Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-42273 |
7.8 (4.0)
|
Heimdall: Case-sensitive host matching may lead to pol… |
dadrus |
heimdall |
2026-05-08T03:42:50.312Z | 2026-05-08T10:40:56.541Z |
| CVE-2026-42279 |
5.8 (3.1)
|
solidtime: Time entry update endpoint allows cross-org… |
solidtime-io |
solidtime |
2026-05-08T03:57:31.727Z | 2026-05-08T10:38:51.086Z |
| CVE-2026-8138 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda CX12L SetPptpServerCfg” formSetPPTPServer stack-… |
Tenda |
CX12L |
2026-05-08T04:15:10.228Z | 2026-05-08T10:35:06.800Z |
| CVE-2026-5341 |
6.4 (3.1)
|
NMR Strava activities <= 1.0.14 - Authenticated (Contr… |
mirceatm |
NMR Strava activities |
2026-05-08T09:26:47.283Z | 2026-05-08T10:15:32.703Z |
| CVE-2026-44742 |
7.2 (3.1)
|
Postorius through 1.3.13 does not escape HTML in … |
Postorius project |
Postorius |
2026-05-07T18:09:20.069Z | 2026-05-08T06:25:34.759Z |
| CVE-2025-69599 |
N/A
|
RayVentory Scan Engine through 12.6 Update 8 allo… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T06:08:35.396Z |
| CVE-2025-67887 |
N/A
|
1C-Bitrix through 25.100.500 allows Remote Code E… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T05:52:28.158Z |
| CVE-2026-5588 |
6.3 (4.0)
|
PKIX draft CompositeVerifier accepts empty signature s… |
Legion of the Bouncy Castle Inc. |
BC-JAVA |
2026-04-15T09:06:15.617Z | 2026-05-08T05:29:40.247Z |
| CVE-2023-42346 |
N/A
|
Alkacon OpenCms before 16 allows XXE when the <!D… |
n/a |
n/a |
2026-05-08T00:00:00.000Z | 2026-05-08T04:46:17.859Z |
| CVE-2023-6371 |
8.7 (3.1)
|
Improper Neutralization of Input During Web Page Gener… |
GitLab |
GitLab |
2024-03-28T07:18:03.820Z | 2026-05-08T04:06:58.687Z |
| CVE-2023-3979 |
3.1 (3.1)
|
Incorrect Authorization in GitLab |
GitLab |
GitLab |
2023-09-29T06:02:06.310Z | 2026-05-08T04:06:39.092Z |
| CVE-2026-5787 |
8.9 (3.1)
|
An Improper Certificate Validation in Ivanti EPMM… |
Ivanti |
Endpoint Manager Mobile |
2026-05-07T15:36:41.179Z | 2026-05-08T03:55:49.014Z |
| CVE-2026-42011 |
7.4 (3.1)
|
Gnutls: gnutls: security bypass due to incorrect name … |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-05-07T13:51:04.695Z | 2026-05-08T03:55:47.296Z |
| CVE-2026-41142 |
8.8 (3.1)
|
OpenEXR is Vulnerable to Integer overflow in ImageChan… |
AcademySoftwareFoundation |
openexr |
2026-05-07T03:58:09.483Z | 2026-05-08T03:55:43.209Z |
| CVE-2026-40171 |
8.4 (4.0)
|
Jupyter Notebook and JupyterLab token theft via stored… |
jupyter |
notebook |
2026-05-06T19:36:32.072Z | 2026-05-08T03:55:41.465Z |
| CVE-2026-5786 |
8.8 (3.1)
|
An Improper Access Control vulnerability in Ivant… |
Ivanti |
Endpoint Manager Mobile |
2026-05-07T15:18:54.437Z | 2026-05-08T03:55:39.897Z |
| CVE-2026-6973 |
7.2 (3.1)
|
An Improper Input Validation in Ivanti EPMM befor… |
Ivanti |
Endpoint Manager Mobile |
2026-05-07T15:21:24.849Z | 2026-05-08T03:55:38.232Z |
| CVE-2026-35397 |
7.6 (4.0)
|
jupyter-server path traversal allows access to sibling… |
jupyter-server |
jupyter_server |
2026-05-05T19:37:33.810Z | 2026-05-08T03:55:36.590Z |
| CVE-2026-42274 |
7.8 (4.0)
|
Heimdall: Authorization bypass via path normalization … |
dadrus |
heimdall |
2026-05-08T03:43:41.597Z | 2026-05-08T03:43:41.597Z |
| CVE-2026-41645 |
5.3 (3.1)
|
Nuclei: Environment variable disclosure via Response-D… |
projectdiscovery |
nuclei |
2026-05-08T03:17:19.302Z | 2026-05-08T03:17:19.302Z |
| CVE-2026-42261 |
7.1 (3.1)
|
PromptHub: Authenticated SSRF via IPv6 filter bypass i… |
legeling |
PromptHub |
2026-05-08T03:11:25.305Z | 2026-05-08T03:11:25.305Z |
| CVE-2026-43944 |
9.4 (4.0)
|
electerm: dangerous code can be run through links or c… |
electerm |
electerm |
2026-05-08T03:08:09.046Z | 2026-05-08T03:08:09.046Z |
| CVE-2026-2710 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-05-07T22:20:00.454Z | |
| CVE-2026-4878 |
6.7 (3.1)
|
Libcap: libcap: privilege escalation via toctou race c… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-09T14:49:02.942Z | 2026-05-07T21:33:20.039Z |
| CVE-2026-4775 |
7.8 (3.1)
|
Libtiff: libtiff: arbitrary code execution or denial o… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-24T14:42:47.529Z | 2026-05-07T21:24:46.165Z |
| CVE-2026-44365 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-34429. Reason: This candidate is a duplicate of CVE-2026-34429. Notes: All CVE users should reference CVE-2026-34429 instead of this candidate. | N/A | N/A | 2026-05-07T20:48:33.508Z | |
| CVE-2025-52479 |
7.7 (4.0)
|
HTTP.jl vulnerable to CR/LF Injection in URIs |
JuliaWeb |
HTTP.jl |
2025-06-25T16:06:45.402Z | 2026-05-07T20:47:37.830Z |
| CVE-2025-54369 |
9.3 (4.0)
|
Node-SAML SAML Authentication Bypass |
node-saml |
node-saml |
2025-12-12T23:03:52.427Z | 2026-05-07T20:46:21.508Z |
| CVE-2026-41905 |
7.7 (3.1)
|
FreeScout vulnerable to SSRF via Helper::sanitizeRemot… |
freescout-help-desk |
freescout |
2026-05-07T18:08:09.277Z | 2026-05-07T20:15:18.618Z |
| CVE-2026-6846 |
7.8 (3.1)
|
Binutils: binutils: arbitrary code execution via malfo… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-22T08:37:14.233Z | 2026-05-07T20:03:22.592Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-46606 |
6.2 (3.1)
|
Dell PowerProtect Data Domain with Data Domain Op… |
Dell |
PowerProtect Data Domain |
2026-04-17T11:36:54.469Z | 2026-04-18T03:55:33.318Z |
| CVE-2026-43045 |
N/A
|
mshv: Fix error handling in mshv_region_pin |
Linux |
Linux |
2026-05-01T14:15:40.976Z | 2026-05-02T06:14:30.662Z |
| CVE-2026-43046 |
N/A
|
btrfs: reject root items with drop_progress and zero d… |
Linux |
Linux |
2026-05-01T14:15:41.849Z | 2026-05-02T06:14:31.818Z |
| CVE-2026-43047 |
7.8 (3.1)
|
HID: multitouch: Check to ensure report responses matc… |
Linux |
Linux |
2026-05-01T14:15:42.562Z | 2026-05-03T05:46:22.203Z |
| CVE-2026-7448 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-05-06T06:47:21.950Z | 2026-05-08T12:25:55.615Z |
| CVE-2026-43258 |
7.8 (3.1)
|
alpha: fix user-space corruption during memory compaction |
Linux |
Linux |
2026-05-06T11:28:46.536Z | 2026-05-08T12:41:39.777Z |
| CVE-2026-43256 |
7.8 (3.1)
|
media: qcom: camss: vfe: Fix out-of-bounds access in v… |
Linux |
Linux |
2026-05-06T11:28:45.209Z | 2026-05-08T12:41:38.588Z |
| CVE-2026-43254 |
7.5 (3.1)
|
ovpn: tcp - fix packet extraction from stream |
Linux |
Linux |
2026-05-06T11:28:43.871Z | 2026-05-08T12:41:37.366Z |
| CVE-2026-43253 |
7.5 (3.1)
|
iommu/amd: move wait_on_sem() out of spinlock |
Linux |
Linux |
2026-05-06T11:28:43.160Z | 2026-05-08T12:41:36.238Z |
| CVE-2026-43249 |
8.8 (3.1)
|
9p/xen: protect xen_9pfs_front_free against concurrent calls |
Linux |
Linux |
2026-05-06T11:28:40.290Z | 2026-05-08T12:41:35.086Z |
| CVE-2026-43248 |
7.8 (3.1)
|
vhost: move vdpa group bound check to vhost_vdpa |
Linux |
Linux |
2026-05-06T11:28:39.578Z | 2026-05-08T12:41:33.946Z |
| CVE-2026-43245 |
7.5 (3.1)
|
ntfs: ->d_compare() must not block |
Linux |
Linux |
2026-05-06T11:28:37.602Z | 2026-05-08T12:41:32.781Z |
| CVE-2026-43239 |
8.8 (3.1)
|
smb: client: prevent races in ->query_interfaces() |
Linux |
Linux |
2026-05-06T11:28:33.623Z | 2026-05-08T12:41:31.628Z |
| CVE-2026-43237 |
7.8 (3.1)
|
drm/amdgpu: Refactor amdgpu_gem_va_ioctl for Handling … |
Linux |
Linux |
2026-05-06T11:28:32.300Z | 2026-05-08T12:41:30.455Z |
| CVE-2026-43236 |
7.8 (3.1)
|
drm/atmel-hlcdc: fix use-after-free of drm_crtc_commit… |
Linux |
Linux |
2026-05-06T11:28:31.543Z | 2026-05-08T12:41:29.330Z |
| CVE-2026-43233 |
8.2 (3.1)
|
netfilter: nf_conntrack_h323: fix OOB read in decode_c… |
Linux |
Linux |
2026-05-06T11:28:29.565Z | 2026-05-08T12:41:28.161Z |
| CVE-2026-43232 |
8.8 (3.1)
|
net: wan: farsync: Fix use-after-free bugs caused by u… |
Linux |
Linux |
2026-05-06T11:28:28.910Z | 2026-05-08T12:41:27.008Z |
| CVE-2026-43215 |
8.8 (3.1)
|
cifs: Fix locking usage for tcon fields |
Linux |
Linux |
2026-05-06T11:28:17.425Z | 2026-05-08T12:41:22.354Z |
| CVE-2026-43214 |
7.8 (3.1)
|
KVM: x86: Add SRCU protection for reading PDPTRs in __… |
Linux |
Linux |
2026-05-06T11:28:16.766Z | 2026-05-08T12:41:21.202Z |
| CVE-2026-43213 |
7.5 (3.1)
|
wifi: rtw89: pci: validate sequence number of TX relea… |
Linux |
Linux |
2026-05-06T11:28:15.998Z | 2026-05-08T12:41:20.045Z |
| CVE-2026-43212 |
7.8 (3.1)
|
LoongArch: Make cpumask_of_node() robust against NUMA_… |
Linux |
Linux |
2026-05-06T11:28:15.272Z | 2026-05-08T12:41:18.879Z |
| CVE-2026-43211 |
7.8 (3.1)
|
PCI: Fix pci_slot_trylock() error handling |
Linux |
Linux |
2026-05-06T11:28:14.423Z | 2026-05-08T12:41:17.709Z |
| CVE-2026-43208 |
9.8 (3.1)
|
net: do not pass flow_id to set_rps_cpu() |
Linux |
Linux |
2026-05-06T11:28:12.292Z | 2026-05-08T12:41:16.509Z |
| CVE-2026-43207 |
7.8 (3.1)
|
media: mtk-mdp: Fix error handling in probe function |
Linux |
Linux |
2026-05-06T11:28:11.601Z | 2026-05-08T12:41:15.360Z |
| CVE-2026-43206 |
7.8 (3.1)
|
drm/amdkfd: Fix out-of-bounds write in kfd_event_page_set() |
Linux |
Linux |
2026-05-06T11:28:10.937Z | 2026-05-08T12:41:14.026Z |
| CVE-2026-43203 |
7.5 (3.1)
|
atm: fore200e: fix use-after-free in tasklets during d… |
Linux |
Linux |
2026-05-06T11:28:08.949Z | 2026-05-08T12:41:12.811Z |
| CVE-2026-43199 |
7.5 (3.1)
|
net/mlx5e: Fix "scheduling while atomic" in IPsec MAC … |
Linux |
Linux |
2026-05-06T11:28:06.232Z | 2026-05-08T12:41:11.576Z |
| CVE-2026-43198 |
9.8 (3.1)
|
tcp: fix potential race in tcp_v6_syn_recv_sock() |
Linux |
Linux |
2026-05-06T11:28:05.569Z | 2026-05-08T12:41:10.445Z |
| CVE-2026-43197 |
9.1 (3.1)
|
netconsole: avoid OOB reads, msg is not nul-terminated |
Linux |
Linux |
2026-05-06T11:28:04.829Z | 2026-05-08T12:41:09.303Z |
| CVE-2026-43194 |
7.5 (3.1)
|
net: consume xmit errors of GSO frames |
Linux |
Linux |
2026-05-06T11:28:02.794Z | 2026-05-08T12:41:08.123Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-43045 | In the Linux kernel, the following vulnerability has been resolved: mshv: Fix error handling in ms… | 2026-05-01T15:16:50.817 | 2026-05-08T14:04:13.097 |
| fkie_cve-2026-43046 | In the Linux kernel, the following vulnerability has been resolved: btrfs: reject root items with … | 2026-05-01T15:16:50.933 | 2026-05-08T13:52:16.790 |
| fkie_cve-2026-43047 | In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: Check to ensu… | 2026-05-01T15:16:51.073 | 2026-05-08T13:50:16.930 |
| fkie_cve-2026-7448 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued i… | 2026-05-06T08:16:04.230 | 2026-05-08T13:16:48.907 |
| fkie_cve-2026-43258 | In the Linux kernel, the following vulnerability has been resolved: alpha: fix user-space corrupti… | 2026-05-06T12:16:46.650 | 2026-05-08T13:16:47.953 |
| fkie_cve-2026-43256 | In the Linux kernel, the following vulnerability has been resolved: media: qcom: camss: vfe: Fix o… | 2026-05-06T12:16:46.397 | 2026-05-08T13:16:47.837 |
| fkie_cve-2026-43254 | In the Linux kernel, the following vulnerability has been resolved: ovpn: tcp - fix packet extract… | 2026-05-06T12:16:46.143 | 2026-05-08T13:16:47.717 |
| fkie_cve-2026-43253 | In the Linux kernel, the following vulnerability has been resolved: iommu/amd: move wait_on_sem() … | 2026-05-06T12:16:46.033 | 2026-05-08T13:16:47.593 |
| fkie_cve-2026-43249 | In the Linux kernel, the following vulnerability has been resolved: 9p/xen: protect xen_9pfs_front… | 2026-05-06T12:16:45.493 | 2026-05-08T13:16:47.450 |
| fkie_cve-2026-43248 | In the Linux kernel, the following vulnerability has been resolved: vhost: move vdpa group bound c… | 2026-05-06T12:16:45.380 | 2026-05-08T13:16:47.337 |
| fkie_cve-2026-43245 | In the Linux kernel, the following vulnerability has been resolved: ntfs: ->d_compare() must not b… | 2026-05-06T12:16:44.997 | 2026-05-08T13:16:47.227 |
| fkie_cve-2026-43239 | In the Linux kernel, the following vulnerability has been resolved: smb: client: prevent races in … | 2026-05-06T12:16:44.217 | 2026-05-08T13:16:47.113 |
| fkie_cve-2026-43237 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Refactor amdgpu_ge… | 2026-05-06T12:16:43.960 | 2026-05-08T13:16:46.983 |
| fkie_cve-2026-43236 | In the Linux kernel, the following vulnerability has been resolved: drm/atmel-hlcdc: fix use-after… | 2026-05-06T12:16:43.817 | 2026-05-08T13:16:46.843 |
| fkie_cve-2026-43233 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: … | 2026-05-06T12:16:43.417 | 2026-05-08T13:16:46.703 |
| fkie_cve-2026-43232 | In the Linux kernel, the following vulnerability has been resolved: net: wan: farsync: Fix use-aft… | 2026-05-06T12:16:43.223 | 2026-05-08T13:16:46.530 |
| fkie_cve-2026-43215 | In the Linux kernel, the following vulnerability has been resolved: cifs: Fix locking usage for tc… | 2026-05-06T12:16:41.063 | 2026-05-08T13:16:45.983 |
| fkie_cve-2026-43214 | In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Add SRCU protection … | 2026-05-06T12:16:40.920 | 2026-05-08T13:16:45.853 |
| fkie_cve-2026-43213 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: pci: validate seq… | 2026-05-06T12:16:40.803 | 2026-05-08T13:16:45.737 |
| fkie_cve-2026-43212 | In the Linux kernel, the following vulnerability has been resolved: LoongArch: Make cpumask_of_nod… | 2026-05-06T12:16:40.687 | 2026-05-08T13:16:45.620 |
| fkie_cve-2026-43211 | In the Linux kernel, the following vulnerability has been resolved: PCI: Fix pci_slot_trylock() er… | 2026-05-06T12:16:40.527 | 2026-05-08T13:16:45.480 |
| fkie_cve-2026-43208 | In the Linux kernel, the following vulnerability has been resolved: net: do not pass flow_id to se… | 2026-05-06T12:16:40.170 | 2026-05-08T13:16:45.370 |
