z |
| gsd-2024-32942 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.398724Z |
| gsd-2024-32937 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.480785Z |
| gsd-2024-32935 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.375699Z |
| gsd-2024-32934 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.288016Z |
| gsd-2024-32933 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.482670Z |
| gsd-2024-32932 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.318667Z |
| gsd-2024-32931 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.319159Z |
| gsd-2024-32930 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.498740Z |
| gsd-2024-32929 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.226119Z |
| gsd-2024-32928 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.430140Z |
| gsd-2024-32927 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.229438Z |
| gsd-2024-32926 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.298996Z |
| gsd-2024-32925 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.270804Z |
| gsd-2024-32924 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.490789Z |
| gsd-2024-32923 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.483420Z |
| gsd-2024-32922 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.228664Z |
| gsd-2024-32921 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.358991Z |
| gsd-2024-32920 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.450518Z |
| gsd-2024-32919 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.445455Z |
| gsd-2024-32918 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.335515Z |
| gsd-2024-32917 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.364253Z |
| gsd-2024-32916 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.255400Z |
| gsd-2024-32915 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.431999Z |
| gsd-2024-32914 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.390240Z |
| gsd-2024-32913 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.240681Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-463 | Malicious code in corporate-blocking (npm) | 2026-01-22T12:17:58Z | 2026-01-23T01:38:59Z |
| mal-2026-458 | Malicious code in csv-parsing-xz (npm) | 2026-01-22T09:02:30Z | 2026-01-23T01:38:59Z |
| mal-2026-457 | Malicious code in csv-parsing-xx (npm) | 2026-01-22T09:02:29Z | 2026-01-23T01:38:59Z |
| mal-2026-435 | Malicious code in aligntype (npm) | 2026-01-21T06:49:59Z | 2026-01-23T01:38:59Z |
| mal-2026-414 | Malicious code in debox-rn (npm) | 2026-01-21T04:46:05Z | 2026-01-23T01:38:59Z |
| mal-2026-413 | Malicious code in coopshares-webcomponent (npm) | 2026-01-21T04:39:38Z | 2026-01-23T01:38:59Z |
| mal-2026-412 | Malicious code in connect-web (npm) | 2026-01-21T04:39:39Z | 2026-01-23T01:38:59Z |
| mal-2026-411 | Malicious code in collaborate (npm) | 2026-01-21T04:39:39Z | 2026-01-23T01:38:59Z |
| mal-2026-410 | Malicious code in clerk-js (npm) | 2026-01-21T04:39:39Z | 2026-01-23T01:38:59Z |
| mal-2026-409 | Malicious code in chai-async-test (npm) | 2026-01-21T04:51:11Z | 2026-01-23T01:38:59Z |
| mal-2026-408 | Malicious code in bitbot (npm) | 2026-01-21T04:39:38Z | 2026-01-23T01:38:59Z |
| mal-2026-407 | Malicious code in babel-js (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:38:59Z |
| mal-2026-406 | Malicious code in aws-crt-nodejs (npm) | 2026-01-21T04:46:06Z | 2026-01-23T01:38:59Z |
| mal-2026-405 | Malicious code in anthropic-sdk (npm) | 2026-01-21T04:34:17Z | 2026-01-23T01:38:59Z |
| mal-2026-388 | Malicious code in charlie_charlie_kirky (npm) | 2026-01-21T04:00:58Z | 2026-01-23T01:38:59Z |
| mal-2026-387 | Malicious code in chai-dex (npm) | 2026-01-21T04:24:06Z | 2026-01-23T01:38:59Z |
| mal-2026-386 | Malicious code in chai-chain-async (npm) | 2026-01-21T04:23:01Z | 2026-01-23T01:38:59Z |
| mal-2026-385 | Malicious code in blocks-builder-manifest-generator (npm) | 2026-01-21T03:56:28Z | 2026-01-23T01:38:59Z |
| mal-2026-357 | Malicious code in chai-bin (npm) | 2026-01-20T03:57:46Z | 2026-01-23T01:38:59Z |
| mal-2026-337 | Malicious code in chai-as-executed (npm) | 2026-01-19T00:56:45Z | 2026-01-23T01:38:59Z |
| mal-2026-331 | Malicious code in cyrpto (npm) | 2026-01-19T00:43:31Z | 2026-01-23T01:38:59Z |
| MAL-2026-463 | Malicious code in corporate-blocking (npm) | 2026-01-22T12:17:58Z | 2026-01-23T01:38:59Z |
| MAL-2026-458 | Malicious code in csv-parsing-xz (npm) | 2026-01-22T09:02:30Z | 2026-01-23T01:38:59Z |
| MAL-2026-457 | Malicious code in csv-parsing-xx (npm) | 2026-01-22T09:02:29Z | 2026-01-23T01:38:59Z |
| MAL-2026-435 | Malicious code in aligntype (npm) | 2026-01-21T06:49:59Z | 2026-01-23T01:38:59Z |
| MAL-2026-414 | Malicious code in debox-rn (npm) | 2026-01-21T04:46:05Z | 2026-01-23T01:38:59Z |
| MAL-2026-413 | Malicious code in coopshares-webcomponent (npm) | 2026-01-21T04:39:38Z | 2026-01-23T01:38:59Z |
| MAL-2026-412 | Malicious code in connect-web (npm) | 2026-01-21T04:39:39Z | 2026-01-23T01:38:59Z |
| MAL-2026-411 | Malicious code in collaborate (npm) | 2026-01-21T04:39:39Z | 2026-01-23T01:38:59Z |
| MAL-2026-410 | Malicious code in clerk-js (npm) | 2026-01-21T04:39:39Z | 2026-01-23T01:38:59Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1272 | QNAP NAS Software und Anwendungen: Mehrere Schwachstellen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1268 | Trend Micro Apex One: Mehrere Schwachstellen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1267 | GeoServer: Mehrere Schwachstellen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1264 | SAP Software: Mehrere Schwachstellen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1263 | Jenkins "Gatling" Plugin: Schwachstelle ermöglicht Cross-Site Scripting | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1262 | FasterXML Jackson: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1260 | Trend Micro Internet Security: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1259 | Trend Micro Maximum Security: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1257 | SolarWinds Platform: Mehrere Schwachstellen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1256 | Google Cloud Platform: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1255 | Trend Micro Worry-Free Business Security: Mehrere Schwachstellen | 2025-06-09T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1162 | Red Hat Enterprise Linux (zlib): Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-05-29T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0908 | Keycloack: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-04-29T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0694 | OpenVPN: Schwachstelle ermöglicht Denial of Service | 2025-04-02T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0314 | AMD Prozessoren: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0285 | Red Hat Enterprise Linux (Quarkus und Netty): Mehrere Schwachstellen | 2025-02-05T23:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-2202 | Apache Tomcat: Schwachstelle ermöglicht Denial of Service | 2024-09-23T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-2169 | bluez: Schwachstelle ermöglicht Codeausführung | 2024-09-17T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1522 | Apache Tomcat: Schwachstelle ermöglicht Denial of Service | 2024-07-03T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1232 | Rsync: Mehrere Schwachstellen | 2020-02-24T23:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0899 | Oracle Fusion Middleware: Mehrere Schwachstellen | 2024-04-16T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0630 | Apache Tomcat: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-03-13T23:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0594 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-03-11T23:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0163 | Apache Tomcat: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-01-18T23:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2023-2628 | Apache Tomcat: Mehrere Schwachstellen | 2023-10-10T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2023-2571 | Django: Schwachstelle ermöglicht Denial of Service | 2023-10-04T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2023-1142 | Red Hat Integration Camel for Spring Boot: Mehrere Schwachstellen | 2023-05-03T22:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2023-0717 | Apache Tomcat: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-03-21T23:00:00.000+00:00 | 2025-06-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1254 | Microsoft Power Automate Desktop: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-05T22:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| wid-sec-w-2025-1253 | QT: Schwachstelle ermöglicht Denial of Service | 2025-06-05T22:00:00.000+00:00 | 2025-06-05T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2021:0247 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.5 security update | 2021-01-25T16:32:00+00:00 | 2026-02-25T17:34:17+00:00 |
| rhsa-2021:0246 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.5 security update | 2021-01-25T16:30:38+00:00 | 2026-02-25T17:34:16+00:00 |
| rhsa-2021:0145 | Red Hat Security Advisory: Red Hat OpenShift Serverless Client kn 1.12.0 | 2021-01-14T13:40:17+00:00 | 2026-02-25T17:34:15+00:00 |
| rhsa-2020:5342 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.4 security update | 2020-12-03T19:18:34+00:00 | 2026-02-25T17:34:15+00:00 |
| rhsa-2020:5625 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.0 security update | 2020-12-17T16:40:19+00:00 | 2026-02-25T17:34:14+00:00 |
| rhsa-2020:5568 | Red Hat Security Advisory: Red Hat Fuse 7.8.0 release and security update | 2020-12-16T12:11:19+00:00 | 2026-02-25T17:34:14+00:00 |
| rhsa-2020:5533 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.4 security update | 2020-12-15T17:14:01+00:00 | 2026-02-25T17:34:13+00:00 |
| rhsa-2020:5493 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2020-12-15T17:12:24+00:00 | 2026-02-25T17:34:13+00:00 |
| rhsa-2020:5410 | Red Hat Security Advisory: Red Hat Data Grid 7.3.8 security update | 2020-12-14T17:52:08+00:00 | 2026-02-25T17:34:13+00:00 |
| rhsa-2020:5365 | Red Hat Security Advisory: Red Hat AMQ Broker 7.8 release and security update | 2020-12-08T08:55:33+00:00 | 2026-02-25T17:34:12+00:00 |
| rhsa-2020:5361 | Red Hat Security Advisory: Red Hat build of Thorntail 2.7.2 security and bug fix update | 2020-12-16T07:20:21+00:00 | 2026-02-25T17:34:11+00:00 |
| rhsa-2020:5344 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.4 security update | 2020-12-03T19:13:10+00:00 | 2026-02-25T17:34:11+00:00 |
| rhsa-2020:5341 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.4 security update | 2020-12-03T19:18:18+00:00 | 2026-02-25T17:34:10+00:00 |
| rhsa-2020:5340 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.4 security update | 2020-12-03T19:16:26+00:00 | 2026-02-25T17:34:10+00:00 |
| rhsa-2020:4961 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.9.0 security update | 2020-11-05T18:48:33+00:00 | 2026-02-25T17:34:09+00:00 |
| rhsa-2020:4960 | Red Hat Security Advisory: Red Hat Decision Manager 7.9.0 security update | 2020-11-05T18:47:03+00:00 | 2026-02-25T17:34:09+00:00 |
| rhsa-2020:4931 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.3 security update | 2020-11-04T19:24:13+00:00 | 2026-02-25T17:34:09+00:00 |
| rhsa-2020:4402 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update | 2020-10-28T21:06:51+00:00 | 2026-02-25T17:34:07+00:00 |
| rhsa-2020:4401 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update | 2020-10-28T21:11:53+00:00 | 2026-02-25T17:34:07+00:00 |
| rhsa-2020:4379 | Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 3.9.4 security update | 2020-11-09T18:26:24+00:00 | 2026-02-25T17:34:07+00:00 |
| rhsa-2020:4245 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update on RHEL 8 | 2020-10-13T16:50:02+00:00 | 2026-02-25T17:34:07+00:00 |
| rhsa-2020:4366 | Red Hat Security Advisory: Satellite 6.8 release | 2020-10-27T12:58:12+00:00 | 2026-02-25T17:34:06+00:00 |
| rhsa-2020:3638 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.9 on RHEL 7 security update | 2020-09-07T12:58:33+00:00 | 2026-02-25T17:34:06+00:00 |
| rhsa-2020:4312 | Red Hat Security Advisory: rh-maven35-jackson-databind security update | 2020-10-22T16:48:27+00:00 | 2026-02-25T17:34:05+00:00 |
| rhsa-2020:4252 | Red Hat Security Advisory: Red Hat build of Quarkus 1.7.5 release and security update | 2020-10-14T11:16:58+00:00 | 2026-02-25T17:34:05+00:00 |
| rhsa-2020:4247 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update | 2020-10-13T17:01:16+00:00 | 2026-02-25T17:34:04+00:00 |
| rhsa-2020:4246 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update on RHEL 7 | 2020-10-13T16:50:20+00:00 | 2026-02-25T17:34:04+00:00 |
| rhsa-2020:4244 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update on RHEL 6 | 2020-10-13T16:49:49+00:00 | 2026-02-25T17:34:02+00:00 |
| rhsa-2020:3817 | Red Hat Security Advisory: AMQ Clients 2.8.0 Release | 2020-09-23T09:02:39+00:00 | 2026-02-25T17:34:02+00:00 |
