Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-32171 |
8.8 (3.1)
|
Azure Logic Apps Elevation of Privilege Vulnerability |
Microsoft |
Azure Logic Apps |
2026-04-14T16:58:31.359Z | 2026-04-15T21:55:21.053Z |
| CVE-2026-32164 |
7.8 (3.1)
|
Windows User Interface Core Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:30.576Z | 2026-04-15T21:55:20.438Z |
| CVE-2026-32163 |
7.8 (3.1)
|
Windows User Interface Core Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 1809 |
2026-04-14T16:58:29.994Z | 2026-04-15T21:55:19.864Z |
| CVE-2026-32162 |
8.4 (3.1)
|
Windows COM Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2026-04-14T16:58:29.342Z | 2026-04-15T21:55:19.222Z |
| CVE-2026-32155 |
7.8 (3.1)
|
Desktop Window Manager Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 21H2 |
2026-04-14T16:58:28.635Z | 2026-04-15T21:55:18.672Z |
| CVE-2026-32153 |
7.8 (3.1)
|
Windows Speech Runtime Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2026-04-14T16:58:27.985Z | 2026-04-15T21:55:18.039Z |
| CVE-2026-32151 |
6.5 (3.1)
|
Windows Shell Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:26.832Z | 2026-04-15T21:55:17.450Z |
| CVE-2026-32150 |
7 (3.1)
|
Windows Function Discovery Service (fdwsd.dll) Elevati… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:26.119Z | 2026-04-15T21:55:16.876Z |
| CVE-2026-32149 |
7.3 (3.1)
|
Windows Hyper-V Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:25.359Z | 2026-04-15T21:55:16.275Z |
| CVE-2026-32091 |
8.4 (3.1)
|
Microsoft Brokering File System Elevation of Privilege… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:24.748Z | 2026-04-15T21:55:15.700Z |
| CVE-2026-32088 |
6.1 (3.1)
|
Windows Biometric Service Security Feature Bypass Vuln… |
Microsoft |
Windows 10 Version 1809 |
2026-04-14T16:58:24.129Z | 2026-04-15T21:55:15.051Z |
| CVE-2026-32086 |
7 (3.1)
|
Windows Function Discovery Service (fdwsd.dll) Elevati… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:23.342Z | 2026-04-15T21:55:14.487Z |
| CVE-2026-32084 |
5.5 (3.1)
|
Windows Print Spooler Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:22.719Z | 2026-04-15T21:55:13.771Z |
| CVE-2026-32080 |
7 (3.1)
|
Windows WalletService Elevation of Privilege Vulnerability |
Microsoft |
Windows Server 2016 |
2026-04-14T16:58:22.140Z | 2026-04-15T21:55:13.102Z |
| CVE-2026-32079 |
5.5 (3.1)
|
Web Account Manager Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:21.509Z | 2026-04-15T21:55:12.535Z |
| CVE-2026-32078 |
7.8 (3.1)
|
Windows Projected File System Elevation of Privilege V… |
Microsoft |
Windows 10 Version 1809 |
2026-04-14T16:58:20.779Z | 2026-04-15T21:55:11.886Z |
| CVE-2026-32077 |
7.8 (3.1)
|
Windows UPnP Device Host Elevation of Privilege Vulner… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:20.124Z | 2026-04-15T21:55:11.216Z |
| CVE-2026-32076 |
7.8 (3.1)
|
Windows Storage Spaces Controller Elevation of Privile… |
Microsoft |
Windows 11 version 22H3 |
2026-04-14T16:58:19.394Z | 2026-04-15T21:55:10.620Z |
| CVE-2026-32074 |
7.8 (3.1)
|
Windows Projected File System Elevation of Privilege V… |
Microsoft |
Windows 10 Version 1809 |
2026-04-14T16:58:18.455Z | 2026-04-15T21:55:10.023Z |
| CVE-2026-32072 |
6.2 (3.1)
|
Active Directory Spoofing Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:17.336Z | 2026-04-15T21:55:09.343Z |
| CVE-2026-32070 |
7 (3.1)
|
Windows Common Log File System Driver Elevation of Pri… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:16.731Z | 2026-04-15T21:55:08.699Z |
| CVE-2026-32069 |
7.8 (3.1)
|
Windows Projected File System Elevation of Privilege V… |
Microsoft |
Windows 10 Version 1809 |
2026-04-14T16:58:16.106Z | 2026-04-15T21:55:08.014Z |
| CVE-2026-32068 |
7 (3.1)
|
Windows Simple Search and Discovery Protocol (SSDP) Se… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:15.166Z | 2026-04-15T21:55:07.458Z |
| CVE-2026-27930 |
5.5 (3.1)
|
Windows GDI Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:14.503Z | 2026-04-15T21:55:06.716Z |
| CVE-2026-27928 |
8.7 (3.1)
|
Windows Hello Security Feature Bypass Vulnerability |
Microsoft |
Windows Server 2016 |
2026-04-14T16:58:13.895Z | 2026-04-15T21:55:06.097Z |
| CVE-2026-27925 |
6.5 (3.1)
|
Windows UPnP Device Host Information Disclosure Vulner… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:13.263Z | 2026-04-15T21:55:05.514Z |
| CVE-2026-27923 |
7.8 (3.1)
|
Desktop Window Manager Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:12.545Z | 2026-04-15T21:55:04.987Z |
| CVE-2026-27922 |
7 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:11.466Z | 2026-04-15T21:55:04.426Z |
| CVE-2026-27920 |
7.8 (3.1)
|
Windows UPnP Device Host Elevation of Privilege Vulner… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:10.717Z | 2026-04-15T21:55:03.793Z |
| CVE-2026-27916 |
7.8 (3.1)
|
Windows UPnP Device Host Elevation of Privilege Vulner… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:09.994Z | 2026-04-15T21:55:03.076Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2006-4977 |
N/A
|
Multiple unrestricted file upload vulnerabilities… |
n/a |
n/a |
2006-09-25T01:00:00.000Z | 2024-08-07T19:32:22.303Z |
| CVE-2006-4976 |
N/A
|
The Date Library in John Lim ADOdb Library for PH… |
n/a |
n/a |
2006-09-25T01:00:00.000Z | 2024-08-07T19:32:22.386Z |
| CVE-2006-4975 |
N/A
|
Yahoo! Messenger for WAP permits saving messages … |
n/a |
n/a |
2006-09-25T01:00:00.000Z | 2024-08-07T19:32:22.820Z |
| CVE-2006-4974 |
N/A
|
Buffer overflow in Ipswitch WS_FTP Limited Editio… |
n/a |
n/a |
2006-09-25T01:00:00.000Z | 2024-08-07T19:32:22.818Z |
| CVE-2006-4973 |
N/A
|
Cross-site scripting (XSS) vulnerability in Defau… |
n/a |
n/a |
2006-09-25T01:00:00.000Z | 2024-08-07T19:32:22.329Z |
| CVE-2006-4972 |
N/A
|
Cross-site scripting (XSS) vulnerability in archi… |
n/a |
n/a |
2006-09-25T01:00:00.000Z | 2024-08-07T19:32:22.919Z |
| CVE-2006-4971 |
N/A
|
MyBB (aka MyBulletinBoard) allows remote attacker… |
n/a |
n/a |
2006-09-25T01:00:00.000Z | 2024-08-07T19:32:22.427Z |
| CVE-2006-4970 |
N/A
|
PHP remote file inclusion vulnerability in enc/co… |
n/a |
n/a |
2006-09-25T01:00:00.000Z | 2024-08-07T19:32:22.344Z |
| CVE-2006-4969 |
N/A
|
Multiple PHP remote file inclusion vulnerabilitie… |
n/a |
n/a |
2006-09-25T01:00:00.000Z | 2024-08-07T19:32:22.435Z |
| CVE-2006-4968 |
N/A
|
PHP remote file inclusion vulnerability in includ… |
n/a |
n/a |
2006-09-25T01:00:00.000Z | 2024-08-07T19:32:22.341Z |
| CVE-2006-4967 |
N/A
|
Multiple cross-site scripting (XSS) vulnerabiliti… |
n/a |
n/a |
2006-09-25T01:00:00.000Z | 2024-08-07T19:32:22.501Z |
| CVE-2006-4966 |
N/A
|
PHP remote file inclusion vulnerability in inc/if… |
n/a |
n/a |
2006-09-25T00:00:00.000Z | 2024-08-07T19:32:22.440Z |
| CVE-2006-4965 |
N/A
|
Apple QuickTime 7.1.3 Player and Plug-In allows r… |
n/a |
n/a |
2006-09-25T00:00:00.000Z | 2024-08-07T19:32:22.652Z |
| CVE-2006-4964 |
N/A
|
Cross-site scripting (XSS) vulnerability in MAXde… |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.864Z |
| CVE-2006-4963 |
N/A
|
Directory traversal vulnerability in index.php in… |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.680Z |
| CVE-2006-4962 |
N/A
|
Directory traversal vulnerability in pbd_engine.p… |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.339Z |
| CVE-2006-4961 |
N/A
|
SQL injection vulnerability in the GetModuleConfi… |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.331Z |
| CVE-2006-4960 |
N/A
|
Cross-site scripting (XSS) vulnerability in index… |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.803Z |
| CVE-2006-4959 |
N/A
|
Sun Secure Global Desktop (SSGD, aka Tarantella) … |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.394Z |
| CVE-2006-4958 |
N/A
|
Multiple cross-site scripting (XSS) vulnerabiliti… |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.972Z |
| CVE-2006-4957 |
N/A
|
SQL injection vulnerability in the GetMember func… |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.428Z |
| CVE-2006-4956 |
N/A
|
Cross-site scripting (XSS) vulnerability in the u… |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.816Z |
| CVE-2006-4955 |
N/A
|
Directory traversal vulnerability in the download… |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.534Z |
| CVE-2006-4954 |
N/A
|
The updateuser servlet in Neon WebMail for Java b… |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.338Z |
| CVE-2006-4953 |
N/A
|
Multiple SQL injection vulnerabilities in Neon We… |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.797Z |
| CVE-2006-4952 |
N/A
|
The updatemail servlet in Neon WebMail for Java b… |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.919Z |
| CVE-2006-4951 |
N/A
|
Neon WebMail for Java before 5.08 allows remote a… |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.333Z |
| CVE-2006-4950 |
N/A
|
Cisco IOS 12.2 through 12.4 before 20060920, as u… |
n/a |
n/a |
2006-09-23T10:00:00.000Z | 2024-08-07T19:32:22.342Z |
| CVE-2006-4949 |
N/A
|
Cross-site scripting (XSS) vulnerability in the D… |
n/a |
n/a |
2006-09-23T01:00:00.000Z | 2024-08-07T19:32:22.389Z |
| CVE-2006-4948 |
N/A
|
Stack-based buffer overflow in tftpd.exe in ProSy… |
n/a |
n/a |
2006-09-23T01:00:00.000Z | 2024-08-07T19:32:22.332Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2006-4967 | Multiple cross-site scripting (XSS) vulnerabilities in NextAge Cart allow remote attackers to injec… | 2006-09-25T01:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4966 | PHP remote file inclusion vulnerability in inc/ifunctions.php in chumpsoft phpQuestionnaire (phpQ) … | 2006-09-25T00:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4965 | Apple QuickTime 7.1.3 Player and Plug-In allows remote attackers to execute arbitrary JavaScript co… | 2006-09-25T00:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4964 | Cross-site scripting (XSS) vulnerability in MAXdev MDPro 1.0.76 before 20060918 allows remote attac… | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4963 | Directory traversal vulnerability in index.php in Exponent CMS 0.96.3 allows remote attackers to re… | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4962 | Directory traversal vulnerability in pbd_engine.php in Php Blue Dragon 2.9.1 and earlier allows rem… | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4961 | SQL injection vulnerability in the GetModuleConfig function in public_includes/pub_kernel/pbd_modul… | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4960 | Cross-site scripting (XSS) vulnerability in index.php Php Blue Dragon 2.9.1 and earlier allows remo… | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4959 | Sun Secure Global Desktop (SSGD, aka Tarantella) before 4.3 allows remote attackers to obtain sensi… | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4958 | Multiple cross-site scripting (XSS) vulnerabilities in Sun Secure Global Desktop (SSGD, aka Tarante… | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4957 | SQL injection vulnerability in the GetMember function in functions.php in MyReview 1.9.4 allows rem… | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4956 | Cross-site scripting (XSS) vulnerability in the updateuser servlet in Neon WebMail for Java before … | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4955 | Directory traversal vulnerability in the downloadfile servlet in Neon WebMail for Java before 5.08 … | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4954 | The updateuser servlet in Neon WebMail for Java before 5.08 does not validate the in_id parameter, … | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4953 | Multiple SQL injection vulnerabilities in Neon WebMail for Java before 5.08 allow remote attackers … | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4952 | The updatemail servlet in Neon WebMail for Java before 5.08 allows remote attackers to move e-mail … | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4951 | Neon WebMail for Java before 5.08 allows remote attackers to execute arbitrary Java (JSP) code by s… | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4950 | Cisco IOS 12.2 through 12.4 before 20060920, as used by Cisco IAD2430, IAD2431, and IAD2432 Integra… | 2006-09-23T10:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4949 | Cross-site scripting (XSS) vulnerability in the Drupal 4.6 Site Profile Directory (profile_pages.mo… | 2006-09-23T01:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4948 | Stack-based buffer overflow in tftpd.exe in ProSysInfo TFTP Server TFTPDWIN 0.4.2 and earlier allow… | 2006-09-23T01:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4947 | Cross-site scripting (XSS) vulnerability in the Drupal 4.7 Search Keywords module before 1.15 2006/… | 2006-09-23T01:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4946 | PHP remote file inclusion vulnerability in include/startup.inc.php in CMSDevelopment Business Card … | 2006-09-23T01:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4945 | Multiple PHP remote file inclusion vulnerabilities in Cardway (aka Frederic Boudaud) DigitalWebShop… | 2006-09-23T01:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4944 | PHP remote file inclusion vulnerability in includes/pear/Net/DNS/RR.php in ProgSys 0.151 and earlie… | 2006-09-23T00:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4943 | course/jumpto.php in Moodle before 1.6.2 does not validate the session key (sesskey) before providi… | 2006-09-23T00:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4942 | Moodle before 1.6.2, when the configuration lacks (1) algebra or (2) tex filters, allows remote aut… | 2006-09-23T00:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4941 | Multiple cross-site scripting (XSS) vulnerabilities in Moodle before 1.6.2 might allow remote attac… | 2006-09-23T00:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4940 | login/forgot_password.php in Moodle before 1.6.2 allows remote attackers to obtain sensitive inform… | 2006-09-23T00:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4939 | backup/backup_scheduled.php in Moodle before 1.6.2 generates trace data with the full backup pathna… | 2006-09-23T00:07:00.000 | 2026-04-16T00:27:16.627 |