| fkie_cve-2026-43207 | In the Linux kernel, the following vulnerability has been resolved: media: mtk-mdp: Fix error hand… | 2026-05-06T12:16:40.037 | 2026-05-08T13:16:45.247 |
| fkie_cve-2026-43206 | In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix out-of-bounds … | 2026-05-06T12:16:39.903 | 2026-05-08T13:16:45.117 |
| fkie_cve-2026-43203 | In the Linux kernel, the following vulnerability has been resolved: atm: fore200e: fix use-after-f… | 2026-05-06T12:16:39.477 | 2026-05-08T13:16:44.980 |
| fkie_cve-2026-43199 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix "scheduling whi… | 2026-05-06T12:16:38.970 | 2026-05-08T13:16:44.860 |
| fkie_cve-2026-43198 | In the Linux kernel, the following vulnerability has been resolved: tcp: fix potential race in tcp… | 2026-05-06T12:16:38.857 | 2026-05-08T13:16:44.747 |
| fkie_cve-2026-43197 | In the Linux kernel, the following vulnerability has been resolved: netconsole: avoid OOB reads, m… | 2026-05-06T12:16:38.740 | 2026-05-08T13:16:44.630 |
| fkie_cve-2026-43194 | In the Linux kernel, the following vulnerability has been resolved: net: consume xmit errors of GS… | 2026-05-06T12:16:38.310 | 2026-05-08T13:16:44.460 |
| fkie_cve-2026-43190 | In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_tcpmss: check re… | 2026-05-06T12:16:37.843 | 2026-05-08T13:16:44.320 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-xvv6-p4wf-mvx7 |
7.5 (3.1)
7.3 (4.0)
|
TYPO3 CMS Stores Cleartext Password in User Settings Module | 2026-04-24T16:39:15Z | 2026-05-08T15:20:40Z |
| ghsa-gvvw-8j96-8g5r |
9.8 (3.1)
|
MsQuic has a Remote Elevation of Privilege Vulnerability | 2026-04-16T01:04:03Z | 2026-05-08T15:19:44Z |
| ghsa-94g3-g5v7-q4jg |
8.2 (4.0)
|
phpseclib's AES-CBC unpadding susceptible to padding oracle timing attack | 2026-03-19T16:42:18Z | 2026-05-08T15:18:13Z |
| ghsa-r854-jrxh-36qx |
3.7 (3.1)
|
phpseclib has a variable-time HMAC comparison in SSH2::get_binary_packet() using != instead of hash… | 2026-04-10T20:58:10Z | 2026-05-08T15:17:47Z |
| ghsa-chfm-xgc4-47rj |
2.3 (4.0)
|
OpenClaw: MSTeams thread history bypasses sender allowlist via Graph API | 2026-04-02T21:01:28Z | 2026-05-08T14:31:59Z |
| ghsa-qh7q-6qm3-653w |
6.0 (4.0)
|
Jupyter Server has an open redirection vulnerability in `next` query parameter | 2026-05-05T16:32:48Z | 2026-05-08T13:48:27Z |
| ghsa-43fc-jf86-j433 |
7.5 (3.1)
|
Axios is Vulnerable to Denial of Service via __proto__ Key in mergeConfig | 2026-02-09T17:46:14Z | 2026-05-08T13:46:54Z |
| ghsa-3p68-rc4w-qgx5 |
4.8 (3.1)
6.3 (4.0)
|
Axios has a NO_PROXY Hostname Normalization Bypass that Leads to SSRF | 2026-04-09T17:32:19Z | 2026-05-08T13:46:43Z |
| ghsa-35hp-hqmv-8qg8 |
6.5 (3.1)
|
Fiber's cache middleware default key generator ignores query string, causing response mix-up across… | 2026-04-28T22:28:14Z | 2026-05-08T13:42:45Z |
| ghsa-wr32-99hh-6f35 |
8.5 (3.1)
|
Nginx-UI has Server-Side Request Forgery (SSRF) via Cluster Proxy Middleware that Allows Access to … | 2026-04-29T20:54:54Z | 2026-05-08T13:40:46Z |
| ghsa-qqvm-66q4-vf5c |
5.3 (4.0)
|
Flowise: SSRF Protection Bypass via Direct node-fetch / axios Usage (Patch Enforcement Failure) | 2026-04-16T21:23:03Z | 2026-05-08T13:37:23Z |
| ghsa-pprv-j56w-x96f |
9.8 (3.1)
|
OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to … | 2026-05-08T12:31:57Z | 2026-05-08T12:31:57Z |
| ghsa-m29c-gmm3-c3v9 |
5.3 (4.0)
|
Open redirection vulnerability in the latest demo version of the Cradle eCommerce platform. The vul… | 2026-05-08T12:31:57Z | 2026-05-08T12:31:57Z |
| ghsa-hr4j-j5wc-96jv |
6.4 (3.1)
|
The E2Pdf – Export Pdf Tool for WordPress plugin for WordPress is vulnerable to Stored Cross-Site S… | 2026-05-08T12:31:57Z | 2026-05-08T12:31:57Z |
| ghsa-59rm-h9h8-h9gh |
6.4 (3.1)
|
The Sky Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `sky-custo… | 2026-05-08T12:31:56Z | 2026-05-08T12:31:57Z |
| ghsa-m9cx-2hp3-5j6q |
10.0 (4.0)
|
A vulnerability in Remote Spark SparkView before build 1122 allows an attacker to bypasses the loca… | 2026-05-08T12:31:56Z | 2026-05-08T12:31:56Z |
| ghsa-7929-xh7v-8jrh |
6.4 (3.1)
|
The NMR Strava activities plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the… | 2026-05-08T12:31:56Z | 2026-05-08T12:31:56Z |
| ghsa-xw5w-xhjv-gf29 |
2.9 (3.1)
|
In uriparser before 1.0.2, the function family EqualsUri can misclassify two unequal URIs as equal. | 2026-05-08T09:31:30Z | 2026-05-08T09:31:30Z |
| ghsa-v3rv-7vgj-hq3v |
7.2 (3.1)
|
The Auto Affiliate Links plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versi… | 2026-05-08T09:31:30Z | 2026-05-08T09:31:30Z |
| ghsa-mx76-r943-rf8g |
5.1 (4.0)
|
A vulnerability in Legion of the Bouncy Castle Inc. BC-FJA BC-FIPS on Linux, X86_64, AVX, AVX-512f.… | 2026-05-08T09:31:30Z | 2026-05-08T09:31:30Z |
| ghsa-jc25-ggg4-hhvw |
8.8 (3.1)
|
The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registra… | 2026-05-08T09:31:30Z | 2026-05-08T09:31:30Z |
| ghsa-gmxg-5w57-j63q |
2.9 (3.1)
|
In uriparser before 1.0.2, there is pointer difference truncation to int in various places. | 2026-05-08T09:31:29Z | 2026-05-08T09:31:30Z |
| ghsa-67h9-58cf-72hp |
8.5 (4.0)
|
PredatorSense version 3.00.3136 to 3.00.3196 contain Local Privilege Escalation (LPE) vulnerability… | 2026-05-08T09:31:29Z | 2026-05-08T09:31:30Z |
| ghsa-979m-gf7m-rg53 |
3.0 (3.1)
|
In OpenStack Ironic through 35.x, instance_info['ks_template'] is rendered without sandboxing. | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-5gxm-mp3j-xhc7 |
|
RayVentory Scan Engine through 12.6 Update 8 allows attackers to gain privileges if they control th… | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-2636-hvcv-37w8 |
|
1C-Bitrix through 25.100.500 allows Remote Code Execution because an actor with SOURCE/WRITE permis… | 2026-05-08T09:31:29Z | 2026-05-08T09:31:29Z |
| ghsa-v5fc-fw74-r356 |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was found in Tenda CX12L 16.03.53.12. This issue affects the function formSetPPTPSe… | 2026-05-08T06:32:38Z | 2026-05-08T06:32:38Z |
| ghsa-8cxw-g3j3-5xpx |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability has been found in Totolink X5000R 9.1.0u.6369_B20230113. This vulnerability affects… | 2026-05-08T06:32:38Z | 2026-05-08T06:32:38Z |
| ghsa-rm8r-x5mx-f7w9 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was determined in SourceCodester SUP Online Shopping 1.0. The impacted element is a… | 2026-05-08T06:32:37Z | 2026-05-08T06:32:37Z |
| ghsa-qm5g-9237-pg9r |
7.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in SourceCodester SUP Online Shopping 1.0. This impacts an unkn… | 2026-05-08T06:32:37Z | 2026-05-08T06:32:37Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-249 |
7.5 (3.1)
|
Gradio is an open-source Python package that allows you to quickly build a demo or web ap… | gradio | 2023-12-22T21:15:00+00:00 | 2024-01-17T11:19:18.252182+00:00 |
| pysec-2023-248 |
6.1 (3.1)
|
An open redirect vulnerability in the python package Flask-Security-Too <=5.3.2 allows at… | flask-security-too | 2023-12-26T22:15:00+00:00 | 2024-01-17T11:19:18.188431+00:00 |
| pysec-2024-2 |
5.5 (3.1)
|
In Appwrite CLI before 3.0.0, when using the login command, the credentials of the Appwri… | appwrite | 2024-01-09T09:15:00+00:00 | 2024-01-17T11:19:17.695321+00:00 |
| pysec-2021-878 |
7.5 (3.1)
|
The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enab… | mkdocs | 2021-10-07T14:15:00Z | 2024-01-17T10:53:34.840029Z |
| pysec-2009-10 |
|
Unspecified vulnerability in the Zope Enterprise Objects (ZEO) storage-server functionali… | zodb3 | 2009-09-08T18:30:00Z | 2024-01-17T10:48:40.464440Z |
| pysec-2024-1 |
|
gratient is a user-facing library for generating color gradients of text. Version 0.5 con… | gratient | 2024-01-03T22:31:36+00:00 | |
| pysec-2023-235 |
7.5 (3.1)
|
An issue was discovered in Couchbase Server 7.2.0. There is a private key leak in debug.l… | couchbase | 2023-11-08T21:15:00Z | 2024-01-03T21:03:33.010228Z |
| pysec-2023-233 |
8.8 (3.1)
|
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif,… | exiv2 | 2023-11-06T18:15:00Z | 2024-01-02T15:20:59.435740Z |
| pysec-2021-877 |
7.5 (3.1)
|
An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a… | exiv2 | 2021-07-26T17:15:00Z | 2024-01-02T15:20:59.375619Z |
| pysec-2018-120 |
6.5 (3.1)
|
There is an infinite loop in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.… | exiv2 | 2018-12-12T10:29:00Z | 2024-01-02T15:20:59.318592Z |
| pysec-2018-119 |
6.5 (3.1)
|
There is a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header of jp2image.cp… | exiv2 | 2018-12-12T10:29:00Z | 2024-01-02T15:20:59.259575Z |
| pysec-2018-118 |
6.5 (3.1)
|
There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.… | exiv2 | 2018-12-12T10:29:00Z | 2024-01-02T15:20:59.201635Z |
| pysec-2018-117 |
6.5 (3.1)
|
There is a heap-based buffer over-read in the Exiv2::tEXtToDataBuf function of pngimage.c… | exiv2 | 2018-12-12T10:29:00Z | 2024-01-02T15:20:59.143416Z |
| pysec-2017-112 |
6.5 (3.1)
|
An issue was discovered in Exiv2 0.26. When the data structure of the structure ifd is in… | exiv2 | 2017-05-26T10:29:00Z | 2024-01-02T15:20:59.086141Z |
| pysec-2023-234 |
7.5 (3.1)
|
An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via w… | esptool | 2023-11-09T16:15:00Z | 2024-01-02T13:04:16.284694Z |
| pysec-2017-111 |
6.1 (3.1)
|
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to cros… | apache-atlas | 2017-08-29T20:29:00Z | 2023-12-01T23:23:55.638216Z |
| pysec-2017-110 |
7.5 (3.1)
|
Error responses from Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating included… | apache-atlas | 2017-08-29T20:29:00Z | 2023-12-01T23:23:55.587649Z |
| pysec-2017-109 |
6.1 (3.1)
|
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to Refl… | apache-atlas | 2017-08-29T20:29:00Z | 2023-12-01T23:23:55.536257Z |
| pysec-2017-108 |
6.1 (3.1)
|
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to DOM … | apache-atlas | 2017-08-29T20:29:00Z | 2023-12-01T23:23:55.465498Z |
| pysec-2017-107 |
6.1 (3.1)
|
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to Stor… | apache-atlas | 2017-08-29T20:29:00Z | 2023-12-01T23:23:55.413874Z |
| pysec-2017-106 |
6.1 (3.1)
|
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating use cookies that could be acc… | apache-atlas | 2017-08-29T20:29:00Z | 2023-12-01T23:23:55.361409Z |
| pysec-2017-105 |
7.5 (3.1)
|
Apache Atlas versions 0.6.0 (incubating), 0.7.0 (incubating), and 0.7.1 (incubating) allo… | apache-atlas | 2017-08-29T20:29:00Z | 2023-12-01T23:23:55.302348Z |
| pysec-2023-247 |
6.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Affected … | aiohttp | 2023-11-14T21:15:00+00:00 | 2023-11-22T23:23:57.631856+00:00 |
| pysec-2023-246 |
7.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP … | aiohttp | 2023-11-14T21:15:00+00:00 | 2023-11-22T23:23:57.547793+00:00 |
| pysec-2023-245 |
7.5 (3.1)
|
PyPinkSign v0.5.1 uses a non-random or static IV for Cipher Block Chaining (CBC) mode in … | pypinksign | 2023-11-16T18:15:00+00:00 | 2023-11-22T19:19:42.405614+00:00 |
| pysec-2023-244 |
|
Apache Software Foundation Apache Submarine has an SQL injection vulnerability when a use… | apache-submarine | 2023-11-22T10:15:00+00:00 | 2023-11-22T11:21:52.095543+00:00 |
| pysec-2023-242 |
7.4 (3.1)
|
Missing SSL certificate validation in HTTPie v3.2.2 allows attackers to eavesdrop on comm… | httpie | 2023-11-16T18:15:00+00:00 | 2023-11-22T02:43:48.390438+00:00 |
| pysec-2023-240 |
|
Apache Software Foundation Apache Submarine has a bug when serializing against yaml. The … | apache-submarine | 2023-11-20T09:15:00+00:00 | 2023-11-20T11:21:41.073991+00:00 |
| pysec-2023-239 |
6.8 (3.1)
|
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the remote end of an… | asyncssh | 2023-11-14T03:15:00+00:00 | 2023-11-20T09:25:38.326328+00:00 |
| pysec-2023-238 |
|
Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 t… | pyarrow | 2023-11-20T08:59:06.851388+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33403 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.676678Z |
| gsd-2024-33402 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.651479Z |
| gsd-2024-33401 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.700617Z |
| gsd-2024-33400 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.665111Z |
| gsd-2024-33399 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.744940Z |
| gsd-2024-33398 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.647172Z |
| gsd-2024-33397 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.614589Z |
| gsd-2024-33396 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.615028Z |
| gsd-2024-33395 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.704229Z |
| gsd-2024-33394 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.712015Z |
| gsd-2024-33393 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.686503Z |
| gsd-2024-33392 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.736262Z |
| gsd-2024-33391 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.703996Z |
| gsd-2024-33390 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.752268Z |
| gsd-2024-33389 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.639989Z |
| gsd-2024-33388 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.663762Z |
| gsd-2024-33387 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.725919Z |
