Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-62224 |
5.5 (3.1)
|
Microsoft Edge (Chromium-based) for Android Spoofing V… |
Microsoft |
Microsoft Edge for Android |
2026-01-07T22:54:54.800Z | 2026-04-16T14:18:41.943Z |
| CVE-2026-32212 |
5.5 (3.1)
|
Universal Plug and Play (upnp.dll) Information Disclos… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:57:50.632Z | 2026-04-16T14:18:41.756Z |
| CVE-2025-64673 |
7.8 (3.1)
|
Windows Storage VSP Driver Elevation of Privilege Vuln… |
Microsoft |
Windows 10 Version 1809 |
2025-12-09T17:55:46.443Z | 2026-04-16T14:18:41.109Z |
| CVE-2026-33826 |
8 (3.1)
|
Windows Active Directory Remote Code Execution Vulnerability |
Microsoft |
Windows Server 2012 R2 |
2026-04-14T16:57:50.050Z | 2026-04-16T14:18:40.920Z |
| CVE-2025-64670 |
6.5 (3.1)
|
Windows DirectX Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 21H2 |
2025-12-09T17:55:45.933Z | 2026-04-16T14:18:40.473Z |
| CVE-2026-33825 |
7.8 (3.1)
|
Microsoft Defender Elevation of Privilege Vulnerability |
Microsoft |
Microsoft Defender Antimalware Platform |
2026-04-14T16:57:49.361Z | 2026-04-16T14:18:40.279Z |
| CVE-2025-64666 |
7.5 (3.1)
|
Microsoft Exchange Server Elevation of Privilege Vulne… |
Microsoft |
Microsoft Exchange Server 2016 Cumulative Update 23 |
2025-12-09T17:55:45.263Z | 2026-04-16T14:18:39.837Z |
| CVE-2026-33822 |
6.1 (3.1)
|
Microsoft Word Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-04-14T16:57:48.786Z | 2026-04-16T14:18:39.685Z |
| CVE-2025-64667 |
5.3 (3.1)
|
Microsoft Exchange Server Spoofing Vulnerability |
Microsoft |
Microsoft Exchange Server 2016 Cumulative Update 23 |
2025-12-09T17:55:44.488Z | 2026-04-16T14:18:39.361Z |
| CVE-2026-33120 |
8.8 (3.1)
|
Microsoft SQL Server Remote Code Execution Vulnerability |
Microsoft |
Microsoft SQL Server 2022 (GDR) |
2026-04-14T16:57:48.207Z | 2026-04-16T14:18:39.061Z |
| CVE-2025-64658 |
7.5 (3.1)
|
Windows File Explorer Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-12-09T17:55:43.864Z | 2026-04-16T14:18:38.802Z |
| CVE-2026-33116 |
7.5 (3.1)
|
.NET, .NET Framework, and Visual Studio Denial of Serv… |
Microsoft |
.NET 10.0 |
2026-04-14T16:57:47.626Z | 2026-04-16T14:18:38.419Z |
| CVE-2025-62573 |
7 (3.1)
|
DirectX Graphics Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:55:43.163Z | 2026-04-16T14:18:38.246Z |
| CVE-2026-33098 |
7.8 (3.1)
|
Windows Container Isolation FS Filter Driver Elevation… |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:57:46.577Z | 2026-04-16T14:18:37.828Z |
| CVE-2025-62572 |
7.8 (3.1)
|
Application Information Service Elevation of Privilege… |
Microsoft |
Windows 11 Version 24H2 |
2025-12-09T17:55:42.528Z | 2026-04-16T14:18:37.712Z |
| CVE-2026-33096 |
7.5 (3.1)
|
HTTP.sys Denial of Service Vulnerability |
Microsoft |
Windows 11 version 22H3 |
2026-04-14T16:57:45.953Z | 2026-04-16T14:18:37.154Z |
| CVE-2025-62571 |
7.8 (3.1)
|
Windows Installer Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:55:41.832Z | 2026-04-16T14:18:37.112Z |
| CVE-2026-33095 |
7.8 (3.1)
|
Microsoft Word Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-04-14T16:57:45.386Z | 2026-04-16T14:18:36.534Z |
| CVE-2025-62564 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:41.228Z | 2026-04-16T14:18:36.486Z |
| CVE-2025-62563 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:40.704Z | 2026-04-16T14:18:35.957Z |
| CVE-2026-32226 |
5.9 (3.1)
|
.NET Framework Denial of Service Vulnerability |
Microsoft |
Microsoft .NET Framework 3.5 AND 4.7.2 |
2026-04-14T16:57:44.474Z | 2026-04-16T14:18:35.942Z |
| CVE-2026-32224 |
7 (3.1)
|
Windows Server Update Service (WSUS) Elevation of Priv… |
Microsoft |
Windows 11 version 26H1 |
2026-04-14T16:57:43.822Z | 2026-04-16T14:18:35.421Z |
| CVE-2025-62562 |
7.8 (3.1)
|
Microsoft Outlook Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:40.028Z | 2026-04-16T14:18:35.343Z |
| CVE-2025-62561 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:39.367Z | 2026-04-16T14:18:34.760Z |
| CVE-2026-32222 |
7.8 (3.1)
|
Windows Win32k Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2026-04-14T16:57:42.408Z | 2026-04-16T14:18:34.728Z |
| CVE-2026-32221 |
8.4 (3.1)
|
Windows Graphics Component Remote Code Execution Vulne… |
Microsoft |
Windows 11 Version 24H2 |
2026-04-14T16:57:41.793Z | 2026-04-16T14:18:34.161Z |
| CVE-2025-62549 |
8.8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Remot… |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:55:38.801Z | 2026-04-16T14:18:34.154Z |
| CVE-2025-62473 |
6.5 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Infor… |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:55:38.210Z | 2026-04-16T14:18:33.591Z |
| CVE-2026-32220 |
4.4 (3.1)
|
UEFI Secure Boot Security Feature Bypass Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2026-04-14T16:57:40.959Z | 2026-04-16T14:18:33.489Z |
| CVE-2026-32219 |
7 (3.1)
|
Microsoft Brokering File System Elevation of Privilege… |
Microsoft |
Windows 11 Version 24H2 |
2026-04-14T16:57:40.275Z | 2026-04-16T14:18:32.828Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-3876 |
7.2 (3.1)
|
Prismatic <= 3.7.3 - Unauthenticated Stored Cross-Site… |
specialk |
Prismatic |
2026-04-16T06:44:53.787Z | 2026-04-16T14:13:20.711Z |
| CVE-2026-3875 |
6.4 (3.1)
|
BetterDocs <= 4.3.8 - Authenticated (Contributor+) Sto… |
wpdevteam |
BetterDocs – Knowledge Base Docs & FAQ Solution for Elementor & Block Editor |
2026-04-16T06:44:51.744Z | 2026-04-16T13:41:59.186Z |
| CVE-2026-3355 |
6.1 (3.1)
|
Customer Reviews for WooCommerce <= 5.101.0 - Reflecte… |
ivole |
Customer Reviews for WooCommerce |
2026-04-16T06:44:53.276Z | 2026-04-16T14:25:11.362Z |
| CVE-2026-1620 |
8.8 (3.1)
|
Livemesh Addons by Elementor <= 9.0 - Authenticated (C… |
livemesh |
Livemesh Addons by Elementor |
2026-04-16T06:44:50.305Z | 2026-04-16T12:55:49.055Z |
| CVE-2026-1572 |
6.4 (3.1)
|
Livemesh Addons by Elementor <= 9.0 - Missing Authoriz… |
livemesh |
Livemesh Addons by Elementor |
2026-04-16T06:44:50.911Z | 2026-04-16T12:55:37.314Z |
| CVE-2025-13364 |
6.4 (3.1)
|
WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapb… |
flippercode |
WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters |
2026-04-16T06:44:52.144Z | 2026-04-16T12:04:16.719Z |
| CVE-2026-5050 |
7.5 (3.1)
|
Payment Gateway for Redsys & WooCommerce Lite <= 7.0.0… |
jconti |
Payment Gateway for Redsys & WooCommerce Lite |
2026-04-16T05:29:53.590Z | 2026-04-16T13:42:20.364Z |
| CVE-2026-3773 |
6.5 (3.1)
|
Accessibility Suite by Ability, Inc <= 4.20 - Authenti… |
onlineada |
Accessibility Suite by Ability, Inc |
2026-04-16T05:29:54.754Z | 2026-04-16T13:42:08.243Z |
| CVE-2026-3614 |
8.8 (3.1)
|
AcyMailing 9.11.0 - 10.8.1 - Missing Authorization to … |
acyba |
AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress |
2026-04-16T05:29:54.350Z | 2026-04-16T13:42:14.595Z |
| CVE-2026-3599 |
7.5 (3.1)
|
Riaxe Product Customizer <= 2.1.2 - Unauthenticated SQ… |
imprintnext |
Riaxe Product Customizer |
2026-04-16T05:29:53.971Z | 2026-04-16T12:58:22.965Z |
| CVE-2026-3596 |
9.8 (3.1)
|
Riaxe Product Customizer <= 2.1.2 - Missing Authorizat… |
imprintnext |
Riaxe Product Customizer |
2026-04-16T05:29:52.265Z | 2026-04-16T12:56:20.193Z |
| CVE-2026-3595 |
5.3 (3.1)
|
Riaxe Product Customizer <= 2.1.2 - Unauthenticated Ar… |
imprintnext |
Riaxe Product Customizer |
2026-04-16T05:29:52.794Z | 2026-04-16T12:04:31.317Z |
| CVE-2026-3581 |
5.3 (3.1)
|
Basic Google Maps Placemarks <= 1.10.7 - Missing Autho… |
iandunn |
Basic Google Maps Placemarks |
2026-04-16T05:29:55.137Z | 2026-04-16T13:44:00.613Z |
| CVE-2026-3551 |
4.4 (3.1)
|
Custom New User Notification <= 1.2.0 - Authenticated … |
rafasashi |
Custom New User Notification |
2026-04-16T05:29:53.185Z | 2026-04-16T13:42:26.444Z |
| CVE-2026-22618 |
5.9 (3.1)
|
A security misconfiguration was identified in Eat… |
Eaton |
IPP software |
2026-04-16T05:11:06.548Z | 2026-04-16T13:10:01.651Z |
| CVE-2026-22617 |
5.7 (3.1)
|
Eaton Intelligent Power Protector (IPP) uses an i… |
Eaton |
IPP Software |
2026-04-16T05:02:07.710Z | 2026-04-16T13:23:29.510Z |
| CVE-2026-40118 |
6.3 (3.0)
5.1 (4.0)
|
UDP Console provided by Arcserve contains an inco… |
Arcserve |
UDP Console |
2026-04-16T04:19:27.326Z | 2026-04-16T13:00:56.282Z |
| CVE-2026-22616 |
6.5 (3.1)
|
Eaton Intelligent Power Protector (IPP) software … |
Eaton |
IPP Software |
2026-04-16T04:54:48.148Z | 2026-04-16T13:30:12.024Z |
| CVE-2026-22615 |
6 (3.1)
|
Due to improper input validation in one of the Ea… |
Eaton |
IPP Software |
2026-04-16T04:45:58.055Z | 2026-04-16T12:59:58.829Z |
| CVE-2023-5872 |
4.3 (3.1)
|
Wago: Vulnerability in Smart Designer Web-Application |
Wago |
Smart Designer |
2026-04-16T04:55:36.146Z | 2026-04-16T12:59:27.608Z |
| CVE-2023-3634 |
8.8 (3.1)
|
Festo: MSE6-C2M/D2M/E2M Incomplete User Documentation … |
Festo |
MSE6-C2M-5000-FB36-D-M-RG-BAR-M12L4-AGD |
2026-04-16T04:40:29.960Z | 2026-04-16T13:51:55.114Z |
| CVE-2026-34850 |
1.9 (3.1)
|
Race condition vulnerability in the notification … |
Huawei |
HarmonyOS |
2026-04-13T03:42:14.936Z | 2026-04-13T18:06:17.668Z |
| CVE-2026-34851 |
2.2 (3.1)
|
Race condition vulnerability in the event notific… |
Huawei |
HarmonyOS |
2026-04-13T03:44:41.983Z | 2026-04-13T18:06:17.547Z |
| CVE-2026-34852 |
6.1 (3.1)
|
Stack overflow vulnerability in the media platfor… |
Huawei |
HarmonyOS |
2026-04-13T03:46:59.624Z | 2026-04-13T18:06:17.414Z |
| CVE-2026-34853 |
7.7 (3.1)
|
Permission bypass vulnerability in the LBS module… |
Huawei |
HarmonyOS |
2026-04-13T03:54:55.483Z | 2026-04-13T15:02:08.662Z |
| CVE-2026-34856 |
7.3 (3.1)
|
UAF vulnerability in the communication module. Im… |
Huawei |
HarmonyOS |
2026-04-13T03:56:26.306Z | 2026-04-13T15:01:46.396Z |
| CVE-2026-34860 |
4.1 (3.1)
|
Access control vulnerability in the memo module. … |
Huawei |
HarmonyOS |
2026-04-13T03:49:25.953Z | 2026-04-13T18:06:17.252Z |
| CVE-2026-35444 |
7.1 (3.1)
|
SDL_image has a heap buffer overflow READ via unchecke… |
libsdl-org |
SDL_image |
2026-04-06T21:44:05.986Z | 2026-04-08T14:06:28.528Z |
| CVE-2026-35404 |
4.7 (3.1)
|
Open edX Platform has an Open Redirect in Survey Views… |
openedx |
openedx-platform |
2026-04-06T21:22:29.562Z | 2026-04-07T16:17:47.603Z |
| CVE-2026-35184 |
8.7 (4.0)
|
EcclesiaCRM has a Critical SQL Injection |
phili67 |
ecclesiacrm |
2026-04-06T19:21:22.597Z | 2026-04-07T19:25:50.870Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-1620 | The Livemesh Addons for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all… | 2026-04-16T07:16:29.787 | 2026-04-16T07:16:29.787 |
| fkie_cve-2026-1572 | The Livemesh Addons for Elementor plugin for WordPress is vulnerable to unauthorized modification o… | 2026-04-16T07:16:29.610 | 2026-04-16T07:16:29.610 |
| fkie_cve-2025-13364 | The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for… | 2026-04-16T07:16:28.550 | 2026-04-16T07:16:28.550 |
| fkie_cve-2026-5050 | The Payment Gateway for Redsys & WooCommerce Lite plugin for WordPress is vulnerable to Improper Ve… | 2026-04-16T06:16:20.587 | 2026-04-16T06:16:20.587 |
| fkie_cve-2026-3773 | The Accessibility Suite by Ability, Inc plugin for WordPress is vulnerable to SQL Injection via the… | 2026-04-16T06:16:19.260 | 2026-04-16T06:16:19.260 |
| fkie_cve-2026-3614 | The AcyMailing plugin for WordPress is vulnerable to privilege escalation in all versions From 9.11… | 2026-04-16T06:16:18.167 | 2026-04-16T06:16:18.167 |
| fkie_cve-2026-3599 | The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' … | 2026-04-16T06:16:17.063 | 2026-04-16T06:16:17.063 |
| fkie_cve-2026-3596 | The Riaxe Product Customizer plugin for WordPress is vulnerable to Privilege Escalation in all vers… | 2026-04-16T06:16:15.667 | 2026-04-16T06:16:15.667 |
| fkie_cve-2026-3595 | The Riaxe Product Customizer plugin for WordPress is vulnerable to authorization bypass in all vers… | 2026-04-16T06:16:14.550 | 2026-04-16T06:16:14.550 |
| fkie_cve-2026-3581 | The Basic Google Maps Placemarks plugin for WordPress is vulnerable to authorization bypass in vers… | 2026-04-16T06:16:13.433 | 2026-04-16T06:16:13.433 |
| fkie_cve-2026-3551 | The Custom New User Notification plugin for WordPress is vulnerable to Stored Cross-Site Scripting … | 2026-04-16T06:16:10.530 | 2026-04-16T06:16:10.530 |
| fkie_cve-2026-22618 | A security misconfiguration was identified in Eaton Intelligent Power Protector (IPP), where an HTT… | 2026-04-16T06:16:10.297 | 2026-04-16T06:16:10.297 |
| fkie_cve-2026-22617 | Eaton Intelligent Power Protector (IPP) uses an insecure cookie configuration, which could allow a … | 2026-04-16T06:16:08.980 | 2026-04-16T06:16:08.980 |
| fkie_cve-2026-40118 | UDP Console provided by Arcserve contains an incorrectly specified destination in a communication c… | 2026-04-16T05:16:14.860 | 2026-04-16T05:16:14.860 |
| fkie_cve-2026-22616 | Eaton Intelligent Power Protector (IPP) software allows repeated authentication attempts against th… | 2026-04-16T05:16:14.563 | 2026-04-16T05:16:14.563 |
| fkie_cve-2026-22615 | Due to improper input validation in one of the Eaton Intelligent Power Protector (IPP) XML, it is p… | 2026-04-16T05:16:14.433 | 2026-04-16T05:16:14.433 |
| fkie_cve-2023-5872 | In Wago Smart Designer in versions up to 2.33.1 a low privileged remote attacker may enumerate proj… | 2026-04-16T05:16:12.373 | 2026-04-16T05:16:12.373 |
