Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-27674 |
6.1 (3.1)
|
Code Injection vulnerability in SAP NetWeaver Applicat⦠|
SAP_SE |
SAP NetWeaver Application Server Java (Web Dynpro Java) |
2026-04-14T00:06:50.301Z | 2026-04-14T13:14:18.897Z |
| CVE-2026-27675 |
2 (3.1)
|
Code Injection vulnerability in SAP Landscape Transformation |
SAP_SE |
SAP Landscape Transformation |
2026-04-14T00:07:01.278Z | 2026-04-14T13:14:18.764Z |
| CVE-2026-27676 |
4.3 (3.1)
|
Missing Authorization check in SAP S/4HANA OData Servi⦠|
SAP_SE |
SAP S/4HANA OData Service (Manage Technical Object Structures) |
2026-04-14T00:07:12.657Z | 2026-04-14T13:14:18.632Z |
| CVE-2026-27677 |
6.5 (3.1)
|
Missing Authorization check in SAP S/4HANA OData Servi⦠|
SAP_SE |
SAP S/4HANA OData Service (Manage Reference Equipment) |
2026-04-14T00:07:22.753Z | 2026-04-14T13:14:18.498Z |
| CVE-2026-27678 |
6.5 (3.1)
|
Missing Authorization check in SAP S/4HANA Backend ODa⦠|
SAP_SE |
SAP S/4HANA Backend OData Service (Manage Reference Structures) |
2026-04-14T00:07:33.397Z | 2026-04-14T13:14:18.299Z |
| CVE-2026-27679 |
6.5 (3.1)
|
Missing Authorization check in SAP S/4HANA Frontend OD⦠|
SAP_SE |
SAP S/4HANA Frontend OData Service (Manage Reference Structures) |
2026-04-14T00:07:44.698Z | 2026-04-14T13:14:18.168Z |
| CVE-2026-27681 |
9.9 (3.1)
|
SQL Injection vulnerability in SAP Business Planning a⦠|
SAP_SE |
SAP Business Planning and Consolidation and SAP Business Warehouse |
2026-04-14T00:08:05.791Z | 2026-04-14T13:14:18.028Z |
| CVE-2026-27683 |
4.1 (3.1)
|
Reflected cross site scripting vulnerability in SAP Bu⦠|
SAP_SE |
SAP BusinessObjects Business Intelligence Platform |
2026-04-14T00:08:15.599Z | 2026-04-14T13:14:17.886Z |
| CVE-2026-34256 |
7.1 (3.1)
|
Missing Authorization check in SAP ERP and SAP S/4 HAN⦠|
SAP_SE |
SAP ERP and SAP S/4 HANA (Private Cloud and On-Premise) |
2026-04-14T00:08:26.993Z | 2026-04-14T13:14:17.750Z |
| CVE-2026-34257 |
6.1 (3.1)
|
Open Redirect vulnerability in SAP NetWeaver Applicati⦠|
SAP_SE |
SAP NetWeaver Application Server ABAP |
2026-04-14T00:08:39.814Z | 2026-04-14T13:14:17.620Z |
| CVE-2026-34261 |
6.5 (3.1)
|
Missing Authorization check in SAP Business Analytics ⦠|
SAP_SE |
SAP Business Analytics and SAP Content Management |
2026-04-14T00:08:51.232Z | 2026-04-14T13:14:17.473Z |
| CVE-2026-34262 |
5 (3.1)
|
Information Disclosure Vulnerability in SAP HANA Cockp⦠|
SAP_SE |
SAP HANA Cockpit and HANA Database Explorer |
2026-04-14T00:09:03.364Z | 2026-04-14T13:14:17.275Z |
| CVE-2026-34264 |
6.5 (3.1)
|
Information Disclosure vulnerability in SAP Human Capi⦠|
SAP_SE |
SAP Human Capital Management for SAP S/4HANA |
2026-04-14T00:09:12.272Z | 2026-04-14T13:14:17.154Z |
| CVE-2026-6264 |
9.8 (3.1)
|
Critical Security fix for the Talend JobServer and Tal⦠|
Talend |
Talend JobServer |
2026-04-14T01:49:08.920Z | 2026-04-14T13:14:17.018Z |
| CVE-2025-13822 |
5.3 (4.0)
|
Authentication bypass in MCPHub |
MCPHub |
MCPHub |
2026-04-14T10:23:49.910Z | 2026-04-14T13:14:16.888Z |
| CVE-2026-2332 |
7.4 (3.1)
|
HTTP Request Smuggling via Chunked Extension Quoted-St⦠|
Eclipse Foundation |
Eclipse Jetty |
2026-04-14T10:59:10.193Z | 2026-04-14T13:14:16.734Z |
| CVE-2026-2449 |
9 (4.0)
|
Improper neutralization of argument delimiters in⦠|
upKeeper Solutions |
upKeeper Instant Privilege Access |
2026-04-14T11:56:04.741Z | 2026-04-14T13:14:16.593Z |
| CVE-2026-2450 |
7.4 (4.0)
|
.NET misconfiguration: use of impersonation vulne⦠|
upKeeper Solutions |
upKeeper Instant Privilege Access |
2026-04-14T12:07:44.265Z | 2026-04-14T13:14:16.443Z |
| CVE-2025-8095 |
9.1 (4.0)
|
Recoverable obfuscation using the OECH1 prefix encodin⦠|
Progress Software Corporation |
OpenEdge |
2026-04-14T13:13:43.739Z | 2026-04-14T13:13:43.739Z |
| CVE-2025-7389 |
8.2 (4.0)
|
Unauthorized Arbitrary File Read via RMI in AdminServe⦠|
Progress Software Corporation |
OpenEdge |
2026-04-14T13:12:54.559Z | 2026-04-14T13:12:54.559Z |
| CVE-2026-40040 |
8.7 (4.0)
8.8 (3.1)
|
Pachno 1.0.6 Unrestricted File Upload Remote Code Execution |
pancho |
Pachno |
2026-04-13T18:10:56.828Z | 2026-04-14T13:08:29.690Z |
| CVE-2026-6200 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F456 webtypelibrary formwebtypelibrary stack-bas⦠|
Tenda |
F456 |
2026-04-13T18:45:12.958Z | 2026-04-14T13:07:41.730Z |
| CVE-2026-6218 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
aandrew-me ytDownloader Error Details Panel createText⦠|
aandrew-me |
ytDownloader |
2026-04-13T20:30:14.394Z | 2026-04-14T13:05:33.179Z |
| CVE-2026-6227 |
7.2 (3.1)
|
BackWPup <= 5.6.6 - Authenticated (Administrator+) Loc⦠|
wp_media |
BackWPup ā WordPress Backup & Restore Plugin |
2026-04-14T02:25:47.771Z | 2026-04-14T13:03:30.768Z |
| CVE-2026-4109 |
4.3 (3.1)
|
Eventin ā Events Calendar, Event Booking, Ticket & Reg⦠|
arraytics |
Eventin ā Event Calendar, Event Registration, Tickets & Booking (AI Powered) |
2026-04-14T07:43:03.588Z | 2026-04-14T13:00:42.566Z |
| CVE-2026-27668 |
8.8 (3.1)
8.7 (4.0)
|
A vulnerability has been identified in RUGGEDCOM ⦠|
Siemens |
RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) |
2026-04-14T08:40:45.661Z | 2026-04-14T12:58:05.664Z |
| CVE-2026-5869 |
4.3 (3.1)
|
Heap buffer overflow in WebML in Google Chrome pr⦠|
Google |
Chrome |
2026-04-08T21:20:43.915Z | 2026-04-14T12:52:09.160Z |
| CVE-2026-5867 |
4.3 (3.1)
|
Heap buffer overflow in WebML in Google Chrome pr⦠|
Google |
Chrome |
2026-04-08T21:20:43.173Z | 2026-04-14T12:51:46.643Z |
| CVE-2026-5864 |
4.3 (3.1)
|
Heap buffer overflow in WebAudio in Google Chrome⦠|
Google |
Chrome |
2026-04-08T21:20:41.982Z | 2026-04-14T12:51:29.954Z |
| CVE-2024-9168 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-04-14T12:36:03.404Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-13822 |
5.3 (4.0)
|
Authentication bypass in MCPHub |
MCPHub |
MCPHub |
2026-04-14T10:23:49.910Z | 2026-04-14T13:14:16.888Z |
| CVE-2026-32146 |
8.3 (4.0)
|
Improper Path Validation in Git Dependency Handling Al⦠|
Gleam |
Gleam |
2026-04-11T12:59:22.911Z | 2026-04-14T09:24:53.083Z |
| CVE-2026-31923 |
N/A
|
Apache APISIX: Openid-connect `tls_verify` field is di⦠|
Apache Software Foundation |
Apache APISIX |
2026-04-14T08:38:59.039Z | 2026-04-14T09:36:04.697Z |
| CVE-2025-6965 |
7.2 (4.0)
|
Integer Truncation on SQLite |
SQLite |
SQLite |
2025-07-15T13:44:00.784Z | 2026-04-14T08:58:07.313Z |
| CVE-2025-49795 |
7.5 (3.1)
|
Libxml: null pointer dereference leads to denial of se⦠|
|
|
2025-06-16T15:19:29.871Z | 2026-04-14T09:55:43.789Z |
| CVE-2025-40898 |
7.2 (4.0)
8.1 (3.1)
|
Path traversal in Import Arc data archive functionalit⦠|
Nozomi Networks |
Guardian |
2025-12-18T13:19:22.192Z | 2026-04-14T08:58:13.064Z |
| CVE-2025-40894 |
2.1 (4.0)
4.4 (3.1)
|
HTML injection in Alerted Nodes Dashboard in Guardian/⦠|
Nozomi Networks |
Guardian |
2026-03-04T13:51:14.413Z | 2026-04-14T08:58:11.923Z |
| CVE-2025-40893 |
5.3 (4.0)
6.1 (3.1)
|
HTML injection in Asset List in Guardian/CMC before 25.5.0 |
Nozomi Networks |
Guardian |
2025-12-18T13:17:54.241Z | 2026-04-14T08:58:10.756Z |
| CVE-2025-40892 |
7.1 (4.0)
8.9 (3.1)
|
Stored Cross-Site Scripting (XSS) in Reports in Guardi⦠|
Nozomi Networks |
Guardian |
2025-12-18T13:16:25.212Z | 2026-04-14T08:58:09.594Z |
| CVE-2025-40891 |
2.3 (4.0)
4.7 (3.1)
|
HTML injection in in Time Machine functionality in Gua⦠|
Nozomi Networks |
Guardian |
2025-12-18T13:14:35.366Z | 2026-04-14T08:58:08.457Z |
| CVE-2025-2884 |
N/A
|
Out-of-Bounds read vulnerability in TCG TPM2.0 referen⦠|
Trusted Computing Group |
TPM2.0 |
2025-06-10T17:29:19.463Z | 2026-04-14T08:58:06.200Z |
| CVE-2022-3786 |
N/A
|
X.509 Email Address Variable Length Buffer Overflow |
OpenSSL |
OpenSSL |
2022-11-01T00:00:00.000Z | 2026-04-14T08:58:03.787Z |
| CVE-2022-3602 |
N/A
|
X.509 Email Address 4-byte Buffer Overflow |
OpenSSL |
OpenSSL |
2022-11-01T00:00:00.000Z | 2026-04-14T08:58:02.339Z |
| CVE-2022-38767 |
7.5 (3.1)
|
An issue was discovered in Wind River VxWorks 6.9⦠|
n/a |
n/a |
2022-11-25T00:00:00.000Z | 2026-04-14T08:58:05.041Z |
| CVE-2022-0778 |
N/A
|
Infinite loop in BN_mod_sqrt() reachable when parsing ⦠|
OpenSSL |
OpenSSL |
2022-03-15T17:05:20.382Z | 2026-04-14T08:58:00.706Z |
| CVE-2021-3712 |
N/A
|
Read buffer overruns processing ASN.1 strings |
OpenSSL |
OpenSSL |
2021-08-24T14:50:14.704Z | 2026-04-14T08:57:51.339Z |
| CVE-2020-26147 |
N/A
|
An issue was discovered in the Linux kernel 5.8.9⦠|
n/a |
n/a |
2021-05-11T19:40:19.000Z | 2026-04-14T09:01:51.571Z |
| CVE-2026-4109 |
4.3 (3.1)
|
Eventin ā Events Calendar, Event Booking, Ticket & Reg⦠|
arraytics |
Eventin ā Event Calendar, Event Registration, Tickets & Booking (AI Powered) |
2026-04-14T07:43:03.588Z | 2026-04-14T13:00:42.566Z |
| CVE-2026-33929 |
N/A
|
Apache PDFBox Examples: Path Traversal in PDFBox Extra⦠|
Apache Software Foundation |
Apache PDFBox Examples |
2026-04-14T08:09:39.517Z | 2026-04-14T08:09:39.517Z |
| CVE-2026-33892 |
7.1 (3.1)
5.1 (4.0)
|
A vulnerability has been identified in Industrial⦠|
Siemens |
Industrial Edge Management Pro V1 |
2026-04-14T08:40:46.807Z | 2026-04-14T08:40:46.807Z |
| CVE-2026-31924 |
N/A
|
Apache APISIX: Plugin tencent-cloud-cls log export use⦠|
Apache Software Foundation |
Apache APISIX |
2026-04-14T08:08:05.615Z | 2026-04-14T08:37:18.355Z |
| CVE-2026-31908 |
N/A
|
Apache APISIX: forward auth plugin allows header injection |
Apache Software Foundation |
Apache APISIX |
2026-04-14T08:06:18.026Z | 2026-04-14T08:37:15.159Z |
| CVE-2026-27668 |
8.8 (3.1)
8.7 (4.0)
|
A vulnerability has been identified in RUGGEDCOM ⦠|
Siemens |
RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) |
2026-04-14T08:40:45.661Z | 2026-04-14T12:58:05.664Z |
| CVE-2026-25656 |
7.8 (3.1)
8.5 (4.0)
|
A vulnerability has been identified in SINEC NMS ⦠|
Siemens |
SINEC NMS |
2026-02-10T09:58:55.243Z | 2026-04-14T08:40:44.535Z |
| CVE-2026-25654 |
8.8 (3.1)
8.7 (4.0)
|
A vulnerability has been identified in SINEC NMS ⦠|
Siemens |
SINEC NMS |
2026-04-14T08:40:41.053Z | 2026-04-14T08:40:41.053Z |
| CVE-2026-24032 |
7.3 (3.1)
6.9 (4.0)
|
A vulnerability has been identified in SINEC NMS ⦠|
Siemens |
SINEC NMS |
2026-04-14T08:40:39.853Z | 2026-04-14T13:18:01.056Z |
| CVE-2025-40745 |
3.7 (3.1)
6.3 (4.0)
|
A vulnerability has been identified in Siemens So⦠|
Siemens |
Siemens Software Center |
2026-04-14T08:40:38.637Z | 2026-04-14T13:38:29.751Z |
| CVE-2025-40571 |
2.2 (3.1)
2.1 (4.0)
|
A vulnerability has been identified in Mendix OID⦠|
Siemens |
Mendix OIDC SSO (Mendix 10.12 compatible) |
2025-05-13T09:38:54.270Z | 2026-04-14T08:40:36.908Z |
| CVE-2024-56182 |
8.2 (3.1)
8.4 (4.0)
|
A vulnerability has been identified in SIMATIC Fi⦠|
Siemens |
SIMATIC Field PG M5 |
2025-03-11T09:48:05.319Z | 2026-04-14T08:40:35.818Z |
| CVE-2024-56181 |
8.2 (3.1)
8.4 (4.0)
|
A vulnerability has been identified in SIMATIC Fi⦠|
Siemens |
SIMATIC Field PG M5 |
2025-03-11T09:48:03.703Z | 2026-04-14T08:40:34.606Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-6965 | There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms c⦠| 2025-07-15T14:15:31.080 | 2026-04-14T10:16:29.853 |
| fkie_cve-2025-49795 | A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions⦠| 2025-06-16T16:15:19.203 | 2026-04-14T10:16:28.617 |
| fkie_cve-2025-40898 | A path traversal vulnerability was discovered in the Import Arc data archive functionality due to i⦠| 2025-12-18T14:15:59.780 | 2026-04-14T10:16:27.820 |
| fkie_cve-2025-40894 | A Stored HTML Injection vulnerability was discovered in the Alerted Nodes Dashboard functionality d⦠| 2026-03-04T14:16:13.657 | 2026-04-14T10:16:27.453 |
| fkie_cve-2025-40893 | A Stored HTML Injection vulnerability was discovered in the Asset List functionality due to imprope⦠| 2025-12-18T14:15:59.620 | 2026-04-14T10:16:27.247 |
| fkie_cve-2025-40892 | A Stored Cross-Site Scripting vulnerability was discovered in the Reports functionality due to impr⦠| 2025-12-18T14:15:59.457 | 2026-04-14T10:16:27.033 |
| fkie_cve-2025-40891 | A Stored HTML Injection vulnerability was discovered in the Time Machine Snapshot Diff functionalit⦠| 2025-12-18T14:15:59.270 | 2026-04-14T10:16:26.790 |
| fkie_cve-2025-2884 | TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds ⦠| 2025-06-10T18:15:30.617 | 2026-04-14T10:16:26.457 |
| fkie_cve-2022-3786 | A buffer overrun can be triggered in X.509 certificate verification, specifically in name constrain⦠| 2022-11-01T18:15:11.047 | 2026-04-14T10:16:26.147 |
| fkie_cve-2022-3602 | A buffer overrun can be triggered in X.509 certificate verification, specifically in name constrain⦠| 2022-11-01T18:15:10.983 | 2026-04-14T10:16:25.487 |
| fkie_cve-2022-38767 | An issue was discovered in Wind River VxWorks 6.9 and 7, that allows a specifically crafted packet ⦠| 2022-11-25T15:15:10.453 | 2026-04-14T10:16:25.027 |
| fkie_cve-2022-0778 | The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it ⦠| 2022-03-15T17:15:08.513 | 2026-04-14T10:16:21.510 |
| fkie_cve-2021-3712 | ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains ⦠| 2021-08-24T15:15:09.533 | 2026-04-14T10:16:19.577 |
| fkie_cve-2020-26147 | An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations rea⦠| 2021-05-11T20:15:08.947 | 2026-04-14T10:16:18.070 |
| fkie_cve-2026-4109 | The Eventin ā Events Calendar, Event Booking, Ticket & Registration (AI Powered) plugin for WordPre⦠| 2026-04-14T09:16:36.460 | 2026-04-14T09:16:36.460 |
| fkie_cve-2026-33929 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apa⦠| 2026-04-14T09:16:36.297 | 2026-04-14T09:16:36.297 |
| fkie_cve-2026-33892 | A vulnerability has been identified in Industrial Edge Management Pro V1 (All versions >= V1.7.6 < ⦠| 2026-04-14T09:16:36.097 | 2026-04-14T09:16:36.097 |
| fkie_cve-2026-31924 | Cleartext Transmission of Sensitive Information vulnerability in Apache APISIX. tencent-cloud-cls ⦠| 2026-04-14T09:16:35.953 | 2026-04-14T09:16:35.953 |
| fkie_cve-2026-31908 | Header injection vulnerability in Apache APISIX. The attacker can take advantage of certain config⦠| 2026-04-14T09:16:35.650 | 2026-04-14T09:16:35.650 |
| fkie_cve-2026-27668 | A vulnerability has been identified in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) (Al⦠| 2026-04-14T09:16:35.480 | 2026-04-14T09:16:35.480 |
| fkie_cve-2026-25656 | A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP3), User Management Compone⦠| 2026-02-10T10:15:59.880 | 2026-04-14T09:16:35.313 |
| fkie_cve-2026-25654 | A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP3). Affected products do no⦠| 2026-04-14T09:16:35.150 | 2026-04-14T09:16:35.150 |
| fkie_cve-2026-24032 | A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP3 with UMC). The affected a⦠| 2026-04-14T09:16:34.900 | 2026-04-14T09:16:34.900 |
| fkie_cve-2025-40745 | A vulnerability has been identified in Siemens Software Center (All versions < V3.5.8.2), Simcenter⦠| 2026-04-14T09:16:34.683 | 2026-04-14T09:16:34.683 |
| fkie_cve-2025-40571 | A vulnerability has been identified in Mendix OIDC SSO (Mendix 10.12 compatible) (All versions < V4⦠| 2025-05-13T10:15:26.373 | 2026-04-14T09:16:34.517 |
| fkie_cve-2024-56182 | A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC Field PG M6 (All⦠| 2025-03-11T10:15:15.823 | 2026-04-14T09:16:34.363 |
| fkie_cve-2024-56181 | A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC IPC BX-21A (All ⦠| 2025-03-11T10:15:15.597 | 2026-04-14T09:16:34.050 |
| fkie_cve-2023-44373 | Affected devices do not properly sanitize an input field. This could allow an authenticated remote⦠| 2023-11-14T11:15:13.417 | 2026-04-14T09:16:33.397 |
| fkie_cve-2022-36325 | Affected devices do not properly sanitize data introduced by an user when rendering the web interfa⦠| 2022-08-10T12:15:12.997 | 2026-04-14T09:16:32.137 |
| fkie_cve-2022-36324 | Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow a⦠| 2022-08-10T12:15:12.930 | 2026-04-14T09:16:30.903 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-33vv-h74c-xmw5 |
8.8 (3.1)
|
Affected devices do not properly authorize the change password function of the web interface. This ⦠| 2022-10-11T12:00:45Z | 2026-04-14T09:30:43Z |
| ghsa-qj75-j4wq-j748 |
7.2 (3.1)
|
A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE SC-600 family⦠| 2022-08-11T00:00:22Z | 2026-04-14T09:30:41Z |
| ghsa-hm3h-qvm3-r8qv |
7.5 (3.1)
|
A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE W-1700 IEEE 8⦠| 2022-08-11T00:00:42Z | 2026-04-14T09:30:41Z |
| ghsa-9r25-j996-8h38 |
4.8 (3.1)
|
A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE SC-600 family⦠| 2022-08-11T00:00:43Z | 2026-04-14T09:30:41Z |
| ghsa-pwgj-jw9h-pg74 |
5.3 (3.1)
|
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WPA, WPA2, and WPA3 implement⦠| 2022-05-24T19:01:57Z | 2026-04-14T09:30:38Z |
| ghsa-px4f-q3pw-j682 |
6.5 (3.1)
|
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2,⦠| 2022-05-24T19:01:58Z | 2026-04-14T09:30:37Z |
| ghsa-mq8v-785f-4pmx |
6.5 (3.1)
|
