Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43153 |
7.8 (3.1)
|
xfs: remove xfs_attr_leaf_hasname |
Linux |
Linux |
2026-05-06T11:27:34.446Z | 2026-05-08T12:40:52.696Z |
| CVE-2026-43150 |
7.8 (3.1)
|
perf/arm-cmn: Reject unsupported hardware configurations |
Linux |
Linux |
2026-05-06T11:27:32.359Z | 2026-05-08T12:40:51.562Z |
| CVE-2026-43139 |
8.6 (3.1)
|
xfrm6: fix uninitialized saddr in xfrm6_get_saddr() |
Linux |
Linux |
2026-05-06T11:27:24.898Z | 2026-05-08T12:40:50.383Z |
| CVE-2026-43134 |
8.1 (3.1)
|
Bluetooth: L2CAP: Fix missing key size check for L2CAP… |
Linux |
Linux |
2026-05-06T11:27:21.541Z | 2026-05-08T12:40:49.204Z |
| CVE-2026-43133 |
7.9 (3.1)
|
KVM: nSVM: Always use vmcb01 in VMLOAD/VMSAVE emulation |
Linux |
Linux |
2026-05-06T11:27:20.882Z | 2026-05-08T12:40:48.030Z |
| CVE-2026-43128 |
7.8 (3.1)
|
RDMA/umem: Fix double dma_buf_unpin in failure path |
Linux |
Linux |
2026-05-06T11:27:17.474Z | 2026-05-08T12:40:46.828Z |
| CVE-2026-43126 |
7.8 (3.1)
|
ALSA: mixer: oss: Add card disconnect checkpoints |
Linux |
Linux |
2026-05-06T11:27:15.765Z | 2026-05-08T12:40:45.430Z |
| CVE-2026-43125 |
9.8 (3.1)
|
dlm: validate length in dlm_search_rsb_tree |
Linux |
Linux |
2026-05-06T11:27:10.903Z | 2026-05-08T12:40:44.270Z |
| CVE-2026-43120 |
7.8 (3.1)
|
RDMA/irdma: Fix double free related to rereg_user_mr |
Linux |
Linux |
2026-05-06T07:40:43.923Z | 2026-05-08T12:40:43.130Z |
| CVE-2026-43117 |
9.1 (3.1)
|
btrfs: tracepoints: get correct superblock from dentry… |
Linux |
Linux |
2026-05-06T07:40:41.862Z | 2026-05-08T12:40:41.936Z |
| CVE-2026-43116 |
7.8 (3.1)
|
netfilter: ctnetlink: ensure safe access to master conntrack |
Linux |
Linux |
2026-05-06T07:40:41.185Z | 2026-05-08T12:40:40.754Z |
| CVE-2026-43114 |
9.4 (3.1)
|
netfilter: nft_set_pipapo_avx2: don't return non-match… |
Linux |
Linux |
2026-05-06T07:40:39.877Z | 2026-05-08T12:40:39.582Z |
| CVE-2026-43113 |
8.8 (3.1)
|
wifi: wl1251: validate packet IDs before indexing tx_frames |
Linux |
Linux |
2026-05-06T07:40:39.234Z | 2026-05-08T12:40:38.409Z |
| CVE-2026-43112 |
8.8 (3.1)
|
fs/smb/client: fix out-of-bounds read in cifs_sanitize… |
Linux |
Linux |
2026-05-06T07:40:38.563Z | 2026-05-08T12:40:37.265Z |
| CVE-2026-43111 |
7.8 (3.1)
|
HID: roccat: fix use-after-free in roccat_report_event |
Linux |
Linux |
2026-05-06T07:40:37.916Z | 2026-05-08T12:40:36.098Z |
| CVE-2026-43110 |
8.8 (3.1)
|
wifi: brcmfmac: validate bsscfg indices in IF events |
Linux |
Linux |
2026-05-06T07:40:37.250Z | 2026-05-08T12:40:34.959Z |
| CVE-2026-43106 |
7.8 (3.1)
|
cachefiles: fix incorrect dentry refcount in cachefile… |
Linux |
Linux |
2026-05-06T07:40:34.365Z | 2026-05-08T12:40:33.663Z |
| CVE-2026-43101 |
7.5 (3.1)
|
ipv6: ioam: fix potential NULL dereferences in __ioam6… |
Linux |
Linux |
2026-05-06T07:40:30.969Z | 2026-05-08T12:40:32.536Z |
| CVE-2026-43099 |
7.5 (3.1)
|
ipv4: icmp: fix null-ptr-deref in icmp_build_probe() |
Linux |
Linux |
2026-05-06T07:40:29.567Z | 2026-05-08T12:40:31.371Z |
| CVE-2026-43093 |
7.8 (3.1)
|
xsk: tighten UMEM headroom validation to account for t… |
Linux |
Linux |
2026-05-06T07:40:25.266Z | 2026-05-08T12:40:30.221Z |
| CVE-2026-43091 |
7.8 (3.1)
|
xfrm: Wait for RCU readers during policy netns exit |
Linux |
Linux |
2026-05-06T07:40:23.955Z | 2026-05-08T12:40:29.086Z |
| CVE-2026-43084 |
7.8 (3.1)
|
netfilter: nfnetlink_queue: make hash table per queue |
Linux |
Linux |
2026-05-06T07:40:19.253Z | 2026-05-08T12:40:27.947Z |
| CVE-2026-43083 |
9.1 (3.1)
|
net: ioam6: fix OOB and missing lock |
Linux |
Linux |
2026-05-06T07:40:18.504Z | 2026-05-08T12:40:26.791Z |
| CVE-2026-43078 |
7.8 (3.1)
|
crypto: af_alg - Fix page reassignment overflow in af_… |
Linux |
Linux |
2026-05-06T07:40:15.092Z | 2026-05-08T12:40:25.638Z |
| CVE-2026-43076 |
7.8 (3.1)
|
ocfs2: validate inline data i_size during inode read |
Linux |
Linux |
2026-05-06T07:40:13.634Z | 2026-05-08T12:40:24.482Z |
| CVE-2026-43075 |
7.8 (3.1)
|
ocfs2: fix out-of-bounds write in ocfs2_write_end_inline |
Linux |
Linux |
2026-05-06T07:40:03.337Z | 2026-05-08T12:40:23.336Z |
| CVE-2026-43074 |
7.8 (3.1)
|
eventpoll: defer struct eventpoll free to RCU grace period |
Linux |
Linux |
2026-05-06T07:21:58.210Z | 2026-05-08T12:40:22.201Z |
| CVE-2026-43071 |
9.1 (3.1)
|
dcache: Limit the minimal number of bucket to two |
Linux |
Linux |
2026-05-05T15:29:28.081Z | 2026-05-08T12:40:21.054Z |
| CVE-2026-43070 |
7.8 (3.1)
|
bpf: Reset register ID for BPF_END value tracking |
Linux |
Linux |
2026-05-05T15:23:28.819Z | 2026-05-08T12:40:19.810Z |
| CVE-2026-43067 |
9.8 (3.1)
|
ext4: handle wraparound when searching for blocks for … |
Linux |
Linux |
2026-05-05T15:23:26.717Z | 2026-05-08T12:40:18.665Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43327 |
N/A
|
USB: dummy-hcd: Fix locking/synchronization error |
Linux |
Linux |
2026-05-08T13:31:12.896Z | 2026-05-08T13:31:12.896Z |
| CVE-2026-43326 |
N/A
|
sched_ext: Fix SCX_KICK_WAIT deadlock by deferring wai… |
Linux |
Linux |
2026-05-08T13:31:10.184Z | 2026-05-08T13:31:10.184Z |
| CVE-2026-43325 |
N/A
|
wifi: iwlwifi: mvm: don't send a 6E related command wh… |
Linux |
Linux |
2026-05-08T13:31:09.536Z | 2026-05-08T13:31:09.536Z |
| CVE-2026-43324 |
N/A
|
USB: dummy-hcd: Fix interrupt synchronization error |
Linux |
Linux |
2026-05-08T13:31:08.850Z | 2026-05-08T13:31:08.850Z |
| CVE-2026-43323 |
N/A
|
sched/fair: Fix zero_vruntime tracking fix |
Linux |
Linux |
2026-05-08T13:31:08.188Z | 2026-05-08T13:31:08.188Z |
| CVE-2026-43322 |
N/A
|
Bluetooth: hci_sync: Fix UAF in le_read_features_complete |
Linux |
Linux |
2026-05-08T13:31:07.436Z | 2026-05-08T13:31:07.436Z |
| CVE-2026-43321 |
N/A
|
bpf: Properly mark live registers for indirect jumps |
Linux |
Linux |
2026-05-08T13:26:15.600Z | 2026-05-08T13:26:15.600Z |
| CVE-2026-43320 |
N/A
|
drm/amd/display: Fix dsc eDP issue |
Linux |
Linux |
2026-05-08T13:26:14.930Z | 2026-05-08T13:26:14.930Z |
| CVE-2026-43319 |
N/A
|
spi: spidev: fix lock inversion between spi_lock and b… |
Linux |
Linux |
2026-05-08T13:26:14.231Z | 2026-05-08T13:26:14.231Z |
| CVE-2026-43318 |
N/A
|
drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify |
Linux |
Linux |
2026-05-08T13:26:13.557Z | 2026-05-08T13:26:13.557Z |
| CVE-2026-43317 |
N/A
|
most: core: fix leak on early registration failure |
Linux |
Linux |
2026-05-08T13:26:12.899Z | 2026-05-08T13:26:12.899Z |
| CVE-2026-43316 |
N/A
|
media: solo6x10: Check for out of bounds chip_id |
Linux |
Linux |
2026-05-08T13:26:12.217Z | 2026-05-08T13:26:12.217Z |
| CVE-2026-43315 |
N/A
|
KVM: nSVM: Remove a user-triggerable WARN on nested_sv… |
Linux |
Linux |
2026-05-08T13:11:31.784Z | 2026-05-08T13:11:31.784Z |
| CVE-2026-43314 |
N/A
|
dm: remove fake timeout to avoid leak request |
Linux |
Linux |
2026-05-08T13:11:31.068Z | 2026-05-08T13:11:31.068Z |
| CVE-2026-43313 |
N/A
|
ACPI: processor: Fix NULL-pointer dereference in acpi_… |
Linux |
Linux |
2026-05-08T13:11:30.386Z | 2026-05-08T13:11:30.386Z |
| CVE-2026-43312 |
N/A
|
media: i2c: ov5647: Initialize subdev before controls |
Linux |
Linux |
2026-05-08T13:11:29.719Z | 2026-05-08T13:11:29.719Z |
| CVE-2026-43311 |
N/A
|
soc/tegra: pmc: Fix unsafe generic_handle_irq() call |
Linux |
Linux |
2026-05-08T13:11:29.068Z | 2026-05-08T13:11:29.068Z |
| CVE-2026-43310 |
N/A
|
media: verisilicon: Avoid G2 bus error while decoding … |
Linux |
Linux |
2026-05-08T13:11:28.372Z | 2026-05-08T13:11:28.372Z |
| CVE-2026-43309 |
N/A
|
md raid: fix hang when stopping arrays with metadata t… |
Linux |
Linux |
2026-05-08T13:11:27.595Z | 2026-05-08T13:11:27.595Z |
| CVE-2026-43308 |
N/A
|
btrfs: don't BUG() on unexpected delayed ref type in r… |
Linux |
Linux |
2026-05-08T13:11:26.937Z | 2026-05-08T13:11:26.937Z |
| CVE-2026-43307 |
N/A
|
iio: accel: adxl380: Avoid reading more entries than p… |
Linux |
Linux |
2026-05-08T13:11:26.295Z | 2026-05-08T13:11:26.295Z |
| CVE-2026-43306 |
N/A
|
bpf: crypto: Use the correct destructor kfunc type |
Linux |
Linux |
2026-05-08T13:11:25.624Z | 2026-05-08T13:11:25.624Z |
| CVE-2026-43305 |
N/A
|
drm/amd/display: Fix mismatched unlock for DMUB HW loc… |
Linux |
Linux |
2026-05-08T13:11:24.952Z | 2026-05-08T13:11:24.952Z |
| CVE-2026-43304 |
N/A
|
libceph: define and enforce CEPH_MAX_KEY_LEN |
Linux |
Linux |
2026-05-08T13:11:24.264Z | 2026-05-08T13:11:24.264Z |
| CVE-2026-43303 |
N/A
|
mm/page_alloc: clear page->private in free_pages_prepare() |
Linux |
Linux |
2026-05-08T13:11:23.561Z | 2026-05-08T13:11:23.561Z |
| CVE-2026-43302 |
N/A
|
drm/v3d: Set DMA segment size to avoid debug warnings |
Linux |
Linux |
2026-05-08T13:11:22.886Z | 2026-05-08T13:11:22.886Z |
| CVE-2026-43301 |
N/A
|
media: chips-media: wave5: Fix PM runtime usage count … |
Linux |
Linux |
2026-05-08T13:11:22.234Z | 2026-05-08T13:11:22.234Z |
| CVE-2026-43300 |
N/A
|
drm/panel: Fix a possible null-pointer dereference in … |
Linux |
Linux |
2026-05-08T13:11:21.530Z | 2026-05-08T13:11:21.530Z |
| CVE-2026-43299 |
N/A
|
btrfs: do not ASSERT() when the fs flips RO inside btr… |
Linux |
Linux |
2026-05-08T13:11:20.872Z | 2026-05-08T13:11:20.872Z |
| CVE-2026-43298 |
N/A
|
drm/amdgpu: Skip vcn poison irq release on VF |
Linux |
Linux |
2026-05-08T13:11:20.215Z | 2026-05-08T13:11:20.215Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-43076 | In the Linux kernel, the following vulnerability has been resolved: ocfs2: validate inline data i_… | 2026-05-06T10:16:20.590 | 2026-05-08T13:16:38.297 |
| fkie_cve-2026-43075 | In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix out-of-bounds write… | 2026-05-06T10:16:20.463 | 2026-05-08T13:16:38.160 |
| fkie_cve-2026-43074 | In the Linux kernel, the following vulnerability has been resolved: eventpoll: defer struct eventp… | 2026-05-06T10:16:20.343 | 2026-05-08T13:16:38.030 |
| fkie_cve-2026-43071 | In the Linux kernel, the following vulnerability has been resolved: dcache: Limit the minimal numb… | 2026-05-05T16:16:16.420 | 2026-05-08T13:16:37.870 |
| fkie_cve-2026-43070 | In the Linux kernel, the following vulnerability has been resolved: bpf: Reset register ID for BPF… | 2026-05-05T16:16:16.320 | 2026-05-08T13:16:37.750 |
| fkie_cve-2026-43067 | In the Linux kernel, the following vulnerability has been resolved: ext4: handle wraparound when s… | 2026-05-05T16:16:15.937 | 2026-05-08T13:16:37.597 |
| fkie_cve-2026-43063 | In the Linux kernel, the following vulnerability has been resolved: xfs: don't irele after failing… | 2026-05-05T16:16:15.467 | 2026-05-08T13:16:37.457 |
| fkie_cve-2026-43062 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix type con… | 2026-05-05T16:16:15.340 | 2026-05-08T13:16:37.303 |
| fkie_cve-2026-43060 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: drop pendin… | 2026-05-05T16:16:15.050 | 2026-05-08T13:16:37.143 |
| fkie_cve-2026-31731 | In the Linux kernel, the following vulnerability has been resolved: thermal: core: Address thermal… | 2026-05-01T15:16:35.683 | 2026-05-08T13:16:36.907 |
| fkie_cve-2026-31730 | In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: possible double… | 2026-05-01T15:16:35.577 | 2026-05-08T13:16:36.740 |
| fkie_cve-2025-68900 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T17:16:13.733 | 2026-05-08T13:16:35.863 |
| fkie_cve-2026-5588 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Legion of the Bouncy Castle Inc. … | 2026-04-15T10:16:49.597 | 2026-05-08T06:16:10.540 |
| fkie_cve-2026-2710 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-05-07T23:16:31.877 | 2026-05-07T23:16:31.877 |
| fkie_cve-2026-5121 | A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the … | 2026-03-30T08:16:18.780 | 2026-05-07T22:16:36.430 |
| fkie_cve-2026-4878 | A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (T… | 2026-04-09T16:16:31.987 | 2026-05-07T22:16:36.237 |
| fkie_cve-2026-4775 | A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow … | 2026-03-24T15:16:39.693 | 2026-05-07T22:16:36.070 |
| fkie_cve-2026-4424 | A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archiv… | 2026-03-19T15:16:28.300 | 2026-05-07T22:16:35.730 |
| fkie_cve-2026-8098 | A security vulnerability has been detected in code-projects Feedback System 1.0. Impacted is an unk… | 2026-05-07T21:16:30.900 | 2026-05-07T21:16:30.900 |
| fkie_cve-2026-8097 | A security flaw has been discovered in CodeAstro Online Classroom 1.0. This vulnerability affects u… | 2026-05-07T21:16:30.727 | 2026-05-07T21:16:30.727 |
| fkie_cve-2026-44365 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-34429. Reason:… | 2026-05-07T21:16:30.433 | 2026-05-07T21:16:30.433 |
| fkie_cve-2026-44244 | GitPython is a python library used to interact with Git repositories. Prior to version 3.1.49, GitC… | 2026-05-07T19:16:02.357 | 2026-05-07T21:16:30.283 |
| fkie_cve-2026-41905 | FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version… | 2026-05-07T19:16:01.220 | 2026-05-07T21:16:29.870 |
| fkie_cve-2026-34429 | Vvveb prior to 1.0.8.1 contains a stored cross-site scripting vulnerability that allows authenticat… | 2026-04-20T16:16:44.650 | 2026-05-07T21:16:29.427 |
