Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-7949 |
3.1 (3.1)
|
Out of bounds read in Skia in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:12:48.956Z | 2026-05-06T21:56:47.136Z |
| CVE-2026-7950 |
5.4 (3.1)
|
Out of bounds read and write in GFX in Google Chr… |
Google |
Chrome |
2026-05-06T18:12:49.329Z | 2026-05-06T21:56:38.241Z |
| CVE-2026-7952 |
4.2 (3.1)
|
Insufficient policy enforcement in Extensions in … |
Google |
Chrome |
2026-05-06T18:12:50.069Z | 2026-05-06T21:56:18.362Z |
| CVE-2026-7953 |
6.1 (3.1)
|
Insufficient validation of untrusted input in Omn… |
Google |
Chrome |
2026-05-06T18:12:50.626Z | 2026-05-06T21:56:08.989Z |
| CVE-2026-7954 |
3.1 (3.1)
|
Race in Shared Storage in Google Chrome prior to … |
Google |
Chrome |
2026-05-06T18:12:51.090Z | 2026-05-06T21:55:59.002Z |
| CVE-2026-7955 |
5.3 (3.1)
|
Uninitialized Use in GPU in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:12:51.435Z | 2026-05-06T21:55:49.669Z |
| CVE-2026-7958 |
5.4 (3.1)
|
Inappropriate implementation in ServiceWorker in … |
Google |
Chrome |
2026-05-06T18:12:52.474Z | 2026-05-06T21:55:20.944Z |
| CVE-2026-7959 |
3.1 (3.1)
|
Inappropriate implementation in Navigation in Goo… |
Google |
Chrome |
2026-05-06T18:12:52.805Z | 2026-05-06T21:55:11.048Z |
| CVE-2026-7960 |
5.3 (3.1)
|
Race in Speech in Google Chrome prior to 148.0.77… |
Google |
Chrome |
2026-05-06T18:12:53.174Z | 2026-05-06T21:55:01.153Z |
| CVE-2026-7961 |
4.3 (3.1)
|
Insufficient validation of untrusted input in Per… |
Google |
Chrome |
2026-05-06T18:12:53.500Z | 2026-05-06T21:54:51.757Z |
| CVE-2026-7962 |
5.4 (3.1)
|
Insufficient policy enforcement in DirectSockets … |
Google |
Chrome |
2026-05-06T18:12:53.834Z | 2026-05-06T21:54:42.375Z |
| CVE-2026-7964 |
4.2 (3.1)
|
Insufficient validation of untrusted input in Fil… |
Google |
Chrome |
2026-05-06T18:12:54.526Z | 2026-05-06T21:54:23.637Z |
| CVE-2026-7965 |
3.1 (3.1)
|
Insufficient validation of untrusted input in Dev… |
Google |
Chrome |
2026-05-06T18:12:54.878Z | 2026-05-06T21:54:14.258Z |
| CVE-2026-7966 |
3.1 (3.1)
|
Insufficient validation of untrusted input in Sit… |
Google |
Chrome |
2026-05-06T18:12:55.215Z | 2026-05-06T21:54:04.881Z |
| CVE-2026-7968 |
3.1 (3.1)
|
Insufficient validation of untrusted input in COR… |
Google |
Chrome |
2026-05-06T18:12:55.854Z | 2026-05-06T21:53:46.027Z |
| CVE-2026-7969 |
4.3 (3.1)
|
Integer overflow in Network in Google Chrome prio… |
Google |
Chrome |
2026-05-06T18:12:56.222Z | 2026-05-06T21:53:36.654Z |
| CVE-2026-7971 |
6.3 (3.1)
|
Inappropriate implementation in ORB in Google Chr… |
Google |
Chrome |
2026-05-06T18:12:56.973Z | 2026-05-06T21:53:17.821Z |
| CVE-2026-7972 |
4.3 (3.1)
|
Uninitialized Use in GPU in Google Chrome prior t… |
Google |
Chrome |
2026-05-06T18:12:57.320Z | 2026-05-06T21:53:08.430Z |
| CVE-2026-7977 |
6.3 (3.1)
|
Inappropriate implementation in Canvas in Google … |
Google |
Chrome |
2026-05-06T18:12:59.116Z | 2026-05-06T21:52:21.357Z |
| CVE-2026-7979 |
4.3 (3.1)
|
Inappropriate implementation in Media in Google C… |
Google |
Chrome |
2026-05-06T18:12:59.814Z | 2026-05-06T21:52:02.679Z |
| CVE-2026-7982 |
6.5 (3.1)
|
Uninitialized Use in WebCodecs in Google Chrome p… |
Google |
Chrome |
2026-05-06T18:13:00.944Z | 2026-05-06T21:51:43.237Z |
| CVE-2026-7983 |
4.3 (3.1)
|
Out of bounds read in Dawn in Google Chrome prior… |
Google |
Chrome |
2026-05-06T18:13:01.298Z | 2026-05-06T21:51:33.891Z |
| CVE-2026-7986 |
4.3 (3.1)
|
Insufficient policy enforcement in Autofill in Go… |
Google |
Chrome |
2026-05-06T18:13:02.861Z | 2026-05-06T21:51:05.027Z |
| CVE-2026-7989 |
4.2 (3.1)
|
Insufficient data validation in DataTransfer in G… |
Google |
Chrome |
2026-05-06T18:13:03.971Z | 2026-05-06T21:50:36.068Z |
| CVE-2026-7993 |
4.2 (3.1)
|
Insufficient validation of untrusted input in Pay… |
Google |
Chrome |
2026-05-06T18:13:05.353Z | 2026-05-06T21:49:58.710Z |
| CVE-2026-7996 |
4.2 (3.1)
|
Insufficient validation of untrusted input in SSL… |
Google |
Chrome |
2026-05-06T18:13:06.528Z | 2026-05-06T21:49:29.931Z |
| CVE-2026-7998 |
5.4 (3.1)
|
Insufficient validation of untrusted input in Dia… |
Google |
Chrome |
2026-05-06T18:13:07.294Z | 2026-05-06T21:49:11.002Z |
| CVE-2026-7999 |
4.3 (3.1)
|
Inappropriate implementation in V8 in Google Chro… |
Google |
Chrome |
2026-05-06T18:13:07.680Z | 2026-05-06T21:49:00.986Z |
| CVE-2026-8003 |
5.4 (3.1)
|
Insufficient validation of untrusted input in Tab… |
Google |
Chrome |
2026-05-06T18:13:09.276Z | 2026-05-06T21:48:09.070Z |
| CVE-2026-8004 |
4.3 (3.1)
|
Insufficient policy enforcement in DevTools in Go… |
Google |
Chrome |
2026-05-06T18:13:09.616Z | 2026-05-06T21:47:59.531Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-41663 |
3.5 (3.1)
|
Admidio: CSRF on Admin Preferences Triggers Unauthoriz… |
Admidio |
admidio |
2026-05-07T03:00:11.696Z | 2026-05-07T12:41:41.736Z |
| CVE-2026-41660 |
7.1 (3.1)
|
Admidio: Inverted 2FA Reset Authorization Check Lets G… |
Admidio |
admidio |
2026-05-07T02:59:29.810Z | 2026-05-07T12:44:52.834Z |
| CVE-2026-41657 |
4.9 (3.1)
|
Admidio: Cross-Organization Member Data Exposure via P… |
Admidio |
admidio |
2026-05-07T02:58:09.340Z | 2026-05-07T12:44:25.356Z |
| CVE-2026-8027 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
FlowiseAI Flowise User Controller authorization |
FlowiseAI |
Flowise |
2026-05-06T13:45:10.213Z | 2026-05-06T15:26:30.808Z |
| CVE-2026-44602 |
3.7 (3.1)
|
Tor before 0.4.9.7 has a NULL pointer dereference… |
torproject |
Tor |
2026-05-07T03:17:32.456Z | 2026-05-07T14:58:19.602Z |
| CVE-2026-44601 |
3.7 (3.1)
|
Tor before 0.4.9.7, when circuit queue memory pre… |
torproject |
Tor |
2026-05-07T03:09:51.106Z | 2026-05-07T14:58:24.830Z |
| CVE-2026-8028 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
FlowiseAI Flowise Endpoint account.service.ts verify i… |
FlowiseAI |
Flowise |
2026-05-06T14:15:10.891Z | 2026-05-06T14:35:31.158Z |
| CVE-2026-3953 |
8.8 (3.1)
|
Reflected XSS in Gosoft Software's Proticaret E-Commerce |
Gosoft Software Industry and Trade Ltd. Co. |
Proticaret E-Commerce |
2026-05-07T11:20:11.750Z | 2026-05-07T13:01:46.471Z |
| CVE-2026-7910 |
N/A
|
Use after free in Views in Google Chrome prior to… |
Google |
Chrome |
2026-05-06T18:12:29.911Z | 2026-05-06T18:12:29.911Z |
| CVE-2026-6508 |
9.8 (3.1)
|
RCE in TUBITAK BILGEM's Liderahenk |
TUBITAK BILGEM Software Technologies Research Institute |
Liderahenk |
2026-05-07T11:47:28.064Z | 2026-05-07T14:57:31.925Z |
| CVE-2025-14341 |
8.3 (3.1)
|
Input Data Manipulation in DivvyDrive Information Tech… |
DivvyDrive Information Technologies Inc. |
DivvyDrive |
2026-05-07T13:13:47.291Z | 2026-05-07T14:38:03.904Z |
| CVE-2026-6795 |
9.6 (3.1)
|
Open Redirect in DivvyDrive Information Technologies' … |
DivvyDrive Information Technologies Inc. |
DivvyDrive |
2026-05-07T12:58:37.316Z | 2026-05-07T14:37:11.375Z |
| CVE-2026-6002 |
8.8 (3.1)
|
HTML Injection in DivvyDrive Information Technologies'… |
DivvyDrive Information Technologies Inc. |
DivvyDrive |
2026-05-07T12:50:19.620Z | 2026-05-07T13:13:49.654Z |
| CVE-2026-5791 |
9.6 (3.1)
|
CSRF in DivvyDrive Information Technologies' DivvyDrive |
DivvyDrive Information Technologies Inc. |
DivvyDrive |
2026-05-07T12:40:54.588Z | 2026-05-07T13:13:17.017Z |
| CVE-2026-5784 |
8.8 (3.1)
|
Stored XSS in DivvyDrive Information Technologies' Div… |
DivvyDrive Information Technologies Inc. |
DivvyDrive |
2026-05-07T12:54:06.578Z | 2026-05-07T13:14:36.155Z |
| CVE-2026-43580 |
4.9 (4.0)
7.7 (3.1)
|
OpenClaw < 2026.4.10 - Incomplete Navigation Guard Cov… |
OpenClaw |
OpenClaw |
2026-05-06T19:49:23.273Z | 2026-05-07T12:31:58.713Z |
| CVE-2026-43581 |
9 (4.0)
9.6 (3.1)
|
OpenClaw < 2026.4.10 - Chrome DevTools Protocol Exposu… |
OpenClaw |
OpenClaw |
2026-05-06T19:49:23.986Z | 2026-05-07T13:55:21.331Z |
| CVE-2026-34002 |
6.1 (3.1)
|
Xorg: xwayland: x.org x server: information disclosure… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-05-05T14:41:10.065Z | 2026-05-06T14:27:54.934Z |
| CVE-2026-7981 |
8.1 (3.1)
|
Out of bounds read in Codecs in Google Chrome pri… |
Google |
Chrome |
2026-05-06T18:13:00.591Z | 2026-05-07T12:58:23.258Z |
| CVE-2026-34000 |
6.1 (3.1)
|
Xwayland: xorg: x.org x server: information disclosure… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-05-05T14:41:05.468Z | 2026-05-05T18:52:32.853Z |
| CVE-2026-35192 |
2.3 (4.0)
|
Session fixation via public cached pages and SESSION_S… |
djangoproject |
Django |
2026-05-05T14:50:29.984Z | 2026-05-06T15:25:28.432Z |
| CVE-2026-5766 |
5.3 (3.1)
6.3 (4.0)
|
Potential denial-of-service vulnerability in ASGI requ… |
djangoproject |
Django |
2026-05-05T14:49:19.715Z | 2026-05-06T15:25:38.926Z |
| CVE-2026-6907 |
4.3 (3.1)
2.3 (4.0)
|
Potential exposure of private data due to incorrect ha… |
djangoproject |
Django |
2026-05-05T14:50:02.594Z | 2026-05-06T15:25:33.698Z |
| CVE-2026-8094 |
N/A
|
Other issue in the WebRTC component |
Mozilla |
Firefox |
2026-05-07T12:45:08.185Z | 2026-05-07T12:45:08.185Z |
| CVE-2026-8092 |
N/A
|
Memory safety bugs fixed in Firefox ESR 115.35.2, Fire… |
Mozilla |
Firefox |
2026-05-07T12:45:06.716Z | 2026-05-07T12:45:06.716Z |
| CVE-2026-8033 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
PicoTronica e-Clinic Healthcare System ECHS Response H… |
PicoTronica |
e-Clinic Healthcare System ECHS |
2026-05-06T19:30:16.794Z | 2026-05-07T14:59:40.518Z |
| CVE-2026-8032 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
PicoTronica e-Clinic Healthcare System ECHS echs.js ha… |
PicoTronica |
e-Clinic Healthcare System ECHS |
2026-05-06T19:00:20.735Z | 2026-05-07T13:55:16.912Z |
| CVE-2026-8031 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
PicoTronica e-Clinic Healthcare System ECHS API Endpoi… |
PicoTronica |
e-Clinic Healthcare System ECHS |
2026-05-06T18:00:18.864Z | 2026-05-06T18:37:26.894Z |
| CVE-2026-27415 |
4.3 (3.1)
|
WordPress BEAR plugin <= 1.1.5 - Cross Site Request Fo… |
PluginUs.Net |
BEAR |
2026-05-07T10:20:28.844Z | 2026-05-07T14:57:37.886Z |
| CVE-2026-8001 |
8.3 (3.1)
|
Use After Free in Printing in Google Chrome on Li… |
Google |
Chrome |
2026-05-06T18:13:08.504Z | 2026-05-07T03:56:55.965Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-8000 | Insufficient validation of untrusted input in ChromeDriver in Google Chrome on Windows prior to 148… | 2026-05-06T19:16:50.953 | 2026-05-07T13:39:07.147 |
| fkie_cve-2026-43527 | OpenClaw before 2026.4.14 contains a server-side request forgery vulnerability in browser SSRF poli… | 2026-05-05T12:16:18.777 | 2026-05-07T13:29:50.837 |
| fkie_cve-2026-42509 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-05-06T10:16:20.217 | 2026-05-07T13:16:12.680 |
| fkie_cve-2026-40010 | Missing invocation of Servlet http web request method changeSessionId after session binding can be … | 2026-05-06T10:16:20.093 | 2026-05-07T13:16:10.557 |
| fkie_cve-2026-31693 | In the Linux kernel, the following vulnerability has been resolved: cifs: some missing initializat… | 2026-04-30T12:16:24.103 | 2026-05-07T12:49:05.780 |
| fkie_cve-2026-20447 | In geniezone, there is a possible escalation of privilege due to a missing bounds check. This could… | 2026-05-04T07:15:58.450 | 2026-05-07T12:43:25.100 |
| fkie_cve-2026-20448 | In geniezone, there is a possible escalation of privilege due to a missing permission check. This c… | 2026-05-04T07:15:59.500 | 2026-05-07T12:43:11.833 |
| fkie_cve-2026-20449 | In Modem, there is a possible system crash due to a heap buffer overflow. This could lead to remote… | 2026-05-04T07:15:59.610 | 2026-05-07T12:43:00.957 |
| fkie_cve-2026-20450 | In Modem, there is a possible system crash due to incorrect error handling. This could lead to remo… | 2026-05-04T07:15:59.723 | 2026-05-07T12:42:53.157 |
| fkie_cve-2026-20451 | In slbc, there is a possible out of bounds write due to type confusion. This could lead to local es… | 2026-05-04T07:15:59.840 | 2026-05-07T12:42:44.807 |
| fkie_cve-2023-6460 | A potential logging of the firestore key via logging within nodejs-firestore exists - Developers wh… | 2023-12-04T13:15:07.800 | 2026-05-07T10:16:05.000 |
| fkie_cve-2025-37756 | In the Linux kernel, the following vulnerability has been resolved: net: tls: explicitly disallow … | 2025-05-01T13:15:54.370 | 2026-05-07T08:15:59.980 |
| fkie_cve-2025-2418 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in TR7 Cyber Defense Inc. Web A… | 2026-02-16T12:16:22.093 | 2026-05-07T08:15:59.830 |
| fkie_cve-2026-31715 | In the Linux kernel, the following vulnerability has been resolved: f2fs: fix UAF caused by decrem… | 2026-05-01T14:16:21.637 | 2026-05-07T06:16:04.013 |
| fkie_cve-2026-31709 | In the Linux kernel, the following vulnerability has been resolved: smb: client: validate the whol… | 2026-05-01T14:16:20.950 | 2026-05-07T06:16:03.867 |
| fkie_cve-2026-31589 | In the Linux kernel, the following vulnerability has been resolved: mm: call ->free_folio() direct… | 2026-04-24T15:16:34.700 | 2026-05-07T06:16:03.710 |
| fkie_cve-2026-31419 | In the Linux kernel, the following vulnerability has been resolved: net: bonding: fix use-after-fr… | 2026-04-13T14:16:11.447 | 2026-05-07T06:16:03.467 |