| fkie_cve-2023-3634 | In products of the MSE6 product-family by Festo a remote authenticated, low privileged attacker cou… | 2026-04-16T05:16:12.090 | 2026-04-16T05:16:12.090 |
| fkie_cve-2026-34850 | Race condition vulnerability in the notification service. Impact: Successful exploitation of this v… | 2026-04-13T04:16:07.767 | 2026-04-16T05:05:25.157 |
| fkie_cve-2026-34851 | Race condition vulnerability in the event notification module. Impact: Successful exploitation of t… | 2026-04-13T04:16:11.513 | 2026-04-16T05:01:49.813 |
| fkie_cve-2026-34852 | Stack overflow vulnerability in the media platform. Impact: Successful exploitation of this vulnera… | 2026-04-13T04:16:11.727 | 2026-04-16T04:54:38.750 |
| fkie_cve-2026-34853 | Permission bypass vulnerability in the LBS module. Impact: Successful exploitation of this vulnerab… | 2026-04-13T04:16:12.217 | 2026-04-16T04:52:02.930 |
| fkie_cve-2026-34856 | UAF vulnerability in the communication module. Impact: Successful exploitation of this vulnerabilit… | 2026-04-13T04:16:12.437 | 2026-04-16T04:47:27.467 |
| fkie_cve-2026-34860 | Access control vulnerability in the memo module. Impact: Successful exploitation of this vulnerabil… | 2026-04-13T04:16:12.650 | 2026-04-16T04:45:53.703 |
| fkie_cve-2026-35444 | SDL_image is a library to load images of various formats as SDL surfaces. In do_layer_surface() in … | 2026-04-06T22:16:23.003 | 2026-04-16T04:41:25.240 |
| fkie_cve-2026-35404 | Open edX Platform enables the authoring and delivery of online learning at any scale. he view_surve… | 2026-04-06T22:16:21.360 | 2026-04-16T04:41:09.670 |
| fkie_cve-2026-35184 | EcclesiaCRM is CRM Software for church management. Prior to 8.0.0, there is a SQL injection vulnera… | 2026-04-06T20:16:26.880 | 2026-04-16T04:35:50.787 |
| fkie_cve-2026-35406 | Aardvark-dns is an authoritative dns server for A/AAAA container records. From 1.16.0 to 1.17.0, a … | 2026-04-07T22:16:23.277 | 2026-04-16T04:33:54.370 |
| fkie_cve-2026-39846 | SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to anothe… | 2026-04-07T22:16:23.597 | 2026-04-16T04:32:01.020 |
| fkie_cve-2026-39847 | Emmett is a full-stack Python web framework designed with simplicity. From 2.5.0 to before 2.8.1, t… | 2026-04-07T22:16:23.793 | 2026-04-16T04:31:28.903 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-q4f4-mqcx-4prx |
8.3 (3.1)
|
Out of bounds write in GPU in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who h… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-q22x-99q7-fr6w |
6.5 (3.1)
|
A flaw was found in FFmpeg. A remote attacker could exploit this vulnerability by providing a speci… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-mvj2-3qfg-7mxp |
8.8 (3.1)
|
Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentia… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-m8qq-h68v-7p42 |
8.8 (3.1)
|
Use after free in Cast in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execut… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-j7wg-hx8x-r38h |
8.8 (3.1)
|
Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker t… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-hmgp-8pgg-h7pp |
8.8 (3.1)
|
Use after free in Permissions in Google Chrome on Android prior to 147.0.7727.101 allowed a remote … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-hh8m-xqf2-mgfv |
8.8 (3.1)
|
Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-gjmf-r9m5-967q |
8.8 (3.1)
|
Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker … | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-g6hr-fwwc-8cg8 |
7.8 (3.1)
8.5 (4.0)
|
Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows l… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-9w25-v364-3jpm |
8.8 (3.1)
|
Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:19Z |
| ghsa-6r59-54c6-3757 |
8.8 (3.1)
|
Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execu… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-5hwj-hjjc-gm39 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to ex… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-3m3g-56cx-59q7 |
8.8 (3.1)
|
Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to ex… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-2rw5-37w7-549x |
8.8 (3.1)
|
Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attack… | 2026-04-15T21:30:19Z | 2026-04-15T21:30:19Z |
| ghsa-xcqw-9mv2-wqj3 |
5.0 (3.1)
|
A flaw was found in GIMP. A stack buffer overflow vulnerability in the TIM image loader's 4BPP deco… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-vhp9-v4r9-mxwj |
9.6 (3.1)
|
Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-vcp6-gxf9-8g4m |
8.4 (3.1)
|
IdentityIQ 8.5, all IdentityIQ 8.5 patch levels prior to 8.5p2, IdentityIQ 8.4, and all IdentityIQ … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-qh6q-mfp5-q5wr |
5.5 (3.1)
|
A flaw was found in GIMP. Processing a specially crafted PVR image file with large dimensions can l… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-pfc6-jxgq-cf62 |
8.3 (3.1)
|
Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privilege… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-p5x9-j974-rpfp |
3.3 (3.1)
|
--- title: Cross-Tenant Legacy Correlation Disclosure and Deletion draft: false hero: image: /sta… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-m9hq-h476-h2g8 |
9.1 (3.1)
|
Pyroscope is an open-source continuous profiling database. The database supports various storage ba… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-j6cv-3w8p-vrg8 |
5.4 (3.1)
|
A flaw was found in KubeVirt's Role-Based Access Control (RBAC) evaluation logic. The authorization… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-g672-w7xh-qp9j |
5.5 (3.1)
|
A flaw was found in the System Security Services Daemon (SSSD). The pam_passkey_child_read_data() f… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-856r-6q67-9x29 |
5.0 (3.1)
|
A flaw was found in GIMP. This vulnerability, a heap buffer over-read in the `icns_slurp()` functio… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-7x7j-88hg-3j82 |
6.1 (3.1)
|
A flaw was found in GIMP. This vulnerability, a buffer overflow in the `file-seattle-filmworks` plu… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-4gcp-x7jh-x4v7 |
9.2 (4.0)
|
CWE-798: Use of Hard-coded Credentials in Sonatype Nexus Repository Manager versions 3.0.0 through … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-4f9g-vrx9-f8cq |
5.5 (3.1)
|
A flaw was found in GIMP. A remote attacker could exploit an integer overflow vulnerability in the … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-497x-rrr9-68jp |
5.3 (3.1)
|
The CVE-2021-36156 fix validates the namespace parameter for path traversal sequences after a singl… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-3p5h-985r-gw4g |
4.3 (3.1)
|
Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to … | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ghsa-3347-qjpp-457v |
8.8 (3.1)
|
Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to e… | 2026-04-15T21:30:18Z | 2026-04-15T21:30:18Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-174 |
4.3 (3.1)
|
Server-Side Request Forgery (SSRF) vulnerability in Apache StreamPipes during installatio… | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.678475+00:00 |
| pysec-2024-173 |
8.8 (3.1)
|
Unrestricted Upload of File with dangerous type vulnerability in Apache StreamPipes. Such… | streampipes | 2024-07-17T10:15:01+00:00 | 2025-01-18T22:21:43.618882+00:00 |
| pysec-2024-172 |
3.7 (3.1)
|
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache StreamPipes in … | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.557516+00:00 |
| pysec-2024-171 |
8.0 (3.1)
|
Strawberry GraphQL is a library for creating GraphQL APIs. Prior to version 0.243.0, mult… | strawberry-graphql | 2024-09-25T18:15:05+00:00 | 2025-01-18T22:21:43.412172+00:00 |
| pysec-2024-170 |
4.8 (3.1)
|
A stored Cross-Site Scripting (XSS) vulnerability was identified in the zenml-io/zenml re… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.253212+00:00 |
| pysec-2024-169 |
6.5 (3.1)
|
An improper authorization vulnerability exists in the zenml-io/zenml repository, specific… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.205431+00:00 |
| pysec-2024-168 |
6.5 (3.1)
|
Taipy is an open-source Python library for easy, end-to-end application development for d… | taipy | 2024-10-09T19:15:14+00:00 | 2025-01-18T19:19:07.718423+00:00 |
| pysec-2024-167 |
|
NLTK through 3.8.1 allows remote code execution if untrusted packages have pickled Python… | nltk | 2024-06-27T22:15:10+00:00 | 2025-01-18T19:19:06.317325+00:00 |
| pysec-2024-166 |
|
Nautobot is a Network Source of Truth and Network Automation Platform. A user with permis… | nautobot | 2024-05-28T23:15:17+00:00 | 2025-01-18T19:19:06.277166+00:00 |
| pysec-2024-165 |
7.5 (3.1)
|
The Jupyter Server provides the backend for Jupyter web applications. Jupyter Server on W… | jupyter-server | 2024-06-06T16:15:11+00:00 | 2025-01-18T19:19:04.842426+00:00 |
| pysec-2024-164 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an exces… | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-16T21:21:41.436934+00:00 |
| pysec-2025-1 |
|
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2… | django | 2025-01-14T19:15:32+00:00 | 2025-01-14T21:22:18.665005+00:00 |
| pysec-2024-163 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to ve… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-14T05:22:23.036505+00:00 |
| pysec-2024-162 |
6.5 (3.1)
|
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider … | scrapy | 2024-02-28T00:15:53+00:00 | 2025-01-14T05:22:21.870348+00:00 |
| pysec-2024-161 |
|
Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R packag… | pyarrow | 2024-11-28T17:15:48+00:00 | 2025-01-14T05:22:20.554292+00:00 |
| pysec-2024-160 |
6.1 (3.1)
|
lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.cle… | lxml-html-clean | 2024-11-19T22:15:21+00:00 | 2025-01-14T05:22:17.244267+00:00 |
| pysec-2024-159 |
|
Versions of the package luigi before 3.6.0 are vulnerable to Arbitrary File Write via Arc… | luigi | 2024-12-10T05:15:07+00:00 | 2025-01-14T05:22:17.204098+00:00 |
| pysec-2024-158 |
|
Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when … | djoser | 2024-12-13T05:15:07+00:00 | 2025-01-14T05:22:11.856636+00:00 |
| pysec-2024-157 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:18+00:00 | 2025-01-14T05:22:11.817473+00:00 |
| pysec-2024-156 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:17+00:00 | 2025-01-14T05:22:11.736011+00:00 |
| pysec-2024-155 |
7.5 (3.1)
|
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) … | cbor2 | 2024-02-19T23:15:07+00:00 | 2025-01-14T05:22:09.226388+00:00 |
| pysec-2019-255 |
6.1 (3.1)
|
data/interfaces/default/history.html in Tautulli 2.1.26 has XSS via a crafted Plex userna… | tautulli | 2019-02-19T16:29:00Z | 2025-01-12T05:34:20.550037Z |
| pysec-2019-254 |
6.5 (3.1)
|
In Tautulli 2.1.9, CSRF in the /shutdown URI allows an attacker to shut down the remote m… | tautulli | 2019-12-18T18:15:00Z | 2025-01-12T05:34:20.505254Z |
| pysec-2022-43131 |
6.5 (3.1)
|
diplib v3.0.0 is vulnerable to Double Free. | diplib | 2022-11-04T17:15:00Z | 2024-12-27T22:48:17.996707Z |
| pysec-2022-43162 |
7.5 (3.1)
|
Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID. | redis | 2022-06-23T17:15:00Z | 2024-12-23T11:33:23.546447Z |
| pysec-2019-253 |
7.4 (3.1)
|
Tahoe-LAFS 1.9.0 fails to ensure integrity which allows remote attackers to corrupt mutab… | tahoe-lafs | 2019-11-07T18:15:00Z | 2024-12-19T05:47:49.035329Z |
| pysec-2020-343 |
7.8 (3.1)
|
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when the… | blosc2 | 2020-11-27T20:15:00Z | 2024-12-12T14:22:45.450508Z |
| pysec-2024-154 |
8.6 (3.1)
8.7 (4.0)
|
Ultralytics has identified a supply chain attack affecting affecting multiple versions of… | ultralytics | 2024-12-10T19:20:27.097505+00:00 | |
| pysec-2015-42 |
|
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.… | ipsilon | 2015-11-17T15:59:00Z | 2024-12-05T09:35:27.751929Z |
| pysec-2015-41 |
|
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.… | ipsilon | 2015-11-17T15:59:00Z | 2024-12-05T09:35:27.711043Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33739 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.344696Z |
| gsd-2024-33738 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.562140Z |
| gsd-2024-33737 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.285475Z |
| gsd-2024-33736 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.346507Z |
| gsd-2024-33735 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.410261Z |
| gsd-2024-33734 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.482444Z |
| gsd-2024-33733 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.577869Z |
| gsd-2024-33732 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.513959Z |
| gsd-2024-33731 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.328794Z |
| gsd-2024-33730 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.396940Z |
| gsd-2024-33729 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.527542Z |
| gsd-2024-33728 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.380564Z |
| gsd-2024-33727 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.514916Z |