| fkie_cve-2025-52479 | HTTP.jl provides HTTP client and server functionality for Julia, and URIs.jl parses and works with … | 2025-06-25T16:15:27.017 | 2026-05-07T21:16:28.847 |
| fkie_cve-2026-42284 | GitPython is a python library used to interact with Git repositories. Prior to version 3.1.47, _clo… | 2026-05-07T19:16:01.783 | 2026-05-07T21:13:46.713 |
| fkie_cve-2026-44243 | GitPython is a python library used to interact with Git repositories. Prior to version 3.1.48, a vu… | 2026-05-07T19:16:02.227 | 2026-05-07T21:12:00.777 |
| fkie_cve-2025-12690 | Execution with unnecessary privileges in Forcepoint NGFW Engine allows local privilege escalation.T… | 2026-03-11T16:16:18.233 | 2026-05-07T20:55:29.093 |
| fkie_cve-2025-69614 | Incorrect Access Control via activation token reuse on the password-reset endpoint allowing unautho… | 2026-03-10T18:18:01.610 | 2026-05-07T20:50:21.410 |
| fkie_cve-2025-69615 | Incorrect Access Control via missing 2FA rate-limiting allowing unlimited brute-force retries and f… | 2026-03-10T18:18:01.740 | 2026-05-07T20:48:35.097 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-6g7r-xrvq-rpc8 |
7.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: consume xmit errors of GS… | 2026-05-06T12:30:32Z | 2026-05-08T15:31:17Z |
| ghsa-6cq8-8cqv-fh6c |
9.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: do not pass flow_id to se… | 2026-05-06T12:30:33Z | 2026-05-08T15:31:17Z |
| ghsa-395h-h5jq-ggp6 |
8.2 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_tcpmss: check re… | 2026-05-06T12:30:32Z | 2026-05-08T15:31:17Z |
| ghsa-3629-447p-wp7v |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: PCI: Fix pci_slot_trylock() er… | 2026-05-06T12:30:33Z | 2026-05-08T15:31:17Z |
| ghsa-25mj-mfqw-xqm2 |
9.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netconsole: avoid OOB reads, m… | 2026-05-06T12:30:32Z | 2026-05-08T15:31:17Z |
| ghsa-x85v-hg8f-rh5p |
7.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: rnbd-srv: Zero the rsp buffer … | 2026-05-06T12:30:32Z | 2026-05-08T15:31:16Z |
| ghsa-wh2v-8c6h-56m5 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: perf/arm-cmn: Reject unsupport… | 2026-05-06T12:30:30Z | 2026-05-08T15:31:16Z |
| ghsa-vq8h-ghh5-4h7f |
7.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: udplite: Fix null-ptr-deref in… | 2026-05-06T12:30:31Z | 2026-05-08T15:31:16Z |
| ghsa-vcg7-gx5w-x44c |
9.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix signededness bug in… | 2026-05-06T12:30:32Z | 2026-05-08T15:31:16Z |
| ghsa-mv3m-x6qp-j4p5 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: HID: roccat: fix use-after-fre… | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ghsa-jc53-6rw8-5w3x |
8.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix missing … | 2026-05-06T12:30:30Z | 2026-05-08T15:31:16Z |
| ghsa-j9jf-6fw4-2v2v |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: xfs: remove xfs_attr_leaf_hasn… | 2026-05-06T12:30:30Z | 2026-05-08T15:31:16Z |
| ghsa-j4pf-wvpf-rv38 |
8.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: xfs: fix freemap adjustments w… | 2026-05-06T12:30:30Z | 2026-05-08T15:31:16Z |
| ghsa-hr53-gf94-w7mp |
8.6 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: xfrm6: fix uninitialized saddr… | 2026-05-06T12:30:30Z | 2026-05-08T15:31:16Z |
| ghsa-gq4c-7253-q3cg |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: usb: kaweth: remove TX qu… | 2026-05-06T12:30:31Z | 2026-05-08T15:31:16Z |
| ghsa-g9j5-v9rr-m845 |
7.9 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Always use vmcb01 i… | 2026-05-06T12:30:29Z | 2026-05-08T15:31:16Z |
| ghsa-g589-97cx-27m9 |
8.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: pci: validate rel… | 2026-05-06T12:30:31Z | 2026-05-08T15:31:16Z |
| ghsa-g3v6-g863-2542 |
8.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix 22000 serie… | 2026-05-06T12:30:31Z | 2026-05-08T15:31:16Z |
| ghsa-fr2c-799q-pg3x |
9.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: dlm: validate length in dlm_se… | 2026-05-06T12:30:29Z | 2026-05-08T15:31:16Z |
| ghsa-8r24-mq27-r6cw |
9.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: tracepoints: get correc… | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ghsa-88rv-c8gv-rfv7 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: ensure s… | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ghsa-78rx-cxmq-q7qg |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: erofs: fix interlaced plain id… | 2026-05-06T12:30:31Z | 2026-05-08T15:31:16Z |
| ghsa-74jp-62v9-rvjf |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix double free re… | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ghsa-6xqc-j72q-x4c8 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: procfs: fix possible double mm… | 2026-05-06T12:30:31Z | 2026-05-08T15:31:16Z |
| ghsa-6g84-hfm2-x43x |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: RDMA/umem: Fix double dma_buf_… | 2026-05-06T12:30:29Z | 2026-05-08T15:31:16Z |
| ghsa-6cwp-88hv-x237 |
9.4 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo_avx2… | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ghsa-4c54-jj6j-3j34 |
8.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: wl1251: validate packet … | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ghsa-3m8w-q233-vhrp |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: mixer: oss: Add card dis… | 2026-05-06T12:30:29Z | 2026-05-08T15:31:16Z |
| ghsa-24vc-pxrh-rpjv |
8.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: validate bsscf… | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ghsa-24h4-22f3-65qc |
8.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: fs/smb/client: fix out-of-boun… | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-81 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:05.004524+00:00 |
| pysec-2024-80 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.922906+00:00 |
| pysec-2024-79 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.841635+00:00 |
| pysec-2024-78 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.12.4.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.697678+00:00 |
| pysec-2024-77 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.616691+00:00 |
| pysec-2024-76 |
7.5 (3.1)
|
An XML External Entity (XXE) vulnerability in the ebookmeta.get_metadata function of eboo… | ebookmeta | 2024-06-07T19:15:00+00:00 | 2024-09-13T21:22:04.531357+00:00 |
| pysec-2024-75 |
6.1 (3.1)
|
Twisted is an event-based framework for internet applications, supporting Python 3.6+. Th… | twisted | 2024-07-29T16:15:00+00:00 | 2024-09-11T19:19:18.005250+00:00 |
| pysec-2024-71 |
7.5 (3.1)
|
A vulnerability in corydolphin/flask-cors up to version 4.0.1 allows the `Access-Control-… | flask-cors | 2024-08-18T19:15:00Z | 2024-09-09T07:59:30.591275Z |
| pysec-2024-74 |
9.1 (3.1)
|
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to… | mindsdb | 2024-09-05T17:15:00+00:00 | 2024-09-06T15:22:53.971446+00:00 |
| pysec-2024-73 |
9.1 (3.1)
|
A vulnerability in the JSON file handling of gaizhenbiao/chuanhuchatgpt version 20240410 … | chuanhuchatgpt | 2024-07-31T01:15:00+00:00 | 2024-08-27T15:22:40.259109+00:00 |
| pysec-2024-70 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.804411+00:00 |
| pysec-2024-69 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and … | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.745844+00:00 |
| pysec-2024-68 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() an… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.682679+00:00 |
| pysec-2024-67 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.613440+00:00 |
| pysec-2024-66 |
7.8 (3.1)
|
dbt enables data analysts and engineers to transform their data using the same practices … | dbt-core | 2024-07-16T23:15:00+00:00 | 2024-07-19T17:21:49.664320+00:00 |
| pysec-2024-65 |
|
Roundup before 2.4.0 allows XSS via JavaScript in PDF, XML, and SVG documents. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:05.024899+00:00 |
| pysec-2024-64 |
|
Roundup before 2.4.0 allows XSS via a SCRIPT element in an HTTP Referer header. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:04.987078+00:00 |
| pysec-2024-63 |
|
In Roundup before 2.4.0, classhelpers (_generic.help.html) allow XSS. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:04.949977+00:00 |
| pysec-2024-62 |
|
Versions of the package langchain-experimental from 0.0.15 and before 0.0.21 are vulnerab… | langchain-experimental | 2024-07-15T05:15:00+00:00 | 2024-07-15T11:19:36.686972+00:00 |
| pysec-2024-61 |
6.1 (3.1)
|
A Stored Cross-Site Scripting (XSS) vulnerability exists in gaizhenbiao/chuanhuchatgpt ve… | chuanhuchatgpt | 2024-07-11T11:15:00+00:00 | 2024-07-12T21:33:00.657381+00:00 |
| pysec-2024-60 |
7.5 (3.1)
|
A vulnerability was identified in the kjd/idna library, specifically within the `idna.enc… | idna | 2024-07-07T18:15:00+00:00 | 2024-07-11T17:21:37.216928+00:00 |
| pysec-2024-59 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_l… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.800540+00:00 |
| pysec-2024-58 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. Derived classes… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.704786+00:00 |
| pysec-2024-57 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.cont… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.604887+00:00 |
| pysec-2024-56 |
|
An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urli… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.495359+00:00 |
| pysec-2024-54 |
6.5 (3.1)
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-06-24T18:15:00+00:00 | 2024-06-26T19:19:24.981233+00:00 |
| pysec-2024-53 |
|
langchain_experimental (aka LangChain Experimental) before 0.0.61 for LangChain provides … | langchain-experimental | 2024-06-16T15:15:00+00:00 | 2024-06-16T17:20:32.187558+00:00 |
| pysec-2024-52 |
|
lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys. Unless … | authlib | 2024-06-09T19:15:00+00:00 | 2024-06-09T21:20:21.309692+00:00 |
| pysec-2024-51 |
|
A broken access control vulnerability exists in mlflow/mlflow versions before 2.10.1, whe… | mlflow | 2024-05-16T09:15:00+00:00 | 2024-05-16T11:19:52.866536+00:00 |
| pysec-2024-50 |
|
Synapse is an open-source Matrix homeserver. A remote Matrix user with malicious intent, … | matrix-synapse | 2024-04-23T18:15:00+00:00 | 2024-04-23T21:18:51.688096+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33493 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.619288Z |
| gsd-2024-33492 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.731337Z |
| gsd-2024-33491 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.718371Z |
| gsd-2024-33490 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.665553Z |
| gsd-2024-33489 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.611685Z |
| gsd-2024-33488 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.694115Z |
| gsd-2024-33487 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.639566Z |
| gsd-2024-33486 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.748923Z |
| gsd-2024-33485 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.745744Z |
| gsd-2024-33484 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.661953Z |
| gsd-2024-33483 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.701680Z |
| gsd-2024-33482 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.716648Z |
| gsd-2024-33481 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.698021Z |
| gsd-2024-33480 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.675618Z |
| gsd-2024-33479 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.623322Z |
| gsd-2024-33478 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.740835Z |
| gsd-2024-33477 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.655326Z |
| gsd-2024-33476 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.701273Z |
| gsd-2024-33475 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.736524Z |
| gsd-2024-33474 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.614325Z |
| gsd-2024-33473 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.742910Z |
| gsd-2024-33472 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.672300Z |
| gsd-2024-33471 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.699196Z |
| gsd-2024-33470 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.605391Z |
| gsd-2024-33469 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.670615Z |
| gsd-2024-33468 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.730709Z |
| gsd-2024-33467 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.659390Z |
| gsd-2024-33466 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.737764Z |
| gsd-2024-33465 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.757068Z |
| gsd-2024-33464 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.753578Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2853 | Malicious code in react-hook-form (npm) | 2026-04-18T07:33:44Z | 2026-04-23T20:50:51Z |
| mal-2026-2845 | Malicious code in node-red-contrib-yolo-object-detection (npm) | 2026-04-17T11:30:45Z | 2026-04-23T20:50:51Z |
