Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-30996 |
7.5 (3.1)
|
An issue in the file handling logic of the compon… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T18:05:30.972Z |
| CVE-2026-30995 |
8.6 (3.1)
|
Slah CMS v1.5.0 and below was discovered to conta… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T17:23:41.420Z |
| CVE-2026-30994 |
7.5 (3.1)
|
Incorrect access control in the config.php compon… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T18:06:38.418Z |
| CVE-2026-30993 |
9.8 (3.1)
|
Slah CMS v1.5.0 and below was discovered to conta… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-16T14:06:34.679Z |
| CVE-2026-30625 |
9.8 (3.1)
|
Upsonic 0.71.6 contains a remote code execution v… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-16T13:55:52.158Z |
| CVE-2026-30624 |
8.6 (3.1)
|
Agent Zero 0.9.8 contains a remote code execution… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T18:02:40.808Z |
| CVE-2026-30617 |
8.6 (3.1)
|
LangChain-ChatChat 0.3.1 contains a remote code e… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T18:00:20.495Z |
| CVE-2026-30616 |
7.3 (3.1)
|
Jaaz 1.0.30 contains a remote code execution vuln… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T17:56:48.614Z |
| CVE-2026-30615 |
8 (3.1)
|
A prompt injection vulnerability in Windsurf 1.95… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T17:54:48.560Z |
| CVE-2026-30461 |
8.3 (3.1)
|
Daylight Studio FuelCMS v1.5.2 was discovered to … |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-16T14:02:08.595Z |
| CVE-2026-30364 |
7.5 (3.1)
|
CentSDR commit e40795 was discovered to contain a… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T17:49:52.557Z |
| CVE-2025-67841 |
7.5 (3.1)
|
Nordic Semiconductor IronSide SE for nRF54H20 bef… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-16T14:04:21.040Z |
| CVE-2024-53412 |
8.4 (3.1)
|
Command injection in the connect function in Niet… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T17:27:22.513Z |
| CVE-2026-40096 |
5.1 (4.0)
|
immich: Open Redirect via Shared Album name |
immich-app |
immich |
2026-04-14T23:54:17.662Z | 2026-04-15T16:19:07.744Z |
| CVE-2026-40091 |
6 (3.1)
|
SpiceDB: SPICEDB_DATASTORE_CONN_URI is leaked on start… |
authzed |
spicedb |
2026-04-14T23:50:25.479Z | 2026-04-15T13:23:15.155Z |
| CVE-2026-40090 |
7.1 (3.1)
|
Zarf has a Path Traversal via Malicious Package Metada… |
zarf-dev |
zarf |
2026-04-14T23:46:18.804Z | 2026-04-15T16:13:54.180Z |
| CVE-2026-39984 |
5.5 (3.1)
|
Sigstore Timestamp Authority has Improper Certificate … |
sigstore |
timestamp-authority |
2026-04-14T23:41:47.909Z | 2026-04-16T14:00:55.081Z |
| CVE-2026-39971 |
7.2 (3.1)
|
Serendipity: Host Header Injection leads to SMTP heade… |
s9y |
Serendipity |
2026-04-14T23:35:49.305Z | 2026-04-15T16:22:04.004Z |
| CVE-2026-39963 |
6.9 (3.1)
|
Serendipity: Host Header Injection enables authenticat… |
s9y |
Serendipity |
2026-04-14T23:31:13.843Z | 2026-04-15T13:23:48.591Z |
| CVE-2026-1314 |
5.3 (3.1)
|
3D FlipBook – PDF Embedder, PDF Flipbook Viewer, Flipb… |
iberezansky |
3D FlipBook – PDF Embedder, PDF Flipbook Viewer, Flipbook Image Gallery |
2026-04-14T23:26:07.668Z | 2026-04-15T16:22:29.670Z |
| CVE-2026-2396 |
4.4 (3.1)
|
List View Google Calendar <= 7.4.3 - Authenticated (Ad… |
kimipooh |
List View Google Calendar |
2026-04-14T23:26:07.293Z | 2026-04-16T13:24:58.936Z |
| CVE-2025-15470 |
6.5 (3.1)
|
Eleganzo <= 1.2 - Authenticated (Subscriber+) Arbitrar… |
DesigningMedia |
Eleganzo |
2026-04-14T23:26:06.733Z | 2026-04-15T17:26:49.516Z |
| CVE-2026-39884 |
8.3 (3.1)
|
MCP Server Kubernetes has Argument Injection in its po… |
Flux159 |
mcp-server-kubernetes |
2026-04-14T23:25:59.780Z | 2026-04-15T16:13:59.605Z |
| CVE-2026-39842 |
10 (3.1)
|
OpenRemote is Vulnerable to Expression Injection |
openremote |
openremote |
2026-04-14T23:21:22.242Z | 2026-04-16T13:58:42.988Z |
| CVE-2026-39399 |
9.6 (3.1)
|
NuGet Gallery: Arbitrary Blob Overwrite via Nuspec Con… |
NuGet |
NuGetGallery |
2026-04-14T23:01:38.176Z | 2026-04-15T14:42:02.662Z |
| CVE-2026-27297 |
7.8 (3.1)
|
Adobe Framemaker | Integer Underflow (Wrap or Wraparou… |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:20.265Z | 2026-04-15T09:13:09.916Z |
| CVE-2026-27300 |
5.5 (3.1)
|
Adobe Framemaker | Access of Uninitialized Pointer (CWE-824) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:18.661Z | 2026-04-15T17:29:10.177Z |
| CVE-2026-27296 |
7.8 (3.1)
|
Adobe Framemaker | Integer Underflow (Wrap or Wraparou… |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:17.850Z | 2026-04-15T09:13:10.081Z |
| CVE-2026-27290 |
8.6 (3.1)
|
Adobe Framemaker | Untrusted Search Path (CWE-426) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:17.003Z | 2026-04-15T09:13:10.218Z |
| CVE-2026-27298 |
7.8 (3.1)
|
Adobe Framemaker | Access of Resource Using Incompatib… |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:16.131Z | 2026-04-15T09:13:10.357Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40499 |
8.4 (4.0)
|
radare2 < 6.1.4 Command Injection via PDB Parser print… |
radareorg |
radare2 |
2026-04-15T02:05:20.899Z | 2026-04-16T14:06:54.448Z |
| CVE-2026-40104 |
6.9 (4.0)
|
XWiki's REST APIs can list all pages/spaces, leading t… |
xwiki |
org.xwiki.platform:xwiki-platform-oldcore |
2026-04-15T00:01:58.583Z | 2026-04-16T14:08:58.592Z |
| CVE-2026-39963 |
6.9 (3.1)
|
Serendipity: Host Header Injection enables authenticat… |
s9y |
Serendipity |
2026-04-14T23:31:13.843Z | 2026-04-15T13:23:48.591Z |
| CVE-2026-39884 |
8.3 (3.1)
|
MCP Server Kubernetes has Argument Injection in its po… |
Flux159 |
mcp-server-kubernetes |
2026-04-14T23:25:59.780Z | 2026-04-15T16:13:59.605Z |
| CVE-2025-54550 |
N/A
|
Apache Airflow: RCE by race condition in example_xcom dag |
Apache Software Foundation |
Apache Airflow |
2026-04-15T00:22:03.305Z | 2026-04-16T12:05:38.834Z |
| CVE-2026-40688 |
6.7 (3.1)
|
An out-of-bounds write vulnerability [CWE-787] vu… |
Fortinet |
FortiWeb |
2026-04-14T22:35:15.438Z | 2026-04-16T03:55:18.342Z |
| CVE-2026-39399 |
9.6 (3.1)
|
NuGet Gallery: Arbitrary Blob Overwrite via Nuspec Con… |
NuGet |
NuGetGallery |
2026-04-14T23:01:38.176Z | 2026-04-15T14:42:02.662Z |
| CVE-2026-39387 |
7.2 (3.1)
|
BoidCMS: Local File Inclusion (LFI) leads to Remote Co… |
BoidCMS |
BoidCMS |
2026-04-14T22:56:20.935Z | 2026-04-15T13:42:26.866Z |
| CVE-2026-35589 |
8 (3.1)
|
nanobot: Cross-Site WebSocket Hijacking in WhatsApp Br… |
HKUDS |
nanobot |
2026-04-14T22:47:32.837Z | 2026-04-15T16:14:06.128Z |
| CVE-2026-35034 |
6.5 (3.1)
|
Jellyfin: Potential Application DoS from excessively l… |
jellyfin |
jellyfin |
2026-04-14T22:31:44.796Z | 2026-04-15T17:48:39.733Z |
| CVE-2026-35033 |
9.3 (4.0)
|
Jellyfin: Potential SSRF + Arbitrary file read via str… |
jellyfin |
jellyfin |
2026-04-14T22:28:47.558Z | 2026-04-15T13:36:26.787Z |
| CVE-2026-35032 |
8.6 (4.0)
|
Jellyfin: Potential SSRF + Arbitrary file read via Liv… |
jellyfin |
jellyfin |
2026-04-14T22:25:35.729Z | 2026-04-15T20:02:29.887Z |
| CVE-2026-35031 |
10 (3.1)
|
Jellyfin: Potential RCE via subtitle upload path trave… |
jellyfin |
jellyfin |
2026-04-14T22:18:30.565Z | 2026-04-16T13:56:06.801Z |
| CVE-2026-34457 |
9.1 (3.1)
|
OAuth2 Proxy: Health Check User-Agent Matching Bypasse… |
oauth2-proxy |
oauth2-proxy |
2026-04-14T22:14:38.937Z | 2026-04-15T17:43:30.711Z |
| CVE-2026-34454 |
3.5 (3.1)
|
OAuth2 Proxy: Session cookie not cleared when renderin… |
oauth2-proxy |
oauth2-proxy |
2026-04-14T22:10:37.901Z | 2026-04-15T13:30:10.300Z |
| CVE-2026-33414 |
4 (4.0)
|
PowerShell Command Injection in Podman HyperV Machine |
containers |
podman |
2026-04-14T22:42:19.822Z | 2026-04-16T13:57:28.317Z |
| CVE-2026-33023 |
7.8 (3.1)
|
libsixel: Use-after-free in load_with_gdkpixbuf() |
saitoha |
libsixel |
2026-04-14T22:05:31.493Z | 2026-04-15T20:02:36.839Z |
| CVE-2026-33021 |
7.3 (3.1)
|
libsixel: Use-after-free in sixel_encoder_encode_bytes() |
saitoha |
libsixel |
2026-04-14T21:57:22.817Z | 2026-04-16T13:54:36.177Z |
| CVE-2026-27301 |
5.5 (3.1)
|
Adobe Framemaker | Heap-based Buffer Overflow (CWE-122) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:13.588Z | 2026-04-15T17:30:38.862Z |
| CVE-2026-27300 |
5.5 (3.1)
|
Adobe Framemaker | Access of Uninitialized Pointer (CWE-824) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:18.661Z | 2026-04-15T17:29:10.177Z |
| CVE-2026-27299 |
6.3 (3.1)
|
Adobe Framemaker | Improper Input Validation (CWE-20) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:12.664Z | 2026-04-15T13:28:12.518Z |
| CVE-2026-27298 |
7.8 (3.1)
|
Adobe Framemaker | Access of Resource Using Incompatib… |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:16.131Z | 2026-04-15T09:13:10.357Z |
| CVE-2026-27297 |
7.8 (3.1)
|
Adobe Framemaker | Integer Underflow (Wrap or Wraparou… |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:20.265Z | 2026-04-15T09:13:09.916Z |
| CVE-2026-27296 |
7.8 (3.1)
|
Adobe Framemaker | Integer Underflow (Wrap or Wraparou… |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:17.850Z | 2026-04-15T09:13:10.081Z |
| CVE-2026-27295 |
7.8 (3.1)
|
Adobe Framemaker | Out-of-bounds Write (CWE-787) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:14.461Z | 2026-04-15T09:13:10.635Z |
| CVE-2026-27294 |
7.8 (3.1)
|
Adobe Framemaker | Out-of-bounds Read (CWE-125) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:15.307Z | 2026-04-15T09:13:10.507Z |
| CVE-2026-27293 |
7.8 (3.1)
|
Adobe Framemaker | Heap-based Buffer Overflow (CWE-122) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:11.812Z | 2026-04-15T09:13:10.769Z |
| CVE-2026-27292 |
7.8 (3.1)
|
Adobe Framemaker | Use After Free (CWE-416) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:10.867Z | 2026-04-15T09:13:10.924Z |
| CVE-2026-27290 |
8.6 (3.1)
|
Adobe Framemaker | Untrusted Search Path (CWE-426) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:17.003Z | 2026-04-15T09:13:10.218Z |
| CVE-2026-40291 |
8.8 (3.1)
|
Chamilo LMS has Privilege Escalation via API User Role… |
chamilo |
chamilo-lms |
2026-04-14T21:37:55.490Z | 2026-04-15T14:24:29.902Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-15483 | The Link Hopper plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘hop_name… | 2026-02-14T07:16:07.067 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-14873 | The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnera… | 2026-02-14T07:16:06.887 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-14852 | The MDirector Newsletter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all ve… | 2026-02-14T07:16:06.433 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1932 | The Appointment Booking Calendar Plugin – Bookr plugin for WordPress is vulnerable to unauthorized … | 2026-02-14T06:16:06.007 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2469 | Versions of the package directorytree/imapengine before 1.22.3 are vulnerable to Improper Neutraliz… | 2026-02-14T05:16:22.270 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2144 | The Magic Login Mail or QR Code plugin for WordPress is vulnerable to Privilege Escalation in all v… | 2026-02-14T05:16:21.973 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2027 | The AMP Enhancer – Compatibility Layer for Official AMP Plugin for WordPress is vulnerable to Store… | 2026-02-14T05:16:21.313 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1983 | The SEATT: Simple Event Attendance plugin for WordPress is vulnerable to Cross-Site Request Forgery… | 2026-02-14T05:16:20.140 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1912 | The Citations tools plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'code… | 2026-02-14T05:16:19.543 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1904 | The Simple Wp colorfull Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting… | 2026-02-14T05:16:19.327 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1754 | The personal-authors-category plugin for WordPress is vulnerable to Reflected Cross-Site Scripting … | 2026-02-14T05:16:19.143 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1164 | The Easy Voice Mail plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘mess… | 2026-02-14T05:16:17.593 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0692 | The BlueSnap Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authoriz… | 2026-02-14T05:16:16.923 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-26303 | Rejected reason: Not used | 2026-02-14T04:15:57.600 | 2026-02-14T04:15:57.600 |
| fkie_cve-2026-26302 | Rejected reason: Not used | 2026-02-14T04:15:57.540 | 2026-02-14T04:15:57.540 |
| fkie_cve-2026-26301 | Rejected reason: Not used | 2026-02-14T04:15:57.487 | 2026-02-14T04:15:57.487 |
| fkie_cve-2026-26300 | Rejected reason: Not used | 2026-02-14T04:15:57.427 | 2026-02-14T04:15:57.427 |
| fkie_cve-2026-26299 | Rejected reason: Not used | 2026-02-14T04:15:57.363 | 2026-02-14T04:15:57.363 |
