Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43583 |
6 (4.0)
5.3 (3.1)
|
OpenClaw 2026.4.10 < 2026.4.14 - Loss of Group Tool-Po… |
OpenClaw |
OpenClaw |
2026-05-06T19:49:25.474Z | 2026-05-07T17:30:28.366Z |
| CVE-2026-44112 |
6 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.4.22 - Symlink Swap Race Condition in … |
OpenClaw |
OpenClaw |
2026-05-06T19:49:29.626Z | 2026-05-07T17:28:12.165Z |
| CVE-2026-44118 |
8.5 (4.0)
7.8 (3.1)
|
OpenClaw < 2026.4.22 - Owner Context Spoofing via Bear… |
OpenClaw |
OpenClaw |
2026-05-06T19:49:37.173Z | 2026-05-07T17:22:50.507Z |
| CVE-2026-43281 |
N/A
|
mailbox: Prevent out-of-bounds access in fw_mbox_index… |
Linux |
Linux |
2026-05-06T11:29:02.278Z | 2026-05-07T17:15:22.833Z |
| CVE-2026-43277 |
N/A
|
APEI/GHES: ensure that won't go past CPER allocated record |
Linux |
Linux |
2026-05-06T11:28:59.486Z | 2026-05-07T17:15:20.242Z |
| CVE-2026-43271 |
N/A
|
md-cluster: fix NULL pointer dereference in process_me… |
Linux |
Linux |
2026-05-06T11:28:55.507Z | 2026-05-07T17:15:17.948Z |
| CVE-2026-43269 |
N/A
|
drm/atmel-hlcdc: fix memory leak from the atomic_destr… |
Linux |
Linux |
2026-05-06T11:28:54.178Z | 2026-05-07T17:15:16.762Z |
| CVE-2026-43268 |
N/A
|
hfsplus: pretend special inodes as regular files |
Linux |
Linux |
2026-05-06T11:28:53.534Z | 2026-05-07T17:15:15.634Z |
| CVE-2026-43267 |
N/A
|
wifi: rtw89: fix potential zero beacon interval in bea… |
Linux |
Linux |
2026-05-06T11:28:52.887Z | 2026-05-07T17:15:14.362Z |
| CVE-2026-43266 |
N/A
|
EFI/CPER: don't go past the ARM processor CPER record buffer |
Linux |
Linux |
2026-05-06T11:28:52.238Z | 2026-05-07T17:15:13.111Z |
| CVE-2026-43262 |
N/A
|
gfs2: fiemap page fault fix |
Linux |
Linux |
2026-05-06T11:28:49.480Z | 2026-05-07T17:15:11.973Z |
| CVE-2026-43261 |
N/A
|
arm64: Add support for TSV110 Spectre-BHB mitigation |
Linux |
Linux |
2026-05-06T11:28:48.823Z | 2026-05-07T17:15:10.837Z |
| CVE-2026-43255 |
N/A
|
wifi: libertas: fix WARNING in usb_tx_block |
Linux |
Linux |
2026-05-06T11:28:44.522Z | 2026-05-07T17:15:08.483Z |
| CVE-2026-43251 |
N/A
|
HID: prodikeys: Check presence of pm->input_ep82 |
Linux |
Linux |
2026-05-06T11:28:41.835Z | 2026-05-07T17:15:05.932Z |
| CVE-2026-43250 |
N/A
|
usb: chipidea: udc: fix DMA and SG cleanup in _ep_nuke() |
Linux |
Linux |
2026-05-06T11:28:41.158Z | 2026-05-07T17:15:04.762Z |
| CVE-2026-43243 |
N/A
|
drm/amd/display: Add signal type check for dcn401 get_… |
Linux |
Linux |
2026-05-06T11:28:36.287Z | 2026-05-07T17:15:00.425Z |
| CVE-2026-43241 |
N/A
|
ntb: ntb_hw_switchtec: Fix array-index-out-of-bounds access |
Linux |
Linux |
2026-05-06T11:28:34.927Z | 2026-05-07T17:14:58.964Z |
| CVE-2026-43228 |
N/A
|
hfs: Replace BUG_ON with error handling for CNID count… |
Linux |
Linux |
2026-05-06T11:28:26.292Z | 2026-05-07T17:14:53.111Z |
| CVE-2026-43227 |
N/A
|
clocksource/drivers/sh_tmu: Always leave device runnin… |
Linux |
Linux |
2026-05-06T11:28:25.629Z | 2026-05-07T17:14:51.949Z |
| CVE-2026-43225 |
N/A
|
staging: rtl8723bs: fix memory leak on failure path |
Linux |
Linux |
2026-05-06T11:28:24.289Z | 2026-05-07T17:14:49.605Z |
| CVE-2026-43223 |
N/A
|
media: pvrusb2: fix URB leak in pvr2_send_request_ex |
Linux |
Linux |
2026-05-06T11:28:22.952Z | 2026-05-07T17:14:48.459Z |
| CVE-2026-43209 |
N/A
|
minix: Add required sanity checking to minix_check_sup… |
Linux |
Linux |
2026-05-06T11:28:12.965Z | 2026-05-07T17:14:43.716Z |
| CVE-2026-43204 |
N/A
|
ASoC: qcom: q6asm: drop DSP responses for closed data … |
Linux |
Linux |
2026-05-06T11:28:09.617Z | 2026-05-07T17:14:41.440Z |
| CVE-2026-43201 |
N/A
|
APEI/GHES: ARM processor Error: don't go past allocate… |
Linux |
Linux |
2026-05-06T11:28:07.565Z | 2026-05-07T17:14:40.303Z |
| CVE-2026-43195 |
N/A
|
drm/amdgpu: validate user queue size constraints |
Linux |
Linux |
2026-05-06T11:28:03.437Z | 2026-05-07T17:14:39.181Z |
| CVE-2026-43191 |
N/A
|
drm/amd/display: Adjust PHY FSM transition to TX_EN-to… |
Linux |
Linux |
2026-05-06T11:28:00.470Z | 2026-05-07T17:14:38.021Z |
| CVE-2026-43189 |
N/A
|
media: v4l2-async: Fix error handling on steps after f… |
Linux |
Linux |
2026-05-06T11:27:59.108Z | 2026-05-07T17:14:35.685Z |
| CVE-2026-43183 |
N/A
|
media: cx25821: Fix a resource leak in cx25821_dev_setup() |
Linux |
Linux |
2026-05-06T11:27:54.977Z | 2026-05-07T17:14:33.359Z |
| CVE-2026-43171 |
N/A
|
EFI/CPER: don't dump the entire memory region |
Linux |
Linux |
2026-05-06T11:27:46.698Z | 2026-05-07T17:14:29.768Z |
| CVE-2026-43165 |
N/A
|
hwmon: (nct7363) Fix a resource leak in nct7363_presen… |
Linux |
Linux |
2026-05-06T11:27:42.588Z | 2026-05-07T17:14:28.632Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43074 |
7.8 (3.1)
|
eventpoll: defer struct eventpoll free to RCU grace period |
Linux |
Linux |
2026-05-06T07:21:58.210Z | 2026-05-08T12:40:22.201Z |
| CVE-2026-43071 |
9.1 (3.1)
|
dcache: Limit the minimal number of bucket to two |
Linux |
Linux |
2026-05-05T15:29:28.081Z | 2026-05-08T12:40:21.054Z |
| CVE-2026-43070 |
7.8 (3.1)
|
bpf: Reset register ID for BPF_END value tracking |
Linux |
Linux |
2026-05-05T15:23:28.819Z | 2026-05-08T12:40:19.810Z |
| CVE-2026-43067 |
9.8 (3.1)
|
ext4: handle wraparound when searching for blocks for … |
Linux |
Linux |
2026-05-05T15:23:26.717Z | 2026-05-08T12:40:18.665Z |
| CVE-2026-43063 |
7.8 (3.1)
|
xfs: don't irele after failing to iget in xfs_attri_re… |
Linux |
Linux |
2026-05-05T15:23:24.034Z | 2026-05-08T12:40:17.506Z |
| CVE-2026-43062 |
7.1 (3.1)
|
Bluetooth: L2CAP: Fix type confusion in l2cap_ecred_re… |
Linux |
Linux |
2026-05-05T15:17:27.830Z | 2026-05-08T12:40:16.025Z |
| CVE-2026-43060 |
7.8 (3.1)
|
netfilter: nft_ct: drop pending enqueued packets on removal |
Linux |
Linux |
2026-05-05T15:17:26.393Z | 2026-05-08T12:40:14.866Z |
| CVE-2026-31731 |
7.8 (3.1)
|
thermal: core: Address thermal zone removal races with… |
Linux |
Linux |
2026-05-01T14:14:30.177Z | 2026-05-08T12:40:13.706Z |
| CVE-2026-31730 |
7.8 (3.1)
|
misc: fastrpc: possible double-free of cctx->remote_heap |
Linux |
Linux |
2026-05-01T14:14:29.522Z | 2026-05-08T12:40:12.536Z |
| CVE-2025-68900 |
6.5 (3.1)
|
WordPress Enfold theme <= 7.1.3 - Cross Site Scripting… |
Kriesi |
Enfold |
2026-01-22T16:52:12.531Z | 2026-05-08T12:14:13.616Z |
| CVE-2026-5588 |
6.3 (4.0)
|
PKIX draft CompositeVerifier accepts empty signature s… |
Legion of the Bouncy Castle Inc. |
BC-JAVA |
2026-04-15T09:06:15.617Z | 2026-05-08T05:29:40.247Z |
| CVE-2026-2710 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-05-07T22:20:00.454Z | |
| CVE-2026-4878 |
6.7 (3.1)
|
Libcap: libcap: privilege escalation via toctou race c… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-09T14:49:02.942Z | 2026-05-07T21:33:20.039Z |
| CVE-2026-4775 |
7.8 (3.1)
|
Libtiff: libtiff: arbitrary code execution or denial o… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-24T14:42:47.529Z | 2026-05-07T21:24:46.165Z |
| CVE-2026-8098 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Feedback System checklogin.php sql injection |
code-projects |
Feedback System |
2026-05-07T20:30:16.437Z | 2026-05-08T14:43:10.396Z |
| CVE-2026-8097 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodeAstro Online Classroom askquery.php sql injection |
CodeAstro |
Online Classroom |
2026-05-07T20:15:12.699Z | 2026-05-08T13:53:30.465Z |
| CVE-2026-44365 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-34429. Reason: This candidate is a duplicate of CVE-2026-34429. Notes: All CVE users should reference CVE-2026-34429 instead of this candidate. | N/A | N/A | 2026-05-07T20:48:33.508Z | |
| CVE-2026-44244 |
7.8 (3.1)
|
GitPython: Newline injection in config_writer().set_va… |
gitpython-developers |
GitPython |
2026-05-07T18:22:39.704Z | 2026-05-09T03:56:04.115Z |
| CVE-2026-41905 |
7.7 (3.1)
|
FreeScout vulnerable to SSRF via Helper::sanitizeRemot… |
freescout-help-desk |
freescout |
2026-05-07T18:08:09.277Z | 2026-05-07T20:15:18.618Z |
| CVE-2026-34429 |
5.1 (4.0)
5.4 (3.1)
|
Vvveb < 1.0.8.1 Stored XSS via Media Upload and Rename |
givanz |
Vvveb |
2026-04-20T13:54:37.019Z | 2026-05-08T13:56:28.718Z |
| CVE-2025-52479 |
7.7 (4.0)
|
HTTP.jl vulnerable to CR/LF Injection in URIs |
JuliaWeb |
HTTP.jl |
2025-06-25T16:06:45.402Z | 2026-05-07T20:47:37.830Z |
| CVE-2026-44243 |
7.8 (4.0)
|
GitPython: Path traversal in GitPython reference APIs … |
gitpython-developers |
GitPython |
2026-05-07T18:22:53.622Z | 2026-05-07T19:12:49.856Z |
| CVE-2025-12690 |
7.3 (4.0)
|
Local Privilege Escalation in NGFW Engine |
Forcepoint |
NGFW Engine |
2026-03-11T15:36:32.755Z | 2026-03-11T16:10:28.588Z |
| CVE-2025-69614 |
9.4 (3.1)
|
Incorrect Access Control via activation token reu… |
n/a |
n/a |
2026-03-10T00:00:00.000Z | 2026-03-10T18:40:51.662Z |
| CVE-2025-69615 |
9.1 (3.1)
|
Incorrect Access Control via missing 2FA rate-lim… |
n/a |
n/a |
2026-03-10T00:00:00.000Z | 2026-03-10T18:05:00.967Z |
| CVE-2026-30973 |
6.5 (3.1)
|
Zip Slip arbitrary file write in @appium/support ZIP e… |
@appium |
support |
2026-03-10T17:33:41.009Z | 2026-03-12T14:25:09.401Z |
| CVE-2026-3315 |
5.8 (4.0)
|
Local Privilege Escalation Due to Writable Executable … |
ASSA ABLOY |
Visionline |
2026-03-10T09:35:42.236Z | 2026-03-11T05:13:30.886Z |
| CVE-2026-42241 |
5.3 (3.1)
|
ParquetSharp: Possible Stack Overflow When Reading a P… |
G-Research |
ParquetSharp |
2026-05-07T18:52:06.773Z | 2026-05-08T21:30:27.110Z |
| CVE-2026-42225 |
8.2 (4.0)
|
GnuTLS backend silently skips certificate chain verifi… |
pjsip |
pjproject |
2026-05-07T18:47:26.563Z | 2026-05-08T14:18:36.257Z |
| CVE-2026-42239 |
8.1 (3.1)
|
Budibase auth session cookies are set with httpOnly:fa… |
Budibase |
budibase |
2026-05-07T18:49:59.180Z | 2026-05-07T19:39:45.605Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-43074 | In the Linux kernel, the following vulnerability has been resolved: eventpoll: defer struct eventp… | 2026-05-06T10:16:20.343 | 2026-05-08T13:16:38.030 |
| fkie_cve-2026-43071 | In the Linux kernel, the following vulnerability has been resolved: dcache: Limit the minimal numb… | 2026-05-05T16:16:16.420 | 2026-05-08T13:16:37.870 |
| fkie_cve-2026-43070 | In the Linux kernel, the following vulnerability has been resolved: bpf: Reset register ID for BPF… | 2026-05-05T16:16:16.320 | 2026-05-08T13:16:37.750 |
| fkie_cve-2026-43067 | In the Linux kernel, the following vulnerability has been resolved: ext4: handle wraparound when s… | 2026-05-05T16:16:15.937 | 2026-05-08T13:16:37.597 |
| fkie_cve-2026-43063 | In the Linux kernel, the following vulnerability has been resolved: xfs: don't irele after failing… | 2026-05-05T16:16:15.467 | 2026-05-08T13:16:37.457 |
| fkie_cve-2026-43062 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix type con… | 2026-05-05T16:16:15.340 | 2026-05-08T13:16:37.303 |
| fkie_cve-2026-43060 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: drop pendin… | 2026-05-05T16:16:15.050 | 2026-05-08T13:16:37.143 |
| fkie_cve-2026-31731 | In the Linux kernel, the following vulnerability has been resolved: thermal: core: Address thermal… | 2026-05-01T15:16:35.683 | 2026-05-08T13:16:36.907 |
| fkie_cve-2026-31730 | In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: possible double… | 2026-05-01T15:16:35.577 | 2026-05-08T13:16:36.740 |
| fkie_cve-2025-68900 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T17:16:13.733 | 2026-05-08T13:16:35.863 |
| fkie_cve-2026-5588 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Legion of the Bouncy Castle Inc. … | 2026-04-15T10:16:49.597 | 2026-05-08T06:16:10.540 |
| fkie_cve-2026-2710 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-05-07T23:16:31.877 | 2026-05-07T23:16:31.877 |
| fkie_cve-2026-4878 | A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (T… | 2026-04-09T16:16:31.987 | 2026-05-07T22:16:36.237 |
| fkie_cve-2026-4775 | A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow … | 2026-03-24T15:16:39.693 | 2026-05-07T22:16:36.070 |
| fkie_cve-2026-8098 | A security vulnerability has been detected in code-projects Feedback System 1.0. Impacted is an unk… | 2026-05-07T21:16:30.900 | 2026-05-07T21:16:30.900 |
| fkie_cve-2026-8097 | A security flaw has been discovered in CodeAstro Online Classroom 1.0. This vulnerability affects u… | 2026-05-07T21:16:30.727 | 2026-05-07T21:16:30.727 |
| fkie_cve-2026-44365 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-34429. Reason:… | 2026-05-07T21:16:30.433 | 2026-05-07T21:16:30.433 |
| fkie_cve-2026-44244 | GitPython is a python library used to interact with Git repositories. Prior to version 3.1.49, GitC… | 2026-05-07T19:16:02.357 | 2026-05-07T21:16:30.283 |
| fkie_cve-2026-41905 | FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version… | 2026-05-07T19:16:01.220 | 2026-05-07T21:16:29.870 |
| fkie_cve-2026-34429 | Vvveb prior to 1.0.8.1 contains a stored cross-site scripting vulnerability that allows authenticat… | 2026-04-20T16:16:44.650 | 2026-05-07T21:16:29.427 |
| fkie_cve-2025-52479 | HTTP.jl provides HTTP client and server functionality for Julia, and URIs.jl parses and works with … | 2025-06-25T16:15:27.017 | 2026-05-07T21:16:28.847 |
| fkie_cve-2026-44243 | GitPython is a python library used to interact with Git repositories. Prior to version 3.1.48, a vu… | 2026-05-07T19:16:02.227 | 2026-05-07T21:12:00.777 |