| mal-2026-2838 | Malicious code in koa-v3 (npm) | 2026-04-17T10:20:59Z | 2026-04-23T20:50:51Z |
| mal-2026-2830 | Malicious code in renovate-config-doctolib (npm) | 2026-04-17T06:20:10Z | 2026-04-23T20:50:51Z |
| mal-2026-2829 | Malicious code in paddle-internal-scripts (npm) | 2026-04-17T06:19:25Z | 2026-04-23T20:50:51Z |
| mal-2026-2817 | Malicious code in lightweight-charts-4.1 (npm) | 2026-04-16T17:35:59Z | 2026-04-23T20:50:51Z |
| mal-2026-2798 | Malicious code in request-easy-validator (npm) | 2026-04-16T10:15:30Z | 2026-04-23T20:50:51Z |
| mal-2026-2797 | Malicious code in relion-node (npm) | 2026-04-16T10:15:19Z | 2026-04-23T20:50:51Z |
| mal-2026-2796 | Malicious code in relion-chain (npm) | 2026-04-16T10:15:17Z | 2026-04-23T20:50:51Z |
| mal-2026-2795 | Malicious code in react-appfabric-shell (npm) | 2026-04-16T10:13:30Z | 2026-04-23T20:50:51Z |
| mal-2026-2794 | Malicious code in puzzle-fragment (npm) | 2026-04-16T10:12:49Z | 2026-04-23T20:50:51Z |
| mal-2026-2793 | Malicious code in pil2-stark-js (npm) | 2026-04-16T10:11:12Z | 2026-04-23T20:50:51Z |
| mal-2026-2792 | Malicious code in pil2-proofman-js (npm) | 2026-04-16T10:11:10Z | 2026-04-23T20:50:51Z |
| mal-2026-2791 | Malicious code in payments-ui (npm) | 2026-04-16T10:10:48Z | 2026-04-23T20:50:51Z |
| mal-2026-2790 | Malicious code in package-with-import-assertions (npm) | 2026-04-16T10:09:59Z | 2026-04-23T20:50:51Z |
| mal-2026-2789 | Malicious code in otomi-tasks (npm) | 2026-04-16T10:09:49Z | 2026-04-23T20:50:51Z |
| mal-2026-2788 | Malicious code in otomi-console (npm) | 2026-04-16T10:09:47Z | 2026-04-23T20:50:51Z |
| mal-2026-2787 | Malicious code in node-syncora (npm) | 2026-04-16T10:07:54Z | 2026-04-23T20:50:51Z |
| mal-2026-2786 | Malicious code in node-metrica (npm) | 2026-04-16T10:07:46Z | 2026-04-23T20:50:51Z |
| mal-2026-2785 | Malicious code in nemo-jaws (npm) | 2026-04-16T10:07:12Z | 2026-04-23T20:50:51Z |
| mal-2026-2784 | Malicious code in nemo-datadrive (npm) | 2026-04-16T10:07:10Z | 2026-04-23T20:50:51Z |
| mal-2026-2783 | Malicious code in mypeopledoc (npm) | 2026-04-16T10:06:28Z | 2026-04-23T20:50:51Z |
| mal-2026-2782 | Malicious code in mybibilabu (npm) | 2026-04-16T10:06:26Z | 2026-04-23T20:50:51Z |
| mal-2026-2781 | Malicious code in minecraft_image_to_blocks (npm) | 2026-04-16T10:05:22Z | 2026-04-23T20:50:51Z |
| mal-2026-2780 | Malicious code in metrify-node (npm) | 2026-04-16T10:05:20Z | 2026-04-23T20:50:51Z |
| mal-2026-2779 | Malicious code in metrify-chain (npm) | 2026-04-16T10:05:18Z | 2026-04-23T20:50:51Z |
| mal-2026-2778 | Malicious code in marketing-analytics (npm) | 2026-04-16T10:04:46Z | 2026-04-23T20:50:51Z |
| mal-2026-2777 | Malicious code in linode-developers (npm) | 2026-04-16T10:03:45Z | 2026-04-23T20:50:51Z |
| mal-2026-2685 | Malicious code in react-dom-19 (npm) | 2026-04-15T13:21:15Z | 2026-04-23T20:50:51Z |
| mal-2026-2677 | Malicious code in pdf-linker (npm) | 2026-04-15T03:12:05Z | 2026-04-23T20:50:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1312 | libxml2: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-11T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1231 | Python: Mehrere Schwachstellen | 2025-06-03T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1206 | Perl: Schwachstelle ermöglicht Codeausführung und Offenlegung von Informationen | 2025-06-01T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1204 | systemd-coredump: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-06-01T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1089 | GNU libc: Schwachstelle ermöglicht Codeausführung | 2025-05-18T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0853 | libxml2: Schwachstelle ermöglicht Denial of Service | 2025-04-21T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0795 | MIT Kerberos: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-04-14T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0730 | libxml2: Schwachstelle ermöglicht Manipulation von Dateien | 2025-04-07T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0562 | expat: Schwachstelle ermöglicht Denial of Service | 2025-03-13T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0084 | Rsync: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2024-1562 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-07-09T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2024-0126 | EDK2 NetworkPkg IP stack implementation: Mehrere Schwachstellen | 2024-01-16T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2022-1822 | libTIFF: Mehrere Schwachstellen | 2022-10-23T22:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0135 | Google Fast Pair Bluetooth Protokoll: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-15T23:00:00.000+00:00 | 2026-01-20T23:00:00.000+00:00 |
| wid-sec-w-2026-0144 | n8n: Schwachstelle ermöglicht Codeausführung | 2026-01-18T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0138 | Red Hat Enterprise Linux (gpsd): Mehrere Schwachstellen | 2026-01-18T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0106 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0056 | MailPit: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-11T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0018 | MailPit: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-06T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-2781 | Microsoft Windows: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-1372 | Linux Kernel: Schwachstelle ermöglicht Manipulation von Daten und Denial of Service | 2025-06-22T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-1270 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-09T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-1201 | Linux Kernel: Mehrere Schwachstellen | 2025-05-29T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0679 | Golang Go: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-04-01T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0411 | Linux Kernel: Mehrere Schwachstellen | 2025-02-18T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0378 | Linux Kernel: Mehrere Schwachstellen | 2025-02-13T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0265 | Linux Kernel: Mehrere Schwachstellen | 2025-02-04T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0188 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-01-23T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0047 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-12T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0035 | Linux Kernel: Mehrere Schwachstellen | 2025-01-08T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-15-034-01 | Siemens SCALANCE X-200IRT Switch Family User Impersonation Vulnerability | 2015-11-06T07:00:00.000000Z | 2025-06-18T19:25:20.526318Z |
| icsa-13-022-02 | GE Intelligent Platforms Proficy Cimplicity Multiple Vulnerabilities | 2013-10-26T06:00:00.000000Z | 2025-06-18T19:25:08.106052Z |
| icsa-12-354-01a | Ruggedcom ROS Hard-Coded RSA SSL Private Key | 2012-09-22T06:00:00.000000Z | 2025-06-18T19:25:01.798871Z |
| icsa-12-342-01b | Rockwell Allen-Bradley MicroLogix, SLC 500, and PLC-5 Fault Generation Vulnerability | 2012-09-10T06:00:00.000000Z | 2025-06-18T19:24:55.231514Z |
| icsa-12-249-03 | InduSoft ISSymbol ActiveX Control Buffer Overflow | 2012-06-09T06:00:00.000000Z | 2025-06-18T19:04:35.253383Z |
| icsa-12-228-01a | Tridium Niagara Vulnerabilities | 2012-05-19T06:00:00.000000Z | 2025-06-18T19:04:29.046428Z |
| icsa-15-099-01e | Siemens SIMATIC HMI Devices Vulnerabilities (Update E) | 2015-01-10T07:00:00.000000Z | 2025-06-18T19:04:22.822443Z |
| icsa-15-146-01 | Mitsubishi Electric MELSEC FX-Series Controllers Denial of Service | 2015-02-26T07:00:00.000000Z | 2025-06-18T19:04:16.618149Z |
| icsa-15-153-01 | Beckwith Electric TCP Initial Sequence Vulnerability | 2015-03-05T07:00:00.000000Z | 2025-06-18T19:04:10.391763Z |
| icsa-15-169-02 | Schneider Electric Wonderware System Platform Vulnerabilities | 2015-03-21T06:00:00.000000Z | 2025-06-18T19:04:04.192744Z |
| icsa-15-169-01b | Wind River VXWorks TCP Predictability Vulnerability in ICS Devices (Update B) | 2015-03-21T06:00:00.000000Z | 2025-06-18T19:03:57.981923Z |
| icsa-12-032-03 | GE Intelligent Platforms Proficy Real-Time Information Portal Directory Traversal | 2012-11-04T06:00:00.000000Z | 2025-06-18T19:03:51.787688Z |
| icsa-12-079-01 | Microsoft Remote Desktop Protocol Memory Corruption Vulnerability | 2012-12-21T07:00:00.000000Z | 2025-06-18T19:03:45.218685Z |
| icsa-10-348-01a | Wonderware InBatch Vulnerability | 2010-09-16T06:00:00.000000Z | 2025-06-17T16:50:19.269504Z |
| icsa-10-322-02a | Automated Solutions OPC Vulnerability | 2010-08-21T06:00:00.000000Z | 2025-06-17T16:50:13.013737Z |
| icsa-16-343-01 | Moxa MiiNePort Session Hijack Vulnerabilities | 2016-09-11T06:00:00.000000Z | 2025-06-17T16:50:00.161907Z |
| icsa-12-047-01a | Advantech WebAccess Vulnerabilities | 2012-11-19T07:00:00.000000Z | 2025-06-17T15:46:30.792399Z |
| icsa-12-150-01 | Honeywell HMIWeb Browser Buffer Overflow Vulnerability | 2012-03-02T07:00:00.000000Z | 2025-06-17T15:46:24.572627Z |
| icsa-12-146-01a | RuggedCom Weak Cryptography for Password Vulnerability | 2012-02-26T07:00:00.000000Z | 2025-06-17T15:46:18.307459Z |
| icsa-12-138-01 | Emerson DeltaV Multiple Vulnerabilities | 2012-02-18T07:00:00.000000Z | 2025-06-17T15:45:47.164093Z |
| icsa-12-062-01 | Wonderware Information Server Multiple Vulnerabilities | 2012-12-04T07:00:00.000000Z | 2025-06-17T15:45:28.468819Z |
| icsa-12-059-01 | ABB Robot Communications Runtime Buffer Overflow | 2012-12-01T07:00:00.000000Z | 2025-06-17T15:45:21.808130Z |
| icsa-25-168-05 | Dover Fueling Solutions ProGauge MagLink LX consoles | 2025-06-17T06:00:00.000000Z | 2025-06-17T06:00:00.000000Z |
| icsa-25-168-04 | Fuji Electric Smart Editor | 2025-06-17T06:00:00.000000Z | 2025-06-17T06:00:00.000000Z |
| icsa-25-168-02 | LS Electric GMWin 4 | 2025-06-17T06:00:00.000000Z | 2025-06-17T06:00:00.000000Z |
| va-25-136-01 | IBM Security Guardium stored cross-site scripting | 2025-05-16T20:14:51Z | 2025-06-16T00:00:00Z |
| icsa-13-352-01 | NovaTech Orion DNP3 Improper Input Validation Vulnerability | 2013-09-20T06:00:00.000000Z | 2025-06-12T21:23:06.621585Z |
| icsa-13-113-01 | Wonderware Information Server Vulnerabilities | 2013-01-25T07:00:00.000000Z | 2025-06-12T18:45:02.717561Z |
| icsa-14-205-02a | Siemens SIMATIC WinCC Vulnerabilities (Update A) | 2014-04-26T06:00:00.000000Z | 2025-06-12T18:44:31.147692Z |
| icsa-14-105-01 | Progea Movicon SCADA Information Disclosure Vulnerability | 2014-01-16T07:00:00.000000Z | 2025-06-12T18:44:24.886887Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-lisp-3gYXs3qP | Cisco IOS and IOS XE Software Locator ID Separation Protocol Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-isis-sgjyouhx | Cisco IOS and IOS XE Software Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-isis-sGjyOUHX | Cisco IOS and IOS XE Software Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-iosxe-wlc-privesc-rjsmrmpk | Cisco IOS XE Software for Wireless LAN Controllers Privilege Escalation Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-iosxe-wlc-privesc-RjSMrmPK | Cisco IOS XE Software for Wireless LAN Controllers Privilege Escalation Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-iosxe-priv-esc-seax6nlx | Cisco IOS XE Software Privilege Escalation Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-iosxe-priv-esc-seAx6NLX | Cisco IOS XE Software Privilege Escalation Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-iosxe-ospf-dos-dr9sfrxp | Cisco IOS XE Software OSPFv2 Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-iosxe-ospf-dos-dR9Sfrxp | Cisco IOS XE Software OSPFv2 Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ios-xe-sda-edge-dos-qzwuwxwg | Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ios-xe-sda-edge-dos-qZWuWXWG | Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ikev1-no2ccfwz | Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Fragmentation Denial of Service Vulnerabilities | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ikev1-NO2ccFWz | Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Fragmentation Denial of Service Vulnerabilities | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-dmi-acl-bypass-xv8fo8vz | Cisco IOS XE Software NETCONF/RESTCONF IPv4 Access Control List Bypass Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-dmi-acl-bypass-Xv8FO8Vz | Cisco IOS XE Software NETCONF/RESTCONF IPv4 Access Control List Bypass Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-dhcp-dos-t3cxpo9z | Cisco IOS XE Software DHCP Snooping with Endpoint Analytics Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-dhcp-dos-T3CXPO9z | Cisco IOS XE Software DHCP Snooping with Endpoint Analytics Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ccc-authz-bypass-5ekchjrb | Cisco Catalyst Center Authorization Bypass Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-aux-333wbz8f | Cisco IOS XE Software Auxiliary Asynchronous Port Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-aux-333WBz8f | Cisco IOS XE Software Auxiliary Asynchronous Port Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ap-secureboot-bypass-zt5vjksd | Cisco Access Point Software Secure Boot Bypass Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ap-secureboot-bypass-zT5vJkSD | Cisco Access Point Software Secure Boot Bypass Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ap-dos-h9tggx6w | Cisco Access Point Software Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-ap-dos-h9TGGX6W | Cisco Access Point Software Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-airo-ap-dos-ppptcvw | Cisco Aironet Access Point Software Resource Exhaustion Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-03-27T16:00:00+00:00 |
