Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-33103 |
5.5 (3.1)
|
Microsoft Dynamics 365 (On-Premises) Information Discl… |
Microsoft |
Microsoft Dynamics 365 (on-premises) version 9.0 |
2026-04-14T16:58:41.818Z | 2026-04-16T14:19:25.458Z |
| CVE-2026-33101 |
7.8 (3.1)
|
Windows Print Spooler Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2026-04-14T16:58:40.813Z | 2026-04-16T14:19:24.868Z |
| CVE-2026-33100 |
7 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:40.062Z | 2026-04-16T14:19:24.330Z |
| CVE-2026-40502 |
8.7 (4.0)
8.8 (3.1)
|
OpenHarness Remote Administrative Command Injection vi… |
HKUDS |
OpenHarness |
2026-04-16T00:08:34.463Z | 2026-04-16T14:19:24.128Z |
| CVE-2026-33099 |
7 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:39.440Z | 2026-04-16T14:19:23.778Z |
| CVE-2026-32225 |
8.8 (3.1)
|
Windows Shell Security Feature Bypass Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:38.879Z | 2026-04-16T14:19:23.085Z |
| CVE-2026-32203 |
7.5 (3.1)
|
.NET and Visual Studio Denial of Service Vulnerability |
Microsoft |
.NET 10.0 |
2026-04-14T16:58:38.178Z | 2026-04-16T14:19:22.376Z |
| CVE-2026-26171 |
7.5 (3.1)
|
.NET Denial of Service Vulnerability |
Microsoft |
.NET 10.0 |
2026-04-14T16:58:37.655Z | 2026-04-16T14:19:21.807Z |
| CVE-2026-32201 |
6.5 (3.1)
|
Microsoft SharePoint Server Spoofing Vulnerability |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2026-04-14T16:58:36.981Z | 2026-04-16T14:19:21.299Z |
| CVE-2026-4949 |
4.3 (3.1)
|
ProfilePress <= 4.16.12 - Missing Authorization to Aut… |
properfraction |
Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress |
2026-04-15T22:26:05.515Z | 2026-04-16T14:19:21.197Z |
| CVE-2026-32200 |
7.8 (3.1)
|
Microsoft PowerPoint Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-04-14T16:58:36.142Z | 2026-04-16T14:19:20.683Z |
| CVE-2026-32199 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-04-14T16:58:35.514Z | 2026-04-16T14:19:19.951Z |
| CVE-2026-32198 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-04-14T16:58:34.827Z | 2026-04-16T14:19:19.374Z |
| CVE-2026-32197 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-04-14T16:58:34.158Z | 2026-04-16T14:19:18.713Z |
| CVE-2026-32196 |
6.1 (3.1)
|
Windows Admin Center Spoofing Vulnerability |
Microsoft |
Windows Admin Center |
2026-04-14T16:58:33.606Z | 2026-04-16T14:19:18.169Z |
| CVE-2026-32190 |
8.4 (3.1)
|
Microsoft Office Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-04-14T16:58:32.812Z | 2026-04-16T14:19:17.484Z |
| CVE-2026-32176 |
6.7 (3.1)
|
SQL Server Elevation of Privilege Vulnerability |
Microsoft |
Microsoft SQL Server 2016 Service Pack 3 (GDR) |
2026-04-14T16:58:32.054Z | 2026-04-16T14:19:16.935Z |
| CVE-2026-32171 |
8.8 (3.1)
|
Azure Logic Apps Elevation of Privilege Vulnerability |
Microsoft |
Azure Logic Apps |
2026-04-14T16:58:31.359Z | 2026-04-16T14:19:16.455Z |
| CVE-2026-32164 |
7.8 (3.1)
|
Windows User Interface Core Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:30.576Z | 2026-04-16T14:19:15.887Z |
| CVE-2026-32163 |
7.8 (3.1)
|
Windows User Interface Core Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 1809 |
2026-04-14T16:58:29.994Z | 2026-04-16T14:19:15.235Z |
| CVE-2026-32162 |
8.4 (3.1)
|
Windows COM Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2026-04-14T16:58:29.342Z | 2026-04-16T14:19:14.523Z |
| CVE-2026-32155 |
7.8 (3.1)
|
Desktop Window Manager Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 21H2 |
2026-04-14T16:58:28.635Z | 2026-04-16T14:19:13.980Z |
| CVE-2026-32153 |
7.8 (3.1)
|
Windows Speech Runtime Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2026-04-14T16:58:27.985Z | 2026-04-16T14:19:13.422Z |
| CVE-2026-32151 |
6.5 (3.1)
|
Windows Shell Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:26.832Z | 2026-04-16T14:19:12.910Z |
| CVE-2026-32150 |
7 (3.1)
|
Windows Function Discovery Service (fdwsd.dll) Elevati… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:26.119Z | 2026-04-16T14:19:12.353Z |
| CVE-2026-32149 |
7.3 (3.1)
|
Windows Hyper-V Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:25.359Z | 2026-04-16T14:19:11.613Z |
| CVE-2026-32091 |
8.4 (3.1)
|
Microsoft Brokering File System Elevation of Privilege… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:24.748Z | 2026-04-16T14:19:10.542Z |
| CVE-2026-32088 |
6.1 (3.1)
|
Windows Biometric Service Security Feature Bypass Vuln… |
Microsoft |
Windows 10 Version 1809 |
2026-04-14T16:58:24.129Z | 2026-04-16T14:19:09.907Z |
| CVE-2026-32086 |
7 (3.1)
|
Windows Function Discovery Service (fdwsd.dll) Elevati… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:23.342Z | 2026-04-16T14:19:09.262Z |
| CVE-2026-32084 |
5.5 (3.1)
|
Windows Print Spooler Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:22.719Z | 2026-04-16T14:19:08.626Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-33703 |
7.1 (4.0)
|
Chamilo LMS Critical IDOR: Any Authenticated User Can … |
chamilo |
chamilo-lms |
2026-04-10T18:23:01.031Z | 2026-04-14T14:05:24.505Z |
| CVE-2026-33776 |
5.5 (3.1)
6.8 (4.0)
|
Junos OS and Junos OS Evolved: Specific low privileged… |
Juniper Networks |
Junos OS |
2026-04-09T21:34:50.469Z | 2026-04-10T14:13:45.754Z |
| CVE-2026-33791 |
6.7 (3.1)
8.4 (4.0)
|
Junos OS and Junos OS Evolved: Execution of crafted CL… |
Juniper Networks |
Junos OS |
2026-04-09T21:38:52.747Z | 2026-04-14T03:55:33.772Z |
| CVE-2026-35585 |
7.5 (4.0)
|
File Browser has a Command Injection via Hook Runner |
filebrowser |
filebrowser |
2026-04-07T16:20:46.019Z | 2026-04-08T18:51:09.641Z |
| CVE-2026-33793 |
7.8 (3.1)
8.5 (4.0)
|
Junos OS and Junos OS Evolved: When an unsigned Python… |
Juniper Networks |
Junos OS |
2026-04-09T21:24:50.485Z | 2026-04-16T15:14:18.212Z |
| CVE-2026-33797 |
7.4 (3.1)
7.1 (4.0)
|
Junos OS and Junos OS Evolved: An attacker sending a s… |
Juniper Networks |
Junos OS |
2026-04-09T21:31:22.902Z | 2026-04-13T18:06:19.434Z |
| CVE-2026-33704 |
7.1 (3.1)
|
Chamilo LMS Affected by Authenticated Arbitrary File W… |
chamilo |
chamilo-lms |
2026-04-10T18:30:48.478Z | 2026-04-13T16:04:11.514Z |
| CVE-2026-35604 |
8.2 (4.0)
|
File Browser share links remain accessible after Share… |
filebrowser |
filebrowser |
2026-04-07T16:22:51.557Z | 2026-04-07T18:26:43.881Z |
| CVE-2026-33705 |
5.3 (3.1)
|
Chamilo LMS has unauthenticated access to Twig templat… |
chamilo |
chamilo-lms |
2026-04-10T18:32:45.193Z | 2026-04-15T15:02:39.017Z |
| CVE-2026-34978 |
6.5 (3.1)
|
OpenPrinting CUPS: Path traversal in RSS notify-recipi… |
OpenPrinting |
cups |
2026-04-03T21:15:15.921Z | 2026-04-06T15:42:42.322Z |
| CVE-2026-34979 |
5.3 (3.1)
|
OpenPrinting CUPS: Heap overflow in `get_options()` |
OpenPrinting |
cups |
2026-04-03T21:16:38.594Z | 2026-04-07T14:19:07.586Z |
| CVE-2026-34980 |
6.1 (4.0)
|
OpenPrinting CUPS: Shared PostScript queue lets anonym… |
OpenPrinting |
cups |
2026-04-03T21:18:09.410Z | 2026-04-06T13:12:43.625Z |
| CVE-2026-33706 |
7.1 (3.1)
|
Chamilo LMS has a REST API Self-Privilege Escalation (… |
chamilo |
chamilo-lms |
2026-04-10T18:51:23.824Z | 2026-04-14T14:02:07.696Z |
| CVE-2026-33707 |
9.4 (3.1)
|
Weak Password Recovery Mechanism for Forgotten Passwor… |
chamilo |
chamilo-lms |
2026-04-10T18:52:54.097Z | 2026-04-13T16:03:17.502Z |
| CVE-2026-33708 |
6.5 (3.1)
|
Chamilo LMS has REST API PII Exposure via get_user_inf… |
chamilo |
chamilo-lms |
2026-04-10T18:54:35.034Z | 2026-04-15T15:04:02.449Z |
| CVE-2026-33710 |
7.5 (3.1)
|
Chamilo LMS has Weak REST API Key Generation (Predictable) |
chamilo |
chamilo-lms |
2026-04-10T18:59:24.111Z | 2026-04-13T15:36:06.835Z |
| CVE-2026-35605 |
6.3 (4.0)
|
File Browser has an access rule bypass via HasPrefix w… |
filebrowser |
filebrowser |
2026-04-07T16:24:52.307Z | 2026-04-09T14:32:02.764Z |
| CVE-2026-33736 |
6.5 (3.1)
|
Chamilo LMS has an Insecure Direct Object Reference (I… |
chamilo |
chamilo-lms |
2026-04-10T19:03:18.638Z | 2026-04-13T20:55:46.727Z |
| CVE-2026-33737 |
5.3 (3.1)
|
Chamilo LMS has an XML External Entity (XXE) Injection |
chamilo |
chamilo-lms |
2026-04-10T19:05:08.873Z | 2026-04-13T16:02:10.691Z |
| CVE-2026-41082 |
7.3 (3.1)
|
In OCaml opam before 2.5.1, a .install field cont… |
OCaml |
opam |
2026-04-16T17:32:40.068Z | 2026-04-16T23:00:36.235Z |
| CVE-2026-37337 |
7.3 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T17:26:11.625Z |
| CVE-2026-37336 |
7.3 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T17:28:46.565Z |
| CVE-2026-33082 |
8.7 (4.0)
|
DataEase: SQL Injection in v2 Dataset Export |
dataease |
dataease |
2026-04-16T17:39:37.894Z | 2026-04-16T18:41:46.111Z |
| CVE-2026-30656 |
7.5 (3.1)
|
A NULL pointer dereference vulnerability exists i… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T17:33:52.962Z |
| CVE-2026-2336 |
8.7 (4.0)
|
Weak webstax_auth Cookie Authentication Allows Privile… |
Microchip |
IStaX |
2026-04-16T17:02:06.352Z | 2026-04-16T17:34:39.672Z |
| CVE-2026-27820 |
1.7 (4.0)
|
zlib: Buffer Overflow in Zlib::GzipReader ungetc via l… |
ruby |
zlib |
2026-04-16T17:27:48.944Z | 2026-04-16T18:20:21.451Z |
| CVE-2026-24749 |
5.3 (3.1)
|
Silverstripe Assets Module has a DBFile::getURL() perm… |
silverstripe |
silverstripe-assets |
2026-04-16T17:08:59.133Z | 2026-04-16T17:08:59.133Z |
| CVE-2025-61594 |
2.1 (4.0)
|
URI Credential Leakage Bypass over CVE-2025-27221 |
ruby |
uri |
2025-12-30T21:03:08.990Z | 2026-04-16T17:02:32.149Z |
| CVE-2025-43883 |
4.1 (3.1)
|
Dell PowerScale OneFS, versions prior to 9.12.0.0… |
Dell |
PowerScale OneFS |
2026-04-16T17:54:09.831Z | 2026-04-16T18:05:57.154Z |
| CVE-2026-35606 |
5.3 (4.0)
|
File Browser discloses text file content via /api/reso… |
filebrowser |
filebrowser |
2026-04-07T16:29:03.565Z | 2026-04-09T16:18:22.881Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-33706 | Chamilo LMS is a learning management system. Prior to 1.11.38, any authenticated user with a REST A… | 2026-04-10T19:16:23.800 | 2026-04-16T18:27:48.773 |
| fkie_cve-2026-33707 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, the default password … | 2026-04-10T19:16:23.950 | 2026-04-16T18:25:38.720 |
| fkie_cve-2026-33708 | Chamilo LMS is a learning management system. Prior to 1.11.38, the get_user_info_from_username REST… | 2026-04-10T19:16:24.107 | 2026-04-16T18:25:15.883 |
| fkie_cve-2026-33710 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, REST API keys are gen… | 2026-04-10T19:16:24.257 | 2026-04-16T18:24:17.680 |
| fkie_cve-2026-35605 | File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editin… | 2026-04-07T17:16:34.583 | 2026-04-16T18:23:47.467 |
| fkie_cve-2026-33736 | Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, any authenticated user (including… | 2026-04-10T19:16:24.410 | 2026-04-16T18:23:31.127 |
| fkie_cve-2026-33737 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, multiple files use si… | 2026-04-10T19:16:24.560 | 2026-04-16T18:22:09.780 |
| fkie_cve-2026-41082 | In OCaml opam before 2.5.1, a .install field containing a destination filepath can use ../ to reach… | 2026-04-16T18:16:45.980 | 2026-04-16T18:16:45.980 |
| fkie_cve-2026-37337 | SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file … | 2026-04-16T15:17:36.573 | 2026-04-16T18:16:45.740 |
| fkie_cve-2026-37336 | SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file … | 2026-04-16T15:17:36.460 | 2026-04-16T18:16:45.580 |
| fkie_cve-2026-33082 | DataEase is an open source data visualization analysis tool. Versions 2.10.20 and below contain a S… | 2026-04-16T18:16:45.283 | 2026-04-16T18:16:45.283 |
| fkie_cve-2026-30656 | A NULL pointer dereference vulnerability exists in fio (Flexible I/O Tester) v3.41 when parsing job… | 2026-04-16T15:17:17.873 | 2026-04-16T18:16:45.117 |
| fkie_cve-2026-2336 | A privilege escalation vulnerability in Microchip IStaX allows an authenticated low-privileged user… | 2026-04-16T18:16:44.927 | 2026-04-16T18:16:44.927 |
| fkie_cve-2026-27820 | zlib is a Ruby interface for the zlib compression/decompression library. Versions 3.0.0 and below, … | 2026-04-16T18:16:44.770 | 2026-04-16T18:16:44.770 |
| fkie_cve-2026-24749 | The Silverstripe Assets Module is a required component of Silverstripe Framework. In versions prior… | 2026-04-16T18:16:44.610 | 2026-04-16T18:16:44.610 |
| fkie_cve-2025-61594 | URI is a module providing classes to handle Uniform Resource Identifiers. In versions 0.12.4 and ea… | 2025-12-30T21:15:43.893 | 2026-04-16T18:16:44.400 |
| fkie_cve-2025-43883 | Dell PowerScale OneFS, versions prior to 9.12.0.0, contains an improper check for unusual or except… | 2026-04-16T18:16:43.667 | 2026-04-16T18:16:43.667 |
| fkie_cve-2026-35606 | File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editin… | 2026-04-07T17:16:34.737 | 2026-04-16T18:16:28.757 |
| fkie_cve-2026-34990 | OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems… | 2026-04-03T22:16:27.400 | 2026-04-16T18:15:24.430 |
| fkie_cve-2026-35607 | File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editin… | 2026-04-07T17:16:34.890 | 2026-04-16T18:14:56.710 |
| fkie_cve-2026-39314 | OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems… | 2026-04-07T17:16:37.073 | 2026-04-16T18:13:32.090 |
