Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-35637 |
6.9 (4.0)
7.3 (3.1)
|
OpenClaw < 2026.3.22 - Premature Cite Expansion Before… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:06.620Z | 2026-04-10T17:13:18.224Z |
| CVE-2026-35645 |
6.1 (4.0)
8.1 (3.1)
|
OpenClaw < 2026.3.25 - Privilege Escalation via Synthe… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:10.890Z | 2026-04-10T17:12:00.441Z |
| CVE-2026-40151 |
5.3 (3.1)
|
PraisonAI Affected by Unauthenticated Information Disc… |
MervinPraison |
PraisonAI |
2026-04-09T21:29:47.415Z | 2026-04-10T17:10:27.256Z |
| CVE-2026-40154 |
9.3 (3.1)
|
PraisonAI Affected by Untrusted Remote Template Code E… |
MervinPraison |
PraisonAI |
2026-04-09T21:42:34.835Z | 2026-04-10T17:09:03.403Z |
| CVE-2026-5984 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DIR-605L POST Request formSetLog buffer overflow |
D-Link |
DIR-605L |
2026-04-09T22:00:17.511Z | 2026-04-10T17:08:23.078Z |
| CVE-2026-40163 |
8.2 (3.1)
|
Saltcorn has an Unauthenticated Path Traversal in sync… |
saltcorn |
saltcorn |
2026-04-10T17:07:49.067Z | 2026-04-10T17:07:49.067Z |
| CVE-2026-5989 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F451 RouteStatic fromRouteStatic stack-based overflow |
Tenda |
F451 |
2026-04-09T23:15:16.054Z | 2026-04-10T17:07:39.974Z |
| CVE-2026-5994 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Totolink A7100RU CGI cstecgi.cgi setTelnetCfg os comma… |
Totolink |
A7100RU |
2026-04-10T00:30:13.988Z | 2026-04-10T17:06:56.098Z |
| CVE-2026-3360 |
7.5 (3.1)
|
Tutor LMS <= 3.9.7 - Missing Authorization to Unauthen… |
themeum |
Tutor LMS – eLearning and online course solution |
2026-04-10T01:24:58.426Z | 2026-04-10T17:05:46.556Z |
| CVE-2026-5999 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JeecgBoot SysAnnouncementController improper authorization |
n/a |
JeecgBoot |
2026-04-10T01:45:14.036Z | 2026-04-10T17:05:03.875Z |
| CVE-2026-6006 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Patient Record Management System edit_hp… |
code-projects |
Patient Record Management System |
2026-04-10T03:00:20.534Z | 2026-04-10T17:04:11.688Z |
| CVE-2026-2305 |
6.4 (3.1)
|
AddFunc Head & Footer Code <= 2.3 - Authenticated (Con… |
addfunc |
AddFunc Head & Footer Code |
2026-04-10T03:35:35.305Z | 2026-04-10T17:03:14.663Z |
| CVE-2026-22560 |
N/A
|
An open redirect vulnerability in Rocket.Chat ver… |
Rocket.Chat |
Rocket.Chat |
2026-04-10T17:00:11.746Z | 2026-04-10T17:00:11.746Z |
| CVE-2026-35653 |
7.2 (4.0)
8.1 (3.1)
|
OpenClaw < 2026.3.24 - Incorrect Authorization in POST… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:16.391Z | 2026-04-10T16:59:30.616Z |
| CVE-2026-40160 |
7.1 (4.0)
|
PraisonAIAgents has SSRF via unvalidated URL in `web_c… |
MervinPraison |
PraisonAIAgents |
2026-04-10T16:59:09.542Z | 2026-04-10T16:59:09.542Z |
| CVE-2026-35659 |
5.1 (4.0)
4.6 (3.1)
|
OpenClaw < 2026.3.22 - Unresolved Service Metadata Rou… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:20.749Z | 2026-04-10T16:58:50.963Z |