| fkie_cve-2026-23468 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Limit BO list entr… | 2026-04-03T16:16:34.330 | 2026-05-07T06:16:03.330 |
| fkie_cve-2025-38584 | In the Linux kernel, the following vulnerability has been resolved: padata: Fix pd UAF once and fo… | 2025-08-19T17:15:35.723 | 2026-05-07T06:16:01.780 |
| fkie_cve-2026-32192 | Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate p… | 2026-04-14T18:17:25.723 | 2026-05-07T02:31:22.303 |
| fkie_cve-2026-31774 | In the Linux kernel, the following vulnerability has been resolved: io_uring/net: fix slab-out-of-… | 2026-05-01T15:16:40.720 | 2026-05-07T02:29:19.160 |
| fkie_cve-2026-31775 | In the Linux kernel, the following vulnerability has been resolved: ALSA: ctxfi: Don't enumerate S… | 2026-05-01T15:16:40.863 | 2026-05-07T02:28:36.717 |
| fkie_cve-2026-31776 | In the Linux kernel, the following vulnerability has been resolved: ALSA: ctxfi: Fix missing SPDIF… | 2026-05-01T15:16:40.967 | 2026-05-07T02:27:43.700 |
| fkie_cve-2026-31777 | In the Linux kernel, the following vulnerability has been resolved: ALSA: ctxfi: Check the error f… | 2026-05-01T15:16:41.087 | 2026-05-07T02:27:02.030 |
| fkie_cve-2026-7040 | Text::Minify::XS versions from 0.3.0 before 0.7.8 for Perl have a heap overflow when processing som… | 2026-04-27T13:16:02.710 | 2026-05-07T02:20:57.817 |
| fkie_cve-2026-6265 | Insecure preserved inherited permissions vulnerability in Cerberus FTP Server on Windows allows Pri… | 2026-04-27T14:16:51.153 | 2026-05-07T02:18:35.547 |
| fkie_cve-2026-7309 | A flaw was found in the OpenShift Container Platform build system. A user with the `edit` ClusterRo… | 2026-04-28T13:19:24.847 | 2026-05-07T02:16:00.030 |
| fkie_cve-2026-7381 | Plack::Middleware::XSendfile versions through 1.0053 for Perl can allow client-controlled path rewr… | 2026-04-29T23:16:19.897 | 2026-05-07T02:10:11.107 |
| fkie_cve-2026-7950 | Out of bounds read and write in GFX in Google Chrome prior to 148.0.7778.96 allowed a remote attack… | 2026-05-06T19:16:43.317 | 2026-05-07T02:09:44.507 |
| fkie_cve-2026-3833 | A flaw was found in gnutls. This vulnerability occurs because gnutls performs case-sensitive compar… | 2026-04-30T18:16:30.577 | 2026-05-07T02:09:04.470 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-wwfp-w96m-c6x8 |
5.3 (3.1)
6.3 (4.0)
|
OpenClaw: Pairing pending-request caps were enforced per channel instead of per account | 2026-04-07T18:14:44Z | 2026-05-06T23:25:01Z |
| ghsa-qcc3-jqwp-5vh2 |
5.3 (3.1)
6.9 (4.0)
|
OpenClaw: LINE webhook handler lacks shared pre-auth concurrency budget before signature verification | 2026-04-02T21:01:08Z | 2026-05-06T23:24:58Z |
| ghsa-6336-qqw9-v6x6 |
5.4 (3.1)
2.3 (4.0)
|
OpenClaw: Discord Component Interaction Misclassifies Group DM as Direct Message | 2026-04-03T03:26:51Z | 2026-05-06T23:24:54Z |
| ghsa-2f7j-rp58-mr42 |
4.3 (3.1)
5.3 (4.0)
|
OpenClaw: Gateway hello snapshots exposed host config and state paths to non-admin clients | 2026-04-07T18:15:44Z | 2026-05-06T23:24:51Z |
| ghsa-7wq2-32h4-9hc9 |
8.0 (3.1)
|
AWS Advanced Go Wrapper: Privilege Escalation in Aurora PostgreSQL Instance | 2025-11-13T22:22:34Z | 2026-05-06T23:24:24Z |
| ghsa-cqmh-pcgr-q42f |
5.5 (3.1)
|
@axonflow/openclaw fix introduces plugin cache and credential-file permission hardening | 2026-05-06T23:23:25Z | 2026-05-06T23:23:25Z |
| ghsa-9w9c-9w8m-w89q |
6.5 (3.1)
|
ShellHub has cross-tenant IDOR in `GET /api/sessions/:uid` that discloses SSH session data | 2026-05-06T23:22:39Z | 2026-05-06T23:22:39Z |
| ghsa-89r3-6x4j-v7wf |
5.3 (3.1)
6.3 (4.0)
|
OpenClaw: Voice-call Plivo replay mutates in-process callback origin before replay rejection | 2026-04-02T20:57:02Z | 2026-05-06T23:22:29Z |
| ghsa-3qpv-xf3v-mm45 |
7.8 (3.1)
8.5 (4.0)
|
OpenClaw: Workspace `.env` can override the bundled hooks root and load attacker hook code | 2026-04-02T21:00:16Z | 2026-05-06T23:22:25Z |
| ghsa-hr8g-2q7x-3f4w |
6.9 (4.0)
|
OpenClaw Has a Gateway Control Interface Information Disclosure Vulnerability | 2026-04-03T03:02:37Z | 2026-05-06T23:22:21Z |
| ghsa-m866-6qv5-p2fg |
4.9 (3.1)
|
OpenClaw host-env blocklist missing `GIT_TEMPLATE_DIR` and `AWS_CONFIG_FILE` allows code execution … | 2026-03-31T23:57:00Z | 2026-05-06T23:22:17Z |
| ghsa-6p8r-6m93-557f |
3.7 (3.1)
6.3 (4.0)
|
OpenClaw: Fake DeviceToken Bypasses Shared Auth Rate Limiting | 2026-04-03T03:09:18Z | 2026-05-06T23:22:13Z |
| ghsa-j72x-xfwg-783f |
6.5 (3.1)
|
ShellHub has cross-tenant IDOR in `GET /api/devices/:uid` that discloses device data of any namespace | 2026-05-06T23:19:46Z | 2026-05-06T23:19:46Z |
| ghsa-248h-974q-xrc2 |
5.9 (3.1)
|
axonflow-sdk-java: Webhook signing-key (HMAC-SHA256) not exposed by SDK type, preventing signature … | 2026-05-06T23:16:58Z | 2026-05-06T23:16:58Z |
| ghsa-mph8-9v29-pm42 |
5.9 (3.1)
|
axonflow-sdk-typescript: Webhook signing-key (HMAC-SHA256) not exposed by SDK type, preventing sign… | 2026-05-06T23:16:24Z | 2026-05-06T23:16:24Z |
| ghsa-mhc4-qq83-fmrr |
5.9 (3.1)
|
axonflow-sdk-go: Webhook signing-key (HMAC-SHA256) not exposed by SDK type, preventing signature ve… | 2026-05-06T23:15:38Z | 2026-05-06T23:15:38Z |
| ghsa-7f4h-6264-89fr |
5.9 (3.1)
|
axonflow-sdk-python: Webhook signing-key (HMAC-SHA256) not exposed by SDK type, preventing signatur… | 2026-05-06T23:14:43Z | 2026-05-06T23:14:43Z |
| ghsa-9h64-2846-7x7f |
9.1 (3.1)
|
Axonflow fixed bugs by implementing multi-tenant isolation and access-control hardening | 2026-05-06T23:13:27Z | 2026-05-06T23:13:27Z |
| ghsa-3jmq-qhg3-f58j |
7.3 (3.1)
5.5 (4.0)
|
mcpo-simple-server has a Path Traversal issue | 2026-04-29T21:31:31Z | 2026-05-06T23:12:31Z |
| ghsa-j2rx-4jg9-79mw |
8.8 (3.1)
|
Cockpit Vulnerable to Unrestricted Upload of File with Dangerous Type | 2026-04-29T18:31:34Z | 2026-05-06T23:11:16Z |
| ghsa-rwm7-x88c-3g2p |
7.5 (3.1)
|
Netty epoll transport denial of service via RST on half-closed TCP connection | 2026-05-06T23:10:41Z | 2026-05-06T23:10:41Z |
| ghsa-mgx6-5cf9-rr43 |
7.1 (4.0)
|
Keras vulnerable to DoS via Malicious .keras Model (HDF5 Shape Bomb Causes Petabyte Allocation in K… | 2026-05-06T23:09:37Z | 2026-05-06T23:09:38Z |
| ghsa-xfhx-r7ww-5995 |
7.1 (4.0)
|
Duplicate Advisory: Google Keras Allocates Resources Without Limits or Throttling in the HDF5 weigh… | 2026-01-15T15:31:19Z | 2026-05-06T23:06:56Z |
| ghsa-2cwq-pwfr-wcw3 |
7.5 (3.1)
|
Nerdbank.MessagePack: Attacker-controlled stackalloc in DateTime decoding causes process-terminatin… | 2026-05-06T23:05:52Z | 2026-05-06T23:05:52Z |
| ghsa-p46p-7pmj-m34f |
6.5 (3.1)
|
Cockpit is vulnerable to directory traversal | 2026-04-29T18:31:34Z | 2026-05-06T23:05:00Z |
| ghsa-v3c2-39fm-jq4h |
5.4 (3.1)
5.3 (4.0)
|
Duplicate Advisory: OpenClaw: Gateway `operator.write` can reach admin-only persisted `verboseLevel… | 2026-04-24T00:31:51Z | 2026-05-06T23:04:42Z |
| ghsa-gv2f-q4wp-fvh5 |
7.3 (3.1)
7.4 (4.0)
|
Duplicate Advisory: OpenClaw: CLI Remote Onboarding Persists Unauthenticated Discovery Endpoint and… | 2026-04-24T00:31:51Z | 2026-05-06T23:04:24Z |
| ghsa-p7g9-rp3g-mgfg |
4.3 (3.1)
|
Backstage: Catalog unprocessed read endpoints allow authenticated cross-owner data access without p… | 2026-05-06T23:04:07Z | 2026-05-06T23:04:07Z |
| ghsa-w4rc-p66m-x6qq |
7.7 (4.0)
|
Grav Form Plugin has an Anonymous Page Content Overwrite via Form File Upload filename Override | 2026-05-06T23:03:13Z | 2026-05-06T23:03:13Z |
| ghsa-9phm-9p8f-hw5m |
5.3 (4.0)
|
Nitro has an Open Redirect via Protocol-Relative URL Bypass in Wildcard Route Rules | 2026-05-06T23:02:45Z | 2026-05-06T23:02:45Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43128 |
9.8 (3.1)
|
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backd… | democritus-utility | 2022-11-07T15:15:00Z | 2024-11-21T14:22:45.091449Z |
| pysec-2022-43127 |
9.8 (3.1)
|
The d8s-networking for python, as distributed on PyPI, included a potential code-executio… | democritus-user-agents | 2022-11-07T15:15:00Z | 2024-11-21T14:22:45.041198Z |
| pysec-2021-881 |
7.5 (3.1)
|
The FTL Server (tibftlserver) and Docker images containing tibftlserver components of TIB… | eftl | 2021-10-05T18:15:00Z | 2024-11-21T14:22:45.803448Z |
| pysec-2017-115 |
5.5 (3.1)
|
exiv2 0.26 contains a Stack out of bounds read in webp parser | exiv2 | 2017-11-17T22:29:00Z | 2024-11-21T14:22:45.992477Z |
| pysec-2015-36 |
|
Buffer overflow in the RiffVideo::infoTagsHandler function in riffvideo.cpp in Exiv2 0.24… | exiv2 | 2015-01-02T20:59:00Z | 2024-11-21T14:22:45.931449Z |
| pysec-2008-11 |
|
Exiv2 0.16 allows user-assisted remote attackers to cause a denial of service (divide-by-… | exiv2 | 2008-06-13T19:41:00Z | 2024-11-21T14:22:45.866207Z |
| pysec-2022-43126 |
9.8 (3.1)
|
The d8s-dates for python, as distributed on PyPI, included a potential code-execution bac… | democritus-timezones | 2022-11-07T15:15:00Z | 2024-11-21T14:22:44.991216Z |
| pysec-2022-43125 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.941258Z |
| pysec-2022-43124 |
9.8 (3.1)
|
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backd… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.889277Z |
| pysec-2022-43123 |
9.8 (3.1)
|
The d8s-netstrings for python, as distributed on PyPI, included a potential code-executio… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.834592Z |
| pysec-2022-43122 |
9.8 (3.1)
|
The d8s-grammars for python, as distributed on PyPI, included a potential code-execution … | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.785522Z |
| pysec-2022-43121 |
9.8 (3.1)
|
The d8s-math for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.735083Z |
| pysec-2022-43120 |
9.8 (3.1)
|
The d8s-json for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.684065Z |
| pysec-2022-43119 |
9.8 (3.1)
|
The d8s-archives for python, as distributed on PyPI, included a potential code-execution … | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.633699Z |
| pysec-2022-43118 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T14:15:00Z | 2024-11-21T14:22:44.584448Z |
| pysec-2022-43117 |
9.8 (3.1)
|
The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.53409Z |
| pysec-2022-43116 |
9.8 (3.1)
|
The d8s-utility for python, as distributed on PyPI, included a potential code-execution b… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.483759Z |
| pysec-2022-43115 |
9.8 (3.1)
|
The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execut… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.428296Z |
| pysec-2022-43114 |
9.8 (3.1)
|
The d8s-mpeg for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.376649Z |
| pysec-2022-43113 |
9.8 (3.1)
|
The d8s-domains for python, as distributed on PyPI, included a potential code-execution b… | democritus-networking | 2022-09-19T15:15:00Z | 2024-11-21T14:22:44.327837Z |
| pysec-2022-43112 |
9.8 (3.1)
|
The d8s-asns for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.27716Z |
| pysec-2022-43111 |
9.8 (3.1)
|
The d8s-html for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.226888Z |
| pysec-2022-43110 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T15:15:00Z | 2024-11-21T14:22:44.173987Z |
| pysec-2022-43109 |
9.8 (3.1)
|
The d8s-stats for python, as distributed on PyPI, included a potential code-execution bac… | democritus-math | 2022-11-07T15:15:00Z | 2024-11-21T14:22:44.122837Z |
| pysec-2022-43108 |
9.8 (3.1)
|
The d8s-networking for python, as distributed on PyPI, included a potential code-executio… | democritus-json | 2022-11-07T15:15:00Z | 2024-11-21T14:22:44.072231Z |
| pysec-2022-43107 |
9.8 (3.1)
|
The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execut… | democritus-hypothesis | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.021497Z |
| pysec-2022-43106 |
9.8 (3.1)
|
The d8s-dicts for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.965654Z |
| pysec-2022-43105 |
9.8 (3.1)
|
The d8s-dates for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.915613Z |
| pysec-2022-43104 |
9.8 (3.1)
|
The d8s-domains for python, as distributed on PyPI, included a potential code-execution b… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.865878Z |
| pysec-2022-43103 |
9.8 (3.1)
|
The d8s-uuids for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.817031Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33555 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.556591Z |
| gsd-2024-33554 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.667501Z |
| gsd-2024-33553 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.544840Z |
| gsd-2024-33552 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.667300Z |
| gsd-2024-33551 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.543061Z |
| gsd-2024-33550 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.534917Z |
| gsd-2024-33549 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.667701Z |
| gsd-2024-33548 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.564663Z |
| gsd-2024-33547 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.644934Z |
| gsd-2024-33546 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.560266Z |
| gsd-2024-33545 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.604410Z |
| gsd-2024-33544 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.631414Z |
