Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43078 |
7.8 (3.1)
|
crypto: af_alg - Fix page reassignment overflow in af_… |
Linux |
Linux |
2026-05-06T07:40:15.092Z | 2026-05-08T12:40:25.638Z |
| CVE-2026-43076 |
7.8 (3.1)
|
ocfs2: validate inline data i_size during inode read |
Linux |
Linux |
2026-05-06T07:40:13.634Z | 2026-05-08T12:40:24.482Z |
| CVE-2026-43075 |
7.8 (3.1)
|
ocfs2: fix out-of-bounds write in ocfs2_write_end_inline |
Linux |
Linux |
2026-05-06T07:40:03.337Z | 2026-05-08T12:40:23.336Z |
| CVE-2026-43074 |
7.8 (3.1)
|
eventpoll: defer struct eventpoll free to RCU grace period |
Linux |
Linux |
2026-05-06T07:21:58.210Z | 2026-05-08T12:40:22.201Z |
| CVE-2026-43071 |
9.1 (3.1)
|
dcache: Limit the minimal number of bucket to two |
Linux |
Linux |
2026-05-05T15:29:28.081Z | 2026-05-08T12:40:21.054Z |
| CVE-2026-43070 |
7.8 (3.1)
|
bpf: Reset register ID for BPF_END value tracking |
Linux |
Linux |
2026-05-05T15:23:28.819Z | 2026-05-08T12:40:19.810Z |
| CVE-2026-43067 |
9.8 (3.1)
|
ext4: handle wraparound when searching for blocks for … |
Linux |
Linux |
2026-05-05T15:23:26.717Z | 2026-05-08T12:40:18.665Z |
| CVE-2026-43063 |
7.8 (3.1)
|
xfs: don't irele after failing to iget in xfs_attri_re… |
Linux |
Linux |
2026-05-05T15:23:24.034Z | 2026-05-08T12:40:17.506Z |
| CVE-2026-43062 |
7.1 (3.1)
|
Bluetooth: L2CAP: Fix type confusion in l2cap_ecred_re… |
Linux |
Linux |
2026-05-05T15:17:27.830Z | 2026-05-08T12:40:16.025Z |
| CVE-2026-43060 |
7.8 (3.1)
|
netfilter: nft_ct: drop pending enqueued packets on removal |
Linux |
Linux |
2026-05-05T15:17:26.393Z | 2026-05-08T12:40:14.866Z |
| CVE-2026-31731 |
7.8 (3.1)
|
thermal: core: Address thermal zone removal races with… |
Linux |
Linux |
2026-05-01T14:14:30.177Z | 2026-05-08T12:40:13.706Z |
| CVE-2026-31730 |
7.8 (3.1)
|
misc: fastrpc: possible double-free of cctx->remote_heap |
Linux |
Linux |
2026-05-01T14:14:29.522Z | 2026-05-08T12:40:12.536Z |
| CVE-2026-7448 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-05-06T06:47:21.950Z | 2026-05-08T12:25:55.615Z |
| CVE-2026-8090 |
7.3 (3.1)
|
Use-after-free in the DOM: Networking component |
Mozilla |
Firefox |
2026-05-07T12:45:04.609Z | 2026-05-08T12:19:00.246Z |
| CVE-2025-68900 |
6.5 (3.1)
|
WordPress Enfold theme <= 7.1.3 - Cross Site Scripting… |
Kriesi |
Enfold |
2026-01-22T16:52:12.531Z | 2026-05-08T12:14:13.616Z |
| CVE-2026-42275 |
8.7 (3.1)
|
zrok: WebDAV drive backend follows symlinks outside Dr… |
openziti |
zrok |
2026-05-08T03:45:57.209Z | 2026-05-08T12:13:21.216Z |
| CVE-2026-7475 |
6.4 (3.1)
|
Sky Addons <= 3.3.2 - Authenticated (Author+) Stored C… |
wowdevs |
Sky Addons – Elementor Addons with Widgets & Templates |
2026-05-08T09:26:47.644Z | 2026-05-08T12:12:36.653Z |
| CVE-2026-8117 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
SourceCodester Pizzafy Ecommerce System index.php cros… |
SourceCodester |
Pizzafy Ecommerce System |
2026-05-07T23:45:10.695Z | 2026-05-08T11:43:56.619Z |
| CVE-2026-8124 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GPAC box_code_base.c sidx_box_read allocation of resources |
n/a |
GPAC |
2026-05-08T01:15:10.347Z | 2026-05-08T11:41:38.846Z |
| CVE-2026-8130 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SourceCodester SUP Online Shopping message.php sql injection |
SourceCodester |
SUP Online Shopping |
2026-05-08T02:45:09.771Z | 2026-05-08T11:29:09.929Z |
| CVE-2026-41501 |
9.8 (3.1)
|
electerm has Command Injection Vulnerability via runLi… |
electerm |
electerm |
2026-05-08T02:51:10.144Z | 2026-05-08T11:19:54.297Z |
| CVE-2026-42273 |
7.8 (4.0)
|
Heimdall: Case-sensitive host matching may lead to pol… |
dadrus |
heimdall |
2026-05-08T03:42:50.312Z | 2026-05-08T10:40:56.541Z |
| CVE-2026-42279 |
5.8 (3.1)
|
solidtime: Time entry update endpoint allows cross-org… |
solidtime-io |
solidtime |
2026-05-08T03:57:31.727Z | 2026-05-08T10:38:51.086Z |
| CVE-2026-8138 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda CX12L SetPptpServerCfg” formSetPPTPServer stack-… |
Tenda |
CX12L |
2026-05-08T04:15:10.228Z | 2026-05-08T10:35:06.800Z |
| CVE-2026-5341 |
6.4 (3.1)
|
NMR Strava activities <= 1.0.14 - Authenticated (Contr… |
mirceatm |
NMR Strava activities |
2026-05-08T09:26:47.283Z | 2026-05-08T10:15:32.703Z |
| CVE-2026-44742 |
7.2 (3.1)
|
Postorius through 1.3.13 does not escape HTML in … |
Postorius project |
Postorius |
2026-05-07T18:09:20.069Z | 2026-05-08T06:25:34.759Z |
| CVE-2025-69599 |
N/A
|
RayVentory Scan Engine through 12.6 Update 8 allo… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T06:08:35.396Z |
| CVE-2025-67887 |
N/A
|
1C-Bitrix through 25.100.500 allows Remote Code E… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T05:52:28.158Z |
| CVE-2026-5588 |
6.3 (4.0)
|
PKIX draft CompositeVerifier accepts empty signature s… |
Legion of the Bouncy Castle Inc. |
BC-JAVA |
2026-04-15T09:06:15.617Z | 2026-05-08T05:29:40.247Z |
| CVE-2023-42346 |
N/A
|
Alkacon OpenCms before 16 allows XXE when the <!D… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T04:46:17.859Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43304 |
N/A
|
libceph: define and enforce CEPH_MAX_KEY_LEN |
Linux |
Linux |
2026-05-08T13:11:24.264Z | 2026-05-08T13:11:24.264Z |
| CVE-2026-43303 |
N/A
|
mm/page_alloc: clear page->private in free_pages_prepare() |
Linux |
Linux |
2026-05-08T13:11:23.561Z | 2026-05-08T13:11:23.561Z |
| CVE-2026-43302 |
N/A
|
drm/v3d: Set DMA segment size to avoid debug warnings |
Linux |
Linux |
2026-05-08T13:11:22.886Z | 2026-05-08T13:11:22.886Z |
| CVE-2026-43301 |
N/A
|
media: chips-media: wave5: Fix PM runtime usage count … |
Linux |
Linux |
2026-05-08T13:11:22.234Z | 2026-05-08T13:11:22.234Z |
| CVE-2026-43300 |
N/A
|
drm/panel: Fix a possible null-pointer dereference in … |
Linux |
Linux |
2026-05-08T13:11:21.530Z | 2026-05-08T13:11:21.530Z |
| CVE-2026-43299 |
N/A
|
btrfs: do not ASSERT() when the fs flips RO inside btr… |
Linux |
Linux |
2026-05-08T13:11:20.872Z | 2026-05-08T13:11:20.872Z |
| CVE-2026-43298 |
N/A
|
drm/amdgpu: Skip vcn poison irq release on VF |
Linux |
Linux |
2026-05-08T13:11:20.215Z | 2026-05-08T13:11:20.215Z |
| CVE-2026-43297 |
N/A
|
media: rockchip: rga: Fix possible ERR_PTR dereference… |
Linux |
Linux |
2026-05-08T13:11:19.530Z | 2026-05-08T13:11:19.530Z |
| CVE-2026-43296 |
N/A
|
octeontx2-af: Workaround SQM/PSE stalls by disabling sticky |
Linux |
Linux |
2026-05-08T13:11:18.870Z | 2026-05-08T13:11:18.870Z |
| CVE-2026-43295 |
N/A
|
rapidio: replace rio_free_net() with kfree() in rio_sc… |
Linux |
Linux |
2026-05-08T13:11:18.226Z | 2026-05-08T13:11:18.226Z |
| CVE-2026-43294 |
N/A
|
drm: renesas: rz-du: mipi_dsi: fix kernel panic when r… |
Linux |
Linux |
2026-05-08T13:11:17.483Z | 2026-05-08T13:11:17.483Z |
| CVE-2026-43293 |
N/A
|
media: chips-media: wave5: Fix kthread worker destruct… |
Linux |
Linux |
2026-05-08T13:11:16.812Z | 2026-05-08T13:11:16.812Z |
| CVE-2026-43292 |
N/A
|
mm/vmalloc: prevent RCU stalls in kasan_release_vmalloc_node |
Linux |
Linux |
2026-05-08T13:11:16.017Z | 2026-05-08T13:11:16.017Z |
| CVE-2026-43291 |
N/A
|
net: nfc: nci: Fix parameter validation for packet data |
Linux |
Linux |
2026-05-08T13:11:15.312Z | 2026-05-08T13:11:15.312Z |
| CVE-2026-43290 |
N/A
|
media: uvcvideo: Return queued buffers on start_stream… |
Linux |
Linux |
2026-05-08T13:11:14.646Z | 2026-05-08T13:11:14.646Z |
| CVE-2026-43289 |
N/A
|
kexec: derive purgatory entry from symbol |
Linux |
Linux |
2026-05-08T13:11:13.860Z | 2026-05-08T13:11:13.860Z |
| CVE-2026-43288 |
N/A
|
ext4: move ext4_percpu_param_init() before ext4_mb_init() |
Linux |
Linux |
2026-05-08T13:11:13.195Z | 2026-05-08T13:11:13.195Z |
| CVE-2026-43287 |
N/A
|
drm: Account property blob allocations to memcg |
Linux |
Linux |
2026-05-08T13:11:12.541Z | 2026-05-08T13:11:12.541Z |
| CVE-2026-43286 |
N/A
|
mm/hugetlb: restore failed global reservations to subpool |
Linux |
Linux |
2026-05-08T13:11:11.867Z | 2026-05-08T13:11:11.867Z |
| CVE-2026-43285 |
N/A
|
mm/slab: do not access current->mems_allowed_seq if !a… |
Linux |
Linux |
2026-05-08T13:11:11.191Z | 2026-05-08T13:11:11.191Z |
| CVE-2025-71302 |
N/A
|
drm/panthor: fix for dma-fence safe access rules |
Linux |
Linux |
2026-05-08T13:26:11.418Z | 2026-05-08T13:26:11.418Z |
| CVE-2025-71301 |
N/A
|
drm/tests: shmem: Hold reservation lock around vmap/vunmap |
Linux |
Linux |
2026-05-08T13:15:22.100Z | 2026-05-08T13:15:22.100Z |
| CVE-2025-71300 |
N/A
|
Revert "arm64: zynqmp: Add an OP-TEE node to the devic… |
Linux |
Linux |
2026-05-08T13:15:21.406Z | 2026-05-08T13:15:21.406Z |
| CVE-2025-71299 |
N/A
|
spi: cadence-quadspi: Parse DT for flashes with the re… |
Linux |
Linux |
2026-05-08T13:11:10.518Z | 2026-05-08T13:11:10.518Z |
| CVE-2025-71298 |
N/A
|
drm/tests: shmem: Hold reservation lock around madvise |
Linux |
Linux |
2026-05-08T13:11:09.797Z | 2026-05-08T13:11:09.797Z |
| CVE-2025-71297 |
N/A
|
wifi: rtw88: 8822b: Avoid WARNING in rtw8822b_config_t… |
Linux |
Linux |
2026-05-08T13:11:09.120Z | 2026-05-08T13:11:09.120Z |
| CVE-2025-71296 |
N/A
|
drm/tests: shmem: Hold reservation lock around purge |
Linux |
Linux |
2026-05-08T13:11:08.251Z | 2026-05-08T13:11:08.251Z |
| CVE-2026-43018 |
8.8 (3.1)
|
Bluetooth: hci_event: fix potential UAF in hci_le_remo… |
Linux |
Linux |
2026-05-01T14:15:22.308Z | 2026-05-03T05:46:05.696Z |
| CVE-2026-43017 |
N/A
|
Bluetooth: MGMT: validate mesh send advertising payloa… |
Linux |
Linux |
2026-05-01T14:15:21.561Z | 2026-05-01T14:15:21.561Z |
| CVE-2025-46605 |
6.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T11:27:24.378Z | 2026-04-20T14:06:10.099Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-43302 | In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Set DMA segment size … | 2026-05-08T14:16:37.447 | 2026-05-08T14:16:37.447 |
| fkie_cve-2026-43301 | In the Linux kernel, the following vulnerability has been resolved: media: chips-media: wave5: Fix… | 2026-05-08T14:16:37.340 | 2026-05-08T14:16:37.340 |
| fkie_cve-2026-43300 | In the Linux kernel, the following vulnerability has been resolved: drm/panel: Fix a possible null… | 2026-05-08T14:16:37.223 | 2026-05-08T14:16:37.223 |
| fkie_cve-2026-43299 | In the Linux kernel, the following vulnerability has been resolved: btrfs: do not ASSERT() when th… | 2026-05-08T14:16:37.100 | 2026-05-08T14:16:37.100 |
| fkie_cve-2026-43298 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Skip vcn poison ir… | 2026-05-08T14:16:36.970 | 2026-05-08T14:16:36.970 |
| fkie_cve-2026-43297 | In the Linux kernel, the following vulnerability has been resolved: media: rockchip: rga: Fix poss… | 2026-05-08T14:16:36.863 | 2026-05-08T14:16:36.863 |
| fkie_cve-2026-43296 | In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Workaround SQM/P… | 2026-05-08T14:16:36.727 | 2026-05-08T14:16:36.727 |
| fkie_cve-2026-43295 | In the Linux kernel, the following vulnerability has been resolved: rapidio: replace rio_free_net(… | 2026-05-08T14:16:36.593 | 2026-05-08T14:16:36.593 |
| fkie_cve-2026-43294 | In the Linux kernel, the following vulnerability has been resolved: drm: renesas: rz-du: mipi_dsi:… | 2026-05-08T14:16:36.487 | 2026-05-08T14:16:36.487 |
| fkie_cve-2026-43293 | In the Linux kernel, the following vulnerability has been resolved: media: chips-media: wave5: Fix… | 2026-05-08T14:16:36.377 | 2026-05-08T14:16:36.377 |
| fkie_cve-2026-43292 | In the Linux kernel, the following vulnerability has been resolved: mm/vmalloc: prevent RCU stalls… | 2026-05-08T14:16:36.250 | 2026-05-08T14:16:36.250 |
| fkie_cve-2026-43291 | In the Linux kernel, the following vulnerability has been resolved: net: nfc: nci: Fix parameter v… | 2026-05-08T14:16:36.120 | 2026-05-08T14:16:36.120 |
| fkie_cve-2026-43290 | In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Return queued… | 2026-05-08T14:16:36.010 | 2026-05-08T14:16:36.010 |
| fkie_cve-2026-43289 | In the Linux kernel, the following vulnerability has been resolved: kexec: derive purgatory entry … | 2026-05-08T14:16:35.867 | 2026-05-08T14:16:35.867 |
| fkie_cve-2026-43288 | In the Linux kernel, the following vulnerability has been resolved: ext4: move ext4_percpu_param_i… | 2026-05-08T14:16:35.737 | 2026-05-08T14:16:35.737 |
| fkie_cve-2026-43287 | In the Linux kernel, the following vulnerability has been resolved: drm: Account property blob all… | 2026-05-08T14:16:35.600 | 2026-05-08T14:16:35.600 |
| fkie_cve-2026-43286 | In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: restore failed glo… | 2026-05-08T14:16:35.473 | 2026-05-08T14:16:35.473 |
| fkie_cve-2026-43285 | In the Linux kernel, the following vulnerability has been resolved: mm/slab: do not access current… | 2026-05-08T14:16:35.337 | 2026-05-08T14:16:35.337 |
| fkie_cve-2025-71302 | In the Linux kernel, the following vulnerability has been resolved: drm/panthor: fix for dma-fence… | 2026-05-08T14:16:31.607 | 2026-05-08T14:16:31.607 |
| fkie_cve-2025-71301 | In the Linux kernel, the following vulnerability has been resolved: drm/tests: shmem: Hold reserva… | 2026-05-08T14:16:31.497 | 2026-05-08T14:16:31.497 |