| CVE-2026-35665 |
6.9 (4.0)
5.3 (3.1)
|
OpenClaw < 2026.3.24 - Denial of Service via Feishu We… |
OpenClaw |
OpenClaw |
2026-04-10T16:03:25.047Z | 2026-04-10T16:58:15.053Z |
| CVE-2026-40159 |
5.5 (3.1)
|
PraisonAI Exposes Sensitive Environment Variable via U… |
MervinPraison |
PraisonAI |
2026-04-10T16:57:11.623Z | 2026-04-10T16:57:11.623Z |
| CVE-2026-39528 |
5.3 (3.1)
|
WordPress WP Delicious plugin <= 1.9.5 - Broken Access… |
WP Delicious |
WP Delicious |
2026-04-08T08:30:16.548Z | 2026-04-10T16:55:44.220Z |
| CVE-2026-39543 |
5.3 (3.1)
|
WordPress Tourfic plugin <= 2.21.4 - Broken Access Con… |
Themefic |
Tourfic |
2026-04-08T08:30:17.808Z | 2026-04-10T16:54:52.936Z |
| CVE-2026-39561 |
5.3 (3.1)
|
WordPress Revive.so plugin <= 2.0.7 - Broken Access Co… |
WP Chill |
Revive.so |
2026-04-08T08:30:18.238Z | 2026-04-10T16:54:06.548Z |
| CVE-2026-39563 |
5.3 (3.1)
|
WordPress Share This Image plugin <= 2.12 - Broken Acc… |
ILLID |
Share This Image |
2026-04-08T08:30:18.659Z | 2026-04-10T16:51:23.407Z |
| CVE-2026-39565 |
4.3 (3.1)
|
WordPress WpTravelly plugin <= 2.1.7 - Broken Access C… |
magepeopleteam |
WpTravelly |
2026-04-08T08:30:19.049Z | 2026-04-10T16:49:59.918Z |
| CVE-2026-39569 |
6.5 (3.1)
|
WordPress 12 Step Meeting List plugin <= 3.19.9 - Brok… |
AA Web Servant |
12 Step Meeting List |
2026-04-08T08:30:19.885Z | 2026-04-10T16:49:03.916Z |
| CVE-2026-40157 |
9.4 (4.0)
|
PraisonAI affected by arbitrary file write via path tr… |
MervinPraison |
PraisonAI |
2026-04-10T16:47:16.109Z | 2026-04-10T16:47:16.109Z |
| CVE-2026-40156 |
7.8 (3.1)
|
PraisonAI Affected by Implicit Execution of Arbitrary … |
MervinPraison |
PraisonAI |
2026-04-10T16:46:15.807Z | 2026-04-10T16:46:15.807Z |
| CVE-2026-39592 |
4.3 (3.1)
|
WordPress DEPART plugin <= 1.0.7 - Broken Access Contr… |
Andy Ha |
DEPART |
2026-04-08T08:30:21.650Z | 2026-04-10T16:43:19.891Z |
| CVE-2026-39605 |
5.3 (3.1)
|
WordPress Super Custom Login plugin <= 1.1 - Broken Ac… |
Obadiah |
Super Custom Login |
2026-04-08T08:30:22.401Z | 2026-04-10T16:39:35.893Z |
| CVE-2026-40100 |
5.3 (3.1)
|
FastGPT has Unauthenticated SSRF in /api/core/app/mcpT… |
labring |
FastGPT |
2026-04-10T16:39:25.856Z | 2026-04-10T16:39:25.856Z |
| CVE-2026-39607 |
5.4 (3.1)
|
WordPress Filter Plus plugin <= 1.1.17 - Broken Access… |
Wpbens |
Filter Plus |
2026-04-08T08:30:22.832Z | 2026-04-10T16:36:40.080Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-33141 |
6.5 (3.1)
|
Chamilo LMS has an IDOR in REST API Stats Endpoint Exp… |
chamilo |
chamilo-lms |
2026-04-10T18:01:26.027Z | 2026-04-10T18:01:26.027Z |
| CVE-2026-32932 |
4.7 (3.1)
|
Chamilo LMS has an Open Redirect via Unvalidated 'page… |
chamilo |
chamilo-lms |
2026-04-10T17:51:58.480Z | 2026-04-10T17:51:58.480Z |
| CVE-2026-32931 |
7.5 (3.1)
|
Chamilo LMS has Arbitrary File Upload via MIME-Only Va… |
chamilo |
chamilo-lms |
2026-04-10T17:50:40.176Z | 2026-04-10T17:50:40.176Z |
