Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-37339 |
9.8 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-18T02:11:23.662Z |
| CVE-2026-40494 |
9.8 (3.1)
|
SAIL has heap buffer overflow in TGA RLE decoder — raw… |
HappySeaFox |
sail |
2026-04-18T01:42:48.830Z | 2026-04-18T01:42:48.830Z |
| CVE-2026-40493 |
9.8 (3.1)
|
SAIL has heap buffer overflow in PSD decoder — bpp mis… |
HappySeaFox |
sail |
2026-04-18T01:41:14.664Z | 2026-04-18T01:41:14.664Z |
| CVE-2026-40492 |
9.8 (3.1)
|
SAIL has heap buffer overflow in XWD decoder — bits_pe… |
HappySeaFox |
sail |
2026-04-18T01:39:48.056Z | 2026-04-18T01:39:48.056Z |
| CVE-2026-40491 |
6.5 (3.1)
|
gdown Affected by Arbitrary File Write via Path Traver… |
wkentaro |
gdown |
2026-04-18T01:36:47.659Z | 2026-04-18T01:36:47.659Z |
| CVE-2026-40490 |
6.8 (3.1)
|
AsyncHttpClient leaks authorization credentials to unt… |
AsyncHttpClient |
async-http-client |
2026-04-18T01:31:13.860Z | 2026-04-18T01:31:13.860Z |
| CVE-2026-1559 |
6.4 (3.1)
|
Youzify <= 1.3.6 - Authenticated (Subscriber+) Stored … |
youzify |
Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress |
2026-04-18T01:26:05.210Z | 2026-04-18T01:26:05.210Z |
| CVE-2026-1838 |
6.1 (3.1)
|
Hostel <= 1.1.6 - Reflected Cross-Site Scripting via '… |
prasunsen |
Hostel |
2026-04-18T01:26:04.643Z | 2026-04-18T01:26:04.643Z |
| CVE-2026-40489 |
8.6 (4.0)
|
editorconfig-core-c has incomplete fix for CVE-2023-0341 |
editorconfig |
editorconfig-core-c |
2026-04-18T01:24:57.278Z | 2026-04-18T01:24:57.278Z |
| CVE-2026-40487 |
8.9 (3.1)
|
Postiz Has Unrestricted File Upload via MIME Type Spoo… |
gitroomhq |
postiz-app |
2026-04-18T01:19:06.588Z | 2026-04-18T01:19:06.588Z |
| CVE-2026-35582 |
8.8 (3.1)
|
Emissary has an OS Command Injection via Unvalidated I… |
NationalSecurityAgency |
emissary |
2026-04-18T01:16:27.661Z | 2026-04-18T01:16:27.661Z |
| CVE-2026-35465 |
7.5 (3.1)
|
SecureDrop Client has path injection in read_gzip_head… |
freedomofpress |
securedrop-client |
2026-04-18T00:41:16.594Z | 2026-04-18T00:41:16.594Z |
| CVE-2026-40572 |
9 (3.1)
|
NovumOS has Arbitrary Memory Mapping via Syscall 15 (M… |
MinecAnton209 |
NovumOS |
2026-04-18T00:16:02.590Z | 2026-04-18T00:16:02.590Z |
| CVE-2026-40317 |
9.4 (3.1)
|
NovumOS has Privilege Escalation in the Syscall Interface |
MinecAnton209 |
NovumOS |
2026-04-18T00:12:10.368Z | 2026-04-18T00:12:10.368Z |
| CVE-2026-40350 |
8.8 (3.1)
|
Movary User Management (/settings/users) has Authoriza… |
leepeuker |
movary |
2026-04-18T00:07:33.324Z | 2026-04-18T00:07:33.324Z |
| CVE-2026-40349 |
8.8 (3.1)
|
Authenticated Movary User Can Self-Escalate to Adminis… |
leepeuker |
movary |
2026-04-18T00:05:46.360Z | 2026-04-18T00:05:46.360Z |
| CVE-2026-40593 |
4.8 (3.1)
|
ChurchCRM: Stored XSS in UserEditor.php via Login Name Field |
ChurchCRM |
CRM |
2026-04-18T00:02:59.606Z | 2026-04-18T00:02:59.606Z |
| CVE-2026-40348 |
7.7 (3.1)
|
Movary has Authenticated SSRF via Jellyfin Server URL … |
leepeuker |
movary |
2026-04-18T00:01:09.725Z | 2026-04-18T00:01:09.725Z |
| CVE-2026-40347 |
5.3 (3.1)
|
Python-Multipart affected by Denial of Service via lar… |
Kludex |
python-multipart |
2026-04-17T23:56:50.777Z | 2026-04-17T23:56:50.777Z |
| CVE-2026-40346 |
6.4 (4.0)
|
NocoBase has SSRF in Workflow HTTP Request and Custom … |
nocobase |
@nocobase/plugin-workflow-request |
2026-04-17T23:54:34.829Z | 2026-04-17T23:54:34.829Z |
| CVE-2026-40581 |
8.1 (3.1)
|
ChurchCRM: Cross-Site Request Forgery (CSRF) in Select… |
ChurchCRM |
CRM |
2026-04-17T23:51:32.765Z | 2026-04-17T23:51:32.765Z |
| CVE-2026-40337 |
5.1 (3.1)
|
Sentry kernel has incomplete ownership check for IRQ l… |
camelot-os |
sentry-kernel |
2026-04-17T23:51:09.866Z | 2026-04-17T23:51:09.866Z |
| CVE-2026-40341 |
3.5 (3.1)
|
libgphoto2 has an OOB Read in ptp_unpack_EOS_FocusInfoEx |
gphoto |
libgphoto2 |
2026-04-17T23:48:36.644Z | 2026-04-17T23:48:36.644Z |
| CVE-2026-40340 |
6.1 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_OI() in ptp-pack… |
gphoto |
libgphoto2 |
2026-04-17T23:45:17.467Z | 2026-04-17T23:45:17.467Z |
| CVE-2026-40339 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() FormF… |
gphoto |
libgphoto2 |
2026-04-17T23:42:32.586Z | 2026-04-17T23:42:32.586Z |
| CVE-2026-40338 |
5.2 (3.1)
|
libgphoto2 has OOB read in ptp_unpack_Sony_DPD() enume… |
gphoto |
libgphoto2 |
2026-04-17T23:40:10.097Z | 2026-04-17T23:40:10.097Z |
| CVE-2026-40485 |
5.3 (3.1)
|
ChurchCRM: Username Enumeration via Differential Respo… |
ChurchCRM |
CRM |
2026-04-17T23:29:35.884Z | 2026-04-17T23:29:35.884Z |
| CVE-2026-40336 |
2.4 (3.1)
|
libgphoto2 has memory leak in ptp_unpack_Sony_DPD() se… |
gphoto |
libgphoto2 |
2026-04-17T23:27:42.868Z | 2026-04-17T23:27:42.868Z |
| CVE-2026-2262 |
7.5 (3.1)
|
Easy Appointments <= 3.12.21 - Unauthenticated Sensiti… |
easyappointments |
Easy Appointments |
2026-04-17T23:26:48.863Z | 2026-04-17T23:26:48.863Z |
| CVE-2026-40484 |
9.1 (3.1)
|
ChurchCRM: Authenticated Remote Code Execution via Unr… |
ChurchCRM |
CRM |
2026-04-17T23:25:06.319Z | 2026-04-17T23:25:06.319Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40103 |
4.3 (3.1)
|
Vikunja's Scoped API tokens with projects.background p… |
go-vikunja |
vikunja |
2026-04-10T16:12:27.603Z | 2026-04-15T14:45:18.303Z |
| CVE-2025-66447 |
0 (3.1)
|
Chamilo LMS has validation-less redirect on login page |
chamilo |
chamilo-lms |
2026-04-10T17:22:32.443Z | 2026-04-14T14:12:56.349Z |
| CVE-2026-33618 |
8.8 (3.1)
|
Chamilo LMS Affected by Remote Code Execution via eval… |
chamilo |
chamilo-lms |
2026-04-10T18:10:16.691Z | 2026-04-10T18:46:09.585Z |
| CVE-2026-40226 |
6.4 (3.1)
|
In nspawn in systemd 233 through 259 before 260, … |
systemd |
systemd |
2026-04-10T15:18:10.447Z | 2026-04-14T14:48:20.451Z |
| CVE-2026-22560 |
5.3 (3.1)
|
An open redirect vulnerability in Rocket.Chat ver… |
Rocket.Chat |
Rocket.Chat |
2026-04-10T17:00:11.746Z | 2026-04-14T19:04:32.571Z |
| CVE-2026-40228 |
2.9 (3.1)
|
In systemd 259, systemd-journald can send ANSI es… |
systemd |
systemd |
2026-04-10T15:48:44.215Z | 2026-04-10T17:27:22.882Z |
| CVE-2026-35595 |
8.3 (3.1)
|
Vikunja Affected by Privilege Escalation via Project R… |
go-vikunja |
vikunja |
2026-04-10T15:58:32.658Z | 2026-04-10T18:16:18.230Z |
| CVE-2026-35596 |
4.3 (3.1)
|
Vikunja has Broken Access Control on Label Read via SQ… |
go-vikunja |
vikunja |
2026-04-10T15:59:43.255Z | 2026-04-14T14:51:51.537Z |
| CVE-2026-35597 |
5.9 (3.1)
|
Vikunja Affected by TOTP Brute-Force Due to Non-Functi… |
go-vikunja |
vikunja |
2026-04-10T16:03:19.636Z | 2026-04-13T15:37:11.358Z |
| CVE-2026-35598 |
4.3 (3.1)
|
Vikunja has Missing Authorization on CalDAV Task Read |
go-vikunja |
vikunja |
2026-04-10T16:04:32.083Z | 2026-04-14T14:20:44.249Z |
| CVE-2026-35599 |
6.5 (3.1)
|
Vikunja has an Algorithmic Complexity DoS in Repeating… |
go-vikunja |
vikunja |
2026-04-10T16:05:57.581Z | 2026-04-10T18:28:29.310Z |
| CVE-2026-35600 |
5.4 (3.1)
|
Vikunja has HTML Injection via Task Titles in Overdue … |
go-vikunja |
vikunja |
2026-04-10T16:07:07.846Z | 2026-04-14T15:01:18.724Z |
| CVE-2026-35601 |
4.1 (3.1)
|
Vikunja has an iCalendar Property Injection via CRLF i… |
go-vikunja |
vikunja |
2026-04-10T16:08:50.519Z | 2026-04-13T15:37:03.974Z |
| CVE-2026-35602 |
5.4 (3.1)
|
Vikunja has a File Size Limit Bypass via Vikunja Import |
go-vikunja |
vikunja |
2026-04-10T16:10:39.630Z | 2026-04-14T14:19:30.140Z |
| CVE-2026-29063 |
8.7 (4.0)
|
Immutable.js: Improperly Controlled Modification of Ob… |
immutable-js |
immutable-js |
2026-03-06T18:25:22.438Z | 2026-03-06T19:33:31.642Z |
| CVE-2026-31940 |
7.5 (3.1)
|
Session Fixation in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:35:10.661Z | 2026-04-14T14:12:28.550Z |
| CVE-2026-31941 |
7.7 (3.1)
|
Server-Side Request Forgery (SSRF) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:37:50.948Z | 2026-04-10T18:33:22.920Z |
| CVE-2026-32892 |
9.1 (3.1)
|
OS Command Injection in Chamilo LMS 1.11.36 |
chamilo |
chamilo-lms |
2026-04-10T17:56:57.695Z | 2026-04-14T14:07:14.704Z |
| CVE-2025-15602 |
8.7 (4.0)
8.8 (3.1)
|
Snipe-IT < 8.3.7 Mass Assignment Vulnerability Leading… |
Grokability, Inc. |
Snipe-IT |
2026-03-06T16:16:08.531Z | 2026-03-09T15:12:11.595Z |
| CVE-2026-32893 |
5.4 (3.1)
|
Chamilo LMS has Reflected XSS via Unsanitized http_bui… |
chamilo |
chamilo-lms |
2026-04-10T17:42:24.220Z | 2026-04-15T14:51:41.852Z |
| CVE-2026-32894 |
7.1 (3.1)
|
Chamilo LMS has an IDOR in Gradebook Allows Cross-Cour… |
chamilo |
chamilo-lms |
2026-04-10T17:44:24.994Z | 2026-04-13T15:36:28.238Z |
| CVE-2026-32930 |
7.1 (3.1)
|
Chamilo LMS has an IDOR in Gradebook Allows Cross-Cour… |
chamilo |
chamilo-lms |
2026-04-10T17:48:51.774Z | 2026-04-10T18:32:13.726Z |
| CVE-2026-32931 |
7.5 (3.1)
|
Chamilo LMS has Arbitrary File Upload via MIME-Only Va… |
chamilo |
chamilo-lms |
2026-04-10T17:50:40.176Z | 2026-04-15T14:56:10.732Z |
| CVE-2026-32932 |
4.7 (3.1)
|
Chamilo LMS has an Open Redirect via Unvalidated 'page… |
chamilo |
chamilo-lms |
2026-04-10T17:51:58.480Z | 2026-04-13T15:36:22.092Z |
| CVE-2026-33141 |
6.5 (3.1)
|
Chamilo LMS has an IDOR in REST API Stats Endpoint Exp… |
chamilo |
chamilo-lms |
2026-04-10T18:01:26.027Z | 2026-04-14T14:06:11.889Z |
| CVE-2026-31939 |
8.3 (3.1)
|
Path Traversal (Arbitrary File Delete) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:32:29.252Z | 2026-04-13T15:36:34.681Z |
| CVE-2026-34238 |
5.1 (3.1)
|
ImageMagick: Integer overflow in despeckle operation c… |
ImageMagick |
ImageMagick |
2026-04-13T21:14:07.180Z | 2026-04-14T13:46:39.542Z |
| CVE-2026-33899 |
5.3 (3.1)
|
ImageMagick: Heap BufferOverflow write of single zero … |
ImageMagick |
ImageMagick |
2026-04-13T20:46:43.781Z | 2026-04-16T13:26:40.513Z |
| CVE-2026-28518 |
8.4 (4.0)
7.8 (3.1)
|
OpenViking .ovpack Import ZIP Slip Path Traversal |
Volcengine |
OpenViking |
2026-03-03T14:36:13.472Z | 2026-03-31T20:44:01.330Z |
| CVE-2026-33900 |
5.9 (3.1)
|
ImageMagick has a Heap overflow caused by integer over… |
ImageMagick |
ImageMagick |
2026-04-13T20:50:19.615Z | 2026-04-14T16:28:41.536Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-32931 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an unrestricted file … | 2026-04-10T18:16:42.430 | 2026-04-17T21:27:59.237 |
| fkie_cve-2026-32932 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an Open Redirect vuln… | 2026-04-10T18:16:42.590 | 2026-04-17T21:27:32.730 |
| fkie_cve-2026-33141 | Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, an Insecure Direct Object Referen… | 2026-04-10T18:16:42.743 | 2026-04-17T21:24:02.230 |
| fkie_cve-2026-31939 | Chamilo LMS is a learning management system. Prior to 1.11.38, there is a path traversal in main/ex… | 2026-04-10T18:16:41.313 | 2026-04-17T21:23:42.527 |
| fkie_cve-2026-34238 | ImageMagick is free and open-source software used for editing and manipulating digital images. In v… | 2026-04-13T22:16:29.310 | 2026-04-17T21:22:41.077 |
| fkie_cve-2026-33899 | ImageMagick is free and open-source software used for editing and manipulating digital images. In v… | 2026-04-13T21:16:25.170 | 2026-04-17T21:20:26.970 |
| fkie_cve-2026-28518 | OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path traversal vulnerabilit… | 2026-03-03T15:16:20.593 | 2026-04-17T21:19:50.927 |
| fkie_cve-2026-33900 | ImageMagick is free and open-source software used for editing and manipulating digital images. In v… | 2026-04-13T21:16:25.333 | 2026-04-17T21:19:44.483 |
| fkie_cve-2026-33894 | Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScri… | 2026-03-27T21:17:25.983 | 2026-04-17T21:16:42.030 |
| fkie_cve-2026-40527 | radare2 prior to commit bc5a890 contains a command injection vulnerability in the afsv/afsvj comman… | 2026-04-17T21:16:35.373 | 2026-04-17T21:16:35.373 |
| fkie_cve-2026-40303 | zrok is software for sharing web services, files, and network resources. Prior to version 2.0.1, en… | 2026-04-17T21:16:35.140 | 2026-04-17T21:16:35.140 |
| fkie_cve-2026-40302 | zrok is software for sharing web services, files, and network resources. Prior to version 2.0.1, th… | 2026-04-17T21:16:34.997 | 2026-04-17T21:16:34.997 |
| fkie_cve-2026-40301 | DOMSanitizer is a DOM/SVG/MathML Sanitizer for PHP 7.3+. Prior to version 1.0.10, DOMSanitizer::san… | 2026-04-17T21:16:34.850 | 2026-04-17T21:16:34.850 |
| fkie_cve-2026-40299 | next-intl provides internationalization for Next.js. Applications using the `next-intl` middleware … | 2026-04-17T21:16:34.707 | 2026-04-17T21:16:34.707 |
| fkie_cve-2026-40293 | OpenFGA is an authorization/permission engine built for developers. In versions 0.1.4 through 1.13.… | 2026-04-17T21:16:34.567 | 2026-04-17T21:16:34.567 |
| fkie_cve-2026-40286 | WeGIA is a web manager for charitable institutions. In versions prior to 3.6.10, a Stored Cross-Sit… | 2026-04-17T21:16:34.430 | 2026-04-17T21:16:34.430 |
| fkie_cve-2026-40285 | WeGIA is a web manager for charitable institutions. Versions prior to 3.6.10 contain a SQL injectio… | 2026-04-17T21:16:34.267 | 2026-04-17T21:16:34.267 |