| fkie_cve-2025-71300 | In the Linux kernel, the following vulnerability has been resolved: Revert "arm64: zynqmp: Add an … | 2026-05-08T14:16:31.387 | 2026-05-08T14:16:31.387 |
| fkie_cve-2025-71299 | In the Linux kernel, the following vulnerability has been resolved: spi: cadence-quadspi: Parse DT… | 2026-05-08T14:16:31.267 | 2026-05-08T14:16:31.267 |
| fkie_cve-2025-71298 | In the Linux kernel, the following vulnerability has been resolved: drm/tests: shmem: Hold reserva… | 2026-05-08T14:16:31.153 | 2026-05-08T14:16:31.153 |
| fkie_cve-2025-71297 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: 8822b: Avoid WARN… | 2026-05-08T14:16:31.000 | 2026-05-08T14:16:31.000 |
| fkie_cve-2025-71296 | In the Linux kernel, the following vulnerability has been resolved: drm/tests: shmem: Hold reserva… | 2026-05-08T14:16:30.887 | 2026-05-08T14:16:30.887 |
| fkie_cve-2026-43018 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: fix pote… | 2026-05-01T15:16:45.980 | 2026-05-08T14:15:26.283 |
| fkie_cve-2026-43017 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: validate mesh… | 2026-05-01T15:16:45.837 | 2026-05-08T14:13:28.580 |
| fkie_cve-2025-46605 | Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:16:31.843 | 2026-05-08T14:06:04.960 |
| fkie_cve-2025-46606 | Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:16:31.967 | 2026-05-08T14:04:38.900 |
| fkie_cve-2026-43045 | In the Linux kernel, the following vulnerability has been resolved: mshv: Fix error handling in ms… | 2026-05-01T15:16:50.817 | 2026-05-08T14:04:13.097 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-fr2c-799q-pg3x |
9.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: dlm: validate length in dlm_se… | 2026-05-06T12:30:29Z | 2026-05-08T15:31:16Z |
| ghsa-8r24-mq27-r6cw |
9.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: tracepoints: get correc… | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ghsa-88rv-c8gv-rfv7 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: ensure s… | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ghsa-78rx-cxmq-q7qg |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: erofs: fix interlaced plain id… | 2026-05-06T12:30:31Z | 2026-05-08T15:31:16Z |
| ghsa-74jp-62v9-rvjf |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix double free re… | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ghsa-6xqc-j72q-x4c8 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: procfs: fix possible double mm… | 2026-05-06T12:30:31Z | 2026-05-08T15:31:16Z |
| ghsa-6g84-hfm2-x43x |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: RDMA/umem: Fix double dma_buf_… | 2026-05-06T12:30:29Z | 2026-05-08T15:31:16Z |
| ghsa-6cwp-88hv-x237 |
9.4 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo_avx2… | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ghsa-4c54-jj6j-3j34 |
8.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: wl1251: validate packet … | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ghsa-3m8w-q233-vhrp |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: mixer: oss: Add card dis… | 2026-05-06T12:30:29Z | 2026-05-08T15:31:16Z |
| ghsa-24vc-pxrh-rpjv |
8.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: validate bsscf… | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ghsa-24h4-22f3-65qc |
8.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: fs/smb/client: fix out-of-boun… | 2026-05-06T12:30:28Z | 2026-05-08T15:31:16Z |
| ghsa-w594-5gj3-f9g6 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ocfs2: validate inline data i_… | 2026-05-06T12:30:26Z | 2026-05-08T15:31:15Z |
| ghsa-vp8v-gjj6-f34x |
7.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ipv4: icmp: fix null-ptr-deref… | 2026-05-06T12:30:27Z | 2026-05-08T15:31:15Z |
| ghsa-vc3m-hcq5-8vhr |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: bpf: Reset register ID for BPF… | 2026-05-05T18:33:25Z | 2026-05-08T15:31:15Z |
| ghsa-v9h6-w2p5-9327 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mshv: Fix error handling in ms… | 2026-05-01T15:30:37Z | 2026-05-08T15:31:15Z |
| ghsa-v76q-g5wv-jjw6 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix out-of-bounds write… | 2026-05-06T12:30:26Z | 2026-05-08T15:31:15Z |
| ghsa-rmq8-583w-4v2c |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: reject root items with … | 2026-05-01T15:30:37Z | 2026-05-08T15:31:15Z |
| ghsa-r529-g827-7gf5 |
7.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ipv6: ioam: fix potential NULL… | 2026-05-06T12:30:27Z | 2026-05-08T15:31:15Z |
| ghsa-qgvr-5r26-m585 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: hci_cmd_s… | 2026-05-01T15:30:36Z | 2026-05-08T15:31:15Z |
| ghsa-mj2w-r8cc-jq9c |
7.2 (3.1)
|
The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnera… | 2026-05-06T09:31:35Z | 2026-05-08T15:31:15Z |
| ghsa-m2xh-q35x-h5f5 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: xsk: tighten UMEM headroom val… | 2026-05-06T12:30:27Z | 2026-05-08T15:31:15Z |
| ghsa-jrph-46wx-r2g3 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: xfrm: Wait for RCU readers dur… | 2026-05-06T12:30:27Z | 2026-05-08T15:31:15Z |
| ghsa-frxf-jp28-379q |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix incorrect dent… | 2026-05-06T12:30:27Z | 2026-05-08T15:31:15Z |
| ghsa-fqqq-mg72-x273 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Fix page reas… | 2026-05-06T12:30:26Z | 2026-05-08T15:31:15Z |
| ghsa-977x-crv2-w57m |
9.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: dcache: Limit the minimal numb… | 2026-05-05T18:33:25Z | 2026-05-08T15:31:15Z |
| ghsa-84jf-h474-jrh8 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: xfs: don't irele after failing… | 2026-05-05T18:33:25Z | 2026-05-08T15:31:15Z |
| ghsa-845x-q62g-4v8p |
9.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ext4: handle wraparound when s… | 2026-05-05T18:33:25Z | 2026-05-08T15:31:15Z |
| ghsa-6mf2-xqwv-jhq3 |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix type con… | 2026-05-05T18:33:25Z | 2026-05-08T15:31:15Z |
| ghsa-6c86-hp8g-chh5 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: drop pendin… | 2026-05-05T18:33:24Z | 2026-05-08T15:31:15Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-260 |
6.1 (3.1)
|
A reflected Cross-Site Scripting (XSS) vulnerability exists in the mlflow/mlflow reposito… | mlflow | 2023-12-07T05:15:00+00:00 | 2024-04-16T15:20:55.191003+00:00 |
| pysec-2024-49 |
|
Lektor before 3.3.11 does not sanitize DB path traversal. Thus, shell commands might be e… | lektor | 2024-03-27T06:15:00+00:00 | 2024-03-27T11:18:36.506150+00:00 |
| pysec-2024-48 |
|
Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial o… | black | 2024-03-19T05:15:00+00:00 | 2024-03-19T11:18:50.379002+00:00 |
| pysec-2024-47 |
|
In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.te… | django | 2024-03-15T20:15:00+00:00 | 2024-03-15T23:20:34.975097+00:00 |
| pysec-2024-46 |
|
Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenti… | apache-airflow | 2024-03-14T09:15:00+00:00 | 2024-03-14T11:19:09.515892+00:00 |
| pysec-2024-45 |
|
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to contro… | langchain-core | 2024-03-04T00:15:00+00:00 | 2024-03-13T23:20:07.486731+00:00 |
| pysec-2024-44 |
|
In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __arr… | rpyc | 2024-03-12T16:15:00+00:00 | 2024-03-12T19:19:21.886478+00:00 |
| pysec-2024-43 |
|
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to contro… | langchain | 2024-03-04T00:15:00+00:00 | 2024-03-05T10:22:15.555734+00:00 |
| pysec-2024-42 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated Ops … | apache-airflow | 2024-03-01T11:15:00+00:00 | 2024-03-01T14:20:34.498842+00:00 |
| pysec-2023-259 |
9.8 (3.1)
|
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1… | micropython-select | 2023-12-29T05:15:00+00:00 | 2024-02-29T07:20:31.851255+00:00 |
| pysec-2023-258 |
9.8 (3.1)
|
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1… | micropython-os | 2023-12-29T05:15:00+00:00 | 2024-02-29T07:20:31.721783+00:00 |
| pysec-2023-257 |
9.8 (3.1)
|
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1… | micropython-io | 2023-12-29T05:15:00+00:00 | 2024-02-29T07:20:31.603749+00:00 |
| pysec-2023-256 |
9.8 (3.1)
|
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1… | micropython-copy | 2023-12-29T05:15:00+00:00 | 2024-02-29T07:20:31.464203+00:00 |
| pysec-2023-255 |
8.1 (3.1)
|
Command Injection in GitHub repository gradio-app/gradio prior to main. | gradio | 2023-12-14T14:15:00+00:00 | 2024-02-28T16:22:37.359017+00:00 |
| pysec-2024-41 |
|
diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. … | diffoscope | 2024-02-27T02:15:00+00:00 | 2024-02-27T07:20:27.954412+00:00 |
| pysec-2024-40 |
|
orjson.loads in orjson before 3.9.15 does not limit recursion for deeply nested JSON documents. | orjson | 2024-02-26T16:28:00+00:00 | 2024-02-26T18:22:26.039698+00:00 |
| pysec-2024-39 |
|
Versions of the package fastecdsa before 2.3.2 are vulnerable to Use of Uninitialized Var… | fastecdsa | 2024-02-24T05:15:00+00:00 | 2024-02-24T07:19:09.418536+00:00 |
| pysec-2023-254 |
7.5 (3.1)
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2023-11-29T19:15:00+00:00 | 2024-02-17T07:18:27.688636+00:00 |
| pysec-2024-38 |
7.5 (3.1)
|
FastAPI is a web framework for building APIs with Python 3.8+ based on standard Python ty… | fastapi | 2024-02-05T15:15:00+00:00 | 2024-02-16T18:22:32.607118+00:00 |
| pysec-2024-37 |
6.5 (3.1)
|
nonebot2 is a cross-platform Python asynchronous chatbot framework written in Python. Thi… | nonebot2 | 2024-02-09T23:15:00+00:00 | 2024-02-16T16:22:37.389642+00:00 |
| pysec-2022-43059 |
5.5 (3.1)
|
AIOHTTP 3.8.1 can report a "ValueError: Invalid IPv6 URL" outcome, which can lead to a De… | aiohttp | 2022-06-23T17:15:00Z | 2024-02-16T13:47:54.655573Z |
| pysec-2024-36 |
5.5 (3.1)
|
An information disclosure flaw was found in ansible-core due to a failure to respect the … | ansible-core | 2024-02-06T12:15:00+00:00 | 2024-02-14T07:20:09.911618+00:00 |
| pysec-2023-253 |
8.1 (3.1)
|
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-15T01:15:00+00:00 | 2024-02-14T00:26:12.242703+00:00 |
| pysec-2024-35 |
5.4 (3.1)
|
Versions of the package dash-core-components before 2.13.0; all versions of the package d… | dash | 2024-02-02T05:15:00+00:00 | 2024-02-10T07:18:43.563257+00:00 |
| pysec-2024-12 |
|
LlamaIndex (aka llama_index) through 0.9.34 allows SQL injection via the Text-to-SQL feat… | llama-index | 2024-01-22T01:15:00Z | 2024-02-10T01:22:25.611009Z |
| pysec-2024-34 |
9.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6-server | 2024-01-30T16:15:00+00:00 | 2024-02-08T20:20:16.896186+00:00 |
| pysec-2024-33 |
9.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6-node | 2024-01-30T16:15:00+00:00 | 2024-02-08T20:20:16.842528+00:00 |
| pysec-2024-32 |
4.3 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.342089+00:00 |
| pysec-2024-31 |
3.7 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.276390+00:00 |
| pysec-2024-30 |
8.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.210087+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33463 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.741491Z |
| gsd-2024-33462 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.683814Z |
| gsd-2024-33461 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.675113Z |
| gsd-2024-33460 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.688393Z |
| gsd-2024-33459 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.692449Z |
| gsd-2024-33458 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.624212Z |
| gsd-2024-33457 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.696566Z |
| gsd-2024-33456 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.717737Z |
| gsd-2024-33455 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.655789Z |
| gsd-2024-33454 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.650999Z |
| gsd-2024-33453 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.698683Z |
| gsd-2024-33452 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.703341Z |
| gsd-2024-33451 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.726764Z |
| gsd-2024-33450 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.751570Z |
| gsd-2024-33449 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.610062Z |
| gsd-2024-33448 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.631490Z |
| gsd-2024-33447 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.747407Z |
| gsd-2024-33446 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.658390Z |
| gsd-2024-33445 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.724418Z |
| gsd-2024-33444 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.653354Z |
| gsd-2024-33443 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.759133Z |
| gsd-2024-33442 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.710054Z |
| gsd-2024-33441 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.733108Z |
| gsd-2024-33440 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.719884Z |
| gsd-2024-33439 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.753324Z |
