Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43083 |
9.1 (3.1)
|
net: ioam6: fix OOB and missing lock |
Linux |
Linux |
2026-05-06T07:40:18.504Z | 2026-05-08T12:40:26.791Z |
| CVE-2026-43078 |
7.8 (3.1)
|
crypto: af_alg - Fix page reassignment overflow in af_… |
Linux |
Linux |
2026-05-06T07:40:15.092Z | 2026-05-08T12:40:25.638Z |
| CVE-2026-43076 |
7.8 (3.1)
|
ocfs2: validate inline data i_size during inode read |
Linux |
Linux |
2026-05-06T07:40:13.634Z | 2026-05-08T12:40:24.482Z |
| CVE-2026-43075 |
7.8 (3.1)
|
ocfs2: fix out-of-bounds write in ocfs2_write_end_inline |
Linux |
Linux |
2026-05-06T07:40:03.337Z | 2026-05-08T12:40:23.336Z |
| CVE-2026-43074 |
7.8 (3.1)
|
eventpoll: defer struct eventpoll free to RCU grace period |
Linux |
Linux |
2026-05-06T07:21:58.210Z | 2026-05-08T12:40:22.201Z |
| CVE-2026-43071 |
9.1 (3.1)
|
dcache: Limit the minimal number of bucket to two |
Linux |
Linux |
2026-05-05T15:29:28.081Z | 2026-05-08T12:40:21.054Z |
| CVE-2026-43070 |
7.8 (3.1)
|
bpf: Reset register ID for BPF_END value tracking |
Linux |
Linux |
2026-05-05T15:23:28.819Z | 2026-05-08T12:40:19.810Z |
| CVE-2026-43067 |
9.8 (3.1)
|
ext4: handle wraparound when searching for blocks for … |
Linux |
Linux |
2026-05-05T15:23:26.717Z | 2026-05-08T12:40:18.665Z |
| CVE-2026-43063 |
7.8 (3.1)
|
xfs: don't irele after failing to iget in xfs_attri_re… |
Linux |
Linux |
2026-05-05T15:23:24.034Z | 2026-05-08T12:40:17.506Z |
| CVE-2026-43062 |
7.1 (3.1)
|
Bluetooth: L2CAP: Fix type confusion in l2cap_ecred_re… |
Linux |
Linux |
2026-05-05T15:17:27.830Z | 2026-05-08T12:40:16.025Z |
| CVE-2026-43060 |
7.8 (3.1)
|
netfilter: nft_ct: drop pending enqueued packets on removal |
Linux |
Linux |
2026-05-05T15:17:26.393Z | 2026-05-08T12:40:14.866Z |
| CVE-2026-31731 |
7.8 (3.1)
|
thermal: core: Address thermal zone removal races with… |
Linux |
Linux |
2026-05-01T14:14:30.177Z | 2026-05-08T12:40:13.706Z |
| CVE-2026-31730 |
7.8 (3.1)
|
misc: fastrpc: possible double-free of cctx->remote_heap |
Linux |
Linux |
2026-05-01T14:14:29.522Z | 2026-05-08T12:40:12.536Z |
| CVE-2026-7448 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-05-06T06:47:21.950Z | 2026-05-08T12:25:55.615Z |
| CVE-2026-8090 |
7.3 (3.1)
|
Use-after-free in the DOM: Networking component |
Mozilla |
Firefox |
2026-05-07T12:45:04.609Z | 2026-05-08T12:19:00.246Z |
| CVE-2025-68900 |
6.5 (3.1)
|
WordPress Enfold theme <= 7.1.3 - Cross Site Scripting… |
Kriesi |
Enfold |
2026-01-22T16:52:12.531Z | 2026-05-08T12:14:13.616Z |
| CVE-2026-42275 |
8.7 (3.1)
|
zrok: WebDAV drive backend follows symlinks outside Dr… |
openziti |
zrok |
2026-05-08T03:45:57.209Z | 2026-05-08T12:13:21.216Z |
| CVE-2026-7475 |
6.4 (3.1)
|
Sky Addons <= 3.3.2 - Authenticated (Author+) Stored C… |
wowdevs |
Sky Addons – Elementor Addons with Widgets & Templates |
2026-05-08T09:26:47.644Z | 2026-05-08T12:12:36.653Z |
| CVE-2026-8117 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
SourceCodester Pizzafy Ecommerce System index.php cros… |
SourceCodester |
Pizzafy Ecommerce System |
2026-05-07T23:45:10.695Z | 2026-05-08T11:43:56.619Z |
| CVE-2026-8124 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GPAC box_code_base.c sidx_box_read allocation of resources |
n/a |
GPAC |
2026-05-08T01:15:10.347Z | 2026-05-08T11:41:38.846Z |
| CVE-2026-8130 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SourceCodester SUP Online Shopping message.php sql injection |
SourceCodester |
SUP Online Shopping |
2026-05-08T02:45:09.771Z | 2026-05-08T11:29:09.929Z |
| CVE-2026-41501 |
9.8 (3.1)
|
electerm has Command Injection Vulnerability via runLi… |
electerm |
electerm |
2026-05-08T02:51:10.144Z | 2026-05-08T11:19:54.297Z |
| CVE-2026-42273 |
7.8 (4.0)
|
Heimdall: Case-sensitive host matching may lead to pol… |
dadrus |
heimdall |
2026-05-08T03:42:50.312Z | 2026-05-08T10:40:56.541Z |
| CVE-2026-42279 |
5.8 (3.1)
|
solidtime: Time entry update endpoint allows cross-org… |
solidtime-io |
solidtime |
2026-05-08T03:57:31.727Z | 2026-05-08T10:38:51.086Z |
| CVE-2026-8138 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda CX12L SetPptpServerCfg” formSetPPTPServer stack-… |
Tenda |
CX12L |
2026-05-08T04:15:10.228Z | 2026-05-08T10:35:06.800Z |
| CVE-2026-5341 |
6.4 (3.1)
|
NMR Strava activities <= 1.0.14 - Authenticated (Contr… |
mirceatm |
NMR Strava activities |
2026-05-08T09:26:47.283Z | 2026-05-08T10:15:32.703Z |
| CVE-2026-44742 |
7.2 (3.1)
|
Postorius through 1.3.13 does not escape HTML in … |
Postorius project |
Postorius |
2026-05-07T18:09:20.069Z | 2026-05-08T06:25:34.759Z |
| CVE-2025-69599 |
N/A
|
RayVentory Scan Engine through 12.6 Update 8 allo… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T06:08:35.396Z |
| CVE-2025-67887 |
N/A
|
1C-Bitrix through 25.100.500 allows Remote Code E… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T05:52:28.158Z |
| CVE-2026-5588 |
6.3 (4.0)
|
PKIX draft CompositeVerifier accepts empty signature s… |
Legion of the Bouncy Castle Inc. |
BC-JAVA |
2026-04-15T09:06:15.617Z | 2026-05-08T05:29:40.247Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43297 |
N/A
|
media: rockchip: rga: Fix possible ERR_PTR dereference… |
Linux |
Linux |
2026-05-08T13:11:19.530Z | 2026-05-08T13:11:19.530Z |
| CVE-2026-43296 |
N/A
|
octeontx2-af: Workaround SQM/PSE stalls by disabling sticky |
Linux |
Linux |
2026-05-08T13:11:18.870Z | 2026-05-09T04:10:08.683Z |
| CVE-2026-43295 |
N/A
|
rapidio: replace rio_free_net() with kfree() in rio_sc… |
Linux |
Linux |
2026-05-08T13:11:18.226Z | 2026-05-08T13:11:18.226Z |
| CVE-2026-43294 |
N/A
|
drm: renesas: rz-du: mipi_dsi: fix kernel panic when r… |
Linux |
Linux |
2026-05-08T13:11:17.483Z | 2026-05-09T04:10:07.227Z |
| CVE-2026-43293 |
N/A
|
media: chips-media: wave5: Fix kthread worker destruct… |
Linux |
Linux |
2026-05-08T13:11:16.812Z | 2026-05-08T13:11:16.812Z |
| CVE-2026-43292 |
N/A
|
mm/vmalloc: prevent RCU stalls in kasan_release_vmalloc_node |
Linux |
Linux |
2026-05-08T13:11:16.017Z | 2026-05-09T04:10:04.732Z |
| CVE-2026-43291 |
N/A
|
net: nfc: nci: Fix parameter validation for packet data |
Linux |
Linux |
2026-05-08T13:11:15.312Z | 2026-05-08T13:11:15.312Z |
| CVE-2026-43290 |
N/A
|
media: uvcvideo: Return queued buffers on start_stream… |
Linux |
Linux |
2026-05-08T13:11:14.646Z | 2026-05-08T13:11:14.646Z |
| CVE-2026-43289 |
N/A
|
kexec: derive purgatory entry from symbol |
Linux |
Linux |
2026-05-08T13:11:13.860Z | 2026-05-08T13:11:13.860Z |
| CVE-2026-43288 |
N/A
|
ext4: move ext4_percpu_param_init() before ext4_mb_init() |
Linux |
Linux |
2026-05-08T13:11:13.195Z | 2026-05-09T04:09:57.796Z |
| CVE-2026-43287 |
N/A
|
drm: Account property blob allocations to memcg |
Linux |
Linux |
2026-05-08T13:11:12.541Z | 2026-05-09T04:09:55.929Z |
| CVE-2026-43286 |
N/A
|
mm/hugetlb: restore failed global reservations to subpool |
Linux |
Linux |
2026-05-08T13:11:11.867Z | 2026-05-08T13:11:11.867Z |
| CVE-2026-43285 |
N/A
|
mm/slab: do not access current->mems_allowed_seq if !a… |
Linux |
Linux |
2026-05-08T13:11:11.191Z | 2026-05-08T13:11:11.191Z |
| CVE-2025-71302 |
N/A
|
drm/panthor: fix for dma-fence safe access rules |
Linux |
Linux |
2026-05-08T13:26:11.418Z | 2026-05-09T04:09:53.948Z |
| CVE-2025-71301 |
N/A
|
drm/tests: shmem: Hold reservation lock around vmap/vunmap |
Linux |
Linux |
2026-05-08T13:15:22.100Z | 2026-05-08T13:15:22.100Z |
| CVE-2025-71300 |
N/A
|
Revert "arm64: zynqmp: Add an OP-TEE node to the devic… |
Linux |
Linux |
2026-05-08T13:15:21.406Z | 2026-05-08T13:15:21.406Z |
| CVE-2025-71299 |
N/A
|
spi: cadence-quadspi: Parse DT for flashes with the re… |
Linux |
Linux |
2026-05-08T13:11:10.518Z | 2026-05-09T04:09:51.835Z |
| CVE-2025-71298 |
N/A
|
drm/tests: shmem: Hold reservation lock around madvise |
Linux |
Linux |
2026-05-08T13:11:09.797Z | 2026-05-08T13:11:09.797Z |
| CVE-2025-71297 |
N/A
|
wifi: rtw88: 8822b: Avoid WARNING in rtw8822b_config_t… |
Linux |
Linux |
2026-05-08T13:11:09.120Z | 2026-05-09T04:09:49.481Z |
| CVE-2025-71296 |
N/A
|
drm/tests: shmem: Hold reservation lock around purge |
Linux |
Linux |
2026-05-08T13:11:08.251Z | 2026-05-08T13:11:08.251Z |
| CVE-2026-43018 |
8.8 (3.1)
|
Bluetooth: hci_event: fix potential UAF in hci_le_remo… |
Linux |
Linux |
2026-05-01T14:15:22.308Z | 2026-05-03T05:46:05.696Z |
| CVE-2026-43017 |
N/A
|
Bluetooth: MGMT: validate mesh send advertising payloa… |
Linux |
Linux |
2026-05-01T14:15:21.561Z | 2026-05-01T14:15:21.561Z |
| CVE-2025-46605 |
6.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T11:27:24.378Z | 2026-04-20T14:06:10.099Z |
| CVE-2025-46606 |
6.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T11:36:54.469Z | 2026-04-18T03:55:33.318Z |
| CVE-2026-43045 |
N/A
|
mshv: Fix error handling in mshv_region_pin |
Linux |
Linux |
2026-05-01T14:15:40.976Z | 2026-05-02T06:14:30.662Z |
| CVE-2026-43046 |
N/A
|
btrfs: reject root items with drop_progress and zero d… |
Linux |
Linux |
2026-05-01T14:15:41.849Z | 2026-05-02T06:14:31.818Z |
| CVE-2026-43047 |
7.8 (3.1)
|
HID: multitouch: Check to ensure report responses matc… |
Linux |
Linux |
2026-05-01T14:15:42.562Z | 2026-05-03T05:46:22.203Z |
| CVE-2026-7448 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-05-06T06:47:21.950Z | 2026-05-08T12:25:55.615Z |
| CVE-2026-43258 |
7.8 (3.1)
|
alpha: fix user-space corruption during memory compaction |
Linux |
Linux |
2026-05-06T11:28:46.536Z | 2026-05-08T12:41:39.777Z |
| CVE-2026-43256 |
7.8 (3.1)
|
media: qcom: camss: vfe: Fix out-of-bounds access in v… |
Linux |
Linux |
2026-05-06T11:28:45.209Z | 2026-05-08T12:41:38.588Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-43290 | In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Return queued… | 2026-05-08T14:16:36.010 | 2026-05-08T14:16:36.010 |
| fkie_cve-2026-43289 | In the Linux kernel, the following vulnerability has been resolved: kexec: derive purgatory entry … | 2026-05-08T14:16:35.867 | 2026-05-08T14:16:35.867 |
| fkie_cve-2026-43288 | In the Linux kernel, the following vulnerability has been resolved: ext4: move ext4_percpu_param_i… | 2026-05-08T14:16:35.737 | 2026-05-08T14:16:35.737 |
| fkie_cve-2026-43287 | In the Linux kernel, the following vulnerability has been resolved: drm: Account property blob all… | 2026-05-08T14:16:35.600 | 2026-05-08T14:16:35.600 |
| fkie_cve-2026-43286 | In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: restore failed glo… | 2026-05-08T14:16:35.473 | 2026-05-08T14:16:35.473 |
| fkie_cve-2026-43285 | In the Linux kernel, the following vulnerability has been resolved: mm/slab: do not access current… | 2026-05-08T14:16:35.337 | 2026-05-08T14:16:35.337 |
| fkie_cve-2025-71302 | In the Linux kernel, the following vulnerability has been resolved: drm/panthor: fix for dma-fence… | 2026-05-08T14:16:31.607 | 2026-05-08T14:16:31.607 |
| fkie_cve-2025-71301 | In the Linux kernel, the following vulnerability has been resolved: drm/tests: shmem: Hold reserva… | 2026-05-08T14:16:31.497 | 2026-05-08T14:16:31.497 |
| fkie_cve-2025-71300 | In the Linux kernel, the following vulnerability has been resolved: Revert "arm64: zynqmp: Add an … | 2026-05-08T14:16:31.387 | 2026-05-08T14:16:31.387 |
| fkie_cve-2025-71299 | In the Linux kernel, the following vulnerability has been resolved: spi: cadence-quadspi: Parse DT… | 2026-05-08T14:16:31.267 | 2026-05-08T14:16:31.267 |
| fkie_cve-2025-71298 | In the Linux kernel, the following vulnerability has been resolved: drm/tests: shmem: Hold reserva… | 2026-05-08T14:16:31.153 | 2026-05-08T14:16:31.153 |
| fkie_cve-2025-71297 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: 8822b: Avoid WARN… | 2026-05-08T14:16:31.000 | 2026-05-08T14:16:31.000 |
| fkie_cve-2025-71296 | In the Linux kernel, the following vulnerability has been resolved: drm/tests: shmem: Hold reserva… | 2026-05-08T14:16:30.887 | 2026-05-08T14:16:30.887 |
| fkie_cve-2026-43018 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: fix pote… | 2026-05-01T15:16:45.980 | 2026-05-08T14:15:26.283 |
| fkie_cve-2026-43017 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: validate mesh… | 2026-05-01T15:16:45.837 | 2026-05-08T14:13:28.580 |
| fkie_cve-2025-46605 | Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:16:31.843 | 2026-05-08T14:06:04.960 |
| fkie_cve-2025-46606 | Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions… | 2026-04-17T12:16:31.967 | 2026-05-08T14:04:38.900 |
| fkie_cve-2026-43045 | In the Linux kernel, the following vulnerability has been resolved: mshv: Fix error handling in ms… | 2026-05-01T15:16:50.817 | 2026-05-08T14:04:13.097 |
| fkie_cve-2026-43046 | In the Linux kernel, the following vulnerability has been resolved: btrfs: reject root items with … | 2026-05-01T15:16:50.933 | 2026-05-08T13:52:16.790 |
| fkie_cve-2026-43047 | In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: Check to ensu… | 2026-05-01T15:16:51.073 | 2026-05-08T13:50:16.930 |
| fkie_cve-2026-7448 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued i… | 2026-05-06T08:16:04.230 | 2026-05-08T13:16:48.907 |
| fkie_cve-2026-43258 | In the Linux kernel, the following vulnerability has been resolved: alpha: fix user-space corrupti… | 2026-05-06T12:16:46.650 | 2026-05-08T13:16:47.953 |
| fkie_cve-2026-43256 | In the Linux kernel, the following vulnerability has been resolved: media: qcom: camss: vfe: Fix o… | 2026-05-06T12:16:46.397 | 2026-05-08T13:16:47.837 |