| gsd-2024-33386 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.757270Z |
| gsd-2024-33385 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.702499Z |
| gsd-2024-33384 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.651908Z |
| gsd-2024-33383 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.760137Z |
| gsd-2024-33382 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.713242Z |
| gsd-2024-33381 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.700809Z |
| gsd-2024-33380 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.743956Z |
| gsd-2024-33379 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.717530Z |
| gsd-2024-33378 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.733311Z |
| gsd-2024-33377 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.696373Z |
| gsd-2024-33376 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.759944Z |
| gsd-2024-33375 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.736057Z |
| gsd-2024-33374 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.632805Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2822 | Malicious code in ing-web-v5 (npm) | 2026-04-17T02:00:34Z | 2026-04-23T20:50:50Z |
| mal-2026-2776 | Malicious code in int-browsing-gateway (npm) | 2026-04-16T10:01:30Z | 2026-04-23T20:50:50Z |
| mal-2026-2775 | Malicious code in insomnia-smoke-test (npm) | 2026-04-16T10:01:27Z | 2026-04-23T20:50:50Z |
| mal-2026-2774 | Malicious code in insomnia-scripting-environment (npm) | 2026-04-16T10:01:25Z | 2026-04-23T20:50:50Z |
| mal-2026-2773 | Malicious code in insomnia-api (npm) | 2026-04-16T10:01:23Z | 2026-04-23T20:50:50Z |
| mal-2026-2772 | Malicious code in idaasfinancialnodeserv (npm) | 2026-04-16T10:01:07Z | 2026-04-23T20:50:50Z |
| mal-2026-2771 | Malicious code in icims-express-dot-engine (npm) | 2026-04-16T10:01:05Z | 2026-04-23T20:50:50Z |
| mal-2026-2770 | Malicious code in helios-components (npm) | 2026-04-16T10:00:25Z | 2026-04-23T20:50:50Z |
| mal-2026-2769 | Malicious code in hardhat-starter-kit (npm) | 2026-04-16T10:00:10Z | 2026-04-23T20:50:50Z |
| mal-2026-2768 | Malicious code in h3-next (npm) | 2026-04-16T10:00:02Z | 2026-04-23T20:50:50Z |
| mal-2026-2767 | Malicious code in ground-platform (npm) | 2026-04-16T09:59:40Z | 2026-04-23T20:50:50Z |
| mal-2026-2766 | Malicious code in gke-net (npm) | 2026-04-16T09:58:54Z | 2026-04-23T20:50:50Z |
| mal-2026-2765 | Malicious code in ghscan-pkgcheck-test-001 (npm) | 2026-04-16T09:58:43Z | 2026-04-23T20:50:50Z |
| mal-2026-2764 | Malicious code in gemini-cli-vscode-ide-companion (npm) | 2026-04-16T09:58:22Z | 2026-04-23T20:50:50Z |
| mal-2026-2763 | Malicious code in gemini-ai-checker (npm) | 2026-04-16T09:58:20Z | 2026-04-23T20:50:50Z |
| mal-2026-2762 | Malicious code in farikku-util (npm) | 2026-04-16T09:56:35Z | 2026-04-23T20:50:50Z |
| mal-2026-2761 | Malicious code in f0-fpti-tracking (npm) | 2026-04-16T09:56:20Z | 2026-04-23T20:50:50Z |
| mal-2026-2760 | Malicious code in f0-email-verification (npm) | 2026-04-16T09:56:16Z | 2026-04-23T20:50:50Z |
| mal-2026-2759 | Malicious code in express-auth-basic (npm) | 2026-04-16T09:56:04Z | 2026-04-23T20:50:50Z |
| mal-2026-2758 | Malicious code in estaspnet (npm) | 2026-04-16T09:55:13Z | 2026-04-23T20:50:50Z |
| mal-2026-2757 | Malicious code in docai-sheets (npm) | 2026-04-16T09:53:31Z | 2026-04-23T20:50:50Z |
| mal-2026-2756 | Malicious code in digitallogger (npm) | 2026-04-16T09:53:05Z | 2026-04-23T20:50:50Z |
| mal-2026-2755 | Malicious code in devops-debug-tool-ctf (npm) | 2026-04-16T09:52:56Z | 2026-04-23T20:50:50Z |
| mal-2026-2754 | Malicious code in deployer-kit (npm) | 2026-04-16T09:52:37Z | 2026-04-23T20:50:50Z |
| mal-2026-2753 | Malicious code in declarative-tracker (npm) | 2026-04-16T09:52:10Z | 2026-04-23T20:50:50Z |
| mal-2026-2752 | Malicious code in country-specialization (npm) | 2026-04-16T09:50:53Z | 2026-04-23T20:50:50Z |
| mal-2026-2751 | Malicious code in coremeshnode (npm) | 2026-04-16T09:50:50Z | 2026-04-23T20:50:50Z |
| mal-2026-2750 | Malicious code in coremesh (npm) | 2026-04-16T09:50:48Z | 2026-04-23T20:50:50Z |
| mal-2026-2749 | Malicious code in conversation-relay (npm) | 2026-04-16T09:50:40Z | 2026-04-23T20:50:50Z |
| mal-2026-2748 | Malicious code in collect-rangers (npm) | 2026-04-16T09:50:10Z | 2026-04-23T20:50:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2380 | Xen: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2110 | LibTiff: Schwachstelle ermöglicht Codeausführung | 2025-09-22T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2085 | Red Hat OpenShift Service Mesh: Mehrere Schwachstellen | 2025-09-17T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2034 | Erlang/OTP: Mehrere Schwachstellen | 2025-09-10T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2007 | Xen: Mehrere Schwachstellen | 2025-09-09T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1654 | libTIFF (Tiffmedian, Thumbnail): Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1205 | Golang Go: Mehrere Schwachstellen | 2025-06-01T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-0270 | cURL: Mehrere Schwachstellen | 2025-02-04T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-0259 | Red Hat Satellite: Schwachstelle ermöglicht Denial of Service | 2025-02-04T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-0131 | OpenSSL: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-20T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2023-1608 | Perl: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-06-29T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2840 | Exim: Schwachstelle ermöglicht Codeausführung | 2025-12-14T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2495 | Django: Mehrere Schwachstellen ermöglichen Denial of Service und SQL-Injection | 2025-11-05T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2436 | Xwayland und X.Org X11: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-10-28T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2083 | Ruby: Schwachstelle ermöglicht Denial of Service | 2025-09-17T22:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2825 | MediaWiki: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-12-10T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2028 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Codeausführung | 2025-09-10T22:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-0754 | Red Hat Enterprise Linux (opentelemetry-collector): Schwachstelle ermöglicht Denial of Service | 2025-04-08T22:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-0606 | Red Hat Enterprise Linux (Gatekeeper): Mehrere Schwachstellen ermöglichen Denial of Service | 2025-03-19T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-0485 | Golang Go: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-03-04T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-0123 | Red Hat Enterprise Linux und and OpenShift (go-git): Mehrere Schwachstellen | 2025-01-19T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2024-0789 | HTTP/2: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-04-03T22:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2023-3174 | SSH Protokoll: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-12-18T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2930 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-07-21T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1744 | OpenJPEG: Schwachstelle ermöglicht Denial of Service | 2025-08-07T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2025-0956 | Red Hat Enterprise Linux (mod_auth_openidc): Schwachstelle ermöglicht Denial of Service | 2025-05-06T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2025-0836 | Red Hat Enterprise Linux (mod_auth_openidc): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-04-15T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2024-1850 | Red Hat Enterprise Linux: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-08-13T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2023-2853 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2023-11-07T23:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2023-0580 | Red Hat Enterprise Linux (mod_auth_openidc): Mehrere Schwachstellen | 2022-05-10T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-14-070-01a | Yokogawa CENTUM CS 3000 Vulnerabilities (Update A) | 2014-12-12T07:00:00.000000Z | 2025-06-09T19:43:46.423532Z |
| icsa-14-058-02 | Schneider Electric OFS Buffer Overflow Vulnerability | 2014-11-30T07:00:00.000000Z | 2025-06-09T19:43:40.210642Z |
| icsa-14-058-01 | Schneider Electric Floating License Manager Vulnerability | 2014-11-30T07:00:00.000000Z | 2025-06-09T19:43:33.991609Z |
| icsa-14-051-04 | NTP Reflection Attack | 2014-11-23T07:00:00.000000Z | 2025-06-09T19:43:27.743131Z |
| icsa-14-051-03b | Siemens RuggedCom Uncontrolled Resource Consumption Vulnerability (Update B) | 2014-11-23T07:00:00.000000Z | 2025-06-09T19:43:21.515365Z |
| icsa-14-051-02 | Mitsubishi Electric Automation MC-WorX Suite Unsecure ActiveX Control | 2014-11-23T07:00:00.000000Z | 2025-06-09T19:43:15.290237Z |
| icsa-14-051-01 | ICONICS GENESIS32 Insecure ActiveX Control | 2014-11-23T07:00:00.000000Z | 2025-06-09T19:43:09.046616Z |
| icsa-14-035-01 | Siemens SIMATIC WinCC OA Multiple Vulnerabilities | 2014-11-07T07:00:00.000000Z | 2025-06-09T19:42:44.156944Z |
| icsa-14-030-01 | 3S CoDeSys Runtime Toolkit NULL Pointer Dereference | 2014-11-02T06:00:00.000000Z | 2025-06-09T19:42:37.929242Z |
| icsa-14-023-01 | GE Proficy Vulnerabilities | 2014-10-26T06:00:00.000000Z | 2025-06-09T19:42:31.704274Z |
| icsa-14-021-01 | Rockwell RSLogix 5000 Password Vulnerability | 2014-10-24T06:00:00.000000Z | 2025-06-09T19:42:25.052428Z |
| icsa-11-175-01 | Rockwell FactoryTalk Diag Viewer Memory Corruption | 2011-03-27T06:00:00.000000Z | 2025-06-09T17:27:42.494579Z |
| icsa-11-167-01 | Sunway Force Control | 2011-03-19T06:00:00.000000Z | 2025-06-09T17:27:36.242999Z |
| icsa-11-131-01 | ICONICS GENESIS32 and BizViz ActiveX Stack Overflow | 2011-02-11T07:00:00.000000Z | 2025-06-09T17:27:30.000102Z |
| icsa-11-119-01 | 7-Technologies IGSS ODBC Remote Stack Overflow | 2011-01-30T07:00:00.000000Z | 2025-06-09T17:27:17.552804Z |
| icsa-11-094-01 | Wonderware InBatch Client ActiveX Buffer Overflow | 2011-01-05T07:00:00.000000Z | 2025-06-09T17:27:11.317840Z |
| icsa-11-082-01 | Ecava IntegraXor SQL | 2011-12-24T07:00:00.000000Z | 2025-06-09T17:27:05.078770Z |
| icsa-11-074-01 | WellinTech KingView 6.53 KVWebSvr ActiveX | 2011-12-16T07:00:00.000000Z | 2025-06-09T17:26:58.846835Z |
| icsa-11-069-01b | Samsung Data Management Server (Update B) | 2011-12-11T07:00:00.000000Z | 2025-06-09T17:26:52.608805Z |
| icsa-11-018-02 | 7-Technologies IGSS 8 ODBC Server Remote Heap Corruption | 2011-10-21T06:00:00.000000Z | 2025-06-09T17:26:46.401729Z |
| icsa-11-017-02 | Sielco Sistemi WinLog Stack Overflow | 2011-10-20T06:00:00.000000Z | 2025-06-09T17:26:40.152728Z |
| icsa-11-017-01 | WellinTech Kingview 6.53 Remote Heap Overflow | 2011-10-20T06:00:00.000000Z | 2025-06-09T17:26:33.851054Z |
| icsa-16-278-02 | Beckhoff Embedded PC Images and TwinCAT Components Vulnerabilities | 2016-07-08T06:00:00.000000Z | 2025-06-09T17:26:21.351731Z |
| icsa-16-278-01 | INDAS Web SCADA Path Traversal Vulnerability | 2016-07-08T06:00:00.000000Z | 2025-06-09T17:26:15.107305Z |
| icsa-16-273-01 | American Auto-Matrix Front-End Solutions Vulnerabilities | 2016-07-03T06:00:00.000000Z | 2025-06-09T17:26:02.661948Z |
| icsa-16-271-01 | Siemens SCALANCE M-800/S615 Web Vulnerability | 2016-07-01T06:00:00.000000Z | 2025-06-09T17:25:56.431711Z |
| icsa-16-264-01 | Moxa Active OPC Server Unquoted Service Path Escalation Vulnerability | 2016-06-24T06:00:00.000000Z | 2025-06-09T17:25:49.863879Z |
| icsa-16-259-03 | Trane Tracer SC Sensitive Information Exposure Vulnerability | 2016-06-19T06:00:00.000000Z | 2025-06-09T17:25:43.638859Z |
| icsa-16-259-02 | ABB DataManagerPro Credential Management Vulnerability | 2016-06-19T06:00:00.000000Z | 2025-06-09T17:25:37.418487Z |
| icsa-16-259-01 | Yokogawa STARDOM Authentication Bypass Vulnerability | 2016-06-19T06:00:00.000000Z | 2025-06-09T17:25:31.208192Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-broadworks-xss-6syj82ju | Cisco BroadWorks Application Delivery Platform and Xtended Services Platform Stored Cross-Site Scripting Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-23T17:43:55+00:00 |
| cisco-sa-broadworks-xss-6syj82Ju | Cisco BroadWorks Application Delivery Platform and Xtended Services Platform Stored Cross-Site Scripting Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-23T17:43:55+00:00 |
| cisco-sa-tms-portal-xss-axnevg3s | Cisco TelePresence Management Suite Cross-Site Scripting Vulnerabilities | 2024-01-10T16:00:00+00:00 | 2024-01-12T15:18:40+00:00 |
| cisco-sa-tms-portal-xss-AXNeVg3s | Cisco TelePresence Management Suite Cross-Site Scripting Vulnerabilities | 2024-01-10T16:00:00+00:00 | 2024-01-12T15:18:40+00:00 |