| gsd-2024-33438 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.689433Z |
| gsd-2024-33437 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.743513Z |
| gsd-2024-33436 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.653792Z |
| gsd-2024-33435 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.737152Z |
| gsd-2024-33434 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.628304Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2676 | Malicious code in moscova-plural-json-parser (npm) | 2026-04-15T03:12:05Z | 2026-04-23T20:50:51Z |
| mal-2026-2675 | Malicious code in mongoose-stamps (npm) | 2026-04-15T03:07:56Z | 2026-04-23T20:50:51Z |
| mal-2026-2668 | Malicious code in pnpm-workspaces (npm) | 2026-04-14T19:36:06Z | 2026-04-23T20:50:51Z |
| mal-2026-2654 | Malicious code in pinstatsd (npm) | 2026-04-12T06:43:57Z | 2026-04-23T20:50:51Z |
| mal-2026-2653 | Malicious code in pinlogger (npm) | 2026-04-12T06:43:45Z | 2026-04-23T20:50:51Z |
| mal-2026-2652 | Malicious code in onewin-landing (npm) | 2026-04-14T11:47:12Z | 2026-04-23T20:50:51Z |
| mal-2026-2651 | Malicious code in one-translations (npm) | 2026-04-14T11:47:11Z | 2026-04-23T20:50:51Z |
| mal-2026-2650 | Malicious code in one-sdui (npm) | 2026-04-14T11:47:12Z | 2026-04-23T20:50:51Z |
| mal-2026-2649 | Malicious code in okxglobal (npm) | 2026-04-14T11:47:13Z | 2026-04-23T20:50:51Z |
| mal-2026-2648 | Malicious code in okx-nav (npm) | 2026-04-14T11:47:13Z | 2026-04-23T20:50:51Z |
| mal-2026-2647 | Malicious code in okx-data (npm) | 2026-04-14T11:47:13Z | 2026-04-23T20:50:51Z |
| mal-2026-2646 | Malicious code in okfe-serverless-conf (npm) | 2026-04-14T11:47:13Z | 2026-04-23T20:50:51Z |
| mal-2026-2645 | Malicious code in okassistant (npm) | 2026-04-14T11:47:13Z | 2026-04-23T20:50:51Z |
| mal-2026-2644 | Malicious code in node-unpnotifyserv (npm) | 2026-04-14T11:47:49Z | 2026-04-23T20:50:51Z |
| mal-2026-2643 | Malicious code in ms-affiliate-links (npm) | 2026-04-14T11:47:12Z | 2026-04-23T20:50:51Z |
| mal-2026-2635 | Malicious code in pubnub-element (npm) | 2026-04-13T06:14:25Z | 2026-04-23T20:50:51Z |
| mal-2026-2634 | Malicious code in percy-cake-docker (npm) | 2026-04-14T11:31:04Z | 2026-04-23T20:50:51Z |
| mal-2026-2633 | Malicious code in markdownlint-rule-link-pattern (npm) | 2026-04-13T06:13:12Z | 2026-04-23T20:50:51Z |
| mal-2026-2632 | Malicious code in magentaa11y (npm) | 2026-04-13T23:08:06Z | 2026-04-23T20:50:51Z |
| mal-2026-2606 | Malicious code in mdb-react-sortable (npm) | 2026-04-13T15:25:19Z | 2026-04-23T20:50:51Z |
| mal-2026-2605 | Malicious code in kaltura-ngx-client (npm) | 2026-04-13T15:25:19Z | 2026-04-23T20:50:51Z |
| mal-2026-2568 | Malicious code in pt-sc-logger (npm) | 2026-04-12T21:36:18Z | 2026-04-23T20:50:51Z |
| mal-2026-2567 | Malicious code in pt-sc-demo-app (npm) | 2026-04-12T21:41:40Z | 2026-04-23T20:50:51Z |
| mal-2026-2565 | Malicious code in portal-common-ui (npm) | 2026-04-12T04:15:46Z | 2026-04-23T20:50:51Z |
| mal-2026-2554 | Malicious code in paysafe-venmo (npm) | 2026-04-11T09:20:42Z | 2026-04-23T20:50:51Z |
| mal-2026-2553 | Malicious code in paysafe-payments-sdk-common (npm) | 2026-04-11T09:20:41Z | 2026-04-23T20:50:51Z |
| mal-2026-2552 | Malicious code in paysafe-google-pay (npm) | 2026-04-11T09:20:48Z | 2026-04-23T20:50:51Z |
| mal-2026-2551 | Malicious code in paysafe-card-payments (npm) | 2026-04-11T09:40:44Z | 2026-04-23T20:50:51Z |
| mal-2026-2550 | Malicious code in paysafe-apple-pay (npm) | 2026-04-11T09:33:48Z | 2026-04-23T20:50:51Z |
| mal-2026-3019 | Malicious code in hls.js (npm) | 2026-04-23T16:08:37Z | 2026-04-23T20:50:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3619 | Linux Kernel: Mehrere Schwachstellen | 2024-12-05T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2024-3608 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-12-04T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2024-3509 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-11-19T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2024-1402 | Linux Kernel: Mehrere Schwachstellen | 2024-06-18T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2024-1235 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe | 2024-05-26T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2023-1367 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-06-05T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-2400 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-12-22T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-2132 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-11-20T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-2038 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-11-14T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-1201 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-08-28T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-0997 | Linux Kernel: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2022-08-09T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-0540 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-05-11T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0096 | Google Android Pixel: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-01-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2196 | Redis: Mehrere Schwachstellen | 2025-10-05T22:00:00.000+00:00 | 2026-01-14T23:00:00.000+00:00 |
| wid-sec-w-2026-0017 | Veeam Backup & Replication: Mehrere Schwachstellen | 2026-01-05T23:00:00.000+00:00 | 2026-01-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0020 | Google Chrome/Microsoft Edge: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-01-06T23:00:00.000+00:00 | 2026-01-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0047 | CoreDNS: Schwachstelle ermöglicht Denial of Service | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0044 | libtasn1: Schwachstelle ermöglicht Denial of Service | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0043 | Trend Micro Apex Central: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0040 | n8n: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0036 | OpenLDAP: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2026-01-07T23:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0037 | GitLab CE und EE: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2026-0035 | MediaWiki Erweiterungen: Mehrere Schwachstellen | 2026-01-07T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2026-0034 | Keycloak: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-01-07T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2026-0026 | HCL BigFix: Mehrere Schwachstellen | 2026-01-06T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-2867 | HPE OneView: Schwachstelle ermöglicht Codeausführung | 2025-12-16T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-2759 | IBM WebSphere Application Server: Schwachstelle ermöglicht Cross-Site Scripting | 2025-12-08T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-2386 | Unbound: Schwachstelle ermöglicht Manipulation von Dateien | 2025-10-22T22:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-1334 | Apache Commons FileUpload: Schwachstelle ermöglicht Denial of Service | 2025-06-16T22:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0895 | Apache Tomcat: Mehrere Schwachstellen | 2025-04-28T22:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-13-219-01 | Schweitzer Engineering Laboratories Improper Input Validation | 2013-05-10T06:00:00.000000Z | 2025-06-12T18:44:12.073139Z |
| icsa-25-162-10 | PTZOptics and Other Pan-Tilt-Zoom Cameras | 2025-06-12T06:00:00.000000Z | 2025-06-12T06:00:00.000000Z |
| icsa-25-162-09 | AVEVA PI Connector for CygNet | 2025-06-12T06:00:00.000000Z | 2025-06-12T06:00:00.000000Z |
| icsa-25-162-08 | AVEVA PI Web API | 2025-06-12T06:00:00.000000Z | 2025-06-12T06:00:00.000000Z |
| icsa-25-162-07 | AVEVA PI Data Archive | 2025-06-12T06:00:00.000000Z | 2025-06-12T06:00:00.000000Z |
| icsma-25-160-01 | MicroDicom DICOM Viewer | 2025-06-10T06:00:00.000000Z | 2025-06-10T06:00:00.000000Z |
| icsa-25-140-11 | Assured Telematics Inc (ATI) Fleet Management System (Update A) | 2025-05-20T06:00:00.000000Z | 2025-06-10T06:00:00.000000Z |
| icsa-24-030-01 | Emerson Rosemount GC370XA, GC700XA, GC1500XA | 2024-01-30T07:00:00.000000Z | 2025-06-10T06:00:00.000000Z |
| icsa-25-160-01 | SinoTrack GPS Receiver | 2025-06-10T05:00:00.000000Z | 2025-06-10T05:00:00.000000Z |
| icsa-25-162-06 | Siemens Energy Services | 2025-06-10T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-162-03 | Siemens SCALANCE and RUGGEDCOM | 2025-06-10T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-162-01 | Siemens Tecnomatix Plant Simulation | 2025-06-10T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-105-01 | Siemens Mendix Runtime | 2025-04-08T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-25-044-07 | Siemens Teamcenter | 2025-02-11T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-24-347-10 | Siemens SENTRON Powercenter 1000 | 2024-12-10T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-24-338-02 | Siemens RUGGEDCOM APE1808 | 2024-11-22T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-24-284-12 | Siemens Sentron Powercenter 1000 | 2024-10-08T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-21-103-11 | Siemens TIM 4R-IE Devices | 2021-04-13T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-20-105-06 | Siemens SIMOTICS, Desigo, APOGEE, and TALON | 2020-04-14T00:00:00.000000Z | 2025-06-10T00:00:00.000000Z |
| icsa-11-340-01 | ARC Informatique PcVue HMI/SCADA ActiveX Vulnerabilities | 2011-09-08T06:00:00.000000Z | 2025-06-09T19:53:05.359419Z |
| icsa-11-335-01 | 7-Technologies Data Server Denial of Service | 2011-09-03T06:00:00.000000Z | 2025-06-09T19:52:59.122386Z |
| icsa-11-319-01 | InduSoft Web Studio Vulnerabilities | 2011-08-18T06:00:00.000000Z | 2025-06-09T19:52:46.658796Z |
| icsa-11-314-01 | Safenet Sentinel and 7-T Input Sanitization Vulnerability | 2011-08-13T06:00:00.000000Z | 2025-06-09T19:52:40.428887Z |
| icsa-11-307-01 | Schneider Electric Vijeo Historian Web Server Multiple Vulnerabilities | 2011-08-06T06:00:00.000000Z | 2025-06-09T19:52:15.424002Z |
| icsa-11-298-01a | Sielco Sistemi Winlog Buffer Overflow | 2011-07-28T06:00:00.000000Z | 2025-06-09T19:52:09.187490Z |
| icsa-11-294-01 | Progea Movicon Power HMI Vulnerabilities | 2011-07-24T06:00:00.000000Z | 2025-06-09T19:51:50.522681Z |
| icsa-11-280-01 | Cogent DataHub Vulnerabilities | 2011-07-10T06:00:00.000000Z | 2025-06-09T19:51:25.265310Z |
| icsa-11-279-04 | Beckhoff TwinCAT Read Access Violation | 2011-07-09T06:00:00.000000Z | 2025-06-09T19:51:19.034220Z |
| icsa-11-279-03a | Unitronics UNIOPC Server Input Handling Vulnerability | 2011-07-09T06:00:00.000000Z | 2025-06-09T19:51:12.801318Z |
| icsa-11-279-02 | CitectSCADA and Mitsubishi MX4 SCADA Batch Server Buffer Overflow | 2011-07-09T06:00:00.000000Z | 2025-06-09T19:51:06.585776Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-snmp-uhv6ZDeF | Cisco IOS XR Software SNMP Management Plane Protection ACL Bypass Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-ssh-privesc-ewdmkew3 | Cisco IOS XR Software SSH Privilege Escalation Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-ssh-privesc-eWDMKew3 | Cisco IOS XR Software SSH Privilege Escalation Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-scp-dos-kb6suuhw | Cisco IOS XR Software Authenticated CLI Secure Copy Protocol and SFTP Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-scp-dos-kb6sUUHw | Cisco IOS XR Software Authenticated CLI Secure Copy Protocol and SFTP Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-pppma-jkwfgnew | Cisco IOS XR Software for ASR 9000 Series Aggregation Services Routers PPPoE Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-pppma-JKWFgneW | Cisco IOS XR Software for ASR 9000 Series Aggregation Services Routers PPPoE Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-dhcp-dos-3tgpkrdm | Cisco IOS XR Software DHCP Version 4 Server Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-dhcp-dos-3tgPKRdm | Cisco IOS XR Software DHCP Version 4 Server Denial of Service Vulnerability | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-acl-bypass-rzu5nl3e | Cisco IOS XR Software MPLS and Pseudowire Interfaces Access Control List Bypass Vulnerabilities | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-iosxr-acl-bypass-RZU5NL3e | Cisco IOS XR Software MPLS and Pseudowire Interfaces Access Control List Bypass Vulnerabilities | 2024-03-13T16:00:00+00:00 | 2024-03-13T16:00:00+00:00 |
| cisco-sa-vmanage-unauthapi-sphclypa | Cisco SD-WAN vManage Unauthenticated REST API Access Vulnerability | 2023-07-12T16:00:00+00:00 | 2024-03-12T18:21:23+00:00 |
| cisco-sa-secure-client-crlf-w43v4g7 | Cisco Secure Client Carriage Return Line Feed Injection Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-12T14:17:07+00:00 |
| cisco-sa-duo-infodisc-rlceqm6t | Cisco Duo Authentication for Windows Logon and RDP Information Disclosure Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-08T18:23:38+00:00 |