| fkie_cve-2019-25567 | Valentina Studio 9.0.5 Linux contains a buffer overflow vulnerability in the Host field of the conn… | 2026-03-21T13:16:20.277 | 2026-04-16T18:12:51.933 |
| fkie_cve-2019-25566 | TransMac 12.3 contains a buffer overflow vulnerability in the volume name field that allows local a… | 2026-03-21T13:16:20.090 | 2026-04-16T18:11:57.673 |
| fkie_cve-2019-25565 | Magic Iso Maker 5.5 build 281 contains a buffer overflow vulnerability in the Serial Code registrat… | 2026-03-21T13:16:19.900 | 2026-04-16T18:10:51.140 |
| fkie_cve-2019-25561 | Lyric Maker 2.0.1.0 contains a buffer overflow vulnerability that allows local attackers to crash t… | 2026-03-21T13:16:19.140 | 2026-04-16T18:09:10.390 |
| fkie_cve-2026-39316 | OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems… | 2026-04-07T17:16:37.230 | 2026-04-16T18:08:46.140 |
| fkie_cve-2026-35610 | PolarLearn is a free and open-source learning program. In 0-PRERELEASE-14 and earlier, setCustomPas… | 2026-04-07T17:16:35.260 | 2026-04-16T18:04:50.313 |
| fkie_cve-2026-4926 | Impact: A bad regular expression is generated any time you have multiple sequential optional group… | 2026-03-26T19:17:08.387 | 2026-04-16T18:04:13.123 |
| fkie_cve-2026-4923 | Impact: When using multiple wildcards, combined with at least one parameter, a regular expression … | 2026-03-26T19:17:08.187 | 2026-04-16T18:03:37.620 |
| fkie_cve-2019-25560 | Lyric Video Creator 2.1 contains a denial of service vulnerability that allows attackers to crash t… | 2026-03-21T13:16:18.957 | 2026-04-16T18:02:42.237 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-c9gw-hvqq-f33r |
9.9 (3.1)
|
Flowise: Authenticated RCE Via MCP Adapters | 2026-04-16T21:18:17Z | 2026-04-16T21:18:17Z |
| ghsa-xgp8-3hg3-c2mh |
2.2 (3.1)
|
webpki: Name constraints were accepted for certificates asserting a wildcard name | 2026-04-16T21:17:12Z | 2026-04-16T21:17:12Z |
| ghsa-v92g-xgxw-vvmm |
6.3 (4.0)
|
Mako: Path traversal via double-slash URI prefix in TemplateLookup | 2026-04-16T21:16:40Z | 2026-04-16T21:16:40Z |
| ghsa-965h-392x-2mh5 |
2.2 (3.1)
|
webpki: Name constraints for URI names were incorrectly accepted | 2026-04-16T21:16:22Z | 2026-04-16T21:16:23Z |
| ghsa-hf5p-q87m-crj7 |
5.9 (3.1)
|
Junrar: Path Traversal (Zip-Slip) via Sibling Directory Name Prefix | 2026-04-16T21:14:33Z | 2026-04-16T21:14:33Z |
| ghsa-533q-w4g6-5586 |
7.5 (3.1)
|
PsiTransfer: Upload PATCH path traversal can create `config.<NODE_ENV>.js` and lead to code executi… | 2026-04-16T21:13:40Z | 2026-04-16T21:13:40Z |
| ghsa-wqq3-wfmp-v85g |
4.7 (3.1)
|
Mojic: Observable Timing Discrepancy in HMAC Verification | 2026-04-16T21:10:17Z | 2026-04-16T21:10:17Z |
| ghsa-jhm7-29pj-4xvf |
5.9 (3.1)
|
@node-oauth/oauth2-server: PKCE code_verifier ABNF not enforced in token exchange allows brute-forc… | 2026-04-16T21:09:50Z | 2026-04-16T21:09:50Z |
| ghsa-qr3m-xw4c-jqw3 |
9.1 (3.1)
|
ChilliCream GraphQL Platform: Utf8GraphQLParser Stack Overflow via Deeply Nested GraphQL Documents | 2026-04-16T21:09:40Z | 2026-04-16T21:09:40Z |
| ghsa-3jpj-v3xr-5h6g |
5.3 (3.1)
|
zrok: Broken ownership check in DELETE /api/v2/unaccess allows non-admin to delete global frontend … | 2026-04-16T21:09:23Z | 2026-04-16T21:09:23Z |
| ghsa-cpf9-ph2j-ccr9 |
7.5 (3.1)
|
zrok: Unauthenticated DoS via unbounded memory allocation in striped session cookie parsing | 2026-04-16T21:09:08Z | 2026-04-16T21:09:08Z |
| ghsa-4fxq-2x3x-6xqx |
6.1 (3.1)
|
zrok: Reflected XSS in GitHub OAuth callback via unsanitized refreshInterval error rendering | 2026-04-16T21:08:55Z | 2026-04-16T21:08:55Z |
| ghsa-ffgh-3jrf-8wvh |
5.0 (3.1)
|
Weblate: Prefix-Based Repository Boundary Check Bypass via Symlink/Junction Path Prefix Collision | 2026-04-16T21:08:47Z | 2026-04-16T21:08:47Z |
| ghsa-9mrh-v2v3-xpfm |
6.1 (3.1)
|
sanitize-html allowedTags Bypass via Entity-Decoded Text in nonTextTags Elements | 2026-04-16T21:08:29Z | 2026-04-16T21:08:29Z |
| ghsa-95mq-xwj4-r47p |
9.4 (3.1)
|
Dgraph: Unauthenticated /debug/pprof/cmdline discloses admin auth token, enabling unauthorized acce… | 2026-04-16T21:08:07Z | 2026-04-16T21:08:07Z |
| ghsa-c276-fj82-f2pq |
5.3 (3.1)
|
ApostropheCMS: Information Disclosure via choices/counts Query Parameters Bypassing publicApiProjec… | 2026-04-16T20:45:15Z | 2026-04-16T20:45:15Z |
| ghsa-f8hv-g549-hwg2 |
4.1 (3.1)
|
Weblate: SSRF via the webhook add-on using unprotected fetch_url() | 2026-04-16T20:45:04Z | 2026-04-16T20:45:04Z |
| ghsa-9gcg-w975-3rjh |
5.4 (3.1)
|
Istio: AuthorizationPolicy serviceAccounts regex injection via unescaped dots | 2026-04-16T20:44:46Z | 2026-04-16T20:44:46Z |
| ghsa-353c-v8x9-v7c3 |
8.7 (4.0)
|
MCP-Framework: Unbounded memory allocation in readRequestBody allows denial of service via HTTP transport | 2026-04-16T20:44:32Z | 2026-04-16T20:44:32Z |
| ghsa-855c-r2vq-c292 |
8.7 (3.1)
|
Stored XSS in SEO Fields Leads to Authenticated API Data Exposure in ApostropheCMS | 2026-04-16T20:44:18Z | 2026-04-16T20:44:18Z |
| ghsa-pc3f-x583-g7j2 |
8.7 (4.0)
|
SpdyStream: DOS on CRI | 2026-04-16T20:44:01Z | 2026-04-16T20:44:01Z |
| ghsa-3382-gw9x-477v |
8.8 (3.1)
|
Weblate: Privilege escalation in the user API endpoint | 2026-04-16T20:43:48Z | 2026-04-16T20:43:49Z |
| ghsa-xrwr-fcw6-fmq8 |
5.0 (3.1)
|
Weblate: SSRF via Project-Level Machinery Configuration | 2026-04-16T20:43:38Z | 2026-04-16T20:43:38Z |
| ghsa-hv99-mxm5-q397 |
7.7 (3.1)
|
Weblate: Arbitrary File Read via Symlink | 2026-04-16T20:43:11Z | 2026-04-16T20:43:11Z |
| ghsa-hfrg-mcvw-8mch |
4.9 (3.1)
|
Valtimo: Sensitive data exposure through inbox message logging in InboxHandlingService | 2026-04-16T20:42:55Z | 2026-04-16T20:42:55Z |
| ghsa-97v6-998m-fp4g |
5.4 (3.1)
|
ApostropheCMS: Stored XSS via CSS Custom Property Injection in @apostrophecms/color-field Escaping … | 2026-04-16T20:42:37Z | 2026-04-16T20:42:37Z |
| ghsa-xhq9-58fw-859p |
5.3 (3.1)
|
ApostropheCMS: publicApiProjection Bypass via project Query Builder in Piece-Type REST API | 2026-04-16T20:42:21Z | 2026-04-16T20:42:21Z |
| ghsa-mj7r-x3h3-7rmr |
3.7 (3.1)
|
ApostropheCMS: User Enumeration via Timing Side Channel in Password Reset Endpoint | 2026-04-16T20:42:11Z | 2026-04-16T20:42:11Z |
| ghsa-5fhx-9jwj-867m |
5.0 (3.1)
|
Weblate: Authenticated SSRF via redirect bypass of ALLOWED_ASSET_DOMAINS in screenshot URL uploads | 2026-04-16T20:41:59Z | 2026-04-16T20:41:59Z |
| ghsa-558g-h753-6m33 |
8.0 (3.1)
|
Weblate: Remote code execution during backup restoration | 2026-04-16T20:41:38Z | 2026-04-16T20:41:38Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-231 |
8.1 (3.1)
|
LightGBM Remote Code Execution Vulnerability | lightgbm | 2024-11-12T18:15:28+00:00 | 2025-02-15T07:20:34.246161+00:00 |
| pysec-2024-230 |
7.5 (3.1)
|
Certifi is a curated collection of Root Certificates for validating the trustworthiness o… | certifi | 2024-07-05T19:15:10+00:00 | 2025-02-12T21:21:51.559667+00:00 |
| pysec-2024-229 |
8.8 (3.1)
|
Hugging Face Transformers Trax Model Deserialization of Untrusted Data Remote Code Execut… | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.499413+00:00 |
| pysec-2024-228 |
8.8 (3.1)
|
Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code … | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.449105+00:00 |
| pysec-2024-227 |
8.8 (3.1)
|
Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execu… | transformers | 2024-11-22T22:15:06+00:00 | 2025-02-10T23:22:41.399021+00:00 |
| pysec-2024-226 |
7.8 (3.1)
|
Pymatgen (Python Materials Genomics) is an open-source Python library for materials analy… | pymatgen | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:28.734730+00:00 |
| pysec-2024-225 |
7.5 (3.1)
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:24.427679+00:00 |
| pysec-2024-224 |
7.0 (3.1)
|
Excessive directory permissions in MLflow leads to local privilege escalation when using … | mlflow | 2024-11-25T14:15:06+00:00 | 2025-02-03T16:23:40.409646+00:00 |
| pysec-2024-27 |
9.8 (3.1)
|
CrateDB 5.5.1 is contains an authentication bypass vulnerability in the Admin UI componen… | crate | 2024-01-30T01:15:00Z | 2025-01-30T22:47:57.847403Z |
| pysec-2019-242 |
5.5 (3.1)
|
Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) i… | capstone | 2019-05-15T14:29:00Z | 2025-01-28T17:34:08.578134Z |
| pysec-2025-2 |
|
uniapi version 1.0.7 introduces code that would execute on import of the module and downl… | uniapi | 2025-01-24T19:56:53+00:00 | |
| pysec-2024-223 |
9.1 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds … | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:22.060512+00:00 |
| pysec-2024-222 |
7.5 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Trav… | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:21.994731+00:00 |
| pysec-2024-221 |
5.3 (3.1)
|
aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd i… | aiosmtpd | 2024-03-12T21:15:58+00:00 | 2025-01-22T16:23:18.042465+00:00 |
| pysec-2024-220 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.972580+00:00 |
| pysec-2024-219 |
9.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.897787+00:00 |
| pysec-2024-218 |
8.1 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:03+00:00 | 2025-01-19T22:22:23.803143+00:00 |
| pysec-2024-217 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This is a **data … | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.723816+00:00 |
| pysec-2024-216 |
7.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T22:22:23.549944+00:00 |
| pysec-2024-215 |
9.8 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T22:22:23.471780+00:00 |
| pysec-2024-214 |
5.4 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.399444+00:00 |
| pysec-2024-213 |
6.5 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T22:22:23.310301+00:00 |
| pysec-2024-212 |
|
Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add… | apache-airflow | 2024-09-07T08:15:11+00:00 | 2025-01-19T22:22:22.289672+00:00 |
| pysec-2024-211 |
7.5 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote clien… | waitress | 2024-10-29T15:15:12+00:00 | 2025-01-19T19:19:01.852094+00:00 |
| pysec-2024-210 |
4.8 (3.1)
|
Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may… | waitress | 2024-10-29T15:15:11+00:00 | 2025-01-19T19:19:01.811922+00:00 |
| pysec-2024-209 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-19T19:19:01.689044+00:00 |
| pysec-2024-208 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.647736+00:00 |
| pysec-2024-207 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.605918+00:00 |
| pysec-2024-206 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions… | vyper | 2024-04-25T18:15:08+00:00 | 2025-01-19T19:19:01.566553+00:00 |
| pysec-2024-205 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using … | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-19T19:19:01.519824+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33799 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424348Z |
| gsd-2024-33798 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.346901Z |
| gsd-2024-33797 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.530297Z |
| gsd-2024-33796 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.308365Z |
| gsd-2024-33795 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.332784Z |
| gsd-2024-33794 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.557396Z |
| gsd-2024-33793 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.552273Z |
| gsd-2024-33792 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.507383Z |
| gsd-2024-33791 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.488352Z |
| gsd-2024-33790 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.450431Z |
| gsd-2024-33789 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.534336Z |
| gsd-2024-33788 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.591276Z |
| gsd-2024-33787 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.424661Z |
| gsd-2024-33786 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.606155Z |
| gsd-2024-33785 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.387543Z |
| gsd-2024-33784 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.595808Z |
| gsd-2024-33783 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322051Z |
| gsd-2024-33782 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322441Z |
| gsd-2024-33781 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.495881Z |
| gsd-2024-33780 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.307884Z |
| gsd-2024-33779 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.507854Z |
| gsd-2024-33778 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.295751Z |
| gsd-2024-33777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.489805Z |
| gsd-2024-33776 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.587852Z |
| gsd-2024-33775 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.322245Z |
| gsd-2024-33774 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.484899Z |
| gsd-2024-33773 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.560326Z |
| gsd-2024-33772 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.282306Z |