| fkie_cve-2006-4938 | help.php in Moodle before 1.6.2 does not check the existence of certain help files before including… | 2006-09-23T00:07:00.000 | 2026-04-16T00:27:16.627 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-8mc5-53m5-3qj2 |
5.3 (3.1)
6.9 (4.0)
|
Apache Tomcat has an Improper Input Validation vulnerability | 2026-04-09T21:31:29Z | 2026-04-15T22:53:15Z |
| ghsa-563x-q5rq-57qp |
7.5 (3.1)
|
Apache Tomcat has an HTTP Request/Response Smuggling vulnerability | 2026-04-09T21:31:29Z | 2026-04-15T22:39:21Z |
| ghsa-69r9-qgr7-g2wj |
7.5 (3.1)
|
Apache Tomcat Missing Encryption of Sensitive Data vulnerability | 2026-04-09T21:31:30Z | 2026-04-15T22:36:04Z |
| ghsa-h468-7pvh-8vr8 |
7.5 (3.1)
8.7 (4.0)
|
Apache Tomcat: Padding Oracle vulnerability in EncryptInterceptor | 2026-04-09T21:31:29Z | 2026-04-15T21:33:40Z |
| ghsa-xm65-r32w-c46p |
|
Out of bounds read in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to ob… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-xhc9-2rpq-wh58 |
8.3 (3.1)
|
Use after free in Dawn in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had c… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-wrr6-q4vw-3g77 |
|
Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to exec… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-vm22-5c7q-8w8h |
8.3 (3.1)
|
Use after free in Viz in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had co… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-vhh6-f54w-x5gw |
8.3 (3.1)
|
Uninitialized Use in Accessibility in Google Chrome on Windows prior to 147.0.7727.101 allowed a re… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-qwmx-478f-c8cp |
8.8 (3.1)
|
Use after free in Video in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execu… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-qhxw-36rq-x2m4 |
8.3 (3.1)
|
Use after free in Graphite in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who h… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-qh37-w9pg-j55f |
7.3 (3.1)
|
A flaw was found in gimp. This buffer overflow vulnerability in the GIF image loading component's `… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-qg3c-xm7q-9c4x |
3.1 (3.1)
|
Insufficient policy enforcement in Passwords in Google Chrome prior to 147.0.7727.101 allowed a rem… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-qcvg-hwr7-r9v7 |
3.1 (3.1)
|
Insufficient policy enforcement in CORS in Google Chrome prior to 147.0.7727.101 allowed a remote a… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-q6m3-mcr7-qwwq |
|
Out of bounds read in Media in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-q4f4-mqcx-4prx |
8.3 (3.1)
|
Out of bounds write in GPU in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who h… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-q22x-99q7-fr6w |
6.5 (3.1)
|
A flaw was found in FFmpeg. A remote attacker could exploit this vulnerability by providing a speci… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-p824-jmv3-c7rj |
|
Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker t… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-mvj2-3qfg-7mxp |
8.8 (3.1)
|
Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentia… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-m8qq-h68v-7p42 |
8.8 (3.1)
|
Use after free in Cast in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execut… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-j7wg-hx8x-r38h |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker t… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-hmgp-8pgg-h7pp |
8.8 (3.1)
|
Use after free in Permissions in Google Chrome on Android prior to 147.0.7727.101 allowed a remote … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-hh8m-xqf2-mgfv |
8.8 (3.1)
|
Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-gjmf-r9m5-967q |
8.8 (3.1)
|
Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-g6hr-fwwc-8cg8 |
7.8 (3.1)
8.5 (4.0)
|
Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows l… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-fmvf-422w-w34q |
|
Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to exec… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-f4mv-qxg4-7wq3 |
|
Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to pote… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-9w25-v364-3jpm |
8.8 (3.1)
|
Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:19Z |
| ghsa-6r59-54c6-3757 |
8.8 (3.1)
|
Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execu… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-5hwj-hjjc-gm39 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to ex… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-36 |
9.8 (3.1)
|
Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/valida… | langflow | 2025-04-07T15:15:44+00:00 | 2025-05-07T19:22:44.993642+00:00 |
| pysec-2024-246 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Starting in… | vyper | 2024-04-25T17:15:50+00:00 | 2025-05-05T19:21:20.899426+00:00 |
| pysec-2024-111 |
9.1 (3.1)
|
A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langcha… | langchain | 2024-10-29T13:15:00Z | 2025-05-02T18:39:47.588215Z |
| pysec-2024-245 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated user… | apache-airflow | 2024-02-29T11:15:08+00:00 | 2025-05-01T21:22:38.598048+00:00 |
| pysec-2025-35 |
7.5 (3.1)
|
Weblate is a web based localization tool. Prior to version 5.11, when creating a new comp… | weblate | 2025-04-15T21:16:04+00:00 | 2025-04-30T17:22:51.467257+00:00 |
| pysec-2025-34 |
|
The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_… | picklescan | 2025-04-24T01:15:49+00:00 | 2025-04-24T03:08:15.436691+00:00 |
| pysec-2025-33 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the… | vyper | 2025-01-14T18:16:05+00:00 | 2025-04-23T21:23:01.322686+00:00 |
| pysec-2025-32 |
9.8 (3.1)
|
BentoML is a Python library for building online serving systems optimized for AI apps and… | bentoml | 2025-04-09T16:15:25+00:00 | 2025-04-22T19:21:34.073355+00:00 |
| pysec-2025-31 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statemen… | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.116292+00:00 |
| pysec-2025-30 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.064106+00:00 |
| pysec-2025-29 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.005382+00:00 |
| pysec-2025-28 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
| pysec-2025-27 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
| pysec-2025-26 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.645758+00:00 |
| pysec-2025-25 |
6.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middle… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.532849+00:00 |
| pysec-2025-24 |
7.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the /api/remove… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.486485+00:00 |
| pysec-2025-23 |
|
Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Inform… | ray | 2025-03-06T05:15:16+00:00 | 2025-04-09T17:27:27.434099+00:00 |
| pysec-2025-22 |
9.8 (3.1)
|
A vulnerability, that could result in Remote Code Execution (RCE), has been found in Plot… | plotai | 2025-03-10T14:15:24+00:00 | 2025-04-09T17:27:27.203714+00:00 |
| pysec-2025-21 |
9.8 (3.1)
|
picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model arch… | picklescan | 2025-03-10T12:15:12+00:00 | 2025-04-09T17:27:27.016747+00:00 |
| pysec-2023-311 |
5.4 (3.1)
|
plone.namedfile allows users to handle `File` and `Image` fields targeting, but not depen… | plone-namedfile | 2023-09-21T15:15:10+00:00 | 2025-04-09T17:27:27.153848+00:00 |
| pysec-2022-43179 |
7.3 (3.1)
|
Poetry is a dependency manager for Python. To handle dependencies that come from a Git re… | poetry | 2022-09-07T19:15:08+00:00 | 2025-04-09T17:27:27.255151+00:00 |
| pysec-2021-891 |
7.8 (3.1)
|
CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 S… | salt | 2021-03-03T10:15:13+00:00 | 2025-04-09T17:27:27.582884+00:00 |
| pysec-2025-20 |
6.5 (3.1)
|
picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes i… | picklescan | 2025-03-10T12:15:10+00:00 | 2025-04-09T17:27:26.966215+00:00 |
| pysec-2025-19 |
9.8 (3.1)
|
picklescan before 0.0.22 only considers standard pickle file extensions in the scope for … | picklescan | 2025-03-03T19:15:34+00:00 | 2025-04-09T17:27:26.916350+00:00 |
| pysec-2025-18 |
|
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craf… | picklescan | 2025-02-26T15:15:24+00:00 | 2025-04-09T17:27:26.867210+00:00 |
| pysec-2025-17 |
5.5 (3.1)
|
In mlflow/mlflow version 2.18, an admin is able to create a new user account without sett… | mlflow | 2025-03-20T10:15:54+00:00 | 2025-04-09T17:27:26.322333+00:00 |
| pysec-2023-310 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NO… | mobsf | 2023-09-21T22:15:11+00:00 | 2025-04-09T17:27:26.663665+00:00 |
| pysec-2023-309 |
8.8 (3.1)
|
Path Traversal in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-13T00:15:07+00:00 | 2025-04-09T17:27:26.271200+00:00 |
| pysec-2023-308 |
10.0 (3.1)
|
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0. | mlflow | 2023-07-19T01:15:10+00:00 | 2025-04-09T17:27:26.223213+00:00 |
| pysec-2025-16 |
7.5 (3.1)
|
LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vu… | lnbits | 2025-04-06T20:15:15+00:00 | 2025-04-09T17:27:25.872691+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33851 | phpecc, as used in paragonie/phpecc before 2.0.1, has a branch-based timing leak in Point… | 2024-04-28T05:02:07.732559Z |
| gsd-2024-33850 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.952536Z |
| gsd-2024-33849 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.924449Z |
| gsd-2024-4295 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:06.068263Z |
| gsd-2024-4294 | A vulnerability, which was classified as critical, has been found in PHPGurukul Doctor Ap… | 2024-04-28T05:02:06.079201Z |
| gsd-2024-4293 | A vulnerability classified as problematic was found in PHPGurukul Doctor Appointment Mana… | 2024-04-28T05:02:06.052534Z |
| gsd-2024-4292 | A vulnerability classified as critical has been found in Contemporary Controls BASrouter … | 2024-04-28T05:02:06.073286Z |
| gsd-2024-4291 | A vulnerability was found in Tenda A301 15.13.08.12_multi_TDE01. It has been rated as cri… | 2024-04-28T05:02:06.058388Z |
| gsd-2023-52722 | An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER … | 2024-04-28T05:01:28.746814Z |
| gsd-2022-48685 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.870720Z |
| gsd-2022-48684 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.715598Z |
| gsd-2024-24777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:24.547536Z |
| gsd-2024-28875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:20.401696Z |
| gsd-2024-33846 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.353086Z |
| gsd-2024-33845 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.569462Z |
| gsd-2024-33844 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.384822Z |
| gsd-2024-33843 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393431Z |
| gsd-2024-33842 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.286185Z |
| gsd-2024-33841 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393169Z |
| gsd-2024-33840 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.586722Z |
| gsd-2024-33839 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.579161Z |
| gsd-2024-33838 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.585807Z |
| gsd-2024-33837 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.377806Z |
| gsd-2024-33836 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.309729Z |
| gsd-2024-33835 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.550838Z |
| gsd-2024-33834 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.333945Z |
| gsd-2024-33833 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.551960Z |
| gsd-2024-33832 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.298682Z |
| gsd-2024-33831 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.326184Z |
| gsd-2024-33830 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.395389Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2653 | Malicious code in pinlogger (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2652 | Malicious code in onewin-landing (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:19Z |
| mal-2026-2648 | Malicious code in okx-nav (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2646 | Malicious code in okfe-serverless-conf (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2645 | Malicious code in okassistant (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2643 | Malicious code in ms-affiliate-links (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:19Z |
| mal-2026-2642 | Malicious code in chatbotloader (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2639 | Malicious code in bytefrontier (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:19Z |
| mal-2026-2637 | Malicious code in apmfe (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:19Z |
| mal-2026-2640 | Malicious code in bytefrontier-core (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:18Z |
| mal-2026-2647 | Malicious code in okx-data (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:14Z |
| mal-2026-2649 | Malicious code in okxglobal (npm) | 2026-04-14T11:47:13Z | 2026-04-14T11:47:13Z |
| mal-2026-2651 | Malicious code in one-translations (npm) | 2026-04-14T11:47:11Z | 2026-04-14T11:47:12Z |
| mal-2026-2650 | Malicious code in one-sdui (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:12Z |
| mal-2026-2638 | Malicious code in billing-paywidget (npm) | 2026-04-14T11:47:12Z | 2026-04-14T11:47:12Z |
| mal-2026-2655 | Malicious code in tailwind-lines-clamp (npm) | 2026-04-14T11:38:14Z | 2026-04-14T11:38:15Z |
| mal-2026-2636 | Malicious code in seaport-core-16 (npm) | 2026-04-14T11:37:00Z | 2026-04-14T11:37:08Z |
| mal-2026-2635 | Malicious code in pubnub-element (npm) | 2026-04-14T11:37:00Z | 2026-04-14T11:37:01Z |
