Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-42215 |
8.8 (3.1)
|
GitPython: Command injection via Git options bypass |
gitpython-developers |
GitPython |
2026-05-07T18:17:03.194Z | 2026-05-07T18:17:03.194Z |
| CVE-2026-8081 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
router-for-me CLIProxyAPI api_tools.go server-side req… |
router-for-me |
CLIProxyAPI |
2026-05-07T18:00:14.133Z | 2026-05-07T18:08:42.136Z |
| CVE-2026-41902 |
9.1 (3.1)
|
FreeScout's user invitation hash never expires: perman… |
freescout-help-desk |
freescout |
2026-05-07T18:03:50.599Z | 2026-05-07T18:03:50.599Z |
| CVE-2026-41903 |
5.4 (3.1)
|
FreeScout IDOR Vulnerability: PERM_EDIT_USERS allows m… |
freescout-help-desk |
freescout |
2026-05-07T18:02:01.058Z | 2026-05-07T18:02:01.058Z |
| CVE-2026-37709 |
9.8 (3.1)
|
Insecure Permissions vulnerability in grokability… |
n/a |
n/a |
2026-05-07T00:00:00.000Z | 2026-05-07T17:39:49.914Z |
| CVE-2026-41254 |
4 (3.1)
|
Little CMS (lcms2) through 2.18 has an integer ov… |
littlecms |
little cms color engine |
2026-04-18T06:43:13.741Z | 2026-05-07T17:33:56.924Z |
| CVE-2026-43577 |
7.1 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.4.9 - Arbitrary File Read via Browser … |
OpenClaw |
OpenClaw |
2026-05-06T19:49:21.091Z | 2026-05-07T17:32:03.185Z |
| CVE-2026-43583 |
6 (4.0)
5.3 (3.1)
|
OpenClaw 2026.4.10 < 2026.4.14 - Loss of Group Tool-Po… |
OpenClaw |
OpenClaw |
2026-05-06T19:49:25.474Z | 2026-05-07T17:30:28.366Z |
| CVE-2026-44112 |
6 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.4.22 - Symlink Swap Race Condition in … |
OpenClaw |
OpenClaw |
2026-05-06T19:49:29.626Z | 2026-05-07T17:28:12.165Z |
| CVE-2026-44118 |
8.5 (4.0)
7.8 (3.1)
|
OpenClaw < 2026.4.22 - Owner Context Spoofing via Bear… |
OpenClaw |
OpenClaw |
2026-05-06T19:49:37.173Z | 2026-05-07T17:22:50.507Z |
| CVE-2026-43281 |
N/A
|
mailbox: Prevent out-of-bounds access in fw_mbox_index… |
Linux |
Linux |
2026-05-06T11:29:02.278Z | 2026-05-07T17:15:22.833Z |
| CVE-2026-43277 |
N/A
|
APEI/GHES: ensure that won't go past CPER allocated record |
Linux |
Linux |
2026-05-06T11:28:59.486Z | 2026-05-07T17:15:20.242Z |
| CVE-2026-43271 |
N/A
|
md-cluster: fix NULL pointer dereference in process_me… |
Linux |
Linux |
2026-05-06T11:28:55.507Z | 2026-05-07T17:15:17.948Z |
| CVE-2026-43269 |
N/A
|
drm/atmel-hlcdc: fix memory leak from the atomic_destr… |
Linux |
Linux |
2026-05-06T11:28:54.178Z | 2026-05-07T17:15:16.762Z |
| CVE-2026-43268 |
N/A
|
hfsplus: pretend special inodes as regular files |
Linux |
Linux |
2026-05-06T11:28:53.534Z | 2026-05-07T17:15:15.634Z |
| CVE-2026-43267 |
N/A
|
wifi: rtw89: fix potential zero beacon interval in bea… |
Linux |
Linux |
2026-05-06T11:28:52.887Z | 2026-05-07T17:15:14.362Z |
| CVE-2026-43266 |
N/A
|
EFI/CPER: don't go past the ARM processor CPER record buffer |
Linux |
Linux |
2026-05-06T11:28:52.238Z | 2026-05-07T17:15:13.111Z |
| CVE-2026-43262 |
N/A
|
gfs2: fiemap page fault fix |
Linux |
Linux |
2026-05-06T11:28:49.480Z | 2026-05-07T17:15:11.973Z |
| CVE-2026-43261 |
N/A
|
arm64: Add support for TSV110 Spectre-BHB mitigation |
Linux |
Linux |
2026-05-06T11:28:48.823Z | 2026-05-07T17:15:10.837Z |
| CVE-2026-43255 |
N/A
|
wifi: libertas: fix WARNING in usb_tx_block |
Linux |
Linux |
2026-05-06T11:28:44.522Z | 2026-05-07T17:15:08.483Z |
| CVE-2026-43251 |
N/A
|
HID: prodikeys: Check presence of pm->input_ep82 |
Linux |
Linux |
2026-05-06T11:28:41.835Z | 2026-05-07T17:15:05.932Z |
| CVE-2026-43250 |
N/A
|
usb: chipidea: udc: fix DMA and SG cleanup in _ep_nuke() |
Linux |
Linux |
2026-05-06T11:28:41.158Z | 2026-05-07T17:15:04.762Z |
| CVE-2026-43243 |
N/A
|
drm/amd/display: Add signal type check for dcn401 get_… |
Linux |
Linux |
2026-05-06T11:28:36.287Z | 2026-05-07T17:15:00.425Z |
| CVE-2026-43241 |
N/A
|
ntb: ntb_hw_switchtec: Fix array-index-out-of-bounds access |
Linux |
Linux |
2026-05-06T11:28:34.927Z | 2026-05-07T17:14:58.964Z |
| CVE-2026-43228 |
N/A
|
hfs: Replace BUG_ON with error handling for CNID count… |
Linux |
Linux |
2026-05-06T11:28:26.292Z | 2026-05-07T17:14:53.111Z |
| CVE-2026-43227 |
N/A
|
clocksource/drivers/sh_tmu: Always leave device runnin… |
Linux |
Linux |
2026-05-06T11:28:25.629Z | 2026-05-07T17:14:51.949Z |
| CVE-2026-43225 |
N/A
|
staging: rtl8723bs: fix memory leak on failure path |
Linux |
Linux |
2026-05-06T11:28:24.289Z | 2026-05-07T17:14:49.605Z |
| CVE-2026-43223 |
N/A
|
media: pvrusb2: fix URB leak in pvr2_send_request_ex |
Linux |
Linux |
2026-05-06T11:28:22.952Z | 2026-05-07T17:14:48.459Z |
| CVE-2026-43209 |
N/A
|
minix: Add required sanity checking to minix_check_sup… |
Linux |
Linux |
2026-05-06T11:28:12.965Z | 2026-05-07T17:14:43.716Z |
| CVE-2026-43204 |
N/A
|
ASoC: qcom: q6asm: drop DSP responses for closed data … |
Linux |
Linux |
2026-05-06T11:28:09.617Z | 2026-05-07T17:14:41.440Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-34458 |
9.3 (4.0)
|
Sandboxie-Plus privilege escalation via INI CRLF injec… |
sandboxie-plus |
Sandboxie |
2026-05-05T19:24:05.638Z | 2026-05-07T03:55:37.436Z |
| CVE-2026-8083 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SourceCodester Pharmacy Sales and Inventory System aja… |
SourceCodester |
Pharmacy Sales and Inventory System |
2026-05-07T18:15:09.651Z | 2026-05-07T19:14:18.598Z |
| CVE-2026-8084 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
OSGeo gdal HDF-EOS Grid File SWapi.c memmove out-of-bounds |
OSGeo |
gdal |
2026-05-07T18:30:13.275Z | 2026-05-07T18:30:13.275Z |
| CVE-2026-34459 |
8.8 (4.0)
|
Sandboxie-Plus sandbox escape via uninitialized memory… |
sandboxie-plus |
Sandboxie |
2026-05-05T19:27:31.552Z | 2026-05-07T03:55:38.523Z |
| CVE-2026-34461 |
7.3 (4.0)
|
Sandboxie-Plus SbieIniServer RunSbieCtrl stack buffer … |
sandboxie-plus |
Sandboxie |
2026-05-05T19:28:44.675Z | 2026-05-07T12:56:42.689Z |
| CVE-2026-34462 |
7.3 (4.0)
|
Sandboxie-Plus ProcessServer boxname stack buffer over… |
sandboxie-plus |
Sandboxie |
2026-05-05T19:30:37.189Z | 2026-05-07T12:56:03.593Z |
| CVE-2026-34464 |
8.8 (4.0)
|
Sandboxie-Plus NamedPipeServer OpenHandler stack overf… |
sandboxie-plus |
Sandboxie |
2026-05-05T19:31:54.814Z | 2026-05-07T12:55:33.153Z |
| CVE-2026-23666 |
7.5 (3.1)
|
.NET Framework Denial of Service Vulnerability |
Microsoft |
Microsoft .NET Framework 3.5 |
2026-04-14T16:57:53.069Z | 2026-04-30T14:41:48.509Z |
| CVE-2026-41642 |
7.5 (3.1)
|
GoBGP: Remote Denial of Service (Panic) via Malformed … |
osrg |
gobgp |
2026-05-07T11:50:41.545Z | 2026-05-07T12:34:38.588Z |
| CVE-2026-34596 |
5.4 (4.0)
|
Sandboxie-Plus local privilege escalation via TOCTOU r… |
sandboxie-plus |
Sandboxie |
2026-05-05T19:34:50.986Z | 2026-05-07T03:55:42.959Z |
| CVE-2026-41643 |
7.5 (3.1)
|
GoBGP: Remote Denial of Service (Panic) in UpdatePathA… |
osrg |
gobgp |
2026-05-07T11:53:23.566Z | 2026-05-07T13:39:04.425Z |
| CVE-2026-26171 |
7.5 (3.1)
|
.NET Denial of Service Vulnerability |
Microsoft |
.NET 10.0 |
2026-04-14T16:58:37.655Z | 2026-04-30T14:42:30.712Z |
| CVE-2026-44112 |
6 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.4.22 - Symlink Swap Race Condition in … |
OpenClaw |
OpenClaw |
2026-05-06T19:49:29.626Z | 2026-05-07T17:28:12.165Z |
| CVE-2026-44111 |
2.3 (4.0)
4.3 (3.1)
|
OpenClaw < 2026.4.15 - Arbitrary Markdown File Read vi… |
OpenClaw |
OpenClaw |
2026-05-06T19:49:29.004Z | 2026-05-07T13:36:58.876Z |
| CVE-2026-32178 |
7.5 (3.1)
|
.NET Spoofing Vulnerability |
Microsoft |
.NET 10.0 |
2026-04-14T16:57:31.355Z | 2026-04-30T14:41:28.172Z |
| CVE-2026-44110 |
7.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.4.15 - Authorization Bypass in Matrix… |
OpenClaw |
OpenClaw |
2026-05-06T19:49:28.347Z | 2026-05-07T13:58:12.038Z |
| CVE-2026-44109 |
9.2 (4.0)
9.8 (3.1)
|
OpenClaw < 2026.4.15 - Authentication Bypass in Feishu… |
OpenClaw |
OpenClaw |
2026-05-06T19:49:27.637Z | 2026-05-07T12:35:11.405Z |
| CVE-2026-43585 |
9.2 (4.0)
8.1 (3.1)
|
OpenClaw < 2026.4.15 - Bearer Token Validation Bypass … |
OpenClaw |
OpenClaw |
2026-05-06T19:49:26.877Z | 2026-05-07T13:53:33.902Z |
| CVE-2026-43584 |
8.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.4.10 - Insufficient Environment Variab… |
OpenClaw |
OpenClaw |
2026-05-06T19:49:26.146Z | 2026-05-07T14:59:24.866Z |
| CVE-2026-31743 |
7.8 (3.1)
|
nvmem: zynqmp_nvmem: Fix buffer size in DMA and memcpy |
Linux |
Linux |
2026-05-01T14:14:38.154Z | 2026-05-03T05:45:44.831Z |
| CVE-2026-43583 |
6 (4.0)
5.3 (3.1)
|
OpenClaw 2026.4.10 < 2026.4.14 - Loss of Group Tool-Po… |
OpenClaw |
OpenClaw |
2026-05-06T19:49:25.474Z | 2026-05-07T17:30:28.366Z |
| CVE-2026-43582 |
4.9 (4.0)
6.3 (3.1)
|
OpenClaw < 2026.4.10 - DNS Rebinding SSRF via Hostname… |
OpenClaw |
OpenClaw |
2026-05-06T19:49:24.759Z | 2026-05-07T12:32:09.498Z |
| CVE-2026-31744 |
N/A
|
PM: EM: Fix NULL pointer dereference when perf domain … |
Linux |
Linux |
2026-05-01T14:14:38.820Z | 2026-05-01T14:14:38.820Z |
| CVE-2026-31745 |
N/A
|
reset: gpio: fix double free in reset_add_gpio_aux_dev… |
Linux |
Linux |
2026-05-01T14:14:39.529Z | 2026-05-01T14:14:39.529Z |
| CVE-2026-31440 |
N/A
|
dmaengine: idxd: Fix leaking event log memory |
Linux |
Linux |
2026-04-22T13:53:38.388Z | 2026-04-22T13:53:38.388Z |
| CVE-2026-31441 |
N/A
|
dmaengine: idxd: Fix memory leak when a wq is reset |
Linux |
Linux |
2026-04-22T13:53:39.055Z | 2026-04-22T13:53:39.055Z |
| CVE-2026-31746 |
N/A
|
s390/zcrypt: Fix memory leak with CCA cards used as ac… |
Linux |
Linux |
2026-05-01T14:14:40.196Z | 2026-05-01T14:14:40.196Z |
| CVE-2026-31442 |
7.8 (3.1)
|
dmaengine: idxd: Fix possible invalid memory access af… |
Linux |
Linux |
2026-04-22T13:53:39.895Z | 2026-04-27T14:03:09.016Z |
| CVE-2026-31443 |
N/A
|
dmaengine: idxd: Fix crash when the event log is disabled |
Linux |
Linux |
2026-04-22T13:53:40.616Z | 2026-04-22T13:53:40.616Z |
| CVE-2026-31747 |
N/A
|
comedi: me4000: Fix potential overrun of firmware buffer |
Linux |
Linux |
2026-05-01T14:14:40.844Z | 2026-05-01T14:14:40.844Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-41662 | Admidio is an open-source user management solution. Prior to version 5.0.9, Role::stopMembership() … | 2026-05-07T04:16:30.080 | 2026-05-07T15:16:08.350 |
| fkie_cve-2026-41659 | Admidio is an open-source user management solution. Prior to version 5.0.9, the member assignment D… | 2026-05-07T04:16:29.567 | 2026-05-07T15:16:08.253 |
| fkie_cve-2026-41658 | Admidio is an open-source user management solution. Prior to version 5.0.9, the Admidio inventory m… | 2026-05-07T04:16:29.407 | 2026-05-07T15:16:08.150 |
| fkie_cve-2026-41656 | Admidio is an open-source user management solution. Prior to version 5.0.9, the add mode in modules… | 2026-05-07T04:16:28.633 | 2026-05-07T15:16:08.050 |
| fkie_cve-2026-41587 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture … | 2026-05-07T04:16:27.860 | 2026-05-07T15:16:07.307 |
| fkie_cve-2026-41417 | Netty allows request-line validation to be bypassed when a `DefaultHttpRequest` or `DefaultFullHttp… | 2026-05-06T22:16:25.780 | 2026-05-07T15:16:06.703 |
| fkie_cve-2026-41203 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture … | 2026-05-07T04:16:27.670 | 2026-05-07T15:16:06.593 |
| fkie_cve-2026-40243 | Incus is a system container and virtual machine manager. In versions before 7.0.0, broken TLS valid… | 2026-05-06T21:16:01.070 | 2026-05-07T15:16:05.950 |
| fkie_cve-2026-40076 | OpenMRS Core is an open source electronic medical record system platform. In versions 2.7.8 and ear… | 2026-05-06T20:16:31.727 | 2026-05-07T15:16:05.647 |
| fkie_cve-2026-37532 | AGL agl-service-can-low-level thru 17.1.12 contains a heap buffer over-read in the isotp-c library.… | 2026-05-01T17:16:22.897 | 2026-05-07T15:15:55.993 |
| fkie_cve-2026-37531 | AGL app-framework-main thru 17.1.12 contains a Zip Slip path traversal vulnerability (CWE-22) combi… | 2026-05-01T17:16:22.720 | 2026-05-07T15:15:55.993 |
| fkie_cve-2026-37526 | AGL app-framework-binder (afb-daemon) through v19.90.0 allows any local process to execute privileg… | 2026-05-01T17:16:22.440 | 2026-05-07T15:15:55.993 |
| fkie_cve-2026-37525 | AGL app-framework-binder (afb-daemon) through v19.90.0 contains a privilege escalation vulnerabilit… | 2026-05-01T17:16:22.270 | 2026-05-07T15:15:55.993 |
| fkie_cve-2026-8022 | Inappropriate implementation in MHTML in Google Chrome prior to 148.0.7778.96 allowed a remote atta… | 2026-05-06T19:16:53.153 | 2026-05-07T15:15:31.760 |