| gsd-2024-33543 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.644262Z |
| gsd-2024-33542 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.688591Z |
| gsd-2024-33541 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.555650Z |
| gsd-2024-33540 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.562741Z |
| gsd-2024-33539 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.670372Z |
| gsd-2024-33538 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.588107Z |
| gsd-2024-33537 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.572272Z |
| gsd-2024-33536 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.665589Z |
| gsd-2024-33535 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.600803Z |
| gsd-2024-33534 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.522494Z |
| gsd-2024-33533 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.580672Z |
| gsd-2024-33532 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.683477Z |
| gsd-2024-33531 | cdbattags lua-resty-jwt 0.2.3 allows attackers to bypass all JWT-parsing signature checks… | 2024-04-25T05:02:10.682199Z |
| gsd-2024-33530 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.519432Z |
| gsd-2024-33529 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.547084Z |
| gsd-2024-33528 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.614150Z |
| gsd-2024-33527 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.684742Z |
| gsd-2024-33526 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.643822Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3026 | Malicious code in sagat-core (npm) | 2026-04-24T02:39:04Z | 2026-04-24T02:39:04Z |
| mal-2026-3014 | Malicious code in vime-azl (npm) | 2026-04-23T03:56:24Z | 2026-04-23T20:50:52Z |
| mal-2026-3013 | Malicious code in undicy-http (npm) | 2026-04-23T03:59:27Z | 2026-04-23T20:50:52Z |
| mal-2026-3012 | Malicious code in ts-moduler (npm) | 2026-04-23T03:49:53Z | 2026-04-23T20:50:52Z |
| mal-2026-3011 | Malicious code in ts-bing (npm) | 2026-04-23T03:56:24Z | 2026-04-23T20:50:52Z |
| mal-2026-3010 | Malicious code in separadordeinfocc (npm) | 2026-04-23T03:59:27Z | 2026-04-23T20:50:52Z |
| mal-2026-3009 | Malicious code in rollup-plugin-polyfill-route (npm) | 2026-04-23T03:54:10Z | 2026-04-23T20:50:52Z |
| mal-2026-2996 | Malicious code in sparkling-sdk (npm) | 2026-04-22T14:49:27Z | 2026-04-23T20:50:52Z |
| mal-2026-2979 | Malicious code in tsdoc-build-rig (npm) | 2026-04-22T05:55:56Z | 2026-04-23T20:50:52Z |
| mal-2026-2977 | Malicious code in ts-utils-dev (npm) | 2026-04-22T01:49:52Z | 2026-04-23T20:50:52Z |
| mal-2026-2950 | Malicious code in tailwind-text-fill (npm) | 2026-04-20T13:39:53Z | 2026-04-23T20:50:52Z |
| mal-2026-2944 | Malicious code in turbo-leven (npm) | 2026-04-20T06:15:42Z | 2026-04-23T20:50:52Z |
| mal-2026-2943 | Malicious code in turbo-he (npm) | 2026-04-20T06:15:42Z | 2026-04-23T20:50:52Z |
| mal-2026-2932 | Malicious code in sy-editor-v3 (npm) | 2026-04-19T08:46:05Z | 2026-04-23T20:50:52Z |
| mal-2026-2913 | Malicious code in vite-plugin-compress-plus (npm) | 2026-04-16T01:34:06Z | 2026-04-23T20:50:52Z |
| mal-2026-2912 | Malicious code in trgrip (npm) | 2026-04-15T23:43:20Z | 2026-04-23T20:50:52Z |
| mal-2026-2911 | Malicious code in terminal-formatter (npm) | 2026-04-16T00:44:26Z | 2026-04-23T20:50:52Z |
| mal-2026-2910 | Malicious code in tailwindthml-flips (npm) | 2026-04-15T23:43:20Z | 2026-04-23T20:50:52Z |
| mal-2026-2909 | Malicious code in tailwind-typography-cssstyle (npm) | 2026-04-15T23:43:20Z | 2026-04-23T20:50:52Z |
| mal-2026-2906 | Malicious code in swplayer-react-sl (npm) | 2026-04-15T23:21:12Z | 2026-04-23T20:50:52Z |
| mal-2026-2905 | Malicious code in simple-auth-basic (npm) | 2026-04-15T23:21:12Z | 2026-04-23T20:50:52Z |
| mal-2026-2904 | Malicious code in trackora-node (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:52Z |
| mal-2026-2903 | Malicious code in trackora-chain (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:52Z |
| mal-2026-2883 | Malicious code in ts-lint-builds (npm) | 2026-04-14T12:36:00Z | 2026-04-23T20:50:52Z |
| mal-2026-2878 | Malicious code in unisys-sdk (npm) | 2026-04-11T22:04:20Z | 2026-04-23T20:50:52Z |
| mal-2026-2877 | Malicious code in unisys-core (npm) | 2026-04-11T21:54:36Z | 2026-04-23T20:50:52Z |
| mal-2026-2876 | Malicious code in unisys-common (npm) | 2026-04-11T22:04:27Z | 2026-04-23T20:50:52Z |
| mal-2026-2875 | Malicious code in unisys-auth (npm) | 2026-04-11T21:54:27Z | 2026-04-23T20:50:52Z |
| mal-2026-2874 | Malicious code in unisys-agentic-ai-playground (npm) | 2026-04-11T21:54:25Z | 2026-04-23T20:50:52Z |
| mal-2026-2873 | Malicious code in ts-schema-helpers (npm) | 2026-04-12T01:01:13Z | 2026-04-23T20:50:52Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0210 | IBM DB2 Big SQL: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0121 | Drupal Module: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0090 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0019 | Red Hat Enterprise Linux (Quarkus): Mehrere Schwachstellen | 2026-01-06T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2812 | Mozilla Firefox: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2706 | Python: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-01T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2672 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-24T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2616 | libvirt: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-17T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2193 | QEMU: Schwachstelle ermöglicht Denial of Service | 2025-10-05T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2144 | binutils: Mehrere Schwachstellen | 2025-09-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2134 | Red Hat Enterprise Linux (Developer Hub): Schwachstelle ermöglicht Denial of Service | 2025-09-25T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2078 | Red Hat Enterprise Linux (Developer Hub): Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1948 | libxml2 (exsltDynMapFunction): Schwachstelle ermöglicht Denial of Service | 2025-09-02T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1928 | Linux UDisks Daemon: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1842 | PostgreSQL: Mehrere Schwachstellen | 2025-08-14T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1699 | Red Hat Enterprise Linux (requests): Schwachstelle ermöglicht das Ausspähen von Informationen | 2025-08-03T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1423 | libssh: Mehrere Schwachstellen | 2025-06-29T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1143 | Red Hat Enterprise Linux (python-tornado): Schwachstelle ermöglicht Denial of Service | 2025-05-25T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-0964 | Django: Schwachstelle ermöglicht Denial of Service | 2025-05-07T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-0353 | GNU Emacs: Schwachstelle ermöglicht Codeausführung | 2025-02-11T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2024-3558 | GNU Emacs und Red Hat Enterprise Linux: Schwachstelle ermöglicht Codeausführung | 2024-11-27T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2024-3542 | Red Hat OpenShift: Mehrere Schwachstellen | 2024-11-25T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2024-2067 | Golang Go: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-09-05T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2022-1538 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-09-26T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2022-0117 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-03-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2802 | Notepad++: Schwachstelle ermöglicht Codeausführung | 2025-12-09T23:00:00.000+00:00 | 2026-02-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0271 | Keycloak (Admin API): Schwachstelle ermöglicht Offenlegung von Informationen | 2026-02-01T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0230 | Mozilla Thunderbird: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-27T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0202 | Logback: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-22T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0179 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-254-09 | Schneider Electric Modicon M340, BMXNOE0100, and BMXNOE0110 | 2024-06-11T00:00:00.000000Z | 2025-08-12T04:00:00.000000Z |
| icsa-25-240-03 | Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit | 2025-08-12T04:00:00.000000Z | 2025-08-12T04:00:00.000000Z |
| icsa-25-238-03 | Schneider Electric Modicon M340 Controller and Communication Modules | 2025-08-12T04:00:00.000000Z | 2025-08-12T04:00:00.000000Z |
| icsa-25-035-06 | Schneider Electric Modicon M340 and BMXNOE0100/0110, BMXNOR0200H | 2025-01-14T00:00:00.000000Z | 2025-08-12T04:00:00.000000Z |
| icsa-25-266-17 | Siemens SINEC Traffic Analyzer | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-21 | Siemens BFCClient | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-20 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-19 | Siemens SINUMERIK | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-17 | Siemens SINEC Traffic Analyzer | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-16 | Siemens SICAM Q100/Q200 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-14 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-13 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-12 | Siemens SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-10 | Siemens SIPROTEC 5 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-08 | Siemens RUGGEDCOM CROSSBOW Station Access Controller | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-06 | Siemens Opcenter Quality | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-04 | Siemens Simcenter Femap | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-02 | Siemens COMOS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-01 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-191-05 | Siemens TIA Project-Server and TIA Portal | 2025-07-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-135-07 | Siemens SIMATIC IPC RS-828A | 2025-05-13T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-044-05 | Siemens SIPROTEC 5 Devices | 2025-02-11T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-347-05 | Siemens Siemens Engineering Platforms | 2024-12-10T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-319-12 | Siemens Mendix Runtime | 2024-11-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-256-05 | Siemens Mendix Runtime | 2024-09-10T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-193-06 | Siemens RUGGEDCOM | 2024-07-09T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-074-08 | Siemens SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-23-348-10 | Siemens SIMATIC S7-1500 | 2023-12-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-23-222-12 | Siemens RUGGEDCOM ROS | 2023-08-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-23-222-08 | Siemens RUGGEDCOM ROS Devices | 2023-08-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ise-injection-6kn9tSxm | Cisco Identity Services Engine Command Injection Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-expressway-auth-kdfrcz2j | Cisco Expressway Edge Improper Authorization Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-expressway-auth-kdFrcZ2j | Cisco Expressway Edge Improper Authorization Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-duo-epic-info-sdlv6h8y | Cisco Duo Epic for Hyperdrive Information Disclosure Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-duo-epic-info-sdLv6h8y | Cisco Duo Epic for Hyperdrive Information Disclosure Vulnerability | 2024-09-04T16:00:00+00:00 | 2024-09-04T16:00:00+00:00 |
| cisco-sa-cslu-7gHMzWmw | Cisco Smart Licensing Utility Vulnerabilities | 2024-09-04T16:00:00+00:00 | 2025-04-04T17:44:00+00:00 |
| cisco-sa-radius-spoofing-july-2024-87ccdwz3 | RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024 | 2024-07-10T16:00:00+00:00 | 2024-09-03T14:10:25+00:00 |
| cisco-sa-radius-spoofing-july-2024-87cCDwZ3 | RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024 | 2024-07-10T16:00:00+00:00 | 2024-09-03T14:10:25+00:00 |
| cisco-sa-multi-vuln-finesse-qp6gbuo2 | Multiple Cisco Products OpenSocial Gadget Editor Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2024-09-03T13:04:54+00:00 |
| cisco-sa-multi-vuln-finesse-qp6gbUO2 | Multiple Cisco Products OpenSocial Gadget Editor Vulnerabilities | 2021-01-13T16:00:00+00:00 | 2024-09-03T13:04:54+00:00 |