| fkie_cve-2026-43254 | In the Linux kernel, the following vulnerability has been resolved: ovpn: tcp - fix packet extract… | 2026-05-06T12:16:46.143 | 2026-05-08T13:16:47.717 |
| fkie_cve-2026-43253 | In the Linux kernel, the following vulnerability has been resolved: iommu/amd: move wait_on_sem() … | 2026-05-06T12:16:46.033 | 2026-05-08T13:16:47.593 |
| fkie_cve-2026-43249 | In the Linux kernel, the following vulnerability has been resolved: 9p/xen: protect xen_9pfs_front… | 2026-05-06T12:16:45.493 | 2026-05-08T13:16:47.450 |
| fkie_cve-2026-43248 | In the Linux kernel, the following vulnerability has been resolved: vhost: move vdpa group bound c… | 2026-05-06T12:16:45.380 | 2026-05-08T13:16:47.337 |
| fkie_cve-2026-43245 | In the Linux kernel, the following vulnerability has been resolved: ntfs: ->d_compare() must not b… | 2026-05-06T12:16:44.997 | 2026-05-08T13:16:47.227 |
| fkie_cve-2026-43239 | In the Linux kernel, the following vulnerability has been resolved: smb: client: prevent races in … | 2026-05-06T12:16:44.217 | 2026-05-08T13:16:47.113 |
| fkie_cve-2026-43237 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Refactor amdgpu_ge… | 2026-05-06T12:16:43.960 | 2026-05-08T13:16:46.983 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-977x-crv2-w57m |
9.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: dcache: Limit the minimal numb… | 2026-05-05T18:33:25Z | 2026-05-08T15:31:15Z |
| ghsa-84jf-h474-jrh8 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: xfs: don't irele after failing… | 2026-05-05T18:33:25Z | 2026-05-08T15:31:15Z |
| ghsa-845x-q62g-4v8p |
9.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ext4: handle wraparound when s… | 2026-05-05T18:33:25Z | 2026-05-08T15:31:15Z |
| ghsa-6mf2-xqwv-jhq3 |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix type con… | 2026-05-05T18:33:25Z | 2026-05-08T15:31:15Z |
| ghsa-6c86-hp8g-chh5 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: drop pendin… | 2026-05-05T18:33:24Z | 2026-05-08T15:31:15Z |
| ghsa-4j6h-qqh4-vpw7 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: eventpoll: defer struct eventp… | 2026-05-06T12:30:26Z | 2026-05-08T15:31:15Z |
| ghsa-2xw5-2v9x-wc8m |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: ma… | 2026-05-06T12:30:27Z | 2026-05-08T15:31:15Z |
| ghsa-29pf-hv9p-f96v |
9.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: ioam6: fix OOB and missin… | 2026-05-06T12:30:26Z | 2026-05-08T15:31:15Z |
| ghsa-vjrj-837q-jqv3 |
5.8 (3.1)
6.9 (4.0)
|
Wazuh Manager authd service in wazuh-manager packages through version 4.7.3 contains an improper re… | 2026-03-27T18:31:26Z | 2026-05-08T15:31:14Z |
| ghsa-cgx3-p97x-fhh8 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: validate mesh… | 2026-05-01T15:30:36Z | 2026-05-08T15:31:14Z |
| ghsa-7vq8-6v9j-p4jg |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: fix leaks… | 2026-05-01T15:30:36Z | 2026-05-08T15:31:14Z |
| ghsa-5fjm-c352-35cv |
6.1 (3.1)
5.1 (4.0)
|
MailEnable versions prior to 10.55 contain a reflected cross-site scripting vulnerability in the we… | 2026-03-23T21:30:52Z | 2026-05-08T15:31:14Z |
| ghsa-4qqh-3j35-gpcq |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: validate LTK … | 2026-05-01T15:30:36Z | 2026-05-08T15:31:14Z |
| ghsa-fv85-v87w-8wjv |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T18:30:36Z | 2026-05-08T15:31:13Z |
| ghsa-5vh4-rgv7-p9g4 |
8.6 (3.1)
6.9 (4.0)
|
Gotenberg Vulnerable to Unauthenticated SSRF via Unfiltered Webhook URL | 2026-04-30T17:24:33Z | 2026-05-08T15:31:10Z |
| ghsa-vp29-5652-4fw9 |
7.5 (3.1)
8.2 (4.0)
|
CoreDNS has TSIG authentication bypass on gRPC and QUIC transports | 2026-04-28T22:54:32Z | 2026-05-08T15:30:59Z |
| ghsa-8gw4-p4wq-4hcv |
4.3 (3.1)
5.3 (4.0)
|
Incus has Blind SSRF via Image Import Preflight HEAD | 2026-05-04T16:53:01Z | 2026-05-08T15:30:49Z |
| ghsa-6wpp-88cp-7q68 |
5.3 (4.0)
|
PhpSpreadsheet has XSS via NumberFormat @ Text Substitution in HTML Writer | 2026-04-28T22:50:31Z | 2026-05-08T15:29:45Z |
| ghsa-5789-5fc7-67v3 |
7.1 (3.1)
7.6 (4.0)
|
Jupyter Server: Path Traversal via incorrect startswith() root directory check allows access to sib… | 2026-05-05T16:49:10Z | 2026-05-08T15:29:39Z |
| ghsa-q4q6-r8wh-5cgh |
9.2 (4.0)
|
PhpSpreadsheet has SSRF/RCE in IOFactory::load when $filename is user controlled | 2026-04-29T20:22:30Z | 2026-05-08T15:29:26Z |
| ghsa-h8mm-c463-wjq3 |
7.5 (3.1)
8.2 (4.0)
|
CoreDNS' transfer stanza selection uses lexicographic compare (subzone ACL bypass) | 2026-04-28T22:44:39Z | 2026-05-08T15:28:38Z |
| ghsa-qhmp-q7xh-99rh |
7.5 (3.1)
8.7 (4.0)
|
CoreDNS has TSIG authentication bypass on DoT, DoH, DoH3, DoQ, and gRPC | 2026-04-28T22:46:15Z | 2026-05-08T15:28:24Z |
| ghsa-63cw-r7xf-jmwr |
7.5 (3.1)
8.7 (4.0)
|
CoreDNS DoH GET oversized dns= query parameter causes pre-validation CPU and memory amplification | 2026-04-28T22:43:47Z | 2026-05-08T15:28:11Z |
| ghsa-2wpx-qpw2-g5h5 |
7.5 (3.1)
8.7 (4.0)
|
CoreDNS' DoQ worker pool does not bound stream backlog | 2026-04-28T22:40:38Z | 2026-05-08T15:27:59Z |
| ghsa-xvv6-p4wf-mvx7 |
7.5 (3.1)
7.3 (4.0)
|
TYPO3 CMS Stores Cleartext Password in User Settings Module | 2026-04-24T16:39:15Z | 2026-05-08T15:20:40Z |
| ghsa-gvvw-8j96-8g5r |
9.8 (3.1)
|
MsQuic has a Remote Elevation of Privilege Vulnerability | 2026-04-16T01:04:03Z | 2026-05-08T15:19:44Z |
| ghsa-94g3-g5v7-q4jg |
8.2 (4.0)
|
phpseclib's AES-CBC unpadding susceptible to padding oracle timing attack | 2026-03-19T16:42:18Z | 2026-05-08T15:18:13Z |
| ghsa-r854-jrxh-36qx |
3.7 (3.1)
|
phpseclib has a variable-time HMAC comparison in SSH2::get_binary_packet() using != instead of hash… | 2026-04-10T20:58:10Z | 2026-05-08T15:17:47Z |
| ghsa-chfm-xgc4-47rj |
2.3 (4.0)
|
OpenClaw: MSTeams thread history bypasses sender allowlist via Graph API | 2026-04-02T21:01:28Z | 2026-05-08T14:31:59Z |
| ghsa-qh7q-6qm3-653w |
6.0 (4.0)
|
Jupyter Server has an open redirection vulnerability in `next` query parameter | 2026-05-05T16:32:48Z | 2026-05-08T13:48:27Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-29 |
4.9 (3.1)
|
OctoPrint is a web interface for 3D printer.s OctoPrint versions up until and including 1… | octoprint | 2024-01-31T18:15:00+00:00 | 2024-02-08T07:19:40.535297+00:00 |
| pysec-2024-28 |
|
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 be… | django | 2024-02-06T22:16:00+00:00 | 2024-02-07T00:25:46.826634+00:00 |
| pysec-2023-252 |
7.5 (3.1)
|
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-18T04:15:00+00:00 | 2024-02-06T22:20:23.832000+00:00 |
| pysec-2024-26 |
6.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-… | aiohttp | 2024-01-29T23:15:00+00:00 | 2024-02-06T20:20:18.162431+00:00 |
| pysec-2024-25 |
9.8 (3.1)
|
DuckDB <=0.9.2 and DuckDB extension-template <=0.9.2 are vulnerable to malicious extensio… | duckdb | 2024-01-30T01:16:00+00:00 | 2024-02-06T00:25:51.550516+00:00 |
| pysec-2024-24 |
7.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When usin… | aiohttp | 2024-01-29T23:15:00+00:00 | 2024-02-05T20:20:47.716944+00:00 |
| pysec-2024-23 |
5.3 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. Versions 0.8.3 and prior have a limite… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-02-02T07:18:33.382718+00:00 |
| pysec-2009-11 |
|
The rst parser (parser/text_rst.py) in MoinMoin 1.6.1 does not check the ACL of an includ… | moin | 2009-03-30T01:30:00+00:00 | 2024-02-02T07:18:32.552079+00:00 |
| pysec-2024-22 |
6.1 (3.1)
|
TuiTse-TsuSin is a package for organizing the comparative corpus of Taiwanese Chinese cha… | tuitse-tsusin | 2024-01-23T18:15:00+00:00 | 2024-02-01T22:21:01.486817+00:00 |
| pysec-2024-21 |
8.8 (3.1)
|
A vulnerability classified as critical was found in van_der_Schaar LAB TemporAI 0.0.3. Af… | temporai | 2024-01-26T17:15:00+00:00 | 2024-02-01T18:22:23.971296+00:00 |
| pysec-2024-20 |
9.8 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions prior to 0.8.4, the `eleme… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-30T18:22:32.803340+00:00 |
| pysec-2024-19 |
6.1 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the `elem… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-29T22:21:01.226431+00:00 |
| pysec-2024-18 |
9.8 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the `wind… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-29T22:21:01.170723+00:00 |
| pysec-2024-17 |
8.8 (3.1)
|
pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` AP… | pyload-ng | 2024-01-18T00:15:00+00:00 | 2024-01-29T20:20:58.389168+00:00 |
| pysec-2024-16 |
5.4 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2024-01-23T00:15:00+00:00 | 2024-01-29T20:20:58.065227+00:00 |
| pysec-2023-251 |
5.3 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper … | aiohttp | 2023-11-29T20:15:00+00:00 | 2024-01-29T16:22:26.513672+00:00 |
| pysec-2023-250 |
5.3 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper … | aiohttp | 2023-11-30T07:15:00+00:00 | 2024-01-29T16:22:26.409794+00:00 |
| pysec-2024-15 |
3.7 (3.1)
|
changedetection.io is an open source tool designed to monitor websites for content chang… | changedetection-io | 2024-01-19T20:15:00+00:00 | 2024-01-26T22:21:10.756741+00:00 |
| pysec-2024-5 |
2.8 (3.1)
|
cdo-local-uuid project provides a specialized UUID-generating function that can, on user … | case-utils | 2024-01-11T03:15:00Z | 2024-01-25T14:03:52.279077Z |
| pysec-2024-14 |
|
Apache Airflow, versions before 2.8.1, have a vulnerability that allows an authenticated … | apache-airflow | 2024-01-24T13:15:00+00:00 | 2024-01-24T16:22:57.416385+00:00 |
| pysec-2024-13 |
|
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attac… | apache-airflow | 2024-01-24T13:15:00+00:00 | 2024-01-24T16:22:57.352530+00:00 |
| pysec-2023-241 |
9.1 (3.1)
|
Piccolo is an object-relational mapping and query builder which supports asyncio. Prior t… | piccolo | 2023-11-10T18:15:00Z | 2024-01-23T23:21:13.409656Z |
| pysec-2024-11 |
9.8 (3.1)
|
Remote Code Execution vulnerability in Apache IoTDB.This issue affects Apache IoTDB: from… | apache-iotdb | 2024-01-15T11:15:00+00:00 | 2024-01-22T22:21:02.620877+00:00 |
| pysec-2024-10 |
9.8 (3.1)
|
In Gentoo Portage before 3.0.47, there is missing PGP validation of executed code: the st… | portage | 2024-01-12T03:15:00+00:00 | 2024-01-22T18:22:47.599296+00:00 |
| pysec-2024-9 |
|
MetaGPT through 0.6.4 allows the QaEngineer role to execute arbitrary code because RunCod… | metagpt | 2024-01-22T01:15:00+00:00 | 2024-01-22T07:20:28.329958+00:00 |
| pysec-2024-8 |
|
The JSON loader in Embedchain before 0.1.57 allows a ReDoS (regular expression denial of … | embedchain | 2024-01-21T17:15:00+00:00 | 2024-01-21T20:21:00.544327+00:00 |
| pysec-2024-7 |
|
The OpenAPI loader in Embedchain before 0.1.57 allows attackers to execute arbitrary code… | embedchain | 2024-01-21T17:15:00+00:00 | 2024-01-21T20:21:00.484037+00:00 |
| pysec-2024-6 |
2.8 (3.1)
|
cdo-local-uuid project provides a specialized UUID-generating function that can, on user … | cdo-local-uuid | 2024-01-11T03:15:00+00:00 | 2024-01-19T22:21:07.454006+00:00 |
| pysec-2024-4 |
7.8 (3.1)
|
GitPython is a python library used to interact with Git repositories. There is an incompl… | gitpython | 2024-01-11T02:15:00+00:00 | 2024-01-18T16:22:52.190857+00:00 |
| pysec-2024-3 |
5.9 (3.1)
|
PyCryptodome and pycryptodomex before 3.19.1 allow side-channel leakage for OAEP decrypti… | pycryptodomex | 2024-01-05T04:15:00+00:00 | 2024-01-17T11:19:18.629304+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33433 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.607347Z |
| gsd-2024-33432 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.757872Z |
| gsd-2024-33431 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.755593Z |
| gsd-2024-33430 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.713914Z |
| gsd-2024-33429 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.703541Z |
| gsd-2024-33428 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.644983Z |
| gsd-2024-33427 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.709032Z |
| gsd-2024-33426 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.652912Z |
| gsd-2024-33425 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.710668Z |
| gsd-2024-33424 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.705230Z |
| gsd-2024-33423 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.747796Z |
| gsd-2024-33422 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.760522Z |
| gsd-2024-33421 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.753988Z |
| gsd-2024-33420 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.610252Z |
| gsd-2024-33419 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.652384Z |
| gsd-2024-33418 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.732074Z |
| gsd-2024-33417 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.613107Z |
| gsd-2024-33416 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.737967Z |
| gsd-2024-33415 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.732712Z |
| gsd-2024-33414 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.723146Z |
| gsd-2024-33413 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.721359Z |
| gsd-2024-33412 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.608951Z |
