Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-32930 |
7.1 (3.1)
|
Chamilo LMS has an IDOR in Gradebook Allows Cross-Cour… |
chamilo |
chamilo-lms |
2026-04-10T17:48:51.774Z | 2026-04-10T18:32:13.726Z |
| CVE-2026-32894 |
7.1 (3.1)
|
Chamilo LMS has an IDOR in Gradebook Allows Cross-Cour… |
chamilo |
chamilo-lms |
2026-04-10T17:44:24.994Z | 2026-04-10T17:44:24.994Z |
| CVE-2026-32893 |
5.4 (3.1)
|
Chamilo LMS has Reflected XSS via Unsanitized http_bui… |
chamilo |
chamilo-lms |
2026-04-10T17:42:24.220Z | 2026-04-10T17:42:24.220Z |
| CVE-2026-31941 |
7.7 (3.1)
|
Server-Side Request Forgery (SSRF) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:37:50.948Z | 2026-04-10T18:33:22.920Z |
| CVE-2026-31940 |
7.5 (3.1)
|
Session Fixation in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:35:10.661Z | 2026-04-10T17:35:10.661Z |
| CVE-2026-5483 |
8.5 (3.1)
|
Odh-dashboard: odh dashboard kubernetes service accoun… |
Red Hat |
Red Hat OpenShift AI 2.16 |
2026-04-10T17:33:25.055Z | 2026-04-10T21:07:45.000Z |
| CVE-2026-31939 |
8.3 (3.1)
|
Path Traversal (Arbitrary File Delete) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:32:29.252Z | 2026-04-10T17:32:29.252Z |
| CVE-2025-66447 |
0 (3.1)
|
Chamilo LMS has validation-less redirect on login page |
chamilo |
chamilo-lms |
2026-04-10T17:22:32.443Z | 2026-04-10T17:22:32.443Z |
| CVE-2026-40163 |
8.2 (3.1)
|
Saltcorn has an Unauthenticated Path Traversal in sync… |
saltcorn |
saltcorn |
2026-04-10T17:07:49.067Z | 2026-04-10T17:07:49.067Z |
| CVE-2026-40162 |
7.1 (3.1)
|
Bugsink affected by authenticated arbitrary file write… |
bugsink |
bugsink |
2026-04-10T17:02:58.985Z | 2026-04-10T18:30:44.339Z |
| CVE-2026-22560 |
N/A
|
An open redirect vulnerability in Rocket.Chat ver… |
Rocket.Chat |
Rocket.Chat |
2026-04-10T17:00:11.746Z | 2026-04-10T17:00:11.746Z |
| CVE-2026-40160 |
7.1 (4.0)
|
PraisonAIAgents has SSRF via unvalidated URL in `web_c… |
MervinPraison |
PraisonAIAgents |
2026-04-10T16:59:09.542Z | 2026-04-10T16:59:09.542Z |
| CVE-2026-40159 |
5.5 (3.1)
|
PraisonAI Exposes Sensitive Environment Variable via U… |
MervinPraison |
PraisonAI |
2026-04-10T16:57:11.623Z | 2026-04-10T16:57:11.623Z |
| CVE-2026-40158 |
8.6 (3.1)
|
PraisonAI has Improper Control of Generation of Code (… |
MervinPraison |
PraisonAI |
2026-04-10T16:49:24.753Z | 2026-04-10T18:31:12.440Z |
| CVE-2026-40157 |
9.4 (4.0)
|
PraisonAI affected by arbitrary file write via path tr… |
MervinPraison |
PraisonAI |
2026-04-10T16:47:16.109Z | 2026-04-10T16:47:16.109Z |
| CVE-2026-40156 |
7.8 (3.1)
|
PraisonAI Affected by Implicit Execution of Arbitrary … |
MervinPraison |
PraisonAI |
2026-04-10T16:46:15.807Z | 2026-04-10T16:46:15.807Z |
| CVE-2026-40100 |
5.3 (3.1)
|
FastGPT has Unauthenticated SSRF in /api/core/app/mcpT… |
labring |
FastGPT |
2026-04-10T16:39:25.856Z | 2026-04-10T16:39:25.856Z |
| CVE-2026-40097 |
3.7 (3.1)
|
Step CA affected by an index out of bounds panic in TP… |
smallstep |
certificates |
2026-04-10T16:34:53.330Z | 2026-04-10T18:30:15.176Z |
| CVE-2026-40074 |
6.3 (4.0)
|
SvelteKit's invalidated redirect in handle hook causes… |
sveltejs |
kit |
2026-04-10T16:26:07.068Z | 2026-04-10T16:26:07.068Z |
| CVE-2026-40073 |
8.2 (4.0)
|
SvelteKit has a BODY_SIZE_LIMIT bypass in @sveltejs/ad… |
sveltejs |
kit |
2026-04-10T16:24:39.987Z | 2026-04-10T16:24:39.987Z |
| CVE-2026-40086 |
5.3 (3.1)
|
Rembg has a Path Traversal via Custom Model Loading |
danielgatis |
rembg |
2026-04-10T16:16:28.850Z | 2026-04-10T18:29:27.832Z |
| CVE-2026-40103 |
4.3 (3.1)
|
Vikunja's Scoped API tokens with projects.background p… |
go-vikunja |
vikunja |
2026-04-10T16:12:27.603Z | 2026-04-10T16:12:27.603Z |
| CVE-2026-35602 |
5.4 (3.1)
|
Vikunja has a File Size Limit Bypass via Vikunja Import |
go-vikunja |
vikunja |
2026-04-10T16:10:39.630Z | 2026-04-10T16:10:39.630Z |
| CVE-2026-35601 |
4.1 (3.1)
|
Vikunja has an iCalendar Property Injection via CRLF i… |
go-vikunja |
vikunja |
2026-04-10T16:08:50.519Z | 2026-04-10T16:08:50.519Z |
| CVE-2026-35600 |
5.4 (3.1)
|
Vikunja has HTML Injection via Task Titles in Overdue … |
go-vikunja |
vikunja |
2026-04-10T16:07:07.846Z | 2026-04-10T16:07:07.846Z |
| CVE-2026-35599 |
6.5 (3.1)
|
Vikunja has an Algorithmic Complexity DoS in Repeating… |
go-vikunja |
vikunja |
2026-04-10T16:05:57.581Z | 2026-04-10T18:28:29.310Z |
| CVE-2026-35598 |
4.3 (3.1)
|
Vikunja has Missing Authorization on CalDAV Task Read |
go-vikunja |
vikunja |
2026-04-10T16:04:32.083Z | 2026-04-10T16:04:32.083Z |
| CVE-2026-35670 |
6 (4.0)
5.9 (3.1)
|
OpenClaw < 2026.3.22 - Webhook Reply Rebinding via Use… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:28.524Z | 2026-04-10T16:03:28.524Z |
| CVE-2026-35669 |
8.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.25 - Privilege Escalation via Gatewa… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:27.834Z | 2026-04-10T16:03:27.834Z |
| CVE-2026-35668 |
7.1 (4.0)
7.7 (3.1)
|
OpenClaw < 2026.3.24 - Sandbox Media Root Bypass via U… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:27.149Z | 2026-04-10T18:27:23.337Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-32893 |
5.4 (3.1)
|
Chamilo LMS has Reflected XSS via Unsanitized http_bui… |
chamilo |
chamilo-lms |
2026-04-10T17:42:24.220Z | 2026-04-10T17:42:24.220Z |
| CVE-2026-32892 |
9.1 (3.1)
|
OS Command Injection in Chamilo LMS 1.11.36 |
chamilo |
chamilo-lms |
2026-04-10T17:56:57.695Z | 2026-04-10T17:56:57.695Z |
| CVE-2026-31941 |
7.7 (3.1)
|
Server-Side Request Forgery (SSRF) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:37:50.948Z | 2026-04-10T18:33:22.920Z |
| CVE-2026-31940 |
7.5 (3.1)
|
Session Fixation in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:35:10.661Z | 2026-04-10T17:35:10.661Z |
| CVE-2026-31939 |
8.3 (3.1)
|
Path Traversal (Arbitrary File Delete) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:32:29.252Z | 2026-04-10T17:32:29.252Z |
| CVE-2026-1502 |
5.7 (4.0)
|
HTTP client proxy tunnel headers not validated for CR/LF |
Python Software Foundation |
CPython |
2026-04-10T17:54:44.121Z | 2026-04-11T04:39:26.099Z |
| CVE-2025-66447 |
0 (3.1)
|
Chamilo LMS has validation-less redirect on login page |
chamilo |
chamilo-lms |
2026-04-10T17:22:32.443Z | 2026-04-10T17:22:32.443Z |
| CVE-2026-40200 |
8.1 (3.1)
|
An issue was discovered in musl libc 0.7.10 throu… |
musl-libc |
musl |
2026-04-10T00:00:00.000Z | 2026-04-10T17:17:25.925Z |
| CVE-2026-40160 |
7.1 (4.0)
|
PraisonAIAgents has SSRF via unvalidated URL in `web_c… |
MervinPraison |
PraisonAIAgents |
2026-04-10T16:59:09.542Z | 2026-04-10T16:59:09.542Z |
| CVE-2026-40159 |
5.5 (3.1)
|
PraisonAI Exposes Sensitive Environment Variable via U… |
MervinPraison |
PraisonAI |
2026-04-10T16:57:11.623Z | 2026-04-10T16:57:11.623Z |
| CVE-2026-40158 |
8.6 (3.1)
|
PraisonAI has Improper Control of Generation of Code (… |
MervinPraison |
PraisonAI |
2026-04-10T16:49:24.753Z | 2026-04-10T18:31:12.440Z |
| CVE-2026-40157 |
9.4 (4.0)
|
PraisonAI affected by arbitrary file write via path tr… |
MervinPraison |
PraisonAI |
2026-04-10T16:47:16.109Z | 2026-04-10T16:47:16.109Z |
| CVE-2026-40156 |
7.8 (3.1)
|
PraisonAI Affected by Implicit Execution of Arbitrary … |
MervinPraison |
PraisonAI |
2026-04-10T16:46:15.807Z | 2026-04-10T16:46:15.807Z |
| CVE-2026-40103 |
4.3 (3.1)
|
Vikunja's Scoped API tokens with projects.background p… |
go-vikunja |
vikunja |
2026-04-10T16:12:27.603Z | 2026-04-10T16:12:27.603Z |
| CVE-2026-40100 |
5.3 (3.1)
|
FastGPT has Unauthenticated SSRF in /api/core/app/mcpT… |
labring |
FastGPT |
2026-04-10T16:39:25.856Z | 2026-04-10T16:39:25.856Z |
| CVE-2026-40097 |
3.7 (3.1)
|
Step CA affected by an index out of bounds panic in TP… |
smallstep |
certificates |
2026-04-10T16:34:53.330Z | 2026-04-10T18:30:15.176Z |
| CVE-2026-40086 |
5.3 (3.1)
|
Rembg has a Path Traversal via Custom Model Loading |
danielgatis |
rembg |
2026-04-10T16:16:28.850Z | 2026-04-10T18:29:27.832Z |
| CVE-2026-40074 |
6.3 (4.0)
|
SvelteKit's invalidated redirect in handle hook causes… |
sveltejs |
kit |
2026-04-10T16:26:07.068Z | 2026-04-10T16:26:07.068Z |
| CVE-2026-40073 |
8.2 (4.0)
|
SvelteKit has a BODY_SIZE_LIMIT bypass in @sveltejs/ad… |
sveltejs |
kit |
2026-04-10T16:24:39.987Z | 2026-04-10T16:24:39.987Z |
| CVE-2026-35670 |
6 (4.0)
5.9 (3.1)
|
OpenClaw < 2026.3.22 - Webhook Reply Rebinding via Use… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:28.524Z | 2026-04-10T16:03:28.524Z |
| CVE-2026-35669 |
8.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.25 - Privilege Escalation via Gatewa… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:27.834Z | 2026-04-10T16:03:27.834Z |
| CVE-2026-35668 |
7.1 (4.0)
7.7 (3.1)
|
OpenClaw < 2026.3.24 - Sandbox Media Root Bypass via U… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:27.149Z | 2026-04-10T18:27:23.337Z |
| CVE-2026-35667 |
6.9 (4.0)
6.1 (3.1)
|
OpenClaw < 2026.3.24 - Improper Process Termination vi… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:26.457Z | 2026-04-10T20:17:55.994Z |
| CVE-2026-35666 |
7.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.22 - Allowlist Bypass via Unregister… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:25.748Z | 2026-04-10T16:03:25.748Z |
| CVE-2026-35665 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.24 - Denial of Service via Feishu We… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:25.047Z | 2026-04-10T16:58:15.053Z |
| CVE-2026-35664 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.25 - DM Pairing Bypass via Legacy Ca… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:24.375Z | 2026-04-10T16:03:24.375Z |
| CVE-2026-35663 |
8.7 (4.0)
8.8 (3.1)
|
OpenClaw < 2026.3.25 - Privilege Escalation via Backen… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:23.672Z | 2026-04-10T16:03:23.672Z |
| CVE-2026-35662 |
5.3 (4.0)
4.3 (3.1)
|
OpenClaw < 2026.3.22 - Missing controlScope Enforcemen… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:22.937Z | 2026-04-10T18:24:24.250Z |
| CVE-2026-35661 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.25 - Telegram DM-Scoped Inline Butto… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:22.250Z | 2026-04-10T20:18:04.127Z |
| CVE-2026-35660 |
7.2 (4.0)
8.1 (3.1)
|
OpenClaw < 2026.3.23 - Insufficient Access Control in … |
OpenClaw |
OpenClaw |
2026-04-10T16:03:21.568Z | 2026-04-10T16:03:21.568Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2525 | A vulnerability has been found in Free5GC up to 4.1.0. This affects an unknown function of the comp… | 2026-02-16T02:16:06.153 | 2026-02-19T19:48:12.000 |
| fkie_cve-2026-2524 | A flaw has been found in Open5GS 2.7.6. The impacted element is the function mme_s11_handle_create_… | 2026-02-16T01:15:54.000 | 2026-02-18T19:07:38.287 |
| fkie_cve-2026-2523 | A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function smf_gn_ha… | 2026-02-16T01:15:53.767 | 2026-02-18T19:07:48.960 |
| fkie_cve-2026-2522 | A security vulnerability has been detected in Open5GS up to 2.7.6. Impacted is an unknown function … | 2026-02-16T00:16:07.550 | 2026-02-18T19:42:15.990 |
| fkie_cve-2026-2521 | A weakness has been identified in Open5GS up to 2.7.6. This issue affects the function sgwc_s5c_han… | 2026-02-15T23:16:05.803 | 2026-02-18T19:42:51.673 |
| fkie_cve-2026-26369 | eNet SMART HOME server 2.2.1 and 2.3.1 contains a privilege escalation vulnerability due to insuffi… | 2026-02-15T16:15:54.407 | 2026-02-28T01:34:28.150 |
| fkie_cve-2026-26368 | eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the resetU… | 2026-02-15T16:15:54.237 | 2026-02-28T01:33:46.257 |
| fkie_cve-2026-26367 | eNet SMART HOME server 2.2.1 and 2.3.1 contains a missing authorization vulnerability in the delete… | 2026-02-15T16:15:54.060 | 2026-03-02T15:16:35.977 |
| fkie_cve-2026-26366 | eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that… | 2026-02-15T16:15:53.870 | 2026-02-26T22:44:42.813 |
| fkie_cve-2019-25377 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability in the system_advanced_sysctl… | 2026-02-15T14:16:07.763 | 2026-02-18T19:08:16.513 |
| fkie_cve-2019-25376 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-15T14:16:07.590 | 2026-02-18T19:10:16.477 |
| fkie_cve-2019-25375 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-15T14:16:07.417 | 2026-02-18T19:11:03.210 |
| fkie_cve-2019-25374 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows attackers to inje… | 2026-02-15T14:16:07.243 | 2026-02-18T19:12:06.493 |
| fkie_cve-2019-25373 | OPNsense 19.1 contains a stored cross-site scripting vulnerability that allows authenticated attack… | 2026-02-15T14:16:07.067 | 2026-02-18T19:13:06.080 |
| fkie_cve-2019-25372 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-15T14:16:06.897 | 2026-02-18T19:13:34.990 |
| fkie_cve-2019-25371 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated a… | 2026-02-15T14:16:06.723 | 2026-02-18T19:14:24.603 |
| fkie_cve-2019-25370 | OPNsense 19.1 contains a reflected cross-site scripting vulnerability that allows attackers to inje… | 2026-02-15T14:16:06.550 | 2026-02-18T19:15:01.213 |
| fkie_cve-2019-25369 | OPNsense 19.1 contains a stored cross-site scripting vulnerability in the system_advanced_sysctl.ph… | 2026-02-15T14:16:06.370 | 2026-02-18T19:15:41.980 |
| fkie_cve-2019-25368 | OPNsense 19.1 contains multiple cross-site scripting vulnerabilities in the diag_backup.php endpoin… | 2026-02-15T14:16:06.190 | 2026-02-18T19:16:55.773 |
