Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-3067 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
HummerRisk Archive Extraction CommandUtils.java extrac… |
n/a |
HummerRisk |
2026-02-24T03:32:07.867Z | 2026-02-24T18:47:21.803Z |
| CVE-2026-27026 |
6.9 (4.0)
|
pypdf possibly has long runtimes for malformed FlateDe… |
py-pdf |
pypdf |
2026-02-20T21:12:33.537Z | 2026-02-24T18:47:02.304Z |
| CVE-2025-69328 |
8.8 (3.1)
|
WordPress Booking and Rental Manager plugin <= 2.5.9 -… |
magepeopleteam |
Booking and Rental Manager |
2026-02-20T15:46:49.714Z | 2026-02-24T18:46:52.734Z |
| CVE-2026-27111 |
5.3 (4.0)
|
Kargo has Missing Authorization Vulnerabilities in App… |
akuity |
kargo |
2026-02-20T21:17:07.383Z | 2026-02-24T18:46:03.564Z |
| CVE-2025-69329 |
9.8 (3.1)
|
WordPress Prestige theme < 1.4.1 - PHP Object Injectio… |
Jthemes |
Prestige |
2026-02-20T15:46:49.874Z | 2026-02-24T18:45:58.923Z |
| CVE-2025-1787 |
5.8 (4.0)
|
Local admin could to leak information from the Ge… |
Genetec Inc. |
Genetec Update Service |
2026-02-24T18:44:36.705Z | 2026-02-24T18:44:36.705Z |
| CVE-2026-27112 |
9.4 (4.0)
|
Kargo has an Authorization Bypass Vulnerability in Bat… |
akuity |
kargo |
2026-02-20T21:22:56.719Z | 2026-02-24T18:43:40.423Z |
| CVE-2026-24241 |
4.3 (3.1)
|
NVIDIA Delegated Licensing Service for all applia… |
NVIDIA |
DLS component of NVIDIA License System |
2026-02-24T18:42:56.703Z | 2026-02-24T18:42:56.703Z |
| CVE-2026-27118 |
5.3 (4.0)
|
Cache poisoning in @sveltejs/adapter-vercel |
sveltejs |
kit |
2026-02-20T21:24:55.577Z | 2026-02-24T18:42:11.028Z |
| CVE-2025-33181 |
7.3 (3.1)
|
NVIDIA Cumulus Linux and NVOS products contain a … |
NVIDIA |
Cumulus Linux GA |
2026-02-24T18:42:04.490Z | 2026-02-24T18:42:04.490Z |
| CVE-2025-33180 |
8 (3.1)
|
NVIDIA Cumulus Linux and NVOS products contain a … |
NVIDIA |
Cumulus Linux GA |
2026-02-24T18:41:48.632Z | 2026-02-24T18:41:48.632Z |
| CVE-2025-33179 |
8 (3.1)
|
NVIDIA Cumulus Linux and NVOS products contain a … |
NVIDIA |
Cumulus Linux GA |
2026-02-24T18:41:32.821Z | 2026-02-24T18:41:32.821Z |
| CVE-2026-27120 |
6.1 (3.1)
|
Leaf-kit html escaping does not work on characters tha… |
vapor |
leaf-kit |
2026-02-20T21:27:09.642Z | 2026-02-24T18:41:10.070Z |
| CVE-2026-26342 |
8.7 (4.0)
|
Tattile Smart+ / Vega / Basic <= 1.181.5 Insufficient … |
Tattile s.r.l. |
Smart+ |
2026-02-24T18:41:09.935Z | 2026-02-24T18:41:09.935Z |
| CVE-2026-26341 |
9.3 (4.0)
|
Tattile Smart+ / Vega / Basic <= 1.181.5 Default Credentials |
Tattile s.r.l. |
Smart+ |
2026-02-24T18:40:54.212Z | 2026-02-24T18:40:54.212Z |
| CVE-2026-26340 |
8.7 (4.0)
|
Tattile Smart+ / Vega / Basic <= 1.181.5 Unauthenticat… |
Tattile s.r.l. |
Smart+ |
2026-02-24T18:40:35.393Z | 2026-02-24T18:40:35.393Z |
| CVE-2026-27025 |
6.9 (4.0)
|
pypdf has possible long runtimes/large memory usage fo… |
py-pdf |
pypdf |
2026-02-20T21:11:20.441Z | 2026-02-24T18:40:02.655Z |
| CVE-2026-3105 |
7.6 (3.1)
|
SQL Injection in Contact Activity API Sorting |
Mautic |
Mautic |
2026-02-24T18:39:03.352Z | 2026-02-24T18:39:03.352Z |
| CVE-2026-22354 |
8.8 (3.1)
|
WordPress Woocommerce Category Banner Management plugi… |
Dotstore |
Woocommerce Category Banner Management |
2026-02-20T15:47:01.099Z | 2026-02-24T18:38:59.216Z |
| CVE-2026-22365 |
9.8 (3.1)
|
WordPress Soleng theme <= 1.0.5 - Local File Inclusion… |
axiomthemes |
Soleng |
2026-02-20T15:47:02.847Z | 2026-02-24T18:37:24.978Z |
| CVE-2026-22381 |
8.1 (3.1)
|
WordPress PawFriends - Pet Shop and Veterinary WordPre… |
Mikado-Themes |
PawFriends - Pet Shop and Veterinary WordPress Theme |
2026-02-20T15:47:06.708Z | 2026-02-24T18:37:13.349Z |
| CVE-2026-3068 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Document Management System deluser.php sq… |
itsourcecode |
Document Management System |
2026-02-24T03:32:10.667Z | 2026-02-24T18:34:43.481Z |
| CVE-2026-27024 |
6.9 (4.0)
|
pypdf has a possible infinite loop when processing Tre… |
py-pdf |
pypdf |
2026-02-20T21:10:07.864Z | 2026-02-24T18:34:30.680Z |
| CVE-2026-27022 |
6.5 (3.1)
|
RediSearch Query Injection in @langchain/langgraph-che… |
langchain-ai |
langgraphjs |
2026-02-20T21:06:53.773Z | 2026-02-24T18:33:25.127Z |
| CVE-2026-27020 |
5.3 (4.0)
|
Photobooth has a XSS vulnerability in user input |
lukas12000 |
photobooth |
2026-02-20T21:03:42.431Z | 2026-02-24T18:31:33.136Z |
| CVE-2026-27190 |
8.1 (3.1)
|
Deno has a Command Injection via Incomplete shell meta… |
denoland |
deno |
2026-02-20T20:52:11.468Z | 2026-02-24T18:30:43.652Z |
| CVE-2026-27470 |
8.8 (3.1)
|
ZoneMinder: Second-Order SQL Injection in `getNearEven… |
ZoneMinder |
zoneminder |
2026-02-21T08:05:01.073Z | 2026-02-24T18:29:37.068Z |
| CVE-2026-2798 |
8.8 (3.1)
|
Use-after-free in the DOM: Core & HTML component |
Mozilla |
Firefox |
2026-02-24T13:33:28.034Z | 2026-02-24T18:25:31.688Z |
| CVE-2026-27479 |
7.7 (3.1)
|
Wallos: SSRF via Redirect Bypass in Logo/Icon URL Fetch |
ellite |
Wallos |
2026-02-21T08:15:19.953Z | 2026-02-24T18:24:31.376Z |
| CVE-2026-27487 |
7.6 (3.1)
|
OpenClaw: Prevent shell injection in macOS keychain cr… |
openclaw |
openclaw |
2026-02-21T09:35:28.935Z | 2026-02-24T18:21:54.882Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2764 | JIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability affe… | 2026-02-24T14:16:24.737 | 2026-02-24T18:29:34.530 |
| fkie_cve-2026-2763 | Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefo… | 2026-02-24T14:16:24.620 | 2026-02-24T18:29:34.430 |
| fkie_cve-2026-2762 | Integer overflow in the JavaScript: Standard Library component. This vulnerability affects Firefox … | 2026-02-24T14:16:24.480 | 2026-02-24T18:29:34.337 |
| fkie_cve-2026-2761 | Sandbox escape in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Fire… | 2026-02-24T14:16:24.370 | 2026-02-24T18:29:34.237 |
| fkie_cve-2026-2760 | Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vuln… | 2026-02-24T14:16:24.257 | 2026-02-24T18:29:34.133 |
| fkie_cve-2026-2759 | Incorrect boundary conditions in the Graphics: ImageLib component. This vulnerability affects Firef… | 2026-02-24T14:16:24.147 | 2026-02-24T18:29:34.037 |
| fkie_cve-2026-2758 | Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148, Firefox E… | 2026-02-24T14:16:24.037 | 2026-02-24T18:29:33.937 |
| fkie_cve-2026-2757 | Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability affects Fire… | 2026-02-24T14:16:23.927 | 2026-02-24T18:29:33.833 |
| fkie_cve-2026-27468 | Mastodon is a free, open-source social network server based on ActivityPub. FASP registration requi… | 2026-02-24T18:29:33.660 | 2026-02-24T18:29:33.660 |
| fkie_cve-2026-27156 | NiceGUI is a Python-based UI framework. Prior to version 3.8.0, several NiceGUI APIs that execute m… | 2026-02-24T18:29:33.490 | 2026-02-24T18:29:33.490 |
| fkie_cve-2026-26222 | Altec DocLink (now maintained by Beyond Limits Inc.) version 4.0.336.0 exposes insecure .NET Remoti… | 2026-02-24T18:29:33.293 | 2026-02-24T18:29:33.293 |
| fkie_cve-2026-25603 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Lin… | 2026-02-24T18:29:33.167 | 2026-02-24T18:29:33.167 |
| fkie_cve-2025-62512 | Piwigo is an open source photo gallery application for the web. In version 15.5.0 and likely earlie… | 2026-02-24T18:29:32.930 | 2026-02-24T18:29:32.930 |