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implement⦠| 2022-05-24T19:01:58Z | 2026-04-14T09:30:37Z |
| ghsa-c6qp-cf89-h54c |
6.5 (3.1)
|
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 impl⦠| 2022-05-24T19:01:57Z | 2026-04-14T09:30:37Z |
| ghsa-c49c-jx24-458g |
6.5 (3.1)
|
An issue was discovered in the ALFA Windows 10 driver 1030.36.604 for AWUS036ACH. The WEP, WPA, WPA⦠| 2022-05-24T19:01:57Z | 2026-04-14T09:30:37Z |
| ghsa-89fj-xvf5-gc78 |
6.5 (3.1)
|
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 impl⦠| 2022-05-24T19:01:57Z | 2026-04-14T09:30:37Z |
| ghsa-326j-j9mx-gf84 |
5.3 (3.1)
|
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to ⦠| 2022-05-24T19:01:58Z | 2026-04-14T09:30:36Z |
| ghsa-qrgr-qfr9-4xfh |
3.5 (3.1)
|
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalen⦠| 2022-05-24T19:01:58Z | 2026-04-14T09:30:33Z |
| ghsa-vw96-fcx4-fx55 |
7.2 (3.1)
|
The Smart Post Show ā Post Grid, Post Carousel & Slider, and List Category Posts plugin for WordPre⦠| 2026-04-14T06:31:19Z | 2026-04-14T06:31:19Z |
| ghsa-rxq5-998f-fp45 |
6.4 (3.1)
|
The ShopLentor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the woolentor_⦠| 2026-04-14T06:31:19Z | 2026-04-14T06:31:19Z |
| ghsa-gpxf-gw3r-8vx4 |
4.4 (3.1)
|
The WholeSale Products Dynamic Pricing Management WooCommerce plugin for WordPress is vulnerable to⦠| 2026-04-14T06:31:19Z | 2026-04-14T06:31:19Z |
| ghsa-99qg-rjrm-54j5 |
6.4 (3.1)
|
The Surbma | Booking.com Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scriptin⦠| 2026-04-14T06:31:18Z | 2026-04-14T06:31:18Z |
| ghsa-rvmc-gf2q-j9mw |
5.0 (3.1)
|
Information Disclosure Vulnerability in SAP HANA Cockpit and HANA Database Explorer | 2026-04-14T03:31:40Z | 2026-04-14T03:31:40Z |
| ghsa-fwjv-3fw4-7x83 |
6.1 (3.1)
|
Due to an Open Redirect vulnerability in SAP NetWeaver Application Server ABAP, an unauthenticated ⦠| 2026-04-14T03:31:40Z | 2026-04-14T03:31:40Z |
| ghsa-fg5q-rjfh-rr88 |
6.5 (3.1)
|
Due to a missing authorization check in SAP Business Analytics and SAP Content Management, an authe⦠| 2026-04-14T03:31:40Z | 2026-04-14T03:31:40Z |
| ghsa-fcmf-hc7m-63gh |
9.1 (3.1)
|
The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing ca⦠| 2026-04-14T03:31:40Z | 2026-04-14T03:31:40Z |
| ghsa-9jcw-cw9q-r69r |
7.1 (3.1)
|
Due to a missing authorization check in SAP ERP and SAP S/4HANA (Private Cloud and On-Premise), an ⦠| 2026-04-14T03:31:40Z | 2026-04-14T03:31:40Z |
| ghsa-73v2-xp42-4vcq |
7.2 (3.1)
|
The Form Maker by 10Web plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the M⦠| 2026-04-14T03:31:40Z | 2026-04-14T03:31:40Z |
| ghsa-6gj4-hcqg-pjc8 |
7.2 (3.1)
|
The BackWPup plugin for WordPress is vulnerable to Local File Inclusion via the `block_name` parame⦠| 2026-04-14T03:31:40Z | 2026-04-14T03:31:40Z |
| ghsa-4c58-m4cg-6h2f |
6.5 (3.1)
|
During authorization checks in SAP Human Capital Management for SAP S/4HANA, the system returns spe⦠| 2026-04-14T03:31:40Z | 2026-04-14T03:31:40Z |
| ghsa-3fpc-x8cf-v594 |
7.5 (3.1)
|
The JetEngine plugin for WordPress is vulnerable to SQL Injection via the Custom Content Type (CCT)⦠| 2026-04-14T03:31:40Z | 2026-04-14T03:31:40Z |
| ghsa-2xm3-5jp9-423w |
|
Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks. For example,⦠| 2026-04-14T00:31:12Z | 2026-04-14T03:31:40Z |
| ghsa-2m83-cjg7-5x73 |
9.8 (3.1)
|
A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote c⦠| 2026-04-14T03:31:40Z | 2026-04-14T03:31:40Z |
| ghsa-wcjp-8x52-3x95 |
9.1 (3.1)
2.7 (4.0)
|
A buffer overflow vulnerability has been reported to affect Media Streaming Add-On. The remote atta⦠| 2026-03-20T18:31:19Z | 2026-04-14T03:31:39Z |
| ghsa-pcr3-6v45-6mc2 |
7.8 (3.1)
8.4 (4.0)
|
Arbitrary file write & potential privilege escalation exploiting zip slip vulnerability in Google W⦠| 2026-02-27T15:34:19Z | 2026-04-14T03:31:39Z |
| ghsa-76gx-97cq-65f5 |
7.5 (3.1)
8.7 (4.0)
|
A specially-crafted file can cause libjxl's decoder to write pixel data to uninitialized unallocate⦠| 2026-02-11T18:31:28Z | 2026-04-14T03:31:39Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-56 |
4.3 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. In versions up t⦠| octoprint | 2025-04-22T18:15:59+00:00 | 2025-06-27T17:22:53.513680+00:00 |
| pysec-2024-256 |
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm⦠| mobsf | 2024-12-03T16:15:24+00:00 | 2025-06-27T17:22:53.325430+00:00 |
| pysec-2025-55 |
|
vLLM is an inference and serving engine for large language models (LLMs). Version 0.8.0 u⦠| vllm | 2025-05-30T19:15:30+00:00 | 2025-06-26T21:23:06.407481+00:00 |
| pysec-2025-54 |
|
vLLM is an inference and serving engine for large language models (LLMs). In versions 0.8⦠| vllm | 2025-05-30T19:15:30+00:00 | 2025-06-26T21:23:06.319321+00:00 |
| pysec-2025-53 |
|
vLLM is an inference and serving engine for large language models (LLMs). Prior to versio⦠| vllm | 2025-05-29T17:15:21+00:00 | 2025-06-26T21:23:06.231251+00:00 |
| pysec-2025-51 |
|
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) v⦠| apache-airflow-providers-snowflake | 2025-06-24T08:15:24+00:00 | 2025-06-26T21:23:03.132527+00:00 |
| pysec-2025-50 |
|
vLLM, an inference and serving engine for large language models (LLMs), has a Regular Exp⦠| vllm | 2025-05-30T18:15:32+00:00 | 2025-06-19T03:02:28.572160+00:00 |
| pysec-2024-255 |
|
Gradio before 4.20 allows credential leakage on Windows. | gradio | 2024-05-05T20:15:07+00:00 | 2025-06-17T19:21:48.983901+00:00 |
| pysec-2024-254 |
4.2 (3.1)
|
A session fixation vulnerability exists in the zenml-io/zenml application, where JWT toke⦠| zenml | 2024-04-16T00:15:11+00:00 | 2025-06-13T00:48:41.806476+00:00 |
| pysec-2025-49 |
8.8 (3.1)
|
setuptools is a package that allows users to download, build, install, upgrade, and unins⦠| setuptools | 2025-05-17T16:15:19+00:00 | 2025-06-12T22:23:11.115559+00:00 |
| pysec-2025-48 |
9.8 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm⦠| mobsf | 2025-03-31T17:15:42+00:00 | 2025-06-12T22:23:10.476087+00:00 |
| pysec-2024-253 |
|
pretix before 2024.1.1 mishandles file validation. | pretix | 2024-02-26T16:28:00+00:00 | 2025-06-11T15:23:51.683422+00:00 |
| pysec-2024-252 |
|
PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in t⦠| torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T19:22:08.948962+00:00 |
| pysec-2024-251 |
|
Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in⦠| torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T03:12:59.077932+00:00 |
| pysec-2025-47 |
|
An issue was discovered in Django 5.2 before 5.2.2, 5.1 before 5.1.10, and 4.2 before 4.2⦠| django | 2025-06-05T03:15:25+00:00 | 2025-06-05T05:23:28.296596+00:00 |
| pysec-2025-46 |
5.5 (3.1)
|
A vulnerability was found in erdogant pypickle up to 1.1.5. It has been classified as cri⦠| pypickle | 2025-05-26T08:15:19+00:00 | 2025-06-03T17:36:58.579358+00:00 |
| pysec-2025-45 |
7.8 (3.1)
|
A vulnerability was found in erdogant pypickle up to 1.1.5 and classified as problematic.⦠| pypickle | 2025-05-26T07:15:26+00:00 | 2025-06-03T17:36:58.528116+00:00 |
| pysec-2024-250 |
|
Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csr⦠| torch | 2024-04-19T21:15:08+00:00 | 2025-06-03T15:23:56.072490+00:00 |
| pysec-2023-312 |
5.9 (3.1)
|
Redis before 6cbea7d allows a replica to cause an assertion failure in a primary server b⦠| redis | 2023-07-15T23:15:09Z | 2025-06-02T11:48:06.372423Z |
| pysec-2025-44 |
|
django-helpdesk before 1.0.0 allows Sensitive Data Exposure because of os.umask(0) in mod⦠| django-helpdesk | 2025-05-31T01:15:19+00:00 | 2025-05-31T03:09:35.357757+00:00 |
| pysec-2025-43 |
|
vLLM is an inference and serving engine for large language models (LLMs). In versions sta⦠| vllm | 2025-05-29T17:15:21+00:00 | 2025-05-29T19:21:01.611587+00:00 |
| pysec-2025-42 |
9.8 (3.1)
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Ver⦠| vllm | 2025-04-30T01:15:51+00:00 | 2025-05-28T21:23:12.396609+00:00 |
| pysec-2025-41 |
9.8 (3.1)
|
PyTorch is a Python package that provides tensor computation with strong GPU acceleration⦠| torch | 2025-04-18T16:15:23+00:00 | 2025-05-28T15:23:37.843138+00:00 |
| pysec-2025-40 |
7.5 (3.1)
|
A vulnerability in the `preprocess_string()` function of the `transformers.testing_utils`⦠| transformers | 2025-05-19T12:15:19+00:00 | 2025-05-21T19:22:10.801823+00:00 |
| pysec-2024-249 |
6.1 (3.1)
|
### Summary On all Label Studio versions prior to 1.11.0, data imported via file upload f⦠| label-studio | 2024-02-22T22:15:47+00:00 | 2025-05-19T11:22:35.312280+00:00 |
| pysec-2024-248 |
7.8 (3.1)
|
OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its ⦠| opencanary | 2024-10-14T21:15:12+00:00 | 2025-05-16T14:23:05.150356+00:00 |
| pysec-2025-39 |
|
motionEye is an online interface for the software motion, a video surveillance program wi⦠| motioneye | 2025-05-14T16:15:29+00:00 | 2025-05-14T17:22:51.050788+00:00 |
| pysec-2025-38 |
|
OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during im⦠| ironic | 2025-05-08T17:16:01Z | 2025-05-13T04:24:03.083929Z |
| pysec-2024-247 |
9.9 (3.1)
|
A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically⦠| zenml | 2024-04-16T00:15:11+00:00 | 2025-05-12T15:23:53.861001+00:00 |
| pysec-2025-37 |
|
An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2⦠| django | 2025-05-08T04:17:18+00:00 | 2025-05-08T05:23:16.210893+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33881 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.886591Z |
| gsd-2024-33880 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.882744Z |
| gsd-2024-33879 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.727068Z |
| gsd-2024-33878 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.850311Z |
| gsd-2024-33877 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.871220Z |
| gsd-2024-33876 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.990196Z |
| gsd-2024-33875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.862083Z |
| gsd-2024-33874 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.959238Z |
| gsd-2024-33873 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.870402Z |
| gsd-2024-33872 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.839468Z |
| gsd-2024-33871 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.800751Z |
| gsd-2024-33870 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.943118Z |
| gsd-2024-33869 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.784255Z |
| gsd-2024-33868 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.896638Z |
| gsd-2024-33867 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.808129Z |
| gsd-2024-33866 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.819755Z |
| gsd-2024-33865 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.790923Z |
| gsd-2024-33864 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.792101Z |
| gsd-2024-33863 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.824810Z |
| gsd-2024-33862 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.799465Z |
| gsd-2024-33861 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.958057Z |
| gsd-2024-33860 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.777612Z |
| gsd-2024-33859 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.867340Z |
| gsd-2024-33858 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.848478Z |
| gsd-2024-33857 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.834866Z |
| gsd-2024-33856 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.944669Z |
| gsd-2024-33855 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.741239Z |
| gsd-2024-33854 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.916266Z |
| gsd-2024-33853 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.825026Z |
| gsd-2024-33852 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.824312Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2639 | Malicious code in bytefrontier (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:19Z |
| mal-2026-2637 | Malicious code in apmfe (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2640 | Malicious code in bytefrontier-core (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:18Z |
| mal-2026-2647 | Malicious code in okx-data (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:14Z |
| mal-2026-2649 | Malicious code in okxglobal (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:13Z |
| mal-2026-2651 | Malicious code in one-translations (npm) | 2026-04-14T11:47:11Z | 2026-04-14T11:47:12Z |
| mal-2026-2650 | Malicious code in one-sdui (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:12Z |
| mal-2026-2638 | Malicious code in billing-paywidget (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:12Z |
| mal-2026-2655 | Malicious code in tailwind-lines-clamp (npm) | 2026-04-14T11:38:14Z | 2026-04-14T11:38:15Z |
| mal-2026-2636 | Malicious code in seaport-core-16 (npm) | 2026-04-14T11:37:00Z | 2026-04-14T11:37:08Z |
| mal-2026-2635 | Malicious code in pubnub-element (npm) | 2026-04-14T11:37:00Z | 2026-04-14T11:37:01Z |
| mal-2026-2633 | Malicious code in markdownlint-rule-link-pattern (npm) | 2026-04-14T11:37:00Z | 2026-04-14T11:37:00Z |
| mal-2026-2631 | Malicious code in babel-plugin-blocks (npm) | 2026-04-14T11:37:00Z | 2026-04-14T11:37:00Z |
| mal-2026-2632 | Malicious code in magentaa11y (npm) | 2026-04-14T11:31:05Z | 2026-04-14T11:31:12Z |
| mal-2026-2634 | Malicious code in percy-cake-docker (npm) | 2026-04-14T11:31:04Z | 2026-04-14T11:31:05Z |
| mal-2026-2630 | Malicious code in gate-apis (PyPI) | 2026-04-14T10:23:40Z | 2026-04-14T10:23:40Z |
| mal-2026-2629 | Malicious code in stacks-editor (npm) | 2026-04-14T08:55:57Z | 2026-04-14T08:55:57Z |
| mal-2026-2628 | Malicious code in svchost (PyPI) | 2026-04-14T05:42:26Z | 2026-04-14T05:42:26Z |
| mal-2026-2627 | Malicious code in pckg-sv (PyPI) | 2026-04-14T05:35:20Z | 2026-04-14T05:35:20Z |
| mal-2026-2492 | Malicious code in admin0911 (npm) | 2026-04-05T15:30:57Z | 2026-04-14T01:05:14Z |
| mal-2026-2282 | Malicious code in @adac-fahrzeugplattform/ui (npm) | 2026-03-29T04:43:26Z | 2026-04-14T01:05:13Z |
| mal-2026-2626 | Malicious code in getcardslib (npm) | 2026-04-14T00:07:56Z | 2026-04-14T00:07:56Z |
| mal-2026-2624 | Malicious code in asciitoart (PyPI) | 2026-04-13T21:26:29Z | 2026-04-13T22:22:34Z |
| mal-2026-2625 | Malicious code in robase-install (PyPI) | 2026-04-13T22:03:44Z | 2026-04-13T22:03:45Z |
| mal-2026-2623 | Malicious code in hive-setting (PyPI) | 2026-04-13T16:27:32Z | 2026-04-13T16:27:32Z |
| mal-2026-2566 | Malicious code in wm-plugin-visions-recorder (npm) | 2026-04-12T06:09:38Z | 2026-04-13T15:48:08Z |
| mal-2026-2518 | Malicious code in viewer-assets-generator (npm) | 2026-04-09T03:10:01Z | 2026-04-13T15:48:07Z |
| mal-2026-2565 | Malicious code in portal-common-ui (npm) | 2026-04-12T04:15:46Z | 2026-04-13T15:48:06Z |
| mal-2026-2554 | Malicious code in paysafe-venmo (npm) | 2026-04-11T09:20:42Z | 2026-04-13T15:48:06Z |
| mal-2026-2553 | Malicious code in paysafe-payments-sdk-common (npm) | 2026-04-11T09:20:41Z | 2026-04-13T15:48:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| 2nga002743 | ABB AbilityTM zenon Remote Transport Vulnerability | 2025-08-12T00:30:00.000Z | 2025-08-12T00:30:00.000Z |
| 3adr011407 | ABB Automation Builder Vulnerabilities in user management and access control | 2025-04-30T00:00:00.000Z | 2025-07-25T00:00:00.000Z |
| 3adr011432 | AC500 V2 Buffer overread on Modbus protocol | 2025-07-23T00:30:00.000Z | 2025-07-23T00:30:00.000Z |
| 9akk108471a4556 | Busch-WelcomeĀ® 2 wire Door opener actuator by default in compatibility mode. | 2025-07-21T00:30:00.000Z | 2025-07-21T00:30:00.000Z |
| 2crt000008 | Lite Panel Pro Vulnerability in Session Management | 2025-06-26T00:30:00.000Z | 2025-06-26T00:30:00.000Z |
| 9akk108470a8948 | ELSB/Home Solutions Outdated SW Components in ABB Welcome IP-Gateway. | 2025-05-29T00:30:00.000Z | 2025-06-05T00:30:00.000Z |
| 9akk108471a1621 | EIBPORT Session Management Fail | 2025-06-02T00:30:00.000Z | 2025-06-04T00:30:00.000Z |
| 9akk108471a0021 | ELSB/BLBA ASPECT advisory several CVEs | 2025-05-22T00:30:00.000Z | 2025-05-23T10:30:00.000Z |
| 2crt000006 | ANC ā ABB Network Card Multiple vulnerabilities in ANC | 2025-04-30T00:30:00.000Z | 2025-04-30T00:30:00.000Z |
| 2crt000007 | Ekip Com IEC61850 Vulnerability in 3rd Party Library | 2025-04-29T00:30:00.000Z | 2025-04-29T00:30:00.000Z |
| 9akk108470a9989 | ABB MV Drives Affected by CODESYS RTS (Runtime System) Vulnerabilities | 2025-04-10T08:30:00.000Z | 2025-04-10T08:30:00.000Z |
| 2nga002579 | ABB Arctic communication solution ARM600 Vulnerabilities | 2025-04-07T10:30:00.000Z | 2025-04-07T10:30:00.000Z |
| 2nga002427 | ABB Arctic ARG600, ARC600, ARR600, ARP600 Arctic Wireless Gateway Modem Module and OpenSSH vulnerabilities | 2025-04-07T10:30:00.000Z | 2025-04-07T10:30:00.000Z |
| 9akk108470a9494 | Low Voltage DC Drives and Power Controllers CODESYS RTS Vulnerabilities | 2025-03-26T00:30:00.000Z | 2025-03-27T00:30:00.000Z |
