Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2521 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SGW-C sgwc_s5c_handle_create_session_response … |
n/a |
Open5GS |
2026-02-15T23:02:07.287Z | 2026-02-15T23:02:07.287Z |
| CVE-2026-26369 |
9.3 (4.0)
9.8 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Privilege Esca… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:56.204Z | 2026-02-15T15:29:56.204Z |
| CVE-2026-26368 |
8.7 (4.0)
8.8 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Account Takeov… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:55.403Z | 2026-02-15T15:29:55.403Z |
| CVE-2026-26367 |
7.1 (4.0)
6.5 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Arbitrary User… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:54.646Z | 2026-02-15T15:29:54.646Z |
| CVE-2026-26366 |
9.3 (4.0)
9.8 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:53.866Z | 2026-02-15T15:29:53.866Z |
| CVE-2019-25377 |
4.8 (4.0)
5.4 (3.1)
|
OPNsense 19.1 Reflected XSS via system_advanced_sysctl.php |
Opnsense |
OPNsense |
2026-02-15T13:58:58.193Z | 2026-02-15T13:58:58.193Z |
| CVE-2019-25376 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via proxy endpoint |
Opnsense |
OPNsense |
2026-02-15T13:58:57.461Z | 2026-02-15T13:58:57.461Z |
| CVE-2019-25375 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via monit interface |
Opnsense |
OPNsense |
2026-02-15T13:58:56.731Z | 2026-02-15T13:58:56.731Z |
| CVE-2019-25374 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via vpn_ipsec_settings.php |
Opnsense |
OPNsense |
2026-02-15T13:58:55.932Z | 2026-02-15T13:58:55.932Z |
| CVE-2019-25373 |
5.1 (4.0)
6.4 (3.1)
|
OPNsense 19.1 Stored XSS via firewall_rules_edit.php |
Opnsense |
OPNsense |
2026-02-15T13:58:55.157Z | 2026-02-15T13:58:55.157Z |
| CVE-2019-25372 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via diag_traceroute.php |
Opnsense |
OPNsense |
2026-02-15T13:58:54.354Z | 2026-02-15T13:58:54.354Z |
| CVE-2019-25371 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via diag_ping.php |
Opnsense |
OPNsense |
2026-02-15T13:58:53.595Z | 2026-02-15T13:58:53.595Z |
| CVE-2019-25370 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via interfaces_vlan_edit.php |
Opnsense |
OPNsense |
2026-02-15T13:58:52.849Z | 2026-02-15T13:58:52.849Z |
| CVE-2019-25369 |
5.1 (4.0)
6.4 (3.1)
|
OPNsense 19.1 Stored XSS via system_advanced_sysctl.php |
Opnsense |
OPNsense |
2026-02-15T13:58:52.074Z | 2026-02-15T13:58:52.074Z |
| CVE-2019-25368 |
4.8 (4.0)
5.4 (3.1)
|
OPNsense 19.1 Reflected XSS via diag_backup.php |
Opnsense |
OPNsense |
2026-02-15T13:58:51.292Z | 2026-02-15T13:58:51.292Z |
| CVE-2019-25367 |
4.8 (4.0)
5.4 (3.1)
|
ArangoDB Community Edition 3.4.2-1 XSS via aardvark ad… |
Arangodb |
ArangoDB Community Edition |
2026-02-15T13:58:50.426Z | 2026-02-15T13:58:50.426Z |
| CVE-2026-2517 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SMF types.c ogs_gtp2_parse_tft denial of service |
n/a |
Open5GS |
2026-02-15T12:32:08.127Z | 2026-02-15T12:32:08.127Z |
| CVE-2026-2516 |
7.3 (4.0)
7 (3.1)
7 (3.0)
|
Unidocs ezPDF DRM Reader/ezPDF Reader SHFOLDER.dll unc… |
Unidocs |
ezPDF DRM Reader |
2026-02-15T12:02:06.101Z | 2026-02-15T12:02:06.101Z |
| CVE-2026-2541 |
6.4 (4.0)
|
Micca KE700 Brute-force vulnerability due to low entropy |
Micca Auto Electronics Co., Ltd. |
Car Alarm System KE700 |
2026-02-15T11:07:40.539Z | 2026-02-15T11:07:40.539Z |
| CVE-2026-2540 |
8.4 (4.0)
|
Micca KE700 Acceptance of previously used rolling codes |
Micca Auto Electronics Co., Ltd. |
Car Alarm System KE700 |
2026-02-15T11:03:26.051Z | 2026-02-15T11:03:26.051Z |
| CVE-2026-2539 |
5.7 (4.0)
|
Micca KE700 Cleartext transmission of key fob ID |
Micca Auto Electronics Co., Ltd. |
Car Alarm System KE700 |
2026-02-15T10:58:38.397Z | 2026-02-15T10:58:38.397Z |
| CVE-2025-32063 |
6.8 (3.1)
|
Enabling SSH server on Infotainment ECU |
Bosch |
Infotainment system ECU |
2026-02-15T10:48:34.125Z | 2026-02-15T10:48:34.125Z |
| CVE-2025-32062 |
8.8 (3.1)
|
Stack Buffer Overflow leading to RCE in Bluetooth stac… |
Bosch |
Infotainment system ECU |
2026-02-15T10:47:57.740Z | 2026-02-15T10:47:57.740Z |
| CVE-2025-32061 |
8.8 (3.1)
|
Stack Buffer Overflow leading to RCE in Bluetooth stac… |
Bosch |
Infotainment system ECU |
2026-02-15T10:47:15.555Z | 2026-02-15T10:47:15.555Z |
| CVE-2025-32060 |
6.7 (3.1)
|
Absence of Kernel Module Signature Verification on Lin… |
Bosch |
Infotainment system ECU |
2026-02-15T10:46:23.570Z | 2026-02-15T10:46:23.570Z |
| CVE-2025-32059 |
8.8 (3.1)
|
Stack Buffer Overflow leading to RCE in Bluetooth stac… |
Bosch |
Infotainment system ECU |
2026-02-15T10:45:42.900Z | 2026-02-15T10:45:42.900Z |
| CVE-2025-32058 |
9.3 (3.1)
|
Stack Overflow in processing requests over INC interfa… |
Bosch |
Infotainment system ECU |
2026-02-15T10:44:48.125Z | 2026-02-15T10:44:48.125Z |
| CVE-2026-1793 |
6.5 (3.1)
|
Element Pack Addons for Elementor <= 8.3.17 - Authenti… |
bdthemes |
Element Pack Addons for Elementor |
2026-02-15T03:24:34.335Z | 2026-02-15T03:24:34.335Z |
| CVE-2026-1750 |
8.8 (3.1)
|
Ecwid by Lightspeed Ecommerce Shopping Cart <= 7.0.7 -… |
ecwid |
Ecwid by Lightspeed Ecommerce Shopping Cart |
2026-02-15T03:24:33.787Z | 2026-02-15T03:24:33.787Z |
| CVE-2026-1490 |
9.8 (3.1)
|
Spam protection, Honeypot, Anti-Spam by CleanTalk <= 6… |
cleantalk |
Spam protection, Honeypot, Anti-Spam by CleanTalk |
2026-02-15T02:22:56.673Z | 2026-02-15T02:22:56.673Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-32062 |
8.8 (3.1)
|
Stack Buffer Overflow leading to RCE in Bluetooth stac… |
Bosch |
Infotainment system ECU |
2026-02-15T10:47:57.740Z | 2026-02-15T10:47:57.740Z |
| CVE-2025-32061 |
8.8 (3.1)
|
Stack Buffer Overflow leading to RCE in Bluetooth stac… |
Bosch |
Infotainment system ECU |
2026-02-15T10:47:15.555Z | 2026-02-15T10:47:15.555Z |
| CVE-2025-32060 |
6.7 (3.1)
|
Absence of Kernel Module Signature Verification on Lin… |
Bosch |
Infotainment system ECU |
2026-02-15T10:46:23.570Z | 2026-02-15T10:46:23.570Z |
| CVE-2025-32059 |
8.8 (3.1)
|
Stack Buffer Overflow leading to RCE in Bluetooth stac… |
Bosch |
Infotainment system ECU |
2026-02-15T10:45:42.900Z | 2026-02-15T10:45:42.900Z |
| CVE-2025-32058 |
9.3 (3.1)
|
Stack Overflow in processing requests over INC interfa… |
Bosch |
Infotainment system ECU |
2026-02-15T10:44:48.125Z | 2026-02-15T10:44:48.125Z |
| CVE-2026-1793 |
6.5 (3.1)
|
Element Pack Addons for Elementor <= 8.3.17 - Authenti… |
bdthemes |
Element Pack Addons for Elementor |
2026-02-15T03:24:34.335Z | 2026-02-15T03:24:34.335Z |
| CVE-2026-1750 |
8.8 (3.1)
|
Ecwid by Lightspeed Ecommerce Shopping Cart <= 7.0.7 -… |
ecwid |
Ecwid by Lightspeed Ecommerce Shopping Cart |
2026-02-15T03:24:33.787Z | 2026-02-15T03:24:33.787Z |
| CVE-2026-1490 |
9.8 (3.1)
|
Spam protection, Honeypot, Anti-Spam by CleanTalk <= 6… |
cleantalk |
Spam protection, Honeypot, Anti-Spam by CleanTalk |
2026-02-15T02:22:56.673Z | 2026-02-15T02:22:56.673Z |
| CVE-2026-23766 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. | N/A | N/A | 2026-01-15T19:18:50.806Z | 2026-02-14T17:44:48.692Z |
| CVE-2026-23210 |
N/A
|
ice: Fix PTP NULL pointer dereference during VSI rebuild |
Linux |
Linux |
2026-02-14T16:27:31.892Z | 2026-02-14T16:27:31.892Z |
| CVE-2026-23209 |
N/A
|
macvlan: fix error recovery in macvlan_common_newlink() |
Linux |
Linux |
2026-02-14T16:27:31.175Z | 2026-02-14T16:27:31.175Z |
| CVE-2026-23207 |
N/A
|
spi: tegra210-quad: Protect curr_xfer check in IRQ handler |
Linux |
Linux |
2026-02-14T16:27:29.762Z | 2026-02-14T16:27:29.762Z |
| CVE-2026-23206 |
N/A
|
dpaa2-switch: prevent ZERO_SIZE_PTR dereference when n… |
Linux |
Linux |
2026-02-14T16:27:29.095Z | 2026-02-14T16:27:29.095Z |
| CVE-2026-23205 |
N/A
|
smb/client: fix memory leak in smb2_open_file() |
Linux |
Linux |
2026-02-14T16:27:28.409Z | 2026-02-14T16:27:28.409Z |
| CVE-2026-23204 |
N/A
|
net/sched: cls_u32: use skb_header_pointer_careful() |
Linux |
Linux |
2026-02-14T16:27:27.708Z | 2026-02-14T16:27:27.708Z |
| CVE-2026-23203 |
N/A
|
net: cpsw_new: Execute ndo_set_rx_mode callback in a w… |
Linux |
Linux |
2026-02-14T16:27:27.048Z | 2026-02-14T16:27:27.048Z |
| CVE-2026-23202 |
N/A
|
spi: tegra210-quad: Protect curr_xfer in tegra_qspi_co… |
Linux |
Linux |
2026-02-14T16:27:26.365Z | 2026-02-14T16:27:26.365Z |
| CVE-2026-23201 |
N/A
|
ceph: fix oops due to invalid pointer for kfree() in p… |
Linux |
Linux |
2026-02-14T16:27:25.693Z | 2026-02-14T16:27:25.693Z |
| CVE-2026-23200 |
N/A
|
ipv6: Fix ECMP sibling count mismatch when clearing RT… |
Linux |
Linux |
2026-02-14T16:27:25.025Z | 2026-02-14T16:27:25.025Z |
| CVE-2026-23199 |
N/A
|
procfs: avoid fetching build ID while holding VMA lock |
Linux |
Linux |
2026-02-14T16:27:24.326Z | 2026-02-14T16:27:24.326Z |
| CVE-2026-23198 |
N/A
|
KVM: Don't clobber irqfd routing type when deassigning irqfd |
Linux |
Linux |
2026-02-14T16:27:23.621Z | 2026-02-14T16:27:23.621Z |
| CVE-2026-23197 |
N/A
|
i2c: imx: preserve error state in block data length handler |
Linux |
Linux |
2026-02-14T16:27:22.919Z | 2026-02-14T16:27:22.919Z |
| CVE-2026-23196 |
N/A
|
HID: Intel-thc-hid: Intel-thc: Add safety check for re… |
Linux |
Linux |
2026-02-14T16:27:22.264Z | 2026-02-16T08:58:57.510Z |
| CVE-2026-23195 |
N/A
|
cgroup/dmem: avoid pool UAF |
Linux |
Linux |
2026-02-14T16:27:21.621Z | 2026-02-14T16:27:21.621Z |
| CVE-2026-23194 |
N/A
|
rust_binder: correctly handle FDA objects of length zero |
Linux |
Linux |
2026-02-14T16:27:20.944Z | 2026-02-14T16:27:20.944Z |
| CVE-2026-23193 |
N/A
|
scsi: target: iscsi: Fix use-after-free in iscsit_dec_… |
Linux |
Linux |
2026-02-14T16:27:20.251Z | 2026-02-16T08:58:56.360Z |
| CVE-2026-23192 |
N/A
|
linkwatch: use __dev_put() in callers to prevent UAF |
Linux |
Linux |
2026-02-14T16:27:19.557Z | 2026-02-14T16:27:19.557Z |
| CVE-2026-23191 |
N/A
|
ALSA: aloop: Fix racy access at PCM trigger |
Linux |
Linux |
2026-02-14T16:27:18.882Z | 2026-02-16T08:58:55.176Z |
| CVE-2026-23190 |
N/A
|
ASoC: amd: fix memory leak in acp3x pdm dma ops |
Linux |
Linux |
2026-02-14T16:27:18.203Z | 2026-02-14T16:27:18.203Z |
| CVE-2026-23189 |
N/A
|
ceph: fix NULL pointer dereference in ceph_mds_auth_match() |
Linux |
Linux |
2026-02-14T16:27:17.549Z | 2026-02-14T16:27:17.549Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-32062 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T11:15:54.307 | 2026-02-15T11:15:54.307 |
| fkie_cve-2025-32061 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T11:15:54.170 | 2026-02-15T11:15:54.170 |
| fkie_cve-2025-32060 | The system suffers from the absence of a kernel module signature verification. If an attacker can e… | 2026-02-15T11:15:54.023 | 2026-02-15T11:15:54.023 |
| fkie_cve-2025-32059 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T11:15:53.880 | 2026-02-15T11:15:53.880 |
| fkie_cve-2025-32058 | The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is conn… | 2026-02-15T11:15:52.773 | 2026-02-15T11:15:52.773 |
| fkie_cve-2026-1793 | The Element Pack Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in… | 2026-02-15T04:15:54.260 | 2026-02-15T04:15:54.260 |
| fkie_cve-2026-1750 | The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Esc… | 2026-02-15T04:15:54.113 | 2026-02-15T04:15:54.113 |
| fkie_cve-2026-1490 | The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unautho… | 2026-02-15T04:15:53.783 | 2026-02-15T04:15:53.783 |
| fkie_cve-2026-23766 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2026-01-15T20:16:06.057 | 2026-02-14T18:16:10.087 |
| fkie_cve-2026-23210 | In the Linux kernel, the following vulnerability has been resolved: ice: Fix PTP NULL pointer dere… | 2026-02-14T17:15:58.910 | 2026-02-14T17:15:58.910 |