| gsd-2024-33726 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.327193Z |
| gsd-2024-33725 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.300660Z |
| gsd-2024-33724 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.429383Z |
| gsd-2024-33723 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.361754Z |
| gsd-2024-33722 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.598142Z |
| gsd-2024-33721 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.408369Z |
| gsd-2024-33720 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.519711Z |
| gsd-2024-33719 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.344333Z |
| gsd-2024-33718 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.360853Z |
| gsd-2024-33717 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.429699Z |
| gsd-2024-33716 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.371227Z |
| gsd-2024-33715 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.440563Z |
| gsd-2024-33714 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.510684Z |
| gsd-2024-33713 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.522989Z |
| gsd-2024-33712 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.587066Z |
| gsd-2024-33711 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.452695Z |
| gsd-2024-33710 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.499457Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2775 | Malicious code in insomnia-smoke-test (npm) | 2026-04-16T10:01:27Z | 2026-04-16T10:01:27Z |
| mal-2026-2774 | Malicious code in insomnia-scripting-environment (npm) | 2026-04-16T10:01:25Z | 2026-04-16T10:01:25Z |
| mal-2026-2773 | Malicious code in insomnia-api (npm) | 2026-04-16T10:01:23Z | 2026-04-16T10:01:23Z |
| mal-2026-2772 | Malicious code in idaasfinancialnodeserv (npm) | 2026-04-16T10:01:07Z | 2026-04-16T10:01:07Z |
| mal-2026-2771 | Malicious code in icims-express-dot-engine (npm) | 2026-04-16T10:01:05Z | 2026-04-16T10:01:05Z |
| mal-2026-2770 | Malicious code in helios-components (npm) | 2026-04-16T10:00:25Z | 2026-04-16T10:00:25Z |
| mal-2026-2769 | Malicious code in hardhat-starter-kit (npm) | 2026-04-16T10:00:10Z | 2026-04-16T10:00:10Z |
| mal-2026-2768 | Malicious code in h3-next (npm) | 2026-04-16T10:00:02Z | 2026-04-16T10:00:02Z |
| mal-2026-2767 | Malicious code in ground-platform (npm) | 2026-04-16T09:59:40Z | 2026-04-16T09:59:40Z |
| mal-2026-2766 | Malicious code in gke-net (npm) | 2026-04-16T09:58:54Z | 2026-04-16T09:58:54Z |
| mal-2026-2765 | Malicious code in ghscan-pkgcheck-test-001 (npm) | 2026-04-16T09:58:43Z | 2026-04-16T09:58:43Z |
| mal-2026-2764 | Malicious code in gemini-cli-vscode-ide-companion (npm) | 2026-04-16T09:58:22Z | 2026-04-16T09:58:22Z |
| mal-2026-2763 | Malicious code in gemini-ai-checker (npm) | 2026-04-16T09:58:20Z | 2026-04-16T09:58:20Z |
| mal-2026-2762 | Malicious code in farikku-util (npm) | 2026-04-16T09:56:35Z | 2026-04-16T09:56:35Z |
| mal-2026-2761 | Malicious code in f0-fpti-tracking (npm) | 2026-04-16T09:56:20Z | 2026-04-16T09:56:20Z |
| mal-2026-2760 | Malicious code in f0-email-verification (npm) | 2026-04-16T09:56:16Z | 2026-04-16T09:56:16Z |
| mal-2026-2759 | Malicious code in express-auth-basic (npm) | 2026-04-16T09:56:04Z | 2026-04-16T09:56:04Z |
| mal-2026-2758 | Malicious code in estaspnet (npm) | 2026-04-16T09:55:13Z | 2026-04-16T09:55:13Z |
| mal-2026-2757 | Malicious code in docai-sheets (npm) | 2026-04-16T09:53:31Z | 2026-04-16T09:53:31Z |
| mal-2026-2756 | Malicious code in digitallogger (npm) | 2026-04-16T09:53:05Z | 2026-04-16T09:53:05Z |
| mal-2026-2755 | Malicious code in devops-debug-tool-ctf (npm) | 2026-04-16T09:52:56Z | 2026-04-16T09:52:56Z |
| mal-2026-2754 | Malicious code in deployer-kit (npm) | 2026-04-16T09:52:37Z | 2026-04-16T09:52:37Z |
| mal-2026-2753 | Malicious code in declarative-tracker (npm) | 2026-04-16T09:52:10Z | 2026-04-16T09:52:10Z |
| mal-2026-2752 | Malicious code in country-specialization (npm) | 2026-04-16T09:50:53Z | 2026-04-16T09:50:53Z |
| mal-2026-2751 | Malicious code in coremeshnode (npm) | 2026-04-16T09:50:50Z | 2026-04-16T09:50:50Z |
| mal-2026-2750 | Malicious code in coremesh (npm) | 2026-04-16T09:50:48Z | 2026-04-16T09:50:48Z |
| mal-2026-2749 | Malicious code in conversation-relay (npm) | 2026-04-16T09:50:40Z | 2026-04-16T09:50:40Z |
| mal-2026-2748 | Malicious code in collect-rangers (npm) | 2026-04-16T09:50:10Z | 2026-04-16T09:50:10Z |
| mal-2026-2747 | Malicious code in cloud-run-microservice-template (npm) | 2026-04-16T09:49:59Z | 2026-04-16T09:49:59Z |
| mal-2026-2746 | Malicious code in chainlink-docs (npm) | 2026-04-16T09:49:21Z | 2026-04-16T09:49:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0837 | Google Chrome: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0833 | Ruby on Rails: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0831 | systemd: Mehrere Schwachstellen | 2026-03-23T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0821 | Keycloak: Mehrere Schwachstellen | 2026-03-22T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0816 | Apache ActiveMQ Artemis: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-22T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0787 | Keycloak: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0785 | libarchive: Schwachstelle ermöglicht Denial of Service | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0781 | Drupal Automated Logout Extension: Schwachstelle ermöglicht Manipulation von Dateien | 2026-03-18T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0775 | nghttp2: Schwachstelle ermöglicht Denial of Service | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0764 | Grafana Tempo: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0760 | Xen und Citrix Systems XenServer: Mehrere Schwachstellen | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0734 | GNU InetUtils: Mehrere Schwachstellen | 2026-03-15T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0720 | systemd: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0704 | Google Cloud Platform Envoy Proxy, Istio und Service Mesh: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0607 | CPython: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0599 | Drupal Extensions: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0595 | Ruby: Schwachstelle ermöglicht Denial of Service | 2026-03-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0556 | vim: Mehrere Schwachstellen | 2026-03-01T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0508 | Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-02-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0504 | Mattermost Server und Plugins: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2026-02-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0446 | libssh: Mehrere Schwachstellen ermöglichen Manipulation von Dateien und DoS | 2026-02-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0419 | vim (NetBeans): Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0369 | Microsoft Windows: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0361 | GIMP: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0342 | GIMP: Schwachstelle ermöglicht Denial of Service | 2026-02-08T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0318 | n8n: Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0297 | Django: Mehrere Schwachstellen | 2026-02-03T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0209 | Cpython: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0207 | Red Hat Enterprise Linux (urllib3): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0183 | InetUtils (telnetd): Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-01-20T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-193-02 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:11.677616Z |
| icsa-24-074-11 | Siemens RUGGEDCOM APE1808 with Fortigate NGFW Devices | 2024-03-12T00:00:00.000000Z | 2026-01-14T22:00:10.660779Z |
| icsa-24-193-11 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:09.701376Z |
| icsa-26-015-09 | Siemens Industrial Edge Device Kit | 2026-01-13T00:00:00.000000Z | 2026-01-14T21:54:58.722065Z |
| icsa-26-013-03 | YoSmart YoLink Smart Hub | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-02 | Rockwell Automation FactoryTalk DataMosaix Private Cloud | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-01 | Rockwell Automation 432ES-IG3 Series A | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-25-212-01 | Güralp Systems FMUS Series and MIN Series Devices (Update B) | 2025-07-31T06:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| va-26-013-01 | NSecKrnl driver terminates system processes with crafted IOCTL requests | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| icsa-25-345-03 | AzeoTech DAQFactory (Update A) | 2025-12-11T07:00:00.000000Z | 2026-01-12T07:00:00.000000Z |
| va-26-008-01 | OPEXUS eCASE | 2026-01-08T16:36:15Z | 2026-01-08T16:36:15Z |
| va-26-008-03 | Ideagen DevonWay stored XSS | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| icsa-26-008-01 | Hitachi Energy Asset Suite | 2025-12-09T00:00:00.000000Z | 2026-01-07T21:26:16.381953Z |
| va-26-008-02 | OPEXUS eComplaint and eCasePortal IDOR | 2026-01-07T16:35:11Z | 2026-01-07T16:35:11Z |
| icsa-26-006-01 | Columbia Weather Systems MicroServer | 2026-01-06T07:00:00.000000Z | 2026-01-06T07:00:00.000000Z |
| icsa-25-177-01 | Mitsubishi Electric Air Conditioning Systems (Update B) | 2025-06-26T06:00:00.000000Z | 2025-12-23T07:00:00.000000Z |
| icsa-25-352-02 | Schneider Electric EcoStruxure Foxboro DCS Advisor | 2025-12-09T08:00:00.000000Z | 2025-12-18T18:23:06.311869Z |
| icsa-25-352-05 | Siemens Interniche IP-Stack | 2025-12-09T00:00:00.000000Z | 2025-12-18T18:13:59.515670Z |
| icsa-25-352-07 | Rockwell Automation Micro820, Micro850, Micro870 | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-06 | Advantech WebAccess/SCADA | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electrics Products | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-03 | National Instruments LabView | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-01 | Inductive Automation Ignition | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-24-291-03 | Mitsubishi Electric CNC Series (Update C) | 2024-10-17T06:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| va-25-352-01 | BullWall Ransomware Containment and Server Intrusion Protection multiple vulnerabilities | 2025-12-18T00:00:00Z | 2025-12-18T00:00:00Z |
| icsa-25-350-04 | Mitsubishi Electric GT Designer3 | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-350-03 | Hitachi Energy AFS, AFR and AFF Series | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-350-01 | Güralp Systems Fortimus Series, Minimus Series, and Certimus Series | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-308-01 | Fuji Electric Monitouch V-SFT-6 (Update A) | 2025-11-04T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-224-02 | Johnson Controls iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2 (Update A) | 2025-08-12T06:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-meraki-mx-vpn-dos-qtrhzg2 | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Denial of Service Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:28+00:00 |
| cisco-sa-meraki-mx-vpn-dos-by-qwukqv7x | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Session Takeover and Denial of Service Vulnerability | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:27+00:00 |
| cisco-sa-webex-xss-7teqtfn8 | Cisco Webex Services Cross-Site Scripting Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-webex-cache-q4xbkqbg | Cisco Webex Meetings Services HTTP Cache Poisoning Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-ssti-dpulqsmz | Cisco Secure Network Analytics Manager Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-apiacv-4b6x5ysw | Cisco Secure Network Analytics Manager API Authorization Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-ise-restart-ss-uf986g2q | Cisco Identity Services Engine RADIUS Denial of Service Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-duo-ssp-cmd-inj-rcmyrna | Cisco Duo Self-Service Portal Command Injection Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cuis-priv-esc-3pk96su4 | Cisco Unified Intelligence Center Privilege Escalation Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cucm-kkhzbhr5 | Cisco Unified Communications Products Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-contcent-insuffacces-ardovhn8 | Cisco Unified Contact Center Enterprise Cloud Connect Insufficient Access Control Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sdwanarbfile-2zkhkzwj | Cisco Catalyst SD-WAN Manager Arbitrary File Creation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-14T20:04:53+00:00 |
| cisco-sa-sdwan-fileoverwrite-uc9txwh | Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-08T15:55:57+00:00 |