| rhsa-2020:3806 | Red Hat Security Advisory: Red Hat support for Spring Boot 2.2.6.SP2 security update | 2020-09-23T16:27:06+00:00 | 2026-02-25T17:34:01+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-21-257-18 | Siemens Siveillance OIS | 2021-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-257-17 | Siemens Desigo CC Family | 2021-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-257-16 | Siemens SIPROTEC 5 (Update A) | 2021-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-257-15 | Siemens SIMATIC NET CP Modules | 2021-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-257-14 | Siemens SINEC NMS | 2021-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-257-13 | Siemens LOGO! CMR and SIMATIC RTU 3000 (Update A) | 2021-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-257-12 | Siemens SINEMA Server | 2021-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-257-11 | Siemens SIMATIC RFID | 2021-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-257-10 | Siemens SIPROTEC 5 relays (Update A) | 2021-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-257-09 | Siemens NX | 2021-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-257-08 | Siemens Teamcenter | 2021-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-257-07 | Siemens APOGEE and TALON | 2021-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-257-05 | Siemens Simcenter STAR-CCM+ Viewer | 2021-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-257-04 | Siemens Simcenter Femap | 2021-09-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-222-09 | Siemens SIMATIC S7-1200 (Update A) | 2021-08-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-222-06 | Siemens Energy AGT and SGT Solutions | 2021-08-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-222-04 | Siemens SINEC NMS | 2021-08-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-222-03 | Siemens JT2Go and Teamcenter Visualization (Update A) | 2021-08-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-222-02 | Siemens Automation License Manager | 2021-08-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-222-01 | Siemens JT2Go and Teamcenter Visualization products | 2021-08-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-210-02 | Wibu-Systems CodeMeter Runtime | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-17 | Siemens SINUMERIK ONE and SINUMERIK MC (Update A) | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-16 | Siemens Mendix | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-14 | Siemens RWG Universal Controllers | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-11 | Siemens Teamcenter Active Workspace | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-09 | Siemens JT Utilities | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-08 | Siemens Solid Edge | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-05 | Siemens SIMATIC Software Products | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-04 | Siemens SINUMERIK Integrate Operate Client | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-159-14 | Siemens JT2Go and Teamcenter Visualization | 2021-06-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-capic-chvul-CKfGYBh8 | Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2022-06-07T17:29:33+00:00 |
| cisco-sa-asaftd-ipsec-mitm-cknlr4 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IPsec IKEv2 VPN Information Disclosure Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T17:03:06+00:00 |
| cisco-sa-asaftd-ipsec-mitm-CKnLr4 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IPsec IKEv2 VPN Information Disclosure Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T17:03:06+00:00 |
| cisco-sa-asaftd-mgmt-privesc-bmfmuvye | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Privilege Escalation Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T16:39:47+00:00 |
| cisco-sa-asaftd-mgmt-privesc-BMFMUvye | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Privilege Escalation Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T16:39:47+00:00 |
| cisco-sa-asa-ssl-vpn-heap-zlx3fdx | Cisco Adaptive Security Appliance Software Clientless SSL VPN Heap Overflow Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T16:25:45+00:00 |
| cisco-sa-asa-ssl-vpn-heap-zLX3FdX | Cisco Adaptive Security Appliance Software Clientless SSL VPN Heap Overflow Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T16:25:45+00:00 |
| cisco-sa-ucs-xss-uqsme3l7 | Cisco UCS Director JavaScript Cross-Site Scripting Vulnerability | 2022-05-18T16:00:00+00:00 | 2022-05-18T16:00:00+00:00 |
| cisco-sa-UCS-XSS-uQSME3L7 | Cisco UCS Director JavaScript Cross-Site Scripting Vulnerability | 2022-05-18T16:00:00+00:00 | 2022-05-18T16:00:00+00:00 |
| cisco-sa-snort-app-bypass-csbycatq | Multiple Cisco Products Snort Application Detection Engine Policy Bypass Vulnerability | 2021-01-13T16:00:00+00:00 | 2022-05-16T18:45:16+00:00 |
| cisco-sa-snort-app-bypass-cSBYCATq | Multiple Cisco Products Snort Application Detection Engine Policy Bypass Vulnerability | 2021-01-13T16:00:00+00:00 | 2022-05-16T18:45:16+00:00 |
| cisco-sa-ewlc-priv-esc-ybvhko5 | Cisco IOS XE Software for Cisco Catalyst 9000 Family Switches and Catalyst 9000 Family Wireless Controllers Privilege Escalation Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-05-12T19:35:11+00:00 |
| cisco-sa-ewlc-priv-esc-ybvHKO5 | Cisco IOS XE Software for Cisco Catalyst 9000 Family Switches and Catalyst 9000 Family Wireless Controllers Privilege Escalation Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-05-12T19:35:11+00:00 |
| cisco-sa-iox-yuxq6hfj | Cisco IOx Application Hosting Environment Vulnerabilities | 2022-04-13T16:00:00+00:00 | 2022-05-12T15:50:29+00:00 |
| cisco-sa-iox-yuXQ6hFj | Cisco IOx Application Hosting Environment Vulnerabilities | 2022-04-13T16:00:00+00:00 | 2022-05-12T15:50:29+00:00 |
| cisco-sa-ros-dos-x7h7xhkk | Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-06T20:13:28+00:00 |
| cisco-sa-ROS-DOS-X7H7XhkK | Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-06T20:13:28+00:00 |
| cisco-sa-clamav-dos-vl9x58p4 | ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: May 2022 | 2022-05-04T16:00:00+00:00 | 2022-05-04T20:36:47+00:00 |
| cisco-sa-clamav-dos-vL9x58p4 | ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: May 2022 | 2022-05-04T16:00:00+00:00 | 2022-05-04T20:36:47+00:00 |
| cisco-sa-vmge-infodc-wpskamhp | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-vmge-infodc-WPSkAMhp | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-smb-rv-cmd-inj-8pv9jmjd | Cisco Small Business RV Series Routers Command Injection Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-smb-rv-cmd-inj-8Pv9JMJD | Cisco Small Business RV Series Routers Command Injection Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-sbrv-rce-oylqbl9u | Cisco Small Business RV Series Routers Remote Code Execution Vulnerability | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-sbrv-rce-OYLQbL9u | Cisco Small Business RV Series Routers Remote Code Execution Vulnerability | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-nfvis-mul-7dysrx9 | Cisco Enterprise NFV Infrastructure Software Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-NFVIS-MUL-7DySRX9 | Cisco Enterprise NFV Infrastructure Software Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-vpndtls-dos-tunzlev | Cisco Adaptive Security Appliance and Cisco Firepower Threat Defense Software AnyConnect SSL VPN Denial of Service Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-05-02T17:17:11+00:00 |
| cisco-sa-vpndtls-dos-TunzLEV | Cisco Adaptive Security Appliance and Cisco Firepower Threat Defense Software AnyConnect SSL VPN Denial of Service Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-05-02T17:17:11+00:00 |
