Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-8086 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
OSGeo gdal SWapi.c SWnentries heap-based overflow |
OSGeo |
gdal |
2026-05-07T18:45:13.165Z | 2026-05-07T19:53:07.538Z |
| CVE-2025-14593 |
7.8 (3.1)
|
CATPART File Parsing Out-of-Bounds Read Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:31:35.368Z | 2026-05-07T19:41:57.554Z |
| CVE-2025-10900 |
7.8 (3.1)
|
MODEL File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:45:26.861Z | 2026-05-07T19:40:50.876Z |
| CVE-2025-10899 |
7.8 (3.1)
|
MODEL File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:45:00.819Z | 2026-05-07T19:40:25.329Z |
| CVE-2025-10898 |
7.8 (3.1)
|
MODEL File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:44:26.564Z | 2026-05-07T19:39:53.637Z |
| CVE-2026-42239 |
8.1 (3.1)
|
Budibase auth session cookies are set with httpOnly:fa… |
Budibase |
budibase |
2026-05-07T18:49:59.180Z | 2026-05-07T19:39:45.605Z |
| CVE-2025-10889 |
7.8 (3.1)
|
CATPART File Parsing Memory Corruption Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:43:57.696Z | 2026-05-07T19:39:29.209Z |
| CVE-2025-10888 |
7.8 (3.1)
|
MODEL File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:43:22.374Z | 2026-05-07T19:39:03.711Z |
| CVE-2025-10887 |
7.8 (3.1)
|
MODEL File Parsing Memory Corruption Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:42:44.395Z | 2026-05-07T19:38:36.933Z |
| CVE-2025-10886 |
7.8 (3.1)
|
MODEL File Parsing Memory Corruption Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:42:09.029Z | 2026-05-07T19:38:13.076Z |
| CVE-2025-10884 |
7.8 (3.1)
|
CATPART File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:41:34.185Z | 2026-05-07T19:37:32.087Z |
| CVE-2025-10883 |
7.8 (3.1)
|
CATPRODUCT File Parsing Out-of-Bounds Read Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:40:59.980Z | 2026-05-07T19:37:01.345Z |
| CVE-2025-10882 |
7.8 (3.1)
|
X_T File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:40:24.134Z | 2026-05-07T19:36:13.740Z |
| CVE-2025-10881 |
7.8 (3.1)
|
CATPRODUCT File Parsing Heap-Based Overflow Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:39:49.830Z | 2026-05-07T19:28:35.838Z |
| CVE-2026-41904 |
7.6 (3.1)
|
FreeScout Stored XSS vulnerability in mailbox auto-rep… |
freescout-help-desk |
freescout |
2026-05-07T18:05:43.541Z | 2026-05-07T19:16:53.481Z |
| CVE-2026-8083 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SourceCodester Pharmacy Sales and Inventory System aja… |
SourceCodester |
Pharmacy Sales and Inventory System |
2026-05-07T18:15:09.651Z | 2026-05-07T19:14:18.598Z |
| CVE-2026-44243 |
7.8 (4.0)
|
GitPython: Path traversal in GitPython reference APIs … |
gitpython-developers |
GitPython |
2026-05-07T18:22:53.622Z | 2026-05-07T19:12:49.856Z |
| CVE-2026-41653 |
7 (4.0)
|
BentoPDF: Stored XSS via Markdown Editor Leading to Pe… |
alam00000 |
bentopdf |
2026-05-07T18:43:17.797Z | 2026-05-07T19:01:30.967Z |
| CVE-2025-65857 |
7.5 (3.1)
|
An issue was discovered in Xiongmai XM530 IP came… |
n/a |
n/a |
2025-12-22T00:00:00.000Z | 2026-05-07T18:46:36.829Z |
| CVE-2026-42469 |
8.6 (3.1)
|
Buffer overflow vulnerability in Open Vehicle Mon… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-07T18:42:33.535Z |
| CVE-2026-37541 |
10 (3.1)
|
Buffer overflow vulnerability in Open Vehicle Mon… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-07T18:39:48.746Z |
| CVE-2026-42468 |
8.8 (3.1)
|
Buffer overflow vulnerability in Open Vehicle Mon… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-07T18:35:07.930Z |
| CVE-2026-37554 |
7.5 (3.1)
|
An issue was discovered in Vanetza V2X v26.02 all… |
n/a |
n/a |
2026-05-01T00:00:00.000Z | 2026-05-07T18:30:29.223Z |
| CVE-2026-8081 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
router-for-me CLIProxyAPI api_tools.go server-side req… |
router-for-me |
CLIProxyAPI |
2026-05-07T18:00:14.133Z | 2026-05-07T18:08:42.136Z |
| CVE-2026-37709 |
9.8 (3.1)
|
Insecure Permissions vulnerability in grokability… |
n/a |
n/a |
2026-05-07T00:00:00.000Z | 2026-05-07T17:39:49.914Z |
| CVE-2026-41254 |
4 (3.1)
|
Little CMS (lcms2) through 2.18 has an integer ov… |
littlecms |
little cms color engine |
2026-04-18T06:43:13.741Z | 2026-05-07T17:33:56.924Z |
| CVE-2026-43577 |
7.1 (4.0)
6.5 (3.1)
|
OpenClaw < 2026.4.9 - Arbitrary File Read via Browser … |
OpenClaw |
OpenClaw |
2026-05-06T19:49:21.091Z | 2026-05-07T17:32:03.185Z |
| CVE-2026-43583 |
6 (4.0)
5.3 (3.1)
|
OpenClaw 2026.4.10 < 2026.4.14 - Loss of Group Tool-Po… |
OpenClaw |
OpenClaw |
2026-05-06T19:49:25.474Z | 2026-05-07T17:30:28.366Z |
| CVE-2026-44112 |
6 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.4.22 - Symlink Swap Race Condition in … |
OpenClaw |
OpenClaw |
2026-05-06T19:49:29.626Z | 2026-05-07T17:28:12.165Z |
| CVE-2026-44118 |
8.5 (4.0)
7.8 (3.1)
|
OpenClaw < 2026.4.22 - Owner Context Spoofing via Bear… |
OpenClaw |
OpenClaw |
2026-05-06T19:49:37.173Z | 2026-05-07T17:22:50.507Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43186 |
9.8 (3.1)
|
ipv6: ioam: fix heap buffer overflow in __ioam6_fill_t… |
Linux |
Linux |
2026-05-06T11:27:57.053Z | 2026-05-08T12:41:04.575Z |
| CVE-2026-43185 |
9.8 (3.1)
|
ksmbd: fix signededness bug in smb_direct_prepare_nego… |
Linux |
Linux |
2026-05-06T11:27:56.386Z | 2026-05-08T12:41:03.371Z |
| CVE-2026-43184 |
7.5 (3.1)
|
rnbd-srv: Zero the rsp buffer before using it |
Linux |
Linux |
2026-05-06T11:27:55.672Z | 2026-05-08T12:41:02.015Z |
| CVE-2026-43180 |
7.8 (3.1)
|
net: usb: kaweth: remove TX queue manipulation in kawe… |
Linux |
Linux |
2026-05-06T11:27:52.983Z | 2026-05-08T12:41:00.768Z |
| CVE-2026-43178 |
7.8 (3.1)
|
procfs: fix possible double mmput() in do_procmap_query() |
Linux |
Linux |
2026-05-06T11:27:51.524Z | 2026-05-08T12:40:59.592Z |
| CVE-2026-43176 |
8.8 (3.1)
|
wifi: rtw89: pci: validate release report content befo… |
Linux |
Linux |
2026-05-06T11:27:50.150Z | 2026-05-08T12:40:58.471Z |
| CVE-2026-43172 |
8.8 (3.1)
|
wifi: iwlwifi: fix 22000 series SMEM parsing |
Linux |
Linux |
2026-05-06T11:27:47.358Z | 2026-05-08T12:40:57.330Z |
| CVE-2026-43166 |
7.1 (3.1)
|
erofs: fix interlaced plain identification for encoded… |
Linux |
Linux |
2026-05-06T11:27:43.242Z | 2026-05-08T12:40:56.151Z |
| CVE-2026-43164 |
7.5 (3.1)
|
udplite: Fix null-ptr-deref in __udp_enqueue_schedule_skb(). |
Linux |
Linux |
2026-05-06T11:27:41.928Z | 2026-05-08T12:40:55.002Z |
| CVE-2026-43158 |
8.8 (3.1)
|
xfs: fix freemap adjustments when adding xattrs to lea… |
Linux |
Linux |
2026-05-06T11:27:37.848Z | 2026-05-08T12:40:53.855Z |
| CVE-2026-43153 |
7.8 (3.1)
|
xfs: remove xfs_attr_leaf_hasname |
Linux |
Linux |
2026-05-06T11:27:34.446Z | 2026-05-08T12:40:52.696Z |
| CVE-2026-43150 |
7.8 (3.1)
|
perf/arm-cmn: Reject unsupported hardware configurations |
Linux |
Linux |
2026-05-06T11:27:32.359Z | 2026-05-08T12:40:51.562Z |
| CVE-2026-43139 |
8.6 (3.1)
|
xfrm6: fix uninitialized saddr in xfrm6_get_saddr() |
Linux |
Linux |
2026-05-06T11:27:24.898Z | 2026-05-08T12:40:50.383Z |
| CVE-2026-43134 |
8.1 (3.1)
|
Bluetooth: L2CAP: Fix missing key size check for L2CAP… |
Linux |
Linux |
2026-05-06T11:27:21.541Z | 2026-05-08T12:40:49.204Z |
| CVE-2026-43120 |
7.8 (3.1)
|
RDMA/irdma: Fix double free related to rereg_user_mr |
Linux |
Linux |
2026-05-06T07:40:43.923Z | 2026-05-08T12:40:43.130Z |
| CVE-2026-43106 |
7.8 (3.1)
|
cachefiles: fix incorrect dentry refcount in cachefile… |
Linux |
Linux |
2026-05-06T07:40:34.365Z | 2026-05-08T12:40:33.663Z |
| CVE-2026-43101 |
7.5 (3.1)
|
ipv6: ioam: fix potential NULL dereferences in __ioam6… |
Linux |
Linux |
2026-05-06T07:40:30.969Z | 2026-05-08T12:40:32.536Z |
| CVE-2026-43099 |
7.5 (3.1)
|
ipv4: icmp: fix null-ptr-deref in icmp_build_probe() |
Linux |
Linux |
2026-05-06T07:40:29.567Z | 2026-05-08T12:40:31.371Z |
| CVE-2026-43093 |
7.8 (3.1)
|
xsk: tighten UMEM headroom validation to account for t… |
Linux |
Linux |
2026-05-06T07:40:25.266Z | 2026-05-08T12:40:30.221Z |
| CVE-2026-43091 |
7.8 (3.1)
|
xfrm: Wait for RCU readers during policy netns exit |
Linux |
Linux |
2026-05-06T07:40:23.955Z | 2026-05-08T12:40:29.086Z |
| CVE-2026-43084 |
7.8 (3.1)
|
netfilter: nfnetlink_queue: make hash table per queue |
Linux |
Linux |
2026-05-06T07:40:19.253Z | 2026-05-08T12:40:27.947Z |
| CVE-2026-43083 |
9.1 (3.1)
|
net: ioam6: fix OOB and missing lock |
Linux |
Linux |
2026-05-06T07:40:18.504Z | 2026-05-08T12:40:26.791Z |
| CVE-2026-43078 |
7.8 (3.1)
|
crypto: af_alg - Fix page reassignment overflow in af_… |
Linux |
Linux |
2026-05-06T07:40:15.092Z | 2026-05-08T12:40:25.638Z |
| CVE-2026-43076 |
7.8 (3.1)
|
ocfs2: validate inline data i_size during inode read |
Linux |
Linux |
2026-05-06T07:40:13.634Z | 2026-05-08T12:40:24.482Z |
| CVE-2026-43075 |
7.8 (3.1)
|
ocfs2: fix out-of-bounds write in ocfs2_write_end_inline |
Linux |
Linux |
2026-05-06T07:40:03.337Z | 2026-05-08T12:40:23.336Z |
| CVE-2026-43074 |
7.8 (3.1)
|
eventpoll: defer struct eventpoll free to RCU grace period |
Linux |
Linux |
2026-05-06T07:21:58.210Z | 2026-05-08T12:40:22.201Z |
| CVE-2026-43071 |
9.1 (3.1)
|
dcache: Limit the minimal number of bucket to two |
Linux |
Linux |
2026-05-05T15:29:28.081Z | 2026-05-08T12:40:21.054Z |
| CVE-2026-43070 |
7.8 (3.1)
|
bpf: Reset register ID for BPF_END value tracking |
Linux |
Linux |
2026-05-05T15:23:28.819Z | 2026-05-08T12:40:19.810Z |
| CVE-2026-43067 |
9.8 (3.1)
|
ext4: handle wraparound when searching for blocks for … |
Linux |
Linux |
2026-05-05T15:23:26.717Z | 2026-05-08T12:40:18.665Z |
| CVE-2026-43063 |
7.8 (3.1)
|
xfs: don't irele after failing to iget in xfs_attri_re… |
Linux |
Linux |
2026-05-05T15:23:24.034Z | 2026-05-08T12:40:17.506Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-43185 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix signededness bug in… | 2026-05-06T12:16:37.187 | 2026-05-08T13:16:42.423 |
| fkie_cve-2026-43184 | In the Linux kernel, the following vulnerability has been resolved: rnbd-srv: Zero the rsp buffer … | 2026-05-06T12:16:37.053 | 2026-05-08T13:16:42.257 |
| fkie_cve-2026-43180 | In the Linux kernel, the following vulnerability has been resolved: net: usb: kaweth: remove TX qu… | 2026-05-06T12:16:36.533 | 2026-05-08T13:16:42.107 |
| fkie_cve-2026-43178 | In the Linux kernel, the following vulnerability has been resolved: procfs: fix possible double mm… | 2026-05-06T12:16:36.303 | 2026-05-08T13:16:42.000 |
| fkie_cve-2026-43176 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: pci: validate rel… | 2026-05-06T12:16:36.083 | 2026-05-08T13:16:41.887 |
| fkie_cve-2026-43172 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix 22000 serie… | 2026-05-06T12:16:35.583 | 2026-05-08T13:16:41.783 |
| fkie_cve-2026-43166 | In the Linux kernel, the following vulnerability has been resolved: erofs: fix interlaced plain id… | 2026-05-06T12:16:34.800 | 2026-05-08T13:16:41.670 |
| fkie_cve-2026-43164 | In the Linux kernel, the following vulnerability has been resolved: udplite: Fix null-ptr-deref in… | 2026-05-06T12:16:34.540 | 2026-05-08T13:16:41.527 |
| fkie_cve-2026-43158 | In the Linux kernel, the following vulnerability has been resolved: xfs: fix freemap adjustments w… | 2026-05-06T12:16:33.697 | 2026-05-08T13:16:41.373 |
| fkie_cve-2026-43153 | In the Linux kernel, the following vulnerability has been resolved: xfs: remove xfs_attr_leaf_hasn… | 2026-05-06T12:16:33.073 | 2026-05-08T13:16:41.260 |
| fkie_cve-2026-43150 | In the Linux kernel, the following vulnerability has been resolved: perf/arm-cmn: Reject unsupport… | 2026-05-06T12:16:32.690 | 2026-05-08T13:16:41.130 |
| fkie_cve-2026-43139 | In the Linux kernel, the following vulnerability has been resolved: xfrm6: fix uninitialized saddr… | 2026-05-06T12:16:31.227 | 2026-05-08T13:16:40.990 |
| fkie_cve-2026-43134 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix missing … | 2026-05-06T12:16:30.617 | 2026-05-08T13:16:40.853 |
| fkie_cve-2026-43120 | In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix double free re… | 2026-05-06T10:16:25.913 | 2026-05-08T13:16:40.207 |
| fkie_cve-2026-43106 | In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix incorrect dent… | 2026-05-06T10:16:24.213 | 2026-05-08T13:16:39.260 |
| fkie_cve-2026-43101 | In the Linux kernel, the following vulnerability has been resolved: ipv6: ioam: fix potential NULL… | 2026-05-06T10:16:23.637 | 2026-05-08T13:16:39.143 |
| fkie_cve-2026-43099 | In the Linux kernel, the following vulnerability has been resolved: ipv4: icmp: fix null-ptr-deref… | 2026-05-06T10:16:23.400 | 2026-05-08T13:16:39.033 |
| fkie_cve-2026-43093 | In the Linux kernel, the following vulnerability has been resolved: xsk: tighten UMEM headroom val… | 2026-05-06T10:16:22.667 | 2026-05-08T13:16:38.907 |
| fkie_cve-2026-43091 | In the Linux kernel, the following vulnerability has been resolved: xfrm: Wait for RCU readers dur… | 2026-05-06T10:16:22.433 | 2026-05-08T13:16:38.787 |
| fkie_cve-2026-43084 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: ma… | 2026-05-06T10:16:21.610 | 2026-05-08T13:16:38.660 |
| fkie_cve-2026-43083 | In the Linux kernel, the following vulnerability has been resolved: net: ioam6: fix OOB and missin… | 2026-05-06T10:16:21.493 | 2026-05-08T13:16:38.550 |
| fkie_cve-2026-43078 | In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Fix page reas… | 2026-05-06T10:16:20.853 | 2026-05-08T13:16:38.417 |
