Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-21362 |
8.4 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-01-14T18:04:07.536Z | 2026-02-26T19:09:17.378Z |
| CVE-2024-40591 |
8 (3.1)
|
An incorrect privilege assignment vulnerability [… |
Fortinet |
FortiOS |
2025-02-11T16:09:02.843Z | 2026-02-26T19:09:17.178Z |
| CVE-2025-21363 |
7.8 (3.1)
|
Microsoft Word Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-01-14T18:04:08.108Z | 2026-02-26T19:09:17.002Z |
| CVE-2025-29795 |
7.8 (3.1)
|
Microsoft Edge (Chromium-based) Update Elevation of Pr… |
Microsoft |
Microsoft Edge Update Setup |
2025-03-23T16:11:56.327Z | 2026-02-26T19:09:16.840Z |
| CVE-2024-35279 |
7.7 (3.1)
|
A stack-based buffer overflow [CWE-121] vulnerabi… |
Fortinet |
FortiOS |
2025-02-11T16:09:02.911Z | 2026-02-26T19:09:16.696Z |
| CVE-2025-21365 |
7.8 (3.1)
|
Microsoft Office Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-01-14T18:04:09.116Z | 2026-02-26T19:09:16.548Z |
| CVE-2025-2746 |
9.8 (3.1)
|
Kentico Xperience <= 13.0.172 Staging Sync Server Dige… |
Kentico |
Xperience |
2025-03-24T18:16:04.022Z | 2026-02-26T19:09:16.392Z |
| CVE-2024-50567 |
6.8 (3.1)
|
An improper neutralization of special elements us… |
Fortinet |
FortiWeb |
2025-02-11T16:09:04.155Z | 2026-02-26T19:09:16.213Z |
| CVE-2025-21366 |
7.8 (3.1)
|
Microsoft Access Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-01-14T18:04:09.694Z | 2026-02-26T19:09:16.055Z |
| CVE-2025-2747 |
9.8 (3.1)
|
Kentico Xperience <= 13.0.178 Staging Sync Server None… |
Kentico |
Xperience |
2025-03-24T18:17:06.079Z | 2026-02-26T19:09:15.890Z |
| CVE-2024-27781 |
6.9 (3.1)
|
An improper neutralization of input during web pa… |
Fortinet |
FortiSandbox |
2025-02-11T16:09:12.324Z | 2026-02-26T19:09:15.677Z |
| CVE-2025-21395 |
7.8 (3.1)
|
Microsoft Access Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-01-14T18:04:12.837Z | 2026-02-26T19:09:15.513Z |
| CVE-2025-26512 |
9.9 (3.1)
|
CVE-2025-26512 Privilege Escalation Vulnerability in S… |
NetApp |
SnapCenter |
2025-03-24T22:06:00.720Z | 2026-02-26T19:09:15.329Z |
| CVE-2025-21157 |
7.8 (3.1)
|
InDesign Desktop | Out-of-bounds Write (CWE-787) |
Adobe |
InDesign Desktop |
2025-02-11T17:10:45.344Z | 2026-02-26T19:09:15.055Z |
| CVE-2025-21403 |
6.4 (3.1)
|
On-Premises Data Gateway Information Disclosure Vulner… |
Microsoft |
On-Premises Data Gateway |
2025-01-14T18:04:13.337Z | 2026-02-26T19:09:14.864Z |
| CVE-2025-1974 |
9.8 (3.1)
|
ingress-nginx admission controller RCE escalation |
kubernetes |
ingress-nginx |
2025-03-24T23:28:48.985Z | 2026-02-26T19:09:14.726Z |
| CVE-2025-21158 |
7.8 (3.1)
|
InDesign Desktop | Integer Underflow (Wrap or Wraparou… |
Adobe |
InDesign Desktop |
2025-02-11T17:10:47.804Z | 2026-02-26T19:09:14.593Z |
| CVE-2025-21335 |
7.8 (3.1)
|
Windows Hyper-V NT Kernel Integration VSP Elevation of… |
Microsoft |
Windows 10 Version 21H2 |
2025-01-14T18:04:17.808Z | 2026-02-26T19:09:14.341Z |
| CVE-2025-21156 |
7.8 (3.1)
|
InCopy | Integer Underflow (Wrap or Wraparound) (CWE-191) |
Adobe |
InCopy |
2025-02-11T17:21:25.696Z | 2026-02-26T19:09:14.174Z |
| CVE-2025-1097 |
8.8 (3.1)
|
ingress-nginx controller - configuration injection via… |
kubernetes |
ingress-nginx |
2025-03-24T23:29:05.879Z | 2026-02-26T19:09:14.028Z |
| CVE-2025-21187 |
7.8 (3.1)
|
Microsoft Power Automate Remote Code Execution Vulnerability |
Microsoft |
Power Automate for Desktop |
2025-01-14T18:04:20.259Z | 2026-02-26T19:09:13.876Z |
| CVE-2025-21159 |
7.8 (3.1)
|
Illustrator | Use After Free (CWE-416) |
Adobe |
Illustrator |
2025-02-11T17:27:39.557Z | 2026-02-26T19:09:13.710Z |
| CVE-2025-21186 |
7.8 (3.1)
|
Microsoft Access Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-01-14T18:04:20.776Z | 2026-02-26T19:09:13.442Z |
| CVE-2025-1098 |
8.8 (3.1)
|
ingress-nginx controller - configuration injection via… |
kubernetes |
ingress-nginx |
2025-03-24T23:29:15.610Z | 2026-02-26T19:09:13.280Z |
| CVE-2025-21163 |
7.8 (3.1)
|
Illustrator | Stack-based Buffer Overflow (CWE-121) |
Adobe |
Illustrator |
2025-02-11T17:27:40.356Z | 2026-02-26T19:09:13.139Z |
| CVE-2025-21224 |
8.1 (3.1)
|
Windows Line Printer Daemon (LPD) Service Remote Code … |
Microsoft |
Windows 10 Version 21H2 |
2025-01-14T18:04:22.623Z | 2026-02-26T19:09:12.951Z |
| CVE-2025-24514 |
8.8 (3.1)
|
ingress-nginx controller - configuration injection via… |
kubernetes |
ingress-nginx |
2025-03-24T23:29:36.802Z | 2026-02-26T19:09:12.808Z |
| CVE-2025-21160 |
7.8 (3.1)
|
Illustrator | Integer Underflow (Wrap or Wraparound) (… |
Adobe |
Illustrator |
2025-02-11T17:27:41.155Z | 2026-02-26T19:09:12.642Z |
| CVE-2025-21172 |
7.5 (3.1)
|
.NET and Visual Studio Remote Code Execution Vulnerability |
Microsoft |
.NET 8.0 |
2025-01-14T18:04:38.469Z | 2026-02-26T19:09:12.470Z |
| CVE-2024-58104 |
7.3 (3.1)
|
A vulnerability in the Trend Micro Apex One Secu… |
Trend Micro, Inc. |
Trend Micro Apex One |
2025-03-25T17:37:28.783Z | 2026-02-26T19:09:12.303Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-27966 | Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.8… | 2026-02-26T02:16:23.833 | 2026-02-26T15:17:42.780 |
| fkie_cve-2026-27837 | Dottie provides nested object access and manipulation in JavaScript. Versions 2.0.4 through 2.0.6 c… | 2026-02-26T01:16:24.937 | 2026-02-26T15:17:39.733 |
| fkie_cve-2026-26077 | Discourse is an open source discussion platform. Prior to versions 2025.12.2, 2026.1.1, and 2026.2.… | 2026-02-26T15:17:36.653 | 2026-02-26T15:17:36.653 |
| fkie_cve-2026-3187 | A vulnerability was identified in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this is… | 2026-02-25T15:20:55.277 | 2026-02-26T15:11:34.407 |
| fkie_cve-2025-71243 | The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a cr… | 2026-02-19T16:27:12.303 | 2026-02-26T15:07:48.140 |
| fkie_cve-2019-25400 | IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the… | 2026-02-18T22:16:23.343 | 2026-02-26T15:07:02.957 |
| fkie_cve-2019-25399 | IPFire 2.21 Core Update 127 contains multiple stored cross-site scripting vulnerabilities in the ex… | 2026-02-18T22:16:23.177 | 2026-02-26T15:06:58.533 |
| fkie_cve-2019-25398 | IPFire 2.21 Core Update 127 contains multiple cross-site scripting vulnerabilities in the ovpnmain.… | 2026-02-18T22:16:23.003 | 2026-02-26T15:06:53.747 |
| fkie_cve-2019-25397 | IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the… | 2026-02-18T22:16:22.833 | 2026-02-26T15:06:49.083 |
| fkie_cve-2019-25396 | IPFire 2.21 Core Update 127 contains a reflected cross-site scripting vulnerability in the updatexl… | 2026-02-18T22:16:22.620 | 2026-02-26T15:06:06.327 |
| fkie_cve-2024-4040 | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0… | 2024-04-22T20:15:07.803 | 2026-02-26T15:04:22.973 |
| fkie_cve-2024-28995 | SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access … | 2024-06-06T09:15:14.167 | 2026-02-26T15:04:20.280 |