| cisco-sa-duo-infodisc-rLCEqm6T | Cisco Duo Authentication for Windows Logon and RDP Information Disclosure Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-08T18:23:38+00:00 |
| cisco-sa-secure-privesc-syxqo6ds | Cisco Secure Client for Linux with ISE Posture Module Privilege Escalation Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-secure-privesc-sYxQO6ds | Cisco Secure Client for Linux with ISE Posture Module Privilege Escalation Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-secure-client-crlf-W43V4G7 | Cisco Secure Client Carriage Return Line Feed Injection Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-12T14:17:07+00:00 |
| cisco-sa-sb-wap-multi-85g83crb | Cisco Small Business 100, 300, and 500 Series Wireless Access Points Command Injection and Buffer Overflow Vulnerabilities | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-sb-wap-multi-85G83CRB | Cisco Small Business 100, 300, and 500 Series Wireless Access Points Command Injection and Buffer Overflow Vulnerabilities | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-duo-win-bypass-pn42kkbm | Cisco Duo Authentication for Windows Logon and RDP Authentication Bypass Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-duo-win-bypass-pn42KKBm | Cisco Duo Authentication for Windows Logon and RDP Authentication Bypass Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-appd-xss-3jwqsmnt | Cisco AppDynamics Controller Cross-Site Scripting Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-appd-xss-3JwqSMNT | Cisco AppDynamics Controller Cross-Site Scripting Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-appd-traversal-m7n8mzpf | Cisco AppDynamics Controller Path Traversal Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-appd-traversal-m7N8mZpF | Cisco AppDynamics Controller Path Traversal Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-ucsfi-imm-syn-p6kztdqc | Cisco UCS 6400 and 6500 Series Fabric Interconnects Intersight Managed Mode Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-ucsfi-imm-syn-p6kZTDQC | Cisco UCS 6400 and 6500 Series Fabric Interconnects Intersight Managed Mode Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-po-acl-tkyepgvl | Cisco Nexus 3000 and 9000 Series Switches Port Channel ACL Programming Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-po-acl-TkyePgvL | Cisco Nexus 3000 and 9000 Series Switches Port Channel ACL Programming Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-23393 | bridge: cfm: Fix race condition in peer_mep deletion | 2026-03-02T00:00:00.000Z | 2026-04-30T01:45:27.000Z |
| msrc_cve-2026-31432 | ksmbd: fix OOB write in QUERY_INFO for compound requests | 2026-04-02T00:00:00.000Z | 2026-04-30T01:45:19.000Z |
| msrc_cve-2026-23378 | net/sched: act_ife: Fix metalist update behavior | 2026-03-02T00:00:00.000Z | 2026-04-30T01:45:14.000Z |
| msrc_cve-2026-31502 | team: fix header_ops type confusion with non-Ethernet ports | 2026-04-02T00:00:00.000Z | 2026-04-30T01:45:07.000Z |
| msrc_cve-2026-23372 | nfc: rawsock: cancel tx_work before socket teardown | 2026-03-02T00:00:00.000Z | 2026-04-30T01:44:55.000Z |
| msrc_cve-2026-23364 | ksmbd: Compare MACs in constant time | 2026-03-02T00:00:00.000Z | 2026-04-30T01:44:42.000Z |
| msrc_cve-2026-31482 | s390/entry: Scrub r12 register on kernel entry | 2026-04-02T00:00:00.000Z | 2026-04-30T01:44:39.000Z |
| msrc_cve-2026-31464 | scsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:44:02.000Z |
| msrc_cve-2026-4159 | wc_PKCS7_DecodeEnvelopedData 1 byte out-of-bounds read | 2026-03-02T00:00:00.000Z | 2026-04-30T01:43:47.000Z |
| msrc_cve-2026-3580 | Compiler-induced timing leak in sp_256_get_entry_256_9 on RISC-V | 2026-03-02T00:00:00.000Z | 2026-04-30T01:43:33.000Z |
| msrc_cve-2026-3229 | Integer Overflow in Certificate Chain Allocation | 2026-03-02T00:00:00.000Z | 2026-04-30T01:43:19.000Z |
| msrc_cve-2026-31576 | media: hackrf: fix to not free memory after the device is registered in hackrf_probe() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:43:12.000Z |
| msrc_cve-2026-1005 | Integer underflow leads to out-of-bounds access in sniffer AES-GCM/CCM/ARIA-GCM decrypt path | 2026-03-02T00:00:00.000Z | 2026-04-30T01:43:05.000Z |
| msrc_cve-2026-31527 | driver core: platform: use generic driver_override infrastructure | 2026-04-02T00:00:00.000Z | 2026-04-30T01:43:00.000Z |
| msrc_cve-2026-4395 | Heap-based buffer overflow in wc_ecc_import_x963_ex KCAPI path | 2026-03-02T00:00:00.000Z | 2026-04-30T01:42:44.000Z |
| msrc_cve-2026-31582 | hwmon: (powerz) Fix use-after-free on USB disconnect | 2026-04-02T00:00:00.000Z | 2026-04-30T01:42:36.000Z |
| msrc_cve-2026-31429 | net: skb: fix cross-cache free of KFENCE-allocated skb head | 2026-04-02T00:00:00.000Z | 2026-04-30T01:41:58.000Z |
| msrc_cve-2026-32778 | CVE-2026-32778 | 2026-03-02T00:00:00.000Z | 2026-04-30T01:41:23.000Z |
| msrc_cve-2026-32777 | CVE-2026-32777 | 2026-03-02T00:00:00.000Z | 2026-04-30T01:41:00.000Z |
| msrc_cve-2026-34480 | Apache Log4j Core: Silent log event loss in XmlLayout due to unescaped XML 1.0 forbidden characters | 2026-04-02T00:00:00.000Z | 2026-04-30T01:40:51.000Z |
| msrc_cve-2026-31616 | usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:40:49.000Z |
| msrc_cve-2026-32776 | CVE-2026-32776 | 2026-03-02T00:00:00.000Z | 2026-04-30T01:40:44.000Z |
| msrc_cve-2026-34479 | Apache Log4j 1 to Log4j 2 bridge: Silent log event loss in Log4j1XmlLayout due to unescaped XML 1.0 forbidden characters | 2026-04-02T00:00:00.000Z | 2026-04-30T01:40:38.000Z |
| msrc_cve-2025-69648 | CVE-2025-69648 | 2026-03-02T00:00:00.000Z | 2026-04-30T01:40:27.000Z |
| msrc_cve-2026-34481 | Apache Log4j JSON Template Layout: Improper serialization of non-finite floating-point values in JsonTemplateLayout | 2026-04-02T00:00:00.000Z | 2026-04-30T01:40:26.000Z |
| msrc_cve-2026-1502 | HTTP client proxy tunnel headers not validated for CR/LF | 2026-04-02T00:00:00.000Z | 2026-04-30T01:40:12.000Z |
| msrc_cve-2026-5446 | wolfSSL ARIA-GCM TLS 1.2/DTLS 1.2 GCM nonce reuse | 2026-04-02T00:00:00.000Z | 2026-04-30T01:39:49.000Z |
| msrc_cve-2026-21620 | TFTP Path Traversal | 2026-02-02T00:00:00.000Z | 2026-04-30T01:39:45.000Z |
| msrc_cve-2026-5460 | Heap Use-After-Free in PQC Hybrid KeyShare Error Cleanup in wolfSSL TLS 1.3 | 2026-04-02T00:00:00.000Z | 2026-04-30T01:39:29.000Z |
| msrc_cve-2026-5772 | MatchDomainName 1-Byte Stack Buffer Over-Read in Hostname Validation | 2026-04-02T00:00:00.000Z | 2026-04-30T01:39:09.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0412 | Kwetsbaarheden verholpen in Oracle Peoplesoft | 2024-10-17T13:16:18.175855Z | 2024-10-17T13:16:18.175855Z |
| ncsc-2024-0411 | Kwetsbaarheden verholpen in Oracle Database producten | 2024-10-17T13:15:19.595269Z | 2024-10-17T13:15:19.595269Z |
| ncsc-2024-0410 | Kwetsbaarheden verholpen in Solarwinds Platform | 2024-10-17T06:09:32.053449Z | 2024-10-17T06:09:32.053449Z |
| ncsc-2024-0409 | Kwetsbaarheid verholpen in Solarwinds Web Helpdesk | 2024-10-17T06:08:32.057774Z | 2024-10-17T06:08:32.057774Z |
| ncsc-2024-0408 | Kwetsbaarheden verholpen in Splunk Enterprise | 2024-10-15T15:18:24.694416Z | 2024-10-15T15:18:24.694416Z |
| ncsc-2024-0407 | Kwetsbaarheden verholpen in Moxa systemen | 2024-10-14T12:14:38.572540Z | 2024-10-14T12:14:38.572540Z |
| ncsc-2024-0359 | Kwetsbaarheden verholpen in diverse producten van Veeam. | 2024-09-06T08:01:04.558202Z | 2024-10-11T09:18:53.784374Z |
| ncsc-2024-0406 | Kwetsbaarheden verholpen in Gitlab Enterprise Edition en Community Edition | 2024-10-11T08:23:31.975727Z | 2024-10-11T08:23:31.975727Z |
| ncsc-2024-0398 | Kwetsbaarheden verholpen in Ivanti Connect Secure en Policy Secure | 2024-10-09T09:47:33.556285Z | 2024-10-11T07:03:14.760313Z |
| ncsc-2024-0386 | Kwetsbaarheden verholpen in Zimbra | 2024-10-02T07:02:43.365395Z | 2024-10-10T12:50:25.238470Z |
| ncsc-2024-0405 | Kwetsbaarheden verholpen in Palo Alto Expedition | 2024-10-10T12:02:12.890277Z | 2024-10-10T12:02:12.890277Z |
| ncsc-2024-0404 | Kwetsbaarheden verholpen in Juniper JunOS en JunOS Evolved | 2024-10-10T11:19:54.515278Z | 2024-10-10T11:19:54.515278Z |
| ncsc-2024-0403 | Kwetsbaarheid verholpen in Mozilla Firefox | 2024-10-10T07:20:38.171954Z | 2024-10-10T07:20:38.171954Z |
| ncsc-2024-0402 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2024-10-09T13:38:09.912496Z | 2024-10-09T13:38:09.912496Z |
| ncsc-2024-0401 | Kwetsbaarheid verholpen in Ivanti Endpoint Manager Mobile | 2024-10-09T11:21:34.434721Z | 2024-10-09T11:21:34.434721Z |
| ncsc-2024-0400 | Kwetsbaarheden verholpen in Ivanti Avalanche | 2024-10-09T10:45:10.558311Z | 2024-10-09T10:45:10.558311Z |
| ncsc-2024-0399 | Kwetsbaarheden verholpen in Ivanti Cloud Services Appliance | 2024-10-09T09:49:35.398654Z | 2024-10-09T09:49:35.398654Z |
| ncsc-2024-0397 | Kwetsbaarheden verholpen in Microsoft System Center | 2024-10-08T20:02:55.249830Z | 2024-10-08T20:02:55.249830Z |
| ncsc-2024-0396 | Kwetsbaarheden verholpen in Microsoft Office | 2024-10-08T20:00:57.142744Z | 2024-10-08T20:00:57.142744Z |
| ncsc-2024-0395 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-10-08T19:59:28.385237Z | 2024-10-08T19:59:28.385237Z |
| ncsc-2024-0394 | Kwetsbaarheden verholpen in Microsoft SQL Server Power BI Report Server | 2024-10-08T19:58:15.839568Z | 2024-10-08T19:58:15.839568Z |
| ncsc-2024-0393 | Kwetsbaarheden verholpen in Microsoft Azure componenten | 2024-10-08T19:57:08.426643Z | 2024-10-08T19:57:08.426643Z |
| ncsc-2024-0392 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-10-08T19:55:28.028805Z | 2024-10-08T19:55:28.028805Z |
| ncsc-2024-0391 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-10-08T13:55:56.095947Z | 2024-10-08T13:55:56.095947Z |
| ncsc-2024-0390 | Kwetsbaarheden verholpen in Siemens producten | 2024-10-08T13:49:37.486004Z | 2024-10-08T13:49:37.486004Z |
| ncsc-2024-0389 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-10-04T10:11:42.963861Z | 2024-10-04T10:11:42.963861Z |
| ncsc-2024-0388 | Kwetsbaarheden verholpen in Draytek Vigor routers | 2024-10-04T09:52:41.945864Z | 2024-10-04T09:52:41.945864Z |
| ncsc-2024-0387 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2024-10-02T09:07:21.241299Z | 2024-10-02T09:07:21.241299Z |
| ncsc-2024-0384 | Kwetsbaarheden ontdekt in CUPS | 2024-09-27T08:45:53.798141Z | 2024-10-02T08:45:09.718543Z |
| ncsc-2024-0385 | Kwetsbaarheden verholpen in Foxit PDF Editor en PDF Reader | 2024-09-30T09:41:20.295003Z | 2024-09-30T09:41:20.295003Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10183-1 | build-20260202-2.1 on GA media | 2026-02-12T00:00:00Z | 2026-02-12T00:00:00Z |
| opensuse-su-2026:20202-1 | Security update for python-pip | 2026-02-11T19:17:08Z | 2026-02-11T19:17:08Z |
| opensuse-su-2026:20203-1 | Security update for openjpeg2 | 2026-02-11T19:15:23Z | 2026-02-11T19:15:23Z |
| opensuse-su-2026:20199-1 | Security update for micropython | 2026-02-11T16:38:19Z | 2026-02-11T16:38:19Z |
| opensuse-su-2026:20198-1 | Security update for xorg-x11-server | 2026-02-11T11:25:45Z | 2026-02-11T11:25:45Z |
| opensuse-su-2026:10182-1 | snpguest-0.10.0-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10181-1 | sccache-0.13.0~1-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10180-1 | rustup-1.28.2~0-3.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10179-1 | python311-maturin-1.11.5-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10178-1 | libmunge2-0.5.18-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10177-1 | gnutls-3.8.12-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10176-1 | freerdp2-2.11.7-4.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10175-1 | cargo-audit-0.22.1~git0.efcde93-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10174-1 | assimp-devel-6.0.4-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10173-1 | apptainer-1.4.5-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:20193-1 | Security update for orthanc, gdcm, orthanc-authorization, orthanc-dicomweb, orthanc-gdcm, orthanc-indexer, orthanc-mysql, orthanc-neuro, orthanc-postgresql, orthanc-python, orthanc-stl, orthanc-tcia, orthanc-wsi, python-pyorthanc | 2026-02-10T22:29:40Z | 2026-02-10T22:29:40Z |
| opensuse-su-2026:20191-1 | Security update for trivy | 2026-02-10T21:52:10Z | 2026-02-10T21:52:10Z |
| opensuse-su-2026:20192-1 | Security update for tailscale | 2026-02-10T21:45:05Z | 2026-02-10T21:45:05Z |
| opensuse-su-2026:10172-1 | wicked2nm-1.4.1-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10171-1 | lemon-3.51.2-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10170-1 | keylime-ima-policy-0.2.8+116-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10169-1 | libp11-kit0-0.26.2-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10168-1 | openQA-5.1770718745.ce2072d3-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10167-1 | libxml2-16-2.14.5-3.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10166-1 | libsoup-2_4-1-2.74.3-15.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10165-1 | keylime-config-7.14.0+0-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10164-1 | go1.25-1.25.7-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10163-1 | go1.24-1.24.13-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:20183-1 | Security update for chromium | 2026-02-07T14:42:36Z | 2026-02-07T14:42:36Z |
