Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40515 |
8.7 (4.0)
7.5 (3.1)
|
OpenHarness Permission Bypass via grep and glob root a… |
HKUDS |
OpenHarness |
2026-04-17T16:00:07.116Z | 2026-04-17T16:00:07.116Z |
| CVE-2026-21672 |
N/A
|
A vulnerability allowing local privilege escalati… |
Veeam |
Backup and Replication |
2026-03-12T16:26:52.213Z | 2026-04-17T15:32:11.662Z |
| CVE-2026-21708 |
N/A
|
A vulnerability allowing a Backup Viewer to perfo… |
Veeam |
Backup and Replication |
2026-03-12T16:26:52.931Z | 2026-04-17T15:32:10.772Z |
| CVE-2026-21709 |
N/A
|
A vulnerability allowing a local attacker with ad… |
Veeam |
Backup and Replication |
2026-04-17T15:32:10.755Z | 2026-04-17T15:32:10.755Z |
| CVE-2026-37749 |
9.8 (3.1)
|
A SQL injection vulnerability in CodeAstro Simple… |
n/a |
n/a |
2026-04-17T00:00:00.000Z | 2026-04-17T15:23:39.696Z |
| CVE-2026-6284 |
9.3 (4.0)
9.1 (3.1)
|
Horner Automation Cscape and XL4, XL7 PLC Weak passwor… |
Horner Automation |
Cscape |
2026-04-17T15:14:06.346Z | 2026-04-17T15:14:06.346Z |
| CVE-2026-4878 |
6.7 (3.1)
|
Libcap: libcap: privilege escalation via toctou race c… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-09T14:49:02.942Z | 2026-04-17T15:11:53.403Z |
| CVE-2025-70795 |
5.5 (3.1)
|
STProcessMonitor 11.11.4.0, part of the Safetica … |
n/a |
n/a |
2026-04-17T00:00:00.000Z | 2026-04-17T14:58:56.485Z |
| CVE-2026-6492 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
arnobt78 Hotel Booking Management System Health Check … |
arnobt78 |
Hotel Booking Management System |
2026-04-17T14:00:15.221Z | 2026-04-17T14:32:34.042Z |
| CVE-2026-5231 |
7.2 (3.1)
|
WP Statistics <= 14.16.4 - Unauthenticated Stored Cros… |
veronalabs |
WP Statistics – Simple, privacy-friendly Google Analytics alternative |
2026-04-17T01:24:37.573Z | 2026-04-17T14:30:43.119Z |
| CVE-2026-41153 |
5.8 (3.1)
|
In JetBrains Junie before 252.549.29 command exec… |
JetBrains |
Junie |
2026-04-17T14:29:04.503Z | 2026-04-17T14:29:04.503Z |
| CVE-2026-5502 |
5.3 (3.1)
|
Tutor LMS <= 3.9.8 - Authenticated (Subscriber+) Arbit… |
themeum |
Tutor LMS – eLearning and online course solution |
2026-04-17T03:36:45.463Z | 2026-04-17T14:28:01.492Z |
| CVE-2026-6451 |
4.3 (3.1)
|
CMS für Motorrad Werkstätten <= 1.0.0 - Cross-Site Req… |
tholstkabelbwde |
Plugin: CMS für Motorrad Werkstätten |
2026-04-17T07:45:57.242Z | 2026-04-17T14:21:59.771Z |
| CVE-2026-6493 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
lukevella rallly Reset Password reset-password-form.ts… |
lukevella |
rallly |
2026-04-17T14:15:15.422Z | 2026-04-17T14:15:15.422Z |
| CVE-2026-23779 |
6.7 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T09:04:37.716Z | 2026-04-17T14:08:36.395Z |
| CVE-2025-46607 |
6.6 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T11:13:08.869Z | 2026-04-17T14:05:03.992Z |
| CVE-2026-6490 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
QueryMine sms GET Request Parameter deletecourse.php s… |
QueryMine |
sms |
2026-04-17T13:15:11.136Z | 2026-04-17T14:04:14.886Z |
| CVE-2026-40458 |
7 (4.0)
|
Cross-Site Request Forgery in PAC4J |
PAC4J |
PAC4J |
2026-04-17T13:18:26.308Z | 2026-04-17T14:00:04.811Z |
| CVE-2026-40459 |
8.7 (4.0)
|
LDAP Injection in PAC4J |
PAC4J |
PAC4J |
2026-04-17T13:18:39.181Z | 2026-04-17T13:54:22.069Z |
| CVE-2026-6491 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
libvips nip2 vips7compat.c im_minpos_vec heap-based overflow |
n/a |
libvips |
2026-04-17T13:45:11.506Z | 2026-04-17T13:45:11.506Z |
| CVE-2026-31317 |
N/A
|
Craftql v1.3.7 and before is vulnerable to Server… |
n/a |
n/a |
2026-04-17T00:00:00.000Z | 2026-04-17T13:44:19.925Z |
| CVE-2026-41113 |
8.1 (3.1)
|
sagredo qmail before 2026.04.07 allows tls_quit r… |
sagredo |
qmail |
2026-04-16T22:02:10.225Z | 2026-04-17T13:35:34.787Z |
| CVE-2025-14831 |
5.3 (3.1)
|
Gnutls: gnutls: denial of service via excessive resour… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-02-09T14:51:32.447Z | 2026-04-17T13:33:25.218Z |
| CVE-2023-52356 |
7.5 (3.1)
|
Libtiff: segment fault in libtiff in tiffreadrgbatile… |
|
|
2024-01-25T20:03:40.971Z | 2026-04-17T13:33:12.074Z |
| CVE-2024-58343 |
4.3 (3.1)
|
Vision Helpdesk before 5.7.0 (patched in 5.6.10) … |
Vision |
Helpdesk |
2026-04-16T22:27:03.084Z | 2026-04-17T13:31:05.652Z |
| CVE-2026-4111 |
7.5 (3.1)
|
Libarchive: infinite loop denial of service in rar5 de… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-13T11:45:20.653Z | 2026-04-17T13:30:37.852Z |
| CVE-2026-22734 |
8.6 (3.1)
|
Cloud Foundry UAA SAML 2.0 Signature Bypass |
Cloud Foundry |
UUA |
2026-04-16T23:33:43.596Z | 2026-04-17T13:21:04.331Z |
| CVE-2026-6487 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Qihui jtbc5 CMS Code Endpoint manage.php path traversal |
Qihui |
jtbc5 CMS |
2026-04-17T12:30:39.824Z | 2026-04-17T13:18:00.383Z |
| CVE-2026-23777 |
4.3 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T11:52:13.427Z | 2026-04-17T13:14:12.461Z |
| CVE-2026-33392 |
7.2 (3.1)
|
In JetBrains YouTrack before 2025.3.131383 high p… |
JetBrains |
YouTrack |
2026-04-17T07:46:11.710Z | 2026-04-17T13:11:06.503Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40960 |
8.1 (3.1)
|
Luanti 5 before 5.15.2 sometimes allows unintende… |
Luanti |
Luanti |
2026-04-16T00:54:45.935Z | 2026-04-16T12:31:57.082Z |
| CVE-2026-40959 |
9.3 (3.1)
|
Luanti 5 before 5.15.2, when LuaJIT is used, allo… |
Luanti |
Luanti |
2026-04-16T00:51:19.520Z | 2026-04-16T12:32:04.767Z |
| CVE-2026-40947 |
2.9 (3.1)
|
Yubico libfido2 before 1.17.0, python-fido2 befor… |
Yubico |
libfido2 |
2026-04-15T23:13:38.977Z | 2026-04-16T13:18:13.069Z |
| CVE-2026-40922 |
5.3 (4.0)
|
SiYuan: Incomplete sanitization of bazaar README allow… |
siyuan-note |
siyuan |
2026-04-16T23:14:00.592Z | 2026-04-16T23:14:00.592Z |
| CVE-2026-40901 |
7.5 (4.0)
|
DataEase: Quartz Deserialization → Remote Code Execution |
dataease |
dataease |
2026-04-16T20:57:45.978Z | 2026-04-17T18:47:00.448Z |
| CVE-2026-40900 |
8.7 (4.0)
|
DataEase has SQL Injection via Stacked Queries |
dataease |
dataease |
2026-04-16T20:53:27.788Z | 2026-04-17T12:38:32.676Z |
| CVE-2026-40899 |
8.3 (4.0)
|
DataEase has an Arbitrary File Read Vulnerability |
dataease |
dataease |
2026-04-16T19:48:44.201Z | 2026-04-16T19:48:44.201Z |
| CVE-2026-40719 |
7.5 (3.1)
|
Deadwood in MaraDNS 3.5.0036 allows attackers to … |
MaraDNS |
MaraDNS |
2026-04-15T06:23:09.912Z | 2026-04-15T13:22:14.897Z |
| CVE-2026-40683 |
7.7 (3.1)
|
In OpenStack Keystone before 28.0.1, the LDAP ide… |
OpenStack |
Keystone |
2026-04-14T20:05:03.274Z | 2026-04-14T20:14:44.539Z |
| CVE-2026-40504 |
9.3 (4.0)
9.8 (3.1)
|
Creolabs Gravity < 0.9.6 Heap Buffer Overflow via grav… |
marcobambini |
gravity |
2026-04-16T01:10:27.364Z | 2026-04-16T13:45:35.255Z |
| CVE-2026-40503 |
7.1 (4.0)
6.5 (3.1)
|
OpenHarness Path Traversal Information Disclosure via … |
HKUDS |
OpenHarness |
2026-04-16T00:08:09.535Z | 2026-04-16T13:42:38.789Z |
| CVE-2026-40502 |
8.7 (4.0)
8.8 (3.1)
|
OpenHarness Remote Administrative Command Injection vi… |
HKUDS |
OpenHarness |
2026-04-16T00:08:34.463Z | 2026-04-16T14:19:24.128Z |
| CVE-2026-40500 |
6.1 (4.0)
6.8 (3.1)
|
ProcessWire CMS SSRF via Add Module From URL |
processwire |
processwire |
2026-04-15T21:25:53.214Z | 2026-04-16T13:38:15.341Z |
| CVE-2026-40499 |
8.4 (4.0)
|
radare2 < 6.1.4 Command Injection via PDB Parser print… |
radareorg |
radare2 |
2026-04-15T02:05:20.899Z | 2026-04-16T14:06:54.448Z |
| CVE-2026-40459 |
8.7 (4.0)
|
LDAP Injection in PAC4J |
PAC4J |
PAC4J |
2026-04-17T13:18:39.181Z | 2026-04-17T13:54:22.069Z |
| CVE-2026-40458 |
7 (4.0)
|
Cross-Site Request Forgery in PAC4J |
PAC4J |
PAC4J |
2026-04-17T13:18:26.308Z | 2026-04-17T14:00:04.811Z |
| CVE-2026-40322 |
9.1 (3.1)
|
SiYuan: Mermaid `javascript:` Link Injection Leads to … |
siyuan-note |
siyuan |
2026-04-16T23:00:07.719Z | 2026-04-17T12:26:06.118Z |
| CVE-2026-40318 |
8.5 (3.1)
|
SiYuan: Publish Reader Path Traversal Delete via `remo… |
siyuan-note |
siyuan |
2026-04-16T22:54:47.881Z | 2026-04-16T22:54:47.881Z |
| CVE-2026-40316 |
8.8 (3.1)
|
OWASP BLT has RCE in Github Actions via untrusted Djan… |
OWASP-BLT |
BLT |
2026-04-15T22:49:18.636Z | 2026-04-16T14:18:12.374Z |
| CVE-2026-40308 |
8.8 (4.0)
|
My Calendar: Unauthenticated Information Disclosure (I… |
joedolson |
my-calendar |
2026-04-16T21:30:52.401Z | 2026-04-17T12:32:26.622Z |
| CVE-2026-40291 |
8.8 (3.1)
|
Chamilo LMS has Privilege Escalation via API User Role… |
chamilo |
chamilo-lms |
2026-04-14T21:37:55.490Z | 2026-04-15T14:24:29.902Z |
| CVE-2026-40261 |
8.8 (3.1)
|
Composer has Command Injection via Malicious Perforce … |
composer |
composer |
2026-04-15T20:56:32.182Z | 2026-04-16T13:41:12.977Z |
| CVE-2026-40260 |
6.9 (4.0)
|
pypdf: Manipulated XMP metadata entity declarations ca… |
py-pdf |
pypdf |
2026-04-16T23:18:26.687Z | 2026-04-17T18:42:05.059Z |
| CVE-2026-40259 |
8.1 (3.1)
|
SiYuan: Publish Reader Can Arbitrarily Delete Attribut… |
siyuan-note |
siyuan |
2026-04-16T22:49:36.992Z | 2026-04-16T22:50:20.441Z |
| CVE-2026-40256 |
5 (3.1)
|
Weblate: Prefix-Based Repository Boundary Check Bypass… |
WeblateOrg |
weblate |
2026-04-15T18:36:44.975Z | 2026-04-16T14:11:15.386Z |
| CVE-2026-40255 |
6.1 (3.1)
|
@adonisjs/http-server has an Open Redirect vulnerability |
adonisjs |
http-server |
2026-04-16T22:25:38.155Z | 2026-04-17T18:43:10.697Z |
| CVE-2026-40253 |
6.8 (3.1)
|
openCryptoki: Memory safety vulnerabilities in BER/DER… |
opencryptoki |
opencryptoki |
2026-04-16T22:04:44.005Z | 2026-04-17T12:27:41.682Z |
| CVE-2026-40249 |
6.9 (4.0)
|
free5gc UDR fail-open request handling in PolicyDataSu… |
free5gc |
free5gc |
2026-04-16T21:59:36.282Z | 2026-04-16T21:59:36.282Z |
| CVE-2026-40248 |
8.7 (4.0)
|
free5gc UDR improper path validation allows unauthenti… |
free5gc |
free5gc |
2026-04-16T21:57:13.101Z | 2026-04-16T21:57:13.101Z |
| CVE-2026-40247 |
8.7 (4.0)
|
free5gc UDR improper path validation allows unauthenti… |
free5gc |
free5gc |
2026-04-16T21:54:04.151Z | 2026-04-17T18:44:09.831Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-40899 | DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below co… | 2026-04-16T20:16:38.957 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40719 | Deadwood in MaraDNS 3.5.0036 allows attackers to exhaust connection slots via a zone whose authorit… | 2026-04-15T07:16:11.193 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40683 | In OpenStack Keystone before 28.0.1, the LDAP identity backend does not convert the user enabled at… | 2026-04-14T20:16:48.203 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40504 | Creolabs Gravity before 0.9.6 contains a heap buffer overflow vulnerability in the gravity_vm_exec … | 2026-04-16T02:16:11.693 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40503 | OpenHarness prior to commit dd1d235 contains a path traversal vulnerability that allows remote gate… | 2026-04-16T01:16:11.440 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40502 | OpenHarness prior to commit dd1d235 contains a command injection vulnerability that allows remote g… | 2026-04-16T01:16:11.250 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40500 | ProcessWire CMS version 3.0.255 and prior contain a server-side request forgery vulnerability in th… | 2026-04-15T22:17:22.377 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40499 | radare2 prior to version 6.1.4 contains a command injection vulnerability in the PDB parser's print… | 2026-04-15T04:17:48.330 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40459 | PAC4J is vulnerable to LDAP Injection in multiple methods. A low-privileged remote attacker can inj… | 2026-04-17T14:16:34.123 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40458 | PAC4J is vulnerable to Cross-Site Request Forgery (CSRF). A malicious attacker can craft a speciall… | 2026-04-17T14:16:33.987 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40322 | SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid… | 2026-04-16T23:16:33.733 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40318 | SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /ap… | 2026-04-16T23:16:33.590 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40316 | OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses websites, apps, gi… | 2026-04-15T23:16:10.220 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40308 | My Calendar is a WordPress plugin for managing calendar events. In versions 3.7.6 and below, the mc… | 2026-04-16T22:16:38.940 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40291 | Chamilo LMS is an open-source learning management system. In versions prior to 2.0.0-RC.3, an insec… | 2026-04-14T22:16:32.507 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40261 | Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain… | 2026-04-15T21:17:27.693 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40260 | pypdf is a free and open-source pure-python PDF library. In versions prior to 6.10.0, manipulated X… | 2026-04-17T01:17:39.733 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40259 | SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, the /ap… | 2026-04-16T23:16:33.430 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40256 | Weblate is a web based localization tool. In versions prior to 5.17, repository-boundary validation… | 2026-04-15T19:16:37.470 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40255 | AdonisJS HTTP Server is a package for handling HTTP requests in the AdonisJS framework. In @adonisj… | 2026-04-16T23:16:33.267 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40253 | openCryptoki is a PKCS#11 library and provides tooling for Linux and AIX. In versions 3.26.0 and be… | 2026-04-16T23:16:33.107 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40249 | free5GC is an open-source implementation of the 5G core network. In versions 4.2.1 and below of the… | 2026-04-16T22:16:38.793 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40248 | free5GC is an open-source implementation of the 5G core network. In versions 4.2.1 and below of the… | 2026-04-16T22:16:38.657 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40247 | free5GC is an open-source implementation of the 5G core network. In versions 4.2.1 and below of the… | 2026-04-16T22:16:38.510 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40246 | free5GC is an open-source implementation of the 5G core network. In versions 1.4.2 and below of the… | 2026-04-16T22:16:38.370 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40245 | Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. Ve… | 2026-04-16T00:16:29.060 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40193 | maddy is a composable, all-in-one mail server. Versions prior to 0.9.3 contain an LDAP injection vu… | 2026-04-16T00:16:28.163 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40192 | Pillow is a Python imaging library. Versions 10.3.0 through 12.1.1 did not limit the amount of GZIP… | 2026-04-15T23:16:10.053 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40186 | ApostropheCMS is an open-source Node.js content management system. A regression introduced in commi… | 2026-04-15T21:17:27.523 | 2026-04-17T15:38:09.243 |