| fkie_cve-2026-23209 | In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in… | 2026-02-14T17:15:58.803 | 2026-02-14T17:15:58.803 |
| fkie_cve-2026-23207 | In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect cu… | 2026-02-14T17:15:58.610 | 2026-02-14T17:15:58.610 |
| fkie_cve-2026-23206 | In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: prevent ZERO_SIZ… | 2026-02-14T17:15:58.507 | 2026-02-14T17:15:58.507 |
| fkie_cve-2026-23205 | In the Linux kernel, the following vulnerability has been resolved: smb/client: fix memory leak in… | 2026-02-14T17:15:58.403 | 2026-02-14T17:15:58.403 |
| fkie_cve-2026-23204 | In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_he… | 2026-02-14T17:15:58.297 | 2026-02-14T17:15:58.297 |
| fkie_cve-2026-23203 | In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set… | 2026-02-14T17:15:58.177 | 2026-02-14T17:15:58.177 |
| fkie_cve-2026-23202 | In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect cu… | 2026-02-14T17:15:58.050 | 2026-02-14T17:15:58.050 |
| fkie_cve-2026-23201 | In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid … | 2026-02-14T17:15:57.950 | 2026-02-14T17:15:57.950 |
| fkie_cve-2026-23200 | In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix ECMP sibling count m… | 2026-02-14T17:15:57.847 | 2026-02-14T17:15:57.847 |
| fkie_cve-2026-23199 | In the Linux kernel, the following vulnerability has been resolved: procfs: avoid fetching build I… | 2026-02-14T17:15:57.743 | 2026-02-14T17:15:57.743 |
| fkie_cve-2026-23198 | In the Linux kernel, the following vulnerability has been resolved: KVM: Don't clobber irqfd routi… | 2026-02-14T17:15:57.640 | 2026-02-14T17:15:57.640 |
| fkie_cve-2026-23197 | In the Linux kernel, the following vulnerability has been resolved: i2c: imx: preserve error state… | 2026-02-14T17:15:57.540 | 2026-02-14T17:15:57.540 |
| fkie_cve-2026-23196 | In the Linux kernel, the following vulnerability has been resolved: HID: Intel-thc-hid: Intel-thc:… | 2026-02-14T17:15:57.440 | 2026-02-14T17:15:57.440 |
| fkie_cve-2026-23195 | In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: avoid pool UAF A… | 2026-02-14T17:15:57.337 | 2026-02-14T17:15:57.337 |
| fkie_cve-2026-23194 | In the Linux kernel, the following vulnerability has been resolved: rust_binder: correctly handle … | 2026-02-14T17:15:57.233 | 2026-02-14T17:15:57.233 |
| fkie_cve-2026-23193 | In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-a… | 2026-02-14T17:15:57.123 | 2026-02-14T17:15:57.123 |
| fkie_cve-2026-23192 | In the Linux kernel, the following vulnerability has been resolved: linkwatch: use __dev_put() in … | 2026-02-14T17:15:57.020 | 2026-02-14T17:15:57.020 |
| fkie_cve-2026-23191 | In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access a… | 2026-02-14T17:15:56.917 | 2026-02-14T17:15:56.917 |
| fkie_cve-2026-23190 | In the Linux kernel, the following vulnerability has been resolved: ASoC: amd: fix memory leak in … | 2026-02-14T17:15:56.810 | 2026-02-14T17:15:56.810 |
| fkie_cve-2026-23189 | In the Linux kernel, the following vulnerability has been resolved: ceph: fix NULL pointer derefer… | 2026-02-14T17:15:56.703 | 2026-02-14T17:15:56.703 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-r6q3-r9p8-6prh |
9.8 (3.1)
|
The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unautho… | 2026-02-15T06:31:35Z | 2026-02-15T06:31:35Z |
| ghsa-9xfq-99mh-jq67 |
6.5 (3.1)
|
The Element Pack Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in… | 2026-02-15T06:31:35Z | 2026-02-15T06:31:35Z |
| ghsa-xwq7-47qj-qwwf |
|
In the Linux kernel, the following vulnerability has been resolved: mm, shmem: prevent infinite lo… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:16Z |
| ghsa-xcg5-9p3p-fgrj |
|
In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: avoid pool UAF A… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-x3gh-q355-f5px |
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access a… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-x2mr-3x78-f97g |
|
In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: prevent ZERO_SIZ… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-wr52-6c6f-x6gv |
|
In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-vm5x-8w9j-f2rm |
|
In the Linux kernel, the following vulnerability has been resolved: platform/x86: toshiba_haps: Fi… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-rwhg-vqv9-mjpv |
|
In the Linux kernel, the following vulnerability has been resolved: spi: tegra: Fix a memory leak … | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-rhhh-mwpc-m2qj |
|
In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: fix potential bu… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-rf63-9f5h-hhg6 |
|
In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_he… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-r35m-5r25-v2fx |
|
In the Linux kernel, the following vulnerability has been resolved: ceph: fix NULL pointer derefer… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-q6cr-hchj-9qvc |
|
In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: fix NULL pointer … | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-q4xx-rwj3-jf4m |
|
In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix ECMP sibling count m… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-pmxm-x3p3-w327 |
|
In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: add bounds check… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-hqf5-283c-2wrw |
|
In the Linux kernel, the following vulnerability has been resolved: HID: Intel-thc-hid: Intel-thc:… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-hp2v-w3xq-4jvv |
|
In the Linux kernel, the following vulnerability has been resolved: i2c: imx: preserve error state… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-hjjf-xjvr-567j |
|
In the Linux kernel, the following vulnerability has been resolved: net: usb: r8152: fix resume re… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-hjgx-24cq-764x |
|
In the Linux kernel, the following vulnerability has been resolved: procfs: avoid fetching build I… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-hg9w-rxwp-fw28 |
|
In the Linux kernel, the following vulnerability has been resolved: binder: fix UAF in binder_netl… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-g782-c42f-q4q3 |
|
In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: fixup hang in nvmet… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-g2fg-h3fh-wpj6 |
|
In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect cu… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-fccp-g2rw-8q2g |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-a… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-fc4j-ghgg-c9cg |
|
In the Linux kernel, the following vulnerability has been resolved: ASoC: amd: fix memory leak in … | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-cgrj-w8m6-f297 |
|
In the Linux kernel, the following vulnerability has been resolved: rust_binder: correctly handle … | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-9rcv-5g2j-597r |
|
In the Linux kernel, the following vulnerability has been resolved: smb/client: fix memory leak in… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-89j4-f3cq-gm32 |
|
In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-7w83-2rgm-8vj5 |
|
In the Linux kernel, the following vulnerability has been resolved: ice: Fix PTP NULL pointer dere… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-7g8g-mvq9-46w7 |
|
In the Linux kernel, the following vulnerability has been resolved: linkwatch: use __dev_put() in … | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ghsa-68jg-6v9h-662h |
|
In the Linux kernel, the following vulnerability has been resolved: KVM: Don't clobber irqfd routi… | 2026-02-14T18:30:16Z | 2026-02-14T18:30:16Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-228 |
8.8 (3.1)
|
Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code … | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.449105+00:00 |
| pysec-2024-227 |
8.8 (3.1)
|
Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execu… | transformers | 2024-11-22T22:15:06+00:00 | 2025-02-10T23:22:41.399021+00:00 |
| pysec-2024-226 |
7.8 (3.1)
|
Pymatgen (Python Materials Genomics) is an open-source Python library for materials analy… | pymatgen | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:28.734730+00:00 |
| pysec-2024-225 |
7.5 (3.1)
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:24.427679+00:00 |
| pysec-2024-224 |
7.0 (3.1)
|
Excessive directory permissions in MLflow leads to local privilege escalation when using … | mlflow | 2024-11-25T14:15:06+00:00 | 2025-02-03T16:23:40.409646+00:00 |
| pysec-2024-27 |
9.8 (3.1)
|
CrateDB 5.5.1 is contains an authentication bypass vulnerability in the Admin UI componen… | crate | 2024-01-30T01:15:00Z | 2025-01-30T22:47:57.847403Z |
| pysec-2019-242 |
5.5 (3.1)
|
Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) i… | capstone | 2019-05-15T14:29:00Z | 2025-01-28T17:34:08.578134Z |
| pysec-2025-2 |
|
uniapi version 1.0.7 introduces code that would execute on import of the module and downl… | uniapi | 2025-01-24T19:56:53+00:00 | |
| pysec-2024-223 |
9.1 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds … | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:22.060512+00:00 |
| pysec-2024-222 |
7.5 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Trav… | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:21.994731+00:00 |
| pysec-2024-221 |
5.3 (3.1)
|
aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd i… | aiosmtpd | 2024-03-12T21:15:58+00:00 | 2025-01-22T16:23:18.042465+00:00 |
| pysec-2024-220 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.972580+00:00 |
| pysec-2024-219 |
9.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.897787+00:00 |
| pysec-2024-218 |
8.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.803143+00:00 |
| pysec-2024-217 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This is a **data … | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.723816+00:00 |
| pysec-2024-216 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.549944+00:00 |
| pysec-2024-215 |
9.8 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T22:22:23.471780+00:00 |
| pysec-2024-214 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.399444+00:00 |
| pysec-2024-213 |
6.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.310301+00:00 |
| pysec-2024-212 |
|
Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add… | apache-airflow | 2024-09-07T08:15:11+00:00 | 2025-01-19T22:22:22.289672+00:00 |
| pysec-2024-211 |
7.5 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote clien… | waitress | 2024-10-29T15:15:12+00:00 | 2025-01-19T19:19:01.852094+00:00 |
| pysec-2024-210 |
4.8 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may… | waitress | 2024-10-29T15:15:11+00:00 | 2025-01-19T19:19:01.811922+00:00 |
| pysec-2024-209 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-19T19:19:01.689044+00:00 |
| pysec-2024-208 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.647736+00:00 |
| pysec-2024-207 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.605918+00:00 |
| pysec-2024-206 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.566553+00:00 |
| pysec-2024-205 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using … | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-19T19:19:01.519824+00:00 |
| pysec-2024-204 |
8.1 (3.1)
|
TorchGeo Remote Code Execution Vulnerability | torchgeo | 2024-11-12T18:15:45+00:00 | 2025-01-19T19:19:01.299352+00:00 |
| pysec-2024-203 |
7.5 (3.1)
|
DuckDB is a SQL database management system. In versions 1.0.0 and prior, content in files… | duckdb | 2024-07-24T18:15:05+00:00 | 2025-01-19T19:18:58.299130+00:00 |