| cisco-sa-nxos-psbe-ce-yvbtn5du | Cisco NX-OS Software Python Sandbox Escape Vulnerabilities | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-psbe-ce-YvbTn5du | Cisco NX-OS Software Python Sandbox Escape Vulnerabilities | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-dhcp6-relay-dos-zneaa6xn | Cisco NX-OS Software DHCPv6 Relay Agent Denial of Service Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-dhcp6-relay-dos-znEAA6xn | Cisco NX-OS Software DHCPv6 Relay Agent Denial of Service Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-lq6jszhh | Cisco NX-OS Software Command Injection Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-Lq6jsZhH | Cisco NX-OS Software Command Injection Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-bshacepe-bapehsx7 | Cisco NX-OS Software Bash Arbitrary Code Execution and Privilege Escalation Vulnerabilities | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-nxos-bshacepe-bApeHSx7 | Cisco NX-OS Software Bash Arbitrary Code Execution and Privilege Escalation Vulnerabilities | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-capic-priv-esc-uyqjjnuu | Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-capic-priv-esc-uYQJjnuU | Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-apic-cousmo-ubpbygbq | Cisco Application Policy Infrastructure Controller Unauthorized Policy Actions Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-apic-cousmo-uBpBYGbq | Cisco Application Policy Infrastructure Controller Unauthorized Policy Actions Vulnerability | 2024-08-28T16:00:00+00:00 | 2024-08-28T16:00:00+00:00 |
| cisco-sa-curl-libcurl-d9ds39cv | cURL and libcurl Vulnerability Affecting Cisco Products: October 2023 | 2023-10-12T16:00:00+00:00 | 2024-08-27T18:06:16+00:00 |
| cisco-sa-curl-libcurl-D9ds39cV | cURL and libcurl Vulnerability Affecting Cisco Products: October 2023 | 2023-10-12T16:00:00+00:00 | 2024-08-27T18:06:16+00:00 |
| cisco-sa-ise-rest-5bpkrntz | Cisco Identity Services Engine REST API Blind SQL Injection Vulnerabilities | 2024-08-21T16:00:00+00:00 | 2024-08-22T15:15:53+00:00 |
| cisco-sa-ise-rest-5bPKrNtZ | Cisco Identity Services Engine REST API Blind SQL Injection Vulnerabilities | 2024-08-21T16:00:00+00:00 | 2024-08-22T15:15:53+00:00 |
| cisco-sa-ise-csrf-y4zuz5rj | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-08-21T16:00:00+00:00 |
| cisco-sa-ise-csrf-y4ZUz5Rj | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-08-21T16:00:00+00:00 |
| cisco-sa-cucm-dos-kkhq43we | Cisco Unified Communications Manager Denial of Service Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-08-21T16:00:00+00:00 |
| cisco-sa-cucm-dos-kkHq43We | Cisco Unified Communications Manager Denial of Service Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-08-21T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31668 | seg6: separate dst_cache for input and output paths in seg6 lwtunnel | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:51.000Z |
| msrc_cve-2026-31657 | batman-adv: hold claim backbone gateways by reference | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:44.000Z |
| msrc_cve-2026-31662 | tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:37.000Z |
| msrc_cve-2026-31587 | ASoC: qcom: q6apm: move component registration to unmanaged version | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:31.000Z |
| msrc_cve-2026-31612 | ksmbd: validate EaNameLength in smb2_get_ea() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:24.000Z |
| msrc_cve-2026-31623 | net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:17.000Z |
| msrc_cve-2026-31594 | PCI: endpoint: pci-epf-vntb: Remove duplicate resource teardown | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:10.000Z |
| msrc_cve-2026-31671 | xfrm_user: fix info leak in build_report() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:42:03.000Z |
| msrc_cve-2026-31627 | i2c: s3c24xx: check the size of the SMBUS message before using it | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:56.000Z |
| msrc_cve-2026-31642 | rxrpc: Fix call removal to use RCU safe deletion | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:49.000Z |
| msrc_cve-2026-31611 | ksmbd: require 3 sub-authorities before reading sub_auth[2] | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:43.000Z |
| msrc_cve-2026-31603 | staging: sm750fb: fix division by zero in ps_to_hz() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:36.000Z |
| msrc_cve-2026-31670 | net: rfkill: prevent unlimited numbers of rfkill events from being created | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:29.000Z |
| msrc_cve-2026-31610 | ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:16.000Z |
| msrc_cve-2026-31615 | usb: gadget: renesas_usb3: validate endpoint index in standard request handlers | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:09.000Z |
| msrc_cve-2026-31665 | netfilter: nft_ct: fix use-after-free in timeout object destroy | 2026-04-02T00:00:00.000Z | 2026-05-01T14:41:02.000Z |
| msrc_cve-2026-31577 | nilfs2: fix NULL i_assoc_inode dereference in nilfs_mdt_save_to_shadow_map | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:56.000Z |
| msrc_cve-2026-31626 | staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:49.000Z |
| msrc_cve-2026-31672 | wifi: rt2x00usb: fix devres lifetime | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:42.000Z |
| msrc_cve-2026-31651 | mmc: vub300: fix NULL-deref on disconnect | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:35.000Z |
| msrc_cve-2026-31624 | HID: core: clamp report_size in s32ton() to avoid undefined shift | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:29.000Z |
| msrc_cve-2026-31637 | rxrpc: reject undecryptable rxkad response tickets | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:22.000Z |
| msrc_cve-2026-31605 | fbdev: udlfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:07.000Z |
| msrc_cve-2026-31596 | ocfs2: handle invalid dinode in ocfs2_group_extend | 2026-04-02T00:00:00.000Z | 2026-05-01T14:40:00.000Z |
| msrc_cve-2026-31660 | nfc: pn533: allocate rx skb before consuming bytes | 2026-04-02T00:00:00.000Z | 2026-05-01T14:39:53.000Z |
| msrc_cve-2026-31638 | rxrpc: Only put the call ref if one was acquired | 2026-04-02T00:00:00.000Z | 2026-05-01T14:39:46.000Z |
| msrc_cve-2026-31583 | media: em28xx: fix use-after-free in em28xx_v4l2_open() | 2026-04-02T00:00:00.000Z | 2026-05-01T14:39:39.000Z |
| msrc_cve-2026-31618 | fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO | 2026-04-02T00:00:00.000Z | 2026-05-01T14:39:32.000Z |
| msrc_cve-2026-31590 | KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGION | 2026-04-02T00:00:00.000Z | 2026-05-01T14:39:26.000Z |
| msrc_cve-2026-31667 | Input: uinput - fix circular locking dependency with ff-core | 2026-04-02T00:00:00.000Z | 2026-05-01T14:39:19.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0053 | Kwetsbaarheden verholpen in Fortinet FortiSwitch, FortiManager, FortiAnalyzer, FortiOS en FortiProxy | 2025-02-12T12:39:02.366846Z | 2025-02-18T08:09:48.619964Z |
| ncsc-2025-0004 | Kwetsbaarheden verholpen in SonicWall SonicOS | 2025-01-08T09:57:24.409437Z | 2025-02-18T08:09:28.652034Z |
| ncsc-2025-0061 | Kwetsbaarheden verholpen in Siemens producten | 2025-02-14T08:46:28.240775Z | 2025-02-14T08:46:28.240775Z |
| ncsc-2025-0060 | Kwetsbaarheid verholpen in Veeam | 2025-02-13T09:48:03.729080Z | 2025-02-13T09:48:03.729080Z |
| ncsc-2025-0059 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2025-02-13T09:29:35.625977Z | 2025-02-13T09:29:35.625977Z |
| ncsc-2025-0057 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-02-13T09:09:26.087113Z | 2025-02-13T09:09:26.087113Z |
| ncsc-2025-0056 | Kwetsbaarheden verholpen in Schneider Electric ASCO | 2025-02-13T09:07:55.191514Z | 2025-02-13T09:07:55.191514Z |
| ncsc-2025-0055 | Kwetsbaarheid verholpen in CrowdStrike Falcon sensor | 2025-02-13T08:22:07.880125Z | 2025-02-13T08:22:07.880125Z |
| ncsc-2025-0054 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2025-02-13T06:46:08.560650Z | 2025-02-13T06:46:08.560650Z |
| ncsc-2025-0052 | Kwetsbaarheden verholpen in Ivanti Connect Secure en Ivanti Policy Secure | 2025-02-12T09:35:30.260596Z | 2025-02-12T09:35:30.260596Z |
| ncsc-2025-0051 | Kwetsbaarheden verholpen in Siemens producten | 2025-02-11T19:40:34.993264Z | 2025-02-11T19:40:34.993264Z |
| ncsc-2025-0050 | Kwetsbaarheden verholpen in Microsoft Office | 2025-02-11T19:19:24.863294Z | 2025-02-11T19:19:24.863294Z |
| ncsc-2025-0049 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-02-11T19:17:58.768578Z | 2025-02-11T19:17:58.768578Z |
| ncsc-2025-0048 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-02-11T19:17:03.555400Z | 2025-02-11T19:17:03.555400Z |
| ncsc-2025-0047 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-02-11T19:16:04.610648Z | 2025-02-11T19:16:04.610648Z |
| ncsc-2025-0046 | Kwetsbaarheid verholpen in Apple iOS en iPadOS | 2025-02-11T09:54:03.266145Z | 2025-02-11T09:54:03.266145Z |
| ncsc-2025-0045 | Kwetsbaarheden verholpen in SAP producten | 2025-02-11T09:08:48.427126Z | 2025-02-11T09:08:48.427126Z |
| ncsc-2025-0043 | Kwetsbaarheden verholpen in Cisco IOS, IOS XE en IOS XR Software | 2025-02-07T07:44:34.306225Z | 2025-02-11T06:53:00.177478Z |
| ncsc-2025-0041 | Kwetsbaarheden verholpen in F5 BIG-IP | 2025-02-07T07:38:11.981975Z | 2025-02-11T06:51:17.629249Z |
| ncsc-2025-0044 | Kwetsbaarheden verholpen in Cisco Identity Services Engine | 2025-02-07T07:50:13.796001Z | 2025-02-07T07:50:13.796001Z |
| ncsc-2025-0042 | Kwetsbaarheden verholpen in Cisco AsyncOS Software | 2025-02-07T07:41:10.612134Z | 2025-02-07T07:41:10.612134Z |
| ncsc-2025-0040 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-02-07T07:33:40.643635Z | 2025-02-07T07:33:40.643635Z |
| ncsc-2025-0039 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-02-04T09:13:08.342699Z | 2025-02-04T09:13:08.342699Z |
| ncsc-2025-0038 | Kwetsbaarheden verholpen in Zimbra Collaboration | 2025-02-04T09:10:55.525420Z | 2025-02-04T09:10:55.525420Z |
| ncsc-2025-0037 | Kwetsbaarheden verholpen in VMware Aria Operations | 2025-01-31T12:25:21.454904Z | 2025-01-31T12:25:21.454904Z |
| ncsc-2025-0036 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-01-29T10:35:51.164484Z | 2025-01-29T10:35:51.164484Z |
| ncsc-2025-0035 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-01-29T10:32:40.594073Z | 2025-01-29T10:32:40.594073Z |
| ncsc-2025-0034 | Kwetsbaarheden verholpen in Apple iPadOS en iOS | 2025-01-28T11:31:14.861619Z | 2025-01-28T11:31:14.861619Z |
| ncsc-2025-0033 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2025-01-28T10:43:20.128933Z | 2025-01-28T10:43:20.128933Z |
| ncsc-2025-0009 | Kwetsbaarheid verholpen in FortiNet FortiOS en FortiProxy | 2025-01-14T14:58:02.272504Z | 2025-01-28T10:42:03.747650Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10287-1 | sdbootutil-1+git20260303.90d816d-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10286-1 | ruby4.0-rubygem-rack-2.2-2.2.22-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10285-1 | python311-pillow-heif-1.3.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10284-1 | python311-PyPDF2-2.11.1-5.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10283-1 | python313-Django6-6.0.3-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10282-1 | python311-Django4-4.2.29-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10281-1 | mchange-commons-0.4.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10280-1 | incus-6.22-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10279-1 | c3p0-0.12.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10278-1 | ImageMagick-7.1.2.15-2.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:20308-1 | Security update for go1.24-openssl | 2026-03-03T17:46:58Z | 2026-03-03T17:46:58Z |
| opensuse-su-2026:20306-1 | Security update for expat | 2026-03-03T16:13:34Z | 2026-03-03T16:13:34Z |
| opensuse-su-2026:20305-1 | Security update for podman | 2026-03-03T16:13:34Z | 2026-03-03T16:13:34Z |
| opensuse-su-2026:20318-1 | Security update for gitea-tea | 2026-03-03T14:44:11Z | 2026-03-03T14:44:11Z |
| opensuse-su-2026:20301-1 | Security update for go1.25-openssl | 2026-03-03T09:04:46Z | 2026-03-03T09:04:46Z |
| opensuse-su-2026:20298-1 | Security update for assertj-core | 2026-03-02T16:00:38Z | 2026-03-02T16:00:38Z |
| opensuse-su-2026:20297-1 | Security update for rhino | 2026-03-02T16:00:37Z | 2026-03-02T16:00:37Z |
| opensuse-su-2026:20295-1 | Security update for cpp-httplib | 2026-03-02T10:20:20Z | 2026-03-02T10:20:20Z |
| opensuse-su-2026:10277-1 | python311-pypdf-6.7.5-1.1 on GA media | 2026-03-02T00:00:00Z | 2026-03-02T00:00:00Z |
| opensuse-su-2026:20292-1 | Security update for python-azure-core | 2026-03-01T15:59:49Z | 2026-03-01T15:59:49Z |
| opensuse-su-2026:10276-1 | libsoup-3_0-0-3.6.6-2.1 on GA media | 2026-03-01T00:00:00Z | 2026-03-01T00:00:00Z |
| opensuse-su-2026:10275-1 | gvfs-1.58.2-1.1 on GA media | 2026-03-01T00:00:00Z | 2026-03-01T00:00:00Z |
| opensuse-su-2026:20291-1 | Security update for fluidsynth | 2026-02-27T13:36:22Z | 2026-02-27T13:36:22Z |
| opensuse-su-2026:20290-1 | Security update for haproxy | 2026-02-27T13:15:21Z | 2026-02-27T13:15:21Z |
| opensuse-su-2026:20287-1 | Security update for the Linux Kernel | 2026-02-27T13:03:55Z | 2026-02-27T13:03:55Z |
| opensuse-su-2026:20283-1 | Security update for libsoup2 | 2026-02-27T08:52:33Z | 2026-02-27T08:52:33Z |
| opensuse-su-2026:20281-1 | Security update for kubevirt | 2026-02-27T08:51:11Z | 2026-02-27T08:51:11Z |