| gsd-2024-33771 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.366201Z |
| gsd-2024-33770 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.514460Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2590 | Malicious code in @op-microfrontends/config (npm) | 2026-04-13T15:25:22Z | 2026-04-16T15:42:07Z |
| mal-2026-2582 | Malicious code in @guards-lib/auth (npm) | 2026-04-13T15:25:21Z | 2026-04-16T15:42:07Z |
| mal-2026-2575 | Malicious code in @ascend-ops/web-client (npm) | 2026-04-13T15:25:21Z | 2026-04-16T15:42:07Z |
| mal-2026-2574 | Malicious code in @amplify-js/datastore (npm) | 2026-04-13T15:25:21Z | 2026-04-16T15:42:07Z |
| mal-2026-2421 | Malicious code in @mgcrae/pino-pretty-logger (npm) | 2026-04-02T11:28:24Z | 2026-04-16T15:42:07Z |
| mal-2026-2410 | Malicious code in @the-coca-cola-company/ngps-global-common-utils (npm) | 2026-03-24T09:07:58Z | 2026-04-16T15:42:07Z |
| mal-2026-2331 | Malicious code in @girirajravichandran/corp-build-utils-poc (npm) | 2026-03-24T15:28:29Z | 2026-04-16T15:42:07Z |
| mal-2026-2246 | Malicious code in @ev-tech/eva-container-api (npm) | 2026-03-27T00:51:36Z | 2026-04-16T15:42:07Z |
| mal-2026-2217 | Malicious code in @rexorg/config (npm) | 2026-03-26T00:31:20Z | 2026-04-16T15:42:07Z |
| mal-2026-1940 | Malicious code in @validates-sdk/v3 (npm) | 2026-03-20T04:32:42Z | 2026-04-16T15:42:07Z |
| mal-2026-1938 | Malicious code in @metaplex-foundations/umi-public-keys (npm) | 2026-03-20T04:32:42Z | 2026-04-16T15:42:07Z |
| mal-2026-1651 | Malicious code in ai-fast-auto-trader (npm) | 2026-03-18T12:37:54Z | 2026-04-16T15:42:07Z |
| mal-2026-1557 | Malicious code in add-react-displayname (npm) | 2026-03-18T08:13:24Z | 2026-04-16T15:42:07Z |
| mal-2026-1473 | Malicious code in aesdecryptor (npm) | 2026-03-16T15:51:36Z | 2026-04-16T15:42:07Z |
| mal-2026-1379 | Malicious code in 8x8-developer-docs (npm) | 2026-03-13T02:21:45Z | 2026-04-16T15:42:07Z |
| mal-2025-192983 | Malicious code in bigmathex (npm) | 2025-12-30T16:59:03Z | 2026-04-16T15:42:07Z |
| mal-2025-192714 | Malicious code in bignumberx (npm) | 2025-12-23T08:00:59Z | 2026-04-16T15:42:07Z |
| mal-2025-192598 | Malicious code in bigmathlib (npm) | 2025-12-16T07:25:20Z | 2026-04-16T15:42:07Z |
| mal-2025-192574 | Malicious code in bignumex (npm) | 2025-12-15T07:43:03Z | 2026-04-16T15:42:07Z |
| mal-2025-191541 | Malicious code in bignumx (npm) | 2025-12-02T04:29:23Z | 2026-04-16T15:42:07Z |
| mal-2025-1713 | Malicious code in airbnb-internal (npm) | 2025-03-03T13:15:28Z | 2026-04-16T15:42:07Z |
| mal-2026-2702 | Malicious code in emergentintegrations (PyPI) | 2026-04-16T14:03:42Z | 2026-04-16T14:42:29Z |
| mal-2026-2701 | Malicious code in sanitize-url (npm) | 2026-04-16T13:51:15Z | 2026-04-16T13:51:15Z |
| mal-2026-2700 | Malicious code in conventional-changelog-dash (npm) | 2026-04-16T12:15:47Z | 2026-04-16T12:15:47Z |
| mal-2026-2816 | Malicious code in monolith-twirp-pullsd-users (RubyGems) | 2026-04-16T10:28:47Z | 2026-04-16T10:28:47Z |
| mal-2026-2815 | Malicious code in monolith-twirp-pullsd-authorization (RubyGems) | 2026-04-16T10:28:47Z | 2026-04-16T10:28:47Z |
| mal-2026-2814 | Malicious code in gitlab-orchestrator (RubyGems) | 2026-04-16T10:28:44Z | 2026-04-16T10:28:44Z |
| mal-2026-2813 | Malicious code in requests-testik11 (PyPI) | 2026-04-16T10:27:40Z | 2026-04-16T10:27:40Z |
| mal-2026-2812 | Malicious code in requests-test-test44 (PyPI) | 2026-04-16T10:27:40Z | 2026-04-16T10:27:40Z |
| mal-2026-2811 | Malicious code in requests-test-test3 (PyPI) | 2026-04-16T10:27:39Z | 2026-04-16T10:27:39Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1350 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-17T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0861 | Linux Kernel: Mehrere Schwachstellen | 2025-04-21T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0844 | Linux Kernel: Mehrere Schwachstellen | 2025-04-16T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0837 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-04-15T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0545 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-03-11T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0499 | Linux Kernel: Mehrere Schwachstellen | 2025-03-06T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2025-0453 | Linux Kernel: Mehrere Schwachstellen | 2025-02-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3762 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-12-29T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3575 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-12-02T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3251 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-10-21T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3134 | Linux Kernel: Mehrere Schwachstellen | 2024-10-09T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3050 | Linux Kernel: Mehrere Schwachstellen | 2024-09-29T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-2173 | Linux Kernel: Mehrere Schwachstellen | 2024-09-17T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1721 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-07-28T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1451 | Linux Kernel: Mehrere Schwachstellen | 2024-06-25T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1259 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifischen Angriff | 2024-05-30T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0585 | Grafana: Schwachstelle ermöglicht Privilegieneskalation | 2024-03-07T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0219 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-01-25T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2023-3004 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-11-26T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2022-0463 | NGINX: Schwachstelle ermöglicht Denial of Service | 2021-05-25T22:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0879 | Linux Kernel: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-04-08T22:00:00.000+00:00 |
| wid-sec-w-2026-0982 | OpenBSD: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-04-06T22:00:00.000+00:00 | 2026-04-07T22:00:00.000+00:00 |
| wid-sec-w-2026-0937 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-03-31T22:00:00.000+00:00 | 2026-04-06T22:00:00.000+00:00 |
| wid-sec-w-2026-0789 | Roundcube: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-04-06T22:00:00.000+00:00 |
| wid-sec-w-2025-2310 | F5 BIG-IP und F5OS: Mehrere Schwachstellen | 2025-10-15T22:00:00.000+00:00 | 2026-03-31T22:00:00.000+00:00 |
| wid-sec-w-2026-0909 | Tinyproxy: Schwachstelle ermöglicht Denial of Service | 2026-03-29T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0904 | vim: Schwachstelle ermöglicht Codeausführung | 2026-03-29T22:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0892 | WatchGuard Firebox: Mehrere Schwachstellen | 2026-03-26T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0891 | Dovecot: Mehrere Schwachstellen | 2026-03-26T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0880 | FreeRDP: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-050-02 | Valmet DNA Engineering Web Tools | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-26-050-01 | EnOcean SmartServer IoT | 2026-02-19T07:00:00.000000Z | 2026-02-19T07:00:00.000000Z |
| icsa-24-263-02 | IDEC Products (Update A) | 2024-09-19T06:00:00.000000Z | 2026-02-18T07:00:00.000000Z |
| icsa-26-048-03 | GE Vernova Enervista UR Setup | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-02 | Delta Electronics ASDA-Soft | 2026-02-17T07:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-048-01 | Siemens Simcenter Femap and Nastran | 2026-02-10T00:00:00.000000Z | 2026-02-17T07:00:00.000000Z |
| icsa-26-043-10 | Airleader Master | 2026-02-12T07:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-09 | Hitachi Energy SuprOS | 2026-01-27T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-07 | Siemens Siveillance Video Management Servers | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-05 | Siemens Solid Edge | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-04 | Siemens Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-043-02 | Siemens Polarion | 2026-02-10T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-015-04 | Siemens SIMATIC and SIPLUS products | 2026-01-13T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-289-06 | Siemens SiPass Integrated | 2025-10-14T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-135-01 | Siemens RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-24-102-01 | Siemens SIMATIC S7-1500 | 2024-04-09T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-12-349-01 | Siemens Automation License Manager Uncontrolled Resource Consumption | 2012-12-12T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-036-01 | TP-Link Systems Inc. VIGI Series IP Camera | 2026-02-05T06:00:00.000000Z | 2026-02-11T06:00:00.000000Z |
| icsma-26-041-01 | ZOLL ePCR IOS Mobile Application | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-04 | AVEVA PI to CONNECT Agent | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-03 | AVEVA PI Data Archive | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-02 | ZLAN Information Technology Co. ZLAN5143D | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-01 | Yokogawa FAST/TOOLS | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-036-06 | Hitachi Energy FOX61x | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-05 | Hitachi Energy XMC20 | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-04 | Ilevia EVE X1 Server | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-03 | o6 Automation GmbH Open62541 | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-02 | Mitsubishi Electric MELSEC iQ-R Series | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-029-01 | KiloView Encoder Series (Update A) | 2026-01-29T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-184-03 | Mitsubishi Electric MELSOFT Update Manager (Update B) | 2025-07-03T06:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-fp2k-ipsec-dos-tjwgdzco | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 2100 Series IPv6 over IPsec Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-09T21:22:34+00:00 |
| cisco-sa-webex-xss-55bv8hhm | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-webex-urlredirect-uk8ddjsz | Cisco Webex Meetings URL Redirection Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-phone-write-g3kcc5df | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-imp-xss-xqgu4hsg | Cisco Unified Communications Manager IM & Presence Service Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-xjqzsycp | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-info-dis-zhppmfgz | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Information Disclosure Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epni-arb-file-upload-jjdm2p83 | Cisco Evolved Programmable Network Manager Arbitrary File Upload Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-cucm-csrf-w762pryd | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-3100_4200_tlsdos-2ynscd54 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 3100 and 4200 Series TLS 1.3 Cipher Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-03T13:37:50+00:00 |
| cisco-sa-ucs-xss-ey6xhyps | Cisco UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-vkvmorv-cnkrv7hk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Open Redirect Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-multi-cmdinj-e4ukjyrz | Cisco UCS Manager Software Command Injection Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-kvmsxss-6h7anuyk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxospc-pim6-vg4jfph | Cisco Nexus 3000 and 9000 Series Switches Protocol Independent Multicast Version 6 Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-infodis-tectysfg | Cisco NX-OS Software Sensitive Log Information Disclosure Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-qhnze5ss | Cisco NX-OS Software Command Injection Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nshs-urapi-gjubvfpu | Cisco Nexus Dashboard and Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nd-ptrs-xu2fm2wb | Cisco Nexus Dashboard Path Traversal Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-n39k-isis-dos-jhja8rfx | Cisco Nexus 3000 and 9000 Series Switches Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ise-file-upload-qksx6c8g | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:43:01+00:00 |
| cisco-sa-pi-epnm-tet4gxbx | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Sensitive Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-authproxlog-sxczxq63 | Cisco Duo Authentication Proxy Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-20180328-smi2 | Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability | 2018-03-28T16:00:00+00:00 | 2025-08-20T14:26:26+00:00 |
| cisco-sa-asaftd-ssltls-dos-ehw76vze | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SSL/TLS Certificate Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-19T16:32:05+00:00 |