| fkie_cve-2025-14963 | A vulnerability identified in the Trellix HX Agent driver file fekern.sys allowed a threat actor w… | 2026-02-24T18:29:32.613 | 2026-02-24T18:29:32.613 |
| fkie_cve-2024-58041 | Smolder versions through 1.51 for Perl uses insecure rand() function for cryptographic functions. … | 2026-02-24T00:16:17.820 | 2026-02-24T18:29:32.403 |
| fkie_cve-2026-2984 | A vulnerability was identified in SourceCodester Student Result Management System 1.0. This affects… | 2026-02-23T11:16:39.443 | 2026-02-24T18:29:16.143 |
| fkie_cve-2021-42306 | An information disclosure vulnerability manifests when a user or an application uploads unprotected… | 2021-11-24T01:15:08.363 | 2026-02-24T18:28:18.767 |
| fkie_cve-2025-54158 | Missing authentication for critical function vulnerability in BeeDrive in Synology BeeDrive for des… | 2025-12-04T16:16:20.923 | 2026-02-24T18:27:57.053 |
| fkie_cve-2021-41372 | A Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerability exists when Power … | 2021-11-10T01:19:30.517 | 2026-02-24T18:27:23.977 |
| fkie_cve-2021-40032 | The bone voice ID TA has a vulnerability in information management,Successful exploitation of this … | 2022-01-10T14:10:22.200 | 2026-02-24T18:25:53.837 |
| fkie_cve-2021-40027 | The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation o… | 2022-01-10T14:10:21.810 | 2026-02-24T18:25:53.303 |
| fkie_cve-2021-40014 | The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitati… | 2022-01-10T14:10:21.463 | 2026-02-24T18:25:52.137 |
| fkie_cve-2021-40006 | Vulnerability of design defects in the security algorithm component. Successful exploitation of thi… | 2022-01-10T14:10:21.260 | 2026-02-24T18:25:51.007 |
| fkie_cve-2025-59472 | A denial of service vulnerability exists in Next.js versions with Partial Prerendering (PPR) enable… | 2026-01-26T22:15:53.027 | 2026-02-24T18:24:35.830 |
| fkie_cve-2021-39298 | A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attack… | 2022-02-16T17:15:10.860 | 2026-02-24T18:23:48.730 |
| fkie_cve-2021-38180 | SAP Business One - version 10.0, allows an attacker to inject formulas when exporting data to Excel… | 2021-10-12T15:15:08.720 | 2026-02-24T18:22:14.410 |
| fkie_cve-2021-38163 | SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an a… | 2021-09-14T12:15:10.890 | 2026-02-24T18:22:12.550 |
| fkie_cve-2021-38162 | SAP Web Dispatcher versions - 7.49, 7.53, 7.77, 7.81, KRNL64NUC - 7.22, 7.22EXT, 7.49, KRNL64UC -7.… | 2021-09-14T12:15:10.740 | 2026-02-24T18:22:12.250 |
| fkie_cve-2021-36958 | <p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly p… | 2021-08-12T18:15:10.303 | 2026-02-24T18:20:47.393 |
| fkie_cve-2021-36934 | <p>An elevation of privilege vulnerability exists because of overly permissive Access Control Lists… | 2021-07-22T07:15:11.013 | 2026-02-24T18:20:43.893 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-p4fg-vw73-vr29 |
|
Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 148 and Fire… | 2026-02-24T15:30:32Z | 2026-02-24T18:31:01Z |
| ghsa-mcwp-v5q8-7gcp |
8.8 (3.1)
|
The Responsive Lightbox & Gallery WordPress plugin before 2.6.1 is vulnerable to an Unauthenticated… | 2026-02-24T06:31:30Z | 2026-02-24T18:31:01Z |
| ghsa-m65f-px5x-xq9x |
|
Undefined behavior in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Fir… | 2026-02-24T15:30:31Z | 2026-02-24T18:31:01Z |
| ghsa-hjq8-wc3q-9xf3 |
|
Privilege escalation in the Messaging System component. This vulnerability affects Firefox < 148, F… | 2026-02-24T15:30:32Z | 2026-02-24T18:31:01Z |
| ghsa-h67m-x9c3-v9wp |
8.8 (3.1)
|
Use-after-free in the Storage: IndexedDB component. This vulnerability affects Firefox < 148, Firef… | 2026-02-24T15:30:31Z | 2026-02-24T18:31:01Z |
| ghsa-h3qc-gf9h-42g6 |
|
Mitigation bypass in the DOM: HTML Parser component. This vulnerability affects Firefox < 148, Fire… | 2026-02-24T15:30:31Z | 2026-02-24T18:31:01Z |
| ghsa-gxg5-574v-j5f6 |
|
Use-after-free in the Audio/Video: Playback component. This vulnerability affects Firefox < 148, Fi… | 2026-02-24T15:30:31Z | 2026-02-24T18:31:01Z |
| ghsa-gjwv-rvwj-p62j |
|
Incorrect boundary conditions in the Web Audio component. This vulnerability affects Firefox < 148,… | 2026-02-24T15:30:32Z | 2026-02-24T18:31:01Z |
| ghsa-g9cv-cvhp-755f |
|
Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148 and Fire… | 2026-02-24T15:30:32Z | 2026-02-24T18:31:01Z |
| ghsa-g5w7-69g8-vcwp |
|
Sandbox escape in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Fire… | 2026-02-24T15:30:31Z | 2026-02-24T18:31:01Z |
| ghsa-99p8-j693-qhpc |
|
Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148 and Fir… | 2026-02-24T15:30:31Z | 2026-02-24T18:31:01Z |
| ghsa-94rx-4fcc-c849 |
|
Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox … | 2026-02-24T15:30:32Z | 2026-02-24T18:31:01Z |
| ghsa-8r55-rv5w-6pfm |
6.5 (3.1)
|
Airflow versions before 2.11.1 have a vulnerability that allows authenticated users with audit log … | 2026-02-24T12:31:40Z | 2026-02-24T18:31:01Z |
| ghsa-839v-3vpr-fpgf |
|
Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148 and Fire… | 2026-02-24T15:30:32Z | 2026-02-24T18:31:01Z |
| ghsa-7xqm-gm4h-p23x |
|
Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vuln… | 2026-02-24T15:30:32Z | 2026-02-24T18:31:01Z |
| ghsa-76rw-rj58-mpqc |
|
Sandbox escape in the Storage: IndexedDB component. This vulnerability affects Firefox < 148 and Fi… | 2026-02-24T15:30:31Z | 2026-02-24T18:31:01Z |
| ghsa-6hhh-7cj8-7mp2 |
9.1 (3.1)
|
Smolder versions through 1.51 for Perl uses insecure rand() function for cryptographic functions. … | 2026-02-24T00:31:34Z | 2026-02-24T18:31:01Z |
| ghsa-5mg4-r7qx-2frp |
|
Use-after-free in the DOM: Bindings (WebIDL) component. This vulnerability affects Firefox < 148, F… | 2026-02-24T15:30:31Z | 2026-02-24T18:31:01Z |
| ghsa-59x3-pvmj-2pw2 |
|
Use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148 an… | 2026-02-24T15:30:31Z | 2026-02-24T18:31:01Z |
| ghsa-3qgm-jcxp-m9m6 |
|
Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component. This vulnera… | 2026-02-24T15:30:32Z | 2026-02-24T18:31:01Z |
| ghsa-3jr5-gwfp-7mfw |
|
JIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability affe… | 2026-02-24T15:30:31Z | 2026-02-24T18:31:01Z |
| ghsa-3hhv-j9r2-hr9c |
|
Incorrect boundary conditions in the Graphics: ImageLib component. This vulnerability affects Firef… | 2026-02-24T15:30:31Z | 2026-02-24T18:31:01Z |
| ghsa-3cg8-wjp5-4rm6 |
|
Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148, Firefox E… | 2026-02-24T15:30:31Z | 2026-02-24T18:31:01Z |
| ghsa-2255-92v8-4pvj |
|
Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vuln… | 2026-02-24T15:30:31Z | 2026-02-24T18:31:01Z |
| ghsa-742g-xjv2-hvh9 |
5.3 (3.1)
|
A user enumeration vulnerability exists in FormaLMS 4.1.18 and below in the password recovery funct… | 2026-02-20T00:31:53Z | 2026-02-24T18:31:00Z |
| ghsa-wq2g-h2h9-v8x3 |
7.8 (3.1)
|
A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute … | 2026-02-18T15:31:26Z | 2026-02-24T18:30:59Z |
| ghsa-vfmw-4jmp-wmrw |
7.8 (3.1)
|
A vulnerability has been identified in the OPC.Testclient utility, which is included in Rexroth Ind… | 2026-02-18T15:31:26Z | 2026-02-24T18:30:59Z |
| ghsa-r77x-pqm4-6252 |
7.8 (3.1)
|
A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute … | 2026-02-18T15:31:26Z | 2026-02-24T18:30:59Z |
| ghsa-jxf5-m5fg-rw27 |
8.8 (3.1)
|
Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which m… | 2022-02-17T00:00:32Z | 2026-02-24T18:30:58Z |
| ghsa-wvq2-357p-vcgg |
7.5 (3.1)
|
The bone voice ID TA has a vulnerability in information management,Successful exploitation of this … | 2022-01-11T00:01:18Z | 2026-02-24T18:30:55Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-245 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated user… | apache-airflow | 2024-02-29T11:15:08+00:00 | 2025-05-01T21:22:38.598048+00:00 |
| pysec-2025-35 |
7.5 (3.1)
|
Weblate is a web based localization tool. Prior to version 5.11, when creating a new comp… | weblate | 2025-04-15T21:16:04+00:00 | 2025-04-30T17:22:51.467257+00:00 |
| pysec-2025-34 |
|
The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_… | picklescan | 2025-04-24T01:15:49+00:00 | 2025-04-24T03:08:15.436691+00:00 |
| pysec-2025-33 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the… | vyper | 2025-01-14T18:16:05+00:00 | 2025-04-23T21:23:01.322686+00:00 |
| pysec-2025-32 |
9.8 (3.1)
|
BentoML is a Python library for building online serving systems optimized for AI apps and… | bentoml | 2025-04-09T16:15:25+00:00 | 2025-04-22T19:21:34.073355+00:00 |
| pysec-2025-31 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statemen… | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.116292+00:00 |
| pysec-2025-30 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.064106+00:00 |
| pysec-2025-29 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.005382+00:00 |
| pysec-2025-28 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
| pysec-2025-27 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
| pysec-2025-26 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.645758+00:00 |
| pysec-2021-891 |
7.8 (3.1)
|
CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 S… | salt | 2021-03-03T10:15:13+00:00 | 2025-04-09T17:27:27.582884+00:00 |
| pysec-2025-25 |
6.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middle… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.532849+00:00 |
| pysec-2025-24 |
7.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the /api/remove… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.486485+00:00 |
| pysec-2025-23 |
|
Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Inform… | ray | 2025-03-06T05:15:16+00:00 | 2025-04-09T17:27:27.434099+00:00 |
| pysec-2022-43179 |
7.3 (3.1)
|
Poetry is a dependency manager for Python. To handle dependencies that come from a Git re… | poetry | 2022-09-07T19:15:08+00:00 | 2025-04-09T17:27:27.255151+00:00 |
| pysec-2025-22 |
9.8 (3.1)
|
A vulnerability, that could result in Remote Code Execution (RCE), has been found in Plot… | plotai | 2025-03-10T14:15:24+00:00 | 2025-04-09T17:27:27.203714+00:00 |
| pysec-2023-311 |
5.4 (3.1)
|
plone.namedfile allows users to handle `File` and `Image` fields targeting, but not depen… | plone-namedfile | 2023-09-21T15:15:10+00:00 | 2025-04-09T17:27:27.153848+00:00 |
| pysec-2025-21 |
9.8 (3.1)
|
picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model arch… | picklescan | 2025-03-10T12:15:12+00:00 | 2025-04-09T17:27:27.016747+00:00 |
| pysec-2025-20 |
6.5 (3.1)
|
picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes i… | picklescan | 2025-03-10T12:15:10+00:00 | 2025-04-09T17:27:26.966215+00:00 |
| pysec-2025-19 |
9.8 (3.1)
|
picklescan before 0.0.22 only considers standard pickle file extensions in the scope for … | picklescan | 2025-03-03T19:15:34+00:00 | 2025-04-09T17:27:26.916350+00:00 |
| pysec-2025-18 |
|
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craf… | picklescan | 2025-02-26T15:15:24+00:00 | 2025-04-09T17:27:26.867210+00:00 |
| pysec-2023-310 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NO… | mobsf | 2023-09-21T22:15:11+00:00 | 2025-04-09T17:27:26.663665+00:00 |
| pysec-2025-17 |
5.5 (3.1)
|
In mlflow/mlflow version 2.18, an admin is able to create a new user account without sett… | mlflow | 2025-03-20T10:15:54+00:00 | 2025-04-09T17:27:26.322333+00:00 |
| pysec-2023-309 |
8.8 (3.1)
|
Path Traversal in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-13T00:15:07+00:00 | 2025-04-09T17:27:26.271200+00:00 |
| pysec-2023-308 |
10.0 (3.1)
|
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0. | mlflow | 2023-07-19T01:15:10+00:00 | 2025-04-09T17:27:26.223213+00:00 |
| pysec-2025-16 |
7.5 (3.1)
|
LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vu… | lnbits | 2025-04-06T20:15:15+00:00 | 2025-04-09T17:27:25.872691+00:00 |
| pysec-2025-15 |
5.3 (3.1)
|
Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilde… | flask-appbuilder | 2025-03-03T16:15:41+00:00 | 2025-04-09T17:27:25.227116+00:00 |
| pysec-2025-14 |
|
An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normal… | django | 2025-04-02T13:15:44+00:00 | 2025-04-09T17:27:25.169049+00:00 |
| pysec-2025-13 |
|
An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2… | django | 2025-03-06T19:15:27+00:00 | 2025-04-09T17:27:25.095679+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33870 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.943118Z |
| gsd-2024-33849 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.924449Z |
| gsd-2024-33854 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.916266Z |
| gsd-2024-33868 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.896638Z |
| gsd-2024-33881 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.886591Z |
| gsd-2024-33880 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.882744Z |
| gsd-2024-33877 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.871220Z |
| gsd-2024-33873 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.870402Z |
| gsd-2024-33859 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.867340Z |
| gsd-2024-33875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.862083Z |
| gsd-2024-33878 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.850311Z |
| gsd-2024-33858 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.848478Z |
| gsd-2024-33872 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.839468Z |
| gsd-2024-33857 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.834866Z |
| gsd-2024-33853 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.825026Z |
| gsd-2024-33863 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.824810Z |
| gsd-2024-33852 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.824312Z |
| gsd-2024-33866 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.819755Z |
| gsd-2024-33867 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.808129Z |
| gsd-2024-33882 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.803998Z |
| gsd-2024-33871 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.800751Z |
| gsd-2024-33862 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.799465Z |
| gsd-2024-33864 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.792101Z |
| gsd-2024-33865 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.790923Z |
| gsd-2024-33869 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.784255Z |
| gsd-2024-33860 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.777612Z |
| gsd-2024-33855 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.741239Z |
| gsd-2024-33851 | phpecc, as used in paragonie/phpecc before 2.0.1, has a branch-based timing leak in Point… | 2024-04-28T05:02:07.732559Z |