| cisco-sa-wlc-wncd-p6gvt6hl | Cisco IOS XE Software for WLC Wireless IPv6 Clients Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webui-multi-arnhm4v6 | Cisco IOS XE Software Web-Based Management Interface Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webui-cmdinj-gvn3oknc | Cisco IOS XE Software Web-Based Management Interface Command Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-xss-xhn8m5jt | Cisco Catalyst SD-WAN Manager Stored Cross-Site Scripting Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-html-inj-gxvtk6zj | Cisco Catalyst SD-WAN Manager Reflected HTML Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-twamp-kv4fhugn | Cisco IOS, IOS XE, and IOS XR Software TWAMP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-snmpv3-qkeyvzsy | Cisco IOS and IOS XE Software SNMPv3 Configuration Restriction Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sisf-dos-zgwt4ddy | Multiple Cisco Products Switch Integrated Security Features DHCPv6 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sdwan-priviesc-wck7bmmt | Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-netconf-nacm-bypass-tgzv9pmq | Cisco IOS XE Software Model-Driven Programmability Authorization Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-multiprod-ikev2-dos-gpctuqv2 | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IKEv2 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ipsgacl-pg6qfzk | Cisco IOS Software on Cisco Catalyst 1000 and 2960L Switches Access Control List Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iox-dos-95fqnf7b | Cisco IOx Application Hosting Environment Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-privesc-su7scvdp | Cisco IOS XE Software Privilege Escalation Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-ikev1-dos-xhk3hzfc | Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-dhcpsn-dos-xbn8mtks | Cisco IOS XE Software DHCP Snooping Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ios-http-privesc-wcrd5e3 | Cisco IOS Software Industrial Ethernet Switch Device Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-32184 | Microsoft High Performance Compute (HPC) Pack Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32183 | Windows Snipping Tool Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32181 | Connected User Experiences and Telemetry Service Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32178 | .NET Spoofing Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32176 | SQL Server Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32171 | Azure Logic Apps Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32168 | Azure Monitor Agent Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32167 | SQL Server Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32165 | Windows User Interface Core Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32164 | Windows User Interface Core Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32163 | Windows User Interface Core Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32162 | Windows COM Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32160 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32159 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32158 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32157 | Remote Desktop Client Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32156 | Windows UPnP Device Host Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32155 | Desktop Window Manager Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32154 | Desktop Window Manager Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32153 | Windows Speech Runtime Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32152 | Desktop Window Manager Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32151 | Windows Shell Information Disclosure Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32150 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32149 | Windows Hyper-V Remote Code Execution Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32093 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32091 | Microsoft Brokering File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32090 | Windows Speech Brokered Api Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32089 | Windows Speech Brokered Api Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32088 | Windows Biometric Service Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-32087 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0348 | Kwetsbaarheden verholpen in Arista Networks producten | 2025-11-03T08:26:39.905306Z | 2025-11-03T08:26:39.905306Z |
| ncsc-2025-0347 | Kwetsbaarheden verholpen in IBM QRadar SIEM | 2025-11-03T08:17:18.981494Z | 2025-11-03T08:17:18.981494Z |
| ncsc-2025-0346 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-03T08:14:02.972842Z | 2025-11-03T08:14:02.972842Z |
| ncsc-2025-0345 | Kwetsbaarheden verholpen in Rockwell Automation FactoryTalk | 2025-10-31T09:35:00.469498Z | 2025-10-31T09:35:00.469498Z |
| ncsc-2025-0344 | Kwetsbaarheden verholpen in Rockwell Automation COMMS | 2025-10-31T09:34:05.069339Z | 2025-10-31T09:34:05.069339Z |
| ncsc-2025-0343 | Kwetsbaarheid verholpen in Mozilla Firefox | 2025-10-31T09:31:53.270725Z | 2025-10-31T09:31:53.270725Z |
| ncsc-2025-0342 | Kwetsbaarheden verholpen in GitLab Enterprise en Community Edition | 2025-10-27T08:08:17.974767Z | 2025-10-27T09:38:47.073257Z |
| ncsc-2025-0341 | Kwetsbaarheden verholpen in BIND 9 | 2025-10-24T08:19:45.232307Z | 2025-10-27T08:24:03.796638Z |
| ncsc-2025-0310 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-10-14T18:03:45.875739Z | 2025-10-24T11:09:29.790442Z |
| ncsc-2025-0340 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2025-10-23T14:13:39.969386Z | 2025-10-23T14:13:39.969386Z |
| ncsc-2025-0339 | Kwetsbaarheden verholpen in Oracle MySQL | 2025-10-23T14:11:30.111892Z | 2025-10-23T14:11:30.111892Z |
| ncsc-2025-0338 | Kwetsbaarheden verholpen in Oracle JD Edwards EnterpriseOne Tools | 2025-10-23T13:53:27.268400Z | 2025-10-23T13:53:27.268400Z |
| ncsc-2025-0337 | Kwetsbaarheden verholpen in Oracle Java | 2025-10-23T13:51:40.686406Z | 2025-10-23T13:51:40.686406Z |
| ncsc-2025-0336 | Kwetsbaarheden verholpen in Oracle Hyperion | 2025-10-23T13:49:44.344049Z | 2025-10-23T13:49:44.344049Z |
| ncsc-2025-0335 | Kwetsbaarheden verholpen in Oracle Analytics | 2025-10-23T13:45:06.747933Z | 2025-10-23T13:45:06.747933Z |
| ncsc-2025-0333 | Kwetsbaarheden verholpen in Oracle Financial Services | 2025-10-23T13:35:32.902231Z | 2025-10-23T13:35:32.902231Z |
| ncsc-2025-0332 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2025-10-23T13:26:49.210414Z | 2025-10-23T13:26:49.210414Z |
| ncsc-2025-0331 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2025-10-23T13:23:20.471568Z | 2025-10-23T13:23:20.471568Z |
| ncsc-2025-0330 | Kwetsbaarheden verholpen in Oracle Communications producten | 2025-10-23T13:20:15.363063Z | 2025-10-23T13:20:15.363063Z |
| ncsc-2025-0329 | Kwetsbaarheden verholpen in Oracle Commerce | 2025-10-23T07:20:51.213314Z | 2025-10-23T07:20:51.213314Z |
| ncsc-2025-0328 | Kwetsbaarheden verholpen in Oracle Database producten | 2025-10-23T07:19:57.652532Z | 2025-10-23T07:19:57.652532Z |
| ncsc-2025-0327 | Kwetsbaarheden verholpen in Zohocorp's ManageEngine | 2025-10-23T07:18:47.274781Z | 2025-10-23T07:18:47.274781Z |
| ncsc-2025-0326 | Kwetsbaarheden verholpen in Moxa’s netwerkbeveiligingsapparaten | 2025-10-20T13:03:34.436477Z | 2025-10-20T13:03:34.436477Z |
| ncsc-2025-0325 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-10-20T12:59:06.729067Z | 2025-10-20T12:59:06.729067Z |
| ncsc-2025-0241 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-08-06T12:11:46.234849Z | 2025-10-17T10:44:55.312550Z |
| ncsc-2025-0324 | Kwetsbaarheid verholpen in FortiOS | 2025-10-17T08:42:51.624827Z | 2025-10-17T08:42:51.624827Z |
| ncsc-2025-0296 | Kwetsbaarheid verholpen in WatchGuard Fireware OS | 2025-09-19T13:31:26.392203Z | 2025-10-17T08:19:28.145953Z |
| ncsc-2025-0323 | Kwetsbaarheden verholpen in SAP Producten | 2025-10-17T08:04:54.828451Z | 2025-10-17T08:04:54.828451Z |
| ncsc-2025-0322 | Kwetsbaarheden verholpen in Adobe Commerce | 2025-10-16T06:32:33.597617Z | 2025-10-16T06:32:33.597617Z |
| ncsc-2025-0321 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-10-16T06:27:14.019367Z | 2025-10-16T06:27:14.019367Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10401-1 | freeciv-3.2.4-1.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10400-1 | chromedriver-146.0.7680.153-2.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:10399-1 | GraphicsMagick-1.3.46-4.1 on GA media | 2026-03-22T00:00:00Z | 2026-03-22T00:00:00Z |
| opensuse-su-2026:20409-1 | Security update for harfbuzz | 2026-03-20T15:26:24Z | 2026-03-20T15:26:24Z |
| opensuse-su-2026:20408-1 | Security update for postgresql18 | 2026-03-20T14:50:43Z | 2026-03-20T14:50:43Z |
| opensuse-su-2026:20407-1 | Security update for python-orjson | 2026-03-20T12:07:21Z | 2026-03-20T12:07:21Z |
| opensuse-su-2026:20406-1 | Security update for python-tornado6 | 2026-03-20T10:53:33Z | 2026-03-20T10:53:33Z |
| opensuse-su-2026:20404-1 | Security update for curl | 2026-03-20T09:36:45Z | 2026-03-20T09:36:45Z |
| opensuse-su-2026:20405-1 | Security update for ImageMagick | 2026-03-20T09:31:54Z | 2026-03-20T09:31:54Z |
| opensuse-su-2026:20403-1 | Security update for vim | 2026-03-20T03:15:00Z | 2026-03-20T03:15:00Z |
| opensuse-su-2026:10398-1 | python311-3.11.15-3.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:10397-1 | python311-PyJWT-2.12.1-1.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:10396-1 | openbao-2.5.1-1.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:20402-1 | Security update for gstreamer-plugins-ugly | 2026-03-19T13:48:14Z | 2026-03-19T13:48:14Z |
| opensuse-su-2026:20401-1 | Security update for ucode-intel | 2026-03-19T09:31:38Z | 2026-03-19T09:31:38Z |
| opensuse-su-2026:20399-1 | Security update for libsodium | 2026-03-19T08:18:59Z | 2026-03-19T08:18:59Z |
| opensuse-su-2026:20398-1 | Security update for keylime | 2026-03-19T08:16:55Z | 2026-03-19T08:16:55Z |
| opensuse-su-2026:20397-1 | Security update for poppler | 2026-03-19T08:11:15Z | 2026-03-19T08:11:15Z |
| opensuse-su-2026:20396-1 | Security update for librsvg | 2026-03-19T08:11:15Z | 2026-03-19T08:11:15Z |
| opensuse-su-2026:10395-1 | qemu-10.2.2-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10394-1 | python313-3.13.12-2.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10393-1 | python311-pyasn1-0.6.3-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10392-1 | python311-pyOpenSSL-26.0.0-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10391-1 | GraphicsMagick-1.3.46-3.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:20394-1 | Security update for mumble | 2026-03-18T20:03:58Z | 2026-03-18T20:03:58Z |
| opensuse-su-2026:20390-1 | Security update for protobuf | 2026-03-18T18:15:53Z | 2026-03-18T18:15:53Z |
| opensuse-su-2026:20392-1 | Security update for python-Authlib | 2026-03-18T17:30:06Z | 2026-03-18T17:30:06Z |
| opensuse-su-2026:20393-1 | Security update for python-simpleeval | 2026-03-18T17:29:11Z | 2026-03-18T17:29:11Z |
| opensuse-su-2026:20388-1 | Security update for postgresql17 | 2026-03-18T15:31:19Z | 2026-03-18T15:31:19Z |
| opensuse-su-2026:20387-1 | Security update for busybox | 2026-03-18T15:29:19Z | 2026-03-18T15:29:19Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6251 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-03-31T07:30:54+00:00 | 2026-04-16T16:04:20+00:00 |
| rhsa-2026:6192 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.27.0 Release. | 2026-03-30T15:41:48+00:00 | 2026-04-16T16:04:19+00:00 |
| rhsa-2026:6184 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.19.13 security, enhancement & bug fix update | 2026-03-30T13:41:49+00:00 | 2026-04-16T16:04:19+00:00 |
| rhsa-2026:5968 | Red Hat Security Advisory: Satellite 6.18.4 Async Update | 2026-03-26T19:47:53+00:00 | 2026-04-16T16:04:18+00:00 |
| rhsa-2026:5952 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.2.3 | 2026-03-26T15:03:15+00:00 | 2026-04-16T16:04:17+00:00 |
| rhsa-2026:5950 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.1.6 | 2026-03-26T14:51:43+00:00 | 2026-04-16T16:04:17+00:00 |
| rhsa-2026:5948 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.0.9 | 2026-03-26T14:31:40+00:00 | 2026-04-16T16:04:17+00:00 |
| rhsa-2026:5853 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-26T01:05:19+00:00 | 2026-04-16T16:04:17+00:00 |
| rhsa-2026:5852 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-26T00:58:34+00:00 | 2026-04-16T16:04:17+00:00 |
| rhsa-2026:5851 | Red Hat Security Advisory: DevWorkspace Operator 0.40.0 release. | 2026-03-25T23:56:41+00:00 | 2026-04-16T16:04:16+00:00 |
| rhsa-2026:5807 | Red Hat Security Advisory: RHOAI 2.16.4 - Red Hat OpenShift AI | 2026-03-25T12:32:51+00:00 | 2026-04-16T16:04:15+00:00 |
| rhsa-2026:5665 | Red Hat Security Advisory: Red Hat Quay 3.10.19 | 2026-03-24T18:02:58+00:00 | 2026-04-16T16:04:15+00:00 |
| rhsa-2026:5649 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-03-24T16:17:51+00:00 | 2026-04-16T16:04:14+00:00 |
| rhsa-2026:5544 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-24T06:55:51+00:00 | 2026-04-16T16:04:14+00:00 |
| rhsa-2026:5533 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-24T04:02:36+00:00 | 2026-04-16T16:04:11+00:00 |
| rhsa-2026:5463 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:40:06+00:00 | 2026-04-16T16:04:11+00:00 |
| rhsa-2026:5461 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-23T17:44:49+00:00 | 2026-04-16T16:04:11+00:00 |
| rhsa-2026:5452 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:13:04+00:00 | 2026-04-16T16:04:10+00:00 |