| fkie_cve-2026-40284 | WeGIA is a web manager for charitable institutions. In versions prior to 3.6.10, a Stored Cross-Sit… | 2026-04-17T21:16:34.140 | 2026-04-17T21:16:34.140 |
| fkie_cve-2026-40282 | WeGIA is a web manager for charitable institutions. In versions prior to 3.6.10, a Stored Cross-Sit… | 2026-04-17T21:16:34.007 | 2026-04-17T21:16:34.007 |
| fkie_cve-2026-40196 | HomeBox is a home inventory and organization system. Versions prior to 0.25.0 contain a vulnerabili… | 2026-04-17T21:16:33.863 | 2026-04-17T21:16:33.863 |
| fkie_cve-2026-40155 | The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. In… | 2026-04-17T21:16:33.713 | 2026-04-17T21:16:33.713 |
| fkie_cve-2026-35603 | Claude Code is an agentic coding tool. In versions prior to 2.1.75 on Windows, Claude Code loaded t… | 2026-04-17T21:16:33.507 | 2026-04-17T21:16:33.507 |
| fkie_cve-2026-35512 | xrdp is an open source RDP server. Versions through 0.10.5 have a heap-based buffer overflow in the… | 2026-04-17T21:16:33.297 | 2026-04-17T21:16:33.297 |
| fkie_cve-2026-35402 | mcp-neo4j-cypher is an MCP server for executing Cypher queries against Neo4j databases. In versions… | 2026-04-17T21:16:33.170 | 2026-04-17T21:16:33.170 |
| fkie_cve-2026-33689 | xrdp is an open source RDP server. Versions through 0.10.5 have an out-of-bounds read vulnerability… | 2026-04-17T21:16:32.963 | 2026-04-17T21:16:32.963 |
| fkie_cve-2026-33436 | Stirling-PDF is a locally hosted web application that facilitates various operations on PDF files. … | 2026-04-17T21:16:32.750 | 2026-04-17T21:16:32.750 |
| fkie_cve-2026-33145 | xrdp is an open source RDP server. Versions through 0.10.5 allow an authenticated remote user to ex… | 2026-04-17T21:16:32.610 | 2026-04-17T21:16:32.610 |
| fkie_cve-2026-23500 | Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) softwa… | 2026-04-17T21:16:31.890 | 2026-04-17T21:16:31.890 |
| fkie_cve-2026-33549 | SPIP 4.4.10 through 4.4.12 before 4.4.13 allows unintended privilege assignment (of administrator p… | 2026-03-22T03:16:01.237 | 2026-04-17T21:13:29.500 |
| fkie_cve-2026-32766 | astral-tokio-tar is a tar archive reading/writing library for async Rust. In versions 0.5.6 and ear… | 2026-03-20T00:16:18.100 | 2026-04-17T21:09:16.900 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-c9h3-5p7r-mrjh |
5.3 (4.0)
|
OpenClaw: Discord event cover images bypassed sandbox media normalization | 2026-04-17T21:56:04Z | 2026-04-17T21:56:04Z |
| ghsa-49cg-279w-m73x |
6.0 (4.0)
|
OpenClaw: Empty approver lists could grant explicit approval authorization | 2026-04-17T21:55:54Z | 2026-04-17T21:55:54Z |
| ghsa-7g8c-cfr3-vqqr |
6.6 (4.0)
|
OpenClaw: Agent hook events could enqueue trusted system events from unsanitized external input | 2026-04-17T21:55:20Z | 2026-04-17T21:55:21Z |
| ghsa-vfp4-8x56-j7c5 |
7.1 (4.0)
|
OpenClaw: Exec environment denylist missed high-risk interpreter startup variables | 2026-04-17T21:54:20Z | 2026-04-17T21:54:21Z |
| ghsa-j6c7-3h5x-99g9 |
6.3 (4.0)
|
OpenClaw: Shell-wrapper detection missed env-argv assignment injection forms | 2026-04-17T21:53:36Z | 2026-04-17T21:53:36Z |
| ghsa-5gjc-grvm-m88j |
4.9 (4.0)
|
OpenClaw: Memory dreaming config persistence was reachable from operator.write commands | 2026-04-17T21:53:17Z | 2026-04-17T21:53:17Z |
| ghsa-gc9r-867r-j85f |
1.7 (4.0)
|
OpenClaw: Microsoft Teams SSO invoke handler missed sender authorization checks | 2026-04-17T21:51:04Z | 2026-04-17T21:51:04Z |
| ghsa-r77c-2cmr-7p47 |
2.3 (4.0)
|
OpenClaw: Delivery queue recovery could lose group tool-policy context for media replay | 2026-04-17T21:50:55Z | 2026-04-17T21:50:55Z |
| ghsa-g375-h3v6-4873 |
6.0 (4.0)
|
OpenClaw: Heartbeat owner downgrade missed local async exec completion events | 2026-04-17T21:48:57Z | 2026-04-17T21:48:57Z |
| ghsa-vw3h-q6xq-jjm5 |
8.7 (4.0)
|
OpenClaw: Voice-call realtime WebSocket accepted oversized frames | 2026-04-17T21:48:36Z | 2026-04-17T21:48:36Z |
| ghsa-g2hm-779g-vm32 |
6.0 (4.0)
|
OpenClaw: Heartbeat owner downgrade missed untrusted webhook wake events | 2026-04-17T21:48:25Z | 2026-04-17T21:48:25Z |
| ghsa-c4qm-58hj-j6pj |
6.0 (4.0)
|
OpenClaw: Browser snapshot and screenshot routes could expose internal page content after navigation | 2026-04-17T21:47:36Z | 2026-04-17T21:47:36Z |
| ghsa-8372-7vhw-cm6q |
7.1 (4.0)
|
OpenClaw: config.get redaction bypass through sourceConfig and runtimeConfig aliases | 2026-04-17T21:47:15Z | 2026-04-17T21:47:15Z |
| ghsa-jwrq-8g5x-5fhm |
5.3 (4.0)
|
OpenClaw: Collect-mode queue batches could reuse the last sender authorization context | 2026-04-17T21:35:35Z | 2026-04-17T21:35:35Z |
| ghsa-5fw2-mwhh-9947 |
8.2 (4.0)
|
Flowise: Unauthenticated TTS endpoint accepts arbitrary credential IDs — enables API credit abuse v… | 2026-04-17T21:35:14Z | 2026-04-17T21:35:14Z |
| ghsa-w47f-j8rh-wx87 |
8.7 (4.0)
|
Flowise: Public chatflow endpoints return unsanitized flowData including plaintext API keys, passwo… | 2026-04-17T21:34:30Z | 2026-04-17T21:34:30Z |
| ghsa-3prp-9gf7-4rxx |
7.6 (4.0)
|
Flowise: Mass Assignment in DocumentStore Create Endpoint Leads to Cross-Workspace Object Takeover (IDOR) | 2026-04-17T21:34:16Z | 2026-04-17T21:34:16Z |
| ghsa-4c3q-x735-j3r5 |
8.4 (3.1)
|
Complete Bypass of CVE-2026-24884 Patch via Git-Delivered Symlink Poisoning in compressing | 2026-04-17T21:32:59Z | 2026-04-17T21:32:59Z |
| ghsa-4pc8-6qgf-fgv2 |
7.8 (3.1)
8.5 (4.0)
|
radare2 prior to commit bc5a890 contains a command injection vulnerability in the afsv/afsvj comman… | 2026-04-17T21:31:48Z | 2026-04-17T21:31:48Z |
| ghsa-wh3w-c78x-9663 |
8.8 (3.1)
|
Anviz CX2 Lite and CX7 are vulnerable to unverified update packages that can be uploaded. The devi… | 2026-04-17T21:31:47Z | 2026-04-17T21:31:47Z |
| ghsa-w67w-38wc-vr97 |
7.5 (3.1)
|
Anviz CX2 Lite and CX7 are vulnerable to unauthenticated POST requests that modify debug settings … | 2026-04-17T21:31:47Z | 2026-04-17T21:31:47Z |
| ghsa-vh49-38wc-6wqp |
5.3 (3.1)
|
Anviz CX7 Firmware is vulnerable to an unauthenticated POST to the device that captures a photo wi… | 2026-04-17T21:31:47Z | 2026-04-17T21:31:47Z |
| ghsa-qg37-cwrh-945r |
8.1 (3.1)
|
Anviz CrossChex Standard lacks source verification in the client/server channel, enabling TCP pack… | 2026-04-17T21:31:47Z | 2026-04-17T21:31:47Z |
| ghsa-pxw3-r2m4-c5m3 |
6.5 (3.1)
|
Anviz CX2 Lite and CX7 administrative sessions occur over HTTP, enabling on‑path attackers to snif… | 2026-04-17T21:31:47Z | 2026-04-17T21:31:47Z |
| ghsa-9q53-p4m8-gm9v |
5.3 (3.1)
|
Anviz CX7 Firmware is vulnerable to the most recently captured test photo that can be retrieved wi… | 2026-04-17T21:31:47Z | 2026-04-17T21:31:47Z |
| ghsa-98hc-x583-4p47 |
9.8 (3.1)
|
Anviz CX2 Lite and CX7 are vulnerable to unauthenticated firmware uploads. This causes crafted arc… | 2026-04-17T21:31:47Z | 2026-04-17T21:31:47Z |
| ghsa-5j27-2fpm-q949 |
8.8 (3.1)
|
Anviz CX2 Lite is vulnerable to an authenticated command injection via a filename parameter that e… | 2026-04-17T21:31:47Z | 2026-04-17T21:31:47Z |
| ghsa-q6pr-mghj-3fjx |
7.5 (3.1)
|
Anviz CrossChex Standard is vulnerable when an attacker manipulates the TDS7 PreLogin to disable e… | 2026-04-17T21:31:46Z | 2026-04-17T21:31:46Z |
| ghsa-p7jp-59qp-fjf3 |
5.3 (3.1)
|
Anviz CX2 Lite and CX7 are vulnerable to unauthenticated access that discloses debug configuration… | 2026-04-17T21:31:46Z | 2026-04-17T21:31:46Z |
| ghsa-jgq2-vq69-gr6h |
9.1 (3.1)
9.1 (4.0)
|
OpenViking prior to commit c7bb167 contains an authentication bypass vulnerability in the VikingBot… | 2026-04-17T21:31:46Z | 2026-04-17T21:31:46Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43171 |
7.5 (3.1)
|
An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server… | tryton | 2022-03-10T17:47:00+00:00 | 2024-11-21T14:23:02.453983+00:00 |
| pysec-2022-43170 |
6.5 (3.1)
|
An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6… | tryton | 2022-03-10T17:47:00+00:00 | 2024-11-21T14:23:02.248212+00:00 |
| pysec-2016-41 |
4.4 (3.1)
|
file_open in Tryton before 3.2.17, 3.4.x before 3.4.14, 3.6.x before 3.6.12, 3.8.x before… | tryton | 2016-09-07T19:28:00+00:00 | 2024-11-21T14:23:02.083165+00:00 |
| pysec-2016-40 |
5.3 (3.1)
|
Tryton 3.x before 3.2.17, 3.4.x before 3.4.14, 3.6.x before 3.6.12, 3.8.x before 3.8.8, a… | tryton | 2016-09-07T19:28:00+00:00 | 2024-11-21T14:23:02.008255+00:00 |
| pysec-2023-301 |
7.8 (3.1)
|
Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36. | transformers | 2023-12-20T17:15:00+00:00 | 2024-11-21T14:23:01.933055+00:00 |
| pysec-2023-300 |
8.8 (3.1)
|
Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36. | transformers | 2023-12-19T13:15:00+00:00 | 2024-11-21T14:23:01.871022+00:00 |
| pysec-2023-299 |
4.7 (3.1)
|
Insecure Temporary File in GitHub repository huggingface/transformers prior to 4.30.0. | transformers | 2023-05-18T17:15:00+00:00 | 2024-11-21T14:23:01.805729+00:00 |
| pysec-2022-43169 |
9.8 (3.1)
|
The Togglee package in PyPI version v0.0.8 was discovered to contain a code execution bac… | togglee | 2022-06-24T21:15:00Z | 2024-11-21T14:23:01.740031Z |
| pysec-2022-43167 |
8.8 (3.1)
|
Selenium Server (Grid) before 4 allows CSRF because it permits non-JSON content types suc… | selenium | 2022-04-19T03:15:00+00:00 | 2024-11-21T14:23:01.289420+00:00 |
| pysec-2022-43165 |
9.8 (3.1)
|
The Scoptrial package in PyPI version v0.0.5 was discovered to contain a code execution b… | scoptrial | 2022-06-24T21:15:00Z | 2024-11-21T14:23:01.181819Z |
| pysec-2016-39 |
7.5 (3.1)
|
An exploitable out-of-bounds array access vulnerability exists in the xrow_header_decode … | tarantool | 2016-12-23T22:59:00Z | 2024-11-21T14:23:01.531112Z |
| pysec-2023-297 |
7.5 (3.1)
|
A path traversal vulnerability has been detected in Repox, which allows an attacker to re… | repox | 2023-12-13T10:15:00Z | 2024-11-21T14:23:00.892241Z |
| pysec-2023-296 |
7.5 (3.1)
|
An XEE vulnerability has been found in Repox, which allows a remote attacker to interfere… | repox | 2023-12-13T10:15:00Z | 2024-11-21T14:23:00.841929Z |
| pysec-2023-295 |
5.4 (3.1)
|
An XSS vulnerability stored in Repox has been identified, which allows a local attacker t… | repox | 2023-12-13T10:15:00Z | 2024-11-21T14:23:00.792103Z |
| pysec-2023-294 |
6.1 (3.1)
|
An XSS vulnerability has been detected in Repox, which allows an attacker to compromise i… | repox | 2023-12-13T10:15:00Z | 2024-11-21T14:23:00.74018Z |
| pysec-2023-293 |
7.5 (3.1)
|
An authentication bypass vulnerability has been found in Repox, which allows a remote use… | repox | 2023-12-13T09:15:00Z | 2024-11-21T14:23:00.689595Z |
| pysec-2022-43164 |
9.8 (3.1)
|
The Rondolu-YT-Concate package in PyPI v0.1.0 was discovered to contain a code execution … | rondolu-yt-concate | 2022-06-24T21:15:00Z | 2024-11-21T14:23:00.996865Z |
| pysec-2022-43161 |
9.8 (3.1)
|
Origin Validation Error in GitHub repository ikus060/rdiffweb prior to 2.5.0a5. | rdiffweb | 2022-10-13T20:15:00+00:00 | 2024-11-21T14:23:00.575892+00:00 |
| pysec-2022-43160 |
9.8 (3.1)
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffwe… | rdiffweb | 2022-10-13T20:15:00+00:00 | 2024-11-21T14:23:00.515460+00:00 |
| pysec-2022-43159 |
9.8 (3.1)
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffwe… | rdiffweb | 2022-10-14T12:15:00+00:00 | 2024-11-21T14:23:00.456366+00:00 |
| pysec-2022-43158 |
6.1 (3.1)
|
Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.0a4. | rdiffweb | 2022-10-10T12:15:00+00:00 | 2024-11-21T14:23:00.394851+00:00 |
| pysec-2022-43157 |
5.3 (3.1)
|
Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.5.0a4. | rdiffweb | 2022-10-06T18:16:00+00:00 | 2024-11-21T14:23:00.333240+00:00 |
| pysec-2022-43156 |
9.8 (3.1)
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffwe… | rdiffweb | 2022-10-06T18:16:00+00:00 | 2024-11-21T14:23:00.273706+00:00 |
| pysec-2022-43155 |
5.5 (3.1)
|
wasm3 commit 7890a2097569fde845881e0b352d813573e371f9 was discovered to contain a segment… | pywasm3 | 2022-12-13T23:15:00Z | 2024-11-21T14:23:00.213494Z |
| pysec-2022-43153 |
5.5 (3.1)
|
Wasm3 0.5.0 has a heap-based buffer overflow in NewCodePage in m3_code.c (called indirect… | pywasm3 | 2022-04-16T16:15:00Z | 2024-11-21T14:23:00.113164Z |
| pysec-2023-292 |
7.8 (3.1)
|
PyInstaller bundles a Python application and all its dependencies into a single package. … | pyinstaller | 2023-12-09T01:15:00+00:00 | 2024-11-21T14:22:59.796437+00:00 |
| pysec-2023-291 |
7.8 (3.1)
|
PyDrive2 is a wrapper library of google-api-python-client that simplifies many common Goo… | pydrive2 | 2023-12-05T21:15:00+00:00 | 2024-11-21T14:22:59.681617+00:00 |
| pysec-2023-290 |
8.8 (3.1)
|
An issue was discovered with assimp 5.1.4, a use after free occurred in function ColladaP… | pyassimp | 2023-01-20T19:15:00Z | 2024-11-21T14:22:59.461917Z |
| pysec-2022-43149 |
6.5 (3.1)
|
Open Asset Import Library (assimp) commit 3c253ca was discovered to contain a segmentatio… | pyassimp | 2022-09-06T23:15:00Z | 2024-11-21T14:22:59.412324Z |