| opensuse-su-2026:10274-1 | libwireshark19-4.6.4-1.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10273-1 | libudisks2-0-2.11.0-2.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| opensuse-su-2026:10272-1 | libIex-3_4-33-3.4.5-1.1 on GA media | 2026-02-27T00:00:00Z | 2026-02-27T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:8052 | Red Hat Security Advisory: firefox security update | 2026-04-14T11:50:27+00:00 | 2026-05-07T21:41:53+00:00 |
| rhsa-2026:7992 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-04-14T06:48:01+00:00 | 2026-05-07T21:41:53+00:00 |
| rhsa-2026:7877 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-04-13T16:31:14+00:00 | 2026-05-07T21:41:53+00:00 |
| rhsa-2026:7669 | Red Hat Security Advisory: rhc security update | 2026-04-13T02:01:06+00:00 | 2026-05-07T21:41:52+00:00 |
| rhsa-2026:7883 | Red Hat Security Advisory: golang security update | 2026-04-13T17:44:19+00:00 | 2026-05-07T21:41:51+00:00 |
| rhsa-2026:7879 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-04-13T16:26:59+00:00 | 2026-05-07T21:41:51+00:00 |
| rhsa-2026:7878 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-04-13T16:21:54+00:00 | 2026-05-07T21:41:51+00:00 |
| rhsa-2026:7672 | Red Hat Security Advisory: firefox security update | 2026-04-13T02:23:37+00:00 | 2026-05-07T21:41:51+00:00 |
| rhsa-2026:7671 | Red Hat Security Advisory: firefox security update | 2026-04-13T02:29:51+00:00 | 2026-05-07T21:41:51+00:00 |
| rhsa-2026:7328 | Red Hat Security Advisory: rhc security update | 2026-04-09T15:29:16+00:00 | 2026-05-07T21:41:51+00:00 |
| rhsa-2026:7834 | Red Hat Security Advisory: golang security update | 2026-04-13T10:25:23+00:00 | 2026-05-07T21:41:50+00:00 |
| rhsa-2026:7674 | Red Hat Security Advisory: rhc security update | 2026-04-13T02:53:32+00:00 | 2026-05-07T21:41:50+00:00 |
| rhsa-2026:13512 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2026-05-04T14:31:09+00:00 | 2026-05-07T21:41:50+00:00 |
| rhsa-2026:13508 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Product Security and Bug Fix Update | 2026-05-04T14:10:09+00:00 | 2026-05-07T21:41:50+00:00 |
| rhsa-2026:7011 | Red Hat Security Advisory: grafana security update | 2026-04-08T13:36:08+00:00 | 2026-05-07T21:41:49+00:00 |
| rhsa-2026:9135 | Red Hat Security Advisory: kernel-rt security update | 2026-04-20T21:03:12+00:00 | 2026-05-07T21:41:48+00:00 |
| rhsa-2026:9131 | Red Hat Security Advisory: kernel security update | 2026-04-20T21:18:37+00:00 | 2026-05-07T21:41:48+00:00 |
| rhsa-2026:7315 | Red Hat Security Advisory: rhc security update | 2026-04-09T14:48:57+00:00 | 2026-05-07T21:41:48+00:00 |
| rhsa-2026:7009 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-08T13:35:28+00:00 | 2026-05-07T21:41:48+00:00 |
| rhsa-2026:7002 | Red Hat Security Advisory: nginx security update | 2026-04-08T08:11:46+00:00 | 2026-05-07T21:41:48+00:00 |
| rhsa-2026:6949 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-04-08T00:41:20+00:00 | 2026-05-07T21:41:48+00:00 |
| rhsa-2026:10108 | Red Hat Security Advisory: kernel security update | 2026-04-23T23:21:04+00:00 | 2026-05-07T21:41:48+00:00 |
| rhsa-2026:7343 | Red Hat Security Advisory: nginx:1.26 security update | 2026-04-09T19:00:58+00:00 | 2026-05-07T21:41:47+00:00 |
| rhsa-2026:7107 | Red Hat Security Advisory: openssh security update | 2026-04-08T16:43:28+00:00 | 2026-05-07T21:41:46+00:00 |
| rhsa-2026:6907 | Red Hat Security Advisory: nginx:1.24 security update | 2026-04-07T20:50:40+00:00 | 2026-05-07T21:41:46+00:00 |
| rhsa-2026:6906 | Red Hat Security Advisory: nginx security update | 2026-04-07T18:43:59+00:00 | 2026-05-07T21:41:46+00:00 |
| rhsa-2026:6388 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-01T14:40:49+00:00 | 2026-05-07T21:41:46+00:00 |
| rhsa-2026:6383 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-01T14:59:14+00:00 | 2026-05-07T21:41:46+00:00 |
| rhsa-2026:6382 | Red Hat Security Advisory: grafana security update | 2026-04-01T14:57:19+00:00 | 2026-05-07T21:41:46+00:00 |
| rhsa-2026:6344 | Red Hat Security Advisory: grafana security update | 2026-04-01T11:23:28+00:00 | 2026-05-07T21:41:46+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-017796 | SSA-017796: Multiple File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-806742 | SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-797296 | SSA-797296: XT File Parsing Vulnerability in Parasolid | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-647068 | SSA-647068: Ripple20 in SIMATIC RTLS Gateways | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-602936 | SSA-602936: Multiple Vulnerabilities in SCALANCE SC-600 Family before V3.1 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-580228 | SSA-580228: Use of Hard-Coded Credentials Vulnerability in Location Intelligence before V4.3 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-543502 | SSA-543502: Local Privilege Escalation Vulnerability in Unicam FX | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-516818 | SSA-516818: TCP Sequence Number Validation Vulnerability in the TCP/IP Stack of CP343-1 Devices | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-434032 | SSA-434032: Input Validation Vulnerability in the DHCP Client of Nucleus RTOS | 2019-11-12T00:00:00Z | 2025-03-11T00:00:00Z |
| SSA-309571 | SSA-309571: IPU 2021.1 Vulnerabilities in Siemens Industrial Products using Intel CPUs (June 2021) | 2021-08-10T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-248289 | SSA-248289: Denial of Service Vulnerabilities in the IPv6 Stack of Nucleus RTOS | 2021-04-13T00:00:00Z | 2025-03-11T00:00:00Z |
| SSA-108696 | SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-017796 | SSA-017796: Multiple File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-844761 | SSA-844761: Multiple Vulnerabilities in SiNVR/SiVMS Video Server | 2020-03-10T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-794653 | SSA-794653: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-786191 | SSA-786191: Local Privilege Escalation Vulnerability in Spectrum Power 7 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-777015 | SSA-777015: Multiple Vulnerabilities in SIMATIC CN 4100 before V2.7 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-772220 | SSA-772220: OpenSSL Vulnerabilities in Industrial Products | 2021-07-13T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-761844 | SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) | 2021-04-13T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-761617 | SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server | 2019-12-10T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-702935 | SSA-702935: Redfish Server Vulnerability in maxView Storage Manager | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-589891 | SSA-589891: Multiple PAR File Parsing Vulnerabilities in Solid Edge | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-583634 | SSA-583634: Command Injection Vulnerability in the CPCI85 Firmware of SICAM A8000 Devices | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-570294 | SSA-570294: Multiple Vulnerabilities in SICAM Q100 Before V2.50 | 2022-11-08T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-480095 | SSA-480095: Vulnerabilities in the Web Interface of SICAM Q100 Devices before V2.60 | 2023-12-12T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-844761 | SSA-844761: Multiple Vulnerabilities in SiNVR/SiVMS Video Server | 2020-03-10T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-794653 | SSA-794653: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-786191 | SSA-786191: Local Privilege Escalation Vulnerability in Spectrum Power 7 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-777015 | SSA-777015: Multiple Vulnerabilities in SIMATIC CN 4100 before V2.7 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-772220 | SSA-772220: OpenSSL Vulnerabilities in Industrial Products | 2021-07-13T00:00:00Z | 2024-01-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1325-1 | Security update for clamav | 2026-04-14T13:15:45Z | 2026-04-14T13:15:45Z |
| suse-su-2026:1324-1 | Security update for clamav | 2026-04-14T13:15:31Z | 2026-04-14T13:15:31Z |
| suse-su-2026:1323-1 | Security update for libpng16 | 2026-04-14T13:11:55Z | 2026-04-14T13:11:55Z |
| suse-su-2026:1322-1 | Security update for MozillaFirefox | 2026-04-14T12:42:11Z | 2026-04-14T12:42:11Z |
| suse-su-2026:1321-1 | Security update for go1.25 | 2026-04-14T12:40:53Z | 2026-04-14T12:40:53Z |
| suse-su-2026:1320-1 | Security update for go1.26 | 2026-04-14T12:39:43Z | 2026-04-14T12:39:43Z |
| suse-su-2026:21191-1 | Security update for cockpit-subscriptions | 2026-04-14T12:16:29Z | 2026-04-14T12:16:29Z |
| suse-su-2026:21111-1 | Security update for cockpit-subscriptions | 2026-04-14T12:16:29Z | 2026-04-14T12:16:29Z |
| suse-su-2026:1314-1 | Security update for ignition | 2026-04-14T11:07:12Z | 2026-04-14T11:07:12Z |
| suse-su-2026:1313-1 | Security update for freerdp2 | 2026-04-14T10:47:31Z | 2026-04-14T10:47:31Z |
| suse-su-2026:1312-1 | Security update for bind | 2026-04-14T10:46:32Z | 2026-04-14T10:46:32Z |
| suse-su-2026:1311-1 | Security update for libpng16 | 2026-04-14T10:44:51Z | 2026-04-14T10:44:51Z |
| suse-su-2026:1310-1 | Security update for libssh | 2026-04-14T10:42:14Z | 2026-04-14T10:42:14Z |
| suse-su-2026:1309-1 | Security update for sudo | 2026-04-14T10:39:38Z | 2026-04-14T10:39:38Z |
| suse-su-2026:1308-1 | Security update for sudo | 2026-04-14T10:38:01Z | 2026-04-14T10:38:01Z |
| suse-su-2026:1307-1 | Security update for strongswan | 2026-04-14T10:35:42Z | 2026-04-14T10:35:42Z |
| suse-su-2026:21118-1 | Security update for vim | 2026-04-14T08:33:54Z | 2026-04-14T08:33:54Z |
| suse-su-2026:21117-1 | Security update for avahi | 2026-04-14T08:31:12Z | 2026-04-14T08:31:12Z |
| suse-su-2026:21116-1 | Security update for python-cryptography | 2026-04-14T08:30:04Z | 2026-04-14T08:30:04Z |
| suse-su-2026:21115-1 | Security update for ignition | 2026-04-14T08:29:25Z | 2026-04-14T08:29:25Z |
| suse-su-2026:21127-1 | Security update for avahi | 2026-04-14T08:01:54Z | 2026-04-14T08:01:54Z |
| suse-su-2026:21128-1 | Security update for ignition | 2026-04-14T08:01:00Z | 2026-04-14T08:01:00Z |
| suse-su-2026:21126-1 | Security update for python-cryptography | 2026-04-14T07:57:50Z | 2026-04-14T07:57:50Z |
| suse-su-2026:21124-1 | Security update for vim | 2026-04-14T07:55:35Z | 2026-04-14T07:55:35Z |
| suse-su-2026:1305-1 | Security update for the Linux Kernel (Live Patch 76 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T18:34:02Z | 2026-04-13T18:34:02Z |
| suse-su-2026:21123-1 | Security update for the Linux Kernel | 2026-04-13T18:28:29Z | 2026-04-13T18:28:29Z |
| suse-su-2026:21114-1 | Security update for the Linux Kernel | 2026-04-13T17:04:49Z | 2026-04-13T17:04:49Z |
| suse-su-2026:21122-1 | Security update for kernel-livepatch-MICRO-6-0_Update_18 | 2026-04-13T16:42:46Z | 2026-04-13T16:42:46Z |
| suse-su-2026:21120-1 | Security update for kernel-livepatch-MICRO-6-0_Update_18 | 2026-04-13T16:42:46Z | 2026-04-13T16:42:46Z |
| suse-su-2026:1304-1 | Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T16:04:42Z | 2026-04-13T16:04:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:0753 | Important: container-tools:rhel8 security update | 2026-01-19T00:00:00Z | 2026-01-21T09:07:00Z |
| alsa-2026:0752 | Important: jmc security update | 2026-01-19T00:00:00Z | 2026-01-20T11:59:21Z |
| alsa-2026:0771 | Important: gpsd-minimal security update | 2026-01-19T00:00:00Z | 2026-01-20T11:54:05Z |
| alsa-2026:0760 | Important: kernel-rt security update | 2026-01-19T00:00:00Z | 2026-01-20T08:13:58Z |
| alsa-2026:0759 | Important: kernel security update | 2026-01-19T00:00:00Z | 2026-01-20T08:07:16Z |
| alsa-2026:0750 | Important: net-snmp security update | 2026-01-19T00:00:00Z | 2026-01-20T07:38:35Z |
| alsa-2026:0756 | Moderate: transfig security update | 2026-01-19T00:00:00Z | 2026-01-19T10:24:15Z |
| alsa-2026:0492 | Moderate: postgresql:15 security update | 2026-01-13T00:00:00Z | 2026-01-19T10:02:02Z |
| alsa-2026:0493 | Moderate: postgresql:16 security update | 2026-01-13T00:00:00Z | 2026-01-19T09:45:22Z |
| alsa-2026:0436 | Important: buildah security update | 2026-01-12T00:00:00Z | 2026-01-16T15:50:15Z |
| alsa-2026:0423 | Important: libsoup3 security update | 2026-01-12T00:00:00Z | 2026-01-16T15:49:08Z |
| alsa-2026:0422 | Important: libsoup security update | 2026-01-12T00:00:00Z | 2026-01-16T15:46:52Z |
| alsa-2026:0421 | Important: libsoup security update | 2026-01-12T00:00:00Z | 2026-01-16T15:44:34Z |
| alsa-2026:0337 | Moderate: openssl security update | 2026-01-08T00:00:00Z | 2026-01-16T15:42:22Z |
| alsa-2026:0312 | Moderate: cups security update | 2026-01-08T00:00:00Z | 2026-01-16T15:40:37Z |
| alsa-2026:0437 | Important: buildah security update | 2026-01-12T00:00:00Z | 2026-01-16T15:38:30Z |
| alsa-2026:0443 | Important: kernel-rt security update | 2026-01-12T00:00:00Z | 2026-01-16T15:37:02Z |
| alsa-2026:0444 | Important: kernel security update | 2026-01-12T00:00:00Z | 2026-01-16T15:34:47Z |
| alsa-2026:0445 | Moderate: kernel security update | 2026-01-12T00:00:00Z | 2026-01-16T15:31:40Z |
| alsa-2026:0453 | Important: kernel security update | 2026-01-12T00:00:00Z | 2026-01-16T15:27:10Z |
| alsa-2026:0458 | Moderate: libpq security update | 2026-01-12T00:00:00Z | 2026-01-16T15:21:50Z |
