Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1584 |
7.5 (3.1)
|
Gnutls: gnutls: remote denial of service via crafted c… |
Red Hat |
Red Hat Hardened Images |
2026-04-09T18:00:21.184Z | 2026-05-03T13:15:17.692Z |
| CVE-2026-7695 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Acrel Electrical EEMS Enterprise Power Operation and M… |
Acrel Electrical |
EEMS Enterprise Power Operation and Maintenance Cloud Platform |
2026-05-03T12:15:36.951Z | 2026-05-03T12:15:36.951Z |
| CVE-2026-7694 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Acrel Electrical ECEMS Enterprise Microgrid Energy Eff… |
Acrel Electrical |
ECEMS Enterprise Microgrid Energy Efficiency Management System |
2026-05-03T11:45:39.522Z | 2026-05-03T11:45:39.522Z |
| CVE-2026-7688 |
2.3 (4.0)
5 (3.1)
5 (3.0)
|
Dolibarr ERP CRM Shipments API Endpoint expedition.cla… |
Dolibarr |
ERP CRM |
2026-05-03T09:15:11.998Z | 2026-05-03T09:15:11.998Z |
| CVE-2025-3359 |
6.2 (3.1)
|
Gnuplot: segmentation fault via io_str_init_static_int… |
|
|
2025-04-07T12:43:43.759Z | 2026-05-03T09:12:28.072Z |
| CVE-2026-7687 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
langflow-ai langflow Full Builtins code_parser.py Code… |
langflow-ai |
langflow |
2026-05-03T08:45:14.754Z | 2026-05-03T08:45:14.754Z |
| CVE-2026-7682 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Edimax BR-6208AC L2TP Mode setWAN command injection |
Edimax |
BR-6208AC |
2026-05-03T06:15:09.912Z | 2026-05-03T06:15:09.912Z |
| CVE-2026-43057 |
7.5 (3.1)
|
net: correctly handle tunneled traffic on IPV6_CSUM GS… |
Linux |
Linux |
2026-05-01T14:15:49.551Z | 2026-05-03T05:46:27.947Z |
| CVE-2026-43056 |
7.8 (3.1)
|
net: mana: fix use-after-free in add_adev() error path |
Linux |
Linux |
2026-05-01T14:15:48.837Z | 2026-05-03T05:46:26.806Z |
| CVE-2026-43055 |
7.5 (3.1)
|
scsi: target: file: Use kzalloc_flex for aio_cmd |
Linux |
Linux |
2026-05-01T14:15:48.139Z | 2026-05-03T05:46:25.662Z |
| CVE-2026-43051 |
8.1 (3.1)
|
HID: wacom: fix out-of-bounds read in wacom_intuos_bt_irq |
Linux |
Linux |
2026-05-01T14:15:45.314Z | 2026-05-03T05:46:24.515Z |
| CVE-2026-43048 |
8.8 (3.1)
|
HID: core: Mitigate potential OOB by removing bogus memset() |
Linux |
Linux |
2026-05-01T14:15:43.227Z | 2026-05-03T05:46:23.322Z |
| CVE-2026-43047 |
7.8 (3.1)
|
HID: multitouch: Check to ensure report responses matc… |
Linux |
Linux |
2026-05-01T14:15:42.562Z | 2026-05-03T05:46:22.203Z |
| CVE-2026-43044 |
7.8 (3.1)
|
crypto: caam - fix DMA corruption on long hmac keys |
Linux |
Linux |
2026-05-01T14:15:40.317Z | 2026-05-03T05:46:20.984Z |
| CVE-2026-43042 |
7.1 (3.1)
|
mpls: add seqcount to protect the platform_label{,s} pair |
Linux |
Linux |
2026-05-01T14:15:38.882Z | 2026-05-03T05:46:19.755Z |
| CVE-2026-43039 |
9.8 (3.1)
|
net: ti: icssg-prueth: fix missing data copy and wrong… |
Linux |
Linux |
2026-05-01T14:15:36.698Z | 2026-05-03T05:46:18.623Z |
| CVE-2026-43038 |
9.8 (3.1)
|
ipv6: icmp: clear skb2->cb[] in ip6_err_gen_icmpv6_unreach() |
Linux |
Linux |
2026-05-01T14:15:35.986Z | 2026-05-03T05:46:17.465Z |
| CVE-2026-43037 |
9.8 (3.1)
|
ip6_tunnel: clear skb2->cb[] in ip4ip6_err() |
Linux |
Linux |
2026-05-01T14:15:35.314Z | 2026-05-03T05:46:16.322Z |
| CVE-2026-43033 |
7.8 (3.1)
|
crypto: authencesn - Do not place hiseq at end of dst … |
Linux |
Linux |
2026-05-01T14:15:32.583Z | 2026-05-03T05:46:15.141Z |
| CVE-2026-43031 |
7.5 (3.1)
|
net: xilinx: axienet: Fix BQL accounting for multi-BD … |
Linux |
Linux |
2026-05-01T14:15:31.256Z | 2026-05-03T05:46:13.862Z |
| CVE-2026-43030 |
7.8 (3.1)
|
bpf: Fix regsafe() for pointers to packet |
Linux |
Linux |
2026-05-01T14:15:30.564Z | 2026-05-03T05:46:12.745Z |
| CVE-2026-43029 |
7.5 (3.1)
|
mptcp: fix soft lockup in mptcp_recvmsg() |
Linux |
Linux |
2026-05-01T14:15:29.885Z | 2026-05-03T05:46:11.595Z |
| CVE-2026-43028 |
7.1 (3.1)
|
netfilter: x_tables: ensure names are nul-terminated |
Linux |
Linux |
2026-05-01T14:15:29.192Z | 2026-05-03T05:46:10.438Z |
| CVE-2026-43025 |
7.3 (3.1)
|
netfilter: ctnetlink: ignore explicit helper on new ex… |
Linux |
Linux |
2026-05-01T14:15:27.103Z | 2026-05-03T05:46:09.287Z |
| CVE-2026-43023 |
7.8 (3.1)
|
Bluetooth: SCO: fix race conditions in sco_sock_connect() |
Linux |
Linux |
2026-05-01T14:15:25.736Z | 2026-05-03T05:46:08.089Z |
| CVE-2026-43019 |
7.8 (3.1)
|
Bluetooth: hci_conn: fix potential UAF in set_cig_para… |
Linux |
Linux |
2026-05-01T14:15:23.035Z | 2026-05-03T05:46:06.840Z |
| CVE-2026-43018 |
8.8 (3.1)
|
Bluetooth: hci_event: fix potential UAF in hci_le_remo… |
Linux |
Linux |
2026-05-01T14:15:22.308Z | 2026-05-03T05:46:05.696Z |
| CVE-2026-43016 |
7.8 (3.1)
|
bpf: sockmap: Fix use-after-free of sk->sk_socket in s… |
Linux |
Linux |
2026-05-01T14:15:20.887Z | 2026-05-03T05:46:04.549Z |
| CVE-2026-43011 |
9.8 (3.1)
|
net/x25: Fix potential double free of skb |
Linux |
Linux |
2026-05-01T14:15:17.597Z | 2026-05-03T05:46:03.430Z |
| CVE-2026-43009 |
7.8 (3.1)
|
bpf: Fix incorrect pruning due to atomic fetch precisi… |
Linux |
Linux |
2026-05-01T14:15:16.271Z | 2026-05-03T05:46:02.230Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-7610 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
TRENDnet TEW-821DAP Firmware Update ssi cleartext tran… |
TRENDnet |
TEW-821DAP |
2026-05-02T09:15:10.757Z | 2026-05-04T13:42:45.344Z |
| CVE-2026-7609 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
TRENDnet TEW-821DAP Firmware Udpate diagnostic tools_d… |
TRENDnet |
TEW-821DAP |
2026-05-02T09:00:18.863Z | 2026-05-04T17:45:34.007Z |
| CVE-2026-7491 |
8.6 (4.0)
8.1 (3.1)
|
Zyosoft|School App - Insecure Direct Object Reference |
Zyosoft |
School App |
2026-05-02T09:14:25.760Z | 2026-05-04T14:56:44.399Z |
| CVE-2026-7490 |
8.6 (4.0)
7.2 (3.1)
|
Sunnet|CTMS and CPAS - Arbitrary File Upload |
Sunnet |
CTMS |
2026-05-02T09:06:25.153Z | 2026-05-04T14:56:10.986Z |
| CVE-2026-7489 |
8.7 (4.0)
8.8 (3.1)
|
Sunnet|CTMS - SQL Injection |
Sunnet |
CTMS |
2026-05-02T09:02:21.813Z | 2026-05-04T13:42:08.020Z |
| CVE-2026-5077 |
5.4 (3.1)
|
Total <= 2.2.1 - Authenticated (Contributor+) Stored C… |
hashthemes |
Total |
2026-05-02T09:26:16.066Z | 2026-05-04T15:43:20.540Z |
| CVE-2026-7608 |
5.1 (4.0)
5.5 (3.1)
5.5 (3.0)
|
TRENDnet TEW-821DAP tools_diagnostic os command injection |
TRENDnet |
TEW-821DAP |
2026-05-02T08:45:12.294Z | 2026-05-04T12:51:20.648Z |
| CVE-2026-5324 |
7.2 (3.1)
|
Brizy – Page Builder <= 2.8.11 - Unauthenticated Store… |
themefusecom |
Brizy – Page Builder |
2026-05-02T08:27:05.238Z | 2026-05-04T17:51:44.700Z |
| CVE-2026-4024 |
5.3 (3.1)
|
Royal Addons for Elementor <= 1.7.1056 - Missing Autho… |
wproyal |
Royal Addons for Elementor – Addons and Templates Kit for Elementor |
2026-05-02T08:27:04.649Z | 2026-05-04T14:49:17.791Z |
| CVE-2026-7649 |
7.5 (3.1)
|
ARMember <= 4.0.60 - Unauthenticated SQL Injection via… |
reputeinfosystems |
ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup |
2026-05-02T06:44:06.753Z | 2026-05-04T14:58:57.847Z |
| CVE-2026-7607 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
TRENDnet TEW-821DAP Firmware Udpate auto_update_firmwa… |
TRENDnet |
TEW-821DAP |
2026-05-02T07:00:15.214Z | 2026-05-04T15:52:03.938Z |
| CVE-2026-7606 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
TRENDnet TEW-821DAP Firmware Update new_gui_update_fir… |
TRENDnet |
TEW-821DAP |
2026-05-02T06:45:10.258Z | 2026-05-04T17:12:43.432Z |
| CVE-2026-6457 |
6.5 (3.1)
|
Geo Mashup <= 1.13.19 - Authenticated (Subscriber+) SQ… |
cyberhobo |
Geo Mashup |
2026-05-02T07:46:41.352Z | 2026-05-04T12:49:54.803Z |
| CVE-2026-6449 |
5.3 (3.1)
|
Booking for Appointments and Events Calendar – Amelia … |
ameliabooking |
Booking for Appointments and Events Calendar – Amelia |
2026-05-02T07:46:40.967Z | 2026-05-04T15:01:09.348Z |
| CVE-2026-6229 |
7.2 (3.1)
|
Royal Addons for Elementor <= 1.7.1057 - Authenticated… |
wproyal |
Royal Addons for Elementor – Addons and Templates Kit for Elementor |
2026-05-02T07:46:41.839Z | 2026-05-04T13:39:10.866Z |
| CVE-2026-4650 |
5.3 (3.1)
|
FundPress <= 2.0.8 - Missing Authorization to Unauthen… |
thimpress |
FundPress – WordPress Donation Plugin |
2026-05-02T07:46:39.963Z | 2026-05-04T15:47:56.723Z |
| CVE-2026-2052 |
8.8 (3.1)
|
Widget Options <= 4.2.2 - Authenticated (Contributor+)… |
marketingfire |
Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets |
2026-05-02T07:46:40.524Z | 2026-05-04T17:51:51.166Z |
| CVE-2026-7605 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JeecgBoot uploadImgByHttpEndpoint CommonController.jav… |
n/a |
JeecgBoot |
2026-05-02T06:15:12.060Z | 2026-05-04T17:51:57.020Z |
| CVE-2026-43058 |
N/A
|
media: vidtv: fix pass-by-value structs causing MSAN w… |
Linux |
Linux |
2026-05-02T06:11:50.870Z | 2026-05-02T06:11:50.870Z |
| CVE-2026-31776 |
N/A
|
ALSA: ctxfi: Fix missing SPDIFI1 index handling |
Linux |
Linux |
2026-05-01T14:15:04.423Z | 2026-05-02T06:14:25.947Z |
| CVE-2026-23473 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-04-03T15:15:51.928Z | 2026-05-02T06:17:49.349Z |
| CVE-2025-71149 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-01-23T14:15:15.878Z | 2026-05-02T06:18:09.994Z |
| CVE-2026-7647 |
8.1 (3.1)
|
Profile Builder Pro <= 3.14.5 - Unauthenticated PHP Ob… |
Cozmoslabs |
Profile Builder Pro |
2026-05-02T05:29:30.319Z | 2026-05-04T12:48:13.345Z |
| CVE-2026-7049 |
7.2 (3.1)
|
PixelYourSite Pro <= 12.5.0.1 - Unauthenticated Blind … |
pixelyoursite |
PixelYourSite Pro – Your smart PIXEL (TAG) Manager |
2026-05-02T05:29:27.706Z | 2026-05-04T17:11:20.543Z |
| CVE-2026-6916 |
6.4 (3.1)
|
Jeg Kit for Elementor <= 3.1.0 - Authenticated (Contri… |
jegtheme |
Jeg Kit for Elementor – Powerful Addons for Elementor, Widgets & Templates for WordPress |
2026-05-02T05:29:28.104Z | 2026-05-04T13:35:58.931Z |
| CVE-2026-6812 |
4.4 (3.1)
|
Ona <= 1.26 - Authenticated (Administrator+) Blind Ser… |
deothemes |
Ona |
2026-05-02T05:29:27.066Z | 2026-05-04T15:59:01.116Z |
| CVE-2026-6447 |
4.4 (3.1)
|
Call for Price for WooCommerce <= 4.2.0 - Authenticate… |
tychesoftwares |
Call for Price for WooCommerce |
2026-05-02T05:29:29.556Z | 2026-05-04T17:52:04.371Z |
| CVE-2026-5113 |
7.2 (3.1)
|
Gravity Forms <= 2.10.0 - Unauthenticated Stored Cross… |
Gravity Forms |
Gravity Forms |
2026-05-02T05:29:28.461Z | 2026-05-04T14:51:42.054Z |
| CVE-2026-5112 |
7.2 (3.1)
|
Gravity Forms <= 2.10.0 - Unauthenticated Stored Cross… |
Gravity Forms |
Gravity Forms |
2026-05-02T05:29:28.846Z | 2026-05-04T12:47:31.518Z |
| CVE-2026-5111 |
7.2 (3.1)
|
Gravity Forms <= 2.10.0 - Unauthenticated Stored Cross… |
Gravity Forms |
Gravity Forms |
2026-05-02T05:29:29.928Z | 2026-05-04T17:11:51.531Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-7596 | A vulnerability has been found in nextlevelbuilder ui-ux-pro-max-skill up to 2.5.0. Affected by thi… | 2026-05-01T21:16:18.300 | 2026-05-02T02:16:00.947 |
| fkie_cve-2026-42788 | Allocation of Resources Without Limits or Throttling vulnerability in mtrudel bandit allows unauthe… | 2026-05-01T21:16:17.500 | 2026-05-02T02:16:00.610 |
| fkie_cve-2026-42786 | Allocation of Resources Without Limits or Throttling vulnerability in mtrudel bandit allows unauthe… | 2026-05-01T21:16:17.347 | 2026-05-02T02:16:00.467 |
| fkie_cve-2026-39807 | Reliance on Untrusted Inputs in a Security Decision vulnerability in mtrudel bandit allows unauthen… | 2026-05-01T21:16:17.180 | 2026-05-02T02:16:00.320 |
| fkie_cve-2026-39805 | Inconsistent Interpretation of HTTP Requests vulnerability in mtrudel bandit allows HTTP request sm… | 2026-05-01T21:16:17.037 | 2026-05-02T02:16:00.180 |
| fkie_cve-2026-39804 | Allocation of Resources Without Limits or Throttling vulnerability in mtrudel bandit allows unauthe… | 2026-05-01T21:16:16.853 | 2026-05-02T02:16:00.013 |
| fkie_cve-2026-7600 | A flaw has been found in ArtMin96 yii2-mcp-server 1.0.2. This impacts the function yii_command_help… | 2026-05-02T01:16:00.903 | 2026-05-02T01:16:00.903 |
| fkie_cve-2026-42996 | JS8Call through 2.3.1 and JS8Call-improved before 3.0 have a stack-based buffer overflow via a radi… | 2026-05-01T07:15:59.787 | 2026-05-01T23:16:18.233 |
| fkie_cve-2026-7599 | A vulnerability was detected in Dayoooun hwpx-mcp 0.2.0. This affects the function save_document/ex… | 2026-05-01T22:16:17.127 | 2026-05-01T22:16:17.127 |
| fkie_cve-2026-7597 | A vulnerability was found in mem0ai mem0 up to 1.0.11. This affects the function pickle.load/pickle… | 2026-05-01T22:16:16.713 | 2026-05-01T22:16:16.713 |
| fkie_cve-2026-7595 | A flaw has been found in nextlevelbuilder ui-ux-pro-max-skill up to 2.5.0. Affected by this vulnera… | 2026-05-01T21:16:18.130 | 2026-05-01T21:16:18.130 |
| fkie_cve-2026-7594 | A vulnerability was detected in Flux159 mcp-game-asset-gen 0.1.0. Affected is the function image_to… | 2026-05-01T21:16:17.960 | 2026-05-01T21:16:17.960 |
| fkie_cve-2026-7593 | A security vulnerability has been detected in Sunwood-ai-labs command-executor-mcp-server up to 0.1… | 2026-05-01T21:16:17.787 | 2026-05-01T21:16:17.787 |
| fkie_cve-2026-30363 | flipperzero-firmware commit ad2a80 was discovered to contain a stack overflow in the "Main" function. | 2026-05-01T19:16:29.807 | 2026-05-01T21:16:16.490 |
| fkie_cve-2025-12993 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-67968. Reason:… | 2026-05-01T21:16:16.313 | 2026-05-01T21:16:16.313 |