| gsd-2024-33879 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.727068Z |
| gsd-2024-4294 | A vulnerability, which was classified as critical, has been found in PHPGurukul Doctor Ap… | 2024-04-28T05:02:06.079201Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-896 | Malicious code in sinon-web3-chain (npm) | 2026-02-13T17:36:45Z | 2026-02-23T04:21:35Z |
| mal-2026-890 | Malicious code in responsible-ai (npm) | 2026-02-13T14:01:25Z | 2026-02-23T04:21:35Z |
| mal-2026-889 | Malicious code in responses-starter-app (npm) | 2026-02-13T14:01:24Z | 2026-02-23T04:21:35Z |
| mal-2026-888 | Malicious code in pyright-root (npm) | 2026-02-13T14:01:24Z | 2026-02-23T04:21:35Z |
| mal-2026-887 | Malicious code in pyrefly (npm) | 2026-02-13T14:01:24Z | 2026-02-23T04:21:35Z |
| mal-2026-886 | Malicious code in open-answer-engine-frontend (npm) | 2026-02-13T14:01:24Z | 2026-02-23T04:21:35Z |
| mal-2026-857 | Malicious code in osopackage (npm) | 2026-02-11T15:13:28Z | 2026-02-23T04:21:35Z |
| mal-2026-854 | Malicious code in sinon-node (npm) | 2026-02-11T10:54:37Z | 2026-02-23T04:21:35Z |
| mal-2026-840 | Malicious code in search-savedsearch-podlet (npm) | 2026-02-10T17:06:06Z | 2026-02-23T04:21:35Z |
| mal-2026-839 | Malicious code in search-newfrontier-podlet (npm) | 2026-02-10T17:16:51Z | 2026-02-23T04:21:35Z |
| mal-2026-838 | Malicious code in realestate-atlas (npm) | 2026-02-10T17:06:02Z | 2026-02-23T04:21:35Z |
| mal-2026-835 | Malicious code in sap-code-style-guides (npm) | 2026-02-10T15:58:34Z | 2026-02-23T04:21:35Z |
| mal-2026-822 | Malicious code in react-svg-handler (npm) | 2026-02-09T17:16:37Z | 2026-02-23T04:21:35Z |
| mal-2026-997 | Malicious code in npm-security-testing (npm) | 2026-02-23T02:20:31Z | 2026-02-23T04:21:34Z |
| mal-2026-978 | Malicious code in microsoft-cms-client (npm) | 2026-02-21T17:38:28Z | 2026-02-23T04:21:34Z |
| mal-2026-965 | Malicious code in node-native-bridge (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:34Z |
| mal-2026-964 | Malicious code in naniod (npm) | 2026-02-20T16:59:55Z | 2026-02-23T04:21:34Z |
| mal-2026-963 | Malicious code in locale-loader-pro (npm) | 2026-02-20T16:59:55Z | 2026-02-23T04:21:34Z |
| mal-2026-919 | Malicious code in mds-webcomponents (npm) | 2026-02-16T15:20:34Z | 2026-02-23T04:21:34Z |
| mal-2026-885 | Malicious code in metadata-stripper (npm) | 2026-02-13T13:50:54Z | 2026-02-23T04:21:34Z |
| mal-2026-853 | Malicious code in node-dotenv-cli (npm) | 2026-02-11T10:54:37Z | 2026-02-23T04:21:34Z |
| mal-2026-848 | Malicious code in npm_cimetadata (npm) | 2026-02-11T03:35:51Z | 2026-02-23T04:21:34Z |
| mal-2026-837 | Malicious code in notification-saved-search-settings-podlet (npm) | 2026-02-10T17:06:08Z | 2026-02-23T04:21:34Z |
| mal-2026-836 | Malicious code in myads-layout (npm) | 2026-02-10T17:06:04Z | 2026-02-23T04:21:34Z |
| mal-2026-827 | Malicious code in narrow-array (npm) | 2026-02-10T13:49:16Z | 2026-02-23T04:21:34Z |
| mal-2026-962 | Malicious code in iruchache (npm) | 2026-02-20T16:56:11Z | 2026-02-23T04:21:33Z |
| mal-2026-961 | Malicious code in iru-caches (npm) | 2026-02-20T16:56:11Z | 2026-02-23T04:21:33Z |
| mal-2026-960 | Malicious code in hardhta (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:33Z |
| mal-2026-959 | Malicious code in format-defaults (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:33Z |
| mal-2026-908 | Malicious code in hops-preset-jest (npm) | 2026-02-15T15:57:34Z | 2026-02-23T04:21:33Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-airflow-2026-22922 | Apache Airflow: Airflow externalLogUrl Permission Bypass | 2026-02-12T08:39:02.281Z | 2026-02-12T09:10:24.600Z |
| bit-wildfly-2025-23367 | Org.wildfly.core:wildfly-server: wildfly improper rbac permission | 2025-10-15T08:51:55.776Z | 2026-02-11T09:09:18.507Z |
| bit-varnish-2023-44487 | 2024-03-06T11:07:44.095Z | 2026-02-11T09:09:18.507Z | |
| bit-valkey-2025-49112 | 2025-10-16T09:19:52.847Z | 2026-02-11T09:09:18.507Z | |
| bit-valkey-2025-21605 | Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client | 2025-04-25T07:27:01.789Z | 2026-02-11T09:09:18.507Z |
| bit-valkey-2024-51741 | Redis allows denial-of-service due to malformed ACL selectors | 2025-01-08T07:22:23.019Z | 2026-02-11T09:09:18.507Z |
| bit-valkey-2024-46981 | Redis' Lua library commands may lead to remote code execution | 2025-01-08T07:22:30.615Z | 2026-02-11T09:09:18.507Z |
| bit-tomcat-2024-34750 | Apache Tomcat: HTTP/2 excess header handling DoS | 2025-07-29T14:30:29.115Z | 2026-02-11T09:09:18.507Z |
| bit-tomcat-2023-44487 | 2025-07-17T08:09:39.495Z | 2026-02-11T09:09:18.507Z | |
| bit-sqlite-2025-29087 | 2025-04-11T19:26:41.394Z | 2026-02-11T09:09:18.507Z | |
| bit-setuptools-2024-6345 | Remote Code Execution in pypa/setuptools | 2024-08-03T07:36:56.917Z | 2026-02-11T09:09:18.507Z |
| bit-redis-2025-21605 | Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client | 2025-04-25T07:24:43.793Z | 2026-02-11T09:09:18.507Z |
| bit-redis-2024-51741 | Redis allows denial-of-service due to malformed ACL selectors | 2025-01-08T07:20:15.238Z | 2026-02-11T09:09:18.507Z |
| bit-redis-2024-46981 | Redis' Lua library commands may lead to remote code execution | 2025-01-08T07:20:24.318Z | 2026-02-11T09:09:18.507Z |
| bit-python-2025-8194 | Tarfile infinite loop during parsing with negative member offset | 2025-08-11T14:00:02.142Z | 2026-02-11T09:09:18.507Z |
| bit-python-2024-50602 | 2024-12-05T07:15:23.404Z | 2026-02-11T09:09:18.507Z | |
| bit-python-2022-45061 | 2024-10-04T16:38:13.524Z | 2026-02-11T09:09:18.507Z | |
| bit-pillow-2024-28219 | 2024-07-02T07:31:57.223Z | 2026-02-11T09:09:18.507Z | |
| bit-php-2022-4900 | Potential buffer overflow in php_cli_server_startup_workers | 2024-03-06T11:02:23.605Z | 2026-02-11T09:09:18.507Z |
| bit-node-2024-36138 | 2024-09-10T07:13:39.524Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-27983 | 2024-06-04T09:49:21.510Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-27982 | 2024-06-04T09:49:37.511Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-22025 | 2024-06-04T09:49:52.511Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-22020 | 2024-07-11T07:28:44.706Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-22019 | 2024-05-24T07:26:57.950Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-22018 | 2024-07-12T07:29:02.117Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-22017 | 2024-11-29T14:03:41.826Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-21896 | 2024-06-04T09:50:22.403Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-21892 | 2024-05-24T07:27:13.552Z | 2026-02-11T09:09:18.507Z | |