| fkie_cve-2026-26298 | Rejected reason: Not used | 2026-02-14T04:15:57.307 | 2026-02-14T04:15:57.307 |
| fkie_cve-2026-26297 | Rejected reason: Not used | 2026-02-14T04:15:57.247 | 2026-02-14T04:15:57.247 |
| fkie_cve-2026-26296 | Rejected reason: Not used | 2026-02-14T04:15:57.190 | 2026-02-14T04:15:57.190 |
| fkie_cve-2026-26295 | Rejected reason: Not used | 2026-02-14T04:15:57.107 | 2026-02-14T04:15:57.107 |
| fkie_cve-2025-14608 | The WP Last Modified Info plugin for WordPress is vulnerable to Insecure Direct Object Reference in… | 2026-02-14T04:15:56.643 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-14067 | The Easy Form Builder plugin for WordPress is vulnerable to unauthorized access of data due to a mi… | 2026-02-14T04:15:56.480 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-13973 | The StickEasy Protected Contact Form plugin for WordPress is vulnerable to Sensitive Information Di… | 2026-02-14T04:15:56.313 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-13681 | The BFG Tools – Extension Zipper plugin for WordPress is vulnerable to Path Traversal in all versio… | 2026-02-14T04:15:56.123 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-24853 | Caido is a web security auditing toolkit. Prior to 0.55.0, Caido blocks non whitelisted domains to … | 2026-02-13T23:16:11.800 | 2026-02-24T20:32:18.710 |
| fkie_cve-2026-26273 | Known is a social publishing platform. Prior to 1.6.3, a Critical Broken Authentication vulnerabili… | 2026-02-13T22:16:11.330 | 2026-02-18T21:01:56.787 |
| fkie_cve-2026-1844 | The PixelYourSite PRO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'py… | 2026-02-13T22:16:11.007 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1841 | The PixelYourSite – Your smart PIXEL (TAG) & API Manager plugin for WordPress is vulnerable to Stor… | 2026-02-13T22:16:10.833 | 2026-04-15T00:35:42.020 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2hx3-vp6r-mg3f |
7.3 (4.0)
|
Kiota: Code Generation Literal Injection | 2026-04-14T23:39:41Z | 2026-04-14T23:39:41Z |
| ghsa-fj52-5g4h-gmq8 |
2.9 (4.0)
|
pyLoad's Session Not Invalidated After Permission Changes | 2026-04-14T23:39:25Z | 2026-04-14T23:39:25Z |
| ghsa-66hx-chf7-3332 |
8.8 (3.1)
|
pyLoad has Stale Session Privilege After Role/Permission Change (Privilege Revocation Bypass) | 2026-04-14T23:38:35Z | 2026-04-14T23:38:35Z |
| ghsa-95wr-3f2v-v2wh |
5.5 (4.0)
|
Craft CMS has a host header injection leading to SSRF via resource-js endpoint | 2026-04-14T23:36:09Z | 2026-04-14T23:36:10Z |
| ghsa-3m9m-24vh-39wx |
5.5 (4.0)
|
Server-Side Request Forgery (SSRF) in Craft CMS with Asset Uploads Mutations | 2026-04-14T23:35:16Z | 2026-04-14T23:35:16Z |
| ghsa-jq2f-59pj-p3m3 |
5.3 (4.0)
|
Craft CMS has a Missing Authorization Check on User Group Removal via save-permissions Action | 2026-04-14T23:34:52Z | 2026-04-14T23:34:52Z |
| ghsa-hw5x-4r37-72w7 |
3.1 (3.1)
|
OpenTofu has unbounded memory usage, high CPU usage, or deadlock in "tofu init" with maliciously-cr… | 2026-04-14T23:34:08Z | 2026-04-14T23:34:09Z |
| ghsa-fcpv-w245-r2q7 |
|
DotNetNuke.Core security code analysis rules triggered | 2026-04-14T23:33:30Z | 2026-04-14T23:33:30Z |
| ghsa-pq96-pwvg-vrr9 |
6.5 (3.1)
|
frp has an authentication bypass in HTTP vhost routing when routeByHTTPUser is used for access control | 2026-04-14T23:33:15Z | 2026-04-14T23:33:15Z |
| ghsa-x928-4434-crqj |
3.7 (3.1)
|
ImageMagick has a memory leak in PNG encoder when writing a MNG image | 2026-04-14T23:32:44Z | 2026-04-16T15:49:58Z |
| ghsa-pmpg-6pww-fg6q |
3.3 (3.1)
|
ImageMagick has out-of-bounds access in ConnectedComponentsImage() via CLI-controlled connected-com… | 2026-04-14T23:32:35Z | 2026-04-16T15:54:56Z |
| ghsa-8vfj-q2cp-5m5j |
3.3 (3.1)
|
ImageMagick has a heap buffer overflow read in magnify operation via unrecognized magnify:method value | 2026-04-14T23:32:22Z | 2026-04-16T15:33:26Z |
| ghsa-98cp-rj9f-6v5g |
6.9 (3.1)
|
ImageMagick has has a stack-buffer-overflow in MNG encoder with oversized pallete | 2026-04-14T23:31:52Z | 2026-04-16T15:16:07Z |
| ghsa-q8h3-jv9v-57qx |
3.3 (3.1)
|
ImageMagick has has an off-by-one origin validation in allows out-of-bounds read in morphology processing | 2026-04-14T23:31:38Z | 2026-04-16T15:32:16Z |
| ghsa-w54j-7wpm-crhj |
3.3 (3.1)
|
ImageMagick has a heap-buffer-overflow in FTXT encoder | 2026-04-14T23:31:31Z | 2026-04-16T15:48:06Z |
| ghsa-w3x6-4m5h-cxqf |
7.5 (3.1)
|
Microsoft Security Advisory CVE-2026-26171 – .NET Denial of Service Vulnerability | 2026-04-14T23:31:08Z | 2026-04-15T16:10:52Z |
| ghsa-37gx-xxp4-5rgx |
7.5 (3.1)
|
Microsoft Security Advisory CVE-2026-33116 – .NET, .NET Framework, and Visual Studio Denial of Serv… | 2026-04-14T23:30:27Z | 2026-04-15T16:44:52Z |
| ghsa-vmwf-m9c5-3jvc |
0.0 (3.1)
|
Microsoft Security Advisory CVE-2026-32178 – .NET Spoofing Vulnerability | 2026-04-14T23:27:52Z | 2026-04-14T23:27:52Z |
| ghsa-pq8p-wc4f-vg7j |
8.8 (4.0)
|
WWBN AVideo has an incomplete fix for CVE-2026-33502: Command Injection | 2026-04-14T23:27:18Z | 2026-04-14T23:27:18Z |
| ghsa-m7r8-6q9j-m2hc |
5.9 (4.0)
|
WWBN AVideo has an incomplete fix for CVE-2026-33500: XSS | 2026-04-14T23:25:28Z | 2026-04-14T23:25:28Z |
| ghsa-m63r-m9jh-3vc6 |
6.5 (3.1)
|
WWBN AVideo has an Incomplete fix: Directory traversal bypass via query string in ReceiveImage down… | 2026-04-14T23:23:14Z | 2026-04-14T23:23:14Z |
| ghsa-26wg-9xf2-q495 |
8.1 (3.1)
|
Novu has a XSS sanitization bypass | 2026-04-14T23:23:01Z | 2026-04-14T23:23:01Z |
| ghsa-4x48-cgf9-q33f |
|
Novu has SSRF via conditions filter webhook bypasses validateUrlSsrf() protection | 2026-04-14T23:22:48Z | 2026-04-14T23:22:48Z |
| ghsa-8pv3-29pp-pf8f |
5.4 (3.1)
|
WWBN AVideo has Stored XSS via Unanchored Duration Regex in Video Encoder Receiver | 2026-04-14T23:22:21Z | 2026-04-14T23:22:21Z |
| ghsa-j432-4w3j-3w8j |
7.7 (3.1)
|
WWBN AVideo has a SSRF via same-domain hostname with alternate port bypasses isSSRFSafeURL | 2026-04-14T23:22:01Z | 2026-04-14T23:22:01Z |
| ghsa-5879-4fmr-xwf2 |
6.9 (4.0)
|
WWBN AVideo has an incomplete fix for CVE-2026-33293: Path Traversal | 2026-04-14T23:21:31Z | 2026-04-14T23:21:31Z |
| ghsa-ff5q-cc22-fgp4 |
7.1 (3.1)
|
WWBN AVideo has a CORS Origin Reflection Bypass via plugin/API/router.php and allowOrigin(true) Exp… | 2026-04-14T23:18:28Z | 2026-04-14T23:18:28Z |
| ghsa-ccq9-r5cw-5hwq |
8.1 (3.1)
|
WWBN AVideo has CORS Origin Reflection with Credentials on Sensitive API Endpoints Enables Cross-Or… | 2026-04-14T23:18:19Z | 2026-04-14T23:18:19Z |
| ghsa-793q-xgj6-7frp |
5.3 (3.1)
|
WWBN AVideo has an incomplete fix for CVE-2026-33039: SSRF | 2026-04-14T23:15:43Z | 2026-04-14T23:15:43Z |
| ghsa-7jrq-q4pq-rhm6 |
8.0 (4.0)
|
Oxia's TLS CA certificate chain validation fails with multi-certificate PEM bundles | 2026-04-14T23:15:16Z | 2026-04-14T23:15:16Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-34 |
9.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6-server | 2024-01-30T16:15:00+00:00 | 2024-02-08T20:20:16.896186+00:00 |
| pysec-2024-33 |
9.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6-node | 2024-01-30T16:15:00+00:00 | 2024-02-08T20:20:16.842528+00:00 |
| pysec-2024-32 |
4.3 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.342089+00:00 |
| pysec-2024-31 |
3.7 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.276390+00:00 |
| pysec-2024-30 |
8.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.210087+00:00 |
| pysec-2024-25 |
9.8 (3.1)
|
DuckDB <=0.9.2 and DuckDB extension-template <=0.9.2 are vulnerable to malicious extensio… | duckdb | 2024-01-30T01:16:00+00:00 | 2024-02-06T00:25:51.550516+00:00 |
| pysec-2024-27 |
9.8 (3.1)
|
CrateDB 5.5.1 is contains an authentication bypass vulnerability in the Admin UI componen… | crate | 2024-01-30T01:15:00Z | 2025-01-30T22:47:57.847403Z |
| pysec-2024-26 |
6.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-… | aiohttp | 2024-01-29T23:15:00+00:00 | 2024-02-06T20:20:18.162431+00:00 |
| pysec-2024-24 |
7.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When usin… | aiohttp | 2024-01-29T23:15:00+00:00 | 2024-02-05T20:20:47.716944+00:00 |
| pysec-2024-21 |
8.8 (3.1)
|
A vulnerability classified as critical was found in van_der_Schaar LAB TemporAI 0.0.3. Af… | temporai | 2024-01-26T17:15:00+00:00 | 2024-02-01T18:22:23.971296+00:00 |
| pysec-2024-14 |
|
Apache Airflow, versions before 2.8.1, have a vulnerability that allows an authenticated … | apache-airflow | 2024-01-24T13:15:00+00:00 | 2024-01-24T16:22:57.416385+00:00 |
| pysec-2024-13 |
|
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attac… | apache-airflow | 2024-01-24T13:15:00+00:00 | 2024-01-24T16:22:57.352530+00:00 |
| pysec-2024-128 |
6.1 (3.1)
|
Label Studio, an open source data labeling tool had a remote import feature allowed users… | label-studio | 2024-01-24T00:15:00+00:00 | 2024-11-21T14:22:53.406222+00:00 |
| pysec-2024-126 |
5.4 (3.1)
|
Label Studio is an a popular open source data labeling tool. Versions prior to 1.9.2 have… | label-studio | 2024-01-23T23:15:00+00:00 | 2024-11-21T14:22:53.235341+00:00 |
| pysec-2024-23 |
5.3 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. Versions 0.8.3 and prior have a limite… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-02-02T07:18:33.382718+00:00 |
| pysec-2024-22 |
6.1 (3.1)
|
TuiTse-TsuSin is a package for organizing the comparative corpus of Taiwanese Chinese cha… | tuitse-tsusin | 2024-01-23T18:15:00+00:00 | 2024-02-01T22:21:01.486817+00:00 |
| pysec-2024-20 |
9.8 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions prior to 0.8.4, the `eleme… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-30T18:22:32.803340+00:00 |
| pysec-2024-19 |
6.1 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the `elem… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-29T22:21:01.226431+00:00 |
| pysec-2024-18 |
9.8 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the `wind… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-29T22:21:01.170723+00:00 |
| pysec-2024-16 |
5.4 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2024-01-23T00:15:00+00:00 | 2024-01-29T20:20:58.065227+00:00 |
| pysec-2024-9 |
|
MetaGPT through 0.6.4 allows the QaEngineer role to execute arbitrary code because RunCod… | metagpt | 2024-01-22T01:15:00+00:00 | 2024-01-22T07:20:28.329958+00:00 |
| pysec-2024-12 |
|
LlamaIndex (aka llama_index) through 0.9.34 allows SQL injection via the Text-to-SQL feat… | llama-index | 2024-01-22T01:15:00Z | 2024-02-10T01:22:25.611009Z |
| pysec-2024-8 |
|
The JSON loader in Embedchain before 0.1.57 allows a ReDoS (regular expression denial of … | embedchain | 2024-01-21T17:15:00+00:00 | 2024-01-21T20:21:00.544327+00:00 |
| pysec-2024-7 |
|
The OpenAPI loader in Embedchain before 0.1.57 allows attackers to execute arbitrary code… | embedchain | 2024-01-21T17:15:00+00:00 | 2024-01-21T20:21:00.484037+00:00 |
| pysec-2024-15 |
3.7 (3.1)
|
changedetection.io is an open source tool designed to monitor websites for content chang… | changedetection-io | 2024-01-19T20:15:00+00:00 | 2024-01-26T22:21:10.756741+00:00 |
| pysec-2024-103 |
9.8 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. The `concat… | vyper | 2024-01-18T19:15:00+00:00 | 2024-10-09T23:22:49.818476+00:00 |
| pysec-2024-17 |
8.8 (3.1)
|
pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` AP… | pyload-ng | 2024-01-18T00:15:00+00:00 | 2024-01-29T20:20:58.389168+00:00 |
| pysec-2024-11 |
9.8 (3.1)
|
Remote Code Execution vulnerability in Apache IoTDB.This issue affects Apache IoTDB: from… | apache-iotdb | 2024-01-15T11:15:00+00:00 | 2024-01-22T22:21:02.620877+00:00 |
| pysec-2024-10 |
9.8 (3.1)
|
In Gentoo Portage before 3.0.47, there is missing PGP validation of executed code: the st… | portage | 2024-01-12T03:15:00+00:00 | 2024-01-22T18:22:47.599296+00:00 |
| pysec-2024-6 |
2.8 (3.1)
|
cdo-local-uuid project provides a specialized UUID-generating function that can, on user … | cdo-local-uuid | 2024-01-11T03:15:00+00:00 | 2024-01-19T22:21:07.454006+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2546 | Malicious code in hex2pcap (PyPI) | 2026-04-11T08:16:27Z | 2026-04-11T08:49:58Z |
| mal-2026-2545 | Malicious code in @sap-px/pxapi (npm) | 2026-04-11T04:45:40Z | 2026-04-13T15:48:02Z |
| mal-2026-2544 | Malicious code in roboat-utilities (PyPI) | 2026-04-10T21:23:20Z | 2026-04-16T07:40:04Z |
| mal-2026-2543 | Malicious code in robase (PyPI) | 2026-04-10T21:22:56Z | 2026-04-16T07:40:04Z |
| mal-2026-2542 | Malicious code in databasetrace (PyPI) | 2026-04-10T21:22:24Z | 2026-04-16T07:40:04Z |
| mal-2026-2538 | Malicious code in bogus-nydus-op (PyPI) | 2026-04-10T18:23:04Z | 2026-04-10T18:23:04Z |
| mal-2026-2540 | Malicious code in gd-auth (PyPI) | 2026-04-10T18:22:48Z | 2026-04-10T18:22:48Z |
| mal-2026-2541 | Malicious code in gd-auth-sso (PyPI) | 2026-04-10T18:22:28Z | 2026-04-10T18:22:28Z |
| mal-2026-2539 | Malicious code in customer-local-ops (PyPI) | 2026-04-10T18:22:06Z | 2026-04-10T18:22:06Z |
