Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-37346 |
4.7 (3.1)
|
SourceCodester Payroll Management and Information… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:44:44.805Z |
| CVE-2026-37345 |
9.8 (3.1)
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:42:56.413Z |
| CVE-2026-37347 |
9.1 (3.1)
|
SourceCodester Payroll Management and Information… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:38:38.249Z |
| CVE-2026-6409 |
7.1 (4.0)
|
Denial of Service (DoS) vulnerability exists in the Pr… |
Protocol Buffers |
Protobuf-php (Pecl) |
2026-04-16T14:30:51.568Z | 2026-04-16T15:24:43.164Z |
| CVE-2026-5426 |
N/A
|
KnowledgeDeliver deployments before February 24, 2026 … |
Digital Knowledge |
KnowledgeDeliver |
2026-04-16T15:18:46.224Z | 2026-04-16T15:22:20.823Z |
| CVE-2026-3324 |
8.2 (3.1)
|
Authentication Bypass |
Zohocorp |
ManageEngine Log360 |
2026-04-16T14:30:55.130Z | 2026-04-16T15:21:19.911Z |
| CVE-2026-30459 |
7.1 (3.1)
|
An issue in the Forgot Password feature of Daylig… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:16:57.348Z |
| CVE-2026-33793 |
7.8 (3.1)
8.5 (4.0)
|
Junos OS and Junos OS Evolved: When an unsigned Python… |
Juniper Networks |
Junos OS |
2026-04-09T21:24:50.485Z | 2026-04-16T15:14:18.212Z |
| CVE-2025-11252 |
9.8 (3.1)
|
SQLi in Signum Technologies' windesk.fm |
Signum Technology Promotion and Training Inc. |
windesk.fm |
2026-02-27T12:32:33.594Z | 2026-04-16T15:10:42.074Z |
| CVE-2026-37100 |
N/A
|
An issue in the Bluetooth Low Energy (BLE) contro… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:10:26.326Z |
| CVE-2026-40729 |
4.3 (3.1)
|
WordPress 3D viewer – Embed 3D Models plugin <= 1.8.5 … |
bPlugins |
3D viewer – Embed 3D Models |
2026-04-15T10:21:33.661Z | 2026-04-16T15:09:41.105Z |
| CVE-2026-40734 |
6.5 (3.1)
|
WordPress Categories Images plugin <= 3.3.1 - Cross Si… |
Zahlan |
Categories Images |
2026-04-15T10:21:33.995Z | 2026-04-16T15:06:08.721Z |
| CVE-2026-37344 |
N/A
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T14:56:26.706Z |
| CVE-2026-37343 |
N/A
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T14:53:42.067Z |
| CVE-2026-40740 |
5.4 (3.1)
|
WordPress Tutor LMS plugin <= 3.9.7 - Broken Access Co… |
Themeum |
Tutor LMS |
2026-04-15T10:21:34.311Z | 2026-04-16T14:52:07.805Z |
| CVE-2026-37342 |
N/A
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T14:52:06.099Z |
| CVE-2026-37341 |
N/A
|
SourceCodester Vehicle Parking Area Management Sy… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T14:49:44.408Z |
| CVE-2026-40744 |
8.5 (3.1)
|
WordPress Beaver Builder plugin <= 2.10.1.2 - SQL Inje… |
Beaver Builder |
Beaver Builder |
2026-04-15T10:21:34.729Z | 2026-04-16T14:47:03.967Z |
| CVE-2026-2840 |
6.4 (3.1)
|
Email Encoder – Protect Email Addresses and Phone Numb… |
onlineoptimisation |
Email Encoder – Protect Email Addresses and Phone Numbers |
2026-04-16T14:10:29.114Z | 2026-04-16T14:42:53.905Z |
| CVE-2026-33804 |
7.4 (3.1)
|
@fastify/middie vulnerable to middleware bypass via de… |
@fastify/middie |
@fastify/middie |
2026-04-16T13:56:56.176Z | 2026-04-16T14:41:48.659Z |
| CVE-2026-40763 |
5.3 (3.1)
|
WordPress Royal Elementor Addons plugin <= 1.7.1056 - … |
WP Royal |
Royal Elementor Addons |
2026-04-15T10:21:35.155Z | 2026-04-16T14:41:45.860Z |
| CVE-2026-37340 |
N/A
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T14:40:33.498Z |
| CVE-2024-35512 |
5.3 (3.1)
|
hmq v1.5.5 is vulnerable to Denial of Service (Do… |
n/a |
n/a |
2024-05-29T16:55:34.086Z | 2026-04-16T14:39:03.891Z |
| CVE-2026-37339 |
N/A
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T14:38:34.839Z |
| CVE-2026-40778 |
5.3 (3.1)
|
WordPress Majestic Support plugin <= 1.1.2 - Broken Ac… |
Majestic Support |
Majestic Support |
2026-04-15T10:21:35.665Z | 2026-04-16T14:35:34.783Z |
| CVE-2026-2784 |
9.8 (3.1)
|
Mitigation bypass in the DOM: Security component |
Mozilla |
Firefox |
2026-02-24T13:33:17.554Z | 2026-04-16T14:32:57.551Z |
| CVE-2026-2779 |
9.8 (3.1)
|
Incorrect boundary conditions in the Networking: JAR c… |
Mozilla |
Firefox |
2026-02-24T13:33:14.195Z | 2026-04-16T14:32:33.729Z |
| CVE-2026-2778 |
10 (3.1)
|
Sandbox escape due to incorrect boundary conditions in… |
Mozilla |
Firefox |
2026-02-24T13:33:13.564Z | 2026-04-16T14:32:14.511Z |
| CVE-2026-2776 |
10 (3.1)
|
Sandbox escape due to incorrect boundary conditions in… |
Mozilla |
Firefox |
2026-02-24T13:33:12.247Z | 2026-04-16T14:31:49.143Z |
| CVE-2026-2775 |
9.8 (3.1)
|
Mitigation bypass in the DOM: HTML Parser component |
Mozilla |
Firefox |
2026-02-24T13:33:11.553Z | 2026-04-16T14:31:30.683Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-20039 |
8.6 (3.1)
|
Cisco Adaptive Security Appliance and Firepower Threat… |
Cisco |
Cisco Secure Firewall Adaptive Security Appliance (ASA) Software |
2026-03-04T17:17:49.841Z | 2026-03-05T15:49:08.973Z |
| CVE-2026-20049 |
7.7 (3.1)
|
A vulnerability in the processing of Galois/Count… |
Cisco |
Cisco Secure Firewall Adaptive Security Appliance (ASA) Software |
2026-03-04T17:22:02.980Z | 2026-03-04T20:55:05.470Z |
| CVE-2026-34197 |
N/A
|
Apache ActiveMQ Broker, Apache ActiveMQ All, Apache Ac… |
Apache Software Foundation |
Apache ActiveMQ Broker |
2026-04-07T07:50:10.958Z | 2026-04-17T03:55:12.349Z |
| CVE-2026-20050 |
6.8 (3.1)
|
Cisco Secure Firewall Threat Defense Decryption Policy… |
Cisco |
Cisco Secure Firewall Threat Defense (FTD) Software |
2026-03-04T17:46:42.446Z | 2026-03-04T20:47:10.363Z |
| CVE-2026-6067 |
7.5 (3.1)
|
CVE-2026-6067 |
NASM |
NASM |
2026-04-10T13:30:26.140Z | 2026-04-10T14:58:07.818Z |
| CVE-2026-6068 |
6.5 (3.1)
|
CVE-2026-6068 |
NASM |
NASM |
2026-04-10T13:30:38.420Z | 2026-04-10T14:56:52.908Z |
| CVE-2026-6069 |
7.5 (3.1)
|
CVE-2026-6069 |
NASM |
NASM |
2026-04-10T13:30:48.302Z | 2026-04-10T14:53:37.082Z |
| CVE-2026-29002 |
8.6 (4.0)
7.2 (3.1)
|
CouchCMS Privilege Escalation via f_k_levels_list Parameter |
CouchCMS |
CouchCMS |
2026-04-10T15:11:43.411Z | 2026-04-10T16:20:02.847Z |
| CVE-2026-29043 |
5.5 (3.1)
|
HDF5 H5T__ref_mem_setnull Heap Buffer Overflow |
HDFGroup |
hdf5 |
2026-04-10T15:35:51.682Z | 2026-04-14T14:50:46.566Z |
| CVE-2026-1115 |
9.6 (3.0)
|
Stored XSS in parisneo/lollms |
parisneo |
parisneo/lollms |
2026-04-10T06:23:13.463Z | 2026-04-10T13:01:44.634Z |
| CVE-2026-34781 |
2.8 (3.1)
|
Electron crashes in clipboard.readImage() on malformed… |
electron |
electron |
2026-04-07T21:20:12.517Z | 2026-04-08T16:14:38.564Z |
| CVE-2026-27140 |
8.8 (3.1)
|
Code execution vulnerability in SWIG code generation i… |
Go toolchain |
cmd/go |
2026-04-08T01:06:57.893Z | 2026-04-13T13:22:34.117Z |
| CVE-2026-27143 |
9.8 (3.1)
|
Missing bound checks can lead to memory corruption in … |
Go toolchain |
cmd/compile |
2026-04-08T01:06:57.168Z | 2026-04-13T18:20:17.933Z |
| CVE-2026-27144 |
7.1 (3.1)
|
Miscompilation allows memory corruption via CONVNOP-wr… |
Go toolchain |
cmd/compile |
2026-04-08T01:06:56.908Z | 2026-04-13T18:20:28.098Z |
| CVE-2026-32280 |
7.5 (3.1)
|
Unexpected work during chain building in crypto/x509 |
Go standard library |
crypto/x509 |
2026-04-08T01:06:58.595Z | 2026-04-08T17:46:47.347Z |
| CVE-2026-6442 |
8.3 (3.1)
|
Improper Command Detection Logic Allows RCE in Cortex … |
Snowflake |
Cortex Code CLI |
2026-04-16T18:43:21.181Z | 2026-04-16T18:54:58.366Z |
| CVE-2026-40175 |
4.8 (3.1)
|
Axios has Unrestricted Cloud Metadata Exfiltration via… |
axios |
axios |
2026-04-10T19:23:52.285Z | 2026-04-16T18:45:12.892Z |
| CVE-2026-3497 |
2.7 (4.0)
|
Vulnerability in the OpenSSH GSSAPI delta include… |
Ubuntu |
openssh |
2026-03-12T18:27:44.917Z | 2026-04-16T18:24:30.556Z |
| CVE-2026-33121 |
8.7 (4.0)
|
DataEase has SQL Injection via Datasource Save Flow |
dataease |
dataease |
2026-04-16T18:16:02.485Z | 2026-04-16T18:34:54.187Z |
| CVE-2026-33084 |
8.7 (4.0)
|
DataEase has SQL Injection through its getFieldEnumObj… |
dataease |
dataease |
2026-04-16T18:14:07.316Z | 2026-04-16T18:14:07.316Z |
| CVE-2026-31987 |
N/A
|
Apache Airflow: JWT token appearing in logs |
Apache Software Foundation |
Apache Airflow |
2026-04-16T13:31:52.336Z | 2026-04-16T18:24:29.466Z |
| CVE-2025-62718 |
6.3 (4.0)
|
Axios has a NO_PROXY Hostname Normalization Bypass tha… |
axios |
axios |
2026-04-09T14:31:46.067Z | 2026-04-16T18:44:20.705Z |
| CVE-2025-43937 |
6.6 (3.1)
|
Dell PowerScale OneFS, versions prior to 9.12.0.0… |
Dell |
PowerScale OneFS |
2026-04-16T18:03:08.750Z | 2026-04-16T18:51:41.562Z |
| CVE-2025-43935 |
4.4 (3.1)
|
Dell PowerScale OneFS, versions prior to 9.12.0.0… |
Dell |
PowerScale OneFS |
2026-04-16T17:59:04.315Z | 2026-04-16T19:38:28.840Z |
| CVE-2025-27363 |
8.1 (3.1)
|
An out of bounds write exists in FreeType version… |
FreeType |
FreeType |
2025-03-11T13:28:31.705Z | 2026-04-16T18:24:28.329Z |
| CVE-2026-32281 |
7.5 (3.1)
|
Inefficient policy validation in crypto/x509 |
Go standard library |
crypto/x509 |
2026-04-08T01:06:58.354Z | 2026-04-13T18:19:44.779Z |
| CVE-2026-32282 |
6.4 (3.1)
|
TOCTOU permits root escape on Linux via Root.Chmod in … |
Go standard library |
internal/syscall/unix |
2026-04-08T01:06:55.953Z | 2026-04-13T18:20:56.456Z |
| CVE-2026-32283 |
7.5 (3.1)
|
Unauthenticated TLS 1.3 KeyUpdate record can cause per… |
Go standard library |
crypto/tls |
2026-04-08T01:06:57.670Z | 2026-04-13T18:19:55.848Z |
| CVE-2026-32288 |
5.5 (3.1)
|
Unbounded allocation for old GNU sparse in archive/tar |
Go standard library |
archive/tar |
2026-04-08T01:06:57.416Z | 2026-04-13T18:20:08.191Z |
| CVE-2026-29131 |
4.9 (4.0)
|
PGP Decryption Recipient LDAP Injection |
SEPPmail |
Secure Email Gateway |
2026-04-02T08:46:15.928Z | 2026-04-02T13:31:31.492Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-6067 | A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due to a lack of bounds… | 2026-04-10T14:16:38.620 | 2026-04-16T19:49:06.873 |
| fkie_cve-2026-6068 | NASM contains a heap use after free vulnerability in response file (-@) processing where a dangling… | 2026-04-10T14:16:38.723 | 2026-04-16T19:48:57.250 |
| fkie_cve-2026-6069 | NASM’s disasm() function contains a stack based buffer overflow when formatting disassembly output,… | 2026-04-10T14:16:38.820 | 2026-04-16T19:48:48.110 |
| fkie_cve-2026-29002 | CouchCMS contains a privilege escalation vulnerability that allows authenticated Admin-level users … | 2026-04-10T16:16:30.513 | 2026-04-16T19:41:17.740 |
| fkie_cve-2026-29043 | HDF5 is software for managing data. In 1.14.1-2 and earlier, an attacker who can control an h5 file… | 2026-04-10T16:16:30.693 | 2026-04-16T19:40:13.963 |
| fkie_cve-2026-1115 | A Stored Cross-Site Scripting (XSS) vulnerability was identified in the social feature of parisneo/… | 2026-04-10T07:16:20.750 | 2026-04-16T19:39:35.050 |
| fkie_cve-2026-34781 | Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and … | 2026-04-07T22:16:23.123 | 2026-04-16T19:34:03.983 |
| fkie_cve-2026-27140 | SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitra… | 2026-04-08T02:16:02.887 | 2026-04-16T19:26:59.613 |
| fkie_cve-2026-27143 | Arithmetic over induction variables in loops were not correctly checked for underflow or overflow. … | 2026-04-08T02:16:03.017 | 2026-04-16T19:20:02.250 |
| fkie_cve-2026-27144 | The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface… | 2026-04-08T02:16:03.130 | 2026-04-16T19:17:18.093 |
| fkie_cve-2026-32280 | During chain building, the amount of work that is done is not correctly limited when a large number… | 2026-04-08T02:16:03.247 | 2026-04-16T19:16:42.180 |
| fkie_cve-2026-6442 | Improper validation of bash commands in Snowflake Cortex Code CLI versions prior to 1.0.25 allowed … | 2026-04-16T19:16:35.560 | 2026-04-16T19:16:35.560 |
| fkie_cve-2026-40175 | Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0 and 0.3.1, the Ax… | 2026-04-10T20:16:22.800 | 2026-04-16T19:16:34.517 |
| fkie_cve-2026-3497 | Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerabili… | 2026-03-12T19:16:19.910 | 2026-04-16T19:16:34.113 |
| fkie_cve-2026-33121 | DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below co… | 2026-04-16T19:16:33.657 | 2026-04-16T19:16:33.657 |
| fkie_cve-2026-33084 | DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below co… | 2026-04-16T19:16:33.520 | 2026-04-16T19:16:33.520 |
| fkie_cve-2026-31987 | JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. Us… | 2026-04-16T14:16:13.490 | 2026-04-16T19:16:33.343 |
| fkie_cve-2025-62718 | Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0 and 0.31.0, Axios… | 2026-04-09T15:16:08.650 | 2026-04-16T19:16:33.063 |
| fkie_cve-2025-43937 | Dell PowerScale OneFS, versions prior to 9.12.0.0, contains an insertion of sensitive information i… | 2026-04-16T19:16:32.750 | 2026-04-16T19:16:32.750 |
| fkie_cve-2025-43935 | Dell PowerScale OneFS, versions prior to 9.12.0.0, contains an improper resource shutdown or releas… | 2026-04-16T19:16:32.610 | 2026-04-16T19:16:32.610 |
| fkie_cve-2025-27363 | An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are… | 2025-03-11T14:15:25.427 | 2026-04-16T19:16:31.660 |
| fkie_cve-2026-32281 | Validating certificate chains which use policies is unexpectedly inefficient when certificates in t… | 2026-04-08T02:16:03.350 | 2026-04-16T19:15:57.750 |
| fkie_cve-2026-32282 | On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in pr… | 2026-04-08T02:16:03.467 | 2026-04-16T19:15:39.400 |
| fkie_cve-2026-32283 | If one side of the TLS connection sends multiple key update messages post-handshake in a single rec… | 2026-04-08T02:16:03.580 | 2026-04-16T19:12:10.540 |
| fkie_cve-2026-32288 | tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive co… | 2026-04-08T02:16:03.707 | 2026-04-16T19:08:52.240 |
