Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2733 |
3.8 (3.1)
|
Org.keycloak/keycloak-services: keycloak: missing chec… |
Red Hat |
Red Hat Build of Keycloak |
2026-02-19T07:48:08.910Z | 2026-02-19T07:48:08.910Z |
| CVE-2026-2731 |
10 (4.0)
|
Unauthenticated RCE in Dynamicweb 9 and Dynamicweb 8 |
DynamicWeb |
DynamicWeb 9 |
2026-02-19T06:46:52.763Z | 2026-02-19T07:41:28.171Z |
| CVE-2026-2711 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
zhutoutoutousan worldquant-miner URL ssrf_proxy.py ser… |
zhutoutoutousan |
worldquant-miner |
2026-02-19T07:02:07.848Z | 2026-02-19T07:02:07.848Z |
| CVE-2026-2681 |
5.3 (3.1)
|
Github.com/supranational/blst: blst cryptographic libr… |
|
|
2026-02-19T06:58:47.090Z | 2026-02-19T06:58:47.090Z |
| CVE-2026-1994 |
9.8 (3.1)
|
s2Member <= 260127 - Unauthenticated Privilege Escalat… |
clavaque |
s2Member – Excellent for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions |
2026-02-19T06:49:43.503Z | 2026-02-19T06:49:43.503Z |
| CVE-2026-2709 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
busy Callback app.js redirect |
n/a |
busy |
2026-02-19T06:32:06.498Z | 2026-02-19T06:32:06.498Z |
| CVE-2026-2706 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Patient Record Management System fecalys… |
code-projects |
Patient Record Management System |
2026-02-19T06:02:06.881Z | 2026-02-19T06:02:06.881Z |
| CVE-2026-2705 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open Babel MOL2 File atom.h SetFormalCharge out-of-bounds |
n/a |
Open Babel |
2026-02-19T05:02:07.101Z | 2026-02-19T05:02:07.101Z |
| CVE-2026-2648 |
N/A
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-02-18T21:39:03.100Z | 2026-02-19T04:55:53.953Z |
| CVE-2026-2650 |
8.8 (3.1)
|
Heap buffer overflow in Media in Google Chrome pr… |
Google |
Chrome |
2026-02-18T21:39:04.464Z | 2026-02-19T04:55:53.151Z |
| CVE-2026-2649 |
8.8 (3.1)
|
Integer overflow in V8 in Google Chrome prior to … |
Google |
Chrome |
2026-02-18T21:39:03.873Z | 2026-02-19T04:55:52.326Z |
| CVE-2026-0875 |
7.8 (3.1)
|
MODEL File Parsing Out-of-Bounds Write |
Autodesk |
Shared Components |
2026-02-18T19:39:27.111Z | 2026-02-19T04:55:51.518Z |
| CVE-2026-0874 |
7.8 (3.1)
|
CATPART File Parsing Out-of-Bounds Write |
Autodesk |
Shared Components |
2026-02-18T19:38:32.639Z | 2026-02-19T04:55:50.723Z |
| CVE-2025-13689 |
8.8 (3.1)
|
DataStage on Cloud Pak for Data is vulnerable to arbit… |
IBM |
DataStage on Cloud Pak |
2026-02-17T22:26:20.866Z | 2026-02-19T04:55:49.939Z |
| CVE-2025-13691 |
8.1 (3.1)
|
DataStage on Cloud Pak for Data is vulnerable to sensi… |
IBM |
DataStage on Cloud Pak for Data |
2026-02-17T20:17:24.149Z | 2026-02-19T04:55:49.175Z |
| CVE-2025-14009 |
10 (3.0)
|
Zip Slip Vulnerability in nltk/nltk Leading to Remote … |
nltk |
nltk/nltk |
2026-02-18T17:45:17.573Z | 2026-02-19T04:55:48.396Z |
| CVE-2026-20142 |
6.8 (3.1)
|
Sensitive Information Disclosure in "_internal" index … |
Splunk |
Splunk Enterprise |
2026-02-18T16:45:37.455Z | 2026-02-19T04:55:47.612Z |
| CVE-2026-20138 |
6.8 (3.1)
|
Sensitive Information Disclosure in "_internal" index … |
Splunk |
Splunk Enterprise |
2026-02-18T16:45:33.870Z | 2026-02-19T04:55:46.886Z |
| CVE-2026-20144 |
6.8 (3.1)
|
Sensitive Information Disclosure in ''_internal'' inde… |
Splunk |
Splunk Enterprise |
2026-02-18T16:45:23.674Z | 2026-02-19T04:55:46.115Z |
| CVE-2025-33253 |
7.8 (3.1)
|
NVIDIA NeMo Framework contains a vulnerability wh… |
NVIDIA |
NeMo Framework |
2026-02-18T13:57:09.360Z | 2026-02-19T04:55:45.366Z |
| CVE-2025-33252 |
7.8 (3.1)
|
NVIDIA NeMo Framework contains a vulnerability wh… |
NVIDIA |
NeMo Framework |
2026-02-18T13:56:57.379Z | 2026-02-19T04:55:44.499Z |
| CVE-2025-33251 |
7.8 (3.1)
|
NVIDIA NeMo Framework contains a vulnerability wh… |
NVIDIA |
NeMo Framework |
2026-02-18T13:56:40.137Z | 2026-02-19T04:55:43.712Z |
| CVE-2025-33250 |
7.8 (3.1)
|
NVIDIA NeMo Framework contains a vulnerability wh… |
NVIDIA |
NeMo Framework |
2026-02-18T13:56:28.676Z | 2026-02-19T04:55:42.931Z |
| CVE-2025-33249 |
7.8 (3.1)
|
NVIDIA NeMo Framework for all platforms contains … |
NVIDIA |
NeMo Framework |
2026-02-18T13:56:12.513Z | 2026-02-19T04:55:41.910Z |
| CVE-2025-33246 |
7.8 (3.1)
|
NVIDIA NeMo Framework for all platforms contains … |
NVIDIA |
NeMo Framework |
2026-02-18T13:56:02.604Z | 2026-02-19T04:55:41.131Z |
| CVE-2025-33245 |
8 (3.1)
|
NVIDIA NeMo Framework contains a vulnerability wh… |
NVIDIA |
NeMo Framework |
2026-02-18T13:55:47.659Z | 2026-02-19T04:55:40.394Z |
| CVE-2025-33243 |
7.8 (3.1)
|
NVIDIA NeMo Framework contains a vulnerability wh… |
NVIDIA |
NeMo Framework |
2026-02-18T13:55:35.266Z | 2026-02-19T04:55:39.603Z |
| CVE-2025-33236 |
7.8 (3.1)
|
NVIDIA NeMo Framework contains a vulnerability wh… |
NVIDIA |
NeMo Framework |
2026-02-18T13:55:06.688Z | 2026-02-19T04:55:38.824Z |
| CVE-2025-33241 |
7.8 (3.1)
|
NVIDIA NeMo Framework contains a vulnerability wh… |
NVIDIA |
NeMo Framework |
2026-02-18T13:55:19.876Z | 2026-02-19T04:55:38.047Z |
| CVE-2021-22175 |
6.8 (3.1)
|
When requests to the internal network for webhook… |
GitLab |
GitLab |
2021-06-11T15:30:12.000Z | 2026-02-19T04:55:37.221Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2686 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
SECCN Dingcheng G10 session_login.cgi qq os command in… |
SECCN Dingcheng |
G10 |
2026-02-19T00:02:07.214Z | 2026-02-19T00:02:07.214Z |
| CVE-2026-2684 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Tsinghua Unigroup Electronic Archives System uploadFil… |
Tsinghua Unigroup |
Electronic Archives System |
2026-02-18T23:32:07.382Z | 2026-02-18T23:32:07.382Z |
| CVE-2026-25926 |
7.3 (3.1)
|
Notepad++ has an Untrusted Search Path |
notepad-plus-plus |
notepad-plus-plus |
2026-02-18T23:07:36.383Z | 2026-02-18T23:07:36.383Z |
| CVE-2026-25592 |
10 (3.1)
|
Semantic Kernel has an Arbitrary File Write via AI Age… |
microsoft |
semantic-kernel |
2026-02-06T20:38:28.770Z | 2026-02-18T23:32:54.483Z |
| CVE-2026-24126 |
6.6 (3.1)
|
Weblate has an argument injection in management console |
WeblateOrg |
weblate |
2026-02-18T23:05:03.478Z | 2026-02-18T23:05:03.478Z |
| CVE-2025-15585 |
6.7 (4.0)
|
Fileflows versions before 25.05.2 are affected by… |
fileflows |
fileflows |
2026-02-18T23:44:40.034Z | 2026-02-18T23:46:59.818Z |
| CVE-2025-15581 |
4.7 (4.0)
|
Orthanc versions before 1.12.10 are affected by a… |
orthanc-server |
orthanc |
2026-02-18T22:59:55.491Z | 2026-02-18T23:03:54.596Z |
| CVE-2026-2683 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Tsinghua Unigroup Electronic Archives System downLoad.… |
Tsinghua Unigroup |
Electronic Archives System |
2026-02-18T23:02:06.726Z | 2026-02-18T23:02:06.726Z |
| CVE-2026-2682 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Tsinghua Unigroup Electronic Archives System prinRepor… |
Tsinghua Unigroup |
Electronic Archives System |
2026-02-18T22:32:08.536Z | 2026-02-18T22:32:08.536Z |
| CVE-2026-2676 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
GoogTech sms-ssm API LoginInterceptor.java preHandle i… |
GoogTech |
sms-ssm |
2026-02-18T22:02:07.132Z | 2026-02-18T22:02:07.132Z |
| CVE-2026-2650 |
8.8 (3.1)
|
Heap buffer overflow in Media in Google Chrome pr… |
Google |
Chrome |
2026-02-18T21:39:04.464Z | 2026-02-19T04:55:53.151Z |
| CVE-2026-2649 |
8.8 (3.1)
|
Integer overflow in V8 in Google Chrome prior to … |
Google |
Chrome |
2026-02-18T21:39:03.873Z | 2026-02-19T04:55:52.326Z |
| CVE-2026-26281 |
4.4 (3.1)
|
InvoicePlane has Stored Cross-Site Scripting (XSS) Iss… |
InvoicePlane |
InvoicePlane |
2026-02-18T23:03:08.876Z | 2026-02-18T23:03:08.876Z |
| CVE-2026-26270 |
5.4 (3.1)
|
InvoicePlane has Stored Cross-Site Scripting Issue in … |
InvoicePlane |
InvoicePlane |
2026-02-18T23:01:41.222Z | 2026-02-18T23:01:41.222Z |
| CVE-2026-25596 |
4.8 (3.1)
|
InvoicePlane has Stored XSS via Product Unit Name in I… |
InvoicePlane |
InvoicePlane |
2026-02-18T22:59:44.627Z | 2026-02-18T22:59:44.627Z |
| CVE-2026-25595 |
4.8 (3.1)
|
InvoicePlane has Stored XSS via Invoice Number in Invo… |
InvoicePlane |
InvoicePlane |
2026-02-18T22:52:27.047Z | 2026-02-18T22:52:27.047Z |
| CVE-2026-25594 |
4.8 (3.1)
|
InvoicePlane has Stored XSS via Family Name in Product Form |
InvoicePlane |
InvoicePlane |
2026-02-18T22:50:45.523Z | 2026-02-18T22:50:45.523Z |
| CVE-2026-25548 |
9.1 (3.1)
|
InvoicePlane Vulnerable to Remote Code Execution via L… |
InvoicePlane |
InvoicePlane |
2026-02-18T22:49:15.235Z | 2026-02-18T22:49:15.235Z |
| CVE-2026-24745 |
5.7 (3.1)
|
InvoicePlane has a Stored Cross-Site Scripting (XSS) issue |
InvoicePlane |
InvoicePlane |
2026-02-18T22:47:19.717Z | 2026-02-18T22:47:19.717Z |
| CVE-2025-12812 |
5.3 (4.0)
|
Cloud Suite and Privilege Access Service – SQL Injection |
Delinea Inc. |
Cloud Suite and Privileged Access Service |
2026-02-18T22:10:35.049Z | 2026-02-18T22:24:40.788Z |
| CVE-2025-12811 |
6.9 (4.0)
|
Cloud Suite and Privilege Access Service– HTTP request… |
Delinea Inc. |
Cloud Suite and Privileged Access Service |
2026-02-18T22:08:25.254Z | 2026-02-18T22:23:56.385Z |
| CVE-2026-2672 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Tsinghua Unigroup Electronic Archives System downLoad … |
Tsinghua Unigroup |
Electronic Archives System |
2026-02-18T21:32:07.412Z | 2026-02-18T21:32:07.412Z |
| CVE-2026-2670 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
Advantech WISE-6610 Background Management openvpn_appl… |
Advantech |
WISE-6610 |
2026-02-18T21:02:08.426Z | 2026-02-18T21:02:08.426Z |
| CVE-2026-2669 |
6.9 (4.0)
6.5 (3.1)
6.5 (3.0)
|
Rongzhitong Visual Integrated Command and Dispatch Pla… |
Rongzhitong |
Visual Integrated Command and Dispatch Platform |
2026-02-18T21:02:06.522Z | 2026-02-18T21:02:06.522Z |
| CVE-2026-2648 |
N/A
|
Heap buffer overflow in PDFium in Google Chrome p… |
Google |
Chrome |
2026-02-18T21:39:03.100Z | 2026-02-19T04:55:53.953Z |
| CVE-2026-27182 |
8.6 (4.0)
8.4 (3.1)
|
Saturn Remote Mouse Server UDP Command Injection RCE |
saturnremote |
Saturn Remote Mouse Server |
2026-02-18T20:59:12.092Z | 2026-02-18T21:02:05.342Z |
| CVE-2026-27181 |
8.7 (4.0)
7.5 (3.1)
|
MajorDoMo Unauthenticated Module Uninstall via Market … |
sergejey |
MajorDoMo |
2026-02-18T21:10:41.878Z | 2026-02-18T21:27:03.900Z |
| CVE-2026-27180 |
9.3 (4.0)
9.8 (3.1)
|
MajorDoMo Supply Chain Remote Code Execution via Updat… |
sergejey |
MajorDoMo |
2026-02-18T21:10:41.057Z | 2026-02-18T21:10:41.057Z |
| CVE-2026-27179 |
8.8 (4.0)
8.2 (3.1)
|
MajorDoMo Unauthenticated SQL Injection in Commands Module |
sergejey |
MajorDoMo |
2026-02-18T21:10:40.242Z | 2026-02-18T21:10:40.242Z |
| CVE-2026-27178 |
5.3 (4.0)
7.2 (3.1)
|
MajorDoMo Stored Cross-Site Scripting via Method Param… |
sergejey |
MajorDoMo |
2026-02-18T21:10:39.441Z | 2026-02-18T21:10:39.441Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2686 | A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the fu… | 2026-02-19T00:16:22.143 | 2026-02-19T00:16:22.143 |
| fkie_cve-2026-2684 | A vulnerability was determined in Tsinghua Unigroup Electronic Archives System up to 3.2.210802(625… | 2026-02-19T00:16:21.953 | 2026-02-19T00:16:21.953 |
| fkie_cve-2026-25926 | Notepad++ is a free and open-source source code editor. An Unsafe Search Path vulnerability (CWE-42… | 2026-02-19T00:16:21.787 | 2026-02-19T00:16:21.787 |
| fkie_cve-2026-25592 | Semantic Kernel is an SDK used to build, orchestrate, and deploy AI agents and multi-agent systems.… | 2026-02-06T21:16:17.647 | 2026-02-19T00:16:21.663 |
| fkie_cve-2026-24126 | Weblate is a web based localization tool. Prior to 5.16.0, the SSH management console did not valid… | 2026-02-19T00:16:21.483 | 2026-02-19T00:16:21.483 |
| fkie_cve-2025-15585 | Fileflows versions before 25.05.2 are affected by an authenticated SQL injection vulnerability in t… | 2026-02-19T00:16:21.053 | 2026-02-19T00:16:21.053 |
| fkie_cve-2025-15581 | Orthanc versions before 1.12.10 are affected by an authorisation logic flaw in the application's HT… | 2026-02-18T23:16:18.907 | 2026-02-19T00:16:20.913 |
| fkie_cve-2026-2683 | A vulnerability was found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). The af… | 2026-02-18T23:16:21.290 | 2026-02-18T23:16:21.290 |
| fkie_cve-2026-2682 | A vulnerability has been found in Tsinghua Unigroup Electronic Archives System up to 3.2.210802(625… | 2026-02-18T23:16:21.100 | 2026-02-18T23:16:21.100 |
| fkie_cve-2026-2676 | A weakness has been identified in GoogTech sms-ssm up to e8534c766fd13f5f94c01dab475d75f286918a8d. … | 2026-02-18T23:16:20.910 | 2026-02-18T23:16:20.910 |
| fkie_cve-2026-2650 | Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to… | 2026-02-18T22:16:26.980 | 2026-02-18T23:16:20.720 |
| fkie_cve-2026-2649 | Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potent… | 2026-02-18T22:16:26.847 | 2026-02-18T23:16:20.557 |
| fkie_cve-2026-26281 | InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments.… | 2026-02-18T23:16:20.400 | 2026-02-18T23:16:20.400 |
| fkie_cve-2026-26270 | InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments.… | 2026-02-18T23:16:20.237 | 2026-02-18T23:16:20.237 |
| fkie_cve-2026-25596 | InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments.… | 2026-02-18T23:16:20.073 | 2026-02-18T23:16:20.073 |
| fkie_cve-2026-25595 | InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments.… | 2026-02-18T23:16:19.910 | 2026-02-18T23:16:19.910 |
| fkie_cve-2026-25594 | InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments.… | 2026-02-18T23:16:19.747 | 2026-02-18T23:16:19.747 |
| fkie_cve-2026-25548 | InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments.… | 2026-02-18T23:16:19.567 | 2026-02-18T23:16:19.567 |
| fkie_cve-2026-24745 | InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments.… | 2026-02-18T23:16:19.407 | 2026-02-18T23:16:19.407 |
| fkie_cve-2025-12812 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Delinea Inc… | 2026-02-18T23:16:18.763 | 2026-02-18T23:16:18.763 |
| fkie_cve-2025-12811 | Improper Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') in Delinea Inc. Cl… | 2026-02-18T23:16:18.580 | 2026-02-18T23:16:18.580 |
| fkie_cve-2026-2672 | A security flaw has been discovered in Tsinghua Unigroup Electronic Archives System 3.2.210802(6253… | 2026-02-18T22:16:27.553 | 2026-02-18T22:16:27.553 |
| fkie_cve-2026-2670 | A vulnerability was identified in Advantech WISE-6610 1.2.1_20251110. Affected is an unknown functi… | 2026-02-18T22:16:27.360 | 2026-02-18T22:16:27.360 |
| fkie_cve-2026-2669 | A vulnerability was determined in Rongzhitong Visual Integrated Command and Dispatch Platform up to… | 2026-02-18T22:16:27.177 | 2026-02-18T22:16:27.177 |
| fkie_cve-2026-2648 | Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed a remote attacker t… | 2026-02-18T22:16:26.710 | 2026-02-18T22:16:26.710 |
| fkie_cve-2026-27182 | Saturn Remote Mouse Server contains a command injection vulnerability that allows unauthenticated a… | 2026-02-18T22:16:26.517 | 2026-02-18T22:16:26.517 |