| pysec-2022-43148 |
5.5 (3.1)
|
Open Asset Import Library (aka assimp) 5.1.0 and 5.1.1 has a heap-based buffer overflow i… | pyassimp | 2022-01-01T00:15:00Z | 2024-11-21T14:22:59.35793Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-4232 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.587045Z |
| gsd-2024-4231 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.534700Z |
| gsd-2024-4230 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.587245Z |
| gsd-2024-4229 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.599914Z |
| gsd-2024-4228 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.563352Z |
| gsd-2024-4227 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.624403Z |
| gsd-2024-32946 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:15.595218Z |
| gsd-2018-25102 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:03:04.675370Z |
| gsd-2024-33676 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.297185Z |
| gsd-2024-33675 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.273998Z |
| gsd-2024-33674 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.150702Z |
| gsd-2024-33673 | An issue was discovered in Veritas Backup Exec before 22.2 HotFix 917391. Improper access… | 2024-04-26T05:02:19.162010Z |
| gsd-2024-33672 | An issue was discovered in Veritas NetBackup before 10.4. The Multi-Threaded Agent used i… | 2024-04-26T05:02:19.171109Z |
| gsd-2024-33671 | An issue was discovered in Veritas Backup Exec before 22.2 HotFix 917391. The Backup Exec… | 2024-04-26T05:02:19.236619Z |
| gsd-2024-33670 | Passbolt API before 4.6.2 allows HTML injection in a URL parameter, resulting in custom c… | 2024-04-26T05:02:19.244921Z |
| gsd-2024-33669 | An issue was discovered in Passbolt Browser Extension before 4.6.2. It can send multiple … | 2024-04-26T05:02:19.275535Z |
| gsd-2024-33668 | An issue was discovered in Zammad before 6.3.0. The Zammad Upload Cache uses insecure, pa… | 2024-04-26T05:02:19.281107Z |
| gsd-2024-33667 | An issue was discovered in Zammad before 6.3.0. An authenticated agent could perform a re… | 2024-04-26T05:02:19.258447Z |
| gsd-2024-33666 | An issue was discovered in Zammad before 6.3.0. Users with customer access to a ticket co… | 2024-04-26T05:02:19.293701Z |
| gsd-2024-33665 | ** DISPUTED ** angular-translate through 2.19.1 allows XSS via a crafted key that is used… | 2024-04-26T05:02:19.265097Z |
| gsd-2024-33664 | python-jose through 3.3.0 allows attackers to cause a denial of service (resource consump… | 2024-04-26T05:02:19.131389Z |
| gsd-2024-33663 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.175935Z |
| gsd-2024-33662 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.149532Z |
| gsd-2024-33661 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.254483Z |
| gsd-2024-33660 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.226651Z |
| gsd-2024-33659 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.194728Z |
| gsd-2024-33658 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.225239Z |
| gsd-2024-33657 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.176271Z |
| gsd-2024-33656 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.263057Z |
| gsd-2024-33655 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:19.215383Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2748 | Malicious code in collect-rangers (npm) | 2026-04-16T09:50:10Z | 2026-04-16T09:50:10Z |
| mal-2026-2747 | Malicious code in cloud-run-microservice-template (npm) | 2026-04-16T09:49:59Z | 2026-04-16T09:49:59Z |
| mal-2026-2746 | Malicious code in chainlink-docs (npm) | 2026-04-16T09:49:21Z | 2026-04-16T09:49:21Z |
| mal-2026-2745 | Malicious code in chain-syncora (npm) | 2026-04-16T09:49:19Z | 2026-04-16T09:49:19Z |
| mal-2026-2744 | Malicious code in chain-metrica (npm) | 2026-04-16T09:49:16Z | 2026-04-16T09:49:16Z |
| mal-2026-2743 | Malicious code in chai-use-chain (npm) | 2026-04-16T09:49:12Z | 2026-04-16T09:49:12Z |
| mal-2026-2742 | Malicious code in chai-extensions-extra (npm) | 2026-04-16T09:49:01Z | 2026-04-16T09:49:01Z |
| mal-2026-2741 | Malicious code in chai-chain-coremesh (npm) | 2026-04-16T09:48:58Z | 2026-04-16T09:48:58Z |
| mal-2026-2739 | Malicious code in ccip-starter-kit-hardhat (npm) | 2026-04-16T09:48:16Z | 2026-04-16T09:48:16Z |
| mal-2026-2738 | Malicious code in cardreadermgmtserv (npm) | 2026-04-16T09:48:12Z | 2026-04-16T09:48:12Z |
| mal-2026-2737 | Malicious code in business-data (npm) | 2026-04-16T09:47:39Z | 2026-04-16T09:47:39Z |
| mal-2026-2736 | Malicious code in buildkite-test-collector-vitest-example (npm) | 2026-04-16T09:47:33Z | 2026-04-16T09:47:33Z |
| mal-2026-2735 | Malicious code in buildkite-test-collector-playwright-example (npm) | 2026-04-16T09:47:32Z | 2026-04-16T09:47:32Z |
| mal-2026-2734 | Malicious code in buildkite-test-collector-mocha-example (npm) | 2026-04-16T09:47:30Z | 2026-04-16T09:47:30Z |
| mal-2026-2733 | Malicious code in buildkite-test-collector-jest-example (npm) | 2026-04-16T09:47:28Z | 2026-04-16T09:47:28Z |
| mal-2026-2732 | Malicious code in buildkite-test-collector-jasmine-example (npm) | 2026-04-16T09:47:26Z | 2026-04-16T09:47:26Z |
| mal-2026-2731 | Malicious code in buildkite-test-collector-cypress-example (npm) | 2026-04-16T09:47:24Z | 2026-04-16T09:47:24Z |
| mal-2026-2730 | Malicious code in browserstack-utils (npm) | 2026-04-16T09:47:17Z | 2026-04-16T09:47:17Z |
| mal-2026-2729 | Malicious code in apl-github-test (npm) | 2026-04-16T09:44:48Z | 2026-04-16T09:44:48Z |
| mal-2026-2728 | Malicious code in apl-announcements (npm) | 2026-04-16T09:44:46Z | 2026-04-16T09:44:46Z |
| mal-2026-2727 | Malicious code in agent-starter (npm) | 2026-04-16T09:43:16Z | 2026-04-16T09:43:16Z |
| mal-2026-2726 | Malicious code in agent-scheduler (npm) | 2026-04-16T09:43:13Z | 2026-04-16T09:43:13Z |
| mal-2026-2725 | Malicious code in agent-framework-web (npm) | 2026-04-16T09:43:12Z | 2026-04-16T09:43:12Z |
| mal-2026-2724 | Malicious code in agdebugger-frontend (npm) | 2026-04-16T09:43:10Z | 2026-04-16T09:43:10Z |
| mal-2026-2723 | Malicious code in actions-label-commenter (npm) | 2026-04-16T09:42:56Z | 2026-04-16T09:42:56Z |
| mal-2026-2722 | Malicious code in action-setup-enos (npm) | 2026-04-16T09:42:55Z | 2026-04-16T09:42:55Z |
| mal-2026-2721 | Malicious code in access-worker-test (npm) | 2026-04-16T09:42:49Z | 2026-04-16T09:42:49Z |
| mal-2026-2720 | Malicious code in aca-review-apps (npm) | 2026-04-16T09:42:47Z | 2026-04-16T09:42:47Z |
| mal-2026-2719 | Malicious code in @youcanneverguessthisonereally/test-pkg (npm) | 2026-04-16T09:42:05Z | 2026-04-16T09:42:05Z |
| mal-2026-2718 | Malicious code in @the-coca-cola-company/receipt-scanner-admin-lib (npm) | 2026-04-16T09:39:26Z | 2026-04-16T09:39:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1620 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-07-21T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-1569 | Oracle Java SE: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2025-1389 | Podman: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-24T22:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0441 | OpenClaw: Mehrere Schwachstellen | 2026-02-17T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0424 | OpenClaw: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0535 | Juniper JUNOS Evolved: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-02-25T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0546 | Red Hat Enterprise Linux (Valkey): Mehrere Schwachstellen | 2026-02-26T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0526 | IBM App Connect Enterprise: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0410 | HAProxy Enterprise, Community und ALOHA (QUIC): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-12T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0379 | Intel Prozessoren: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0305 | Red Hat Enterprise Linux (libsoup): Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0234 | OpenSSL: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0080 | Microsoft Azure: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0068 | libpng (API-Funktionen): Mehrere Schwachstellen ermöglichen DoS und Offenlegung von Informationen | 2026-01-12T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0062 | Red Hat Enterprise Linux (libsoup): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und Datenmanipulation | 2026-01-11T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2887 | PHP: Mehrere Schwachstellen | 2025-12-18T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2488 | Red Hat Enterprise Linux (SSSD, libsoup): Mehrere Schwachstellen | 2025-11-04T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2311 | Red Hat Enterprise Linux (libsoup3): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-10-15T22:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-1965 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-09-03T22:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-1417 | Linux Kernel: Mehrere Schwachstellen | 2025-06-29T22:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-1140 | Red Hat Enterprise Linux (libsoup): Mehrere Schwachstellen | 2025-05-25T22:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-0935 | Red Hat Enterprise Linux (libsoup): Mehrere Schwachstellen | 2025-05-04T22:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-0649 | Linux Kernel: Mehrere Schwachstellen | 2025-03-27T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0278 | OpenClaw: Schwachstelle ermöglicht Codeausführung | 2026-02-01T23:00:00.000+00:00 | 2026-03-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2712 | Mattermost: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-01T23:00:00.000+00:00 | 2026-02-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2685 | Mattermost: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-26T23:00:00.000+00:00 | 2026-02-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0331 | BeyondTrust Privileged Remote Access und Remote Support: Schwachstelle ermöglicht Codeausführung | 2026-02-05T23:00:00.000+00:00 | 2026-02-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0496 | Fortinet FortiOS: Mehrere Schwachstellen | 2018-05-22T22:00:00.000+00:00 | 2026-02-24T23:00:00.000+00:00 |
| wid-sec-w-2026-0478 | GIMP: Mehrere Schwachstellen ermöglichen Denial of Service | 2017-12-19T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0448 | Red Hat Enterprise Linux (MUNGE): Schwachstelle ermöglicht Privilegieneskalation | 2026-02-17T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-310-03 | ABB FLXeon Controllers | 2025-11-06T07:00:00.000000Z | 2025-11-06T07:00:00.000000Z |
| icsa-25-310-01 | Advantech DeviceOn/iEdge | 2025-11-06T07:00:00.000000Z | 2025-11-06T07:00:00.000000Z |
| icsa-25-308-05 | IDIS ICM Viewer | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-04 | Radiometrics VizAir | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-03 | Delta Electronics CNCSoft-G2 | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| icsa-25-308-02 | Survision License Plate Recognition Camera | 2025-11-04T07:00:00.000000Z | 2025-11-04T07:00:00.000000Z |
| va-25-304-02 | Restaurant Brands International assistant platform multiple vulnerabilities | 2025-10-31T17:02:13Z | 2025-10-31T17:02:13Z |
| va-25-304-01 | ELOG multiple vulnerabilities | 2025-10-31T16:57:24Z | 2025-10-31T16:57:24Z |
| icsa-25-303-02 | Hitachi Energy TropOS | 2025-10-30T06:00:00.000000Z | 2025-10-30T06:00:00.000000Z |
| icsa-25-282-01 | Hitachi Energy Asset Suite (Update A) | 2025-09-30T08:50:13.000000Z | 2025-10-28T09:50:00.000000Z |
| icsma-25-301-01 | Vertikal Systems Hospital Manager Backend Services | 2025-10-28T06:00:00.000000Z | 2025-10-28T06:00:00.000000Z |
| icsma-25-296-01 | NIHON KOHDEN Central Monitor CNS-6201 | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-04 | Delta Electronics ASDA-Soft | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-03 | Veeder-Root TLS4B Automatic Tank Gauge System | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-02 | ASKI Energy ALS-Mini-S8 and ALS-Mini-S4 | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-01 | AutomationDirect Productivity Suite | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-294-02 | Rockwell Automation Compact GuardLogix 5370 | 2025-10-21T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-294-01 | Rockwell Automation 1783-NATR | 2025-10-21T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-289-02 | Rockwell Automation FactoryTalk Linx | 2025-10-16T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-280-01 | Delta Electronics DIAScreen | 2025-10-07T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| va-25-296-01 | Frontier Airlines website publicly available email address validation | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| icsma-25-294-01 | Oxford Nanopore Technologies MinKNOW | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-06 | Raisecomm RAX701-GC Series | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-05 | CloudEdge Online Cameras and App | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-24-354-07 | Schneider Electric Modicon Controllers (Update A) | 2024-12-19T07:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| va-25-289-01 | OPEXUS FOIAXpress unauthenticated administrator password reset | 2025-10-16T16:43:55Z | 2025-10-16T16:43:55Z |