| opensuse-su-2026:20184-1 | Security update for python-Django | 2026-02-07T13:45:17Z | 2026-02-07T13:45:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:22345 | Red Hat Security Advisory: Red Hat OpenShift Developer Tools - Source-to-Image 1.5.2 | 2025-11-27T22:06:09+00:00 | 2026-05-09T03:01:41+00:00 |
| rhsa-2025:22275 | Red Hat Security Advisory: OpenShift Container Platform 4.13.62 bug fix and security update | 2025-12-05T13:28:34+00:00 | 2026-05-09T03:01:40+00:00 |
| rhsa-2025:22255 | Red Hat Security Advisory: OpenShift Container Platform 4.20.6 packages and security update | 2025-12-02T14:45:43+00:00 | 2026-05-09T03:01:39+00:00 |
| rhsa-2025:22181 | Red Hat Security Advisory: golang security update | 2025-11-26T15:05:54+00:00 | 2026-05-09T03:01:39+00:00 |
| rhsa-2025:21824 | Red Hat Security Advisory: OpenShift Container Platform 4.16.53 bug fix and security update | 2025-11-27T11:08:51+00:00 | 2026-05-09T03:01:39+00:00 |
| rhsa-2025:22012 | Red Hat Security Advisory: buildah security update | 2025-11-25T05:03:24+00:00 | 2026-05-09T03:01:37+00:00 |
| rhsa-2025:22011 | Red Hat Security Advisory: buildah security update | 2025-11-25T05:23:44+00:00 | 2026-05-09T03:01:37+00:00 |
| rhsa-2025:21964 | Red Hat Security Advisory: buildah security update | 2025-11-24T15:01:52+00:00 | 2026-05-09T03:01:37+00:00 |
| rhsa-2025:21856 | Red Hat Security Advisory: golang security update | 2025-11-20T15:48:22+00:00 | 2026-05-09T03:01:37+00:00 |
| rhsa-2025:21816 | Red Hat Security Advisory: delve and golang security update | 2025-11-20T06:24:08+00:00 | 2026-05-09T03:01:36+00:00 |
| rhsa-2025:21815 | Red Hat Security Advisory: delve and golang security update | 2025-11-20T08:45:31+00:00 | 2026-05-09T03:01:35+00:00 |
| rhsa-2025:21795 | Red Hat Security Advisory: OpenShift Container Platform 4.18.29 bug fix and security update | 2025-11-27T04:24:21+00:00 | 2026-05-09T03:01:35+00:00 |
| rhsa-2025:21779 | Red Hat Security Advisory: golang security update | 2025-11-20T00:22:25+00:00 | 2026-05-09T03:01:35+00:00 |
| rhsa-2025:21778 | Red Hat Security Advisory: golang security update | 2025-11-20T00:35:26+00:00 | 2026-05-09T03:01:34+00:00 |
| rhsa-2025:21702 | Red Hat Security Advisory: podman security update | 2025-11-18T15:34:16+00:00 | 2026-05-09T03:01:33+00:00 |
| rhsa-2025:21634 | Red Hat Security Advisory: buildah security update | 2025-11-18T00:31:14+00:00 | 2026-05-09T03:01:32+00:00 |
| rhsa-2025:21633 | Red Hat Security Advisory: buildah security update | 2025-11-18T00:16:49+00:00 | 2026-05-09T03:01:32+00:00 |
| rhsa-2025:21328 | Red Hat Security Advisory: OpenShift Container Platform 4.14.59 packages and security update | 2025-11-20T07:57:21+00:00 | 2026-05-09T03:01:31+00:00 |
| rhsa-2025:21232 | Red Hat Security Advisory: container-tools:rhel8 security update | 2025-11-13T10:51:18+00:00 | 2026-05-09T03:01:30+00:00 |
| rhsa-2025:21220 | Red Hat Security Advisory: podman security update | 2025-11-13T09:10:41+00:00 | 2026-05-09T03:01:30+00:00 |
| rhsa-2025:20957 | Red Hat Security Advisory: runc security update | 2025-11-11T15:07:24+00:00 | 2026-05-09T03:01:29+00:00 |
| rhsa-2025:19927 | Red Hat Security Advisory: runc security update | 2025-11-07T18:11:41+00:00 | 2026-05-09T03:01:28+00:00 |
| rhsa-2026:8322 | Red Hat Security Advisory: rhc security update | 2026-04-15T15:31:17+00:00 | 2026-05-09T02:50:10+00:00 |
| rhsa-2025:9776 | Red Hat Security Advisory: New RHCS 8.1 container image is now available in the Red Hat Ecosystem Catalog. | 2025-06-26T12:12:44+00:00 | 2026-05-09T02:50:10+00:00 |
| rhsa-2025:4240 | Red Hat Security Advisory: Updated 6.1 container image is now available in the Red Hat Ecosystem Catalog. | 2025-04-28T05:29:21+00:00 | 2026-05-09T02:50:08+00:00 |
| rhsa-2025:2449 | Red Hat Security Advisory: OpenShift Container Platform 4.18.4 security update | 2025-03-11T02:08:00+00:00 | 2026-05-09T02:50:07+00:00 |
| rhsa-2025:22684 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.12.6 security update | 2025-12-03T23:53:32+00:00 | 2026-05-09T02:50:06+00:00 |
| rhsa-2025:0832 | Red Hat Security Advisory: OpenShift Container Platform 4.12.72 bug fix and security update | 2025-02-06T00:45:40+00:00 | 2026-05-09T02:50:06+00:00 |
| rhsa-2025:22683 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.7.7 security update | 2025-12-03T22:50:31+00:00 | 2026-05-09T02:50:05+00:00 |
| rhsa-2025:1116 | Red Hat Security Advisory: OpenShift Container Platform 4.13.55 bug fix and security update | 2025-02-13T02:27:35+00:00 | 2026-05-09T02:50:05+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-565386 | SSA-565386: Third-Party Component Vulnerabilities in SCALANCE W-700 IEEE 802.11ax devices before V2.0 | 2023-03-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-539476 | SSA-539476: Siemens SIMATIC NET CP, SINEMA and SCALANCE Products Affected by Vulnerabilities in Third-Party Component strongSwan | 2022-02-08T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-517377 | SSA-517377: Multiple Vulnerabilities in the SRCS VPN Feature in SIMATIC CP Devices | 2022-07-12T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-491245 | SSA-491245: Multiple File Parsing Vulnerabilities in Solid Edge | 2023-02-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-476715 | SSA-476715: Two Vulnerabilities in Automation License Manager | 2023-01-10T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-419740 | SSA-419740: Multiple Third-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 | 2023-03-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-324955 | SSA-324955: SAD DNS Attack in Linux Based Products | 2021-05-11T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-320629 | SSA-320629: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.3 | 2023-03-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-260625 | SSA-260625: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.2 | 2023-03-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-953464 | SSA-953464: Multiple Vulnerabilites in Siemens Brownfield Connectivity - Client before V2.15 | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-836777 | SSA-836777: JT File Parsing Vulnerabilities in JT Open, JT Utilities and Parasolid | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-744259 | SSA-744259: Golang Vulnerabilities in Brownfield Connectivity - Gateway before V1.10.1 | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-658793 | SSA-658793: Command Injection Vulnerability in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-617755 | SSA-617755: Denial of Service Vulnerability in the SNMP Agent of SCALANCE X-200IRT Products | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-568428 | SSA-568428: Weak Key Protection Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2022-11-08T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-565356 | SSA-565356: X_T File Parsing Vulnerabilities in Simcenter Femap before V2023.1 | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-506569 | SSA-506569: Multiple Vulnerabilities in SCALANCE W1750D | 2022-11-08T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-313313 | SSA-313313: Denial of Service Vulnerability in the FTP Server of Nucleus RTOS | 2022-10-11T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-252808 | SSA-252808: XPath Constraint Vulnerability in Mendix Runtime | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-997779 | SSA-997779: File Parsing Vulnerability in Solid Edge before V2023 MP1 | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-936212 | SSA-936212: JT File Parsing Vulnerabilities in JT Open, JT Utilities and Solid Edge | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-547714 | SSA-547714: Argument Injection Vulnerability in SIMATIC WinCC OA Ultralight Client | 2022-12-13T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-496604 | SSA-496604: Cross-Site Scripting Vulnerability in Mendix SAML Module | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-431678 | SSA-431678: Denial of Service Vulnerability in SIMATIC S7 CPU Families | 2020-02-11T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-332410 | SSA-332410: Multiple Vulnerabilities in SINEC INS before V1.0 SP2 Update 1 | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-210822 | SSA-210822: Improper Access Control Vulnerability in Mendix Workflow Commons Module | 2022-12-13T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-951513 | SSA-951513: Clickjacking Vulnerability in SCALANCE S, SCALANCE X-300, X-200IRT, X-200RNA and X-200 Switch Families | 2020-02-11T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-849072 | SSA-849072: Several Vulnerabilities in SICAM PAS before V8.06 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-678983 | SSA-678983: Vulnerabilities in Industrial PCs and CNC devices using Intel CPUs (November 2020) | 2021-05-11T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-638652 | SSA-638652: Authentication Bypass Vulnerability in Mendix SAML Module | 2022-09-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21224-1 | Security update for corosync | 2026-04-10T11:19:52Z | 2026-04-10T11:19:52Z |
| suse-su-2026:1247-1 | Security update for nghttp2 | 2026-04-10T10:34:43Z | 2026-04-10T10:34:43Z |
| suse-su-2026:1248-1 | Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T09:13:03Z | 2026-04-10T09:13:03Z |
| suse-su-2026:21216-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-10T08:14:40Z | 2026-04-10T08:14:40Z |
| suse-su-2026:21020-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-10T08:14:40Z | 2026-04-10T08:14:40Z |
| suse-su-2026:1244-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T08:04:54Z | 2026-04-10T08:04:54Z |
| suse-su-2026:1242-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T07:04:48Z | 2026-04-10T07:04:48Z |
| suse-su-2026:21164-1 | Security update for glibc | 2026-04-10T06:44:31Z | 2026-04-10T06:44:31Z |
| suse-su-2026:21019-1 | Security update for glibc | 2026-04-10T06:44:31Z | 2026-04-10T06:44:31Z |
| suse-su-2026:1239-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T19:04:33Z | 2026-04-09T19:04:33Z |
| suse-su-2026:21157-1 | Security update for MozillaFirefox | 2026-04-09T17:17:04Z | 2026-04-09T17:17:04Z |
| suse-su-2026:1237-1 | Security update for the Linux Kernel (Live Patch 47 for SUSE Linux Enterprise 15 SP4) | 2026-04-09T17:04:59Z | 2026-04-09T17:04:59Z |
| suse-su-2026:21018-1 | Security update for ovmf | 2026-04-09T15:10:40Z | 2026-04-09T15:10:40Z |
| suse-su-2026:21161-1 | Security update for ovmf | 2026-04-09T15:05:01Z | 2026-04-09T15:05:01Z |
| suse-su-2026:21159-1 | Security update for python-gi-docgen | 2026-04-09T14:40:15Z | 2026-04-09T14:40:15Z |
| suse-su-2026:1236-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T14:22:32Z | 2026-04-09T14:22:32Z |
| suse-su-2026:21091-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21090-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21061-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21060-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21089-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21088-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21059-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21058-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21087-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21086-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21057-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21056-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21085-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21084-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:22387 | Moderate: kernel-rt security update | 2025-12-01T00:00:00Z | 2025-12-03T12:01:56Z |
| alsa-2025:22388 | Moderate: kernel security update | 2025-12-01T00:00:00Z | 2025-12-03T11:59:02Z |
| alsa-2025:20928 | Important: ipa security update | 2025-11-11T00:00:00Z | 2025-12-01T08:16:32Z |
| alsa-2025:20954 | Important: sssd security update | 2025-11-11T00:00:00Z | 2025-12-01T08:13:09Z |
| alsa-2025:20958 | Important: tigervnc security update | 2025-11-11T00:00:00Z | 2025-12-01T08:10:34Z |
| alsa-2025:20962 | Important: pcs security update | 2025-11-11T00:00:00Z | 2025-12-01T08:09:09Z |
| alsa-2025:21111 | Important: bind9.18 security update | 2025-11-12T00:00:00Z | 2025-12-01T08:06:30Z |
| alsa-2025:21255 | Moderate: openssl security update | 2025-11-13T00:00:00Z | 2025-12-01T08:04:03Z |
| alsa-2025:21916 | Important: valkey security update | 2025-11-24T00:00:00Z | 2025-12-01T08:02:48Z |
| alsa-2025:21926 | Moderate: kernel security update | 2025-11-24T00:00:00Z | 2025-12-01T08:01:07Z |
| alsa-2025:21968 | Important: gimp security update | 2025-11-24T00:00:00Z | 2025-12-01T07:58:09Z |
| alsa-2025:21974 | Important: mingw-expat security update | 2025-11-24T00:00:00Z | 2025-12-01T07:55:50Z |
| alsa-2025:22063 | Moderate: cups security update | 2025-11-25T00:00:00Z | 2025-11-28T13:48:35Z |