| rhsa-2026:5447 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T16:03:55+00:00 | 2026-04-16T16:04:09+00:00 |
| rhsa-2026:5444 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T15:45:35+00:00 | 2026-04-16T16:04:09+00:00 |
| rhsa-2026:5439 | Red Hat Security Advisory: RHTAS 1.3.3 - Red Hat Trusted Artifact Signer Release | 2026-03-23T15:37:52+00:00 | 2026-04-16T16:04:07+00:00 |
| rhsa-2026:5327 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-23T07:40:40+00:00 | 2026-04-16T16:04:06+00:00 |
| rhsa-2026:5168 | Red Hat Security Advisory: Red Hat Quay 3.9.19 | 2026-03-19T19:18:06+00:00 | 2026-04-16T16:04:04+00:00 |
| rhsa-2026:5146 | Red Hat Security Advisory: yggdrasil security update | 2026-03-19T16:04:46+00:00 | 2026-04-16T16:04:04+00:00 |
| rhsa-2026:5145 | Red Hat Security Advisory: yggdrasil-worker-package-manager security update | 2026-03-19T15:42:26+00:00 | 2026-04-16T16:04:03+00:00 |
| rhsa-2026:5132 | Red Hat Security Advisory: Kiali 1.73.28 for Red Hat OpenShift Service Mesh 2.6 | 2026-03-19T14:09:55+00:00 | 2026-04-16T16:04:03+00:00 |
| rhsa-2026:5131 | Red Hat Security Advisory: Kiali 2.11.8 for Red Hat OpenShift Service Mesh 3.1 | 2026-03-19T14:08:55+00:00 | 2026-04-16T16:04:03+00:00 |
| rhsa-2026:5130 | Red Hat Security Advisory: Kiali 2.17.5 for Red Hat OpenShift Service Mesh 3.2 | 2026-03-19T14:08:59+00:00 | 2026-04-16T16:04:02+00:00 |
| rhsa-2026:5129 | Red Hat Security Advisory: Kiali 2.4.14 for Red Hat OpenShift Service Mesh 3.0 | 2026-03-19T14:08:51+00:00 | 2026-04-16T16:04:01+00:00 |
| rhsa-2026:5079 | Red Hat Security Advisory: rhc security update | 2026-03-19T09:49:36+00:00 | 2026-04-16T16:03:59+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2022-165-06 | Schneider Electric C-Bus Home Automation Products | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-05 | EcoStruxure Power Commission | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-04 | Data Center Expert | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-03 | Conext™ Combox | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-02 | Geo SCADA Mobile | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-067-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2022-03-08T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2021-012-02 | EcoStruxure Power Build - Rapsody | 2021-01-12T08:32:35.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-130-03 | Wiser Smart | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-02 | Saitel DP RTU | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-01 | PowerLogic ION Setup | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2021-313-03 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2021-11-09T06:30:00.000Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-039-04 | spaceLYnk, Wiser For KNX, fellerLYnk | 2022-02-08T20:32:52.000Z | 2022-03-08T20:32:52.000Z |
| sevd-2022-067-03 | Ritto Wiser™ Door | 2022-03-08T10:12:35.000Z | 2022-03-08T10:12:35.000Z |
| sevd-2021-313-04 | Windows Print Spooler embedded in EcoStruxure™ Process Expert | 2021-11-09T08:45:48.000Z | 2022-03-08T08:45:48.000Z |
| sevd-2022-011-03 | Easergy P5 | 2022-01-11T11:05:25.000Z | 2022-03-02T11:05:25.000Z |
| sevd-2022-039-06 | Harmony/Magelis iPC Series HMI, Vijeo Designer and Vijeo Designer Basic | 2022-02-08T23:25:23.000Z | 2022-02-08T23:25:23.000Z |
| sevd-2022-039-03 | Easergy P40 | 2022-02-08T17:58:55.000Z | 2022-02-08T17:58:55.000Z |
| sevd-2022-039-05 | EcoStruxure Geo SCADA Expert | 2022-02-08T17:33:44.000Z | 2022-02-08T17:33:44.000Z |
| sevd-2022-039-02 | EcoStruxure EV Charging Expert | 2022-02-08T12:36:59.000Z | 2022-02-08T12:36:59.000Z |
| sevd-2022-039-01 | IGSS (Interactive Graphical SCADA System) | 2022-02-08T07:29:58.000Z | 2022-02-08T07:29:58.000Z |
| sevd-2022-011-07 | EcoStruxure™ Power Monitoring Expert | 2022-01-11T13:20:28.000Z | 2022-01-11T13:20:28.000Z |
| sevd-2022-011-05 | ConneXium Tofino Firewall and Loadable Security Modules | 2022-01-11T12:53:54.000Z | 2022-01-11T12:53:54.000Z |
| sevd-2022-011-04 | Easergy P3 | 2022-01-11T11:28:56.000Z | 2022-01-11T11:28:56.000Z |
| sevd-2022-011-02 | Easergy T300 | 2022-01-11T10:48:02.000Z | 2022-01-11T10:48:02.000Z |
| sevd-2022-011-01 | Ethernet and Web server on Modicon M340 controller and Communication Modules | 2022-01-11T07:53:07.000Z | 2022-01-11T07:53:07.000Z |
| sevd-2021-348-04 | APC by Schneider Electric Rack PDU | 2021-12-14T00:00:00.000Z | 2021-12-21T00:00:00.000Z |
| sevd-2021-348-02 | EVlink City / Parking / Smart Wallbox Charging Stations | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-348-01 | IGSS (Interactive Graphical SCADA System) | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-313-07 | Eurotherm GUIcon | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-02 | Schneider Electric Software Update | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-556937 | SSA-556937: Multiple Vulnerabilities in VersiCharge AC Series EV Chargers | 2025-05-13T00:00:00Z | 2025-05-14T00:00:00Z |
| ssa-552330 | SSA-552330: System Configuration Password Reset in Siveillance Video V2024 R1 | 2025-05-14T00:00:00Z | 2025-05-14T00:00:00Z |
| ssa-935500 | SSA-935500: Denial of Service Vulnerability in FTP Server of Nucleus RTOS based APOGEE, TALON and Desigo PXC/PXM Products | 2022-10-11T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-901508 | SSA-901508: Multiple Vulnerabilities in INTRALOG WMS Before V5 | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-828116 | SSA-828116: Denial of Service Vulnerability in BACnet ATEC Devices | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-819629 | SSA-819629: Weak Authentication Vulnerability in Industrial Edge Device Kit | 2025-04-08T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-718393 | SSA-718393: Partial Denial of Service Vulnerability in APOGEE PXC and TALON TC Series (BACnet) Devices | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-668154 | SSA-668154: Denial of Service Vulnerability in MS/TP Point Pickup Module | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-542540 | SSA-542540: Out of Bounds Read Vulnerability in Teamcenter Visualization | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-523418 | SSA-523418: Information Disclosure Vulnerability in Desigo CC | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-455250 | SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.2-h3 | 2024-04-09T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-339086 | SSA-339086: Insufficient Session Expiration Vulnerability in SIMATIC PCS neo | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-222768 | SSA-222768: Multiple Vulnerabilities in SIRIUS 3SK2 Safety Relays and 3RK3 Modular Safety Systems | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-162255 | SSA-162255: Multiple Vulnerabilities in Polarion Before V2410 | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-103653 | SSA-103653: Denial-of-Service Vulnerability in Automation License Manager | 2024-09-10T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-047424 | SSA-047424: Code Execution and SQL Injection Vulnerabilities in OZW Web Servers | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-443402 | SSA-443402: Multiple SQL Injection Vulnerabilities in TeleControl Server Basic before V3.1.2.2 | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| ssa-395348 | SSA-395348: Improper Handling of Length Parameter Inconsistency Vulnerability in TeleControl Server Basic before V3.1.2.2 | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| ssa-817234 | SSA-817234: Multiple Kubernetes Ingress NGINX Controller Vulnerabilities in Insights Hub Private Cloud | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-686975 | SSA-686975: IPU 2022.3 Vulnerabilities in Siemens Industrial Products using Intel CPUs | 2023-02-14T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-672923 | SSA-672923: Out of Bounds Write Vulnerability in Solid Edge | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-525431 | SSA-525431: Privilege Escalation Vulnerabilities in Siemens License Server Before V4.3 | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-369369 | SSA-369369: Weak Registry Permission Vulnerability in SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor | 2025-02-11T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-306654 | SSA-306654: Insyde BIOS Vulnerabilities in Siemens Industrial Products | 2022-02-22T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-277137 | SSA-277137: Multiple Vulnerabilities in SIDIS Prime Before V4.0.700 | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-195895 | SSA-195895: User Enumeration Vulnerability in the Webserver of SIMATIC Products | 2025-02-11T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-187636 | SSA-187636: Multiple Vulnerabilities in SENTRON 7KT PAC1260 Data Manager | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-920092 | SSA-920092: Memory Corruption Vulnerability in Simcenter Femap | 2025-03-13T00:00:00Z | 2025-03-13T00:00:00Z |
| ssa-787280 | SSA-787280: Unlocked Bootloader Vulnerability in SINAMICS S200 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-620288 | SSA-620288: Multiple Vulnerabilities (NUCLEUS:13) in Capital Embedded AR Classic | 2021-12-14T00:00:00Z | 2025-03-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1216-1 | Security update for openssl-1_1 | 2026-04-08T12:28:22Z | 2026-04-08T12:28:22Z |
| suse-su-2026:1215-1 | Security update for openssl-3 | 2026-04-08T12:27:58Z | 2026-04-08T12:27:58Z |
| suse-su-2026:1214-1 | Security update for openssl-3 | 2026-04-08T12:27:45Z | 2026-04-08T12:27:45Z |
| suse-su-2026:1213-1 | Security update for openssl-3 | 2026-04-08T12:27:10Z | 2026-04-08T12:27:10Z |
| suse-su-2026:1051-1 | Security update for vim | 2026-04-08T11:40:57Z | 2026-04-08T11:40:57Z |
| suse-su-2026:1212-1 | Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | 2026-04-08T10:04:46Z | 2026-04-08T10:04:46Z |
| suse-su-2026:1209-1 | Security update for bind | 2026-04-08T07:12:41Z | 2026-04-08T07:12:41Z |
| suse-su-2026:1208-1 | Security update for ignition | 2026-04-08T07:12:23Z | 2026-04-08T07:12:23Z |
| suse-su-2026:21062-1 | Security update for expat | 2026-04-07T18:52:31Z | 2026-04-07T18:52:31Z |
| suse-su-2026:21003-1 | Security update for systemd | 2026-04-07T15:06:51Z | 2026-04-07T15:06:51Z |
| suse-su-2026:21002-1 | Security update for tar | 2026-04-07T14:59:15Z | 2026-04-07T14:59:15Z |
| suse-su-2026:1095-1 | Security update for vim | 2026-04-07T14:35:54Z | 2026-04-07T14:35:54Z |
| suse-su-2026:0910-1 | Security update for vim | 2026-04-07T14:35:08Z | 2026-04-07T14:35:08Z |
| suse-su-2026:21001-1 | Security update for libtasn1 | 2026-04-07T14:32:32Z | 2026-04-07T14:32:32Z |
| suse-su-2026:1206-1 | Security update for python | 2026-04-07T14:18:48Z | 2026-04-07T14:18:48Z |
| suse-su-2026:1203-1 | Security update for ImageMagick | 2026-04-07T12:24:55Z | 2026-04-07T12:24:55Z |
| suse-su-2026:1202-1 | Security update for ImageMagick | 2026-04-07T12:24:42Z | 2026-04-07T12:24:42Z |
| suse-su-2026:1201-1 | Security update for ImageMagick | 2026-04-07T12:24:24Z | 2026-04-07T12:24:24Z |
| suse-su-2026:21000-1 | Security update for libpng16 | 2026-04-07T11:57:32Z | 2026-04-07T11:57:32Z |
| suse-su-2026:1200-1 | Security update for ignition | 2026-04-07T11:50:19Z | 2026-04-07T11:50:19Z |
| suse-su-2026:20969-1 | Security update for polkit | 2026-04-07T11:50:03Z | 2026-04-07T11:50:03Z |
| suse-su-2026:21032-1 | Security update for polkit | 2026-04-07T11:36:08Z | 2026-04-07T11:36:08Z |
| suse-su-2026:21031-1 | Security update for expat | 2026-04-07T11:09:30Z | 2026-04-07T11:09:30Z |
| suse-su-2026:1199-1 | Security update for python-PyJWT | 2026-04-07T10:25:37Z | 2026-04-07T10:25:37Z |
| suse-su-2026:1198-1 | Security update for ignition | 2026-04-07T10:25:22Z | 2026-04-07T10:25:22Z |
| suse-su-2026:1197-1 | Security update for ignition | 2026-04-07T10:25:02Z | 2026-04-07T10:25:02Z |
| suse-su-2026:1195-1 | Security update for google-cloud-sap-agent | 2026-04-07T09:25:22Z | 2026-04-07T09:25:22Z |
| suse-su-2026:1194-1 | Security update for google-cloud-sap-agent | 2026-04-07T09:25:07Z | 2026-04-07T09:25:07Z |
| suse-su-2026:1193-1 | Security update for gimp | 2026-04-07T08:40:15Z | 2026-04-07T08:40:15Z |
| suse-su-2026:1192-1 | Security update for python-pyOpenSSL | 2026-04-07T08:39:34Z | 2026-04-07T08:39:34Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:2719 | Important: gnupg2 security update | 2026-02-16T00:00:00Z | 2026-02-18T13:46:37Z |
| alsa-2026:2786 | Moderate: glibc security update | 2026-02-17T00:00:00Z | 2026-02-18T13:44:36Z |
| alsa-2026:2799 | Moderate: php security update | 2026-02-17T00:00:00Z | 2026-02-18T13:30:42Z |
| alsa-2026:2821 | Moderate: kernel-rt security update | 2026-02-17T00:00:00Z | 2026-02-18T13:25:58Z |
| alsa-2026:2707 | Important: gimp security update | 2026-02-16T00:00:00Z | 2026-02-17T10:29:58Z |
| alsa-2026:2709 | Important: golang security update | 2026-02-16T00:00:00Z | 2026-02-17T10:27:57Z |
| alsa-2026:2708 | Important: go-toolset:rhel8 security update | 2026-02-16T00:00:00Z | 2026-02-16T14:22:53Z |
| alsa-2026:2421 | Important: nodejs:22 security update | 2026-02-10T00:00:00Z | 2026-02-13T10:53:31Z |
| alsa-2026:2627 | Moderate: gcc-toolset-14-binutils security update | 2026-02-12T00:00:00Z | 2026-02-13T08:03:55Z |