| fkie_cve-2024-1709 | ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Altern… | 2024-02-21T16:15:50.420 | 2026-02-26T15:04:18.213 |
| fkie_cve-2024-1212 | Unauthenticated remote attackers can access the system through the LoadMaster management interface,… | 2024-02-21T18:15:50.417 | 2026-02-26T15:04:16.093 |
| fkie_cve-2023-6549 | Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetSca… | 2024-01-17T21:15:11.690 | 2026-02-26T15:04:13.563 |
| fkie_cve-2023-6448 | Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default … | 2023-12-05T18:15:12.643 | 2026-02-26T15:04:11.377 |
| fkie_cve-2023-4211 | A local non-privileged user can make improper GPU memory processing operations to gain access to a… | 2023-10-01T18:15:09.927 | 2026-02-26T15:04:09.357 |
| fkie_cve-2023-47565 | An OS command injection vulnerability has been found to affect legacy QNAP VioStor NVR models runni… | 2023-12-08T16:15:16.367 | 2026-02-26T15:04:06.667 |
| fkie_cve-2023-36851 | A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Se… | 2023-09-27T15:18:54.877 | 2026-02-26T15:04:04.180 |
| fkie_cve-2023-36847 | A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on EX Ser… | 2023-08-17T20:15:10.553 | 2026-02-26T15:04:01.340 |
| fkie_cve-2023-36846 | A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Se… | 2023-08-17T20:15:10.457 | 2026-02-26T15:03:59.110 |
| fkie_cve-2023-33009 | A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions … | 2023-05-24T13:15:09.560 | 2026-02-26T15:03:56.120 |
| fkie_cve-2023-2533 | A Cross-Site Request Forgery (CSRF) vulnerability has been identified in PaperCut NG/MF, which, und… | 2023-06-20T15:15:11.560 | 2026-02-26T15:03:53.690 |
| fkie_cve-2023-28434 | Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker… | 2023-03-22T21:15:18.427 | 2026-02-26T15:03:51.180 |
| fkie_cve-2023-27524 | Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations tha… | 2023-04-24T16:15:07.843 | 2026-02-26T15:03:48.773 |
| fkie_cve-2023-24489 | A vulnerability has been discovered in the customer-managed ShareFile storage zones controller whic… | 2023-07-10T22:15:09.197 | 2026-02-26T15:03:44.457 |
| fkie_cve-2026-3201 | USB HID protocol dissector memory exhaustion in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows… | 2026-02-25T15:20:55.617 | 2026-02-26T14:49:01.050 |
| fkie_cve-2026-3202 | NTS-KE protocol dissector crash in Wireshark 4.6.0 to 4.6.3 allows denial of service | 2026-02-25T15:20:55.790 | 2026-02-26T14:47:37.923 |
| fkie_cve-2026-3203 | RF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denia… | 2026-02-25T15:20:55.973 | 2026-02-26T14:41:13.870 |
| fkie_cve-2026-2680 | Reflected Cross-Site Scripting (XSS) on the A3factura web platform, in parameter 'customerVATNumber… | 2026-02-26T13:16:17.253 | 2026-02-26T13:16:17.253 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-g4x4-mr34-3pw3 |
4.7 (3.1)
|
NTS-KE protocol dissector crash in Wireshark 4.6.0 to 4.6.3 allows denial of service | 2026-02-25T15:31:43Z | 2026-02-25T15:31:43Z |
| ghsa-8p92-v8gg-gvcv |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this is… | 2026-02-25T15:31:43Z | 2026-02-25T15:31:43Z |
| ghsa-3g96-v3mg-9xp9 |
4.7 (3.1)
|
USB HID protocol dissector memory exhaustion in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows… | 2026-02-25T15:31:43Z | 2026-02-25T15:31:43Z |
| ghsa-whqp-34xh-xmxr |
4.3 (3.1)
|
In JetBrains TeamCity before 2025.11.3 missing authorization allowed project developers to add para… | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-px6f-q5hr-gqcp |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this vu… | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-c7jf-2rmf-hc7w |
4.3 (3.1)
|
In JetBrains TeamCity before 2025.11.3 open redirect was possible in the React project creation flow | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-4x44-gf2f-7mh8 |
2.3 (3.1)
|
In JetBrains TeamCity before 2025.11.3 disabling versioned settings left a credentials config on disk | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-26wv-wm3r-6rvc |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected is an unknown f… | 2026-02-25T15:31:40Z | 2026-02-25T15:31:40Z |
| ghsa-w36g-f98m-wm99 |
2.6 (3.1)
|
A time-of-create-to-time-of-use (TOCTOU) vulnerability lets recently deleted-then-recreated data so… | 2026-02-25T15:31:39Z | 2026-02-25T15:31:39Z |
| ghsa-mmcc-ppg6-c7j2 |
5.9 (4.0)
|
In affected version of Octopus Deploy it was possible to remove files and/or contents of files on t… | 2026-02-25T15:31:39Z | 2026-02-25T15:31:39Z |
| ghsa-jqcj-pmgf-5g3q |
9.8 (3.1)
|
Missing Authentication for Critical Function vulnerability in ePati Cyber Security Technologies I… | 2026-02-25T15:31:39Z | 2026-02-25T15:31:39Z |
| ghsa-8p8j-jq9g-4f8j |
8.8 (3.1)
|
In JetBrains YouTrack before 2025.3.121962 apps were able to send requests to the app permissions e… | 2026-02-25T15:31:39Z | 2026-02-25T15:31:39Z |
| ghsa-xx53-6qqj-gr7w |
9.8 (3.1)
|
Memory safety bugs present in Firefox 147 and Thunderbird 147. Some of these bugs showed evidence o… | 2026-02-24T15:30:33Z | 2026-02-25T15:31:37Z |
| ghsa-xchm-7954-5wvg |
9.8 (3.1)
|
Use-after-free in the DOM: Window and Location component. This vulnerability affects Firefox < 148,… | 2026-02-24T15:30:32Z | 2026-02-25T15:31:37Z |
| ghsa-vxjv-c6cq-74m6 |
9.8 (3.1)
|
Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148 and … | 2026-02-24T15:30:32Z | 2026-02-25T15:31:37Z |
| ghsa-vmmw-c3hw-gvm3 |
9.8 (3.1)
|
Out of bounds read and write in Tint in Google Chrome on Mac prior to 145.0.7632.116 allowed a remo… | 2026-02-24T00:31:34Z | 2026-02-25T15:31:37Z |
| ghsa-qvmx-rqmx-pvfg |
9.1 (3.1)
|
Out of bounds read in Media in Google Chrome prior to 145.0.7632.116 allowed a remote attacker to p… | 2026-02-24T00:31:34Z | 2026-02-25T15:31:37Z |
| ghsa-p9m7-fwrr-649p |
9.8 (3.1)
|
TOTOLINK X5000R v9.1.0cu_2415_B20250515 contains an argument injection vulnerability in the setDiag… | 2026-02-23T21:31:27Z | 2026-02-25T15:31:37Z |
| ghsa-jvc5-7j9r-q4m6 |
9.8 (3.1)
|
Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox < 14… | 2026-02-24T15:30:32Z | 2026-02-25T15:31:37Z |
| ghsa-jqhg-j5gv-hpmr |
8.8 (3.1)
|
TOTOLINK X6000R v9.4.0cu.1498_B20250826 contains an OS command injection vulnerability in the NTPSy… | 2026-02-23T21:31:27Z | 2026-02-25T15:31:37Z |
| ghsa-h79p-mfpr-8qm4 |
9.8 (3.1)
|
Use-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firef… | 2026-02-24T15:30:32Z | 2026-02-25T15:31:37Z |
| ghsa-fc3q-vg8h-qrfp |
4.3 (3.1)
|
A permission cache poisoning vulnerability in Devolutions Server allows authenticated users to bypa… | 2026-02-24T21:31:46Z | 2026-02-25T15:31:37Z |
| ghsa-f8w4-9vp9-7v2q |
9.1 (3.1)
|
Improper session management in GCOM EPON 1GE ONU version C00R371V00B01 allows attackers to execute … | 2026-02-23T21:31:27Z | 2026-02-25T15:31:37Z |
| ghsa-cgrc-pwqf-64v8 |
9.8 (3.1)
|
Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox… | 2026-02-24T15:30:32Z | 2026-02-25T15:31:37Z |
| ghsa-3fr2-qc88-c4cv |