| alsa-2026:0464 | Moderate: cups security update | 2026-01-12T00:00:00Z | 2026-01-16T15:20:45Z |
| alsa-2026:0470 | Important: podman security update | 2026-01-12T00:00:00Z | 2026-01-16T15:18:30Z |
| alsa-2026:0491 | Moderate: postgresql security update | 2026-01-13T00:00:00Z | 2026-01-16T15:16:39Z |
| alsa-2026:0519 | Moderate: postgresql:16 security update | 2026-01-13T00:00:00Z | 2026-01-16T15:14:12Z |
| alsa-2026:0523 | Moderate: postgresql:13 security update | 2026-01-13T00:00:00Z | 2026-01-16T15:11:39Z |
| alsa-2026:0524 | Moderate: postgresql:15 security update | 2026-01-13T00:00:00Z | 2026-01-16T15:09:07Z |
| alsa-2026:0525 | Moderate: postgresql16 security update | 2026-01-13T00:00:00Z | 2026-01-16T15:06:52Z |
| alsa-2026:0545 | Important: podman security update | 2026-01-14T00:00:00Z | 2026-01-16T15:04:20Z |
| alsa-2026:0594 | Moderate: libpq security update | 2026-01-14T00:00:00Z | 2026-01-16T15:02:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-801 | UNKNOWN READ in PointerVector.h | 2024-08-16T00:02:10.140304Z | 2025-04-16T14:27:34.855775Z |
| osv-2025-271 | Use-of-uninitialized-value in luaS_new | 2025-04-11T00:04:20.869490Z | 2025-04-11T00:04:20.869967Z |
| osv-2024-1218 | UNKNOWN READ in Poco::UTF16Encoding::queryConvert | 2024-10-14T00:08:40.382545Z | 2025-04-10T14:48:52.198172Z |
| osv-2025-264 | Security exception in org.joni.Parser.parseCharClass | 2025-04-08T00:00:08.174777Z | 2025-04-08T00:00:08.175341Z |
| osv-2025-260 | Heap-buffer-overflow in bfd_getb16 | 2025-04-06T00:00:51.202273Z | 2025-04-06T00:00:51.202704Z |
| osv-2024-1164 | Use-of-uninitialized-value in format_message | 2024-10-02T00:13:05.449687Z | 2025-04-05T14:45:16.595433Z |
| osv-2025-258 | Global-buffer-overflow in parseExtraField | 2025-04-05T00:05:58.760780Z | 2025-04-05T00:05:58.761154Z |
| osv-2025-256 | Global-buffer-overflow in QByteArray::QByteArray | 2025-04-05T00:02:36.742745Z | 2025-04-05T00:02:36.743233Z |
| osv-2024-947 | Heap-buffer-overflow in pcpp::SomeIpSdEntry::SomeIpSdEntry | 2024-08-16T00:13:30.824621Z | 2025-04-03T14:42:12.138019Z |
| osv-2025-251 | Heap-buffer-overflow in icu_78::RegexMatcher::MatchChunkAt | 2025-04-02T00:16:00.337471Z | 2025-04-02T00:16:00.337850Z |
| osv-2025-248 | Heap-buffer-overflow in cli_bm_addpatt | 2025-04-02T00:00:13.427589Z | 2025-04-02T00:00:13.428120Z |
| osv-2025-240 | Security exception in com.powsybl.commons.xml.XmlUtil.lambda$skipSubElements$0 | 2025-03-28T00:05:50.145107Z | 2025-03-30T14:32:19.516483Z |
| osv-2023-1168 | Heap-buffer-overflow in pcpp::PPP_PPTPLayer::computeCalculateFields | 2023-11-16T13:00:57.037733Z | 2025-03-28T14:23:56.681348Z |
| osv-2025-230 | Heap-buffer-overflow in wasm_loader_prepare_bytecode | 2025-03-22T00:05:22.916187Z | 2025-03-22T00:05:22.916485Z |
| osv-2022-597 | Heap-use-after-free in .tmpgt0oOx | 2022-07-19T00:01:55.792573Z | 2025-03-21T14:13:26.227734Z |
| osv-2025-226 | UNKNOWN READ in extract_sess_version | 2025-03-21T00:19:10.852617Z | 2025-03-21T00:19:10.852969Z |
| osv-2024-867 | Use-of-uninitialized-value in std::__1::ostreambuf_iterator<char, std::__1::char_traits<char>> std::__1::__pad | 2024-08-16T00:05:38.614485Z | 2025-03-19T14:29:11.494602Z |
| osv-2024-352 | Heap-buffer-overflow in __parse_options | 2024-04-30T00:04:28.080620Z | 2025-03-19T14:25:45.717598Z |
| osv-2023-806 | Heap-buffer-overflow in H5F__accum_free | 2023-09-08T14:00:12.468140Z | 2025-03-18T00:47:11.270073Z |
| osv-2023-1223 | Heap-buffer-overflow in H5O__shared_decode | 2023-11-27T13:01:18.977198Z | 2025-03-18T00:47:06.884278Z |
| osv-2023-1091 | Heap-buffer-overflow in H5F_addr_decode | 2023-10-31T13:01:22.289748Z | 2025-03-18T00:45:36.194874Z |
| osv-2024-390 | Heap-buffer-overflow in H5O__cache_chk_serialize | 2024-04-30T00:14:19.116132Z | 2025-03-18T00:44:44.672358Z |
| osv-2023-754 | Heap-buffer-overflow in H5O__chunk_protect | 2023-08-28T14:00:10.026707Z | 2025-03-18T00:43:25.726885Z |
| osv-2023-471 | Heap-buffer-overflow in H5FS__sinfo_serialize_node_cb | 2023-06-09T14:00:54.620201Z | 2025-03-18T00:43:10.716259Z |
| osv-2023-722 | Heap-buffer-overflow in H5MM_memcpy | 2023-08-22T14:03:04.118428Z | 2025-03-18T00:42:21.984142Z |
| osv-2024-1427 | Heap-buffer-overflow in extract_mediaip | 2025-01-28T00:14:30.487391Z | 2025-03-18T00:41:33.426387Z |
| osv-2024-1249 | Heap-buffer-overflow in extract_ice_option | 2024-10-30T00:15:55.709182Z | 2025-03-18T00:40:00.171776Z |
| osv-2025-119 | Heap-buffer-overflow in snmp_config_when | 2025-02-14T00:15:08.375253Z | 2025-03-18T00:37:43.437021Z |
| osv-2025-161 | Heap-buffer-overflow in se_add_pair | 2025-02-24T00:15:33.662895Z | 2025-03-18T00:37:12.676515Z |
| osv-2025-113 | Heap-buffer-overflow in snmp_log_options | 2025-02-14T00:01:45.812592Z | 2025-03-18T00:35:43.690001Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0020 | Stack buffer overflow with whoami on several Unix platforms | 2024-02-28T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0018 | ObjectPool creates uninitialized memory when freeing objects | 2024-02-27T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0017 | Non-idiomatic use of iterators leads to use after free | 2024-02-28T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0016 | dav1d AV1 decoder integer overflow | 2024-02-19T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2023-0085 | HPACK decoder panics on invalid input | 2023-09-15T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0331 | Puccinier is unmainted. | 2024-03-31T12:00:00Z | 2024-03-31T14:44:37Z |
| rustsec-2023-0084 | `hpack` is unmaintained | 2023-09-15T12:00:00Z | 2024-03-06T14:01:14Z |
| rustsec-2023-0081 | safemem is unmaintained | 2023-02-14T12:00:00Z | 2024-03-04T18:47:07Z |
| rustsec-2024-0019 | Tokens for named pipes may be delivered after deregistration | 2024-03-04T12:00:00Z | 2024-03-04T17:51:31Z |
| rustsec-2024-0015 | filesystem-rs may be implicitly unmaintained | 2024-01-25T12:00:00Z | 2024-02-18T04:23:45Z |
| rustsec-2024-0014 | `generational-arena` is unmaintained | 2024-02-11T12:00:00Z | 2024-02-18T04:06:15Z |
| rustsec-2024-0013 | Memory corruption, denial of service, and arbitrary code execution in libgit2 | 2024-02-06T12:00:00Z | 2024-02-15T01:22:49Z |
| rustsec-2024-0010 | Improper comparison of different-length signatures | 2024-02-06T12:00:00Z | 2024-02-15T01:22:49Z |
| rustsec-2024-0007 | Use-after-free when setting the locale | 2024-01-19T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2024-0005 | Unsound sending of non-Send types across threads | 2024-01-07T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2024-0003 | Resource exhaustion vulnerability in h2 may lead to Denial of Service (DoS) | 2024-01-17T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2024-0001 | Unsound use of str::from_utf8_unchecked on bytes which are not UTF-8 | 2024-01-13T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0078 | Potential stack use-after-free in `Instrumented::into_inner` | 2023-10-19T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0075 | Unaligned write of u64 on 32-bit and 16-bit platforms | 2023-12-20T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0074 | Some Ref methods are unsound with some type parameters | 2023-12-14T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0072 | `openssl` `X509StoreRef::objects` is unsound | 2023-11-23T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0070 | Insufficient covariance check makes self_cell unsound | 2023-11-10T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0066 | Vulnerable to privilege escalation using ioctls TIOCSTI and TIOCLINUX | 2023-04-29T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0063 | Denial of service in Quinn servers | 2023-09-21T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0062 | BER/CER/DER decoder panics on invalid input | 2023-09-13T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0061 | libwebp: OOB write in BuildHuffmanTable | 2023-09-12T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0060 | libwebp: OOB write in BuildHuffmanTable | 2023-09-12T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0059 | Unaligned read of `*const *const c_char` pointer | 2023-09-10T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0058 | Exposes reference to non-Sync data to an arbitrary thread | 2023-09-10T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2023-0057 | Fails to prohibit standard library access prior to initialization of Rust standard library runtime | 2023-09-10T12:00:00Z | 2024-02-10T15:57:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2026-33073 | discourse-subscriptions plugin leaking stripe API key in multisite environment | 2026-04-07T08:44:03.688Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32951 | Discourse: Authorization bypass in oneboxer via user-controlled category id | 2026-04-07T08:44:01.614Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32620 | Discourse: Missing post-level authorization allows whisper metadata disclosure | 2026-04-07T08:43:59.465Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32619 | Discourse: Insufficient topic visibility check allows unauthorized poll manipulation in private categories | 2026-04-07T08:43:57.232Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32618 | Discourse: Unauthorized channel membership inference via excluded_memberships_channel_id | 2026-04-07T08:43:55.159Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32615 | Discourse: Category group moderators can perform actions on topics in restricted categories without read access | 2026-04-07T08:43:53.093Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32607 | Discourse: Stored XSS via unescaped assignee name | 2026-04-07T08:43:50.897Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32273 | Discourse: XSS on category description update via API | 2026-04-07T08:43:48.997Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32243 | Discourse: Stored XSS in discourse-ai shared conversations onebox | 2026-04-07T08:43:46.857Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32143 | Discourse: Admin-only report can be exported by moderators | 2026-04-07T08:43:44.810Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32113 | Discourse: Open redirect via `sso_destination_url` cookie in `enter` | 2026-04-07T08:43:40.581Z | 2026-04-07T09:14:25.218Z |
| bit-parse-2026-34784 | Parse Server: Streaming file download bypasses afterFind file trigger authorization | 2026-04-06T14:49:38.726Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34595 | Parse Server: LiveQuery protected-field guard bypass via array-like logical operator value | 2026-04-06T14:49:36.710Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34574 | Parse Server: Session field immutability bypass via falsy-value guard | 2026-04-06T14:49:34.810Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34573 | Parse Server: GraphQL complexity validator exponential fragment traversal DoS | 2026-04-06T14:49:33.069Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34532 | Parse Server: Cloud function validator bypass via prototype chain traversal | 2026-04-06T14:49:31.298Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34373 | Parse Server: GraphQL API endpoint ignores CORS origin restriction | 2026-04-06T14:49:29.676Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34363 | Parse Server: LiveQuery protected field leak via shared mutable state across concurrent subscribers | 2026-04-06T14:49:27.983Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34224 | Parse Server: MFA single-use token bypass via concurrent authData login requests | 2026-04-06T14:49:26.245Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34215 | Parse Server: Auth data exposed via verify password endpoint | 2026-04-06T14:49:24.609Z | 2026-04-06T15:13:09.641Z |
| bit-minio-2026-34204 | MinIO is Vulnerable to SSE Metadata Injection via Replication Headers | 2026-04-06T09:26:13.602Z | 2026-04-06T11:34:08.453Z |
| bit-prestashop-2026-33674 | PrestaShop: Improper Use of Validation Framework | 2026-03-30T11:49:50.984Z | 2026-04-06T08:26:41.107Z |
| bit-prestashop-2026-33673 | PrestaShop has multiple stored XSS vulnerabilities via unprotected Template variables | 2026-03-30T11:49:49.224Z | 2026-04-06T08:26:41.107Z |
| bit-node-2026-21712 | 2026-04-06T07:58:33.472Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21711 | 2026-04-06T07:58:30.648Z | 2026-04-06T08:26:41.107Z | |
| bit-mongodb-2026-5170 | Users could trigger a crash of mongod primaries during promotion to sharded | 2026-04-06T07:54:20.562Z | 2026-04-06T08:26:41.107Z |
| bit-mongodb-2026-4358 | Memory safety issues in slot-based execution hash table spill | 2026-04-06T07:54:17.803Z | 2026-04-06T08:26:41.107Z |
| bit-drupal-2025-31675 | Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2025-004 | 2025-06-03T14:41:48.563Z | 2026-04-06T08:26:41.107Z |
| bit-dotnet-2026-26131 | .NET Elevation of Privilege Vulnerability | 2026-04-06T07:48:26.731Z | 2026-04-06T08:26:41.107Z |