| fkie_cve-2025-12690 | Execution with unnecessary privileges in Forcepoint NGFW Engine allows local privilege escalation.T… | 2026-03-11T16:16:18.233 | 2026-05-07T20:55:29.093 |
| fkie_cve-2025-69614 | Incorrect Access Control via activation token reuse on the password-reset endpoint allowing unautho… | 2026-03-10T18:18:01.610 | 2026-05-07T20:50:21.410 |
| fkie_cve-2025-69615 | Incorrect Access Control via missing 2FA rate-limiting allowing unlimited brute-force retries and f… | 2026-03-10T18:18:01.740 | 2026-05-07T20:48:35.097 |
| fkie_cve-2026-30973 | Appium is an automation framework that provides WebDriver-based automation possibilities for a wide… | 2026-03-10T18:18:56.063 | 2026-05-07T20:46:26.913 |
| fkie_cve-2026-3315 | Incorrect Default Permissions, : Execution with Unnecessary Privileges, : Incorrect Permission Assi… | 2026-03-10T18:19:01.367 | 2026-05-07T20:41:03.490 |
| fkie_cve-2026-42241 | ParquetSharp is a .NET library for reading and writing Apache Parquet files. From version 18.1.0 to… | 2026-05-07T20:16:44.247 | 2026-05-07T20:37:54.060 |
| fkie_cve-2026-42225 | PJSIP is a free and open source multimedia communication library written in C. Prior to version 2.1… | 2026-05-07T20:16:43.960 | 2026-05-07T20:36:31.717 |
| fkie_cve-2026-42239 | Budibase is an open-source low-code platform. Prior to version 3.35.10, the budibase:auth cookie co… | 2026-05-07T20:16:44.097 | 2026-05-07T20:35:58.117 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-hp3c-vfpm-q4f7 |
8.2 (3.1)
5.3 (4.0)
|
n8n has SQL Injection in Snowflake and MySQL Nodes | 2026-04-29T21:03:29Z | 2026-05-08T01:30:35Z |
| ghsa-p7fg-763f-g4gf |
4.8 (4.0)
|
Claude SDK for TypeScript has Insecure Default File Permissions in Local Filesystem Memory Tool | 2026-04-29T22:28:12Z | 2026-05-08T01:30:32Z |
| ghsa-3gxm-wfjx-m847 |
6.0 (4.0)
|
beets has a Cross-site Scripting vulnerability | 2026-04-29T18:29:00Z | 2026-05-08T01:25:19Z |
| ghsa-grj5-jjm8-h35p |
9.8 (3.1)
|
VM2 Sandbox Breakout Through __lookupGetter__ | 2026-05-04T16:29:15Z | 2026-05-08T01:25:03Z |
| ghsa-9gh9-hwpr-rvqq |
7.0 (3.1)
|
uutils coreutils has a Time-of-Check to Time-of-Use (TOCTOU) race condition | 2026-04-22T18:31:45Z | 2026-05-08T01:24:58Z |
| ghsa-wmjr-v86c-m9jj |
2.0 (4.0)
|
Better Auth's multi-session sign-out hook allows forged cookies to revoke arbitrary sessions | 2025-11-26T22:11:50Z | 2026-05-08T01:19:47Z |
| ghsa-mr34-9552-qr95 |
5.8 (3.1)
6.3 (4.0)
|
OpenClaw: Webchat media embedding enforces local-root containment for tool-result files | 2026-04-17T22:33:09Z | 2026-05-08T01:13:04Z |
| ghsa-mcvf-jxcw-vj73 |
6.1 (3.1)
|
CKAN has CSRF exemption primed by anonymous requests | 2026-04-29T20:36:07Z | 2026-05-08T00:39:54Z |
| ghsa-m8jc-jjj9-hgc8 |
7.3 (3.1)
|
This vulnerability, in the MAXHUB Pivot client application versions prior to v1.36.2, may allow an… | 2026-05-08T00:31:35Z | 2026-05-08T00:31:35Z |
| ghsa-h65h-28xw-w79q |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in huangjunsen0406 xiaozhi-mcphub up to 1.0.3. This vulnerability af… | 2026-05-08T00:31:35Z | 2026-05-08T00:31:35Z |
| ghsa-935g-9rq5-q95c |
5.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in gyoridavid short-video-maker up to 1.3.4. This affects an un… | 2026-05-08T00:31:35Z | 2026-05-08T00:31:35Z |
| ghsa-6f56-6pvf-gp4j |
4.3 (3.1)
2.1 (4.0)
|
A security vulnerability has been detected in SourceCodester Pizzafy Ecommerce System 1.0. This iss… | 2026-05-08T00:31:35Z | 2026-05-08T00:31:35Z |
| ghsa-xqmx-3vx6-fm88 |
5.9 (4.0)
|
A reflected HTML injection vulnerability was identified in the GitHub Enterprise Server Management … | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-w548-vv26-rff6 |
7.9 (4.0)
|
A server-side request forgery (SSRF) vulnerability was identified in the GitHub Enterprise Server n… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-rrf3-mgv7-cw6m |
9.3 (4.0)
|
The VerySecureApp made by DIVD using Mendix Studio Pro 11.8.0 Beta allows unintended data exposure … | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-q253-8qxh-gx79 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in 8421bit MiniClaw up to 223c16a1088e138838dcbd18cd65a37c35ac5a84. Affec… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-pghv-w792-qvjg |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in JeecgBoot up to 3.9.1. Affected by this issue is some unknown fun… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-h86r-7gjv-6c7v |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. … | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-gmwx-3xm2-9fx8 |
10.0 (3.1)
|
Exposure of sensitive information to an unauthorized actor in Azure DevOps allows an unauthorized a… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-96jg-8w8q-qmmc |
8.1 (3.1)
|
Server-side request forgery (ssrf) in Azure Notification Service allows an authorized attacker to e… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-8rhw-hq84-rcq7 |
5.3 (3.1)
6.9 (4.0)
|
Vvveb before 1.0.8.2 contains an information disclosure vulnerability in the cron controller that a… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-8hhx-w7p5-q47g |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-3738-jvgh-jh3h |
6.3 (4.0)
|
A denial of service vulnerability was identified in GitHub Enterprise Server that allowed an unauth… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-2gcr-p5w4-5hh8 |
6.3 (4.0)
|
An authentication bypass vulnerability was identified in GitHub Enterprise Server that allowed an u… | 2026-05-08T00:31:34Z | 2026-05-08T00:31:34Z |
| ghsa-w6p3-2c62-jm2g |
9.6 (3.1)
|
Improper authorization in Microsoft Teams allows an authorized attacker to disclose information ove… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-v3vj-8337-2gq4 |
9.0 (3.1)
|
Improper input validation in Azure Managed Instance for Apache Cassandra allows an authorized attac… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-qvcj-rgrx-wm72 |
7.5 (3.1)
|
Improper neutralization of special elements in output used by a downstream component ('injection') … | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-mgh8-qx2p-mmfj |
9.6 (3.1)
|
Improper neutralization of special elements used in a command ('command injection') in Azure Cloud … | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-jvw8-2m5m-9449 |
8.2 (3.1)
|
Externally controlled reference to a resource in another sphere in Microsoft Partner Center allows … | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-j3m5-fchj-4gfr |
8.6 (3.1)
|
Improper access control in Azure AI Foundry M365 published agents allows an unauthorized attacker t… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-188 |
7.5 (3.1)
|
When deserializing untrusted or corrupted data, it is possible for a reader to consume me… | avro | 2023-09-29T17:15:00+00:00 | 2023-10-03T22:26:25.361706+00:00 |
| pysec-2023-187 |
|
An issue was discovered in pretix before 2023.7.1. Incorrect parsing of configuration fil… | pretix | 2023-10-02T20:15:00+00:00 | 2023-10-02T22:26:51.461030+00:00 |
| pysec-2023-186 |
8.8 (3.1)
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffwe… | rdiffweb | 2023-09-29T14:15:00+00:00 | 2023-10-02T20:24:26.790735+00:00 |
| pysec-2023-185 |
3.7 (3.1)
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-09-27T15:19:00+00:00 | 2023-09-30T05:24:54.158504+00:00 |
| pysec-2023-172 |
4.3 (3.1)
|
The Create Single Payment application of SAP S/4HANA - versions 100, 101, 102, 103, 104, … | hana-ml | 2023-09-12T02:15:00Z | 2023-09-29T22:26:12.812435Z |
| pysec-2023-183 |
|
opencv-python versions before v4.8.1.78 bundled libwebp binaries in wheels that are vulne… | opencv-python | 2023-09-29T21:15:28.039030+00:00 | |
| pysec-2023-184 |
|
opencv-python-headless versions before v4.8.1.78 bundled libwebp binaries in wheels that … | opencv-python-headless | 2023-09-29T21:15:27.980982+00:00 | |
| pysec-2023-182 |
|
opencv-contrib-python-headless versions before v4.8.1.78 bundled libwebp binaries in whee… | opencv-contrib-python-headless | 2023-09-29T21:15:27.863960+00:00 | |
| pysec-2023-181 |
|
opencv-contrib-python versions before v4.8.1.78 bundled libwebp binaries in wheels that a… | opencv-contrib-python | 2023-09-29T21:15:27.924031+00:00 | |
| pysec-2023-180 |
4.3 (3.1)
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-09-27T15:19:00+00:00 | 2023-09-29T20:23:39.578838+00:00 |
| pysec-2023-179 |
|
This affects versions of the package pydash before 6.0.0. A number of pydash methods such… | pydash | 2023-09-28T05:15:00+00:00 | 2023-09-28T10:29:02.604249+00:00 |
| pysec-2023-175 |
|
Pillow versions before v10.0.1 bundled libwebp binaries in wheels that are vulnerable to … | pillow | 2023-09-25T17:25:13.946374Z | |
| pysec-2023-177 |
|
An issue in Gevent before version 23.9.0 allows a remote attacker to escalate privileges … | gevent | 2023-09-25T12:15:00+00:00 | 2023-09-25T14:28:09.019811+00:00 |
| pysec-2023-176 |
6.5 (3.1)
|
GeoNode is an open source platform that facilitates the creation, sharing, and collaborat… | geonode | 2023-09-15T21:15:00+00:00 | 2023-09-20T17:25:44.504117+00:00 |
| pysec-2023-174 |
|
imagecodecs versions before v2023.9.18 bundled libwebp binaries in wheels that are vulner… | imagecodecs | 2023-09-20T05:12:42.403706+00:00 | |
| pysec-2023-173 |
5.3 (3.1)
|
Piccolo is an ORM and query builder which supports asyncio. In versions 0.120.0 and prior… | piccolo | 2023-09-12T21:15:00+00:00 | 2023-09-19T05:26:00.954782+00:00 |
| pysec-2023-171 |
|
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authent… | apache-airflow | 2023-09-12T12:15:00+00:00 | 2023-09-12T14:27:23.735580+00:00 |
| pysec-2023-170 |
|
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authent… | apache-airflow | 2023-09-12T12:15:00+00:00 | 2023-09-12T14:27:23.660908+00:00 |
| pysec-2023-169 |
7.8 (3.1)
|
Git Providers can read from the wrong environment because they get the same cache directo… | salt | 2023-09-05T11:15:00+00:00 | 2023-09-08T20:23:17.288300+00:00 |
| pysec-2023-168 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language. In affected versions the order of evaluation… | vyper | 2023-09-04T18:15:00+00:00 | 2023-09-08T16:30:59.497777+00:00 |
| pysec-2023-167 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language. For the following (probably non-exhaustive) … | vyper | 2023-09-04T18:15:00+00:00 | 2023-09-08T15:22:00.929480+00:00 |
| pysec-2023-166 |
5.3 (3.1)
|
Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving se… | salt | 2023-09-05T11:15:00+00:00 | 2023-09-07T20:23:20.197102+00:00 |
| pysec-2023-141 |
5.4 (3.1)
|
A stored cross-site scripting (XSS) vulnerability in Netbox v3.4.7 allows attackers to ex… | pynetbox | 2023-08-10T20:15:00Z | 2023-09-07T15:50:00.665697Z |
| pysec-2023-165 |
6.5 (3.1)
|
GitPython is a python library used to interact with Git repositories. In order to resolv… | gitpython | 2023-08-30T22:15:00+00:00 | 2023-09-07T14:33:25.683922+00:00 |
| pysec-2023-164 |
4.7 (3.1)
|
borgbackup is an opensource, deduplicating archiver with compression and authenticated en… | borgbackup | 2023-08-30T18:15:00+00:00 | 2023-09-06T16:31:20.448538+00:00 |
| pysec-2023-161 |
7.8 (3.1)
|
GitPython is a python library used to interact with Git repositories. When resolving a p… | gitpython | 2023-08-28T18:15:00+00:00 | 2023-09-05T22:26:14.587281+00:00 |
| pysec-2023-160 |
6.5 (3.1)
|
A flaw was found in the Keylime registrar that could allow a bypass of the challenge-resp… | keylime | 2023-08-25T17:15:00+00:00 | 2023-09-05T20:22:36.414406+00:00 |
| pysec-2023-159 |
7.7 (3.1)
|
RestrictedPython is a restricted execution environment for Python to run untrusted code. … | restrictedpython | 2023-08-30T18:15:00+00:00 | 2023-09-05T16:32:17.658660+00:00 |
| pysec-2023-158 |
8.0 (3.1)
|
The session fixation vulnerability allowed the authenticated user to continue accessing A… | apache-airflow | 2023-08-23T16:15:00+00:00 | 2023-09-04T08:29:37.781470+00:00 |
| pysec-2023-157 |
6.1 (3.1)
|
jupyter-server is the backend for Jupyter web applications. Improper cross-site credentia… | jupyter-server | 2023-08-28T21:15:00+00:00 | 2023-09-01T20:23:47.344401+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33313 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.602150Z |
| gsd-2024-33312 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.613311Z |
| gsd-2024-33311 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.685067Z |
| gsd-2024-33310 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.715276Z |
| gsd-2024-33309 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.735013Z |
| gsd-2024-33308 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.615223Z |
| gsd-2024-33307 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.602795Z |
| gsd-2024-33306 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.659851Z |
| gsd-2024-33305 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.739023Z |
| gsd-2024-33304 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.691194Z |
| gsd-2024-33303 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.649918Z |
| gsd-2024-33302 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.701883Z |