| cisco-sa-uswg-fdbps-xttrkpp6 | Cisco Umbrella Secure Web Gateway File Decryption Bypass Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-04-29T19:14:17+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2023-46813 | An issue was discovered in the Linux kernel before 6.5.9 exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it. | 2023-10-01T00:00:00.000Z | 2026-02-19T01:03:52.000Z |
| msrc_cve-2022-47022 | An issue was discovered in open-mpi hwloc 2.1.0 allows attackers to cause a denial of service or other unspecified impacts via glibc-cpuset in topology-linux.c. | 2023-08-01T00:00:00.000Z | 2026-02-19T01:03:41.000Z |
| msrc_cve-2024-50278 | dm cache: fix potential out-of-bounds access on the first resume | 2024-11-02T00:00:00.000Z | 2026-02-19T01:03:37.000Z |
| msrc_cve-2024-57910 | iio: light: vcnl4035: fix information leak in triggered buffer | 2025-01-02T00:00:00.000Z | 2026-02-19T01:03:35.000Z |
| msrc_cve-2022-3116 | The Heimdal Software Kerberos 5 implementation is vulnerable to a null pointer dereferance. An attacker with network access to an application that depends on the vulnerable code path can cause the application to crash. | 2023-03-10T00:00:00.000Z | 2026-02-19T01:03:20.000Z |
| msrc_cve-2024-50301 | security/keys: fix slab-out-of-bounds in key_task_permission | 2024-11-02T00:00:00.000Z | 2026-02-19T01:03:18.000Z |
| msrc_cve-2025-21652 | ipvlan: Fix use-after-free in ipvlan_get_iflink(). | 2025-01-02T00:00:00.000Z | 2026-02-19T01:03:06.000Z |
| msrc_cve-2024-50192 | irqchip/gic-v4: Don't allow a VMOVP on a dying VPE | 2024-11-02T00:00:00.000Z | 2026-02-19T01:02:59.000Z |
| msrc_cve-2023-4692 | Grub2: out-of-bounds write at fs/ntfs.c may lead to unsigned code execution | 2023-10-01T00:00:00.000Z | 2026-02-19T01:02:57.000Z |
| msrc_cve-2024-38570 | gfs2: Fix potential glock use-after-free on unmount | 2024-06-02T07:00:00.000Z | 2026-02-19T01:02:56.000Z |
| msrc_cve-2023-4693 | Grub2: out-of-bounds read at fs/ntfs.c | 2023-10-01T00:00:00.000Z | 2026-02-19T01:02:45.000Z |
| msrc_cve-2024-39493 | crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak | 2024-07-01T07:00:00.000Z | 2026-02-19T01:02:39.000Z |
| msrc_cve-2024-52338 | Apache Arrow R package: Arbitrary code execution when loading a malicious data file | 2024-11-02T00:00:00.000Z | 2026-02-19T01:02:35.000Z |
| msrc_cve-2022-28736 | There's a use-after-free vulnerability in grub_cmd_chainloader() function | 2023-07-01T07:00:00.000Z | 2026-02-19T01:02:32.000Z |
| msrc_cve-2023-33976 | TensorFlow segfault in array_ops.upper_bound | 2024-07-01T07:00:00.000Z | 2026-02-19T01:02:27.000Z |
| msrc_cve-2022-28735 | The GRUB2's shim_lock verifier allows non-kernel files to be loaded on shim-powered secure boot systems. Allowing such files to be loaded may lead to unverified code and modules to be loaded in GRUB2 breaking the secure boot trust-chain. | 2023-07-01T07:00:00.000Z | 2026-02-19T01:02:20.000Z |
| msrc_cve-2024-50195 | posix-clock: Fix missing timespec64 check in pc_clock_settime() | 2024-11-02T00:00:00.000Z | 2026-02-19T01:02:18.000Z |
| msrc_cve-2024-39489 | ipv6: sr: fix memleak in seg6_hmac_init_algo | 2024-07-01T07:00:00.000Z | 2026-02-19T01:02:14.000Z |
| msrc_cve-2022-28734 | Out-of-bounds write when handling split HTTP headers | 2023-07-01T07:00:00.000Z | 2026-02-19T01:02:07.000Z |
| msrc_cve-2025-68188 | tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() | 2025-12-02T00:00:00.000Z | 2026-02-19T01:02:00.000Z |
| msrc_cve-2024-53899 | virtualenv before 20.26.6 allows command injection through the activation scripts for a virtual environment. Magic template strings are not quoted correctly when replacing. NOTE: this is not the same as CVE-2024-9287. | 2024-11-02T00:00:00.000Z | 2026-02-19T01:01:59.000Z |
| msrc_cve-2022-28733 | Integer underflow in grub_net_recv_ip4_packets | 2023-07-01T07:00:00.000Z | 2026-02-19T01:01:54.000Z |
| msrc_cve-2024-42076 | net: can: j1939: Initialize unused data in j1939_send_one() | 2024-07-01T07:00:00.000Z | 2026-02-19T01:01:48.000Z |
| msrc_cve-2024-50273 | btrfs: reinitialize delayed ref list after deleting it from the list | 2024-11-02T00:00:00.000Z | 2026-02-19T01:01:43.000Z |
| msrc_cve-2021-3981 | A flaw in grub2 was found where its configuration file known as grub.cfg is being created with the wrong permission set allowing non privileged users to read its content. This represents a low severity confidentiality issue as those users can eventually read any encrypted passwords present in grub.cfg. This flaw affects grub2 2.06 and previous versions. This issue has been fixed in grub upstream but no version with the fix is currently released. | 2022-03-02T00:00:00.000Z | 2026-02-19T01:01:42.000Z |
| msrc_cve-2024-42067 | bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro() | 2024-07-01T07:00:00.000Z | 2026-02-19T01:01:33.000Z |
| msrc_cve-2021-3697 | A crafted JPEG image may lead the JPEG reader to underflow its data pointer allowing user-controlled data to be written in heap. To a successful to be performed the attacker needs to perform some triage over the heap layout and craft an image with a malicious format and payload. This vulnerability can lead to data corruption and eventual code execution or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12. | 2022-07-02T00:00:00.000Z | 2026-02-19T01:01:33.000Z |
| msrc_cve-2023-6476 | Cri-o: pods are able to break out of resource confinement on cgroupv2 | 2024-01-01T08:00:00.000Z | 2026-02-19T01:01:31.000Z |
| msrc_cve-2021-3696 | A heap out-of-bounds write may heppen during the handling of Huffman tables in the PNG reader. This may lead to data corruption in the heap space. Confidentiality Integrity and Availablity impact may be considered Low as it's very complex to an attacker control the encoding and positioning of corrupted Huffman entries to achieve results such as arbitrary code execution and/or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12. | 2022-07-02T00:00:00.000Z | 2026-02-19T01:01:26.000Z |
| msrc_cve-2021-3695 | A crafted 16-bit grayscale PNG image may lead to a out-of-bounds write in the heap area. An attacker may take advantage of that to cause heap data corruption or eventually arbitrary code execution and circumvent secure boot protections. This issue has a high complexity to be exploited as an attacker needs to perform some triage over the heap layout to achieve signifcant results also the values written into the memory are repeated three times in a row making difficult to produce valid payloads. This flaw affects grub2 versions prior grub-2.12. | 2022-07-02T00:00:00.000Z | 2026-02-19T01:01:20.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:0147-1 | Security update for mozjs102 | 2025-05-09T08:01:38Z | 2025-05-09T08:01:38Z |
| opensuse-su-2025:15074-1 | libmosquitto1-2.0.21-2.1 on GA media | 2025-05-09T00:00:00Z | 2025-05-09T00:00:00Z |
| opensuse-su-2025:15073-1 | chromedriver-136.0.7103.92-1.1 on GA media | 2025-05-09T00:00:00Z | 2025-05-09T00:00:00Z |
| opensuse-su-2025:15072-1 | bird3-3.1.0-1.1 on GA media | 2025-05-09T00:00:00Z | 2025-05-09T00:00:00Z |