| fkie_cve-2026-40179 | Prometheus is an open-source monitoring system and time series database. Versions 3.0 through 3.5.1… | 2026-04-15T23:16:09.870 | 2026-04-17T15:38:09.243 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-qqvm-66q4-vf5c |
5.3 (4.0)
|
Flowise: SSRF Protection Bypass via Direct node-fetch / axios Usage (Patch Enforcement Failure) | 2026-04-16T21:23:03Z | 2026-04-16T21:23:03Z |
| ghsa-w6v6-49gh-mc9w |
4.9 (4.0)
|
Flowise: Path Traversal in Vector Store basePath | 2026-04-16T21:22:49Z | 2026-04-16T21:22:49Z |
| ghsa-m7mq-85xj-9x33 |
5.6 (3.1)
|
Flowise: Weak Default Token Hash Secret | 2026-04-16T21:22:36Z | 2026-04-16T21:22:36Z |
| ghsa-2qqc-p94c-hxwh |
5.6 (3.1)
|
Flowise: Weak Default Express Session Secret | 2026-04-16T21:22:00Z | 2026-04-16T21:22:00Z |
| ghsa-cc4f-hjpj-g9p8 |
5.6 (3.1)
|
Flowise: Weak Default JWT Secrets | 2026-04-16T21:21:12Z | 2026-04-16T21:21:12Z |
| ghsa-6pcv-j4jx-m4vx |
5.3 (3.1)
|
Flowise: Unauthenticated Information Disclosure of OAuth Secrets (Cleartext) via GET Request | 2026-04-16T21:20:05Z | 2026-04-16T21:20:05Z |
| ghsa-gj9q-8w99-mp8j |
2.1 (4.0)
|
OpenClaw: TOCTOU read in exec script preflight | 2026-04-16T21:19:21Z | 2026-04-16T21:19:21Z |
| ghsa-c9gw-hvqq-f33r |
9.9 (3.1)
|
Flowise: Authenticated RCE Via MCP Adapters | 2026-04-16T21:18:17Z | 2026-04-16T21:18:17Z |
| ghsa-xgp8-3hg3-c2mh |
2.2 (3.1)
|
webpki: Name constraints were accepted for certificates asserting a wildcard name | 2026-04-16T21:17:12Z | 2026-04-16T21:17:12Z |
| ghsa-v92g-xgxw-vvmm |
6.3 (4.0)
|
Mako: Path traversal via double-slash URI prefix in TemplateLookup | 2026-04-16T21:16:40Z | 2026-04-16T21:16:40Z |
| ghsa-965h-392x-2mh5 |
2.2 (3.1)
|
webpki: Name constraints for URI names were incorrectly accepted | 2026-04-16T21:16:22Z | 2026-04-16T21:16:23Z |
| ghsa-hf5p-q87m-crj7 |
5.9 (3.1)
|
Junrar: Path Traversal (Zip-Slip) via Sibling Directory Name Prefix | 2026-04-16T21:14:33Z | 2026-04-16T21:14:33Z |
| ghsa-533q-w4g6-5586 |
7.5 (3.1)
|
PsiTransfer: Upload PATCH path traversal can create `config.<NODE_ENV>.js` and lead to code executi… | 2026-04-16T21:13:40Z | 2026-04-16T21:13:40Z |
| ghsa-wqq3-wfmp-v85g |
4.7 (3.1)
|
Mojic: Observable Timing Discrepancy in HMAC Verification | 2026-04-16T21:10:17Z | 2026-04-16T21:10:17Z |
| ghsa-jhm7-29pj-4xvf |
5.9 (3.1)
|
@node-oauth/oauth2-server: PKCE code_verifier ABNF not enforced in token exchange allows brute-forc… | 2026-04-16T21:09:50Z | 2026-04-16T21:09:50Z |
| ghsa-qr3m-xw4c-jqw3 |
9.1 (3.1)
|
ChilliCream GraphQL Platform: Utf8GraphQLParser Stack Overflow via Deeply Nested GraphQL Documents | 2026-04-16T21:09:40Z | 2026-04-16T21:09:40Z |
| ghsa-3jpj-v3xr-5h6g |
5.3 (3.1)
|
zrok: Broken ownership check in DELETE /api/v2/unaccess allows non-admin to delete global frontend … | 2026-04-16T21:09:23Z | 2026-04-16T21:09:23Z |
| ghsa-cpf9-ph2j-ccr9 |
7.5 (3.1)
|
zrok: Unauthenticated DoS via unbounded memory allocation in striped session cookie parsing | 2026-04-16T21:09:08Z | 2026-04-16T21:09:08Z |
| ghsa-4fxq-2x3x-6xqx |
6.1 (3.1)
|
zrok: Reflected XSS in GitHub OAuth callback via unsanitized refreshInterval error rendering | 2026-04-16T21:08:55Z | 2026-04-16T21:08:55Z |
| ghsa-ffgh-3jrf-8wvh |
5.0 (3.1)
|
Weblate: Prefix-Based Repository Boundary Check Bypass via Symlink/Junction Path Prefix Collision | 2026-04-16T21:08:47Z | 2026-04-16T21:08:47Z |
| ghsa-9mrh-v2v3-xpfm |
6.1 (3.1)
|
sanitize-html allowedTags Bypass via Entity-Decoded Text in nonTextTags Elements | 2026-04-16T21:08:29Z | 2026-04-16T21:08:29Z |
| ghsa-95mq-xwj4-r47p |
9.4 (3.1)
|
Dgraph: Unauthenticated /debug/pprof/cmdline discloses admin auth token, enabling unauthorized acce… | 2026-04-16T21:08:07Z | 2026-04-16T21:08:07Z |
| ghsa-c276-fj82-f2pq |
5.3 (3.1)
|
ApostropheCMS: Information Disclosure via choices/counts Query Parameters Bypassing publicApiProjec… | 2026-04-16T20:45:15Z | 2026-04-16T20:45:15Z |
| ghsa-f8hv-g549-hwg2 |
4.1 (3.1)
|
Weblate: SSRF via the webhook add-on using unprotected fetch_url() | 2026-04-16T20:45:04Z | 2026-04-16T20:45:04Z |
| ghsa-9gcg-w975-3rjh |
5.4 (3.1)
|
Istio: AuthorizationPolicy serviceAccounts regex injection via unescaped dots | 2026-04-16T20:44:46Z | 2026-04-16T20:44:46Z |
| ghsa-353c-v8x9-v7c3 |
8.7 (4.0)
|
MCP-Framework: Unbounded memory allocation in readRequestBody allows denial of service via HTTP transport | 2026-04-16T20:44:32Z | 2026-04-16T20:44:32Z |
| ghsa-855c-r2vq-c292 |
8.7 (3.1)
|
Stored XSS in SEO Fields Leads to Authenticated API Data Exposure in ApostropheCMS | 2026-04-16T20:44:18Z | 2026-04-16T20:44:18Z |
| ghsa-pc3f-x583-g7j2 |
8.7 (4.0)
|
SpdyStream: DOS on CRI | 2026-04-16T20:44:01Z | 2026-04-16T20:44:01Z |
| ghsa-3382-gw9x-477v |
8.8 (3.1)
|
Weblate: Privilege escalation in the user API endpoint | 2026-04-16T20:43:48Z | 2026-04-16T20:43:49Z |
| ghsa-xrwr-fcw6-fmq8 |
5.0 (3.1)
|
Weblate: SSRF via Project-Level Machinery Configuration | 2026-04-16T20:43:38Z | 2026-04-16T20:43:38Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2009-12 |
|
The password_checker function in config/multiconfig.py in MoinMoin 1.6.1 uses the crackli… | moin | 2009-03-30T01:30:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2008-14 |
|
Multiple cross-site request forgery (CSRF) vulnerabilities in Plone CMS 3.0.5 and 3.0.6 a… | Plone | 2008-03-20T00:44:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2008-13 |
|
Multiple cross-site scripting (XSS) vulnerabilities in macro/AdvancedSearch.py in moin (a… | moin | 2008-07-30T18:41:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2008-12 |
|
The user form processing (userform.py) in MoinMoin before 1.6.3, when using ACLs or a non… | moin | 2008-04-25T06:05:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2007-4 |
|
Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrar… | plone | 2007-11-07T21:46:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2006-6 |
|
Unspecified vulnerability in PlonePAS in Plone 2.5 and 2.5.1, when anonymous member regis… | Plone | 2006-12-07T23:28:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2006-5 |
|
Unspecified vulnerability in the Password Reset Tool before 0.4.1 on Plone 2.5 and 2.5.1 … | Plone | 2006-09-29T19:07:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43072 |
7.5 (3.1)
|
An inflation issue was discovered in Chia Network CAT1 Standard 1.0.0. Previously minted … | chia-blockchain | 2022-07-29T21:15:00Z | 2024-11-25T18:33:04.123836Z |
| pysec-2022-43068 |
6.3 (3.1)
|
A race condition flaw was found in ansible-runner, where an attacker could watch for rapi… | ansible-runner | 2022-08-23T16:15:00Z | 2024-11-25T18:33:04.123836Z |
| pysec-2022-43067 |
6.6 (3.1)
|
A flaw was found in ansible-runner where the default temporary files configuration in ans… | ansible-runner | 2022-08-23T16:15:00Z | 2024-11-25T18:33:04.123836Z |
| pysec-2013-35 |
|
The clear_volume function in LVMVolumeDriver driver in OpenStack Cinder 2013.1.1 through … | cinder | 2013-09-16T19:14:00Z | 2024-11-25T18:33:04.123836Z |
| pysec-2022-43063 |
9.8 (3.1)
|
Code injection in paddle.audio.functional.get_window in PaddlePaddle 2.4.0-rc0 allows arb… | paddlepaddle | 2022-12-07T09:15:00+00:00 | 2024-11-22T12:27:25.862098+00:00 |
| pysec-2024-151 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Vyper compi… | vyper | 2024-01-30T21:15:00+00:00 | 2024-11-21T14:23:03.091183+00:00 |
| pysec-2024-150 |
9.8 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. Arrays can … | vyper | 2024-02-07T17:15:00+00:00 | 2024-11-21T14:23:03.024978+00:00 |
| pysec-2022-43176 |
9.8 (3.1)
|
The Zibal package in PyPI v1.0.0 was discovered to contain a code execution backdoor. Thi… | zibal | 2022-06-24T21:15:00Z | 2024-11-21T14:23:03.404044Z |
| pysec-2022-43175 |
6.1 (3.1)
|
Drag and Drop XBlock v2 implements a drag-and-drop style problem, where a learner has to … | xblock-drag-and-drop-v2 | 2022-11-28T21:15:00+00:00 | 2024-11-21T14:23:03.352390+00:00 |
| pysec-2022-43173 |
9.8 (3.1)
|
The wikifaces package in PyPI v1.0 included a code execution backdoor inserted by a third… | wikifaces | 2022-07-22T15:15:00Z | 2024-11-21T14:23:03.244154Z |
| pysec-2022-43172 |
9.8 (3.1)
|
The Watertools package in PyPI v0.0.0 was discovered to contain a code execution backdoor… | watertools | 2022-06-24T21:15:00Z | 2024-11-21T14:23:03.143453Z |
| pysec-2019-256 |
7.5 (3.1)
|
In libwebp 0.5.1, there is a double free bug in libwebpmux. | webp | 2019-05-23T18:29:00Z | 2024-11-21T14:23:03.194401Z |
| pysec-2017-148 |
6.1 (3.1)
|
Cross-site scripting (XSS) vulnerability in ZMI pages that use the manage_tabs_message in… | zope | 2017-08-07T17:29:00Z | 2024-11-21T14:23:03.459792Z |
| pysec-2006-8 |
|
The docutils module in Zope (Zope2) 2.7.0 through 2.7.9 and 2.8.0 through 2.8.8 does not … | zope2 | 2006-09-19T18:07:00Z | 2024-11-21T14:23:03.63347Z |
| pysec-2006-7 |
|
Zope 2.7.0 to 2.7.8, 2.8.0 to 2.8.7, and 2.9.0 to 2.9.3 (Zope2) does not disable the "raw… | zope2 | 2006-07-07T23:05:00Z | 2024-11-21T14:23:03.576588Z |
| pysec-2024-149 |
9.8 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In versions… | vyper | 2024-02-01T17:15:00+00:00 | 2024-11-21T14:23:02.970591+00:00 |
| pysec-2024-148 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. When calls … | vyper | 2024-02-02T17:15:00+00:00 | 2024-11-21T14:23:02.917464+00:00 |
| pysec-2024-147 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. There is an error in the stack m… | vyper | 2024-02-05T21:15:00+00:00 | 2024-11-21T14:23:02.864019+00:00 |
| pysec-2023-307 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Contr… | vyper | 2023-12-13T20:15:00+00:00 | 2024-11-21T14:23:02.808922+00:00 |
| pysec-2023-306 |
8.1 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). In ve… | vyper | 2023-09-18T21:16:00+00:00 | 2024-11-21T14:23:02.752932+00:00 |
| pysec-2023-305 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Start… | vyper | 2023-09-18T21:16:00+00:00 | 2024-11-21T14:23:02.698147+00:00 |
| pysec-2023-304 |
8.8 (3.1)
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federate… | vantage6-server | 2023-11-14T21:15:00+00:00 | 2024-11-21T14:23:02.641254+00:00 |
| pysec-2023-303 |
8.8 (3.1)
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federate… | vantage6-node | 2023-11-14T21:15:00+00:00 | 2024-11-21T14:23:02.574095+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-4262 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.557062Z |
| gsd-2024-4261 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.534179Z |
| gsd-2024-4260 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.587447Z |
| gsd-2024-4259 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.580041Z |
| gsd-2024-4258 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.581681Z |
| gsd-2024-4257 | A vulnerability was found in BlueNet Technology Clinical Browsing System 1.2.1. It has be… | 2024-04-27T05:02:16.570113Z |
| gsd-2024-4256 | A vulnerability was found in Techkshetra Info Solutions Savsoft Quiz 6.0 and classified a… | 2024-04-27T05:02:16.544284Z |
| gsd-2024-4255 | A vulnerability, which was classified as critical, has been found in Ruijie RG-UAC up to … | 2024-04-27T05:02:16.623487Z |
| gsd-2024-4254 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.587642Z |
| gsd-2024-4253 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.562905Z |
| gsd-2024-4252 | A vulnerability classified as critical has been found in Tenda i22 1.0.0.3(4687). This af… | 2024-04-27T05:02:16.602334Z |