| cisco-sa-thouseyes-privesc-dmzhg3qv | Cisco ThousandEyes Enterprise Agent Virtual Appliance Privilege Escalation Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-thouseyes-privesc-DmzHG3Qv | Cisco ThousandEyes Enterprise Agent Virtual Appliance Privilege Escalation Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-sb-wap-inject-bhstwgxo | Cisco WAP371 Wireless Access Point Command Injection Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-sb-wap-inject-bHStWgXO | Cisco WAP371 Wireless Access Point Command Injection Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-pi-epnm-wkzjeyeq | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Vulnerabilities | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-pi-epnm-wkZJeyeq | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Vulnerabilities | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-ise-xss-bl4vtml | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-ISE-XSS-bL4VTML | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-ise-priv-esc-kjlp2aw | Cisco Identity Services Engine Privilege Escalation Vulnerabilities | 2023-09-06T16:00:00+00:00 | 2024-01-08T19:01:50+00:00 |
| cisco-sa-ise-priv-esc-KJLp2Aw | Cisco Identity Services Engine Privilege Escalation Vulnerabilities | 2023-09-06T16:00:00+00:00 | 2024-01-08T19:01:50+00:00 |
| cisco-sa-struts-c2kcmkmt | Apache Struts Vulnerability Affecting Cisco Products: December 2023 | 2023-12-12T16:00:00+00:00 | 2023-12-21T22:23:04+00:00 |
| cisco-sa-struts-C2kCMkmT | Apache Struts Vulnerability Affecting Cisco Products: December 2023 | 2023-12-12T16:00:00+00:00 | 2023-12-21T22:23:04+00:00 |
| cisco-sa-http2-reset-d8kf32vz | HTTP/2 Rapid Reset Attack Affecting Cisco Products: October 2023 | 2023-10-16T16:00:00+00:00 | 2023-12-21T17:09:38+00:00 |
| cisco-sa-http2-reset-d8Kf32vZ | HTTP/2 Rapid Reset Attack Affecting Cisco Products: October 2023 | 2023-10-16T16:00:00+00:00 | 2023-12-21T17:09:38+00:00 |
| cisco-sa-asa-ssl-vpn-y88qom77 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Packet Validation Vulnerability | 2023-12-05T16:00:00+00:00 | 2023-12-05T16:00:00+00:00 |
| cisco-sa-asa-ssl-vpn-Y88QOm77 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Packet Validation Vulnerability | 2023-12-05T16:00:00+00:00 | 2023-12-05T16:00:00+00:00 |
| cisco-sa-ftd-icmpv6-dos-4emklun | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services ICMPv6 with Snort 2 Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-16T21:10:27+00:00 |
| cisco-sa-ftd-icmpv6-dos-4eMkLuN | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services ICMPv6 with Snort 2 Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-16T21:10:27+00:00 |
| cisco-sa-uipphone-xss-ncmuykqa | Cisco IP Phone Stored Cross-Site Scripting Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-uipphone-xss-NcmUykqA | Cisco IP Phone Stored Cross-Site Scripting Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-secure-endpoint-dos-rzogfknd | Cisco Secure Endpoint for Windows Scanning Evasion Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-secure-endpoint-dos-RzOgFKnd | Cisco Secure Endpoint for Windows Scanning Evasion Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-ise-mult-j-kxpnynr | Cisco Identity Services Engine Vulnerabilities | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-ise-mult-j-KxpNynR | Cisco Identity Services Engine Vulnerabilities | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-appd-php-authpriv-gebwtvu5 | Cisco AppDynamics PHP Agent Privilege Escalation Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-appd-php-authpriv-gEBwTvu5 | Cisco AppDynamics PHP Agent Privilege Escalation Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31452 | ext4: convert inline data to extents when truncate exceeds inline size | 2026-04-02T00:00:00.000Z | 2026-04-29T15:00:27.000Z |
| msrc_cve-2026-31600 | arm64: mm: Handle invalid large leaf mappings correctly | 2026-04-02T00:00:00.000Z | 2026-04-29T15:00:22.000Z |
| msrc_cve-2026-40225 | CVE-2026-40225 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:59:35.000Z |
| msrc_cve-2026-5958 | Race Condition in GNU Sed | 2026-04-02T00:00:00.000Z | 2026-04-29T14:59:34.000Z |
| msrc_cve-2025-51480 | Path Traversal vulnerability in onnx.external_data_helper.save_external_data in ONNX 1.17.0 allows attackers to overwrite arbitrary files by supplying crafted external_data.location paths containing traversal sequences, bypassing intended directory restrictions. | 2025-07-02T00:00:00.000Z | 2026-04-29T14:59:26.000Z |
| msrc_cve-2026-41254 | CVE-2026-41254 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:59:03.000Z |
| msrc_cve-2025-71269 | btrfs: do not free data reservation in fallback from inline due to -ENOSPC | 2026-03-02T00:00:00.000Z | 2026-04-29T14:59:02.000Z |
| msrc_cve-2026-31563 | net: macb: Use dev_consume_skb_any() to free TX SKBs | 2026-04-02T00:00:00.000Z | 2026-04-29T14:58:53.000Z |
| msrc_cve-2026-5160 | CVE-2026-5160 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:58:47.000Z |
| msrc_cve-2024-55459 | An issue in keras 3.7.0 allows attackers to write arbitrary files to the user's machine via downloading a crafted tar file through the get_file function. | 2025-01-02T00:00:00.000Z | 2026-04-29T14:58:15.000Z |
| msrc_cve-2026-3713 | pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow | 2026-03-02T00:00:00.000Z | 2026-04-29T14:57:51.000Z |
| msrc_cve-2026-33555 | CVE-2026-33555 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:57:49.000Z |
| msrc_cve-2026-31565 | RDMA/irdma: Fix deadlock during netdev reset with active connections | 2026-04-02T00:00:00.000Z | 2026-04-29T14:57:41.000Z |
| msrc_cve-2026-31418 | netfilter: ipset: drop logically empty buckets in mtype_del | 2026-04-02T00:00:00.000Z | 2026-04-29T14:57:33.000Z |
| msrc_cve-2026-31428 | netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD | 2026-04-02T00:00:00.000Z | 2026-04-29T14:57:19.000Z |
| msrc_cve-2025-4748 | Absolute path traversal in zip:unzip/1,2 | 2025-06-02T00:00:00.000Z | 2026-04-29T14:57:19.000Z |
| msrc_cve-2026-31421 | net/sched: cls_fw: fix NULL pointer dereference on shared blocks | 2026-04-02T00:00:00.000Z | 2026-04-29T14:57:03.000Z |
| msrc_cve-2026-31570 | can: gw: fix OOB heap access in cgw_csum_crc8_rel() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:56:43.000Z |
| msrc_cve-2025-5791 | Users: `root` appended to group listings | 2025-06-02T00:00:00.000Z | 2026-04-29T14:56:26.000Z |
| msrc_cve-2026-31426 | ACPI: EC: clean up handlers on probe failure in acpi_ec_setup() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:56:24.000Z |
| msrc_cve-2026-31427 | netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp | 2026-04-02T00:00:00.000Z | 2026-04-29T14:56:09.000Z |
| msrc_cve-2025-58160 | Tracing logging user input may result in poisoning logs with ANSI escape sequences | 2025-08-02T00:00:00.000Z | 2026-04-29T14:55:59.000Z |
| msrc_cve-2026-31566 | drm/amdgpu: Fix fence put before wait in amdgpu_amdkfd_submit_ib | 2026-04-02T00:00:00.000Z | 2026-04-29T14:55:58.000Z |
| msrc_cve-2026-31414 | netfilter: nf_conntrack_expect: use expect->helper | 2026-04-02T00:00:00.000Z | 2026-04-29T14:55:55.000Z |
| msrc_cve-2026-31422 | net/sched: cls_flow: fix NULL pointer dereference on shared blocks | 2026-04-02T00:00:00.000Z | 2026-04-29T14:55:40.000Z |
| msrc_cve-2026-31417 | net/x25: Fix overflow when accumulating packets | 2026-04-02T00:00:00.000Z | 2026-04-29T14:55:26.000Z |
| msrc_cve-2026-31424 | netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP | 2026-04-02T00:00:00.000Z | 2026-04-29T14:55:12.000Z |
| msrc_cve-2026-31423 | net/sched: sch_hfsc: fix divide-by-zero in rtsc_min() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:57.000Z |
| msrc_cve-2026-31589 | mm: call ->free_folio() directly in folio_unmap_invalidate() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:48.000Z |
| msrc_cve-2026-31416 | netfilter: nfnetlink_log: account for netlink header size | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:44.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0334 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-08-13T18:19:27.728322Z | 2024-08-27T07:59:08.391850Z |
| ncsc-2024-0351 | Kwetsbaarheden verholpen in Google Chrome, Chromium & Microsoft Edge | 2024-08-22T11:42:49.629133Z | 2024-08-23T12:59:41.787815Z |
| ncsc-2024-0352 | Kwetsbaarheden verholpen in Solarwinds Web Helpdesk | 2024-08-22T13:05:56.658579Z | 2024-08-22T13:05:56.658579Z |
| ncsc-2024-0350 | Kwetsbaarheden verholpen in GitHub Enterprise Server | 2024-08-22T11:40:38.472495Z | 2024-08-22T11:40:38.472495Z |
| ncsc-2024-0349 | Kwetsbaarheid verholpen in Kubernetes | 2024-08-19T11:37:30.925578Z | 2024-08-19T11:37:30.925578Z |
| ncsc-2024-0348 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2024-08-14T12:58:38.046219Z | 2024-08-14T12:58:38.046219Z |
| ncsc-2024-0347 | Kwetsbaarheden verholpen in Adobe Acrobat en Acrobat Reader | 2024-08-14T12:52:29.316273Z | 2024-08-14T12:52:29.316273Z |
| ncsc-2024-0346 | Kwetsbaarheden verholpen in Adobe InDesign | 2024-08-14T12:47:08.240249Z | 2024-08-14T12:47:08.240249Z |
| ncsc-2024-0345 | Kwetsbaarheid verholpen in Adobe Photoshop | 2024-08-14T12:44:49.541083Z | 2024-08-14T12:44:49.541083Z |
| ncsc-2024-0344 | Kwetsbaarheden verholpen in Adobe Dimension | 2024-08-14T12:42:00.097800Z | 2024-08-14T12:42:00.097800Z |
| ncsc-2024-0343 | Kwetsbaarheden verholpen in Adobe Illustrator | 2024-08-14T12:38:58.918490Z | 2024-08-14T12:38:58.918490Z |
| ncsc-2024-0342 | Kwetsbaarheden verholpen in Ivanti Avalanche | 2024-08-14T09:56:40.653912Z | 2024-08-14T09:56:40.653912Z |
| ncsc-2024-0341 | Kwetsbaarheden verholpen in Ivanti Neurons for ITSM | 2024-08-14T09:54:26.701111Z | 2024-08-14T09:54:26.701111Z |
| ncsc-2024-0339 | Kwetsbaarheden verholpen in Microsoft Mariner | 2024-08-13T18:23:22.271316Z | 2024-08-13T18:23:22.271316Z |
| ncsc-2024-0338 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2024-08-13T18:22:21.160613Z | 2024-08-13T18:22:21.160613Z |
| ncsc-2024-0337 | Kwetsbaarheden verholpen in Microsoft Office | 2024-08-13T18:21:45.385690Z | 2024-08-13T18:21:45.385690Z |
| ncsc-2024-0336 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-08-13T18:21:06.220640Z | 2024-08-13T18:21:06.220640Z |
| ncsc-2024-0335 | Kwetsbaarheden verholpen in Microsoft Azure componenten | 2024-08-13T18:20:23.647785Z | 2024-08-13T18:20:23.647785Z |
| ncsc-2024-0333 | Kwetsbaarheden verholpen in SAP producten | 2024-08-13T13:47:02.764070Z | 2024-08-13T13:47:02.764070Z |
| ncsc-2024-0332 | Kwetsbaarheden verholpen in Siemens producten | 2024-08-13T09:21:28.381575Z | 2024-08-13T09:21:28.381575Z |
| ncsc-2024-0331 | Kwetsbaarheden verholpen in Zabbix | 2024-08-12T10:34:15.273912Z | 2024-08-12T10:34:15.273912Z |
| ncsc-2024-0330 | Kwetsbaarheid verholpen in Asterisk | 2024-08-12T10:31:33.788930Z | 2024-08-12T10:31:33.788930Z |
| ncsc-2024-0329 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-08-12T08:24:49.808846Z | 2024-08-12T08:24:49.808846Z |
| ncsc-2024-0328 | Kwetsbaarheden verholpen in IBM InfoSphere | 2024-08-12T08:22:38.701674Z | 2024-08-12T08:22:38.701674Z |
| ncsc-2024-0327 | Kwetsbaarheden verholpen in Cisco Small Business IP Phones | 2024-08-08T08:01:30.827296Z | 2024-08-08T08:01:30.827296Z |
| ncsc-2024-0268 | Kwetsbaarheden verholpen in Progress WhatsUp Gold | 2024-06-26T07:43:11.795773Z | 2024-08-08T07:50:41.453544Z |
| ncsc-2024-0326 | Kwetsbaarheden verholpen in RoundCube Webmail | 2024-08-08T07:45:42.674316Z | 2024-08-08T07:45:42.674316Z |
| ncsc-2024-0325 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS en InstantOS | 2024-08-07T09:04:14.955844Z | 2024-08-07T09:04:14.955844Z |
| ncsc-2024-0324 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2024-08-07T08:58:12.457235Z | 2024-08-07T08:58:12.457235Z |
| ncsc-2024-0323 | Kwetsbaarheden verholpen in Siemens Omnivise | 2024-08-06T09:29:53.292433Z | 2024-08-06T09:29:53.292433Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10157-1 | libsnmp45-32bit-5.9.5.2-1.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10156-1 | micropython-1.26.1-2.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10155-1 | cockpit-podman-119.1-2.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10154-1 | cockpit-354-3.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:10153-1 | chromedriver-144.0.7559.132-1.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| opensuse-su-2026:20180-1 | Security update for python-maturin | 2026-02-05T20:51:59Z | 2026-02-05T20:51:59Z |
| opensuse-su-2026:20178-1 | Security update for libxml2 | 2026-02-05T11:26:20Z | 2026-02-05T11:26:20Z |
| opensuse-su-2026:20177-1 | Security update for golang-github-prometheus-prometheus | 2026-02-05T10:44:24Z | 2026-02-05T10:44:24Z |
| opensuse-su-2026:10152-1 | python315-3.15.0~a3-4.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10151-1 | python311-wheel-0.46.3-1.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10150-1 | cockpit-subscriptions-14.4-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10149-1 | cockpit-repos-4.7-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10148-1 | cockpit-packages-4.1-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:10147-1 | cockpit-machines-346-2.1 on GA media | 2026-02-05T00:00:00Z | 2026-02-05T00:00:00Z |
| opensuse-su-2026:20172-1 | Security update for cups | 2026-02-04T11:37:13Z | 2026-02-04T11:37:13Z |
| opensuse-su-2026:10146-1 | libpainter0-0.9.27-1.1 on GA media | 2026-02-04T00:00:00Z | 2026-02-04T00:00:00Z |
| opensuse-su-2026:10145-1 | python312-Django6-6.0.2-1.1 on GA media | 2026-02-04T00:00:00Z | 2026-02-04T00:00:00Z |
| opensuse-su-2026:10144-1 | expat-2.7.4-1.1 on GA media | 2026-02-04T00:00:00Z | 2026-02-04T00:00:00Z |
| opensuse-ru-2026:20168-1 | Recommended update for gimp | 2026-02-03T18:05:40Z | 2026-02-03T18:05:40Z |
| opensuse-su-2026:20167-1 | Security update for xrdp | 2026-02-03T15:00:07Z | 2026-02-03T15:00:07Z |