| fkie_cve-2026-7841 | A remote code execution vulnerability exists in Notification Settings on GeoVision GV-ASWeb 6.2.0. … | 2026-05-06T08:16:04.490 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-43964 | Postfix before 3.8.16, 3.9 before 3.9.10, and 3.10 before 3.10.9 sometimes allows a buffer over-rea… | 2026-05-04T19:16:07.143 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-42481 | Open CASCADE Technology (OCCT) V8_0_0_rc5 contains multiple vulnerabilities in its IGES and STEP fi… | 2026-05-01T16:16:32.163 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-42154 | Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 an… | 2026-05-04T19:16:04.397 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-42151 | Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 an… | 2026-05-04T19:16:04.220 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-42138 | Dify is an open-source LLM app development platform. Prior to version 1.13.1, using the method POST… | 2026-05-04T18:16:31.523 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-42091 | goshs is a SimpleHTTPServer written in Go. Prior to version 2.0.2, the PUT upload handler (httpserv… | 2026-05-04T18:16:31.210 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-41686 | Claude SDK for TypeScript provides access to the Claude API from server-side TypeScript or JavaScri… | 2026-05-04T19:16:03.883 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-41139 | Math.js is an extensive math library for JavaScript and Node.js. From version 13.1.0 to before vers… | 2026-05-07T06:16:04.273 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-39103 | Buffer Overflow vulnerability in GPAC before commit v391dc7f4d234988ea0bc3cc294eb725eddf8f702 allow… | 2026-05-05T16:16:12.993 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-38432 | ERPNext v15.103.1 and before is vulnerable to Cross Site Scripting (XSS) in the Email Template engi… | 2026-05-05T17:17:04.800 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-38431 | ERPNext v15.103.1 and before is vulnerable to Server-Side Template Injection (SSTI). An attacker wi… | 2026-05-05T17:17:04.670 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-37534 | Integer underflow vulnerability in Open-SAE-J1939 thru commit b6caf884df46435e539b1ecbf92b6c29b345b… | 2026-05-01T17:16:23.073 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-37530 | AGL agl-service-can-low-level thru 17.1.12 contains a stack buffer overflow in the uds-c library. T… | 2026-05-01T17:16:22.603 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-37457 | An off-by-one out-of-bounds write vulnerability in the bgp_flowspec_op_decode() function (bgpd/bgp_… | 2026-05-01T18:16:14.770 | 2026-05-07T15:15:06.770 |
| fkie_cve-2026-35453 | PhpSpreadsheet is a library for reading and writing spreadsheet files. In versions 1.30.3 and earli… | 2026-05-05T20:16:38.367 | 2026-05-07T15:15:06.770 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-5jxr-5v22-49gf |
9.8 (3.1)
|
The MQTT broker embedded in Yarbo firmware v2.3.9 is configured to allow anonymous connections with… | 2026-05-07T18:30:40Z | 2026-05-07T18:30:40Z |
| ghsa-587p-w43q-4hjx |
|
NPM package query-parser-string 1.0.0 is vulnerable to Prototype Pollution. The package does not pr… | 2026-05-07T18:30:40Z | 2026-05-07T18:30:40Z |
| ghsa-36fg-ffjj-h5p6 |
7.2 (3.1)
|
An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1 allows… | 2026-05-07T18:30:40Z | 2026-05-07T18:30:40Z |
| ghsa-x72j-hv9f-qqh4 |
|
npm package parse-ini v1.0.6 is vulnerable to Prototype Pollution in index.js(). | 2026-05-07T18:30:39Z | 2026-05-07T18:30:39Z |
| ghsa-f8v9-5h44-4grj |
6.8 (3.1)
|
Medtronic MyCareLink Patient Monitor uses per-product credentials that are stored in a recoverable … | 2026-05-07T18:30:39Z | 2026-05-07T18:30:39Z |
| ghsa-5jrf-mrg6-w477 |
6.8 (3.1)
|
Medtronic MyCareLink Patient Monitor has an internal serial interface, which allows an attacker wit… | 2026-05-07T18:30:39Z | 2026-05-07T18:30:39Z |
| ghsa-jx5x-3wf9-9rhg |
|
Incorrect boundary conditions in the Audio/Video: Playback component. This vulnerability was fixed … | 2026-05-07T15:38:40Z | 2026-05-07T18:30:38Z |
| ghsa-mp4f-c4m3-gxr6 |
2.6 (3.1)
|
HCL BigFix Service Management (SM) is affected by an Information Disclosure – Server Banner issue w… | 2026-05-06T15:32:41Z | 2026-05-07T18:30:37Z |
| ghsa-jfx8-f9m6-qfgw |
3.7 (3.1)
|
HCL BigFix Service Management (SM) is affected by a security misconfiguration due to a missing or i… | 2026-05-06T15:32:41Z | 2026-05-07T18:30:37Z |
| ghsa-fppw-h33v-vf9v |
2.6 (3.1)
|
HHCL BigFix Service Management (SM) is affected by a Cross‑Site Request Forgery (CSRF) vulnerabilit… | 2026-05-06T15:32:41Z | 2026-05-07T18:30:37Z |
| ghsa-42p7-cwm7-4cjg |
8.8 (3.1)
9.3 (4.0)
|
NanoClaw contains a host/container filesystem boundary vulnerability in outbound attachment handlin… | 2026-05-06T18:30:31Z | 2026-05-07T18:30:37Z |
| ghsa-3vfh-3cpw-2378 |
9.8 (3.1)
9.3 (4.0)
|
A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service … | 2026-05-06T21:31:36Z | 2026-05-07T18:30:37Z |
| ghsa-mjw2-gf6p-382h |
7.5 (3.1)
|
Gazelle versions through 0.49 for Perl allows HTTP Request Smuggling via Improper Header Precedence… | 2026-05-06T15:32:40Z | 2026-05-07T18:30:36Z |
| ghsa-mf6r-pgpm-mqvq |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: scsi: target: tcm_loop: Drain … | 2026-05-01T15:30:37Z | 2026-05-07T18:30:35Z |
| ghsa-37p6-c4xv-cq5q |
4.7 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: xfs: close crash window in att… | 2026-05-01T15:30:37Z | 2026-05-07T18:30:35Z |
| ghsa-2xqx-75wg-w86v |
5.3 (3.1)
|
Starlet versions through 0.31 for Perl allows HTTP Request Smuggling via Improper Header Precedence… | 2026-05-03T03:30:28Z | 2026-05-07T18:30:35Z |
| ghsa-wvvv-xpqm-98cj |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: thermal: core: Address thermal… | 2026-05-01T15:30:34Z | 2026-05-07T18:30:34Z |
| ghsa-vr6v-mm3h-f67m |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix is_bpf_migratio… | 2026-05-01T15:30:34Z | 2026-05-07T18:30:34Z |
| ghsa-pp62-pwj6-ppp4 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_ppe: avoid … | 2026-05-01T15:30:34Z | 2026-05-07T18:30:34Z |
| ghsa-m9p5-m8gg-jgg8 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: fix NULL poi… | 2026-05-01T15:30:34Z | 2026-05-07T18:30:34Z |
| ghsa-jhj6-5p6x-hw75 |
7.0 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: atm: lec: fix use-after-free i… | 2026-05-01T15:30:37Z | 2026-05-07T18:30:34Z |
| ghsa-j5xm-hgh6-vq4q |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check tdls fla… | 2026-05-01T15:30:37Z | 2026-05-07T18:30:34Z |
| ghsa-fhp6-cw2v-3rqj |
4.7 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_ether: Fix race… | 2026-05-01T15:30:34Z | 2026-05-07T18:30:34Z |
| ghsa-8r84-g6v2-vrq6 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: possible double… | 2026-05-01T15:30:34Z | 2026-05-07T18:30:34Z |
| ghsa-8j24-6c4v-7q4p |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_ether: Fix NULL… | 2026-05-01T15:30:33Z | 2026-05-07T18:30:34Z |
| ghsa-84wx-7549-84g8 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix stale direct di… | 2026-05-01T15:30:34Z | 2026-05-07T18:30:34Z |
| ghsa-77q3-374v-8gp2 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: validate con… | 2026-05-01T15:30:33Z | 2026-05-07T18:30:34Z |
| ghsa-wmw7-jpm9-rmff |
5.7 (3.1)
6.8 (4.0)
|
An external configuration control vulnerability in the OpenVPN module of TP-Link AX53 v1.0 allows a… | 2026-04-08T21:33:32Z | 2026-05-07T18:30:33Z |
| ghsa-p8jh-2mjp-4rwp |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_eem: Fix net_de… | 2026-05-01T15:30:33Z | 2026-05-07T18:30:33Z |
| ghsa-j7cp-5j3g-7q5w |
4.7 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: fix folio isn'… | 2026-04-22T15:31:42Z | 2026-05-07T18:30:33Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-110 |
4.7 (3.1)
|
A sensitive data leakage vulnerability was identified in scikit-learn's TfidfVectorizer, … | scikit-learn | 2024-06-06T19:16:00+00:00 | 2024-10-24T21:22:05.950602+00:00 |
| pysec-2024-107 |
5.0 (3.1)
|
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modif… | exiv2 | 2024-02-12T23:15:00+00:00 | 2024-10-23T00:00:00+00:00 |
| pysec-2024-106 |
5.0 (3.1)
|
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modif… | exiv2 | 2024-02-12T23:15:00+00:00 | 2024-10-23T00:00:00+00:00 |
| pysec-2024-109 |
7.8 (3.1)
|
DeepSpeed Remote Code Execution Vulnerability | deepspeed | 2024-10-08T18:15:00+00:00 | 2024-10-17T23:22:43.000269+00:00 |
| pysec-2024-108 |
7.5 (3.1)
|
A path traversal vulnerability exists in the parisneo/lollms application, affecting versi… | lollms | 2024-06-06T19:16:00+00:00 | 2024-10-17T17:21:59.592496+00:00 |
| pysec-2021-879 |
6.5 (3.1)
|
An uncontrolled memory allocation in DataBufdata(subBox.length-sizeof(box)) function of E… | exiv2 | 2021-08-19T22:15:00+00:00 | 2024-10-15T17:22:01.866867+00:00 |
| pysec-2024-105 |
3.1 (3.1)
|
A race condition vulnerability exists in zenml-io/zenml versions up to and including 0.55… | zenml | 2024-06-06T19:15:00+00:00 | 2024-10-11T17:21:29.672975+00:00 |
| pysec-2024-104 |
5.3 (3.1)
|
A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of … | jwcrypto | 2024-02-12T14:15:00+00:00 | 2024-10-10T17:22:00.587279+00:00 |
| pysec-2024-103 |
9.8 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. The `concat… | vyper | 2024-01-18T19:15:00+00:00 | 2024-10-09T23:22:49.818476+00:00 |
| pysec-2023-262 |
9.8 (3.1)
|
main.py in Searchor before 2.4.2 uses eval on CLI input, which may cause unexpected code … | searchor | 2023-12-12T18:15:00+00:00 | 2024-10-09T19:20:24.594458+00:00 |
| pysec-2023-243 |
7.4 (3.1)
|
Missing SSL certificate validation in localstack v2.3.2 allows attackers to eavesdrop on … | localstack | 2023-11-16T18:15:00Z | 2024-10-09T12:05:48.156835Z |
| pysec-2024-102 |
|
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.… | django | 2024-10-08T16:15:00+00:00 | 2024-10-08T19:19:01.400873+00:00 |
| pysec-2024-101 |
6.5 (3.1)
|
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from… | openc3 | 2024-10-02T20:15:00+00:00 | 2024-10-08T17:22:06.539206+00:00 |
| pysec-2024-100 |
6.1 (3.1)
|
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from… | openc3 | 2024-10-02T20:15:00+00:00 | 2024-10-08T17:22:06.493109+00:00 |
| pysec-2024-99 |
7.5 (3.1)
|
OpenSlides 4.0.15 was discovered to be using a weak hashing algorithm to store passwords. | openslides | 2024-09-25T15:15:00+00:00 | 2024-10-01T21:22:35.777428+00:00 |
| pysec-2023-261 |
9.8 (3.1)
|
SAP BTP Security Services Integration Library ([Python] sap-xssec) - versions < 4.1.0, al… | sap-xssec | 2023-12-12T02:15:00+00:00 | 2024-09-29T00:37:11.092461+00:00 |
| pysec-2024-98 |
9.8 (3.1)
|
** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Submarine… | apache-submarine | 2024-06-12T15:15:00+00:00 | 2024-09-26T17:22:54.526846+00:00 |
| pysec-2024-97 |
9.8 (3.1)
|
** UNSUPPORTED WHEN ASSIGNED ** Improper Authentication vulnerability in Apache Submarine… | apache-submarine | 2024-06-12T14:15:00+00:00 | 2024-09-26T17:22:54.470974+00:00 |
| pysec-2024-96 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-string | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:56.151249+00:00 |
| pysec-2024-95 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-os-path | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:56.045949+00:00 |
| pysec-2024-94 |
8.1 (3.1)
|
A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affect… | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.930133+00:00 |
| pysec-2024-93 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.864558+00:00 |
| pysec-2024-92 |
8.1 (3.1)
|
A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affect… | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.787891+00:00 |
| pysec-2024-91 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.729708+00:00 |
| pysec-2024-90 |
6.1 (3.1)
|
Indico is an event management system that uses Flask-Multipass, a multi-backend authentic… | indico | 2024-09-04T20:15:00+00:00 | 2024-09-25T06:23:55.564403+00:00 |
| pysec-2024-89 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-os | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.689786+00:00 |
| pysec-2024-88 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.570550+00:00 |
| pysec-2024-87 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.445188+00:00 |
| pysec-2024-86 |
4.9 (3.1)
|
Wagtail is an open source content management system built on Django. A bug in Wagtail's `… | wagtail | 2024-07-11T16:15:00+00:00 | 2024-09-19T19:20:17.668744+00:00 |
| pysec-2024-72 |
8.8 (3.1)
|
LF Edge eKuiper is a lightweight IoT data analytics and stream processing engine running … | ekuiper | 2024-08-20T15:15:00Z | 2024-09-18T07:04:07.042699Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33523 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.634683Z |
| gsd-2024-33522 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.605717Z |
| gsd-2024-33521 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.759531Z |
| gsd-2024-33520 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.731072Z |
| gsd-2024-33519 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.616036Z |
| gsd-2024-33518 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.701479Z |
| gsd-2024-33517 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.679527Z |
| gsd-2024-33516 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.726125Z |
| gsd-2024-33515 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.719673Z |
| gsd-2024-33514 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.707115Z |
| gsd-2024-33513 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.687157Z |
| gsd-2024-33512 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.696971Z |
| gsd-2024-33511 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.739229Z |
| gsd-2024-33510 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.737559Z |
| gsd-2024-33509 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.713025Z |
| gsd-2024-33508 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.631914Z |
