Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-6420 |
6.3 (3.1)
|
Keylime: keylime: security bypass due to hardcoded tpm… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-05-06T10:19:39.121Z | 2026-05-06T15:24:21.052Z |
| CVE-2026-27960 |
9.8 (3.1)
|
OpenCTI privilege escalation and unauthenticated acces… |
OpenCTI-Platform |
opencti |
2026-05-05T18:35:41.854Z | 2026-05-06T15:17:00.173Z |
| CVE-2026-32934 |
8.7 (4.0)
|
CoreDNS DNS-over-QUIC unbounded goroutine growth leads… |
coredns |
coredns |
2026-05-05T19:06:17.080Z | 2026-05-06T15:14:54.790Z |
| CVE-2025-8277 |
3.1 (3.1)
|
Libssh: memory exhaustion via repeated key exchange in… |
|
|
2025-09-09T11:55:39.036Z | 2026-05-06T15:12:53.124Z |
| CVE-2025-4878 |
3.6 (3.1)
|
Libssh: use of uninitialized variable in privatekey_fr… |
|
|
2025-07-22T14:17:03.122Z | 2026-05-06T15:12:50.472Z |
| CVE-2026-33975 |
8.3 (4.0)
|
twenty-server SSRF protection bypass via IPv4-mapped I… |
twentyhq |
twenty |
2026-05-05T19:19:18.112Z | 2026-05-06T15:11:42.410Z |
| CVE-2026-40329 |
9.3 (4.0)
|
SQL Injection vulnerability via sortBy in beanFeed |
MasaCMS |
MasaCMS |
2026-05-05T19:44:32.322Z | 2026-05-06T15:05:03.328Z |
| CVE-2025-4476 |
4.3 (3.1)
|
Libsoup: null pointer dereference in libsoup may lead … |
|
|
2025-05-16T17:56:58.302Z | 2026-05-06T15:05:02.263Z |
| CVE-2025-9901 |
5.9 (3.1)
|
Libsoup: improper handling of http vary header in libs… |
Red Hat |
Red Hat Enterprise Linux 10 |
2025-09-03T12:32:27.414Z | 2026-05-06T15:02:29.452Z |
| CVE-2026-39402 |
4.3 (4.0)
|
lxc lxc-user-nic insufficient ownership validation all… |
lxc |
lxc |
2026-05-05T20:45:24.107Z | 2026-05-06T14:57:40.046Z |
| CVE-2026-5119 |
5.9 (3.1)
|
Libsoup: libsoup: information disclosure via cleartext… |
Red Hat |
Red Hat Enterprise Linux 8 |
2026-03-30T05:35:57.099Z | 2026-05-06T14:52:53.104Z |
| CVE-2026-6860 |
6.9 (4.0)
|
A TCP client can perform a TLS handshake and pres… |
Eclipse Foundation |
Eclipse Vert.x |
2026-05-06T09:55:12.531Z | 2026-05-06T14:51:29.016Z |
| CVE-2024-3884 |
7.5 (3.1)
|
Undertow: outofmemory when parsing form data encoding … |
Red Hat |
Red Hat JBoss Enterprise Application Platform |
2025-12-03T18:40:25.606Z | 2026-05-06T14:50:10.361Z |
| CVE-2025-31957 |
2.6 (3.1)
|
HCL BigFix Service Management (SM) is affected by a Cr… |
HCL Software |
BigFix Service Management (SM) |
2026-05-06T13:37:42.635Z | 2026-05-06T14:50:06.147Z |
| CVE-2026-41287 |
7.1 (4.0)
|
Stack-based Buffer Overflow in WatchGuard Agent Discov… |
WatchGuard |
WatchGuard Agent |
2026-05-06T13:40:29.044Z | 2026-05-06T14:49:34.423Z |
| CVE-2025-31983 |
3.7 (3.1)
|
HCL BigFix Service Management (SM) is affected by a se… |
HCL |
BigFix Service Management (SM) |
2026-05-06T13:40:41.736Z | 2026-05-06T14:49:05.461Z |
| CVE-2025-31984 |
3.7 (3.1)
|
HCL BigFix Service Management (SM) is affected by a se… |
HCL |
BigFix Service Management (SM) |
2026-05-06T13:44:09.531Z | 2026-05-06T14:48:38.299Z |
| CVE-2025-31982 |
3.7 (3.1)
|
HCL BigFix Service Management (SM) had directories tha… |
HCL Software |
BigFix Service Management (SM) |
2026-05-06T13:46:05.065Z | 2026-05-06T14:48:15.530Z |
| CVE-2025-31959 |
3.5 (3.1)
|
HCL BigFix Service Management (SM) application fails t… |
HCL Software |
BigFix Service Management (SM) |
2026-05-06T13:47:20.437Z | 2026-05-06T14:47:52.965Z |
| CVE-2025-31978 |
4.6 (3.1)
|
HCL BigFix Service Management (SM) does not adequately… |
HCL Software |
BigFix Service Management (SM) |
2026-05-06T13:48:32.992Z | 2026-05-06T14:47:34.200Z |
| CVE-2025-31976 |
4.8 (3.1)
|
HCL BigFix Service Management (SM) is vulnerable to in… |
HCL Software |
BigFix Service Management (SM) |
2026-05-06T13:49:39.462Z | 2026-05-06T14:47:08.920Z |
| CVE-2025-52613 |
4.6 (3.1)
|
HCL BigFix Service Management (SM) is affected by use … |
HCL |
BigFix Service Management (SM) |
2026-05-06T13:50:47.494Z | 2026-05-06T14:46:49.273Z |
| CVE-2025-31975 |
2.6 (3.1)
|
HCL BigFix Service Management (SM) is affected by an I… |
HCL |
BigFix Service Management (SM) |
2026-05-06T13:51:40.756Z | 2026-05-06T14:46:31.277Z |
| CVE-2026-4878 |
6.7 (3.1)
|
Libcap: libcap: privilege escalation via toctou race c… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-09T14:49:02.942Z | 2026-05-06T14:41:54.762Z |
| CVE-2026-25075 |
8.7 (4.0)
7.5 (3.1)
|
strongSwan 4.5.0 < 6.0.5 EAP-TTLS AVP Parsing Integer … |
strongSwan |
strongSwan |
2026-03-23T18:33:10.952Z | 2026-05-06T14:41:06.076Z |
| CVE-2026-4568 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
SourceCodester Sales and Inventory System HTTP GET Req… |
SourceCodester |
Sales and Inventory System |
2026-03-23T02:12:57.973Z | 2026-05-06T14:40:36.327Z |
| CVE-2026-33238 |
4.3 (3.1)
|
AVideo has a Path Traversal in listFiles.json.php that… |
WWBN |
AVideo |
2026-03-20T23:31:35.134Z | 2026-05-06T14:40:15.866Z |
| CVE-2026-32034 |
6.1 (4.0)
8.1 (3.1)
|
OpenClaw < 2026.2.21 - Insecure Control UI Authenticat… |
OpenClaw |
OpenClaw |
2026-03-19T22:07:09.339Z | 2026-05-06T14:39:51.292Z |
| CVE-2026-32028 |
6.3 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.2.25 - Missing Authorization Check in … |
OpenClaw |
OpenClaw |
2026-03-19T22:07:03.710Z | 2026-05-06T14:39:11.175Z |
| CVE-2025-7700 |
5.3 (3.1)
|
Ffmpeg: null pointer dereference in ffmpeg als decoder… |
|
|
2025-11-07T18:59:28.962Z | 2026-05-06T14:38:29.969Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-7923 |
8.3 (3.1)
|
Out of bounds write in Skia in Google Chrome prio… |
Google |
Chrome |
2026-05-06T18:12:34.929Z | 2026-05-07T03:56:51.562Z |
| CVE-2026-7924 |
6.5 (3.1)
|
Uninitialized Use in Dawn in Google Chrome prior … |
Google |
Chrome |
2026-05-06T18:12:35.280Z | 2026-05-06T22:00:50.911Z |
| CVE-2026-7925 |
7.8 (3.1)
|
Use after free in Chromoting in Google Chrome on … |
Google |
Chrome |
2026-05-06T18:12:35.636Z | 2026-05-07T03:56:26.606Z |
| CVE-2026-7926 |
8.8 (3.1)
|
Use after free in PresentationAPI in Google Chrom… |
Google |
Chrome |
2026-05-06T18:12:36.012Z | 2026-05-07T03:56:25.474Z |
| CVE-2026-7927 |
8.8 (3.1)
|
Type Confusion in Runtime in Google Chrome prior … |
Google |
Chrome |
2026-05-06T18:12:36.406Z | 2026-05-07T03:56:27.693Z |
| CVE-2026-7928 |
8.8 (3.1)
|
Use after free in WebRTC in Google Chrome on Wind… |
Google |
Chrome |
2026-05-06T18:12:36.787Z | 2026-05-07T03:56:28.823Z |
| CVE-2026-7929 |
7.5 (3.1)
|
Use after free in MediaRecording in Google Chrome… |
Google |
Chrome |
2026-05-06T18:12:37.284Z | 2026-05-07T03:56:29.914Z |
| CVE-2026-7930 |
8.8 (3.1)
|
Insufficient validation of untrusted input in Coo… |
Google |
Chrome |
2026-05-06T18:12:37.623Z | 2026-05-07T03:56:52.635Z |
| CVE-2026-7931 |
5.4 (3.1)
|
Insufficient validation of untrusted input in iOS… |
Google |
Chrome |
2026-05-06T18:12:37.957Z | 2026-05-06T21:59:39.527Z |
| CVE-2026-7932 |
4.4 (3.1)
|
Insufficient policy enforcement in Downloads in G… |
Google |
Chrome |
2026-05-06T18:12:38.313Z | 2026-05-06T21:59:30.140Z |
| CVE-2026-7933 |
4.3 (3.1)
|
Out of bounds read in WebCodecs in Google Chrome … |
Google |
Chrome |
2026-05-06T18:12:38.657Z | 2026-05-06T21:59:20.276Z |
| CVE-2026-7934 |
4.2 (3.1)
|
Insufficient validation of untrusted input in Pop… |
Google |
Chrome |
2026-05-06T18:12:39.058Z | 2026-05-06T21:59:10.906Z |
| CVE-2026-7935 |
5.4 (3.1)
|
Inappropriate implementation in Speech in Google … |
Google |
Chrome |
2026-05-06T18:12:39.418Z | 2026-05-06T21:59:01.035Z |
| CVE-2026-7936 |
4.3 (3.1)
|
Object lifecycle issue in V8 in Google Chrome pri… |
Google |
Chrome |
2026-05-06T18:12:39.778Z | 2026-05-06T21:58:51.607Z |
| CVE-2026-7937 |
3.1 (3.1)
|
Insufficient policy enforcement in DevTools in Go… |
Google |
Chrome |
2026-05-06T18:12:42.026Z | 2026-05-06T21:58:42.236Z |
| CVE-2026-7938 |
8.8 (3.1)
|
Use after free in CSS in Google Chrome prior to 1… |
Google |
Chrome |
2026-05-06T18:12:43.828Z | 2026-05-07T03:56:24.293Z |
| CVE-2026-7939 |
5.4 (3.1)
|
Inappropriate implementation in SanitizerAPI in G… |
Google |
Chrome |
2026-05-06T18:12:44.270Z | 2026-05-06T21:58:23.432Z |
| CVE-2026-7940 |
8.8 (3.1)
|
Use after free in V8 in Google Chrome prior to 14… |
Google |
Chrome |
2026-05-06T18:12:44.751Z | 2026-05-07T03:56:23.189Z |
| CVE-2026-7941 |
4.4 (3.1)
|
Insufficient validation of untrusted input in Mob… |
Google |
Chrome |
2026-05-06T18:12:45.168Z | 2026-05-06T21:58:04.597Z |
| CVE-2026-7942 |
4.3 (3.1)
|
Integer overflow in ANGLE in Google Chrome prior … |
Google |
Chrome |
2026-05-06T18:12:45.701Z | 2026-05-06T21:57:55.178Z |
| CVE-2026-7943 |
4.2 (3.1)
|
Insufficient validation of untrusted input in ANG… |
Google |
Chrome |
2026-05-06T18:12:46.107Z | 2026-05-06T21:57:45.696Z |
| CVE-2026-7944 |
3.1 (3.1)
|
Insufficient validation of untrusted input in Per… |
Google |
Chrome |
2026-05-06T18:12:46.701Z | 2026-05-06T21:57:36.263Z |
| CVE-2026-7945 |
3.1 (3.1)
|
Insufficient validation of untrusted input in COO… |
Google |
Chrome |
2026-05-06T18:12:47.048Z | 2026-05-06T21:57:26.339Z |
| CVE-2026-7946 |
4.3 (3.1)
|
Insufficient policy enforcement in WebUI in Googl… |
Google |
Chrome |
2026-05-06T18:12:47.542Z | 2026-05-06T21:57:16.938Z |
| CVE-2026-7947 |
4.2 (3.1)
|
Insufficient validation of untrusted input in Net… |
Google |
Chrome |
2026-05-06T18:12:47.991Z | 2026-05-06T21:57:06.912Z |
| CVE-2026-7973 |
8.8 (3.1)
|
Integer overflow in Dawn in Google Chrome on Wind… |
Google |
Chrome |
2026-05-06T18:12:57.739Z | 2026-05-07T03:56:13.865Z |
| CVE-2026-7974 |
8.8 (3.1)
|
Use after free in Blink in Google Chrome prior to… |
Google |
Chrome |
2026-05-06T18:12:58.111Z | 2026-05-07T03:56:12.725Z |
| CVE-2026-7975 |
8.3 (3.1)
|
Use after free in DevTools in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:12:58.457Z | 2026-05-07T03:56:11.421Z |
| CVE-2026-7976 |
7.5 (3.1)
|
Use after free in Views in Google Chrome prior to… |
Google |
Chrome |
2026-05-06T18:12:58.810Z | 2026-05-07T03:56:10.296Z |
| CVE-2026-7977 |
6.3 (3.1)
|
Inappropriate implementation in Canvas in Google … |
Google |
Chrome |
2026-05-06T18:12:59.116Z | 2026-05-06T21:52:21.357Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-7983 | Out of bounds read in Dawn in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to lea… | 2026-05-06T19:16:49.177 | 2026-05-06T23:21:46.353 |
| fkie_cve-2026-7984 | Use after free in ReadingMode in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who… | 2026-05-06T19:16:49.280 | 2026-05-06T23:21:35.400 |
| fkie_cve-2026-7985 | Use after free in GPU in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had com… | 2026-05-06T19:16:49.383 | 2026-05-06T23:21:23.023 |
| fkie_cve-2026-7986 | Insufficient policy enforcement in Autofill in Google Chrome prior to 148.0.7778.96 allowed a remot… | 2026-05-06T19:16:49.483 | 2026-05-06T23:21:14.823 |
| fkie_cve-2026-7987 | Use after free in WebRTC in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execu… | 2026-05-06T19:16:49.577 | 2026-05-06T23:20:47.043 |
| fkie_cve-2026-7988 | Type Confusion in WebRTC in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execu… | 2026-05-06T19:16:49.677 | 2026-05-06T23:20:36.123 |
| fkie_cve-2026-7989 | Insufficient data validation in DataTransfer in Google Chrome prior to 148.0.7778.96 allowed a remo… | 2026-05-06T19:16:49.783 | 2026-05-06T23:20:26.663 |
| fkie_cve-2026-7990 | Insufficient validation of untrusted input in Updater in Google Chrome on Windows prior to 148.0.77… | 2026-05-06T19:16:49.877 | 2026-05-06T23:20:16.747 |
| fkie_cve-2026-7991 | Use after free in UI in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had comp… | 2026-05-06T19:16:49.977 | 2026-05-06T23:19:55.290 |
| fkie_cve-2026-7992 | Insufficient validation of untrusted input in UI in Google Chrome on Linux, ChromeOS prior to 148.0… | 2026-05-06T19:16:50.080 | 2026-05-06T23:19:45.137 |
| fkie_cve-2026-7993 | Insufficient validation of untrusted input in Payments in Google Chrome on Android prior to 148.0.7… | 2026-05-06T19:16:50.177 | 2026-05-06T23:19:28.493 |
| fkie_cve-2026-7994 | Inappropriate implementation in Chromoting in Google Chrome on Windows prior to 148.0.7778.96 allow… | 2026-05-06T19:16:50.277 | 2026-05-06T23:19:18.893 |
| fkie_cve-2026-7995 | Out of bounds read in AdFilter in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to… | 2026-05-06T19:16:50.370 | 2026-05-06T23:19:07.370 |
| fkie_cve-2026-7996 | Insufficient validation of untrusted input in SSL in Google Chrome prior to 148.0.7778.96 allowed a… | 2026-05-06T19:16:50.477 | 2026-05-06T23:18:54.167 |
| fkie_cve-2026-7997 | Insufficient validation of untrusted input in Updater in Google Chrome on Mac prior to 148.0.7778.9… | 2026-05-06T19:16:50.607 | 2026-05-06T23:18:39.007 |
| fkie_cve-2025-31983 | HCL BigFix Service Management (SM) is affected by a security misconfiguration vulnerability due to … | 2026-05-06T15:16:07.783 | 2026-05-06T23:17:39.177 |
| fkie_cve-2025-31982 | HCL BigFix Service Management (SM) had directories that were not linked or publicly visible but cou… | 2026-05-06T15:16:06.320 | 2026-05-06T23:16:36.953 |
| fkie_cve-2026-6278 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-05-06T23:16:22.163 | 2026-05-06T23:16:22.163 |
| fkie_cve-2017-5351 | Samsung Note devices with KK(4.4), L(5.0/5.1), and M(6.0) software allow attackers to crash the sys… | 2017-01-12T06:59:00.467 | 2026-05-06T22:30:45.220 |