| gsd-2024-33301 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.641343Z |
| gsd-2024-33300 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.610877Z |
| gsd-2024-33299 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.637274Z |
| gsd-2024-33298 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.607025Z |
| gsd-2024-33297 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.621980Z |
| gsd-2024-33296 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.654274Z |
| gsd-2024-33295 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.611481Z |
| gsd-2024-33294 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.703136Z |
| gsd-2024-33293 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.628768Z |
| gsd-2024-33292 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.717307Z |
| gsd-2024-33291 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.706255Z |
| gsd-2024-33290 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.723985Z |
| gsd-2024-33289 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.629216Z |
| gsd-2024-33288 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.604465Z |
| gsd-2024-33287 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.751819Z |
| gsd-2024-33286 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.745545Z |
| gsd-2024-33285 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.712627Z |
| gsd-2024-33284 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.716892Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2953 | Malicious code in bmg-web (npm) | 2026-04-20T15:51:27Z | 2026-04-23T20:50:49Z |
| mal-2026-2952 | Malicious code in @settle-sea/supporting-documents (npm) | 2026-04-20T16:31:02Z | 2026-04-23T20:50:49Z |
| mal-2026-2938 | Malicious code in bignum-ts-v2 (npm) | 2026-04-20T06:34:59Z | 2026-04-23T20:50:49Z |
| mal-2026-2937 | Malicious code in @tushar-br/file11 (npm) | 2026-04-20T06:32:59Z | 2026-04-23T20:50:49Z |
| mal-2026-2936 | Malicious code in @tushar-br/editing-pack (npm) | 2026-04-20T06:32:59Z | 2026-04-23T20:50:49Z |
| mal-2026-2935 | Malicious code in @tushar-br/desktop (npm) | 2026-04-20T06:32:59Z | 2026-04-23T20:50:49Z |
| mal-2026-2934 | Malicious code in @otaxayuns/baileys (npm) | 2026-04-20T06:21:33Z | 2026-04-23T20:50:49Z |
| mal-2026-2933 | Malicious code in @kjma/mailcraft (npm) | 2026-04-20T06:15:42Z | 2026-04-23T20:50:49Z |
| mal-2026-2920 | Malicious code in buffer-util-extend (npm) | 2026-04-14T10:22:11Z | 2026-04-23T20:50:49Z |
| mal-2026-2919 | Malicious code in apple-idms-internal (npm) | 2026-04-18T07:55:47Z | 2026-04-23T20:50:49Z |
| mal-2026-2918 | Malicious code in apple-cloudkit-internal (npm) | 2026-04-18T07:55:46Z | 2026-04-23T20:50:49Z |
| mal-2026-2917 | Malicious code in ac-sasskit-internal (npm) | 2026-04-18T06:43:51Z | 2026-04-23T20:50:49Z |
| mal-2026-2916 | Malicious code in @jesusvizcaino2021/com.baogong.app-push-permission (npm) | 2026-04-15T08:18:47Z | 2026-04-23T20:50:49Z |
| mal-2026-2915 | Malicious code in bitu-staking (npm) | 2026-04-12T23:47:27Z | 2026-04-23T20:50:49Z |
| mal-2026-2888 | Malicious code in chai-as-encrypted (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:49Z |
| mal-2026-2887 | Malicious code in chai-as-elevated (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:49Z |
| mal-2026-2886 | Malicious code in chai-as-chain-v2 (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:49Z |
| mal-2026-2885 | Malicious code in chai-as-adapter (npm) | 2026-04-15T22:05:03Z | 2026-04-23T20:50:49Z |
| mal-2026-2881 | Malicious code in bjs-lint-builders (npm) | 2026-04-14T12:35:17Z | 2026-04-23T20:50:49Z |
| mal-2026-2880 | Malicious code in bjs-lint-builder (npm) | 2026-04-14T12:35:04Z | 2026-04-23T20:50:49Z |
| mal-2026-2879 | Malicious code in bjs-biginteger (npm) | 2026-04-14T12:34:46Z | 2026-04-23T20:50:49Z |
| mal-2026-2870 | Malicious code in black-moon-js (npm) | 2026-04-08T19:03:22Z | 2026-04-23T20:50:49Z |
| mal-2026-2869 | Malicious code in arlo-meeting-assistant-rtms (npm) | 2026-04-11T19:45:41Z | 2026-04-23T20:50:49Z |
| mal-2026-2868 | Malicious code in arlo-meeting-assistant-frontend (npm) | 2026-04-11T19:45:33Z | 2026-04-23T20:50:49Z |
| mal-2026-2867 | Malicious code in arlo-meeting-assistant-backend (npm) | 2026-04-11T19:35:30Z | 2026-04-23T20:50:49Z |
| mal-2026-2866 | Malicious code in @tableau__catalog-messages/database_lower (npm) | 2026-04-09T08:55:50Z | 2026-04-23T20:50:49Z |
| mal-2026-2865 | Malicious code in @sie-ppr-web-checkout/app (npm) | 2026-04-07T23:37:14Z | 2026-04-23T20:50:49Z |
| mal-2026-2858 | Malicious code in @source-row/source-container (npm) | 2026-04-18T17:18:09Z | 2026-04-23T20:50:49Z |
| mal-2026-2857 | Malicious code in @shoobx/types (npm) | 2026-04-18T17:35:52Z | 2026-04-23T20:50:49Z |
| mal-2026-2856 | Malicious code in @ataslkit/profilecard (npm) | 2026-04-18T11:55:46Z | 2026-04-23T20:50:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0556 | Ghostscript: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-03-12T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2024-3754 | shadow: Schwachstelle ermöglicht Erlangen von Benutzerrechten | 2024-12-26T23:00:00.000+00:00 | 2025-12-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2510 | AnyDesk: Mehrere Schwachstellen | 2025-11-06T23:00:00.000+00:00 | 2025-12-07T23:00:00.000+00:00 |
| wid-sec-w-2025-2738 | Vercel Next.js und React Server Components (React2Shell): Schwachstelle ermöglicht Codeausführung | 2025-12-03T23:00:00.000+00:00 | 2025-12-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2682 | Tinyproxy: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-11-26T23:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2548 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2020-03-31T22:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2435 | D-LINK Aquila Pro AI R15: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2025-10-28T23:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-1502 | AMD Prozessor: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-07-08T22:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-1447 | Xen: Schwachstelle ermöglicht Denial of Service | 2025-07-01T22:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-1252 | GNU libc: Mehrere Schwachstellen ermöglichen Manipulation von Daten | 2025-06-05T22:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-1157 | binutils: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-05-27T22:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-0775 | OpenSSH: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-04-09T22:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-0456 | Xen: Schwachstelle ermöglicht Denial of Service | 2025-02-27T23:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2024-0021 | X.Org X11: Mehrere Schwachstellen ermöglichen Denial of Service | 2019-08-06T22:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2701 | xwiki (XJetty): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-30T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2700 | CODESYS Control und Development System: Mehrere Schwachstellen | 2025-11-30T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2636 | OpenVPN: Mehrere Schwachstellen | 2025-11-18T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2533 | RedHat Multicluster Engine for Kubernetes: Schwachstelle ermöglicht Privilegieneskalation | 2025-11-09T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2508 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Denial of Service | 2025-11-06T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2327 | binutils: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-16T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2209 | HAProxy und HAProxy ALOHA: Schwachstelle ermöglicht Denial of Service | 2025-10-05T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-1719 | Red Hat Enterprise Linux (ncurses): Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-08-04T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-1679 | Linux Kernel: Schwachstelle ermöglicht Manipulation und Dos | 2025-07-29T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-1647 | binutils: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-27T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-1543 | binutils: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-13T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-0709 | binutils: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-04-03T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-0372 | PostgreSQL: Schwachstelle ermöglicht SQL Injection und Codeausführung | 2025-02-13T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-0304 | binutils: Mehrere Schwachstellen | 2025-02-10T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2024-3475 | PostgreSQL: Mehrere Schwachstellen | 2024-11-14T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2024-1800 | PostgreSQL: Schwachstelle ermöglicht Privilegieneskalation | 2024-08-08T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-15-309-01 | Advantech EKI Hard-coded SSH Keys Vulnerability | 2015-08-08T06:00:00.000000Z | 2025-06-09T16:27:27.090625Z |
| icsa-15-300-03a | Rockwell Automation Micrologix 1100 and 1400 PLC Systems Vulnerabilities (Update A) | 2015-07-30T06:00:00.000000Z | 2025-06-09T16:26:55.984078Z |
| icsa-15-300-02a | Infinite Automation Systems Mango Automation Vulnerabilities (Update A) | 2015-07-30T06:00:00.000000Z | 2025-06-09T16:26:12.022061Z |
| icsa-15-300-01 | Siemens RuggedCom Improper Ethernet Frame Padding Vulnerability | 2015-07-30T06:00:00.000000Z | 2025-06-09T16:26:05.782495Z |
| icsa-15-295-01 | Eaton's Cooper Devices Improper Ethernet Frame Padding Vulnerability | 2015-07-25T06:00:00.000000Z | 2025-06-09T16:25:59.550069Z |
| icsa-15-293-03 | 3S CODESYS Gateway Null Pointer Exception Vulnerability | 2015-07-23T06:00:00.000000Z | 2025-06-09T16:25:53.323160Z |
| icsa-15-293-02 | IniNet Solutions SCADA Web Server Vulnerabilities | 2015-07-23T06:00:00.000000Z | 2025-06-09T16:25:34.578936Z |
| icsa-15-293-01 | IniNet Solutions embeddedWebServer Cleartext Storage Vulnerability | 2015-07-23T06:00:00.000000Z | 2025-06-09T16:25:28.331705Z |
| icsa-15-288-01 | 3S CODESYS Runtime Toolkit Null Pointer Dereference Vulnerability | 2015-07-18T06:00:00.000000Z | 2025-06-09T16:25:22.103595Z |
| icsa-15-286-01 | Nordex NC2 XSS Vulnerability | 2015-07-16T06:00:00.000000Z | 2025-06-09T16:25:15.861787Z |
| icsa-15-274-02a | Unitronics VisiLogic OPLC IDE Vulnerabilities (Update A) | 2015-07-04T06:00:00.000000Z | 2025-06-09T16:24:57.129200Z |
| icsa-15-274-01 | Omron Multiple Product Vulnerabilities | 2015-07-04T06:00:00.000000Z | 2025-06-09T16:24:38.133706Z |
| icsa-15-272-01 | Honeywell Experion PKS Directory Traversal Vulnerability | 2015-07-02T06:00:00.000000Z | 2025-06-09T16:24:31.906369Z |
| icsa-15-267-01 | Endress+Hauser Fieldcare/CodeWrights HART Comm DTM XML Injection Vulnerability | 2015-06-27T06:00:00.000000Z | 2025-06-09T16:24:25.686094Z |
| icsa-15-265-03 | Janitza UMG Power Quality Measuring Products Vulnerabilities | 2015-06-25T06:00:00.000000Z | 2025-06-09T16:23:41.261527Z |
| icsa-15-265-02 | IBC Solar ServeMaster Source Code Vulnerability | 2015-06-25T06:00:00.000000Z | 2025-06-09T16:23:22.529805Z |
| icsa-15-265-01 | Resource Data Management Privilege Escalation Vulnerability | 2015-06-25T06:00:00.000000Z | 2025-06-09T16:23:10.053523Z |
| icsa-15-260-01 | Harman-Kardon Uconnect Vulnerability | 2015-06-20T06:00:00.000000Z | 2025-06-09T16:23:03.824948Z |
| icsa-15-258-04 | Advantech WebAccess Stack-Based Buffer Overflow Vulnerability | 2015-06-18T06:00:00.000000Z | 2025-06-09T16:22:57.599223Z |
| icsa-15-237-02 | EasyIO-30P-SF Hard-Coded Credential Vulnerability | 2015-05-28T06:00:00.000000Z | 2025-06-09T16:22:51.381445Z |
| icsa-15-232-01 | Everest Software PeakHMI Pointer Dereference Vulnerabilities | 2015-05-23T06:00:00.000000Z | 2025-06-09T16:22:44.799609Z |
| icsa-14-105-02a | Innominate mGuard OpenSSL HeartBleed Vulnerability | 2014-01-16T07:00:00.000000Z | 2025-06-06T22:55:58.996445Z |
| icsa-14-084-01 | Festo CECX-X-(C1/M1) Controller Vulnerabilities | 2014-12-26T07:00:00.000000Z | 2025-06-06T22:55:26.819560Z |
| icsa-13-344-01 | WellinTech Vulnerabilities | 2013-09-12T06:00:00.000000Z | 2025-06-06T22:55:13.840768Z |
| icsa-13-213-01 | Siemens Scalance W-7xx Product Family Multiple Vulnerabilities | 2013-05-04T06:00:00.000000Z | 2025-06-06T22:54:47.674263Z |
| icsa-13-142-01 | 3S CODESYS Gateway Use After Free | 2013-02-23T07:00:00.000000Z | 2025-06-06T22:54:41.230556Z |
| icsa-13-136-01 | TURCK BL20 and BL67 Programmable Gateway Hard-Coded User Accounts | 2013-02-17T07:00:00.000000Z | 2025-06-06T22:54:28.354036Z |
| icsa-13-116-01 | Galil RIO-47100 Improper Input Validation | 2013-01-28T07:00:00.000000Z | 2025-06-06T22:54:21.910443Z |
| icsa-13-084-01 | Siemens CP 1604 and CP 1616 Improper Access Control | 2013-12-27T07:00:00.000000Z | 2025-06-06T22:53:49.627883Z |
| icsa-15-008-02 | Schneider Electric Wonderware InTouch Access Anywhere Server Buffer Overflow Vulnerability | 2015-10-11T06:00:00.000000Z | 2025-06-06T22:53:43.105671Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-confd-priv-esc-lsgtcrx4 | ConfD CLI Secure Shell Server Privilege Escalation Vulnerability | 2021-08-04T16:00:00+00:00 | 2023-10-04T16:00:12+00:00 |