| mal-2026-2537 | Malicious code in @b2b-portal/form (npm) | 2026-04-10T16:43:07Z | 2026-04-13T15:48:02Z |
| mal-2026-2532 | Malicious code in emd-ext (PyPI) | 2026-04-10T15:33:38Z | 2026-04-10T15:35:13Z |
| mal-2026-2536 | Malicious code in yhaplo1 (PyPI) | 2026-04-10T15:31:12Z | 2026-04-10T15:31:12Z |
| mal-2026-2531 | Malicious code in bonsaitree1 (PyPI) | 2026-04-10T15:30:19Z | 2026-04-10T15:30:19Z |
| mal-2026-2534 | Malicious code in siempyl-sumo (PyPI) | 2026-04-10T15:29:26Z | 2026-04-10T15:29:26Z |
| mal-2026-2535 | Malicious code in ttam (PyPI) | 2026-04-10T15:28:37Z | 2026-04-10T15:28:37Z |
| mal-2026-2533 | Malicious code in phasedibd (PyPI) | 2026-04-10T15:27:24Z | 2026-04-10T15:27:24Z |
| mal-2026-2530 | Malicious code in noonhelpers (PyPI) | 2026-04-10T12:02:29Z | 2026-04-10T12:02:29Z |
| mal-2026-2527 | Malicious code in sjs-biginteger (npm) | 2026-04-09T14:05:08Z | 2026-04-10T17:23:36Z |
| mal-2026-2528 | Malicious code in sjs-lint-build1 (npm) | 2026-04-09T14:04:30Z | 2026-04-10T17:23:36Z |
| mal-2026-2522 | Malicious code in st-payment (PyPI) | 2026-04-09T13:30:26Z | 2026-04-09T13:30:26Z |
| mal-2026-2521 | Malicious code in gc-grocery-api (PyPI) | 2026-04-09T13:29:38Z | 2026-04-09T13:29:38Z |
| mal-2026-2520 | Malicious code in @signals-notebook/utils (npm) | 2026-04-09T11:05:56Z | 2026-04-10T17:23:32Z |
| mal-2026-2523 | Malicious code in @telekom-wfa/auth-core (npm) | 2026-04-09T08:25:05Z | 2026-04-10T17:23:32Z |
| mal-2026-2519 | Malicious code in just4testlm (PyPI) | 2026-04-09T07:28:17Z | 2026-04-09T08:40:08Z |
| mal-2026-2518 | Malicious code in viewer-assets-generator (npm) | 2026-04-09T03:10:01Z | 2026-04-13T15:48:07Z |
| mal-2026-2517 | Malicious code in kraken-trader (PyPI) | 2026-04-08T20:22:02Z | 2026-04-08T20:22:02Z |
| mal-2026-2516 | Malicious code in sentinel-tool (PyPI) | 2026-04-08T16:31:08Z | 2026-04-08T16:31:08Z |
| mal-2026-2515 | Malicious code in granulate-utils (PyPI) | 2026-04-08T12:34:04Z | 2026-04-08T12:34:04Z |
| mal-2026-2514 | Malicious code in gprofiler-logging (PyPI) | 2026-04-08T12:33:58Z | 2026-04-08T12:33:58Z |
| mal-2026-2513 | Malicious code in gprofiler (npm) | 2026-04-08T11:45:58Z | 2026-04-14T12:40:52Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0129 | Golang Go: Mehrere Schwachstellen | 2026-01-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0126 | libxml2: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-15T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0121 | Drupal Module: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0119 | Linux Kernel: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0118 | GNU libc: Schwachstelle ermöglicht Codeausführung | 2026-01-14T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0116 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0114 | Red Hat OpenShift (github.com/sirupsen/logrus): Schwachstelle ermöglicht Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0111 | FreeRDP: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0106 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0105 | Red Hat Developer Hub: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0098 | Node.js: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0096 | Google Android Pixel: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-01-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0090 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0088 | Fortinet FortiSandbox: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-01-13T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0086 | Linux Kernel: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0083 | Microsoft Windows : Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0081 | Microsoft Office Produkte: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-03-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0080 | Microsoft Azure: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0068 | libpng (API-Funktionen): Mehrere Schwachstellen ermöglichen DoS und Offenlegung von Informationen | 2026-01-12T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0066 | avahi-daemon: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-12T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0062 | Red Hat Enterprise Linux (libsoup): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und Datenmanipulation | 2026-01-11T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0056 | MailPit: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-11T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0047 | CoreDNS: Schwachstelle ermöglicht Denial of Service | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0044 | libtasn1: Schwachstelle ermöglicht Denial of Service | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0043 | Trend Micro Apex Central: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0041 | Cisco Firewall Threat Defense, IOS XE und Meraki MX: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0040 | n8n: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0037 | GitLab CE und EE: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2026-0036 | OpenLDAP: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0035 | MediaWiki Erweiterungen: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-259-04 | Siemens RUGGEDCOM, SINEC NMS, and SINEMA | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-03 | Siemens SIMATIC NET CP, SINEMA and SCALANCE | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-02 | Hitachi Energy RTU500 series | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| va-25-259-01 | CISA Thorium multiple vulnerabilities | 2025-09-16T00:00:00Z | 2025-09-16T00:00:00Z |
| va-25-258-01 | psPAS does not enforce TLS 1.2 within Get-PASSAMLResponse | 2025-09-15T18:41:08Z | 2025-09-15T18:41:08Z |
| icsa-25-254-10 | Daikin Europe N.V Security Gateway | 2025-09-11T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| va-25-252-01 | OPEXUS FOIAXpress Public Access Link (PAL) SQL injection | 2025-09-09T20:48:26Z | 2025-09-09T20:48:26Z |
| icsa-25-252-09 | Rockwell Automation 1783-NATR | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-08 | Rockwell Automation Analytics LogixAI | 2025-09-09T06:00:00.000000Z | 2025-10-10T06:00:00.000000Z |
| icsa-25-252-07 | Rockwell Automation ControlLogix 5580 | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-06 | Rockwell Automation CompactLogix® 5480 | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-05 | Rockwell Automation FactoryTalk Activation Manager | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-04 | Rockwell Automation FactoryTalk Optix | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-03 | Rockwell Automation Stratix IOS | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-01 | Rockwell Automation ThinManager | 2025-09-09T06:00:00.000000Z | 2025-09-09T06:00:00.000000Z |
| icsa-25-252-02 | ABB Cylon Aspect BMS/BAS | 2025-09-09T05:00:00.000000Z | 2025-09-09T05:00:00.000000Z |
| icsa-25-259-01 | Schneider Electric Altivar products ATVdPAC module ILC992 InterLink Converter (Update A) | 2025-09-09T04:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-254-07 | Siemens User Management Component (UMC) | 2025-09-09T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-254-06 | Siemens Industrial Edge Management | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-254-05 | Siemens Apogee PXC and Talon TC Devices | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-254-04 | Siemens SINEC OS | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-254-03 | Siemens SINAMICS Drives | 2025-09-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-254-02 | Siemens SIMATIC Virtualization as a Service (SIVaaS) | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-254-01 | Siemens SIMOTION Tools | 2025-09-09T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-245-03 | SunPower PVS6 | 2025-09-02T06:00:00.000000Z | 2025-09-02T06:00:00.000000Z |
| icsa-25-245-02 | Fuji Electric FRENIC-Loader 4 | 2025-09-02T06:00:00.000000Z | 2025-09-02T06:00:00.000000Z |
| icsa-25-245-01 | Delta Electronics EIP Builder | 2025-09-02T06:00:00.000000Z | 2025-09-02T06:00:00.000000Z |
| icsa-25-240-06 | GE Vernova CIMPLICITY | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| icsa-25-240-05 | Delta Electronics COMMGR | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| icsa-25-240-04 | Delta Electronics CNCSoft-G2 | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-backhaul-ap-cmdinj-r7e28ecs | Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-3550-acl-bypass-mhskzc2q | Cisco Nexus 3550-F Switches Access Control List Programming Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-snort-rf-bypass-oy8f3pnm | Multiple Cisco Products Snort Rate Filter Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2025-01-13T16:44:31+00:00 |
| cisco-sa-snort-bypass-ptry37fx | Cisco Firepower Threat Defense Software TCP Snort 3 Detection Engine Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-sa-ftd-snort-fw-bcjtzpmu | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services TCP/IP Traffic with Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd2100-snort-dos-m9humt75 | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Appliances TCP UDP Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-vdb-snort-djj4cnbr | Cisco Firepower Threat Defense Software Vulnerability Database with Snort Detection Engine Security Policy Bypass and Denial of Service Issue | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-tls-dos-qxye5ufy | Cisco Firepower Threat Defense Software for Firepower 2100 Series TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-statcred-dfc8txt5 | Cisco Firepower Threat Defense Software for Firepower 1000, 2100, 3100, and 4200 Series Static Credential Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-geoip-bypass-mb4zrdu | Cisco Firepower Threat Defense Software Geolocation ACL Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-xss-infodisc-rl4mjfer | Cisco Secure Firewall Management Center Software Cross-Site Scripting and Information Disclosure Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-24T11:52:38+00:00 |
| cisco-sa-fmc-xss-dhjxqyzs | Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-sql-inject-2enmtc8v | Cisco Secure Firewall Management Center Software SQL Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2026-03-04T16:11:01+00:00 |
| cisco-sa-fmc-sql-inj-loyafcfq | Cisco Secure Firewall Management Center Software SQL Injection Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-priv-esc-cmq4s6m7 | Cisco Secure Firewall Management Center Privilege Escalation Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-html-inj-nfjeyhxz | Cisco Secure Firewall Management Center Software HTML Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-file-read-5q4mqrn | Cisco Secure Firewall Management Center Software Arbitrary File Read Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-v3awdqn7 | Cisco Secure Firewall Management Center Software Command Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-g8aokndp | Cisco Secure Firewall Management Center Software Cluster Backup Command Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-2hbka97g | Cisco Secure Firewall Management Center Software Command Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-csc-dos-xvphm3bj | Cisco Secure Client Software Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftdvirtual-dos-muengnyr | Cisco Adaptive Security Virtual Appliance and Secure Firewall Threat Defense Virtual SSL VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-xss-yjj7zjvq | Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Web Client Services Cross-Site Scripting Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-webvpn-dos-honb9ph4 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software SSL VPN Memory Management Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-snmp-dos-7tcnzxtu | Cisco Adaptive Security Appliance and Firepower Threat Defense Software SNMP Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-persist-lce-vu3ekmj3 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-nsgacl-bypass-77xneasl | Cisco Adaptive Security Appliance and Firepower Threat Defense Software NSG Access Control List Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-ikev2-dos-9fgeyhsf | Cisco Adaptive Security Appliance and Firepower Threat Defense Software IKEv2 VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-dap-dos-bhekp7n | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Dynamic Access Policies Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-bf-dos-vdzhlqrw | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Brute Force Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-28387 | Potential Use-after-free in DANE Client Code | 2026-04-02T00:00:00.000Z | 2026-04-15T01:44:18.000Z |
| msrc_cve-2026-27456 | util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup | 2026-04-02T00:00:00.000Z | 2026-04-14T14:44:40.000Z |