| fkie_cve-2026-43076 | In the Linux kernel, the following vulnerability has been resolved: ocfs2: validate inline data i_… | 2026-05-06T10:16:20.590 | 2026-05-08T13:16:38.297 |
| fkie_cve-2026-43075 | In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix out-of-bounds write… | 2026-05-06T10:16:20.463 | 2026-05-08T13:16:38.160 |
| fkie_cve-2026-43074 | In the Linux kernel, the following vulnerability has been resolved: eventpoll: defer struct eventp… | 2026-05-06T10:16:20.343 | 2026-05-08T13:16:38.030 |
| fkie_cve-2026-43071 | In the Linux kernel, the following vulnerability has been resolved: dcache: Limit the minimal numb… | 2026-05-05T16:16:16.420 | 2026-05-08T13:16:37.870 |
| fkie_cve-2026-43070 | In the Linux kernel, the following vulnerability has been resolved: bpf: Reset register ID for BPF… | 2026-05-05T16:16:16.320 | 2026-05-08T13:16:37.750 |
| fkie_cve-2026-43067 | In the Linux kernel, the following vulnerability has been resolved: ext4: handle wraparound when s… | 2026-05-05T16:16:15.937 | 2026-05-08T13:16:37.597 |
| fkie_cve-2026-43063 | In the Linux kernel, the following vulnerability has been resolved: xfs: don't irele after failing… | 2026-05-05T16:16:15.467 | 2026-05-08T13:16:37.457 |
| fkie_cve-2026-43062 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix type con… | 2026-05-05T16:16:15.340 | 2026-05-08T13:16:37.303 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2cq5-mf3v-mx44 |
8.8 (3.1)
8.6 (4.0)
|
OpenClaw: busybox and toybox applet execution weakened exec approval binding | 2026-04-17T22:16:04Z | 2026-05-08T01:32:55Z |
| ghsa-939r-rj45-g2rj |
8.8 (3.1)
8.6 (4.0)
|
OpenClaw: Workspace provider auth choices could auto-enable untrusted provider plugins | 2026-04-17T22:12:49Z | 2026-05-08T01:32:51Z |
| ghsa-82qx-6vj7-p8m2 |
8.8 (3.1)
7.1 (4.0)
|
OpenClaw: Channel setup catalog lookups could include untrusted workspace plugin shadows | 2026-04-17T21:58:46Z | 2026-05-08T01:32:48Z |
| ghsa-c9h3-5p7r-mrjh |
7.7 (3.1)
5.3 (4.0)
|
OpenClaw: Discord event cover images bypassed sandbox media normalization | 2026-04-17T21:56:04Z | 2026-05-08T01:32:44Z |
| ghsa-49cg-279w-m73x |
6.5 (3.1)
6.0 (4.0)
|
OpenClaw: Empty approver lists could grant explicit approval authorization | 2026-04-17T21:55:54Z | 2026-05-08T01:32:40Z |
| ghsa-7g8c-cfr3-vqqr |
9.1 (3.1)
6.6 (4.0)
|
OpenClaw: Agent hook events could enqueue trusted system events from unsanitized external input | 2026-04-17T21:55:20Z | 2026-05-08T01:32:34Z |
| ghsa-g2hm-779g-vm32 |
9.1 (3.1)
6.0 (4.0)
|
OpenClaw: Heartbeat owner downgrade missed untrusted webhook wake events | 2026-04-17T21:48:25Z | 2026-05-08T01:32:30Z |
| ghsa-jwrq-8g5x-5fhm |
6.8 (3.1)
5.3 (4.0)
|
OpenClaw: Collect-mode queue batches could reuse the last sender authorization context | 2026-04-17T21:35:35Z | 2026-05-08T01:32:26Z |
| ghsa-7jp6-r74r-995q |
6.5 (3.1)
7.1 (4.0)
|
OpenClaw: Matrix profile config persistence was reachable from operator.write message tools | 2026-04-17T22:15:27Z | 2026-05-08T01:32:22Z |
| ghsa-736r-jwj6-4w23 |
8.8 (3.1)
8.3 (4.0)
|
OpenClaw: Sandboxed agents could escape exec routing via host=node override | 2026-04-17T22:14:56Z | 2026-05-08T01:32:18Z |
| ghsa-53vx-pmqw-863c |
7.7 (3.1)
6.9 (4.0)
|
OpenClaw: Browser SSRF policy default allowed private-network navigation | 2026-04-17T21:58:15Z | 2026-05-08T01:32:14Z |
| ghsa-2767-2q9v-9326 |
8.2 (3.1)
5.3 (4.0)
|
OpenClaw: QQBot reply media URL handling could trigger SSRF and re-upload fetched bytes | 2026-04-17T21:57:31Z | 2026-05-08T01:32:10Z |
| ghsa-c4qm-58hj-j6pj |
7.7 (3.1)
6.0 (4.0)
|
OpenClaw: Browser snapshot and screenshot routes could expose internal page content after navigation | 2026-04-17T21:47:36Z | 2026-05-08T01:32:06Z |
| ghsa-hqr4-h3xv-9m3r |
9.9 (3.1)
9.4 (4.0)
|
n8n has XML Node Prototype Pollution that to RCE | 2026-04-29T21:25:53Z | 2026-05-08T01:31:42Z |
| ghsa-q5f4-99jv-pgg5 |
10.0 (3.1)
10.0 (4.0)
|
n8n has Prototype Pollution in XML Webhook Body Parser that Leads to RCE | 2026-04-29T21:25:02Z | 2026-05-08T01:31:38Z |
| ghsa-537j-gqpc-p7fq |
8.2 (3.1)
8.8 (4.0)
|
n8n Vulnerable to XSS via MCP OAuth client | 2026-04-29T21:23:04Z | 2026-05-08T01:31:29Z |
| ghsa-r4v6-9fqc-w5jr |
8.5 (3.1)
7.1 (4.0)
|
n8n's Credential Authorization Bypass in dynamic-node-parameters Allows Foreign API Key Replay | 2026-04-29T21:22:26Z | 2026-05-08T01:31:25Z |
| ghsa-44v6-jhgm-p3m4 |
7.5 (3.1)
7.1 (4.0)
|
n8n has a Python Task Runner Sandbox Escape Vulnerability | 2026-04-29T21:21:50Z | 2026-05-08T01:31:22Z |
| ghsa-756q-gq9h-fp22 |
7.7 (3.1)
6.0 (4.0)
|
n8n has Public API Variables IDOR that Allows Cross-Project Secret Disclosure | 2026-04-29T21:21:00Z | 2026-05-08T01:31:18Z |
| ghsa-49m9-pgww-9vq6 |
7.5 (3.1)
8.7 (4.0)
|
n8n Vulnerable to Unauthenticated Denial of Service via MCP Client Registration | 2026-04-29T21:19:07Z | 2026-05-08T01:31:14Z |
| ghsa-f77h-j2v7-g6mw |
5.4 (3.1)
6.3 (4.0)
|
n8n Vulnerable to Hijacking of Unauthenticated Chat Execution | 2026-04-29T21:17:44Z | 2026-05-08T01:31:09Z |
| ghsa-mp4j-h6gh-f6mp |
6.8 (3.1)
5.3 (4.0)
|
n8n has SQL Injection in SeaTable Node | 2026-04-29T21:10:58Z | 2026-05-08T01:30:50Z |
| ghsa-f6x8-65q6-j9m9 |
4.7 (3.1)
5.1 (4.0)
|
n8n has Open Redirect in MCP OAuth Consent Flow | 2026-04-29T21:10:17Z | 2026-05-08T01:30:46Z |
| ghsa-r6jc-mpqw-m755 |
9.8 (3.1)
5.3 (4.0)
|
n8n has SQL Injection in Oracle Database Node via Limit Field | 2026-04-29T21:08:27Z | 2026-05-08T01:30:42Z |
| ghsa-hp3c-vfpm-q4f7 |
8.2 (3.1)
5.3 (4.0)
|
n8n has SQL Injection in Snowflake and MySQL Nodes | 2026-04-29T21:03:29Z | 2026-05-08T01:30:35Z |
| ghsa-p7fg-763f-g4gf |
4.8 (4.0)
|
Claude SDK for TypeScript has Insecure Default File Permissions in Local Filesystem Memory Tool | 2026-04-29T22:28:12Z | 2026-05-08T01:30:32Z |
| ghsa-3gxm-wfjx-m847 |
6.0 (4.0)
|
beets has a Cross-site Scripting vulnerability | 2026-04-29T18:29:00Z | 2026-05-08T01:25:19Z |
| ghsa-grj5-jjm8-h35p |
9.8 (3.1)
|
VM2 Sandbox Breakout Through __lookupGetter__ | 2026-05-04T16:29:15Z | 2026-05-08T01:25:03Z |
| ghsa-9gh9-hwpr-rvqq |
7.0 (3.1)
|
uutils coreutils has a Time-of-Check to Time-of-Use (TOCTOU) race condition | 2026-04-22T18:31:45Z | 2026-05-08T01:24:58Z |
| ghsa-wmjr-v86c-m9jj |
2.0 (4.0)
|
Better Auth's multi-session sign-out hook allows forged cookies to revoke arbitrary sessions | 2025-11-26T22:11:50Z | 2026-05-08T01:19:47Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-217 |
8.8 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.2.2. | modoboa | 2023-10-20T17:15:00+00:00 | 2023-10-27T20:23:07.873996+00:00 |
| pysec-2023-216 |
5.4 (3.1)
|
Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa prior to 2.2.2. | modoboa | 2023-10-20T17:15:00+00:00 | 2023-10-27T20:23:07.820957+00:00 |
| pysec-2023-215 |
5.4 (3.1)
|
Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa prior to 2.2.2. | modoboa | 2023-10-20T17:15:00+00:00 | 2023-10-27T20:23:07.768462+00:00 |
| pysec-2023-214 |
5.4 (3.1)
|
Home assistant is an open source home automation. The audit team’s analyses confirmed tha… | homeassistant | 2023-10-20T00:15:00+00:00 | 2023-10-26T20:24:24.928732+00:00 |
| pysec-2023-213 |
7.5 (3.1)
|
Inadequate encryption strength in mycli 1.27.0 allows attackers to view sensitive informa… | mycli | 2023-10-19T22:15:00+00:00 | 2023-10-25T22:26:24.480718+00:00 |
| pysec-2023-212 |
4.2 (3.1)
|
urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't re… | urllib3 | 2023-10-17T20:15:00+00:00 | 2023-10-25T18:28:34.811764+00:00 |
| pysec-2023-211 |
|
views/switch.py in django-grappelli (aka Django Grappelli) before 2.15.2 attempts to prev… | django-grappelli | 2023-10-22T19:15:00+00:00 | 2023-10-22T20:22:30.994719+00:00 |
| pysec-2023-210 |
|
views.py in Wagtail CRX CodeRed Extensions (formerly CodeRed CMS or coderedcms) before 0.… | coderedcms | 2023-10-22T19:15:00+00:00 | 2023-10-22T20:22:30.887585+00:00 |
| pysec-2023-209 |
9.8 (3.1)
|
A vulnerability, which was classified as critical, has been found in json-logic-js 2.0.0.… | json-logic | 2023-03-05T19:15:00+00:00 | 2023-10-20T16:31:18.877419+00:00 |
| pysec-2023-208 |
4.3 (3.1)
|
A vulnerability was found in paxswill EVE Ship Replacement Program 0.12.11. It has been r… | eve-srp | 2023-02-06T17:15:00+00:00 | 2023-10-20T16:31:18.806057+00:00 |
| pysec-2023-207 |
6.1 (3.1)
|
urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cros… | urllib3 | 2023-10-15T19:15:00+00:00 | 2023-10-19T16:33:01.297810+00:00 |
| pysec-2023-206 |
7.5 (3.1)
|
NULL Pointer Dereference in GitHub repository seleniumhq/selenium prior to 4.14.0. | selenium | 2023-10-15T23:15:00+00:00 | 2023-10-19T12:51:06.907613+00:00 |
| pysec-2023-205 |
|
LangChain before 0.0.317 allows SSRF via document_loaders/recursive_url_loader.py because… | langchain | 2023-10-19T05:15:00+00:00 | 2023-10-19T10:33:05.150766+00:00 |
| pysec-2023-204 |
4.3 (3.1)
|
Apache Airflow, versions 2.7.0 and 2.7.1, is affected by a vulnerability that allows an … | apache-airflow | 2023-10-14T10:15:00+00:00 | 2023-10-18T20:24:08.594791+00:00 |
| pysec-2023-203 |
6.5 (3.1)
|
Apache Airflow, in versions prior to 2.7.2, contains a security vulnerability that allows… | apache-airflow | 2023-10-14T10:15:00+00:00 | 2023-10-18T20:24:08.541134+00:00 |
| pysec-2023-202 |
6.5 (3.1)
|
Apache Airflow, versions prior to 2.7.2, contains a security vulnerability that allows au… | apache-airflow | 2023-10-14T10:15:00+00:00 | 2023-10-18T20:24:08.482939+00:00 |
| pysec-2023-201 |
4.3 (3.1)
|
vantage6 is privacy preserving federated learning infrastructure. The endpoint /api/colla… | vantage6 | 2023-10-11T20:15:00+00:00 | 2023-10-18T05:26:18.202930+00:00 |
| pysec-2023-200 |
4.3 (3.1)
|
vantage6 is privacy preserving federated learning infrastructure. When a collaboration is… | vantage6 | 2023-10-11T20:15:00+00:00 | 2023-10-18T05:26:18.112311+00:00 |
| pysec-2023-199 |
4.9 (3.1)
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-10-10T18:15:00+00:00 | 2023-10-17T22:26:17.611846+00:00 |
| pysec-2023-198 |
5.4 (3.1)
|
vantage6 is privacy preserving federated learning infrastructure. Prior to version 4.0.0,… | vantage6-node | 2023-10-11T20:15:00+00:00 | 2023-10-17T18:31:16.643410+00:00 |
| pysec-2023-197 |
|
Apache Airflow, versions before 2.7.2, has a vulnerability that allows an authorized user… | apache-airflow | 2023-10-14T10:15:00+00:00 | 2023-10-14T12:46:00.410542+00:00 |
| pysec-2023-196 |
7.2 (3.1)
|
vantage6 is privacy preserving federated learning infrastructure. Versions prior to 4.0.0… | vantage6 | 2023-10-11T18:15:00+00:00 | 2023-10-13T22:28:56.802294+00:00 |
| pysec-2023-195 |
6.5 (3.1)
|
OctoPrint is a web interface for 3D printers. OctoPrint versions up until and including 1… | octoprint | 2023-10-09T16:15:00+00:00 | 2023-10-13T20:25:14.968230+00:00 |
| pysec-2023-193 |
4.8 (3.1)
|
Zope is an open-source web application server. The title property, available on most Zope… | zope | 2023-10-04T21:15:00+00:00 | 2023-10-10T20:21:16.174482+00:00 |
| pysec-2023-192 |
8.1 (3.1)
|
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Coo… | urllib3 | 2023-10-04T17:15:00+00:00 | 2023-10-10T14:28:19.389317+00:00 |
| pysec-2023-154 |
5.3 (3.1)
|
Datasette is an open source multi-tool for exploring and publishing data. This bug affect… | datasette | 2023-08-25T01:15:00Z | 2023-10-08T16:12:24.555320Z |
| pysec-2023-191 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. The `_abi_decode()` function doe… | vyper | 2023-09-27T15:19:00+00:00 | 2023-10-04T20:26:42.494872+00:00 |
| pysec-2023-190 |
7.5 (3.1)
|
Versions of the package asyncua before 0.9.96 are vulnerable to Denial of Service (DoS) s… | asyncua | 2023-10-03T05:15:00+00:00 | 2023-10-04T18:37:48.407821+00:00 |
| pysec-2023-189 |
7.5 (3.1)
|
Versions of the package asyncua before 0.9.96 are vulnerable to Improper Authentication s… | asyncua | 2023-10-03T05:15:00+00:00 | 2023-10-04T18:37:48.328804+00:00 |
| pysec-2023-162 |
9.8 (3.1)
|
An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary… | langchain | 2023-09-01T16:15:00Z | 2023-10-04T16:56:57.465474Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33343 | D-Link DIR-822+ V1.0.5 was found to contain a command injection in ChgSambaUserSettings f… | 2024-04-24T05:02:09.629632Z |
| gsd-2024-33342 | D-Link DIR-822+ V1.0.5 was found to contain a command injection in SetPlcNetworkpwd funct… | 2024-04-24T05:02:09.645419Z |
| gsd-2024-33341 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.693276Z |
| gsd-2024-33340 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.656659Z |
| gsd-2024-33339 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.701010Z |
| gsd-2024-33338 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.642793Z |
| gsd-2024-33337 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.671742Z |
| gsd-2024-33336 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.604992Z |
| gsd-2024-33335 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.644106Z |
| gsd-2024-33334 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.695143Z |
| gsd-2024-33333 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.713446Z |
| gsd-2024-33332 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.627010Z |
| gsd-2024-33331 | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-33891. Reason: This c… | 2024-04-24T05:02:09.621553Z |
| gsd-2024-33330 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.618353Z |
| gsd-2024-33329 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.739430Z |
| gsd-2024-33328 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.639108Z |
