Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-41905 |
7.7 (3.1)
|
FreeScout vulnerable to SSRF via Helper::sanitizeRemot… |
freescout-help-desk |
freescout |
2026-05-07T18:08:09.277Z | 2026-05-07T20:15:18.618Z |
| CVE-2026-6846 |
7.8 (3.1)
|
Binutils: binutils: arbitrary code execution via malfo… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-22T08:37:14.233Z | 2026-05-07T20:03:22.592Z |
| CVE-2026-41692 |
4.7 (3.1)
|
i18nextify is vulnerable to DOM XSS via javascript:/da… |
i18next |
i18nextify |
2026-05-07T20:01:59.272Z | 2026-05-07T20:01:59.272Z |
| CVE-2026-8086 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
OSGeo gdal SWapi.c SWnentries heap-based overflow |
OSGeo |
gdal |
2026-05-07T18:45:13.165Z | 2026-05-07T19:53:07.538Z |
| CVE-2025-14593 |
7.8 (3.1)
|
CATPART File Parsing Out-of-Bounds Read Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:31:35.368Z | 2026-05-07T19:41:57.554Z |
| CVE-2025-10900 |
7.8 (3.1)
|
MODEL File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:45:26.861Z | 2026-05-07T19:40:50.876Z |
| CVE-2025-10899 |
7.8 (3.1)
|
MODEL File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:45:00.819Z | 2026-05-07T19:40:25.329Z |
| CVE-2025-10898 |
7.8 (3.1)
|
MODEL File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:44:26.564Z | 2026-05-07T19:39:53.637Z |
| CVE-2026-42239 |
8.1 (3.1)
|
Budibase auth session cookies are set with httpOnly:fa… |
Budibase |
budibase |
2026-05-07T18:49:59.180Z | 2026-05-07T19:39:45.605Z |
| CVE-2025-10889 |
7.8 (3.1)
|
CATPART File Parsing Memory Corruption Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:43:57.696Z | 2026-05-07T19:39:29.209Z |
| CVE-2025-10888 |
7.8 (3.1)
|
MODEL File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:43:22.374Z | 2026-05-07T19:39:03.711Z |
| CVE-2025-10887 |
7.8 (3.1)
|
MODEL File Parsing Memory Corruption Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:42:44.395Z | 2026-05-07T19:38:36.933Z |
| CVE-2025-10886 |
7.8 (3.1)
|
MODEL File Parsing Memory Corruption Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:42:09.029Z | 2026-05-07T19:38:13.076Z |
| CVE-2025-10884 |
7.8 (3.1)
|
CATPART File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:41:34.185Z | 2026-05-07T19:37:32.087Z |
| CVE-2025-10883 |
7.8 (3.1)
|
CATPRODUCT File Parsing Out-of-Bounds Read Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:40:59.980Z | 2026-05-07T19:37:01.345Z |
| CVE-2025-10882 |
7.8 (3.1)
|
X_T File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:40:24.134Z | 2026-05-07T19:36:13.740Z |
| CVE-2025-10881 |
7.8 (3.1)
|
CATPRODUCT File Parsing Heap-Based Overflow Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:39:49.830Z | 2026-05-07T19:28:35.838Z |
| CVE-2026-41904 |
7.6 (3.1)
|
FreeScout Stored XSS vulnerability in mailbox auto-rep… |
freescout-help-desk |
freescout |
2026-05-07T18:05:43.541Z | 2026-05-07T19:16:53.481Z |
| CVE-2026-8083 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SourceCodester Pharmacy Sales and Inventory System aja… |
SourceCodester |
Pharmacy Sales and Inventory System |
2026-05-07T18:15:09.651Z | 2026-05-07T19:14:18.598Z |
| CVE-2026-44243 |
7.8 (4.0)
|
GitPython: Path traversal in GitPython reference APIs … |
gitpython-developers |
GitPython |
2026-05-07T18:22:53.622Z | 2026-05-07T19:12:49.856Z |
| CVE-2026-41653 |
7 (4.0)
|
BentoPDF: Stored XSS via Markdown Editor Leading to Pe… |
alam00000 |
bentopdf |
2026-05-07T18:43:17.797Z | 2026-05-07T19:01:30.967Z |
| CVE-2025-65857 |
7.5 (3.1)
|
An issue was discovered in Xiongmai XM530 IP came… |
n/a |
n/a |
2025-12-22T00:00:00.000Z | 2026-05-07T18:46:36.829Z |
| CVE-2026-42469 |
8.6 (3.1)
|
Buffer overflow vulnerability in Open Vehicle Mon… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-07T18:42:33.535Z |
| CVE-2026-37541 |
10 (3.1)
|
Buffer overflow vulnerability in Open Vehicle Mon… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-07T18:39:48.746Z |
| CVE-2026-42468 |
8.8 (3.1)
|
Buffer overflow vulnerability in Open Vehicle Mon… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-07T18:35:07.930Z |
| CVE-2026-37554 |
7.5 (3.1)
|
An issue was discovered in Vanetza V2X v26.02 all… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-07T18:30:29.223Z |
| CVE-2026-8081 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
router-for-me CLIProxyAPI api_tools.go server-side req… |
router-for-me |
CLIProxyAPI |
2026-05-07T18:00:14.133Z | 2026-05-07T18:08:42.136Z |
| CVE-2026-37709 |
9.8 (3.1)
|
Insecure Permissions vulnerability in grokability… |
n/a |
n/a |
2026-05-07T00:00:00.000Z | 2026-05-07T17:39:49.914Z |
| CVE-2026-41254 |
4 (3.1)
|
Little CMS (lcms2) through 2.18 has an integer ov… |
littlecms |
little cms color engine |
2026-04-18T06:43:13.741Z | 2026-05-07T17:33:56.924Z |
| CVE-2026-43577 |
7.1 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.4.9 - Arbitrary File Read via Browser … |
OpenClaw |
OpenClaw |
2026-05-06T19:49:21.091Z | 2026-05-07T17:32:03.185Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43197 |
9.1 (3.1)
|
netconsole: avoid OOB reads, msg is not nul-terminated |
Linux |
Linux |
2026-05-06T11:28:04.829Z | 2026-05-08T12:41:09.303Z |
| CVE-2026-43194 |
7.5 (3.1)
|
net: consume xmit errors of GSO frames |
Linux |
Linux |
2026-05-06T11:28:02.794Z | 2026-05-08T12:41:08.123Z |
| CVE-2026-43190 |
8.2 (3.1)
|
netfilter: xt_tcpmss: check remaining length before re… |
Linux |
Linux |
2026-05-06T11:27:59.798Z | 2026-05-08T12:41:06.952Z |
| CVE-2026-43187 |
8.8 (3.1)
|
xfs: delete attr leaf freemap entries when empty |
Linux |
Linux |
2026-05-06T11:27:57.727Z | 2026-05-08T12:41:05.734Z |
| CVE-2026-43186 |
9.8 (3.1)
|
ipv6: ioam: fix heap buffer overflow in __ioam6_fill_t… |
Linux |
Linux |
2026-05-06T11:27:57.053Z | 2026-05-08T12:41:04.575Z |
| CVE-2026-43185 |
9.8 (3.1)
|
ksmbd: fix signededness bug in smb_direct_prepare_nego… |
Linux |
Linux |
2026-05-06T11:27:56.386Z | 2026-05-08T12:41:03.371Z |
| CVE-2026-43184 |
7.5 (3.1)
|
rnbd-srv: Zero the rsp buffer before using it |
Linux |
Linux |
2026-05-06T11:27:55.672Z | 2026-05-08T12:41:02.015Z |
| CVE-2026-43180 |
7.8 (3.1)
|
net: usb: kaweth: remove TX queue manipulation in kawe… |
Linux |
Linux |
2026-05-06T11:27:52.983Z | 2026-05-08T12:41:00.768Z |
| CVE-2026-43178 |
7.8 (3.1)
|
procfs: fix possible double mmput() in do_procmap_query() |
Linux |
Linux |
2026-05-06T11:27:51.524Z | 2026-05-08T12:40:59.592Z |
| CVE-2026-43176 |
8.8 (3.1)
|
wifi: rtw89: pci: validate release report content befo… |
Linux |
Linux |
2026-05-06T11:27:50.150Z | 2026-05-08T12:40:58.471Z |
| CVE-2026-43172 |
8.8 (3.1)
|
wifi: iwlwifi: fix 22000 series SMEM parsing |
Linux |
Linux |
2026-05-06T11:27:47.358Z | 2026-05-08T12:40:57.330Z |
| CVE-2026-43166 |
7.1 (3.1)
|
erofs: fix interlaced plain identification for encoded… |
Linux |
Linux |
2026-05-06T11:27:43.242Z | 2026-05-08T12:40:56.151Z |
| CVE-2026-43164 |
7.5 (3.1)
|
udplite: Fix null-ptr-deref in __udp_enqueue_schedule_skb(). |
Linux |
Linux |
2026-05-06T11:27:41.928Z | 2026-05-08T12:40:55.002Z |
| CVE-2026-43158 |
8.8 (3.1)
|
xfs: fix freemap adjustments when adding xattrs to lea… |
Linux |
Linux |
2026-05-06T11:27:37.848Z | 2026-05-08T12:40:53.855Z |
| CVE-2026-43153 |
7.8 (3.1)
|
xfs: remove xfs_attr_leaf_hasname |
Linux |
Linux |
2026-05-06T11:27:34.446Z | 2026-05-08T12:40:52.696Z |
| CVE-2026-43150 |
7.8 (3.1)
|
perf/arm-cmn: Reject unsupported hardware configurations |
Linux |
Linux |
2026-05-06T11:27:32.359Z | 2026-05-08T12:40:51.562Z |
| CVE-2026-43139 |
8.6 (3.1)
|
xfrm6: fix uninitialized saddr in xfrm6_get_saddr() |
Linux |
Linux |
2026-05-06T11:27:24.898Z | 2026-05-08T12:40:50.383Z |
| CVE-2026-43134 |
8.1 (3.1)
|
Bluetooth: L2CAP: Fix missing key size check for L2CAP… |
Linux |
Linux |
2026-05-06T11:27:21.541Z | 2026-05-08T12:40:49.204Z |
| CVE-2026-43120 |
7.8 (3.1)
|
RDMA/irdma: Fix double free related to rereg_user_mr |
Linux |
Linux |
2026-05-06T07:40:43.923Z | 2026-05-08T12:40:43.130Z |
| CVE-2026-43106 |
7.8 (3.1)
|
cachefiles: fix incorrect dentry refcount in cachefile… |
Linux |
Linux |
2026-05-06T07:40:34.365Z | 2026-05-08T12:40:33.663Z |
| CVE-2026-43101 |
7.5 (3.1)
|
ipv6: ioam: fix potential NULL dereferences in __ioam6… |
Linux |
Linux |
2026-05-06T07:40:30.969Z | 2026-05-08T12:40:32.536Z |
| CVE-2026-43099 |
7.5 (3.1)
|
ipv4: icmp: fix null-ptr-deref in icmp_build_probe() |
Linux |
Linux |
2026-05-06T07:40:29.567Z | 2026-05-08T12:40:31.371Z |
| CVE-2026-43093 |
7.8 (3.1)
|
xsk: tighten UMEM headroom validation to account for t… |
Linux |
Linux |
2026-05-06T07:40:25.266Z | 2026-05-08T12:40:30.221Z |
| CVE-2026-43091 |
7.8 (3.1)
|
xfrm: Wait for RCU readers during policy netns exit |
Linux |
Linux |
2026-05-06T07:40:23.955Z | 2026-05-08T12:40:29.086Z |
| CVE-2026-43084 |
7.8 (3.1)
|
netfilter: nfnetlink_queue: make hash table per queue |
Linux |
Linux |
2026-05-06T07:40:19.253Z | 2026-05-08T12:40:27.947Z |
| CVE-2026-43083 |
9.1 (3.1)
|
net: ioam6: fix OOB and missing lock |
Linux |
Linux |
2026-05-06T07:40:18.504Z | 2026-05-08T12:40:26.791Z |
| CVE-2026-43078 |
7.8 (3.1)
|
crypto: af_alg - Fix page reassignment overflow in af_… |
Linux |
Linux |
2026-05-06T07:40:15.092Z | 2026-05-08T12:40:25.638Z |
| CVE-2026-43076 |
7.8 (3.1)
|
ocfs2: validate inline data i_size during inode read |
Linux |
Linux |
2026-05-06T07:40:13.634Z | 2026-05-08T12:40:24.482Z |
| CVE-2026-43075 |
7.8 (3.1)
|
ocfs2: fix out-of-bounds write in ocfs2_write_end_inline |
Linux |
Linux |
2026-05-06T07:40:03.337Z | 2026-05-08T12:40:23.336Z |
| CVE-2026-43074 |
7.8 (3.1)
|
eventpoll: defer struct eventpoll free to RCU grace period |
Linux |
Linux |
2026-05-06T07:21:58.210Z | 2026-05-08T12:40:22.201Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-43194 | In the Linux kernel, the following vulnerability has been resolved: net: consume xmit errors of GS… | 2026-05-06T12:16:38.310 | 2026-05-08T13:16:44.460 |
| fkie_cve-2026-43190 | In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_tcpmss: check re… | 2026-05-06T12:16:37.843 | 2026-05-08T13:16:44.320 |
| fkie_cve-2026-43187 | In the Linux kernel, the following vulnerability has been resolved: xfs: delete attr leaf freemap … | 2026-05-06T12:16:37.440 | 2026-05-08T13:16:43.083 |
| fkie_cve-2026-43186 | In the Linux kernel, the following vulnerability has been resolved: ipv6: ioam: fix heap buffer ov… | 2026-05-06T12:16:37.300 | 2026-05-08T13:16:42.557 |
| fkie_cve-2026-43185 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix signededness bug in… | 2026-05-06T12:16:37.187 | 2026-05-08T13:16:42.423 |
| fkie_cve-2026-43184 | In the Linux kernel, the following vulnerability has been resolved: rnbd-srv: Zero the rsp buffer … | 2026-05-06T12:16:37.053 | 2026-05-08T13:16:42.257 |
| fkie_cve-2026-43180 | In the Linux kernel, the following vulnerability has been resolved: net: usb: kaweth: remove TX qu… | 2026-05-06T12:16:36.533 | 2026-05-08T13:16:42.107 |
| fkie_cve-2026-43178 | In the Linux kernel, the following vulnerability has been resolved: procfs: fix possible double mm… | 2026-05-06T12:16:36.303 | 2026-05-08T13:16:42.000 |
| fkie_cve-2026-43176 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: pci: validate rel… | 2026-05-06T12:16:36.083 | 2026-05-08T13:16:41.887 |
| fkie_cve-2026-43172 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix 22000 serie… | 2026-05-06T12:16:35.583 | 2026-05-08T13:16:41.783 |
| fkie_cve-2026-43166 | In the Linux kernel, the following vulnerability has been resolved: erofs: fix interlaced plain id… | 2026-05-06T12:16:34.800 | 2026-05-08T13:16:41.670 |
| fkie_cve-2026-43164 | In the Linux kernel, the following vulnerability has been resolved: udplite: Fix null-ptr-deref in… | 2026-05-06T12:16:34.540 | 2026-05-08T13:16:41.527 |
| fkie_cve-2026-43158 | In the Linux kernel, the following vulnerability has been resolved: xfs: fix freemap adjustments w… | 2026-05-06T12:16:33.697 | 2026-05-08T13:16:41.373 |
| fkie_cve-2026-43153 | In the Linux kernel, the following vulnerability has been resolved: xfs: remove xfs_attr_leaf_hasn… | 2026-05-06T12:16:33.073 | 2026-05-08T13:16:41.260 |
| fkie_cve-2026-43150 | In the Linux kernel, the following vulnerability has been resolved: perf/arm-cmn: Reject unsupport… | 2026-05-06T12:16:32.690 | 2026-05-08T13:16:41.130 |
| fkie_cve-2026-43139 | In the Linux kernel, the following vulnerability has been resolved: xfrm6: fix uninitialized saddr… | 2026-05-06T12:16:31.227 | 2026-05-08T13:16:40.990 |
| fkie_cve-2026-43134 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix missing … | 2026-05-06T12:16:30.617 | 2026-05-08T13:16:40.853 |
| fkie_cve-2026-43120 | In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix double free re… | 2026-05-06T10:16:25.913 | 2026-05-08T13:16:40.207 |
| fkie_cve-2026-43106 | In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix incorrect dent… | 2026-05-06T10:16:24.213 | 2026-05-08T13:16:39.260 |
| fkie_cve-2026-43101 | In the Linux kernel, the following vulnerability has been resolved: ipv6: ioam: fix potential NULL… | 2026-05-06T10:16:23.637 | 2026-05-08T13:16:39.143 |
| fkie_cve-2026-43099 | In the Linux kernel, the following vulnerability has been resolved: ipv4: icmp: fix null-ptr-deref… | 2026-05-06T10:16:23.400 | 2026-05-08T13:16:39.033 |
| fkie_cve-2026-43093 | In the Linux kernel, the following vulnerability has been resolved: xsk: tighten UMEM headroom val… | 2026-05-06T10:16:22.667 | 2026-05-08T13:16:38.907 |
| fkie_cve-2026-43091 | In the Linux kernel, the following vulnerability has been resolved: xfrm: Wait for RCU readers dur… | 2026-05-06T10:16:22.433 | 2026-05-08T13:16:38.787 |
| fkie_cve-2026-43084 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: ma… | 2026-05-06T10:16:21.610 | 2026-05-08T13:16:38.660 |