| alsa-2026:0667 | Important: firefox security update | 2026-01-15T00:00:00Z | 2026-02-12T10:37:47Z |
| alsa-2026:1377 | Moderate: image-builder security update | 2026-01-27T00:00:00Z | 2026-02-12T10:36:07Z |
| alsa-2026:2212 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-12T10:34:27Z |
| alsa-2026:2282 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-12T10:29:43Z |
| alsa-2026:2420 | Important: nodejs:24 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:19:24Z |
| alsa-2026:2422 | Important: nodejs:20 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:15:50Z |
| alsa-2026:2438 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:14:13Z |
| alsa-2026:2452 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:12:36Z |
| alsa-2026:2470 | Moderate: php:7.4 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:10:23Z |
| alsa-2026:2419 | Moderate: python3.12 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:30:15Z |
| alsa-2026:2410 | Important: libsoup3 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:26:55Z |
| alsa-2026:2224 | Critical: keylime security update | 2026-02-09T00:00:00Z | 2026-02-11T15:22:49Z |
| alsa-2026:2389 | Important: brotli security update | 2026-02-10T00:00:00Z | 2026-02-11T11:06:48Z |
| alsa-2026:2323 | Important: git-lfs security update | 2026-02-09T00:00:00Z | 2026-02-11T11:02:49Z |
| alsa-2026:2216 | Important: libsoup security update | 2026-02-09T00:00:00Z | 2026-02-10T10:37:43Z |
| alsa-2026:2222 | Important: freerdp security update | 2026-02-09T00:00:00Z | 2026-02-10T10:08:14Z |
| alsa-2026:2225 | Critical: keylime security update | 2026-02-09T00:00:00Z | 2026-02-10T10:06:14Z |
| alsa-2026:2230 | Important: fontforge security update | 2026-02-09T00:00:00Z | 2026-02-10T10:04:33Z |
| alsa-2026:2378 | Moderate: kernel-rt security update | 2026-02-10T00:00:00Z | 2026-02-10T09:34:16Z |
| alsa-2026:1852 | Moderate: util-linux security update | 2026-02-03T00:00:00Z | 2026-02-10T08:33:43Z |
| alsa-2026:1903 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:31:08Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-136 | Memcpy-param-overlap in grk::memStreamRead | 2026-01-25T00:10:48.352834Z | 2026-01-25T00:10:48.353140Z |
| osv-2026-121 | Use-of-uninitialized-value in trySubset | 2026-01-24T00:15:22.824642Z | 2026-01-24T14:24:01.498986Z |
| osv-2026-122 | Use-of-uninitialized-value in rtcm2_unpack | 2026-01-24T00:18:15.169881Z | 2026-01-24T00:18:15.170285Z |
| osv-2026-119 | Segv on unknown address in gpsd_poll | 2026-01-23T00:09:08.434854Z | 2026-01-23T00:09:08.435286Z |
| osv-2026-112 | Use-of-uninitialized-value in PrintSERPacket | 2026-01-23T00:01:50.403598Z | 2026-01-23T00:01:50.404362Z |
| osv-2026-105 | Use-of-uninitialized-value in pcpp::SSLServerHelloMessage::ServerHelloTLSFingerprint::toString | 2026-01-22T00:08:03.696405Z | 2026-01-22T00:08:03.696709Z |
| osv-2025-1061 | Security exception in org.apache.poi.hssf.record.aggregates.SharedValueManager$SharedFormulaGroup.<ini | 2026-01-18T00:03:40.245475Z | 2026-01-21T14:26:21.135983Z |
| osv-2026-98 | Heap-buffer-overflow in hostname_issubdomain | 2026-01-21T00:16:59.551255Z | 2026-01-21T00:16:59.551548Z |
| osv-2026-87 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-01-18T00:18:36.932063Z | 2026-01-20T14:24:38.539978Z |
| osv-2026-91 | Use-after-poison in compress.cc | 2026-01-20T00:09:07.159786Z | 2026-01-20T00:09:07.160128Z |
| osv-2026-86 | Security exception in java.base/java.util.Arrays.copyOfRange | 2026-01-18T00:18:18.214799Z | 2026-01-18T00:18:18.215108Z |
| osv-2026-74 | Heap-buffer-overflow in ___interceptor_strtol | 2026-01-17T00:19:48.575833Z | 2026-01-17T00:19:48.576151Z |
| osv-2023-1129 | UNKNOWN READ in HeifPixelImage::overlay | 2023-11-09T13:00:44.441721Z | 2026-01-16T14:20:00.488466Z |
| osv-2020-2308 | Heap-buffer-overflow in derive_collocated_motion_vectors | 2021-02-10T00:00:17.357392Z | 2026-01-16T14:15:52.974687Z |
| osv-2026-57 | Heap-buffer-overflow in mkv::matroska_segment_c::TrackInit | 2026-01-15T00:19:47.203374Z | 2026-01-15T00:19:47.203695Z |
| osv-2026-55 | Use-of-uninitialized-value in vp9_quantize_fp_avx2 | 2026-01-15T00:19:29.465463Z | 2026-01-15T00:19:29.465794Z |
| osv-2026-54 | Heap-use-after-free in _dwarf_exec_frame_instr | 2026-01-15T00:17:17.477757Z | 2026-01-15T00:17:17.478056Z |
| osv-2026-53 | Heap-use-after-free in graph::LigatureSubstFormat1::shrink | 2026-01-15T00:16:26.117926Z | 2026-01-15T00:16:26.118291Z |
| osv-2026-49 | Heap-buffer-overflow in check_sync_pes | 2026-01-15T00:11:33.030721Z | 2026-01-15T00:11:33.030957Z |
| osv-2026-44 | UNKNOWN READ in MP4_TrackSeek | 2026-01-14T00:20:29.876694Z | 2026-01-14T00:20:29.877019Z |
| osv-2024-195 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-03-24T00:14:24.746452Z | 2026-01-13T14:21:46.144635Z |
| osv-2024-662 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-07-18T00:06:40.832938Z | 2026-01-13T04:48:14.077313Z |
| osv-2020-786 | UNKNOWN READ in H5T__bit_find | 2020-07-14T05:37:33.311187Z | 2026-01-13T04:47:48.710766Z |
| osv-2024-85 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-02-08T00:13:58.690460Z | 2026-01-13T04:47:29.127821Z |
| osv-2024-680 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2024-07-26T00:06:29.761307Z | 2026-01-13T04:46:21.094915Z |
| osv-2024-675 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-07-24T00:07:37.523933Z | 2026-01-13T04:45:52.716176Z |
| osv-2024-248 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-04-10T00:06:40.907073Z | 2026-01-13T04:44:52.454141Z |
| osv-2024-239 | Use-of-uninitialized-value in H5G__ent_to_link | 2024-04-06T00:11:00.845086Z | 2026-01-13T04:44:11.568412Z |
| osv-2024-223 | UNKNOWN READ in H5HG_read | 2024-04-01T00:01:29.989664Z | 2026-01-13T04:44:02.988515Z |
| osv-2023-1256 | Heap-buffer-overflow in H5T__bit_copy | 2023-12-03T13:02:43.376076Z | 2026-01-13T04:40:40.198673Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0128 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0127 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0125 | Resource Exhaustion (Memory and Handle Leaks) on Windows and macOS | 2025-11-22T12:00:00Z | 2025-11-22T12:29:36Z |
| rustsec-2025-0124 | rand_os crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-19T20:48:42Z |
| rustsec-2025-0123 | opentelemetry-jaeger crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T12:07:07Z |
| rustsec-2025-0122 | cargo-asm crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T09:02:31Z |
| rustsec-2025-0121 | gcc crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:52:10Z |
| rustsec-2025-0119 | number_prefix crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:13:56Z |
| rustsec-2025-0118 | Unsound API access to a WebAssembly shared linear memory | 2025-11-11T12:00:00Z | 2025-11-13T16:55:40Z |
| rustsec-2025-0117 | tandem is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0116 | tandem_garble_interop is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0115 | tandem_http_server is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0114 | tandem_http_client is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0113 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-11-04T06:10:22Z |
| rustsec-2025-0109 | Out-of-bounds memory access in binary_read_to_ref and binary_write_from_ref | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0108 | Uninitialized memory exposure in string reading functions | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0107 | Uninitialized memory exposure in any_as_u8_slice | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0106 | Undefined behavior in index_of_ptr with empty slices | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0105 | Uninitialized memory exposure in create_ring_buffer | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0072 | soundness issue and unmaintained | 2025-10-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0071 | Incorrect handling of embedded SVG and MathML leads to mutation XSS after removal | 2025-09-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0068 | serde_yml crate is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0067 | `libyml::string::yaml_string_extend` is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0063 | Possible unsound public API | 2025-04-25T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0062 | Heap Buffer Overflow in the DrainCol Destructor | 2025-05-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0054 | ArrayQueue::push_front is not panic-safe | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0053 | Multiple memory corruption vulnerabilities in safe APIs | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0051 | `xcb::Connection::connect_to_fd*` functions violate I/O safety | 2025-08-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0050 | IdMap::from_iter may lead to uninitialized memory being freed on drop | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0049 | User-defined implementations of the safe trait scratchpad::Tracking can cause heap buffer overflows | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-parse-2026-33323 | Parse Server: Email verification resend page leaks user existence | 2026-03-27T07:14:20.379Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-32647 | NGINX ngx_http_mp4_module vulnerability | 2026-03-27T07:10:16.616Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-28755 | NGINX ngx_stream_ssl_module vulnerability | 2026-03-27T07:10:13.976Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-28753 | NGINX ngx_mail_proxy_module vulnerability | 2026-03-27T07:10:10.953Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-27784 | NGINX ngx_http_mp4_module vulnerability | 2026-03-27T07:10:08.052Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-27654 | NGINX ngx_http_dav_module vulnerability | 2026-03-27T07:10:05.293Z | 2026-03-27T07:40:55.991Z |
| bit-nginx-2026-27651 | NGINX ngx_mail_auth_http_module vulnerability | 2026-03-27T07:10:02.387Z | 2026-03-27T07:40:55.991Z |
| bit-minio-2026-33419 | MinIO: LDAP login brute-force via user enumeration and missing rate limit | 2026-03-27T07:08:02.540Z | 2026-03-27T07:40:55.991Z |
| bit-minio-2026-33322 | MinIO: JWT Algorithm Confusion in OIDC Authentication | 2026-03-27T07:07:59.802Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33428 | Discourse Allows Unauthorized Access to Deleted Posts Index via Group Membership | 2026-03-27T07:11:24.928Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33427 | Discourse Authorization Page Displays Unvalidated Redirect Domain | 2026-03-27T07:11:21.636Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33426 | Discourse users can edit or synonymize hidden tags they can't see | 2026-03-27T07:11:18.684Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33425 | Discourse has inferable private group membership or existence via exclude_groups parameter | 2026-03-27T07:11:15.979Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33424 | PM access granted through invites after access revocation | 2026-03-27T07:11:13.161Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33423 | Discourse staff can modify any user's group notification level | 2026-03-27T07:11:10.696Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33422 | Discourse exposes ip_address of flagged user | 2026-03-27T07:11:08.096Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33411 | Discourse's solved topic stream has potential stored XSS in topic title | 2026-03-27T07:11:05.061Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33410 | Discourse hardens chat DM channel creation and expansion | 2026-03-27T07:11:02.112Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33408 | Discourse has Improper Authorization in "Post Edits" Report For Moderators | 2026-03-27T07:10:59.380Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33395 | Discourse has stored click‑based XSS via Graphviz SVG javascript: links | 2026-03-27T07:10:56.479Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33394 | Discourse leaks PM post edits to moderators | 2026-03-27T07:10:53.768Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33393 | Discourse fixes loose hostname matching in spam host allowlist | 2026-03-27T07:10:50.748Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33355 | Discourse filters whisper posts from private-posts feed | 2026-03-27T07:10:48.005Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33291 | Discourse user can create Zendesk tickets even when it does not have access to topic | 2026-03-27T07:10:45.396Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-33251 | Discourse has a Hidden Solved topics permission bypass | 2026-03-27T07:10:42.800Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-32114 | Discourse's unscoped status lookups leak restricted metadata | 2026-03-27T07:10:39.880Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-32099 | Discourse prevents hidden profile data leak via user onebox | 2026-03-27T07:10:36.934Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-31869 | Discourse: Composer mentions endpoint leaks hidden group membership through PM `allowed_names` check | 2026-03-27T07:10:33.910Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-31805 | Discourse has a poll authorization bypass via post_id array parameter | 2026-03-27T07:10:31.444Z | 2026-03-27T07:40:55.991Z |