| gsd-2024-33327 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.692651Z |
| gsd-2024-33326 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.668985Z |
| gsd-2024-33325 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.699409Z |
| gsd-2024-33324 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.706012Z |
| gsd-2024-33323 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.648147Z |
| gsd-2024-33322 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.697418Z |
| gsd-2024-33321 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.634157Z |
| gsd-2024-33320 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.704431Z |
| gsd-2024-33319 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.646296Z |
| gsd-2024-33318 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.663332Z |
| gsd-2024-33317 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.626500Z |
| gsd-2024-33316 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.720706Z |
| gsd-2024-33315 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.660426Z |
| gsd-2024-33314 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.707734Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2564 | Malicious code in gp-auth-lib (npm) | 2026-04-12T04:25:39Z | 2026-04-23T20:50:50Z |
| mal-2026-3020 | Malicious code in @bitwarden/cli (npm) | 2026-04-23T17:07:51Z | 2026-04-23T20:50:49Z |
| mal-2026-3004 | Malicious code in @nklkas/hyperliquid (npm) | 2026-04-23T04:24:15Z | 2026-04-23T20:50:49Z |
| mal-2026-3003 | Malicious code in @amsterdam-local/forms-component-library (npm) | 2026-04-23T03:52:34Z | 2026-04-23T20:50:49Z |
| mal-2026-2998 | Malicious code in @spinstorm/shared (npm) | 2026-04-22T21:15:39Z | 2026-04-23T20:50:49Z |
| mal-2026-2997 | Malicious code in @stlm/common-ui (npm) | 2026-04-22T15:03:57Z | 2026-04-23T20:50:49Z |
| mal-2026-2994 | Malicious code in @openwebconcept/theme-owc (npm) | 2026-04-22T13:59:52Z | 2026-04-23T20:50:49Z |
| mal-2026-2993 | Malicious code in @openwebconcept/design-tokens (npm) | 2026-04-22T14:01:36Z | 2026-04-23T20:50:49Z |
| mal-2026-2992 | Malicious code in @automagik/genie (npm) | 2026-04-22T13:58:31Z | 2026-04-23T20:50:49Z |
| mal-2026-2989 | Malicious code in @bmg-web-features/bmg-user-interaction-tracker (npm) | 2026-04-22T08:45:49Z | 2026-04-23T20:50:49Z |
| mal-2026-2988 | Malicious code in @bmg-web/bmg-grid (npm) | 2026-04-22T08:48:05Z | 2026-04-23T20:50:49Z |
| mal-2026-2987 | Malicious code in @bmg-web/bmg-external-link (npm) | 2026-04-22T08:45:41Z | 2026-04-23T20:50:49Z |
| mal-2026-2986 | Malicious code in @bmg-web/bmg-dropdown (npm) | 2026-04-22T08:47:48Z | 2026-04-23T20:50:49Z |
| mal-2026-2985 | Malicious code in @bmg-web/bmg-dialog (npm) | 2026-04-22T08:58:28Z | 2026-04-23T20:50:49Z |
| mal-2026-2984 | Malicious code in @bmg-web/bmg-collapse (npm) | 2026-04-22T08:48:20Z | 2026-04-23T20:50:49Z |
| mal-2026-2983 | Malicious code in @bmg-web/bmg-checkbox (npm) | 2026-04-22T08:55:49Z | 2026-04-23T20:50:49Z |
| mal-2026-2982 | Malicious code in @bmg-web/bmg-card (npm) | 2026-04-22T08:45:48Z | 2026-04-23T20:50:49Z |
| mal-2026-2981 | Malicious code in @bmg-web/bmg-button (npm) | 2026-04-22T08:48:00Z | 2026-04-23T20:50:49Z |
| mal-2026-2980 | Malicious code in @bmg-web/bmg-ajax (npm) | 2026-04-22T08:45:50Z | 2026-04-23T20:50:49Z |
| mal-2026-2978 | Malicious code in @oec-settlement/react-router (npm) | 2026-04-22T03:10:49Z | 2026-04-23T20:50:49Z |
| mal-2026-2972 | Malicious code in aven_types (npm) | 2026-04-22T01:29:49Z | 2026-04-23T20:50:49Z |
| mal-2026-2971 | Malicious code in @usealloy/typegen (npm) | 2026-04-22T01:29:49Z | 2026-04-23T20:50:49Z |
| mal-2026-2970 | Malicious code in @usealloy/component-library (npm) | 2026-04-22T01:29:49Z | 2026-04-23T20:50:49Z |
| mal-2026-2969 | Malicious code in @usealloy/api-contract (npm) | 2026-04-22T01:29:49Z | 2026-04-23T20:50:49Z |
| mal-2026-2968 | Malicious code in @bitunix/test (npm) | 2026-04-22T01:29:49Z | 2026-04-23T20:50:49Z |
| mal-2026-2967 | Malicious code in 6161test1234 (npm) | 2026-04-21T13:55:41Z | 2026-04-23T20:50:49Z |
| mal-2026-2961 | Malicious code in apple-internal-security-poc-frank (npm) | 2026-04-21T01:17:28Z | 2026-04-23T20:50:49Z |
| mal-2026-2960 | Malicious code in apple-auth-internal (npm) | 2026-04-21T01:17:28Z | 2026-04-23T20:50:49Z |
| mal-2026-2956 | Malicious code in @serasa/core (npm) | 2026-04-20T16:51:20Z | 2026-04-23T20:50:49Z |
| mal-2026-2954 | Malicious code in bmg-web-features (npm) | 2026-04-20T16:01:19Z | 2026-04-23T20:50:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0233 | Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-02-02T23:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2024-1504 | Apache HTTP Server: Mehrere Schwachstellen | 2024-07-01T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2024-0801 | Apache HTTP Server: Mehrere Schwachstellen ermöglichen Manipulation von Daten | 2024-04-04T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2023-2024 | Node.js: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2023-08-09T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2860 | JetBrains TeamCity: Mehrere Schwachstellen | 2025-12-16T23:00:00.000+00:00 | 2025-12-17T23:00:00.000+00:00 |
| wid-sec-w-2025-2857 | Apache Commons Text: Schwachstelle ermöglicht Codeausführung | 2025-12-16T23:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2666 | vllm und PyTorch: Schwachstelle ermöglicht DoS und potenzielle Codeausführung | 2025-11-23T23:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2485 | cURL (wcurl): Schwachstelle ermöglicht Manipulation von Dateien | 2025-11-03T23:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2404 | AMD “Zen 5” Prozessoren: Schwachstelle gefährdet Vertraulichkeit und Integrität | 2025-10-23T22:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2325 | xpdf: Schwachstelle ermöglicht Denial of Service | 2025-10-16T22:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2051 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-14T22:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1933 | Linux Kernel: Eine Schwachstelle ermöglicht einen Denial of Service | 2025-08-31T22:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1914 | Linux Kernel: Schwachstelle ermöglicht Codeausführung | 2025-08-26T22:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1862 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-08-18T22:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-1830 | http/2 Implementierungen: Schwachstelle ermöglicht Denial of Service | 2025-08-13T22:00:00.000+00:00 | 2025-12-16T23:00:00.000+00:00 |
| wid-sec-w-2025-2718 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2025-12-02T23:00:00.000+00:00 | 2025-12-15T23:00:00.000+00:00 |
| wid-sec-w-2025-2580 | Google Chrome/Microsoft Edge: Schwachstelle ermöglicht nicht näher beschriebene Auswirkungen | 2025-11-11T23:00:00.000+00:00 | 2025-12-14T23:00:00.000+00:00 |
| wid-sec-w-2025-2676 | GeoServer: Mehrere Schwachstellen | 2025-11-25T23:00:00.000+00:00 | 2025-12-11T23:00:00.000+00:00 |
| wid-sec-w-2025-2789 | Adobe Experience Manager: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-0104 | Kubernetes: Schwachstelle ermöglicht Codeausführung | 2025-01-15T23:00:00.000+00:00 | 2025-12-10T23:00:00.000+00:00 |
| wid-sec-w-2025-1375 | WinRAR: Schwachstelle ermöglicht Codeausführung | 2025-06-23T22:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2746 | IBM InfoSphere Information Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-12-04T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2711 | Android Patchday Dezember 2025: Mehrere Schwachstellen | 2025-12-01T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2702 | Red Hat Enterprise Linux (Developer Hub): Schwachstelle ermöglicht Manipulation von Dateien | 2025-11-30T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2655 | CUPS-Filters: Schwachstelle ermöglicht Codeausführung | 2025-11-20T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2598 | CUPS (Filters): Mehrere Schwachstellen | 2025-11-13T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2472 | Samsung Android: Mehrere Schwachstellen | 2025-11-03T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-1681 | Red Hat OpenShift (glog): Schwachstelle ermöglicht Manipulation von Dateien | 2025-07-30T22:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0723 | Android Patchday April 2025: Mehrere Schwachstellen | 2025-04-07T22:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0600 | GnuPG: Schwachstelle ermöglicht Denial of Service | 2025-03-19T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-12-018-01b | Schneider Electric Quantum Ethernet Module Hard-Coded Credentials | 2012-10-21T06:00:00.000000Z | 2025-06-09T16:35:02.023038Z |
| icsa-12-016-01 | Cogent DataHub XSS and CRLF | 2012-10-19T06:00:00.000000Z | 2025-06-09T16:34:49.600837Z |
| icsa-12-013-01 | ING. Punzenberger COPA-DATA GMBH DoS Vulnerabilities | 2012-10-16T06:00:00.000000Z | 2025-06-09T16:34:37.147014Z |
| icsa-12-012-01a | Open Automation Software OPC Systems.NET Vulnerability | 2012-10-15T06:00:00.000000Z | 2025-06-09T16:34:24.700109Z |
| icsa-12-006-01 | 3S CoDeSys Vulnerabilities | 2012-10-09T06:00:00.000000Z | 2025-06-09T16:34:06.000552Z |
| icsa-11-362-01 | ScadaTEC ScadaPhone & Modbus TagServer Buffer Overflow Vulnerability | 2011-09-30T06:00:00.000000Z | 2025-06-09T16:33:59.781942Z |
| icsa-11-361-01 | Siemens Automation License Manager Vulnerabilities | 2011-09-29T06:00:00.000000Z | 2025-06-09T16:33:34.827604Z |
| icsa-11-355-02 | WellinTech KingView History Server Buffer Overflow | 2011-09-23T06:00:00.000000Z | 2025-06-09T16:33:28.540538Z |
| icsa-11-355-01 | 7-Technologies IGSS Buffer Overflow | 2011-09-23T06:00:00.000000Z | 2025-06-09T16:33:22.315361Z |
| icsa-11-353-01 | 7-Technologies Interactive Graphical SCADA | 2011-09-21T06:00:00.000000Z | 2025-06-09T16:33:16.051366Z |
| icsa-11-343-01 | Siemens FactoryLink Multiple ActiveX Vulnerabilities | 2011-09-11T06:00:00.000000Z | 2025-06-09T16:33:03.608185Z |
| icsa-16-026-02 | Rockwell Automation MicroLogix 1100 PLC Overflow Vulnerability | 2016-10-29T06:00:00.000000Z | 2025-06-09T16:32:57.382277Z |
| icsa-16-026-01 | MICROSYS PROMOTIC Memory Corruption Vulnerability | 2016-10-29T06:00:00.000000Z | 2025-06-09T16:32:51.175680Z |
| icsa-16-019-01 | Siemens OZW672 and OZW772 XSS Vulnerability | 2016-10-22T06:00:00.000000Z | 2025-06-09T16:32:44.948067Z |
| icsa-16-014-01 | Advantech WebAccess Vulnerabilities | 2016-10-17T06:00:00.000000Z | 2025-06-09T16:31:10.642130Z |
| icsa-15-356-01 | Siemens RUGGEDCOM ROX-based Devices NTP Vulnerabilities | 2015-09-24T06:00:00.000000Z | 2025-06-09T16:30:45.504574Z |
| icsa-15-351-03 | eWON Vulnerabilities | 2015-09-19T06:00:00.000000Z | 2025-06-09T16:30:08.163522Z |
| icsa-15-351-02 | Motorola MOSCAD SCADA IP Gateway Vulnerabilities | 2015-09-19T06:00:00.000000Z | 2025-06-09T16:29:55.412118Z |
| icsa-15-351-01 | Schneider Electric Modicon M340 Buffer Overflow Vulnerability | 2015-09-19T06:00:00.000000Z | 2025-06-09T16:29:49.200182Z |
| icsa-15-349-01 | Adcon Telemetry A840 Vulnerabilities | 2015-09-17T06:00:00.000000Z | 2025-06-09T16:29:24.204966Z |
| icsa-15-344-02 | Open Automation Software OPC Systems NET DLL Hijacking Vulnerability | 2015-09-12T06:00:00.000000Z | 2025-06-09T16:29:17.938829Z |
| icsa-15-344-01b | Advantech EKI Vulnerabilities (Update B) | 2015-09-12T06:00:00.000000Z | 2025-06-09T16:28:52.618727Z |
| icsa-15-342-02 | LOYTEC Router Information Exposure Vulnerability | 2015-09-10T06:00:00.000000Z | 2025-06-09T16:28:46.089562Z |
| icsa-15-337-03 | Pacom 1000 CCU GMS System Cryptographic Implementation Vulnerabilities | 2015-09-05T06:00:00.000000Z | 2025-06-09T16:28:39.850718Z |
| icsa-15-337-02 | Hospira Multiple Products Buffer Overflow Vulnerability | 2015-09-05T06:00:00.000000Z | 2025-06-09T16:28:33.444166Z |
| icsa-15-337-01 | SearchBlox File Exfiltration Vulnerability | 2015-09-05T06:00:00.000000Z | 2025-06-09T16:28:27.223837Z |
| icsa-15-328-01 | Moxa OnCell Central Manager Vulnerabilities | 2015-08-27T06:00:00.000000Z | 2025-06-09T16:28:04.742080Z |
| icsa-15-323-01 | Tibbo AggreGate Platform Vulnerabilities | 2015-08-22T06:00:00.000000Z | 2025-06-09T16:27:52.277295Z |
| icsa-15-321-01 | Exemys Web Server Bypass Vulnerability | 2015-08-20T06:00:00.000000Z | 2025-06-09T16:27:45.949280Z |