| fkie_cve-2026-43083 | In the Linux kernel, the following vulnerability has been resolved: net: ioam6: fix OOB and missin… | 2026-05-06T10:16:21.493 | 2026-05-08T13:16:38.550 |
| fkie_cve-2026-43078 | In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Fix page reas… | 2026-05-06T10:16:20.853 | 2026-05-08T13:16:38.417 |
| fkie_cve-2026-43076 | In the Linux kernel, the following vulnerability has been resolved: ocfs2: validate inline data i_… | 2026-05-06T10:16:20.590 | 2026-05-08T13:16:38.297 |
| fkie_cve-2026-43075 | In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix out-of-bounds write… | 2026-05-06T10:16:20.463 | 2026-05-08T13:16:38.160 |
| fkie_cve-2026-43074 | In the Linux kernel, the following vulnerability has been resolved: eventpoll: defer struct eventp… | 2026-05-06T10:16:20.343 | 2026-05-08T13:16:38.030 |
| fkie_cve-2026-43071 | In the Linux kernel, the following vulnerability has been resolved: dcache: Limit the minimal numb… | 2026-05-05T16:16:16.420 | 2026-05-08T13:16:37.870 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-qm5g-9237-pg9r |
7.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in SourceCodester SUP Online Shopping 1.0. This impacts an unkn… | 2026-05-08T06:32:37Z | 2026-05-08T06:32:37Z |
| ghsa-pxqj-577f-7xfv |
7.3 (3.1)
5.5 (4.0)
|
A security vulnerability has been detected in zyx0814 FilePress up to 2.2.0. Affected by this vulne… | 2026-05-08T06:32:37Z | 2026-05-08T06:32:37Z |
| ghsa-pj6p-9p8x-5mfc |
|
Alkacon OpenCms before 16 allows XXE when the <!DOCTYPE> refers to an external host. | 2026-05-08T06:32:37Z | 2026-05-08T06:32:37Z |
| ghsa-gxmg-m8j9-9hxw |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was identified in SourceCodester SUP Online Shopping 1.0. This affects an unknown f… | 2026-05-08T06:32:37Z | 2026-05-08T06:32:37Z |
| ghsa-gggm-v39x-cpg8 |
7.3 (3.1)
5.5 (4.0)
|
A weakness has been identified in CodeAstro Leave Management System 1.0. Affected is an unknown fun… | 2026-05-08T06:32:37Z | 2026-05-08T06:32:37Z |
| ghsa-3h5f-583p-w5vj |
2.4 (3.1)
1.9 (4.0)
|
A flaw has been found in SourceCodester Pharmacy Sales and Inventory System 1.0. This affects an un… | 2026-05-08T06:32:37Z | 2026-05-08T06:32:37Z |
| ghsa-rw2q-pc53-f59p |
7.3 (3.1)
5.5 (4.0)
|
A flaw has been found in SourceCodester Comment System 1.0. This issue affects some unknown process… | 2026-05-08T03:30:24Z | 2026-05-08T03:30:24Z |
| ghsa-qvg3-xf4r-fgqm |
3.3 (3.1)
1.9 (4.0)
|
A security vulnerability has been detected in GPAC up to 26.02.0. This affects the function sidx_bo… | 2026-05-08T03:30:24Z | 2026-05-08T03:30:24Z |
| ghsa-q74f-j88c-7g46 |
2.0 (4.0)
|
An Exposed IOCTL with Insufficient Access Control vulnerability in AsusPTPFilter allows a local use… | 2026-05-08T03:30:24Z | 2026-05-08T03:30:24Z |
| ghsa-pj2x-r6wc-476j |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was detected in code-projects Simple Chat System 1.0. This vulnerability affects un… | 2026-05-08T03:30:24Z | 2026-05-08T03:30:24Z |
| ghsa-m3gg-rqf2-7qcj |
6.8 (4.0)
|
An Out-of-bounds Read vulnerability in the IOCTL handler in ASUS System Control Interface allows a … | 2026-05-08T03:30:24Z | 2026-05-08T03:30:24Z |
| ghsa-93h2-p56q-h6jc |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in SourceCodester SUP Online Shopping 1.0. The affected element is an unk… | 2026-05-08T03:30:24Z | 2026-05-08T03:30:24Z |
| ghsa-7rvc-3rgf-7589 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in eladmin up to 2.7. Impacted is the function checkLevel of the fil… | 2026-05-08T03:30:24Z | 2026-05-08T03:30:24Z |
| ghsa-x7c4-pm53-48h6 |
4.3 (3.1)
2.1 (4.0)
|
A flaw has been found in Open5GS up to 2.7.7. The affected element is the function nssf_nnrf_nssele… | 2026-05-08T03:30:23Z | 2026-05-08T03:30:23Z |
| ghsa-w88m-grx2-xwvr |
3.3 (3.1)
1.9 (4.0)
|
A vulnerability was detected in Open5GS up to 2.7.7. Impacted is the function ogs_sbi_stream_find_b… | 2026-05-08T03:30:23Z | 2026-05-08T03:30:23Z |
| ghsa-m782-cq9r-w5vf |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in Open5GS up to 2.7.7. The impacted element is the function ogs_sbi… | 2026-05-08T03:30:23Z | 2026-05-08T03:30:23Z |
| ghsa-ghx3-pgmg-h9fc |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in Open5GS up to 2.7.7. This affects the function ogs_sbi_discovery_optio… | 2026-05-08T03:30:23Z | 2026-05-08T03:30:23Z |
| ghsa-fxh4-4qxc-cq82 |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in Open5GS up to 2.7.7. This impacts the function ogs_sbi_discovery_… | 2026-05-08T03:30:23Z | 2026-05-08T03:30:23Z |
| ghsa-8x35-hph8-37hq |
9.8 (3.1)
|
electerm has Command Injection via runLinux funtion | 2026-04-24T20:45:13Z | 2026-05-08T02:02:22Z |
| ghsa-ff6c-w6qf-7xqc |
5.8 (3.1)
|
CSS Parser: Improper Certificate Validation allows MITM injection of remote CSS content | 2026-05-07T02:06:49Z | 2026-05-08T02:01:36Z |
| ghsa-2cq5-mf3v-mx44 |
8.8 (3.1)
8.6 (4.0)
|
OpenClaw: busybox and toybox applet execution weakened exec approval binding | 2026-04-17T22:16:04Z | 2026-05-08T01:32:55Z |
| ghsa-939r-rj45-g2rj |
8.8 (3.1)
8.6 (4.0)
|
OpenClaw: Workspace provider auth choices could auto-enable untrusted provider plugins | 2026-04-17T22:12:49Z | 2026-05-08T01:32:51Z |
| ghsa-82qx-6vj7-p8m2 |
8.8 (3.1)
7.1 (4.0)
|
OpenClaw: Channel setup catalog lookups could include untrusted workspace plugin shadows | 2026-04-17T21:58:46Z | 2026-05-08T01:32:48Z |
| ghsa-c9h3-5p7r-mrjh |
7.7 (3.1)
5.3 (4.0)
|
OpenClaw: Discord event cover images bypassed sandbox media normalization | 2026-04-17T21:56:04Z | 2026-05-08T01:32:44Z |
| ghsa-49cg-279w-m73x |
6.5 (3.1)
6.0 (4.0)
|
OpenClaw: Empty approver lists could grant explicit approval authorization | 2026-04-17T21:55:54Z | 2026-05-08T01:32:40Z |
| ghsa-7g8c-cfr3-vqqr |
9.1 (3.1)
6.6 (4.0)
|
OpenClaw: Agent hook events could enqueue trusted system events from unsanitized external input | 2026-04-17T21:55:20Z | 2026-05-08T01:32:34Z |
| ghsa-g2hm-779g-vm32 |
9.1 (3.1)
6.0 (4.0)
|
OpenClaw: Heartbeat owner downgrade missed untrusted webhook wake events | 2026-04-17T21:48:25Z | 2026-05-08T01:32:30Z |
| ghsa-jwrq-8g5x-5fhm |
6.8 (3.1)
5.3 (4.0)
|
OpenClaw: Collect-mode queue batches could reuse the last sender authorization context | 2026-04-17T21:35:35Z | 2026-05-08T01:32:26Z |
| ghsa-7jp6-r74r-995q |
6.5 (3.1)
7.1 (4.0)
|
OpenClaw: Matrix profile config persistence was reachable from operator.write message tools | 2026-04-17T22:15:27Z | 2026-05-08T01:32:22Z |
| ghsa-736r-jwj6-4w23 |
8.8 (3.1)
8.3 (4.0)
|
OpenClaw: Sandboxed agents could escape exec routing via host=node override | 2026-04-17T22:14:56Z | 2026-05-08T01:32:18Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-237 |
5.9 (3.1)
|
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the extension info m… | asyncssh | 2023-11-14T03:15:00+00:00 | 2023-11-17T17:27:01.919743+00:00 |
| pysec-2023-236 |
7.5 (3.1)
|
Remarshal prior to v0.17.1 expands YAML alias nodes unlimitedly, hence Remarshal is vulne… | remarshal | 2023-11-13T03:15:00+00:00 | 2023-11-16T20:25:23.801345+00:00 |
| pysec-2022-43065 |
5.5 (3.1)
|
GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFro… | gdal | 2022-01-01T01:15:00+00:00 | 2023-11-13T19:19:43.960137+00:00 |
| pysec-2019-241 |
9.8 (3.1)
|
GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp … | gdal | 2019-10-14T02:15:00+00:00 | 2023-11-13T19:19:43.892449+00:00 |
| pysec-2023-232 |
|
We failed to apply CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed the… | apache-airflow | 2023-11-12T14:15:00+00:00 | 2023-11-12T16:29:15.404665+00:00 |
| pysec-2023-231 |
|
Apache Airflow, versions before 2.7.3, has a vulnerability that allows an authorized user… | apache-airflow | 2023-11-12T14:15:00+00:00 | 2023-11-12T16:29:15.321733+00:00 |
| pysec-2023-230 |
5.3 (3.1)
|
Synapse is an open-source Matrix homeserver Prior to versions 1.95.1 and 1.96.0rc1, cache… | matrix-synapse | 2023-10-31T17:15:00+00:00 | 2023-11-08T20:24:49.199333+00:00 |
| pysec-2023-221 |
7.5 (3.1)
|
Werkzeug is a comprehensive WSGI web application library. If an upload of a file that sta… | werkzeug | 2023-10-25T18:17:00Z | 2023-11-08T18:38:34.170214Z |
| pysec-2022-43064 |
8.8 (3.1)
|
The User-Defined Functions (UDF) feature in TigerGraph 3.6.0 allows installation of a que… | pytigergraph | 2022-09-05T16:15:00+00:00 | 2023-11-07T20:24:26.101389+00:00 |
| pysec-2022-43062 |
7.8 (3.1)
|
A vulnerability classified as problematic was found in pacparser up to 1.3.x. Affected by… | pacparser | 2022-12-13T18:15:00+00:00 | 2023-11-07T20:24:25.809231+00:00 |
| pysec-2012-21 |
|
virt/disk/api.py in OpenStack Compute (Nova) 2012.1.x before 2012.1.2 and Folsom before F… | nova | 2012-08-20T18:55:00+00:00 | 2023-11-07T20:24:25.753827+00:00 |
| pysec-2012-20 |
|
OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token… | keystone | 2012-12-18T01:55:00+00:00 | 2023-11-07T20:24:25.260316+00:00 |
| pysec-2012-19 |
|
OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (20… | keystone | 2012-09-05T23:55:00+00:00 | 2023-11-07T20:24:25.208233+00:00 |
| pysec-2012-18 |
|
Open redirect vulnerability in views/auth_forms.py in OpenStack Dashboard (Horizon) Essex… | horizon | 2012-09-05T23:55:00+00:00 | 2023-11-07T20:24:25.109703+00:00 |
| pysec-2022-43061 |
6.1 (3.1)
|
A vulnerability was found in django-photologue up to 3.15.1 and classified as problematic… | django-photologue | 2022-12-15T21:15:00+00:00 | 2023-11-07T20:24:24.147635+00:00 |
| pysec-2022-43060 |
5.9 (3.1)
|
The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the conn… | apache-bookkeeper-client | 2022-12-15T19:15:00+00:00 | 2023-11-07T20:24:23.853507+00:00 |
| pysec-2021-876 |
6.5 (3.1)
|
Versions of Apache DolphinScheduler prior to 1.3.2 allowed an ordinary user under any ten… | apache-dolphinscheduler | 2021-01-11T10:15:00+00:00 | 2023-11-07T20:24:23.899306+00:00 |
| pysec-2020-342 |
9.8 (3.1)
|
**Resolved** Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL i… | apache-skywalking | 2020-08-05T14:15:00+00:00 | 2023-11-07T20:24:23.946863+00:00 |
| pysec-2023-229 |
5.4 (3.1)
|
ArchiveBox is an open source self-hosted web archiving system. Any users who are using th… | archivebox | 2023-10-19T22:15:00+00:00 | 2023-11-04T04:27:37.550377+00:00 |
| pysec-2023-228 |
3.3 (3.1)
|
When installing a package from a Mercurial VCS URL (ie "pip install hg+...") with pip p… | pip | 2023-10-25T18:17:00+00:00 | 2023-11-03T16:28:41.538340+00:00 |
| pysec-2023-227 |
|
An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrol… | pillow | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:41.505456+00:00 |
| pysec-2023-226 |
|
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.te… | django | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:40.328470+00:00 |
| pysec-2023-225 |
|
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encodi… | django | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:40.160394+00:00 |
| pysec-2023-224 |
5.3 (3.1)
|
Twisted is an event-based framework for internet applications. Prior to version 23.10.0rc… | twisted | 2023-10-25T21:15:00+00:00 | 2023-11-02T16:33:16.395026+00:00 |
| pysec-2023-223 |
|
Unsafe YAML deserialization in yaml.Loader in transmute-core before 1.13.5 allows attacke… | transmute-core | 2023-11-02T06:15:00+00:00 | 2023-11-02T10:30:07.951105+00:00 |
| pysec-2023-222 |
|
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.… | django | 2023-11-02T06:15:00+00:00 | 2023-11-02T10:30:06.341485+00:00 |
| pysec-2023-220 |
6.5 (3.1)
|
Nautobot is a Network Automation Platform built as a web application atop the Django Pyth… | nautobot | 2023-10-25T18:17:00+00:00 | 2023-11-01T18:30:02.084237+00:00 |
| pysec-2023-219 |
2.7 (3.1)
|
Wagtail is an open source content management system built on Django. A user with a limite… | wagtail | 2023-10-19T19:15:00+00:00 | 2023-10-31T20:23:51.857051+00:00 |
| pysec-2023-178 |
7.5 (3.1)
|
plone.rest allows users to use HTTP verbs such as GET, POST, PUT, DELETE, etc. in Plone. … | plone-rest | 2023-09-21T15:15:00Z | 2023-10-28T20:22:08.431825Z |
| pysec-2023-218 |
4.3 (3.1)
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Airflo… | apache-airflow | 2023-10-23T19:15:00+00:00 | 2023-10-28T05:24:46.485079+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33373 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.744340Z |
| gsd-2024-33372 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.731595Z |
| gsd-2024-33371 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.688740Z |
| gsd-2024-33370 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.622882Z |
| gsd-2024-33369 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.622410Z |
| gsd-2024-33368 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.753782Z |
| gsd-2024-33367 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.657978Z |
| gsd-2024-33366 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.746377Z |
| gsd-2024-33365 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.758070Z |
| gsd-2024-33364 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.722261Z |
| gsd-2024-33363 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.630067Z |
| gsd-2024-33362 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.734172Z |
| gsd-2024-33361 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.752033Z |
| gsd-2024-33360 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.760329Z |
| gsd-2024-33359 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.714714Z |
| gsd-2024-33358 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.694949Z |
| gsd-2024-33357 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.738772Z |
| gsd-2024-33356 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.666212Z |