| gsd-2024-4251 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been rated as critical. Aff… | 2024-04-27T05:02:16.569517Z |
| gsd-2024-4250 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been declared as critical. … | 2024-04-27T05:02:16.555748Z |
| gsd-2024-4249 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been classified as critical… | 2024-04-27T05:02:16.524020Z |
| gsd-2024-4248 | A vulnerability was found in Tenda i21 1.0.0.14(4656) and classified as critical. This is… | 2024-04-27T05:02:16.569718Z |
| gsd-2024-4247 | A vulnerability has been found in Tenda i21 1.0.0.14(4656) and classified as critical. Th… | 2024-04-27T05:02:16.588079Z |
| gsd-2024-4246 | A vulnerability, which was classified as critical, was found in Tenda i21 1.0.0.14(4656).… | 2024-04-27T05:02:16.603900Z |
| gsd-2024-4245 | A vulnerability, which was classified as critical, has been found in Tenda i21 1.0.0.14(4… | 2024-04-27T05:02:16.558324Z |
| gsd-2024-4244 | A vulnerability classified as critical was found in Tenda W9 1.0.0.7(4456). Affected by t… | 2024-04-27T05:02:16.554860Z |
| gsd-2024-4243 | A vulnerability classified as critical has been found in Tenda W9 1.0.0.7(4456). Affected… | 2024-04-27T05:02:16.549231Z |
| gsd-2024-4242 | A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been rated as critical. This … | 2024-04-27T05:02:16.596328Z |
| gsd-2024-4241 | A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been declared as critical. Th… | 2024-04-27T05:02:16.531844Z |
| gsd-2024-4240 | A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been classified as critical. … | 2024-04-27T05:02:16.585061Z |
| gsd-2024-4239 | A vulnerability was found in Tenda AX1806 1.0.0.1 and classified as critical. Affected by… | 2024-04-27T05:02:16.575159Z |
| gsd-2024-4238 | A vulnerability has been found in Tenda AX1806 1.0.0.1 and classified as critical. Affect… | 2024-04-27T05:02:16.577033Z |
| gsd-2024-4237 | A vulnerability, which was classified as critical, was found in Tenda AX1806 1.0.0.1. Aff… | 2024-04-27T05:02:16.532589Z |
| gsd-2024-4236 | A vulnerability, which was classified as critical, has been found in Tenda AX1803 1.0.0.1… | 2024-04-27T05:02:16.536897Z |
| gsd-2024-4235 | A vulnerability classified as problematic was found in Netgear DG834Gv5 1.6.01.34. This v… | 2024-04-27T05:02:16.608439Z |
| gsd-2024-4234 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:16.558629Z |
| gsd-2024-4233 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.618656Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2734 | Malicious code in buildkite-test-collector-mocha-example (npm) | 2026-04-16T09:47:30Z | 2026-04-16T09:47:30Z |
| mal-2026-2733 | Malicious code in buildkite-test-collector-jest-example (npm) | 2026-04-16T09:47:28Z | 2026-04-16T09:47:28Z |
| mal-2026-2732 | Malicious code in buildkite-test-collector-jasmine-example (npm) | 2026-04-16T09:47:26Z | 2026-04-16T09:47:26Z |
| mal-2026-2731 | Malicious code in buildkite-test-collector-cypress-example (npm) | 2026-04-16T09:47:24Z | 2026-04-16T09:47:24Z |
| mal-2026-2730 | Malicious code in browserstack-utils (npm) | 2026-04-16T09:47:17Z | 2026-04-16T09:47:17Z |
| mal-2026-2729 | Malicious code in apl-github-test (npm) | 2026-04-16T09:44:48Z | 2026-04-16T09:44:48Z |
| mal-2026-2728 | Malicious code in apl-announcements (npm) | 2026-04-16T09:44:46Z | 2026-04-16T09:44:46Z |
| mal-2026-2727 | Malicious code in agent-starter (npm) | 2026-04-16T09:43:16Z | 2026-04-16T09:43:16Z |
| mal-2026-2726 | Malicious code in agent-scheduler (npm) | 2026-04-16T09:43:13Z | 2026-04-16T09:43:13Z |
| mal-2026-2725 | Malicious code in agent-framework-web (npm) | 2026-04-16T09:43:12Z | 2026-04-16T09:43:12Z |
| mal-2026-2724 | Malicious code in agdebugger-frontend (npm) | 2026-04-16T09:43:10Z | 2026-04-16T09:43:10Z |
| mal-2026-2723 | Malicious code in actions-label-commenter (npm) | 2026-04-16T09:42:56Z | 2026-04-16T09:42:56Z |
| mal-2026-2722 | Malicious code in action-setup-enos (npm) | 2026-04-16T09:42:55Z | 2026-04-16T09:42:55Z |
| mal-2026-2721 | Malicious code in access-worker-test (npm) | 2026-04-16T09:42:49Z | 2026-04-16T09:42:49Z |
| mal-2026-2720 | Malicious code in aca-review-apps (npm) | 2026-04-16T09:42:47Z | 2026-04-16T09:42:47Z |
| mal-2026-2719 | Malicious code in @youcanneverguessthisonereally/test-pkg (npm) | 2026-04-16T09:42:05Z | 2026-04-16T09:42:05Z |
| mal-2026-2718 | Malicious code in @the-coca-cola-company/receipt-scanner-admin-lib (npm) | 2026-04-16T09:39:26Z | 2026-04-16T09:39:26Z |
| mal-2026-2717 | Malicious code in @tax-taxdev/tools-scripts (npm) | 2026-04-16T09:39:16Z | 2026-04-16T09:39:16Z |
| mal-2026-2716 | Malicious code in @needl-ai/common (npm) | 2026-04-16T09:35:35Z | 2026-04-16T09:35:35Z |
| mal-2026-2715 | Malicious code in @mesh-atoms/typography (npm) | 2026-04-16T09:35:32Z | 2026-04-16T09:35:32Z |
| mal-2026-2714 | Malicious code in @gameforge/http-server (npm) | 2026-04-16T09:34:11Z | 2026-04-16T09:34:11Z |
| mal-2026-2713 | Malicious code in @fuego-tools/analytics (npm) | 2026-04-16T09:34:04Z | 2026-04-16T09:34:04Z |
| mal-2026-2712 | Malicious code in @evoja-web/redaction (npm) | 2026-04-16T09:33:49Z | 2026-04-16T09:33:49Z |
| mal-2026-2711 | Malicious code in @evoja-web/react-login (npm) | 2026-04-16T09:33:48Z | 2026-04-16T09:33:48Z |
| mal-2026-2710 | Malicious code in @evoja-web/create-react-project (npm) | 2026-04-16T09:33:46Z | 2026-04-16T09:33:46Z |
| mal-2026-2709 | Malicious code in @appleseed-apple/ac-sass-kit (npm) | 2026-04-16T09:29:32Z | 2026-04-16T09:29:32Z |
| mal-2026-2708 | Malicious code in @3stripes/toolkit (npm) | 2026-04-16T09:28:30Z | 2026-04-16T09:28:30Z |
| mal-2026-2707 | Malicious code in @3stripes/shared (npm) | 2026-04-16T09:28:29Z | 2026-04-16T09:28:29Z |
| mal-2026-2706 | Malicious code in @3stripes/sdk (npm) | 2026-04-16T09:28:28Z | 2026-04-16T09:28:28Z |
| mal-2026-2705 | Malicious code in @3stripes/core (npm) | 2026-04-16T09:28:27Z | 2026-04-16T09:28:27Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0658 | Microsoft SQL Server: Mehrere Schwachstellen ermöglichen Erlangen von Administratorrechten | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0657 | Microsoft ASP.NET und .NET: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0656 | Microsoft Authenticator App: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0655 | Microsoft Azure Komponenten: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0377 | Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2026-02-10T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2026-0629 | Zabbix: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0628 | Nextcloud: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0627 | CoreDNS: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0626 | Flowise: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0615 | Red Hat Enterprise Linux (nfs-utils): Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0612 | Google Chrome: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0611 | Eclipse Jetty: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-04T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0579 | Django: Mehrere Schwachstellen | 2026-03-03T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0565 | FreeType: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-03-02T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0481 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0452 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-02-18T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0427 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2026-02-16T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0357 | Roundcube: Mehrere Schwachstellen | 2026-02-09T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0284 | libxml2 (xmllint): Schwachstelle ermöglicht Denial of Service | 2026-02-02T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0265 | expat: Schwachstelle ermöglicht Codeausführung | 2026-01-29T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0213 | expat: Schwachstelle ermöglicht Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0126 | libxml2: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-15T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2854 | Roundcube: Mehrere Schwachstellen | 2025-12-15T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2846 | strongSwan (NetworkManager-Plugin): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-14T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2750 | Apache HTTP Server: Mehrere Schwachstellen | 2025-12-04T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2741 | cPython: Schwachstelle ermöglicht Denial of Service | 2025-12-03T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2703 | Zabbix: Mehrere Schwachstellen | 2025-11-30T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2166 | OpenSSL und LibreSSL: Mehrere Schwachstellen | 2025-09-30T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2040 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-11T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-1974 | Podman: Schwachstelle ermöglicht Manipulation von Dateien | 2025-09-04T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-317-11 | Siemens SICAM P850 family and SICAM P855 family | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-10 | *Rockwell Automation AADvance-Trusted SIS Workstation * | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-09 | Rockwell Automation FactoryTalk Policy Manager | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-08 | General Industrial Controls Lynx+ Gateway | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-07 | Rockwell Automation FactoryTalk DataMosaix Private Cloud | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-06 | Rockwell Automation Studio 5000 Simulation Interface | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-05 | Rockwell Automation Verve Asset Manager | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-04 | Brightpick Mission Control / Internal Logic Control | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-03 | AVEVA Edge | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-02 | AVEVA Application Server IDE | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-01 | Mitsubishi Electric MELSEC iQ-F Series | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-273-04 | Festo Controller CECC-S,-LK,-D Family Firmware (Update A) | 2025-09-30T06:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-322-04 | Schneider Electric PowerChute Serial Shutdown | 2025-11-11T08:00:00.000000Z | 2025-11-11T08:00:00.000000Z |
| icsa-25-322-01 | Schneider Electric EcoStruxure Machine SCADA Expert & Pro-face BLUE Open Studio | 2025-11-11T08:00:00.000000Z | 2025-11-11T08:00:00.000000Z |
| icsa-25-224-03 | Schneider Electric EcoStruxure Power Monitoring Expert | 2025-08-12T04:00:00.000000Z | 2025-11-11T08:00:00.000000Z |
| icsa-25-317-17 | Siemens Software Center and Solid Edge | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-16 | Siemens Altair Grid Engine | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-15 | Siemens COMOS | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-14 | Siemens Solid Edge | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-317-13 | Siemens LOGO! 8 BM Devices | 2025-11-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-135-17 | Siemens RUGGEDCOM ROX II | 2025-05-13T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-135-05 | Siemens SIPROTEC and SICAM | 2025-05-13T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-044-04 | Siemens SIPROTEC 5 | 2025-02-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-25-016-04 | Siemens SIPROTEC 5 Products | 2025-01-14T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-24-193-14 | Siemens SIPROTEC | 2024-07-09T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-23-257-01 | Siemens SIMATIC, SIPLUS Products | 2023-09-12T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-23-103-06 | Siemens SIPROTEC 5 Devices | 2023-04-11T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-22-349-11 | Siemens SIPROTEC 5 Devices | 2022-12-13T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-22-195-02 | Siemens SICAM GridEdge | 2022-07-12T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-22-167-08 | Siemens SICAM GridEdge | 2022-06-14T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-thousandeyes-cert-pqtJUv9N | Cisco ThousandEyes Endpoint Agent for MacOS and RoomOS Certificate Validation Vulnerability | 2025-01-08T16:00:00+00:00 | 2025-01-13T22:15:18+00:00 |
| cisco-sa-xwork-xss-kccg7wwu | Cisco Crosswork Network Controller Stored Cross-Site Scripting Vulnerabilities | 2025-01-08T16:00:00+00:00 | 2025-01-08T16:00:00+00:00 |
| cisco-sa-cspc-xss-cdojzyh | Cisco Common Services Platform Collector Cross-Site Scripting Vulnerabilities | 2025-01-08T16:00:00+00:00 | 2025-01-08T16:00:00+00:00 |
| cisco-sa-nxos-image-sig-bypas-pQDRQvjL | Cisco NX-OS Software Image Verification Bypass Vulnerability | 2024-12-04T16:00:00+00:00 | 2025-04-07T16:43:32+00:00 |
| cisco-sa-ap-dos-capwap-ddmczs4m | Cisco Access Point Software Uncontrolled Resource Consumption Vulnerability | 2023-09-27T16:00:00+00:00 | 2024-12-12T12:27:21+00:00 |