| fkie_cve-2019-25597 | NSauditor 3.1.2.0 contains a buffer overflow vulnerability in the SNMP Auditor Community field that… | 2026-03-22T14:16:26.807 | 2026-05-01T21:01:41.440 |
| fkie_cve-2020-37130 | Nsauditor 3.2.0.0 contains a denial of service vulnerability in the registration name input field t… | 2026-02-05T17:16:08.043 | 2026-05-01T21:01:35.130 |
| fkie_cve-2021-47815 | Nsauditor 3.2.3 contains a denial of service vulnerability in the registration code input field tha… | 2026-01-16T00:16:27.020 | 2026-05-01T21:01:30.200 |
| fkie_cve-2026-2625 | A flaw was found in rust-rpm-sequoia. An attacker can exploit this vulnerability by providing a spe… | 2026-04-03T19:17:22.340 | 2026-05-01T21:00:31.563 |
| fkie_cve-2018-25213 | Nsauditor 3.0.28.0 contains a structured exception handling buffer overflow vulnerability that allo… | 2026-03-26T14:16:04.933 | 2026-05-01T20:58:09.820 |
| fkie_cve-2025-57853 | A container privilege escalation flaw was found in certain Web Terminal images. This issue stems fr… | 2026-04-08T14:16:26.020 | 2026-05-01T20:52:11.643 |
| fkie_cve-2026-7141 | A vulnerability was found in vllm up to 0.19.0. The affected element is the function has_mamba_laye… | 2026-04-27T17:16:45.637 | 2026-05-01T20:30:23.910 |
| fkie_cve-2025-57851 | A container privilege escalation flaw was found in certain Multicluster Engine for Kubernetes image… | 2026-04-08T14:16:25.817 | 2026-05-01T20:30:13.083 |
| fkie_cve-2026-7094 | A vulnerability was determined in ShadowCloneLabs GlutamateMCPServers up to e2de73280b01e5d943593dd… | 2026-04-27T07:16:04.893 | 2026-05-01T20:30:09.597 |
| fkie_cve-2026-7023 | A vulnerability was detected in ByteDance coze-studio up to 0.5.1. Affected by this vulnerability i… | 2026-04-26T07:16:03.050 | 2026-05-01T20:27:25.330 |
| fkie_cve-2026-7020 | A security flaw has been discovered in Ollama up to 0.20.2. This affects the function digestToPath … | 2026-04-26T05:16:02.023 | 2026-05-01T20:24:46.083 |
| fkie_cve-2026-6987 | A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /… | 2026-04-25T17:16:33.870 | 2026-05-01T20:24:30.653 |
| fkie_cve-2026-41360 | OpenClaw before 2026.4.2 contains an approval integrity vulnerability in pnpm dlx that fails to bin… | 2026-04-23T22:16:43.703 | 2026-05-01T20:24:08.360 |
| fkie_cve-2026-41358 | OpenClaw before 2026.4.2 fails to filter Slack thread context by sender allowlist, allowing non-all… | 2026-04-23T22:16:43.350 | 2026-05-01T20:23:58.937 |
| fkie_cve-2026-41355 | OpenShell before 2026.3.28 contains an arbitrary code execution vulnerability in mirror mode that c… | 2026-04-23T22:16:42.840 | 2026-05-01T20:23:43.110 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-pr34-f48h-6946 |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: Fix possible oob a… | 2026-03-25T12:30:22Z | 2026-04-23T21:31:16Z |
| ghsa-mv9g-rfx4-jpcr |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: regulator: bq257xx: Fix device… | 2026-03-25T12:30:22Z | 2026-04-23T21:31:16Z |
| ghsa-65x4-mv56-gf8m |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a UAF issue in bpf_tr… | 2026-03-25T12:30:22Z | 2026-04-23T21:31:16Z |
| ghsa-q834-8qmm-v933 |
5.3 (3.1)
|
OpenTelemetry dotnet: OTLP exporter reads unbounded HTTP response bodies | 2026-04-23T21:26:10Z | 2026-04-23T21:26:10Z |
| ghsa-w942-j9r6-hr6r |
5.3 (4.0)
|
Kirby's page creation API bypasses the changeStatus permission check via unfiltered isDraft parameter | 2026-04-23T21:24:58Z | 2026-04-23T21:24:58Z |
| ghsa-m8mh-x359-vm8m |
7.1 (3.1)
|
Apktool: Path Traversal to Arbitrary File Write | 2026-04-23T21:24:28Z | 2026-04-23T21:24:28Z |
| ghsa-jcjw-58rv-c452 |
7.6 (4.0)
|
Kirby has Server-Side Template Injection (SSTI) via double template resolution in option rendering | 2026-04-23T21:24:00Z | 2026-04-23T21:24:00Z |
| ghsa-prp4-2f49-fcgp |
8.8 (3.1)
|
Actual has Privilege Escalation via 'change-password' Endpoint on OpenID-Migrated Servers | 2026-04-23T21:23:38Z | 2026-04-23T21:23:38Z |
| ghsa-pjcq-xvwq-hhpj |
5.3 (3.1)
|
go-ntlmssp NTLM challenges can panic on malformed payloads | 2026-04-23T21:21:58Z | 2026-04-23T21:21:58Z |
| ghsa-9wfj-c55w-j9qr |
6.9 (4.0)
|
Kirby has XML injection in its XML creator toolkit | 2026-04-23T21:21:17Z | 2026-04-23T21:21:17Z |
| ghsa-c2jg-5cp7-6wc7 |
9.8 (3.1)
|
Pipecat: Remote Code Execution by Pickle Deserialization Through LivekitFrameSerializer | 2026-04-23T21:15:42Z | 2026-04-23T21:15:42Z |
| ghsa-f7mq-68q8-xqv6 |
6.1 (4.0)
|
TP-Link TL-WR841N v13 uses DES-CBC encryption in the TDDPv2 debug protocol with a cryptographic key… | 2026-04-23T18:33:04Z | 2026-04-23T18:33:05Z |
| ghsa-r965-frwq-44xx |
6.5 (3.1)
|
An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to e… | 2026-04-23T18:33:04Z | 2026-04-23T18:33:04Z |
| ghsa-r7wv-m72q-8qj8 |
|
In the Linux kernel, the following vulnerability has been resolved: net/tls: fix use-after-free in… | 2026-04-23T18:33:04Z | 2026-04-23T18:33:04Z |
| ghsa-qrrm-x53p-gpw4 |
5.4 (3.1)
5.3 (4.0)
|
OpenClaw before 2026.4.20 contains an improper authorization vulnerability in paired-device pairing… | 2026-04-23T18:33:04Z | 2026-04-23T18:33:04Z |
| ghsa-qgx9-6px9-7p75 |
4.3 (3.1)
2.3 (4.0)
|
OpenClaw before 2026.4.20 contains a scope enforcement bypass vulnerability in the assistant-media … | 2026-04-23T18:33:04Z | 2026-04-23T18:33:04Z |
| ghsa-m773-2ww5-wpvx |
6.5 (3.1)
|
An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to e… | 2026-04-23T18:33:04Z | 2026-04-23T18:33:04Z |
| ghsa-3p3v-qhpw-qrgr |
6.5 (3.1)
|
An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to e… | 2026-04-23T18:33:04Z | 2026-04-23T18:33:04Z |
| ghsa-pc62-x5ww-3xm5 |
9.8 (3.1)
9.3 (4.0)
|
Kofax Capture, now referred to as Tungsten Capture, version 6.0.0.0 (other versions may be affected… | 2026-04-23T18:33:03Z | 2026-04-23T18:33:03Z |
| ghsa-mf84-vmqg-86fm |
9.6 (3.1)
|
hackage-server lacked Cross-Site Request Forgery (CSRF) protection across its endpoints. Scripts on… | 2026-04-23T18:33:03Z | 2026-04-23T18:33:03Z |
| ghsa-hxp4-rf8g-9mwq |
9.9 (3.1)
|
A critical XSS vulnerability affected hackage-server and hackage.haskell.org. HTML and JavaScript … | 2026-04-23T18:33:03Z | 2026-04-23T18:33:03Z |
| ghsa-h257-f28j-hfjg |
9.8 (3.1)
|
In Rocket.Chat <8.3.0, <8.2.1, <8.1.2, <8.0.3, <7.13.5, <7.12.6, <7.11.6, and <7.10.9, a NoSQL inje… | 2026-04-23T00:31:19Z | 2026-04-23T18:33:03Z |
| ghsa-g562-3mh5-27v6 |
7.8 (3.1)
|
A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the X… | 2026-04-23T18:33:03Z | 2026-04-23T18:33:03Z |
| ghsa-fjqg-327f-q6hw |
5.3 (3.1)
|
The HT Mega Addons for Elementor WordPress plugin before 3.0.7 contains an unauthenticated AJAX ac… | 2026-04-23T09:32:57Z | 2026-04-23T18:33:03Z |
| ghsa-fccm-2vww-q6qr |
9.8 (3.1)
9.3 (4.0)
|
SocialEngine versions 7.8.0 and prior contain a SQL injection vulnerability in the /activity/index/… | 2026-04-23T18:33:03Z | 2026-04-23T18:33:03Z |
| ghsa-cjgm-66pw-5r9r |
7.8 (3.1)
|
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence… | 2026-04-23T18:33:03Z | 2026-04-23T18:33:03Z |
| ghsa-c7pv-j8xr-mmhj |
8.7 (4.0)
|
An unauthenticated remote attacker is able to exhaust all available TCP connections in the CODESYS … | 2026-04-23T18:33:03Z | 2026-04-23T18:33:03Z |
| ghsa-8r77-j8hp-jvhf |
|
Jizhicms v2.5.4 is vulnerable to SQL injection in the product editing module. | 2026-04-23T18:33:03Z | 2026-04-23T18:33:03Z |
| ghsa-8fw8-47cx-j4q4 |
9.9 (3.1)
|
In hackage-server, user-controlled metadata from .cabal files are rendered into HTML href attribute… | 2026-04-23T18:33:03Z | 2026-04-23T18:33:03Z |
| ghsa-5mqr-3465-c7p6 |
7.8 (3.1)
|
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could s… | 2026-04-23T18:33:03Z | 2026-04-23T18:33:03Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2012-35 |
|
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens… | keystone | 2012-12-18T01:55:00Z | 2024-11-21T14:22:52.404569Z |
| pysec-2012-34 |
|
OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenS… | keystone | 2012-07-31T10:45:00Z | 2024-11-21T14:22:52.344123Z |
| pysec-2023-271 |
5.3 (3.1)
|
Hail is an open-source, general-purpose, Python-based data analysis tool with additional … | hail | 2023-12-29T17:16:00+00:00 | 2024-11-21T14:22:51.672042+00:00 |
| pysec-2014-103 |
|
The default LDAP ACIs in FreeIPA 3.0 before 3.1.2 do not restrict access to the (1) ipaNT… | ipa | 2014-05-29T14:19:00Z | 2024-11-21T14:22:51.957056Z |
| pysec-2013-38 |
|
The client in FreeIPA 2.x and 3.x before 3.1.2 does not properly obtain the Certification… | ipa | 2013-01-27T18:55:00Z | 2024-11-21T14:22:51.898526Z |
| pysec-2013-37 |
|
store/swift.py in OpenStack Glance Essex (2012.1), Folsom (2012.2) before 2012.2.3, and G… | glance | 2013-02-24T21:55:00Z | 2024-11-21T14:22:51.177765Z |
| pysec-2012-33 |
|
Session fixation vulnerability in OpenStack Dashboard (Horizon) folsom-1 and 2012.1 allow… | horizon | 2012-06-05T22:55:00Z | 2024-11-21T14:22:51.786908Z |
| pysec-2012-32 |
|
Cross-site scripting (XSS) vulnerability in the refresh mechanism in the log viewer in ho… | horizon | 2012-06-05T22:55:00Z | 2024-11-21T14:22:51.729618Z |
| pysec-2012-31 |
|
libs/updater.py in GoLismero 0.6.3, and other versions before Git revision 2b3bb43d6867, … | golismero | 2012-03-19T19:55:00Z | 2024-11-21T14:22:51.617446Z |
| pysec-2012-30 |
|
The v2 API in OpenStack Glance Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote… | glance | 2012-11-11T13:00:00Z | 2024-11-21T14:22:51.113933Z |
| pysec-2012-29 |
|
The v1 API in OpenStack Glance Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote… | glance | 2012-11-11T13:00:00Z | 2024-11-21T14:22:51.054769Z |
| pysec-2023-269 |
7.5 (3.1)
|
GeoNode is an open source platform that facilitates the creation, sharing, and collaborat… | geonode | 2023-08-24T23:15:00+00:00 | 2024-11-21T14:22:50.995218+00:00 |
| pysec-2021-888 |
7.8 (3.1)
|
netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (call… | gdal | 2021-07-20T07:15:00+00:00 | 2024-11-21T14:22:50.934313+00:00 |
| pysec-2021-887 |
9.8 (3.1)
|
GattLib 0.3-rc1 has a stack-based buffer over-read in get_device_path_from_mac in dbus/ga… | gattlib-py | 2021-05-27T11:15:00Z | 2024-11-21T14:22:50.881327Z |
| pysec-2021-886 |
6.5 (3.1)
|
A buffer overflow vulnerability in the Databuf function in types.cpp of Exiv2 v0.27.1 lea… | exiv2 | 2021-07-13T22:15:00Z | 2024-11-21T14:22:50.153222Z |
| pysec-2021-885 |
6.5 (3.1)
|
A stack exhaustion issue in the printIFDStructure function of Exiv2 0.27 allows remote at… | exiv2 | 2021-08-19T22:15:00Z | 2024-11-21T14:22:50.094265Z |
| pysec-2021-884 |
6.5 (3.1)
|
A float point exception in the printLong function in tags_int.cpp of Exiv2 0.27.99.0 allo… | exiv2 | 2021-08-23T22:15:00Z | 2024-11-21T14:22:50.034285Z |
| pysec-2019-250 |
8.8 (3.1)
|
GattLib 0.2 has a stack-based buffer over-read in gattlib_connect in dbus/gattlib.c becau… | gattlib-py | 2019-01-21T06:29:00Z | 2024-11-21T14:22:50.820785Z |
| pysec-2014-101 |
|
FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote att… | freeipa | 2014-11-19T18:59:00Z | 2024-11-21T14:22:50.589801Z |
| pysec-2014-100 |
|
The default LDAP ACIs in FreeIPA 3.0 before 3.1.2 do not restrict access to the (1) ipaNT… | freeipa | 2014-05-29T14:19:00Z | 2024-11-21T14:22:50.537629Z |
| pysec-2013-36 |
|
The client in FreeIPA 2.x and 3.x before 3.1.2 does not properly obtain the Certification… | freeipa | 2013-01-27T18:55:00Z | 2024-11-21T14:22:50.474073Z |
| pysec-2021-883 |
6.5 (3.1)
|
An invalid memory access in the decode function in iptc.cpp of Exiv2 0.27.99.0 allows att… | exiv2 | 2021-08-23T22:15:00Z | 2024-11-21T14:22:49.973408Z |
| pysec-2021-882 |
8.1 (3.1)
|
Exiv2 0.27.99.0 has a global buffer over-read in Exiv2::Internal::Nikon1MakerNote::print0… | exiv2 | 2021-08-23T22:15:00Z | 2024-11-21T14:22:49.911764Z |
| pysec-2020-344 |
7.5 (3.1)
|
In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in … | exiv2 | 2020-01-27T05:15:00Z | 2024-11-21T14:22:49.729892Z |
| pysec-2019-249 |
8.8 (3.1)
|
An issue was discovered in Exiv2 0.27. There is infinite recursion at BigTiffImage::print… | exiv2 | 2019-02-25T15:29:00Z | 2024-11-21T14:22:49.85073Z |
| pysec-2019-248 |
8.8 (3.1)
|
An issue was discovered in Exiv2 0.27. There is infinite recursion at Exiv2::Image::print… | exiv2 | 2019-02-25T15:29:00Z | 2024-11-21T14:22:49.79084Z |
| pysec-2019-247 |
6.5 (3.1)
|
Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when cal… | exiv2 | 2019-10-09T19:15:00Z | 2024-11-21T14:22:49.656989Z |
| pysec-2019-246 |
6.5 (3.1)
|
In Exiv2 0.27.99.0, there is an out-of-bounds read in Exiv2::MrwImage::readMetadata() in … | exiv2 | 2019-07-28T19:15:00Z | 2024-11-21T14:22:49.597801Z |
| pysec-2019-245 |
6.5 (3.1)
|
Exiv2::PngImage::readMetadata() in pngimage.cpp in Exiv2 0.27.99.0 allows attackers to ca… | exiv2 | 2019-07-28T19:15:00Z | 2024-11-21T14:22:49.538663Z |
| pysec-2019-244 |
7.8 (3.1)
|
Exiv2 0.27.99.0 has a heap-based buffer over-read in Exiv2::RafImage::readMetadata() in r… | exiv2 | 2019-07-28T19:15:00Z | 2024-11-21T14:22:49.479201Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-4194 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.413687Z |
| gsd-2024-4193 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.395860Z |
| gsd-2024-4192 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.442382Z |
| gsd-2024-4191 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.350081Z |
| gsd-2024-4190 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.415072Z |