| fkie_cve-2026-27181 | MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation throug… | 2026-02-18T22:16:26.337 | 2026-02-18T22:16:26.337 |
| fkie_cve-2026-27180 | MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution throug… | 2026-02-18T22:16:26.153 | 2026-02-18T22:16:26.153 |
| fkie_cve-2026-27179 | MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in th… | 2026-02-18T22:16:25.967 | 2026-02-18T22:16:25.967 |
| fkie_cve-2026-27178 | MajorDoMo (aka Major Domestic Module) contains a stored cross-site scripting (XSS) vulnerability th… | 2026-02-18T22:16:25.790 | 2026-02-18T22:16:25.790 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-mvg3-r374-jg32 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in Tsinghua Unigroup Electronic Archives System up to 3.2.210802(625… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-fq57-8j4v-2xq2 |
6.7 (4.0)
|
Fileflows versions before 25.05.2 are affected by an authenticated SQL injection vulnerability in t… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-87c2-mcff-93mr |
9.8 (3.1)
8.9 (4.0)
|
A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the fu… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-6rxp-px53-8xf6 |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). The af… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-63wr-vhhf-qrpx |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in GoogTech sms-ssm up to e8534c766fd13f5f94c01dab475d75f286918a8d. … | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-3428-qfh5-9x74 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was determined in Tsinghua Unigroup Electronic Archives System up to 3.2.210802(625… | 2026-02-19T00:30:31Z | 2026-02-19T00:30:31Z |
| ghsa-w366-h875-fm53 |
8.2 (3.1)
8.8 (4.0)
|
MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in th… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-m568-c33v-g59q |
8.8 (3.1)
|
Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potent… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-h5vr-w6qh-ffwp |
8.8 (3.1)
|
Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-grp8-p6j9-9x5f |
9.8 (3.1)
9.3 (4.0)
|
MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution throug… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-ggv8-8p4m-x2fc |
4.3 (3.1)
2.1 (4.0)
|
A security flaw has been discovered in Tsinghua Unigroup Electronic Archives System 3.2.210802(6253… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-g4hf-7q6p-whw3 |
8.4 (3.1)
8.6 (4.0)
|
Saturn Remote Mouse Server contains a command injection vulnerability that allows unauthenticated a… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-9vw8-375m-pj63 |
6.5 (3.1)
5.5 (4.0)
|
A vulnerability was determined in Rongzhitong Visual Integrated Command and Dispatch Platform up to… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-6f4f-6mw4-9rmf |
5.3 (4.0)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Delinea Inc… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-654q-5mj4-74h4 |
6.9 (4.0)
|
Improper Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') in Delinea Inc. Cl… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-5v24-5hr7-xg26 |
7.5 (3.1)
8.7 (4.0)
|
MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation throug… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-5c8c-h849-76wx |
7.2 (3.1)
5.3 (4.0)
|
MajorDoMo (aka Major Domestic Module) contains a stored cross-site scripting (XSS) vulnerability th… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-4wvv-g662-rjm9 |
4.7 (4.0)
|
Orthanc versions before 1.12.10 are affected by an authorisation logic flaw in the application's HT… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-4g6v-jhwq-9xjj |
|
Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed a remote attacker t… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-36ph-wmrq-6hrj |
7.2 (3.1)
7.3 (4.0)
|
A vulnerability was identified in Advantech WISE-6610 1.2.1_20251110. Affected is an unknown functi… | 2026-02-19T00:30:30Z | 2026-02-19T00:30:30Z |
| ghsa-wj34-3cm4-v64v |
6.1 (3.1)
5.1 (4.0)
|
IPFire 2.21 Core Update 127 contains a reflected cross-site scripting vulnerability in the updatexl… | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ghsa-rpq9-4jjf-2xhh |
6.1 (3.1)
5.1 (4.0)
|
MajorDoMo (aka Major Domestic Module) contains a reflected cross-site scripting (XSS) vulnerability… | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ghsa-qx68-hf7m-xmfg |
6.1 (3.1)
5.1 (4.0)
|
IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the… | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ghsa-pgfc-hgqj-gfc4 |
6.1 (3.1)
5.1 (4.0)
|
IPFire 2.21 Core Update 127 contains multiple cross-site scripting vulnerabilities in the ovpnmain.… | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ghsa-pcm2-gfvw-8jpr |
6.4 (3.1)
5.1 (4.0)
|
IPFire 2.21 Core Update 127 contains multiple stored cross-site scripting vulnerabilities in the ex… | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ghsa-p5wr-fv9m-v746 |
9.8 (3.1)
8.4 (4.0)
|
ChaosPro 2.0 contains a buffer overflow vulnerability in the configuration file path handling that … | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ghsa-jmf5-x823-23g3 |
9.8 (3.1)
9.2 (4.0)
|
MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/… | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ghsa-jm9g-c5gq-m5v9 |
9.8 (3.1)
9.3 (4.0)
|
MailCarrier 2.51 contains a buffer overflow vulnerability in the POP3 USER command that allows remo… | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ghsa-h43q-jc93-2r9j |
7.5 (3.1)
8.4 (4.0)
|
WMV to AVI MPEG DVD WMV Convertor 4.6.1217 contains a buffer overflow vulnerability that allows att… | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ghsa-g5vg-c5mv-fgg7 |
9.8 (3.1)
9.3 (4.0)
|
WMV to AVI MPEG DVD WMV Convertor 4.6.1217 contains a buffer overflow vulnerability that allows att… | 2026-02-19T00:30:29Z | 2026-02-19T00:30:29Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-85 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-02-17T13:55:49.356648Z |
| pysec-2024-84 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.3.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-02-17T13:55:49.257552Z |
| pysec-2024-83 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-02-17T13:55:49.155981Z |
| pysec-2024-82 |
8.8 (3.1)
|
Deserialization of untrusted data can occur in versions 23.3.2.0 and newer of the MindsDB… | mindsdb | 2024-09-12T13:15:00Z | 2026-02-17T13:55:49.053637Z |
| pysec-2023-278 |
5.3 (3.1)
|
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.1… | mindsdb | 2023-12-11T21:15:00Z | 2026-02-17T13:55:48.935281Z |
| pysec-2026-1 |
|
A PyPI user account compromised by an attacker and was able to upload a malicious version… | dydx-v4-client | 2026-01-28T21:09:02+00:00 | |
| pysec-2025-52 |
|
gateway_proxy_handler in MLflow before 3.1.0 lacks gateway_path validation. | mlflow | 2025-06-23T15:15:29Z | 2025-12-05T13:25:55.146081Z |
| pysec-2020-220 |
|
A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage coll… | ansible | 2020-10-05T14:15:00Z | 2025-10-31T04:43:53.616247Z |
| pysec-2025-72 |
|
The `num2words` project was compromised via a phishing attack and two new versions were u… | num2words | 2025-07-31T14:34:47+00:00 | |
| pysec-2025-71 |
|
Cadwyn creates production-ready community-driven modern Stripe-like API versioning in Fas… | cadwyn | 2025-07-21T21:15:25+00:00 | 2025-07-23T15:24:03.825615+00:00 |
| pysec-2025-70 |
10.0 (3.1)
|
A Server-Side Request Forgery (SSRF) vulnerability exists in the RequestsToolkit componen… | langchain-community | 2025-06-23T21:15:25+00:00 | 2025-07-16T21:23:40.211079+00:00 |
| pysec-2024-259 |
9.8 (3.1)
|
In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by m… | torch | 2024-10-29T21:15:04+00:00 | 2025-07-16T03:09:57.748865+00:00 |
| pysec-2024-258 |
|
In scrapy/scrapy, an issue was identified where the Authorization header is not removed d… | scrapy | 2024-05-20T08:15:08+00:00 | 2025-07-15T17:37:50.051730+00:00 |
| pysec-2025-69 |
|
In Roundup before 2.5.0, XSS can occur via interaction between URLs and issue tracker tem… | roundup | 2025-07-13T20:15:25+00:00 | 2025-07-13T21:23:01.161315+00:00 |
| pysec-2025-68 |
8.0 (3.1)
|
A vulnerability, which was classified as critical, has been found in Upsonic up to 0.55.6… | upsonic | 2025-06-19T21:15:27+00:00 | 2025-07-08T19:22:27.449399+00:00 |
| pysec-2025-67 |
9.8 (3.1)
|
A vulnerability classified as critical was found in Upsonic up to 0.55.6. This vulnerabil… | upsonic | 2025-06-19T21:15:27+00:00 | 2025-07-08T19:22:27.385619+00:00 |
| pysec-2025-66 |
|
Improper privilege management in a REST interface allowed registered users to access unau… | streampipes | 2025-03-03T11:15:11+00:00 | 2025-07-08T15:23:46.628375+00:00 |
| pysec-2025-65 |
|
A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0… | llama-index | 2025-07-07T13:15:28+00:00 | 2025-07-07T15:23:42.730681+00:00 |
| pysec-2025-61 |
|
Pillow is a Python imaging library. In versions 11.2.0 to before 11.3.0, there is a heap … | pillow | 2025-07-01T19:15:27Z | 2025-07-07T14:12:46.226030Z |
| pysec-2025-64 |
9.8 (3.1)
|
A vulnerability classified as critical has been found in themanojdesai python-a2a up to 0… | python-a2a | 2025-06-17T07:15:18+00:00 | 2025-07-02T21:23:13.806273+00:00 |
| pysec-2025-63 |
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Whe… | vllm | 2025-03-19T16:15:32+00:00 | 2025-07-01T23:22:49.176005+00:00 |
| pysec-2025-62 |
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Mal… | vllm | 2025-02-07T20:15:34+00:00 | 2025-07-01T23:22:49.083695+00:00 |
| pysec-2025-60 |
|
Exposure of Sensitive Information to an Unauthorized Actor, Insertion of Sensitive Inform… | apache-iotdb | 2025-05-14T11:16:28+00:00 | 2025-07-01T21:22:47.232036+00:00 |
| pysec-2025-59 |
|
Remote Code Execution with untrusted URI of UDF vulnerability in Apache IoTDB. The attack… | apache-iotdb | 2025-05-14T11:15:47+00:00 | 2025-07-01T21:22:47.177405+00:00 |
| pysec-2024-257 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-03-22T23:15:07+00:00 | 2025-06-30T15:23:50.085549+00:00 |
| pysec-2025-58 |
8.8 (3.1)
|
vLLM is a library for LLM inference and serving. vllm/model_executor/weight_utils.py impl… | vllm | 2025-01-27T18:15:41+00:00 | 2025-06-27T21:22:36.583615+00:00 |
| pysec-2025-57 |
|
A Denial of Service (DoS) vulnerability in zenml-io/zenml version 0.66.0 allows unauthent… | zenml | 2025-03-20T10:15:48+00:00 | 2025-06-27T17:22:55.175431+00:00 |
| pysec-2025-56 |
4.3 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. In versions up t… | octoprint | 2025-04-22T18:15:59+00:00 | 2025-06-27T17:22:53.513680+00:00 |
| pysec-2024-256 |
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-12-03T16:15:24+00:00 | 2025-06-27T17:22:53.325430+00:00 |
| pysec-2025-55 |
|
vLLM is an inference and serving engine for large language models (LLMs). Version 0.8.0 u… | vllm | 2025-05-30T19:15:30+00:00 | 2025-06-26T21:23:06.407481+00:00 |
| ID | Description | Type |
|---|---|---|
| tid-412 | Some devices will allow for the forwarding of packets to other connected devices (e.g., r… | networking |
| tid-411 | The device utilizes a weak or insecure cryptographic protocol or algorithm that can be br… | networking |
| tid-410 | While encrypting data can prevent a threat actor from directly obtaining the plaintext co… | networking |
| tid-408 | Some devices do not adequately encrypt communications that includes operational or manage… | networking |
| tid-407 | Threat actors may be able to replay a message to a device to cause an unwanted function, … | networking |
| tid-406 | Some devices operate using protocols that have no capacity for network-level authenticati… | networking |
| tid-405 | Remote connections and communications can consume various device resources (e.g., network… | networking |
| tid-404 | Some devices will have operating modes that put the device in an inoperable state. Device… | networking |
| tid-401 | Some devices may support proprietary protocols, or may add proprietary functionality to o… | networking |
| tid-330 | Algorithms or code implementations of cryptographic processes will sometimes leak informa… | application-software |
| tid-329 | If a device stores passwords in an unsafe manner (e.g., in a cleartext file with no read … | application-software |
| tid-328 | Hardcoded credentials typically cannot be changed by end-users and are often undocumented… | application-software |
| tid-327 | If an application does not properly restrict data writes to allocated memory locations, a… | application-software |
| tid-326 | Many object-oriented languages use serialization to convert class objects into byte strin… | application-software |
| tid-325 | The device uses HTTP headers that are unencrypted, not-validated, and/or unauthenticated.… | application-software |
| tid-324 | If a device does not properly authenticate all HTTP requests, a threat actor can directly… | application-software |
| tid-323 | A threat actor can send requests for files or content that resides in different directori… | application-software |
| tid-322 | If a threat actor can include malicious JavaScript within a page viewed by a legitimate d… | application-software |
| tid-321 | A threat actor can hijack an insufficiently protected HTTP session token to gain unauthor… | application-software |
| tid-320 | The device does not property restrict, filter, or validate the content of web-based reque… | application-software |
| tid-319 | The device does not properly restrict, filter, or validate the content of web-based reque… | application-software |
| tid-318 | The device uses a cryptographic library or implementation that either introduces an addit… | application-software |
| tid-317 | If the device does not generate sufficiently random cryptographic primitives, a threat ac… | application-software |
| tid-316 | Certificate-based authentication depends on the correct parsing and validation of an X.50… | application-software |
| tid-315 | If the device includes a password retrieval mechanism, a threat actor could use that mech… | application-software |
| tid-314 | A threat actor could gain unauthorized access by continually guessing passwords. This cou… | application-software |
| tid-313 | A threat actor can change or reset a password or credential without being authenticated. … | application-software |
| tid-312 | A device’s credential change mechanisms can be abused to lock out users from their own de… | application-software |
| tid-311 | Devices often include default credentials from the vendor. Default credentials can be cha… | application-software |
| tid-310 | If an application does not authenticate all connections from a remote device or system, a… | application-software |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33884 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.534455Z |
| gsd-2024-33901 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.525896Z |
| gsd-2024-33887 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.503613Z |