| mal-2026-2633 | Malicious code in markdownlint-rule-link-pattern (npm) | 2026-04-14T11:37:00Z | 2026-04-14T11:37:00Z |
| mal-2026-2631 | Malicious code in babel-plugin-blocks (npm) | 2026-04-14T11:37:00Z | 2026-04-14T11:37:00Z |
| mal-2026-2632 | Malicious code in magentaa11y (npm) | 2026-04-14T11:31:05Z | 2026-04-14T11:31:12Z |
| mal-2026-2634 | Malicious code in percy-cake-docker (npm) | 2026-04-14T11:31:04Z | 2026-04-14T11:31:05Z |
| mal-2026-2630 | Malicious code in gate-apis (PyPI) | 2026-04-14T10:23:40Z | 2026-04-14T10:23:40Z |
| mal-2026-2629 | Malicious code in stacks-editor (npm) | 2026-04-14T08:55:57Z | 2026-04-14T08:55:57Z |
| mal-2026-2628 | Malicious code in svchost (PyPI) | 2026-04-14T05:42:26Z | 2026-04-14T05:42:26Z |
| mal-2026-2627 | Malicious code in pckg-sv (PyPI) | 2026-04-14T05:35:20Z | 2026-04-14T05:35:20Z |
| mal-2026-2492 | Malicious code in admin0911 (npm) | 2026-04-05T15:30:57Z | 2026-04-14T01:05:14Z |
| mal-2026-2282 | Malicious code in @adac-fahrzeugplattform/ui (npm) | 2026-03-29T04:43:26Z | 2026-04-14T01:05:13Z |
| mal-2026-2626 | Malicious code in getcardslib (npm) | 2026-04-14T00:07:56Z | 2026-04-14T00:07:56Z |
| mal-2026-2624 | Malicious code in asciitoart (PyPI) | 2026-04-13T21:26:29Z | 2026-04-13T22:22:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0119 | Linux Kernel: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0111 | FreeRDP: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0086 | Linux Kernel: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0009 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2941 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-30T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2929 | Linux Kernel: Mehrere Schwachstellen | 2025-12-28T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2920 | Linux Kernel: Mehrere Schwachstellen | 2025-12-23T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2915 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-23T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2914 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-22T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2904 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-18T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2868 | Linux Kernel: Mehrere Schwachstellen | 2025-12-16T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2765 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-08T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2756 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-07T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2747 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2658 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2651 | GnuTLS: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-19T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2637 | Rsync: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-11-18T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2600 | PostgreSQL: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-13T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2595 | Linux Kernel: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2579 | Linux Kernel: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2568 | Red Hat Enterprise Linux (kea): Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-11T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2531 | Linux Kernel: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-11-09T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2483 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-11-03T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2450 | Linux Kernel: Mehrere Schwachstellen | 2025-10-29T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2441 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-29T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2431 | Linux Kernel: Mehrere Schwachstellen | 2025-10-28T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2430 | Linux Kernel: Mehrere Schwachstellen | 2025-10-27T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2420 | Apache Tomcat: Mehrere Schwachstellen | 2025-10-27T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2407 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2365 | Oracle Java SE: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-069-02 | Lantronix EDS3000PS and EDS5000 | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| icsa-26-069-01 | Apeman Cameras | 2026-03-10T06:00:00.000000Z | 2026-03-10T06:00:00.000000Z |
| icsa-26-069-04 | Ceragon Siklu MultiHaul and EtherHaul Series | 2026-03-10T05:00:00.000000Z | 2026-03-10T05:00:00.000000Z |
| icsa-26-064-01 | Delta Electronics CNCSoft-G2 | 2026-03-05T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-25-350-02 | Johnson Controls PowerG, IQPanel and IQHub (Update A) | 2025-12-16T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-25-343-01 | Universal Boot Loader (U-Boot) (Update A) | 2025-12-09T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-22-020-01 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric HMI SCADA (Update B) | 2022-01-20T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| va-25-297-01 | IBM DOORS Next Generation multiple vulnerabilities | 2025-10-22T18:45:47Z | 2026-03-04T00:00:00Z |
| icsa-26-062-05 | Labkotec LID-3300IP | 2026-03-03T07:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-04 | Portwell Engineering Toolkits | 2026-03-03T07:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-03 | Hitachi Energy RTU500 Product | 2026-02-24T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-02 | Hitachi Energy Relion REB500 Product | 2026-02-24T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-01 | Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module | 2026-03-03T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-25-023-02 | Hitachi Energy RTU500 Series Product (Update B) | 2024-04-30T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-08 | Everon OCPP Backends | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-07 | ePower epower.ie | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-06 | Mobiliti e-mobi.hu | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-057-10 | Copeland XWEB and XWEB Pro | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-09 | Yokogawa CENTUM VP R6, R7 | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-08 | Mobility46 mobility46.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-07 | EV Energy ev.energy | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-06 | SWITCH EV swtchenergy.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-05 | Chargemap chargemap.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-04 | EV2GO ev2go.io | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-03 | CloudCharge cloudcharge.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-02 | Pelco, Inc. Sarix Pro 3 Series IP Cameras | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-01 | Johnson Controls, Inc. Frick Controls Quantum HD | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-25-133-02 | Hitachi Energy Relion 670/650/SAM600-IO Series (Update C) | 2023-11-28T00:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-043-06 | Siemens SINEC OS | 2026-01-28T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-027-01 | iba Systems ibaPDA | 2026-01-27T07:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-snort3-dcerpc-vulns-j9hnf4th | Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities | 2026-01-07T16:00:00+00:00 | 2026-02-10T20:42:07+00:00 |
| cisco-sa-pi-xss-byevkcd | Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-epnm-pi-redirect-6sx82dn | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Open Redirect Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-cmm-file-up-ky47n8kk | Cisco Meeting Management Arbitrary File Upload Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-04T16:00:00+00:00 |
| cisco-sa-ucce-pcce-xss-2jvyg3ud | Cisco Packaged Contact Center Enterprise and Cisco Unified Contact Center Enterprise Cross-Site Scripting Vulnerabilities | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-intersight-privesc-p6tbm6jk | Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-iec6400-pem5uq7v | Cisco IEC6400 Wireless Backhaul Edge Compute Software SSH Denial of Service Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-01-21T16:00:00+00:00 |
| cisco-sa-sma-attack-n9bf4 | Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager | 2025-12-17T16:00:00+00:00 | 2026-01-15T16:01:43+00:00 |
| cisco-sa-ise-xss-9tdh2kx | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-ise-xss-964cdxw5 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-gekx8ywk | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2026-01-15T16:00:00+00:00 | 2026-01-15T16:00:00+00:00 |
| cisco-sa-ise-xxe-jwsbsdkt | Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability | 2026-01-07T16:00:00+00:00 | 2026-01-07T16:00:00+00:00 |
| cisco-sa-react-flight-tyw32ddb | Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 | 2025-12-04T16:00:00+00:00 | 2025-12-17T22:37:17+00:00 |
| cisco-sa-ise-multiple-vulns-o9beswjh | Cisco Identity Services Engine Reflected Cross-Site Scripting and Information Disclosure Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-12-04T14:23:54+00:00 |
| cisco-sa-cc-mult-vuln-gk4tfxsn | Multiple Cisco Contact Center Products Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-18T14:49:09+00:00 |
| cisco-sa-privesc-catc-ryjreelu | Cisco Catalyst Center Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-xss-wextvz59 | Cisco Catalyst Center Cross-Site Scripting Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-dnac-ci-zwlqvswt | Cisco Catalyst Center REST API Command Injection Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-priv-esc-vs8eecux | Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-catc-open-redirect-3w5bk3je | Cisco Catalyst Center Virtual Appliance HTTP Open Redirect Vulnerability | 2025-11-13T16:00:00+00:00 | 2025-11-13T16:00:00+00:00 |
| cisco-sa-cc-unauth-rce-qen8h7mq | Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-13T12:48:42+00:00 |
| cisco-sa-asaftd-webvpn-yrootuw | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Unauthorized Access Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:55+00:00 |
| cisco-sa-asaftd-webvpn-z5xp8eub | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:54+00:00 |
| cisco-sa-http-code-exec-wmfp3h3o | Cisco Secure Firewall Adaptive Security Appliance Software, Secure Firewall Threat Defense Software, IOS Software, IOS XE Software, and IOS XR Software Web Services Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:51+00:00 |
| cisco-sa-ise-radsupress-dos-8yf3jthh | Cisco Identity Services Engine RADIUS Suppression Denial of Service Vulnerability | 2025-11-05T16:00:00+00:00 | 2025-11-05T16:00:00+00:00 |
| cisco-sa-broadworks-xss-o696ymra | Cisco BroadWorks CommPilot Application Software Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-10-21T15:13:31+00:00 |
| cisco-sa-roomos-inf-disc-qggsbxam | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-phone-dos-fpyjlv7a | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-secboot-uqfd8avc | Cisco IOS XE Software Secure Boot Bypass Vulnerabilities | 2025-09-24T16:00:00+00:00 | 2025-10-15T15:57:29+00:00 |
| cisco-sa-snmp-x4lphte | Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-06T18:27:02+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-5460 | Heap Use-After-Free in PQC Hybrid KeyShare Error Cleanup in wolfSSL TLS 1.3 | 2026-04-02T00:00:00.000Z | 2026-04-15T01:04:23.000Z |
| msrc_cve-2026-5772 | MatchDomainName 1-Byte Stack Buffer Over-Read in Hostname Validation | 2026-04-02T00:00:00.000Z | 2026-04-15T01:04:15.000Z |
| msrc_cve-2026-5447 | Heap buffer overflow in CertFromX509() via AuthorityKeyIdentifier | 2026-04-02T00:00:00.000Z | 2026-04-15T01:04:06.000Z |
| msrc_cve-2026-5778 | Integer underflow leads to out-of-bounds access in sniffer ChaCha decrypt path. | 2026-04-02T00:00:00.000Z | 2026-04-15T01:03:58.000Z |
| msrc_cve-2026-5188 | Integer underflow in X.509 SAN parsing in wolfSSL | 2026-04-02T00:00:00.000Z | 2026-04-15T01:03:50.000Z |
| msrc_cve-2026-5295 | Stack Buffer Overflow in wolfSSL PKCS7 wc_PKCS7_DecryptOri() via Oversized OID | 2026-04-02T00:00:00.000Z | 2026-04-15T01:03:41.000Z |
| msrc_cve-2026-5264 | DTLS 1.3 ACK heap buffer overflow | 2026-04-02T00:00:00.000Z | 2026-04-15T01:03:33.000Z |
| msrc_cve-2026-5503 | out-of-bounds write in TLSX_EchChangeSNI via attacker-controlled publicName | 2026-04-02T00:00:00.000Z | 2026-04-15T01:03:24.000Z |
| msrc_cve-2026-5479 | wolfSSL EVP ChaCha20-Poly1305 AEAD authentication tag | 2026-04-02T00:00:00.000Z | 2026-04-15T01:03:16.000Z |
| msrc_cve-2026-5477 | Prefix-substitution forgery via integer overflow in wolfCrypt CMAC | 2026-04-02T00:00:00.000Z | 2026-04-15T01:03:08.000Z |
| msrc_cve-2026-5448 | 1-2 Byte Buffer Overflow in wolfSSL_X509_notAfter/notBefore | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:59.000Z |
| msrc_cve-2026-5507 | Session Cache Restore — Arbitrary Free via Deserialized Pointer | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:51.000Z |
| msrc_cve-2026-5501 | Improper Certificate Signature Verification in X.509 Chain Validation Allows Forged Leaf Certificates | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:42.000Z |
| msrc_cve-2026-5194 | wolfSSL ECDSA Certificate Verification | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:34.000Z |
| msrc_cve-2026-5504 | PKCS7 CBC Padding Oracle — Plaintext Recovery | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:25.000Z |
| msrc_cve-2026-5500 | Improper Validation of AES-GCM Authentication Tag Length in PKCS#7 Envelope Allows Authentication Bypass | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:16.000Z |
| msrc_cve-2026-5393 | OOB Read in DoTls13CertificateVerify with WOLFSSL_DUAL_ALG_CERTS | 2026-04-02T00:00:00.000Z | 2026-04-15T01:02:08.000Z |