| gsd-2024-4189 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.377780Z |
| gsd-2024-4188 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.437066Z |
| gsd-2024-4187 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.376404Z |
| gsd-2024-4186 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.352617Z |
| gsd-2024-4185 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.387322Z |
| gsd-2024-4184 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.371241Z |
| gsd-2024-4183 | Mattermost versions 8.1.x before 8.1.12, 9.6.x before 9.6.1, 9.5.x before 9.5.3, 9.4.x be… | 2024-04-26T05:02:17.372323Z |
| gsd-2024-4182 | Mattermost versions 9.6.0, 9.5.x before 9.5.3, 9.4.x before 9.4.5, and 8.1.x before 8.1.1… | 2024-04-26T05:02:17.395657Z |
| gsd-2024-4181 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.398953Z |
| gsd-2024-4180 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.418368Z |
| gsd-2024-4179 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.438004Z |
| gsd-2024-4178 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.377539Z |
| gsd-2024-4177 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.421751Z |
| gsd-2024-4176 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.392184Z |
| gsd-2024-4175 | Unicode transformation vulnerability in Hyperion affecting version 2.0.15. This vulnerabi… | 2024-04-26T05:02:17.424356Z |
| gsd-2024-4174 | Cross-Site Scripting (XSS) vulnerability in Hyperion Web Server affecting version 2.0.15.… | 2024-04-26T05:02:17.389353Z |
| gsd-2024-4173 | A vulnerability in Brocade SANnav exposes Kafka in the wan interface. The vulnerability… | 2024-04-26T05:02:17.396711Z |
| gsd-2024-4172 | A vulnerability classified as problematic was found in idcCMS 1.35. Affected by this vuln… | 2024-04-26T05:02:17.373866Z |
| gsd-2024-4171 | A vulnerability classified as critical has been found in Tenda W30E 1.0/1.0.1.25. Affecte… | 2024-04-26T05:02:17.434975Z |
| gsd-2024-4170 | A vulnerability was found in Tenda 4G300 1.01.42. It has been rated as critical. This iss… | 2024-04-26T05:02:17.362844Z |
| gsd-2024-4169 | A vulnerability was found in Tenda 4G300 1.01.42. It has been declared as critical. This … | 2024-04-26T05:02:17.413039Z |
| gsd-2024-4168 | A vulnerability was found in Tenda 4G300 1.01.42. It has been classified as critical. Thi… | 2024-04-26T05:02:17.398024Z |
| gsd-2024-4167 | A vulnerability was found in Tenda 4G300 1.01.42 and classified as critical. Affected by … | 2024-04-26T05:02:17.405786Z |
| gsd-2024-4166 | A vulnerability has been found in Tenda 4G300 1.01.42 and classified as critical. Affecte… | 2024-04-26T05:02:17.372976Z |
| gsd-2024-4165 | A vulnerability, which was classified as critical, was found in Tenda G3 15.11.0.17(9502)… | 2024-04-26T05:02:17.438286Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1514 | Malicious code in declaration-block-no-ignored-properties (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:57Z |
| mal-2026-1330 | Malicious code in import-zod (npm) | 2026-03-11T06:15:22Z | 2026-04-28T04:47:57Z |
| mal-2026-1329 | Malicious code in google-camelcase (npm) | 2026-03-11T06:18:53Z | 2026-04-28T04:47:57Z |
| mal-2026-1327 | Malicious code in filter-imports (npm) | 2026-03-11T06:17:33Z | 2026-04-28T04:47:57Z |
| mal-2026-1326 | Malicious code in clean-order (npm) | 2026-03-11T06:19:13Z | 2026-04-28T04:47:57Z |
| mal-2026-1557 | Malicious code in add-react-displayname (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:56Z |
| mal-2026-1502 | Malicious code in better-styled-components (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:56Z |
| mal-2026-1501 | Malicious code in @storylane/uikit (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:56Z |
| mal-2026-1500 | Malicious code in @storylane/shared-packages (npm) | 2026-03-16T00:00:00Z | 2026-04-28T04:47:56Z |
| mal-2026-3105 | Malicious code in mypypipkg (PyPI) | 2026-04-27T21:21:43Z | 2026-04-27T21:21:43Z |
| mal-2026-3103 | Malicious code in amzn_codewhisperer_streaming_client (crates.io) | 2026-04-27T18:01:06Z | 2026-04-27T18:01:06Z |
| mal-2026-3101 | Malicious code in amzn_consolas_client (crates.io) | 2026-04-27T17:36:04Z | 2026-04-27T17:36:04Z |
| mal-2026-3102 | Malicious code in semantic_search_client (crates.io) | 2026-04-27T17:20:59Z | 2026-04-27T17:20:59Z |
| mal-2026-3083 | Malicious code in elementary-data (PyPI) | 2026-04-24T22:54:25Z | 2026-04-27T14:18:51Z |
| mal-2026-3000 | Malicious code in xinference (PyPI) | 2026-04-22T22:06:22Z | 2026-04-27T10:19:57Z |
| mal-2026-3085 | Malicious code in bytedaaa (PyPI) | 2026-04-27T05:24:40Z | 2026-04-27T05:24:40Z |
| mal-2026-3090 | Malicious code in bytedecs (PyPI) | 2026-04-27T05:23:50Z | 2026-04-27T05:23:50Z |
| mal-2026-3098 | Malicious code in bytedvke (PyPI) | 2026-04-27T05:22:59Z | 2026-04-27T05:22:59Z |
| mal-2026-3087 | Malicious code in bytedark (PyPI) | 2026-04-27T05:22:23Z | 2026-04-27T05:22:23Z |
| mal-2026-3086 | Malicious code in bytedai (PyPI) | 2026-04-27T05:21:35Z | 2026-04-27T05:21:35Z |
| mal-2026-3093 | Malicious code in bytedmlp (PyPI) | 2026-04-27T05:20:57Z | 2026-04-27T05:20:57Z |
| mal-2026-3097 | Malicious code in bytedvefaas (PyPI) | 2026-04-27T05:20:06Z | 2026-04-27T05:20:06Z |
| mal-2026-3091 | Malicious code in bytedfaas (PyPI) | 2026-04-27T05:19:13Z | 2026-04-27T05:19:13Z |
| mal-2026-3089 | Malicious code in bytedclaw (PyPI) | 2026-04-27T05:18:32Z | 2026-04-27T05:18:32Z |
| mal-2026-3084 | Malicious code in byteclaw (PyPI) | 2026-04-27T05:17:29Z | 2026-04-27T05:17:29Z |
| mal-2026-3099 | Malicious code in bytedvod (PyPI) | 2026-04-27T05:16:37Z | 2026-04-27T05:16:37Z |
| mal-2026-3095 | Malicious code in bytedpymysql (PyPI) | 2026-04-27T05:15:34Z | 2026-04-27T05:15:34Z |
| mal-2026-3088 | Malicious code in bytedbackground (PyPI) | 2026-04-27T05:14:59Z | 2026-04-27T05:14:59Z |
| mal-2026-3096 | Malicious code in bytedtccc (PyPI) | 2026-04-27T05:14:02Z | 2026-04-27T05:14:03Z |
| mal-2026-3092 | Malicious code in bytedmem (PyPI) | 2026-04-27T05:09:06Z | 2026-04-27T05:09:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2150 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-29T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2045 | expat: Schwachstelle ermöglicht Denial of Service | 2025-09-14T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1932 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2025-08-28T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1883 | Apache Tika: Schwachstelle ermöglicht Infogewinn oder Manipulation | 2025-08-20T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1740 | Golang Go: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-08-06T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1665 | Linux Kernel: Mehrere Schwachstellen | 2025-07-28T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1596 | Linux Kernel: Schwachstelle ermöglicht Denial of Service und nicht spezifizierten Angriff | 2025-07-17T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1244 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2025-06-04T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1114 | Linux Kernel: Mehrere Schwachstellen | 2025-05-20T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1098 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-05-18T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1034 | screen: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1001 | Intel Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-05-12T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0999 | Linux Kernel: Mehrere Schwachstellen | 2025-05-11T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0991 | Linux Kernel: Mehrere Schwachstellen | 2025-05-08T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0975 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-05-07T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0953 | Golang Go: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-06T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0945 | Linux Kernel: Mehrere Schwachstellen | 2025-05-05T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0932 | Linux Kernel: Mehrere Schwachstellen | 2025-05-04T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0922 | Linux Kernel: Mehrere Schwachstellen | 2025-05-01T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0904 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-04-29T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0831 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-04-15T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0732 | Linux Kernel: Mehrere Schwachstellen | 2025-04-07T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0698 | Linux Kernel: Mehrere Schwachstellen | 2025-04-02T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1422 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-06-20T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1418 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-06-19T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1322 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe | 2024-06-09T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1251 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-05-28T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1197 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe | 2024-05-21T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1188 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-05-20T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2024-1083 | Linux Kernel: Mehrere Schwachstellen | 2024-05-09T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-273-01 | MegaSys Enterprises Telenium Online Web Application | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-226-26 | Rockwell Automation FLEX 5000 I/O (Update A) | 2025-08-14T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-063-02 | Keysight Ixia Vision Product Family (Update A) | 2025-03-04T07:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-22-298-02 | HEIDENHAIN Controller TNC (Update A) | 2022-10-25T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-07 | LG Innotek Camera Multiple Models | 2025-09-30T05:00:00.000000Z | 2025-09-30T05:00:00.000000Z |
| va-25-273-01 | Microsoft Windows inconsistent driver blocking | 2025-09-30T00:00:00Z | 2025-09-30T00:00:00Z |
| va-25-272-01 | Medical Informatics Engineering Enterprise Health multiple vulnerabilities | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| icsa-25-268-01 | Dingtian DT-R002 | 2025-09-25T06:00:00.000000Z | 2025-09-25T06:00:00.000000Z |
| icsa-25-140-07 | Schneider Electric Galaxy VS, Galaxy VL, Galaxy VXL (Update A) | 2025-05-13T04:00:00.000000Z | 2025-09-24T04:00:00.000000Z |
| icsa-25-266-04 | Viessmann Vitogate 300 | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-02 | Mitsubishi Electric MELSEC-Q Series CPU Module | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-01 | AutomationDirect CLICK PLUS | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| va-25-265-01 | Airship AI MFA bypass and default credentials vulnerabilities | 2025-09-22T14:06:13Z | 2025-09-22T14:06:13Z |
| icsa-25-261-07 | Dover Fueling Solutions ProGauge MagLink LX4 Devices | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-06 | Cognex In-Sight Explorer and In-Sight Camera Firmware | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-03 | Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-02 | Westermo Network Technologies WeOS 5 | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-01 | Westermo Network Technologies WeOS 5 | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-254-10 | Daikin Europe N.V Security Gateway | 2025-09-11T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-191-10 | End-of-Train and Head-of-Train Remote Linking Protocol (Update C) | 2025-07-10T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-24-030-02 | Mitsubishi Electric FA Engineering Software Products (Update D) | 2024-01-30T07:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-259-07 | Delta Electronics DIALink | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-06 | Siemens Multiple Industrial Products | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-04 | Siemens RUGGEDCOM, SINEC NMS, and SINEMA | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-03 | Siemens SIMATIC NET CP, SINEMA and SCALANCE | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-02 | Hitachi Energy RTU500 series | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| va-25-259-01 | CISA Thorium multiple vulnerabilities | 2025-09-16T00:00:00Z | 2025-09-16T00:00:00Z |
| va-25-258-01 | psPAS does not enforce TLS 1.2 within Get-PASSAMLResponse | 2025-09-15T18:41:08Z | 2025-09-15T18:41:08Z |
| va-25-174-01 | OPEXUS FOIAXpress Public Access Link (PAL) multiple vulnerabilities | 2025-07-31T17:01:09Z | 2025-09-09T21:12:34Z |
| va-25-252-01 | OPEXUS FOIAXpress Public Access Link (PAL) SQL injection | 2025-09-09T20:48:26Z | 2025-09-09T20:48:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ccmpdm-rxss-tAX76U3k | Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability | 2024-10-16T16:00:00+00:00 | 2024-10-16T16:00:00+00:00 |
| cisco-sa-vlan-dos-27pur5rt | Cisco Catalyst 9000 Series Switches Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-10-04T21:53:25+00:00 |
| cisco-sa-vlan-dos-27Pur5RT | Cisco Catalyst 9000 Series Switches Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-10-04T21:53:25+00:00 |