| gsd-2024-33895 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.493081Z |
| gsd-2024-33894 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.488420Z |
| gsd-2024-33902 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.486429Z |
| gsd-2024-33888 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.468423Z |
| gsd-2024-33885 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.441746Z |
| gsd-2024-33891 | Delinea Secret Server before 11.7.000001 allows attackers to bypass authentication via th… | 2024-04-29T05:02:07.412035Z |
| gsd-2024-33899 | RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the scr… | 2024-04-29T05:02:07.400574Z |
| gsd-2024-33889 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.392587Z |
| gsd-2024-33893 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.381761Z |
| gsd-2024-33892 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.378170Z |
| gsd-2024-33890 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.344384Z |
| gsd-2024-33896 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.313250Z |
| gsd-2024-33903 | In CARLA through 0.9.15.2, the collision sensor mishandles some situations involving pede… | 2024-04-29T05:02:07.295775Z |
| gsd-2024-33900 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.290639Z |
| gsd-2024-33898 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.287632Z |
| gsd-2024-33886 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.287167Z |
| gsd-2024-33897 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.283756Z |
| gsd-2024-33883 | The ejs (aka Embedded JavaScript templates) package before 3.1.10 for Node.js lacks certa… | 2024-04-29T05:02:07.271727Z |
| gsd-2024-4303 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:05.716348Z |
| gsd-2024-4300 | E-WEBInformationCo. FS-EZViewer(Web) exposes sensitive information in the service. A remo… | 2024-04-29T05:02:05.715239Z |
| gsd-2024-4297 | The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherlo… | 2024-04-29T05:02:05.700888Z |
| gsd-2024-4301 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:05.678292Z |
| gsd-2024-4296 | The account management interface of HGiga iSherlock (including MailSherlock, SpamSherlock… | 2024-04-29T05:02:05.621428Z |
| gsd-2024-4299 | The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSheroc… | 2024-04-29T05:02:05.606402Z |
| gsd-2024-4302 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:05.603637Z |
| gsd-2024-4298 | The email search interface of HGiga iSherlock (including MailSherlock, SpamSherock, Audit… | 2024-04-29T05:02:05.598531Z |
| gsd-2024-33876 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.990196Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-936 | Malicious code in questpro (PyPI) | 2026-02-18T19:43:37Z | 2026-02-18T19:43:37Z |
| mal-2026-937 | Malicious code in telebot-infee (PyPI) | 2026-02-18T19:32:14Z | 2026-02-18T19:32:14Z |
| mal-2026-934 | Malicious code in telebot-infoe (PyPI) | 2026-02-18T18:42:29Z | 2026-02-18T18:42:29Z |
| mal-2026-935 | Malicious code in telebot-infoo (PyPI) | 2026-02-18T18:36:00Z | 2026-02-18T18:36:00Z |
| mal-2026-932 | Malicious code in easyreg (PyPI) | 2026-02-17T23:17:30Z | 2026-02-18T00:36:33Z |
| mal-2026-933 | Malicious code in pywin-simple-gui (PyPI) | 2026-02-17T23:14:17Z | 2026-02-17T23:14:17Z |
| mal-2026-930 | Malicious code in telebot-info (PyPI) | 2026-02-17T20:18:25Z | 2026-02-17T21:16:32Z |
| mal-2026-931 | Malicious code in telebot-infe (PyPI) | 2026-02-17T20:36:23Z | 2026-02-17T20:45:24Z |
| mal-2026-929 | Malicious code in vds-monarch (npm) | 2026-02-17T15:55:37Z | 2026-02-17T15:55:37Z |
| mal-2026-910 | Malicious code in dns-execution-test (PyPI) | 2026-02-15T23:20:54Z | 2026-02-17T11:48:47Z |
| mal-2026-928 | Malicious code in polyutil (PyPI) | 2026-02-17T04:31:14Z | 2026-02-17T04:31:14Z |
| mal-2026-926 | Malicious code in auto-backup-wsl (PyPI) | 2026-01-05T23:50:24Z | 2026-02-17T00:36:40Z |
| mal-2026-925 | Malicious code in auto-backup-wins (PyPI) | 2026-01-05T23:49:57Z | 2026-02-17T00:36:40Z |
| mal-2026-924 | Malicious code in auto-backup-macos (PyPI) | 2026-01-05T23:50:38Z | 2026-02-17T00:36:40Z |
| mal-2026-923 | Malicious code in auto-backup-linux (PyPI) | 2026-01-05T23:50:47Z | 2026-02-17T00:36:40Z |
| mal-2026-927 | Malicious code in polyclawd (PyPI) | 2026-02-16T23:40:13Z | 2026-02-16T23:40:13Z |
| mal-2026-922 | Malicious code in compass-e2e-tests (npm) | 2026-02-16T19:55:51Z | 2026-02-16T19:55:51Z |
| mal-2026-921 | Malicious code in cicibot-fix-message-naming (PyPI) | 2026-02-16T18:08:42Z | 2026-02-16T18:08:42Z |
| mal-2026-920 | Malicious code in ambar-src (npm) | 2026-02-16T17:03:16Z | 2026-02-16T17:03:23Z |
| mal-2026-919 | Malicious code in mds-webcomponents (npm) | 2026-02-16T15:20:34Z | 2026-02-16T15:20:34Z |
| mal-2026-918 | Malicious code in webpack-vite (npm) | 2026-02-16T15:03:26Z | 2026-02-16T15:03:27Z |
| mal-2025-5096 | Malicious code in aliyun-ai-labs-snippets-sdk (PyPI) | 2025-05-19T15:43:26Z | 2026-02-16T14:24:05Z |
| mal-2025-5094 | Malicious code in ai-labs-snippets-sdk (PyPI) | 2025-05-19T15:43:26Z | 2026-02-16T14:24:05Z |
| mal-2026-917 | Malicious code in aliyun-python-sdk-v2 (PyPI) | 2026-02-16T11:28:09Z | 2026-02-16T11:28:09Z |
| mal-2026-916 | Malicious code in alibabacloude (PyPI) | 2026-02-16T11:20:53Z | 2026-02-16T11:20:53Z |
| mal-2026-915 | Malicious code in alibabacloud-code-tool (PyPI) | 2026-02-16T11:19:13Z | 2026-02-16T11:19:13Z |
| mal-2026-914 | Malicious code in @qualys/react-web (npm) | 2026-02-16T08:50:48Z | 2026-02-16T08:50:48Z |
| mal-2026-913 | Malicious code in groq-ppe-pkg (PyPI) | 2026-02-16T07:09:54Z | 2026-02-16T07:09:54Z |
| mal-2026-912 | Malicious code in http-request-toolkit (PyPI) | 2026-02-16T07:03:21Z | 2026-02-16T07:03:21Z |
| mal-2026-911 | Malicious code in malpkgv2-0 (PyPI) | 2026-02-16T00:00:09Z | 2026-02-16T00:00:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0437 | Dell RecoverPoint for Virtual Machines: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und potenziell Privilegieneskalation | 2026-02-17T23:00:00.000+00:00 | 2026-02-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0420 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-02-17T23:00:00.000+00:00 |
| wid-sec-w-2026-0401 | Google Chrome: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0378 | IBM WebSphere Application Server: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-02-10T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0367 | Microsoft DeveloperTools (Visual Studio Code und .NET): Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0362 | Red Hat Enterprise Linux (Lodash): Schwachstelle ermöglicht Denial of Service | 2026-02-10T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0359 | GnuTLS: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0353 | libpng: Schwachstelle ermöglicht Codeausführung | 2026-02-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0345 | Golang Go: Mehrere Schwachstellen | 2026-02-08T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0306 | Red Hat Enterprise Linux (pyasn1): Schwachstelle ermöglicht Denial of Service | 2026-02-04T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0302 | Red Hat Enterprise Linux (python-wheel): Schwachstelle ermöglicht Privilegieneskalation und Codeausführung | 2026-02-03T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0265 | expat: Schwachstelle ermöglicht Codeausführung | 2026-01-29T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0243 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Denial of Service | 2026-01-27T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0231 | GnuPG und Gpg4win: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0215 | Linux Kernel: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0213 | expat: Schwachstelle ermöglicht Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0207 | Red Hat Enterprise Linux (urllib3): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0199 | Red Hat OpenShift Pipelines Operator (Fulcio): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0198 | Red Hat OpenShift und OpenShift AI (urllib3): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0145 | FreeRDP: Mehrere Schwachstellen ermöglichen DoS und Codeausführung | 2026-01-19T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0136 | AMD EPYC-Prozessoren: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-15T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0129 | Golang Go: Mehrere Schwachstellen | 2026-01-15T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0116 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0111 | FreeRDP: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0105 | Red Hat Developer Hub: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0098 | Node.js: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0086 | Linux Kernel: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0008 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2026-01-04T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2931 | GIMP: Schwachstelle ermöglicht Codeausführung | 2025-12-29T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2920 | Linux Kernel: Mehrere Schwachstellen | 2025-12-23T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0066 | Kwetsbaarheid verholpen in Google Chrome | 2026-02-19T08:29:30.712590Z | 2026-02-19T08:29:30.712590Z |
| ncsc-2026-0065 | Kwetsbaarheid verholpen in Dell RecoverPoint for Virtual Machines | 2026-02-18T13:18:23.815384Z | 2026-02-18T13:18:23.815384Z |
| ncsc-2026-0064 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2026-02-13T13:35:03.870920Z | 2026-02-13T13:35:03.870920Z |
| ncsc-2026-0063 | Kwetsbaarheden verholpen in Apple macOS | 2026-02-13T13:24:06.433550Z | 2026-02-13T13:24:06.433550Z |
| ncsc-2026-0048 | Kwetsbaarheid verholpen in BeyondTrust Remote Support | 2026-02-09T10:27:57.867529Z | 2026-02-13T12:54:32.614217Z |
| ncsc-2026-0062 | Kwetsbaarheden verholpen in GitLab CE/EE | 2026-02-11T11:45:05.986313Z | 2026-02-11T11:45:05.986313Z |
| ncsc-2026-0061 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2026-02-11T11:34:50.888067Z | 2026-02-11T11:34:50.888067Z |
| ncsc-2026-0060 | Kwetsbaarheden verholpen in Fortinet FortiSandbox, FortiAuthenticator en FortiClient | 2026-02-11T11:34:36.684955Z | 2026-02-11T11:34:36.684955Z |
| ncsc-2026-0059 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2026-02-11T08:16:27.583936Z | 2026-02-11T08:16:27.583936Z |
| ncsc-2026-0058 | Kwetsbaarheden verholpen in Microsoft Office | 2026-02-10T19:11:42.825147Z | 2026-02-10T19:11:42.825147Z |
| ncsc-2026-0057 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-02-10T19:08:27.878305Z | 2026-02-10T19:08:27.878305Z |
| ncsc-2026-0056 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2026-02-10T19:07:16.028511Z | 2026-02-10T19:07:16.028511Z |
| ncsc-2026-0055 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-02-10T19:05:45.729972Z | 2026-02-10T19:05:45.729972Z |
| ncsc-2026-0054 | Kwetsbaarheid verholpen in Microsoft Exchange | 2026-02-10T19:04:51.366294Z | 2026-02-10T19:04:51.366294Z |
| ncsc-2026-0053 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-02-10T19:01:45.561771Z | 2026-02-10T19:01:45.561771Z |
| ncsc-2026-0052 | Kwetsbaarheden verholpen in SAP producten | 2026-02-10T12:28:40.531069Z | 2026-02-10T12:28:40.531069Z |
| ncsc-2026-0051 | Kwetsbaarheden verholpen in Siemens producten | 2026-02-10T12:27:40.637581Z | 2026-02-10T12:27:40.637581Z |
| ncsc-2026-0050 | Kwetsbaarheid verholpen in PEAR | 2026-02-09T10:41:43.856342Z | 2026-02-09T10:41:43.856342Z |
| ncsc-2026-0049 | Kwetsbaarheden verholpen in n8n | 2026-02-09T10:39:40.792744Z | 2026-02-09T10:39:40.792744Z |
| ncsc-2026-0047 | Kwetsbaarheid verholpen in Fortinet FortiClient EMS | 2026-02-09T10:16:18.048622Z | 2026-02-09T10:16:18.048622Z |
| ncsc-2026-0046 | Kwetsbaarheden verholpen in Samsung mobile | 2026-02-09T07:48:28.751473Z | 2026-02-09T07:48:28.751473Z |
| ncsc-2026-0040 | Kwetsbaarheid verholpen in SmarterTools SmarterMail | 2026-01-27T10:51:39.476320Z | 2026-02-06T09:25:57.008166Z |
| ncsc-2026-0045 | Kwetsbaarheid verholpen in Cisco Meeting Management | 2026-02-06T09:22:16.831778Z | 2026-02-06T09:22:16.831778Z |
| ncsc-2026-0044 | Kwetsbaarheid verholpen in Cisco TelePresence Collaboration Endpoint | 2026-02-06T09:20:11.629058Z | 2026-02-06T09:20:11.629058Z |
| ncsc-2026-0043 | Zeroday-kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile | 2026-01-29T19:15:04.575371Z | 2026-02-04T16:31:15.157108Z |
| ncsc-2026-0042 | Kwetsbaarheden verholpen in SolarWinds Web Help Desk | 2026-01-28T16:37:21.114054Z | 2026-02-02T09:47:54.857445Z |
| ncsc-2025-0386 | Kwetsbaarheden verholpen in Fortinet producten | 2025-12-10T09:51:34.918202Z | 2026-01-28T15:46:10.814803Z |
| ncsc-2026-0041 | Kwetsbaarheid verholpen in Fortinet producten | 2026-01-28T09:32:41.752905Z | 2026-01-28T09:32:41.752905Z |
| ncsc-2026-0039 | ZeroDay kwetsbaarheid verholpen in Microsoft Office | 2026-01-27T07:27:52.867415Z | 2026-01-27T07:27:52.867415Z |
| ncsc-2026-0038 | Kwetsbaarheid verholpen in BIND 9 | 2026-01-23T08:54:43.506215Z | 2026-01-23T08:54:43.506215Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| tssa-2025-00001 | Project CSAF document | 2025-10-06T11:54:52.856Z | 2025-10-06T11:54:52.856Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-613116 | SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 | 2025-08-12T00:00:00Z | 2026-02-12T00:00:00Z |
| ssa-355557 | SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 | 2025-08-12T00:00:00Z | 2026-02-12T00:00:00Z |