| fkie_cve-2026-29131 | SEPPmail Secure Email Gateway before version 15.0.3 allows attackers with a specially crafted email… | 2026-04-02T09:16:21.000 | 2026-04-16T19:07:50.730 |
| fkie_cve-2026-29132 | SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker with access to a victim's GI… | 2026-04-02T09:16:21.327 | 2026-04-16T19:07:33.967 |
| fkie_cve-2026-32289 | Context was not properly tracked across template branches for JS template literals, leading to poss… | 2026-04-08T02:16:03.820 | 2026-04-16T19:06:57.367 |
| fkie_cve-2026-29133 | SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to upload PGP keys with UIDs… | 2026-04-02T09:16:21.483 | 2026-04-16T19:06:51.800 |
| fkie_cve-2026-29134 | SEPPmail Secure Email Gateway before version 15.0.3 allows an external user to modify GINA webdomai… | 2026-04-02T09:16:21.653 | 2026-04-16T19:03:15.477 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-wph3-c8fm-q2v8 |
5.3 (3.1)
6.3 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to forge a GINA-encrypted email. | 2026-04-02T09:30:25Z | 2026-04-16T21:31:10Z |
| ghsa-vc5m-vgvg-698r |
5.3 (3.1)
7.8 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to bypass subject sanitizati… | 2026-04-02T09:30:25Z | 2026-04-16T21:31:10Z |
| ghsa-q7v7-25qx-fcxf |
9.1 (3.1)
7.8 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.3 does not properly authenticate the inner messag… | 2026-04-02T09:30:25Z | 2026-04-16T21:31:10Z |
| ghsa-mmr3-c33j-h2f2 |
5.3 (3.1)
7.7 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to cause attacker-controlled… | 2026-04-02T09:30:25Z | 2026-04-16T21:31:10Z |
| ghsa-mg9q-6j4v-6j49 |
8.8 (3.1)
8.7 (4.0)
|
OpenPLC_V3 REST API endpoint checks for JWT presence but never verifies the caller's role. Any auth… | 2026-04-09T21:31:30Z | 2026-04-16T21:31:10Z |
| ghsa-8q8m-rvgf-6qvc |
9.8 (3.1)
7.8 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.3 allows account takeover by abusing GINA account… | 2026-04-02T09:30:25Z | 2026-04-16T21:31:10Z |
| ghsa-239h-g863-fm9x |
5.3 (3.1)
7.7 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to bypass subject sanitizati… | 2026-04-02T09:30:25Z | 2026-04-16T21:31:10Z |
| ghsa-whc5-mvj9-gjqw |
7.5 (3.1)
6.3 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.3 allows attackers with a specially crafted email… | 2026-04-02T09:30:25Z | 2026-04-16T21:31:09Z |
| ghsa-wcpp-3x59-h8vp |
6.9 (4.0)
|
Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerabili… | 2026-03-12T21:34:50Z | 2026-04-16T21:31:09Z |
| ghsa-v5jf-vjfx-frfr |
7.5 (3.1)
5.3 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.3 allows an external user to modify GINA webdomai… | 2026-04-02T09:30:25Z | 2026-04-16T21:31:09Z |
| ghsa-j47q-h9j2-79x8 |
5.3 (3.1)
5.3 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to hide security tags from u… | 2026-04-02T09:30:25Z | 2026-04-16T21:31:09Z |
| ghsa-g982-ffmg-jq3g |
9.1 (3.1)
5.3 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to upload PGP keys with UIDs… | 2026-04-02T09:30:24Z | 2026-04-16T21:31:09Z |
| ghsa-g8qj-jv5h-78cp |
8.1 (3.1)
|
An out of bounds write exists in FreeType versions 2.13.0 and below when attempting to parse font s… | 2025-03-11T15:31:00Z | 2026-04-16T21:31:09Z |
| ghsa-c75f-55f6-f63q |
7.5 (3.1)
|
A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archiv… | 2026-03-19T15:31:21Z | 2026-04-16T21:31:09Z |
| ghsa-9cfw-4wfr-8gwf |
6.1 (3.1)
5.3 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to inject HTML into notifica… | 2026-04-02T09:30:25Z | 2026-04-16T21:31:09Z |
| ghsa-96h6-qp9f-fc25 |
7.5 (3.1)
5.3 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to craft a password-tag that… | 2026-04-02T09:30:25Z | 2026-04-16T21:31:09Z |
| ghsa-7w6x-34cj-2vph |
7.5 (3.1)
6.3 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker with access to a victim's GI… | 2026-04-02T09:30:24Z | 2026-04-16T21:31:09Z |
| ghsa-69rr-jvgq-g678 |
7.5 (3.1)
4.9 (4.0)
|
SEPPmail Secure Email Gateway before version 15.0.3 allows attackers with a specially crafted email… | 2026-04-02T09:30:25Z | 2026-04-16T21:31:09Z |
| ghsa-2vwv-vqpv-v8vc |
9.8 (3.1)
|
A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the … | 2026-03-30T09:31:29Z | 2026-04-16T21:31:09Z |
| ghsa-x284-j5p8-9c5p |
6.8 (4.0)
|
pypdf: Manipulated FlateDecode image dimensions can exhaust RAM | 2026-04-16T21:30:25Z | 2026-04-16T21:30:25Z |
| ghsa-4pxv-j86v-mhcw |
6.8 (4.0)
|
pypdf: Possible long runtimes for wrong size values in incremental mode | 2026-04-16T21:30:12Z | 2026-04-16T21:30:12Z |
| ghsa-7gw9-cf7v-778f |
6.8 (4.0)
|
pypdf: Manipulated FlateDecode predictor parameters can exhaust RAM | 2026-04-16T21:30:00Z | 2026-04-16T21:30:00Z |
| ghsa-qqx8-2xmm-jrv8 |
8.8 (3.1)
|
ACME Lego: Arbitrary File Write via Path Traversal in Webroot HTTP-01 Provider | 2026-04-16T21:28:55Z | 2026-04-16T21:28:55Z |
| ghsa-33qf-q99x-wpm8 |
5.6 (3.1)
|
Home Assistant Command-line Interface: Handling of user-supplied Jinja2 templates | 2026-04-16T21:28:39Z | 2026-04-16T21:28:39Z |
| ghsa-vqx2-fgx2-5wq9 |
9.1 (3.1)
|
Official Clerk JavaScript SDKs: Middleware-based route protection bypass | 2026-04-16T21:28:26Z | 2026-04-16T21:28:26Z |
| ghsa-ggmw-mjhv-75rm |
8.4 (3.1)
|
NietThijmen ShoppingCart: Command injection in the connect function | 2026-04-15T15:31:43Z | 2026-04-16T21:26:36Z |
| ghsa-4g48-54q2-fg7q |
6.5 (3.1)
|
Apache Airlfow: Sensitive Azure Service Bus connection string (and possibly other providers) expose… | 2026-04-15T15:31:42Z | 2026-04-16T21:26:23Z |
| ghsa-4jjr-vmv7-wh4w |
8.1 (3.1)
|
Statamic: Unsafe method invocation via query value resolution allows data destruction | 2026-04-16T21:25:35Z | 2026-04-16T21:25:35Z |
| ghsa-xr6f-h4x7-r6qp |
8.7 (4.0)
|
WWBN AVideo: RCE cause by clonesite plugin | 2026-04-16T21:25:19Z | 2026-04-16T21:25:20Z |
| ghsa-wxw2-rwmh-vr8f |
9.8 (3.1)
|
electerm: electerm_install_script_CommandInjection Vulnerability Report | 2026-04-16T21:24:22Z | 2026-04-16T21:24:22Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-15 |
5.3 (3.1)
|
Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilde… | flask-appbuilder | 2025-03-03T16:15:41+00:00 | 2025-04-09T17:27:25.227116+00:00 |
| pysec-2025-14 |
|
An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normal… | django | 2025-04-02T13:15:44+00:00 | 2025-04-09T17:27:25.169049+00:00 |
| pysec-2025-13 |
|
An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2… | django | 2025-03-06T19:15:27+00:00 | 2025-04-09T17:27:25.095679+00:00 |
| pysec-2022-43178 |
7.5 (3.1)
|
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo … | cleo | 2022-11-09T20:15:10+00:00 | 2025-04-09T17:27:24.793038+00:00 |
| pysec-2022-43177 |
9.8 (3.1)
|
Azure CLI is the command-line interface for Microsoft Azure. In versions previous to 2.40… | azure-cli | 2022-10-25T17:15:56+00:00 | 2025-04-09T17:27:24.642962+00:00 |
| pysec-2024-244 |
7.5 (3.1)
|
A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a by… | mlflow | 2024-05-16T09:15:14+00:00 | 2025-04-08T10:23:25.092581+00:00 |
| pysec-2024-243 |
9.3 (3.1)
|
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs… | mlflow | 2024-04-16T00:15:12+00:00 | 2025-04-08T10:23:25.044416+00:00 |
| pysec-2024-242 |
7.5 (3.1)
|
A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically … | mlflow | 2024-06-06T19:15:55+00:00 | 2025-04-08T10:23:24.995743+00:00 |
| pysec-2024-241 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untru… | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.946136+00:00 |
| pysec-2024-240 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe. This … | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.900947+00:00 |
| pysec-2024-239 |
8.8 (3.1)
|
A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to im… | mlflow | 2024-06-06T19:15:51+00:00 | 2025-04-08T10:23:24.852109+00:00 |
| pysec-2025-12 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2025-01-21T15:15:13+00:00 | 2025-04-08T10:23:23.899726+00:00 |
| pysec-2024-238 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-04-08T10:23:23.857960+00:00 |
| pysec-2025-11 |
5.9 (3.1)
|
A vulnerability in the `KnowledgeBaseWebReader` class of the run-llama/llama_index reposi… | llama-index | 2025-03-20T10:15:31+00:00 | 2025-04-01T23:22:47.294256+00:00 |
| pysec-2025-10 |
9.1 (3.1)
|
A vulnerability in the `download_model` function of the onnx/onnx framework, before and i… | onnx | 2025-03-20T10:15:37+00:00 | 2025-03-26T19:21:38.843396+00:00 |
| pysec-2025-9 |
|
A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through… | invokeai | 2025-03-20T10:15:26+00:00 | 2025-03-20T11:21:37.872971+00:00 |
| pysec-2025-8 |
|
The `pygments-style-solarized` project was removed from PyPI by its owner on 2021-08-26. … | pygments-style-solarized | 2025-03-17T16:35:37+00:00 | |
| pysec-2024-237 |
9.4 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-05-14T16:17:12+00:00 | 2025-03-05T17:22:29.121263+00:00 |
| pysec-2024-236 |
6.1 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their not… | jupyter-server-proxy | 2024-06-11T22:15:09+00:00 | 2025-02-26T23:22:41.524251+00:00 |
| pysec-2025-7 |
|
Published in 2021, the imblog package is a Python library that scrapes data from a blog p… | imblog | 2025-02-26T21:19:19+00:00 | |
| pysec-2025-6 |
|
Published in 2021, the colabrun package is a Python library that exfiltrates user cookies… | colabrun | 2025-02-26T20:59:48+00:00 | |
| pysec-2025-5 |
|
Published in 2020, the autodzee package is a Python library that bypasses Deezer API rest… | browsercmdhbt2 | 2025-02-26T20:57:11+00:00 | |
| pysec-2025-3 |
|
Published in 2019, the autodzee package is a Python library that bypasses Deezer API rest… | autodzee | 2025-02-26T20:54:20+00:00 | |
| pysec-2025-4 |
|
Published in 2019, the automslc package is a Python library that bypasses Deezer API rest… | automslc | 2025-02-26T19:26:49+00:00 | |
| pysec-2024-235 |
8.1 (3.1)
|
With the following crawler configuration: ```python from bs4 import BeautifulSoup as Sou… | langchain-exa | 2024-02-26T16:27:49+00:00 | 2025-02-26T02:48:56.937312+00:00 |
| pysec-2023-194 |
9.8 (3.1)
|
langchain_experimental 0.0.14 allows an attacker to bypass the CVE-2023-36258 fix and exe… | langchain-experimental | 2023-10-09T20:15:00Z | 2025-02-23T07:46:11Z |
| pysec-2024-234 |
9.8 (3.1)
|
Jupyter Server Proxy allows users to run arbitrary external processes alongside their Jup… | jupyter-server-proxy | 2024-03-20T20:15:08+00:00 | 2025-02-21T18:23:35.992501+00:00 |
| pysec-2023-163 |
9.8 (3.1)
|
An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary… | numexpr | 2023-09-01T16:15:00Z | 2025-02-20T09:11:38.521949Z |
| pysec-2024-233 |
|
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consump… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.511369+00:00 |
| pysec-2024-232 |
|
python-jose through 3.3.0 has algorithm confusion with OpenSSH ECDSA keys and other key f… | python-jose | 2024-04-26T00:15:09+00:00 | 2025-02-18T19:20:15.468012+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33829 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.511177Z |
| gsd-2024-33828 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.373189Z |
| gsd-2024-33827 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.528643Z |
| gsd-2024-33826 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.371945Z |
| gsd-2024-33825 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.318128Z |
| gsd-2024-33824 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.385552Z |
| gsd-2024-33823 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.350433Z |
| gsd-2024-33822 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.561810Z |
| gsd-2024-33821 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.360168Z |
| gsd-2024-33820 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.334156Z |
| gsd-2024-33819 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.351158Z |
| gsd-2024-33818 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.556720Z |
| gsd-2024-33817 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.323149Z |
| gsd-2024-33816 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.388757Z |
| gsd-2024-33815 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.295529Z |
| gsd-2024-33814 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.590797Z |
| gsd-2024-33813 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424031Z |
| gsd-2024-33812 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.367474Z |
| gsd-2024-33811 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.319336Z |
| gsd-2024-33810 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.527741Z |
| gsd-2024-33809 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.516352Z |
| gsd-2024-33808 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.458232Z |
| gsd-2024-33807 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.526483Z |
| gsd-2024-33806 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.291234Z |
| gsd-2024-33805 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.453392Z |
| gsd-2024-33804 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.298401Z |
| gsd-2024-33803 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.369211Z |
| gsd-2024-33802 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.336079Z |
| gsd-2024-33801 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.476298Z |
| gsd-2024-33800 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.371673Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1493 | Malicious code in pino-logger-utils (npm) | 2026-03-17T04:46:23Z | 2026-04-16T15:42:09Z |
| mal-2026-1463 | Malicious code in polymarket-validator (npm) | 2026-03-16T10:13:14Z | 2026-04-16T15:42:09Z |
| mal-2026-1399 | Malicious code in pino-sdk (npm) | 2026-03-13T06:55:58Z | 2026-04-16T15:42:09Z |
| mal-2026-1398 | Malicious code in meta-internal-logger-drzak (npm) | 2026-03-13T06:47:07Z | 2026-04-16T15:42:09Z |