| fkie_cve-2017-5350 | Samsung Note devices with L(5.0/5.1), M(6.0), and N(7.0) software allow attackers to crash systemUI… | 2017-01-12T06:59:00.453 | 2026-05-06T22:30:45.220 |
| fkie_cve-2017-5347 | SQL injection vulnerability in inc/mod/newsletter/options.php in GeniXCMS 0.0.8 allows remote authe… | 2017-01-12T06:59:00.420 | 2026-05-06T22:30:45.220 |
| fkie_cve-2017-5346 | SQL injection vulnerability in inc/lib/Control/Backend/posts.control.php in GeniXCMS 0.0.8 allows r… | 2017-01-12T06:59:00.390 | 2026-05-06T22:30:45.220 |
| fkie_cve-2017-5345 | SQL injection vulnerability in inc/lib/Control/Ajax/tags-ajax.control.php in GeniXCMS 0.0.8 allows … | 2017-01-12T06:59:00.360 | 2026-05-06T22:30:45.220 |
| fkie_cve-2017-5340 | Zend/zend_hash.c in PHP before 7.0.15 and 7.1.x before 7.1.1 mishandles certain cases that require … | 2017-01-11T06:59:00.160 | 2026-05-06T22:30:45.220 |
| fkie_cve-2017-5225 | LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS … | 2017-01-12T11:59:00.133 | 2026-05-06T22:30:45.220 |
| fkie_cve-2017-5217 | Installing a zero-permission Android application on certain Samsung Android devices with KK(4.4), L… | 2017-01-09T08:59:00.247 | 2026-05-06T22:30:45.220 |
| fkie_cve-2017-5216 | Stack-based buffer overflow vulnerability in Netop Remote Control versions 11.53, 12.21 and prior. … | 2017-01-09T08:59:00.217 | 2026-05-06T22:30:45.220 |
| fkie_cve-2017-5209 | The base64decode function in base64.c in libimobiledevice libplist through 1.12 allows attackers to… | 2017-01-11T16:59:00.377 | 2026-05-06T22:30:45.220 |
| fkie_cve-2017-5179 | Cross-site scripting (XSS) vulnerability in Tenable Nessus before 6.9.3 allows remote authenticated… | 2017-01-05T22:59:00.267 | 2026-05-06T22:30:45.220 |
| fkie_cve-2017-5005 | Stack-based buffer overflow in Quick Heal Internet Security 10.1.0.316 and earlier, Total Security … | 2017-01-02T22:59:00.133 | 2026-05-06T22:30:45.220 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-fww4-38vg-fx8g |
5.5 (3.1)
|
Buffer Overflow vulnerability in GPAC before commit v391dc7f4d234988ea0bc3cc294eb725eddf8f702 allow… | 2026-05-05T18:33:24Z | 2026-05-06T21:31:35Z |
| ghsa-5x9h-93gp-chpj |
6.1 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-05-06T12:30:25Z | 2026-05-06T21:31:35Z |
| ghsa-48q2-ffv8-pgrw |
8.8 (3.1)
|
The ping diagnostic handler in /bin/httpd_clientside for ALTICE LABS / SFR France GR140DG and GR140… | 2026-05-05T18:33:24Z | 2026-05-06T21:31:34Z |
| ghsa-489r-v3h6-c72q |
8.8 (3.1)
|
The traceroute diagnostic handler in /bin/httpd_clientside for ALTICE LABS / SFR France GR140DG and… | 2026-05-05T18:33:24Z | 2026-05-06T21:31:34Z |
| ghsa-xmgr-rx43-m3gf |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: use check_add_overflow(… | 2026-05-01T15:30:33Z | 2026-05-06T21:31:32Z |
| ghsa-pmxh-4w53-fp85 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_uac1_legacy: va… | 2026-05-01T15:30:33Z | 2026-05-06T21:31:32Z |
| ghsa-p5ww-jrfv-82qx |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: fuse: abort on fatal signal du… | 2026-05-01T15:30:33Z | 2026-05-06T21:31:32Z |
| ghsa-gx44-7282-c76j |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_rndis: Fix net_… | 2026-05-01T15:30:33Z | 2026-05-06T21:31:32Z |
| ghsa-8r63-5629-3mpc |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_hid: move list … | 2026-05-01T15:30:33Z | 2026-05-06T21:31:32Z |
| ghsa-8293-64hg-p37m |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix dir separator… | 2026-05-01T15:30:33Z | 2026-05-06T21:31:32Z |
| ghsa-48wq-5h48-mwqq |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid memory leak… | 2026-05-01T15:30:33Z | 2026-05-06T21:31:32Z |
| ghsa-pf8h-4wmf-9gv4 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: caiaq: take a reference … | 2026-05-01T15:30:32Z | 2026-05-06T21:31:31Z |
| ghsa-jrvq-m3v6-8wm9 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix missing validation … | 2026-05-01T15:30:32Z | 2026-05-06T21:31:31Z |
| ghsa-cv2m-jfc5-xx45 |
7.5 (3.1)
7.7 (4.0)
|
Unauthenticated attackers can exploit a weakness in the XML parser functionality of Lobster_pro pri… | 2026-04-30T15:30:39Z | 2026-05-06T21:31:31Z |
| ghsa-5c3m-p5m6-p659 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix use-after-free of sb… | 2026-05-01T15:30:32Z | 2026-05-06T21:31:31Z |
| ghsa-3c28-g28m-gm93 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: fix double free v… | 2026-04-30T12:33:12Z | 2026-05-06T21:31:31Z |
| ghsa-xpxm-p6f4-j2mf |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: rtnetlink: add missing netlink… | 2026-04-30T12:33:12Z | 2026-05-06T21:31:30Z |
| ghsa-wvmf-v9m3-rvrr |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: gpio: omap: do not register dr… | 2026-04-27T18:32:10Z | 2026-05-06T21:31:30Z |
| ghsa-p63m-cmvw-gf7r |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mm/kasan: fix double free for … | 2026-04-27T18:32:09Z | 2026-05-06T21:31:30Z |
| ghsa-gj33-f2q3-mjhg |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: sched: act_csum: validate… | 2026-04-25T09:30:28Z | 2026-05-06T21:31:30Z |
| ghsa-f822-mpgr-7cqx |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_multiport: valid… | 2026-04-25T09:30:28Z | 2026-05-06T21:31:30Z |
| ghsa-cxv6-chw7-mhrh |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: driver core: enforce device_lo… | 2026-04-27T18:32:09Z | 2026-05-06T21:31:30Z |
| ghsa-9qrw-cmg5-g8vq |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: EDAC/mc: Fix error path orderi… | 2026-04-27T18:32:09Z | 2026-05-06T21:31:30Z |
| ghsa-3mf8-6wc5-2f9c |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: igb: remove napi_synchronize()… | 2026-04-27T18:32:09Z | 2026-05-06T21:31:30Z |
| ghsa-3j3v-v8vh-9mw9 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: firmware: thead: Fix buffer ov… | 2026-04-27T18:32:09Z | 2026-05-06T21:31:30Z |
| ghsa-25g2-2jj3-xvxx |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - limit RX SG e… | 2026-04-25T09:30:28Z | 2026-05-06T21:31:30Z |
| ghsa-v758-4p42-wqcm |
7.5 (3.1)
8.7 (4.0)
|
This vulnerability exists in Quantum Networks router due to improper access control and insecure de… | 2026-04-21T12:30:24Z | 2026-05-06T21:31:29Z |
| ghsa-mqx2-c63m-7p93 |
8.8 (3.1)
7.6 (4.0)
|
This vulnerability exists in Quantum Networks router due to lack of enforcement of strong password … | 2026-04-21T12:30:24Z | 2026-05-06T21:31:29Z |
| ghsa-hmg2-5h4j-37m9 |
8.2 (3.1)
|
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vu… | 2026-04-01T15:31:15Z | 2026-05-06T21:31:29Z |
| ghsa-g4g9-h6f9-v5x2 |
7.5 (3.1)
|
A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity v… | 2026-04-01T15:31:15Z | 2026-05-06T21:31:29Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2017-140 |
5.5 (3.1)
|
There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk func… | exiv2 | 2017-12-13T22:29:00Z | 2024-11-21T14:22:47.521911Z |
| pysec-2017-139 |
5.5 (3.1)
|
There is a heap-based buffer overflow in the Exiv2::s2Data function of types.cpp in Exiv2… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.458235Z |
| pysec-2017-138 |
5.5 (3.1)
|
There is a heap-based buffer overflow in the Exiv2::us2Data function of types.cpp in Exiv… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.398419Z |
| pysec-2017-137 |
5.5 (3.1)
|
An Invalid memory address dereference was discovered in Exiv2::getULong in types.cpp in E… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.340172Z |
| pysec-2017-136 |
5.5 (3.1)
|
A NULL pointer dereference was discovered in Exiv2::Image::printIFDStructure in image.cpp… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.277896Z |
| pysec-2017-135 |
5.5 (3.1)
|
An Invalid memory address dereference was discovered in Exiv2::DataValue::read in value.c… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.218172Z |
| pysec-2017-134 |
5.5 (3.1)
|
There is a stack consumption vulnerability in the Exiv2::Internal::stringFormat function … | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.157939Z |
| pysec-2017-133 |
5.5 (3.1)
|
There is a heap-based buffer over-read in the Exiv2::Jp2Image::readMetadata function of j… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.10072Z |
| pysec-2017-132 |
5.5 (3.1)
|
An Invalid memory address dereference was discovered in Exiv2::StringValueBase::read in v… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:47.041853Z |
| pysec-2017-131 |
5.5 (3.1)
|
There is a heap-based buffer overflow in the Exiv2::l2Data function of types.cpp in Exiv2… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:46.982152Z |
| pysec-2017-130 |
5.5 (3.1)
|
In Exiv2 0.26, there is an invalid free in the Image class in image.cpp that leads to a S… | exiv2 | 2017-09-29T01:34:00Z | 2024-11-21T14:22:46.923551Z |
| pysec-2017-129 |
6.5 (3.1)
|
There is a heap-based buffer over-read in libexiv2 in Exiv2 0.26 that is triggered in the… | exiv2 | 2017-08-18T21:29:00Z | 2024-11-21T14:22:46.862068Z |
| pysec-2017-128 |
6.5 (3.1)
|
There is an illegal address access in Exiv2::FileIo::path[abi:cxx11]() in basicio.cpp of … | exiv2 | 2017-08-18T21:29:00Z | 2024-11-21T14:22:46.791764Z |
| pysec-2017-127 |
8.8 (3.1)
|
There is a heap-based buffer overflow in basicio.cpp of Exiv2 0.26. The vulnerability cau… | exiv2 | 2017-08-18T21:29:00Z | 2024-11-21T14:22:46.732582Z |
| pysec-2017-126 |
6.5 (3.1)
|
There is a reachable assertion in the Internal::TiffReader::visitDirectory function in ti… | exiv2 | 2017-07-27T06:29:00Z | 2024-11-21T14:22:46.672784Z |
| pysec-2017-125 |
7.5 (3.1)
|
There is a Mismatched Memory Management Routines vulnerability in the Exiv2::FileIo::seek… | exiv2 | 2017-07-24T01:29:00Z | 2024-11-21T14:22:46.598979Z |
| pysec-2017-124 |
7.5 (3.1)
|
There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that w… | exiv2 | 2017-07-24T01:29:00Z | 2024-11-21T14:22:46.539614Z |
| pysec-2017-123 |
7.5 (3.1)
|
There is an illegal address access in the extend_alias_table function in localealias.c of… | exiv2 | 2017-07-23T03:29:00Z | 2024-11-21T14:22:46.480449Z |
| pysec-2017-122 |
6.5 (3.1)
|
There is a Segmentation fault in the XmpParser::terminate() function in Exiv2 0.26, relat… | exiv2 | 2017-07-17T13:18:00Z | 2024-11-21T14:22:46.411851Z |
| pysec-2017-121 |
6.5 (3.1)
|
There is a heap-based buffer overflow in the Image::printIFDStructure function of image.c… | exiv2 | 2017-07-17T13:18:00Z | 2024-11-21T14:22:46.352202Z |
| pysec-2017-120 |
6.5 (3.1)
|
There is an infinite loop in the Exiv2::Image::printIFDStructure function of image.cpp in… | exiv2 | 2017-07-17T13:18:00Z | 2024-11-21T14:22:46.291386Z |
| pysec-2017-119 |
6.5 (3.1)
|
There is an invalid free in the Action::TaskFactory::cleanup function of actions.cpp in E… | exiv2 | 2017-07-17T13:18:00Z | 2024-11-21T14:22:46.232444Z |
| pysec-2017-118 |
6.5 (3.1)
|
There is a heap-based buffer over-read in the Image::printIFDStructure function in image.… | exiv2 | 2017-07-17T13:18:00Z | 2024-11-21T14:22:46.174866Z |
| pysec-2017-117 |
5.5 (3.1)
|
Exiv2 0.26 contains a stack out of bounds read in JPEG2000 parser | exiv2 | 2017-11-17T22:29:00Z | 2024-11-21T14:22:46.115176Z |
| pysec-2017-116 |
5.5 (3.1)
|
Exiv2 0.26 contains a heap buffer overflow in tiff parser | exiv2 | 2017-11-17T22:29:00Z | 2024-11-21T14:22:46.052386Z |
| pysec-2024-125 |
7.5 (3.1)
|
DIRAC is a distributed resource framework. In affected versions any user could get a toke… | dirac | 2024-02-09T00:15:00+00:00 | 2024-11-21T14:22:45.495938+00:00 |
| pysec-2022-43133 |
9.8 (3.1)
|
The drxhello package in PyPI v0.0.1 was discovered to contain a code execution backdoor v… | drxhello | 2022-06-24T21:15:00Z | 2024-11-21T14:22:45.663614Z |
| pysec-2022-43132 |
9.8 (3.1)
|
The DR-Web-Engine package in PyPI v0.2.0b0 was discovered to contain a code execution bac… | dr-web-engine | 2022-06-24T21:15:00Z | 2024-11-21T14:22:45.610409Z |
| pysec-2022-43130 |
9.8 (3.1)
|
The d8s-timer for python, as distributed on PyPI, included a potential code-execution bac… | democritus-uuids | 2022-11-07T15:15:00Z | 2024-11-21T14:22:45.198186Z |
| pysec-2022-43129 |
9.8 (3.1)
|
The d8s-strings for python, as distributed on PyPI, included a potential code-execution b… | democritus-uuids | 2022-11-07T15:15:00Z | 2024-11-21T14:22:45.148199Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33585 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.675953Z |
| gsd-2024-33584 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.668914Z |
| gsd-2024-33583 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.523973Z |
| gsd-2024-33582 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.681866Z |
| gsd-2024-33581 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.528711Z |
| gsd-2024-33580 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.684958Z |
| gsd-2024-33579 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.669859Z |
| gsd-2024-33578 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.679697Z |
| gsd-2024-33577 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.555849Z |
| gsd-2024-33576 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.617959Z |
| gsd-2024-33575 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.519910Z |
