Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-7603 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JeecgBoot LoadFile Endpoint FileDownloadUtils.jav chec… |
n/a |
JeecgBoot |
2026-05-02T04:15:11.675Z | 2026-05-02T04:15:11.675Z |
| CVE-2024-2279 |
8.7 (3.1)
|
Improper Neutralization of Input During Web Page Gener… |
GitLab |
GitLab |
2024-04-12T00:53:21.240Z | 2026-05-02T04:05:37.944Z |
| CVE-2023-5061 |
4.3 (3.1)
|
Missing Authorization in GitLab |
GitLab |
GitLab |
2023-12-15T16:03:05.257Z | 2026-05-02T04:05:18.070Z |
| CVE-2023-5009 |
9.6 (3.1)
|
Incorrect Authorization in GitLab |
GitLab |
GitLab |
2023-09-19T07:01:14.930Z | 2026-05-02T04:05:13.152Z |
| CVE-2026-27830 |
8.9 (4.0)
|
c3p0 vulnerable to Remote Code Execution via unsafe de… |
swaldman |
c3p0 |
2026-02-26T00:45:18.222Z | 2026-05-02T03:55:33.776Z |
| CVE-2026-35243 |
7.8 (3.1)
|
Vulnerability in the Oracle Application Developme… |
Oracle Corporation |
Oracle Application Development Framework (ADF) |
2026-04-21T20:35:50.273Z | 2026-05-02T03:55:32.455Z |
| CVE-2026-2311 |
6.4 (3.1)
|
IBM i is affected by a privilege escalation vulnerabil… |
IBM |
i |
2026-04-30T21:45:08.343Z | 2026-05-02T03:55:31.329Z |
| CVE-2026-5405 |
7.8 (3.1)
|
Heap-based Buffer Overflow in Wireshark |
Wireshark Foundation |
Wireshark |
2026-04-30T23:03:53.654Z | 2026-05-02T03:55:30.220Z |
| CVE-2026-5656 |
7 (3.1)
|
Improper Limitation of a Pathname to a Restricted Dire… |
Wireshark Foundation |
Wireshark |
2026-04-30T23:03:58.516Z | 2026-05-02T03:55:29.128Z |
| CVE-2026-5403 |
7.8 (3.1)
|
Heap-based Buffer Overflow in Wireshark |
Wireshark Foundation |
Wireshark |
2026-04-30T23:04:03.523Z | 2026-05-02T03:55:27.939Z |
| CVE-2026-42778 |
9.8 (3.1)
|
Apache MINA: CWE-502 Deserialization of Untrusted Data… |
Apache Software Foundation |
Apache MINA |
2026-05-01T10:01:10.081Z | 2026-05-02T03:55:26.868Z |
| CVE-2026-42779 |
9.8 (3.1)
|
Apache MINA: AbstractIoBuffer.resolveClass() null-claz… |
Apache Software Foundation |
Apache MINA |
2026-05-01T10:00:43.712Z | 2026-05-02T03:55:25.715Z |
| CVE-2026-6543 |
8.8 (3.1)
|
Authenticated Remote Code Execution Vulnerability in L… |
IBM |
Langflow Desktop |
2026-04-30T21:11:54.483Z | 2026-05-02T03:55:24.549Z |
| CVE-2026-6378 |
6.4 (3.1)
|
Maxi Blocks <= 2.1.9 - Authenticated (Author+) Stored … |
ckp267 |
MaxiBlocks Builder | 17,000+ Design Assets, Patterns, Icons & Starter Sites |
2026-05-02T03:36:42.285Z | 2026-05-02T03:36:42.285Z |
| CVE-2026-7596 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
nextlevelbuilder ui-ux-pro-max-skill Slide Generator g… |
nextlevelbuilder |
ui-ux-pro-max-skill |
2026-05-01T21:00:19.576Z | 2026-05-02T01:23:29.311Z |
| CVE-2026-7600 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
ArtMin96 yii2-mcp-server MCP index.ts yii_execute_comm… |
ArtMin96 |
yii2-mcp-server |
2026-05-02T00:15:11.779Z | 2026-05-02T00:15:11.779Z |
| CVE-2026-42996 |
10 (4.0)
|
JS8Call through 2.3.1 and JS8Call-improved before… |
JS8Call |
JS8Call |
2026-05-01T06:42:58.858Z | 2026-05-01T22:10:45.285Z |
| CVE-2026-7599 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Dayoooun hwpx-mcp MCP index.ts export_to_html path traversal |
Dayoooun |
hwpx-mcp |
2026-05-01T21:45:12.296Z | 2026-05-01T21:45:12.296Z |
| CVE-2026-7590 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
eyal-gor p_69_branch_monkey_mcp Preview Endpoint advan… |
eyal-gor |
p_69_branch_monkey_mcp |
2026-05-01T18:45:13.771Z | 2026-05-01T21:31:33.190Z |
| CVE-2026-7583 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS BSF context.c bsf_sess_find_by_ipv6prefix deni… |
n/a |
Open5GS |
2026-05-01T14:45:10.344Z | 2026-05-01T21:30:21.958Z |
| CVE-2026-7555 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Electronic Judging System login.php sql i… |
itsourcecode |
Electronic Judging System |
2026-05-01T05:45:10.962Z | 2026-05-01T21:29:37.197Z |
| CVE-2026-7546 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink NR1800X lighttpd find_host_ip stack-based overflow |
Totolink |
NR1800X |
2026-05-01T02:15:12.350Z | 2026-05-01T21:28:56.710Z |
| CVE-2026-7518 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open5GS AMF SBI Endpoint sdmsubscription-notify amf_na… |
n/a |
Open5GS |
2026-05-01T00:30:11.710Z | 2026-05-01T21:25:39.233Z |
| CVE-2026-7505 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
nextlevelbuilder GoClaw/GoClaw Lite RPC improper autho… |
nextlevelbuilder |
GoClaw |
2026-04-30T22:00:16.529Z | 2026-05-01T21:24:33.058Z |
| CVE-2026-7551 |
8.7 (4.0)
8.8 (3.1)
|
HKUDS OpenHarness Remote Command Execution via /bridge… |
HKUDS |
OpenHarness |
2026-04-30T21:29:17.362Z | 2026-05-01T21:21:41.898Z |
| CVE-2026-35051 |
7.8 (4.0)
|
Traefik: ForwardAuth trustForwardHeader=false allows s… |
traefik |
traefik |
2026-04-30T20:26:06.716Z | 2026-05-01T21:20:11.714Z |
| CVE-2026-7597 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
mem0ai mem0 faiss.py pickle.dump deserialization |
mem0ai |
mem0 |
2026-05-01T21:15:11.399Z | 2026-05-01T21:15:11.399Z |
| CVE-2026-2625 |
4 (3.1)
|
Rust-rpm-sequoia: rust-rpm-sequoia: denial of service … |
Red Hat |
Red Hat Hardened Images |
2026-04-03T18:38:09.601Z | 2026-05-01T21:13:18.195Z |
| CVE-2025-12993 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-67968. Reason: This candidate is a reservation duplicate of CVE-2025-67968. Notes: All CVE users should reference CVE-2025-67968 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-05-01T20:53:33.161Z | |
| CVE-2026-7595 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
nextlevelbuilder ui-ux-pro-max-skill Tailwind Config G… |
nextlevelbuilder |
ui-ux-pro-max-skill |
2026-05-01T20:45:10.767Z | 2026-05-01T20:45:10.767Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-37552 |
8.4 (3.1)
|
Unsafe deserialization vulnerability in MixPHP Fr… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-01T19:45:48.969Z |
| CVE-2026-37537 |
8.1 (3.1)
|
collin80/Open-SAE-J1939 thru commit 744024d4306bc… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-01T19:44:56.296Z |
| CVE-2026-37536 |
8.8 (3.1)
|
miaofng/uds-c commit e506334e270d77b20c0bc259ac6c… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-01T19:45:05.053Z |
| CVE-2026-37535 |
7.1 (3.1)
|
openxc/isotp-c thru commit 5a5d19245f651892027193… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-01T19:45:11.301Z |
| CVE-2026-37534 |
9.8 (3.1)
|
Integer underflow vulnerability in Open-SAE-J1939… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-01T19:06:00.671Z |
| CVE-2026-37532 |
7.1 (3.1)
|
AGL agl-service-can-low-level thru 17.1.12 contai… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-01T19:45:17.749Z |
| CVE-2026-37531 |
9.8 (3.1)
|
AGL app-framework-main thru 17.1.12 contains a Zi… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-01T19:45:23.782Z |
| CVE-2026-37526 |
7.8 (3.1)
|
AGL app-framework-binder (afb-daemon) through v19… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-01T19:45:29.901Z |
| CVE-2026-37525 |
7.8 (3.1)
|
AGL app-framework-binder (afb-daemon) through v19… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-01T19:45:35.959Z |
| CVE-2026-37505 |
4.9 (3.1)
|
SQL Injection via ORDER BY clause in V2Board thru… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-01T19:45:55.307Z |
| CVE-2026-37504 |
5.3 (3.1)
|
Sensitive server_token exposed via GET parameter … |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-01T19:46:01.535Z |
| CVE-2026-37503 |
6.9 (3.1)
|
Cross-Site Scripting (XSS) in V2Board thru 1.7.4.… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-01T19:46:08.026Z |
| CVE-2026-22167 |
7.8 (3.1)
|
GPU DDK - Cache resident PM buffers writable by other … |
Imagination Technologies |
Graphics DDK |
2026-05-01T15:48:49.520Z | 2026-05-01T19:16:56.328Z |
| CVE-2026-22166 |
8.1 (3.1)
|
GPU DDK - Write UAF in KEGLGetPoolBuffers, WebGL reachable |
Imagination Technologies |
Graphics DDK |
2026-05-01T15:59:56.871Z | 2026-05-01T19:19:02.700Z |
| CVE-2026-22165 |
8.1 (3.1)
|
GPU DDK - UAF read of GLES3Context::psDrawParams and G… |
Imagination Technologies |
Graphics DDK |
2026-05-01T15:56:17.132Z | 2026-05-01T19:24:51.079Z |
| CVE-2025-8903 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-2052. Reason: This candidate is a reservation duplicate of CVE-2026-2052 Notes: All CVE users should reference CVE-2026-2052 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-05-01T19:20:35.765Z | |
| CVE-2026-41353 |
7.6 (4.0)
8.1 (3.1)
|
OpenClaw < 2026.3.22 - allowProfiles Bypass via Profil… |
OpenClaw |
OpenClaw |
2026-04-23T21:58:13.070Z | 2026-04-25T01:37:01.016Z |
| CVE-2026-34764 |
2.3 (3.1)
|
Electron has a use-after-free in offscreen shared text… |
electron |
electron |
2026-04-06T15:46:40.189Z | 2026-04-07T16:00:32.633Z |
| CVE-2026-34444 |
7.9 (4.0)
|
Lupa has a Sandbox escape and RCE due to incomplete at… |
scoder |
lupa |
2026-04-06T15:30:30.525Z | 2026-04-06T18:37:15.583Z |
| CVE-2026-5673 |
5.6 (3.1)
|
Libtheora: libtheora: denial of service or information… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-06T09:22:36.227Z | 2026-05-01T20:03:09.519Z |
| CVE-2026-2311 |
6.4 (3.1)
|
IBM i is affected by a privilege escalation vulnerabil… |
IBM |
i |
2026-04-30T21:45:08.343Z | 2026-05-02T03:55:31.329Z |
| CVE-2026-6539 |
4.6 (4.0)
4.4 (3.1)
|
Notepad++ 8.9.3 Format String Injection via nativeLang.xml |
Notepad++ |
Notepad++ |
2026-04-30T20:31:54.961Z | 2026-05-01T14:21:46.872Z |
| CVE-2026-3184 |
3.7 (3.1)
|
Util-linux: util-linux: access control bypass due to i… |
Red Hat |
Red Hat Hardened Images |
2026-04-03T18:43:45.725Z | 2026-05-01T19:33:12.808Z |
| CVE-2026-6526 |
5.5 (3.1)
|
NULL Pointer Dereference in Wireshark |
Wireshark Foundation |
Wireshark |
2026-04-30T05:34:29.214Z | 2026-04-30T15:19:46.683Z |
| CVE-2026-6527 |
5.5 (3.1)
|
Uncontrolled Recursion in Wireshark |
Wireshark Foundation |
Wireshark |
2026-04-30T05:35:29.246Z | 2026-04-30T15:19:37.482Z |
| CVE-2026-6528 |
5.5 (3.1)
|
Loop with Unreachable Exit Condition ('Infinite Loop')… |
Wireshark Foundation |
Wireshark |
2026-04-30T05:36:04.243Z | 2026-04-30T15:19:29.664Z |
| CVE-2026-6529 |
5.5 (3.1)
|
Heap-based Buffer Overflow in Wireshark |
Wireshark Foundation |
Wireshark |
2026-04-30T05:36:14.210Z | 2026-04-30T15:19:22.354Z |
| CVE-2026-6530 |
5.5 (3.1)
|
Heap-based Buffer Overflow in Wireshark |
Wireshark Foundation |
Wireshark |
2026-04-30T05:36:24.210Z | 2026-04-30T13:14:06.742Z |
| CVE-2026-5409 |
5.5 (3.1)
|
Uncontrolled Recursion in Wireshark |
Wireshark Foundation |
Wireshark |
2026-04-30T05:41:19.212Z | 2026-04-30T12:58:18.159Z |
| CVE-2026-6521 |
5.5 (3.1)
|
Loop with Unreachable Exit Condition ('Infinite Loop')… |
Wireshark Foundation |
Wireshark |
2026-04-30T05:34:09.211Z | 2026-04-30T15:20:12.427Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-5403 | SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possib… | 2026-05-01T00:16:24.670 | 2026-05-01T19:18:04.737 |
| fkie_cve-2026-40687 | In Exim before 4.99.2, when the SPA authentication driver is used with an adversarial SPA resource,… | 2026-04-30T22:16:25.923 | 2026-05-01T19:17:51.200 |
| fkie_cve-2026-42485 | AGL agl-service-can-low-level contains a stack buffer overflow in the uds-c library. The send_diagn… | 2026-05-01T17:16:25.377 | 2026-05-01T19:16:33.170 |
| fkie_cve-2026-42484 | A heap-based buffer overflow in hex_to_binary in the PKZIP hash parser in hashcat v7.1.2 allows an … | 2026-05-01T14:16:22.800 | 2026-05-01T19:16:33.000 |
| fkie_cve-2026-42482 | A stack-based buffer overflow in mangle_to_hex_lower() and mangle_to_hex_upper() in src/rp_cpu.c in… | 2026-05-01T14:16:22.577 | 2026-05-01T19:16:32.830 |
| fkie_cve-2026-42481 | Open CASCADE Technology (OCCT) V8_0_0_rc5 contains multiple vulnerabilities in its IGES and STEP fi… | 2026-05-01T16:16:32.163 | 2026-05-01T19:16:32.663 |
| fkie_cve-2026-42480 | A stack-based out-of-bounds read vulnerability in VrmlData_Scene::ReadLine in the VRML parser in Op… | 2026-05-01T16:16:32.047 | 2026-05-01T19:16:32.470 |
| fkie_cve-2026-42479 | An out-of-bounds read vulnerability in VrmlData_IndexedLineSet::TShape in the VRML parser in Open C… | 2026-05-01T15:16:43.967 | 2026-05-01T19:16:32.267 |
| fkie_cve-2026-42478 | An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 parser in Open CASCADE … | 2026-05-01T15:16:43.857 | 2026-05-01T19:16:32.093 |
| fkie_cve-2026-42477 | A heap-based out-of-bounds read vulnerability in RWObj_Reader::read in the OBJ file parser in Open … | 2026-05-01T15:16:43.737 | 2026-05-01T19:16:31.937 |
| fkie_cve-2026-42476 | Two heap-based out-of-bounds read vulnerabilities in the STL ASCII file parser in Open CASCADE Tech… | 2026-05-01T15:16:43.620 | 2026-05-01T19:16:31.773 |