| 9akk108470a9491 | ABB ACS880 +N8010 Drives CODESYS RTS Vulnerabilities | 2025-03-26T00:30:00.000Z | 2025-03-27T00:30:00.000Z |
| sa24p015 | B&R APROL Potential Privilege Escalation and Information Disclosure | 2025-03-24T00:30:00.000Z | 2025-03-24T00:30:00.000Z |
| 9akk108470a8565 | RMC-100 Vulnerability in the Web UI (REST Interface) | 2025-03-11T00:30:00.000Z | 2025-03-11T00:30:00.000Z |
| 9akk108470a5684 | FLXeon Controllers Cyber Security Advisory | 2025-01-20T00:30:00.000Z | 2025-02-14T00:30:00.000Z |
| 7paa012159 | System 800xA 5.1.x, 6.0.3.x, 6.1.1.x, 6.2.x - VideONet Camera passwords stored in clear text | 2025-02-10T00:30:00.000Z | 2025-02-10T00:30:00.000Z |
| 9akk108470a6775 | Hardcoded credentials in ASPECT Energy Management System | 2025-02-05T00:30:00.000Z | 2025-02-06T00:30:00.000Z |
| sa25p001 | Automation Runtime and mapp View Use of insecure algorithm for self-signed certificates | 2025-01-15T00:30:00.000Z | 2025-01-16T00:30:00.000Z |
| 9akk108470a5466 | Drive Composer Path Traversal Vulnerability | 2025-02-05T00:30:00.000Z | 2025-01-10T00:30:00.000Z |
| 3adr011377 | AC500 V3 Multiple vulnerabilities | 2025-01-07T00:30:00.000Z | 2025-01-07T00:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0843 | Node.js: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0824 | Python: Schwachstelle ermöglicht Codeausführung | 2026-03-22T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0790 | Linux Kernel: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0769 | Red Hat Enterprise Linux (capstone) und OpenShift (rhcos): Mehrere Schwachstellen | 2026-03-17T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0733 | libexpat: Mehrere Schwachstellen ermƶglichen Denial of Service | 2026-03-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0729 | OpenSSL: Schwachstelle ermƶglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0725 | FreeRDP: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0716 | OpenSSH GSSAPI delta: Schwachstelle ermƶglicht nicht spezifizierten Angriff | 2026-03-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0692 | Mattermost MS Teams plugin: Mehrere Schwachstellen ermƶglichen Denial of Service | 2026-03-10T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0614 | Linux Kernel: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0548 | Golang Go: Mehrere Schwachstellen ermƶglichen nicht spezifizierten Angriff | 2026-02-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0525 | GStreamer: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0514 | FreeRDP: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0443 | Apache Tomcat und Tomcat Native: Mehrere Schwachstellen | 2026-02-17T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0421 | Linux Kernel: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0409 | PostgreSQL: Mehrere Schwachstellen | 2026-02-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0378 | IBM WebSphere Application Server: Schwachstelle ermƶglicht nicht spezifizierten Angriff | 2026-02-10T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0359 | GnuTLS: Mehrere Schwachstellen ermƶglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0324 | Linux Kernel: Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0309 | NGINX OSS und NGINX Plus: Schwachstelle ermƶglicht Manipulation von Dateien | 2026-02-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0302 | Red Hat Enterprise Linux (python-wheel): Schwachstelle ermöglicht Privilegieneskalation und Codeausführung | 2026-02-03T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0280 | Linux Kernel: Mehrere Schwachstellen | 2026-02-01T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0244 | FreeRDP: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0215 | Linux Kernel: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0194 | Linux Kernel: Schwachstelle ermƶglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0184 | Linux Kernel: Schwachstelle ermƶglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0164 | Oracle Java SE: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0145 | FreeRDP: Mehrere Schwachstellen ermöglichen DoS und Codeausführung | 2026-01-19T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0129 | Golang Go: Mehrere Schwachstellen | 2026-01-15T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0119 | Linux Kernel: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-078-02 | Schneider Electric Modicon Controllers M241, M251, M258, and LMC058 | 2026-03-10T07:00:00.000000Z | 2026-03-19T06:00:00.000000Z |
| icsa-26-078-01 | Schneider Electric Modicon M241, M251, and M262 | 2026-03-10T07:00:00.000000Z | 2026-03-19T06:00:00.000000Z |
| icsa-26-078-07 | IGL-Technologies eParking.fi | 2026-03-19T05:00:00.000000Z | 2026-03-19T05:00:00.000000Z |
| icsa-26-078-06 | CTEK Chargeportal | 2026-03-19T05:00:00.000000Z | 2026-03-19T05:00:00.000000Z |
| icsa-26-076-04 | Siemens SICAM SIAPP SDK | 2026-03-10T00:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-076-03 | Schneider Electric EcoStruxure Data Center Expert | 2026-03-10T07:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-076-02 | Schneider Electric SCADAPack and RemoteConnect | 2026-02-10T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-076-01 | CODESYS in Festo Automation Suite | 2026-02-26T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-015-10 | Schneider Electric EcoStruxure Power Build Rapsody (Update A) | 2026-01-13T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-25-160-02 | Hitachi Energy Relion 670, 650, SAM600-IO Series (Update A) | 2023-06-27T00:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-25-303-01 | International Standards Organization ISO 15118-2 (Update A) | 2025-10-30T05:00:00.000000Z | 2026-03-17T05:00:00.000000Z |
| icsa-26-071-06 | Inductive Automation Ignition Software | 2026-03-12T06:00:00.000000Z | 2026-03-13T06:00:00.000000Z |
| icsa-26-071-05 | Siemens Heliox EV Chargers | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-04 | Siemens SIMATIC | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-03 | Siemens SIDIS Prime | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-02 | Siemens RUGGEDCOM APE1808 Devices | 2026-03-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-071-01 | Trane Tracer SC, Tracer SC+, and Tracer Concierge | 2026-03-12T06:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-048-04 | Honeywell HIB2PI CCTV Camera (Update B) | 2026-02-17T07:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-043-08 | Siemens NX | 2026-02-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-043-03 | Siemens COMOS | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-345-05 | Siemens Advanced Licensing (SALT) Toolkit | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-345-04 | Siemens IAM Client | 2025-12-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-254-03 | Siemens SINAMICS Drives | 2025-09-09T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-231-02 | Siemens Mendix SAML Module | 2025-08-14T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-226-22 | Siemens Web Installer | 2025-08-12T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-162-05 | Siemens SIMATIC S7-1500 CPU Family | 2025-06-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-162-02 | Siemens RUGGEDCOM APE1808 | 2025-06-10T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-25-044-06 | Siemens RUGGEDCOM APE1808 | 2025-02-11T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-24-284-06 | Siemens SINEC Security Monitor | 2024-10-08T00:00:00.000000Z | 2026-03-12T06:00:00.000000Z |
| icsa-26-069-03 | Honeywell IQ4x BMS Controller | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-snort3-multi-dos-xfwkwswz | Multiple Cisco Products Snort 3 Denial of Service Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-onprem-fmc-authbypass-5jpp45v2 | Cisco Secure Firewall Management Center Software Authentication Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftdfmc-dir-trav-wergjhwq | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Path Traversal Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-tcp-dos-rhfqnwrg | Cisco Secure Firewall Threat Defense Software TLS with Snort 3 Detection Engine Denial of Service Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-snort-bypass-rlggkzvf | Cisco Secure Firewall Threat Defense Software Snort Deep Inspection Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-dnd-dos-bpecg7b7 | Cisco Secure Firewall Threat Defense Software SSL Decryption Policy Denial of Service Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-cmd-inj-mtzgzexf | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Authenticated Command Injection Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-fmc-sql-injection-2qh6ccjd | Cisco Secure Firewall Management Center Software SQL Injection Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-vpn-m9sx6mbc | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-saml-lkttrwzp | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SAML Reflected Cross-Site Scripting Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-ospf-zh8phbsw | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software OSPF Protocol Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-luainject-vescqgms | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Lua Code Injection Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-ikev2-dos-ebuegdeg | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-desync-n5avzeqw | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Services Client-Side Request Smuggling Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asa-ssh-keybypass-cr5xpusf | Cisco Secure Firewall Adaptive Security Appliance Software SSH Partial Private Key Authentication Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-sdwan-rpa-ehchtzk | Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-03-03T00:38:56+00:00 |
| cisco-sa-sd-wan-priv-e6e8tedf | Cisco SD-WAN Software Privilege Escalation Vulnerabilities | 2022-09-28T16:00:00+00:00 | 2026-02-25T20:29:00+00:00 |
| cisco-sa-ucsm-cmdinj-gvxlpesb | Cisco UCS Manager Software Command Injection Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsm-afwae-mogufyln | Cisco UCS Manager Software Privilege Escalation Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsfxosxss-7skve8zv | Cisco FXOS and UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsciv-wgytc78q | Cisco FXOS and UCS Manager Software Command Injection Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-ether-dos-kv8ynwz4 | Cisco Nexus 3600 and 9500-R Series Switching Platforms Layer 2 Loop Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-dsnmp-cnn39uh | Cisco Nexus 9000 Series Fabric Switches in ACI Mode SNMP Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-cpdos-qlsv6pfd | Cisco Nexus 9000 Series Fabric Switches in ACI Mode Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-n3kn9k_aci_lldp_dos-ndgrrra3 | Cisco NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-apic-dos-rnus8efw | Cisco Application Policy Infrastructure Controller Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-wsa-archive-bypass-scx2e8zf | Cisco Secure Web Appliance Real-Time Scanning Archive File Bypass Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-20T21:08:47+00:00 |
| cisco-sa-voice-rce-morhqy4b | Cisco Unified Communications Products Remote Code Execution Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-02-13T15:21:01+00:00 |
| cisco-sa-snort3-mime-vulns-ttl8pgvh | Multiple Cisco Products Snort 3 MIME Denial of Service Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2026-02-12T18:38:13+00:00 |
| cisco-sa-tce-roomos-dos-9v9jrc2q | Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-12T17:37:39+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-31422 | net/sched: cls_flow: fix NULL pointer dereference on shared blocks | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:59.000Z |
| msrc_cve-2026-31417 | net/x25: Fix overflow when accumulating packets | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:54.000Z |
| msrc_cve-2026-31424 | netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:49.000Z |
| msrc_cve-2026-31423 | net/sched: sch_hfsc: fix divide-by-zero in rtsc_min() | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:43.000Z |
| msrc_cve-2026-31416 | netfilter: nfnetlink_log: account for netlink header size | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:38.000Z |
| msrc_cve-2026-40393 | CVE-2026-40393 | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:32.000Z |
| msrc_cve-2026-40385 | CVE-2026-40385 | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:26.000Z |
| msrc_cve-2026-40386 | CVE-2026-40386 | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:20.000Z |
| msrc_cve-2026-34477 | Apache Log4j Core: verifyHostName attribute silently ignored in TLS configuration, allowing hostname verification bypass | 2026-04-02T00:00:00.000Z | 2026-04-13T14:41:08.000Z |
| msrc_cve-2026-39856 | osslsigncode has an Out-of-Bounds Read via Unvalidated Section Bounds in PE Page Hash Calculation | 2026-04-02T00:00:00.000Z | 2026-04-13T14:41:03.000Z |
| msrc_cve-2026-39855 | osslsigncode has an Integer Underflow in PE Page Hash Calculation Can Cause Out-of-Bounds Read | 2026-04-02T00:00:00.000Z | 2026-04-13T14:40:58.000Z |
| msrc_cve-2026-39853 | osslsigncode has a Stack Buffer Overflow via Unbounded Digest Copy During Signature Verification | 2026-04-02T00:00:00.000Z | 2026-04-13T14:40:53.000Z |
| msrc_cve-2026-40226 | CVE-2026-40226 | 2026-04-02T00:00:00.000Z | 2026-04-13T14:40:48.000Z |
| msrc_cve-2026-34757 | LIBPNG has a yse-after-free in png_set_PLTE, png_set_tRNS and png_set_hIST leading to corrupted chunk data and potential heap information disclosure | 2026-04-02T00:00:00.000Z | 2026-04-13T14:40:40.000Z |
| msrc_cve-2026-35206 | Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment | 2026-04-02T00:00:00.000Z | 2026-04-13T14:40:33.000Z |
| msrc_cve-2026-4878 | Libcap: libcap: privilege escalation via toctou race condition in cap_set_file() | 2026-04-02T00:00:00.000Z | 2026-04-13T14:40:25.000Z |
| msrc_cve-2026-28389 | Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo | 2026-04-02T00:00:00.000Z | 2026-04-13T14:40:14.000Z |
| msrc_cve-2026-34933 | Avahi: Reachable assertion in `transport_flags_from_domain()` via conflicting publish flags crashes avahi-daemon | 2026-04-02T00:00:00.000Z | 2026-04-13T14:38:48.000Z |
| msrc_cve-2026-4224 | Stack overflow parsing XML with deeply nested DTD content models | 2026-03-02T00:00:00.000Z | 2026-04-13T14:37:54.000Z |
| msrc_cve-2026-39881 | Vim Ex command injection in Vims NetBeans integration | 2026-04-02T00:00:00.000Z | 2026-04-11T01:40:57.000Z |
| msrc_cve-2026-40024 | Sleuth Kit tsk_recover Path Traversal | 2026-04-02T00:00:00.000Z | 2026-04-11T01:40:50.000Z |
| msrc_cve-2026-40025 | Sleuth Kit APFS Keybag Parser Out-of-Bounds Read | 2026-04-02T00:00:00.000Z | 2026-04-11T01:40:44.000Z |
| msrc_cve-2026-40026 | Sleuth Kit ISO9660 SUSP Extension Reference Out-of-Bounds Read | 2026-04-02T00:00:00.000Z | 2026-04-11T01:40:37.000Z |
| msrc_cve-2026-34743 | XZ Utils: Buffer overflow in lzma_index_append() | 2026-04-02T00:00:00.000Z | 2026-04-11T01:40:16.000Z |
| msrc_cve-2026-35535 | CVE-2026-35535 | 2026-04-02T00:00:00.000Z | 2026-04-11T01:40:10.000Z |
| msrc_cve-2026-35385 | CVE-2026-35385 | 2026-04-02T00:00:00.000Z | 2026-04-11T01:40:03.000Z |
| msrc_cve-2026-35386 | CVE-2026-35386 | 2026-04-02T00:00:00.000Z | 2026-04-11T01:39:56.000Z |
| msrc_cve-2026-35388 | CVE-2026-35388 | 2026-04-02T00:00:00.000Z | 2026-04-11T01:39:45.000Z |
| msrc_cve-2026-33810 | Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509 | 2026-04-02T00:00:00.000Z | 2026-04-11T01:10:17.000Z |
| msrc_cve-2026-27140 | Code execution vulnerability in SWIG code generation in cmd/go | 2026-04-02T00:00:00.000Z | 2026-04-11T01:10:08.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0088 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-03-12T06:55:39.712240Z | 2026-03-12T06:55:39.712240Z |
| ncsc-2026-0087 | Kwetsbaarheden verholpen in Adobe Commerce | 2026-03-12T06:49:56.459199Z | 2026-03-12T06:49:56.459199Z |
| ncsc-2026-0086 | Kwetsbaarheden verholpen in Fortinet FortiManager en FortiAnalyzer | 2026-03-11T09:19:38.777277Z | 2026-03-11T09:19:38.777277Z |
| ncsc-2026-0085 | Kwetsbaarheden verholpen in Microsoft Developer tools | 2026-03-10T20:35:10.478398Z | 2026-03-10T20:35:10.478398Z |
| ncsc-2026-0084 | Kwetsbaarheden verholpen in Microsoft Office | 2026-03-10T20:20:08.157658Z | 2026-03-10T20:20:08.157658Z |
| ncsc-2026-0083 | Kwetsbaarheid verholpen in Microsoft Authenticator app | 2026-03-10T20:18:35.792755Z | 2026-03-10T20:18:35.792755Z |
| ncsc-2026-0082 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-03-10T20:15:41.528951Z | 2026-03-10T20:15:41.528951Z |