| gsd-2024-33507 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.762188Z |
| gsd-2024-33506 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.716022Z |
| gsd-2024-33505 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.761772Z |
| gsd-2024-33504 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.762620Z |
| gsd-2024-33503 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.740448Z |
| gsd-2024-33502 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.617928Z |
| gsd-2024-33501 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.618843Z |
| gsd-2024-33500 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.681053Z |
| gsd-2024-33499 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.696759Z |
| gsd-2024-33498 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.620725Z |
| gsd-2024-33497 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.608373Z |
| gsd-2024-33496 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.734379Z |
| gsd-2024-33495 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.615415Z |
| gsd-2024-33494 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.649122Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2615 | Malicious code in upstartadmindashboard- (npm) | 2026-04-12T10:05:00Z | 2026-04-23T20:50:52Z |
| mal-2026-2614 | Malicious code in upstart.previewcss (npm) | 2026-04-12T09:51:07Z | 2026-04-23T20:50:52Z |
| mal-2026-2613 | Malicious code in upstart-offer-container (npm) | 2026-04-12T10:46:10Z | 2026-04-23T20:50:52Z |
| mal-2026-2612 | Malicious code in upstart-loan-status (npm) | 2026-04-12T09:52:52Z | 2026-04-23T20:50:52Z |
| mal-2026-2611 | Malicious code in upstart-lending-status (npm) | 2026-04-12T10:00:59Z | 2026-04-23T20:50:52Z |
| mal-2026-2610 | Malicious code in twilio-video.js (npm) | 2026-04-13T15:25:20Z | 2026-04-23T20:50:52Z |
| mal-2026-2609 | Malicious code in trade-in-lib (npm) | 2026-04-13T15:25:20Z | 2026-04-23T20:50:52Z |
| mal-2026-2608 | Malicious code in symphony-core (npm) | 2026-04-13T15:25:19Z | 2026-04-23T20:50:52Z |
| mal-2026-2607 | Malicious code in stats-api-js-client (npm) | 2026-04-13T15:25:20Z | 2026-04-23T20:50:52Z |
| mal-2026-2566 | Malicious code in wm-plugin-visions-recorder (npm) | 2026-04-12T06:09:38Z | 2026-04-23T20:50:52Z |
| mal-2026-3021 | Malicious code in lightspark-js (npm) | 2026-04-23T17:50:48Z | 2026-04-23T20:50:51Z |
| mal-2026-3008 | Malicious code in json-spacer (npm) | 2026-04-23T04:42:45Z | 2026-04-23T20:50:51Z |
| mal-2026-2991 | Malicious code in pgserve (npm) | 2026-04-22T13:51:55Z | 2026-04-23T20:50:51Z |
| mal-2026-2955 | Malicious code in megabank-worklist (npm) | 2026-04-20T15:51:23Z | 2026-04-23T20:50:51Z |
| mal-2026-2942 | Malicious code in optimized-fastest-levenshtein (npm) | 2026-04-20T06:15:42Z | 2026-04-23T20:50:51Z |
| mal-2026-2941 | Malicious code in npm-doc-deploy (npm) | 2026-04-20T06:34:59Z | 2026-04-23T20:50:51Z |
| mal-2026-2940 | Malicious code in mailcraftjs (npm) | 2026-04-20T06:15:42Z | 2026-04-23T20:50:51Z |
| mal-2026-2939 | Malicious code in krdfonts (npm) | 2026-04-20T06:23:38Z | 2026-04-23T20:50:51Z |
| mal-2026-2929 | Malicious code in path-extend (npm) | 2026-04-14T09:46:58Z | 2026-04-23T20:50:51Z |
| mal-2026-2928 | Malicious code in pa-marked-internal (npm) | 2026-04-19T18:50:52Z | 2026-04-23T20:50:51Z |
| mal-2026-2927 | Malicious code in pa-marked (npm) | 2026-04-19T17:21:07Z | 2026-04-23T20:50:51Z |
| mal-2026-2926 | Malicious code in material-ui-plugin-cache-endpoint (npm) | 2026-04-17T21:01:14Z | 2026-04-23T20:50:51Z |
| mal-2026-2908 | Malicious code in pretty-logger-js (npm) | 2026-04-16T01:34:06Z | 2026-04-23T20:50:51Z |
| mal-2026-2907 | Malicious code in nj-logger (npm) | 2026-04-16T02:50:55Z | 2026-04-23T20:50:51Z |
| mal-2026-2902 | Malicious code in lockedin-chai-chain (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:51Z |
| mal-2026-2855 | Malicious code in react-resource-router-next (npm) | 2026-04-18T11:17:25Z | 2026-04-23T20:50:51Z |
| mal-2026-2853 | Malicious code in react-hook-form (npm) | 2026-04-18T07:33:44Z | 2026-04-23T20:50:51Z |
| mal-2026-2845 | Malicious code in node-red-contrib-yolo-object-detection (npm) | 2026-04-17T11:30:45Z | 2026-04-23T20:50:51Z |
| mal-2026-2838 | Malicious code in koa-v3 (npm) | 2026-04-17T10:20:59Z | 2026-04-23T20:50:51Z |
| mal-2026-2830 | Malicious code in renovate-config-doctolib (npm) | 2026-04-17T06:20:10Z | 2026-04-23T20:50:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0174 | Oracle Systems: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0172 | Oracle Virtualization: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0159 | Oracle E-Business Suite: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2934 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-29T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2927 | NetApp ActiveIQ Unified Manager: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-28T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2891 | WebKitGTK: Mehrere Schwachstellen ermöglichen Codeausführung und DoS | 2025-12-18T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2888 | ImageMagick: Schwachstelle ermöglicht Denial of Service | 2025-12-18T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2751 | WebKitGTK: Mehrere Schwachstellen | 2025-12-04T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2657 | WebKitGTK: Mehrere Schwachstellen | 2025-11-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2607 | Red Hat Enterprise Linux (lasso): Eine Schwachstelle ermöglichen Codeausführung | 2025-11-16T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2449 | GIMP: Schwachstelle ermöglicht Codeausführung | 2025-10-29T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2392 | Internet Systems Consortium BIND: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2269 | WebKitGTK: Schwachstelle ermöglicht Denial of Service und potenziell Codeausführung | 2025-10-13T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2153 | VMware Cloud Foundation, vSphere, Aria Operations und Tools: Mehrere Schwachstellen | 2025-09-29T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2104 | WebKitGTK: Mehrere Schwachstellen | 2025-09-22T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2101 | Ghostscript: Schwachstellen ermöglichen Codeausführung | 2025-09-21T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2087 | Linux Kernel: Mehrere Schwachstellen | 2025-09-17T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2039 | CUPS: Mehrere Schwachstellen | 2025-09-11T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1828 | PAM (linux-pam package): Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-08-13T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1754 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-10T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1748 | libarchive: Schwachstelle ermöglicht Denial of Service und potenziell Codeausführung | 2025-08-07T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1732 | Red Hat Enterprise Linux (libxslt): Schwachstelle ermöglicht Codeausführung | 2025-08-06T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1646 | Red Hat Enterprise Linux (nodejs, perl): Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1637 | GNU libc: Schwachstelle ermöglicht unspezifischen Angriff | 2025-07-23T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1575 | vim (.tar and .zip): Mehrere Schwachstellen ermöglichen Codeausführung | 2025-07-15T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1546 | Red Hat Enterprise Linux (GLib): Schwachstelle ermöglicht Denial of Service | 2025-07-14T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1526 | GnuTLS: Mehrere Schwachstellen | 2025-07-09T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1385 | libssh: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-24T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1339 | PAM: Schwachstelle ermöglicht Privilegieneskalation | 2025-06-17T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1318 | Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-12T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-182-05 | Voltronic Power and PowerShield UPS monitoring software | 2025-07-01T06:00:00.000000Z | 2025-07-01T06:00:00.000000Z |
| icsa-16-306-02 | IBHsoftec S7-SoftPLC CPX43 Heap-based Buffer Overflow Vulnerability | 2016-08-05T06:00:00.000000Z | 2025-06-26T14:48:20.911473Z |
| icsa-16-287-07a | Kabona AB WDC Vulnerabilities (Update A) | 2016-07-17T06:00:00.000000Z | 2025-06-26T14:47:55.479923Z |
| icsa-25-177-02 | TrendMakers Sight Bulb Pro | 2025-06-26T05:00:00.000000Z | 2025-06-26T05:00:00.000000Z |
| icsa-15-202-02 | Siemens Sm@rtClient Password Storage Vulnerability | 2015-04-23T06:00:00.000000Z | 2025-06-25T22:54:14.268360Z |
| icsa-15-202-01 | Siemens SIPROTEC Denial-of-Service Vulnerability | 2015-04-23T06:00:00.000000Z | 2025-06-25T22:54:08.041405Z |
| icsa-15-062-02 | Rockwell Automation FactoryTalk DLL Hijacking Vulnerabilities | 2015-12-04T07:00:00.000000Z | 2025-06-25T22:54:01.269590Z |
| icsa-14-086-01a | Schneider Electric Serial Modbus Driver Buffer Overflow (Update A) | 2014-12-28T07:00:00.000000Z | 2025-06-25T22:09:32.885385Z |
| icsa-13-254-01 | Siemens SCALANCE X-200 Web Hijack Vulnerability | 2013-06-14T06:00:00.000000Z | 2025-06-25T21:45:19.939275Z |
| icsa-13-140-01 | Mitsubishi Electric Automation MX Component V3 ActiveX Vulnerability | 2013-02-21T07:00:00.000000Z | 2025-06-25T21:45:13.353340Z |
| icsa-12-256-01 | Siemens WinCC WebNavigator Multiple Vulnerabilities | 2012-06-16T06:00:00.000000Z | 2025-06-25T18:57:28.717208Z |
| icsa-12-145-02 | xArrow Multiple Vulnerabilities | 2012-02-25T07:00:00.000000Z | 2025-06-25T18:57:03.441531Z |
| icsa-11-122-01 | AzeoTech DAQFactory Networking Vulnerabilities | 2011-02-02T07:00:00.000000Z | 2025-06-25T18:13:52.027870Z |
| icsa-16-231-01-0 | Locus Energy LGate Command Injection Vulnerability | 2016-05-22T06:00:00.000000Z | 2025-06-25T18:13:45.800180Z |
| icsa-16-231-01 | Navis WebAccess SQL Injection Vulnerability | 2016-05-22T06:00:00.000000Z | 2025-06-25T18:13:39.538321Z |
| icsa-16-208-01c | Siemens SIMATIC WinCC, PCS 7, and WinCC Runtime Professional Vulnerabilities (Update C) | 2016-04-29T06:00:00.000000Z | 2025-06-25T18:13:26.602224Z |
| icsa-16-189-01 | WECON LeviStudio Buffer Overflow Vulnerabilities | 2016-04-10T06:00:00.000000Z | 2025-06-25T15:02:08.772345Z |
| icsa-15-335-02 | Schneider Electric ProClima ActiveX Control Vulnerabilities | 2015-09-03T06:00:00.000000Z | 2025-06-25T15:02:02.107190Z |
| icsa-25-182-07 | Hitachi Energy MSM | 2025-06-24T12:30:00.000000Z | 2025-06-24T12:30:00.000000Z |
| icsa-25-175-07 | MICROSENS NMP Web+ | 2025-06-24T06:00:00.000000Z | 2025-06-24T06:00:00.000000Z |
| icsa-25-175-06 | Parsons AccuWeather widget | 2025-06-24T06:00:00.000000Z | 2025-06-24T06:00:00.000000Z |
| icsa-25-175-05 | ControlID iDSecure On-premises | 2025-06-24T06:00:00.000000Z | 2025-06-24T06:00:00.000000Z |
| icsa-25-175-02 | Delta Electronics CNCSoft | 2025-06-24T06:00:00.000000Z | 2025-06-24T06:00:00.000000Z |
| icsa-25-175-01 | Kaleris Navis N4 Terminal Operating System | 2025-06-24T06:00:00.000000Z | 2025-06-24T06:00:00.000000Z |
| icsa-19-029-02 | Mitsubishi Electric MELSEC-Q Series PLCs | 2019-01-29T07:00:00.000000Z | 2025-06-24T06:00:00.000000Z |
| icsa-25-182-04 | FESTO Hardware Controller, Hardware Servo Press Kit | 2022-07-06T07:00:00.000000Z | 2025-06-23T08:00:00.000000Z |
| icsa-16-145-01a | Moxa MiiNePort Vulnerabilities | 2016-02-25T07:00:00.000000Z | 2025-06-20T18:15:20.614865Z |
| va-25-171-01 | ClamAV | 2025-06-20T00:00:00Z | 2025-06-20T00:00:00Z |
| icsa-12-265-01 | Emerson DeltaV Buffer Overflow | 2012-06-25T06:00:00.000000Z | 2025-06-19T22:40:48.319564Z |
| icsa-12-258-01 | IOServer OPC Server Multiple Vulnerabilities | 2012-06-18T06:00:00.000000Z | 2025-06-19T22:40:41.973320Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cnfd-rwpesc-zaoufyx8 | ConfD CLI Privilege Escalation and Arbitrary File Read and Write Vulnerabilities | 2024-05-15T16:00:00+00:00 | 2024-05-15T16:00:00+00:00 |
| cisco-sa-appd-netvisdos-9znbsjtk | Cisco AppDynamics Network Visibility Service Denial of Service Vulnerability | 2024-05-15T16:00:00+00:00 | 2024-05-15T16:00:00+00:00 |
| cisco-sa-ipphone-multi-vulns-cxahcvs | Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities | 2024-05-01T16:00:00+00:00 | 2024-05-01T16:00:00+00:00 |
| cisco-sa-asaftd-websrvs-dos-x8gnucd2 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability | 2024-04-24T16:00:00+00:00 | 2024-04-24T16:00:00+00:00 |
| cisco-sa-asaftd-websrvs-dos-X8gNucD2 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability | 2024-04-24T16:00:00+00:00 | 2024-04-24T16:00:00+00:00 |
| cisco-sa-asaftd-persist-rce-flsnxf4h | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability | 2024-04-24T16:00:00+00:00 | 2024-04-24T16:00:00+00:00 |
| cisco-sa-asaftd-persist-rce-FLsNXF4h | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability | 2024-04-24T16:00:00+00:00 | 2024-04-24T16:00:00+00:00 |
| cisco-sa-asaftd-cmd-inj-ZJV8Wysm | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability | 2024-04-24T16:00:00+00:00 | 2026-03-04T16:10:59+00:00 |