6.5 (3.1)
|
Improper access control in multiple DVLS REST API endpoints in Devolutions Server 2025.3.14.0 and… | 2026-02-24T21:31:47Z | 2026-02-25T15:31:37Z |
| ghsa-33jq-j95r-2gpj |
5.4 (3.1)
|
Inappropriate implementation in DevTools in Google Chrome prior to 145.0.7632.116 allowed an attack… | 2026-02-24T00:31:34Z | 2026-02-25T15:31:37Z |
| ghsa-j7vj-8xmw-gvff |
8.6 (3.1)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-02-17T12:31:07Z | 2026-02-25T15:31:36Z |
| ghsa-3rhf-g27v-qpj7 |
9.9 (3.1)
|
Unrestricted Upload of File with Dangerous Type vulnerability in Bravis-Themes Bravis Addons bravis… | 2026-02-20T18:31:38Z | 2026-02-25T15:31:36Z |
| ghsa-23vm-r6m3-8q9g |
6.5 (3.1)
|
Missing Authorization vulnerability in add-ons.org PDF for Elementor Forms + Drag And Drop Template… | 2026-02-20T18:31:38Z | 2026-02-25T15:31:36Z |
| ghsa-5vhq-wv6w-vj48 |
7.8 (3.1)
|
Buffer Over-read in GitHub repository vim/vim prior to 9.0.0217. | 2022-08-18T00:00:17Z | 2026-02-25T15:31:35Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43100 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | democritus-grammars | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.665816Z |
| pysec-2022-43099 |
9.8 (3.1)
|
The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution back… | democritus-file-system | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.616362Z |
| pysec-2022-43098 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-file-system | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.564135Z |
| pysec-2022-43097 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-domains | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.511664Z |
| pysec-2022-43096 |
8.8 (3.1)
|
The d8s-timer for python, as distributed on PyPI, included a potential code-execution bac… | democritus-dates | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.46136Z |
| pysec-2022-43095 |
9.8 (3.1)
|
The d8s-ip-addresses package for Python, as distributed on PyPI, included a potential cod… | democritus-csv | 2022-10-11T22:15:00Z | 2024-11-21T14:22:43.41112Z |
| pysec-2022-43094 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | democritus-algorithms | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.361191Z |
| pysec-2022-43093 |
9.8 (3.1)
|
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backd… | d8s-xml | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.253271Z |
| pysec-2022-43092 |
9.8 (3.1)
|
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backd… | d8s-xml | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.200942Z |
| pysec-2022-43091 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | d8s-urls | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.149086Z |
| pysec-2022-43090 |
8.8 (3.1)
|
The d8s-timer for python, as distributed on PyPI, included a potential code-execution bac… | d8s-timer | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.097689Z |
| pysec-2022-43089 |
9.8 (3.1)
|
The d8s-timer for python, as distributed on PyPI, included a potential code-execution bac… | d8s-timer | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.045759Z |
| pysec-2022-43088 |
9.8 (3.1)
|
The d8s-strings for python, as distributed on PyPI, included a potential code-execution b… | d8s-strings | 2022-11-07T15:15:00Z | 2024-11-21T14:22:42.994084Z |
| pysec-2022-43087 |
9.8 (3.1)
|
The d8s-strings for python, as distributed on PyPI, included a potential code-execution b… | d8s-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.944804Z |
| pysec-2022-43086 |
9.8 (3.1)
|
The d8s-stats for python, as distributed on PyPI, included a potential code-execution bac… | d8s-stats | 2022-11-07T15:15:00Z | 2024-11-21T14:22:42.892924Z |
| pysec-2022-43085 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | d8s-python | 2022-11-07T15:15:00Z | 2024-11-21T14:22:42.829791Z |
| pysec-2022-43084 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | d8s-python | 2022-11-07T15:15:00Z | 2024-11-21T14:22:42.776996Z |
| pysec-2022-43083 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | d8s-python | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.723606Z |
| pysec-2022-43082 |
9.8 (3.1)
|
The d8s-networking for python, as distributed on PyPI, included a potential code-executio… | d8s-networking | 2022-11-07T15:15:00Z | 2024-11-21T14:22:42.668916Z |
| pysec-2022-43081 |
9.8 (3.1)
|
The d8s-networking for python, as distributed on PyPI, included a potential code-executio… | d8s-networking | 2022-11-07T15:15:00Z | 2024-11-21T14:22:42.613124Z |
| pysec-2022-43080 |
9.8 (3.1)
|
The d8s-netstrings for python, as distributed on PyPI, included a potential code-executio… | d8s-netstrings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.556543Z |
| pysec-2022-43079 |
9.8 (3.1)
|
The d8s-math for python, as distributed on PyPI, included a potential code-execution back… | d8s-math | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.499117Z |
| pysec-2022-43078 |
9.8 (3.1)
|
The d8s-json for python, as distributed on PyPI, included a potential code-execution back… | d8s-json | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.439723Z |
| pysec-2022-43077 |
9.8 (3.1)
|
The d8s-ip-addresses package for Python, as distributed on PyPI, included a potential cod… | d8s-ip-addresses | 2022-10-11T22:15:00Z | 2024-11-21T14:22:42.385746Z |
| pysec-2022-43076 |
9.8 (3.1)
|
The d8s-grammars for python, as distributed on PyPI, included a potential code-execution … | d8s-grammars | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.333517Z |
| pysec-2022-43075 |
9.8 (3.1)
|
The d8s-dates for python, as distributed on PyPI, included a potential code-execution bac… | d8s-dates | 2022-11-07T15:15:00Z | 2024-11-21T14:22:42.280201Z |
| pysec-2022-43074 |
9.8 (3.1)
|
The d8s-archives for python, as distributed on PyPI, included a potential code-execution … | d8s-archives | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.229096Z |
| pysec-2022-43073 |
9.8 (3.1)
|
The cloudlabeling package in PyPI v0.0.1 was discovered to contain a code execution backd… | cloudlabeling | 2022-06-24T21:15:00Z | 2024-11-21T14:22:42.118573Z |
| pysec-2017-113 |
8.8 (3.1)
|
Integer overflow in the cs_winkernel_malloc function in winkernel_mm.c in Capstone 3.0.4 … | capstone | 2017-03-16T21:59:00+00:00 | 2024-11-21T14:22:41.607839+00:00 |
| pysec-2021-880 |
7.5 (3.1)
|
Null pointer reference in CMS_Conservative_increment_obj in RaRe-Technologies bounter ver… | bounter | 2021-12-17T21:15:00Z | 2024-11-21T14:22:41.448775Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33595 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.589303Z |
| gsd-2024-33538 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.588107Z |
| gsd-2024-33533 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.580672Z |
| gsd-2024-33591 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.580436Z |
| gsd-2024-33537 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.572272Z |