| gsd-2024-33355 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.608700Z |
| gsd-2024-33354 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.706465Z |
| gsd-2024-33353 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.618571Z |
| gsd-2024-33352 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.697823Z |
| gsd-2024-33351 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.693072Z |
| gsd-2024-33350 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.695535Z |
| gsd-2024-33349 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.678289Z |
| gsd-2024-33348 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.710252Z |
| gsd-2024-33347 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.615800Z |
| gsd-2024-33346 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.613516Z |
| gsd-2024-33345 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.613933Z |
| gsd-2024-33344 | D-Link DIR-822+ V1.0.5 was found to contain a command injection in ftext function ofuploa… | 2024-04-24T05:02:09.615605Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2747 | Malicious code in cloud-run-microservice-template (npm) | 2026-04-16T09:49:59Z | 2026-04-23T20:50:50Z |
| mal-2026-2746 | Malicious code in chainlink-docs (npm) | 2026-04-16T09:49:21Z | 2026-04-23T20:50:50Z |
| mal-2026-2745 | Malicious code in chain-syncora (npm) | 2026-04-16T09:49:19Z | 2026-04-23T20:50:50Z |
| mal-2026-2744 | Malicious code in chain-metrica (npm) | 2026-04-16T09:49:16Z | 2026-04-23T20:50:50Z |
| mal-2026-2743 | Malicious code in chai-use-chain (npm) | 2026-04-16T09:49:12Z | 2026-04-23T20:50:50Z |
| mal-2026-2742 | Malicious code in chai-extensions-extra (npm) | 2026-04-16T09:49:01Z | 2026-04-23T20:50:50Z |
| mal-2026-2741 | Malicious code in chai-chain-coremesh (npm) | 2026-04-16T09:48:58Z | 2026-04-23T20:50:50Z |
| mal-2026-2740 | Malicious code in chai-as-type (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:50Z |
| mal-2026-2700 | Malicious code in conventional-changelog-dash (npm) | 2026-04-16T12:15:47Z | 2026-04-23T20:50:50Z |
| mal-2026-2692 | Malicious code in fusion-events (npm) | 2026-04-15T14:57:24Z | 2026-04-23T20:50:50Z |
| mal-2026-2687 | Malicious code in com.baogong.app_push_permission (npm) | 2026-04-15T13:49:47Z | 2026-04-23T20:50:50Z |
| mal-2026-2674 | Malicious code in chief-proxy-out (npm) | 2026-04-15T03:12:05Z | 2026-04-23T20:50:50Z |
| mal-2026-2673 | Malicious code in chief-documentation (npm) | 2026-04-15T03:12:05Z | 2026-04-23T20:50:50Z |
| mal-2026-2667 | Malicious code in ckeditor5-minimap (npm) | 2026-04-14T19:06:02Z | 2026-04-23T20:50:50Z |
| mal-2026-2642 | Malicious code in chatbotloader (npm) | 2026-04-14T11:47:13Z | 2026-04-23T20:50:50Z |
| mal-2026-2641 | Malicious code in chai-as-refined (npm) | 2026-04-14T11:48:44Z | 2026-04-23T20:50:50Z |
| mal-2026-2626 | Malicious code in getcardslib (npm) | 2026-04-14T00:07:56Z | 2026-04-23T20:50:50Z |
| mal-2026-2604 | Malicious code in ih-icon (npm) | 2026-04-13T15:25:20Z | 2026-04-23T20:50:50Z |
| mal-2026-2603 | Malicious code in experian-design-system-themes (npm) | 2026-04-13T15:25:19Z | 2026-04-23T20:50:50Z |
| mal-2026-2602 | Malicious code in etsy-advocacy (npm) | 2026-04-13T15:25:20Z | 2026-04-23T20:50:50Z |
| mal-2026-2601 | Malicious code in dwaiter-company-web (npm) | 2026-04-13T15:25:19Z | 2026-04-23T20:50:50Z |
| mal-2026-2600 | Malicious code in cms-site-api-js-client (npm) | 2026-04-13T15:25:20Z | 2026-04-23T20:50:50Z |
| mal-2026-2564 | Malicious code in gp-auth-lib (npm) | 2026-04-12T04:25:39Z | 2026-04-23T20:50:50Z |
| mal-2026-3020 | Malicious code in @bitwarden/cli (npm) | 2026-04-23T17:07:51Z | 2026-04-23T20:50:49Z |
| mal-2026-3004 | Malicious code in @nklkas/hyperliquid (npm) | 2026-04-23T04:24:15Z | 2026-04-23T20:50:49Z |
| mal-2026-3003 | Malicious code in @amsterdam-local/forms-component-library (npm) | 2026-04-23T03:52:34Z | 2026-04-23T20:50:49Z |
| mal-2026-2998 | Malicious code in @spinstorm/shared (npm) | 2026-04-22T21:15:39Z | 2026-04-23T20:50:49Z |
| mal-2026-2997 | Malicious code in @stlm/common-ui (npm) | 2026-04-22T15:03:57Z | 2026-04-23T20:50:49Z |
| mal-2026-2994 | Malicious code in @openwebconcept/theme-owc (npm) | 2026-04-22T13:59:52Z | 2026-04-23T20:50:49Z |
| mal-2026-2993 | Malicious code in @openwebconcept/design-tokens (npm) | 2026-04-22T14:01:36Z | 2026-04-23T20:50:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-0499 | expat: Schwachstelle ermöglicht Codeausführung | 2022-01-26T23:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2905 | MongoDB: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-18T23:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2910 | Hitachi Ops Center: Mehrere Schwachstellen | 2025-12-22T23:00:00.000+00:00 | 2025-12-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2677 | OPNsense: Schwachstelle ermöglicht Manipulation von Dateien | 2025-11-25T23:00:00.000+00:00 | 2025-12-23T23:00:00.000+00:00 |
| wid-sec-w-2025-0627 | Vercel Next.js: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-03-24T23:00:00.000+00:00 | 2025-12-23T23:00:00.000+00:00 |
| wid-sec-w-2024-3281 | expat: Schwachstelle ermöglicht Denial of Service | 2024-10-27T23:00:00.000+00:00 | 2025-12-23T23:00:00.000+00:00 |
| wid-sec-w-2024-1951 | expat: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-08-29T22:00:00.000+00:00 | 2025-12-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2909 | IBM App Connect Enterprise: Mehrere Schwachstellen | 2025-12-22T23:00:00.000+00:00 | 2025-12-22T23:00:00.000+00:00 |
| wid-sec-w-2025-1529 | Apache HTTP Server: Mehrere Schwachstellen | 2025-07-10T22:00:00.000+00:00 | 2025-12-22T23:00:00.000+00:00 |
| wid-sec-w-2025-1472 | Ruby: Schwachstelle ermöglicht Denial of Service | 2025-07-07T22:00:00.000+00:00 | 2025-12-22T23:00:00.000+00:00 |
| wid-sec-w-2024-2040 | OpenSSL: Schwachstelle ermöglicht Denial of Service | 2024-09-03T22:00:00.000+00:00 | 2025-12-22T23:00:00.000+00:00 |
| wid-sec-w-2025-2885 | Mozilla Firefox: Mehrere Schwachstellen | 2025-12-18T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2866 | Dropbear SSH: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-12-16T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2858 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2025-12-16T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2849 | Red Hat Enterprise Linux (Keylime): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-15T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2814 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-12-10T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2586 | Red Hat Enterprise Linux (python-kdcproxy): Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2198 | MediaWiki: Mehrere Schwachstellen | 2025-10-05T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2115 | WordPress Core: Mehrere Schwachstellen | 2025-09-23T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1833 | IBM WebSphere Application Server: Schwachstelle ermöglicht Denial of Service | 2025-08-13T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1822 | Ruby on Rails: Mehrere Schwachstellen | 2025-08-13T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1807 | IBM WebSphere Application Server Liberty: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1757 | Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsmechanismen | 2025-08-11T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1591 | IBM WebSphere Application Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-07-17T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1582 | IBM WebSphere Application Server: Schwachstelle ermöglicht Denial of Service | 2025-07-16T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1335 | Apache Tomcat: Mehrere Schwachstellen | 2025-06-16T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1169 | Apache Commons BeanUtils: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-29T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-1144 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-05-25T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0944 | GIMP: Schwachstelle ermöglicht Codeausführung | 2025-05-05T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-0524 | Red Hat Ansible Automation Platform (Jinja): Schwachstelle ermöglicht Codeausführung | 2025-03-11T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-16-252-01 | GE Bently Nevada 3500/22M Improper Authorization Vulnerability | 2016-06-12T06:00:00.000000Z | 2025-06-09T17:25:24.979586Z |
| icsa-16-250-01 | Siemens SIPROTEC 4 and SIPROTEC Compact Vulnerabilities | 2016-06-10T06:00:00.000000Z | 2025-06-09T17:25:06.309002Z |
| icsa-16-236-01a | Moxa OnCell Vulnerabilities (Update A) | 2016-05-27T06:00:00.000000Z | 2025-06-09T17:24:47.614316Z |
| icsa-16-224-02a | Rockwell Automation RSLogix 500 and RSLogix Micro File Parser Buffer Overflow Vulnerability (Update A) | 2016-05-15T06:00:00.000000Z | 2025-06-09T17:24:28.897472Z |
| icsa-16-224-01 | Rockwell Automation MicroLogix 1400 SNMP Credentials Vulnerability | 2016-05-15T06:00:00.000000Z | 2025-06-09T17:24:22.668983Z |
| icsa-16-215-02a | Siemens SINEMA Server Privilege Escalation Vulnerability (Update A) | 2016-05-06T06:00:00.000000Z | 2025-06-09T17:24:16.438062Z |
| icsa-16-215-01 | Moxa SoftCMS SQL Injection Vulnerability | 2016-05-06T06:00:00.000000Z | 2025-06-09T17:24:09.907471Z |
| icsa-16-208-03 | Siemens SINEMA Remote Connect Server Cross-site Scripting Vulnerability | 2016-04-29T06:00:00.000000Z | 2025-06-09T17:24:03.623977Z |
| icsa-16-208-02 | Siemens SIMATIC NET PC-Software Denial-of-Service Vulnerability | 2016-04-29T06:00:00.000000Z | 2025-06-09T17:23:57.388610Z |
| icsa-16-196-03 | Schneider Electric SoMachine HVAC Unsafe ActiveX Control Vulnerability | 2016-04-17T06:00:00.000000Z | 2025-06-09T17:23:38.592319Z |
| icsa-16-196-02 | Moxa MGate Authentication Bypass Vulnerability | 2016-04-17T06:00:00.000000Z | 2025-06-09T17:23:32.371585Z |
| icsa-16-194-02 | GE Proficy HMI SCADA CIMPLICITY Privilege Management Vulnerability | 2016-04-15T06:00:00.000000Z | 2025-06-09T17:23:26.098354Z |
| icsa-16-194-01 | Tollgrade Smart Grid EMS LightHouse Vulnerabilities | 2016-04-15T06:00:00.000000Z | 2025-06-09T17:23:07.404201Z |
| icsa-16-189-02 | Moxa Device Server Web Console Authorization Bypass Vulnerability | 2016-04-10T06:00:00.000000Z | 2025-06-09T17:23:01.168936Z |
| icsa-16-187-01 | Rexroth Bosch BLADEcontrol-WebVIS Vulnerabilities | 2016-04-08T06:00:00.000000Z | 2025-06-09T17:22:48.711804Z |
| icsa-16-182-02b | Siemens SICAM PAS Information Disclosure Vulnerabilities (Update B) | 2016-04-03T06:00:00.000000Z | 2025-06-09T17:22:36.258239Z |
| icsa-16-182-01 | Eaton ELCSoft Programming Software Memory Vulnerabilities | 2016-04-03T06:00:00.000000Z | 2025-06-09T17:22:23.490004Z |
| icsa-16-175-03 | Meinberg NTP Time Server Vulnerabilities | 2016-03-27T06:00:00.000000Z | 2025-06-09T17:22:04.840219Z |
| icsa-16-175-01 | Rockwell Automation Allen-Bradley Stratix 5400 and 5410 Packet Corruption Vulnerability | 2016-03-27T06:00:00.000000Z | 2025-06-09T17:21:58.604196Z |
| icsa-16-173-03 | Rockwell Automation FactoryTalk EnergyMetrix Vulnerabilities | 2016-03-25T06:00:00.000000Z | 2025-06-09T17:21:46.144304Z |
| icsa-16-173-02 | Schneider Electric PowerLogic PM8ECC Cross-site Scripting Vulnerability | 2016-03-25T06:00:00.000000Z | 2025-06-09T17:21:39.931685Z |
| icsa-16-173-01a | Advantech WebAccess ActiveX Vulnerabilities (Update A) | 2016-03-25T06:00:00.000000Z | 2025-06-09T17:21:20.975954Z |
| icsa-16-168-01 | Moxa PT-7728 Series Switch Improper Authorization Vulnerability | 2016-03-20T06:00:00.000000Z | 2025-06-09T17:21:14.745293Z |
| icsa-16-166-02 | OSIsoft PI AF Server Input Validation Vulnerability | 2016-03-18T06:00:00.000000Z | 2025-06-09T17:21:08.204759Z |
| icsa-16-166-01 | OSIsoft PI SQL Data Access Server Input Validation Vulnerability | 2016-03-18T06:00:00.000000Z | 2025-06-09T17:21:01.997483Z |
| icsa-16-161-02 | Siemens SIMATIC WinCC Flexible Weakly Protected Credentials Vulnerability | 2016-03-13T07:00:00.000000Z | 2025-06-09T17:20:55.764569Z |
| icsa-16-161-01 | Siemens SIMATIC S7-300 Denial-of-Service Vulnerability | 2016-03-13T07:00:00.000000Z | 2025-06-09T17:20:49.461799Z |
| icsa-12-030-01a | Siemens SIMATIC WinCC Vulnerabilities | 2012-11-02T06:00:00.000000Z | 2025-06-09T16:35:39.943110Z |
| icsa-12-024-02 | MICROSYS PROMOTIC Vulnerabilities | 2012-10-27T06:00:00.000000Z | 2025-06-09T16:35:20.987121Z |
| icsa-12-024-01 | Ocean Data Systems Dream Reports XSS and Write Access Violation Vulnerabilities | 2012-10-27T06:00:00.000000Z | 2025-06-09T16:35:08.232133Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-accsc-dos-9slzkz8 | Cisco Secure Client Software Denial of Service Vulnerabilities | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-accsc-dos-9SLzkZ8 | Cisco Secure Client Software Denial of Service Vulnerabilities | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-asa-icmpv6-t5tzqwnd | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software ICMPv6 Message Processing Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-02T13:50:35+00:00 |
| cisco-sa-asa-icmpv6-t5TzqwNd | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software ICMPv6 Message Processing Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-02T13:50:35+00:00 |
| cisco-sa-asa-webvpn-dos-3ghzqbas | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access VPN Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-02T13:47:35+00:00 |
| cisco-sa-asa-webvpn-dos-3GhZQBAS | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access VPN Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-02T13:47:35+00:00 |