| CVE-2026-32930 |
7.1 (3.1)
|
Chamilo LMS has an IDOR in Gradebook Allows Cross-Cour… |
chamilo |
chamilo-lms |
2026-04-10T17:48:51.774Z | 2026-04-10T18:32:13.726Z |
| CVE-2026-32894 |
7.1 (3.1)
|
Chamilo LMS has an IDOR in Gradebook Allows Cross-Cour… |
chamilo |
chamilo-lms |
2026-04-10T17:44:24.994Z | 2026-04-10T17:44:24.994Z |
| CVE-2026-32893 |
5.4 (3.1)
|
Chamilo LMS has Reflected XSS via Unsanitized http_bui… |
chamilo |
chamilo-lms |
2026-04-10T17:42:24.220Z | 2026-04-10T17:42:24.220Z |
| CVE-2026-32892 |
9.1 (3.1)
|
OS Command Injection in Chamilo LMS 1.11.36 |
chamilo |
chamilo-lms |
2026-04-10T17:56:57.695Z | 2026-04-10T17:56:57.695Z |
| CVE-2026-31941 |
7.7 (3.1)
|
Server-Side Request Forgery (SSRF) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:37:50.948Z | 2026-04-10T18:33:22.920Z |
| CVE-2026-31940 |
7.5 (3.1)
|
Session Fixation in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:35:10.661Z | 2026-04-10T17:35:10.661Z |
| CVE-2026-31939 |
8.3 (3.1)
|
Path Traversal (Arbitrary File Delete) in Chamilo LMS |
chamilo |
chamilo-lms |
2026-04-10T17:32:29.252Z | 2026-04-10T17:32:29.252Z |
| CVE-2025-70365 |
5.4 (3.1)
|
A stored cross-site scripting (XSS) vulnerability… |
n/a |
n/a |
2026-04-09T00:00:00.000Z | 2026-04-10T17:59:51.736Z |
| CVE-2025-66447 |
0 (3.1)
|
Chamilo LMS has validation-less redirect on login page |
chamilo |
chamilo-lms |
2026-04-10T17:22:32.443Z | 2026-04-10T17:22:32.443Z |
| CVE-2025-63238 |
6.1 (3.1)
|
A Reflected Cross-Site Scripting (XSS) affects Li… |
n/a |
n/a |
2026-04-09T00:00:00.000Z | 2026-04-10T18:01:35.784Z |
| CVE-2026-31066 |
4.5 (3.1)
|
UTT Aggressive HiPER 810G v3v1.7.7-171114 was dis… |
n/a |
n/a |
2026-04-06T00:00:00.000Z | 2026-04-06T19:54:45.325Z |
| CVE-2026-31150 |
4.3 (3.1)
|
Incorrect access control in Kaleris YMS v7.2.2.1 … |
n/a |
n/a |
2026-04-06T00:00:00.000Z | 2026-04-06T15:02:11.998Z |
| CVE-2026-31151 |
9.8 (3.1)
|
An issue in the login mechanism of Kaleris YMS v7… |
n/a |
n/a |
2026-04-06T00:00:00.000Z | 2026-04-07T13:48:27.943Z |
| CVE-2026-32602 |
4.2 (3.1)
|
Homarr has a Race Condition in Invite Token Registrati… |
homarr-labs |
homarr |
2026-04-06T14:42:37.488Z | 2026-04-06T15:41:09.966Z |
| CVE-2026-33403 |
6.1 (3.1)
|
Pi-hole has a Reflected XSS / HTML injection in taillog.js |
pi-hole |
web |
2026-04-06T14:48:05.132Z | 2026-04-06T15:05:23.490Z |
| CVE-2026-29510 |
5.1 (4.0)
5.4 (3.1)
|
Hereta ETH-IMC408M Stored XSS via Device Name |
Shenzhen Hereta Technology Co., Ltd. |
Hereta ETH-IMC408M |
2026-03-16T16:56:21.182Z | 2026-03-17T15:28:52.668Z |
| CVE-2026-29513 |
5.1 (4.0)
5.4 (3.1)
|
Hereta ETH-IMC408M Stored XSS via Device Location |
Shenzhen Hereta Technology Co., Ltd. |
Hereta ETH-IMC408M |
2026-03-16T16:56:06.732Z | 2026-03-17T15:29:07.351Z |
| CVE-2026-29520 |
5.1 (4.0)
6.1 (3.1)
|
Hereta ETH-IMC408M Reflected XSS via ping_ipaddr Parameter |
Shenzhen Hereta Technology Co., Ltd. |
Hereta ETH-IMC408M |
2026-03-16T16:55:52.660Z | 2026-03-17T15:29:29.391Z |