| gsd-2024-33574 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.543325Z |
| gsd-2024-33573 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.641875Z |
| gsd-2024-33572 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.645876Z |
| gsd-2024-33571 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.606381Z |
| gsd-2024-33570 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.523531Z |
| gsd-2024-33569 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.689024Z |
| gsd-2024-33568 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.636473Z |
| gsd-2024-33567 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.658614Z |
| gsd-2024-33566 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.597677Z |
| gsd-2024-33565 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.652713Z |
| gsd-2024-33564 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.690855Z |
| gsd-2024-33563 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.622975Z |
| gsd-2024-33562 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.607449Z |
| gsd-2024-33561 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.606138Z |
| gsd-2024-33560 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.535115Z |
| gsd-2024-33559 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.554162Z |
| gsd-2024-33558 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.517690Z |
| gsd-2024-33557 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.567408Z |
| gsd-2024-33556 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.629813Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3089 | Malicious code in bytedclaw (PyPI) | 2026-04-27T05:18:32Z | 2026-04-27T05:18:32Z |
| mal-2026-3084 | Malicious code in byteclaw (PyPI) | 2026-04-27T05:17:29Z | 2026-04-27T05:17:29Z |
| mal-2026-3099 | Malicious code in bytedvod (PyPI) | 2026-04-27T05:16:37Z | 2026-04-27T05:16:37Z |
| mal-2026-3095 | Malicious code in bytedpymysql (PyPI) | 2026-04-27T05:15:34Z | 2026-04-27T05:15:34Z |
| mal-2026-3088 | Malicious code in bytedbackground (PyPI) | 2026-04-27T05:14:59Z | 2026-04-27T05:14:59Z |
| mal-2026-3096 | Malicious code in bytedtccc (PyPI) | 2026-04-27T05:14:02Z | 2026-04-27T05:14:03Z |
| mal-2026-3092 | Malicious code in bytedmem (PyPI) | 2026-04-27T05:09:06Z | 2026-04-27T05:09:06Z |
| mal-2026-3094 | Malicious code in bytedpgsql (PyPI) | 2026-04-27T05:08:15Z | 2026-04-27T05:08:15Z |
| mal-2026-3028 | Malicious code in amplitude-ma-ts (npm) | 2026-04-24T01:35:44Z | 2026-04-27T01:42:39Z |
| mal-2026-3046 | Malicious code in swisscom-ai-research-keyphrase (PyPI) | 2026-04-26T13:13:19Z | 2026-04-26T13:13:19Z |
| mal-2026-3034 | Malicious code in ort-moe (PyPI) | 2026-04-25T14:47:54Z | 2026-04-25T14:47:54Z |
| mal-2026-3035 | Malicious code in promptflow-runtime (PyPI) | 2026-04-25T14:32:36Z | 2026-04-25T14:32:36Z |
| mal-2026-2862 | Malicious code in rtms-manager (npm) | 2026-04-19T10:44:08Z | 2026-04-25T08:26:42Z |
| mal-2026-2914 | Malicious code in modern-events (npm) | 2026-04-16T15:24:25Z | 2026-04-24T20:32:58Z |
| mal-2026-3031 | Malicious code in swampo (PyPI) | 2026-04-24T18:55:32Z | 2026-04-24T18:55:32Z |
| mal-2026-3018 | Malicious code in microsoft-employee-experience (npm) | 2026-04-23T16:11:04Z | 2026-04-24T06:47:56Z |
| mal-2026-3029 | Malicious code in eth-logger (npm) | 2026-04-23T07:27:12Z | 2026-04-24T06:47:54Z |
| mal-2026-3016 | Malicious code in amazon-q-developer-streaming-client (npm) | 2026-04-23T13:15:52Z | 2026-04-24T06:47:53Z |
| mal-2026-2901 | Malicious code in env_express (npm) | 2026-04-15T22:05:03Z | 2026-04-24T05:18:59Z |
| mal-2026-1320 | Malicious code in chain-promised-await (npm) | 2026-03-10T08:24:44Z | 2026-04-24T05:18:59Z |
| mal-2026-3017 | Malicious code in react-spa-npm (npm) | 2026-04-23T14:35:43Z | 2026-04-24T03:25:11Z |
| mal-2026-2931 | Malicious code in react-spa-shadcn (npm) | 2026-04-19T18:36:09Z | 2026-04-24T03:25:11Z |
| mal-2026-3025 | Malicious code in next-rwa (npm) | 2026-04-24T03:19:37Z | 2026-04-24T03:19:38Z |
| mal-2026-3024 | Malicious code in auth0-ui-components-docs (npm) | 2026-04-24T03:19:37Z | 2026-04-24T03:19:38Z |
| mal-2026-3027 | Malicious code in wrapped-logger-utils (npm) | 2026-04-24T03:07:24Z | 2026-04-24T03:07:24Z |
| mal-2026-3026 | Malicious code in sagat-core (npm) | 2026-04-24T02:39:04Z | 2026-04-24T02:39:04Z |
| mal-2026-3014 | Malicious code in vime-azl (npm) | 2026-04-23T03:56:24Z | 2026-04-23T20:50:52Z |
| mal-2026-3013 | Malicious code in undicy-http (npm) | 2026-04-23T03:59:27Z | 2026-04-23T20:50:52Z |
| mal-2026-3012 | Malicious code in ts-moduler (npm) | 2026-04-23T03:49:53Z | 2026-04-23T20:50:52Z |
| mal-2026-3011 | Malicious code in ts-bing (npm) | 2026-04-23T03:56:24Z | 2026-04-23T20:50:52Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0416 | Keycloak: Schwachstelle ermöglicht Denial of Service | 2026-02-15T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0355 | PowerDNS Recursor: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0335 | vim: Schwachstelle ermöglicht Codeausführung | 2026-02-05T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0258 | Red Hat Enterprise Linux (iperf3): Schwachstelle ermöglicht Codeausführung | 2026-01-29T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0187 | Red Hat Enterprise Linux (glib): Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0148 | ImageMagick: Mehrere Schwachstellen | 2026-01-19T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0118 | GNU libc: Schwachstelle ermöglicht Codeausführung | 2026-01-14T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0030 | cURL: Mehrere Schwachstellen | 2026-01-06T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2928 | GnuPG: Mehrere Schwachstellen | 2025-12-28T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2897 | Apache log4j: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-18T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2717 | Django: Mehrere Schwachstellen | 2025-12-02T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2645 | Golang Go: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-19T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2394 | Linux Kernel: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2186 | Django: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-10-01T22:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0383 | AMD Radeon: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2737 | libpng: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-12-03T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2024-0444 | Linux Kernel: Mehrere Schwachstellen | 2024-02-20T23:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2025-2836 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2025-12-14T23:00:00.000+00:00 | 2026-02-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0364 | Microsoft Defender für Endpoint Linux Extension: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-02-10T23:00:00.000+00:00 | 2026-02-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0363 | Microsoft Power BI: Schwachstelle ermöglicht Erlangen von Benutzerrechten und Codeausführung | 2026-02-10T23:00:00.000+00:00 | 2026-02-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3250 | Red Hat OpenShift: Mehrere Schwachstellen | 2024-10-21T22:00:00.000+00:00 | 2026-02-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0310 | Cisco TelePresence Collaboration Endpoint Software: Schwachstelle ermöglicht Denial of Service | 2026-02-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0308 | Cisco Evolved Programmable Network Manager und Prime Infrastructure: Schwachstelle ermöglicht Darstellen falscher Informationen | 2026-02-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0307 | Cisco Prime Infrastructure: Schwachstelle ermöglicht Cross-Site Scripting | 2026-02-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0303 | OpenClaw: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-02-03T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0291 | OpenClaw/Clawdbot: Mehrere Schwachstellen ermöglichen Codeausführung | 2026-02-02T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0290 | Samsung Android: Mehrere Schwachstellen | 2026-02-02T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0289 | Kubernetes (ingress-nginx): Mehrere Schwachstellen | 2026-02-02T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0250 | Drupal Canvas und CAS: Mehrere Schwachstellen | 2026-01-28T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0246 | Lexmark Laser Printers: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode mit Benutzerrechten | 2026-01-28T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-105-07 | Delta Electronics COMMGR (Update A) | 2025-04-15T06:00:00.000000Z | 2025-09-04T06:00:00.000000Z |
| icsa-25-245-03 | SunPower PVS6 | 2025-09-02T06:00:00.000000Z | 2025-09-02T06:00:00.000000Z |
| icsa-25-245-02 | Fuji Electric FRENIC-Loader 4 | 2025-09-02T06:00:00.000000Z | 2025-09-02T06:00:00.000000Z |
| icsa-25-245-01 | Delta Electronics EIP Builder | 2025-09-02T06:00:00.000000Z | 2025-09-02T06:00:00.000000Z |
| icsa-25-240-06 | GE Vernova CIMPLICITY | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| icsa-25-240-05 | Delta Electronics COMMGR | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| icsa-25-240-04 | Delta Electronics CNCSoft-G2 | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| icsa-25-240-02 | Mitsubishi Electric MELSEC iQ-F Series CPU Module | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| icsa-25-240-01 | Mitsubishi Electric MELSEC iQ-F Series CPU Module | 2025-08-28T06:00:00.000000Z | 2025-08-28T06:00:00.000000Z |
| icsa-25-273-02 | Festo SBRD-Q/SBOC-Q/SBOI-Q | 2021-09-22T11:13:00.000000Z | 2025-08-26T10:00:00.000000Z |
| icsa-25-182-06 | Hitachi Energy Relion 670/650 and SAM600-IO Series (Update A) | 2025-06-24T12:30:00.000000Z | 2025-08-26T10:00:00.000000Z |
| icsa-25-261-05 | Remote Code Execution Vulnerability in Hitachi Energy Service Suite Product | 2025-08-26T09:52:01.000000Z | 2025-08-26T09:52:01.000000Z |
| icsa-25-261-04 | Multiple Open-Source Software Vulnerabilities in Hitachi Energy Asset Suite Product | 2025-08-26T09:22:47.000000Z | 2025-08-26T09:22:00.000000Z |
| icsa-25-238-01 | INVT VT-Designer and HMITool | 2025-08-26T06:00:00.000000Z | 2025-08-26T06:00:00.000000Z |
| icsa-25-140-03 | Danfoss AK-SM 8xxA Series (Update A) | 2025-05-20T06:00:00.000000Z | 2025-08-26T06:00:00.000000Z |
| va-25-239-01 | Agiloft multiple vulnerabilities | 2025-08-26T00:00:00Z | 2025-08-26T00:00:00Z |
| icsma-25-233-01 | FUJIFILM Healthcare Americas Synapse Mobility | 2025-08-21T06:00:00.000000Z | 2025-08-21T06:00:00.000000Z |
| icsa-25-217-02 | Tigo Energy Cloud Connect Advanced (Update A) | 2025-08-05T06:00:00.000000Z | 2025-08-19T06:00:00.000000Z |
| icsa-25-226-30 | Rockwell Automation FactoryTalk Action Manager | 2025-08-14T06:00:00.000000Z | 2025-08-15T06:00:00.000000Z |
| icsa-25-226-29 | Rockwell Automation Studio 5000 Logix Designer | 2025-08-14T06:00:00.000000Z | 2025-08-14T06:00:00.000000Z |
| icsa-25-226-28 | Rockwell Automation ControlLogix Ethernet Modules | 2025-08-14T06:00:00.000000Z | 2025-08-14T06:00:00.000000Z |
| icsa-25-226-27 | Rockwell Automation ArmorBlock 5000 I/O - Webserver | 2025-08-14T06:00:00.000000Z | 2025-08-14T06:00:00.000000Z |
| icsa-25-226-25 | Rockwell Automation Micro800 | 2025-08-14T06:00:00.000000Z | 2025-08-14T06:00:00.000000Z |
| icsa-25-226-24 | Rockwell FactoryTalk Linx | 2025-08-14T06:00:00.000000Z | 2025-08-14T06:00:00.000000Z |
| icsa-25-226-23 | Rockwell Automation FactoryTalk Viewpoint | 2025-08-14T06:00:00.000000Z | 2025-08-14T06:00:00.000000Z |
| icsa-25-231-01 | Siemens Desigo CC Product Family and SENTRON Powermanager | 2025-08-14T00:00:00.000000Z | 2025-08-14T00:00:00.000000Z |
| icsma-25-224-01 | Santesoft Sante PACS Server | 2025-08-12T06:00:00.000000Z | 2025-08-12T06:00:00.000000Z |
| icsa-25-224-04 | AVEVA PI Integrator | 2025-08-12T06:00:00.000000Z | 2025-08-12T06:00:00.000000Z |
| icsa-25-224-01 | Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, Cobalt Share | 2025-08-12T06:00:00.000000Z | 2025-08-12T06:00:00.000000Z |
| icsa-24-263-04 | MegaSys Computer Technologies Telenium Online Web Application (Update A) | 2024-09-19T06:00:00.000000Z | 2025-08-12T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cpp-vfr-dos-nhhkggo | Cisco IOS XE Software IPv4 Fragmentation Reassembly Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-cpp-vfr-dos-nhHKGgO | Cisco IOS XE Software IPv4 Fragmentation Reassembly Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-c9800-cwa-acl-npsbhsna | Cisco IOS XE Software for Wireless Controllers CWA Pre-Authentication ACL Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-c9800-cwa-acl-nPSbHSnA | Cisco IOS XE Software for Wireless Controllers CWA Pre-Authentication ACL Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-nso-auth-bypass-qnteesp | Multiple Cisco Products Web-Based Management Interface Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-25T13:05:54+00:00 |
| cisco-sa-nso-auth-bypass-QnTEesp | Multiple Cisco Products Web-Based Management Interface Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-25T13:05:54+00:00 |
