Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-64676 |
7.2 (3.1)
|
Microsoft Purview eDiscovery Remote Code Execution Vul… |
Microsoft |
Microsoft Purview |
2025-12-18T22:02:07.323Z | 2026-04-16T14:19:05.887Z |
| CVE-2026-32076 |
7.8 (3.1)
|
Windows Storage Spaces Controller Elevation of Privile… |
Microsoft |
Windows 11 version 22H3 |
2026-04-14T16:58:19.394Z | 2026-04-16T14:19:05.699Z |
| CVE-2025-65037 |
10 (3.1)
|
Azure Container Apps Remote Code Execution Vulnerability |
Microsoft |
Azure Container Apps |
2025-12-18T22:02:06.737Z | 2026-04-16T14:19:05.350Z |
| CVE-2026-32074 |
7.8 (3.1)
|
Windows Projected File System Elevation of Privilege V… |
Microsoft |
Windows 10 Version 1809 |
2026-04-14T16:58:18.455Z | 2026-04-16T14:19:05.243Z |
| CVE-2025-65041 |
10 (3.1)
|
Microsoft Partner Center Elevation of Privilege Vulner… |
Microsoft |
Microsoft Partner Center |
2025-12-18T22:02:06.021Z | 2026-04-16T14:19:04.744Z |
| CVE-2026-32072 |
6.2 (3.1)
|
Active Directory Spoofing Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:17.336Z | 2026-04-16T14:19:04.635Z |
| CVE-2026-32070 |
7 (3.1)
|
Windows Common Log File System Driver Elevation of Pri… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:16.731Z | 2026-04-16T14:19:04.162Z |
| CVE-2025-64663 |
9.9 (3.1)
|
Custom Question Answering Elevation of Privilege Vulne… |
Microsoft |
Azure Cognitive Service for Language |
2025-12-18T22:02:05.377Z | 2026-04-16T14:19:04.162Z |
| CVE-2026-32069 |
7.8 (3.1)
|
Windows Projected File System Elevation of Privilege V… |
Microsoft |
Windows 10 Version 1809 |
2026-04-14T16:58:16.106Z | 2026-04-16T14:19:03.563Z |
| CVE-2025-54100 |
7.8 (3.1)
|
PowerShell Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:09.562Z | 2026-04-16T14:19:03.292Z |
| CVE-2025-64680 |
7.8 (3.1)
|
Windows DWM Core Library Elevation of Privilege Vulner… |
Microsoft |
Windows 10 Version 1507 |
2025-12-09T17:56:08.904Z | 2026-04-16T14:19:01.509Z |
| CVE-2026-32068 |
7 (3.1)
|
Windows Simple Search and Discovery Protocol (SSDP) Se… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:15.166Z | 2026-04-16T14:19:01.367Z |
| CVE-2025-64679 |
7.8 (3.1)
|
Windows DWM Core Library Elevation of Privilege Vulner… |
Microsoft |
Windows 10 Version 1507 |
2025-12-09T17:56:08.304Z | 2026-04-16T14:19:00.931Z |
| CVE-2026-27930 |
5.5 (3.1)
|
Windows GDI Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:14.503Z | 2026-04-16T14:19:00.875Z |
| CVE-2026-27928 |
8.7 (3.1)
|
Windows Hello Security Feature Bypass Vulnerability |
Microsoft |
Windows Server 2016 |
2026-04-14T16:58:13.895Z | 2026-04-16T14:19:00.372Z |
| CVE-2025-64678 |
8.8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Remot… |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:07.648Z | 2026-04-16T14:19:00.282Z |
| CVE-2026-27925 |
6.5 (3.1)
|
Windows UPnP Device Host Information Disclosure Vulner… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:13.263Z | 2026-04-16T14:18:59.896Z |
| CVE-2025-64672 |
8.8 (3.1)
|
Microsoft SharePoint Server Spoofing Vulnerability |
Microsoft |
Microsoft SharePoint Server Subscription Edition |
2025-12-09T17:56:06.979Z | 2026-04-16T14:18:59.703Z |
| CVE-2026-27923 |
7.8 (3.1)
|
Desktop Window Manager Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:12.545Z | 2026-04-16T14:18:59.210Z |
| CVE-2025-64671 |
8.4 (3.1)
|
GitHub Copilot for Jetbrains Remote Code Execution Vul… |
Microsoft |
GitHub Copilot Plugin for JetBrains IDEs |
2025-12-09T17:56:06.407Z | 2026-04-16T14:18:59.084Z |
| CVE-2026-27922 |
7 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:11.466Z | 2026-04-16T14:18:58.667Z |
| CVE-2026-27920 |
7.8 (3.1)
|
Windows UPnP Device Host Elevation of Privilege Vulner… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:10.717Z | 2026-04-16T14:18:58.195Z |
| CVE-2025-64661 |
7.8 (3.1)
|
Windows Shell Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:05.748Z | 2026-04-16T14:18:58.138Z |
| CVE-2026-27916 |
7.8 (3.1)
|
Windows UPnP Device Host Elevation of Privilege Vulner… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:09.994Z | 2026-04-16T14:18:57.602Z |
| CVE-2025-62565 |
7.3 (3.1)
|
Windows File Explorer Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:05.233Z | 2026-04-16T14:18:57.532Z |
| CVE-2026-27914 |
7.8 (3.1)
|
Microsoft Management Console Elevation of Privilege Vu… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:58:09.319Z | 2026-04-16T14:18:57.019Z |
| CVE-2025-62570 |
7.1 (3.1)
|
Windows Camera Frame Server Monitor Information Disclo… |
Microsoft |
Windows 11 Version 24H2 |
2025-12-09T17:56:04.617Z | 2026-04-16T14:18:56.980Z |
| CVE-2025-62569 |
7 (3.1)
|
Microsoft Brokering File System Elevation of Privilege… |
Microsoft |
Windows 11 Version 24H2 |
2025-12-09T17:56:04.070Z | 2026-04-16T14:18:56.482Z |
| CVE-2026-27913 |
7.7 (3.1)
|
Windows BitLocker Security Feature Bypass Vulnerability |
Microsoft |
Windows Server 2012 |
2026-04-14T16:58:08.294Z | 2026-04-16T14:18:56.460Z |
| CVE-2025-62567 |
5.3 (3.1)
|
Windows Hyper-V Denial of Service Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:56:03.534Z | 2026-04-16T14:18:55.794Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-4867 |
7.5 (3.1)
|
path-to-regexp vulnerable to Regular Expression Denial… |
path-to-regexp |
path-to-regexp |
2026-03-26T16:16:25.501Z | 2026-03-26T16:52:14.893Z |
| CVE-2026-35581 |
7.2 (3.1)
|
Emissary has a Command Injection via PLACE_NAME Config… |
NationalSecurityAgency |
emissary |
2026-04-07T15:56:55.838Z | 2026-04-08T14:57:47.316Z |
| CVE-2019-25559 |
6.8 (4.0)
5.5 (3.1)
|
SpotPaltalk 1.1.5 Name/Key Field Denial of Service |
Nsauditor |
SpotPaltalk |
2026-03-21T12:47:00.586Z | 2026-03-23T16:23:09.891Z |
| CVE-2026-35580 |
9.1 (3.1)
|
Emissary has GitHub Actions Shell Injection via Workfl… |
NationalSecurityAgency |
emissary |
2026-04-07T15:55:56.074Z | 2026-04-07T18:25:26.662Z |
| CVE-2019-25558 |
6.9 (4.0)
6.2 (3.1)
|
Selfie Studio 2.17 Denial of Service via Resize Image |
Pixarra |
Selfie Studio |
2026-03-21T12:46:59.408Z | 2026-03-23T16:55:34.217Z |
| CVE-2019-25554 |
6.8 (4.0)
5.5 (3.1)
|
Tomabo MP4 Converter 3.25.22 Denial of Service via Nam… |
Tomabo |
MP4 Converter |
2026-03-21T12:46:56.539Z | 2026-03-23T15:41:23.426Z |
| CVE-2019-25550 |
6.9 (4.0)
6.2 (3.1)
|
Encrypt PDF 2.3 Denial of Service via Buffer Overflow |
Verypdf |
Encrypt PDF |
2026-03-21T12:46:53.540Z | 2026-03-23T16:38:49.709Z |
| CVE-2019-25549 |
6.9 (4.0)
6.2 (3.1)
|
VeryPDF PCL Converter 2.7 Denial of Service via PDF Security |
Verypdf |
VeryPDF PCL Converter |
2026-03-21T12:46:52.307Z | 2026-03-24T14:11:50.064Z |
| CVE-2019-25548 |
6.9 (4.0)
6.2 (3.1)
|
BlueStacks 4.80.0.1060 Denial of Service via Search Field |
Bluestacks |
BlueStacks |
2026-03-21T12:46:51.527Z | 2026-03-23T15:41:46.727Z |
| CVE-2026-35574 |
7.3 (3.1)
|
ChurchCRM has a Stored XSS in Person Profile - Add a Note |
ChurchCRM |
CRM |
2026-04-07T17:04:21.184Z | 2026-04-07T17:26:30.431Z |
| CVE-2026-3635 |
6.1 (3.1)
|
Fastify request.protocol and request.host spoofable vi… |
fastify |
fastify |
2026-03-23T13:53:00.386Z | 2026-03-23T15:30:10.526Z |
| CVE-2019-25545 |
6.9 (4.0)
6.2 (3.1)
|
Terminal Services Manager 3.2.1 Local Buffer Overflow … |
Lizardsystems |
Terminal Services Manager |
2026-03-21T12:46:49.245Z | 2026-03-23T20:22:15.804Z |
| CVE-2019-25544 |
6.9 (4.0)
6.2 (3.1)
|
Pidgin 2.13.0 Denial of Service via Malformed Username |
Pidgin |
Pidgin |
2026-03-21T12:46:48.415Z | 2026-03-24T14:31:19.687Z |
| CVE-2026-35002 |
9.3 (4.0)
|
Agno < 2.3.24 field_type Eval Injection Arbitrary Code… |
Agno |
Agno |
2026-04-02T14:34:14.538Z | 2026-04-02T15:23:20.841Z |
| CVE-2026-33746 |
9.8 (3.1)
|
Convoy: JWT Signature Verification Bypass Allows Authe… |
ConvoyPanel |
panel |
2026-04-02T15:06:05.832Z | 2026-04-02T18:50:14.459Z |
| CVE-2026-26961 |
3.7 (3.1)
|
Rack: Multipart Boundary Parsing Ambiguity allowing WA… |
rack |
rack |
2026-04-02T16:42:16.766Z | 2026-04-03T17:58:12.149Z |
| CVE-2026-34230 |
5.3 (3.1)
|
Rack: Quadratic complexity in Rack::Utils.select_best_… |
rack |
rack |
2026-04-02T16:41:21.095Z | 2026-04-03T18:19:00.388Z |
| CVE-2026-34763 |
5.3 (3.1)
|
Rack: Rack::Directory info disclosure and DoS via unes… |
rack |
rack |
2026-04-02T16:43:42.189Z | 2026-04-02T17:41:12.293Z |
| CVE-2026-21003 |
5.2 (4.0)
|
Improper input validation in data related to netw… |
Samsung Mobile |
Samsung Mobile Devices |
2026-04-13T04:57:14.913Z | 2026-04-13T18:06:17.002Z |
| CVE-2026-21013 |
6.9 (4.0)
|
Incorrect default permission in Galaxy Wearable p… |
Samsung Mobile |
Galaxy Wearable |
2026-04-13T05:04:45.232Z | 2026-04-13T14:35:12.877Z |
| CVE-2026-21014 |
5.1 (4.0)
|
Improper access control in Samsung Camera prior t… |
Samsung Mobile |
Samsung Camera |
2026-04-13T05:04:48.621Z | 2026-04-13T14:31:18.617Z |
| CVE-2026-34785 |
7.5 (3.1)
|
Rack: Local file inclusion in `Rack::Static` via URL P… |
rack |
rack |
2026-04-02T16:44:17.134Z | 2026-04-02T18:59:08.828Z |
| CVE-2026-34786 |
5.3 (3.1)
|
Rack: Rack::Static header_rules bypass via URL-encoded paths |
rack |
rack |
2026-04-02T16:44:59.694Z | 2026-04-03T17:38:11.143Z |
| CVE-2026-41080 |
2.9 (3.1)
|
libexpat before 2.7.6 uses insufficient entropy, … |
libexpat project |
libexpat |
2026-04-16T16:52:01.177Z | 2026-04-16T16:56:59.212Z |
| CVE-2026-37338 |
9.4 (3.1)
|
SourceCodester Simple Music Cloud Community Syste… |
n/a |
n/a |
2026-04-16T00:00:00.000Z | 2026-04-16T15:49:41.995Z |
| CVE-2026-25704 |
5.8 (4.0)
|
Incomplete privilege drop for com.system76.CosmicGreet… |
pop-os |
cosmic-greeter |
2026-03-30T07:44:39.672Z | 2026-04-16T16:32:11.153Z |
| CVE-2025-36579 |
5.1 (3.1)
|
Dell Client Platform BIOS contains a Weak Passwor… |
Dell |
Dell Pro 14 Essential PV14250 |
2026-04-16T16:05:32.561Z | 2026-04-16T18:32:52.672Z |
| CVE-2021-22925 |
5.3 (3.1)
|
curl supports the `-t` command line option, known… |
n/a |
https://github.com/curl/curl |
2021-08-05T00:00:00.000Z | 2026-04-16T16:36:24.090Z |
| CVE-2026-34826 |
5.3 (3.1)
|
Rack: Unbounded Range Count in get_byte_ranges Enables DoS |
rack |
rack |
2026-04-02T16:45:53.964Z | 2026-04-03T18:13:27.375Z |
| CVE-2026-24146 |
7.5 (3.1)
|
NVIDIA Triton Inference Server contains a vulnera… |
NVIDIA |
Triton Inference Server |
2026-04-07T17:11:54.812Z | 2026-04-07T19:18:08.817Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-4867 | Impact: A bad regular expression is generated any time you have three or more parameters within a … | 2026-03-26T17:16:42.983 | 2026-04-16T18:01:04.783 |
| fkie_cve-2026-35581 | Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, the Executrix utility class c… | 2026-04-07T17:16:33.493 | 2026-04-16T18:00:24.503 |
| fkie_cve-2019-25559 | SpotPaltalk 1.1.5 contains a denial of service vulnerability in the registration code input field t… | 2026-03-21T13:16:18.777 | 2026-04-16T17:59:31.790 |
| fkie_cve-2026-35580 | Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, GitHub Actions workflow files… | 2026-04-07T17:16:33.307 | 2026-04-16T17:59:02.860 |
| fkie_cve-2019-25558 | Selfie Studio 2.17 contains a denial of service vulnerability in the Resize Image function that all… | 2026-03-21T13:16:18.590 | 2026-04-16T17:55:01.000 |
| fkie_cve-2019-25554 | Tomabo MP4 Converter 3.25.22 contains a denial of service vulnerability that allows local attackers… | 2026-03-21T13:16:17.857 | 2026-04-16T17:54:13.030 |
| fkie_cve-2019-25550 | Encrypt PDF 2.3 contains a buffer overflow vulnerability that allows local attackers to crash the a… | 2026-03-21T13:16:17.147 | 2026-04-16T17:53:07.683 |
| fkie_cve-2019-25549 | VeryPDF PCL Converter 2.7 contains a denial of service vulnerability that allows local attackers to… | 2026-03-21T13:16:16.980 | 2026-04-16T17:52:50.220 |
| fkie_cve-2019-25548 | BlueStacks 4.80.0.1060 contains a denial of service vulnerability that allows local attackers to cr… | 2026-03-21T13:16:16.753 | 2026-04-16T17:52:18.590 |
| fkie_cve-2026-35574 | ChurchCRM is an open-source church management system. Prior to 6.5.3, a stored Cross-Site Scripting… | 2026-04-07T17:16:32.963 | 2026-04-16T17:49:56.133 |
| fkie_cve-2026-3635 | Summary When trustProxy is configured with a restrictive trust function (e.g., a specific IP like t… | 2026-03-23T14:16:34.720 | 2026-04-16T17:46:58.897 |
| fkie_cve-2019-25545 | Terminal Services Manager 3.2.1 contains a local buffer overflow vulnerability that allows attacker… | 2026-03-21T13:16:16.193 | 2026-04-16T17:44:44.923 |
| fkie_cve-2019-25544 | Pidgin 2.13.0 contains a denial of service vulnerability that allows local attackers to crash the a… | 2026-03-21T13:16:15.270 | 2026-04-16T17:42:51.770 |
| fkie_cve-2026-35002 | Agno versions prior to 2.3.24 contain an arbitrary code execution vulnerability in the model execut… | 2026-04-02T15:16:52.063 | 2026-04-16T17:41:17.293 |
| fkie_cve-2026-33746 | Convoy is a KVM server management panel for hosting businesses. From version 3.9.0-beta to before v… | 2026-04-02T16:16:22.803 | 2026-04-16T17:38:08.700 |
| fkie_cve-2026-26961 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Mul… | 2026-04-02T17:16:21.973 | 2026-04-16T17:33:26.013 |
| fkie_cve-2026-34230 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Uti… | 2026-04-02T17:16:23.570 | 2026-04-16T17:27:43.037 |
| fkie_cve-2026-34763 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Dir… | 2026-04-02T17:16:24.723 | 2026-04-16T17:26:24.647 |
| fkie_cve-2026-21003 | Improper input validation in data related to network restrictions prior to SMR Apr-2026 Release 1 a… | 2026-04-13T05:16:02.230 | 2026-04-16T17:25:45.080 |