| bit-discourse-2026-30891 | Discourse hasUnauthorized Exposure of Private User Action Types | 2026-03-27T07:10:28.864Z | 2026-03-27T07:40:55.991Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-dv49099 | Security fixes for CVE-2025-64756, CVE-2025-69873, CVE-2026-1525, CVE-2026-1526, CVE-2026-1527, CVE-2026-1528, CVE-2026-2229, CVE-2026-2327, CVE-2026-23745, CVE-2026-2391, CVE-2026-24842, CVE-2026-25128, CVE-2026-25547, CVE-2026-2581, CVE-2026-25896, CVE-2026-26278, CVE-2026-26960, CVE-2026-27601, CVE-2026-27903, CVE-2026-27904, CVE-2026-27942, CVE-2026-28292, CVE-2026-29786, CVE-2026-31802, CVE-2026-32141, CVE-2026-33036, ghsa-23c5-xmqv-rm74, ghsa-25h7-pfq9-p65f, ghsa-2g4f-4pwh-qvx6, ghsa-2mjp-6q6p-2qxm, ghsa-34x7-hfp2-rc4v, ghsa-37qj-frw5-hhjh, ghsa-38c4-r59v-3vqw, ghsa-3ppc-4f35-3m26, ghsa-4992-7rv2-5pvq, ghsa-5j98-mcp5-4vw2, ghsa-73rr-hh4g-fpgx, ghsa-7h2j-956f-4vf2, ghsa-7r86-cg39-jmmj, ghsa-83g3-92jg-28cx, ghsa-8gc5-j5rx-235r, ghsa-8qq5-rm4j-mr97, ghsa-8wc6-vgrq-x6cf, ghsa-9ppj-qmqm-q256, ghsa-f269-vfmq-vjvj, ghsa-fj3w-jwp8-x2g3, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-phc3-fgpg-7m6h, ghsa-qffp-2rhf-9h96, ghsa-qpx9-hpmf-5gmw, ghsa-r275-fr43-pm7q, ghsa-r6q2-hw4h-h46w, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w7fw-mjwx-w883 applied in versions: 43.4.4-r0 | 2026-04-01T09:31:16.419730Z | 2026-03-23T10:49:42Z |
| cleanstart-2026-gy92571 | Security fixes for ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T09:28:54.070298Z | 2026-03-23T10:27:15Z |
| cleanstart-2026-ez47382 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23991, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2x5j-vhc8-9cwm, ghsa-59jp-pj84-45mr, ghsa-6m8w-jc87-6cr7, ghsa-jqc5-w2xx-5vq4, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-vvgc-356p-c3xw applied in versions: 1.14.4-r1, 1.14.4-r2, 1.16.3-r3, 1.16.3-r4 | 2026-04-01T09:28:49.379705Z | 2026-03-23T08:59:19Z |
| cleanstart-2026-ds86833 | Security fixes for CVE-2025-11143, CVE-2026-1605, ghsa-72hv-8253-57qq, ghsa-cphf-4846-3xx9 applied in versions: 0.50.0-r0, 0.50.1-r0 | 2026-04-01T09:28:26.952828Z | 2026-03-23T08:16:08Z |
| cleanstart-2026-gm79879 | Security fixes for CVE-2025-11143, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.49.1-r0 | 2026-04-01T09:28:51.825289Z | 2026-03-23T08:12:03Z |
| cleanstart-2026-dc73689 | Security fixes for CVE-2025-11143, CVE-2025-67735, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.48.0-r1 | 2026-04-01T09:29:13.129218Z | 2026-03-23T08:05:00Z |
| cleanstart-2026-ia43044 | Security fixes for CVE-2020-8908, CVE-2022-42889, CVE-2023-2976, CVE-2024-25710, CVE-2024-26308, CVE-2024-29371, CVE-2024-29857, CVE-2024-30171, CVE-2024-31573, CVE-2024-47554, CVE-2025-11143, CVE-2025-12383, CVE-2025-48734, CVE-2025-48924, CVE-2025-58057, CVE-2025-67735, CVE-2025-68161, CVE-2025-8916, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.47.0-r2, 0.47.0-r3 | 2026-04-01T09:30:15.088429Z | 2026-03-23T07:56:09Z |
| cleanstart-2026-pi36812 | Security fixes for CVE-2026-33186, ghsa-6v2p-p943-phr9, ghsa-c6gw-w398-hv78, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-p754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-qxp5-gw88-xv66, ghsa-v778-237x-gjrc, ghsa-vvgc-356p-c3xw applied in versions: 1.15.0-r1, 1.19.0-r0 | 2026-04-01T09:29:23.569974Z | 2026-03-23T07:52:18Z |
| cleanstart-2026-as59691 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-31837, CVE-2026-31838, ghsa-9h8m-3fm2-qjrq applied in versions: 1.28.3-r0 | 2026-04-01T09:29:30.943219Z | 2026-03-23T07:49:41Z |
| cleanstart-2026-fr61696 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.17.0-r0 | 2026-04-01T09:29:33.599999Z | 2026-03-23T07:49:32Z |
| cleanstart-2026-pw47027 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.29.0-r0 | 2026-04-01T09:30:02.510665Z | 2026-03-23T07:47:56Z |
| cleanstart-2026-jw59894 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.28.4-r0 | 2026-04-01T09:30:04.839715Z | 2026-03-23T07:47:23Z |
| cleanstart-2026-ld14062 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.27.4-r0, 1.27.4-r1, 1.27.7-r0 | 2026-04-01T09:30:12.003312Z | 2026-03-23T07:46:39Z |
| cleanstart-2026-gm81143 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-8r3f-844c-mc37 applied in versions: 1.7.0-r0, 1.7.0-r1 | 2026-04-01T09:30:33.612618Z | 2026-03-23T07:45:53Z |
| cleanstart-2026-qv50101 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-8r3f-844c-mc37 applied in versions: 1.6.0-r0 | 2026-04-01T09:30:36.985458Z | 2026-03-23T07:45:33Z |
| cleanstart-2026-nc32267 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.24.4-r0, 1.28.1-r0, 1.28.1-r1 | 2026-04-01T09:31:06.582607Z | 2026-03-23T07:39:20Z |
| cleanstart-2026-li47669 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.26.2-r0, 1.26.3-r0, 1.26.3-r1 | 2026-04-01T09:31:09.448053Z | 2026-03-23T07:38:42Z |
| cleanstart-2026-pv93827 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.25.4-r0, 1.25.4-r1, 1.25.4-r2 | 2026-04-01T09:31:37.416388Z | 2026-03-23T07:38:20Z |
| cleanstart-2026-fn44356 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10-r0, 0.11-r0, 0.9-r0, 0.9-r1, 0.9-r2 | 2026-04-01T09:31:56.126620Z | 2026-03-23T07:36:06Z |
| cleanstart-2026-cl65461 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10-r0, 0.11-r0, 0.8-r0, 0.8-r1, 0.8-r2, 0.9-r0 | 2026-04-01T09:31:56.332937Z | 2026-03-23T07:35:18Z |
| cleanstart-2026-nv78596 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-4f99-4q7p-p3gh applied in versions: 0.10-r0, 0.11-r0, 0.11-r2, 0.11-r3, 0.11-r4 | 2026-04-01T09:32:41.363681Z | 2026-03-23T07:34:57Z |
| cleanstart-2026-on62368 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10.0-r0, 0.10.0-r1, 0.11.0-r0, 1.13.1-r0 | 2026-04-01T09:32:49.419019Z | 2026-03-23T07:09:26Z |
| cleanstart-2026-gi67088 | Security fixes for CVE-2020-8559, CVE-2020-8565, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-33c5-9fx5-fvjm, ghsa-8cfg-vx93-jvxw applied in versions: 2.12.0-r0, 2.12.0-r1 | 2026-04-01T09:33:02.208236Z | 2026-03-23T07:05:35Z |
| cleanstart-2026-jm96857 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.16.4-r0, 2.16.4-r1 | 2026-04-01T09:32:39.352692Z | 2026-03-23T07:04:06Z |
| cleanstart-2026-ps51260 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.2.2-r0, 1.2.2-r1 | 2026-04-01T09:33:07.208099Z | 2026-03-23T07:02:53Z |
| cleanstart-2026-qj92322 | Security fixes for CVE-2025-15558, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.0.2-r0, 2.0.2-r1 | 2026-04-01T09:33:14.887013Z | 2026-03-23T06:58:42Z |
| cleanstart-2026-lp76319 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.21.2-r0, 1.21.2-r1 | 2026-04-01T09:33:36.179758Z | 2026-03-23T06:57:40Z |
| cleanstart-2026-gq14179 | Security fixes for CVE-2025-11143, CVE-2025-53864, CVE-2025-55163, CVE-2025-58056, CVE-2025-58057, CVE-2025-67735, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.46.1-r3, 0.46.1-r4 | 2026-04-01T09:33:44.585498Z | 2026-03-23T06:45:45Z |
| cleanstart-2026-nv36169 | Security fixes for CVE-2025-61732, CVE-2025-66564, CVE-2025-68121, CVE-2026-24686, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-fcv2-xgw5-pqxf applied in versions: 0.7.29-r1, 0.7.29-r2 | 2026-04-01T09:33:48.680625Z | 2026-03-23T06:33:00Z |
| cleanstart-2026-bc17682 | Security fixes for CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142 applied in versions: 2.4.4-r0, 2.4.4-r1 | 2026-04-01T09:33:57.594313Z | 2026-03-23T06:28:34Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2020-ALE-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| certfr-2020-ale-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| CERTFR-2020-ALE-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| CERTFR-2020-ALE-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| CERTFR-2020-ALE-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| certfr-2020-ale-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| CERTFR-2020-ALE-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| certfr-2020-ale-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| CERTFR-2020-ALE-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| CERTFR-2020-ALE-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-005 | Multiples vulnérabilités dans le serveur de passerelle RDP de Windows | 2020-01-14T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| CERTFR-2020-ALE-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0276 | Multiples vulnérabilités dans GitLab | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0275 | Vulnérabilité dans GLPI | 2026-03-12T00:00:00.000000 | 2026-03-12T00:00:00.000000 |
| certfr-2026-avi-0274 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0273 | Multiples vulnérabilités dans Microsoft Azure | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0272 | Multiples vulnérabilités dans Microsoft .Net | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0271 | Multiples vulnérabilités dans Microsoft Windows | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0270 | Multiples vulnérabilités dans Microsoft Office | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0269 | Multiples vulnérabilités dans Curl | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0268 | Multiples vulnérabilités dans Traefik | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0267 | Multiples vulnérabilités dans Mozilla Firefox | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0266 | Multiples vulnérabilités dans VMware Tanzu | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0265 | Multiples vulnérabilités dans les produits Fortinet | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0264 | Multiples vulnérabilités dans les produits Adobe | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0263 | Vulnérabilité dans Ivanti Desktop and Server Management (DSM) | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0262 | Multiples vulnérabilités dans HPE Aruba Networking AOS-CX | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0261 | Multiples vulnérabilités dans les produits Intel | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0260 | Multiples vulnérabilités dans WordPress | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0259 | Multiples vulnérabilités dans Stormshield Network Security | 2026-03-11T00:00:00.000000 | 2026-03-11T00:00:00.000000 |
| certfr-2026-avi-0258 | Vulnérabilité dans Microsoft CBL-Mariner | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0257 | Vulnérabilité dans Mozilla Focus | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0256 | Multiples vulnérabilités dans les produits SAP | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0255 | Multiples vulnérabilités dans les produits Siemens | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0254 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-03-10T00:00:00.000000 | 2026-03-10T00:00:00.000000 |
| certfr-2026-avi-0253 | Multiples vulnérabilités dans Microsoft Edge | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0252 | Multiples vulnérabilités dans les produits Moxa | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0251 | Multiples vulnérabilités dans Apache Zookeeper | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0250 | Vulnérabilité dans Apereo CAS | 2026-03-09T00:00:00.000000 | 2026-03-09T00:00:00.000000 |
| certfr-2026-avi-0249 | Multiples vulnérabilités dans les produits IBM | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0248 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0247 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-010972 | Multiple SEIKO EPSON products use weak initial passwords | 2025-08-08T14:50+09:00 | 2025-08-08T14:50+09:00 |
| jvndb-2025-000057 | Multiple vulnerabilities in Mubit Powered BLUE 870 | 2025-08-08T14:47+09:00 | 2025-08-08T14:47+09:00 |
| jvndb-2025-000056 | Multiple vulnerabilities in Sato label printers CL4/6NX Plus and CL4/6NX-J Plus series | 2025-08-06T16:38+09:00 | 2025-08-06T16:38+09:00 |
| jvndb-2025-010603 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation MFPs | 2025-08-05T11:29+09:00 | 2025-08-05T11:29+09:00 |
| jvndb-2025-010408 | Multiple vulnerabilities in PowerCMS | 2025-08-01T12:05+09:00 | 2025-08-01T12:05+09:00 |
| jvndb-2025-000055 | ZXHN-F660T and ZXHN-F660A use a common credential for all installations | 2025-07-31T15:12+09:00 | 2025-07-31T15:12+09:00 |
| jvndb-2025-000054 | Apache Jena Fuseki vulnerable to path traversal | 2025-07-30T14:17+09:00 | 2025-07-30T14:17+09:00 |
| jvndb-2025-000053 | "SwitchBot" App vulnerable to insertion of sensitive information into log file | 2025-07-29T13:44+09:00 | 2025-07-29T13:44+09:00 |
| jvndb-2025-010056 | TP-Link VIGI NVR1104H-4P and VIGI NVR2016H-16MP vulnerable to OS command injection | 2025-07-28T17:53+09:00 | 2025-07-28T17:53+09:00 |
| jvndb-2025-000052 | TP-Link Archer C1200 vulnerable to clickjacking | 2025-07-24T14:16+09:00 | 2025-07-24T14:16+09:00 |
| jvndb-2025-000051 | Real-time Bus Tracking System vulnerable to improper validation of specified quantity in input | 2025-07-23T13:54+09:00 | 2025-07-23T13:54+09:00 |
| jvndb-2025-009576 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-07-23T11:13+09:00 | 2025-07-23T11:13+09:00 |
| jvndb-2025-000050 | "region PAY" App for Android vulnerable to insertion of sensitive information into log file | 2025-07-22T13:33+09:00 | 2025-07-22T13:33+09:00 |