| gsd-2024-33411 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.741698Z |
| gsd-2024-33410 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.719470Z |
| gsd-2024-33409 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.731838Z |
| gsd-2024-33408 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.611278Z |
| gsd-2024-33407 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.735210Z |
| gsd-2024-33406 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.718995Z |
| gsd-2024-33405 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.718151Z |
| gsd-2024-33404 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.743316Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-3007 | Malicious code in json-dec (npm) | 2026-04-23T04:42:45Z | 2026-04-23T20:50:50Z |
| mal-2026-3006 | Malicious code in changelog-utils-structured-logger (npm) | 2026-04-23T04:24:15Z | 2026-04-23T20:50:50Z |
| mal-2026-3005 | Malicious code in changelog-cli-logger (npm) | 2026-04-23T04:24:15Z | 2026-04-23T20:50:50Z |
| mal-2026-2995 | Malicious code in color-studio (npm) | 2026-04-22T14:49:27Z | 2026-04-23T20:50:50Z |
| mal-2026-2990 | Malicious code in etsyapp (npm) | 2026-04-22T08:55:39Z | 2026-04-23T20:50:50Z |
| mal-2026-2976 | Malicious code in gleb-js (npm) | 2026-04-22T01:49:52Z | 2026-04-23T20:50:50Z |
| mal-2026-2975 | Malicious code in crypto-keccak-js (npm) | 2026-04-22T01:53:37Z | 2026-04-23T20:50:50Z |
| mal-2026-2974 | Malicious code in claudcode-mcp (npm) | 2026-04-22T01:32:09Z | 2026-04-23T20:50:50Z |
| mal-2026-2973 | Malicious code in claudcode-cli (npm) | 2026-04-22T01:32:09Z | 2026-04-23T20:50:50Z |
| mal-2026-2966 | Malicious code in com.tencent.puerts.agent (npm) | 2026-04-21T12:05:01Z | 2026-04-23T20:50:50Z |
| mal-2026-2959 | Malicious code in internal_insights_enabled (npm) | 2026-04-20T15:46:01Z | 2026-04-23T20:50:50Z |
| mal-2026-2951 | Malicious code in hifromhere1 (npm) | 2026-04-20T14:21:09Z | 2026-04-23T20:50:50Z |
| mal-2026-2925 | Malicious code in cktool.internal (npm) | 2026-04-18T08:09:56Z | 2026-04-23T20:50:50Z |
| mal-2026-2924 | Malicious code in cktool.core.internal (npm) | 2026-04-18T09:00:50Z | 2026-04-23T20:50:50Z |
| mal-2026-2923 | Malicious code in cktool.config (npm) | 2026-04-18T08:50:58Z | 2026-04-23T20:50:50Z |
| mal-2026-2922 | Malicious code in cktool.api (npm) | 2026-04-18T08:40:57Z | 2026-04-23T20:50:50Z |
| mal-2026-2921 | Malicious code in chandan-module-test (npm) | 2026-04-19T19:25:43Z | 2026-04-23T20:50:50Z |
| mal-2026-2900 | Malicious code in dotenv-pack (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:50Z |
| mal-2026-2899 | Malicious code in chai-use-chains (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:50Z |
| mal-2026-2897 | Malicious code in chai-beta (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:50Z |
| mal-2026-2895 | Malicious code in chai-as-optimized (npm) | 2026-04-16T20:36:13Z | 2026-04-23T20:50:50Z |
| mal-2026-2894 | Malicious code in chai-as-nobj (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:50Z |
| mal-2026-2891 | Malicious code in chai-as-init (npm) | 2026-04-16T20:36:13Z | 2026-04-23T20:50:50Z |
| mal-2026-2889 | Malicious code in chai-as-evm (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:50Z |
| mal-2026-2882 | Malicious code in cjs-biginteger (npm) | 2026-04-14T12:35:43Z | 2026-04-23T20:50:50Z |
| mal-2026-2871 | Malicious code in devkitx (npm) | 2026-04-07T07:43:09Z | 2026-04-23T20:50:50Z |
| mal-2026-2846 | Malicious code in eslint-plugin-totara (npm) | 2026-04-17T12:20:55Z | 2026-04-23T20:50:50Z |
| mal-2026-2828 | Malicious code in express-security-policy (npm) | 2026-04-17T06:20:31Z | 2026-04-23T20:50:50Z |
| mal-2026-2827 | Malicious code in js-logger-pack (npm) | 2026-04-15T06:24:12Z | 2026-04-23T20:50:50Z |
| mal-2026-2826 | Malicious code in dom-utils-lite (npm) | 2026-04-14T09:21:35Z | 2026-04-23T20:50:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0813 | Oracle MySQL: Mehrere Schwachstellen | 2025-04-15T22:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0507 | MariaDB: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-03-09T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0167 | Oracle MySQL: Mehrere Schwachstellen | 2025-01-21T23:00:00.000+00:00 | 2026-01-07T23:00:00.000+00:00 |
| wid-sec-w-2026-0010 | Samsung Exynos: Mehrere Schwachstellen | 2026-01-04T23:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-2938 | Arista EOS: Schwachstelle ermöglicht Denial of Service | 2025-12-30T23:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-2807 | TianoCore EDK2: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-09T23:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-2466 | QEMU e1000 Network Devices: Schwachstelle ermöglicht Denial of Service | 2025-11-02T23:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-1870 | Keycloak: Schwachstelle ermöglicht Versand beliebiger E-Mails | 2025-08-19T22:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-0713 | poppler: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-04-06T22:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-0712 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2025-04-06T22:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2024-3528 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-11-21T23:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2024-3376 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-11-07T23:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2024-3339 | Linux Kernel: Mehrere Schwachstellen | 2024-11-05T23:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2024-3283 | Linux-Kernel: Schwachstelle ermöglicht Codeausführung | 2024-10-27T23:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2024-1531 | QEMU: Schwachstelle ermöglicht Denial of Service | 2024-07-04T22:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2026-0012 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2020-09-29T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0006 | OpenCTI: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen, Manipulation von Daten, Denial of Service | 2026-01-04T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0003 | Vaadin: Schwachstelle ermöglicht Cross-Site Scripting | 2026-01-04T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2911 | Synacor Zimbra: Mehrere Schwachstellen | 2025-12-22T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2882 | Red Hat Enterprise Linux (audiofile): Schwachstelle ermöglicht Denial of Service | 2025-12-17T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2830 | Red Hat Enterprise Linux (libsoup): Schwachstelle ermöglicht Denial of Service | 2025-12-11T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2816 | ImageMagick: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-10T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2805 | TianoCore EDK2: Schwachstelle ermöglicht Codeausführung | 2025-12-09T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2736 | QT (Declarative module): Schwachstelle ermöglicht Denial of Service | 2025-12-03T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2729 | WebKitGTK: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-02T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2722 | ImageMagick: Schwachstelle ermöglicht Denial of Service | 2025-12-02T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2638 | Grub: Mehrere Schwachstellen | 2025-11-18T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2593 | pgAdmin: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2566 | Mozilla Firefox und Firefox ESR: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2433 | Google Cloud Platform (Envoy Proxy):: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-28T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-11-279-01 | Advantech OPC Server Buffer Overflow | 2011-07-09T06:00:00.000000Z | 2025-06-09T19:51:00.349798Z |
| icsa-11-277-01 | Schneider Electric UnitelWay Buffer Overflow | 2011-07-07T06:00:00.000000Z | 2025-06-09T19:50:53.798376Z |
| icsa-14-189-01 | Yokogawa Centum Buffer Overflow Vulnerability | 2014-04-10T06:00:00.000000Z | 2025-06-09T19:50:47.578955Z |
| icsa-14-175-01 | Honeywell FALCON XLWeb Controllers Vulnerabilities | 2014-03-27T06:00:00.000000Z | 2025-06-09T19:50:34.818730Z |
| icsa-14-154-01 | COPA-DATA Improper Input Validation | 2014-03-06T07:00:00.000000Z | 2025-06-09T19:50:22.034930Z |
| icsa-14-149-02 | Cogent DataHub Vulnerabilities | 2014-03-01T07:00:00.000000Z | 2025-06-09T19:50:03.330208Z |
| icsa-14-149-01 | Triangle MicroWorks Uncontrolled Resource Consumption | 2014-03-01T07:00:00.000000Z | 2025-06-09T19:49:50.848677Z |
| icsa-14-135-05 | OpenSSL Vulnerability | 2014-02-15T07:00:00.000000Z | 2025-06-09T19:49:44.423856Z |
| icsa-14-135-04 | Unified Automation OPC SDK OpenSSL Vulnerability | 2014-02-15T07:00:00.000000Z | 2025-06-09T19:49:38.008876Z |
| icsa-14-135-03a | Siemens RuggedCom ROX-based Devices Certificate Verification Vulnerability (Update A) | 2014-02-15T07:00:00.000000Z | 2025-06-09T19:49:31.780137Z |
| icsa-14-135-02 | Schneider Electric Wonderware Intelligence Security Patch for OpenSSL Vulnerability | 2014-02-15T07:00:00.000000Z | 2025-06-09T19:49:25.382123Z |
| icsa-14-135-01 | CSWorks Software SQL Injection Vulnerability | 2014-02-15T07:00:00.000000Z | 2025-06-09T19:49:19.141034Z |
| icsa-14-133-02 | Emerson DeltaV Vulnerabilities | 2014-02-13T07:00:00.000000Z | 2025-06-09T19:49:06.355363Z |
| icsa-14-133-01 | Yokogawa Multiple Products Vulnerabilities | 2014-02-13T07:00:00.000000Z | 2025-06-09T19:48:41.450208Z |
| icsa-14-128-01 | Digi International OpenSSL Vulnerability | 2014-02-08T07:00:00.000000Z | 2025-06-09T19:48:34.797683Z |
| icsa-14-126-01a | ABB Relion 650 Series OpenSSL Vulnerability (Update A) | 2014-02-06T07:00:00.000000Z | 2025-06-09T19:48:28.398218Z |
| icsa-14-121-01 | AMTELCO miSecure Vulnerabilities | 2014-02-01T07:00:00.000000Z | 2025-06-09T19:48:15.910849Z |
| icsa-14-105-03b | Siemens Industrial Products OpenSSL Heartbleed Vulnerability (Update B) | 2014-01-16T07:00:00.000000Z | 2025-06-09T19:48:09.507058Z |
| icsa-14-100-01 | IOServer Out of Bounds Read Vulnerability | 2014-01-11T07:00:00.000000Z | 2025-06-09T19:48:03.239416Z |
| icsa-14-098-03 | Siemens Ruggedcom WIN Products BEAST Attack Vulnerability | 2014-01-09T07:00:00.000000Z | 2025-06-09T19:47:56.923899Z |
| icsa-14-098-02 | WellinTech KingSCADA Stack-Based Buffer Overflow | 2014-01-09T07:00:00.000000Z | 2025-06-09T19:47:50.675225Z |
| icsa-14-098-01 | OSIsoft PI Interface for DNP3 Improper Input Validation | 2014-01-09T07:00:00.000000Z | 2025-06-09T19:47:38.220384Z |
| icsa-14-093-01 | Schneider Electric OPC Factory Server Buffer Overflow | 2014-01-04T07:00:00.000000Z | 2025-06-09T19:47:31.991088Z |
| icsa-14-091-01 | Ecava IntegraXor Guest Account Information Disclosure Vulnerability | 2014-01-02T07:00:00.000000Z | 2025-06-09T19:47:25.741463Z |
| icsa-14-087-01a | Siemens ROS Improper Input Validation (Update A) | 2014-12-29T07:00:00.000000Z | 2025-06-09T19:47:19.488644Z |
| icsa-14-079-03 | Advantech WebAccess Vulnerabilities | 2014-12-21T07:00:00.000000Z | 2025-06-09T19:46:04.209691Z |
| icsa-14-079-02 | Siemens SIMATIC S7-1200 Vulnerabilities | 2014-12-21T07:00:00.000000Z | 2025-06-09T19:45:26.869178Z |
| icsa-14-079-01 | Siemens SIMATIC S7-1200 Improper Input Validation Vulnerabilities | 2014-12-21T07:00:00.000000Z | 2025-06-09T19:45:14.365556Z |
| icsa-14-073-01 | Siemens SIMATIC S7-1500 CPU Firmware Vulnerabilities | 2014-12-15T07:00:00.000000Z | 2025-06-09T19:44:18.044591Z |
| icsa-14-072-01 | Schneider Electric StruxureWare SCADA Expert ClearSCADA Parsing Vulnerability | 2014-12-14T07:00:00.000000Z | 2025-06-09T19:44:11.598662Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-nxos-lldp-dos-z7pnctgt | Cisco FXOS and NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-lldp-dos-z7PncTgt | Cisco FXOS and NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-ebgp-dos-l3qcwvj | Cisco NX-OS Software External Border Gateway Protocol Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-ebgp-dos-L3QCwVJ | Cisco NX-OS Software External Border Gateway Protocol Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-ipv6-mpls-dos-r9ycxkwm | Cisco NX-OS Software MPLS Encapsulated IPv6 Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-ipv6-mpls-dos-R9ycXkwM | Cisco NX-OS Software MPLS Encapsulated IPv6 Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-cimc-xss-umytyetr | Cisco Integrated Management Controller Cross-Site Scripting Vulnerability | 2023-08-16T16:00:00+00:00 | 2024-02-22T20:57:19+00:00 |
| cisco-sa-cimc-xss-UMYtYEtr | Cisco Integrated Management Controller Cross-Site Scripting Vulnerability | 2023-08-16T16:00:00+00:00 | 2024-02-22T20:57:19+00:00 |
| cisco-sa-cuic-access-control-jjszqmjj | Cisco Unified Intelligence Center Insufficient Access Control Vulnerability | 2024-02-21T16:00:00+00:00 | 2024-02-21T16:00:00+00:00 |
| cisco-sa-cuic-access-control-jJsZQMjj | Cisco Unified Intelligence Center Insufficient Access Control Vulnerability | 2024-02-21T16:00:00+00:00 | 2024-02-21T16:00:00+00:00 |
| cisco-sa-asaftd-info-disclose-9ejtycmb | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Information Disclosure Vulnerability | 2020-05-06T16:00:00+00:00 | 2024-02-21T15:57:20+00:00 |