| cisco-sa-confd-priv-esc-LsGtCRx4 | ConfD CLI Secure Shell Server Privilege Escalation Vulnerability | 2021-08-04T16:00:00+00:00 | 2023-10-04T16:00:12+00:00 |
| cisco-sa-rdocker-uatbukkn | Cisco IOx Application Hosting Environment Privilege Escalation Vulnerability | 2023-10-04T16:00:00+00:00 | 2023-10-04T16:00:00+00:00 |
| cisco-sa-rdocker-uATbukKn | Cisco IOx Application Hosting Environment Privilege Escalation Vulnerability | 2023-10-04T16:00:00+00:00 | 2023-10-04T16:00:00+00:00 |
| cisco-sa-cucm-apidos-PGsDcdNF | Multiple Cisco Unified Communications Products Unauthenticated API High CPU Utilization Denial of Service Vulnerability | 2023-10-04T16:00:00+00:00 | 2024-05-17T15:07:50+00:00 |
| cisco-sa-cer-priv-esc-b9t3hqk9 | Cisco Emergency Responder Static Credentials Vulnerability | 2023-10-04T16:00:00+00:00 | 2023-10-04T16:00:00+00:00 |
| cisco-sa-cer-priv-esc-B9t3hqk9 | Cisco Emergency Responder Static Credentials Vulnerability | 2023-10-04T16:00:00+00:00 | 2023-10-04T16:00:00+00:00 |
| cisco-sa-wlc-wncd-hfgmsfsd | Cisco IOS XE Software for Wireless LAN Controllers Wireless Network Control Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-wlc-wncd-HFGMsfSD | Cisco IOS XE Software for Wireless LAN Controllers Wireless Network Control Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-webui-cmdij-fzzaexay | Cisco IOS XE Software Web UI Command Injection Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-webui-cmdij-FzZAeXAy | Cisco IOS XE Software Web UI Command Injection Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-vmanage-html-3zkh8d6x | Cisco Catalyst SD-WAN Manager Web UI HTML Injection Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-vmanage-html-3ZKh8d6x | Cisco Catalyst SD-WAN Manager Web UI HTML Injection Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-mlre-h93fswrz | Cisco IOS XE Software for ASR 1000 Series Aggregation Services Routers IPv6 Multicast Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-mlre-H93FswRz | Cisco IOS XE Software for ASR 1000 Series Aggregation Services Routers IPv6 Multicast Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-ios-xe-l2tp-dos-eb5tufmv | Cisco IOS XE Software Layer 2 Tunneling Protocol Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-ios-xe-l2tp-dos-eB5tuFmV | Cisco IOS XE Software Layer 2 Tunneling Protocol Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-getvpn-rce-g8qr68sx | Cisco IOS and IOS XE Software Cisco Group Encrypted Transport VPN Software Out-of-Bounds Write Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-getvpn-rce-g8qR68sx | Cisco IOS and IOS XE Software Cisco Group Encrypted Transport VPN Software Out-of-Bounds Write Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-dnac-ins-acc-con-nhavdrbz | Cisco DNA Center API Insufficient Access Control Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-dnac-ins-acc-con-nHAVDRBZ | Cisco DNA Center API Insufficient Access Control Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-click-ap-dos-wdcxkvnq | Cisco Catalyst 9100 Access Points Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-click-ap-dos-wdcXkvnQ | Cisco Catalyst 9100 Access Points Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-cbw-dos-ysmbuqx3 | Cisco Wireless LAN Controller AireOS Software Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-cbw-dos-YSmbUqX3 | Cisco Wireless LAN Controller AireOS Software Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-cat3k-dos-zza4gb3r | Cisco IOS XE Software for Catalyst 3650 and Catalyst 3850 Series Switches Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-cat3k-dos-ZZA4Gb3r | Cisco IOS XE Software for Catalyst 3650 and Catalyst 3850 Series Switches Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-appqoe-utd-dos-p8o57p5y | Cisco IOS XE Software Application Quality of Experience and Unified Threat Defense Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-appqoe-utd-dos-p8O57p5y | Cisco IOS XE Software Application Quality of Experience and Unified Threat Defense Denial of Service Vulnerability | 2023-09-27T16:00:00+00:00 | 2023-09-27T16:00:00+00:00 |
| cisco-sa-lnt-l9zokbz5 | Cisco IOS XR Software Image Verification Vulnerability | 2023-09-13T16:00:00+00:00 | 2023-09-13T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-33055 | tar-rs incorrectly ignores PAX size headers if header size is nonzero | 2026-03-02T00:00:00.000Z | 2026-04-29T14:39:48.000Z |
| msrc_cve-2025-1149 | GNU Binutils ld xmalloc.c xstrdup memory leak | 2025-02-02T00:00:00.000Z | 2026-04-29T14:39:36.000Z |
| msrc_cve-2026-31454 | xfs: save ailp before dropping the AIL lock in push callbacks | 2026-04-02T00:00:00.000Z | 2026-04-29T14:39:34.000Z |
| msrc_cve-2025-1152 | GNU Binutils ld xstrdup.c xstrdup memory leak | 2025-02-02T00:00:00.000Z | 2026-04-29T14:39:24.000Z |
| msrc_cve-2026-32766 | astral-tokio-tar insufficiently validates PAX extensions during extraction | 2026-03-02T00:00:00.000Z | 2026-04-29T14:39:21.000Z |
| msrc_cve-2026-31469 | virtio_net: Fix UAF on dst_ops when IFF_XMIT_DST_RELEASE is cleared and napi_tx is false | 2026-04-02T00:00:00.000Z | 2026-04-29T14:39:02.000Z |
| msrc_cve-2026-31441 | dmaengine: idxd: Fix memory leak when a wq is reset | 2026-04-02T00:00:00.000Z | 2026-04-29T14:38:46.000Z |
| msrc_cve-2024-58266 | The shlex crate before 1.2.1 for Rust allows unquoted and unescaped instances of the { and \xa0 characters, which may facilitate command injection. | 2025-07-02T00:00:00.000Z | 2026-04-29T14:38:45.000Z |
| msrc_cve-2026-23388 | Squashfs: check metadata block offset is within range | 2026-03-02T00:00:00.000Z | 2026-04-29T01:47:41.000Z |
| msrc_cve-2026-2369 | Libsoup: libsoup: buffer overread due to integer underflow when handling zero-length resources | 2026-03-02T00:00:00.000Z | 2026-04-29T01:44:52.000Z |
| msrc_cve-2026-3784 | wrong proxy connection reuse with credentials | 2026-03-02T00:00:00.000Z | 2026-04-29T01:43:59.000Z |
| msrc_cve-2026-3783 | token leak with redirect and netrc | 2026-03-02T00:00:00.000Z | 2026-04-29T01:43:47.000Z |
| msrc_cve-2026-1965 | bad reuse of HTTP Negotiate connection | 2026-03-02T00:00:00.000Z | 2026-04-29T01:43:35.000Z |
| msrc_cve-2026-22701 | filelock Time-of-Check-Time-of-Use (TOCTOU) Symlink Vulnerability in SoftFileLock | 2026-01-02T00:00:00.000Z | 2026-04-29T01:43:24.000Z |
| msrc_cve-2025-68146 | filelock has TOCTOU race condition that allows symlink attacks during lock file creation | 2025-12-02T00:00:00.000Z | 2026-04-29T01:43:13.000Z |
| msrc_cve-2026-2443 | Libsoup: out-of-bounds read in libsoup handle_partial_get() leading to heap information disclosure | 2026-02-02T00:00:00.000Z | 2026-04-29T01:42:41.000Z |
| msrc_cve-2026-32147 | SFTP chroot bypass via path traversal in SSH_FXP_FSETSTAT | 2026-04-02T00:00:00.000Z | 2026-04-29T01:40:02.000Z |
| msrc_cve-2026-41411 | Vim: Command injection via backtick expansion in tag filenames | 2026-04-02T00:00:00.000Z | 2026-04-29T01:39:36.000Z |
| msrc_cve-2026-31788 | xen/privcmd: restrict usage in unprivileged domU | 2026-03-02T00:00:00.000Z | 2026-04-29T01:39:04.000Z |
| msrc_cve-2026-23406 | apparmor: fix side-effect bug in match_char() macro usage | 2026-04-02T00:00:00.000Z | 2026-04-29T01:38:51.000Z |
| msrc_cve-2026-23395 | Bluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ | 2026-03-02T00:00:00.000Z | 2026-04-29T01:38:30.000Z |
| msrc_cve-2026-23391 | netfilter: xt_CT: drop pending enqueued packets on template removal | 2026-03-02T00:00:00.000Z | 2026-04-29T01:38:21.000Z |
| msrc_cve-2026-40556 | Insecure Directory Permissions in GNU nano Leading to Privilege Abuse | 2026-04-02T00:00:00.000Z | 2026-04-29T01:07:07.000Z |
| msrc_cve-2026-31552 | wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:32.000Z |
| msrc_cve-2026-31551 | wifi: mac80211: Fix static_branch_dec() underflow for aql_disable. | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:26.000Z |
| msrc_cve-2026-31550 | pmdomain: bcm: bcm2835-power: Increase ASB control timeout | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:20.000Z |
| msrc_cve-2026-31549 | i2c: cp2615: fix serial string NULL-deref at probe | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:15.000Z |
| msrc_cve-2026-31548 | wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down | 2026-04-02T00:00:00.000Z | 2026-04-29T01:02:09.000Z |
| msrc_cve-2026-40372 | ASP.NET Core Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-28T07:00:00.000Z |
| msrc_cve-2026-33103 | Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-28T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0262 | Kwetsbaarheden verholpen in VMware vCenter | 2024-06-18T11:46:03.858476Z | 2024-06-18T11:46:03.858476Z |
| ncsc-2024-0261 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2024-06-14T09:59:56.652183Z | 2024-06-14T09:59:56.652183Z |
| ncsc-2024-0236 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2024-05-27T07:11:10.705670Z | 2024-06-14T09:37:49.413035Z |
| ncsc-2024-0260 | Kwetsbaarheden verholpen in Nvidia GPU Drivers | 2024-06-14T06:34:54.620125Z | 2024-06-14T06:34:54.620125Z |
| ncsc-2024-0259 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2024-06-14T06:30:30.926535Z | 2024-06-14T06:30:30.926535Z |
| ncsc-2024-0258 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-06-14T06:28:31.318295Z | 2024-06-14T06:28:31.318295Z |
| ncsc-2024-0257 | Kwetsbaarheid verholpen in Adobe Creative Cloud Desktop Application | 2024-06-14T06:27:08.002611Z | 2024-06-14T06:27:08.002611Z |
| ncsc-2024-0256 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2024-06-13T13:37:57.490381Z | 2024-06-13T13:37:57.490381Z |
| ncsc-2024-0254 | Kwetsbaarheden verholpen in Adobe FrameMaker Publishing Server | 2024-06-13T13:34:41.831468Z | 2024-06-13T13:34:41.831468Z |
| ncsc-2024-0253 | Kwetsbaarheid verholpen in Adobe Photoshop | 2024-06-13T13:31:15.643260Z | 2024-06-13T13:31:15.643260Z |
| ncsc-2024-0252 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2024-06-11T18:23:19.082621Z | 2024-06-11T18:23:19.082621Z |
| ncsc-2024-0251 | Kwetsbaarheden verholpen in Microsoft Office | 2024-06-11T18:20:51.628241Z | 2024-06-11T18:20:51.628241Z |
| ncsc-2024-0250 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2024-06-11T18:18:10.131111Z | 2024-06-11T18:18:10.131111Z |
| ncsc-2024-0249 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-06-11T18:15:29.806897Z | 2024-06-11T18:15:29.806897Z |
| ncsc-2024-0248 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-06-11T18:06:57.087085Z | 2024-06-11T18:11:31.381556Z |
| ncsc-2024-0246 | Kwetsbaarheden verholpen in Siemens producten | 2024-06-11T13:29:25.912614Z | 2024-06-11T13:29:25.912614Z |
| ncsc-2024-0247 | Kwetsbaarheden verholpen in SAP producten | 2024-06-11T12:37:09.525507Z | 2024-06-11T12:37:09.525507Z |
| ncsc-2024-0245 | Kwetsbaarheden verholpen in Trend Micro Apex One | 2024-06-11T11:51:02.976099Z | 2024-06-11T11:51:02.976099Z |
| ncsc-2024-0244 | Kwetsbaarheden verholpen in Schneider Electric Sage RTU systemen | 2024-06-11T11:33:48.933251Z | 2024-06-11T11:33:48.933251Z |
| ncsc-2024-0232 | Kwetsbaarheden verholpen in Veeam Backup Enterprise Manager | 2024-05-22T11:42:48.155465Z | 2024-06-11T11:33:12.845658Z |
| ncsc-2024-0243 | Kwetsbaarheden verholpen in PHP | 2024-06-10T07:02:05.106950Z | 2024-06-10T07:02:05.106950Z |
| ncsc-2024-0242 | Kwetsbaarheden verholpen in RoundCube Webmail | 2024-06-07T11:01:13.397121Z | 2024-06-07T11:01:13.397121Z |
| ncsc-2024-0241 | Kwetsbaarheden verholpen in FortiNet FortiWebManager | 2024-06-07T07:22:27.233971Z | 2024-06-07T07:22:27.233971Z |
| ncsc-2024-0240 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-06-07T07:21:29.492650Z | 2024-06-07T07:21:29.492650Z |
| ncsc-2024-0239 | Kwetsbaarheden verholpen in Solarwinds Platform | 2024-06-07T06:26:01.172456Z | 2024-06-07T06:26:01.172456Z |
| ncsc-2024-0238 | Kwetsbaarheid verholpen in Check Point VPN producten | 2024-05-30T07:56:46.220112Z | 2024-05-30T07:56:46.220112Z |
| ncsc-2024-0237 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-05-27T11:26:30.888877Z | 2024-05-27T11:26:30.888877Z |
| ncsc-2024-0235 | Kwetsbaarheid verholpen in Google Chrome | 2024-05-27T07:10:26.268379Z | 2024-05-27T07:50:35.517237Z |
| ncsc-2024-0234 | Kwetsbaarheid verholpen in Github Enterprise Server | 2024-05-23T10:57:36.609416Z | 2024-05-23T10:57:36.609416Z |
| ncsc-2024-0233 | Kwetsbaarheden verholpen in Cisco producten | 2024-05-23T10:56:24.310012Z | 2024-05-23T10:56:24.310012Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10105-1 | teleport-17.7.14-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:10104-1 | python311-sigstore-4.2.0-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:10103-1 | python311-orjson-3.11.5-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:10102-1 | libopencc1_2-1.2.0-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:10101-1 | coredns-1.14.1-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:20113-1 | Security update for php8 | 2026-01-26T12:37:41Z | 2026-01-26T12:37:41Z |
| opensuse-su-2026:20112-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-01-26T11:03:44Z | 2026-01-26T11:03:44Z |