| msrc_cve-2026-27447 | OpenPrinting CUPS: Authorization bypass via case-insensitive group-member lookup | 2026-04-02T00:00:00.000Z | 2026-04-07T01:40:54.000Z |
| msrc_cve-2026-27144 | Miscompilation allows memory corruption via CONVNOP-wrapped array copy in cmd/compile | 2026-04-02T00:00:00.000Z | 2026-04-15T01:47:59.000Z |
| msrc_cve-2026-27143 | Missing bound checks can lead to memory corruption in safe Go in cmd/compile | 2026-04-02T00:00:00.000Z | 2026-04-15T01:48:42.000Z |
| msrc_cve-2026-27140 | Code execution vulnerability in SWIG code generation in cmd/go | 2026-04-02T00:00:00.000Z | 2026-04-15T01:49:03.000Z |
| msrc_cve-2026-23473 | io_uring/poll: fix multishot recv missing EOF on wakeup race | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:05.000Z |
| msrc_cve-2026-23472 | serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:10.000Z |
| msrc_cve-2026-23468 | drm/amdgpu: Limit BO list entry count to prevent resource exhaustion | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:20.000Z |
| msrc_cve-2026-23444 | wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:15.000Z |
| msrc_cve-2026-23442 | ipv6: add NULL checks for idev in SRv6 paths | 2026-04-02T00:00:00.000Z | 2026-04-07T01:41:25.000Z |
| msrc_cve-2026-23411 | apparmor: fix race between freeing data and fs accessing it | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:58.000Z |
| msrc_cve-2026-23410 | apparmor: fix race on rawdata dereference | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:51.000Z |
| msrc_cve-2026-23409 | apparmor: fix differential encoding verification | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:45.000Z |
| msrc_cve-2026-23408 | apparmor: Fix double free of ns_name in aa_replace_profiles() | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:39.000Z |
| msrc_cve-2026-23407 | apparmor: fix missing bounds check on DEFAULT table in verify_dfa() | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:33.000Z |
| msrc_cve-2026-23406 | apparmor: fix side-effect bug in match_char() macro usage | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:27.000Z |
| msrc_cve-2026-23405 | apparmor: fix: limit the number of levels of policy namespaces | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:21.000Z |
| msrc_cve-2026-23404 | apparmor: replace recursive profile removal with iterative approach | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:14.000Z |
| msrc_cve-2026-23403 | apparmor: fix memory leak in verify_header | 2026-04-02T00:00:00.000Z | 2026-04-10T01:02:07.000Z |
| msrc_cve-2026-23401 | KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE | 2026-04-02T00:00:00.000Z | 2026-04-03T01:39:03.000Z |
| msrc_cve-2026-1502 | HTTP client proxy tunnel headers not validated for CR/LF | 2026-04-02T00:00:00.000Z | 2026-04-15T01:04:59.000Z |
| msrc_cve-2025-62718 | Axios has a NO_PROXY Hostname Normalization Bypass Leads to SSRF | 2026-04-02T00:00:00.000Z | 2026-04-15T01:05:34.000Z |
| msrc_cve-2026-32194 | Microsoft Bing Images Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-19T07:00:00.000Z |
| msrc_cve-2026-32191 | Microsoft Bing Images Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-19T07:00:00.000Z |
| msrc_cve-2026-32187 | Microsoft Edge (Chromium-based) Defense in Depth Vulnerability - Rejected | 2026-03-10T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32169 | Azure Cloud Shell Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-19T07:00:00.000Z |
| msrc_cve-2026-26148 | Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-11T07:00:00.000Z |
| msrc_cve-2026-26144 | Microsoft Excel Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26141 | Hybrid Worker Extension (Arc‑enabled Windows VMs) Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0256 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-08-13T09:59:45.240348Z | 2025-08-13T09:59:45.240348Z |
| ncsc-2025-0255 | Kwetsbaarheden verholpen in Fortinet producten | 2025-08-13T09:16:29.067287Z | 2025-08-13T09:35:40.587034Z |
| ncsc-2025-0254 | Kwetsbaarheden verholpen in Zoom | 2025-08-13T09:09:21.491424Z | 2025-08-13T09:09:21.491424Z |
| ncsc-2025-0253 | Kwetsbaarheden verholpen in Ivanti Connect Secure, Policy Secure en ZTA Gateways | 2025-08-13T09:06:58.420498Z | 2025-08-13T09:06:58.420498Z |
| ncsc-2025-0252 | Kwetsbaarheden verholpen in Microsoft Exchange Server | 2025-08-13T07:29:24.639524Z | 2025-08-13T07:29:24.639524Z |
| ncsc-2025-0251 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-08-13T07:25:08.789693Z | 2025-08-13T07:25:08.789693Z |
| ncsc-2025-0250 | Kwetsbaarheden verholpen in Microsoft Office | 2025-08-13T07:23:56.395786Z | 2025-08-13T07:23:56.395786Z |
| ncsc-2025-0249 | Kwetsbaarheden verholpen in Azure-producten | 2025-08-13T07:22:17.432067Z | 2025-08-13T07:22:17.432067Z |
| ncsc-2025-0248 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-08-13T07:21:52.836899Z | 2025-08-13T07:21:52.836899Z |
| ncsc-2025-0247 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-08-13T07:19:19.911308Z | 2025-08-13T07:19:19.911308Z |
| ncsc-2025-0246 | Kwetsbaarheden verholpen in Siemens producten | 2025-08-12T13:03:08.211775Z | 2025-08-12T13:03:08.211775Z |
| ncsc-2025-0245 | Kwetsbaarheden verholpen in SAP producten | 2025-08-12T11:10:21.111816Z | 2025-09-05T11:12:05.722381Z |
| ncsc-2025-0244 | Kwetsbaarheid verholpen in WinRAR | 2025-08-11T07:36:12.848669Z | 2025-08-11T07:36:12.848669Z |
| ncsc-2025-0243 | Kwetsbaarheid verholpen in Microsoft Exchange | 2025-08-07T09:15:22.461434Z | 2025-08-07T09:15:22.461434Z |
| ncsc-2025-0242 | Kwetsbaarheden verholpen in Trend Micro Apex One | 2025-08-06T13:21:03.156432Z | 2025-08-06T13:21:03.156432Z |
| ncsc-2025-0241 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-08-06T12:11:46.234849Z | 2025-10-17T10:44:55.312550Z |
| ncsc-2025-0240 | Kwetsbaarheden verholpen in Rockwell Automation Arena | 2025-08-06T07:55:23.705278Z | 2025-08-06T07:55:23.705278Z |
| ncsc-2025-0239 | Kwetsbaarheid verholpen in SonicWall SonicOS | 2025-07-31T11:12:42.653547Z | 2025-07-31T11:12:42.653547Z |
| ncsc-2025-0238 | Kwetsbaarheden verholpen in Apple macOS, iOS en iPadOS | 2025-07-30T13:02:51.663320Z | 2025-07-30T13:02:51.663320Z |
| ncsc-2025-0237 | Kwetsbaarheden verholpen in Autodesk AutoCAD | 2025-07-30T08:04:31.603165Z | 2025-07-30T08:04:31.603165Z |
| ncsc-2025-0236 | Kwetsbaarheden verholpen in Salesforce Tableau Server | 2025-07-28T07:52:42.872259Z | 2025-07-28T07:52:42.872259Z |
| ncsc-2025-0235 | Kwetsbaarheden verholpen in Firefox en Thunderbird | 2025-07-23T13:01:45.118883Z | 2025-07-23T13:01:45.118883Z |
| ncsc-2025-0234 | Kwetsbaarheid verholpen in CrushFTP | 2025-07-21T08:34:35.304610Z | 2025-08-28T07:59:34.275023Z |
| ncsc-2025-0233 | Zeroday-kwetsbaarheden ontdekt in Microsoft SharePoint Server | 2025-07-20T08:34:22.645952Z | 2025-07-23T15:31:20.529389Z |
| ncsc-2025-0232 | Kwetsbaarheid verholpen in Keycloak | 2025-07-18T13:12:14.074394Z | 2025-07-18T13:12:14.074394Z |
| ncsc-2025-0231 | Kwetsbaarheden verholpen in XWiki | 2025-07-17T12:35:48.998487Z | 2025-07-17T12:35:48.998487Z |
| ncsc-2025-0230 | Kwetsbaarheid verholpen in Wing FTP Server | 2025-07-14T06:06:24.154078Z | 2025-07-14T06:06:24.154078Z |
| ncsc-2025-0229 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2025-07-11T10:01:48.229418Z | 2025-07-11T10:01:48.229418Z |
| ncsc-2025-0228 | Kwetsbaarheden verholpen in Zoom Clients | 2025-07-11T09:58:21.871103Z | 2025-07-11T09:58:21.871103Z |
| ncsc-2025-0227 | Kwetsbaarheid verholpen in Juniper SRX300 Series | 2025-07-11T09:57:40.476096Z | 2025-07-11T09:57:40.476096Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10349-1 | ruby4.0-rubygem-http-cookie-1.0.8-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10348-1 | ruby4.0-rubygem-grpc-1.70.1-1.7 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10347-1 | ruby4.0-rubygem-globalid-1.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10346-1 | ruby4.0-rubygem-fluentd-1.17.1-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10345-1 | ruby4.0-rubygem-activesupport-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10344-1 | ruby4.0-rubygem-activestorage-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10343-1 | ruby4.0-rubygem-activerecord-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10342-1 | ruby4.0-rubygem-activemodel-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10341-1 | ruby4.0-rubygem-activejob-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10340-1 | ruby4.0-rubygem-actionview-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10339-1 | ruby4.0-rubygem-actiontext-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10338-1 | ruby4.0-rubygem-actionpack-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10337-1 | ruby4.0-rubygem-actionmailer-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10336-1 | ruby4.0-rubygem-actionmailbox-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10335-1 | ruby4.0-rubygem-actioncable-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10334-1 | python311-pypdf-6.8.0-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10333-1 | python311-multipart-1.3.1-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10332-1 | python311-PyPDF2-2.11.1-7.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10331-1 | mingw64-binutils-2.45.1-2.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10330-1 | mingw32-binutils-2.45.1-2.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10329-1 | kubelogin-0.2.16-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10328-1 | himmelblau-2.3.8+git0.dec3693-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10327-1 | heroic-games-launcher-2.20.1-3.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10326-1 | giflib-devel-32bit-5.2.2-3.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10325-1 | clamav-1.5.2-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10324-1 | MozillaFirefox-148.0.2-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:20361-1 | Security update for osc, obs-scm-bridge | 2026-03-12T20:54:40Z | 2026-03-12T20:54:40Z |
| opensuse-su-2026:20351-1 | Security update for amazon-ssm-agent | 2026-03-12T13:46:52Z | 2026-03-12T13:46:52Z |
| opensuse-su-2026:20350-1 | Security update for tomcat | 2026-03-12T13:46:00Z | 2026-03-12T13:46:00Z |
| opensuse-su-2026:20348-1 | Security update for python-PyPDF2 | 2026-03-11T20:15:02Z | 2026-03-11T20:15:02Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6311 | Red Hat Security Advisory: nginx security update | 2026-04-01T02:29:52+00:00 | 2026-04-08T14:07:10+00:00 |
| rhsa-2026:6310 | Red Hat Security Advisory: kernel security update | 2026-04-01T01:15:17+00:00 | 2026-04-13T07:08:47+00:00 |
| rhsa-2026:6309 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-03-31T23:31:56+00:00 | 2026-04-16T15:20:07+00:00 |
| rhsa-2026:6308 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2026-03-31T22:34:16+00:00 | 2026-04-16T15:20:07+00:00 |
| rhsa-2026:6302 | Red Hat Security Advisory: nginx:1.24 security update | 2026-03-31T22:05:06+00:00 | 2026-04-08T14:07:09+00:00 |
| rhsa-2026:6301 | Red Hat Security Advisory: squid security update | 2026-03-31T20:09:21+00:00 | 2026-04-15T21:58:29+00:00 |
| rhsa-2026:6300 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T19:50:01+00:00 | 2026-04-14T06:25:51+00:00 |
| rhsa-2026:6285 | Red Hat Security Advisory: python3.12 security update | 2026-03-31T17:26:23+00:00 | 2026-04-16T15:08:27+00:00 |
| rhsa-2026:6286 | Red Hat Security Advisory: python3.11 security update | 2026-03-31T17:26:16+00:00 | 2026-04-16T15:08:27+00:00 |
| rhsa-2026:6283 | Red Hat Security Advisory: python3.12 security update | 2026-03-31T17:06:33+00:00 | 2026-04-16T15:08:27+00:00 |
| rhsa-2026:6292 | Red Hat Security Advisory: General availability of the satellite/iop-insights-engine-rhel9 container image | 2026-03-31T16:56:51+00:00 | 2026-04-16T15:20:06+00:00 |
| rhsa-2026:6291 | Red Hat Security Advisory: General availability of the satellite/iop-advisor-backend-rhel9 container image | 2026-03-31T16:56:50+00:00 | 2026-03-31T22:32:22+00:00 |
| rhsa-2026:6288 | Red Hat Security Advisory: General availability of the satellite/iop-remediations-rhel9 container image | 2026-03-31T16:45:29+00:00 | 2026-04-15T16:26:42+00:00 |
| rhsa-2026:6287 | Red Hat Security Advisory: General availability of the satellite/iop-advisor-frontend-rhel9 container image | 2026-03-31T16:45:05+00:00 | 2026-04-16T15:20:06+00:00 |
| rhsa-2026:6281 | Red Hat Security Advisory: python3.11 security update | 2026-03-31T16:39:52+00:00 | 2026-04-16T15:08:25+00:00 |
| rhsa-2026:6278 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2026-03-31T16:23:06+00:00 | 2026-04-16T16:04:20+00:00 |
| rhsa-2026:6277 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Product Security and Bug Fix Update | 2026-03-31T16:12:45+00:00 | 2026-04-16T16:04:20+00:00 |
| rhsa-2026:6268 | Red Hat Security Advisory: 389-ds:1.4 security update | 2026-03-31T15:37:55+00:00 | 2026-03-31T17:31:28+00:00 |