| cisco-sa-cucm-xss-9zmfhyz | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-09-20T15:48:56+00:00 |
| cisco-sa-cucm-xss-9zmfHyZ | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-09-20T15:48:56+00:00 |
| cisco-sa-nxos-cmd-injection-xd9ohyop | Cisco NX-OS Software CLI Command Injection Vulnerability | 2024-07-01T16:00:00+00:00 | 2024-09-17T18:05:20+00:00 |
| cisco-sa-nxos-cmd-injection-xD9OhyOP | Cisco NX-OS Software CLI Command Injection Vulnerability | 2024-07-01T16:00:00+00:00 | 2024-09-17T18:05:20+00:00 |
| cisco-sa-openssh-rce-2024 | Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server (regreSSHion): July 2024 | 2024-07-02T16:00:00+00:00 | 2024-09-13T14:43:44+00:00 |
| cisco-sa-pak-mem-exhst-3ke9fefy | Cisco IOS XR Software UDP Packet Memory Exhaustion Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-pak-mem-exhst-3ke9FeFy | Cisco IOS XR Software UDP Packet Memory Exhaustion Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-l2services-2mvhdnuc | Cisco IOS XR Software Network Convergence System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-l2services-2mvHdNuC | Cisco IOS XR Software Network Convergence System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-isis-xehpbvne | Cisco IOS XR Software Segment Routing for Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-isis-xehpbVNe | Cisco IOS XR Software Segment Routing for Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-xml-tcpdos-zexvru2s | Cisco IOS XR Software Dedicated XML Agent TCP Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-xml-tcpdos-ZEXvrU2S | Cisco IOS XR Software Dedicated XML Agent TCP Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-shellutil-hcb278wd | Cisco IOS XR Software CLI Arbitrary File Read Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-shellutil-HCb278wD | Cisco IOS XR Software CLI Arbitrary File Read Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-priv-esc-crg5vhcq | Cisco IOS XR Software CLI Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-priv-esc-CrG5vhCq | Cisco IOS XR Software CLI Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-ponctlr-ci-ohchmsfl | Cisco Routed Passive Optical Network Controller Vulnerabilities | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-iosxr-ponctlr-ci-OHcHmsFL | Cisco Routed Passive Optical Network Controller Vulnerabilities | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-ise-info-exp-vdf8jbyk | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-09-05T13:14:02+00:00 |
| cisco-sa-ise-info-exp-vdF8Jbyk | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-09-05T13:14:02+00:00 |
| cisco-sa-meraki-agent-dll-hj-ptn7ptke | Cisco Meraki Systems Manager Agent for Windows Privilege Escalation Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-meraki-agent-dll-hj-Ptn7PtKe | Cisco Meraki Systems Manager Agent for Windows Privilege Escalation Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-ise-injection-6kn9tsxm | Cisco Identity Services Engine Command Injection Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31658 | net: altera-tse: fix skb leak on DMA mapping error in tse_start_xmit() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:44:48.000Z |
| msrc_cve-2026-31597 | ocfs2: fix use-after-free in ocfs2_fault() when VM_FAULT_RETRY | 2026-04-02T00:00:00.000Z | 2026-05-01T14:44:41.000Z |
| msrc_cve-2026-31622 | NFC: digital: Bounds check NFC-A cascade depth in SDD response handler | 2026-04-02T00:00:00.000Z | 2026-05-01T14:44:34.000Z |
| msrc_cve-2026-31664 | xfrm: clear trailing padding in build_polexpire() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:44:28.000Z |
| msrc_cve-2026-31659 | batman-adv: reject oversized global TT response buffers | 2026-04-02T00:00:00.000Z | 2026-05-01T14:44:21.000Z |
| msrc_cve-2026-31625 | HID: alps: fix NULL pointer dereference in alps_raw_event() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:44:14.000Z |
| msrc_cve-2026-31634 | rxrpc: fix reference count leak in rxrpc_server_keyring() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:44:08.000Z |
| msrc_cve-2026-31578 | media: as102: fix to not free memory after the device is registered in as102_usb_probe() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:59.000Z |
| msrc_cve-2026-31586 | mm: blk-cgroup: fix use-after-free in cgwb_release_workfn() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:52.000Z |
| msrc_cve-2026-31595 | PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:45.000Z |
| msrc_cve-2026-31588 | KVM: x86: Use scratch field in MMIO fragment to hold small write values | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:39.000Z |
| msrc_cve-2026-31649 | net: stmmac: fix integer underflow in chain mode | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:32.000Z |
| msrc_cve-2026-31669 | mptcp: fix slab-use-after-free in __inet_lookup_established | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:25.000Z |
| msrc_cve-2026-31655 | pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:18.000Z |
| msrc_cve-2026-31628 | x86/CPU: Fix FPDSS on Zen1 | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:12.000Z |
| msrc_cve-2026-31629 | nfc: llcp: add missing return after LLCP_CLOSED checks | 2026-04-02T00:00:00.000Z | 2026-05-01T14:43:05.000Z |
| msrc_cve-2026-31639 | rxrpc: Fix key reference count leak from call->key | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:57.000Z |
| msrc_cve-2026-31668 | seg6: separate dst_cache for input and output paths in seg6 lwtunnel | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:51.000Z |
| msrc_cve-2026-31657 | batman-adv: hold claim backbone gateways by reference | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:44.000Z |
| msrc_cve-2026-31662 | tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:37.000Z |
| msrc_cve-2026-31587 | ASoC: qcom: q6apm: move component registration to unmanaged version | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:31.000Z |
| msrc_cve-2026-31612 | ksmbd: validate EaNameLength in smb2_get_ea() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:24.000Z |
| msrc_cve-2026-31623 | net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:17.000Z |
| msrc_cve-2026-31594 | PCI: endpoint: pci-epf-vntb: Remove duplicate resource teardown | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:10.000Z |
| msrc_cve-2026-31671 | xfrm_user: fix info leak in build_report() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:03.000Z |
| msrc_cve-2026-31627 | i2c: s3c24xx: check the size of the SMBUS message before using it | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:56.000Z |
| msrc_cve-2026-31642 | rxrpc: Fix call removal to use RCU safe deletion | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:49.000Z |
| msrc_cve-2026-31611 | ksmbd: require 3 sub-authorities before reading sub_auth[2] | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:43.000Z |
| msrc_cve-2026-31603 | staging: sm750fb: fix division by zero in ps_to_hz() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:36.000Z |
| msrc_cve-2026-31670 | net: rfkill: prevent unlimited numbers of rfkill events from being created | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:29.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0089 | Kwetsbaarheid verholpen in Apache Tomcat | 2025-03-17T18:36:12.978021Z | 2025-03-17T18:36:12.978021Z |
| ncsc-2025-0088 | Kwetsbaarheden verholpen in Autodesk AutoCAD | 2025-03-14T10:10:13.263645Z | 2025-03-14T10:10:13.263645Z |
| ncsc-2025-0087 | Kwetsbaarheden verholpen in GitLab | 2025-03-14T09:14:59.775984Z | 2025-03-14T09:14:59.775984Z |
| ncsc-2025-0086 | Kwetsbaarheid verholpen in Apple iOS, iPadOS, macOS Sequoia, visionOS en Safari | 2025-03-12T13:48:59.223945Z | 2025-03-12T13:48:59.223945Z |
| ncsc-2025-0085 | Kwetsbaarheid verholpen in Ivanti Secure Access Client | 2025-03-12T11:00:45.614633Z | 2025-03-12T11:00:45.614633Z |
| ncsc-2025-0084 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-03-12T10:56:00.883114Z | 2025-03-12T10:56:00.883114Z |
| ncsc-2025-0083 | Kwetsbaarheden verholpen in Fortinet FortiSandbox | 2025-03-12T10:51:18.487649Z | 2025-03-12T10:51:18.487649Z |
| ncsc-2025-0082 | Kwetsbaarheden verholpen in FortiOS, FortiProxy, FortiPAM, FortiSRA en FortiWeb. | 2025-03-12T10:46:38.451715Z | 2025-03-12T10:46:38.451715Z |
| ncsc-2025-0081 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-03-11T18:45:19.628300Z | 2025-03-11T18:45:19.628300Z |
| ncsc-2025-0080 | Kwetsbaarheden verholpen in Microsoft Office | 2025-03-11T18:44:43.336447Z | 2025-03-11T18:44:43.336447Z |
| ncsc-2025-0079 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-03-11T18:44:07.766518Z | 2025-03-11T18:44:07.766518Z |
| ncsc-2025-0078 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-03-11T18:43:14.505624Z | 2025-03-11T18:43:14.505624Z |
| ncsc-2025-0077 | Kwetsbaarheden verholpen in Siemens producten | 2025-03-11T12:30:29.277759Z | 2025-03-11T12:30:29.277759Z |
| ncsc-2025-0076 | Kwetsbaarheden verholpen in SAP software | 2025-03-11T12:20:06.258896Z | 2025-03-11T12:20:06.258896Z |
| ncsc-2025-0075 | Kwetsbaarheid verholpen in Elastic Kibana | 2025-03-07T13:51:51.509917Z | 2025-03-07T13:51:51.509917Z |
| ncsc-2025-0074 | Kwetsbaarheden verholpen in IBM Storage producten | 2025-03-04T14:14:48.398751Z | 2025-03-04T14:14:48.398751Z |
| ncsc-2025-0073 | Kwetsbaarheden verholpen in VMware producten | 2025-03-04T14:11:56.959153Z | 2025-03-04T14:11:56.959153Z |
| ncsc-2025-0072 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-03-04T10:15:32.203439Z | 2025-03-04T10:15:32.203439Z |
| ncsc-2025-0071 | Kwetsbaarheid verholpen in Zohocorp ManageEngine ADSelfService Plus | 2025-03-03T14:11:46.709999Z | 2025-03-03T14:11:46.709999Z |
| ncsc-2025-0070 | Kwetsbaarheden verholpen in GitLab | 2025-03-03T14:10:30.120360Z | 2025-03-03T14:10:30.120360Z |
| ncsc-2025-0069 | Kwetsbaarheid verholpen in MITRE Caldera | 2025-02-25T07:42:48.535179Z | 2025-02-25T07:42:48.535179Z |
| ncsc-2025-0068 | Kwetsbaarheden verholpen in Mattermost | 2025-02-24T12:04:19.392654Z | 2025-02-24T12:04:19.392654Z |
| ncsc-2025-0067 | Kwetsbaarheid verholpen in Exim | 2025-02-21T12:54:32.376733Z | 2025-02-21T12:54:32.376733Z |
| ncsc-2025-0066 | Kwetsbaarheid verholpen in XWiki | 2025-02-21T12:33:24.503983Z | 2025-02-21T12:33:24.503983Z |
| ncsc-2025-0065 | Kwetsbaarheden verholpen in Nagios XI | 2025-02-21T12:32:41.120020Z | 2025-02-21T12:32:41.120020Z |
| ncsc-2025-0064 | Kwetsbaarheden verholpen in IBM Cognos Controller | 2025-02-21T08:40:26.849797Z | 2025-02-21T08:40:26.849797Z |
| ncsc-2025-0058 | Kwetsbaarheden verholpen in Palo Alto Networks PAN-OS | 2025-02-13T09:28:54.459828Z | 2025-02-21T08:08:58.513404Z |
| ncsc-2025-0063 | Kwetsbaarheid verholpen in PostgreSQL | 2025-02-19T09:11:55.511966Z | 2025-02-19T09:11:55.511966Z |
| ncsc-2025-0062 | Kwetsbaarheid verholpen in Juniper Session Smart Router | 2025-02-18T14:25:56.916762Z | 2025-02-18T14:25:56.916762Z |
| ncsc-2025-0053 | Kwetsbaarheden verholpen in Fortinet FortiSwitch, FortiManager, FortiAnalyzer, FortiOS en FortiProxy | 2025-02-12T12:39:02.366846Z | 2025-02-18T08:09:48.619964Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10307-1 | tomcat11-11.0.18-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10306-1 | tomcat10-10.1.52-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10305-1 | tomcat-9.0.115-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10304-1 | python311-nltk-3.9.3-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10303-1 | libIex-3_4-33-3.4.6-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10302-1 | kubeshark-cli-53.1.0-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10301-1 | kernel-devel-longterm-6.18.16-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10300-1 | jetty-annotations-9.4.58-3.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10299-1 | go1.26-1.26.1-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10298-1 | exiv2-0.28.8-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10297-1 | coredns-1.14.2-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10296-1 | chromedriver-145.0.7632.159-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:10295-1 | NetworkManager-applet-strongswan-1.6.4-1.1 on GA media | 2026-03-07T00:00:00Z | 2026-03-07T00:00:00Z |
| opensuse-su-2026:20333-1 | Security update for python-PyPDF2 | 2026-03-06T21:01:39Z | 2026-03-06T21:01:39Z |
| opensuse-su-2026:20330-1 | Security update for python-uv | 2026-03-06T14:43:28Z | 2026-03-06T14:43:28Z |
| opensuse-su-2026:20323-1 | Security update for roundcubemail | 2026-03-05T18:31:03Z | 2026-03-05T18:31:03Z |
| opensuse-su-2026:20329-1 | Security update for gstreamer-rtsp-server, gstreamer-plugins-ugly, gstreamer-plugins-rs, gstreamer-plugins-libav, gstreamer-plugins-good, gstreamer-plugins-base, gstreamer-plugins-bad, gstreamer-docs, gstreamer-devtools, gstreamer | 2026-03-05T18:13:13Z | 2026-03-05T18:13:13Z |
| opensuse-su-2026:20322-1 | Security update for python-joserfc | 2026-03-05T14:32:35Z | 2026-03-05T14:32:35Z |
| opensuse-su-2026:20327-1 | Security update for helm | 2026-03-05T14:27:21Z | 2026-03-05T14:27:21Z |
| opensuse-su-2026:20326-1 | Security update for virtiofsd | 2026-03-05T14:23:19Z | 2026-03-05T14:23:19Z |