| icsa-15-309-02 | Honeywell Midas Gas Detector Vulnerabilities | 2015-08-08T06:00:00.000000Z | 2025-06-09T16:27:33.405162Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-fmc-file-download-7js4ug2j | Cisco Firepower Management Center Software Arbitrary File Download Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-file-download-7js4ug2J | Cisco Firepower Management Center Software Arbitrary File Download Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-cmdinj-btegufox | Cisco Firepower Management Center Software Command Injection Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-cmdinj-bTEgufOX | Cisco Firepower Management Center Software Command Injection Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-29mp49hn | Cisco Firepower Management Center Software Command Injection Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-29MP49hN | Cisco Firepower Management Center Software Command Injection Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-cms-segfault-g6es4ve8 | Cisco Meeting Server Web Bridge Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-cms-segfault-G6ES4Ve8 | Cisco Meeting Server Web Bridge Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-ssl-dos-kxg8mpua | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software AnyConnect SSL/TLS VPN Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-ssl-dos-kxG8mpUA | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software AnyConnect SSL/TLS VPN Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-saml-hijack-ttuqfyz | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SAML Assertion Hijack Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-saml-hijack-ttuQfyz | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SAML Assertion Hijack Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-multi-cert-dza3h5pt | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access SSL VPN Multiple Certificate Authentication Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-multi-cert-dzA3h5PT | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access SSL VPN Multiple Certificate Authentication Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-ac-acl-bypass-bwd7q6gb | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software AnyConnect Access Control List Bypass Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-ac-acl-bypass-bwd7q6Gb | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software AnyConnect Access Control List Bypass Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-iosxe-webui-privesc-j22saa4z | Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature | 2023-10-16T15:00:00+00:00 | 2023-11-01T15:44:28+00:00 |
| cisco-sa-iosxe-webui-privesc-j22SaA4z | Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature | 2023-10-16T15:00:00+00:00 | 2023-11-01T15:44:28+00:00 |
| cisco-sa-sdwan-vman-sc-lrlfu2z | Cisco Catalyst SD-WAN Manager Vulnerabilities | 2023-09-27T16:00:00+00:00 | 2023-10-25T16:37:56+00:00 |
| cisco-sa-sdwan-vman-sc-LRLfu2z | Cisco Catalyst SD-WAN Manager Vulnerabilities | 2023-09-27T16:00:00+00:00 | 2023-10-25T16:37:56+00:00 |
| cisco-sa-nso-priv-esc-xxqrttft | Cisco Network Services Orchestrator CLI Secure Shell Server Privilege Escalation Vulnerability | 2021-08-04T16:00:00+00:00 | 2023-10-25T16:01:08+00:00 |
| cisco-sa-nso-priv-esc-XXqRtTfT | Cisco Network Services Orchestrator CLI Secure Shell Server Privilege Escalation Vulnerability | 2021-08-04T16:00:00+00:00 | 2023-10-25T16:01:08+00:00 |
| cisco-sa-iosxe-webcmdinjsh-ufjxtgzd | Cisco IOS XE Software Web UI Command Injection Vulnerability | 2021-03-24T16:00:00+00:00 | 2023-10-23T18:22:23+00:00 |
| cisco-sa-iosxe-webcmdinjsh-UFJxTgZD | Cisco IOS XE Software Web UI Command Injection Vulnerability | 2021-03-24T16:00:00+00:00 | 2023-10-23T18:22:23+00:00 |
| cisco-sa-sdwan-lfi-owlbkuge | Cisco Catalyst SD-WAN Manager Local File Inclusion Vulnerability | 2023-10-18T16:00:00+00:00 | 2023-10-18T16:00:00+00:00 |
| cisco-sa-sdwan-lfi-OWLbKUGe | Cisco Catalyst SD-WAN Manager Local File Inclusion Vulnerability | 2023-10-18T16:00:00+00:00 | 2023-10-18T16:00:00+00:00 |
| cisco-sa-aaascp-tyj4fejm | Cisco IOS and IOS XE Software Command Authorization Bypass Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-10-13T13:36:50+00:00 |
| cisco-sa-aaascp-Tyj4fEJm | Cisco IOS and IOS XE Software Command Authorization Bypass Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-10-13T13:36:50+00:00 |
| cisco-sa-asaftd-ravpn-auth-8lyfckec | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access VPN Unauthorized Access Vulnerability | 2023-09-06T16:00:00+00:00 | 2023-10-11T14:59:29+00:00 |
| cisco-sa-asaftd-ravpn-auth-8LyfCkeC | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access VPN Unauthorized Access Vulnerability | 2023-09-06T16:00:00+00:00 | 2023-10-11T14:59:29+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31621 | bnge: return after auxiliary_device_uninit() in error path | 2026-04-02T00:00:00.000Z | 2026-04-29T14:46:38.000Z |
| msrc_cve-2026-34591 | Poetry Has Wheel Path Traversal Which Can Lead to Arbitrary File Write | 2026-04-02T00:00:00.000Z | 2026-04-29T14:46:31.000Z |
| msrc_cve-2025-4574 | Crossbeam-channel: crossbeam-channel vulnerable to double free on drop | 2025-05-02T00:00:00.000Z | 2026-04-29T14:46:22.000Z |
| msrc_cve-2026-31408 | Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold | 2026-04-02T00:00:00.000Z | 2026-04-29T14:46:16.000Z |
| msrc_cve-2026-31528 | perf: Make sure to use pmu_ctx->pmu for groups | 2026-04-02T00:00:00.000Z | 2026-04-29T14:45:59.000Z |
| msrc_cve-2025-46327 | Go Snowflake Driver has race condition when checking access to Easy Logging configuration file | 2025-04-02T00:00:00.000Z | 2026-04-29T14:45:58.000Z |
| msrc_cve-2026-31451 | ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio | 2026-04-02T00:00:00.000Z | 2026-04-29T14:45:32.000Z |
| msrc_cve-2025-55554 | pytorch v2.8.0 was discovered to contain an integer overflow in the component torch.nan_to_num-.long(). | 2025-09-02T00:00:00.000Z | 2026-04-29T14:45:10.000Z |
| msrc_cve-2025-55551 | An issue in the component torch.linalg.lu of pytorch v2.8.0 allows attackers to cause a Denial of Service (DoS) when performing a slice operation. | 2025-09-02T00:00:00.000Z | 2026-04-29T14:44:56.000Z |
| msrc_cve-2026-23473 | io_uring/poll: fix multishot recv missing EOF on wakeup race | 2026-04-02T00:00:00.000Z | 2026-04-29T14:44:47.000Z |
| msrc_cve-2025-29478 | An issue in fluent-bit v.3.7.2 allows a local attacker to cause a denial of service via the cfl_list_size in cfl_list.h:165. | 2025-04-02T00:00:00.000Z | 2026-04-29T14:44:46.000Z |
| msrc_cve-2026-35387 | CVE-2026-35387 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:44:35.000Z |
| msrc_cve-2026-35414 | CVE-2026-35414 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:44:22.000Z |
| msrc_cve-2025-29477 | An issue in fluent-bit v.3.7.2 allows a local attacker to cause a denial of service via the function consume_event. | 2025-04-02T00:00:00.000Z | 2026-04-29T14:44:21.000Z |
| msrc_cve-2026-31444 | ksmbd: fix use-after-free and NULL deref in smb_grant_oplock() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:44:13.000Z |
| msrc_cve-2026-23401 | KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE | 2026-04-02T00:00:00.000Z | 2026-04-29T14:44:05.000Z |
| msrc_cve-2026-31447 | ext4: reject mount if bigalloc with s_first_data_block != 0 | 2026-04-02T00:00:00.000Z | 2026-04-29T14:43:57.000Z |
| msrc_cve-2026-21711 | CVE-2026-21711 | 2026-03-02T00:00:00.000Z | 2026-04-29T14:43:51.000Z |
| msrc_cve-2025-29923 | go-redis allows potential out of order responses when `CLIENT SETINFO` times out during connection establishment | 2025-03-02T00:00:00.000Z | 2026-04-29T14:43:40.000Z |
| msrc_cve-2026-21717 | CVE-2026-21717 | 2026-03-02T00:00:00.000Z | 2026-04-29T14:43:36.000Z |
| msrc_cve-2026-31439 | dmaengine: xilinx: xdma: Fix regmap init error handling | 2026-04-02T00:00:00.000Z | 2026-04-29T14:43:26.000Z |
| msrc_cve-2026-4833 | Orc discount Markdown markdown.c compile recursion | 2026-03-02T00:00:00.000Z | 2026-04-29T14:43:01.000Z |
| msrc_cve-2026-31448 | ext4: avoid infinite loops caused by residual data | 2026-04-02T00:00:00.000Z | 2026-04-29T14:42:49.000Z |
| msrc_cve-2026-4647 | Binutils: out-of-bounds read in xcoff relocation processing in gnu binutils bfd library | 2026-03-02T00:00:00.000Z | 2026-04-29T14:42:28.000Z |
| msrc_cve-2024-7598 | Network restriction bypass via race condition during namespace termination | 2025-03-02T00:00:00.000Z | 2026-04-29T14:42:21.000Z |
| msrc_cve-2026-31591 | KVM: SEV: Lock all vCPUs when synchronzing VMSAs for SNP launch finish | 2026-04-02T00:00:00.000Z | 2026-04-29T14:41:14.000Z |
| msrc_cve-2026-31520 | HID: apple: avoid memory leak in apple_report_fixup() | 2026-04-02T00:00:00.000Z | 2026-04-29T14:40:47.000Z |
| msrc_cve-2026-31446 | ext4: fix use-after-free in update_super_work when racing with umount | 2026-04-02T00:00:00.000Z | 2026-04-29T14:40:33.000Z |
| msrc_cve-2026-33056 | tar-rs: unpack_in can chmod arbitrary directories by following symlinks | 2026-03-02T00:00:00.000Z | 2026-04-29T14:40:11.000Z |
| msrc_cve-2026-31601 | vfio/xe: Reorganize the init to decouple migration from reset | 2026-04-02T00:00:00.000Z | 2026-04-29T14:40:06.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0293 | Kwetsbaarheden verholpen in Oracle Communications Applications | 2024-07-17T13:52:33.045762Z | 2024-07-17T13:52:33.045762Z |
| ncsc-2024-0292 | Kwetsbaarheden verholpen in Oracle Essbase | 2024-07-17T13:52:18.885359Z | 2024-07-17T13:52:18.885359Z |
| ncsc-2024-0291 | Kwetsbaarheden verholpen in Oracle Database Server | 2024-07-17T13:51:54.185475Z | 2024-07-17T13:51:54.185475Z |
| ncsc-2024-0290 | Kwetsbaarheden verholpen in Juniper Junos OS en Junos OS Evolved | 2024-07-12T11:43:27.625950Z | 2024-07-12T11:43:27.625950Z |
| ncsc-2024-0288 | Kwetsbaarheden verholpen in Citrix Workspace, NetScaler ADC en NetScaler Gateway | 2024-07-10T13:54:21.933605Z | 2024-07-11T15:05:36.608570Z |
| ncsc-2024-0289 | Kwetsbaarheid verholpen in GitLab CE/EE | 2024-07-11T08:22:44.417794Z | 2024-07-11T08:22:44.417794Z |
| ncsc-2024-0287 | Kwetsbaarheden verholpen in Fortinet | 2024-07-10T08:27:35.622919Z | 2024-07-10T08:27:35.622919Z |
| ncsc-2024-0286 | Kwetsbaarheid verholpen in Microsoft System Center Defender for IoT | 2024-07-09T19:39:17.911628Z | 2024-07-09T19:39:17.911628Z |
| ncsc-2024-0285 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-07-09T19:38:21.052004Z | 2024-07-09T19:38:21.052004Z |
| ncsc-2024-0284 | Kwetsbaarheden verholpen in Microsoft Office | 2024-07-09T19:37:26.015768Z | 2024-07-09T19:37:26.015768Z |
| ncsc-2024-0283 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-07-09T18:46:27.237285Z | 2024-07-09T18:46:27.237285Z |
| ncsc-2024-0282 | Kwetsbaarheden verholpen in Siemens Producten | 2024-07-09T18:40:57.534939Z | 2024-07-09T18:40:57.534939Z |
| ncsc-2024-0281 | Kwetsbaarheden verholpen in Microsoft Windows SQL Server | 2024-07-09T18:40:47.989197Z | 2024-07-09T18:40:47.989197Z |
| ncsc-2024-0280 | Kwetsbaarheid verholpen in Microsoft Dynamics | 2024-07-09T18:40:31.321704Z | 2024-07-09T18:40:31.321704Z |
| ncsc-2024-0279 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-07-09T18:40:21.043319Z | 2024-07-09T18:40:21.043319Z |
| ncsc-2024-0274 | Kwetsbaarheid verholpen in GeoServer | 2024-07-02T11:40:34.048090Z | 2024-07-05T09:41:10.197056Z |
| ncsc-2024-0270 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-06-27T13:09:06.950898Z | 2024-07-04T06:45:26.935999Z |
| ncsc-2024-0278 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-07-03T07:21:50.013074Z | 2024-07-03T07:21:50.013074Z |
| ncsc-2024-0277 | Kwetsbaarheid verholpen in Juniper JunOS | 2024-07-03T07:16:21.498075Z | 2024-07-03T07:16:21.498075Z |
| ncsc-2024-0276 | Kwetsbaarheden verholpen in Splunk | 2024-07-02T13:15:06.374293Z | 2024-07-02T13:15:06.374293Z |
| ncsc-2024-0275 | Kwetsbaarheden verholpen in Apache HHTP-server | 2024-07-02T11:44:22.653047Z | 2024-07-02T11:44:22.653047Z |
| ncsc-2024-0273 | Kwetsbaarheden ontdekt in Kiloview P1 4G Video Encoder en P2 4G Video Encoder | 2024-07-02T07:04:39.395441Z | 2024-07-02T07:04:39.395441Z |
| ncsc-2024-0272 | Kwetsbaarheid verholpen in OpenSSH | 2024-07-01T12:21:57.127505Z | 2024-07-01T15:37:23.231069Z |
| ncsc-2024-0255 | Kwetsbaarheden verholpen in Adobe Commerce | 2024-06-13T13:36:13.246216Z | 2024-07-01T07:10:59.549847Z |
| ncsc-2024-0271 | Kwetsbaarheid verholpen in Juniper Session Smart Router | 2024-06-28T09:55:17.082602Z | 2024-06-28T09:55:17.082602Z |
| ncsc-2024-0267 | Kwetsbaarheden verholpen in Progress MOVEit | 2024-06-26T07:27:55.195431Z | 2024-06-26T08:58:01.371553Z |
| ncsc-2024-0266 | Kwetsbaarheden verholpen in WordPress | 2024-06-25T12:19:50.298884Z | 2024-06-25T12:19:50.298884Z |
| ncsc-2024-0265 | Kwetsbaarheid verholpen in XWiki | 2024-06-25T10:17:56.645201Z | 2024-06-25T10:17:56.645201Z |
| ncsc-2024-0264 | Kwetsbaarheden verholpen in Avaya IP Office | 2024-06-25T10:17:16.686897Z | 2024-06-25T10:17:16.686897Z |
| ncsc-2024-0263 | Kwetsbaarheden verholpen in Autodesk Autocad | 2024-06-20T14:09:54.121906Z | 2024-06-20T14:09:54.121906Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20133-1 | Security update for glibc | 2026-01-29T17:44:57Z | 2026-01-29T17:44:57Z |
| opensuse-su-2026:20137-1 | Security update for openvpn | 2026-01-29T16:14:38Z | 2026-01-29T16:14:38Z |
| opensuse-su-2026:20136-1 | Security update for gpg2 | 2026-01-29T16:14:38Z | 2026-01-29T16:14:38Z |
| opensuse-su-2026:20132-1 | Security update for elemental-register, elemental-toolkit | 2026-01-29T15:32:26Z | 2026-01-29T15:32:26Z |
| opensuse-su-2026:20127-1 | Security update for python-urllib3 | 2026-01-29T14:48:50Z | 2026-01-29T14:48:50Z |
| opensuse-su-2026:20130-1 | Security update for postgresql16 | 2026-01-29T10:55:17Z | 2026-01-29T10:55:17Z |
| opensuse-ru-2026:20129-1 | Recommended update for cloud-init | 2026-01-29T10:30:03Z | 2026-01-29T10:30:03Z |
| opensuse-su-2026:10118-1 | xen-4.21.0_04-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10117-1 | python314-3.14.2-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10116-1 | python311-pypdf-6.6.2-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10115-1 | python311-djangorestframework-3.16.1-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10114-1 | logback-1.2.13-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10113-1 | icinga2-2.15.2-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10112-1 | dirmngr-2.5.17-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10111-1 | gio-branding-upstream-2.86.3-3.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:20126-1 | Security update for java-21-openjdk | 2026-01-28T16:43:12Z | 2026-01-28T16:43:12Z |