| fkie_cve-2019-25367 | ArangoDB Community Edition 3.4.2-1 contains multiple cross-site scripting vulnerabilities in the Aa… | 2026-02-15T14:16:05.083 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2517 | A security flaw has been discovered in Open5GS up to 2.7.6. This vulnerability affects the function… | 2026-02-15T13:16:16.690 | 2026-02-18T20:48:40.650 |
| fkie_cve-2026-2516 | A vulnerability was identified in Unidocs ezPDF DRM Reader and ezPDF Reader 2.0/3.0.0.4 on 32-bit. … | 2026-02-15T13:16:16.423 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2541 | The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling… | 2026-02-15T11:15:55.223 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2540 | The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks.… | 2026-02-15T11:15:55.070 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2539 | The RF communication protocol in the Micca KE700 car alarm system does not encrypt its data frames.… | 2026-02-15T11:15:54.897 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-32063 | There is a misconfiguration vulnerability inside the Infotainment ECU manufactured by BOSCH. The vu… | 2026-02-15T11:15:54.443 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-32062 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T11:15:54.307 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-32061 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T11:15:54.170 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-32060 | The system suffers from the absence of a kernel module signature verification. If an attacker can e… | 2026-02-15T11:15:54.023 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-32059 | The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment EC… | 2026-02-15T11:15:53.880 | 2026-02-18T17:52:22.253 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-pjjw-68hj-v9mw |
2.1 (4.0)
|
uv vulnerable to arbitrary file deletion through RECORD entries | 2026-04-10T19:39:15Z | 2026-04-10T19:39:15Z |
| ghsa-8x8f-54wf-vv92 |
9.1 (3.1)
|
PraisonAI Browser Server allows unauthenticated WebSocket clients to hijack connected extension sessions | 2026-04-10T19:32:59Z | 2026-04-10T19:32:59Z |
| ghsa-vc46-vw85-3wvm |
9.8 (3.1)
|
PraisonAI has critical RCE via `type: job` workflow YAML | 2026-04-10T19:32:48Z | 2026-04-10T19:32:48Z |
| ghsa-g985-wjh9-qxxc |
8.4 (3.1)
|
PraisonAI Vulnerable to RCE via Automatic tools.py Import | 2026-04-10T19:32:32Z | 2026-04-10T19:32:32Z |
| ghsa-vw86-c94w-v3x4 |
8.5 (3.1)
|
SiYuan: Publish Reader Path Traversal Delete via `removeUnusedAttributeView` | 2026-04-10T19:32:12Z | 2026-04-10T19:32:12Z |
| ghsa-7m5h-w69j-qggg |
8.1 (3.1)
|
SiYuan: Publish Reader Can Arbitrarily Delete Attribute View Files via `/api/av/removeUnusedAttribu… | 2026-04-10T19:32:07Z | 2026-04-10T21:32:45Z |
| ghsa-x783-xp3g-mqhp |
6.9 (4.0)
|
PraisonAI: SQLiteConversationStore didn't validate table_prefix when constructing SQL queries | 2026-04-10T19:32:00Z | 2026-04-10T19:32:00Z |
| ghsa-8hw4-fhww-273g |
7.1 (3.1)
|
Bugsink affected by authenticated arbitrary file write in artifactbundle/assemble | 2026-04-10T19:30:42Z | 2026-04-10T19:30:42Z |
| ghsa-59xv-588h-2vmm |
0.0 (3.1)
|
@saltcorn/data vulnerable to SQL Injection via jsexprToSQL Literal Handler | 2026-04-10T19:30:32Z | 2026-04-10T19:30:32Z |
| ghsa-32pv-mpqg-h292 |
8.2 (3.1)
|
Saltcorn has an Unauthenticated Path Traversal in sync endpoints, allowing arbitrary file write and… | 2026-04-10T19:30:27Z | 2026-04-10T19:30:27Z |
| ghsa-8frj-8q3m-xhgm |
7.2 (3.1)
|
PraisonAI Vulnerable to Server-Side Request Forgery via Unvalidated webhook_url in Jobs API | 2026-04-10T19:28:54Z | 2026-04-10T19:28:54Z |
| ghsa-ffp3-3562-8cv3 |
5.5 (3.1)
|
PraisonAI: Coarse-Grained Tool Approval Cache Bypasses Per-Invocation Consent for Shell Commands | 2026-04-10T19:28:38Z | 2026-04-10T19:28:38Z |
| ghsa-qq9r-63f6-v542 |
7.1 (4.0)
|
PraisonAIAgents: SSRF via unvalidated URL in `web_crawl` httpx fallback | 2026-04-10T19:28:28Z | 2026-04-10T19:28:28Z |
| ghsa-x462-jjpc-q4q4 |
8.1 (3.1)
|
PraisonAI: Cross-Origin Agent Execution via Hardcoded Wildcard CORS and Missing Authentication on A… | 2026-04-10T19:28:23Z | 2026-04-10T19:28:23Z |
| ghsa-pj2r-f9mw-vrcq |
5.5 (3.1)
|
PraisonAI Vulnerable to Sensitive Environment Variable Exposure via Untrusted MCP Subprocess Execution | 2026-04-10T19:28:15Z | 2026-04-10T19:28:15Z |
| ghsa-99g3-w8gr-x37c |
9.4 (4.0)
|
PraisonAI vulnerable to arbitrary file write via path traversal in `praisonai recipe unpack` | 2026-04-10T19:27:59Z | 2026-04-10T19:27:59Z |
| ghsa-2g3w-cpc4-chr4 |
7.8 (3.1)
|
PraisonAI Vulnerable to Implicit Execution of Arbitrary Code via Automatic `tools.py` Loading | 2026-04-10T19:26:44Z | 2026-04-10T19:26:44Z |
| ghsa-f2h6-7xfr-xm8w |
6.5 (3.1)
|
PraisonAI Vulnerable to Decompression Bomb DoS via Recipe Bundle Extraction Without Size Limits | 2026-04-10T19:26:21Z | 2026-04-10T19:26:21Z |
| ghsa-pv9q-275h-rh7x |
9.3 (3.1)
|
PraisonAI Vulnerable Untrusted Remote Template Code Execution | 2026-04-10T19:26:05Z | 2026-04-10T19:26:05Z |
| ghsa-qwgj-rrpj-75xm |
8.8 (3.1)
|
PraisonAI: Hardcoded `approval_mode="auto"` in Chainlit UI Overrides Administrator Configuration, E… | 2026-04-10T19:25:49Z | 2026-04-10T19:25:49Z |
| ghsa-3c4r-6p77-xwr7 |
8.6 (3.1)
|
PraisonAI Vulnerable to Code Injection and Protection Mechanism Failure | 2026-04-10T19:25:39Z | 2026-04-10T19:25:39Z |
| ghsa-7j2f-xc8p-fjmq |
5.3 (3.1)
|
PraisonAIAgents: Path Traversal via Unvalidated Glob Pattern in list_files Bypasses Workspace Boundary | 2026-04-10T19:24:32Z | 2026-04-10T19:24:32Z |
| ghsa-v8g7-9q6v-p3x8 |
7.4 (3.1)
|
PraisonAIAgents: Environment Variable Secret Exfiltration via os.path.expandvars() Bypassing shell=… | 2026-04-10T19:24:27Z | 2026-04-10T19:24:27Z |
| ghsa-pm96-6xpr-978x |
5.3 (3.1)
|
PraisonAI: Unauthenticated Information Disclosure of Agent Instructions via /api/agents in AgentOS | 2026-04-10T19:24:22Z | 2026-04-10T19:24:22Z |
| ghsa-4wr3-f4p3-5wjh |
7.9 (3.1)
|
PraisonAI: Unauthenticated Allow-List Manipulation Bypasses Agent Tool Approval Safety Controls | 2026-04-10T19:24:11Z | 2026-04-10T19:24:11Z |
| ghsa-8f4v-xfm9-3244 |
7.7 (3.1)
|
PraisonAIAgents has SSRF and Local File Read via Unvalidated URLs in web_crawl Tool | 2026-04-10T19:23:57Z | 2026-04-10T19:23:57Z |
| ghsa-grrg-5cg9-58pf |
6.2 (3.1)
|
PraisonAIAgents: Arbitrary File Read via read_skill_file Missing Workspace Boundary and Approval Gate | 2026-04-10T19:23:21Z | 2026-04-10T19:23:21Z |
| ghsa-2xgv-5cv2-47vv |
6.2 (3.1)
|
PraisonAI has Unrestricted Upload Size in WSGI Recipe Registry Server that Enables Memory Exhaustion DoS | 2026-04-10T19:23:13Z | 2026-04-10T19:23:13Z |
| ghsa-q5r4-47m9-5mc7 |
7.5 (3.1)
|
PraisonAI: Unauthenticated WebSocket Endpoint Proxies to Paid OpenAI Realtime API Without Rate Limits | 2026-04-10T19:22:52Z | 2026-04-10T19:22:52Z |
| ghsa-fvxx-ggmx-3cjg |
8.4 (3.1)
|
PraisonAI Vulnerable to Argument Injection into Cloud Run Environment Variables via Unsanitized Com… | 2026-04-10T19:22:37Z | 2026-04-10T19:22:37Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-259 |
9.8 (3.1)
|
In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by m… | torch | 2024-10-29T21:15:04+00:00 | 2025-07-16T03:09:57.748865+00:00 |
| pysec-2024-211 |
7.5 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote clien… | waitress | 2024-10-29T15:15:12+00:00 | 2025-01-19T19:19:01.852094+00:00 |
| pysec-2024-210 |
4.8 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may… | waitress | 2024-10-29T15:15:11+00:00 | 2025-01-19T19:19:01.811922+00:00 |
| pysec-2024-119 |
7.5 (3.1)
|
A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Ser… | chuanhuchatgpt | 2024-10-29T13:15:00+00:00 | 2024-11-04T22:22:08.835024+00:00 |
| pysec-2024-116 |
9.0 (3.1)
|
A vulnerability in the discussion image upload function of the Lollms application, versio… | lollms | 2024-10-29T13:15:00+00:00 | 2024-11-01T21:22:09.060172+00:00 |
| pysec-2024-114 |
9.8 (3.1)
|
A vulnerability in the GraphCypherQAChain class of langchain-ai/langchainjs versions 0.2.… | langchain | 2024-10-29T13:15:00Z | 2024-11-04T19:21:44.923698Z |
| pysec-2024-113 |
4.3 (3.1)
|
In the latest version (20240628) of gaizhenbiao/chuanhuchatgpt, an issue exists in the /f… | chuanhuchatgpt | 2024-10-29T13:15:00+00:00 | 2024-10-31T19:20:49.353218+00:00 |
| pysec-2024-112 |
7.5 (3.1)
|
An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 2024062… | chuanhuchatgpt | 2024-10-29T13:15:00+00:00 | 2024-10-31T19:20:49.309758+00:00 |
| pysec-2024-111 |
9.1 (3.1)
|
A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langcha… | langchain | 2024-10-29T13:15:00Z | 2025-05-02T18:39:47.588215Z |
| pysec-2024-191 |
5.5 (3.1)
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2024-10-24T22:15:04+00:00 | 2025-01-19T10:22:29.812605+00:00 |
| pysec-2024-120 |
7.8 (3.1)
|
An issue in assimp v.5.4.3 allows a local attacker to execute arbitrary code via the Call… | pyassimp | 2024-10-24T21:15:00+00:00 | 2024-11-05T20:22:53.185968+00:00 |
| pysec-2024-248 |
7.8 (3.1)
|
OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its … | opencanary | 2024-10-14T21:15:12+00:00 | 2025-05-16T14:23:05.150356+00:00 |
| pysec-2024-122 |
4.4 (3.1)
|
A path traversal vulnerability exists in the api open_personality_folder endpoint of pari… | lollms | 2024-10-11T16:15:00+00:00 | 2024-11-15T20:23:01.816492+00:00 |
| pysec-2024-220 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.972580+00:00 |
| pysec-2024-219 |
9.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.897787+00:00 |
| pysec-2024-218 |
8.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.803143+00:00 |
| pysec-2024-217 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This is a **data … | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.723816+00:00 |
| pysec-2024-216 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.549944+00:00 |
| pysec-2024-199 |
3.7 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T16:22:57.938459+00:00 |
| pysec-2024-215 |
9.8 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T22:22:23.471780+00:00 |
| pysec-2024-198 |
4.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T16:22:57.845317+00:00 |
| pysec-2024-214 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.399444+00:00 |
| pysec-2024-213 |
6.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.310301+00:00 |
| pysec-2024-197 |
5.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.732726+00:00 |
| pysec-2024-196 |
8.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.640183+00:00 |
| pysec-2024-168 |
6.5 (3.1)
|
Taipy is an open-source Python library for easy, end-to-end application development for d… | taipy | 2024-10-09T19:15:14+00:00 | 2025-01-18T19:19:07.718423+00:00 |
| pysec-2024-109 |
7.8 (3.1)
|
DeepSpeed Remote Code Execution Vulnerability | deepspeed | 2024-10-08T18:15:00+00:00 | 2024-10-17T23:22:43.000269+00:00 |
| pysec-2024-102 |
|
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.… | django | 2024-10-08T16:15:00+00:00 | 2024-10-08T19:19:01.400873+00:00 |
| pysec-2024-121 |
6.5 (3.1)
|
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from… | openc3 | 2024-10-02T20:15:00+00:00 | 2024-11-13T20:22:56.434107+00:00 |
| pysec-2024-101 |
6.5 (3.1)
|
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from… | openc3 | 2024-10-02T20:15:00+00:00 | 2024-10-08T17:22:06.539206+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2477 | Malicious code in strapi-plugin-nordica-stage (npm) | 2026-04-03T19:05:39Z | 2026-04-07T16:38:18Z |
| mal-2026-2476 | Malicious code in strapi-plugin-nordica-recon (npm) | 2026-04-03T19:05:26Z | 2026-04-07T16:38:18Z |
| mal-2026-2472 | Malicious code in strapi-plugin-nordica-api (npm) | 2026-04-03T19:05:08Z | 2026-04-07T16:38:18Z |
| mal-2026-2473 | Malicious code in strapi-plugin-nordica-cms (npm) | 2026-04-03T19:04:49Z | 2026-04-07T16:38:18Z |
| mal-2026-2478 | Malicious code in strapi-plugin-nordica-sync (npm) | 2026-04-03T19:04:46Z | 2026-04-07T16:38:18Z |
| mal-2026-2475 | Malicious code in strapi-plugin-nordica-lite (npm) | 2026-04-03T19:04:32Z | 2026-04-07T16:38:18Z |
| mal-2026-2479 | Malicious code in strapi-plugin-nordica-tools (npm) | 2026-04-03T19:04:28Z | 2026-04-07T16:38:18Z |
| mal-2026-2484 | Malicious code in strapi-plugin-sitemap-gen (npm) | 2026-04-03T19:04:21Z | 2026-04-07T16:38:18Z |
| mal-2026-2468 | Malicious code in strapi-plugin-locale (npm) | 2026-04-03T17:28:57Z | 2026-04-07T16:38:18Z |
| mal-2026-2451 | Malicious code in strapi-plugin-api (npm) | 2026-04-03T17:27:21Z | 2026-04-07T16:38:18Z |
| mal-2026-2481 | Malicious code in strapi-plugin-notify (npm) | 2026-04-03T17:27:10Z | 2026-04-07T16:38:18Z |
| mal-2026-2462 | Malicious code in strapi-plugin-form (npm) | 2026-04-03T17:26:57Z | 2026-04-07T16:38:18Z |
| mal-2026-2482 | Malicious code in strapi-plugin-seed (npm) | 2026-04-03T17:24:36Z | 2026-04-07T16:38:18Z |
| mal-2026-2485 | Malicious code in strapi-plugin-sync (npm) | 2026-04-03T17:24:04Z | 2026-04-07T15:47:31Z |
| mal-2026-2464 | Malicious code in strapi-plugin-health (npm) | 2026-04-03T17:23:49Z | 2026-04-07T15:47:31Z |
| mal-2026-2469 | Malicious code in strapi-plugin-logger (npm) | 2026-04-03T16:13:59Z | 2026-04-07T15:47:31Z |
| mal-2026-2470 | Malicious code in strapi-plugin-monitor (npm) | 2026-04-03T16:13:14Z | 2026-04-07T16:38:18Z |