| cisco-sa-ap-dos-capwap-DDMCZS4m | Cisco Access Point Software Uncontrolled Resource Consumption Vulnerability | 2023-09-27T16:00:00+00:00 | 2024-12-12T12:27:21+00:00 |
| cisco-sa-swa-priv-esc-7uhpzscc | Cisco Secure Web Appliance Privilege Escalation Vulnerability | 2024-07-17T16:00:00+00:00 | 2024-11-22T17:13:56+00:00 |
| cisco-sa-swa-priv-esc-7uHpZsCC | Cisco Secure Web Appliance Privilege Escalation Vulnerability | 2024-07-17T16:00:00+00:00 | 2024-11-22T17:13:56+00:00 |
| cisco-sa-iosxr-load-infodisc-9rdor5fq | Cisco IOS XR Software Bootloader Unauthenticated Information Disclosure Vulnerability | 2023-03-08T16:00:00+00:00 | 2024-11-13T15:00:06+00:00 |
| cisco-sa-iosxr-load-infodisc-9rdOr5Fq | Cisco IOS XR Software Bootloader Unauthenticated Information Disclosure Vulnerability | 2023-03-08T16:00:00+00:00 | 2024-11-13T15:00:06+00:00 |
| cisco-sa-phone-infodisc-sbyqqvbg | Cisco 7800, 8800, and 9800 Series Phones Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-phone-infodisc-sbyqQVbG | Cisco 7800, 8800, and 9800 Series Phones Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ndfc-sqli-cyppaxrl | Cisco Nexus Dashboard Fabric Controller SQL Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ndfc-sqli-CyPPAxrL | Cisco Nexus Dashboard Fabric Controller SQL Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-mpp-xss-8tav2tvf | Cisco 6800, 7800, 8800, and 9800 Series Phones with Multiplatform Firmware Stored Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-mpp-xss-8tAV2TvF | Cisco 6800, 7800, 8800, and 9800 Series Phones with Multiplatform Firmware Stored Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vulns-af544ed5 | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vulns-AF544ED5 | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vuln-dbqdwry | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vuln-DBQdWRy | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-auth-bypass-bbrf7mke | Cisco Identity Services Engine Authorization Bypass and Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-auth-bypass-BBRf7mkE | Cisco Identity Services Engine Authorization Bypass and Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-imp-inf-disc-cupkua5n | Cisco Unified Communications Manager IM & Presence Service Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-imp-inf-disc-cUPKuA5n | Cisco Unified Communications Manager IM & Presence Service Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-esa-wsa-sma-xss-zym3f49n | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-esa-wsa-sma-xss-zYm3f49n | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-yyf2zkxs | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-yyf2zkXs | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ece-dos-oqb9ufev | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ece-dos-Oqb9uFEv | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-26180 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26179 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26178 | Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26177 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26176 | Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26175 | Windows Boot Manager Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26174 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26173 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26172 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26171 | .NET Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26170 | PowerShell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26169 | Windows Kernel Memory Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26168 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26167 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26166 | Windows Shell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26165 | Windows Shell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26163 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26162 | Windows OLE Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26161 | Windows Sensor Data Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26160 | Remote Desktop Licensing Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26159 | Remote Desktop Licensing Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26156 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26155 | Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26154 | Windows Server Update Service (WSUS) Tampering Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26153 | Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26152 | Microsoft Cryptographic Services Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26151 | Remote Desktop Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26149 | Microsoft Power Apps Security Feature Bypass | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26143 | Microsoft PowerShell Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-25184 | Applocker Filter Driver (applockerfltr.sys) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0260 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-08-13T10:12:35.130811Z | 2025-08-13T10:12:35.130811Z |
| ncsc-2025-0259 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2025-08-13T10:11:22.733287Z | 2025-08-13T10:11:22.733287Z |
| ncsc-2025-0258 | Kwetsbaarheden verholpen in Adobe InDesign | 2025-08-13T10:05:31.442414Z | 2025-08-13T10:05:31.442414Z |
| ncsc-2025-0257 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-08-13T10:00:18.181867Z | 2025-08-13T10:00:18.181867Z |
| ncsc-2025-0256 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-08-13T09:59:45.240348Z | 2025-08-13T09:59:45.240348Z |
| ncsc-2025-0255 | Kwetsbaarheden verholpen in Fortinet producten | 2025-08-13T09:16:29.067287Z | 2025-08-13T09:35:40.587034Z |
| ncsc-2025-0254 | Kwetsbaarheden verholpen in Zoom | 2025-08-13T09:09:21.491424Z | 2025-08-13T09:09:21.491424Z |
| ncsc-2025-0253 | Kwetsbaarheden verholpen in Ivanti Connect Secure, Policy Secure en ZTA Gateways | 2025-08-13T09:06:58.420498Z | 2025-08-13T09:06:58.420498Z |
| ncsc-2025-0252 | Kwetsbaarheden verholpen in Microsoft Exchange Server | 2025-08-13T07:29:24.639524Z | 2025-08-13T07:29:24.639524Z |
| ncsc-2025-0251 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-08-13T07:25:08.789693Z | 2025-08-13T07:25:08.789693Z |
| ncsc-2025-0250 | Kwetsbaarheden verholpen in Microsoft Office | 2025-08-13T07:23:56.395786Z | 2025-08-13T07:23:56.395786Z |
| ncsc-2025-0249 | Kwetsbaarheden verholpen in Azure-producten | 2025-08-13T07:22:17.432067Z | 2025-08-13T07:22:17.432067Z |
| ncsc-2025-0248 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-08-13T07:21:52.836899Z | 2025-08-13T07:21:52.836899Z |
| ncsc-2025-0247 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-08-13T07:19:19.911308Z | 2025-08-13T07:19:19.911308Z |
| ncsc-2025-0246 | Kwetsbaarheden verholpen in Siemens producten | 2025-08-12T13:03:08.211775Z | 2025-08-12T13:03:08.211775Z |
| ncsc-2025-0244 | Kwetsbaarheid verholpen in WinRAR | 2025-08-11T07:36:12.848669Z | 2025-08-11T07:36:12.848669Z |
| ncsc-2025-0243 | Kwetsbaarheid verholpen in Microsoft Exchange | 2025-08-07T09:15:22.461434Z | 2025-08-07T09:15:22.461434Z |
| ncsc-2025-0242 | Kwetsbaarheden verholpen in Trend Micro Apex One | 2025-08-06T13:21:03.156432Z | 2025-08-06T13:21:03.156432Z |
| ncsc-2025-0240 | Kwetsbaarheden verholpen in Rockwell Automation Arena | 2025-08-06T07:55:23.705278Z | 2025-08-06T07:55:23.705278Z |
| ncsc-2025-0239 | Kwetsbaarheid verholpen in SonicWall SonicOS | 2025-07-31T11:12:42.653547Z | 2025-07-31T11:12:42.653547Z |
| ncsc-2025-0238 | Kwetsbaarheden verholpen in Apple macOS, iOS en iPadOS | 2025-07-30T13:02:51.663320Z | 2025-07-30T13:02:51.663320Z |
| ncsc-2025-0237 | Kwetsbaarheden verholpen in Autodesk AutoCAD | 2025-07-30T08:04:31.603165Z | 2025-07-30T08:04:31.603165Z |
| ncsc-2025-0236 | Kwetsbaarheden verholpen in Salesforce Tableau Server | 2025-07-28T07:52:42.872259Z | 2025-07-28T07:52:42.872259Z |
| ncsc-2025-0233 | Zeroday-kwetsbaarheden ontdekt in Microsoft SharePoint Server | 2025-07-20T08:34:22.645952Z | 2025-07-23T15:31:20.529389Z |
| ncsc-2025-0235 | Kwetsbaarheden verholpen in Firefox en Thunderbird | 2025-07-23T13:01:45.118883Z | 2025-07-23T13:01:45.118883Z |
| ncsc-2025-0204 | Kwetsbaarheden verholpen in Cisco ISE en ISE-PIC | 2025-06-26T09:02:07.224036Z | 2025-07-23T07:46:25.364521Z |
| ncsc-2025-0215 | Kwetsbaarheden verholpen in Microsoft Office | 2025-07-08T18:24:48.517158Z | 2025-07-19T11:40:27.812820Z |
| ncsc-2025-0232 | Kwetsbaarheid verholpen in Keycloak | 2025-07-18T13:12:14.074394Z | 2025-07-18T13:12:14.074394Z |
| ncsc-2025-0196 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en NetScaler Gateway | 2025-06-18T08:32:32.792202Z | 2025-07-18T09:51:52.738778Z |
| ncsc-2025-0231 | Kwetsbaarheden verholpen in XWiki | 2025-07-17T12:35:48.998487Z | 2025-07-17T12:35:48.998487Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10359-1 | ruby4.0-rubygem-rack-session-2.1.1-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10358-1 | ruby4.0-rubygem-rack-3.1.18-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10357-1 | ruby4.0-rubygem-puma-6.4.3-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10356-1 | ruby4.0-rubygem-nokogiri-1.18.9-1.4 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10355-1 | ruby4.0-rubygem-multi_xml-0.6.0-1.31 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10354-1 | ruby4.0-rubygem-minitar-0.9-1.21 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10353-1 | ruby4.0-rubygem-loofah-2.23.1-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10352-1 | ruby4.0-rubygem-kramdown-2.4.0-1.17 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10351-1 | ruby4.0-rubygem-json_pure-2.7.6-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10350-1 | ruby4.0-rubygem-jquery-rails-4.6.0-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10349-1 | ruby4.0-rubygem-http-cookie-1.0.8-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10348-1 | ruby4.0-rubygem-grpc-1.70.1-1.7 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10347-1 | ruby4.0-rubygem-globalid-1.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10346-1 | ruby4.0-rubygem-fluentd-1.17.1-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10345-1 | ruby4.0-rubygem-activesupport-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10344-1 | ruby4.0-rubygem-activestorage-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10343-1 | ruby4.0-rubygem-activerecord-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10342-1 | ruby4.0-rubygem-activemodel-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10341-1 | ruby4.0-rubygem-activejob-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10340-1 | ruby4.0-rubygem-actionview-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10339-1 | ruby4.0-rubygem-actiontext-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10338-1 | ruby4.0-rubygem-actionpack-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10337-1 | ruby4.0-rubygem-actionmailer-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10336-1 | ruby4.0-rubygem-actionmailbox-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10335-1 | ruby4.0-rubygem-actioncable-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10334-1 | python311-pypdf-6.8.0-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10333-1 | python311-multipart-1.3.1-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10332-1 | python311-PyPDF2-2.11.1-7.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10331-1 | mingw64-binutils-2.45.1-2.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10330-1 | mingw32-binutils-2.45.1-2.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:1377 | Red Hat Security Advisory: image-builder security update | 2026-01-27T16:34:13+00:00 | 2026-04-17T20:00:57+00:00 |
| rhsa-2026:1381 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T16:31:53+00:00 | 2026-04-17T20:00:56+00:00 |
| rhsa-2026:1380 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T16:02:11+00:00 | 2026-04-17T20:00:56+00:00 |
| rhsa-2026:1379 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T16:11:53+00:00 | 2026-04-17T20:00:54+00:00 |
| rhsa-2026:1378 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T15:37:28+00:00 | 2026-04-17T20:00:54+00:00 |
| rhsa-2026:1072 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.15.1 security update | 2026-01-25T22:43:46+00:00 | 2026-04-17T20:00:53+00:00 |
| rhsa-2026:1071 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.10.1 security update | 2026-01-25T22:31:05+00:00 | 2026-04-17T20:00:53+00:00 |
| rhsa-2026:1067 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.10.1 | 2026-01-23T16:45:25+00:00 | 2026-04-17T20:00:52+00:00 |
| rhsa-2026:0987 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T11:30:22+00:00 | 2026-04-17T20:00:52+00:00 |
| rhsa-2026:1049 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.21.0 | 2026-01-22T21:04:37+00:00 | 2026-04-17T20:00:50+00:00 |
| rhsa-2026:1025 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T16:47:34+00:00 | 2026-04-17T20:00:50+00:00 |
| rhsa-2026:1018 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.17.4 security update | 2026-01-22T15:52:24+00:00 | 2026-04-17T20:00:50+00:00 |
| rhsa-2026:1017 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.3 security update | 2026-01-22T15:47:03+00:00 | 2026-04-17T20:00:50+00:00 |