| icsa-25-289-04 | Rockwell Automation ArmorStart AOP | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-289-03 | Rockwell Automation FactoryTalk ViewPoint | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-289-01 | Rockwell Automation FactoryTalk View Machine Edition and PanelView Plus 7 | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-24-121-01 | Delta Electronics CNCSoft-G2 DOPSoft (Update A) | 2024-04-30T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cucm-xss-svckmmw | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cucm-xss-SVCkMMW | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cmm-info-disc-9zemahga | Cisco Meeting Management Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cmm-info-disc-9ZEMAhGA | Cisco Meeting Management Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ccmp-sxss-qbtdbzdd | Cisco Unified Contact Center Management Portal Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ccmp-sxss-qBTDBZDD | Cisco Unified Contact Center Management Portal Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-backhaul-ap-cmdinj-r7e28ecs | Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-backhaul-ap-cmdinj-R7E28Ecs | Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-3550-acl-bypass-mhskzc2q | Cisco Nexus 3550-F Switches Access Control List Programming Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-3550-acl-bypass-mhskZc2q | Cisco Nexus 3550-F Switches Access Control List Programming Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-asaftd-acl-bypass-vvnlnkqf | Cisco Adaptive Security Appliance and Firepower Threat Defense Software AnyConnect Access Control List Bypass Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-24T21:19:17+00:00 |
| cisco-sa-asaftd-acl-bypass-VvnLNKqf | Cisco Adaptive Security Appliance and Firepower Threat Defense Software AnyConnect Access Control List Bypass Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-24T21:19:17+00:00 |
| cisco-sa-fmc-xss-infodisc-rl4mjfer | Cisco Secure Firewall Management Center Software Cross-Site Scripting and Information Disclosure Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-24T11:52:38+00:00 |
| cisco-sa-ata19x-multi-rdteqrsy | Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities | 2024-10-16T16:00:00+00:00 | 2024-10-24T11:47:37+00:00 |
| cisco-sa-ata19x-multi-RDTEqRsy | Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities | 2024-10-16T16:00:00+00:00 | 2024-10-24T11:47:37+00:00 |
| cisco-sa-snort-rf-bypass-OY8f3pnM | Multiple Cisco Products Snort Rate Filter Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2025-01-13T16:44:31+00:00 |
| cisco-sa-snort-bypass-ptry37fx | Cisco Firepower Threat Defense Software TCP Snort 3 Detection Engine Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-snort-bypass-PTry37fX | Cisco Firepower Threat Defense Software TCP Snort 3 Detection Engine Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-sa-ftd-snort-fw-bcjtzpmu | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services TCP/IP Traffic with Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-sa-ftd-snort-fw-BCJTZPMu | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services TCP/IP Traffic with Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd2100-snort-dos-m9humt75 | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Appliances TCP UDP Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd2100-snort-dos-M9HuMt75 | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Appliances TCP UDP Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-vdb-snort-djj4cnbr | Cisco Firepower Threat Defense Software Vulnerability Database with Snort Detection Engine Security Policy Bypass and Denial of Service Issue | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-vdb-snort-djj4cnbR | Cisco Firepower Threat Defense Software Vulnerability Database with Snort Detection Engine Security Policy Bypass and Denial of Service Issue | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-tls-dos-qxye5ufy | Cisco Firepower Threat Defense Software for Firepower 2100 Series TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-tls-dos-QXYE5Ufy | Cisco Firepower Threat Defense Software for Firepower 2100 Series TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-statcred-dfc8txt5 | Cisco Firepower Threat Defense Software for Firepower 1000, 2100, 3100, and 4200 Series Static Credential Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-statcred-dFC8tXT5 | Cisco Firepower Threat Defense Software for Firepower 1000, 2100, 3100, and 4200 Series Static Credential Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-geoip-bypass-mb4zrdu | Cisco Firepower Threat Defense Software Geolocation ACL Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-geoip-bypass-MB4zRDu | Cisco Firepower Threat Defense Software Geolocation ACL Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-26181 | Microsoft Brokering File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26180 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26179 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26178 | Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26177 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26176 | Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26175 | Windows Boot Manager Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26174 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26173 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26172 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26171 | .NET Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26170 | PowerShell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26169 | Windows Kernel Memory Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26168 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26167 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26166 | Windows Shell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26165 | Windows Shell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26163 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26162 | Windows OLE Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26161 | Windows Sensor Data Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26160 | Remote Desktop Licensing Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26159 | Remote Desktop Licensing Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26156 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26155 | Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26154 | Windows Server Update Service (WSUS) Tampering Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26153 | Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26152 | Microsoft Cryptographic Services Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26151 | Remote Desktop Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26149 | Microsoft Power Apps Security Feature Bypass | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26143 | Microsoft PowerShell Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0230 | Kwetsbaarheid verholpen in Wing FTP Server | 2025-07-14T06:06:24.154078Z | 2025-07-14T06:06:24.154078Z |
| ncsc-2025-0226 | Kwetsbaarheid verholpen in FortiWeb | 2025-07-11T09:57:23.588152Z | 2025-07-11T13:20:55.101692Z |
| ncsc-2025-0229 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2025-07-11T10:01:48.229418Z | 2025-07-11T10:01:48.229418Z |
| ncsc-2025-0228 | Kwetsbaarheden verholpen in Zoom Clients | 2025-07-11T09:58:21.871103Z | 2025-07-11T09:58:21.871103Z |
| ncsc-2025-0227 | Kwetsbaarheid verholpen in Juniper SRX300 Series | 2025-07-11T09:57:40.476096Z | 2025-07-11T09:57:40.476096Z |
| ncsc-2025-0225 | Kwetsbaarheid verholpen in Juniper Networks Security Director | 2025-07-11T09:55:46.934253Z | 2025-07-11T09:55:46.934253Z |
| ncsc-2025-0224 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-07-09T08:57:08.548822Z | 2025-07-09T08:57:08.548822Z |
| ncsc-2025-0223 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-07-09T08:47:38.891072Z | 2025-07-09T08:47:38.891072Z |
| ncsc-2025-0222 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-07-09T08:41:53.656736Z | 2025-07-09T08:41:53.656736Z |
| ncsc-2025-0221 | Kwetsbaarheden verholpen in Schneider Electric EcoStruxture IT Datacenter Expert | 2025-07-09T08:38:05.336146Z | 2025-07-09T08:38:05.336146Z |
| ncsc-2025-0220 | Kwetsbaarheden verholpen in Palo Alto PAN-OS | 2025-07-09T08:33:14.284978Z | 2025-07-09T08:33:14.284978Z |
| ncsc-2025-0219 | Kwetsbaarheden verholpen in SAP producten | 2025-07-09T08:29:00.474865Z | 2025-07-09T08:29:00.474865Z |
| ncsc-2025-0218 | Kwetsbaarheden verholpen in Microsoft Edge (Chromium based) | 2025-07-08T18:26:55.812717Z | 2025-07-08T18:26:55.812717Z |
| ncsc-2025-0217 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-07-08T18:26:14.881161Z | 2025-07-08T18:26:14.881161Z |
| ncsc-2025-0216 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-07-08T18:25:40.909948Z | 2025-07-08T18:25:40.909948Z |
| ncsc-2025-0214 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-07-08T18:24:14.065296Z | 2025-07-08T18:24:14.065296Z |
| ncsc-2025-0213 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-07-08T18:23:09.960791Z | 2025-07-08T18:23:09.960791Z |
| ncsc-2025-0212 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-07-08T12:03:17.100858Z | 2025-07-08T12:03:17.100858Z |
| ncsc-2025-0211 | Kwetsbaarheden verholpen in Siemens producten | 2025-07-08T11:58:23.712452Z | 2025-07-08T11:58:23.712452Z |
| ncsc-2025-0210 | Kwetsbaarheid verholpen in Cisco Unified Communications Manager | 2025-07-03T07:43:27.075341Z | 2025-07-03T07:43:27.075341Z |
| ncsc-2025-0209 | Kwetsbaarheid verholpen in Google Chrome | 2025-07-01T15:56:24.236216Z | 2025-07-01T15:56:24.236216Z |
| ncsc-2025-0208 | Kwetsbaarheden verholpen in Adobe Commerce | 2025-06-30T12:59:12.105658Z | 2025-06-30T12:59:12.105658Z |
| ncsc-2025-0207 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2025-06-30T12:58:32.421661Z | 2025-06-30T12:58:32.421661Z |
| ncsc-2025-0206 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-06-30T12:57:43.622242Z | 2025-06-30T12:57:43.622242Z |
| ncsc-2025-0205 | Kwetsbaarheid verholpen in IBM WebSphere Application Server | 2025-06-26T12:32:54.177712Z | 2025-06-26T12:32:54.177712Z |
| ncsc-2025-0203 | Kwetsbaarheid verholpen in Citrix NetScaler ADC en NetScaler Gateway | 2025-06-25T14:54:38.413413Z | 2025-06-25T14:54:38.413413Z |
| ncsc-2025-0202 | Kwetsbaarheden verholpen in IBM InfoSphere Information Server | 2025-06-22T08:19:47.485567Z | 2025-06-22T08:19:47.485567Z |
| ncsc-2025-0201 | Kwetsbaarheid verholpen in IBM Spectrum Protect Server | 2025-06-22T08:17:03.146698Z | 2025-06-22T08:17:03.146698Z |
| ncsc-2025-0200 | Kwetsbaarheden verholpen in IBM QRadar SIEM | 2025-06-20T11:04:50.445218Z | 2025-06-20T11:04:50.445218Z |
| ncsc-2025-0199 | Kwetsbaarheid verholpen in Cisco AnyConnect VPN voor Meraki MX en Z | 2025-06-19T08:42:22.673078Z | 2025-06-19T08:42:22.673078Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10338-1 | ruby4.0-rubygem-actionpack-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10337-1 | ruby4.0-rubygem-actionmailer-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10336-1 | ruby4.0-rubygem-actionmailbox-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10335-1 | ruby4.0-rubygem-actioncable-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10334-1 | python311-pypdf-6.8.0-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10333-1 | python311-multipart-1.3.1-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10332-1 | python311-PyPDF2-2.11.1-7.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10331-1 | mingw64-binutils-2.45.1-2.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10330-1 | mingw32-binutils-2.45.1-2.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10329-1 | kubelogin-0.2.16-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10328-1 | himmelblau-2.3.8+git0.dec3693-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10327-1 | heroic-games-launcher-2.20.1-3.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10326-1 | giflib-devel-32bit-5.2.2-3.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10325-1 | clamav-1.5.2-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10324-1 | MozillaFirefox-148.0.2-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:20361-1 | Security update for osc, obs-scm-bridge | 2026-03-12T20:54:40Z | 2026-03-12T20:54:40Z |