| gsd-2024-33557 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.567408Z |
| gsd-2024-33548 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.564663Z |
| gsd-2024-33540 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.562741Z |
| gsd-2024-33546 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.560266Z |
| gsd-2024-33555 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.556591Z |
| gsd-2024-33577 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.555849Z |
| gsd-2024-33541 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.555650Z |
| gsd-2024-33559 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.554162Z |
| gsd-2024-33529 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.547084Z |
| gsd-2024-33553 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.544840Z |
| gsd-2024-33574 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.543325Z |
| gsd-2024-33551 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.543061Z |
| gsd-2024-33560 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.535115Z |
| gsd-2024-33550 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.534917Z |
| gsd-2024-33602 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.534164Z |
| gsd-2024-33581 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.528711Z |
| gsd-2024-33583 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.523973Z |
| gsd-2024-33570 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.523531Z |
| gsd-2024-33594 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.522993Z |
| gsd-2024-33534 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.522494Z |
| gsd-2024-33575 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.519910Z |
| gsd-2024-33530 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.519432Z |
| gsd-2024-33558 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.517690Z |
| gsd-2024-31156 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:09.611319Z |
| gsd-2024-4111 | A vulnerability was found in Tenda TX9 22.03.02.10. It has been rated as critical. Affect… | 2024-04-25T05:02:08.607990Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-545 | Malicious code in testxhjhka (npm) | 2026-01-27T08:09:00Z | 2026-02-02T05:56:30Z |
| mal-2026-544 | Malicious code in testxhjhk (npm) | 2026-01-27T08:09:00Z | 2026-02-02T05:56:30Z |
| mal-2026-543 | Malicious code in tailwind-components-cli (npm) | 2026-01-27T07:59:05Z | 2026-02-02T05:56:30Z |
| mal-2026-542 | Malicious code in stylus.js (npm) | 2026-01-27T08:11:31Z | 2026-02-02T05:56:30Z |
| mal-2026-525 | Malicious code in sandbox-hooks (npm) | 2026-01-27T02:25:01Z | 2026-02-02T05:56:30Z |
| mal-2026-611 | Malicious code in mbo-letters-cl (npm) | 2026-01-30T23:13:08Z | 2026-02-02T05:56:29Z |
| mal-2026-597 | Malicious code in n8n-nodes-comfyui-illu (npm) | 2026-01-29T03:52:09Z | 2026-02-02T05:56:29Z |
| mal-2026-573 | Malicious code in primebeem-db (npm) | 2026-01-28T07:27:26Z | 2026-02-02T05:56:29Z |
| mal-2026-572 | Malicious code in pino-debugger (npm) | 2026-01-28T07:37:08Z | 2026-02-02T05:56:29Z |
| mal-2026-571 | Malicious code in okijuh (npm) | 2026-01-28T07:56:55Z | 2026-02-02T05:56:29Z |
| mal-2026-558 | Malicious code in n8n-zalo-fevox (npm) | 2026-01-28T06:59:38Z | 2026-02-02T05:56:29Z |
| mal-2026-557 | Malicious code in n8n-nodes-zalo-fevox (npm) | 2026-01-28T06:59:38Z | 2026-02-02T05:56:29Z |
| mal-2026-541 | Malicious code in pump.js (npm) | 2026-01-27T08:11:31Z | 2026-02-02T05:56:29Z |
| mal-2026-540 | Malicious code in n8n-nodes-xkwqpzrt-jmflhvbn-dsyocgxwmkelpt (npm) | 2026-01-27T07:57:56Z | 2026-02-02T05:56:29Z |
| mal-2026-539 | Malicious code in n8n-nodes-gg-udhasudsh-hgjkhg-official (npm) | 2026-01-27T07:57:56Z | 2026-02-02T05:56:29Z |
| mal-2026-538 | Malicious code in n8n-nodes-gasdhgfuy-rejerw-ytjsadx (npm) | 2026-01-27T07:57:56Z | 2026-02-02T05:56:29Z |
| mal-2026-537 | Malicious code in mysql2.js (npm) | 2026-01-27T08:11:31Z | 2026-02-02T05:56:29Z |
| mal-2026-536 | Malicious code in morgan.js (npm) | 2026-01-27T08:11:31Z | 2026-02-02T05:56:29Z |
| mal-2026-516 | Malicious code in overstock-login-layer (npm) | 2026-01-25T15:01:01Z | 2026-02-02T05:56:29Z |
| mal-2026-515 | Malicious code in overstock-jenkins (npm) | 2026-01-23T21:37:36Z | 2026-02-02T05:56:29Z |
| mal-2026-514 | Malicious code in overstock-health-express (npm) | 2026-01-23T21:00:46Z | 2026-02-02T05:56:29Z |
| mal-2026-513 | Malicious code in overstock-component-library-v3 (npm) | 2026-01-25T14:59:25Z | 2026-02-02T05:56:29Z |
| mal-2026-512 | Malicious code in overstock-component-library (npm) | 2026-01-25T15:11:29Z | 2026-02-02T05:56:29Z |
| mal-2026-511 | Malicious code in ostk-otel-autoconfig (npm) | 2026-01-25T14:59:26Z | 2026-02-02T05:56:29Z |
| mal-2026-599 | Malicious code in jwt-pack (npm) | 2026-01-29T04:14:08Z | 2026-02-02T05:56:28Z |
| mal-2026-592 | Malicious code in lvldragdrop (npm) | 2026-01-28T16:39:23Z | 2026-02-02T05:56:28Z |
| mal-2026-591 | Malicious code in kol7a (npm) | 2026-01-28T16:39:23Z | 2026-02-02T05:56:28Z |
| mal-2026-570 | Malicious code in lyatly-utils (npm) | 2026-01-28T07:58:35Z | 2026-02-02T05:56:28Z |
| mal-2026-552 | Malicious code in json-mapping-web (npm) | 2026-01-28T03:24:26Z | 2026-02-02T05:56:28Z |
| mal-2026-535 | Malicious code in knex.js (npm) | 2026-01-27T08:11:31Z | 2026-02-02T05:56:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-superset-2022-45438 | Apache Superset: Dashboard metadata information leak | 2025-02-05T07:28:48.307Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43721 | Apache Superset: Open Redirect Vulnerability | 2025-02-05T07:28:53.604Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43720 | Apache Superset: Improper rendering of user input | 2025-02-05T07:28:59.302Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43719 | Apache Superset: Cross Site Request Forgery (CSRF) on accept, request access API | 2025-02-05T07:29:05.011Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43718 | Apache Superset: Cross-Site Scripting vulnerability on upload forms | 2025-02-05T07:29:11.197Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-43717 | Apache Superset: Cross-Site Scripting on dashboards | 2025-02-05T07:29:16.011Z | 2025-11-06T13:25:46.476Z |
| bit-superset-2022-41703 | Apache Superset: SQL injection vulnerability in adhoc clauses | 2025-02-05T07:29:20.796Z | 2025-11-06T13:25:46.476Z |
| bit-sqlite-2025-6965 | Integer Truncation on SQLite | 2025-07-16T18:03:02.187Z | 2025-11-06T13:25:46.476Z |
| bit-sqlite-2023-7104 | SQLite SQLite3 make alltest sqlite3session.c sessionReadRecord heap-based overflow | 2024-03-06T11:05:41.196Z | 2025-11-06T13:25:46.476Z |
| bit-sqlite-2021-36690 | 2024-03-06T11:06:24.567Z | 2025-11-06T13:25:46.476Z | |