| opensuse-su-2026:20110-1 | Security update for avahi | 2026-01-26T10:20:39Z | 2026-01-26T10:20:39Z |
| opensuse-su-2026:20108-1 | Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-01-26T09:12:02Z | 2026-01-26T09:12:02Z |
| opensuse-su-2026:10100-1 | zot-registry-2.1.14-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10099-1 | zli-2.1.14-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10098-1 | tlp-1.8.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10097-1 | qemu-10.2.0-2.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10096-1 | python311-urllib3_1-1.26.20-5.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10095-1 | libopenjp2-7-2.5.4-2.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10094-1 | libmatio-devel-1.5.30-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10093-1 | java-21-openjdk-21.0.10.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10092-1 | java-17-openjdk-17.0.18.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10091-1 | java-11-openjdk-11.0.30.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10090-1 | google-osconfig-agent-20260119.00-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10089-1 | gio-branding-upstream-2.86.3-2.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10088-1 | cups-2.4.16-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:20099-1 | Security update for coredns | 2026-01-24T09:09:32Z | 2026-01-24T09:09:32Z |
| opensuse-su-2026:20103-1 | Security update for chromium | 2026-01-24T01:00:21Z | 2026-01-24T01:00:21Z |
| opensuse-su-2026:20097-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-01-23T16:43:58Z | 2026-01-23T16:43:58Z |
| opensuse-su-2026:20095-1 | Security update for python-jaraco.context | 2026-01-23T10:43:43Z | 2026-01-23T10:43:43Z |
| opensuse-su-2026:20105-1 | Security update for sbctl | 2026-01-23T10:02:42Z | 2026-01-23T10:02:42Z |
| opensuse-su-2026:10087-1 | tdom-0.9.6-1.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| opensuse-su-2026:10086-1 | openCryptoki-3.26.0-4.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| opensuse-su-2026:10085-1 | libxml2-16-2.14.5-2.1 on GA media | 2026-01-23T00:00:00Z | 2026-01-23T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:0777 | Red Hat Security Advisory: jenkins and jenkins-2-plugins security update | 2024-02-12T10:27:23+00:00 | 2026-05-09T20:42:35+00:00 |
| rhsa-2024:0766 | Red Hat Security Advisory: OpenShift Container Platform 4.15.0 security update | 2024-02-28T08:10:56+00:00 | 2026-05-09T20:42:33+00:00 |
| rhsa-2024:0746 | Red Hat Security Advisory: new container image: rhceph-5.3 | 2024-02-08T16:49:55+00:00 | 2026-05-09T20:42:31+00:00 |
| rhsa-2024:0682 | Red Hat Security Advisory: OpenShift Container Platform 4.11.58 bug fix and security update | 2024-02-08T18:42:42+00:00 | 2026-05-09T20:42:30+00:00 |
| rhsa-2024:0741 | Red Hat Security Advisory: OpenShift Container Platform 4.13.33 bug fix and security update | 2024-02-14T06:34:01+00:00 | 2026-05-09T20:42:29+00:00 |
| rhsa-2024:0664 | Red Hat Security Advisory: OpenShift Container Platform 4.12.49 bug fix update and security update | 2024-02-08T19:31:18+00:00 | 2026-05-09T20:42:28+00:00 |
| rhsa-2024:0660 | Red Hat Security Advisory: OpenShift Container Platform 4.13.32 bug fix and security update | 2024-02-07T15:07:37+00:00 | 2026-05-09T20:42:26+00:00 |
| rhsa-2024:0642 | Red Hat Security Advisory: OpenShift Container Platform 4.14.11 bug fix and security update | 2024-02-07T17:36:34+00:00 | 2026-05-09T20:42:25+00:00 |
| rhsa-2024:0484 | Red Hat Security Advisory: OpenShift Container Platform 4.13.31 bug fix and security update | 2024-02-01T19:01:48+00:00 | 2026-05-09T20:42:23+00:00 |
| rhsa-2024:0485 | Red Hat Security Advisory: OpenShift Container Platform 4.12.48 bug fix and security update | 2024-01-31T16:17:59+00:00 | 2026-05-09T20:42:21+00:00 |
| rhsa-2024:0306 | Red Hat Security Advisory: OpenShift Container Platform 4.11.57 bug fix and security update | 2024-01-24T20:54:46+00:00 | 2026-05-09T20:42:19+00:00 |
| rhsa-2024:0302 | Red Hat Security Advisory: Kube Descheduler Operator for Red Hat OpenShift 5.0.0 for RHEL 9:security update | 2024-03-06T13:33:21+00:00 | 2026-05-09T20:42:18+00:00 |
| rhsa-2024:0290 | Red Hat Security Advisory: OpenShift Container Platform 4.14.10 bug fix and security update | 2024-01-23T20:26:08+00:00 | 2026-05-09T20:42:17+00:00 |
| rhsa-2024:0273 | Red Hat Security Advisory: OpenShift Virtualization 4.12.9 Images security and bug fix update | 2024-01-17T08:29:36+00:00 | 2026-05-09T20:42:16+00:00 |
| rhsa-2024:0269 | Red Hat Security Advisory: Run Once Duration Override Operator for Red Hat OpenShift 1.1.0 for RHEL 9 | 2024-02-28T00:20:04+00:00 | 2026-05-09T20:42:16+00:00 |
| rhsa-2024:0198 | Red Hat Security Advisory: OpenShift Container Platform 4.12.47 security update | 2024-01-17T18:20:55+00:00 | 2026-05-09T20:42:16+00:00 |
| rhsa-2024:0193 | Red Hat Security Advisory: OpenShift Container Platform 4.13.29 bug fix and security update | 2024-01-17T09:48:09+00:00 | 2026-05-09T20:42:14+00:00 |
| rhsa-2024:0059 | Red Hat Security Advisory: OpenShift Container Platform 4.11.56 bug fix and security update | 2024-01-10T00:23:49+00:00 | 2026-05-09T20:42:14+00:00 |
| rhsa-2023:7831 | Red Hat Security Advisory: OpenShift Container Platform 4.14.7 bug fix and security update | 2024-01-03T20:04:32+00:00 | 2026-05-09T20:42:14+00:00 |
| rhsa-2024:0050 | Red Hat Security Advisory: OpenShift Container Platform 4.14.8 bug fix and security update | 2024-01-09T16:55:38+00:00 | 2026-05-09T20:42:13+00:00 |
| rhsa-2024:0045 | Red Hat Security Advisory: OpenShift Container Platform 4.16.0 security update | 2024-06-27T13:06:17+00:00 | 2026-05-09T20:42:13+00:00 |
| rhsa-2024:0043 | Red Hat Security Advisory: Red Hat build of MicroShift 4.16.0 security update | 2024-06-27T13:18:33+00:00 | 2026-05-09T20:42:12+00:00 |
| rhsa-2024:0041 | Red Hat Security Advisory: OpenShift Container Platform 4.16.0 bug fix and security update | 2024-06-27T11:23:01+00:00 | 2026-05-09T20:42:10+00:00 |
| rhsa-2023:7827 | Red Hat Security Advisory: OpenShift Container Platform 4.13.z security update | 2024-01-04T14:22:05+00:00 | 2026-05-09T20:42:10+00:00 |
| rhsa-2024:0040 | Red Hat Security Advisory: OpenShift Container Platform 4.16.0 security and extras update | 2024-06-27T10:52:21+00:00 | 2026-05-09T20:42:09+00:00 |
| rhsa-2023:7823 | Red Hat Security Advisory: OpenShift Container Platform 4.12.46 bug fix and security update | 2024-01-04T14:41:38+00:00 | 2026-05-09T20:42:09+00:00 |
| rhsa-2023:7741 | Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security, enhancements, and bug fix update | 2023-12-12T13:55:37+00:00 | 2026-05-09T20:42:07+00:00 |
| rhsa-2023:7710 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 7.2.0 security update | 2023-12-11T00:20:04+00:00 | 2026-05-09T20:42:07+00:00 |
| rhsa-2023:7704 | Red Hat Security Advisory: OpenShift Virtualization 4.14.1 security and bug fix update | 2023-12-07T15:00:28+00:00 | 2026-05-09T20:42:06+00:00 |
| rhsa-2023:7703 | Red Hat Security Advisory: Red Hat OpenShift Pipelines 1.10.6 release and security update | 2023-12-07T14:57:07+00:00 | 2026-05-09T20:42:06+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-211752 | SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA | 2021-06-08T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-100232 | SSA-100232: Denial-of-Service vulnerability in SCALANCE X Switches | 2019-08-13T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-845392 | SSA-845392: Multiple Vulnerabilities in Nucleus RTOS based Siemens Energy PLUSCONTROL 1st Gen Devices | 2022-01-11T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-789208 | SSA-789208: Multiple Vulnerabilities (INFRA:HALT) in Interniche IP-Stack based Low Voltage Devices | 2021-08-04T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-766247 | SSA-766247: Authentication Vulnerability in SIMATIC Process Historian | 2021-10-12T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-705111 | SSA-705111: Multiple Vulnerabilities (NAME:WRECK) in the DNS Module of Nucleus RTOS | 2021-04-13T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-439673 | SSA-439673: Information Disclosure Vulnerability in SIPROTEC 5 Devices | 2022-01-11T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-324998 | SSA-324998: Multiple Vulnerabilities in SICAM A8000 | 2022-01-11T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-201384 | SSA-201384: Predictable UDP Port Number Vulnerability (NAME:WRECK) in the DNS Module of Nucleus RTOS | 2021-04-13T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-185699 | SSA-185699: Out of Bounds Write Vulnerabilities (NAME:WRECK) in the DNS Module of Nucleus RTOS | 2021-04-13T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-173318 | SSA-173318: Unquoted Search Path Vulnerability in SICAM PQ Analyzer | 2022-01-11T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-784507 | SSA-784507: Apache Log4j Vulnerability (CVE-2021-44832) via JDBC Appender - Impact to Siemens Products | 2021-12-28T00:00:00Z | 2021-12-28T00:00:00Z |
| ssa-479842 | SSA-479842: Apache Log4j Vulnerabilities - Impact to Siemens Energy Sensformer / Sensgear (Platform, Basic and Advanced) | 2021-12-21T00:00:00Z | 2021-12-23T00:00:00Z |
| ssa-397453 | SSA-397453: Apache Log4j Vulnerabilities (Log4Shell, CVE-2021-44228, CVE-2021-45046) - Impact to Siemens Energy TraceAlertServerPLUS | 2021-12-20T00:00:00Z | 2021-12-20T00:00:00Z |
| ssa-501673 | SSA-501673: Apache Log4j Denial of Service Vulnerability (CVE-2021-45105) - Impact to Siemens Products | 2021-12-19T00:00:00Z | 2021-12-19T00:00:00Z |
| ssa-802578 | SSA-802578: Multiple File Parsing Vulnerabilities in JTTK before V11.1.1.0 and JT Utilities before V13.1.1.0 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-595101 | SSA-595101: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2.0.5 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-523250 | SSA-523250: Improper Certificate Validation Vulnerability in SINUMERIK Edge | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-496292 | SSA-496292: Remote Code Execution Vulnerability in POWER METER SICAM Q100 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-463116 | SSA-463116: Multiple Access Control Vulnerabilities in Siveillance Identity before V1.6.284.0 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-396621 | SSA-396621: Multiple File Parsing Vulnerabilities in JTTK before V10.8.1.1 and JT Utilities before V12.8.1.1 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-390195 | SSA-390195: LibVNC Vulnerabilities in SIMATIC ITC Products | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-352143 | SSA-352143: Multiple File Parsing Vulnerabilities in JTTK before V11.0.3.0 and JT Utilities before V13.0.3.0 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-199605 | SSA-199605: Arbitrary File Download Vulnerability in SIMATIC eaSie PCS 7 Skill Package | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-161331 | SSA-161331: Scene File Parsing Vulnerability in Simcenter STAR-CCM+ Viewer before V2021.3.1 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-160202 | SSA-160202: Multiple Access Control Vulnerabilities in SiPass Integrated | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-133772 | SSA-133772: Zip Path Traversal Vulnerability in Teamcenter Active Workspace | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-044112 | SSA-044112: Multiple Vulnerabilities (NUCLEUS:13) in the TCP/IP Stack of Nucleus RTOS | 2021-11-09T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-779699 | SSA-779699: Two Incorrect Authorization Vulnerabilities in Mendix | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-755517 | SSA-755517: Path Traversal Vulnerability in Siveillance Video DLNA Server | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20967-1 | Security update for cockpit-repos | 2026-04-05T03:01:00Z | 2026-04-05T03:01:00Z |
| suse-su-2026:1185-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise 15 SP7) | 2026-04-03T16:41:59Z | 2026-04-03T16:41:59Z |
| suse-su-2026:1180-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise 15 SP7) | 2026-04-03T16:41:43Z | 2026-04-03T16:41:43Z |
| suse-su-2026:1179-1 | Security update for libsoup2 | 2026-04-02T15:08:33Z | 2026-04-02T15:08:33Z |
| suse-su-2026:1177-1 | Security update for tar | 2026-04-02T15:00:45Z | 2026-04-02T15:00:45Z |
| suse-su-2026:1174-1 | Security update for LibVNCServer | 2026-04-02T12:43:24Z | 2026-04-02T12:43:24Z |
| suse-su-2026:1173-1 | Security update for LibVNCServer | 2026-04-02T12:43:10Z | 2026-04-02T12:43:10Z |
| suse-su-2026:20995-1 | Security update for dnsdist | 2026-04-02T09:16:22Z | 2026-04-02T09:16:22Z |
| suse-su-2026:1171-1 | Security update for python-tornado | 2026-04-02T08:56:19Z | 2026-04-02T08:56:19Z |
| suse-su-2026:1170-1 | Security update for perl-Crypt-URandom | 2026-04-02T08:42:05Z | 2026-04-02T08:42:05Z |
| suse-su-2026:1169-1 | Security update for wireshark | 2026-04-02T08:29:30Z | 2026-04-02T08:29:30Z |
| suse-su-2026:1166-1 | Security update for expat | 2026-04-02T01:08:26Z | 2026-04-02T01:08:26Z |
| suse-su-2026:20993-1 | Security update for perl-XML-Parser | 2026-04-01T16:24:24Z | 2026-04-01T16:24:24Z |