| rhsa-2026:0973 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T05:34:26+00:00 | 2026-04-17T20:00:48+00:00 |
| rhsa-2026:0531 | Red Hat Security Advisory: Red Hat Developer Hub 1.8.2 release. | 2026-01-13T21:28:08+00:00 | 2026-04-17T20:00:48+00:00 |
| rhsa-2026:0722 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.8.4 security update | 2026-01-15T17:23:06+00:00 | 2026-04-17T20:00:46+00:00 |
| rhsa-2026:0718 | Red Hat Security Advisory: Moderate: Red Hat Advanced Cluster Management for Kubernetes v2.13.5 security update | 2026-01-15T15:59:28+00:00 | 2026-04-17T20:00:46+00:00 |
| rhsa-2026:0671 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.8.4 | 2026-01-15T08:34:14+00:00 | 2026-04-17T20:00:46+00:00 |
| rhsa-2026:0663 | Red Hat Security Advisory: OpenShift Container Platform 4.20.11 bug fix and security update | 2026-01-22T03:28:29+00:00 | 2026-04-17T20:00:45+00:00 |
| rhsa-2026:0627 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.13.5 security update | 2026-01-14T18:37:52+00:00 | 2026-04-17T20:00:45+00:00 |
| rhsa-2026:0530 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.12 | 2026-01-13T20:48:49+00:00 | 2026-04-17T20:00:45+00:00 |
| rhsa-2026:0527 | Red Hat Security Advisory: VolSync v0.14 security fixes and container updates | 2026-01-13T16:52:50+00:00 | 2026-04-17T20:00:44+00:00 |
| rhsa-2026:0477 | Red Hat Security Advisory: skopeo security update | 2026-01-12T20:03:23+00:00 | 2026-04-17T20:00:44+00:00 |
| rhsa-2026:0426 | Red Hat Security Advisory: buildah security update | 2026-01-12T03:32:03+00:00 | 2026-04-17T20:00:43+00:00 |
| rhsa-2026:0414 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2026-01-08T22:34:17+00:00 | 2026-04-17T20:00:43+00:00 |
| rhsa-2026:0424 | Red Hat Security Advisory: podman security update | 2026-01-12T02:26:08+00:00 | 2026-04-17T20:00:42+00:00 |
| rhsa-2026:0244 | Red Hat Security Advisory: grafana security update | 2026-01-07T14:38:56+00:00 | 2026-04-17T20:00:42+00:00 |
| rhsa-2026:0314 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-08T11:35:59+00:00 | 2026-04-17T20:00:41+00:00 |
| rhsa-2026:0261 | Red Hat Security Advisory: Red Hat Developer Hub 1.7.4 release. | 2026-01-07T18:34:52+00:00 | 2026-04-17T20:00:41+00:00 |
| rhsa-2026:0246 | Red Hat Security Advisory: grafana security update | 2026-01-07T14:46:41+00:00 | 2026-04-17T20:00:39+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2020-070-03 | ZigBee Installation Toolkit | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-070-02 | Modicon Quantum Ethernet Network module and Quantum / Premium COPRO | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-070-01 | IGSS (Interactive Graphical SCADA System) | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-042-01 | ProSoft Configurator for Modicon PMEPXM0100 (H) | 2020-02-11T00:00:00.000Z | 2020-02-11T00:00:00.000Z |
| sevd-2018-095-01 | Security Notification - U.motion Builder software | 2018-04-05T00:00:00.000Z | 2020-02-11T00:00:00.000Z |
| sevd-2020-014-01 | MSX Configurator | 2020-01-14T00:00:00.000Z | 2020-01-14T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-000297 | SSA-000297: Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.6 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-333468 | SSA-333468: Multiple Vulnerabilities in InterMesh Subscriber Devices | 2024-10-23T00:00:00Z | 2024-10-23T00:00:00Z |
| ssa-438590 | SSA-438590: Buffer Overflow Vulnerability in Siveillance Video Camera Drivers | 2024-10-10T00:00:00Z | 2024-10-10T00:00:00Z |
| ssa-959281 | SSA-959281: XML File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-955858 | SSA-955858: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2022-10-11T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-921449 | SSA-921449: Plaintext Storage of a Password Vulnerability in LOGO! V8.3 BM Devices | 2024-08-13T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-852501 | SSA-852501: Multiple Memory Corruption Vulnerabilities in Simcenter Nastran Before 2406.5000 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-850560 | SSA-850560: Use of 4-Digit PIN in SENTRON PAC3200 Devices | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-844582 | SSA-844582: Electromagnetic Fault Injection in LOGO! V8.3 BM Devices Results in Broken LOGO! V8.3 Product CA | 2023-12-12T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-783481 | SSA-783481: Denial-of-Service Vulnerability in LOGO! 8 BM | 2021-03-09T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-626178 | SSA-626178: Stack-Based Buffer Overflow Vulnerability in JT2Go Before V2406.0003 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-540493 | SSA-540493: Kiosk Mode Escape Vulnerability in HiMed Cockpit Devices Before V11.6.2 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-368868 | SSA-368868: Multiple Vulnerabilities in WibuKey for Windows | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-321292 | SSA-321292: Denial of Service in the OPC Foundation Local Discovery Server (LDS) in Industrial Products | 2022-05-10T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-254396 | SSA-254396: Vulnerability in Nozomi Guardian/CMC Before 24.3.1 on RUGGEDCOM APE1808 Devices | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-148641 | SSA-148641: XPath Constraint Vulnerability in Mendix Runtime | 2022-03-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-969738 | SSA-969738: Denial of Service Vulnerability in SIMATIC S7-200 SMART Devices | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-869574 | SSA-869574: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-792319 | SSA-792319: Missing Read Out Protection in SENTRON 7KM PAC3x20 Devices | 2024-03-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-765405 | SSA-765405: Multiple Vulnerabilities in SIMATIC RFID Readers | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-753746 | SSA-753746: Denial of Service Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products | 2024-02-13T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-721642 | SSA-721642: Injection Vulnerability in SCALANCE W700 802.11 AX Family Before V2.4 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-566905 | SSA-566905: Multiple Denial of Service Vulnerabilities in the Webserver of Industrial Products | 2023-04-11T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-427715 | SSA-427715: Stack-Based Buffer Overflow Vulnerability in Tecnomatix Plant Simulation | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-423808 | SSA-423808: Multiple NULL Pointer Dereference Vulnerabilities in Industrial Products | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-417159 | SSA-417159: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-359713 | SSA-359713: Authorization Bypass Vulnerability in Industrial Edge Management | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-342438 | SSA-342438: Privilege Escalation Vulnerability in SINUMERIK ONE, SINUMERIK 840D and SINUMERIK 828D | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-293562 | SSA-293562: Denial of Service Vulnerabilities in PROFINET DCP Implementation of Industrial Products | 2017-05-08T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-280603 | SSA-280603: Denial of Service Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2023-12-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20955-1 | Security update for tar | 2026-04-01T09:39:25Z | 2026-04-01T09:39:25Z |
| suse-su-2026:20954-1 | Security update for python-pyOpenSSL | 2026-04-01T09:35:43Z | 2026-04-01T09:35:43Z |
| suse-su-2026:20989-1 | Security update for kea | 2026-04-01T09:22:53Z | 2026-04-01T09:22:53Z |
| suse-fu-2026:20990-1 | Feature update for himmelblau | 2026-04-01T09:19:25Z | 2026-04-01T09:19:25Z |
| suse-su-2026:1163-1 | Security update for MozillaThunderbird | 2026-04-01T08:49:11Z | 2026-04-01T08:49:11Z |
| suse-su-2026:1162-1 | Security update for python-tornado | 2026-03-31T22:02:18Z | 2026-03-31T22:02:18Z |
| suse-su-2026:1160-1 | Security update for freerdp | 2026-03-31T15:03:59Z | 2026-03-31T15:03:59Z |
| suse-su-2026:1159-1 | Security update for expat | 2026-03-31T15:03:48Z | 2026-03-31T15:03:48Z |
| suse-su-2026:1158-1 | Security update for python-pyasn1 | 2026-03-31T11:55:53Z | 2026-03-31T11:55:53Z |
| suse-su-2026:20951-1 | Security update for python311 | 2026-03-31T09:13:02Z | 2026-03-31T09:13:02Z |
| suse-su-2026:20988-1 | Security update for gnome-online-accounts, gvfs | 2026-03-31T09:08:21Z | 2026-03-31T09:08:21Z |
| suse-su-2026:20956-1 | Security update for python311 | 2026-03-31T09:07:43Z | 2026-03-31T09:07:43Z |
| suse-su-2026:1154-1 | Security update for libjxl | 2026-03-31T09:04:47Z | 2026-03-31T09:04:47Z |
| suse-su-2026:0227-2 | Security update for net-snmp | 2026-03-31T08:48:04Z | 2026-03-31T08:48:04Z |
| suse-su-2026:1153-1 | Security update for perl-XML-Parser | 2026-03-31T08:40:07Z | 2026-03-31T08:40:07Z |
| suse-su-2026:1152-1 | Security update for perl-XML-Parser | 2026-03-31T08:28:50Z | 2026-03-31T08:28:50Z |
| suse-su-2026:1150-1 | Security update for webkit2gtk3 | 2026-03-30T17:34:50Z | 2026-03-30T17:34:50Z |
| suse-su-2026:20986-1 | Security update for postgresql13 | 2026-03-30T15:24:20Z | 2026-03-30T15:24:20Z |
| suse-su-2026:20985-1 | Security update for expat | 2026-03-30T15:01:10Z | 2026-03-30T15:01:10Z |
| suse-su-2026:20963-1 | Security update for expat | 2026-03-30T15:01:10Z | 2026-03-30T15:01:10Z |
| suse-su-2026:20984-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20968-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20962-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20983-1 | Security update for postgresql16 | 2026-03-30T14:26:12Z | 2026-03-30T14:26:12Z |
| suse-su-2026:1149-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T13:44:05Z | 2026-03-30T13:44:05Z |
| suse-su-2026:1148-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T11:21:20Z | 2026-03-30T11:21:20Z |
| suse-su-2026:1146-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:17:48Z | 2026-03-30T09:17:48Z |
| suse-su-2026:1142-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:16:26Z | 2026-03-30T09:16:26Z |
| suse-su-2026:1141-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:16:08Z | 2026-03-30T09:16:08Z |
| suse-su-2026:1140-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:15:49Z | 2026-03-30T09:15:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:0667 | Important: firefox security update | 2026-01-15T00:00:00Z | 2026-02-12T10:37:47Z |
| alsa-2026:1377 | Moderate: image-builder security update | 2026-01-27T00:00:00Z | 2026-02-12T10:36:07Z |
| alsa-2026:2212 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-12T10:34:27Z |
| alsa-2026:2282 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-12T10:29:43Z |
| alsa-2026:2420 | Important: nodejs:24 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:19:24Z |
| alsa-2026:2422 | Important: nodejs:20 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:15:50Z |
| alsa-2026:2438 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:14:13Z |
| alsa-2026:2452 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:12:36Z |
| alsa-2026:2470 | Moderate: php:7.4 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:10:23Z |
| alsa-2026:2419 | Moderate: python3.12 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:30:15Z |
| alsa-2026:2410 | Important: libsoup3 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:26:55Z |
| alsa-2026:2224 | Critical: keylime security update | 2026-02-09T00:00:00Z | 2026-02-11T15:22:49Z |
| alsa-2026:2389 | Important: brotli security update | 2026-02-10T00:00:00Z | 2026-02-11T11:06:48Z |
| alsa-2026:2323 | Important: git-lfs security update | 2026-02-09T00:00:00Z | 2026-02-11T11:02:49Z |
| alsa-2026:2216 | Important: libsoup security update | 2026-02-09T00:00:00Z | 2026-02-10T10:37:43Z |
| alsa-2026:2222 | Important: freerdp security update | 2026-02-09T00:00:00Z | 2026-02-10T10:08:14Z |
| alsa-2026:2225 | Critical: keylime security update | 2026-02-09T00:00:00Z | 2026-02-10T10:06:14Z |
| alsa-2026:2230 | Important: fontforge security update | 2026-02-09T00:00:00Z | 2026-02-10T10:04:33Z |
| alsa-2026:2378 | Moderate: kernel-rt security update | 2026-02-10T00:00:00Z | 2026-02-10T09:34:16Z |
| alsa-2026:1852 | Moderate: util-linux security update | 2026-02-03T00:00:00Z | 2026-02-10T08:33:43Z |
| alsa-2026:1903 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:31:08Z |
| alsa-2026:1904 | Important: resource-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:22:54Z |
| alsa-2026:1905 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:20:49Z |
| alsa-2026:1906 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:07:49Z |
| alsa-2026:1907 | Important: opentelemetry-collector security update | 2026-02-04T00:00:00Z | 2026-02-10T07:58:47Z |
| alsa-2026:1908 | Important: opentelemetry-collector security update | 2026-02-04T00:00:00Z | 2026-02-10T07:56:31Z |
| alsa-2026:1913 | Moderate: util-linux security update | 2026-02-04T00:00:00Z | 2026-02-10T07:54:49Z |
| alsa-2026:1939 | Important: python3.12-wheel security update | 2026-02-04T00:00:00Z | 2026-02-10T07:52:01Z |
| alsa-2026:2048 | Important: freerdp security update | 2026-02-05T00:00:00Z | 2026-02-10T07:49:11Z |