| cisco-sa-ftd-ravpn-geobypass-9h38m37z | Cisco Secure Firewall Threat Defense Software Geolocation Remote Access VPN Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-ftd-dos-svkhtjgt | Cisco Secure Firewall Threat Defense Software Snort 3 Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-xss-jtnmcusp | Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-xpathinj-corthdmb | Cisco Secure Firewall Management Center Software XPATH Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-radius-rce-tnbkf79 | Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-61725 | Excessive CPU consumption in ParseAddress in net/mail | 2025-10-02T00:00:00.000Z | 2026-04-14T14:39:06.000Z |
| msrc_cve-2025-58188 | Panic when validating certificates with DSA public keys in crypto/x509 | 2025-10-02T00:00:00.000Z | 2026-04-14T14:39:01.000Z |
| msrc_cve-2025-61724 | Excessive CPU consumption in Reader.ReadResponse in net/textproto | 2025-10-02T00:00:00.000Z | 2026-04-14T14:38:55.000Z |
| msrc_cve-2025-58186 | Lack of limit when parsing cookies can cause memory exhaustion in net/http | 2025-10-02T00:00:00.000Z | 2026-04-14T14:38:50.000Z |
| msrc_cve-2025-58183 | Unbounded allocation when parsing GNU sparse map in archive/tar | 2025-10-02T00:00:00.000Z | 2026-04-14T14:38:44.000Z |
| msrc_cve-2025-11839 | GNU Binutils prdbg.c tg_tag_type return value | 2025-10-02T00:00:00.000Z | 2026-04-14T14:38:38.000Z |
| msrc_cve-2025-9901 | Libsoup: improper handling of http vary header in libsoup caching | 2025-09-02T00:00:00.000Z | 2026-04-14T14:38:32.000Z |
| msrc_cve-2025-4035 | Libsoup: cookie domain validation bypass via uppercase characters in libsoup | 2025-04-02T00:00:00.000Z | 2026-04-14T14:38:25.000Z |
| msrc_cve-2025-1148 | GNU Binutils ld ldelfgen.c link_order_scan memory leak | 2025-02-02T00:00:00.000Z | 2026-04-14T14:38:18.000Z |
| msrc_cve-2025-1180 | GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption | 2025-02-02T00:00:00.000Z | 2026-04-14T14:38:13.000Z |
| msrc_cve-2025-1150 | GNU Binutils ld libbfd.c bfd_malloc memory leak | 2025-02-02T00:00:00.000Z | 2026-04-14T14:38:04.000Z |
| msrc_cve-2025-1147 | GNU Binutils nm nm.c internal_strlen buffer overflow | 2025-02-02T00:00:00.000Z | 2026-04-14T14:37:57.000Z |
| msrc_cve-2025-1149 | GNU Binutils ld xmalloc.c xstrdup memory leak | 2025-02-02T00:00:00.000Z | 2026-04-14T14:37:50.000Z |
| msrc_cve-2025-1151 | GNU Binutils ld xmemdup.c xmemdup memory leak | 2025-02-02T00:00:00.000Z | 2026-04-14T14:37:42.000Z |
| msrc_cve-2025-1152 | GNU Binutils ld xstrdup.c xstrdup memory leak | 2025-02-02T00:00:00.000Z | 2026-04-14T14:37:34.000Z |
| msrc_cve-2026-33829 | Windows Snipping Tool Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33827 | Windows TCP/IP Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33826 | Windows Active Directory Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33825 | Microsoft Defender Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33824 | Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33822 | Microsoft Word Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33120 | Microsoft SQL Server Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33116 | .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33115 | Microsoft Word Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33114 | Microsoft Word Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33104 | Win32k Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33103 | Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33101 | Windows Print Spooler Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33100 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33099 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0003 | Kwetsbaarheden verholpen in GitLab | 2026-01-09T11:11:48.308357Z | 2026-01-09T11:11:48.308357Z |
| ncsc-2026-0002 | Kwetsbaarheid verholpen in n8n | 2026-01-08T12:34:29.315681Z | 2026-01-08T12:34:29.315681Z |
| ncsc-2026-0001 | Kwetsbaarheden verholpen in Hanwha camera systemen | 2026-01-08T12:28:21.446188Z | 2026-01-08T12:28:21.446188Z |
| ncsc-2025-0405 | Kwetsbaarheid verholpen in Roundcube Webmail | 2025-12-31T14:29:26.821576Z | 2025-12-31T14:29:26.821576Z |
| ncsc-2025-0404 | Kwetsbaarheid verholpen in SmarterMail | 2025-12-31T14:19:01.847364Z | 2025-12-31T14:19:01.847364Z |
| ncsc-2025-0403 | Kwetsbaarheden verholpen in QNAP besturingssystemen | 2025-12-29T09:17:28.385450Z | 2025-12-29T09:17:28.385450Z |
| ncsc-2025-0402 | Kwetsbaarheid verholpen in MongoDB | 2025-12-27T11:38:11.514349Z | 2025-12-27T11:38:11.514349Z |
| ncsc-2025-0399 | Kwetsbaarheid verholpen in HPE OneView Software | 2025-12-18T18:38:20.794784Z | 2025-12-24T11:29:46.123674Z |
| ncsc-2025-0401 | Kwetsbaarheden verholpen in Foxit PDF Reader | 2025-12-24T09:14:56.590353Z | 2025-12-24T09:14:56.590353Z |
| ncsc-2025-0400 | Kwetsbaarheid verholpen in WatchGuard Firebox | 2025-12-19T11:16:01.438518Z | 2025-12-19T11:16:01.438518Z |
| ncsc-2025-0398 | Kwetsbaarheid in Cisco AsyncOS | 2025-12-17T19:47:00.346651Z | 2025-12-17T19:47:00.346651Z |
| ncsc-2025-0397 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-12-15T09:08:39.804149Z | 2025-12-15T09:08:39.804149Z |
| ncsc-2025-0396 | Kwetsbaarheden verholpen in Apple macOS | 2025-12-15T09:06:36.450655Z | 2025-12-15T09:06:36.450655Z |
| ncsc-2025-0394 | Kwetsbaarheden verholpen in React Server Components | 2025-12-12T09:04:19.324080Z | 2025-12-12T10:46:34.688189Z |
| ncsc-2025-0395 | Kwetsbaarheden verholpen in SAP Software | 2025-12-12T09:29:08.429888Z | 2025-12-12T09:29:08.429888Z |
| ncsc-2025-0393 | Kwetsbaarheid verholpen in GeoServer | 2025-12-12T08:12:18.831044Z | 2025-12-12T09:02:27.681292Z |
| ncsc-2025-0392 | Kwetsbaarheid verholpen in Barracuda Service Center | 2025-12-11T13:53:23.819008Z | 2025-12-11T13:53:23.819008Z |
| ncsc-2025-0391 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-12-11T13:51:55.178462Z | 2025-12-11T13:51:55.178462Z |
| ncsc-2025-0390 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-12-11T09:22:54.841848Z | 2025-12-11T09:22:54.841848Z |
| ncsc-2025-0389 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-12-10T14:59:57.911864Z | 2025-12-10T14:59:57.911864Z |
| ncsc-2025-0388 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-12-10T13:35:58.314547Z | 2025-12-10T13:35:58.314547Z |
| ncsc-2025-0387 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-12-10T13:34:08.908897Z | 2025-12-10T13:34:08.908897Z |
| ncsc-2025-0385 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-12-09T18:42:32.332749Z | 2025-12-09T18:42:32.332749Z |
| ncsc-2025-0384 | Kwetsbaarheden verholpen in Microsoft Office | 2025-12-09T18:40:33.839342Z | 2025-12-09T18:40:33.839342Z |
| ncsc-2025-0383 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-12-09T18:39:18.152251Z | 2025-12-09T18:39:18.152251Z |
| ncsc-2025-0382 | Kwetsbaarheden verholpen in Siemens producten | 2025-12-09T13:15:05.391966Z | 2025-12-09T13:15:05.391966Z |
| ncsc-2025-0381 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-12-08T08:23:21.965599Z | 2025-12-08T08:23:21.965599Z |
| ncsc-2025-0380 | Kwetsbaarheden verholpen in React Server Components | 2025-12-03T20:11:57.728117Z | 2025-12-05T12:13:36.590522Z |
| ncsc-2025-0379 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-12-02T13:25:17.745981Z | 2025-12-02T13:25:17.745981Z |
| ncsc-2025-0378 | Kwetsbaarheden verholpen in Mattermost | 2025-11-28T09:53:42.334621Z | 2025-11-28T09:53:42.334621Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:20433-1 | Security update for openexr | 2026-03-26T10:03:06Z | 2026-03-26T10:03:06Z |
| opensuse-su-2026:20432-1 | Security update for fetchmail | 2026-03-26T09:57:56Z | 2026-03-26T09:57:56Z |
| opensuse-su-2026:20427-1 | Security update for chromium | 2026-03-26T06:02:22Z | 2026-03-26T06:02:22Z |
| opensuse-su-2026:10441-1 | strongswan-6.0.5-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10440-1 | jupyter-nbclassic-1.3.3-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10439-1 | plexus-utils-4.0.2-2.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10438-1 | openbao-2.5.2-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10437-1 | libnghttp2-14-1.68.1-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10436-1 | freeipmi-1.6.17-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10435-1 | cpp-httplib-devel-0.38.0-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10434-1 | chromedriver-146.0.7680.164-1.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:10433-1 | LibVNCServer-devel-0.9.15-2.1 on GA media | 2026-03-26T00:00:00Z | 2026-03-26T00:00:00Z |
| opensuse-su-2026:20431-1 | Security update for python-PyJWT | 2026-03-25T18:07:39Z | 2026-03-25T18:07:39Z |
| opensuse-su-2026:20430-1 | Security update for python-PyPDF2 | 2026-03-25T15:51:00Z | 2026-03-25T15:51:00Z |
| opensuse-su-2026:20429-1 | Security update for python-dynaconf | 2026-03-25T14:59:11Z | 2026-03-25T14:59:11Z |
| opensuse-su-2026:20428-1 | Security update for gimp | 2026-03-25T14:24:42Z | 2026-03-25T14:24:42Z |
| opensuse-su-2026:20421-1 | Security update for python-ldap | 2026-03-25T10:40:32Z | 2026-03-25T10:40:32Z |
| opensuse-su-2026:20420-1 | Security update for ffmpeg-7 | 2026-03-25T10:03:00Z | 2026-03-25T10:03:00Z |
| opensuse-su-2026:20416-1 | Security update for the Linux Kernel | 2026-03-25T08:49:52Z | 2026-03-25T08:49:52Z |
| opensuse-su-2026:20419-1 | Security update for python-pyOpenSSL | 2026-03-25T03:41:43Z | 2026-03-25T03:41:43Z |
| opensuse-su-2026:20418-1 | Security update for python-pyasn1 | 2026-03-25T03:09:48Z | 2026-03-25T03:09:48Z |
| opensuse-su-2026:10432-1 | golang-github-v2fly-v2ray-core-5.47.0-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10431-1 | python311-oci-sdk-2.168.3-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10430-1 | python311-lmdb-2.1.1-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10429-1 | jupyter-jupyterlab-templates-0.5.2-4.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10428-1 | python311-jupyter-ydoc-3.4.0-2.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10427-1 | jupyter-matplotlib-0.11.7-17.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10426-1 | python311-intake-2.0.9-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10425-1 | python311-cbor2-5.9.0-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10424-1 | jupyter-bqplot-jupyterlab-0.5.46-14.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:5950 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.1.6 | 2026-03-26T14:51:43+00:00 | 2026-04-16T20:43:34+00:00 |
| rhsa-2026:5853 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-26T01:05:19+00:00 | 2026-04-16T20:43:34+00:00 |
| rhsa-2026:5852 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-26T00:58:34+00:00 | 2026-04-16T20:43:33+00:00 |
| rhsa-2026:5851 | Red Hat Security Advisory: DevWorkspace Operator 0.40.0 release. | 2026-03-25T23:56:41+00:00 | 2026-04-16T20:43:28+00:00 |
| rhsa-2026:5807 | Red Hat Security Advisory: RHOAI 2.16.4 - Red Hat OpenShift AI | 2026-03-25T12:32:51+00:00 | 2026-04-16T20:43:26+00:00 |
| rhsa-2026:5665 | Red Hat Security Advisory: Red Hat Quay 3.10.19 | 2026-03-24T18:02:58+00:00 | 2026-04-16T20:43:23+00:00 |
| rhsa-2026:5649 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-03-24T16:17:51+00:00 | 2026-04-16T20:43:22+00:00 |
| rhsa-2026:5645 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.17.1 | 2026-03-24T15:38:55+00:00 | 2026-04-16T20:43:22+00:00 |
| rhsa-2026:5549 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.4 | 2026-03-24T07:31:25+00:00 | 2026-04-16T20:43:21+00:00 |
| rhsa-2026:5544 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-24T06:55:51+00:00 | 2026-04-16T20:43:20+00:00 |
| rhsa-2026:5533 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-24T04:02:36+00:00 | 2026-04-16T20:43:20+00:00 |
| rhsa-2026:5463 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:40:06+00:00 | 2026-04-16T20:43:20+00:00 |
| rhsa-2026:5461 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-23T17:44:49+00:00 | 2026-04-16T20:43:20+00:00 |
| rhsa-2026:5452 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:13:04+00:00 | 2026-04-16T20:43:20+00:00 |
| rhsa-2026:5447 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:03:55+00:00 | 2026-04-16T20:43:19+00:00 |
| rhsa-2026:5444 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T15:45:35+00:00 | 2026-04-16T20:43:18+00:00 |
| rhsa-2026:5439 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T15:37:52+00:00 | 2026-04-16T20:43:17+00:00 |
| rhsa-2026:5394 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 director Operator container images | 2026-03-23T13:04:11+00:00 | 2026-04-16T20:43:17+00:00 |
| rhsa-2026:5327 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-23T07:40:40+00:00 | 2026-04-16T20:43:17+00:00 |
| rhsa-2026:5168 | Red Hat Security Advisory: Red Hat Quay 3.9.19 | 2026-03-19T19:18:06+00:00 | 2026-04-16T20:43:17+00:00 |
| rhsa-2026:5146 | Red Hat Security Advisory: yggdrasil security update | 2026-03-19T16:04:46+00:00 | 2026-04-16T20:43:16+00:00 |