| mal-2026-2467 | Malicious code in strapi-plugin-hooks (npm) | 2026-04-03T16:11:54Z | 2026-04-07T15:47:31Z |
| mal-2026-2456 | Malicious code in strapi-plugin-core (npm) | 2026-04-03T16:11:29Z | 2026-04-07T15:47:31Z |
| mal-2026-2458 | Malicious code in strapi-plugin-database (npm) | 2026-04-03T16:11:12Z | 2026-04-07T15:47:31Z |
| mal-2026-2483 | Malicious code in strapi-plugin-server (npm) | 2026-04-03T16:10:54Z | 2026-04-07T14:41:25Z |
| mal-2026-2454 | Malicious code in strapi-plugin-config (npm) | 2026-04-03T16:10:23Z | 2026-04-07T15:47:31Z |
| mal-2026-2457 | Malicious code in strapi-plugin-cron (npm) | 2026-04-03T16:09:41Z | 2026-04-07T15:47:31Z |
| mal-2026-2448 | Malicious code in supervisors (PyPI) | 2026-04-03T11:40:59Z | 2026-04-03T11:40:59Z |
| mal-2026-2460 | Malicious code in strapi-plugin-events (npm) | 2026-04-03T11:03:27Z | 2026-04-07T15:47:31Z |
| mal-2026-2449 | Malicious code in mgc (npm) | 2026-04-03T11:03:27Z | 2026-04-07T14:41:23Z |
| mal-2026-2446 | Malicious code in @corpweb-ui/wmkt-library (npm) | 2026-04-03T08:18:07Z | 2026-04-07T14:41:19Z |
| mal-2026-2447 | Malicious code in @toprank/partner (npm) | 2026-04-03T07:43:43Z | 2026-04-07T14:41:20Z |
| mal-2026-2433 | Malicious code in pycolorlib3 (PyPI) | 2026-04-02T20:38:16Z | 2026-04-10T21:49:20Z |
| mal-2026-2432 | Malicious code in nwin64tls (PyPI) | 2026-04-02T20:28:37Z | 2026-04-02T20:28:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0695 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2026-03-11T23:00:00.000+00:00 | 2026-03-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0692 | Mattermost MS Teams plugin: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-10T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0691 | OpenClaw: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0690 | cURL: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0688 | cPanel cPanel/WHM: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0660 | Microsoft System Center Operations Manager: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0659 | Microsoft Office und SharePoint Produkte: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0658 | Microsoft SQL Server: Mehrere Schwachstellen ermöglichen Erlangen von Administratorrechten | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0657 | Microsoft ASP.NET und .NET: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0656 | Microsoft Authenticator App: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0655 | Microsoft Azure Komponenten: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0643 | ImageMagick: Mehrere Schwachstellen | 2026-03-09T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0641 | NATS Server: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-09T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0629 | Zabbix: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0628 | Nextcloud: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0627 | CoreDNS: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0626 | Flowise: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0615 | Red Hat Enterprise Linux (nfs-utils): Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0614 | Linux Kernel: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0612 | Google Chrome: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0611 | Eclipse Jetty: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-04T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0607 | CPython: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0599 | Drupal Extensions: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0595 | Ruby: Schwachstelle ermöglicht Denial of Service | 2026-03-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0586 | OpenClaw: Mehrere Schwachstellen | 2026-03-03T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0579 | Django: Mehrere Schwachstellen | 2026-03-03T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0573 | OpenClaw: Mehrere Schwachstellen | 2026-03-02T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0565 | FreeType: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-03-02T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0557 | OpenClaw: Mehrere Schwachstellen | 2026-03-01T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0556 | vim: Mehrere Schwachstellen | 2026-03-01T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-029-01 | KiloView Encoder Series (Update A) | 2026-01-29T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-043-06 | Siemens SINEC OS | 2026-01-28T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-027-04 | Johnson Controls Metasys Products | 2026-01-27T07:00:00.000000Z | 2026-01-27T07:00:00.000000Z |
| icsa-26-027-01 | iba Systems ibaPDA | 2026-01-27T07:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-043-09 | Hitachi Energy SuprOS | 2026-01-27T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-036-06 | Hitachi Energy FOX61x | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-05 | Hitachi Energy XMC20 | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-022-08 | EVMAPA | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-07 | Delta Electronics DIAView | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-06 | Hubitat Elevation Hubs | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-05 | Weintek cMT X Series HMI EasyWeb Service | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-04 | Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-03 | Rockwell Automation CompactLogix 5370 | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-02 | AutomationDirect CLICK Programmable Logic Controller | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-020-03 | Rockwell Automation Verve Asset Manager | 2026-01-20T07:00:00.000000Z | 2026-01-20T07:00:00.000000Z |
| va-26-015-01 | NOAA PMEL Live Access Server (LAS) command injection | 2026-01-15T19:59:37Z | 2026-01-15T19:59:37Z |
| icsa-26-015-01 | AVEVA Process Optimization | 2026-01-15T07:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-26-083-03 | "Schneider Electric Plant iT/Brewmaxx" | 2026-01-13T08:00:00.000000Z | 2026-03-24T06:00:00.000000Z |
| icsa-26-027-03 | Schneider Electric Zigbee Products | 2026-01-13T08:00:00.000000Z | 2026-01-27T20:13:34.637968Z |
| icsa-26-022-01 | Schneider Electric | 2026-01-13T08:00:00.000000Z | 2026-01-22T17:29:46.950679Z |
| icsa-26-015-10 | Schneider Electric EcoStruxure Power Build Rapsody (Update A) | 2026-01-13T08:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-26-013-03 | YoSmart YoLink Smart Hub | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-02 | Rockwell Automation FactoryTalk DataMosaix Private Cloud | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-01 | Rockwell Automation 432ES-IG3 Series A | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| va-26-013-01 | NSecKrnl driver terminates system processes with crafted IOCTL requests | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| icsa-26-015-09 | Siemens Industrial Edge Device Kit | 2026-01-13T00:00:00.000000Z | 2026-01-14T21:54:58.722065Z |
| icsa-26-015-08 | Siemens Industrial Edge Devices | 2026-01-13T00:00:00.000000Z | 2026-01-14T23:03:52.355094Z |
| icsa-26-015-07 | Siemens RUGGEDCOM APE1808 Devices | 2026-01-13T00:00:00.000000Z | 2026-01-14T22:35:44.478578Z |
| icsa-26-015-04 | Siemens SIMATIC and SIPLUS products | 2026-01-13T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-015-03 | Siemens TeleControl Server Basic | 2026-01-13T00:00:00.000000Z | 2026-01-14T22:32:36.777247Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-iosxe-arg-inject-eyddbh4e | Cisco IOS XE Software CLI Argument Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-cmd-inject-rpjm8bgl | Cisco IOS XE Software HTTP API Command Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-tacacs-hdb7thjw | Cisco IOS and IOS XE Software TACACS+ Authentication Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-01T16:39:50+00:00 |
| cisco-sa-ios-invalid-url-dos-nvxszf6u | Cisco IOS Software Industrial Ethernet Switch Device Manager Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-cli-eb7cz6yo | Cisco IOS and IOS XE Software CLI Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-defaultacl-psjk9nvf | Cisco SD-WAN vEdge Software Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-cat9k-ptmd7bgy | Cisco IOS XE Software for Catalyst 9000 Series Switches Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-30T14:26:46+00:00 |
| cisco-sa-cat9k-acl-l4k7vxgd | Cisco IOS XE Software on Cisco Catalyst 9500X and 9600X Series Switches Virtual Interface Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ap-ipv6-gw-tuazpn9o | Cisco Access Point Software Intermittent IPv6 Gateway Change Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:51+00:00 |
| cisco-sa-action-frame-inj-qqcncz8h | Cisco Wireless Access Point Software Device Analytics Action Frame Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-9800cl-openscep-sb4xtxzp | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controller for Cloud Unauthenticated Access to Certificate Enrollment Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-xrsig-uy4zrucg | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-iosxr-arp-storm-ejuu55ym | Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-acl-packetio-swjhhbtz | Cisco IOS XR Software Management Interface ACL Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-webex-xss-55bv8hhm | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-webex-urlredirect-uk8ddjsz | Cisco Webex Meetings URL Redirection Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-phone-write-g3kcc5df | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-imp-xss-xqgu4hsg | Cisco Unified Communications Manager IM & Presence Service Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-xjqzsycp | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-info-dis-zhppmfgz | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Information Disclosure Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epni-arb-file-upload-jjdm2p83 | Cisco Evolved Programmable Network Manager Arbitrary File Upload Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-cucm-csrf-w762pryd | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-ucs-xss-ey6xhyps | Cisco UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-vkvmorv-cnkrv7hk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Open Redirect Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-multi-cmdinj-e4ukjyrz | Cisco UCS Manager Software Command Injection Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-kvmsxss-6h7anuyk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxospc-pim6-vg4jfph | Cisco Nexus 3000 and 9000 Series Switches Protocol Independent Multicast Version 6 Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-infodis-tectysfg | Cisco NX-OS Software Sensitive Log Information Disclosure Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-qhnze5ss | Cisco NX-OS Software Command Injection Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nshs-urapi-gjubvfpu | Cisco Nexus Dashboard and Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-26133 | M365 Copilot Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-04-09T07:00:00.000Z |
| msrc_cve-2026-26132 | Windows Kernel Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26131 | .NET Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26130 | ASP.NET Core Denial of Service Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26128 | Windows SMB Server Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26123 | Microsoft Authenticator Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26121 | Azure IOT Explorer Spoofing Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26120 | Microsoft Bing Tampering Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-19T07:00:00.000Z |
| msrc_cve-2026-26118 | Azure MCP Server Tools Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-20T07:00:00.000Z |
| msrc_cve-2026-26117 | Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26116 | SQL Server Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26115 | SQL Server Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26114 | Microsoft SharePoint Server Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26113 | Microsoft Office Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26112 | Microsoft Excel Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26111 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-13T07:00:00.000Z |
| msrc_cve-2026-26110 | Microsoft Office Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26109 | Microsoft Excel Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26108 | Microsoft Excel Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26107 | Microsoft Excel Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26106 | Microsoft SharePoint Server Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-26105 | Microsoft SharePoint Server Spoofing Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25190 | GDI Remote Code Execution Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25189 | Windows DWM Core Library Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25188 | Windows Telephony Service Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25187 | Winlogon Elevation of Privilege Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25186 | Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25185 | Windows Shell Link Processing Spoofing Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25181 | GDI+ Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| msrc_cve-2026-25180 | Windows Graphics Component Information Disclosure Vulnerability | 2026-03-10T07:00:00.000Z | 2026-03-10T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0020 | Kwetsbaarheden verholpen in Oracle Commerce | 2026-01-21T09:18:16.268788Z | 2026-01-21T09:18:16.268788Z |