| opensuse-ru-2026:20325-1 | Recommended update for shim | 2026-03-05T14:21:04Z | 2026-03-05T14:21:04Z |
| opensuse-su-2026:10294-1 | telemetrygen-0.147.0-1.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10293-1 | python311-joserfc-1.6.3-1.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10292-1 | python311-Django-5.2.12-1.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10291-1 | libsoup-2_4-1-2.74.3-18.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10290-1 | heroic-games-launcher-2.20.1-2.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:10289-1 | freetype2-devel-2.14.2-1.1 on GA media | 2026-03-05T00:00:00Z | 2026-03-05T00:00:00Z |
| opensuse-su-2026:20320-1 | Security update for freerdp2 | 2026-03-04T17:52:31Z | 2026-03-04T17:52:31Z |
| opensuse-su-2026:20312-1 | Security update for libxml2, libxslt | 2026-03-04T10:51:24Z | 2026-03-04T10:51:24Z |
| opensuse-su-2026:10288-1 | libblkid-devel-2.41.3-4.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:4418 | Red Hat Security Advisory: OpenShift Container Platform 4.15.62 packages and security update | 2026-03-19T05:59:29+00:00 | 2026-05-07T15:02:57+00:00 |
| rhsa-2026:4423 | Red Hat Security Advisory: OpenShift Container Platform 4.15.62 bug fix and security update | 2026-03-19T05:29:11+00:00 | 2026-05-07T15:02:54+00:00 |
| rhsa-2026:4271 | Red Hat Security Advisory: RHTAS 1.3.2 - Tech Preview Release of Model Transparency | 2026-03-11T09:02:58+00:00 | 2026-05-07T15:02:53+00:00 |
| rhsa-2026:3851 | Red Hat Security Advisory: OpenShift Container Platform 4.20.16 packages and security update | 2026-03-11T05:24:06+00:00 | 2026-05-07T15:02:37+00:00 |
| rhsa-2026:3825 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.20.3 | 2026-03-05T07:08:51+00:00 | 2026-05-07T15:02:34+00:00 |
| rhsa-2026:3723 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.4 | 2026-03-04T08:59:26+00:00 | 2026-05-07T15:02:30+00:00 |
| rhsa-2026:3718 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.4 | 2026-03-04T07:52:57+00:00 | 2026-05-07T15:02:30+00:00 |
| rhsa-2026:3712 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.4 | 2026-03-04T07:12:04+00:00 | 2026-05-07T15:02:30+00:00 |
| rhsa-2026:3710 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.15.3 | 2026-03-04T06:00:07+00:00 | 2026-05-07T15:02:29+00:00 |
| rhsa-2026:3462 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.2 (ROCm) | 2026-02-27T14:55:49+00:00 | 2026-05-07T15:02:26+00:00 |
| rhsa-2026:3461 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.2 (CUDA) | 2026-02-27T14:54:46+00:00 | 2026-05-07T15:02:25+00:00 |
| rhsa-2026:3444 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-02-26T15:08:47+00:00 | 2026-05-07T15:02:23+00:00 |
| rhsa-2026:3406 | Red Hat Security Advisory: New container image: rhceph-9.0 | 2026-02-26T07:14:51+00:00 | 2026-05-07T15:02:23+00:00 |
| rhsa-2026:2925 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:44:08+00:00 | 2026-05-07T15:02:17+00:00 |
| rhsa-2026:2924 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:35:32+00:00 | 2026-05-07T15:02:16+00:00 |
| rhsa-2026:2919 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:11:20+00:00 | 2026-05-07T15:02:15+00:00 |
| rhsa-2026:2900 | Red Hat Security Advisory: Network Observability 1.11.0 for OpenShift | 2026-02-18T08:39:41+00:00 | 2026-05-07T15:02:15+00:00 |
| rhsa-2026:2764 | Red Hat Security Advisory: Satellite 6.17.6.3 Async Update | 2026-02-16T19:06:28+00:00 | 2026-05-07T15:02:15+00:00 |
| rhsa-2026:2852 | Red Hat Security Advisory: OpenShift Security Profiles Operator bug fix and enhancement update | 2026-02-17T23:04:21+00:00 | 2026-05-07T15:02:14+00:00 |
| rhsa-2026:2800 | Red Hat Security Advisory: Red Hat Ceph Storage | 2026-02-17T09:23:04+00:00 | 2026-05-07T15:02:13+00:00 |
| rhsa-2026:2765 | Red Hat Security Advisory: Satellite 6.16.6.1 Async Update | 2026-02-16T21:33:28+00:00 | 2026-05-07T15:02:13+00:00 |
| rhsa-2026:2737 | Red Hat Security Advisory: Red Hat Ceph Storage | 2026-02-16T12:56:05+00:00 | 2026-05-07T15:02:12+00:00 |
| rhsa-2026:2728 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-16T11:56:59+00:00 | 2026-05-07T15:02:12+00:00 |
| rhsa-2026:2723 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-16T11:26:37+00:00 | 2026-05-07T15:02:12+00:00 |
| rhsa-2026:2718 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-16T11:40:57+00:00 | 2026-05-07T15:02:12+00:00 |
| rhsa-2026:2717 | Red Hat Security Advisory: python-urllib3 security update | 2026-02-16T11:34:12+00:00 | 2026-05-07T15:02:11+00:00 |
| rhsa-2026:2711 | Red Hat Security Advisory: Red Hat Ceph Storage 8.1 security and bug fix update | 2026-02-16T10:49:01+00:00 | 2026-05-07T15:02:11+00:00 |
| rhsa-2026:2695 | Red Hat Security Advisory: RHOAI 2.25.2 - Red Hat OpenShift AI | 2026-02-12T22:43:13+00:00 | 2026-05-07T15:02:09+00:00 |
| rhsa-2026:2568 | Red Hat Security Advisory: RHACS 4.9.3 security and bug fix update | 2026-02-11T15:09:41+00:00 | 2026-05-07T15:02:08+00:00 |
| rhsa-2026:2563 | Red Hat Security Advisory: Red Hat Update Infrastructure 5 security update | 2026-02-11T14:34:45+00:00 | 2026-05-07T15:02:08+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| SSA-128433 | SSA-128433: Multiple Vulnerabilities in SINEC NMS before V2.0 SP2 | 2024-04-09T00:00:00Z | 2024-04-09T00:00:00Z |
| ssa-943925 | SSA-943925: Multiple Vulnerabilities in SINEC NMS before V2.0 SP1 | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-918992 | SSA-918992: Unused HTTP Service on SENTRON 3KC ATC6 Ethernet Module | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-770721 | SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-699386 | SSA-699386: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family before V4.5 | 2023-11-14T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-693975 | SSA-693975: Denial-of-Service Vulnerability in the Web Server of Industrial Products | 2023-12-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-653855 | SSA-653855: Information Disclosure vulnerability in SINEMA Remote Connect Client before V3.1 SP1 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-576771 | SSA-576771: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-145196 | SSA-145196: Authorization Bypass Vulnerability in Siveillance Control | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-000072 | SSA-000072: Multiple File Parsing Vulnerabilities in Simcenter Femap | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-943925 | SSA-943925: Multiple Vulnerabilities in SINEC NMS before V2.0 SP1 | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-918992 | SSA-918992: Unused HTTP Service on SENTRON 3KC ATC6 Ethernet Module | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-792319 | SSA-792319: Missing Read Out Protection in SENTRON 7KM PAC3x20 Devices | 2024-03-12T00:00:00Z | 2024-09-10T00:00:00Z |
| SSA-770721 | SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-699386 | SSA-699386: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family before V4.5 | 2023-11-14T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-693975 | SSA-693975: Denial-of-Service Vulnerability in the Web Server of Industrial Products | 2023-12-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-653855 | SSA-653855: Information Disclosure vulnerability in SINEMA Remote Connect Client before V3.1 SP1 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-576771 | SSA-576771: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-366067 | SSA-366067: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| SSA-145196 | SSA-145196: Authorization Bypass Vulnerability in Siveillance Control | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-000072 | SSA-000072: Multiple File Parsing Vulnerabilities in Simcenter Femap | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-806742 | SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-797296 | SSA-797296: XT File Parsing Vulnerability in Parasolid | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-647068 | SSA-647068: Ripple20 in SIMATIC RTLS Gateways | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-602936 | SSA-602936: Multiple Vulnerabilities in SCALANCE SC-600 Family before V3.1 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-580228 | SSA-580228: Use of Hard-Coded Credentials Vulnerability in Location Intelligence before V4.3 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-543502 | SSA-543502: Local Privilege Escalation Vulnerability in Unicam FX | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-516818 | SSA-516818: TCP Sequence Number Validation Vulnerability in the TCP/IP Stack of CP343-1 Devices | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-309571 | SSA-309571: IPU 2021.1 Vulnerabilities in Siemens Industrial Products using Intel CPUs (June 2021) | 2021-08-10T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-108696 | SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1360-1 | Security update for tigervnc | 2026-04-15T14:10:48Z | 2026-04-15T14:10:48Z |
| suse-su-2026:1359-1 | Security update for sudo | 2026-04-15T14:07:03Z | 2026-04-15T14:07:03Z |
| suse-su-2026:1356-1 | Security update for nfs-utils | 2026-04-15T13:43:43Z | 2026-04-15T13:43:43Z |
| suse-su-2026:1355-1 | Security update for rubygem-bundler | 2026-04-15T13:37:50Z | 2026-04-15T13:37:50Z |
| suse-su-2026:1354-1 | Security update for python313 | 2026-04-15T13:37:43Z | 2026-04-15T13:37:43Z |
| suse-su-2026:1353-1 | Security update for netty, netty-tcnative | 2026-04-15T13:37:19Z | 2026-04-15T13:37:19Z |
| suse-su-2026:1352-1 | Security update for expat | 2026-04-15T13:36:53Z | 2026-04-15T13:36:53Z |
| suse-su-2026:1351-1 | Security update for bind | 2026-04-15T13:36:44Z | 2026-04-15T13:36:44Z |
| suse-su-2026:1350-1 | Security update for nghttp2 | 2026-04-15T13:36:21Z | 2026-04-15T13:36:21Z |
| suse-su-2026:1349-1 | Security update for python311 | 2026-04-15T13:35:56Z | 2026-04-15T13:35:56Z |
| suse-su-2026:1347-1 | Security update for vim | 2026-04-15T12:26:44Z | 2026-04-15T12:26:44Z |
| suse-su-2026:1345-1 | Security update for python36 | 2026-04-15T12:04:26Z | 2026-04-15T12:04:26Z |
| suse-su-2026:1344-1 | Security update for libssh | 2026-04-15T10:21:31Z | 2026-04-15T10:21:31Z |
| suse-su-2026:1343-1 | Security update for Mesa | 2026-04-15T10:18:55Z | 2026-04-15T10:18:55Z |
| suse-su-2026:1342-1 | Security update for the Linux Kernel | 2026-04-15T10:15:54Z | 2026-04-15T10:15:54Z |
| suse-su-2026:21197-1 | Security update for vim | 2026-04-15T08:14:48Z | 2026-04-15T08:14:48Z |
| suse-su-2026:21134-1 | Security update for vim | 2026-04-15T08:14:48Z | 2026-04-15T08:14:48Z |
| suse-su-2026:1338-1 | Security update for giflib | 2026-04-15T07:33:53Z | 2026-04-15T07:33:53Z |
| suse-su-2026:1337-1 | Security update for rust1.92 | 2026-04-15T07:33:26Z | 2026-04-15T07:33:26Z |
| suse-su-2026:1335-1 | Security update for xorg-x11-server | 2026-04-14T17:28:43Z | 2026-04-14T17:28:43Z |
| suse-su-2026:1333-1 | Security update for xorg-x11-server | 2026-04-14T17:18:59Z | 2026-04-14T17:18:59Z |
| suse-su-2026:1332-1 | Security update for xorg-x11-server | 2026-04-14T17:15:06Z | 2026-04-14T17:15:06Z |
| suse-su-2026:1331-1 | Security update for xorg-x11-server | 2026-04-14T17:11:37Z | 2026-04-14T17:11:37Z |
| suse-su-2026:1330-1 | Security update for xorg-x11-server | 2026-04-14T17:08:59Z | 2026-04-14T17:08:59Z |
| suse-su-2026:1329-1 | Security update for xwayland | 2026-04-14T17:06:20Z | 2026-04-14T17:06:20Z |
| suse-su-2026:1328-1 | Security update for xwayland | 2026-04-14T17:04:46Z | 2026-04-14T17:04:46Z |
| suse-su-2026:21195-1 | Security update for go1.26-openssl | 2026-04-14T15:41:55Z | 2026-04-14T15:41:55Z |
| suse-su-2026:21194-1 | Security update for plexus-utils | 2026-04-14T15:02:29Z | 2026-04-14T15:02:29Z |
| suse-su-2026:21192-1 | Security update for pam | 2026-04-14T13:47:51Z | 2026-04-14T13:47:51Z |
| suse-su-2026:21112-1 | Security update for pam | 2026-04-14T13:47:51Z | 2026-04-14T13:47:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1408 | Moderate: python3.12 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:05:44Z |
| alsa-2026:1410 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:02:18Z |
| alsa-2026:1429 | Important: php:8.3 security update | 2026-01-27T00:00:00Z | 2026-01-29T11:59:57Z |
| alsa-2026:1472 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-01-28T19:58:47Z |
| alsa-2026:1478 | Moderate: python3.9 security update | 2026-01-28T00:00:00Z | 2026-01-28T19:56:37Z |
| alsa-2026:0933 | Important: java-25-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-28T14:39:55Z |
| alsa-2026:1224 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:28:50Z |
| alsa-2026:1226 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:21:23Z |
| alsa-2026:1087 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:19:22Z |
| alsa-2026:1088 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:17:27Z |
| alsa-2026:1089 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:15:08Z |
| alsa-2026:1148 | Important: kernel-rt security update | 2026-01-26T00:00:00Z | 2026-01-26T13:52:56Z |
| alsa-2026:1142 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-26T13:49:21Z |
| alsa-2026:1086 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-26T13:16:32Z |