| pysec-2024-202 |
6.5 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:07+00:00 | 2025-01-19T16:22:59.212853+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33799 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424348Z |
| gsd-2024-33798 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.346901Z |
| gsd-2024-33797 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.530297Z |
| gsd-2024-33796 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.308365Z |
| gsd-2024-33795 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.332784Z |
| gsd-2024-33794 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.557396Z |
| gsd-2024-33793 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.552273Z |
| gsd-2024-33792 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.507383Z |
| gsd-2024-33791 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.488352Z |
| gsd-2024-33790 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.450431Z |
| gsd-2024-33789 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.534336Z |
| gsd-2024-33788 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.591276Z |
| gsd-2024-33787 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424661Z |
| gsd-2024-33786 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.606155Z |
| gsd-2024-33785 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.387543Z |
| gsd-2024-33784 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.595808Z |
| gsd-2024-33783 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322051Z |
| gsd-2024-33782 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322441Z |
| gsd-2024-33781 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.495881Z |
| gsd-2024-33780 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.307884Z |
| gsd-2024-33779 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.507854Z |
| gsd-2024-33778 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.295751Z |
| gsd-2024-33777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.489805Z |
| gsd-2024-33776 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.587852Z |
| gsd-2024-33775 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322245Z |
| gsd-2024-33774 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.484899Z |
| gsd-2024-33773 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.560326Z |
| gsd-2024-33772 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.282306Z |
| gsd-2024-33771 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.366201Z |
| gsd-2024-33770 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.514460Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-816 | Malicious code in @skyeng/libs (npm) | 2026-02-09T15:12:24Z | 2026-02-09T15:12:24Z |
| mal-2026-814 | Malicious code in http-notifier-test (PyPI) | 2026-02-09T09:29:06Z | 2026-02-09T09:29:06Z |
| mal-2026-815 | Malicious code in skydeo (PyPI) | 2026-02-09T09:12:05Z | 2026-02-09T09:12:05Z |
| mal-2026-812 | Malicious code in hardixx-code (PyPI) | 2026-02-08T21:21:34Z | 2026-02-08T22:46:48Z |
| mal-2026-813 | Malicious code in teligram (PyPI) | 2026-02-08T22:19:04Z | 2026-02-08T22:19:04Z |
| mal-2024-12278 | Malicious code in gltest (PyPI) | 2024-08-23T22:55:41Z | 2026-02-08T21:44:34Z |
| mal-2026-811 | Malicious code in grokwrapper (PyPI) | 2026-02-08T10:34:16Z | 2026-02-08T10:34:16Z |
| mal-2026-809 | Malicious code in ccxt-bullish (PyPI) | 2026-02-08T07:47:19Z | 2026-02-08T07:47:19Z |
| mal-2026-810 | Malicious code in thread-pipeline-test (PyPI) | 2026-02-08T07:41:19Z | 2026-02-08T07:41:19Z |
| mal-2026-704 | Malicious code in testing-package-xdsfdsfsc (npm) | 2026-02-03T16:22:25Z | 2026-02-07T10:45:40Z |
| mal-2026-789 | Malicious code in syf-typings (npm) | 2026-02-06T07:06:46Z | 2026-02-06T21:46:29Z |
| mal-2026-807 | Malicious code in web3-sinon (npm) | 2026-02-06T14:44:08Z | 2026-02-06T18:21:39Z |
| mal-2026-806 | Malicious code in web3-chain-sinon (npm) | 2026-02-06T14:44:08Z | 2026-02-06T18:21:39Z |
| mal-2026-804 | Malicious code in breadcrumb-service (npm) | 2026-02-06T12:30:53Z | 2026-02-06T16:19:57Z |
| mal-2026-805 | Malicious code in aligned-arrays (npm) | 2026-02-06T14:24:56Z | 2026-02-06T16:19:56Z |
| mal-2026-802 | Malicious code in @sbseg-plugin/qbo-web-app-ui (npm) | 2026-02-06T11:10:48Z | 2026-02-06T16:19:56Z |
| mal-2026-801 | Malicious code in @rsgweb/utils (npm) | 2026-02-06T11:10:48Z | 2026-02-06T16:19:56Z |
| mal-2026-800 | Malicious code in @rsgweb/tina (npm) | 2026-02-06T11:10:48Z | 2026-02-06T16:19:56Z |
| mal-2026-799 | Malicious code in @rsgweb/rockstar-account (npm) | 2026-02-06T11:10:48Z | 2026-02-06T16:19:56Z |
| mal-2026-798 | Malicious code in @rsgweb/modules-core-www-page (npm) | 2026-02-06T11:10:48Z | 2026-02-06T16:19:56Z |
| mal-2026-797 | Malicious code in @rsgweb/modules-core-feedback (npm) | 2026-02-06T11:10:48Z | 2026-02-06T16:19:56Z |
| mal-2026-796 | Malicious code in @rdxportal/ui-components (npm) | 2026-02-06T11:10:48Z | 2026-02-06T16:19:56Z |
| mal-2026-795 | Malicious code in @opposhop/nuxt-ssr-cache (npm) | 2026-02-06T11:10:47Z | 2026-02-06T16:19:56Z |
| mal-2026-794 | Malicious code in @meli-lint/eslint-config-tests-jest (npm) | 2026-02-06T11:10:46Z | 2026-02-06T16:19:56Z |
| mal-2026-793 | Malicious code in @meli-lint/eslint-config-base-ts (npm) | 2026-02-06T11:10:46Z | 2026-02-06T16:19:56Z |
| mal-2026-792 | Malicious code in @meli-lint/eslint-config-base (npm) | 2026-02-06T11:10:47Z | 2026-02-06T16:19:56Z |
| mal-2026-791 | Malicious code in @hashicorp-internal/vault-reporting (npm) | 2026-02-06T11:10:46Z | 2026-02-06T16:19:56Z |
| mal-2026-788 | Malicious code in @sporting-life/sportinglife-betslip-sdk (npm) | 2026-02-06T03:57:32Z | 2026-02-06T16:19:56Z |
| mal-2026-787 | Malicious code in @sporting-life/sportinglife-be (npm) | 2026-02-06T04:07:15Z | 2026-02-06T16:19:56Z |
| mal-2026-786 | Malicious code in @rsgweb/locale-tools (npm) | 2026-02-06T03:46:00Z | 2026-02-06T16:19:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2724 | Golang Go: Mehrere Schwachstellen | 2025-12-02T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2706 | Python: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-01T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2672 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-24T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2658 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-20T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2616 | libvirt: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-17T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2518 | Red Hat Enterprise Linux (runc): Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-11-09T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2311 | Red Hat Enterprise Linux (libsoup3): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-10-15T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2193 | QEMU: Schwachstelle ermöglicht Denial of Service | 2025-10-05T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2144 | binutils: Mehrere Schwachstellen | 2025-09-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2134 | Red Hat Enterprise Linux (Developer Hub): Schwachstelle ermöglicht Denial of Service | 2025-09-25T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2107 | Linux Kernel: Mehrere Schwachstellen | 2025-09-22T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2078 | Red Hat Enterprise Linux (Developer Hub): Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1988 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-07T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1976 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-04T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1948 | libxml2 (exsltDynMapFunction): Schwachstelle ermöglicht Denial of Service | 2025-09-02T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1932 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2025-08-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1928 | Linux UDisks Daemon: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1869 | Linux Kernel: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1842 | PostgreSQL: Mehrere Schwachstellen | 2025-08-14T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1740 | Golang Go: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-08-06T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1699 | Red Hat Enterprise Linux (requests): Schwachstelle ermöglicht das Ausspähen von Informationen | 2025-08-03T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1596 | Linux Kernel: Schwachstelle ermöglicht Denial of Service und nicht spezifizierten Angriff | 2025-07-17T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1452 | Linux Kernel: Mehrere Schwachstellen | 2025-07-02T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1433 | Red Hat Enterprise Linux (python-setuptools): Schwachstelle ermöglicht Codeausführung | 2025-06-30T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1423 | libssh: Mehrere Schwachstellen | 2025-06-29T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1350 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-17T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1143 | Red Hat Enterprise Linux (python-tornado): Schwachstelle ermöglicht Denial of Service | 2025-05-25T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-0964 | Django: Schwachstelle ermöglicht Denial of Service | 2025-05-07T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-0453 | Linux Kernel: Mehrere Schwachstellen | 2025-02-26T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-0353 | GNU Emacs: Schwachstelle ermöglicht Codeausführung | 2025-02-11T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0350 | Kwetsbaarheid verholpen in CFMOTO Ride voertuigdatabeheer systemen | 2025-11-04T10:27:59.187171Z | 2025-11-04T10:27:59.187171Z |
| ncsc-2025-0349 | Kwetsbaarheden verholpen in Nagios XI | 2025-11-03T08:27:42.052256Z | 2025-11-03T08:27:42.052256Z |
| ncsc-2025-0348 | Kwetsbaarheden verholpen in Arista Networks producten | 2025-11-03T08:26:39.905306Z | 2025-11-03T08:26:39.905306Z |
| ncsc-2025-0347 | Kwetsbaarheden verholpen in IBM QRadar SIEM | 2025-11-03T08:17:18.981494Z | 2025-11-03T08:17:18.981494Z |
| ncsc-2025-0346 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-03T08:14:02.972842Z | 2025-11-03T08:14:02.972842Z |
| ncsc-2025-0345 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-10-31T09:35:00.469498Z | 2025-10-31T09:35:00.469498Z |
| ncsc-2025-0344 | Kwetsbaarheden verholpen in Rockwell Automation COMMS | 2025-10-31T09:34:05.069339Z | 2025-10-31T09:34:05.069339Z |
| ncsc-2025-0343 | Kwetsbaarheid verholpen in Mozilla Firefox | 2025-10-31T09:31:53.270725Z | 2025-10-31T09:31:53.270725Z |
| ncsc-2025-0342 | Kwetsbaarheden verholpen in GitLab Enterprise en Community Edition | 2025-10-27T08:08:17.974767Z | 2025-10-27T09:38:47.073257Z |
| ncsc-2025-0341 | Kwetsbaarheden verholpen in BIND 9 | 2025-10-24T08:19:45.232307Z | 2025-10-27T08:24:03.796638Z |
| ncsc-2025-0310 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-10-14T18:03:45.875739Z | 2025-10-24T11:09:29.790442Z |
| ncsc-2025-0340 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2025-10-23T14:13:39.969386Z | 2025-10-23T14:13:39.969386Z |
| ncsc-2025-0339 | Kwetsbaarheden verholpen in Oracle MySQL | 2025-10-23T14:11:30.111892Z | 2025-10-23T14:11:30.111892Z |
| ncsc-2025-0338 | Kwetsbaarheden verholpen in Oracle JD Edwards EnterpriseOne Tools | 2025-10-23T13:53:27.268400Z | 2025-10-23T13:53:27.268400Z |
| ncsc-2025-0337 | Kwetsbaarheden verholpen in Oracle Java | 2025-10-23T13:51:40.686406Z | 2025-10-23T13:51:40.686406Z |