| ncsc-2026-0081 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2026-03-10T20:12:56.032261Z | 2026-03-10T20:12:56.032261Z |
| ncsc-2026-0080 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-03-10T20:07:55.976638Z | 2026-03-10T20:07:55.976638Z |
| ncsc-2026-0059 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2026-02-11T08:16:27.583936Z | 2026-03-10T14:20:48.176282Z |
| ncsc-2026-0079 | Kwetsbaarheden verholpen in Siemens producten | 2026-03-10T12:39:14.474522Z | 2026-03-10T12:39:14.474522Z |
| ncsc-2026-0071 | Kwetsbaarheden verholpen in Cisco Catalyst SD-WAN Manager | 2026-02-25T17:11:09.013125Z | 2026-03-06T12:07:02.595940Z |
| ncsc-2026-0078 | Kwetsbaarheden verholpen in Kibana | 2026-03-05T09:36:49.056247Z | 2026-03-05T09:36:49.056247Z |
| ncsc-2026-0077 | Kwetsbaarheden verholpen in Cisco Secure Firewall systemen | 2026-03-05T09:05:21.646499Z | 2026-03-05T09:05:21.646499Z |
| ncsc-2026-0075 | Kwetsbaarheid verholpen in n8n Automation Platform | 2026-03-04T14:03:54.207583Z | 2026-03-04T14:03:54.207583Z |
| ncsc-2026-0070 | Kwetsbaarheden verholpen in VMware Aria Operations | 2026-02-25T11:24:46.807867Z | 2026-03-04T08:54:08.940512Z |
| ncsc-2026-0074 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2026-03-03T09:07:09.279353Z | 2026-03-03T09:07:09.279353Z |
| ncsc-2026-0073 | Kwetsbaarheid verholpen in Juniper Junos OS Evolved | 2026-02-27T09:48:51.845864Z | 2026-02-27T09:48:51.845864Z |
| ncsc-2026-0072 | Kwetsbaarheden verholpen in GitLab | 2026-02-27T07:15:18.318821Z | 2026-02-27T07:15:18.318821Z |
| ncsc-2026-0069 | Kwetsbaarheden verholpen in SolarWinds Serv-U | 2026-02-25T10:39:38.154815Z | 2026-02-25T10:39:38.154815Z |
| ncsc-2026-0068 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2026-02-23T14:27:28.865278Z | 2026-02-23T14:27:28.865278Z |
| ncsc-2026-0043 | Zeroday-kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile | 2026-01-29T19:15:04.575371Z | 2026-02-20T14:47:02.047999Z |
| ncsc-2026-0067 | Kwetsbaarheden verholpen in GitHub Enterprise Server | 2026-02-20T10:13:39.540778Z | 2026-02-20T10:13:39.540778Z |
| ncsc-2026-0066 | Kwetsbaarheid verholpen in Google Chrome | 2026-02-19T08:29:30.712590Z | 2026-02-19T08:29:30.712590Z |
| ncsc-2026-0065 | Kwetsbaarheid verholpen in Dell RecoverPoint for Virtual Machines | 2026-02-18T13:18:23.815384Z | 2026-02-18T13:18:23.815384Z |
| ncsc-2026-0064 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2026-02-13T13:35:03.870920Z | 2026-02-13T13:35:03.870920Z |
| ncsc-2026-0063 | Kwetsbaarheden verholpen in Apple macOS | 2026-02-13T13:24:06.433550Z | 2026-02-13T13:24:06.433550Z |
| ncsc-2026-0048 | Kwetsbaarheid verholpen in BeyondTrust Remote Support | 2026-02-09T10:27:57.867529Z | 2026-02-13T12:54:32.614217Z |
| ncsc-2026-0062 | Kwetsbaarheden verholpen in GitLab CE/EE | 2026-02-11T11:45:05.986313Z | 2026-02-11T11:45:05.986313Z |
| ncsc-2026-0061 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2026-02-11T11:34:50.888067Z | 2026-02-11T11:34:50.888067Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2023_3-01 | Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_2-01 | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_11-01 | SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_10-01 | DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_1-01 | Authenticated SQL Injection on Alerts in Guardian/CMC before 22.5.2 | 2023-05-03T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:9-01 | Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:8-01 | Session Fixation in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:7-01 | DoS via SAML configuration in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:6-01 | Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:5-01 | Information disclosure via the debug function in assertions in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:4-01 | Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:3-01 | Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:2-01 | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:11-01 | SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:10-01 | DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023:1-01 | Authenticated SQL Injection on Alerts in Guardian/CMC before 22.5.2 | 2023-05-03T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022_2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022_2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022:2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2022:2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021_2-01 | Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021_1-01 | Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021:2-01 | Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2021:1-01 | Authenticated command injection when changing date settings or hostname in Guardian/CMC before 20.0.7.4 | 2021-02-22T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020_3-01 | Angular template injection on custom report name field | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020_2-01 | Cross-site request forgery attack on change password form | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020:3-01 | Angular template injection on custom report name field | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2020:2-01 | Cross-site request forgery attack on change password form | 2020-05-26T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019_2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019_1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20469-1 | Security update for cockpit-packages | 2026-04-07T13:03:46Z | 2026-04-07T13:03:46Z |
| opensuse-su-2026:20465-1 | Security update for tigervnc | 2026-04-07T12:21:55Z | 2026-04-07T12:21:55Z |
| opensuse-su-2026:20468-1 | Security update for python-cbor2 | 2026-04-07T11:57:38Z | 2026-04-07T11:57:38Z |
| opensuse-su-2026:20466-1 | Security update for libpng16 | 2026-04-07T11:57:38Z | 2026-04-07T11:57:38Z |
| opensuse-su-2026:20473-1 | Security update for osslsigncode | 2026-04-07T07:50:40Z | 2026-04-07T07:50:40Z |
| opensuse-su-2026:10499-1 | python311-social-auth-app-django-5.7.0-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10498-1 | libeverest-3.6.6-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10497-1 | heroic-games-launcher-2.20.1-5.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10496-1 | git-cliff-2.12.0-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10495-1 | ckermit-9.0.302-20.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:10494-1 | SDL2_image-devel-2.8.10-1.1 on GA media | 2026-04-07T00:00:00Z | 2026-04-07T00:00:00Z |
| opensuse-su-2026:20464-1 | Security update for cockpit-repos | 2026-04-05T02:50:21Z | 2026-04-05T02:50:21Z |
| opensuse-su-2026:10493-1 | SDL3_image-devel-3.4.2-1.1 on GA media | 2026-04-05T00:00:00Z | 2026-04-05T00:00:00Z |
| opensuse-su-2026:10492-1 | liblzma5-32bit-5.8.3-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10491-1 | python311-scitokens-1.8.1-2.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10490-1 | python311-aiohttp-3.13.5-2.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10489-1 | libinput-devel-1.31.1-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10488-1 | corosync-3.1.10-4.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10487-1 | chromedriver-146.0.7680.177-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:10486-1 | amazon-ssm-agent-3.3.4121.0-1.1 on GA media | 2026-04-04T00:00:00Z | 2026-04-04T00:00:00Z |
| opensuse-su-2026:20460-1 | Security update for chromium | 2026-04-03T06:09:23Z | 2026-04-03T06:09:23Z |
| opensuse-su-2026:10485-1 | python311-Flask-Cors-6.0.2-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| opensuse-su-2026:10484-1 | k6-1.7.1-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| opensuse-su-2026:10483-1 | himmelblau-2.3.9+git0.a9fd29b-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| opensuse-su-2026:20461-1 | Security update for dnsdist | 2026-04-02T09:11:51Z | 2026-04-02T09:11:51Z |
| opensuse-su-2026:10482-1 | osslsigncode-2.13-1.1 on GA media | 2026-04-02T00:00:00Z | 2026-04-02T00:00:00Z |
| opensuse-su-2026:20459-1 | Security update for perl-XML-Parser | 2026-04-01T16:23:38Z | 2026-04-01T16:23:38Z |
| opensuse-su-2026:20456-1 | Security update for tinyproxy | 2026-04-01T16:15:06Z | 2026-04-01T16:15:06Z |
| opensuse-su-2026:20458-1 | Security update for python-Pillow | 2026-04-01T14:57:29Z | 2026-04-01T14:57:29Z |
| opensuse-su-2026:20452-1 | Security update for kea | 2026-04-01T09:24:21Z | 2026-04-01T09:24:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:4464 | Red Hat Security Advisory: OpenShift Container Platform 4.16.58 packages and security update | 2026-03-19T07:51:30+00:00 | 2026-04-14T14:07:14+00:00 |
| rhsa-2026:4423 | Red Hat Security Advisory: OpenShift Container Platform 4.15.62 bug fix and security update | 2026-03-19T05:29:11+00:00 | 2026-04-14T14:07:14+00:00 |
| rhsa-2026:4418 | Red Hat Security Advisory: OpenShift Container Platform 4.15.62 packages and security update | 2026-03-19T05:59:29+00:00 | 2026-04-14T14:07:14+00:00 |
| rhsa-2026:4271 | Red Hat Security Advisory: RHTAS 1.3.2 - Tech Preview Release of Model Transparency | 2026-03-11T09:02:58+00:00 | 2026-04-14T14:07:14+00:00 |
| rhsa-2026:3874 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.4 security update | 2026-03-05T11:31:22+00:00 | 2026-04-14T14:07:14+00:00 |
| rhsa-2026:4215 | Red Hat Security Advisory: Red Hat Quay 3.14.6 | 2026-03-10T15:34:38+00:00 | 2026-04-14T14:07:13+00:00 |
| rhsa-2026:4185 | Red Hat Security Advisory: Red Hat Quay 3.13.11 | 2026-03-10T13:57:02+00:00 | 2026-04-14T14:07:13+00:00 |
| rhsa-2026:3928 | Red Hat Security Advisory: git-lfs security update | 2026-03-05T16:42:20+00:00 | 2026-04-14T14:07:13+00:00 |
| rhsa-2026:3898 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-05T14:35:19+00:00 | 2026-04-14T14:07:12+00:00 |
| rhsa-2026:3854 | Red Hat Security Advisory: grafana security update | 2026-03-05T11:07:41+00:00 | 2026-04-14T14:07:12+00:00 |
| rhsa-2026:3884 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.19.2 security update | 2026-03-05T12:07:11+00:00 | 2026-04-14T14:07:11+00:00 |
| rhsa-2026:3880 | Red Hat Security Advisory: grafana security update | 2026-03-05T12:20:43+00:00 | 2026-04-14T14:07:11+00:00 |
| rhsa-2026:3875 | Red Hat Security Advisory: OpenShift Container Platform 4.18.35 packages and security update | 2026-03-11T05:09:45+00:00 | 2026-04-14T14:07:11+00:00 |
| rhsa-2026:3851 | Red Hat Security Advisory: OpenShift Container Platform 4.20.16 packages and security update | 2026-03-11T05:24:06+00:00 | 2026-04-14T14:07:11+00:00 |
| rhsa-2026:3869 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.17.5 security update | 2026-03-05T11:15:16+00:00 | 2026-04-14T14:07:10+00:00 |
| rhsa-2026:3864 | Red Hat Security Advisory: delve security update | 2026-03-05T11:35:47+00:00 | 2026-04-14T14:07:10+00:00 |
| rhsa-2026:3856 | Red Hat Security Advisory: OpenShift Container Platform 4.20.16 security and extras update | 2026-03-11T03:54:47+00:00 | 2026-04-14T14:07:09+00:00 |
| rhsa-2026:3843 | Red Hat Security Advisory: delve security update | 2026-03-05T09:56:17+00:00 | 2026-04-14T14:07:09+00:00 |
| rhsa-2026:3841 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:37:53+00:00 | 2026-04-14T14:07:09+00:00 |
| rhsa-2026:3840 | Red Hat Security Advisory: image-builder security update | 2026-03-05T09:44:51+00:00 | 2026-04-14T14:07:09+00:00 |
| rhsa-2026:3839 | Red Hat Security Advisory: image-builder security update | 2026-03-05T10:11:47+00:00 | 2026-04-14T14:07:09+00:00 |
| rhsa-2026:3838 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:44:33+00:00 | 2026-04-14T14:07:08+00:00 |
| rhsa-2026:3836 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:03:15+00:00 | 2026-04-14T14:07:07+00:00 |
| rhsa-2026:3835 | Red Hat Security Advisory: grafana security update | 2026-03-05T09:01:36+00:00 | 2026-04-14T14:07:07+00:00 |
| rhsa-2026:3833 | Red Hat Security Advisory: grafana security update | 2026-03-05T08:23:57+00:00 | 2026-04-14T14:07:07+00:00 |
| rhsa-2026:3831 | Red Hat Security Advisory: grafana security update | 2026-03-05T07:55:46+00:00 | 2026-04-14T14:07:07+00:00 |
| rhsa-2026:3827 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.20.3 | 2026-03-05T07:31:32+00:00 | 2026-04-14T14:07:06+00:00 |
| rhsa-2026:3825 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.20.3 | 2026-03-05T07:08:51+00:00 | 2026-04-14T14:07:06+00:00 |
| rhsa-2026:3822 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:53:01+00:00 | 2026-04-14T14:07:06+00:00 |
| rhsa-2026:3821 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T06:51:55+00:00 | 2026-04-14T14:07:05+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2023-192-04 | CODESYS Runtime Vulnerabilities | 2023-07-11T07:15:18.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2021-159-04 | ISaGRAF Vulnerabilities in IEC 61131-3 Programming and Engineering Tools | 2021-06-08T04:36:25.000Z | 2025-11-15T00:00:00.000Z |
| sevd-2022-284-03 | ISaGRAF Workbench for SAGE RTU | 2022-10-10T22:13:16.000Z | 2025-11-14T06:30:00.000Z |
| sevd-2025-315-02 | EcoStruxure⢠Machine SCADA Expert & Pro-face BLUE Open Studio | 2025-11-11T08:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-315-01 | PowerChute⢠Serial Shutdown | 2025-11-11T08:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-224-02 | EcoStruxure⢠Power Monitoring Expert Software & EcoStruxure⢠Power Operation (EPO) and EcoStruxure⢠Power SCADA Operation (PSO) | 2025-08-12T04:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-224-01 | Saitel DR & Saitel DP Remote Terminal Unit | 2025-08-12T04:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-287-01 | EcoStruxure⢠OPC UA Server Expert and EcoStruxure⢠Modicon Communication Server | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2025-133-01 | Modicon Controllers M241/M251/M258/LMC058 | 2025-05-13T04:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2024-345-03 | Modicon M241 / M251 / M258 / LMC058 | 2024-12-10T05:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2024-191-04 | Modicon Controllers M241/ M251, M258 / LMC058 and M262 | 2024-07-09T00:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2025-133-05 | Galaxy VS, Galaxy VL, Galaxy VXL | 2025-05-13T04:00:00.000Z | 2025-09-24T04:00:00.000Z |
| sevd-2025-252-02 | Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-09T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-04 | EcoStruxure⢠Building Operation Enterprise Server, EcoStruxure⢠Building Operation Enterprise Central, and EcoStruxure⢠Workstation | 2025-08-12T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-03 | Schneider Electric Software Update | 2025-08-12T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-014-02 | Pro-face GP-Pro EX and Remote HMI | 2025-01-14T00:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2021-313-05 | BadAlloc Vulnerabilities | 2021-11-09T05:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-014-03 | Wind River VxWorks DHCP Server Vulnerability | 2025-01-14T05:00:00.000Z | 2025-08-12T04:00:00.000Z |
| sevd-2025-189-04 | EcoStruxure⢠Power Monitoring Expert (PME) and EcoStruxure⢠Power Operation (EPO) with Advanced Reporting and Dashboards | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-189-02 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-189-01 | EcoStruxure⢠IT Data Center Expert | 2025-07-08T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-03 | EVLink WallBox | 2025-06-10T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-02 | Modicon Controllers M241/M251/M258/LMC058/M262 | 2025-06-10T04:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2024-254-01 | Vijeo Designer | 2024-09-10T00:00:00.000Z | 2025-07-08T04:00:00.000Z |
| sevd-2025-161-01 | Insight Home and Insight Facility | 2025-06-10T04:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2020-287-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-10-13T00:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2025-133-04 | Schneider Electric PrismaSeT Active - Wireless Panel Server | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-03 | EcoStruxure Power Build Rapsody | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-133-02 | Wiser Home Automation | 2025-05-13T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-098-01 | ConneXium Network Manager Software | 2025-04-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| SCA-2023-0010 | Vulnerabilities in SICK Application Processing Unit | 2023-10-09T11:00:00.000Z | 2023-10-09T11:00:00.000Z |
| sca-2023-0008 | Vulnerability in SICK SIM1012 | 2023-09-29T13:00:00.000Z | 2023-09-29T13:00:00.000Z |
| SCA-2023-0008 | Vulnerability in SICK SIM1012 | 2023-09-29T13:00:00.000Z | 2023-09-29T13:00:00.000Z |
| sca-2023-0009 | Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products | 2023-09-29T10:00:00.000Z | 2023-09-29T10:00:00.000Z |
| SCA-2023-0009 | Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products | 2023-09-29T10:00:00.000Z | 2023-09-29T10:00:00.000Z |