| bit-setuptools-2022-40897 | 2024-03-06T11:04:50.199Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2024-27282 | 2024-06-04T09:56:49.809Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2023-28756 | 2024-03-06T11:04:05.363Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2022-28739 | 2024-03-06T11:04:15.708Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2021-33621 | 2024-03-06T11:05:00.460Z | 2025-11-06T13:25:46.476Z | |
| bit-ruby-2020-5247 | HTTP Response Splitting in Puma | 2024-03-06T11:05:50.672Z | 2025-11-06T13:25:46.476Z |
| bit-redis-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:18:53.323Z | 2025-11-06T13:25:46.476Z |
| bit-redis-2025-46819 | Redis is vulnerable to DoS via specially crafted LUA scripts | 2025-10-08T08:51:28.594Z | 2025-11-06T13:25:46.476Z |
| bit-redis-2024-31228 | Denial-of-service due to unbounded pattern matching in Redis | 2024-10-09T16:41:13.129Z | 2025-11-06T13:25:46.476Z |
| bit-redis-2022-35977 | Integer overflow in certain command arguments can drive Redis to OOM panic | 2024-03-06T11:05:24.585Z | 2025-11-06T13:25:46.476Z |
| bit-python-2025-0938 | URL parser allowed square brackets in domain names | 2025-04-14T11:35:18.242Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-9287 | Virtual environment (venv) activation scripts don't quote paths | 2024-12-13T12:39:42.210Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-8088 | Infinite loop when iterating over zip archive entry names from zipfile.Path | 2025-04-14T11:34:52.441Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-7592 | Quadratic complexity parsing cookies with backslashes | 2024-09-16T12:03:55.576Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-6923 | Email header injection due to unquoted newlines | 2024-08-19T09:33:54.548Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-6232 | Regular-expression DoS when parsing TarFile headers | 2024-09-16T12:04:20.671Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-4032 | Incorrect IPv4 and IPv6 private ranges | 2024-06-20T11:17:24.961Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-11168 | Improper validation of IPv6 and IPvFuture addresses | 2024-12-10T11:25:45.323Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-0450 | Quoted zip-bomb protection for zipfile | 2024-12-13T12:41:10.011Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-0397 | Memory race condition in ssl.SSLContext certificate store methods | 2024-06-20T11:18:14.556Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-000040 | WordPress Plugin "Appointment and Event Booking Calendar for WordPress - Amelia" vulnerable to cross-site scripting | 2023-04-24T13:41+09:00 | 2024-05-28T16:59+09:00 |
| jvndb-2023-000039 | WordPress plugin "LIQUID SPEECH BALLOON" vulnerable to cross-site request forgery | 2023-04-19T14:24+09:00 | 2024-05-28T16:56+09:00 |
| jvndb-2024-000053 | Multiple vulnerabilities in Unifier and Unifier Cast | 2024-05-28T14:47+09:00 | 2024-05-28T14:47+09:00 |
| jvndb-2024-000052 | Multiple vulnerabilities in UTAU | 2024-05-28T14:23+09:00 | 2024-05-28T14:23+09:00 |
| jvndb-2023-001639 | Heap-based buffer overflow vulnerability in OMRON CX-Drive | 2023-04-25T14:31+09:00 | 2024-05-27T18:11+09:00 |
| jvndb-2023-000029 | Multiple vulnerabilities in Seiko Solutions SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210 | 2023-03-31T15:54+09:00 | 2024-05-27T17:08+09:00 |
| jvndb-2023-000059 | Multiple vulnerabilities in Inaba Denki Sangyo Wi-Fi AP UNIT | 2023-06-09T15:18+09:00 | 2024-05-27T16:38+09:00 |
| jvndb-2023-000043 | Multiple vulnerabilities in MicroEngine Mailform | 2023-05-10T13:57+09:00 | 2024-05-24T17:07+09:00 |
| jvndb-2023-000045 | WordPress Plugin "VK Blocks" and "VK All in One Expansion Unit" vulnerable to cross-site scripting | 2023-05-09T15:14+09:00 | 2024-05-24T17:05+09:00 |
| jvndb-2023-001926 | Cross-site Scripting Vulnerability in Hitachi Ops Center Analyzer | 2023-05-24T11:40+09:00 | 2024-05-24T17:01+09:00 |
| jvndb-2023-000047 | Beekeeper Studio vulnerable to code injection | 2023-05-12T16:42+09:00 | 2024-05-24T16:17+09:00 |
| jvndb-2023-000046 | SR-7100VN vulnerable to privilege escalation | 2023-05-09T13:58+09:00 | 2024-05-24T16:13+09:00 |
| jvndb-2023-000061 | Chatwork Desktop Application (Mac) vulnerable to code injection | 2023-06-13T13:38+09:00 | 2024-05-24T16:02+09:00 |
| jvndb-2023-002055 | Multiple vulnerabilities in KbDevice digital video recorders | 2023-06-07T11:52+09:00 | 2024-05-24T15:57+09:00 |
| jvndb-2023-000049 | Multiple vulnerabilities in Cybozu Garoon | 2023-05-15T14:29+09:00 | 2024-05-24T15:26+09:00 |
| jvndb-2024-000051 | Splunk Config Explorer vulnerable to cross-site scripting | 2024-05-24T13:50+09:00 | 2024-05-24T13:50+09:00 |
| jvndb-2024-000050 | WordPress Plugin "WP Booking" vulnerable to cross-site scripting | 2024-05-24T13:41+09:00 | 2024-05-24T13:41+09:00 |
| jvndb-2023-001534 | Security Issues in FINS protocol | 2023-04-18T13:58+09:00 | 2024-05-23T17:35+09:00 |
| jvndb-2023-000057 | "Jiyu Kukan Toku-Toku coupon" App vulnerable to improper server certificate verification | 2023-06-01T14:51+09:00 | 2024-05-23T17:19+09:00 |
| jvndb-2023-000026 | Qrio Smart Lock Q-SL2 vulnerable to authentication bypass by capture-replay | 2023-05-18T14:13+09:00 | 2024-05-23T17:18+09:00 |
| jvndb-2023-000051 | Multiple vulnerabilities in T&D and ESPEC MIC data logger products | 2023-05-19T15:21+09:00 | 2024-05-23T17:03+09:00 |
| jvndb-2023-000041 | LINE WORKS Drive Explorer vulnerable to code injection | 2023-05-08T15:16+09:00 | 2024-05-23T17:03+09:00 |
| jvndb-2023-002111 | Printer Driver Packager NX creates driver installation packages without modification detection | 2023-06-15T16:06+09:00 | 2024-05-23T15:45+09:00 |
| jvndb-2023-002072 | Multiple vulnerabilities in Fuji Electric products | 2023-06-09T12:23+09:00 | 2024-05-23T15:33+09:00 |
| jvndb-2023-002100 | Security updates for multiple Trend Micro products for enterprises (June 2023) | 2023-06-14T14:47+09:00 | 2024-05-23T15:23+09:00 |
| jvndb-2023-000066 | Multiple vulnerabilities in Aterm series | 2023-06-27T15:12+09:00 | 2024-05-22T18:16+09:00 |
| jvndb-2023-003767 | Multiple vulnerabilities in multiple FURUNO SYSTEMS wireless LAN access point devices in ST(Standalone) mode | 2023-10-03T14:26+09:00 | 2024-05-22T18:01+09:00 |
| jvndb-2023-000101 | web2py vulnerable to OS command injection | 2023-10-16T16:11+09:00 | 2024-05-22T17:58+09:00 |
| jvndb-2023-000069 | Multiple vulnerabilities in SoftEther VPN and PacketiX VPN | 2023-07-03T15:07+09:00 | 2024-05-22T17:47+09:00 |
| jvndb-2023-000096 | Improper restriction of XML external entity references (XXE) in FD Application | 2023-10-02T12:36+09:00 | 2024-05-22T15:37+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-05331 | Complete Online Beauty Parlor Management System /search-invoices.php文件SQL注入漏洞 | 2025-12-25 | 2026-01-21 |
| cnvd-2026-05330 | Complete Online Beauty Parlor Management System /view-appointment.php文件SQL注入漏洞 | 2025-12-25 | 2026-01-21 |
| cnvd-2026-05329 | Complete Online Beauty Parlor Management System /search-invoices.php文件跨站脚本漏洞 | 2026-01-14 | 2026-01-21 |