| cisco-sa-iosxr-redis-abjye5xk | Cisco IOS XR Software Health Check Open Port Vulnerability | 2022-05-20T16:00:00+00:00 | 2024-03-15T16:55:47+00:00 |
| cisco-sa-iosxr-redis-ABJyE5xK | Cisco IOS XR Software Health Check Open Port Vulnerability | 2022-05-20T16:00:00+00:00 | 2024-03-15T16:55:47+00:00 |
| cisco-sa-xrl2vpn-jesru3fc | Cisco IOS XR Software Layer 2 Services Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-xrl2vpn-jesrU3fc | Cisco IOS XR Software Layer 2 Services Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-snmp-uhv6zdef | Cisco IOS XR Software SNMP Management Plane Protection ACL Bypass Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-13763 | Libopensc: opensc: multiple uses of uninitialized variable | 2026-04-02T00:00:00.000Z | 2026-04-30T01:50:35.000Z |
| msrc_cve-2026-23428 | ksmbd: fix use-after-free of share_conf in compound request | 2026-04-02T00:00:00.000Z | 2026-04-30T01:50:21.000Z |
| msrc_cve-2026-41988 | CVE-2026-41988 | 2026-04-02T00:00:00.000Z | 2026-04-30T01:50:14.000Z |
| msrc_cve-2026-41681 | rust-openssl: MdCtxRef::digest_final() writes past caller buffer with no length check | 2026-04-02T00:00:00.000Z | 2026-04-30T01:50:12.000Z |
| msrc_cve-2026-28387 | Potential Use-after-free in DANE Client Code | 2026-04-02T00:00:00.000Z | 2026-04-30T01:49:59.000Z |
| msrc_cve-2026-41445 | KissFFT Integer Overflow Heap Buffer Overflow via kiss_fftndr_alloc() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:49:48.000Z |
| msrc_cve-2026-41677 | rust-openssl: Out-of-bounds read in PEM password callback when user callback returns an oversized length | 2026-04-02T00:00:00.000Z | 2026-04-30T01:49:43.000Z |
| msrc_cve-2026-5187 | Heap Out-of-Bounds Write in DecodeObjectId() in wolfSSL | 2026-04-02T00:00:00.000Z | 2026-04-30T01:49:37.000Z |
| msrc_cve-2026-6409 | Denial of Service (DoS) vulnerability exists in the Protobuf PHP library during the parsing of untrusted input | 2026-04-02T00:00:00.000Z | 2026-04-30T01:49:27.000Z |
| msrc_cve-2026-34978 | OpenPrinting CUPS: Path traversal in RSS notify-recipient-uri enables file write outside CacheDir/rss (and clobbering of job.cache) | 2026-04-02T00:00:00.000Z | 2026-04-30T01:49:24.000Z |
| msrc_cve-2026-41678 | rust-openssl: Incorrect bounds assertion in aes key wrap | 2026-04-02T00:00:00.000Z | 2026-04-30T01:49:10.000Z |
| msrc_cve-2026-31410 | ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION | 2026-04-02T00:00:00.000Z | 2026-04-30T01:48:55.000Z |
| msrc_cve-2026-41676 | rust-openssl: Deriver::derive and PkeyCtxRef::derive can overflow short buffers on OpenSSL 1.1.1 | 2026-04-02T00:00:00.000Z | 2026-04-30T01:48:29.000Z |
| msrc_cve-2026-31512 | Bluetooth: L2CAP: Validate PDU length before reading SDU length in l2cap_ecred_data_rcv() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:48:21.000Z |
| msrc_cve-2026-34073 | cryptography has incomplete DNS name constraint enforcement on peer names | 2026-03-02T00:00:00.000Z | 2026-04-30T01:48:15.000Z |
| msrc_cve-2026-31492 | RDMA/irdma: Initialize free_qp completion before using it | 2026-04-02T00:00:00.000Z | 2026-04-30T01:48:09.000Z |
| msrc_cve-2026-2100 | P11-kit: p11-kit: null dereference via c_derivekey with specific null parameters | 2026-03-02T00:00:00.000Z | 2026-04-30T01:48:01.000Z |
| msrc_cve-2026-31498 | Bluetooth: L2CAP: Fix ERTM re-init and zero pdu_len infinite loop | 2026-04-02T00:00:00.000Z | 2026-04-30T01:47:57.000Z |
| msrc_cve-2025-66215 | OpenSC: Stack-buffer-overflow WRITE in card-oberthur | 2026-03-02T00:00:00.000Z | 2026-04-30T01:47:48.000Z |
| msrc_cve-2026-31480 | tracing: Fix potential deadlock in cpu hotplug with osnoise | 2026-04-02T00:00:00.000Z | 2026-04-30T01:47:35.000Z |
| msrc_cve-2025-66037 | OpenSC: Out of Bounds vulnerability | 2026-03-02T00:00:00.000Z | 2026-04-30T01:47:31.000Z |
| msrc_cve-2022-2068 | The c_rehash script allows command injection | 2022-06-02T00:00:00.000Z | 2026-04-30T01:47:30.000Z |
| msrc_cve-2026-31530 | cxl/port: Fix use after free of parent_port in cxl_detach_ep() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:47:15.000Z |
| msrc_cve-2025-66038 | OpenSC: `sc_compacttlv_find_tag` can return out-of-bounds pointers | 2026-03-02T00:00:00.000Z | 2026-04-30T01:47:08.000Z |
| msrc_cve-2025-49010 | OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE | 2026-03-02T00:00:00.000Z | 2026-04-30T01:46:54.000Z |
| msrc_cve-2026-34043 | Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects | 2026-03-02T00:00:00.000Z | 2026-04-30T01:46:20.000Z |
| msrc_cve-2026-33916 | Handlebars.js has Prototype Pollution Leading to XSS through Partial Template Injection | 2026-03-02T00:00:00.000Z | 2026-04-30T01:46:08.000Z |
| msrc_cve-2026-23422 | dpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler | 2026-04-02T00:00:00.000Z | 2026-04-30T01:45:46.000Z |
| msrc_cve-2026-33542 | Incus does not verify combined fingerprint when downloading images from simplestreams servers | 2026-03-02T00:00:00.000Z | 2026-04-30T01:45:45.000Z |
| msrc_cve-2026-31433 | ksmbd: fix potencial OOB in get_file_all_info() for compound requests | 2026-04-02T00:00:00.000Z | 2026-04-30T01:45:42.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0443 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en NetScaler Gateway | 2024-11-13T15:10:45.265209Z | 2024-11-13T15:10:45.265209Z |
| ncsc-2024-0442 | Kwetsbaarheden verholpen in Ivanti Connect Secure en Policy Secure | 2024-11-13T12:38:13.252957Z | 2024-11-13T12:38:13.252957Z |
| ncsc-2024-0441 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2024-11-13T10:42:35.387490Z | 2024-11-13T10:42:35.387490Z |
| ncsc-2024-0440 | Kwetsbaarheden verholpen in Citrix Session Recording | 2024-11-13T08:51:17.257998Z | 2024-11-13T08:51:17.257998Z |
| ncsc-2024-0439 | Kwetsbaarheden verholpen in Microsoft Office | 2024-11-12T18:57:09.604321Z | 2024-11-12T18:57:09.604321Z |
| ncsc-2024-0438 | Kwetsbaarheid verholpen in Microsoft Exchange Server | 2024-11-12T18:56:25.729148Z | 2024-11-12T18:56:25.729148Z |
| ncsc-2024-0437 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2024-11-12T18:55:39.363057Z | 2024-11-12T18:55:39.363057Z |
| ncsc-2024-0436 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-11-12T18:54:41.456199Z | 2024-11-12T18:54:41.456199Z |
| ncsc-2024-0435 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-11-12T18:54:00.107773Z | 2024-11-12T18:54:00.107773Z |
| ncsc-2024-0434 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-11-12T18:53:07.914094Z | 2024-11-12T18:53:07.914094Z |
| ncsc-2024-0433 | Kwetsbaarheden verholpen in Siemens producten | 2024-11-12T14:19:20.051128Z | 2024-11-12T14:19:20.051128Z |
| ncsc-2024-0432 | Kwetsbaarheden verholpen in Cisco Identity Services Engine | 2024-11-07T08:55:49.899244Z | 2024-11-07T08:55:49.899244Z |
| ncsc-2024-0431 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2024-11-07T08:51:16.689034Z | 2024-11-07T08:51:16.689034Z |
| ncsc-2024-0430 | Kwetsbaarheid verholpen in Cisco Catalyst Access points | 2024-11-07T08:47:41.650502Z | 2024-11-07T08:47:41.650502Z |
| ncsc-2024-0429 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-11-05T14:09:27.373651Z | 2024-11-05T14:09:27.373651Z |
| ncsc-2024-0428 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-10-30T11:39:26.910666Z | 2024-10-30T11:39:26.910666Z |
| ncsc-2024-0427 | Kwetsbaarheden verholpen in Google Chrome | 2024-10-30T11:36:05.615865Z | 2024-10-30T11:36:05.615865Z |
| ncsc-2024-0426 | Kwetsbaarheden verholpen in Apple MacOS | 2024-10-30T11:26:13.535716Z | 2024-10-30T11:26:13.535716Z |
| ncsc-2024-0425 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2024-10-30T10:53:07.348476Z | 2024-10-30T10:53:07.348476Z |
| ncsc-2024-0424 | Kwetsbaarheden verholpen in Cisco Adaptive Security Appliance en Firepower Threat Defense | 2024-10-24T08:37:15.013231Z | 2024-10-24T08:37:15.013231Z |
| ncsc-2024-0422 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2024-10-18T09:26:29.690794Z | 2024-10-18T09:26:29.690794Z |
| ncsc-2024-0421 | Kwetsbaarheden verholpen in SolarWinds Serv-U | 2024-10-18T09:10:48.856424Z | 2024-10-18T09:10:48.856424Z |
| ncsc-2024-0420 | Kwetsbaarheden verholpen in Oracle MySQL | 2024-10-17T13:20:42.437738Z | 2024-10-17T13:20:42.437738Z |
| ncsc-2024-0419 | Kwetsbaarheden verholpen in Oracle Java | 2024-10-17T13:20:07.759085Z | 2024-10-17T13:20:07.759085Z |
| ncsc-2024-0418 | Kwetsbaarheden verholpen in Oracle Analytics | 2024-10-17T13:19:50.583299Z | 2024-10-17T13:19:50.583299Z |
| ncsc-2024-0417 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2024-10-17T13:19:16.185510Z | 2024-10-17T13:19:16.185510Z |
| ncsc-2024-0416 | Kwetsbaarheden verholpen in Oracle Financial Services Applications | 2024-10-17T13:18:45.385015Z | 2024-10-17T13:18:45.385015Z |
| ncsc-2024-0415 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2024-10-17T13:18:06.611153Z | 2024-10-17T13:18:06.611153Z |
| ncsc-2024-0414 | Kwetsbaarheden verholpen in Oracle Communications | 2024-10-17T13:17:52.103171Z | 2024-10-17T13:17:52.103171Z |
| ncsc-2024-0413 | Kwetsbaarheden verholpen in Oracle Commerce | 2024-10-17T13:17:19.736602Z | 2024-10-17T13:17:19.736602Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10205-1 | python311-cryptography-46.0.5-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10204-1 | openjfx-17.0.18.0-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10203-1 | libssh-config-0.11.4-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10202-1 | himmelblau-2.3.5+git0.9dd526c-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10201-1 | chromedriver-145.0.7632.45-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:20233-1 | Security update for openCryptoki | 2026-02-13T17:42:04Z | 2026-02-13T17:42:04Z |
| opensuse-su-2026:20227-1 | Security update for patch | 2026-02-13T16:41:43Z | 2026-02-13T16:41:43Z |
| opensuse-su-2026:20219-1 | Security update for htmldoc | 2026-02-13T16:07:48Z | 2026-02-13T16:07:48Z |
| opensuse-su-2026:20220-1 | Security update for go1.24 | 2026-02-13T11:53:30Z | 2026-02-13T11:53:30Z |
| opensuse-su-2026:20214-1 | Security update for go1.25 | 2026-02-13T10:08:14Z | 2026-02-13T10:08:14Z |
| opensuse-su-2026:20206-1 | Security update for kepler | 2026-02-13T08:53:10Z | 2026-02-13T08:53:10Z |
| opensuse-su-2026:10200-1 | python310-3.10.19-4.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10199-1 | python311-pymssql-2.3.12-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10198-1 | python311-Pillow-12.1.1-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10197-1 | libecpg6-18.2-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10196-1 | matrix-synapse-1.147.1-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10195-1 | gimp-3.0.8-2.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:10194-1 | cargo-audit-advisory-db-20260213-1.1 on GA media | 2026-02-13T00:00:00Z | 2026-02-13T00:00:00Z |
| opensuse-su-2026:20205-1 | Security update for rust1.93 | 2026-02-12T15:13:26Z | 2026-02-12T15:13:26Z |
| opensuse-su-2026:20204-1 | Security update for python-aiohttp, python-Brotli | 2026-02-12T14:01:04Z | 2026-02-12T14:01:04Z |
| opensuse-su-2026:10193-1 | postgresql17-17.8-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10192-1 | postgresql16-16.12-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10191-1 | postgresql15-15.16-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10190-1 | postgresql14-14.21-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10189-1 | libowncloudsync-devel-6.0.3-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10188-1 | libpng16-16-1.6.55-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10187-1 | haproxy-3.3.3+git0.465d8e2fc-1.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10186-1 | gnome-remote-desktop-49.2-2.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10185-1 | cargo-c-0.10.15-2.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:10184-1 | cargo-auditable-0.7.2~0-2.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:3907 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.1.5 | 2025-04-16T21:35:18+00:00 | 2026-05-08T20:58:21+00:00 |
| rhsa-2025:3906 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.9.13 | 2025-04-16T10:29:32+00:00 | 2026-05-08T20:58:21+00:00 |
| rhsa-2025:3886 | Red Hat Security Advisory: RHOAI 2.19.0 - Red Hat OpenShift AI | 2025-04-15T07:52:02+00:00 | 2026-05-08T20:58:18+00:00 |