| cisco-sa-snmp-uwbxfqww | Cisco IOS and IOS XE Software SNMP Extended Named Access Control List Bypass Vulnerability | 2024-04-17T16:00:00+00:00 | 2024-04-17T16:00:00+00:00 |
| cisco-sa-snmp-uwBXfqww | Cisco IOS and IOS XE Software SNMP Extended Named Access Control List Bypass Vulnerability | 2024-04-17T16:00:00+00:00 | 2024-04-17T16:00:00+00:00 |
| cisco-sa-ios-dos-hq4d3tzg | Cisco IOS Software for Catalyst 6000 Series Switches Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-04-04T15:31:55+00:00 |
| cisco-sa-tms-xss-kgw4dx9y | Cisco TelePresence Management Suite Cross-Site Scripting Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-sbiz-rv-xss-oqertup | Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers Cross-Site Scripting Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ndru-pesc-kz2pqlzh | Cisco Nexus Dashboard Privilege Escalation Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ndo-upav-yrqsccsp | Cisco Nexus Dashboard Orchestrator Unauthorized Policy Actions Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ndidv-lmxdvaf2 | Cisco Nexus Dashboard Information Disclosure Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ndfccsrf-temzefj9 | Cisco Nexus Dashboard and Nexus Dashboard Hosted Services Cross-Site Request Forgery Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ndfccsrf-TEmZEfJ9 | Cisco Nexus Dashboard and Nexus Dashboard Hosted Services Cross-Site Request Forgery Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ndfc-dir-trav-ssn3aydw | Cisco Nexus Dashboard Fabric Controller Plug and Play Arbitrary File Read Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ise-ssrf-ftsth5oz | Cisco Identity Services Engine Server-Side Request Forgery Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ise-csrf-nfakxrp5 | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ise-csrf-NfAKXrp5 | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ece-xss-csqxgxfm | Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-cucm-imps-xss-quwkd9yf | Cisco Unified Communications Manager IM & Presence Service Cross-Site Scripting Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-cem-csrf-sucmnjfr | Cisco Emergency Responder Cross-Site Request Forgery and Directory Traversal Vulnerabilities | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-iosxe-utd-cmd-jbl8kvht | Cisco IOS XE Software Unified Threat Defense Command Injection Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-04-02T20:11:04+00:00 |
| cisco-sa-iosxe-utd-cmd-JbL8KvHT | Cisco IOS XE Software Unified Threat Defense Command Injection Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-04-02T20:11:04+00:00 |
| cisco-sa-wlc-mdns-dos-4hv6pbgf | Cisco IOS XE Software for Wireless LAN Controllers Multicast DNS Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-wlc-mdns-dos-4hv6pBGf | Cisco IOS XE Software for Wireless LAN Controllers Multicast DNS Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-lisp-3gyxs3qp | Cisco IOS and IOS XE Software Locator ID Separation Protocol Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-5503 | out-of-bounds write in TLSX_EchChangeSNI via attacker-controlled publicName | 2026-04-02T00:00:00.000Z | 2026-04-30T01:54:08.000Z |
| msrc_cve-2019-1563 | Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey | 2019-09-02T00:00:00.000Z | 2026-04-30T01:54:07.000Z |
| msrc_cve-2026-5507 | Session Cache Restore — Arbitrary Free via Deserialized Pointer | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:59.000Z |
| msrc_cve-2026-5504 | PKCS7 CBC Padding Oracle — Plaintext Recovery | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:50.000Z |
| msrc_cve-2019-1551 | rsaz_512_sqr overflow bug on x86_64 | 2019-12-02T00:00:00.000Z | 2026-04-30T01:53:50.000Z |
| msrc_cve-2026-5393 | OOB Read in DoTls13CertificateVerify with WOLFSSL_DUAL_ALG_CERTS | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:42.000Z |
| msrc_cve-2026-31420 | bridge: mrp: reject zero test interval to avoid OOM panic | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:33.000Z |
| msrc_cve-2026-34477 | Apache Log4j Core: verifyHostName attribute silently ignored in TLS configuration, allowing hostname verification bypass | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:25.000Z |
| msrc_cve-2026-31584 | media: mediatek: vcodec: fix use-after-free in encoder release path | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:23.000Z |
| msrc_cve-2026-31476 | ksmbd: do not expire session on binding failure | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:14.000Z |
| msrc_cve-2026-35206 | Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:12.000Z |
| msrc_cve-2026-31686 | mm/kasan: fix double free for kasan pXds | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:06.000Z |
| msrc_cve-2026-31789 | Heap Buffer Overflow in Hexadecimal Conversion | 2026-04-02T00:00:00.000Z | 2026-04-30T01:53:04.000Z |
| msrc_cve-2026-3298 | Out-of-bounds write in Windows asyncio.ProacterEventLoop.sock_recvfrom_into() when using nbytes | 2026-04-02T00:00:00.000Z | 2026-04-30T01:52:58.000Z |
| msrc_cve-2026-41305 | PostCSS has XSS via Unescaped </style> in its CSS Stringify Output | 2026-04-02T00:00:00.000Z | 2026-04-30T01:52:52.000Z |
| msrc_cve-2026-28390 | Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo | 2026-04-02T00:00:00.000Z | 2026-04-30T01:52:51.000Z |
| msrc_cve-2018-0734 | Timing attack against DSA | 2018-10-02T00:00:00.000Z | 2026-04-30T01:52:46.000Z |
| msrc_cve-2025-15504 | lief-project LIEF ELF Binary Parser.tcc parse_binary null pointer dereference | 2026-01-02T00:00:00.000Z | 2026-04-30T01:52:39.000Z |
| msrc_cve-2026-32288 | Unbounded allocation for old GNU sparse in archive/tar | 2026-04-02T00:00:00.000Z | 2026-04-30T01:52:26.000Z |
| msrc_cve-2018-0735 | Timing attack against ECDSA signature generation | 2018-10-02T00:00:00.000Z | 2026-04-30T01:52:26.000Z |
| msrc_cve-2026-31581 | ALSA: 6fire: fix use-after-free on disconnect | 2026-04-02T00:00:00.000Z | 2026-04-30T01:52:14.000Z |
| msrc_cve-2026-32283 | Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls | 2026-04-02T00:00:00.000Z | 2026-04-30T01:52:10.000Z |
| msrc_cve-2017-3736 | CVE-2017-3736 | 2017-11-02T00:00:00.000Z | 2026-04-30T01:52:04.000Z |
| msrc_cve-2026-32289 | JsBraceDepth Context Tracking Bugs (XSS) in html/template | 2026-04-02T00:00:00.000Z | 2026-04-30T01:51:54.000Z |
| msrc_cve-2026-31617 | usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:51:31.000Z |
| msrc_cve-2026-32281 | Inefficient policy validation in crypto/x509 | 2026-04-02T00:00:00.000Z | 2026-04-30T01:51:24.000Z |
| msrc_cve-2026-28389 | Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo | 2026-04-02T00:00:00.000Z | 2026-04-30T01:51:05.000Z |
| msrc_cve-2017-3731 | Truncated packet could crash via OOB read | 2017-05-02T00:00:00.000Z | 2026-04-30T01:51:04.000Z |
| msrc_cve-2019-1549 | Fork Protection | 2019-09-02T00:00:00.000Z | 2026-04-30T01:50:47.000Z |
| msrc_cve-2026-28388 | NULL Pointer Dereference When Processing a Delta CRL | 2026-04-02T00:00:00.000Z | 2026-04-30T01:50:39.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0472 | Kwetsbaarheden verholpen in SAP producten | 2024-12-10T19:34:10.105945Z | 2024-12-10T19:34:10.105945Z |
| ncsc-2024-0471 | Kwetsbaarheden verholpen in Microsoft Office | 2024-12-10T19:33:29.415423Z | 2024-12-10T19:33:29.415423Z |
| ncsc-2024-0469 | Kwetsbaarheden verholpen in Qlik Sense Enterprise voor Windows | 2024-12-09T13:38:50.887753Z | 2024-12-09T13:38:50.887753Z |
| ncsc-2024-0468 | Kwetsbaarheden verholpen in Mitel MiCollab | 2024-12-09T13:37:33.039167Z | 2024-12-09T13:37:33.039167Z |
| ncsc-2024-0467 | Kwetsbaarheden verholpen in QNAP besturingssystemen | 2024-12-09T13:36:33.362104Z | 2024-12-09T13:36:33.362104Z |
| ncsc-2024-0466 | Kwetsbaarheden verholpen in Atlassian producten | 2024-12-06T13:05:55.904619Z | 2024-12-06T13:05:55.904619Z |
| ncsc-2024-0465 | Kwetsbaarheden verholpen in ABB ASPECT, NEXUS Series en MATRIX Series | 2024-12-06T11:49:21.695542Z | 2024-12-06T11:49:21.695542Z |
| ncsc-2024-0464 | Kwetsbaarheden verholpen in SonicWall SMA100 SSLVPN | 2024-12-06T11:48:08.461746Z | 2024-12-06T11:48:08.461746Z |
| ncsc-2024-0463 | Kwetsbaarheden verholpen in Veeam Backup & Replication | 2024-12-06T11:47:19.699742Z | 2024-12-06T11:47:19.699742Z |
| ncsc-2024-0462 | Kwetsbaarheden verholpen in Zabbix | 2024-12-02T12:51:47.361749Z | 2024-12-02T12:51:47.361749Z |
| ncsc-2024-0461 | Kwetsbaarheden verholpen in IBM Security Verify Access Appliance | 2024-12-02T10:55:14.978137Z | 2024-12-02T10:55:14.978137Z |
| ncsc-2024-0460 | Kwetsbaarheid verholpen in Zabbix | 2024-11-28T14:24:11.654121Z | 2024-11-28T14:24:11.654121Z |
| ncsc-2024-0459 | Kwetsbaarheden verholpen in VMware Aria Operations | 2024-11-26T13:25:37.944485Z | 2024-11-26T13:25:37.944485Z |
| ncsc-2024-0458 | Kwetsbaarheden ontdekt in Veritas Enterprise Vault | 2024-11-25T09:04:34.013551Z | 2024-11-25T09:04:34.013551Z |
| ncsc-2024-0457 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-11-20T10:01:35.437557Z | 2024-11-20T10:01:35.437557Z |
| ncsc-2024-0456 | Kwetsbaarheden verholpen in Apple macOS en Safari | 2024-11-20T10:00:42.593160Z | 2024-11-20T10:00:42.593160Z |
| ncsc-2024-0455 | Kwetsbaarheid verholpen in Trend Micro Deep Security | 2024-11-20T09:04:14.183257Z | 2024-11-20T09:04:14.183257Z |
| ncsc-2024-0451 | Kwetsbaarheden verholpen in Palo Alto PAN-OS | 2024-11-18T16:00:29.206286Z | 2024-11-20T08:41:37.309906Z |
| ncsc-2024-0454 | Kwetsbaarheid verholpen in GitHub CLI | 2024-11-19T15:03:48.421618Z | 2024-11-19T15:03:48.421618Z |
| ncsc-2024-0377 | Kwetsbaarheden verholpen in VMware vCenter Server | 2024-09-18T11:28:43.103000Z | 2024-11-19T09:56:16.772512Z |
| ncsc-2024-0453 | Kwetsbaarheid verholpen in Oracle Agile PLM Framework | 2024-11-19T09:41:05.945149Z | 2024-11-19T09:41:05.945149Z |
| ncsc-2024-0452 | Kwetsbaarheden verholpen in Siemens Tecnomatix Plant Simulation | 2024-11-19T08:19:24.590425Z | 2024-11-19T08:19:24.590425Z |
| ncsc-2024-0450 | Kwetsbaarheid verholpen in Adobe Photoshop | 2024-11-18T11:18:22.537372Z | 2024-11-18T11:18:22.537372Z |
| ncsc-2024-0449 | Kwetsbaarheden verholpen in Adobe InDesign | 2024-11-18T11:14:49.456205Z | 2024-11-18T11:14:49.456205Z |
| ncsc-2024-0448 | Kwetsbaarheden verholpen in Adobe Illustrator | 2024-11-18T11:08:38.687476Z | 2024-11-18T11:08:38.687476Z |
| ncsc-2024-0447 | Kwetsbaarheden verholpen in GitLab CE/EE | 2024-11-15T12:29:35.775993Z | 2024-11-15T12:29:35.775993Z |
| ncsc-2024-0423 | Kwetsbaarheid ontdekt in Fortinet FortiManager | 2024-10-23T16:51:38.477778Z | 2024-11-15T10:52:37.440334Z |
| ncsc-2024-0446 | Kwetsbaarheid verholpen in Schneider Electric Ecostruxture | 2024-11-14T12:46:16.737874Z | 2024-11-14T12:46:16.737874Z |
| ncsc-2024-0445 | Kwetsbaarheden verholpen in Fortinet FortiClient | 2024-11-14T12:42:00.899040Z | 2024-11-14T12:42:00.899040Z |
| ncsc-2024-0444 | Kwetsbaarheden verholpen in Palo Alto PAN-OS | 2024-11-14T12:38:50.941039Z | 2024-11-14T12:38:50.941039Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10227-1 | python311-py7zr-1.1.0-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10226-1 | python311-nltk-3.9.1-3.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:10225-1 | MozillaFirefox-147.0.4-1.1 on GA media | 2026-02-19T00:00:00Z | 2026-02-19T00:00:00Z |
| opensuse-su-2026:20252-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-02-18T16:14:15Z | 2026-02-18T16:14:15Z |
| opensuse-su-2026:20251-1 | Security update for cockpit-repos | 2026-02-18T11:22:31Z | 2026-02-18T11:22:31Z |
| opensuse-su-2026:20249-1 | Security update for docker | 2026-02-18T09:41:33Z | 2026-02-18T09:41:33Z |
| opensuse-su-2026:10224-1 | rclone-1.73.1-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10223-1 | python313-3.13.12-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10222-1 | python312-3.12.12-5.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10221-1 | python311-3.11.14-4.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10220-1 | istioctl-1.28.4-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10219-1 | dnsdist-2.0.2-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10218-1 | MozillaThunderbird-140.7.2-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:20244-1 | Security update for cockpit-machines, cockpit | 2026-02-17T14:20:44Z | 2026-02-17T14:20:44Z |
| opensuse-su-2026:20245-1 | Security update for wicked2nm | 2026-02-17T14:08:05Z | 2026-02-17T14:08:05Z |
| opensuse-su-2026:20239-1 | Security update for golang-github-prometheus-prometheus | 2026-02-17T09:54:15Z | 2026-02-17T09:54:15Z |
| opensuse-su-2026:10217-1 | traefik-3.6.8-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10216-1 | python311-asgiref-3.11.1-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10215-1 | owntone-29.0-2.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10214-1 | mupdf-1.27.1-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10213-1 | libxml2-16-2.14.5-4.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10212-1 | firefox-esr-140.7.1-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10211-1 | azure-cli-core-2.83.0-2.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10210-1 | python311-pip-26.0.1-1.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10209-1 | libsoup-2_4-1-2.74.3-16.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10208-1 | libsoup-3_0-0-3.6.5-13.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10207-1 | frr-10.2.1-4.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:20236-1 | Security update for nodejs22 | 2026-02-15T09:26:17Z | 2026-02-15T09:26:17Z |