| alsa-2025:22011 | Important: buildah security update | 2025-11-25T00:00:00Z | 2025-11-25T12:06:57Z |
| alsa-2025:21977 | Moderate: libssh security update | 2025-11-24T00:00:00Z | 2025-11-25T12:04:18Z |
| alsa-2025:20983 | Important: podman security update | 2025-11-11T00:00:00Z | 2025-11-25T10:54:40Z |
| alsa-2025:22005 | Moderate: go-rpm-macros security update | 2025-11-25T00:00:00Z | 2025-11-25T10:51:18Z |
| alsa-2025:21220 | Important: podman security update | 2025-11-13T00:00:00Z | 2025-11-25T10:45:01Z |
| alsa-2025:21281 | Important: firefox security update | 2025-11-13T00:00:00Z | 2025-11-25T09:59:17Z |
| alsa-2025:21248 | Moderate: openssl security update | 2025-11-13T00:00:00Z | 2025-11-25T09:31:36Z |
| alsa-2025:21881 | Important: thunderbird security update | 2025-11-20T00:00:00Z | 2025-11-25T09:29:54Z |
| alsa-2025:21917 | Moderate: kernel security update | 2025-11-24T00:00:00Z | 2025-11-25T09:27:51Z |
| alsa-2025:21920 | Moderate: kernel-rt security update | 2025-11-24T00:00:00Z | 2025-11-25T09:25:12Z |
| alsa-2025:21142 | Important: python-kdcproxy security update | 2025-11-12T00:00:00Z | 2025-11-24T12:51:27Z |
| alsa-2025:21691 | Important: haproxy security update | 2025-11-18T00:00:00Z | 2025-11-24T12:50:19Z |
| alsa-2025:21816 | Moderate: delve and golang security update | 2025-11-20T00:00:00Z | 2025-11-24T12:49:17Z |
| alsa-2025:21280 | Important: firefox security update | 2025-11-13T00:00:00Z | 2025-11-24T12:36:14Z |
| alsa-2025:20909 | Important: podman security update | 2025-11-11T00:00:00Z | 2025-11-24T12:26:34Z |
| alsa-2025:20095 | Moderate: kernel security update | 2025-11-11T00:00:00Z | 2025-11-24T10:55:21Z |
| alsa-2025:20126 | Moderate: openssh security update | 2025-11-11T00:00:00Z | 2025-11-24T10:51:19Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-1310 | Use-of-uninitialized-value in decompress_yuv.cc | 2024-11-15T00:03:32.569897Z | 2024-11-15T00:03:32.570195Z |
| osv-2022-1248 | Object-size in wabt::BinaryReaderIR::OnCodeMetadataCount | 2022-12-08T13:00:53.255456Z | 2024-11-09T14:06:27.702972Z |
| osv-2024-1297 | Heap-buffer-overflow in rijndaelSetupEncrypt | 2024-11-09T00:13:03.370689Z | 2024-11-09T00:13:03.371200Z |
| osv-2024-1293 | Use-of-uninitialized-value in k5_hashtab_add | 2024-11-08T00:16:09.025852Z | 2024-11-08T00:16:09.026399Z |
| osv-2024-1244 | Heap-buffer-overflow in extract_fmtp | 2024-10-27T00:10:45.337287Z | 2024-11-06T14:24:14.483448Z |
| osv-2024-1282 | Segv on unknown address in udiv | 2024-11-05T00:16:47.572692Z | 2024-11-05T00:16:47.573042Z |
| osv-2024-1279 | Heap-buffer-overflow in opj_j2k_read_tile_header | 2024-11-05T00:12:57.052133Z | 2024-11-05T00:12:57.052585Z |
| osv-2022-859 | UNKNOWN READ in write_key | 2022-09-08T00:00:41.893865Z | 2024-11-03T14:10:16.487872Z |
| osv-2024-1266 | UNKNOWN READ in llama_output_reserve | 2024-11-03T00:14:31.568857Z | 2024-11-03T00:14:31.569247Z |
| osv-2024-1261 | Stack-buffer-overflow in _pcre2_compile_class_not_nested_16 | 2024-11-02T00:11:51.445365Z | 2024-11-02T00:11:51.445768Z |
| osv-2024-1253 | Segv on unknown address in llama_output_reserve | 2024-11-01T00:03:18.217276Z | 2024-11-01T00:03:18.217677Z |
| osv-2023-1398 | Heap-buffer-overflow in load_1 | 2024-11-01T00:02:38.719507Z | 2024-11-01T00:02:38.719949Z |
| osv-2024-1239 | Heap-buffer-overflow in convsamp | 2024-10-24T00:06:22.931512Z | 2024-10-25T14:18:35.097668Z |
| osv-2024-1241 | Heap-buffer-overflow in polygonToCellsExperimental | 2024-10-25T00:13:57.330581Z | 2024-10-25T00:13:57.331154Z |
| osv-2024-1237 | Use-of-uninitialized-value in jit_compile | 2024-10-22T00:13:19.495791Z | 2024-10-22T00:13:19.496460Z |
| osv-2024-1232 | Segv on unknown address in cranelift_filetests::function_runner::Trampoline::call::hb2e77cf3a13ebaf4 | 2024-10-19T00:15:15.010866Z | 2024-10-19T00:15:15.011237Z |
| osv-2024-1212 | Heap-buffer-overflow in cram_encode_container | 2024-10-11T00:16:27.350249Z | 2024-10-11T00:16:27.350643Z |
| osv-2024-1203 | Global-buffer-overflow in AnnouncePunctuation | 2024-10-11T00:02:53.598773Z | 2024-10-11T00:02:53.599146Z |
| osv-2024-1201 | Heap-buffer-overflow in polygonToCellsExperimental | 2024-10-11T00:02:38.496890Z | 2024-10-11T00:02:38.497374Z |
| osv-2024-1181 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-10-06T00:14:54.118103Z | 2024-10-06T00:14:54.118486Z |
| osv-2024-1179 | UNKNOWN READ in __dynamic_cast | 2024-10-06T00:01:54.176437Z | 2024-10-06T00:01:54.177068Z |
| osv-2024-1175 | Use-of-uninitialized-value in mark_context | 2024-10-04T00:14:55.661266Z | 2024-10-04T00:14:55.661697Z |
| osv-2022-955 | Use-of-uninitialized-value in FileWrite | 2022-09-26T00:00:25.284903Z | 2024-10-02T23:55:28.115739Z |
| osv-2022-486 | Heap-buffer-overflow in frame_get_vlmetalayers | 2022-06-17T00:00:08.687092Z | 2024-10-02T14:11:20.344165Z |
| osv-2024-1161 | Security exception in java.base/java.util.Arrays.copyOfRange | 2024-10-01T00:13:59.667902Z | 2024-10-01T00:13:59.668243Z |
| osv-2024-1159 | Use-of-uninitialized-value in decompress_yuv.cc | 2024-09-30T00:15:17.123309Z | 2024-09-30T00:15:17.123644Z |
| osv-2024-1158 | Use-of-uninitialized-value in format_message | 2024-09-30T00:06:39.149467Z | 2024-09-30T00:06:39.149753Z |
| osv-2024-1150 | Heap-buffer-overflow in extract_mr_data | 2024-09-29T00:02:55.188981Z | 2024-09-29T00:02:55.189369Z |
| osv-2024-1149 | Use-of-uninitialized-value in ultrahdr::uhdr_gainmap_metadata_frac::encodeGainmapMetadata | 2024-09-29T00:02:09.713795Z | 2024-09-29T00:02:09.714134Z |
| osv-2024-1145 | Heap-buffer-overflow in ultrahdr::getYuv444Pixel | 2024-09-26T00:02:03.373431Z | 2024-09-26T00:02:03.374156Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2021-0120 | abomonation transmutes &T to and from &[u8] without sufficient constraints | 2021-10-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0119 | Out-of-bounds write in nix::unistd::getgrouplist | 2021-09-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0118 | `FixedSizeBinaryArray` does not perform bound checks on accessing values and offsets | 2021-09-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0117 | `DecimalArray` does not perform bound checks on accessing values and offsets | 2021-09-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0116 | `BinaryArray` does not perform bound checks on reading values and offsets | 2021-09-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0115 | `#[zeroize(drop)]` doesn't implement `Drop` for `enum`s | 2021-09-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0114 | Aliased mutable references from `tls_rand` & `TlsWyRand` | 2021-09-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0113 | AtomicBucket<T> unconditionally implements Send/Sync | 2021-04-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0112 | `Read` on uninitialized buffer may cause UB ('tectonic_xdv' crate) | 2021-02-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0111 | Memory Safety Issue when using `patch` or `merge` on `state` and assign the result back to `state` | 2021-09-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0110 | Multiple Vulnerabilities in Wasmtime | 2021-09-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0109 | Process crashes when the cell used as DepGroup is not alive | 2021-07-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0108 | Remote memory exhaustion in ckb | 2021-07-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0107 | Miner fails to get block template when a cell used as a cell dep has been destroyed. | 2021-07-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0103 | Partial read is incorrect in molecule | 2021-07-30T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0100 | Miscomputed results when using AVX2 backend | 2021-09-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0098 | Read buffer overruns processing ASN.1 strings | 2021-08-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0097 | SM2 Decryption Buffer Overflow | 2021-08-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0095 | `mopa` is technically unsound | 2021-06-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0094 | Window can read out of bounds if Read instance returns more bytes than buffer size | 2021-02-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0092 | Deserialization functions pass uninitialized memory to user-provided Read | 2021-01-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0091 | Reading on uninitialized buffer may cause UB ( `gfx_auxil::read_spirv()` ) | 2021-01-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0090 | Reading on uninitialized memory may cause UB ( `util::read_spv()` ) | 2021-01-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0089 | Optional `Deserialize` implementations lacking validation | 2021-01-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0088 | `Read` on uninitialized memory may cause UB (fn preamble_skipcount()) | 2021-01-05T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0086 | `Read` on uninitialized buffer may cause UB ( `read_entry()` ) | 2021-01-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0085 | 'Read' on uninitialized memory may cause UB | 2021-01-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0084 | `Read` on uninitialized buffer can cause UB (impl of `ReadKVExt`) | 2021-01-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0083 | QueryInterface should call AddRef before returning pointer | 2021-01-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0081 | Potential request smuggling capabilities due to lack of input validation | 2021-06-16T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-nifi-2024-45477 | Apache NiFi: Improper Neutralization of Input in Parameter Description | 2026-04-13T14:17:18.796Z | 2026-04-13T14:44:23.860Z |
| bit-wiremock-2023-50069 | 2026-04-13T11:50:15.583Z | 2026-04-13T12:09:46.643Z | |
| bit-tomcat-2026-34500 | Apache Tomcat: OCSP checks sometimes soft-fail with FFM even when soft-fail is disabled | 2026-04-13T10:20:02.205Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-34487 | Apache Tomcat: Cloud membership for clustering component exposed the Kubernetes bearer token | 2026-04-13T10:20:00.791Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-34483 | Apache Tomcat: Incomplete escaping of JSON access logs | 2026-04-13T10:19:58.030Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-29145 | Apache Tomcat, Apache Tomcat Native: OCSP checks sometimes soft-fail even when soft-fail is disabled | 2026-04-13T10:19:53.698Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-25854 | Apache Tomcat: Occasionally open redirect | 2026-04-13T10:19:50.972Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-24880 | Apache Tomcat: Request smuggling via invalid chunk extension | 2026-04-13T10:19:49.629Z | 2026-04-13T10:42:00.723Z |
| bit-mongodb-2026-4148 | ExpressionContext use-after-free in classic engine $lookup and $graphLookup aggregation operators | 2026-04-13T10:13:07.402Z | 2026-04-13T10:42:00.723Z |
| bit-mongodb-2026-4147 | Stack memory disclosure in filemd5 command | 2026-04-13T10:13:04.983Z | 2026-04-13T10:42:00.723Z |
| bit-minio-2026-39414 | MinIO affected a DoS via Unbounded Memory Allocation in S3 Select CSV Parsing | 2026-04-13T10:10:51.384Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-34486 | Apache Tomcat: Fix for CVE-2026-29146 allowed bypass of EncryptInterceptor | 2026-04-13T05:53:08.595Z | 2026-04-13T06:11:47.324Z |
| bit-tomcat-2026-32990 | Apache Tomcat: Fix for CVE-2025-66614 is incomplete | 2026-04-13T05:53:05.369Z | 2026-04-13T06:11:47.324Z |
| bit-tomcat-2026-29129 | Apache Tomcat: TLS cipher order is not preserved | 2026-04-13T05:53:00.617Z | 2026-04-13T06:11:47.324Z |
| bit-tomcat-2026-24734 | Apache Tomcat Native, Apache Tomcat: OCSP revocation bypass | 2026-02-20T09:53:00.269Z | 2026-04-13T06:11:47.324Z |
| bit-node-2026-21717 | 2026-04-06T07:58:47.295Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21716 | 2026-04-06T07:58:44.008Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21715 | 2026-04-06T07:58:41.424Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21714 | 2026-04-06T07:58:38.953Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21713 | 2026-04-06T07:58:36.353Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21710 | 2026-04-06T07:58:28.068Z | 2026-04-13T06:11:47.324Z | |