| rhsa-2025:3863 | Red Hat Security Advisory: Red Hat multicluster global hub 1.3.3 bug fixes and container update | 2025-04-14T18:00:47+00:00 | 2026-05-08T20:58:18+00:00 |
| rhsa-2025:3833 | Red Hat Security Advisory: gvisor-tap-vsock security update | 2025-04-14T09:21:59+00:00 | 2026-05-08T20:58:18+00:00 |
| rhsa-2025:3820 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T17:22:43+00:00 | 2026-05-08T20:58:17+00:00 |
| rhsa-2025:3814 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T15:20:44+00:00 | 2026-05-08T20:58:17+00:00 |
| rhsa-2025:3813 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T14:56:45+00:00 | 2026-05-08T20:58:16+00:00 |
| rhsa-2025:3811 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T14:32:08+00:00 | 2026-05-08T20:58:15+00:00 |
| rhsa-2025:3808 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T14:26:28+00:00 | 2026-05-08T20:58:15+00:00 |
| rhsa-2025:3798 | Red Hat Security Advisory: OpenShift Container Platform 4.17.25 bug fix and security update | 2025-04-16T17:46:00+00:00 | 2026-05-08T20:58:12+00:00 |
| rhsa-2025:3790 | Red Hat Security Advisory: OpenShift Container Platform 4.15.49 bug fix and security update | 2025-04-17T04:03:56+00:00 | 2026-05-08T20:58:12+00:00 |
| rhsa-2025:3775 | Red Hat Security Advisory: OpenShift Container Platform 4.18.9 bug fix and security update | 2025-04-16T06:12:24+00:00 | 2026-05-08T20:58:11+00:00 |
| rhsa-2025:3763 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.13.2 container image updates | 2025-04-09T16:37:37+00:00 | 2026-05-08T20:58:10+00:00 |
| rhsa-2025:3743 | Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.5.1 release | 2025-04-09T09:53:12+00:00 | 2026-05-08T20:58:10+00:00 |
| rhsa-2025:3740 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.5.1 release | 2025-04-09T08:52:08+00:00 | 2026-05-08T20:58:09+00:00 |
| rhsa-2025:3720 | Red Hat Security Advisory: multicluster engine for Kubernetes 2.8.1 container image updates | 2025-04-08T23:25:49+00:00 | 2026-05-08T20:58:09+00:00 |
| rhsa-2025:3698 | Red Hat Security Advisory: opentelemetry-collector security update | 2025-04-08T15:23:59+00:00 | 2026-05-08T20:58:09+00:00 |
| rhsa-2025:3685 | Red Hat Security Advisory: Red Hat Edge Manager Version 0.5.1 (Technology Preview) security fixes | 2025-04-08T13:01:54+00:00 | 2026-05-08T20:58:08+00:00 |
| rhsa-2025:3618 | Red Hat Security Advisory: grafana security update | 2025-04-07T02:07:30+00:00 | 2026-05-08T20:58:07+00:00 |
| rhsa-2025:3616 | Red Hat Security Advisory: grafana security update | 2025-04-07T01:59:15+00:00 | 2026-05-08T20:58:07+00:00 |
| rhsa-2025:3607 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.5.1 release | 2025-04-04T13:38:55+00:00 | 2026-05-08T20:58:06+00:00 |
| rhsa-2025:3593 | Red Hat Security Advisory: opentelemetry-collector security update | 2025-04-03T13:38:52+00:00 | 2026-05-08T20:58:06+00:00 |
| rhsa-2025:3577 | Red Hat Security Advisory: OpenShift Container Platform 4.18.8 bug fix and security update | 2025-04-10T11:37:31+00:00 | 2026-05-08T20:58:05+00:00 |
| rhsa-2025:3569 | Red Hat Security Advisory: OpenShift Container Platform 4.14.50 bug fix and security update | 2025-04-09T20:55:32+00:00 | 2026-05-08T20:58:05+00:00 |
| rhsa-2025:3438 | Red Hat Security Advisory: ACS 4.7 enhancement and security update | 2025-04-01T04:50:23+00:00 | 2026-05-08T20:58:05+00:00 |
| rhsa-2025:3565 | Red Hat Security Advisory: OpenShift Container Platform 4.17.24 bug fix and security update | 2025-04-09T04:47:09+00:00 | 2026-05-08T20:58:04+00:00 |
| rhsa-2025:3503 | Red Hat Security Advisory: Red Hat build of Cryostat security update | 2025-04-02T04:03:14+00:00 | 2026-05-08T20:58:03+00:00 |
| rhsa-2025:3266 | Red Hat Security Advisory: container-tools:rhel8 security update | 2025-03-26T14:25:08+00:00 | 2026-05-08T20:58:03+00:00 |
| rhsa-2025:3501 | Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift 2.15.1-4 Update | 2025-04-01T20:50:35+00:00 | 2026-05-08T20:58:02+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-632164 | SSA-632164: External Entity Injection Vulnerability in Polarion ALM | 2023-04-11T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-592007 | SSA-592007: Denial of Service Vulnerability in Industrial Products | 2018-03-20T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-555292 | SSA-555292: Security Vulnerabilities Fixed in SIMATIC Cloud Connect 7 V2.1 | 2023-05-09T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-480230 | SSA-480230: Denial of Service Vulnerability in Webserver of Industrial Products | 2019-04-09T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-325383 | SSA-325383: Multiple Vulnerabilities in SCALANCE LPE9403 before V2.1 | 2023-05-09T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-113131 | SSA-113131: Denial of Service Vulnerabilities in SIMATIC S7-400 CPUs | 2018-11-13T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-978220 | SSA-978220: Denial of Service Vulnerability over SNMP in Multiple Industrial Products | 2020-02-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-840188 | SSA-840188: Multiple Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products | 2021-11-09T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-838121 | SSA-838121: Multiple Denial of Service Vulnerabilities in Industrial Products | 2022-02-08T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-792594 | SSA-792594: Host Header Injection Vulnerability in Polarion ALM | 2022-12-13T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-700053 | SSA-700053: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2022-12-13T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-699404 | SSA-699404: Observable Response Discrepancy in Mendix Forgot Password Module | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-676336 | SSA-676336: OpenSSH Vulnerabilities in SCALANCE X-200 and X-300/X408 Switches | 2021-09-14T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-642810 | SSA-642810: JT File Parsing Vulnerability in JT Open and JT Utilities | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-629917 | SSA-629917: Datalogics File Parsing Vulnerability in Teamcenter Visualization and JT2Go | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-603476 | SSA-603476: Web Vulnerabilities in SIMATIC NET CP 343-1/CP 443-1 Modules and SIMATIC S7-300/S7-400 CPUs | 2016-11-21T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-572164 | SSA-572164: Luxion KeyShot Vulnerability in Solid Edge | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-558014 | SSA-558014: Third-Party Component Vulnerabilities in SCALANCE XCM332 before V2.2 | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-557541 | SSA-557541: Denial-of-Service Vulnerability in SIMATIC S7-400 CPUs | 2022-04-12T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-549234 | SSA-549234: Denial-of-Service Vulnerability in SIMATIC NET CP Modules | 2021-09-14T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-511182 | SSA-511182: Use of Static TLS Certificate Known Hard Coded Private Keys in Adaptec Maxview Application | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-479249 | SSA-479249: Weak Encryption Vulnerability in SCALANCE X-200IRT Devices | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-472454 | SSA-472454: Command Injection Vulnerability in CPCI85 Firmware of SICAM A8000 Devices | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-462066 | SSA-462066: Vulnerability known as TCP SACK PANIC in Industrial Products | 2019-09-10T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-459643 | SSA-459643: Denial of Service Vulnerability in RUGGEDCOM ROS before V5.6.0 | 2022-09-13T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-310038 | SSA-310038: Multiple Vulnerabilities in SCALANCE X Switch Devices | 2022-07-12T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-270778 | SSA-270778: Denial-of-Service Vulnerability in SIMATIC PCS 7, SIMATIC WinCC and SIMATIC NET PC Software | 2020-02-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-102233 | SSA-102233: SegmentSmack in VxWorks-based Industrial Devices | 2020-04-14T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-941426 | SSA-941426: Multiple LLDP Vulnerabilities in Industrial Products | 2021-07-13T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-847261 | SSA-847261: Multiple SPP File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2023-02-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21096-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-04-11T07:42:41Z | 2026-04-11T07:42:41Z |
| suse-su-2026:1265-1 | Security update for the Linux Kernel (Live Patch 46 for SUSE Linux Enterprise 15 SP4) | 2026-04-11T04:34:33Z | 2026-04-11T04:34:33Z |
| suse-su-2026:1263-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T22:35:17Z | 2026-04-10T22:35:17Z |
| suse-su-2026:1262-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T21:43:55Z | 2026-04-10T21:43:55Z |
| suse-su-2026:1261-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T19:34:46Z | 2026-04-10T19:34:46Z |
| suse-su-2026:21173-1 | Security update for sqlite3 | 2026-04-10T18:50:16Z | 2026-04-10T18:50:16Z |
| suse-su-2026:21095-1 | Security update for sqlite3 | 2026-04-10T18:50:16Z | 2026-04-10T18:50:16Z |
| suse-su-2026:21172-1 | Security update for pcre2 | 2026-04-10T18:27:30Z | 2026-04-10T18:27:30Z |
| suse-su-2026:21094-1 | Security update for pcre2 | 2026-04-10T18:27:30Z | 2026-04-10T18:27:30Z |
| suse-su-2026:1259-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6) | 2026-04-10T17:35:15Z | 2026-04-10T17:35:15Z |
| suse-su-2026:1258-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T17:35:09Z | 2026-04-10T17:35:09Z |
| suse-su-2026:1257-1 | Security update for openssl-1_1 | 2026-04-10T15:06:36Z | 2026-04-10T15:06:36Z |
| suse-su-2026:1256-1 | Security update for openssl-1_0_0 | 2026-04-10T14:57:18Z | 2026-04-10T14:57:18Z |
| suse-su-2026:1255-1 | Security update for openssl-1_1 | 2026-04-10T14:56:12Z | 2026-04-10T14:56:12Z |
| suse-su-2026:1254-1 | Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T14:04:42Z | 2026-04-10T14:04:42Z |
| suse-su-2026:21121-1 | Security update for NetworkManager | 2026-04-10T12:48:36Z | 2026-04-10T12:48:36Z |
| suse-su-2026:21113-1 | Security update for NetworkManager | 2026-04-10T12:30:19Z | 2026-04-10T12:30:19Z |
| suse-su-2026:21167-1 | Security update for cockpit-podman | 2026-04-10T11:54:16Z | 2026-04-10T11:54:16Z |
| suse-su-2026:21023-1 | Security update for cockpit-podman | 2026-04-10T11:54:16Z | 2026-04-10T11:54:16Z |
| suse-su-2026:21168-1 | Security update for cockpit-machines | 2026-04-10T11:53:13Z | 2026-04-10T11:53:13Z |
| suse-su-2026:21024-1 | Security update for cockpit-machines | 2026-04-10T11:53:13Z | 2026-04-10T11:53:13Z |
| suse-su-2026:21166-1 | Security update for cockpit | 2026-04-10T11:42:11Z | 2026-04-10T11:42:11Z |
| suse-su-2026:21022-1 | Security update for cockpit | 2026-04-10T11:42:11Z | 2026-04-10T11:42:11Z |
| suse-su-2026:1252-1 | Security update for tigervnc | 2026-04-10T11:36:58Z | 2026-04-10T11:36:58Z |
| suse-su-2026:1251-1 | Security update for cockpit-podman | 2026-04-10T11:36:50Z | 2026-04-10T11:36:50Z |
| suse-su-2026:1250-1 | Security update for cockpit-tukit | 2026-04-10T11:36:40Z | 2026-04-10T11:36:40Z |
| suse-su-2026:1249-1 | Security update for cockpit-machines | 2026-04-10T11:36:32Z | 2026-04-10T11:36:32Z |
| suse-su-2026:21165-1 | Security update for python-cryptography | 2026-04-10T11:26:32Z | 2026-04-10T11:26:32Z |
| suse-su-2026:21021-1 | Security update for python-cryptography | 2026-04-10T11:26:32Z | 2026-04-10T11:26:32Z |
| suse-su-2026:21285-1 | Security update for corosync | 2026-04-10T11:20:26Z | 2026-04-10T11:20:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:23109 | Moderate: mysql security update | 2025-12-11T00:00:00Z | 2025-12-12T10:21:57Z |
| alsa-2025:23128 | Important: firefox security update | 2025-12-11T00:00:00Z | 2025-12-12T10:19:27Z |
| alsa-2025:23088 | Moderate: grafana security update | 2025-12-11T00:00:00Z | 2025-12-12T10:18:20Z |
| alsa-2025:23083 | Important: wireshark security update | 2025-12-10T00:00:00Z | 2025-12-12T10:17:19Z |
| alsa-2025:23035 | Important: firefox security update | 2025-12-10T00:00:00Z | 2025-12-12T10:16:15Z |
| alsa-2025:23034 | Important: firefox security update | 2025-12-10T00:00:00Z | 2025-12-12T10:14:54Z |
| alsa-2025:23008 | Moderate: mysql8.4 security update | 2025-12-10T00:00:00Z | 2025-12-12T10:13:50Z |
| alsa-2025:23048 | Important: tomcat security update | 2025-12-10T00:00:00Z | 2025-12-11T14:01:21Z |
| alsa-2025:23086 | Moderate: luksmeta security update | 2025-12-11T00:00:00Z | 2025-12-11T13:43:22Z |
| alsa-2025:22760 | Important: abrt security update | 2025-12-04T00:00:00Z | 2025-12-10T10:40:28Z |
| alsa-2025:22854 | Moderate: kernel security update | 2025-12-08T00:00:00Z | 2025-12-10T08:12:35Z |
| alsa-2025:22790 | Important: webkit2gtk3 security update | 2025-12-08T00:00:00Z | 2025-12-08T14:01:28Z |
| alsa-2025:22789 | Important: webkit2gtk3 security update | 2025-12-08T00:00:00Z | 2025-12-08T13:59:43Z |