| opensuse-su-2026:20235-1 | Security update for fontforge | 2026-02-14T21:30:01Z | 2026-02-14T21:30:01Z |
| opensuse-su-2026:10206-1 | python314-3.14.3-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:5544 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-24T06:55:51+00:00 | 2026-05-08T15:00:22+00:00 |
| rhsa-2026:5533 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-24T04:02:36+00:00 | 2026-05-08T15:00:22+00:00 |
| rhsa-2026:5463 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:40:06+00:00 | 2026-05-08T15:00:22+00:00 |
| rhsa-2026:5461 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-23T17:44:49+00:00 | 2026-05-08T15:00:22+00:00 |
| rhsa-2026:5439 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T15:37:52+00:00 | 2026-05-08T15:00:22+00:00 |
| rhsa-2026:5452 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:13:04+00:00 | 2026-05-08T15:00:21+00:00 |
| rhsa-2026:5447 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:03:55+00:00 | 2026-05-08T15:00:21+00:00 |
| rhsa-2026:5444 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T15:45:35+00:00 | 2026-05-08T15:00:21+00:00 |
| rhsa-2026:5146 | Red Hat Security Advisory: yggdrasil security update | 2026-03-19T16:04:46+00:00 | 2026-05-08T15:00:21+00:00 |
| rhsa-2026:5394 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 director Operator container images | 2026-03-23T13:04:11+00:00 | 2026-05-08T15:00:20+00:00 |
| rhsa-2026:5327 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-23T07:40:40+00:00 | 2026-05-08T15:00:20+00:00 |
| rhsa-2026:5168 | Red Hat Security Advisory: Red Hat Quay 3.9.19 | 2026-03-19T19:18:06+00:00 | 2026-05-08T15:00:20+00:00 |
| rhsa-2026:5145 | Red Hat Security Advisory: yggdrasil-worker-package-manager security update | 2026-03-19T15:42:26+00:00 | 2026-05-08T15:00:19+00:00 |
| rhsa-2026:5133 | Red Hat Security Advisory: OpenShift Container Platform 4.18.36 bug fix and security update | 2026-03-25T04:30:22+00:00 | 2026-05-08T15:00:19+00:00 |
| rhsa-2026:5132 | Red Hat Security Advisory: Kiali 1.73.28 for Red Hat OpenShift Service Mesh 2.6 | 2026-03-19T14:09:55+00:00 | 2026-05-08T15:00:19+00:00 |
| rhsa-2026:5131 | Red Hat Security Advisory: Kiali 2.11.8 for Red Hat OpenShift Service Mesh 3.1 | 2026-03-19T14:08:55+00:00 | 2026-05-08T15:00:19+00:00 |
| rhsa-2026:5130 | Red Hat Security Advisory: Kiali 2.17.5 for Red Hat OpenShift Service Mesh 3.2 | 2026-03-19T14:08:59+00:00 | 2026-05-08T15:00:18+00:00 |
| rhsa-2026:5129 | Red Hat Security Advisory: Kiali 2.4.14 for Red Hat OpenShift Service Mesh 3.0 | 2026-03-19T14:08:51+00:00 | 2026-05-08T15:00:18+00:00 |
| rhsa-2026:5110 | Red Hat Security Advisory: Multicluster Global Hub 1.5.4 security update | 2026-03-19T10:27:09+00:00 | 2026-05-08T15:00:18+00:00 |
| rhsa-2026:5079 | Red Hat Security Advisory: rhc security update | 2026-03-19T09:49:36+00:00 | 2026-05-08T15:00:17+00:00 |
| rhsa-2026:5078 | Red Hat Security Advisory: rhc security update | 2026-03-19T21:11:27+00:00 | 2026-05-08T15:00:17+00:00 |
| rhsa-2026:5077 | Red Hat Security Advisory: rhc security update | 2026-03-19T23:49:18+00:00 | 2026-05-08T15:00:16+00:00 |
| rhsa-2026:5076 | Red Hat Security Advisory: rhc security update | 2026-03-19T21:34:22+00:00 | 2026-05-08T15:00:16+00:00 |
| rhsa-2026:5031 | Red Hat Security Advisory: rhc security update | 2026-03-19T05:19:39+00:00 | 2026-05-08T15:00:15+00:00 |
| rhsa-2026:5030 | Red Hat Security Advisory: rhc security update | 2026-03-19T05:15:04+00:00 | 2026-05-08T15:00:15+00:00 |
| rhsa-2026:5022 | Red Hat Security Advisory: rhc security update | 2026-03-19T05:02:24+00:00 | 2026-05-08T15:00:15+00:00 |
| rhsa-2026:4952 | Red Hat Security Advisory: rhc security update | 2026-03-18T21:13:13+00:00 | 2026-05-08T15:00:13+00:00 |
| rhsa-2026:4943 | Red Hat Security Advisory: Red Hat Update Infrastructure 5.1 security update | 2026-03-18T16:24:32+00:00 | 2026-05-08T15:00:13+00:00 |
| rhsa-2026:4942 | Red Hat Security Advisory: Red Hat Quay 3.12.15 | 2026-03-18T16:21:15+00:00 | 2026-05-08T15:00:13+00:00 |
| rhsa-2026:4939 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.3.4 | 2026-03-18T16:03:08+00:00 | 2026-05-08T15:00:12+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-147266 | SSA-147266: Multiple Vulnerabilities in QMS Automotive before V12.39 | 2023-09-12T00:00:00Z | 2023-09-12T00:00:00Z |
| ssa-975961 | SSA-975961: Privilege Escalation Vulnerabilities in SICAM TOOLBOX II before V07.10 | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-932528 | SSA-932528: Multiple File Parsing Vulnerabilities in Solid Edge | 2023-05-09T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-851884 | SSA-851884: Authentication Bypass Vulnerability in Mendix SAML Module | 2023-03-14T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-811403 | SSA-811403: Multiple File Parsing Vulnerabilities in Solid Edge before V223 Update 7 | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-472630 | SSA-472630: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.4 | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-223771 | SSA-223771: SISCO Stack Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-188491 | SSA-188491: DLL Hijacking Vulnerabilities in Siemens Software Center | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-180579 | SSA-180579: Privilege Management Vulnerability and Multiple Nucleus RTOS Vulnerabilities in APOGEE/TALON Field Panels before V3.5.5/V2.8.20 | 2022-12-13T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-131450 | SSA-131450: File parsing Vulnerabilities in Solid Edge, JT2Go and Teamcenter Visualization | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-116172 | SSA-116172: Nullsoft Scriptable Install System (NSIS) Vulnerability (CVE-2023-37378) in Parasolid Installer | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-001569 | SSA-001569: JT File Parsing Vulnerabilities in JT Open, JT Utilities and Parasolid | 2023-08-08T00:00:00Z | 2023-08-08T00:00:00Z |
| ssa-930100 | SSA-930100: Privilege Escalation Vulnerability in Simcenter STAR-CCM+ | 2022-12-13T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-924149 | SSA-924149: Stack Overflow Vulnerability in SiPass Integrated before V2.90.3.8 | 2023-07-11T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-561322 | SSA-561322: Multiple Vulnerabilities in SIMATIC MV500 Devices before V3.3.4 | 2023-07-11T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-313488 | SSA-313488: Multiple Vulnerabilities in SIMATIC CN 4100 before V2.5 | 2023-07-11T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-146325 | SSA-146325: Multiple Vulnerabilities in RUGGEDCOM ROX before V2.16 | 2023-07-11T00:00:00Z | 2023-07-11T00:00:00Z |
| ssa-942865 | SSA-942865: Multiple Vulnerabilities in the Integrated SCALANCE S615 of SINAMICS Medium Voltage Products | 2023-06-13T00:00:00Z | 2023-06-14T00:00:00Z |
| ssa-988345 | SSA-988345: Local Privilege Escalation Vulnerability in Xpedition Designer | 2022-06-14T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-914026 | SSA-914026: Local Code Execution Vulnerability in SIMATIC WinCC V7 | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-887249 | SSA-887249: Multiple Vulnerabilities in the Web Interface of SICAM Q200 Devices | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-824231 | SSA-824231: Unauthenticated Firmware Upload Vulnerability in Desigo PX Controllers | 2018-01-24T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-731916 | SSA-731916: Multiple Vulnerabilities in CPCI85 Firmware of SICAM A8000 Devices | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-572005 | SSA-572005: Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices | 2022-10-11T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-538795 | SSA-538795: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-508677 | SSA-508677: Use of Obsolete Function Vulnerability in SIMATIC WinCC before V8 | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-482956 | SSA-482956: Information Disclosure Vulnerability in SIMOTION before V5.5 | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-120378 | SSA-120378: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2022-11-08T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-892048 | SSA-892048: Third-Party Component Vulnerabilities in SINEC NMS before V1.0.3.1 | 2023-05-09T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-789345 | SSA-789345: Code Execution Vulnerabilities in Siveillance Video Event and Management Servers | 2023-05-09T00:00:00Z | 2023-05-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21221-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-04-13T09:00:51Z | 2026-04-13T09:00:51Z |
| suse-su-2026:21102-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-04-13T09:00:51Z | 2026-04-13T09:00:51Z |
| suse-su-2026:1293-1 | Security update for the Linux Kernel (Live Patch 75 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T08:35:44Z | 2026-04-13T08:35:44Z |
| suse-su-2026:1292-1 | Security update for python312 | 2026-04-13T08:10:43Z | 2026-04-13T08:10:43Z |
| suse-su-2026:1291-1 | Security update for openssl-1_0_0 | 2026-04-13T08:09:41Z | 2026-04-13T08:09:41Z |
| suse-su-2026:1290-1 | Security update for openssl-1_1 | 2026-04-13T08:08:54Z | 2026-04-13T08:08:54Z |
| suse-su-2026:1288-1 | Security update for the Linux Kernel (Live Patch 74 for SUSE Linux Enterprise 12 SP5) | 2026-04-13T06:34:14Z | 2026-04-13T06:34:14Z |
| suse-su-2026:21220-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-04-13T03:18:11Z | 2026-04-13T03:18:11Z |
| suse-su-2026:21100-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-04-13T03:18:11Z | 2026-04-13T03:18:11Z |
| suse-su-2026:21219-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-04-13T02:46:56Z | 2026-04-13T02:46:56Z |
| suse-su-2026:21099-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-04-13T02:46:56Z | 2026-04-13T02:46:56Z |
| suse-su-2026:21218-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 16) | 2026-04-13T02:14:56Z | 2026-04-13T02:14:56Z |
| suse-su-2026:21098-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 16) | 2026-04-13T02:14:56Z | 2026-04-13T02:14:56Z |
| suse-su-2026:1287-1 | Security update for the Linux Kernel (Live Patch 70 for SUSE Linux Enterprise 12 SP5) | 2026-04-12T23:15:16Z | 2026-04-12T23:15:16Z |
| suse-su-2026:1285-1 | Security update for the Linux Kernel (Live Patch 68 for SUSE Linux Enterprise 12 SP5) | 2026-04-12T19:04:23Z | 2026-04-12T19:04:23Z |
| suse-su-2026:1284-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T10:34:11Z | 2026-04-12T10:34:11Z |
| suse-su-2026:1283-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T10:34:05Z | 2026-04-12T10:34:05Z |
| suse-su-2026:1281-1 | Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4) | 2026-04-12T08:35:33Z | 2026-04-12T08:35:33Z |
| suse-su-2026:1280-1 | Security update for the Linux Kernel (Live Patch 41 for SUSE Linux Enterprise 15 SP4) | 2026-04-12T02:04:36Z | 2026-04-12T02:04:36Z |
| suse-su-2026:1279-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T00:08:13Z | 2026-04-12T00:08:13Z |
| suse-su-2026:1278-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-04-12T00:08:07Z | 2026-04-12T00:08:07Z |
| suse-su-2026:1274-1 | Security update for the Linux Kernel (Live Patch 19 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T20:04:33Z | 2026-04-11T20:04:33Z |
| suse-su-2026:1273-1 | Security update for MozillaFirefox | 2026-04-11T19:04:46Z | 2026-04-11T19:04:46Z |
| suse-su-2026:1272-1 | Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T18:04:50Z | 2026-04-11T18:04:50Z |
| suse-su-2026:1271-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T18:04:43Z | 2026-04-11T18:04:43Z |
| suse-su-2026:1270-1 | Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5) | 2026-04-11T16:34:14Z | 2026-04-11T16:34:14Z |
| suse-su-2026:1269-1 | Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4) | 2026-04-11T16:04:45Z | 2026-04-11T16:04:45Z |
| suse-su-2026:1268-1 | Security update for the Linux Kernel (Live Patch 38 for SUSE Linux Enterprise 15 SP4) | 2026-04-11T14:04:40Z | 2026-04-11T14:04:40Z |
| suse-su-2026:1266-1 | Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP6) | 2026-04-11T11:04:41Z | 2026-04-11T11:04:41Z |
| suse-su-2026:21217-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-04-11T07:42:41Z | 2026-04-11T07:42:41Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:23309 | Moderate: php:8.3 security update | 2025-12-16T00:00:00Z | 2025-12-22T13:55:21Z |
| alsa-2025:23323 | Moderate: python3.12 security update | 2025-12-16T00:00:00Z | 2025-12-22T13:52:25Z |
| alsa-2025:23325 | Moderate: podman security update | 2025-12-16T00:00:00Z | 2025-12-22T13:50:22Z |
| alsa-2025:23326 | Moderate: skopeo security update | 2025-12-16T00:00:00Z | 2025-12-22T13:49:03Z |
| alsa-2025:23343 | Moderate: binutils security update | 2025-12-16T00:00:00Z | 2025-12-22T13:47:22Z |
| alsa-2025:23342 | Moderate: python3.9 security update | 2025-12-16T00:00:00Z | 2025-12-22T13:45:25Z |
| alsa-2025:23336 | Moderate: gcc-toolset-13-binutils security update | 2025-12-16T00:00:00Z | 2025-12-22T13:43:11Z |