| fkie_cve-2026-21013 | Incorrect default permission in Galaxy Wearable prior to version 2.2.68.26 allows local attackers t… | 2026-04-13T06:16:06.010 | 2026-04-16T17:24:33.990 |
| fkie_cve-2026-21014 | Improper access control in Samsung Camera prior to version 16.5.00.28 allows local attacker to acce… | 2026-04-13T06:16:06.140 | 2026-04-16T17:23:57.580 |
| fkie_cve-2026-34785 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Sta… | 2026-04-02T17:16:24.873 | 2026-04-16T17:19:35.290 |
| fkie_cve-2026-34786 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Sta… | 2026-04-02T17:16:25.030 | 2026-04-16T17:19:00.317 |
| fkie_cve-2026-41080 | libexpat before 2.7.6 uses insufficient entropy, and thus hash flooding can occur via a crafted XML… | 2026-04-16T17:16:54.917 | 2026-04-16T17:16:54.917 |
| fkie_cve-2026-37338 | SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file … | 2026-04-16T15:17:36.680 | 2026-04-16T17:16:54.760 |
| fkie_cve-2026-25704 | A Privilege Dropping / Lowering Errors/Time-of-check Time-of-use (TOCTOU) Race Condition vulnerabil… | 2026-03-30T08:16:16.990 | 2026-04-16T17:16:54.590 |
| fkie_cve-2025-36579 | Dell Client Platform BIOS contains a Weak Password Recovery Mechanism vulnerability. An unauthentic… | 2026-04-16T17:16:54.073 | 2026-04-16T17:16:54.073 |
| fkie_cve-2021-22925 | curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely… | 2021-08-05T21:15:11.467 | 2026-04-16T17:16:52.780 |
| fkie_cve-2026-34826 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Uti… | 2026-04-02T17:16:25.880 | 2026-04-16T17:09:16.217 |
| fkie_cve-2026-24146 | NVIDIA Triton Inference Server contains a vulnerability where insufficient input validation and a l… | 2026-04-07T18:16:39.347 | 2026-04-16T17:04:12.353 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-wwcp-26wc-3fxm |
5.3 (3.1)
6.9 (4.0)
|
JSON-lib mishandles an unbalanced comment string | 2024-10-04T06:30:45Z | 2026-04-16T18:11:17Z |
| ghsa-jwwr-fjgh-cv2x |
|
Improper Restriction of XML External Entity Reference in Castor | 2022-05-13T01:05:37Z | 2026-04-16T18:07:55Z |
| ghsa-vrh8-27q8-fr8f |
7.5 (3.1)
|
Server-Side Request Forgery (SSRF) in org.apache.solr:solr-core | 2019-03-14T15:39:56Z | 2026-04-16T16:55:49Z |
| ghsa-pmpg-6pww-fg6q |
3.3 (3.1)
|
ImageMagick has out-of-bounds access in ConnectedComponentsImage() via CLI-controlled connected-com… | 2026-04-14T23:32:35Z | 2026-04-16T15:54:56Z |
| ghsa-x928-4434-crqj |
3.7 (3.1)
|
ImageMagick has a memory leak in PNG encoder when writing a MNG image | 2026-04-14T23:32:44Z | 2026-04-16T15:49:58Z |
| ghsa-w54j-7wpm-crhj |
3.3 (3.1)
|
ImageMagick has a heap-buffer-overflow in FTXT encoder | 2026-04-14T23:31:31Z | 2026-04-16T15:48:06Z |
| ghsa-8vfj-q2cp-5m5j |
3.3 (3.1)
|
ImageMagick has a heap buffer overflow read in magnify operation via unrecognized magnify:method value | 2026-04-14T23:32:22Z | 2026-04-16T15:33:26Z |
| ghsa-q8h3-jv9v-57qx |
3.3 (3.1)
|
ImageMagick has has an off-by-one origin validation in allows out-of-bounds read in morphology processing | 2026-04-14T23:31:38Z | 2026-04-16T15:32:16Z |
| ghsa-qjfj-3mm5-vrjg |
7.1 (4.0)
|
A Denial of Service (DoS) vulnerability exists in the Protobuf PHP library during the parsing of un… | 2026-04-16T15:31:33Z | 2026-04-16T15:31:33Z |
| ghsa-hxj3-376r-rjpw |
|
SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL Injection in the fi… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:33Z |
| ghsa-6q34-632f-jr72 |
8.2 (3.1)
|
Zohocorp ManageEngine Log360 versions 13000 through 13013 are vulnerable to authentication bypass o… | 2026-04-16T15:31:33Z | 2026-04-16T15:31:33Z |
| ghsa-xm65-r32w-c46p |
6.5 (3.1)
|
Out of bounds read in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to ob… | 2026-04-15T21:30:19Z | 2026-04-16T15:31:32Z |
| ghsa-wrhr-37c7-3326 |
7.5 (3.1)
|
Nordic Semiconductor IronSide SE for nRF54H20 before 23.0.2+17 has an Algorithmic complexity issue. | 2026-04-15T18:31:56Z | 2026-04-16T15:31:32Z |
| ghsa-wg7c-97pm-qp3w |
8.1 (3.1)
|
Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Manager Pro versions fr… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-w3cg-4gfc-vw5x |
7.8 (3.1)
|
Eaton Intelligent Power Protector (IPP) is affected by insecure library loading in its executable, … | 2026-04-16T06:31:23Z | 2026-04-16T15:31:32Z |
| ghsa-rhw5-wqw8-cv94 |
|
SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL Injection in the fi… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-q6p9-89h2-c9h9 |
8.3 (3.1)
|
Daylight Studio FuelCMS v1.5.2 was discovered to contain an authenticated remote code execution (RC… | 2026-04-15T18:31:57Z | 2026-04-16T15:31:32Z |
| ghsa-phv5-vq5p-qhp7 |
|
JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. Us… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-mp4c-mj8p-8mjm |
|
SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file … | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-m5wg-cjgh-223j |
9.8 (3.1)
10.0 (4.0)
|
The goodoneuz/pay-uz Laravel package (<= 2.2.24) contains a critical vulnerability in the /payment/… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-j6vj-j7q6-95qq |
4.3 (3.1)
|
Missing Authorization vulnerability in Long Watch Studio MyRewards woorewards allows Exploiting Inc… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-g8rx-2jmm-3847 |
5.7 (4.0)
|
Insufficiently Protected Credentials in Sparx Systems Pty Ltd. Sparx Enterprise Architect. Client d… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-g4ww-j67q-3j45 |
9.8 (3.1)
|
Slah CMS v1.5.0 and below was discovered to contain a remote code execution (RCE) vulnerability in … | 2026-04-15T18:31:58Z | 2026-04-16T15:31:32Z |
| ghsa-f4mv-qxg4-7wq3 |
6.3 (3.1)
|
Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to pote… | 2026-04-15T21:30:19Z | 2026-04-16T15:31:32Z |
| ghsa-7crm-7p4w-3558 |
|
SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL Injection in the fi… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-6f47-h5cp-7cwm |
6.4 (3.1)
|
The Email Encoder – Protect Email Addresses and Phone Numbers plugin for WordPress is vulnerable to… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-3fcv-p6qc-8gvx |
|
SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL Injection in the fi… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-3969-mh7w-g5vp |
5.3 (3.1)
|
Missing Authorization vulnerability in Majestic Support Majestic Support majestic-support allows Ex… | 2026-04-16T15:31:31Z | 2026-04-16T15:31:32Z |
| ghsa-263f-2q4p-95qq |
|
SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file … | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ghsa-23m2-3g75-jvc8 |
5.3 (3.1)
|
The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin f… | 2026-04-16T15:31:32Z | 2026-04-16T15:31:32Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-204 |
8.1 (3.1)
|
TorchGeo Remote Code Execution Vulnerability | torchgeo | 2024-11-12T18:15:45+00:00 | 2025-01-19T19:19:01.299352+00:00 |
| pysec-2024-203 |
7.5 (3.1)
|
DuckDB is a SQL database management system. In versions 1.0.0 and prior, content in files… | duckdb | 2024-07-24T18:15:05+00:00 | 2025-01-19T19:18:58.299130+00:00 |
| pysec-2024-202 |
6.5 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:07+00:00 | 2025-01-19T16:22:59.212853+00:00 |
| pysec-2024-201 |
6.1 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-11-05T19:15:05+00:00 | 2025-01-19T16:22:59.154645+00:00 |
| pysec-2024-200 |
7.2 (3.1)
|
JupyterHub is software that allows one to create a multi-user server for Jupyter notebook… | jupyterhub | 2024-08-08T15:15:17+00:00 | 2025-01-19T16:22:58.171761+00:00 |
| pysec-2024-199 |
3.7 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T23:15:02+00:00 | 2025-01-19T16:22:57.938459+00:00 |
| pysec-2024-198 |
4.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:11+00:00 | 2025-01-19T16:22:57.845317+00:00 |
| pysec-2024-197 |
5.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.732726+00:00 |
| pysec-2024-196 |
8.3 (3.1)
|
Gradio is an open-source Python package designed for quick prototyping. This vulnerabilit… | gradio | 2024-10-10T22:15:10+00:00 | 2025-01-19T16:22:57.640183+00:00 |
| pysec-2024-195 |
5.5 (3.1)
|
Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow… | apache-airflow | 2024-06-14T09:15:09+00:00 | 2025-01-19T16:22:56.419822+00:00 |
| pysec-2024-194 |
6.1 (3.1)
|
A clickjacking vulnerability exists in zenml-io/zenml versions up to and including 0.55.5… | zenml | 2024-06-06T19:15:54+00:00 | 2025-01-19T13:22:31.835293+00:00 |
| pysec-2024-193 |
3.3 (3.1)
|
An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to imp… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-19T13:22:31.701775+00:00 |
| pysec-2024-192 |
|
An issue was discovered in llama_index before 0.10.38. download/integration.py includes a… | llama-index | 2024-08-22T20:15:10+00:00 | 2025-01-19T13:22:29.175614+00:00 |
| pysec-2024-191 |
5.5 (3.1)
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2024-10-24T22:15:04+00:00 | 2025-01-19T10:22:29.812605+00:00 |
| pysec-2024-190 |
8.8 (3.1)
|
Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenti… | apache-airflow | 2024-07-17T08:15:02+00:00 | 2025-01-19T07:21:16.859034+00:00 |
| pysec-2024-189 |
5.4 (3.1)
|
Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated at… | apache-airflow | 2024-07-17T08:15:01+00:00 | 2025-01-19T07:21:16.796301+00:00 |
| pysec-2024-188 |
6.1 (3.1)
|
WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Lo… | webob | 2024-08-14T21:15:17+00:00 | 2025-01-19T04:23:01.908824+00:00 |
| pysec-2024-187 |
9.8 (3.1)
|
virtualenv before 20.26.6 allows command injection through the activation scripts for a v… | virtualenv | 2024-11-24T16:15:06+00:00 | 2025-01-19T04:23:01.784352+00:00 |
| pysec-2024-186 |
6.5 (3.1)
|
RestrictedPython is a restricted execution environment for Python to run untrusted code. … | restrictedpython | 2024-09-30T16:15:09+00:00 | 2025-01-19T04:23:01.259448+00:00 |
| pysec-2024-185 |
|
Nebari through 2024.4.1 prints the temporary Keycloak root password. | nebari | 2024-05-06T00:15:10+00:00 | 2025-01-19T04:23:00.951638+00:00 |
| pysec-2024-184 |
7.5 (3.1)
|
A local file inclusion vulnerability exists in the JSON component of gradio-app/gradio ve… | gradio | 2024-06-06T18:15:18+00:00 | 2025-01-19T04:23:00.017053+00:00 |
| pysec-2024-183 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-11-06T15:15:11+00:00 | 2025-01-19T04:22:59.576907+00:00 |
| pysec-2024-182 |
|
Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive… | apache-airflow | 2024-11-15T09:15:14+00:00 | 2025-01-19T04:22:59.398988+00:00 |
| pysec-2024-181 |
6.1 (3.1)
|
Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of… | apache-airflow | 2024-08-21T16:15:08+00:00 | 2025-01-19T04:22:59.351008+00:00 |
| pysec-2024-180 |
5.4 (3.1)
|
Stored XSS in organizer and event settings of pretix up to 2024.7.0 allows malicious even… | pretix | 2024-08-23T15:15:17+00:00 | 2025-01-19T01:52:24.493530+00:00 |
| pysec-2024-179 |
4.8 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… | octoprint | 2024-03-18T22:15:07+00:00 | 2025-01-19T01:52:24.377662+00:00 |
| pysec-2024-178 |
7.5 (3.1)
|
Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to version 2… | litestar | 2024-11-20T21:15:08+00:00 | 2025-01-19T01:52:23.772726+00:00 |
| pysec-2024-177 |
9.8 (3.1)
|
Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach… | langflow | 2024-06-10T20:15:15+00:00 | 2025-01-19T01:52:23.722576+00:00 |
| pysec-2024-176 |
6.1 (3.1)
|
A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml ver… | zenml | 2024-06-30T16:15:03+00:00 | 2025-01-18T22:21:45.122426+00:00 |
| pysec-2024-175 |
|
WordOps through 3.20.0 has a wo/cli/plugins/stack_pref.py TOCTOU race condition because t… | wordops | 2024-05-06T00:15:10+00:00 | 2025-01-18T22:21:44.991242+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33769 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.558897Z |
| gsd-2024-33768 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.521409Z |
| gsd-2024-33767 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.454953Z |
| gsd-2024-33766 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.508057Z |
| gsd-2024-33765 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.328589Z |
| gsd-2024-33764 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.348731Z |
| gsd-2024-33763 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.335356Z |
| gsd-2024-33762 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.364877Z |
| gsd-2024-33761 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.399777Z |
| gsd-2024-33760 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.533361Z |
| gsd-2024-33759 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.447890Z |
| gsd-2024-33758 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.500910Z |
| gsd-2024-33757 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.319530Z |
| gsd-2024-33756 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.430035Z |
| gsd-2024-33755 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.436135Z |
| gsd-2024-33754 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.379823Z |
| gsd-2024-33753 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.430763Z |
| gsd-2024-33752 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.406190Z |
| gsd-2024-33751 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.370177Z |