| cisco-sa-asa-webvpn-loeksnmo | Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Web Client Services Client-Side Request Smuggling Vulnerability | 2022-08-10T16:00:00+00:00 | 2023-11-01T16:00:01+00:00 |
| cisco-sa-asa-webvpn-LOeKsNmO | Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Web Client Services Client-Side Request Smuggling Vulnerability | 2022-08-10T16:00:00+00:00 | 2023-11-01T16:00:01+00:00 |
| cisco-sa-snort-ftd-zxytnjom | Multiple Cisco Products Snort FTP Inspection Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-snort-ftd-zXYtnjOM | Multiple Cisco Products Snort FTP Inspection Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-sa-ftd-snort3-urldos-occfqtex | Cisco Firepower Threat Defense Software SSL/TLS URL Category and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-sa-ftd-snort3-urldos-OccFQTeX | Cisco Firepower Threat Defense Software SSL/TLS URL Category and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ise-injection-qexegrcw | Cisco Identity Services Engine Command Injection Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ise-injection-QeXegrCw | Cisco Identity Services Engine Command Injection Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ise-file-upload-fcelp4xs | Cisco Identity Services Engine Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ise-file-upload-FceLP4xs | Cisco Identity Services Engine Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftdsnort3sip-bypass-lmz2thkn | Cisco Firepower Threat Defense Software Snort 3 Geolocation IP Filter Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftdsnort3sip-bypass-LMz2ThKn | Cisco Firepower Threat Defense Software Snort 3 Geolocation IP Filter Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-snort3-uanuntcv | Cisco Firepower Threat Defense Software Snort 3 Detection Engine Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-snort3-uAnUntcV | Cisco Firepower Threat Defense Software Snort 3 Detection Engine Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-snort3-8u4hhxh8 | Cisco Firepower Threat Defense Software SSL and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-snort3-8U4HHxH8 | Cisco Firepower Threat Defense Software SSL and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-smbsnort3-dos-pfojoyuv | Cisco Firepower Threat Defense Software SMB Protocol Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-smbsnort3-dos-pfOjOYUV | Cisco Firepower Threat Defense Software SMB Protocol Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-intrusion-dos-dft7wygc | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Firewalls Inspection Rules Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-intrusion-dos-DfT7wyGC | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Firewalls Inspection Rules Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-xss-sk2gkfvj | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-xss-sK2gkfvJ | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-logview-dos-ayjdex55 | Cisco Firepower Management Center Software Log API Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-logview-dos-AYJdeX55 | Cisco Firepower Management Center Software Log API Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31679 | openvswitch: validate MPLS set/set_masked payload length | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:40.000Z |
| msrc_cve-2026-40385 | CVE-2026-40385 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:30.000Z |
| msrc_cve-2026-31674 | netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:25.000Z |
| msrc_cve-2026-40386 | CVE-2026-40386 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:15.000Z |
| msrc_cve-2026-31682 | bridge: br_nd_send: linearize skb before parsing ND options | 2026-04-02T00:00:00.000Z | 2026-04-29T14:54:10.000Z |
| msrc_cve-2026-40226 | CVE-2026-40226 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:53:47.000Z |
| msrc_cve-2026-31678 | openvswitch: defer tunnel netdev_put to RCU release | 2026-04-02T00:00:00.000Z | 2026-04-29T14:53:27.000Z |
| msrc_cve-2026-31680 | net: ipv6: flowlabel: defer exclusive option free until RCU teardown | 2026-04-02T00:00:00.000Z | 2026-04-29T14:53:11.000Z |
| msrc_cve-2026-31593 | KVM: SEV: Reject attempts to sync VMSA of an already-launched/encrypted vCPU | 2026-04-02T00:00:00.000Z | 2026-04-29T14:53:05.000Z |
| msrc_cve-2024-30896 | InfluxDB OSS 2.x through 2.7.11 stores the administrative operator token under the default organization which allows authorized users with read access to the authorization resource of the default organization to retrieve the operator token. InfluxDB OSS 1.x, Enterprise, Cloud, Cloud Dedicated and Clustered are not affected. NOTE: The researcher states that InfluxDB allows allAccess administrators to retrieve all raw tokens via an "influx auth ls" command. The supplier indicates that the organizations feature is operating as intended and that users may choose to add users to non-default organizations. A future release of InfluxDB 2.x will remove the ability to retrieve tokens from the API. | 2024-11-02T00:00:00.000Z | 2026-04-29T14:53:03.000Z |
| msrc_cve-2026-31620 | ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:52:49.000Z |
| msrc_cve-2026-31675 | net/sched: sch_netem: fix out-of-bounds access in packet corruption | 2026-04-02T00:00:00.000Z | 2026-04-29T14:52:28.000Z |
| msrc_cve-2017-3735 | CVE-2017-3735 | 2017-08-02T00:00:00.000Z | 2026-04-29T14:51:57.000Z |
| msrc_cve-2026-31555 | futex: Clear stale exiting pointer in futex_lock_pi() retry path | 2026-04-02T00:00:00.000Z | 2026-04-29T14:51:52.000Z |
| msrc_cve-2025-66382 | In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time. | 2025-11-02T00:00:00.000Z | 2026-04-29T14:51:36.000Z |
| msrc_cve-2026-41079 | OpenPrinting CUPS: Heap out-of-bounds read in SNMP supply-level polling leaks stack memory to authenticated users | 2026-04-02T00:00:00.000Z | 2026-04-29T14:51:25.000Z |
| msrc_cve-2025-13230 | Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | 2025-11-02T00:00:00.000Z | 2026-04-29T14:51:09.000Z |
| msrc_cve-2025-13226 | Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | 2025-11-02T00:00:00.000Z | 2026-04-29T14:50:56.000Z |
| msrc_cve-2025-13227 | Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | 2025-11-02T00:00:00.000Z | 2026-04-29T14:50:44.000Z |
| msrc_cve-2026-28808 | ScriptAlias CGI targets bypass directory auth in inets httpd (mod_auth vs mod_cgi path mismatch) | 2026-04-02T00:00:00.000Z | 2026-04-29T14:49:51.000Z |
| msrc_cve-2026-31473 | media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex | 2026-04-02T00:00:00.000Z | 2026-04-29T14:49:06.000Z |
| msrc_cve-2026-31450 | ext4: publish jinode after initialization | 2026-04-02T00:00:00.000Z | 2026-04-29T14:48:51.000Z |
| msrc_cve-2026-23414 | tls: Purge async_hold in tls_decrypt_async_wait() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:48:15.000Z |
| msrc_cve-2026-23360 | nvme: fix admin queue leak on controller reset | 2026-03-02T00:00:00.000Z | 2026-04-29T14:47:46.000Z |
| msrc_cve-2026-31467 | erofs: add GFP_NOIO in the bio completion if needed | 2026-04-02T00:00:00.000Z | 2026-04-29T14:47:45.000Z |
| msrc_cve-2025-12058 | Vulnerability in Keras Model.load_model Leading to Arbitrary Local File Loading and SSRF | 2025-10-02T00:00:00.000Z | 2026-04-29T14:47:39.000Z |
| msrc_cve-2026-31525 | bpf: Fix undefined behavior in interpreter sdiv/smod for INT_MIN | 2026-04-02T00:00:00.000Z | 2026-04-29T14:47:28.000Z |
| msrc_cve-2026-41140 | Poetry: Path traversal in tar extraction on Python 3.10.0 - 3.10.12 and 3.11.0 - 3.11.4 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:47:17.000Z |
| msrc_cve-2026-31453 | xfs: avoid dereferencing log items after push callbacks | 2026-04-02T00:00:00.000Z | 2026-04-29T14:47:12.000Z |
| msrc_cve-2025-23167 | CVE-2025-23167 | 2025-05-02T00:00:00.000Z | 2026-04-29T14:46:40.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0322 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-08-06T09:25:08.253832Z | 2024-08-06T09:25:08.253832Z |
| ncsc-2024-0269 | Kwetsbaarheden verholpen in VMware ESXi en vCenter Server | 2024-06-26T09:02:10.988453Z | 2024-07-30T09:32:13.311694Z |
| ncsc-2024-0321 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2024-07-30T08:45:50.286085Z | 2024-07-30T08:45:50.286085Z |
| ncsc-2024-0320 | Kwetsbaarheden verholpen in Apple MacOS | 2024-07-30T08:42:07.365674Z | 2024-07-30T08:42:07.365674Z |
| ncsc-2024-0319 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-07-30T08:39:16.399394Z | 2024-07-30T08:39:16.399394Z |
| ncsc-2024-0318 | Kwetsbaarheden verholpen in Docker Moby | 2024-07-25T11:28:37.900721Z | 2024-07-25T11:28:37.900721Z |
| ncsc-2024-0317 | Kwetsbaarheid gevonden in Ivanti Endpoint Manager | 2024-07-24T14:37:09.864241Z | 2024-07-24T14:37:09.864241Z |
| ncsc-2024-0316 | Kwetsbaarheid verholpen in Broadcom Symantec Privileged Access Management | 2024-07-22T09:17:29.853486Z | 2024-07-22T09:17:29.853486Z |
| ncsc-2024-0315 | Kwetsbaarheid verholpen in Cisco Smart Software Manager On-Prem | 2024-07-19T13:06:00.004663Z | 2024-07-19T13:06:00.004663Z |
| ncsc-2024-0314 | Kwetsbaarheden verholpen in Apache HTTP Server | 2024-07-19T07:34:12.997118Z | 2024-07-19T07:34:12.997118Z |
| ncsc-2024-0313 | Kwetsbaarheid verholpen in HPE 3PAR Service Processor | 2024-07-18T13:58:07.127103Z | 2024-07-18T13:58:07.127103Z |
| ncsc-2024-0312 | Kwetsbaarheden verholpen in Solarwinds Platform | 2024-07-18T13:23:55.561789Z | 2024-07-18T13:23:55.561789Z |
| ncsc-2024-0311 | Kwetsbaarheden verholpen in Cisco Secure Email Gateway | 2024-07-18T12:46:34.019785Z | 2024-07-18T12:46:34.019785Z |
| ncsc-2024-0310 | Kwetsbaarheid verholpen in SonicOS | 2024-07-18T12:25:06.813302Z | 2024-07-18T12:25:06.813302Z |
| ncsc-2024-0309 | Kwetsbaarheid gevonden in Ivanti Endpoint Manager | 2024-07-18T12:00:25.689314Z | 2024-07-18T12:00:25.689314Z |
| ncsc-2024-0308 | Kwetsbaarheden verholpen in Oracle Virtualization | 2024-07-17T13:55:57.768494Z | 2024-07-17T13:55:57.768494Z |
| ncsc-2024-0307 | Kwetsbaarheden verholpen in Oracle Systems | 2024-07-17T13:55:53.343378Z | 2024-07-17T13:55:53.343378Z |
| ncsc-2024-0306 | Kwetsbaarheden verholpen in Oracle Supply Chain | 2024-07-17T13:55:37.062720Z | 2024-07-17T13:55:37.062720Z |
| ncsc-2024-0305 | Kwetsbaarheden verholpen in Oracle Siebel CRM | 2024-07-17T13:55:31.923970Z | 2024-07-17T13:55:31.923970Z |
| ncsc-2024-0304 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2024-07-17T13:55:12.225033Z | 2024-07-17T13:55:12.225033Z |
| ncsc-2024-0303 | Kwetsbaarheden verholpen in Oracle MySQL | 2024-07-17T13:54:56.036488Z | 2024-07-17T13:54:56.036488Z |
| ncsc-2024-0302 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2024-07-17T13:54:52.031796Z | 2024-07-17T13:54:52.031796Z |
| ncsc-2024-0301 | Kwetsbaarheden verholpen in Oracle Java SE | 2024-07-17T13:54:46.188033Z | 2024-07-17T13:54:46.188033Z |
| ncsc-2024-0300 | Kwetsbaarheid verholpen in Oracle Hyperion | 2024-07-17T13:54:07.536172Z | 2024-07-17T13:54:07.536172Z |
| ncsc-2024-0299 | Kwetsbaarheden verholpen in Oracle Analytics | 2024-07-17T13:54:03.545073Z | 2024-07-17T13:54:03.545073Z |
| ncsc-2024-0298 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2024-07-17T13:54:00.411174Z | 2024-07-17T13:54:00.411174Z |
| ncsc-2024-0297 | Kwetsbaarheden verholpen in Oracle Financial Services Applications | 2024-07-17T13:53:54.655859Z | 2024-07-17T13:53:54.655859Z |
| ncsc-2024-0296 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2024-07-17T13:53:28.440252Z | 2024-07-17T13:53:28.440252Z |
| ncsc-2024-0295 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2024-07-17T13:53:22.662201Z | 2024-07-17T13:53:22.662201Z |
| ncsc-2024-0294 | Kwetsbaarheden verholpen in Oracle Communications | 2024-07-17T13:52:53.293003Z | 2024-07-17T13:52:53.293003Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10133-1 | java-11-openj9-11.0.30.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:10132-1 | freerdp-3.22.0-1.1 on GA media | 2026-02-03T00:00:00Z | 2026-02-03T00:00:00Z |
| opensuse-su-2026:20156-1 | Security update for chromium | 2026-02-02T17:20:43Z | 2026-02-02T17:20:43Z |
| opensuse-su-2026:20152-1 | Security update for openssl-3 | 2026-02-02T13:00:02Z | 2026-02-02T13:00:02Z |
| opensuse-su-2026:20151-1 | Security update for wireshark | 2026-02-02T12:56:02Z | 2026-02-02T12:56:02Z |
| opensuse-su-2026:20150-1 | Security update for glib2 | 2026-02-02T12:41:24Z | 2026-02-02T12:41:24Z |
| opensuse-su-2026:20145-1 | Security update for the Linux Kernel | 2026-02-02T11:54:26Z | 2026-02-02T11:54:26Z |
| opensuse-su-2026:20148-1 | Security update for dpdk | 2026-02-02T11:12:33Z | 2026-02-02T11:12:33Z |
| opensuse-su-2026:20147-1 | Security update for python-wheel | 2026-02-02T09:49:12Z | 2026-02-02T09:49:12Z |
| opensuse-su-2026:10131-1 | trivy-0.69.0-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10130-1 | python311-PyNaCl-1.6.2-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10129-1 | libmlt++-7-7-7.36.1-1.1 on GA media | 2026-02-02T00:00:00Z | 2026-02-02T00:00:00Z |
| opensuse-su-2026:10128-1 | MozillaThunderbird-140.7.1-1.1 on GA media | 2026-01-31T00:00:00Z | 2026-01-31T00:00:00Z |
| opensuse-su-2026:20144-1 | Security update for python-filelock | 2026-01-30T21:24:37Z | 2026-01-30T21:24:37Z |
| opensuse-su-2026:20143-1 | Security update for java-25-openjdk | 2026-01-30T15:55:47Z | 2026-01-30T15:55:47Z |
| opensuse-su-2026:20140-1 | Security update for alloy | 2026-01-30T14:38:31Z | 2026-01-30T14:38:31Z |
| opensuse-su-2026:20141-1 | Security update for udisks2 | 2026-01-30T14:30:57Z | 2026-01-30T14:30:57Z |
| opensuse-su-2026:20142-1 | Security update for libsoup | 2026-01-30T14:27:58Z | 2026-01-30T14:27:58Z |
| opensuse-su-2026:20139-1 | Security update for unbound | 2026-01-30T10:05:07Z | 2026-01-30T10:05:07Z |