| alsa-2025:23667 | Important: git-lfs security update | 2025-12-18T00:00:00Z | 2025-12-22T13:42:09Z |
| alsa-2025:23700 | Important: webkit2gtk3 security update | 2025-12-18T00:00:00Z | 2025-12-22T13:39:46Z |
| alsa-2025:23738 | Important: mod_md security update | 2025-12-22T00:00:00Z | 2025-12-22T13:38:35Z |
| alsa-2025:23739 | Important: mod_md security update | 2025-12-22T00:00:00Z | 2025-12-22T13:37:02Z |
| alsa-2025:23744 | Important: git-lfs security update | 2025-12-22T00:00:00Z | 2025-12-22T12:38:08Z |
| alsa-2025:23745 | Important: git-lfs security update | 2025-12-22T00:00:00Z | 2025-12-22T12:34:52Z |
| alsa-2025:23479 | Moderate: openssh security update | 2025-12-17T00:00:00Z | 2025-12-21T20:05:20Z |
| alsa-2025:23480 | Moderate: openssh security update | 2025-12-17T00:00:00Z | 2025-12-21T20:03:34Z |
| alsa-2025:23481 | Moderate: openssh security update | 2025-12-17T00:00:00Z | 2025-12-21T20:00:09Z |
| alsa-2025:23483 | Moderate: libssh security update | 2025-12-17T00:00:00Z | 2025-12-21T19:54:52Z |
| alsa-2025:23484 | Moderate: libssh security update | 2025-12-17T00:00:00Z | 2025-12-21T19:50:15Z |
| alsa-2025:23210 | Important: keylime security update | 2025-12-15T00:00:00Z | 2025-12-17T13:58:57Z |
| alsa-2025:22865 | Moderate: kernel security update | 2025-12-08T00:00:00Z | 2025-12-17T11:46:25Z |
| alsa-2025:23049 | Important: tomcat security update | 2025-12-10T00:00:00Z | 2025-12-17T11:42:14Z |
| alsa-2025:23050 | Important: tomcat security update | 2025-12-10T00:00:00Z | 2025-12-17T11:40:04Z |
| alsa-2025:23052 | Important: tomcat9 security update | 2025-12-10T00:00:00Z | 2025-12-17T11:36:41Z |
| alsa-2025:23111 | Moderate: mysql:8.4 security update | 2025-12-11T00:00:00Z | 2025-12-17T11:32:52Z |
| alsa-2025:22395 | Moderate: kernel security update | 2025-12-01T00:00:00Z | 2025-12-15T12:44:56Z |
| alsa-2025:23087 | Moderate: grafana security update | 2025-12-11T00:00:00Z | 2025-12-15T12:37:43Z |
| alsa-2025:23134 | Moderate: mysql:8.0 security update | 2025-12-11T00:00:00Z | 2025-12-12T10:33:42Z |
| alsa-2025:23142 | Important: wireshark security update | 2025-12-11T00:00:00Z | 2025-12-12T10:27:48Z |
| alsa-2025:23139 | Moderate: libsoup3 security update | 2025-12-11T00:00:00Z | 2025-12-12T10:26:40Z |
| alsa-2025:23137 | Moderate: mysql:8.4 security update | 2025-12-11T00:00:00Z | 2025-12-12T10:24:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-51 | Heap-buffer-overflow in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-01-22T00:03:50.355443Z | 2025-01-24T14:26:07.849301Z |
| osv-2025-52 | Use-of-uninitialized-value in icalmemory_strdup | 2025-01-22T00:07:34.573371Z | 2025-01-22T00:07:34.573823Z |
| osv-2025-50 | Heap-double-free in r_crbtree_free | 2025-01-20T00:16:43.389094Z | 2025-01-20T00:16:43.389604Z |
| osv-2025-45 | Security exception in POIHDGFFuzzer | 2025-01-19T00:14:10.746839Z | 2025-01-19T00:14:10.747322Z |
| osv-2025-42 | Heap-use-after-free in r_list_free | 2025-01-19T00:06:58.533546Z | 2025-01-19T00:06:58.534017Z |
| osv-2025-32 | UNKNOWN READ in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2025-01-16T00:01:09.535772Z | 2025-01-16T00:01:09.536403Z |
| osv-2024-343 | Heap-buffer-overflow in pcpp::BgpUpdateMessageLayer::setPathAttributes | 2024-04-30T00:02:38.268026Z | 2025-01-13T14:51:10.266632Z |
| osv-2023-1201 | Negative-size-param in pcpp::RawPacket::insertData | 2023-11-23T13:01:26.936730Z | 2025-01-13T14:49:54.727943Z |
| osv-2023-862 | Heap-use-after-free in g_datalist_get_flags | 2023-09-16T14:01:07.280790Z | 2025-01-10T05:49:31.753574Z |
| osv-2024-1066 | Heap-buffer-overflow in StrLen | 2024-09-13T00:14:35.159638Z | 2025-01-10T05:47:49.595046Z |
| osv-2024-251 | Heap-use-after-free in gx_device_forward_finalize | 2024-04-12T00:02:31.478145Z | 2025-01-10T05:30:43.786965Z |
| osv-2024-379 | UNKNOWN READ in H5SL_first | 2024-04-30T00:12:09.539697Z | 2025-01-10T05:30:29.297578Z |
| osv-2024-853 | UNKNOWN READ in chunk_free_object | 2024-08-16T00:04:58.897243Z | 2025-01-10T05:30:16.360095Z |
| osv-2024-1230 | Heap-buffer-overflow in extract_rtpmap | 2024-10-19T00:00:26.792754Z | 2025-01-10T05:21:03.406469Z |
| osv-2024-460 | UNKNOWN READ in glslang::TInfoSinkBase::location | 2024-05-11T00:04:46.149516Z | 2025-01-10T05:21:00.966877Z |
| osv-2024-978 | Stack-buffer-overflow in narrow_conv_backprop | 2024-08-16T00:15:00.390591Z | 2025-01-10T05:19:36.120081Z |
| osv-2024-832 | UNKNOWN READ in Pistache::Http::Header::Expect::parseRaw | 2024-08-16T00:03:13.834235Z | 2025-01-10T05:18:27.558670Z |
| osv-2023-1170 | UNKNOWN READ in loader_log | 2023-11-16T13:02:54.951826Z | 2025-01-10T05:15:17.036441Z |
| osv-2024-1090 | UNKNOWN READ in ggml_free | 2024-09-19T00:00:17.390184Z | 2025-01-10T05:12:48.974830Z |
| osv-2024-1210 | Heap-buffer-overflow in parse_mixed_content | 2024-10-11T00:15:50.054920Z | 2025-01-10T05:11:11.351763Z |
| osv-2024-1206 | Heap-buffer-overflow in extract_sendrecv_mode | 2024-10-11T00:13:47.835312Z | 2025-01-10T05:11:09.130549Z |
| osv-2023-1370 | Heap-buffer-overflow in process_one_read | 2023-12-29T00:14:11.001809Z | 2025-01-10T05:09:49.377670Z |
| osv-2024-1200 | UNKNOWN READ in eat_line | 2024-10-11T00:02:19.537501Z | 2025-01-10T05:09:26.885831Z |
| osv-2023-1205 | Heap-buffer-overflow in isvcd_populate_res_prms | 2023-11-24T13:00:14.783667Z | 2025-01-10T05:07:48.976928Z |
| osv-2024-1053 | Heap-buffer-overflow in gguf_get_tensor_offset | 2024-09-13T00:00:16.432562Z | 2025-01-10T05:05:50.790792Z |
| osv-2024-18 | Heap-use-after-free in QPDF::read_xref | 2024-01-19T00:01:09.084916Z | 2025-01-10T05:03:37.159682Z |
| osv-2024-592 | UNKNOWN READ in spvtools::disassemble::InstructionDisassembler::EmitInstruction | 2024-06-27T00:03:46.520119Z | 2025-01-10T05:00:09.280885Z |
| osv-2022-738 | Security exception in DatatypeFuzzer.fuzzerTestOneInput | 2022-08-19T00:00:35.294543Z | 2025-01-10T04:55:45.450144Z |
| osv-2024-817 | Use-of-uninitialized-value in pcapint_filter_with_aux_data | 2024-08-16T00:02:39.185747Z | 2025-01-08T14:19:40.985698Z |
| osv-2025-17 | Heap-buffer-overflow in cv::PngDecoder::readHeader | 2025-01-08T00:14:02.009521Z | 2025-01-08T00:14:02.009997Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2022-0078 | Use-after-free due to a lifetime error in `Vec::into_iter()` | 2022-01-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0074 | Force cast a &Vec<T> to &[T] | 2022-12-02T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0072 | Location header incorporates user input, allowing open redirect | 2022-12-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0070 | Unsound API in `secp256k1` allows use-after-free and invalid deallocation from safe code | 2022-11-30T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0069 | Improper validation of Windows paths could lead to directory traversal attack | 2022-11-30T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0067 | Invalid use of `mem::uninitialized` causes `use-of-uninitialized-value` | 2022-10-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0065 | X.509 Email Address Variable Length Buffer Overflow | 2022-11-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0064 | X.509 Email Address 4-byte Buffer Overflow | 2022-11-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0063 | Multiple vulnerabilities resulting in out-of-bounds writes | 2022-09-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0062 | matrix-sdk 0.6.0 logs access tokens | 2022-10-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0059 | Using a Custom Cipher with `NID_undef` may lead to NULL encryption | 2022-10-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0055 | No default limit put on request bodies | 2022-08-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0054 | wee_alloc is Unmaintained | 2022-05-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0052 | `os_socketaddr` invalidly assumes the memory layout of std::net::SocketAddr | 2022-08-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0051 | Memory corruption in liblz4 | 2022-08-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0049 | Use after free in MacOS / iOS implementation | 2022-08-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0047 | Post-Quantum Signature scheme Rainbow level I parametersets broken | 2022-02-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0046 | Out-of-bounds read when opening multiple column families with TTL | 2022-05-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0045 | Post-Quantum Key Encapsulation Mechanism SIKE broken | 2022-07-30T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0043 | Improper validation of Windows paths could lead to directory traversal attack | 2022-01-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0035 | Unbounded memory allocation based on untrusted length | 2022-08-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0033 | Heap memory corruption with RSA private key operation | 2022-07-05T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0032 | AES OCB fails to encrypt some bytes | 2022-07-05T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0029 | `MsQueue` `push`/`pop` use the wrong orderings | 2022-06-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0028 | Use after free in Neon external buffers | 2022-05-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0027 | `OCSP_basic_verify` may incorrectly verify the response signing certificate | 2022-05-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0026 | Incorrect MAC key used in the RC4-MD5 ciphersuite | 2022-05-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0025 | Resource leakage when decoding certificates and keys | 2022-05-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0022 | Parser creates invalid uninitialized value | 2022-05-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0021 | `SegQueue` creates zero value of any type | 2022-05-10T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-mlflow-2025-14287 | Command Injection in mlflow/mlflow | 2026-04-16T23:45:00.863Z | 2026-04-17T00:10:47.507Z |
| bit-mlflow-2025-14279 | DNS Rebinding Vulnerability in mlflow/mlflow | 2026-04-16T23:44:59.061Z | 2026-04-17T00:10:47.507Z |
| bit-mlflow-2025-10279 | Privilege Escalation in mlflow/mlflow | 2026-04-16T23:44:54.208Z | 2026-04-17T00:10:47.507Z |
| bit-mariadb-2022-0778 | Infinite loop in BN_mod_sqrt() reachable when parsing certificates | 2024-03-06T11:03:29.776Z | 2026-04-17T00:10:47.507Z |
| bit-libpython-2026-5713 | Out-of-bounds read/write during remote profiling and asyncio process introspection when connecting to malicious target | 2026-04-16T23:43:12.795Z | 2026-04-17T00:10:47.507Z |
| bit-libpython-2026-3446 | Base64 decoding stops at first padded quad by default | 2026-04-16T23:43:07.878Z | 2026-04-17T00:10:47.507Z |
| bit-kibana-2026-33458 | Server-Side Request Forgery (SSRF) in Kibana One Workflow Leading to Information Disclosure | 2026-04-13T05:41:58.634Z | 2026-04-17T00:10:47.507Z |
| bit-grafana-2026-21724 | Missing Protected-field Authorization in Provisioning Contact Points API | 2026-04-06T07:50:18.770Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32289 | JsBraceDepth Context Tracking Bugs (XSS) in html/template | 2026-04-13T05:43:48.183Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32288 | Unbounded allocation for old GNU sparse in archive/tar | 2026-04-13T05:43:46.362Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32283 | Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls | 2026-04-13T05:43:44.464Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32282 | TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix | 2026-04-13T05:43:42.625Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32281 | Inefficient policy validation in crypto/x509 | 2026-04-13T05:43:40.495Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-27140 | Code execution vulnerability in SWIG code generation in cmd/go | 2026-04-13T05:43:35.566Z | 2026-04-17T00:10:47.507Z |
| bit-gitlab-2026-5173 | Exposed Dangerous Method or Function in GitLab | 2026-04-17T00:09:13.139Z | 2026-04-17T00:10:47.507Z |
| bit-gitlab-2026-1752 | Incorrect Authorization in GitLab | 2026-04-17T00:08:45.124Z | 2026-04-17T00:10:47.507Z |
| bit-gitlab-2026-1092 | Improper Validation of Specified Quantity in Input in GitLab | 2026-04-17T00:08:11.375Z | 2026-04-17T00:10:47.507Z |
| bit-elk-2026-33458 | Server-Side Request Forgery (SSRF) in Kibana One Workflow Leading to Information Disclosure | 2026-04-13T05:38:33.681Z | 2026-04-17T00:10:47.507Z |
| bit-drupal-2020-11022 | jQuery has a potential XSS vulnerability | 2024-03-06T10:59:15.938Z | 2026-04-17T00:10:47.507Z |
| bit-django-2026-4292 | Privilege abuse in ModelAdmin.list_editable | 2026-04-16T23:38:51.369Z | 2026-04-17T00:10:47.507Z |
| bit-django-2026-4277 | Privilege abuse in GenericInlineModelAdmin | 2026-04-16T23:38:49.720Z | 2026-04-17T00:10:47.507Z |
| bit-django-2026-3902 | ASGI header spoofing via underscore/hyphen conflation | 2026-04-16T23:38:48.155Z | 2026-04-17T00:10:47.507Z |
| bit-django-2026-33034 | Potential denial-of-service vulnerability in ASGI requests via memory upload limit bypass | 2026-04-16T23:38:46.634Z | 2026-04-17T00:10:47.507Z |