| rhsa-2026:6266 | Red Hat Security Advisory: libxslt security update | 2026-03-31T14:49:35+00:00 | 2026-04-09T20:37:28+00:00 |
| rhsa-2026:6259 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T13:11:45+00:00 | 2026-04-14T06:25:51+00:00 |
| rhsa-2026:6256 | Red Hat Security Advisory: python3.12 security update | 2026-03-31T09:59:24+00:00 | 2026-04-16T15:08:24+00:00 |
| rhsa-2026:6253 | Red Hat Security Advisory: python3.11 security update | 2026-03-31T09:11:44+00:00 | 2026-04-15T16:26:39+00:00 |
| rhsa-2026:6251 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-03-31T07:30:54+00:00 | 2026-04-16T16:04:20+00:00 |
| rhsa-2026:6234 | Red Hat Security Advisory: nginx security update | 2026-03-31T04:54:48+00:00 | 2026-04-08T14:07:08+00:00 |
| rhsa-2026:6235 | Red Hat Security Advisory: nginx security update | 2026-03-31T04:46:48+00:00 | 2026-04-08T14:07:09+00:00 |
| rhsa-2026:6226 | Red Hat Security Advisory: Multicluster Global Hub 1.6.2 security update | 2026-03-31T02:53:32+00:00 | 2026-04-16T16:32:16+00:00 |
| rhsa-2026:6220 | Red Hat Security Advisory: 389-ds-base security update | 2026-03-31T00:30:42+00:00 | 2026-03-31T17:31:35+00:00 |
| rhsa-2026:6193 | Red Hat Security Advisory: kernel security update | 2026-03-30T16:23:36+00:00 | 2026-04-13T06:22:46+00:00 |
| rhsa-2026:6191 | Red Hat Security Advisory: container-tools:rhel8 security update | 2026-03-30T16:08:31+00:00 | 2026-04-16T16:32:15+00:00 |
| rhsa-2026:6188 | Red Hat Security Advisory: thunderbird security update | 2026-03-30T16:05:18+00:00 | 2026-04-16T10:24:11+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2019-225-01 | Harmony (formerly known as Magelis) HMI Panels | 2019-08-13T09:59:02.000Z | 2024-01-09T09:59:02.000Z |
| sesb-2019-214-01 | Wind River VxWorks Vulnerabilities (URGENT/11) | 2019-08-02T00:00:00.000Z | 2022-09-13T00:00:00.000Z |
| sevd-2019-134-11 | Multiple Vulnerabilities in Modicon Controller Products | 2019-05-14T16:48:40.000Z | 2026-04-14T07:00:00.000Z |
| sevd-2018-095-01 | Security Notification - U.motion Builder software | 2018-04-05T00:00:00.000Z | 2020-02-11T00:00:00.000Z |
| sevd-2018-081-01 | Embedded FTP Servers for Modicon PAC Controllers | 2018-03-22T03:39:21.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2015-344-01 | GoAhead Web Server vulnerability | 2015-12-15T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-953710 | SSA-953710: Vulnerabilities in the Network Communication Stack in Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-925850 | SSA-925850: Improper Access Control in Polarion ALM | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-871704 | SSA-871704: Multiple Vulnerabilities in SICAM Products | 2024-05-14T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-661579 | SSA-661579: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-589937 | SSA-589937: Multiple Memory Corruption Vulnerabilities in Solid Edge | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-489698 | SSA-489698: X_T File Parsing Vulnerability in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-292022 | SSA-292022: Vulnerability in Nozomi Guardian/CMC before 23.4.1 on RUGGEDCOM APE1808 devices | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-273900 | SSA-273900: Multiple Vulnerabilities in SIMATIC CN 4100 before V3.0 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-258494 | SSA-258494: Stack Overflow Vulnerability in Simcenter Nastran before 2406.90 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-093430 | SSA-093430: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager before V3.0 | 2024-05-14T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-046364 | SSA-046364: X_T File Parsing Vulnerabilities in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-750274 | SSA-750274: Impact of CVE-2024-3400 on RUGGEDCOM APE1808 devices configured with Palo Alto Networks Virtual NGFW | 2024-04-19T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-885980 | SSA-885980: Multiple Vulnerabilities in Scalance W1750D | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-822518 | SSA-822518: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW Before V11.0.1 on RUGGEDCOM APE1808 Devices | 2024-04-09T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-730482 | SSA-730482: Denial of Service Vulnerability in SIMATIC WinCC | 2024-04-09T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-556635 | SSA-556635: Multiple Vulnerabilities in Telecontrol Server Basic before V3.1.2.0 | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-455250 | SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.2-h3 | 2024-04-09T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-265688 | SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 | 2024-04-09T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-222019 | SSA-222019: X_T File Parsing Vulnerabilities in Parasolid | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-128433 | SSA-128433: Multiple Vulnerabilities in SINEC NMS before V2.0 SP2 | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-918992 | SSA-918992: Unused HTTP Service on SENTRON 3KC ATC6 Ethernet Module | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-832273 | SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-792319 | SSA-792319: Missing Read Out Protection in SENTRON 7KM PAC3x20 Devices | 2024-03-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-770721 | SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-653855 | SSA-653855: Information Disclosure vulnerability in SINEMA Remote Connect Client before V3.1 SP1 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-576771 | SSA-576771: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-382651 | SSA-382651: File Parsing Vulnerability in Solid Edge | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-366067 | SSA-366067: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1131-1 | Security update for the Linux Kernel | 2026-03-27T16:02:21Z | 2026-03-27T16:02:21Z |
| suse-su-2026:1130-1 | Security update for the Linux Kernel | 2026-03-27T15:47:44Z | 2026-03-27T15:47:44Z |
| suse-su-2026:1129-1 | Security update for freerdp | 2026-03-27T15:05:09Z | 2026-03-27T15:05:09Z |
| suse-su-2026:1127-1 | Security update for MozillaFirefox | 2026-03-27T14:43:04Z | 2026-03-27T14:43:04Z |
| suse-su-2026:1126-1 | Security update for MozillaFirefox | 2026-03-27T14:42:09Z | 2026-03-27T14:42:09Z |
| suse-su-2026:1124-1 | Security update for LibVNCServer | 2026-03-27T14:22:08Z | 2026-03-27T14:22:08Z |
| suse-su-2026:1125-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T14:04:13Z | 2026-03-27T14:04:13Z |
| suse-su-2026:1118-1 | Security update for docker-stable | 2026-03-27T12:26:18Z | 2026-03-27T12:26:18Z |
| suse-su-2026:1117-1 | Security update for python311 | 2026-03-27T11:34:35Z | 2026-03-27T11:34:35Z |
| suse-su-2026:20976-1 | Security update for docker-compose | 2026-03-27T10:09:30Z | 2026-03-27T10:09:30Z |
| suse-su-2026:20949-1 | Security update for docker-compose | 2026-03-27T10:09:30Z | 2026-03-27T10:09:30Z |
| suse-su-2026:20950-1 | Security update for nghttp2 | 2026-03-27T09:43:31Z | 2026-03-27T09:43:31Z |
| suse-su-2026:1107-1 | Security update for python312 | 2026-03-27T09:04:01Z | 2026-03-27T09:04:01Z |
| suse-su-2026:1102-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T08:05:21Z | 2026-03-27T08:05:21Z |
| suse-su-2026:1105-1 | Security update for containerd | 2026-03-27T07:03:20Z | 2026-03-27T07:03:20Z |
| suse-su-2026:1099-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T04:33:50Z | 2026-03-27T04:33:50Z |
| suse-su-2026:1096-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T04:04:40Z | 2026-03-27T04:04:40Z |
| suse-su-2026:1101-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T01:33:43Z | 2026-03-27T01:33:43Z |
| suse-su-2026:1100-1 | Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6) | 2026-03-26T23:08:12Z | 2026-03-26T23:08:12Z |
| suse-su-2026:1098-1 | Security update for cosign | 2026-03-26T21:23:31Z | 2026-03-26T21:23:31Z |
| suse-su-2026:1094-1 | Security update for python-deepdiff | 2026-03-26T17:56:23Z | 2026-03-26T17:56:23Z |
| suse-su-2026:1093-1 | Security update for xen | 2026-03-26T17:52:21Z | 2026-03-26T17:52:21Z |
| suse-su-2026:1092-1 | Security update for xen | 2026-03-26T17:51:51Z | 2026-03-26T17:51:51Z |
| suse-su-2026:1091-1 | Security update for kea | 2026-03-26T17:48:22Z | 2026-03-26T17:48:22Z |
| suse-su-2026:1090-1 | Security update for python3 | 2026-03-26T17:45:14Z | 2026-03-26T17:45:14Z |
| suse-su-2026:1089-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6) | 2026-03-26T17:34:58Z | 2026-03-26T17:34:58Z |
| suse-su-2026:1088-1 | Security update for the Linux Kernel (Live Patch 67 for SUSE Linux Enterprise 12 SP5) | 2026-03-26T17:03:58Z | 2026-03-26T17:03:58Z |
| suse-su-2026:20948-1 | Security update for net-tools | 2026-03-26T15:12:29Z | 2026-03-26T15:12:29Z |
| suse-su-2026:20940-1 | Security update for net-tools | 2026-03-26T15:12:29Z | 2026-03-26T15:12:29Z |
| suse-su-2026:1083-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6) | 2026-03-26T15:03:57Z | 2026-03-26T15:03:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1148 | Important: kernel-rt security update | 2026-01-26T00:00:00Z | 2026-01-26T13:52:56Z |
| alsa-2026:1143 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-30T09:51:59Z |
| alsa-2026:1142 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-26T13:49:21Z |
| alsa-2026:1089 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:15:08Z |
| alsa-2026:1088 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:17:27Z |
| alsa-2026:1087 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:19:22Z |
| alsa-2026:1086 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-26T13:16:32Z |
| alsa-2026:0933 | Important: java-25-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-28T14:35:03Z |
| alsa-2026:0932 | Important: java-1.8.0-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-29T13:07:43Z |
| alsa-2026:0991 | Moderate: glib2 security update | 2026-01-22T00:00:00Z | 2026-01-24T01:40:03Z |
| alsa-2026:0975 | Moderate: glib2 security update | 2026-01-22T00:00:00Z | 2026-01-23T23:34:09Z |
| alsa-2026:0928 | Important: java-21-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-26T11:04:56Z |
| alsa-2026:0927 | Important: java-17-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-24T01:52:06Z |
| alsa-2026:0936 | Moderate: glib2 security update | 2026-01-21T00:00:00Z | 2026-01-24T01:44:09Z |
| alsa-2026:0930 | Moderate: pcs security update | 2026-01-21T00:00:00Z | 2026-01-24T01:46:11Z |
| alsa-2026:0924 | Important: thunderbird security update | 2026-01-21T00:00:00Z | 2026-01-24T01:47:12Z |
| alsa-2026:0923 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-24T01:54:58Z |
| alsa-2026:0922 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-23T23:39:55Z |
| alsa-2026:0921 | Important: go-toolset:rhel8 security update | 2026-01-21T00:00:00Z | 2026-01-26T10:07:11Z |
| alsa-2026:0914 | Important: gimp security update | 2026-01-21T00:00:00Z | 2026-01-26T10:10:46Z |
| alsa-2026:0845 | Important: brotli security update | 2026-01-20T00:00:00Z | 2026-01-21T10:45:25Z |
| alsa-2026:0793 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-23T13:22:18Z |
| alsa-2026:0786 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-23T07:53:26Z |
| alsa-2026:0771 | Important: gpsd-minimal security update | 2026-01-19T00:00:00Z | 2026-01-20T11:54:05Z |
| alsa-2026:0770 | Important: gpsd security update | 2026-01-19T00:00:00Z | 2026-01-21T10:46:37Z |
| alsa-2026:0760 | Important: kernel-rt security update | 2026-01-19T00:00:00Z | 2026-01-20T08:13:58Z |
| alsa-2026:0759 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-20T08:07:16Z |
| alsa-2026:0756 | Moderate: transfig security update | 2026-01-19T00:00:00Z | 2026-01-19T10:24:15Z |
| alsa-2026:0753 | Important: container-tools:rhel8 security update | 2026-01-19T00:00:00Z | 2026-01-21T09:07:00Z |
| alsa-2026:0752 | Important: jmc security update | 2026-01-19T00:00:00Z | 2026-01-20T11:59:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-108 | Use-of-uninitialized-value in decimate_dsd_run | 2025-02-10T00:12:35.140061Z | 2025-02-10T00:12:35.140400Z |
| osv-2025-107 | Use-of-uninitialized-value in get_words_lossless | 2025-02-10T00:06:27.370789Z | 2025-02-10T00:06:27.371196Z |
| osv-2025-105 | Heap-use-after-free in unpack_dsd_samples | 2025-02-10T00:00:59.046535Z | 2025-02-10T00:00:59.047010Z |
| osv-2025-93 | Heap-buffer-overflow in lj_strfmt_pushvf | 2025-02-05T00:18:14.584575Z | 2025-07-23T14:24:29.384461Z |
| osv-2025-92 | Null-dereference READ in session_startup | 2025-02-05T00:18:00.385170Z | 2025-12-20T14:25:08.038174Z |
| osv-2025-90 | Null-dereference READ in ubsan_GetStackTrace | 2025-02-03T00:02:54.185593Z | 2025-12-20T14:15:37.974751Z |
| osv-2025-88 | Segv on unknown address in ___interceptor_free | 2025-02-02T00:16:16.201801Z | 2025-02-02T00:16:16.202130Z |