| bit-dotnet-2026-26127 | .NET Denial of Service Vulnerability | 2026-04-06T07:48:23.759Z | 2026-04-06T08:26:41.107Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-gg58376 | Within HostnameError | 2026-02-17T00:41:15.939977Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-bs57244 | Within HostnameError | 2026-02-17T00:39:44.907078Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-pr84319 | Security fixes for GHSA-2GH3-RMM4-6RQ5, GHSA-R6V5-FH4H-64XC, GHSA-RHFX-M35P-FF5J, GHSA-XWFJ-JGWM-7WP5 applied in versions: 1.27.5-r1, 1.27.6-r0 | 2026-02-14T00:37:23.085740Z | 2026-02-13T12:28:27Z |
| cleanstart-2026-kk07808 | issue has been found in third-party PNM decoding associated with libpng 1 | 2026-02-14T00:37:45.311656Z | 2026-02-13T12:28:27Z |
| cleanstart-2026-wv76464 | libexpat in Expat before 2 | 2026-02-13T00:43:45.311968Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-tr92727 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-13T00:41:14.875956Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-qi35149 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-13T00:39:44.259950Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-mh09144 | issue was discovered in libexpat before 2 | 2026-02-13T00:45:17.459930Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-jb30245 | Security fixes for GHSA-F6X5-JH6R-WRFV, GHSA-J5W8-Q4QC-RX2X applied in versions: 0.47.2-r0 | 2026-02-13T00:39:45.274258Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-gv85693 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-13T00:40:14.240914Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-fi29887 | During the TLS 1 | 2026-02-13T00:39:44.225771Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-ca79883 | Security fixes for GHSA-6V2P-P943-PHR9, GHSA-C6GW-W398-HV78, GHSA-F6X5-JH6R-WRFV, GHSA-HCG3-P754-CR77, GHSA-J5W8-Q4QC-RX2X, GHSA-QXP5-GW88-XV66, GHSA-V778-237X-GJRC, GHSA-VVGC-356P-C3XW applied in versions: 1.15.0-r1 | 2026-02-13T00:40:14.901695Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-xb34574 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-11T00:40:59.223419Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-ls08172 | Within HostnameError | 2026-02-11T00:41:59.030674Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-im73098 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-11T00:40:59.052841Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-cv28298 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-11T00:41:59.034081Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-by71381 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-11T00:41:59.117560Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-tj33788 | Within HostnameError | 2026-02-10T00:39:24.476012Z | 2026-02-09T12:51:17Z |
| cleanstart-2026-gp14462 | Security fixes for GHSA-VVGC-356P-C3XW applied in versions: 0.18.0-r0 | 2026-02-10T00:39:23.397354Z | 2026-02-09T12:51:17Z |
| cleanstart-2026-wk88787 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-06T00:41:29.451524Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-rr78450 | Within HostnameError | 2026-02-06T00:39:29.463576Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-jq02410 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-06T00:41:59.411604Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-jn44153 | Security fixes for GHSA-F6X5-JH6R-WRFV, GHSA-GX3X-VQ4P-MHHV, GHSA-J5W8-Q4QC-RX2X applied in versions: 1.18.0-r0, 1.19.0-r1 | 2026-02-06T00:39:29.662228Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-bz58799 | Within HostnameError | 2026-02-06T00:39:29.590361Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-zm20570 | Moby is an open-source project created by Docker for software containerization | 2026-02-06T00:54:29.621254Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-xe32069 | Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a ... | 2026-02-06T01:10:32.733224Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-wx01708 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-02-06T01:10:02.024980Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-td34476 | Moby is an open-source project created by Docker for software containerization | 2026-02-06T00:51:29.459800Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-tc95380 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-02-06T01:06:01.062694Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-sp51034 | Moby is an open-source project created by Docker for software containerization | 2026-02-06T00:52:59.619100Z | 2026-02-03T13:35:45Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2010-ALE-006 | Vulnérabilité de Safari | 2010-05-14T00:00:00.000000 | 2010-05-27T00:00:00.000000 |
| certa-2010-ale-005 | Vulnérabilité dans Java Deployment Toolkit | 2010-04-09T00:00:00.000000 | 2010-04-16T00:00:00.000000 |
| CERTA-2010-ALE-005 | Vulnérabilité dans Java Deployment Toolkit | 2010-04-09T00:00:00.000000 | 2010-04-16T00:00:00.000000 |
| certa-2010-ale-003 | Vulnérabilité dans Microsoft VBScript | 2010-03-02T00:00:00.000000 | 2010-04-13T00:00:00.000000 |
| CERTA-2010-ALE-003 | Vulnérabilité dans Microsoft VBScript | 2010-03-02T00:00:00.000000 | 2010-04-13T00:00:00.000000 |
| certa-2010-ale-004 | Vulnérabilité dans Microsoft Internet Explorer | 2010-03-10T00:00:00.000000 | 2010-03-31T00:00:00.000000 |
| CERTA-2010-ALE-004 | Vulnérabilité dans Microsoft Internet Explorer | 2010-03-10T00:00:00.000000 | 2010-03-31T00:00:00.000000 |
| certa-2010-ale-002 | Vulnérabilité dans le sous-système MS-DOS de Microsoft Windows | 2010-01-21T00:00:00.000000 | 2010-02-10T00:00:00.000000 |
| CERTA-2010-ALE-002 | Vulnérabilité dans le sous-système MS-DOS de Microsoft Windows | 2010-01-21T00:00:00.000000 | 2010-02-10T00:00:00.000000 |
| certa-2010-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2010-01-15T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| CERTA-2010-ALE-001 | Vulnérabilité dans Microsoft Internet Explorer | 2010-01-15T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| certa-2009-ale-023 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-12-15T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| CERTA-2009-ALE-023 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-12-15T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2009-ale-021 | Vulnérabilité dans Adobe Illustrator | 2009-12-10T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| CERTA-2009-ALE-021 | Vulnérabilité dans Adobe Illustrator | 2009-12-10T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| certa-2009-ale-022 | Vulnérabilité dans TANDBERG MXP | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |
| CERTA-2009-ALE-022 | Vulnérabilité dans TANDBERG MXP | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |
| certa-2009-ale-020 | Vulnérabilité dans Internet Explorer | 2009-11-21T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| CERTA-2009-ALE-020 | Vulnérabilité dans Internet Explorer | 2009-11-21T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| certa-2009-ale-018 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-10-09T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| certa-2009-ale-015 | Vulnérabilités du serveur FTP de Microsoft IIS | 2009-09-01T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| CERTA-2009-ALE-018 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-10-09T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| CERTA-2009-ALE-015 | Vulnérabilités du serveur FTP de Microsoft IIS | 2009-09-01T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| certa-2009-ale-016 | Vulnérabilité de SMBv2 dans Microsoft Windows | 2009-09-09T00:00:00.000000 | 2009-10-13T00:00:00.000000 |
| CERTA-2009-ALE-016 | Vulnérabilité de SMBv2 dans Microsoft Windows | 2009-09-09T00:00:00.000000 | 2009-10-13T00:00:00.000000 |
| certa-2009-ale-011 | Vulnérabilité dans Microsoft Office Web Components Control | 2009-07-13T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| CERTA-2009-ALE-011 | Vulnérabilité dans Microsoft Office Web Components Control | 2009-07-13T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-ale-013 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2009-07-23T00:00:00.000000 | 2009-07-31T00:00:00.000000 |
| CERTA-2009-ALE-013 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2009-07-23T00:00:00.000000 | 2009-07-31T00:00:00.000000 |
| certa-2009-ale-012 | Vulnérabilité dans Mozilla Firefox | 2009-07-15T00:00:00.000000 | 2009-07-17T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0129 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0128 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0127 | Vulnérabilité dans NetApp ONTAP 9 | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0126 | Vulnérabilité dans ESET Management Agent | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0125 | Multiples vulnérabilités dans les produits Moxa | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0124 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0123 | Multiples vulnérabilités dans Asterisk | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0122 | Multiples vulnérabilités dans Tenable Nessus | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| CERTFR-2026-AVI-0121 | Vulnérabilité dans les produits Juniper Networks | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0120 | Multiples vulnérabilités dans les produits F5 | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0119 | Multiples vulnérabilités dans les produits Cisco | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0118 | Multiples vulnérabilités dans les produits Splunk | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| CERTFR-2026-AVI-0120 | Multiples vulnérabilités dans les produits F5 | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| CERTFR-2026-AVI-0119 | Multiples vulnérabilités dans les produits Cisco | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| CERTFR-2026-AVI-0118 | Multiples vulnérabilités dans les produits Splunk | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0117 | Multiples vulnérabilités dans GLPI | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0116 | Vulnérabilité dans les produits Moxa | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0115 | Multiples vulnérabilités dans Tenable Identity Exposure | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0114 | Multiples vulnérabilités dans Google Chrome | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0113 | Vulnérabilité dans Google Pixel | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| CERTFR-2026-AVI-0117 | Multiples vulnérabilités dans GLPI | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| CERTFR-2026-AVI-0116 | Vulnérabilité dans les produits Moxa | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| CERTFR-2026-AVI-0115 | Multiples vulnérabilités dans Tenable Identity Exposure | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| CERTFR-2026-AVI-0114 | Multiples vulnérabilités dans Google Chrome | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| CERTFR-2026-AVI-0113 | Vulnérabilité dans Google Pixel | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0112 | Multiples vulnérabilités dans les produits VMware | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| certfr-2026-avi-0111 | Vulnérabilité dans ESET Inspect Connector | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| CERTFR-2026-AVI-0112 | Multiples vulnérabilités dans les produits VMware | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| CERTFR-2026-AVI-0111 | Vulnérabilité dans ESET Inspect Connector | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| certfr-2026-avi-0110 | Multiples vulnérabilités Ivanti Endpoint Manager Mobile (EPMM) | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-000064 | Movable Type XMLRPC API vulnerable to command injection | 2022-08-24T15:58+09:00 | 2024-06-13T18:11+09:00 |
| jvndb-2023-001291 | Multiple vulnerabilities in Trend Micro Maximum Security | 2023-03-03T11:10+09:00 | 2024-06-13T17:06+09:00 |
| jvndb-2022-000045 | FreeBSD vulnerable to denial-of-service (DoS) | 2022-06-15T12:28+09:00 | 2024-06-13T16:31+09:00 |
| jvndb-2022-000066 | Multiple vulnerabilities in CentreCOM AR260S V2 | 2022-08-29T17:37+09:00 | 2024-06-13T16:21+09:00 |
| jvndb-2023-000044 | JINS MEME CORE uses a hard-coded cryptographic key | 2023-05-08T15:13+09:00 | 2024-06-13T16:19+09:00 |
| jvndb-2023-000042 | WordPress Plugin "Newsletter" vulnerable to cross-site scripting | 2023-05-09T14:42+09:00 | 2024-06-13T16:14+09:00 |
| jvndb-2022-000068 | SYNCK GRAPHICA Mailform Pro CGI vulnerable to information disclosure | 2022-09-05T15:22+09:00 | 2024-06-13T16:00+09:00 |
| jvndb-2022-002448 | Multiple vulnerabilities in Trend Micro Deep Security and Cloud One - Workload Security agents for Windows | 2022-10-11T17:02+09:00 | 2024-06-13T14:30+09:00 |
| jvndb-2022-002544 | Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service | 2022-10-20T16:18+09:00 | 2024-06-13T13:58+09:00 |
| jvndb-2022-000067 | Installer of Ricoh Device Software Manager may insecurely load Dynamic Link Libraries | 2022-08-29T15:57+09:00 | 2024-06-13T13:53+09:00 |
| jvndb-2022-000070 | Movable Type plugin A-Form vulnerable to cross-site scripting | 2022-09-09T15:01+09:00 | 2024-06-13T13:49+09:00 |
| jvndb-2022-000069 | PowerCMS XMLRPC API vulnerable to command injection | 2022-09-02T15:49+09:00 | 2024-06-13T11:44+09:00 |