| opensuse-su-2026:20125-1 | Security update for python-python-multipart | 2026-01-28T16:07:51Z | 2026-01-28T16:07:51Z |
| opensuse-su-2026:20124-1 | Security update for ucode-amd | 2026-01-28T16:01:59Z | 2026-01-28T16:01:59Z |
| opensuse-su-2026:20122-1 | Security update for python-h2 | 2026-01-28T15:52:29Z | 2026-01-28T15:52:29Z |
| opensuse-su-2026:20123-1 | Security update for xkbcomp | 2026-01-28T15:47:30Z | 2026-01-28T15:47:30Z |
| opensuse-su-2026:20120-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-01-28T10:27:58Z | 2026-01-28T10:27:58Z |
| opensuse-su-2026:20119-1 | Security update for python-FontTools | 2026-01-28T09:58:53Z | 2026-01-28T09:58:53Z |
| opensuse-su-2026:20118-1 | Security update for ImageMagick | 2026-01-28T08:27:48Z | 2026-01-28T08:27:48Z |
| opensuse-su-2026:10110-1 | python311-salt-3006.0-55.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:10109-1 | python311-sse-starlette-3.2.0-1.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:10108-1 | java-25-openjdk-25.0.2.0-1.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:10107-1 | freerdp-3.21.0-1.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:10106-1 | assertj-core-3.27.7-1.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:20117-1 | Security update for cockpit-subscriptions | 2026-01-27T20:37:55Z | 2026-01-27T20:37:55Z |
| opensuse-ru-2026:20161-1 | Recommended update for hauler | 2026-01-27T17:25:17Z | 2026-01-27T17:25:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:1616 | Red Hat Security Advisory: Run Once Duration Override Operator for Red Hat OpenShift 1.1.1 for RHEL 9 | 2024-07-01T00:28:51+00:00 | 2026-05-09T20:42:55+00:00 |
| rhsa-2024:1574 | Red Hat Security Advisory: OpenShift Container Platform 4.12.54 packages and security update | 2024-04-03T07:42:00+00:00 | 2026-05-09T20:42:54+00:00 |
| rhsa-2024:1572 | Red Hat Security Advisory: OpenShift Container Platform 4.12.54 bug fix and security update | 2024-04-03T06:57:46+00:00 | 2026-05-09T20:42:54+00:00 |
| rhsa-2024:1563 | Red Hat Security Advisory: OpenShift Container Platform 4.15.6 packages and security update | 2024-04-02T21:42:24+00:00 | 2026-05-09T20:42:54+00:00 |
| rhsa-2024:1559 | Red Hat Security Advisory: OpenShift Container Platform 4.15.6 bug fix and security update | 2024-04-02T19:33:26+00:00 | 2026-05-09T20:42:53+00:00 |
| rhsa-2024:1538 | Red Hat Security Advisory: OpenShift Container Platform 4.12 low-latency extras security update | 2024-03-27T15:07:29+00:00 | 2026-05-09T20:42:53+00:00 |
| rhsa-2024:1537 | Red Hat Security Advisory: OpenShift Container Platform 4.13.38 low-latency extras security update | 2024-03-27T15:03:41+00:00 | 2026-05-09T20:42:53+00:00 |
| rhsa-2024:1508 | Red Hat Security Advisory: logging for Red Hat OpenShift security update | 2024-03-27T14:39:42+00:00 | 2026-05-09T20:42:52+00:00 |
| rhsa-2024:1507 | Red Hat Security Advisory: logging for Red Hat OpenShift security update | 2024-03-27T14:21:24+00:00 | 2026-05-09T20:42:51+00:00 |
| rhsa-2024:1474 | Red Hat Security Advisory: logging for Red Hat OpenShift security update | 2024-03-27T15:00:48+00:00 | 2026-05-09T20:42:51+00:00 |
| rhsa-2024:1454 | Red Hat Security Advisory: OpenShift Container Platform 4.13.38 bug fix and security update | 2024-03-27T00:32:17+00:00 | 2026-05-09T20:42:51+00:00 |
| rhsa-2024:1464 | Red Hat Security Advisory: OpenShift Container Platform 4.11.59 bug fix and security update | 2024-03-27T19:51:20+00:00 | 2026-05-09T20:42:50+00:00 |
| rhsa-2024:1461 | Red Hat Security Advisory: OpenShift Container Platform 4.14.18 packages and security update | 2024-03-27T00:45:48+00:00 | 2026-05-09T20:42:50+00:00 |
| rhsa-2024:1458 | Red Hat Security Advisory: OpenShift Container Platform 4.14.18 bug fix and security update | 2024-03-27T00:25:36+00:00 | 2026-05-09T20:42:50+00:00 |
| rhsa-2024:1456 | Red Hat Security Advisory: OpenShift Container Platform 4.13.38 packages and security update | 2024-03-27T00:46:13+00:00 | 2026-05-09T20:42:48+00:00 |
| rhsa-2024:1449 | Red Hat Security Advisory: OpenShift Container Platform 4.15.5 bug fix and security update | 2024-03-27T11:18:26+00:00 | 2026-05-09T20:42:47+00:00 |
| rhsa-2024:1363 | Red Hat Security Advisory: OpenShift Container Platform 4.15.3 low-latency extras security update | 2024-03-19T22:11:56+00:00 | 2026-05-09T20:42:46+00:00 |
| rhsa-2024:10813 | Red Hat Security Advisory: OpenShift Container Platform 4.13.54 bug fix and security update | 2024-12-12T02:08:06+00:00 | 2026-05-09T20:42:46+00:00 |
| rhsa-2024:1362 | Red Hat Security Advisory: OpenShift Container Platform 4.14.17 low-latency extras security update | 2024-03-20T11:40:31+00:00 | 2026-05-09T20:42:45+00:00 |
| rhsa-2024:10852 | Red Hat Security Advisory: RHOAI 2.16.0 - Red Hat OpenShift AI | 2024-12-05T14:54:56+00:00 | 2026-05-09T20:42:44+00:00 |
| rhsa-2024:10523 | Red Hat Security Advisory: OpenShift Container Platform 4.14.42 bug fix and security update | 2024-12-05T00:33:01+00:00 | 2026-05-09T20:42:42+00:00 |
| rhsa-2024:1052 | Red Hat Security Advisory: OpenShift Container Platform 4.12.51 bug fix and security update | 2024-03-06T00:38:22+00:00 | 2026-05-09T20:42:41+00:00 |
| rhsa-2024:1037 | Red Hat Security Advisory: OpenShift Container Platform 4.13.36 bug fix and security update | 2024-03-06T14:46:43+00:00 | 2026-05-09T20:42:41+00:00 |
| rhsa-2024:10147 | Red Hat Security Advisory: OpenShift Container Platform 4.16.24 security update | 2024-11-26T18:45:35+00:00 | 2026-05-09T20:42:40+00:00 |
| rhsa-2024:10142 | Red Hat Security Advisory: OpenShift Container Platform 4.15.39 bug fix and security update | 2024-11-26T11:17:01+00:00 | 2026-05-09T20:42:40+00:00 |
| rhsa-2024:0954 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 10.15.0 security update | 2024-02-27T15:16:25+00:00 | 2026-05-09T20:42:40+00:00 |
| rhsa-2024:0946 | Red Hat Security Advisory: OpenShift Container Platform 4.13.35 security update | 2024-02-28T14:03:56+00:00 | 2026-05-09T20:42:37+00:00 |
| rhsa-2024:0941 | Red Hat Security Advisory: OpenShift Container Platform 4.14.14 bug fix and security update | 2024-02-28T00:21:13+00:00 | 2026-05-09T20:42:37+00:00 |
| rhsa-2024:0837 | Red Hat Security Advisory: OpenShift Container Platform 4.14.13 security update | 2024-02-20T15:27:06+00:00 | 2026-05-09T20:42:36+00:00 |
| rhsa-2024:0833 | Red Hat Security Advisory: OpenShift Container Platform 4.12.50 bug fix and security update | 2024-02-21T01:44:15+00:00 | 2026-05-09T20:42:35+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-562051 | SSA-562051: Cross-Site Scripting Vulnerability in Polarion ALM | 2022-03-08T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-535640 | SSA-535640: Vulnerability in Industrial Products | 2017-08-30T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-392912 | SSA-392912: Multiple Denial Of Service Vulnerabilities in SCALANCE W1700 Devices | 2022-04-12T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-350757 | SSA-350757: Improper Access Control Vulnerability in TIA Portal Affecting S7-1200 and S7-1500 CPUs Web Server (Incl. Related ET200 CPUs and SIPLUS variants) | 2022-04-12T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-348629 | SSA-348629: Denial-of-Service Vulnerability in SIMATIC PCS 7, SIMATIC WinCC, SIMATIC WinCC Runtime Professional and SIMATIC NET PC Software | 2018-03-27T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-316850 | SSA-316850: Unauthenticated File Access in SICAM A8000 Devices | 2022-04-12T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-273799 | SSA-273799: Message Integrity Protection Bypass Vulnerability in SIMATIC Products | 2019-12-10T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-703715 | SSA-703715: Information Disclosure Vulnerability in Climatix POL909 (AWM and AWB) | 2021-11-09T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-669158 | SSA-669158: DNS Client Vulnerabilities in SIMOTICS CONNECT 400 | 2021-04-13T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-594438 | SSA-594438: Remote Code Execution and Denial-of-Service Vulnerability in multiple RUGGEDCOM ROX products | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-541018 | SSA-541018: Embedded TCP/IP Stack Vulnerabilities (AMNESIA:33) in SENTRON PAC / 3VA Devices (Part 2) | 2021-03-09T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-534763 | SSA-534763: Special Register Buffer Data Sampling (SRBDS) aka Crosstalk in Industrial Products | 2020-09-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-501073 | SSA-501073: Vulnerabilities in Controllers CPU 1518 MFP using Intel CPUs (November 2020) | 2021-05-11T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-415938 | SSA-415938: Improper Access Control Vulnerability in Mendix | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-406691 | SSA-406691: Buffer Vulnerabilities in DHCP function of RUGGEDCOM ROX products | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-389290 | SSA-389290: Third-Party Component Vulnerabilities in SINEC INS | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-337210 | SSA-337210: Privilege Escalation Vulnerability in SINUMERIK MC | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-252466 | SSA-252466: Multiple Vulnerabilities in Climatix POL909 (AWM and AWB) | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-223353 | SSA-223353: Multiple Vulnerabilities in Nucleus RTOS based SIMOTICS CONNECT 400 | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-166747 | SSA-166747: Scene File Parsing Vulnerability in Simcenter STAR-CCM+ Viewer before V2022.1 | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-155599 | SSA-155599: File Parsing Vulnerabilities in COMOS | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-134279 | SSA-134279: Vulnerability in Mendix Forgot Password Appstore module | 2022-03-08T00:00:00Z | 2022-03-08T00:00:00Z |
| ssa-949188 | SSA-949188: File Parsing Vulnerabilities in Simcenter Femap before V2022.1.1 | 2022-02-17T00:00:00Z | 2022-02-17T00:00:00Z |
| ssa-455843 | SSA-455843: WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens Products | 2020-09-08T00:00:00Z | 2022-02-17T00:00:00Z |
| ssa-831168 | SSA-831168: Cross-Site Scripting Vulnerability in Spectrum Power 4 | 2022-02-08T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-714170 | SSA-714170: Apache Log4j Vulnerabilities (Log4Shell, CVE-2021-44228, CVE-2021-45046) - Impact to SPPA-T3000 | 2021-12-16T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-675303 | SSA-675303: WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens Products | 2021-07-13T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-654775 | SSA-654775: Open Redirect Vulnerability in SINEMA Remote Connect Server | 2022-02-08T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-609880 | SSA-609880: File Parsing Vulnerabilities in Simcenter Femap before V2022.1 | 2022-02-08T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-316383 | SSA-316383: NumberJack Vulnerability in LOGO! CMR and SIMATIC RTU 3000 devices | 2021-09-14T00:00:00Z | 2022-02-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1095-1 | Security update for vim | 2026-04-07T14:35:54Z | 2026-04-07T14:35:54Z |
| suse-su-2026:0910-1 | Security update for vim | 2026-04-07T14:35:08Z | 2026-04-07T14:35:08Z |
| suse-su-2026:21142-1 | Security update for libtasn1 | 2026-04-07T14:32:32Z | 2026-04-07T14:32:32Z |
| suse-su-2026:21001-1 | Security update for libtasn1 | 2026-04-07T14:32:32Z | 2026-04-07T14:32:32Z |
| suse-su-2026:1206-1 | Security update for python | 2026-04-07T14:18:48Z | 2026-04-07T14:18:48Z |
| suse-su-2026:1203-1 | Security update for ImageMagick | 2026-04-07T12:24:55Z | 2026-04-07T12:24:55Z |
| suse-su-2026:1202-1 | Security update for ImageMagick | 2026-04-07T12:24:42Z | 2026-04-07T12:24:42Z |
| suse-su-2026:1201-1 | Security update for ImageMagick | 2026-04-07T12:24:24Z | 2026-04-07T12:24:24Z |
| suse-su-2026:21140-1 | Security update for tigervnc | 2026-04-07T12:17:02Z | 2026-04-07T12:17:02Z |
| suse-su-2026:21141-1 | Security update for cockpit-packages | 2026-04-07T12:17:01Z | 2026-04-07T12:17:01Z |
| suse-su-2026:21139-1 | Security update for python-cbor2 | 2026-04-07T11:57:32Z | 2026-04-07T11:57:32Z |
| suse-su-2026:21138-1 | Security update for libpng16 | 2026-04-07T11:57:32Z | 2026-04-07T11:57:32Z |
| suse-su-2026:21000-1 | Security update for libpng16 | 2026-04-07T11:57:32Z | 2026-04-07T11:57:32Z |
| suse-su-2026:1200-1 | Security update for ignition | 2026-04-07T11:50:19Z | 2026-04-07T11:50:19Z |
| suse-su-2026:20969-1 | Security update for polkit | 2026-04-07T11:50:03Z | 2026-04-07T11:50:03Z |
| suse-su-2026:21032-1 | Security update for polkit | 2026-04-07T11:36:08Z | 2026-04-07T11:36:08Z |
| suse-su-2026:21031-1 | Security update for expat | 2026-04-07T11:09:30Z | 2026-04-07T11:09:30Z |
| suse-su-2026:1199-1 | Security update for python-PyJWT | 2026-04-07T10:25:37Z | 2026-04-07T10:25:37Z |
| suse-su-2026:1198-1 | Security update for ignition | 2026-04-07T10:25:22Z | 2026-04-07T10:25:22Z |
| suse-su-2026:1197-1 | Security update for ignition | 2026-04-07T10:25:02Z | 2026-04-07T10:25:02Z |
| suse-su-2026:1195-1 | Security update for google-cloud-sap-agent | 2026-04-07T09:25:22Z | 2026-04-07T09:25:22Z |