| msrc_cve-2026-5466 | wc_VerifyEccsiHash missing sanity check | 2026-04-02T00:00:00.000Z | 2026-04-15T01:01:59.000Z |
| msrc_cve-2026-33555 | CVE-2026-33555 | 2026-04-02T00:00:00.000Z | 2026-04-15T01:01:51.000Z |
| msrc_cve-2026-40385 | CVE-2026-40385 | 2026-04-02T00:00:00.000Z | 2026-04-15T01:01:42.000Z |
| msrc_cve-2026-40386 | CVE-2026-40386 | 2026-04-02T00:00:00.000Z | 2026-04-15T01:01:34.000Z |
| msrc_cve-2026-4878 | Libcap: libcap: privilege escalation via toctou race condition in cap_set_file() | 2026-04-02T00:00:00.000Z | 2026-04-14T14:47:44.000Z |
| msrc_cve-2026-33810 | Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509 | 2026-04-02T00:00:00.000Z | 2026-04-14T14:47:37.000Z |
| msrc_cve-2026-32289 | JsBraceDepth Context Tracking Bugs (XSS) in html/template | 2026-04-02T00:00:00.000Z | 2026-04-14T14:46:40.000Z |
| msrc_cve-2026-34933 | Avahi: Reachable assertion in `transport_flags_from_domain()` via conflicting publish flags crashes avahi-daemon | 2026-04-02T00:00:00.000Z | 2026-04-14T14:44:57.000Z |
| msrc_cve-2026-3184 | Util-linux: util-linux: access control bypass due to improper hostname canonicalization | 2026-04-02T00:00:00.000Z | 2026-04-14T14:44:51.000Z |
| msrc_cve-2026-0968 | Libssh: libssh: denial of service due to malformed sftp message | 2026-03-02T00:00:00.000Z | 2026-04-14T14:44:45.000Z |
| msrc_cve-2026-27456 | util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup | 2026-04-02T00:00:00.000Z | 2026-04-14T14:44:40.000Z |
| msrc_cve-2026-4897 | Polkit: polkit: denial of service via unbounded input processing through standard input | 2026-03-02T00:00:00.000Z | 2026-04-14T14:44:19.000Z |
| msrc_cve-2026-2436 | Libsoup: libsoup: denial of service via use-after-free in soupserver during tls handshake | 2026-03-02T00:00:00.000Z | 2026-04-14T14:44:01.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0067 | Kwetsbaarheden verholpen in GitHub Enterprise Server | 2026-02-20T10:13:39.540778Z | 2026-02-20T10:13:39.540778Z |
| ncsc-2026-0066 | Kwetsbaarheid verholpen in Google Chrome | 2026-02-19T08:29:30.712590Z | 2026-02-19T08:29:30.712590Z |
| ncsc-2026-0065 | Kwetsbaarheid verholpen in Dell RecoverPoint for Virtual Machines | 2026-02-18T13:18:23.815384Z | 2026-02-18T13:18:23.815384Z |
| ncsc-2026-0064 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2026-02-13T13:35:03.870920Z | 2026-02-13T13:35:03.870920Z |
| ncsc-2026-0063 | Kwetsbaarheden verholpen in Apple macOS | 2026-02-13T13:24:06.433550Z | 2026-02-13T13:24:06.433550Z |
| ncsc-2026-0048 | Kwetsbaarheid verholpen in BeyondTrust Remote Support | 2026-02-09T10:27:57.867529Z | 2026-02-13T12:54:32.614217Z |
| ncsc-2026-0062 | Kwetsbaarheden verholpen in GitLab CE/EE | 2026-02-11T11:45:05.986313Z | 2026-02-11T11:45:05.986313Z |
| ncsc-2026-0061 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2026-02-11T11:34:50.888067Z | 2026-02-11T11:34:50.888067Z |
| ncsc-2026-0060 | Kwetsbaarheden verholpen in Fortinet FortiSandbox, FortiAuthenticator en FortiClient | 2026-02-11T11:34:36.684955Z | 2026-02-11T11:34:36.684955Z |
| ncsc-2026-0058 | Kwetsbaarheden verholpen in Microsoft Office | 2026-02-10T19:11:42.825147Z | 2026-02-10T19:11:42.825147Z |
| ncsc-2026-0057 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-02-10T19:08:27.878305Z | 2026-02-10T19:08:27.878305Z |
| ncsc-2026-0056 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2026-02-10T19:07:16.028511Z | 2026-02-10T19:07:16.028511Z |
| ncsc-2026-0055 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-02-10T19:05:45.729972Z | 2026-02-10T19:05:45.729972Z |
| ncsc-2026-0054 | Kwetsbaarheid verholpen in Microsoft Exchange | 2026-02-10T19:04:51.366294Z | 2026-02-10T19:04:51.366294Z |
| ncsc-2026-0053 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-02-10T19:01:45.561771Z | 2026-02-10T19:01:45.561771Z |
| ncsc-2026-0052 | Kwetsbaarheden verholpen in SAP producten | 2026-02-10T12:28:40.531069Z | 2026-02-10T12:28:40.531069Z |
| ncsc-2026-0051 | Kwetsbaarheden verholpen in Siemens producten | 2026-02-10T12:27:40.637581Z | 2026-02-10T12:27:40.637581Z |
| ncsc-2026-0050 | Kwetsbaarheid verholpen in PEAR | 2026-02-09T10:41:43.856342Z | 2026-02-09T10:41:43.856342Z |
| ncsc-2026-0049 | Kwetsbaarheden verholpen in n8n | 2026-02-09T10:39:40.792744Z | 2026-02-09T10:39:40.792744Z |
| ncsc-2026-0046 | Kwetsbaarheden verholpen in Samsung mobile | 2026-02-09T07:48:28.751473Z | 2026-02-09T07:48:28.751473Z |
| ncsc-2026-0040 | Kwetsbaarheid verholpen in SmarterTools SmarterMail | 2026-01-27T10:51:39.476320Z | 2026-02-06T09:25:57.008166Z |
| ncsc-2026-0045 | Kwetsbaarheid verholpen in Cisco Meeting Management | 2026-02-06T09:22:16.831778Z | 2026-02-06T09:22:16.831778Z |
| ncsc-2026-0044 | Kwetsbaarheid verholpen in Cisco TelePresence Collaboration Endpoint | 2026-02-06T09:20:11.629058Z | 2026-02-06T09:20:11.629058Z |
| ncsc-2026-0042 | Kwetsbaarheden verholpen in SolarWinds Web Help Desk | 2026-01-28T16:37:21.114054Z | 2026-02-02T09:47:54.857445Z |
| ncsc-2025-0386 | Kwetsbaarheden verholpen in Fortinet producten | 2025-12-10T09:51:34.918202Z | 2026-01-28T15:46:10.814803Z |
| ncsc-2026-0041 | Kwetsbaarheid verholpen in Fortinet producten | 2026-01-28T09:32:41.752905Z | 2026-01-28T09:32:41.752905Z |
| ncsc-2026-0039 | ZeroDay kwetsbaarheid verholpen in Microsoft Office | 2026-01-27T07:27:52.867415Z | 2026-01-27T07:27:52.867415Z |
| ncsc-2026-0038 | Kwetsbaarheid verholpen in BIND 9 | 2026-01-23T08:54:43.506215Z | 2026-01-23T08:54:43.506215Z |
| ncsc-2026-0037 | Kwetsbaarheden verholpen in GitLab Community Edition en Enterprise Edition | 2026-01-22T12:35:30.505659Z | 2026-01-22T12:35:30.505659Z |
| ncsc-2026-0036 | Kwetsbaarheden verholpen in Cisco Unified Communications producten | 2026-01-22T09:49:39.156365Z | 2026-01-22T09:49:39.156365Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2019_2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019_1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019:2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019:1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20460-1 | Security update for chromium | 2026-04-03T06:09:23Z | 2026-04-03T06:09:23Z |
| opensuse-su-2026:10485-1 | python311-Flask-Cors-6.0.2-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| opensuse-su-2026:10484-1 | k6-1.7.1-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| opensuse-su-2026:10483-1 | himmelblau-2.3.9+git0.a9fd29b-1.1 on GA media | 2026-04-03T00:00:00Z | 2026-04-03T00:00:00Z |
| opensuse-su-2026:20461-1 | Security update for dnsdist | 2026-04-02T09:11:51Z | 2026-04-02T09:11:51Z |
| opensuse-su-2026:10482-1 | osslsigncode-2.13-1.1 on GA media | 2026-04-02T00:00:00Z | 2026-04-02T00:00:00Z |
| opensuse-su-2026:20459-1 | Security update for perl-XML-Parser | 2026-04-01T16:23:38Z | 2026-04-01T16:23:38Z |
| opensuse-su-2026:20456-1 | Security update for tinyproxy | 2026-04-01T16:15:06Z | 2026-04-01T16:15:06Z |
| opensuse-su-2026:20458-1 | Security update for python-Pillow | 2026-04-01T14:57:29Z | 2026-04-01T14:57:29Z |
| opensuse-su-2026:20452-1 | Security update for kea | 2026-04-01T09:24:21Z | 2026-04-01T09:24:21Z |
| opensuse-su-2026:10481-1 | python314-3.14.3-4.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10480-1 | python313-3.13.12-3.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10479-1 | python312-3.12.13-4.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10478-1 | python311-3.11.15-4.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10477-1 | python310-3.10.20-3.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10476-1 | python311-Pygments-2.20.0-2.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10475-1 | opensc-0.27.1-1.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10474-1 | ignition-2.26.0-3.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10473-1 | dnsdist-2.0.3-1.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:10472-1 | conftest-0.67.1-2.1 on GA media | 2026-04-01T00:00:00Z | 2026-04-01T00:00:00Z |
| opensuse-su-2026:20451-1 | Security update for gnome-online-accounts, gvfs | 2026-03-31T09:11:58Z | 2026-03-31T09:11:58Z |
| opensuse-su-2026:10471-1 | tinyproxy-1.11.3-2.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10470-1 | libXvnc-devel-1.16.1-2.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10469-1 | python315-3.15.0~a7-3.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10468-1 | python311-ecdsa-0.19.2-1.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10467-1 | ovmf-202602-6.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10466-1 | expat-2.7.5-1.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:10465-1 | ImageMagick-7.1.2.18-2.1 on GA media | 2026-03-31T00:00:00Z | 2026-03-31T00:00:00Z |
| opensuse-su-2026:20449-1 | Security update for postgresql13 | 2026-03-30T15:14:07Z | 2026-03-30T15:14:07Z |
| opensuse-su-2026:20448-1 | Security update for expat | 2026-03-30T14:59:16Z | 2026-03-30T14:59:16Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2762 | Red Hat Security Advisory: Red Hat Quay 3.10.18 | 2026-02-16T17:44:31+00:00 | 2026-04-16T02:00:05+00:00 |
| rhsa-2026:2754 | Red Hat Security Advisory: Red Hat Quay 3.9.18 | 2026-02-16T15:43:51+00:00 | 2026-04-16T02:00:05+00:00 |
| rhsa-2026:2737 | Red Hat Security Advisory: Red Hat Ceph Storage | 2026-02-16T12:56:05+00:00 | 2026-04-16T02:00:04+00:00 |
| rhsa-2026:2711 | Red Hat Security Advisory: Red Hat Ceph Storage 8.1 security and bug fix update | 2026-02-16T10:49:01+00:00 | 2026-04-16T02:00:04+00:00 |
| rhsa-2026:2695 | Red Hat Security Advisory: RHOAI 2.25.2 - Red Hat OpenShift AI | 2026-02-12T22:43:13+00:00 | 2026-04-16T02:00:03+00:00 |
| rhsa-2026:2681 | Red Hat Security Advisory: Red Hat Quay 3.16.2 | 2026-02-12T17:29:21+00:00 | 2026-04-16T02:00:03+00:00 |
| rhsa-2026:2572 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.14.2 security update | 2026-02-11T16:14:44+00:00 | 2026-04-16T02:00:02+00:00 |
| rhsa-2026:2571 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.9.2 security update | 2026-02-11T15:58:30+00:00 | 2026-04-16T02:00:02+00:00 |
| rhsa-2026:2568 | Red Hat Security Advisory: RHACS 4.9.3 security and bug fix update | 2026-02-11T15:09:41+00:00 | 2026-04-16T02:00:02+00:00 |
| rhsa-2026:2456 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.26.0 Release. | 2026-02-10T17:06:01+00:00 | 2026-04-16T02:00:02+00:00 |
| rhsa-2026:2351 | Red Hat Security Advisory: VolSync v0.13 security fixes and container updates | 2026-02-09T15:55:39+00:00 | 2026-04-16T02:00:01+00:00 |
| rhsa-2026:2082 | Red Hat Security Advisory: OpenShift Container Platform 4.21.1 packages and security update | 2026-02-10T11:30:56+00:00 | 2026-04-16T02:00:01+00:00 |
| rhsa-2026:2350 | Red Hat Security Advisory: RHACS 4.9.3 security and bug fix update | 2026-02-09T15:50:42+00:00 | 2026-04-16T02:00:00+00:00 |
| rhsa-2026:2343 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-02-09T14:20:06+00:00 | 2026-04-16T02:00:00+00:00 |
| rhsa-2026:2172 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.15 security, enhancement & bug fix update | 2026-02-05T18:06:29+00:00 | 2026-04-16T01:59:59+00:00 |
| rhsa-2026:2164 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16 security, enhancement & bug fix update | 2026-02-05T17:49:21+00:00 | 2026-04-16T01:59:59+00:00 |
| rhsa-2026:2155 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17 security, enhancement & bug fix update | 2026-02-05T17:17:50+00:00 | 2026-04-16T01:59:58+00:00 |
| rhsa-2026:2144 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:45:43+00:00 | 2026-04-16T01:59:58+00:00 |
| rhsa-2026:2136 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:17:09+00:00 | 2026-04-16T01:59:57+00:00 |
| rhsa-2026:2129 | Red Hat Security Advisory: OpenShift Container Platform 4.21.1 bug fix and security update | 2026-02-10T09:39:14+00:00 | 2026-04-16T01:59:57+00:00 |
| rhsa-2026:2106 | Red Hat Security Advisory: RHOAI 2.25.2 - Red Hat OpenShift AI | 2026-02-05T13:38:32+00:00 | 2026-04-16T01:59:57+00:00 |
| rhsa-2026:2071 | Red Hat Security Advisory: OpenShift Container Platform 4.18.33 packages and security update | 2026-02-11T04:55:25+00:00 | 2026-04-16T01:59:56+00:00 |
| rhsa-2026:2034 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.20 security, enhancement & bug fix update | 2026-02-05T06:37:04+00:00 | 2026-04-16T01:59:55+00:00 |
| rhsa-2026:1942 | Red Hat Security Advisory: Red Hat Quay 3.15.3 | 2026-02-04T15:43:51+00:00 | 2026-04-16T01:59:55+00:00 |
| rhsa-2026:1838 | Red Hat Security Advisory: image-builder security update | 2026-02-05T16:02:26+00:00 | 2026-04-16T01:59:54+00:00 |
| rhsa-2026:1837 | Red Hat Security Advisory: osbuild-composer security update | 2026-02-05T16:03:01+00:00 | 2026-04-16T01:59:54+00:00 |
| rhsa-2026:1730 | Red Hat Security Advisory: Red Hat Quay 3.12.13 | 2026-02-02T15:52:56+00:00 | 2026-04-16T01:59:54+00:00 |
| rhsa-2026:1552 | Red Hat Security Advisory: OpenShift Container Platform 4.19.23 bug fix and security update | 2026-02-04T10:50:17+00:00 | 2026-04-16T01:59:54+00:00 |
| rhsa-2026:1540 | Red Hat Security Advisory: OpenShift Container Platform 4.15.61 packages and security update | 2026-02-05T16:39:36+00:00 | 2026-04-16T01:59:54+00:00 |
| rhsa-2026:1536 | Red Hat Security Advisory: Red Hat Ceph Storage 9.0 Security and Enhancement update | 2026-01-29T07:02:14+00:00 | 2026-04-16T01:59:54+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2025-014-09 | EcoStruxure™ Power Build Rapsody | 2025-01-14T00:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2024-282-05 | EcoStruxure™ Power Monitoring Expert (PME) | 2024-10-08T04:00:00.000Z | 2025-05-13T04:00:00.000Z |
| sevd-2025-098-02 | Trio™ Q Licensed Data Radios | 2025-04-08T04:00:00.000Z | 2025-04-08T04:00:00.000Z |
| sevd-2025-014-01 | Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC | 2025-01-14T05:00:00.000Z | 2025-04-08T04:00:00.000Z |
| sevd-2025-070-03 | WebHMI Component For EcoStruxure™ Power Automation System User Interface and EcoStruxure™ Microgrid Operation Large | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-070-02 | EPAS-UI & EcoSUI | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-070-01 | EcoStruxure™ Panel Server | 2025-03-11T04:00:00.000Z | 2025-03-11T04:00:00.000Z |