| ssa-965753 | SSA-965753: Multiple File Parsing Vulnerabilities in Simcenter Femap and Nastran Before V2512 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-864900 | SSA-864900: Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-783261 | SSA-783261: Denial of Service Vulnerability in Automation License Manager (ALM) Before V5.2 | 2012-12-12T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-674753 | SSA-674753: Denial-of-Service Vulnerability in ET 200 Devices | 2026-01-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-625934 | SSA-625934: Improper Access Control Vulnerability in the Webhooks Implementation of Siveillance Video Management Servers | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-599451 | SSA-599451: Multiple Vulnerabilities in SiPass integrated | 2025-10-14T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-535115 | SSA-535115: Data Validation Vulnerability in NX Before V2512 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-513708 | SSA-513708: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices | 2025-06-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-507364 | SSA-507364: Heap Based Buffer Overflow Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-445819 | SSA-445819: Out of Bounds Read in PS/IGES Parasolid Translator Component in Solid Edge | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-311973 | SSA-311973: Multiple Local Privilege Escalation Vulnerabilities in SINEC NMS and User Management Component (UMC) | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-282044 | SSA-282044: DLL Hijacking Vulnerability in Siemens Web Installer used by the Online Software Delivery | 2025-08-12T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-265688 | SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 | 2024-04-09T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-216014 | SSA-216014: Vulnerabilities in EFI variable of SIMATIC IPCs, SIMATIC Tablet PCs, and SIMATIC Field PGs | 2025-03-11T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-212953 | SSA-212953: Multiple Vulnerabilities in COMOS | 2025-12-09T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-130874 | SSA-130874: Buffer Overflow Vulnerability in SCALANCE X Switches | 2012-04-05T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-082556 | SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 | 2025-06-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-035571 | SSA-035571: Cross Site Scripting Vulnerability in Polarion Before V2506 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-089022 | SSA-089022: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.3 | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| ssa-978177 | SSA-978177: Vulnerability in Nozomi Guardian/CMC Before 25.4.0 on RUGGEDCOM APE1808 Devices | 2025-08-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-928984 | SSA-928984: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-12-16T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-912274 | SSA-912274: Multiple Vulnerabilities in RUGGEDCOM ROX Before V2.17 | 2025-12-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-858251 | SSA-858251: Authentication Bypass Vulnerabilities in OPC UA | 2025-03-11T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-832273 | SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-827968 | SSA-827968: Vulnerability in Nozomi Guardian/CMC on RUGGEDCOM APE1808 Devices | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-698820 | SSA-698820: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.4 on RUGGEDCOM APE1808 Devices | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-693776 | SSA-693776: Multiple Vulnerabilities in Industrial Communication Devices based on SINEC OS before V3.2 | 2025-06-10T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-366067 | SSA-366067: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2765 | Red Hat Security Advisory: Satellite 6.16.6.1 Async Update | 2026-02-16T21:33:28+00:00 | 2026-02-17T12:41:50+00:00 |
| rhsa-2026:2769 | Red Hat Security Advisory: Red Hat Ceph Storage 7.1 security and bug fix updates | 2026-02-17T00:55:59+00:00 | 2026-02-17T12:41:47+00:00 |
| rhsa-2026:2764 | Red Hat Security Advisory: Satellite 6.17.6.3 Async Update | 2026-02-16T19:06:28+00:00 | 2026-02-17T12:41:47+00:00 |
| rhsa-2026:2762 | Red Hat Security Advisory: Red Hat Quay 3.10.18 | 2026-02-16T17:44:31+00:00 | 2026-02-17T12:41:47+00:00 |
| rhsa-2026:2760 | Red Hat Security Advisory: Satellite 6.18.3 Async Update | 2026-02-16T16:52:18+00:00 | 2026-02-17T12:41:47+00:00 |
| rhsa-2026:2572 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.14.2 security update | 2026-02-11T16:14:44+00:00 | 2026-02-17T12:41:47+00:00 |
| rhsa-2026:2754 | Red Hat Security Advisory: Red Hat Quay 3.9.18 | 2026-02-16T15:43:51+00:00 | 2026-02-17T12:41:46+00:00 |
| rhsa-2026:2728 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-16T11:56:59+00:00 | 2026-02-17T12:41:46+00:00 |
| rhsa-2026:2723 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-16T11:26:37+00:00 | 2026-02-17T12:41:45+00:00 |
| rhsa-2026:2718 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-16T11:40:57+00:00 | 2026-02-17T12:41:45+00:00 |
| rhsa-2026:2717 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-16T11:34:12+00:00 | 2026-02-17T12:41:45+00:00 |
| rhsa-2026:2695 | Red Hat Security Advisory: RHOAI 2.25.2 - Red Hat OpenShift AI | 2026-02-12T22:43:13+00:00 | 2026-02-17T12:41:45+00:00 |
| rhsa-2026:2681 | Red Hat Security Advisory: Red Hat Quay 3.16.2 | 2026-02-12T17:29:21+00:00 | 2026-02-17T12:41:45+00:00 |
| rhsa-2026:2675 | Red Hat Security Advisory: Red Hat Developer Hub 1.8.3 release. | 2026-02-12T15:30:56+00:00 | 2026-02-17T12:41:45+00:00 |
| rhsa-2026:2654 | Red Hat Security Advisory: Release of components for Service Telemetry Framework 1.5.7 | 2026-02-12T13:46:10+00:00 | 2026-02-17T12:41:44+00:00 |
| rhsa-2026:2571 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.9.2 security update | 2026-02-11T15:58:30+00:00 | 2026-02-17T12:41:43+00:00 |
| rhsa-2026:2563 | Red Hat Security Advisory: Red Hat Update Infrastructure 5 security update | 2026-02-11T14:34:45+00:00 | 2026-02-17T12:41:43+00:00 |
| rhsa-2026:2500 | Red Hat Security Advisory: Red Hat multicluster global hub 1.4.4 security update | 2026-02-11T05:02:44+00:00 | 2026-02-17T12:41:43+00:00 |
| rhsa-2026:2456 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.26.0 Release. | 2026-02-10T17:06:01+00:00 | 2026-02-17T12:41:43+00:00 |
| rhsa-2026:2454 | Red Hat Security Advisory: DevWorkspace Operator 0.39.0 release. | 2026-02-10T15:32:22+00:00 | 2026-02-17T12:41:43+00:00 |
| rhsa-2026:2441 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-10T13:45:07+00:00 | 2026-02-17T12:41:43+00:00 |
| rhsa-2026:2376 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.14.0 release. | 2026-02-09T23:40:14+00:00 | 2026-02-17T12:41:42+00:00 |
| rhsa-2026:2375 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.15.0 release. | 2026-02-09T22:06:53+00:00 | 2026-02-17T12:41:42+00:00 |
| rhsa-2026:2374 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.13.0 release. | 2026-02-09T21:56:53+00:00 | 2026-02-17T12:41:41+00:00 |
| rhsa-2026:2371 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.12.1 release. | 2026-02-09T20:49:08+00:00 | 2026-02-17T12:41:41+00:00 |
| rhsa-2026:2367 | Red Hat Security Advisory: Red Hat Web Terminal Operator 1.11.1 release. | 2026-02-09T18:49:52+00:00 | 2026-02-17T12:41:41+00:00 |
| rhsa-2026:2343 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-02-09T14:20:06+00:00 | 2026-02-17T12:41:41+00:00 |
| rhsa-2026:2334 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-09T12:48:48+00:00 | 2026-02-17T12:41:41+00:00 |
| rhsa-2026:2323 | Red Hat Security Advisory: git-lfs security update | 2026-02-09T11:51:28+00:00 | 2026-02-17T12:41:41+00:00 |
| rhsa-2026:2320 | Red Hat Security Advisory: golang security update | 2026-02-09T11:08:53+00:00 | 2026-02-17T12:41:40+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-048-04 | Honeywell CCTV Products | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-03 | GE Vernova Enervista UR Setup | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-02 | Delta Electronics ASDA-Soft | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-01 | Siemens Simcenter Femap and Nastran | 2026-02-10T00:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-043-10 | Airleader Master | 2026-02-12T07:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-09 | Hitachi Energy SuprOS | 2026-01-27T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-08 | Siemens NX | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-07 | Siemens Siveillance Video Management Servers | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-06 | Siemens SINEC OS | 2026-01-28T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-05 | Siemens Solid Edge | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-04 | Siemens Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-03 | Siemens COMOS | 2025-12-09T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-02 | Siemens Polarion | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-01 | Siemens SINEC NMS | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-015-04 | Siemens SIMATIC and SIPLUS products | 2026-01-13T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-289-06 | Siemens SiPass Integrated | 2025-10-14T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-254-03 | Siemens SINAMICS Drives | 2025-09-09T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-226-22 | Siemens Web Installer | 2025-08-12T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-162-05 | Siemens SIMATIC S7-1500 CPU Family | 2025-06-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-162-02 | Siemens RUGGEDCOM APE1808 | 2025-06-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-135-01 | Siemens RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-072-11 | Siemens SIMATIC IPC Family, ITP1000, and Field PGs | 2025-03-11T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-24-102-01 | Siemens SIMATIC S7-1500 | 2024-04-09T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-12-349-01 | Siemens Automation License Manager Uncontrolled Resource Consumption | 2012-12-12T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-140-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update E) | 2025-05-20T04:00:00.000000Z | 2026-02-12T05:00:00.000000Z |
| icsma-26-041-01 | ZOLL ePCR IOS Mobile Application | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-04 | AVEVA PI to CONNECT Agent | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-03 | AVEVA PI Data Archive | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-02 | ZLAN Information Technology Co. ZLAN5143D | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-01 | Yokogawa FAST/TOOLS | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-voice-rce-morhqy4b | Cisco Unified Communications Products Remote Code Execution Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-02-13T15:21:01+00:00 |
| cisco-sa-snort3-mime-vulns-ttl8pgvh | Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2026-02-12T18:38:13+00:00 |
| cisco-sa-tce-roomos-dos-9v9jrc2q | Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-12T17:37:39+00:00 |
| cisco-sa-snort3-dcerpc-vulns-j9hnf4th | Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities | 2026-01-07T16:00:00+00:00 | 2026-02-10T20:42:07+00:00 |
| cisco-sa-wsa-archive-bypass-scx2e8zf | Cisco Secure Web Appliance Real-Time Scanning Archive File Bypass Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-pi-xss-byevkcd | Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-epnm-pi-redirect-6sx82dn | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Open Redirect Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-cmm-file-up-ky47n8kk | Cisco Meeting Management Arbitrary File Upload Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-ucce-pcce-xss-2jvyg3ud | Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-intersight-privesc-p6tbm6jk | Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-iec6400-pem5uq7v | Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-sma-attack-n9bf4 | Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager | 2025-12-17T16:00:00+00:00 | 2026-01-15T16:01:43+00:00 |
| cisco-sa-ise-xss-9tdh2kx | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-ise-xss-964cdxw5 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-gekx8ywk | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-ise-xxe-jwsbsdkt | Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability | 2026-01-07T16:00:00+00:00 | 2026-01-07T16:00:00+00:00 |
| cisco-sa-react-flight-tyw32ddb | Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 | 2025-12-04T16:00:00+00:00 | 2025-12-17T22:37:17+00:00 |
| cisco-sa-ise-multiple-vulns-o9beswjh | Cisco Identity Services Engine Reflected Cross-Site Scripting and Information Disclosure Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-12-04T14:23:54+00:00 |
| cisco-sa-cc-mult-vuln-gk4tfxsn | Multiple Cisco Contact Center Products Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-18T14:49:09+00:00 |
| cisco-sa-privesc-catc-ryjreelu | Cisco Catalyst Center Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-xss-wextvz59 | Cisco Catalyst Center Cross-Site Scripting Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-ci-zwlqvswt | Cisco Catalyst Center REST API Command Injection Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-priv-esc-vs8eecux | Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-open-redirect-3w5bk3je | Cisco Catalyst Center Virtual Appliance HTTP Open Redirect Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-cc-unauth-rce-qen8h7mq | Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-13T12:48:42+00:00 |
| cisco-sa-asaftd-webvpn-yrootuw | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Unauthorized Access Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:55+00:00 |
| cisco-sa-asaftd-webvpn-z5xp8eub | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:54+00:00 |
| cisco-sa-http-code-exec-wmfp3h3o | Cisco Secure Firewall Adaptive Security Appliance Software, Secure Firewall Threat Defense Software, IOS Software, IOS XE Software, and IOS XR Software Web Services Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:51+00:00 |
| cisco-sa-ise-radsupress-dos-8yf3jthh | Cisco Identity Services Engine RADIUS Suppression Denial of Service Vulnerability | 2025-11-05T16:00:00+00:00 | 2025-11-05T16:00:00+00:00 |
| cisco-sa-broadworks-xss-o696ymra | Cisco BroadWorks CommPilot Application Software Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-10-21T15:13:31+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2026-0004 | Eclipse Cyclone DDS Vulnerabilities have no impact on SICK picoScan150 & SICK picoScan120 products | 2026-02-13T14:00:00.000Z | 2026-02-13T14:00:00.000Z |
| sca-2026-0003 | Vulnerability affecting SICK nanoScan3 and microScan3 | 2026-01-26T14:00:00.000Z | 2026-01-26T14:00:00.000Z |
| sca-2026-0002 | Vulnerabilities affecting SICK Incoming Goods Suite | 2026-01-15T14:00:00.000Z | 2026-01-22T19:00:00.000Z |
| sca-2026-0001 | Vulnerabilities affecting SICK TDC-X401GL | 2026-01-15T14:00:00.000Z | 2026-01-15T14:00:00.000Z |
| sca-2025-0013 | Vulnerabilities affecting SICK TLOC100-100 | 2025-10-27T14:00:00.000Z | 2025-11-11T14:00:00.000Z |
| sca-2025-0014 | CodeMeter vulnerablity affects SICK CODE-LOC and SICK LIDAR-LOC | 2025-11-03T11:00:00.000Z | 2025-11-03T14:00:00.000Z |
| sca-2025-0012 | Sudo vulnerability affects SICK SID products | 2025-10-27T11:00:00.000Z | 2025-10-27T14:00:00.000Z |
| sca-2025-0011 | Vulnerabilities affecting Endress+Hauser SSG-E210GC | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0010 | Multiple vulnerabilities in SICK Enterprise Analytics and SICK Logistic Analytics Products | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0009 | Vulnerabilities affecting SICK TDC-E210GC | 2025-08-01T13:00:00.000Z | 2025-08-01T13:00:00.000Z |
| sca-2025-0008 | Multiple vulnerabilities in Endress+Hauser MEAC300-FNADE4 | 2025-07-03T13:00:00.000Z | 2025-07-03T13:00:00.000Z |
| sca-2025-0007 | Multiple vulnerabilities in SICK Field Analytics and SICK Media Server | 2025-06-12T13:00:00.000Z | 2025-06-12T13:00:00.000Z |
| sca-2025-0003 | FreeRTOS Vulnerabilities have no impact on SICK Products | 2025-02-28T00:00:00.000Z | 2025-05-20T11:00:00.000Z |
| sca-2025-0006 | Vulnerability affecting picoScan and multiScan | 2025-04-28T13:00:00.000Z | 2025-04-28T13:00:00.000Z |