| fkie_cve-2026-42475 | SQL injection vulnerability in MixPHP Framework 2.x thru 2.2.17 via crafted `on` array to the joinO… | 2026-05-01T16:16:31.930 | 2026-05-01T19:16:31.620 |
| fkie_cve-2026-42474 | SQL injection vulnerability in MixPHP Framework 2.x thru 2.2.17 via crafted `data` array to the dat… | 2026-05-01T16:16:31.813 | 2026-05-01T19:16:31.460 |
| fkie_cve-2026-42473 | Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The session and cache han… | 2026-05-01T16:16:31.703 | 2026-05-01T19:16:31.300 |
| fkie_cve-2026-42472 | Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The session and cache han… | 2026-05-01T16:16:31.587 | 2026-05-01T19:16:31.153 |
| fkie_cve-2026-42471 | Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke client (C… | 2026-05-01T16:16:31.470 | 2026-05-01T19:16:30.990 |
| fkie_cve-2026-42468 | Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_pca… | 2026-05-01T17:16:25.150 | 2026-05-01T19:16:30.843 |
| fkie_cve-2026-42167 | mod_sql in ProFTPD before 1.3.9a allows remote attackers to execute arbitrary code via a username, … | 2026-04-28T23:16:20.610 | 2026-05-01T19:16:30.723 |
| fkie_cve-2026-37538 | Buffer overflow vulnerability in socketcand 0.4.2 in file socketcand.c in function main allows atta… | 2026-05-01T17:16:23.687 | 2026-05-01T19:16:30.567 |
| fkie_cve-2026-37530 | AGL agl-service-can-low-level thru 17.1.12 contains a stack buffer overflow in the uds-c library. T… | 2026-05-01T17:16:22.603 | 2026-05-01T19:16:30.400 |
| fkie_cve-2026-37457 | An off-by-one out-of-bounds write vulnerability in the bgp_flowspec_op_decode() function (bgpd/bgp_… | 2026-05-01T18:16:14.770 | 2026-05-01T19:16:30.247 |
| fkie_cve-2026-35233 | An unprivileged attacker can craft a user-space process with a malicious ELF binary containing an o… | 2026-05-01T18:16:14.647 | 2026-05-01T19:16:30.120 |
| fkie_cve-2026-26461 | A Command Injection vulnerability in the web management interface in Aver PTC320UV2 0.1.0000.65 all… | 2026-05-01T18:16:14.307 | 2026-05-01T19:16:29.643 |
| fkie_cve-2026-21996 | An unprivileged attacker can reliably trigger a crash of the dtrace process with a malicious ELF bi… | 2026-05-01T18:16:13.750 | 2026-05-01T19:16:29.517 |
| fkie_cve-2025-69606 | Cross-Site Scripting (XSS) vulnerability was discovered in the GSVoIP web panel version 2.0.90. The… | 2026-05-01T18:16:13.607 | 2026-05-01T19:16:29.350 |
| fkie_cve-2025-63548 | An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to cause a denial of ser… | 2026-05-01T18:16:13.477 | 2026-05-01T19:16:29.203 |
| fkie_cve-2025-63547 | An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to cause a denial of ser… | 2026-05-01T18:16:13.310 | 2026-05-01T19:16:29.050 |
| fkie_cve-2025-52347 | An issue in the component DirectIo64.sys of PassMark BurnInTest v11.0 Build 1011, OSForensics v11.1… | 2026-05-01T19:16:28.113 | 2026-05-01T19:16:28.113 |
| fkie_cve-2018-25309 | MyBB Recent threads 17.0 contains a persistent cross-site scripting vulnerability that allows attac… | 2026-04-29T20:16:26.463 | 2026-05-01T19:15:42.213 |
| fkie_cve-2026-5201 | A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vulnerability occurs in… | 2026-03-31T09:16:23.440 | 2026-05-01T19:14:40.077 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-943r-726h-fc9x |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: shaper: protect from late… | 2026-04-03T18:31:21Z | 2026-04-23T21:31:18Z |
| ghsa-8f9w-9r3m-xjvx |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: udp_tunnel: fix NULL deref cau… | 2026-04-03T18:31:21Z | 2026-04-23T21:31:18Z |
| ghsa-84pr-vgrv-386j |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: always free sk… | 2026-04-03T18:31:21Z | 2026-04-23T21:31:18Z |
| ghsa-742c-798h-fpj3 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: iommu/sva: Fix crash in iommu_… | 2026-04-03T18:31:21Z | 2026-04-23T21:31:18Z |
| ghsa-6ww2-mmfj-6f5p |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drm/logicvc: Fix device node r… | 2026-04-03T15:30:31Z | 2026-04-23T21:31:18Z |
| ghsa-4rrh-p933-rf74 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: perf/x86: Move event pointer s… | 2026-04-03T18:31:21Z | 2026-04-23T21:31:18Z |
| ghsa-4m78-cvj8-m5m2 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: mvpp2: guard flow control… | 2026-04-03T18:31:21Z | 2026-04-23T21:31:18Z |
| ghsa-255w-8g7g-qmg6 |
4.7 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix race condition … | 2026-04-03T18:31:21Z | 2026-04-23T21:31:18Z |
| ghsa-23qp-f5g5-j76h |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Fix ID register in… | 2026-04-03T15:30:31Z | 2026-04-23T21:31:18Z |
| ghsa-xf4v-3mcr-w96x |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: hwmon: (macsmc) Fix regression… | 2026-03-25T12:30:22Z | 2026-04-23T21:31:17Z |
| ghsa-w7x9-wq5x-hghj |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: libie: don't unroll if fwlog i… | 2026-03-25T12:30:22Z | 2026-04-23T21:31:17Z |
| ghsa-vjm5-v2mx-wqmv |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: complete pending dat… | 2026-03-25T12:30:23Z | 2026-04-23T21:31:17Z |
| ghsa-jc3m-qg79-3244 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: udp: Unhash auto-bound connect… | 2026-03-25T12:30:23Z | 2026-04-23T21:31:17Z |
| ghsa-j6q7-jcx4-9hr4 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix kernel stack l… | 2026-03-25T12:30:23Z | 2026-04-23T21:31:17Z |
| ghsa-j57x-5h9f-j263 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Fix NULL pointe… | 2026-03-25T12:30:22Z | 2026-04-23T21:31:17Z |
| ghsa-ghwv-vcf8-g6g9 |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7996: Fix possib… | 2026-03-25T12:30:22Z | 2026-04-23T21:31:17Z |
| ghsa-ggpq-p67g-h639 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/userq: Do not allow… | 2026-03-25T12:30:23Z | 2026-04-23T21:31:17Z |
| ghsa-g743-x9vq-5fpv |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Fix crash when … | 2026-03-25T12:30:23Z | 2026-04-23T21:31:17Z |
| ghsa-cp65-xq47-m66j |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: in-kernel: always m… | 2026-03-25T12:30:22Z | 2026-04-23T21:31:17Z |
| ghsa-77ph-fpqv-c298 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: free skb on nci_tran… | 2026-03-25T12:30:23Z | 2026-04-23T21:31:17Z |
| ghsa-76w7-8x62-j4qm |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: cpufreq: intel_pstate: Fix cra… | 2026-03-25T12:30:23Z | 2026-04-23T21:31:17Z |
| ghsa-6r9h-pc2x-g962 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: xsk: Fix fragment node deletio… | 2026-03-25T12:30:22Z | 2026-04-23T21:31:17Z |
| ghsa-6pcx-mjxw-6w72 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: can: usb: etas_es58x: correctl… | 2026-03-25T12:30:22Z | 2026-04-23T21:31:17Z |
| ghsa-668m-q5h4-jfjc |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ipmi: Fix use-after-free and l… | 2026-03-25T12:30:22Z | 2026-04-23T21:31:17Z |
| ghsa-5599-vj49-3fh3 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: pinctrl: pinconf-generic: Fix … | 2026-03-25T12:30:23Z | 2026-04-23T21:31:17Z |
| ghsa-2x56-x8gq-8cv3 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: can: usb: f81604: handle short… | 2026-03-25T12:30:23Z | 2026-04-23T21:31:17Z |
| ghsa-2pc8-ghgj-6c2f |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: cxl/mbox: validate payload siz… | 2026-03-25T12:30:22Z | 2026-04-23T21:31:17Z |
| ghsa-x63j-v2j2-m8fv |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Use correct v… | 2026-03-25T12:30:22Z | 2026-04-23T21:31:16Z |
| ghsa-vcmv-6vcp-286q |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: ipv4: fix ARM64 alignment… | 2026-03-25T12:30:22Z | 2026-04-23T21:31:16Z |
| ghsa-v2rp-wxm3-8hxp |
5.5 (3.1)
|
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in ma… | 2026-03-25T03:31:31Z | 2026-04-23T21:31:16Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2012-39 |
|
virt/disk/api.py in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo … | nova | 2012-07-22T16:55:00Z | 2024-11-21T14:22:56.493974Z |
| pysec-2012-38 |
|
Directory traversal vulnerability in virt/disk/api.py in OpenStack Compute (Nova) Folsom … | nova | 2012-07-22T16:55:00Z | 2024-11-21T14:22:56.434839Z |
| pysec-2023-288 |
6.5 (3.1)
|
The Nautobot Device Onboarding plugin uses the netmiko and NAPALM libraries to simplify t… | nautobot-device-onboarding | 2023-11-21T23:15:00+00:00 | 2024-11-21T14:22:55.475794+00:00 |
| pysec-2023-287 |
4.3 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-12-22T17:15:00+00:00 | 2024-11-21T14:22:55.764934+00:00 |
| pysec-2023-286 |
5.3 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-12-12T23:15:00+00:00 | 2024-11-21T14:22:55.664554+00:00 |
| pysec-2023-285 |
5.4 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-11-22T16:15:00+00:00 | 2024-11-21T14:22:55.567982+00:00 |
| pysec-2023-284 |
6.5 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-23T14:15:00+00:00 | 2024-11-21T14:22:55.160710+00:00 |
| pysec-2023-283 |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-19T18:15:00+00:00 | 2024-11-21T14:22:55.105976+00:00 |
| pysec-2023-282 |
6.5 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-19T09:15:00+00:00 | 2024-11-21T14:22:55.051300+00:00 |
| pysec-2022-43141 |
7.5 (3.1)
|
MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET re… | motioneye | 2022-03-24T17:15:00+00:00 | 2024-11-21T14:22:55.422153+00:00 |
| pysec-2012-37 |
|
The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), … | nova | 2012-06-21T15:55:00Z | 2024-11-21T14:22:55.891133Z |
| pysec-2012-36 |
|
Openstack Compute (Nova) Folsom, 2012.1, and 2011.3 does not limit the number of security… | nova | 2012-06-07T19:55:00Z | 2024-11-21T14:22:55.825436Z |
| pysec-2023-281 |
8.8 (3.1)
|
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repositor… | mlflow | 2023-12-12T04:15:00+00:00 | 2024-11-21T14:22:54.938745+00:00 |
| pysec-2023-280 |
7.8 (3.1)
|
OS Command Injection in GitHub repository mlflow/mlflow prior to 2.6.0. | mlflow | 2023-08-01T01:15:00+00:00 | 2024-11-21T14:22:54.880705+00:00 |
| pysec-2023-279 |
9.1 (3.1)
|
MindsDB is a SQL Server for artificial intelligence. Prior to version 23.11.4.1, the `put… | mindsdb | 2023-12-22T21:15:00+00:00 | 2024-11-21T14:22:54.549778+00:00 |
| pysec-2023-277 |
5.3 (3.1)
|
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.1… | mindsdb | 2023-12-11T19:15:00+00:00 | 2024-11-21T14:22:54.391272+00:00 |
| pysec-2014-110 |
|
Multiple cross-site scripting (XSS) vulnerabilities in apps/common/templates/calculate_fo… | mayan-edms | 2014-05-27T13:55:00Z | 2024-11-21T14:22:54.240407Z |
| pysec-2024-128 |
6.1 (3.1)
|
Label Studio, an open source data labeling tool had a remote import feature allowed users… | label-studio | 2024-01-24T00:15:00+00:00 | 2024-11-21T14:22:53.406222+00:00 |
| pysec-2024-127 |
5.3 (3.1)
|
Label Studio is a popular open source data labeling tool. The vulnerability affects all v… | label-studio | 2024-01-31T17:15:00+00:00 | 2024-11-21T14:22:53.294472+00:00 |
| pysec-2024-126 |
5.4 (3.1)
|
Label Studio is an a popular open source data labeling tool. Versions prior to 1.9.2 have… | label-studio | 2024-01-23T23:15:00+00:00 | 2024-11-21T14:22:53.235341+00:00 |
| pysec-2023-275 |
7.5 (3.1)
|
Label Studio is an open source data labeling tool. In all current versions of Label Studi… | label-studio | 2023-11-13T21:15:00+00:00 | 2024-11-21T14:22:53.350760+00:00 |
| pysec-2023-274 |
8.8 (3.1)
|
Label Studio is a multi-type data labeling and annotation tool with standardized output f… | label-studio | 2023-11-09T15:15:00+00:00 | 2024-11-21T14:22:53.173192+00:00 |
| pysec-2023-273 |
8.8 (3.1)
|
Kiwi TCMS is an open source test management system. In kiwitcms/Kiwi v12.2 and prior and … | kiwitcms | 2023-04-24T22:15:00+00:00 | 2024-11-21T14:22:53.063160+00:00 |
| pysec-2022-43137 |
5.5 (3.1)
|
LIEF commit 365a16a was discovered to contain a reachable assertion abort via the compone… | lief | 2022-09-13T21:15:00+00:00 | 2024-11-21T14:22:53.842904+00:00 |
| pysec-2017-144 |
7.5 (3.1)
|
Koji 1.13.0 does not properly validate SCM paths, allowing an attacker to work around bla… | koji | 2017-10-06T17:29:00Z | 2024-11-21T14:22:53.117821Z |
| pysec-2023-272 |
4.3 (3.1)
|
The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints… | jupyter-server | 2023-12-04T21:15:00+00:00 | 2024-11-21T14:22:52.227754+00:00 |
| pysec-2018-151 |
8.8 (3.1)
|
An issue was discovered in Project Jupyter JupyterHub OAuthenticator 0.6.x before 0.6.2 a… | jupyterhub | 2018-02-18T03:29:00Z | 2024-11-21T14:22:52.286953Z |
| pysec-2018-150 |
7.5 (3.1)
|
Hyperledger Iroha versions v1.0_beta and v1.0.0_beta-1 are vulnerable to transaction and … | iroha | 2018-06-01T19:29:00Z | 2024-11-21T14:22:52.162008Z |
| pysec-2014-104 |
|
FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote att… | ipa | 2014-11-19T18:59:00Z | 2024-11-21T14:22:52.00819Z |
| pysec-2013-40 |
|
OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs … | keystone | 2013-05-21T18:55:00Z | 2024-11-21T14:22:52.515884Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-4224 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414154Z |
| gsd-2024-4223 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.423284Z |
| gsd-2024-4222 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.363699Z |
| gsd-2024-4221 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.433755Z |
| gsd-2024-4220 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.384898Z |
| gsd-2024-4219 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.359066Z |
| gsd-2024-4218 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.369587Z |
| gsd-2024-4217 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.397245Z |
| gsd-2024-4216 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414356Z |
| gsd-2024-4215 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.378015Z |
| gsd-2024-4214 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.390841Z |
| gsd-2024-4213 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.379947Z |
| gsd-2024-4212 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.440122Z |
| gsd-2024-4211 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414864Z |
| gsd-2024-4210 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.431459Z |
| gsd-2024-4209 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.403437Z |
| gsd-2024-4208 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.386660Z |
| gsd-2024-4207 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.376954Z |
| gsd-2024-4206 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.423074Z |
| gsd-2024-4205 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.362130Z |
| gsd-2024-4204 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.429356Z |
| gsd-2024-4203 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.393641Z |
| gsd-2024-4202 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.405198Z |
| gsd-2024-4201 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.401052Z |
| gsd-2024-4200 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.430960Z |
| gsd-2024-4199 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.422865Z |
| gsd-2024-4198 | Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully vali… | 2024-04-26T05:02:17.420758Z |
| gsd-2024-4197 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.437306Z |
| gsd-2024-4196 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.385450Z |
| gsd-2024-4195 | Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully vali… | 2024-04-26T05:02:17.392645Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1506 | Malicious code in transform-minify-booleans (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:59Z |
| mal-2026-1505 | Malicious code in transform-jscript (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:59Z |
| mal-2026-1504 | Malicious code in transform-jsbi-to-bigint (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:59Z |
| mal-2026-1337 | Malicious code in typescript-urql (npm) | 2026-03-11T06:19:13Z | 2026-04-28T04:47:59Z |
| mal-2026-1334 | Malicious code in sort-export-all (npm) | 2026-03-11T06:17:53Z | 2026-04-28T04:47:59Z |
| mal-2026-1547 | Malicious code in pear-wrk-wdk (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:58Z |
| mal-2026-1539 | Malicious code in relay-optimizer-plugin (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:58Z |
| mal-2026-1529 | Malicious code in require-in-package (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:58Z |
| mal-2026-1528 | Malicious code in react-you-might-not-need-an-effect (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:58Z |
| mal-2026-1527 | Malicious code in proposal-typescript (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:58Z |
| mal-2026-1526 | Malicious code in prefer-let (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:58Z |
| mal-2026-1525 | Malicious code in peer-deps-external (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:58Z |
| mal-2026-1524 | Malicious code in no-type-assertion (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:58Z |
| mal-2026-1523 | Malicious code in monorepo-cop (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:58Z |
| mal-2026-1522 | Malicious code in minify-mangle-names (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:58Z |
| mal-2026-1521 | Malicious code in lit-a11y (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:58Z |
| mal-2026-1503 | Malicious code in minify-replace (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:58Z |
| mal-2026-1332 | Malicious code in mui-path-imports (npm) | 2026-03-11T06:19:33Z | 2026-04-28T04:47:58Z |
| mal-2026-1546 | Malicious code in dazaar-payment (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:57Z |
| mal-2026-1545 | Malicious code in dazaar-cli (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:57Z |
| mal-2026-1520 | Malicious code in jam3 (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:57Z |
| mal-2026-1519 | Malicious code in import-newlines (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:57Z |
| mal-2026-1518 | Malicious code in ignore-html-and-css-imports (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:57Z |
| mal-2026-1517 | Malicious code in filenames-simple (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:57Z |
| mal-2026-1516 | Malicious code in es6-recommended (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:57Z |
| mal-2026-1515 | Malicious code in developit (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:57Z |
| mal-2026-1514 | Malicious code in declaration-block-no-ignored-properties (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:57Z |
| mal-2026-1330 | Malicious code in import-zod (npm) | 2026-03-11T06:15:22Z | 2026-04-28T04:47:57Z |
| mal-2026-1329 | Malicious code in google-camelcase (npm) | 2026-03-11T06:18:53Z | 2026-04-28T04:47:57Z |
| mal-2026-1327 | Malicious code in filter-imports (npm) | 2026-03-11T06:17:33Z | 2026-04-28T04:47:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2129 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-09-24T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2002 | libssh: Schwachstelle ermöglicht Denial of Service | 2025-09-09T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-0734 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-04-07T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0203 | SmarterTools SmarterMail: Schwachstelle ermöglicht Umgehung | 2026-01-22T23:00:00.000+00:00 | 2026-02-22T23:00:00.000+00:00 |
| wid-sec-w-2025-1208 | Roundcube: Schwachstelle ermöglicht Codeausführung | 2025-06-01T22:00:00.000+00:00 | 2026-02-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0347 | Red Hat Build of Keycloak: Mehrere Schwachstellen | 2026-02-09T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0196 | CPython: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-01-21T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0083 | Microsoft Windows : Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0437 | Dell RecoverPoint for Virtual Machines: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und potenziell Privilegieneskalation | 2026-02-17T23:00:00.000+00:00 | 2026-02-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0420 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-02-17T23:00:00.000+00:00 |
| wid-sec-w-2026-0426 | Apache Traffic Server: Mehrere Schwachstellen ermöglichen Denial of Service | 2019-08-14T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0401 | Google Chrome: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0367 | Microsoft DeveloperTools (Visual Studio Code und .NET): Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0304 | patch: Schwachstelle ermöglicht Denial of Service | 2021-12-22T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0243 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Denial of Service | 2026-01-27T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0231 | GnuPG und Gpg4win: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0199 | Red Hat OpenShift Pipelines Operator (Fulcio): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0136 | AMD EPYC-Prozessoren: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-15T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0116 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-14T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0105 | Red Hat Developer Hub: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0098 | Node.js: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0008 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2026-01-04T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2798 | Red Hat OpenShift Service Mesh: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2755 | util-linux: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-12-07T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2730 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-02T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2643 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-19T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2584 | Red Hat Enterprise Linux Ceph Storage: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2518 | Red Hat Enterprise Linux (runc): Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-11-09T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2490 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2019-11-20T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2242 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2025-10-08T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-140-08 | Schneider Electric Modicon Controllers (Update B) | 2025-05-13T04:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-24-352-04 | Schneider Electric Modicon | 2024-12-10T05:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-287-01 | Rockwell Automation 1715 EtherNet/IP Comms Module | 2025-10-14T06:00:00.000000Z | 2025-10-14T06:00:00.000000Z |
| icsa-25-294-04 | Siemens RUGGEDCOM ROS Devices | 2025-07-08T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-294-03 | Siemens SIMATIC S7-1200 CPU V1/V2 Devices | 2011-06-10T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-09 | Siemens TeleControl Server Basic | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-08 | Siemens SINEC NMS | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-07 | Siemens SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-05 | Siemens Solid Edge | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-254-07 | Siemens User Management Component (UMC) | 2025-09-09T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-148-01 | Siemens SiPass | 2025-05-23T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-135-09 | Siemens User Management Component (UMC) | 2025-05-13T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-24-284-10 | Siemens SIMATIC S7-1500 CPUs | 2024-10-08T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-24-284-01 | Siemens SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-24-256-03 | Siemens User Management Component (UMC) | 2024-09-10T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-252-08 | Rockwell Automation Analytics LogixAI | 2025-09-09T06:00:00.000000Z | 2025-10-10T06:00:00.000000Z |
| va-25-282-01 | Newforma Project Center multiple vulnerabilities | 2025-10-09T19:50:00Z | 2025-10-09T19:50:00Z |
| icsa-25-282-03 | Rockwell Automation Stratix | 2025-10-09T06:00:00.000000Z | 2025-10-09T06:00:00.000000Z |
| icsa-25-282-02 | Rockwell Automation Lifecycle Services with Cisco | 2025-10-09T06:00:00.000000Z | 2025-10-09T06:00:00.000000Z |
| va-25-280-01 | OPEXUS FOIAXpress stored XSS | 2025-10-07T22:50:29Z | 2025-10-07T22:50:29Z |
| icsa-25-226-31 | Rockwell Automation 1756-EN4TR, 1756-EN4TRXT (Update B) | 2025-08-14T06:00:00.000000Z | 2025-10-07T06:00:00.000000Z |
| icsa-25-275-01 | Raise3D Pro2 Series 3D Printers** | 2025-10-02T05:00:00.000000Z | 2025-10-02T05:00:00.000000Z |
| icsa-25-343-02 | Festo LX Appliance | 2023-08-29T10:00:00.000000Z | 2025-10-01T10:00:00.000000Z |
| icsa-25-324-04 | Festo MSE6-C2M/D2M/E2M | 2023-09-05T10:00:00.000000Z | 2025-10-01T10:00:00.000000Z |
| icsa-25-324-05 | Festo Didactic products | 2023-10-17T06:00:00.000000Z | 2025-10-01T06:00:00.000000Z |
| icsa-25-289-11 | Hitachi Energy MACH GWS | 2025-09-30T12:50:29.000000Z | 2025-09-30T12:50:29.000000Z |
| icsa-24-116-02 | Hitachi Energy MACH SCM (Update A) | 2024-03-26T11:32:43.000000Z | 2025-09-30T11:32:43.000000Z |
| icsa-25-275-02 | Hitachi Energy MSM | 2025-09-30T09:02:31.000000Z | 2025-09-30T09:02:31.000000Z |