| sevd-2025-042-04 | Enerlin'X IFE and eIFE | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-03 | EcoStruxure™ Process Expert, EcoStruxure™ Process Expert for AVEVA System Platform | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-042-01 | ASCO 5310 / 5350 Remote Annunciator | 2025-02-11T06:00:00.000Z | 2025-02-11T06:00:00.000Z |
| sevd-2025-014-08 | Power Logic HDPM6000 High-Density Metering System | 2025-01-14T00:00:00.000Z | 2025-01-14T00:00:00.000Z |
| sevd-2025-014-04 | Web Designer for Modicon Communication Modules | 2025-01-14T00:00:00.000Z | 2025-01-14T00:00:00.000Z |
| sevd-2024-345-02 | Harmony HMI and Pro-face HMI products | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-345-01 | PowerChute Serial Shutdown | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-317-04 | EcoStruxure™ IT Gateway | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-01 | PowerLogic PM5300 Series | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2021-159-02 | PowerLogic PM5500 and PowerLogic PM8ECC | 2021-06-08T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-282-08 | EcoStruxure EV Charging Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-07 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-06 | Zelio Soft 2 | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-04 | EVlink Home Smart and Schneider Charge | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-03 | Easergy Studio | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-02 | Harmony iPC – HMIBSC IIoT Edge Box Core | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-01 | Data Center Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2022-102-02 | Modicon M340 Controller and Communication Modules | 2022-04-12T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-254-02 | EcoStruxure™ Power Monitoring Expert and EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation with Advanced Reporting and Dashboards | 2024-09-10T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2024-163-02 | PowerLogic P5 | 2024-06-11T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-073-01 | EcoStruxure™ Power Monitoring Expert | 2023-03-14T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-192-02 | EcoStruxure™ OPC UA Server Expert | 2023-07-11T07:01:56.000Z | 2024-08-13T07:00:00.000Z |
| sevd-2024-226-02 | EcoStruxure™ Machine SCADA Expert / BLUE Open Studio | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2022-0002 | PwnKit vulnerability affects multiple SICK IPCs | 2022-02-23T16:00:00.000Z | 2022-02-23T16:00:00.000Z |
| sca-2022-0001 | Vulnerability in SICK FieldEcho | 2022-02-17T16:00:00.000Z | 2022-02-17T16:00:00.000Z |
| sca-2021-0003 | SICK Security Advisory for Apache Log4j (CVE-2021-44228) | 2021-12-14T17:00:00.000Z | 2021-12-17T12:00:00.000Z |
| sca-2021-0004 | Vulnerabilities in SICK SOPAS ET | 2021-12-16T08:00:00.000Z | 2021-12-17T08:00:00.000Z |
| sca-2021-0002 | MEAC affected by Windows SMBv1 vulnerability | 2021-08-04T10:00:00.000Z | 2021-08-04T10:00:00.000Z |
| sca-2021-0001 | Inadequate SSH configuration in SICK Visionary-S CX | 2021-06-25T10:00:00.000Z | 2021-06-25T10:00:00.000Z |
| sca-2020-0005 | Package Analytics affected by Windows TCP/IP vulnerability | 2020-10-29T11:00:00.000Z | 2020-10-29T11:00:00.000Z |
| sca-2020-0004 | Vulnerability in Platform Mechanism AutoIP | 2020-08-31T10:00:00.000Z | 2020-08-31T10:00:00.000Z |
| sca-2020-0003 | MEAC affected by Windows SMBv3 vulnerability | 2020-08-07T10:00:00.000Z | 2020-08-07T10:00:00.000Z |
| sca-2020-0002 | Vulnerabilities in SICK Package Analytics | 2020-08-07T10:00:00.000Z | 2020-07-28T10:00:00.000Z |
| sca-2020-0001 | Security Information Regarding "Profile Programming" | 2020-05-31T10:00:00.000Z | 2020-05-31T10:00:00.000Z |
| sca-2019-0002 | Vulnerability in SICK FX0-GENT00000 and SICK FX0-GPNT00000 | 2019-09-20T10:00:00.000Z | 2019-09-20T10:00:00.000Z |
| sca-2019-0001 | MSC800 affected by hard-coded credentials vulnerability | 2019-06-21T10:00:00.000Z | 2019-06-21T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-365200 | SSA-365200: Google Chrome Type Confusion Vulnerability in Siemens Products | 2025-10-14T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-364175 | SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-192617 | SSA-192617: Local Privilege Escalation Vulnerability in TeleControl Server Basic Before V3.1.2.4 | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-014678 | SSA-014678: Authorization Bypass Vulnerability in Industrial Edge Device Kit | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-001536 | SSA-001536: Authorization Bypass Vulnerability in Siemens Industrial Edge Devices | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-512988 | SSA-512988: File Parsing Vulnerability in Simcenter Femap Before V2512 | 2025-12-12T00:00:00Z | 2025-12-12T00:00:00Z |
| ssa-915282 | SSA-915282: Denial of service Vulnerability in Interniche IP-Stack based Industrial Devices | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-882673 | SSA-882673: Multiple Vulnerabilities in SINEC Security Monitor before V4.10.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-800126 | SSA-800126: Deserialization Vulnerability in Siemens Engineering Platforms before V20 | 2024-12-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-763474 | SSA-763474: Denial of Service Vulnerability in Ruggedcom ROS devices before V5.10.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-734261 | SSA-734261: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-723487 | SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products | 2024-07-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-693808 | SSA-693808: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-673996 | SSA-673996: Buffer Overflow Vulnerability in Third-Party Component in SICAM and SITIPE Products | 2024-09-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-626856 | SSA-626856: Multiple Vulnerabilities in SINEMA Remote Connect Sever Before V3.2 SP4 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-493396 | SSA-493396: Deserialization Vulnerability in Siemens Engineering Platforms | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-471761 | SSA-471761: Multiple Vulnerabilities in SICAM T Before V3.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-420375 | SSA-420375: Improper Integrity Check of Firmware Updates in Building X - Security Manager Edge Controller (ACC-AP) | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-416652 | SSA-416652: Multiple Vulnerabilities in SIMATIC CN 4100 Before V4.0.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-392859 | SSA-392859: Local Arbitrary Code Execution Vulnerability in Siemens Engineering Platforms before V20 | 2024-12-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-356310 | SSA-356310: Multiple Vulnerabilities in Gridscale X Prepay | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-202008 | SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-241605 | SSA-241605: Out of Bounds Read in PS/IGES Parasolid Translator Component Before V29.0.258 | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-190588 | SSA-190588: Cross-Site Scripting Vulnerability in Mendix Rich Text Widget | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-794185 | SSA-794185: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-750499 | SSA-750499: Weak Encryption Vulnerability in SIPROTEC 5 Devices | 2024-07-09T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-711309 | SSA-711309: Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products | 2023-09-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-687955 | SSA-687955: Accessible Development Shell via Physical Interface in SIPROTEC 5 | 2025-02-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-682326 | SSA-682326: Multiple Vulnerabilities in COMOS before V10.4.5 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-631336 | SSA-631336: Multiple Web Server Vulnerabilities in SICAM GridEdge Before V2.6.6 | 2022-06-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1251-1 | Security update for cockpit-podman | 2026-04-10T11:36:50Z | 2026-04-10T11:36:50Z |
| suse-su-2026:1250-1 | Security update for cockpit-tukit | 2026-04-10T11:36:40Z | 2026-04-10T11:36:40Z |
| suse-su-2026:1249-1 | Security update for cockpit-machines | 2026-04-10T11:36:32Z | 2026-04-10T11:36:32Z |
| suse-su-2026:21021-1 | Security update for python-cryptography | 2026-04-10T11:26:32Z | 2026-04-10T11:26:32Z |
| suse-su-2026:1247-1 | Security update for nghttp2 | 2026-04-10T10:34:43Z | 2026-04-10T10:34:43Z |
| suse-su-2026:1248-1 | Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T09:13:03Z | 2026-04-10T09:13:03Z |
| suse-su-2026:21020-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-10T08:14:40Z | 2026-04-10T08:14:40Z |
| suse-su-2026:1244-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T08:04:54Z | 2026-04-10T08:04:54Z |
| suse-su-2026:1242-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T07:04:48Z | 2026-04-10T07:04:48Z |
| suse-su-2026:21019-1 | Security update for glibc | 2026-04-10T06:44:31Z | 2026-04-10T06:44:31Z |
| suse-su-2026:1239-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T19:04:33Z | 2026-04-09T19:04:33Z |
| suse-su-2026:1237-1 | Security update for the Linux Kernel (Live Patch 47 for SUSE Linux Enterprise 15 SP4) | 2026-04-09T17:04:59Z | 2026-04-09T17:04:59Z |
| suse-su-2026:21018-1 | Security update for ovmf | 2026-04-09T15:10:40Z | 2026-04-09T15:10:40Z |
| suse-su-2026:1236-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T14:22:32Z | 2026-04-09T14:22:32Z |
| suse-su-2026:21091-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21090-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21061-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21060-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21089-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21088-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21059-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21058-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21087-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21086-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21057-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21056-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21085-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21084-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21083-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21082-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:4649 | Moderate: grub2 security update | 2026-03-16T00:00:00Z | 2026-03-19T15:01:35Z |
| alsa-2026:4713 | Moderate: python3.12 security update | 2026-03-17T00:00:00Z | 2026-03-19T14:56:58Z |
| alsa-2026:4723 | Moderate: kernel security update | 2026-03-17T00:00:00Z | 2026-03-19T14:50:26Z |
| alsa-2026:4760 | Moderate: grub2 security update | 2026-03-17T00:00:00Z | 2026-03-19T14:40:59Z |
| alsa-2026:4705 | Moderate: nginx security update | 2026-03-17T00:00:00Z | 2026-03-19T12:47:53Z |
| alsa-2026:4629 | Important: libvpx security update | 2026-03-16T00:00:00Z | 2026-03-19T12:45:22Z |
| alsa-2026:4772 | Moderate: glibc security update | 2026-03-17T00:00:00Z | 2026-03-19T12:43:04Z |
| alsa-2026:4728 | Important: libpng security update | 2026-03-17T00:00:00Z | 2026-03-19T12:37:34Z |
| alsa-2026:4473 | Moderate: python3.11 security update | 2026-03-12T00:00:00Z | 2026-03-19T12:33:18Z |
| alsa-2026:4648 | Moderate: grub2 security update | 2026-03-16T00:00:00Z | 2026-03-17T10:24:06Z |
| alsa-2026:4672 | Important: container-tools:rhel8 security update | 2026-03-17T00:00:00Z | 2026-03-17T10:17:22Z |
| alsa-2026:4445 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:52:17Z |
| alsa-2026:4472 | Moderate: compat-openssl11 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:49:36Z |
| alsa-2026:4447 | Important: libvpx security update | 2026-03-12T00:00:00Z | 2026-03-16T16:46:00Z |
| alsa-2026:4456 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-16T16:41:08Z |
| alsa-2026:3985 | Important: git-lfs security update | 2026-03-09T00:00:00Z | 2026-03-13T12:38:07Z |
| alsa-2026:4306 | Important: mingw-libpng security update | 2026-03-11T00:00:00Z | 2026-03-13T12:35:26Z |
| alsa-2026:4012 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-13T09:42:02Z |
| alsa-2026:4450 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:36:54Z |
| alsa-2026:4451 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:34:29Z |
| alsa-2026:4453 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:32:40Z |
| alsa-2026:3940 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-13T09:30:09Z |
| alsa-2026:3842 | Moderate: delve security update | 2026-03-05T00:00:00Z | 2026-03-13T09:28:13Z |
| alsa-2026:4168 | Moderate: python3.9 security update | 2026-03-10T00:00:00Z | 2026-03-13T09:26:02Z |
| alsa-2026:4177 | Important: opentelemetry-collector security update | 2026-03-10T00:00:00Z | 2026-03-13T09:23:39Z |
| alsa-2026:4188 | Moderate: gnutls security update | 2026-03-10T00:00:00Z | 2026-03-13T09:21:59Z |
| alsa-2026:4216 | Moderate: python3.11 security update | 2026-03-10T00:00:00Z | 2026-03-13T09:19:57Z |
| alsa-2026:4454 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:17:27Z |
| alsa-2026:4458 | Important: .NET 10.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:14:44Z |
| alsa-2026:4455 | Important: .NET 8.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:11:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-606 | Heap-buffer-overflow in ZSTD_decompressMultiFrame | 2023-07-23T14:01:02.159160Z | 2026-03-27T14:21:24.837066Z |
| osv-2023-319 | Heap-buffer-overflow in ZSTD_decompressSequencesLong_bmi2 | 2023-04-16T14:01:58.406534Z | 2026-03-27T14:20:54.241339Z |
| osv-2022-675 | Heap-buffer-overflow in void RDKit::ParseV3000AtomProps<std::__1::vector<std::__1::basic_string_view<cha | 2022-08-06T00:00:51.363676Z | 2026-03-27T14:20:04.040838Z |