| opensuse-su-2025:15071-1 | afterburn-5.7.0.git103.bae893c-1.1 on GA media | 2025-05-09T00:00:00Z | 2025-05-09T00:00:00Z |
| opensuse-su-2025:15070-1 | libevtlog-4_8-0-4.8.2-1.1 on GA media | 2025-05-08T00:00:00Z | 2025-05-08T00:00:00Z |
| opensuse-su-2025:15069-1 | sslh-2.2.3-1.1 on GA media | 2025-05-08T00:00:00Z | 2025-05-08T00:00:00Z |
| opensuse-su-2025:15068-1 | sequoia-octopus-librnp-1.11.0-2.1 on GA media | 2025-05-08T00:00:00Z | 2025-05-08T00:00:00Z |
| opensuse-su-2025:15067-1 | ruby3.4-rubygem-rack-2.2-2.2.14-1.1 on GA media | 2025-05-08T00:00:00Z | 2025-05-08T00:00:00Z |
| opensuse-su-2025:15066-1 | ldap-proxy-0.1.0~90-1.1 on GA media | 2025-05-08T00:00:00Z | 2025-05-08T00:00:00Z |
| opensuse-su-2025:15065-1 | wasm-bindgen-0.2.97~0-3.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15064-1 | transfig-3.2.9a-2.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15063-1 | tealdeer-1.7.1-2.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15062-1 | sccache-0.9.1~22-2.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15061-1 | rustup-1.28.1~0-2.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15060-1 | kanidm-1.6.0~git0.d7ae0f336-1.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15059-1 | govulncheck-vulndb-0.0.20250506T153719-1.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15058-1 | go1.24-1.24.3-1.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15057-1 | cargo-c-0.10.3~git0.ee7d7ef-3.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:15056-1 | 389-ds-3.1.2~git90.2bc7250be-1.1 on GA media | 2025-05-07T00:00:00Z | 2025-05-07T00:00:00Z |
| opensuse-su-2025:0145-1 | Security update for chromium | 2025-05-06T06:05:59Z | 2025-05-06T06:05:59Z |
| opensuse-su-2025:15055-1 | weblate-5.11.3-1.1 on GA media | 2025-05-06T00:00:00Z | 2025-05-06T00:00:00Z |
| opensuse-su-2025:15054-1 | rclone-1.69.2-1.1 on GA media | 2025-05-05T00:00:00Z | 2025-05-05T00:00:00Z |
| opensuse-su-2025:15053-1 | java-1_8_0-openjdk-1.8.0.452-1.1 on GA media | 2025-05-05T00:00:00Z | 2025-05-05T00:00:00Z |
| opensuse-su-2025:15052-1 | grafana-11.5.4-1.1 on GA media | 2025-05-05T00:00:00Z | 2025-05-05T00:00:00Z |
| opensuse-su-2025:15051-1 | chromedriver-136.0.7103.59-1.1 on GA media | 2025-05-04T00:00:00Z | 2025-05-04T00:00:00Z |
| opensuse-su-2025:15050-1 | audiofile-0.3.6-15.1 on GA media | 2025-05-03T00:00:00Z | 2025-05-03T00:00:00Z |
| opensuse-su-2025:15049-1 | tomcat10-10.1.40-1.1 on GA media | 2025-05-02T00:00:00Z | 2025-05-02T00:00:00Z |
| opensuse-su-2025:15048-1 | tomcat-9.0.104-1.1 on GA media | 2025-05-02T00:00:00Z | 2025-05-02T00:00:00Z |
| opensuse-su-2025:15047-1 | hauler-1.2.4-1.1 on GA media | 2025-05-02T00:00:00Z | 2025-05-02T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-152 | UNKNOWN READ in dissect_oran_c_section | 2023-03-07T13:00:13.697350Z | 2023-03-07T13:00:13.697607Z |
| osv-2023-151 | UNKNOWN READ in mrb_vm_find_method | 2023-03-06T13:02:13.813764Z | 2023-03-06T13:02:13.814007Z |
| osv-2023-118 | Heap-use-after-free in mrb_gc_mark | 2023-02-28T13:01:59.017116Z | 2023-02-28T13:01:59.017399Z |
| osv-2023-117 | Heap-buffer-overflow in isvcd_nal_byte_swap_emulation | 2023-02-28T13:00:09.095025Z | 2023-02-28T13:00:09.095333Z |
| osv-2023-106 | UNKNOWN WRITE in sudo_lbuf_append_quoted_v1 | 2023-02-24T13:02:18.928195Z | 2023-02-28T00:23:22.122155Z |
| osv-2023-113 | Stack-buffer-overflow in dump_stats | 2023-02-26T13:00:20.713773Z | 2023-02-26T13:00:20.714024Z |
| osv-2023-102 | Segv on unknown address in ndpi_free_flow_data | 2023-02-24T13:00:57.614600Z | 2023-02-24T13:00:57.614834Z |
| osv-2022-183 | Heap-buffer-overflow in evax_bfd_print_dst | 2022-02-21T00:01:49.508994Z | 2023-02-24T05:02:12.387302Z |
| osv-2021-736 | Stack-use-after-return in zend_fiber_suspend_context | 2021-05-08T00:00:26.963755Z | 2023-02-24T04:50:30.323847Z |
| osv-2021-1759 | Heap-use-after-free in zend_hash_reverse_apply | 2021-12-25T00:02:02.853767Z | 2023-02-24T04:23:14.413547Z |
| osv-2021-1780 | Heap-use-after-free in zend_jit_fetch_dim_r_helper | 2021-12-29T00:00:46.056980Z | 2023-02-24T03:23:57.223891Z |
| osv-2021-1217 | Heap-use-after-free in ZEND_FETCH_OBJ_R_SPEC_CV_CONST_INLINE_HANDLER | 2021-09-10T00:00:45.962198Z | 2023-02-24T03:01:07.611720Z |
| osv-2022-751 | Heap-buffer-overflow in gs_type2_interpret | 2022-08-20T00:00:12.956053Z | 2023-02-24T02:57:17.854976Z |
| osv-2020-2227 | Heap-buffer-overflow in ieeeNUMBER_fragment_hash | 2020-12-04T00:00:30.414831Z | 2023-02-24T02:37:08.122111Z |
| osv-2020-1928 | UNKNOWN READ in net_field_length_size | 2020-10-02T00:00:30.533072Z | 2023-02-24T02:33:10.821309Z |
| osv-2020-1577 | Heap-buffer-overflow in QPointF::x | 2020-08-04T00:00:33.938651Z | 2023-02-24T02:29:58.691557Z |
| osv-2020-1278 | Use-of-uninitialized-value in SampledFunction::SampledFunction | 2020-07-22T21:50:02.576507Z | 2023-02-24T02:26:34.919340Z |
| osv-2022-270 | Stack-buffer-overflow in fn_ElIn_evaluate | 2022-03-22T00:00:43.287274Z | 2023-02-24T02:22:05.985394Z |
| osv-2021-903 | UNKNOWN WRITE in QOutlineMapper::convertPath | 2021-06-27T00:01:31.379142Z | 2023-02-24T02:21:32.965558Z |
| osv-2023-88 | Stack-buffer-overflow in pdfi_read_cff_dict | 2023-02-21T13:00:14.009945Z | 2023-02-24T02:20:40.546212Z |
| osv-2020-2129 | Heap-double-free in wmem_simple_free_all | 2020-11-05T00:00:51.605889Z | 2023-02-24T02:20:16.266586Z |
| osv-2021-1236 | UNKNOWN READ in icu_70::UCharsTrie::branchNext | 2021-09-12T00:00:39.088726Z | 2023-02-24T02:18:55.717212Z |
| osv-2022-199 | Stack-buffer-overflow in check_user_password_preR5 | 2022-02-25T00:01:57.594646Z | 2023-02-24T02:18:08.648171Z |
| osv-2022-229 | UNKNOWN READ in spgetcc | 2022-03-09T00:01:43.021663Z | 2023-02-24T02:17:15.756244Z |
| osv-2022-351 | UNKNOWN READ in ref_stack_counttomark | 2022-04-16T00:01:10.988352Z | 2023-02-24T02:14:14.338741Z |
| osv-2020-143 | Heap-buffer-overflow in QSpecialInteger<QBigEndianStorageType<unsigned int> >::operator unsigned int | 2020-06-24T01:51:16.055970Z | 2023-02-24T02:09:45.849924Z |
| osv-2021-823 | UNKNOWN READ in FuzzedFileProvider::seek | 2021-06-03T00:01:12.500483Z | 2023-02-24T02:08:50.638741Z |
| osv-2022-1172 | UNKNOWN WRITE in instantiate_many::_::run::hb58bf0fc7b8817e5 | 2022-11-15T13:00:11.461532Z | 2023-02-24T02:08:37.177254Z |
| osv-2022-1089 | Heap-buffer-overflow in parse_subrip | 2022-10-25T00:01:12.330782Z | 2023-02-24T02:08:07.861198Z |
| osv-2022-1155 | UNKNOWN WRITE in wasmtime_fuzzing::oracles::instantiate_many::h1a28dda90c13f877 | 2022-11-08T13:02:21.272721Z | 2023-02-24T02:06:23.397295Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-drupal-2024-55636 | Drupal core - Less critical - Gadget chain - SA-CORE-2024-006 | 2025-06-03T14:41:23.754Z | 2025-06-03T15:16:07.023Z |
| bit-drupal-2024-55635 | Drupal core - Critical - Cross Site Scripting - SA-CORE-2024-005 | 2025-06-03T14:41:19.575Z | 2025-06-03T15:16:07.023Z |