| cisco-sa-sb-rv04x_rv32x_vulns-yj2osdhv | Cisco Small Business RV042, RV042G, RV320, and RV325 Routers Denial of Service and Remote Code Execution Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV | Cisco Small Business RV042, RV042G, RV320, and RV325 Routers Denial of Service and Remote Code Execution Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-rv34x-privesc-rce-qe33tcms | Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Privilege Escalation and Remote Command Execution Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-rv34x-privesc-rce-qE33TCms | Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Privilege Escalation and Remote Command Execution Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndo-tlsvld-fduf3cpw | Cisco Nexus Dashboard Orchestrator SSL/TLS Certificate Validation Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndo-tlsvld-FdUF3cpw | Cisco Nexus Dashboard Orchestrator SSL/TLS Certificate Validation Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndhs-uaapi-jh4v6zpn | Cisco Nexus Dashboard and Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndhs-uaapi-Jh4V6zpN | Cisco Nexus Dashboard and Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndhs-idv-bk8vqedc | Cisco Nexus Dashboard Hosted Services Information Disclosure Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndhs-idv-Bk8VqEDc | Cisco Nexus Dashboard Hosted Services Information Disclosure Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndfc-raci-t46k3jnn | Cisco Nexus Dashboard Fabric Controller REST API Command Injection Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndfc-raci-T46k3jnN | Cisco Nexus Dashboard Fabric Controller REST API Command Injection Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndfc-ptrce-bushlbp | Cisco Nexus Dashboard Fabric Controller Remote Code Execution Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndfc-ptrce-BUSHLbp | Cisco Nexus Dashboard Fabric Controller Remote Code Execution Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndfc-cmdinj-UvYZrKfr | Cisco Nexus Dashboard Fabric Controller Arbitrary Command Execution Vulnerability | 2024-10-02T16:00:00+00:00 | 2026-03-31T18:47:53+00:00 |
| cisco-sa-ndfc-cidv-xvyx2wlj | Cisco Nexus Dashboard Fabric Controller Configuration Backup Information Disclosure Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndfc-cidv-XvyX2wLj | Cisco Nexus Dashboard Fabric Controller Configuration Backup Information Disclosure Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Session Takeover and Denial of Service Vulnerability | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:27+00:00 |
| cisco-sa-meraki-mx-vpn-dos-QTRHzG2 | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Denial of Service Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:28+00:00 |
| cisco-sa-ise-info-disc-zyf2neex | Cisco Identity Services Engine Information Disclosure Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ise-info-disc-ZYF2nEEX | Cisco Identity Services Engine Information Disclosure Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-expw-escalation-3bkz77bd | Cisco Expressway Series Privilege Escalation Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-expw-escalation-3bkz77bD | Cisco Expressway Series Privilege Escalation Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-cimc-redfish-cominj-sbkv5zz | Cisco UCS B-Series, Managed C-Series, and X-Series Servers Redfish API Command Injection Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-cimc-redfish-cominj-sbkv5ZZ | Cisco UCS B-Series, Managed C-Series, and X-Series Servers Redfish API Command Injection Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-webui-csrf-ycuyxkko | Cisco IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-webui-csrf-ycUYxkKO | Cisco IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31422 | net/sched: cls_flow: fix NULL pointer dereference on shared blocks | 2026-04-02T00:00:00.000Z | 2026-04-29T14:55:40.000Z |
| msrc_cve-2024-53114 | x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client | 2024-12-02T00:00:00.000Z | 2026-04-29T14:55:38.000Z |
| msrc_cve-2025-37907 | accel/ivpu: Fix locking order in ivpu_job_submit | 2025-05-02T00:00:00.000Z | 2026-04-29T14:55:34.000Z |
| msrc_cve-2025-68378 | bpf: Fix stackmap overflow check in __bpf_get_stackid() | 2025-12-02T00:00:00.000Z | 2026-04-29T14:55:32.000Z |
| msrc_cve-2026-31417 | net/x25: Fix overflow when accumulating packets | 2026-04-02T00:00:00.000Z | 2026-04-29T14:55:26.000Z |
| msrc_cve-2024-36024 | drm/amd/display: Disable idle reallow as part of command/gpint execution | 2024-05-02T07:00:00.000Z | 2026-04-29T14:55:23.000Z |
| msrc_cve-2025-68356 | gfs2: Prevent recursive memory reclaim | 2025-12-02T00:00:00.000Z | 2026-04-29T14:55:21.000Z |
| msrc_cve-2026-31424 | netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP | 2026-04-02T00:00:00.000Z | 2026-04-29T14:55:12.000Z |
| msrc_cve-2024-42134 | virtio-pci: Check if is_avq is NULL | 2024-07-01T07:00:00.000Z | 2026-04-29T14:55:12.000Z |
| msrc_cve-2024-26914 | drm/amd/display: fix incorrect mpc_combine array size | 2024-04-02T07:00:00.000Z | 2026-04-29T14:55:10.000Z |
| msrc_cve-2025-68745 | scsi: qla2xxx: Clear cmds after chip reset | 2025-12-02T00:00:00.000Z | 2026-04-29T14:55:07.000Z |
| msrc_cve-2026-31574 | clockevents: Add missing resets of the next_event_forced flag | 2026-04-02T00:00:00.000Z | 2026-04-29T14:55:01.000Z |
| msrc_cve-2024-53133 | drm/amd/display: Handle dml allocation failure to avoid crash | 2024-12-02T00:00:00.000Z | 2026-04-29T14:54:59.000Z |
| msrc_cve-2026-31423 | net/sched: sch_hfsc: fix divide-by-zero in rtsc_min() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:57.000Z |
| msrc_cve-2025-23131 | dlm: prevent NPD when writing a positive value to event_done | 2025-04-02T00:00:00.000Z | 2026-04-29T14:54:57.000Z |
| msrc_cve-2025-68736 | landlock: Fix handling of disconnected directories | 2025-12-02T00:00:00.000Z | 2026-04-29T14:54:55.000Z |
| msrc_cve-2026-31589 | mm: call ->free_folio() directly in folio_unmap_invalidate() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:48.000Z |
| msrc_cve-2024-42151 | bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable | 2024-07-01T07:00:00.000Z | 2026-04-29T14:54:46.000Z |
| msrc_cve-2026-31416 | netfilter: nfnetlink_log: account for netlink header size | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:44.000Z |
| msrc_cve-2025-40325 | md/raid10: wait barrier before returning discard request with REQ_NOWAIT | 2025-04-02T00:00:00.000Z | 2026-04-29T14:54:44.000Z |
| msrc_cve-2025-68338 | net: dsa: microchip: Don't free uninitialized ksz_irq | 2025-12-02T00:00:00.000Z | 2026-04-29T14:54:42.000Z |
| msrc_cve-2026-31679 | openvswitch: validate MPLS set/set_masked payload length | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:40.000Z |
| msrc_cve-2024-50177 | drm/amd/display: fix a UBSAN warning in DML2.1 | 2024-11-02T00:00:00.000Z | 2026-04-29T14:54:35.000Z |
| msrc_cve-2026-40385 | CVE-2026-40385 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:30.000Z |
| msrc_cve-2025-68324 | scsi: imm: Fix use-after-free bug caused by unfinished delayed work | 2025-12-02T00:00:00.000Z | 2026-04-29T14:54:30.000Z |
| msrc_cve-2024-58006 | PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() | 2025-02-02T00:00:00.000Z | 2026-04-29T14:54:30.000Z |
| msrc_cve-2026-31674 | netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:25.000Z |
| msrc_cve-2024-53050 | drm/i915/hdcp: Add encoder check in hdcp2_get_capability | 2024-11-02T00:00:00.000Z | 2026-04-29T14:54:22.000Z |
| msrc_cve-2025-68296 | drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup | 2025-12-02T00:00:00.000Z | 2026-04-29T14:54:18.000Z |
| msrc_cve-2026-40386 | CVE-2026-40386 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:15.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0146 | Kwetsbaarheden verholpen in Cisco IOS XE Software | 2025-05-08T08:43:57.415709Z | 2025-05-08T08:43:57.415709Z |
| ncsc-2025-0145 | Kwetsbaarheden verholpen in SonicWall SMA100 | 2025-05-08T08:40:26.301646Z | 2025-05-08T08:40:26.301646Z |
| ncsc-2025-0144 | Kwetsbaarheden verholpen in SysAid On-Prem | 2025-05-08T06:56:21.378830Z | 2025-05-08T06:56:21.378830Z |
| ncsc-2025-0143 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-05-07T11:19:50.517092Z | 2025-05-07T11:19:50.517092Z |
| ncsc-2025-0142 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-05-06T08:01:05.582708Z | 2025-05-06T08:01:05.582708Z |
| ncsc-2025-0141 | Kwetsbaarheden verholpen in Keycloak | 2025-05-06T07:12:42.075830Z | 2025-05-06T07:12:42.075830Z |
| ncsc-2025-0138 | Kwetsbaarheid verholpen in Commvault Command Center | 2025-04-24T13:09:08.399556Z | 2025-05-06T06:55:31.232567Z |
| ncsc-2025-0119 | Kwetsbaarheden verholpen in SAP-producten | 2025-04-09T09:12:05.705017Z | 2025-04-30T13:12:27.070565Z |
| ncsc-2025-0140 | Kwetsbaarheden verholpen in Apple AirPlay zoals gebruikt door macOS, iOS en iPadOS | 2025-04-30T08:45:31.426155Z | 2025-04-30T08:45:31.426155Z |
| ncsc-2025-0139 | Kwetsbaarheid verholpen in SonicWall SonicOS | 2025-04-25T09:35:24.276801Z | 2025-04-25T09:35:24.276801Z |
| ncsc-2025-0137 | Kwetsbaarheid verholpen in Erlang/OTP SSH-server | 2025-04-18T05:33:40.823978Z | 2025-04-18T05:33:40.823978Z |
| ncsc-2025-0136 | Kwetsbaarheden verholpen in Apple macOS, iOS en iPadOS | 2025-04-17T07:19:14.228835Z | 2025-04-17T07:19:14.228835Z |
| ncsc-2025-0135 | Kwetsbaarheden verholpen in Siemens TeleControl Server | 2025-04-17T07:14:24.584624Z | 2025-04-17T07:14:24.584624Z |
| ncsc-2025-0134 | Kwetsbaarheid verholpen in Cisco Webex App | 2025-04-17T07:11:41.369333Z | 2025-04-17T07:11:41.369333Z |
| ncsc-2025-0133 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2025-04-16T15:13:33.586832Z | 2025-04-16T15:13:33.586832Z |
| ncsc-2025-0132 | Kwetsbaarheden verholpen in Oracle MySQL | 2025-04-16T15:11:43.357092Z | 2025-04-16T15:11:43.357092Z |
| ncsc-2025-0131 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2025-04-16T15:10:06.149204Z | 2025-04-16T15:10:06.149204Z |
| ncsc-2025-0130 | Kwetsbaarheden verholpen in Oracle Java | 2025-04-16T15:04:40.041941Z | 2025-04-16T15:04:40.041941Z |
| ncsc-2025-0129 | Kwetsbaarheden verholpen in Oracle Analytics | 2025-04-16T15:02:22.596981Z | 2025-04-16T15:02:22.596981Z |
| ncsc-2025-0128 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2025-04-16T15:01:24.587426Z | 2025-04-16T15:01:24.587426Z |
| ncsc-2025-0127 | Kwetsbaarheden verholpen in Oracle Financial Services | 2025-04-16T15:00:12.952979Z | 2025-04-16T15:00:12.952979Z |
| ncsc-2025-0126 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2025-04-16T14:59:13.973935Z | 2025-04-16T14:59:13.973935Z |
| ncsc-2025-0125 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2025-04-16T14:58:05.867499Z | 2025-04-16T14:58:05.867499Z |
| ncsc-2025-0124 | Kwetsbaarheden verholpen in Oracle Communications | 2025-04-16T08:39:55.217751Z | 2025-04-16T08:39:55.217751Z |
| ncsc-2025-0123 | Kwetsbaarheden verholpen in Oracle Database Producten | 2025-04-16T08:37:39.412900Z | 2025-04-16T08:37:39.412900Z |
| ncsc-2025-0122 | Kwetsbaarheden verholpen in Rockwell Automation Arena | 2025-04-14T11:29:22.815190Z | 2025-04-14T11:29:22.815190Z |
| ncsc-2025-0121 | Kwetsbaarheid verholpen in Gladinet CentreStack | 2025-04-10T11:53:42.018541Z | 2025-04-10T11:53:42.018541Z |
| ncsc-2025-0120 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-04-09T14:41:41.327208Z | 2025-04-09T14:41:41.327208Z |
| ncsc-2025-0118 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-04-09T08:14:16.645915Z | 2025-04-09T08:14:16.645915Z |
| ncsc-2025-0117 | Kwetsbaarheden verholpen in Adobe Animate | 2025-04-09T08:12:45.041685Z | 2025-04-09T08:12:45.041685Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10322-1 | python311-lxml_html_clean-0.4.4-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10321-1 | python311-PyPDF2-2.11.1-6.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10320-1 | perl-Compress-Raw-Zlib-2.222-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10319-1 | helm3-3.20.0-2.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10318-1 | helm-4.1.1-3.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10317-1 | grype-0.109.1-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10316-1 | ghostty-1.3.0-1.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:10315-1 | GraphicsMagick-1.3.46-2.1 on GA media | 2026-03-10T00:00:00Z | 2026-03-10T00:00:00Z |
| opensuse-su-2026:20336-1 | Security update for cockpit-podman | 2026-03-09T10:47:09Z | 2026-03-09T10:47:09Z |
| opensuse-su-2026:20337-1 | Security update for ImageMagick | 2026-03-09T10:04:29Z | 2026-03-09T10:04:29Z |
| opensuse-su-2026:10314-1 | traefik2-2.11.40-1.1 on GA media | 2026-03-09T00:00:00Z | 2026-03-09T00:00:00Z |
| opensuse-su-2026:10313-1 | rclone-1.73.2-1.1 on GA media | 2026-03-09T00:00:00Z | 2026-03-09T00:00:00Z |
| opensuse-su-2026:10312-1 | python311-pymongo-4.16.0-1.1 on GA media | 2026-03-09T00:00:00Z | 2026-03-09T00:00:00Z |
| opensuse-su-2026:10311-1 | corepack24-24.13.0-4.1 on GA media | 2026-03-08T00:00:00Z | 2026-03-08T00:00:00Z |
| opensuse-su-2026:10310-1 | go1.25-1.25.8-1.1 on GA media | 2026-03-08T00:00:00Z | 2026-03-08T00:00:00Z |
| opensuse-su-2026:20332-1 | Security update for chromium | 2026-03-07T12:59:14Z | 2026-03-07T12:59:14Z |