| mal-2026-1331 | Malicious code in llm-oracle (npm) | 2026-03-11T05:58:11Z | 2026-04-16T15:42:09Z |
| mal-2025-27318 | Malicious code in netstruct (npm) | 2025-08-14T18:52:04Z | 2026-04-16T15:42:09Z |
| mal-2025-1044 | Malicious code in minikit-monorepo (npm) | 2025-02-03T17:25:15Z | 2026-04-16T15:42:09Z |
| mal-2026-834 | Malicious code in graphflowx (npm) | 2026-02-10T15:46:43Z | 2026-04-16T15:42:08Z |
| mal-2026-692 | Malicious code in graphrix (npm) | 2026-02-03T07:44:00Z | 2026-04-16T15:42:08Z |
| mal-2026-680 | Malicious code in frontend-js-state-web (npm) | 2026-02-03T07:27:10Z | 2026-04-16T15:42:08Z |
| mal-2026-2642 | Malicious code in chatbotloader (npm) | 2026-04-14T11:47:13Z | 2026-04-16T15:42:08Z |
| mal-2026-2641 | Malicious code in chai-as-refined (npm) | 2026-04-14T11:48:44Z | 2026-04-16T15:42:08Z |
| mal-2026-2640 | Malicious code in bytefrontier-core (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:08Z |
| mal-2026-2639 | Malicious code in bytefrontier (npm) | 2026-04-14T11:47:12Z | 2026-04-16T15:42:08Z |
| mal-2026-2249 | Malicious code in chai-as-added (npm) | 2026-03-27T03:12:35Z | 2026-04-16T15:42:08Z |
| mal-2026-2223 | Malicious code in cr-static-shared-components (npm) | 2026-03-24T09:05:26Z | 2026-04-16T15:42:08Z |
| mal-2026-2222 | Malicious code in chain-coremesh (npm) | 2026-03-26T00:42:51Z | 2026-04-16T15:42:08Z |
| mal-2026-2160 | Malicious code in chai-as-chain (npm) | 2026-03-25T01:52:23Z | 2026-04-16T15:42:08Z |
| mal-2026-2154 | Malicious code in chai-as-emitted (npm) | 2026-03-25T00:37:35Z | 2026-04-16T15:42:08Z |
| mal-2026-2130 | Malicious code in fancode-web-app (npm) | 2026-03-24T12:48:28Z | 2026-04-16T15:42:08Z |
| mal-2026-1975 | Malicious code in chai-as-chayn (npm) | 2026-03-20T04:59:55Z | 2026-04-16T15:42:08Z |
| mal-2026-1949 | Malicious code in hackerhacker (npm) | 2026-03-20T04:38:28Z | 2026-04-16T15:42:08Z |
| mal-2026-1948 | Malicious code in fadlsjf (npm) | 2026-03-20T04:45:09Z | 2026-04-16T15:42:08Z |
| mal-2026-1947 | Malicious code in el-icon (npm) | 2026-03-20T04:43:54Z | 2026-04-16T15:42:08Z |
| mal-2026-1693 | Malicious code in coinbase-desktop-sdk (npm) | 2026-03-18T12:44:21Z | 2026-04-16T15:42:08Z |
| mal-2026-1666 | Malicious code in carbon-mac-copy-cloner (npm) | 2026-03-18T12:41:53Z | 2026-04-16T15:42:08Z |
| mal-2026-1576 | Malicious code in chai-as-constrained (npm) | 2026-03-18T17:07:30Z | 2026-04-16T15:42:08Z |
| mal-2026-1491 | Malicious code in graphlib-js (npm) | 2026-03-17T02:54:20Z | 2026-04-16T15:42:08Z |
| mal-2026-1397 | Malicious code in fusion-internal-common-drzak (npm) | 2026-03-13T06:47:06Z | 2026-04-16T15:42:08Z |
| mal-2026-1396 | Malicious code in dell-internal-auth-drzak (npm) | 2026-03-13T06:47:06Z | 2026-04-16T15:42:08Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2407 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2365 | Oracle Java SE: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2350 | Linux Kernel: Mehrere Schwachstellen | 2025-10-20T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2340 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-19T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2329 | cPanel/WHM (PostgreSQL, Perl): Mehrere Schwachstellen | 2025-10-16T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2298 | Linux Kernel: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2268 | Linux Kernel: Mehrere Schwachstellen | 2025-10-13T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2249 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-09T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2246 | Linux Kernel: Mehrere Schwachstellen | 2025-10-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2229 | Linux Kernel: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2227 | Golang Go: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2212 | OpenSSH: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-10-06T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2194 | Linux Kernel: Mehrere Schwachstellen | 2025-10-05T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2187 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-01T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2170 | Linux Kernel: Mehrere Schwachstellen | 2025-09-30T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2112 | DNSdist: Schwachstelle ermöglicht Denial of Service | 2025-09-23T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2107 | Linux Kernel: Mehrere Schwachstellen | 2025-09-22T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2099 | Linux Kernel: Mehrere Schwachstellen | 2025-09-21T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2092 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-18T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-2077 | Linux Kernel: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1988 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1976 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-04T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1898 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und Privilegieneskalation | 2025-08-24T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1869 | Linux Kernel: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1858 | Linux Kernel: Mehrere Schwachstellen | 2025-08-17T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1653 | Linux Kernel: Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1517 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-08T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1481 | Linux Kernel: Mehrere Schwachstellen | 2025-07-07T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1465 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-06T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-1452 | Linux Kernel: Mehrere Schwachstellen | 2025-07-02T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-062-02 | Hitachi Energy Relion REB500 Product | 2026-02-24T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-01 | Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module | 2026-03-03T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-25-023-02 | Hitachi Energy RTU500 Series Product (Update B) | 2024-04-30T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-08 | Everon OCPP Backends | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-07 | ePower epower.ie | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-06 | Mobiliti e-mobi.hu | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-057-10 | Copeland XWEB and XWEB Pro | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-09 | Yokogawa CENTUM VP R6, R7 | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-08 | Mobility46 mobility46.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-07 | EV Energy ev.energy | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-06 | SWITCH EV swtchenergy.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-05 | Chargemap chargemap.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-04 | EV2GO ev2go.io | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-03 | CloudCharge cloudcharge.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-02 | Pelco, Inc. Sarix Pro 3 Series IP Cameras | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-01 | Johnson Controls, Inc. Frick Controls Quantum HD | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-25-133-02 | Hitachi Energy Relion 670/650/SAM600-IO Series (Update C) | 2023-11-28T00:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-043-06 | Siemens SINEC OS | 2026-01-28T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-027-01 | iba Systems ibaPDA | 2026-01-27T07:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-226-15 | Siemens SINEC OS | 2025-08-12T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-226-07 | Siemens Third-Party Components in SINEC OS | 2025-08-12T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-203-04 | Schneider Electric EcoStruxure Power Operation (Update A) | 2025-07-22T06:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-055-02 | Schneider Electric EcoStruxure Building Operation Workstation | 2026-02-10T08:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-26-055-01 | InSAT MasterSCADA BUK-TS | 2026-02-24T07:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-25-070-01 | Schneider Electric Uni-Telway Driver (Update C) | 2025-02-11T05:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-24-296-01 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update C) | 2024-10-22T06:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-22-202-04 | ICONICS Suite and Mitsubishi Electric MC Works64 Products (Update C) | 2022-07-26T06:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-26-020-01 | Schneider Electric EcoStruxure Foxboro DCS (Update A) | 2025-12-09T08:00:00.000000Z | 2026-02-24T06:00:00.000000Z |
| icsa-26-050-04 | Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-03 | Jinan USR IOT Technology Limited (PUSR) USR-W610 | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cc-unauth-rce-qen8h7mq | Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities | 2025-11-05T16:00:00+00:00 | 2025-11-13T12:48:42+00:00 |
| cisco-sa-asaftd-webvpn-yrootuw | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Unauthorized Access Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:55+00:00 |
| cisco-sa-asaftd-webvpn-z5xp8eub | Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:54+00:00 |
| cisco-sa-http-code-exec-wmfp3h3o | Cisco Secure Firewall Adaptive Security Appliance Software, Secure Firewall Threat Defense Software, IOS Software, IOS XE Software, and IOS XR Software Web Services Remote Code Execution Vulnerability | 2025-09-25T16:00:00+00:00 | 2025-11-06T15:50:51+00:00 |
| cisco-sa-ise-radsupress-dos-8yf3jthh | Cisco Identity Services Engine RADIUS Suppression Denial of Service Vulnerability | 2025-11-05T16:00:00+00:00 | 2025-11-05T16:00:00+00:00 |
| cisco-sa-broadworks-xss-o696ymra | Cisco BroadWorks CommPilot Application Software Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-10-21T15:13:31+00:00 |
| cisco-sa-roomos-inf-disc-qggsbxam | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-phone-dos-fpyjlv7a | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-10-15T16:00:00+00:00 | 2025-10-15T16:00:00+00:00 |
| cisco-sa-secboot-uqfd8avc | Cisco IOS XE Software Secure Boot Bypass Vulnerabilities | 2025-09-24T16:00:00+00:00 | 2025-10-15T15:57:29+00:00 |
| cisco-sa-snmp-x4lphte | Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-06T18:27:02+00:00 |
| cisco-sa-ios-tacacs-hdb7thjw | Cisco IOS and IOS XE Software TACACS+ Authentication Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-01T16:39:50+00:00 |
| cisco-sa-cv-xss-rwrakaj9 | Cisco Cyber Vision Center Stored Cross-Site Scripting Vulnerabilities | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cucm-stored-xss-fnj66yly | Cisco Unified Communications Manager Stored Cross-Site Scripting Vulnerability | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cat9k-ptmd7bgy | Cisco IOS XE Software for Catalyst 9000 Series Switches Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-30T14:26:46+00:00 |
| cisco-sa-ap-ipv6-gw-tuazpn9o | Cisco Access Point Software Intermittent IPv6 Gateway Change Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:51+00:00 |
| cisco-sa-webui-xss-vwydgjou | Cisco IOS XE Software Web Authentication Reflected Cross-Site Scripting Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:50+00:00 |
| cisco-sa-snmpwred-x3mjyf5m | Cisco IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-nbar-dos-lavwtmet | Cisco IOS XE Software Network-Based Application Recognition Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-arg-inject-eyddbh4e | Cisco IOS XE Software CLI Argument Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-cmd-inject-rpjm8bgl | Cisco IOS XE Software HTTP API Command Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-invalid-url-dos-nvxszf6u | Cisco IOS Software Industrial Ethernet Switch Device Manager Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-cli-eb7cz6yo | Cisco IOS and IOS XE Software CLI Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-defaultacl-psjk9nvf | Cisco SD-WAN vEdge Software Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-cat9k-acl-l4k7vxgd | Cisco IOS XE Software on Cisco Catalyst 9500X and 9600X Series Switches Virtual Interface Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-action-frame-inj-qqcncz8h | Cisco Wireless Access Point Software Device Analytics Action Frame Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-9800cl-openscep-sb4xtxzp | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controller for Cloud Unauthenticated Access to Certificate Enrollment Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-snmp-bypass-hhuvujdn | Cisco IOS XE SD-WAN Software Packet Filtering Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-09-22T14:12:28+00:00 |
| cisco-sa-xrsig-uy4zrucg | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-iosxr-arp-storm-ejuu55ym | Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-acl-packetio-swjhhbtz | Cisco IOS XR Software Management Interface ACL Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-4897 | Polkit: polkit: denial of service via unbounded input processing through standard input | 2026-03-02T00:00:00.000Z | 2026-04-14T14:44:19.000Z |
| msrc_cve-2026-2436 | Libsoup: libsoup: denial of service via use-after-free in soupserver during tls handshake | 2026-03-02T00:00:00.000Z | 2026-04-14T14:44:01.000Z |
| msrc_cve-2026-5119 | Libsoup: libsoup: information disclosure via cleartext transmission of cookies during https tunnel establishment | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:55.000Z |