| bit-node-2024-21891 | 2024-06-04T09:50:51.602Z | 2026-02-11T09:09:18.507Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-wg18689 | attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests | 2026-01-30T16:29:25.690410Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vv68546 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:35:55.883570Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vl83369 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.758258Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vc16841 | Within HostnameError | 2026-01-30T15:02:22.944744Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uz73015 | Cancelling a query (e | 2026-01-30T16:09:25.315533Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ur80185 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:30:24.609590Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-um63521 | Within HostnameError | 2026-01-30T16:12:25.029065Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ul17352 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:29:25.464127Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uj17204 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:52.998379Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ui65993 | Within HostnameError | 2026-01-30T16:21:25.457624Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ty78539 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T16:35:55.295657Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ts42581 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:29:23.600518Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ts12850 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:17:53.937628Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tr11635 | Cancelling a query (e | 2026-01-30T15:46:54.229170Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tl71584 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:23:53.438748Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tk38210 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:46:25.995358Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ti76190 | Cancelling a query (e | 2026-01-30T15:02:23.296683Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tf52804 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:08:23.107112Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tf33105 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:29:25.639055Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sy95837 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:28:53.594094Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sw55801 | Within HostnameError | 2026-01-30T16:24:55.642434Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sq13072 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T15:02:22.907312Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-so16176 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:39:24.255623Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sh75345 | Cancelling a query (e | 2026-01-30T15:05:23.442396Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sg80587 | It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session | 2026-01-30T14:00:21.027172Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sb25660 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T16:44:27.197226Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ry09679 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:31:53.660443Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rx06615 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:45:24.056160Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rw65075 | Within HostnameError | 2026-01-30T15:35:53.815887Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ru37859 | Cancelling a query (e | 2026-01-30T15:39:24.210234Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2025-001 | 2025-01-08T17:22:11.000Z | 2025-06-19T22:05:09.000Z | |
| drupal-contrib-2025-004 | 2025-01-22T16:50:12.000Z | 2025-05-29T18:26:44.000Z | |
| drupal-contrib-2025-034 | 2025-04-16T16:24:49.000Z | 2025-05-29T18:24:01.000Z | |
| drupal-contrib-2025-041 | 2025-04-23T16:58:39.000Z | 2025-05-29T18:23:44.000Z | |
| drupal-contrib-2025-048 | 2025-05-07T17:06:26.000Z | 2025-05-29T18:20:11.000Z | |
| drupal-contrib-2025-049 | 2025-05-07T17:06:36.000Z | 2025-05-29T18:20:00.000Z | |
| drupal-contrib-2025-050 | 2025-05-07T17:06:52.000Z | 2025-05-29T18:19:50.000Z | |
| drupal-contrib-2025-051 | 2025-05-07T17:07:03.000Z | 2025-05-29T18:19:36.000Z | |
| drupal-contrib-2025-058 | 2025-05-14T18:04:44.000Z | 2025-05-29T18:19:12.000Z | |
| drupal-contrib-2025-059 | 2025-05-14T18:04:52.000Z | 2025-05-29T18:18:54.000Z | |
| drupal-contrib-2025-069 | 2025-05-21T17:29:25.000Z | 2025-05-29T18:17:38.000Z | |
| drupal-contrib-2025-070 | 2025-05-28T17:41:20.000Z | 2025-05-29T18:17:25.000Z | |
| drupal-contrib-2025-071 | 2025-05-28T17:43:23.000Z | 2025-05-29T18:17:12.000Z | |
| drupal-contrib-2025-072 | 2025-05-28T17:43:44.000Z | 2025-05-29T18:16:59.000Z | |
| drupal-contrib-2025-073 | 2025-05-28T17:44:12.000Z | 2025-05-29T18:16:49.000Z | |
| drupal-contrib-2025-074 | 2025-05-28T17:44:33.000Z | 2025-05-29T18:16:36.000Z | |
| drupal-contrib-2025-075 | 2025-05-28T17:45:37.000Z | 2025-05-29T18:16:19.000Z | |
| drupal-contrib-2025-076 | 2025-05-28T17:46:09.000Z | 2025-05-29T18:15:56.000Z | |
| drupal-contrib-2025-068 | 2025-05-21T17:29:14.000Z | 2025-05-21T17:29:14.000Z | |
| drupal-contrib-2025-067 | 2025-05-21T17:28:55.000Z | 2025-05-21T17:28:55.000Z | |
| drupal-contrib-2025-066 | 2025-05-21T17:28:47.000Z | 2025-05-21T17:28:47.000Z | |
| drupal-contrib-2025-065 | 2025-05-21T17:28:31.000Z | 2025-05-21T17:28:31.000Z | |
| drupal-contrib-2025-064 | 2025-05-21T17:28:11.000Z | 2025-05-21T17:28:11.000Z | |
| drupal-contrib-2025-057 | 2025-05-14T18:04:31.000Z | 2025-05-14T19:39:43.000Z | |
| drupal-contrib-2025-063 | 2025-05-14T18:05:32.000Z | 2025-05-14T18:05:32.000Z | |
| drupal-contrib-2025-062 | 2025-05-14T18:05:22.000Z | 2025-05-14T18:05:22.000Z | |
| drupal-contrib-2025-061 | 2025-05-14T18:05:13.000Z | 2025-05-14T18:05:13.000Z | |
| drupal-contrib-2025-060 | 2025-05-14T18:05:04.000Z | 2025-05-14T18:05:04.000Z | |
| drupal-contrib-2025-056 | 2025-05-07T17:08:31.000Z | 2025-05-07T17:16:40.000Z | |
| drupal-contrib-2025-055 | 2025-05-07T17:07:46.000Z | 2025-05-07T17:16:36.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-021305 | Android App "Brother iPrint&Scan" improper use of an external cache directory | 2025-12-09T17:25+09:00 | 2025-12-09T17:25+09:00 |
| jvndb-2025-000114 | ELECOM Clone for Windows registers a Windows service with an unquoted file path | 2025-12-09T17:16+09:00 | 2025-12-09T17:16+09:00 |
| jvndb-2025-000116 | GS Yuasa FULLBACK Manager Pro registers Windows services with unquoted file paths | 2025-12-08T14:06+09:00 | 2025-12-08T14:06+09:00 |
| jvndb-2025-000094 | Multiple vulnerabilities in ABB Terra AC Wallbox | 2025-12-05T14:12+09:00 | 2025-12-05T14:12+09:00 |
| jvndb-2025-000112 | Installer of INZONE Hub may insecurely load Dynamic Link Libraries | 2025-11-28T13:36+09:00 | 2025-11-28T13:36+09:00 |
| jvndb-2025-000111 | SwitchBot Smart Video Doorbell vulnerable to active debug code | 2025-11-26T14:35+09:00 | 2025-11-26T14:35+09:00 |
| jvndb-2025-000110 | Multiple vulnerabilities in Security Point (Windows) of MaLion | 2025-11-25T17:17+09:00 | 2025-11-25T17:17+09:00 |
| jvndb-2025-000109 | Multiple vulnerabilities in SNC-CX600W | 2025-11-25T14:59+09:00 | 2025-11-25T14:59+09:00 |
| jvndb-2025-000108 | "FOD" App uses hard-coded cryptographic keys | 2025-11-25T14:15+09:00 | 2025-11-25T14:15+09:00 |
| jvndb-2025-000106 | Multiple vulnerabilities in LogStare Collector | 2025-11-21T16:27+09:00 | 2025-11-21T16:27+09:00 |
| jvndb-2025-000107 | Installer of RakurakuMusen Start EX for Windows may insecurely load Dynamic Link Libraries | 2025-11-19T16:22+09:00 | 2025-11-19T16:22+09:00 |
| jvndb-2025-000097 | "Dejira" App for iOS vulnerable to improper server certificate verification | 2025-11-17T14:09+09:00 | 2025-11-17T14:09+09:00 |