| bit-kibana-2026-4498 | Execution with Unnecessary Privileges in Kibana Leading to reading index data beyond their direct Elasticsearch RBAC scope | 2026-04-13T05:42:05.042Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33460 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:42:01.870Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33459 | Uncontrolled Resource Consumption in Kibana Leading to Denial of Service | 2026-04-13T05:42:00.230Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35206 | Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment | 2026-04-13T05:40:36.770Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35205 | Helm's plugin verification fails open when .prov is missing, allowing unsigned plugin install | 2026-04-13T05:40:35.063Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35204 | Helm has a path traversal in plugin metadata version enables arbitrary file write outside Helm plugin directory | 2026-04-13T05:40:33.104Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32280 | Unexpected work during chain building in crypto/x509 | 2026-04-13T05:43:38.849Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-4916 | Missing Authorization in GitLab | 2026-04-13T06:10:14.681Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-4332 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-04-13T06:10:11.039Z | 2026-04-13T06:11:47.324Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-pk92575 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T14:35:52.456913Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk69606 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:08:25.435888Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk62208 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:20:55.127319Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pi00621 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:52.974587Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ph90623 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:49:52.682724Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pg91940 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:31:24.365282Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pd99018 | Within HostnameError | 2026-01-30T14:02:50.913977Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pd17156 | Cancelling a query (e | 2026-01-30T15:00:22.872625Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pc16040 | Within HostnameError | 2026-01-30T15:37:23.991168Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pb78859 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T17:25:56.763674Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pa85871 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:42:24.099846Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-os18490 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T16:58:26.304466Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oo42606 | Cancelling a query (e | 2026-01-30T15:00:52.876848Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oo14630 | tar | 2026-01-30T14:47:23.043882Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-on55906 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:26:25.467484Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-on38469 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:37:25.667594Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ol60454 | Within HostnameError | 2026-01-30T14:52:23.086717Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ol25917 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:44:22.881508Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ok45738 | Within HostnameError | 2026-01-30T15:45:53.967263Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oj41940 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:13:53.428815Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oj15484 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:37:55.388839Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oi08379 | Cancelling a query (e | 2026-01-30T15:32:54.729863Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oh86281 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:52:25.054249Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oa33370 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:57:24.977544Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nz19387 | Within HostnameError | 2026-01-30T14:52:23.218213Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nv82543 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:29:25.549030Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nv34418 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:04:54.566695Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nv07964 | Cancelling a query (e | 2026-01-30T15:33:23.809279Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ns41924 | Within HostnameError | 2026-01-30T15:18:53.115636Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nr68832 | libexpat in Expat before 2 | 2026-01-30T16:22:25.447471Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2005-ALE-018 | Vulnérabilité du navigateur Firefox | 2005-12-08T00:00:00.000000 | 2005-12-08T00:00:00.000000 |
| certa-2005-ale-016 | Vulnérabilité de Microsoft Windows RPC | 2005-11-18T00:00:00.000000 | 2005-11-18T00:00:00.000000 |
| CERTA-2005-ALE-016 | Vulnérabilité de Microsoft Windows RPC | 2005-11-18T00:00:00.000000 | 2005-11-18T00:00:00.000000 |
| certa-2005-ale-014 | Vulnérabilité d'un grand nombre d'antivirus | 2005-10-11T00:00:00.000000 | 2005-10-11T00:00:00.000000 |
| CERTA-2005-ALE-014 | Vulnérabilité d'un grand nombre d'antivirus | 2005-10-11T00:00:00.000000 | 2005-10-11T00:00:00.000000 |
| certa-2005-ale-011 | Vulnérabilité de HelixPlayer et RealPlayer | 2005-09-27T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| CERTA-2005-ALE-011 | Vulnérabilité de HelixPlayer et RealPlayer | 2005-09-27T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| certa-2005-ale-010 | Vulnérabilité dans Qpopper | 2005-09-27T00:00:00.000000 | 2005-09-27T00:00:00.000000 |
| CERTA-2005-ALE-010 | Vulnérabilité dans Qpopper | 2005-09-27T00:00:00.000000 | 2005-09-27T00:00:00.000000 |
| certa-2005-ale-009 | Vulnérabilité dans Mozilla Thunderbird | 2005-09-23T00:00:00.000000 | 2005-09-23T00:00:00.000000 |
| CERTA-2005-ALE-009 | Vulnérabilité dans Mozilla Thunderbird | 2005-09-23T00:00:00.000000 | 2005-09-23T00:00:00.000000 |
| certa-2005-ale-007 | Exploitation de la faille MS05-039 | 2005-08-16T00:00:00.000000 | 2005-08-16T00:00:00.000000 |
| CERTA-2005-ALE-007 | Exploitation de la faille MS05-039 | 2005-08-16T00:00:00.000000 | 2005-08-16T00:00:00.000000 |
| certa-2005-ale-006 | Vulnérabilité du protocole RDP de Microsoft | 2005-07-18T00:00:00.000000 | 2005-08-10T00:00:00.000000 |
| CERTA-2005-ALE-006 | Vulnérabilité du protocole RDP de Microsoft | 2005-07-18T00:00:00.000000 | 2005-08-10T00:00:00.000000 |
| certa-2005-ale-005 | Vulnérabilité d'Internet Explorer | 2005-07-02T00:00:00.000000 | 2005-07-13T00:00:00.000000 |
| CERTA-2005-ALE-005 | Vulnérabilité d'Internet Explorer | 2005-07-02T00:00:00.000000 | 2005-07-13T00:00:00.000000 |
| certa-2005-ale-004 | Propagation du ver MYTOB | 2005-06-03T00:00:00.000000 | 2005-06-03T00:00:00.000000 |
| CERTA-2005-ALE-004 | Propagation du ver MYTOB | 2005-06-03T00:00:00.000000 | 2005-06-03T00:00:00.000000 |
| certa-2005-ale-003 | Multiples vulnérabilités de Firefox | 2005-05-09T00:00:00.000000 | 2005-05-12T00:00:00.000000 |
| CERTA-2005-ALE-003 | Multiples vulnérabilités de Firefox | 2005-05-09T00:00:00.000000 | 2005-05-12T00:00:00.000000 |
| certa-2005-ale-002 | Exploitation d'une vulnérabilité dans Oracle Database Server | 2005-04-28T00:00:00.000000 | 2005-04-28T00:00:00.000000 |
| CERTA-2005-ALE-002 | Exploitation d'une vulnérabilité dans Oracle Database Server | 2005-04-28T00:00:00.000000 | 2005-04-28T00:00:00.000000 |
| certa-2005-ale-001 | Vulnérabilité d'Internet Explorer | 2005-01-03T00:00:00.000000 | 2005-01-11T00:00:00.000000 |
| CERTA-2005-ALE-001 | Vulnérabilité d'Internet Explorer | 2005-01-03T00:00:00.000000 | 2005-01-11T00:00:00.000000 |
| certa-2004-ale-014 | Exploitation massive d'une faille du forum phpBB | 2004-12-22T00:00:00.000000 | 2004-12-22T00:00:00.000000 |
| CERTA-2004-ALE-014 | Exploitation massive d'une faille du forum phpBB | 2004-12-22T00:00:00.000000 | 2004-12-22T00:00:00.000000 |
| certa-2004-ale-013 | Vulnérabilité dans le composant ActiveX DHTML Edit d'Internet Explorer | 2004-12-20T00:00:00.000000 | 2004-12-20T00:00:00.000000 |
| CERTA-2004-ALE-013 | Vulnérabilité dans le composant ActiveX DHTML Edit d'Internet Explorer | 2004-12-20T00:00:00.000000 | 2004-12-20T00:00:00.000000 |
| certa-2004-ale-012 | Vulnérabilité d'Internet Explorer | 2004-11-09T00:00:00.000000 | 2004-12-02T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-1122 | Multiples vulnérabilités dans Mattermost Server | 2025-12-18T00:00:00.000000 | 2026-01-16T00:00:00.000000 |
| certfr-2026-avi-0051 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0050 | Multiples vulnérabilités dans les produits Juniper Networks | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0049 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0048 | Multiples vulnérabilités dans Wireshark | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0047 | Vulnérabilité dans F5 NGINX Ingress Controller | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0038 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-14T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| CERTFR-2026-AVI-0051 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| CERTFR-2026-AVI-0050 | Multiples vulnérabilités dans les produits Juniper Networks | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| CERTFR-2026-AVI-0049 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| CERTFR-2026-AVI-0048 | Multiples vulnérabilités dans Wireshark | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| CERTFR-2026-AVI-0047 | Vulnérabilité dans F5 NGINX Ingress Controller | 2026-01-15T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| CERTFR-2026-AVI-0038 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-14T00:00:00.000000 | 2026-01-15T00:00:00.000000 |
| certfr-2026-avi-0046 | Multiples vulnérabilités dans les produits Microsoft | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0045 | Multiples vulnérabilités dans Microsoft Azure | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0044 | Multiples vulnérabilités dans Microsoft Windows | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0043 | Multiples vulnérabilités dans Microsoft Office | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0042 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0041 | Multiples vulnérabilités dans les produits Elastic | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0040 | Multiples vulnérabilités dans Google Chrome | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0039 | Multiples vulnérabilités dans Node.js | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0037 | Multiples vulnérabilités dans Typo3 | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0036 | Multiples vulnérabilités dans Suricata | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0035 | Multiples vulnérabilités dans les produits Fortinet | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0034 | Multiples vulnérabilités dans les produits SAP | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0033 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0032 | Multiples vulnérabilités dans les produits Siemens | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0031 | Vulnérabilité dans le greffon VSCode pour Spring CLI | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0046 | Multiples vulnérabilités dans les produits Microsoft | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0045 | Multiples vulnérabilités dans Microsoft Azure | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-000107 | EC-CUBE 3 series and 4 series vulnerable to arbitrary code execution | 2023-11-07T13:47+09:00 | 2024-05-09T17:17+09:00 |
| jvndb-2024-000043 | Multiple vulnerabilities in MosP kintai kanri | 2024-05-09T14:10+09:00 | 2024-05-09T14:10+09:00 |
| jvndb-2023-000111 | Remarshal unlimitedly expanding YAML alias nodes | 2023-11-10T14:41+09:00 | 2024-05-08T17:53+09:00 |
| jvndb-2024-000044 | WordPress Plugin "Heateor Social Login WordPress" vulnerable to cross-site scripting | 2024-05-08T13:43+09:00 | 2024-05-08T13:43+09:00 |
| jvndb-2024-003178 | Trend Micro Maximum Security vulnerable to improper link resolution (CVE-2024-32849) | 2024-05-08T10:19+09:00 | 2024-05-08T10:19+09:00 |
| jvndb-2023-002725 | Multiple vulnerabilities in Command Center RX (CCRX) of Kyocera Document Solutions MFPs and printers | 2023-07-28T18:24+09:00 | 2024-05-07T18:15+09:00 |
| jvndb-2023-000108 | Inkdrop vulnerable to code injection | 2023-10-30T13:48+09:00 | 2024-05-07T16:09+09:00 |
| jvndb-2023-000106 | Multiple vulnerabilities in baserCMS | 2023-10-27T14:46+09:00 | 2024-05-07T15:59+09:00 |
| jvndb-2023-000109 | Cybozu Remote Service vulnerable to uncontrolled resource consumption | 2023-10-31T13:43+09:00 | 2024-05-07T15:51+09:00 |
| jvndb-2023-004919 | FUJIFILM Business Innovation Corp. and Xerox Corporation MFPs export Address Books with insufficient encryption strength | 2023-11-02T17:21+09:00 | 2024-05-07T15:25+09:00 |
| jvndb-2023-000114 | Multiple vulnerabilities in Cisco Firepower Management Center Software | 2023-11-13T14:01+09:00 | 2024-05-07T15:07+09:00 |
| jvndb-2023-000060 | Multiple vulnerabilities in Pleasanter | 2023-06-22T15:49+09:00 | 2024-05-07T14:10+09:00 |
| jvndb-2023-000110 | Improper restriction of XML external entity references (XXE) in e-Tax software | 2023-11-02T13:38+09:00 | 2024-05-01T18:41+09:00 |