| cisco-sa-asaftd-info-disclose-9eJtycMB | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Information Disclosure Vulnerability | 2020-05-06T16:00:00+00:00 | 2024-02-21T15:57:20+00:00 |
| cisco-sa-clamav-hdffu6t | ClamAV OLE2 File Format Parsing Denial of Service Vulnerability | 2024-02-07T16:00:00+00:00 | 2024-02-13T17:57:43+00:00 |
| cisco-sa-clamav-hDffu6t | ClamAV OLE2 File Format Parsing Denial of Service Vulnerability | 2024-02-07T16:00:00+00:00 | 2024-02-13T17:57:43+00:00 |
| cisco-sa-expressway-csrf-knnzdmj3 | Cisco Expressway Series Cross-Site Request Forgery Vulnerabilities | 2024-02-07T16:00:00+00:00 | 2024-02-12T17:55:43+00:00 |
| cisco-sa-expressway-csrf-KnnZDMj3 | Cisco Expressway Series Cross-Site Request Forgery Vulnerabilities | 2024-02-07T16:00:00+00:00 | 2024-02-12T17:55:43+00:00 |
| cisco-sa-ftd-snort3acp-bypass-3bdr2beh | Multiple Cisco Products Snort 3 Access Control Policy Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2024-02-06T18:30:17+00:00 |
| cisco-sa-ftd-snort3acp-bypass-3bdR2BEh | Multiple Cisco Products Snort 3 Access Control Policy Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2024-02-06T18:30:17+00:00 |
| cisco-sa-cuc-unauth-afu-froyscsd | Cisco Unity Connection Unauthenticated Arbitrary File Upload Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-02-05T17:23:14+00:00 |
| cisco-sa-cuc-unauth-afu-FROYsCsD | Cisco Unity Connection Unauthenticated Arbitrary File Upload Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-02-05T17:23:14+00:00 |
| cisco-sa-cucm-rce-bwnzqcum | Cisco Unified Communications Products Remote Code Execution Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-30T19:16:46+00:00 |
| cisco-sa-cucm-rce-bWNzQcUm | Cisco Unified Communications Products Remote Code Execution Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-30T19:16:46+00:00 |
| cisco-sa-sb-bus-acl-bypass-5zn9hnjk | Cisco Small Business Series Switches Stacked Reload ACL Bypass Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-24T16:00:00+00:00 |
| cisco-sa-sb-bus-acl-bypass-5zn9hNJk | Cisco Small Business Series Switches Stacked Reload ACL Bypass Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-24T16:00:00+00:00 |
| cisco-sa-cuc-xss-9tfuu5ms | Cisco Unity Connection Cross-Site Scripting Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-24T16:00:00+00:00 |
| cisco-sa-cuc-xss-9TFuu5MS | Cisco Unity Connection Cross-Site Scripting Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-24T16:00:00+00:00 |
| cisco-sa-sdwan-privesc-cli-xkgwmqku | Cisco SD-WAN Software Arbitrary File Corruption Vulnerability | 2022-09-28T16:00:00+00:00 | 2024-01-23T23:05:35+00:00 |
| cisco-sa-sdwan-privesc-cli-xkGwmqKu | Cisco SD-WAN Software Arbitrary File Corruption Vulnerability | 2022-09-28T16:00:00+00:00 | 2024-01-23T23:05:35+00:00 |
| cisco-sa-sd-wan-file-access-vw36d28p | Cisco SD-WAN Solution Improper Access Control Vulnerability | 2022-04-13T16:00:00+00:00 | 2024-01-23T21:31:33+00:00 |
| cisco-sa-sd-wan-file-access-VW36d28P | Cisco SD-WAN Solution Improper Access Control Vulnerability | 2022-04-13T16:00:00+00:00 | 2024-01-23T21:31:33+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31537 | smb: server: make use of smbdirect_socket.send_io.bcredits | 2026-04-02T00:00:00.000Z | 2026-04-30T01:38:55.000Z |
| msrc_cve-2026-5447 | Heap buffer overflow in CertFromX509() via AuthorityKeyIdentifier | 2026-04-02T00:00:00.000Z | 2026-04-30T01:38:49.000Z |
| msrc_cve-2026-31521 | module: Fix kernel panic when a symbol st_shndx is out of bounds | 2026-04-02T00:00:00.000Z | 2026-04-30T01:13:42.000Z |
| msrc_cve-2026-31494 | net: macb: use the current queue number for stats | 2026-04-02T00:00:00.000Z | 2026-04-30T01:13:23.000Z |
| msrc_cve-2026-31503 | udp: Fix wildcard bind conflict check when using hash2 | 2026-04-02T00:00:00.000Z | 2026-04-30T01:12:38.000Z |
| msrc_cve-2026-31509 | nfc: nci: fix circular locking dependency in nci_close_device | 2026-04-02T00:00:00.000Z | 2026-04-30T01:12:16.000Z |
| msrc_cve-2026-25541 | Bytes is vulnerable to integer overflow in BytesMut::reserve | 2026-02-02T00:00:00.000Z | 2026-04-30T01:12:05.000Z |
| msrc_cve-2026-31522 | HID: magicmouse: avoid memory leak in magicmouse_report_fixup() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:11:54.000Z |
| msrc_cve-2026-31500 | Bluetooth: btintel: serialize btintel_hw_error() with hci_req_sync_lock | 2026-04-02T00:00:00.000Z | 2026-04-30T01:11:31.000Z |
| msrc_cve-2026-41603 | Apache Thrift: Java TSSLTransportFactory hostname verification | 2026-04-02T00:00:00.000Z | 2026-04-30T01:11:14.000Z |
| msrc_cve-2026-31507 | net/smc: fix double-free of smc_spd_priv when tee() duplicates splice pipe buffer | 2026-04-02T00:00:00.000Z | 2026-04-30T01:11:14.000Z |
| msrc_cve-2026-31483 | s390/syscalls: Add spectre boundary for syscall dispatch table | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:57.000Z |
| msrc_cve-2026-31495 | netfilter: ctnetlink: use netlink policy range checks | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:44.000Z |
| msrc_cve-2026-31485 | spi: spi-fsl-lpspi: fix teardown order issue (UAF) | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:31.000Z |
| msrc_cve-2026-31546 | net: bonding: fix NULL deref in bond_debug_rlb_hash_show | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:18.000Z |
| msrc_cve-2026-31519 | btrfs: set BTRFS_ROOT_ORPHAN_CLEANUP during subvol create | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:13.000Z |
| msrc_cve-2026-31545 | NFC: nxp-nci: allow GPIOs to sleep | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:09.000Z |
| msrc_cve-2026-31540 | drm/i915/gt: Check set_default_submission() before deferencing | 2026-04-02T00:00:00.000Z | 2026-04-30T01:10:00.000Z |
| msrc_cve-2026-5435 | Potential buffer overflow in ns_sprintrrf TSIG handling path | 2026-04-02T00:00:00.000Z | 2026-04-30T01:09:35.000Z |
| msrc_cve-2026-31518 | esp: fix skb leak with espintcp and async crypto | 2026-04-02T00:00:00.000Z | 2026-04-30T01:09:33.000Z |
| msrc_cve-2026-31510 | Bluetooth: L2CAP: Fix null-ptr-deref on l2cap_sock_ready_cb | 2026-04-02T00:00:00.000Z | 2026-04-30T01:08:58.000Z |
| msrc_cve-2026-31497 | Bluetooth: btusb: clamp SCO altsetting table indices | 2026-04-02T00:00:00.000Z | 2026-04-30T01:07:53.000Z |
| msrc_cve-2026-31523 | nvme-pci: ensure we're polling a polled queue | 2026-04-02T00:00:00.000Z | 2026-04-30T01:07:37.000Z |
| msrc_cve-2026-31504 | net: fix fanout UAF in packet_release() via NETDEV_UP race | 2026-04-02T00:00:00.000Z | 2026-04-30T01:07:11.000Z |
| msrc_cve-2026-31515 | af_key: validate families in pfkey_send_migrate() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:05:39.000Z |
| msrc_cve-2026-31496 | netfilter: nf_conntrack_expect: skip expectations in other netns via proc | 2026-04-02T00:00:00.000Z | 2026-04-30T01:05:23.000Z |
| msrc_cve-2026-31524 | HID: asus: avoid memory leak in asus_report_fixup() | 2026-04-02T00:00:00.000Z | 2026-04-30T01:04:37.000Z |
| msrc_cve-2018-5407 | CVE-2018-5407 | 2018-11-02T00:00:00.000Z | 2026-04-29T15:01:50.000Z |
| msrc_cve-2026-31458 | mm/damon/sysfs: check contexts->nr before accessing contexts_arr[0] | 2026-04-02T00:00:00.000Z | 2026-04-29T15:01:29.000Z |
| msrc_cve-2026-31474 | can: isotp: fix tx.buf use-after-free in isotp_sendmsg() | 2026-04-02T00:00:00.000Z | 2026-04-29T15:01:21.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0383 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2024-09-26T09:00:05.136774Z | 2024-09-26T09:00:05.136774Z |
| ncsc-2024-0382 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-09-26T08:52:21.805564Z | 2024-09-26T08:52:21.805564Z |
| ncsc-2024-0381 | Kwetsbaarheden verholpen in Apple MacOS | 2024-09-26T08:48:34.451990Z | 2024-09-26T08:48:34.451990Z |
| ncsc-2024-0380 | Kwetsbaarheid verholpen in pgAdmin | 2024-09-24T06:36:30.438686Z | 2024-09-24T07:31:32.768856Z |
| ncsc-2024-0379 | Kwetsbaarheden verholpen in Ivanti Cloud Services Appliance | 2024-09-20T07:57:16.737952Z | 2024-09-20T07:57:16.737952Z |
| ncsc-2024-0378 | Kwetsbaarheden verholpen in SAP producten | 2024-09-19T11:37:39.757598Z | 2024-09-19T11:37:39.757598Z |
| ncsc-2024-0376 | Kwetsbaarheden verholpen in Docker Desktop | 2024-09-18T11:25:01.116345Z | 2024-09-18T11:25:01.116345Z |
| ncsc-2024-0369 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2024-09-11T09:39:20.224400Z | 2024-09-13T17:00:35.302643Z |
| ncsc-2024-0375 | Kwetsbaarheid verholpen in Rockwell Automation FactoryTalk View Site | 2024-09-13T08:52:23.143943Z | 2024-09-13T08:52:23.143943Z |
| ncsc-2024-0374 | Kwetsbaarheid verholpen in Rockwell Automation ThinManager | 2024-09-13T08:46:33.745410Z | 2024-09-13T08:46:33.745410Z |
| ncsc-2024-0373 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-09-13T08:44:24.003809Z | 2024-09-13T08:44:24.003809Z |
| ncsc-2024-0372 | Kwetsbaarheden verholpen in Citrix Workspace App for Windows | 2024-09-13T08:42:05.882665Z | 2024-09-13T08:42:05.882665Z |
| ncsc-2024-0371 | Kwetsbaarheden verholpen in Cisco IOS XR | 2024-09-13T08:40:26.656280Z | 2024-09-13T08:40:26.656280Z |
| ncsc-2024-0370 | Kwetsbaarheden verholpen in Solarwinds Access Rights Manager | 2024-09-13T08:30:38.806820Z | 2024-09-13T08:30:38.806820Z |
| ncsc-2024-0368 | Kwetsbaarheden verholpen in Adobe producten | 2024-09-11T09:31:21.515977Z | 2024-09-11T09:31:21.515977Z |
| ncsc-2024-0367 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2024-09-10T18:28:04.110959Z | 2024-09-10T18:28:04.110959Z |
| ncsc-2024-0366 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-09-10T18:27:15.880741Z | 2024-09-10T18:27:15.880741Z |
| ncsc-2024-0365 | Kwetsbaarheden verholpen in Microsoft Office | 2024-09-10T18:23:10.239728Z | 2024-09-10T18:23:10.239728Z |
| ncsc-2024-0364 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2024-09-10T18:22:18.355522Z | 2024-09-10T18:22:18.355522Z |
| ncsc-2024-0363 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-09-10T18:21:28.305189Z | 2024-09-10T18:21:28.305189Z |
| ncsc-2024-0362 | Kwetsbaarheden verholpen in Siemens producten | 2024-09-10T18:20:41.668720Z | 2024-09-10T18:20:41.668720Z |
| ncsc-2024-0353 | Kwetsbaarheid verholpen in Sonicwall SonicOS | 2024-08-27T12:45:37.679365Z | 2024-09-10T12:34:18.650826Z |
| ncsc-2024-0361 | Kwetsbaarheden verholpen in QNAP QTS en QTS Hero | 2024-09-10T10:56:51.207746Z | 2024-09-10T10:56:51.207746Z |
| ncsc-2024-0360 | Kwetsbaarheid verholpen in Kemp LoadMaster | 2024-09-06T08:02:25.414309Z | 2024-09-06T08:02:25.414309Z |
| ncsc-2024-0358 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-09-05T12:02:20.203769Z | 2024-09-05T12:02:20.203769Z |
| ncsc-2024-0340 | Kwetsbaarheid verholpen in Ivanti Virtual Traffic Manager | 2024-08-14T09:48:46.175634Z | 2024-09-03T11:19:00.763993Z |
| ncsc-2024-0357 | Kwetsbaarheden verholpen in Zyxel Flex en USG Firewalls | 2024-09-03T09:51:27.134213Z | 2024-09-03T09:51:27.134213Z |
| ncsc-2024-0356 | Kwetsbaarheid verholpen in Zyxel Access Points en Secure Routers | 2024-09-03T09:45:01.012004Z | 2024-09-03T09:45:01.012004Z |
| ncsc-2024-0355 | Kwetsbaarheden verholpen in Progress WhatsUp Gold | 2024-08-30T13:44:34.239519Z | 2024-09-02T11:51:17.688561Z |
| ncsc-2024-0354 | Kwetsbaarheden verholpen in Progress WS_FTP server | 2024-08-30T13:42:50.517100Z | 2024-08-30T13:42:50.517100Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10178-1 | libmunge2-0.5.18-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10177-1 | gnutls-3.8.12-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10176-1 | freerdp2-2.11.7-4.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10175-1 | cargo-audit-0.22.1~git0.efcde93-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10174-1 | assimp-devel-6.0.4-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10173-1 | apptainer-1.4.5-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:20193-1 | Security update for orthanc, gdcm, orthanc-authorization, orthanc-dicomweb, orthanc-gdcm, orthanc-indexer, orthanc-mysql, orthanc-neuro, orthanc-postgresql, orthanc-python, orthanc-stl, orthanc-tcia, orthanc-wsi, python-pyorthanc | 2026-02-10T22:29:40Z | 2026-02-10T22:29:40Z |
| opensuse-su-2026:20191-1 | Security update for trivy | 2026-02-10T21:52:10Z | 2026-02-10T21:52:10Z |
| opensuse-su-2026:20192-1 | Security update for tailscale | 2026-02-10T21:45:05Z | 2026-02-10T21:45:05Z |
| opensuse-su-2026:10172-1 | wicked2nm-1.4.1-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10171-1 | lemon-3.51.2-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10170-1 | keylime-ima-policy-0.2.8+116-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10169-1 | libp11-kit0-0.26.2-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10168-1 | openQA-5.1770718745.ce2072d3-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10167-1 | libxml2-16-2.14.5-3.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10166-1 | libsoup-2_4-1-2.74.3-15.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10165-1 | keylime-config-7.14.0+0-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10164-1 | go1.25-1.25.7-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10163-1 | go1.24-1.24.13-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:20183-1 | Security update for chromium | 2026-02-07T14:42:36Z | 2026-02-07T14:42:36Z |