| ncsc-2026-0019 | Kwetsbaarheid verholpen in Fortinet FortiSIEM | 2026-01-16T13:34:34.467426Z | 2026-01-16T13:34:34.467426Z |
| ncsc-2026-0018 | Kwetsbaarheden verholpen in TYPO3 CMS | 2026-01-16T10:11:37.524826Z | 2026-01-16T10:11:37.524826Z |
| ncsc-2026-0017 | Kwetsbaarheden verholpen in Juniper Networks JunOS | 2026-01-16T10:07:39.310560Z | 2026-01-16T10:07:39.310560Z |
| ncsc-2026-0016 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2026-01-16T09:44:20.575860Z | 2026-01-16T09:44:20.575860Z |
| ncsc-2026-0015 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2026-01-15T12:31:57.265723Z | 2026-01-15T12:31:57.265723Z |
| ncsc-2026-0014 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-01-15T12:16:05.427141Z | 2026-01-15T12:16:05.427141Z |
| ncsc-2026-0013 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2026-01-14T13:45:48.530782Z | 2026-01-14T13:45:48.530782Z |
| ncsc-2026-0012 | Kwetsbaarheden verholpen in Adobe Dreamweaver Desktop | 2026-01-14T13:41:56.261778Z | 2026-01-14T13:41:56.261778Z |
| ncsc-2026-0011 | Kwetsbaarheid verholpen in Microsoft Developer Tools | 2026-01-13T19:19:27.690900Z | 2026-01-13T19:19:27.690900Z |
| ncsc-2026-0010 | Kwetsbaarheden verholpen in Microsoft Office | 2026-01-13T19:18:45.984019Z | 2026-03-20T14:03:59.225773Z |
| ncsc-2026-0009 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-01-13T19:17:59.629364Z | 2026-01-13T19:17:59.629364Z |
| ncsc-2026-0008 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-01-13T19:17:18.848673Z | 2026-01-13T19:17:18.848673Z |
| ncsc-2026-0007 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-01-13T19:16:30.720079Z | 2026-01-13T19:16:30.720079Z |
| ncsc-2026-0006 | Kwetsbaarheden verholpen in SAP producten | 2026-01-13T14:42:24.621603Z | 2026-01-13T14:42:24.621603Z |
| ncsc-2026-0005 | Kwetsbaarheden verholpen in Siemens producten | 2026-01-13T12:05:57.353070Z | 2026-01-13T12:05:57.353070Z |
| ncsc-2026-0004 | Kwetsbaarheden verholpen in Trend Micro Apex Central | 2026-01-09T11:14:58.910197Z | 2026-01-09T11:14:58.910197Z |
| ncsc-2026-0003 | Kwetsbaarheden verholpen in GitLab | 2026-01-09T11:11:48.308357Z | 2026-01-09T11:11:48.308357Z |
| ncsc-2026-0002 | Kwetsbaarheid verholpen in n8n | 2026-01-08T12:34:29.315681Z | 2026-01-08T12:34:29.315681Z |
| ncsc-2026-0001 | Kwetsbaarheden verholpen in Hanwha camera systemen | 2026-01-08T12:28:21.446188Z | 2026-01-08T12:28:21.446188Z |
| ncsc-2025-0405 | Kwetsbaarheid verholpen in Roundcube Webmail | 2025-12-31T14:29:26.821576Z | 2025-12-31T14:29:26.821576Z |
| ncsc-2025-0404 | Kwetsbaarheid verholpen in SmarterMail | 2025-12-31T14:19:01.847364Z | 2025-12-31T14:19:01.847364Z |
| ncsc-2025-0403 | Kwetsbaarheden verholpen in QNAP besturingssystemen | 2025-12-29T09:17:28.385450Z | 2025-12-29T09:17:28.385450Z |
| ncsc-2025-0402 | Kwetsbaarheid verholpen in MongoDB | 2025-12-27T11:38:11.514349Z | 2025-12-27T11:38:11.514349Z |
| ncsc-2025-0401 | Kwetsbaarheden verholpen in Foxit PDF Reader | 2025-12-24T09:14:56.590353Z | 2025-12-24T09:14:56.590353Z |
| ncsc-2025-0400 | Kwetsbaarheid verholpen in WatchGuard Firebox | 2025-12-19T11:16:01.438518Z | 2025-12-19T11:16:01.438518Z |
| ncsc-2025-0399 | Kwetsbaarheid verholpen in HPE OneView Software | 2025-12-18T18:38:20.794784Z | 2025-12-24T11:29:46.123674Z |
| ncsc-2025-0398 | Kwetsbaarheid in Cisco AsyncOS | 2025-12-17T19:47:00.346651Z | 2025-12-17T19:47:00.346651Z |
| ncsc-2025-0397 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-12-15T09:08:39.804149Z | 2025-12-15T09:08:39.804149Z |
| ncsc-2025-0396 | Kwetsbaarheden verholpen in Apple macOS | 2025-12-15T09:06:36.450655Z | 2025-12-15T09:06:36.450655Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10455-1 | python311-requests-2.33.0-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10454-1 | python311-cryptography-46.0.6-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10453-1 | libpolkit-agent-1-0-127-3.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10452-1 | libjavamapscript-8.6.1-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10451-1 | libpng16-16-1.6.56-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10450-1 | incus-6.23-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10449-1 | gsl-2.8-5.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10448-1 | bind-9.20.21-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10447-1 | MozillaThunderbird-140.9.0-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10446-1 | ImageMagick-7.1.2.18-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:20439-1 | Security update for MozillaFirefox | 2026-03-27T12:32:55Z | 2026-03-27T12:32:55Z |
| opensuse-su-2026:20441-1 | Security update for GraphicsMagick | 2026-03-27T12:17:58Z | 2026-03-27T12:17:58Z |
| opensuse-su-2026:20438-1 | Security update for docker-compose | 2026-03-27T10:04:45Z | 2026-03-27T10:04:45Z |
| opensuse-su-2026:10445-1 | traefik2-2.11.42-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:10444-1 | traefik-3.6.12-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:10443-1 | libsuricata8_0_4-8.0.4-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:10442-1 | dovecot24-2.4.3-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:20437-1 | Security update for net-tools | 2026-03-26T15:12:43Z | 2026-03-26T15:12:43Z |
| opensuse-su-2026:20433-1 | Security update for openexr | 2026-03-26T10:03:06Z | 2026-03-26T10:03:06Z |
| opensuse-su-2026:20432-1 | Security update for fetchmail | 2026-03-26T09:57:56Z | 2026-03-26T09:57:56Z |
| opensuse-su-2026:20427-1 | Security update for chromium | 2026-03-26T06:02:22Z | 2026-03-26T06:02:22Z |
| opensuse-su-2026:10441-1 | strongswan-6.0.5-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10440-1 | jupyter-nbclassic-1.3.3-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10439-1 | plexus-utils-4.0.2-2.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10438-1 | openbao-2.5.2-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10437-1 | libnghttp2-14-1.68.1-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10436-1 | freeipmi-1.6.17-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10435-1 | cpp-httplib-devel-0.38.0-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10434-1 | chromedriver-146.0.7680.164-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10433-1 | LibVNCServer-devel-0.9.15-2.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6725 | Red Hat Security Advisory: vim security update | 2026-04-07T01:58:27+00:00 | 2026-04-09T20:37:31+00:00 |
| rhsa-2026:6720 | Red Hat Security Advisory: Red Hat Quay 3.12.16 | 2026-04-06T22:57:46+00:00 | 2026-04-10T16:29:18+00:00 |
| rhsa-2026:6713 | Red Hat Security Advisory: ImageMagick security update | 2026-04-06T18:57:01+00:00 | 2026-04-06T22:26:28+00:00 |
| rhsa-2026:6712 | Red Hat Security Advisory: freerdp security update | 2026-04-06T18:44:31+00:00 | 2026-04-09T14:38:12+00:00 |
| rhsa-2026:6692 | Red Hat Security Advisory: kernel security update | 2026-04-06T16:24:30+00:00 | 2026-04-08T19:38:57+00:00 |
| rhsa-2026:6665 | Red Hat Security Advisory: freerdp security update | 2026-04-06T14:51:20+00:00 | 2026-04-09T14:38:09+00:00 |
| rhsa-2026:6647 | Red Hat Security Advisory: libarchive security update | 2026-04-06T09:32:55+00:00 | 2026-04-09T20:37:30+00:00 |
| rhsa-2026:6632 | Red Hat Security Advisory: kernel security update | 2026-04-06T08:09:40+00:00 | 2026-04-08T20:50:08+00:00 |
| rhsa-2026:6635 | Red Hat Security Advisory: fontforge security update | 2026-04-06T07:50:34+00:00 | 2026-04-08T13:34:43+00:00 |
| rhsa-2026:6630 | Red Hat Security Advisory: gnutls security update | 2026-04-06T07:24:34+00:00 | 2026-04-09T20:36:52+00:00 |
| rhsa-2026:6631 | Red Hat Security Advisory: fontforge security update | 2026-04-06T06:36:19+00:00 | 2026-04-08T13:34:40+00:00 |
| rhsa-2026:6628 | Red Hat Security Advisory: fontforge security update | 2026-04-06T05:23:14+00:00 | 2026-04-08T13:34:36+00:00 |
| rhsa-2026:6620 | Red Hat Security Advisory: vim security update | 2026-04-06T03:44:03+00:00 | 2026-04-10T14:25:22+00:00 |
| rhsa-2026:6621 | Red Hat Security Advisory: crun security update | 2026-04-06T03:41:18+00:00 | 2026-04-06T10:31:25+00:00 |
| rhsa-2026:6617 | Red Hat Security Advisory: vim security update | 2026-04-06T03:34:58+00:00 | 2026-04-10T14:25:23+00:00 |
| rhsa-2026:6618 | Red Hat Security Advisory: gnutls security update | 2026-04-06T03:33:23+00:00 | 2026-04-09T20:37:04+00:00 |
| rhsa-2026:6616 | Red Hat Security Advisory: freerdp security update | 2026-04-06T03:31:33+00:00 | 2026-04-09T14:38:16+00:00 |
| rhsa-2026:6622 | Red Hat Security Advisory: crun security update | 2026-04-06T03:28:23+00:00 | 2026-04-06T10:30:54+00:00 |
| rhsa-2026:6619 | Red Hat Security Advisory: vim security update | 2026-04-06T03:27:33+00:00 | 2026-04-10T14:25:22+00:00 |
| rhsa-2026:6570 | Red Hat Security Advisory: kernel security update | 2026-04-06T02:26:53+00:00 | 2026-04-08T04:29:00+00:00 |
| rhsa-2026:6571 | Red Hat Security Advisory: kernel security update | 2026-04-06T02:01:44+00:00 | 2026-04-08T04:28:59+00:00 |
| rhsa-2026:6572 | Red Hat Security Advisory: kernel-rt security update | 2026-04-06T01:38:53+00:00 | 2026-04-08T04:28:54+00:00 |
| rhsa-2026:6568 | Red Hat Security Advisory: Red Hat Quay 3.15.4 | 2026-04-03T22:07:28+00:00 | 2026-04-12T01:58:56+00:00 |
| rhsa-2026:6567 | Red Hat Security Advisory: Red Hat Quay 3.16.3 | 2026-04-03T15:21:25+00:00 | 2026-04-12T01:58:56+00:00 |
| rhsa-2026:6539 | Red Hat Security Advisory: vim security update | 2026-04-02T22:31:40+00:00 | 2026-04-10T15:22:24+00:00 |
| rhsa-2026:6540 | Red Hat Security Advisory: vim security update | 2026-04-02T22:08:24+00:00 | 2026-04-10T14:25:24+00:00 |
| rhsa-2026:6502 | Red Hat Security Advisory: vim security update | 2026-04-02T16:54:54+00:00 | 2026-04-10T14:25:24+00:00 |
| rhsa-2026:6499 | Red Hat Security Advisory: libxslt security update | 2026-04-02T16:39:09+00:00 | 2026-04-09T20:37:28+00:00 |
| rhsa-2026:6503 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.20 security, enhancement & bug fix update | 2026-04-02T16:38:29+00:00 | 2026-04-10T21:16:54+00:00 |
| rhsa-2026:6481 | Red Hat Security Advisory: Updated service-interconnect rhel9 container images for 1.8 | 2026-04-02T16:17:10+00:00 | 2026-04-09T23:02:45+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2023-346-02 | ProLeiT Plant iT/Brewmaxx | 2023-12-12T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| sevd-2023-346-01 | Trio™ Licensed and License-free Data Radios | 2023-12-12T00:00:00.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2023-318-03 | Galaxy VS and Galaxy VL | 2023-11-14T08:28:19.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2023-318-02 | EcoStruxure Power Monitoring Expert and EcoStruxure™ Power Operation with Advanced Reporting and Dashboards Module | 2023-11-14T00:00:00.000Z | 2023-11-14T00:00:00.000Z |
| sevd-2023-318-01 | PowerLogic ION8650, PowerLogic ION8800 | 2023-11-14T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| sevd-2023-283-02 | EcoStruxure Power Monitoring Expert and EcoStruxure™ Power | 2023-10-10T12:17:45.000Z | 2023-10-10T12:17:45.000Z |
| sevd-2023-283-01 | SpaceLogic C-Bus Toolkit | 2023-10-10T12:00:34.000Z | 2023-10-10T12:00:34.000Z |
| sevd-2023-255-01 | IGSS (Interactive Graphical SCADA System) | 2023-09-12T10:52:23.000Z | 2023-09-12T10:52:23.000Z |
| sevd-2023-220-01 | Pro-face GP-Pro EX | 2023-08-08T06:32:38.000Z | 2023-08-08T06:32:38.000Z |
| sevd-2023-192-01 | StruxureWare Data Center Expert | 2023-07-11T07:37:38.000Z | 2023-07-11T07:37:38.000Z |
| sevd-2023-192-04 | CODESYS Runtime Vulnerabilities | 2023-07-11T07:15:18.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2023-192-02 | EcoStruxure™ OPC UA Server Expert | 2023-07-11T07:01:56.000Z | 2024-08-13T07:00:00.000Z |
| sevd-2023-192-03 | Accutech Manager | 2023-07-11T06:49:15.000Z | 2023-07-11T06:49:15.000Z |
| sevd-2023-164-03 | Foxboro SCADA | 2023-06-13T12:34:32.000Z | 2023-06-13T12:34:32.000Z |
| sevd-2023-164-02 | IGSS (Interactive Graphical SCADA System) | 2023-06-13T11:43:59.000Z | 2023-06-13T11:43:59.000Z |
| sevd-2023-164-04 | EcoStruxureTM Foxboro DCS Control Core Services | 2023-06-13T09:20:49.000Z | 2023-06-13T09:20:49.000Z |
| sevd-2023-164-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2023-06-13T09:08:30.000Z | 2023-06-13T09:08:30.000Z |
| sevd-2023-129-01 | OPC Factory Server | 2023-05-09T16:33:38.000Z | 2023-05-09T16:33:38.000Z |
| sevd-2023-129-03 | PowerLogic ION7400 / PM8000 / ION9000 Power Meters | 2023-05-09T16:02:26.000Z | 2023-05-09T16:02:26.000Z |
| sevd-2023-129-02 | EcoStruxure™ Power SCADA Operation | 2023-05-09T11:52:40.000Z | 2023-05-09T11:52:40.000Z |
| sevd-2023-129-04 | Power SCADA Anywhere | 2023-05-09T08:00:55.000Z | 2023-05-09T08:00:55.000Z |
| sevd-2023-101-06 | Easergy Builder | 2023-04-11T14:20:02.000Z | 2023-04-11T14:20:02.000Z |
| sevd-2023-101-04 | Easy UPS Online Monitoring Software | 2023-04-11T14:09:13.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2023-101-02 | Conext™ Gateway/ InsightHome and InsightFacility | 2023-04-11T14:01:38.000Z | 2023-04-11T14:01:38.000Z |