| jvndb-2023-007152 | Multiple vulnerabilities in EXPRESSCLUSTER X | 2023-11-20T14:09+09:00 | 2024-05-01T18:10+09:00 |
| jvndb-2023-000113 | HOTELDRUID vulnerable to cross-site scripting | 2023-11-10T14:41+09:00 | 2024-05-01T17:47+09:00 |
| jvndb-2023-000115 | OSS Calendar vulnerable to SQL injection | 2023-11-14T14:05+09:00 | 2024-05-01T17:38+09:00 |
| jvndb-2023-000118 | Multiple vulnerabilities in CubeCart | 2023-11-17T14:22+09:00 | 2024-04-30T18:15+09:00 |
| jvndb-2023-000068 | "NewsPicks" App uses a hard-coded API key for an external service | 2023-06-30T15:06+09:00 | 2024-04-30T18:09+09:00 |
| jvndb-2023-006578 | ASUSTeK COMPUTER RT-AC87U vulnerable to improper access control | 2023-11-15T17:44+09:00 | 2024-04-30T18:08+09:00 |
| jvndb-2023-000064 | SYNCK GRAPHICA Mailform Pro CGI vulnerable to Regular expression Denial-of-Service (ReDoS) | 2023-06-20T14:48+09:00 | 2024-04-26T18:03+09:00 |
| jvndb-2023-000067 | WordPress Plugin "Snow Monkey Forms" vulnerable to directory traversal | 2023-06-27T17:05+09:00 | 2024-04-26T17:56+09:00 |
| jvndb-2023-000033 | Trend Micro Security may insecurely load Dynamic Link Libraries | 2023-04-14T15:44+09:00 | 2024-04-26T17:48+09:00 |
| jvndb-2023-006588 | Multiple vulnerabilities in ELECOM and LOGITEC routers | 2023-11-15T18:27+09:00 | 2024-04-26T15:22+09:00 |
| jvndb-2023-002511 | File and Directory Permissions Vulnerability in Hitachi Command Suite | 2023-07-19T14:48+09:00 | 2024-04-26T12:29+09:00 |
| jvndb-2023-002512 | EL Injection Vulnerability in Hitachi Replication Manager | 2023-07-19T14:48+09:00 | 2024-04-26T12:24+09:00 |
| jvndb-2024-003119 | NETGEAR routers vulnerable to buffer overflow | 2024-04-25T11:21+09:00 | 2024-04-25T11:21+09:00 |
| jvndb-2024-000042 | Multiple vulnerabilities in RoamWiFi R10 | 2024-04-24T13:44+09:00 | 2024-04-24T13:44+09:00 |
| jvndb-2024-003008 | Sangoma Technologies CG/MG family driver cg6kwin2k.sys vulnerable to insufficient access control on its IOCTL | 2024-03-22T13:50+09:00 | 2024-04-24T11:45+09:00 |
| jvndb-2023-003028 | Phoenix Technologies Windows kernel driver vulnerable to insufficient access control on its IOCTL | 2023-08-30T10:05+09:00 | 2024-04-24T11:43+09:00 |
| jvndb-2024-003116 | Multiple vulnerabilities in OMRON Sysmac Studio/CX-One and CX-Programmer | 2024-04-24T10:13+09:00 | 2024-04-24T10:13+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15387 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15387) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15386 | 多款Mozilla产品代码执行漏洞(CNVD-2026-15386) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15385 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15385) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15384 | 多款Mozilla产品整数溢出漏洞(CNVD-2026-15384) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15383 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15383) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15381 | Huawei HarmonyOS cellular_data模块权限控制漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15380 | Huawei HarmonyOS证书管理模块路径遍历漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15379 | Huawei HarmonyOS维测模块条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15378 | Huawei HarmonyOS蓝牙字符越界读漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15377 | Huawei HarmonyOS权限管理服务条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15376 | Huawei HarmonyOS安全控件条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15375 | Huawei HarmonyOS扫描模块访问未初始化指针漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15252 | ZTE ZXMP M721私钥泄露漏洞 | 2025-10-31 | 2026-03-27 |
| cnvd-2026-15170 | Adobe Commerce授权问题漏洞(CNVD-2026-15170) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15169 | Adobe Commerce授权问题漏洞(CNVD-2026-15169) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15168 | Adobe Commerce授权问题漏洞(CNVD-2026-15168) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15159 | Apache Airflow信息泄露漏洞(CNVD-2026-15159) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15158 | Apache Airflow信息泄露漏洞(CNVD-2026-15158) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15157 | Apache Airflow安全绕过漏洞(CNVD-2026-15157) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15156 | Apache Airflow信息泄露漏洞(CNVD-2026-15156) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15154 | HCL AION安全绕过漏洞 | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15153 | HCL AION存在未明漏洞(CNVD-2026-15153) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15152 | OpenClaw拒绝服务漏洞(CNVD-2026-15152) | 2026-03-26 | 2026-03-27 |
| cnvd-2026-15151 | HCL AION存在未明漏洞(CNVD-2026-15151) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15150 | HCL AION存在未明漏洞(CNVD-2026-15150) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15149 | HCL AION存在未明漏洞(CNVD-2026-15149) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15148 | HCL AION存在未明漏洞(CNVD-2026-15148) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15147 | HCL AION存在未明漏洞(CNVD-2026-15147) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15146 | HCL AION SQL注入漏洞(CNVD-2026-15146) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15145 | HCL AION信息泄露漏洞(CNVD-2026-15145) | 2026-03-19 | 2026-03-27 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-10957 | Уязвимость функции mod_hdcp_hdcp1_enable_encryption() ядра операционной системы Linux , п… | 11.09.2025 | 16.02.2026 |
| bdu:2025-10956 | Уязвимость функции tegra_crtc_reset() ядра операционной системы Linux, позволяющая наруши… | 11.09.2025 | 16.02.2026 |
| bdu:2025-10955 | Уязвимость компонента net ядра операционной системы Linux, позволяющая нарушителю вызвать… | 11.09.2025 | 16.02.2026 |
| bdu:2025-10954 | Уязвимость компонента i2c ядра операционной системы Linux, позволяющая нарушителю вызвать… | 11.09.2025 | 16.02.2026 |
| bdu:2025-10953 | Уязвимость функции ims_pcu_flash_firmware ядра операционной системы Linux, позволяющая на… | 11.09.2025 | 16.02.2026 |
| bdu:2025-10952 | Уязвимость функции nfsd4_spo_must_allow() ядра операционной системы Linux, позволяющая на… | 11.09.2025 | 16.02.2026 |
| bdu:2025-10931 | Уязвимость функции SRBRoot::addTag() библиотеки для работы с Unicode (ICU), позволяющая н… | 10.09.2025 | 16.02.2026 |
| bdu:2025-10930 | Уязвимость функции bytes.decode() интерпретатора языка программирования Python (CPython),… | 10.09.2025 | 16.02.2026 |
| bdu:2025-10925 | Уязвимость функции debug_type_samep() компонента objdump программного средства разработки… | 10.09.2025 | 16.02.2026 |
| bdu:2025-10924 | Уязвимость функции elf_gc_sweep() компонента ld программного средства разработки GNU Binu… | 10.09.2025 | 16.02.2026 |
| bdu:2025-10923 | Уязвимость функции display_info() компонента objdump программного средства разработки GNU… | 10.09.2025 | 16.02.2026 |
| bdu:2025-10907 | Уязвимость функции g_date_time_new_from_iso8601() библиотеки Glib, позволяющая нарушителю… | 10.09.2025 | 16.02.2026 |
| bdu:2025-10870 | Уязвимость функции handle_posix_cpu_timers ядра операционной системы Linux, позволяющая н… | 08.09.2025 | 16.02.2026 |
| bdu:2025-10805 | Уязвимость функции crypt_message() в модуле fs/smb/client/smb2ops.c поддержки клиента SMB… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10804 | Уязвимость функции do_insn_ioctl() компонента comedi ядра операционной системы Linux, поз… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10802 | Уязвимость функции netif_napi_del() ядра операционной системы Linux, позволяющая нарушите… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10801 | Уязвимость компонента ACPICA ядра операционной системы Linux, позволяющая нарушителю вызв… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10800 | Уязвимость компонента displayport ядра операционной системы Linux, позволяющая нарушителю… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10799 | Уязвимость функции pnfs_update_layout ядра операционной системы Linux, позволяющая наруши… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10798 | Уязвимость функции l2cap_sock_resume_cb() компонента Bluetooth ядра операционной системы … | 05.09.2025 | 16.02.2026 |
| bdu:2025-10797 | Уязвимость функции __nf_conntrack_find_get() компонента Netfilter ядра операционной систе… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10796 | Уязвимость функции tls_strp_check_rcv() реализации протокола TLS ядра операционной систем… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10795 | Уязвимость функции unregister_vlan_dev() компонента 8021q Module ядра операционной систем… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10794 | Уязвимость функции obj_event() ядра операционной системы Linux, позволяющая нарушителю вы… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10792 | Уязвимость функции vmci_transport_packet() ядра операционной системы Linux, позволяющая н… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10791 | Уязвимость функции nfs_fs_proc_net_init() файловой системы NFS ядра операционной системы … | 05.09.2025 | 16.02.2026 |
| bdu:2025-10789 | Уязвимость функции core_scsi3_decode_spec_i_port() компонента bnxt_re ядра операционной с… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10787 | Уязвимость функции anon_inode_make_secure_inode() ядра операционной системы Linux, позвол… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10784 | Уязвимость функции nf_set_pipapo_avx2 ядра операционной системы Linux, позволяющая наруши… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10783 | Уязвимость функции ets_qdisc_change() компонента net_sched ядра операционной системы Linu… | 05.09.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202006-1832 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2024-07-23T21:03:26.090000Z |
| var-201801-1712 | Systems with microprocessors utilizing speculative execution and branch prediction may al… | 2024-07-23T21:03:25.229000Z |
| var-201302-0404 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 U… | 2024-07-23T21:03:25.858000Z |
| var-202201-0104 | In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtt… | 2024-07-23T21:03:24.853000Z |
| var-201108-0145 | Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before … | 2024-07-23T21:03:24.463000Z |
| var-201904-1403 | The issue was addressed by removing origin information. This issue affected versions prio… | 2024-07-23T21:03:18.489000Z |
| var-200703-0023 | Integer overflow in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 allows remote user-assi… | 2024-07-23T21:03:17.231000Z |
| var-201112-0047 | The Cascading Style Sheets (CSS) implementation in Google Chrome before 16.0.912.63 on 64… | 2024-07-23T21:03:15.583000Z |
| var-201210-0132 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:03:14.420000Z |
| var-200512-0749 | The khtml::RenderTableSection::ensureRows function in KHTMLParser in Apple Mac OS X 10.4.… | 2024-07-23T21:03:14.261000Z |
| var-201906-1174 | Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. T… | 2024-07-23T21:03:12.658000Z |
| var-200904-0798 | The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.1… | 2024-07-23T21:03:08.190000Z |
| var-202201-0304 | A logic issue was addressed with improved state management. This issue is fixed in iOS 15… | 2024-07-23T21:03:06.170000Z |
| var-201107-0023 | WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrar… | 2024-07-23T21:03:05.834000Z |
| var-202103-1001 | An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G… | 2024-07-23T21:02:01.229000Z |
| var-201206-0059 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:01:58.493000Z |
| var-202008-0248 | An elevation of privilege vulnerability exists when an attacker establishes a vulnerable … | 2024-07-23T21:01:54.969000Z |
| var-201910-1646 | By design, BIND is intended to limit the number of TCP clients that can be connected at a… | 2024-07-23T21:01:53.208000Z |
| var-201811-0987 | nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, whic… | 2024-07-23T21:01:53.545000Z |
| var-201306-0225 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:01:21.795000Z |
| var-201205-0393 | Multiple stack-based buffer overflows in Apple QuickTime before 7.7.2 on Windows allow re… | 2024-07-23T21:01:21.160000Z |
| var-201204-0092 | Google Chrome before 18.0.1025.151 allows remote attackers to bypass the Same Origin Poli… | 2024-07-23T21:01:20.651000Z |
| var-201302-0306 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2024-07-23T21:01:18.595000Z |
| var-200712-0594 | Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Se… | 2024-07-23T21:01:17.067000Z |
| var-201512-0485 | ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2… | 2024-07-23T21:00:45.295000Z |
| var-200810-0143 | Buffer overflow in PSNormalizer in Mac OS X 10.4.11 and 10.5.5 allows remote attackers to… | 2024-07-23T21:00:45.115000Z |
| var-200809-0195 | Cross-site scripting (XSS) vulnerability in Wiki Server in Apple Mac OS X 10.5 through 10… | 2024-07-23T21:00:44.978000Z |
| var-202003-1786 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:00:14.087000Z |
| var-200609-0703 | The Installer application in Apple Mac OS X 10.4.8 and earlier, when used by a user with … | 2024-07-23T21:00:06.153000Z |
| var-201711-0473 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T20:59:26.236000Z |