| ncsc-2025-0336 | Kwetsbaarheden verholpen in Oracle Hyperion | 2025-10-23T13:49:44.344049Z | 2025-10-23T13:49:44.344049Z |
| ncsc-2025-0335 | Kwetsbaarheden verholpen in Oracle Analytics | 2025-10-23T13:45:06.747933Z | 2025-10-23T13:45:06.747933Z |
| ncsc-2025-0333 | Kwetsbaarheden verholpen in Oracle Financial Services | 2025-10-23T13:35:32.902231Z | 2025-10-23T13:35:32.902231Z |
| ncsc-2025-0332 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2025-10-23T13:26:49.210414Z | 2025-10-23T13:26:49.210414Z |
| ncsc-2025-0331 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2025-10-23T13:23:20.471568Z | 2025-10-23T13:23:20.471568Z |
| ncsc-2025-0330 | Kwetsbaarheden verholpen in Oracle Communications producten | 2025-10-23T13:20:15.363063Z | 2025-10-23T13:20:15.363063Z |
| ncsc-2025-0329 | Kwetsbaarheden verholpen in Oracle Commerce | 2025-10-23T07:20:51.213314Z | 2025-10-23T07:20:51.213314Z |
| ncsc-2025-0328 | Kwetsbaarheden verholpen in Oracle Database producten | 2025-10-23T07:19:57.652532Z | 2025-10-23T07:19:57.652532Z |
| ncsc-2025-0327 | Kwetsbaarheden verholpen in Zohocorp's ManageEngine | 2025-10-23T07:18:47.274781Z | 2025-10-23T07:18:47.274781Z |
| ncsc-2025-0326 | Kwetsbaarheden verholpen in Moxa’s netwerkbeveiligingsapparaten | 2025-10-20T13:03:34.436477Z | 2025-10-20T13:03:34.436477Z |
| ncsc-2025-0325 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-10-20T12:59:06.729067Z | 2025-10-20T12:59:06.729067Z |
| ncsc-2025-0241 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-08-06T12:11:46.234849Z | 2025-10-17T10:44:55.312550Z |
| ncsc-2025-0324 | Kwetsbaarheid verholpen in FortiOS | 2025-10-17T08:42:51.624827Z | 2025-10-17T08:42:51.624827Z |
| ncsc-2025-0296 | Kwetsbaarheid verholpen in WatchGuard Fireware OS | 2025-09-19T13:31:26.392203Z | 2025-10-17T08:19:28.145953Z |
| ncsc-2025-0323 | Kwetsbaarheden verholpen in SAP Producten | 2025-10-17T08:04:54.828451Z | 2025-10-17T08:04:54.828451Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-517338 | SSA-517338: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V3.0 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-493787 | SSA-493787: Arbitrary Code Execution Vulnerability in SIMATIC RTLS Locating Manager Before V3.2 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-460466 | SSA-460466: Denial of Service Vulnerability in TIA Project-Server and TIA Portal | 2025-07-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-446307 | SSA-446307: Authentication Bypass Vulnerability in BMC (CVE-2024-54085) affects SIMATIC IPC RS-828A | 2025-05-13T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-400089 | SSA-400089: Denial of Service Vulnerability in SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-398330 | SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP >= V3.1.0 and < V3.1.5 | 2023-12-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-382999 | SSA-382999: Multiple Vulnerabilities in Opcenter Quality Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-353002 | SSA-353002: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-256353 | SSA-256353: Third-Party Component Vulnerabilities in RUGGEDCOM ROS | 2022-03-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-177847 | SSA-177847: Improper VNC Password Check Vulnerability in SINUMERIK Controllers | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-170375 | SSA-170375: Multiple Vulnerabilities in RUGGEDCOM ROS Before V5.9 | 2024-07-09T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-097435 | SSA-097435: Usernames Disclosure Vulnerability in Mendix Runtime | 2024-09-10T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-094954 | SSA-094954: Authentication Bypass Vulnerability in BIST mode of RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-725549 | SSA-725549: Denial of Service of ICMP in Industrial Devices | 2025-04-08T00:00:00Z | 2025-07-21T00:00:00Z |
| ssa-183963 | SSA-183963: Certificate Validation Vulnerabilities in SICAM TOOLBOX II Before V07.11 | 2025-07-08T00:00:00Z | 2025-07-18T00:00:00Z |
| ssa-938066 | SSA-938066: Remote Code Execution Vulnerability in SENTRON Powermanager and Desigo CC | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-904646 | SSA-904646: Sensitive Data Exposure Vulnerability in SIPROTEC 5 Devices | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-763427 | SSA-763427: Authentication Bypass Vulnerability in SIMATIC CP and TIM Devices | 2015-11-27T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-634640 | SSA-634640: Weak Authentication Vulnerability in Siemens Industrial Edge Devices | 2025-04-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-627195 | SSA-627195: Zip Path Traversal Vulnerability in Mendix Studio Pro's Module Installation Process | 2025-06-12T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-626991 | SSA-626991: Denial of Service Vulnerability in SIMATIC CN 4100 before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-593272 | SSA-593272: SegmentSmack in Interniche IP-Stack based Industrial Devices | 2020-04-14T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-573669 | SSA-573669: Multiple Vulnerabilities in TIA Administrator Before V3.0.6 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-446545 | SSA-446545: Impact of RegreSSHion (CVE-2024-6387) in Siemens Industrial Products | 2024-09-10T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-327438 | SSA-327438: Multiple Vulnerabilities in SCALANCE LPE9403 | 2025-05-13T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-091753 | SSA-091753: Multiple Vulnerabilities in Solid Edge Before SE2025 Update 5 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-078892 | SSA-078892: Multiple Vulnerabilities in SINEC NMS Before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-426509 | SSA-426509: Multiple Local Code Execution Vulnerabilities in Questa and ModelSim | 2024-10-08T00:00:00Z | 2025-06-17T00:00:00Z |
| ssa-345750 | SSA-345750: Default Credentials in Energy Services Using Elspec G5DFR | 2025-06-10T00:00:00Z | 2025-06-16T00:00:00Z |
| ssa-874353 | SSA-874353: Entity Enumeration Vulnerability in Mendix Runtime | 2025-04-08T00:00:00Z | 2025-06-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:22415 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17 security, enhancement & bug fix update | 2025-12-01T11:59:39+00:00 | 2026-02-16T17:59:49+00:00 |
| rhsa-2025:21885 | Red Hat Security Advisory: OpenShift Compliance Operator bug fix and enhancement update | 2025-11-20T19:56:52+00:00 | 2026-02-16T17:59:49+00:00 |
| rhsa-2025:21368 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.18 security, enhancement & bug fix update | 2025-11-13T17:36:32+00:00 | 2026-02-16T17:59:48+00:00 |
| rhsa-2025:19961 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.12.6 security update | 2025-11-10T01:30:28+00:00 | 2026-02-16T17:59:47+00:00 |
| rhsa-2025:19958 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.7.7 security update | 2025-11-10T01:14:14+00:00 | 2026-02-16T17:59:46+00:00 |
| rhsa-2025:19335 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.14.1 security update | 2025-10-30T12:58:23+00:00 | 2026-02-16T17:59:46+00:00 |
| rhsa-2025:19332 | Red Hat Security Advisory: multicluster engine for Kubernetes 2.9.1 security update | 2025-10-30T12:27:36+00:00 | 2026-02-16T17:59:45+00:00 |
| rhea-2026:0129 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.17.39 Images | 2026-01-06T11:25:38+00:00 | 2026-02-16T17:59:45+00:00 |
| rhea-2025:23478 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.18.25 Images | 2025-12-17T11:33:21+00:00 | 2026-02-16T17:59:44+00:00 |
| rhea-2025:23406 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.20.3 Images | 2025-12-16T21:20:03+00:00 | 2026-02-16T17:59:44+00:00 |
| rhsa-2026:2760 | Red Hat Security Advisory: Satellite 6.18.3 Async Update | 2026-02-16T16:52:18+00:00 | 2026-02-16T17:59:41+00:00 |
| rhsa-2026:2675 | Red Hat Security Advisory: Red Hat Developer Hub 1.8.3 release. | 2026-02-12T15:30:56+00:00 | 2026-02-16T17:59:39+00:00 |
| rhsa-2026:2710 | Red Hat Security Advisory: python3.12-wheel security update | 2026-02-16T10:46:56+00:00 | 2026-02-16T17:59:38+00:00 |
| rhsa-2026:2654 | Red Hat Security Advisory: Release of components for Service Telemetry Framework 1.5.7 | 2026-02-12T13:46:10+00:00 | 2026-02-16T17:59:35+00:00 |
| rhsa-2026:2571 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.9.2 security update | 2026-02-11T15:58:30+00:00 | 2026-02-16T17:59:34+00:00 |
| rhsa-2026:2371 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.12.1 release. | 2026-02-09T20:49:08+00:00 | 2026-02-16T17:59:33+00:00 |
| rhsa-2026:2454 | Red Hat Security Advisory: DevWorkspace Operator 0.39.0 release. | 2026-02-10T15:32:22+00:00 | 2026-02-16T17:59:31+00:00 |
| rhsa-2026:2441 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-10T13:45:07+00:00 | 2026-02-16T17:59:31+00:00 |
| rhsa-2026:2376 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.14.0 release. | 2026-02-09T23:40:14+00:00 | 2026-02-16T17:59:31+00:00 |
| rhsa-2026:2375 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.15.0 release. | 2026-02-09T22:06:53+00:00 | 2026-02-16T17:59:31+00:00 |
| rhsa-2026:2374 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.13.0 release. | 2026-02-09T21:56:53+00:00 | 2026-02-16T17:59:30+00:00 |
| rhsa-2026:2367 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.11.1 release. | 2026-02-09T18:49:52+00:00 | 2026-02-16T17:59:29+00:00 |
| rhsa-2026:2320 | Red Hat Security Advisory: golang security update | 2026-02-09T11:08:53+00:00 | 2026-02-16T17:59:29+00:00 |
| rhsa-2026:2334 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-09T12:48:48+00:00 | 2026-02-16T17:59:28+00:00 |
| rhsa-2026:2219 | Red Hat Security Advisory: golang security update | 2026-02-09T01:48:16+00:00 | 2026-02-16T17:59:28+00:00 |
| rhsa-2026:2323 | Red Hat Security Advisory: git-lfs security update | 2026-02-09T11:51:28+00:00 | 2026-02-16T17:59:27+00:00 |
| rhsa-2026:2265 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-02-09T05:56:42+00:00 | 2026-02-16T17:59:26+00:00 |
| rhsa-2026:2223 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-09T01:34:56+00:00 | 2026-02-16T17:59:26+00:00 |
| rhsa-2026:2218 | Red Hat Security Advisory: golang security update | 2026-02-09T01:55:26+00:00 | 2026-02-16T17:59:24+00:00 |
| rhsa-2026:2217 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-09T01:27:56+00:00 | 2026-02-16T17:59:24+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-350-01 | Güralp Systems Fortimus Series, Minimus Series, and Certimus Series | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-308-01 | Fuji Electric Monitouch V-SFT-6 (Update A) | 2025-11-04T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-224-02 | Johnson Controls iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2 (Update A) | 2025-08-12T06:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| va-25-345-01 | CISA Software Acquisition Guide Supplier Response Web Tool XSS | 2025-12-12T20:27:47Z | 2025-12-12T20:27:47Z |
| icsma-25-345-02 | Varex Imaging Panoramic Dental Imaging Software | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsma-25-345-01 | Grassroots DICOM (GDCM) | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsa-25-345-10 | OpenPLC_V3 | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsa-25-345-02 | Johnson Controls iSTAR Ultra | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| icsa-25-345-01 | Johnson Controls iSTAR | 2025-12-11T07:00:00.000000Z | 2025-12-11T07:00:00.000000Z |
| va-25-343-01 | Windscribe for Linux 'changeMTU' local privilege escalation | 2025-12-10T16:46:41Z | 2025-12-10T16:46:41Z |
| icsa-25-343-01 | Universal Boot Loader (U-Boot) | 2025-12-09T07:00:00.000000Z | 2025-12-09T07:00:00.000000Z |