| alsa-2026:0928 | Important: java-21-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-26T11:04:56Z |
| alsa-2026:0914 | Important: gimp security update | 2026-01-21T00:00:00Z | 2026-01-26T10:10:46Z |
| alsa-2026:0921 | Important: go-toolset:rhel8 security update | 2026-01-21T00:00:00Z | 2026-01-26T10:07:11Z |
| alsa-2026:0696 | Important: net-snmp security update | 2026-01-15T00:00:00Z | 2026-01-26T10:04:02Z |
| alsa-2026:0923 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-24T01:54:58Z |
| alsa-2026:0927 | Important: java-17-openjdk security update | 2026-01-22T00:00:00Z | 2026-01-24T01:52:06Z |
| alsa-2026:0924 | Important: thunderbird security update | 2026-01-21T00:00:00Z | 2026-01-24T01:47:12Z |
| alsa-2026:0930 | Moderate: pcs security update | 2026-01-21T00:00:00Z | 2026-01-24T01:46:11Z |
| alsa-2026:0936 | Moderate: glib2 security update | 2026-01-21T00:00:00Z | 2026-01-24T01:44:09Z |
| alsa-2026:0991 | Moderate: glib2 security update | 2026-01-22T00:00:00Z | 2026-01-24T01:40:03Z |
| alsa-2026:0922 | Important: golang security update | 2026-01-21T00:00:00Z | 2026-01-23T23:39:55Z |
| alsa-2026:0975 | Moderate: glib2 security update | 2026-01-22T00:00:00Z | 2026-01-23T23:34:09Z |
| alsa-2026:0793 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-23T13:22:18Z |
| alsa-2026:0786 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-23T07:53:26Z |
| alsa-2026:0770 | Important: gpsd security update | 2026-01-19T00:00:00Z | 2026-01-21T10:46:37Z |
| alsa-2026:0845 | Important: brotli security update | 2026-01-20T00:00:00Z | 2026-01-21T10:45:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-371 | UNKNOWN READ in jv_array_set | 2024-04-30T00:08:27.982063Z | 2025-05-18T14:24:27.459047Z |
| osv-2025-31 | Heap-buffer-overflow in Assimp::FBXExporter::WriteObjects | 2025-01-15T00:14:05.357161Z | 2025-05-17T14:21:13.704657Z |
| osv-2025-374 | Use-of-uninitialized-value in pcpp::SomeIpSdEntry::SomeIpSdEntry | 2025-05-17T00:16:26.661924Z | 2025-05-17T00:16:26.662355Z |
| osv-2025-371 | Index-out-of-bounds in tcp_analyze_sequence_number | 2025-05-16T00:16:16.300219Z | 2025-05-16T00:16:16.300689Z |
| osv-2020-1807 | UNKNOWN READ in __libcpp_memchr | 2020-09-18T00:00:38.027965Z | 2025-05-15T14:34:05.077689Z |
| osv-2025-369 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-15T00:19:04.752117Z | 2025-05-15T00:19:04.752522Z |
| osv-2025-368 | Heap-buffer-overflow in __parse_options | 2025-05-15T00:03:04.543640Z | 2025-05-15T00:03:04.544159Z |
| osv-2024-341 | UNKNOWN READ in PointerVector.h | 2024-04-30T00:02:07.034555Z | 2025-05-14T14:20:00.536472Z |
| osv-2024-382 | UNKNOWN READ in pcpp::Packet::destructPacketData | 2024-04-30T00:12:20.588223Z | 2025-05-14T14:16:53.222952Z |
| osv-2023-1259 | Use-of-uninitialized-value in std::__1::__stdoutbuf<char>::xsputn | 2023-12-06T04:45:58.561174Z | 2025-05-14T14:15:48.653022Z |
| osv-2023-1147 | Heap-buffer-overflow in parse_by_block_type | 2023-11-13T13:00:50.800524Z | 2025-05-14T14:15:31.789989Z |
| osv-2020-2285 | Bad-cast to pcpp::Layer from invalid vptr | 2020-12-25T00:01:03.941509Z | 2025-05-14T14:08:11.306127Z |
| osv-2025-363 | Heap-buffer-overflow in jv_string_vfmt | 2025-05-14T00:03:23.388719Z | 2025-05-14T00:03:23.389224Z |
| osv-2024-1186 | UNKNOWN READ in cfl_sds_len | 2024-10-08T00:15:47.433219Z | 2025-05-13T14:48:36.393777Z |
| osv-2025-354 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement | 2025-05-11T00:17:30.348393Z | 2025-05-11T00:17:30.348809Z |
| osv-2025-352 | Use-of-uninitialized-value in JS_FreeRuntime | 2025-05-10T00:17:01.243609Z | 2025-05-10T00:17:01.243981Z |
| osv-2025-346 | Heap-buffer-overflow in JS_CallInternal | 2025-05-09T00:16:48.213077Z | 2025-05-09T00:16:48.213425Z |
| osv-2025-326 | Heap-use-after-free in __JS_FreeValueRT | 2025-05-05T00:17:02.285374Z | 2025-05-05T00:17:02.285666Z |
| osv-2025-324 | Index-out-of-bounds in dwg_decode_eed | 2025-05-05T00:11:42.580777Z | 2025-05-05T00:11:42.581345Z |
| osv-2025-323 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-05-04T00:19:17.568436Z | 2025-05-04T00:19:17.568755Z |
| osv-2025-321 | Use-of-uninitialized-value in JS_DefineProperty | 2025-05-04T00:16:03.249115Z | 2025-05-04T00:16:03.249427Z |
| osv-2024-1375 | Index-out-of-bounds in dwg_decode_eed | 2024-12-15T00:01:20.442440Z | 2025-05-03T14:23:13.369570Z |
| osv-2024-1251 | UNKNOWN WRITE in s_DCTD_process | 2024-11-01T00:02:31.749497Z | 2025-04-29T14:29:01.935923Z |
| osv-2025-300 | Negative-size-param in recurse_update_offsets | 2025-04-26T00:15:04.274172Z | 2025-04-26T00:15:04.274471Z |
| osv-2023-1135 | Segv on unknown address in flb_sds_cat_safe | 2023-11-11T13:00:21.019255Z | 2025-04-24T14:23:15.311238Z |
| osv-2025-291 | Use-of-uninitialized-value in Poco::Net::NTLMCredentials::parseChallengeMessage | 2025-04-20T00:07:34.286645Z | 2025-04-20T00:07:34.287298Z |
| osv-2025-289 | Stack-buffer-overflow in ot::Cli::Utils::OutputLine | 2025-04-19T00:05:17.593162Z | 2025-04-19T00:05:17.593788Z |
| osv-2025-275 | UNKNOWN READ in void std::__1::vector<unsigned char, std::__1::allocator<unsigned char>>::__cons | 2025-04-14T00:02:37.519708Z | 2025-04-17T14:43:50.559313Z |
| osv-2024-1272 | Segv on unknown address in std::__1::ios_base::~ios_base | 2024-11-05T00:03:30.787980Z | 2025-04-17T14:38:30.981292Z |
| osv-2024-987 | Heap-buffer-overflow in pcpp::NDPNeighborAdvertisementLayer::toString | 2024-08-16T00:15:31.057826Z | 2025-04-16T14:29:47.716122Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0370 | proc-macro-error is unmaintained | 2024-09-01T12:00:00Z | 2024-09-09T12:08:37Z |
| rustsec-2024-0373 | `Endpoint::retry()` calls can lead to panicking | 2024-09-02T12:00:00Z | 2024-09-08T01:47:13Z |
| rustsec-2024-0372 | Memory leak when calling a canister method via `ic_cdk::call` | 2024-09-05T12:00:00Z | 2024-09-07T18:23:36Z |
| rustsec-2024-0371 | gix-path improperly resolves configuration path reported by Git | 2024-09-06T12:00:00Z | 2024-09-07T01:48:33Z |
| rustsec-2024-0369 | phonenumber: panic on parsing crafted phonenumber inputs | 2024-07-07T12:00:00Z | 2024-09-05T13:40:37Z |
| rustsec-2024-0367 | gix-path uses local config across repos when it is the highest scope | 2024-08-31T12:00:00Z | 2024-09-03T22:23:51Z |
| rustsec-2024-0364 | gitoxide-core does not neutralize special characters for terminals | 2024-08-22T12:00:00Z | 2024-08-22T23:15:02Z |
| rustsec-2024-0361 | CWA-2024-004: Gas mispricing in cosmwasm-vm | 2024-08-08T12:00:00Z | 2024-08-08T17:11:37Z |
| rustsec-2024-0356 | `UserIdentity::is_verified` not checking verification status of own user identity while performing the check | 2024-07-18T12:00:00Z | 2024-07-19T10:11:38Z |
| rustsec-2024-0355 | gix-path can use a fake program files location | 2024-07-18T12:00:00Z | 2024-07-18T16:46:06Z |
| rustsec-2024-0354 | Usage of non-constant time base64 decoder could lead to leakage of secret key material | 2024-07-17T12:00:00Z | 2024-07-18T11:24:58Z |
| rustsec-2024-0353 | Refs and paths with reserved Windows device names access the devices | 2024-05-22T12:00:00Z | 2024-07-08T15:14:36Z |
| rustsec-2024-0352 | Refs and paths with reserved Windows device names access the devices | 2024-05-22T12:00:00Z | 2024-07-08T15:14:36Z |
| rustsec-2024-0351 | Refs and paths with reserved Windows device names access the devices | 2024-05-22T12:00:00Z | 2024-07-08T15:14:36Z |
| rustsec-2024-0350 | Traversal outside working tree enables arbitrary code execution | 2024-05-22T12:00:00Z | 2024-07-08T15:12:43Z |
| rustsec-2024-0349 | Traversal outside working tree enables arbitrary code execution | 2024-05-22T12:00:00Z | 2024-07-08T15:12:43Z |
| rustsec-2024-0348 | Traversal outside working tree enables arbitrary code execution | 2024-05-22T12:00:00Z | 2024-07-08T15:12:43Z |
| rustsec-2024-0335 | gix-transport indirect code execution via malicious username | 2024-04-13T12:00:00Z | 2024-07-02T23:39:37Z |
| rustsec-2024-0343 | Reduced entropy due to inadequate character set usage | 2024-06-03T12:00:00Z | 2024-06-15T13:11:33Z |
| rustsec-2020-0071 | Potential segfault in the time crate | 2020-11-18T12:00:00Z | 2024-06-05T14:00:17Z |
| rustsec-2024-0341 | Slow loris vulnerability with default configuration | 2024-03-15T12:00:00Z | 2024-05-21T02:12:32Z |
| rustsec-2024-0339 | Tor path lengths too short when "Vanguards lite" configured | 2024-05-15T12:00:00Z | 2024-05-21T02:12:32Z |
| rustsec-2024-0342 | Degraded secret zeroization capabilities | 2024-05-02T12:00:00Z | 2024-05-20T15:25:56Z |
| rustsec-2024-0337 | The crate `zip_next` has been renamed to `zip`. | 2024-04-20T12:00:00Z | 2024-04-24T14:13:51Z |
| rustsec-2024-0336 | `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input | 2024-04-19T12:00:00Z | 2024-04-20T02:21:14Z |
| rustsec-2023-0079 | KyberSlash: division timings depending on secrets | 2023-12-01T12:00:00Z | 2024-04-12T21:07:31Z |
| rustsec-2024-0334 | `libp2p-tokio-socks5` is unmaintained | 2024-04-05T12:00:00Z | 2024-04-12T16:31:39Z |
| rustsec-2024-0333 | `rsa-export` is unmaintained | 2024-04-06T12:00:00Z | 2024-04-12T16:29:46Z |
| rustsec-2024-0332 | Degradation of service in h2 servers with CONTINUATION Flood | 2024-04-03T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0021 | Parts of Report are dropped as the wrong type during downcast | 2024-03-05T12:00:00Z | 2024-04-11T16:16:20Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-libpython-2025-6075 | Quadratic complexity in os.path.expandvars() with user-controlled template | 2025-12-05T11:08:28.184Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2025-15282 | Header injection via newlines in data URL mediatype | 2026-01-26T14:43:08.856Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2025-11468 | Folding email comments of unfoldable characters doesn't preserve parenthesis | 2026-01-26T14:42:59.991Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-23899 | Joomla! Core - [20260306] - Improper access check in webservice endpoints | 2026-04-10T08:49:24.143Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-23898 | Joomla! Core - [20260305] - Arbitrary file deletion in com_joomlaupdate | 2026-04-10T08:49:22.196Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21632 | Joomla! Core - [20260304] - XSS vectors in various article title outputs | 2026-04-10T08:49:20.111Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21631 | Joomla! Core - [20260303] - XSS vector in com_associations comparison view | 2026-04-10T08:49:17.625Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21630 | Joomla! Core - [20260302] - SQL injection in com_content articles webservice endpoint | 2026-04-10T08:49:15.352Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21629 | Joomla! Core - [20260301] - ACL hardening in com_ajax | 2026-04-10T08:49:13.196Z | 2026-04-10T09:26:18.172Z |
| bit-cassandra-2026-27315 | Apache Cassandra: cqlsh history sensitive information leak | 2026-04-09T08:36:45.141Z | 2026-04-10T09:26:18.172Z |
| bit-parse-2026-39381 | Parse Server's Endpoint `/sessions/me` bypasses `_Session` `protectedFields` | 2026-04-09T14:37:43.255Z | 2026-04-09T15:05:10.890Z |
| bit-parse-2026-39321 | Parse Server has a login timing side-channel reveals user existence | 2026-04-09T14:37:40.125Z | 2026-04-09T15:05:10.890Z |
| bit-wordpress-2023-2745 | WordPress Core < 6.2.1 - Directory Traversal | 2024-03-06T11:09:15.187Z | 2026-04-09T09:13:50.652Z |
| bit-activemq-2026-33227 | Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ Web, Apache ActiveMQ: Improper Limitation of a Pathname to a Restricted Classpath Directory | 2026-04-09T08:36:51.132Z | 2026-04-09T09:13:50.652Z |
| bit-wordpress-2023-5692 | WordPress Core <= 6.4.3 - Sensitive Information Exposure via redirect_guess_404_permalink | 2024-04-09T10:59:36.633Z | 2026-04-08T18:15:20.423Z |
| bit-parse-2026-35200 | Parse Server has a file upload Content-Type override via extension mismatch | 2026-04-08T14:51:33.993Z | 2026-04-08T15:15:28.618Z |
| bit-discourse-2026-34947 | Discourse: Staged user custom fields are exposed on public invite pages | 2026-04-08T14:45:19.092Z | 2026-04-08T15:15:28.618Z |
| bit-discourse-2026-27481 | Discourse: Hidden tag visibility bypass on tag routes | 2026-04-08T14:43:31.143Z | 2026-04-08T15:15:28.618Z |
| bit-mlflow-2025-15031 | Path Traversal Vulnerability in mlflow/mlflow | 2026-03-24T08:47:14.572Z | 2026-04-08T12:15:37.582Z |
| bit-jupyterhub-2026-33709 | JupyterHub has an Open Redirect Vulnerability | 2026-04-08T08:40:42.508Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-33375 | Grafana MSSQL Data Source Plugin: Restriction Bypass Leading to OOM DoS | 2026-04-01T08:41:17.463Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-28375 | Grafana Testdata datasource can issue unbounded memory allocations | 2026-04-01T08:41:15.363Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27880 | OpenFeature evaluation API reads input data with no bounds | 2026-04-01T08:41:13.459Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27879 | Query resampling can cause unbounded memory allocations | 2026-04-01T08:41:11.477Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27877 | Public dashboards discloses all direct mode datasources | 2026-04-01T08:41:09.536Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27876 | RCE on Grafana via sqlExpressions | 2026-04-01T08:41:07.673Z | 2026-04-08T09:14:18.943Z |