| osv-2025-85 | Segv on unknown address in ndpi_free_flow_data | 2025-02-02T00:13:42.076001Z | 2025-02-02T00:13:42.076373Z |
| osv-2025-84 | Segv on unknown address in Flow::processExtraDissectedInformation | 2025-02-02T00:12:09.563391Z | 2025-02-02T00:12:09.563778Z |
| osv-2025-81 | Segv on unknown address in ndpi_serialize_string_string | 2025-02-02T00:02:52.946833Z | 2025-02-02T00:02:52.947083Z |
| osv-2025-80 | Segv on unknown address in ndpi_snprintf | 2025-02-02T00:00:58.798346Z | 2025-02-02T00:00:58.798951Z |
| osv-2025-74 | Stack-buffer-overflow in xmlValidateElementContent | 2025-01-29T00:13:55.386256Z | 2025-01-29T00:13:55.386629Z |
| osv-2024-1427 | Heap-buffer-overflow in extract_mediaip | 2025-01-28T00:14:30.487391Z | 2025-03-18T00:41:33.426387Z |
| osv-2025-68 | UNKNOWN READ in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-01-28T00:00:46.845996Z | 2025-02-05T14:25:02.989469Z |
| osv-2025-63 | Stack-buffer-underflow in gs_type1_interpret | 2025-01-27T00:10:00.833706Z | 2025-01-27T00:10:00.834151Z |
| osv-2025-62 | UNKNOWN READ in RDKit::Dict::reset | 2025-01-27T00:01:51.692636Z | 2026-03-06T14:31:24.229549Z |
| osv-2025-61 | Heap-buffer-overflow in oatpp::json::Utils::escapeString | 2025-01-27T00:00:09.905879Z | 2025-01-27T00:00:09.906561Z |
| osv-2024-1424 | Heap-buffer-overflow in extract_candidate | 2025-01-25T00:17:13.787335Z | 2025-01-25T14:25:05.188301Z |
| osv-2024-1423 | Security exception in java.base/java.util.Arrays.copyOfRange | 2025-01-25T00:03:24.362190Z | 2025-01-25T00:03:24.362579Z |
| osv-2025-54 | UNKNOWN READ in Assimp::SceneCombiner::CopyScene | 2025-01-22T00:15:23.827419Z | 2025-03-18T00:29:47.108675Z |
| osv-2025-52 | Use-of-uninitialized-value in icalmemory_strdup | 2025-01-22T00:07:34.573371Z | 2025-01-22T00:07:34.573823Z |
| osv-2025-51 | Heap-buffer-overflow in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-01-22T00:03:50.355443Z | 2025-01-24T14:26:07.849301Z |
| osv-2025-50 | Heap-double-free in r_crbtree_free | 2025-01-20T00:16:43.389094Z | 2025-01-20T00:16:43.389604Z |
| osv-2025-45 | Security exception in POIHDGFFuzzer | 2025-01-19T00:14:10.746839Z | 2025-01-19T00:14:10.747322Z |
| osv-2025-42 | Heap-use-after-free in r_list_free | 2025-01-19T00:06:58.533546Z | 2025-01-19T00:06:58.534017Z |
| osv-2025-33 | UNKNOWN READ in pcpp::RawPacket::insertData | 2025-01-16T00:01:14.786268Z | 2025-10-22T18:25:08.281167Z |
| osv-2025-32 | UNKNOWN READ in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2025-01-16T00:01:09.535772Z | 2025-01-16T00:01:09.536403Z |
| osv-2025-31 | Heap-buffer-overflow in Assimp::FBXExporter::WriteObjects | 2025-01-15T00:14:05.357161Z | 2025-05-17T14:21:13.704657Z |
| osv-2025-17 | Heap-buffer-overflow in cv::PngDecoder::readHeader | 2025-01-08T00:14:02.009521Z | 2025-01-08T00:14:02.009997Z |
| osv-2025-16 | UNKNOWN READ in png_free_data | 2025-01-08T00:13:45.160139Z | 2025-01-08T00:13:45.160518Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0432 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| rustsec-2024-0437 | Crash due to uncontrolled recursion in protobuf crate | 2024-12-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0423 | gtk-layer-shell-sys GTK3 bindings - no longer maintained | 2024-12-09T12:00:00Z | 2024-12-09T13:12:34Z |
| rustsec-2024-0422 | gtk-layer-shell GTK3 bindings - no longer maintained | 2024-12-09T12:00:00Z | 2024-12-09T13:12:34Z |
| rustsec-2024-0421 | `idna` accepts Punycode labels that do not produce any non-ASCII when decoded | 2024-12-09T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0447 | Panics on Malformed Untrusted Input | 2024-12-05T12:00:00Z | 2025-12-24T14:48:25Z |
| rustsec-2024-0428 | Undefined behaviour in `kvm_ioctls::ioctls::vm::VmFd::create_device` | 2024-12-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0409 | Build corruption when using `PYO3_CONFIG_FILE` environment variable | 2024-12-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0408 | Unsound usages of `std::slice::from_raw_parts` | 2024-12-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0400 | `ruzstd` uninit and out-of-bounds memory reads | 2024-11-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0399 | rustls network-reachable panic in `Acceptor::accept` | 2024-11-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0398 | Bias of Polynomial Coefficients in Secret Sharing | 2024-11-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0401 | Denial of service because of stack overflow with malicious decompression input | 2024-11-14T12:00:00Z | 2024-12-04T12:13:35Z |
| rustsec-2024-0445 | cap-primitives doesn't fully sandbox all the Windows device filenames | 2024-11-05T12:00:00Z | 2025-12-19T21:01:24Z |
| rustsec-2024-0438 | Wasmtime doesn't fully sandbox all the Windows device filenames | 2024-11-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0379 | Multiple soundness issues | 2024-10-31T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0381 | Replaced by `pqcrypto-mlkem` | 2024-10-24T12:00:00Z | 2024-11-10T12:05:32Z |
| rustsec-2024-0380 | Replaced by `pqcrypto-mldsa` | 2024-10-24T12:00:00Z | 2024-11-10T12:05:32Z |
| rustsec-2024-0378 | Risk of use-after-free in `borrowed` reads from Python weak references | 2024-10-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0402 | Borsh serialization of HashMap is non-canonical | 2024-10-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0436 | paste - no longer maintained | 2024-10-07T12:00:00Z | 2026-01-27T21:51:15Z |
| rustsec-2024-0377 | Heap Buffer overflow using c_chars_to_str function | 2024-10-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0439 | Race condition could lead to WebAssembly control-flow integrity and type safety violations | 2024-10-03T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0440 | Runtime crash when combining tail calls with stack traces | 2024-10-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0376 | Remotely exploitable Denial of Service in Tonic | 2024-10-01T12:00:00Z | 2025-09-11T07:02:22Z |
| rustsec-2024-0375 | `atty` is unmaintained | 2024-09-25T12:00:00Z | 2024-09-26T12:26:22Z |
| rustsec-2024-0374 | Segmentation fault due to use of uninitialized memory | 2024-09-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0427 | get-size-derive is unmaintained | 2024-09-15T12:00:00Z | 2024-12-22T09:01:06Z |
| rustsec-2024-0425 | get-size is unmaintained | 2024-09-15T12:00:00Z | 2024-12-22T09:01:06Z |
| rustsec-2024-0404 | Unsoundness in anstream | 2024-09-08T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-parse-2026-30972 | Parse Server has a rate limit bypass via batch request endpoint | 2026-03-12T14:48:14.900Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30967 | Parse Server OAuth2 authentication adapter account takeover via identity spoofing | 2026-03-12T14:48:13.390Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30966 | Parse Server role escalation and CLP bypass via direct `_Join` table write | 2026-03-12T14:48:11.522Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30965 | Parse Server session token exfiltration via `redirectClassNameForKey` query parameter | 2026-03-12T14:48:09.696Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30962 | Parse Server has a protected fields bypass via logical query operators | 2026-03-12T14:48:07.977Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30949 | Parse Server is missing audience validation in Keycloak authentication adapter | 2026-03-12T14:48:06.075Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30948 | Parse Server has stored cross-site scripting (XSS) via SVG file upload | 2026-03-12T14:48:04.274Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30947 | Parse Server ha a bypass of class-level permissions in LiveQuery | 2026-03-12T14:48:02.496Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30946 | Parse Server affected by denial-of-service via unbounded query complexity in REST and GraphQL API | 2026-03-12T14:48:00.783Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30941 | Parse Server has a NoSQL injection via token type in password reset and email verification endpoints | 2026-03-12T14:47:58.977Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30939 | Parse Server has Denial of Service (DoS) and Cloud Function Dispatch Bypass via Prototype Chain Resolution | 2026-03-12T14:47:57.281Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30938 | Parse Server has denylist `requestKeywordDenylist` keyword scan bypass through nested object placement | 2026-03-12T14:47:55.401Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30925 | Parse Server affected by Regular Expression Denial of Service (ReDoS) via `$regex` query in LiveQuery | 2026-03-12T14:47:53.415Z | 2026-03-20T09:47:33.381Z |
| bit-envoy-2026-26330 | Envoy global rate limit may crash when the response phase limit is enabled and the response phase request is failed directly | 2026-03-12T08:39:47.564Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26311 | Envoy HTTP: filter chain execution on reset streams causing UAF crash | 2026-03-12T08:39:46.109Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26310 | Crash for scoped ip address in Envoy during DNS | 2026-03-12T08:39:44.551Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26309 | Envoy has an off-by-one write in JsonEscaper::escapeString() | 2026-03-12T08:39:42.871Z | 2026-03-12T09:10:07.191Z |
| bit-envoy-2026-26308 | Envoy has an RBAC Header Validation Bypass via Multi-Value Header Concatenation | 2026-03-12T08:39:41.078Z | 2026-03-12T09:10:07.191Z |
| bit-appsmith-2026-30862 | Critical Stored XSS & Privilege Escalation in Appsmith | 2026-03-12T08:36:03.908Z | 2026-03-12T09:10:07.191Z |
| bit-parse-2026-30863 | Parse Server: JWT audience validation bypass in Google, Apple, and Facebook authentication adapters | 2026-03-11T15:49:05.551Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30854 | Parse Server: GraphQL `__type` introspection bypass via inline fragments when public introspection is disabled | 2026-03-11T15:49:02.829Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30850 | Parse Server: File metadata endpoint bypasses `beforeFind` / `afterFind` trigger authorization | 2026-03-11T15:48:59.848Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30848 | Parse Server: `PagesRouter` path traversal allows reading files outside configured pages directory | 2026-03-11T15:48:57.194Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30835 | Parse Server: Malformed `$regex` query leaks database error details in API response | 2026-03-11T15:48:54.398Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30229 | Parse Server: Endpoint `/loginAs` allows `readOnlyMasterKey` to gain full read and write access as any user | 2026-03-11T15:48:51.922Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-30228 | Parse Server: File creation and deletion bypasses `readOnlyMasterKey` write restriction | 2026-03-11T15:48:49.330Z | 2026-03-11T18:56:50.865Z |
| bit-parse-2026-29182 | Parse Server: Cloud Hooks and Cloud Jobs bypass `readOnlyMasterKey` write restriction | 2026-03-11T15:48:46.637Z | 2026-03-11T18:56:50.865Z |
| bit-zookeeper-2026-24308 | Apache ZooKeeper: Sensitive information disclosure in client configuration handling | 2026-03-10T08:52:17.946Z | 2026-03-11T09:11:40.352Z |
| bit-zookeeper-2026-24281 | Apache ZooKeeper: Reverse-DNS fallback enables hostname verification bypass in ZooKeeper ZKTrustManager | 2026-03-10T08:52:16.699Z | 2026-03-11T09:11:40.352Z |
| bit-mariadb-2026-3494 | MariaDB Server Audit Plugin Comment Handling Bypass | 2026-03-10T08:46:18.025Z | 2026-03-17T09:18:01.284Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-cp95927 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.28.1-r0, 1.28.1-r1 | 2026-04-01T09:25:12.106009Z | 2026-03-24T12:00:17Z |
| cleanstart-2026-pz85180 | Security fixes for CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x applied in versions: 3.7.8-r2, 3.7.8-r3 | 2026-04-01T09:25:09.013456Z | 2026-03-24T12:47:42Z |
| cleanstart-2026-ni04192 | Security fixes for CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-fv92-fjc5-jj9h, ghsa-p77j-4mvh-x3m3 applied in versions: 3.6.16-r0, 3.6.18-r0, 3.6.18-r1, 3.6.18-r2, 3.7.4-r0 | 2026-04-01T09:24:43.327769Z | 2026-03-24T12:54:01Z |
| cleanstart-2026-mk10646 | Security fixes for CVE-2025-61729, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x applied in versions: 3.6.16-r0, 3.7.4-r0, 3.7.9-r0, 3.7.9-r1 | 2026-04-01T09:24:40.606937Z | 2026-03-24T12:53:01Z |