| alsa-2026:2220 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-10T07:45:12Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-932 | Heap-use-after-free in password_file__cleanup | 2025-11-22T00:01:32.642847Z | 2025-11-22T00:01:32.643269Z |
| osv-2025-926 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement | 2025-11-21T00:05:31.621567Z | 2025-11-21T00:05:31.621958Z |
| osv-2025-906 | Use-of-uninitialized-value in QImage::pixel | 2025-11-18T00:08:20.557059Z | 2025-11-18T00:08:20.557392Z |
| osv-2025-901 | Heap-use-after-free in apache::thrift::protocol::TCompactProtocolT<apache::thrift::transport::TMemoryBu | 2025-11-17T00:02:08.125421Z | 2025-11-17T00:02:08.125970Z |
| osv-2025-871 | UNKNOWN READ in ojph::local::param_cod::~param_cod | 2025-11-03T00:01:55.461376Z | 2025-11-16T14:04:09.695272Z |
| osv-2025-900 | Heap-buffer-overflow in DecodeFrame | 2025-11-15T00:18:33.800030Z | 2025-11-15T00:18:33.800379Z |
| osv-2025-890 | Heap-buffer-overflow in icalmemory_tmp_copy | 2025-11-10T00:03:23.954817Z | 2025-11-10T00:03:23.955223Z |
| osv-2025-884 | Heap-use-after-free in JS_DefineProperty | 2025-11-08T00:17:46.632315Z | 2025-11-08T00:17:46.633033Z |
| osv-2025-879 | Use-of-uninitialized-value in JS_DefineProperty | 2025-11-06T00:00:41.075031Z | 2025-11-06T00:00:41.075637Z |
| osv-2025-865 | Heap-buffer-overflow in generic_unpack | 2025-10-31T00:01:02.631036Z | 2025-11-05T14:31:24.646623Z |
| osv-2025-876 | Stack-buffer-overflow in snmp_input | 2025-11-04T00:06:41.671822Z | 2025-11-04T00:06:41.672467Z |
| osv-2025-858 | Use-of-uninitialized-value in pcpp::byteArrayToHexString | 2025-10-26T00:13:16.483999Z | 2025-10-26T00:13:16.484559Z |
| osv-2025-857 | Global-buffer-overflow in void jxl::N_AVX2::WriteToOutputStage::StoreUnsignedRow<unsigned char> | 2025-10-25T00:05:52.218420Z | 2025-10-25T00:05:52.218807Z |
| osv-2025-852 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-23T00:13:16.148747Z | 2025-10-24T14:23:38.843951Z |
| osv-2025-834 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-14T00:10:52.861723Z | 2025-10-24T14:22:07.938287Z |
| osv-2025-855 | Use-of-uninitialized-value in AlphaReplace_SSE2 | 2025-10-24T00:16:50.919877Z | 2025-10-24T00:16:50.920218Z |
| osv-2025-33 | UNKNOWN READ in pcpp::RawPacket::insertData | 2025-01-16T00:01:14.786268Z | 2025-10-22T18:25:08.281167Z |
| osv-2024-957 | Heap-buffer-overflow in pcpp::computeChecksum | 2024-08-16T00:13:51.457458Z | 2025-10-22T18:24:27.257255Z |
| osv-2024-967 | Heap-buffer-overflow in pcpp::byteArrayToHexString | 2024-08-16T00:14:27.813459Z | 2025-10-22T18:24:09.671012Z |
| osv-2024-393 | Heap-buffer-overflow in pcpp::BgpLayer::getHeaderLen | 2024-04-30T00:15:10.223298Z | 2025-10-22T18:24:01.160234Z |
| osv-2024-1009 | Heap-buffer-overflow in pcpp::Layer::shortenLayer | 2024-08-16T00:16:31.167287Z | 2025-10-21T14:37:47.186948Z |
| osv-2025-846 | Use-of-uninitialized-value in js_create_function | 2025-10-20T00:03:40.943765Z | 2025-10-20T00:03:40.944363Z |
| osv-2025-845 | Global-buffer-overflow in icaltime_day_of_year | 2025-10-19T00:19:40.541109Z | 2025-10-19T00:19:40.541746Z |
| osv-2025-835 | Heap-use-after-free in JS_DefineProperty | 2025-10-14T00:11:08.472824Z | 2025-10-14T00:11:08.473391Z |
| osv-2024-351 | UNKNOWN READ in H5SL__release_common | 2024-04-30T00:03:47.754456Z | 2025-10-11T15:15:24.788105Z |
| osv-2025-298 | Heap-buffer-overflow in i18n::phonenumbers::UnicodeText::const_iterator::operator-- | 2025-04-26T00:02:46.771719Z | 2025-10-11T14:20:31.062038Z |
| osv-2024-381 | Heap-buffer-overflow in H5F__accum_free | 2024-04-30T00:12:14.936195Z | 2025-10-10T16:22:08.455396Z |
| osv-2025-818 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-07T00:03:45.262747Z | 2025-10-10T14:38:33.479652Z |
| osv-2025-788 | Heap-buffer-overflow in int arrow::bit_util::BitReader::GetBatch<int> | 2025-09-28T00:00:36.076414Z | 2025-10-10T14:35:28.235525Z |
| osv-2025-827 | Global-buffer-overflow in void jxl::N_SSE4::WriteToOutputStage::StoreUnsignedRow<unsigned char> | 2025-10-10T00:09:16.816189Z | 2025-10-10T00:09:16.816846Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0360 | `XmpFile::close` can trigger UB | 2024-07-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0358 | Apache Arrow Rust Object Store: AWS WebIdentityToken exposure in log files | 2024-07-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0357 | `MemBio::get_buf` has undefined behavior with empty buffers | 2024-07-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0347 | Incorrect usage of `#[repr(packed)]` | 2024-07-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0346 | Incorrect usage of `#[repr(packed)]` | 2024-07-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0345 | Low severity (DoS) vulnerability in sequoia-openpgp | 2024-06-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0344 | Timing variability in `curve25519-dalek`'s `Scalar29::sub`/`Scalar52::sub` | 2024-06-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0340 | Tor path lengths too short when "full Vanguards" configured | 2024-05-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0338 | Arithmetic overflows in cosmwasm-std | 2024-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0012 | Stack overflow during recursive JSON parsing | 2024-01-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0011 | Unauthenticated Nonce Increment in snow | 2024-01-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0006 | Multiple issues involving quote API | 2024-01-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0087 | `MaybeUninit` misuse in `simd-json-derive` | 2023-10-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0086 | Multiple soundness issues | 2023-09-03T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0080 | Buffer overflow due to integer overflow in `transpose` | 2023-12-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0077 | Remotely exploitable DoS condition in Rosenpass <=0.2.0 | 2023-11-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0068 | Sequential calls of encryption API (`encrypt`, `wrap`, and `dump`) result in nonce reuse | 2023-10-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0064 | gix-transport code execution vulnerability | 2023-09-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0044 | `openssl` `X509VerifyParamRef::set_host` buffer over-read | 2023-06-20T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0039 | Out-of-bounds array access leads to panic | 2023-05-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2023-0038 | Out-of-bounds array access leads to panic | 2023-05-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2022-0101 | Miscompilation of constant values in division on AArch64 | 2022-07-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2022-0096 | Invalid drop of VMExternRef from partially-initialized instances in the pooling instance allocator | 2022-02-17T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2022-0094 | Mimalloc Can Allocate Memory with Bad Alignment | 2022-11-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2022-0093 | Double Public Key Signing Function Oracle Attack on `ed25519-dalek` | 2022-06-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2021-0154 | Uninitalized memory read & leak caused by fuser crate | 2021-09-10T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2021-0132 | Integer overflow in the bundled Brotli C library | 2021-12-20T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0112 | Possible host crash with host-to-wasm component intrinsics | 2025-07-18T12:00:00Z | 2025-10-25T11:20:30Z |
| rustsec-2025-0110 | astral-tokio-tar Vulnerable to PAX Header Desynchronization | 2025-10-21T12:00:00Z | 2025-10-25T11:18:52Z |
| rustsec-2025-0075 | `unic-char-range` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-22T14:41:04Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2026-30891 | Discourse hasUnauthorized Exposure of Private User Action Types | 2026-03-27T07:10:28.864Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30889 | Discourse has Unauthorized Post Data Exposure in discourse-user-notes | 2026-03-27T07:10:26.417Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30888 | Discourse has moderator privilege escalation via arbitrary post_id in suspend/silence endpoint | 2026-03-27T07:10:23.855Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27934 | Discourse leaks private topic title and post excerpt via user action API endpoint | 2026-03-27T07:10:00.671Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27740 | Discourse has Stored XSS in AI Triage Automation | 2026-03-27T07:09:57.609Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27570 | Discourse Vulnerable to Stored XSS via Shared AI Conversation Onebox | 2026-03-27T07:09:54.665Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27491 | Discourse has a bypass of official warnings messages by non-staff users | 2026-03-27T07:09:52.198Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27454 | Discourse has check revision visibility on posts endpoint | 2026-03-27T07:09:48.954Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-27166 | Discourse vulnerable to HTML injection via prohibited iframe URLs | 2026-03-27T07:09:46.264Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2023-28112 | Discourse's SSRF protection missing for some FastImage requests | 2024-03-06T10:58:19.088Z | 2026-03-25T18:30:22.404Z |
| bit-discourse-2023-38706 | Discourse vulnerable to DoS via drafts | 2024-03-06T10:54:51.089Z | 2026-03-25T17:48:21.059Z |
| bit-python-2026-4519 | webbrowser.open() allows leading dashes in URLs | 2026-03-25T08:52:23.976Z | 2026-03-25T09:15:17.567Z |
| bit-libpython-2026-4519 | webbrowser.open() allows leading dashes in URLs | 2026-03-25T08:44:11.251Z | 2026-03-25T09:15:17.567Z |
| bit-discourse-2025-64528 | Users are able to find users by name even when `enable_names` is off | 2026-01-08T11:40:33.666Z | 2026-03-25T09:15:17.567Z |
| bit-discourse-2024-56197 | Users can see other user's tagged PMs in Discourse | 2025-02-20T10:31:38.504Z | 2026-03-25T09:15:17.567Z |
| bit-ceph-2024-48916 | Ceph is vulnerable to authentication bypass through RadosGW | 2026-03-20T09:05:50.770Z | 2026-03-24T15:24:05.672Z |
| bit-ceph-2024-47866 | RGW DoS attack with empty HTTP header in S3 object copy | 2026-03-20T09:05:48.271Z | 2026-03-24T15:24:05.672Z |
| bit-tomcat-2023-28709 | Apache Tomcat: Fix for CVE-2023-24998 is incomplete | 2026-03-24T10:21:40.054Z | 2026-03-24T10:46:38.869Z |
| bit-tomcat-2023-28708 | Apache Tomcat: JSESSIONID Cookie missing secure attribute in some configurations | 2026-03-24T10:21:38.576Z | 2026-03-24T10:46:38.869Z |
| bit-valkey-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:19:55.260Z | 2026-03-21T09:12:01.983Z |
| bit-redis-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:18:53.323Z | 2026-03-21T09:12:01.983Z |
| bit-keydb-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:12:52.562Z | 2026-03-21T09:12:01.983Z |
| bit-tomcat-2025-55752 | Apache Tomcat: Directory traversal via rewrite with possible RCE if PUT is enabled | 2025-11-06T13:00:31.694Z | 2026-03-20T13:43:29.174Z |
| bit-tomcat-2025-49125 | Apache Tomcat: Security constraint bypass for pre/post-resources | 2025-07-10T10:47:18.953Z | 2026-03-20T13:43:29.174Z |
| bit-tomcat-2025-24813 | Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT | 2025-07-10T10:46:47.051Z | 2026-03-20T13:43:29.174Z |
| bit-tomcat-2025-53506 | Apache Tomcat: DoS via excessive h2 streams at connection start | 2025-07-16T08:19:04.361Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2025-49124 | Apache Tomcat: exe side-loading via icalcs.exe in Tomcat installer for Windows | 2025-06-20T06:04:24.795Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2025-31651 | Apache Tomcat: Bypass of rules in Rewrite Valve | 2025-07-10T10:46:54.240Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-56337 | Apache Tomcat: RCE due to TOCTOU issue in JSP compilation - CVE-2024-50379 mitigation was incomplete | 2025-07-10T10:46:39.151Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-52317 | Apache Tomcat: Request/response mix-up with HTTP/2 | 2024-11-20T07:20:06.896Z | 2026-03-20T12:05:40.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-aq75465 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-1229, CVE-2026-27141 applied in versions: 3.19.0-r0, 4.0.0-r0, 4.0.1-r0, 4.1.1-r1 | 2026-04-01T09:50:20.419820Z | 2026-03-16T05:35:26Z |
| cleanstart-2026-mk39503 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-1229, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.19.0-r0, 4.0.1-r0, 4.1.0-r0, 4.1.0-r1 | 2026-04-01T09:50:25.337048Z | 2026-03-16T05:34:59Z |
| cleanstart-2026-fb05615 | Security fixes for CVE-2025-15558, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2026-27141, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x, ghsa-p436-gjf2-799p applied in versions: 2.13.4-r0, 2.13.4-r1, 2.13.4-r2 | 2026-04-01T09:50:57.277339Z | 2026-03-15T13:46:33Z |
| cleanstart-2026-nv84668 | Security fixes for ghsa-84h7-rjj3-6jx4, ghsa-vc5p-v9hr-52mj applied in versions: 4.1.1-r1 | 2026-04-01T09:51:29.848674Z | 2026-03-13T13:15:35Z |
| cleanstart-2026-na08955 | Security fixes for ghsa-84h7-rjj3-6jx4, ghsa-vc5p-v9hr-52mj applied in versions: 4.1.1-r1 | 2026-04-01T09:51:24.306982Z | 2026-03-13T13:15:35Z |