| opensuse-su-2026:20138-1 | Security update for jasper | 2026-01-30T09:59:14Z | 2026-01-30T09:59:14Z |
| opensuse-su-2026:10127-1 | rekor-1.5.0-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10126-1 | python315-3.15.0~a3-3.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10125-1 | python311-django-storages-1.14.6-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10124-1 | golang-github-prometheus-prometheus-3.9.1-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10123-1 | freerdp-3.21.0-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10122-1 | fontforge-20251009-4.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10121-1 | chromedriver-144.0.7559.109-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10120-1 | MozillaFirefox-147.0.2-1.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:10119-1 | ImageMagick-7.1.2.13-2.1 on GA media | 2026-01-30T00:00:00Z | 2026-01-30T00:00:00Z |
| opensuse-su-2026:20134-1 | Security update for java-17-openjdk | 2026-01-29T17:44:57Z | 2026-01-29T17:44:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:3637 | Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.3.0 for RHEL 9 | 2024-07-01T00:39:38+00:00 | 2026-05-09T14:40:12+00:00 |
| rhsa-2024:3634 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.14 OpenShift Jenkins security update | 2024-06-05T14:47:02+00:00 | 2026-05-09T14:40:12+00:00 |
| rhsa-2024:3621 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.2.0 operator/operand containers update | 2024-06-05T05:15:15+00:00 | 2026-05-09T14:40:11+00:00 |
| rhsa-2024:3617 | Red Hat Security Advisory: Kube Descheduler Operator for Red Hat OpenShift 5.0.1 for RHEL 9 | 2024-07-01T00:52:46+00:00 | 2026-05-09T14:40:11+00:00 |
| rhsa-2024:3316 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | 2024-05-23T06:39:32+00:00 | 2026-05-09T14:40:10+00:00 |
| rhsa-2024:3254 | Red Hat Security Advisory: container-tools:rhel8 security update | 2024-05-22T11:48:26+00:00 | 2026-05-09T14:40:09+00:00 |
| rhsa-2024:2901 | Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift 2.12.1-394 Security Update | 2024-05-23T14:09:31+00:00 | 2026-05-09T14:40:09+00:00 |
| rhsa-2024:2874 | Red Hat Security Advisory: OpenShift Container Platform 4.13.42 security and extras update | 2024-05-23T06:22:23+00:00 | 2026-05-09T14:40:08+00:00 |
| rhsa-2024:2781 | Red Hat Security Advisory: OpenShift Container Platform 4.12.57 security update | 2024-05-16T16:12:11+00:00 | 2026-05-09T14:40:08+00:00 |
| rhsa-2024:2773 | Red Hat Security Advisory: OpenShift Container Platform 4.15.13 bug fix and security update | 2024-05-15T18:40:53+00:00 | 2026-05-09T14:40:08+00:00 |
| rhsa-2024:2666 | Red Hat Security Advisory: OpenShift Container Platform 4.14.24 security and extras update | 2024-05-09T15:00:25+00:00 | 2026-05-09T14:40:08+00:00 |
| rhsa-2024:2639 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.15 security and bug fix update | 2024-05-01T02:44:36+00:00 | 2026-05-09T14:40:08+00:00 |
| rhsa-2024:2550 | Red Hat Security Advisory: buildah bug fix update | 2024-04-30T13:38:22+00:00 | 2026-05-09T14:40:07+00:00 |
| rhsa-2024:2549 | Red Hat Security Advisory: skopeo security and bug fix update | 2024-04-30T13:36:46+00:00 | 2026-05-09T14:40:06+00:00 |
| rhsa-2024:2548 | Red Hat Security Advisory: podman security and bug fix update | 2024-04-30T13:39:21+00:00 | 2026-05-09T14:40:06+00:00 |
| rhsa-2024:2180 | Red Hat Security Advisory: runc security update | 2024-04-30T10:27:41+00:00 | 2026-05-09T14:40:06+00:00 |
| rhsa-2024:2096 | Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.9.1 | 2024-05-01T07:37:52+00:00 | 2026-05-09T14:40:05+00:00 |
| rhsa-2024:1946 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.1 security update | 2024-04-22T12:47:08+00:00 | 2026-05-09T14:40:04+00:00 |
| rhsa-2024:1925 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.3 security and bug fix update | 2024-04-18T12:41:00+00:00 | 2026-05-09T14:40:04+00:00 |
| rhsa-2024:1874 | Red Hat Security Advisory: rhc-worker-script security and enhancement update | 2024-04-18T02:08:28+00:00 | 2026-05-09T14:40:04+00:00 |
| rhsa-2024:1765 | Red Hat Security Advisory: OpenShift Container Platform 4.14.21 bug fix and security update | 2024-04-18T11:58:59+00:00 | 2026-05-09T14:40:04+00:00 |
| rhsa-2024:1859 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.3.1 security and bug fix update | 2024-04-16T17:26:06+00:00 | 2026-05-09T14:40:02+00:00 |
| rhsa-2024:1795 | Red Hat Security Advisory: VolSync 0.9.1 security fixes and enhancements | 2024-04-11T21:29:12+00:00 | 2026-05-09T14:40:02+00:00 |
| rhsa-2024:1770 | Red Hat Security Advisory: OpenShift Container Platform 4.15.9 bug fix and security update | 2024-04-16T14:52:58+00:00 | 2026-05-09T14:40:01+00:00 |
| rhsa-2024:1572 | Red Hat Security Advisory: OpenShift Container Platform 4.12.54 bug fix and security update | 2024-04-03T06:57:46+00:00 | 2026-05-09T14:40:01+00:00 |
| rhsa-2024:1616 | Red Hat Security Advisory: Run Once Duration Override Operator for Red Hat OpenShift 1.1.1 for RHEL 9 | 2024-07-01T00:28:51+00:00 | 2026-05-09T14:40:00+00:00 |
| rhsa-2024:1574 | Red Hat Security Advisory: OpenShift Container Platform 4.12.54 packages and security update | 2024-04-03T07:42:00+00:00 | 2026-05-09T14:40:00+00:00 |
| rhsa-2024:1563 | Red Hat Security Advisory: OpenShift Container Platform 4.15.6 packages and security update | 2024-04-02T21:42:24+00:00 | 2026-05-09T14:39:59+00:00 |
| rhsa-2024:1474 | Red Hat Security Advisory: logging for Red Hat OpenShift security update | 2024-03-27T15:00:48+00:00 | 2026-05-09T14:39:59+00:00 |
| rhsa-2024:1559 | Red Hat Security Advisory: OpenShift Container Platform 4.15.6 bug fix and security update | 2024-04-02T19:33:26+00:00 | 2026-05-09T14:39:58+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-111512 | SSA-111512: Client-side Authentication in SIMATIC WinCC OA | 2022-06-21T00:00:00Z | 2022-06-21T00:00:00Z |
| ssa-911567 | SSA-911567: Missing HTTP headers in SINEMA Remote Connect Server before V3.0 SP2 | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-740594 | SSA-740594: Privilege Escalation Vulnerability in Mendix SAML Module | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-693555 | SSA-693555: Memory Corruption Vulnerability in EN100 Ethernet Module | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-679335 | SSA-679335: Multiple Vulnerabilities in Embedded FTP Server of SIMATIC CP Modules | 2021-08-10T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-662649 | SSA-662649: Denial of Service Vulnerability in Desigo DXR and PXC Controllers | 2022-05-10T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-626968 | SSA-626968: Multiple Webserver Vulnerabilities in Desigo PXC and DXR Devices | 2022-05-10T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-535997 | SSA-535997: Cleartext Storage of Sensitive Information in Multiple SIMATIC Products | 2021-09-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-401167 | SSA-401167: Cross-site scripting Vulnerability in Teamcenter Active Workspace | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-388239 | SSA-388239: Default Password Leakage affecting the Component Shared HIS used in Spectrum Power Systems | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-330556 | SSA-330556: PwnKit Vulnerability in SCALANCE LPE9403 and SINUMERIK Edge Products (CVE-2021-4034) | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-301589 | SSA-301589: Multiple File Parsing Vulnerabilities in Solid Edge, JT2Go and Teamcenter Visualization | 2022-02-08T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-222547 | SSA-222547: Third-Party Component Vulnerabilities in SCALANCE LPE9403 before V2.0 | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-148078 | SSA-148078: Multiple Vulnerabilities in APOGEE/TALON Field Panels | 2017-10-12T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-145224 | SSA-145224: Vulnerability in OSPF Packet Handling of SCALANCE XM-400 and XR-500 Devices | 2022-06-14T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-787292 | SSA-787292: Denial of Service Vulnerability in SIMATIC RFID Readers | 2021-06-08T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-756638 | SSA-756638: Vulnerabilities in Third-Party Component Mbed TLS of LOGO! CMR Family and SIMATIC RTU 3000 Family | 2021-09-14T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-736385 | SSA-736385: Memory Corruption Vulnerability in OpenV2G | 2022-05-10T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-560465 | SSA-560465: DHCP Client Vulnerability in VxWorks-based Industrial Products | 2021-07-13T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-553086 | SSA-553086: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization | 2022-05-10T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-480937 | SSA-480937: Denial of Service Vulnerability in CP 44x-1 RNA before V1.5.18 | 2022-05-10T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-165073 | SSA-165073: Multiple Vulnerabilities in the Webinterface of SICAM P850 and SICAM P855 Devices | 2022-05-10T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-162616 | SSA-162616: File Parsing Vulnerabilities in Simcenter Femap before V2022.2 | 2022-05-10T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-114589 | SSA-114589: Multiple Vulnerabilities in Nucleus RTOS based APOGEE, TALON and Desigo PXC/PXM Products | 2021-11-09T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-998762 | SSA-998762: File Parsing Vulnerabilities in Simcenter Femap before V2022.1.2 | 2022-04-12T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-995338 | SSA-995338: Multiple Vulnerabilities in COMOS Web | 2022-01-11T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-870917 | SSA-870917: Improper Access Control Vulnerability in Mendix | 2022-04-12T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-836527 | SSA-836527: Multiple Vulnerabilities in SCALANCE X-300 Switch Family Devices | 2022-04-12T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-672373 | SSA-672373: Vulnerabilities in CP 1543-1 before V2.0.28 | 2016-11-18T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-655554 | SSA-655554: Multiple Vulnerabilities in SIMATIC Energy Manager before V7.3 Update 1 | 2022-04-12T00:00:00Z | 2022-04-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21008-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-su-2026:21007-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-su-2026:21006-1 | Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-su-2026:21005-1 | Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-su-2026:21004-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-ru-2026:1228-1 | Recommended update for shadow | 2026-04-09T08:27:26Z | 2026-04-09T08:27:26Z |
| suse-su-2026:1225-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T01:53:43Z | 2026-04-09T01:53:43Z |
| suse-su-2026:1222-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-04-08T20:04:54Z | 2026-04-08T20:04:54Z |
| suse-su-2026:21065-1 | Security update for openssl-3 | 2026-04-08T16:32:18Z | 2026-04-08T16:32:18Z |
| suse-su-2026:1221-1 | Security update for the Linux Kernel (Live Patch 67 for SUSE Linux Enterprise 12 SP5) | 2026-04-08T16:04:43Z | 2026-04-08T16:04:43Z |
| suse-su-2026:21037-1 | Security update for openssl-3 | 2026-04-08T15:00:50Z | 2026-04-08T15:00:50Z |
| suse-su-2026:1218-1 | Security update for python-requests | 2026-04-08T14:39:49Z | 2026-04-08T14:39:49Z |
| suse-su-2026:21036-1 | Security update for python-requests | 2026-04-08T14:30:11Z | 2026-04-08T14:30:11Z |
| suse-su-2026:21035-1 | Security update for libtpms | 2026-04-08T14:28:41Z | 2026-04-08T14:28:41Z |
| suse-su-2026:21064-1 | Security update for libtpms | 2026-04-08T14:17:58Z | 2026-04-08T14:17:58Z |
| suse-su-2026:21063-1 | Security update for python-requests | 2026-04-08T14:11:12Z | 2026-04-08T14:11:12Z |
| suse-su-2026:1217-1 | Security update for freerdp | 2026-04-08T12:28:33Z | 2026-04-08T12:28:33Z |
| suse-su-2026:1216-1 | Security update for openssl-1_1 | 2026-04-08T12:28:22Z | 2026-04-08T12:28:22Z |
| suse-su-2026:1215-1 | Security update for openssl-3 | 2026-04-08T12:27:58Z | 2026-04-08T12:27:58Z |
| suse-su-2026:1214-1 | Security update for openssl-3 | 2026-04-08T12:27:45Z | 2026-04-08T12:27:45Z |
| suse-su-2026:1213-1 | Security update for openssl-3 | 2026-04-08T12:27:10Z | 2026-04-08T12:27:10Z |
| suse-su-2026:1051-1 | Security update for vim | 2026-04-08T11:40:57Z | 2026-04-08T11:40:57Z |
| suse-su-2026:1212-1 | Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | 2026-04-08T10:04:46Z | 2026-04-08T10:04:46Z |
| suse-su-2026:1209-1 | Security update for bind | 2026-04-08T07:12:41Z | 2026-04-08T07:12:41Z |
| suse-su-2026:1208-1 | Security update for ignition | 2026-04-08T07:12:23Z | 2026-04-08T07:12:23Z |
| suse-su-2026:21062-1 | Security update for expat | 2026-04-07T18:52:31Z | 2026-04-07T18:52:31Z |
| suse-su-2026:21144-1 | Security update for systemd | 2026-04-07T15:06:51Z | 2026-04-07T15:06:51Z |
| suse-su-2026:21003-1 | Security update for systemd | 2026-04-07T15:06:51Z | 2026-04-07T15:06:51Z |
| suse-su-2026:21143-1 | Security update for tar | 2026-04-07T14:59:15Z | 2026-04-07T14:59:15Z |
| suse-su-2026:21002-1 | Security update for tar | 2026-04-07T14:59:15Z | 2026-04-07T14:59:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:19489 | Important: tigervnc security update | 2025-11-03T00:00:00Z | 2025-11-07T10:26:16Z |
| alsa-2025:19566 | Moderate: osbuild-composer security update | 2025-11-04T00:00:00Z | 2025-11-07T10:05:01Z |
| alsa-2025:19572 | Moderate: mariadb:10.5 security update | 2025-11-04T00:00:00Z | 2025-11-07T09:54:08Z |