| opensuse-su-2026:20351-1 | Security update for amazon-ssm-agent | 2026-03-12T13:46:52Z | 2026-03-12T13:46:52Z |
| opensuse-su-2026:20350-1 | Security update for tomcat | 2026-03-12T13:46:00Z | 2026-03-12T13:46:00Z |
| opensuse-su-2026:20348-1 | Security update for python-PyPDF2 | 2026-03-11T20:15:02Z | 2026-03-11T20:15:02Z |
| opensuse-su-2026:20345-1 | Security update for python-lxml_html_clean | 2026-03-11T18:05:18Z | 2026-03-11T18:05:18Z |
| opensuse-su-2026:20342-1 | Security update for go1.26 | 2026-03-11T09:09:25Z | 2026-03-11T09:09:25Z |
| opensuse-su-2026:20341-1 | Security update for kea | 2026-03-11T08:51:21Z | 2026-03-11T08:51:21Z |
| opensuse-su-2026:20340-1 | Security update for cJSON | 2026-03-11T08:21:26Z | 2026-03-11T08:21:26Z |
| opensuse-su-2026:20339-1 | Security update for freerdp | 2026-03-10T12:34:56Z | 2026-03-10T12:34:56Z |
| opensuse-su-2026:10323-1 | traefik-3.6.10-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10322-1 | python311-lxml_html_clean-0.4.4-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10321-1 | python311-PyPDF2-2.11.1-6.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10320-1 | perl-Compress-Raw-Zlib-2.222-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10319-1 | helm3-3.20.0-2.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10318-1 | helm-4.1.1-3.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3471 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:35:05+00:00 | 2026-04-20T03:33:18+00:00 |
| rhsa-2026:3469 | Red Hat Security Advisory: golang security update | 2026-03-02T01:34:30+00:00 | 2026-04-20T03:33:18+00:00 |
| rhsa-2026:3470 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:22:15+00:00 | 2026-04-20T03:33:17+00:00 |
| rhsa-2026:3468 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:25:20+00:00 | 2026-04-20T03:33:16+00:00 |
| rhsa-2026:3459 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.9.0 release | 2026-02-26T19:58:40+00:00 | 2026-04-20T03:33:15+00:00 |
| rhsa-2026:3427 | Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.9.0 release | 2026-02-26T11:02:21+00:00 | 2026-04-20T03:33:15+00:00 |
| rhsa-2026:3416 | Red Hat Security Advisory: OpenShift Container Platform 4.17.50 packages and security update | 2026-03-04T09:07:15+00:00 | 2026-04-20T03:33:14+00:00 |
| rhsa-2026:3391 | Red Hat Security Advisory: OpenShift Container Platform 4.19.25 packages and security update | 2026-03-04T15:54:04+00:00 | 2026-04-20T03:33:14+00:00 |
| rhsa-2026:3343 | Red Hat Security Advisory: skopeo security update | 2026-02-25T11:50:40+00:00 | 2026-04-20T03:33:13+00:00 |
| rhsa-2026:3341 | Red Hat Security Advisory: containernetworking-plugins security update | 2026-02-25T12:14:45+00:00 | 2026-04-20T03:33:13+00:00 |
| rhsa-2026:3340 | Red Hat Security Advisory: skopeo security update | 2026-02-25T12:16:20+00:00 | 2026-04-20T03:33:13+00:00 |
| rhsa-2026:3337 | Red Hat Security Advisory: podman security update | 2026-02-25T11:48:26+00:00 | 2026-04-20T03:33:12+00:00 |
| rhsa-2026:3336 | Red Hat Security Advisory: podman security update | 2026-02-25T11:30:01+00:00 | 2026-04-20T03:33:12+00:00 |
| rhsa-2026:3298 | Red Hat Security Advisory: buildah security update | 2026-02-25T09:32:15+00:00 | 2026-04-20T03:33:12+00:00 |
| rhsa-2026:3297 | Red Hat Security Advisory: buildah security update | 2026-02-25T09:09:30+00:00 | 2026-04-20T03:33:11+00:00 |
| rhsa-2026:3291 | Red Hat Security Advisory: runc security update | 2026-02-25T07:41:04+00:00 | 2026-04-20T03:33:11+00:00 |
| rhsa-2026:3193 | Red Hat Security Advisory: golang security update | 2026-02-24T12:01:01+00:00 | 2026-04-20T03:33:10+00:00 |
| rhsa-2026:3192 | Red Hat Security Advisory: golang security update | 2026-02-24T12:06:46+00:00 | 2026-04-20T03:33:09+00:00 |
| rhsa-2026:3188 | Red Hat Security Advisory: grafana security update | 2026-02-24T11:39:36+00:00 | 2026-04-20T03:33:09+00:00 |
| rhsa-2026:3187 | Red Hat Security Advisory: grafana-pcp security update | 2026-02-24T11:39:51+00:00 | 2026-04-20T03:33:09+00:00 |
| rhsa-2026:3186 | Red Hat Security Advisory: Red Hat build of Cryostat 4.1.1: new RHEL 9 container image security update | 2026-02-26T02:56:36+00:00 | 2026-04-20T03:33:08+00:00 |
| rhsa-2026:3184 | Red Hat Security Advisory: RHTAS - Tech Preview Release Of the Policy Controller Operator | 2026-02-24T09:58:16+00:00 | 2026-04-20T03:33:08+00:00 |
| rhsa-2026:3092 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-02-23T15:34:28+00:00 | 2026-04-20T03:33:08+00:00 |
| rhsa-2026:3089 | Red Hat Security Advisory: Red Hat Developer Hub 1.8.4 release. | 2026-02-23T14:46:08+00:00 | 2026-04-20T03:33:07+00:00 |
| rhsa-2026:3040 | Red Hat Security Advisory: grafana-pcp security update | 2026-02-23T02:14:35+00:00 | 2026-04-20T03:33:07+00:00 |
| rhsa-2026:3035 | Red Hat Security Advisory: grafana-pcp security update | 2026-02-23T01:30:21+00:00 | 2026-04-20T03:33:06+00:00 |
| rhsa-2026:2920 | Red Hat Security Advisory: grafana security update | 2026-02-18T12:55:46+00:00 | 2026-04-20T03:33:06+00:00 |
| rhsa-2026:2709 | Red Hat Security Advisory: golang security update | 2026-02-16T10:32:31+00:00 | 2026-04-20T03:33:05+00:00 |
| rhsa-2026:2914 | Red Hat Security Advisory: grafana security update | 2026-02-18T11:31:17+00:00 | 2026-04-20T03:33:04+00:00 |
| rhsa-2026:2844 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.26.1 Release. | 2026-02-17T18:20:32+00:00 | 2026-04-20T03:33:03+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-097786 | SSA-097786: Insertion of Sensitive Information into Log File Vulnerability in SINUMERIK systems | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-088132 | SSA-088132: Denial of Service Vulnerability in the OPC UA Server Implementations of Several Industrial Products | 2024-07-09T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-857368 | SSA-857368: Multiple Vulnerabilities in Omnivise T3000 | 2024-08-02T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-856475 | SSA-856475: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-813746 | SSA-813746: BadAlloc Vulnerabilities in SCALANCE X-200, X-200IRT, and X-300 Switch Families | 2023-04-11T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-784301 | SSA-784301: Multiple Vulnerabilities in SINEC NMS Before V3.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-771940 | SSA-771940: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-06-11T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-722010 | SSA-722010: Datalogics File Parsing Vulnerability in Teamcenter Visualization and JT2Go | 2024-07-09T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-720392 | SSA-720392: Multiple Vulnerabilities in Third-Party Components in Location Intelligence Before V4.4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-716317 | SSA-716317: Multiple Vulnerability in SINEC Traffic Analyzer Before V2.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-659443 | SSA-659443: Local Code Execution Vulnerabilities in COMOS Before V10.5 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-640968 | SSA-640968: Untrusted Search Path Vulnerability in TIA Project-Server formerly known as TIA Multiuser Server | 2023-02-14T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-625850 | SSA-625850: Multiple WIBU Systems CodeMeter Vulnerabilities Affecting the Desigo CC Product Family and SENTRON powermanager | 2023-11-14T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-417547 | SSA-417547: Multiple Vulnerabilities in INTRALOG WMS Before V4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-407785 | SSA-407785: Multiple X_T File Parsing Vulnerabilities in Parasolid and Teamcenter Visualization | 2023-08-08T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-357412 | SSA-357412: PRT File Parsing Vulnerability in NX Before V2406.3000 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-180704 | SSA-180704: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.0 | 2023-12-12T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-116924 | SSA-116924: Path Traversal Vulnerability in TIA Portal | 2023-04-11T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-087301 | SSA-087301: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.1 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-068047 | SSA-068047: Multiple Vulnerabilities in SCALANCE M-800 Family Before V7.2.2 | 2023-12-12T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-071402 | SSA-071402: Multiple Vulnerabilities in SICAM Products | 2024-07-22T00:00:00Z | 2024-07-22T00:00:00Z |
| ssa-998949 | SSA-998949: Hard-coded Default Encryption Key in Mendix Encryption Module V10.0.0 and V10.0.1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-928781 | SSA-928781: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 HF1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-868282 | SSA-868282: Multiple Vulnerabilities in SINEMA Remote Connect Client before V3.2 HF1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-825651 | SSA-825651: Deserialization Vulnerability in SIMATIC STEP 7 (TIA Portal) before V18 Update 2 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-824889 | SSA-824889: XML File Parsing Vulnerabilities in JT Open and PLM XML SDK | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-780073 | SSA-780073: Denial of Service Vulnerability in PROFINET Devices via DCE-RPC Packets | 2020-02-11T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-779936 | SSA-779936: Catalog-Profile Deserialization Vulnerability in Siemens Engineering Platforms before V19 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-750274 | SSA-750274: Impact of CVE-2024-3400 on RUGGEDCOM APE1808 devices configured with Palo Alto Networks Virtual NGFW | 2024-04-19T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-484086 | SSA-484086: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.1 | 2022-06-14T00:00:00Z | 2024-07-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1166-1 | Security update for expat | 2026-04-02T01:08:26Z | 2026-04-02T01:08:26Z |
| suse-su-2026:20993-1 | Security update for perl-XML-Parser | 2026-04-01T16:24:24Z | 2026-04-01T16:24:24Z |
| suse-su-2026:20992-1 | Security update for python-Pillow | 2026-04-01T14:58:21Z | 2026-04-01T14:58:21Z |
| suse-su-2026:1165-1 | Security update for freerdp | 2026-04-01T13:40:57Z | 2026-04-01T13:40:57Z |
| suse-su-2026:1164-1 | Security update for freerdp2 | 2026-04-01T13:40:49Z | 2026-04-01T13:40:49Z |
| suse-su-2026:20960-1 | Security update for python-pyOpenSSL | 2026-04-01T10:05:58Z | 2026-04-01T10:05:58Z |
| suse-su-2026:20959-1 | Security update for tar | 2026-04-01T10:05:58Z | 2026-04-01T10:05:58Z |
| suse-su-2026:20955-1 | Security update for tar | 2026-04-01T09:39:25Z | 2026-04-01T09:39:25Z |
| suse-su-2026:20954-1 | Security update for python-pyOpenSSL | 2026-04-01T09:35:43Z | 2026-04-01T09:35:43Z |
| suse-su-2026:20989-1 | Security update for kea | 2026-04-01T09:22:53Z | 2026-04-01T09:22:53Z |
| suse-fu-2026:20990-1 | Feature update for himmelblau | 2026-04-01T09:19:25Z | 2026-04-01T09:19:25Z |
| suse-su-2026:1163-1 | Security update for MozillaThunderbird | 2026-04-01T08:49:11Z | 2026-04-01T08:49:11Z |
| suse-su-2026:1162-1 | Security update for python-tornado | 2026-03-31T22:02:18Z | 2026-03-31T22:02:18Z |
| suse-su-2026:1160-1 | Security update for freerdp | 2026-03-31T15:03:59Z | 2026-03-31T15:03:59Z |
| suse-su-2026:1159-1 | Security update for expat | 2026-03-31T15:03:48Z | 2026-03-31T15:03:48Z |
| suse-su-2026:1158-1 | Security update for python-pyasn1 | 2026-03-31T11:55:53Z | 2026-03-31T11:55:53Z |
| suse-su-2026:20951-1 | Security update for python311 | 2026-03-31T09:13:02Z | 2026-03-31T09:13:02Z |
| suse-su-2026:20988-1 | Security update for gnome-online-accounts, gvfs | 2026-03-31T09:08:21Z | 2026-03-31T09:08:21Z |
| suse-su-2026:20956-1 | Security update for python311 | 2026-03-31T09:07:43Z | 2026-03-31T09:07:43Z |
| suse-su-2026:1154-1 | Security update for libjxl | 2026-03-31T09:04:47Z | 2026-03-31T09:04:47Z |
| suse-su-2026:0227-2 | Security update for net-snmp | 2026-03-31T08:48:04Z | 2026-03-31T08:48:04Z |
| suse-su-2026:1153-1 | Security update for perl-XML-Parser | 2026-03-31T08:40:07Z | 2026-03-31T08:40:07Z |
| suse-su-2026:1152-1 | Security update for perl-XML-Parser | 2026-03-31T08:28:50Z | 2026-03-31T08:28:50Z |
| suse-su-2026:1150-1 | Security update for webkit2gtk3 | 2026-03-30T17:34:50Z | 2026-03-30T17:34:50Z |
| suse-su-2026:20986-1 | Security update for postgresql13 | 2026-03-30T15:24:20Z | 2026-03-30T15:24:20Z |
| suse-su-2026:20985-1 | Security update for expat | 2026-03-30T15:01:10Z | 2026-03-30T15:01:10Z |
| suse-su-2026:20963-1 | Security update for expat | 2026-03-30T15:01:10Z | 2026-03-30T15:01:10Z |
| suse-su-2026:20984-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20968-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20962-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:2286 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-09T12:36:11Z |