| cleanstart-2026-ot07577 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229 applied in versions: 3.19.0-r0, 4.0.1-r0, 4.1.0-r0 | 2026-04-01T09:24:34.526263Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-cv29689 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2025-62820, CVE-2026-25793, CVE-2026-30836 applied in versions: 0.10.2-r0, 0.9.10-r0, 0.9.9-r0, 0.9.9-r1 | 2026-04-01T09:24:13.195625Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-mf20926 | Security fixes for CVE-2021-38561, CVE-2022-27191, CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 3.1.2-r3, 3.1.2-r4, 3.7.0-r0, 3.7.0-r2 | 2026-04-01T09:24:07.163057Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-pv98664 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-m6hq-p25p-ffr2, ghsa-p77j-4mvh-x3m3, ghsa-pwhc-rpq9-4c8w applied in versions: 0.6.4-r5, 0.6.4-r6, 0.7.0-r4 | 2026-04-01T09:23:47.321714Z | 2026-03-25T04:34:22Z |
| cleanstart-2026-ol17158 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-m6hq-p25p-ffr2, ghsa-p77j-4mvh-x3m3, ghsa-pwhc-rpq9-4c8w applied in versions: 0.7.0-r2, 0.7.0-r3, 0.7.0-r4 | 2026-04-01T09:23:46.993269Z | 2026-03-25T04:38:39Z |
| cleanstart-2026-zw86166 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-p77j-4mvh-x3m3 applied in versions: 0.8.10-r0, 0.8.4-r0 | 2026-04-01T09:22:53.735679Z | 2026-03-25T04:41:41Z |
| cleanstart-2026-pw57640 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, CVE-2026-4427, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-9h8m-3fm2-qjrq, ghsa-9mj6-hxhv-w67j, ghsa-cfpf-hrx2-8rv6, ghsa-f6x5-jh6r-wrfv, ghsa-fw7p-63qq-7hpr, ghsa-j5w8-q4qc-rx2x, ghsa-jqcq-xjh3-6g23, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-x6gf-mpr2-68h6 applied in versions: 1.12.1-r0, 1.12.1-r1, 1.12.1-r2 | 2026-04-01T09:22:37.368205Z | 2026-03-25T05:32:13Z |
| cleanstart-2026-ev91316 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1 | 2026-04-01T09:22:33.462978Z | 2026-03-25T04:58:46Z |
| cleanstart-2026-kw90815 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1, 1.27.8-r0 | 2026-04-01T09:22:32.438088Z | 2026-03-25T05:02:40Z |
| cleanstart-2026-hh87643 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.26.8-r0, 1.26.8-r1 | 2026-04-01T09:22:32.645637Z | 2026-03-25T04:50:32Z |
| cleanstart-2026-gk29346 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-1229, CVE-2026-22039, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23881, CVE-2026-24051, CVE-2026-24117, CVE-2026-24137, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-29wx-vh33-7x7r, ghsa-2x5j-vhc8-9cwm, ghsa-459x-q9hg-4gpq, ghsa-4qg8-fj49-pxjh, ghsa-4vq8-7jfc-9cvp, ghsa-6m8w-jc87-6cr7, ghsa-88jx-383q-w4qc, ghsa-95pr-fxf5-86gv, ghsa-c5q2-7r4c-mv6g, ghsa-c6gw-w398-hv78, ghsa-c77r-fh37-x2px, ghsa-f83f-xpx7-ffpw, ghsa-fv92-fjc5-jj9h, ghsa-jrr2-x33p-6hvc, ghsa-mh63-6h87-95cp, ghsa-mqqf-5wvp-8fh8, ghsa-p77j-4mvh-x3m3, ghsa-qjvc-p88j-j9rm, ghsa-r5p3-955p-5ggq, ghsa-v23v-6jw2-98fq, ghsa-v6v8-xj6m-xwqh, ghsa-xw73-rw38-6vjc applied in versions: 1.4.2-r2, 1.4.2-r4, 1.4.2-r6, 1.4.2-r7 | 2026-04-01T09:22:17.389111Z | 2026-03-25T11:02:44Z |
| cleanstart-2026-lk63891 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.29.0-r0, 1.29.1-r0 | 2026-04-01T09:22:08.586608Z | 2026-03-25T05:12:36Z |
| cleanstart-2026-jm60128 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1 | 2026-04-01T09:22:08.268986Z | 2026-03-25T05:05:50Z |
| cleanstart-2026-ej96468 | Security fixes for ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1, 1.28.5-r0 | 2026-04-01T09:22:08.656529Z | 2026-03-25T05:09:00Z |
| cleanstart-2026-ce02533 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2025-62820, CVE-2026-30836, CVE-2026-33186, ghsa-p77j-4mvh-x3m3, ghsa-q4r8-xm5f-56gw applied in versions: 0.10.1-r0, 0.9.10-r0, 0.9.9-r0, 0.9.9-r1 | 2026-04-01T09:21:33.459909Z | 2026-03-25T10:51:25Z |
| cleanstart-2026-at91215 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2x5j-vhc8-9cwm, ghsa-6m8w-jc87-6cr7, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-vvgc-356p-c3xw applied in versions: 1.14.4-r1, 1.14.4-r2, 1.15.3-r1, 1.15.3-r2 | 2026-04-01T09:20:36.013002Z | 2026-03-25T11:15:10Z |
| cleanstart-2026-gm18965 | Security fixes for CVE-2025-15558, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.2-r2 | 2026-04-01T09:20:25.238160Z | 2026-03-25T11:27:12Z |
| cleanstart-2026-ic68874 | Security fixes for CVE-2025-15558, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.13.4-r0, 2.13.4-r1 | 2026-04-01T09:20:18.599218Z | 2026-03-25T11:32:52Z |
| cleanstart-2026-ls12576 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 1.16.2-r2, 1.17.2-r0, 1.17.2-r1, 1.18.0-r0 | 2026-04-01T09:19:50.661957Z | 2026-03-25T14:09:04Z |
| cleanstart-2026-jg61689 | Security fixes for CVE-2025-15558, CVE-2026-33186, ghsa-p436-gjf2-799p applied in versions: 1.29.0-r0, 1.29.0-r1 | 2026-04-01T09:19:48.393428Z | 2026-03-25T13:59:35Z |
| cleanstart-2026-ha09227 | Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.18.0-r1 | 2026-04-01T09:19:28.951475Z | 2026-03-25T14:21:54Z |
| cleanstart-2026-pn56882 | Security fixes for CVE-2026-24051 applied in versions: 1.65.0-r0 | 2026-04-01T09:19:27.916186Z | 2026-03-25T14:07:29Z |
| cleanstart-2026-ma32024 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-33186, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1, 3.3.3-r0, 3.3.4-r0 | 2026-04-01T09:19:21.169476Z | 2026-03-26T07:01:17Z |
| cleanstart-2026-ae87452 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.20.12-r0, 1.20.12-r1, 1.20.12-r2 | 2026-04-01T09:19:15.219275Z | 2026-03-25T14:22:43Z |
| cleanstart-2026-gm63718 | Security fixes for CVE-2025-15558, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-25934, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-q9hv-hpm4-hj6x applied in versions: 1.39.0-r0, 1.39.0-r1, 1.39.0-r2, 1.39.0-r3 | 2026-04-01T09:19:09.281060Z | 2026-03-25T14:21:09Z |
| cleanstart-2026-mx45462 | Security fixes for CVE-2025-61729 applied in versions: 1.1.0-r0 | 2026-04-01T09:18:16.445023Z | 2026-03-25T14:24:33Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2018-ALE-001 | Multiples vulnérabilités de fuite d'informations dans des processeurs | 2018-01-04T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2017-ale-020 | Vulnérabilité dans des implémentations de TLS | 2017-12-13T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| CERTFR-2017-ALE-020 | Vulnérabilité dans des implémentations de TLS | 2017-12-13T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| certfr-2017-ale-019 | Vulnérabilité d'usurpation d'identité dans plusieurs clients de messagerie | 2017-12-05T00:00:00.000000 | 2018-03-07T00:00:00.000000 |
| CERTFR-2017-ALE-019 | Vulnérabilité d'usurpation d'identité dans plusieurs clients de messagerie | 2017-12-05T00:00:00.000000 | 2018-03-07T00:00:00.000000 |
| certfr-2017-ale-018 | Vulnérabilité dans Apple MacOS High Sierra | 2017-11-29T00:00:00.000000 | 2017-11-30T00:00:00.000000 |
| CERTFR-2017-ALE-018 | Vulnérabilité dans Apple MacOS High Sierra | 2017-11-29T00:00:00.000000 | 2017-11-30T00:00:00.000000 |
| certfr-2017-ale-017 | Vulnérabilité dans le serveur de messagerie Exim | 2017-11-27T00:00:00.000000 | 2018-02-01T00:00:00.000000 |
| CERTFR-2017-ALE-017 | Vulnérabilité dans le serveur de messagerie Exim | 2017-11-27T00:00:00.000000 | 2018-02-01T00:00:00.000000 |
| certfr-2017-ale-016 | Campagne de rançongiciel Bad Rabbit | 2017-10-25T00:00:00.000000 | 2017-10-27T00:00:00.000000 |
| CERTFR-2017-ALE-016 | Campagne de rançongiciel Bad Rabbit | 2017-10-25T00:00:00.000000 | 2017-10-27T00:00:00.000000 |
| certfr-2017-ale-014 | Vulnérabilité dans le protocole WPA/WPA2 | 2017-10-18T00:00:00.000000 | 2017-10-19T00:00:00.000000 |
| CERTFR-2017-ALE-014 | Vulnérabilité dans le protocole WPA/WPA2 | 2017-10-18T00:00:00.000000 | 2017-10-19T00:00:00.000000 |
| certfr-2017-ale-015 | Vulnérabilités dans la bibliothèque Infineon RSA | 2017-10-16T00:00:00.000000 | 2017-10-17T00:00:00.000000 |
| CERTFR-2017-ALE-015 | Vulnérabilités dans la bibliothèque Infineon RSA | 2017-10-16T00:00:00.000000 | 2017-10-17T00:00:00.000000 |
| certfr-2017-ale-013 | Présence de code malveillant dans Piriform CCleaner | 2017-09-18T00:00:00.000000 | 2017-10-09T00:00:00.000000 |
| CERTFR-2017-ALE-013 | Présence de code malveillant dans Piriform CCleaner | 2017-09-18T00:00:00.000000 | 2017-10-09T00:00:00.000000 |
| certfr-2017-ale-012 | Campagne de maliciels prenant l'apparence d'un rançongiciel à multiples capacités de propagation | 2017-06-27T00:00:00.000000 | 2017-08-03T00:00:00.000000 |
| CERTFR-2017-ALE-012 | Campagne de maliciels prenant l'apparence d'un rançongiciel à multiples capacités de propagation | 2017-06-27T00:00:00.000000 | 2017-08-03T00:00:00.000000 |
| certfr-2017-ale-011 | Campagne de messages électroniques non sollicités de type Jaff | 2017-05-14T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| CERTFR-2017-ALE-011 | Campagne de messages électroniques non sollicités de type Jaff | 2017-05-14T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-010 | Propagation d'un rançongiciel exploitant les vulnérabilités MS17-010 | 2017-05-12T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| CERTFR-2017-ALE-010 | Propagation d'un rançongiciel exploitant les vulnérabilités MS17-010 | 2017-05-12T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-009 | Vulnérabilité dans Microsoft Malware Protection Engine | 2017-05-09T00:00:00.000000 | 2017-05-15T00:00:00.000000 |
| CERTFR-2017-ALE-009 | Vulnérabilité dans Microsoft Malware Protection Engine | 2017-05-09T00:00:00.000000 | 2017-05-15T00:00:00.000000 |
| certfr-2017-ale-008 | Multiples vulnérabilités dans Microsoft Windows XP et Windows Server 2003 | 2017-04-14T00:00:00.000000 | 2017-09-06T00:00:00.000000 |
| CERTFR-2017-ALE-008 | Multiples vulnérabilités dans Microsoft Windows XP et Windows Server 2003 | 2017-04-14T00:00:00.000000 | 2017-09-06T00:00:00.000000 |
| certfr-2017-ale-007 | Vulnérabilité dans Microsoft Office | 2017-04-10T00:00:00.000000 | 2017-04-12T00:00:00.000000 |
| CERTFR-2017-ALE-007 | Vulnérabilité dans Microsoft Office | 2017-04-10T00:00:00.000000 | 2017-04-12T00:00:00.000000 |
| certfr-2017-ale-006 | Multiples vulnérabilités dans SCADA Siemens RUGGEDCOM ROX I | 2017-03-29T00:00:00.000000 | 2017-03-29T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0181 | Vulnérabilité dans Apache Tomcat | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0180 | Vulnérabilité dans NetApp StorageGRID | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0179 | Multiples vulnérabilités dans SPIP | 2026-02-18T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0178 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0177 | Multiples vulnérabilités dans Moodle | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0176 | Vulnérabilité dans Mattermost Server | 2026-02-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0175 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0174 | Multiples vulnérabilités dans LibreNMS | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| CERTFR-2026-AVI-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| CERTFR-2026-AVI-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| certfr-2026-avi-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0162 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0161 | Vulnérabilité dans Tenable Nessus Agent | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-001027 | Linux Ratfor vulnerable to stack-based buffer overflow | 2025-01-16T13:27+09:00 | 2025-01-16T13:27+09:00 |
| jvndb-2025-000001 | PLANEX COMMUNICATIONS MZK-DP300N vulnerable to cross-site scripting | 2025-01-08T17:08+09:00 | 2025-01-08T17:08+09:00 |
| jvndb-2024-015471 | Trend Micro Deep Security 20.0 Agent (for Windows) vulnerable to uncontrolled search path element | 2024-12-25T11:28+09:00 | 2024-12-25T11:28+09:00 |
| jvndb-2024-015393 | Multiple security updates for Trend Micro Apex One and Apex One as a Service (December 2024) | 2024-12-23T12:52+09:00 | 2024-12-23T12:52+09:00 |
| jvndb-2024-014918 | Authentication Bypass Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2024-12-17T15:23+09:00 | 2024-12-17T15:23+09:00 |
| jvndb-2024-000128 | Multiple vulnerabilities in SHARP routers | 2024-12-17T07:54+09:00 | 2024-12-17T07:54+09:00 |
| jvndb-2024-000127 | "Shonen Jump+" App for Android fails to restrict custom URL schemes properly | 2024-12-16T15:07+09:00 | 2024-12-16T15:07+09:00 |
| jvndb-2024-014825 | WordPress Plugin "My WP Customize Admin/Frontend" vulnerable to cross-site scripting | 2024-12-16T13:57+09:00 | 2024-12-16T13:57+09:00 |
| jvndb-2024-014793 | Multiple vulnerabilities in FXC AE1021 and AE1021PE | 2024-12-16T11:51+09:00 | 2024-12-16T11:51+09:00 |
| jvndb-2024-014079 | Trend Micro Deep Security Agent for Windows and Deep Security Notifier on DSVA vulnerable to OS command injection | 2024-12-06T12:11+09:00 | 2024-12-06T12:11+09:00 |
| jvndb-2024-000125 | Multiple vulnerabilities in I-O DATA routers UD-LT1 and UD-LT1/EX | 2024-12-04T15:22+09:00 | 2024-12-18T15:20+09:00 |
| jvndb-2024-000124 | Multiple vulnerabilities in UNIVERGE IX/IX-R/IX-V series routers | 2024-12-02T16:38+09:00 | 2024-12-02T16:38+09:00 |
| jvndb-2024-000123 | Multiple FCNT Android devices vulnerable to authentication bypass | 2024-11-29T15:30+09:00 | 2024-11-29T15:30+09:00 |
| jvndb-2024-013702 | Multiple vulnerabilities in FUJI ELECTRIC products | 2024-11-29T14:42+09:00 | 2024-11-29T14:42+09:00 |