| sevd-2023-101-01 | CODESYS Runtime Vulnerabilities | 2023-04-11T13:31:49.000Z | 2024-01-09T13:31:00.000Z |
| sevd-2023-101-03 | EcoStruxure™ Control Expert | 2023-04-11T10:14:15.000Z | 2024-01-09T10:14:00.000Z |
| sevd-2023-101-05 | Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-04-11T09:46:26.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-073-04 | IGSS (Interactive Graphical SCADA System) | 2023-03-14T10:58:24.000Z | 2023-03-14T10:58:24.000Z |
| sevd-2023-073-02 | PowerLogic™ HDPM6000 | 2023-03-14T09:26:56.000Z | 2023-03-14T09:26:56.000Z |
| sevd-2023-073-01 | EcoStruxure™ Power Monitoring Expert | 2023-03-14T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-693776 | SSA-693776: Multiple Vulnerabilities in Industrial Communication Devices based on SINEC OS before V3.2 | 2025-06-10T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-633269 | SSA-633269: Incorrect Authorization Check Vulnerability in Industrial Communication Devices based on SINEC OS before V3.1 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-513708 | SSA-513708: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices | 2025-06-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-486186 | SSA-486186: Out of Bounds Read Vulnerability in Tecnomatix Plant Simulation Before 2404 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-345750 | SSA-345750: Default Credentials in Energy Services Using Elspec G5DFR | 2025-06-10T00:00:00Z | 2025-06-16T00:00:00Z |
| ssa-082556 | SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 | 2025-06-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-367714 | SSA-367714: Improper Integrity Check of Firmware Updates in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-05-23T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-041082 | SSA-041082: Out of Bounds Read Vulnerability in SiPass Integrated Before V2.95.3.18 | 2025-05-23T00:00:00Z | 2025-05-23T00:00:00Z |
| ssa-552330 | SSA-552330: System Configuration Password Reset in Siveillance Video V2024 R1 | 2025-05-14T00:00:00Z | 2025-05-14T00:00:00Z |
| ssa-901508 | SSA-901508: Multiple Vulnerabilities in INTRALOG WMS Before V5 | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-864900 | SSA-864900: Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-828116 | SSA-828116: Denial of Service Vulnerability in BACnet ATEC Devices | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-794185 | SSA-794185: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-726617 | SSA-726617: Incorrect Privilege Assignment Vulnerability in Mendix OIDC SSO Module | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-718393 | SSA-718393: Partial Denial of Service Vulnerability in APOGEE PXC and TALON TC Series (BACnet) Devices | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-668154 | SSA-668154: Denial of Service Vulnerability in MS/TP Point Pickup Module | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-614723 | SSA-614723: Denial of Service Vulnerabilities in User Management Component (UMC) | 2025-05-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-556937 | SSA-556937: Multiple Vulnerabilities in VersiCharge AC Series EV Chargers | 2025-05-13T00:00:00Z | 2025-05-14T00:00:00Z |
| ssa-542540 | SSA-542540: Out of Bounds Read Vulnerability in Teamcenter Visualization | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-523418 | SSA-523418: Information Disclosure Vulnerability in Desigo CC | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-446307 | SSA-446307: Authentication Bypass Vulnerability in BMC (CVE-2024-54085) affects SIMATIC IPC RS-828A | 2025-05-13T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-339086 | SSA-339086: Insufficient Session Expiration Vulnerability in SIMATIC PCS neo | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-327438 | SSA-327438: Multiple Vulnerabilities in SCALANCE LPE9403 | 2025-05-13T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-222768 | SSA-222768: Multiple Vulnerabilities in SIRIUS 3SK2 Safety Relays and 3RK3 Modular Safety Systems | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-162255 | SSA-162255: Multiple Vulnerabilities in Polarion Before V2410 | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-047424 | SSA-047424: Code Execution and SQL Injection Vulnerabilities in OZW Web Servers | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-443402 | SSA-443402: Multiple SQL Injection Vulnerabilities in TeleControl Server Basic before V3.1.2.2 | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| ssa-395348 | SSA-395348: Improper Handling of Length Parameter Inconsistency Vulnerability in TeleControl Server Basic before V3.1.2.2 | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| ssa-874353 | SSA-874353: Entity Enumeration Vulnerability in Mendix Runtime | 2025-04-08T00:00:00Z | 2025-06-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20984-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20968-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20962-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20983-1 | Security update for postgresql16 | 2026-03-30T14:26:12Z | 2026-03-30T14:26:12Z |
| suse-su-2026:1149-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T13:44:05Z | 2026-03-30T13:44:05Z |
| suse-su-2026:1148-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T11:21:20Z | 2026-03-30T11:21:20Z |
| suse-su-2026:1146-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:17:48Z | 2026-03-30T09:17:48Z |
| suse-su-2026:1142-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:16:26Z | 2026-03-30T09:16:26Z |
| suse-su-2026:1141-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:16:08Z | 2026-03-30T09:16:08Z |
| suse-su-2026:1140-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:15:49Z | 2026-03-30T09:15:49Z |
| suse-su-2026:1139-1 | Security update for webkit2gtk3 | 2026-03-30T09:13:58Z | 2026-03-30T09:13:58Z |
| suse-su-2026:20982-1 | Security update for tomcat10 | 2026-03-30T08:17:19Z | 2026-03-30T08:17:19Z |
| suse-su-2026:1137-1 | Security update for expat | 2026-03-28T02:34:02Z | 2026-03-28T02:34:02Z |
| suse-su-2026:1136-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T18:04:04Z | 2026-03-27T18:04:04Z |
| suse-su-2026:20978-1 | Security update for MozillaFirefox | 2026-03-27T17:19:44Z | 2026-03-27T17:19:44Z |
| suse-su-2026:1132-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T16:04:11Z | 2026-03-27T16:04:11Z |
| suse-su-2026:1131-1 | Security update for the Linux Kernel | 2026-03-27T16:02:21Z | 2026-03-27T16:02:21Z |
| suse-su-2026:1130-1 | Security update for the Linux Kernel | 2026-03-27T15:47:44Z | 2026-03-27T15:47:44Z |
| suse-su-2026:1129-1 | Security update for freerdp | 2026-03-27T15:05:09Z | 2026-03-27T15:05:09Z |
| suse-su-2026:1127-1 | Security update for MozillaFirefox | 2026-03-27T14:43:04Z | 2026-03-27T14:43:04Z |
| suse-su-2026:1126-1 | Security update for MozillaFirefox | 2026-03-27T14:42:09Z | 2026-03-27T14:42:09Z |
| suse-su-2026:1124-1 | Security update for LibVNCServer | 2026-03-27T14:22:08Z | 2026-03-27T14:22:08Z |
| suse-su-2026:1125-1 | Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T14:04:13Z | 2026-03-27T14:04:13Z |
| suse-su-2026:1118-1 | Security update for docker-stable | 2026-03-27T12:26:18Z | 2026-03-27T12:26:18Z |
| suse-su-2026:1117-1 | Security update for python311 | 2026-03-27T11:34:35Z | 2026-03-27T11:34:35Z |
| suse-su-2026:20976-1 | Security update for docker-compose | 2026-03-27T10:09:30Z | 2026-03-27T10:09:30Z |
| suse-su-2026:20949-1 | Security update for docker-compose | 2026-03-27T10:09:30Z | 2026-03-27T10:09:30Z |
| suse-su-2026:20950-1 | Security update for nghttp2 | 2026-03-27T09:43:31Z | 2026-03-27T09:43:31Z |
| suse-su-2026:1107-1 | Security update for python312 | 2026-03-27T09:04:01Z | 2026-03-27T09:04:01Z |
| suse-su-2026:1102-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T08:05:21Z | 2026-03-27T08:05:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:4173 | Important: gimp security update | 2026-03-10T00:00:00Z | 2026-03-10T19:59:39Z |
| alsa-2026:4168 | Moderate: python3.9 security update | 2026-03-10T00:00:00Z | 2026-03-13T09:26:02Z |
| alsa-2026:4165 | Moderate: python3.12 security update | 2026-03-10T00:00:00Z | 2026-03-10T20:09:00Z |
| alsa-2026:4164 | Important: git-lfs security update | 2026-03-10T00:00:00Z | 2026-03-11T09:33:00Z |
| alsa-2026:4162 | Moderate: mysql8.4 security update | 2026-03-10T00:00:00Z | 2026-03-11T09:43:31Z |
| alsa-2026:4146 | Important: python-pyasn1 security update | 2026-03-10T00:00:00Z | 2026-03-10T08:51:50Z |
| alsa-2026:4110 | Important: postgresql:16 security update | 2026-03-09T00:00:00Z | 2026-03-10T19:55:53Z |
| alsa-2026:4064 | Important: postgresql:12 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:29:57Z |
| alsa-2026:4063 | Important: postgresql:16 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:46:43Z |
| alsa-2026:4059 | Important: postgresql:15 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:49:31Z |
| alsa-2026:4024 | Important: postgresql:13 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:52:09Z |
| alsa-2026:4012 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-13T09:42:02Z |
| alsa-2026:3985 | Important: git-lfs security update | 2026-03-09T00:00:00Z | 2026-03-13T12:38:07Z |
| alsa-2026:3967 | Important: libvpx security update | 2026-03-09T00:00:00Z | 2026-03-10T01:53:59Z |
| alsa-2026:3966 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-11T10:10:37Z |
| alsa-2026:3964 | Moderate: kernel-rt security update | 2026-03-09T00:00:00Z | 2026-03-10T02:07:14Z |
| alsa-2026:3963 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-10T02:04:41Z |
| alsa-2026:3940 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-13T09:30:09Z |
| alsa-2026:3939 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-11T09:35:33Z |
| alsa-2026:3938 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-10T01:58:47Z |
| alsa-2026:3928 | Important: git-lfs security update | 2026-03-05T00:00:00Z | 2026-03-06T13:16:21Z |
| alsa-2026:3898 | Important: osbuild-composer security update | 2026-03-05T00:00:00Z | 2026-03-11T09:54:32Z |
| alsa-2026:3896 | Important: postgresql:15 security update | 2026-03-05T00:00:00Z | 2026-03-10T19:52:06Z |
| alsa-2026:3887 | Important: postgresql16 security update | 2026-03-05T00:00:00Z | 2026-03-06T13:21:51Z |
| alsa-2026:3864 | Important: delve security update | 2026-03-05T00:00:00Z | 2026-03-06T13:19:09Z |
| alsa-2026:3842 | Moderate: delve security update | 2026-03-05T00:00:00Z | 2026-03-13T09:28:13Z |
| alsa-2026:3753 | Important: osbuild-composer security update | 2026-03-04T00:00:00Z | 2026-03-10T19:47:08Z |
| alsa-2026:3752 | Important: osbuild-composer security update | 2026-03-04T00:00:00Z | 2026-03-11T09:57:01Z |
| alsa-2026:3730 | Important: postgresql security update | 2026-03-04T00:00:00Z | 2026-03-11T10:01:08Z |
| alsa-2026:3669 | Important: go-rpm-macros security update | 2026-03-03T00:00:00Z | 2026-03-04T11:09:35Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-879 | Use-of-uninitialized-value in JS_DefineProperty | 2025-11-06T00:00:41.075031Z | 2025-11-06T00:00:41.075637Z |
| osv-2025-876 | Stack-buffer-overflow in snmp_input | 2025-11-04T00:06:41.671822Z | 2025-11-04T00:06:41.672467Z |
| osv-2025-871 | UNKNOWN READ in ojph::local::param_cod::~param_cod | 2025-11-03T00:01:55.461376Z | 2025-11-16T14:04:09.695272Z |
| osv-2025-865 | Heap-buffer-overflow in generic_unpack | 2025-10-31T00:01:02.631036Z | 2025-11-05T14:31:24.646623Z |
| osv-2025-858 | Use-of-uninitialized-value in pcpp::byteArrayToHexString | 2025-10-26T00:13:16.483999Z | 2025-10-26T00:13:16.484559Z |
| osv-2025-857 | Global-buffer-overflow in void jxl::N_AVX2::WriteToOutputStage::StoreUnsignedRow<unsigned char> | 2025-10-25T00:05:52.218420Z | 2025-10-25T00:05:52.218807Z |
| osv-2025-855 | Use-of-uninitialized-value in AlphaReplace_SSE2 | 2025-10-24T00:16:50.919877Z | 2025-10-24T00:16:50.920218Z |
| osv-2025-852 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-23T00:13:16.148747Z | 2025-10-24T14:23:38.843951Z |
| osv-2025-846 | Use-of-uninitialized-value in js_create_function | 2025-10-20T00:03:40.943765Z | 2025-10-20T00:03:40.944363Z |
| osv-2025-845 | Global-buffer-overflow in icaltime_day_of_year | 2025-10-19T00:19:40.541109Z | 2025-10-19T00:19:40.541746Z |
| osv-2025-835 | Heap-use-after-free in JS_DefineProperty | 2025-10-14T00:11:08.472824Z | 2025-10-14T00:11:08.473391Z |
| osv-2025-834 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-14T00:10:52.861723Z | 2025-10-24T14:22:07.938287Z |
| osv-2025-827 | Global-buffer-overflow in void jxl::N_SSE4::WriteToOutputStage::StoreUnsignedRow<unsigned char> | 2025-10-10T00:09:16.816189Z | 2025-10-10T00:09:16.816846Z |
| osv-2025-825 | UNKNOWN WRITE in RescalerImportRowExpand_SSE2 | 2025-10-09T00:14:42.650822Z | 2025-10-09T00:14:42.651395Z |
| osv-2025-824 | Use-of-uninitialized-value in JS_DefineProperty | 2025-10-08T00:04:16.630040Z | 2025-10-08T00:04:16.630688Z |
| osv-2025-819 | Use-of-uninitialized-value in HasAlpha32b_SSE2 | 2025-10-07T00:04:07.544365Z | 2025-10-07T00:04:07.544831Z |
| osv-2025-818 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-07T00:03:45.262747Z | 2025-10-10T14:38:33.479652Z |