| cleanstart-2026-qa91937 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-r6j8-c6r2-37rr applied in versions: 0.18.3-r1, 0.18.3-r2 | 2026-04-01T09:52:00.878696Z | 2026-03-13T12:44:37Z |
| cleanstart-2026-of85770 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:57:04.724781Z | 2026-03-13T12:43:33Z |
| cleanstart-2026-qk02462 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.2.7-r1 | 2026-04-01T09:54:36.812395Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-ox06978 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.1-r1 | 2026-04-01T09:53:21.567659Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-nj43712 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.1-r0, 3.3.1-r1 | 2026-04-01T09:56:40.531114Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-gq03231 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-24051, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.2.7-r1 | 2026-04-01T09:56:49.752050Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-gv56027 | Security fixes for ghsa-58pv-8j8x-9vj2, ghsa-jm66-cg57-jjv5, ghsa-mrfv-m5wm-5w6w applied in versions: 2.81.0-r0 | 2026-04-01T09:56:19.014864Z | 2026-03-13T07:11:43Z |
| cleanstart-2026-du32240 | Security fixes for CVE-2026-2391, CVE-2026-26960, CVE-2026-29786, CVE-2026-31802, ghsa-34x7-hfp2-rc4v, ghsa-5359-pvf2-pw78, ghsa-73rr-hh4g-fpgx, ghsa-8qq5-rm4j-mr97, ghsa-r6q2-hw4h-h46w applied in versions: 4.2.1.1-r1, 4.2.1.1-r2, 4.3.0.1-r0, 4.3.1-r0 | 2026-04-01T09:57:23.228226Z | 2026-03-12T13:10:45Z |
| cleanstart-2026-mq02912 | Security fixes for CVE-2017-7529, CVE-2018-16845, CVE-2019-20372, CVE-2019-9511, CVE-2019-9513, CVE-2019-9516, CVE-2021-23017, CVE-2021-46461, CVE-2021-46462, CVE-2021-46463, CVE-2022-25139, CVE-2022-3638, CVE-2022-41741, CVE-2022-41742, CVE-2023-44487, CVE-2024-31079, CVE-2024-32760, CVE-2024-34161, CVE-2024-35200, CVE-2024-7347, CVE-2025-23419 applied in versions: 0, 1.12.1-r0, 1.14.1-r0, 1.16.1-r0, 1.16.1-r6, 1.20.1-r0, 1.20.1-r1, 1.20.2-r2, 1.22.1-r0, 1.24.0-r12, 1.26.2-r0, 1.26.3-r0 | 2026-04-01T09:58:43.603060Z | 2026-03-12T13:09:34Z |
| cleanstart-2026-jo01099 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.3-r0 | 2026-04-01T09:58:23.141059Z | 2026-03-12T13:09:34Z |
| cleanstart-2026-jd75482 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0 | 2026-04-01T09:58:30.410416Z | 2026-03-12T13:09:34Z |
| cleanstart-2026-bp32212 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.87.0-r0, 0.87.0-r1, 0.88.0-r0 | 2026-04-01T09:58:48.421220Z | 2026-03-11T10:14:30Z |
| cleanstart-2026-np19113 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.10-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4 | 2026-04-01T09:59:46.805882Z | 2026-03-11T10:03:22Z |
| cleanstart-2026-ju62670 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2x5j-vhc8-9cwm, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2gw2-vh5m, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-c6gw-w398-hv78, ghsa-cfpf-hrx2-8rv6, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-jgfp-53c3-624w, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r, ghsa-pwhc-rpq9-4c8w, ghsa-r6j8-c6r2-37rr, ghsa-vv39-3w5q-974q applied in versions: 2.13.9-r0, 2.14.20-r0, 2.14.20-r1, 3.0.16-r0, 3.0.19-r0, 3.0.20-r2, 3.0.21-r0, 3.0.21-r1, 3.1.4-r0, 3.1.8.-r0 | 2026-04-01T10:00:01.931332Z | 2026-03-11T10:03:00Z |
| cleanstart-2026-jw58725 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2x5j-vhc8-9cwm, ghsa-2xsj-vh29-9cwm, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r, ghsa-r6j8-c6r2-37rr applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.0.22-r0, 3.0.23-r0, 3.0.23-r1, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4 | 2026-04-01T10:00:01.222759Z | 2026-03-11T10:01:48Z |
| cleanstart-2026-lz54652 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729 applied in versions: 1.7.0-r0, 1.7.1-r0 | 2026-04-01T10:00:12.081449Z | 2026-03-11T07:18:17Z |
| cleanstart-2026-bb17877 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.87.1-r0, 0.89.0-r0 | 2026-04-01T10:00:31.981994Z | 2026-03-11T05:53:58Z |
| cleanstart-2026-pm59896 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729 applied in versions: 1.41.1-r0, 1.41.1-r1 | 2026-04-01T10:00:44.608929Z | 2026-03-11T05:51:53Z |
| cleanstart-2026-mk01488 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-27141, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p applied in versions: 3.6.16-r0, 3.7.10-r0, 3.7.10-r1, 3.7.10-r2, 3.7.10-r3, 3.7.10-r4, 3.7.4-r0, 3.7.9-r0 | 2026-04-01T10:00:43.919294Z | 2026-03-10T12:46:44Z |
| cleanstart-2026-dr75226 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1 | 2026-04-01T10:01:44.354704Z | 2026-03-10T12:28:42Z |
| cleanstart-2026-bm51903 | Security fixes for CVE-2015-20107, CVE-2015-2104, CVE-2019-16056, CVE-2019-16935, CVE-2019-20907, CVE-2019-5010, CVE-2020-14422, CVE-2020-8492, CVE-2021-23336, CVE-2021-29921, CVE-2021-3177, CVE-2022-45061, CVE-2023-27043, CVE-2024-6232, CVE-2024-6923, CVE-2025-59375 applied in versions: 3.10.5-r0, 3.11.1-r0, 3.11.5-r0, 3.12.12-r0, 3.12.3-r2, 3.12.6-r0, 3.6.8-r1, 3.7.5-r0, 3.8.2-r0, 3.8.4-r0, 3.8.5-r0, 3.8.7-r2, 3.8.8-r0, 3.9.4-r0, 3.9.5-r0 | 2026-04-01T10:02:05.179897Z | 2026-03-10T11:38:44Z |
| cleanstart-2026-pp64690 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-1229, CVE-2026-25934, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-q9hv-hpm4-hj6x applied in versions: 0.20.4-r1, 0.20.4-r2, 0.20.4-r3 | 2026-04-01T10:01:43.950159Z | 2026-03-10T11:34:26Z |
| cleanstart-2026-iy77127 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.29.0-r0 | 2026-04-01T10:01:36.492383Z | 2026-03-10T11:31:41Z |
| cleanstart-2026-lu81821 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.28.3-r1 | 2026-04-01T10:02:04.894450Z | 2026-03-10T11:29:14Z |
| cleanstart-2026-ei44621 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.27.4-r0, 1.27.4-r1, 1.27.7-r0 | 2026-04-01T10:02:07.249071Z | 2026-03-10T11:28:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2017-ALE-020 | Vulnérabilité dans des implémentations de TLS | 2017-12-13T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| certfr-2017-ale-019 | Vulnérabilité d'usurpation d'identité dans plusieurs clients de messagerie | 2017-12-05T00:00:00.000000 | 2018-03-07T00:00:00.000000 |
| CERTFR-2017-ALE-019 | Vulnérabilité d'usurpation d'identité dans plusieurs clients de messagerie | 2017-12-05T00:00:00.000000 | 2018-03-07T00:00:00.000000 |
| certfr-2018-ale-003 | Vulnérabilité dans Adobe Flash Player | 2018-02-02T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| CERTFR-2018-ALE-003 | Vulnérabilité dans Adobe Flash Player | 2018-02-02T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| certfr-2017-ale-017 | Vulnérabilité dans le serveur de messagerie Exim | 2017-11-27T00:00:00.000000 | 2018-02-01T00:00:00.000000 |
| CERTFR-2017-ALE-017 | Vulnérabilité dans le serveur de messagerie Exim | 2017-11-27T00:00:00.000000 | 2018-02-01T00:00:00.000000 |
| certfr-2017-ale-018 | Vulnérabilité dans Apple MacOS High Sierra | 2017-11-29T00:00:00.000000 | 2017-11-30T00:00:00.000000 |
| CERTFR-2017-ALE-018 | Vulnérabilité dans Apple MacOS High Sierra | 2017-11-29T00:00:00.000000 | 2017-11-30T00:00:00.000000 |
| certfr-2017-ale-016 | Campagne de rançongiciel Bad Rabbit | 2017-10-25T00:00:00.000000 | 2017-10-27T00:00:00.000000 |
| CERTFR-2017-ALE-016 | Campagne de rançongiciel Bad Rabbit | 2017-10-25T00:00:00.000000 | 2017-10-27T00:00:00.000000 |
| certfr-2017-ale-014 | Vulnérabilité dans le protocole WPA/WPA2 | 2017-10-18T00:00:00.000000 | 2017-10-19T00:00:00.000000 |
| CERTFR-2017-ALE-014 | Vulnérabilité dans le protocole WPA/WPA2 | 2017-10-18T00:00:00.000000 | 2017-10-19T00:00:00.000000 |
| certfr-2017-ale-015 | Vulnérabilités dans la bibliothèque Infineon RSA | 2017-10-16T00:00:00.000000 | 2017-10-17T00:00:00.000000 |
| CERTFR-2017-ALE-015 | Vulnérabilités dans la bibliothèque Infineon RSA | 2017-10-16T00:00:00.000000 | 2017-10-17T00:00:00.000000 |
| certfr-2017-ale-013 | Présence de code malveillant dans Piriform CCleaner | 2017-09-18T00:00:00.000000 | 2017-10-09T00:00:00.000000 |
| CERTFR-2017-ALE-013 | Présence de code malveillant dans Piriform CCleaner | 2017-09-18T00:00:00.000000 | 2017-10-09T00:00:00.000000 |
| certfr-2017-ale-008 | Multiples vulnérabilités dans Microsoft Windows XP et Windows Server 2003 | 2017-04-14T00:00:00.000000 | 2017-09-06T00:00:00.000000 |
| CERTFR-2017-ALE-008 | Multiples vulnérabilités dans Microsoft Windows XP et Windows Server 2003 | 2017-04-14T00:00:00.000000 | 2017-09-06T00:00:00.000000 |
| certfr-2017-ale-012 | Campagne de maliciels prenant l'apparence d'un rançongiciel à multiples capacités de propagation | 2017-06-27T00:00:00.000000 | 2017-08-03T00:00:00.000000 |
| CERTFR-2017-ALE-012 | Campagne de maliciels prenant l'apparence d'un rançongiciel à multiples capacités de propagation | 2017-06-27T00:00:00.000000 | 2017-08-03T00:00:00.000000 |
| certfr-2017-ale-011 | Campagne de messages électroniques non sollicités de type Jaff | 2017-05-14T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-010 | Propagation d'un rançongiciel exploitant les vulnérabilités MS17-010 | 2017-05-12T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| CERTFR-2017-ALE-011 | Campagne de messages électroniques non sollicités de type Jaff | 2017-05-14T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| CERTFR-2017-ALE-010 | Propagation d'un rançongiciel exploitant les vulnérabilités MS17-010 | 2017-05-12T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-009 | Vulnérabilité dans Microsoft Malware Protection Engine | 2017-05-09T00:00:00.000000 | 2017-05-15T00:00:00.000000 |
| CERTFR-2017-ALE-009 | Vulnérabilité dans Microsoft Malware Protection Engine | 2017-05-09T00:00:00.000000 | 2017-05-15T00:00:00.000000 |
| certfr-2017-ale-005 | Vulnérabilité dans les commutateurs Cisco | 2017-03-20T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| certfr-2017-ale-004 | Vulnérabilité dans Apache Struts | 2017-03-10T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| CERTFR-2017-ALE-005 | Vulnérabilité dans les commutateurs Cisco | 2017-03-20T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0194 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0193 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0192 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0191 | Vulnérabilité dans Traefik | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0190 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0189 | Vulnérabilité dans F5 BIG-IP | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0188 | Multiples vulnérabilités dans les produits Splunk | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0186 | Multiples vulnérabilités dans Google Chrome | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0185 | Vulnérabilité dans Microsoft Windows | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0184 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0183 | Vulnérabilité dans HPE Aruba Networking ClearPass Policy Manager | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0182 | Multiples vulnérabilités dans Atlassian Confluence | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0181 | Vulnérabilité dans Apache Tomcat | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0180 | Vulnérabilité dans NetApp StorageGRID | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0178 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0177 | Multiples vulnérabilités dans Moodle | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0175 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0174 | Multiples vulnérabilités dans LibreNMS | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2024-avi-0858 | Multiples vulnérabilités dans Mitel Micollab | 2024-10-10T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| CERTFR-2026-AVI-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| CERTFR-2026-AVI-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| CERTFR-2026-AVI-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000002 | Multiple vulnerabilities in NEC Aterm series (NV25-003) | 2025-02-14T15:48+09:00 | 2025-02-14T15:48+09:00 |
| jvndb-2023-002797 | Multiple vulnerabilities in ELECOM and LOGITEC network devices | 2023-08-15T11:54+09:00 | 2025-02-13T15:21+09:00 |
| jvndb-2024-001061 | ELECOM wireless LAN routers vulnerable to OS command injection | 2024-01-24T17:16+09:00 | 2025-02-13T14:31+09:00 |
| jvndb-2025-000011 | Multiple vulnerabilities in FileMegane | 2025-02-13T13:39+09:00 | 2025-02-13T13:39+09:00 |
| jvndb-2025-000010 | acmailer vulnerable to cross-site scripting | 2025-02-12T15:05+09:00 | 2025-02-12T15:05+09:00 |
| jvndb-2025-001017 | Multiple vulnerabilities in STEALTHONE D220/D340/D440 | 2025-02-06T18:27+09:00 | 2025-02-06T18:27+09:00 |
| jvndb-2025-001018 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON NB-Designer | 2025-02-06T18:26+09:00 | 2025-02-06T18:26+09:00 |
| jvndb-2025-000008 | Multiple vulnerabilities in Defense Platform Home Edition | 2025-02-05T14:06+09:00 | 2025-02-05T14:06+09:00 |
| jvndb-2025-000009 | WordPress Plugin "Activity Log WinterLock" vulnerable to cross-site request forgery | 2025-02-04T13:58+09:00 | 2025-02-04T13:58+09:00 |
| jvndb-2025-001244 | Clickjacking Vulnerability in JP1/ServerConductor/Deployment Manager | 2025-01-30T18:19+09:00 | 2025-01-30T18:19+09:00 |