| gsd-2024-33750 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.304976Z |
| gsd-2024-33749 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.584613Z |
| gsd-2024-33748 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.439408Z |
| gsd-2024-33747 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.485640Z |
| gsd-2024-33746 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.376327Z |
| gsd-2024-33745 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.468253Z |
| gsd-2024-33744 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.543395Z |
| gsd-2024-33743 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.488662Z |
| gsd-2024-33742 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.321372Z |
| gsd-2024-33741 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.568527Z |
| gsd-2024-33740 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.479260Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2809 | Malicious code in bombonsec-test-123 (PyPI) | 2026-04-16T10:25:26Z | 2026-04-16T10:25:26Z |
| mal-2026-2808 | Malicious code in wpfuihelpercore (NuGet) | 2026-04-16T10:25:01Z | 2026-04-16T10:25:01Z |
| mal-2026-2807 | Malicious code in jjrawlins.cdkiampolicybuilderhelper (NuGet) | 2026-04-16T10:24:59Z | 2026-04-16T10:24:59Z |
| mal-2026-2806 | Malicious code in youpin (npm) | 2026-04-16T10:24:22Z | 2026-04-16T10:24:22Z |
| mal-2026-2805 | Malicious code in winston-prisma (npm) | 2026-04-16T10:23:34Z | 2026-04-16T10:23:34Z |
| mal-2026-2804 | Malicious code in transcript-viewer-ui-demo (npm) | 2026-04-16T10:21:08Z | 2026-04-16T10:21:08Z |
| mal-2026-2803 | Malicious code in tailwind-configuration (npm) | 2026-04-16T10:19:18Z | 2026-04-16T10:19:18Z |
| mal-2026-2802 | Malicious code in synthetics-sdk-node (npm) | 2026-04-16T10:19:13Z | 2026-04-16T10:19:13Z |
| mal-2026-2801 | Malicious code in sfx-data (npm) | 2026-04-16T10:17:01Z | 2026-04-16T10:17:01Z |
| mal-2026-2800 | Malicious code in separadordeinfo (npm) | 2026-04-16T10:16:50Z | 2026-04-16T10:16:50Z |
| mal-2026-2799 | Malicious code in rtxaspnet (npm) | 2026-04-16T10:15:51Z | 2026-04-16T10:15:51Z |
| mal-2026-2798 | Malicious code in request-easy-validator (npm) | 2026-04-16T10:15:30Z | 2026-04-16T10:15:30Z |
| mal-2026-2797 | Malicious code in relion-node (npm) | 2026-04-16T10:15:19Z | 2026-04-16T10:15:19Z |
| mal-2026-2796 | Malicious code in relion-chain (npm) | 2026-04-16T10:15:17Z | 2026-04-16T10:15:17Z |
| mal-2026-2795 | Malicious code in react-appfabric-shell (npm) | 2026-04-16T10:13:30Z | 2026-04-16T10:13:30Z |
| mal-2026-2794 | Malicious code in puzzle-fragment (npm) | 2026-04-16T10:12:49Z | 2026-04-16T10:12:49Z |
| mal-2026-2793 | Malicious code in pil2-stark-js (npm) | 2026-04-16T10:11:12Z | 2026-04-16T10:11:12Z |
| mal-2026-2792 | Malicious code in pil2-proofman-js (npm) | 2026-04-16T10:11:10Z | 2026-04-16T10:11:10Z |
| mal-2026-2791 | Malicious code in payments-ui (npm) | 2026-04-16T10:10:48Z | 2026-04-16T10:10:48Z |
| mal-2026-2790 | Malicious code in package-with-import-assertions (npm) | 2026-04-16T10:09:59Z | 2026-04-16T10:09:59Z |
| mal-2026-2789 | Malicious code in otomi-tasks (npm) | 2026-04-16T10:09:49Z | 2026-04-16T10:09:49Z |
| mal-2026-2788 | Malicious code in otomi-console (npm) | 2026-04-16T10:09:47Z | 2026-04-16T10:09:47Z |
| mal-2026-2787 | Malicious code in node-syncora (npm) | 2026-04-16T10:07:54Z | 2026-04-16T10:07:54Z |
| mal-2026-2786 | Malicious code in node-metrica (npm) | 2026-04-16T10:07:46Z | 2026-04-16T10:07:46Z |
| mal-2026-2785 | Malicious code in nemo-jaws (npm) | 2026-04-16T10:07:12Z | 2026-04-16T10:07:12Z |
| mal-2026-2784 | Malicious code in nemo-datadrive (npm) | 2026-04-16T10:07:10Z | 2026-04-16T10:07:10Z |
| mal-2026-2783 | Malicious code in mypeopledoc (npm) | 2026-04-16T10:06:28Z | 2026-04-16T10:06:28Z |
| mal-2026-2782 | Malicious code in mybibilabu (npm) | 2026-04-16T10:06:26Z | 2026-04-16T10:06:26Z |
| mal-2026-2781 | Malicious code in minecraft_image_to_blocks (npm) | 2026-04-16T10:05:22Z | 2026-04-16T10:05:22Z |
| mal-2026-2780 | Malicious code in metrify-node (npm) | 2026-04-16T10:05:20Z | 2026-04-16T10:05:20Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0864 | OpenBao: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0825 | strongSwan: Schwachstelle ermöglicht Denial of Service | 2026-03-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0782 | WebKitGTK: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0761 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Denial of Service | 2026-03-17T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0756 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Privilegieneskalation und Offenlegung von Informationen | 2026-03-16T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0744 | ImageMagick: Schwachstelle ermöglicht Denial of Service | 2026-03-16T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0688 | cPanel cPanel/WHM: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0643 | ImageMagick: Mehrere Schwachstellen | 2026-03-09T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0494 | Red Hat Enterprise Linux (389-ds-base): Schwachstelle ermöglicht Codeausführung und potenziell Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0484 | ImageMagick: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0479 | Red Hat OpenShift Service Mesh (Kiali): Schwachstelle ermöglicht Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0462 | Linux Kernel: Mehrere Schwachstellen | 2026-02-18T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0405 | Grafana: Mehrere Schwachstellen | 2026-02-11T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0362 | Red Hat Enterprise Linux (Lodash): Schwachstelle ermöglicht Denial of Service | 2026-02-10T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0345 | Golang Go: Mehrere Schwachstellen | 2026-02-08T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0327 | Asterisk: Mehrere Schwachstellen | 2026-02-05T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0326 | Red Hat Self-service automation portal for Ansible Automation Platform: Schwachstelle ermöglicht Manipulation von Dateien | 2026-02-05T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0306 | Red Hat Enterprise Linux (pyasn1): Schwachstelle ermöglicht Denial of Service | 2026-02-04T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0269 | SaltStack Salt: Mehrere Schwachstellen | 2026-02-01T23:00:00.000+00:00 | 2026-03-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0743 | OpenClaw: Mehrere Schwachstellen | 2026-03-16T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0727 | OpenClaw: Mehrere Schwachstellen | 2026-03-15T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0711 | OpenClaw: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0691 | OpenClaw: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-29T22:00:00.000+00:00 |
| wid-sec-w-2026-0882 | GIMP: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0881 | IBM License Metric Tool: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0878 | FreeBSD Project FreeBSD OS: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0873 | docker: Mehrere Schwachstellen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0869 | SolarWinds Platform: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0865 | Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0849 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-184-01 | Hitachi Energy Relion 670/650 and SAM600-IO Series | 2025-06-24T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-343-03 | Multiple India-based CCTV Cameras (Update A)** | 2025-12-09T06:00:00.000000Z | 2026-02-05T06:00:00.000000Z |
| icsa-26-034-04 | Synectix LAN 232 TRIO | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-03 | RISS SRL MOMA Seismic Station | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-02 | *Avation Light Engine Pro * | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-01 | Mitsubishi Electric FREQSHIP-mini for Windows | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-310-02 | Ubia Ubox (Update A) | 2025-11-06T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-128-03 | Mitsubishi Electric Multiple FA Products (Update B) | 2025-05-08T06:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-24-345-06 | Rockwell Automation Arena (Update B) | 2024-12-10T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-089-01 | Hitachi Energy IEC 61850 MMS-Server (Update B) | 2023-02-14T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-068-05 | Hitachi Energy Relion 670, 650 and SAM600-IO Series | 2023-02-28T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-112-03 | Schneider Electric Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000000Z | 2026-01-30T07:00:00.000000Z |
| icsa-26-029-03 | Rockwell Automation ControlLogix | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-029-02 | Rockwell Automation ArmorStart LT | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-205-01 | Mitsubishi Electric CNC Series (Update B) | 2025-07-24T06:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-25-028-06 | Schneider Electric RemoteConnect and SCADAPack x70 Utilities (Update A) | 2025-01-14T00:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-027-03 | Schneider Electric Zigbee Products | 2026-01-13T08:00:00.000000Z | 2026-01-27T20:13:34.637968Z |
| icsa-26-027-02 | Festo Didactic SE MES PC | 2024-02-27T12:00:00.000000Z | 2026-01-27T16:20:28.099631Z |
| icsa-26-027-04 | Johnson Controls Metasys Products | 2026-01-27T07:00:00.000000Z | 2026-01-27T07:00:00.000000Z |
| icsa-26-022-01 | Schneider Electric | 2026-01-13T08:00:00.000000Z | 2026-01-22T17:29:46.950679Z |
| icsa-26-022-08 | EVMAPA | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-07 | Delta Electronics DIAView | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-06 | Hubitat Elevation Hubs | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-05 | Weintek cMT X Series HMI EasyWeb Service | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-04 | Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-03 | Rockwell Automation CompactLogix 5370 | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-02 | AutomationDirect CLICK Programmable Logic Controller | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-25-352-08 | Axis Communications Camera Station Pro, Camera Station, and Device Manager (Update B) | 2025-12-18T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-24-326-04 | Schneider Electric Modicon M340, MC80, and Momentum Unity M1E (Update B) | 2024-11-12T05:00:00.000000Z | 2026-01-20T15:49:53.166459Z |
| icsa-26-020-02 | Schneider Electric devices using CODESYS Runtime | 2023-07-11T07:15:18.000000Z | 2026-01-20T15:49:51.778731Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-fmc-html-inj-mqjrzrny | Cisco Secure Firewall Management Center Software HTML Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-ftd-cmdinj-phe7kmt | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-hcrlpfyn | Cisco Secure Firewall Management Center Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-authz-bypass-m7xhnau | Cisco Secure Firewall Management Center Software Authorization Bypass Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpnwebs-dos-hjbhmbsx | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpn-dos-mfpeka6e | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-nat-dns-dos-bqhynhtm | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Network Address Translation DNS Inspection Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-http-file-huyx2jl4 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-dhcp-qj7ngs4n | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software DHCP Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-cmdinj-vehfezq3 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Authenticated Command Injection Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-ftd-ios-dos-doeshwhy | Cisco IOS, IOS XE, Secure Firewall Adaptive Security Appliance, and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-ftd-acl-bypass-mtpze9yh | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Access Control Rules Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asa-buffer-overflow-pyruhwbc | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Web Services Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-webex-join-ynxfqhk4 | Cisco Webex Meeting Client Join Certificate Validation Vulnerability | 2025-08-06T16:00:00+00:00 | 2025-08-06T16:00:00+00:00 |
| cisco-sa-ise_xss_acc_cont-ysr4ut4u | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2025-08-06T16:00:00+00:00 | 2025-08-06T16:00:00+00:00 |
| cisco-sa-20170629-snmp | SNMP Remote Code Execution Vulnerabilities in Cisco IOS and IOS XE Software | 2017-06-29T16:00:00+00:00 | 2025-07-30T16:27:06+00:00 |
| cisco-sa-ise-unauth-rce-zad2gnj6 | Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities | 2025-06-25T16:00:00+00:00 | 2025-07-24T23:30:31+00:00 |
| cisco-sa-piepnm-bsi-25jjqsbb | Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-ise-multi-3vpsxoxo | Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-cuis-ssrf-jsudjev | Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-cuis-file-upload-uhnetstm | Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability | 2025-07-16T16:00:00+00:00 | 2025-07-16T16:00:00+00:00 |