| osv-2021-1672 | Heap-buffer-overflow in blosc_d | 2021-12-12T00:01:29.747137Z | 2026-03-27T14:18:17.523662Z |
| osv-2022-1288 | Stack-buffer-overflow in bool SmilesParseOps::parser::parse_atom_props<std::__1::__wrap_iter<char const*> | 2024-11-04T00:16:22.516312Z | 2026-03-27T14:17:53.064285Z |
| osv-2023-1350 | Heap-buffer-overflow in inflate | 2023-12-23T00:12:38.562149Z | 2026-03-27T14:16:43.884162Z |
| osv-2022-1134 | Heap-buffer-overflow in ndlz8_decompress | 2022-11-04T00:02:11.463429Z | 2026-03-27T14:15:56.573716Z |
| osv-2021-1070 | Heap-buffer-overflow in ZSTD_decompressBlock_internal | 2021-07-29T00:01:10.187569Z | 2026-03-27T14:15:27.197578Z |
| osv-2026-461 | UNKNOWN READ in XRef::constructObjectEntry | 2026-03-26T00:17:47.551046Z | 2026-03-26T00:17:47.551361Z |
| osv-2026-455 | UNKNOWN READ in mkv::matroska_segment_c::TrackInit | 2026-03-25T00:20:51.448743Z | 2026-03-25T00:20:51.449185Z |
| osv-2023-216 | Heap-buffer-overflow in H5G__node_cmp3 | 2023-03-23T13:00:48.081705Z | 2026-03-24T16:17:49.377032Z |
| osv-2023-76 | Heap-buffer-overflow in H5SM_delete | 2023-02-18T13:00:50.471845Z | 2026-03-24T15:56:21.323480Z |
| osv-2023-359 | Heap-buffer-overflow in H5MM_memcpy | 2023-05-01T14:02:33.841821Z | 2026-03-24T15:52:15.056909Z |
| osv-2023-392 | Negative-size-param in H5MM_memcpy | 2023-05-13T14:00:26.093088Z | 2026-03-24T15:13:27.688997Z |
| osv-2023-370 | Heap-buffer-overflow in H5FS__sect_link | 2023-05-06T14:01:04.165113Z | 2026-03-24T15:11:55.539963Z |
| osv-2024-387 | Heap-buffer-overflow in H5F_addr_encode | 2024-04-30T00:13:39.184262Z | 2026-03-24T15:11:37.246096Z |
| osv-2023-381 | UNKNOWN READ in H5FL__blk_gc_list | 2023-05-08T14:02:04.934252Z | 2026-03-24T15:11:28.111319Z |
| osv-2023-133 | Heap-buffer-overflow in H5L__extern_traverse | 2023-03-02T13:02:08.499899Z | 2026-03-24T15:07:47.335644Z |
| osv-2023-89 | Heap-buffer-overflow in H5O__mtime_new_encode | 2023-02-21T13:00:30.347876Z | 2026-03-24T14:48:44.199364Z |
| osv-2023-430 | Heap-buffer-overflow in H5MM_xstrdup | 2023-05-26T14:00:26.078002Z | 2026-03-24T14:48:04.919113Z |
| osv-2024-719 | Heap-buffer-overflow in hevc_ref_pic_lists_modification | 2024-08-07T00:05:22.699506Z | 2026-03-23T14:31:33.332438Z |
| osv-2024-695 | Stack-buffer-overflow in gf_vvc_parse_nalu_bs | 2024-07-31T00:02:35.217594Z | 2026-03-23T14:31:09.829004Z |
| osv-2024-664 | Heap-buffer-overflow in gf_dash_group_get_template | 2024-07-18T00:13:55.576218Z | 2026-03-23T14:30:21.644486Z |
| osv-2024-659 | Index-out-of-bounds in gf_vvc_parse_nalu_bs | 2024-07-18T00:01:18.765548Z | 2026-03-23T14:30:01.343679Z |
| osv-2026-437 | Heap-use-after-free in tf::Executor::_invoke | 2026-03-23T00:02:28.277984Z | 2026-03-23T14:25:41.819255Z |
| osv-2025-169 | Stack-buffer-overflow in utf8_in2 | 2025-02-27T00:07:08.029075Z | 2026-03-21T14:18:54.197384Z |
| osv-2023-1328 | Stack-buffer-overflow in icu_75::TZDBTimeZoneNames::getMetaZoneNames | 2023-12-18T00:13:09.643640Z | 2026-03-18T19:49:20.841276Z |
| osv-2024-728 | Negative-size-param in pdf_resize_resource_arrays | 2024-08-08T00:09:33.935595Z | 2026-03-18T14:32:58.071449Z |
| osv-2024-677 | Segv on unknown address in gs_gc_reclaim | 2024-07-25T00:06:43.762625Z | 2026-03-18T14:32:20.684770Z |
| osv-2025-202 | UNKNOWN READ in _blit_xrgb32_lerp_spans | 2025-03-15T00:01:51.127135Z | 2026-03-18T14:26:56.370221Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0049 | CRLs not considered authoritative by Distribution Point due to faulty matching logic | 2026-03-20T12:00:00Z | 2026-03-24T08:22:29Z |
| rustsec-2026-0072 | Missing Check for All-Zero X25519 Shared Secret | 2026-02-04T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0071 | Nonce Reuse in HPKE Context | 2026-02-05T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0070 | Panic When Opening or Sealing on Export-Only Context | 2026-02-11T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0069 | Incorrect Length Encoding on KDF Export | 2026-02-11T12:00:00Z | 2026-03-24T08:16:07Z |
| rustsec-2026-0068 | tar-rs incorrectly ignores PAX size headers if header size is nonzero | 2026-03-19T12:00:00Z | 2026-03-23T09:31:59Z |
| rustsec-2026-0067 | `unpack_in` can chmod arbitrary directories by following symlinks | 2026-03-19T12:00:00Z | 2026-03-23T09:31:59Z |
| rustsec-2026-0066 | Insufficient validation of PAX extensions during extraction | 2026-03-17T12:00:00Z | 2026-03-23T09:31:59Z |
| rustsec-2026-0047 | PKCS7_verify Signature Validation Bypass in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0046 | PKCS7_verify Certificate Chain Validation Bypass in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0045 | Timing Side-Channel in AES-CCM Tag Verification in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0043 | Timing Side-Channel in AES-CCM Tag Verification in AWS-LC | 2026-03-02T12:00:00Z | 2026-03-21T06:45:35Z |
| rustsec-2026-0065 | `tokio-signal` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0064 | `tokio-udp` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0063 | `tokio-executor` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0062 | `tokio-compat` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0061 | `tokio-fs` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0060 | `tokio-timer` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0059 | `tokio-tcp` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0058 | `tokio-io` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0057 | `tokio-reactor` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0056 | `tokio-codec` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0055 | `tokio-process` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0054 | `tokio-current-thread` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0053 | `tokio-tls` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0052 | `tokio-sync` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0051 | `tokio-threadpool` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0050 | `tokio-uds` is unmaintained | 2026-03-20T12:00:00Z | 2026-03-20T22:26:59Z |
| rustsec-2026-0048 | CRL Distribution Point Scope Check Logic Error in AWS-LC | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2026-0044 | AWS-LC X.509 Name Constraints Bypass via Wildcard/Unicode CN | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-python-2026-0865 | wsgiref.headers.Headers allows header newline injection | 2026-01-26T14:50:04.789Z | 2026-04-10T09:26:18.172Z |
| bit-python-2026-0672 | Header injection in http.cookies.Morsel | 2026-01-26T14:50:03.015Z | 2026-04-10T09:26:18.172Z |
| bit-python-2025-6075 | Quadratic complexity in os.path.expandvars() with user-controlled template | 2025-12-05T11:13:34.373Z | 2026-04-10T09:26:18.172Z |
| bit-python-2025-15282 | Header injection via newlines in data URL mediatype | 2026-01-26T14:49:40.631Z | 2026-04-10T09:26:18.172Z |
| bit-python-2025-11468 | Folding email comments of unfoldable characters doesn't preserve parenthesis | 2026-01-26T14:49:32.088Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2026-1299 | email BytesGenerator header injection due to unquoted newlines | 2026-02-03T08:45:06.015Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2026-0865 | wsgiref.headers.Headers allows header newline injection | 2026-01-26T14:43:33.890Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2026-0672 | Header injection in http.cookies.Morsel | 2026-01-26T14:43:32.238Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2025-6075 | Quadratic complexity in os.path.expandvars() with user-controlled template | 2025-12-05T11:08:28.184Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2025-15282 | Header injection via newlines in data URL mediatype | 2026-01-26T14:43:08.856Z | 2026-04-10T09:26:18.172Z |
| bit-libpython-2025-11468 | Folding email comments of unfoldable characters doesn't preserve parenthesis | 2026-01-26T14:42:59.991Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-23899 | Joomla! Core - [20260306] - Improper access check in webservice endpoints | 2026-04-10T08:49:24.143Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-23898 | Joomla! Core - [20260305] - Arbitrary file deletion in com_joomlaupdate | 2026-04-10T08:49:22.196Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21632 | Joomla! Core - [20260304] - XSS vectors in various article title outputs | 2026-04-10T08:49:20.111Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21631 | Joomla! Core - [20260303] - XSS vector in com_associations comparison view | 2026-04-10T08:49:17.625Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21630 | Joomla! Core - [20260302] - SQL injection in com_content articles webservice endpoint | 2026-04-10T08:49:15.352Z | 2026-04-10T09:26:18.172Z |
| bit-joomla-2026-21629 | Joomla! Core - [20260301] - ACL hardening in com_ajax | 2026-04-10T08:49:13.196Z | 2026-04-10T09:26:18.172Z |
| bit-cassandra-2026-27315 | Apache Cassandra: cqlsh history sensitive information leak | 2026-04-09T08:36:45.141Z | 2026-04-10T09:26:18.172Z |
| bit-parse-2026-39381 | Parse Server's Endpoint `/sessions/me` bypasses `_Session` `protectedFields` | 2026-04-09T14:37:43.255Z | 2026-04-09T15:05:10.890Z |
| bit-parse-2026-39321 | Parse Server has a login timing side-channel reveals user existence | 2026-04-09T14:37:40.125Z | 2026-04-09T15:05:10.890Z |
| bit-wordpress-2023-2745 | WordPress Core < 6.2.1 - Directory Traversal | 2024-03-06T11:09:15.187Z | 2026-04-09T09:13:50.652Z |
| bit-cosign-2026-39395 | Cosign's verify-blob-attestation reports false positive when payload parsing fails | 2026-04-09T08:37:13.235Z | 2026-04-09T09:13:50.652Z |
| bit-activemq-2026-34197 | Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ: Authenticated users could perform RCE via Jolokia MBeans | 2026-04-09T08:36:52.749Z | 2026-04-09T09:13:50.652Z |
| bit-activemq-2026-33227 | Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ Web, Apache ActiveMQ: Improper Limitation of a Pathname to a Restricted Classpath Directory | 2026-04-09T08:36:51.132Z | 2026-04-09T09:13:50.652Z |
| bit-wordpress-2023-5692 | WordPress Core <= 6.4.3 - Sensitive Information Exposure via redirect_guess_404_permalink | 2024-04-09T10:59:36.633Z | 2026-04-08T18:15:20.423Z |
| bit-parse-2026-35200 | Parse Server has a file upload Content-Type override via extension mismatch | 2026-04-08T14:51:33.993Z | 2026-04-08T15:15:28.618Z |
| bit-discourse-2026-34947 | Discourse: Staged user custom fields are exposed on public invite pages | 2026-04-08T14:45:19.092Z | 2026-04-08T15:15:28.618Z |
| bit-discourse-2026-27481 | Discourse: Hidden tag visibility bypass on tag routes | 2026-04-08T14:43:31.143Z | 2026-04-08T15:15:28.618Z |
| bit-mlflow-2025-15031 | Path Traversal Vulnerability in mlflow/mlflow | 2026-03-24T08:47:14.572Z | 2026-04-08T12:15:37.582Z |
| bit-jupyterhub-2026-33709 | JupyterHub has an Open Redirect Vulnerability | 2026-04-08T08:40:42.508Z | 2026-04-08T09:14:18.943Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ot38160 | url | 2026-04-09T00:55:38.018075Z | 2026-04-08T07:36:24Z |
| cleanstart-2026-ba09462 | OpenTelemetry-Go is the Go implementation of OpenTelemetry | 2026-04-09T00:57:38.077873Z | 2026-04-08T07:00:07Z |
| cleanstart-2026-mw52739 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-09T00:59:39.080550Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-ki25096 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-09T00:59:38.592849Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-ij23041 | In libexpat before 2 | 2026-04-09T01:01:38.269615Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-gy86690 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-09T00:57:57.606656Z | 2026-04-08T06:46:14Z |
| cleanstart-2026-pd43534 | In libexpat before 2 | 2026-04-08T00:39:47.879615Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-mp09743 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-08T00:37:59.326932Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-bb02574 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-08T00:37:58.971684Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-af52025 | In libexpat before 2 | 2026-04-08T00:39:48.013620Z | 2026-04-07T05:54:38Z |
| cleanstart-2026-hx94762 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-07T00:45:34.962189Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-gg94489 | go-retryablehttp prior to 0 | 2026-04-07T00:41:33.578433Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-fu47971 | protojson | 2026-04-07T00:47:07.546790Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-ej93145 | attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames | 2026-04-07T00:44:04.086276Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-bk17545 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-07T00:38:33.362093Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-aj47488 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-04-07T00:40:03.631106Z | 2026-04-06T13:01:42Z |
| cleanstart-2026-fe32006 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-07T00:41:34.518345Z | 2026-04-06T06:37:58Z |
| cleanstart-2026-dp59378 | In libexpat before 2 | 2026-04-07T00:42:33.537935Z | 2026-04-06T06:37:58Z |
| cleanstart-2026-ob18608 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T06:19:25.639311Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-kf75900 | In libexpat before 2 | 2026-04-06T06:20:25.150640Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-jl41223 | In libexpat before 2 | 2026-04-06T06:19:55.229801Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-jg79570 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T06:19:24.747052Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-dz75075 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T06:19:24.775093Z | 2026-04-06T04:56:02Z |
| cleanstart-2026-nu19941 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 5.19.3-r1 | 2026-04-06T02:44:20.354882Z | 2026-04-03T13:09:27Z |
| cleanstart-2026-kt07616 | Security fixes for CVE-2026-22735, CVE-2026-22737 applied in versions: 6.2.3-r0 | 2026-04-06T02:44:27.120329Z | 2026-04-03T13:09:27Z |