| icsa-25-273-06 | National Instruments Circuit Design Suite | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-05 | OpenPLC_V3 | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-asaftd-snmp-dos-7TcnzxTU | Cisco Adaptive Security Appliance and Firepower Threat Defense Software SNMP Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-persist-lce-vu3ekmj3 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-persist-lce-vU3ekMJ3 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-nsgacl-bypass-77xneasl | Cisco Adaptive Security Appliance and Firepower Threat Defense Software NSG Access Control List Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-nsgacl-bypass-77XnEAsL | Cisco Adaptive Security Appliance and Firepower Threat Defense Software NSG Access Control List Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-ikev2-dos-9fgeyhsf | Cisco Adaptive Security Appliance and Firepower Threat Defense Software IKEv2 VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-ikev2-dos-9FgEyHsF | Cisco Adaptive Security Appliance and Firepower Threat Defense Software IKEv2 VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-dap-dos-bhekp7n | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Dynamic Access Policies Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-dap-dos-bhEkP7n | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Dynamic Access Policies Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-bf-dos-vdzhlqrw | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Brute Force Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asaftd-bf-dos-vDZhLqrW | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Brute Force Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-nyh3fhp | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-nyH3fhp | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-czf8gt | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-cZf8gT | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access VPN Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-4gyewmkg | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-vpn-4gYEWMKg | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Remote Access SSL VPN Authentication Targeted Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-tls-cwy6zxb | Cisco Adaptive Security Appliance and Firepower Threat Defense Software TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-tls-CWY6zXB | Cisco Adaptive Security Appliance and Firepower Threat Defense Software TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ssh-rce-graupeuf | Cisco Adaptive Security Appliance Software SSH Remote Command Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ssh-rce-gRAuPEUF | Cisco Adaptive Security Appliance Software SSH Remote Command Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ssh-dos-eedwu5rm | Cisco Adaptive Security Appliance Software SSH Server Resource Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ssh-dos-eEDWu5RM | Cisco Adaptive Security Appliance Software SSH Server Resource Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ftd-priv-esc-hbs9gnwq | Cisco Adaptive Security Appliance and Firepower Threat Defense Software FXOS CLI Root Privilege Escalation Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-asa-ftd-priv-esc-hBS9gnwq | Cisco Adaptive Security Appliance and Firepower Threat Defense Software FXOS CLI Root Privilege Escalation Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-fmc-code-inj-wshrgz8l | Cisco Firepower Threat Defense Software and Firepower Management Center Software Code Injection Vulnerability | 2023-11-01T16:00:00+00:00 | 2024-10-23T15:57:47+00:00 |
| cisco-sa-ftd-fmc-code-inj-wSHrgz8L | Cisco Firepower Threat Defense Software and Firepower Management Center Software Code Injection Vulnerability | 2023-11-01T16:00:00+00:00 | 2024-10-23T15:57:47+00:00 |
| cisco-sa-ucsc-bkpsky-tgj5f73j | Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability | 2024-10-16T16:00:00+00:00 | 2024-10-16T16:00:00+00:00 |
| cisco-sa-ucsc-bkpsky-TgJ5f73J | Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability | 2024-10-16T16:00:00+00:00 | 2024-10-16T16:00:00+00:00 |
| cisco-sa-ccmpdm-rxss-tax76u3k | Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability | 2024-10-16T16:00:00+00:00 | 2024-10-16T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38140 | dm: limit swapping tables for devices with zone write plugs | 2025-07-02T00:00:00.000Z | 2026-04-29T14:57:32.000Z |
| msrc_cve-2026-23214 | btrfs: reject new transactions if the fs is fully read-only | 2026-02-02T00:00:00.000Z | 2026-04-29T14:57:25.000Z |
| msrc_cve-2024-42107 | ice: Don't process extts if PTP is disabled | 2024-07-01T07:00:00.000Z | 2026-04-29T14:57:23.000Z |
| msrc_cve-2026-31428 | netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD | 2026-04-02T00:00:00.000Z | 2026-04-29T14:57:19.000Z |
| msrc_cve-2025-4748 | Absolute path traversal in zip:unzip/1,2 | 2025-06-02T00:00:00.000Z | 2026-04-29T14:57:19.000Z |
| msrc_cve-2025-71225 | md: suspend array while updating raid_disks via sysfs | 2026-02-02T00:00:00.000Z | 2026-04-29T14:57:13.000Z |
| msrc_cve-2026-31421 | net/sched: cls_fw: fix NULL pointer dereference on shared blocks | 2026-04-02T00:00:00.000Z | 2026-04-29T14:57:03.000Z |
| msrc_cve-2025-38029 | kasan: avoid sleepable page allocation from atomic context | 2025-06-02T00:00:00.000Z | 2026-04-29T14:57:03.000Z |
| msrc_cve-2026-23213 | drm/amd/pm: Disable MMIO access during SMU Mode 1 reset | 2026-02-02T00:00:00.000Z | 2026-04-29T14:56:58.000Z |
| msrc_cve-2024-56712 | udmabuf: fix memory leak on last export_udmabuf() error path | 2024-12-02T00:00:00.000Z | 2026-04-29T14:56:56.000Z |
| msrc_cve-2025-38064 | virtio: break and reset virtio devices on device_shutdown() | 2025-06-02T00:00:00.000Z | 2026-04-29T14:56:50.000Z |
| msrc_cve-2025-68768 | inet: frags: flush pending skbs in fqdir_pre_exit() | 2026-01-02T00:00:00.000Z | 2026-04-29T14:56:46.000Z |
| msrc_cve-2026-31570 | can: gw: fix OOB heap access in cgw_csum_crc8_rel() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:56:43.000Z |
| msrc_cve-2024-56647 | net: Fix icmp host relookup triggering ip_rt_bug | 2024-12-02T00:00:00.000Z | 2026-04-29T14:56:43.000Z |
| msrc_cve-2025-38041 | clk: sunxi-ng: h616: Reparent GPU clock during frequency changes | 2025-06-02T00:00:00.000Z | 2026-04-29T14:56:37.000Z |
| msrc_cve-2026-31419 | net: bonding: fix use-after-free in bond_xmit_broadcast() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:56:36.000Z |
| msrc_cve-2025-71073 | Input: lkkbd - disable pending work before freeing device | 2026-01-02T00:00:00.000Z | 2026-04-29T14:56:33.000Z |
| msrc_cve-2024-53089 | LoongArch: KVM: Mark hrtimer to expire in hard interrupt context | 2024-11-02T00:00:00.000Z | 2026-04-29T14:56:31.000Z |
| msrc_cve-2025-5791 | Users: `root` appended to group listings | 2025-06-02T00:00:00.000Z | 2026-04-29T14:56:26.000Z |
| msrc_cve-2026-31426 | ACPI: EC: clean up handlers on probe failure in acpi_ec_setup() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:56:24.000Z |
| msrc_cve-2025-68822 | Input: alps - fix use-after-free bugs caused by dev3_register_work | 2026-01-02T00:00:00.000Z | 2026-04-29T14:56:20.000Z |
| msrc_cve-2024-53090 | afs: Fix lock recursion | 2024-11-02T00:00:00.000Z | 2026-04-29T14:56:19.000Z |
| msrc_cve-2024-41008 | drm/amdgpu: change vm->task_info handling | 2024-07-01T07:00:00.000Z | 2026-04-29T14:56:13.000Z |
| msrc_cve-2026-31427 | netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp | 2026-04-02T00:00:00.000Z | 2026-04-29T14:56:09.000Z |
| msrc_cve-2025-21888 | RDMA/mlx5: Fix a WARN during dereg_mr for DM type | 2025-03-02T00:00:00.000Z | 2026-04-29T14:56:00.000Z |
| msrc_cve-2025-58160 | Tracing logging user input may result in poisoning logs with ANSI escape sequences | 2025-08-02T00:00:00.000Z | 2026-04-29T14:55:59.000Z |
| msrc_cve-2026-31566 | drm/amdgpu: Fix fence put before wait in amdgpu_amdkfd_submit_ib | 2026-04-02T00:00:00.000Z | 2026-04-29T14:55:58.000Z |
| msrc_cve-2026-31414 | netfilter: nf_conntrack_expect: use expect->helper | 2026-04-02T00:00:00.000Z | 2026-04-29T14:55:55.000Z |
| msrc_cve-2025-21976 | fbdev: hyperv_fb: Allow graceful removal of framebuffer | 2025-04-02T00:00:00.000Z | 2026-04-29T14:55:47.000Z |
| msrc_cve-2025-68374 | md: fix rcu protection in md_wakeup_thread | 2025-12-02T00:00:00.000Z | 2026-04-29T14:55:44.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0176 | Kwetsbaarheden verholpen in GitLab | 2025-05-23T08:38:34.688022Z | 2025-05-23T08:38:34.688022Z |
| ncsc-2025-0175 | Kwetsbaarheden verholpen in Trend Micro Apex Central | 2025-05-23T08:28:52.215347Z | 2025-05-23T08:28:52.215347Z |
| ncsc-2025-0174 | Kwetsbaarheden verholpen in Cisco Unified Intelligence Center | 2025-05-22T08:14:14.245836Z | 2025-05-22T08:14:14.245836Z |
| ncsc-2025-0173 | Kwetsbaarheid verholpen in Cisco Identity Services Engine | 2025-05-22T08:14:06.046824Z | 2025-05-22T08:14:06.046824Z |
| ncsc-2025-0172 | Kwetsbaarheden verholpen in Cisco Webex | 2025-05-22T08:13:51.228348Z | 2025-05-22T08:13:51.228348Z |
| ncsc-2025-0171 | Kwetsbaarheden verholpen in VMware producten | 2025-05-21T13:08:22.714183Z | 2025-05-21T13:08:22.714183Z |
| ncsc-2025-0170 | Kwetsbaarheden verholpen in VMware Cloud Foundation | 2025-05-21T09:12:05.676292Z | 2025-05-21T09:12:05.676292Z |
| ncsc-2025-0169 | Kwetsbaarheden verholpen in Google Chrome | 2025-05-16T12:41:47.685095Z | 2025-05-16T12:41:47.685095Z |
| ncsc-2025-0152 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile (EPMM, voormalig MobileIron) | 2025-05-13T15:35:45.784542Z | 2025-05-16T09:42:15.822544Z |
| ncsc-2025-0168 | Kwetsbaarheid verholpen in FortiVoice | 2025-05-14T13:50:54.001151Z | 2025-05-14T13:50:54.001151Z |
| ncsc-2025-0167 | Kwetsbaarheden verholpen in Zoho ManageEngine | 2025-05-14T13:19:58.768414Z | 2025-05-14T13:19:58.768414Z |
| ncsc-2025-0166 | Kwetsbaarheden verholpen in Fortinet producten | 2025-05-14T08:41:08.980708Z | 2025-05-14T08:41:08.980708Z |
| ncsc-2025-0165 | Kwetsbaarheid verholpen in Adobe Illustrator | 2025-05-14T08:25:17.869407Z | 2025-05-14T08:25:17.869407Z |
| ncsc-2025-0164 | Kwetsbaarheden verholpen in Adobe Photoshop | 2025-05-14T08:24:02.186984Z | 2025-05-14T08:24:02.186984Z |
| ncsc-2025-0163 | Kwetsbaarheden verholpen in Adobe Animate | 2025-05-14T08:21:49.917725Z | 2025-05-14T08:21:49.917725Z |
| ncsc-2025-0162 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-05-14T08:18:54.775740Z | 2025-05-14T08:18:54.775740Z |
| ncsc-2025-0161 | Kwetsbaarheid verholpen in Ivanti Neurons for ITSM | 2025-05-14T08:16:04.867590Z | 2025-05-14T08:16:04.867590Z |
| ncsc-2025-0160 | Kwetsbaarheden verholpen in Siemens producten | 2025-05-14T07:13:32.957900Z | 2025-05-14T07:13:32.957900Z |
| ncsc-2025-0159 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-05-13T19:47:12.555983Z | 2025-05-13T19:47:12.555983Z |
| ncsc-2025-0158 | Kwetsbaarheden verholpen in Microsoft Edge | 2025-05-13T19:17:52.478234Z | 2025-05-13T19:17:52.478234Z |
| ncsc-2025-0157 | Kwetsbaarheden verholpen in Microsoft Defender | 2025-05-13T19:14:25.545635Z | 2025-05-13T19:14:25.545635Z |
| ncsc-2025-0156 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-05-13T19:10:10.012472Z | 2025-05-13T19:10:10.012472Z |
| ncsc-2025-0155 | Kwetsbaarheden verholpen in Microsoft Office | 2025-05-13T18:58:56.989073Z | 2025-05-13T18:58:56.989073Z |
| ncsc-2025-0154 | Kwetsbaarheden verholpen in Microsoft Dynamics Dataverse | 2025-05-13T18:44:03.290810Z | 2025-05-13T18:44:03.290810Z |
| ncsc-2025-0153 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-05-13T18:35:28.760017Z | 2025-05-13T18:35:28.760017Z |
| ncsc-2025-0151 | Kwetsbaarheden verholpen in Apple macOS | 2025-05-13T09:19:37.094950Z | 2025-05-13T09:19:37.094950Z |
| ncsc-2025-0150 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-05-13T09:14:44.606584Z | 2025-05-13T09:14:44.606584Z |
| ncsc-2025-0149 | Kwetsbaarheden verholpen in SAP producten | 2025-05-13T09:05:38.110295Z | 2025-05-13T09:05:38.110295Z |
| ncsc-2025-0148 | Kwetsbaarheden verholpen in ASUS DriverHub | 2025-05-12T13:22:18.034442Z | 2025-05-12T13:22:18.034442Z |