| msrc_cve-2026-21711 | CVE-2026-21711 | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:40.000Z |
| msrc_cve-2025-66038 | OpenSC: `sc_compacttlv_find_tag` can return out-of-bounds pointers | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:34.000Z |
| msrc_cve-2025-49010 | OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:29.000Z |
| msrc_cve-2026-0964 | Libssh: improper sanitation of paths received from scp servers | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:16.000Z |
| msrc_cve-2026-0966 | Libssh: buffer underflow in ssh_get_hexa() on invalid input | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:10.000Z |
| msrc_cve-2026-0967 | Libssh: libssh: denial of service via inefficient regular expression processing | 2026-03-02T00:00:00.000Z | 2026-04-14T14:43:05.000Z |
| msrc_cve-2026-0965 | Libssh: libssh: denial of service via improper configuration file handling | 2026-03-02T00:00:00.000Z | 2026-04-14T14:42:59.000Z |
| msrc_cve-2026-5107 | FRRouting FRR EVPN Type-2 Route bgp_evpn.c process_type2_route access control | 2026-03-02T00:00:00.000Z | 2026-04-14T14:42:52.000Z |
| msrc_cve-2026-33672 | Picomatch: Method Injection in POSIX Character Classes causes incorrect Glob Matching | 2026-03-02T00:00:00.000Z | 2026-04-14T14:42:45.000Z |
| msrc_cve-2026-4647 | Binutils: out-of-bounds read in xcoff relocation processing in gnu binutils bfd library | 2026-03-02T00:00:00.000Z | 2026-04-14T14:42:23.000Z |
| msrc_cve-2026-3099 | Libsoup: libsoup: authentication bypass via digest authentication replay attack | 2026-03-02T00:00:00.000Z | 2026-04-14T14:41:57.000Z |
| msrc_cve-2026-3633 | Libsoup: libsoup: header and http request injection via crlf injection | 2026-03-02T00:00:00.000Z | 2026-04-14T14:41:43.000Z |
| msrc_cve-2026-3632 | Libsoup: libsoup: http smuggling and server-side request forgery via malformed hostnames | 2026-03-02T00:00:00.000Z | 2026-04-14T14:41:38.000Z |
| msrc_cve-2026-3634 | Libsoup: libsoup: http header injection and response splitting via crlf injection in content-type header | 2026-03-02T00:00:00.000Z | 2026-04-14T14:41:33.000Z |
| msrc_cve-2025-69648 | CVE-2025-69648 | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:44.000Z |
| msrc_cve-2025-69647 | CVE-2025-69647 | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:39.000Z |
| msrc_cve-2026-3784 | wrong proxy connection reuse with credentials | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:33.000Z |
| msrc_cve-2026-1965 | bad reuse of HTTP Negotiate connection | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:28.000Z |
| msrc_cve-2026-3783 | token leak with redirect and netrc | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:22.000Z |
| msrc_cve-2026-27142 | URLs in meta content attribute actions are not escaped in html/template | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:15.000Z |
| msrc_cve-2025-69649 | GNU Binutils thru 2.46 readelf contains a null pointer dereference vulnerability when processing a crafted ELF binary with malformed header fields. During relocation processing, an invalid or null section pointer may be passed into display_relocations(), resulting in a segmentation fault (SIGSEGV) and abrupt termination. No evidence of memory corruption beyond the null pointer dereference, nor any possibility of code execution, was observed. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:06.000Z |
| msrc_cve-2025-69645 | Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug information. A logic error in the handling of DWARF compilation units can result in an invalid offset_size value being used inside byte_get_little_endian, leading to an abort (SIGABRT). The issue was observed in binutils 2.44. A local attacker can trigger the crash by supplying a malicious input file. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:40:00.000Z |
| msrc_cve-2025-69652 | GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when processing a crafted ELF binary with malformed DWARF abbrev or debug information. Due to incomplete state cleanup in process_debug_info(), an invalid debug_info_p state may propagate into DWARF attribute parsing routines. When certain malformed attributes result in an unexpected data length of zero, byte_get_little_endian() triggers a fatal abort. No evidence of memory corruption or code execution was observed; the impact is limited to denial of service. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:39:55.000Z |
| msrc_cve-2025-69646 | Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug_rnglists data. A logic error in the handling of the debug_rnglists header can cause objdump to repeatedly print the same warning message and fail to terminate, resulting in an unbounded logging loop until the process is interrupted. The issue was observed in binutils 2.44. A local attacker can exploit this vulnerability by supplying a malicious input file, leading to excessive CPU and I/O usage and preventing completion of the objdump analysis. | 2026-03-02T00:00:00.000Z | 2026-04-14T14:39:49.000Z |
| msrc_cve-2025-59529 | simple protocol server ignores accepts unlimited connections and logs failures without limit | 2025-12-02T00:00:00.000Z | 2026-04-14T14:39:38.000Z |
| msrc_cve-2025-61727 | Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509 | 2025-12-02T00:00:00.000Z | 2026-04-14T14:39:26.000Z |
| msrc_cve-2025-66382 | In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time. | 2025-11-02T00:00:00.000Z | 2026-04-14T14:39:13.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0035 | Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS | 2026-01-22T09:22:36.433609Z | 2026-01-22T09:22:36.433609Z |
| ncsc-2026-0034 | Kwetsbaarheden verholpen in Atlassian producten | 2026-01-22T09:03:42.667958Z | 2026-01-22T09:03:42.667958Z |
| ncsc-2026-0033 | Kwetsbaarheid verholpen in GNU Inetutils telnetd | 2026-01-21T14:15:46.424529Z | 2026-01-21T14:15:46.424529Z |
| ncsc-2026-0032 | Kwetsbaarheden verholpen in Oracle MySQL | 2026-01-21T10:12:24.844869Z | 2026-01-21T10:12:24.844869Z |
| ncsc-2026-0031 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2026-01-21T10:12:00.674214Z | 2026-01-21T10:12:00.674214Z |
| ncsc-2026-0030 | Kwetsbaarheden verholpen in Oracle Java | 2026-01-21T10:11:39.759123Z | 2026-01-21T10:11:39.759123Z |
| ncsc-2026-0029 | Kwetsbaarheden verholpen in Oracle Hyperion | 2026-01-21T10:10:46.297433Z | 2026-01-21T10:10:46.297433Z |
| ncsc-2026-0028 | Kwetsbaarheden verholpen in Oracle Analytics | 2026-01-21T10:10:15.985753Z | 2026-01-21T10:10:15.985753Z |
| ncsc-2026-0027 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2026-01-21T10:08:59.379774Z | 2026-01-21T10:08:59.379774Z |
| ncsc-2026-0026 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2026-01-21T10:06:27.920991Z | 2026-01-21T10:06:27.920991Z |
| ncsc-2026-0025 | Kwetsbaarheden verholpen in Oracle Financial Services | 2026-01-21T09:55:33.889125Z | 2026-01-21T09:55:33.889125Z |
| ncsc-2026-0024 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2026-01-21T09:29:38.334428Z | 2026-01-21T09:29:38.334428Z |
| ncsc-2026-0023 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2026-01-21T09:27:58.715578Z | 2026-01-21T09:27:58.715578Z |
| ncsc-2026-0022 | Kwetsbaarheden verholpen in Oracle Communications producten | 2026-01-21T09:25:39.876330Z | 2026-01-21T09:25:39.876330Z |
| ncsc-2026-0021 | Kwetsbaarheden verholpen in Oracle Database Server producten | 2026-01-21T09:19:00.000449Z | 2026-01-21T09:19:00.000449Z |
| ncsc-2026-0020 | Kwetsbaarheden verholpen in Oracle Commerce | 2026-01-21T09:18:16.268788Z | 2026-01-21T09:18:16.268788Z |
| ncsc-2026-0019 | Kwetsbaarheid verholpen in Fortinet FortiSIEM | 2026-01-16T13:34:34.467426Z | 2026-01-16T13:34:34.467426Z |
| ncsc-2026-0018 | Kwetsbaarheden verholpen in TYPO3 CMS | 2026-01-16T10:11:37.524826Z | 2026-01-16T10:11:37.524826Z |
| ncsc-2026-0017 | Kwetsbaarheden verholpen in Juniper Networks JunOS | 2026-01-16T10:07:39.310560Z | 2026-01-16T10:07:39.310560Z |
| ncsc-2026-0016 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2026-01-16T09:44:20.575860Z | 2026-01-16T09:44:20.575860Z |
| ncsc-2026-0015 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2026-01-15T12:31:57.265723Z | 2026-01-15T12:31:57.265723Z |
| ncsc-2026-0014 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-01-15T12:16:05.427141Z | 2026-01-15T12:16:05.427141Z |
| ncsc-2026-0013 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2026-01-14T13:45:48.530782Z | 2026-01-14T13:45:48.530782Z |
| ncsc-2026-0012 | Kwetsbaarheden verholpen in Adobe Dreamweaver Desktop | 2026-01-14T13:41:56.261778Z | 2026-01-14T13:41:56.261778Z |
| ncsc-2026-0011 | Kwetsbaarheid verholpen in Microsoft Developer Tools | 2026-01-13T19:19:27.690900Z | 2026-01-13T19:19:27.690900Z |
| ncsc-2026-0009 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-01-13T19:17:59.629364Z | 2026-01-13T19:17:59.629364Z |
| ncsc-2026-0008 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-01-13T19:17:18.848673Z | 2026-01-13T19:17:18.848673Z |
| ncsc-2026-0006 | Kwetsbaarheden verholpen in SAP producten | 2026-01-13T14:42:24.621603Z | 2026-01-13T14:42:24.621603Z |
| ncsc-2026-0005 | Kwetsbaarheden verholpen in Siemens producten | 2026-01-13T12:05:57.353070Z | 2026-01-13T12:05:57.353070Z |
| ncsc-2026-0004 | Kwetsbaarheden verholpen in Trend Micro Apex Central | 2026-01-09T11:14:58.910197Z | 2026-01-09T11:14:58.910197Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20446-1 | Security update for gnutls | 2026-03-30T14:36:07Z | 2026-03-30T14:36:07Z |
| opensuse-su-2026:20447-1 | Security update for postgresql16 | 2026-03-30T14:27:44Z | 2026-03-30T14:27:44Z |
| opensuse-su-2026:20444-1 | Security update for tomcat10 | 2026-03-30T08:13:22Z | 2026-03-30T08:13:22Z |
| opensuse-su-2026:10464-1 | python311-pypdf-6.9.2-1.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10463-1 | netty-4.1.132-1.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10462-1 | heroic-games-launcher-2.20.1-4.1 on GA media | 2026-03-30T00:00:00Z | 2026-03-30T00:00:00Z |
| opensuse-su-2026:10461-1 | python311-nltk-3.9.4-1.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10460-1 | gdk-pixbuf-loader-libheif-1.21.2-2.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10459-1 | freerdp2-2.11.7-6.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10458-1 | MozillaFirefox-149.0-1.1 on GA media | 2026-03-29T00:00:00Z | 2026-03-29T00:00:00Z |
| opensuse-su-2026:10457-1 | xen-4.21.1_02-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10456-1 | tailscale-1.96.4-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10455-1 | python311-requests-2.33.0-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10454-1 | python311-cryptography-46.0.6-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10453-1 | libpolkit-agent-1-0-127-3.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10452-1 | libjavamapscript-8.6.1-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10451-1 | libpng16-16-1.6.56-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10450-1 | incus-6.23-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10449-1 | gsl-2.8-5.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10448-1 | bind-9.20.21-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10447-1 | MozillaThunderbird-140.9.0-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:10446-1 | ImageMagick-7.1.2.18-1.1 on GA media | 2026-03-28T00:00:00Z | 2026-03-28T00:00:00Z |
| opensuse-su-2026:20439-1 | Security update for MozillaFirefox | 2026-03-27T12:32:55Z | 2026-03-27T12:32:55Z |
| opensuse-su-2026:20441-1 | Security update for GraphicsMagick | 2026-03-27T12:17:58Z | 2026-03-27T12:17:58Z |
| opensuse-su-2026:20438-1 | Security update for docker-compose | 2026-03-27T10:04:45Z | 2026-03-27T10:04:45Z |
| opensuse-su-2026:10445-1 | traefik2-2.11.42-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:10444-1 | traefik-3.6.12-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:10443-1 | libsuricata8_0_4-8.0.4-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:10442-1 | dovecot24-2.4.3-1.1 on GA media | 2026-03-27T00:00:00Z | 2026-03-27T00:00:00Z |
| opensuse-su-2026:20437-1 | Security update for net-tools | 2026-03-26T15:12:43Z | 2026-03-26T15:12:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3462 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.2 (ROCm) | 2026-02-27T14:55:49+00:00 | 2026-04-17T02:04:47+00:00 |
| rhsa-2026:3461 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.2 (CUDA) | 2026-02-27T14:54:46+00:00 | 2026-04-17T02:04:47+00:00 |
| rhsa-2026:3416 | Red Hat Security Advisory: OpenShift Container Platform 4.17.50 packages and security update | 2026-03-04T09:07:15+00:00 | 2026-04-17T02:04:46+00:00 |
| rhsa-2026:3406 | Red Hat Security Advisory: New container image: rhceph-9.0 | 2026-02-26T07:14:51+00:00 | 2026-04-17T02:04:46+00:00 |
| rhsa-2026:2951 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-02-18T14:15:26+00:00 | 2026-04-17T02:04:46+00:00 |
| rhsa-2026:3391 | Red Hat Security Advisory: OpenShift Container Platform 4.19.25 packages and security update | 2026-03-04T15:54:04+00:00 | 2026-04-17T02:04:45+00:00 |
| rhsa-2026:3337 | Red Hat Security Advisory: podman security update | 2026-02-25T11:48:26+00:00 | 2026-04-17T02:04:45+00:00 |
| rhsa-2026:3336 | Red Hat Security Advisory: podman security update | 2026-02-25T11:30:01+00:00 | 2026-04-17T02:04:44+00:00 |
| rhsa-2026:3193 | Red Hat Security Advisory: golang security update | 2026-02-24T12:01:01+00:00 | 2026-04-17T02:04:44+00:00 |
| rhsa-2026:3192 | Red Hat Security Advisory: golang security update | 2026-02-24T12:06:46+00:00 | 2026-04-17T02:04:44+00:00 |
| rhsa-2026:3188 | Red Hat Security Advisory: grafana security update | 2026-02-24T11:39:36+00:00 | 2026-04-17T02:04:44+00:00 |