| sca-2025-0005 | Vulnerabilities in SICK Flexi Compact | 2025-04-28T10:00:00.000Z | 2025-04-28T10:00:00.000Z |
| sca-2025-0004 | Critical vulnerabilities in SICK DL100-2xxxxxxx | 2025-03-14T11:00:00.000Z | 2025-03-14T11:00:00.000Z |
| sca-2025-0001 | Multiple vulnerabilities in SICK MEAC300 | 2025-02-14T14:00:00.000Z | 2025-02-21T14:00:00.000Z |
| sca-2025-0002 | Vulnerability in SICK Lector8xx and SICK InspectorP8xx | 2025-02-14T10:19:00.000Z | 2025-02-14T10:19:00.000Z |
| sca-2024-0007 | Vulnerability in SICK OLM | 2024-12-31T00:00:00.000Z | 2024-12-31T00:00:00.000Z |
| sca-2024-0006 | Critical vulnerabilities in SICK InspectorP61x, InspectorP62x and TiM3xx | 2024-12-06T00:00:00.000Z | 2024-12-06T00:00:00.000Z |
| sca-2024-0005 | Vulnerability in SICK Incoming Goods Suite | 2024-11-19T00:00:00.000Z | 2024-11-19T00:00:00.000Z |
| sca-2024-0004 | Third party vulnerabilities in SICK CDE-100 | 2024-11-07T12:00:00.000Z | 2024-11-07T12:00:00.000Z |
| sca-2024-0003 | Critical vulnerability in multiple SICK products | 2024-10-17T13:00:00.000Z | 2024-10-17T13:00:00.000Z |
| sca-2024-0002 | Vulnerability in SICK MSC800 | 2024-09-11T23:00:00.000Z | 2024-09-11T23:00:00.000Z |
| sca-2024-0001 | Vulnerability in SICK Logistics Analytics Products and SICK Field Analytics | 2024-01-29T00:00:00.000Z | 2024-01-29T00:00:00.000Z |
| sca-2023-0011 | Vulnerability in multiple SICK Flexi Soft Gateways | 2023-10-23T11:00:00.000Z | 2023-10-23T11:00:00.000Z |
| sca-2023-0010 | Vulnerabilities in SICK Application Processing Unit | 2023-10-09T11:00:00.000Z | 2023-10-09T11:00:00.000Z |
| sca-2023-0008 | Vulnerability in SICK SIM1012 | 2023-09-29T13:00:00.000Z | 2023-09-29T13:00:00.000Z |
| sca-2023-0009 | Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products | 2023-09-29T10:00:00.000Z | 2023-09-29T10:00:00.000Z |
| sca-2023-0007 | Vulnerabilities in SICK LMS5xx | 2023-08-25T11:00:00.000Z | 2023-08-25T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2025:15-01 | Path traversal in Import Arc data archive functionality in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:14-01 | HTML injection in Asset List in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:13-01 | Stored Cross-Site Scripting (XSS) in Reports in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:12-01 | HTML injection in in Time Machine functionality in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:11-01 | Stored Cross-Site Scripting (XSS) in Dashboards in Guardian/CMC before 25.4.0 | 2025-11-25T11:00:00.000Z | 2025-11-26T11:00:00.000Z |
| nn-2025:9-01 | Path traversal in Time Machine functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:8-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:7-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:6-01 | Authenticated SQL Injection on Smart Polling functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:5-01 | Incorrect authorization for CLI in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:4-01 | Client-side path traversal in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:10-01 | Authenticated SQL Injection on CLI functionality in Guardian/CMC before 25.3.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:3-01 | Incorrect authorization for traces request/download in CMC before 25.1.0 | 2025-08-26T11:00:00.000Z | 2025-08-26T11:00:00.000Z |
| nn-2025:2-01 | Privilege escalation in Guardian/CMC before 24.6.0 | 2025-06-10T11:00:00.000Z | 2025-06-10T11:00:00.000Z |
| nn-2025:1-01 | Authenticated RCE in update functionality in Guardian/CMC before 24.6.0 | 2025-06-10T11:00:00.000Z | 2025-06-10T11:00:00.000Z |
| nn-2024:2-01 | Incorrect authorization for Reports configuration in Guardian/CMC before 24.2.0 | 2024-09-11T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2024:1-01 | DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:9-01 | Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:8-01 | Session Fixation in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:7-01 | DoS via SAML configuration in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:6-01 | Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:4-01 | Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:3-01 | Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:2-01 | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:17-01 | Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:15-01 | Sensitive data exfiltration via unsafe permissions on Windows systems in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:12-01 | Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 | 2024-01-15T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:11-01 | SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:10-01 | DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2022:2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| oxdc-adv-2025-0001 | OX Dovecot Pro Security Advisory OXDC-ADV-2025-0001 | 2025-10-31T00:00:00+00:00 | 2025-11-27T00:00:00+00:00 |
| oxas-adv-2025-0003 | OX App Suite Security Advisory OXAS-ADV-2025-0003 | 2025-09-24T00:00:00+02:00 | 2025-11-27T00:00:00+00:00 |
| oxas-adv-2025-0002 | OX App Suite Security Advisory OXAS-ADV-2025-0002 | 2025-08-12T00:00:00+02:00 | 2025-10-31T00:00:00+00:00 |
| oxas-adv-2025-0001 | OX App Suite Security Advisory OXAS-ADV-2025-0001 | 2025-01-27T00:00:00+01:00 | 2025-04-07T00:00:00+00:00 |
| oxdc-adv-2024-0003 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0003 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxdc-adv-2024-0002 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0002 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxas-adv-2024-0005 | OX App Suite Security Advisory OXAS-ADV-2024-0005 | 2024-07-08T00:00:00+02:00 | 2024-09-09T00:00:00+00:00 |
| oxdc-adv-2024-0001 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0001 | 2024-09-02T00:00:00+02:00 | 2024-09-06T00:00:00+00:00 |
| oxas-adv-2024-0004 | OX App Suite Security Advisory OXAS-ADV-2024-0004 | 2024-06-13T00:00:00+02:00 | 2024-08-19T00:00:00+00:00 |
| oxas-adv-2024-0003 | OX App Suite Security Advisory OXAS-ADV-2024-0003 | 2024-04-24T00:00:00+02:00 | 2024-08-19T00:00:00+00:00 |
| oxas-adv-2024-0002 | OX App Suite Security Advisory OXAS-ADV-2024-0002 | 2024-03-06T00:00:00+01:00 | 2024-05-06T00:00:00+00:00 |
| oxas-adv-2024-0001 | OX App Suite Security Advisory OXAS-ADV-2024-0001 | 2024-02-08T00:00:00+01:00 | 2024-04-25T00:00:00+00:00 |
| oxas-adv-2023-0007 | OX App Suite Security Advisory OXAS-ADV-2023-0007 | 2023-12-11T00:00:00+01:00 | 2024-02-16T00:00:00+00:00 |
| oxas-adv-2023-0006 | OX App Suite Security Advisory OXAS-ADV-2023-0006 | 2023-09-25T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0005 | OX App Suite Security Advisory OXAS-ADV-2023-0005 | 2023-09-19T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0004 | OX App Suite Security Advisory OXAS-ADV-2023-0004 | 2023-08-01T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0003 | OX App Suite Security Advisory OXAS-ADV-2023-0003 | 2023-05-02T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0002 | OX App Suite Security Advisory OXAS-ADV-2023-0002 | 2023-03-20T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0001 | OX App Suite Security Advisory OXAS-ADV-2023-0001 | 2023-02-06T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2022-0002 | OX App Suite Security Advisory OXAS-ADV-2022-0002 | 2022-11-02T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2022-0001 | OX App Suite Security Advisory OXAS-ADV-2022-0001 | 2022-08-10T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-40635 | containerd has an integer overflow in User ID handling | 2025-03-02T00:00:00.000Z | 2026-02-18T15:02:44.000Z |
| msrc_cve-2025-2295 | Potential iSCSI R2T PDU Vulnerability | 2025-03-02T00:00:00.000Z | 2026-02-18T14:59:30.000Z |
| msrc_cve-2023-5764 | Ansible: template injection | 2023-12-01T08:00:00.000Z | 2026-02-18T14:56:25.000Z |
| msrc_cve-2023-6864 | Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121. | 2023-12-01T08:00:00.000Z | 2026-02-18T14:50:48.000Z |
| msrc_cve-2021-32714 | Integer Overflow in Chunked Transfer-Encoding | 2021-07-02T00:00:00.000Z | 2026-02-18T14:49:54.000Z |
| msrc_cve-2017-15042 | An unintended cleartext issue exists in Go before 1.8.4 and 1.9.x before 1.9.1. RFC 4954 requires that, during SMTP, the PLAIN auth scheme must only be used on network connections secured with TLS. The original implementation of smtp.PlainAuth in Go 1.0 enforced this requirement, and it was documented to do so. In 2013, upstream issue #5184, this was changed so that the server may decide whether PLAIN is acceptable. The result is that if you set up a man-in-the-middle SMTP server that doesn't advertise STARTTLS and does advertise that PLAIN auth is OK, the smtp.PlainAuth implementation sends the username and password. | 2017-10-02T00:00:00.000Z | 2026-02-18T14:49:38.000Z |
| msrc_cve-2023-6856 | The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. This issue could allow an attacker to perform remote code execution and sandbox escape. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121. | 2023-12-01T08:00:00.000Z | 2026-02-18T14:46:26.000Z |
| msrc_cve-2025-24855 | numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal. | 2025-03-02T00:00:00.000Z | 2026-02-18T14:42:46.000Z |
| msrc_cve-2025-71119 | powerpc/kexec: Enable SMT before waking offline CPUs | 2026-01-02T00:00:00.000Z | 2026-02-18T14:40:05.000Z |
| msrc_cve-2025-71118 | ACPICA: Avoid walking the Namespace if start_node is NULL | 2026-01-02T00:00:00.000Z | 2026-02-18T14:39:35.000Z |
| msrc_cve-2025-71111 | hwmon: (w83791d) Convert macros to functions to avoid TOCTOU | 2026-01-02T00:00:00.000Z | 2026-02-18T14:39:13.000Z |
| msrc_cve-2025-71136 | media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status() | 2026-01-02T00:00:00.000Z | 2026-02-18T14:38:41.000Z |
| msrc_cve-2025-71116 | libceph: make decode_pool() more resilient against corrupted osdmaps | 2026-01-02T00:00:00.000Z | 2026-02-18T14:38:20.000Z |
| msrc_cve-2026-0861 | Integer overflow in memalign leads to heap corruption | 2026-01-02T00:00:00.000Z | 2026-02-18T14:37:56.000Z |
| msrc_cve-2017-1000097 | On Darwin, user's trust preferences for root certificates were not honored. If the user had a root certificate loaded in their Keychain that was explicitly not trusted, a Go program would still verify a connection using that root certificate. | 2017-10-02T00:00:00.000Z | 2026-02-18T14:37:50.000Z |
| msrc_cve-2025-68780 | sched/deadline: only set free_cpus for online runqueues | 2026-01-02T00:00:00.000Z | 2026-02-18T14:37:22.000Z |
| msrc_cve-2025-71069 | f2fs: invalidate dentry cache on failed whiteout creation | 2026-01-02T00:00:00.000Z | 2026-02-18T14:37:03.000Z |
| msrc_cve-2025-68794 | iomap: adjust read range correctly for non-block-aligned positions | 2026-01-02T00:00:00.000Z | 2026-02-18T14:36:42.000Z |
| msrc_cve-2025-71094 | net: usb: asix: validate PHY address before use | 2026-01-02T00:00:00.000Z | 2026-02-18T14:36:19.000Z |
| msrc_cve-2025-71091 | team: fix check for port enabled in team_queue_override_port_prio_changed() | 2026-01-02T00:00:00.000Z | 2026-02-18T14:35:57.000Z |
| msrc_cve-2025-68776 | net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() | 2026-01-02T00:00:00.000Z | 2026-02-18T14:35:33.000Z |
| msrc_cve-2025-71098 | ip6_gre: make ip6gre_header() robust | 2026-01-02T00:00:00.000Z | 2026-02-18T14:35:08.000Z |
| msrc_cve-2025-68797 | char: applicom: fix NULL pointer dereference in ac_ioctl | 2026-01-02T00:00:00.000Z | 2026-02-18T14:34:42.000Z |
| msrc_cve-2025-68775 | net/handshake: duplicate handshake cancellations leak socket | 2026-01-02T00:00:00.000Z | 2026-02-18T14:34:17.000Z |
| msrc_cve-2025-71088 | mptcp: fallback earlier on simult connection | 2026-01-02T00:00:00.000Z | 2026-02-18T14:33:51.000Z |
| msrc_cve-2025-68777 | Input: ti_am335x_tsc - fix off-by-one error in wire_order validation | 2026-01-02T00:00:00.000Z | 2026-02-18T14:33:25.000Z |
| msrc_cve-2025-68788 | fsnotify: do not generate ACCESS/MODIFY events on child for special files | 2026-01-02T00:00:00.000Z | 2026-02-18T14:32:59.000Z |
| msrc_cve-2025-68774 | hfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create | 2026-01-02T00:00:00.000Z | 2026-02-18T14:32:35.000Z |
| msrc_cve-2025-71077 | tpm: Cap the number of PCR banks | 2026-01-02T00:00:00.000Z | 2026-02-18T14:32:10.000Z |
| msrc_cve-2025-68816 | net/mlx5: fw_tracer, Validate format string parameters | 2026-01-02T00:00:00.000Z | 2026-02-18T14:31:44.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sa25p007 | B&R Automation Studio Update of SQLite version | 2026-02-18T00:30:00.000Z | 2026-02-18T00:30:00.000Z |
| sa26p001 | PVI Insertion of Sensitive Information into Logfile | 2026-01-29T00:30:00.000Z | 2026-01-29T00:30:00.000Z |
| sa24p003 | B&R PCs vulnerable to PixieFail attack | 2026-01-29T00:30:00.000Z | 2026-01-29T00:30:00.000Z |
| 7paa013309 | System 800xA SECURITY Advisory - ABB 800xA Base 6.0.x, 6.1.x CSLib communication DoS vulnerability | 2024-06-05T00:30:00.000Z | 2026-01-23T00:30:00.000Z |
| sa25p005 | B&R Automation Runtime Improper Handling of Flooding conditions on ANSL Server | 2026-01-19T00:30:00.000Z | 2026-01-19T00:30:00.000Z |
| sa25p004 | Automation Studio Insufficient Server Certificate Validation | 2026-01-19T00:30:00.000Z | 2026-01-19T00:30:00.000Z |
| 9akk108472a1331 | ABB Ability™ OPTIMAX® Authentication Bypass in Single-Sign On with Azure Active Directory | 2026-01-16T00:30:00.000Z | 2026-01-16T00:30:00.000Z |
| 2crt000009 | WebPro SNMP Card PowerValue Multiple Vulnerabilities | 2026-01-07T00:30:00.000Z | 2026-01-07T00:30:00.000Z |
| 9akk108471a8107 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-09-16T00:30:00.000Z | 2025-11-28T08:00:00.000Z |
| 4hzm000603 | ABB Ability Camera Connect Vulnerabilities in outdated 3rd party component (VLC) | 2025-11-27T00:30:00.000Z | 2025-11-28T00:30:00.000Z |
| 7paa022088 | Edgenius Management Portal Authentication Bypass | 2025-11-20T00:30:00.000Z | 2025-11-20T00:30:00.000Z |
| 2nga002813 | PCM600 SharpZip library vulnerability | 2025-11-03T00:30:00.000Z | 2025-11-03T00:30:00.000Z |
| 4tz00000006007 | ALS-mini-S4/S8 IP Missing Authentication Vulnerability and its Mitigations | 2025-10-20T00:30:00.000Z | 2025-10-23T00:30:00.000Z |
| 9akk108471a8948 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-10-20T00:30:00.000Z | 2025-10-21T00:30:00.000Z |
| 3kxg200000r4801 | CoreSense™ HM and CoreSense™ M10 File Path Traversal Vulnerability | 2025-04-16T00:30:00.000Z | 2025-10-20T00:30:00.000Z |
| sa25p003 | B&R Automation Runtime Vulnerabilities in System Diagnostic Manager (SDM) | 2025-10-07T00:30:00.000Z | 2025-10-14T00:30:00.000Z |
| 4tz00000006008 | LVS MConfig Insecure memory handling | 2025-10-08T00:30:00.000Z | 2025-10-08T00:30:00.000Z |
| sa25p002 | B&R Automation Runtime DoS Vulnerability in System Diagnostics Manager (SDM) | 2025-10-07T00:30:00.000Z | 2025-10-07T00:30:00.000Z |