| bit-drupal-2024-55634 | Drupal core - Moderately critical - Access bypass - SA-CORE-2024-004 | 2025-06-03T14:41:15.479Z | 2025-06-03T15:16:07.023Z |
| bit-drupal-2024-12393 | Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2024-003 | 2025-06-03T14:41:06.473Z | 2025-06-03T15:16:07.023Z |
| bit-drupal-2024-11942 | Drupal core - Moderately critical - Improper error handling - SA-CORE-2024-002 | 2025-06-03T14:41:02.265Z | 2025-06-03T15:16:07.023Z |
| bit-drupal-2024-11941 | Drupal core - Moderately critical - Denial of Service - SA-CORE-2024-001 | 2025-06-03T14:40:58.183Z | 2025-06-03T15:16:07.023Z |
| bit-gitlab-2025-3111 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-05-26T07:43:30.470Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-2853 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-05-26T07:43:29.030Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-1110 | Insufficient Granularity of Access Control in GitLab | 2025-05-26T07:43:07.324Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-0993 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-05-26T07:43:02.994Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-0679 | Exposure of Private Personal Information to an Unauthorized Actor in GitLab | 2025-05-26T07:43:00.261Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-0605 | Weak Authentication in GitLab | 2025-05-26T07:42:56.002Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2024-12093 | Improper Validation of Consistency within Input in GitLab | 2025-05-26T07:39:36.069Z | 2025-06-02T18:14:59.426Z |
| bit-moodle-2024-34009 | moodle: ReCAPTCHA can be bypassed on the login page | 2025-05-31T05:57:48.365Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-34007 | moodle: logout CSRF in admin/tool/mfa/auth.php | 2025-05-31T05:57:41.568Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-34006 | moodle: unsanitized HTML in site log for config_log_created | 2025-05-31T05:57:38.163Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-34001 | moodle: CSRF risk in admin preset tool management of presets | 2025-05-31T05:57:21.248Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-34000 | moodle: stored XSS in lesson overview report via user ID number | 2025-05-31T05:57:17.759Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-33999 | moodle: unsafe direct use of $_SERVER['HTTP_REFERER'] in admin/tool/mfa/index.php | 2025-05-31T05:57:14.246Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-33998 | moodle: stored XSS via user's name on participants page when opening some options | 2025-05-31T05:57:10.769Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-33997 | moodle: stored XSS risk when editing another user's equation in equation editor | 2025-05-31T05:57:07.361Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-33996 | moodle: broken access control when setting calendar event type | 2025-05-31T05:57:03.857Z | 2025-05-31T06:15:48.797Z |
| bit-varnish-2025-47905 | 2025-05-28T11:59:55.247Z | 2025-05-30T06:16:06.723Z | |
| bit-pytorch-2025-3001 | PyTorch torch.lstm_cell memory corruption | 2025-05-30T05:57:06.043Z | 2025-05-30T06:16:06.723Z |
| bit-pytorch-2025-3000 | PyTorch torch.jit.script memory corruption | 2025-05-30T05:57:02.547Z | 2025-05-30T06:16:06.723Z |
| bit-pytorch-2025-2999 | PyTorch torch.nn.utils.rnn.unpack_sequence memory corruption | 2025-05-30T05:56:59.244Z | 2025-05-30T06:16:06.723Z |
| bit-pytorch-2025-2998 | PyTorch torch.nn.utils.rnn.pad_packed_sequence memory corruption | 2025-05-30T05:56:55.766Z | 2025-05-30T06:16:06.723Z |
| bit-helm-2020-15187 | Duplicate plugin entries in Helm | 2024-03-06T10:54:49.674Z | 2025-05-30T06:16:06.723Z |
| bit-pytorch-2025-3730 | PyTorch LossCTC.cpp torch.nn.functional.ctc_loss denial of service | 2025-05-29T12:18:15.090Z | 2025-05-29T12:44:55.860Z |
| bit-pytorch-2025-3136 | PyTorch CUDACachingAllocator.cpp torch.cuda.memory.caching_allocator_delete memory corruption | 2025-05-29T12:17:56.494Z | 2025-05-29T12:44:55.860Z |
| ID | Description | Updated |
|---|---|---|
| var-201706-0361 | The error page mechanism of the Java Servlet Specification requires that, when an error o… | 2024-07-23T19:33:25.866000Z |
| var-201203-0193 | Google Chrome before 17.0.963.65 does not properly perform casts of unspecified variables… | 2024-07-23T19:33:19.436000Z |
| var-200901-0742 | WebKit in Apple Safari before 4.0 does not properly initialize memory for Attr DOM object… | 2024-07-23T19:33:19.956000Z |
| var-202206-1961 | When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification fa… | 2024-07-23T19:33:18.254000Z |
| var-202010-1295 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i… | 2024-07-23T19:33:18.082000Z |
| var-201110-0476 | Use-after-free vulnerability in Google Chrome before 15.0.874.102 allows remote attackers… | 2024-07-23T19:33:14.074000Z |
| var-201911-1410 | Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/mar… | 2024-07-23T19:33:13.621000Z |
| var-202301-0598 | Unproper laxist permissions on the temporary files used by MIME4J TempFileStorageProvider… | 2024-07-23T19:32:41.408000Z |
| var-202301-1527 | A carefully crafted If: request header can cause a memory read, or write of a single zero… | 2024-07-23T19:32:40.354000Z |
| var-202108-1268 | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in… | 2024-07-23T19:32:39.770000Z |
| var-201908-0260 | Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, poten… | 2024-07-23T19:32:07.732000Z |
| var-201203-0188 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2024-07-23T19:32:07.187000Z |
| var-201106-0131 | The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion be… | 2024-07-23T19:32:07.409000Z |
| var-201912-0594 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T19:32:03.577000Z |
| var-200107-0160 | Cisco VPN 3000 series concentrators before 2.5.2(F) allow remote attackers to cause a den… | 2024-07-23T19:32:03.511000Z |
| var-200608-0039 | Integer overflow in AFP Server for Apple Mac OS X 10.3.9 and 10.4.7 allows remote attacke… | 2024-07-23T19:32:02.215000Z |
| var-202205-1953 | A logic issue was addressed with improved state management. This issue is fixed in Securi… | 2024-07-23T19:32:01.924000Z |
| var-201904-1409 | A use after free issue was addressed with improved memory management. This issue affected… | 2024-07-23T19:31:57.625000Z |
| var-201503-0206 | Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP … | 2024-07-23T19:31:57.226000Z |
| var-201007-0943 | WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before… | 2024-07-23T19:31:56.966000Z |
| var-202109-0277 | A logic issue was addressed with improved state management. This issue is fixed in iTunes… | 2024-07-23T19:31:55.560000Z |
| var-201506-0464 | Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h i… | 2024-07-23T19:31:55.698000Z |
| var-201911-1627 | Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, … | 2024-07-23T19:31:48.093000Z |
| var-201503-0055 | The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 befor… | 2024-07-23T19:31:48.325000Z |