| suse-su-2026:20992-1 | Security update for python-Pillow | 2026-04-01T14:58:21Z | 2026-04-01T14:58:21Z |
| suse-su-2026:1165-1 | Security update for freerdp | 2026-04-01T13:40:57Z | 2026-04-01T13:40:57Z |
| suse-su-2026:1164-1 | Security update for freerdp2 | 2026-04-01T13:40:49Z | 2026-04-01T13:40:49Z |
| suse-su-2026:20960-1 | Security update for python-pyOpenSSL | 2026-04-01T10:05:58Z | 2026-04-01T10:05:58Z |
| suse-su-2026:20959-1 | Security update for tar | 2026-04-01T10:05:58Z | 2026-04-01T10:05:58Z |
| suse-su-2026:20955-1 | Security update for tar | 2026-04-01T09:39:25Z | 2026-04-01T09:39:25Z |
| suse-su-2026:20954-1 | Security update for python-pyOpenSSL | 2026-04-01T09:35:43Z | 2026-04-01T09:35:43Z |
| suse-su-2026:20989-1 | Security update for kea | 2026-04-01T09:22:53Z | 2026-04-01T09:22:53Z |
| suse-fu-2026:20990-1 | Feature update for himmelblau | 2026-04-01T09:19:25Z | 2026-04-01T09:19:25Z |
| suse-su-2026:1163-1 | Security update for MozillaThunderbird | 2026-04-01T08:49:11Z | 2026-04-01T08:49:11Z |
| suse-su-2026:1162-1 | Security update for python-tornado | 2026-03-31T22:02:18Z | 2026-03-31T22:02:18Z |
| suse-su-2026:1160-1 | Security update for freerdp | 2026-03-31T15:03:59Z | 2026-03-31T15:03:59Z |
| suse-su-2026:1159-1 | Security update for expat | 2026-03-31T15:03:48Z | 2026-03-31T15:03:48Z |
| suse-su-2026:1158-1 | Security update for python-pyasn1 | 2026-03-31T11:55:53Z | 2026-03-31T11:55:53Z |
| suse-su-2026:20951-1 | Security update for python311 | 2026-03-31T09:13:02Z | 2026-03-31T09:13:02Z |
| suse-su-2026:20988-1 | Security update for gnome-online-accounts, gvfs | 2026-03-31T09:08:21Z | 2026-03-31T09:08:21Z |
| suse-su-2026:20956-1 | Security update for python311 | 2026-03-31T09:07:43Z | 2026-03-31T09:07:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:17509 | Important: open-vm-tools security update | 2025-10-07T00:00:00Z | 2025-10-08T10:29:36Z |
| alsa-2025:17397 | Moderate: kernel security update | 2025-10-06T00:00:00Z | 2025-10-08T10:24:28Z |
| alsa-2025:17415 | Moderate: gnutls security, bug fix, and enhancement update | 2025-10-07T00:00:00Z | 2025-10-08T10:07:51Z |
| alsa-2025:17398 | Moderate: kernel-rt security update | 2025-10-06T00:00:00Z | 2025-10-08T10:05:33Z |
| alsa-2025:16904 | Moderate: kernel security update | 2025-09-29T00:00:00Z | 2025-10-03T09:19:26Z |
| alsa-2025:17129 | Important: idm:DL1 security update | 2025-10-01T00:00:00Z | 2025-10-03T08:44:05Z |
| alsa-2025:17119 | Moderate: perl-JSON-XS security update | 2025-09-30T00:00:00Z | 2025-10-01T12:21:59Z |
| alsa-2025:16919 | Moderate: kernel security update | 2025-09-29T00:00:00Z | 2025-10-01T09:28:42Z |
| alsa-2025:16880 | Moderate: kernel security update | 2025-09-29T00:00:00Z | 2025-10-01T09:18:26Z |
| alsa-2025:16861 | Moderate: mysql:8.0 security update | 2025-09-29T00:00:00Z | 2025-10-01T08:52:50Z |
| alsa-2025:16920 | Moderate: kernel-rt security update | 2025-09-29T00:00:00Z | 2025-10-01T08:47:05Z |
| alsa-2025:16823 | Moderate: openssh security update | 2025-09-25T00:00:00Z | 2025-10-01T08:38:24Z |
| alsa-2025:16432 | Moderate: opentelemetry-collector security update | 2025-09-23T00:00:00Z | 2025-09-29T09:41:45Z |
| alsa-2025:13941 | Important: golang security update | 2025-08-18T00:00:00Z | 2025-09-29T09:40:10Z |
| alsa-2025:14560 | Moderate: python3 security update | 2025-08-26T00:00:00Z | 2025-09-29T09:37:04Z |
| alsa-2025:15005 | Moderate: kernel security update | 2025-09-02T00:00:00Z | 2025-09-29T09:34:42Z |
| alsa-2025:14984 | Moderate: python3.12 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:30:31Z |
| alsa-2025:16354 | Moderate: kernel security update | 2025-09-22T00:00:00Z | 2025-09-29T09:27:52Z |
| alsa-2025:15007 | Moderate: python3.12 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:23:49Z |
| alsa-2025:15010 | Moderate: python3.11 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:21:37Z |
| alsa-2025:15011 | Important: kernel security update | 2025-09-02T00:00:00Z | 2025-09-29T09:19:38Z |
| alsa-2025:15017 | Important: udisks2 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:15:52Z |
| alsa-2025:15018 | Important: udisks2 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:14:00Z |
| alsa-2025:15020 | Important: udisks2 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:12:40Z |
| alsa-2025:15019 | Moderate: python3.9 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:10:40Z |
| alsa-2025:15022 | Important: postgresql:15 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:08:26Z |
| alsa-2025:15021 | Important: postgresql:13 security update | 2025-09-02T00:00:00Z | 2025-09-29T09:05:39Z |
| alsa-2025:15023 | Moderate: httpd security update | 2025-09-02T00:00:00Z | 2025-09-29T09:03:21Z |
| alsa-2025:15701 | Important: cups security update | 2025-09-11T00:00:00Z | 2025-09-29T09:01:08Z |
| alsa-2025:15700 | Important: cups security update | 2025-09-11T00:00:00Z | 2025-09-29T08:59:02Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-264 | UNKNOWN READ in cli_html_normalise | 2024-04-17T00:06:11.717243Z | 2024-04-29T11:34:58.355901Z |
| osv-2024-98 | UNKNOWN READ in PackLinuxElf32::adjABS | 2024-02-11T00:14:29.715614Z | 2024-04-29T11:31:53.382431Z |
| osv-2024-74 | Heap-buffer-overflow in hts_log | 2024-02-04T00:02:45.988846Z | 2024-04-29T11:31:45.626304Z |
| osv-2024-39 | Heap-buffer-overflow in simdutf::westmere::implementation::convert_utf8_to_utf32 | 2024-01-25T00:05:37.689031Z | 2024-04-29T11:31:05.900312Z |
| osv-2024-181 | Security exception in org.antlr.v4.runtime.atn.PredictionContext.fromRuleContext | 2024-03-18T00:11:51.491190Z | 2024-04-29T11:30:26.169921Z |
| osv-2024-267 | Heap-buffer-overflow in SetDataFormat | 2024-04-18T00:02:12.015129Z | 2024-04-29T11:29:45.142411Z |
| osv-2024-233 | Use-of-uninitialized-value in WelsDec::CWelsDecoder::ReorderPicturesInDisplay | 2024-04-03T00:12:42.632653Z | 2024-04-29T11:29:24.123337Z |
| osv-2024-20 | Heap-buffer-overflow in bam_aux_get | 2024-01-19T00:05:05.917557Z | 2024-04-29T11:28:16.496002Z |
| osv-2023-1311 | Heap-buffer-overflow in ih264d_format_convert | 2023-12-16T00:05:49.838718Z | 2024-04-29T11:26:02.378788Z |
| osv-2023-1294 | Heap-buffer-overflow in ih264d_compute_bs_non_mbaff | 2023-12-14T00:00:54.614578Z | 2024-04-29T11:26:00.379744Z |
| osv-2023-1305 | Check failed in CheckUnwind | 2023-12-15T00:01:07.183702Z | 2024-04-29T11:25:59.083407Z |
| osv-2023-1062 | Heap-buffer-overflow in H5MM_xstrdup | 2023-10-25T13:01:17.608747Z | 2024-04-29T11:24:44.447081Z |
| osv-2023-1164 | Heap-buffer-overflow in WriteCLUT | 2023-11-15T13:00:55.717548Z | 2024-04-29T11:24:21.233113Z |
| osv-2024-123 | Heap-use-after-free in dxf_tables_read | 2024-02-22T00:12:27.847169Z | 2024-04-29T11:24:19.340311Z |
| osv-2023-1140 | Heap-buffer-overflow in H5MM_strdup | 2023-11-12T13:01:29.798132Z | 2024-04-29T11:24:13.839064Z |
| osv-2023-1195 | Security exception in java.base/java.util.HashMap.resize | 2023-11-22T13:03:08.334211Z | 2024-04-29T11:21:55.852772Z |
| osv-2024-167 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2024-03-14T00:10:52.218597Z | 2024-04-29T11:19:04.592001Z |
| osv-2024-118 | Heap-buffer-overflow in sav_process_row | 2024-02-20T00:01:08.095087Z | 2024-04-29T11:19:02.854462Z |
| osv-2024-163 | Stack-buffer-overflow in H5S_get_simple_extent_dims | 2024-03-12T00:05:38.587103Z | 2024-04-29T11:18:04.652469Z |
| osv-2023-1322 | UNKNOWN READ in ih264d_filter_boundary_left_nonmbaff | 2023-12-18T00:01:44.796567Z | 2024-04-29T11:16:39.254259Z |
| osv-2024-140 | Container-overflow in WasmEdge::LLVM::Compiler::compile | 2024-02-28T00:12:59.500279Z | 2024-04-29T11:16:32.126190Z |
| osv-2023-1313 | Heap-buffer-overflow in isvcd_start_of_pic | 2023-12-16T00:12:09.531964Z | 2024-04-29T11:16:18.966356Z |
| osv-2023-1312 | Heap-buffer-overflow in ih264d_format_convert | 2023-12-16T00:11:20.970046Z | 2024-04-29T11:16:08.727836Z |
| osv-2024-322 | Container-overflow in strtol | 2024-04-29T05:41:35.504634Z | 2024-04-29T05:41:35.505031Z |
| osv-2024-319 | Stack-buffer-underflow in filter_apply_chain | 2024-04-29T05:39:39.042459Z | 2024-04-29T05:39:39.043467Z |
| osv-2024-314 | Heap-buffer-overflow in config__add_listener | 2024-04-29T05:32:04.759568Z | 2024-04-29T05:32:04.759906Z |
| osv-2024-309 | Use-of-uninitialized-value in fast_forward_first_n_chars | 2024-04-29T00:00:29.630732Z | 2024-04-29T00:00:29.631359Z |
| osv-2024-42 | Heap-double-free in dwg_free_common_entity_data | 2024-01-26T00:03:30.637411Z | 2024-04-27T14:26:04.198487Z |
| osv-2024-38 | Heap-buffer-overflow in json_HEADER | 2024-01-25T00:03:33.797633Z | 2024-04-27T14:25:53.641813Z |
| osv-2023-855 | Heap-double-free in dwg_free_common_entity_data | 2023-09-15T14:01:06.818081Z | 2024-04-27T14:22:00.114824Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0100 | Double free when calling `sys_info::disk_info` from multiple threads | 2020-05-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0099 | Aovec<T> lacks bound on its Send and Sync traits allowing data races | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0098 | UsbContext trait did not require implementers to be Send and Sync. | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0097 | Soundness issue with base::Error | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0096 | TreeFocus lacks bounds on its Send and Sync traits | 2020-11-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0094 | Unsound: can make `ARefss` contain a !Send, !Sync object. | 2020-12-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0093 | Async-h1 request smuggling possible with long unread bodies | 2020-12-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0092 | Send/Sync bound needed on V in `impl Send/Sync for ARCache<K, V>` | 2020-11-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0091 | Dangling reference in `access::Map` with Constant | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0090 | Thex<T> allows data races of non-Send types across threads | 2020-12-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0089 | nanorand 0.5.0 - RNGs failed to generate properly for non-64-bit numbers | 2020-12-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0088 | MPMCConsumer/Producer allows sending non-Send type across threads | 2020-11-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0087 | TryMutex<T> allows sending non-Send type across threads | 2020-11-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0082 | ordered_float:NotNan may contain NaN after panic in assignment operators | 2020-12-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0081 | `mio` invalidly assumes the memory layout of std::net::SocketAddr | 2020-11-02T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0080 | `miow` invalidly assumes the memory layout of std::net::SocketAddr | 2020-11-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0075 | Unexpected panic when decoding tokens | 2020-11-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0074 | Reference counting error in `From<Py<T>>` | 2020-11-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0073 | Mutable reference with immutable provenance | 2020-11-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0072 | GenericMutexGuard allows data races of non-Sync types across threads | 2020-10-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0070 | Some lock_api lock guard objects can cause data races | 2020-11-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0069 | Argument injection in sendmail transport | 2020-11-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0068 | Unexpected panic in multihash `from_slice` parsing code | 2020-11-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0062 | Improper `Sync` implementation on `FuturesUnordered` in futures-utils can cause data corruption | 2020-01-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0061 | futures_task::noop_waker_ref can segfault due to dereferencing a NULL pointer | 2020-05-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0060 | futures_task::waker may cause a use-after-free if used on a type that isn't 'static | 2020-09-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0059 | MutexGuard::map can cause a data race in safe code | 2020-10-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0052 | Undefined Behavior in bounded channel | 2020-06-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0050 | VecCopy allows misaligned access to elements | 2020-09-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0049 | Use-after-free in Framed due to lack of pinning | 2020-01-30T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-parse-2026-33627 | Parse Server: Auth data exposed via /users/me endpoint | 2026-03-27T07:14:47.660Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33624 | Parse Server: MFA recovery code single-use bypass via concurrent requests | 2026-03-27T07:14:44.950Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33539 | Parse Server: SQL injection via aggregate and distinct field names in PostgreSQL adapter | 2026-03-27T07:14:42.086Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33538 | Parse Server: Denial of service via unindexed database query for unconfigured auth providers | 2026-03-27T07:14:39.195Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33527 | Parse Server: Session update endpoint allows overwriting server-generated session fields | 2026-03-27T07:14:36.431Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33508 | Parse Server: LiveQuery subscription query depth bypass | 2026-03-27T07:14:33.818Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33498 | Parse Server: Query condition depth bypass via pre-validation transform pipeline | 2026-03-27T07:14:30.964Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33429 | Parse Server: Protected field change detection oracle via LiveQuery watch parameter | 2026-03-27T07:14:28.266Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33421 | Parse Server: LiveQuery bypasses CLP pointer permission enforcement | 2026-03-27T07:14:25.801Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33409 | Parse Server: Auth provider validation bypass on login via partial authData | 2026-03-27T07:14:23.276Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33323 | Parse Server: Email verification resend page leaks user existence | 2026-03-27T07:14:20.379Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-32647 | NGINX ngx_http_mp4_module vulnerability | 2026-03-27T07:10:16.616Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-28755 | NGINX ngx_stream_ssl_module vulnerability | 2026-03-27T07:10:13.976Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-28753 | NGINX ngx_mail_proxy_module vulnerability | 2026-03-27T07:10:10.953Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-27784 | NGINX ngx_http_mp4_module vulnerability | 2026-03-27T07:10:08.052Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-27654 | NGINX ngx_http_dav_module vulnerability | 2026-03-27T07:10:05.293Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-27651 | NGINX ngx_mail_auth_http_module vulnerability | 2026-03-27T07:10:02.387Z | 2026-03-27T07:40:55.991Z |