| jvndb-2025-000105 | NCP-HG100 vulnerable to OS command injection | 2025-11-14T15:26+09:00 | 2025-11-14T15:26+09:00 |
| jvndb-2025-000104 | Multiple vulnerabilities in GNU Libmicrohttpd | 2025-11-10T15:07+09:00 | 2025-11-10T15:07+09:00 |
| jvndb-2025-000103 | Use of password hash with insufficient computational effort vulnerability in BUFFALO Wi-Fi router "WSR-1800AX4 series" | 2025-11-07T15:39+09:00 | 2025-11-07T15:39+09:00 |
| jvndb-2025-000102 | CLUSTERPRO X and EXPRESSCLUSTER X vulnerable to OS command injection | 2025-11-07T14:55+09:00 | 2025-11-07T14:55+09:00 |
| jvndb-2025-000101 | GROWI vulnerable to stored cross-site scripting | 2025-11-06T13:45+09:00 | 2025-11-06T13:45+09:00 |
| jvndb-2024-013260 | Multiple vulnerabilities in Edgecross Basic Software for Windows | 2024-11-22T10:59+09:00 | 2025-11-04T16:41+09:00 |
| jvndb-2025-017972 | Multiple vulnerabilities in Century Systems FutureNet MA and IP-K series | 2025-11-04T16:37+09:00 | 2025-11-04T16:37+09:00 |
| jvndb-2025-000100 | Multiple Roboticsware products register Windows services with unquoted file paths | 2025-11-04T14:17+09:00 | 2025-11-04T14:17+09:00 |
| jvndb-2025-000098 | Optical Disc Archive Software (for Windows) registers a Windows service with an unquoted file path | 2025-11-04T13:51+09:00 | 2025-11-04T13:51+09:00 |
| jvndb-2025-000099 | Progress Flowmon vulnerable to authenticated OS command injection | 2025-11-04T12:47+09:00 | 2025-11-04T12:47+09:00 |
| jvndb-2025-000096 | Installer of WTW EAGLE (for Windows) may insecurely load Dynamic Link Libraries | 2025-10-29T14:17+09:00 | 2025-10-29T14:17+09:00 |
| jvndb-2025-000095 | MZK-DP300N uses hard-coded credentials | 2025-10-28T14:04+09:00 | 2025-10-28T14:04+09:00 |
| jvndb-2025-014793 | NIHON KOHDEN Central Monitor CNS-6201 vulnerable to NULL pointer dereference | 2025-10-01T11:35+09:00 | 2025-10-27T12:28+09:00 |
| jvndb-2025-000093 | Multiple stored cross-site scripting vulnerabilities in Pleasanter | 2025-10-24T15:11+09:00 | 2025-10-24T15:11+09:00 |
| jvndb-2025-000084 | GROWI vulnerable to cross-site scripting | 2025-10-22T15:44+09:00 | 2025-10-22T15:44+09:00 |
| jvndb-2025-000090 | Multiple stored cross-site scripting vulnerabilities in Movable Type | 2025-10-22T13:54+09:00 | 2025-10-22T13:54+09:00 |
| jvndb-2025-000088 | Lanscope Endpoint Manager (On-Premises) vulnerable to improper verification of source of a communication channel | 2025-10-20T16:17+09:00 | 2025-10-22T10:06+09:00 |
| jvndb-2025-000092 | ETERNUS SF vulnerable to incorrect default permissions | 2025-10-20T14:20+09:00 | 2025-10-20T14:20+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-10663 | IBM Concert代码问题漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10662 | IBM Concert信息泄露漏洞(CNVD-2026-10662) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10661 | IBM Concert信息泄露漏洞(CNVD-2026-10661) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10660 | IBM ApplinX数据伪造问题漏洞 | 2026-01-26 | 2026-02-10 |
| cnvd-2026-10656 | IBM ApplinX跨站请求伪造漏洞(CNVD-2026-10656) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10655 | IBM ApplinX跨站脚本漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10654 | IBM ApplinX未授权访问漏洞 | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10653 | IBM ApplinX信息泄露漏洞(CNVD-2026-10653) | 2026-01-30 | 2026-02-10 |
| cnvd-2026-10652 | Google Chrome代码执行漏洞(CNVD-2026-10652) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10651 | Google SentencePiece缓冲区溢出漏洞 | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10650 | Google Go代码执行漏洞(CNVD-2026-10650) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10649 | Google Go拒绝服务漏洞(CNVD-2026-10649) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10648 | Google Go代码执行漏洞 | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10647 | Google Go拒绝服务漏洞(CNVD-2026-10647) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10646 | Google Go信息泄露漏洞(CNVD-2026-10646) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10645 | Google Chrome信息泄露漏洞(CNVD-2026-10645) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10644 | Google Android权限提升漏洞(CNVD-2026-10644) | 2025-09-08 | 2026-02-09 |
| cnvd-2026-10643 | Google Android权限提升漏洞(CNVD-2026-10643) | 2025-09-04 | 2026-02-09 |
| cnvd-2026-10642 | Google Android权限提升漏洞(CNVD-2026-10642) | 2025-09-04 | 2026-02-09 |
| cnvd-2026-10641 | Google Android信息泄露漏洞(CNVD-2026-10641) | 2026-02-05 | 2026-02-09 |
| cnvd-2026-10640 | D-Link DNS-343 ShareCenter命令执行漏洞 | 2025-11-05 | 2026-02-09 |
| cnvd-2026-10639 | D-Link DI-8200G命令注入漏洞 | 2026-01-19 | 2026-02-09 |
| cnvd-2026-10638 | Tenda AX1803缓冲区溢出漏洞(CNVD-2026-10638) | 2026-01-30 | 2026-02-09 |
| cnvd-2026-06416 | 深圳市广联智通科技有限公司AR300M16路由器存在命令执行漏洞(CNVD-C-2025-1171570) | 2025-12-24 | 2026-02-07 |
| cnvd-2026-10344 | Siemens RUGGEDCOM输入验证错误漏洞 | 2025-12-15 | 2026-02-06 |
| cnvd-2026-10341 | Rockwell Automation FactoryTalk Services Platform授权问题漏洞 | 2023-06-19 | 2026-02-06 |
| cnvd-2026-10328 | Google Pixel gxp_fence_manager.cc文件输入验证错误漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10327 | Google Pixel aoc_ipc_core.c文件输入验证错误漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10326 | Google Pixel授权问题漏洞 | 2025-12-18 | 2026-02-06 |
| cnvd-2026-10325 | Google Pixel protocolpsadapter.cpp文件缓冲区溢出漏洞 | 2025-12-18 | 2026-02-06 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15829 | Уязвимость системы управления базами данных MySQL и MariaDB, связанная с раскрытием инфор… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15825 | Уязвимость компонентов mm ядра операционной системы Linux, позволяющая нарушителю получит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15824 | Уязвимость компонента hugetlb.c ядра операционной системы Linux, позволяющая нарушителю п… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15822 | Уязвимость ядра операционной системы Linux, связанная с неправильной проверкой возвращаем… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15821 | Уязвимость компонента drm/sched ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15820 | Уязвимость компонента pinctrl-msm ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15816 | Уязвимость компонента smb ядра операционной системы Linux, позволяющая нарушителю нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15815 | Уязвимость ядра операционной системы Linux, связанная с чтением за допустимыми границами … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15814 | Уязвимость ядра операционной системы Linux, связанная с чтением за границами буфера данны… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15811 | Уязвимость компонента xusb ядра операционной системы Linux, позволяющая нарушителю вызват… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15810 | Уязвимость ядра операционной системы Linux, связанная с одновременным выполнением с испол… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15809 | Уязвимость компонента appletalk ядра операционной системы Linux, позволяющая нарушителю н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15808 | Уязвимость компонента drm/tegra ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15806 | Уязвимость компонента atm ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15804 | Уязвимость компонента mcast ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15803 | Уязвимость компонентов tmptcp ядра операционной системы Linux, позволяющая нарушителю