| opensuse-su-2026:10143-1 | traefik2-2.11.35-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10142-1 | traefik-3.6.7-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10141-1 | rizin-0.8.2-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10140-1 | patch-2.8-2.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10139-1 | libsoup-3_0-0-3.6.5-12.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10138-1 | java-25-openj9-25.0.2.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10137-1 | java-21-openj9-21.0.10.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10136-1 | java-1_8_0-openjdk-1.8.0.482-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10135-1 | java-1_8_0-openj9-1.8.0.482-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10134-1 | java-17-openj9-17.0.18.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:8322 | Red Hat Security Advisory: rhc security update | 2026-04-15T15:31:17+00:00 | 2026-05-09T08:38:23+00:00 |
| rhsa-2025:9776 | Red Hat Security Advisory: New RHCS 8.1 container image is now available in the Red Hat Ecosystem Catalog. | 2025-06-26T12:12:44+00:00 | 2026-05-09T08:38:22+00:00 |
| rhsa-2025:4240 | Red Hat Security Advisory: Updated 6.1 container image is now available in the Red Hat Ecosystem Catalog. | 2025-04-28T05:29:21+00:00 | 2026-05-09T08:38:21+00:00 |
| rhsa-2025:2449 | Red Hat Security Advisory: OpenShift Container Platform 4.18.4 security update | 2025-03-11T02:08:00+00:00 | 2026-05-09T08:38:21+00:00 |
| rhsa-2025:22684 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.12.6 security update | 2025-12-03T23:53:32+00:00 | 2026-05-09T08:38:21+00:00 |
| rhsa-2025:22683 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.7.7 security update | 2025-12-03T22:50:31+00:00 | 2026-05-09T08:38:20+00:00 |
| rhsa-2025:0832 | Red Hat Security Advisory: OpenShift Container Platform 4.12.72 bug fix and security update | 2025-02-06T00:45:40+00:00 | 2026-05-09T08:38:20+00:00 |
| rhsa-2025:1116 | Red Hat Security Advisory: OpenShift Container Platform 4.13.55 bug fix and security update | 2025-02-13T02:27:35+00:00 | 2026-05-09T08:38:19+00:00 |
| rhsa-2024:9615 | Red Hat Security Advisory: OpenShift Container Platform 4.16.23 bug fix and security update | 2024-11-20T00:46:32+00:00 | 2026-05-09T08:38:19+00:00 |
| rhsa-2024:8677 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.12.6 security update | 2024-10-30T18:18:28+00:00 | 2026-05-09T08:38:18+00:00 |
| rhsa-2025:0664 | Red Hat Security Advisory: Release of OpenShift Serverless Logic 1.35.0 security update & enhancements | 2025-01-23T13:02:37+00:00 | 2026-05-09T08:38:17+00:00 |
| rhsa-2025:0654 | Red Hat Security Advisory: OpenShift Container Platform 4.17.14 bug fix and security update | 2025-01-28T04:28:50+00:00 | 2026-05-09T08:38:16+00:00 |
| rhsa-2025:0014 | Red Hat Security Advisory: OpenShift Container Platform 4.12.71 bug fix and security update | 2025-01-09T02:15:46+00:00 | 2026-05-09T08:38:16+00:00 |
| rhsa-2024:8704 | Red Hat Security Advisory: Kube Descheduler Operator for Red Hat OpenShift 5.0.2 for RHEL 9 | 2024-12-02T14:11:34+00:00 | 2026-05-09T08:38:14+00:00 |
| rhsa-2024:8676 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17.0 Security, Enhancement, & Bug Fix Update | 2024-10-30T14:25:22+00:00 | 2026-05-09T08:38:13+00:00 |
| rhsa-2024:8434 | Red Hat Security Advisory: OpenShift Container Platform 4.17.3 security update | 2024-10-29T17:50:43+00:00 | 2026-05-09T08:38:13+00:00 |
| rhsa-2024:8415 | Red Hat Security Advisory: OpenShift Container Platform 4.16.19 bug fix and security update | 2024-10-30T01:12:50+00:00 | 2026-05-09T08:38:11+00:00 |
| rhsa-2024:8040 | Red Hat Security Advisory: Cluster Observability Operator 0.4.1 | 2024-10-14T01:36:23+00:00 | 2026-05-09T08:38:10+00:00 |
| rhsa-2024:7922 | Red Hat Security Advisory: OpenShift Container Platform 4.17.1 bug fix and security update | 2024-10-16T02:39:40+00:00 | 2026-05-09T08:38:10+00:00 |
| rhsa-2024:7548 | Red Hat Security Advisory: Run Once Duration Override Operator for Red Hat OpenShift 1.2.0 for RHEL 9 | 2024-10-16T00:34:49+00:00 | 2026-05-09T08:38:08+00:00 |
| rhsa-2024:7184 | Red Hat Security Advisory: OpenShift Container Platform 4.14.38 security update | 2024-10-03T11:01:15+00:00 | 2026-05-09T08:38:08+00:00 |
| rhsa-2024:6824 | Red Hat Security Advisory: OpenShift Container Platform 4.16.14 security update | 2024-09-24T15:28:01+00:00 | 2026-05-09T08:38:07+00:00 |
| rhsa-2024:6755 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.2 security and bug fix update | 2024-09-18T11:56:25+00:00 | 2026-05-09T08:38:07+00:00 |
| rhsa-2024:6221 | Red Hat Security Advisory: The Red Hat OpenShift Builds 1.1.0 General Availability | 2024-09-03T11:45:04+00:00 | 2026-05-09T08:38:06+00:00 |
| rhsa-2024:6409 | Red Hat Security Advisory: OpenShift Container Platform 4.15.31 bug fix and security update | 2024-09-11T13:39:54+00:00 | 2026-05-09T08:38:05+00:00 |
| rhsa-2024:6122 | Red Hat Security Advisory: OpenShift Container Platform 4.18.1 bug fix and security update | 2025-02-25T04:38:13+00:00 | 2026-05-09T08:38:04+00:00 |
| rhsa-2024:6004 | Red Hat Security Advisory: OpenShift Container Platform 4.16.10 bug fix and security update | 2024-09-03T19:13:56+00:00 | 2026-05-09T08:38:04+00:00 |
| rhsa-2024:5422 | Red Hat Security Advisory: OpenShift Container Platform 4.16.8 bug fix and security update | 2024-08-20T15:21:42+00:00 | 2026-05-09T08:38:03+00:00 |
| rhsa-2024:5054 | Red Hat Security Advisory: OpenShift Virtualization 4.16.1 Images security update | 2024-08-06T16:21:05+00:00 | 2026-05-09T08:38:03+00:00 |
| rhsa-2024:5013 | Red Hat Security Advisory: The Red Hat OpenShift Builds Client 1.1.0 General Availability | 2024-08-05T15:40:28+00:00 | 2026-05-09T08:38:03+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-637483 | SSA-637483 Third-Party Component Vulnerabilities in SINEC INS before V1.0 SP2 | 2022-09-13T00:00:00Z | 2022-09-13T00:00:00Z |
| ssa-518824 | SSA-518824 Multiple File Parsing Vulnerabilities in Simcenter Femap and Parasolid | 2022-09-13T00:00:00Z | 2022-09-13T00:00:00Z |
| ssa-243317 | SSA-243317 File Parsing Vulnerability in Simcenter Femap and Parasolid | 2022-07-12T00:00:00Z | 2022-09-13T00:00:00Z |
| ssa-914168 | SSA-914168: Multiple Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products | 2022-02-08T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-789162 | SSA-789162: Vulnerabilities in Teamcenter | 2022-05-10T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-759952 | SSA-759952: Command Injection and Denial of Service Vulnerability in Teamcenter | 2022-08-09T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-732250 | SSA-732250: Libcurl Vulnerabilities in Industrial Devices | 2022-05-10T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-669737 | SSA-669737: Improper Access Control Vulnerability in SICAM TOOLBOX II | 2022-02-08T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-661034 | SSA-661034: Incorrect Permission Assignment in Multiple SIMATIC Software Products | 2021-07-13T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-629512 | SSA-629512: Local Privilege Escalation Vulnerability in TIA Portal | 2020-01-14T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-580125 | SSA-580125: Multiple Vulnerabilities in SIMATIC eaSie | 2022-07-12T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-555707 | SSA-555707: Information Disclosure Vulnerability in Simcenter STAR-CCM+ | 2022-08-09T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-492828 | SSA-492828: Denial-of-Service Vulnerability in SIMATIC S7-300 CPUs and SINUMERIK Controller | 2020-11-10T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-232418 | SSA-232418: Vulnerabilities in SIMATIC S7-1200 and SIMATIC S7-1500 CPU Families | 2019-08-13T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-220589 | SSA-220589: Hard Coded Default Credential Vulnerability in Teamcenter | 2022-06-14T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-185638 | SSA-185638: Authentication Bypass Vulnerability in SICAM A8000 Web Server Module | 2022-08-09T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-944952 | SSA-944952: Authentication Bypass Vulnerability in Opcenter Quality | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-910883 | SSA-910883: DHCP Client Vulnerability in SINAMICS PERFECT HARMONY GH180 Drives | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-865333 | SSA-865333: Memory Corruption Vulnerability in EN100 Ethernet Module | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-711829 | SSA-711829: Denial of Service Vulnerability in TIA Administrator | 2022-04-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-610768 | SSA-610768: XML Entity Expansion Injection Vulnerability in Mendix Excel Importer Module | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-599506 | SSA-599506: Command Injection Vulnerability in RUGGEDCOM ROX | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-557804 | SSA-557804: Mirror Port Isolation Vulnerability in SCALANCE X Switches | 2019-03-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-492173 | SSA-492173: Expression Injection Vulnerability in Mendix Applications | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-491621 | SSA-491621: Denial of Service Vulnerability in CPC80 Firmware of SICAM A8000 Devices | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-474231 | SSA-474231: File Parsing Vulnerability in Simcenter Femap before V2022.2 | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-439148 | SSA-439148: File Parsing Vulnerabilities in PADS Standard/Plus Viewer | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-433782 | SSA-433782: Improper Access Control Vulnerability in Mendix | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-414513 | SSA-414513: Information Disclosure Vulnerability in Mendix | 2022-04-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ssa-348662 | SSA-348662: Multiple Vulnerabilities in SIMATIC MV500 Devices before V3.3 | 2022-07-12T00:00:00Z | 2022-07-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21047-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21046-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21075-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21074-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21045-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21044-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21073-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21072-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21071-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21070-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21043-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21042-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21041-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21040-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21158-1 | Security update for util-linux | 2026-04-09T13:04:04Z | 2026-04-09T13:04:04Z |
| suse-su-2026:21016-1 | Security update for util-linux | 2026-04-09T13:04:04Z | 2026-04-09T13:04:04Z |
| suse-su-2026:21153-1 | Security update for pgvector | 2026-04-09T12:14:34Z | 2026-04-09T12:14:34Z |
| suse-su-2026:21039-1 | Security update for glibc | 2026-04-09T12:13:01Z | 2026-04-09T12:13:01Z |
| suse-su-2026:21151-1 | Security update for zlib | 2026-04-09T11:18:28Z | 2026-04-09T11:18:28Z |
| suse-su-2026:21013-1 | Security update for zlib | 2026-04-09T11:18:28Z | 2026-04-09T11:18:28Z |
| suse-su-2026:21038-1 | Security update for libpng16 | 2026-04-09T11:10:09Z | 2026-04-09T11:10:09Z |
| suse-su-2026:21145-1 | Security update for perl-Authen-SASL | 2026-04-09T11:04:17Z | 2026-04-09T11:04:17Z |
| suse-su-2026:21069-1 | Security update for glibc | 2026-04-09T11:02:01Z | 2026-04-09T11:02:01Z |
| suse-su-2026:1232-1 | Security update for cockpit | 2026-04-09T10:47:29Z | 2026-04-09T10:47:29Z |
| suse-su-2026:21067-1 | Security update for libpng16 | 2026-04-09T10:16:32Z | 2026-04-09T10:16:32Z |
| suse-su-2026:1231-1 | Security update for the Linux Kernel (Live Patch 48 for SUSE Linux Enterprise 15 SP4) | 2026-04-09T09:04:39Z | 2026-04-09T09:04:39Z |
| suse-su-2026:1230-1 | Security update for bind | 2026-04-09T08:58:38Z | 2026-04-09T08:58:38Z |
| suse-su-2026:1229-1 | Security update for bind | 2026-04-09T08:58:06Z | 2026-04-09T08:58:06Z |
| suse-su-2026:21215-1 | Security update for patterns-glibc-hwcaps | 2026-04-09T08:56:02Z | 2026-04-09T08:56:02Z |
| suse-su-2026:21009-1 | Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:20959 | Important: libsoup security update | 2025-11-11T00:00:00Z | 2025-11-19T09:32:27Z |
| alsa-2025:20957 | Important: runc security update | 2025-11-11T00:00:00Z | 2025-11-19T09:31:22Z |
| alsa-2025:20956 | Important: libtiff security update | 2025-11-11T00:00:00Z | 2025-11-19T09:30:24Z |
| alsa-2025:20943 | Moderate: libssh security update | 2025-11-11T00:00:00Z | 2025-11-19T09:28:35Z |
| alsa-2025:20945 | Moderate: vim security update | 2025-11-11T00:00:00Z | 2025-11-19T09:26:44Z |
| alsa-2025:20936 | Important: sqlite security update | 2025-11-11T00:00:00Z | 2025-11-19T09:25:24Z |
| alsa-2025:20935 | Important: squid security update | 2025-11-11T00:00:00Z | 2025-11-19T09:24:20Z |
| alsa-2025:20926 | Important: redis security update | 2025-11-11T00:00:00Z | 2025-11-19T09:23:20Z |
| alsa-2025:20922 | Important: webkit2gtk3 security update | 2025-11-11T00:00:00Z | 2025-11-19T09:22:06Z |