| cisco-sa-spaces-conn-privesc-kgd2ccdu | Cisco Spaces Connector Privilege Escalation Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-ece-xss-cbtkteyc | Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-cucm-ssh-m4ubdpe7 | Cisco Unified Communications Manager Static SSH Credentials Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
| cisco-sa-ise-stored-xss-yff54m73 | Cisco Identity Services Stored Cross-Site Scripting Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-06-30T15:08:59+00:00 |
| cisco-sa-ise-auth-bypass-mvfkvqau | Cisco Identity Services Engine Authorization Bypass Vulnerability | 2025-06-25T16:00:00+00:00 | 2025-06-25T16:00:00+00:00 |
| cisco-sa-ise-file-upload-p4m8vwxy | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-23T19:16:21+00:00 |
| cisco-sa-meraki-mx-vpn-dos-sm5gcfm7 | Cisco Meraki MX and Z Series AnyConnect VPN with Client Certificate Authentication Denial of Service Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-clamav-udf-hmwd9ndy | ClamAV UDF File Parsing Out-of-Bounds Read Information Disclosure Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
| cisco-sa-erlang-otp-ssh-xyzzy | Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server: April 2025 | 2025-04-22T21:45:00+00:00 | 2025-06-11T14:40:37+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-33098 | Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33096 | HTTP.sys Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-33095 | Microsoft Word Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32226 | .NET Framework Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32225 | Windows Shell Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32224 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32222 | Windows Win32k Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32221 | Windows Graphics Component Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32220 | UEFI Secure Boot Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32219 | Microsoft Brokering File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32218 | Windows Kernel Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32217 | Windows Kernel Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32216 | Windows Redirected Drive Buffering System Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32215 | Windows Kernel Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32214 | Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32212 | Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32203 | .NET and Visual Studio Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32202 | Windows Shell Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32201 | Microsoft SharePoint Server Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32200 | Microsoft PowerPoint Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32199 | Microsoft Excel Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32198 | Microsoft Excel Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32197 | Microsoft Excel Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32196 | Windows Admin Center Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32195 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32192 | Azure Monitor Agent Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32190 | Microsoft Office Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32189 | Microsoft Excel Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32188 | Microsoft Excel Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32187 | Microsoft Edge (Chromium-based) Defense in Depth Vulnerability - Rejected | 2026-03-10T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0377 | Kwetsbaarheden verholpen in GitLab | 2025-11-27T13:35:09.121804Z | 2025-11-27T13:35:09.121804Z |
| ncsc-2025-0376 | Kwetsbaarheden verholpen in SonicWall Email Security appliances | 2025-11-21T16:06:33.949861Z | 2025-11-21T16:06:33.949861Z |
| ncsc-2025-0375 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-21T16:06:14.387571Z | 2025-11-21T16:06:14.387571Z |
| ncsc-2025-0334 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2025-10-23T13:42:11.992643Z | 2025-11-21T16:03:18.991100Z |
| ncsc-2025-0374 | Kwetsbaarheden verholpen in Arista EOS | 2025-11-20T11:48:20.126141Z | 2025-11-20T11:48:20.126141Z |
| ncsc-2025-0373 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2025-11-19T08:35:31.999400Z | 2025-11-19T08:35:31.999400Z |
| ncsc-2025-0372 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-19T08:34:59.616354Z | 2025-11-19T08:34:59.616354Z |
| ncsc-2025-0371 | Kwetsbaarheden verholpen in Google Chrome | 2025-11-18T09:01:31.984222Z | 2025-11-18T09:01:31.984222Z |
| ncsc-2025-0370 | Kwetsbaarheden verholpen in Cisco Unified Contact Center Express | 2025-11-18T07:04:55.173157Z | 2025-11-18T07:04:55.173157Z |
| ncsc-2025-0369 | Kwetsbaarheden verholpen in IBM AIX | 2025-11-18T07:03:55.766335Z | 2025-11-18T07:03:55.766335Z |
| ncsc-2025-0368 | Kwetsbaarheden verholpen in Zoom Workplace en Zoom Clients | 2025-11-18T07:02:36.696426Z | 2025-11-18T07:02:36.696426Z |
| ncsc-2025-0367 | Kwetsbaarheden verholpen in GitLab | 2025-11-18T07:01:35.502522Z | 2025-11-18T07:01:35.502522Z |
| ncsc-2025-0366 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-15T14:57:33.774388Z | 2025-11-15T14:57:33.774388Z |
| ncsc-2025-0365 | Kwetsbaarheden verholpen in Cisco Catalyst Center | 2025-11-14T12:55:27.227262Z | 2025-11-14T12:55:27.227262Z |
| ncsc-2025-0364 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-11-12T12:17:16.207233Z | 2025-11-12T12:17:16.207233Z |
| ncsc-2025-0363 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-11-12T11:52:08.634593Z | 2025-11-12T11:56:09.924799Z |
| ncsc-2025-0362 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-11-11T18:35:40.376220Z | 2025-11-11T18:35:40.376220Z |
| ncsc-2025-0361 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-11-11T18:34:39.453615Z | 2025-11-11T18:34:39.453615Z |
| ncsc-2025-0360 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2025-11-11T18:33:13.936830Z | 2025-11-11T18:33:13.936830Z |
| ncsc-2025-0359 | Kwetsbaarheden verholpen in Microsoft Office | 2025-11-11T18:31:27.092072Z | 2025-11-11T18:31:27.092072Z |
| ncsc-2025-0358 | Kwetsbaartheden verholpen in Microsoft Windows | 2025-11-11T18:29:38.918562Z | 2025-11-11T18:29:38.918562Z |
| ncsc-2025-0357 | Kwetsbaarheden verholpen in Siemens producten | 2025-11-11T18:14:44.487803Z | 2025-11-11T18:14:44.487803Z |
| ncsc-2025-0356 | Kwetsbaarheden verholpen in SAP-producten | 2025-11-11T12:15:53.615720Z | 2025-11-11T12:15:53.615720Z |
| ncsc-2025-0355 | Kwetsbaarheden verholpen in Fortinet FortiOS en FortiProxy | 2025-11-07T10:07:28.475542Z | 2025-11-07T10:07:28.475542Z |
| ncsc-2025-0354 | Kwetsbaarheid verholpen in Cisco Identity Services Engine | 2025-11-06T12:36:51.591695Z | 2025-11-06T12:36:51.591695Z |
| ncsc-2025-0353 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-11-04T15:03:48.630084Z | 2025-11-04T15:03:48.630084Z |
| ncsc-2025-0352 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-11-04T12:53:15.358078Z | 2025-11-04T12:53:15.358078Z |
| ncsc-2025-0351 | Kwetsbaarheden verholpen in Apple MacOS | 2025-11-04T12:44:25.439757Z | 2025-11-04T12:44:25.439757Z |
| ncsc-2025-0350 | Kwetsbaarheid verholpen in CFMOTO Ride voertuigdatabeheer systemen | 2025-11-04T10:27:59.187171Z | 2025-11-04T10:27:59.187171Z |
| ncsc-2025-0349 | Kwetsbaarheden verholpen in Nagios XI | 2025-11-03T08:27:42.052256Z | 2025-11-03T08:27:42.052256Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10423-1 | nginx-1.29.7-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10422-1 | libtpms-devel-0.10.2-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10421-1 | kea-3.0.3-1.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:10420-1 | amazon-cloudwatch-agent-1.300064.0-2.1 on GA media | 2026-03-25T00:00:00Z | 2026-03-25T00:00:00Z |
| opensuse-su-2026:20417-1 | Security update for python-black | 2026-03-24T19:40:55Z | 2026-03-24T19:40:55Z |
| opensuse-su-2026:20415-1 | Security update for 389-ds | 2026-03-24T17:50:31Z | 2026-03-24T17:50:31Z |
| opensuse-su-2026:20414-1 | Security update for tomcat11 | 2026-03-24T16:07:26Z | 2026-03-24T16:07:26Z |
| opensuse-su-2026:20413-1 | Security update for nghttp2 | 2026-03-24T12:30:27Z | 2026-03-24T12:30:27Z |
| opensuse-su-2026:20422-1 | Security update for chromium | 2026-03-24T07:22:02Z | 2026-03-24T07:22:02Z |
| opensuse-su-2026:20412-1 | Security update for salt | 2026-03-24T06:24:23Z | 2026-03-24T06:24:23Z |
| opensuse-su-2026:10419-1 | rclone-1.73.3-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10418-1 | python311-jsonpath-ng-1.8.0-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10417-1 | python311-deepdiff-8.6.2-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10416-1 | python313-PyMuPDF-1.27.2.2-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10415-1 | glances-common-4.5.2-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10414-1 | perl-Crypt-URandom-0.550.0-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:10413-1 | firefox-esr-140.9.0-1.1 on GA media | 2026-03-24T00:00:00Z | 2026-03-24T00:00:00Z |
| opensuse-su-2026:20423-1 | Security update for freeciv | 2026-03-23T15:34:35Z | 2026-03-23T15:34:35Z |
| opensuse-su-2026:20410-1 | Security update for exiv2 | 2026-03-23T09:44:37Z | 2026-03-23T09:44:37Z |
| opensuse-su-2026:10412-1 | python311-pydicom-3.0.2-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10411-1 | python311-dynaconf-3.2.13-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10410-1 | pnpm-10.32.1-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10409-1 | pgvector-devel-0.8.2-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10408-1 | freerdp-3.24.1-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10407-1 | azure-storage-azcopy-10.32.2-1.1 on GA media | 2026-03-23T00:00:00Z | 2026-03-23T00:00:00Z |
| opensuse-su-2026:10406-1 | lemon-3.51.3-1.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10405-1 | python314-3.14.3-3.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10404-1 | python310-3.10.20-2.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10403-1 | python311-pypdf-6.9.1-1.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10402-1 | python311-PyPDF2-2.11.1-8.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3506 | Red Hat Security Advisory: yggdrasil security update | 2026-03-02T06:45:32+00:00 | 2026-04-16T20:42:00+00:00 |
| rhsa-2026:3489 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T02:56:16+00:00 | 2026-04-16T20:42:00+00:00 |
| rhsa-2026:3473 | Red Hat Security Advisory: golang security update | 2026-03-02T01:23:25+00:00 | 2026-04-16T20:42:00+00:00 |
| rhsa-2026:3472 | Red Hat Security Advisory: golang security update | 2026-03-02T01:26:30+00:00 | 2026-04-16T20:42:00+00:00 |
| rhsa-2026:3471 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:35:05+00:00 | 2026-04-16T20:41:58+00:00 |
| rhsa-2026:3470 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:22:15+00:00 | 2026-04-16T20:41:58+00:00 |
| rhsa-2026:3469 | Red Hat Security Advisory: golang security update | 2026-03-02T01:34:30+00:00 | 2026-04-16T20:41:58+00:00 |
| rhsa-2026:3459 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.9.0 release | 2026-02-26T19:58:40+00:00 | 2026-04-16T20:41:58+00:00 |
| rhsa-2026:3468 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:25:20+00:00 | 2026-04-16T20:41:57+00:00 |
| rhsa-2026:3427 | Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.9.0 release | 2026-02-26T11:02:21+00:00 | 2026-04-16T20:41:56+00:00 |
| rhsa-2026:3416 | Red Hat Security Advisory: OpenShift Container Platform 4.17.50 packages and security update | 2026-03-04T09:07:15+00:00 | 2026-04-16T20:41:55+00:00 |
| rhsa-2026:3391 | Red Hat Security Advisory: OpenShift Container Platform 4.19.25 packages and security update | 2026-03-04T15:54:04+00:00 | 2026-04-16T20:41:55+00:00 |
| rhsa-2026:3343 | Red Hat Security Advisory: skopeo security update | 2026-02-25T11:50:40+00:00 | 2026-04-16T20:41:55+00:00 |
| rhsa-2026:3341 | Red Hat Security Advisory: containernetworking-plugins security update | 2026-02-25T12:14:45+00:00 | 2026-04-16T20:41:55+00:00 |
| rhsa-2026:3340 | Red Hat Security Advisory: skopeo security update | 2026-02-25T12:16:20+00:00 | 2026-04-16T20:41:53+00:00 |
| rhsa-2026:3337 | Red Hat Security Advisory: podman security update | 2026-02-25T11:48:26+00:00 | 2026-04-16T20:41:53+00:00 |
| rhsa-2026:3336 | Red Hat Security Advisory: podman security update | 2026-02-25T11:30:01+00:00 | 2026-04-16T20:41:53+00:00 |
| rhsa-2026:3297 | Red Hat Security Advisory: buildah security update | 2026-02-25T09:09:30+00:00 | 2026-04-16T20:41:53+00:00 |
| rhsa-2026:3298 | Red Hat Security Advisory: buildah security update | 2026-02-25T09:32:15+00:00 | 2026-04-16T20:41:52+00:00 |
| rhsa-2026:3296 | Red Hat Security Advisory: RHTAS - Tech Preview Release Of the Policy Controller Operator | 2026-02-25T08:49:49+00:00 | 2026-04-16T20:41:52+00:00 |
| rhsa-2026:3291 | Red Hat Security Advisory: runc security update | 2026-02-25T07:41:04+00:00 | 2026-04-16T20:41:51+00:00 |
| rhsa-2026:3193 | Red Hat Security Advisory: golang security update | 2026-02-24T12:01:01+00:00 | 2026-04-16T20:41:51+00:00 |
| rhsa-2026:3192 | Red Hat Security Advisory: golang security update | 2026-02-24T12:06:46+00:00 | 2026-04-16T20:41:50+00:00 |
| rhsa-2026:3040 | Red Hat Security Advisory: grafana-pcp security update | 2026-02-23T02:14:35+00:00 | 2026-04-16T20:41:50+00:00 |
| rhsa-2026:3188 | Red Hat Security Advisory: grafana security update | 2026-02-24T11:39:36+00:00 | 2026-04-16T20:41:49+00:00 |