| rhsa-2026:5145 | Red Hat Security Advisory: yggdrasil-worker-package-manager security update | 2026-03-19T15:42:26+00:00 | 2026-04-16T20:43:15+00:00 |
| rhsa-2026:5132 | Red Hat Security Advisory: Kiali 1.73.28 for Red Hat OpenShift Service Mesh 2.6 | 2026-03-19T14:09:55+00:00 | 2026-04-16T20:43:15+00:00 |
| rhsa-2026:5079 | Red Hat Security Advisory: rhc security update | 2026-03-19T09:49:36+00:00 | 2026-04-16T20:43:15+00:00 |
| rhsa-2026:5131 | Red Hat Security Advisory: Kiali 2.11.8 for Red Hat OpenShift Service Mesh 3.1 | 2026-03-19T14:08:55+00:00 | 2026-04-16T20:43:13+00:00 |
| rhsa-2026:5130 | Red Hat Security Advisory: Kiali 2.17.5 for Red Hat OpenShift Service Mesh 3.2 | 2026-03-19T14:08:59+00:00 | 2026-04-16T20:43:13+00:00 |
| rhsa-2026:5129 | Red Hat Security Advisory: Kiali 2.4.14 for Red Hat OpenShift Service Mesh 3.0 | 2026-03-19T14:08:51+00:00 | 2026-04-16T20:43:13+00:00 |
| rhsa-2026:5110 | Red Hat Security Advisory: Multicluster Global Hub 1.5.4 security update | 2026-03-19T10:27:09+00:00 | 2026-04-16T20:43:12+00:00 |
| rhsa-2026:5031 | Red Hat Security Advisory: rhc security update | 2026-03-19T05:19:39+00:00 | 2026-04-16T20:43:08+00:00 |
| rhsa-2026:5078 | Red Hat Security Advisory: rhc security update | 2026-03-19T21:11:27+00:00 | 2026-04-16T20:43:07+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2023-318-01 | PowerLogic ION8650, PowerLogic ION8800 | 2023-11-14T00:00:00.000Z | 2023-12-12T00:00:00.000Z |
| sevd-2023-318-02 | EcoStruxure Power Monitoring Expert and EcoStruxure™ Power Operation with Advanced Reporting and Dashboards Module | 2023-11-14T00:00:00.000Z | 2023-11-14T00:00:00.000Z |
| sevd-2023-283-02 | EcoStruxure Power Monitoring Expert and EcoStruxure™ Power | 2023-10-10T12:17:45.000Z | 2023-10-10T12:17:45.000Z |
| sevd-2023-283-01 | SpaceLogic C-Bus Toolkit | 2023-10-10T12:00:34.000Z | 2023-10-10T12:00:34.000Z |
| sevd-2023-255-01 | IGSS (Interactive Graphical SCADA System) | 2023-09-12T10:52:23.000Z | 2023-09-12T10:52:23.000Z |
| sevd-2023-220-01 | Pro-face GP-Pro EX | 2023-08-08T06:32:38.000Z | 2023-08-08T06:32:38.000Z |
| sevd-2023-192-01 | StruxureWare Data Center Expert | 2023-07-11T07:37:38.000Z | 2023-07-11T07:37:38.000Z |
| sevd-2023-192-03 | Accutech Manager | 2023-07-11T06:49:15.000Z | 2023-07-11T06:49:15.000Z |
| sevd-2023-164-03 | Foxboro SCADA | 2023-06-13T12:34:32.000Z | 2023-06-13T12:34:32.000Z |
| sevd-2023-164-02 | IGSS (Interactive Graphical SCADA System) | 2023-06-13T11:43:59.000Z | 2023-06-13T11:43:59.000Z |
| sevd-2023-164-04 | EcoStruxureTM Foxboro DCS Control Core Services | 2023-06-13T09:20:49.000Z | 2023-06-13T09:20:49.000Z |
| sevd-2023-164-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2023-06-13T09:08:30.000Z | 2023-06-13T09:08:30.000Z |
| sevd-2023-129-01 | OPC Factory Server | 2023-05-09T16:33:38.000Z | 2023-05-09T16:33:38.000Z |
| sevd-2023-129-03 | PowerLogic ION7400 / PM8000 / ION9000 Power Meters | 2023-05-09T16:02:26.000Z | 2023-05-09T16:02:26.000Z |
| sevd-2023-129-02 | EcoStruxure™ Power SCADA Operation | 2023-05-09T11:52:40.000Z | 2023-05-09T11:52:40.000Z |
| sevd-2023-129-04 | Power SCADA Anywhere | 2023-05-09T08:00:55.000Z | 2023-05-09T08:00:55.000Z |
| sevd-2021-217-01 | NicheStack TCP/IP Vulnerabilities (INFRA:HALT) in Lexium ILE, ILA, ILS, and Communication Option Boards for Altivar and Lexium32 drives | 2021-08-05T06:29:08.000Z | 2023-05-09T06:29:00.000Z |
| sevd-2023-101-06 | Easergy Builder | 2023-04-11T14:20:02.000Z | 2023-04-11T14:20:02.000Z |
| sevd-2023-101-02 | Conext™ Gateway/ InsightHome and InsightFacility | 2023-04-11T14:01:38.000Z | 2023-04-11T14:01:38.000Z |
| sevd-2022-087-01 | SCADAPack Workbench | 2022-03-28T13:51:11.000Z | 2023-04-11T13:51:11.000Z |
| sevd-2022-011-06 | CODESYS V3 Runtime, Development System, and Gateway Vulnerabilities | 2022-01-11T07:08:13.000Z | 2023-04-11T11:30:00.000Z |
| sevd-2020-315-07 | PLC Simulator on EcoStruxure™ Control Expert and Process Expert | 2020-11-10T15:07:11.000Z | 2023-03-14T15:07:11.000Z |
| sevd-2023-073-04 | IGSS (Interactive Graphical SCADA System) | 2023-03-14T10:58:24.000Z | 2023-03-14T10:58:24.000Z |
| sevd-2023-073-02 | PowerLogic™ HDPM6000 | 2023-03-14T09:26:56.000Z | 2023-03-14T09:26:56.000Z |
| sevd-2023-010-02 | EcoStruxure Geo SCADA Expert | 2023-01-10T16:24:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2022-165-01 | IGSS (Interactive Graphical SCADA System) | 2022-06-14T18:30:00.000Z | 2023-03-13T18:30:00.000Z |
| sevd-2021-257-02 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Premium and Associated Communication Modules | 2021-09-14T20:04:00.000Z | 2023-02-14T20:04:43.000Z |
| sevd-2020-315-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-11-10T12:05:04.000Z | 2023-02-14T12:05:00.000Z |
| sevd-2023-045-02 | StruxureWare Data Center Expert | 2023-02-14T08:05:19.000Z | 2023-02-14T08:05:19.000Z |
| sevd-2023-045-03 | Merten KNX devices | 2023-02-14T07:24:05.000Z | 2023-02-14T07:24:05.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-534283 | SSA-534283: Insecure File Share Vulnerability in SIMATIC Virtualization as a Service (SIVaaS) | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-503939 | SSA-503939: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP | 2025-03-11T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-494539 | SSA-494539: Multiple Vulnerabilities in SINEC OS | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-331739 | SSA-331739: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting Siemens Products | 2025-08-12T00:00:00Z | 2025-09-09T00:00:00Z |
| ssa-707630 | SSA-707630: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager Before V3.3 | 2025-08-12T00:00:00Z | 2025-08-26T00:00:00Z |
| ssa-395458 | SSA-395458: Account Hijacking Vulnerability in Mendix SAML Module | 2025-08-14T00:00:00Z | 2025-08-14T00:00:00Z |
| ssa-028723 | SSA-028723: Multiple OpenSSL Vulnerabilities in BFCClient Before V2.17 | 2025-08-12T00:00:00Z | 2025-08-13T00:00:00Z |
| ssa-994087 | SSA-994087: Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.7 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-914892 | SSA-914892: Race Condition Vulnerability in Basic Authentication Implementation of Mendix Runtime | 2024-11-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-908185 | SSA-908185: Mirror Port Isolation Vulnerability in RUGGEDCOM ROS Devices | 2023-08-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-894058 | SSA-894058: Improper Bandwidth Limitation of Network Packets Over Local USB Port Vulnerability in SIPROTEC 5 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-856721 | SSA-856721: Vulnerability in RUGGEDCOM Discovery Protocol (RCDP) of Industrial Communication Devices | 2017-09-28T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-840800 | SSA-840800: Code Injection Vulnerability in RUGGEDCOM ROS | 2022-07-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-787941 | SSA-787941: Denial of Service Vulnerability in RUGGEDCOM ROS devices | 2022-11-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-770902 | SSA-770902: Denial of Service Vulnerability in the Web Server of RUGGEDCOM ROS Devices | 2023-08-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-769791 | SSA-769791: Local Arbitrary Code Execution Vulnerability in COMOS Before V10.6 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-767615 | SSA-767615: Information Disclosure Vulnerability in SIPROTEC 5 Devices | 2025-02-11T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-764417 | SSA-764417: Weak Encryption Vulnerability in RUGGEDCOM ROS Devices | 2022-03-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-674084 | SSA-674084: File Parsing Vulnerabilities in Simcenter Femap Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-665108 | SSA-665108: Arbitrary File Upload Vulnerability in RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-529291 | SSA-529291: Information Disclosure Vulnerabilities in SICAM Q100/Q200 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-517338 | SSA-517338: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V3.0 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-493787 | SSA-493787: Arbitrary Code Execution Vulnerability in SIMATIC RTLS Locating Manager Before V3.2 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-460466 | SSA-460466: Denial of Service Vulnerability in TIA Project-Server and TIA Portal | 2025-07-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-446307 | SSA-446307: Authentication Bypass Vulnerability in BMC (CVE-2024-54085) affects SIMATIC IPC RS-828A | 2025-05-13T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-400089 | SSA-400089: Denial of Service Vulnerability in SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-398330 | SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP >= V3.1.0 and < V3.1.5 | 2023-12-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-382999 | SSA-382999: Multiple Vulnerabilities in Opcenter Quality Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-353002 | SSA-353002: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-256353 | SSA-256353: Third-Party Component Vulnerabilities in RUGGEDCOM ROS | 2022-03-08T00:00:00Z | 2025-08-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21085-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21084-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21083-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21082-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21081-1 | Security update for the Linux Kernel RT (Live Patch 15 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21055-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21054-1 | Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21053-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21052-1 | Security update for the Linux Kernel RT (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21051-1 | Security update for the Linux Kernel RT (Live Patch 15 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:43Z | 2026-04-09T13:20:43Z |
| suse-su-2026:21080-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:33Z | 2026-04-09T13:20:33Z |
| suse-su-2026:21050-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:33Z | 2026-04-09T13:20:33Z |
| suse-su-2026:21079-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21078-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21049-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21048-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:25Z | 2026-04-09T13:20:25Z |
| suse-su-2026:21077-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21076-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21047-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21046-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:15Z | 2026-04-09T13:20:15Z |
| suse-su-2026:21075-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21074-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21045-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21044-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:06Z | 2026-04-09T13:20:06Z |
| suse-su-2026:21073-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21072-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21071-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21070-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21043-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21042-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:3443 | Important: valkey security update | 2026-02-26T00:00:00Z | 2026-03-05T07:52:10Z |
| alsa-2026:3476 | Important: udisks2 security update | 2026-03-02T00:00:00Z | 2026-03-05T07:49:03Z |
| alsa-2026:3517 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-05T07:45:44Z |
| alsa-2026:3515 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-04T11:54:18Z |
| alsa-2026:3669 | Important: go-rpm-macros security update | 2026-03-03T00:00:00Z | 2026-03-04T11:09:35Z |
| alsa-2026:3668 | Important: go-rpm-macros security update | 2026-03-03T00:00:00Z | 2026-03-04T11:06:04Z |
| alsa-2026:3638 | Moderate: nginx:1.24 security update | 2026-03-03T00:00:00Z | 2026-03-04T10:33:37Z |
| alsa-2026:3488 | Moderate: kernel security update | 2026-03-02T00:00:00Z | 2026-03-04T10:30:56Z |
| alsa-2026:3507 | Important: valkey security update | 2026-03-02T00:00:00Z | 2026-03-04T10:26:29Z |
| alsa-2026:3516 | Important: thunderbird security update | 2026-03-02T00:00:00Z | 2026-03-04T10:23:48Z |
| alsa-2026:3551 | Important: libpng security update | 2026-03-02T00:00:00Z | 2026-03-04T10:21:19Z |
| alsa-2026:3463 | Moderate: kernel-rt security update | 2026-03-02T00:00:00Z | 2026-03-03T15:13:38Z |
| alsa-2026:3464 | Moderate: kernel security update | 2026-03-02T00:00:00Z | 2026-03-03T15:09:58Z |
| alsa-2026:3428 | Important: container-tools:rhel8 security update | 2026-02-26T00:00:00Z | 2026-03-02T15:20:08Z |
| alsa-2026:3407 | Important: mingw-fontconfig security update | 2026-02-26T00:00:00Z | 2026-03-02T15:16:03Z |
| alsa-2026:3477 | Moderate: gnutls security update | 2026-03-02T00:00:00Z | 2026-03-02T13:35:48Z |
| alsa-2026:3405 | Important: libpng security update | 2026-02-26T00:00:00Z | 2026-03-02T13:11:42Z |