| ncsc-2025-0147 | Kwetsbaarheden verholpen in F5 BIG-IP | 2025-05-09T08:07:32.002935Z | 2025-05-09T08:07:32.002935Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10343-1 | ruby4.0-rubygem-activerecord-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10342-1 | ruby4.0-rubygem-activemodel-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10341-1 | ruby4.0-rubygem-activejob-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10340-1 | ruby4.0-rubygem-actionview-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10339-1 | ruby4.0-rubygem-actiontext-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10338-1 | ruby4.0-rubygem-actionpack-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10337-1 | ruby4.0-rubygem-actionmailer-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10336-1 | ruby4.0-rubygem-actionmailbox-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10335-1 | ruby4.0-rubygem-actioncable-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10334-1 | python311-pypdf-6.8.0-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10333-1 | python311-multipart-1.3.1-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10332-1 | python311-PyPDF2-2.11.1-7.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10331-1 | mingw64-binutils-2.45.1-2.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10330-1 | mingw32-binutils-2.45.1-2.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10329-1 | kubelogin-0.2.16-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10328-1 | himmelblau-2.3.8+git0.dec3693-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10327-1 | heroic-games-launcher-2.20.1-3.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10326-1 | giflib-devel-32bit-5.2.2-3.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10325-1 | clamav-1.5.2-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10324-1 | MozillaFirefox-148.0.2-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:20361-1 | Security update for osc, obs-scm-bridge | 2026-03-12T20:54:40Z | 2026-03-12T20:54:40Z |
| opensuse-su-2026:20351-1 | Security update for amazon-ssm-agent | 2026-03-12T13:46:52Z | 2026-03-12T13:46:52Z |
| opensuse-su-2026:20350-1 | Security update for tomcat | 2026-03-12T13:46:00Z | 2026-03-12T13:46:00Z |
| opensuse-su-2026:20348-1 | Security update for python-PyPDF2 | 2026-03-11T20:15:02Z | 2026-03-11T20:15:02Z |
| opensuse-su-2026:20345-1 | Security update for python-lxml_html_clean | 2026-03-11T18:05:18Z | 2026-03-11T18:05:18Z |
| opensuse-su-2026:20342-1 | Security update for go1.26 | 2026-03-11T09:09:25Z | 2026-03-11T09:09:25Z |
| opensuse-su-2026:20341-1 | Security update for kea | 2026-03-11T08:51:21Z | 2026-03-11T08:51:21Z |
| opensuse-su-2026:20340-1 | Security update for cJSON | 2026-03-11T08:21:26Z | 2026-03-11T08:21:26Z |
| opensuse-su-2026:20339-1 | Security update for freerdp | 2026-03-10T12:34:56Z | 2026-03-10T12:34:56Z |
| opensuse-su-2026:10323-1 | traefik-3.6.10-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2571 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.9.2 security update | 2026-02-11T15:58:30+00:00 | 2026-05-04T09:30:16+00:00 |
| rhsa-2026:2568 | Red Hat Security Advisory: RHACS 4.9.3 security and bug fix update | 2026-02-11T15:09:41+00:00 | 2026-05-04T09:30:16+00:00 |
| rhsa-2026:2563 | Red Hat Security Advisory: Red Hat Update Infrastructure 5 security update | 2026-02-11T14:34:45+00:00 | 2026-05-04T09:30:15+00:00 |
| rhsa-2026:2500 | Red Hat Security Advisory: Red Hat multicluster global hub 1.4.4 security update | 2026-02-11T05:02:44+00:00 | 2026-05-04T09:30:15+00:00 |
| rhsa-2026:2351 | Red Hat Security Advisory: VolSync v0.13 security fixes and container updates | 2026-02-09T15:55:39+00:00 | 2026-05-04T09:30:14+00:00 |
| rhsa-2026:2350 | Red Hat Security Advisory: RHACS 4.9.3 security and bug fix update | 2026-02-09T15:50:42+00:00 | 2026-05-04T09:30:14+00:00 |
| rhsa-2026:2343 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-02-09T14:20:06+00:00 | 2026-05-04T09:30:13+00:00 |
| rhsa-2026:2256 | Red Hat Security Advisory: Red Hat multicluster global hub 1.5.3 security update | 2026-02-09T01:49:44+00:00 | 2026-05-04T09:30:12+00:00 |
| rhsa-2026:2172 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.15 security, enhancement & bug fix update | 2026-02-05T18:06:29+00:00 | 2026-05-04T09:30:11+00:00 |
| rhsa-2026:2164 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16 security, enhancement & bug fix update | 2026-02-05T17:49:21+00:00 | 2026-05-04T09:30:11+00:00 |
| rhsa-2026:2155 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17 security, enhancement & bug fix update | 2026-02-05T17:17:50+00:00 | 2026-05-04T09:30:11+00:00 |
| rhsa-2026:2137 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:26:20+00:00 | 2026-05-04T09:30:10+00:00 |
| rhsa-2026:2129 | Red Hat Security Advisory: OpenShift Container Platform 4.21.1 bug fix and security update | 2026-02-10T09:39:14+00:00 | 2026-05-04T09:30:10+00:00 |
| rhsa-2026:2126 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T14:55:08+00:00 | 2026-05-04T09:30:09+00:00 |
| rhsa-2026:2106 | Red Hat Security Advisory: RHOAI 2.25.2 - Red Hat OpenShift AI | 2026-02-05T13:38:32+00:00 | 2026-05-04T09:30:09+00:00 |
| rhsa-2026:2082 | Red Hat Security Advisory: OpenShift Container Platform 4.21.1 packages and security update | 2026-02-10T11:30:56+00:00 | 2026-05-04T09:30:09+00:00 |
| rhsa-2026:2071 | Red Hat Security Advisory: OpenShift Container Platform 4.18.33 packages and security update | 2026-02-11T04:55:25+00:00 | 2026-05-04T09:30:09+00:00 |
| rhsa-2026:2034 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.20 security, enhancement & bug fix update | 2026-02-05T06:37:04+00:00 | 2026-05-04T09:30:08+00:00 |
| rhsa-2026:1957 | Red Hat Security Advisory: python3.12-urllib3 security update | 2026-02-04T19:16:17+00:00 | 2026-05-04T09:30:08+00:00 |
| rhsa-2026:1942 | Red Hat Security Advisory: Red Hat Quay 3.15.3 | 2026-02-04T15:43:51+00:00 | 2026-05-04T09:30:08+00:00 |
| rhsa-2026:1838 | Red Hat Security Advisory: image-builder security update | 2026-02-05T16:02:26+00:00 | 2026-05-04T09:30:08+00:00 |
| rhsa-2026:1837 | Red Hat Security Advisory: osbuild-composer security update | 2026-02-05T16:03:01+00:00 | 2026-05-04T09:30:07+00:00 |
| rhsa-2026:1805 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T10:17:28+00:00 | 2026-05-04T09:30:07+00:00 |
| rhsa-2026:1803 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T09:45:07+00:00 | 2026-05-04T09:30:06+00:00 |
| rhsa-2026:1794 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T07:18:11+00:00 | 2026-05-04T09:30:06+00:00 |
| rhsa-2026:1793 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T07:17:26+00:00 | 2026-05-04T09:30:06+00:00 |
| rhsa-2026:1792 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T07:25:42+00:00 | 2026-05-04T09:30:05+00:00 |
| rhsa-2026:1791 | Red Hat Security Advisory: fence-agents security update | 2026-02-03T07:21:33+00:00 | 2026-05-04T09:30:05+00:00 |
| rhsa-2026:1736 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2026-02-02T17:31:06+00:00 | 2026-05-04T09:30:05+00:00 |
| rhsa-2026:1735 | Red Hat Security Advisory: fence-agents security update | 2026-02-02T17:50:59+00:00 | 2026-05-04T09:30:04+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| SSA-599968 | SSA-599968: Denial of Service Vulnerability in Profinet Devices | 2021-07-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| SSA-566905 | SSA-566905: Multiple Denial of Service Vulnerabilities in the Webserver of Industrial Products | 2023-04-11T00:00:00Z | 2024-09-10T00:00:00Z |
| SSA-540640 | SSA-540640: Improper Privilege Management Vulnerability in Mendix Runtime | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-482757 | SSA-482757: Missing Immutable Root of Trust in S7-1500 CPU devices | 2023-01-10T00:00:00Z | 2025-01-14T00:00:00Z |
| SSA-481506 | SSA-481506: Information Disclosure Vulnerability in SIMATIC S7-200 SMART Devices | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-446448 | SSA-446448: Denial of Service Vulnerability in PROFINET Stack Integrated on Interniche Stack | 2022-04-12T00:00:00Z | 2025-01-14T00:00:00Z |
| SSA-407785 | SSA-407785: Multiple X_T File Parsing Vulnerabilities in Parasolid and Teamcenter Visualization | 2023-08-08T00:00:00Z | 2024-08-13T00:00:00Z |
| SSA-398330 | SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP >= V3.1.0 and < V3.1.5 | 2023-12-12T00:00:00Z | 2025-08-12T00:00:00Z |
| SSA-353002 | SSA-353002: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00Z | 2025-08-12T00:00:00Z |
| SSA-341067 | SSA-341067: Multiple vulnerabilities in third-party components in ST7 ScadaConnect before V1.1 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-337522 | SSA-337522: Multiple Vulnerabilities in TIM 1531 IRC before V2.4.8 | 2024-06-11T00:00:00Z | 2024-07-09T00:00:00Z |
| SSA-319319 | SSA-319319: Denial of Service Vulnerability in TIA Administrator | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-238730 | SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-196737 | SSA-196737: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V1.2 | 2024-06-11T00:00:00Z | 2025-02-11T00:00:00Z |
| SSA-093430 | SSA-093430: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager before V3.0 | 2024-05-14T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-035466 | SSA-035466: Incorrect Permission Assignment in SICAM PAS/PQS | 2023-10-10T00:00:00Z | 2024-06-11T00:00:00Z |
| SSA-024584 | SSA-024584: Authentication Bypass Vulnerability in PowerSys before V3.11 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-976324 | SSA-976324: Multiple IGS File Parsing Vulnerabilities in PS/IGES Parasolid Translator Component before V27.1.215 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-968170 | SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products | 2023-06-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-953710 | SSA-953710: Vulnerabilities in the Network Communication Stack in Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-925850 | SSA-925850: Improper Access Control in Polarion ALM | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-871717 | SSA-871717: Multiple Vulnerabilities in Polarion ALM | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-665034 | SSA-665034: Vulnerability in Nozomi Guardian/CMC before 23.3.0 on RUGGEDCOM APE1808 devices | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-661579 | SSA-661579: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-647455 | SSA-647455: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.2 on RUGGEDCOM APE1808 devices | 2023-10-10T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-592380 | SSA-592380: Denial of Service Vulnerability in SIMATIC S7-1500 CPUs and related products | 2023-12-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-589937 | SSA-589937: Multiple Memory Corruption Vulnerabilities in Solid Edge | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-489698 | SSA-489698: X_T File Parsing Vulnerability in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1351-1 | Security update for bind | 2026-04-15T13:36:44Z | 2026-04-15T13:36:44Z |
| suse-su-2026:1350-1 | Security update for nghttp2 | 2026-04-15T13:36:21Z | 2026-04-15T13:36:21Z |
| suse-su-2026:1349-1 | Security update for python311 | 2026-04-15T13:35:56Z | 2026-04-15T13:35:56Z |
| suse-su-2026:1347-1 | Security update for vim | 2026-04-15T12:26:44Z | 2026-04-15T12:26:44Z |
| suse-su-2026:1345-1 | Security update for python36 | 2026-04-15T12:04:26Z | 2026-04-15T12:04:26Z |
| suse-su-2026:1344-1 | Security update for libssh | 2026-04-15T10:21:31Z | 2026-04-15T10:21:31Z |
| suse-su-2026:1343-1 | Security update for Mesa | 2026-04-15T10:18:55Z | 2026-04-15T10:18:55Z |
| suse-su-2026:1342-1 | Security update for the Linux Kernel | 2026-04-15T10:15:54Z | 2026-04-15T10:15:54Z |
| suse-su-2026:21197-1 | Security update for vim | 2026-04-15T08:14:48Z | 2026-04-15T08:14:48Z |
| suse-su-2026:21134-1 | Security update for vim | 2026-04-15T08:14:48Z | 2026-04-15T08:14:48Z |
| suse-su-2026:1338-1 | Security update for giflib | 2026-04-15T07:33:53Z | 2026-04-15T07:33:53Z |
| suse-su-2026:1337-1 | Security update for rust1.92 | 2026-04-15T07:33:26Z | 2026-04-15T07:33:26Z |
| suse-su-2026:1335-1 | Security update for xorg-x11-server | 2026-04-14T17:28:43Z | 2026-04-14T17:28:43Z |
| suse-su-2026:1333-1 | Security update for xorg-x11-server | 2026-04-14T17:18:59Z | 2026-04-14T17:18:59Z |
| suse-su-2026:1332-1 | Security update for xorg-x11-server | 2026-04-14T17:15:06Z | 2026-04-14T17:15:06Z |
| suse-su-2026:1331-1 | Security update for xorg-x11-server | 2026-04-14T17:11:37Z | 2026-04-14T17:11:37Z |
| suse-su-2026:1330-1 | Security update for xorg-x11-server | 2026-04-14T17:08:59Z | 2026-04-14T17:08:59Z |
| suse-su-2026:1329-1 | Security update for xwayland | 2026-04-14T17:06:20Z | 2026-04-14T17:06:20Z |
| suse-su-2026:1328-1 | Security update for xwayland | 2026-04-14T17:04:46Z | 2026-04-14T17:04:46Z |
| suse-su-2026:21195-1 | Security update for go1.26-openssl | 2026-04-14T15:41:55Z | 2026-04-14T15:41:55Z |
| suse-su-2026:21194-1 | Security update for plexus-utils | 2026-04-14T15:02:29Z | 2026-04-14T15:02:29Z |