| icsa-26-015-12 | Siemens SIMATIC CN 4100 | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-26-015-11 | Siemens RUGGEDCOM ROX II | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-09 | Siemens Gridscale X Prepay | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-08 | Siemens Energy Services | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-07 | Siemens Building X - Security Manager Edge Controller | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-06 | Siemens SINEMA Remote Connect Server | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-05 | Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-345-04 | Siemens IAM Client | 2025-12-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-226-11 | Siemens SIMATIC S7-PLCSIM | 2025-08-12T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-226-03 | Siemens SIMATIC S7-PLCSIM | 2025-08-12T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-347-02 | Siemens Engineering Platforms | 2024-12-10T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-256-16 | Siemens Third-Party Component in SICAM and SITIPE Products | 2024-09-10T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-193-05 | Siemens SCALANCE, RUGGEDCOM | 2024-07-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-22-349-09 | Siemens OpenSSL 3.0 Affecting Products | 2022-12-13T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-338-07 | Advantech iView | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-06 | SolisCloud Monitoring Platform | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-05 | Sunbird DCIM dcTrack and Power IQ | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-04 | Johnson Controls iSTAR | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-03 | Johnson Controls OpenBlue Mobile Web Application for OpenBlue Workplace | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-te-endagent-filewrt-zncdqnrj | Cisco ThousandEyes Endpoint Agent for Windows Arbitrary File Delete Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ndfc-shkv-snqjtjrp | Cisco Nexus Dashboard Fabric Controller SSH Host Key Validation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-icm-xss-cfcqhxag | Cisco Unified Intelligent Contact Management Enterprise Cross-Site Scripting Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-ccp-info-disc-zygerqpd | Cisco Customer Collaboration Platform Information Disclosure Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-qtrhzg2 | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Denial of Service Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:28+00:00 |
| cisco-sa-meraki-mx-vpn-dos-by-qwukqv7x | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Session Takeover and Denial of Service Vulnerability | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:27+00:00 |
| cisco-sa-webex-xss-7teqtfn8 | Cisco Webex Services Cross-Site Scripting Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-webex-cache-q4xbkqbg | Cisco Webex Meetings Services HTTP Cache Poisoning Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-ssti-dpulqsmz | Cisco Secure Network Analytics Manager Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-apiacv-4b6x5ysw | Cisco Secure Network Analytics Manager API Authorization Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-ise-restart-ss-uf986g2q | Cisco Identity Services Engine RADIUS Denial of Service Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-duo-ssp-cmd-inj-rcmyrna | Cisco Duo Self-Service Portal Command Injection Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cuis-priv-esc-3pk96su4 | Cisco Unified Intelligence Center Privilege Escalation Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cucm-kkhzbhr5 | Cisco Unified Communications Products Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-contcent-insuffacces-ardovhn8 | Cisco Unified Contact Center Enterprise Cloud Connect Insufficient Access Control Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sdwanarbfile-2zkhkzwj | Cisco Catalyst SD-WAN Manager Arbitrary File Creation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-14T20:04:53+00:00 |
| cisco-sa-sdwan-fileoverwrite-uc9txwh | Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-08T15:55:57+00:00 |
| cisco-sa-wlc-wncd-p6gvt6hl | Cisco IOS XE Software for WLC Wireless IPv6 Clients Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webui-multi-arnhm4v6 | Cisco IOS XE Software Web-Based Management Interface Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webui-cmdinj-gvn3oknc | Cisco IOS XE Software Web-Based Management Interface Command Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-xss-xhn8m5jt | Cisco Catalyst SD-WAN Manager Stored Cross-Site Scripting Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-html-inj-gxvtk6zj | Cisco Catalyst SD-WAN Manager Reflected HTML Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-twamp-kv4fhugn | Cisco IOS, IOS XE, and IOS XR Software TWAMP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-snmpv3-qkeyvzsy | Cisco IOS and IOS XE Software SNMPv3 Configuration Restriction Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sisf-dos-zgwt4ddy | Multiple Cisco Products Switch Integrated Security Features DHCPv6 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sdwan-priviesc-wck7bmmt | Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-netconf-nacm-bypass-tgzv9pmq | Cisco IOS XE Software Model-Driven Programmability Authorization Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-multiprod-ikev2-dos-gpctuqv2 | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IKEv2 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ipsgacl-pg6qfzk | Cisco IOS Software on Cisco Catalyst 1000 and 2960L Switches Access Control List Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iox-dos-95fqnf7b | Cisco IOx Application Hosting Environment Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-37870 | drm/amd/display: prevent hang on link training fail | 2025-05-02T00:00:00.000Z | 2026-01-20T14:43:14.000Z |
| msrc_cve-2025-39859 | ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog | 2025-09-02T00:00:00.000Z | 2026-01-20T14:43:11.000Z |
| msrc_cve-2025-37834 | mm/vmscan: don't try to reclaim hwpoison folio | 2025-05-02T00:00:00.000Z | 2026-01-20T14:43:05.000Z |
| msrc_cve-2025-39850 | vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects | 2025-09-02T00:00:00.000Z | 2026-01-20T14:43:00.000Z |
| msrc_cve-2025-39862 | wifi: mt76: mt7915: fix list corruption after hardware restart | 2025-09-02T00:00:00.000Z | 2026-01-20T14:42:49.000Z |
| msrc_cve-2025-39851 | vxlan: Fix NPD when refreshing an FDB entry with a nexthop object | 2025-09-02T00:00:00.000Z | 2026-01-20T14:42:38.000Z |
| msrc_cve-2025-39810 | bnxt_en: Fix memory corruption when FW resources change during ifdown | 2025-09-02T00:00:00.000Z | 2026-01-20T14:42:27.000Z |
| msrc_cve-2025-39833 | mISDN: hfcpci: Fix warning when deleting uninitialized timer | 2025-09-02T00:00:00.000Z | 2026-01-20T14:42:17.000Z |
| msrc_cve-2025-39748 | bpf: Forget ranges when refining tnum after JSET | 2025-09-02T00:00:00.000Z | 2026-01-20T14:42:05.000Z |
| msrc_cve-2025-39789 | crypto: x86/aegis - Add missing error checks | 2025-09-02T00:00:00.000Z | 2026-01-20T14:41:55.000Z |
| msrc_cve-2025-39747 | drm/msm: Add error handling for krealloc in metadata setup | 2025-09-02T00:00:00.000Z | 2026-01-20T14:41:45.000Z |
| msrc_cve-2025-39746 | wifi: ath10k: shutdown driver when hardware is unreliable | 2025-09-02T00:00:00.000Z | 2026-01-20T14:41:35.000Z |
| msrc_cve-2025-39762 | drm/amd/display: add null check | 2025-09-02T00:00:00.000Z | 2026-01-20T14:41:24.000Z |
| msrc_cve-2025-39754 | mm/smaps: fix race between smaps_hugetlb_range and migration | 2025-09-02T00:00:00.000Z | 2026-01-20T14:41:15.000Z |
| msrc_cve-2025-39779 | btrfs: subpage: keep TOWRITE tag until folio is cleaned | 2025-09-02T00:00:00.000Z | 2026-01-20T14:41:05.000Z |
| msrc_cve-2025-39764 | netfilter: ctnetlink: remove refcounting in expectation dumpers | 2025-09-02T00:00:00.000Z | 2026-01-20T14:40:55.000Z |
| msrc_cve-2025-39707 | drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities | 2025-09-02T00:00:00.000Z | 2026-01-20T14:40:44.000Z |
| msrc_cve-2025-39677 | net/sched: Fix backlog accounting in qdisc_dequeue_internal | 2025-09-02T00:00:00.000Z | 2026-01-20T14:40:34.000Z |
| msrc_cve-2025-39705 | drm/amd/display: fix a Null pointer dereference vulnerability | 2025-09-02T00:00:00.000Z | 2026-01-20T14:40:25.000Z |
| msrc_cve-2025-37861 | scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue | 2025-05-02T00:00:00.000Z | 2026-01-20T14:40:25.000Z |
| msrc_cve-2025-38704 | rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer access | 2025-09-02T00:00:00.000Z | 2026-01-20T14:40:14.000Z |
| msrc_cve-2025-4574 | Crossbeam-channel: crossbeam-channel vulnerable to double free on drop | 2025-05-02T00:00:00.000Z | 2026-01-20T14:40:10.000Z |
| msrc_cve-2025-38717 | net: kcm: Fix race condition in kcm_unattach() | 2025-09-02T00:00:00.000Z | 2026-01-20T14:40:03.000Z |
| msrc_cve-2025-38722 | habanalabs: fix UAF in export_dmabuf() | 2025-09-02T00:00:00.000Z | 2026-01-20T14:39:52.000Z |
| msrc_cve-2025-38705 | drm/amd/pm: fix null pointer access | 2025-09-02T00:00:00.000Z | 2026-01-20T14:39:42.000Z |
| msrc_cve-2024-26672 | drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' | 2024-04-02T07:00:00.000Z | 2026-01-20T14:39:08.000Z |
| msrc_cve-2024-26757 | md: Don't ignore read-only array in md_check_recovery() | 2024-04-02T07:00:00.000Z | 2026-01-20T14:38:58.000Z |
| msrc_cve-2024-26758 | md: Don't ignore suspended array in md_check_recovery() | 2024-04-02T07:00:00.000Z | 2026-01-20T14:38:48.000Z |
| msrc_cve-2025-38361 | drm/amd/display: Check dce_hwseq before dereferencing it | 2025-07-02T00:00:00.000Z | 2026-01-20T14:38:17.000Z |
| msrc_cve-2025-38359 | s390/mm: Fix in_atomic() handling in do_secure_storage_access() | 2025-07-02T00:00:00.000Z | 2026-01-20T14:38:06.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20072-1 | Security update for podman | 2026-01-21T11:06:30Z | 2026-01-21T11:06:30Z |
| opensuse-su-2026:10079-1 | python311-weasyprint-68.0-1.1 on GA media | 2026-01-21T00:00:00Z | 2026-01-21T00:00:00Z |
| opensuse-su-2026:10078-1 | python311-pyasn1-0.6.2-1.1 on GA media | 2026-01-21T00:00:00Z | 2026-01-21T00:00:00Z |
| opensuse-su-2026:10077-1 | python311-jaraco.context-6.1.0-1.1 on GA media | 2026-01-21T00:00:00Z | 2026-01-21T00:00:00Z |
| opensuse-su-2026:10076-1 | python311-FontTools-4.61.1-1.1 on GA media | 2026-01-21T00:00:00Z | 2026-01-21T00:00:00Z |
| opensuse-su-2026:10075-1 | corepack24-24.13.0-2.1 on GA media | 2026-01-21T00:00:00Z | 2026-01-21T00:00:00Z |
| opensuse-su-2026:10074-1 | corepack22-22.22.0-1.1 on GA media | 2026-01-21T00:00:00Z | 2026-01-21T00:00:00Z |
| opensuse-su-2026:10073-1 | alloy-1.12.2-2.1 on GA media | 2026-01-21T00:00:00Z | 2026-01-21T00:00:00Z |
| opensuse-su-2026:20069-1 | Security update for python-weasyprint | 2026-01-20T23:40:26Z | 2026-01-20T23:40:26Z |
| opensuse-su-2026:20065-1 | Security update for webkit2gtk3 | 2026-01-20T12:08:51Z | 2026-01-20T12:08:51Z |
| opensuse-su-2026:20067-1 | Security update of open-vm-tools | 2026-01-20T11:02:10Z | 2026-01-20T11:02:10Z |
| opensuse-su-2026:20062-1 | Security update for rust1.91, rust1.92 | 2026-01-19T19:43:51Z | 2026-01-19T19:43:51Z |
| opensuse-su-2026:20064-1 | Security update for ffmpeg-4 | 2026-01-19T14:05:53Z | 2026-01-19T14:05:53Z |
| opensuse-su-2026:20060-1 | Security update for cargo-c | 2026-01-19T10:42:10Z | 2026-01-19T10:42:10Z |
| opensuse-su-2026:10072-1 | libblkid-devel-2.41.3-1.1 on GA media | 2026-01-19T00:00:00Z | 2026-01-19T00:00:00Z |
| opensuse-su-2026:10071-1 | libraylib550-5.5-2.1 on GA media | 2026-01-19T00:00:00Z | 2026-01-19T00:00:00Z |