| bit-minio-2026-33419 | MinIO: LDAP login brute-force via user enumeration and missing rate limit | 2026-03-27T07:08:02.540Z | 2026-03-27T07:40:55.991Z |
| bit-minio-2026-33322 | MinIO: JWT Algorithm Confusion in OIDC Authentication | 2026-03-27T07:07:59.802Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33428 | Discourse Allows Unauthorized Access to Deleted Posts Index via Group Membership | 2026-03-27T07:11:24.928Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33427 | Discourse Authorization Page Displays Unvalidated Redirect Domain | 2026-03-27T07:11:21.636Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33426 | Discourse users can edit or synonymize hidden tags they can't see | 2026-03-27T07:11:18.684Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33425 | Discourse has inferable private group membership or existence via exclude_groups parameter | 2026-03-27T07:11:15.979Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33424 | PM access granted through invites after access revocation | 2026-03-27T07:11:13.161Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33423 | Discourse staff can modify any user's group notification level | 2026-03-27T07:11:10.696Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33422 | Discourse exposes ip_address of flagged user | 2026-03-27T07:11:08.096Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33411 | Discourse's solved topic stream has potential stored XSS in topic title | 2026-03-27T07:11:05.061Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33410 | Discourse hardens chat DM channel creation and expansion | 2026-03-27T07:11:02.112Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33408 | Discourse has Improper Authorization in "Post Edits" Report For Moderators | 2026-03-27T07:10:59.380Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33395 | Discourse has stored click‑based XSS via Graphviz SVG javascript: links | 2026-03-27T07:10:56.479Z | 2026-03-27T07:40:55.991Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ch38544 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:19:55.527550Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cd92481 | Within HostnameError | 2026-01-30T14:01:20.457302Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cd66042 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:16:25.085708Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cb20757 | Cancelling a query (e | 2026-01-30T14:51:22.636956Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bz92766 | beego is an open-source web framework for the Go programming language | 2026-01-30T15:34:54.149400Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bx37171 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:43:22.549529Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bv91860 | Within HostnameError | 2026-01-30T15:42:23.881650Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bt39952 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T15:45:23.955705Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bs24435 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:44:54.166999Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bq46815 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:43:24.142238Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bn11148 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T16:54:56.412220Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bl06950 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:08:23.121647Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bk59402 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T14:00:20.262469Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bj35875 | tar | 2026-01-30T14:59:52.925710Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bj28314 | Within HostnameError | 2026-01-30T15:00:22.906070Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bh03809 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:04:53.009971Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bd53293 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.709597Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ba37192 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-01-30T17:14:26.459138Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-az32516 | Within HostnameError | 2026-01-30T17:27:26.591189Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-az24638 | Within HostnameError | 2026-01-30T17:22:56.881050Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ax77726 | vulnerability was found in PAM | 2026-01-30T16:35:55.808062Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-av38242 | Cancelling a query (e | 2026-01-30T15:33:23.662793Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-au31441 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:29:25.997506Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-an66259 | attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests | 2026-01-30T16:28:25.281484Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-aj76138 | tar | 2026-01-30T14:58:52.957172Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ai42483 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-01-30T16:26:55.732852Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ad41794 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:47:54.368234Z | 2026-01-29T18:58:54Z |
| cleanstart-2025-zr62045 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-01-30T16:56:56.696859Z | 2026-01-29T18:58:54Z |
| cleanstart-2025-us16386 | Security fixes for GHSA-qxp5-gwg8-xv66, GHSA-vvgc-356p-c3xw applied in versions: 1.7.2-r0 | 2026-01-16T11:58:18.007779Z | 2025-12-23T06:02:25Z |
| cleanstart-2025-ob44035 | Security fixes for CVE-2025-61729, GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 1.16.2-r2 | 2026-01-16T11:28:43.176297Z | 2025-12-13T08:34:16Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-1120 | Vulnérabilité dans les produits Cisco | 2025-12-18T00:00:00.000000 | 2025-12-18T00:00:00.000000 |
| CERTFR-2025-AVI-1121 | Vulnérabilité dans Sonicwall Secure Mobile Access | 2025-12-18T00:00:00.000000 | 2025-12-18T00:00:00.000000 |
| CERTFR-2025-AVI-1120 | Vulnérabilité dans les produits Cisco | 2025-12-18T00:00:00.000000 | 2025-12-18T00:00:00.000000 |
| certfr-2025-avi-1119 | Multiples vulnérabilités dans les produits Synology | 2025-12-17T00:00:00.000000 | 2025-12-17T00:00:00.000000 |
| certfr-2025-avi-1118 | Vulnérabilité dans Mozilla Firefox | 2025-12-17T00:00:00.000000 | 2025-12-17T00:00:00.000000 |
| certfr-2025-avi-1117 | Multiples vulnérabilités dans GLPI | 2025-12-17T00:00:00.000000 | 2025-12-17T00:00:00.000000 |
| certfr-2025-avi-1116 | Multiples vulnérabilités dans Google Chrome | 2025-12-17T00:00:00.000000 | 2025-12-17T00:00:00.000000 |
| CERTFR-2025-AVI-1119 | Multiples vulnérabilités dans les produits Synology | 2025-12-17T00:00:00.000000 | 2025-12-17T00:00:00.000000 |
| CERTFR-2025-AVI-1118 | Vulnérabilité dans Mozilla Firefox | 2025-12-17T00:00:00.000000 | 2025-12-17T00:00:00.000000 |
| CERTFR-2025-AVI-1117 | Multiples vulnérabilités dans GLPI | 2025-12-17T00:00:00.000000 | 2025-12-17T00:00:00.000000 |
| CERTFR-2025-AVI-1116 | Multiples vulnérabilités dans Google Chrome | 2025-12-17T00:00:00.000000 | 2025-12-17T00:00:00.000000 |
| certfr-2025-avi-1115 | Vulnérabilité dans Trend Micro Apex One | 2025-12-16T00:00:00.000000 | 2025-12-16T00:00:00.000000 |
| certfr-2025-avi-1114 | Multiples vulnérabilités dans Tenable Nessus | 2025-12-16T00:00:00.000000 | 2025-12-16T00:00:00.000000 |
| certfr-2025-avi-1113 | Multiples vulnérabilités dans Moodle | 2025-12-16T00:00:00.000000 | 2025-12-16T00:00:00.000000 |
| CERTFR-2025-AVI-1115 | Vulnérabilité dans Trend Micro Apex One | 2025-12-16T00:00:00.000000 | 2025-12-16T00:00:00.000000 |
| CERTFR-2025-AVI-1114 | Multiples vulnérabilités dans Tenable Nessus | 2025-12-16T00:00:00.000000 | 2025-12-16T00:00:00.000000 |
| CERTFR-2025-AVI-1113 | Multiples vulnérabilités dans Moodle | 2025-12-16T00:00:00.000000 | 2025-12-16T00:00:00.000000 |
| certfr-2025-avi-1112 | Multiples vulnérabilités dans les produits Elastic | 2025-12-15T00:00:00.000000 | 2025-12-15T00:00:00.000000 |
| certfr-2025-avi-1110 | Multiples vulnérabilités dans les produits Apple | 2025-12-15T00:00:00.000000 | 2025-12-15T00:00:00.000000 |
| certfr-2025-avi-1109 | Vulnérabilité dans strongSwan | 2025-12-15T00:00:00.000000 | 2025-12-15T00:00:00.000000 |
| certfr-2025-avi-1103 | Multiples vulnérabilités dans Microsoft Edge | 2025-12-12T00:00:00.000000 | 2025-12-15T00:00:00.000000 |
| certfr-2025-avi-1096 | Multiples vulnérabilités dans Google Chrome | 2025-12-11T00:00:00.000000 | 2025-12-15T00:00:00.000000 |
| CERTFR-2025-AVI-1112 | Multiples vulnérabilités dans les produits Elastic | 2025-12-15T00:00:00.000000 | 2025-12-15T00:00:00.000000 |
| CERTFR-2025-AVI-1110 | Multiples vulnérabilités dans les produits Apple | 2025-12-15T00:00:00.000000 | 2025-12-15T00:00:00.000000 |
| CERTFR-2025-AVI-1109 | Vulnérabilité dans strongSwan | 2025-12-15T00:00:00.000000 | 2025-12-15T00:00:00.000000 |
| CERTFR-2025-AVI-1103 | Multiples vulnérabilités dans Microsoft Edge | 2025-12-12T00:00:00.000000 | 2025-12-15T00:00:00.000000 |
| CERTFR-2025-AVI-1096 | Multiples vulnérabilités dans Google Chrome | 2025-12-11T00:00:00.000000 | 2025-12-15T00:00:00.000000 |
| certfr-2025-avi-1108 | Multiples vulnérabilités dans les produits IBM | 2025-12-12T00:00:00.000000 | 2025-12-12T00:00:00.000000 |
| certfr-2025-avi-1107 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-12-12T00:00:00.000000 | 2025-12-12T00:00:00.000000 |
| certfr-2025-avi-1106 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-12-12T00:00:00.000000 | 2025-12-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-004754 | MCL Technologies MCL-Net vulnerable to directory traversal | 2023-11-01T16:49+09:00 | 2023-11-01T16:49+09:00 |
| jvndb-2020-000906 | WL-Enq (WEB Enquete) vulnerable to cross-site scripting | 2020-03-24T18:29+09:00 | 2023-10-30T17:52+09:00 |
| jvndb-2023-000100 | Scanning evasion issue in Cisco Secure Email Gateway | 2023-10-16T16:11+09:00 | 2023-10-27T15:52+09:00 |
| jvndb-2023-000103 | HP ThinUpdate vulnerable to improper server certificate verification | 2023-10-23T14:26+09:00 | 2023-10-23T14:26+09:00 |
| jvndb-2023-003771 | File and Directory Permissions Vulnerability in JP1/Performance Management | 2023-10-04T15:23+09:00 | 2023-10-04T15:23+09:00 |
| jvndb-2023-003764 | Multiple vulnerabilities in Panasonic KW Watcher | 2023-09-27T14:44+09:00 | 2023-09-27T14:44+09:00 |
| jvndb-2023-003592 | Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software | 2023-09-13T15:02+09:00 | 2023-09-13T15:02+09:00 |
| jvndb-2023-003023 | Vulnerability in HiRDB | 2023-08-29T15:55+09:00 | 2023-09-06T15:45+09:00 |
| jvndb-2023-003335 | Vulnerability in JP1/VERITAS | 2023-09-06T15:35+09:00 | 2023-09-06T15:35+09:00 |
| jvndb-2023-000092 | "direct" Desktop App for macOS fails to restrict access permissions | 2023-09-06T14:33+09:00 | 2023-09-06T14:33+09:00 |
| jvndb-2023-000090 | Multiple vulnerabilities in CGIs of PMailServer and PMailServer2 | 2023-09-05T14:55+09:00 | 2023-09-05T14:55+09:00 |
| jvndb-2023-002787 | OMRON CJ series and CS/CJ Series EtherNet/IT unit vulnerable to Denial-of-Service (DoS) | 2023-08-03T13:45+09:00 | 2023-08-03T13:45+09:00 |