| osv-2025-809 | Use-of-uninitialized-value in WebPCleanupTransparentArea | 2025-10-05T00:04:29.576718Z | 2025-10-05T00:04:29.577250Z |
| osv-2025-808 | Use-of-uninitialized-value in WebPMultRow_C | 2025-10-04T00:07:11.139186Z | 2025-10-04T00:07:11.139704Z |
| osv-2025-803 | Global-buffer-overflow in icaltime_day_of_year | 2025-10-02T00:11:54.061581Z | 2025-10-02T00:11:54.061989Z |
| osv-2025-797 | Heap-buffer-overflow in ProcessRows | 2025-09-30T00:07:53.914184Z | 2025-09-30T00:07:53.914578Z |
| osv-2025-796 | Heap-buffer-overflow in AddGreenToBlueAndRed_AVX2 | 2025-09-30T00:07:08.673173Z | 2025-09-30T00:07:08.673608Z |
| osv-2025-793 | Heap-use-after-free in parse_from_header | 2025-09-29T00:08:32.876425Z | 2025-09-29T00:08:32.876798Z |
| osv-2025-788 | Heap-buffer-overflow in int arrow::bit_util::BitReader::GetBatch<int> | 2025-09-28T00:00:36.076414Z | 2025-10-10T14:35:28.235525Z |
| osv-2025-787 | Heap-buffer-overflow in DwaCompressor_uncompress | 2025-09-27T00:18:30.312049Z | 2025-09-27T00:18:30.312655Z |
| osv-2025-783 | Heap-buffer-overflow in inspect_process | 2025-09-26T00:06:21.859576Z | 2025-09-26T00:06:21.859964Z |
| osv-2025-767 | UNKNOWN READ in dcd_int_handler | 2025-09-20T00:19:20.851166Z | 2025-09-20T00:19:20.851464Z |
| osv-2025-766 | Heap-buffer-overflow in Open | 2025-09-20T00:18:10.380843Z | 2025-09-20T00:18:10.381141Z |
| osv-2025-765 | Security exception in com.spotify.docker.client.shaded.com.fasterxml.jackson.databind.util.TokenBuffer | 2025-09-20T00:18:07.994839Z | 2025-09-20T00:18:07.995257Z |
| osv-2025-764 | Global-buffer-overflow in Ogg_CreateES | 2025-09-20T00:15:54.584666Z | 2025-09-20T00:15:54.585041Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0005 | Potential use-after-free in `oneshot` when used asynchronously | 2026-01-25T12:00:00Z | 2026-01-27T05:50:51Z |
| rustsec-2026-0079 | `DynFuture` drop can construct a dangling reference | 2026-01-21T12:00:00Z | 2026-04-05T05:30:42Z |
| rustsec-2026-0004 | Triton VM Soundness Vulnerability due to Improper Sampling of Randomness | 2026-01-21T12:00:00Z | 2026-01-23T05:50:29Z |
| rustsec-2026-0080 | Multiple soundness issues in `scaly` safe APIs | 2026-01-19T12:00:00Z | 2026-04-05T05:30:42Z |
| rustsec-2026-0003 | Non-constant-time code generation on ARM32 targets | 2026-01-14T12:00:00Z | 2026-01-15T17:45:42Z |
| rustsec-2026-0002 | `IterMut` violates Stacked Borrows by invalidating internal pointer | 2026-01-07T12:00:00Z | 2026-01-08T05:46:06Z |
| rustsec-2026-0001 | Potential Undefined Behaviors in `Arc<T>`/`Rc<T>` impls of `from_value` on OOM | 2026-01-05T12:00:00Z | 2026-01-06T15:33:19Z |
| rustsec-2025-0139 | theshit vulnerable to unsafe loading of user-owned Python rules when running as root | 2025-12-30T12:00:00Z | 2026-01-04T20:34:25Z |
| rustsec-2025-0140 | Non-utf8 String can be created with `TimeBuf::as_str` | 2025-12-29T12:00:00Z | 2026-03-04T07:42:48Z |
| rustsec-2025-0143 | Unsound APIs of public `constant::Reader` and `StructSchema` | 2025-12-24T12:00:00Z | 2026-01-29T05:56:50Z |
| rustsec-2025-0137 | Unsoundness of safe `reciprocal_mg10` | 2025-12-22T12:00:00Z | 2025-12-28T09:42:26Z |
| rustsec-2025-0141 | Bincode is unmaintained | 2025-12-16T12:00:00Z | 2026-01-16T11:04:42Z |
| rustsec-2025-0144 | Timing side-channel in ML-DSA decomposition | 2025-12-12T12:00:00Z | 2026-01-27T22:28:37Z |
| rustsec-2025-0152 | `finch_cli_rust` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0151 | `sha-rst` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0150 | `finch-rst` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0135 | matrix-sdk-base: Denial of service due to custom `m.room.join_rules` events | 2025-12-08T12:00:00Z | 2025-12-08T12:23:54Z |
| rustsec-2025-0148 | `finch-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0146 | `sha-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0133 | Incorrect calculation on aarch64 | 2025-12-04T12:00:00Z | 2025-12-06T07:36:56Z |
| rustsec-2025-0147 | `evm-units` was removed from crates.io for malicious code | 2025-12-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0145 | `uniswap-utils` was removed from crates.io for malicious code | 2025-12-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0134 | rustls-pemfile is unmaintained | 2025-11-28T12:00:00Z | 2025-12-05T19:07:24Z |
| rustsec-2025-0132 | `Reader::open_mmap` unsoundly marks unsafe memmap operation as safe | 2025-11-28T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0130 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0129 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0128 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0127 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0125 | Resource Exhaustion (Memory and Handle Leaks) on Windows and macOS | 2025-11-22T12:00:00Z | 2025-11-22T12:29:36Z |
| rustsec-2025-0153 | hexchat crate is unsound and unmaintained | 2025-11-17T12:00:00Z | 2026-02-26T06:11:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-nats-2026-27889 | NATS: Pre-auth remote server crash via WebSocket frame length overflow in wsRead | 2026-03-27T11:47:22.988Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33413 | etcd: Authorization bypasses in multiple APIs | 2026-03-27T11:39:27.916Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33343 | etcd: Nested etcd transactions bypass RBAC authorization checks | 2026-03-27T11:39:26.076Z | 2026-03-27T12:16:52.978Z |
| bit-parse-2026-33627 | Parse Server: Auth data exposed via /users/me endpoint | 2026-03-27T07:14:47.660Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33624 | Parse Server: MFA recovery code single-use bypass via concurrent requests | 2026-03-27T07:14:44.950Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33539 | Parse Server: SQL injection via aggregate and distinct field names in PostgreSQL adapter | 2026-03-27T07:14:42.086Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33538 | Parse Server: Denial of service via unindexed database query for unconfigured auth providers | 2026-03-27T07:14:39.195Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33527 | Parse Server: Session update endpoint allows overwriting server-generated session fields | 2026-03-27T07:14:36.431Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33508 | Parse Server: LiveQuery subscription query depth bypass | 2026-03-27T07:14:33.818Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33498 | Parse Server: Query condition depth bypass via pre-validation transform pipeline | 2026-03-27T07:14:30.964Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33429 | Parse Server: Protected field change detection oracle via LiveQuery watch parameter | 2026-03-27T07:14:28.266Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33421 | Parse Server: LiveQuery bypasses CLP pointer permission enforcement | 2026-03-27T07:14:25.801Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33409 | Parse Server: Auth provider validation bypass on login via partial authData | 2026-03-27T07:14:23.276Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33323 | Parse Server: Email verification resend page leaks user existence | 2026-03-27T07:14:20.379Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33428 | Discourse Allows Unauthorized Access to Deleted Posts Index via Group Membership | 2026-03-27T07:11:24.928Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33427 | Discourse Authorization Page Displays Unvalidated Redirect Domain | 2026-03-27T07:11:21.636Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33426 | Discourse users can edit or synonymize hidden tags they can't see | 2026-03-27T07:11:18.684Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33425 | Discourse has inferable private group membership or existence via exclude_groups parameter | 2026-03-27T07:11:15.979Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33424 | PM access granted through invites after access revocation | 2026-03-27T07:11:13.161Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33423 | Discourse staff can modify any user's group notification level | 2026-03-27T07:11:10.696Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33422 | Discourse exposes ip_address of flagged user | 2026-03-27T07:11:08.096Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33411 | Discourse's solved topic stream has potential stored XSS in topic title | 2026-03-27T07:11:05.061Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33410 | Discourse hardens chat DM channel creation and expansion | 2026-03-27T07:11:02.112Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33408 | Discourse has Improper Authorization in "Post Edits" Report For Moderators | 2026-03-27T07:10:59.380Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33395 | Discourse has stored click‑based XSS via Graphviz SVG javascript: links | 2026-03-27T07:10:56.479Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33394 | Discourse leaks PM post edits to moderators | 2026-03-27T07:10:53.768Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33393 | Discourse fixes loose hostname matching in spam host allowlist | 2026-03-27T07:10:50.748Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33355 | Discourse filters whisper posts from private-posts feed | 2026-03-27T07:10:48.005Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33291 | Discourse user can create Zendesk tickets even when it does not have access to topic | 2026-03-27T07:10:45.396Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33251 | Discourse has a Hidden Solved topics permission bypass | 2026-03-27T07:10:42.800Z | 2026-03-27T07:40:55.991Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-fo41609 | Security fixes for CVE-2025-48924, ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j288-q9x7-2f5v, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 8.19.12-r0, 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T10:02:50.908381Z | 2026-03-10T06:14:42Z |
| cleanstart-2026-jo97977 | Security fixes for ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T10:02:43.649563Z | 2026-03-10T06:18:32Z |
| cleanstart-2026-fz71456 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.18-r0 | 2026-04-01T10:02:32.121585Z | 2026-03-10T06:07:45Z |
| cleanstart-2026-al75891 | Security fixes for CVE-2026-24051, ghsa-9h8m-3fm2-qjrq applied in versions: 1.19.2-r0 | 2026-04-01T10:02:21.610635Z | 2026-03-10T06:30:49Z |
| cleanstart-2026-jk38734 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121 applied in versions: 1.80.1-r1 | 2026-04-01T10:02:16.597211Z | 2026-03-10T06:53:47Z |
| cleanstart-2026-ei44621 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.27.4-r0, 1.27.4-r1, 1.27.7-r0 | 2026-04-01T10:02:07.249071Z | 2026-03-10T11:28:54Z |
| cleanstart-2026-bm51903 | Security fixes for CVE-2015-20107, CVE-2015-2104, CVE-2019-16056, CVE-2019-16935, CVE-2019-20907, CVE-2019-5010, CVE-2020-14422, CVE-2020-8492, CVE-2021-23336, CVE-2021-29921, CVE-2021-3177, CVE-2022-45061, CVE-2023-27043, CVE-2024-6232, CVE-2024-6923, CVE-2025-59375 applied in versions: 3.10.5-r0, 3.11.1-r0, 3.11.5-r0, 3.12.12-r0, 3.12.3-r2, 3.12.6-r0, 3.6.8-r1, 3.7.5-r0, 3.8.2-r0, 3.8.4-r0, 3.8.5-r0, 3.8.7-r2, 3.8.8-r0, 3.9.4-r0, 3.9.5-r0 | 2026-04-01T10:02:05.179897Z | 2026-03-10T11:38:44Z |
| cleanstart-2026-lu81821 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.28.3-r1 | 2026-04-01T10:02:04.894450Z | 2026-03-10T11:29:14Z |
| cleanstart-2026-dr75226 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1 | 2026-04-01T10:01:44.354704Z | 2026-03-10T12:28:42Z |
| cleanstart-2026-pp64690 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-1229, CVE-2026-25934, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-q9hv-hpm4-hj6x applied in versions: 0.20.4-r1, 0.20.4-r2, 0.20.4-r3 | 2026-04-01T10:01:43.950159Z | 2026-03-10T11:34:26Z |
| cleanstart-2026-iy77127 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.29.0-r0 | 2026-04-01T10:01:36.492383Z | 2026-03-10T11:31:41Z |
| cleanstart-2026-pm59896 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729 applied in versions: 1.41.1-r0, 1.41.1-r1 | 2026-04-01T10:00:44.608929Z | 2026-03-11T05:51:53Z |
| cleanstart-2026-mk01488 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-27141, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p applied in versions: 3.6.16-r0, 3.7.10-r0, 3.7.10-r1, 3.7.10-r2, 3.7.10-r3, 3.7.10-r4, 3.7.4-r0, 3.7.9-r0 | 2026-04-01T10:00:43.919294Z | 2026-03-10T12:46:44Z |
| cleanstart-2026-bb17877 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.87.1-r0, 0.89.0-r0 | 2026-04-01T10:00:31.981994Z | 2026-03-11T05:53:58Z |
| cleanstart-2026-lz54652 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729 applied in versions: 1.7.0-r0, 1.7.1-r0 | 2026-04-01T10:00:12.081449Z | 2026-03-11T07:18:17Z |
| cleanstart-2026-jw58725 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2x5j-vhc8-9cwm, ghsa-2xsj-vh29-9cwm, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r, ghsa-r6j8-c6r2-37rr applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.0.22-r0, 3.0.23-r0, 3.0.23-r1, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4 | 2026-04-01T10:00:01.222759Z | 2026-03-11T10:01:48Z |
| cleanstart-2026-ju62670 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2x5j-vhc8-9cwm, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2gw2-vh5m, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-c6gw-w398-hv78, ghsa-cfpf-hrx2-8rv6, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-jgfp-53c3-624w, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r, ghsa-pwhc-rpq9-4c8w, ghsa-r6j8-c6r2-37rr, ghsa-vv39-3w5q-974q applied in versions: 2.13.9-r0, 2.14.20-r0, 2.14.20-r1, 3.0.16-r0, 3.0.19-r0, 3.0.20-r2, 3.0.21-r0, 3.0.21-r1, 3.1.4-r0, 3.1.8.-r0 | 2026-04-01T10:00:01.931332Z | 2026-03-11T10:03:00Z |