| alsa-2025:19584 | Moderate: galera and mariadb security update | 2025-11-04T00:00:00Z | 2025-11-07T09:36:35Z |
| alsa-2025:19610 | Important: sssd security update | 2025-11-04T00:00:00Z | 2025-11-07T09:17:41Z |
| alsa-2025:19675 | Important: valkey security update | 2025-11-04T00:00:00Z | 2025-11-07T08:40:54Z |
| alsa-2025:19714 | Important: libsoup security update | 2025-11-04T00:00:00Z | 2025-11-07T08:29:27Z |
| alsa-2025:19772 | Important: qt6-qtsvg security update | 2025-11-05T00:00:00Z | 2025-11-07T08:19:22Z |
| alsa-2025:19793 | Important: bind9.16 security update | 2025-11-05T00:00:00Z | 2025-11-07T08:08:22Z |
| alsa-2025:19835 | Important: bind security update | 2025-11-05T00:00:00Z | 2025-11-07T07:49:33Z |
| alsa-2025:18150 | Important: .NET 9.0 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:55:12Z |
| alsa-2025:18070 | Important: webkit2gtk3 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:51:57Z |
| alsa-2025:18151 | Important: .NET 9.0 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:48:44Z |
| alsa-2025:18152 | Important: .NET 8.0 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:46:41Z |
| alsa-2025:18153 | Important: .NET 9.0 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:44:34Z |
| alsa-2025:19276 | Important: libtiff security update | 2025-10-29T00:00:00Z | 2025-10-31T08:23:09Z |
| alsa-2025:18815 | Moderate: java-1.8.0-openjdk security update | 2025-10-22T00:00:00Z | 2025-10-30T12:06:21Z |
| alsa-2025:19156 | Important: libtiff security update | 2025-10-28T00:00:00Z | 2025-10-30T10:20:53Z |
| alsa-2025:18821 | Moderate: java-17-openjdk security update | 2025-10-22T00:00:00Z | 2025-10-30T07:28:25Z |
| alsa-2025:18824 | Moderate: java-21-openjdk security update | 2025-10-22T00:00:00Z | 2025-10-30T07:18:58Z |
| alsa-2025:19237 | Important: redis security update | 2025-10-29T00:00:00Z | 2025-10-30T07:03:54Z |
| alsa-2025:19238 | Important: redis:6 security update | 2025-10-29T00:00:00Z | 2025-10-30T07:01:24Z |
| alsa-2025:19107 | Important: squid:4 security update | 2025-10-27T00:00:00Z | 2025-10-28T09:25:35Z |
| alsa-2025:19113 | Important: libtiff security update | 2025-10-27T00:00:00Z | 2025-10-28T07:58:42Z |
| alsa-2025:19102 | Moderate: kernel security update | 2025-10-27T00:00:00Z | 2025-10-28T07:55:37Z |
| alsa-2025:19103 | Moderate: kernel-rt security update | 2025-10-27T00:00:00Z | 2025-10-28T07:51:20Z |
| alsa-2025:18983 | Important: thunderbird security update | 2025-10-22T00:00:00Z | 2025-10-27T08:16:53Z |
| alsa-2025:18097 | Important: webkit2gtk3 security update | 2025-10-15T00:00:00Z | 2025-10-23T12:50:53Z |
| alsa-2025:17084 | Important: ipa security update | 2025-09-30T00:00:00Z | 2025-10-22T13:15:47Z |
| alsa-2025:18321 | Important: thunderbird security update | 2025-10-20T00:00:00Z | 2025-10-22T10:38:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-22 | Heap-use-after-free in ucl_hash_func | 2024-01-19T00:14:18.833531Z | 2024-07-16T04:35:26.847250Z |
| osv-2024-640 | Null-dereference READ | 2024-07-13T00:15:12.997693Z | 2024-07-13T00:15:12.998025Z |
| osv-2024-636 | Null-dereference READ in evp_mac_final | 2024-07-13T00:04:18.446520Z | 2024-07-13T00:04:18.446812Z |
| osv-2024-635 | Null-dereference READ in do_evp_kdf | 2024-07-13T00:03:44.593921Z | 2024-07-13T00:03:44.594307Z |
| osv-2024-634 | Heap-buffer-overflow in htmlCurrentChar | 2024-07-13T00:03:44.049545Z | 2024-07-13T00:03:44.049863Z |
| osv-2024-627 | Heap-buffer-overflow in gf_hevc_parse_nalu_bs | 2024-07-12T00:01:41.960899Z | 2024-07-12T00:01:41.961272Z |
| osv-2024-602 | Heap-buffer-overflow in ultrahdr::getYuv420Pixel | 2024-06-29T00:09:20.554523Z | 2024-06-29T00:09:20.554958Z |
| osv-2024-555 | Heap-buffer-overflow in ArduinoJson::V704HB22::detail::MsgPackDeserializer<ArduinoJson::V704HB22::detail | 2024-06-13T00:06:28.782972Z | 2024-06-28T14:18:08.360826Z |
| osv-2024-574 | Heap-buffer-overflow in spvtools::disassemble::InstructionDisassembler::EmitInstruction | 2024-06-19T00:15:01.983925Z | 2024-06-25T14:22:08.649397Z |
| osv-2024-535 | Use-of-uninitialized-value in spvTextEncodeOperand | 2024-06-06T00:00:55.007699Z | 2024-06-25T14:21:53.898093Z |
| osv-2024-518 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-05-30T00:16:42.628026Z | 2024-06-24T14:17:55.597576Z |
| osv-2024-577 | Heap-use-after-free in sputs | 2024-06-22T00:14:08.186738Z | 2024-06-22T00:14:08.187320Z |
| osv-2024-575 | UNKNOWN READ in H5SL_remove | 2024-06-20T00:03:37.435999Z | 2024-06-20T00:03:37.436551Z |
| osv-2024-567 | Security exception in jflex.core.NFA.insertNFA | 2024-06-16T00:06:55.824759Z | 2024-06-16T00:06:55.825276Z |
| osv-2024-552 | UNKNOWN READ in ndpi_search_zoom | 2024-06-12T00:12:06.312903Z | 2024-06-12T00:12:06.313282Z |
| osv-2024-551 | Heap-buffer-overflow in mz_zip_mem_read_func | 2024-06-12T00:06:30.075962Z | 2024-06-12T00:06:30.076324Z |
| osv-2024-550 | Heap-buffer-overflow in mz_zip_mem_read_func | 2024-06-12T00:06:02.418206Z | 2024-06-12T00:06:02.418563Z |
| osv-2024-548 | Use-of-uninitialized-value in icalmemory_strdup | 2024-06-12T00:00:26.364017Z | 2024-06-12T00:00:26.364669Z |
| osv-2024-521 | Heap-buffer-overflow in ubidi_writeReordered_76 | 2024-05-31T00:06:51.180600Z | 2024-05-31T00:06:51.181049Z |
| osv-2024-345 | Use-of-uninitialized-value in aesEncryptBlock | 2024-04-30T00:03:14.686810Z | 2024-05-27T14:03:03.110153Z |
| osv-2024-456 | Heap-buffer-overflow in ih264d_read_coeff4x4_cabac | 2024-05-09T00:08:35.451422Z | 2024-05-27T14:02:56.983104Z |
| osv-2024-323 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2024-04-29T05:41:42.743610Z | 2024-05-27T14:02:31.976819Z |
| osv-2024-333 | UNKNOWN READ in Mat_VarPrint | 2024-04-30T00:01:20.039792Z | 2024-05-27T14:01:03.854129Z |
| osv-2024-330 | UNKNOWN READ in std::__1::__POW10_SPLIT_2 | 2024-04-30T00:00:31.577722Z | 2024-05-27T14:01:02.168724Z |
| osv-2024-504 | Heap-buffer-overflow in ultrahdr::getYuv420Pixel | 2024-05-25T00:01:08.542552Z | 2024-05-25T00:01:08.543179Z |
| osv-2024-503 | Heap-buffer-overflow in pdf_save_viewer_state | 2024-05-24T00:02:37.047119Z | 2024-05-24T00:02:37.047771Z |
| osv-2024-496 | UNKNOWN READ in chunk_free_object | 2024-05-22T00:06:41.510071Z | 2024-05-22T00:06:41.510555Z |
| osv-2024-495 | UNKNOWN READ in chunk_free_object | 2024-05-22T00:04:27.058012Z | 2024-05-22T00:04:27.058432Z |
| osv-2024-493 | UNKNOWN READ in chunk_free_object | 2024-05-22T00:00:49.459478Z | 2024-05-22T00:00:49.459808Z |
| osv-2024-490 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-05-20T00:07:13.417197Z | 2024-05-20T00:07:13.417898Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2021-0007 | `Frame::copy_from_raw_parts` can lead to segfault without `unsafe` | 2021-01-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0006 | Exposes internally used raw pointer | 2021-01-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0005 | Double drop upon panic in 'fn map_array()' | 2021-01-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0004 | Missing Send bound for Lazy | 2021-01-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0003 | Buffer overflow in SmallVec::insert_many | 2021-01-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0167 | `pnet_packet` buffer overrun in `set_payload` setters | 2020-06-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0165 | mozjpeg DecompressScanlines::read_scanlines is Unsound | 2020-07-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0164 | `cell-project` used incorrect variance when projecting through `&Cell<T>` | 2020-08-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0161 | `array!` macro is unsound in presence of traits that implement methods it calls internally | 2020-05-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0160 | Threshold value is ignored (all shares are n=3) | 2020-01-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0155 | `Read` on uninitialized buffer in `fill_buf()` and `read_up_to()` | 2020-12-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0154 | InputStream::read_exact : `Read` on uninitialized buffer causes UB | 2020-12-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0153 | `read` on uninitialized buffer may cause UB (bite::read::BiteReadExpandedExt::read_framed_max) | 2020-12-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0152 | ImmediateIO and TransactionalIO can cause data races | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0151 | Generators can cause data races if non-Send types are used in their generator functions | 2020-11-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0150 | RingBuffer can create multiple mutable references and cause data races | 2020-12-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0149 | Data race and memory safety issue in `Index` | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0148 | Multiple soundness issues in `Ptr` | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0146 | arr! macro erases lifetimes | 2020-04-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0145 | Use-after-free when cloning a partially consumed `Vec` iterator | 2020-11-02T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0143 | Queues allow non-Send types to be sent to other threads, allowing data races | 2020-12-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0142 | Send bound needed on T (for Send impl of `Bucket2`) | 2020-11-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0141 | MvccRwLock allows data races & aliasing violations | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0140 | `Shared` can cause a data race | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0139 | dces' World type can cause data races | 2020-12-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0138 | ReaderResult should be bounded by Sync | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0137 | AtomicBox<T> lacks bound on its Send and Sync traits allowing data races | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0136 | CopyCell lacks bounds on its Send trait allowing for data races | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0135 | Slock<T> allows sending non-Send types across thread boundaries | 2020-11-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0134 | `LockWeak<T>` allows to create data race to `T`. | 2020-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2026-32243 | Discourse: Stored XSS in discourse-ai shared conversations onebox | 2026-04-07T08:43:46.857Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32143 | Discourse: Admin-only report can be exported by moderators | 2026-04-07T08:43:44.810Z | 2026-04-07T09:14:25.218Z |
| bit-discourse-2026-32113 | Discourse: Open redirect via `sso_destination_url` cookie in `enter` | 2026-04-07T08:43:40.581Z | 2026-04-07T09:14:25.218Z |
| bit-parse-2026-34784 | Parse Server: Streaming file download bypasses afterFind file trigger authorization | 2026-04-06T14:49:38.726Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34595 | Parse Server: LiveQuery protected-field guard bypass via array-like logical operator value | 2026-04-06T14:49:36.710Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34574 | Parse Server: Session field immutability bypass via falsy-value guard | 2026-04-06T14:49:34.810Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34573 | Parse Server: GraphQL complexity validator exponential fragment traversal DoS | 2026-04-06T14:49:33.069Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34532 | Parse Server: Cloud function validator bypass via prototype chain traversal | 2026-04-06T14:49:31.298Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34373 | Parse Server: GraphQL API endpoint ignores CORS origin restriction | 2026-04-06T14:49:29.676Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34363 | Parse Server: LiveQuery protected field leak via shared mutable state across concurrent subscribers | 2026-04-06T14:49:27.983Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34224 | Parse Server: MFA single-use token bypass via concurrent authData login requests | 2026-04-06T14:49:26.245Z | 2026-04-06T15:13:09.641Z |
| bit-parse-2026-34215 | Parse Server: Auth data exposed via verify password endpoint | 2026-04-06T14:49:24.609Z | 2026-04-06T15:13:09.641Z |
| bit-minio-2026-34204 | MinIO is Vulnerable to SSE Metadata Injection via Replication Headers | 2026-04-06T09:26:13.602Z | 2026-04-06T11:34:08.453Z |
| bit-prestashop-2026-33674 | PrestaShop: Improper Use of Validation Framework | 2026-03-30T11:49:50.984Z | 2026-04-06T08:26:41.107Z |
| bit-prestashop-2026-33673 | PrestaShop has multiple stored XSS vulnerabilities via unprotected Template variables | 2026-03-30T11:49:49.224Z | 2026-04-06T08:26:41.107Z |
| bit-node-2026-21712 | 2026-04-06T07:58:33.472Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21711 | 2026-04-06T07:58:30.648Z | 2026-04-06T08:26:41.107Z | |
| bit-mongodb-2026-5170 | Users could trigger a crash of mongod primaries during promotion to sharded | 2026-04-06T07:54:20.562Z | 2026-04-06T08:26:41.107Z |
| bit-mongodb-2026-4358 | Memory safety issues in slot-based execution hash table spill | 2026-04-06T07:54:17.803Z | 2026-04-06T08:26:41.107Z |
| bit-drupal-2025-31675 | Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2025-004 | 2025-06-03T14:41:48.563Z | 2026-04-06T08:26:41.107Z |
| bit-dotnet-2026-26131 | .NET Elevation of Privilege Vulnerability | 2026-04-06T07:48:26.731Z | 2026-04-06T08:26:41.107Z |
| bit-dotnet-2026-26127 | .NET Denial of Service Vulnerability | 2026-04-06T07:48:23.759Z | 2026-04-06T08:26:41.107Z |
| bit-cilium-2026-33726 | Cilium L7 proxy may bypass Kubernetes NetworkPolicy for same-node traffic | 2026-04-06T07:45:24.262Z | 2026-04-06T08:26:41.107Z |