| rhsa-2026:3187 | Red Hat Security Advisory: grafana-pcp security update | 2026-02-24T11:39:51+00:00 | 2026-04-16T20:41:49+00:00 |
| rhsa-2026:3186 | Red Hat Security Advisory: Red Hat build of Cryostat 4.1.1: new RHEL 9 container image security update | 2026-02-26T02:56:36+00:00 | 2026-04-16T20:41:49+00:00 |
| rhsa-2026:3184 | Red Hat Security Advisory: RHTAS - Tech Preview Release Of the Policy Controller Operator | 2026-02-24T09:58:16+00:00 | 2026-04-16T20:41:48+00:00 |
| rhsa-2026:3092 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-02-23T15:34:28+00:00 | 2026-04-16T20:41:48+00:00 |
| rhsa-2026:3089 | Red Hat Security Advisory: Red Hat Developer Hub 1.8.4 release. | 2026-02-23T14:46:08+00:00 | 2026-04-16T20:41:47+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2022-312-01 | NetBotz 4 - 355/450/455/550/570 | 2022-11-08T06:53:24.000Z | 2023-02-14T06:30:00.000Z |
| sevd-2023-045-01 | EcoStruxureTM Geo SCADA Expert | 2023-02-14T06:02:05.000Z | 2023-02-14T06:02:05.000Z |
| sevd-2022-347-01 | APC Easy UPS Online Monitoring Software | 2022-12-13T06:09:04.000Z | 2023-01-11T00:00:00.000Z |
| sevd-2023-010-03 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2023-01-10T17:44:20.000Z | 2023-01-10T17:44:20.000Z |
| sevd-2023-010-04 | EcoStruxure™ Power SCADA Anywhere | 2023-01-10T10:28:35.000Z | 2023-01-10T10:28:35.000Z |
| sevd-2023-010-01 | EcoStruxureTM Machine Expert – HVAC (formerly SoMachine - HVAC) | 2023-01-10T09:28:52.000Z | 2023-01-10T09:28:52.000Z |
| sevd-2022-347-03 | EcoStruxure Power Commission | 2022-12-13T04:28:00.000Z | 2022-12-13T04:28:00.000Z |
| sevd-2022-347-02 | Saitel DR RTU | 2022-12-13T04:12:25.000Z | 2022-12-13T04:12:25.000Z |
| sevd-2021-103-01 | C-Bus Toolkit and C-Gate Server | 2021-04-13T11:17:13.000Z | 2022-11-08T11:17:13.000Z |
| sevd-2021-130-04 | homeLYnk (Wiser For KNX) and spaceLYnk | 2021-05-11T07:30:55.000Z | 2022-11-08T07:30:55.000Z |
| sevd-2022-284-04 | EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 | 2022-10-11T10:45:15.000Z | 2022-10-14T10:45:15.000Z |
| sevd-2022-284-02 | EcoStruxure™ Panel Server Box (PAS900) | 2022-10-11T10:05:49.000Z | 2022-10-11T10:05:49.000Z |
| sevd-2022-284-01 | EcoStruxure™ Operator Terminal Expert and Pro-face BLUE | 2022-10-11T09:48:46.000Z | 2022-10-11T09:48:46.000Z |
| sevd-2020-343-05 | Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and Associated Communication Modules | 2020-12-08T21:04:43.000Z | 2022-09-13T20:04:43.000Z |
| sevd-2020-343-07 | SNMP Service on Modicon M340 and Associated Communication Modules | 2020-12-08T05:49:51.000Z | 2022-09-13T05:49:51.000Z |
| sevd-2022-256-01 | EcoStruxure Machine SCADA Expert and Pro-face BLUE Open Studio | 2022-09-13T05:45:41.000Z | 2022-09-13T05:45:41.000Z |
| sesb-2019-214-01 | Wind River VxWorks Vulnerabilities (URGENT/11) | 2019-08-02T00:00:00.000Z | 2022-09-13T00:00:00.000Z |
| sevd-2022-193-01 | OPC UA and X80 advanced RTU Modicon Communication Modules | 2022-07-12T04:00:00.000Z | 2022-08-19T06:30:00.000Z |
| sesb-2021-347-01 | Apache Log4j Vulnerabilities (Log4Shell) | 2021-12-13T09:22:58.000Z | 2022-08-09T09:22:58.000Z |
| sevd-2022-221-03 | EcoStruxure™ Control Expert | 2022-08-09T09:14:27.000Z | 2022-08-09T09:14:27.000Z |
| sevd-2020-175-01 | Treck TCP/IP Vulnerabilities (Ripple20) | 2020-06-23T16:00:00.000Z | 2022-08-08T13:57:08.970Z |
| sevd-2022-193-03 | Acti9 PowerTag Link C | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-02 | SpaceLogic C-Bus Home Controller, formerly known as C-Bus Wiser Home Controller MK2 | 2022-07-12T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-257-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2021-09-14T18:30:00.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2021-222-02 | AT&T Labs Compressor (XMilI) and Decompressor (XDemill) used by EcoStruxureTM Control Expert, EcoStruxureTM Process Expert and SCADAPack RemoteConnect™ for x70 | 2021-08-01T07:25:51.000Z | 2022-07-12T18:30:00.000Z |
| sevd-2022-193-04 | Easergy P5 | 2022-07-12T08:55:42.000Z | 2022-07-12T08:55:42.000Z |
| sevd-2022-102-01 | IGSS (Interactive Graphical SCADA System) | 2022-04-12T08:47:25.000Z | 2022-07-12T08:47:25.000Z |
| sevd-2022-067-02 | APC Smart-UPS SMT, SMC, SMX, SCL, SRC, XU, XP, CSH2, SURTD, SMTL, SRT, and select SRTL Series | 2022-03-08T06:30:00.000Z | 2022-06-16T18:30:00.000Z |
| sevd-2022-165-08 | EcoStruxure™ Cybersecurity Admin Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-07 | CanBRASS | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-177847 | SSA-177847: Improper VNC Password Check Vulnerability in SINUMERIK Controllers | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-170375 | SSA-170375: Multiple Vulnerabilities in RUGGEDCOM ROS Before V5.9 | 2024-07-09T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-097435 | SSA-097435: Usernames Disclosure Vulnerability in Mendix Runtime | 2024-09-10T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-094954 | SSA-094954: Authentication Bypass Vulnerability in BIST mode of RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-725549 | SSA-725549: Denial of Service of ICMP in Industrial Devices | 2025-04-08T00:00:00Z | 2025-07-21T00:00:00Z |
| ssa-183963 | SSA-183963: Certificate Validation Vulnerabilities in SICAM TOOLBOX II Before V07.11 | 2025-07-08T00:00:00Z | 2025-07-18T00:00:00Z |
| ssa-938066 | SSA-938066: Remote Code Execution Vulnerability in SENTRON Powermanager and Desigo CC | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-904646 | SSA-904646: Sensitive Data Exposure Vulnerability in SIPROTEC 5 Devices | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-763427 | SSA-763427: Authentication Bypass Vulnerability in SIMATIC CP and TIM Devices | 2015-11-27T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-634640 | SSA-634640: Weak Authentication Vulnerability in Siemens Industrial Edge Devices | 2025-04-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-627195 | SSA-627195: Zip Path Traversal Vulnerability in Mendix Studio Pro's Module Installation Process | 2025-06-12T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-626991 | SSA-626991: Denial of Service Vulnerability in SIMATIC CN 4100 before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-593272 | SSA-593272: SegmentSmack in Interniche IP-Stack based Industrial Devices | 2020-04-14T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-573669 | SSA-573669: Multiple Vulnerabilities in TIA Administrator Before V3.0.6 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-446545 | SSA-446545: Impact of RegreSSHion (CVE-2024-6387) in Siemens Industrial Products | 2024-09-10T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-327438 | SSA-327438: Multiple Vulnerabilities in SCALANCE LPE9403 | 2025-05-13T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-091753 | SSA-091753: Multiple Vulnerabilities in Solid Edge Before SE2025 Update 5 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-078892 | SSA-078892: Multiple Vulnerabilities in SINEC NMS Before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| ssa-426509 | SSA-426509: Multiple Local Code Execution Vulnerabilities in Questa and ModelSim | 2024-10-08T00:00:00Z | 2025-06-17T00:00:00Z |
| ssa-345750 | SSA-345750: Default Credentials in Energy Services Using Elspec G5DFR | 2025-06-10T00:00:00Z | 2025-06-16T00:00:00Z |
| ssa-874353 | SSA-874353: Entity Enumeration Vulnerability in Mendix Runtime | 2025-04-08T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-656895 | SSA-656895: Open Redirect Vulnerability in Teamcenter | 2025-02-11T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-633269 | SSA-633269: Incorrect Authorization Check Vulnerability in Industrial Communication Devices based on SINEC OS before V3.1 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-620799 | SSA-620799: Denial of Service Vulnerability During BLE Pairing in SENTRON Powercenter 1000/1100 | 2024-12-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-497656 | SSA-497656: Multiple NTP Vulnerabilities in TIM 4R-IE Devices | 2021-04-13T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-486186 | SSA-486186: Out of Bounds Read Vulnerability in Tecnomatix Plant Simulation Before 2404 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-354569 | SSA-354569: Multiple Vulnerabilities in Palo Alto Networks PAN-OS on RUGGEDCOM APE1808 Devices | 2024-11-22T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-340240 | SSA-340240: Denial of Service Vulnerability in SIRIUS 3RV2921-5M | 2024-10-08T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-162506 | SSA-162506: DHCP Client Vulnerability in SIMOTICS CONNECT 400, Desigo PXC/PXM, APOGEE MEC/MBC/PXC, APOGEE PXC Series, and TALON TC Series | 2020-04-14T00:00:00Z | 2025-06-10T00:00:00Z |
| ssa-041082 | SSA-041082: Out of Bounds Read Vulnerability in SiPass Integrated Before V2.95.3.18 | 2025-05-23T00:00:00Z | 2025-05-23T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:21041-1 | Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21040-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise Micro 6.0) | 2026-04-09T13:20:01Z | 2026-04-09T13:20:01Z |
| suse-su-2026:21016-1 | Security update for util-linux | 2026-04-09T13:04:04Z | 2026-04-09T13:04:04Z |
| suse-su-2026:21039-1 | Security update for glibc | 2026-04-09T12:13:01Z | 2026-04-09T12:13:01Z |
| suse-su-2026:21013-1 | Security update for zlib | 2026-04-09T11:18:28Z | 2026-04-09T11:18:28Z |
| suse-su-2026:21038-1 | Security update for libpng16 | 2026-04-09T11:10:09Z | 2026-04-09T11:10:09Z |
| suse-su-2026:21069-1 | Security update for glibc | 2026-04-09T11:02:01Z | 2026-04-09T11:02:01Z |
| suse-su-2026:1232-1 | Security update for cockpit | 2026-04-09T10:47:29Z | 2026-04-09T10:47:29Z |
| suse-su-2026:21067-1 | Security update for libpng16 | 2026-04-09T10:16:32Z | 2026-04-09T10:16:32Z |
| suse-su-2026:1231-1 | Security update for the Linux Kernel (Live Patch 48 for SUSE Linux Enterprise 15 SP4) | 2026-04-09T09:04:39Z | 2026-04-09T09:04:39Z |
| suse-su-2026:1230-1 | Security update for bind | 2026-04-09T08:58:38Z | 2026-04-09T08:58:38Z |
| suse-su-2026:1229-1 | Security update for bind | 2026-04-09T08:58:06Z | 2026-04-09T08:58:06Z |
| suse-su-2026:21009-1 | Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-su-2026:21008-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-su-2026:21007-1 | Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-su-2026:21006-1 | Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-su-2026:21005-1 | Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-su-2026:21004-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise 16) | 2026-04-09T08:48:26Z | 2026-04-09T08:48:26Z |
| suse-ru-2026:1228-1 | Recommended update for shadow | 2026-04-09T08:27:26Z | 2026-04-09T08:27:26Z |
| suse-su-2026:1225-1 | Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise 15 SP6) | 2026-04-09T01:53:43Z | 2026-04-09T01:53:43Z |
| suse-su-2026:1222-1 | Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) | 2026-04-08T20:04:54Z | 2026-04-08T20:04:54Z |
| suse-su-2026:21065-1 | Security update for openssl-3 | 2026-04-08T16:32:18Z | 2026-04-08T16:32:18Z |
| suse-su-2026:1221-1 | Security update for the Linux Kernel (Live Patch 67 for SUSE Linux Enterprise 12 SP5) | 2026-04-08T16:04:43Z | 2026-04-08T16:04:43Z |
| suse-su-2026:21037-1 | Security update for openssl-3 | 2026-04-08T15:00:50Z | 2026-04-08T15:00:50Z |
| suse-su-2026:1218-1 | Security update for python-requests | 2026-04-08T14:39:49Z | 2026-04-08T14:39:49Z |
| suse-su-2026:21036-1 | Security update for python-requests | 2026-04-08T14:30:11Z | 2026-04-08T14:30:11Z |
| suse-su-2026:21035-1 | Security update for libtpms | 2026-04-08T14:28:41Z | 2026-04-08T14:28:41Z |
| suse-su-2026:21064-1 | Security update for libtpms | 2026-04-08T14:17:58Z | 2026-04-08T14:17:58Z |
| suse-su-2026:21063-1 | Security update for python-requests | 2026-04-08T14:11:12Z | 2026-04-08T14:11:12Z |
| suse-su-2026:1217-1 | Security update for freerdp | 2026-04-08T12:28:33Z | 2026-04-08T12:28:33Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:3068 | Important: freerdp security update | 2026-02-23T00:00:00Z | 2026-02-26T10:34:44Z |
| alsa-2026:3092 | Important: golang-github-openprinting-ipp-usb security update | 2026-02-23T00:00:00Z | 2026-02-26T10:33:21Z |
| alsa-2026:3189 | Moderate: 389-ds-base security update | 2026-02-24T00:00:00Z | 2026-02-26T10:31:32Z |
| alsa-2026:3208 | Moderate: 389-ds-base security update | 2026-02-24T00:00:00Z | 2026-02-26T10:30:07Z |
| alsa-2026:3291 | Important: runc security update | 2026-02-25T00:00:00Z | 2026-02-26T10:27:56Z |
| alsa-2026:3297 | Important: buildah security update | 2026-02-25T00:00:00Z | 2026-02-26T10:26:55Z |
| alsa-2026:3298 | Important: buildah security update | 2026-02-25T00:00:00Z | 2026-02-26T10:25:19Z |
| alsa-2026:3337 | Important: podman security update | 2026-02-25T00:00:00Z | 2026-02-26T10:23:45Z |
| alsa-2026:3339 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-02-26T10:21:52Z |
| alsa-2026:3359 | Important: python-pyasn1 security update | 2026-02-25T00:00:00Z | 2026-02-26T10:19:52Z |
| alsa-2026:3361 | Important: firefox security update | 2026-02-25T00:00:00Z | 2026-02-26T10:18:27Z |
| alsa-2026:3334 | Important: freerdp security update | 2026-02-25T00:00:00Z | 2026-02-26T09:39:13Z |
| alsa-2026:3187 | Important: grafana-pcp security update | 2026-02-24T00:00:00Z | 2026-02-24T17:14:01Z |