| suse-su-2026:1194-1 | Security update for google-cloud-sap-agent | 2026-04-07T09:25:07Z | 2026-04-07T09:25:07Z |
| suse-su-2026:1193-1 | Security update for gimp | 2026-04-07T08:40:15Z | 2026-04-07T08:40:15Z |
| suse-su-2026:1192-1 | Security update for python-pyOpenSSL | 2026-04-07T08:39:34Z | 2026-04-07T08:39:34Z |
| suse-su-2026:1191-1 | Security update for avahi | 2026-04-06T10:53:58Z | 2026-04-06T10:53:58Z |
| suse-su-2026:1189-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise 15 SP7) | 2026-04-05T10:34:20Z | 2026-04-05T10:34:20Z |
| suse-su-2026:1188-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 2026-04-05T10:34:17Z | 2026-04-05T10:34:17Z |
| suse-su-2026:1187-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise 15 SP7) | 2026-04-05T10:04:24Z | 2026-04-05T10:04:24Z |
| suse-su-2026:20997-1 | Security update for cockpit-repos | 2026-04-05T03:01:00Z | 2026-04-05T03:01:00Z |
| suse-su-2026:20973-1 | Security update for cockpit-repos | 2026-04-05T03:01:00Z | 2026-04-05T03:01:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:18320 | Important: thunderbird security update | 2025-10-20T00:00:00Z | 2025-10-22T10:33:35Z |
| alsa-2025:18318 | Moderate: kernel security update | 2025-10-20T00:00:00Z | 2025-10-22T10:27:59Z |
| alsa-2025:18281 | Moderate: kernel security update | 2025-10-20T00:00:00Z | 2025-10-22T10:16:53Z |
| alsa-2025:17163 | Moderate: perl-JSON-XS security update | 2025-10-01T00:00:00Z | 2025-10-20T12:34:11Z |
| alsa-2025:17162 | Moderate: perl-JSON-XS security update | 2025-10-01T00:00:00Z | 2025-10-20T12:33:11Z |
| alsa-2025:18155 | Important: firefox security update | 2025-10-15T00:00:00Z | 2025-10-20T12:31:42Z |
| alsa-2025:18154 | Important: firefox security update | 2025-10-15T00:00:00Z | 2025-10-20T12:30:08Z |
| alsa-2025:18149 | Important: .NET 8.0 security update | 2025-10-15T00:00:00Z | 2025-10-20T12:28:15Z |
| alsa-2025:18148 | Important: .NET 8.0 security update | 2025-10-15T00:00:00Z | 2025-10-20T12:11:02Z |
| alsa-2025:18298 | Moderate: kernel-rt security update | 2025-10-20T00:00:00Z | 2025-10-20T12:08:20Z |
| alsa-2025:18297 | Moderate: kernel security update | 2025-10-20T00:00:00Z | 2025-10-20T12:01:40Z |
| alsa-2025:18286 | Moderate: libssh security update | 2025-10-20T00:00:00Z | 2025-10-20T11:55:49Z |
| alsa-2025:18285 | Important: firefox security update | 2025-10-20T00:00:00Z | 2025-10-20T11:50:28Z |
| alsa-2025:17776 | Moderate: kernel security update | 2025-10-13T00:00:00Z | 2025-10-17T09:45:53Z |
| alsa-2025:18275 | Moderate: libssh security update | 2025-10-16T00:00:00Z | 2025-10-17T08:04:25Z |
| alsa-2025:18231 | Moderate: libssh security update | 2025-10-16T00:00:00Z | 2025-10-16T14:22:59Z |
| alsa-2025:18183 | Important: libsoup3 security update | 2025-10-15T00:00:00Z | 2025-10-16T08:01:45Z |
| alsa-2025:17760 | Moderate: kernel security update | 2025-10-13T00:00:00Z | 2025-10-16T07:33:20Z |
| alsa-2025:17742 | Moderate: vim security update | 2025-10-13T00:00:00Z | 2025-10-14T13:35:06Z |
| alsa-2025:17913 | Moderate: vim security update | 2025-10-14T00:00:00Z | 2025-10-14T13:33:05Z |
| alsa-2025:17797 | Moderate: kernel security update | 2025-10-13T00:00:00Z | 2025-10-14T10:15:00Z |
| alsa-2025:17802 | Important: webkit2gtk3 security update | 2025-10-13T00:00:00Z | 2025-10-14T10:09:21Z |
| alsa-2025:17812 | Moderate: kernel-rt security update | 2025-10-13T00:00:00Z | 2025-10-14T07:28:37Z |
| alsa-2025:17675 | Important: compat-libtiff3 security update | 2025-10-09T00:00:00Z | 2025-10-13T10:06:16Z |
| alsa-2025:17558 | Moderate: iputils security update | 2025-10-08T00:00:00Z | 2025-10-13T08:54:54Z |
| alsa-2025:17715 | Moderate: vim security update | 2025-10-09T00:00:00Z | 2025-10-13T08:30:41Z |
| alsa-2025:17428 | Important: open-vm-tools security update | 2025-10-07T00:00:00Z | 2025-10-13T08:28:00Z |
| alsa-2025:17396 | Moderate: kernel security update | 2025-10-06T00:00:00Z | 2025-10-09T07:54:11Z |
| alsa-2025:17377 | Moderate: kernel security update | 2025-10-06T00:00:00Z | 2025-10-09T07:42:18Z |
| alsa-2025:17429 | Important: open-vm-tools security update | 2025-10-07T00:00:00Z | 2025-10-08T11:21:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-477 | Heap-buffer-overflow in ultrahdr::gain_map_metadata::decodeGainmapMetadata | 2024-05-16T00:07:25.350135Z | 2024-05-16T00:07:25.350518Z |
| osv-2024-476 | Heap-buffer-overflow in ultrahdr::getYuv420Pixel | 2024-05-16T00:01:52.617825Z | 2024-05-16T00:01:52.618175Z |
| osv-2024-471 | Use-of-uninitialized-value in vpx_codec_peek_stream_info | 2024-05-15T00:02:46.464995Z | 2024-05-15T00:02:46.465573Z |
| osv-2024-469 | Heap-buffer-overflow in check_content_type_and_change_protocol | 2024-05-13T00:06:08.552810Z | 2024-05-13T00:06:08.553286Z |
| osv-2024-402 | Stack-buffer-overflow in SwiftProtobuf.TextFormatScanner. | 2024-05-03T00:00:37.545228Z | 2024-05-10T00:00:37.545806Z |
| osv-2024-432 | Use-of-uninitialized-value in ssl_ctx_make_profiles | 2024-05-05T00:15:04.589857Z | 2024-05-08T03:26:30Z |
| osv-2024-430 | Use-of-uninitialized-value in ssl_str_to_group_ids | 2024-05-05T00:14:35.047133Z | 2024-05-08T03:26:30Z |
| osv-2024-417 | Use-of-uninitialized-value in bssl::ssl_cipher_process_rulestr | 2024-05-05T00:05:37.413119Z | 2024-05-08T03:26:30Z |
| osv-2023-41 | Heap-use-after-free in sk_num | 2023-02-02T13:00:19.898084Z | 2024-05-08T03:26:30.000000Z |
| osv-2018-206 | Heap-buffer-overflow in parse_sigalgs_list | 2021-01-13T00:01:24.412685Z | 2024-05-08T03:26:30.000000Z |
| osv-2018-13 | Use-of-uninitialized-value in bn_sub_words | 2021-01-13T00:00:05.629092Z | 2024-05-08T03:26:30.000000Z |
| osv-2024-453 | Use-of-uninitialized-value in encode_base64_differential | 2024-05-08T00:15:55.868630Z | 2024-05-08T00:15:55.868890Z |
| osv-2024-450 | Use-of-uninitialized-value in ink_filepath_merge | 2024-05-08T00:13:15.436703Z | 2024-05-08T00:13:15.437003Z |
| osv-2024-449 | Use-of-uninitialized-value in YAML::Stream::Stream | 2024-05-08T00:10:19.320498Z | 2024-05-08T00:10:19.320806Z |
| osv-2024-434 | Use-of-uninitialized-value in validate_bluetooth_device_address | 2024-05-05T00:16:24.885047Z | 2024-05-05T00:16:24.885336Z |
| osv-2024-431 | Use-of-uninitialized-value in Lexer::ReadToken | 2024-05-05T00:14:47.078358Z | 2024-05-05T00:14:47.078742Z |
| osv-2024-423 | Use-of-uninitialized-value in Lexer::Error | 2024-05-05T00:12:07.769152Z | 2024-05-05T00:12:07.769622Z |
| osv-2024-422 | Use-of-uninitialized-value in cdc_task | 2024-05-05T00:07:53.114978Z | 2024-05-05T00:07:53.115405Z |
| osv-2024-420 | Use-of-uninitialized-value in Lexer::Error | 2024-05-05T00:06:56.111677Z | 2024-05-05T00:06:56.112011Z |
| osv-2024-409 | Use-of-uninitialized-value in Lexer::ReadToken | 2024-05-05T00:02:40.009382Z | 2024-05-05T00:02:40.009837Z |
| osv-2024-404 | Use-of-uninitialized-value in avifSequenceHeaderParse | 2024-05-04T00:03:34.449449Z | 2024-05-04T00:03:34.449922Z |
| osv-2024-403 | UNKNOWN READ in mem_planar_put_image_slow | 2024-05-04T00:02:34.636950Z | 2024-05-04T00:02:34.637538Z |
| osv-2024-294 | Segv on unknown address in gx_device_forward_finalize | 2024-04-24T00:03:38.661938Z | 2024-05-02T14:25:23.611452Z |
| osv-2024-389 | Heap-buffer-overflow in JS_CallInternal | 2024-04-30T00:14:11.245997Z | 2024-04-30T00:14:11.246314Z |
| osv-2024-359 | Security exception in graphql.schema.GraphQLTypeUtil.simplePrint | 2024-04-30T00:05:50.949087Z | 2024-04-30T00:05:50.949438Z |
| osv-2023-728 | Use-of-uninitialized-value in aesEncryptBlock | 2023-08-24T14:00:27.838220Z | 2024-04-29T14:13:55.378729Z |
| osv-2023-675 | Heap-use-after-free in parse_options | 2023-08-09T14:02:25.748940Z | 2024-04-29T14:13:24.917092Z |
| osv-2023-460 | Segv on unknown address in config__bridge_cleanup | 2023-06-06T14:00:25.983874Z | 2024-04-29T14:12:09.500082Z |
| osv-2024-80 | Stack-buffer-overflow in line_join_points | 2024-02-07T00:03:02.923052Z | 2024-04-29T11:39:24.480321Z |
| osv-2024-73 | Heap-buffer-overflow in pdf_finalize_string | 2024-02-04T00:02:39.648902Z | 2024-04-29T11:36:07.742568Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0133 | Queue<T> should have a Send bound on its Send/Sync traits | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0132 | `FixedCapacityDequeLike::clone()` can cause dropping uninitialized memory | 2020-12-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0131 | Send/Sync bound needed on T for Send/Sync impl of RcuCell<T> | 2020-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0130 | Bunch<T> unconditionally implements Send/Sync | 2020-11-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0129 | ShmWriter allows sending non-Send type across threads | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0128 | Cache<K>: Send/Sync impls needs trait bounds on `K` | 2020-11-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0127 | SyncRef's clone() and debug() allow data races | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0126 | SyncChannel<T> can move 'T: !Send' to other threads | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0125 | convec::ConVec<T> unconditionally implements Send/Sync | 2020-11-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0124 | ArcGuard's Send and Sync should have bounds on RC | 2020-12-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0123 | Contents of uninitialized memory exposed in DeflateOutput's AsyncRead implementation | 2020-01-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0122 | beef::Cow lacks a Sync bound on its Send trait allowing for data races | 2020-10-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0121 | AtomicBox<T> implements Send/Sync for any `T: Sized` | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0120 | `Decoder<R>` can carry `R: !Send` to other threads | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0119 | ReadTicket and WriteTicket should only be sendable when T is Send | 2020-11-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0118 | Future<T> lacks bounds on Send and Sync. | 2020-12-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0117 | QueueSender<T>/QueueReceiver<T>: Send/Sync impls need `T: Send` | 2020-11-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0116 | PinSlab<T> and Unordered<T, S> need bounds on their Send/Sync traits | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0115 | Singleton lacks bounds on Send and Sync. | 2020-11-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0114 | `Demuxer` can carry non-Send types across thread boundaries | 2020-12-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0113 | AtomicOption should have Send + Sync bound on its type argument. | 2020-10-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0112 | ButtplugFutureStateShared allows data race to (!Send|!Sync) objects | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0108 | Soundness issue: Input<R> can be misused to create data race to an object | 2020-12-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0107 | hashconsing's HConsed lacks Send/Sync bound for its Send/Sync trait. | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0106 | Queues allow non-Send types to be sent to other threads, allowing data races | 2020-12-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0105 | Update unsound DrainFilter and RString::retain | 2020-12-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0104 | ImageChunkMut needs bounds on its Send and Sync traits | 2020-12-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0103 | `impl Random` on arrays can lead to dropping uninitialized memory | 2020-12-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0102 | LateStatic has incorrect Sync bound | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0101 | conquer-once's OnceCell lacks Send bound for its Sync trait. | 2020-12-22T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-jenkins-2026-33002 | 2026-03-20T09:15:13.235Z | 2026-03-31T18:23:47.490Z | |
| bit-mastodon-2026-33869 | Mastodon has a denial of service for quote authorization | 2026-03-31T08:45:37.827Z | 2026-03-31T09:14:23.567Z |
| bit-mastodon-2026-33868 | Mastodon has a GET-Based Open Redirect via '/web/%2F<domain>' | 2026-03-31T08:45:35.531Z | 2026-03-31T09:14:23.567Z |
| bit-gitlab-2026-3857 | Cross-Site Request Forgery (CSRF) in GitLab | 2026-03-27T12:15:15.885Z | 2026-03-31T09:14:23.567Z |
| bit-gitlab-2026-2370 | Improper Handling of Parameters in GitLab | 2026-03-31T09:12:36.844Z | 2026-03-31T09:14:23.567Z |
| bit-nats-2026-33249 | NATS: Message tracing can be redirected to arbitrary subject | 2026-03-30T11:45:25.356Z | 2026-03-30T12:13:12.971Z |