| cnvd-2026-05174 | Huawei Smart Screen授权问题漏洞 | 2023-12-08 | 2026-01-21 |
| cnvd-2026-05173 | Huawei NetEngine AR617VW访问控制不当漏洞 | 2023-12-22 | 2026-01-21 |
| cnvd-2026-05172 | Huawei NetEngine AR617VW命令注入漏洞 | 2023-12-22 | 2026-01-21 |
| cnvd-2026-05171 | Huawei HarmonyOS和EMUI device authentication模块越界访问漏洞 | 2024-01-23 | 2026-01-21 |
| cnvd-2026-05170 | Huawei HarmonyOS和EMUI WMS模块权限校验不严格漏洞 | 2024-01-23 | 2026-01-21 |
| cnvd-2026-05169 | Huawei HarmonyOS和EMUI AMS模块存在未明漏洞 | 2024-01-23 | 2026-01-21 |
| cnvd-2026-05168 | Huawei EMUI存在未明漏洞(CNVD-2026-05168) | 2024-04-11 | 2026-01-21 |
| cnvd-2026-05167 | Huawei PC Manager访问控制不当漏洞 | 2024-05-30 | 2026-01-21 |
| cnvd-2026-05166 | Huawei HarmonyOS和EMUI NearLink模块权限验证不足漏洞 | 2024-06-18 | 2026-01-21 |
| cnvd-2026-05165 | Huawei Technologies存在未明漏洞 | 2024-07-25 | 2026-01-21 |
| cnvd-2026-05164 | Huawei HarmonyOS和EMUI account模块存在未明漏洞 | 2024-08-12 | 2026-01-21 |
| cnvd-2026-05163 | Huawei HarmonyOS和EMUI Camera驱动模块访问权限漏洞 | 2024-09-10 | 2026-01-21 |
| cnvd-2026-04817 | 用友网络科技股份有限公司U8 Cloud存在命令执行漏洞(CNVD-C-2026-26052) | 2026-01-04 | 2026-01-21 |
| cnvd-2026-04806 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在命令执行漏洞(CNVD-C-2025-1018960) | 2025-12-10 | 2026-01-21 |
| cnvd-2026-04470 | 北京神州视翰科技有限公司远程医疗综合服务平台存在SQL注入漏洞(CNVD-C-2026-35542) | 2026-01-08 | 2026-01-21 |
| cnvd-2026-04469 | 北京神州视翰科技有限公司远程医疗综合服务平台存在SQL注入漏洞(CNVD-C-2025-987341) | 2025-12-08 | 2026-01-21 |
| cnvd-2026-04468 | 北京神州视翰科技有限公司远程医疗综合服务平台存在SQL注入漏洞(CNVD-C-2025-980402) | 2025-12-04 | 2026-01-21 |
| cnvd-2026-04457 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2026-33516) | 2026-01-07 | 2026-01-21 |
| cnvd-2026-04456 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-1206330) | 2025-12-29 | 2026-01-21 |
| cnvd-2026-04455 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-1203509) | 2025-12-27 | 2026-01-21 |
| cnvd-2026-04454 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-1134083) | 2025-12-22 | 2026-01-21 |
| cnvd-2026-04452 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-986300) | 2025-12-07 | 2026-01-21 |
| cnvd-2026-04451 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-986298) | 2025-12-07 | 2026-01-21 |
| cnvd-2026-04449 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976472) | 2025-12-03 | 2026-01-21 |
| cnvd-2026-04448 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976469) | 2025-12-03 | 2026-01-21 |
| cnvd-2026-04447 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976466) | 2025-12-03 | 2026-01-21 |
| cnvd-2026-04446 | 北京神州视翰科技有限公司多媒体综合业务显示系统存在SQL注入漏洞(CNVD-C-2025-976462) | 2025-12-03 | 2026-01-21 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-11988 | Уязвимость компонента netfilter ядра операционной системы Linux, позволяющая нарушителю п… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11984 | Уязвимость утилиты для обработки логов Syslog-ng, связанная с ошибками процедуры подтверж… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11982 | Уязвимость компонента KVM ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11981 | Уязвимость компонента proton-pack.c ядра операционной системы Linux, позволяющая нарушите… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11978 | Уязвимость компонента virtiofs ядра операционной системы Linux, позволяющая нарушителю вы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11973 | Уязвимость компонента inftlcore.c ядра операционной системы Linux, позволяющая нарушителю… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11972 | Уязвимость компонента x86/mm ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11970 | Уязвимость функции output_userspace() компонента net/openvswitch/actions.c ядра операцион… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11968 | Уязвимость сервера службы каталогов 389 Directory Server, позволяющая нарушителю вызвать … | 28.09.2025 | 16.02.2026 |
| bdu:2025-11960 | Уязвимость компонента fs/read_write.c ядра операционной системы Linux, позволяющая наруши… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11959 | Уязвимость расширения XFIXES реализации протокола Wayland для X.Org XWaylan и реализации … | 28.09.2025 | 16.02.2026 |
| bdu:2025-11957 | Уязвимость сервера службы каталогов 389 Directory Server, позволяющая нарушителю вызвать … | 28.09.2025 | 16.02.2026 |
| bdu:2025-11956 | Уязвимость компонента mediatek ядра операционной системы Linux, позволяющая нарушителю вы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11952 | Уязвимость компонента platform/x86/amd/pmc ядра операционной системы Linux, позволяющая н… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11948 | Уязвимость компонента md/md-bitmap ядра операционной системы Linux, позволяющая нарушител… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11940 | Уязвимость компонента netfilter ядра операционной системы Linux, позволяющая нарушителю в… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11935 | Уязвимость компонента tls_main.c ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-11934 | Уязвимость компонента openvswitch ядра операционной системы Linux, позволяющая нарушителю… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11933 | Уязвимость компонента sch_codel.c ядра операционной системы Linux, позволяющая нарушителю… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11932 | Уязвимость компонента jfs_dmap.c ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-11929 | Уязвимость компонентов arm64 ядра операционной системы Linux, позволяющая нарушителю нару… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11928 | Уязвимость компонента bpf_jit_comp.c ядра операционной системы Linux, позволяющая нарушит… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11927 | Уязвимость компонента fs/orangefs/inode.c ядра операционной системы Linux, позволяющая на… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11925 | Уязвимость ядра операционной системы Linux, связанная с целочисленной потерей значимости,… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11924 | Уязвимость компонента init.c ядра операционной системы Linux, позволяющая нарушителю оказ… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11911 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | 28.09.2025 | 16.02.2026 |