| jvndb-2023-002510 | Multiple Vulnerabilities in Hitachi Device Manager | 2023-07-19T14:48+09:00 | 2023-07-19T14:48+09:00 |
| jvndb-2023-000065 | Multiple vulnerabilities in WAVLINK WL-WN531AX2 | 2023-06-27T16:50+09:00 | 2023-06-27T16:50+09:00 |
| jvndb-2023-000063 | Multiple vulnerabilities in Panasonic AiSEG2 | 2023-06-16T14:05+09:00 | 2023-06-16T14:05+09:00 |
| jvndb-2023-000054 | Wacom Tablet Driver installer for macOS vulnerable to improper link resolution before file access | 2023-05-25T13:40+09:00 | 2023-05-25T13:40+09:00 |
| jvndb-2023-001894 | Android App "Brother iPrint&Scan" vulnerable to improper access control | 2023-05-19T15:40+09:00 | 2023-05-19T15:40+09:00 |
| jvndb-2023-001852 | OS command injection vulnerability in Inaba Denki Sangyo Wi-Fi AP UNIT | 2023-05-17T15:09+09:00 | 2023-05-17T15:09+09:00 |
| jvndb-2023-000036 | API server of TONE Family vulnerable to authentication bypass using an alternate path | 2023-04-17T14:04+09:00 | 2023-04-17T14:04+09:00 |
| jvndb-2023-001492 | Vulnerability in JP1/VERITAS | 2023-04-12T15:01+09:00 | 2023-04-12T15:01+09:00 |
| jvndb-2023-001400 | CONPROSYS HMI System(CHS) vulnerable to SQL injection | 2023-04-03T16:19+09:00 | 2023-04-03T16:19+09:00 |
| jvndb-2021-000070 | Multiple vulnerabilities in GroupSession | 2021-07-19T15:41+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2021-000068 | Multiple vulnerabilities in Retty App | 2021-07-13T14:34+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2021-000033 | Hot Pepper Gourmet App fails to restrict access permissions | 2021-04-27T17:10+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2021-000031 | Gurunavi Apps fail to restrict access permissions | 2021-04-14T17:22+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2020-000079 | desknet's NEO vulnerable to cross-site scripting | 2020-12-03T17:54+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2020-000070 | Studyplus App uses a hard-coded API key for an external service | 2020-11-05T18:43+09:00 | 2023-03-08T17:02+09:00 |
| jvndb-2023-000016 | The installers of ELECOM Camera Assistant and QuickFileDealer may insecurely load Dynamic Link Libraries | 2023-02-14T17:00+09:00 | 2023-02-14T17:00+09:00 |
| jvndb-2023-001110 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON CX-Motion Pro | 2023-01-25T14:28+09:00 | 2023-01-25T14:28+09:00 |
| jvndb-2023-000009 | EasyMail vulnerable to cross-site scripting | 2023-01-24T16:00+09:00 | 2023-01-24T16:00+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14483 | 多款Apple产品存在未明漏洞(CNVD-2026-14483) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14482 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14482) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14481 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14481) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14480 | 多款Apple产品信息泄露漏洞(CNVD-2026-14480) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14479 | 多款Apple产品安全绕过漏洞(CNVD-2026-14479) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14478 | 多款Apple产品信息泄露漏洞(CNVD-2026-14478) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14477 | 多款Apple产品存在未明漏洞(CNVD-2026-14477) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14476 | 多款Apple产品权限提升漏洞(CNVD-2026-14476) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14475 | 多款Apple产品权限提升漏洞(CNVD-2026-14475) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-11369 | 厦门熵基科技有限公司人证魔方身份认证管理系统存在SQL注入漏洞 | 2026-02-05 | 2026-03-22 |
| cnvd-2026-11389 | 用友网络科技股份有限公司U8 Cloud存在SQL注入漏洞(CNVD-C-2026-72551) | 2026-02-04 | 2026-03-21 |
| cnvd-2026-14410 | Microsoft Exchange Server欺骗漏洞(CNVD-2026-14410) | 2025-12-12 | 2026-03-20 |
| cnvd-2026-14409 | UTT 520W goform/formIpGroupConfig文件缓冲区溢出漏洞 | 2026-02-11 | 2026-03-20 |
| cnvd-2026-14408 | Microsoft Excel代码执行漏洞(CNVD-2026-14408) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14407 | TeamViewer DEX Client权限提升漏洞 | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14406 | MailEnable不安全DLL加载漏洞(CNVD-2026-14406) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14405 | MailEnableMailEnableMailEnable不安全DLL加载漏洞(CNVD-2026-14405) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14404 | MailEnableMailEnable不安全DLL加载漏洞(CNVD-2026-14404) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14403 | MailEnableMailEnable不安全DLL加载漏洞(CNVD-2026-14403) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14402 | MailEnable不安全DLL加载漏洞(CNVD-2026-14402) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14401 | MailEnable不安全DLL加载漏洞(CNVD-2026-14401) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14400 | MailEnable不安全DLL加载漏洞(CNVD-2026-14400) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14399 | MailEnable不安全DLL加载漏洞(CNVD-2026-14399) | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14398 | MailEnable不安全DLL加载漏洞 | 2025-12-18 | 2026-03-20 |
| cnvd-2026-14397 | OpenClaw安全绕过漏洞 | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14396 | OpenClaw文件包含漏洞 | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14395 | OpenClaw访问控制错误漏洞(CNVD-2026-14395) | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14394 | OpenClaw目录遍历漏洞(CNVD-2026-14394) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14393 | OpenClaw远程代码执行漏洞(CNVD-2026-14393) | 2026-03-17 | 2026-03-20 |
| cnvd-2026-14392 | OpenClaw目录遍历漏洞(CNVD-2026-14392) | 2026-03-17 | 2026-03-20 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-09178 | Уязвимость функции insn_rw_emulate_bits() ядра операционной системы Linux, позволяющая на… | 30.07.2025 | 16.02.2026 |
| bdu:2025-09177 | Уязвимость функции qfq_aggregate() ядра операционной системы Linux, позволяющая нарушител… | 30.07.2025 | 16.02.2026 |
| bdu:2025-09176 | Уязвимость модуля drivers/net/usb/sierra_net.c ядра операционной системы Linux, позволяющ… | 30.07.2025 | 16.02.2026 |
| bdu:2025-09175 | Уязвимость функции htb_lookup_leaf() ядра операционной системы Linux, позволяющая нарушит… | 30.07.2025 | 16.02.2026 |
| bdu:2025-09174 | Уязвимость функции i40e_clear_hw() ядра операционной системы Linux, позволяющая нарушител… | 30.07.2025 | 16.02.2026 |
| bdu:2025-09172 | Уязвимость функции __inode_add_ref() ядра операционной системы Linux, позволяющая нарушит… | 29.07.2025 | 16.02.2026 |
| bdu:2025-09143 | Уязвимость модулей drivers/gpu/drm/v3d/v3d_drv.h, drivers/gpu/drm/v3d/v3d_gem.c и drivers… | 29.07.2025 | 16.02.2026 |
| bdu:2025-09140 | Уязвимость функции xdp_linearize_page() модуля drivers/net/virtio_net.c ядра операционны… | 29.07.2025 | 16.02.2026 |
| bdu:2025-09137 | Уязвимость функции carl9170_usb_rx_complete() ядра операционной системы Linux, позволяюща… | 29.07.2025 | 16.02.2026 |
| bdu:2025-09134 | Уязвимость функции squashfs_fill_super() компонента Squashfs ядра операционной системы Li… | 29.07.2025 | 16.02.2026 |
| bdu:2025-09130 | Уязвимость функции drm_sched_entity_push_job() компонента msm ядра операционной системы L… | 29.07.2025 | 16.02.2026 |
| bdu:2025-09128 | Уязвимость функции put_unused_fd() ядра операционной системы Linux, позволяющая нарушител… | 29.07.2025 | 16.02.2026 |
| bdu:2025-09125 | Уязвимость функции rproc_attach() компонента remoteproc ядра операционной системы Linux, … | 29.07.2025 | 16.02.2026 |
| bdu:2025-09124 | Уязвимость функции try_module_get() ядра операционной системы Linux, позволяющая нарушите… | 29.07.2025 | 16.02.2026 |
| bdu:2025-09123 | Уязвимость функции rproc_handle_resources() компонента remoteproc ядра операционной систе… | 29.07.2025 | 16.02.2026 |
| bdu:2025-09059 | Уязвимость функции fb_cvt_hperiod() компонента fbdev ядра операционной системы Linux, поз… | 28.07.2025 | 16.02.2026 |
| bdu:2025-09049 | Уязвимость функции icl_update_topdown_event() ядра операционной системы Linux, позволяюща… | 28.07.2025 | 16.02.2026 |
| bdu:2025-09048 | Уязвимость функции atomctrl_initialize_mc_reg_table() ядра операционной системы Linux, по… | 28.07.2025 | 16.02.2026 |
| bdu:2025-09047 | Уязвимость компонента seg6 ядра операционной системы Linux, позволяющая нарушителю оказат… | 28.07.2025 | 16.02.2026 |
| bdu:2025-09039 | Уязвимость функции mt76_dma_cleanup() ядра операционной системы Linux, позволяющая наруши… | 28.07.2025 | 16.02.2026 |
| bdu:2025-09038 | Уязвимость функции uclogic_input_configured() компонента HID ядра операционной системы Li… | 28.07.2025 | 16.02.2026 |
| bdu:2025-09037 | Уязвимость функции idxd_alloc() ядра операционной системы Linux, позволяющая нарушителю в… | 28.07.2025 | 16.02.2026 |
| bdu:2025-09031 | Уязвимость компонента espintcp ядра операционной системы Linux, позволяющая нарушителю вы… | 28.07.2025 | 16.02.2026 |
| bdu:2025-09025 | Уязвимость функции io_bitmap_exit() ядра операционной системы Linux, позволяющая нарушите… | 28.07.2025 | 16.02.2026 |
| bdu:2025-09023 | Уязвимость функции smp_store_mb() компонента dma-buf ядра операционной системы Linux, поз… | 28.07.2025 | 16.02.2026 |
| bdu:2025-09017 | Уязвимость функции macb_halt_tx() ядра операционной системы Linux, позволяющая нарушителю… | 28.07.2025 | 16.02.2026 |
| bdu:2025-09015 | Уязвимость системы управления конфигурациями Ansible, связанная с неправильной проверкой … | 28.07.2025 | 16.02.2026 |
| bdu:2025-09010 | Уязвимость системы управления конфигурациями Ansible, связанная с раскрытием информации ч… | 28.07.2025 | 16.02.2026 |
| bdu:2025-09007 | Уязвимость модуля аутентификации PAM-PKCS#11 операционных систем Linux, позволяющая наруш… | 28.07.2025 | 16.02.2026 |
| bdu:2025-09006 | Уязвимость функции queue_work() ядра операционной системы Linux, позволяющая нарушителю в… | 28.07.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201601-0030 | The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in… | 2024-07-23T20:39:22.908000Z |
| var-202203-0083 | Non-transparent sharing of branch predictor within a context in some Intel(R) Processors … | 2024-07-23T20:38:45.721000Z |
| var-202109-1315 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2024-07-23T20:38:26.600000Z |
| var-201511-0101 | The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows … | 2024-07-23T20:38:26.767000Z |
| var-200609-0313 | Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to… | 2024-07-23T20:38:25.677000Z |
| var-201710-1408 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2024-07-23T20:38:20.584000Z |
| var-201812-0271 | Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular e… | 2024-07-23T20:38:14.990000Z |
| var-200804-0038 | Cross-site scripting (XSS) vulnerability in Apple WebKit, as used in Safari before 3.1.1,… | 2024-07-23T20:37:41.672000Z |
| var-200703-0030 | Unspecified vulnerability in ImageIO in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 all… | 2024-07-23T20:37:19.915000Z |
| var-200411-0172 | The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, all… | 2024-07-23T20:37:18.156000Z |
| var-202207-1358 | When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out o… | 2024-07-23T20:37:02.433000Z |
| var-202106-0344 | Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user… | 2024-07-23T20:37:01.572000Z |
| var-201205-0195 | Off-by-one error in libxml2, as used in Google Chrome before 19.0.1084.46 and other produ… | 2024-07-23T20:37:00.626000Z |
| var-201912-0535 | A logic issue was addressed with improved state management. This issue is fixed in iOS 12… | 2024-07-23T20:36:29.815000Z |
| var-201310-0355 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, a… | 2024-07-23T20:36:28.203000Z |
| var-201605-0037 | The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0… | 2024-07-23T20:35:57.230000Z |
| var-201203-0200 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2024-07-23T20:35:40.622000Z |
| var-201203-0174 | Use-after-free vulnerability in Google Chrome before 17.0.963.83 allows remote attackers … | 2024-07-23T20:35:40.553000Z |
| var-201902-0192 | If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (… | 2024-07-23T20:34:36.580000Z |
| var-201712-1100 | An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari be… | 2024-07-23T20:33:34.770000Z |
| var-202110-1685 | This issue was addressed with improved checks. This issue is fixed in Security Update 202… | 2024-07-23T20:33:31.079000Z |
| var-202210-0997 | An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML docum… | 2024-07-23T20:33:29.996000Z |
| var-201410-1217 | Use-after-free vulnerability in the ProcessingInstruction::setXSLStyleSheet function in c… | 2024-07-23T20:33:29.145000Z |
| var-201203-0180 | Google Chrome before 18.0.1025.142 does not properly handle SVG text elements, which allo… | 2024-07-23T20:33:25.333000Z |
| var-202004-1972 | A race condition was addressed with additional validation. This issue is fixed in iOS 13.… | 2024-07-23T20:33:16.245000Z |
| var-201006-1139 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2024-07-23T20:33:08.459000Z |
| var-201912-0606 | An input validation issue was addressed with improved input validation. This issue is fix… | 2024-07-23T20:33:06.757000Z |
| var-201912-0576 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i… | 2024-07-23T20:33:05.700000Z |
| var-201409-1148 | Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash4… | 2024-07-23T20:33:04.791000Z |
| var-202209-0761 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed … | 2024-07-23T20:32:59.056000Z |