| cleanstart-2026-kt25851 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.87.0-r0, 0.87.0-r1, 0.88.0-r1 | 2026-04-06T02:44:54.790204Z | 2026-04-03T08:04:33Z |
| cleanstart-2026-dq17669 | Security fixes for CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-32287, CVE-2026-33186, CVE-2026-33762, CVE-2026-34165, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-fw7p-63qq-7hpr applied in versions: 1.13.2-r0, 1.14.1-r0, 1.14.1-r1 | 2026-04-06T02:45:34.659600Z | 2026-04-03T07:13:53Z |
| cleanstart-2026-ml41879 | Security fixes for CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-32287, CVE-2026-33186, CVE-2026-33762, CVE-2026-34165, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-fw7p-63qq-7hpr applied in versions: 1.13.2-r0, 1.14.0-r0, 1.14.0-r1, 1.14.1-r0 | 2026-04-06T02:45:36.057138Z | 2026-04-03T07:11:16Z |
| cleanstart-2026-nd57973 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:45:57.693609Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-lr09759 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T02:46:06.138686Z | 2026-04-03T07:10:19Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2024-ALE-001 | [MàJ] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways | 2024-01-11T00:00:00.000000 | 2024-04-15T00:00:00.000000 |
| certfr-2024-ale-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| CERTFR-2024-ALE-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| certfr-2023-ale-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| CERTFR-2023-ALE-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| certfr-2023-ale-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| CERTFR-2023-ALE-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| certfr-2023-ale-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2022-ale-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2022-ALE-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| CERTFR-2023-ALE-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| certfr-2023-ale-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| CERTFR-2023-ALE-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| certfr-2023-ale-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0387 | Multiples vulnérabilités dans les produits Netgate | 2026-04-02T00:00:00.000000 | 2026-04-02T00:00:00.000000 |
| certfr-2026-avi-0386 | Multiples vulnérabilités dans les produits Microsoft | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0385 | Multiples vulnérabilités dans Google Chrome | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0384 | Multiples vulnérabilités dans Joomla! | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0383 | Multiples vulnérabilités dans Sonicwall Email Security | 2026-04-01T00:00:00.000000 | 2026-04-01T00:00:00.000000 |
| certfr-2026-avi-0382 | Multiples vulnérabilités dans les produits FoxIT | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0381 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0380 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0379 | Vulnérabilité dans Elastic OpenTelemetry Java | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0378 | Vulnérabilité dans Symantec Data Loss Prevention (DLP) | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0377 | Multiples vulnérabilités dans Papercut | 2026-03-31T00:00:00.000000 | 2026-03-31T00:00:00.000000 |
| certfr-2026-avi-0376 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| certfr-2026-avi-0375 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| certfr-2026-avi-0374 | Vulnérabilité dans Docker Desktop | 2026-03-30T00:00:00.000000 | 2026-03-30T00:00:00.000000 |
| certfr-2026-avi-0372 | Multiples vulnérabilités dans les produits IBM | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0371 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0370 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0369 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0368 | Vulnérabilité dans les produits Microsoft | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0367 | Multiples vulnérabilités dans Zabbix | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0366 | Multiples vulnérabilités dans Traefik | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0365 | Multiples vulnérabilités dans Spring AI | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0364 | Multiples vulnérabilités dans les produits Siemens | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0363 | Multiples vulnérabilités dans les produits NetApp | 2026-03-27T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0300 | Multiples vulnérabilités dans Mattermost Server | 2026-03-17T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0362 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0361 | Multiples vulnérabilités dans Cisco IOS et IOS XE | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0360 | Multiples vulnérabilités dans ISC BIND | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0359 | Multiples vulnérabilités dans Grafana | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-000024 | Installer of M-Audio M-Track Duo HD may insecurely load Dynamic Link Libraries | 2026-02-12T13:32+09:00 | 2026-02-12T13:32+09:00 |
| jvndb-2026-000022 | Oki Electric Industry products and OEM products register Windows services with unquoted file paths | 2026-02-09T15:21+09:00 | 2026-02-09T15:21+09:00 |
| jvndb-2026-000021 | web2py vulnerable to open redirect | 2026-02-05T15:01+09:00 | 2026-02-05T15:01+09:00 |
| jvndb-2026-000017 | Improper file access permission settings in Mitsubishi Small-Capacity UPS Shutdown Software FREQSHIP-mini for Windows | 2026-02-03T14:57+09:00 | 2026-02-05T14:41+09:00 |
| jvndb-2026-000020 | Multiple vulnerabilities in Movable Type | 2026-02-04T16:15+09:00 | 2026-02-04T16:15+09:00 |
| jvndb-2026-000016 | Installer for Roland Cloud Manager may insecurely load Dynamic Link Libraries | 2026-02-03T14:57+09:00 | 2026-02-04T12:39+09:00 |
| jvndb-2024-002831 | ELECOM wireless LAN routers vulnerable to OS command injection | 2024-02-22T08:15+09:00 | 2026-02-04T12:02+09:00 |
| jvndb-2025-000041 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-06-24T14:50+09:00 | 2026-02-03T15:35+09:00 |
| jvndb-2024-000078 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2024-07-30T15:34+09:00 | 2026-02-03T15:35+09:00 |
| jvndb-2026-000019 | Multiple vulnerabilities in ELECOM wireless LAN products | 2026-02-03T14:57+09:00 | 2026-02-03T14:57+09:00 |
| jvndb-2026-000015 | Sonatype Nexus Repository vulnerable to server-side request forgery | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000014 | OS command injection in raspap-webgui | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000013 | Multiple Microsoft Office products vulnerable to untrusted search path | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000012 | Multiple vulnerabilities in Cybozu Garoon | 2026-02-02T15:18+09:00 | 2026-02-02T15:18+09:00 |
| jvndb-2026-000018 | Undocumented "TelnetEnable" functionality of End of Service NETGEAR products | 2026-01-30T14:23+09:00 | 2026-01-30T14:23+09:00 |
| jvndb-2026-002119 | Multiple vulnerabilities in BROTHER MFPs (multifunction printers) | 2026-01-30T11:26+09:00 | 2026-01-30T11:26+09:00 |
| jvndb-2026-002030 | Multiple Vulnerabilities in Cosminexus | 2026-01-29T10:32+09:00 | 2026-01-29T10:32+09:00 |
| jvndb-2026-001972 | Archer MR600 vulnerable to OS command injection | 2026-01-28T10:41+09:00 | 2026-01-28T10:41+09:00 |
| jvndb-2026-000011 | beat-access for Windows may insecurely load Dynamic Link Libraries | 2026-01-27T18:22+09:00 | 2026-01-27T18:22+09:00 |
| jvndb-2026-001732 | Multiple Brother software installers may insecurely load Dynamic Link Libraries | 2026-01-26T16:04+09:00 | 2026-01-26T16:04+09:00 |
| jvndb-2026-000010 | Command injection vulnerability in ASUS routers | 2026-01-23T15:22+09:00 | 2026-01-23T15:22+09:00 |
| jvndb-2026-001663 | "iRMC S5/S6" implemented in PRIMERGY vulnerable to incorrect authorization | 2026-01-23T11:29+09:00 | 2026-01-23T11:29+09:00 |
| jvndb-2026-001662 | Multiple vulnerabilities in Trend Micro Apex Central (January 2026) | 2026-01-23T11:29+09:00 | 2026-01-23T11:29+09:00 |
| jvndb-2026-000009 | Installer of Fujitsu ServerView Agents for Windows may insecurely load Dynamic Link Libraries | 2026-01-21T15:17+09:00 | 2026-01-21T15:17+09:00 |
| jvndb-2026-000008 | Ruijie Networks AP180 series vulnerable to OS command injection | 2026-01-21T15:17+09:00 | 2026-01-21T15:17+09:00 |
| jvndb-2026-001582 | Security information for Hitachi Disk Array Systems | 2026-01-21T12:11+09:00 | 2026-01-21T12:11+09:00 |
| jvndb-2026-001578 | ETERNUS SF vulnerable to insertion of sensitive information into maintenance data | 2026-01-20T20:00+09:00 | 2026-01-20T20:00+09:00 |
| jvndb-2026-001380 | Multiple vulnerabilities in Canon Small Office Multifunction Printers and Laser Printers | 2026-01-19T10:08+09:00 | 2026-01-19T10:08+09:00 |
| jvndb-2026-000007 | Multiple Vulnerabilities in TOA Network Cameras TRIFORA 3 series | 2026-01-16T15:06+09:00 | 2026-01-16T15:06+09:00 |
| jvndb-2025-022878 | Media Player MP-01 vulnerable to Missing Authentication for Critical Function | 2025-12-24T11:10+09:00 | 2026-01-15T11:10+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15854 | Canva Affinity越界读取漏洞(CNVD-2026-15854) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15853 | Canva Affinity越界读取漏洞(CNVD-2026-15853) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15852 | Canva Affinity越界写入漏洞 | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15851 | Canva Affinity越界读取漏洞(CNVD-2026-15851) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15850 | Canva Affinity越界读取漏洞(CNVD-2026-15850) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15849 | Canva Affinity越界读取漏洞(CNVD-2026-15849) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15848 | Canva Affinity越界读取漏洞(CNVD-2026-15848) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15847 | Canva Affinity越界读取漏洞(CNVD-2026-15847) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15846 | Canva Affinity越界读取漏洞(CNVD-2026-15846) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15845 | Canva Affinity越界读取漏洞(CNVD-2026-15845) | 2026-03-26 | 2026-04-02 |
| cnvd-2026-15844 | Canva Affinity越界读取漏洞 | 2026-03-26 | 2026-04-01 |
| cnvd-2026-15843 | WordPress插件Abandoned Cart Recovery for WooCommerce跨站脚本漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15842 | HCL Traveler存在未明漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15841 | HCL Aftermarket DPC硬编码漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15840 | HCL Aftermarket DPC文件上传漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15839 | HCL Aftermarket DPC跨站脚本漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15838 | HCL Aftermarket DPC访问控制错误漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15837 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15837) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15836 | HCL Aftermarket DPC输入验证错误漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15835 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15835) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15834 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15834) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15833 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15833) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15832 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15832) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15831 | HCL Aftermarket DPC会话固定漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15830 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15830) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15829 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15829) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15828 | HCL Aftermarket DPC存在未明漏洞(CNVD-2026-15828) | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15827 | HCL Aftermarket DPC存在未明漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15826 | HCL Aftermarket DPC跨源资源共享漏洞 | 2026-03-31 | 2026-04-01 |
| cnvd-2026-15825 | HCL Aftermarket DPC SQL注入漏洞 | 2026-03-31 | 2026-04-01 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15829 | Уязвимость системы управления базами данных MySQL и MariaDB, связанная с раскрытием инфор… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15825 | Уязвимость компонентов mm ядра операционной системы Linux, позволяющая нарушителю получит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15824 | Уязвимость компонента hugetlb.c ядра операционной системы Linux, позволяющая нарушителю п… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15822 | Уязвимость ядра операционной системы Linux, связанная с неправильной проверкой возвращаем… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15821 | Уязвимость компонента drm/sched ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15820 | Уязвимость компонента pinctrl-msm ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15816 | Уязвимость компонента smb ядра операционной системы Linux, позволяющая нарушителю нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15815 | Уязвимость ядра операционной системы Linux, связанная с чтением за допустимыми границами … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15814 | Уязвимость ядра операционной системы Linux, связанная с чтением за границами буфера данны… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15811 | Уязвимость компонента xusb ядра операционной системы Linux, позволяющая нарушителю вызват… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15810 | Уязвимость ядра операционной системы Linux, связанная с одновременным выполнением с испол… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15809 | Уязвимость компонента appletalk ядра операционной системы Linux, позволяющая нарушителю н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15808 | Уязвимость компонента drm/tegra ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15806 | Уязвимость компонента atm ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15804 | Уязвимость компонента mcast ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15803 | Уязвимость компонентов tmptcp ядра операционной системы Linux, позволяющая нарушителю пол… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15802 | Уязвимость компонента perf/core ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15800 | Уязвимость компонента mm/vmalloc.c ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15799 | Уязвимость модуля powerpc/eeh ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15798 | Уязвимость компонента crypto ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15797 | Уязвимость компонента xilinx ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15796 | Уязвимость компонента iwlwifi ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15795 | Уязвимость ядра операционной системы Linux, связанная с ошибками разыменования указателя,… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15794 | Уязвимость компонента dtpm_cpu ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15793 | Уязвимость компонента fbtft ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15792 | Уязвимость компонента net/tls ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15791 | Уязвимость компонента net/packet/af_packet.c ядра операционной системы Linux, позволяющая… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15790 | Уязвимость компонента net ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15789 | Уязвимость компонента pnv_php операционной системы Linux, позволяющая нарушителю вызвать … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15788 | Уязвимость компонента pnv_php ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201402-0026 | Buffer overflow in the process_ra function in the router advertisement daemon (radvd) bef… | 2024-07-23T22:25:48.682000Z |