| bdu:2025-11908 | Уязвимость компонента index.c ядра операционной системы Linux, позволяющая нарушителю выз… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11906 | Уязвимость компонента sclp_con.c ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-11905 | Уязвимость функции makeRoom() компонента stream.c библиотеки для кодирования и декодирова… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11904 | Уязвимость функции avifImageRGBToYUV компонента reformat.c библиотеки для кодирования и д… | 28.09.2025 | 16.02.2026 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0856 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0855 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0854 | Vulnérabilité dans les produits Moxa | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0853 | Multiples vulnérabilités dans GitLab | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0852 | Vulnérabilité dans Tenable Security Center | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0851 | Vulnérabilité dans Python | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0850 | Multiples vulnérabilités dans Google Chrome | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0847 | Vulnérabilité dans les produits Liferay | 2025-10-06T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0849 | Multiples vulnérabilités dans les produits Elastic | 2025-10-07T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0848 | Vulnérabilité dans OpenSSH | 2025-10-06T00:00:00.000000 | 2025-10-07T00:00:00.000000 |
| certfr-2025-avi-0846 | Multiples vulnérabilités dans les produits Qnap | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-avi-0845 | Multiples vulnérabilités dans Zabbix | 2025-10-06T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-avi-0844 | Multiples vulnérabilités dans IBM Sterling Connect | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0843 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0842 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0841 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0840 | Multiples vulnérabilités dans Zabbix | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0839 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-03T00:00:00.000000 | 2025-10-03T00:00:00.000000 |
| certfr-2025-avi-0838 | Multiples vulnérabilités dans les produits Splunk | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| certfr-2025-avi-0837 | Multiples vulnérabilités dans Google Chrome | 2025-10-02T00:00:00.000000 | 2025-10-02T00:00:00.000000 |
| certfr-2025-avi-0836 | Multiples vulnérabilités dans les produits Tenable | 2025-10-01T00:00:00.000000 | 2025-10-01T00:00:00.000000 |
| certfr-2025-avi-0835 | Multiples vulnérabilités dans OpenSSL | 2025-10-01T00:00:00.000000 | 2025-10-01T00:00:00.000000 |
| certfr-2025-avi-0834 | Multiples vulnérabilités dans Mozilla Firefox | 2025-10-01T00:00:00.000000 | 2025-10-01T00:00:00.000000 |
| certfr-2025-avi-0833 | Multiples vulnérabilités dans Joomla! | 2025-10-01T00:00:00.000000 | 2025-10-01T00:00:00.000000 |
| certfr-2025-avi-0832 | Multiples vulnérabilités dans les produits VMware | 2025-09-30T00:00:00.000000 | 2025-09-30T00:00:00.000000 |
| certfr-2025-avi-0831 | Vulnérabilité dans les produits Apple | 2025-09-30T00:00:00.000000 | 2025-09-30T00:00:00.000000 |
| certfr-2025-avi-0830 | Vulnérabilité dans Tenable Patch Management | 2025-09-29T00:00:00.000000 | 2025-09-29T00:00:00.000000 |
| certfr-2025-avi-0829 | Vulnérabilité dans Apereo CAS | 2025-09-29T00:00:00.000000 | 2025-09-29T00:00:00.000000 |
| certfr-2025-avi-0828 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-09-26T00:00:00.000000 | 2025-09-26T00:00:00.000000 |
| certfr-2025-avi-0827 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-09-26T00:00:00.000000 | 2025-09-26T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-862 | Heap-use-after-free in g_datalist_get_flags | 2023-09-16T14:01:07.280790Z | 2025-01-10T05:49:31.753574Z |
| osv-2024-1066 | Heap-buffer-overflow in StrLen | 2024-09-13T00:14:35.159638Z | 2025-01-10T05:47:49.595046Z |
| osv-2024-251 | Heap-use-after-free in gx_device_forward_finalize | 2024-04-12T00:02:31.478145Z | 2025-01-10T05:30:43.786965Z |
| osv-2024-379 | UNKNOWN READ in H5SL_first | 2024-04-30T00:12:09.539697Z | 2025-01-10T05:30:29.297578Z |
| osv-2024-853 | UNKNOWN READ in chunk_free_object | 2024-08-16T00:04:58.897243Z | 2025-01-10T05:30:16.360095Z |
| osv-2024-1230 | Heap-buffer-overflow in extract_rtpmap | 2024-10-19T00:00:26.792754Z | 2025-01-10T05:21:03.406469Z |
| osv-2024-460 | UNKNOWN READ in glslang::TInfoSinkBase::location | 2024-05-11T00:04:46.149516Z | 2025-01-10T05:21:00.966877Z |
| osv-2024-978 | Stack-buffer-overflow in narrow_conv_backprop | 2024-08-16T00:15:00.390591Z | 2025-01-10T05:19:36.120081Z |
| osv-2024-832 | UNKNOWN READ in Pistache::Http::Header::Expect::parseRaw | 2024-08-16T00:03:13.834235Z | 2025-01-10T05:18:27.558670Z |
| osv-2023-1170 | UNKNOWN READ in loader_log | 2023-11-16T13:02:54.951826Z | 2025-01-10T05:15:17.036441Z |
| osv-2024-1090 | UNKNOWN READ in ggml_free | 2024-09-19T00:00:17.390184Z | 2025-01-10T05:12:48.974830Z |
| osv-2024-1210 | Heap-buffer-overflow in parse_mixed_content | 2024-10-11T00:15:50.054920Z | 2025-01-10T05:11:11.351763Z |
| osv-2024-1206 | Heap-buffer-overflow in extract_sendrecv_mode | 2024-10-11T00:13:47.835312Z | 2025-01-10T05:11:09.130549Z |
| osv-2023-1370 | Heap-buffer-overflow in process_one_read | 2023-12-29T00:14:11.001809Z | 2025-01-10T05:09:49.377670Z |
| osv-2024-1200 | UNKNOWN READ in eat_line | 2024-10-11T00:02:19.537501Z | 2025-01-10T05:09:26.885831Z |
| osv-2023-1205 | Heap-buffer-overflow in isvcd_populate_res_prms | 2023-11-24T13:00:14.783667Z | 2025-01-10T05:07:48.976928Z |
| osv-2024-1053 | Heap-buffer-overflow in gguf_get_tensor_offset | 2024-09-13T00:00:16.432562Z | 2025-01-10T05:05:50.790792Z |
| osv-2024-18 | Heap-use-after-free in QPDF::read_xref | 2024-01-19T00:01:09.084916Z | 2025-01-10T05:03:37.159682Z |
| osv-2024-592 | UNKNOWN READ in spvtools::disassemble::InstructionDisassembler::EmitInstruction | 2024-06-27T00:03:46.520119Z | 2025-01-10T05:00:09.280885Z |
| osv-2022-738 | Security exception in DatatypeFuzzer.fuzzerTestOneInput | 2022-08-19T00:00:35.294543Z | 2025-01-10T04:55:45.450144Z |
| osv-2024-817 | Use-of-uninitialized-value in pcapint_filter_with_aux_data | 2024-08-16T00:02:39.185747Z | 2025-01-08T14:19:40.985698Z |
| osv-2025-17 | Heap-buffer-overflow in cv::PngDecoder::readHeader | 2025-01-08T00:14:02.009521Z | 2025-01-08T00:14:02.009997Z |
| osv-2025-16 | UNKNOWN READ in png_free_data | 2025-01-08T00:13:45.160139Z | 2025-01-08T00:13:45.160518Z |
| osv-2025-13 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-01-07T00:15:11.722974Z | 2025-01-07T00:15:11.723402Z |
| osv-2025-7 | Heap-buffer-overflow in oatpp::json::Utils::escapeUtf8Char | 2025-01-07T00:03:42.053605Z | 2025-01-07T00:03:42.054132Z |
| osv-2025-6 | Heap-buffer-overflow in next_marker | 2025-01-06T00:16:10.036783Z | 2025-01-06T00:16:10.037219Z |
| osv-2025-4 | Heap-buffer-overflow in ___interceptor_pthread_create | 2025-01-05T00:17:02.263743Z | 2025-01-05T00:17:02.264158Z |
| osv-2025-3 | Heap-buffer-overflow in avifImageAddUUIDProperty | 2025-01-05T00:10:22.871565Z | 2025-01-05T00:10:22.872062Z |
| osv-2025-1 | Segv on unknown address in avif_fuzztest_properties@PropertiesAvifFuzzTest.PropsValid | 2025-01-04T00:00:30.888504Z | 2025-01-04T00:00:30.889140Z |