| var-200310-0072 | The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code… | 2024-07-23T19:31:47.530000Z |
| var-201901-1006 | In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 1… | 2024-07-23T19:31:09.960000Z |
| var-201707-1195 | An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari … | 2024-07-23T19:31:09.882000Z |
| var-202010-1236 | An access issue existed in Content Security Policy. This issue was addressed with improve… | 2024-07-23T19:31:07.854000Z |
| var-201108-0130 | The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not proper… | 2024-07-23T19:31:05.644000Z |
| var-202112-2539 | vim is vulnerable to Out-of-bounds Read. SourceCoster Online Covid Vaccination Scheduler … | 2024-07-23T19:31:04.059000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2018-000064 | Chrome Extension "5000 trillion yen converter" vulnerable to cross-site scripting | 2018-06-15T14:36+09:00 | 2018-06-15T14:36+09:00 |
| jvndb-2018-000031 | Multiple vulnerabilities in Cybozu Garoon | 2018-04-09T14:27+09:00 | 2018-06-14T14:33+09:00 |
| jvndb-2018-000026 | iRemoconWiFi App for Android fails to verify SSL server certificates | 2018-03-27T13:40+09:00 | 2018-06-14T14:29+09:00 |
| jvndb-2018-000034 | Tenable Appliance vulnerable to cross-site scripting | 2018-04-12T14:33+09:00 | 2018-06-14T14:20+09:00 |
| jvndb-2018-000030 | Installer of SoundEngine Free may insecurely load Dynamic Link Libraries | 2018-04-13T13:52+09:00 | 2018-06-14T14:16+09:00 |
| jvndb-2018-000906 | TinyFTP Daemon vulnerable to buffer overflow | 2018-03-13T16:48+09:00 | 2018-06-14T14:12+09:00 |
| jvndb-2018-000027 | Multiple vulnerabilities in WZR-1750DHP2 | 2018-03-29T13:52+09:00 | 2018-06-14T14:12+09:00 |
| jvndb-2018-000028 | LXR vulnerable to OS command injection | 2018-03-29T14:00+09:00 | 2018-06-14T14:08+09:00 |
| jvndb-2018-000903 | QQQ SYSTEMS vulnerable to cross-site scripting | 2018-03-13T16:43+09:00 | 2018-06-14T14:03+09:00 |
| jvndb-2018-000029 | Safari vulnerable to script injection | 2018-03-30T13:39+09:00 | 2018-06-14T14:02+09:00 |
| jvndb-2018-000900 | ArsenoL vulnerable to cross-site scripting | 2018-03-13T16:46+09:00 | 2018-06-14T13:58+09:00 |
| jvndb-2018-000019 | Multiple vulnerabilities in Jubatus | 2018-03-02T13:45+09:00 | 2018-06-14T13:57+09:00 |
| jvndb-2018-000904 | PHP 2chBBS vulnerable to cross-site scripting | 2018-03-13T16:47+09:00 | 2018-06-14T13:55+09:00 |
| jvndb-2018-000024 | Multiple vulnerabilities in CG-WGR1200 | 2018-03-09T13:56+09:00 | 2018-06-14T13:54+09:00 |
| jvndb-2018-000907 | QQQ SYSTEMS vulnerable to arbitrary command injection | 2018-03-13T16:43+09:00 | 2018-06-14T13:53+09:00 |
| jvndb-2018-000905 | ViX may insecurely load Dynamic Link Libraries | 2018-03-13T16:48+09:00 | 2018-06-14T13:52+09:00 |
| jvndb-2018-000908 | WebProxy vulnerable to directory traversal | 2018-03-13T16:48+09:00 | 2018-06-14T13:51+09:00 |
| jvndb-2018-000017 | Multiple vulnerabilities in WXR-1900DHP2 | 2018-02-26T14:10+09:00 | 2018-06-14T13:49+09:00 |
| jvndb-2018-000008 | Spring Security and Spring Framework vulnerable to authentication bypass | 2018-02-02T12:28+09:00 | 2018-06-14T13:48+09:00 |
| jvndb-2018-000020 | Installer of JTrim may insecurely load Dynamic Link Libraries | 2018-03-05T14:07+09:00 | 2018-06-14T13:46+09:00 |
| jvndb-2018-000025 | The installer of PhishWall Client Firefox and Chrome edition for Windows may insecurely load Dynamic Link Libraries | 2018-03-15T13:38+09:00 | 2018-06-14T13:43+09:00 |
| jvndb-2018-000021 | Installer of WinShot may insecurely load Dynamic Link Libraries | 2018-03-05T15:10+09:00 | 2018-06-14T13:43+09:00 |
| jvndb-2018-000902 | QQQ SYSTEMS vulnerable to cross-site scripting | 2018-03-13T16:43+09:00 | 2018-06-14T13:39+09:00 |
| jvndb-2018-000901 | QQQ SYSTEMS vulnerable to cross-site scripting | 2018-03-13T16:43+09:00 | 2018-06-14T12:31+09:00 |
| jvndb-2018-000023 | WordPress plugin "WP All Import" vulnerable to cross-site scripting | 2018-03-08T14:10+09:00 | 2018-06-14T12:27+09:00 |
| jvndb-2018-000022 | WordPress plugin "WP All Import" vulnerable to cross-site scripting | 2018-03-08T14:10+09:00 | 2018-06-14T12:26+09:00 |
| jvndb-2018-000016 | LINE for iOS fails to verify SSL server certificates | 2018-02-22T15:29+09:00 | 2018-06-14T12:23+09:00 |
| jvndb-2018-000062 | Local File Inclusion vulnerability in Zenphoto | 2018-06-13T15:11+09:00 | 2018-06-13T15:11+09:00 |
| jvndb-2018-000063 | LINE for Windows may insecurely load Dynamic Link Libraries | 2018-06-12T14:44+09:00 | 2018-06-12T14:44+09:00 |
| jvndb-2018-000061 | H2O vulnerable to buffer overflow | 2018-06-04T14:10+09:00 | 2018-06-04T14:10+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:03466-1 | Security update for rubygem-puma | 2025-10-07T11:33:53Z | 2025-10-07T11:33:53Z |
| suse-su-2025:03465-1 | Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6) | 2025-10-07T08:23:42Z | 2025-10-07T08:23:42Z |
| suse-su-2025:03464-1 | Security update for openssl-1_0_0 | 2025-10-07T07:49:26Z | 2025-10-07T07:49:26Z |
| suse-su-2025:03463-1 | Security update for openssl-1_1 | 2025-10-07T07:48:32Z | 2025-10-07T07:48:32Z |
| suse-su-2025:03462-1 | Security update for MozillaFirefox | 2025-10-07T07:46:27Z | 2025-10-07T07:46:27Z |
| suse-su-2025:03461-1 | Security update for ghostscript | 2025-10-07T07:37:02Z | 2025-10-07T07:37:02Z |
| suse-su-2025:03460-1 | Security update for ghostscript | 2025-10-07T07:35:51Z | 2025-10-07T07:35:51Z |
| suse-su-2025:03459-1 | Security update for gstreamer-plugins-rs | 2025-10-07T07:35:31Z | 2025-10-07T07:35:31Z |
| suse-su-2025:03457-1 | Security update for python-xmltodict | 2025-10-07T07:15:54Z | 2025-10-07T07:15:54Z |
| suse-su-2025:03456-1 | Security update for logback | 2025-10-07T07:08:23Z | 2025-10-07T07:08:23Z |
| suse-su-2025:03453-1 | Security update for frr | 2025-10-03T10:41:01Z | 2025-10-03T10:41:01Z |
| suse-su-2025:03450-1 | Security update for cairo | 2025-10-02T07:15:39Z | 2025-10-02T07:15:39Z |
| suse-su-2025:03449-1 | Security update for cairo | 2025-10-02T07:15:18Z | 2025-10-02T07:15:18Z |
| suse-su-2025:03448-1 | Security update for warewulf4 | 2025-10-02T07:14:58Z | 2025-10-02T07:14:58Z |
| suse-su-2025:03447-1 | Security update for MozillaFirefox | 2025-10-02T07:14:09Z | 2025-10-02T07:14:09Z |
| suse-su-2025:03446-1 | Security update for python-Django | 2025-10-02T07:13:00Z | 2025-10-02T07:13:00Z |
| suse-su-2025:20805-1 | Security update for podman | 2025-10-01T13:49:25Z | 2025-10-01T13:49:25Z |
| suse-su-2025:20804-1 | Security update for bluez | 2025-10-01T13:47:55Z | 2025-10-01T13:47:55Z |
| suse-su-2025:03445-1 | Security update for snpguest | 2025-10-01T13:09:59Z | 2025-10-01T13:09:59Z |
| suse-su-2025:03444-1 | Security update for nginx | 2025-10-01T12:42:59Z | 2025-10-01T12:42:59Z |
| suse-su-2025:03443-1 | Security update for openssl-1_1 | 2025-09-30T14:54:55Z | 2025-09-30T14:54:55Z |
| suse-su-2025:03442-1 | Security update for openssl-3 | 2025-09-30T14:54:06Z | 2025-09-30T14:54:06Z |