| alsa-2026:2264 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-09T11:47:42Z |
| alsa-2026:2271 | Important: firefox security update | 2026-02-09T00:00:00Z | 2026-02-09T11:39:07Z |
| alsa-2026:2215 | Important: libsoup security update | 2026-02-09T00:00:00Z | 2026-02-09T11:36:21Z |
| alsa-2026:2124 | Important: osbuild-composer security update | 2026-02-05T00:00:00Z | 2026-02-09T11:33:23Z |
| alsa-2026:2039 | Important: fontforge security update | 2026-02-05T00:00:00Z | 2026-02-06T21:29:46Z |
| alsa-2026:1831 | Moderate: qemu-kvm security update | 2026-02-03T00:00:00Z | 2026-02-06T17:34:44Z |
| alsa-2026:1837 | Moderate: osbuild-composer security update | 2026-02-03T00:00:00Z | 2026-02-06T17:33:01Z |
| alsa-2026:2182 | Important: libsoup3 security update | 2026-02-05T00:00:00Z | 2026-02-06T17:31:52Z |
| alsa-2026:1842 | Important: nodejs24 security update | 2026-02-03T00:00:00Z | 2026-02-06T17:30:17Z |
| alsa-2026:1843 | Important: nodejs22 security update | 2026-02-03T00:00:00Z | 2026-02-06T17:27:45Z |
| alsa-2026:2081 | Important: freerdp security update | 2026-02-05T00:00:00Z | 2026-02-06T08:53:33Z |
| alsa-2026:2090 | Important: python3.12-wheel security update | 2026-02-05T00:00:00Z | 2026-02-06T08:49:17Z |
| alsa-2026:2128 | Moderate: python3 security update | 2026-02-05T00:00:00Z | 2026-02-06T08:39:22Z |
| alsa-2026:1617 | Moderate: kernel security update | 2026-02-02T00:00:00Z | 2026-02-06T08:24:53Z |
| alsa-2026:2042 | Important: brotli security update | 2026-02-05T00:00:00Z | 2026-02-05T12:08:23Z |
| alsa-2026:1690 | Important: kernel security update | 2026-02-02T00:00:00Z | 2026-02-05T09:56:48Z |
| alsa-2026:1902 | Important: python-wheel security update | 2026-02-04T00:00:00Z | 2026-02-05T09:52:44Z |
| alsa-2026:1825 | Moderate: curl security update | 2026-02-03T00:00:00Z | 2026-02-05T09:50:43Z |
| alsa-2026:1828 | Moderate: python3.12 security update | 2026-02-03T00:00:00Z | 2026-02-05T09:48:47Z |
| alsa-2026:1696 | Moderate: util-linux security update | 2026-02-02T00:00:00Z | 2026-02-03T11:05:12Z |
| alsa-2026:1715 | Important: golang-github-openprinting-ipp-usb security update | 2026-02-02T00:00:00Z | 2026-02-03T11:03:28Z |
| alsa-2026:1714 | Moderate: wireshark security update | 2026-02-02T00:00:00Z | 2026-02-03T11:02:21Z |
| alsa-2026:1662 | Moderate: kernel security update | 2026-02-02T00:00:00Z | 2026-02-02T13:45:57Z |
| alsa-2026:1661 | Moderate: kernel-rt security update | 2026-02-02T00:00:00Z | 2026-02-02T13:40:07Z |
| alsa-2026:1631 | Moderate: python3 security update | 2026-02-02T00:00:00Z | 2026-02-02T12:08:18Z |
| alsa-2026:1592 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T11:56:57Z |
| alsa-2026:1178 | Moderate: kernel security update | 2026-01-26T00:00:00Z | 2026-02-02T11:36:10Z |
| alsa-2026:1239 | Important: fence-agents security update | 2026-01-26T00:00:00Z | 2026-02-02T11:30:59Z |
| alsa-2026:1359 | Moderate: gcc-toolset-15-binutils security update | 2026-01-27T00:00:00Z | 2026-02-02T11:23:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-788 | Heap-buffer-overflow in int arrow::bit_util::BitReader::GetBatch<int> | 2025-09-28T00:00:36.076414Z | 2025-10-10T14:35:28.235525Z |
| osv-2025-827 | Global-buffer-overflow in void jxl::N_SSE4::WriteToOutputStage::StoreUnsignedRow<unsigned char> | 2025-10-10T00:09:16.816189Z | 2025-10-10T00:09:16.816846Z |
| osv-2025-825 | UNKNOWN WRITE in RescalerImportRowExpand_SSE2 | 2025-10-09T00:14:42.650822Z | 2025-10-09T00:14:42.651395Z |
| osv-2025-824 | Use-of-uninitialized-value in JS_DefineProperty | 2025-10-08T00:04:16.630040Z | 2025-10-08T00:04:16.630688Z |
| osv-2025-819 | Use-of-uninitialized-value in HasAlpha32b_SSE2 | 2025-10-07T00:04:07.544365Z | 2025-10-07T00:04:07.544831Z |
| osv-2025-809 | Use-of-uninitialized-value in WebPCleanupTransparentArea | 2025-10-05T00:04:29.576718Z | 2025-10-05T00:04:29.577250Z |
| osv-2025-808 | Use-of-uninitialized-value in WebPMultRow_C | 2025-10-04T00:07:11.139186Z | 2025-10-04T00:07:11.139704Z |
| osv-2025-803 | Global-buffer-overflow in icaltime_day_of_year | 2025-10-02T00:11:54.061581Z | 2025-10-02T00:11:54.061989Z |
| osv-2025-797 | Heap-buffer-overflow in ProcessRows | 2025-09-30T00:07:53.914184Z | 2025-09-30T00:07:53.914578Z |
| osv-2025-796 | Heap-buffer-overflow in AddGreenToBlueAndRed_AVX2 | 2025-09-30T00:07:08.673173Z | 2025-09-30T00:07:08.673608Z |
| osv-2025-793 | Heap-use-after-free in parse_from_header | 2025-09-29T00:08:32.876425Z | 2025-09-29T00:08:32.876798Z |
| osv-2024-370 | Heap-buffer-overflow in H5O__chunk_protect | 2024-04-30T00:08:00.120801Z | 2025-09-27T15:27:53.336806Z |
| osv-2025-787 | Heap-buffer-overflow in DwaCompressor_uncompress | 2025-09-27T00:18:30.312049Z | 2025-09-27T00:18:30.312655Z |
| osv-2022-795 | UNKNOWN READ in pcl::PLYReader::read | 2022-08-28T00:00:11.408403Z | 2025-09-26T14:12:06.751834Z |
| osv-2025-783 | Heap-buffer-overflow in inspect_process | 2025-09-26T00:06:21.859576Z | 2025-09-26T00:06:21.859964Z |
| osv-2025-262 | UNKNOWN WRITE in _lou_handlePassVariableAction | 2025-04-07T00:02:21.621602Z | 2025-09-25T14:33:42.888095Z |
| osv-2025-290 | Heap-buffer-overflow in pcpp::TelnetLayer::toString | 2025-04-19T00:05:45.140280Z | 2025-09-25T14:31:44.695948Z |
| osv-2024-86 | Security exception in org.threeten.bp.format.DateTimeFormatterBuilder$CompositePrinterParser.parse | 2024-02-09T00:00:11.154046Z | 2025-09-25T14:31:01.295253Z |
| osv-2024-171 | Security exception in org.threeten.bp.format.DateTimeFormatterBuilder$CompositePrinterParser.parse | 2024-03-15T00:08:01.855772Z | 2025-09-25T14:28:39.920838Z |
| osv-2024-184 | Security exception in org.threeten.bp.format.DateTimeFormatterBuilder$CompositePrinterParser.parse | 2024-03-21T00:13:27.175097Z | 2025-09-25T14:28:31.599671Z |
| osv-2018-6 | Use-of-uninitialized-value in DosSlashToUnix | 2021-01-13T00:00:02.571744Z | 2025-09-25T14:18:29.826514Z |
| osv-2018-204 | UNKNOWN WRITE in __msan_memcpy.part.51 | 2021-01-13T00:01:23.035709Z | 2025-09-25T14:18:29.315747Z |
| osv-2025-424 | UNKNOWN READ in RDKit::RDValue::destroy | 2025-06-03T00:12:35.236863Z | 2025-09-24T14:19:44.921114Z |
| osv-2025-447 | Use-of-uninitialized-value in spvtools::EmitNumericLiteral | 2025-06-09T00:05:11.128452Z | 2025-09-24T14:18:33.220549Z |
| osv-2025-767 | UNKNOWN READ in dcd_int_handler | 2025-09-20T00:19:20.851166Z | 2025-09-20T00:19:20.851464Z |
| osv-2025-766 | Heap-buffer-overflow in Open | 2025-09-20T00:18:10.380843Z | 2025-09-20T00:18:10.381141Z |
| osv-2025-765 | Security exception in com.spotify.docker.client.shaded.com.fasterxml.jackson.databind.util.TokenBuffer | 2025-09-20T00:18:07.994839Z | 2025-09-20T00:18:07.995257Z |
| osv-2025-764 | Global-buffer-overflow in Ogg_CreateES | 2025-09-20T00:15:54.584666Z | 2025-09-20T00:15:54.585041Z |
| osv-2025-762 | Use-of-uninitialized-value in fuzzer_send | 2025-09-19T00:14:45.258709Z | 2025-09-19T00:14:45.259063Z |
| osv-2025-742 | Null-dereference READ in ubsan_GetStackTrace | 2025-09-14T00:15:42.184140Z | 2025-09-14T00:15:42.184553Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0104 | `unic-ucd-segment` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0103 | `unic-ucd-core` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0102 | `unic-ucd-age` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0101 | `unic-ucd-common` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0100 | `unic-ucd-ident` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0099 | `unic-ucd-block` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0098 | `unic-ucd-version` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0097 | `unic-idna-mapping` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0096 | `unic-bidi` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0095 | `unic` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0094 | `unic-ucd-category` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0093 | `unic-char-basics` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0092 | `unic-ucd-case` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0091 | `unic-utils` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0090 | `unic-emoji-char` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0089 | `unic-ucd-name_aliases` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0088 | `unic-idna-punycode` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0087 | `unic-cli` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0086 | `unic-char` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0085 | `unic-idna` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0084 | `unic-emoji` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0083 | `unic-ucd-bidi` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0082 | `unic-normal` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0081 | `unic-char-property` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0080 | `unic-common` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0079 | `unic-ucd-hangul` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0078 | `unic-ucd-normal` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0077 | `unic-ucd` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0076 | `unic-ucd-name` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0074 | `unic-segment` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-valkey-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:19:55.260Z | 2026-03-21T09:12:01.983Z |
| bit-redis-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:18:53.323Z | 2026-03-21T09:12:01.983Z |
| bit-keydb-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:12:52.562Z | 2026-03-21T09:12:01.983Z |
| bit-tomcat-2025-55752 | Apache Tomcat: Directory traversal via rewrite with possible RCE if PUT is enabled | 2025-11-06T13:00:31.694Z | 2026-03-20T13:43:29.174Z |
| bit-tomcat-2025-49125 | Apache Tomcat: Security constraint bypass for pre/post-resources | 2025-07-10T10:47:18.953Z | 2026-03-20T13:43:29.174Z |
| bit-tomcat-2025-24813 | Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT | 2025-07-10T10:46:47.051Z | 2026-03-20T13:43:29.174Z |
| bit-tomcat-2025-53506 | Apache Tomcat: DoS via excessive h2 streams at connection start | 2025-07-16T08:19:04.361Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2025-49124 | Apache Tomcat: exe side-loading via icalcs.exe in Tomcat installer for Windows | 2025-06-20T06:04:24.795Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2025-31651 | Apache Tomcat: Bypass of rules in Rewrite Valve | 2025-07-10T10:46:54.240Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-56337 | Apache Tomcat: RCE due to TOCTOU issue in JSP compilation - CVE-2024-50379 mitigation was incomplete | 2025-07-10T10:46:39.151Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-52317 | Apache Tomcat: Request/response mix-up with HTTP/2 | 2024-11-20T07:20:06.896Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-52316 | Apache Tomcat: Authentication bypass when using Jakarta Authentication API | 2025-07-10T10:46:05.150Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-38286 | Apache Tomcat: Denial of Service | 2024-11-09T07:20:25.873Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-34750 | Apache Tomcat: HTTP/2 excess header handling DoS | 2025-07-29T14:30:29.115Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-24549 | Apache Tomcat: HTTP/2 header handling DoS | 2025-07-17T08:09:49.355Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-21733 | Apache Tomcat: Leaking of unrelated request bodies in default error page | 2024-03-06T11:07:26.980Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-46589 | Apache Tomcat: HTTP request smuggling via malformed trailer headers | 2024-03-06T11:07:35.204Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-45648 | Apache Tomcat: Trailer header parsing too lenient | 2024-03-06T11:07:43.292Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-42795 | Apache Tomcat: Failure during request clean-up leads to sensitive data leaking to subsequent requests | 2024-03-06T11:08:01.506Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-41080 | Apache Tomcat: Open redirect with FORM authentication | 2024-03-06T11:08:22.964Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-33163 | Parse Server leaks protected fields via LiveQuery afterEvent trigger | 2026-03-20T11:37:51.448Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-33042 | Parse Server affected by empty authData bypassing credential requirement on signup | 2026-03-20T11:37:48.161Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32944 | Parse Server crash via deeply nested query condition operators | 2026-03-20T11:37:45.054Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32943 | Parse Server has a password reset token single-use bypass via concurrent requests | 2026-03-20T11:37:41.707Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32886 | Parse Server's Cloud function dispatch crashes server via prototype chain traversal | 2026-03-20T11:37:38.226Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32878 | Parse Server vulnerable to schema poisoning via prototype pollution in deep copy | 2026-03-20T11:37:35.433Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32770 | Parse Server: LiveQuery subscription with invalid regular expression crashes server | 2026-03-20T11:37:32.539Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32742 | Parse Server session creation endpoint allows overwriting server-generated session fields | 2026-03-20T11:37:29.063Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32728 | Parse Server has a stored XSS filter bypass via Content-Type MIME parameter and missing XML extension blocklist entries | 2026-03-20T11:37:25.520Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2026-24733 | Apache Tomcat: Security constraint bypass with HTTP/0.9 | 2026-02-20T09:52:58.708Z | 2026-03-20T09:47:33.381Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-jk38734 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121 applied in versions: 1.80.1-r1 | 2026-04-01T10:02:16.597211Z | 2026-03-10T06:53:47Z |