| jvndb-2022-002367 | OpenAM (OpenAM Consortium Edition) vulnerable to open redirect | 2022-09-16T15:30+09:00 | 2024-06-13T11:39+09:00 |
| jvndb-2022-000071 | Multiple vulnerabilities in Trend Micro Apex One and Trend Micro Apex One as a Service | 2022-09-14T18:15+09:00 | 2024-06-13T11:34+09:00 |
| jvndb-2022-000073 | Multiple vulnerabilities in EC-CUBE | 2022-09-15T16:30+09:00 | 2024-06-13T11:09+09:00 |
| jvndb-2022-000072 | EC-CUBE plugin "Product Image Bulk Upload Plugin" vulnerable to insufficient verification in uploading files | 2022-09-15T16:13+09:00 | 2024-06-13T11:03+09:00 |
| jvndb-2023-000015 | Multiple vulnerabilities in PLANEX COMMUNICATIONS Network Camera CS-WMV02G | 2023-02-13T14:48+09:00 | 2024-06-12T17:03+09:00 |
| jvndb-2022-002537 | Stack-based buffer overflow vulnerability in Yokogawa Test & Measurement WTViewerE | 2022-10-19T16:23+09:00 | 2024-06-12T16:54+09:00 |
| jvndb-2022-000081 | Lemon8 App fails to restrict access permissions | 2022-10-19T14:08+09:00 | 2024-06-12T16:39+09:00 |
| jvndb-2024-000062 | Denial-of-service (DoS) vulnerability in IPCOM WAF function | 2024-06-12T15:03+09:00 | 2024-06-12T15:03+09:00 |
| jvndb-2022-000075 | IPFire WebUI vulnerable to cross-site scripting | 2022-10-06T13:05+09:00 | 2024-06-12T14:28+09:00 |
| jvndb-2023-000013 | Ichiran App vulnerable to improper server certificate verification | 2023-02-06T14:31+09:00 | 2024-06-12T14:25+09:00 |
| jvndb-2022-000074 | BookStack vulnerable to cross-site scripting | 2022-09-30T14:48+09:00 | 2024-06-12T14:07+09:00 |
| jvndb-2022-000077 | The installer of Sony Content Transfer may insecurely load Dynamic Link Libraries | 2022-10-11T15:08+09:00 | 2024-06-12T12:12+09:00 |
| jvndb-2022-000076 | Growi vulnerable to improper access control | 2022-10-07T14:30+09:00 | 2024-06-12T12:04+09:00 |
| jvndb-2023-000017 | Improper restriction of XML external entity reference (XXE) vulnerability in tsClinical Define.xml Generator and tsClinical Metadata Desktop Tools | 2023-02-14T17:00+09:00 | 2024-06-12T11:15+09:00 |
| jvndb-2023-000012 | Vulnerability in Driver Distributor where passwords are stored in a recoverable format | 2023-01-31T14:14+09:00 | 2024-06-12T11:07+09:00 |
| jvndb-2023-000011 | SUSHIRO App for Android outputs sensitive information to the log file | 2023-01-31T14:10+09:00 | 2024-06-11T17:35+09:00 |
| jvndb-2023-001269 | File and Directory Permissions Vulnerability in Hitachi Automation Director, Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center | 2023-03-01T16:59+09:00 | 2024-06-11T16:42+09:00 |
| jvndb-2023-000014 | NEC PC Settings Tool vulnerable to missing authentication for critical function | 2023-02-10T14:43+09:00 | 2024-06-10T18:13+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16380 | Mozilla Thunderbird欺骗漏洞(CNVD-2026-16380) | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16379 | Mozilla Firefox和Mozilla Thunderbird欺骗漏洞(CNVD-2026-16379) | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16378 | Mozilla Firefox和Mozilla Thunderbird安全绕过漏洞(CNVD-2026-16378) | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16377 | Mozilla Firefox和Mozilla Thunderbird资源管理错误漏洞(CNVD-2026-16377) | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16376 | Mozilla Firefox和Mozilla Thunderbird存在未明漏洞 | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16375 | Mozilla Firefox和Mozilla Thunderbird拒绝服务漏洞(CNVD-2026-16375) | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16374 | Mozilla Firefox和Mozilla Thunderbird拒绝服务漏洞 | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16373 | Mozilla Firefox和Mozilla Thunderbird资源管理错误漏洞 | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16372 | Mozilla Firefox和Mozilla Thunderbird代码执行漏洞(CNVD-2026-16372) | 2026-03-31 | 2026-04-08 |
| cnvd-2026-16164 | Microsoft SharePoint Server欺骗漏洞(CNVD-2026-16164) | 2026-03-16 | 2026-04-07 |
| cnvd-2026-16163 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2026-16163) | 2026-03-16 | 2026-04-07 |
| cnvd-2026-16162 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2026-16162) | 2026-03-16 | 2026-04-07 |
| cnvd-2026-16161 | Microsoft Office代码执行漏洞(CNVD-2026-16161) | 2026-01-30 | 2026-04-07 |
| cnvd-2026-16160 | Microsoft Office代码执行漏洞(CNVD-2026-16160) | 2026-03-17 | 2026-04-07 |
| cnvd-2026-16159 | Microsoft Office代码执行漏洞(CNVD-2026-16159) | 2026-03-25 | 2026-04-07 |
| cnvd-2026-16158 | Microsoft Excel权限提升漏洞(CNVD-2026-16158) | 2026-03-02 | 2026-04-07 |
| cnvd-2026-16157 | Microsoft Excel信息泄露漏洞(CNVD-2026-16157) | 2026-03-11 | 2026-04-07 |
| cnvd-2026-16156 | Microsoft Excel代码执行漏洞(CNVD-2026-16156) | 2026-03-17 | 2026-04-07 |
| cnvd-2026-16155 | Google Android权限提升漏洞(CNVD-2026-16155) | 2026-03-09 | 2026-04-07 |
| cnvd-2026-16154 | Google Android信息泄露漏洞(CNVD-2026-16154) | 2026-03-09 | 2026-04-07 |
| cnvd-2026-16153 | Microsoft Excel代码执行漏洞(CNVD-2026-16153) | 2026-03-17 | 2026-04-07 |
| cnvd-2026-16152 | Microsoft Excel代码执行漏洞(CNVD-2026-16152) | 2026-03-17 | 2026-04-07 |
| cnvd-2026-16151 | Google Chrome内存错误引用漏洞(CNVD-2026-16151) | 2026-03-23 | 2026-04-07 |
| cnvd-2026-16150 | Google Chrome信息泄露漏洞(CNVD-2026-16150) | 2026-03-25 | 2026-04-07 |
| cnvd-2026-16149 | Google Chrome安全绕过漏洞(CNVD-2026-16149) | 2026-03-25 | 2026-04-07 |
| cnvd-2026-16148 | Google Chrome安全绕过漏洞(CNVD-2026-16148) | 2026-03-25 | 2026-04-07 |
| cnvd-2026-16147 | D-Link DIR-513堆栈缓冲区溢出漏洞(CNVD-2026-16147) | 2026-03-09 | 2026-04-07 |
| cnvd-2026-16146 | D-Link DIR-513堆栈缓冲区溢出漏洞(CNVD-2026-16146) | 2026-03-09 | 2026-04-07 |
| cnvd-2026-16145 | TRENDnet TEW-800MB命令注入漏洞 | 2026-01-12 | 2026-04-07 |
| cnvd-2026-16144 | Delta Electronics DVP-12SE11T越界写入漏洞 | 2026-01-14 | 2026-04-07 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-12050 | Уязвимость компонента drivers/media/i2c/et8ek8/et8ek8 ядра операционной системы Linux, по… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12043 | Уязвимость компонента hsm ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12040 | Уязвимость функции spufs_create_context() ядра операционной системы Linux, позволяющая на… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12039 | Уязвимость компонента spufs ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12038 | Уязвимость функции spufs_rmdir() ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12036 | Уязвимость компонента link.c ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12034 | Уязвимость компонента cxgb4_ethtool.c ядра операционной системы Linux, позволяющая наруши… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12033 | Уязвимость компонентов microchip ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12032 | Уязвимость компонента v3d_sched.c ядра операционной системы Linux, позволяющая нарушителю… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12030 | Уязвимость компонента oplock.c ядра операционной системы Linux, позволяющая нарушителю вы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12029 | Уязвимость функции wl1251_tx_work компонента wl1251/tx.c модуля wifi ядра операционной си… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12028 | Уязвимость компонента phy_led_triggers.c ядра операционной системы Linux, позволяющая нар… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12023 | Уязвимость компонента hugetlbpage.c ядра операционной системы Linux, позволяющая нарушите… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12020 | Уязвимость компонента arch/x86/mm/tlb.c ядра операционной системы Linux, позволяющая нару… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12014 | Уязвимость компонента drivers/dma/ti/k3-udma.c ядра операционной системы Linux, позволяющ… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12012 | Уязвимость компонента drm/amd/pm ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12011 | Уязвимость компонента drm/amd/pm ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12010 | Уязвимость компонента drm/amd/pm ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12009 | Уязвимость компонента drm/amd/pm ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12008 | Уязвимость компонента drm/amd/pm ядра операционной системы Linux, позволяющая нарушителю … | 28.09.2025 | 16.02.2026 |
| bdu:2025-12004 | Уязвимость компонента jfs ядра операционной системы Linux, позволяющая нарушителю вызвать… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12003 | Уязвимость компонента drm/amd/pm/smu11 ядра операционной системы Linux, позволяющая наруш… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12002 | Уязвимость компонента pwm-mediatek.c ядра операционной системы Linux, позволяющая нарушит… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12001 | Уязвимость компонента dib8000.c ядра операционной системы Linux, позволяющая нарушителю в… | 28.09.2025 | 16.02.2026 |
| bdu:2025-12000 | Уязвимость функции nd_label_data_init() компонента drivers/nvdimm/label.c ядра операционн… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11999 | Уязвимость компонента net/sched/sch_qfq.c ядра операционной системы Linux, позволяющая на… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11998 | Уязвимость компонента sch_drr.c ядра операционной системы Linux, позволяющая нарушителю о… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11997 | Уязвимость ядра операционной системы Linux, связанная с ошибками синхронизации при исполь… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11996 | Уязвимость компонентов ipv4 ядра операционной системы Linux, позволяющая нарушителю вызва… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11991 | Уязвимость компонента streamzap.c ядра операционной системы Linux, позволяющая нарушителю… | 28.09.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201912-0636 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:24:52.133000Z |
| var-200102-0077 | Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attacker… | 2024-07-23T21:24:52.601000Z |
| var-200504-0293 | Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allo… | 2024-07-23T21:24:51.414000Z |
| var-202006-1831 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2024-07-23T21:24:50.411000Z |
| var-202106-0349 | Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to pote… | 2024-07-23T21:24:47.280000Z |
| var-201410-1144 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0… | 2024-07-23T21:24:46.357000Z |
| var-200809-0190 | Multiple integer overflows in the SearchKit API in Apple Mac OS X 10.4.11 and 10.5 throug… | 2024-07-23T21:24:45.643000Z |
| var-200701-0295 | The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML … | 2024-07-23T21:24:06.215000Z |
| var-202003-1779 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:23:59.719000Z |
| var-201304-0317 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:23:59.799000Z |
| var-200110-0170 | The Legion of the Bouncy Castle Java Cryptography API before release 1.38, as used in Cry… | 2024-07-23T21:23:39.977000Z |
| var-201504-0150 | cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate con… | 2024-07-23T21:23:08.257000Z |
| var-202108-2123 | A memory corruption vulnerability was addressed with improved locking. This issue is fixe… | 2024-07-23T21:23:07.966000Z |
| var-201503-0388 | Use-after-free vulnerability in the _zend_shared_memdup function in zend_shared_alloc.c i… | 2024-07-23T21:23:07.716000Z |
| var-201003-1075 | Use-after-free vulnerability in the abstract file-descriptor handling interface in the cu… | 2024-07-23T21:23:07.044000Z |
| var-200801-0561 | Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 th… | 2024-07-23T21:23:07.143000Z |
| var-201711-0454 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:23:03.598000Z |
| var-201506-0264 | The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.… | 2024-07-23T21:23:02.233000Z |
| var-202004-0812 | In ksh version 20120801, a flaw was found in the way it evaluates certain environment var… | 2024-07-23T21:22:46.394000Z |
| var-200506-0133 | Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow r… | 2024-07-23T21:22:45.018000Z |
| var-202001-0472 | Insufficient control flow in certain data structures for some Intel(R) Processors with In… | 2024-07-23T21:22:25.122000Z |
| var-201710-1406 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2024-07-23T21:22:23.796000Z |
| var-201302-0233 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:21:52.515000Z |
| var-201105-0197 | Unspecified vulnerability in the Java Embedding Plugin (JEP) in Mozilla Firefox before 3.… | 2024-07-23T21:21:47.763000Z |
| var-200803-0028 | The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unu… | 2024-07-23T21:21:47.664000Z |
| var-201311-0106 | Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1… | 2024-07-23T21:21:38.043000Z |
| var-201904-1401 | A cross-site scripting issue existed in Safari. This issue was addressed with improved UR… | 2024-07-23T21:21:37.851000Z |
| var-202004-2200 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T21:21:06.954000Z |
| var-201912-0525 | A logic issue was addressed with improved state management. This issue is fixed in tvOS 1… | 2024-07-23T21:21:06.108000Z |
| var-200312-0218 | OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recu… | 2024-07-23T21:21:01.334000Z |