| bit-django-2026-33033 | Potential denial-of-service vulnerability in MultiPartParser via base64-encoded file upload | 2026-04-16T23:38:44.975Z | 2026-04-17T00:10:47.507Z |
| bit-cosign-2026-39395 | Cosign's verify-blob-attestation reports false positive when payload parsing fails | 2026-04-09T08:37:13.235Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2026-25922 | authentik has a Signature Verification Bypass via SAML Assertion Wrapping | 2026-04-16T23:36:35.408Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2026-25748 | authentik has a forward authentication bypass with broken cookie | 2026-04-16T23:36:33.948Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2026-25227 | authentik affected by Remote Code Execution via Context Key Injection in PropertyMapping Test Endpoint | 2026-04-16T23:36:32.477Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2025-64708 | authentik invitation expiry is delayed by at least 5 minutes | 2026-04-16T23:36:31.140Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2025-64521 | authentik deactivated service accounts can authenticate to OAuth | 2026-04-16T23:36:29.712Z | 2026-04-17T00:10:47.507Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-uy81473 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:44:54.187987Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uu56048 | Within HostnameError | 2026-01-30T15:16:53.077326Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uu20906 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:48:52.774829Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ur80185 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:30:24.609590Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-um63521 | Within HostnameError | 2026-01-30T16:12:25.029065Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ul17352 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:29:25.464127Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uj17204 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:52.998379Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ui65993 | Within HostnameError | 2026-01-30T16:21:25.457624Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ty78539 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T16:35:55.295657Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ts42581 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:29:23.600518Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ts12850 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:17:53.937628Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tr11635 | Cancelling a query (e | 2026-01-30T15:46:54.229170Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tl71584 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:23:53.438748Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tk38210 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:46:25.995358Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ti76190 | Cancelling a query (e | 2026-01-30T15:02:23.296683Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-th00404 | Within HostnameError | 2026-01-30T14:04:20.735662Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tf52804 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:08:23.107112Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tf33105 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:29:25.639055Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sy95837 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:28:53.594094Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sw55801 | Within HostnameError | 2026-01-30T16:24:55.642434Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sv79070 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:47:54.520743Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-su64392 | Cancelling a query (e | 2026-01-30T15:07:22.975031Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sq13072 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T15:02:22.907312Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-so95938 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.480356Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-so17846 | Within HostnameError | 2026-01-30T16:30:25.764771Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-so16176 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:39:24.255623Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sj80413 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:16:55.110567Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sh75345 | Cancelling a query (e | 2026-01-30T15:05:23.442396Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sg80587 | It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session | 2026-01-30T14:00:21.027172Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sb85645 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T17:00:56.485426Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2007-ALE-016 | Vulnérabilité d'Oracle 10g | 2007-11-16T00:00:00.000000 | 2007-11-16T00:00:00.000000 |
| certa-2007-ale-015 | Vulnérabilité dans le traitement des URI sous Windows | 2007-10-10T00:00:00.000000 | 2007-11-14T00:00:00.000000 |
| CERTA-2007-ALE-015 | Vulnérabilité dans le traitement des URI sous Windows | 2007-10-10T00:00:00.000000 | 2007-11-14T00:00:00.000000 |
| certa-2007-ale-014 | Vulnérabilité dans Apple QuickTime | 2007-09-13T00:00:00.000000 | 2007-10-12T00:00:00.000000 |
| CERTA-2007-ALE-014 | Vulnérabilité dans Apple QuickTime | 2007-09-13T00:00:00.000000 | 2007-10-12T00:00:00.000000 |
| certa-2007-ale-013 | Vulnérabilité dans Mozilla Firefox | 2007-07-27T00:00:00.000000 | 2007-07-31T00:00:00.000000 |
| CERTA-2007-ALE-013 | Vulnérabilité dans Mozilla Firefox | 2007-07-27T00:00:00.000000 | 2007-07-31T00:00:00.000000 |
| certa-2007-ale-012 | Multiples vulnérabilités dans Mozilla Firefox | 2007-06-06T00:00:00.000000 | 2007-07-18T00:00:00.000000 |
| CERTA-2007-ALE-012 | Multiples vulnérabilités dans Mozilla Firefox | 2007-06-06T00:00:00.000000 | 2007-07-18T00:00:00.000000 |
| certa-2007-ale-010 | Vulnérabilité de Microsoft DNS Server | 2007-04-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| certa-2007-ale-006 | Vulnérabilité dans le logiciel Microsoft Word | 2007-02-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| CERTA-2007-ALE-010 | Vulnérabilité de Microsoft DNS Server | 2007-04-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| CERTA-2007-ALE-006 | Vulnérabilité dans le logiciel Microsoft Word | 2007-02-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| certa-2007-ale-009 | Vulnérabilité dans BrightStor ARCServe Backup | 2007-03-30T00:00:00.000000 | 2007-04-27T00:00:00.000000 |
| CERTA-2007-ALE-009 | Vulnérabilité dans BrightStor ARCServe Backup | 2007-03-30T00:00:00.000000 | 2007-04-27T00:00:00.000000 |
| certa-2007-ale-008 | Vulnérabilité dans Mirosoft Windows | 2007-03-29T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-ale-002 | Vulnérabilité dans Windows | 2007-01-12T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| CERTA-2007-ALE-008 | Vulnérabilité dans Mirosoft Windows | 2007-03-29T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| CERTA-2007-ALE-002 | Vulnérabilité dans Windows | 2007-01-12T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2006-ale-013 | Vulnérabilité de MacOS X | 2006-11-23T00:00:00.000000 | 2007-02-16T00:00:00.000000 |
| CERTA-2006-ALE-013 | Vulnérabilité de MacOS X | 2006-11-23T00:00:00.000000 | 2007-02-16T00:00:00.000000 |
| certa-2006-ale-014 | Vulnérabilités dans Microsoft Word | 2006-12-06T00:00:00.000000 | 2007-02-14T00:00:00.000000 |
| CERTA-2006-ALE-014 | Vulnérabilités dans Microsoft Word | 2006-12-06T00:00:00.000000 | 2007-02-14T00:00:00.000000 |
| certa-2007-ale-004 | Vulnérabilité dans Microsoft Office | 2007-02-03T00:00:00.000000 | 2007-02-13T00:00:00.000000 |
| CERTA-2007-ALE-004 | Vulnérabilité dans Microsoft Office | 2007-02-03T00:00:00.000000 | 2007-02-13T00:00:00.000000 |
| certa-2007-ale-001 | Vulnérablité dans Apple Quicktime | 2007-01-04T00:00:00.000000 | 2007-01-24T00:00:00.000000 |
| CERTA-2007-ALE-001 | Vulnérablité dans Apple Quicktime | 2007-01-04T00:00:00.000000 | 2007-01-24T00:00:00.000000 |
| certa-2007-ale-003 | Filoutage contre le site voyages-sncf.com | 2007-01-15T00:00:00.000000 | 2007-01-15T00:00:00.000000 |
| CERTA-2007-ALE-003 | Filoutage contre le site voyages-sncf.com | 2007-01-15T00:00:00.000000 | 2007-01-15T00:00:00.000000 |
| certa-2006-ale-011 | Multiples vulnérabilités de produits Microsoft | 2006-08-31T00:00:00.000000 | 2006-10-11T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0083 | Multiples vulnérabilités dans les produits IBM | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0082 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0081 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2026-AVI-0080 | Vulnérabilité dans Broadcom Web Security Services Agent | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| CERTFR-2025-AVI-0970 | Multiples vulnérabilités dans Synacor Zimbra Collaboration | 2025-11-06T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| certfr-2026-avi-0079 | Vulnérabilité dans Python | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0078 | Vulnérabilité dans Ceph | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0077 | Multiples vulnérabilités dans les produits Symantec | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0076 | Vulnérabilité dans les produits Cisco | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| CERTFR-2026-AVI-0079 | Vulnérabilité dans Python | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| CERTFR-2026-AVI-0078 | Vulnérabilité dans Ceph | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| CERTFR-2026-AVI-0077 | Multiples vulnérabilités dans les produits Symantec | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| CERTFR-2026-AVI-0076 | Vulnérabilité dans les produits Cisco | 2026-01-22T00:00:00.000000 | 2026-01-22T00:00:00.000000 |
| certfr-2026-avi-0075 | Multiples vulnérabilités dans GitLab | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0074 | Multiples vulnérabilités dans Oracle Weblogic | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0073 | Multiples vulnérabilités dans Oracle Virtualization | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0072 | Multiples vulnérabilités dans Oracle Systems | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0071 | Multiples vulnérabilités dans Oracle PeopleSoft | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0070 | Multiples vulnérabilités dans Oracle MySQL | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0069 | Multiples vulnérabilités dans Oracle Java SE | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0068 | Multiples vulnérabilités dans Oracle Database Server | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0067 | Multiples vulnérabilités dans Python | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0066 | Vulnérabilité dans Google Chrome | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0065 | Multiples vulnérabilités dans les produits Atlassian | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0075 | Multiples vulnérabilités dans GitLab | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0074 | Multiples vulnérabilités dans Oracle Weblogic | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0073 | Multiples vulnérabilités dans Oracle Virtualization | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0072 | Multiples vulnérabilités dans Oracle Systems | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0071 | Multiples vulnérabilités dans Oracle PeopleSoft | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0070 | Multiples vulnérabilités dans Oracle MySQL | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000052 | Multiple vulnerabilities in UTAU | 2024-05-28T14:23+09:00 | 2024-05-28T14:23+09:00 |
| jvndb-2023-001639 | Heap-based buffer overflow vulnerability in OMRON CX-Drive | 2023-04-25T14:31+09:00 | 2024-05-27T18:11+09:00 |
| jvndb-2023-000029 | Multiple vulnerabilities in Seiko Solutions SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210 | 2023-03-31T15:54+09:00 | 2024-05-27T17:08+09:00 |
| jvndb-2023-000059 | Multiple vulnerabilities in Inaba Denki Sangyo Wi-Fi AP UNIT | 2023-06-09T15:18+09:00 | 2024-05-27T16:38+09:00 |
| jvndb-2023-000043 | Multiple vulnerabilities in MicroEngine Mailform | 2023-05-10T13:57+09:00 | 2024-05-24T17:07+09:00 |
| jvndb-2023-000045 | WordPress Plugin "VK Blocks" and "VK All in One Expansion Unit" vulnerable to cross-site scripting | 2023-05-09T15:14+09:00 | 2024-05-24T17:05+09:00 |
| jvndb-2023-001926 | Cross-site Scripting Vulnerability in Hitachi Ops Center Analyzer | 2023-05-24T11:40+09:00 | 2024-05-24T17:01+09:00 |
| jvndb-2023-000047 | Beekeeper Studio vulnerable to code injection | 2023-05-12T16:42+09:00 | 2024-05-24T16:17+09:00 |
| jvndb-2023-000046 | SR-7100VN vulnerable to privilege escalation | 2023-05-09T13:58+09:00 | 2024-05-24T16:13+09:00 |
| jvndb-2023-000061 | Chatwork Desktop Application (Mac) vulnerable to code injection | 2023-06-13T13:38+09:00 | 2024-05-24T16:02+09:00 |
| jvndb-2023-002055 | Multiple vulnerabilities in KbDevice digital video recorders | 2023-06-07T11:52+09:00 | 2024-05-24T15:57+09:00 |
| jvndb-2023-000049 | Multiple vulnerabilities in Cybozu Garoon | 2023-05-15T14:29+09:00 | 2024-05-24T15:26+09:00 |