| suse-su-2025:03441-1 | Security update for openssl-3 | 2025-09-30T14:53:31Z | 2025-09-30T14:53:31Z |
| suse-su-2025:03440-1 | Security update for openssl-1_1 | 2025-09-30T14:52:02Z | 2025-09-30T14:52:02Z |
| suse-su-2025:03439-1 | Security update for openssl-3 | 2025-09-30T14:50:34Z | 2025-09-30T14:50:34Z |
| suse-su-2025:03438-1 | Security update for openssl-1_1 | 2025-09-30T14:37:52Z | 2025-09-30T14:37:52Z |
| suse-su-2025:03437-1 | Security update for openssl-1_1 | 2025-09-30T14:37:06Z | 2025-09-30T14:37:06Z |
| suse-su-2025:03436-1 | Security update for open-vm-tools | 2025-09-30T14:10:11Z | 2025-09-30T14:10:11Z |
| suse-su-2025:03435-1 | Security update for open-vm-tools | 2025-09-30T14:09:51Z | 2025-09-30T14:09:51Z |
| suse-su-2025:03434-1 | Security update for open-vm-tools | 2025-09-30T14:08:15Z | 2025-09-30T14:08:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-31105 | Online Birth Certificate System /registered-users.php文件SQL注入漏洞 | 2025-06-06 | 2025-12-22 |
| cnvd-2025-31104 | Advantech WebAccess/VPN命令注入漏洞 | 2025-11-11 | 2025-12-22 |
| cnvd-2025-31103 | Advantech WebAccess/VPN绝对路径遍历漏洞 | 2025-11-11 | 2025-12-22 |
| cnvd-2025-31102 | News Portal login.php文件SQL注入漏洞 | 2025-03-07 | 2025-12-22 |
| cnvd-2025-31101 | News Portal /index.php文件SQL注入漏洞 | 2025-05-22 | 2025-12-22 |
| cnvd-2025-31100 | News Portal Project /contactus.php文件SQL注入漏洞 | 2025-05-22 | 2025-12-22 |
| cnvd-2025-31099 | News Portal /aboutus.php文件SQL注入漏洞 | 2025-05-22 | 2025-12-22 |
| cnvd-2025-31098 | News Portal /forgot-password.php文件SQL注入漏洞 | 2025-06-06 | 2025-12-22 |
| cnvd-2025-31070 | Advantech WebAccess/VPN StandaloneVpnClientsController.addStandaloneVpnClientAction函数跨站脚本漏洞 | 2025-11-11 | 2025-12-19 |
| cnvd-2025-31069 | Advantech WebAccess/VPN NetworksController.addNetworkAction函数跨站脚本漏洞 | 2025-11-11 | 2025-12-19 |
| cnvd-2025-31068 | Advantech WebAccess/VPN AjaxFwRulesController.ajaxNetworkFwRulesAction函数SQL注入漏洞 | 2025-11-11 | 2025-12-19 |
| cnvd-2025-31067 | Advantech WebAccess/VPN AjaxFwRulesController.ajaxDeviceFwRulesAction函数SQL注入漏洞 | 2025-11-11 | 2025-12-19 |
| cnvd-2025-31066 | Advantech WebAccess/VPN AjaxDeviceController.ajaxDeviceAction函数SQL注入漏洞 | 2025-11-11 | 2025-12-19 |
| cnvd-2025-31065 | Advantech iView SQL注入漏洞(CNVD-2025-31065) | 2025-11-11 | 2025-12-19 |
| cnvd-2025-31064 | Advantech iView SQL注入漏洞(CNVD-2025-31064) | 2025-11-11 | 2025-12-19 |
| cnvd-2025-31063 | Advantech iView SQL注入漏洞(CNVD-2025-31063) | 2025-11-11 | 2025-12-19 |
| cnvd-2025-31062 | Advantech iView SQL注入漏洞(CNVD-2025-31062) | 2025-11-11 | 2025-12-19 |
| cnvd-2025-31061 | Advantech iView SQL注入漏洞(CNVD-2025-31061) | 2025-11-11 | 2025-12-19 |
| cnvd-2025-31112 | Online Birth Certificate System不安全的直接对象引用漏洞 | 2024-12-19 | 2025-12-18 |
| cnvd-2025-31111 | Online Birth Certificate System未授权访问漏洞 | 2024-12-20 | 2025-12-18 |
| cnvd-2025-31110 | Online Birth Certificate System /user/certificate-form.php文件跨站脚本漏洞 | 2024-12-20 | 2025-12-18 |
| cnvd-2025-31109 | Online Birth Certificate System HTML注入漏洞 | 2024-12-20 | 2025-12-18 |
| cnvd-2025-31108 | Online Birth Certificate System /user/certificate-form.php文件跨站脚本漏洞 | 2025-02-18 | 2025-12-18 |
| cnvd-2025-31008 | Credit Card Application Management System跨站脚本漏洞 | 2025-05-22 | 2025-12-18 |
| cnvd-2025-31007 | Credit Card Application Management System SQL注入漏洞 | 2025-05-22 | 2025-12-18 |
| cnvd-2025-31006 | Daily Expense Tracker System跨站脚本漏洞(CNVD-2025-31006) | 2021-02-03 | 2025-12-18 |
| cnvd-2025-31005 | Daily Expense Tracker System跨站脚本漏洞(CNVD-2025-31005) | 2021-02-03 | 2025-12-18 |
| cnvd-2025-31004 | Daily Expense Tracker System SQL注入漏洞(CNVD-2025-31004) | 2025-02-17 | 2025-12-18 |
| cnvd-2025-31003 | Daily Expense Tracker System SQL注入漏洞(CNVD-2025-31003) | 2025-02-17 | 2025-12-18 |
| cnvd-2025-31002 | Daily Expense Tracker System SQL注入漏洞(CNVD-2025-31002) | 2025-05-22 | 2025-12-18 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0696 | Vulnérabilité dans Spring Framework | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0695 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0694 | Vulnérabilité dans Apache Tomcat | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0693 | Multiples vulnérabilités dans VMware Tanzu | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0692 | Multiples vulnérabilités dans Ruby on Rails | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0691 | Vulnérabilité dans Nginx | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| CERTFR-2025-AVI-0701 | Vulnérabilité dans IBM WebSphere | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| CERTFR-2025-AVI-0700 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| CERTFR-2025-AVI-0699 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| CERTFR-2025-AVI-0698 | Multiples vulnérabilités dans le noyau Linux de Debian | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| CERTFR-2025-AVI-0697 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| CERTFR-2025-AVI-0696 | Vulnérabilité dans Spring Framework | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| CERTFR-2025-AVI-0695 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| CERTFR-2025-AVI-0694 | Vulnérabilité dans Apache Tomcat | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| CERTFR-2025-AVI-0693 | Multiples vulnérabilités dans VMware Tanzu | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| CERTFR-2025-AVI-0692 | Multiples vulnérabilités dans Ruby on Rails | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| CERTFR-2025-AVI-0691 | Vulnérabilité dans Nginx | 2025-08-14T00:00:00.000000 | 2025-08-14T00:00:00.000000 |
| certfr-2025-avi-0690 | Multiples vulnérabilités dans GitLab | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0689 | Multiples vulnérabilités dans les produits Microsoft | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0688 | Multiples vulnérabilités dans Microsoft Azure | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0687 | Multiples vulnérabilités dans Microsoft Windows | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0686 | Multiples vulnérabilités dans Microsoft Office | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0685 | Multiples vulnérabilités dans Microsoft Edge | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0684 | Multiples vulnérabilités dans les produits Intel | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0683 | Multiples vulnérabilités dans les produits Ivanti | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0682 | Multiples vulnérabilités dans Liferay | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0681 | Multiples vulnérabilités dans Google Chrome | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0680 | Multiples vulnérabilités dans les produits FoxIT | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0679 | Multiples vulnérabilités dans les produits Fortinet | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |
| certfr-2025-avi-0678 | Multiples vulnérabilités dans les produits Adobe | 2025-08-13T00:00:00.000000 | 2025-08-13T00:00:00.000000 |