| rhsa-2026:3186 | Red Hat Security Advisory: Red Hat build of Cryostat 4.1.1: new RHEL 9 container image security update | 2026-02-26T02:56:36+00:00 | 2026-04-17T02:04:43+00:00 |
| rhsa-2026:3108 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.1.5 | 2026-02-23T17:24:11+00:00 | 2026-04-17T02:04:43+00:00 |
| rhsa-2026:2975 | Red Hat Security Advisory: OpenShift Container Platform 4.18.34 packages and security update | 2026-02-25T14:43:11+00:00 | 2026-04-17T02:04:43+00:00 |
| rhsa-2026:2926 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:44:41+00:00 | 2026-04-17T02:04:42+00:00 |
| rhsa-2026:2925 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:44:08+00:00 | 2026-04-17T02:04:42+00:00 |
| rhsa-2026:2924 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:35:32+00:00 | 2026-04-17T02:04:42+00:00 |
| rhsa-2026:2922 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:26:00+00:00 | 2026-04-17T02:04:41+00:00 |
| rhsa-2026:2920 | Red Hat Security Advisory: grafana security update | 2026-02-18T12:55:46+00:00 | 2026-04-17T02:04:41+00:00 |
| rhsa-2026:2914 | Red Hat Security Advisory: grafana security update | 2026-02-18T11:31:17+00:00 | 2026-04-17T02:04:40+00:00 |
| rhsa-2026:2900 | Red Hat Security Advisory: Network Observability 1.11.0 for OpenShift | 2026-02-18T08:39:41+00:00 | 2026-04-17T02:04:40+00:00 |
| rhsa-2026:2852 | Red Hat Security Advisory: OpenShift Security Profiles Operator bug fix and enhancement update | 2026-02-17T23:04:21+00:00 | 2026-04-17T02:04:40+00:00 |
| rhsa-2026:2762 | Red Hat Security Advisory: Red Hat Quay 3.10.18 | 2026-02-16T17:44:31+00:00 | 2026-04-17T02:04:39+00:00 |
| rhsa-2026:2754 | Red Hat Security Advisory: Red Hat Quay 3.9.18 | 2026-02-16T15:43:51+00:00 | 2026-04-17T02:04:39+00:00 |
| rhsa-2026:2737 | Red Hat Security Advisory: Red Hat Ceph Storage | 2026-02-16T12:56:05+00:00 | 2026-04-17T02:04:39+00:00 |
| rhsa-2026:2711 | Red Hat Security Advisory: Red Hat Ceph Storage 8.1 security and bug fix update | 2026-02-16T10:49:01+00:00 | 2026-04-17T02:04:38+00:00 |
| rhsa-2026:2709 | Red Hat Security Advisory: golang security update | 2026-02-16T10:32:31+00:00 | 2026-04-17T02:04:38+00:00 |
| rhsa-2026:2708 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-16T10:08:41+00:00 | 2026-04-17T02:04:38+00:00 |
| rhsa-2026:2706 | Red Hat Security Advisory: golang security update | 2026-02-16T09:40:31+00:00 | 2026-04-17T02:04:37+00:00 |
| rhsa-2026:2695 | Red Hat Security Advisory: RHOAI 2.25.2 - Red Hat OpenShift AI | 2026-02-12T22:43:13+00:00 | 2026-04-17T02:04:36+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2024-226-01 | Accutech Manager | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-101-05 | Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-04-11T09:46:26.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-05 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-01-10T15:41:57.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-04 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-02 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, and Modicon Controllers M580 and M340 | 2022-08-09T10:58:35.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-222-04 | Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert | 2021-08-10T02:27:39.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-194-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340 | 2021-07-13T08:22:02.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2019-281-02 | Modicon Controllers | 2019-09-26T12:53:28.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2018-081-01 | Embedded FTP Servers for Modicon PAC Controllers | 2018-03-22T03:39:21.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-191-03 | EcoStruxure Foxboro SCADA FoxRTU Station | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-191-02 | EcoStruxureTM Foxboro DCS Core Control Services | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-191-01 | Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-163-05 | SAGE RTU | 2024-06-11T00:00:00.000Z | 2024-07-09T00:00:00.000Z |
| sevd-2024-163-04 | SpaceLogic AS-P and AS-B Automation Servers | 2024-06-11T00:00:00.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2024-163-03 | EVlink Home Smart | 2024-06-11T00:00:00.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2023-101-04 | Easy UPS Online Monitoring Software | 2023-04-11T14:09:13.000Z | 2024-06-11T00:00:00.000Z |
| sevd-2024-100-01 | Easergy Studio | 2024-04-09T00:00:00.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2023-346-01 | Trio™ Licensed and License-free Data Radios | 2023-12-12T00:00:00.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2023-318-03 | Galaxy VS and Galaxy VL | 2023-11-14T08:28:19.000Z | 2024-04-09T00:00:00.000Z |
| sevd-2024-072-01 | Easergy T200 Multiple Vulnerabilities | 2024-03-12T07:02:04.000Z | 2024-03-12T07:02:04.000Z |
| sevd-2024-072-02 | EcoStruxure Power Design - Ecodial | 2024-03-12T05:00:00.000Z | 2024-03-12T05:00:00.000Z |
| sevd-2024-044-03 | EcoStruxure IT Gateway | 2024-02-13T12:21:44.000Z | 2024-02-13T12:21:44.000Z |
| sevd-2024-044-02 | Harmony Relay NFC | 2024-02-13T04:05:07.000Z | 2024-02-13T04:05:07.000Z |
| sevd-2024-009-02 | Easergy Studio | 2024-01-09T14:51:40.000Z | 2024-01-09T14:51:40.000Z |
| sevd-2023-101-01 | CODESYS Runtime Vulnerabilities | 2023-04-11T13:31:49.000Z | 2024-01-09T13:31:00.000Z |
| sevd-2023-101-03 | EcoStruxure™ Control Expert | 2023-04-11T10:14:15.000Z | 2024-01-09T10:14:00.000Z |
| sevd-2019-225-01 | Harmony (formerly known as Magelis) HMI Panels | 2019-08-13T09:59:02.000Z | 2024-01-09T09:59:02.000Z |
| sevd-2023-346-03 | Easy UPS Online Monitoring Software | 2023-12-12T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| sevd-2023-346-02 | ProLeiT Plant iT/Brewmaxx | 2023-12-12T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-522291 | SSA-522291: Improper Certificate Validation Vulnerability in Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-514895 | SSA-514895: Multiple Vulnerabilities in Altair Grid Engine V2025.1.0 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-365596 | SSA-365596: DLL Hijacking Vulnerability in Siemens Software Center and Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-339694 | SSA-339694: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-322980 | SSA-322980: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2023-04-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-267056 | SSA-267056: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-225578 | SSA-225578: Improper Access Control Vulnerability in SICAM GridEdge Before V2.7.3 | 2022-07-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-201498 | SSA-201498: Multiple Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices Before V3.11 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-194557 | SSA-194557: Improper Limitation of Filesystem Access through Web Server Vulnerability in SIPROTEC 5 | 2025-01-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-876787 | SSA-876787: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-722410 | SSA-722410: Multiple Vulnerabilities in User Management Component (UMC) | 2025-09-09T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-625789 | SSA-625789: Multiple Vulnerabilities in SIMATIC S7-1200 CPU V1/V2 Devices | 2011-06-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-614723 | SSA-614723: Denial of Service Vulnerabilities in User Management Component (UMC) | 2025-05-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-541582 | SSA-541582: Multiple File Parsing Vulnerabilities in Solid Edge | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-486936 | SSA-486936: Authentication Vulnerability in SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-373591 | SSA-373591: Buffer Overflow Vulnerability in RUGGEDCOM ROS Devices | 2021-07-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-367714 | SSA-367714: Improper Integrity Check of Firmware Updates in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-05-23T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-318832 | SSA-318832: SQL Injection Vulnerability in SINEC NMS | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-279823 | SSA-279823: Cross-Site Scripting Vulnerability in SIMATIC S7-1200 CPU V2/V3 Before V3.0.2 | 2012-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-240718 | SSA-240718: Insecure Storage of HTTPS CA Certificate in SIMATIC S7-1200 CPU V2 | 2012-09-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-083019 | SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices | 2025-07-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-062309 | SSA-062309: Information Disclosure Vulnerability in TeleControl Server Basic V3.1 | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-054046 | SSA-054046: Unauthenticated Information Disclosure in Web Server of SIMATIC S7-1500 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-039007 | SSA-039007: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-09-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-916339 | SSA-916339: Information Disclosure Vulnerability in Apogee PXC and Talon TC Devices | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-691715 | SSA-691715: Vulnerability in OPC Foundation Local Discovery Server Affecting Siemens Products | 2023-04-11T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-640476 | SSA-640476: Denial of Service Vulnerability in Industrial Edge Management | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-563922 | SSA-563922: Local Privilege Escalation Vulnerability in SIMOTION Tools | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21023-1 | Security update for cockpit-podman | 2026-04-10T11:54:16Z | 2026-04-10T11:54:16Z |
| suse-su-2026:21024-1 | Security update for cockpit-machines | 2026-04-10T11:53:13Z | 2026-04-10T11:53:13Z |
| suse-su-2026:21022-1 | Security update for cockpit | 2026-04-10T11:42:11Z | 2026-04-10T11:42:11Z |
| suse-su-2026:1252-1 | Security update for tigervnc | 2026-04-10T11:36:58Z | 2026-04-10T11:36:58Z |
| suse-su-2026:1251-1 | Security update for cockpit-podman | 2026-04-10T11:36:50Z | 2026-04-10T11:36:50Z |
| suse-su-2026:1250-1 | Security update for cockpit-tukit | 2026-04-10T11:36:40Z | 2026-04-10T11:36:40Z |
| suse-su-2026:1249-1 | Security update for cockpit-machines | 2026-04-10T11:36:32Z | 2026-04-10T11:36:32Z |
| suse-su-2026:21021-1 | Security update for python-cryptography | 2026-04-10T11:26:32Z | 2026-04-10T11:26:32Z |
| suse-su-2026:1247-1 | Security update for nghttp2 | 2026-04-10T10:34:43Z | 2026-04-10T10:34:43Z |
| suse-su-2026:1248-1 | Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T09:13:03Z | 2026-04-10T09:13:03Z |
| suse-su-2026:21020-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-10T08:14:40Z | 2026-04-10T08:14:40Z |
| suse-su-2026:1244-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 2026-04-10T08:04:54Z | 2026-04-10T08:04:54Z |
| suse-su-2026:1242-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2026-04-10T07:04:48Z | 2026-04-10T07:04:48Z |
| suse-su-2026:21019-1 | Security update for glibc | 2026-04-10T06:44:31Z | 2026-04-10T06:44:31Z |
| suse-su-2026:1239-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T19:04:33Z | 2026-04-09T19:04:33Z |
| suse-su-2026:1237-1 | Security update for the Linux Kernel (Live Patch 47 for SUSE Linux Enterprise 15 SP4) | 2026-04-09T17:04:59Z | 2026-04-09T17:04:59Z |
| suse-su-2026:21018-1 | Security update for ovmf | 2026-04-09T15:10:40Z | 2026-04-09T15:10:40Z |
| suse-su-2026:1236-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T14:22:32Z | 2026-04-09T14:22:32Z |
| suse-su-2026:21091-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21090-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21061-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21060-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:21Z | 2026-04-09T13:21:21Z |
| suse-su-2026:21089-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21088-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21059-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21058-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:21:12Z | 2026-04-09T13:21:12Z |
| suse-su-2026:21087-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21086-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21057-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| suse-su-2026:21056-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:57Z | 2026-04-09T13:20:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:4463 | Moderate: python3.12 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:03:59Z |
| alsa-2026:4443 | Important: .NET 9.0 security update | 2026-03-12T00:00:00Z | 2026-03-13T09:01:07Z |
| alsa-2026:4442 | Moderate: vim security update | 2026-03-12T00:00:00Z | 2026-03-12T14:47:41Z |
| alsa-2026:4174 | Important: opentelemetry-collector security update | 2026-03-10T00:00:00Z | 2026-03-11T17:46:34Z |
| alsa-2026:4235 | Moderate: nginx:1.26 security update | 2026-03-10T00:00:00Z | 2026-03-11T11:13:12Z |
| alsa-2026:3966 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-11T10:10:37Z |
| alsa-2026:3730 | Important: postgresql security update | 2026-03-04T00:00:00Z | 2026-03-11T10:01:08Z |
| alsa-2026:3752 | Important: osbuild-composer security update | 2026-03-04T00:00:00Z | 2026-03-11T09:57:01Z |
| alsa-2026:3898 | Important: osbuild-composer security update | 2026-03-05T00:00:00Z | 2026-03-11T09:54:32Z |
| alsa-2026:4024 | Important: postgresql:13 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:52:09Z |
| alsa-2026:4059 | Important: postgresql:15 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:49:31Z |
| alsa-2026:4063 | Important: postgresql:16 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:46:43Z |