| var-201805-1144 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.529000Z |
| var-201805-1143 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.635000Z |
| var-202005-0008 | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buf… | 2024-07-23T22:25:28.455000Z |
| var-202407-0704 | A vulnerability has been identified in CPCI85 Central Processing/Communication (All versi… | 2024-07-23T22:25:01.735000Z |
| var-200107-0035 | slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cau… | 2024-07-23T22:24:58.858000Z |
| var-200512-0643 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.371000Z |
| var-200512-0611 | Multiple heap-based buffer overflows in QuickTime.qts in Apple QuickTime Player 7.0.3 and… | 2024-07-23T22:24:53.455000Z |
| var-200512-0300 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.297000Z |
| var-200512-0297 | Integer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbit… | 2024-07-23T22:24:53.525000Z |
| var-200512-0294 | Buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitr… | 2024-07-23T22:24:53.234000Z |
| var-201407-0233 | Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote atta… | 2024-07-23T22:22:21.013000Z |
| var-201601-0038 | Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote atta… | 2024-07-23T22:22:04.421000Z |
| var-201801-0394 | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbi… | 2024-07-23T22:21:46.499000Z |
| var-201904-0181 | Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow… | 2024-07-23T22:21:36.530000Z |
| var-202108-1160 | Description: A permissions issue was addressed with improved validation. This issue is fi… | 2024-07-23T22:20:46.081000Z |
| var-202305-0218 | D-Link DAP-1360 webproc WEB_DisplayPage Stack-based Buffer Overflow Remote Code Execution… | 2024-07-23T22:20:18.349000Z |
| var-202305-0217 | D-Link DAP-1360 Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerabi… | 2024-07-23T22:20:18.369000Z |
| var-202305-0216 | D-Link DAP-1360 Multiple Parameters Stack-Based Buffer Overflow Remote Code Execution Vul… | 2024-07-23T22:20:18.413000Z |
| var-202305-0177 | D-Link DAP-1360 webproc Stack-based Buffer Overflow Remote Code Execution Vulnerability. … | 2024-07-23T22:20:18.434000Z |
| var-202305-0176 | D-Link DAP-1360 webproc var:sys_Token Heap-based Buffer Overflow Remote Code Execution Vu… | 2024-07-23T22:20:18.458000Z |
| var-202305-0166 | D-Link DAP-1360 webproc var:menu Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.326000Z |
| var-202305-0154 | D-Link DAP-1360 webproc var:page Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.503000Z |
| var-202305-0153 | D-Link DAP-1360 webupg UPGCGI_CheckAuth Numeric Truncation Remote Code Execution Vulnerab… | 2024-07-23T22:20:18.392000Z |
| var-202305-0071 | D-Link DAP-1360 webproc Heap-based Buffer Overflow Remote Code Execution Vulnerability. T… | 2024-07-23T22:20:18.481000Z |
| var-202305-0070 | D-Link DAP-1360 webproc COMM_MakeCustomMsg Stack-based Buffer Overflow Remote Code Execut… | 2024-07-23T22:20:18.303000Z |
| var-202308-3323 | D-Link DAP-2622 DDP Change ID Password Auth Username Stack-based Buffer Overflow Remote C… | 2024-07-23T22:20:12.387000Z |
| var-202308-3185 | D-Link DAP-2622 DDP Configuration Backup Filename Stack-based Buffer Overflow Remote Code… | 2024-07-23T22:20:12.455000Z |
| var-202308-3131 | D-Link DAP-2622 DDP Reset Factory Auth Password Stack-based Buffer Overflow Remote Code E… | 2024-07-23T22:20:12.487000Z |
| var-202308-3130 | D-Link DAP-2622 DDP Configuration Restore Auth Username Stack-based Buffer Overflow Remot… | 2024-07-23T22:20:12.431000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2024-067 | Phoenix Contact: Multiple Vulnerabilities in PLCnext Engineer | 2024-10-08T12:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-052 | Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors. | 2024-09-10T10:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2024-051 | Phoenix Contact: Multiple mGuard devices are vulnerable to a remote code injection due to SSH | 2024-09-10T10:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2023-010 | PHOENIX CONTACT: FL MGUARD affected by two vulnerabilities | 2023-06-13T06:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2022-001 | PHOENIX CONTACT: FL SWITCH 2xxx series incorrect privilege assignment | 2022-01-25T08:05:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2021-019 | PHOENIX CONTACT: Security Advisory for ILC1x1 Industrial controllers | 2021-06-23T12:16:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2019-003 | PHOENIX CONTACT: Multiple Vulnerabilities in MEVIEW3 | 2019-03-05T10:35:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2017-006 | PHOENIX CONTACT: FL SWITCH 3xxx/4xxx/48xx series web-service authentication bypass | 2018-01-10T09:36:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2025-029 | Phoenix Contact: Security Advisory for AXL F BK and IL BK bus couplers | 2025-05-13T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-036 | PHOENIX CONTACT: Products utilizing WIBU SYSTEMS CodeMeter components in versions prior to V7.21a | 2021-08-04T07:56:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-029 | PHOENIX CONTACT: DoS for PLCnext Control devices in versions <2021.0.5 LTS | 2021-08-04T07:58:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-025 | PHOENIX CONTACT: Security Advisory for PLCNext, ILC 2050 BI, FL MGUARD DM UNLIMITED, TC ROUTER und CLOUD CLIENT products | 2021-06-23T12:19:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-024 | PHOENIX CONTACT: Security Advisory for PLCNext, SMARTRTU AXC, CHARX control modular and EEM-SB37x | 2021-05-04T08:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-023 | PHOENIX CONTACT: Security Advisory for FL SWITCH SMCS series | 2021-06-23T12:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-022 | PHOENIX CONTACT: Security Advisory for FL COMSERVER UNI | 2021-06-23T12:16:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-021 | PHOENIX CONTACT: Security Advisory for AXL F BK and IL BK products | 2021-06-23T12:15:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2021-020 | PHOENIX CONTACT: Security Advisory for Automation Worx Software Suite | 2021-06-23T11:10:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-047 | PHOENIX CONTACT: BTP Touch Panels uncontrolled resource consumption | 2020-12-02T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-046 | PHOENIX CONTACT: mGuard <8.8.3 products missing initialization of resource | 2020-12-17T09:01:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-025 | PHOENIX CONTACT: Improper path sanitation on import of project files in PLCnext Engineer | 2020-07-21T09:38:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-023 | PHOENIX CONTACT: Two Vulnerabilities in Automation Worx Suite | 2020-07-01T08:25:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2020-003 | PHOENIX CONTACT: TC Router and TC Cloud Client multiple vulnerabilities | 2020-03-05T15:58:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-016 | PHOENIX CONTACT: Security Advisory for Automation Worx Software Suite | 2019-10-15T06:17:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-014 | PHOENIX CONTACT: Multiple Vulnerabilities in Automation Worx Software Suite | 2019-06-19T12:41:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-007 | PHOENIX CONTACT: command injection on RAD-80211-XD(/HP-BUS) | 2019-03-25T11:45:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-006 | PHOENIX CONTACT: unauthorized access to WEB-UI on FL NAT SMx | 2019-03-25T11:40:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2018-004 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 allows Command Injection | 2018-05-16T05:35:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2018-001 | PHOENIX CONTACT: Advisory for mGuard products | 2018-01-30T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2017-004 | PHOENIX CONTACT: FL COMSERVER cross-site scripting (XSS) vulnerability | 2017-12-05T08:50:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2017-003 | PHOENIX CONTACT: WLAN enabled devices utilising WPA2 encryption | 2017-11-09T16:20:00.000Z | 2025-05-14T12:28:19.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2023-015 | WAGO: Improper privilege management in web-based management | 2023-11-20T07:00:00.000Z | 2023-11-20T07:00:00.000Z |
| vde-2022-040 | WAGO: Multiple Vulnerabilities in Controller with WAGO I/O-Pro / CODESYS 2.3 Runtime | 2022-10-17T08:00:00.000Z | 2023-09-22T12:39:00.000Z |
| vde-2023-014 | WAGO: Bluetooth LE vulnerability in WLAN-ETHERNET-Gateway | 2023-07-31T07:00:00.000Z | 2023-07-31T07:00:00.000Z |
| vde-2023-005 | WAGO: Series 750-3x/-8x prone to MODBUS server DoS | 2023-06-25T06:00:00.000Z | 2023-06-25T06:00:00.000Z |
| vde-2022-060 | WAGO: Multiple vulnerabilities in web-based management of multiple products | 2023-02-27T11:00:00.000Z | 2023-02-27T11:00:00.000Z |
| vde-2022-055 | WAGO: Exposure of configuration interface in unmanaged switches | 2023-02-16T13:43:00.000Z | 2023-02-16T13:43:00.000Z |
| vde-2022-054 | WAGO: Unauthenticated Configuration Export in web-based management in multiple devices | 2023-01-12T07:52:00.000Z | 2023-01-12T07:52:00.000Z |
| vde-2022-042 | WAGO: Multiple products - Loss of MAC-Address-Filtering after reboot | 2022-10-17T08:00:00.000Z | 2022-10-17T08:00:00.000Z |
| vde-2022-047 | WAGO: FTP-Server - Denial-of-Service | 2022-10-12T08:00:00.000Z | 2022-10-12T08:00:00.000Z |
| vde-2022-035 | WAGO: Multiple product series affected by multiple CODESYS vulnerabilities | 2022-08-17T08:00:00.000Z | 2022-08-17T08:00:00.000Z |
| vde-2022-031 | WAGO: Multiple Products Series affected by multiple CODESYS vulnerabilities | 2022-08-17T08:00:00.000Z | 2022-08-17T08:00:00.000Z |
| vde-2022-004 | WAGO: Web-Based Management Cross-Site Scripting | 2022-03-09T07:00:00.000Z | 2022-03-09T07:00:00.000Z |
| vde-2021-050 | WAGO: Multiple devices affected by Vulnerabilities in NUCLEUS TCP Stack. | 2021-11-16T11:02:00.000Z | 2021-11-16T11:02:00.000Z |
| vde-2020-048 | M&M Software (WAGO): Deserialisation of untrusted data in fdtContainer | 2021-01-14T14:57:00.000Z | 2021-01-14T14:57:00.000Z |
| vde-2020-015 | WAGO: Web Based Management - Code Execution Vulnerability | 2020-06-10T08:00:00.000Z | 2020-06-10T08:00:00.000Z |
| vde-2020-010 | WAGO: Cloud Connectivity Remote Code Execution Vulnerability | 2020-03-09T09:25:00.000Z | 2020-03-09T09:25:00.000Z |
| vde-2020-007 | WAGO: Web-Based Management Denial of Service | 2020-03-09T09:10:00.000Z | 2020-03-09T09:10:00.000Z |
| vde-2019-022 | WAGO: Multiple Vulnerabilities in I/O-Check Service in Multiple Devices | 2019-12-16T09:00:00.000Z | 2019-12-16T09:00:00.000Z |
| vde-2019-013 | WAGO: Multiple Vulnerabilities in industrial managed switches | 2019-06-12T10:25:00.000Z | 2019-06-12T10:25:00.000Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2025-0008 |
7 (4.0)
|
Logged users can view vulnerability disclosure comment… |
CIRCL |
vulnerability-lookup |
2025-10-13T09:10:00.000Z | 2025-10-13T09:15:31.637686Z |
| GCVE-1-2025-0007 |
4.5 (4.0)
|
Missing email validation on user management |
CIRCL |
vulnerability-lookup |
2025-10-13T08:37:00.000Z | 2025-10-13T08:51:37.408861Z |
| GCVE-1-2025-0006 |
9.3 (4.0)
|
Potential XSS in admin CPE in organization model |
CIRCL |
vulnerability-lookup |
2025-10-13T08:29:00.000Z | 2025-10-13T08:52:23.411325Z |
| GCVE-1-2025-0005 |
9.4 (4.0)
|
Reflected XSS due to insecure use of Markup |
CIRCL |
vulnerability-lookup |
2025-10-13T08:23:29.812914Z | 2025-10-13T08:23:29.812914Z |
| GCVE-1-2025-0004 |
10 (4.0)
|
XSS in Comments, Bundles, and Sightings component of v… |
CIRCL |
vulnerability-lookup |
2025-09-25T14:10:00.000Z | 2025-11-19T10:16:47.656802Z |
| GCVE-1-2025-0003 |
9.3 (4.0)
|
Incorrect ACL for user settings edit, which previ… |
cerebrate |
cerebrate |
2025-08-22T12:33:00.000Z | 2025-08-23T07:55:10.950332Z |
| GCVE-1-2025-0002 |
8.9 (4.0)
|
Command Injection in Cl0p Exfiltration Python Script |
Cl0p ransomware |
exfiltration |
2025-07-01T08:19:00.000Z | 2025-07-01T10:58:58.443468Z |
| GCVE-1-2025-0001 |
5.3 (4.0)
|
The absence of a password confirmation step when deact… |
CIRCL |
Vulnerability-Lookup |
2025-05-27T08:58:00.000Z | 2025-05-30T14:27:56.273945Z |