| sca-2023-0007 | Vulnerabilities in SICK LMS5xx | 2023-08-25T11:00:00.000Z | 2023-08-25T11:00:00.000Z |
| SCA-2023-0007 | Vulnerabilities in SICK LMS5xx | 2023-08-25T11:00:00.000Z | 2023-08-25T11:00:00.000Z |
| sca-2023-0006 | Vulnerabilities in SICK ICR890-4 | 2023-07-10T13:00:00.000Z | 2023-07-10T13:00:00.000Z |
| SCA-2023-0006 | Vulnerabilities in SICK ICR890-4 | 2023-07-10T13:00:00.000Z | 2023-07-10T13:00:00.000Z |
| sca-2023-0005 | Vulnerabilities in SICK EventCam App | 2023-06-19T11:00:00.000Z | 2023-06-19T11:00:00.000Z |
| SCA-2023-0005 | Vulnerabilities in SICK EventCam App | 2023-06-19T11:00:00.000Z | 2023-06-19T11:00:00.000Z |
| sca-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| SCA-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| sca-2023-0003 | Vulnerability in SICK Flexi Soft and Flexi Classic Gateways | 2023-05-03T13:00:00.000Z | 2023-05-03T13:00:00.000Z |
| SCA-2023-0003 | Vulnerability in SICK Flexi Soft and Flexi Classic Gateways | 2023-05-03T13:00:00.000Z | 2023-05-03T13:00:00.000Z |
| sca-2023-0002 | Use of Telnet in multiple SICK Flexi Soft and Flexi Classic Gateways | 2023-04-11T10:00:00.000Z | 2023-04-11T10:00:00.000Z |
| sca-2023-0001 | Bootloader mode vulnerability in Flexi Soft Gateways v3 | 2023-02-20T14:00:00.000Z | 2023-02-20T14:00:00.000Z |
| sca-2022-0015 | Use of a Broken or Risky Cryptographic Algorithm in SICK RFU6xx RADIO FREQUEN. SENSOR | 2022-12-08T16:00:00.000Z | 2022-12-08T16:00:00.000Z |
| sca-2022-0013 | Password recovery vulnerability affects multiple SICK SIMs | 2022-10-21T13:00:00.000Z | 2022-11-04T14:00:00.000Z |
| sca-2022-0014 | SICK FlexiCompact affected by Denial of Service vulnerability | 2022-10-31T11:00:00.000Z | 2022-10-31T11:00:00.000Z |
| sca-2022-0012 | OpenSSL vulnerability affects multiple SICK SIMs | 2022-08-08T13:00:00.000Z | 2022-08-03T13:00:00.000Z |
| sca-2022-0010 | Vulnerability in SICK Flexi Soft Designer & Safety Designer | 2022-05-16T10:00:00.000Z | 2022-07-19T10:00:00.000Z |
| sca-2022-0011 | Vulnerabilities in SICK Package Analytics | 2022-06-08T15:00:00.000Z | 2022-06-08T15:00:00.000Z |
| sca-2022-0009 | Vulnerability in SICK Flexi Soft PROFINET IO Gateway FX0-GPNT and SICK microScan3 PROFINET | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0008 | Vulnerability in SICK Gateways for Flexi Soft, Flexi Compact, SICK EFI Gateway UE4740, SICK microScan3 and outdoorScan3 | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0007 | Vulnerabilities in SICK MARSIC300 | 2022-04-21T15:00:00.000Z | 2022-04-21T15:00:00.000Z |
| sca-2022-0006 | Vulnerability in SICK MSC800 | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0005 | Vulnerability in SICK Overall Equipment Effectiveness (OEE) | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0004 | Microsoft vulnerability affects multiple SICK IPCs with SICK MEAC | 2022-04-11T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
| sca-2022-0003 | Vulnerabilities in SICK FTMg | 2022-03-31T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-485750 | SSA-485750: Multiple Vulnerabilities in SIDIS Prime Before V4.0.800 | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-430425 | SSA-430425: Multiple Vulnerabilities in SINEC Security Monitor before V4.9.0 | 2024-10-08T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-282044 | SSA-282044: DLL Hijacking Vulnerability in Siemens Web Installer used by the Online Software Delivery | 2025-08-12T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-212953 | SSA-212953: Multiple Vulnerabilities in COMOS | 2025-12-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-201595 | SSA-201595: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2025-08-14T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-126399 | SSA-126399: Improper Access Control Vulnerability in Heliox EV Chargers | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-082556 | SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 | 2025-06-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-027652 | SSA-027652: Privilege Escalation Vulnerability in SINAMICS Drives | 2025-09-09T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-613116 | SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 | 2025-08-12T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-355557 | SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 | 2025-08-12T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-089022 | SSA-089022: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.3 | 2026-01-28T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-965753 | SSA-965753: Multiple File Parsing Vulnerabilities in Simcenter Femap and Nastran Before V2512 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-864900 | SSA-864900: Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-783261 | SSA-783261: Denial of Service Vulnerability in Automation License Manager (ALM) Before V5.2 | 2012-12-12T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-674753 | SSA-674753: Denial-of-Service Vulnerability in ET 200 Devices | 2026-01-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-625934 | SSA-625934: Improper Access Control Vulnerability in the Webhooks Implementation of Siveillance Video Management Servers | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-599451 | SSA-599451: Multiple Vulnerabilities in SiPass integrated | 2025-10-14T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-507364 | SSA-507364: Heap Based Buffer Overflow Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-445819 | SSA-445819: Out of Bounds Read in PS/IGES Parasolid Translator Component in Solid Edge | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-265688 | SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 | 2024-04-09T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-130874 | SSA-130874: Buffer Overflow Vulnerability in SCALANCE X Switches | 2012-04-05T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-035571 | SSA-035571: Cross Site Scripting Vulnerability in Polarion Before V2506 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-978177 | SSA-978177: Vulnerability in Nozomi Guardian/CMC Before 25.4.0 on RUGGEDCOM APE1808 Devices | 2025-08-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-928984 | SSA-928984: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-12-16T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-912274 | SSA-912274: Multiple Vulnerabilities in RUGGEDCOM ROX Before V2.17 | 2025-12-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-858251 | SSA-858251: Authentication Bypass Vulnerabilities in OPC UA | 2025-03-11T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-832273 | SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-698820 | SSA-698820: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.4 on RUGGEDCOM APE1808 Devices | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-693776 | SSA-693776: Multiple Vulnerabilities in Industrial Communication Devices based on SINEC OS before V3.2 | 2025-06-10T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-366067 | SSA-366067: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1261-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T19:34:46Z | 2026-04-10T19:34:46Z |
| suse-su-2026:1259-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6) | 2026-04-10T17:35:15Z | 2026-04-10T17:35:15Z |
| suse-su-2026:1258-1 | Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T17:35:09Z | 2026-04-10T17:35:09Z |
| suse-su-2026:1257-1 | Security update for openssl-1_1 | 2026-04-10T15:06:36Z | 2026-04-10T15:06:36Z |
| suse-su-2026:1256-1 | Security update for openssl-1_0_0 | 2026-04-10T14:57:18Z | 2026-04-10T14:57:18Z |
| suse-su-2026:1255-1 | Security update for openssl-1_1 | 2026-04-10T14:56:12Z | 2026-04-10T14:56:12Z |
| suse-su-2026:1254-1 | Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T14:04:42Z | 2026-04-10T14:04:42Z |
| suse-su-2026:21023-1 | Security update for cockpit-podman | 2026-04-10T11:54:16Z | 2026-04-10T11:54:16Z |
| suse-su-2026:21024-1 | Security update for cockpit-machines | 2026-04-10T11:53:13Z | 2026-04-10T11:53:13Z |
| suse-su-2026:21022-1 | Security update for cockpit | 2026-04-10T11:42:11Z | 2026-04-10T11:42:11Z |
| suse-su-2026:1252-1 | Security update for tigervnc | 2026-04-10T11:36:58Z | 2026-04-10T11:36:58Z |
| suse-su-2026:1251-1 | Security update for cockpit-podman | 2026-04-10T11:36:50Z | 2026-04-10T11:36:50Z |
| suse-su-2026:1250-1 | Security update for cockpit-tukit | 2026-04-10T11:36:40Z | 2026-04-10T11:36:40Z |
| suse-su-2026:1249-1 | Security update for cockpit-machines | 2026-04-10T11:36:32Z | 2026-04-10T11:36:32Z |
| suse-su-2026:21021-1 | Security update for python-cryptography | 2026-04-10T11:26:32Z | 2026-04-10T11:26:32Z |
| suse-su-2026:1247-1 | Security update for nghttp2 | 2026-04-10T10:34:43Z | 2026-04-10T10:34:43Z |
| suse-su-2026:1248-1 | Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T09:13:03Z | 2026-04-10T09:13:03Z |
| suse-su-2026:21020-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-10T08:14:40Z | 2026-04-10T08:14:40Z |
| suse-su-2026:1244-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T08:04:54Z | 2026-04-10T08:04:54Z |
| suse-su-2026:1242-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T07:04:48Z | 2026-04-10T07:04:48Z |
| suse-su-2026:21019-1 | Security update for glibc | 2026-04-10T06:44:31Z | 2026-04-10T06:44:31Z |
| suse-su-2026:1239-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T19:04:33Z | 2026-04-09T19:04:33Z |
| suse-su-2026:1237-1 | Security update for the Linux Kernel (Live Patch 47 for SUSE Linux Enterprise 15 SP4) | 2026-04-09T17:04:59Z | 2026-04-09T17:04:59Z |
| suse-su-2026:21018-1 | Security update for ovmf | 2026-04-09T15:10:40Z | 2026-04-09T15:10:40Z |
| suse-su-2026:1236-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T14:22:32Z | 2026-04-09T14:22:32Z |
| suse-su-2026:21091-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21090-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21061-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21060-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21089-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:5930 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T11:00:48Z |
| alsa-2026:6037 | Moderate: kernel security update | 2026-03-30T00:00:00Z | 2026-03-30T10:55:07Z |
| alsa-2026:6036 | Moderate: kernel-rt security update | 2026-03-30T00:00:00Z | 2026-03-30T10:51:16Z |
| alsa-2026:5932 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T10:46:04Z |
| alsa-2026:5931 | Important: firefox security update | 2026-03-26T00:00:00Z | 2026-03-30T10:43:43Z |
| alsa-2026:5913 | Moderate: ncurses security update | 2026-03-26T00:00:00Z | 2026-03-27T10:30:59Z |
| alsa-2026:5939 | Important: freerdp security update | 2026-03-26T00:00:00Z | 2026-03-27T10:28:32Z |
| alsa-2026:5941 | Important: golang security update | 2026-03-26T00:00:00Z | 2026-03-27T10:26:32Z |
| alsa-2026:5942 | Important: golang security update | 2026-03-26T00:00:00Z | 2026-03-27T10:17:44Z |
| alsa-2026:5599 | Moderate: nginx security update | 2026-03-24T00:00:00Z | 2026-03-26T13:22:57Z |
| alsa-2026:5581 | Moderate: nginx:1.24 security update | 2026-03-24T00:00:00Z | 2026-03-26T13:17:49Z |
| alsa-2026:5578 | Moderate: virt:rhel and virt-devel:rhel security update | 2026-03-24T00:00:00Z | 2026-03-26T13:09:57Z |
| alsa-2026:5640 | Moderate: mysql:8.4 security update | 2026-03-24T00:00:00Z | 2026-03-26T11:56:07Z |
| alsa-2026:5513 | Moderate: 389-ds:1.4 security update | 2026-03-24T00:00:00Z | 2026-03-26T11:22:25Z |
| alsa-2026:5580 | Moderate: mysql:8.0 security update | 2026-03-24T00:00:00Z | 2026-03-26T11:12:21Z |
| alsa-2026:5585 | Moderate: gnutls security update | 2026-03-24T00:00:00Z | 2026-03-26T11:01:10Z |
| alsa-2026:5587 | Moderate: opencryptoki security update | 2026-03-24T00:00:00Z | 2026-03-26T10:48:17Z |
| alsa-2026:5588 | Moderate: python3 security update | 2026-03-24T00:00:00Z | 2026-03-26T10:36:35Z |
| alsa-2026:5602 | Moderate: vim security update | 2026-03-24T00:00:00Z | 2026-03-26T10:18:47Z |
| alsa-2026:5603 | Moderate: opencryptoki security update | 2026-03-24T00:00:00Z | 2026-03-26T10:00:53Z |
| alsa-2026:5113 | Important: gimp:2.8 security update | 2026-03-19T00:00:00Z | 2026-03-20T13:31:59Z |
| alsa-2026:5145 | Important: yggdrasil-worker-package-manager security update | 2026-03-19T00:00:00Z | 2026-03-20T07:40:23Z |
| alsa-2026:5146 | Important: yggdrasil security update | 2026-03-19T00:00:00Z | 2026-03-20T07:36:24Z |
| alsa-2026:4759 | Moderate: kernel security update | 2026-03-17T00:00:00Z | 2026-03-20T07:32:09Z |
| alsa-2026:5063 | Important: libarchive security update | 2026-03-19T00:00:00Z | 2026-03-20T07:26:23Z |
| alsa-2026:5080 | Important: libarchive security update | 2026-03-19T00:00:00Z | 2026-03-20T07:21:56Z |
| alsa-2026:4715 | Moderate: vim security update | 2026-03-17T00:00:00Z | 2026-03-20T07:17:19Z |
| alsa-2026:4898 | Important: capstone security update | 2026-03-18T00:00:00Z | 2026-03-19T15:08:06Z |
| alsa-2026:4828 | Moderate: mysql security update | 2026-03-17T00:00:00Z | 2026-03-19T15:05:35Z |
| alsa-2026:4717 | Moderate: opencryptoki security update | 2026-03-17T00:00:00Z | 2026-03-19T15:03:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| hsec-2023-0003 | code injection in xmonad-contrib | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0002 | Improper Verification of Cryptographic Signature | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0001 | Hash flooding vulnerability in aeson | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-948 | Use-of-uninitialized-value in residual_coding | 2021-07-10T00:01:12.890029Z | 2026-04-10T14:06:45.638294Z |
| osv-2021-735 | Use-of-uninitialized-value in decode_CABAC_FL_bypass | 2021-05-08T00:00:14.355747Z | 2026-04-10T14:06:44.826192Z |
| osv-2021-586 | Use-of-uninitialized-value in void intra_prediction_angular<unsigned short> | 2021-03-31T00:01:03.787831Z | 2026-04-10T14:06:19.649878Z |
| osv-2020-868 | Use-of-uninitialized-value in fetchARGB32ToRGBA64PM_avx2 | 2020-07-14T22:13:50.828646Z | 2026-04-10T14:06:12.468231Z |
| osv-2022-1198 | Heap-buffer-overflow in dwg_json_LTYPE | 2022-11-23T13:02:06.623044Z | 2026-04-10T14:05:46.801956Z |
| osv-2022-842 | Stack-buffer-overflow in wc_Shake256_Final | 2022-09-05T00:00:28.251072Z | 2026-04-09T14:36:35.503150Z |
| osv-2023-107 | Heap-buffer-overflow in DecodeBasicOcspResponse | 2023-02-25T13:00:07.390537Z | 2026-04-09T14:34:49.566404Z |
| osv-2024-269 | Security exception in java.base/java.util.stream.AbstractPipeline.evaluate | 2024-04-18T00:04:02.456948Z | 2026-04-09T14:31:24.951720Z |
| osv-2022-312 | Heap-buffer-overflow in dhcp_reply | 2022-04-07T00:00:40.457052Z | 2026-04-07T14:18:25.731015Z |
| osv-2021-1135 | Heap-use-after-free in prvTidyInsertedToken | 2021-08-16T00:01:09.422775Z | 2026-04-05T14:14:03.564509Z |
| osv-2026-532 | Heap-buffer-overflow in regsub | 2026-04-05T00:06:36.291055Z | 2026-04-05T00:06:36.291504Z |
| osv-2022-394 | Incorrect-function-pointer-type in cv::split | 2022-05-04T00:00:27.326853Z | 2026-04-04T14:23:39.520277Z |
| osv-2024-451 | Use-of-uninitialized-value in XpackDynamicTable::_make_space | 2024-05-08T00:14:48.544622Z | 2026-04-03T14:17:40.819969Z |
| osv-2026-518 | Use-of-uninitialized-value in ne_read_block | 2026-04-03T00:21:06.950773Z | 2026-04-03T00:21:06.951035Z |
| osv-2026-514 | Heap-buffer-overflow in format_expand1 | 2026-04-03T00:09:42.155641Z | 2026-04-03T00:09:42.155954Z |
| osv-2026-512 | Heap-buffer-overflow in g_utf8_get_char | 2026-04-03T00:07:59.707776Z | 2026-04-03T00:07:59.708039Z |
| osv-2026-504 | Heap-use-after-free in ObjectStream::getObject | 2026-04-02T00:16:28.228723Z | 2026-04-02T00:16:28.229037Z |
| osv-2022-834 | Heap-use-after-free in mk_event_timeout_destroy | 2022-09-04T00:00:31.605787Z | 2026-04-01T14:27:59.352404Z |
| osv-2022-937 | Use-after-poison in rx_ip | 2022-09-23T00:02:21.434097Z | 2026-04-01T14:27:42.367988Z |
| osv-2022-1277 | Heap-use-after-free in mk_event_timeout_destroy | 2023-06-26T14:01:01.876870Z | 2026-04-01T14:23:09.019013Z |
| osv-2022-1201 | Stack-buffer-overflow in msc_zero_object | 2022-11-24T13:00:10.344351Z | 2026-03-31T14:04:55.969741Z |
| osv-2022-1188 | Stack-buffer-overflow in authentic_get_tagged_data | 2022-11-20T13:01:57.719130Z | 2026-03-31T14:04:55.181202Z |
| osv-2023-395 | Stack-buffer-overflow in sc_path_print | 2023-05-14T14:00:57.078498Z | 2026-03-31T14:04:53.759303Z |
| osv-2024-696 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-07-31T00:03:10.056663Z | 2026-03-30T14:18:48.684167Z |
| osv-2024-400 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-05-02T00:03:16.309384Z | 2026-03-30T14:18:22.305458Z |
| osv-2024-641 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-07-14T00:06:37.034414Z | 2026-03-30T14:18:20.625772Z |