| cleanstart-2026-np19113 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.10-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4 | 2026-04-01T09:59:46.805882Z | 2026-03-11T10:03:22Z |
| cleanstart-2026-bp32212 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.87.0-r0, 0.87.0-r1, 0.88.0-r0 | 2026-04-01T09:58:48.421220Z | 2026-03-11T10:14:30Z |
| cleanstart-2026-mq02912 | Security fixes for CVE-2017-7529, CVE-2018-16845, CVE-2019-20372, CVE-2019-9511, CVE-2019-9513, CVE-2019-9516, CVE-2021-23017, CVE-2021-46461, CVE-2021-46462, CVE-2021-46463, CVE-2022-25139, CVE-2022-3638, CVE-2022-41741, CVE-2022-41742, CVE-2023-44487, CVE-2024-31079, CVE-2024-32760, CVE-2024-34161, CVE-2024-35200, CVE-2024-7347, CVE-2025-23419 applied in versions: 0, 1.12.1-r0, 1.14.1-r0, 1.16.1-r0, 1.16.1-r6, 1.20.1-r0, 1.20.1-r1, 1.20.2-r2, 1.22.1-r0, 1.24.0-r12, 1.26.2-r0, 1.26.3-r0 | 2026-04-01T09:58:43.603060Z | 2026-03-12T13:09:34Z |
| cleanstart-2026-jd75482 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0 | 2026-04-01T09:58:30.410416Z | 2026-03-12T13:09:34Z |
| cleanstart-2026-jo01099 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.3-r0 | 2026-04-01T09:58:23.141059Z | 2026-03-12T13:09:34Z |
| cleanstart-2026-du32240 | Security fixes for CVE-2026-2391, CVE-2026-26960, CVE-2026-29786, CVE-2026-31802, ghsa-34x7-hfp2-rc4v, ghsa-5359-pvf2-pw78, ghsa-73rr-hh4g-fpgx, ghsa-8qq5-rm4j-mr97, ghsa-r6q2-hw4h-h46w applied in versions: 4.2.1.1-r1, 4.2.1.1-r2, 4.3.0.1-r0, 4.3.1-r0 | 2026-04-01T09:57:23.228226Z | 2026-03-12T13:10:45Z |
| cleanstart-2026-of85770 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:57:04.724781Z | 2026-03-13T12:43:33Z |
| cleanstart-2026-gq03231 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-24051, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.2.7-r1 | 2026-04-01T09:56:49.752050Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-nj43712 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.1-r0, 3.3.1-r1 | 2026-04-01T09:56:40.531114Z | 2026-03-13T12:42:57Z |
| cleanstart-2026-gv56027 | Security fixes for ghsa-58pv-8j8x-9vj2, ghsa-jm66-cg57-jjv5, ghsa-mrfv-m5wm-5w6w applied in versions: 2.81.0-r0 | 2026-04-01T09:56:19.014864Z | 2026-03-13T07:11:43Z |
| cleanstart-2026-bw46578 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086, CVE-2026-24515, CVE-2026-25210 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.16.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:55:26.061155Z | 2026-03-16T17:22:25Z |
| cleanstart-2026-ay18527 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086, CVE-2026-24515, CVE-2026-25210 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.17.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:55:26.067667Z | 2026-03-16T17:21:19Z |
| cleanstart-2026-lq42192 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086, CVE-2026-24515, CVE-2026-25210 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.18.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:55:24.898216Z | 2026-03-16T17:19:31Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2023-ALE-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2022-ALE-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2022-ale-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-012 | [MàJ] Vulnérabilité dans FortiOS SSL-VPN | 2022-12-13T00:00:00.000000 | 2022-12-20T00:00:00.000000 |
| CERTFR-2022-ALE-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-012 | [MàJ] Vulnérabilité dans FortiOS SSL-VPN | 2022-12-13T00:00:00.000000 | 2022-12-20T00:00:00.000000 |
| certfr-2022-ale-011 | Vulnérabilité dans les produits Fortinet | 2022-10-14T00:00:00.000000 | 2022-10-14T00:00:00.000000 |
| CERTFR-2022-ALE-011 | Vulnérabilité dans les produits Fortinet | 2022-10-14T00:00:00.000000 | 2022-10-14T00:00:00.000000 |
| certfr-2022-ale-010 | Multiples vulnérabilités dans GLPI | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-009 | [MaJ] Vulnérabilité dans Zimbra Collaboration | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-010 | Multiples vulnérabilités dans GLPI | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-009 | [MaJ] Vulnérabilité dans Zimbra Collaboration | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-008 | [MaJ] Multiples vulnérabilités dans Microsoft Exchange | 2022-09-30T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-008 | [MaJ] Multiples vulnérabilités dans Microsoft Exchange | 2022-09-30T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-007 | Multiples vulnérabilités dans Microsoft Windows | 2022-09-16T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-007 | Multiples vulnérabilités dans Microsoft Windows | 2022-09-16T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-006 | [MàJ] Vulnérabilité dans Atlassian Confluence | 2022-06-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| CERTFR-2022-ALE-006 | [MàJ] Vulnérabilité dans Atlassian Confluence | 2022-06-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-ale-005 | [MàJ] Vulnérabilité dans Microsoft Windows | 2022-05-31T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| CERTFR-2022-ALE-005 | [MàJ] Vulnérabilité dans Microsoft Windows | 2022-05-31T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| certfr-2022-ale-004 | Vulnérabilité dans F5 BIG-IP | 2022-05-11T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| CERTFR-2022-ALE-004 | Vulnérabilité dans F5 BIG-IP | 2022-05-11T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| certfr-2022-ale-003 | [MàJ] Vulnérabilité dans l'implémentation du protocole RPC par Microsoft | 2022-04-13T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2022-ALE-003 | [MàJ] Vulnérabilité dans l'implémentation du protocole RPC par Microsoft | 2022-04-13T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2022-ale-002 | Vulnérabilité dans VMware Spring Cloud Gateway | 2022-03-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| CERTFR-2022-ALE-002 | Vulnérabilité dans VMware Spring Cloud Gateway | 2022-03-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-ale-001 | [MaJ] Vulnérabilité dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2022-ALE-001 | [MaJ] Vulnérabilité dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-022 | [MaJ] Vulnérabilité dans Apache Log4j | 2021-12-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0334 | Vulnérabilité dans les produits Microsoft | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0333 | Multiples vulnérabilités dans Traefik | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0332 | Vulnérabilité dans Oracle Identity Manager et Web Services Manager | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0331 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0330 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0329 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0328 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0327 | Multiples vulnérabilités dans les produits IBM | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0326 | Multiples vulnérabilités dans les produits VMware | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0325 | Multiples vulnérabilités dans les produits Elastic | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0324 | Multiples vulnérabilités dans Google Chrome | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0323 | Multiples vulnérabilités dans les produits Spring | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0322 | Multiples vulnérabilités dans les produits VMware | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0321 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0320 | Multiples vulnérabilités dans Roundcube | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0319 | Vulnérabilité dans les produits Mitel | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0318 | Multiples vulnérabilités dans Splunk Universal Forwarder | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0317 | Vulnérabilité dans Python | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0316 | Multiples vulnérabilités dans les produits VMware | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0315 | Multiples vulnérabilités dans les produits VMware | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0314 | Multiples vulnérabilités dans les produits Atlassian | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0313 | Vulnérabilité dans les produits Apple | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0312 | Multiples vulnérabilités dans GLPI | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0311 | Vulnérabilité dans Citrix XenServer | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0310 | Multiples vulnérabilités dans MongoDB | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0309 | Multiples vulnérabilités dans Suricata | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0308 | Multiples vulnérabilités dans Node.js | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0307 | Vulnérabilité dans les produits Microsoft | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0306 | Multiples vulnérabilités dans Redmine | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0305 | Multiples vulnérabilités dans Spring AI | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-001001 | Authentication bypass vulnerability in OpenBlocks series | 2026-01-07T10:46+09:00 | 2026-01-07T10:46+09:00 |
| jvndb-2025-022878 | Media Player MP-01 vulnerable to Missing Authentication for Critical Function | 2025-12-24T11:10+09:00 | 2026-01-15T11:10+09:00 |
| jvndb-2025-022400 | Ruijie Networks AP180 Series vulnerable to OS command injection | 2025-12-19T12:33+09:00 | 2025-12-19T12:33+09:00 |
| jvndb-2025-000118 | GROWI vulnerable to cross-site request forgery | 2025-12-17T13:04+09:00 | 2025-12-17T13:04+09:00 |
| jvndb-2025-022062 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-12-17T11:28+09:00 | 2025-12-17T11:28+09:00 |
| jvndb-2025-000117 | SEIKO EPSON printer Web Config vulnerable to stack-based buffer overflow | 2025-12-16T15:31+09:00 | 2025-12-23T11:57+09:00 |
| jvndb-2025-000115 | QND vulnerable to privilege escalation | 2025-12-11T14:33+09:00 | 2025-12-11T14:33+09:00 |
| jvndb-2025-021305 | Android App "Brother iPrint&Scan" improper use of an external cache directory | 2025-12-09T17:25+09:00 | 2025-12-09T17:25+09:00 |
| jvndb-2025-000114 | ELECOM Clone for Windows registers a Windows service with an unquoted file path | 2025-12-09T17:16+09:00 | 2025-12-09T17:16+09:00 |
| jvndb-2025-000113 | Multiple vulnerabilities in GroupSession | 2025-12-08T17:48+09:00 | 2025-12-11T11:30+09:00 |
| jvndb-2025-000116 | GS Yuasa FULLBACK Manager Pro registers Windows services with unquoted file paths | 2025-12-08T14:06+09:00 | 2025-12-08T14:06+09:00 |
| jvndb-2025-000094 | Multiple vulnerabilities in ABB Terra AC Wallbox | 2025-12-05T14:12+09:00 | 2025-12-05T14:12+09:00 |
| jvndb-2025-000112 | Installer of INZONE Hub may insecurely load Dynamic Link Libraries | 2025-11-28T13:36+09:00 | 2025-11-28T13:36+09:00 |
| jvndb-2025-000111 | SwitchBot Smart Video Doorbell vulnerable to active debug code | 2025-11-26T14:35+09:00 | 2025-11-26T14:35+09:00 |
| jvndb-2025-000110 | Multiple vulnerabilities in Security Point (Windows) of MaLion | 2025-11-25T17:17+09:00 | 2025-11-25T17:17+09:00 |
| jvndb-2025-000109 | Multiple vulnerabilities in SNC-CX600W | 2025-11-25T14:59+09:00 | 2025-11-25T14:59+09:00 |
| jvndb-2025-000108 | "FOD" App uses hard-coded cryptographic keys | 2025-11-25T14:15+09:00 | 2025-11-25T14:15+09:00 |
| jvndb-2025-000106 | Multiple vulnerabilities in LogStare Collector | 2025-11-21T16:27+09:00 | 2025-11-21T16:27+09:00 |
| jvndb-2025-019621 | EPSON WebConfig / Epson Web Control for SEIKO EPSON Projector Products do not restrict excessive authentication attempts | 2025-11-21T15:31+09:00 | 2025-12-24T10:54+09:00 |
| jvndb-2025-000107 | Installer of RakurakuMusen Start EX for Windows may insecurely load Dynamic Link Libraries | 2025-11-19T16:22+09:00 | 2025-11-19T16:22+09:00 |
| jvndb-2025-000097 | "Dejira" App for iOS vulnerable to improper server certificate verification | 2025-11-17T14:09+09:00 | 2025-11-17T14:09+09:00 |
| jvndb-2025-000105 | NCP-HG100 vulnerable to OS command injection | 2025-11-14T15:26+09:00 | 2025-11-14T15:26+09:00 |
| jvndb-2025-000104 | Multiple vulnerabilities in GNU Libmicrohttpd | 2025-11-10T15:07+09:00 | 2025-11-10T15:07+09:00 |
| jvndb-2025-000103 | Use of password hash with insufficient computational effort vulnerability in BUFFALO Wi-Fi router "WSR-1800AX4 series" | 2025-11-07T15:39+09:00 | 2025-11-07T15:39+09:00 |
| jvndb-2025-000102 | CLUSTERPRO X and EXPRESSCLUSTER X vulnerable to OS command injection | 2025-11-07T14:55+09:00 | 2025-11-07T14:55+09:00 |
| jvndb-2025-000101 | GROWI vulnerable to stored cross-site scripting | 2025-11-06T13:45+09:00 | 2025-11-06T13:45+09:00 |
| jvndb-2025-017972 | Multiple vulnerabilities in Century Systems FutureNet MA and IP-K series | 2025-11-04T16:37+09:00 | 2025-11-04T16:37+09:00 |
| jvndb-2025-000100 | Multiple Roboticsware products register Windows services with unquoted file paths | 2025-11-04T14:17+09:00 | 2025-11-04T14:17+09:00 |