| opensuse-su-2026:20184-1 | Security update for python-Django | 2026-02-07T13:45:17Z | 2026-02-07T13:45:17Z |
| opensuse-su-2026:10162-1 | localsearch-3.10.2-2.1 on GA media | 2026-02-07T00:00:00Z | 2026-02-07T00:00:00Z |
| opensuse-su-2026:20186-1 | Security update for libsoup | 2026-02-06T11:13:48Z | 2026-02-06T11:13:48Z |
| opensuse-su-2026:20185-1 | Security update for cockpit-packages | 2026-02-06T09:31:50Z | 2026-02-06T09:31:50Z |
| opensuse-su-2026:20182-1 | Security update for cockpit | 2026-02-06T03:08:03Z | 2026-02-06T03:08:03Z |
| opensuse-su-2026:20181-1 | Security update for cockpit-subscriptions | 2026-02-06T02:48:38Z | 2026-02-06T02:48:38Z |
| opensuse-su-2026:10161-1 | python311-azure-core-1.38.0-2.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10160-1 | python311-Django-5.2.11-1.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10159-1 | opencloud-server-5.0.2-1.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10158-1 | nginx-1.29.5-1.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:0664 | Red Hat Security Advisory: Release of OpenShift Serverless Logic 1.35.0 security update & enhancements | 2025-01-23T13:02:37+00:00 | 2026-05-09T02:50:03+00:00 |
| rhsa-2025:0654 | Red Hat Security Advisory: OpenShift Container Platform 4.17.14 bug fix and security update | 2025-01-28T04:28:50+00:00 | 2026-05-09T02:50:02+00:00 |
| rhsa-2025:0014 | Red Hat Security Advisory: OpenShift Container Platform 4.12.71 bug fix and security update | 2025-01-09T02:15:46+00:00 | 2026-05-09T02:50:01+00:00 |
| rhsa-2024:9615 | Red Hat Security Advisory: OpenShift Container Platform 4.16.23 bug fix and security update | 2024-11-20T00:46:32+00:00 | 2026-05-09T02:49:59+00:00 |
| rhsa-2024:8704 | Red Hat Security Advisory: Kube Descheduler Operator for Red Hat OpenShift 5.0.2 for RHEL 9 | 2024-12-02T14:11:34+00:00 | 2026-05-09T02:49:59+00:00 |
| rhsa-2024:8677 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.12.6 security update | 2024-10-30T18:18:28+00:00 | 2026-05-09T02:49:57+00:00 |
| rhsa-2024:8676 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17.0 Security, Enhancement, & Bug Fix Update | 2024-10-30T14:25:22+00:00 | 2026-05-09T02:49:56+00:00 |
| rhsa-2024:8434 | Red Hat Security Advisory: OpenShift Container Platform 4.17.3 security update | 2024-10-29T17:50:43+00:00 | 2026-05-09T02:49:56+00:00 |
| rhsa-2024:8415 | Red Hat Security Advisory: OpenShift Container Platform 4.16.19 bug fix and security update | 2024-10-30T01:12:50+00:00 | 2026-05-09T02:49:54+00:00 |
| rhsa-2024:8040 | Red Hat Security Advisory: Cluster Observability Operator 0.4.1 | 2024-10-14T01:36:23+00:00 | 2026-05-09T02:49:53+00:00 |
| rhsa-2024:7922 | Red Hat Security Advisory: OpenShift Container Platform 4.17.1 bug fix and security update | 2024-10-16T02:39:40+00:00 | 2026-05-09T02:49:53+00:00 |
| rhsa-2024:7184 | Red Hat Security Advisory: OpenShift Container Platform 4.14.38 security update | 2024-10-03T11:01:15+00:00 | 2026-05-09T02:49:53+00:00 |
| rhsa-2024:7548 | Red Hat Security Advisory: Run Once Duration Override Operator for Red Hat OpenShift 1.2.0 for RHEL 9 | 2024-10-16T00:34:49+00:00 | 2026-05-09T02:49:52+00:00 |
| rhsa-2024:6824 | Red Hat Security Advisory: OpenShift Container Platform 4.16.14 security update | 2024-09-24T15:28:01+00:00 | 2026-05-09T02:49:50+00:00 |
| rhsa-2024:6755 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.2 security and bug fix update | 2024-09-18T11:56:25+00:00 | 2026-05-09T02:49:49+00:00 |
| rhsa-2024:6409 | Red Hat Security Advisory: OpenShift Container Platform 4.15.31 bug fix and security update | 2024-09-11T13:39:54+00:00 | 2026-05-09T02:49:43+00:00 |
| rhsa-2024:6221 | Red Hat Security Advisory: The Red Hat OpenShift Builds 1.1.0 General Availability | 2024-09-03T11:45:04+00:00 | 2026-05-09T02:49:41+00:00 |
| rhsa-2024:6122 | Red Hat Security Advisory: OpenShift Container Platform 4.18.1 bug fix and security update | 2025-02-25T04:38:13+00:00 | 2026-05-09T02:49:39+00:00 |
| rhsa-2024:6004 | Red Hat Security Advisory: OpenShift Container Platform 4.16.10 bug fix and security update | 2024-09-03T19:13:56+00:00 | 2026-05-09T02:49:39+00:00 |
| rhsa-2024:5422 | Red Hat Security Advisory: OpenShift Container Platform 4.16.8 bug fix and security update | 2024-08-20T15:21:42+00:00 | 2026-05-09T02:49:38+00:00 |
| rhsa-2024:5054 | Red Hat Security Advisory: OpenShift Virtualization 4.16.1 Images security update | 2024-08-06T16:21:05+00:00 | 2026-05-09T02:49:37+00:00 |
| rhsa-2024:5013 | Red Hat Security Advisory: The Red Hat OpenShift Builds Client 1.1.0 General Availability | 2024-08-05T15:40:28+00:00 | 2026-05-09T02:49:37+00:00 |
| rhsa-2024:4631 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.15.0 release | 2024-07-18T17:11:22+00:00 | 2026-05-09T02:49:37+00:00 |
| rhsa-2024:4626 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.6 security update | 2024-07-18T13:37:38+00:00 | 2026-05-09T02:49:36+00:00 |
| rhsa-2024:4597 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.15 OpenShift Jenkins security update | 2024-07-17T18:49:17+00:00 | 2026-05-09T02:49:35+00:00 |
| rhsa-2024:4591 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.0 security, enhancement & bug fix update | 2024-07-17T13:09:39+00:00 | 2026-05-09T02:49:33+00:00 |
| rhsa-2024:4455 | Red Hat Security Advisory: OpenShift Virtualization 4.16.0 Images security update | 2024-07-10T12:40:58+00:00 | 2026-05-09T02:49:32+00:00 |
| rhsa-2024:4246 | Red Hat Security Advisory: container-tools security update | 2024-07-02T15:45:28+00:00 | 2026-05-09T02:49:31+00:00 |
| rhsa-2024:4163 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.12.4 security update | 2024-06-27T12:38:04+00:00 | 2026-05-09T02:49:30+00:00 |
| rhsa-2024:4150 | Red Hat Security Advisory: OpenShift Container Platform 4.15.20 security update | 2024-07-02T16:43:39+00:00 | 2026-05-09T02:49:27+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-588101 | SSA-588101: Multiple File Parsing Vulnerabilities in Parasolid | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-480829 | SSA-480829: Cross-Site Scripting Vulnerabilities in SCALANCE X Switches | 2018-06-12T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-443566 | SSA-443566: Authentication Bypass in SCALANCE X Switches Families | 2020-01-14T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-436469 | SSA-436469: TCP Vulnerability in APOGEE/TALON Field Panels | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-412672 | SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-363821 | SSA-363821: Multiple Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-360681 | SSA-360681: Datalogics File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-333517 | SSA-333517: Multiple Vulnerabilities in SCALANCE SC-600 Family before V3.0 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-312271 | SSA-312271: Unquoted Search Path Vulnerability in Windows-based Industrial Software Applications | 2020-06-09T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-274900 | SSA-274900: Use of Hardcoded Key in SCALANCE X Devices Under Certain Conditions | 2021-01-12T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-274282 | SSA-274282: Cross Site Scripting Vulnerability in PLM Help Server V4.2 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-224632 | SSA-224632: Improper Access Control Vulnerability in Mendix Email Connector Module | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-853037 | SSA-853037: File Parsing Vulnerabilities in Parasolid | 2022-11-08T00:00:00Z | 2022-11-08T00:00:00Z |
| ssa-501891 | SSA-501891: Cross-Site Scripting Vulnerability in SCALANCE X-200 and X-200IRT Families | 2022-10-11T00:00:00Z | 2022-11-08T00:00:00Z |
| ssa-400332 | SSA-400332: Insufficient Design IP Protection in IEEE 1735 Recommended Practice - Impact to Questa and ModelSim | 2021-12-14T00:00:00Z | 2022-11-08T00:00:00Z |
| ssa-371761 | SSA-371761: Arbitrary Code Execution Vulnerability in the Logback Component of SINEC NMS before V1.0.3 | 2022-11-08T00:00:00Z | 2022-11-08T00:00:00Z |
| ssa-362164 | SSA-362164: Predictable Initial Sequence Numbers in the TCP/IP Stack of Nucleus RTOS | 2021-02-09T00:00:00Z | 2022-11-08T00:00:00Z |
| ssa-640732 | SSA-640732: Authentication Bypass Vulnerability in Siveillance Video Mobile Server | 2022-10-21T00:00:00Z | 2022-10-21T00:00:00Z |
| ssa-928782 | SSA-928782: Firmware Authenticity Vulnerability in LOGO! 8 BM Devices | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-917476 | SSA-917476: Multiple Vulnerabilities in SCALANCE W1750D | 2021-11-09T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-836027 | SSA-836027: Client-side Authentication in Desigo CC and Cerberus DMS | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-685781 | SSA-685781: Multiple Vulnerabilities in Apache HTTP Server Affecting Siemens Products | 2022-06-14T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-649853 | SSA-649853: Improper Certificate Validation Vulnerability in Industrial Edge Management | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-611756 | SSA-611756: JT File Parsing Vulnerability in JTTK and Simcenter Femap | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-568427 | SSA-568427: Weak Key Protection Vulnerability in SIMATIC S7-1200 and S7-1500 CPU Families | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-384224 | SSA-384224: Denial of Service Vulnerability in SIMATIC HMI Panels | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-360783 | SSA-360783: Multiple Webserver Vulnerabilities in Desigo PXM Devices | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-280624 | SSA-280624: Multiple Vulnerabilities in SCALANCE W1750D | 2021-10-12T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-258115 | SSA-258115: DWG File Parsing Vulnerability in Solid Edge before SE2022MP9 | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-254054 | SSA-254054: Spring Framework Vulnerability (Spring4Shell or SpringShell, CVE-2022-22965) - Impact to Siemens Products | 2022-04-19T00:00:00Z | 2022-10-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21083-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21082-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21081-1 | Security update for the Linux Kernel RT (Live Patch 15 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21055-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21054-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21053-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21052-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21051-1 | Security update for the Linux Kernel RT (Live Patch 15 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21080-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:33Z | 2026-04-09T13:20:33Z |
| suse-su-2026:21050-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:33Z | 2026-04-09T13:20:33Z |
| suse-su-2026:21079-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21078-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21049-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21048-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21077-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21076-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21047-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21046-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21075-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21074-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21045-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21044-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21073-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21072-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21071-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21070-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21043-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21042-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21041-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21040-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:20145 | Low: shadow-utils security update | 2025-11-11T00:00:00Z | 2025-11-24T10:50:07Z |
| alsa-2025:20478 | Moderate: zziplib security update | 2025-11-11T00:00:00Z | 2025-11-24T10:49:03Z |
| alsa-2025:20155 | Moderate: binutils security update | 2025-11-11T00:00:00Z | 2025-11-24T10:47:58Z |
| alsa-2025:20181 | Important: pam security update | 2025-11-11T00:00:00Z | 2025-11-24T10:46:53Z |
| alsa-2025:21843 | Important: thunderbird security update | 2025-11-20T00:00:00Z | 2025-11-24T10:41:50Z |
| alsa-2025:21035 | Moderate: xorg-x11-server-Xwayland security update | 2025-11-11T00:00:00Z | 2025-11-24T09:01:21Z |
| alsa-2025:21034 | Important: bind security update | 2025-11-11T00:00:00Z | 2025-11-24T09:00:19Z |
| alsa-2025:21032 | Important: libsoup3 security update | 2025-11-11T00:00:00Z | 2025-11-24T08:58:48Z |
| alsa-2025:21030 | Important: expat security update | 2025-11-11T00:00:00Z | 2025-11-24T08:57:33Z |
| alsa-2025:21015 | Moderate: vim security update | 2025-11-11T00:00:00Z | 2025-11-24T08:56:33Z |
| alsa-2025:21013 | Moderate: libssh security update | 2025-11-11T00:00:00Z | 2025-11-24T08:54:57Z |
| alsa-2025:21002 | Important: squid security update | 2025-11-11T00:00:00Z | 2025-11-24T08:53:45Z |