| alsa-2025:20838 | Moderate: zziplib security update | 2025-11-11T00:00:00Z | 2025-11-19T09:20:52Z |
| alsa-2025:20559 | Low: shadow-utils security update | 2025-11-11T00:00:00Z | 2025-11-19T09:19:16Z |
| alsa-2025:20532 | Moderate: grub2 security update | 2025-11-11T00:00:00Z | 2025-11-19T09:18:10Z |
| alsa-2025:20518 | Moderate: kernel security update | 2025-11-11T00:00:00Z | 2025-11-19T09:15:54Z |
| alsa-2025:19950 | Important: bind9.18 security update | 2025-11-10T00:00:00Z | 2025-11-19T09:11:13Z |
| alsa-2025:19930 | Moderate: kernel security update | 2025-11-10T00:00:00Z | 2025-11-12T09:59:32Z |
| alsa-2025:19931 | Moderate: kernel security update | 2025-11-10T00:00:00Z | 2025-11-11T14:31:40Z |
| alsa-2025:19932 | Moderate: kernel-rt security update | 2025-11-10T00:00:00Z | 2025-11-11T12:37:42Z |
| alsa-2025:20034 | Important: libtiff security update | 2025-11-10T00:00:00Z | 2025-11-11T12:31:49Z |
| alsa-2025:19912 | Important: bind security update | 2025-11-06T00:00:00Z | 2025-11-10T13:13:44Z |
| alsa-2025:19927 | Important: runc security update | 2025-11-07T00:00:00Z | 2025-11-10T12:59:59Z |
| alsa-2025:19469 | Moderate: kernel security update | 2025-11-03T00:00:00Z | 2025-11-07T13:52:08Z |
| alsa-2025:19906 | Important: mingw-libtiff security update | 2025-11-06T00:00:00Z | 2025-11-07T13:28:57Z |
| alsa-2025:19909 | Important: tigervnc security update | 2025-11-06T00:00:00Z | 2025-11-07T13:19:40Z |
| alsa-2025:19345 | Important: redis:7 security update | 2025-10-30T00:00:00Z | 2025-11-07T12:12:46Z |
| alsa-2025:19403 | Important: expat security update | 2025-11-03T00:00:00Z | 2025-11-07T12:04:59Z |
| alsa-2025:19409 | Moderate: kernel security update | 2025-11-03T00:00:00Z | 2025-11-07T11:55:27Z |
| alsa-2025:19432 | Moderate: xorg-x11-server-Xwayland security update | 2025-11-03T00:00:00Z | 2025-11-07T11:17:51Z |
| alsa-2025:19435 | Moderate: xorg-x11-server-Xwayland security update | 2025-11-03T00:00:00Z | 2025-11-07T11:12:17Z |
| alsa-2025:19440 | Moderate: kernel-rt security update | 2025-11-03T00:00:00Z | 2025-11-07T11:04:50Z |
| alsa-2025:19447 | Moderate: kernel security update | 2025-11-03T00:00:00Z | 2025-11-07T10:53:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-965 | Stack-buffer-overflow in FLAC__stream_encoder_init_ogg_file | 2024-08-16T00:14:23.665242Z | 2024-08-16T00:14:23.665768Z |
| osv-2024-964 | Security exception in com.alibaba.fastjson2.JSONPathSegment$CycleNameSegment$MapLoop.accept | 2024-08-16T00:14:15.405443Z | 2024-08-16T00:14:15.405835Z |
| osv-2024-963 | Heap-buffer-overflow in GfxTilingPattern::scanXObjectForBlendMode | 2024-08-16T00:14:14.315705Z | 2024-08-16T00:14:14.316160Z |
| osv-2024-955 | Use-of-uninitialized-value in pcpp::IPv6Address::toString | 2024-08-16T00:13:46.718533Z | 2024-08-16T00:13:46.718830Z |
| osv-2024-951 | Index-out-of-bounds in hevc_ref_pic_lists_modification | 2024-08-16T00:13:38.322516Z | 2024-08-16T00:13:38.322849Z |
| osv-2024-939 | Security exception in org.apache.poi.util.LZWDecompresser.decompress | 2024-08-16T00:13:05.088720Z | 2024-08-16T00:13:05.089105Z |
| osv-2024-925 | Index-out-of-bounds in derive_collocated_motion_vectors | 2024-08-16T00:11:02.964872Z | 2024-08-16T00:11:02.965320Z |
| osv-2024-883 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2024-08-16T00:06:29.139503Z | 2024-08-16T00:06:29.139893Z |
| osv-2024-879 | Security exception in java.base/java.util.Arrays.copyOf | 2024-08-16T00:06:11.887593Z | 2024-08-16T00:06:11.888006Z |
| osv-2024-861 | UNKNOWN READ in chunk_free_object | 2024-08-16T00:05:25.024909Z | 2024-08-16T00:05:25.025249Z |
| osv-2024-859 | Heap-double-free in libssh2_default_free | 2024-08-16T00:05:16.221580Z | 2024-08-16T00:05:16.221993Z |
| osv-2024-856 | Use-of-uninitialized-value in cups_fill | 2024-08-16T00:05:10.919440Z | 2024-08-16T00:05:10.919721Z |
| osv-2024-852 | UNKNOWN READ in jvp_object_free | 2024-08-16T00:04:43.641868Z | 2024-08-16T00:04:43.642269Z |
| osv-2024-833 | UNKNOWN READ in chunk_free_object | 2024-08-16T00:03:18.896326Z | 2024-08-16T00:03:18.896644Z |
| osv-2024-830 | UNKNOWN READ in ShadingImage::generateAxialBitmap | 2024-08-16T00:03:09.951294Z | 2024-08-16T00:03:09.951596Z |
| osv-2024-828 | Use-of-uninitialized-value in packet_parse | 2024-08-16T00:03:08.665359Z | 2024-08-16T00:03:08.665719Z |
| osv-2024-805 | Use-of-uninitialized-value in pcpp::NflogLayer::parseNextLayer | 2024-08-16T00:02:19.436836Z | 2024-08-16T00:02:19.437200Z |
| osv-2024-792 | Index-out-of-bounds in AAHD::make_ahd_rb_hv | 2024-08-16T00:01:41.357755Z | 2024-08-16T00:01:41.358066Z |
| osv-2024-777 | Global-buffer-overflow in vte_write_debug | 2024-08-16T00:00:55.259153Z | 2024-08-16T00:00:55.259408Z |
| osv-2024-764 | Use-of-uninitialized-value in _cupsStrAlloc | 2024-08-16T00:00:28.318434Z | 2024-08-16T00:00:28.318983Z |
| osv-2024-748 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-08-13T00:04:40.789098Z | 2024-08-13T00:04:40.789448Z |
| osv-2024-747 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-08-13T00:03:34.008550Z | 2024-08-13T00:03:34.008929Z |
| osv-2024-326 | Heap-buffer-overflow in GfxFont::readFontDescriptor | 2024-04-29T05:42:32.273970Z | 2024-08-12T14:13:53.709919Z |
| osv-2024-668 | Security exception in jflex.core.NFA.insertNFA | 2024-07-20T00:01:48.807354Z | 2024-07-20T00:01:48.807879Z |
| osv-2024-517 | Segv on unknown address in od_ec_dec_init | 2024-05-30T00:05:57.060200Z | 2024-07-16T14:24:59.011170Z |
| osv-2024-538 | Use-of-uninitialized-value in QUICVariableInt::size | 2024-06-06T00:12:59.950768Z | 2024-07-16T14:22:07.747083Z |
| osv-2024-473 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-05-15T00:13:12.880068Z | 2024-07-16T14:20:15.561933Z |
| osv-2024-539 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-06-07T00:08:30.308579Z | 2024-07-16T14:19:14.406686Z |
| osv-2024-638 | Heap-buffer-overflow in ih264d_format_convert | 2024-07-13T00:12:13.793261Z | 2024-07-16T14:18:45.507955Z |
| osv-2024-637 | Heap-buffer-overflow in ih264d_format_convert | 2024-07-13T00:08:20.097992Z | 2024-07-16T14:17:43.815608Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2021-0041 | Denial of service through parsing payloads with too big exponent | 2021-03-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0040 | panic safety: double drop or uninitialized drop of T upon panic | 2021-01-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0039 | panic in user-provided `Endian` impl triggers double drop of T | 2021-01-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0038 | Multiple memory safety issues | 2021-03-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0037 | Fix a use-after-free bug in diesels Sqlite backend | 2021-03-05T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0036 | Intern<T>: Data race allowed on T | 2021-03-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0035 | `quinn` invalidly assumes the memory layout of std::net::SocketAddr | 2021-03-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0033 | push_cloned can drop uninitialized memory or double free on panic | 2021-02-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0032 | Deserializing an array can drop uninitialized memory on panic | 2021-03-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0031 | split_at allows obtaining multiple mutable references to the same data | 2021-01-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0030 | move_elements can double-free objects on panic | 2021-02-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0029 | Tape::take_bytes exposes uninitialized memory to a user-provided Read | 2021-02-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0028 | Multiple memory safety issues in insert_row | 2021-02-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0027 | Loading a bgzip block can write out of bounds if size overflows. | 2021-01-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0026 | XSS in `comrak` | 2021-02-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0023 | Incorrect check on buffer length when seeding RNGs | 2021-02-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0022 | Use-after-free in `subscript_next` and `subscript_prev` wrappers | 2021-02-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0021 | `nb-connect` invalidly assumes the memory layout of std::net::SocketAddr | 2021-02-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0019 | Multiple soundness issues | 2021-02-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0018 | insert_slice_clone can double drop if Clone panics. | 2021-02-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0017 | `Read` on uninitialized buffer may cause UB (`impl Walue for Vec<u8>`) | 2021-01-30T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0016 | `IoReader::read()`: user-provided `Read` on uninitialized buffer may cause UB | 2021-01-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0015 | `Sectors::get` accesses unclaimed/uninitialized memory | 2021-01-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0014 | Record::read : Custom `Read` on uninitialized buffer may cause UB | 2021-01-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0013 | Soundness issues in `raw-cpuid` | 2021-01-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0012 | Reading uninitialized memory can cause UB (`Deserializer::read_vec`) | 2021-01-02T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0011 | EventList's From<EventList> conversions can double drop on panic. | 2021-01-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0010 | panic safety: double drop may happen within `util::{mutate, mutate2}` | 2021-01-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0009 | panic safety issue in `impl TransformContent<S, D> for [S; (2|3|4)]` | 2021-01-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0008 | reading on uninitialized buffer can cause UB (`impl<R> BufRead for GreedyAccessReader<R>`) | 2021-01-02T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-joomla-2026-21629 | Joomla! Core - [20260301] - ACL hardening in com_ajax | 2026-04-10T08:49:13.196Z | 2026-04-10T09:26:18.172Z |
| bit-cassandra-2026-27315 | Apache Cassandra: cqlsh history sensitive information leak | 2026-04-09T08:36:45.141Z | 2026-04-10T09:26:18.172Z |
| bit-parse-2026-39381 | Parse Server's Endpoint `/sessions/me` bypasses `_Session` `protectedFields` | 2026-04-09T14:37:43.255Z | 2026-04-09T15:05:10.890Z |
| bit-parse-2026-39321 | Parse Server has a login timing side-channel reveals user existence | 2026-04-09T14:37:40.125Z | 2026-04-09T15:05:10.890Z |
| bit-wordpress-2023-2745 | WordPress Core < 6.2.1 - Directory Traversal | 2024-03-06T11:09:15.187Z | 2026-04-09T09:13:50.652Z |
| bit-activemq-2026-33227 | Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ Web, Apache ActiveMQ: Improper Limitation of a Pathname to a Restricted Classpath Directory | 2026-04-09T08:36:51.132Z | 2026-04-09T09:13:50.652Z |
| bit-wordpress-2023-5692 | WordPress Core <= 6.4.3 - Sensitive Information Exposure via redirect_guess_404_permalink | 2024-04-09T10:59:36.633Z | 2026-04-08T18:15:20.423Z |
| bit-parse-2026-35200 | Parse Server has a file upload Content-Type override via extension mismatch | 2026-04-08T14:51:33.993Z | 2026-04-08T15:15:28.618Z |
| bit-discourse-2026-34947 | Discourse: Staged user custom fields are exposed on public invite pages | 2026-04-08T14:45:19.092Z | 2026-04-08T15:15:28.618Z |
| bit-discourse-2026-27481 | Discourse: Hidden tag visibility bypass on tag routes | 2026-04-08T14:43:31.143Z | 2026-04-08T15:15:28.618Z |
| bit-mlflow-2025-15031 | Path Traversal Vulnerability in mlflow/mlflow | 2026-03-24T08:47:14.572Z | 2026-04-08T12:15:37.582Z |
| bit-jupyterhub-2026-33709 | JupyterHub has an Open Redirect Vulnerability | 2026-04-08T08:40:42.508Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-33375 | Grafana MSSQL Data Source Plugin: Restriction Bypass Leading to OOM DoS | 2026-04-01T08:41:17.463Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-28375 | Grafana Testdata datasource can issue unbounded memory allocations | 2026-04-01T08:41:15.363Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27880 | OpenFeature evaluation API reads input data with no bounds | 2026-04-01T08:41:13.459Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27879 | Query resampling can cause unbounded memory allocations | 2026-04-01T08:41:11.477Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27877 | Public dashboards discloses all direct mode datasources | 2026-04-01T08:41:09.536Z | 2026-04-08T09:14:18.943Z |
| bit-grafana-2026-27876 | RCE on Grafana via sqlExpressions | 2026-04-01T08:41:07.673Z | 2026-04-08T09:14:18.943Z |