| jvndb-2024-000051 | Splunk Config Explorer vulnerable to cross-site scripting | 2024-05-24T13:50+09:00 | 2024-05-24T13:50+09:00 |
| jvndb-2024-000050 | WordPress Plugin "WP Booking" vulnerable to cross-site scripting | 2024-05-24T13:41+09:00 | 2024-05-24T13:41+09:00 |
| jvndb-2023-001534 | Security Issues in FINS protocol | 2023-04-18T13:58+09:00 | 2024-05-23T17:35+09:00 |
| jvndb-2023-000057 | "Jiyu Kukan Toku-Toku coupon" App vulnerable to improper server certificate verification | 2023-06-01T14:51+09:00 | 2024-05-23T17:19+09:00 |
| jvndb-2023-000026 | Qrio Smart Lock Q-SL2 vulnerable to authentication bypass by capture-replay | 2023-05-18T14:13+09:00 | 2024-05-23T17:18+09:00 |
| jvndb-2023-000051 | Multiple vulnerabilities in T&D and ESPEC MIC data logger products | 2023-05-19T15:21+09:00 | 2024-05-23T17:03+09:00 |
| jvndb-2023-000041 | LINE WORKS Drive Explorer vulnerable to code injection | 2023-05-08T15:16+09:00 | 2024-05-23T17:03+09:00 |
| jvndb-2023-002111 | Printer Driver Packager NX creates driver installation packages without modification detection | 2023-06-15T16:06+09:00 | 2024-05-23T15:45+09:00 |
| jvndb-2023-002072 | Multiple vulnerabilities in Fuji Electric products | 2023-06-09T12:23+09:00 | 2024-05-23T15:33+09:00 |
| jvndb-2023-002100 | Security updates for multiple Trend Micro products for enterprises (June 2023) | 2023-06-14T14:47+09:00 | 2024-05-23T15:23+09:00 |
| jvndb-2023-000066 | Multiple vulnerabilities in Aterm series | 2023-06-27T15:12+09:00 | 2024-05-22T18:16+09:00 |
| jvndb-2023-003767 | Multiple vulnerabilities in multiple FURUNO SYSTEMS wireless LAN access point devices in ST(Standalone) mode | 2023-10-03T14:26+09:00 | 2024-05-22T18:01+09:00 |
| jvndb-2023-000101 | web2py vulnerable to OS command injection | 2023-10-16T16:11+09:00 | 2024-05-22T17:58+09:00 |
| jvndb-2023-000069 | Multiple vulnerabilities in SoftEther VPN and PacketiX VPN | 2023-07-03T15:07+09:00 | 2024-05-22T17:47+09:00 |
| jvndb-2023-000096 | Improper restriction of XML external entity references (XXE) in FD Application | 2023-10-02T12:36+09:00 | 2024-05-22T15:37+09:00 |
| jvndb-2023-003770 | DoS Vulnerability in Hitachi Ops Center Common Services | 2023-10-04T15:23+09:00 | 2024-05-22T15:31+09:00 |
| jvndb-2023-003769 | Information Exposure Vulnerability in Hitachi Ops Center Administrator | 2023-10-04T15:23+09:00 | 2024-05-22T15:20+09:00 |
| jvndb-2023-000095 | Shihonkanri Plus vulnerable to relative path traversal | 2023-09-27T13:49+09:00 | 2024-05-21T17:16+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15860 | Canva Affinity越界读取漏洞(CNVD-2026-15860) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15859 | Canva Affinity越界读取漏洞(CNVD-2026-15859) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15858 | Canva Affinity越界读取漏洞(CNVD-2026-15858) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15857 | Canva Affinity类型混淆漏洞 | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15856 | Canva Affinity越界读取漏洞(CNVD-2026-15856) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15855 | Canva Affinity越界读取漏洞(CNVD-2026-15855) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15854 | Canva Affinity越界读取漏洞(CNVD-2026-15854) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15853 | Canva Affinity越界读取漏洞(CNVD-2026-15853) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15852 | Canva Affinity越界写入漏洞 | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15851 | Canva Affinity越界读取漏洞(CNVD-2026-15851) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15850 | Canva Affinity越界读取漏洞(CNVD-2026-15850) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15849 | Canva Affinity越界读取漏洞(CNVD-2026-15849) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15848 | Canva Affinity越界读取漏洞(CNVD-2026-15848) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15847 | Canva Affinity越界读取漏洞(CNVD-2026-15847) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15846 | Canva Affinity越界读取漏洞(CNVD-2026-15846) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15845 | Canva Affinity越界读取漏洞(CNVD-2026-15845) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15844 | Canva Affinity越界读取漏洞 | 2026-03-26 | 2026-04-01 |
| cnvd-2026-15843 | WordPress插件Abandoned Cart Recovery for WooCommerce跨站脚本漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15842 | HCL Traveler存在未明漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15841 | HCL Aftermarket DPC硬编码漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15840 | HCL Aftermarket DPC文件上传漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15839 | HCL Aftermarket DPC跨站脚本漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15838 | HCL Aftermarket DPC访问控制错误漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15837 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15837) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15836 | HCL Aftermarket DPC输入验证错误漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15835 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15835) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15834 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15834) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15833 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15833) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15832 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15832) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15831 | HCL Aftermarket DPC会话固定漏洞 | 2026-03-31 | 2026-04-01 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-11827 | Уязвимость ядра операционной системы Linux, связанная с выходом операции за границы буфер… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11826 | Уязвимость ядра операционной системы Linux, связанная с выходом операции за границы буфер… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11825 | Уязвимость компонента elflink.c программного средства разработки GNU Binutils, позволяюща… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11824 | Уязвимость компонента elflink.c программного средства разработки GNU Binutils, позволяюща… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11823 | Уязвимость компонента elflink.c программного средства разработки GNU Binutils, позволяюща… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11822 | Уязвимость компонентов ld программного средства разработки GNU Binutils, позволяющая нару… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11821 | Уязвимость функции bfd_putl64 компонента elf64-x86-64.c программного средства разработки … | 28.09.2025 | 16.02.2026 |
| bdu:2025-11815 | Уязвимость компонента bnxt_coredump.c ядра операционной системы Linux, позволяющая наруши… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11811 | Уязвимость ядра операционной системы Linux, связанная с ошибками при освобождении ресурсо… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11810 | Уязвимость ядра операционной системы Linux, связанная с ошибками при освобождении ресурсо… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11808 | Уязвимость компонента uvcvideo ядра операционной системы Linux, позволяющая нарушителю вы… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11799 | Уязвимость функции re_case_expand компонента src/fa.c инструмента редактирования конфигур… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11798 | Уязвимость компонента microchip ядра операционной системы Linux, позволяющая нарушителю в… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11793 | Уязвимость компонента ip_vs_xmit.c ядра операционной системы Linux, позволяющая нарушител… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11790 | Уязвимость компонента parisc ядра операционной системы Linux, позволяющая нарушителю полу… | 28.09.2025 | 16.02.2026 |
| bdu:2025-11780 | Уязвимость компонента RDMA ядра операционной системы Linux, позволяющая нарушителю вызват… | 27.09.2025 | 16.02.2026 |
| bdu:2025-11778 | Уязвимость функции skb_get() ядра операционной системы Linux, позволяющая нарушителю вызв… | 27.09.2025 | 16.02.2026 |
| bdu:2025-11777 | Уязвимость функции __udp_gso_segment() ядра операционной системы Linux, позволяющая наруш… | 27.09.2025 | 16.02.2026 |
| bdu:2025-11773 | Уязвимость компонента memory_hotplug ядра операционной системы Linux, позволяющая нарушит… | 27.09.2025 | 16.02.2026 |
| bdu:2025-11764 | Уязвимость функции max20086_parse_regulators_dt операционной системы Linux, позволяющая н… | 27.09.2025 | 16.02.2026 |
| bdu:2025-11750 | Уязвимость загрузчика операционных систем Grub2, связанная с использованием памяти после … | 26.09.2025 | 16.02.2026 |
| bdu:2025-11749 | Уязвимость функции xmlXIncludeAddNode() файла xinclude.c библиотеки libxml2, позволяющая … | 26.09.2025 | 16.02.2026 |
| bdu:2025-11747 | Уязвимость функции gdk_pixbuf__jpeg_image_load_increment() файла glib/gbase64.c библиотек… | 26.09.2025 | 16.02.2026 |
| bdu:2025-11731 | Уязвимость текстового редактора vim, связанная с неверным ограничением имени пути к катал… | 26.09.2025 | 16.02.2026 |
| bdu:2025-11730 | Уязвимость текстового редактора vim, связанная с неверным ограничением имени пути к катал… | 26.09.2025 | 16.02.2026 |
| bdu:2025-11727 | Уязвимость загрузчика операционных систем Grub2, связанная с нарушением доверительных гра… | 26.09.2025 | 16.02.2026 |
| bdu:2025-11635 | Уязвимость функции cros_typec_altmode_work() ядра операционной системы Linux, позволяющая… | 25.09.2025 | 16.02.2026 |
| bdu:2025-11632 | Уязвимость функции chan_alloc_skb_cb() ядра операционной системы Linux, позволяющая наруш… | 25.09.2025 | 16.02.2026 |
| bdu:2025-11630 | Уязвимость функции fib_check_nh_v6_gw() ядра операционной системы Linux, позволяющая нару… | 25.09.2025 | 16.02.2026 |
| bdu:2025-11625 | Уязвимость функции xp_create_and_assign_umem() ядра операционной системы Linux, позволяющ… | 25.09.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202105-1432 | The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired… | 2024-07-23T21:12:24.589000Z |
| var-202109-1389 | A logic issue was addressed with improved state management. This issue is fixed in tvOS 1… | 2024-07-23T21:12:18.054000Z |
| var-200704-0223 | SMB in Apple Mac OS X 10.3.9 through 10.4.9 does not properly clean the environment when … | 2024-07-23T21:11:56.443000Z |
| var-201110-0380 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2024-07-23T21:11:55.453000Z |
| var-201406-0137 | The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 befo… | 2024-07-23T21:11:52.075000Z |
| var-202008-1140 | In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> … | 2024-07-23T21:11:50.528000Z |
| var-202002-1243 | There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_re… | 2024-07-23T21:11:15.557000Z |
| var-201205-0016 | The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified M… | 2024-07-23T21:11:14.011000Z |
| var-201304-0188 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:10:32.602000Z |
| var-202105-1457 | A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in … | 2024-07-23T21:10:31.569000Z |
| var-202003-1787 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:10:30.703000Z |
| var-201710-0211 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GT… | 2024-07-23T21:10:29.332000Z |
| var-201304-0385 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:10:28.646000Z |
| var-201708-0212 | The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 all… | 2024-07-23T21:10:24.465000Z |
| var-201405-0541 | Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.… | 2024-07-23T21:10:24.545000Z |
| var-201912-0538 | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in… | 2024-07-23T21:09:17.149000Z |
| var-201912-0575 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:09:16.163000Z |
| var-201211-0364 | Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on … | 2024-07-23T21:09:16.913000Z |
| var-200810-0393 | Unspecified vulnerability in rlogind in the rlogin component in Mac OS X 10.4.11 and 10.5… | 2024-07-23T21:09:15.254000Z |
| var-201212-0238 | Integer overflow in Adobe Flash Player before 10.3.183.48 and 11.x before 11.5.502.135 on… | 2024-07-23T21:09:08.496000Z |
| var-201912-1862 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:08:37.349000Z |
| var-201904-1407 | A use after free issue was addressed with improved memory management. This issue affected… | 2024-07-23T21:08:35.760000Z |
| var-201106-0034 | Adobe Flash Player before 10.3.181.26 on Windows, Mac OS X, Linux, and Solaris, and 10.3.… | 2024-07-23T21:08:34.015000Z |
| var-201904-1362 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:08:22.827000Z |
| var-200703-0007 | Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and … | 2024-07-23T21:07:51.634000Z |
| var-202012-1277 | A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into co… | 2024-07-23T21:07:50.790000Z |
| var-202201-0567 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:07:30.070000Z |
| var-202109-1313 | An integer overflow was addressed with improved input validation. This issue is fixed in … | 2024-07-23T21:07:30.901000Z |
| var-201205-0406 | WebKit in Apple iOS before 5.1.1 allows remote attackers to execute arbitrary code or cau… | 2024-07-23T21:07:29.148000Z |
| var-201605-0492 | Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in… | 2024-07-23T21:07:28.078000Z |