| bit-nats-2026-33248 | NATS has mTLS verify_and_map authentication bypass via incorrect Subject DN matching | 2026-03-27T17:45:26.680Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33247 | NATS credentials are exposed in monitoring port via command-line argv | 2026-03-27T17:45:24.871Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33246 | NATS: Leafnode connections allow spoofing of Nats-Request-Info identity headers | 2026-03-27T17:45:23.082Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33223 | NATS Server: Incomplete Stripping of Nats-Request-Info Header Allows Identity Spoofing | 2026-03-27T17:45:21.527Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33222 | NATS JetStream has an authorization bypass through its Management API | 2026-03-27T17:45:19.827Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33219 | NATS is vulnerable to pre-auth DoS through WebSockets client service | 2026-03-27T17:45:18.190Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33218 | NATS has pre-auth server panic via leafnode handling | 2026-03-27T17:45:16.655Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33217 | NATS allows MQTT clients to bypass ACL checks | 2026-03-27T17:45:15.042Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33216 | NATS has MQTT plaintext password disclosure | 2026-03-27T17:45:13.444Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-29785 | NATS Server panic via malicious compression on leafnode port | 2026-03-27T17:45:10.061Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33215 | NATS is vulnerable to MQTT hijacking via Client ID | 2026-03-27T07:08:53.339Z | 2026-03-27T12:16:52.978Z |
| bit-nats-2026-27889 | NATS: Pre-auth remote server crash via WebSocket frame length overflow in wsRead | 2026-03-27T11:47:22.988Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-4363 | Incorrect Authorization in GitLab | 2026-03-27T12:15:19.935Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-3988 | Inefficient Algorithmic Complexity in GitLab | 2026-03-27T12:15:17.809Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2995 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab | 2026-03-27T12:15:11.976Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2973 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-03-27T12:15:10.065Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2745 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2026-03-27T12:15:06.072Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2726 | Incorrect Authorization in GitLab | 2026-03-27T12:15:04.107Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-1724 | Missing Authentication for Critical Function in GitLab | 2026-03-27T12:14:54.117Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-14595 | Missing Authorization in GitLab | 2026-03-27T12:11:45.074Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13436 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-27T12:11:11.989Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13078 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-27T12:11:08.026Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33413 | etcd: Authorization bypasses in multiple APIs | 2026-03-27T11:39:27.916Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33343 | etcd: Nested etcd transactions bypass RBAC authorization checks | 2026-03-27T11:39:26.076Z | 2026-03-27T12:16:52.978Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ez98723 | Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a ... | 2026-01-30T14:21:51.714006Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ez55127 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:54:23.021613Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ew68942 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:53:53.713652Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-er42900 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T15:41:23.817747Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-el98096 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T17:35:58.312765Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-el98016 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:23:23.257385Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ek72220 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:24:55.137022Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ej58111 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:50:24.547860Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ec15228 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.964872Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dy37532 | Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability | 2026-01-30T15:36:23.811582Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dv06422 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:40:54.415037Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dp30290 | processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input | 2026-01-30T15:52:54.729374Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-do68350 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:50:22.886394Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-do54415 | Within HostnameError | 2026-01-30T15:33:23.703184Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dn37053 | Within HostnameError | 2026-01-30T16:30:25.711037Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dn29911 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-01-30T16:57:26.436107Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dl37890 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:36:22.812571Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dj71086 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-01-30T16:26:55.342548Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-di91874 | Cancelling a query (e | 2026-01-30T15:02:23.274144Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-di78859 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:24:51.733190Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-di05920 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:41:22.824254Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dd39330 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:53:22.793144Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cz81512 | Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes | 2026-01-30T16:11:25.451968Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cy03855 | tar | 2026-01-30T15:18:53.133348Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ct39828 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:31:23.928259Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cr41732 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:12:53.150833Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cq38405 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:23:55.161893Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-co80279 | Within HostnameError | 2026-01-30T15:02:52.896368Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ck72347 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:07:23.436298Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ck35256 | Within HostnameError | 2026-01-30T17:21:56.458213Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2000-ALE-012 | Mauvaise compatibilité des scanners de virus avec NTFS | 2000-09-08T00:00:00.000000 | 2000-09-08T00:00:00.000000 |
| certa-2000-ale-001 | Alerte de virus LOVE-LETTER-FOR-YOU | 2000-05-05T00:00:00.000000 | 2000-07-05T00:00:00.000000 |
| CERTA-2000-ALE-001 | Alerte de virus LOVE-LETTER-FOR-YOU | 2000-05-05T00:00:00.000000 | 2000-07-05T00:00:00.000000 |
| certa-2000-ale-011 | Trojan Simpsons | 2000-06-29T00:00:00.000000 | 2000-06-29T00:00:00.000000 |
| CERTA-2000-ALE-011 | Trojan Simpsons | 2000-06-29T00:00:00.000000 | 2000-06-29T00:00:00.000000 |
| certa-2000-ale-010 | Vulnérabilités dans le serveur de fichier wu-ftpd | 2000-06-26T00:00:00.000000 | 2000-06-26T00:00:00.000000 |
| CERTA-2000-ALE-010 | Vulnérabilités dans le serveur de fichier wu-ftpd | 2000-06-26T00:00:00.000000 | 2000-06-26T00:00:00.000000 |
| certa-2000-ale-009 | Ver VBS/Stages-A, Mirc/stages-a, pIRC/Stages-A | 2000-06-20T00:00:00.000000 | 2000-06-20T00:00:00.000000 |
| CERTA-2000-ALE-009 | Ver VBS/Stages-A, Mirc/stages-a, pIRC/Stages-A | 2000-06-20T00:00:00.000000 | 2000-06-20T00:00:00.000000 |
| certa-2000-ale-008 | The Serbian Badman Trojan (TSB) | 2000-06-13T00:00:00.000000 | 2000-06-13T00:00:00.000000 |
| CERTA-2000-ALE-008 | The Serbian Badman Trojan (TSB) | 2000-06-13T00:00:00.000000 | 2000-06-13T00:00:00.000000 |
| certa-2000-ale-007 | Virus VBS/LoveLet-AS | 2000-06-09T00:00:00.000000 | 2000-06-09T00:00:00.000000 |
| CERTA-2000-ALE-007 | Virus VBS/LoveLet-AS | 2000-06-09T00:00:00.000000 | 2000-06-09T00:00:00.000000 |
| certa-2000-ale-006 | Deni de service sous Firewall-1 | 2000-06-08T00:00:00.000000 | 2000-06-08T00:00:00.000000 |
| CERTA-2000-ALE-006 | Deni de service sous Firewall-1 | 2000-06-08T00:00:00.000000 | 2000-06-08T00:00:00.000000 |
| certa-2000-ale-005 | Virus macro V97M/Resume.A | 2000-05-29T00:00:00.000000 | 2000-05-29T00:00:00.000000 |
| CERTA-2000-ALE-005 | Virus macro V97M/Resume.A | 2000-05-29T00:00:00.000000 | 2000-05-29T00:00:00.000000 |
| certa-2000-ale-004 | Virus Macro OF97/Cybernet-A | 2000-05-26T00:00:00.000000 | 2000-05-26T00:00:00.000000 |
| certa-2000-ale-003 | « Mesures de performances » de l'Internet | 2000-05-26T00:00:00.000000 | 2000-05-26T00:00:00.000000 |
| CERTA-2000-ALE-004 | Virus Macro OF97/Cybernet-A | 2000-05-26T00:00:00.000000 | 2000-05-26T00:00:00.000000 |
| CERTA-2000-ALE-003 | « Mesures de performances » de l'Internet | 2000-05-26T00:00:00.000000 | 2000-05-26T00:00:00.000000 |
| certa-2000-ale-002 | Alerte de virus NEWLOVE | 2000-05-19T00:00:00.000000 | 2000-05-19T00:00:00.000000 |
| CERTA-2000-ALE-002 | Alerte de virus NEWLOVE | 2000-05-19T00:00:00.000000 | 2000-05-19T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-1076 | Multiples vulnérabilités dans MISP | 2025-12-08T00:00:00.000000 | 2025-12-24T00:00:00.000000 |
| certfr-2025-avi-1126 | Multiples vulnérabilités dans PHP | 2025-12-19T00:00:00.000000 | 2025-12-22T00:00:00.000000 |
| CERTFR-2025-AVI-1126 | Multiples vulnérabilités dans PHP | 2025-12-19T00:00:00.000000 | 2025-12-22T00:00:00.000000 |
| certfr-2025-avi-1136 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1135 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1134 | Multiples vulnérabilités dans MongoDB Server | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1133 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1132 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1131 | Multiples vulnérabilités dans les produits IBM | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1130 | Multiples vulnérabilités dans les produits Foxit | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1129 | Multiples vulnérabilités dans les produits VMware | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1128 | Multiples vulnérabilités dans Mozilla Firefox | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1127 | Multiples vulnérabilités dans Centreon Web | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1125 | Vulnérabilité dans les produits NetApp | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1124 | Multiples vulnérabilités dans Microsoft Edge | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1123 | Multiples vulnérabilités dans les produits Elastic | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1136 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1135 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1134 | Multiples vulnérabilités dans MongoDB Server | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1133 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1132 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1131 | Multiples vulnérabilités dans les produits IBM | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1130 | Multiples vulnérabilités dans les produits Foxit | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1129 | Multiples vulnérabilités dans les produits VMware | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1128 | Multiples vulnérabilités dans Mozilla Firefox | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1127 | Multiples vulnérabilités dans Centreon Web | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1125 | Vulnérabilité dans les produits NetApp | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1124 | Multiples vulnérabilités dans Microsoft Edge | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| CERTFR-2025-AVI-1123 | Multiples vulnérabilités dans les produits Elastic | 2025-12-19T00:00:00.000000 | 2025-12-19T00:00:00.000000 |
| certfr-2025-avi-1121 | Vulnérabilité dans Sonicwall Secure Mobile Access | 2025-12-18T00:00:00.000000 | 2025-12-18T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-001804 | Multiple buffer overflow vulnerabilities in HOME SPOT CUBE2 | 2024-02-06T15:02+09:00 | 2024-03-11T17:32+09:00 |
| jvndb-2024-002050 | Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers | 2024-02-07T15:39+09:00 | 2024-03-08T18:05+09:00 |
| jvndb-2024-000030 | a-blog cms vulnerable to directory traversal | 2024-03-08T15:27+09:00 | 2024-03-08T15:27+09:00 |
| jvndb-2024-002942 | OMRON NJ/NX series vulnerable to path traversal | 2024-03-08T14:16+09:00 | 2024-03-08T14:16+09:00 |
| jvndb-2024-000027 | FUJIFILM Business Innovation Corp. printers vulnerable to cross-site request forgery | 2024-03-06T18:24+09:00 | 2024-03-06T18:24+09:00 |
| jvndb-2024-000026 | Multiple vulnerabilities in printers and scanners which implement BROTHER Web Based Management | 2024-03-06T18:12+09:00 | 2024-03-06T18:12+09:00 |
| jvndb-2024-000029 | Toyoko Inn official App vulnerable to improper server certificate verification | 2024-03-06T13:53+09:00 | 2024-03-06T13:53+09:00 |
| jvndb-2024-000005 | "Mercari" App for Android fails to restrict custom URL schemes properly | 2024-01-24T13:46+09:00 | 2024-03-04T18:01+09:00 |
| jvndb-2024-000025 | Protection mechanism failure in RevoWorks | 2024-02-29T15:40+09:00 | 2024-02-29T15:40+09:00 |
| jvndb-2024-000024 | OET-213H-BTS1 missing authorization check in the initial configuration | 2024-02-29T14:59+09:00 | 2024-02-29T14:59+09:00 |