| jvndb-2025-000007 | SXF Common Library vulnerable to improper input data handling | 2025-01-29T14:57+09:00 | 2025-01-29T14:57+09:00 |
| jvndb-2025-000006 | WordPress Plugin "Simple Image Sizes" vulnerable to cross-site scripting | 2025-01-28T13:44+09:00 | 2025-01-28T13:44+09:00 |
| jvndb-2025-000005 | EXIF Viewer Classic vulnerable to cross-site scripting | 2025-01-27T14:25+09:00 | 2025-01-27T14:25+09:00 |
| jvndb-2025-000003 | FortiWeb vulnerable to SQL injection | 2025-01-21T15:59+09:00 | 2025-01-21T15:59+09:00 |
| jvndb-2025-001027 | Linux Ratfor vulnerable to stack-based buffer overflow | 2025-01-16T13:27+09:00 | 2025-01-16T13:27+09:00 |
| jvndb-2025-000001 | PLANEX COMMUNICATIONS MZK-DP300N vulnerable to cross-site scripting | 2025-01-08T17:08+09:00 | 2025-01-08T17:08+09:00 |
| jvndb-2024-015471 | Trend Micro Deep Security 20.0 Agent (for Windows) vulnerable to uncontrolled search path element | 2024-12-25T11:28+09:00 | 2024-12-25T11:28+09:00 |
| jvndb-2024-015393 | Multiple security updates for Trend Micro Apex One and Apex One as a Service (December 2024) | 2024-12-23T12:52+09:00 | 2024-12-23T12:52+09:00 |
| jvndb-2024-000125 | Multiple vulnerabilities in I-O DATA routers UD-LT1 and UD-LT1/EX | 2024-12-04T15:22+09:00 | 2024-12-18T15:20+09:00 |
| jvndb-2024-014918 | Authentication Bypass Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2024-12-17T15:23+09:00 | 2024-12-17T15:23+09:00 |
| jvndb-2024-000128 | Multiple vulnerabilities in SHARP routers | 2024-12-17T07:54+09:00 | 2024-12-17T07:54+09:00 |
| jvndb-2024-000127 | "Shonen Jump+" App for Android fails to restrict custom URL schemes properly | 2024-12-16T15:07+09:00 | 2024-12-16T15:07+09:00 |
| jvndb-2024-014825 | WordPress Plugin "My WP Customize Admin/Frontend" vulnerable to cross-site scripting | 2024-12-16T13:57+09:00 | 2024-12-16T13:57+09:00 |
| jvndb-2024-014793 | Multiple vulnerabilities in FXC AE1021 and AE1021PE | 2024-12-16T11:51+09:00 | 2024-12-16T11:51+09:00 |
| jvndb-2024-014079 | Trend Micro Deep Security Agent for Windows and Deep Security Notifier on DSVA vulnerable to OS command injection | 2024-12-06T12:11+09:00 | 2024-12-06T12:11+09:00 |
| jvndb-2023-000085 | "Skylark" App fails to restrict custom URL schemes properly | 2023-08-24T13:34+09:00 | 2024-12-03T15:51+09:00 |
| jvndb-2024-000124 | Multiple vulnerabilities in UNIVERGE IX/IX-R/IX-V series routers | 2024-12-02T16:38+09:00 | 2024-12-02T16:38+09:00 |
| jvndb-2024-000123 | Multiple FCNT Android devices vulnerable to authentication bypass | 2024-11-29T15:30+09:00 | 2024-11-29T15:30+09:00 |
| jvndb-2024-013702 | Multiple vulnerabilities in FUJI ELECTRIC products | 2024-11-29T14:42+09:00 | 2024-11-29T14:42+09:00 |
| jvndb-2024-000122 | HAProxy vulnerable to HTTP request/response smuggling | 2024-11-27T14:36+09:00 | 2024-11-27T14:36+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14477 | 多款Apple产品存在未明漏洞(CNVD-2026-14477) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14476 | 多款Apple产品权限提升漏洞(CNVD-2026-14476) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14475 | 多款Apple产品权限提升漏洞(CNVD-2026-14475) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-11369 | 厦门熵基科技有限公司人证魔方身份认证管理系统存在SQL注入漏洞 | 2026-02-05 | 2026-03-22 |
| cnvd-2026-11389 | 用友网络科技股份有限公司U8 Cloud存在SQL注入漏洞(CNVD-C-2026-72551) | 2026-02-04 | 2026-03-21 |
| cnvd-2026-14410 | Microsoft Exchange Server欺骗漏洞(CNVD-2026-14410) | 2025-12-12 | 2026-03-20 |
| cnvd-2026-14409 | UTT 520W goform/formIpGroupConfig文件缓冲区溢出漏洞 | 2026-02-11 | 2026-03-20 |
| cnvd-2026-14408 | Microsoft Excel代码执行漏洞(CNVD-2026-14408) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14407 | TeamViewer DEX Client权限提升漏洞 | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14406 | MailEnable不安全DLL加载漏洞(CNVD-2026-14406) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14405 | MailEnableMailEnableMailEnable不安全DLL加载漏洞(CNVD-2026-14405) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14404 | MailEnableMailEnable不安全DLL加载漏洞(CNVD-2026-14404) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14403 | MailEnableMailEnable不安全DLL加载漏洞(CNVD-2026-14403) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14402 | MailEnable不安全DLL加载漏洞(CNVD-2026-14402) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14401 | MailEnable不安全DLL加载漏洞(CNVD-2026-14401) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14400 | MailEnable不安全DLL加载漏洞(CNVD-2026-14400) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14399 | MailEnable不安全DLL加载漏洞(CNVD-2026-14399) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14398 | MailEnable不安全DLL加载漏洞 | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14397 | OpenClaw安全绕过漏洞 | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14396 | OpenClaw文件包含漏洞 | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14395 | OpenClaw访问控制错误漏洞(CNVD-2026-14395) | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14394 | OpenClaw目录遍历漏洞(CNVD-2026-14394) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14393 | OpenClaw远程代码执行漏洞(CNVD-2026-14393) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14392 | OpenClaw目录遍历漏洞(CNVD-2026-14392) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14391 | OpenClaw代码注入漏洞(CNVD-2026-14391) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14390 | OpenClaw访问控制错误漏洞(CNVD-2026-14390) | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14389 | OpenClaw信息泄露漏洞(CNVD-2026-14389) | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14388 | OpenClaw目录遍历漏洞 | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14387 | WordPress插件Calculated Fields Form跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| cnvd-2026-14386 | WordPress插件Avada Core跨站脚本漏洞 | 2026-03-19 | 2026-03-20 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-14098 | Уязвимость функции hdr_first_de() компонента ntfs3 ядра операционной системы Linux, позво… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14095 | Уязвимость функции cm_chan_msg_send() модуля drivers/rapidio/rio_cm.c ядра операционной с… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14090 | Уязвимость функции vsock_find_cid() ядра операционной системы Linux, позволяющая нарушите… | 14.11.2025 | 16.02.2026 |
| bdu:2025-13924 | Уязвимость библиотеки LibTIFF, связанная с выходом операции за границы буфера в памяти, п… | 10.11.2025 | 16.02.2026 |
| bdu:2025-13921 | Уязвимость библиотеки LibTIFF, связанная с выходом операции за границы буфера в памяти, п… | 10.11.2025 | 16.02.2026 |
| bdu:2025-13888 | Уязвимость функции ax25_kiss_rcv() модуля ax25_kiss_rcv ядра операционной системы Linux, … | 07.11.2025 | 16.02.2026 |
| bdu:2025-13881 | Уязвимость функции SSID в __cfg80211_connect_result() модуля net/wireless/sme.c ядра опер… | 07.11.2025 | 16.02.2026 |
| bdu:2025-13880 | Уязвимость функции pad_compress_skb() модуля drivers/net/ppp/ppp_generic.c ядра операцион… | 07.11.2025 | 16.02.2026 |
| bdu:2025-13687 | Уязвимость функции __mark_inode_dirty() ядра операционной системы Linux, позволяющая нару… | 05.11.2025 | 16.02.2026 |
| bdu:2025-13684 | Уязвимость функции cmp_bss() ядра операционной системы Linux, позволяющая нарушителю вызв… | 05.11.2025 | 16.02.2026 |
| bdu:2025-13682 | Уязвимость функции l2cap_sock_cleanup_listen() ядра операционной системы Linux, позволяющ… | 05.11.2025 | 16.02.2026 |
| bdu:2025-13679 | Уязвимость функции list_first_entry() ядра операционной системы Linux, позволяющая наруши… | 05.11.2025 | 16.02.2026 |
| bdu:2025-13565 | Уязвимость функции cache_set_flush() ядра операционной системы Linux, позволяющая нарушит… | 29.10.2025 | 16.02.2026 |
| bdu:2025-13564 | Уязвимость функции automount_fullpath() ядра операционной системы Linux, позволяющая нару… | 29.10.2025 | 16.02.2026 |
| bdu:2025-13563 | Уязвимость функции do_register_framebuffer() ядра операционной системы Linux, позволяющая… | 29.10.2025 | 16.02.2026 |
| bdu:2025-13522 | Уязвимость функции hid_hw_raw_request() драйвера Low Level Transport ядра операционной си… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13520 | Уязвимость функции __mptcp_do_fallback() компонента mptcp ядра операционной системы Linux… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13517 | Уязвимость драйвера Low Level Transport ядра операционной системы Linux, позволяющая нару… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13514 | Уязвимость функции misc_deregister() компонента soc ядра операционной системы Linux, позв… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13513 | Уязвимость функции fxls8962af_fifo_flush() компонента iio ядра операционной системы Linux… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13512 | Уязвимость функции rose_rt_device_down() ядра операционной системы Linux, позволяющая нар… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13511 | Уязвимость функции rpl_do_srh_inline() компонента rpl ядра операционной системы Linux, по… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13498 | Уязвимость функции __kmem_cache_shutdown ядра операционной системы Linux, позволяющая нар… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13494 | Уязвимость компонента ath6kl ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13493 | Уязвимость функции msdc_prepare_data() компонента mtk-sd ядра операционной системы Linux,… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13486 | Уязвимость функции dbMount операционной системы Linux, позволяющая нарушителю оказать воз… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13485 | Уязвимость компонента media операционной системы Linux, позволяющая нарушителю вызвать от… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13484 | Уязвимость функции v4l2_rect_map_inside операционной системы Linux, позволяющая нарушител… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13482 | Уязвимость ядра операционной системы Linux, связанная с недостаточной проверкой входных д… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13479 | Уязвимость операционной системы Linux, связанная с ошибкой разыменования указателей, позв… | 28.10.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200106-0170 | Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remot… | 2024-07-23T21:52:30.595000Z |
| var-201403-0508 | The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.… | 2024-07-23T21:52:28.560000Z |
| var-202205-1319 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:52:24.897000Z |
| var-201804-1186 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:52:24.271000Z |
| var-201102-0095 | Google Chrome before 9.0.597.94 does not properly perform event handling for animations, … | 2024-07-23T21:52:24.603000Z |
| var-200107-0019 | Cisco routers and switches running IOS 12.0 through 12.2.1 allows a remote attacker to ca… | 2024-07-23T21:51:49.898000Z |
| var-202002-1480 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:51:05.518000Z |
| var-201503-0389 | The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP th… | 2024-07-23T21:51:05.137000Z |
| var-202109-1805 | Malformed requests may cause the server to dereference a NULL pointer. This issue affects… | 2024-07-23T21:51:04.963000Z |
| var-201803-0086 | LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) … | 2024-07-23T21:51:04.545000Z |
| var-202206-1186 | Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may all… | 2024-07-23T21:51:00.840000Z |
| var-201912-1853 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:50:27.591000Z |
| var-201912-0123 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:50:27.004000Z |
| var-201904-0756 | A memory corruption issue was addressed with improved memory handling. This issue affecte… | 2024-07-23T21:50:26.406000Z |
| var-200907-0717 | WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.… | 2024-07-23T21:50:25.062000Z |
| var-202205-1304 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:50:24.904000Z |
| var-200810-0142 | The Postfix configuration file in Mac OS X 10.5.5 causes Postfix to be network-accessible… | 2024-07-23T21:50:24.464000Z |
| var-201107-0125 | The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, a… | 2024-07-23T21:50:23.993000Z |
| var-202006-1651 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 a… | 2024-07-23T21:50:22.831000Z |
| var-200809-0008 | Finder in Apple Mac OS X 10.5 through 10.5.4 does not properly update permission data in … | 2024-07-23T21:50:10.607000Z |
| var-201203-0191 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2024-07-23T21:50:08.937000Z |
| var-201206-0064 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:49:37.613000Z |
| var-202004-2202 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T21:49:25.052000Z |
| var-202207-1485 | An out-of-bounds write issue was addressed with improved input validation. This issue is … | 2024-07-23T21:49:20.877000Z |
| var-201007-0321 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 thro… | 2024-07-23T21:49:20.293000Z |
| var-201803-0099 | The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, whic… | 2024-07-23T21:49:16.122000Z |
| var-200505-0359 | Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape s… | 2024-07-23T21:49:11.998000Z |
| var-202003-1782 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:48:40.941000Z |
| var-201806-1486 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:48:39.044000Z |
| var-200705-0670 | The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.1… | 2024-07-23T21:48:39.239000Z |