| alsa-2025:20998 | Important: libtiff security update | 2025-11-11T00:00:00Z | 2025-11-24T08:51:54Z |
| alsa-2025:21815 | Moderate: delve and golang security update | 2025-11-20T00:00:00Z | 2025-11-20T10:59:53Z |
| alsa-2025:21232 | Important: container-tools:rhel8 security update | 2025-11-13T00:00:00Z | 2025-11-20T10:07:52Z |
| alsa-2025:21140 | Important: idm:DL1 security update | 2025-11-12T00:00:00Z | 2025-11-20T09:13:27Z |
| alsa-2025:19719 | Important: pcs security update | 2025-11-04T00:00:00Z | 2025-11-20T09:07:50Z |
| alsa-2025:21776 | Important: expat security update | 2025-11-19T00:00:00Z | 2025-11-20T09:03:52Z |
| alsa-2025:21397 | Moderate: kernel-rt security update | 2025-11-17T00:00:00Z | 2025-11-19T14:52:45Z |
| alsa-2025:21398 | Moderate: kernel security update | 2025-11-17T00:00:00Z | 2025-11-19T14:49:27Z |
| alsa-2025:21693 | Important: haproxy security update | 2025-11-18T00:00:00Z | 2025-11-19T10:52:41Z |
| alsa-2025:21702 | Important: podman security update | 2025-11-18T00:00:00Z | 2025-11-19T10:51:29Z |
| alsa-2025:21628 | Critical: lasso security update | 2025-11-17T00:00:00Z | 2025-11-19T10:11:06Z |
| alsa-2025:20955 | Important: redis:7 security update | 2025-11-11T00:00:00Z | 2025-11-19T09:42:38Z |
| alsa-2025:21139 | Important: python-kdcproxy security update | 2025-11-12T00:00:00Z | 2025-11-19T09:41:31Z |
| alsa-2025:21462 | Critical: lasso security update | 2025-11-17T00:00:00Z | 2025-11-19T09:40:25Z |
| alsa-2025:21110 | Important: bind security update | 2025-11-12T00:00:00Z | 2025-11-19T09:39:10Z |
| alsa-2025:20963 | Moderate: qt5-qt3d security update | 2025-11-11T00:00:00Z | 2025-11-19T09:37:23Z |
| alsa-2025:20961 | Moderate: xorg-x11-server security update | 2025-11-11T00:00:00Z | 2025-11-19T09:36:21Z |
| alsa-2025:20960 | Moderate: xorg-x11-server-Xwayland security update | 2025-11-11T00:00:00Z | 2025-11-19T09:34:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-1144 | Security exception in graphql.schema.GraphQLTypeUtil.simplePrint | 2024-09-24T00:15:39.106189Z | 2024-09-24T00:15:39.106491Z |
| osv-2024-1133 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-09-24T00:07:55.850153Z | 2024-09-24T00:07:55.850498Z |
| osv-2024-1128 | Segv on unknown address in udiv | 2024-09-24T00:01:39.913285Z | 2024-09-24T00:01:39.913799Z |
| osv-2024-1102 | Security exception in java.xml/com.sun.org.apache.xalan.internal.xsltc.trax.DOM2TO.parse | 2024-09-19T00:06:40.360965Z | 2024-09-19T00:06:40.361615Z |
| osv-2024-1076 | Heap-buffer-overflow in readBytes48 | 2024-09-17T00:02:06.643980Z | 2024-09-17T00:02:06.644304Z |
| osv-2024-1062 | UNKNOWN WRITE in std::__1::recursive_mutex::lock | 2024-09-13T00:05:28.000784Z | 2024-09-13T00:05:28.001152Z |
| osv-2024-1059 | UNKNOWN READ in chunk_free_object | 2024-09-13T00:04:01.817618Z | 2024-09-13T00:04:01.817953Z |
| osv-2024-1056 | UNKNOWN WRITE in bfd_elf_get_str_section | 2024-09-13T00:02:11.288214Z | 2024-09-13T00:02:11.288549Z |
| osv-2024-1054 | Bad-cast to Assimp::LogStream from invalid vptr | 2024-09-13T00:00:21.771518Z | 2024-09-13T00:00:21.772014Z |
| osv-2023-685 | Invalid-free in reset_context | 2023-08-11T14:02:10.018940Z | 2024-09-01T14:21:29.336035Z |
| osv-2023-692 | Invalid-free in reset_context | 2023-08-13T14:00:16.114233Z | 2024-09-01T14:21:14.987075Z |
| osv-2023-405 | Heap-buffer-overflow in _lou_stringHash | 2023-05-19T14:00:18.190498Z | 2024-08-31T14:18:34.306703Z |
| osv-2024-349 | Security exception in java.base/java.lang.AbstractStringBuilder.<init> | 2024-04-30T00:03:33.576785Z | 2024-08-27T14:19:50.205074Z |
| osv-2023-1326 | Security exception in java.base/java.lang.reflect.Array.newArray | 2023-12-18T00:05:04.854273Z | 2024-08-27T14:16:42.028102Z |
| osv-2023-1221 | Security exception in jaz.Zer.reportFinding | 2023-11-26T13:02:48.995906Z | 2024-08-27T14:16:27.390478Z |
| osv-2022-871 | Security exception in java.base/java.util.Collections$UnmodifiableCollection.forEach | 2022-09-10T00:00:24.780487Z | 2024-08-27T14:15:10.826875Z |
| osv-2022-1275 | Security exception in java.desktop/java.awt.image.DataBufferInt.<init> | 2023-05-28T14:00:35.487433Z | 2024-08-27T14:11:30.518706Z |
| osv-2024-1045 | UNKNOWN READ in glslang::TInfoSinkBase::location | 2024-08-23T00:05:10.053074Z | 2024-08-23T00:05:10.053507Z |
| osv-2024-1044 | UNKNOWN READ in H5FL_reg_malloc | 2024-08-22T00:03:34.815128Z | 2024-08-22T00:03:34.815744Z |
| osv-2024-1043 | Heap-buffer-overflow in simdutf::haswell::implementation::convert_utf8_to_latin1 | 2024-08-21T00:14:12.263763Z | 2024-08-21T14:20:12.835561Z |
| osv-2024-1042 | UNKNOWN READ in chunk_free_object | 2024-08-21T00:13:34.712386Z | 2024-08-21T00:13:34.712770Z |
| osv-2024-1041 | UNKNOWN READ in chunk_free_object | 2024-08-21T00:11:49.349439Z | 2024-08-21T00:11:49.350156Z |
| osv-2024-1036 | UNKNOWN READ in chunk_free_object | 2024-08-19T00:04:37.123473Z | 2024-08-19T00:04:37.124078Z |
| osv-2024-1034 | Heap-buffer-overflow in simdutf::haswell::implementation::convert_utf8_to_utf16be | 2024-08-18T00:08:22.168066Z | 2024-08-18T14:21:16.718581Z |
| osv-2024-1029 | Stack-buffer-overflow in gf_hevc_parse_nalu_bs | 2024-08-17T00:13:24.697197Z | 2024-08-17T00:13:24.697938Z |
| osv-2024-996 | Use-of-uninitialized-value in cups_array_find | 2024-08-16T00:15:52.987192Z | 2024-08-16T00:15:52.987525Z |
| osv-2024-994 | Use-of-uninitialized-value in packet_parse | 2024-08-16T00:15:48.093497Z | 2024-08-16T00:15:48.093872Z |
| osv-2024-985 | Heap-double-free in libssh2_default_free | 2024-08-16T00:15:23.884058Z | 2024-08-16T00:15:23.884369Z |
| osv-2024-983 | UNKNOWN READ in ireclaim | 2024-08-16T00:15:21.362695Z | 2024-08-16T00:15:21.363094Z |
| osv-2024-969 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2024-08-16T00:14:31.527023Z | 2024-08-16T00:14:31.527538Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2021-0080 | Links in archive can create arbitrary directories | 2021-07-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0077 | `better-macro` has deliberate RCE to prove a point | 2021-07-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0076 | libsecp256k1 allows overflowing signatures | 2021-07-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0075 | Flaw in `FieldVar::mul_by_inverse` allows unsound R1CS constraint systems | 2021-07-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0074 | Incorrect handling of embedded SVG and MathML leads to mutation XSS | 2021-07-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0073 | Conversion from `prost_types::Timestamp` to `SystemTime` can cause an overflow and panic | 2021-07-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0072 | Task dropped in wrong thread when aborting `LocalSet` task | 2021-07-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0071 | `grep-cli` may run arbitrary executables on Windows | 2021-06-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0070 | VecStorage Deserialize Allows Violation of Length Invariant | 2021-06-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0068 | Soundness issue in `iced-x86` versions <= 1.10.3 | 2021-05-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0066 | Denial of service on EVM execution due to memory over-allocation | 2021-05-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0065 | anymap is unmaintained. | 2021-05-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0063 | XSS in `comrak` | 2021-05-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0058 | Null pointer deref in `X509_issuer_and_serial_hash()` | 2021-05-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0057 | Integer overflow in CipherUpdate | 2021-05-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0056 | CA certificate check bypass with X509_V_FLAG_X509_STRICT | 2021-05-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0055 | NULL pointer deref in signature_algorithms processing | 2021-05-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0054 | Archives may contain uninitialized memory | 2021-04-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0053 | 'merge_sort::merge()' crashes with double-free for `T: Drop` | 2021-03-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0052 | Multiple functions can cause double-frees | 2021-02-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0051 | KeyValueReader passes uninitialized memory to Read instance | 2021-01-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0050 | swap_index can write out of bounds and return uninitialized memory | 2021-02-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0049 | `through` and `through_and` causes a double free if the map function panics | 2021-02-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0048 | StackVec::extend can write out of bounds when size_hint is incorrect | 2021-02-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0047 | SliceDeque::drain_filter can double drop an element if the predicate panics | 2021-02-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0046 | misc::vec_with_size() can drop uninitialized memory if clone panics | 2021-02-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0045 | FromIterator implementation for Vector/Matrix can drop uninitialized memory | 2021-01-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0044 | Use after free possible in `uri::Formatter` on panic | 2021-02-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0043 | PartialReader passes uninitialized memory to user-provided Read | 2021-02-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0042 | insert_many can drop elements twice on panic | 2021-01-26T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2026-2619 | Incorrect Authorization in GitLab | 2026-04-13T06:09:54.420Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-2104 | Authorization Bypass Through User-Controlled Key in GitLab | 2026-04-13T06:09:50.678Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-1516 | Improper Control of Generation of Code ('Code Injection') in GitLab | 2026-04-13T06:09:35.915Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-1101 | Improper Validation of Specified Quantity in Input in GitLab | 2026-04-13T06:09:20.803Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2025-9484 | Missing Authorization in GitLab | 2026-04-13T06:08:58.190Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2025-12664 | Improper Validation of Specified Quantity in Input in GitLab | 2026-04-13T06:05:51.788Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-4498 | Execution with Unnecessary Privileges in Kibana Leading to reading index data beyond their direct Elasticsearch RBAC scope | 2026-04-13T05:38:40.214Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33460 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:38:37.022Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33459 | Uncontrolled Resource Consumption in Kibana Leading to Denial of Service | 2026-04-13T05:38:35.203Z | 2026-04-13T06:11:47.324Z |
| bit-airflow-2026-34538 | Apache Airflow: Authorization bypass in DagRun wait endpoint (XCom exposure) | 2026-04-13T05:38:18.100Z | 2026-04-13T06:11:47.324Z |
| bit-airflow-2025-57735 | Apache Airflow: Airflow Logout Not Invalidating JWT | 2026-04-13T05:37:57.108Z | 2026-04-13T06:11:47.324Z |
| bit-activemq-2026-40046 | Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT: Missing fix for CVE-2025-66168: MQTT control packet remaining length field is not properly validated | 2026-04-13T05:36:23.428Z | 2026-04-13T06:11:47.324Z |
| bit-activemq-2025-66168 | Apache ActiveMQ, Apache ActiveMQ All Module, Apache ActiveMQ MQTT Module: MQTT control packet remaining length field is not properly validated | 2026-03-06T08:36:37.326Z | 2026-04-13T06:11:47.324Z |
| bit-python-2026-1299 | email BytesGenerator header injection due to unquoted newlines | 2026-02-03T08:53:00.053Z | 2026-04-10T09:26:18.172Z |
| bit-python-2026-0865 | wsgiref.headers.Headers allows header newline injection | 2026-01-26T14:50:04.789Z | 2026-04-10T09:26:18.172Z |
| bit-python-2026-0672 | Header injection in http.cookies.Morsel | 2026-01-26T14:50:03.015Z | 2026-04-10T09:26:18.172Z |
| bit-python-2025-6075 | Quadratic complexity in os.path.expandvars() with user-controlled template | 2025-12-05T11:13:34.373Z | 2026-04-10T09:26:18.172Z |
| bit-python-2025-15282 | Header injection via newlines in data URL mediatype | 2026-01-26T14:49:40.631Z | 2026-04-10T09:26:18.172Z |