| alsa-2026:3275 | Moderate: kernel security update | 2026-02-25T00:00:00Z | 2026-03-02T13:07:09Z |
| alsa-2026:3341 | Important: containernetworking-plugins security update | 2026-02-25T00:00:00Z | 2026-03-02T12:59:54Z |
| alsa-2026:3340 | Important: skopeo security update | 2026-02-25T00:00:00Z | 2026-03-02T12:57:45Z |
| alsa-2026:3338 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-03-02T12:54:29Z |
| alsa-2026:3336 | Important: podman security update | 2026-02-25T00:00:00Z | 2026-02-26T13:31:46Z |
| alsa-2026:3343 | Important: skopeo security update | 2026-02-25T00:00:00Z | 2026-02-26T13:30:14Z |
| alsa-2026:3354 | Important: python-pyasn1 security update | 2026-02-25T00:00:00Z | 2026-02-26T13:28:33Z |
| alsa-2026:3031 | Important: libpng15 security update | 2026-02-23T00:00:00Z | 2026-02-26T10:52:26Z |
| alsa-2026:3033 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-26T10:51:19Z |
| alsa-2026:3034 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-26T10:49:31Z |
| alsa-2026:3035 | Important: grafana-pcp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:48:18Z |
| alsa-2026:3066 | Moderate: kernel security update | 2026-02-23T00:00:00Z | 2026-02-26T10:43:00Z |
| alsa-2026:3067 | Important: freerdp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:36:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-763 | Heap-buffer-overflow in sqlite3VdbeExec | 2022-08-21T00:00:23.656015Z | 2026-02-26T14:12:24.701998Z |
| osv-2026-311 | UNKNOWN READ in strncasecmp | 2026-02-26T00:16:50.091819Z | 2026-02-26T00:16:50.092121Z |
| osv-2026-308 | Heap-buffer-overflow in vcardstructured_new_from_string | 2026-02-25T00:19:49.963815Z | 2026-02-25T00:19:49.964188Z |
| osv-2026-307 | Global-buffer-overflow in navcom_parse | 2026-02-25T00:16:23.864362Z | 2026-02-25T00:16:23.864694Z |
| osv-2026-304 | Heap-use-after-free in tf::Executor::_invoke | 2026-02-25T00:09:10.290694Z | 2026-02-25T00:09:10.291030Z |
| osv-2026-302 | Use-of-uninitialized-value in BIO_new_file | 2026-02-25T00:07:20.338981Z | 2026-02-25T00:07:20.339278Z |
| osv-2026-300 | UNKNOWN WRITE in nmeaid_to_prn | 2026-02-25T00:06:00.225480Z | 2026-02-25T00:06:00.225972Z |
| osv-2026-297 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-02-24T00:02:29.789817Z | 2026-02-24T00:02:29.790144Z |
| osv-2026-292 | UNKNOWN WRITE in <wasmtime::runtime::func::Func>::call_unchecked_raw::< | 2026-02-23T00:19:15.717984Z | 2026-02-23T00:19:15.718280Z |
| osv-2026-272 | Heap-use-after-free in vcardproperty_get_value | 2026-02-21T00:20:10.455944Z | 2026-02-21T00:20:10.456357Z |
| osv-2022-1165 | Heap-buffer-overflow in parse_content_length | 2022-11-12T13:00:05.964113Z | 2026-02-19T14:11:05.455361Z |
| osv-2026-261 | Segv on unknown address in ___interceptor_strtol | 2026-02-19T00:09:21.893775Z | 2026-02-19T00:09:21.894076Z |
| osv-2026-259 | Use-of-uninitialized-value in tsip_parse_input | 2026-02-18T00:14:29.378028Z | 2026-02-18T00:14:29.378341Z |
| osv-2023-819 | Heap-buffer-overflow in ucl_object_dtor_unref_single | 2023-09-09T14:01:07.368928Z | 2026-02-17T14:21:16.973749Z |
| osv-2023-78 | Heap-buffer-overflow in ucl_object_dtor_unref_single | 2023-02-18T13:01:01.445224Z | 2026-02-17T14:21:11.808505Z |
| osv-2021-1261 | UNKNOWN READ in kh_get_ucl_hash_node | 2021-09-15T00:00:41.384284Z | 2026-02-17T14:15:50.348749Z |
| osv-2026-255 | UNKNOWN WRITE in nmeaid_to_prn | 2026-02-17T00:17:19.574579Z | 2026-02-17T00:17:19.574905Z |
| osv-2026-244 | Use-of-uninitialized-value in ihevcd_fmt_conv | 2026-02-15T00:03:36.246033Z | 2026-02-15T00:03:36.246568Z |
| osv-2026-242 | Use-of-uninitialized-value in ntrip_parse_url | 2026-02-14T00:17:42.945923Z | 2026-02-14T00:17:42.946299Z |
| osv-2026-240 | Use-of-uninitialized-value in packet_get1 | 2026-02-14T00:09:50.559032Z | 2026-02-14T00:09:50.559326Z |
| osv-2025-219 | Heap-buffer-overflow in opj_j2k_read_tile_header | 2025-03-18T00:18:30.566980Z | 2026-02-11T14:21:43.026699Z |
| osv-2022-725 | Heap-buffer-overflow in jxl::N_EMU128::WriteToU8Stage::ProcessRow | 2022-08-18T00:01:05.918943Z | 2026-02-11T14:11:54.187880Z |
| osv-2022-608 | Heap-use-after-free in jxl::WriteToPixelCallbackStage::ProcessRow | 2022-07-21T00:01:50.967627Z | 2026-02-11T14:11:11.571040Z |
| osv-2026-216 | Heap-buffer-overflow in mg_mqtt_next_prop | 2026-02-10T00:08:51.349946Z | 2026-02-11T14:08:38.238200Z |
| osv-2026-229 | Segv on unknown address in aiAnimation::~aiAnimation | 2026-02-11T00:12:18.313233Z | 2026-02-11T00:12:18.313574Z |
| osv-2026-226 | UNKNOWN WRITE in decode_xa2_00 | 2026-02-11T00:10:08.757600Z | 2026-02-11T00:10:08.757920Z |
| osv-2026-215 | UNKNOWN READ in getTypeCacheHashTableBucket | 2026-02-10T00:07:25.477890Z | 2026-02-10T00:07:25.478286Z |
| osv-2026-212 | UNKNOWN READ in gpsd_poll | 2026-02-09T00:15:09.775765Z | 2026-02-09T00:15:09.776491Z |
| osv-2022-519 | Stack-buffer-overflow in LookupThousands | 2022-06-29T00:00:24.107785Z | 2026-02-08T14:10:55.777894Z |
| osv-2022-462 | Stack-buffer-overflow in strcat | 2022-06-07T00:01:47.521548Z | 2026-02-08T14:10:42.909724Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0145 | `uniswap-utils` was removed from crates.io for malicious code | 2025-12-03T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2022-0042 | malicious crate `rustdecimal` | 2022-05-10T12:00:00Z | 2026-03-17T22:31:38Z |
| rustsec-2026-0041 | Decompressing invalid data can leak information from uninitialized memory or reused output buffer | 2026-03-17T12:00:00Z | 2026-03-17T16:08:45Z |
| rustsec-2026-0037 | Denial of service in Quinn endpoints | 2026-03-09T12:00:00Z | 2026-03-14T07:21:57Z |
| rustsec-2023-0083 | blurhash: panic on parsing crafted blurhash inputs | 2023-09-19T12:00:00Z | 2026-03-11T10:51:38Z |
| rustsec-2023-0082 | phonenumber: panic on parsing crafted RF3966 phonenumber inputs | 2023-09-19T12:00:00Z | 2026-03-11T10:37:17Z |
| rustsec-2026-0038 | RustSec Advisory | 2026-03-08T12:00:00Z | 2026-03-11T06:21:51Z |
| rustsec-2026-0035 | Cache poisoning via insecure-by-default cache key | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2026-0034 | HTTP Request Smuggling via HTTP/1.0 and Transfer-Encoding Misparsing | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2026-0033 | HTTP Request Smuggling via Premature Upgrade | 2026-03-04T12:00:00Z | 2026-03-09T20:53:55Z |
| rustsec-2025-0140 | Non-utf8 String can be created with `TimeBuf::as_str` | 2025-12-29T12:00:00Z | 2026-03-04T07:42:48Z |
| rustsec-2026-0029 | Double-free and use-after-free for Hive | 2026-02-26T12:00:00Z | 2026-03-01T06:01:36Z |
| rustsec-2025-0153 | hexchat crate is unsound and unmaintained | 2025-11-17T12:00:00Z | 2026-02-26T06:11:28Z |
| rustsec-2026-0026 | Unnecessary clamping of seed reduces seed entropy to 251 bits | 2026-02-05T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0025 | Panic in `libcrux-psq` on decryption of malformed AES-GCM ciphertext | 2026-02-08T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0024 | Incorrect X25519 clamping check rejects all secrets on import | 2026-01-26T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0023 | X25519 secret validation did not check buffer length or clamping | 2026-01-26T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0022 | Panic when dropping a `[Typed]Func::call_async` future | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0021 | Panic adding excessive fields to a `wasi:http/types.fields` instance | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0020 | Guest-controlled resource exhaustion in WASI implementations | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0013 | Type confusion when accessing data from sublasses of subclasses of native types with `abi3` feature targeting Python 3.12 and up | 2026-02-18T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2026-0012 | Unsoundness in opt-in ARMv8 assembly backend for `keccak` | 2026-02-12T12:00:00Z | 2026-02-20T04:00:15Z |
| rustsec-2025-0142 | Segmentation fault and invalid memory read in `mnl::cb_run` | 2025-10-18T12:00:00Z | 2026-02-10T13:23:41Z |
| rustsec-2025-0149 | World Writable Directory in /var/log/below Allows Local Privilege Escalation | 2025-03-12T12:00:00Z | 2026-02-08T07:26:28Z |
| rustsec-2026-0009 | Denial of Service via Stack Exhaustion | 2026-02-05T12:00:00Z | 2026-02-06T09:12:16Z |
| rustsec-2026-0008 | Potential undefined behavior when dereferencing Buf struct | 2026-02-02T12:00:00Z | 2026-02-05T06:08:13Z |
| rustsec-2026-0007 | Integer overflow in `BytesMut::reserve` | 2026-02-03T12:00:00Z | 2026-02-04T06:56:11Z |
| rustsec-2026-0006 | Wasmtime segfault or unused out-of-sandbox load with `f64.copysign` operator on x86-64 | 2026-01-26T12:00:00Z | 2026-01-30T05:41:11Z |
| rustsec-2025-0143 | Unsound APIs of public `constant::Reader` and `StructSchema` | 2025-12-24T12:00:00Z | 2026-01-29T05:56:50Z |
| rustsec-2025-0144 | Timing side-channel in ML-DSA decomposition | 2025-12-12T12:00:00Z | 2026-01-27T22:28:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-minio-2026-34204 | MinIO is Vulnerable to SSE Metadata Injection via Replication Headers | 2026-04-06T09:26:13.602Z | 2026-04-06T11:34:08.453Z |
| bit-prestashop-2026-33674 | PrestaShop: Improper Use of Validation Framework | 2026-03-30T11:49:50.984Z | 2026-04-06T08:26:41.107Z |
| bit-prestashop-2026-33673 | PrestaShop has multiple stored XSS vulnerabilities via unprotected Template variables | 2026-03-30T11:49:49.224Z | 2026-04-06T08:26:41.107Z |
| bit-node-2026-21712 | 2026-04-06T07:58:33.472Z | 2026-04-06T08:26:41.107Z | |
| bit-node-2026-21711 | 2026-04-06T07:58:30.648Z | 2026-04-06T08:26:41.107Z | |
| bit-mongodb-2026-5170 | Users could trigger a crash of mongod primaries during promotion to sharded | 2026-04-06T07:54:20.562Z | 2026-04-06T08:26:41.107Z |
| bit-mongodb-2026-4358 | Memory safety issues in slot-based execution hash table spill | 2026-04-06T07:54:17.803Z | 2026-04-06T08:26:41.107Z |
| bit-kyverno-2026-4789 | CVE-2026-4789 | 2026-04-06T07:49:20.364Z | 2026-04-06T08:26:41.107Z |
| bit-grafana-2026-21724 | Missing Protected-field Authorization in Provisioning Contact Points API | 2026-04-06T07:50:18.770Z | 2026-04-06T08:26:41.107Z |
| bit-drupal-2025-31675 | Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2025-004 | 2025-06-03T14:41:48.563Z | 2026-04-06T08:26:41.107Z |
| bit-dotnet-2026-26131 | .NET Elevation of Privilege Vulnerability | 2026-04-06T07:48:26.731Z | 2026-04-06T08:26:41.107Z |
| bit-dotnet-2026-26127 | .NET Denial of Service Vulnerability | 2026-04-06T07:48:23.759Z | 2026-04-06T08:26:41.107Z |
| bit-cilium-2026-33726 | Cilium L7 proxy may bypass Kubernetes NetworkPolicy for same-node traffic | 2026-04-06T07:45:24.262Z | 2026-04-06T08:26:41.107Z |
| bit-mariadb-2026-32710 | Heap-based Buffer Overflow in MariaDB | 2026-03-25T08:46:04.911Z | 2026-04-01T09:11:42.692Z |
| bit-gitlab-2025-13611 | Insertion of Sensitive Information into Log File in GitLab | 2025-12-02T12:03:48.649Z | 2026-04-01T09:11:42.692Z |
| bit-appsmith-2026-34411 | Appsmith < 1.98 Unauthenticated Instance Configuration Disclosure via Management APIs | 2026-04-01T08:35:37.595Z | 2026-04-01T09:11:42.692Z |
| bit-discourse-2026-29072 | Discourse missing permission check for policy creation in discourse-policy | 2026-03-27T07:10:21.008Z | 2026-03-31T21:15:21.591Z |
| bit-discourse-2026-28282 | Discourse vulnerable to group membership addition permission bypass via discourse-policy plugin | 2026-03-27T07:10:17.839Z | 2026-03-31T21:15:21.591Z |
| bit-discourse-2026-27936 | Discourse discloses restricted post-action counts to non-privileged users | 2026-03-27T07:10:06.332Z | 2026-03-31T21:15:21.591Z |
| bit-discourse-2026-27935 | Discourse leaks private topic metadata to non-authorized users | 2026-03-27T07:10:03.445Z | 2026-03-31T21:15:21.591Z |
| bit-jenkins-2026-33002 | 2026-03-20T09:15:13.235Z | 2026-03-31T18:23:47.490Z | |
| bit-mastodon-2026-33869 | Mastodon has a denial of service for quote authorization | 2026-03-31T08:45:37.827Z | 2026-03-31T09:14:23.567Z |
| bit-mastodon-2026-33868 | Mastodon has a GET-Based Open Redirect via '/web/%2F<domain>' | 2026-03-31T08:45:35.531Z | 2026-03-31T09:14:23.567Z |
| bit-gitlab-2026-3857 | Cross-Site Request Forgery (CSRF) in GitLab | 2026-03-27T12:15:15.885Z | 2026-03-31T09:14:23.567Z |
| bit-gitlab-2026-2370 | Improper Handling of Parameters in GitLab | 2026-03-31T09:12:36.844Z | 2026-03-31T09:14:23.567Z |
| bit-nats-2026-33249 | NATS: Message tracing can be redirected to arbitrary subject | 2026-03-30T11:45:25.356Z | 2026-03-30T12:13:12.971Z |
| bit-nats-2026-33248 | NATS has mTLS verify_and_map authentication bypass via incorrect Subject DN matching | 2026-03-27T17:45:26.680Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33247 | NATS credentials are exposed in monitoring port via command-line argv | 2026-03-27T17:45:24.871Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33246 | NATS: Leafnode connections allow spoofing of Nats-Request-Info identity headers | 2026-03-27T17:45:23.082Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33223 | NATS Server: Incomplete Stripping of Nats-Request-Info Header Allows Identity Spoofing | 2026-03-27T17:45:21.527Z | 2026-03-27T18:14:10.313Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-jk84667 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.7.0-r7, 2.7.0-r8 | 2026-04-01T09:10:09.429544Z | 2026-03-28T10:13:46Z |