| alsa-2026:3188 | Important: grafana security update | 2026-02-24T00:00:00Z | 2026-02-24T17:11:47Z |
| alsa-2026:3110 | Important: kernel-rt security update | 2026-02-23T00:00:00Z | 2026-02-24T13:03:08Z |
| alsa-2026:3083 | Important: kernel security update | 2026-02-23T00:00:00Z | 2026-02-24T12:59:25Z |
| alsa-2026:3095 | Important: protobuf security update | 2026-02-23T00:00:00Z | 2026-02-24T00:13:34Z |
| alsa-2026:3094 | Important: protobuf security update | 2026-02-23T00:00:00Z | 2026-02-24T00:07:41Z |
| alsa-2026:3032 | Important: munge security update | 2026-02-23T00:00:00Z | 2026-02-23T14:44:19Z |
| alsa-2026:2721 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:34:16Z |
| alsa-2026:2720 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:27:24Z |
| alsa-2026:2783 | Important: nodejs:20 security update | 2026-02-17T00:00:00Z | 2026-02-23T13:24:32Z |
| alsa-2026:2782 | Important: nodejs:22 security update | 2026-02-17T00:00:00Z | 2026-02-23T13:22:00Z |
| alsa-2026:2722 | Moderate: kernel security update | 2026-02-16T00:00:00Z | 2026-02-23T13:18:53Z |
| alsa-2026:3042 | Moderate: openssl security update | 2026-02-23T00:00:00Z | 2026-02-23T09:07:14Z |
| alsa-2026:2914 | Important: grafana security update | 2026-02-18T00:00:00Z | 2026-02-19T18:04:08Z |
| alsa-2026:2920 | Important: grafana security update | 2026-02-18T00:00:00Z | 2026-02-19T10:58:19Z |
| alsa-2026:2706 | Important: golang security update | 2026-02-16T00:00:00Z | 2026-02-18T13:54:31Z |
| alsa-2026:2781 | Important: nodejs:24 security update | 2026-02-17T00:00:00Z | 2026-02-18T13:51:36Z |
| alsa-2026:2776 | Moderate: edk2 security update | 2026-02-17T00:00:00Z | 2026-02-18T13:48:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-802 | Stack-buffer-overflow in InterpretCondition | 2021-05-27T00:00:31.797718Z | 2026-02-08T14:08:02.526845Z |
| osv-2021-1110 | Stack-buffer-overflow in TranslateWord2 | 2021-08-08T00:02:17.026887Z | 2026-02-08T14:07:47.971880Z |
| osv-2026-209 | Use-of-uninitialized-value in ntrip_parse_url | 2026-02-08T00:06:08.137216Z | 2026-02-08T00:06:08.137699Z |
| osv-2025-547 | Security exception in com.alibaba.fastjson2.JSONReader.readArray | 2025-07-15T00:09:03.936493Z | 2026-02-07T14:17:37.720783Z |
| osv-2023-197 | Global-buffer-overflow in base_C_MessageEncryptInit | 2023-03-18T13:00:57.254906Z | 2026-02-07T14:09:46.773524Z |
| osv-2026-205 | UNKNOWN READ in gpsd_poll | 2026-02-07T00:03:03.099317Z | 2026-02-07T00:03:03.099778Z |
| osv-2026-204 | Segv on unknown address in icalarray_append | 2026-02-06T00:20:37.969087Z | 2026-02-06T00:20:37.969390Z |
| osv-2026-203 | Segv on unknown address in glslang::TIntermediate::addSymbol | 2026-02-06T00:20:30.779951Z | 2026-02-06T00:20:30.780234Z |
| osv-2026-200 | Global-buffer-overflow in nameMatch | 2026-02-06T00:15:58.927791Z | 2026-02-06T00:15:58.928058Z |
| osv-2026-196 | Null-dereference READ in ubsan_GetStackTrace | 2026-02-06T00:06:05.778394Z | 2026-02-06T00:06:05.778867Z |
| osv-2026-195 | Use-of-uninitialized-value in vcardstructured_free | 2026-02-05T00:15:22.587525Z | 2026-02-05T00:15:22.587818Z |
| osv-2026-189 | Global-buffer-overflow in gpsd_poll | 2026-02-04T00:05:14.950372Z | 2026-02-04T00:05:14.950857Z |
| osv-2026-182 | Use-of-uninitialized-value in json_internal_read_object | 2026-02-03T00:11:05.023029Z | 2026-02-03T00:11:05.023344Z |
| osv-2026-177 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-02-02T00:20:01.368972Z | 2026-02-02T00:20:01.369362Z |
| osv-2026-169 | Null-dereference READ in execute_post_instantiate_functions | 2026-02-01T00:01:05.927662Z | 2026-02-01T00:01:05.927997Z |
| osv-2022-1003 | Index-out-of-bounds in LibRaw::ahd_interpolate_r_and_b_in_rgb_and_convert_to_cielab | 2022-09-30T00:02:10.026151Z | 2026-01-31T14:08:33.420267Z |
| osv-2026-167 | Use-of-uninitialized-value in aivdm_analyze | 2026-01-31T00:10:49.750917Z | 2026-01-31T00:10:49.751204Z |
| osv-2026-166 | Use-of-uninitialized-value in ntrip_parse_url | 2026-01-31T00:10:39.163525Z | 2026-01-31T00:10:39.163931Z |
| osv-2023-235 | Use-of-uninitialized-value in complexity_RC_reset_marking | 2023-03-26T13:00:16.681780Z | 2026-01-29T14:14:41.215909Z |
| osv-2023-234 | Use-of-uninitialized-value in ihevce_enc_frm_proc_slave_thrd | 2023-03-26T13:00:12.135289Z | 2026-01-29T14:14:40.129452Z |
| osv-2023-239 | Use-of-uninitialized-value in ihevce_strm_fill_done | 2023-03-26T13:02:03.445119Z | 2026-01-29T14:14:38.558891Z |
| osv-2026-97 | Heap-buffer-overflow in vpx_wb_write_literal | 2026-01-21T00:09:09.897624Z | 2026-01-28T14:23:52.198239Z |
| osv-2026-156 | Segv on unknown address in aivdm_analyze | 2026-01-28T00:06:24.327227Z | 2026-01-28T00:06:24.327712Z |
| osv-2026-150 | Null-dereference READ in wasm_runtime_invoke_native | 2026-01-27T00:02:06.850780Z | 2026-01-27T00:02:06.851098Z |
| osv-2026-144 | Use-of-uninitialized-value in initFilter | 2026-01-26T00:05:57.473672Z | 2026-01-26T00:05:57.473958Z |
| osv-2026-141 | Segv on unknown address in yuv2rgb4_X_c | 2026-01-26T00:03:47.552290Z | 2026-01-26T00:03:47.552807Z |
| osv-2025-280 | Heap-buffer-overflow in Assimp::SceneCombiner::CopyScene | 2025-04-15T00:04:03.423453Z | 2026-01-25T14:19:05.873424Z |
| osv-2025-580 | UNKNOWN READ in signed char Assimp::StreamReader<false, false>::Get<signed char> | 2025-07-29T00:16:41.422221Z | 2026-01-25T14:18:57.285875Z |
| osv-2024-1220 | UNKNOWN READ in Assimp::NDOImporter::InternReadFile | 2024-10-14T00:17:45.088625Z | 2026-01-25T14:14:41.961973Z |
| osv-2023-869 | Heap-buffer-overflow in Assimp::MD5::MD5MeshParser::MD5MeshParser | 2023-09-17T14:01:25.028324Z | 2026-01-25T14:13:45.937535Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0436 | paste - no longer maintained | 2024-10-07T12:00:00Z | 2026-01-27T21:51:15Z |
| rustsec-2026-0005 | Potential use-after-free in `oneshot` when used asynchronously | 2026-01-25T12:00:00Z | 2026-01-27T05:50:51Z |
| rustsec-2026-0004 | Triton VM Soundness Vulnerability due to Improper Sampling of Randomness | 2026-01-21T12:00:00Z | 2026-01-23T05:50:29Z |
| rustsec-2021-0155 | Use After Free in lucet-runtime | 2021-11-30T12:00:00Z | 2026-01-17T19:50:19Z |
| rustsec-2025-0111 | `tokio-tar` parses PAX extended headers incorrectly, allows file smuggling | 2025-10-21T12:00:00Z | 2026-01-17T07:44:05Z |
| rustsec-2025-0141 | Bincode is unmaintained | 2025-12-16T12:00:00Z | 2026-01-16T11:04:42Z |
| rustsec-2026-0003 | Non-constant-time code generation on ARM32 targets | 2026-01-14T12:00:00Z | 2026-01-15T17:45:42Z |
| rustsec-2026-0002 | `IterMut` violates Stacked Borrows by invalidating internal pointer | 2026-01-07T12:00:00Z | 2026-01-08T05:46:06Z |
| rustsec-2026-0001 | Potential Undefined Behaviors in `Arc<T>`/`Rc<T>` impls of `from_value` on OOM | 2026-01-05T12:00:00Z | 2026-01-06T15:33:19Z |
| rustsec-2025-0139 | theshit vulnerable to unsafe loading of user-owned Python rules when running as root | 2025-12-30T12:00:00Z | 2026-01-04T20:34:25Z |
| rustsec-2023-0096 | Plaintext exposed in decrypt_in_place_detached even on tag verification failure | 2023-11-22T12:00:00Z | 2025-12-29T13:49:34Z |
| rustsec-2025-0138 | --allow-read / --allow-write permission bypass in `node:sqlite` | 2025-06-03T12:00:00Z | 2025-12-29T10:04:21Z |
| rustsec-2025-0137 | Unsoundness of safe `reciprocal_mg10` | 2025-12-22T12:00:00Z | 2025-12-28T09:42:26Z |
| rustsec-2024-0447 | Panics on Malformed Untrusted Input | 2024-12-05T12:00:00Z | 2025-12-24T14:48:25Z |
| rustsec-2023-0095 | Invalid Slice Split Results in Server Panic | 2023-08-03T12:00:00Z | 2025-12-22T18:53:25Z |
| rustsec-2024-0446 | Shell expansion in custom commands | 2024-07-26T12:00:00Z | 2025-12-22T13:54:49Z |
| rustsec-2022-0103 | Incorrect signature verification on gzip-compressed install images | 2022-03-04T12:00:00Z | 2025-12-21T13:45:28Z |
| rustsec-2024-0445 | cap-primitives doesn't fully sandbox all the Windows device filenames | 2024-11-05T12:00:00Z | 2025-12-19T21:01:24Z |
| rustsec-2024-0444 | Uncaught exception when transitioning the state of `AsyncGenerator` objects from within a property getter of `then` | 2024-08-14T12:00:00Z | 2025-12-19T06:15:15Z |
| rustsec-2021-0082 | vec-const attempts to construct a Vec from a pointer to a const slice | 2021-08-14T12:00:00Z | 2025-12-17T17:06:41Z |
| rustsec-2025-0136 | Underflow in aes_key_unwrap function | 2025-11-07T12:00:00Z | 2025-12-17T06:01:32Z |
| rustsec-2025-0135 | matrix-sdk-base: Denial of service due to custom `m.room.join_rules` events | 2025-12-08T12:00:00Z | 2025-12-08T12:23:54Z |
| rustsec-2025-0133 | Incorrect calculation on aarch64 | 2025-12-04T12:00:00Z | 2025-12-06T07:36:56Z |
| rustsec-2025-0134 | rustls-pemfile is unmaintained | 2025-11-28T12:00:00Z | 2025-12-05T19:07:24Z |
| rustsec-2025-0132 | `Reader::open_mmap` unsoundly marks unsafe memmap operation as safe | 2025-11-28T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0131 | Lack of sufficient checks in public API | 2025-10-31T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0120 | json5 crate is unmaintained | 2025-11-16T12:00:00Z | 2025-11-30T00:15:16Z |
| rustsec-2025-0126 | Heap-buffer-overflow in nftnl::Batch::with_page_size (nftnl-rs) | 2025-10-18T12:00:00Z | 2025-11-27T21:53:33Z |
| rustsec-2025-0130 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0129 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-nats-2026-33222 | NATS JetStream has an authorization bypass through its Management API | 2026-03-27T17:45:19.827Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33219 | NATS is vulnerable to pre-auth DoS through WebSockets client service | 2026-03-27T17:45:18.190Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33218 | NATS has pre-auth server panic via leafnode handling | 2026-03-27T17:45:16.655Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33217 | NATS allows MQTT clients to bypass ACL checks | 2026-03-27T17:45:15.042Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33216 | NATS has MQTT plaintext password disclosure | 2026-03-27T17:45:13.444Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-29785 | NATS Server panic via malicious compression on leafnode port | 2026-03-27T17:45:10.061Z | 2026-03-27T18:14:10.313Z |
| bit-nats-2026-33215 | NATS is vulnerable to MQTT hijacking via Client ID | 2026-03-27T07:08:53.339Z | 2026-03-27T12:16:52.978Z |
| bit-nats-2026-27889 | NATS: Pre-auth remote server crash via WebSocket frame length overflow in wsRead | 2026-03-27T11:47:22.988Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-4363 | Incorrect Authorization in GitLab | 2026-03-27T12:15:19.935Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-3988 | Inefficient Algorithmic Complexity in GitLab | 2026-03-27T12:15:17.809Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2995 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab | 2026-03-27T12:15:11.976Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2973 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-03-27T12:15:10.065Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2745 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2026-03-27T12:15:06.072Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-2726 | Incorrect Authorization in GitLab | 2026-03-27T12:15:04.107Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2026-1724 | Missing Authentication for Critical Function in GitLab | 2026-03-27T12:14:54.117Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-14595 | Missing Authorization in GitLab | 2026-03-27T12:11:45.074Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13436 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-27T12:11:11.989Z | 2026-03-27T12:16:52.978Z |
| bit-gitlab-2025-13078 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-27T12:11:08.026Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33413 | etcd: Authorization bypasses in multiple APIs | 2026-03-27T11:39:27.916Z | 2026-03-27T12:16:52.978Z |
| bit-etcd-2026-33343 | etcd: Nested etcd transactions bypass RBAC authorization checks | 2026-03-27T11:39:26.076Z | 2026-03-27T12:16:52.978Z |
| bit-parse-2026-33627 | Parse Server: Auth data exposed via /users/me endpoint | 2026-03-27T07:14:47.660Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33624 | Parse Server: MFA recovery code single-use bypass via concurrent requests | 2026-03-27T07:14:44.950Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33539 | Parse Server: SQL injection via aggregate and distinct field names in PostgreSQL adapter | 2026-03-27T07:14:42.086Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33538 | Parse Server: Denial of service via unindexed database query for unconfigured auth providers | 2026-03-27T07:14:39.195Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33527 | Parse Server: Session update endpoint allows overwriting server-generated session fields | 2026-03-27T07:14:36.431Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33508 | Parse Server: LiveQuery subscription query depth bypass | 2026-03-27T07:14:33.818Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33498 | Parse Server: Query condition depth bypass via pre-validation transform pipeline | 2026-03-27T07:14:30.964Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33429 | Parse Server: Protected field change detection oracle via LiveQuery watch parameter | 2026-03-27T07:14:28.266Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33421 | Parse Server: LiveQuery bypasses CLP pointer permission enforcement | 2026-03-27T07:14:25.801Z | 2026-03-27T07:40:55.991Z |