пол… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15802 | Уязвимость компонента perf/core ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15800 | Уязвимость компонента mm/vmalloc.c ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15799 | Уязвимость модуля powerpc/eeh ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15798 | Уязвимость компонента crypto ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15797 | Уязвимость компонента xilinx ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15796 | Уязвимость компонента iwlwifi ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15795 | Уязвимость ядра операционной системы Linux, связанная с ошибками разыменования указателя,… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15794 | Уязвимость компонента dtpm_cpu ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15793 | Уязвимость компонента fbtft ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15792 | Уязвимость компонента net/tls ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15791 | Уязвимость компонента net/packet/af_packet.c ядра операционной системы Linux, позволяющая… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15790 | Уязвимость компонента net ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15789 | Уязвимость компонента pnv_php операционной системы Linux, позволяющая нарушителю вызвать … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15788 | Уязвимость компонента pnv_php ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0146 | Multiples vulnérabilités dans GitLab | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0145 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0143 | Multiples vulnérabilités dans Synology Storage Manager | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0142 | Multiples vulnérabilités dans MongoDB | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0141 | Multiples vulnérabilités dans les produits SAP | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0140 | Multiples vulnérabilités dans les produits Axis | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0139 | Multiples vulnérabilités dans les produits Siemens | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0138 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0137 | Multiples vulnérabilités dans GnuTLS | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0136 | Vulnérabilité dans Fortinet FortiClientEMS | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0135 | Vulnérabilité dans GitLab AI Gateway | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0134 | Vulnérabilité dans Microsoft Edge | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0132 | Multiples vulnérabilités dans VMware Tanzu Greenplum | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0131 | Multiples vulnérabilités dans les produits IBM | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0130 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0129 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0128 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0127 | Vulnérabilité dans NetApp ONTAP 9 | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0126 | Vulnérabilité dans ESET Management Agent | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0125 | Multiples vulnérabilités dans les produits Moxa | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0124 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0123 | Multiples vulnérabilités dans Asterisk | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0122 | Multiples vulnérabilités dans Tenable Nessus | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0121 | Vulnérabilité dans les produits Juniper Networks | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0120 | Multiples vulnérabilités dans les produits F5 | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0119 | Multiples vulnérabilités dans les produits Cisco | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0118 | Multiples vulnérabilités dans les produits Splunk | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0117 | Multiples vulnérabilités dans GLPI | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0116 | Vulnérabilité dans les produits Moxa | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-ale-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-ale-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| certfr-2021-ale-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-ale-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| certfr-2021-ale-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| certfr-2021-ale-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2020-ale-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2021-ale-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| certfr-2020-ale-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| certfr-2020-ale-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| certfr-2020-ale-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| certfr-2020-ale-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-216 | Heap-buffer-overflow in mg_mqtt_next_prop | 2026-02-10T00:08:51.349946Z | 2026-02-11T14:08:38.238200Z |
| osv-2026-229 | Segv on unknown address in aiAnimation::~aiAnimation | 2026-02-11T00:12:18.313233Z | 2026-02-11T00:12:18.313574Z |
| osv-2026-226 | UNKNOWN WRITE in decode_xa2_00 | 2026-02-11T00:10:08.757600Z | 2026-02-11T00:10:08.757920Z |
| osv-2026-212 | UNKNOWN READ in gpsd_poll | 2026-02-09T00:15:09.775765Z | 2026-02-09T00:15:09.776491Z |
| osv-2022-519 | Stack-buffer-overflow in LookupThousands | 2022-06-29T00:00:24.107785Z | 2026-02-08T14:10:55.777894Z |
| osv-2022-462 | Stack-buffer-overflow in strcat | 2022-06-07T00:01:47.521548Z | 2026-02-08T14:10:42.909724Z |
| osv-2021-802 | Stack-buffer-overflow in InterpretCondition | 2021-05-27T00:00:31.797718Z | 2026-02-08T14:08:02.526845Z |
| osv-2021-1110 | Stack-buffer-overflow in TranslateWord2 | 2021-08-08T00:02:17.026887Z | 2026-02-08T14:07:47.971880Z |
| osv-2026-209 | Use-of-uninitialized-value in ntrip_parse_url | 2026-02-08T00:06:08.137216Z | 2026-02-08T00:06:08.137699Z |
| osv-2025-547 | Security exception in com.alibaba.fastjson2.JSONReader.readArray | 2025-07-15T00:09:03.936493Z | 2026-02-07T14:17:37.720783Z |
| osv-2023-197 | Global-buffer-overflow in base_C_MessageEncryptInit | 2023-03-18T13:00:57.254906Z | 2026-02-07T14:09:46.773524Z |
| osv-2022-312 | Heap-buffer-overflow in dhcp_reply | 2022-04-07T00:00:40.457052Z | 2026-02-07T14:07:28.215175Z |
| osv-2026-205 | UNKNOWN READ in gpsd_poll | 2026-02-07T00:03:03.099317Z | 2026-02-07T00:03:03.099778Z |
| osv-2024-696 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-07-31T00:03:10.056663Z | 2026-02-06T14:17:33.480381Z |
| osv-2024-641 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-07-14T00:06:37.034414Z | 2026-02-06T14:17:23.672112Z |
| osv-2024-400 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-05-02T00:03:16.309384Z | 2026-02-06T14:17:18.890998Z |
| osv-2024-278 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-04-19T00:12:11.684954Z | 2026-02-06T14:16:11.845843Z |
| osv-2026-204 | Segv on unknown address in icalarray_append | 2026-02-06T00:20:37.969087Z | 2026-02-06T00:20:37.969390Z |
| osv-2026-200 | Global-buffer-overflow in nameMatch | 2026-02-06T00:15:58.927791Z | 2026-02-06T00:15:58.928058Z |