| opensuse-su-2026:10309-1 | weblate-5.16.1-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10308-1 | virtiofsd-1.13.2-2.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10307-1 | tomcat11-11.0.18-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10306-1 | tomcat10-10.1.52-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10305-1 | tomcat-9.0.115-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10304-1 | python311-nltk-3.9.3-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10303-1 | libIex-3_4-33-3.4.6-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10302-1 | kubeshark-cli-53.1.0-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10301-1 | kernel-devel-longterm-6.18.16-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10300-1 | jetty-annotations-9.4.58-3.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10299-1 | go1.26-1.26.1-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10298-1 | exiv2-0.28.8-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10297-1 | coredns-1.14.2-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10296-1 | chromedriver-145.0.7632.159-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2129 | Red Hat Security Advisory: OpenShift Container Platform 4.21.1 bug fix and security update | 2026-02-10T09:39:14+00:00 | 2026-05-04T17:04:52+00:00 |
| rhsa-2026:2119 | Red Hat Security Advisory: OpenShift Container Platform 4.20.14 bug fix and security update | 2026-02-11T04:25:53+00:00 | 2026-05-04T17:04:51+00:00 |
| rhsa-2026:2082 | Red Hat Security Advisory: OpenShift Container Platform 4.21.1 packages and security update | 2026-02-10T11:30:56+00:00 | 2026-05-04T17:04:50+00:00 |
| rhsa-2026:2078 | Red Hat Security Advisory: OpenShift Container Platform 4.18.33 bug fix and security update | 2026-02-11T04:27:02+00:00 | 2026-05-04T17:04:49+00:00 |
| rhsa-2026:2071 | Red Hat Security Advisory: OpenShift Container Platform 4.18.33 packages and security update | 2026-02-11T04:55:25+00:00 | 2026-05-04T17:04:49+00:00 |
| rhsa-2026:1838 | Red Hat Security Advisory: image-builder security update | 2026-02-05T16:02:26+00:00 | 2026-05-04T17:04:46+00:00 |
| rhsa-2026:1837 | Red Hat Security Advisory: osbuild-composer security update | 2026-02-05T16:03:01+00:00 | 2026-05-04T17:04:46+00:00 |
| rhsa-2026:1552 | Red Hat Security Advisory: OpenShift Container Platform 4.19.23 bug fix and security update | 2026-02-04T10:50:17+00:00 | 2026-05-04T17:04:44+00:00 |
| rhsa-2026:1520 | Red Hat Security Advisory: Red Hat multicluster global hub 1.6.1 security update | 2026-01-29T01:14:38+00:00 | 2026-05-04T17:04:43+00:00 |
| rhsa-2026:1488 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.19.1 security update | 2026-01-28T12:24:36+00:00 | 2026-05-04T17:04:40+00:00 |
| rhsa-2026:1381 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T16:31:53+00:00 | 2026-05-04T17:04:40+00:00 |
| rhsa-2026:1378 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T15:37:28+00:00 | 2026-05-04T17:04:39+00:00 |
| rhsa-2026:1380 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T16:02:11+00:00 | 2026-05-04T17:04:38+00:00 |
| rhsa-2026:1379 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-27T16:11:53+00:00 | 2026-05-04T17:04:38+00:00 |
| rhsa-2026:1377 | Red Hat Security Advisory: image-builder security update | 2026-01-27T16:34:13+00:00 | 2026-05-04T17:04:38+00:00 |
| rhsa-2026:11858 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.7.10 security update | 2026-04-29T17:12:47+00:00 | 2026-05-04T17:04:30+00:00 |
| rhsa-2026:11331 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.2 | 2026-04-28T07:19:47+00:00 | 2026-05-04T17:04:26+00:00 |
| rhsa-2026:1072 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.15.1 security update | 2026-01-25T22:43:46+00:00 | 2026-05-04T17:04:22+00:00 |
| rhsa-2026:1071 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.10.1 security update | 2026-01-25T22:31:05+00:00 | 2026-05-04T17:04:21+00:00 |
| rhsa-2026:10703 | Red Hat Security Advisory: container-tools:rhel8 security update | 2026-04-27T02:17:32+00:00 | 2026-05-04T17:04:20+00:00 |
| rhsa-2026:1067 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.10.1 | 2026-01-23T16:45:25+00:00 | 2026-05-04T17:04:20+00:00 |
| rhsa-2026:1025 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T16:47:34+00:00 | 2026-05-04T17:04:16+00:00 |
| rhsa-2026:10172 | Red Hat Security Advisory: RHTAS 1.3.4 - Red Hat Trusted Artifact Signer Release | 2026-04-23T14:42:03+00:00 | 2026-05-04T17:04:14+00:00 |
| rhsa-2026:10158 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.7.2 | 2026-04-23T14:13:54+00:00 | 2026-05-04T17:04:13+00:00 |
| rhsa-2026:10153 | Red Hat Security Advisory: RHTAS 1.3.4 - Red Hat Trusted Artifact Signer Release | 2026-04-23T13:52:18+00:00 | 2026-05-04T17:04:11+00:00 |
| rhsa-2026:0987 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T11:30:22+00:00 | 2026-05-04T17:04:09+00:00 |
| rhsa-2026:0973 | Red Hat Security Advisory: osbuild-composer security update | 2026-01-22T05:34:26+00:00 | 2026-05-04T17:04:07+00:00 |
| rhsa-2026:0722 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.8.4 security update | 2026-01-15T17:23:06+00:00 | 2026-05-04T17:04:03+00:00 |
| rhsa-2026:0718 | Red Hat Security Advisory: Moderate: Red Hat Advanced Cluster Management for Kubernetes v2.13.5 security update | 2026-01-15T15:59:28+00:00 | 2026-05-04T17:04:02+00:00 |
| rhsa-2026:0671 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.8.4 | 2026-01-15T08:34:14+00:00 | 2026-05-04T17:04:02+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-382651 | SSA-382651: File Parsing Vulnerability in Solid Edge | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-292063 | SSA-292063: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.3 and 23.1.0 on RUGGEDCOM APE1808 devices | 2023-11-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-292022 | SSA-292022: Vulnerability in Nozomi Guardian/CMC before 23.4.1 on RUGGEDCOM APE1808 devices | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-273900 | SSA-273900: Multiple Vulnerabilities in SIMATIC CN 4100 before V3.0 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-258494 | SSA-258494: Stack Overflow Vulnerability in Simcenter Nastran before 2406.90 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-240541 | SSA-240541: WIBU Systems CodeMeter Heap Buffer Overflow Vulnerability in Industrial Products | 2023-09-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-225840 | SSA-225840: Vulnerabilities in the Network Communication Stack in Sinteso EN and Cerberus PRO EN Fire Protection Systems | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-046364 | SSA-046364: X_T File Parsing Vulnerabilities in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-999588 | SSA-999588: Multiple Vulnerabilities in User Management Component (UMC) Before V2.11.2 | 2023-12-12T00:00:00Z | 2025-01-14T00:00:00Z |
| SSA-976324 | SSA-976324: Multiple IGS File Parsing Vulnerabilities in PS/IGES Parasolid Translator Component before V27.1.215 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-968170 | SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products | 2023-06-13T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-962515 | SSA-962515: Out of Bounds Read Vulnerability in Industrial Products | 2024-05-14T00:00:00Z | 2024-12-10T00:00:00Z |
| SSA-953710 | SSA-953710: Vulnerabilities in the Network Communication Stack in Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-935500 | SSA-935500: Denial of Service Vulnerability in FTP Server of Nucleus RTOS based APOGEE, TALON and Desigo PXC/PXM Products | 2022-10-11T00:00:00Z | 2025-05-13T00:00:00Z |
| SSA-925850 | SSA-925850: Improper Access Control in Polarion ALM | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-871717 | SSA-871717: Multiple Vulnerabilities in Polarion ALM | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-712929 | SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products | 2022-06-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| SSA-691715 | SSA-691715: Vulnerability in OPC Foundation Local Discovery Server Affecting Siemens Products | 2023-04-11T00:00:00Z | 2025-09-09T00:00:00Z |
| SSA-665034 | SSA-665034: Vulnerability in Nozomi Guardian/CMC before 23.3.0 on RUGGEDCOM APE1808 devices | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-661579 | SSA-661579: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-647455 | SSA-647455: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.2 on RUGGEDCOM APE1808 devices | 2023-10-10T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-593272 | SSA-593272: SegmentSmack in Interniche IP-Stack based Industrial Devices | 2020-04-14T00:00:00Z | 2025-07-08T00:00:00Z |
| SSA-592380 | SSA-592380: Denial of Service Vulnerability in SIMATIC S7-1500 CPUs and related products | 2023-12-12T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-589937 | SSA-589937: Multiple Memory Corruption Vulnerabilities in Solid Edge | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2025-11-11T00:00:00Z |
| SSA-489698 | SSA-489698: X_T File Parsing Vulnerability in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-455250 | SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.2-h3 | 2024-04-09T00:00:00Z | 2025-05-13T00:00:00Z |
| SSA-382651 | SSA-382651: File Parsing Vulnerability in Solid Edge | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21111-1 | Security update for cockpit-subscriptions | 2026-04-14T12:16:29Z | 2026-04-14T12:16:29Z |
| suse-su-2026:1314-1 | Security update for ignition | 2026-04-14T11:07:12Z | 2026-04-14T11:07:12Z |
| suse-su-2026:1313-1 | Security update for freerdp2 | 2026-04-14T10:47:31Z | 2026-04-14T10:47:31Z |
| suse-su-2026:1312-1 | Security update for bind | 2026-04-14T10:46:32Z | 2026-04-14T10:46:32Z |
| suse-su-2026:1311-1 | Security update for libpng16 | 2026-04-14T10:44:51Z | 2026-04-14T10:44:51Z |
| suse-su-2026:1310-1 | Security update for libssh | 2026-04-14T10:42:14Z | 2026-04-14T10:42:14Z |
| suse-su-2026:1309-1 | Security update for sudo | 2026-04-14T10:39:38Z | 2026-04-14T10:39:38Z |
| suse-su-2026:1308-1 | Security update for sudo | 2026-04-14T10:38:01Z | 2026-04-14T10:38:01Z |
| suse-su-2026:1307-1 | Security update for strongswan | 2026-04-14T10:35:42Z | 2026-04-14T10:35:42Z |
| suse-su-2026:21118-1 | Security update for vim | 2026-04-14T08:33:54Z | 2026-04-14T08:33:54Z |
| suse-su-2026:21117-1 | Security update for avahi | 2026-04-14T08:31:12Z | 2026-04-14T08:31:12Z |
| suse-su-2026:21116-1 | Security update for python-cryptography | 2026-04-14T08:30:04Z | 2026-04-14T08:30:04Z |
| suse-su-2026:21115-1 | Security update for ignition | 2026-04-14T08:29:25Z | 2026-04-14T08:29:25Z |
| suse-su-2026:21127-1 | Security update for avahi | 2026-04-14T08:01:54Z | 2026-04-14T08:01:54Z |
| suse-su-2026:21128-1 | Security update for ignition | 2026-04-14T08:01:00Z | 2026-04-14T08:01:00Z |
| suse-su-2026:21126-1 | Security update for python-cryptography | 2026-04-14T07:57:50Z | 2026-04-14T07:57:50Z |
| suse-su-2026:21124-1 | Security update for vim | 2026-04-14T07:55:35Z | 2026-04-14T07:55:35Z |
| suse-su-2026:1305-1 | Security update for the Linux Kernel (Live Patch 76 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T18:34:02Z | 2026-04-13T18:34:02Z |
| suse-su-2026:21123-1 | Security update for the Linux Kernel | 2026-04-13T18:28:29Z | 2026-04-13T18:28:29Z |
| suse-su-2026:21114-1 | Security update for the Linux Kernel | 2026-04-13T17:04:49Z | 2026-04-13T17:04:49Z |
| suse-su-2026:21122-1 | Security update for kernel-livepatch-MICRO-6-0_Update_18 | 2026-04-13T16:42:46Z | 2026-04-13T16:42:46Z |
| suse-su-2026:21120-1 | Security update for kernel-livepatch-MICRO-6-0_Update_18 | 2026-04-13T16:42:46Z | 2026-04-13T16:42:46Z |
| suse-su-2026:1304-1 | Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T16:04:42Z | 2026-04-13T16:04:42Z |
| suse-su-2026:1303-1 | Security update for tigervnc | 2026-04-13T16:02:59Z | 2026-04-13T16:02:59Z |
| suse-su-2026:1302-1 | Security update for tigervnc | 2026-04-13T16:02:16Z | 2026-04-13T16:02:16Z |
| suse-su-2026:1301-1 | Security update for tigervnc | 2026-04-13T16:01:23Z | 2026-04-13T16:01:23Z |
| suse-su-2026:1300-1 | Security update for GraphicsMagick | 2026-04-13T15:58:01Z | 2026-04-13T15:58:01Z |
| suse-su-2026:1299-1 | Security update for nodejs24 | 2026-04-13T15:54:45Z | 2026-04-13T15:54:45Z |
| suse-su-2026:21186-1 | Security update for openssl-3 | 2026-04-13T15:48:01Z | 2026-04-13T15:48:01Z |
| suse-su-2026:21107-1 | Security update for openssl-3 | 2026-04-13T15:48:01Z | 2026-04-13T15:48:01Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1828 | Moderate: python3.12 security update | 2026-02-03T00:00:00Z | 2026-02-05T09:48:47Z |
| alsa-2026:1696 | Moderate: util-linux security update | 2026-02-02T00:00:00Z | 2026-02-03T11:05:12Z |
| alsa-2026:1715 | Important: golang-github-openprinting-ipp-usb security update | 2026-02-02T00:00:00Z | 2026-02-03T11:03:28Z |
| alsa-2026:1714 | Moderate: wireshark security update | 2026-02-02T00:00:00Z | 2026-02-03T11:02:21Z |
| alsa-2026:1662 | Moderate: kernel security update | 2026-02-02T00:00:00Z | 2026-02-02T13:45:57Z |
| alsa-2026:1661 | Moderate: kernel-rt security update | 2026-02-02T00:00:00Z | 2026-02-02T13:40:07Z |
| alsa-2026:1631 | Moderate: python3 security update | 2026-02-02T00:00:00Z | 2026-02-02T12:08:18Z |
| alsa-2026:1592 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T11:56:57Z |