| 9akk108471a7808 | EIBPORT Reflected XSS | 2025-10-07T00:30:00.000Z | 2025-10-07T00:30:00.000Z |
| 9akk108471a7121 | FLXeon Controllers Multiple vulnerabilities | 2025-09-09T00:30:00.000Z | 2025-09-18T00:30:00.000Z |
| 9akk108471a4462 | ELSB/BLBA ASPECT advisory several CVEs | 2025-08-11T00:30:00.000Z | 2025-09-04T00:30:00.000Z |
| 9akk108471a3623 | RMC - 100 Vulnerabilities in web UI (REST Interface) | 2025-07-03T00:30:00.000Z | 2025-08-18T00:30:00.000Z |
| 2nga002743 | ABB AbilityTM zenon Remote Transport Vulnerability | 2025-08-12T00:30:00.000Z | 2025-08-12T00:30:00.000Z |
| 3adr011407 | ABB Automation Builder Vulnerabilities in user management and access control | 2025-04-30T00:00:00.000Z | 2025-07-25T00:00:00.000Z |
| 3adr011432 | AC500 V2 Buffer overread on Modbus protocol | 2025-07-23T00:30:00.000Z | 2025-07-23T00:30:00.000Z |
| 9akk108471a4556 | Busch-Welcome® 2 wire Door opener actuator by default in compatibility mode. | 2025-07-21T00:30:00.000Z | 2025-07-21T00:30:00.000Z |
| 2crt000008 | Lite Panel Pro Vulnerability in Session Management | 2025-06-26T00:30:00.000Z | 2025-06-26T00:30:00.000Z |
| 9akk108470a8948 | ELSB/Home Solutions Outdated SW Components in ABB Welcome IP-Gateway. | 2025-05-29T00:30:00.000Z | 2025-06-05T00:30:00.000Z |
| 9akk108471a1621 | EIBPORT Session Management Fail | 2025-06-02T00:30:00.000Z | 2025-06-04T00:30:00.000Z |
| 9akk108471a0021 | ELSB/BLBA ASPECT advisory several CVEs | 2025-05-22T00:30:00.000Z | 2025-05-23T10:30:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201507-0645 | D-Link is an internationally renowned provider of network equipment and solutions, includ… | 2025-12-23T00:12:08.164000Z |
| var-201011-0225 | Multiple stack-based buffer overflows in agent.exe in Setup Manager in Cisco Intelligent … | 2025-12-23T00:11:40.995000Z |
| var-201109-0089 | Multiple unspecified vulnerabilities in Cisco Unified Service Monitor before 8.6, as used… | 2025-12-23T00:10:18.602000Z |
| var-201112-0173 | The default configuration of the HP CM8060 Color MFP with Edgeline; Color LaserJet 3xxx, … | 2025-12-23T00:05:56.162000Z |
| var-201103-0371 | SAP Crystal Reports Server is a complete reporting solution for creating, managing, and d… | 2025-12-23T00:04:00.173000Z |
| var-201807-0341 | ABB Panel Builder 800 all versions has an improper input validation vulnerability which m… | 2025-12-23T00:03:51.024000Z |
| var-200702-0378 | Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 … | 2025-12-23T00:03:37.932000Z |
| var-201805-1147 | WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length heap buffe… | 2025-12-23T00:01:35.037000Z |
| var-200607-0396 | Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) b… | 2025-12-23T00:00:47.326000Z |
| var-201208-0222 | Multiple stack-based buffer overflows in msg_server.exe in SAP NetWeaver ABAP 7.x allow r… | 2025-12-23T00:00:27.061000Z |
| var-202001-0832 | A Buffer Overflow vulnerability exists in the Message Server service _MsJ2EE_AddStatistic… | 2025-12-23T00:00:23.174000Z |
| var-202001-0833 | A Denial of Service vulnerability exists in the WRITE_C function in the msg_server.exe mo… | 2025-12-23T00:00:23.098000Z |
| var-201702-0423 | An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft… | 2025-12-22T23:59:50.708000Z |
| var-201109-0081 | Buffer overflow in the gopherToHTML function in gopher.cc in the Gopher reply parser in S… | 2025-12-22T23:57:06.902000Z |
| var-201112-0097 | Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 a… | 2025-12-22T23:57:03.107000Z |
| var-201904-0181 | Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow… | 2025-12-22T23:55:40.719000Z |
| var-202407-0233 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data … | 2025-12-22T23:55:32.693000Z |
| var-200202-0006 | Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause… | 2025-12-22T23:55:29.383000Z |
| var-201407-0233 | Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote atta… | 2025-12-22T23:54:37.672000Z |
| var-201806-1058 | Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices befo… | 2025-12-22T23:54:32.706000Z |
| var-201810-0396 | Advantech WebAccess 8.3.1 and earlier has several stack-based buffer overflow vulnerabili… | 2025-12-22T23:54:32.435000Z |
| var-201402-0026 | Buffer overflow in the process_ra function in the router advertisement daemon (radvd) bef… | 2025-12-22T23:52:50.537000Z |
| var-201402-0028 | The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when Uni… | 2025-12-22T23:52:50.479000Z |
| var-201402-0027 | The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows re… | 2025-12-22T23:52:50.408000Z |
| var-201803-1810 | A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial … | 2025-12-22T23:52:40.263000Z |
| var-201906-1029 | In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulne… | 2025-12-22T23:52:37.978000Z |
| var-201908-0863 | Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE… | 2025-12-22T23:52:37.116000Z |
| var-202005-0008 | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buf… | 2025-12-22T23:52:36.251000Z |
| var-200512-0643 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2025-12-22T23:51:40.221000Z |
| var-200512-0297 | Integer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbit… | 2025-12-22T23:51:40.129000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-003912 | Vulnerability in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003911 | Vulnerability in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003910 | Multiple Vulnerabilities in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003909 | Multiple Vulnerabilities in Hitachi Command Suite products | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003908 | Multiple Vulnerabilities in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003907 | Multiple Vulnerabilities in JP1 | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003906 | Multiple Vulnerabilities in Cosminexus | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003905 | Multiple Vulnerabilities in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-000025 | Joomla! CMS vulnerable to cross-site scripting | 2026-02-17T12:46+09:00 | 2026-02-17T12:46+09:00 |
| jvndb-2026-000023 | FileZen vulnerable to OS command injection | 2026-02-13T16:51+09:00 | 2026-02-13T17:08+09:00 |
| jvndb-2026-000024 | Installer of M-Audio M-Track Duo HD may insecurely load Dynamic Link Libraries | 2026-02-12T13:32+09:00 | 2026-02-12T13:32+09:00 |
| jvndb-2026-000022 | Oki Electric Industry products and OEM products register Windows services with unquoted file paths | 2026-02-09T15:21+09:00 | 2026-02-09T15:21+09:00 |
| jvndb-2026-000021 | web2py vulnerable to open redirect | 2026-02-05T15:01+09:00 | 2026-02-05T15:01+09:00 |
| jvndb-2026-000017 | Improper file access permission settings in Mitsubishi Small-Capacity UPS Shutdown Software FREQSHIP-mini for Windows | 2026-02-03T14:57+09:00 | 2026-02-05T14:41+09:00 |
| jvndb-2026-000020 | Multiple vulnerabilities in Movable Type | 2026-02-04T16:15+09:00 | 2026-02-04T16:15+09:00 |
| jvndb-2026-000016 | Installer for Roland Cloud Manager may insecurely load Dynamic Link Libraries | 2026-02-03T14:57+09:00 | 2026-02-04T12:39+09:00 |
| jvndb-2024-002831 | ELECOM wireless LAN routers vulnerable to OS command injection | 2024-02-22T08:15+09:00 | 2026-02-04T12:02+09:00 |
| jvndb-2025-000041 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-06-24T14:50+09:00 | 2026-02-03T15:35+09:00 |
| jvndb-2024-000078 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2024-07-30T15:34+09:00 | 2026-02-03T15:35+09:00 |
| jvndb-2026-000019 | Multiple vulnerabilities in ELECOM wireless LAN products | 2026-02-03T14:57+09:00 | 2026-02-03T14:57+09:00 |
| jvndb-2026-000015 | Sonatype Nexus Repository vulnerable to server-side request forgery | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000014 | OS command injection in raspap-webgui | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000013 | Multiple Microsoft Office products vulnerable to untrusted search path | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000012 | Multiple vulnerabilities in Cybozu Garoon | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000018 | Undocumented "TelnetEnable" functionality of End of Service NETGEAR products | 2026-01-30T14:23+09:00 | 2026-01-30T14:23+09:00 |
| jvndb-2026-002119 | Multiple vulnerabilities in BROTHER MFPs (multifunction printers) | 2026-01-30T11:26+09:00 | 2026-01-30T11:26+09:00 |
| jvndb-2026-002030 | Multiple Vulnerabilities in Cosminexus | 2026-01-29T10:32+09:00 | 2026-01-29T10:32+09:00 |
| jvndb-2026-001972 | Archer MR600 vulnerable to OS command injection | 2026-01-28T10:41+09:00 | 2026-01-28T10:41+09:00 |
| jvndb-2026-000011 | beat-access for Windows may insecurely load Dynamic Link Libraries | 2026-01-27T18:22+09:00 | 2026-01-27T18:22+09:00 |
| jvndb-2026-001732 | Multiple Brother software installers may insecurely load Dynamic Link Libraries | 2026-01-26T16:04+09:00 | 2026-01-26T16:04+09:00 |
| ID | Description | Updated |
|---|---|---|
| ts-2026-001 | TS-2026-001 | 2026-01-15T00:00 |
| ts-2025-008 | TS-2025-008 | 2025-11-19T00:00 |
| ts-2025-007 | TS-2025-007 | 2025-11-07T00:00 |
| ts-2025-006 | TS-2025-006 | 2025-10-28T00:00 |
| ts-2025-005 | TS-2025-005 | 2025-08-07T00:00 |
| ts-2025-004 | TS-2025-004 | 2025-05-27T00:00 |
| ts-2025-003 | TS-2025-003 | 2025-05-21T00:00 |
| ts-2025-002 | TS-2025-002 | 2025-05-15T00:00 |
| ts-2025-001 | TS-2025-001 | 2025-03-07T00:00 |
| ts-2024-013 | TS-2024-013 | 2024-12-04T00:00 |
| ts-2024-012 | TS-2024-012 | 2024-10-02T00:00 |
| ts-2024-011 | TS-2024-011 | 2024-07-22T00:00 |
| ts-2024-010 | TS-2024-010 | 2024-07-19T00:00 |
| ts-2024-009 | TS-2024-009 | 2024-06-27T00:00 |
| ts-2024-008 | TS-2024-008 | 2024-06-14T00:00 |
| ts-2024-007 | TS-2024-007 | 2024-06-12T00:00 |
| ts-2024-006 | TS-2024-006 | 2024-05-22T00:00 |
| ts-2024-005 | TS-2024-005 | 2024-05-08T00:00 |
| ts-2024-004 | TS-2024-004 | 2024-05-06T00:00 |
| ts-2024-003 | TS-2024-003 | 2024-04-23T00:00 |
| ts-2024-002 | TS-2024-002 | 2024-01-30T00:00 |
| ts-2024-001 | TS-2024-001 | 2024-01-08T00:00 |
| ts-2023-009 | TS-2023-009 | 2023-12-22T00:00 |
| ts-2023-008 | TS-2023-008 | 2023-11-01T00:00 |
| ts-2023-007 | TS-2023-007 | 2023-10-26T00:00 |
| ts-2023-006 | TS-2023-006 | 2023-08-22T00:00 |
| ts-2023-005 | TS-2023-005 | 2023-04-28T00:00 |
| ts-2023-004 | TS-2023-004 | 2023-04-04T00:00 |
| ts-2023-003 | TS-2023-003 | 2023-03-22T00:00 |
| ts-2023-002 | TS-2023-002 | 2023-01-24T00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0573-1 | Security update for kubernetes-old | 2026-02-17T18:47:26Z | 2026-02-17T18:47:26Z |
| suse-su-2026:0572-1 | Security update for kubernetes | 2026-02-17T18:47:08Z | 2026-02-17T18:47:08Z |
| suse-su-2026:0571-1 | Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer | 2026-02-17T18:46:54Z | 2026-02-17T18:46:54Z |
| suse-su-2026:0570-1 | Security update for libxml2 | 2026-02-17T16:38:51Z | 2026-02-17T16:38:51Z |
| suse-su-2026:0561-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T12:33:41Z | 2026-02-16T12:33:41Z |
| suse-su-2026:0560-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T12:03:47Z | 2026-02-16T12:03:47Z |
| suse-su-2026:0559-1 | Security update for freerdp | 2026-02-16T11:43:04Z | 2026-02-16T11:43:04Z |
| suse-su-2026:0558-1 | Security update for libnvidia-container | 2026-02-16T11:42:25Z | 2026-02-16T11:42:25Z |
| suse-su-2026:0557-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T10:33:36Z | 2026-02-16T10:33:36Z |
| suse-su-2026:0556-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T10:03:47Z | 2026-02-16T10:03:47Z |
| suse-su-2026:0555-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T09:04:29Z | 2026-02-16T09:04:29Z |
| suse-su-2026:0554-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-02-16T08:33:36Z | 2026-02-16T08:33:36Z |
| suse-su-2026:0551-1 | Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T06:33:35Z | 2026-02-16T06:33:35Z |
| suse-su-2026:0550-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T05:33:34Z | 2026-02-16T05:33:34Z |
| suse-su-2026:0548-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2026-02-16T03:33:34Z | 2026-02-16T03:33:34Z |
| suse-su-2026:0546-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6) | 2026-02-15T19:33:42Z | 2026-02-15T19:33:42Z |
| suse-su-2026:0544-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T18:03:51Z | 2026-02-15T18:03:51Z |
| suse-su-2026:0543-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6) | 2026-02-15T17:33:36Z | 2026-02-15T17:33:36Z |
| suse-su-2026:0542-1 | Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T16:03:51Z | 2026-02-15T16:03:51Z |
| suse-su-2026:0539-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T13:33:40Z | 2026-02-15T13:33:40Z |
| suse-su-2026:0535-1 | Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T11:04:06Z | 2026-02-15T11:04:06Z |
| suse-su-2026:0528-1 | Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) | 2026-02-15T06:33:50Z | 2026-02-15T06:33:50Z |
| suse-su-2026:0533-1 | Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4) | 2026-02-15T06:33:38Z | 2026-02-15T06:33:38Z |
| suse-su-2026:0526-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4) | 2026-02-14T19:33:43Z | 2026-02-14T19:33:43Z |
| suse-su-2026:0525-1 | Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) | 2026-02-14T17:04:03Z | 2026-02-14T17:04:03Z |
| suse-su-2026:0524-1 | Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) | 2026-02-14T17:03:57Z | 2026-02-14T17:03:57Z |
| suse-su-2026:0514-1 | Security update for cargo-auditable | 2026-02-13T14:57:18Z | 2026-02-13T14:57:18Z |
| suse-su-2026:0510-1 | Security update for util-linux | 2026-02-13T14:52:46Z | 2026-02-13T14:52:46Z |
| suse-su-2026:0508-1 | Security update for curl | 2026-02-13T14:50:33Z | 2026-02-13T14:50:33Z |
| suse-su-2026:0506-1 | Security update for cargo-auditable | 2026-02-13T14:32:17Z | 2026-02-13T14:32:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10210-1 | python311-pip-26.0.1-1.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10209-1 | libsoup-2_4-1-2.74.3-16.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10208-1 | libsoup-3_0-0-3.6.5-13.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10207-1 | frr-10.2.1-4.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10200-1 | python310-3.10.19-4.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10199-1 | python311-pymssql-2.3.12-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10198-1 | python311-Pillow-12.1.1-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10197-1 | libecpg6-18.2-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10196-1 | matrix-synapse-1.147.1-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10195-1 | gimp-3.0.8-2.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10194-1 | cargo-audit-advisory-db-20260213-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10182-1 | snpguest-0.10.0-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10181-1 | sccache-0.13.0~1-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10180-1 | rustup-1.28.2~0-3.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10179-1 | python311-maturin-1.11.5-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10178-1 | libmunge2-0.5.18-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10177-1 | gnutls-3.8.12-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10176-1 | freerdp2-2.11.7-4.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10175-1 | cargo-audit-0.22.1~git0.efcde93-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10174-1 | assimp-devel-6.0.4-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10173-1 | apptainer-1.4.5-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:20193-1 | Security update for orthanc, gdcm, orthanc-authorization, orthanc-dicomweb, orthanc-gdcm, orthanc-indexer, orthanc-mysql, orthanc-neuro, orthanc-postgresql, orthanc-python, orthanc-stl, orthanc-tcia, orthanc-wsi, python-pyorthanc | 2026-02-10T22:29:40Z | 2026-02-10T22:29:40Z |