| bit-mariadb-2026-32710 | Heap-based Buffer Overflow in MariaDB | 2026-03-25T08:46:04.911Z | 2026-04-01T09:11:42.692Z |
| bit-gitlab-2025-13611 | Insertion of Sensitive Information into Log File in GitLab | 2025-12-02T12:03:48.649Z | 2026-04-01T09:11:42.692Z |
| bit-appsmith-2026-34411 | Appsmith < 1.98 Unauthenticated Instance Configuration Disclosure via Management APIs | 2026-04-01T08:35:37.595Z | 2026-04-01T09:11:42.692Z |
| bit-discourse-2026-29072 | Discourse missing permission check for policy creation in discourse-policy | 2026-03-27T07:10:21.008Z | 2026-03-31T21:15:21.591Z |
| bit-discourse-2026-28282 | Discourse vulnerable to group membership addition permission bypass via discourse-policy plugin | 2026-03-27T07:10:17.839Z | 2026-03-31T21:15:21.591Z |
| bit-discourse-2026-27936 | Discourse discloses restricted post-action counts to non-privileged users | 2026-03-27T07:10:06.332Z | 2026-03-31T21:15:21.591Z |
| bit-discourse-2026-27935 | Discourse leaks private topic metadata to non-authorized users | 2026-03-27T07:10:03.445Z | 2026-03-31T21:15:21.591Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-hu01783 | Cancelling a query (e | 2026-01-30T15:02:52.911074Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ht23337 | flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm | 2026-01-30T17:15:56.746125Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hl71566 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:50:56.129322Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hj34439 | Go before 1 | 2026-01-30T16:39:55.415446Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hj04971 | vulnerability was found in PostgreSQL with the use of the MERGE command, which fails to test new rows against row security policies defined for UPDATE and SELECT | 2026-01-30T17:21:56.808972Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hh74302 | Cancelling a query (e | 2026-01-30T15:07:53.076603Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hg66170 | Cancelling a query (e | 2026-01-30T15:35:23.809128Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hf39630 | potential heap based buffer overflow was found in _bfd_elf_slurp_version_tables() in bfd/elf | 2026-01-30T17:20:56.632450Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gy69323 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T14:00:20.037168Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gv62494 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:41:53.003431Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gs30434 | Within HostnameError | 2026-01-30T14:35:22.588418Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gs02052 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:22:23.453780Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gq48460 | Cancelling a query (e | 2026-01-30T16:26:55.253385Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gn47077 | Within HostnameError | 2026-01-30T14:48:53.159123Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gl70025 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:08:25.191230Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gl18398 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:36:55.508939Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gj12884 | Within HostnameError | 2026-01-30T16:31:25.827659Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gc72145 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:23.061580Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gc16599 | Cancelling a query (e | 2026-01-30T15:46:54.243517Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fz95989 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:40:52.734894Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fw42039 | vulnerability was found in PostgreSQL with the use of the MERGE command, which fails to test new rows against row security policies defined for UPDATE and SELECT | 2026-01-30T17:19:56.954092Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fs64938 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:24:53.185811Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fr57243 | Cancelling a query (e | 2026-01-30T14:52:52.746706Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fr00621 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:36:52.496829Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fp29743 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:37:25.443687Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fn26367 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:10:23.074072Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fn12833 | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security) | 2026-01-30T16:25:25.422564Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fm00685 | Cancelling a query (e | 2026-01-30T15:07:53.091254Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fj56296 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:45:23.960354Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fd27182 | Cancelling a query (e | 2026-01-30T15:02:52.949683Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2001-ALE-011 | <TT>antivirus2001</TT> est un cheval de Troie | 2001-09-10T00:00:00.000000 | 2001-09-13T00:00:00.000000 |
| certa-2001-ale-010 | Propagation du ver "Code Blue" | 2001-09-07T00:00:00.000000 | 2001-09-07T00:00:00.000000 |
| CERTA-2001-ALE-010 | Propagation du ver "Code Blue" | 2001-09-07T00:00:00.000000 | 2001-09-07T00:00:00.000000 |
| certa-2001-ale-008 | Propagation du ver « Code Red » | 2001-07-18T00:00:00.000000 | 2001-08-13T00:00:00.000000 |
| CERTA-2001-ALE-008 | Propagation du ver « Code Red » | 2001-07-18T00:00:00.000000 | 2001-08-13T00:00:00.000000 |
| certa-2001-ale-009 | Propagation importante du virus SirCam | 2001-07-24T00:00:00.000000 | 2001-07-26T00:00:00.000000 |
| CERTA-2001-ALE-009 | Propagation importante du virus SirCam | 2001-07-24T00:00:00.000000 | 2001-07-26T00:00:00.000000 |
| certa-2001-ale-007 | Propagation d'un ver affectant sadmind et IIS | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| certa-2001-ale-006 | Prolifération en Europe du virus HOMEPAGE | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| CERTA-2001-ALE-007 | Propagation d'un ver affectant sadmind et IIS | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| CERTA-2001-ALE-006 | Prolifération en Europe du virus HOMEPAGE | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| certa-2001-ale-005 | Vulnérabilités dans les modems ADSL d'Alcatel | 2001-04-11T00:00:00.000000 | 2001-04-11T00:00:00.000000 |
| CERTA-2001-ALE-005 | Vulnérabilités dans les modems ADSL d'Alcatel | 2001-04-11T00:00:00.000000 | 2001-04-11T00:00:00.000000 |
| certa-2001-ale-004 | Vulnérabilité dans le démon snmpXdmid sous Sun Solaris | 2001-03-30T00:00:00.000000 | 2001-03-30T00:00:00.000000 |
| CERTA-2001-ALE-004 | Vulnérabilité dans le démon snmpXdmid sous Sun Solaris | 2001-03-30T00:00:00.000000 | 2001-03-30T00:00:00.000000 |
| certa-2001-ale-003 | Prolifération du ver Li0n | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| certa-2001-ale-002 | Risque d'exploitation des ressources partagées sous Windows | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| CERTA-2001-ALE-003 | Prolifération du ver Li0n | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| CERTA-2001-ALE-002 | Risque d'exploitation des ressources partagées sous Windows | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| certa-2001-ale-001 | Propagation du ver Ramen sous Linux. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| CERTA-2001-ALE-001 | Propagation du ver Ramen sous Linux. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| certa-2000-ale-016 | Connexion à Wanadoo | 2000-11-30T00:00:00.000000 | 2000-11-30T00:00:00.000000 |
| CERTA-2000-ALE-016 | Connexion à Wanadoo | 2000-11-30T00:00:00.000000 | 2000-11-30T00:00:00.000000 |
| certa-2000-ale-015 | Risque d'usurpation de l'identité de Sun Microsystems | 2000-10-25T00:00:00.000000 | 2000-10-25T00:00:00.000000 |
| CERTA-2000-ALE-015 | Risque d'usurpation de l'identité de Sun Microsystems | 2000-10-25T00:00:00.000000 | 2000-10-25T00:00:00.000000 |
| certa-2000-ale-013 | Virus VBS Quatro-A | 2000-09-18T00:00:00.000000 | 2000-09-18T00:00:00.000000 |
| CERTA-2000-ALE-013 | Virus VBS Quatro-A | 2000-09-18T00:00:00.000000 | 2000-09-18T00:00:00.000000 |
| certa-2000-ale-014 | Vulnérabilité dans la bibliothèque glibc sous Unix | 2000-09-14T00:00:00.000000 | 2000-09-14T00:00:00.000000 |
| CERTA-2000-ALE-014 | Vulnérabilité dans la bibliothèque glibc sous Unix | 2000-09-14T00:00:00.000000 | 2000-09-14T00:00:00.000000 |
| certa-2000-ale-012 | Mauvaise compatibilité des scanners de virus avec NTFS | 2000-09-08T00:00:00.000000 | 2000-09-08T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0006 | Multiples vulnérabilités dans Veeam Backup & Replication | 2026-01-06T00:00:00.000000 | 2026-01-06T00:00:00.000000 |
| certfr-2026-avi-0005 | Multiples vulnérabilités dans Centreon Open Tickets | 2026-01-06T00:00:00.000000 | 2026-01-06T00:00:00.000000 |
| certfr-2025-avi-1097 | Vulnérabilité dans les produits Mitel | 2025-12-11T00:00:00.000000 | 2026-01-06T00:00:00.000000 |
| CERTFR-2026-AVI-0007 | Vulnérabilité dans Stormshield Network Security | 2026-01-06T00:00:00.000000 | 2026-01-06T00:00:00.000000 |
| CERTFR-2026-AVI-0006 | Multiples vulnérabilités dans Veeam Backup & Replication | 2026-01-06T00:00:00.000000 | 2026-01-06T00:00:00.000000 |
| CERTFR-2026-AVI-0005 | Multiples vulnérabilités dans Centreon Open Tickets | 2026-01-06T00:00:00.000000 | 2026-01-06T00:00:00.000000 |
| CERTFR-2025-AVI-1097 | Vulnérabilité dans les produits Mitel | 2025-12-11T00:00:00.000000 | 2026-01-06T00:00:00.000000 |
| certfr-2026-avi-0004 | Vulnérabilité dans MariaDB | 2026-01-05T00:00:00.000000 | 2026-01-05T00:00:00.000000 |
| certfr-2026-avi-0003 | Multiples vulnérabilités dans les produits Qnap | 2026-01-05T00:00:00.000000 | 2026-01-05T00:00:00.000000 |
| certfr-2025-avi-1111 | Multiples vulnérabilités dans Roundcube | 2025-12-15T00:00:00.000000 | 2026-01-05T00:00:00.000000 |
| CERTFR-2026-AVI-0004 | Vulnérabilité dans MariaDB | 2026-01-05T00:00:00.000000 | 2026-01-05T00:00:00.000000 |
| CERTFR-2026-AVI-0003 | Multiples vulnérabilités dans les produits Qnap | 2026-01-05T00:00:00.000000 | 2026-01-05T00:00:00.000000 |
| CERTFR-2025-AVI-1111 | Multiples vulnérabilités dans Roundcube | 2025-12-15T00:00:00.000000 | 2026-01-05T00:00:00.000000 |
| certfr-2026-avi-0002 | Multiples vulnérabilités dans les produits IBM | 2026-01-02T00:00:00.000000 | 2026-01-02T00:00:00.000000 |
| certfr-2026-avi-0001 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-02T00:00:00.000000 | 2026-01-02T00:00:00.000000 |
| CERTFR-2026-AVI-0002 | Multiples vulnérabilités dans les produits IBM | 2026-01-02T00:00:00.000000 | 2026-01-02T00:00:00.000000 |
| CERTFR-2026-AVI-0001 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-02T00:00:00.000000 | 2026-01-02T00:00:00.000000 |
| certfr-2025-avi-1142 | Multiples vulnérabilités dans Moxa NPort | 2025-12-31T00:00:00.000000 | 2025-12-31T00:00:00.000000 |
| CERTFR-2025-AVI-1142 | Multiples vulnérabilités dans Moxa NPort | 2025-12-31T00:00:00.000000 | 2025-12-31T00:00:00.000000 |
| certfr-2025-avi-1141 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1140 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1139 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1138 | Multiples vulnérabilités dans VMware Tanzu Platform | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1137 | Multiples vulnérabilités dans les produits IBM | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1141 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1140 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1139 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1138 | Multiples vulnérabilités dans VMware Tanzu Platform | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| CERTFR-2025-AVI-1137 | Multiples vulnérabilités dans les produits IBM | 2025-12-26T00:00:00.000000 | 2025-12-26T00:00:00.000000 |
| certfr-2025-avi-1076 | Multiples vulnérabilités dans MISP | 2025-12-08T00:00:00.000000 | 2025-12-24T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-002002 | Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) | 2023-06-01T13:48+09:00 | 2024-03-19T18:13+09:00 |
| jvndb-2023-000072 | Improper restriction of XML external entity references (XXE) in XBRL data create application | 2023-07-18T15:22+09:00 | 2024-03-19T18:11+09:00 |
| jvndb-2023-000056 | Starlette vulnerable to directory traversal | 2023-05-30T13:34+09:00 | 2024-03-19T18:08+09:00 |
| jvndb-2023-000125 | Multiple vulnerabilities in BUFFALO VR-S1000 | 2023-12-26T15:51+09:00 | 2024-03-19T17:56+09:00 |
| jvndb-2023-000123 | Multiple vulnerabilities in GROWI | 2023-12-13T15:30+09:00 | 2024-03-19T17:46+09:00 |
| jvndb-2023-000052 | DataSpider Servista uses a hard-coded cryptographic key | 2023-05-31T15:34+09:00 | 2024-03-19T17:44+09:00 |
| jvndb-2024-000032 | Multiple vulnerabilities in FitNesse | 2024-03-18T14:08+09:00 | 2024-03-19T11:02+09:00 |
| jvndb-2023-014781 | Brother iPrint&Scan Desktop for Windows vulnerable to improper link resolution before file access | 2023-12-26T09:27+09:00 | 2024-03-18T18:05+09:00 |
| jvndb-2023-000126 | Multiple vulnerabilities in PowerCMS | 2023-12-26T16:46+09:00 | 2024-03-18T17:58+09:00 |
| jvndb-2024-000031 | "ABEMA" App for Android fails to restrict access permissions | 2024-03-15T16:37+09:00 | 2024-03-15T16:37+09:00 |
| jvndb-2024-000013 | Android App "Spoon" uses a hard-coded API key for an external service | 2024-01-23T16:53+09:00 | 2024-03-14T17:44+09:00 |