| bit-python-2025-11468 | Folding email comments of unfoldable characters doesn't preserve parenthesis | 2026-01-26T14:49:32.088Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2026-1299 | email BytesGenerator header injection due to unquoted newlines | 2026-02-03T08:45:06.015Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2026-0865 | wsgiref.headers.Headers allows header newline injection | 2026-01-26T14:43:33.890Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2026-0672 | Header injection in http.cookies.Morsel | 2026-01-26T14:43:32.238Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2025-6075 | Quadratic complexity in os.path.expandvars() with user-controlled template | 2025-12-05T11:08:28.184Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2025-15282 | Header injection via newlines in data URL mediatype | 2026-01-26T14:43:08.856Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2025-11468 | Folding email comments of unfoldable characters doesn't preserve parenthesis | 2026-01-26T14:42:59.991Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-23899 | Joomla! Core - [20260306] - Improper access check in webservice endpoints | 2026-04-10T08:49:24.143Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-23898 | Joomla! Core - [20260305] - Arbitrary file deletion in com_joomlaupdate | 2026-04-10T08:49:22.196Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21632 | Joomla! Core - [20260304] - XSS vectors in various article title outputs | 2026-04-10T08:49:20.111Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21631 | Joomla! Core - [20260303] - XSS vector in com_associations comparison view | 2026-04-10T08:49:17.625Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21630 | Joomla! Core - [20260302] - SQL injection in com_content articles webservice endpoint | 2026-04-10T08:49:15.352Z | 2026-04-10T09:26:18.172Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-np17404 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:58:24.395667Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nl96892 | Within HostnameError | 2026-01-30T16:31:25.336110Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nj87139 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-01-30T14:17:21.473350Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ni96678 | Within HostnameError | 2026-01-30T15:06:52.947220Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ng71279 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:23:51.400746Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nf19624 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T17:20:26.466437Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nd19988 | Cancelling a query (e | 2026-01-30T14:59:22.824513Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nd18869 | tar | 2026-01-30T16:20:55.683557Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-na36743 | Within HostnameError | 2026-01-30T16:35:55.379246Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mz27698 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:39:52.940858Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mu17611 | tar | 2026-01-30T15:13:23.048582Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ml51665 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:20:55.711028Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mj64494 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T13:59:20.370058Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mj51212 | Cancelling a query (e | 2026-01-30T15:40:23.782215Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mi26039 | Within HostnameError | 2026-01-30T14:49:22.768843Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mf93723 | Within HostnameError | 2026-01-30T16:03:24.521286Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-me47927 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:43:24.066833Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mb75553 | vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record | 2026-01-30T16:26:25.443727Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ma27248 | Cancelling a query (e | 2026-01-30T16:28:55.356497Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-lz10721 | Within HostnameError | 2026-01-30T16:40:55.517816Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ly33846 | Within HostnameError | 2026-01-30T15:16:23.051630Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-lp38773 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.100242Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ll43287 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:50:54.603931Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ld23143 | Cancelling a query (e | 2026-01-30T14:52:52.766441Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-la33013 | Within HostnameError | 2026-01-30T14:40:22.526589Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-la13761 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-01-30T14:05:50.594365Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kz63902 | tar | 2026-01-30T14:41:22.559595Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kz60560 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:19:55.200542Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kz30232 | Go before 1 | 2026-01-30T16:39:25.872575Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kv78041 | processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input | 2026-01-30T14:56:23.125184Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2004-ALE-012 | Vulnérabilité d'Internet Explorer | 2004-11-09T00:00:00.000000 | 2004-12-02T00:00:00.000000 |
| certa-2004-ale-011 | Diffusion de programmes exploitant la faille GDI+ | 2004-09-23T00:00:00.000000 | 2004-09-23T00:00:00.000000 |
| CERTA-2004-ALE-011 | Diffusion de programmes exploitant la faille GDI+ | 2004-09-23T00:00:00.000000 | 2004-09-23T00:00:00.000000 |
| certa-2004-ale-010 | Vulnérabilité du service Telnet de Cisco IOS | 2004-08-30T00:00:00.000000 | 2004-08-30T00:00:00.000000 |
| CERTA-2004-ALE-010 | Vulnérabilité du service Telnet de Cisco IOS | 2004-08-30T00:00:00.000000 | 2004-08-30T00:00:00.000000 |
| certa-2004-ale-004 | Vulnérabilité du composant dtlogin de CDE | 2004-03-26T00:00:00.000000 | 2004-08-05T00:00:00.000000 |
| CERTA-2004-ALE-004 | Vulnérabilité du composant dtlogin de CDE | 2004-03-26T00:00:00.000000 | 2004-08-05T00:00:00.000000 |
| certa-2004-ale-009 | Vulnérabilités d'Internet Explorer | 2004-06-09T00:00:00.000000 | 2004-08-03T00:00:00.000000 |
| CERTA-2004-ALE-009 | Vulnérabilités d'Internet Explorer | 2004-06-09T00:00:00.000000 | 2004-08-03T00:00:00.000000 |
| certa-2004-ale-008 | Vulnérabilité de Safari | 2004-05-19T00:00:00.000000 | 2004-05-24T00:00:00.000000 |
| CERTA-2004-ALE-008 | Vulnérabilité de Safari | 2004-05-19T00:00:00.000000 | 2004-05-24T00:00:00.000000 |
| certa-2004-ale-007 | Exploitation de la vulnérabilité LSASS sous Windows : appration du ver Sasser | 2004-05-02T00:00:00.000000 | 2004-05-02T00:00:00.000000 |
| CERTA-2004-ALE-007 | Exploitation de la vulnérabilité LSASS sous Windows : appration du ver Sasser | 2004-05-02T00:00:00.000000 | 2004-05-02T00:00:00.000000 |
| certa-2004-ale-006 | Vulnérabilité SMB sous Windows | 2004-04-28T00:00:00.000000 | 2004-04-28T00:00:00.000000 |
| CERTA-2004-ALE-006 | Vulnérabilité SMB sous Windows | 2004-04-28T00:00:00.000000 | 2004-04-28T00:00:00.000000 |
| certa-2004-ale-005 | Vulnérabilité d'Internet Explorer | 2004-04-09T00:00:00.000000 | 2004-04-15T00:00:00.000000 |
| CERTA-2004-ALE-005 | Vulnérabilité d'Internet Explorer | 2004-04-09T00:00:00.000000 | 2004-04-15T00:00:00.000000 |
| certa-2004-ale-003 | Propagation du ver Phatbot | 2004-03-19T00:00:00.000000 | 2004-03-19T00:00:00.000000 |
| CERTA-2004-ALE-003 | Propagation du ver Phatbot | 2004-03-19T00:00:00.000000 | 2004-03-19T00:00:00.000000 |
| certa-2004-ale-002 | Propagation du virux Bizex | 2004-02-26T00:00:00.000000 | 2004-02-26T00:00:00.000000 |
| CERTA-2004-ALE-002 | Propagation du virux Bizex | 2004-02-26T00:00:00.000000 | 2004-02-26T00:00:00.000000 |
| certa-2003-ale-006 | Vulnérabilité dans l'affichage des adresses réticulaires | 2003-12-19T00:00:00.000000 | 2004-02-03T00:00:00.000000 |
| CERTA-2003-ALE-006 | Vulnérabilité dans l'affichage des adresses réticulaires | 2003-12-19T00:00:00.000000 | 2004-02-03T00:00:00.000000 |
| certa-2004-ale-001 | Obstacles à la résolution d'incidents | 2004-01-30T00:00:00.000000 | 2004-01-30T00:00:00.000000 |
| CERTA-2004-ALE-001 | Obstacles à la résolution d'incidents | 2004-01-30T00:00:00.000000 | 2004-01-30T00:00:00.000000 |
| certa-2003-ale-004 | Vulnérabilité d'Internet Explorer | 2003-09-10T00:00:00.000000 | 2003-10-06T00:00:00.000000 |
| CERTA-2003-ALE-004 | Vulnérabilité d'Internet Explorer | 2003-09-10T00:00:00.000000 | 2003-10-06T00:00:00.000000 |
| certa-2003-ale-005 | Vulnérabilité de sadmind sur Solaris | 2003-09-19T00:00:00.000000 | 2003-09-19T00:00:00.000000 |
| CERTA-2003-ALE-005 | Vulnérabilité de sadmind sur Solaris | 2003-09-19T00:00:00.000000 | 2003-09-19T00:00:00.000000 |
| certa-2003-ale-003 | Exploitation massive de la vulnérabilité « include PHP » | 2003-09-09T00:00:00.000000 | 2003-09-09T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2026-AVI-0044 | Multiples vulnérabilités dans Microsoft Windows | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0043 | Multiples vulnérabilités dans Microsoft Office | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0042 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0041 | Multiples vulnérabilités dans les produits Elastic | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0040 | Multiples vulnérabilités dans Google Chrome | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0039 | Multiples vulnérabilités dans Node.js | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0037 | Multiples vulnérabilités dans Typo3 | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0036 | Multiples vulnérabilités dans Suricata | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0035 | Multiples vulnérabilités dans les produits Fortinet | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0034 | Multiples vulnérabilités dans les produits SAP | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0033 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0032 | Multiples vulnérabilités dans les produits Siemens | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| CERTFR-2026-AVI-0031 | Vulnérabilité dans le greffon VSCode pour Spring CLI | 2026-01-14T00:00:00.000000 | 2026-01-14T00:00:00.000000 |
| certfr-2026-avi-0030 | Vulnérabilité dans MISP | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| certfr-2026-avi-0029 | Multiples vulnérabilités dans VMware Tanzu Gemfire | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| certfr-2026-avi-0028 | Multiples vulnérabilités dans MariaDB | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| certfr-2026-avi-0027 | Vulnérabilité dans NetApp ONTAP | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| certfr-2026-avi-0026 | Vulnérabilité dans Google Pixel | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| CERTFR-2026-AVI-0030 | Vulnérabilité dans MISP | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| CERTFR-2026-AVI-0029 | Multiples vulnérabilités dans VMware Tanzu Gemfire | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| CERTFR-2026-AVI-0028 | Multiples vulnérabilités dans MariaDB | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| CERTFR-2026-AVI-0027 | Vulnérabilité dans NetApp ONTAP | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| CERTFR-2026-AVI-0026 | Vulnérabilité dans Google Pixel | 2026-01-13T00:00:00.000000 | 2026-01-13T00:00:00.000000 |
| certfr-2026-avi-0025 | Vulnérabilité dans Microsoft Edge | 2026-01-12T00:00:00.000000 | 2026-01-12T00:00:00.000000 |
| certfr-2026-avi-0024 | Multiples vulnérabilités dans VMware Tanzu Greenplum Backup and Restore | 2026-01-12T00:00:00.000000 | 2026-01-12T00:00:00.000000 |
| certfr-2026-avi-0023 | Multiples vulnérabilités dans les produits Axis | 2026-01-12T00:00:00.000000 | 2026-01-12T00:00:00.000000 |
| CERTFR-2026-AVI-0025 | Vulnérabilité dans Microsoft Edge | 2026-01-12T00:00:00.000000 | 2026-01-12T00:00:00.000000 |
| CERTFR-2026-AVI-0024 | Multiples vulnérabilités dans VMware Tanzu Greenplum Backup and Restore | 2026-01-12T00:00:00.000000 | 2026-01-12T00:00:00.000000 |
| CERTFR-2026-AVI-0023 | Multiples vulnérabilités dans les produits Axis | 2026-01-12T00:00:00.000000 | 2026-01-12T00:00:00.000000 |
| certfr-2026-avi-0022 | Multiples vulnérabilités dans les produits Microsoft | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000901 | TvRock vulnerable to cross-site request forgery | 2024-04-23T18:22+09:00 | 2024-04-23T18:22+09:00 |
| jvndb-2024-000903 | TvRock vulnerable to denial-of-service (DoS) | 2024-04-23T18:21+09:00 | 2024-04-23T18:21+09:00 |
| jvndb-2023-000119 | Ruckus Access Point contains a cross-site scripting vulnerability. | 2023-12-01T14:58+09:00 | 2024-04-23T17:51+09:00 |
| jvndb-2023-000112 | Multiple vulnerabilities in Pleasanter | 2023-11-13T15:57+09:00 | 2024-04-22T17:56+09:00 |
| jvndb-2024-003108 | Armeria-saml improperly handles SAML messages | 2024-04-22T17:28+09:00 | 2024-04-22T17:28+09:00 |
| jvndb-2023-000122 | Multiple denial-of-service (DoS) vulnerabilities in JTEKT ELECTRONICS HMI GC-A2 series | 2023-12-11T14:12+09:00 | 2024-04-22T16:55+09:00 |
| jvndb-2023-002413 | Multiple vulnerabilities in ELECOM and LOGITEC wireless LAN routers | 2023-07-12T16:15+09:00 | 2024-04-22T16:18+09:00 |
| jvndb-2023-002270 | Null pointer dereference vulnerability in multiple printers and MFPs which implement BROTHER debut web server | 2023-06-30T11:49+09:00 | 2024-04-22T16:07+09:00 |
| jvndb-2023-014491 | LINE client for iOS vulnerable to improper server certificate verification | 2024-04-22T15:27+09:00 | 2024-04-22T15:27+09:00 |
| jvndb-2023-000075 | Improper restriction of XML external entity references (XXE) in Applicant Programme | 2023-07-24T15:44+09:00 | 2024-04-22T14:20+09:00 |
| jvndb-2023-002722 | Fujitsu network devices Si-R series and SR-M series vulnerable to authentication bypass | 2023-07-27T18:12+09:00 | 2024-04-19T18:07+09:00 |