| bit-discourse-2026-33415 | Discourse: Improper Access Control in discourse-ai Allows Unauthorized Category Content Exposure | 2026-04-07T08:44:29.473Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33300 | Discourse: Hidden group names and access metadata are exposed to moderators through the `category-chatables` endpoint | 2026-04-07T08:44:13.358Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33185 | Discourse: Group SMTP test endpoint susceptible to SSRF | 2026-04-07T08:44:07.641Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33074 | Discourse: Vulnerability in discourse-subscriptions plugin allowing users to self-grant to higher tier subscriptions | 2026-04-07T08:44:05.677Z | 2026-04-07T09:14:25.218Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ha44046 | Within HostnameError | 2026-02-25T00:49:42.693487Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-fm65506 | html | 2026-02-25T00:49:12.988018Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-dv04077 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-25T00:42:42.369607Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-ds30740 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-25T00:46:12.495329Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-dn18334 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:39:41.622120Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-dc27717 | OpenVPN version 2 | 2026-02-25T00:39:42.192253Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-cy44461 | Within HostnameError | 2026-02-25T00:53:13.101959Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-yq79300 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-24T00:45:20.890998Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-uo76615 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-24T00:45:21.009333Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-sp64433 | Security fixes for GHSA-6rw7-vpxm-498p, GHSA-73rr-hh4g-fpgx, GHSA-8qq5-rm4j-mr97 applied in versions: 4.2.1.1-r1 | 2026-02-24T00:44:51.180009Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-pn58989 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-24T00:45:20.977848Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-lm41397 | node-tar is a full-featured Tar for Node | 2026-02-24T00:40:50.950958Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-io04548 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-24T00:44:50.498217Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-hw19594 | Within HostnameError | 2026-02-24T00:45:50.891263Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-cl79805 | Security fixes for GHSA-F6X5-JH6R-WRFV, GHSA-J5W8-Q4QC-RX2X applied in versions: 0.8.4-r0 | 2026-02-24T00:38:50.220255Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-yn08405 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 7.1.1-r7 | 2026-02-19T00:39:05.944714Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-oj16660 | Security fixes for GHSA-2GH3-RMM4-6RQ5, GHSA-434X-W66G-QW3R, GHSA-R6V5-FH4H-64XC, GHSA-XWFJ-JGWM-7WP5 applied in versions: 1.28.2-r0, 1.28.4-r0 | 2026-02-19T00:39:07.225007Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-nn87556 | Security fixes for GHSA-2GH3-RMM4-6RQ5, GHSA-434X-W66G-QW3R, GHSA-R6V5-FH4H-64XC, GHSA-XWFJ-JGWM-7WP5 applied in versions: 1.28.2-r0, 1.29.0-r0 | 2026-02-19T00:39:07.788394Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-ln12820 | vulnerability has been identified in Node | 2026-02-19T00:58:49.154512Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-kn34553 | vulnerability has been identified in Node | 2026-02-19T00:58:48.926519Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-kn30288 | Security fixes for GHSA-2GH3-RMM4-6RQ5, GHSA-434X-W66G-QW3R, GHSA-R6V5-FH4H-64XC, GHSA-RHFX-M35P-FF5J, GHSA-XWFJ-JGWM-7WP5 applied in versions: 1.27.5-r1, 1.27.6-r0 | 2026-02-19T00:39:07.163109Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-zt77083 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-02-18T00:40:43.959662Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-rs39538 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.553514Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-lr19699 | Within HostnameError | 2026-02-18T00:37:41.636616Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-dt95939 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.674179Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-at88149 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.548996Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-xv54160 | Within HostnameError | 2026-02-17T00:41:15.330012Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-vg57433 | Within HostnameError | 2026-02-17T00:39:45.599344Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-uh39784 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-17T00:40:45.017480Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-jr03360 | Within HostnameError | 2026-02-17T00:39:45.300172Z | 2026-02-16T09:23:22Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2010-ALE-018 | Vulnérabilité dans Adobe Flash Player, Adobe Reader et Acrobat | 2010-10-28T00:00:00.000000 | 2010-11-18T00:00:00.000000 |
| certa-2010-ale-020 | Vulnérabilité dans Adobe Reader et Acrobat | 2010-11-05T00:00:00.000000 | 2010-11-17T00:00:00.000000 |
| CERTA-2010-ALE-020 | Vulnérabilité dans Adobe Reader et Acrobat | 2010-11-05T00:00:00.000000 | 2010-11-17T00:00:00.000000 |
| certa-2010-ale-016 | Vulnérabilité Adobe Shockwave Player | 2010-10-22T00:00:00.000000 | 2010-10-29T00:00:00.000000 |
| CERTA-2010-ALE-016 | Vulnérabilité Adobe Shockwave Player | 2010-10-22T00:00:00.000000 | 2010-10-29T00:00:00.000000 |
| certa-2010-ale-017 | Vulnérabilité dans Mozilla Firefox | 2010-10-27T00:00:00.000000 | 2010-10-28T00:00:00.000000 |
| CERTA-2010-ALE-017 | Vulnérabilité dans Mozilla Firefox | 2010-10-27T00:00:00.000000 | 2010-10-28T00:00:00.000000 |
| certa-2010-ale-014 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-09-09T00:00:00.000000 | 2010-10-06T00:00:00.000000 |
| CERTA-2010-ALE-014 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-09-09T00:00:00.000000 | 2010-10-06T00:00:00.000000 |
| certa-2010-ale-015 | Vulnérabilité dans Adobe Flash Player | 2010-09-14T00:00:00.000000 | 2010-09-21T00:00:00.000000 |
| CERTA-2010-ALE-015 | Vulnérabilité dans Adobe Flash Player | 2010-09-14T00:00:00.000000 | 2010-09-21T00:00:00.000000 |
| certa-2010-ale-013 | Vulnérabilité dans le contrôle ActiveX Apple QuickTime | 2010-08-31T00:00:00.000000 | 2010-09-17T00:00:00.000000 |
| CERTA-2010-ALE-013 | Vulnérabilité dans le contrôle ActiveX Apple QuickTime | 2010-08-31T00:00:00.000000 | 2010-09-17T00:00:00.000000 |
| certa-2010-ale-012 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-08-06T00:00:00.000000 | 2010-08-20T00:00:00.000000 |
| CERTA-2010-ALE-012 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2010-08-06T00:00:00.000000 | 2010-08-20T00:00:00.000000 |
| certa-2010-ale-011 | Vulnérabilités dans Apple iOS | 2010-08-04T00:00:00.000000 | 2010-08-12T00:00:00.000000 |
| CERTA-2010-ALE-011 | Vulnérabilités dans Apple iOS | 2010-08-04T00:00:00.000000 | 2010-08-12T00:00:00.000000 |
| certa-2010-ale-010 | Vulnérabilité dans le Shell de Microsoft Windows | 2010-07-19T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| certa-2010-ale-009 | Exploitation par un code malveillant d'une vulnérabilité Microsoft Windows non corrigée | 2010-07-16T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| CERTA-2010-ALE-010 | Vulnérabilité dans le Shell de Microsoft Windows | 2010-07-19T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| CERTA-2010-ALE-009 | Exploitation par un code malveillant d'une vulnérabilité Microsoft Windows non corrigée | 2010-07-16T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| certa-2010-ale-008 | Vulnérabilité dans le Centre d'aide et de support Windows | 2010-06-10T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| CERTA-2010-ALE-008 | Vulnérabilité dans le Centre d'aide et de support Windows | 2010-06-10T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| certa-2010-ale-007 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2010-06-05T00:00:00.000000 | 2010-06-30T00:00:00.000000 |
| CERTA-2010-ALE-007 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2010-06-05T00:00:00.000000 | 2010-06-30T00:00:00.000000 |
| certa-2009-ale-019 | Vulnérabilité dans Windows 7 et Windows Server 2008 R2 | 2009-11-16T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| certa-2008-ale-006 | Vulnérabilités dans HP OpenView NNM | 2008-04-18T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| CERTA-2009-ALE-019 | Vulnérabilité dans Windows 7 et Windows Server 2008 R2 | 2009-11-16T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| CERTA-2008-ALE-006 | Vulnérabilités dans HP OpenView NNM | 2008-04-18T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| certa-2010-ale-006 | Vulnérabilité de Safari | 2010-05-14T00:00:00.000000 | 2010-05-27T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0137 | Multiples vulnérabilités dans GnuTLS | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0141 | Multiples vulnérabilités dans les produits SAP | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0140 | Multiples vulnérabilités dans les produits Axis | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0139 | Multiples vulnérabilités dans les produits Siemens | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0138 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0137 | Multiples vulnérabilités dans GnuTLS | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| CERTFR-2026-AVI-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0136 | Vulnérabilité dans Fortinet FortiClientEMS | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0135 | Vulnérabilité dans GitLab AI Gateway | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0134 | Vulnérabilité dans Microsoft Edge | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0132 | Multiples vulnérabilités dans VMware Tanzu Greenplum | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| CERTFR-2026-AVI-0136 | Vulnérabilité dans Fortinet FortiClientEMS | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| CERTFR-2026-AVI-0135 | Vulnérabilité dans GitLab AI Gateway | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| CERTFR-2026-AVI-0134 | Vulnérabilité dans Microsoft Edge | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| CERTFR-2026-AVI-0132 | Multiples vulnérabilités dans VMware Tanzu Greenplum | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0131 | Multiples vulnérabilités dans les produits IBM | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0130 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0129 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0128 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0127 | Vulnérabilité dans NetApp ONTAP 9 | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0126 | Vulnérabilité dans ESET Management Agent | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0125 | Multiples vulnérabilités dans les produits Moxa | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0124 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0123 | Multiples vulnérabilités dans Asterisk | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0122 | Multiples vulnérabilités dans Tenable Nessus | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0121 | Vulnérabilité dans les produits Juniper Networks | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0131 | Multiples vulnérabilités dans les produits IBM | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0130 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0129 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0128 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-000057 | WordPress Plugin "Newsletter" vulnerable to cross-site scripting | 2022-07-25T14:30+09:00 | 2024-06-18T11:21+09:00 |
| jvndb-2022-000033 | Strapi vulnerable to cross-site scripting | 2022-05-13T16:45+09:00 | 2024-06-18T11:17+09:00 |
| jvndb-2022-000043 | SHIRASAGI vulnerable to cross-site scripting | 2022-06-09T13:31+09:00 | 2024-06-18T11:13+09:00 |
| jvndb-2022-000040 | Mobaoku-Auction & Flea Market App for iOS vulnerable to improper server certificate verification | 2022-05-27T15:48+09:00 | 2024-06-18T11:06+09:00 |
| jvndb-2022-000044 | Cisco Catalyst 2940 Series Switches vulnerable to cross-site scripting | 2022-06-14T13:46+09:00 | 2024-06-18T10:51+09:00 |
| jvndb-2022-000047 | web2py vulnerable to open redirect | 2022-06-23T14:21+09:00 | 2024-06-18T10:48+09:00 |
| jvndb-2022-000048 | L2Blocker Sensor setup screen vulnerable to authentication bypass | 2022-06-24T14:21+09:00 | 2024-06-18T10:45+09:00 |
| jvndb-2022-000041 | WordPress Plugin "Modern Events Calendar Lite" vulnerable to cross-site scripting | 2022-06-01T13:39+09:00 | 2024-06-18T10:42+09:00 |
| jvndb-2022-000042 | T&D Data Server and THERMO RECORDER DATA SERVER contain a directory traversal vulnerability. | 2022-06-01T16:12+09:00 | 2024-06-18T10:34+09:00 |