| suse-su-2026:21192-1 | Security update for pam | 2026-04-14T13:47:51Z | 2026-04-14T13:47:51Z |
| suse-su-2026:21112-1 | Security update for pam | 2026-04-14T13:47:51Z | 2026-04-14T13:47:51Z |
| suse-su-2026:1325-1 | Security update for clamav | 2026-04-14T13:15:45Z | 2026-04-14T13:15:45Z |
| suse-su-2026:1324-1 | Security update for clamav | 2026-04-14T13:15:31Z | 2026-04-14T13:15:31Z |
| suse-su-2026:1323-1 | Security update for libpng16 | 2026-04-14T13:11:55Z | 2026-04-14T13:11:55Z |
| suse-su-2026:1322-1 | Security update for MozillaFirefox | 2026-04-14T12:42:11Z | 2026-04-14T12:42:11Z |
| suse-su-2026:1321-1 | Security update for go1.25 | 2026-04-14T12:40:53Z | 2026-04-14T12:40:53Z |
| suse-su-2026:1320-1 | Security update for go1.26 | 2026-04-14T12:39:43Z | 2026-04-14T12:39:43Z |
| suse-su-2026:21191-1 | Security update for cockpit-subscriptions | 2026-04-14T12:16:29Z | 2026-04-14T12:16:29Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1852 | Moderate: util-linux security update | 2026-02-03T00:00:00Z | 2026-02-10T08:33:43Z |
| alsa-2026:1903 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:31:08Z |
| alsa-2026:1904 | Important: resource-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:22:54Z |
| alsa-2026:1905 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:20:49Z |
| alsa-2026:1906 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:07:49Z |
| alsa-2026:1907 | Important: opentelemetry-collector security update | 2026-02-04T00:00:00Z | 2026-02-10T07:58:47Z |
| alsa-2026:1908 | Important: opentelemetry-collector security update | 2026-02-04T00:00:00Z | 2026-02-10T07:56:31Z |
| alsa-2026:1913 | Moderate: util-linux security update | 2026-02-04T00:00:00Z | 2026-02-10T07:54:49Z |
| alsa-2026:1939 | Important: python3.12-wheel security update | 2026-02-04T00:00:00Z | 2026-02-10T07:52:01Z |
| alsa-2026:2048 | Important: freerdp security update | 2026-02-05T00:00:00Z | 2026-02-10T07:49:11Z |
| alsa-2026:2220 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-10T07:45:12Z |
| alsa-2026:2286 | Important: thunderbird security update | 2026-02-09T00:00:00Z | 2026-02-09T12:36:11Z |
| alsa-2026:2264 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-09T11:47:42Z |
| alsa-2026:2271 | Important: firefox security update | 2026-02-09T00:00:00Z | 2026-02-09T11:39:07Z |
| alsa-2026:2215 | Important: libsoup security update | 2026-02-09T00:00:00Z | 2026-02-09T11:36:21Z |
| alsa-2026:2124 | Important: osbuild-composer security update | 2026-02-05T00:00:00Z | 2026-02-09T11:33:23Z |
| alsa-2026:2039 | Important: fontforge security update | 2026-02-05T00:00:00Z | 2026-02-06T21:29:46Z |
| alsa-2026:1831 | Moderate: qemu-kvm security update | 2026-02-03T00:00:00Z | 2026-02-06T17:34:44Z |
| alsa-2026:1837 | Moderate: osbuild-composer security update | 2026-02-03T00:00:00Z | 2026-02-06T17:33:01Z |
| alsa-2026:2182 | Important: libsoup3 security update | 2026-02-05T00:00:00Z | 2026-02-06T17:31:52Z |
| alsa-2026:1842 | Important: nodejs24 security update | 2026-02-03T00:00:00Z | 2026-02-06T17:30:17Z |
| alsa-2026:1843 | Important: nodejs22 security update | 2026-02-03T00:00:00Z | 2026-02-06T17:27:45Z |
| alsa-2026:2081 | Important: freerdp security update | 2026-02-05T00:00:00Z | 2026-02-06T08:53:33Z |
| alsa-2026:2090 | Important: python3.12-wheel security update | 2026-02-05T00:00:00Z | 2026-02-06T08:49:17Z |
| alsa-2026:2128 | Moderate: python3 security update | 2026-02-05T00:00:00Z | 2026-02-06T08:39:22Z |
| alsa-2026:1617 | Moderate: kernel security update | 2026-02-02T00:00:00Z | 2026-02-06T08:24:53Z |
| alsa-2026:2042 | Important: brotli security update | 2026-02-05T00:00:00Z | 2026-02-05T12:08:23Z |
| alsa-2026:1690 | Important: kernel security update | 2026-02-02T00:00:00Z | 2026-02-05T09:56:48Z |
| alsa-2026:1902 | Important: python-wheel security update | 2026-02-04T00:00:00Z | 2026-02-05T09:52:44Z |
| alsa-2026:1825 | Moderate: curl security update | 2026-02-03T00:00:00Z | 2026-02-05T09:50:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-684 | Heap-buffer-overflow in TGAHandler::read | 2025-08-25T00:17:17.781502Z | 2025-08-25T00:17:17.782094Z |
| osv-2025-677 | Heap-buffer-overflow in TGAHandler::read | 2025-08-23T00:05:27.168432Z | 2025-08-23T00:05:27.168725Z |
| osv-2025-373 | Heap-use-after-free in aiMesh::~aiMesh | 2025-05-17T00:11:17.621374Z | 2025-08-22T19:20:38.723565Z |
| osv-2022-908 | Heap-buffer-overflow in element_end | 2022-09-18T00:02:08.324002Z | 2025-08-20T14:46:01.613271Z |
| osv-2025-657 | Heap-use-after-free in ftp_pp_statemachine | 2025-08-20T00:12:09.699805Z | 2025-08-20T00:12:09.700264Z |
| osv-2022-624 | Heap-buffer-overflow in Assimp::MD5::MD5Parser::ParseHeader | 2022-07-25T00:02:02.600456Z | 2025-08-19T09:51:59.993647Z |
| osv-2025-638 | Security exception in com.fasterxml.jackson.databind.deser.std.UntypedObjectDeserializer$Vanilla.deser | 2025-08-17T00:01:49.946822Z | 2025-08-17T14:48:59.288257Z |
| osv-2025-634 | Null-dereference READ in enc_fuzzer@Enc.EncTest | 2025-08-15T00:17:04.845331Z | 2025-08-15T00:17:04.845683Z |
| osv-2025-633 | UNKNOWN WRITE in _lou_handlePassVariableAction | 2025-08-15T00:16:54.142913Z | 2025-08-15T00:16:54.143400Z |
| osv-2025-631 | Null-dereference READ in advanced_api_fuzzer@AdvancedApi.AdvancedApiTest | 2025-08-15T00:02:42.080995Z | 2025-08-15T00:02:42.081563Z |
| osv-2024-772 | UNKNOWN READ in H5SL_search | 2024-08-16T00:00:44.075617Z | 2025-08-14T14:39:54.764895Z |
| osv-2024-1010 | UNKNOWN READ in H5SL_first | 2024-08-16T00:16:31.692553Z | 2025-08-14T14:39:40.358063Z |
| osv-2025-628 | Null-dereference READ in ubsan_GetStackTrace | 2025-08-14T00:15:27.806312Z | 2025-08-14T00:15:27.806631Z |
| osv-2025-627 | Null-dereference READ in ProcessRows | 2025-08-14T00:14:14.245302Z | 2025-08-14T00:14:14.245619Z |
| osv-2025-622 | Heap-buffer-overflow in cc_storage_append | 2025-08-13T00:16:18.937393Z | 2025-08-13T00:16:18.937719Z |
| osv-2025-620 | Heap-buffer-overflow in FragPrepareChunk | 2025-08-12T00:14:23.793424Z | 2025-08-12T00:14:23.793828Z |
| osv-2025-619 | Heap-buffer-overflow in webvtt_domnode_SelectNodesInTree | 2025-08-12T00:13:01.748418Z | 2025-08-12T00:13:01.748751Z |
| osv-2025-618 | Heap-buffer-overflow in iTUNTripletCallback | 2025-08-12T00:05:50.847179Z | 2025-08-12T00:05:50.847582Z |
| osv-2025-617 | UNKNOWN WRITE in MP4_BoxFree | 2025-08-12T00:04:18.009473Z | 2025-08-12T00:04:18.009816Z |
| osv-2025-616 | Heap-buffer-overflow in Open | 2025-08-12T00:00:48.056276Z | 2025-08-12T00:00:48.056623Z |
| osv-2025-615 | Index-out-of-bounds in hevc_get_picture_size | 2025-08-12T00:00:42.725434Z | 2025-08-12T00:00:42.725767Z |
| osv-2025-614 | Heap-buffer-overflow in hevc_hvcC_to_AnnexB_NAL | 2025-08-12T00:00:36.634849Z | 2025-08-12T00:00:36.635239Z |
| osv-2025-613 | Heap-buffer-overflow in check_sync_pes | 2025-08-12T00:00:33.354786Z | 2025-08-12T00:00:33.355391Z |
| osv-2025-608 | Heap-buffer-overflow in _dwarf_memcpy_noswap_bytes | 2025-08-09T00:02:00.092320Z | 2025-08-11T14:17:56.957704Z |
| osv-2024-380 | Heap-use-after-free in H5FL__blk_gc_list | 2024-04-30T00:12:11.366893Z | 2025-08-06T15:10:14.893372Z |
| osv-2025-600 | Heap-buffer-overflow in generic_unpack | 2025-08-05T00:10:00.536266Z | 2025-08-05T00:10:00.536669Z |
| osv-2025-597 | Heap-buffer-overflow in generic_unpack | 2025-08-04T00:08:26.345735Z | 2025-08-04T00:08:26.346368Z |
| osv-2025-591 | UNKNOWN READ in mov_read_header | 2025-08-02T00:02:00.509459Z | 2025-08-02T00:02:00.510035Z |
| osv-2025-589 | Heap-buffer-overflow in isvcd_decode_recon_tfr_nmb_base_lyr | 2025-08-01T00:10:54.848946Z | 2025-08-01T00:10:54.849286Z |
| osv-2025-584 | Heap-buffer-overflow in isvcd_mark_err_slice_skip | 2025-07-31T00:09:08.538145Z | 2025-07-31T00:09:08.538507Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0059 | servo-fontconfig crate is unmaintained | 2025-09-08T12:00:00Z | 2025-09-08T09:09:54Z |
| rustsec-2025-0058 | custom_derive crate is unmaintained | 2025-09-07T12:00:00Z | 2025-09-07T08:38:20Z |
| rustsec-2025-0057 | fxhash - no longer maintained | 2025-09-05T12:00:00Z | 2025-09-05T19:09:01Z |
| rustsec-2025-0056 | adler crate is unmaintained, use adler2 instead | 2025-09-05T12:00:00Z | 2025-09-05T09:05:48Z |
| rustsec-2025-0055 | Logging user input may result in poisoning logs with ANSI escape sequences | 2025-08-29T12:00:00Z | 2025-09-02T11:05:02Z |
| rustsec-2020-0095 | difference is unmaintained | 2020-12-20T12:00:00Z | 2025-08-30T06:09:56Z |
| rustsec-2025-0052 | async-std has been discontinued | 2025-08-24T12:00:00Z | 2025-08-27T11:36:30Z |
| rustsec-2025-0048 | tsify-next is unmaintained, use tsify instead | 2025-07-29T12:00:00Z | 2025-08-13T14:05:32Z |
| rustsec-2025-0047 | Out-of-bounds access in `get_disjoint_mut` due to incorrect bounds check | 2025-08-12T12:00:00Z | 2025-08-12T09:41:13Z |
| rustsec-2025-0012 | `backoff` is unmaintained. | 2025-03-04T12:00:00Z | 2025-08-06T09:33:04Z |
| rustsec-2025-0046 | Host panic with `fd_renumber` WASIp1 function | 2025-07-18T12:00:00Z | 2025-07-18T19:48:13Z |
| rustsec-2025-0045 | ConstStaticCell could have been used to pass non-Send values to another thread | 2025-07-17T12:00:00Z | 2025-07-17T14:38:11Z |
| rustsec-2025-0043 | matrix-sdk-sqlite: SQL injection vulnerability in `SqliteEventCacheStore::find_event_with_relations` | 2025-07-11T12:00:00Z | 2025-07-11T15:30:12Z |
| rustsec-2025-0041 | matrix-sdk-crypto vulnerable to encrypted event sender spoofing by homeserver administrator | 2025-06-11T12:00:00Z | 2025-06-12T09:17:43Z |
| rustsec-2025-0036 | surf is unmaintained | 2025-05-17T12:00:00Z | 2025-05-17T13:43:35Z |
| rustsec-2025-0028 | cve-rs introduces memory vulnerabilities in safe Rust | 2025-02-10T12:00:00Z | 2025-05-06T21:08:48Z |
| rustsec-2025-0030 | totally-safe-transmute allows transmuting any type to any other type in safe Rust | 2025-02-10T12:00:00Z | 2025-05-06T20:14:30Z |
| rustsec-2025-0029 | totally-safe introduces memory vulnerabilities in safe Rust | 2025-02-10T12:00:00Z | 2025-05-05T18:31:28Z |
| rustsec-2024-0441 | Panic when using a dropped extenref-typed element segment | 2024-04-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0440 | Runtime crash when combining tail calls with stack traces | 2024-10-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0439 | Race condition could lead to WebAssembly control-flow integrity and type safety violations | 2024-10-03T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0438 | Wasmtime doesn't fully sandbox all the Windows device filenames | 2024-11-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0093 | Miscompilation of `i8x16.select` with the same inputs on x86\_64 | 2023-03-03T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0092 | Undefined Behavior in Rust runtime functions | 2023-04-21T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0091 | Miscompilation of wasm `i64x2.shr_s` instruction with constant input on x86\_64 | 2023-09-05T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0090 | Guest-controlled out-of-bounds read/write on x86\_64 | 2023-03-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0102 | Out of bounds read/write with zero-memory-pages configuration | 2022-11-05T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0100 | Use After Free with `externref`s in Wasmtime | 2022-07-12T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0099 | Use after free with `externref`s and epoch interruption in Wasmtime | 2022-03-28T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0098 | Data leakage between instances in the pooling allocator | 2022-11-05T12:00:00Z | 2025-05-02T08:23:27Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2024-56197 | Users can see other user's tagged PMs in Discourse | 2025-02-20T10:31:38.504Z | 2026-03-25T09:15:17.567Z |
| bit-tomcat-2023-28709 | Apache Tomcat: Fix for CVE-2023-24998 is incomplete | 2026-03-24T10:21:40.054Z | 2026-03-24T10:46:38.869Z |
| bit-tomcat-2023-28708 | Apache Tomcat: JSESSIONID Cookie missing secure attribute in some configurations | 2026-03-24T10:21:38.576Z | 2026-03-24T10:46:38.869Z |
| bit-valkey-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:19:55.260Z | 2026-03-21T09:12:01.983Z |
| bit-redis-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:18:53.323Z | 2026-03-21T09:12:01.983Z |
| bit-keydb-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:12:52.562Z | 2026-03-21T09:12:01.983Z |
| bit-tomcat-2025-55752 | Apache Tomcat: Directory traversal via rewrite with possible RCE if PUT is enabled | 2025-11-06T13:00:31.694Z | 2026-03-20T13:43:29.174Z |
| bit-tomcat-2025-49125 | Apache Tomcat: Security constraint bypass for pre/post-resources | 2025-07-10T10:47:18.953Z | 2026-03-20T13:43:29.174Z |