| osv-2024-278 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-04-19T00:12:11.684954Z | 2026-03-30T14:17:53.191446Z |
| osv-2022-776 | Heap-buffer-overflow in do_job | 2022-08-24T00:00:48.440951Z | 2026-03-28T14:13:55.545096Z |
| osv-2025-312 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2025-05-02T00:14:14.459388Z | 2026-03-27T14:26:26.446866Z |
| osv-2023-606 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2023-07-23T14:01:02.159160Z | 2026-03-27T14:21:24.837066Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0074 | Incorrect Output of Incremental Portable SHAKE API | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2026-0073 | Panic in Standalone MAC Operations | 2026-03-04T12:00:00Z | 2026-03-27T05:55:06Z |
| rustsec-2025-0155 | `rands` was removed from crates.io for malicious code | 2025-02-10T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0124 | `bit-flags` was removed from crates.io for malicious code | 2023-12-22T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0123 | `hann-rs-service` was removed from crates.io for malicious code | 2023-11-18T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0122 | `winx-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0121 | `libusb1-main` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0120 | `windows-service-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0119 | `openvpn-plugin-rs` was removed from crates.io for malicious code | 2023-11-18T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0118 | `win_run_rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0117 | `tauri-winrt-notifications` was removed from crates.io for malicious code | 2023-11-20T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0116 | `registry-win` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0115 | `acceptxmr-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0114 | `tiny-server` was removed from crates.io for malicious code | 2023-11-06T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0113 | `win-base64-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0112 | `monero-rpc-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0111 | `monero-api` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0110 | `postgresderive` was removed from crates.io for malicious code | 2023-08-18T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0109 | `win-crypto` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0108 | `tauri-win-rt-notification` was removed from crates.io for malicious code | 2023-11-20T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0107 | `lasso-rs` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0106 | `lfest-main` was removed from crates.io for malicious code | 2023-11-15T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0105 | `windowsservice` was removed from crates.io for malicious code | 2023-11-18T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2023-0104 | `littest` was removed from crates.io for malicious code | 2023-11-06T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2025-0154 | `replit_ruspty` was removed from crates.io for malicious code | 2025-11-04T12:00:00Z | 2026-03-25T08:37:19Z |
| rustsec-2026-0049 | CRLs not considered authoritative by Distribution Point due to faulty matching logic | 2026-03-20T12:00:00Z | 2026-03-24T08:22:29Z |
| rustsec-2026-0072 | Missing Check for All-Zero X25519 Shared Secret | 2026-02-04T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0071 | Nonce Reuse in HPKE Context | 2026-02-05T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0070 | Panic When Opening or Sealing on Export-Only Context | 2026-02-11T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0069 | Incorrect Length Encoding on KDF Export | 2026-02-11T12:00:00Z | 2026-03-24T08:16:07Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-kibana-2026-33458 | Server-Side Request Forgery (SSRF) in Kibana One Workflow Leading to Information Disclosure | 2026-04-13T05:41:58.634Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35206 | Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment | 2026-04-13T05:40:36.770Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35205 | Helm's plugin verification fails open when .prov is missing, allowing unsigned plugin install | 2026-04-13T05:40:35.063Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35204 | Helm has a path traversal in plugin metadata version enables arbitrary file write outside Helm plugin directory | 2026-04-13T05:40:33.104Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-33810 | Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509 | 2026-04-13T05:43:50.259Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32289 | JsBraceDepth Context Tracking Bugs (XSS) in html/template | 2026-04-13T05:43:48.183Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32288 | Unbounded allocation for old GNU sparse in archive/tar | 2026-04-13T05:43:46.362Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32283 | Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls | 2026-04-13T05:43:44.464Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32282 | TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix | 2026-04-13T05:43:42.625Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32281 | Inefficient policy validation in crypto/x509 | 2026-04-13T05:43:40.495Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32280 | Unexpected work during chain building in crypto/x509 | 2026-04-13T05:43:38.849Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-27140 | Code execution vulnerability in SWIG code generation in cmd/go | 2026-04-13T05:43:35.566Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-4916 | Missing Authorization in GitLab | 2026-04-13T06:10:14.681Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-4332 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-04-13T06:10:11.039Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-2619 | Incorrect Authorization in GitLab | 2026-04-13T06:09:54.420Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-2104 | Authorization Bypass Through User-Controlled Key in GitLab | 2026-04-13T06:09:50.678Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-1516 | Improper Control of Generation of Code ('Code Injection') in GitLab | 2026-04-13T06:09:35.915Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-1101 | Improper Validation of Specified Quantity in Input in GitLab | 2026-04-13T06:09:20.803Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2025-9484 | Missing Authorization in GitLab | 2026-04-13T06:08:58.190Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2025-12664 | Improper Validation of Specified Quantity in Input in GitLab | 2026-04-13T06:05:51.788Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-4498 | Execution with Unnecessary Privileges in Kibana Leading to reading index data beyond their direct Elasticsearch RBAC scope | 2026-04-13T05:38:40.214Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33461 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:38:38.805Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33460 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:38:37.022Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33459 | Uncontrolled Resource Consumption in Kibana Leading to Denial of Service | 2026-04-13T05:38:35.203Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33458 | Server-Side Request Forgery (SSRF) in Kibana One Workflow Leading to Information Disclosure | 2026-04-13T05:38:33.681Z | 2026-04-13T06:11:47.324Z |
| bit-airflow-2026-34538 | Apache Airflow: Authorization bypass in DagRun wait endpoint (XCom exposure) | 2026-04-13T05:38:18.100Z | 2026-04-13T06:11:47.324Z |
| bit-airflow-2025-57735 | Apache Airflow: Airflow Logout Not Invalidating JWT | 2026-04-13T05:37:57.108Z | 2026-04-13T06:11:47.324Z |
| bit-activemq-2026-40046 | Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT: Missing fix for CVE-2025-66168: MQTT control packet remaining length field is not properly validated | 2026-04-13T05:36:23.428Z | 2026-04-13T06:11:47.324Z |
| bit-activemq-2025-66168 | Apache ActiveMQ, Apache ActiveMQ All Module, Apache ActiveMQ MQTT Module: MQTT control packet remaining length field is not properly validated | 2026-03-06T08:36:37.326Z | 2026-04-13T06:11:47.324Z |
| bit-python-2026-1299 | email BytesGenerator header injection due to unquoted newlines | 2026-02-03T08:53:00.053Z | 2026-04-10T09:26:18.172Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-bk17545 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-07T00:38:33.362093Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-aj47488 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-04-07T00:40:03.631106Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-fe32006 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-07T00:41:34.518345Z | 2026-04-06T06:37:58Z |
| cleanstart-2026-dp59378 | In libexpat before 2 | 2026-04-07T00:42:33.537935Z | 2026-04-06T06:37:58Z |
| cleanstart-2026-ob18608 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T06:19:25.639311Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-kf75900 | In libexpat before 2 | 2026-04-06T06:20:25.150640Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-jl41223 | In libexpat before 2 | 2026-04-06T06:19:55.229801Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-jg79570 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T06:19:24.747052Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-dz75075 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T06:19:24.775093Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-nu19941 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 5.19.3-r1 | 2026-04-06T02:44:20.354882Z | 2026-04-03T13:09:27Z |
| cleanstart-2026-kt07616 | Security fixes for CVE-2026-22735, CVE-2026-22737 applied in versions: 6.2.3-r0 | 2026-04-06T02:44:27.120329Z | 2026-04-03T13:09:27Z |
| cleanstart-2026-kt25851 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.87.0-r0, 0.87.0-r1, 0.88.0-r1 | 2026-04-06T02:44:54.790204Z | 2026-04-03T08:04:33Z |
| cleanstart-2026-dq17669 | Security fixes for CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-32287, CVE-2026-33186, CVE-2026-33762, CVE-2026-34165, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-fw7p-63qq-7hpr applied in versions: 1.13.2-r0, 1.14.1-r0, 1.14.1-r1 | 2026-04-06T02:45:34.659600Z | 2026-04-03T07:13:53Z |
| cleanstart-2026-ml41879 | Security fixes for CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-32287, CVE-2026-33186, CVE-2026-33762, CVE-2026-34165, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-fw7p-63qq-7hpr applied in versions: 1.13.2-r0, 1.14.0-r0, 1.14.0-r1, 1.14.1-r0 | 2026-04-06T02:45:36.057138Z | 2026-04-03T07:11:16Z |
| cleanstart-2026-nd57973 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:45:57.693609Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-lr09759 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T02:46:06.138686Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-li54613 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:45:58.881296Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-dm62512 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.35.0-r0 | 2026-04-06T02:48:21.440386Z | 2026-04-03T06:57:54Z |
| cleanstart-2026-lc01167 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-p77j-4mvh-x3m3 applied in versions: 8.4.0-r0, 8.4.0-r1, 8.4.0-r2 | 2026-04-06T02:48:42.431061Z | 2026-04-03T06:52:41Z |
| cleanstart-2026-gm09342 | Security fixes for CVE-2025-68121, CVE-2026-26958, ghsa-fw7p-63qq-7hpr, ghsa-mqqf-5wvp-8fh8 applied in versions: 0.29.0-r0, 0.29.0-r1 | 2026-04-06T02:48:25.848581Z | 2026-04-03T06:51:44Z |
| cleanstart-2026-hl08143 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:48:38.996528Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-gn22652 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-06T02:48:55.605608Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-dm25112 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:48:32.316783Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-ny32236 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:49:48.749661Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-io43826 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:49:47.698715Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-an95970 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T02:49:57.502118Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-ag21538 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:50:01.578746Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-ip72442 | Security fixes for CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-06T02:52:00.185166Z | 2026-04-01T14:41:16Z |
| cleanstart-2026-nb78893 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-64715, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, CVE-2026-33726 applied in versions: 0.13.3-r0, 0.13.3-r1 | 2026-04-06T02:52:24.792809Z | 2026-04-01T13:08:16Z |
| cleanstart-2026-mq18886 | Security fixes for CVE-2026-22735, CVE-2026-22737 applied in versions: 6.2.3-r0 | 2026-04-06T02:52:03.544300Z | 2026-04-01T11:39:45Z |
| ID | Description | Updated |
|---|---|---|
| ts-2023-001 | TS-2023-001 | 2023-01-17T00:00 |
| ts-2022-005 | TS-2022-005 | 2022-11-21T00:00 |
| ts-2022-004 | TS-2022-004 | 2022-11-21T00:00 |
| ts-2022-003 | TS-2022-003 | 2022-06-14T00:00 |
| ts-2022-002 | TS-2022-002 | 2022-05-11T00:00 |
| ts-2022-001 | TS-2022-001 | 2022-02-07T00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-ale-001 | [Mà J] Vulnérabilité dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| CERTFR-2025-ALE-002 | [Mà J] Vulnérabilité dans les produits Fortinet | 2025-05-07T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| CERTFR-2025-ALE-001 | [Mà J] Vulnérabilité dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| certfr-2024-ale-014 | [Mà J] Multiples vulnérabilités dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-ale-013 | Exploitations de vulnƩrabilitƩs dans Ivanti Cloud Services Appliance (CSA) | 2025-03-31T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| CERTFR-2024-ALE-014 | [Mà J] Multiples vulnérabilités dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| CERTFR-2024-ALE-013 | Exploitations de vulnƩrabilitƩs dans Ivanti Cloud Services Appliance (CSA) | 2025-03-31T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| certfr-2024-ale-015 | [Mà J] Multiples vulnérabilités sur l'interface d'administration des équipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| CERTFR-2024-ALE-015 | [Mà J] Multiples vulnérabilités sur l'interface d'administration des équipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-ale-012 | [Mà J] Vulnérabilités affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-011 | VulnƩrabilitƩ dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| CERTFR-2024-ALE-012 | [Mà J] Vulnérabilités affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| CERTFR-2024-ALE-011 | VulnƩrabilitƩ dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-010 | Multiples vulnƩrabilitƩs dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| certfr-2024-ale-009 | VulnƩrabilitƩ dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| CERTFR-2024-ALE-010 | Multiples vulnƩrabilitƩs dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| CERTFR-2024-ALE-009 | VulnƩrabilitƩ dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| certfr-2024-ale-008 | [Mà J] Vulnérabilité dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-007 | Multiples vulnƩrabilitƩs dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-006 | [Mà J] Vulnérabilité dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-004 | [Mà J] Vulnérabilité dans Fortinet FortiOS | 2024-02-09T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-008 | [Mà J] Vulnérabilité dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-007 | Multiples vulnƩrabilitƩs dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-006 | [Mà J] Vulnérabilité dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| CERTFR-2024-ALE-004 | [Mà J] Vulnérabilité dans Fortinet FortiOS | 2024-02-09T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-005 | [Mà J] Vulnérabilité dans Microsoft Outlook | 2024-02-15T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-003 | [MĆ J] Incident affectant les solutions AnyDesk | 2024-02-05T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-001 | [Mà J] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| CERTFR-2024-ALE-005 | [Mà J] Vulnérabilité dans Microsoft Outlook | 2024-02-15T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| CERTFR-2024-ALE-003 | [MĆ J] Incident affectant les solutions AnyDesk | 2024-02-05T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0400 | VulnƩrabilitƩ dans Fortinet FortiClientEMS | 2026-04-07T00:00:00.000000 | 2026-04-07T00:00:00.000000 |
| certfr-2026-avi-0399 | Multiples vulnƩrabilitƩs dans Google Android | 2026-04-07T00:00:00.000000 | 2026-04-07T00:00:00.000000 |
| certfr-2026-avi-0398 | Multiples vulnƩrabilitƩs dans le noyau Linux de SUSE | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0397 | Multiples vulnƩrabilitƩs dans le noyau Linux d'Ubuntu | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0396 | Multiples vulnƩrabilitƩs dans le noyau Linux de Red Hat | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0395 | Multiples vulnƩrabilitƩs dans les produits IBM | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0394 | Multiples vulnƩrabilitƩs dans VMware Tanzu | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0393 | VulnƩrabilitƩ dans Synology Mail Station | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0392 | Multiples vulnƩrabilitƩs dans Microsoft Edge | 2026-04-03T00:00:00.000000 | 2026-04-03T00:00:00.000000 |
| certfr-2026-avi-0391 | Multiples vulnƩrabilitƩs dans OpenSSH | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0390 | Multiples vulnƩrabilitƩs dans Belden NetModule Router Software | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0389 | VulnƩrabilitƩ dans Microsoft Azure Linux | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0388 | Multiples vulnƩrabilitƩs dans les produits Cisco | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0387 | Multiples vulnƩrabilitƩs dans les produits Netgate | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0386 | Multiples vulnƩrabilitƩs dans les produits Microsoft | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0385 | Multiples vulnƩrabilitƩs dans Google Chrome | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0384 | Multiples vulnƩrabilitƩs dans Joomla! | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0383 | Multiples vulnƩrabilitƩs dans Sonicwall Email Security | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0382 | Multiples vulnƩrabilitƩs dans les produits FoxIT | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0381 | Multiples vulnƩrabilitƩs dans les produits Microsoft | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0380 | Multiples vulnƩrabilitƩs dans Microsoft Edge | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0379 | VulnƩrabilitƩ dans Elastic OpenTelemetry Java | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0378 | VulnƩrabilitƩ dans Symantec Data Loss Prevention (DLP) | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0377 | Multiples vulnƩrabilitƩs dans Papercut | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0376 | Multiples vulnƩrabilitƩs dans les produits Microsoft | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| certfr-2026-avi-0375 | Multiples vulnƩrabilitƩs dans Microsoft Edge | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| certfr-2026-avi-0374 | VulnƩrabilitƩ dans Docker Desktop | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| certfr-2026-avi-0372 | Multiples vulnƩrabilitƩs dans les produits IBM | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0371 | Multiples vulnƩrabilitƩs dans le noyau Linux d'Ubuntu | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0370 | Multiples vulnƩrabilitƩs dans le noyau Linux de Red Hat | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-000036 | Improper file access permission settings in multiple Digital Arts products | 2026-03-09T14:57+09:00 | 2026-03-09T16:23+09:00 |
| jvndb-2026-000035 | Installer for Qsee Client may insecurely load Dynamic Link Libraries | 2026-03-09T14:57+09:00 | 2026-03-09T14:57+09:00 |
| jvndb-2026-006102 | Security issues in ESC/POS | 2026-03-06T10:31+09:00 | 2026-03-06T10:31+09:00 |
| jvndb-2026-000034 | django-allauth vulnerable to open redirect | 2026-03-05T12:36+09:00 | 2026-03-05T12:36+09:00 |
| jvndb-2026-000033 | EC-CUBE vulnerable to multi-factor authentication bypass | 2026-03-05T12:36+09:00 | 2026-03-05T12:36+09:00 |
| jvndb-2026-000032 | Multiple vulnerabilities in Dell UPS Multi-UPS Management Console (MUMC) | 2026-03-04T12:20+09:00 | 2026-03-04T12:20+09:00 |
| jvndb-2026-005746 | Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (February 2026) | 2026-03-04T10:40+09:00 | 2026-03-04T10:40+09:00 |
| jvndb-2026-005744 | Canon IJ Scan Utility registers Windows services with unquoted file paths | 2026-03-04T10:40+09:00 | 2026-03-04T10:40+09:00 |
| jvndb-2026-000030 | IM-LogicDesigner module of intra-mart Accel Platform vulnerable to untrusted data deserialization | 2026-02-27T15:41+09:00 | 2026-03-03T10:06+09:00 |
| jvndb-2026-005259 | Out-of-bounds write vulnerability in Fujitsu BIOS Driver (fbiosdrv.sys) | 2026-03-02T11:46+09:00 | 2026-03-02T11:46+09:00 |
| jvndb-2026-000031 | Improper file access permission settings in the installers for multiple Soliton Systems products | 2026-02-27T15:41+09:00 | 2026-02-27T15:41+09:00 |
| jvndb-2026-000029 | Multiple vulnerabilities in the installer of FinalCode Client | 2026-02-26T14:24+09:00 | 2026-02-26T14:24+09:00 |
| jvndb-2026-004811 | Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager | 2026-02-26T11:02+09:00 | 2026-02-26T11:02+09:00 |
| jvndb-2026-004810 | Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager | 2026-02-26T11:02+09:00 | 2026-02-26T11:02+09:00 |
| jvndb-2026-000026 | Lanscope Endpoint Manager (On-Premises) vulnerable to path traversal | 2026-02-25T15:14+09:00 | 2026-02-25T15:14+09:00 |
| jvndb-2026-004359 | Security information for Hitachi Disk Array Systems | 2026-02-20T18:35+09:00 | 2026-02-20T18:35+09:00 |
| jvndb-2026-000027 | WordPress Plugin "Survey Maker" vulnerable to cross-site scripting | 2026-02-20T12:32+09:00 | 2026-02-20T12:32+09:00 |
| jvndb-2026-000028 | Installer for Job log aggregation/analysis software RICOH Job Log Aggregation Tool may insecurely load Dynamic Link Libraries | 2026-02-20T12:31+09:00 | 2026-02-20T12:31+09:00 |
| jvndb-2026-003912 | Vulnerability in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003911 | Vulnerability in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003910 | Multiple Vulnerabilities in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003909 | Multiple Vulnerabilities in Hitachi Command Suite products | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003908 | Multiple Vulnerabilities in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003907 | Multiple Vulnerabilities in JP1 | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003906 | Multiple Vulnerabilities in Cosminexus | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003905 | Multiple Vulnerabilities in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-000025 | Joomla! CMS vulnerable to cross-site scripting | 2026-02-17T12:46+09:00 | 2026-02-17T12:46+09:00 |
| jvndb-2026-000023 | FileZen vulnerable to OS command injection | 2026-02-13T16:51+09:00 | 2026-02-13T17:08+09:00 |
| jvndb-2026-000024 | Installer of M-Audio M-Track Duo HD may insecurely load Dynamic Link Libraries | 2026-02-12T13:32+09:00 | 2026-02-12T13:32+09:00 |
| jvndb-2026-000022 | Oki Electric Industry products and OEM products register Windows services with unquoted file paths | 2026-02-09T15:21+09:00 | 2026-02-09T15:21+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-16049 | OpenClawååØęŖęę¼ę“ļ¼CNVD-2026-16049ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16048 | OpenClawååØęŖęę¼ę“ļ¼CNVD-2026-16048ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16047 | OpenClaw代ē ę§č”ę¼ę“ļ¼CNVD-2026-16047ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16046 | OpenClawå½ä»¤ę§č”ę¼ę“ļ¼CNVD-2026-16046ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16045 | OpenClawå®å Øē»čæę¼ę“ļ¼CNVD-2026-16045ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16044 | OpenClawęä½ē³»ē»å½ä»¤ę³Øå „ę¼ę“ļ¼CNVD-2026-16044ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16043 | OpenClawęä½ē³»ē»å½ä»¤ę³Øå „ę¼ę“ļ¼CNVD-2026-16043ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16042 | OpenClawč·Æå¾éåę¼ę“ļ¼CNVD-2026-16042ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16041 | OpenClaw访é®ę§å¶é误ę¼ę“ļ¼CNVD-2026-16041ļ¼ | 2026-03-26 | 2026-04-03 |
| cnvd-2026-16040 | OpenClawč·Æå¾éåę¼ę“ļ¼CNVD-2026-16040ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16039 | WordPressęä»¶Addon Jobsearch Chatč·Øē«čę¬ę¼ę“ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16038 | Linux kernelå åé误å¼ēØę¼ę“ļ¼CNVD-2026-16038ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16037 | FreeBSDē¼å²åŗęŗ¢åŗę¼ę“ļ¼CNVD-2026-16037ļ¼ | 2026-03-31 | 2026-04-03 |
| cnvd-2026-16036 | Linux kernelåééę¾ę¼ę“ļ¼CNVD-2026-16036ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16035 | FreeRDPęē»ęå”ę¼ę“ļ¼CNVD-2026-16035ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16034 | FreeRDPč¶ē读åę¼ę“ļ¼CNVD-2026-16034ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16033 | FreeRDPå ē¼å²åŗęŗ¢åŗę¼ę“ļ¼CNVD-2026-16033ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16032 | FreeRDPåééę¾ę¼ę“ļ¼CNVD-2026-16032ļ¼ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-16031 | OpenBaoęęé®é¢ę¼ę“ | 2026-04-02 | 2026-04-03 |
| cnvd-2026-15865 | Delta Electronics COMMGR2å ę ē¼å²åŗęŗ¢åŗę¼ę“ | 2026-03-16 | 2026-04-02 |
| cnvd-2026-15864 | Delta Electronics COMMGR2ęē»ęå”ę¼ę“ | 2026-03-16 | 2026-04-02 |
| cnvd-2026-15863 | Advantech WISE-6610ęä½ē³»ē»å½ä»¤ę³Øå „ę¼ę“ | 2026-02-25 | 2026-04-02 |
| cnvd-2026-15862 | ZTE ZXCDN StrutsčæēØä»£ē ę§č”ę¼ę“ | 2025-10-17 | 2026-04-02 |
| cnvd-2026-15861 | ZTE ElasticNet UME R32 on Linuxęéē®”ēäøå½ę¼ę“ | 2025-11-28 | 2026-04-02 |
| cnvd-2026-15860 | Canva Affinityč¶ē读åę¼ę“ļ¼CNVD-2026-15860ļ¼ | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15859 | Canva Affinityč¶ē读åę¼ę“ļ¼CNVD-2026-15859ļ¼ | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15858 | Canva Affinityč¶ē读åę¼ę“ļ¼CNVD-2026-15858ļ¼ | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15857 | Canva Affinityē±»åę··ę·ę¼ę“ | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15856 | Canva Affinityč¶ē读åę¼ę“ļ¼CNVD-2026-15856ļ¼ | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15855 | Canva Affinityč¶ē读åę¼ę“ļ¼CNVD-2026-15855ļ¼ | 2026-03-26 | 2026-04-02 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01814 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Microsoft ACI Confidential Containers, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Ń Ń⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01813 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Azure IoT Explorer, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń ŠæŃŠøŠ²Ńзкой Šŗ Š¾ŃŠŗŃŃŃŃŠ¼ ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01812 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŠ¾ŃŃŠ¾Š²Š¾Š³Š¾ ŃŠµŃŠ²ŠµŃŠ° Microsoft Exchange Server, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š¾ŃŠøŠ±ŠŗŠ°Š¼Šø ŠæŃŠµŠ“ŃŃŠ°Š²Š»ŠµŠ½Šøā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01811 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ»ŃŠ¶Š±Ń Š°Š½Š°Š»ŠøŃŠøŠŗŠø ГаннŃŃ Azure HDInsights, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š½ŠµŠæŃŠøŠ½ŃŃŠøŠµŠ¼ Š¼ŠµŃ ŠæŠ¾ Š·Š°ŃŠøŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01810 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠµŠ“Š°ŠŗŃŠ¾Ńа ŃŠ»ŠµŠŗŃŃŠ¾Š½Š½ŃŃ ŃŠ°Š±Š»ŠøŃ Microsoft Excel ŠæŠ°ŠŗŠµŃŠ¾Š² ŠæŃŠ¾Š³Ńамм Microsoft Office⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01809 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ»ŃŠ¶Š±Ń Ń ŃŠ°Š½ŠøŠ»ŠøŃа ГаннŃŃ Windows Storage Services Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01808 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠµŠ°Š»ŠøŠ·Š°ŃŠøŠø ŠæŃŠ¾Ńокола NTLM Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01807 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠøŃŃŠµŠ¼Ń Š°ŠæŠæŠ°ŃŠ°Ńной виŃŃŃŠ°Š»ŠøŠ·Š°ŃŠøŠø Hyper-V Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Windows, позволŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01806 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¼ŠµŃ Š°Š½ŠøŠ·Š¼Š° CCF (Cluster Client Failover) Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01805 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š“ŃŠ°Š¹Š²ŠµŃа HTTP.sys Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01804 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ ŃŠ²Š¾Šø ŠæŃŠøŠ²ŠøŠ»ŠµŠ³ŠøŠø | 16.02.2026 | 16.02.2026 |
| bdu:2026-01803 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š“ŃŠ°Š¹Š²ŠµŃа WinSock Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01802 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ ŃŠ²Š¾Šø ŠæŃŠøŠ²ŠøŠ»ŠµŠ³ŠøŠø | 16.02.2026 | 16.02.2026 |
| bdu:2026-01801 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š“ŃŠ°Š¹Š²ŠµŃа HTTP.sys Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01800 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŠæŠ¾Š²ŃŃŠøŃŃ ŃŠ²Š¾Šø ŠæŃŠøŠ²ŠøŠ»ŠµŠ³ŠøŠø | 16.02.2026 | 16.02.2026 |
| bdu:2026-01799 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°ŃионнŃŃ ŃŠøŃŃŠµŠ¼ Windows, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń ŃŠ°ŃŠŗŃŃŃŃ Š·Š°ŃŠøŃаемŃŃ Šøā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01798 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³ŃŠ°Š¼Š¼Ń Š“Š»Ń ŃŠøŃŃŠ¾Š²Š°Š½ŠøŃ ŠøŠ½ŃŠ¾ŃŠ¼Š°ŃŠøŠø Šø ŃŠ¾Š·Š“Š°Š½ŠøŃ ŃŠ»ŠµŠŗŃŃŠ¾Š½Š½ŃŃ ŃŠøŃŃŠ¾Š²ŃŃ ŠæŠ¾Š“ŠæŠøŃŠµŠ¹ G⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01797 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø _bfd_elf_slurp_version_tables() ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° bfd/elf.c ŠæŃŠ¾Š³Ńаммного ŃŃŠµŠ“⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01796 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° libbfd.c ŠæŃŠ¾Š³Ńаммного ŃŃŠµŠ“ŃŃŠ²Š° ŃŠ°Š·ŃŠ°Š±Š¾ŃŠŗŠø GNU Binutils, позволŃŃŃŠ°Ń⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01795 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного ŃŃŠµŠ“ŃŃŠ²Š° ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ ŠŗŠ¾Š½ŠµŃŠ½Ńми ŃŠ¾Ńками Ivanti Endpoint Manager, ŃŠ²ā¦ | 16.02.2026 | 16.02.2026 |
| bdu:2026-01794 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø usbg_make_tpg() Š¼Š¾Š“ŃŠ»Ń drivers/usb/gadget/function/f_tcm.c Š“ŃŠ°Š¹Š²ŠµŃа га⦠| 16.02.2026 | 16.02.2026 |
| bdu:2026-01792 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного ŃŃŠµŠ“ŃŃŠ²Š° Š»Š¾ŠŗŠ°Š»ŃŠ½Š¾Š¹ инŃŃŠ°ŃŃŃŃŠŗŃŃŃŃ Azure Local, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š¾ŃŠøŠ±ŠŗŠ°ā¦ | 13.02.2026 | 16.02.2026 |
| bdu:2026-01727 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø Š¾ŃŠµŠ½ŠŗŠø ŠøŠ·Š±ŠøŃŠ°ŃŠµŠ»ŃŠ½Š¾ŃŃŠø ŃŠ°ŃŃŠøŃŠµŠ½ŠøŃ Intarray ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø Г⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01726 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŃŠ½ŠŗŃŠøŠø Š¾Š±ŃŠ°Š±Š¾ŃŠŗŠø ŃŠøŠæŠ¾Š² ГаннŃŃ oidvector ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø ГаннŃŃ Post⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01724 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° pg_trgm ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø ГаннŃŃ PostgreSQL, позволŃŃŃŠ°Ń на⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01723 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø ГаннŃŃ PostgreSQL, ŃŠ²ŃŠ·Š°Š½Š½Š°Ń Ń Š½ŠµŠ²ŠµŃŠ½Ńм ŠøŠ½Š“ŠµŠŗŃŠøŃован⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01722 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° pgcrypto ŃŠøŃŃŠµŠ¼Ń ŃŠæŃŠ°Š²Š»ŠµŠ½ŠøŃ Š±Š°Š·Š°Š¼Šø ГаннŃŃ PostgreSQL, позволŃŃŃŠ°Ń н⦠| 11.02.2026 | 16.02.2026 |
| bdu:2026-01017 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Linux, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń Š²ŃŠæŠ¾Š»Š½ŠøŃŃ ŠæŃŠ¾ŠøŠ·Š²Š¾Š»ŃŠ½ŃŠ¹ коГ | 30.01.2026 | 16.02.2026 |
| bdu:2025-15831 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠæŃŠ¾Š³Ńаммного Š¾Š±ŠµŃŠæŠµŃŠµŠ½ŠøŃ Š“Š»Ń Š½Š°ŃŃŃŠ¾Š¹ŠŗŠø Š±ŠµŠ·Š¾ŠæŠ°ŃŠ½Š¾ŃŃŠø astra-safepolicy, ŃŠ²Ńзанна⦠| 15.12.2025 | 16.02.2026 |
| bdu:2025-15830 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ ŠŗŠ¾Š¼ŠæŠ¾Š½ŠµŠ½ŃŠ° net ŃŠ“ŃŠ° Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Linux, позволŃŃŃŠ°Ń наŃŃŃŠøŃŠµŠ»Ń Š²ŃŠ·Š²Š°ŃŃ⦠| 15.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202001-0832 | A Buffer Overflow vulnerability exists in the Message Server service _MsJ2EE_AddStatistic⦠| 2024-07-23T22:37:43.319000Z |
| var-201208-0222 | Multiple stack-based buffer overflows in msg_server.exe in SAP NetWeaver ABAP 7.x allow r⦠| 2024-07-23T22:37:43.393000Z |
| var-202108-1148 | An access issue was addressed with improved access restrictions. This issue is fixed in m⦠| 2024-07-23T22:36:01.656000Z |
| var-200202-0006 | Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause⦠| 2024-07-23T22:34:48.127000Z |
| var-202007-0395 | Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities ⦠| 2024-07-23T22:33:57.481000Z |
| var-201805-1147 | WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length heap buffe⦠| 2024-07-23T22:32:10.966000Z |
| var-201902-0647 | LCDS Laquis SCADA prior to version 4.1.0.4150 allows execution of script code by opening ⦠| 2024-07-23T22:32:09.990000Z |
| var-201908-0863 | Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE⦠| 2024-07-23T22:30:33.144000Z |