| jvndb-2022-000051 | Multiple vulnerabilities in Cybozu Garoon | 2022-07-04T14:17+09:00 | 2024-06-17T16:49+09:00 |
| jvndb-2022-000035 | Multiple vulnerabilities in Cybozu Garoon | 2022-05-16T14:25+09:00 | 2024-06-17T16:34+09:00 |
| jvndb-2024-003539 | Multiple vulnerabilities in Toshiba Tec and Oki Electric Industry MFPs | 2024-06-17T15:21+09:00 | 2024-06-17T15:21+09:00 |
| jvndb-2022-000058 | Multiple vulnerabilities in untangle | 2022-07-25T14:18+09:00 | 2024-06-17T11:03+09:00 |
| jvndb-2022-000049 | HOME SPOT CUBE2 vulnerable to OS command injection | 2022-06-29T13:42+09:00 | 2024-06-17T10:45+09:00 |
| jvndb-2022-000050 | LiteCart vulnerable to cross-site scripting | 2022-07-04T14:12+09:00 | 2024-06-17T10:39+09:00 |
| jvndb-2022-002017 | U-Boot squashfs filesystem implementation vulnerable to heap-based buffer overflow | 2022-07-14T15:59+09:00 | 2024-06-14T17:53+09:00 |
| jvndb-2022-000052 | Passage Drive vulnerable to insufficient data verification | 2022-07-08T13:42+09:00 | 2024-06-14T17:48+09:00 |
| jvndb-2022-000055 | Booked vulnerable to open redirect | 2022-07-22T13:40+09:00 | 2024-06-14T17:43+09:00 |
| jvndb-2022-002265 | Trend Micro Endpoint security products for enterprises vulnerable to Link Following Local Privilege Escalation | 2022-08-18T15:45+09:00 | 2024-06-14T17:11+09:00 |
| jvndb-2022-000056 | Multiple vulnerabilities in Nintendo Wi-Fi Network Adaptor WAP-001 | 2022-07-29T13:43+09:00 | 2024-06-14T16:27+09:00 |
| jvndb-2023-001215 | Zuken Elmic KASAGO uses insufficient random values for TCP Initial Sequence Numbers | 2023-02-13T14:18+09:00 | 2024-06-14T15:45+09:00 |
| jvndb-2022-002112 | CONTEC SolarView Compact vulnerable to insufficient verification in uploading files | 2022-08-03T17:40+09:00 | 2024-06-14T15:21+09:00 |
| jvndb-2022-000059 | "Hulu" App for Android uses a hard-coded API key for an external service | 2022-07-28T09:14+09:00 | 2024-06-14T14:42+09:00 |
| jvndb-2022-002338 | PLANEX MZK-DP150N contains hidden administrative functionality | 2022-08-23T15:02+09:00 | 2024-06-14T14:06+09:00 |
| jvndb-2022-000054 | Multiple vulnerabilities in Cybozu Office | 2022-07-20T17:28+09:00 | 2024-06-14T14:02+09:00 |
| jvndb-2022-000060 | "Hulu" App for iOS vulnerable to improper server certificate verification | 2022-07-28T09:51+09:00 | 2024-06-14T12:25+09:00 |
| jvndb-2022-000063 | PukiWiki vulnerable to cross-site scripting | 2022-08-23T14:40+09:00 | 2024-06-14T12:00+09:00 |
| jvndb-2022-002339 | Multiple vulnerabilities in PukiWiki | 2022-08-24T14:17+09:00 | 2024-06-14T11:55+09:00 |
| jvndb-2022-000065 | Multiple vulnerabilities in Exment | 2022-08-24T14:23+09:00 | 2024-06-14T11:09+09:00 |
| jvndb-2022-002337 | UNIMO Technology digital video recorders vulnerable to missing authentication for critical functions | 2022-08-23T14:31+09:00 | 2024-06-14T10:24+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16410 | HCL AION存在未明漏洞(CNVD-2026-16410) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16409 | HCL AION信息泄露漏洞(CNVD-2026-16409) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16408 | HCL AION文件上传漏洞 | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16407 | HCL AION存在未明漏洞(CNVD-2026-16407) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16406 | HCL AION存在未明漏洞(CNVD-2026-16406) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16405 | HCL AION信息泄露漏洞(CNVD-2026-16405) | 2026-01-29 | 2026-04-09 |
| cnvd-2026-16403 | HCL AION信息泄露漏洞(CNVD-2026-16403) | 2026-02-11 | 2026-04-09 |
| cnvd-2026-16402 | HCL AION存在未明漏洞(CNVD-2026-16402) | 2026-02-11 | 2026-04-09 |
| cnvd-2026-16404 | HCL AION安全绕过漏洞(CNVD-2026-16404) | 2026-01-29 | 2026-04-08 |
| cnvd-2026-16401 | HCL AION跨站请求伪造漏洞 | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16400 | HCL AION跨站脚本漏洞 | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16399 | HCL AION存在未明漏洞(CNVD-2026-16399) | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16398 | HCL AION命令注入漏洞 | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16397 | HCL AION信息泄露漏洞(CNVD-2026-16397) | 2026-02-11 | 2026-04-08 |
| cnvd-2026-16396 | HCL AION拒绝服务漏洞 | 2026-03-19 | 2026-04-08 |
| cnvd-2026-16395 | OpenClaw权限提升漏洞(CNVD-2026-16395) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16394 | OpenClaw任意代码执行漏洞(CNVD-2026-16394) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16393 | OpenClaw沙盒逃逸漏洞 | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16392 | OpenClaw存在未明漏洞(CVE-2026-32913) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16391 | OpenClaw存在未明漏洞(CNVD-2026-16391) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16390 | OpenClaw拒绝服务漏洞(CNVD-2026-16390) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16389 | OpenClaw存在未明漏洞(CNVD-2026-16389) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16388 | OpenClaw路径限制绕过漏洞 | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16387 | OpenClaw存在未明漏洞(CNVD-2026-16387) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16386 | OpenClaw存在未明漏洞(CNVD-2026-16386) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16385 | OpenClaw存在未明漏洞(CNVD-2026-16385) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16384 | OpenClaw存在未明漏洞(CNVD-2026-16384) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16383 | OpenClaw存在未明漏洞(CNVD-2026-16383) | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16382 | OpenClaw批准绕过漏洞 | 2026-03-26 | 2026-04-08 |
| cnvd-2026-16381 | Mozilla Thunderbird信息泄露漏洞(CNVD-2026-16381) | 2026-03-31 | 2026-04-08 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-12109 | Уязвимость ядра операционной системы Linux, связанная с возможностью использования памяти… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12108 | Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её ос… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12107 | Уязвимость функции find_cifs_entry() в модуле fs/smb/client/readdir.c поддержки клиента S… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12105 | Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её ос… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12101 | Уязвимость компонента drivers/usb/gadget/udc/core.c ядра операционной системы Linux, позв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12096 | Уязвимость функции ksmbd_sessions_deregister() компонента user_session.c ядра операционно… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12093 | Уязвимость функции erdma_accept_newconn() компонента drivers/infiniband/hw/erdma/erdma_cm… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12092 | Уязвимость компонента drivers/gpu/drm/vkms ядра операционной системы Linux, позволяющая н… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12091 | Уязвимость компонента sctp ядра операционной системы Linux, позволяющая нарушителю вызват… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12089 | Уязвимость функции ext4_xattr_inode_dec_ref_all() компонента fs/ext4/xattr.c ядра операци… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12087 | Уязвимость компонента sch_hfsc.c ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12086 | Уязвимость компонента irq-gic-v2m.c ядра операционной системы Linux, позволяющая нарушите… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12085 | Уязвимость компонента sch_hfsc.c ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12077 | Уязвимость функции rtsx_usb_ms_drv_remove() компонента drivers/memstick/host/rtsx_usb_ms.… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12076 | Уязвимость компонента kernel/trace ядра операционной системы Linux, позволяющая нарушител… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12075 | Уязвимость компонента ksmbd ядра операционной системы Linux, позволяющая нарушителю получ… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12074 | Уязвимость компонента drivers/hsi/clients/ssi_protocol.c ядра операционной системы Linux,… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12072 | Уязвимость компонента arm.c ядра операционной системы Linux, позволяющая нарушителю получ… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12071 | Уязвимость компонента kfd_process.c ядра операционной системы Linux, позволяющая нарушите… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12069 | Уязвимость компонента avic.c ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12068 | Уязвимость компонента auth.c ядра операционной системы Linux, позволяющая нарушителю полу… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12066 | Уязвимость функции hfsc_enqueue() компонента net/sched/sch_hfsc.c ядра операционной систе… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12065 | Уязвимость компонента net/can/bcm.c ядра операционной системы Linux, позволяющая нарушите… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12063 | Уязвимость функции ksmbd_crypt_message() в модуле fs/smb/server/auth.c поддержки сервера … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12062 | Уязвимость функции chameleon_parse_gdd() ядра операционной системы Linux, позволяющая нар… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12061 | Уязвимость функции pci_register_host_bridge() ядра операционной системы Linux, позволяюща… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12058 | Уязвимость функции hash_accept() компонента crypto/algif_hash.c ядра операционной системы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12053 | Уязвимость компонента backlight ядра операционной системы Linux, позволяющая нарушителю в… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12052 | Уязвимость ASN.1 библиотеки Libtasn1, связанная с алгоритмической сложностью, позволяющая… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12051 | Уязвимость библиотеки безопасности транспортного уровня GnuTLS, связанная с алгоритмическ… | 28.09.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201406-0445 | OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly re… | 2024-07-23T21:30:24.345000Z |
| var-200809-0013 | Network Preferences in Apple Mac OS X 10.4.11 stores PPP passwords in cleartext in a worl… | 2024-07-23T21:30:24.177000Z |
| var-201104-0082 | dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and … | 2024-07-23T21:30:23.564000Z |
| var-201804-1179 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:29:57.987000Z |
| var-201110-0388 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2024-07-23T21:29:27.159000Z |
| var-201806-1460 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:29:26.304000Z |
| var-200904-0811 | Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier… | 2024-07-23T21:29:26.736000Z |
| var-200809-0402 | Heap-based buffer overflow in Apple Type Services (ATS) in Apple Mac OS X 10.4.11 and 10.… | 2024-07-23T21:29:26.389000Z |
| var-200906-0591 | The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util befor… | 2024-07-23T21:29:05.332000Z |
| var-200806-0425 | Unspecified vulnerability in WebKit in Apple Safari before 3.1.2, as distributed in Mac O… | 2024-07-23T21:29:05.522000Z |
| var-201411-0410 | cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain nam… | 2024-07-23T21:29:03.698000Z |
| var-201912-0635 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:28:59.002000Z |
| var-201912-0648 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:28:49.167000Z |
| var-200711-0538 | Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header fro… | 2024-07-23T21:28:49.905000Z |
| var-201904-1444 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:28:46.398000Z |
| var-201706-0271 | In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NU… | 2024-07-23T21:28:45.678000Z |
| var-202105-1431 | The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired… | 2024-07-23T21:28:26.944000Z |
| var-200704-0221 | The WebFoundation framework in Apple Mac OS X 10.3.9 and earlier allows subdomain cookies… | 2024-07-23T21:28:26.644000Z |
| var-200511-0018 | The Internet Key Exchange version 1 (IKEv1) implementation in Stonesoft StoneGate Firewal… | 2024-07-23T21:28:25.870000Z |
| var-200703-0028 | Server Manager (servermgrd) in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 does not suf… | 2024-07-23T21:28:21.532000Z |
| var-200503-0071 | The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, an… | 2024-07-23T21:28:20.494000Z |
| var-200609-0312 | Buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to … | 2024-07-23T21:27:23.266000Z |
| var-201912-0582 | A logic issue was addressed with improved state management. This issue is fixed in iOS 12… | 2024-07-23T21:27:22.850000Z |
| var-202203-0145 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed … | 2024-07-23T21:26:46.093000Z |
| var-201912-1847 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:26:10.950000Z |
| var-201806-1441 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T21:26:10.287000Z |
| var-200802-0651 | modules/libpr0n/decoders/bmp/nsBMPDecoder.cpp in Mozilla Firefox before 2.0.0.12, Thunder… | 2024-07-23T21:26:10.434000Z |
| var-201310-0596 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, a… | 2024-07-23T21:26:09.527000Z |
| var-201202-0070 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:26:09.744000Z |
| var-201904-0985 | SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remot… | 2024-07-23T21:26:06.321000Z |