| bit-discourse-2026-33415 | Discourse: Improper Access Control in discourse-ai Allows Unauthorized Category Content Exposure | 2026-04-07T08:44:29.473Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33300 | Discourse: Hidden group names and access metadata are exposed to moderators through the `category-chatables` endpoint | 2026-04-07T08:44:13.358Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33185 | Discourse: Group SMTP test endpoint susceptible to SSRF | 2026-04-07T08:44:07.641Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33074 | Discourse: Vulnerability in discourse-subscriptions plugin allowing users to self-grant to higher tier subscriptions | 2026-04-07T08:44:05.677Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-33073 | discourse-subscriptions plugin leaking stripe API key in multisite environment | 2026-04-07T08:44:03.688Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32951 | Discourse: Authorization bypass in oneboxer via user-controlled category id | 2026-04-07T08:44:01.614Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32620 | Discourse: Missing post-level authorization allows whisper metadata disclosure | 2026-04-07T08:43:59.465Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32619 | Discourse: Insufficient topic visibility check allows unauthorized poll manipulation in private categories | 2026-04-07T08:43:57.232Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32618 | Discourse: Unauthorized channel membership inference via excluded_memberships_channel_id | 2026-04-07T08:43:55.159Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32615 | Discourse: Category group moderators can perform actions on topics in restricted categories without read access | 2026-04-07T08:43:53.093Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32607 | Discourse: Stored XSS via unescaped assignee name | 2026-04-07T08:43:50.897Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32273 | Discourse: XSS on category description update via API | 2026-04-07T08:43:48.997Z | 2026-04-07T09:14:25.218Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ku65968 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:15:25.445497Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kq33111 | Cancelling a query (e | 2026-01-30T15:02:22.834896Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kk41938 | Within HostnameError | 2026-01-30T15:06:23.375949Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kg18353 | Within HostnameError | 2026-01-30T14:02:50.542288Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kf66928 | Within HostnameError | 2026-01-30T14:53:23.030035Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kd20596 | Cancelling a query (e | 2026-01-30T16:28:55.316811Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kc06686 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:10:53.141957Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kc01126 | tar | 2026-01-30T14:48:22.721160Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ka40024 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-01-30T17:03:56.468881Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jx46109 | Within HostnameError | 2026-01-30T17:25:26.548568Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jx43631 | Within HostnameError | 2026-01-30T15:06:23.337190Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ju65303 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:18:21.426991Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jr48309 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:11:25.334563Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jr37040 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:23:53.534475Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jm84344 | Within HostnameError | 2026-01-30T15:33:53.700265Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jm36781 | Within HostnameError | 2026-01-30T14:37:22.513933Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jm16286 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-01-30T16:56:26.537390Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jd48541 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T16:52:56.596548Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-iy17697 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:37:55.497960Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-iw06531 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:07:23.455235Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-il55587 | Cancelling a query (e | 2026-01-30T14:51:52.694658Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-il25782 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:53.055759Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ib84500 | security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion | 2026-01-30T16:29:55.343868Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ib05679 | Within HostnameError | 2026-01-30T15:06:23.436295Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ia37596 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:41:53.874436Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ia26094 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:51:22.634752Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hy43775 | Within HostnameError | 2026-01-30T14:46:52.607713Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hx78047 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:24:23.175483Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hw39798 | Cancelling a query (e | 2026-01-30T15:02:52.970576Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hv28992 | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3 | 2026-01-30T15:55:24.450018Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2003-ALE-003 | Exploitation massive de la vulnérabilité « include PHP » | 2003-09-09T00:00:00.000000 | 2003-09-09T00:00:00.000000 |
| certa-2003-ale-002 | Exploitation d'une faille de Windows RPC | 2003-08-01T00:00:00.000000 | 2003-08-19T00:00:00.000000 |
| CERTA-2003-ALE-002 | Exploitation d'une faille de Windows RPC | 2003-08-01T00:00:00.000000 | 2003-08-19T00:00:00.000000 |
| certa-2003-ale-001 | Vulnérabilité dans l'implémentation des logiciels de lecture des documents PDF | 2003-06-23T00:00:00.000000 | 2003-07-04T00:00:00.000000 |
| CERTA-2003-ALE-001 | Vulnérabilité dans l'implémentation des logiciels de lecture des documents PDF | 2003-06-23T00:00:00.000000 | 2003-07-04T00:00:00.000000 |
| certa-2002-ale-007 | Cédérom Pages Pro | 2002-09-04T00:00:00.000000 | 2002-09-04T00:00:00.000000 |
| CERTA-2002-ALE-007 | Cédérom Pages Pro | 2002-09-04T00:00:00.000000 | 2002-09-04T00:00:00.000000 |
| certa-2002-ale-006 | Propagation du ver Spida (Microsoft SQL Server) | 2002-05-22T00:00:00.000000 | 2002-06-04T00:00:00.000000 |
| CERTA-2002-ALE-006 | Propagation du ver Spida (Microsoft SQL Server) | 2002-05-22T00:00:00.000000 | 2002-06-04T00:00:00.000000 |
| certa-2002-ale-005 | Risque de compromission des auto-commutateurs (PABX) ALCATEL 4400 | 2002-02-20T00:00:00.000000 | 2002-02-20T00:00:00.000000 |
| CERTA-2002-ALE-005 | Risque de compromission des auto-commutateurs (PABX) ALCATEL 4400 | 2002-02-20T00:00:00.000000 | 2002-02-20T00:00:00.000000 |
| certa-2002-ale-004 | Multiples implémentations de SNMP V1 vulnérables | 2002-02-13T00:00:00.000000 | 2002-02-13T00:00:00.000000 |
| CERTA-2002-ALE-004 | Multiples implémentations de SNMP V1 vulnérables | 2002-02-13T00:00:00.000000 | 2002-02-13T00:00:00.000000 |
| certa-2002-ale-003 | Propagation importante du virus « W32.Myparty@mm » | 2002-01-29T00:00:00.000000 | 2002-01-29T00:00:00.000000 |
| CERTA-2002-ALE-003 | Propagation importante du virus « W32.Myparty@mm » | 2002-01-29T00:00:00.000000 | 2002-01-29T00:00:00.000000 |
| certa-2002-ale-002 | Exploitation d'une faille de wu-ftpd | 2002-01-28T00:00:00.000000 | 2002-01-28T00:00:00.000000 |
| CERTA-2002-ALE-002 | Exploitation d'une faille de wu-ftpd | 2002-01-28T00:00:00.000000 | 2002-01-28T00:00:00.000000 |
| certa-2002-ale-001 | Exploitation massive d'une faille de CDE | 2002-01-24T00:00:00.000000 | 2002-01-24T00:00:00.000000 |
| CERTA-2002-ALE-001 | Exploitation massive d'une faille de CDE | 2002-01-24T00:00:00.000000 | 2002-01-24T00:00:00.000000 |
| certa-2001-ale-012 | Rappels concernant les virus | 2001-09-13T00:00:00.000000 | 2002-01-09T00:00:00.000000 |
| CERTA-2001-ALE-012 | Rappels concernant les virus | 2001-09-13T00:00:00.000000 | 2002-01-09T00:00:00.000000 |
| certa-2001-ale-016 | Propagation du ver badtrans - variante B | 2001-11-27T00:00:00.000000 | 2001-11-27T00:00:00.000000 |
| CERTA-2001-ALE-016 | Propagation du ver badtrans - variante B | 2001-11-27T00:00:00.000000 | 2001-11-27T00:00:00.000000 |
| certa-2001-ale-015 | Exploitation massive d'une ancienne vulnérabilité de SSH | 2001-11-19T00:00:00.000000 | 2001-11-19T00:00:00.000000 |
| CERTA-2001-ALE-015 | Exploitation massive d'une ancienne vulnérabilité de SSH | 2001-11-19T00:00:00.000000 | 2001-11-19T00:00:00.000000 |
| certa-2001-ale-014 | Risque de divulgation de données personnelles/confidentielles par des produits Microsoft | 2001-10-19T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| CERTA-2001-ALE-014 | Risque de divulgation de données personnelles/confidentielles par des produits Microsoft | 2001-10-19T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| certa-2001-ale-013 | Propagation du ver/virus NIMDA (Concept Virus) | 2001-09-19T00:00:00.000000 | 2001-09-19T00:00:00.000000 |
| CERTA-2001-ALE-013 | Propagation du ver/virus NIMDA (Concept Virus) | 2001-09-19T00:00:00.000000 | 2001-09-19T00:00:00.000000 |
| certa-2001-ale-011 | <TT>antivirus2001</TT> est un cheval de Troie | 2001-09-10T00:00:00.000000 | 2001-09-13T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0021 | Vulnérabilité dans Microsoft Edge | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| certfr-2026-avi-0020 | Multiples vulnérabilités dans les produits IBM | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| certfr-2026-avi-0019 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| certfr-2026-avi-0018 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| certfr-2026-avi-0017 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| certfr-2026-avi-0016 | Vulnérabilité dans les produits Moxa | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| CERTFR-2026-AVI-0022 | Multiples vulnérabilités dans les produits Microsoft | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| CERTFR-2026-AVI-0021 | Vulnérabilité dans Microsoft Edge | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| CERTFR-2026-AVI-0020 | Multiples vulnérabilités dans les produits IBM | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| CERTFR-2026-AVI-0019 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| CERTFR-2026-AVI-0018 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| CERTFR-2026-AVI-0017 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| CERTFR-2026-AVI-0016 | Vulnérabilité dans les produits Moxa | 2026-01-09T00:00:00.000000 | 2026-01-09T00:00:00.000000 |
| certfr-2026-avi-0015 | Multiples vulnérabilités dans les produits Centreon | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| certfr-2026-avi-0014 | Multiples vulnérabilités dans GitLab | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| certfr-2026-avi-0013 | Vulnérabilité dans Tenable Nessus Agent | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| certfr-2026-avi-0012 | Multiples vulnérabilités dans Trend Micro Apex Central | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| certfr-2026-avi-0011 | Vulnérabilité dans Google Android | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| CERTFR-2026-AVI-0015 | Multiples vulnérabilités dans les produits Centreon | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| CERTFR-2026-AVI-0014 | Multiples vulnérabilités dans GitLab | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| CERTFR-2026-AVI-0013 | Vulnérabilité dans Tenable Nessus Agent | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| CERTFR-2026-AVI-0012 | Multiples vulnérabilités dans Trend Micro Apex Central | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| CERTFR-2026-AVI-0011 | Vulnérabilité dans Google Android | 2026-01-08T00:00:00.000000 | 2026-01-08T00:00:00.000000 |
| certfr-2026-avi-0010 | Multiples vulnérabilités dans Curl | 2026-01-07T00:00:00.000000 | 2026-01-07T00:00:00.000000 |
| certfr-2026-avi-0009 | Vulnérabilité dans Google Chrome | 2026-01-07T00:00:00.000000 | 2026-01-07T00:00:00.000000 |
| certfr-2026-avi-0008 | Multiples vulnérabilités dans Joomla! | 2026-01-07T00:00:00.000000 | 2026-01-07T00:00:00.000000 |
| CERTFR-2026-AVI-0010 | Multiples vulnérabilités dans Curl | 2026-01-07T00:00:00.000000 | 2026-01-07T00:00:00.000000 |
| CERTFR-2026-AVI-0009 | Vulnérabilité dans Google Chrome | 2026-01-07T00:00:00.000000 | 2026-01-07T00:00:00.000000 |
| CERTFR-2026-AVI-0008 | Multiples vulnérabilités dans Joomla! | 2026-01-07T00:00:00.000000 | 2026-01-07T00:00:00.000000 |
| certfr-2026-avi-0007 | Vulnérabilité dans Stormshield Network Security | 2026-01-06T00:00:00.000000 | 2026-01-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-003067 | Multiple vulnerabilities in PLANEX COMMUNICATIONS wireless LAN routers | 2024-04-05T14:17+09:00 | 2024-04-05T14:17+09:00 |
| jvndb-2023-000077 | Fujitsu Software Infrastructure Manager (ISM) stores sensitive information in cleartext | 2023-08-04T17:31+09:00 | 2024-04-03T17:19+09:00 |
| jvndb-2024-003051 | FURUNO SYSTEMS Managed Switch ACERA 9010 running in non MS mode with the initial configuration has no password | 2024-04-02T18:03+09:00 | 2024-04-02T18:03+09:00 |
| jvndb-2024-003050 | KEYENCE VT STUDIO may insecurely load Dynamic Link Libraries | 2024-04-01T14:44+09:00 | 2024-04-01T14:44+09:00 |
| jvndb-2023-000071 | Multiple vulnerabilities in multiple ELECOM wireless LAN routers and wireless LAN repeaters | 2023-07-11T15:37+09:00 | 2024-03-29T15:28+09:00 |
| jvndb-2024-000036 | "Yahoo! JAPAN" App vulnerable to cross-site scripting | 2024-03-29T13:28+09:00 | 2024-03-29T13:28+09:00 |