| jvndb-2024-000010 | Improper restriction of XML external entity references (XXE) in "Electronic Delivery Check System (Ministry of Agriculture, Forestry and Fisheries The Agriculture and Rural Development Project Version)" | 2024-01-23T15:25+09:00 | 2024-03-14T17:33+09:00 |
| jvndb-2024-001002 | Multiple TP-Link products vulnerable to OS command injection | 2024-01-10T13:57+09:00 | 2024-03-14T13:52+09:00 |
| jvndb-2024-000001 | Improper input validation vulnerability in WordPress Plugin "WordPress Quiz Maker Plugin" | 2024-01-12T13:51+09:00 | 2024-03-14T12:28+09:00 |
| jvndb-2023-003757 | Trend Micro Mobile Security vulnerable to cross-site scripting | 2023-09-26T11:30+09:00 | 2024-03-13T18:07+09:00 |
| jvndb-2023-002796 | Multiple server-side request forgery vulnerabilities in Trend Micro Apex Central (July 2023) | 2023-08-10T16:04+09:00 | 2024-03-13T17:58+09:00 |
| jvndb-2024-000011 | Multiple vulnerabilities in a-blog cms | 2024-01-22T15:08+09:00 | 2024-03-13T17:50+09:00 |
| jvndb-2024-000009 | Improper restriction of XML external entity references (XXE) in Electronic Deliverables Creation Support Tool provided by Ministry of Defense | 2024-01-23T15:13+09:00 | 2024-03-13T17:46+09:00 |
| jvndb-2024-000008 | Improper restriction of XML external entity references (XXE) in MLIT "Electronic Delivery Check System" and "Electronic delivery item Inspection Support System" | 2024-01-23T16:57+09:00 | 2024-03-13T17:40+09:00 |
| jvndb-2024-000012 | Access analysis CGI An-Analyzer vulnerable to open redirect | 2024-01-22T15:57+09:00 | 2024-03-13T17:34+09:00 |
| jvndb-2023-006199 | Multiple security updates for Trend Micro Apex One and Apex One as a Service (November 2023) | 2023-11-13T17:28+09:00 | 2024-03-13T17:28+09:00 |
| jvndb-2024-001062 | Yamaha wireless LAN access point devices vulnerable to active debug code | 2024-01-24T17:16+09:00 | 2024-03-13T17:24+09:00 |
| jvndb-2024-002961 | Information Exposure Vulnerability in Cosminexus Component Container | 2024-03-13T12:10+09:00 | 2024-03-13T12:10+09:00 |
| jvndb-2024-000004 | Drupal vulnerable to improper handling of structural elements | 2024-01-16T13:41+09:00 | 2024-03-12T17:33+09:00 |
| jvndb-2024-000006 | FusionPBX vulnerable to cross-site scripting | 2024-01-19T12:30+09:00 | 2024-03-12T17:31+09:00 |
| jvndb-2024-000002 | Thermal camera TMC series vulnerable to insufficient technical documentation | 2024-01-15T15:19+09:00 | 2024-03-11T18:17+09:00 |
| jvndb-2024-000016 | Group Office vulnerable to cross-site scripting | 2024-02-01T13:48+09:00 | 2024-03-11T18:04+09:00 |
| jvndb-2024-001785 | Incorrect permission assignment vulnerability in Trend Micro uiAirSupport | 2024-02-06T14:46+09:00 | 2024-03-11T17:42+09:00 |
| jvndb-2024-000015 | Payment EX vulnerable to information disclosure | 2024-02-01T13:41+09:00 | 2024-03-11T17:42+09:00 |
| jvndb-2024-001160 | File and Directory Permissions Vulnerability in Hitachi Storage Plug-in for VMware vCenter | 2024-01-31T15:25+09:00 | 2024-03-11T17:41+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14675 | IBM Db2拒绝服务漏洞(CNVD-2026-14675) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14674 | IBM Db2拒绝服务漏洞(CNVD-2026-14674) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14673 | IBM Db2拒绝服务漏洞(CNVD-2026-14673) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14672 | IBM Db2拒绝服务漏洞(CNVD-2026-14672) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14671 | IBM Db2拒绝服务漏洞(CNVD-2026-14671) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14670 | IBM Db2拒绝服务漏洞(CNVD-2026-14670) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14669 | IBM Db2拒绝服务漏洞(CNVD-2026-14669) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14668 | IBM Db2拒绝服务漏洞(CNVD-2026-14668) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14667 | IBM Db2拒绝服务漏洞(CNVD-2026-14667) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14666 | IBM Db2拒绝服务漏洞(CNVD-2026-14666) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14665 | IBM Db2 Big SQL on Cloud Pak for Data资源管理错误漏洞 | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14664 | Rockwell Automation PanelView Plus 7 Performance Series B身份验证绕过漏洞 | 2025-10-17 | 2026-03-24 |
| cnvd-2026-14663 | Rockwell Automation FactoryTalk ViewPoint拒绝服务漏洞 | 2025-10-17 | 2026-03-24 |
| cnvd-2026-14662 | Rockwell Automation Compact GuardLogix 5370拒绝服务漏洞 | 2025-10-17 | 2026-03-24 |
| cnvd-2026-14661 | Rockwell Automation Verve Asset Manager存在未明漏洞 | 2025-11-14 | 2026-03-24 |
| cnvd-2026-14660 | Rockwell Automation Studio 5000 Simulation Interface服务端请求伪造漏洞 | 2025-11-14 | 2026-03-24 |
| cnvd-2026-14659 | Rockwell Automation Studio 5000 Simulation Interface代码执行漏洞 | 2025-11-14 | 2026-03-24 |
| cnvd-2026-14658 | Rockwell Automation FactoryTalk DataMosaix Private Cloud跨站脚本漏洞 | 2025-11-14 | 2026-03-24 |
| cnvd-2026-14657 | Rockwell Automation DataMosaix Private Cloud存在未明漏洞 | 2025-11-14 | 2026-03-24 |
| cnvd-2026-14656 | Rockwell Automation Arena堆栈缓冲区溢出漏洞 | 2025-11-18 | 2026-03-24 |
| cnvd-2026-14655 | Rockwell Automation FactoryTalk DataMosaix Private Cloud SQL注入漏洞 | 2025-12-15 | 2026-03-24 |
| cnvd-2026-14654 | Rockwell Automation 432ES-IG3 Series A拒绝服务漏洞 | 2025-12-15 | 2026-03-24 |
| cnvd-2026-14653 | Rockwell Automation Studio 5000 Logix Designer代码问题漏洞 | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14652 | Google Android存在未明漏洞(CNVD-2026-14652 | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14651 | Google Android存在未明漏洞(CNVD-2026-14651) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14650 | Google Android权限提升漏洞(CNVD-2026-14650) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14649 | Google Android权限提升漏洞(CNVD-2026-14649) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14648 | Google Android存在未明漏洞(CNVD-2026-14648) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14647 | Google Android拒绝服务漏洞(CNVD-2026-14647) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14646 | Google Android存在未明漏洞(CNVD-2026-14646) | 2026-03-09 | 2026-03-24 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-09920 | Уязвимость пакета программ сетевого взаимодействия Samba, связанная с недостатками процед… | 18.08.2025 | 16.02.2026 |
| bdu:2025-09918 | Уязвимость функции skb_send_sock() компонента BPF ядра операционной системы Linux, позвол… | 18.08.2025 | 16.02.2026 |
| bdu:2025-09917 | Уязвимость функции ftrace_mod_get_kallsym() компонента ftrace ядра операционной системы L… | 18.08.2025 | 16.02.2026 |
| bdu:2025-09837 | Уязвимость функции spi_imx_transfer_one операционной системы Linux, позволяющая нарушител… | 15.08.2025 | 16.02.2026 |
| bdu:2025-09835 | Уязвимость компонента crypto ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.08.2025 | 16.02.2026 |
| bdu:2025-09834 | Уязвимость функции mii_nway_restart() ядра операционной системы Linux, позволяющая наруши… | 15.08.2025 | 16.02.2026 |
| bdu:2025-09826 | Уязвимость модуля arch/powerpc/platforms/powernv/memtrace.c ядра операционной системы Lin… | 15.08.2025 | 16.02.2026 |
| bdu:2025-09824 | Уязвимость функции aspeed_lpc_enable_snoop() ядра операционной системы Linux, позволяющая… | 15.08.2025 | 16.02.2026 |
| bdu:2025-09823 | Уязвимость модулей drivers/net/ethernet/stmicro/stmmac/stmmac_main.c и drivers/net/ethern… | 15.08.2025 | 16.02.2026 |
| bdu:2025-09819 | Уязвимость модуля kernel/events/core.c ядра операционной системы Linux, позволяющая наруш… | 14.08.2025 | 16.02.2026 |
| bdu:2025-09818 | Уязвимость функции atomic_add_return() ядра операционной системы Linux, позволяющая наруш… | 14.08.2025 | 16.02.2026 |
| bdu:2025-09817 | Уязвимость функции tipc_conn_close() ядра операционной системы Linux, позволяющая нарушит… | 14.08.2025 | 16.02.2026 |
| bdu:2025-09815 | Уязвимость функции vsock_use_local_transport() ядра операционной системы Linux, позволяющ… | 14.08.2025 | 16.02.2026 |
| bdu:2025-09814 | Уязвимость функции to_atmarpd() ядра операционной системы Linux, позволяющая нарушителю в… | 14.08.2025 | 16.02.2026 |
| bdu:2025-09813 | Уязвимость функции clip_push() ядра операционной системы Linux, позволяющая нарушителю вы… | 14.08.2025 | 16.02.2026 |
| bdu:2025-09812 | Уязвимость функции ipmi_create_user() ядра операционной системы Linux, позволяющая наруши… | 14.08.2025 | 16.02.2026 |
| bdu:2025-09720 | Уязвимость функции do_exit() компонента perf ядра операционной системы Linux, позволяющая… | 13.08.2025 | 16.02.2026 |
| bdu:2025-09687 | Уязвимость модуля tarfile интерпретатора языка программирования Python (CPython), позволя… | 13.08.2025 | 16.02.2026 |
| bdu:2025-09683 | Уязвимость функции bpf_prog_select_runtime() файла kernel/bpf/core.c ядра операционной си… | 13.08.2025 | 16.02.2026 |
| bdu:2025-09675 | Уязвимость функции kernfs_should_drain_open_files() компонента kernfs ядра операционной с… | 13.08.2025 | 16.02.2026 |
| bdu:2025-09674 | Уязвимость функций calipso_req_setattr() и calipso_req_delattr() компонента calipso ядра … | 13.08.2025 | 16.02.2026 |
| bdu:2025-09673 | Уязвимость файлового архиватора 7-Zip, связанная с неверным определением символических сс… | 13.08.2025 | 16.02.2026 |
| bdu:2025-09670 | Уязвимость функции unix_stream_read_generic() модуля net/unix/af_unix.c ядра операционных… | 13.08.2025 | 16.02.2026 |
| bdu:2025-09665 | Уязвимость функции lan743x_ptp_io_event_clock_get() компонента net ядра операционной сист… | 13.08.2025 | 16.02.2026 |
| bdu:2025-09660 | Уязвимость виртуального сетевого интерфейса TUN ядра операционной системы Linux, позволяю… | 13.08.2025 | 16.02.2026 |
| bdu:2025-09657 | Уязвимость функции p54_rx_eeprom_readback() компонента wifi ядра операционной системы Lin… | 13.08.2025 | 16.02.2026 |
| bdu:2025-09641 | Уязвимость модуля drivers/net/phy/mscc/mscc_ptp.c ядра операционной системы Linux, позвол… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09640 | Уязвимость функции txopt_get() ядра операционной системы Linux, позволяющая нарушителю вы… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09638 | Уязвимость функции wled_configure() ядра операционной системы Linux, позволяющая нарушите… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09636 | Уязвимость функции read_string() компонента hwmon ядра операционной системы Linux, позвол… | 11.08.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200706-0666 | Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apac… | 2024-07-23T20:50:38.808000Z |
| var-200803-0169 | The Cisco PIX/ASA Finesse Operation System 7.1 and 7.2 allows local users to gain privile… | 2024-07-23T20:50:33.392000Z |
| var-200110-0176 | Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox … | 2024-07-23T20:50:33.705000Z |
| var-201605-0075 | Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL befor… | 2024-07-23T20:50:28.659000Z |
| var-201008-1004 | The loginDefaultEncrypt algorithm in loginLib in Wind River VxWorks before 6.9 does not p… | 2024-07-23T20:50:25.420000Z |
| var-200505-1436 | zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users… | 2024-07-23T20:50:25.579000Z |
| var-202012-1546 | A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. d… | 2024-07-23T20:50:20.423000Z |
| var-200609-0782 | Multiple buffer overflows in the Apple Type Services (ATS) server in Mac OS X 10.4 throug… | 2024-07-23T20:49:47.183000Z |
| var-201503-0052 | Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in O… | 2024-07-23T20:49:46.592000Z |
| var-200905-0155 | Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denia… | 2024-07-23T20:49:45.261000Z |
| var-200707-0577 | Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used i… | 2024-07-23T20:49:41.081000Z |
| var-202103-1554 | Netty is an open-source, asynchronous event-driven network application framework for rapi… | 2024-07-23T20:49:40.283000Z |
| var-201504-0361 | The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x befor… | 2024-07-23T20:49:39.732000Z |
| var-200102-0027 | CBOS 2.4.1 and earlier in Cisco 600 routers allows remote attackers to cause a denial of … | 2024-07-23T20:49:36.601000Z |
| var-202011-0444 | Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker… | 2024-07-23T20:49:35.185000Z |
| var-201912-1849 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:49:34.258000Z |
| var-202005-0223 | SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shado… | 2024-07-23T20:49:32.020000Z |
| var-200811-0015 | Apple Safari before 3.2 does not properly prevent caching of form data for form fields th… | 2024-07-23T20:49:28.186000Z |
| var-202105-1306 | The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-… | 2024-07-23T20:49:26.394000Z |
| var-200505-0163 | Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when h… | 2024-07-23T20:48:54.841000Z |
| var-201211-0368 | Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS … | 2024-07-23T20:48:23.186000Z |
| var-201108-0149 | Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and … | 2024-07-23T20:47:46.652000Z |
| var-200505-0311 | Stack-based buffer overflow in the VPN daemon (vpnd) for Mac OS X before 10.3.9 allows lo… | 2024-07-23T20:47:42.176000Z |
| var-200504-0292 | Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote … | 2024-07-23T20:47:38.700000Z |
| var-201006-0051 | Cross-site request forgery (CSRF) vulnerability in the web interface in CUPS before 1.4.4… | 2024-07-23T20:46:54.348000Z |
| var-202201-0355 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. vim/vim Exists in a… | 2024-07-23T20:45:27.502000Z |
| var-201804-1210 | An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS b… | 2024-07-23T20:45:24.222000Z |
| var-200701-0400 | crashdump in Apple Mac OS X 10.4.8 allows local users in the admin group to modify arbitr… | 2024-07-23T20:45:22.440000Z |
| var-200701-0398 | Format string vulnerability in Apple Installer 2.1.5 on Mac OS X 10.4.8 allows user-assis… | 2024-07-23T20:45:19.199000Z |
| var-202005-1052 | When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.… | 2024-07-23T20:45:17.285000Z |