| bit-tomcat-2025-24813 | Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT | 2025-07-10T10:46:47.051Z | 2026-03-20T13:43:29.174Z |
| bit-tomcat-2025-53506 | Apache Tomcat: DoS via excessive h2 streams at connection start | 2025-07-16T08:19:04.361Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2025-49124 | Apache Tomcat: exe side-loading via icalcs.exe in Tomcat installer for Windows | 2025-06-20T06:04:24.795Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2025-31651 | Apache Tomcat: Bypass of rules in Rewrite Valve | 2025-07-10T10:46:54.240Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-56337 | Apache Tomcat: RCE due to TOCTOU issue in JSP compilation - CVE-2024-50379 mitigation was incomplete | 2025-07-10T10:46:39.151Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-52317 | Apache Tomcat: Request/response mix-up with HTTP/2 | 2024-11-20T07:20:06.896Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-52316 | Apache Tomcat: Authentication bypass when using Jakarta Authentication API | 2025-07-10T10:46:05.150Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-38286 | Apache Tomcat: Denial of Service | 2024-11-09T07:20:25.873Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-34750 | Apache Tomcat: HTTP/2 excess header handling DoS | 2025-07-29T14:30:29.115Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-24549 | Apache Tomcat: HTTP/2 header handling DoS | 2025-07-17T08:09:49.355Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-21733 | Apache Tomcat: Leaking of unrelated request bodies in default error page | 2024-03-06T11:07:26.980Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-46589 | Apache Tomcat: HTTP request smuggling via malformed trailer headers | 2024-03-06T11:07:35.204Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-45648 | Apache Tomcat: Trailer header parsing too lenient | 2024-03-06T11:07:43.292Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-42795 | Apache Tomcat: Failure during request clean-up leads to sensitive data leaking to subsequent requests | 2024-03-06T11:08:01.506Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-41080 | Apache Tomcat: Open redirect with FORM authentication | 2024-03-06T11:08:22.964Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-33163 | Parse Server leaks protected fields via LiveQuery afterEvent trigger | 2026-03-20T11:37:51.448Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-33042 | Parse Server affected by empty authData bypassing credential requirement on signup | 2026-03-20T11:37:48.161Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32944 | Parse Server crash via deeply nested query condition operators | 2026-03-20T11:37:45.054Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32943 | Parse Server has a password reset token single-use bypass via concurrent requests | 2026-03-20T11:37:41.707Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32886 | Parse Server's Cloud function dispatch crashes server via prototype chain traversal | 2026-03-20T11:37:38.226Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32878 | Parse Server vulnerable to schema poisoning via prototype pollution in deep copy | 2026-03-20T11:37:35.433Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32770 | Parse Server: LiveQuery subscription with invalid regular expression crashes server | 2026-03-20T11:37:32.539Z | 2026-03-20T12:05:40.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ds01292 | Security fixes for CVE-2025-47910, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-27141, ghsa-9h8m-3fm2-qjrq applied in versions: 1.19.1-r0, 1.19.2-r0, 1.19.2-r1 | 2026-04-01T10:03:13.135534Z | 2026-03-10T06:29:01Z |
| cleanstart-2026-jo97977 | Security fixes for ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T10:02:43.649563Z | 2026-03-10T06:18:32Z |
| cleanstart-2026-fo41609 | Security fixes for CVE-2025-48924, ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j288-q9x7-2f5v, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 8.19.12-r0, 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T10:02:50.908381Z | 2026-03-10T06:14:42Z |
| cleanstart-2026-fz71456 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.18-r0 | 2026-04-01T10:02:32.121585Z | 2026-03-10T06:07:45Z |
| cleanstart-2026-df22934 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, ghsa-6v2p-p543-phr9, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-q754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-qxp5-gwg8-xv66, ghsa-v778-237x-gjrc, ghsa-vvgc-356p-c3xw applied in versions: 0.28.0-r0, 0.28.0-r1 | 2026-04-01T10:03:39.072806Z | 2026-03-09T13:31:49Z |
| cleanstart-2026-ew27017 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.10.0-r0, 1.10.0-r1 | 2026-04-01T10:03:13.124366Z | 2026-03-09T13:26:38Z |
| cleanstart-2026-zv38826 | Within HostnameError | 2026-03-10T01:00:05.764793Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-xh31600 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:58:05.974960Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ra63757 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:56:05.142237Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-qk48981 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:00:35.988532Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-oh74241 | Security fixes for GHSA-MQQF-5WVP-8FH8 applied in versions: 0.122-r0 | 2026-03-10T00:58:07.551022Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-od98869 | Within HostnameError | 2026-03-10T00:59:05.580952Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-mo83449 | Within HostnameError | 2026-03-10T00:59:35.550450Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-jz91219 | Within HostnameError | 2026-03-10T00:59:35.590693Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ir62391 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:48:33.059735Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-gj95666 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:04:41.222114Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-dt66006 | Within HostnameError | 2026-03-10T00:58:35.493841Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-av02020 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:58:05.928030Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-af35851 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:02:37.708854Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ab04032 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-10T00:58:35.570783Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ff20499 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0 | 2026-04-01T10:04:06.598747Z | 2026-03-09T11:52:12Z |
| cleanstart-2026-bf73214 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.17-r0 | 2026-04-01T10:03:56.655073Z | 2026-03-07T09:14:49Z |
| cleanstart-2026-ar56257 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.16-r0 | 2026-04-01T10:03:58.074474Z | 2026-03-07T09:14:16Z |
| cleanstart-2026-jr53141 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:46.660054Z | 2026-03-07T09:11:28Z |
| cleanstart-2026-lu31244 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:46.726872Z | 2026-03-07T09:10:59Z |
| cleanstart-2026-pr27884 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:52.407214Z | 2026-03-07T09:10:08Z |
| cleanstart-2026-qx99194 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:06:00.100216Z | 2026-03-07T09:08:53Z |
| cleanstart-2026-qy24299 | @octokit/endpoint turns REST API endpoints into generic request options | 2026-03-07T00:39:47.646997Z | 2026-03-06T13:08:41Z |
| cleanstart-2026-pp62083 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-07T00:39:46.558367Z | 2026-03-06T13:08:41Z |
| cleanstart-2026-gi57625 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-07T00:39:46.578400Z | 2026-03-06T13:08:41Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2014-ale-011 | Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows | 2014-11-18T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2015-ALE-001 | Vulnérabilité dans Adobe Flash Player | 2015-01-22T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-011 | Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows | 2014-11-18T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| CERTFR-2014-ALE-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| certfr-2014-ale-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| CERTFR-2014-ALE-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| certfr-2014-ale-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| CERTFR-2014-ALE-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| certfr-2014-ale-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| CERTFR-2014-ALE-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| certfr-2014-ale-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| CERTFR-2014-ALE-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| certfr-2014-ale-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| CERTFR-2014-ALE-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| certfr-2014-ale-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| CERTFR-2014-ALE-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| certfr-2014-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| CERTFR-2014-ALE-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| certa-2013-ale-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| CERTA-2013-ALE-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| certa-2013-ale-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| CERTA-2013-ALE-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| certa-2013-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| CERTA-2013-ALE-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| certa-2005-ale-013 | Vulnérabilité dans Citrix Metaframe Presentation | 2005-10-07T00:00:00.000000 | 2013-06-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0162 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0161 | Vulnérabilité dans Tenable Nessus Agent | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0144 | Multiples vulnérabilités dans Ivanti Endpoint Manager | 2026-02-11T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0162 | Multiples vulnérabilités dans Juniper Networks Secure Analytics | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0161 | Vulnérabilité dans Tenable Nessus Agent | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| CERTFR-2026-AVI-0144 | Multiples vulnérabilités dans Ivanti Endpoint Manager | 2026-02-11T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0160 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0159 | Multiples vulnérabilités dans Keycloak | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0158 | Multiples vulnérabilités dans les produits Apple | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0157 | Multiples vulnérabilités dans les produits Qnap | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0156 | Multiples vulnérabilités dans Google Chrome | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000098 | Multiple products from KINGSOFT JAPAN vulnerable to path traversal | 2024-09-06T15:07+09:00 | 2024-09-06T15:07+09:00 |
| jvndb-2024-000090 | Secure Boot bypass Vulnerability in PRIMERGY | 2024-09-06T14:39+09:00 | 2024-09-06T14:39+09:00 |
| jvndb-2024-000093 | WordPress Plugin "Advanced Custom Fields" vulnerable to cross-site scripting | 2024-09-04T13:01+09:00 | 2024-09-04T13:01+09:00 |
| jvndb-2024-007002 | Panasonic Control FPWIN Pro7 vulnerable to stack-based buffer overflow | 2024-09-02T14:57+09:00 | 2024-09-02T14:57+09:00 |
| jvndb-2024-000091 | IPCOM vulnerable to information disclosure | 2024-08-30T14:56+09:00 | 2024-08-30T14:56+09:00 |
| jvndb-2024-000092 | Multiple vulnerabilities in WordPress plugin "Carousel Slider" | 2024-08-30T13:58+09:00 | 2024-08-30T13:58+09:00 |
| jvndb-2024-006787 | xfpt vulnerable to stack-based buffer overflow | 2024-08-29T14:07+09:00 | 2024-08-29T14:07+09:00 |
| jvndb-2024-000086 | Multiple Safie products vulnerable to improper server certificate verification | 2024-08-22T13:51+09:00 | 2024-08-29T12:23+09:00 |
| jvndb-2024-006646 | Authentication Bypass Vulnerability in Hitachi Ops Center Common Services | 2024-08-27T12:01+09:00 | 2024-08-27T12:01+09:00 |
| jvndb-2024-006367 | Unquoted Service Path in Hitachi Device Manager | 2024-08-26T16:27+09:00 | 2024-08-26T16:27+09:00 |
| jvndb-2024-000087 | BUFFALO wireless LAN routers and wireless LAN repeaters vulnerable to OS command injection | 2024-08-23T14:17+09:00 | 2024-08-23T14:17+09:00 |
| jvndb-2020-007305 | Installer of Trend Micro Security 2020 (Consumer) may insecurely load Dynamic Link Libraries | 2024-08-22T11:33+09:00 | 2024-08-22T11:33+09:00 |
| jvndb-2017-009536 | Packetbeat vulnerable to denial-of-service (DoS) | 2024-08-21T17:54+09:00 | 2024-08-21T17:54+09:00 |