| bit-parse-2026-33409 | Parse Server: Auth provider validation bypass on login via partial authData | 2026-03-27T07:14:23.276Z | 2026-03-27T07:40:55.991Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-gk29346 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-1229, CVE-2026-22039, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23881, CVE-2026-24051, CVE-2026-24117, CVE-2026-24137, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-29wx-vh33-7x7r, ghsa-2x5j-vhc8-9cwm, ghsa-459x-q9hg-4gpq, ghsa-4qg8-fj49-pxjh, ghsa-4vq8-7jfc-9cvp, ghsa-6m8w-jc87-6cr7, ghsa-88jx-383q-w4qc, ghsa-95pr-fxf5-86gv, ghsa-c5q2-7r4c-mv6g, ghsa-c6gw-w398-hv78, ghsa-c77r-fh37-x2px, ghsa-f83f-xpx7-ffpw, ghsa-fv92-fjc5-jj9h, ghsa-jrr2-x33p-6hvc, ghsa-mh63-6h87-95cp, ghsa-mqqf-5wvp-8fh8, ghsa-p77j-4mvh-x3m3, ghsa-qjvc-p88j-j9rm, ghsa-r5p3-955p-5ggq, ghsa-v23v-6jw2-98fq, ghsa-v6v8-xj6m-xwqh, ghsa-xw73-rw38-6vjc applied in versions: 1.4.2-r2, 1.4.2-r4, 1.4.2-r6, 1.4.2-r7 | 2026-04-01T09:22:17.389111Z | 2026-03-25T11:02:44Z |
| cleanstart-2026-ce02533 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2025-62820, CVE-2026-30836, CVE-2026-33186, ghsa-p77j-4mvh-x3m3, ghsa-q4r8-xm5f-56gw applied in versions: 0.10.1-r0, 0.9.10-r0, 0.9.9-r0, 0.9.9-r1 | 2026-04-01T09:21:33.459909Z | 2026-03-25T10:51:25Z |
| cleanstart-2026-pw57640 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, CVE-2026-4427, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-9h8m-3fm2-qjrq, ghsa-9mj6-hxhv-w67j, ghsa-cfpf-hrx2-8rv6, ghsa-f6x5-jh6r-wrfv, ghsa-fw7p-63qq-7hpr, ghsa-j5w8-q4qc-rx2x, ghsa-jqcq-xjh3-6g23, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-x6gf-mpr2-68h6 applied in versions: 1.12.1-r0, 1.12.1-r1, 1.12.1-r2 | 2026-04-01T09:22:37.368205Z | 2026-03-25T05:32:13Z |
| cleanstart-2026-lk63891 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.29.0-r0, 1.29.1-r0 | 2026-04-01T09:22:08.586608Z | 2026-03-25T05:12:36Z |
| cleanstart-2026-ej96468 | Security fixes for ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1, 1.28.5-r0 | 2026-04-01T09:22:08.656529Z | 2026-03-25T05:09:00Z |
| cleanstart-2026-jm60128 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1 | 2026-04-01T09:22:08.268986Z | 2026-03-25T05:05:50Z |
| cleanstart-2026-kw90815 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1, 1.27.8-r0 | 2026-04-01T09:22:32.438088Z | 2026-03-25T05:02:40Z |
| cleanstart-2026-ev91316 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1 | 2026-04-01T09:22:33.462978Z | 2026-03-25T04:58:46Z |
| cleanstart-2026-hh87643 | Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.26.8-r0, 1.26.8-r1 | 2026-04-01T09:22:32.645637Z | 2026-03-25T04:50:32Z |
| cleanstart-2026-zw86166 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-p77j-4mvh-x3m3 applied in versions: 0.8.10-r0, 0.8.4-r0 | 2026-04-01T09:22:53.735679Z | 2026-03-25T04:41:41Z |
| cleanstart-2026-ol17158 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-m6hq-p25p-ffr2, ghsa-p77j-4mvh-x3m3, ghsa-pwhc-rpq9-4c8w applied in versions: 0.7.0-r2, 0.7.0-r3, 0.7.0-r4 | 2026-04-01T09:23:46.993269Z | 2026-03-25T04:38:39Z |
| cleanstart-2026-pv98664 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-m6hq-p25p-ffr2, ghsa-p77j-4mvh-x3m3, ghsa-pwhc-rpq9-4c8w applied in versions: 0.6.4-r5, 0.6.4-r6, 0.7.0-r4 | 2026-04-01T09:23:47.321714Z | 2026-03-25T04:34:22Z |
| cleanstart-2026-ot07577 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229 applied in versions: 3.19.0-r0, 4.0.1-r0, 4.1.0-r0 | 2026-04-01T09:24:34.526263Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-mf20926 | Security fixes for CVE-2021-38561, CVE-2022-27191, CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 3.1.2-r3, 3.1.2-r4, 3.7.0-r0, 3.7.0-r2 | 2026-04-01T09:24:07.163057Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-cv29689 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2025-62820, CVE-2026-25793, CVE-2026-30836 applied in versions: 0.10.2-r0, 0.9.10-r0, 0.9.9-r0, 0.9.9-r1 | 2026-04-01T09:24:13.195625Z | 2026-03-24T13:01:13Z |
| cleanstart-2026-ni04192 | Security fixes for CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-fv92-fjc5-jj9h, ghsa-p77j-4mvh-x3m3 applied in versions: 3.6.16-r0, 3.6.18-r0, 3.6.18-r1, 3.6.18-r2, 3.7.4-r0 | 2026-04-01T09:24:43.327769Z | 2026-03-24T12:54:01Z |
| cleanstart-2026-mk10646 | Security fixes for CVE-2025-61729, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x applied in versions: 3.6.16-r0, 3.7.4-r0, 3.7.9-r0, 3.7.9-r1 | 2026-04-01T09:24:40.606937Z | 2026-03-24T12:53:01Z |
| cleanstart-2026-pz85180 | Security fixes for CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x applied in versions: 3.7.8-r2, 3.7.8-r3 | 2026-04-01T09:25:09.013456Z | 2026-03-24T12:47:42Z |
| cleanstart-2026-cp95927 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.28.1-r0, 1.28.1-r1 | 2026-04-01T09:25:12.106009Z | 2026-03-24T12:00:17Z |
| cleanstart-2026-ci66802 | Security fixes for CVE-2015-2104, CVE-2020-8908, CVE-2021-21295, CVE-2021-21409, CVE-2021-37136, CVE-2022-1471, CVE-2022-41881, CVE-2023-27043, CVE-2023-2976, CVE-2023-34462, CVE-2023-6378, CVE-2024-12254, CVE-2024-12718, CVE-2024-12798, CVE-2024-12801, CVE-2024-27137, CVE-2024-6232, CVE-2024-6923, CVE-2024-9287, CVE-2025-0938, CVE-2025-23015, CVE-2025-4138, CVE-2025-4330, CVE-2025-4516, CVE-2025-4517, CVE-2026-1225, ghsa-25qh-j22f-pwp8, ghsa-3mc7-4q67-w48m, ghsa-5mg8-w23w-74h3, ghsa-6v67-2wr5-gvf4, ghsa-72hv-8253-57qq, ghsa-7g45-4rm6-3mm3, ghsa-98wm-3w3q-mw94, ghsa-9w3m-gqgf-c4p9, ghsa-c4r9-r8fh-9vj2, ghsa-hhhw-99gj-p3c3, ghsa-mjmj-j48q-9wg2, ghsa-pr98-23f8-jwxv, ghsa-qqpg-mvqg-649v, ghsa-vmq6-5m68-f53m, ghsa-w37g-rhq8-7m4j applied in versions: 4.0.17-r1, 4.0.19-r2, 4.0.19-r3, 4.1.9-r0 | 2026-04-01T09:27:07.387904Z | 2026-03-24T10:05:19Z |
| cleanstart-2026-km27583 | Security fixes for CVE-2015-2104, CVE-2023-27043, CVE-2024-12254, CVE-2024-12718, CVE-2024-12798, CVE-2024-12801, CVE-2024-27137, CVE-2024-6232, CVE-2024-6923, CVE-2024-9287, CVE-2025-0938, CVE-2025-23015, CVE-2025-4138, CVE-2025-4330, CVE-2025-4516, CVE-2025-4517, CVE-2025-58057, CVE-2026-1225, ghsa-25qh-j22f-pwp8, ghsa-3p8m-j85q-pgmj, ghsa-5mg8-w23w-74h3, ghsa-6v67-2wr5-gvf4, ghsa-72hv-8253-57qq, ghsa-7g45-4rm6-3mm3, ghsa-pr98-23f8-jwxv, ghsa-qqpg-mvqg-649v applied in versions: 4.0.17-r1, 4.1.9-r0, 5.0.6-r1, 5.0.6-r2 | 2026-04-01T09:26:50.907320Z | 2026-03-24T09:56:29Z |
| cleanstart-2026-db61851 | Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.8.11-r0, 1.8.11-r1, 1.8.11-r2, 1.8.11-r3, 1.9.4-r0 | 2026-04-01T09:26:58.691080Z | 2026-03-24T08:56:04Z |
| cleanstart-2026-jj09127 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-33186 applied in versions: 0.28.7-r1, 0.29.0-r0, 0.30.0-r0 | 2026-04-01T09:26:20.691727Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-id24148 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-33186 applied in versions: 0.28.7-r1, 0.29.0-r0, 0.30.0-r0 | 2026-04-01T09:27:05.843609Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-hk06185 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0, 3.7.9-r1, 3.7.9-r2, 4.0.2-r0 | 2026-04-01T09:27:48.241920Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-ka15295 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.7.0-r0, 3.7.0.-r1 | 2026-04-01T09:27:33.488765Z | 2026-03-23T14:26:32Z |
| cleanstart-2026-am88528 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3 applied in versions: 3.6.16-r0, 3.6.18-r0, 3.6.19-r0, 3.6.19-r1, 3.6.19-r2, 3.6.19-r3, 3.7.4-r0 | 2026-04-01T09:27:52.956018Z | 2026-03-23T14:25:49Z |
| cleanstart-2026-mz18595 | Security fixes for CVE-2025-61730, CVE-2025-61732, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.4.0-r7 | 2026-04-01T09:27:48.953742Z | 2026-03-23T14:24:01Z |
| cleanstart-2026-cu52059 | Security fixes for CVE-2025-61728, CVE-2025-61730, CVE-2026-24051, CVE-2026-27139, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq applied in versions: 3.3.0-r7, 3.5.0-r0 | 2026-04-01T09:27:57.960712Z | 2026-03-23T14:23:15Z |
| cleanstart-2026-nn77774 | Security fixes for CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 2.4.0-r0 | 2026-04-01T09:28:03.910369Z | 2026-03-23T12:37:31Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-ale-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| CERTFR-2021-ALE-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| CERTFR-2021-ALE-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| CERTFR-2021-ALE-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2020-ale-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| CERTFR-2021-ALE-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| CERTFR-2020-ALE-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2021-ale-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2021-ALE-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2020-ALE-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| CERTFR-2020-ALE-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| CERTFR-2020-ALE-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| certfr-2020-ale-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| CERTFR-2020-ALE-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| certfr-2020-ale-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| CERTFR-2020-ALE-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| CERTFR-2020-ALE-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| CERTFR-2020-ALE-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| certfr-2020-ale-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0304 | Multiples vulnérabilités dans Xen | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0303 | Vulnérabilité dans Microsoft Edge | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0302 | Multiples vulnérabilités dans Python | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0301 | Multiples vulnérabilités dans les produits Kaspersky | 2026-03-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0176 | Vulnérabilité dans Mattermost Server | 2026-02-17T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0299 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0298 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0297 | Vulnérabilité dans Google Chrome | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0296 | Vulnérabilité dans OpenSSL | 2026-03-16T00:00:00.000000 | 2026-03-16T00:00:00.000000 |
| certfr-2026-avi-0295 | Vulnérabilité dans les produits Microsoft | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0294 | Vulnérabilité dans Microsoft Office | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0293 | Vulnérabilité dans Microsoft Edge | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0292 | Multiples vulnérabilités dans les produits IBM | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0291 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0290 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0289 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0288 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0287 | Multiples vulnérabilités dans les produits NetApp | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0286 | Multiples vulnérabilités dans Google Chrome | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0285 | Vulnérabilité dans Python | 2026-03-13T00:00:00.000000 | 2026-03-13T00:00:00.000000 |
| certfr-2026-avi-0284 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0283 | Vulnérabilité dans Microsoft Edge | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0282 | Multiples vulnérabilités dans Veeam Backup & Replication | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0281 | Multiples vulnérabilités dans les produits Splunk | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0280 | Multiples vulnérabilités dans les produits Apple | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0279 | Multiples vulnérabilités dans Cisco IOS XR | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0278 | Multiples vulnérabilités dans Google Chrome | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0277 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-014642 | Multiple vulnerabilities in Canon Printer Drivers for Production Printers, Office/Small Office Multifunction Printers and Laser Printers | 2025-09-30T11:50+09:00 | 2025-09-30T11:50+09:00 |
| jvndb-2025-000066 | Improper file access permission settings in multiple i-FILTER products | 2025-08-27T19:50+09:00 | 2025-09-29T13:45+09:00 |
| jvndb-2025-000077 | RICOH Streamline NX vulnerable to tampering with operation history | 2025-09-08T13:42+09:00 | 2025-09-24T16:53+09:00 |
| jvndb-2025-007519 | Multiple vulnerabilities in multiple BROTHER products | 2025-06-26T18:15+09:00 | 2025-09-22T10:16+09:00 |
| jvndb-2025-014105 | OMRON SOCIAL SOLUTIONS Uninterruptible Power Supply (UPS) management application registers a Windows service with an unquoted file path | 2025-09-19T16:21+09:00 | 2025-09-19T16:21+09:00 |
| jvndb-2025-014104 | Multiple vulnerabilities in I-O DATA wireless LAN routers | 2025-09-19T14:58+09:00 | 2025-09-19T14:58+09:00 |
| jvndb-2025-014081 | Multiple Brother and its OEM products with weak initial administrator passwords | 2025-09-19T10:52+09:00 | 2025-09-19T10:52+09:00 |
| jvndb-2025-000079 | UNIVERGE IX/IX-R/IX-V series routers provided by NEC Corporation vulnerable to cross-site scripting | 2025-09-18T17:43+09:00 | 2025-09-18T17:43+09:00 |
| jvndb-2025-000078 | Century HW RAID Manager registers a Windows service with an unquoted file path | 2025-09-17T13:45+09:00 | 2025-09-17T13:45+09:00 |