| opensuse-su-2026:10070-1 | python-keystonemiddleware-doc-10.12.0-2.1 on GA media | 2026-01-19T00:00:00Z | 2026-01-19T00:00:00Z |
| opensuse-su-2026:10069-1 | heroic-games-launcher-2.18.1-2.1 on GA media | 2026-01-19T00:00:00Z | 2026-01-19T00:00:00Z |
| opensuse-su-2026:10068-1 | hauler-1.4.1-1.1 on GA media | 2026-01-19T00:00:00Z | 2026-01-19T00:00:00Z |
| opensuse-su-2026:10067-1 | grafana-11.6.7-2.1 on GA media | 2026-01-19T00:00:00Z | 2026-01-19T00:00:00Z |
| opensuse-su-2026:10066-1 | gimp-3.0.6-5.1 on GA media | 2026-01-19T00:00:00Z | 2026-01-19T00:00:00Z |
| opensuse-su-2026:10065-1 | harfbuzz-devel-12.3.0-2.1 on GA media | 2026-01-18T00:00:00Z | 2026-01-18T00:00:00Z |
| opensuse-su-2026:10064-1 | go1.25-1.25.6-1.1 on GA media | 2026-01-18T00:00:00Z | 2026-01-18T00:00:00Z |
| opensuse-su-2026:10063-1 | go1.24-1.24.12-1.1 on GA media | 2026-01-18T00:00:00Z | 2026-01-18T00:00:00Z |
| opensuse-su-2026:20057-1 | Security update for docker | 2026-01-17T13:20:26Z | 2026-01-17T13:20:26Z |
| opensuse-su-2026:20058-1 | Security update for go-sendxmpp | 2026-01-17T09:30:33Z | 2026-01-17T09:30:33Z |
| opensuse-su-2026:20054-1 | Security update for chromium | 2026-01-17T06:48:43Z | 2026-01-17T06:48:43Z |
| opensuse-su-2026:10062-1 | corepack24-24.13.0-1.1 on GA media | 2026-01-17T00:00:00Z | 2026-01-17T00:00:00Z |
| opensuse-su-2026:10061-1 | libsndfile-devel-1.2.2-4.1 on GA media | 2026-01-17T00:00:00Z | 2026-01-17T00:00:00Z |
| opensuse-su-2026:10060-1 | libpng16-16-1.6.54-1.1 on GA media | 2026-01-17T00:00:00Z | 2026-01-17T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2023-164-02 | IGSS (Interactive Graphical SCADA System) | 2023-06-13T11:43:59.000Z | 2023-06-13T11:43:59.000Z |
| sevd-2023-164-04 | EcoStruxureTM Foxboro DCS Control Core Services | 2023-06-13T09:20:49.000Z | 2023-06-13T09:20:49.000Z |
| sevd-2023-164-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2023-06-13T09:08:30.000Z | 2023-06-13T09:08:30.000Z |
| sevd-2023-129-01 | OPC Factory Server | 2023-05-09T16:33:38.000Z | 2023-05-09T16:33:38.000Z |
| sevd-2023-129-03 | PowerLogic ION7400 / PM8000 / ION9000 Power Meters | 2023-05-09T16:02:26.000Z | 2023-05-09T16:02:26.000Z |
| sevd-2023-129-02 | EcoStruxure™ Power SCADA Operation | 2023-05-09T11:52:40.000Z | 2023-05-09T11:52:40.000Z |
| sevd-2023-129-04 | Power SCADA Anywhere | 2023-05-09T08:00:55.000Z | 2023-05-09T08:00:55.000Z |
| sevd-2021-217-01 | NicheStack TCP/IP Vulnerabilities (INFRA:HALT) in Lexium ILE, ILA, ILS, and Communication Option Boards for Altivar and Lexium32 drives | 2021-08-05T06:29:08.000Z | 2023-05-09T06:29:00.000Z |
| sevd-2023-101-06 | Easergy Builder | 2023-04-11T14:20:02.000Z | 2023-04-11T14:20:02.000Z |
| sevd-2023-101-02 | Conext™ Gateway/ InsightHome and InsightFacility | 2023-04-11T14:01:38.000Z | 2023-04-11T14:01:38.000Z |
| sevd-2022-087-01 | SCADAPack Workbench | 2022-03-28T13:51:11.000Z | 2023-04-11T13:51:11.000Z |
| sevd-2022-011-06 | CODESYS V3 Runtime, Development System, and Gateway Vulnerabilities | 2022-01-11T07:08:13.000Z | 2023-04-11T11:30:00.000Z |
| sevd-2020-315-07 | PLC Simulator on EcoStruxure™ Control Expert and Process Expert | 2020-11-10T15:07:11.000Z | 2023-03-14T15:07:11.000Z |
| sevd-2023-073-04 | IGSS (Interactive Graphical SCADA System) | 2023-03-14T10:58:24.000Z | 2023-03-14T10:58:24.000Z |
| sevd-2023-073-02 | PowerLogic™ HDPM6000 | 2023-03-14T09:26:56.000Z | 2023-03-14T09:26:56.000Z |
| sevd-2023-010-02 | EcoStruxure Geo SCADA Expert | 2023-01-10T16:24:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2022-165-01 | IGSS (Interactive Graphical SCADA System) | 2022-06-14T18:30:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2021-257-02 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Premium and Associated Communication Modules | 2021-09-14T20:04:00.000Z | 2023-02-14T20:04:43.000Z |
| sevd-2020-315-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-11-10T12:05:04.000Z | 2023-02-14T12:05:00.000Z |
| sevd-2023-045-02 | StruxureWare Data Center Expert | 2023-02-14T08:05:19.000Z | 2023-02-14T08:05:19.000Z |
| sevd-2023-045-03 | Merten KNX devices | 2023-02-14T07:24:05.000Z | 2023-02-14T07:24:05.000Z |
| sevd-2022-312-01 | NetBotz 4 - 355/450/455/550/570 | 2022-11-08T06:53:24.000Z | 2023-02-14T06:30:00.000Z |
| sevd-2023-045-01 | EcoStruxureTM Geo SCADA Expert | 2023-02-14T06:02:05.000Z | 2023-02-14T06:02:05.000Z |
| sevd-2022-347-01 | APC Easy UPS Online Monitoring Software | 2022-12-13T06:09:04.000Z | 2023-01-11T00:00:00.000Z |
| sevd-2023-010-03 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2023-01-10T17:44:20.000Z | 2023-01-10T17:44:20.000Z |
| sevd-2023-010-04 | EcoStruxure™ Power SCADA Anywhere | 2023-01-10T10:28:35.000Z | 2023-01-10T10:28:35.000Z |
| sevd-2023-010-01 | EcoStruxureTM Machine Expert – HVAC (formerly SoMachine - HVAC) | 2023-01-10T09:28:52.000Z | 2023-01-10T09:28:52.000Z |
| sevd-2022-347-03 | EcoStruxure Power Commission | 2022-12-13T04:28:00.000Z | 2022-12-13T04:28:00.000Z |
| sevd-2022-347-02 | Saitel DR RTU | 2022-12-13T04:12:25.000Z | 2022-12-13T04:12:25.000Z |
| sevd-2021-103-01 | C-Bus Toolkit and C-Gate Server | 2021-04-13T11:17:13.000Z | 2022-11-08T11:17:13.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-219 | UNKNOWN READ in H5HG__cache_heap_deserialize | 2021-01-22T00:01:04.834439Z | 2026-01-13T04:32:50.029402Z |
| osv-2021-184 | Heap-buffer-overflow in H5HL__fl_deserialize | 2021-01-15T00:00:16.202094Z | 2026-01-13T04:27:53.975862Z |
| osv-2026-30 | Use-of-uninitialized-value in vp9_quantize_fp_avx2 | 2026-01-11T00:08:32.391680Z | 2026-01-11T00:08:32.392050Z |
| osv-2026-21 | Use-of-uninitialized-value in processTLSBlock | 2026-01-09T00:20:25.200679Z | 2026-01-09T00:20:25.201303Z |
| osv-2026-2 | Heap-buffer-overflow in cmt_mpack_consume_uint_tag | 2026-01-03T00:15:15.907754Z | 2026-01-03T00:15:15.908130Z |
| osv-2024-395 | Use-of-uninitialized-value in pcapint_filter_with_aux_data | 2024-05-01T00:04:54.392345Z | 2025-12-31T14:19:24.719836Z |
| osv-2024-793 | Heap-buffer-overflow in H5HL__fl_deserialize | 2024-08-16T00:01:45.237305Z | 2025-12-31T14:19:11.515108Z |
| osv-2023-444 | Heap-buffer-overflow in opj_jp2_apply_pclr | 2023-05-31T14:02:00.753503Z | 2025-12-31T14:18:46.286556Z |
| osv-2022-394 | Incorrect-function-pointer-type in cv::split | 2022-05-04T00:00:27.326853Z | 2025-12-31T14:15:38.077191Z |
| osv-2025-1049 | Heap-buffer-overflow in unsigned char* std::__1::vector<unsigned char, std::__1::allocator<unsigned char | 2025-12-31T00:18:06.669541Z | 2025-12-31T00:18:06.670109Z |
| osv-2023-96 | Heap-buffer-overflow in load_buffer | 2023-02-23T13:00:28.515290Z | 2025-12-30T14:31:38.488878Z |
| osv-2022-993 | Stack-use-after-return in check_buffer | 2022-09-29T00:02:10.256639Z | 2025-12-30T14:29:09.003169Z |
| osv-2023-35 | Heap-buffer-overflow in parse_classes_64 | 2023-01-29T13:01:45.762871Z | 2025-12-30T14:29:07.057739Z |
| osv-2022-1137 | Heap-buffer-overflow in io_memory_read | 2022-11-05T00:00:44.243862Z | 2025-12-30T14:25:46.821941Z |
| osv-2023-137 | Heap-buffer-overflow in OT::Layout::Common::Coverage::get_population | 2023-03-03T13:00:38.278632Z | 2025-12-28T14:11:53.546267Z |
| osv-2022-834 | Heap-use-after-free in mk_event_timeout_destroy | 2022-09-04T00:00:31.605787Z | 2025-12-24T14:22:31.811787Z |
| osv-2022-1277 | Heap-use-after-free in mk_event_timeout_destroy | 2023-06-26T14:01:01.876870Z | 2025-12-24T14:19:36.252391Z |
| osv-2024-1348 | Heap-buffer-overflow in glslang::HlslGrammar::acceptDeclaration | 2024-12-10T00:00:50.788Z | 2025-12-23T15:50:48.626100Z |
| osv-2024-1355 | UNKNOWN READ in glslang::TInfoSinkBase::location | 2024-12-10T00:08:00.540533Z | 2025-12-23T15:50:47.917708Z |
| osv-2024-1346 | UNKNOWN READ in glslang::HlslTokenStream::advanceToken | 2024-12-10T00:00:20.380006Z | 2025-12-23T15:50:47.126469Z |
| osv-2024-1343 | Container-overflow in glslang::HlslParseContext::decomposeIntrinsic | 2024-11-27T00:13:21.103465Z | 2025-12-23T15:50:45.708425Z |
| osv-2025-565 | Heap-buffer-overflow in pcpp::IPv6Address::IPv6Address | 2025-07-21T00:09:57.314960Z | 2025-12-22T14:22:23.333531Z |
| osv-2024-953 | UNKNOWN READ in pcpp::PcapNgFileReaderDevice::getNextPacket | 2024-08-16T00:13:41.933683Z | 2025-12-22T14:21:34.886075Z |
| osv-2024-954 | Use-of-uninitialized-value in pcpp::MplsLayer::toString | 2024-08-16T00:13:43.824630Z | 2025-12-22T14:21:33.246456Z |
| osv-2024-816 | Use-of-uninitialized-value in pcpp::SSLClientHelloMessage::ClientHelloTLSFingerprint::toString | 2024-08-16T00:02:36.618439Z | 2025-12-22T14:21:20.173609Z |
| osv-2024-812 | Use-of-uninitialized-value in pcpp::PcapFileWriterDevice::writePacket | 2024-08-16T00:02:26.387902Z | 2025-12-22T14:21:19.473015Z |
| osv-2024-360 | Heap-buffer-overflow in pcpp::TelnetLayer::getFieldLen | 2024-04-30T00:05:53.016170Z | 2025-12-22T14:20:47.423159Z |
| osv-2024-369 | Segv on unknown address in pcpp::IPv6Layer::~IPv6Layer | 2024-04-30T00:07:01.572543Z | 2025-12-22T14:20:46.950585Z |
| osv-2024-334 | Heap-buffer-overflow in readParsedPacket | 2024-04-30T00:01:24.720399Z | 2025-12-22T14:20:39.449858Z |
| osv-2023-952 | Heap-buffer-overflow in back_passDoAction | 2023-10-02T13:03:05.682426Z | 2025-12-22T14:19:45.912864Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0405 | op_panic in the base runtime can force a panic in the runtime's containing thread | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0404 | Unsoundness in anstream | 2024-09-08T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0403 | op_panic in the base runtime can force a panic in the runtime's containing thread | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0402 | Borsh serialization of HashMap is non-canonical | 2024-10-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0400 | `ruzstd` uninit and out-of-bounds memory reads | 2024-11-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0399 | rustls network-reachable panic in `Acceptor::accept` | 2024-11-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0398 | Bias of Polynomial Coefficients in Secret Sharing | 2024-11-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0393 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0392 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0391 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0379 | Multiple soundness issues | 2024-10-31T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0378 | Risk of use-after-free in `borrowed` reads from Python weak references | 2024-10-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0377 | Heap Buffer overflow using c_chars_to_str function | 2024-10-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0374 | Segmentation fault due to use of uninitialized memory | 2024-09-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0368 | olm-sys: wrapped library unmaintained, potentially vulnerable | 2024-09-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0366 | CWA-2023-004: Excessive number of function parameters in compiled Wasm | 2024-08-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0365 | Binary Protocol Misinterpretation caused by Truncating or Overflowing Casts | 2024-08-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0363 | Binary Protocol Misinterpretation caused by Truncating or Overflowing Casts | 2024-08-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0362 | Stack overflow when parsing specially crafted JSON ABI strings | 2024-07-30T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0360 | `XmpFile::close` can trigger UB | 2024-07-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0358 | Apache Arrow Rust Object Store: AWS WebIdentityToken exposure in log files | 2024-07-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0357 | `MemBio::get_buf` has undefined behavior with empty buffers | 2024-07-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0347 | Incorrect usage of `#[repr(packed)]` | 2024-07-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0346 | Incorrect usage of `#[repr(packed)]` | 2024-07-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0345 | Low severity (DoS) vulnerability in sequoia-openpgp | 2024-06-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0344 | Timing variability in `curve25519-dalek`'s `Scalar29::sub`/`Scalar52::sub` | 2024-06-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0340 | Tor path lengths too short when "full Vanguards" configured | 2024-05-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0338 | Arithmetic overflows in cosmwasm-std | 2024-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0012 | Stack overflow during recursive JSON parsing | 2024-01-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0011 | Unauthenticated Nonce Increment in snow | 2024-01-23T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-libpython-2025-11468 | Folding email comments of unfoldable characters doesn't preserve parenthesis | 2026-01-26T14:42:59.991Z | 2026-02-03T09:12:55.720Z |