| cleanstart-2026-cb01846 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.6.1-r0, 2.6.1-r1, 2.6.1-r7 | 2026-04-01T09:10:27.866703Z | 2026-03-28T10:13:21Z |
| cleanstart-2026-dg06447 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.12.2-r0, 2.12.2-r1 | 2026-04-01T09:10:38.729051Z | 2026-03-28T10:04:36Z |
| cleanstart-2026-gq31133 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-527x-5wrf-22m2, ghsa-9h8m-3fm2-qjrq, ghsa-c9v3-4pv7-87pr, ghsa-h75p-j8xm-m278, ghsa-p77j-4mvh-x3m3 applied in versions: 1.26.7-r0, 1.26.7-r1, 1.26.7-r2 | 2026-04-01T09:10:41.066012Z | 2026-03-28T10:03:10Z |
| cleanstart-2026-mj07404 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-527x-5wrf-22m2, ghsa-9h8m-3fm2-qjrq, ghsa-c9v3-4pv7-87pr, ghsa-h75p-j8xm-m278, ghsa-p77j-4mvh-x3m3 applied in versions: 1.26.7-r0, 1.26.7-r1, 1.26.7-r2 | 2026-04-01T09:10:45.280620Z | 2026-03-28T10:02:34Z |
| cleanstart-2026-kj02127 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.8.6-r0, 1.8.6-r1 | 2026-04-01T09:11:01.446923Z | 2026-03-28T10:00:21Z |
| cleanstart-2026-cg86499 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 3.6.5-r0 | 2026-04-01T09:11:07.076579Z | 2026-03-28T09:58:50Z |
| cleanstart-2026-gz72045 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.51.2-r0 | 2026-04-01T09:11:42.310345Z | 2026-03-28T09:54:58Z |
| cleanstart-2026-oj21550 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-24051, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.34.2-r0, 1.35.0-r0, 1.35.3-r0 | 2026-04-01T09:12:23.484446Z | 2026-03-28T09:40:45Z |
| cleanstart-2026-cf63743 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.34.2-r0, 1.34.6-r0 | 2026-04-01T09:12:16.516536Z | 2026-03-28T09:39:54Z |
| cleanstart-2026-jf28061 | Security fixes for CVE-2026-24051, CVE-2026-26958, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 2.19.0-r0, 2.19.0-r1 | 2026-04-01T09:12:22.444974Z | 2026-03-27T12:52:14Z |
| cleanstart-2026-ac65885 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25518, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 1.18.0-r0, 1.18.0-r1, 1.18.0-r2, 1.18.0-r3 | 2026-04-01T09:13:17.231184Z | 2026-03-27T06:25:28Z |
| cleanstart-2026-kz45320 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:16:45.727713Z | 2026-03-26T18:22:34Z |
| cleanstart-2026-bd71263 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:17:26.065920Z | 2026-03-26T17:04:08Z |
| cleanstart-2026-jr35772 | Security fixes for CVE-2017-14919, CVE-2017-15896, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12121, CVE-2018-12122, CVE-2018-7160, CVE-2018-7161, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-5737, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, CVE-2020-11080, CVE-2020-7774, CVE-2020-8172, CVE-2020-8174, CVE-2020-8201, CVE-2020-8252, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2021-21148, CVE-2021-22930, CVE-2021-22931, CVE-2021-22959, CVE-2021-22960, CVE-2021-3672, CVE-2021-43803, CVE-2021-44531, CVE-2021-44532, CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-35255, CVE-2022-35256, CVE-2022-3602, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807, CVE-2023-39333, CVE-2023-44487, CVE-2024-22018, CVE-2024-22020, CVE-2024-27982, CVE-2024-27983, CVE-2024-36138, CVE-2024-37372 applied in versions: 10.14.0-r0, 10.15.3-r0, 10.16.3-r0, 12.15.0-r0, 12.18.0-r0, 12.18.4-r0, 14.15.1-r0, 14.15.4-r0, 14.15.5-r0, 14.16.0-r0, 14.16.1-r0, 14.17.4-r0, 14.17.5-r0, 14.17.6-r0, 14.18.1-r0, 16.13.2-r0, 16.17.1-r0, 18.12.1-r0, 18.14.1-r0, 18.17.1-r0, 18.18.2-r0, 20.12.1-r0, 20.15.1-r0, 6.11.1-r0, 6.11.5-r0, 8.11.0-r0, 8.11.3-r0, 8.11.4-r0, 8.9.3-r0 | 2026-04-01T09:17:37.864227Z | 2026-03-26T15:01:29Z |
| cleanstart-2026-ow78143 | Security fixes for CVE-2025-68156, CVE-2026-24051, CVE-2026-26958, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 2.18.3-r0, 2.18.3-r1 | 2026-04-01T09:14:00.541150Z | 2026-03-26T14:38:42Z |
| cleanstart-2026-eq25508 | Security fixes for CVE-2025-11082, CVE-2025-11083 applied in versions: 2.46.0-r0 | 2026-04-01T09:16:21.124779Z | 2026-03-26T13:10:59Z |
| cleanstart-2026-em10970 | Security fixes for CVE-2017-9233, CVE-2019-15903, CVE-2021-45960, CVE-2021-46143, CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-22825, CVE-2022-22826, CVE-2022-22827, CVE-2022-23852, CVE-2022-23990, CVE-2022-25235, CVE-2022-25236, CVE-2022-25313, CVE-2022-25314, CVE-2022-25315, CVE-2022-40674, CVE-2022-43680, CVE-2023-52425, CVE-2023-52426, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-50602, CVE-2026-24515, CVE-2026-25210, CVE-2026-32767 applied in versions: 2.2.0-r1, 2.2.7-r0, 2.2.7-r1, 2.4.3-r0, 2.4.4-r0, 2.4.5-r0, 2.4.9-r0, 2.5.0-r0, 2.6.0-r0, 2.6.2-r0, 2.6.3-r0, 2.6.4-r0, 2.7.2-r0, 2.7.5-r0 | 2026-04-01T09:16:01.861201Z | 2026-03-26T13:10:59Z |
| cleanstart-2026-ma32024 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-33186, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1, 3.3.3-r0, 3.3.4-r0 | 2026-04-01T09:19:21.169476Z | 2026-03-26T07:01:17Z |
| cleanstart-2026-gi40937 | Security fixes for CVE-2023-5870, CVE-2024-7348, CVE-2025-8713, CVE-2025-8714, CVE-2025-8715 applied in versions: 16.1-r0, 16.2-r0, 16.4-r0, 17.6-r0 | 2026-04-01T09:18:12.444694Z | 2026-03-26T07:01:17Z |
| cleanstart-2026-mx45462 | Security fixes for CVE-2025-61729 applied in versions: 1.1.0-r0 | 2026-04-01T09:18:16.445023Z | 2026-03-25T14:24:33Z |
| cleanstart-2026-ae87452 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.20.12-r0, 1.20.12-r1, 1.20.12-r2 | 2026-04-01T09:19:15.219275Z | 2026-03-25T14:22:43Z |
| cleanstart-2026-ha09227 | Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.18.0-r1 | 2026-04-01T09:19:28.951475Z | 2026-03-25T14:21:54Z |
| cleanstart-2026-gm63718 | Security fixes for CVE-2025-15558, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-25934, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-q9hv-hpm4-hj6x applied in versions: 1.39.0-r0, 1.39.0-r1, 1.39.0-r2, 1.39.0-r3 | 2026-04-01T09:19:09.281060Z | 2026-03-25T14:21:09Z |
| cleanstart-2026-ls12576 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 1.16.2-r2, 1.17.2-r0, 1.17.2-r1, 1.18.0-r0 | 2026-04-01T09:19:50.661957Z | 2026-03-25T14:09:04Z |
| cleanstart-2026-pn56882 | Security fixes for CVE-2026-24051 applied in versions: 1.65.0-r0 | 2026-04-01T09:19:27.916186Z | 2026-03-25T14:07:29Z |
| cleanstart-2026-jg61689 | Security fixes for CVE-2025-15558, CVE-2026-33186, ghsa-p436-gjf2-799p applied in versions: 1.29.0-r0, 1.29.0-r1 | 2026-04-01T09:19:48.393428Z | 2026-03-25T13:59:35Z |
| cleanstart-2026-ic68874 | Security fixes for CVE-2025-15558, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.13.4-r0, 2.13.4-r1 | 2026-04-01T09:20:18.599218Z | 2026-03-25T11:32:52Z |
| cleanstart-2026-gm18965 | Security fixes for CVE-2025-15558, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.2-r2 | 2026-04-01T09:20:25.238160Z | 2026-03-25T11:27:12Z |
| cleanstart-2026-at91215 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2x5j-vhc8-9cwm, ghsa-6m8w-jc87-6cr7, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-vvgc-356p-c3xw applied in versions: 1.14.4-r1, 1.14.4-r2, 1.15.3-r1, 1.15.3-r2 | 2026-04-01T09:20:36.013002Z | 2026-03-25T11:15:10Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-ale-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2022-ALE-003 | [MàJ] Vulnérabilité dans l'implémentation du protocole RPC par Microsoft | 2022-04-13T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2022-ALE-001 | [MaJ] Vulnérabilité dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-022 | [MaJ] Vulnérabilité dans Apache Log4j | 2021-12-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| CERTFR-2021-ALE-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| CERTFR-2021-ALE-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| CERTFR-2021-ALE-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| CERTFR-2021-ALE-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-ale-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| CERTFR-2021-ALE-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| certfr-2021-ale-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| CERTFR-2021-ALE-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-ale-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| CERTFR-2021-ALE-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| certfr-2021-ale-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| CERTFR-2021-ALE-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| certfr-2021-ale-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0335 | Vulnérabilité dans CPython | 2026-03-23T00:00:00.000000 | 2026-03-23T00:00:00.000000 |
| certfr-2026-avi-0334 | Vulnérabilité dans les produits Microsoft | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0333 | Multiples vulnérabilités dans Traefik | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0332 | Vulnérabilité dans Oracle Identity Manager et Web Services Manager | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0331 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0330 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0329 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0328 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0327 | Multiples vulnérabilités dans les produits IBM | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0326 | Multiples vulnérabilités dans les produits VMware | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0325 | Multiples vulnérabilités dans les produits Elastic | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0324 | Multiples vulnérabilités dans Google Chrome | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0323 | Multiples vulnérabilités dans les produits Spring | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0322 | Multiples vulnérabilités dans les produits VMware | 2026-03-20T00:00:00.000000 | 2026-03-20T00:00:00.000000 |
| certfr-2026-avi-0321 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0319 | Vulnérabilité dans les produits Mitel | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0318 | Multiples vulnérabilités dans Splunk Universal Forwarder | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0317 | Vulnérabilité dans Python | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0316 | Multiples vulnérabilités dans les produits VMware | 2026-03-19T00:00:00.000000 | 2026-03-19T00:00:00.000000 |
| certfr-2026-avi-0315 | Multiples vulnérabilités dans les produits VMware | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0314 | Multiples vulnérabilités dans les produits Atlassian | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0313 | Vulnérabilité dans les produits Apple | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0312 | Multiples vulnérabilités dans GLPI | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0311 | Vulnérabilité dans Citrix XenServer | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0310 | Multiples vulnérabilités dans MongoDB | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0309 | Multiples vulnérabilités dans Suricata | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0308 | Multiples vulnérabilités dans Node.js | 2026-03-18T00:00:00.000000 | 2026-03-18T00:00:00.000000 |
| certfr-2026-avi-0307 | Vulnérabilité dans les produits Microsoft | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0306 | Multiples vulnérabilités dans Redmine | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0305 | Multiples vulnérabilités dans Spring AI | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000104 | Multiple vulnerabilities in GNU Libmicrohttpd | 2025-11-10T15:07+09:00 | 2025-11-10T15:07+09:00 |
| jvndb-2025-000103 | Use of password hash with insufficient computational effort vulnerability in BUFFALO Wi-Fi router "WSR-1800AX4 series" | 2025-11-07T15:39+09:00 | 2025-11-07T15:39+09:00 |
| jvndb-2025-000102 | CLUSTERPRO X and EXPRESSCLUSTER X vulnerable to OS command injection | 2025-11-07T14:55+09:00 | 2025-11-07T14:55+09:00 |
| jvndb-2025-000101 | GROWI vulnerable to stored cross-site scripting | 2025-11-06T13:45+09:00 | 2025-11-06T13:45+09:00 |
| jvndb-2024-013260 | Multiple vulnerabilities in Edgecross Basic Software for Windows | 2024-11-22T10:59+09:00 | 2025-11-04T16:41+09:00 |
| jvndb-2025-017972 | Multiple vulnerabilities in Century Systems FutureNet MA and IP-K series | 2025-11-04T16:37+09:00 | 2025-11-04T16:37+09:00 |
| jvndb-2025-000100 | Multiple Roboticsware products register Windows services with unquoted file paths | 2025-11-04T14:17+09:00 | 2025-11-04T14:17+09:00 |
| jvndb-2025-000098 | Optical Disc Archive Software (for Windows) registers a Windows service with an unquoted file path | 2025-11-04T13:51+09:00 | 2025-11-04T13:51+09:00 |
| jvndb-2025-000099 | Progress Flowmon vulnerable to authenticated OS command injection | 2025-11-04T12:47+09:00 | 2025-11-04T12:47+09:00 |