| alsa-2026:1178 | Moderate: kernel security update | 2026-01-26T00:00:00Z | 2026-02-02T11:36:10Z |
| alsa-2026:1239 | Important: fence-agents security update | 2026-01-26T00:00:00Z | 2026-02-02T11:30:59Z |
| alsa-2026:1359 | Moderate: gcc-toolset-15-binutils security update | 2026-01-27T00:00:00Z | 2026-02-02T11:23:42Z |
| alsa-2026:1381 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-02-02T11:22:03Z |
| alsa-2026:1409 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:20:21Z |
| alsa-2026:1412 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:16:18Z |
| alsa-2026:1473 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-02-02T11:12:21Z |
| alsa-2026:1595 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:01:50Z |
| alsa-2026:1597 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:00:47Z |
| alsa-2026:1628 | Important: php security update | 2026-02-02T00:00:00Z | 2026-02-02T09:59:40Z |
| alsa-2026:1143 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-30T09:51:59Z |
| alsa-2026:1574 | Important: gimp:2.8 security update | 2026-01-29T00:00:00Z | 2026-01-29T14:07:36Z |
| alsa-2026:0932 | Important: java-1.8.0-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-29T13:07:43Z |
| alsa-2026:1518 | Important: grafana-pcp security update | 2026-01-28T00:00:00Z | 2026-01-29T12:32:40Z |
| alsa-2026:1350 | Moderate: curl security update | 2026-01-27T00:00:00Z | 2026-01-29T12:31:06Z |
| alsa-2026:1334 | Moderate: glibc security update | 2026-01-27T00:00:00Z | 2026-01-29T12:29:45Z |
| alsa-2026:1254 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-29T12:14:07Z |
| alsa-2026:1344 | Important: grafana security update | 2026-01-27T00:00:00Z | 2026-01-29T12:12:24Z |
| alsa-2026:1374 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:10:37Z |
| alsa-2026:1380 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-01-29T12:07:35Z |
| alsa-2026:1408 | Moderate: python3.12 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:05:44Z |
| alsa-2026:1410 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-93 | Heap-buffer-overflow in lj_strfmt_pushvf | 2025-02-05T00:18:14.584575Z | 2025-07-23T14:24:29.384461Z |
| osv-2025-249 | Heap-use-after-free in lj_strfmt_pushvf | 2025-04-02T00:09:53.120387Z | 2025-07-23T14:23:01.826780Z |
| osv-2025-267 | Stack-buffer-overflow in snap_usedef | 2025-04-08T00:17:16.034122Z | 2025-07-23T14:22:40.655455Z |
| osv-2025-570 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-07-23T00:17:34.356115Z | 2025-07-23T00:17:34.356449Z |
| osv-2023-838 | Use-of-uninitialized-value in wabt::BinaryReaderIR::OnOpcode | 2023-09-12T14:01:08.316035Z | 2025-07-22T14:22:12.701561Z |
| osv-2025-564 | Heap-buffer-overflow in ndpi_match_host_subprotocol | 2025-07-21T00:03:40.000875Z | 2025-07-21T00:03:40.001170Z |
| osv-2025-550 | Use-of-uninitialized-value in CFF::cff2_cs_opset_t<cff2_cs_opset_subr_subset_t, CFF::subr_subset_param_t, CFF: | 2025-07-16T00:09:08.050994Z | 2025-07-16T00:09:08.051469Z |
| osv-2025-544 | Heap-buffer-overflow in N_BELE_RTP::LEPolicy::get32 | 2025-07-11T00:16:53.687776Z | 2025-07-11T00:16:53.688703Z |
| osv-2025-542 | Use-of-uninitialized-value in httpEncode64_3 | 2025-07-10T00:07:45.698070Z | 2025-07-10T00:07:45.698655Z |
| osv-2025-541 | Heap-buffer-overflow in js_create_function | 2025-07-09T00:20:09.455729Z | 2025-07-09T00:20:09.456170Z |
| osv-2025-534 | Heap-use-after-free in ih264_inter_pred_luma_horz_ssse3 | 2025-07-08T00:08:11.218515Z | 2025-07-08T00:08:11.218991Z |
| osv-2025-530 | Invalid-free in cli_pdf | 2025-07-07T00:17:21.884018Z | 2025-07-07T00:17:21.884367Z |
| osv-2025-528 | Heap-buffer-overflow in xmlnode_parser_structural_error_libxml | 2025-07-07T00:10:42.902465Z | 2025-07-07T00:10:42.902766Z |
| osv-2025-525 | UNKNOWN READ in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-07-06T00:18:54.304371Z | 2025-07-06T00:18:54.304891Z |
| osv-2022-1276 | Stack-buffer-overflow in ntlm_phase_3 | 2023-06-15T14:01:52.594793Z | 2025-07-05T14:11:24.654963Z |
| osv-2025-524 | Heap-buffer-overflow in JS_CallInternal | 2025-07-05T00:19:21.758513Z | 2025-07-05T00:19:21.758880Z |
| osv-2025-515 | Use-of-uninitialized-value in JS_DefineProperty | 2025-07-03T00:16:17.481972Z | 2025-07-03T00:16:17.482410Z |
| osv-2025-512 | Invalid-free in pdf_decodestream | 2025-07-03T00:00:40.745577Z | 2025-07-03T00:00:40.746200Z |
| osv-2022-785 | Heap-buffer-overflow in resize_packet | 2022-08-27T00:00:14.614126Z | 2025-07-01T14:25:29.517657Z |
| osv-2022-572 | Heap-buffer-overflow in dhcp_reply | 2022-07-12T00:00:45.818288Z | 2025-07-01T14:24:05.029738Z |
| osv-2022-1101 | UNKNOWN READ in APFSBtreeNodeIterator<APFSJObjBtreeNode> APFSJObjBtreeNode::find<unsigned long, | 2022-10-28T00:00:27.714849Z | 2025-06-29T14:11:11.919343Z |
| osv-2025-500 | UNKNOWN READ in getUShort | 2025-06-29T00:08:49.553890Z | 2025-06-29T00:08:49.554520Z |
| osv-2023-225 | Heap-buffer-overflow in std::__1::enable_if<true, void>::type APFSBtreeNodeIterator<APFSBtreeNode<apfs_o | 2023-03-24T13:02:18.004510Z | 2025-06-28T14:26:09.281381Z |
| osv-2022-1106 | Heap-buffer-overflow in APFSJObject::add_entry | 2022-10-28T00:02:37.921684Z | 2025-06-28T14:21:48.859764Z |
| osv-2025-491 | Heap-buffer-overflow in libssl.soNUMBER | 2025-06-27T00:16:09.822144Z | 2025-06-27T00:16:09.822510Z |
| osv-2025-486 | Bad-cast to cv::PngDecoder from invalid vptr | 2025-06-24T00:16:24.786334Z | 2025-06-24T00:16:24.786690Z |
| osv-2025-485 | Use-of-uninitialized-value in pcpp::IDnsResource::decodeName | 2025-06-24T00:11:04.762139Z | 2025-06-24T00:11:04.762681Z |
| osv-2025-484 | Heap-buffer-overflow in load_protocols_file_fd | 2025-06-23T00:14:46.656195Z | 2025-06-23T00:14:46.656704Z |
| osv-2025-207 | Security exception in org.apache.lucene.analysis.tokenattributes.CharTermAttributeImpl.clone | 2025-03-16T00:02:33.765869Z | 2025-06-20T17:14:14.229009Z |
| osv-2024-1191 | Security exception in org.apache.lucene.analysis.miscellaneous.ASCIIFoldingFilter.foldToASCII | 2024-10-09T00:04:49.628226Z | 2025-06-20T16:39:29.501730Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2022-0097 | Out of bounds write in `wasmtime_trap_code` C API function | 2022-11-07T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0095 | Miscompilation of `i8x16.swizzle` and `select` with v128 inputs | 2022-06-27T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0089 | atomic-polyfill is unmaintained | 2023-07-11T12:00:00Z | 2025-04-29T08:31:10Z |
| rustsec-2025-0026 | registry is unmaintained | 2025-01-13T12:00:00Z | 2025-04-29T08:11:21Z |
| rustsec-2025-0025 | rustc-serialize is unmaintained | 2025-04-28T12:00:00Z | 2025-04-28T13:38:14Z |
| rustsec-2022-0044 | `markdown` (1.0.0 and higher) is maintained | 2022-01-17T12:00:00Z | 2025-04-28T10:35:27Z |
| rustsec-2025-0021 | SHA-1 collision attacks are not detected | 2025-04-03T12:00:00Z | 2025-04-08T07:10:04Z |
| rustsec-2025-0017 | The `trust-dns` project has been rebranded to `hickory-dns` | 2025-03-23T12:00:00Z | 2025-03-23T07:00:21Z |
| rustsec-2025-0014 | humantime is unmaintained | 2025-03-08T12:00:00Z | 2025-03-13T00:41:50Z |
| rustsec-2025-0013 | resolve is unmaintained | 2025-02-21T12:00:00Z | 2025-03-07T15:52:15Z |
| rustsec-2025-0011 | `openpgp-card-sequoia` is unmaintained. | 2025-03-04T12:00:00Z | 2025-03-07T15:47:21Z |
| rustsec-2025-0010 | Versions of *ring* prior to 0.17 are unmaintained. | 2025-03-05T12:00:00Z | 2025-03-07T15:46:47Z |
| rustsec-2025-0007 | *ring* is unmaintained | 2025-02-20T12:00:00Z | 2025-03-06T21:16:59Z |
| rustsec-2021-0087 | columnar: `Read` on uninitialized buffer may cause UB (ColumnarReadExt::read_typed_vec()) | 2021-01-07T12:00:00Z | 2025-02-01T00:07:11Z |
| rustsec-2025-0001 | gix-worktree-state nonexclusive checkout sets executable files world-writable | 2025-01-18T12:00:00Z | 2025-01-22T17:11:51Z |
| rustsec-2024-0434 | Missing facility to signal rotation of a verified cryptographic identity | 2024-01-07T12:00:00Z | 2025-01-22T10:27:39Z |
| rustsec-2024-0359 | The kstring integration in gix-attributes is unsound | 2024-07-24T12:00:00Z | 2025-01-19T00:36:24Z |
| rustsec-2024-0433 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| rustsec-2024-0432 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| rustsec-2024-0427 | get-size-derive is unmaintained | 2024-09-15T12:00:00Z | 2024-12-22T09:01:06Z |
| rustsec-2024-0425 | get-size is unmaintained | 2024-09-15T12:00:00Z | 2024-12-22T09:01:06Z |
| rustsec-2024-0423 | gtk-layer-shell-sys GTK3 bindings - no longer maintained | 2024-12-09T12:00:00Z | 2024-12-09T13:12:34Z |
| rustsec-2024-0422 | gtk-layer-shell GTK3 bindings - no longer maintained | 2024-12-09T12:00:00Z | 2024-12-09T13:12:34Z |
| rustsec-2024-0420 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0419 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0418 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0417 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0416 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0415 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0414 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-parse-2026-32742 | Parse Server session creation endpoint allows overwriting server-generated session fields | 2026-03-20T11:37:29.063Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32728 | Parse Server has a stored XSS filter bypass via Content-Type MIME parameter and missing XML extension blocklist entries | 2026-03-20T11:37:25.520Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2026-24733 | Apache Tomcat: Security constraint bypass with HTTP/0.9 | 2026-02-20T09:52:58.708Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-66614 | Apache Tomcat: Client certificate verification bypass due to virtual host mapping | 2026-02-20T09:52:57.300Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-61795 | Apache Tomcat: Delayed cleaning of multi-part upload temporary files may lead to DoS | 2025-11-06T13:00:35.478Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-55754 | Apache Tomcat: console manipulation via escape sequences in log messages | 2025-11-06T13:00:33.572Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-55668 | Apache Tomcat: session fixation via rewrite valve | 2025-08-18T08:14:21.163Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-52520 | Apache Tomcat: DoS via integer overflow in multipart file upload | 2025-07-16T08:19:00.271Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-48989 | Apache Tomcat: h2 DoS - Made You Reset | 2025-08-18T08:14:11.138Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-48988 | Apache Tomcat: FileUpload large number of parts with headers DoS | 2025-07-10T10:47:06.961Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-46701 | Apache Tomcat: Security constraint bypass for CGI scripts | 2025-07-10T10:47:00.568Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-31650 | Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame | 2025-04-30T05:56:04.703Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2024-54677 | Apache Tomcat: DoS in examples web application | 2025-07-10T10:46:30.955Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2024-50379 | Apache Tomcat: RCE due to TOCTOU issue in JSP compilation | 2025-07-10T10:45:55.643Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2024-23672 | Apache Tomcat: WebSocket DoS with incomplete closing handshake | 2025-07-17T08:09:47.503Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2023-34981 | Apache Tomcat: AJP response header mix-up | 2024-03-06T11:08:35.200Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-45143 | Apache Tomcat: JsonErrorReportValve escaping | 2024-03-06T11:09:02.789Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-42252 | Apache Tomcat request smuggling via malformed content-length | 2024-03-06T11:09:09.680Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-34305 | XSS in examples web application | 2024-03-06T11:09:17.789Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-29885 | EncryptInterceptor does not provide complete protection on insecure networks | 2024-03-06T11:09:24.492Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2022-23181 | Local privilege escalation with FileStore | 2024-03-06T11:09:36.902Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-43980 | Apache Tomcat: Information disclosure | 2024-03-06T11:09:43.693Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-42340 | DoS via memory leak with WebSocket connections | 2024-03-06T11:09:50.280Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-41079 | Apache Tomcat DoS with unexpected TLS packet | 2024-03-06T11:09:56.377Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-33037 | Incorrect Transfer-Encoding handling with HTTP/1.0 | 2024-03-06T11:10:01.262Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-30640 | Auth weakness in JNDIRealm | 2024-03-06T11:10:06.381Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-25329 | Incomplete fix for CVE-2020-9484 | 2024-03-06T11:10:17.511Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-25122 | Apache Tomcat h2c request mix-up | 2024-03-06T11:10:22.561Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2021-24122 | Apache Tomcat information disclosure | 2024-03-06T11:10:27.482Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2020-9484 | 2024-03-06T11:10:32.165Z | 2026-03-20T09:47:33.381Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-fn55648 | Security fixes for CVE-2025-25285, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-fj3w-jwp8-x2g3, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.6.0-r1, 2.7.0-r0 | 2026-04-01T10:06:10.961683Z | 2026-03-06T13:00:09Z |