| jvndb-2025-000048 | WTW-EAGLE App vulnerable to improper server certificate validation | 2025-09-12T13:57+09:00 | 2025-09-12T13:57+09:00 |
| jvndb-2025-000070 | "Gunosy" App vulnerable to insertion of sensitive information into sent data | 2025-09-02T14:20+09:00 | 2025-09-09T09:51+09:00 |
| jvndb-2025-000072 | Obsidian GitHub Copilot Plugin stores sensitive information in cleartext | 2025-09-05T16:52+09:00 | 2025-09-05T16:52+09:00 |
| jvndb-2025-000073 | RATOC RAID Monitoring Manager for Windows registers a Windows service with an unquoted file path | 2025-09-05T16:20+09:00 | 2025-09-05T16:20+09:00 |
| jvndb-2025-000071 | "Yahoo! Shopping" App for Android fails to restrict custom URL schemes properly | 2025-09-05T15:12+09:00 | 2025-09-05T15:12+09:00 |
| jvndb-2025-000075 | Multiple vulnerabilities in TkEasyGUI | 2025-09-05T14:53+09:00 | 2025-09-05T14:53+09:00 |
| jvndb-2025-000069 | Web Caster V130 vulnerable to cross-site request forgery | 2025-09-03T14:23+09:00 | 2025-09-03T14:23+09:00 |
| jvndb-2025-000068 | Seiko Solutions SkyBridge BASIC MB-A130 vulnerable to OS command injection | 2025-09-01T16:21+09:00 | 2025-09-01T16:21+09:00 |
| jvndb-2025-012659 | Denial-of-service (DoS) vulnerability in Konica Minolta bizhub series | 2025-09-01T15:22+09:00 | 2025-09-01T15:22+09:00 |
| jvndb-2025-000067 | Multiple vulnerabilities in multiple iND products | 2025-08-29T14:47+09:00 | 2025-08-29T14:47+09:00 |
| jvndb-2025-000064 | Multiple vulnerabilities in SS1 | 2025-08-27T15:13+09:00 | 2025-08-27T15:13+09:00 |
| jvndb-2025-000065 | ScanSnap Manager installers vulnerable to privilege escalation | 2025-08-27T14:22+09:00 | 2025-08-27T14:22+09:00 |
| jvndb-2025-011884 | FUJIFILM Healthcare Americas Synapse Mobility vulnerable to Privilege Escalation | 2025-08-21T11:49+09:00 | 2025-08-25T10:38+09:00 |
| jvndb-2025-000063 | Western Digital Kitfox registers a Windows service with an unquoted file path | 2025-08-22T13:37+09:00 | 2025-08-22T13:37+09:00 |
| jvndb-2025-000062 | Multiple vulnerabilities in Group-Office | 2025-08-21T14:03+09:00 | 2025-08-21T14:03+09:00 |
| jvndb-2025-000061 | Multiple vulnerabilities in Movable Type | 2025-08-20T15:30+09:00 | 2025-08-20T15:30+09:00 |
| jvndb-2025-000059 | Seagate Toolkit registers a Windows service with an unquoted file path | 2025-08-14T12:32+09:00 | 2025-08-19T14:40+09:00 |
| jvndb-2025-010854 | Trend Micro Endpoint security products for enterprises vulnerable to multiple OS command injection | 2025-08-07T12:25+09:00 | 2025-08-19T11:36+09:00 |
| jvndb-2025-007521 | Multiple Brother driver installers for Windows vulnerable to privilege escalation | 2025-06-27T09:37+09:00 | 2025-08-19T11:29+09:00 |
| jvndb-2025-000060 | PgManage vulnerable to injection | 2025-08-18T13:40+09:00 | 2025-08-18T13:40+09:00 |
| jvndb-2025-000058 | WordPress plugin "Advanced Custom Fields" vulnerable to HTML injection | 2025-08-08T15:29+09:00 | 2025-08-08T15:29+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14995 | Apple macOS Tahoe信息泄露漏洞(CNVD-2026-14995) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14994 | Apple macOS Tahoe信息泄露漏洞(CNVD-2026-14994) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14975 | Apple macOS越界读取漏洞(CNVD-2026-14975) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14974 | Apple macOS信息泄露漏洞(CNVD-2026-14974) | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14973 | Apple macOS Tahoe权限提升漏洞 | 2026-03-02 | 2026-03-26 |
| cnvd-2026-14972 | Chamilo import.php文件操作系统命令注入漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14971 | Chamilo editinstance.php文件操作系统命令注入漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14970 | Chamilo CSV文件名跨站脚本漏洞 | 2026-03-09 | 2026-03-26 |
| cnvd-2026-14969 | WordPress插件WpEvently信息泄露漏洞 | 2026-03-19 | 2026-03-26 |
| cnvd-2026-14968 | WordPress插件wpDiscuz信息泄露漏洞 | 2026-03-19 | 2026-03-26 |
| cnvd-2026-15250 | Huawei HarmonyOS证书管理模块数据处理漏洞 | 2026-03-12 | 2026-03-25 |
| cnvd-2026-14861 | OpenClaw后置链接漏洞(CNVD-2026-14861) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14860 | OpenClaw代码问题漏洞(CNVD-2026-14860) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14859 | OpenClaw后置链接漏洞(CNVD-2026-14859) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14858 | OpenClaw后置链接漏洞(CNVD-2026-14858) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14857 | OpenClaw路径遍历漏洞(CNVD-2026-14857) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14856 | OpenClaw路径遍历漏洞(CNVD-2026-14856) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14850 | OpenClaw路径遍历漏洞(CNVD-2026-14850) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14849 | OpenClaw代码问题漏洞(CNVD-2026-14849) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14848 | OpenClaw路径遍历漏洞(CNVD-2026-14848) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14846 | OpenClaw后置链接漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14844 | OpenClaw代码问题漏洞(CNVD-2026-14844) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14843 | OpenClaw身份验证强化漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14842 | OpenClaw访问控制错误漏洞(CNVD-2026-14842) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14841 | OpenClaw授权绕过漏洞(CNVD-2026-14841) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14840 | OpenClaw身份验证绕过漏洞(CNVD-2026-14840) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14839 | OpenClaw身份验证绕过漏洞(CNVD-2026-14839) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14838 | OpenClaw存在未明漏洞(CNVD-2026-14838) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14837 | OpenClaw授权绕过漏洞(CNVD-2026-14837) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14836 | OpenClaw元数据欺骗漏洞 | 2026-03-24 | 2026-03-25 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15695 | Уязвимость компонента drivers/gpu/drm/hisilicon/hibmc/hibmc_drm_drv.c ядра операционной с… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15694 | Уязвимость функции br_multicast_query_expired() компонента net/bridge/br_multicast.c ядра… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15693 | Уязвимость функции destroy_args() компонента mm/debug_vm_pgtable.c ядра операционной сист… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15692 | Уязвимость компонента ufs-exynos.c ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15690 | Уязвимость компонента drivers/bus ядра операционной системы Linux, позволяющая нарушителю… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15688 | Уязвимость компонента fs/nfs ядра операционной системы Linux, позволяющая нарушителю полу… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15687 | Уязвимость компонента dwc3 ядра операционной системы Linux, позволяющая нарушителю вызват… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15686 | Уязвимость функции mt_report_fixup() ядра операционной системы Linux, позволяющая нарушит… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15683 | Уязвимость функции trace_printk_seq() ядра операционной системы Linux, связанная с неконт… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15682 | Уязвимость компонента efivarfs ядра операционной системы Linux, позволяющая нарушителю вы… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15680 | Уязвимость компонента fs/smb ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15679 | Уязвимость компонента inode.c ядра операционной системы Linux, позволяющая нарушителю пол… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15678 | Уязвимость компонентов rose ядра операционной системы Linux, позволяющая нарушителю получ… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15677 | Уязвимость компонента rose_route.c ядра операционной системы Linux, позволяющая нарушител… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15676 | Уязвимость компонента xfs ядра операционной системы Linux, позволяющая нарушителю вызвать… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15674 | Уязвимость модуля wifi ядра операционной системы Linux, позволяющая нарушителю получить д… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15669 | Уязвимость компонента slub.c ядра операционной системы Linux, позволяющая нарушителю вызв… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15667 | Уязвимость функции do_validate_mem() компонента rsrc_nonstatic.c ядра операционной систем… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15665 | Уязвимость компонента arch/x86 ядра операционной системы Linux, позволяющая нарушителю по… | 15.12.2025 | 16.02.2026 |
| bdu:2025-15660 | Уязвимость компонента fs/hfsplus/unicode.c ядра операционной системы Linux, позволяющая н… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15659 | Уязвимость компонента fs/hfsplus/bnode.c ядра операционной системы Linux, позволяющая нар… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15658 | Уязвимость компонента netfilter ядра операционной системы Linux, позволяющая нарушителю в… | 14.12.2025 | 16.02.2026 |
| bdu:2025-15559 | Уязвимость функции sqlite3KeyInfoFromExprList системы управления базами данных SQLite, по… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15558 | Уязвимость реализации протокола IEEE 802.11 ядра операционной системы Linux, позволяющая … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15556 | Уязвимость компонента jfs_imap.c ядра операционной системы Linux, позволяющая нарушителю … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15555 | Уязвимость компонента ksmbd ядра операционной системы Linux, позволяющая нарушителю вызва… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15554 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | 11.12.2025 | 16.02.2026 |
| bdu:2025-15553 | Уязвимость компонента net/sched ядра операционной системы Linux, позволяющая нарушителю в… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15552 | Уязвимость компонента eventpoll ядра операционной системы Linux, позволяющая нарушителю в… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15551 | Уязвимость функции nf_tables_updchain компонента net/netfilter/nf_tables_api.c ядра опера… | 11.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201404-0378 | Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1… | 2024-07-23T22:08:28.541000Z |
| var-201908-0264 | Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a den… | 2024-07-23T22:07:30.228000Z |
| var-201702-0469 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari be… | 2024-07-23T22:06:53.547000Z |
| var-200703-0016 | Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted at… | 2024-07-23T22:06:48.011000Z |
| var-201609-0595 | The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly … | 2024-07-23T22:06:46.651000Z |
| var-202004-1974 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T22:06:44.403000Z |
| var-201705-3790 | In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod Ope… | 2024-07-23T22:06:43.841000Z |
| var-202109-1802 | A crafted request uri-path can cause mod_proxy to forward the request to an origin server… | 2024-07-23T22:06:13.520000Z |
| var-202110-1622 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T22:06:10.313000Z |
| var-200905-0043 | Integer underflow in QuickDraw Manager in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7, … | 2024-07-23T22:06:10.145000Z |
| var-202203-0129 | A cookie management issue was addressed with improved state management. This issue is fix… | 2024-07-23T22:06:09.291000Z |
| var-200210-0102 | Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a deni… | 2024-07-23T22:06:08.093000Z |
| var-202009-0037 | A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP… | 2024-07-23T22:06:07.991000Z |
| var-201912-0619 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:06:04.230000Z |
| var-200809-0566 | Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2… | 2024-07-23T22:06:03.293000Z |
| var-202201-0424 | A validation issue was addressed with improved input sanitization. This issue is fixed in… | 2024-07-23T22:06:01.833000Z |
| var-200604-0201 | Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary c… | 2024-07-23T22:05:29.066000Z |
| var-201201-0025 | Use-after-free vulnerability in Google Chrome before 16.0.912.77 allows remote attackers … | 2024-07-23T22:05:28.758000Z |
| var-201808-0957 | Systems with microprocessors utilizing speculative execution and address translations may… | 2024-07-23T22:05:21.889000Z |
| var-202203-1400 | jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of servic… | 2024-07-23T22:05:19.247000Z |
| var-201912-0640 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:05:19.907000Z |
| var-201904-1343 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:05:19.745000Z |
| var-201007-0949 | WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before… | 2024-07-23T22:05:19.065000Z |
| var-201912-1856 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:04:56.028000Z |
| var-200904-0821 | The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products… | 2024-07-23T22:04:56.133000Z |
| var-200603-0282 | Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 1… | 2024-07-23T22:04:24.723000Z |
| var-201912-0509 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:03:53.293000Z |
| var-200806-0575 | SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and … | 2024-07-23T22:03:53.151000Z |
| var-200703-0024 | Unspecified vulnerability in the authentication feature for DirectoryService (DS Plug-Ins… | 2024-07-23T22:03:53.866000Z |
| var-202005-1054 | dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by d… | 2024-07-23T22:03:49.580000Z |