| jvndb-2023-000076 | SEIKO EPSON printer Web Config vulnerable to denial-of-service (DoS) | 2023-08-02T14:55+09:00 | 2024-04-19T17:27+09:00 |
| jvndb-2023-000062 | "WPS Office" vulnerable to OS command injection | 2023-06-12T12:57+09:00 | 2024-04-18T17:49+09:00 |
| jvndb-2023-000048 | ASUS Router RT-AX3000 vulnerable to using sensitive cookies without 'Secure' attribute | 2023-06-09T15:18+09:00 | 2024-04-18T17:44+09:00 |
| jvndb-2023-002022 | Multiple vulnerabilities in FUJI ELECTRIC FRENIC RHC Loader | 2023-06-05T15:55+09:00 | 2024-04-18T17:40+09:00 |
| jvndb-2023-002906 | Multiple vulnerabilities in Panasonic Control FPWIN Pro7 | 2023-08-22T18:02+09:00 | 2024-04-18T17:31+09:00 |
| jvndb-2023-011403 | ELECOM wireless LAN routers vulnerable to OS command injection | 2023-12-13T15:06+09:00 | 2024-04-18T17:22+09:00 |
| jvndb-2024-000041 | Multiple vulnerabilities in WordPress Plugin "Forminator" | 2024-04-18T13:53+09:00 | 2024-04-18T13:53+09:00 |
| jvndb-2023-000070 | Multiple vulnerabilities in WordPress Plugin "TS Webfonts for SAKURA" | 2023-07-20T16:05+09:00 | 2024-04-17T17:20+09:00 |
| jvndb-2022-017175 | Proscend Communications M330-W and M330-W5 vulnerable to OS command injection | 2024-04-16T14:30+09:00 | 2024-04-16T14:30+09:00 |
| jvndb-2024-000040 | Multiple vulnerabilities in BUFFALO wireless LAN routers | 2024-04-15T16:29+09:00 | 2024-04-15T16:29+09:00 |
| jvndb-2023-000074 | Fujitsu Real-time Video Transmission Gear "IP series" uses a hard-coded credentials | 2023-07-26T18:00+09:00 | 2024-04-12T18:04+09:00 |
| jvndb-2023-000073 | GBrowse vulnerable to unrestricted upload of files with dangerous types | 2023-07-21T15:02+09:00 | 2024-04-12T17:31+09:00 |
| jvndb-2023-002905 | Multiple vulnerabilities in CBC digital video recorders | 2023-08-22T17:35+09:00 | 2024-04-10T17:39+09:00 |
| jvndb-2024-000039 | Multiple vulnerabilities in a-blog cms | 2024-04-10T13:55+09:00 | 2024-04-10T13:55+09:00 |
| jvndb-2021-000088 | Multiple vulnerabilities in Cybozu Remote Service | 2021-09-30T16:03+09:00 | 2024-04-08T18:09+09:00 |
| jvndb-2024-000038 | Multiple vulnerabilities in WordPress Plugin "Ninja Forms" | 2024-04-08T13:44+09:00 | 2024-04-08T13:44+09:00 |
| jvndb-2022-002765 | Multiple vulnerabilities in OMRON CX-Programmer | 2022-11-28T15:40+09:00 | 2024-04-05T18:15+09:00 |
| jvndb-2023-002786 | Multiple vulnerabilities in OMRON CX-Programmer | 2023-08-03T13:42+09:00 | 2024-04-05T17:39+09:00 |
| jvndb-2024-000037 | Multiple vulnerabilities in NEC Aterm series | 2024-04-05T14:53+09:00 | 2024-04-05T14:53+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15251 | ZTE MF258K Pro配置缺陷漏洞 | 2026-01-19 | 2026-03-26 |
| cnvd-2026-15061 | OpenClaw操作系统命令注入漏洞 | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15060 | OpenClaw操作系统命令注入漏洞(CNVD-2026-15060) | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15059 | OpenClaw操作系统命令注入漏洞(CNVD-2026-15059) | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15058 | OpenClaw命令注入漏洞(CNVD-2026-15058) | 2026-03-26 | 2026-03-26 |
| cnvd-2026-15057 | OpenClaw加密问题漏洞(CNVD-2026-15057) | 2026-03-26 | 2026-03-26 |
| cnvd-2026-14995 | Apple macOS Tahoe信息泄露漏洞(CNVD-2026-14995) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14994 | Apple macOS Tahoe信息泄露漏洞(CNVD-2026-14994) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14975 | Apple macOS越界读取漏洞(CNVD-2026-14975) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14974 | Apple macOS信息泄露漏洞(CNVD-2026-14974) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14973 | Apple macOS Tahoe权限提升漏洞 | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14972 | Chamilo import.php文件操作系统命令注入漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14971 | Chamilo editinstance.php文件操作系统命令注入漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14970 | Chamilo CSV文件名跨站脚本漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14969 | WordPress插件WpEvently信息泄露漏洞 | 2026-03-19 | 2026-03-26 |
| cnvd-2026-14968 | WordPress插件wpDiscuz信息泄露漏洞 | 2026-03-19 | 2026-03-26 |
| cnvd-2026-15250 | Huawei HarmonyOS证书管理模块数据处理漏洞 | 2026-03-12 | 2026-03-25 |
| cnvd-2026-14861 | OpenClaw后置链接漏洞(CNVD-2026-14861) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14860 | OpenClaw代码问题漏洞(CNVD-2026-14860) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14859 | OpenClaw后置链接漏洞(CNVD-2026-14859) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14858 | OpenClaw后置链接漏洞(CNVD-2026-14858) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14857 | OpenClaw路径遍历漏洞(CNVD-2026-14857) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14856 | OpenClaw路径遍历漏洞(CNVD-2026-14856) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14850 | OpenClaw路径遍历漏洞(CNVD-2026-14850) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14849 | OpenClaw代码问题漏洞(CNVD-2026-14849) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14848 | OpenClaw路径遍历漏洞(CNVD-2026-14848) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14846 | OpenClaw后置链接漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14844 | OpenClaw代码问题漏洞(CNVD-2026-14844) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14843 | OpenClaw身份验证强化漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14842 | OpenClaw访问控制错误漏洞(CNVD-2026-14842) | 2026-03-24 | 2026-03-25 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-10781 | Уязвимость функции vmci_host_setup_notify() файла mm/gup.c ядра операционной системы Linu… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10780 | Уязвимость компонента net_sched ядра операционной системы Linux, позволяющая нарушителю о… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10779 | Уязвимость функции usbhid_parse() компонента bNumDescriptors ядра операционной системы Li… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10778 | Уязвимость функции for_each_possible_cpu() ядра операционной системы Linux, позволяющая н… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10777 | Уязвимость компонента mdiobus ядра операционной системы Linux, позволяющая нарушителю вып… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10774 | Уязвимость функции __red_change() ядра операционной системы Linux, позволяющая нарушителю… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10773 | Уязвимость функции sk_is_readable() ядра операционной системы Linux, позволяющая нарушите… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10772 | Уязвимость функции nfs4_state_start_net операционной системы Linux, позволяющая нарушител… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10770 | Уязвимость функции usb_bulk_msg() операционной системы Linux, позволяющая нарушителю вызв… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10768 | Уязвимость ядра операционной системы Linux, связанная с недостаточной проверкой входных д… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10766 | Уязвимость функции fbcon_info_from_console ядра операционной системы Linux, позволяющая н… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10764 | Уязвимость функции rcu_read_lock_trace_held ядра операционной системы Linux, позволяющая … | 05.09.2025 | 16.02.2026 |
| bdu:2025-10763 | Уязвимость функции dell_rbu операционной системы Linux, позволяющая нарушителю вызвать от… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10762 | Уязвимость функции nvmet_tcp_set_queue_sock операционной системы Linux, позволяющая наруш… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10758 | Уязвимость функции af_alg ядра операционной системы Linux, позволяющая нарушителю вызвать… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10755 | Уязвимость функции megaraid_sas ядра операционной системы Linux, позволяющая нарушителю в… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10752 | Уязвимость функции memdup_user ядра операционной системы Linux, позволяющая нарушителю вы… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10749 | Уязвимость функции clip_push ядра операционной системы Linux, позволяющая нарушителю вызв… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10747 | Уязвимость функции jbd2_journal_dirty_metadata ядра операционной системы Linux, позволяющ… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10746 | Уязвимость функции pata_via ядра операционной системы Linux, позволяющая нарушителю вызва… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10745 | Уязвимость функции gpio_keys_irq_timer ядра операционной системы Linux, позволяющая наруш… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10744 | Уязвимость функции arch_memory_failure ядра операционной системы Linux, позволяющая наруш… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10743 | Уязвимость функции memcpy ядра операционной системы Linux, позволяющая нарушителю вызвать… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10739 | Уязвимость функции ptp_vclock_in_use ядра операционной системы Linux, позволяющая нарушит… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10737 | Уязвимость функции rcu_dereference_rtnl ядра операционной системы Linux, позволяющая нару… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10735 | Уязвимость функции lecd_attach ядра операционной системы Linux, позволяющая нарушителю вы… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10730 | Уязвимость функции generate_encryptionkey() компонента ksmbd ядра операционной системы Li… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10729 | Уязвимость функции smb2_sess_setup() в модуле fs/smb/server/smb2pdu.c поддержки сервера S… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10727 | Уязвимость функции mmap() ядра операционной системы Linux, позволяющая нарушителю вызвать… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10726 | Уязвимость ядра операционной системы Linux, связанная с ошибками управления состоянием, п… | 05.09.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201912-0637 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:58:55.141000Z |
| var-201504-0247 | The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combin… | 2024-07-23T20:58:53.769000Z |
| var-201302-0142 | Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.… | 2024-07-23T20:58:53.947000Z |
| var-202205-1291 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T20:58:14.944000Z |
| var-202201-0498 | nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overfl… | 2024-07-23T20:58:14.690000Z |
| var-201412-0612 | The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute afte… | 2024-07-23T20:58:12.108000Z |
| var-201904-1398 | A use after free issue was addressed with improved memory management. This issue affected… | 2024-07-23T20:58:11.954000Z |
| var-201908-0422 | Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denia… | 2024-07-23T20:58:10.670000Z |
| var-201405-0243 | The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does n… | 2024-07-23T20:58:10.245000Z |
| var-200512-0293 | Heap-based buffer overflow in LibSystem in Mac OS X 10.4 through 10.4.5 allows context-de… | 2024-07-23T20:58:10.141000Z |
| var-201108-0080 | Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and … | 2024-07-23T20:57:37.509000Z |
| var-202206-1900 | curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverrespon… | 2024-07-23T20:57:34.431000Z |
| var-201904-1406 | A use after free issue was addressed with improved memory management. This issue affected… | 2024-07-23T20:57:19.701000Z |
| var-202010-1523 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is f… | 2024-07-23T20:57:18.265000Z |
| var-200901-0756 | The JavaScript garbage collector in WebKit in Apple Safari before 4.0, iPhone OS 1.0 thro… | 2024-07-23T20:57:17.769000Z |
| var-201806-1467 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T20:57:06.890000Z |
| var-201908-0261 | Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leadin… | 2024-07-23T20:56:58.444000Z |
| var-201912-1844 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:56:57.656000Z |
| var-202205-1990 | Buffer Over-read in GitHub repository vim/vim prior to 8.2. Vim is a cross-platform text … | 2024-07-23T20:56:27.098000Z |
| var-201103-0294 | Integer overflow in WebKit, as used on the Research In Motion (RIM) BlackBerry Torch 9800… | 2024-07-23T20:56:26.520000Z |
| var-202206-1106 | Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an… | 2024-07-23T20:56:25.918000Z |
| var-201001-0692 | The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on… | 2024-07-23T20:55:47.319000Z |
| var-200602-0446 | The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remot… | 2024-07-23T20:55:47.190000Z |
| var-202105-1325 | In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHC… | 2024-07-23T20:55:14.082000Z |
| var-201903-0420 | A logic issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, … | 2024-07-23T20:55:14.940000Z |
| var-202002-1182 | A logic issue was addressed with improved state management. This issue is fixed in iOS 13… | 2024-07-23T20:55:13.517000Z |
| var-201711-0479 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T20:55:13.287000Z |
| var-201303-0172 | sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physical… | 2024-07-23T20:55:11.903000Z |
| var-201912-0510 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:55:07.586000Z |
| var-201705-3788 | In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a ca… | 2024-07-23T20:54:28.045000Z |