| jvndb-2024-000023 | OpenPNE plugin "opTimelinePlugin" vulnerable to cross-site scripting | 2024-02-29T13:12+09:00 | 2024-02-29T13:12+09:00 |
| jvndb-2024-000022 | Multiple vulnerabilities in baserCMS | 2024-02-27T14:25+09:00 | 2024-02-27T14:25+09:00 |
| jvndb-2024-002832 | EL Injection Vulnerability in Hitachi Global Link Manager | 2024-02-21T15:53+09:00 | 2024-02-21T15:53+09:00 |
| jvndb-2024-002560 | Android App "Mopria Print Service" vulnerable to improper intent handling | 2024-02-15T15:26+09:00 | 2024-02-15T15:26+09:00 |
| jvndb-2024-000019 | a-blog cms vulnerable to URL spoofing | 2024-02-15T14:12+09:00 | 2024-02-15T14:12+09:00 |
| jvndb-2022-002775 | Multiple vulnerabilities in Buffalo network devices | 2022-12-12T15:28+09:00 | 2024-02-14T15:45+09:00 |
| jvndb-2020-013805 | Zeroshell vulnerable to OS command injection | 2024-02-07T13:38+09:00 | 2024-02-07T13:38+09:00 |
| jvndb-2024-001462 | File and Directory Permissions Vulnerability in Hitachi Tuning Manager | 2024-02-05T14:54+09:00 | 2024-02-05T14:54+09:00 |
| jvndb-2024-001161 | Multiple vulnerabilities in SHARP Energy Management Controller with Cloud Services | 2024-01-31T16:01+09:00 | 2024-01-31T16:01+09:00 |
| jvndb-2024-000014 | Oracle WebLogic Server vulnerable to HTTP header injection | 2024-01-24T13:53+09:00 | 2024-01-24T13:53+09:00 |
| jvndb-2023-000121 | RakRak Document Plus vulnerable to path traversal | 2023-12-04T13:45+09:00 | 2024-01-24T12:06+09:00 |
| jvndb-2024-000003 | Pleasanter vulnerable to cross-site scripting | 2024-01-15T15:59+09:00 | 2024-01-15T15:59+09:00 |
| jvndb-2024-001001 | Multiple vulnerabilities in Panasonic Control FPWIN Pro7 | 2024-01-10T13:46+09:00 | 2024-01-10T13:46+09:00 |
| jvndb-2023-009966 | FXC wireless LAN routers "AE1021PE" and "AE1021" vulnerable to OS command injection Critical | 2023-12-07T15:09+09:00 | 2023-12-25T16:54+09:00 |
| jvndb-2023-009619 | OS command injection vulnerability in DT900 | 2023-12-06T14:43+09:00 | 2023-12-06T14:43+09:00 |
| jvndb-2023-000117 | Multiple vulnerabilities in LuxCal Web Calendar | 2023-11-20T17:15+09:00 | 2023-11-20T17:15+09:00 |
| jvndb-2021-000018 | The installers of E START products may insecurely load Dynamic Link Libraries | 2021-03-05T17:03+09:00 | 2023-11-16T15:41+09:00 |
| jvndb-2020-000025 | Toshiba Electronic Devices & Storage software registers unquoted service paths | 2020-04-20T17:13+09:00 | 2023-11-08T16:44+09:00 |
| jvndb-2019-000023 | Multiple vulnerabilities in Cybozu Garoon | 2019-04-25T17:13+09:00 | 2023-11-08T16:39+09:00 |
| jvndb-2023-004790 | Multiple Vulnerabilities in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2023-11-02T12:14+09:00 | 2023-11-02T12:14+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14645 | Google Android存在未明漏洞(CNVD-2026-14645) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14644 | Google Android权限提升漏洞(CNVD-2026-14644) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-14643 | Google Android访问控制错误漏洞(CNVD-2026-14643) | 2026-03-09 | 2026-03-24 |
| cnvd-2026-15248 | Huawei HarmonyOS设备认证模块认证绕过漏洞 | 2026-03-12 | 2026-03-23 |
| cnvd-2026-15144 | HCL AION SQL注入漏洞 | 2026-03-19 | 2026-03-23 |
| cnvd-2026-14508 | Adobe Audition越界写入漏洞(CNVD-2026-14508) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14507 | Adobe Substance3D Designer越界写入漏洞 | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14506 | Adobe Audition越界读取漏洞(CNVD-2026-14506) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14505 | Adobe Audition缓冲区溢出漏洞(CNVD-2026-14505) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14504 | Adobe Substance3D Designer缓冲区溢出漏洞(CNVD-2026-14504) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14503 | Adobe Premiere Pro越界读取漏洞(CNVD-2026-14503) | 2026-03-17 | 2026-03-23 |
| cnvd-2026-14502 | Adobe Illustrator堆缓冲区溢出漏洞(CNVD-2026-14502) | 2026-03-17 | 2026-03-23 |
| cnvd-2026-14501 | Adobe Illustrator堆栈缓冲区溢出漏洞(CNVD-2026-14501) | 2026-03-17 | 2026-03-23 |
| cnvd-2026-14500 | 多款Apple产品信息泄露漏洞(CNVD-2026-14500) | 2026-02-05 | 2026-03-23 |
| cnvd-2026-14499 | 多款Apple产品越界读取漏洞(CNVD-2026-14499) | 2026-02-05 | 2026-03-23 |
| cnvd-2026-14498 | 多款Apple产品路径遍历漏洞 | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14497 | 多款Apple产品代码执行漏洞(CNVD-2026-14497) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14496 | 多款Apple产品信息泄露漏洞(CNVD-2026-14496) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14495 | 多款Apple产品信息泄露漏洞(CNVD-2026-14495) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14494 | 多款Apple产品存在未明漏洞(CNVD-2026-14494) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14493 | 多款Apple产品安全绕过漏洞(CNVD-2026-14493) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14492 | 多款Apple产品安全绕过漏洞(CNVD-2026-14492) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14491 | 多款Apple产品安全绕过漏洞(CNVD-2026-14491) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14490 | 多款Apple产品信息泄露漏洞(CNVD-2026-14490) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14489 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14489) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14488 | 多款Apple产品信息泄露漏洞(CNVD-2026-14488) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14487 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14487) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14486 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14486) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14485 | 多款Apple产品信息泄露漏洞(CNVD-2026-14485) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14484 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14484) | 2026-03-02 | 2026-03-23 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-09632 | Уязвимость функций udma_probe() и devm_kasprintf() ядра операционной системы Linux, позво… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09631 | Уязвимость функции usbhs_probe() компонента usb ядра операционной системы Linux, позволяю… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09630 | Уязвимость функции mlb_usio_probe() ядра операционной системы Linux, позволяющая нарушите… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09628 | Уязвимость функции kmem_cache_destroy() модуля dswstate.c ядра операционных систем Linux,… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09626 | Уязвимость функции ksmbd_krb5_authenticate() компонента ksmbd ядра операционной системы L… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09624 | Уязвимость функции atm_account_tx() компонента atm ядра операционной системы Linux, позво… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09621 | Уязвимость функции atmtcp_c_send() компонента atm ядра операционной системы Linux, позвол… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09617 | Уязвимость компонента net_sched ядра операционной системы Linux, позволяющая нарушителю в… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09616 | Уязвимость функции total_valid_block_count библиотеки fs/f2fs/f2fs.h ядра операционных си… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09615 | Уязвимость функции cscfg_csdev_enable_active_config() ядра операционной системы Linux, по… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09614 | Уязвимость функции usbnet_read_cmd() библиотеки include/linux/etherdevice.h ядра операцио… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09613 | Уязвимость функции cma_netevent_callback() модуля drivers/infiniband/core/cma.c ядра опер… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09610 | Уязвимость драйвера mlx5 подсистемы RDMA ядра операционных систем Linux, позволяющая нару… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09609 | Уязвимость функции key_extract_l3l4 модуля net/openvswitch/flow.c компонента openvswitch … | 11.08.2025 | 16.02.2026 |
| bdu:2025-09605 | Уязвимость модуля net/ipv4/udp_offload.c ядра операционной системы Linux, позволяющая нар… | 11.08.2025 | 16.02.2026 |
| bdu:2025-09576 | Уязвимость функции snd_usb_get_audioformat_uac3() (sound/usb/stream.c) ядра операционных … | 11.08.2025 | 16.02.2026 |
| bdu:2025-09522 | Уязвимость компонента phy ядра операционной системы Linux, позволяющая нарушителю вызвать… | 08.08.2025 | 16.02.2026 |
| bdu:2025-09314 | Уязвимость функции do_change_type() ядра операционных систем Linux, позволяющая нарушител… | 04.08.2025 | 16.02.2026 |
| bdu:2025-09255 | Уязвимость файловой системы Btrfs (fs/btrfs/inode.c) ядра операционной системы Linux, поз… | 31.07.2025 | 16.02.2026 |
| bdu:2025-09245 | Уязвимость функции mas_preallocate() модуля lib/maple_tree.c ядра операционных систем Lin… | 31.07.2025 | 16.02.2026 |
| bdu:2025-09228 | Уязвимость функции nf_flow_pppoe_proto() компонента netfilter ядра операционной системы L… | 30.07.2025 | 16.02.2026 |
| bdu:2025-09225 | Уязвимость функции nbd_genl_connect() компонента nbd ядра операционной системы Linux, поз… | 30.07.2025 | 16.02.2026 |
| bdu:2025-09199 | Уязвимость функции dma_unmap_len_set() компонента bnxt_en ядра операционной системы Linux… | 30.07.2025 | 16.02.2026 |
| bdu:2025-09194 | Уязвимость функции ksmbd_iov_pin_rsp() компонента ksmbd ядра операционной системы Linux, … | 30.07.2025 | 16.02.2026 |
| bdu:2025-09190 | Уязвимость функции raid1_reshape() ядра операционной системы Linux, позволяющая нарушител… | 30.07.2025 | 16.02.2026 |
| bdu:2025-09187 | Уязвимость функции gs_start_io() компонента usb ядра операционной системы Linux, позволяю… | 30.07.2025 | 16.02.2026 |
| bdu:2025-09183 | Уязвимость функции raid10_make_request() компонента raid10 ядра операционной системы Linu… | 30.07.2025 | 16.02.2026 |
| bdu:2025-09181 | Уязвимость модуля drivers/comedi/drivers/das16m1.c ядра операционной системы Linux, позво… | 30.07.2025 | 16.02.2026 |
| bdu:2025-09180 | Уязвимость модуля drivers/comedi/drivers/das6402.c ядра операционной системы Linux, позво… | 30.07.2025 | 16.02.2026 |
| bdu:2025-09179 | Уязвимость функции COMEDI_INSNLIST() ядра операционной системы Linux, позволяющая нарушит… | 30.07.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201904-0745 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:45:17.108000Z |
| var-201804-1188 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T20:45:16.469000Z |
| var-201609-0225 | xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tv… | 2024-07-23T20:45:16.331000Z |
| var-201806-1470 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T20:45:14.555000Z |
| var-200809-0007 | slapconfig in Directory Services in Apple Mac OS X 10.5 through 10.5.4 allows local users… | 2024-07-23T20:44:44.791000Z |
| var-201006-1210 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2024-07-23T20:44:14.225000Z |
| var-202105-1460 | A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a… | 2024-07-23T20:44:13.974000Z |
| var-202201-0468 | build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. E… | 2024-07-23T20:43:40.086000Z |
| var-201203-0202 | The extension subsystem in Google Chrome before 17.0.963.78 does not properly handle hist… | 2024-07-23T20:43:37.316000Z |
| var-200511-0015 | Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) imple… | 2024-07-23T20:43:37.451000Z |
| var-200704-0219 | The Login Window in Apple Mac OS X 10.4 through 10.4.9 displays the software update windo… | 2024-07-23T20:43:06.968000Z |
| var-201912-1852 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:42:33.012000Z |
| var-201112-0123 | Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java … | 2024-07-23T20:42:32.055000Z |
| var-200912-0751 | Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allo… | 2024-07-23T20:42:29.412000Z |
| var-201912-0562 | A buffer overflow was addressed with improved bounds checking. This issue is fixed in mac… | 2024-07-23T20:42:28.177000Z |
| var-200701-0021 | Double free vulnerability in the _ATPsndrsp function in Apple Mac OS X 10.4.8, and possib… | 2024-07-23T20:42:28.331000Z |
| var-201111-0129 | Use-after-free vulnerability in Google Chrome before 15.0.874.120 allows user-assisted re… | 2024-07-23T20:42:26.633000Z |
| var-201302-0150 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2024-07-23T20:42:21.826000Z |
| var-201906-1175 | Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an… | 2024-07-23T20:42:20.367000Z |
| var-201512-0484 | The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh,… | 2024-07-23T20:40:42.235000Z |
| var-201202-0075 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T20:40:42.117000Z |
| var-201912-0615 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i… | 2024-07-23T20:40:41.310000Z |
| var-201008-1003 | The INCLUDE_SECURITY functionality in Wind River VxWorks 6.x, 5.x, and earlier uses the L… | 2024-07-23T20:40:40.038000Z |
| var-201302-0021 | Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x befor… | 2024-07-23T20:40:39.185000Z |
| var-201712-0268 | An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari be… | 2024-07-23T20:39:34.454000Z |
| var-201202-0245 | Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, L… | 2024-07-23T20:39:34.535000Z |
| var-201912-0115 | A dynamic library loading issue existed in iTunes setup. This was addressed with improved… | 2024-07-23T20:39:32.578000Z |
| var-200608-0029 | AFP Server in Apple Mac OS X 10.3.9 and 10.4.7 allows remote attackers to cause denial of… | 2024-07-23T20:39:32.646000Z |
| var-202102-1488 | The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique… | 2024-07-23T20:39:26.069000Z |
| var-202202-0101 | In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString. =======… | 2024-07-23T20:39:22.998000Z |