| bit-kyverno-2026-23881 | Kyverno Denial of Service via Context Variable Amplification in Policy Engine | 2026-02-03T08:42:39.101Z | 2026-02-03T09:12:55.720Z |
| bit-kyverno-2026-22039 | Kyverno Cross-Namespace Privilege Escalation via Policy apiCall | 2026-02-03T08:42:37.380Z | 2026-02-03T09:12:55.720Z |
| bit-golang-2025-61730 | Handshake messages may be processed at the incorrect encryption level in crypto/tls | 2026-01-31T08:43:36.684Z | 2026-02-03T09:12:55.720Z |
| bit-ghost-2026-24778 | Ghost vulnerable to XSS via malicious Portal preview links | 2026-02-03T08:40:51.583Z | 2026-02-03T09:12:55.720Z |
| bit-discourse-2026-24742 | Discourse staff action logs expose sensitive information to moderators | 2026-02-02T08:42:31.943Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2026-21865 | Discourse topic conversion permission vulnerability for moderators | 2026-02-02T08:42:28.354Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-69289 | Discourse has insecure default configuration that allows non-admin moderators to takeover any non-staff account via email change | 2026-02-02T08:42:26.675Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-69218 | Discourse moderators can access admin-only reports exposing private upload URLs | 2026-02-02T08:42:24.998Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68934 | Discourse Has Denial of Service (DoS) Vulnerability in Drafts Creation Endpoint | 2026-02-02T08:42:23.259Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68933 | Discourse non-admin moderators can exfiltrate private content via post ownership transfer | 2026-02-02T08:42:21.302Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68666 | Discourse users archives leaked to users with moderation privileges | 2026-02-02T08:42:19.452Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68662 | FinalDestination hostname matching allows SSRF protection bypass | 2026-02-02T08:42:17.844Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68660 | Discourse AI Discover's continue conversation allows threat actor to impersonate user | 2026-02-02T08:42:16.289Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68659 | Discourse has DoS vulnerability in username change endpoint | 2026-02-02T08:42:14.606Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68479 | Discourse subscriptions are susceptible to takeover | 2026-02-02T08:42:12.613Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-66488 | Discourse allows script execution in uploaded HTML/XML files on S3 | 2026-02-02T08:42:08.194Z | 2026-02-02T09:12:04.887Z |
| bit-node-2026-21637 | 2026-01-26T14:48:02.384Z | 2026-01-31T09:09:11.750Z | |
| bit-node-2026-21636 | 2026-01-26T14:48:00.613Z | 2026-01-31T09:09:11.750Z | |
| bit-node-2025-59466 | 2026-01-26T14:47:58.830Z | 2026-01-31T09:09:11.750Z | |
| bit-node-2025-59464 | 2026-01-26T14:47:55.131Z | 2026-01-31T09:09:11.750Z | |
| bit-joomla-2025-63083 | Joomla! Core - [20260102] - XSS vector in the pagebreak plugin | 2026-01-31T08:43:33.433Z | 2026-01-31T09:09:11.750Z |
| bit-joomla-2025-63082 | Joomla! Core - [20260101] - Inadequate content filtering for data URLs | 2026-01-31T08:43:31.962Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-68119 | Unexpected code execution when invoking toolchain in cmd/go | 2026-01-31T08:43:40.539Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61731 | Arbitrary file write using cgo pkg-config directive in cmd/go | 2026-01-31T08:43:38.643Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61728 | Excessive CPU consumption when building archive index in archive/zip | 2026-01-31T08:43:32.870Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61726 | Memory exhaustion in query parameter parsing in net/url | 2026-01-31T08:43:29.079Z | 2026-01-31T09:09:11.750Z |
| bit-discourse-2026-23743 | Discourse allows permalinks to restricted resources to leak resource slugs to unauthorized users | 2026-01-31T08:42:04.050Z | 2026-01-31T09:09:11.750Z |
| bit-gitea-2026-20912 | Gitea: Cross-Repository Authorization Bypass via Release Attachment Linking Leads to Private Attachment Disclosure | 2026-01-30T08:40:49.607Z | 2026-01-30T09:12:31.676Z |
| bit-gitea-2026-20904 | Gitea: Broken access control in OpenID visibility toggle enables cross-user visibility changes | 2026-01-30T08:40:47.849Z | 2026-01-30T09:12:31.676Z |
| ID | Description | Updated |
|---|---|---|
| var-202010-1511 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T22:14:35.686000Z |
| var-201912-1854 | An issue existed in the drawing of web page elements. The issue was addressed with improv… | 2024-07-23T22:14:33.774000Z |
| var-200511-0019 | The Internet Key Exchange version 1 (IKEv1) implementation in Check Point products allows… | 2024-07-23T22:14:03.297000Z |
| var-201008-0270 | The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used o… | 2024-07-23T22:14:01.941000Z |
| var-200904-0819 | Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.… | 2024-07-23T22:12:51.678000Z |
| var-201711-0446 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:12:50.009000Z |
| var-201912-0506 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:12:49.908000Z |
| var-200609-0311 | Heap-based buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote at… | 2024-07-23T22:12:46.615000Z |
| var-201905-1248 | Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some m… | 2024-07-23T22:12:08.666000Z |
| var-202007-1133 | Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an … | 2024-07-23T22:12:07.961000Z |
| var-201009-0230 | bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attac… | 2024-07-23T22:12:06.629000Z |
| var-201806-1488 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:12:00.711000Z |
| var-201405-0244 | The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEA… | 2024-07-23T22:12:00.239000Z |
| var-200611-0368 | The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and earlier; and the (2) Pas… | 2024-07-23T22:11:59.300000Z |
| var-201806-1436 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:11:27.007000Z |
| var-201702-0879 | An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari … | 2024-07-23T22:10:32.463000Z |
| var-200703-0010 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T22:10:30.778000Z |
| var-201902-0855 | png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_im… | 2024-07-23T22:10:27.196000Z |
| var-202010-1294 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T22:10:25.978000Z |
| var-201506-0038 | Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to exe… | 2024-07-23T22:10:25.193000Z |
| var-200805-0585 | OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the… | 2024-07-23T22:10:24.233000Z |
| var-202012-1547 | A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel thr… | 2024-07-23T22:10:23.557000Z |
| var-201302-0236 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:10:22.448000Z |
| var-202004-2191 | In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untru… | 2024-07-23T22:10:21.285000Z |
| var-201904-0742 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:10:15.079000Z |
| var-200608-0030 | Unspecified vulnerability in the "compression state handling" in Bom for Apple Mac OS X 1… | 2024-07-23T22:10:15.377000Z |
| var-201912-0608 | A memory corruption issue was addressed with improved input validation. This issue is fix… | 2024-07-23T22:09:37.183000Z |
| var-200505-0162 | Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based … | 2024-07-23T22:09:05.800000Z |
| var-202003-1771 | A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-pro… | 2024-07-23T22:09:01.387000Z |
| var-201506-0465 | The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.… | 2024-07-23T22:08:28.995000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000058 | WordPress plugin "Advanced Custom Fields" vulnerable to HTML injection | 2025-08-08T15:29+09:00 | 2025-08-08T15:29+09:00 |
| jvndb-2025-010972 | Multiple SEIKO EPSON products use weak initial passwords | 2025-08-08T14:50+09:00 | 2025-08-08T14:50+09:00 |
| jvndb-2025-000057 | Multiple vulnerabilities in Mubit Powered BLUE 870 | 2025-08-08T14:47+09:00 | 2025-08-08T14:47+09:00 |
| jvndb-2025-000056 | Multiple vulnerabilities in Sato label printers CL4/6NX Plus and CL4/6NX-J Plus series | 2025-08-06T16:38+09:00 | 2025-08-06T16:38+09:00 |
| jvndb-2025-010603 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation MFPs | 2025-08-05T11:29+09:00 | 2025-08-05T11:29+09:00 |
| jvndb-2025-010408 | Multiple vulnerabilities in PowerCMS | 2025-08-01T12:05+09:00 | 2025-08-01T12:05+09:00 |
| jvndb-2025-000055 | ZXHN-F660T and ZXHN-F660A use a common credential for all installations | 2025-07-31T15:12+09:00 | 2025-07-31T15:12+09:00 |
| jvndb-2025-000054 | Apache Jena Fuseki vulnerable to path traversal | 2025-07-30T14:17+09:00 | 2025-07-30T14:17+09:00 |
| jvndb-2025-000053 | "SwitchBot" App vulnerable to insertion of sensitive information into log file | 2025-07-29T13:44+09:00 | 2025-07-29T13:44+09:00 |
| jvndb-2025-010056 | TP-Link VIGI NVR1104H-4P and VIGI NVR2016H-16MP vulnerable to OS command injection | 2025-07-28T17:53+09:00 | 2025-07-28T17:53+09:00 |
| jvndb-2025-000052 | TP-Link Archer C1200 vulnerable to clickjacking | 2025-07-24T14:16+09:00 | 2025-07-24T14:16+09:00 |
| jvndb-2025-000051 | Real-time Bus Tracking System vulnerable to improper validation of specified quantity in input | 2025-07-23T13:54+09:00 | 2025-07-23T13:54+09:00 |
| jvndb-2025-009576 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-07-23T11:13+09:00 | 2025-07-23T11:13+09:00 |
| jvndb-2025-000050 | "region PAY" App for Android vulnerable to insertion of sensitive information into log file | 2025-07-22T13:33+09:00 | 2025-07-22T13:33+09:00 |
| jvndb-2025-009150 | Security updates for Trend Micro products (June 2025) | 2025-07-17T17:03+09:00 | 2025-07-17T17:03+09:00 |
| jvndb-2025-000030 | Reflected cross-site scripting vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2025-05-12T18:00+09:00 | 2025-07-17T10:06+09:00 |
| jvndb-2025-000049 | ZWX-2000CSW2-HN and ZWX-2000CS2-HN vulnerable to use of hard-coded credentials | 2025-07-16T13:54+09:00 | 2025-07-16T13:54+09:00 |
| jvndb-2025-008881 | Least Privilege Violation Vulnerability in the communications functions of NJ/NX series Machine Automation Controllers | 2025-07-15T15:54+09:00 | 2025-07-15T15:54+09:00 |
| jvndb-2025-008783 | Firebox T15 contains an issue with hidden functionality | 2025-07-14T17:22+09:00 | 2025-07-14T17:22+09:00 |