| jvndb-2024-000122 | HAProxy vulnerable to HTTP request/response smuggling | 2024-11-27T14:36+09:00 | 2024-11-27T14:36+09:00 |
| jvndb-2024-000121 | WordPress Plugin "WP Admin UI Customize" vulnerable to cross-site scripting | 2024-11-26T13:57+09:00 | 2024-11-26T13:57+09:00 |
| jvndb-2024-013260 | Multiple vulnerabilities in Edgecross Basic Software for Windows | 2024-11-22T10:59+09:00 | 2025-11-04T16:41+09:00 |
| jvndb-2024-000120 | "Kura Sushi Official App Produced by EPARK" for Android uses a hard-coded cryptographic key | 2024-11-20T13:56+09:00 | 2024-11-20T13:56+09:00 |
| jvndb-2024-012941 | Multiple vulnerabilities in Rakuten Turbo 5G | 2024-11-19T10:41+09:00 | 2024-11-19T10:41+09:00 |
| jvndb-2024-000119 | Multiple vulnerabilities in FitNesse | 2024-11-15T13:37+09:00 | 2024-11-20T11:18+09:00 |
| jvndb-2024-012461 | Multiple vulnerabilities in SoftBank Mesh Wi-Fi router RP562B | 2024-11-13T14:26+09:00 | 2024-11-26T16:11+09:00 |
| jvndb-2024-000118 | WordPress Plugin "VK All in One Expansion Unit" vulnerable to cross-site scripting | 2024-11-13T13:50+09:00 | 2024-11-13T13:50+09:00 |
| jvndb-2024-012017 | Trend Micro Deep Security 20 Agent for Windows vulnerable to improper access control | 2024-11-06T11:00+09:00 | 2024-11-06T11:00+09:00 |
| jvndb-2024-011833 | Incorrect authorization vulnerability in OMRON Sysmac Studio | 2024-11-05T15:29+09:00 | 2024-11-05T15:29+09:00 |
| jvndb-2024-011747 | Command injection vulnerability in Trend Micro Cloud Edge | 2024-11-01T14:28+09:00 | 2024-11-01T14:28+09:00 |
| jvndb-2024-011744 | REST-APIs unintentionally enabled in Century Systems FutureNet NXR series routers | 2024-11-01T13:49+09:00 | 2024-11-01T13:49+09:00 |
| jvndb-2024-000117 | Stack-based buffer overflow vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2024-10-31T16:44+09:00 | 2025-05-19T17:59+09:00 |
| jvndb-2024-000116 | Hikvision network camera security enhancement to prevent cleartext transmission of Dynamic DNS credentials | 2024-10-30T15:07+09:00 | 2024-10-30T15:07+09:00 |
| jvndb-2024-011256 | Multiple vulnerabilities in Sharp and Toshiba Tec MFPs | 2024-10-28T17:33+09:00 | 2024-10-28T17:33+09:00 |
| jvndb-2024-000115 | Chatwork Desktop Application (Windows) uses a potentially dangerous function | 2024-10-28T14:29+09:00 | 2024-10-28T14:29+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14143 | WordPress插件wpForo Forum信息泄露漏洞 | 2026-03-11 | 2026-03-18 |
| cnvd-2026-13835 | SonicWALL SonicOS缓冲区溢出漏洞 | 2026-03-11 | 2026-03-16 |
| cnvd-2026-13834 | SPIP SQL注入漏洞 | 2026-03-11 | 2026-03-11 |
| cnvd-2026-13833 | SPIP interface_traduction_objets SQL注入漏洞 | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13536 | Tenda AC15 goform/formSetIptv文件命令注入漏洞 | 2026-03-11 | 2026-03-11 |
| cnvd-2026-13450 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-13450) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13449 | 多款Mozilla产品权限提升漏洞(CNVD-2026-13449) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13448 | 多款Mozilla产品权限提升漏洞(CNVD-2026-13448) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13447 | 多款Mozilla产品权限提升漏洞(CNVD-2026-13447) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13446 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-13446) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13445 | 多款Mozilla产品代码执行漏洞(CNVD-2026-13445) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13444 | 多款Mozilla产品代码执行漏洞(CNVD-2026-13444) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13443 | 多款Mozilla产品信息泄露漏洞(CNVD-2026-13443) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13442 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-13442) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13441 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-13441) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13440 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-13440) | 2026-03-11 | 2026-03-12 |
| cnvd-2026-13409 | Apache Tomcat客户端证书验证缺陷漏洞 | 2026-03-11 | 2026-03-11 |
| cnvd-2026-14136 | Siemens RUGGEDCOM APE1808设备Fortigate NGFW V7.4.7之前版本存在多个漏洞 | 2026-03-10 | 2026-03-19 |
| cnvd-2026-13836 | NocoDB访问控制错误漏洞 | 2026-03-10 | 2026-03-16 |
| cnvd-2026-13831 | Siemens SINEC Security Monitor信息泄露漏洞 | 2026-03-10 | 2026-03-17 |
| cnvd-2026-13802 | Siemens COMOS存在多个漏洞 | 2026-03-10 | 2026-03-17 |
| cnvd-2026-13781 | Siemens SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP附加GNU/Linux子系统存在多个漏洞 | 2026-03-10 | 2026-03-17 |
| cnvd-2026-13776 | Siemens SICAM SIAPP SDK存在多个漏洞 | 2026-03-10 | 2026-03-17 |
| cnvd-2026-13775 | Siemens RUGGEDCOM APE1808设备Fortigate NGFW存在多个漏洞 | 2026-03-10 | 2026-03-17 |
| cnvd-2026-13537 | D-Link DIR-513 goform/formAdvFirewall文件缓冲区溢出漏洞 | 2026-03-10 | 2026-03-12 |
| cnvd-2026-13387 | Siemens Heliox EV Chargers访问控制漏洞 | 2026-03-10 | 2026-03-12 |
| cnvd-2026-13386 | Siemens SIMATIC S7-1500设备存储型跨站脚本漏洞 | 2026-03-10 | 2026-03-12 |
| cnvd-2026-13385 | Siemens SIDIS Prime存在多个漏洞 | 2026-03-10 | 2026-03-12 |
| cnvd-2026-13384 | Siemens Mendix应用程序授权配置错误漏洞 | 2026-03-10 | 2026-03-12 |
| cnvd-2026-14972 | Chamilo import.php文件操作系统命令注入漏洞 | 2026-03-09 | 2026-03-26 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01424 | Уязвимость DNS-сервера Dnsmasq, связанная с ошибками реализации проверки безопасности для… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01423 | Уязвимость функции hci_conn_del() модуля net/bluetooth/hci_conn.c подсистемы Bluetooth яд… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01422 | Уязвимость функции DestroyImage компонента MagickCore/image.c консольного графического ре… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01421 | Уязвимость функции ReadMVGImage компонента coders/mvg.c консольного графического редактор… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01420 | Уязвимость функции WriteMPCImage() компонента coders/mpc.c консольного графического редак… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01419 | Уязвимость функции lite_font_map() компонента coders/wmf.c консольного графического редак… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01418 | Уязвимость функции mpi3mr_process_cfg_req() модуля drivers/scsi/mpi3mr/mpi3mr_fw.c драйве… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01417 | Уязвимость функции usb_shark_probe() модуля drivers/media/radio/radio-shark.c драйвера му… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01416 | Уязвимость функции imx_pcie_suspend_noirq() модуля drivers/pci/controller/dwc/pci-imx6.c … | 08.02.2026 | 08.02.2026 |
| bdu:2026-01415 | Уязвимость функции virtnet_rq_alloc() модуля drivers/net/virtio_net.c драйвера поддержки … | 08.02.2026 | 08.02.2026 |
| bdu:2026-01414 | Уязвимость функции disk_destroy_zone_wplugs_hash_table() модуля block/blk-zoned.c поддерж… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01413 | Уязвимость функции can_nocow_file_extent() модуля fs/btrfs/inode.c поддержки файловой сис… | 08.02.2026 | 10.02.2026 |
| bdu:2026-01412 | Уязвимость функции ksmbd_conn_init_server_callbacks() модуля fs/smb/server/connection.c п… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01411 | Уязвимость функции cow_file_range() модуля fs/btrfs/inode.c поддержки файловой системы bt… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01410 | Уязвимость функции sdw_hda_dai_hw_params() модуля sound/soc/sof/intel/hda-dai.c поддержки… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01409 | Уязвимость функции lookup_inline_extent_backref() модуля fs/btrfs/extent-tree.c файловой … | 08.02.2026 | 08.02.2026 |
| bdu:2026-01408 | Уязвимость функции nfsd_net_init() модуля fs/nfsd/nfsctl.c поддержки сетевой файловой сис… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01407 | Уязвимость функции vimc_streamer_pipeline_terminate() модуля drivers/media/test-drivers/v… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01406 | Уязвимость функции parse_durable_handle_context() модуля fs/smb/server/smb2pdu.c поддержк… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01405 | Уязвимость функции veth_pool_store() модуля drivers/net/ethernet/ibm/ibmveth.c драйвера п… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01404 | Уязвимость функции v9fs_vfs_mkdir_dotl() модуля fs/9p/vfs_inode_dotl.c файловой системы я… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01403 | Уязвимость функции get_pat_info() модуля arch/x86/mm/pat/memtype.c платформы x86 ядра опе… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01402 | Уязвимость функции old_deviceless() модуля net/bridge/br_ioctl.c реализации сетевых функц… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01401 | Уязвимость функции ath12k_dp_mon_rx_parse_status_tlv() модуля drivers/net/wireless/ath/at… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01400 | Уязвимость функции hibernate_compressor_param_set() модуля kernel/power/hibernate.c ядра … | 08.02.2026 | 08.02.2026 |
| bdu:2026-01399 | Уязвимость функции dwc_pcie_register_dev() модуля drivers/perf/dwc_pcie_pmu.c драйвера по… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01398 | Уязвимость функции xgene_hwmon_probe() модуля drivers/hwmon/xgene-hwmon.c драйвера монито… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01397 | Уязвимость функции gfs2_dinode_in() модуля fs/gfs2/dir.c файловой системы GFS2 ядра опера… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01396 | Уязвимость функций hfs_find_init() (fs/hfs/bfind.c) и hfs_btree_open() (fs/hfs/btree.c) ф… | 08.02.2026 | 08.02.2026 |
| bdu:2026-01395 | Уязвимость функции tpm2_init_space() модуля drivers/char/tpm/tpm2-space.c драйвера поддер… | 08.02.2026 | 08.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200106-0170 | Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remot… | 2024-07-23T21:52:30.595000Z |
| var-201403-0508 | The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.… | 2024-07-23T21:52:28.560000Z |
| var-202205-1319 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:52:24.897000Z |
| var-201804-1186 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:52:24.271000Z |
| var-201102-0095 | Google Chrome before 9.0.597.94 does not properly perform event handling for animations, … | 2024-07-23T21:52:24.603000Z |
| var-200107-0019 | Cisco routers and switches running IOS 12.0 through 12.2.1 allows a remote attacker to ca… | 2024-07-23T21:51:49.898000Z |
| var-202002-1480 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:51:05.518000Z |
| var-201503-0389 | The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP th… | 2024-07-23T21:51:05.137000Z |
| var-202109-1805 | Malformed requests may cause the server to dereference a NULL pointer. This issue affects… | 2024-07-23T21:51:04.963000Z |
| var-201803-0086 | LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) … | 2024-07-23T21:51:04.545000Z |
| var-202206-1186 | Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may all… | 2024-07-23T21:51:00.840000Z |
| var-201912-1853 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:50:27.591000Z |
| var-201912-0123 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:50:27.004000Z |
| var-201904-0756 | A memory corruption issue was addressed with improved memory handling. This issue affecte… | 2024-07-23T21:50:26.406000Z |
| var-200907-0717 | WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.… | 2024-07-23T21:50:25.062000Z |
| var-202205-1304 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:50:24.904000Z |
| var-200810-0142 | The Postfix configuration file in Mac OS X 10.5.5 causes Postfix to be network-accessible… | 2024-07-23T21:50:24.464000Z |
| var-201107-0125 | The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, a… | 2024-07-23T21:50:23.993000Z |
| var-202006-1651 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 a… | 2024-07-23T21:50:22.831000Z |
| var-200809-0008 | Finder in Apple Mac OS X 10.5 through 10.5.4 does not properly update permission data in … | 2024-07-23T21:50:10.607000Z |
| var-201203-0191 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2024-07-23T21:50:08.937000Z |
| var-201206-0064 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:49:37.613000Z |
| var-202004-2202 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T21:49:25.052000Z |
| var-202207-1485 | An out-of-bounds write issue was addressed with improved input validation. This issue is … | 2024-07-23T21:49:20.877000Z |
| var-201007-0321 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 thro… | 2024-07-23T21:49:20.293000Z |
| var-201803-0099 | The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, whic… | 2024-07-23T21:49:16.122000Z |
| var-200505-0359 | Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape s… | 2024-07-23T21:49:11.998000Z |
| var-202003-1782 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:48:40.941000Z |
| var-201806-1486 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:48:39.044000Z |
| var-200705-0670 | The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.1… | 2024-07-23T21:48:39.239000Z |