| cleanstart-2026-al75891 | Security fixes for CVE-2026-24051, ghsa-9h8m-3fm2-qjrq applied in versions: 1.19.2-r0 | 2026-04-01T10:02:21.610635Z | 2026-03-10T06:30:49Z |
| cleanstart-2026-ds01292 | Security fixes for CVE-2025-47910, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-27141, ghsa-9h8m-3fm2-qjrq applied in versions: 1.19.1-r0, 1.19.2-r0, 1.19.2-r1 | 2026-04-01T10:03:13.135534Z | 2026-03-10T06:29:01Z |
| cleanstart-2026-jo97977 | Security fixes for ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T10:02:43.649563Z | 2026-03-10T06:18:32Z |
| cleanstart-2026-fo41609 | Security fixes for CVE-2025-48924, ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j288-q9x7-2f5v, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 8.19.12-r0, 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T10:02:50.908381Z | 2026-03-10T06:14:42Z |
| cleanstart-2026-fz71456 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.18-r0 | 2026-04-01T10:02:32.121585Z | 2026-03-10T06:07:45Z |
| cleanstart-2026-df22934 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, ghsa-6v2p-p543-phr9, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-q754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-qxp5-gwg8-xv66, ghsa-v778-237x-gjrc, ghsa-vvgc-356p-c3xw applied in versions: 0.28.0-r0, 0.28.0-r1 | 2026-04-01T10:03:39.072806Z | 2026-03-09T13:31:49Z |
| cleanstart-2026-ew27017 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.10.0-r0, 1.10.0-r1 | 2026-04-01T10:03:13.124366Z | 2026-03-09T13:26:38Z |
| cleanstart-2026-zv38826 | Within HostnameError | 2026-03-10T01:00:05.764793Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-xh31600 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:58:05.974960Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ra63757 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:56:05.142237Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-qk48981 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:00:35.988532Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-oh74241 | Security fixes for GHSA-MQQF-5WVP-8FH8 applied in versions: 0.122-r0 | 2026-03-10T00:58:07.551022Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-od98869 | Within HostnameError | 2026-03-10T00:59:05.580952Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-mo83449 | Within HostnameError | 2026-03-10T00:59:35.550450Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-jz91219 | Within HostnameError | 2026-03-10T00:59:35.590693Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ir62391 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:48:33.059735Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-gj95666 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:04:41.222114Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-dt66006 | Within HostnameError | 2026-03-10T00:58:35.493841Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-av02020 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:58:05.928030Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-af35851 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:02:37.708854Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ab04032 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-10T00:58:35.570783Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ff20499 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0 | 2026-04-01T10:04:06.598747Z | 2026-03-09T11:52:12Z |
| cleanstart-2026-bf73214 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.17-r0 | 2026-04-01T10:03:56.655073Z | 2026-03-07T09:14:49Z |
| cleanstart-2026-ar56257 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.16-r0 | 2026-04-01T10:03:58.074474Z | 2026-03-07T09:14:16Z |
| cleanstart-2026-jr53141 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:46.660054Z | 2026-03-07T09:11:28Z |
| cleanstart-2026-lu31244 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:46.726872Z | 2026-03-07T09:10:59Z |
| cleanstart-2026-pr27884 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:52.407214Z | 2026-03-07T09:10:08Z |
| cleanstart-2026-qx99194 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:06:00.100216Z | 2026-03-07T09:08:53Z |
| cleanstart-2026-qy24299 | @octokit/endpoint turns REST API endpoints into generic request options | 2026-03-07T00:39:47.646997Z | 2026-03-06T13:08:41Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2017-ALE-004 | Vulnérabilité dans Apache Struts | 2017-03-10T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| certfr-2017-ale-007 | Vulnérabilité dans Microsoft Office | 2017-04-10T00:00:00.000000 | 2017-04-12T00:00:00.000000 |
| CERTFR-2017-ALE-007 | Vulnérabilité dans Microsoft Office | 2017-04-10T00:00:00.000000 | 2017-04-12T00:00:00.000000 |
| certfr-2017-ale-006 | Multiples vulnérabilités dans SCADA Siemens RUGGEDCOM ROX I | 2017-03-29T00:00:00.000000 | 2017-03-29T00:00:00.000000 |
| CERTFR-2017-ALE-006 | Multiples vulnérabilités dans SCADA Siemens RUGGEDCOM ROX I | 2017-03-29T00:00:00.000000 | 2017-03-29T00:00:00.000000 |
| certfr-2017-ale-003 | Vulnérabilité dans les navigateurs Microsoft | 2017-02-27T00:00:00.000000 | 2017-03-15T00:00:00.000000 |
| certfr-2017-ale-002 | Vulnérabilité dans Microsoft Windows | 2017-02-20T00:00:00.000000 | 2017-03-15T00:00:00.000000 |
| CERTFR-2017-ALE-003 | Vulnérabilité dans les navigateurs Microsoft | 2017-02-27T00:00:00.000000 | 2017-03-15T00:00:00.000000 |
| CERTFR-2017-ALE-002 | Vulnérabilité dans Microsoft Windows | 2017-02-20T00:00:00.000000 | 2017-03-15T00:00:00.000000 |
| certfr-2017-ale-001 | Vulnérabilité dans Cisco WebEx | 2017-01-25T00:00:00.000000 | 2017-01-31T00:00:00.000000 |
| CERTFR-2017-ALE-001 | Vulnérabilité dans Cisco WebEx | 2017-01-25T00:00:00.000000 | 2017-01-31T00:00:00.000000 |
| certfr-2016-ale-009 | Campagne d'attaque contre des routeurs DSL | 2016-12-01T00:00:00.000000 | 2017-01-26T00:00:00.000000 |
| CERTFR-2016-ALE-009 | Campagne d'attaque contre des routeurs DSL | 2016-12-01T00:00:00.000000 | 2017-01-26T00:00:00.000000 |
| certfr-2016-ale-010 | Vulnérabilité dans les routeurs Netgear | 2016-12-13T00:00:00.000000 | 2016-12-26T00:00:00.000000 |
| CERTFR-2016-ALE-010 | Vulnérabilité dans les routeurs Netgear | 2016-12-13T00:00:00.000000 | 2016-12-26T00:00:00.000000 |
| certfr-2016-ale-006 | Campagne de messages électroniques non sollicités de type Zepto/Odin | 2016-09-05T00:00:00.000000 | 2016-11-17T00:00:00.000000 |
| CERTFR-2016-ALE-006 | Campagne de messages électroniques non sollicités de type Zepto/Odin | 2016-09-05T00:00:00.000000 | 2016-11-17T00:00:00.000000 |
| certfr-2016-ale-008 | Vulnérabilité dans Microsoft Windows | 2016-11-02T00:00:00.000000 | 2016-11-09T00:00:00.000000 |
| CERTFR-2016-ALE-008 | Vulnérabilité dans Microsoft Windows | 2016-11-02T00:00:00.000000 | 2016-11-09T00:00:00.000000 |
| certfr-2016-ale-007 | Vulnérabilité dans Cisco IOS, IOS XE et IOS XR | 2016-09-19T00:00:00.000000 | 2016-09-19T00:00:00.000000 |
| CERTFR-2016-ALE-007 | Vulnérabilité dans Cisco IOS, IOS XE et IOS XR | 2016-09-19T00:00:00.000000 | 2016-09-19T00:00:00.000000 |
| certfr-2016-ale-005 | Multiples vulnérabilités dans les pare-feux Cisco | 2016-08-18T00:00:00.000000 | 2016-09-05T00:00:00.000000 |
| CERTFR-2016-ALE-005 | Multiples vulnérabilités dans les pare-feux Cisco | 2016-08-18T00:00:00.000000 | 2016-09-05T00:00:00.000000 |
| certfr-2015-ale-013 | Vulnérabilité dans Joomla! | 2015-12-14T00:00:00.000000 | 2016-08-01T00:00:00.000000 |
| CERTFR-2015-ALE-013 | Vulnérabilité dans Joomla! | 2015-12-14T00:00:00.000000 | 2016-08-01T00:00:00.000000 |
| certfr-2016-ale-004 | Vulnérabilité dans Adobe Flash Player | 2016-06-15T00:00:00.000000 | 2016-06-16T00:00:00.000000 |
| CERTFR-2016-ALE-004 | Vulnérabilité dans Adobe Flash Player | 2016-06-15T00:00:00.000000 | 2016-06-16T00:00:00.000000 |
| certfr-2016-ale-003 | Vulnérabilité dans Adobe Flash Player | 2016-05-11T00:00:00.000000 | 2016-05-12T00:00:00.000000 |
| CERTFR-2016-ALE-003 | Vulnérabilité dans Adobe Flash Player | 2016-05-11T00:00:00.000000 | 2016-05-12T00:00:00.000000 |
| certfr-2015-ale-014 | Vulnérabilité dans Juniper ScreenOS | 2015-12-18T00:00:00.000000 | 2016-04-11T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0162 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0161 | Vulnérabilité dans Tenable Nessus Agent | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0144 | Multiples vulnérabilités dans Ivanti Endpoint Manager | 2026-02-11T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0162 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0161 | Vulnérabilité dans Tenable Nessus Agent | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0144 | Multiples vulnérabilités dans Ivanti Endpoint Manager | 2026-02-11T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0160 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0159 | Multiples vulnérabilités dans Keycloak | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0158 | Multiples vulnérabilités dans les produits Apple | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0157 | Multiples vulnérabilités dans les produits Qnap | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0156 | Multiples vulnérabilités dans Google Chrome | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0154 | Vulnérabilité dans Traefik | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0160 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0159 | Multiples vulnérabilités dans Keycloak | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0158 | Multiples vulnérabilités dans les produits Apple | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0157 | Multiples vulnérabilités dans les produits Qnap | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0156 | Multiples vulnérabilités dans Google Chrome | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0155 | Multiples vulnérabilités dans SPIP | 2026-02-12T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| CERTFR-2026-AVI-0154 | Vulnérabilité dans Traefik | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-003025 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2024-03-27T14:26+09:00 | 2024-11-27T14:34+09:00 |
| jvndb-2024-012461 | Multiple vulnerabilities in SoftBank Mesh Wi-Fi router RP562B | 2024-11-13T14:26+09:00 | 2024-11-26T16:11+09:00 |
| jvndb-2024-000020 | Multiple vulnerabilities in ELECOM wireless LAN routers and wireless LAN repeater | 2024-02-20T14:14+09:00 | 2024-11-26T15:26+09:00 |
| jvndb-2024-000088 | Multiple vulnerabilities in ELECOM wireless LAN routers and access points | 2024-08-27T14:40+09:00 | 2024-11-26T15:17+09:00 |
| jvndb-2024-000121 | WordPress Plugin "WP Admin UI Customize" vulnerable to cross-site scripting | 2024-11-26T13:57+09:00 | 2024-11-26T13:57+09:00 |
| jvndb-2024-000106 | Multiple vulnerabilities in AIPHONE IX SYSTEM, IXG SYSTEM, and System Support Software | 2024-10-21T11:58+09:00 | 2024-11-21T11:37+09:00 |
| jvndb-2024-000120 | "Kura Sushi Official App Produced by EPARK" for Android uses a hard-coded cryptographic key | 2024-11-20T13:56+09:00 | 2024-11-20T13:56+09:00 |
| jvndb-2024-000119 | Multiple vulnerabilities in FitNesse | 2024-11-15T13:37+09:00 | 2024-11-20T11:18+09:00 |
| jvndb-2024-012941 | Multiple vulnerabilities in Rakuten Turbo 5G | 2024-11-19T10:41+09:00 | 2024-11-19T10:41+09:00 |
| jvndb-2024-000118 | WordPress Plugin "VK All in One Expansion Unit" vulnerable to cross-site scripting | 2024-11-13T13:50+09:00 | 2024-11-13T13:50+09:00 |
| jvndb-2024-009481 | Insecure initial password configuration issue in SEIKO EPSON Web Config | 2024-10-01T14:14+09:00 | 2024-11-12T10:25+09:00 |
| jvndb-2024-000109 | baserCMS plugin "BurgerEditor" vulnerable to directory listing | 2024-10-10T14:57+09:00 | 2024-11-06T14:45+09:00 |
| jvndb-2024-012017 | Trend Micro Deep Security 20 Agent for Windows vulnerable to improper access control | 2024-11-06T11:00+09:00 | 2024-11-06T11:00+09:00 |