| osv-2024-719 | Heap-buffer-overflow in hevc_ref_pic_lists_modification | 2024-08-07T00:05:22.699506Z | 2026-02-05T14:31:23.006298Z |
| osv-2024-664 | Heap-buffer-overflow in gf_dash_group_get_template | 2024-07-18T00:13:55.576218Z | 2026-02-05T14:31:14.693832Z |
| osv-2024-695 | Stack-buffer-overflow in gf_vvc_parse_nalu_bs | 2024-07-31T00:02:35.217594Z | 2026-02-05T14:30:54.825082Z |
| osv-2024-659 | Index-out-of-bounds in gf_vvc_parse_nalu_bs | 2024-07-18T00:01:18.765548Z | 2026-02-05T14:30:28.253307Z |
| osv-2023-877 | Heap-buffer-overflow in btf_ensure_modifiable | 2023-09-18T14:02:44.989260Z | 2026-02-04T14:10:33.449942Z |
| osv-2023-1307 | UNKNOWN READ in init_struct_ops_maps | 2023-12-15T00:12:51.528155Z | 2026-02-04T14:09:09.741123Z |
| osv-2026-189 | Global-buffer-overflow in gpsd_poll | 2026-02-04T00:05:14.950372Z | 2026-02-04T00:05:14.950857Z |
| osv-2026-182 | Use-of-uninitialized-value in json_internal_read_object | 2026-02-03T00:11:05.023029Z | 2026-02-03T00:11:05.023344Z |
| osv-2026-177 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-02-02T00:20:01.368972Z | 2026-02-02T00:20:01.369362Z |
| osv-2022-1003 | Index-out-of-bounds in LibRaw::ahd_interpolate_r_and_b_in_rgb_and_convert_to_cielab | 2022-09-30T00:02:10.026151Z | 2026-01-31T14:08:33.420267Z |
| osv-2026-167 | Use-of-uninitialized-value in aivdm_analyze | 2026-01-31T00:10:49.750917Z | 2026-01-31T00:10:49.751204Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0129 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0128 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0127 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0125 | Resource Exhaustion (Memory and Handle Leaks) on Windows and macOS | 2025-11-22T12:00:00Z | 2025-11-22T12:29:36Z |
| rustsec-2025-0124 | rand_os crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-19T20:48:42Z |
| rustsec-2025-0123 | opentelemetry-jaeger crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T12:07:07Z |
| rustsec-2025-0122 | cargo-asm crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T09:02:31Z |
| rustsec-2025-0121 | gcc crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:52:10Z |
| rustsec-2025-0119 | number_prefix crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:13:56Z |
| rustsec-2025-0118 | Unsound API access to a WebAssembly shared linear memory | 2025-11-11T12:00:00Z | 2025-11-13T16:55:40Z |
| rustsec-2025-0117 | tandem is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0116 | tandem_garble_interop is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0115 | tandem_http_server is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0114 | tandem_http_client is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0113 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-11-04T06:10:22Z |
| rustsec-2025-0109 | Out-of-bounds memory access in binary_read_to_ref and binary_write_from_ref | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0108 | Uninitialized memory exposure in string reading functions | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0107 | Uninitialized memory exposure in any_as_u8_slice | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0106 | Undefined behavior in index_of_ptr with empty slices | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0105 | Uninitialized memory exposure in create_ring_buffer | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0072 | soundness issue and unmaintained | 2025-10-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0071 | Incorrect handling of embedded SVG and MathML leads to mutation XSS after removal | 2025-09-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0068 | serde_yml crate is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0067 | `libyml::string::yaml_string_extend` is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0063 | Possible unsound public API | 2025-04-25T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0062 | Heap Buffer Overflow in the DrainCol Destructor | 2025-05-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0054 | ArrayQueue::push_front is not panic-safe | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0053 | Multiple memory corruption vulnerabilities in safe APIs | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0051 | `xcb::Connection::connect_to_fd*` functions violate I/O safety | 2025-08-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0050 | IdMap::from_iter may lead to uninitialized memory being freed on drop | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1178 | Moderate: kernel security update | 2026-01-26T00:00:00Z | 2026-02-02T11:36:10Z |
| alsa-2026:1239 | Important: fence-agents security update | 2026-01-26T00:00:00Z | 2026-02-02T11:30:59Z |
| alsa-2026:1359 | Moderate: gcc-toolset-15-binutils security update | 2026-01-27T00:00:00Z | 2026-02-02T11:23:42Z |
| alsa-2026:1381 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-02-02T11:22:03Z |
| alsa-2026:1409 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:20:21Z |
| alsa-2026:1412 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:16:18Z |
| alsa-2026:1473 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-02-02T11:12:21Z |
| alsa-2026:1595 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:01:50Z |
| alsa-2026:1597 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:00:47Z |
| alsa-2026:1628 | Important: php security update | 2026-02-02T00:00:00Z | 2026-02-02T09:59:40Z |
| alsa-2026:1143 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-30T09:51:59Z |
| alsa-2026:1574 | Important: gimp:2.8 security update | 2026-01-29T00:00:00Z | 2026-01-29T14:07:36Z |
| alsa-2026:0932 | Important: java-1.8.0-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-29T13:07:43Z |
| alsa-2026:1518 | Important: grafana-pcp security update | 2026-01-28T00:00:00Z | 2026-01-29T12:32:40Z |
| alsa-2026:1350 | Moderate: curl security update | 2026-01-27T00:00:00Z | 2026-01-29T12:31:06Z |
| alsa-2026:1334 | Moderate: glibc security update | 2026-01-27T00:00:00Z | 2026-01-29T12:29:45Z |
| alsa-2026:1254 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-29T12:14:07Z |
| alsa-2026:1344 | Important: grafana security update | 2026-01-27T00:00:00Z | 2026-01-29T12:12:24Z |
| alsa-2026:1374 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:10:37Z |
| alsa-2026:1380 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-01-29T12:07:35Z |
| alsa-2026:1408 | Moderate: python3.12 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:05:44Z |
| alsa-2026:1410 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:02:18Z |
| alsa-2026:1429 | Important: php:8.3 security update | 2026-01-27T00:00:00Z | 2026-01-29T11:59:57Z |
| alsa-2026:1472 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-01-28T19:58:47Z |
| alsa-2026:1478 | Moderate: python3.9 security update | 2026-01-28T00:00:00Z | 2026-01-28T19:56:37Z |
| alsa-2026:0933 | Important: java-25-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-28T14:39:55Z |
| alsa-2026:1224 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:28:50Z |
| alsa-2026:1226 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:21:23Z |
| alsa-2026:1087 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:19:22Z |
| alsa-2026:1088 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:17:27Z |