| jvndb-2025-008145 | Epson Web Installer for Mac vulnerable to missing authentication for critical function | 2025-07-08T14:08+09:00 | 2025-07-08T14:08+09:00 |
| jvndb-2025-008106 | Heap-based buffer overflow vulnerability in V-SFT and TELLUS | 2025-07-07T16:26+09:00 | 2025-07-07T16:26+09:00 |
| jvndb-2025-008105 | Windows shortcut following (.LNK) vulnerability in Trend Micro Security for Windows (CVE-2025-52521) | 2025-07-07T16:04+09:00 | 2025-07-07T16:04+09:00 |
| jvndb-2025-000047 | Multiple vulnerabilities in Nimesa Backup and Recovery | 2025-07-07T15:26+09:00 | 2025-07-07T15:26+09:00 |
| jvndb-2025-007978 | Multiple vulnerabilities in Trend Micro Password Manager for Windows (CVE-2025-48443, CVE-2025-52837) | 2025-07-04T13:28+09:00 | 2025-07-04T13:28+09:00 |
| jvndb-2025-000045 | Multiple vulnerabilities in Active! mail | 2025-07-02T14:13+09:00 | 2025-07-02T14:13+09:00 |
| jvndb-2025-007754 | Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) | 2025-07-02T11:31+09:00 | 2025-07-02T11:31+09:00 |
| jvndb-2025-007607 | Pass-Back Attack vulnerability in Konica Minorta bizhub series | 2025-07-01T14:09+09:00 | 2025-07-01T14:09+09:00 |
| jvndb-2025-007595 | Multiple vulnerabilities in Web Connection of Konica Minolta MFPs | 2025-07-01T14:02+09:00 | 2025-07-01T14:02+09:00 |
| jvndb-2025-000046 | SLNX Help Documentation of RICOH Streamline NX vulnerable to reflected cross-site scripting | 2025-06-30T15:45+09:00 | 2025-06-30T15:45+09:00 |
| jvndb-2025-007552 | Multiple vulnerabilities in TB-eye network recorders and AHD recorders | 2025-06-30T14:45+09:00 | 2025-06-30T14:45+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0274-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2026-01-23T12:04:25Z | 2026-01-23T12:04:25Z |
| suse-su-2026:0273-1 | Security update for azure-cli-core | 2026-01-23T11:26:43Z | 2026-01-23T11:26:43Z |
| suse-su-2026:20139-1 | Security update for python-jaraco.context | 2026-01-23T10:43:48Z | 2026-01-23T10:43:48Z |
| suse-su-2026:0270-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6) | 2026-01-23T10:33:38Z | 2026-01-23T10:33:38Z |
| suse-su-2026:0269-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6) | 2026-01-23T10:04:12Z | 2026-01-23T10:04:12Z |
| suse-su-2026:0268-1 | Security update for python | 2026-01-23T09:40:47Z | 2026-01-23T09:40:47Z |
| suse-su-2026:0267-1 | Recommended update for kernel-firmware | 2026-01-23T09:40:29Z | 2026-01-23T09:40:29Z |
| suse-su-2026:0266-1 | Security update for glib2 | 2026-01-23T08:55:04Z | 2026-01-23T08:55:04Z |
| suse-su-2026:0265-1 | Security update for libsoup | 2026-01-23T07:08:44Z | 2026-01-23T07:08:44Z |
| suse-su-2026:0264-1 | Security update for glib2 | 2026-01-23T04:33:57Z | 2026-01-23T04:33:57Z |
| suse-su-2026:0263-1 | Security update for the Linux Kernel | 2026-01-22T21:15:02Z | 2026-01-22T21:15:02Z |
| suse-su-2026:20134-1 | Security update for busybox | 2026-01-22T16:57:46Z | 2026-01-22T16:57:46Z |
| suse-su-2026:20135-1 | Security update for bind | 2026-01-22T16:50:15Z | 2026-01-22T16:50:15Z |
| suse-su-2026:20133-1 | Security update for python-pyasn1 | 2026-01-22T16:46:21Z | 2026-01-22T16:46:21Z |
| suse-su-2026:20158-1 | Security update for python-pyasn1 | 2026-01-22T16:35:43Z | 2026-01-22T16:35:43Z |
| suse-su-2026:0262-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP6) | 2026-01-22T16:33:41Z | 2026-01-22T16:33:41Z |
| suse-su-2026:0260-1 | Security update for MozillaFirefox | 2026-01-22T16:11:44Z | 2026-01-22T16:11:44Z |
| suse-su-2026:0259-1 | Security update for avahi | 2026-01-22T16:10:45Z | 2026-01-22T16:10:45Z |
| suse-su-2026:0258-1 | Security update for libsoup2 | 2026-01-22T16:10:25Z | 2026-01-22T16:10:25Z |
| suse-su-2026:0257-1 | Security update for libsoup | 2026-01-22T16:09:13Z | 2026-01-22T16:09:13Z |
| suse-su-2026:0256-1 | Security update for openldap2_5 | 2026-01-22T16:08:55Z | 2026-01-22T16:08:55Z |
| suse-su-2026:0255-1 | Security update for python-urllib3 | 2026-01-22T16:08:44Z | 2026-01-22T16:08:44Z |
| suse-su-2026:0254-1 | Security update for log4j | 2026-01-22T16:08:26Z | 2026-01-22T16:08:26Z |
| suse-su-2026:0253-1 | Security update for libsoup2 | 2026-01-22T16:08:05Z | 2026-01-22T16:08:05Z |
| suse-su-2026:0252-1 | Security update for python-pyasn1 | 2026-01-22T16:06:32Z | 2026-01-22T16:06:32Z |
| suse-su-2026:20132-1 | Security update for go1.25 | 2026-01-22T15:53:13Z | 2026-01-22T15:53:13Z |
| suse-su-2026:20129-1 | Security update for python-virtualenv | 2026-01-22T15:48:44Z | 2026-01-22T15:48:44Z |
| suse-su-2026:20130-1 | Security update for python-marshmallow | 2026-01-22T15:46:22Z | 2026-01-22T15:46:22Z |
| suse-su-2026:20157-1 | Security update for python-urllib3 | 2026-01-22T15:46:01Z | 2026-01-22T15:46:01Z |
| suse-su-2026:20131-1 | Security update for python-urllib3 | 2026-01-22T15:46:01Z | 2026-01-22T15:46:01Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-04441 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-926218) | 2025-11-25 | 2026-01-22 |
| cnvd-2026-04439 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-925400) | 2025-11-25 | 2026-01-22 |
| cnvd-2026-04438 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-925300) | 2025-11-25 | 2026-01-22 |
| cnvd-2026-04437 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-925298) | 2025-11-25 | 2026-01-22 |
| cnvd-2026-04436 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-925280) | 2025-11-25 | 2026-01-22 |
| cnvd-2026-04435 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-925115) | 2025-11-25 | 2026-01-22 |
| cnvd-2026-04434 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-924847) | 2025-11-25 | 2026-01-22 |
| cnvd-2026-04433 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-924158) | 2025-11-25 | 2026-01-22 |
| cnvd-2026-04432 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-923949) | 2025-11-25 | 2026-01-22 |
| cnvd-2026-04429 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-859399) | 2025-11-17 | 2026-01-22 |
| cnvd-2026-04428 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-824752) | 2025-11-10 | 2026-01-22 |
| cnvd-2026-04426 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-921601) | 2025-11-25 | 2026-01-22 |
| cnvd-2026-04425 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-891462) | 2025-11-19 | 2026-01-22 |
| cnvd-2026-04424 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-859401) | 2025-11-17 | 2026-01-22 |
| cnvd-2026-06111 | Soda PDF Desktop越界读取漏洞 | 2026-01-09 | 2026-01-21 |
| cnvd-2026-06110 | Soda PDF Desktop代码执行漏洞(CNVD-2026-06110) | 2026-01-09 | 2026-01-21 |
| cnvd-2026-06108 | Soda PDF Desktop代码执行漏洞(CNVD-2026-06108) | 2026-01-09 | 2026-01-21 |
| cnvd-2026-06107 | Soda PDF Desktop代码执行漏洞 | 2026-01-09 | 2026-01-21 |
| cnvd-2026-06105 | Tenda AX1806 SetIPv6Status函数命令注入漏洞 | 2022-05-07 | 2026-01-21 |
| cnvd-2026-06103 | Tenda AX1806 fromAdvSetMacMtuWan函数堆栈缓冲区溢出漏洞 | 2022-05-09 | 2026-01-21 |
| cnvd-2026-06102 | Tenda AX1806 sub_455D4函数栈缓冲区溢出漏洞 | 2023-11-13 | 2026-01-21 |
| cnvd-2026-06101 | Tenda M3 /goform/getMasterPassengerAnalyseData文件堆栈缓冲区溢出漏洞 | 2025-08-22 | 2026-01-21 |
| cnvd-2026-06100 | Tenda M3 /goform/QuickIndex文件堆栈缓冲区溢出漏洞 | 2025-08-26 | 2026-01-21 |
| cnvd-2026-06099 | Tenda AX-3 get_parentControl_list_Info函数堆栈缓冲区溢出漏洞 | 2025-11-05 | 2026-01-21 |
| cnvd-2026-06098 | Tenda M3 /goform/exeCommand文件堆栈缓冲区溢出漏洞 | 2026-01-06 | 2026-01-21 |
| cnvd-2026-06097 | Tenda M3 /goform/setAdPushInfo文件堆栈缓冲区溢出漏洞 | 2026-01-06 | 2026-01-21 |
| cnvd-2026-06096 | Tenda M3 /goform/setAdInfoDetail文件堆缓冲区溢出漏洞 | 2026-01-06 | 2026-01-21 |
| cnvd-2026-06095 | Tenda M3 /goform/setVlanInfo文件堆栈缓冲区溢出漏洞 | 2026-01-06 | 2026-01-21 |
| cnvd-2026-06094 | Tenda M3 /goform/setInternetLanInfo文件堆缓冲区溢出漏洞 | 2026-01-14 | 2026-01-21 |
| cnvd-2026-06093 | Tenda AX-3 fromAdvSetMacMtuWan函数栈缓冲区溢出漏洞 | 2026-01-19 | 2026-01-21 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0056 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0055 | Multiples vulnérabilités dans GLPI | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0054 | Multiples vulnérabilités dans Centreon Infra Monitoring | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0053 | Vulnérabilité dans Traefik | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2025-avi-1122 | Multiples vulnérabilités dans Mattermost Server | 2025-12-18T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0051 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0050 | Multiples vulnérabilités dans les produits Juniper Networks | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0049 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0048 | Multiples vulnérabilités dans Wireshark | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0047 | Vulnérabilité dans F5 NGINX Ingress Controller | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0038 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-14T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0046 | Multiples vulnérabilités dans les produits Microsoft | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0045 | Multiples vulnérabilités dans Microsoft Azure | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0044 | Multiples vulnérabilités dans Microsoft Windows | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0043 | Multiples vulnérabilités dans Microsoft Office | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0042 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0041 | Multiples vulnérabilités dans les produits Elastic | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0040 | Multiples vulnérabilités dans Google Chrome | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0039 | Multiples vulnérabilités dans Node.js | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0037 | Multiples vulnérabilités dans Typo3 | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0036 | Multiples vulnérabilités dans Suricata | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0035 | Multiples vulnérabilités dans les produits Fortinet | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0034 | Multiples vulnérabilités dans les produits SAP | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0033 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0032 | Multiples vulnérabilités dans les produits Siemens | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0031 | Vulnérabilité dans le greffon VSCode pour Spring CLI | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0030 | Vulnérabilité dans MISP | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| certfr-2026-avi-0029 | Multiples vulnérabilités dans VMware Tanzu Gemfire | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| certfr-2026-avi-0028 | Multiples vulnérabilités dans MariaDB | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| certfr-2026-avi-0027 | Vulnérabilité dans NetApp ONTAP | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2021-ALE-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| CERTFR-2021-ALE-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-ale-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| CERTFR-2021-ALE-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| certfr-2021-ale-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| CERTFR-2021-ALE-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-ale-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| CERTFR-2021-ALE-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| certfr-2021-ale-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| CERTFR-2021-ALE-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| certfr-2021-ale-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| CERTFR-2021-ALE-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| CERTFR-2021-ALE-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |