Recent vulnerabilities
Recent vulnerabilities from
Select from 70 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-5787 |
8.9 (3.1)
|
An Improper Certificate Validation in Ivanti EPMM… |
Ivanti |
Endpoint Manager Mobile |
2026-05-07T15:36:41.179Z | 2026-05-08T03:55:49.014Z |
| CVE-2026-42011 |
7.4 (3.1)
|
Gnutls: gnutls: security bypass due to incorrect name … |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-05-07T13:51:04.695Z | 2026-05-08T03:55:47.296Z |
| CVE-2026-41142 |
8.8 (3.1)
|
OpenEXR is Vulnerable to Integer overflow in ImageChan… |
AcademySoftwareFoundation |
openexr |
2026-05-07T03:58:09.483Z | 2026-05-08T03:55:43.209Z |
| CVE-2026-40171 |
8.4 (4.0)
|
Jupyter Notebook and JupyterLab token theft via stored… |
jupyter |
notebook |
2026-05-06T19:36:32.072Z | 2026-05-08T03:55:41.465Z |
| CVE-2026-5786 |
8.8 (3.1)
|
An Improper Access Control vulnerability in Ivant… |
Ivanti |
Endpoint Manager Mobile |
2026-05-07T15:18:54.437Z | 2026-05-08T03:55:39.897Z |
| CVE-2026-6973 |
7.2 (3.1)
|
An Improper Input Validation in Ivanti EPMM befor… |
Ivanti |
Endpoint Manager Mobile |
2026-05-07T15:21:24.849Z | 2026-05-08T03:55:38.232Z |
| CVE-2026-35397 |
7.6 (4.0)
|
jupyter-server path traversal allows access to sibling… |
jupyter-server |
jupyter_server |
2026-05-05T19:37:33.810Z | 2026-05-08T03:55:36.590Z |
| CVE-2026-42274 |
7.8 (4.0)
|
Heimdall: Authorization bypass via path normalization … |
dadrus |
heimdall |
2026-05-08T03:43:41.597Z | 2026-05-08T03:43:41.597Z |
| CVE-2026-41645 |
5.3 (3.1)
|
Nuclei: Environment variable disclosure via Response-D… |
projectdiscovery |
nuclei |
2026-05-08T03:17:19.302Z | 2026-05-08T03:17:19.302Z |
| CVE-2026-42261 |
7.1 (3.1)
|
PromptHub: Authenticated SSRF via IPv6 filter bypass i… |
legeling |
PromptHub |
2026-05-08T03:11:25.305Z | 2026-05-08T03:11:25.305Z |
| CVE-2026-43944 |
9.4 (4.0)
|
electerm: dangerous code can be run through links or c… |
electerm |
electerm |
2026-05-08T03:08:09.046Z | 2026-05-08T03:08:09.046Z |
| CVE-2026-2710 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-05-07T22:20:00.454Z | |
| CVE-2026-4878 |
6.7 (3.1)
|
Libcap: libcap: privilege escalation via toctou race c… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-09T14:49:02.942Z | 2026-05-07T21:33:20.039Z |
| CVE-2026-4775 |
7.8 (3.1)
|
Libtiff: libtiff: arbitrary code execution or denial o… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-03-24T14:42:47.529Z | 2026-05-07T21:24:46.165Z |
| CVE-2026-44365 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-34429. Reason: This candidate is a duplicate of CVE-2026-34429. Notes: All CVE users should reference CVE-2026-34429 instead of this candidate. | N/A | N/A | 2026-05-07T20:48:33.508Z | |
| CVE-2025-52479 |
7.7 (4.0)
|
HTTP.jl vulnerable to CR/LF Injection in URIs |
JuliaWeb |
HTTP.jl |
2025-06-25T16:06:45.402Z | 2026-05-07T20:47:37.830Z |
| CVE-2025-54369 |
9.3 (4.0)
|
Node-SAML SAML Authentication Bypass |
node-saml |
node-saml |
2025-12-12T23:03:52.427Z | 2026-05-07T20:46:21.508Z |
| CVE-2026-41905 |
7.7 (3.1)
|
FreeScout vulnerable to SSRF via Helper::sanitizeRemot… |
freescout-help-desk |
freescout |
2026-05-07T18:08:09.277Z | 2026-05-07T20:15:18.618Z |
| CVE-2026-6846 |
7.8 (3.1)
|
Binutils: binutils: arbitrary code execution via malfo… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-04-22T08:37:14.233Z | 2026-05-07T20:03:22.592Z |
| CVE-2026-41692 |
4.7 (3.1)
|
i18nextify is vulnerable to DOM XSS via javascript:/da… |
i18next |
i18nextify |
2026-05-07T20:01:59.272Z | 2026-05-07T20:01:59.272Z |
| CVE-2026-8086 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
OSGeo gdal SWapi.c SWnentries heap-based overflow |
OSGeo |
gdal |
2026-05-07T18:45:13.165Z | 2026-05-07T19:53:07.538Z |
| CVE-2025-14593 |
7.8 (3.1)
|
CATPART File Parsing Out-of-Bounds Read Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:31:35.368Z | 2026-05-07T19:41:57.554Z |
| CVE-2025-10900 |
7.8 (3.1)
|
MODEL File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:45:26.861Z | 2026-05-07T19:40:50.876Z |
| CVE-2025-10899 |
7.8 (3.1)
|
MODEL File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:45:00.819Z | 2026-05-07T19:40:25.329Z |
| CVE-2025-10898 |
7.8 (3.1)
|
MODEL File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:44:26.564Z | 2026-05-07T19:39:53.637Z |
| CVE-2026-42239 |
8.1 (3.1)
|
Budibase auth session cookies are set with httpOnly:fa… |
Budibase |
budibase |
2026-05-07T18:49:59.180Z | 2026-05-07T19:39:45.605Z |
| CVE-2025-10889 |
7.8 (3.1)
|
CATPART File Parsing Memory Corruption Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:43:57.696Z | 2026-05-07T19:39:29.209Z |
| CVE-2025-10888 |
7.8 (3.1)
|
MODEL File Parsing Out-of-Bounds Write Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:43:22.374Z | 2026-05-07T19:39:03.711Z |
| CVE-2025-10887 |
7.8 (3.1)
|
MODEL File Parsing Memory Corruption Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:42:44.395Z | 2026-05-07T19:38:36.933Z |
| CVE-2025-10886 |
7.8 (3.1)
|
MODEL File Parsing Memory Corruption Vulnerability |
Autodesk |
Shared Components |
2025-12-15T23:42:09.029Z | 2026-05-07T19:38:13.076Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-43237 |
7.8 (3.1)
|
drm/amdgpu: Refactor amdgpu_gem_va_ioctl for Handling … |
Linux |
Linux |
2026-05-06T11:28:32.300Z | 2026-05-08T12:41:30.455Z |
| CVE-2026-43236 |
7.8 (3.1)
|
drm/atmel-hlcdc: fix use-after-free of drm_crtc_commit… |
Linux |
Linux |
2026-05-06T11:28:31.543Z | 2026-05-08T12:41:29.330Z |
| CVE-2026-43233 |
8.2 (3.1)
|
netfilter: nf_conntrack_h323: fix OOB read in decode_c… |
Linux |
Linux |
2026-05-06T11:28:29.565Z | 2026-05-08T12:41:28.161Z |
| CVE-2026-43232 |
8.8 (3.1)
|
net: wan: farsync: Fix use-after-free bugs caused by u… |
Linux |
Linux |
2026-05-06T11:28:28.910Z | 2026-05-08T12:41:27.008Z |
| CVE-2026-43215 |
8.8 (3.1)
|
cifs: Fix locking usage for tcon fields |
Linux |
Linux |
2026-05-06T11:28:17.425Z | 2026-05-08T12:41:22.354Z |
| CVE-2026-43214 |
7.8 (3.1)
|
KVM: x86: Add SRCU protection for reading PDPTRs in __… |
Linux |
Linux |
2026-05-06T11:28:16.766Z | 2026-05-08T12:41:21.202Z |
| CVE-2026-43213 |
7.5 (3.1)
|
wifi: rtw89: pci: validate sequence number of TX relea… |
Linux |
Linux |
2026-05-06T11:28:15.998Z | 2026-05-08T12:41:20.045Z |
| CVE-2026-43212 |
7.8 (3.1)
|
LoongArch: Make cpumask_of_node() robust against NUMA_… |
Linux |
Linux |
2026-05-06T11:28:15.272Z | 2026-05-08T12:41:18.879Z |
| CVE-2026-43211 |
7.8 (3.1)
|
PCI: Fix pci_slot_trylock() error handling |
Linux |
Linux |
2026-05-06T11:28:14.423Z | 2026-05-08T12:41:17.709Z |
| CVE-2026-43208 |
9.8 (3.1)
|
net: do not pass flow_id to set_rps_cpu() |
Linux |
Linux |
2026-05-06T11:28:12.292Z | 2026-05-08T12:41:16.509Z |
| CVE-2026-43207 |
7.8 (3.1)
|
media: mtk-mdp: Fix error handling in probe function |
Linux |
Linux |
2026-05-06T11:28:11.601Z | 2026-05-08T12:41:15.360Z |
| CVE-2026-43206 |
7.8 (3.1)
|
drm/amdkfd: Fix out-of-bounds write in kfd_event_page_set() |
Linux |
Linux |
2026-05-06T11:28:10.937Z | 2026-05-08T12:41:14.026Z |
| CVE-2026-43203 |
7.5 (3.1)
|
atm: fore200e: fix use-after-free in tasklets during d… |
Linux |
Linux |
2026-05-06T11:28:08.949Z | 2026-05-08T12:41:12.811Z |
| CVE-2026-43199 |
7.5 (3.1)
|
net/mlx5e: Fix "scheduling while atomic" in IPsec MAC … |
Linux |
Linux |
2026-05-06T11:28:06.232Z | 2026-05-08T12:41:11.576Z |
| CVE-2026-43198 |
9.8 (3.1)
|
tcp: fix potential race in tcp_v6_syn_recv_sock() |
Linux |
Linux |
2026-05-06T11:28:05.569Z | 2026-05-08T12:41:10.445Z |
| CVE-2026-43197 |
9.1 (3.1)
|
netconsole: avoid OOB reads, msg is not nul-terminated |
Linux |
Linux |
2026-05-06T11:28:04.829Z | 2026-05-08T12:41:09.303Z |
| CVE-2026-43194 |
7.5 (3.1)
|
net: consume xmit errors of GSO frames |
Linux |
Linux |
2026-05-06T11:28:02.794Z | 2026-05-08T12:41:08.123Z |
| CVE-2026-43190 |
8.2 (3.1)
|
netfilter: xt_tcpmss: check remaining length before re… |
Linux |
Linux |
2026-05-06T11:27:59.798Z | 2026-05-08T12:41:06.952Z |
| CVE-2026-43187 |
8.8 (3.1)
|
xfs: delete attr leaf freemap entries when empty |
Linux |
Linux |
2026-05-06T11:27:57.727Z | 2026-05-08T12:41:05.734Z |
| CVE-2026-43186 |
9.8 (3.1)
|
ipv6: ioam: fix heap buffer overflow in __ioam6_fill_t… |
Linux |
Linux |
2026-05-06T11:27:57.053Z | 2026-05-08T12:41:04.575Z |
| CVE-2026-43185 |
9.8 (3.1)
|
ksmbd: fix signededness bug in smb_direct_prepare_nego… |
Linux |
Linux |
2026-05-06T11:27:56.386Z | 2026-05-08T12:41:03.371Z |
| CVE-2026-43184 |
7.5 (3.1)
|
rnbd-srv: Zero the rsp buffer before using it |
Linux |
Linux |
2026-05-06T11:27:55.672Z | 2026-05-08T12:41:02.015Z |
| CVE-2026-43180 |
7.8 (3.1)
|
net: usb: kaweth: remove TX queue manipulation in kawe… |
Linux |
Linux |
2026-05-06T11:27:52.983Z | 2026-05-08T12:41:00.768Z |
| CVE-2026-43178 |
7.8 (3.1)
|
procfs: fix possible double mmput() in do_procmap_query() |
Linux |
Linux |
2026-05-06T11:27:51.524Z | 2026-05-08T12:40:59.592Z |
| CVE-2026-43176 |
8.8 (3.1)
|
wifi: rtw89: pci: validate release report content befo… |
Linux |
Linux |
2026-05-06T11:27:50.150Z | 2026-05-08T12:40:58.471Z |
| CVE-2026-43172 |
8.8 (3.1)
|
wifi: iwlwifi: fix 22000 series SMEM parsing |
Linux |
Linux |
2026-05-06T11:27:47.358Z | 2026-05-08T12:40:57.330Z |
| CVE-2026-43166 |
7.1 (3.1)
|
erofs: fix interlaced plain identification for encoded… |
Linux |
Linux |
2026-05-06T11:27:43.242Z | 2026-05-08T12:40:56.151Z |
| CVE-2026-43164 |
7.5 (3.1)
|
udplite: Fix null-ptr-deref in __udp_enqueue_schedule_skb(). |
Linux |
Linux |
2026-05-06T11:27:41.928Z | 2026-05-08T12:40:55.002Z |
| CVE-2026-43158 |
8.8 (3.1)
|
xfs: fix freemap adjustments when adding xattrs to lea… |
Linux |
Linux |
2026-05-06T11:27:37.848Z | 2026-05-08T12:40:53.855Z |
| CVE-2026-43153 |
7.8 (3.1)
|
xfs: remove xfs_attr_leaf_hasname |
Linux |
Linux |
2026-05-06T11:27:34.446Z | 2026-05-08T12:40:52.696Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-43215 | In the Linux kernel, the following vulnerability has been resolved: cifs: Fix locking usage for tc… | 2026-05-06T12:16:41.063 | 2026-05-08T13:16:45.983 |
| fkie_cve-2026-43214 | In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Add SRCU protection … | 2026-05-06T12:16:40.920 | 2026-05-08T13:16:45.853 |
| fkie_cve-2026-43213 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: pci: validate seq… | 2026-05-06T12:16:40.803 | 2026-05-08T13:16:45.737 |
| fkie_cve-2026-43212 | In the Linux kernel, the following vulnerability has been resolved: LoongArch: Make cpumask_of_nod… | 2026-05-06T12:16:40.687 | 2026-05-08T13:16:45.620 |
| fkie_cve-2026-43211 | In the Linux kernel, the following vulnerability has been resolved: PCI: Fix pci_slot_trylock() er… | 2026-05-06T12:16:40.527 | 2026-05-08T13:16:45.480 |
| fkie_cve-2026-43208 | In the Linux kernel, the following vulnerability has been resolved: net: do not pass flow_id to se… | 2026-05-06T12:16:40.170 | 2026-05-08T13:16:45.370 |
| fkie_cve-2026-43207 | In the Linux kernel, the following vulnerability has been resolved: media: mtk-mdp: Fix error hand… | 2026-05-06T12:16:40.037 | 2026-05-08T13:16:45.247 |
| fkie_cve-2026-43206 | In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix out-of-bounds … | 2026-05-06T12:16:39.903 | 2026-05-08T13:16:45.117 |
| fkie_cve-2026-43203 | In the Linux kernel, the following vulnerability has been resolved: atm: fore200e: fix use-after-f… | 2026-05-06T12:16:39.477 | 2026-05-08T13:16:44.980 |
| fkie_cve-2026-43199 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix "scheduling whi… | 2026-05-06T12:16:38.970 | 2026-05-08T13:16:44.860 |
| fkie_cve-2026-43198 | In the Linux kernel, the following vulnerability has been resolved: tcp: fix potential race in tcp… | 2026-05-06T12:16:38.857 | 2026-05-08T13:16:44.747 |
| fkie_cve-2026-43197 | In the Linux kernel, the following vulnerability has been resolved: netconsole: avoid OOB reads, m… | 2026-05-06T12:16:38.740 | 2026-05-08T13:16:44.630 |
| fkie_cve-2026-43194 | In the Linux kernel, the following vulnerability has been resolved: net: consume xmit errors of GS… | 2026-05-06T12:16:38.310 | 2026-05-08T13:16:44.460 |
| fkie_cve-2026-43190 | In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_tcpmss: check re… | 2026-05-06T12:16:37.843 | 2026-05-08T13:16:44.320 |
| fkie_cve-2026-43187 | In the Linux kernel, the following vulnerability has been resolved: xfs: delete attr leaf freemap … | 2026-05-06T12:16:37.440 | 2026-05-08T13:16:43.083 |
| fkie_cve-2026-43186 | In the Linux kernel, the following vulnerability has been resolved: ipv6: ioam: fix heap buffer ov… | 2026-05-06T12:16:37.300 | 2026-05-08T13:16:42.557 |
| fkie_cve-2026-43185 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix signededness bug in… | 2026-05-06T12:16:37.187 | 2026-05-08T13:16:42.423 |
| fkie_cve-2026-43184 | In the Linux kernel, the following vulnerability has been resolved: rnbd-srv: Zero the rsp buffer … | 2026-05-06T12:16:37.053 | 2026-05-08T13:16:42.257 |
| fkie_cve-2026-43180 | In the Linux kernel, the following vulnerability has been resolved: net: usb: kaweth: remove TX qu… | 2026-05-06T12:16:36.533 | 2026-05-08T13:16:42.107 |
| fkie_cve-2026-43178 | In the Linux kernel, the following vulnerability has been resolved: procfs: fix possible double mm… | 2026-05-06T12:16:36.303 | 2026-05-08T13:16:42.000 |
| fkie_cve-2026-43176 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: pci: validate rel… | 2026-05-06T12:16:36.083 | 2026-05-08T13:16:41.887 |
| fkie_cve-2026-43172 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix 22000 serie… | 2026-05-06T12:16:35.583 | 2026-05-08T13:16:41.783 |
| fkie_cve-2026-43166 | In the Linux kernel, the following vulnerability has been resolved: erofs: fix interlaced plain id… | 2026-05-06T12:16:34.800 | 2026-05-08T13:16:41.670 |
| fkie_cve-2026-43164 | In the Linux kernel, the following vulnerability has been resolved: udplite: Fix null-ptr-deref in… | 2026-05-06T12:16:34.540 | 2026-05-08T13:16:41.527 |
| fkie_cve-2026-43158 | In the Linux kernel, the following vulnerability has been resolved: xfs: fix freemap adjustments w… | 2026-05-06T12:16:33.697 | 2026-05-08T13:16:41.373 |
| fkie_cve-2026-43153 | In the Linux kernel, the following vulnerability has been resolved: xfs: remove xfs_attr_leaf_hasn… | 2026-05-06T12:16:33.073 | 2026-05-08T13:16:41.260 |
| fkie_cve-2026-43150 | In the Linux kernel, the following vulnerability has been resolved: perf/arm-cmn: Reject unsupport… | 2026-05-06T12:16:32.690 | 2026-05-08T13:16:41.130 |
| fkie_cve-2026-43139 | In the Linux kernel, the following vulnerability has been resolved: xfrm6: fix uninitialized saddr… | 2026-05-06T12:16:31.227 | 2026-05-08T13:16:40.990 |
| fkie_cve-2026-43134 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix missing … | 2026-05-06T12:16:30.617 | 2026-05-08T13:16:40.853 |
| fkie_cve-2026-43120 | In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix double free re… | 2026-05-06T10:16:25.913 | 2026-05-08T13:16:40.207 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-qvcj-rgrx-wm72 |
7.5 (3.1)
|
Improper neutralization of special elements in output used by a downstream component ('injection') … | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-mgh8-qx2p-mmfj |
9.6 (3.1)
|
Improper neutralization of special elements used in a command ('command injection') in Azure Cloud … | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-jvw8-2m5m-9449 |
8.2 (3.1)
|
Externally controlled reference to a resource in another sphere in Microsoft Partner Center allows … | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-j3m5-fchj-4gfr |
8.6 (3.1)
|
Improper access control in Azure AI Foundry M365 published agents allows an unauthorized attacker t… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-hpvr-rjcg-4q53 |
7.5 (3.1)
|
Improper neutralization of special elements in M365 Copilot allows an unauthorized attacker to disc… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-h553-38x2-qp6q |
8.8 (3.1)
|
Improper neutralization of input during web page generation ('cross-site scripting') in Azure Machi… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-gfjx-9vr9-m736 |
7.5 (3.1)
|
Improper neutralization of special elements used in a command ('command injection') in Copilot Chat… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-g4xx-6vv3-3x48 |
9.9 (3.1)
|
Improper access control in Azure Managed Instance for Apache Cassandra allows an authorized attacke… | 2026-05-08T00:31:33Z | 2026-05-08T00:31:33Z |
| ghsa-cm99-m826-vgg7 |
7.8 (3.1)
|
A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow … | 2026-03-24T15:30:29Z | 2026-05-08T00:31:32Z |
| ghsa-xv59-967r-8726 |
5.1 (4.0)
|
rust-openssl vulnerable to heap buffer overflow when encrypting with AES key-wrap-with-padding | 2026-05-07T22:33:51Z | 2026-05-07T22:33:51Z |
| ghsa-39j6-4867-gg4w |
4.7 (3.1)
|
utcp-http vulnerable to SSRF via attacker-controlled OpenAPI servers[0].url in HTTP communication p… | 2026-05-07T22:32:54Z | 2026-05-07T22:32:54Z |
| ghsa-v7qw-hx66-4w9x |
8.7 (3.1)
|
netbox-data-flows has stored XSS in ObjectAlias names rendered inside DataFlow tables | 2026-05-07T22:31:32Z | 2026-05-07T22:31:32Z |
| ghsa-jggh-5rmh-r6h5 |
3.7 (3.1)
2.9 (4.0)
|
Dolibarr has Insufficient Verification of Data Authenticity | 2026-05-03T12:30:26Z | 2026-05-07T22:30:07Z |
| ghsa-j7h9-2jh7-g967 |
8.7 (4.0)
|
mcp-ssh-tool has file transfer path policy bypass and bearer token comparison hardening | 2026-05-07T21:45:16Z | 2026-05-07T21:45:17Z |
| ghsa-xhrw-5qxx-jpwr |
7.1 (3.1)
|
Microsoft APM CLI's plugin.json component paths escape plugin root and copy arbitrary host files du… | 2026-05-07T21:41:08Z | 2026-05-07T21:41:08Z |
| ghsa-fpw6-hrg5-q5x5 |
7.4 (3.1)
|
ech0's acess tokens with expiry=never cannot be revoked: logout panics, delete does not blacklist JTI | 2026-05-07T21:34:01Z | 2026-05-07T21:34:01Z |
| ghsa-p64j-f4x9-wq66 |
8.0 (3.1)
|
Ech0's OAuth redirect URI validation ignores path component, enables exchange-code theft | 2026-05-07T21:30:45Z | 2026-05-07T21:30:45Z |
| ghsa-j3f5-rw74-g4rv |
3.3 (3.1)
1.9 (4.0)
|
A weakness has been identified in OSGeo gdal up to 3.13.0dev-4. The affected element is the functio… | 2026-05-07T21:30:30Z | 2026-05-07T21:30:30Z |
| ghsa-h9rh-5ffh-h669 |
5.3 (3.1)
1.9 (4.0)
|
A security flaw has been discovered in OSGeo gdal up to 3.13.0dev-4. Impacted is the function GDnen… | 2026-05-07T21:30:30Z | 2026-05-07T21:30:30Z |
| ghsa-g323-63gp-7v74 |
7.3 (3.1)
5.5 (4.0)
|
A security vulnerability has been detected in code-projects Feedback System 1.0. Impacted is an unk… | 2026-05-07T21:30:30Z | 2026-05-07T21:30:30Z |
| ghsa-34v6-h57v-gx5f |
6.3 (3.1)
2.1 (4.0)
|
A security flaw has been discovered in CodeAstro Online Classroom 1.0. This vulnerability affects u… | 2026-05-07T21:30:30Z | 2026-05-07T21:30:30Z |
| ghsa-r7c9-7pjq-hmm8 |
7.2 (3.1)
|
Postorius through 1.3.13 does not escape HTML in the message subject when rendering it in the Held … | 2026-05-07T21:30:29Z | 2026-05-07T21:30:29Z |
| ghsa-mv88-fcpc-wrmw |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in SourceCodester Pharmacy Sales and Inventory System 1.0. This affects a… | 2026-05-07T21:30:29Z | 2026-05-07T21:30:29Z |
| ghsa-jmvp-7877-wr2f |
3.3 (3.1)
1.9 (4.0)
|
A vulnerability was determined in OSGeo gdal up to 3.13.0dev-4. This vulnerability affects the func… | 2026-05-07T21:30:29Z | 2026-05-07T21:30:29Z |
| ghsa-72pg-5w29-wjx6 |
5.3 (3.1)
1.9 (4.0)
|
A vulnerability was identified in OSGeo gdal up to 3.13.0dev-4. This issue affects the function SWn… | 2026-05-07T21:30:29Z | 2026-05-07T21:30:29Z |
| ghsa-pr5j-p9p7-3c46 |
7.4 (3.1)
|
Improper certificate validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1 all… | 2026-05-07T18:30:40Z | 2026-05-07T21:30:28Z |
| ghsa-xfv3-v32f-xwfc |
6.5 (3.1)
8.2 (4.0)
|
Lack of user input validation in the file upload functionality of Open Notebook v1.8.3 allows the a… | 2026-05-07T12:31:23Z | 2026-05-07T21:30:27Z |
| ghsa-wwfp-6c8c-qg35 |
7.0 (3.1)
|
An Improper Access Control in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1 allows a… | 2026-05-07T18:30:40Z | 2026-05-07T21:30:27Z |
| ghsa-c7wf-4r4p-4766 |
8.1 (3.1)
7.0 (4.0)
|
Lack of user input validation in the file upload functionality of Open Notebook v1.8.3 allows the a… | 2026-05-07T12:31:23Z | 2026-05-07T21:30:27Z |
| ghsa-jqjr-j3vj-vwq3 |
10.0 (3.1)
9.2 (4.0)
|
Lack of user input sanitisation in Open Notebook v1.8.3 allows the application user to execute Pyth… | 2026-05-07T12:31:23Z | 2026-05-07T21:30:26Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-74 |
|
Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authori… | requests | 2023-05-26T18:15:00Z | 2023-06-05T01:13:00.534973Z |
| pysec-2023-46 |
|
redis-py through 4.5.3 leaves a connection open after canceling an async Redis command at… | redis | 2023-03-26T19:15:00Z | 2023-06-05T01:13:00.432606Z |
| pysec-2023-45 |
|
redis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open af… | redis | 2023-03-26T19:15:00Z | 2023-06-05T01:13:00.293462Z |
| pysec-2023-72 |
|
** UNSUPPORTED WHEN ASSIGNED ** The Apache Spark UI offers the possibility to enable ACLs… | pyspark | 2023-05-02T09:15:00Z | 2023-06-05T01:12:58.679776Z |
| pysec-2023-71 |
|
Planet is software that provides satellite data. The secret file stores the user's Planet… | planet | 2023-05-12T21:15:00Z | 2023-06-05T01:12:57.755283Z |
| pysec-2022-232 |
|
NVFLARE, versions prior to 2.1.2, contains a vulnerability in its utils module, where YAM… | nvflare | 2022-07-01T18:15:00Z | 2023-06-05T01:12:56.865026Z |
| pysec-2022-231 |
|
NVFLARE, versions prior to 2.1.2, contains a vulnerability in its PKI implementation modu… | nvflare | 2022-07-01T18:15:00Z | 2023-06-05T01:12:56.789968Z |
| pysec-2023-70 |
|
A directory traversal vulnerability in the /get-artifact API method of the mlflow platfor… | mlflow | 2023-05-11T02:15:00Z | 2023-06-05T01:12:55.587142Z |
| pysec-2023-69 |
|
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.3.1. | mlflow | 2023-05-17T21:15:00Z | 2023-06-05T01:12:55.503398Z |
| pysec-2023-68 |
|
Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1. | mlflow | 2023-04-28T00:15:00Z | 2023-06-05T01:12:55.421205Z |
| pysec-2023-67 |
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-05-26T14:15:00Z | 2023-06-05T01:12:54.808327Z |
| pysec-2023-66 |
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-05-26T14:15:00Z | 2023-06-05T01:12:54.698222Z |
| pysec-2023-65 |
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-05-26T14:15:00Z | 2023-06-05T01:12:54.592327Z |
| pysec-2023-64 |
|
mage-ai is an open-source data pipeline tool for transforming and integrating data. Those… | mage-ai | 2023-05-09T15:15:00Z | 2023-06-05T01:12:54.165512Z |
| pysec-2023-63 |
|
in-toto is a framework to protect supply chain integrity. The in-toto configuration is re… | in-toto | 2023-05-10T18:15:00Z | 2023-06-05T01:12:53.259453Z |
| pysec-2023-62 |
|
Flask is a lightweight WSGI web application framework. When all of the following conditio… | flask | 2023-05-02T18:15:00Z | 2023-06-05T01:12:52.229549Z |
| pysec-2023-61 |
|
In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to b… | django | 2023-05-07T02:15:00Z | 2023-06-05T01:12:51.525399Z |
| pysec-2022-43050 |
|
The d8s-pdfs package for Python, as distributed on PyPI, included a potential code-execut… | democritus-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:51.154372Z |
| pysec-2022-43049 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | democritus-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:51.085049Z |
| pysec-2022-43048 |
|
The d8s-html package for Python, as distributed on PyPI, included a potential code-execut… | democritus-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.996077Z |
| pysec-2022-43047 |
|
The d8s-domains package for Python, as distributed on PyPI, included a potential code-exe… | democritus-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.928263Z |
| pysec-2022-43046 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | democritus-html | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.827897Z |
| pysec-2022-43045 |
|
The d8s-xml package for Python, as distributed on PyPI, included a potential code-executi… | democritus-html | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.748809Z |
| pysec-2022-43044 |
|
The d8s-networking package for Python, as distributed on PyPI, included a potential code-… | democritus-hashes | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.653599Z |
| pysec-2022-43043 |
|
The d8s-file-system package for Python, as distributed on PyPI, included a potential code… | democritus-hashes | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.575571Z |
| pysec-2022-43042 |
|
The d8s-archives package for Python, as distributed on PyPI, included a potential code-ex… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.463544Z |
| pysec-2022-43041 |
|
The d8s-json package for Python, as distributed on PyPI, included a potential code-execut… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.395602Z |
| pysec-2022-43040 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.328726Z |
| pysec-2022-43039 |
|
The d8s-yaml package for Python, as distributed on PyPI, included a potential code-execut… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.196757Z |
| pysec-2022-43038 |
|
The d8s-algorithms package for Python, as distributed on PyPI, included a potential code-… | democritus-dicts | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.098821Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33193 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.674012Z |
| gsd-2024-33192 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.748196Z |
| gsd-2024-33191 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.647629Z |
| gsd-2024-33190 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.755195Z |
| gsd-2024-33189 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.693720Z |
| gsd-2024-33188 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.749121Z |
| gsd-2024-33187 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.702289Z |
| gsd-2024-33186 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.689798Z |
| gsd-2024-33185 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.609172Z |
| gsd-2024-33184 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.674560Z |
| gsd-2024-33183 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.694317Z |
| gsd-2024-33182 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.610657Z |
| gsd-2024-33181 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.720504Z |
| gsd-2024-33180 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.717105Z |
| gsd-2024-33179 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.682083Z |
| gsd-2024-33178 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.734806Z |
| gsd-2024-33177 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.759333Z |
| gsd-2024-33176 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.691588Z |
| gsd-2024-33175 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.721785Z |
| gsd-2024-33174 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.724871Z |
| gsd-2024-33173 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.740036Z |
| gsd-2024-33172 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.737358Z |
| gsd-2024-33171 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.687655Z |
| gsd-2024-33170 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.740641Z |
| gsd-2024-33169 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.745339Z |
| gsd-2024-33168 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.756074Z |
| gsd-2024-33167 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.716224Z |
| gsd-2024-33166 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.689082Z |
| gsd-2024-33165 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.617137Z |
| gsd-2024-33164 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.602462Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2545 | Malicious code in @sap-px/pxapi (npm) | 2026-04-11T04:45:40Z | 2026-04-23T20:50:49Z |
| mal-2026-3023 | Malicious code in test-pkg-jie (PyPI) | 2026-04-23T18:36:37Z | 2026-04-23T18:36:37Z |
| mal-2026-3022 | Malicious code in jie-utility-package (PyPI) | 2026-04-23T17:48:51Z | 2026-04-23T17:48:51Z |
| mal-2026-3015 | Malicious code in lyroxcoder (PyPI) | 2026-04-23T10:40:59Z | 2026-04-23T10:40:59Z |
| mal-2026-2256 | Malicious code in shenxun162938 (npm) | 2026-03-27T09:40:39Z | 2026-04-23T05:15:51Z |
| mal-2026-2238 | Malicious code in spr-i18n-labels (npm) | 2026-03-26T16:40:45Z | 2026-04-23T05:15:51Z |
| mal-2026-3002 | Malicious code in lyrox (PyPI) | 2026-04-23T00:22:16Z | 2026-04-23T00:22:16Z |
| mal-2024-11746 | Malicious code in voto3 (PyPI) | 2024-07-26T16:53:30Z | 2026-04-22T23:24:15Z |
| mal-2025-47788 | Malicious code in noonutil (PyPI) | 2025-08-20T15:39:33Z | 2026-04-22T22:50:05Z |
| mal-2025-41675 | Malicious code in flask-tdg-cyber (PyPI) | 2025-08-11T15:54:48Z | 2026-04-22T22:50:05Z |
| mal-2025-191916 | Malicious code in unicore (PyPI) | 2025-09-07T21:01:23Z | 2026-04-22T22:50:05Z |
| mal-2024-12351 | Malicious code in spy-ai (PyPI) | 2024-10-02T09:16:00Z | 2026-04-22T22:50:05Z |
| mal-2024-11519 | Malicious code in aiopbotocore (PyPI) | 2024-07-26T16:53:30Z | 2026-04-22T22:50:05Z |
| mal-2025-47799 | Malicious code in python-ledgercommon (PyPI) | 2025-08-21T14:59:29Z | 2026-04-22T21:23:32Z |
| mal-2025-47746 | Malicious code in awesome-tools-collection (PyPI) | 2025-09-03T15:52:43Z | 2026-04-22T21:23:32Z |
| mal-2025-47745 | Malicious code in anrok (PyPI) | 2025-08-23T17:56:40Z | 2026-04-22T21:23:32Z |
| mal-2025-192962 | Malicious code in rippling-cli (PyPI) | 2025-12-30T09:52:01Z | 2026-04-22T21:23:32Z |
| mal-2025-192686 | Malicious code in runtimeutils (PyPI) | 2025-12-21T14:03:13Z | 2026-04-22T21:23:32Z |
| mal-2025-192679 | Malicious code in system-health-check-test-unique (PyPI) | 2025-12-19T20:42:35Z | 2026-04-22T21:23:32Z |
| mal-2025-192386 | Malicious code in telcoo (PyPI) | 2025-12-09T08:05:51Z | 2026-04-22T21:23:32Z |
| mal-2025-191927 | Malicious code in wayspiritmcp-weather (PyPI) | 2025-11-05T21:16:52Z | 2026-04-22T21:23:32Z |
| mal-2025-191920 | Malicious code in venomenallib (PyPI) | 2025-09-09T21:59:41Z | 2026-04-22T21:23:32Z |
| mal-2025-191897 | Malicious code in tgeffect (PyPI) | 2025-11-22T15:12:29Z | 2026-04-22T21:23:32Z |
| mal-2025-191872 | Malicious code in soopsocks (PyPI) | 2025-09-26T16:20:15Z | 2026-04-22T21:23:32Z |
| mal-2025-191837 | Malicious code in pyrtp (PyPI) | 2025-11-24T23:32:59Z | 2026-04-22T21:23:32Z |
| mal-2025-191796 | Malicious code in mulaptested-pakname (PyPI) | 2025-08-28T22:36:38Z | 2026-04-22T21:23:32Z |
| mal-2025-191699 | Malicious code in chat-prompt-logger (PyPI) | 2025-11-30T00:34:30Z | 2026-04-22T21:23:32Z |
| mal-2024-12332 | Malicious code in pymatcha (PyPI) | 2024-09-04T21:25:32Z | 2026-04-22T21:23:32Z |
| mal-2026-2999 | Malicious code in pypdf-fork (PyPI) | 2026-04-22T21:09:16Z | 2026-04-22T21:09:16Z |
| mal-2026-2430 | Malicious code in k8s-node-health (PyPI) | 2026-04-02T15:10:22Z | 2026-04-22T11:30:32Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1055 | Node.js: Mehrere Schwachstellen | 2025-05-14T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-0403 | libxml2: Mehrere Schwachstellen | 2025-02-18T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2024-3338 | Red Hat OpenShift: Mehrere Schwachstelle | 2024-11-05T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2024-1547 | OpenSSH auf Red Hat Enterprise Linux 9: Schwachstelle ermöglicht Denial of Service | 2024-07-08T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-3022 | Apache ActiveMQ: Schwachstelle ermöglicht Codeausführung | 2023-11-28T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-2119 | Python: Mehrere Schwachstellen | 2023-08-22T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-0611 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Denial of Service | 2023-03-09T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-0433 | Apache Commons und Apache Tomcat: Schwachstelle ermöglicht Denial of Service | 2023-02-20T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2391 | OpenBao: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2388 | MongoDB: Schwachstelle ermöglicht Privilegieneskalation | 2025-10-22T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2272 | Moodle: Mehrere Schwachstellen | 2025-10-13T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2224 | Keycloak: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2202 | fetchmail: Schwachstelle ermöglicht Denial of Service | 2025-10-05T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2036 | IBM WebSphere Application Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-10T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1925 | Hashicorp Vault: Schwachstelle ermöglicht Denial of Service | 2025-08-28T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1866 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1613 | Linux Kernel: Mehrere Schwachstellen | 2025-07-20T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1463 | Redis: Mehrere Schwachstellen | 2025-07-06T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0683 | Linux Kernel: Mehrere Schwachstellen | 2025-04-01T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-3690 | Gitea: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-12-11T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-3368 | Linux Kernel: Mehrere Schwachstellen | 2024-11-06T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-1944 | Red Hat multicluster engine for Kubernetes: Schwachstelle ermöglicht Denial of Service | 2024-08-28T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-1606 | Bootstrap: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2024-07-11T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-0459 | Linux Kernel: Mehrere Schwachstellen | 2024-02-21T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-2864 | Linux Kernel: Mehrere Schwachstellen | 2023-11-08T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-2434 | Linux Kernel: Schwachstelle ermöglicht Codeausführung | 2023-09-24T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-1666 | Linux Kernel: Mehrere Schwachstellen | 2023-07-05T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-1542 | Red Hat OpenShift: Mehrere Schwachstellen | 2023-06-22T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-0637 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-03-13T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-0328 | Red Hat OpenShift: Mehrere Schwachstellen | 2023-02-09T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-12-088-01a | Rockwell Automation FactoryTalk RNADiagReceiver | 2012-12-30T07:00:00.000000Z | 2025-06-06T21:44:35.026913Z |
| icsa-12-083-01 | Ecava IntegraXor ActiveX Directory Traversal | 2012-12-25T07:00:00.000000Z | 2025-06-06T21:44:28.588784Z |
| icsa-12-032-02 | GE Intelligent Platforms Proficy Plant Applications Memory Corruption Vulnerabilities | 2012-11-04T06:00:00.000000Z | 2025-06-06T21:44:08.900302Z |
| icsa-12-032-01 | GE Proficy Historian ihDataArchiver | 2012-11-04T06:00:00.000000Z | 2025-06-06T21:44:02.422128Z |
| icsa-15-223-01 | Schneider Electric IMT25 DTM Vulnerability | 2015-05-14T06:00:00.000000Z | 2025-06-06T21:43:55.748554Z |
| icsa-15-211-01 | Schneider Electric InduSoft Web Studio and InTouch Machine Edition 2014 Password Storage Vulnerability | 2015-05-02T06:00:00.000000Z | 2025-06-06T21:43:48.989760Z |
| icsa-15-202-03b | Siemens RUGGEDCOM ROS and ROX-based Devices TLS POODLE Vulnerability (Update B) | 2015-04-23T06:00:00.000000Z | 2025-06-06T21:43:42.534859Z |
| icsa-15-195-01 | Siemens SICAM MIC Authentication Bypass Vulnerability | 2015-04-16T06:00:00.000000Z | 2025-06-06T21:43:23.165608Z |
| icsa-15-181-01 | Baxter SIGMA Spectrum Infusion System Vulnerabilities | 2015-04-02T06:00:00.000000Z | 2025-06-06T21:43:16.616537Z |
| icsa-15-176-02 | PACTware Exceptional Conditions Vulnerability | 2015-03-28T06:00:00.000000Z | 2025-06-06T21:43:10.139031Z |
| icsa-15-176-01 | Siemens Climatix BACnet/IP Communication Module Cross-site Scripting Vulnerability | 2015-03-28T06:00:00.000000Z | 2025-06-06T21:43:03.687724Z |
| icsa-15-174-01 | Hospira Symbiq Infusion System Vulnerability | 2015-03-26T06:00:00.000000Z | 2025-06-06T21:42:57.240178Z |
| icsa-15-167-01 | Schneider Electric StruxureWare Building Expert Plaintext Credentials Vulnerability | 2015-03-19T06:00:00.000000Z | 2025-06-06T21:42:37.652958Z |
| icsa-15-162-01a | RLE Nova-Wind Turbine HMI Unsecure Credentials Vulnerability (Update A) | 2015-03-14T06:00:00.000000Z | 2025-06-06T21:42:31.195189Z |
| icsa-15-160-02 | Sinapsi eSolar Light Plaintext Passwords Vulnerability | 2015-03-12T06:00:00.000000Z | 2025-06-06T21:42:24.744905Z |
| icsa-15-160-01a | N-Tron 702W Hard-Coded SSH and HTTPS Encryption Keys (Update A) | 2015-03-12T06:00:00.000000Z | 2025-06-06T21:42:18.275644Z |
| icsa-15-155-01 | XZERES 442SR Wind Turbine CSRF Vulnerability | 2015-03-07T07:00:00.000000Z | 2025-06-06T21:42:11.814604Z |
| icsa-15-153-02 | Moxa SoftCMS Buffer Overflow Vulnerability | 2015-03-05T07:00:00.000000Z | 2025-06-06T21:42:05.109005Z |
| icsa-15-148-01 | IDS RTU 850 Directory Traversal Vulnerability | 2015-02-28T07:00:00.000000Z | 2025-06-06T21:41:52.181609Z |
| icsa-15-141-01a | Schneider Electric OFS Server Vulnerability (Update A) | 2015-02-21T07:00:00.000000Z | 2025-06-06T21:41:39.275086Z |
| icsa-15-132-02 | Rockwell Automation RSView32 Weak Encryption Algorithm on Passwords | 2015-02-12T07:00:00.000000Z | 2025-06-06T21:41:32.834568Z |
| icsa-15-132-01 | Hospira LifeCare PCA Infusion System Vulnerabilities | 2015-02-12T07:00:00.000000Z | 2025-06-06T21:41:26.200883Z |
| icsa-15-125-01 | Hospira LifeCare PCA Infusion System Vulnerabilities | 2015-02-05T07:00:00.000000Z | 2025-06-06T21:41:19.746904Z |
| icsa-15-120-01 | Opto 22 Multiple Product Vulnerabilities | 2015-01-31T07:00:00.000000Z | 2025-06-06T21:41:13.287112Z |
| icsa-15-111-02 | Rockwell Automation RSLinx Classic Vulnerability | 2015-01-22T07:00:00.000000Z | 2025-06-06T21:41:06.693068Z |
| icsa-15-111-01 | Emerson AMS Device Manager SQL Injection Vulnerability | 2015-01-22T07:00:00.000000Z | 2025-06-06T21:41:00.174231Z |
| icsa-15-097-01 | Moxa VPort ActiveX SDK Plus Stack-Based Buffer Overflow Vulnerability | 2015-01-08T07:00:00.000000Z | 2025-06-06T21:40:40.543597Z |
| icsa-15-092-01 | Schneider Electric VAMPSET Software Buffer Overflow Vulnerability | 2015-01-03T07:00:00.000000Z | 2025-06-06T21:40:34.059444Z |
| icsa-15-090-03 | Hospira MedNet Vulnerabilitie | 2015-01-01T07:00:00.000000Z | 2025-06-06T21:40:27.581727Z |
| icsa-15-090-02 | Ecava IntegraXor DLL Vulnerabilities | 2015-01-01T07:00:00.000000Z | 2025-06-06T21:40:21.136198Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-duo-mac-bypass-OyZpVPnx | Cisco Duo Two-Factor Authentication for macOS Authentication Bypass Vulnerability | 2023-06-21T16:00:00+00:00 | 2023-06-21T16:00:00+00:00 |
| cisco-sa-sd-wan-fhqh8pkx | Cisco SD-WAN Software Information Disclosure Vulnerability | 2021-09-22T16:00:00+00:00 | 2023-06-16T19:11:51+00:00 |
| cisco-sa-sd-wan-Fhqh8pKX | Cisco SD-WAN Software Information Disclosure Vulnerability | 2021-09-22T16:00:00+00:00 | 2023-06-16T19:11:51+00:00 |
| cisco-sa-smb-sxss-opyjzume | Cisco Small Business 200, 300, and 500 Series Switches Web-Based Management Stored Cross-Site Scripting Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-smb-sxss-OPYJZUmE | Cisco Small Business 200, 300, and 500 Series Switches Web-Based Management Stored Cross-Site Scripting Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-expressway-priv-esc-ls2b9t7b | Cisco Expressway Series and Cisco TelePresence Video Communication Server Privilege Escalation Vulnerabilities | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-expressway-priv-esc-Ls2B9t7b | Cisco Expressway Series and Cisco TelePresence Video Communication Server Privilege Escalation Vulnerabilities | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-cucm-imp-dos-49gl7rzt | Cisco Unified Communications Manager IM & Presence Service Denial of Service Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-cucm-imp-dos-49GL7rzT | Cisco Unified Communications Manager IM & Presence Service Denial of Service Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-cucm-dos-4ag3ywbd | Cisco Unified Communications Manager Denial of Service Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-cucm-dos-4Ag3yWbD | Cisco Unified Communications Manager Denial of Service Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-csw-auth-openapi-ktndjdnx | Cisco Secure Workload Authenticated OpenAPI Privilege Escalation Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-csw-auth-openapi-kTndjdNX | Cisco Secure Workload Authenticated OpenAPI Privilege Escalation Vulnerability | 2023-06-07T16:00:00+00:00 | 2023-06-07T16:00:00+00:00 |
| cisco-sa-iox-8whgn5dl | Cisco IOx Application Hosting Environment Command Injection Vulnerability | 2023-02-01T16:00:00+00:00 | 2023-06-01T15:34:21+00:00 |
| cisco-sa-iox-8whGn5dL | Cisco IOx Application Hosting Environment Command Injection Vulnerability | 2023-02-01T16:00:00+00:00 | 2023-06-01T15:34:21+00:00 |
| cisco-sa-cuis-xss-omm8jybx | Cisco Unified Intelligence Center Reflected Cross-Site Scripting Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-05-30T14:22:18+00:00 |
| cisco-sa-cuis-xss-Omm8jyBX | Cisco Unified Intelligence Center Reflected Cross-Site Scripting Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-05-30T14:22:18+00:00 |
| cisco-sa-ftd-file-write-shvcmqvc | Cisco Firepower Threat Defense Software CLI Arbitrary File Write Vulnerability | 2021-10-27T16:00:00+00:00 | 2023-05-26T11:54:17+00:00 |
| cisco-sa-ftd-file-write-SHVcmQVc | Cisco Firepower Threat Defense Software CLI Arbitrary File Write Vulnerability | 2021-10-27T16:00:00+00:00 | 2023-05-26T11:54:17+00:00 |
| cisco-sa-iosxe-info-disc-nrorxjo | Cisco IOS XE ROM Monitor Software for Catalyst Switches Information Disclosure Vulnerability | 2022-09-28T16:00:00+00:00 | 2023-05-17T18:23:37+00:00 |
| cisco-sa-iosxe-info-disc-nrORXjO | Cisco IOS XE ROM Monitor Software for Catalyst Switches Information Disclosure Vulnerability | 2022-09-28T16:00:00+00:00 | 2023-05-17T18:23:37+00:00 |
| cisco-sa-ssm-sql-x9mmjsyh | Cisco Smart Software Manager On-Prem SQL Injection Vulnerability | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-ssm-sql-X9MmjSYh | Cisco Smart Software Manager On-Prem SQL Injection Vulnerability | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-sg-web-multi-s9g4nkgv | Cisco Small Business Series Switches Buffer Overflow Vulnerabilities | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-sg-web-multi-S9g4Nkgv | Cisco Small Business Series Switches Buffer Overflow Vulnerabilities | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-ise-xxe-inj-696oztcm | Cisco Identity Services Engine XML External Entity Injection Vulnerabilities | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-ise-xxe-inj-696OZTCm | Cisco Identity Services Engine XML External Entity Injection Vulnerabilities | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-ise-traversal-ztugmyhu | Cisco Identity Services Engine Path Traversal Vulnerabilities | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-ise-traversal-ZTUgMYhu | Cisco Identity Services Engine Path Traversal Vulnerabilities | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| cisco-sa-ise-injection-srqnseu9 | Cisco Identity Services Engine Command Injection Vulnerabilities | 2023-05-17T16:00:00+00:00 | 2023-05-17T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-23336 | wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() | 2026-03-02T00:00:00.000Z | 2026-04-25T01:04:47.000Z |
| msrc_cve-2026-23335 | RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah() | 2026-03-02T00:00:00.000Z | 2026-04-25T01:04:42.000Z |
| msrc_cve-2026-23330 | nfc: nci: complete pending data exchange on device close | 2026-03-02T00:00:00.000Z | 2026-04-25T01:04:37.000Z |
| msrc_cve-2026-23324 | can: usb: etas_es58x: correctly anchor the urb in the read bulk callback | 2026-03-02T00:00:00.000Z | 2026-04-25T01:04:32.000Z |
| msrc_cve-2026-23318 | ALSA: usb-audio: Use correct version for UAC3 header validation | 2026-03-02T00:00:00.000Z | 2026-04-25T01:04:26.000Z |
| msrc_cve-2026-23315 | wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211() | 2026-03-02T00:00:00.000Z | 2026-04-25T01:04:21.000Z |
| msrc_cve-2026-5450 | scanf %mc off-by-one heap buffer overflow | 2026-04-02T00:00:00.000Z | 2026-04-25T01:04:16.000Z |
| msrc_cve-2026-40706 | CVE-2026-40706 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:45:04.000Z |
| msrc_cve-2026-40890 | github.com/gomarkdown/markdown: Out-of-bounds Read in SmartypantsRenderer | 2026-04-02T00:00:00.000Z | 2026-04-24T14:44:48.000Z |
| msrc_cve-2026-22015 | CVE-2026-22015 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:44:41.000Z |
| msrc_cve-2026-35236 | CVE-2026-35236 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:44:31.000Z |
| msrc_cve-2026-35240 | CVE-2026-35240 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:44:20.000Z |
| msrc_cve-2026-22005 | CVE-2026-22005 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:44:09.000Z |
| msrc_cve-2026-22004 | CVE-2026-22004 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:43:58.000Z |
| msrc_cve-2026-22001 | CVE-2026-22001 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:43:47.000Z |
| msrc_cve-2026-34276 | CVE-2026-34276 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:43:36.000Z |
| msrc_cve-2026-34304 | CVE-2026-34304 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:43:25.000Z |
| msrc_cve-2026-34308 | CVE-2026-34308 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:43:14.000Z |
| msrc_cve-2026-34303 | CVE-2026-34303 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:42:59.000Z |
| msrc_cve-2026-34267 | CVE-2026-34267 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:42:48.000Z |
| msrc_cve-2026-35238 | CVE-2026-35238 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:42:37.000Z |
| msrc_cve-2026-22017 | CVE-2026-22017 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:42:26.000Z |
| msrc_cve-2026-22002 | CVE-2026-22002 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:42:15.000Z |
| msrc_cve-2026-34271 | CVE-2026-34271 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:42:04.000Z |
| msrc_cve-2026-34293 | CVE-2026-34293 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:41:53.000Z |
| msrc_cve-2026-34270 | CVE-2026-34270 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:41:42.000Z |
| msrc_cve-2026-22009 | CVE-2026-22009 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:41:31.000Z |
| msrc_cve-2026-35237 | CVE-2026-35237 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:41:20.000Z |
| msrc_cve-2026-21998 | CVE-2026-21998 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:41:09.000Z |
| msrc_cve-2026-35239 | CVE-2026-35239 | 2026-04-02T00:00:00.000Z | 2026-04-24T14:40:58.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10036-1 | cockpit-repos-4.6-1.1 on GA media | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| opensuse-su-2026:20018-1 | Security update for glib2 | 2026-01-12T11:52:23Z | 2026-01-12T11:52:23Z |
| opensuse-su-2026:20014-1 | Security update for MozillaFirefox | 2026-01-12T11:35:13Z | 2026-01-12T11:35:13Z |
| opensuse-su-2026:20017-1 | Security update for libpng16 | 2026-01-12T11:14:46Z | 2026-01-12T11:14:46Z |
| opensuse-su-2026:20016-1 | Security update for libmicrohttpd | 2026-01-12T11:14:46Z | 2026-01-12T11:14:46Z |
| opensuse-su-2026:20015-1 | Security update for python-tornado6 | 2026-01-12T10:29:37Z | 2026-01-12T10:29:37Z |
| opensuse-su-2026:10035-1 | teleport-17.7.13-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10034-1 | python311-Authlib-1.6.6-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10033-1 | libtasn1-6-32bit-4.21.0-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10032-1 | libpcap-devel-1.10.6-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10031-1 | kubelogin-0.2.14-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10030-1 | k6-1.5.0-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10029-1 | istioctl-1.28.2-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10028-1 | ffmpeg-7-7.1.3-1.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:10027-1 | ffmpeg-4-4.4.6-10.1 on GA media | 2026-01-12T00:00:00Z | 2026-01-12T00:00:00Z |
| opensuse-su-2026:20022-1 | Security update for matio | 2026-01-11T17:15:13Z | 2026-01-11T17:15:13Z |
| opensuse-su-2026:20013-1 | Security update for avahi | 2026-01-11T16:54:00Z | 2026-01-11T16:54:00Z |
| opensuse-su-2026:20020-1 | Security update for chromium | 2026-01-10T02:17:54Z | 2026-01-10T02:17:54Z |
| opensuse-su-2026:10026-1 | python311-urllib3-2.6.2-1.1 on GA media | 2026-01-09T00:00:00Z | 2026-01-09T00:00:00Z |
| opensuse-su-2026:10025-1 | python311-aiohttp-3.13.3-1.1 on GA media | 2026-01-09T00:00:00Z | 2026-01-09T00:00:00Z |
| opensuse-su-2026:10024-1 | libsoup-2_4-1-2.74.3-13.1 on GA media | 2026-01-09T00:00:00Z | 2026-01-09T00:00:00Z |
| opensuse-su-2026:10023-1 | libsoup-3_0-0-3.6.5-10.1 on GA media | 2026-01-09T00:00:00Z | 2026-01-09T00:00:00Z |
| opensuse-su-2026:10022-1 | libsodium-devel-1.0.21-1.1 on GA media | 2026-01-09T00:00:00Z | 2026-01-09T00:00:00Z |
| opensuse-su-2026:10021-1 | coredns-1.14.0-1.1 on GA media | 2026-01-09T00:00:00Z | 2026-01-09T00:00:00Z |
| opensuse-ru-2026:20010-1 | Recommended update for trivy | 2026-01-08T14:37:24Z | 2026-01-08T14:37:24Z |
| opensuse-su-2026:10020-1 | traefik-3.6.6-1.1 on GA media | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| opensuse-su-2026:10019-1 | gdk-pixbuf-loader-libheif-1.21.1-1.1 on GA media | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| opensuse-su-2026:10018-1 | gimp-3.0.6-4.1 on GA media | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| opensuse-su-2026:10017-1 | curl-8.18.0-1.1 on GA media | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| opensuse-su-2026:10016-1 | chromedriver-143.0.7499.192-1.1 on GA media | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:0290 | Red Hat Security Advisory: OpenShift Container Platform 4.14.10 bug fix and security update | 2024-01-23T20:26:08+00:00 | 2026-05-10T20:39:38+00:00 |
| rhsa-2024:0273 | Red Hat Security Advisory: OpenShift Virtualization 4.12.9 Images security and bug fix update | 2024-01-17T08:29:36+00:00 | 2026-05-10T20:39:37+00:00 |
| rhsa-2024:0269 | Red Hat Security Advisory: Run Once Duration Override Operator for Red Hat OpenShift 1.1.0 for RHEL 9 | 2024-02-28T00:20:04+00:00 | 2026-05-10T20:39:37+00:00 |
| rhsa-2024:0198 | Red Hat Security Advisory: OpenShift Container Platform 4.12.47 security update | 2024-01-17T18:20:55+00:00 | 2026-05-10T20:39:37+00:00 |
| rhsa-2024:0193 | Red Hat Security Advisory: OpenShift Container Platform 4.13.29 bug fix and security update | 2024-01-17T09:48:09+00:00 | 2026-05-10T20:39:36+00:00 |
| rhsa-2024:0059 | Red Hat Security Advisory: OpenShift Container Platform 4.11.56 bug fix and security update | 2024-01-10T00:23:49+00:00 | 2026-05-10T20:39:35+00:00 |
| rhsa-2024:0050 | Red Hat Security Advisory: OpenShift Container Platform 4.14.8 bug fix and security update | 2024-01-09T16:55:38+00:00 | 2026-05-10T20:39:35+00:00 |
| rhsa-2024:0045 | Red Hat Security Advisory: OpenShift Container Platform 4.16.0 security update | 2024-06-27T13:06:17+00:00 | 2026-05-10T20:39:33+00:00 |
| rhsa-2024:0043 | Red Hat Security Advisory: Red Hat build of MicroShift 4.16.0 security update | 2024-06-27T13:18:33+00:00 | 2026-05-10T20:39:33+00:00 |
| rhsa-2024:0041 | Red Hat Security Advisory: OpenShift Container Platform 4.16.0 bug fix and security update | 2024-06-27T11:23:01+00:00 | 2026-05-10T20:39:33+00:00 |
| rhsa-2024:0040 | Red Hat Security Advisory: OpenShift Container Platform 4.16.0 security and extras update | 2024-06-27T10:52:21+00:00 | 2026-05-10T20:39:33+00:00 |
| rhsa-2023:7823 | Red Hat Security Advisory: OpenShift Container Platform 4.12.46 bug fix and security update | 2024-01-04T14:41:38+00:00 | 2026-05-10T20:39:33+00:00 |
| rhsa-2023:7831 | Red Hat Security Advisory: OpenShift Container Platform 4.14.7 bug fix and security update | 2024-01-03T20:04:32+00:00 | 2026-05-10T20:39:32+00:00 |
| rhsa-2023:7827 | Red Hat Security Advisory: OpenShift Container Platform 4.13.z security update | 2024-01-04T14:22:05+00:00 | 2026-05-10T20:39:32+00:00 |
| rhsa-2023:7741 | Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security, enhancements, and bug fix update | 2023-12-12T13:55:37+00:00 | 2026-05-10T20:39:31+00:00 |
| rhsa-2023:7710 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 7.2.0 security update | 2023-12-11T00:20:04+00:00 | 2026-05-10T20:39:31+00:00 |
| rhsa-2023:7704 | Red Hat Security Advisory: OpenShift Virtualization 4.14.1 security and bug fix update | 2023-12-07T15:00:28+00:00 | 2026-05-10T20:39:30+00:00 |
| rhsa-2023:7703 | Red Hat Security Advisory: Red Hat OpenShift Pipelines 1.10.6 release and security update | 2023-12-07T14:57:07+00:00 | 2026-05-10T20:39:30+00:00 |
| rhsa-2023:7699 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Client tkn for 1.10.6 release and security update | 2023-12-07T14:26:32+00:00 | 2026-05-10T20:39:29+00:00 |
| rhsa-2023:7691 | Red Hat Security Advisory: OpenShift Container Platform 4.11.55 bug fix and security update | 2023-12-13T21:44:50+00:00 | 2026-05-10T20:39:29+00:00 |
| rhsa-2023:7690 | Red Hat Security Advisory: OpenShift Container Platform 4.11.55 security update | 2023-12-13T21:03:30+00:00 | 2026-05-10T20:39:28+00:00 |
| rhsa-2023:7687 | Red Hat Security Advisory: OpenShift Container Platform 4.13.26 bug fix and security update | 2023-12-13T00:13:20+00:00 | 2026-05-10T20:39:28+00:00 |
| rhsa-2023:7682 | Red Hat Security Advisory: OpenShift Container Platform 4.14.6 bug fix and security update | 2023-12-12T09:48:40+00:00 | 2026-05-10T20:39:27+00:00 |
| rhsa-2023:7662 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 6.0.3 security update | 2023-12-06T00:20:48+00:00 | 2026-05-10T20:39:27+00:00 |
| rhsa-2023:7608 | Red Hat Security Advisory: OpenShift Container Platform 4.12.45 bug fix and security update | 2023-12-06T17:55:11+00:00 | 2026-05-10T20:39:27+00:00 |
| rhsa-2023:7607 | Red Hat Security Advisory: OpenShift Container Platform 4.12.45 security and extras update | 2023-12-06T16:54:41+00:00 | 2026-05-10T20:39:26+00:00 |
| rhsa-2023:7604 | Red Hat Security Advisory: OpenShift Container Platform 4.13.25 bug fix and security update | 2023-12-06T00:34:23+00:00 | 2026-05-10T20:39:26+00:00 |
| rhsa-2023:7602 | Red Hat Security Advisory: OpenShift Container Platform 4.13.25 security and extras update | 2023-12-06T00:16:04+00:00 | 2026-05-10T20:39:26+00:00 |
| rhsa-2023:7599 | Red Hat Security Advisory: OpenShift Container Platform 4.14.5 bug fix and security update | 2023-12-05T09:57:03+00:00 | 2026-05-10T20:39:25+00:00 |
| rhsa-2023:7555 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.3.0 security update | 2023-11-28T18:50:01+00:00 | 2026-05-10T20:39:25+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20934-1 | Security update for python-PyJWT | 2026-03-25T18:08:28Z | 2026-03-25T18:08:28Z |
| suse-su-2026:20839-1 | Security update for python-PyJWT | 2026-03-25T18:08:28Z | 2026-03-25T18:08:28Z |
| suse-su-2026:1045-1 | Security update for the Linux Kernel (Live Patch 77 for SUSE Linux Enterprise 12 SP5) | 2026-03-25T18:04:47Z | 2026-03-25T18:04:47Z |
| suse-su-2026:1044-1 | Security update for the Linux Kernel (Live Patch 70 for SUSE Linux Enterprise 12 SP5) | 2026-03-25T17:54:43Z | 2026-03-25T17:54:43Z |
| suse-su-2026:1041-1 | Security update for the Linux Kernel | 2026-03-25T14:13:20Z | 2026-03-25T14:13:20Z |
| suse-su-2026:1040-1 | Security update for systemd | 2026-03-25T12:43:09Z | 2026-03-25T12:43:09Z |
| suse-su-2026:1039-1 | Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) | 2026-03-25T12:34:25Z | 2026-03-25T12:34:25Z |
| suse-su-2026:20933-1 | Security update for python-ldap | 2026-03-25T10:48:13Z | 2026-03-25T10:48:13Z |
| suse-su-2026:1037-1 | Security update for grafana | 2026-03-25T10:31:04Z | 2026-03-25T10:31:04Z |
| suse-su-2026:1030-1 | Security update for salt | 2026-03-25T10:17:20Z | 2026-03-25T10:17:20Z |
| suse-su-2026:1029-1 | Security update for salt | 2026-03-25T10:16:49Z | 2026-03-25T10:16:49Z |
| suse-su-2026:1028-1 | Security update for salt | 2026-03-25T10:16:17Z | 2026-03-25T10:16:17Z |
| suse-su-2026:1027-1 | Security update for salt | 2026-03-25T10:15:43Z | 2026-03-25T10:15:43Z |
| suse-su-2026:1026-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:15:30Z | 2026-03-25T10:15:30Z |
| suse-su-2026:1014-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:12:32Z | 2026-03-25T10:12:32Z |
| suse-su-2026:1013-1 | Security update 5.0.7 for Multi-Linux Manager Client Tools | 2026-03-25T10:11:52Z | 2026-03-25T10:11:52Z |
| suse-su-2026:1012-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:10:54Z | 2026-03-25T10:10:54Z |
| suse-su-2026:1011-1 | Security update 5.0.7 for Multi-Linux Manager Client Tools | 2026-03-25T10:10:31Z | 2026-03-25T10:10:31Z |
| suse-su-2026:1010-1 | Security update 5.0.7 for Multi-Linux Manager Server | 2026-03-25T10:10:02Z | 2026-03-25T10:10:02Z |
| suse-su-2026:1008-1 | Security update for Prometheus | 2026-03-25T10:07:27Z | 2026-03-25T10:07:27Z |
| suse-su-2026:20932-1 | Security update for ffmpeg-7 | 2026-03-25T09:58:50Z | 2026-03-25T09:58:50Z |
| suse-su-2026:20878-1 | Security update for python-pyasn1 | 2026-03-25T09:44:19Z | 2026-03-25T09:44:19Z |
| suse-su-2026:20868-1 | Security update for capstone | 2026-03-25T09:40:00Z | 2026-03-25T09:40:00Z |
| suse-su-2026:1002-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2026-03-25T09:34:30Z | 2026-03-25T09:34:30Z |
| suse-su-2026:1005-1 | Security update for giflib | 2026-03-25T09:32:48Z | 2026-03-25T09:32:48Z |
| suse-su-2026:1004-1 | Security update for libsoup | 2026-03-25T09:32:40Z | 2026-03-25T09:32:40Z |
| suse-su-2026:20869-1 | Security update for python-PyJWT | 2026-03-25T09:31:26Z | 2026-03-25T09:31:26Z |
| suse-su-2026:1003-1 | Security update for the Linux Kernel | 2026-03-25T09:25:47Z | 2026-03-25T09:25:47Z |
| suse-su-2026:20931-1 | Security update for the Linux Kernel | 2026-03-25T08:48:43Z | 2026-03-25T08:48:43Z |
| suse-su-2026:20838-1 | Security update for the Linux Kernel | 2026-03-25T08:48:43Z | 2026-03-25T08:48:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:13673 | Important: toolbox security update | 2025-08-12T00:00:00Z | 2025-08-12T14:16:36Z |
| alsa-2025:13604 | Moderate: python-requests security update | 2025-08-11T00:00:00Z | 2025-08-11T19:21:12Z |
| alsa-2025:13590 | Moderate: kernel-rt security update | 2025-08-11T00:00:00Z | 2025-08-11T15:42:47Z |
| alsa-2025:13589 | Moderate: kernel security update | 2025-08-11T00:00:00Z | 2025-08-11T15:39:13Z |
| alsa-2025:12280 | Important: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update | 2025-07-30T00:00:00Z | 2025-08-09T13:24:27Z |
| alsa-2025:13429 | Moderate: libxml2 security update | 2025-08-07T00:00:00Z | 2025-08-07T22:17:37Z |
| alsa-2025:13428 | Moderate: libxml2 security update | 2025-08-07T00:00:00Z | 2025-08-07T21:44:30Z |
| alsa-2025:12746 | Important: kernel security update | 2025-08-04T00:00:00Z | 2025-08-07T11:25:17Z |
| alsa-2025:12752 | Important: kernel security update | 2025-08-04T00:00:00Z | 2025-08-07T10:29:22Z |
| alsa-2025:12753 | Important: kernel-rt security update | 2025-08-04T00:00:00Z | 2025-08-07T10:27:31Z |
| alsa-2025:12831 | Moderate: opentelemetry-collector security update | 2025-08-05T00:00:00Z | 2025-08-07T10:26:12Z |
| alsa-2025:12850 | Moderate: opentelemetry-collector security update | 2025-08-05T00:00:00Z | 2025-08-07T10:25:17Z |
| alsa-2025:13240 | Moderate: glibc security update | 2025-08-06T00:00:00Z | 2025-08-07T10:23:27Z |
| alsa-2025:13315 | Moderate: gdk-pixbuf2 security update | 2025-08-07T00:00:00Z | 2025-08-07T09:27:11Z |
| alsa-2025:11850 | Moderate: kernel security update | 2025-07-28T00:00:00Z | 2025-08-06T17:11:33Z |
| alsa-2025:13203 | Moderate: libxml2 security update | 2025-08-06T00:00:00Z | 2025-08-06T15:05:54Z |
| alsa-2025:13234 | Moderate: python-requests security update | 2025-08-06T00:00:00Z | 2025-08-06T15:03:44Z |
| alsa-2025:12980 | Moderate: glibc security update | 2025-08-05T00:00:00Z | 2025-08-06T14:24:57Z |
| alsa-2025:11855 | Moderate: kernel security update | 2025-07-28T00:00:00Z | 2025-08-06T06:59:49Z |
| alsa-2025:12834 | Moderate: python3.12-setuptools security update | 2025-08-05T00:00:00Z | 2025-08-06T05:36:51Z |
| alsa-2025:12519 | Moderate: python-requests security update | 2025-08-04T00:00:00Z | 2025-08-04T12:47:36Z |
| alsa-2025:11455 | Moderate: kernel security update | 2025-07-21T00:00:00Z | 2025-08-04T11:36:19Z |
| alsa-2025:11036 | Moderate: python-setuptools security update | 2025-07-15T00:00:00Z | 2025-08-04T11:32:31Z |
| alsa-2025:11035 | Moderate: lz4 security update | 2025-07-15T00:00:00Z | 2025-08-02T13:24:46Z |
| alsa-2025:12447 | Important: libxml2 security update | 2025-07-31T00:00:00Z | 2025-08-01T13:39:05Z |
| alsa-2025:12450 | Important: libxml2 security update | 2025-07-31T00:00:00Z | 2025-08-01T13:36:17Z |
| alsa-2025:11861 | Moderate: kernel security update | 2025-07-28T00:00:00Z | 2025-07-31T22:26:58Z |
| alsa-2025:11797 | Important: firefox security update | 2025-07-28T00:00:00Z | 2025-07-31T10:21:39Z |
| alsa-2025:11748 | Important: firefox security update | 2025-07-24T00:00:00Z | 2025-07-30T15:41:56Z |
| alsa-2025:12188 | Important: thunderbird security update | 2025-07-29T00:00:00Z | 2025-07-30T13:59:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-1353 | Security exception in org.apache.poi.ddf.EscherContainerRecord.fillFields | 2023-12-25T00:03:02.003193Z | 2023-12-25T00:03:02.003829Z |
| osv-2023-1352 | Heap-buffer-overflow in Flow::dissectMDNS | 2023-12-24T00:05:23.975196Z | 2023-12-24T00:05:23.975551Z |
| osv-2023-756 | Heap-buffer-overflow in rawspeed::DngDecoder::decodeMetaDataInternal | 2023-08-28T14:02:10.741602Z | 2023-12-23T14:16:41.470280Z |
| osv-2022-896 | Segv on unknown address in Sass::unifyComplex | 2022-09-15T00:02:01.621945Z | 2023-12-22T14:15:53.864807Z |
| osv-2021-508 | Segv on unknown address in Sass::CompoundSelector::resolve_parent_refs | 2021-03-09T00:02:18.581527Z | 2023-12-22T14:10:14.701082Z |
| osv-2020-1420 | Bad-cast to Sass::PreValue from Sass::Unary_Expression | 2020-07-28T00:00:14.887375Z | 2023-12-22T14:07:59.765838Z |
| osv-2020-862 | Use-of-uninitialized-value in std::__1::vector<std::__1::vector<Sass::Extension, std::__1::allocator<Sass::Ext | 2020-07-14T22:13:48.731457Z | 2023-12-22T14:06:49.113213Z |
| osv-2023-1343 | Heap-buffer-overflow in _libssh2_kex_agree_instr | 2023-12-22T00:10:36.346763Z | 2023-12-22T00:10:36.347283Z |
| osv-2023-276 | Heap-use-after-free in aiScene::~aiScene | 2023-04-04T14:01:47.666563Z | 2023-12-21T14:16:54.547364Z |
| osv-2023-736 | Heap-buffer-overflow in HeifContext::interpret_heif_file | 2023-08-25T14:00:14.487219Z | 2023-12-20T14:12:01.243209Z |
| osv-2023-1327 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2023-12-18T00:10:41.666920Z | 2023-12-18T00:10:41.667465Z |
| osv-2023-1325 | UNKNOWN WRITE in zero | 2023-12-18T00:04:49.365880Z | 2023-12-18T00:04:49.366308Z |
| osv-2023-1324 | Heap-use-after-free in memory_bclose | 2023-12-18T00:03:27.139777Z | 2023-12-18T00:03:27.140220Z |
| osv-2023-1320 | Heap-use-after-free in memory_bstat | 2023-12-17T00:12:41.223755Z | 2023-12-17T00:12:41.224161Z |
| osv-2023-1315 | Heap-use-after-free in htmlParseDocument | 2023-12-17T00:02:06.164794Z | 2023-12-17T00:02:06.165194Z |
| osv-2023-42 | Heap-buffer-overflow in bit_read_BB | 2023-02-02T13:00:40.999896Z | 2023-12-16T14:20:07.644053Z |
| osv-2023-1303 | Heap-use-after-free in htmlCurrentChar | 2023-12-15T00:00:06.313566Z | 2023-12-15T00:00:06.314002Z |
| osv-2023-1302 | Global-buffer-overflow in pcre_get_compiled_regex_cache_ex | 2023-12-14T00:13:52.791976Z | 2023-12-14T00:13:52.792479Z |
| osv-2023-1301 | Global-buffer-overflow in xmlDictLookupInternal | 2023-12-14T00:13:26.532719Z | 2023-12-14T00:13:26.533280Z |
| osv-2023-1300 | Security exception in com.fasterxml.jackson.core.JsonParser.currentName | 2023-12-14T00:13:10.208981Z | 2023-12-14T00:13:10.209415Z |
| osv-2023-1299 | Global-buffer-overflow in pcre_get_compiled_regex_cache_ex | 2023-12-14T00:12:13.097305Z | 2023-12-14T00:12:13.097842Z |
| osv-2023-1298 | Heap-buffer-overflow in loongarch_split_args_by_comma | 2023-12-14T00:10:40.133892Z | 2023-12-14T00:10:40.134313Z |
| osv-2023-1295 | Global-buffer-overflow in libraw_tagtype_dataunit_bytes | 2023-12-14T00:03:32.723059Z | 2023-12-14T00:03:32.723513Z |
| osv-2023-1291 | Security exception in org.apache.poi.poifs.crypt.binaryrc4.BinaryRC4Decryptor.initCipherForBlock | 2023-12-13T00:03:48.820074Z | 2023-12-13T00:03:48.820457Z |
| osv-2023-1276 | Heap-use-after-free in authentic_emu_update_tokeninfo | 2023-12-10T00:04:07.333337Z | 2023-12-10T00:04:07.333792Z |
| osv-2023-813 | UNKNOWN READ in parse_priv_value | 2023-09-09T14:00:12.875572Z | 2023-12-09T14:23:28.975076Z |
| osv-2023-1244 | Security exception in org.springframework.expression.spel.ast.OpPlus.getValueInternal | 2023-12-02T13:00:17.170709Z | 2023-12-09T14:11:35.526034Z |
| osv-2023-1272 | Heap-buffer-overflow in OT::cff2::accelerator_templ_t<CFF::cff2_private_dict_opset_t, CFF::cff2_private_ | 2023-12-09T00:05:42.581782Z | 2023-12-09T00:05:42.582124Z |
| osv-2023-1271 | Heap-buffer-overflow in is_decl_requires_met | 2023-12-09T00:03:11.119664Z | 2023-12-09T00:03:11.120297Z |
| osv-2023-1268 | Stack-buffer-overflow in decNaNs | 2023-12-08T00:11:32.086790Z | 2023-12-08T00:11:32.087163Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2018-0002 | Links in archives can overwrite any existing file | 2018-06-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2018-0001 | An integer underflow could lead to panic | 2018-06-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2017-0006 | Unchecked vector pre-allocation | 2017-11-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2017-0005 | Large cookie Max-Age values can cause a denial of service | 2017-05-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2017-0004 | Integer overflow leads to heap-based buffer overflow in encode_config_buf | 2017-05-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2017-0003 | Hostname verification skipped when custom root certs used | 2017-03-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2017-0002 | headers containing newline characters can split messages | 2017-01-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2017-0001 | scalarmult() vulnerable to degenerate public keys | 2017-01-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2016-0003 | HTTP download and execution allows MitM RCE | 2016-08-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2016-0002 | HTTPS MitM vulnerability due to lack of hostname verification | 2016-05-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2016-0001 | SSL/TLS MitM vulnerability due to insecure defaults | 2016-11-05T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2023-0019 | `kuchiki` is unmaintained | 2023-01-21T12:00:00Z | 2023-05-23T20:17:25Z |
| rustsec-2023-0037 | crate has been renamed to `crypto_secretbox` | 2023-05-16T12:00:00Z | 2023-05-17T03:02:51Z |
| rustsec-2022-0048 | xml-rs is Unmaintained | 2022-01-26T12:00:00Z | 2023-05-05T07:39:54Z |
| rustsec-2023-0036 | tree_magic is Unmaintained | 2023-04-11T12:00:00Z | 2023-04-25T03:08:42Z |
| rustsec-2023-0034 | Resource exhaustion vulnerability in h2 may lead to Denial of Service (DoS) | 2023-04-14T12:00:00Z | 2023-04-20T19:17:55Z |
| rustsec-2021-0147 | `daemonize` is Unmaintained | 2021-09-01T12:00:00Z | 2023-04-08T19:49:55Z |
| rustsec-2023-0028 | buf_redux is Unmaintained | 2023-01-24T12:00:00Z | 2023-03-24T15:42:41Z |
| rustsec-2023-0026 | Gitoxide has renamed its crates. | 2023-03-14T12:00:00Z | 2023-03-24T15:33:49Z |
| rustsec-2023-0025 | Gitoxide has renamed its crates. | 2023-03-14T12:00:00Z | 2023-03-24T15:33:49Z |
| rustsec-2022-0076 | Bug in Wasmtime implementation of pooling instance allocator | 2022-11-10T12:00:00Z | 2023-03-15T23:49:40Z |
| rustsec-2023-0020 | const-cstr is Unmaintained | 2023-03-12T12:00:00Z | 2023-03-12T18:38:56Z |
| rustsec-2021-0153 | `encoding` is unmaintained | 2021-12-05T12:00:00Z | 2023-03-12T07:17:34Z |
| rustsec-2019-0040 | `boxfnonce` obsolete with release of Rust 1.35.0 | 2019-06-20T12:00:00Z | 2023-03-12T07:15:02Z |
| rustsec-2020-0168 | mach is unmaintained | 2020-07-14T12:00:00Z | 2023-03-12T06:59:25Z |
| rustsec-2021-0151 | ncollide2d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-12T06:47:41Z |
| rustsec-2021-0150 | ncollide3d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-12T06:47:41Z |
| rustsec-2021-0149 | nphysics2d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-11T22:34:14Z |
| rustsec-2021-0148 | nphysics3d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-11T22:34:14Z |
| rustsec-2023-0018 | Race Condition Enabling Link Following and Time-of-check Time-of-use (TOCTOU) | 2023-02-24T12:00:00Z | 2023-03-04T21:50:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-redis-2023-45145 | Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window. | 2024-03-06T11:03:25.305Z | 2026-03-20T09:47:33.381Z |
| bit-python-2026-3479 | pkgutil.get_data() does not enforce documented restrictions | 2026-03-20T09:21:01.169Z | 2026-03-20T09:47:33.381Z |
| bit-python-2025-13462 | tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling | 2026-03-14T08:49:56.012Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32594 | Parse Server GraphQL WebSocket endpoint bypasses security middleware | 2026-03-20T09:19:20.642Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32269 | Parse Server OAuth2 adapter app ID validation sends wrong token to introspection endpoint | 2026-03-16T09:53:45.375Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32248 | Parse Server: Account takeover via operator injection in authentication data identifier | 2026-03-16T09:53:42.464Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32242 | Parse Server OAuth2 adapter shares mutable state across providers via singleton instance | 2026-03-16T09:53:39.413Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-31828 | Parse Server has an LDAP injection via unsanitized user input in DN and group filter construction | 2026-03-12T14:48:18.251Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-31800 | Parse Server: Classes `_GraphQLConfig` and `_Audience` master key bypass via generic class routes | 2026-03-12T14:48:16.613Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30972 | Parse Server has a rate limit bypass via batch request endpoint | 2026-03-12T14:48:14.900Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30967 | Parse Server OAuth2 authentication adapter account takeover via identity spoofing | 2026-03-12T14:48:13.390Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30966 | Parse Server role escalation and CLP bypass via direct `_Join` table write | 2026-03-12T14:48:11.522Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30965 | Parse Server session token exfiltration via `redirectClassNameForKey` query parameter | 2026-03-12T14:48:09.696Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30962 | Parse Server has a protected fields bypass via logical query operators | 2026-03-12T14:48:07.977Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30949 | Parse Server is missing audience validation in Keycloak authentication adapter | 2026-03-12T14:48:06.075Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30948 | Parse Server has stored cross-site scripting (XSS) via SVG file upload | 2026-03-12T14:48:04.274Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30947 | Parse Server ha a bypass of class-level permissions in LiveQuery | 2026-03-12T14:48:02.496Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30946 | Parse Server affected by denial-of-service via unbounded query complexity in REST and GraphQL API | 2026-03-12T14:48:00.783Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30941 | Parse Server has a NoSQL injection via token type in password reset and email verification endpoints | 2026-03-12T14:47:58.977Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30939 | Parse Server has Denial of Service (DoS) and Cloud Function Dispatch Bypass via Prototype Chain Resolution | 2026-03-12T14:47:57.281Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30938 | Parse Server has denylist `requestKeywordDenylist` keyword scan bypass through nested object placement | 2026-03-12T14:47:55.401Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30925 | Parse Server affected by Regular Expression Denial of Service (ReDoS) via `$regex` query in LiveQuery | 2026-03-12T14:47:53.415Z | 2026-03-20T09:47:33.381Z |
| bit-nifi-2023-49145 | Apache NiFi: Improper Neutralization of Input in Advanced User Interface for Jolt | 2025-09-12T11:47:03.168Z | 2026-03-20T09:47:33.381Z |
| bit-mongodb-2020-7925 | Denial of Service when processing malformed Role names | 2024-03-06T10:58:54.976Z | 2026-03-20T09:47:33.381Z |
| bit-mongodb-2020-7923 | Specific GeoQuery can cause DoS against MongoDB Server | 2024-03-06T10:59:03.972Z | 2026-03-20T09:47:33.381Z |
| bit-mastodon-2025-67500 | Mastodon Error Handling Discrepancy Enables Private Status Existence Enumeration | 2025-12-11T11:41:16.693Z | 2026-03-20T09:47:33.381Z |
| bit-mastodon-2025-62605 | Mastodon quotes control can be bypassed | 2025-10-23T08:44:09.997Z | 2026-03-20T09:47:33.381Z |
| bit-mastodon-2023-42452 | Mastodon vulnerable to Stored XSS through the translation feature | 2024-03-06T10:55:46.292Z | 2026-03-20T09:47:33.381Z |
| bit-mastodon-2023-42451 | Mastodon Invalid Domain Name Normalization vulnerability | 2024-03-06T10:55:56.068Z | 2026-03-20T09:47:33.381Z |
| bit-magento-2022-42344 | [CVE-2021-36032] Magento IDOR Leads to Account Takeover | 2024-03-06T10:55:33.798Z | 2026-03-20T09:47:33.381Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-1059 | Multiples vulnérabilités dans Google Pixel | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| certfr-2025-avi-1058 | Multiples vulnérabilités dans Google Chrome | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| CERTFR-2025-AVI-1060 | Multiples vulnérabilités dans Python | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| CERTFR-2025-AVI-1059 | Multiples vulnérabilités dans Google Pixel | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| CERTFR-2025-AVI-1058 | Multiples vulnérabilités dans Google Chrome | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| certfr-2025-avi-1057 | Multiples vulnérabilités dans les produits VMware | 2025-12-02T00:00:00.000000 | 2025-12-02T00:00:00.000000 |
| certfr-2025-avi-1056 | Multiples vulnérabilités dans Google Android | 2025-12-02T00:00:00.000000 | 2025-12-02T00:00:00.000000 |
| CERTFR-2025-AVI-1057 | Multiples vulnérabilités dans les produits VMware | 2025-12-02T00:00:00.000000 | 2025-12-02T00:00:00.000000 |
| CERTFR-2025-AVI-1056 | Multiples vulnérabilités dans Google Android | 2025-12-02T00:00:00.000000 | 2025-12-02T00:00:00.000000 |
| certfr-2025-avi-1055 | Multiples vulnérabilités dans Zabbix | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1054 | Multiples vulnérabilités dans les produits VMware | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1053 | Vulnérabilité dans Stormshield Network VPN Client | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1052 | Vulnérabilité dans Mattermost Server | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-0936 | Multiples vulnérabilités dans Mattermost Server | 2025-10-29T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-1055 | Multiples vulnérabilités dans Zabbix | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-1054 | Multiples vulnérabilités dans les produits VMware | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-1053 | Vulnérabilité dans Stormshield Network VPN Client | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-1052 | Vulnérabilité dans Mattermost Server | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-0936 | Multiples vulnérabilités dans Mattermost Server | 2025-10-29T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1051 | Multiples vulnérabilités dans les produits IBM | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1050 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1049 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1048 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1047 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1046 | Multiples vulnérabilités dans les produits Moxa | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1045 | Vulnérabilité dans MISP | 2025-11-27T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| CERTFR-2025-AVI-1051 | Multiples vulnérabilités dans les produits IBM | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| CERTFR-2025-AVI-1050 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| CERTFR-2025-AVI-1049 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| CERTFR-2025-AVI-1048 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2021-004432 | Multiple Vulnerabilities in JP1/Automatic Operation | 2021-11-22T16:10+09:00 | 2021-11-22T16:10+09:00 |
| jvndb-2021-000103 | WordPress Plugin "Push Notifications for WordPress (Lite)" vulnerable to cross-site request forgery | 2021-11-16T13:42+09:00 | 2021-11-16T13:42+09:00 |
| jvndb-2021-000102 | rwtxt vulnerable to cross-site scripting | 2021-11-16T13:38+09:00 | 2021-11-16T13:38+09:00 |
| jvndb-2021-000101 | Unlimited Sitemap Generator vulnerable to cross-site request forgery | 2021-11-12T15:07+09:00 | 2021-11-12T15:07+09:00 |
| jvndb-2021-003840 | Cross-site Scripting Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2021-11-12T11:41+09:00 | 2021-11-12T11:41+09:00 |
| jvndb-2021-000100 | Multiple vulnerabilities in EC-CUBE 2 series | 2021-11-11T15:09+09:00 | 2021-11-11T15:09+09:00 |
| jvndb-2021-000094 | WordPress Plugin "Booking Package - Appointment Booking Calendar System" vulnerable to cross-site scripting | 2021-11-10T14:26+09:00 | 2021-11-10T14:26+09:00 |
| jvndb-2021-003811 | File Permission Vulnerability in Hitachi Automation Director, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center | 2021-11-05T15:04+09:00 | 2021-11-05T15:04+09:00 |
| jvndb-2021-003660 | Authentication Bypass Vulnerability in Hitachi Device Manager | 2021-11-01T15:56+09:00 | 2021-11-01T15:56+09:00 |
| jvndb-2021-003080 | OMRON CX-Supervisor vulnerable to out-of-bounds read | 2021-10-18T15:26+09:00 | 2021-11-01T15:37+09:00 |
| jvndb-2021-000096 | Android App "Mercari (Merpay) - Marketplace and Mobile Payments App" (Japan version) vulnerable to improper handling of Intent | 2021-10-29T15:11+09:00 | 2021-10-29T15:11+09:00 |
| jvndb-2021-000098 | ESET Cyber Security and ESET Endpoint series vulnerable to denial-of-service (DoS) | 2021-10-29T14:58+09:00 | 2021-10-29T14:58+09:00 |
| jvndb-2021-000095 | Multiple improper restriction of XML external entity reference (XXE) vulnerabilities in Office Server Document Converter | 2021-10-28T15:03+09:00 | 2021-10-28T15:03+09:00 |
| jvndb-2021-003385 | Trend Micro Endpoint security products for enterprises vulnerable to privilege escalation | 2021-10-26T12:35+09:00 | 2021-10-26T12:35+09:00 |
| jvndb-2021-000091 | 128 Technology Session Smart Router vulnerable to authentication bypass | 2021-10-18T14:58+09:00 | 2021-10-18T14:58+09:00 |
| jvndb-2021-000090 | Apache HTTP Server vulnerable to directory traversal | 2021-10-11T18:07+09:00 | 2021-10-11T18:07+09:00 |
| jvndb-2021-000089 | Nike App fails to restrict custom URL schemes properly | 2021-10-08T14:32+09:00 | 2021-10-08T14:32+09:00 |
| jvndb-2021-002810 | Information Disclosure Vulnerability in Hitachi Tuning Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2021-10-05T15:37+09:00 | 2021-10-05T15:37+09:00 |
| jvndb-2021-002774 | Trend Micro ServerProtect family vulnerable to authentication bypass | 2021-10-01T14:42+09:00 | 2021-10-01T14:42+09:00 |
| jvndb-2021-002752 | Trend Micro HouseCall for Home Networks vulnerable to privilege escalation | 2021-09-30T13:56+09:00 | 2021-09-30T13:56+09:00 |
| jvndb-2021-000085 | SNKRDUNK Market Place App for iOS vulnerable to improper server certificate verification | 2021-09-28T15:18+09:00 | 2021-09-28T15:18+09:00 |
| jvndb-2021-000086 | WordPress Plugin "OG Tags" vulnerable to cross-site request forgery | 2021-09-28T15:11+09:00 | 2021-09-28T15:11+09:00 |
| jvndb-2021-000084 | InBody App vulnerable to information disclosure | 2021-09-28T14:27+09:00 | 2021-09-28T14:27+09:00 |
| jvndb-2021-001123 | Multiple vulnerabilities in GROWI | 2021-03-09T14:17+09:00 | 2021-09-24T13:34+09:00 |
| jvndb-2021-000083 | EC-CUBE plugin "Order Status Batch Change Plug-in" vulnerable to cross-site scripting | 2021-09-16T14:33+09:00 | 2021-09-16T14:33+09:00 |
| jvndb-2021-000082 | EC-CUBE plugin "List (order management) item change plug-in" vulnerable to cross-site scripting | 2021-09-13T14:24+09:00 | 2021-09-13T14:24+09:00 |
| jvndb-2021-000074 | Multiple vulnerabilities in RevoWorks Browser | 2021-09-10T15:44+09:00 | 2021-09-10T15:44+09:00 |
| jvndb-2021-002342 | Trend Micro Security family vulnerable to improper handling of Directory Junction | 2021-09-03T16:10+09:00 | 2021-09-03T16:10+09:00 |
| jvndb-2020-000085 | Multiple vulnerabilities in GROWI | 2020-12-15T15:41+09:00 | 2021-08-30T16:29+09:00 |
| jvndb-2021-000080 | baserCMS vulnerable to cross-site scripting | 2021-08-27T13:29+09:00 | 2021-08-27T13:29+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-13970 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13970) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13969 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13969) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13968 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13968) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13967 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13967) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13966 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13966) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13965 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13965) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13964 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13964) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13963 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13963) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13962 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13962) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13961 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13961) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13960 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13960) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13959 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13959) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13958 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13958) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13957 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13957) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13956 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13956) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13955 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13955) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13954 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13954) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13953 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13953) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13952 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13952) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13951 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13951) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13950 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13950) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13949 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13949) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13948 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13948) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13947 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13947) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13946 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13946) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13945 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13945) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13944 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13944) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13943 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-13943) | 2026-03-16 | 2026-03-17 |
| cnvd-2026-13831 | Siemens SINEC Security Monitor信息泄露漏洞 | 2026-03-10 | 2026-03-17 |
| cnvd-2026-13802 | Siemens COMOS存在多个漏洞 | 2026-03-10 | 2026-03-17 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-05682 | Уязвимость функции dlopen() системной библиотеки glibc, позволяющая нарушителю выполнить … | 19.05.2025 | 16.02.2026 |
| bdu:2025-05635 | Уязвимость компонента API универсальной системы мониторинга Zabbix, позволяющая нарушител… | 16.05.2025 | 16.02.2026 |
| bdu:2025-05634 | Уязвимость веб-интейрфеса универсальной системы мониторинга Zabbix, позволяющая нарушител… | 16.05.2025 | 16.02.2026 |
| bdu:2025-05632 | Уязвимость сервера универсальной системы мониторинга Zabbix, позволяющая нарушителю вызва… | 16.05.2025 | 16.02.2026 |
| bdu:2025-05237 | Уязвимость компонента Cluster: General системы управления базами данных MySQL Cluster, по… | 05.05.2025 | 16.02.2026 |
| bdu:2025-05209 | Уязвимость программного средства для взаимодействия с серверами cURL, связанная с недоста… | 05.05.2025 | 16.02.2026 |
| bdu:2025-05199 | Уязвимость компонента Python API библиотеки libxml2, позволяющая нарушителю вызвать отказ… | 05.05.2025 | 16.02.2026 |
| bdu:2025-05194 | Уязвимость среды выполнения контейнеров containerd, связанная с целочисленным переполнени… | 05.05.2025 | 16.02.2026 |
| bdu:2025-05193 | Уязвимость функции xmlSnprintfElements() библиотеки libxml2, позволяющая нарушителю выпол… | 05.05.2025 | 16.02.2026 |
| bdu:2025-05059 | Уязвимость модуля аутентификации Linux-PAM, связанная с незащищённым хранением конфиденци… | 30.04.2025 | 16.02.2026 |
| bdu:2025-05051 | Уязвимость функции TLS-crypt-v2 сервера программного обеспечения OpenVPN, позволяющая нар… | 30.04.2025 | 16.02.2026 |
| bdu:2025-04863 | Уязвимость централизованной системы по управлению идентификацией пользователей FreeIPA, с… | 01.08.2025 | 16.02.2026 |
| bdu:2025-04857 | Уязвимость функции S_do_trans_invmap() интерпретатора языка программирования Perl, позвол… | 23.04.2025 | 16.02.2026 |
| bdu:2025-04820 | Уязвимость функции parse_monitor_flags() (net/wireless/nl80211.c) ядра операционной систе… | 23.04.2025 | 16.02.2026 |
| bdu:2025-04818 | Уязвимость файла drivers/net/caif/caif_virtio.c ядра операционной системы Linux, позволяю… | 23.04.2025 | 16.02.2026 |
| bdu:2025-04817 | Уязвимость функций gpio_rcar_config_interrupt_input_mode(), gpio_rcar_config_general_inpu… | 23.04.2025 | 16.02.2026 |
| bdu:2025-04816 | Уязвимость функции is_an_alpha2() (net/wireless/reg.c) ядра операционной системы Linux, п… | 23.04.2025 | 16.02.2026 |
| bdu:2025-04768 | Уязвимость службы sshd средства криптографической защиты OpenSSH, позволяющая нарушителю … | 23.04.2025 | 16.02.2026 |
| bdu:2025-04714 | Уязвимость функции hclge_ptp_get_cycle() ядра операционной системы Linux, позволяющая нар… | 19.04.2025 | 16.02.2026 |
| bdu:2025-04713 | Уязвимость функции bpf_program() драйвера (drivers/net/ppp/ppp_generic.c) ядра операционн… | 18.04.2025 | 16.02.2026 |
| bdu:2025-04684 | Уязвимость функции bpf_prog_map_compatible() модуля kernel/bpf/core.c ядра операционной с… | 17.04.2025 | 16.02.2026 |
| bdu:2025-04650 | Уязвимость функции smb2_lock() модуля fs/smb/server/smb2pdu.c ядра операционной системы L… | 16.04.2025 | 16.02.2026 |
| bdu:2025-04648 | Уязвимость функции ipc_msg_send_request() модуля fs/smb/server/transport_ipc.c ядра опера… | 16.04.2025 | 16.02.2026 |
| bdu:2025-04647 | Уязвимость функции resource_build_scaling_params() модуля drivers/gpu/drm/amd/display/dc/… | 16.04.2025 | 16.02.2026 |
| bdu:2025-04646 | Уязвимость функции mgmt_alloc_skb() модуля net/bluetooth/mgmt.c ядра операционной системы… | 16.04.2025 | 16.02.2026 |
| bdu:2025-04645 | Уязвимость функции mgmt_alloc_skb() модуля net/bluetooth/mgmt.c ядра операционной системы… | 16.04.2025 | 16.02.2026 |
| bdu:2025-04644 | Уязвимость функции rio_add_net() модуля drivers/rapidio/rio-scan.c ядра операционной сист… | 16.04.2025 | 16.02.2026 |
| bdu:2025-04621 | Уязвимость функции input_event() модуля drivers/hid/hid-appleir.c ядра операционной систе… | 16.04.2025 | 16.02.2026 |
| bdu:2025-04620 | Уязвимость модуля drivers/gpio/gpio-aggregator.c ядра операционной системы Linux, позволя… | 16.04.2025 | 16.02.2026 |
| bdu:2025-04614 | Уязвимость функции mptcp_pm_nl_append_new_local_addr() модуля net/mptcp/pm_netlink.c ядра… | 09.06.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201006-1245 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2024-07-23T20:20:13.577000Z |
| var-200906-0618 | Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops fi… | 2024-07-23T20:20:09.578000Z |
| var-200603-0283 | Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 1… | 2024-07-23T20:19:38.862000Z |
| var-202110-1513 | This issue was addressed with improved checks. This issue is fixed in iOS 14.8 and iPadOS… | 2024-07-23T20:19:37.537000Z |
| var-202201-0369 | Heap-based Buffer Overflow in GitHub repository vim prior to 8.2. vim Exists in an out-of… | 2024-07-23T20:19:36.004000Z |
| var-201512-0325 | The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml… | 2024-07-23T20:19:32.648000Z |
| var-202205-1313 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2024-07-23T20:19:31.445000Z |
| var-201512-0531 | The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not prop… | 2024-07-23T20:19:31.632000Z |
| var-201902-0242 | In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishand… | 2024-07-23T20:19:24.838000Z |
| var-201011-0043 | The WebCore::HTMLLinkElement::process function in WebCore/html/HTMLLinkElement.cpp in Web… | 2024-07-23T20:19:23.854000Z |
| var-201302-0144 | Integer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on… | 2024-07-23T20:19:19.837000Z |
| var-200603-0272 | IPSec when used with VPN networks in Mac OS X 10.4 through 10.4.5 allows remote attackers… | 2024-07-23T20:19:19.547000Z |
| var-201912-0458 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T20:19:18.056000Z |
| var-201908-1840 | When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_dat… | 2024-07-23T20:18:47.623000Z |
| var-201111-0190 | Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.… | 2024-07-23T20:18:23.378000Z |
| var-201211-0319 | Race condition in WebKit in Apple iOS before 6.0.1 and Safari before 6.0.2 allows remote … | 2024-07-23T20:18:22.202000Z |
| var-200611-0488 | Unspecified vulnerability in Apple Mac OS X 10.4.8, and possibly other versions, allows r… | 2024-07-23T20:18:22.657000Z |
| var-201912-0633 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:18:16.634000Z |
| var-200009-0023 | VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x b… | 2024-07-23T20:18:16.537000Z |
| var-200904-0809 | The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.1… | 2024-07-23T20:18:12.278000Z |
| var-200808-0470 | Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Ap… | 2024-07-23T20:18:12.672000Z |
| var-202110-1620 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:18:10.248000Z |
| var-201704-1397 | The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certa… | 2024-07-23T20:18:09.167000Z |
| var-200609-1220 | The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.… | 2024-07-23T20:18:09.590000Z |
| var-202112-1654 | A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a … | 2024-07-23T20:18:07.199000Z |
| var-201504-0362 | The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4… | 2024-07-23T20:18:07.348000Z |
| var-200703-0026 | The SSH key generation process in OpenSSH in Apple Mac OS X 10.3.9 and 10.4 through 10.4.… | 2024-07-23T20:17:59.571000Z |
| var-201912-0536 | A cross-origin issue existed with the fetch API. This was addressed with improved input v… | 2024-07-23T20:17:22.170000Z |
| var-201806-0859 | Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the L… | 2024-07-23T20:17:17.373000Z |
| var-201912-0497 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:17:16.698000Z |