| opensuse-su-2026:20191-1 | Security update for trivy | 2026-02-10T21:52:10Z | 2026-02-10T21:52:10Z |
| opensuse-su-2026:20192-1 | Security update for tailscale | 2026-02-10T21:45:05Z | 2026-02-10T21:45:05Z |
| opensuse-su-2026:20183-1 | Security update for chromium | 2026-02-07T14:42:36Z | 2026-02-07T14:42:36Z |
| opensuse-su-2026:20184-1 | Security update for python-Django | 2026-02-07T13:45:17Z | 2026-02-07T13:45:17Z |
| opensuse-su-2026:20182-1 | Security update for cockpit | 2026-02-06T03:08:03Z | 2026-02-06T03:08:03Z |
| opensuse-su-2026:20181-1 | Security update for cockpit-subscriptions | 2026-02-06T02:48:38Z | 2026-02-06T02:48:38Z |
| opensuse-su-2026:10146-1 | libpainter0-0.9.27-1.1 on GA media | 2026-02-04T00:00:00Z | 2026-02-04T00:00:00Z |
| opensuse-su-2026:10145-1 | python312-Django6-6.0.2-1.1 on GA media | 2026-02-04T00:00:00Z | 2026-02-04T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2026-041-02 | Multiple Vulnerabilities on EcoStruxure™ Building Operation Workstation and EcoStruxure™ Building Operation Webstation | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2026-041-01 | Improper Check for Unusual or Exceptional Conditions on Multiple Products | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-343-01 | EcoStruxure™ Foxboro DCS | 2025-12-09T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-189-03 | EcoStruxure™ Power Operation | 2025-07-08T04:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-042-02 | Improper Input Validation Vulnerability in Uni-Telway Driver | 2025-02-11T05:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2026-013-04 | Multiple Vulnerabilities on EcoStruxure Power Build Rapsody | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2026-013-03 | Multiple Vulnerabilities on Zigbee Products | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2026-013-02 | Incorrect Default Permissions Vulnerability on EcoStruxure™ Process Expert | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2026-013-01 | Multiple Third-Party Vulnerabilities on ProLeiT Plant iT/Brewmaxx | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2025-014-06 | RemoteConnect and SCADAPack™ x70 Utilities | 2025-01-14T00:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2024-317-03 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T05:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2025-343-02 | EcoStruxure™ Foxboro DCS Advisor | 2025-12-09T08:00:00.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2025-252-01 | Multiple Altivar Process Drives and Communication Modules | 2025-09-09T04:00:00.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2023-192-04 | CODESYS Runtime Vulnerabilities | 2023-07-11T07:15:18.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2021-159-04 | ISaGRAF Vulnerabilities in IEC 61131-3 Programming and Engineering Tools | 2021-06-08T04:36:25.000Z | 2025-11-15T00:00:00.000Z |
| sevd-2022-284-03 | ISaGRAF Workbench for SAGE RTU | 2022-10-10T22:13:16.000Z | 2025-11-14T06:30:00.000Z |
| sevd-2025-315-02 | EcoStruxure™ Machine SCADA Expert & Pro-face BLUE Open Studio | 2025-11-11T08:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-315-01 | PowerChute™ Serial Shutdown | 2025-11-11T08:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-224-02 | EcoStruxure™ Power Monitoring Expert Software & EcoStruxure™ Power Operation (EPO) and EcoStruxure™ Power SCADA Operation (PSO) | 2025-08-12T04:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-224-01 | Saitel DR & Saitel DP Remote Terminal Unit | 2025-08-12T04:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-014-07 | FlexNet Publisher Vulnerability | 2025-01-14T07:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-287-01 | EcoStruxure™ OPC UA Server Expert and EcoStruxure™ Modicon Communication Server | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2025-133-01 | Modicon Controllers M241/M251/M258/LMC058 | 2025-05-13T04:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2024-345-03 | Modicon M241 / M251 / M258 / LMC058 | 2024-12-10T05:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2024-191-04 | Modicon Controllers M241/ M251, M258 / LMC058 and M262 | 2024-07-09T00:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2025-133-05 | Galaxy VS, Galaxy VL, Galaxy VXL | 2025-05-13T04:00:00.000Z | 2025-09-24T04:00:00.000Z |
| sevd-2025-252-02 | Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-09T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-04 | EcoStruxure™ Building Operation Enterprise Server, EcoStruxure™ Building Operation Enterprise Central, and EcoStruxure™ Workstation | 2025-08-12T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-03 | Schneider Electric Software Update | 2025-08-12T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-014-02 | Pro-face GP-Pro EX and Remote HMI | 2025-01-14T00:00:00.000Z | 2025-09-09T04:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-grafana-2026-21720 | Unauthenticated DoS: avatar cache leaks goroutines when /avatar/:hash requests time out | 2026-02-18T17:41:21.379Z | 2026-02-18T18:09:39.057Z |
| bit-appsmith-2026-24042 | Appsmith public apps can execute unpublished actions (viewMode confusion) | 2026-01-29T08:36:35.250Z | 2026-02-18T18:09:39.057Z |
| bit-apache-2021-41773 | Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 | 2024-03-06T10:54:39.310Z | 2026-02-18T18:09:39.057Z |
| bit-python-2026-1299 | email BytesGenerator header injection due to unquoted newlines | 2026-02-03T08:53:00.053Z | 2026-02-16T16:32:40.318Z |
| bit-python-2026-0865 | wsgiref.headers.Headers allows header newline injection | 2026-01-26T14:50:04.789Z | 2026-02-16T16:32:40.318Z |
| bit-postgresql-2026-2007 | PostgreSQL pg_trgm heap buffer overflow writes pattern onto server memory | 2026-02-16T16:03:46.313Z | 2026-02-16T16:32:40.318Z |
| bit-postgresql-2026-2006 | PostgreSQL missing validation of multibyte character length executes arbitrary code | 2026-02-16T16:03:41.880Z | 2026-02-16T16:32:40.318Z |
| bit-postgresql-2026-2005 | PostgreSQL pgcrypto heap buffer overflow executes arbitrary code | 2026-02-16T16:03:36.943Z | 2026-02-16T16:32:40.318Z |
| bit-postgresql-2026-2004 | PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code | 2026-02-16T16:03:32.935Z | 2026-02-16T16:32:40.318Z |
| bit-postgresql-2026-2003 | PostgreSQL oidvector discloses a few bytes of memory | 2026-02-16T16:03:27.354Z | 2026-02-16T16:32:40.318Z |
| bit-pip-2026-1703 | Limited path traversal when installing wheel archives | 2026-02-16T15:59:06.080Z | 2026-02-16T16:32:40.318Z |
| bit-pillow-2026-25990 | Pillow has an out-of-bounds write when loading PSD images | 2026-02-16T16:02:06.871Z | 2026-02-16T16:32:40.318Z |
| bit-libpython-2026-1299 | email BytesGenerator header injection due to unquoted newlines | 2026-02-03T08:45:06.015Z | 2026-02-16T16:32:40.318Z |
| bit-libpython-2026-0865 | wsgiref.headers.Headers allows header newline injection | 2026-01-26T14:43:33.890Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1458 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-02-16T16:31:06.973Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1456 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-02-16T16:31:05.146Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1282 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab | 2026-02-16T16:31:03.017Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-1094 | Improper Validation of Unsafe Equivalence in Input in GitLab | 2026-02-16T16:30:59.417Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-0958 | Interpretation Conflict in GitLab | 2026-02-16T16:30:57.233Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2026-0595 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-02-16T16:30:53.679Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-8099 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-02-16T16:30:40.312Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-7659 | Origin Validation Error in GitLab | 2026-02-16T16:30:29.449Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-14594 | Authorization Bypass Through User-Controlled Key in GitLab | 2026-02-16T16:28:35.547Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-14592 | Missing Authorization in GitLab | 2026-02-16T16:28:33.785Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-14560 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-02-16T16:28:32.048Z | 2026-02-16T16:32:40.318Z |
| bit-gitlab-2025-12073 | Server-Side Request Forgery (SSRF) in GitLab | 2026-02-16T16:27:53.661Z | 2026-02-16T16:32:40.318Z |
| bit-dotnet-2026-21218 | .NET Spoofing Vulnerability | 2026-02-16T15:58:16.593Z | 2026-02-16T16:32:40.318Z |
| bit-moodle-2025-67857 | Moodle: moodle: data exposure of user identifiers in urls | 2026-02-12T08:51:13.591Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67856 | Moodle: moodle: privilege escalation via incomplete role checks in badge awarding | 2026-02-12T08:51:12.105Z | 2026-02-12T09:10:24.600Z |
| bit-moodle-2025-67855 | Mooodle: mooodle: information disclosure and script execution via reflected cross-site scripting | 2026-02-12T08:51:10.563Z | 2026-02-12T09:10:24.600Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-yn08405 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 7.1.1-r7 | 2026-02-19T00:39:05.944714Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-oj16660 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0 | 2026-02-19T00:39:07.225007Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-kn34553 | vulnerability has been identified in Node | 2026-02-19T00:58:48.926519Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-kn30288 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-rhfx-m35p-ff5j, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0 | 2026-02-19T00:39:07.163109Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-zt77083 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-02-18T00:40:43.959662Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-xv54160 | Within HostnameError | 2026-02-17T00:41:15.330012Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-vg57433 | Within HostnameError | 2026-02-17T00:39:45.599344Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-uh39784 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-17T00:40:45.017480Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-jr03360 | Within HostnameError | 2026-02-17T00:39:45.300172Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-gg58376 | Within HostnameError | 2026-02-17T00:41:15.939977Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-bs57244 | Within HostnameError | 2026-02-17T00:39:44.907078Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-pr84319 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-r6v5-fh4h-64xc, GHSA-rhfx-m35p-ff5j, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0 | 2026-02-14T00:37:23.085740Z | 2026-02-13T12:28:27Z |
| cleanstart-2026-kk07808 | issue has been found in third-party PNM decoding associated with libpng 1 | 2026-02-14T00:37:45.311656Z | 2026-02-13T12:28:27Z |
| cleanstart-2026-tr92727 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-13T00:41:14.875956Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-qi35149 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-13T00:39:44.259950Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-jb30245 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 0.47.2-r0 | 2026-02-13T00:39:45.274258Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-gv85693 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-13T00:40:14.240914Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-fi29887 | During the TLS 1 | 2026-02-13T00:39:44.225771Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-ca79883 | Security fixes for GHSA-6v2p-p943-phr9, GHSA-c6gw-w398-hv78, GHSA-f6x5-jh6r-wrfv, GHSA-hcg3-p754-cr77, GHSA-j5w8-q4qc-rx2x, GHSA-qxp5-gw88-xv66, GHSA-v778-237x-gjrc, GHSA-vvgc-356p-c3xw applied in versions: 1.15.0-r1 | 2026-02-13T00:40:14.901695Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-xb34574 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-11T00:40:59.223419Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-im73098 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-11T00:40:59.052841Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-cv28298 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-11T00:41:59.034081Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-by71381 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-11T00:41:59.117560Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-gp14462 | Security fixes for ghsa-vvgc-356p-c3xw applied in versions: 0.18.0-r0 | 2026-02-10T00:39:23.397354Z | 2026-02-09T12:51:17Z |
| cleanstart-2026-wk88787 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-06T00:41:29.451524Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-rr78450 | Within HostnameError | 2026-02-06T00:39:29.463576Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-jn44153 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-gx3x-vq4p-mhhv, GHSA-j5w8-q4qc-rx2x applied in versions: 1.18.0-r0, 1.19.0-r1 | 2026-02-06T00:39:29.662228Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-tc95380 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-02-06T01:06:01.062694Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-qn16013 | Cancelling a query (e | 2026-02-03T16:02:29.512503Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-nb26505 | Security fixes for GHSA-F6X5-JH6R-WRFV, GHSA-J5W8-Q4QC-RX2X applied in versions: 4.5.1-r0 | 2026-02-03T16:02:27.744077Z | 2026-02-03T11:13:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2026-009 | 2026-02-11T16:53:32.000Z | 2026-02-12T15:37:20.000Z | |
| drupal-contrib-2026-010 | 2026-02-11T16:54:18.000Z | 2026-02-11T16:54:18.000Z | |
| drupal-contrib-2026-008 | 2026-02-04T17:23:40.000Z | 2026-02-04T17:23:40.000Z | |
| drupal-contrib-2026-007 | 2026-01-28T17:29:32.000Z | 2026-01-28T17:29:32.000Z | |
| drupal-contrib-2026-006 | 2026-01-28T17:28:31.000Z | 2026-01-28T17:28:31.000Z | |
| drupal-contrib-2026-005 | 2026-01-14T17:57:31.000Z | 2026-01-14T18:33:02.000Z | |