| jvndb-2025-000096 | Installer of WTW EAGLE (for Windows) may insecurely load Dynamic Link Libraries | 2025-10-29T14:17+09:00 | 2025-10-29T14:17+09:00 |
| jvndb-2025-000095 | MZK-DP300N uses hard-coded credentials | 2025-10-28T14:04+09:00 | 2025-10-28T14:04+09:00 |
| jvndb-2025-014793 | NIHON KOHDEN Central Monitor CNS-6201 vulnerable to NULL pointer dereference | 2025-10-01T11:35+09:00 | 2025-10-27T12:28+09:00 |
| jvndb-2025-000093 | Multiple stored cross-site scripting vulnerabilities in Pleasanter | 2025-10-24T15:11+09:00 | 2025-10-24T15:11+09:00 |
| jvndb-2025-000084 | GROWI vulnerable to cross-site scripting | 2025-10-22T15:44+09:00 | 2025-10-22T15:44+09:00 |
| jvndb-2025-000090 | Multiple stored cross-site scripting vulnerabilities in Movable Type | 2025-10-22T13:54+09:00 | 2025-10-22T13:54+09:00 |
| jvndb-2025-000088 | Lanscope Endpoint Manager (On-Premises) vulnerable to improper verification of source of a communication channel | 2025-10-20T16:17+09:00 | 2025-10-22T10:06+09:00 |
| jvndb-2025-000092 | ETERNUS SF vulnerable to incorrect default permissions | 2025-10-20T14:20+09:00 | 2025-10-20T14:20+09:00 |
| jvndb-2025-000089 | Installer of AutoDownloader may insecurely load Dynamic Link Libraries | 2025-10-17T13:38+09:00 | 2025-10-17T13:38+09:00 |
| jvndb-2025-000074 | Multiple vulnerabilities in desknet's NEO | 2025-10-16T17:30+09:00 | 2025-10-16T17:30+09:00 |
| jvndb-2025-000076 | Multiple vulnerabilities in ChatLuck | 2025-10-16T17:17+09:00 | 2025-10-16T17:17+09:00 |
| jvndb-2025-000087 | Ruijie Networks RG-EST300 undocumented SSH functionality | 2025-10-16T14:19+09:00 | 2025-10-16T14:19+09:00 |
| jvndb-2025-016124 | Buffalo Wi-Fi router WXR9300BE6P series vulnerable to path traversal | 2025-10-16T11:16+09:00 | 2025-10-16T11:16+09:00 |
| jvndb-2025-000085 | Multiple RSUPPORT products may insecurely load Dynamic Link Libraries | 2025-10-15T15:55+09:00 | 2025-10-15T15:55+09:00 |
| jvndb-2025-000086 | Phoenix Contact CHARX SEC-3xxx vulnerable to code injection | 2025-10-15T15:54+09:00 | 2025-10-15T15:54+09:00 |
| jvndb-2025-000083 | BUFFALO NAS Navigator2 registers a Windows service with an unquoted file path | 2025-10-10T13:56+09:00 | 2025-10-10T13:56+09:00 |
| jvndb-2025-015451 | Multiple vulnerabilities in FUJI Electric V-SFT | 2025-10-09T13:39+09:00 | 2025-10-09T13:39+09:00 |
| jvndb-2025-000081 | DataSpider Servista improper restriction of XML external entity references | 2025-09-29T14:44+09:00 | 2025-10-07T16:54+09:00 |
| jvndb-2025-000082 | The installers of DENSO TEN drive recorder viewer may insecurely load Dynamic Link Libraries | 2025-10-06T15:38+09:00 | 2025-10-06T15:38+09:00 |
| jvndb-2025-015061 | Trend Micro Antivirus for Mac vulnerable to Local Privilege Escalation | 2025-10-06T13:52+09:00 | 2025-10-06T13:52+09:00 |
| jvndb-2025-000044 | Denial-of-service (DoS) vulnerabilities in multiple Apache products | 2025-06-26T14:41+09:00 | 2025-10-01T14:18+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-15380 | Huawei HarmonyOS证书管理模块路径遍历漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15379 | Huawei HarmonyOS维测模块条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15378 | Huawei HarmonyOS蓝牙字符越界读漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15377 | Huawei HarmonyOS权限管理服务条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15376 | Huawei HarmonyOS安全控件条件竞争漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15375 | Huawei HarmonyOS扫描模块访问未初始化指针漏洞 | 2026-03-12 | 2026-03-30 |
| cnvd-2026-15252 | ZTE ZXMP M721私钥泄露漏洞 | 2025-10-31 | 2026-03-27 |
| cnvd-2026-15170 | Adobe Commerce授权问题漏洞(CNVD-2026-15170) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15169 | Adobe Commerce授权问题漏洞(CNVD-2026-15169) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15168 | Adobe Commerce授权问题漏洞(CNVD-2026-15168) | 2026-03-17 | 2026-03-27 |
| cnvd-2026-15159 | Apache Airflow信息泄露漏洞(CNVD-2026-15159) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15158 | Apache Airflow信息泄露漏洞(CNVD-2026-15158) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15157 | Apache Airflow安全绕过漏洞(CNVD-2026-15157) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15156 | Apache Airflow信息泄露漏洞(CNVD-2026-15156) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15154 | HCL AION安全绕过漏洞 | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15153 | HCL AION存在未明漏洞(CNVD-2026-15153) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15152 | OpenClaw拒绝服务漏洞(CNVD-2026-15152) | 2026-03-26 | 2026-03-27 |
| cnvd-2026-15151 | HCL AION存在未明漏洞(CNVD-2026-15151) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15150 | HCL AION存在未明漏洞(CNVD-2026-15150) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15149 | HCL AION存在未明漏洞(CNVD-2026-15149) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15148 | HCL AION存在未明漏洞(CNVD-2026-15148) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15147 | HCL AION存在未明漏洞(CNVD-2026-15147) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15146 | HCL AION SQL注入漏洞(CNVD-2026-15146) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15145 | HCL AION信息泄露漏洞(CNVD-2026-15145) | 2026-03-19 | 2026-03-27 |
| cnvd-2026-15251 | ZTE MF258K Pro配置缺陷漏洞 | 2026-01-19 | 2026-03-26 |
| cnvd-2026-15061 | OpenClaw操作系统命令注入漏洞 | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15060 | OpenClaw操作系统命令注入漏洞(CNVD-2026-15060) | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15059 | OpenClaw操作系统命令注入漏洞(CNVD-2026-15059) | 2026-03-24 | 2026-03-26 |
| cnvd-2026-15058 | OpenClaw命令注入漏洞(CNVD-2026-15058) | 2026-03-26 | 2026-03-26 |
| cnvd-2026-15057 | OpenClaw加密问题漏洞(CNVD-2026-15057) | 2026-03-26 | 2026-03-26 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15748 | Уязвимость драйвера net/usb/asix_devices.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15746 | Уязвимость компонента net/netlink/af_netlink.c ядра операционной системы Linux, позволяющ… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15745 | Уязвимость компонента fs/smb/client/smb2ops.c ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15744 | Уязвимость компонента sound/usb/validate.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15743 | Уязвимость компонента netfilter ядра операционной системы Linux, позволяющая нарушителю п… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15741 | Уязвимость драйвера ppp ядра операционной системы Linux, позволяющая нарушителю вызвать о… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15740 | Уязвимость компонента drm/amd/display ядра операционной системы Linux, позволяющая наруши… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15739 | Уязвимость функции qla4xxx_get_ep_fwdb() драйвера qla4xxx ядра операционной системы Linux… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15733 | Уязвимость компонента trace ядра операционной системы Linux, позволяющая нарушителю вызва… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15732 | Уязвимость компонента comedi/drivers/pcl726.c ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15731 | Уязвимость драйвера comedi ядра операционной системы Linux, позволяющая нарушителю вызват… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15730 | Уязвимость модуля smb ядра операционной системы Linux, позволяющая нарушителю вызвать отк… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15729 | Уязвимость компонента amdgpu_dm.c ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15728 | Уязвимость компонента s390/char/sclp.c ядра операционной системы Linux, позволяющая наруш… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15724 | Уязвимость компонента NFS ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15717 | Уязвимость драйвера acpi/pfr_update.c ядра операционной системы Linux, позволяющая наруши… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15716 | Уязвимость компонента net/ipv6/seg6_hmac.c ядра операционной системы Linux, позволяющая н… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15715 | Уязвимость компонента net/hsr/hsr_slave.c ядра операционной системы Linux, позволяющая на… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15714 | Уязвимость компонента drm/amdkfd ядра операционной системы Linux, позволяющая нарушителю … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15713 | Уязвимость компонента qcom/venus/hfi_venus.c ядра операционной системы Linux, позволяющая… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15712 | Уязвимость драйвера rainshadow-cec ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15711 | Уязвимость компонента iio/imu/bno055/bno055.c ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15708 | Уязвимость компонента drivers/tty/serial/8250 ядра операционной системы Linux, позволяюща… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15706 | Уязвимость функции nfs_fh_to_dentry() компонента fs/nfs/export.c ядра операционной систем… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15705 | Уязвимость компонента fs/f2fs ядра операционной системы Linux, позволяющая нарушителю выз… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15704 | Уязвимость функции __kmemleak_do_cleanup() компонента mm/kmemleak.c ядра операционной сис… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15703 | Уязвимость компонента fs/btrfs ядра операционной системы Linux, позволяющая нарушителю на… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15702 | Уязвимость компонента fs/jfs ядра операционной системы Linux, позволяющая нарушителю полу… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15701 | Уязвимость функции rcu_preempt_deferred_qs_handler() компонента kernel/rcu/tree_plugin.h … | 15.12.2025 | 16.02.2026 |
| bdu:2025-15696 | Уязвимость компонента net/sched ядра операционной системы Linux, позволяющая нарушителю в… | 15.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-202010-1511 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T22:14:35.686000Z |
| var-201912-1854 | An issue existed in the drawing of web page elements. The issue was addressed with improv… | 2024-07-23T22:14:33.774000Z |
| var-200511-0019 | The Internet Key Exchange version 1 (IKEv1) implementation in Check Point products allows… | 2024-07-23T22:14:03.297000Z |
| var-201008-0270 | The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used o… | 2024-07-23T22:14:01.941000Z |
| var-200904-0819 | Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.… | 2024-07-23T22:12:51.678000Z |
| var-201711-0446 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T22:12:50.009000Z |
| var-201912-0506 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:12:49.908000Z |
| var-200609-0311 | Heap-based buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote at… | 2024-07-23T22:12:46.615000Z |
| var-201905-1248 | Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some m… | 2024-07-23T22:12:08.666000Z |
| var-202007-1133 | Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an … | 2024-07-23T22:12:07.961000Z |
| var-201009-0230 | bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attac… | 2024-07-23T22:12:06.629000Z |
| var-201806-1488 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:12:00.711000Z |
| var-201405-0244 | The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEA… | 2024-07-23T22:12:00.239000Z |
| var-200611-0368 | The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and earlier; and the (2) Pas… | 2024-07-23T22:11:59.300000Z |
| var-201806-1436 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T22:11:27.007000Z |
| var-201702-0879 | An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari … | 2024-07-23T22:10:32.463000Z |
| var-200703-0010 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T22:10:30.778000Z |
| var-201902-0855 | png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_im… | 2024-07-23T22:10:27.196000Z |
| var-202010-1294 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T22:10:25.978000Z |
| var-201506-0038 | Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to exe… | 2024-07-23T22:10:25.193000Z |
| var-200805-0585 | OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the… | 2024-07-23T22:10:24.233000Z |
| var-202012-1547 | A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel thr… | 2024-07-23T22:10:23.557000Z |
| var-201302-0236 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:10:22.448000Z |
| var-202004-2191 | In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untru… | 2024-07-23T22:10:21.285000Z |
| var-201904-0742 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:10:15.079000Z |
| var-200608-0030 | Unspecified vulnerability in the "compression state handling" in Bom for Apple Mac OS X 1… | 2024-07-23T22:10:15.377000Z |
| var-201912-0608 | A memory corruption issue was addressed with improved input validation. This issue is fix… | 2024-07-23T22:09:37.183000Z |
| var-200505-0162 | Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based … | 2024-07-23T22:09:05.800000Z |
| var-202003-1771 | A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-pro… | 2024-07-23T22:09:01.387000Z |
| var-201506-0465 | The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.… | 2024-07-23T22:08:28.995000Z |