| alsa-2025:22800 | Moderate: kernel-rt security update | 2025-12-08T00:00:00Z | 2025-12-08T13:58:04Z |
| alsa-2025:22801 | Moderate: kernel security update | 2025-12-08T00:00:00Z | 2025-12-08T13:53:19Z |
| alsa-2025:22405 | Moderate: kernel security update | 2025-12-01T00:00:00Z | 2025-12-08T12:22:10Z |
| alsa-2025:20994 | Important: ipa security update | 2025-11-11T00:00:00Z | 2025-12-05T09:05:25Z |
| alsa-2025:21931 | Moderate: kernel security update | 2025-11-24T00:00:00Z | 2025-12-05T08:40:44Z |
| alsa-2025:21036 | Important: pcs security update | 2025-11-11T00:00:00Z | 2025-12-05T08:31:28Z |
| alsa-2025:21038 | Important: kea security update | 2025-11-11T00:00:00Z | 2025-12-05T08:28:57Z |
| alsa-2025:21936 | Important: valkey security update | 2025-11-24T00:00:00Z | 2025-12-05T08:20:47Z |
| alsa-2025:22668 | Moderate: go-toolset:rhel8 security update | 2025-12-03T00:00:00Z | 2025-12-05T08:01:54Z |
| alsa-2025:22012 | Important: buildah security update | 2025-11-25T00:00:00Z | 2025-12-05T07:44:58Z |
| alsa-2025:22361 | Moderate: qt6-qtquick3d security update | 2025-12-01T00:00:00Z | 2025-12-05T07:43:58Z |
| alsa-2025:22394 | Moderate: qt6-qtsvg security update | 2025-12-01T00:00:00Z | 2025-12-05T07:42:49Z |
| alsa-2025:22417 | Important: gimp:2.8 security update | 2025-12-01T00:00:00Z | 2025-12-04T13:28:20Z |
| alsa-2025:22660 | Moderate: systemd security update | 2025-12-03T00:00:00Z | 2025-12-04T13:25:23Z |
| alsa-2025:22175 | Important: expat security update | 2025-11-26T00:00:00Z | 2025-12-03T12:07:34Z |
| alsa-2025:22363 | Important: firefox security update | 2025-12-01T00:00:00Z | 2025-12-03T12:05:25Z |
| alsa-2025:22376 | Moderate: libxml2 security update | 2025-12-01T00:00:00Z | 2025-12-03T12:03:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-16 | UNKNOWN READ in png_free_data | 2025-01-08T00:13:45.160139Z | 2025-01-08T00:13:45.160518Z |
| osv-2025-13 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2025-01-07T00:15:11.722974Z | 2025-01-07T00:15:11.723402Z |
| osv-2025-7 | Heap-buffer-overflow in oatpp::json::Utils::escapeUtf8Char | 2025-01-07T00:03:42.053605Z | 2025-01-07T00:03:42.054132Z |
| osv-2025-6 | Heap-buffer-overflow in next_marker | 2025-01-06T00:16:10.036783Z | 2025-01-06T00:16:10.037219Z |
| osv-2025-4 | Heap-buffer-overflow in ___interceptor_pthread_create | 2025-01-05T00:17:02.263743Z | 2025-01-05T00:17:02.264158Z |
| osv-2025-3 | Heap-buffer-overflow in avifImageAddUUIDProperty | 2025-01-05T00:10:22.871565Z | 2025-01-05T00:10:22.872062Z |
| osv-2025-1 | Segv on unknown address in avif_fuzztest_properties@PropertiesAvifFuzzTest.PropsValid | 2025-01-04T00:00:30.888504Z | 2025-01-04T00:00:30.889140Z |
| osv-2024-1417 | Heap-buffer-overflow in cv::PngDecoder::read_from_io | 2025-01-02T00:15:00.246767Z | 2025-01-02T00:15:00.247102Z |
| osv-2024-1411 | Use-of-uninitialized-value in mark_context | 2024-12-29T00:03:28.881713Z | 2024-12-29T00:03:28.882100Z |
| osv-2024-1406 | UNKNOWN READ in _TIFFVSetField | 2024-12-27T00:16:38.077175Z | 2024-12-27T00:16:38.077756Z |
| osv-2024-384 | Heap-use-after-free in json_fixed_string | 2024-04-30T00:12:26.560732Z | 2024-12-25T14:21:22.172697Z |
| osv-2024-1391 | Heap-buffer-overflow in gsicc_create_getv2buffer | 2024-12-20T00:03:10.307442Z | 2024-12-20T00:03:10.308031Z |
| osv-2023-536 | Heap-buffer-overflow in Assimp::MD5::MD5Parser::ParseHeader | 2023-07-02T14:00:19.269762Z | 2024-12-19T14:05:46.818834Z |
| osv-2024-1388 | Security exception in com.google.gson.internal.bind.TypeAdapters$28.write | 2024-12-18T00:02:54.357847Z | 2024-12-18T00:02:54.358393Z |
| osv-2024-1380 | Index-out-of-bounds in ndpi_search_dns | 2024-12-15T00:12:21.687565Z | 2024-12-15T00:12:21.687988Z |
| osv-2024-1372 | Bad-cast to Assimp::LogStream from Assimp::OptimizeMeshesProcess | 2024-12-14T00:00:14.982156Z | 2024-12-14T00:00:14.982614Z |
| osv-2023-984 | Stack-buffer-overflow in TranslateWord3 | 2023-10-08T13:00:48.222080Z | 2024-12-12T14:15:21.369705Z |
| osv-2023-467 | Stack-buffer-overflow in SetPitchGradient | 2023-06-08T14:01:12.964629Z | 2024-12-12T14:12:48.510389Z |
| osv-2022-595 | Stack-buffer-overflow in Lookup | 2022-07-19T00:01:42.567408Z | 2024-12-12T14:09:48.779445Z |
| osv-2021-1041 | Global-buffer-overflow in SetUpPhonemeTable | 2021-07-23T00:00:14.684306Z | 2024-12-12T14:04:27.209318Z |
| osv-2021-1024 | Global-buffer-overflow in GetSsmlAttribute | 2021-07-17T00:00:48.123388Z | 2024-12-12T14:04:16.162668Z |
| osv-2024-1356 | Heap-buffer-overflow in ChunkAssignData | 2024-12-10T00:13:56.481718Z | 2024-12-10T00:13:56.482170Z |
| osv-2024-1351 | Use-of-uninitialized-value in Archive::UnexpEndArcMsg | 2024-12-10T00:05:42.992615Z | 2024-12-10T00:05:42.992960Z |
| osv-2024-1336 | Security exception in org.checkerframework.checker.formatter.util.FormatUtil.formatParameterCategories | 2024-11-26T00:01:25.736998Z | 2024-11-26T00:01:25.737632Z |
| osv-2024-1332 | Negative-size-param in extract_mr_data | 2024-11-21T00:04:16.535838Z | 2024-11-21T00:04:16.536469Z |
| osv-2024-1330 | Heap-buffer-overflow in zoom_search_again | 2024-11-20T00:15:27.562125Z | 2024-11-20T14:27:37.875526Z |
| osv-2024-324 | Use-of-uninitialized-value in do_callout_jit | 2024-04-29T05:41:58.770090Z | 2024-11-19T21:52:42.928598Z |
| osv-2024-1326 | Heap-buffer-overflow in ndpi_search_mikrotik | 2024-11-18T00:12:17.790747Z | 2024-11-18T00:12:17.791146Z |
| osv-2024-1324 | Heap-buffer-overflow in Assimp::FBXExporter::WriteObjects | 2024-11-18T00:01:13.979270Z | 2024-11-18T00:01:13.979758Z |
| osv-2024-1320 | Heap-buffer-overflow in process_page_ | 2024-11-17T00:15:09.627790Z | 2024-11-17T00:15:09.628193Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2022-0020 | `SegQueue` creates zero value of any type | 2022-05-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0019 | Channel creates zero value of any type | 2022-05-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0018 | Timing attack | 2022-05-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0017 | `array!` macro is unsound when its length is impure constant | 2022-04-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0016 | Use after free with `externref`s and epoch interruption in Wasmtime | 2022-03-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0014 | Infinite loop in `BN_mod_sqrt()` reachable when parsing certificates | 2022-03-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0013 | Regexes with large repetitions on empty sub-expressions take a very long time to parse | 2022-03-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0012 | Arrow2 allows double free in `safe` code | 2022-03-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0011 | Miscomputation when performing AES encryption in rust-crypto | 2022-02-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0010 | enum_map macro can cause UB when `Enum` trait is incorrectly implemented | 2022-02-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0009 | Failure to verify the public key of a `SignedEnvelope` against the `PeerId` in a `PeerRecord` | 2022-02-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0008 | Delegate functions are missing `Send` bound | 2022-01-02T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0007 | A malicious coder can get unsound access to TCell or TLCell memory | 2022-01-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0006 | Data race in `Iter` and `IterMut` | 2022-01-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0004 | Stack overflow in rustc_serialize when parsing deeply nested JSON | 2022-01-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0003 | Space bug in `clean_text` | 2022-01-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2022-0002 | Unsoundness in `dashmap` references | 2022-01-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0152 | `out_reference::Out::from_raw` should be `unsafe` | 2021-01-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0144 | traitobject is Unmaintained | 2021-10-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0138 | Incorrect use of `set_len` allows for un-initialized memory | 2021-10-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0135 | Improper validation of Windows paths could lead to directory traversal attack | 2021-01-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0130 | Use after free in lru crate | 2021-12-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0129 | Invalid handling of `X509_verify_cert()` internal errors in libssl | 2021-12-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0128 | Incorrect Lifetime Bounds on Closures in `rusqlite` | 2021-12-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0126 | RustEmbed generated `get` method allows for directory traversal when reading files from disk | 2021-11-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0125 | Panic on incorrect date input to `simple_asn1` | 2021-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0124 | Data race when sending and receiving after closing a `oneshot` channel | 2021-11-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0123 | Converting `NSString` to a String Truncates at Null Bytes | 2021-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0122 | Generated code can read and write out of bounds in safe code | 2021-10-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0121 | Non-aligned u32 read in Chacha20 encryption and decryption | 2021-10-08T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-authentik-2025-53942 | authentik has an insufficient check for account active status during OAuth/SAML authentication | 2026-04-16T23:36:28.200Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2025-52553 | authentik has Insufficient Session verification for Remote Access Control endpoint access | 2026-04-16T23:36:26.917Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2025-29928 | authentik's deletion of sessions did not revoke sessions when using database session storage | 2026-04-16T23:36:25.530Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-52307 | authentik allows a timing attack due to missing constant time comparison for metrics view | 2026-04-16T23:36:24.031Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-52289 | authentik has an insecure default configuration for OAuth2 Redirect URIs | 2026-04-16T23:36:22.514Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-52287 | authentik performs insufficient validation of OAuth scopes | 2026-04-16T23:36:20.916Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-47077 | authentik cross-provider token validation problems | 2026-04-16T23:36:19.464Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-47070 | authentik vulnerable to password authentication bypass via X-Forwarded-For HTTP header | 2026-04-16T23:36:17.967Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-42490 | authentik has Insufficient Authorization for several API endpoints | 2026-04-16T23:36:16.647Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-38371 | Insufficient access control for OAuth2 Device Code flow in authentik | 2026-04-16T23:36:15.228Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-37905 | Improper Access Control and Incorrect Authorization in github.com/goauthentik/authentik | 2026-04-16T23:36:13.946Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-23647 | PKCE downgrade attack in Authentik | 2026-04-16T23:36:12.438Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-21637 | XSS in Authentik via JavaScript-URI as Redirect URI and form_post Response Mode | 2026-04-16T23:36:10.878Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-11623 | Stored XSS in authentik | 2026-04-16T23:36:09.282Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2023-48228 | OAuth2: PKCE can be fully circumvented | 2026-04-16T23:36:07.745Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2023-46249 | authentik potential installation takeover when default admin user is deleted | 2026-04-16T23:36:06.215Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2023-39522 | Username enumeration attack in goauthentik | 2026-04-16T23:36:04.816Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2023-36456 | Authentik lacks Proxy IP headers validation | 2026-04-16T23:36:03.215Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2023-26481 | Insufficient user check in FlowTokens by Email stage | 2026-04-16T23:36:01.864Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2022-46172 | authentik allows existing authenticated users to create arbitrary accounts | 2026-04-16T23:36:00.542Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2022-46145 | authentik vulnerable to unauthorized user creation and potential account takeover | 2026-04-16T23:35:59.036Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2022-23555 | authentik vulnerable to Improper Authentication via invitation URL token reuse | 2026-04-16T23:35:57.484Z | 2026-04-17T00:10:47.507Z |
| bit-apisix-2026-31924 | Apache APISIX: Plugin tencent-cloud-cls log export uses plaintext HTTP | 2026-04-16T23:36:06.924Z | 2026-04-17T00:10:47.507Z |