| osv-2024-1417 | Heap-buffer-overflow in cv::PngDecoder::read_from_io | 2025-01-02T00:15:00.246767Z | 2025-01-02T00:15:00.247102Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2021-0110 | Multiple Vulnerabilities in Wasmtime | 2021-09-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0109 | Process crashes when the cell used as DepGroup is not alive | 2021-07-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0108 | Remote memory exhaustion in ckb | 2021-07-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0107 | Miner fails to get block template when a cell used as a cell dep has been destroyed. | 2021-07-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0103 | Partial read is incorrect in molecule | 2021-07-30T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0100 | Miscomputed results when using AVX2 backend | 2021-09-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0098 | Read buffer overruns processing ASN.1 strings | 2021-08-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0097 | SM2 Decryption Buffer Overflow | 2021-08-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0095 | `mopa` is technically unsound | 2021-06-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0094 | Window can read out of bounds if Read instance returns more bytes than buffer size | 2021-02-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0092 | Deserialization functions pass uninitialized memory to user-provided Read | 2021-01-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0091 | Reading on uninitialized buffer may cause UB ( `gfx_auxil::read_spirv()` ) | 2021-01-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0090 | Reading on uninitialized memory may cause UB ( `util::read_spv()` ) | 2021-01-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0089 | Optional `Deserialize` implementations lacking validation | 2021-01-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0088 | `Read` on uninitialized memory may cause UB (fn preamble_skipcount()) | 2021-01-05T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0086 | `Read` on uninitialized buffer may cause UB ( `read_entry()` ) | 2021-01-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0085 | 'Read' on uninitialized memory may cause UB | 2021-01-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0084 | `Read` on uninitialized buffer can cause UB (impl of `ReadKVExt`) | 2021-01-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0083 | QueryInterface should call AddRef before returning pointer | 2021-01-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0081 | Potential request smuggling capabilities due to lack of input validation | 2021-06-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0080 | Links in archive can create arbitrary directories | 2021-07-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0077 | `better-macro` has deliberate RCE to prove a point | 2021-07-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0076 | libsecp256k1 allows overflowing signatures | 2021-07-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0075 | Flaw in `FieldVar::mul_by_inverse` allows unsound R1CS constraint systems | 2021-07-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0074 | Incorrect handling of embedded SVG and MathML leads to mutation XSS | 2021-07-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0073 | Conversion from `prost_types::Timestamp` to `SystemTime` can cause an overflow and panic | 2021-07-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0072 | Task dropped in wrong thread when aborting `LocalSet` task | 2021-07-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0071 | `grep-cli` may run arbitrary executables on Windows | 2021-06-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0070 | VecStorage Deserialize Allows Violation of Length Invariant | 2021-06-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0068 | Soundness issue in `iced-x86` versions <= 1.10.3 | 2021-05-19T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:14743 | Important: thunderbird security update | 2025-08-27T00:00:00Z | 2025-08-28T07:17:59Z |
| alsa-2025:14750 | Moderate: fence-agents security update | 2025-08-27T00:00:00Z | 2025-08-28T07:14:58Z |
| alsa-2025:14592 | Important: aide security update | 2025-08-26T00:00:00Z | 2025-08-27T13:34:06Z |
| alsa-2025:14420 | Important: kernel security update | 2025-08-25T00:00:00Z | 2025-08-27T12:00:58Z |
| alsa-2025:14416 | Important: firefox security update | 2025-08-25T00:00:00Z | 2025-08-27T11:56:36Z |
| alsa-2025:14417 | Important: firefox security update | 2025-08-25T00:00:00Z | 2025-08-27T11:55:25Z |
| alsa-2025:14439 | Moderate: kernel-rt security update | 2025-08-25T00:00:00Z | 2025-08-27T11:54:32Z |
| alsa-2025:14442 | Important: firefox security update | 2025-08-25T00:00:00Z | 2025-08-27T11:52:34Z |
| alsa-2025:14553 | Moderate: python-cryptography security update | 2025-08-26T00:00:00Z | 2025-08-27T11:50:33Z |
| alsa-2025:14625 | Moderate: mod_http2 security update | 2025-08-26T00:00:00Z | 2025-08-27T11:49:37Z |
| alsa-2025:14573 | Important: aide security update | 2025-08-26T00:00:00Z | 2025-08-27T11:47:08Z |
| alsa-2025:14493 | Important: aide security update | 2025-08-25T00:00:00Z | 2025-08-27T11:45:24Z |
| alsa-2025:14181 | Important: tomcat security update | 2025-08-20T00:00:00Z | 2025-08-22T11:25:23Z |
| alsa-2025:14178 | Important: tomcat9 security update | 2025-08-20T00:00:00Z | 2025-08-22T10:20:42Z |
| alsa-2025:13962 | Important: kernel security update | 2025-08-18T00:00:00Z | 2025-08-22T07:58:21Z |
| alsa-2025:14177 | Important: tomcat security update | 2025-08-20T00:00:00Z | 2025-08-21T10:09:15Z |
| alsa-2025:14135 | Important: libarchive security update | 2025-08-20T00:00:00Z | 2025-08-21T05:47:20Z |
| alsa-2025:14130 | Important: libarchive security update | 2025-08-20T00:00:00Z | 2025-08-20T14:02:20Z |
| alsa-2025:14137 | Important: libarchive security update | 2025-08-20T00:00:00Z | 2025-08-20T14:01:11Z |
| alsa-2025:14126 | Important: pki-deps:10.6 security update | 2025-08-20T00:00:00Z | 2025-08-20T12:28:21Z |
| alsa-2025:14101 | Important: mingw-sqlite security update | 2025-08-19T00:00:00Z | 2025-08-20T12:24:33Z |
| alsa-2025:14075 | Moderate: xterm security update | 2025-08-19T00:00:00Z | 2025-08-19T10:24:09Z |
| alsa-2025:13940 | Important: go-toolset:rhel8 security update | 2025-08-18T00:00:00Z | 2025-08-18T11:27:15Z |
| alsa-2025:13961 | Moderate: kernel-rt security update | 2025-08-18T00:00:00Z | 2025-08-18T11:25:42Z |
| alsa-2025:13960 | Important: kernel security update | 2025-08-18T00:00:00Z | 2025-08-18T11:23:07Z |
| alsa-2025:13944 | Important: openjpeg2 security update | 2025-08-18T00:00:00Z | 2025-08-18T11:07:28Z |
| alsa-2025:13935 | Important: golang security update | 2025-08-18T00:00:00Z | 2025-08-18T11:04:57Z |
| alsa-2025:13602 | Moderate: kernel security update | 2025-08-11T00:00:00Z | 2025-08-15T10:34:10Z |
| alsa-2025:13674 | Important: toolbox security update | 2025-08-12T00:00:00Z | 2025-08-14T14:36:21Z |
| alsa-2025:13780 | Important: webkit2gtk3 security update | 2025-08-13T00:00:00Z | 2025-08-14T14:33:57Z |