| var-201912-0120 | A memory corruption issue was addressed with improved validation. This issue is fixed in ⦠| 2024-07-23T22:30:32.761000Z |
| var-201912-0114 | A memory corruption issue was addressed with improved validation. This issue is fixed in ⦠| 2024-07-23T22:30:32.792000Z |
| var-202305-1589 | D-Link DIR-2150 SetSysEmailSettings EmailTo Command Injection Remote Code Execution Vulne⦠| 2024-07-23T22:30:26.856000Z |
| var-202407-0235 | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can res⦠| 2024-07-23T22:30:24.825000Z |
| var-202407-0234 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data ⦠| 2024-07-23T22:30:24.699000Z |
| var-202407-0233 | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data ⦠| 2024-07-23T22:30:24.731000Z |
| var-202407-0232 | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can res⦠| 2024-07-23T22:30:24.657000Z |
| var-201112-0097 | Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 a⦠| 2024-07-23T22:29:05.132000Z |
| var-201801-0152 | An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions pri⦠| 2024-07-23T22:28:30.754000Z |
| var-201801-0151 | A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior ⦠| 2024-07-23T22:28:30.640000Z |
| var-201807-0341 | ABB Panel Builder 800 all versions has an improper input validation vulnerability which m⦠| 2024-07-23T22:28:27.949000Z |
| var-201806-1058 | Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices befo⦠| 2024-07-23T22:28:27.641000Z |
| var-201906-1029 | In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulne⦠| 2024-07-23T22:28:26.009000Z |
| var-202004-0077 | There are multiple ways an unauthenticated attacker could perform SQL injection on WebAcc⦠| 2024-07-23T22:28:24.545000Z |
| var-202206-2050 | The affected product is vulnerable to multiple SQL injections, which may allow an unautho⦠| 2024-07-23T22:27:49.515000Z |
| var-202305-1981 | D-Link DIR-2150 SetSysEmailSettings AccountName Command Injection Remote Code Execution V⦠| 2024-07-23T22:27:44.287000Z |
| var-202305-0214 | D-Link DIR-2640 HNAP LoginPassword Authentication Bypass Vulnerability. This vulnerabilit⦠| 2024-07-23T22:27:44.496000Z |
| var-202305-0130 | D-Link DIR-2640 EmailFrom Command Injection Remote Code Execution Vulnerability. This vul⦠| 2024-07-23T22:27:44.522000Z |
| var-202407-0441 | A vulnerability has been identified in SIMATIC PCS 7 V9.1 (All versions), SIMATIC WinCC R⦠| 2024-07-23T22:27:41.577000Z |
| var-201105-0156 | Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 30⦠| 2024-07-23T22:25:52.955000Z |
| var-201402-0028 | The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when Uni⦠| 2024-07-23T22:25:48.624000Z |
| var-201402-0027 | The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows re⦠| 2024-07-23T22:25:48.742000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2022-046 | PHOENIX CONTACT: Multiple Linux component vulnerabilities in PLCnext Firmware | 2022-11-10T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-026 | PHOENIX CONTACT: Vulnerability in ProConOS/ProConOS eCLR SDK and MULTIPROG Engineering tool | 2022-06-21T05:16:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-025 | PHOENIX CONTACT: Vulnerability in classic line industrial controllers | 2022-06-21T05:15:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-014 | PHOENIX CONTACT: mGuard Device Manager affected by HTTP Request Smuggling of Apache Webserver | 2022-04-12T06:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-010 | PHOENIX CONTACT: Multiple Linux component vulnerabilities fixed in latest AXC F x152 LTS release | 2022-04-12T06:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-007 | PHOENIX CONTACT: Path Traversal in Library of PLCnext Technology Toolchain and FL Network Manager | 2022-03-22T07:43:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2022-005 | PHOENIX CONTACT: Vulnerabilities in XML parser library Expat (libexpat) | 2022-03-30T07:30:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-059 | PHOENIX CONTACT: BLUEMARK X1 / LED / CLED printers utilizing the Siemens Nucleus RTOS TCP/IP Stack | 2022-01-11T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-056 | WAGO: Multiple Vulnerabilities in CODESYS Runtime 2.3 and WebVisualisation | 2021-11-16T14:11:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-052 | PHOENIX CONTACT: PC Worx/-Express prone to improper input validation vulnerability | 2021-11-03T09:45:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-035 | PHOENIX CONTACT: FL MGUARD DM version 1.12.0 and 1.13.0 Improper Privilege Management | 2021-08-11T07:59:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2021-032 | PHOENIX CONTACT: Niche Ethernet Stack for ILC1x0, ILC1x1 and AXC 1050 Industrial controllers and CHARX control DC | 2021-08-04T07:57:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-026 | PHOENIX CONTACT: Denial-of-Service vulnerabilty in Emalytics, ILC 2050 BI and ILC 2050 BI-L | 2020-08-20T07:11:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-012 | PHOENIX CONTACT: Local Privilege Escalation in PC WORX SRT | 2020-03-27T09:47:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2020-001 | PHOENIX CONTACT: Emalytics Controller ILC 2050 BI(L) allows unauthorised read and write access to the configuration file | 2020-02-17T08:10:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-020 | PHOENIX CONTACT: improper access control exists on FL NAT devices when using MAC-based port security | 2019-10-29T10:56:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2019-009 | PHOENIX CONTACT: Multiple Vulnerabilities in AXC F 2152 | 2019-06-04T10:22:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2018-007 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series - Stack-based Buffer Overflow in shared object file | 2018-05-16T10:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2017-002 | PHOENIX CONTACT: mGuard device manager (mdm) multiple vulnerabilities in Java SE | 2017-09-07T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2017-001 | PHOENIX CONTACT: mGuard IKE daemon remote denial of service | 2017-03-07T11:05:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2023-003 | PHOENIX CONTACT: Multiple vulnerabilities in ENERGY AXC PU | 2023-03-14T09:14:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-058 | PHOENIX CONTACT: Profinet SDK libexpat vulnerabilities | 2022-12-13T07:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-053 | PHOENIX CONTACT: Advisory for TC ROUTER and CLOUD CLIENT | 2023-03-07T07:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-048 | PHOENIX CONTACT: Automationworx BCP File Parsing Vulnerabilities | 2022-11-15T09:25:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-028 | PHOENIX CONTACT: Missing Authentication in ProConOS/ProConOS eCLR SDK and MULTIPROG Engineering tool | 2022-06-21T05:18:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2022-013 | PHOENIX CONTACT: Multiple products affected by possible infinite loop within OpenSSL library | 2022-04-12T06:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2019-001 | PHOENIX CONTACT: Multiple Vulnerabilities in FL SWITCH 3xxx, 4xxx and 48xx | 2019-01-23T12:02:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2018-006 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 has a Stack-based Buffer Overflow | 2018-05-16T10:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2025-005 | Phoenix Contact: Security Advisory for ESL Stick USB-A | 2025-01-14T11:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-070 | Phoenix Contact: Security Advisory for CHARX-SEC3xxx Charge controllers | 2025-01-14T11:00:00.000Z | 2025-05-14T13:00:14.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2018-009 | Pepperl+Fuchs: Security advisory for MELTDOWN and SPECTRE attacks in ecom mobile Devices | 2018-07-06T14:47:00.000Z | 2018-10-23T10:00:00.000Z |
| vde-2017-005 | Pepperl+Fuchs / ecom instruments: WLAN enabled products utilizing WPA2 encryption | 2017-12-11T13:26:00.000Z | 2018-10-23T10:00:00.000Z |
| vde-2018-008 | Pepperl+Fuchs: Remote Code Execution Vulnerability in HMI Devices | 2018-07-06T13:37:00.000Z | 2018-07-06T13:37:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2020-036 | WAGO: Multiple Vulnerabilities in I/O-Check Service | 2021-06-29T10:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2020-044 | WAGO: Web-Based Management Authentication Vulnerability in WAGO 750-36X and WAGO 750-8XX | 2021-08-31T07:01:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-042 | WAGO: PLC families 750-88x and 750-352 prone to DoS attack, versions < FW10 (Update A) | 2020-10-27T10:28:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-029 | WAGO: XSS vulnerability in Web-UI in WAGO 750-88X and WAGO 750-89X | 2020-09-30T11:11:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-028 | WAGO: Authentication Bypass Vulnerability in WAGO 750-36X and WAGO 750-8XX Version <= FW03 | 2020-09-30T11:08:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2020-004 | WAGO: e!Cockpit cleartext communication and hardcoded key | 2020-03-09T09:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-038 | WAGO: OpenSSL DoS Vulnerability in PLCs | 2021-08-31T07:00:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2020-045 | WAGO: Command Injection Vulnerability in I/O-Check Service of multiple products | 2020-12-17T09:02:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2020-008 | WAGO: Cloud Connectivity Multiple Vulnerabilities | 2020-03-09T09:15:00.000Z | 2025-05-14T12:53:43.000Z |
| vde-2025-009 | WAGO: Vulnerabilities in CODESYS Control V3 - OPC UA Stack | 2025-02-04T11:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-043 | WAGO: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT and WAGO-I/O-Pro | 2021-08-31T07:02:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-013 | WAGO: Multiple Vulnerabilities in the Web-Based Management Interface | 2021-05-05T08:54:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-032 | WAGO: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT | 2020-09-09T06:23:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-027 | WAGO: Vulnerability in web-based authentication in WAGO 750-8XX Version <= FW07 | 2020-09-30T11:06:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-020 | WAGO: PPPD in PFC100 and PFC200 Series is vulnerable to CVE-2020-8597 | 2020-06-10T10:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-006 | WAGO: Web-Based Management Authentication Vulnerabilities | 2020-03-09T11:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-017 | WAGO: Series PFC100/PFC200 Information Disclosure | 2019-09-18T11:25:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2023-046 | WAGO: Multiple products vulnerable to local file inclusion | 2023-10-23T10:00:00.000Z | 2025-04-28T10:00:00.000Z |
| vde-2025-007 | WAGO: Year 2038 problem | 2025-04-15T10:00:00.000Z | 2025-04-15T10:00:00.000Z |
| vde-2025-004 | Wago: Vulnerability in libwagosnmp | 2025-03-05T11:00:00.000Z | 2025-04-10T13:00:00.000Z |
| vde-2024-072 | WAGO: Vulnerabilities in CODESYS Control | 2024-12-03T11:00:00.000Z | 2024-12-03T11:00:00.000Z |
| vde-2023-042 | Wago: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT and WAGO-I/O-Pro (UPDATE B) | 2023-09-25T10:00:00.000Z | 2024-11-20T11:00:00.000Z |
| vde-2023-006 | WAGO: Controller with CODESYS 2.3 Runtime Denial-of-Service | 2023-06-25T06:00:00.000Z | 2024-07-08T10:00:00.000Z |
| vde-2024-021 | WAGO: Vulnerability in WAGO Navigator | 2024-05-21T06:00:00.000Z | 2024-05-21T06:00:00.000Z |
| vde-2023-068 | WAGO: Multiple Vulnerabilities in e!Cockpit and e!Runtime / CODESYS Runtime | 2024-05-21T06:00:00.000Z | 2024-05-21T06:00:00.000Z |
| vde-2023-039 | Wago: Multiple vulnerabilities in web-based management of multiple products | 2024-03-13T08:30:00.000Z | 2024-03-13T08:30:00.000Z |
| vde-2024-007 | WAGO: WIBU-SYSTEMS CodeMeter Runtime vulnerabilities in multiple products | 2024-01-22T07:00:00.000Z | 2024-01-22T07:00:00.000Z |
| vde-2023-045 | Wago: Vulnerability in Smart Designer Web-Application | 2023-12-05T07:00:00.000Z | 2023-12-05T07:00:00.000Z |
| vde-2023-044 | Wago: Vulnerabilities in IEC61850 Server / Telecontrol | 2023-12-05T07:00:00.000Z | 2023-12-05T07:00:00.000Z |
| vde-2023-037 | WAGO: Remote Code execution vulnerability in managed Switches | 2023-11-21T07:00:00.000Z | 2023-11-21T07:00:00.000Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2025-0037 |
7 (4.0)
|
Reflected XSS in MISP Dashboard Widgets via Unescaped ⦠|
misp |
misp |
2025-12-10T14:01:03.200804Z | 2025-12-10T14:01:03.200804Z |
| GCVE-1-2025-0036 |
8.3 (4.0)
|
A reflected cross-site scripting (XSS) vulnerability w⦠|
misp |
misp |
2025-12-10T13:46:07.170083Z | 2025-12-10T13:46:07.170083Z |
| GCVE-1-2025-0035 |
8.3 (4.0)
|
Insufficient sanitization of bundle metadata (availabl⦠|
CIRCL |
vulnerability-lookup |
2025-12-08T10:25:00.000Z | 2025-12-08T12:14:06.307298Z |
| GCVE-1-2025-0034 |
7 (4.0)
|
Missing CSRF protection on state-changing endpoints in⦠|
CIRCL |
vulnerability-lookup |
2025-12-08T10:19:00.000Z | 2025-12-08T12:13:24.197294Z |
| GCVE-1-2025-0033 |
8.1 (4.0)
|
Vulnerability-lookup did not track or limit failed One⦠|
CIRCL |
vulnerability-lookup |
2025-12-08T10:11:00.000Z | 2025-12-08T12:12:53.235996Z |
| GCVE-1-2025-0032 |
10 (4.0)
|
The default configuration of WatchGuard Firebox device⦠|
watchguard |
firebox |
2025-12-03T16:25:00.000Z | 2025-12-19T13:48:34.570799Z |
| GCVE-1-2025-0030 |
6.2 (4.0)
|
A cross-site scripting (XSS) vulnerability in the MISP⦠|
misp |
misp |
2025-12-03T10:53:00.000Z | 2025-12-03T10:58:55.845341Z |
| GCVE-1-2025-0019 |
4 (4.0)
|
Path traversal vulnerability in EventReport for site-admin |
misp |
misp |
2025-11-26T14:47:00.000Z | 2025-11-28T07:27:42.721350Z |
| GCVE-1-2025-0017 |
9.4 (4.0)
|
Privilege escalation in Cerebrate allows an authentica⦠|
cerebrate |
cerebrate |
2025-11-12T08:15:00.000Z | 2025-11-28T07:22:08.205835Z |
| GCVE-1-2025-0029 |
6.3 (4.0)
|
Reflected cross-site scripting (XSS) vulnerabilities i⦠|
misp |
misp |
2025-11-27T12:41:00.000Z | 2025-11-27T12:48:51.085860Z |
| GCVE-1-2025-0027 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in ⦠|
misp |
misp |
2025-11-27T07:17:00.000Z | 2025-12-02T08:51:04.323899Z |
| GCVE-1-2025-0028 |
8.5 (4.0)
|
Information leakage vulnerability in the MISP Feed con⦠|
misp |
misp |
2025-11-27T07:23:00.000Z | 2025-12-02T08:51:35.429494Z |
| GCVE-1-2025-0026 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in ⦠|
misp |
misp |
2025-11-26T16:35:00.000Z | 2025-12-02T08:50:46.381572Z |
| GCVE-1-2025-0025 |
9.4 (4.0)
|
Reflected cross-site scripting (XSS) vulnerability in ⦠|
misp |
misp |
2025-11-26T16:27:00.000Z | 2025-12-02T08:50:18.897756Z |
| GCVE-1-2025-0024 |
9.4 (4.0)
|
cross-site scripting (XSS) vulnerability in the MISP s⦠|
misp |
misp |
2025-11-26T16:14:00.000Z | 2025-12-02T08:50:01.482327Z |
| GCVE-1-2025-0023 |
9.4 (4.0)
|
XSS in MISP server comparison tool |
misp |
misp |
2025-11-26T16:10:00.000Z | 2025-12-02T08:49:24.626168Z |
| GCVE-1-2025-0022 |
9.4 (4.0)
|
Clarified setting's impact on download_attachments_on_load |
misp |
misp |
2025-11-26T16:04:00.000Z | 2025-12-02T08:49:04.510294Z |
| GCVE-1-2025-0021 |
9.4 (4.0)
|
XSS in MISP ReST client in HTML view |
misp |
misp |
2025-11-26T15:55:00.000Z | 2025-12-02T08:48:41.869838Z |
| GCVE-1-2025-0020 |
9.4 (4.0)
|
cross-site scripting (XSS) in Galaxy element JSON view |
misp |
misp |
2025-11-26T15:49:00.000Z | 2025-12-02T08:47:41.151429Z |
| GCVE-1-2025-0018 |
9.4 (4.0)
|
HTML injection issue was identified in Lookylooās web ⦠|
lookyloo |
lookyloo |
2025-11-18T15:33:00.000Z | 2025-11-18T20:39:45.579295Z |
| GCVE-1-2025-0016 |
6 (4.0)
|
Local file inclusion in [ImportFromUrl() URL hand⦠|
misp |
misp |
2025-11-04T09:20:00.000Z | 2025-11-04T09:56:38.383646Z |
| GCVE-1-2025-0015 |
9 (4.0)
|
Potential XSS in decaying simulation tool |
misp |
misp |
2025-11-04T09:06:00.000Z | 2025-11-04T09:06:59.216121Z |
| GCVE-1-2025-0014 |
9.4 (4.0)
|
XSS in event report via Mermaid diagram |
misp |
misp |
2025-11-04T08:58:00.024516Z | 2025-11-04T08:58:00.024516Z |
| GCVE-1-2025-0013 |
9.4 (4.0)
|
Vulnerability in sharing group blueprints allowing sha⦠|
misp |
misp |
2025-11-04T08:49:21.558087Z | 2025-11-04T08:49:21.558087Z |
| GCVE-1-2025-0012 |
N/A
|
Potential vulnerability in file check upload but non-e⦠|
misp |
misp |
2025-11-04T07:20:00.000Z | 2025-11-28T07:16:21.589449Z |
| GCVE-1-2025-0011 |
9.4 (4.0)
|
Arbitrary file inclusion / deletion via import modules⦠|
misp |
misp |
2025-11-04T07:01:25.464225Z | 2025-11-04T07:01:25.464225Z |
| GCVE-1-2025-0010 |
6.3 (4.0)
|
Arbitrary file hash inclusion via templates accessible⦠|
misp |
misp |
2025-11-04T06:25:11.108987Z | 2025-11-04T06:25:11.108987Z |
| GCVE-1-2025-0009 |
6.4 (4.0)
|
A pre-auth user could self-assign a reporter without b⦠|
CIRCL |
vulnerability-lookup |
2025-10-13T09:20:24.800890Z | 2025-10-13T09:20:24.800890Z |