| cleanstart-2026-hd58055 | Security fixes for CVE-2025-25285, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-3ppc-4f35-3m26, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.6.0-r1, 2.6.0-r2 | 2026-04-01T10:06:17.030926Z | 2026-03-06T12:59:45Z |
| cleanstart-2026-cy45415 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-fv92-fjc5-jj9h applied in versions: 3.6.16-r0, 3.7.4-r0, 3.7.7-r0 | 2026-04-01T10:06:30.444629Z | 2026-03-06T11:37:07Z |
| cleanstart-2026-ck64127 | Security fixes for ghsa-6rw7-vpxm-498p, ghsa-73rr-hh4g-fpgx, ghsa-8qq5-rm4j-mr97, ghsa-wqch-xfxh-vrr4 applied in versions: 4.2.1.1-r1 | 2026-04-01T10:06:15.177169Z | 2026-03-06T11:36:37Z |
| cleanstart-2026-fq05951 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-27141, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-p436-gjf2-799p, ghsa-p84v-gxvw-73pf applied in versions: 3.6.13-r0, 3.6.15-r1, 3.6.18-r0, 3.6.19-r0, 3.6.19-r1, 3.7.0-r0, 3.7.3-r0 | 2026-04-01T10:07:02.415559Z | 2026-03-06T07:23:30Z |
| cleanstart-2026-fx27781 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-27141, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.10-r0, 3.7.10-r1, 3.7.10-r2, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0 | 2026-04-01T10:07:09.669593Z | 2026-03-06T06:49:13Z |
| cleanstart-2026-pf41398 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2025-61732, CVE-2025-68121 applied in versions: 3.19.0-r0, 3.19.5-r0, 4.0.1-r0 | 2026-04-01T10:07:15.004853Z | 2026-03-06T05:33:23Z |
| cleanstart-2026-eu58098 | Security fixes for CVE-2025-61732, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.8.4-r0, 0.8.7-r0 | 2026-04-01T10:06:48.673123Z | 2026-03-05T12:22:12Z |
| cleanstart-2026-mk40719 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-27141, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-p84v-gxvw-73pf applied in versions: 3.6.13-r0, 3.6.15-r1, 3.6.18 r0, 3.6.18-r0, 3.7.0-r0, 3.7.3-r0 | 2026-04-01T10:07:36.130294Z | 2026-03-05T10:29:59Z |
| cleanstart-2026-yp32652 | Redis is an open source, in-memory database that persists on disk | 2026-03-04T00:42:01.150900Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-xj84245 | Rack is a modular Ruby web server interface | 2026-03-04T00:43:02.364521Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-wy43835 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-03-04T00:41:31.079681Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-vc01496 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 0.8.4-r0 | 2026-03-04T00:39:30.734261Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-sm37781 | Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic | 2026-03-04T00:45:05.719125Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-na21773 | GNU patch through 2 | 2026-03-04T00:42:01.122309Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-ew93264 | Security fixes for GHSA-4CX2-FC23-5WG6, GHSA-6XW4-3V39-52MM, GHSA-72QJ-48G4-5XGX, GHSA-MR3Q-G2MV-MR4Q, GHSA-P543-XPFM-54CP, GHSA-VC5P-V9HR-52MJ, GHSA-VQG5-3255-V292 applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-03-04T00:39:32.590174Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-cq83284 | Redis is an open source, in-memory database that persists on disk | 2026-03-04T00:43:01.818359Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-bz70876 | Redis is an open source, in-memory database that persists on disk | 2026-03-04T00:42:00.996564Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-ay29369 | Redis is an open source, in-memory database that persists on disk | 2026-03-04T00:43:31.868035Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-pm79547 | Security fixes for CVE-2018-20969, CVE-2018-6952, CVE-2019-13636, CVE-2019-13638, CVE-2019-20633 applied in versions: 2.7.6-r2, 2.7.6-r4, 2.7.6-r5, 2.7.6-r6, 2.7.6-r7 | 2026-04-01T10:07:37.644781Z | 2026-03-03T12:11:07Z |
| cleanstart-2026-ja70776 | Security fixes for CVE-2023-5870, CVE-2024-7348, CVE-2025-8713, CVE-2025-8714, CVE-2025-8715 applied in versions: 16.1-r0, 16.2-r0, 16.4-r0, 17.6-r0 | 2026-04-01T10:07:46.020645Z | 2026-03-03T12:09:34Z |
| cleanstart-2026-eq51133 | Security fixes for CVE-2023-5870, CVE-2024-7348, CVE-2025-8713, CVE-2025-8714, CVE-2025-8715 applied in versions: 16.1-r0, 16.2-r0, 16.4-r0, 17.6-r0 | 2026-04-01T10:07:46.021346Z | 2026-03-03T12:09:34Z |
| cleanstart-2026-mw73882 | filippo | 2026-03-03T00:39:03.237072Z | 2026-03-02T17:13:50Z |
| cleanstart-2026-by85815 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-03-03T00:39:03.275022Z | 2026-03-02T17:13:50Z |
| cleanstart-2026-qf85840 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2x5j-vhc8-9cwm, ghsa-2xsj-vh29-9cwm, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r, ghsa-r6j8-c6r2-37rr applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.0.22-r0, 3.0.22-r1, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4 | 2026-04-01T10:09:04.049698Z | 2026-03-02T11:48:00Z |
| cleanstart-2026-nr51277 | Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.8.4-r0 | 2026-04-01T10:07:57.467759Z | 2026-03-02T11:41:08Z |
| cleanstart-2026-zn32454 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-02-27T00:50:08.716833Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-zg64300 | Within HostnameError | 2026-02-27T01:05:11.090007Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-yw12690 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-27T01:01:12.144914Z | 2026-02-26T12:09:56Z |
| cleanstart-2026-xz04425 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-27T00:43:38.553069Z | 2026-02-26T12:09:56Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2005-ALE-013 | Vulnérabilité dans Citrix Metaframe Presentation | 2005-10-07T00:00:00.000000 | 2013-06-06T00:00:00.000000 |
| certa-2013-ale-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |
| CERTA-2013-ALE-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |
| certa-2013-ale-004 | Vulnérabilité dans Adobe ColdFusion | 2013-05-10T00:00:00.000000 | 2013-05-15T00:00:00.000000 |
| certa-2013-ale-003 | Vulnérabilité dans Microsoft Internet Explorer 8 | 2013-05-06T00:00:00.000000 | 2013-05-15T00:00:00.000000 |
| CERTA-2013-ALE-004 | Vulnérabilité dans Adobe ColdFusion | 2013-05-10T00:00:00.000000 | 2013-05-15T00:00:00.000000 |
| CERTA-2013-ALE-003 | Vulnérabilité dans Microsoft Internet Explorer 8 | 2013-05-06T00:00:00.000000 | 2013-05-15T00:00:00.000000 |
| certa-2013-ale-002 | Vulnérabilités dans Adobe Reader et Acrobat | 2013-02-14T00:00:00.000000 | 2013-02-21T00:00:00.000000 |
| certa-2008-ale-013 | Vulnérabilité du service sadmind de Sun Solaris | 2008-10-17T00:00:00.000000 | 2013-02-21T00:00:00.000000 |
| CERTA-2013-ALE-002 | Vulnérabilités dans Adobe Reader et Acrobat | 2013-02-14T00:00:00.000000 | 2013-02-21T00:00:00.000000 |
| CERTA-2008-ALE-013 | Vulnérabilité du service sadmind de Sun Solaris | 2008-10-17T00:00:00.000000 | 2013-02-21T00:00:00.000000 |
| certa-2009-ale-017 | Vulnérabilités dans l'implémentation TCP/IP de divers produits | 2009-09-09T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| certa-2007-ale-011 | Vulnérabilité du composant d'indexation des serveurs Microsoft IIS | 2007-06-06T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| CERTA-2009-ALE-017 | Vulnérabilités dans l'implémentation TCP/IP de divers produits | 2009-09-09T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| CERTA-2007-ALE-011 | Vulnérabilité du composant d'indexation des serveurs Microsoft IIS | 2007-06-06T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| certa-2012-ale-001 | Vulnérabilité dans Cisco IronPort | 2012-02-01T00:00:00.000000 | 2013-02-05T00:00:00.000000 |
| certa-2009-ale-014 | Multiples vulnérabilités du client de messagerie Mozilla Thunderbird | 2009-08-07T00:00:00.000000 | 2013-02-05T00:00:00.000000 |
| CERTA-2012-ALE-001 | Vulnérabilité dans Cisco IronPort | 2012-02-01T00:00:00.000000 | 2013-02-05T00:00:00.000000 |
| CERTA-2009-ALE-014 | Multiples vulnérabilités du client de messagerie Mozilla Thunderbird | 2009-08-07T00:00:00.000000 | 2013-02-05T00:00:00.000000 |
| certa-2013-ale-001 | Vulnérabilités dans Oracle Java | 2013-01-10T00:00:00.000000 | 2013-01-15T00:00:00.000000 |
| certa-2012-ale-010 | Vulnérabilité dans Internet Explorer | 2012-12-31T00:00:00.000000 | 2013-01-15T00:00:00.000000 |
| CERTA-2013-ALE-001 | Vulnérabilités dans Oracle Java | 2013-01-10T00:00:00.000000 | 2013-01-15T00:00:00.000000 |
| CERTA-2012-ALE-010 | Vulnérabilité dans Internet Explorer | 2012-12-31T00:00:00.000000 | 2013-01-15T00:00:00.000000 |
| certa-2012-ale-009 | Vulnérabilité dans les pilotes NVidia | 2012-12-26T00:00:00.000000 | 2013-01-07T00:00:00.000000 |
| certa-2012-ale-007 | Vulnérabilité dans MySQL | 2012-12-06T00:00:00.000000 | 2013-01-07T00:00:00.000000 |
| CERTA-2012-ALE-009 | Vulnérabilité dans les pilotes NVidia | 2012-12-26T00:00:00.000000 | 2013-01-07T00:00:00.000000 |
| CERTA-2012-ALE-007 | Vulnérabilité dans MySQL | 2012-12-06T00:00:00.000000 | 2013-01-07T00:00:00.000000 |
| certa-2012-ale-008 | Vulnérabilité dans certains terminaux Samsung | 2012-12-18T00:00:00.000000 | 2012-12-18T00:00:00.000000 |
| CERTA-2012-ALE-008 | Vulnérabilité dans certains terminaux Samsung | 2012-12-18T00:00:00.000000 | 2012-12-18T00:00:00.000000 |
| certa-2012-ale-006 | Vulnérabilité dans Internet Explorer | 2012-09-18T00:00:00.000000 | 2012-09-21T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0160 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0159 | Multiples vulnérabilités dans Keycloak | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0158 | Multiples vulnérabilités dans les produits Apple | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0157 | Multiples vulnérabilités dans les produits Qnap | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0156 | Multiples vulnérabilités dans Google Chrome | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0154 | Vulnérabilité dans Traefik | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0160 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0159 | Multiples vulnérabilités dans Keycloak | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0158 | Multiples vulnérabilités dans les produits Apple | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0157 | Multiples vulnérabilités dans les produits Qnap | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0156 | Multiples vulnérabilités dans Google Chrome | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2026-AVI-0155 | Multiples vulnérabilités dans SPIP | 2026-02-12T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| CERTFR-2026-AVI-0154 | Vulnérabilité dans Traefik | 2026-02-12T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-avi-0153 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0152 | Multiples vulnérabilités dans Microsoft Azure | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0151 | Vulnérabilité dans Microsoft .Net | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0150 | Multiples vulnérabilités dans Microsoft Windows | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0149 | Multiples vulnérabilités dans Microsoft Office | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0148 | Multiples vulnérabilités dans les produits Intel | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0147 | Multiples vulnérabilités dans les produits Fortinet | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0146 | Multiples vulnérabilités dans GitLab | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0145 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0143 | Multiples vulnérabilités dans Synology Storage Manager | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0142 | Multiples vulnérabilités dans MongoDB | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0153 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0152 | Multiples vulnérabilités dans Microsoft Azure | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0151 | Vulnérabilité dans Microsoft .Net | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0150 | Multiples vulnérabilités dans Microsoft Windows | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0149 | Multiples vulnérabilités dans Microsoft Office | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| CERTFR-2026-AVI-0148 | Multiples vulnérabilités dans les produits Intel | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2021-000105 | PowerCMS XMLRPC API vulnerable to OS command injection | 2021-11-24T15:47+09:00 | 2024-07-26T15:22+09:00 |
| jvndb-2024-000075 | ORC vulnerable to stack-based buffer overflow | 2024-07-26T13:55+09:00 | 2024-07-26T13:55+09:00 |
| jvndb-2022-000030 | Multiple vulnerabilities in Operation management interface of FUJITSU Network IPCOM | 2022-05-09T15:02+09:00 | 2024-07-18T16:30+09:00 |
| jvndb-2024-000073 | Assimp vulnerable to heap-based buffer overflow | 2024-07-18T13:44+09:00 | 2024-07-18T13:44+09:00 |
| jvndb-2024-000072 | Cybozu Garoon vulnerable to cross-site scripting | 2024-07-16T16:14+09:00 | 2024-07-16T16:14+09:00 |
| jvndb-2024-000071 | FUJITSU Network Edgiot GW1500 vulnerable to path traversal | 2024-07-16T14:41+09:00 | 2024-07-16T14:41+09:00 |