| jvndb-2025-009150 | Security updates for Trend Micro products (June 2025) | 2025-07-17T17:03+09:00 | 2025-07-17T17:03+09:00 |
| jvndb-2025-000030 | Reflected cross-site scripting vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2025-05-12T18:00+09:00 | 2025-07-17T10:06+09:00 |
| jvndb-2025-000049 | ZWX-2000CSW2-HN and ZWX-2000CS2-HN vulnerable to use of hard-coded credentials | 2025-07-16T13:54+09:00 | 2025-07-16T13:54+09:00 |
| jvndb-2025-008881 | Least Privilege Violation Vulnerability in the communications functions of NJ/NX series Machine Automation Controllers | 2025-07-15T15:54+09:00 | 2025-07-15T15:54+09:00 |
| jvndb-2025-008783 | Firebox T15 contains an issue with hidden functionality | 2025-07-14T17:22+09:00 | 2025-07-14T17:22+09:00 |
| jvndb-2025-008145 | Epson Web Installer for Mac vulnerable to missing authentication for critical function | 2025-07-08T14:08+09:00 | 2025-07-08T14:08+09:00 |
| jvndb-2025-008106 | Heap-based buffer overflow vulnerability in V-SFT and TELLUS | 2025-07-07T16:26+09:00 | 2025-07-07T16:26+09:00 |
| jvndb-2025-008105 | Windows shortcut following (.LNK) vulnerability in Trend Micro Security for Windows (CVE-2025-52521) | 2025-07-07T16:04+09:00 | 2025-07-07T16:04+09:00 |
| jvndb-2025-000047 | Multiple vulnerabilities in Nimesa Backup and Recovery | 2025-07-07T15:26+09:00 | 2025-07-07T15:26+09:00 |
| jvndb-2025-007978 | Multiple vulnerabilities in Trend Micro Password Manager for Windows (CVE-2025-48443, CVE-2025-52837) | 2025-07-04T13:28+09:00 | 2025-07-04T13:28+09:00 |
| jvndb-2025-000045 | Multiple vulnerabilities in Active! mail | 2025-07-02T14:13+09:00 | 2025-07-02T14:13+09:00 |
| jvndb-2025-007754 | Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) | 2025-07-02T11:31+09:00 | 2025-07-02T11:31+09:00 |
| jvndb-2025-007607 | Pass-Back Attack vulnerability in Konica Minorta bizhub series | 2025-07-01T14:09+09:00 | 2025-07-01T14:09+09:00 |
| jvndb-2025-007595 | Multiple vulnerabilities in Web Connection of Konica Minolta MFPs | 2025-07-01T14:02+09:00 | 2025-07-01T14:02+09:00 |
| jvndb-2025-000046 | SLNX Help Documentation of RICOH Streamline NX vulnerable to reflected cross-site scripting | 2025-06-30T15:45+09:00 | 2025-06-30T15:45+09:00 |
| jvndb-2025-007552 | Multiple vulnerabilities in TB-eye network recorders and AHD recorders | 2025-06-30T14:45+09:00 | 2025-06-30T14:45+09:00 |
| jvndb-2024-004595 | Multiple vulnerabilities in FutureNet NXR series, VXR series and WXR series | 2024-07-29T17:51+09:00 | 2025-06-30T09:56+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14835 | OpenClaw授权绕过漏洞(CNVD-2026-14835) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14834 | OpenClaw存在未明漏洞(CNVD-2026-14834) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14833 | OpenClaw身份验证绕过漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14832 | OpenClaw存在未明漏洞(CNVD-2026-14832) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14831 | OpenClaw授权绕过漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14830 | OpenClaw存在未明漏洞(CNVD-2026-14830) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14829 | OpenClaw存在未明漏洞(CNVD-2026-14829) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14828 | OpenClaw存在未明漏洞(CNVD-2026-14828) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14827 | OpenClaw数据伪造问题漏洞(CNVD-2026-14827) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14826 | OpenClaw信息泄露漏洞(CNVD-2026-14826) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14825 | OpenClaw拒绝服务漏洞(CNVD-2026-14825) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-15249 | TOTOLINK WA300操作系统命令注入漏洞 | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14687 | Belkin F9K1015命令注入漏洞 | 2025-10-13 | 2026-03-24 |
| cnvd-2026-14686 | Belkin F9K1122堆栈缓冲区溢出漏洞(CNVD-2026-14686) | 2026-03-19 | 2026-03-24 |
| cnvd-2026-14685 | TRENDnet TEW-822DRE权限提升漏洞 | 2025-08-15 | 2026-03-24 |
| cnvd-2026-14684 | TRENDnet TEW-657BRM命令注入漏洞 | 2025-11-28 | 2026-03-24 |
| cnvd-2026-14683 | TRENDnet TEW-822DRE命令注入漏洞 | 2026-01-12 | 2026-03-24 |
| cnvd-2026-14682 | TRENDnet TEW-800MB命令注入漏洞 | 2026-01-12 | 2026-03-24 |
| cnvd-2026-14681 | TRENDnet TEW-713RE操作系统命令注入漏洞 | 2026-01-14 | 2026-03-24 |
| cnvd-2026-14680 | TRENDnet TEW-632BRP缓冲区溢出漏洞 | 2026-03-19 | 2026-03-24 |
| cnvd-2026-14679 | IBM Db2拒绝服务漏洞(CNVD-2026-14679) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14678 | IBM Db2拒绝服务漏洞(CNVD-2026-14678) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14677 | IBM Db2存在未明漏洞(CNVD-2026-14677) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14676 | IBM Db2拒绝服务漏洞(CNVD-2026-14676) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14675 | IBM Db2拒绝服务漏洞(CNVD-2026-14675) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14674 | IBM Db2拒绝服务漏洞(CNVD-2026-14674) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14673 | IBM Db2拒绝服务漏洞(CNVD-2026-14673) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14672 | IBM Db2拒绝服务漏洞(CNVD-2026-14672) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14671 | IBM Db2拒绝服务漏洞(CNVD-2026-14671) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14670 | IBM Db2拒绝服务漏洞(CNVD-2026-14670) | 2026-02-11 | 2026-03-24 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15548 | Уязвимость компонента jfs/file.c ядра операционной системы Linux, позволяющая нарушителю … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15547 | Уязвимость компонента fs/ext4/inline.c ядра операционной системы Linux, позволяющая наруш… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15546 | Уязвимость драйвера gve ядра операционной системы Linux, позволяющая нарушителю вызвать о… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15545 | Уязвимость компонента arch/parisc/kernel/syscall.S ядра операционной системы Linux, позво… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15544 | Уязвимость компонента arch/parisc/include/asm/uaccess.h ядра операционной системы Linux, … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15543 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | 11.12.2025 | 16.02.2026 |
| bdu:2025-15289 | Уязвимость функции atmtcp_recv_control() ядра операционной системы Linux, позволяющая нар… | 08.12.2025 | 16.02.2026 |
| bdu:2025-15261 | Уязвимость компонента hid-asus.c ядра операционной системы Linux, позволяющая нарушителю … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15252 | Уязвимость функции sctp_v6_from_sk() ядра операционной системы Linux, позволяющая нарушит… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15248 | Уязвимость функции btrfs_copy_root() компонента btrfs ядра операционной системы Linux, по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15240 | Уязвимость функции blk_stack_limits() компонента block/blk-settings.c ядра операционной с… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15238 | Уязвимость библиотеки resolv языка программирования Ruby, позволяющая нарушителю вызвать … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15231 | Уязвимость функции tls_do_decryption() (net/tls/tls_sw.c) ядра операционной системы Linux… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15230 | Уязвимость функций ovl_encode_real_fh() (fs/overlayfs/copy_up.c) и show_mark_fhandle() (f… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15228 | Уязвимость системы мониторинга ИТ-инфраструктуры Zabbix, связанная с хранением пароля в н… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15227 | Уязвимость ядра операционной системы Linux, связанная с ошибками инициализации памяти, по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15226 | Уязвимость компонента drivers/soc/qcom/mdt_loader.c ядра операционной системы Linux, позв… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15225 | Уязвимость модуля vfs_streams_xattr пакета программ сетевого взаимодействия Samba, позвол… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15224 | Уязвимость функции Item_direct_view_ref::derived_field_transformer_for_where системы упра… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15223 | Уязвимость функции pci_epf_remove_cfs() компонента drivers/pci/endpoint/pci-epf-core.c яд… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15222 | Уязвимость функции JOIN::fix_all_splittings_in_plan системы управления базами данных Mari… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15221 | Уязвимость системы управления базами данных MariaDB, связанная с неправильным порядком по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15220 | Уязвимость функции jbd2_log_do_checkpoint() компонента fs/jbd2/checkpoint.c ядра операцио… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15218 | Уязвимость функции relocate_one_folio() модуля fs/btrfs/relocation.c поддержки файловой с… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15216 | Уязвимость функций EXPORT_SYMBOL(), destroy_cm_id() и cm_work_handler() ядра операционной… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15213 | Уязвимость функции usb_parse_ss_endpoint_companion() компонента drivers/usb/core/config.c… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15212 | Уязвимость компонента fs/btrfs/qgroup.c ядра операционной системы Linux, позволяющая нару… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15211 | Уязвимость компонента fs ядра операционной системы Linux, позволяющая нарушителю вызвать … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15209 | Уязвимость компонента media/usb/usbtv/usbtv-video.c ядра операционной системы Linux, позв… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15201 | Уязвимость компонента qcom/venus/core.c ядра операционной системы Linux, позволяющая нару… | 05.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201106-0026 | Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.181.22 on Wind… | 2024-07-23T22:03:48.916000Z |
| var-202005-1028 | A malicious actor who intentionally exploits this lack of effective limitation on the num… | 2024-07-23T22:03:40.061000Z |
| var-201911-1619 | Improper invalidation for page table updates by a virtual guest operating system for mult… | 2024-07-23T22:03:40.870000Z |
| var-201505-0337 | The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorit… | 2024-07-23T22:03:40.995000Z |
| var-201912-0533 | This issue was addressed with improved transparency. This issue is fixed in iOS 12.2. A u… | 2024-07-23T22:03:39.534000Z |
| var-201908-0265 | Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a … | 2024-07-23T22:03:39.695000Z |
| var-200103-0056 | Network Dynamic Data Exchange (DDE) in Windows 2000 allows local users to gain SYSTEM pri… | 2024-07-23T22:03:07.478000Z |
| var-202109-1368 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2024-07-23T22:03:02.962000Z |
| var-200609-1249 | The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not prope… | 2024-07-23T22:03:02.065000Z |
| var-201904-1344 | Multiple memory corruption issues were addressed with improved input validation. This iss… | 2024-07-23T22:03:00.873000Z |
| var-202108-2039 | A logic issue was addressed with improved state management. This issue is fixed in macOS … | 2024-07-23T22:02:34.481000Z |
| var-201006-1259 | Double free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 1… | 2024-07-23T22:02:34.562000Z |
| var-201707-0592 | Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre att… | 2024-07-23T22:02:33.954000Z |
| var-201109-0190 | Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allow… | 2024-07-23T22:02:33.523000Z |
| var-200803-0016 | CFNetwork in Apple Mac OS X 10.4.11 allows remote HTTPS proxy servers to spoof secure web… | 2024-07-23T22:01:55.420000Z |
| var-201912-1850 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:01:51.188000Z |
| var-200609-1027 | Buffer overflow in PPP on Apple Mac OS X 10.4.x up to 10.4.8 and 10.3.x up to 10.3.9, whe… | 2024-07-23T22:01:14.362000Z |
| var-201904-1408 | A memory corruption issue was addressed with improved state management. This issue affect… | 2024-07-23T22:01:11.971000Z |
| var-202201-0372 | lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. The vu… | 2024-07-23T22:01:10.106000Z |
| var-200612-0136 | Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current before 2005… | 2024-07-23T22:01:10.008000Z |
| var-201609-0593 | Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.… | 2024-07-23T22:01:08.857000Z |
| var-201304-0375 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:01:08.426000Z |
| var-201210-0270 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:01:08.344000Z |
| var-200603-0279 | Directory traversal vulnerability in the BOM framework in Mac OS X 10.x before 10.3.9 and… | 2024-07-23T22:01:08.748000Z |
| var-201904-1397 | An input validation issue was addressed with improved input validation. This issue affect… | 2024-07-23T22:01:07.123000Z |
| var-200704-0213 | load_webdav in Apple Mac OS X 10.3.9 through 10.4.9 does not properly clean the environme… | 2024-07-23T22:00:36.528000Z |
| var-201711-0480 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:59:32.421000Z |
| var-200102-0030 | The Web interface to Cisco 600 routers running CBOS 2.4.1 and earlier allow remote attack… | 2024-07-23T21:59:32.267000Z |
| var-202207-0381 | A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5… | 2024-07-23T21:59:00.866000Z |
| var-201801-1708 | The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before… | 2024-07-23T21:58:56.016000Z |