| drupal-contrib-2026-004 | 2026-01-14T17:56:28.000Z | 2026-01-14T17:56:28.000Z | |
| drupal-contrib-2026-003 | 2026-01-14T17:55:41.000Z | 2026-01-14T17:55:41.000Z | |
| drupal-contrib-2026-002 | 2026-01-14T17:54:33.000Z | 2026-01-14T17:54:33.000Z | |
| drupal-contrib-2026-001 | 2026-01-14T17:53:33.000Z | 2026-01-14T17:53:33.000Z | |
| drupal-contrib-2025-126 | 2025-12-17T17:47:13.000Z | 2025-12-17T17:47:13.000Z | |
| drupal-contrib-2025-125 | 2025-12-10T17:53:01.000Z | 2025-12-10T19:09:57.000Z | |
| drupal-contrib-2025-119 | 2025-12-03T18:48:23.000Z | 2025-12-03T19:05:53.000Z | |
| drupal-contrib-2025-124 | 2025-12-03T18:49:57.000Z | 2025-12-03T18:49:57.000Z | |
| drupal-contrib-2025-123 | 2025-12-03T18:49:40.000Z | 2025-12-03T18:49:40.000Z | |
| drupal-contrib-2025-122 | 2025-12-03T18:49:18.000Z | 2025-12-03T18:49:18.000Z | |
| drupal-contrib-2025-121 | 2025-12-03T18:48:57.000Z | 2025-12-03T18:48:57.000Z | |
| drupal-contrib-2025-120 | 2025-12-03T18:48:37.000Z | 2025-12-03T18:48:37.000Z | |
| drupal-contrib-2025-118 | 2025-12-03T18:48:10.000Z | 2025-12-03T18:48:10.000Z | |
| drupal-contrib-2025-117 | 2025-12-03T18:47:37.000Z | 2025-12-03T18:47:37.000Z | |
| drupal-contrib-2025-088 | 2025-07-09T16:37:40.000Z | 2025-11-22T09:22:47.000Z | |
| drupal-contrib-2025-116 | 2025-11-05T18:09:13.000Z | 2025-11-05T18:09:13.000Z | |
| drupal-contrib-2025-115 | 2025-11-05T18:08:01.000Z | 2025-11-05T18:08:01.000Z | |
| drupal-contrib-2025-114 | 2025-10-29T16:44:39.000Z | 2025-10-29T20:15:52.000Z | |
| drupal-contrib-2025-113 | 2025-10-22T16:35:12.000Z | 2025-10-22T16:35:12.000Z | |
| drupal-contrib-2025-112 | 2025-10-22T16:34:46.000Z | 2025-10-22T16:34:46.000Z | |
| drupal-contrib-2025-111 | 2025-09-24T17:28:05.000Z | 2025-09-24T17:28:05.000Z | |
| drupal-contrib-2025-110 | 2025-09-24T17:27:41.000Z | 2025-09-24T17:27:41.000Z | |
| drupal-contrib-2025-109 | 2025-09-24T17:27:33.000Z | 2025-09-24T17:27:33.000Z | |
| drupal-contrib-2025-108 | 2025-09-24T17:27:20.000Z | 2025-09-24T17:27:20.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-10895 | WordPress插件Pixel Manager for WooCommerce信息泄露漏洞 | 2025-11-20 | 2026-02-14 |
| cnvd-2026-10894 | WordPress插件Quiz Maker信息泄露漏洞 | 2025-11-21 | 2026-02-14 |
| cnvd-2026-10893 | WordPress插件WP FullCalendar信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10892 | WordPress插件WP Directory Kit信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10891 | WordPress插件CubeWP – All-in-One Dynamic Content Framework信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10890 | WordPress插件Contact Form 7 GetResponse Extension信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10889 | WordPress插件Cargus信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10888 | WordPress插件Booking Ultra Pro信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10887 | MailEnable存在未明漏洞(CNVD-2026-10887) | 2025-12-18 | 2026-02-14 |
| cnvd-2026-10885 | FRRouting拒绝服务漏洞(CNVD-2026-10885) | 2025-10-31 | 2026-02-14 |
| cnvd-2026-06351 | 用友网络科技股份有限公司U8+渠道管理(高级版)存在SQL注入漏洞(CNVD-C-2025-1245200) | 2025-12-31 | 2026-02-14 |
| cnvd-2026-10886 | MailEnable存在未明漏洞 | 2025-12-18 | 2026-02-13 |
| cnvd-2026-10884 | FRRouting拒绝服务漏洞(CNVD-2026-10884) | 2025-10-31 | 2026-02-13 |
| cnvd-2026-10883 | FRRouting拒绝服务漏洞(CNVD-2026-10883) | 2025-10-31 | 2026-02-13 |
| cnvd-2026-10882 | FRRouting拒绝服务漏洞 | 2025-10-31 | 2026-02-13 |
| cnvd-2026-10881 | mall-swarm授权问题漏洞(CNVD-2026-10881) | 2025-11-18 | 2026-02-13 |
| cnvd-2026-10880 | mall-swarm存在未明漏洞 | 2025-11-18 | 2026-02-13 |
| cnvd-2026-10879 | mall-swarm授权问题漏洞(CNVD-2026-10879) | 2025-11-18 | 2026-02-13 |
| cnvd-2026-10878 | mall-swarm授权问题漏洞(CNVD-2026-10878) | 2025-11-18 | 2026-02-13 |
| cnvd-2026-10877 | mall-swarm授权问题漏洞(CNVD-2026-10877) | 2025-11-18 | 2026-02-13 |
| cnvd-2026-10876 | mall-swarm授权问题漏洞 | 2025-12-10 | 2026-02-13 |
| cnvd-2026-10875 | Huawei HarmonyOS卡框架模块多线程竞争条件漏洞 | 2026-01-19 | 2026-02-13 |
| cnvd-2026-10874 | Huawei HarmonyOS和EMUI克隆模块中间人攻击漏洞 | 2026-01-19 | 2026-02-13 |
| cnvd-2026-10873 | Huawei HarmonyOS和EMUI媒体库模块权限验证绕过漏洞(CNVD-2026-10873) | 2026-01-19 | 2026-02-13 |
| cnvd-2026-10872 | Huawei HarmonyOS和EMUI媒体库模块权限验证绕过漏洞 | 2026-01-19 | 2026-02-13 |
| cnvd-2026-10871 | WordPress插件metasync存在未明漏洞 | 2026-02-04 | 2026-02-12 |
| cnvd-2026-10870 | WordPress插件Simple User Registration访问控制错误漏洞 | 2026-02-04 | 2026-02-12 |
| cnvd-2026-10859 | Adobe Substance 3D Modeler越界写入漏洞(CNVD-2026-10859) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10858 | Adobe Substance 3D Modeler越界写入漏洞(CNVD-2026-10858) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10857 | Rockwell Automation FactoryTalk Linx权限提升漏洞(CNVD-2026-10857) | 2025-10-17 | 2026-02-12 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0185 | Vulnérabilité dans Microsoft Windows | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0184 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0183 | Vulnérabilité dans HPE Aruba Networking ClearPass Policy Manager | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0182 | Multiples vulnérabilités dans Atlassian Confluence | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0181 | Vulnérabilité dans Apache Tomcat | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0180 | Vulnérabilité dans NetApp StorageGRID | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0179 | Multiples vulnérabilités dans SPIP | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0178 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0177 | Multiples vulnérabilités dans Moodle | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0176 | Vulnérabilité dans Mattermost Server | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0175 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0174 | Multiples vulnérabilités dans LibreNMS | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2024-avi-0858 | Multiples vulnérabilités dans Mitel Micollab | 2024-10-10T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| certfr-2026-avi-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| certfr-2026-avi-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| certfr-2026-avi-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0162 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0161 | Vulnérabilité dans Tenable Nessus Agent | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0144 | Multiples vulnérabilités dans Ivanti Endpoint Manager | 2026-02-11T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0160 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0159 | Multiples vulnérabilités dans Keycloak | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-ale-014 | [MàJ] Vulnérabilité dans React Server Components | 2025-12-05T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-ale-001 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2026-01-30T00:00:00.000000 | 2026-02-03T00:00:00.000000 |
| certfr-2025-ale-013 | [MàJ] Multiples vulnérabilités dans Cisco ASA et FTD | 2025-09-25T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-ale-012 | Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2025-08-26T00:00:00.000000 | 2025-09-26T00:00:00.000000 |
| certfr-2025-ale-010 | [MàJ] Multiples vulnérabilités dans Microsoft SharePoint | 2025-07-21T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| certfr-2025-ale-011 | Incidents de sécurité dans les pare-feux SonicWall | 2025-08-05T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| certfr-2025-ale-009 | Multiples vulnérabilités dans Citrix NetScaler ADC et NetScaler Gateway | 2025-07-01T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| certfr-2025-ale-004 | Activités de post-exploitation dans Fortinet FortiGate | 2025-04-11T00:00:00.000000 | 2025-08-07T00:00:00.000000 |
| certfr-2025-ale-008 | [MàJ] Vulnérabilité dans Roundcube | 2025-06-05T00:00:00.000000 | 2025-07-21T00:00:00.000000 |
| certfr-2025-ale-007 | Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile (EPMM) | 2025-05-14T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-006 | Vulnérabilité dans les produits Fortinet | 2025-05-13T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-005 | Vulnérabilité dans SAP NetWeaver | 2025-04-28T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-003 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-04-04T00:00:00.000000 | 2025-04-11T00:00:00.000000 |
| certfr-2025-ale-002 | [MàJ] Vulnérabilité dans les produits Fortinet | 2025-05-07T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| certfr-2025-ale-001 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| certfr-2024-ale-014 | [MàJ] Multiples vulnérabilités dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-ale-013 | Exploitations de vulnérabilités dans Ivanti Cloud Services Appliance (CSA) | 2025-03-31T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| certfr-2024-ale-015 | [MàJ] Multiples vulnérabilités sur l'interface d'administration des équipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-ale-012 | [MàJ] Vulnérabilités affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-011 | Vulnérabilité dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-010 | Multiples vulnérabilités dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| certfr-2024-ale-009 | Vulnérabilité dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| certfr-2024-ale-008 | [MàJ] Vulnérabilité dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-007 | Multiples vulnérabilités dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-006 | [MàJ] Vulnérabilité dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-004 | [MàJ] Vulnérabilité dans Fortinet FortiOS | 2024-02-09T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-005 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2024-02-15T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-003 | [MàJ] Incident affectant les solutions AnyDesk | 2024-02-05T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-001 | [MàJ] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2026-0015 |
7.2 (4.0)
|
Threat actors use FortiCloud SSO bypass to collect LDA… |
fortinet |
fortios |
2026-02-09T09:09:00.000Z | 2026-02-09T09:14:59.004089Z |
| GCVE-1-2026-0013 |
2.1 (4.0)
|
Flask Application Username Route Collision Allows Rese… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:27:00.000Z | 2026-02-04T19:32:49.787763Z |
| GCVE-1-2026-0014 |
7.4 (4.0)
|
Missing Authorization Check Allows Unauthorized Modifi… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:32:14.341383Z | 2026-02-04T19:32:14.341383Z |
| GCVE-1-2026-0012 |
2.1 (4.0)
|
Authentication Error Message Allows Email Address Enum… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:21:34.411344Z | 2026-02-04T19:21:34.411344Z |
| GCVE-1-2026-0011 |
8.7 (4.0)
|
Out-of-bounds memory write in the network packet … |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:37:00.000Z | 2026-01-29T14:39:17.728822Z |
| GCVE-1-2026-0010 |
9.3 (4.0)
|
Improper input validation in the file transfer ha… |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:33:18.822829Z | 2026-01-29T14:33:18.822829Z |
| GCVE-1-2026-0009 |
9.3 (4.0)
|
Stack-based buffer overflow in the multiplayer ne… |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:30:38.596928Z | 2026-01-29T14:30:38.596928Z |
| GCVE-1-2026-0008 |
10 (4.0)
|
gpg-agent stack buffer overflow in pkdecrypt using KEM |
gnupg |
gpg-agent |
2026-01-28T13:48:12.350509Z | 2026-01-28T13:48:12.350509Z |
| GCVE-1-2026-0007 |
10 (4.0)
|
GNU InetUtils Security Advisory: remote authentication… |
gnu |
InetUtils |
2026-01-20T20:57:00.000Z | 2026-01-26T16:32:40.831364Z |
| GCVE-1-2026-0004 |
8.5 (4.0)
|
Authorization Bypass in Cerebrate IndividualsControlle… |
cerebrate |
cerebrate |
2026-01-13T15:28:00.000Z | 2026-01-13T15:38:37.744618Z |
| GCVE-1-2026-0005 |
8.5 (4.0)
|
Improper Access Control in Cerebrate Alignment Model A… |
cerebrate |
cerebrate |
2026-01-13T15:31:00.000Z | 2026-01-13T15:38:02.888546Z |
| GCVE-1-2026-0006 |
8.5 (4.0)
|
Improper Access Control in Cerebrate AuthKey and Encry… |
cerebrate |
cerebrate |
2026-01-13T15:37:17.337254Z | 2026-01-13T15:37:17.337254Z |
| GCVE-1-2026-0003 |
6.3 (4.0)
|
Stored/Reflected XSS via Unsanitized Parameters in URL… |
misp |
misp |
2026-01-13T10:50:00.000Z | 2026-01-13T10:54:13.659223Z |
| GCVE-1-2026-0002 |
10 (4.0)
|
Heap-buffer-overflow in EXIF writer for extra IFD tags |
ffmpeg |
ffmpeg |
2026-01-02T19:50:00.000Z | 2026-01-02T20:05:27.269877Z |
| GCVE-1-2026-0001 |
N/A
|
Bundle reference to gpg.fail |
gnupg |
gnupg |
2026-01-02T10:20:00.000Z | 2026-01-02T13:31:14.359346Z |
| GCVE-1-2025-0041 |
6.4 (4.0)
|
[online services] Reflected Cross-Site Scripting (XSS)… |
typo3 |
typo3 |
2025-12-19T14:25:00.000Z | 2025-12-19T14:54:51.594645Z |
| GCVE-1-2025-0032 |
10 (4.0)
|
The default configuration of WatchGuard Firebox device… |
watchguard |
firebox |
2025-12-03T16:25:00.000Z | 2025-12-19T13:48:34.570799Z |
| GCVE-1-2025-0031 |
7.1 (4.0)
|
A cross-site scripting (XSS) vulnerability was identif… |
misp |
misp |
2025-12-03T10:58:00.000Z | 2025-12-16T09:36:09.594750Z |
| GCVE-1-2025-0040 |
7.2 (4.0)
|
A cross-site scripting (XSS) vulnerability was id… |
misp |
misp |
2025-12-13T08:44:32.378924Z | 2025-12-13T08:44:32.378924Z |
| GCVE-1-2025-0039 |
8.5 (4.0)
|
XSS Reintroduced in MISP Dashboard World Map Widget Du… |
misp |
misp |
2025-12-10T14:33:52.856734Z | 2025-12-10T14:33:52.856734Z |
| GCVE-1-2025-0038 |
5 (4.0)
|
Reflected XSS in MISP Template Tag Removal and MISP Ad… |
misp |
misp |
2025-12-10T14:10:00.000Z | 2025-12-10T14:16:55.918270Z |
| GCVE-1-2025-0037 |
7 (4.0)
|
Reflected XSS in MISP Dashboard Widgets via Unescaped … |
misp |
misp |
2025-12-10T14:01:03.200804Z | 2025-12-10T14:01:03.200804Z |
| GCVE-1-2025-0036 |
8.3 (4.0)
|
A reflected cross-site scripting (XSS) vulnerability w… |
misp |
misp |
2025-12-10T13:46:07.170083Z | 2025-12-10T13:46:07.170083Z |
| GCVE-1-2025-0035 |
8.3 (4.0)
|
Insufficient sanitization of bundle metadata (availabl… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:25:00.000Z | 2025-12-08T12:14:06.307298Z |
| GCVE-1-2025-0034 |
7 (4.0)
|
Missing CSRF protection on state-changing endpoints in… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:19:00.000Z | 2025-12-08T12:13:24.197294Z |
| GCVE-1-2025-0033 |
8.1 (4.0)
|
Vulnerability-lookup did not track or limit failed One… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:11:00.000Z | 2025-12-08T12:12:53.235996Z |
| GCVE-1-2025-0030 |
6.2 (4.0)
|
A cross-site scripting (XSS) vulnerability in the MISP… |
misp |
misp |
2025-12-03T10:53:00.000Z | 2025-12-03T10:58:55.845341Z |
| GCVE-1-2025-0028 |
8.5 (4.0)
|
Information leakage vulnerability in the MISP Feed con… |
misp |
misp |
2025-11-27T07:23:00.000Z | 2025-12-02T08:51:35.429494Z |
| GCVE-1-2025-0027 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in … |
misp |
misp |
2025-11-27T07:17:00.000Z | 2025-12-02T08:51:04.323899Z |
| GCVE-1-2025-0026 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in … |
misp |
misp |
2025-11-26T16:35:00.000Z | 2025-12-02T08:50:46.381572Z |