| bit-apisix-2026-31923 | Apache APISIX: Openid-connect `tls_verify` field is disabled by default | 2026-04-16T23:36:05.480Z | 2026-04-17T00:10:47.507Z |
| bit-airflow-2026-33858 | Apache Airflow: Unsafe Deserialization via Legacy Serialization Keys (__type/__var) Bypass in XCom API | 2026-04-16T23:38:09.491Z | 2026-04-17T00:10:47.507Z |
| bit-airflow-2025-66236 | Apache Airflow: Secrets from Airflow config file logged in plain text in DAG run logs UI | 2026-04-16T23:37:55.116Z | 2026-04-17T00:10:47.507Z |
| bit-activemq-2026-39304 | Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ: Incorrect handling of TLSv1.3 KeyUpdate can be exploited to cause DoS via OOM | 2026-04-16T23:36:26.790Z | 2026-04-17T00:10:47.507Z |
| bit-wiremock-2023-41329 | Domain restrictions bypass via DNS Rebinding in WireMock and WireMock Studio | 2026-04-13T16:00:00.480Z | 2026-04-13T16:23:32.396Z |
| bit-wiremock-2023-41327 | Controlled SSRF through URL in the WireMock | 2026-04-13T15:59:58.176Z | 2026-04-13T16:23:32.396Z |
| bit-tomcat-2026-29146 | Apache Tomcat: EncryptInterceptor vulnerable to padding oracle attack by default | 2026-04-13T16:01:34.700Z | 2026-04-13T16:23:32.396Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-sb25660 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T16:44:27.197226Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ry09679 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:31:53.660443Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rx06615 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:45:24.056160Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rw65075 | Within HostnameError | 2026-01-30T15:35:53.815887Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ru37859 | Cancelling a query (e | 2026-01-30T15:39:24.210234Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rt10702 | Within HostnameError | 2026-01-30T16:30:25.697056Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rr90125 | Cancelling a query (e | 2026-01-30T15:32:53.790454Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rq53330 | Within HostnameError | 2026-01-30T15:17:53.658995Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rn77098 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:25:55.300453Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rl45001 | tar | 2026-01-30T15:01:22.967754Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rj88561 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.732429Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rg55910 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:27:25.253140Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rd08428 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:17:23.554517Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rb28539 | Within HostnameError | 2026-01-30T14:43:52.571458Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qz70444 | Within HostnameError | 2026-01-30T17:24:26.605623Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qw16951 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:48:54.464404Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qv26039 | Within HostnameError | 2026-01-30T16:03:24.653963Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qm19832 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T16:13:25.141915Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qk01721 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:32:54.211133Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qj89068 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:34:54.378061Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qe58701 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:55.193625Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qd78411 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:36:25.408698Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pz62650 | Cancelling a query (e | 2026-01-30T16:41:55.453512Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-py88758 | Cancelling a query (e | 2026-01-30T15:02:53.130919Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-py85990 | tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing | 2026-01-30T14:07:50.722290Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pw33232 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:53.441606Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pw02676 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:35:26.383203Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pt11267 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:25.604414Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ps30901 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes | 2026-01-30T16:07:55.053827Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-po40318 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:31:53.772564Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2006-ALE-011 | Multiples vulnérabilités de produits Microsoft | 2006-08-31T00:00:00.000000 | 2006-10-11T00:00:00.000000 |
| certa-2006-ale-010 | Vulnérabilité dans Internet Explorer | 2006-08-23T00:00:00.000000 | 2006-08-25T00:00:00.000000 |
| CERTA-2006-ALE-010 | Vulnérabilité dans Internet Explorer | 2006-08-23T00:00:00.000000 | 2006-08-25T00:00:00.000000 |
| certa-2006-ale-009 | Vulnérabilité de la librairie MSO.DLL dans Microsoft Office | 2006-07-15T00:00:00.000000 | 2006-08-09T00:00:00.000000 |
| CERTA-2006-ALE-009 | Vulnérabilité de la librairie MSO.DLL dans Microsoft Office | 2006-07-15T00:00:00.000000 | 2006-08-09T00:00:00.000000 |
| certa-2006-ale-007 | Vulnérabilité dans Microsoft Excel | 2006-06-16T00:00:00.000000 | 2006-07-12T00:00:00.000000 |
| CERTA-2006-ALE-007 | Vulnérabilité dans Microsoft Excel | 2006-06-16T00:00:00.000000 | 2006-07-12T00:00:00.000000 |
| certa-2006-ale-008 | Vulnérabilité d'ExtCalendar | 2006-07-11T00:00:00.000000 | 2006-07-11T00:00:00.000000 |
| CERTA-2006-ALE-008 | Vulnérabilité d'ExtCalendar | 2006-07-11T00:00:00.000000 | 2006-07-11T00:00:00.000000 |
| certa-2006-ale-006 | Vulnérabilité dans Microsoft Word | 2006-05-20T00:00:00.000000 | 2006-06-14T00:00:00.000000 |
| CERTA-2006-ALE-006 | Vulnérabilité dans Microsoft Word | 2006-05-20T00:00:00.000000 | 2006-06-14T00:00:00.000000 |
| certa-2006-ale-004 | Multiples vulnérabilités sous Mac OS X d'Apple | 2006-04-22T00:00:00.000000 | 2006-05-12T00:00:00.000000 |
| CERTA-2006-ALE-004 | Multiples vulnérabilités sous Mac OS X d'Apple | 2006-04-22T00:00:00.000000 | 2006-05-12T00:00:00.000000 |
| certa-2006-ale-005 | Vulnérabilité dans Firefox | 2006-04-26T00:00:00.000000 | 2006-05-02T00:00:00.000000 |
| CERTA-2006-ALE-005 | Vulnérabilité dans Firefox | 2006-04-26T00:00:00.000000 | 2006-05-02T00:00:00.000000 |
| certa-2006-ale-002 | Multiples vulnérabilités dans Microsoft Internet Explorer | 2006-03-23T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| certa-2005-ale-012 | Vulnérabilité de Netscape 8 | 2005-09-27T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| certa-2005-ale-008 | Possible vulnérabilité de la bibliothèque msdds.dll | 2005-08-19T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| CERTA-2006-ALE-002 | Multiples vulnérabilités dans Microsoft Internet Explorer | 2006-03-23T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| CERTA-2005-ALE-012 | Vulnérabilité de Netscape 8 | 2005-09-27T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| CERTA-2005-ALE-008 | Possible vulnérabilité de la bibliothèque msdds.dll | 2005-08-19T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| certa-2006-ale-003 | Vulnérabilité de Sendmail | 2006-03-24T00:00:00.000000 | 2006-03-24T00:00:00.000000 |
| CERTA-2006-ALE-003 | Vulnérabilité de Sendmail | 2006-03-24T00:00:00.000000 | 2006-03-24T00:00:00.000000 |
| certa-2006-ale-001 | Vulnérabilité dans le traitement de certains fichiers sous MAC OS X | 2006-02-22T00:00:00.000000 | 2006-03-02T00:00:00.000000 |
| CERTA-2006-ALE-001 | Vulnérabilité dans le traitement de certains fichiers sous MAC OS X | 2006-02-22T00:00:00.000000 | 2006-03-02T00:00:00.000000 |
| certa-2005-ale-019 | Exploitation d'une vulnérabilité mal corrigée dans Microsoft Windows | 2005-12-28T00:00:00.000000 | 2006-01-06T00:00:00.000000 |
| CERTA-2005-ALE-019 | Exploitation d'une vulnérabilité mal corrigée dans Microsoft Windows | 2005-12-28T00:00:00.000000 | 2006-01-06T00:00:00.000000 |
| certa-2005-ale-017 | Vulnérabilité de Microsoft Internet Explorer | 2005-11-21T00:00:00.000000 | 2005-12-14T00:00:00.000000 |
| CERTA-2005-ALE-017 | Vulnérabilité de Microsoft Internet Explorer | 2005-11-21T00:00:00.000000 | 2005-12-14T00:00:00.000000 |
| certa-2005-ale-018 | Vulnérabilité du navigateur Firefox | 2005-12-08T00:00:00.000000 | 2005-12-08T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0069 | Multiples vulnérabilités dans Oracle Java SE | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0068 | Multiples vulnérabilités dans Oracle Database Server | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0067 | Multiples vulnérabilités dans Python | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0066 | Vulnérabilité dans Google Chrome | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| CERTFR-2026-AVI-0065 | Multiples vulnérabilités dans les produits Atlassian | 2026-01-21T00:00:00.000000 | 2026-01-21T00:00:00.000000 |
| certfr-2026-avi-0064 | Vulnérabilité Microsoft Power Apps | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| certfr-2026-avi-0063 | Multiples vulnérabilités dans Microsoft Edge | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| certfr-2026-avi-0062 | Vulnérabilité dans Mattermost Desktop App | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| CERTFR-2026-AVI-0064 | Vulnérabilité Microsoft Power Apps | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| CERTFR-2026-AVI-0063 | Multiples vulnérabilités dans Microsoft Edge | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| CERTFR-2026-AVI-0062 | Vulnérabilité dans Mattermost Desktop App | 2026-01-19T00:00:00.000000 | 2026-01-19T00:00:00.000000 |
| certfr-2026-avi-0061 | Multiples vulnérabilités dans les produits IBM | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0060 | Vulnérabilité dans Apache Struts | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0059 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0058 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0057 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0056 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0055 | Multiples vulnérabilités dans GLPI | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0054 | Multiples vulnérabilités dans Centreon Infra Monitoring | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0053 | Vulnérabilité dans Traefik | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2025-avi-1122 | Multiples vulnérabilités dans Mattermost Server | 2025-12-18T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0061 | Multiples vulnérabilités dans les produits IBM | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0060 | Vulnérabilité dans Apache Struts | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0059 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0058 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0057 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0056 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0055 | Multiples vulnérabilités dans GLPI | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0054 | Multiples vulnérabilités dans Centreon Infra Monitoring | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| CERTFR-2026-AVI-0053 | Vulnérabilité dans Traefik | 2026-01-16T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-000097 | Citadel WebCit vulnerable to cross-site scripting on Instant Messaging facility | 2023-10-04T14:07+09:00 | 2024-05-21T17:08+09:00 |
| jvndb-2024-000046 | Android App "TP-Link Tether" and "TP-Link Tapo" vulnerable to improper server certificate verification | 2024-05-21T13:33+09:00 | 2024-05-21T13:33+09:00 |
| jvndb-2023-004294 | Advanced Micro Devices Windows kernel drivers vulnerable to insufficient access control on its IOCTL | 2023-10-27T16:10+09:00 | 2024-05-20T17:49+09:00 |
| jvndb-2023-000098 | e-Gov Client Application fails to restrict custom URL schemes properly | 2023-10-06T14:57+09:00 | 2024-05-17T17:55+09:00 |
| jvndb-2024-003188 | Panasonic KW Watcher vulnerable to memory buffer error | 2024-05-17T15:46+09:00 | 2024-05-17T15:46+09:00 |
| jvndb-2023-021762 | Ruijie BCR810W/BCR860 vulnerable to OS command injection | 2024-05-17T13:54+09:00 | 2024-05-17T13:54+09:00 |
| jvndb-2024-000049 | WordPress Plugin "Download Plugins and Themes from Dashboard" vulnerable to path traversal | 2024-05-17T13:33+09:00 | 2024-05-17T13:33+09:00 |
| jvndb-2024-003187 | Multiple vulnerabilities in Field Logic DataCube | 2024-05-17T12:05+09:00 | 2024-05-17T12:05+09:00 |
| jvndb-2023-003913 | Multiple vulnerabilities in JTEKT ELECTRONICS OnSinView2 | 2023-10-18T14:13+09:00 | 2024-05-16T17:28+09:00 |
| jvndb-2023-003788 | Out-of-bounds read vulnerability in Keyence KV STUDIO and KV REPLAY VIEWER | 2023-10-11T15:23+09:00 | 2024-05-16T17:09+09:00 |