| alsa-2026:4162 | Moderate: mysql8.4 security update | 2026-03-10T00:00:00Z | 2026-03-11T09:43:31Z |
| alsa-2026:3939 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-11T09:35:33Z |
| alsa-2026:4164 | Important: git-lfs security update | 2026-03-10T00:00:00Z | 2026-03-11T09:33:00Z |
| alsa-2026:4064 | Important: postgresql:12 security update | 2026-03-09T00:00:00Z | 2026-03-11T09:29:57Z |
| alsa-2026:3040 | Important: grafana-pcp security update | 2026-02-23T00:00:00Z | 2026-03-10T20:11:50Z |
| alsa-2026:4165 | Moderate: python3.12 security update | 2026-03-10T00:00:00Z | 2026-03-10T20:09:00Z |
| alsa-2026:4173 | Important: gimp security update | 2026-03-10T00:00:00Z | 2026-03-10T19:59:39Z |
| alsa-2026:4110 | Important: postgresql:16 security update | 2026-03-09T00:00:00Z | 2026-03-10T19:55:53Z |
| alsa-2026:3896 | Important: postgresql:15 security update | 2026-03-05T00:00:00Z | 2026-03-10T19:52:06Z |
| alsa-2026:3753 | Important: osbuild-composer security update | 2026-03-04T00:00:00Z | 2026-03-10T19:47:08Z |
| alsa-2026:4146 | Important: python-pyasn1 security update | 2026-03-10T00:00:00Z | 2026-03-10T08:51:50Z |
| alsa-2026:3964 | Moderate: kernel-rt security update | 2026-03-09T00:00:00Z | 2026-03-10T02:07:14Z |
| alsa-2026:3963 | Moderate: kernel security update | 2026-03-09T00:00:00Z | 2026-03-10T02:04:41Z |
| alsa-2026:3938 | Moderate: nfs-utils security update | 2026-03-05T00:00:00Z | 2026-03-10T01:58:47Z |
| alsa-2026:3967 | Important: libvpx security update | 2026-03-09T00:00:00Z | 2026-03-10T01:53:59Z |
| alsa-2026:3887 | Important: postgresql16 security update | 2026-03-05T00:00:00Z | 2026-03-06T13:21:51Z |
| alsa-2026:3864 | Important: delve security update | 2026-03-05T00:00:00Z | 2026-03-06T13:19:09Z |
| alsa-2026:3928 | Important: git-lfs security update | 2026-03-05T00:00:00Z | 2026-03-06T13:16:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-677 | Segv on unknown address in gs_gc_reclaim | 2024-07-25T00:06:43.762625Z | 2026-03-18T14:32:20.684770Z |
| osv-2025-202 | UNKNOWN READ in _blit_xrgb32_lerp_spans | 2025-03-15T00:01:51.127135Z | 2026-03-18T14:26:56.370221Z |
| osv-2023-34 | Heap-use-after-free in gc_trace | 2023-01-29T13:00:17.773387Z | 2026-03-18T14:25:32.218330Z |
| osv-2022-73 | Heap-use-after-free in pdfi_cspace_free_callback | 2022-01-22T00:00:41.413569Z | 2026-03-18T14:24:03.137574Z |
| osv-2022-524 | Heap-buffer-overflow in Ins_JROF | 2022-07-01T00:01:43.353257Z | 2026-03-18T14:22:41.236746Z |
| osv-2026-417 | Segv on unknown address in arrow::Array::IsNull | 2026-03-18T00:18:35.139866Z | 2026-03-18T00:18:35.140154Z |
| osv-2023-1307 | UNKNOWN READ in init_struct_ops_maps | 2023-12-15T00:12:51.528155Z | 2026-03-17T14:24:53.158428Z |
| osv-2023-1267 | Heap-buffer-overflow in dwg_free_object | 2023-12-08T00:11:02.971903Z | 2026-03-16T14:18:18.473266Z |
| osv-2026-350 | UNKNOWN READ in bfd_getl32 | 2026-03-04T00:14:56.651284Z | 2026-03-14T18:43:19.427139Z |
| osv-2022-1235 | Heap-buffer-overflow in _rrparse | 2022-12-04T13:00:30.303410Z | 2026-03-13T14:16:08.108628Z |
| osv-2024-914 | UNKNOWN READ in boost::re_detail_500::basic_regex_formatter<std::__1::ostream_iterator<char, cha | 2024-08-16T00:08:20.277708Z | 2026-03-11T14:30:35.738187Z |
| osv-2024-398 | Use-of-uninitialized-value in wabt::BinaryReaderObjdump::PrintInitExpr | 2024-05-01T00:11:38.602555Z | 2026-03-11T14:28:35.396657Z |
| osv-2024-112 | Stack-overflow in boost::read_graphviz_detail::parser::parse_subgraph | 2024-02-16T00:05:47.896843Z | 2026-03-11T14:26:22.626694Z |
| osv-2023-346 | UNKNOWN WRITE in void std::__1::allocator_traits<std::__1::allocator<wabt::interp::HandlerDesc> > | 2023-04-27T14:02:25.286668Z | 2026-03-11T14:24:45.211720Z |
| osv-2022-916 | Container-overflow in wabt::interp::BinaryReaderInterp::BeginFunctionBody | 2022-09-20T00:00:42.122902Z | 2026-03-11T14:23:47.282795Z |
| osv-2022-1263 | Null-dereference READ | 2022-12-20T13:01:53.219707Z | 2026-03-11T14:20:54.166339Z |
| osv-2026-371 | Heap-buffer-overflow in tinyobj::tryParseDouble | 2026-03-09T00:09:41.689616Z | 2026-03-09T00:09:41.689926Z |
| osv-2024-838 | Bad-cast to RDKit::AtomRDKit::ROMol::initFromOther | 2024-08-16T00:03:32.029853Z | 2026-03-07T14:34:10.603763Z |
| osv-2026-359 | Segv on unknown address in gpsd_vlog | 2026-03-07T00:03:40.062221Z | 2026-03-07T00:03:40.062505Z |
| osv-2025-62 | UNKNOWN READ in RDKit::Dict::reset | 2025-01-27T00:01:51.692636Z | 2026-03-06T14:31:24.229549Z |
| osv-2025-266 | Heap-buffer-overflow in lj_buf_ruleb128 | 2025-04-08T00:17:06.279554Z | 2026-03-05T14:36:27.176471Z |
| osv-2022-94 | Heap-buffer-overflow in cli_strlcat | 2022-01-27T00:02:12.465969Z | 2026-03-05T14:29:46.831320Z |
| osv-2022-636 | UNKNOWN READ in fp_cmp_mag | 2022-07-27T00:00:35.300337Z | 2026-03-05T14:28:12.890689Z |
| osv-2022-1068 | UNKNOWN READ in fp_cmp_mag | 2022-10-21T00:00:11.246872Z | 2026-03-05T14:25:24.236211Z |
| osv-2026-341 | Security exception in com.code_intelligence.jazzer.sanitizers.RegexInjection.hookInternal | 2026-03-03T00:17:38.109294Z | 2026-03-03T00:17:38.109635Z |
| osv-2026-338 | Use-of-uninitialized-value in pjsip_auth_clt_init_req | 2026-03-03T00:09:55.520965Z | 2026-03-03T00:09:55.521245Z |
| osv-2024-340 | Heap-buffer-overflow in Exiv2::AsfVideo::GUIDTag::GUIDTag | 2024-04-30T00:01:53.406015Z | 2026-03-01T14:15:15.992512Z |
| osv-2025-253 | Security exception in org.apache.lucene.analysis.ckb.SoraniNormalizer.normalize | 2025-04-03T00:17:24.000398Z | 2026-02-26T15:05:21.477837Z |
| osv-2022-867 | Heap-buffer-overflow in get_utf_8_string | 2022-09-09T00:01:54.157712Z | 2026-02-26T15:03:06.284832Z |
| osv-2024-1254 | Security exception in org.apache.lucene.util.ArrayUtil.growExact | 2024-11-01T00:07:39.301298Z | 2026-02-26T14:30:06.734190Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0042 | CRL Distribution Point Scope Check Logic Error in AWS-LC | 2026-03-19T12:00:00Z | 2026-03-20T17:11:58Z |
| rustsec-2023-0103 | `postgress` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0102 | `serd` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0101 | `oncecell` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0100 | `xrvrv` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0099 | `envlogger` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0098 | `if-cfg` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2023-0097 | `lazystatic` was removed from crates.io for malicious code | 2023-08-16T12:00:00Z | 2026-03-19T22:15:12Z |
| rustsec-2026-0040 | `tracing-ethers` was removed from crates.io due to malicious code | 2026-03-14T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0039 | `chrono_anchor` was removed from crates.io due to malicious code | 2026-03-10T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0036 | `time-sync` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0032 | `dnp3times` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0031 | `time_calibrators` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0030 | `time_calibrator` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0028 | `tracing_checks` was removed from crates.io for transitively including malicious code | 2026-02-26T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0027 | `tracings` was removed from crates.io for malicious code | 2026-02-26T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0019 | `tracing-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0018 | `rpc-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0017 | `clob-sdk` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0016 | `polymarkets-rs-clob-client` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0015 | `polymarkets-client-sdk` was removed from crates.io for malicious code | 2026-02-19T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0014 | `rpc-check` was removed from crates.io for malicious code | 2026-02-19T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0011 | `polymarket-client-sdks` was removed from crates.io for malicious code | 2026-02-13T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0010 | `polymarket-clients-sdk` was removed from crates.io for malicious code | 2026-02-06T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0152 | `finch_cli_rust` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0151 | `sha-rst` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0150 | `finch-rst` was removed from crates.io for malicious code | 2025-12-09T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0148 | `finch-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0147 | `evm-units` was removed from crates.io for malicious code | 2025-12-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2025-0146 | `sha-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-03-17T22:31:38Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tomcat-2026-24734 | Apache Tomcat Native, Apache Tomcat: OCSP revocation bypass | 2026-02-20T09:53:00.269Z | 2026-04-13T06:11:47.324Z |
| bit-node-2026-21717 | 2026-04-06T07:58:47.295Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21716 | 2026-04-06T07:58:44.008Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21715 | 2026-04-06T07:58:41.424Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21714 | 2026-04-06T07:58:38.953Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21713 | 2026-04-06T07:58:36.353Z | 2026-04-13T06:11:47.324Z | |
| bit-node-2026-21710 | 2026-04-06T07:58:28.068Z | 2026-04-13T06:11:47.324Z | |
| bit-logstash-2026-33466 | Improper Limitation of a Pathname to a Restricted Directory in Logstash Leading to Arbitrary File Write | 2026-04-13T05:42:10.653Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-4498 | Execution with Unnecessary Privileges in Kibana Leading to reading index data beyond their direct Elasticsearch RBAC scope | 2026-04-13T05:42:05.042Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33461 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:42:03.441Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33460 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:42:01.870Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33459 | Uncontrolled Resource Consumption in Kibana Leading to Denial of Service | 2026-04-13T05:42:00.230Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35206 | Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment | 2026-04-13T05:40:36.770Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35205 | Helm's plugin verification fails open when .prov is missing, allowing unsigned plugin install | 2026-04-13T05:40:35.063Z | 2026-04-13T06:11:47.324Z |
| bit-helm-2026-35204 | Helm has a path traversal in plugin metadata version enables arbitrary file write outside Helm plugin directory | 2026-04-13T05:40:33.104Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32280 | Unexpected work during chain building in crypto/x509 | 2026-04-13T05:43:38.849Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-4916 | Missing Authorization in GitLab | 2026-04-13T06:10:14.681Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-4332 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-04-13T06:10:11.039Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-2619 | Incorrect Authorization in GitLab | 2026-04-13T06:09:54.420Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-2104 | Authorization Bypass Through User-Controlled Key in GitLab | 2026-04-13T06:09:50.678Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-1516 | Improper Control of Generation of Code ('Code Injection') in GitLab | 2026-04-13T06:09:35.915Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-1101 | Improper Validation of Specified Quantity in Input in GitLab | 2026-04-13T06:09:20.803Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2025-9484 | Missing Authorization in GitLab | 2026-04-13T06:08:58.190Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2025-12664 | Improper Validation of Specified Quantity in Input in GitLab | 2026-04-13T06:05:51.788Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-4498 | Execution with Unnecessary Privileges in Kibana Leading to reading index data beyond their direct Elasticsearch RBAC scope | 2026-04-13T05:38:40.214Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33461 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:38:38.805Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33460 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:38:37.022Z | 2026-04-13T06:11:47.324Z |
| bit-elk-2026-33459 | Uncontrolled Resource Consumption in Kibana Leading to Denial of Service | 2026-04-13T05:38:35.203Z | 2026-04-13T06:11:47.324Z |
| bit-airflow-2026-34538 | Apache Airflow: Authorization bypass in DagRun wait endpoint (XCom exposure) | 2026-04-13T05:38:18.100Z | 2026-04-13T06:11:47.324Z |
| bit-airflow-2025-57735 | Apache Airflow: Airflow Logout Not Invalidating JWT | 2026-04-13T05:37:57.108Z | 2026-04-13T06:11:47.324Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-li54613 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:45:58.881296Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-dm62512 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.35.0-r0 | 2026-04-06T02:48:21.440386Z | 2026-04-03T06:57:54Z |
| cleanstart-2026-lc01167 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-p77j-4mvh-x3m3 applied in versions: 8.4.0-r0, 8.4.0-r1, 8.4.0-r2 | 2026-04-06T02:48:42.431061Z | 2026-04-03T06:52:41Z |
| cleanstart-2026-gm09342 | Security fixes for CVE-2025-68121, CVE-2026-26958, ghsa-fw7p-63qq-7hpr, ghsa-mqqf-5wvp-8fh8 applied in versions: 0.29.0-r0, 0.29.0-r1 | 2026-04-06T02:48:25.848581Z | 2026-04-03T06:51:44Z |