| jvndb-2023-000079 | Multiple vulnerabilities in Special Interest Group Network for Analysis and Liaison's API | 2023-08-07T15:15+09:00 | 2024-03-28T18:08+09:00 |
| jvndb-2023-000081 | "Rikunabi NEXT" App for Android fails to restrict custom URL schemes properly | 2023-08-09T12:45+09:00 | 2024-03-28T18:01+09:00 |
| jvndb-2023-000080 | "FFRI yarai" and "FFRI yarai Home and Business Edition" handle exceptional conditions improperly | 2023-08-07T17:39+09:00 | 2024-03-28T17:54+09:00 |
| jvndb-2023-000078 | Multiple vulnerabilities in Proself | 2023-08-18T13:47+09:00 | 2024-03-28T17:43+09:00 |
| jvndb-2024-003047 | SEEnergy SVR-116 vulnerable to OS command injection | 2024-03-28T11:38+09:00 | 2024-03-28T11:38+09:00 |
| jvndb-2024-003026 | Security information for Hitachi Disk Array Systems | 2024-03-27T15:52+09:00 | 2024-03-27T15:52+09:00 |
| jvndb-2024-000035 | Multiple vulnerabilities in WordPress Plugin "Survey Maker" | 2024-03-27T14:48+09:00 | 2024-03-27T14:48+09:00 |
| jvndb-2024-000034 | SonicDICOM Media Viewer may insecurely load Dynamic Link Libraries | 2024-03-27T14:31+09:00 | 2024-03-27T14:31+09:00 |
| jvndb-2023-000086 | Rakuten WiFi Pocket vulnerable to improper authentication | 2023-08-23T12:42+09:00 | 2024-03-27T13:43+09:00 |
| jvndb-2024-000905 | Mini Thread vulnerable to cross-site scripting | 2024-03-26T17:43+09:00 | 2024-03-26T17:43+09:00 |
| jvndb-2023-012042 | WordPress plugin "MW WP Form" vulnerable to arbitrary file upload | 2023-12-15T15:17+09:00 | 2024-03-26T17:39+09:00 |
| jvndb-2023-000083 | Multiple vulnerabilities in LuxCal Web Calendar | 2023-08-21T13:29+09:00 | 2024-03-26T17:09+09:00 |
| jvndb-2024-000906 | ffBull vulnerable to OS command injection | 2024-03-26T16:07+09:00 | 2024-03-26T16:07+09:00 |
| jvndb-2024-000900 | "EasyRange" may insecurely load executable files | 2024-03-26T15:50+09:00 | 2024-03-26T15:50+09:00 |
| jvndb-2024-000907 | 0ch BBS Script (0ch) vulnerable to cross-site scripting | 2024-03-26T15:35+09:00 | 2024-03-26T15:35+09:00 |
| jvndb-2024-000902 | TvRock vulnerable to cross-site scripting | 2024-03-26T14:27+09:00 | 2024-03-26T14:27+09:00 |
| jvndb-2024-000904 | WebProxy vulnerable to OS command injection | 2024-03-26T14:19+09:00 | 2024-03-26T14:19+09:00 |
| jvndb-2023-025113 | BUFFALO LinkStation 200 series vulnerable to arbitrary code execution | 2024-03-25T18:16+09:00 | 2024-03-25T18:16+09:00 |
| jvndb-2023-000082 | EC-CUBE 2 series vulnerable to cross-site scripting | 2023-08-17T15:12+09:00 | 2024-03-25T18:07+09:00 |
| jvndb-2023-000084 | WordPress Plugin "Advanced Custom Fields" vulnerable to cross-site scripting | 2023-08-21T14:05+09:00 | 2024-03-25T17:55+09:00 |
| jvndb-2024-000033 | WordPress Plugin "easy-popup-show" vulnerable to cross-site request forgery | 2024-03-25T13:31+09:00 | 2024-03-25T13:31+09:00 |
| jvndb-2023-000055 | ESS REC Agent Server Edition for Linux etc. vulnerable to directory traversal | 2023-05-26T13:58+09:00 | 2024-03-21T17:15+09:00 |
| jvndb-2023-000053 | Tornado vulnerable to open redirect | 2023-05-22T13:30+09:00 | 2024-03-21T17:05+09:00 |
| jvndb-2023-000058 | Pleasanter vulnerable to cross-site scripting | 2023-05-31T15:34+09:00 | 2024-03-19T18:17+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14841 | OpenClaw授权绕过漏洞(CNVD-2026-14841) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14840 | OpenClaw身份验证绕过漏洞(CNVD-2026-14840) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14839 | OpenClaw身份验证绕过漏洞(CNVD-2026-14839) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14838 | OpenClaw存在未明漏洞(CNVD-2026-14838) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14837 | OpenClaw授权绕过漏洞(CNVD-2026-14837) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14836 | OpenClaw元数据欺骗漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14835 | OpenClaw授权绕过漏洞(CNVD-2026-14835) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14834 | OpenClaw存在未明漏洞(CNVD-2026-14834) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14833 | OpenClaw身份验证绕过漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14832 | OpenClaw存在未明漏洞(CNVD-2026-14832) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14831 | OpenClaw授权绕过漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14830 | OpenClaw存在未明漏洞(CNVD-2026-14830) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14829 | OpenClaw存在未明漏洞(CNVD-2026-14829) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14828 | OpenClaw存在未明漏洞(CNVD-2026-14828) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14827 | OpenClaw数据伪造问题漏洞(CNVD-2026-14827) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14826 | OpenClaw信息泄露漏洞(CNVD-2026-14826) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14825 | OpenClaw拒绝服务漏洞(CNVD-2026-14825) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-15249 | TOTOLINK WA300操作系统命令注入漏洞 | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14687 | Belkin F9K1015命令注入漏洞 | 2025-10-13 | 2026-03-24 |
| cnvd-2026-14686 | Belkin F9K1122堆栈缓冲区溢出漏洞(CNVD-2026-14686) | 2026-03-19 | 2026-03-24 |
| cnvd-2026-14685 | TRENDnet TEW-822DRE权限提升漏洞 | 2025-08-15 | 2026-03-24 |
| cnvd-2026-14684 | TRENDnet TEW-657BRM命令注入漏洞 | 2025-11-28 | 2026-03-24 |
| cnvd-2026-14683 | TRENDnet TEW-822DRE命令注入漏洞 | 2026-01-12 | 2026-03-24 |
| cnvd-2026-14682 | TRENDnet TEW-800MB命令注入漏洞 | 2026-01-12 | 2026-03-24 |
| cnvd-2026-14681 | TRENDnet TEW-713RE操作系统命令注入漏洞 | 2026-01-14 | 2026-03-24 |
| cnvd-2026-14680 | TRENDnet TEW-632BRP缓冲区溢出漏洞 | 2026-03-19 | 2026-03-24 |
| cnvd-2026-14679 | IBM Db2拒绝服务漏洞(CNVD-2026-14679) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14678 | IBM Db2拒绝服务漏洞(CNVD-2026-14678) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14677 | IBM Db2存在未明漏洞(CNVD-2026-14677) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14676 | IBM Db2拒绝服务漏洞(CNVD-2026-14676) | 2026-02-11 | 2026-03-24 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-10721 | Уязвимость функции composite_dev_cleanup() компонента usb ядра операционной системы Linux… | 05.09.2025 | 16.02.2026 |
| bdu:2025-10614 | Уязвимость функции nfs_get_lock_context операционной системы Linux, позволяющая нарушител… | 01.09.2025 | 16.02.2026 |
| bdu:2025-10613 | Уязвимость функции rxe_create_cq операционной системы Linux, позволяющая нарушителю вызва… | 01.09.2025 | 16.02.2026 |
| bdu:2025-10610 | Уязвимость функции mlx5e_fix_uplink_rep_features операционной системы Linux, позволяющая … | 01.09.2025 | 16.02.2026 |
| bdu:2025-10609 | Уязвимость функции tls_strp_flush_anchor_copy операционной системы Linux, позволяющая нар… | 01.09.2025 | 16.02.2026 |
| bdu:2025-10608 | Уязвимость компонента cdns3 операционной системы Linux, позволяющая нарушителю вызвать от… | 01.09.2025 | 16.02.2026 |
| bdu:2025-10606 | Уязвимость компонента ci_hdrc_imx операционной системы Linux, позволяющая нарушителю вызв… | 01.09.2025 | 16.02.2026 |
| bdu:2025-10604 | Уязвимость функции size_limit_mb ядра операционной системы Linux, позволяющая нарушителю … | 01.09.2025 | 16.02.2026 |
| bdu:2025-10603 | Уязвимость функции virtsnd_probe() ядра операционной системы Linux, позволяющая нарушител… | 01.09.2025 | 16.02.2026 |
| bdu:2025-10600 | Уязвимость компонента dell-wmi-sysman ядра операционной системы Linux, позволяющая наруши… | 01.09.2025 | 16.02.2026 |
| bdu:2025-10599 | Уязвимость функции dwc3_check_event_buf операционной системы Linux, позволяющая нарушител… | 01.09.2025 | 16.02.2026 |
| bdu:2025-10570 | Уязвимость функции mtk_drm_gem_dumb_create() модуля drivers/gpu/drm/mediatek/mtk_drm_gem.… | 01.09.2025 | 16.02.2026 |
| bdu:2025-10525 | Уязвимость отклонена | 29.08.2025 | 16.02.2026 |
| bdu:2025-10444 | Уязвимость функции populate_free_space_tree() в модуле fs/btrfs/free-space-tree.c файлово… | 29.08.2025 | 16.02.2026 |
| bdu:2025-10441 | Уязвимость механизма cgroup подсистемы BPF ядра операционных систем Linux, позволяющая на… | 29.08.2025 | 16.02.2026 |
| bdu:2025-10415 | Уязвимость функции xmlNodeSetName() интерпретатора языка программирования PHP, позволяюща… | 29.08.2025 | 16.02.2026 |
| bdu:2025-10414 | Уязвимость интерпретатора языка программирования PHP, связанная с ошибками разыменования … | 29.08.2025 | 16.02.2026 |
| bdu:2025-10413 | Уязвимость функции PQescapeIdentifier() интерпретатора языка программирования PHP, позвол… | 29.08.2025 | 16.02.2026 |
| bdu:2025-10311 | Уязвимость функции at91_gpio_probe() файла drivers/pinctrl/pinctrl-at91.c ядра операционн… | 27.08.2025 | 16.02.2026 |
| bdu:2025-10310 | Уязвимость компонента mtd ядра операционной системы Linux, позволяющая нарушителю вызвать… | 27.08.2025 | 16.02.2026 |
| bdu:2025-10309 | Уязвимость функции get_net() компонента net ядра операционной системы Linux, позволяющая … | 27.08.2025 | 16.02.2026 |
| bdu:2025-10307 | Уязвимость интерпретатора языка программирования Perl, связанная с использованием ненадёж… | 27.08.2025 | 16.02.2026 |
| bdu:2025-10265 | Уязвимость открытой библиотеки для расширения стандартной библиотеки C++ Abseil-cpp, связ… | 26.08.2025 | 16.02.2026 |
| bdu:2025-10257 | Уязвимость модуля fs/ext4/dir.c ядра операционной системы Linux, позволяющая нарушителю о… | 25.08.2025 | 16.02.2026 |
| bdu:2025-10132 | Уязвимость функции ath9k_htc_swba() компонента wifi ядра операционной системы Linux, позв… | 22.08.2025 | 16.02.2026 |
| bdu:2025-10131 | Уязвимость функции aspberrypi_clk_register() модуля drivers/clk/bcm/clk-raspberrypi.c ядр… | 22.08.2025 | 16.02.2026 |
| bdu:2025-10128 | Уязвимость функции rtw_fw_bt_wifi_control() модуля drivers/net/wireless/realtek/rtw88/coe… | 22.08.2025 | 16.02.2026 |
| bdu:2025-10126 | Уязвимость функции skb_linearize() модуля net/core/skmsg.c ядра операционных систем Linux… | 22.08.2025 | 16.02.2026 |
| bdu:2025-10125 | Уязвимость драйвера hisi_acc_vfio_pci ядра операционных систем Linux, позволяющая нарушит… | 22.08.2025 | 16.02.2026 |
| bdu:2025-09992 | Уязвимость модуля tarfile интерпретатора языка программирования Python (CPython), позволя… | 18.08.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201912-0503 | An API issue existed in the handling of microphone data. This issue was addressed with im… | 2024-07-23T20:53:56.784000Z |
| var-201110-0332 | Integer signedness error in Apple QuickTime before 7.7.1 allows remote attackers to execu… | 2024-07-23T20:53:56.368000Z |
| var-200909-0782 | Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, a… | 2024-07-23T20:53:20.038000Z |
| var-202105-0257 | An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and… | 2024-07-23T20:53:19.006000Z |
| var-201808-0958 | Systems with microprocessors utilizing speculative execution and address translations may… | 2024-07-23T20:53:19.085000Z |
| var-201404-0008 | Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, whe… | 2024-07-23T20:53:19.246000Z |
| var-201206-0117 | Multiple integer overflows in libxml2, as used in Google Chrome before 20.0.1132.43 and o… | 2024-07-23T20:53:19.963000Z |
| var-202108-2087 | A logic issue was addressed with improved restrictions. This issue is fixed in macOS Mont… | 2024-07-23T20:53:17.541000Z |
| var-200608-0033 | The dynamic linker (dyld) in Apple Mac OS X 10.4.7 allows local users to execute arbitrar… | 2024-07-23T20:53:01.636000Z |
| var-201904-1352 | A type confusion issue was addressed with improved memory handling. This issue affected v… | 2024-07-23T20:52:25.320000Z |
| var-201404-0381 | Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 an… | 2024-07-23T20:52:24.783000Z |
| var-201804-1214 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T20:51:44.833000Z |
| var-201702-0870 | An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari … | 2024-07-23T20:51:43.794000Z |
| var-202202-0050 | xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, … | 2024-07-23T20:51:28.738000Z |
| var-200707-0675 | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5… | 2024-07-23T20:51:26.313000Z |
| var-200607-0664 | Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to … | 2024-07-23T20:51:25.312000Z |
| var-201707-1192 | An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari … | 2024-07-23T20:51:22.759000Z |
| var-201310-0613 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, J… | 2024-07-23T20:51:22.839000Z |
| var-200808-0011 | Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when … | 2024-07-23T20:51:12.284000Z |
| var-200412-0902 | Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 a… | 2024-07-23T20:51:12.187000Z |
| var-202204-0593 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle … | 2024-07-23T20:51:10.729000Z |
| var-201912-0574 | An out-of-bounds read was addressed with improved input validation. plural Apple The prod… | 2024-07-23T20:51:09.117000Z |
| var-202006-1806 | regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression… | 2024-07-23T20:51:08.679000Z |
| var-201205-0297 | The Linux kernel before 3.3.1, when KVM is used, allows guest OS users to cause a denial … | 2024-07-23T20:51:08.752000Z |
| var-201609-0597 | The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other pr… | 2024-07-23T20:50:53.381000Z |
| var-201605-0079 | The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation … | 2024-07-23T20:50:53.695000Z |
| var-200908-0708 | Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Po… | 2024-07-23T20:50:52.900000Z |
| var-202103-0218 | A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can … | 2024-07-23T20:50:49.281000Z |
| var-201501-0340 | Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0… | 2024-07-23T20:50:41.225000Z |
| var-202109-1790 | A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when … | 2024-07-23T20:50:39.175000Z |