| jvndb-2023-007150 | Multiple vulnerabilities in First Corporation's DVRs | 2023-11-17T17:31+09:00 | 2024-07-11T17:05+09:00 |
| jvndb-2023-000094 | Multiple vulnerabilities in WordPress plugin "Welcart e-Commerce" | 2023-09-22T13:51+09:00 | 2024-07-11T16:49+09:00 |
| jvndb-2024-000007 | Multiple Dahua Technology products vulnerable to authentication bypass | 2024-01-18T13:43+09:00 | 2024-07-11T16:10+09:00 |
| jvndb-2024-001882 | Sharp NEC Display Solutions' public displays vulnerable to local file inclusion | 2024-02-07T14:25+09:00 | 2024-07-11T14:27+09:00 |
| jvndb-2024-000070 | Out-of-bounds write vulnerability in Ricoh MFPs and printers | 2024-07-10T14:16+09:00 | 2024-07-10T14:16+09:00 |
| jvndb-2024-000059 | Multiple vulnerabilities in multiple Webmin products | 2024-07-09T14:27+09:00 | 2024-07-09T14:27+09:00 |
| jvndb-2024-000069 | Cleartext transmission issue in TONE store App to TONE store | 2024-07-08T13:43+09:00 | 2024-07-08T13:43+09:00 |
| jvndb-2024-000068 | JP1/Extensible SNMP Agent fails to restrict access permissions | 2024-07-03T14:57+09:00 | 2024-07-03T14:57+09:00 |
| jvndb-2017-000194 | WSR-300HP vulnerable to arbitrary code execution | 2017-08-08T18:07+09:00 | 2024-07-02T17:55+09:00 |
| jvndb-2024-003831 | Multiple TP-Link products vulnerable to OS command injection | 2024-06-28T17:38+09:00 | 2024-06-28T17:38+09:00 |
| jvndb-2024-000067 | "Piccoma" App uses a hard-coded API key for an external service | 2024-06-28T13:18+09:00 | 2024-06-28T13:18+09:00 |
| jvndb-2016-002299 | SaAT Netizen fails to properly verify downloaded installation and update files | 2016-12-05T13:52+09:00 | 2024-06-27T13:59+09:00 |
| jvndb-2022-000080 | Android App "IIJ SmartKey" vulnerable to information disclosure | 2022-10-14T13:57+09:00 | 2024-06-27T13:40+09:00 |
| jvndb-2023-001774 | Multiple vulnerabilities in SolarView Compact | 2023-05-09T16:09+09:00 | 2024-06-27T13:30+09:00 |
| jvndb-2024-000017 | Cybozu KUNAI for Android vulnerable to denial-of-service (DoS) | 2024-02-06T13:25+09:00 | 2024-06-27T13:28+09:00 |
| jvndb-2024-000066 | WordPress plugins "WP Tweet Walls" and "Sola Testimonials" vulnerable to cross-site request forgery | 2024-06-26T14:25+09:00 | 2024-06-26T14:25+09:00 |
| jvndb-2022-000026 | WordPress Plugin "MicroPayments - Paid Author Subscriptions, Content, Downloads, Membership" vulnerable to cross-site request forgery | 2022-04-15T13:15+09:00 | 2024-06-25T18:04+09:00 |
| jvndb-2024-003699 | LINE client for iOS vulnerable to universal cross-site scripting | 2024-06-24T11:05+09:00 | 2024-06-24T11:05+09:00 |
| jvndb-2022-001372 | Trend Micro Antivirus for MAC vulnerable to privilege escalation | 2022-02-18T14:55+09:00 | 2024-06-21T18:04+09:00 |
| jvndb-2022-001381 | Multiple vulnerabilities in Trend Micro ServerProtect | 2022-03-03T14:42+09:00 | 2024-06-21T17:58+09:00 |
| jvndb-2022-000015 | EC-CUBE improperly handles HTTP Host header values | 2022-02-22T14:22+09:00 | 2024-06-21T17:39+09:00 |
| jvndb-2022-000013 | EC-CUBE plugin "Mail Magazine Management Plugin" vulnerable to cross-site request forgery | 2022-02-22T14:09+09:00 | 2024-06-21T14:05+09:00 |
| jvndb-2022-000023 | WordPress Plugin "Advanced Custom Fields" vulnerable to missing authorization | 2022-03-30T15:23+09:00 | 2024-06-21T12:25+09:00 |
| jvndb-2022-000020 | Multiple vulnerabilities in pfSense | 2022-03-15T14:58+09:00 | 2024-06-21T11:59+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16400 | HCL AION跨站脚本漏洞 | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16399 | HCL AION存在未明漏洞(CNVD-2026-16399) | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16398 | HCL AION命令注入漏洞 | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16397 | HCL AION信息泄露漏洞(CNVD-2026-16397) | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16396 | HCL AION拒绝服务漏洞 | 2026-03-19 | 2026-04-08 |
| cnvd-2026-16395 | OpenClaw权限提升漏洞(CNVD-2026-16395) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16394 | OpenClaw任意代码执行漏洞(CNVD-2026-16394) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16393 | OpenClaw沙盒逃逸漏洞 | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16392 | OpenClaw存在未明漏洞(CVE-2026-32913) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16391 | OpenClaw存在未明漏洞(CNVD-2026-16391) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16390 | OpenClaw拒绝服务漏洞(CNVD-2026-16390) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16389 | OpenClaw存在未明漏洞(CNVD-2026-16389) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16388 | OpenClaw路径限制绕过漏洞 | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16387 | OpenClaw存在未明漏洞(CNVD-2026-16387) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16386 | OpenClaw存在未明漏洞(CNVD-2026-16386) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16385 | OpenClaw存在未明漏洞(CNVD-2026-16385) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16384 | OpenClaw存在未明漏洞(CNVD-2026-16384) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16383 | OpenClaw存在未明漏洞(CNVD-2026-16383) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16382 | OpenClaw批准绕过漏洞 | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16381 | Mozilla Thunderbird信息泄露漏洞(CNVD-2026-16381) | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16380 | Mozilla Thunderbird欺骗漏洞(CNVD-2026-16380) | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16379 | Mozilla Firefox和Mozilla Thunderbird欺骗漏洞(CNVD-2026-16379) | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16378 | Mozilla Firefox和Mozilla Thunderbird安全绕过漏洞(CNVD-2026-16378) | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16377 | Mozilla Firefox和Mozilla Thunderbird资源管理错误漏洞(CNVD-2026-16377) | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16376 | Mozilla Firefox和Mozilla Thunderbird存在未明漏洞 | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16375 | Mozilla Firefox和Mozilla Thunderbird拒绝服务漏洞(CNVD-2026-16375) | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16374 | Mozilla Firefox和Mozilla Thunderbird拒绝服务漏洞 | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16373 | Mozilla Firefox和Mozilla Thunderbird资源管理错误漏洞 | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16372 | Mozilla Firefox和Mozilla Thunderbird代码执行漏洞(CNVD-2026-16372) | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16164 | Microsoft SharePoint Server欺骗漏洞(CNVD-2026-16164) | 2026-03-16 | 2026-04-07 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-12241 | Уязвимость компонента drivers/md/dm-cache-target.c ядра операционной системы Linux, позво… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12237 | Уязвимость компонента mac.c ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12236 | Уязвимость компонента net/sched/sch_skbprio.c ядра операционной системы Linux, позволяюща… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12233 | Уязвимость компонента net/mlx5 ядра операционной системы Linux, позволяющая нарушителю вы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12232 | Уязвимость компонента vcodec ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12231 | Уязвимость компонента vcodec ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12230 | Уязвимость компонента net/mlx5 ядра операционной системы Linux, позволяющая нарушителю вы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12228 | Уязвимость компонента displayport.c ядра операционной системы Linux, позволяющая нарушите… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12227 | Уязвимость функции find_format_by_pix() компонента drivers/usb/gadget/function/uvc_v4l2.c… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12226 | Уязвимость функции bnxt_set_rx_skb_mode() компонента bnxt_en ядра операционной системы Li… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12192 | Уязвимость компонента smb ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12191 | Уязвимость компонента acct ядра операционной системы Linux, позволяющая нарушителю вызват… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12189 | Уязвимость компонента bpf ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12185 | Уязвимость компонента tcp ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12184 | Уязвимость компонента qla1280.c ядра операционной системы Linux, позволяющая нарушителю в… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12182 | Уязвимость компонента sched ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12180 | Уязвимость компонента mpc.c ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12178 | Уязвимость компонента compat_alignment.c ядра операционной системы Linux, позволяющая нар… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12177 | Уязвимость компонента usbnet ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12176 | Уязвимость компонента sysctl.c ядра операционной системы Linux, позволяющая нарушителю вы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12175 | Уязвимость компонента calipso.c ядра операционной системы Linux, позволяющая нарушителю в… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12173 | Уязвимость компонента imx-card.c ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12170 | Уязвимость компонента RDMA/mlx5 ядра операционной системы Linux, позволяющая нарушителю в… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12169 | Уязвимость компонента RDMA/core ядра операционной системы Linux, позволяющая нарушителю п… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12168 | Уязвимость компонента drm/amd/display ядра операционной системы Linux, позволяющая наруши… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12167 | Уязвимость компонента int3402_thermal.c ядра операционной системы Linux, позволяющая нару… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12166 | Уязвимость компонента mptcp ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12165 | Уязвимость компонента ene-kb3930 ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12164 | Уязвимость компонента i3c ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12163 | Уязвимость ядра операционной системы Linux, связанная с ошибками разыменования нулеового … | 28.09.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201605-0467 | Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4… | 2024-07-23T21:36:25.410000Z |
| var-201306-0147 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:36:25.133000Z |
| var-202310-0175 | The HTTP/2 protocol allows a denial of service (server resource consumption) because requ… | 2024-07-23T21:36:24.758000Z |
| var-201110-0479 | Use-after-free vulnerability in Google Chrome before 15.0.874.102 allows user-assisted re… | 2024-07-23T21:36:24.394000Z |
| var-201804-1181 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:36:20.913000Z |
| var-202210-1070 | An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions … | 2024-07-23T21:36:19.928000Z |
| var-200501-0287 | Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a… | 2024-07-23T21:36:19.004000Z |
| var-202105-1311 | A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in … | 2024-07-23T21:35:12.003000Z |
| var-201804-1180 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:35:11.789000Z |
| var-201304-0300 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:35:11.273000Z |
| var-201006-1169 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2024-07-23T21:35:11.733000Z |
| var-202105-0131 | A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packe… | 2024-07-23T21:35:10.562000Z |
| var-201710-1404 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2024-07-23T21:35:10.631000Z |
| var-201711-0455 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:35:06.798000Z |
| var-201504-0478 | The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement… | 2024-07-23T21:35:06.207000Z |
| var-200704-0215 | Use-after-free vulnerability in Libinfo in Apple Mac OS X 10.3.9 through 10.4.9 allows re… | 2024-07-23T21:35:06.142000Z |
| var-201912-0584 | A memory corruption issue was addressed with improved input validation. This issue is fix… | 2024-07-23T21:35:05.474000Z |
| var-201512-0007 | Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 al… | 2024-07-23T21:35:01.063000Z |
| var-202005-0397 | json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file… | 2024-07-23T21:34:58.765000Z |
| var-200909-0801 | The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp modul… | 2024-07-23T21:34:26.443000Z |
| var-201105-0094 | The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library … | 2024-07-23T21:34:14.063000Z |
| var-201805-0950 | A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Softw… | 2024-07-23T21:34:13.151000Z |
| var-201707-1188 | An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari … | 2024-07-23T21:34:09.280000Z |
| var-201007-0318 | WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before… | 2024-07-23T21:34:09.881000Z |
| var-202010-1327 | A logic issue was addressed with improved validation. This issue is fixed in iCloud for W… | 2024-07-23T21:34:07.225000Z |
| var-201711-0448 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:34:05.466000Z |
| var-201710-1402 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2024-07-23T21:34:05.823000Z |
| var-202106-0345 | Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allo… | 2024-07-23T21:34:00.818000Z |
| var-201004-1006 | Heap-based buffer overflow in vmnc.dll in the VMnc media codec in VMware Movie Decoder be… | 2024-07-23T21:33:58.659000Z |
| var-201404-0377 | Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51,… | 2024-07-23T21:33:23.504000Z |