| cleanstart-2026-hl08143 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:48:38.996528Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-gn22652 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-06T02:48:55.605608Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-dm25112 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:48:32.316783Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-ny32236 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:49:48.749661Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-io43826 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:49:47.698715Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-an95970 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T02:49:57.502118Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-ag21538 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:50:01.578746Z | 2026-04-02T04:45:04Z |
| cleanstart-2026-ip72442 | Security fixes for CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-06T02:52:00.185166Z | 2026-04-01T14:41:16Z |
| cleanstart-2026-nb78893 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-64715, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, CVE-2026-33726 applied in versions: 0.13.3-r0, 0.13.3-r1 | 2026-04-06T02:52:24.792809Z | 2026-04-01T13:08:16Z |
| cleanstart-2026-mq18886 | Security fixes for CVE-2026-22735, CVE-2026-22737 applied in versions: 6.2.3-r0 | 2026-04-06T02:52:03.544300Z | 2026-04-01T11:39:45Z |
| cleanstart-2026-ly39171 | Security fixes for CVE-2026-33186 applied in versions: 3.1.4-r0 | 2026-04-06T02:51:58.911697Z | 2026-04-01T11:39:45Z |
| cleanstart-2026-kc06018 | Security fixes for CVE-2017-12158, CVE-2017-12159, ghsa-3p8m-j85q-pgmj, ghsa-45p5-v273-3qqr, ghsa-4cx2-fc23-5wg6, ghsa-5rfx-cp42-p624, ghsa-72hv-8253-57qq, ghsa-84h7-rjj3-6jx4, ghsa-9342-92gg-6v29, ghsa-cbdj-484d-3x9q, ghsa-fghv-69vj-qj49, ghsa-h5fg-jpgr-rv9c, ghsa-hq9p-pm7w-8p54, ghsa-j288-q9x7-2f5v, ghsa-pwqr-wmgm-9rr8, ghsa-w9fj-cfpg-grvv applied in versions: 26.1.4-r1, 26.5.0-r0, 26.5.0-r1, 26.5.0-r2, 26.5.6-r3 | 2026-04-06T02:52:37.677608Z | 2026-04-01T11:37:49Z |
| cleanstart-2026-po55014 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:53:00.589014Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-mu54962 | Security fixes for ghsa-527x-5wrf-22m2, ghsa-g754-hx8w-x2g6, ghsa-jgfp-53c3-624w, ghsa-px8v-pp82-rcvr, ghsa-vv39-3w5q-974q applied in versions: 1.25.0-r0, 1.26.7-r0 | 2026-04-06T02:54:48.662994Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-hj96712 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-06T02:53:02.079256Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-bl95928 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:52:47.736498Z | 2026-04-01T11:32:34Z |
| cleanstart-2026-eb74978 | Security fixes for CVE-2020-8912, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-01T09:05:49.917651Z | 2026-03-31T15:18:53Z |
| cleanstart-2026-bk28579 | Security fixes for CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1 | 2026-04-01T09:05:31.827204Z | 2026-03-31T15:16:59Z |
| cleanstart-2026-is43446 | Security fixes for ghsa-25qh-j22f-pwp8, ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4g8c-wm8x-jfhw, ghsa-5jpm-x58v-624v, ghsa-72hv-8253-57qq, ghsa-84h7-rjj3-6jx4, ghsa-fghv-69vj-qj49, ghsa-jq43-27x9-3v86, ghsa-pwqr-wmgm-9rr8, ghsa-qqpg-mvqg-649v, ghsa-w9fj-cfpg-grvv, ghsa-xq3w-v528-46rv applied in versions: 0.1.109-r0, 0.1.109-r1, 0.1.111-r2 | 2026-04-01T09:05:58.458627Z | 2026-03-31T07:55:31Z |
| cleanstart-2026-ch77232 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 18.7.1-r0 | 2026-04-01T09:06:04.906254Z | 2026-03-31T07:29:33Z |
| cleanstart-2026-is74202 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:09:55.185988Z | 2026-03-31T04:38:08Z |
| cleanstart-2026-ls30652 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-33186, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.11-r0, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0, 3.7.9-r1, 3.7.9-r2, 4.0.2-r0 | 2026-04-01T09:07:01.631355Z | 2026-03-30T12:04:05Z |
| cleanstart-2026-hk71313 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw applied in versions: 0.12.0-r0, 0.12.0-r1, 0.12.0-r2 | 2026-04-01T09:06:39.410428Z | 2026-03-30T06:53:15Z |
| cleanstart-2026-li04631 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.79.0-r0, 1.79.0-r2, 1.79.0-r3 | 2026-04-01T09:08:44.082129Z | 2026-03-28T10:16:19Z |
| cleanstart-2026-bk44511 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.78.0-r0, 1.78.0-r2, 1.78.0-r3 | 2026-04-01T09:08:47.105116Z | 2026-03-28T10:16:01Z |
| cleanstart-2026-ld15132 | Security fixes for CVE-2020-8912, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-6g7g-w4f8-9c9x, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 0.142.0-r0, 0.144.0-r0, 0.144.0-r1, 0.144.0-r2, 0.144.0-r3 | 2026-04-01T09:09:25.500286Z | 2026-03-28T10:14:28Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2023-ale-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-010 | Multiples vulnérabilités dans GLPI | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-009 | [MaJ] Vulnérabilité dans Zimbra Collaboration | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-008 | [MaJ] Multiples vulnérabilités dans Microsoft Exchange | 2022-09-30T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-007 | Multiples vulnérabilités dans Microsoft Windows | 2022-09-16T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2023-ALE-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2023-ALE-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-010 | Multiples vulnérabilités dans GLPI | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-009 | [MaJ] Vulnérabilité dans Zimbra Collaboration | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-008 | [MaJ] Multiples vulnérabilités dans Microsoft Exchange | 2022-09-30T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| CERTFR-2022-ALE-007 | Multiples vulnérabilités dans Microsoft Windows | 2022-09-16T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-012 | [MàJ] Vulnérabilité dans FortiOS SSL-VPN | 2022-12-13T00:00:00.000000 | 2022-12-20T00:00:00.000000 |
| CERTFR-2022-ALE-012 | [MàJ] Vulnérabilité dans FortiOS SSL-VPN | 2022-12-13T00:00:00.000000 | 2022-12-20T00:00:00.000000 |
| certfr-2022-ale-011 | Vulnérabilité dans les produits Fortinet | 2022-10-14T00:00:00.000000 | 2022-10-14T00:00:00.000000 |
| CERTFR-2022-ALE-011 | Vulnérabilité dans les produits Fortinet | 2022-10-14T00:00:00.000000 | 2022-10-14T00:00:00.000000 |
| certfr-2022-ale-006 | [MàJ] Vulnérabilité dans Atlassian Confluence | 2022-06-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-ale-002 | Vulnérabilité dans VMware Spring Cloud Gateway | 2022-03-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| CERTFR-2022-ALE-006 | [MàJ] Vulnérabilité dans Atlassian Confluence | 2022-06-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| CERTFR-2022-ALE-002 | Vulnérabilité dans VMware Spring Cloud Gateway | 2022-03-03T00:00:00.000000 | 2022-10-07T00:00:00.000000 |
| certfr-2022-ale-005 | [MàJ] Vulnérabilité dans Microsoft Windows | 2022-05-31T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| certfr-2022-ale-004 | Vulnérabilité dans F5 BIG-IP | 2022-05-11T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| CERTFR-2022-ALE-005 | [MàJ] Vulnérabilité dans Microsoft Windows | 2022-05-31T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| CERTFR-2022-ALE-004 | Vulnérabilité dans F5 BIG-IP | 2022-05-11T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| certfr-2022-ale-003 | [MàJ] Vulnérabilité dans l'implémentation du protocole RPC par Microsoft | 2022-04-13T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2022-ale-001 | [MaJ] Vulnérabilité dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-022 | [MaJ] Vulnérabilité dans Apache Log4j | 2021-12-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0300 | Multiples vulnérabilités dans Mattermost Server | 2026-03-17T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-03-27T00:00:00.000000 |
| certfr-2026-avi-0362 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0361 | Multiples vulnérabilités dans Cisco IOS et IOS XE | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0360 | Multiples vulnérabilités dans ISC BIND | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0359 | Multiples vulnérabilités dans Grafana | 2026-03-26T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0201 | Multiples vulnérabilités dans Mattermost Server | 2026-02-24T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0358 | Vulnérabilité dans Citrix XenServer | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0357 | Multiples vulnérabilités dans GitLab | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0356 | Vulnérabilité dans ISC Kea | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0355 | Multiples vulnérabilités dans les produits Apple | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0354 | Multiples vulnérabilités dans les produits Mozilla | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0353 | Multiples vulnérabilités dans Zabbix | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0352 | Multiples vulnérabilités dans les produits F5 | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0351 | Vulnérabilité dans Tenable OT Platform | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0350 | Multiples vulnérabilités dans Squid | 2026-03-25T00:00:00.000000 | 2026-03-25T00:00:00.000000 |
| certfr-2026-avi-0349 | Multiples vulnérabilités dans Ruby on Rails | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0348 | Vulnérabilité dans Trend Micro Deep Discovery Inspector | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0347 | Vulnérabilité dans Xen | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0346 | Vulnérabilité dans VMware Tanzu pour Postgres | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0345 | Vulnérabilité dans LibreNMS | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0344 | Vulnérabilité dans strongSwan | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0343 | Vulnérabilité dans Spring Cloud Config | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0342 | Multiples vulnérabilités dans Google Chrome | 2026-03-24T00:00:00.000000 | 2026-03-24T00:00:00.000000 |
| certfr-2026-avi-0341 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0340 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0339 | Multiples vulnérabilités dans les produits VMware | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0338 | Vulnérabilité dans les produits Synology | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0337 | Multiples vulnérabilités dans les produits Citrix | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0336 | Multiples vulnérabilités dans les produits Qnap | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-022878 | Media Player MP-01 vulnerable to Missing Authentication for Critical Function | 2025-12-24T11:10+09:00 | 2026-01-15T11:10+09:00 |
| jvndb-2026-000006 | Chainlit vulnerable to improper access restriction | 2026-01-14T17:03+09:00 | 2026-01-14T17:03+09:00 |
| jvndb-2026-000002 | Multiple vulnerabilities in multiple NEC branded projectors manufactured by Sharp Display Solutions, Ltd. | 2026-01-07T14:10+09:00 | 2026-01-14T16:54+09:00 |
| jvndb-2026-000005 | Multiple vulnerabilities in EATON UPS Companion | 2026-01-13T19:01+09:00 | 2026-01-13T19:01+09:00 |
| jvndb-2026-000003 | RICOH Streamline NX vulnerable to improper authorization | 2026-01-09T18:17+09:00 | 2026-01-09T18:17+09:00 |
| jvndb-2026-000004 | The installers for multiple PIONEER products may insecurely load Dynamic Link Libraries | 2026-01-08T13:47+09:00 | 2026-01-08T13:47+09:00 |
| jvndb-2026-000001 | Origin validation error vulnerability in Fujitsu Security Solution AuthConductor Client Basic V2 | 2026-01-07T14:19+09:00 | 2026-01-07T14:19+09:00 |
| jvndb-2026-001001 | Authentication bypass vulnerability in OpenBlocks series | 2026-01-07T10:46+09:00 | 2026-01-07T10:46+09:00 |
| jvndb-2025-019621 | EPSON WebConfig / Epson Web Control for SEIKO EPSON Projector Products do not restrict excessive authentication attempts | 2025-11-21T15:31+09:00 | 2025-12-24T10:54+09:00 |
| jvndb-2025-014967 | Multiple vulnerabilities in multiple Keyence products | 2025-10-03T11:19+09:00 | 2025-12-23T14:36+09:00 |
| jvndb-2025-000117 | SEIKO EPSON printer Web Config vulnerable to stack-based buffer overflow | 2025-12-16T15:31+09:00 | 2025-12-23T11:57+09:00 |
| jvndb-2025-022400 | Ruijie Networks AP180 Series vulnerable to OS command injection | 2025-12-19T12:33+09:00 | 2025-12-19T12:33+09:00 |
| jvndb-2025-000118 | GROWI vulnerable to cross-site request forgery | 2025-12-17T13:04+09:00 | 2025-12-17T13:04+09:00 |
| jvndb-2025-022062 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-12-17T11:28+09:00 | 2025-12-17T11:28+09:00 |
| jvndb-2025-000115 | QND vulnerable to privilege escalation | 2025-12-11T14:33+09:00 | 2025-12-11T14:33+09:00 |
| jvndb-2025-000113 | Multiple vulnerabilities in GroupSession | 2025-12-08T17:48+09:00 | 2025-12-11T11:30+09:00 |
| jvndb-2025-000091 | Multiple I-O DATA NAS management applications register Windows services with unquoted file paths | 2025-10-22T15:04+09:00 | 2025-12-10T16:20+09:00 |
| jvndb-2021-000081 | Multiple vulnerabilities in Sharp NEC Display Solutions' public displays | 2021-09-17T15:13+09:00 | 2025-12-10T10:24+09:00 |
| jvndb-2025-021305 | Android App "Brother iPrint&Scan" improper use of an external cache directory | 2025-12-09T17:25+09:00 | 2025-12-09T17:25+09:00 |
| jvndb-2025-000114 | ELECOM Clone for Windows registers a Windows service with an unquoted file path | 2025-12-09T17:16+09:00 | 2025-12-09T17:16+09:00 |
| jvndb-2025-000116 | GS Yuasa FULLBACK Manager Pro registers Windows services with unquoted file paths | 2025-12-08T14:06+09:00 | 2025-12-08T14:06+09:00 |
| jvndb-2025-000094 | Multiple vulnerabilities in ABB Terra AC Wallbox | 2025-12-05T14:12+09:00 | 2025-12-05T14:12+09:00 |
| jvndb-2025-000112 | Installer of INZONE Hub may insecurely load Dynamic Link Libraries | 2025-11-28T13:36+09:00 | 2025-11-28T13:36+09:00 |
| jvndb-2025-000111 | SwitchBot Smart Video Doorbell vulnerable to active debug code | 2025-11-26T14:35+09:00 | 2025-11-26T14:35+09:00 |
| jvndb-2025-000110 | Multiple vulnerabilities in Security Point (Windows) of MaLion | 2025-11-25T17:17+09:00 | 2025-11-25T17:17+09:00 |
| jvndb-2025-000109 | Multiple vulnerabilities in SNC-CX600W | 2025-11-25T14:59+09:00 | 2025-11-25T14:59+09:00 |
| jvndb-2025-000108 | "FOD" App uses hard-coded cryptographic keys | 2025-11-25T14:15+09:00 | 2025-11-25T14:15+09:00 |
| jvndb-2025-000106 | Multiple vulnerabilities in LogStare Collector | 2025-11-21T16:27+09:00 | 2025-11-21T16:27+09:00 |
| jvndb-2025-000107 | Installer of RakurakuMusen Start EX for Windows may insecurely load Dynamic Link Libraries | 2025-11-19T16:22+09:00 | 2025-11-19T16:22+09:00 |
| jvndb-2025-000097 | "Dejira" App for iOS vulnerable to improper server certificate verification | 2025-11-17T14:09+09:00 | 2025-11-17T14:09+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15411 | Google Chrome安全绕过漏洞(CNVD-2026-15411) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15410 | Google Chrome安全绕过漏洞(CNVD-2026-15410) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15409 | Google Chrome安全绕过漏洞(CNVD-2026-15409) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15408 | Google Chrome安全绕过漏洞(CNVD-2026-15408) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15407 | Google Chrome存在未明漏洞(CNVD-2026-15407) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15406 | Google Chrome堆缓冲区溢出漏洞(CNVD-2026-15406) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15405 | Google Chrome整数溢出漏洞(CNVD-2026-15405) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15404 | Google Chrome内存错误引用漏洞(CNVD-2026-15404) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15403 | Google Chrome堆缓冲区溢出漏洞(CNVD-2026-15403) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15402 | Google Chrome越界读取漏洞(CNVD-2026-15402) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15401 | Google Chrome越界读取漏洞(CNVD-2026-15401) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15400 | Google Chrome FedCM内存错误引用漏洞 | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15399 | Google Chrome安全绕过漏洞(CNVD-2026-15399) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15398 | Google Chrome安全绕过漏洞(CNVD-2026-15398) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15397 | Google Chrome安全绕过漏洞(CNVD-2026-15397) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15396 | Google Chrome安全绕过漏洞(CNVD-2026-15396) | 2026-03-25 | 2026-03-31 |
| cnvd-2026-15395 | Google Chrome资源管理错误漏洞(CNVD-2026-15395) | 2026-03-26 | 2026-03-31 |
| cnvd-2026-15394 | Faad2缓冲区溢出漏洞(CNVD-2026-15394) | 2023-08-17 | 2026-03-31 |
| cnvd-2026-15393 | Faad2缓冲区溢出漏洞 | 2023-08-17 | 2026-03-31 |
| cnvd-2026-15392 | Bento4拒绝服务漏洞(CNVD-2026-15392) | 2025-08-11 | 2026-03-31 |
| cnvd-2026-15391 | TinyFileManager跨站脚本漏洞 | 2025-06-06 | 2026-03-31 |
| cnvd-2026-15390 | Mozilla Firefox和Mozilla Thunderbird代码执行漏洞 | 2026-03-11 | 2026-03-31 |
| cnvd-2026-15389 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15389) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15388 | 多款Mozilla产品代码执行漏洞(CNVD-2026-15388) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15387 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15387) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15386 | 多款Mozilla产品代码执行漏洞(CNVD-2026-15386) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15385 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15385) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15384 | 多款Mozilla产品整数溢出漏洞(CNVD-2026-15384) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15383 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15383) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15381 | Huawei HarmonyOS cellular_data模块权限控制漏洞 | 2026-03-12 | 2026-03-30 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15785 | Уязвимость компонента imxfb ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15782 | Уязвимость компонента cpcap-charger ядра операционной системы Linux, позволяющая нарушите… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15781 | Уязвимость компонента davinci ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15780 | Уязвимость компонента net/netfilter/xt_nfacct.c ядра операционной системы Linux, позволяю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15779 | Уязвимость компонента net/mac80211/tdls.c ядра операционной системы Linux, позволяющая на… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15778 | Уязвимость компонента net/mlx5 ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15776 | Уязвимость компонента fs/f2fs/f2fs.h ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15773 | Уязвимость компонента ice/ice_ddp.c ядра операционной системы Linux, позволяющая нарушите… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15772 | Уязвимость компонента netlink ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15771 | Уязвимость компонента drivers/regulator/core.c ядра операционной системы Linux, позволяющ… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15770 | Уязвимость компонента arm64/entry ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15769 | Уязвимость компонента drivers/i2c/busses/i2c-qup.c ядра операционной системы Linux, позво… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15767 | Уязвимость ядра операционной системы Linux, связанная с чтением за границами буфера памят… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15766 | Уязвимость компонента venus ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15765 | Уязвимость компонента uvcvideo ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15764 | Уязвимость компонента mm/ptdump ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15763 | Уязвимость компонента hv_netvsc ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15762 | Уязвимость компонента net/sched ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15761 | Уязвимость компонента media ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15760 | Уязвимость компонента media/dvb-frontends/dib7000p.c ядра операционной системы Linux, поз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15759 | Уязвимость компонента lpfc/lpfc_scsi.c ядра операционной системы Linux, позволяющая наруш… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15758 | Уязвимость компонента mips/kernel/process.c ядра операционной системы Linux, позволяющая … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15757 | Уязвимость компонента jfs/jfs_dmap.c ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15756 | Уязвимость компонента scsi/bfa/bfad_im.c ядра операционной системы Linux, позволяющая нар… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15755 | Уязвимость компонента scsi/libiscsi.c ядра операционной системы Linux, позволяющая наруши… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15753 | Уязвимость компонента sound/soc/soc-core.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15752 | Уязвимость компонента fs/hfsplus/xattr.c ядра операционной системы Linux, позволяющая нар… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15751 | Уязвимость компонента fs/hfs/bnode.c ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15750 | Уязвимость компонента nf_conntrack_netlink.c ядра операционной системы Linux, позволяющая… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15749 | Уязвимость компонента fs/nfsd/nfs4state.c ядра операционной системы Linux, позволяющая на… | 15.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202308-3129 | D-Link DAP-2622 DDP Set AG Profile Auth Username Stack-based Buffer Overflow Remote Code … | 2024-07-23T22:20:12.344000Z |
| var-202308-3114 | D-Link DAP-2622 DDP Reset Auth Password Stack-based Buffer Overflow Remote Code Execution… | 2024-07-23T22:20:12.516000Z |
| var-202308-3113 | D-Link DAP-2622 DDP Configuration Backup Server Address Stack-based Buffer Overflow Remot… | 2024-07-23T22:20:12.318000Z |
| var-202308-3105 | D-Link DAP-2622 DDP Reset Factory Auth Username Stack-based Buffer Overflow Remote Code E… | 2024-07-23T22:20:12.284000Z |
| var-202008-1238 | In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.… | 2024-07-23T22:19:51.232000Z |
| var-201302-0307 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2024-07-23T22:19:51.408000Z |
| var-201804-1162 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T22:19:50.233000Z |
| var-201912-0592 | An input validation issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:19:49.641000Z |
| var-201302-0224 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:19:19.153000Z |
| var-201711-0476 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:19:18.201000Z |
| var-202108-1141 | An access issue was addressed with improved access restrictions. This issue is fixed in m… | 2024-07-23T22:19:17.980000Z |
| var-200609-0314 | Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to… | 2024-07-23T22:19:17.031000Z |
| var-202005-0222 | ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related … | 2024-07-23T22:19:16.422000Z |
| var-202006-1653 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 a… | 2024-07-23T22:19:15.782000Z |
| var-201205-0312 | sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI… | 2024-07-23T22:18:38.885000Z |
| var-201903-0424 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:18:36.709000Z |
| var-201401-0254 | The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.… | 2024-07-23T22:18:17.213000Z |
| var-201806-1449 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:18:16.692000Z |
| var-202201-0405 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. vim/vim Exists in a… | 2024-07-23T22:17:38.807000Z |
| var-201711-0450 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:17:38.652000Z |
| var-200701-0510 | The Adobe PDF specification 1.3, as implemented by Apple Mac OS X Preview, allows remote … | 2024-07-23T22:17:06.694000Z |
| var-201904-1360 | A cookie management issue was addressed with improved checks. This issue affected version… | 2024-07-23T22:16:09.056000Z |
| var-201108-0236 | The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF de… | 2024-07-23T22:16:08.579000Z |
| var-200107-0173 | Cisco CBOS 2.3.0.053 sends output of the "sh nat" (aka "show nat") command to the termina… | 2024-07-23T22:16:08.756000Z |
| var-201206-0055 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:14:46.537000Z |
| var-201901-1586 | In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 1… | 2024-07-23T22:14:43.295000Z |
| var-201903-0423 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:14:42.527000Z |
| var-201304-0373 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:14:42.081000Z |
| var-200701-0061 | Finder 10.4.6 on Apple Mac OS X 10.4.8 allows user-assisted remote attackers to cause a d… | 2024-07-23T22:14:37.008000Z |
| var-200502-0025 | The der_chop script in the openssl package in Trustix Secure Linux 1.5 through 2.1 and ot… | 2024-07-23T22:14:37.244000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2024-029 | Phoenix Contact: Unbounded growth of OpenSSL session cache in multiple FL MGUARD devices | 2024-06-11T06:00:00.000Z | 2024-06-11T06:00:00.000Z |
| vde-2024-019 | Phoenix Contact: Multiple vulnerabilities in the Firmware of CHARX SEC charge controllers | 2024-05-14T06:00:00.000Z | 2024-05-14T06:00:00.000Z |
| vde-2024-011 | PHOENIX CONTACT: Multiple vulnerabilities in CHARX SEC charge controllers | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| vde-2023-055 | Phoenix Contact: Automation Worx and classic line controllers prone to Incorrect Permission Assignment for Critical Resource | 2023-12-12T07:00:00.000Z | 2023-12-12T07:00:00.000Z |
| vde-2023-062 | Phoenix Contact: WIBU-SYSTEMS CodeMeter Runtime vulnerabilities in multiple products | 2023-11-21T08:15:00.000Z | 2023-11-21T08:15:00.000Z |
| vde-2023-030 | Phoenix Contact: Multiple products affected by WIBU Codemeter Vulnerability (Update A) | 2023-09-19T06:50:00.000Z | 2023-11-13T11:00:00.000Z |
| vde-2023-004 | Phoenix Contact: Directory Traversal Vulnerability in ENERGY AXC PU Web service | 2023-04-11T08:00:00.000Z | 2023-04-11T08:00:00.000Z |
| vde-2022-018 | PHOENIX CONTACT: Multiple vulnerabilities in RAD-ISM-900-EN-BD devices | 2022-05-11T14:20:00.000Z | 2022-05-11T14:20:00.000Z |
| vde-2021-046 | PHOENIX CONTACT: XSS and memory-leak in FL MGUARD 1102/1105 | 2021-11-10T07:23:00.000Z | 2021-11-10T07:23:00.000Z |
| vde-2020-049 | Phoenix Contact: Multiple vulnerabilities in PLCnext Control devices < 2021.0 LTS | 2020-12-17T09:00:00.000Z | 2020-12-17T09:00:00.000Z |
| vde-2020-030 | PHOENIX CONTACT: Products utilizing WIBU-SYSTEMS CodeMeter components | 2020-09-09T06:22:00.000Z | 2020-09-09T06:22:00.000Z |
| vde-2020-018 | PHOENIX CONTACT: FL MGUARD, TC MGUARD, TC ROUTER and TC CLOUD CLIENT: PPPD vulnerable to CVE-2020-8597 | 2020-06-02T08:42:00.000Z | 2020-06-02T08:42:00.000Z |
| vde-2020-013 | PHOENIX CONTACT: Local Privilege Escalation in Portico Remote desktop control software | 2020-03-27T09:48:00.000Z | 2020-03-27T09:48:00.000Z |
| vde-2018-015 | Phoenix Contact: AXL F BK PN Denial of Service Vulnerability | 2018-09-21T07:03:00.000Z | 2018-09-21T07:03:00.000Z |
| vde-2018-012 | PHOENIX CONTACT: ILC 1x1 ETH Denial of Service | 2018-08-13T11:55:00.000Z | 2018-08-13T11:55:00.000Z |
| vde-2018-005 | Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 allows Information Exposure | 2018-05-16T05:35:00.000Z | 2018-05-16T05:35:00.000Z |