| jvndb-2024-011833 | Incorrect authorization vulnerability in OMRON Sysmac Studio | 2024-11-05T15:29+09:00 | 2024-11-05T15:29+09:00 |
| jvndb-2024-011747 | Command injection vulnerability in Trend Micro Cloud Edge | 2024-11-01T14:28+09:00 | 2024-11-01T14:28+09:00 |
| jvndb-2024-011744 | REST-APIs unintentionally enabled in Century Systems FutureNet NXR series routers | 2024-11-01T13:49+09:00 | 2024-11-01T13:49+09:00 |
| jvndb-2024-000116 | Hikvision network camera security enhancement to prevent cleartext transmission of Dynamic DNS credentials | 2024-10-30T15:07+09:00 | 2024-10-30T15:07+09:00 |
| jvndb-2024-011256 | Multiple vulnerabilities in Sharp and Toshiba Tec MFPs | 2024-10-28T17:33+09:00 | 2024-10-28T17:33+09:00 |
| jvndb-2024-000115 | Chatwork Desktop Application (Windows) uses a potentially dangerous function | 2024-10-28T14:29+09:00 | 2024-10-28T14:29+09:00 |
| jvndb-2024-000112 | MUSASI version 3 performing authentication on client-side | 2024-10-18T14:40+09:00 | 2024-10-25T16:55+09:00 |
| jvndb-2024-000113 | N-LINE vulnerable to HTML injection | 2024-10-18T14:48+09:00 | 2024-10-25T16:48+09:00 |
| jvndb-2024-004623 | Multiple products from Check Point Software Technologies vulnerable to information disclosure | 2024-07-29T10:23+09:00 | 2024-10-24T16:37+09:00 |
| jvndb-2024-000111 | SHIRASAGI vulnerable to path traversal | 2024-10-16T14:12+09:00 | 2024-10-23T17:35+09:00 |
| jvndb-2024-010802 | Multiple SQL injection vulnerabilities in Trend Micro Deep Discovery Inspector | 2024-10-22T13:02+09:00 | 2024-10-22T13:02+09:00 |
| jvndb-2024-000102 | Multiple NTT EAST Home GateWay/Hikari Denwa routers fail to restrict access permissions | 2024-09-24T16:00+09:00 | 2024-10-18T11:02+09:00 |
| jvndb-2024-000110 | Multiple vulnerabilities in Exment | 2024-10-11T14:13+09:00 | 2024-10-11T14:13+09:00 |
| jvndb-2024-000104 | MF Teacher Performance Management System vulnerable to cross-site scripting | 2024-09-27T15:00+09:00 | 2024-10-10T11:14+09:00 |
| jvndb-2024-009667 | Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software | 2024-10-03T13:42+09:00 | 2024-10-03T13:42+09:00 |
| jvndb-2024-000108 | Apache Tomcat improper handling of TLS handshake process data | 2024-10-01T17:51+09:00 | 2024-10-01T17:51+09:00 |
| jvndb-2024-009498 | Vulnerability in Cosminexus | 2024-10-01T16:01+09:00 | 2024-10-01T16:01+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15153 | HCL AION存在未明漏洞(CNVD-2026-15153) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15152 | OpenClaw拒绝服务漏洞(CNVD-2026-15152) | 2026-03-26 | 2026-03-27 |
| cnvd-2026-15151 | HCL AION存在未明漏洞(CNVD-2026-15151) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15150 | HCL AION存在未明漏洞(CNVD-2026-15150) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15149 | HCL AION存在未明漏洞(CNVD-2026-15149) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15148 | HCL AION存在未明漏洞(CNVD-2026-15148) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15147 | HCL AION存在未明漏洞(CNVD-2026-15147) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15146 | HCL AION SQL注入漏洞(CNVD-2026-15146) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15145 | HCL AION信息泄露漏洞(CNVD-2026-15145) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15251 | ZTE MF258K Pro配置缺陷漏洞 | 2026-01-19 | 2026-03-26 |
| cnvd-2026-15061 | OpenClaw操作系统命令注入漏洞 | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15060 | OpenClaw操作系统命令注入漏洞(CNVD-2026-15060) | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15059 | OpenClaw操作系统命令注入漏洞(CNVD-2026-15059) | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15058 | OpenClaw命令注入漏洞(CNVD-2026-15058) | 2026-03-26 | 2026-03-26 |
| cnvd-2026-15057 | OpenClaw加密问题漏洞(CNVD-2026-15057) | 2026-03-26 | 2026-03-26 |
| cnvd-2026-14995 | Apple macOS Tahoe信息泄露漏洞(CNVD-2026-14995) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14994 | Apple macOS Tahoe信息泄露漏洞(CNVD-2026-14994) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14975 | Apple macOS越界读取漏洞(CNVD-2026-14975) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14974 | Apple macOS信息泄露漏洞(CNVD-2026-14974) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14973 | Apple macOS Tahoe权限提升漏洞 | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14972 | Chamilo import.php文件操作系统命令注入漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14971 | Chamilo editinstance.php文件操作系统命令注入漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14970 | Chamilo CSV文件名跨站脚本漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14969 | WordPress插件WpEvently信息泄露漏洞 | 2026-03-19 | 2026-03-26 |
| cnvd-2026-14968 | WordPress插件wpDiscuz信息泄露漏洞 | 2026-03-19 | 2026-03-26 |
| cnvd-2026-15250 | Huawei HarmonyOS证书管理模块数据处理漏洞 | 2026-03-12 | 2026-03-25 |
| cnvd-2026-14861 | OpenClaw后置链接漏洞(CNVD-2026-14861) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14860 | OpenClaw代码问题漏洞(CNVD-2026-14860) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14859 | OpenClaw后置链接漏洞(CNVD-2026-14859) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14858 | OpenClaw后置链接漏洞(CNVD-2026-14858) | 2026-03-24 | 2026-03-25 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-13477 | Уязвимость функции build_sit_entries операционной системы Linux, позволяющая нарушителю в… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13475 | Уязвимость функции jffs2_link_node_ref операционной системы Linux, позволяющая нарушителю… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13471 | Уязвимость функции qlen_notify() компонента sched ядра операционных систем Linux, позволя… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13467 | Уязвимость функции uart_register_driver ядра операционной системы Linux, позволяющая нару… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13466 | Уязвимость функции load_global_roots_objectid ядра операционной системы Linux, позволяюща… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13465 | Уязвимость функции wcd9335_parse_dt ядра операционной системы Linux, позволяющая нарушите… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13463 | Уязвимость функции jffs2_prealloc_raw_node_refs ядра операционной системы Linux, позволяю… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13459 | Уязвимость компонента net ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13456 | Уязвимость функции aoedev_downdev ядра операционной системы Linux, позволяющая нарушителю… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13454 | Уязвимость функции adxl_put ядра операционной системы Linux, позволяющая нарушителю оказ… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13449 | Уязвимость функции smc_ib_is_sg_need_sync() ядра операционной системы Linux, позволяющая … | 28.10.2025 | 16.02.2026 |
| bdu:2025-13446 | Уязвимость функции tee_shm_put() ядра операционной системы Linux, позволяющая нарушителю … | 28.10.2025 | 16.02.2026 |
| bdu:2025-13413 | Уязвимость функции setupLookaside() системы управления базами данных SQLite, позволяющая … | 28.10.2025 | 16.02.2026 |
| bdu:2025-13243 | Уязвимость функции _bfd_elf_parse_eh_frame() программного средства разработки GNU Binutil… | 22.10.2025 | 16.02.2026 |
| bdu:2025-13169 | Уязвимость серверного программного обеспечения HAProxy, связанная с алгоритмической сложн… | 21.10.2025 | 16.02.2026 |
| bdu:2025-13037 | Уязвимость реализации сервера разрешения имён WINS пакета программ сетевого взаимодействи… | 17.10.2025 | 16.02.2026 |
| bdu:2025-12988 | Уязвимость функции recvmsg() ядра операционной системы Linux, позволяющая нарушителю вызв… | 16.10.2025 | 16.02.2026 |
| bdu:2025-12912 | Уязвимость файлового архиватора 7-Zip, связанная с неверным определением символических сс… | 15.10.2025 | 16.02.2026 |
| bdu:2025-12910 | Уязвимость файлового архиватора 7-Zip, связанная с неверным определением символических сс… | 15.10.2025 | 16.02.2026 |
| bdu:2025-12887 | Уязвимость компонента HTTP Client API криптографической библиотеки OpenSSL, позволяющая н… | 14.10.2025 | 16.02.2026 |
| bdu:2025-12885 | Уязвимость компонента FIPS Module криптографической библиотеки OpenSSL, позволяющая наруш… | 14.10.2025 | 16.02.2026 |
| bdu:2025-12884 | Уязвимость компонента ssh средства криптографической защиты OpenSSH, позволяющая нарушите… | 14.10.2025 | 16.02.2026 |
| bdu:2025-12705 | Уязвимость функции l2cap_connect() модуля net/bluetooth/l2cap_core.c ядра операционной си… | 10.10.2025 | 16.02.2026 |
| bdu:2025-12599 | Уязвимость утилиты командной строки cURL, связанная с чтением данных за границами буфера … | 08.10.2025 | 16.02.2026 |
| bdu:2025-12566 | Уязвимость компонента ProxyCommand средства криптографической защиты OpenSSH, позволяющая… | 08.10.2025 | 16.02.2026 |
| bdu:2025-12556 | Уязвимость функции tls_rx_msg_size() компонента tls ядра операционной системы Linux, позв… | 07.10.2025 | 16.02.2026 |
| bdu:2025-12484 | Уязвимость компонента t2.c библиотеки для кодирования и декодирования изображений OpenJPE… | 06.10.2025 | 16.02.2026 |
| bdu:2025-12482 | Уязвимость функции pci_bus_release_domain_nr() ядра операционной системы Linux, позволяющ… | 06.10.2025 | 16.02.2026 |
| bdu:2025-12470 | Уязвимость компонента tiffcmp библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в … | 06.10.2025 | 16.02.2026 |
| bdu:2025-12374 | Уязвимость функций urllib.parse.urlsplit() и urlparse() интерпретатора языка программиров… | 29.09.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201804-1225 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:48:34.131000Z |
| var-200906-0603 | Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possi… | 2024-07-23T21:48:33.753000Z |
| var-202204-0596 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle … | 2024-07-23T21:48:32.252000Z |
| var-202109-1789 | When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data usi… | 2024-07-23T21:48:32.869000Z |
| var-200102-0075 | IPSwitch IMail 6.0.5 allows remote attackers to cause a denial of service using the SMTP … | 2024-07-23T21:48:08.812000Z |
| var-201211-0367 | Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on … | 2024-07-23T21:48:07.636000Z |
| var-201108-0285 | Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allow… | 2024-07-23T21:47:36.928000Z |
| var-200505-0193 | Buffer overflow in the Netinfo Setup Tool (NeST) allows local users to execute arbitrary … | 2024-07-23T21:47:36.724000Z |
| var-202110-1705 | The Snappy frame decoder function doesn't restrict the chunk length which may lead to exc… | 2024-07-23T21:46:59.236000Z |
| var-201506-0265 | Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x… | 2024-07-23T21:46:59.847000Z |
| var-202203-0111 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:46:58.879000Z |
| var-201201-0170 | Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK i… | 2024-07-23T21:46:58.960000Z |
| var-201611-0348 | named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-… | 2024-07-23T21:46:27.318000Z |
| var-200609-1376 | The Security Framework in Apple Mac OS X 10.3.x up to 10.3.9 does not properly prioritize… | 2024-07-23T21:46:26.250000Z |
| var-201903-0441 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:46:20.783000Z |
| var-202210-1526 | The issue was addressed with improved UI handling. This issue is fixed in tvOS 16.1, macO… | 2024-07-23T21:46:13.464000Z |
| var-201606-0135 | The XML parser in Expat does not use sufficient entropy for hash initialization, which al… | 2024-07-23T21:46:12.300000Z |
| var-201210-0053 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:46:11.539000Z |
| var-201605-0464 | Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlPars… | 2024-07-23T21:45:39.491000Z |
| var-201006-1131 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2024-07-23T21:45:38.565000Z |
| var-200804-0039 | Integer overflow in the PCRE regular expression compiler (JavaScriptCore/pcre/pcre_compil… | 2024-07-23T21:45:07.043000Z |
| var-201204-0084 | Use-after-free vulnerability in the HTMLMediaElement implementation in Google Chrome befo… | 2024-07-23T21:45:06.885000Z |
| var-200102-0028 | The Cisco Web Management interface in routers running CBOS 2.4.1 and earlier does not log… | 2024-07-23T21:45:05.204000Z |
| var-201504-0060 | The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows… | 2024-07-23T21:45:04.448000Z |
| var-202203-0043 | A flaw was found in the way the "flags" member of the new pipe buffer structure was lacki… | 2024-07-23T21:45:03.589000Z |
| var-201111-0222 | FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arb… | 2024-07-23T21:45:03.152000Z |
| var-201904-0981 | SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow … | 2024-07-23T21:45:01.742000Z |
| var-201808-1004 | Bluetooth firmware or operating system software drivers in macOS versions before 10.13, H… | 2024-07-23T21:45:01.058000Z |
| var-200512-0633 | passwd in Directory Services in Mac OS X 10.3.x before 10.3.9 and 10.4.x before 10.4.5 al… | 2024-07-23T21:45:01.566000Z |
| var-202208-2263 | When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies … | 2024-07-23T21:44:51.339000Z |