| jvndb-2018-009127 | Multiple vulnerabilities in LogonTracer | 2024-08-21T17:37+09:00 | 2024-08-21T17:37+09:00 |
| jvndb-2020-002957 | A vulnerability in TOYOTA MOTOR's DCU (Display Control Unit) | 2024-08-20T18:12+09:00 | 2024-08-20T18:12+09:00 |
| jvndb-2020-007306 | Trend Micro Security (Consumer) Driver vulnerable to Out-of-bounds Read | 2024-08-20T17:52+09:00 | 2024-08-20T17:52+09:00 |
| jvndb-2024-000085 | "Rakuten Ichiba App" fails to restrict custom URL schemes properly | 2024-08-20T16:56+09:00 | 2024-08-20T16:56+09:00 |
| jvndb-2024-005167 | EL Injection Vulnerability in Hitachi Tuning Manager | 2024-08-15T09:38+09:00 | 2024-08-15T09:38+09:00 |
| jvndb-2016-000124 | WAON service app for Android fails to verify SSL server certificates | 2024-08-15T09:36+09:00 | 2024-08-15T09:36+09:00 |
| jvndb-2024-000083 | Firmware update for RICOH JavaTM Platform resets the TLS configuration | 2024-08-06T15:13+09:00 | 2024-08-06T15:13+09:00 |
| jvndb-2024-000079 | Cybozu Office vulnerable to bypass browsing restrictions in Custom App | 2024-08-06T14:59+09:00 | 2024-08-06T14:59+09:00 |
| jvndb-2024-000082 | Pimax Play and PiTool accept WebSocket connections from unintended endpoints | 2024-08-05T13:58+09:00 | 2024-08-05T13:58+09:00 |
| jvndb-2024-000084 | Multiple vulnerabilities in ZEXELON ZWX-2000CSW2-HN | 2024-08-05T13:46+09:00 | 2024-08-05T13:46+09:00 |
| jvndb-2024-000074 | Multiple vulnerabilities in SKYSEA Client View | 2024-07-29T15:28+09:00 | 2024-07-31T14:12+09:00 |
| jvndb-2024-000077 | FFRI AMC vulnerable to OS command injection | 2024-07-30T16:40+09:00 | 2024-07-30T16:40+09:00 |
| jvndb-2024-000081 | EC-CUBE plugin (for EC-CUBE 4 series) "EC-CUBE Web API Plugin" vulnerable to stored cross-site scripting | 2024-07-30T14:06+09:00 | 2024-07-30T14:06+09:00 |
| jvndb-2024-000080 | EC-CUBE 4 Series improper input validation when installing plugins | 2024-07-30T13:56+09:00 | 2024-07-30T13:56+09:00 |
| jvndb-2024-000028 | Multiple vulnerabilities in SKYSEA Client View | 2024-03-07T16:09+09:00 | 2024-07-29T18:13+09:00 |
| jvndb-2024-000076 | SDoP contains a stack-based buffer overflow vulnerability. | 2024-07-29T17:24+09:00 | 2024-07-29T17:24+09:00 |
| jvndb-2024-003242 | OMRON NJ/NX series vulnerable to insufficient verification of data authenticity | 2024-05-28T12:28+09:00 | 2024-07-26T16:27+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16594 | Adobe Commerce路径遍历漏洞(CNVD-2026-16594) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16593 | Adobe Commerce开放重定向漏洞 | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16592 | Adobe Commerce服务端请求伪造漏洞 | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16590 | Totolink A3300R命令注入漏洞 | 2026-04-08 | 2026-04-09 |
| cnvd-2026-16589 | NVIDIA Delegated Licensing Service授权问题漏洞 | 2026-03-04 | 2026-04-09 |
| cnvd-2026-16588 | Adobe Commerce输入验证错误漏洞(CNVD-2026-16588) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16587 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16587) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16586 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16586) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16585 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16585) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16584 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16584) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16583 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16583) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16582 | Adobe Commerce跨站脚本漏洞(CNVD-2026-16582) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16581 | Adobe Commerce安全绕过漏洞(CNVD-2026-16581) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16580 | Adobe Commerce安全绕过漏洞(CNVD-2026-16580) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16579 | Adobe Commerce安全绕过漏洞(CNVD-2026-16579) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16578 | Adobe Commerce安全绕过漏洞(CNVD-2026-16578) | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16577 | WordPress插件Easy Post Submission存在未明漏洞 | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16576 | WordPress插件Eagle BookingSQL注入漏洞 | 2026-03-17 | 2026-04-09 |
| cnvd-2026-16412 | HCL AION信息泄露漏洞(CNVD-2026-16412) | 2025-10-20 | 2026-04-09 |
| cnvd-2026-16411 | HCL AION代码执行漏洞(CNVD-2026-16411) | 2025-10-20 | 2026-04-09 |
| cnvd-2026-16410 | HCL AION存在未明漏洞(CNVD-2026-16410) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16409 | HCL AION信息泄露漏洞(CNVD-2026-16409) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16408 | HCL AION文件上传漏洞 | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16407 | HCL AION存在未明漏洞(CNVD-2026-16407) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16406 | HCL AION存在未明漏洞(CNVD-2026-16406) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16405 | HCL AION信息泄露漏洞(CNVD-2026-16405) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16403 | HCL AION信息泄露漏洞(CNVD-2026-16403) | 2026-02-11 | 2026-04-09 |
| cnvd-2026-16402 | HCL AION存在未明漏洞(CNVD-2026-16402) | 2026-02-11 | 2026-04-09 |
| cnvd-2026-16404 | HCL AION安全绕过漏洞(CNVD-2026-16404) | 2026-01-29 | 2026-04-08 |
| cnvd-2026-16401 | HCL AION跨站请求伪造漏洞 | 2026-02-11 | 2026-04-08 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-12301 | Уязвимость библиотеки Perl для поиска файлов File::Find::Rule, позволяющая нарушителю пол… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12300 | Уязвимость ядра операционной системы Linux, связанная с выделением неограниченной памяти,… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12298 | Уязвимость компонента iwlwifi ядра операционной системы Linux, позволяющая нарушителю выз… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12294 | Уязвимость компонента powerpc/code-patching ядра операционной системы Linux, позволяющая … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12290 | Уязвимость компонента qibfs ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12288 | Уязвимость компонента genirq/msi ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12285 | Уязвимость компонента umem_odp.c ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12283 | Уязвимость функции btrfs_dec_ref() ядра операционной системы Linux, позволяющая нарушител… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12282 | Уязвимость компонента net_sched ядра операционной системы Linux, позволяющая нарушителю в… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12281 | Уязвимость компонента x86/mm ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12278 | Уязвимость ядра операционной системы Linux, связанная с некорректным вычислением, позволя… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12277 | Уязвимость функции __legitimize_mnt() компонента fs/namespace.c ядра операционной системы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12276 | Уязвимость компонента acpi ядра операционной системы Linux, позволяющая нарушителю вызват… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12275 | Уязвимость компонента chip.c ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12274 | Уязвимость функции demangle_const компонента libiberty/rust-demangle.c компилятора GCC, п… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12273 | Уязвимость компонента mtk_star_emac.c ядра операционной системы Linux, позволяющая наруши… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12272 | Уязвимость компонента filter.c ядра операционной системы Linux, позволяющая нарушителю вы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12271 | Уязвимость компонента btrfs ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12270 | Уязвимость компонента memcg ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12261 | Уязвимость компонента f_midi ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12260 | Уязвимость компонента mhi ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12257 | Уязвимость ядра операционной системы Linux, связанная с недостаточной блокировкой, позвол… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12256 | Уязвимость компонентов xenbus ядра операционной системы Linux, позволяющая нарушителю вы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12255 | Уязвимость функции ReadRequestFromClient компонента os/io.c реализации протокола Wayland … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12254 | Уязвимость ядра операционной системы Linux, связанная с ошибками инициализации памяти, по… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12253 | Уязвимость ядра операционной системы Linux, связанная с ошибками инициализации памяти, по… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12252 | Уязвимость компонента mlxreg ядра операционной системы Linux, позволяющая нарушителю оказ… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12248 | Уязвимость компонента KVM ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12246 | Уязвимость компонента dispc.c ядра операционной системы Linux, позволяющая нарушителю пол… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12245 | Уязвимость компонента nfs4state.c ядра операционной системы Linux, позволяющая нарушителю… | 28.09.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200512-0299 | Heap-based buffer overflow in rsync in Mac OS X 10.4 through 10.4.5 allows remote authent… | 2024-07-23T21:40:52.289000Z |
| var-202212-2277 | An integer underflow in Organization Specific TLV was found in various versions of OpenvS… | 2024-07-23T21:40:51.741000Z |
| var-200912-0756 | The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Wind… | 2024-07-23T21:40:51.958000Z |
| var-201210-0456 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:40:50.864000Z |
| var-200712-0433 | Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) f… | 2024-07-23T21:40:50.122000Z |
| var-201904-1460 | A cross-site scripting issue existed in Safari. This issue was addressed with improved UR… | 2024-07-23T21:40:45.159000Z |
| var-201806-1466 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:40:45.074000Z |
| var-201501-0436 | The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1… | 2024-07-23T21:40:45.003000Z |
| var-200704-0226 | Apple File Protocol (AFP) Client in Apple Mac OS X 10.3.9 through 10.4.9 does not properl… | 2024-07-23T21:40:44.831000Z |
| var-201605-0465 | The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple … | 2024-07-23T21:40:43.806000Z |
| var-202010-1510 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T21:40:40.672000Z |
| var-201103-0114 | The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x be… | 2024-07-23T21:40:40.823000Z |
| var-201302-0262 | Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.… | 2024-07-23T21:40:39.972000Z |
| var-201109-0201 | Use-after-free vulnerability in the document loader in Google Chrome before 14.0.835.163 … | 2024-07-23T21:40:39.355000Z |
| var-200505-1240 | The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a d… | 2024-07-23T21:40:35.490000Z |
| var-201912-1857 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:39:57.528000Z |
| var-202104-0752 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2024-07-23T21:39:56.465000Z |
| var-200902-0880 | International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in A… | 2024-07-23T21:39:24.164000Z |
| var-201908-1958 | The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently l… | 2024-07-23T21:39:23.746000Z |
| var-200102-0052 | Cisco Catalyst 6000, 5000, or 4000 switches allow remote attackers to cause a denial of s… | 2024-07-23T21:39:23.577000Z |
| var-201708-0038 | The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 al… | 2024-07-23T21:39:15.769000Z |
| var-200901-0706 | WebKit in Apple Safari before 4.0 does not prevent remote loading of local Java applets, … | 2024-07-23T21:39:10.742000Z |
| var-202112-1608 | A carefully crafted request body can cause a buffer overflow in the mod_lua multipart par… | 2024-07-23T21:38:29.659000Z |
| var-202301-1703 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2024-07-23T21:38:27.556000Z |
| var-202103-0287 | A flaw possibility of race condition and incorrect initialization of the process id was f… | 2024-07-23T21:38:27.231000Z |
| var-201011-0174 | ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute … | 2024-07-23T21:37:24.567000Z |
| var-202106-0343 | Improper isolation of shared resources in some Intel(R) Processors may allow an authentic… | 2024-07-23T21:37:23.721000Z |
| var-201506-0268 | The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before… | 2024-07-23T21:36:44.513000Z |
| var-201904-0744 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:36:28.176000Z |
| var-201606-0329 | Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/us… | 2024-07-23T21:36:28.630000Z |