| jvndb-2023-000093 | Pyramid vulnerable to directory traversal | 2023-09-11T13:53+09:00 | 2024-05-16T16:52+09:00 |
| jvndb-2023-000102 | Multiple vulnerabilities in JustSystems products | 2023-10-19T15:16+09:00 | 2024-05-16T16:44+09:00 |
| jvndb-2023-000087 | SYNCK GRAPHICA Mailform Pro CGI vulnerable to Regular expression Denial-of-Service (ReDoS) | 2023-08-24T14:12+09:00 | 2024-05-15T17:12+09:00 |
| jvndb-2023-000104 | Improper restriction of XML external entity references (XXE) in Proself | 2023-10-18T18:00+09:00 | 2024-05-15T17:08+09:00 |
| jvndb-2014-000006 | EC-CUBE vulnerable to authorization bypass | 2014-01-22T15:28+09:00 | 2024-05-15T14:59+09:00 |
| jvndb-2023-000091 | Multiple vulnerabilities in F-RevoCRM | 2023-09-05T15:51+09:00 | 2024-05-14T18:06+09:00 |
| jvndb-2023-000089 | Multiple vulnerabilities in i-PRO VI Web Client | 2023-08-31T14:13+09:00 | 2024-05-14T18:05+09:00 |
| jvndb-2023-000088 | Multiple vulnerabilities in SHIRASAGI | 2023-09-04T13:41+09:00 | 2024-05-14T17:58+09:00 |
| jvndb-2014-000123 | GIGAPOD vulnerable to denial-of-service (DoS) | 2014-10-16T13:51+09:00 | 2024-05-13T18:10+09:00 |
| jvndb-2024-002342 | Central Dogma vulnerable to cross-site scripting | 2024-05-13T17:27+09:00 | 2024-05-13T17:27+09:00 |
| jvndb-2024-000047 | Multiple vulnerabilities in Cybozu Garoon | 2024-05-13T15:19+09:00 | 2024-05-13T15:19+09:00 |
| jvndb-2023-003956 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON CX-Designer | 2023-10-24T16:11+09:00 | 2024-05-10T17:47+09:00 |
| jvndb-2023-000105 | Movable Type vulnerable to cross-site scripting | 2023-10-25T15:18+09:00 | 2024-05-10T17:47+09:00 |
| jvndb-2024-000045 | "OfferBox" App uses a hard-coded secret key | 2024-05-10T15:11+09:00 | 2024-05-10T15:11+09:00 |
| jvndb-2024-003181 | Hidden Functionality vulnerability in DT900 | 2024-05-10T13:59+09:00 | 2024-05-10T13:59+09:00 |
| jvndb-2024-000048 | Phormer vulnerable to cross-site scripting | 2024-05-10T13:48+09:00 | 2024-05-10T13:48+09:00 |
| jvndb-2023-003721 | Trend Micro Endpoint security products for enterprises vulnerable to arbitrary code execution | 2023-09-20T13:58+09:00 | 2024-05-09T18:22+09:00 |
| jvndb-2015-000040 | LINE vulnerable to script injection | 2015-03-20T16:16+09:00 | 2024-05-09T18:15+09:00 |
| jvndb-2015-000095 | LINE@ vulnerable to script injection | 2015-07-10T14:50+09:00 | 2024-05-09T18:05+09:00 |
| jvndb-2023-000116 | Redmine vulnerable to cross-site scripting | 2023-11-17T14:32+09:00 | 2024-05-09T17:55+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15830 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15830) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15829 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15829) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15828 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15828) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15827 | HCL Aftermarket DPC存在未明漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15826 | HCL Aftermarket DPC跨源资源共享漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15825 | HCL Aftermarket DPC SQL注入漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15411 | Google Chrome安全绕过漏洞(CNVD-2026-15411) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15410 | Google Chrome安全绕过漏洞(CNVD-2026-15410) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15409 | Google Chrome安全绕过漏洞(CNVD-2026-15409) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15408 | Google Chrome安全绕过漏洞(CNVD-2026-15408) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15407 | Google Chrome存在未明漏洞(CNVD-2026-15407) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15406 | Google Chrome堆缓冲区溢出漏洞(CNVD-2026-15406) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15405 | Google Chrome整数溢出漏洞(CNVD-2026-15405) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15404 | Google Chrome内存错误引用漏洞(CNVD-2026-15404) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15403 | Google Chrome堆缓冲区溢出漏洞(CNVD-2026-15403) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15402 | Google Chrome越界读取漏洞(CNVD-2026-15402) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15401 | Google Chrome越界读取漏洞(CNVD-2026-15401) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15400 | Google Chrome FedCM内存错误引用漏洞 | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15399 | Google Chrome安全绕过漏洞(CNVD-2026-15399) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15398 | Google Chrome安全绕过漏洞(CNVD-2026-15398) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15397 | Google Chrome安全绕过漏洞(CNVD-2026-15397) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15396 | Google Chrome安全绕过漏洞(CNVD-2026-15396) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15395 | Google Chrome资源管理错误漏洞(CNVD-2026-15395) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15394 | Faad2缓冲区溢出漏洞(CNVD-2026-15394) | 2023-08-17 | 2026-03-31 |
| cnvd-2026-15393 | Faad2缓冲区溢出漏洞 | 2023-08-17 | 2026-03-31 |
| cnvd-2026-15392 | Bento4拒绝服务漏洞(CNVD-2026-15392) | 2025-08-11 | 2026-03-31 |
| cnvd-2026-15391 | TinyFileManager跨站脚本漏洞 | 2025-06-06 | 2026-03-31 |
| cnvd-2026-15390 | Mozilla Firefox和Mozilla Thunderbird代码执行漏洞 | 2026-03-11 | 2026-03-31 |
| cnvd-2026-15389 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15389) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15388 | 多款Mozilla产品代码执行漏洞(CNVD-2026-15388) | 2026-03-11 | 2026-03-30 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-11596 | Уязвимость универсальной системы мониторинга Zabbix, связана с неправильной нейтрализацие… | 24.09.2025 | 16.02.2026 |
| bdu:2025-11593 | Уязвимость интерпретатора языка программирования Python (CPython), связанная с неправильн… | 24.09.2025 | 16.02.2026 |
| bdu:2025-11510 | Уязвимость модуля drivers/usb/gadget/configfs.c ядра операционной системы Linux, позволяю… | 23.09.2025 | 16.02.2026 |
| bdu:2025-11506 | Уязвимость функции drm_crtc_handle_vblank() ядра операционной системы Linux, позволяющая … | 23.09.2025 | 16.02.2026 |
| bdu:2025-11504 | Уязвимость функции vcc_sendmsg() ядра операционной системы Linux, позволяющая нарушителю … | 23.09.2025 | 16.02.2026 |
| bdu:2025-11503 | Уязвимость функции qdisc_tree_reduce_backlog() ядра операционной системы Linux, позволяющ… | 23.09.2025 | 16.02.2026 |
| bdu:2025-11496 | Уязвимость DNS-сервера Unbound, связанная с неконтролируемым расходом ресурсов, позволяющ… | 23.09.2025 | 16.02.2026 |
| bdu:2025-11469 | Уязвимость функции ins_typebuf() текстового редактора Vim, позволяющая нарушителю получит… | 22.09.2025 | 16.02.2026 |
| bdu:2025-11467 | Уязвимость компонента net/sched/sch_prio.c ядра операционной системы Linux, позволяющая н… | 22.09.2025 | 16.02.2026 |
| bdu:2025-11462 | Уязвимость компонента binutils/objcopy.c программного средства разработки GNU Binutils, п… | 22.09.2025 | 16.02.2026 |
| bdu:2025-11456 | Уязвимость компонента bfd/elf.c программного средства разработки GNU Binutils, позволяюща… | 22.09.2025 | 16.02.2026 |
| bdu:2025-11415 | Уязвимость файла pdf/pdf_fmap.c компонента TTF набора программного обеспечения для обрабо… | 22.09.2025 | 16.02.2026 |
| bdu:2025-11409 | Уязвимость функции OutlineItem::open() библиотеки для рендеринга PDF-файлов Poppler, позв… | 22.09.2025 | 16.02.2026 |
| bdu:2025-11349 | Уязвимость функции kasan_find_vm_area() (mm/kasan/report.c) компонента kasan ядра операци… | 19.09.2025 | 16.02.2026 |
| bdu:2025-11348 | Уязвимость функции zd_mac_tx_to_dev() (drivers/net/wireless/zydas/zd1211rw/zd_mac.c) ядра… | 19.09.2025 | 16.02.2026 |
| bdu:2025-11343 | Уязвимость функций ieee80211_is_valid_amsdu() и ieee80211_amsdu_to_8023s() (net/wireless/… | 19.09.2025 | 16.02.2026 |
| bdu:2025-11284 | Уязвимость фкнкции fd_index() программы для запросов и управления устройствами хранения U… | 17.09.2025 | 16.02.2026 |
| bdu:2025-11256 | Уязвимость менеджера пакетов Dpkg, связанная с небезопасными временными файлами, позволяю… | 17.09.2025 | 16.02.2026 |
| bdu:2025-11249 | Уязвимость функции bson_string_append библиотеки libbson драйвера системы управления база… | 17.09.2025 | 16.02.2026 |
| bdu:2025-11228 | Уязвимость библиотеки для отображения PDF-файлов Poppler, связанная с использованием памя… | 17.09.2025 | 16.02.2026 |
| bdu:2025-11114 | Уязвимость функции nanddev_ecc_engine_cleanup() ядра операционной системы Linux, позволяю… | 15.09.2025 | 16.02.2026 |
| bdu:2025-11113 | Уязвимость модуля drivers/regulator/gpio-regulator.c ядра операционной системы Linux, поз… | 15.09.2025 | 16.02.2026 |
| bdu:2025-11083 | Уязвимость библиотеки Libarchive операционной системы Windows, позволяющая нарушителю выз… | 14.09.2025 | 16.02.2026 |
| bdu:2025-11082 | Уязвимость модуля html.parser.HTMLParser интерпретатора языка программирования Python, по… | 14.09.2025 | 16.02.2026 |
| bdu:2025-11076 | Уязвимость функции asn1_delete_structure() библиотеки безопасности транспортного уровня G… | 14.09.2025 | 16.02.2026 |
| bdu:2025-11075 | Уязвимость библиотеки безопасности транспортного уровня GnuTLS, связанная с ошибками проц… | 14.09.2025 | 16.02.2026 |
| bdu:2025-11074 | Уязвимость утилиты certtool библиотеки безопасности транспортного уровня GnuTLS, позволяю… | 14.09.2025 | 16.02.2026 |
| bdu:2025-11073 | Уязвимость функции get_name() файла interface.c пакета утилит Net-tools операционной сист… | 14.09.2025 | 16.02.2026 |
| bdu:2025-11072 | Уязвимость утилиты диагностики и мониторинга сети MTR, связанная с включением функций из … | 14.09.2025 | 16.02.2026 |
| bdu:2025-10958 | Уязвимость функции msm_devfreq_init() файла drivers/gpu/drm/msm/msm_gpu_devfreq.c ядра оп… | 11.09.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201905-0711 | Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessor… | 2024-07-23T21:06:26.228000Z |
| var-201410-0371 | Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows… | 2024-07-23T21:06:25.896000Z |
| var-200906-0605 | drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier… | 2024-07-23T21:06:23.926000Z |
| var-200701-0516 | Format string vulnerability in Apple iChat 3.1.6 allows remote attackers to cause a denia… | 2024-07-23T21:06:21.462000Z |
| var-200704-0217 | The Login Window in Apple Mac OS X 10.3.9 through 10.4.9 does not properly check certain … | 2024-07-23T21:05:47.835000Z |
| var-201302-0264 | Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.… | 2024-07-23T21:05:46.754000Z |
| var-201110-0385 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2024-07-23T21:05:46.173000Z |
| var-202108-1140 | A device configuration issue was addressed with an updated configuration. This issue is f… | 2024-07-23T21:05:39.606000Z |
| var-202103-1463 | The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates p… | 2024-07-23T21:05:39.679000Z |
| var-201912-0642 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:05:39.981000Z |
| var-200701-0124 | The ufs_lookup function in the Mac OS X 10.4.8 and FreeBSD 6.1 kernels allows local users… | 2024-07-23T21:05:38.664000Z |
| var-201903-0440 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T21:05:02.081000Z |
| var-202112-0562 | It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete… | 2024-07-23T21:05:01.160000Z |
| var-201602-0272 | ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use… | 2024-07-23T21:05:01.067000Z |
| var-200704-0229 | Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allo… | 2024-07-23T21:05:01.347000Z |
| var-201806-1487 | An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. Safari … | 2024-07-23T21:05:00.631000Z |
| var-201006-1194 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2024-07-23T21:05:00.580000Z |
| var-202002-1191 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i… | 2024-07-23T21:04:58.267000Z |
| var-201504-0147 | cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which a… | 2024-07-23T21:04:58.843000Z |
| var-200812-0322 | Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows re… | 2024-07-23T21:04:56.685000Z |
| var-201912-1851 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:04:54.509000Z |
| var-201304-0091 | sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled… | 2024-07-23T21:04:54.405000Z |
| var-201912-0484 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T21:04:53.320000Z |
| var-200704-0214 | fsck, as used by the AirPort Disk feature of the AirPort Extreme Base Station with 802.11… | 2024-07-23T21:04:53.153000Z |
| var-201904-1473 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:04:52.392000Z |
| var-200701-0396 | Format string vulnerability in Apple Software Update 2.0.5 on Mac OS X 10.4.8 allows remo… | 2024-07-23T21:04:51.875000Z |
| var-201409-1155 | GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed functi… | 2024-07-23T21:04:41.941000Z |
| var-201003-1082 | The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x befo… | 2024-07-23T21:04:41.162000Z |
| var-201501-0339 | The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 b… | 2024-07-23T21:04:37.270000Z |
| var-200608-0042 | OpenSSH in Apple Mac OS X 10.4.7 allows remote attackers to cause a denial of service or … | 2024-07-23T21:04:03.433000Z |