| jvndb-2025-000098 | Optical Disc Archive Software (for Windows) registers a Windows service with an unquoted file path | 2025-11-04T13:51+09:00 | 2025-11-04T13:51+09:00 |
| jvndb-2025-000099 | Progress Flowmon vulnerable to authenticated OS command injection | 2025-11-04T12:47+09:00 | 2025-11-04T12:47+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15411 | Google Chrome安全绕过漏洞(CNVD-2026-15411) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15410 | Google Chrome安全绕过漏洞(CNVD-2026-15410) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15409 | Google Chrome安全绕过漏洞(CNVD-2026-15409) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15408 | Google Chrome安全绕过漏洞(CNVD-2026-15408) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15399 | Google Chrome安全绕过漏洞(CNVD-2026-15399) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15398 | Google Chrome安全绕过漏洞(CNVD-2026-15398) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15397 | Google Chrome安全绕过漏洞(CNVD-2026-15397) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15396 | Google Chrome安全绕过漏洞(CNVD-2026-15396) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15061 | OpenClaw操作系统命令注入漏洞 | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15060 | OpenClaw操作系统命令注入漏洞(CNVD-2026-15060) | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15059 | OpenClaw操作系统命令注入漏洞(CNVD-2026-15059) | 2026-03-24 | 2026-03-26 |
| cnvd-2026-14861 | OpenClaw后置链接漏洞(CNVD-2026-14861) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14860 | OpenClaw代码问题漏洞(CNVD-2026-14860) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14859 | OpenClaw后置链接漏洞(CNVD-2026-14859) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14858 | OpenClaw后置链接漏洞(CNVD-2026-14858) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14857 | OpenClaw路径遍历漏洞(CNVD-2026-14857) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14856 | OpenClaw路径遍历漏洞(CNVD-2026-14856) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14850 | OpenClaw路径遍历漏洞(CNVD-2026-14850) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14849 | OpenClaw代码问题漏洞(CNVD-2026-14849) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14848 | OpenClaw路径遍历漏洞(CNVD-2026-14848) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14846 | OpenClaw后置链接漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14844 | OpenClaw代码问题漏洞(CNVD-2026-14844) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14843 | OpenClaw身份验证强化漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14842 | OpenClaw访问控制错误漏洞(CNVD-2026-14842) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14841 | OpenClaw授权绕过漏洞(CNVD-2026-14841) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14840 | OpenClaw身份验证绕过漏洞(CNVD-2026-14840) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14839 | OpenClaw身份验证绕过漏洞(CNVD-2026-14839) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14838 | OpenClaw存在未明漏洞(CNVD-2026-14838) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14837 | OpenClaw授权绕过漏洞(CNVD-2026-14837) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14836 | OpenClaw元数据欺骗漏洞 | 2026-03-24 | 2026-03-25 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01753 | Уязвимость компонента GDI+ операционной системы Windows, позволяющая нарушителю вызвать о… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01752 | Уязвимость компонента Hyper-V операционной системы Windows, позволяющая нарушителю выполн… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01751 | Уязвимость службы Connected Devices Platform Service операционных систем Windows, позволя… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01750 | Уязвимость компонента Hyper-V операционной системы Windows, позволяющая нарушителю выполн… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01749 | Уязвимость драйвера Ancillary Function Driver for WinSock операционных систем Windows, по… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01748 | Уязвимость драйвера HTTP.sys операционных систем Windows, позволяющая нарушителю повысить… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01747 | Уязвимость реализации протокола службы каталогов LDAP (Lightweight Directory Access Proto… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01746 | Уязвимость компонента Hyper-V операционной системы Windows, позволяющая нарушителю выполн… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01745 | Уязвимость компонента Mailslot File System операционных систем Windows, позволяющая наруш… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01744 | Уязвимость пакета программ Microsoft Office, связанная с недостатками механизма десериали… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01743 | Уязвимость расширения GitHub Copilot для Jetbrains, связанная с непринятием мер по очистк… | 12.02.2026 | 12.02.2026 |
| bdu:2026-01742 | Уязвимость текстового редактора Notepad операционных систем Windows, позволяющая нарушите… | 12.02.2026 | 13.02.2026 |
| bdu:2026-01727 | Уязвимость функции оценки избирательности расширения Intarray системы управления базами д… | 11.02.2026 | 16.02.2026 |
| bdu:2026-01726 | Уязвимость функции обработки типов данных oidvector системы управления базами данных Post… | 11.02.2026 | 16.02.2026 |
| bdu:2026-01725 | Уязвимость веб-интерфейса системы выявления и устранения угроз FortiSandbox, позволяющая … | 11.02.2026 | 11.02.2026 |
| bdu:2026-01724 | Уязвимость компонента pg_trgm системы управления базами данных PostgreSQL, позволяющая на… | 11.02.2026 | 16.02.2026 |
| bdu:2026-01723 | Уязвимость системы управления базами данных PostgreSQL, связанная с неверным индексирован… | 11.02.2026 | 16.02.2026 |
| bdu:2026-01722 | Уязвимость компонента pgcrypto системы управления базами данных PostgreSQL, позволяющая н… | 11.02.2026 | 16.02.2026 |
| bdu:2026-01721 | Уязвимость веб-интерфейса управления микропрограммного обеспечения промышленных управляем… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01720 | Уязвимость компонента API-endpoint /api/domains/<domainid>/users/<userid>/aliases корпора… | 11.02.2026 | 13.02.2026 |
| bdu:2026-01718 | Уязвимость библиотеки juliangruber/brace-expansion программной платформы Node.js, позволя… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01717 | Уязвимость библиотеки diff (jsdiff) программной платформы Node.js, позволяющая нарушителю… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01716 | Уязвимость функции foregroundChild() библиотеки для поиска файлов и директорий Glob прогр… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01715 | Уязвимость функции expand() библиотеки juliangruber/brace-expansion программной платформы… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01714 | Уязвимость библиотеки node-tar программной платформы Node.js, позволяющая нарушителю раск… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01713 | Уязвимость библиотеки node-tar программной платформы Node.js, позволяющая нарушителю полу… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01712 | Уязвимость интерфейса командной строки программной платформы Node.js, позволяющая нарушит… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01711 | Уязвимость реализации алгоритма цифровой подписи EdDSA EdDSA-Java (ed25519-java), связан… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01710 | Уязвимость системы управления базами данных HyperSQL DataBase (HSQLDB), связанная с приме… | 11.02.2026 | 11.02.2026 |
| bdu:2026-01709 | Уязвимость компонента org.assertj.core.util.xml.XmlStringPrettyFormatter Java-библиотеки … | 11.02.2026 | 11.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202308-3129 | D-Link DAP-2622 DDP Set AG Profile Auth Username Stack-based Buffer Overflow Remote Code … | 2024-07-23T22:20:12.344000Z |
| var-202308-3114 | D-Link DAP-2622 DDP Reset Auth Password Stack-based Buffer Overflow Remote Code Execution… | 2024-07-23T22:20:12.516000Z |
| var-202308-3113 | D-Link DAP-2622 DDP Configuration Backup Server Address Stack-based Buffer Overflow Remot… | 2024-07-23T22:20:12.318000Z |
| var-202308-3105 | D-Link DAP-2622 DDP Reset Factory Auth Username Stack-based Buffer Overflow Remote Code E… | 2024-07-23T22:20:12.284000Z |
| var-202008-1238 | In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.… | 2024-07-23T22:19:51.232000Z |
| var-201302-0307 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2024-07-23T22:19:51.408000Z |
| var-201804-1162 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T22:19:50.233000Z |
| var-201912-0592 | An input validation issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:19:49.641000Z |
| var-201302-0224 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:19:19.153000Z |
| var-201711-0476 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:19:18.201000Z |
| var-202108-1141 | An access issue was addressed with improved access restrictions. This issue is fixed in m… | 2024-07-23T22:19:17.980000Z |
| var-200609-0314 | Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to… | 2024-07-23T22:19:17.031000Z |
| var-202005-0222 | ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related … | 2024-07-23T22:19:16.422000Z |
| var-202006-1653 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 a… | 2024-07-23T22:19:15.782000Z |
| var-201205-0312 | sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI… | 2024-07-23T22:18:38.885000Z |
| var-201903-0424 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:18:36.709000Z |
| var-201401-0254 | The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.… | 2024-07-23T22:18:17.213000Z |
| var-201806-1449 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:18:16.692000Z |
| var-202201-0405 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. vim/vim Exists in a… | 2024-07-23T22:17:38.807000Z |
| var-201711-0450 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:17:38.652000Z |
| var-200701-0510 | The Adobe PDF specification 1.3, as implemented by Apple Mac OS X Preview, allows remote … | 2024-07-23T22:17:06.694000Z |
| var-201904-1360 | A cookie management issue was addressed with improved checks. This issue affected version… | 2024-07-23T22:16:09.056000Z |
| var-201108-0236 | The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF de… | 2024-07-23T22:16:08.579000Z |
| var-200107-0173 | Cisco CBOS 2.3.0.053 sends output of the "sh nat" (aka "show nat") command to the termina… | 2024-07-23T22:16:08.756000Z |
| var-201206-0055 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:14:46.537000Z |
| var-201901-1586 | In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 1… | 2024-07-23T22:14:43.295000Z |
| var-201903-0423 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:14:42.527000Z |
| var-201304-0373 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:14:42.081000Z |
| var-200701-0061 | Finder 10.4.6 on Apple Mac OS X 10.4.8 allows user-assisted remote attackers to cause a d… | 2024-07-23T22:14:37.008000Z |
| var-200502-0025 | The der_chop script in the openssl package in Trustix Secure Linux 1.5 through 2.1 and ot… | 2024-07-23T22:14:37.244000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2019-006 | PHOENIX CONTACT: unauthorized access to WEB-UI on FL NAT SMx | 2019-03-25T11:40:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2019-003 | PHOENIX CONTACT: Multiple Vulnerabilities in MEVIEW3 | 2019-03-05T10:35:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2019-001 | PHOENIX CONTACT: Multiple Vulnerabilities in FL SWITCH 3xxx, 4xxx and 48xx | 2019-01-23T12:02:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2018-015 | Phoenix Contact: AXL F BK PN Denial of Service Vulnerability | 2018-09-21T07:03:00.000Z | 2018-09-21T07:03:00.000Z |
| vde-2018-012 | PHOENIX CONTACT: ILC 1x1 ETH Denial of Service | 2018-08-13T11:55:00.000Z | 2018-08-13T11:55:00.000Z |
| vde-2018-007 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series - Stack-based Buffer Overflow in shared object file | 2018-05-16T10:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2018-006 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 has a Stack-based Buffer Overflow | 2018-05-16T10:00:00.000Z | 2025-05-14T13:00:15.000Z |
| vde-2018-005 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 allows Information Exposure | 2018-05-16T05:35:00.000Z | 2018-05-16T05:35:00.000Z |
| vde-2018-004 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 allows Command Injection | 2018-05-16T05:35:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2018-003 | PHOENIX CONTACT: addressing Meltdown and Spectre vulnerabilities | 2018-03-23T09:43:00.000Z | 2025-10-01T08:00:00.000Z |
| vde-2018-001 | PHOENIX CONTACT: Advisory for mGuard products | 2018-01-30T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2017-006 | PHOENIX CONTACT: FL SWITCH 3xxx/4xxx/48xx series web-service authentication bypass | 2018-01-10T09:36:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2017-004 | PHOENIX CONTACT: FL COMSERVER cross-site scripting (XSS) vulnerability | 2017-12-05T08:50:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2017-003 | PHOENIX CONTACT: WLAN enabled devices utilising WPA2 encryption | 2017-11-09T16:20:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2017-002 | PHOENIX CONTACT: mGuard device manager (mdm) multiple vulnerabilities in Java SE | 2017-09-07T07:00:00.000Z | 2025-05-22T13:03:10.000Z |
| vde-2017-001 | PHOENIX CONTACT: mGuard IKE daemon remote denial of service | 2017-03-07T11:05:00.000Z | 2025-05-22T13:03:10.000Z |