| CVE-2026-29521 |
5.1 (4.0)
4.3 (3.1)
|
Hereta ETH-IMC408M CSRF via Configuration Setup |
Shenzhen Hereta Technology Co., Ltd. |
Hereta ETH-IMC408M |
2026-03-16T16:55:34.505Z | 2026-03-17T15:29:46.810Z |
| CVE-2026-4147 |
7.1 (4.0)
6.5 (3.1)
|
Stack memory disclosure in filemd5 command |
MongoDB Inc |
MongoDB Server |
2026-03-17T15:50:21.888Z | 2026-03-17T16:09:55.480Z |
| CVE-2026-4148 |
8.7 (4.0)
8.8 (3.1)
|
ExpressionContext use-after-free in classic engine $lo… |
MongoDB Inc |
MongoDB Server |
2026-03-17T15:53:57.874Z | 2026-03-18T03:55:44.426Z |
| CVE-2025-68278 |
7.3 (4.0)
|
tinacms vulnerable to arbitrary code execution |
tinacms |
tinacms |
2025-12-18T15:27:21.403Z | 2025-12-18T15:46:53.765Z |
| CVE-2025-15056 |
5.1 (4.0)
|
Quill 2.0.3 - Lack of data validation in HTML export a… |
Slab |
Quill |
2026-01-13T20:39:29.627Z | 2026-01-13T21:27:56.936Z |
| CVE-2025-68429 |
7.3 (3.1)
|
Storybook manager bundle may expose environment variab… |
storybookjs |
storybook |
2025-12-17T22:26:55.732Z | 2025-12-18T15:06:29.568Z |
| CVE-2026-40160 |
7.1 (4.0)
|
PraisonAIAgents has SSRF via unvalidated URL in `web_c… |
MervinPraison |
PraisonAIAgents |
2026-04-10T16:59:09.542Z | 2026-04-10T16:59:09.542Z |
| CVE-2026-40159 |
5.5 (3.1)
|
PraisonAI Exposes Sensitive Environment Variable via U… |
MervinPraison |
PraisonAI |
2026-04-10T16:57:11.623Z | 2026-04-10T16:57:11.623Z |
| CVE-2026-40158 |
8.6 (3.1)
|
PraisonAI has Improper Control of Generation of Code (… |
MervinPraison |
PraisonAI |
2026-04-10T16:49:24.753Z | 2026-04-10T18:31:12.440Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2022-45315 | Mikrotik RouterOs before stable v7.6 was discovered to contain an out-of-bounds read in the snmp pr… | 2022-12-05T16:15:10.050 | 2026-04-09T21:16:04.127 |
| fkie_cve-2026-27885 | Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, a SQL Inje… | 2026-04-03T22:16:26.173 | 2026-04-09T21:15:10.113 |
| fkie_cve-2026-27834 | Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, a SQL Inje… | 2026-04-03T22:16:26.013 | 2026-04-09T21:15:01.457 |
| fkie_cve-2026-27833 | Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, the pwg.hi… | 2026-04-03T22:16:25.863 | 2026-04-09T21:14:48.237 |
| fkie_cve-2026-27634 | Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, the four d… | 2026-04-03T22:16:25.720 | 2026-04-09T21:14:23.150 |
| fkie_cve-2026-34834 | Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to version 1.4.10, … | 2026-04-02T20:16:27.983 | 2026-04-09T21:14:04.197 |
| fkie_cve-2026-34833 | Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to version 1.4.10, … | 2026-04-02T20:16:27.423 | 2026-04-09T21:13:42.907 |
| fkie_cve-2026-3089 | Actual Sync Server allows authenticated users to upload files through POST /sync/upload-user-file. … | 2026-03-09T14:16:10.143 | 2026-04-09T21:01:46.087 |
| fkie_cve-2026-35391 | Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the getC… | 2026-04-06T21:16:20.867 | 2026-04-09T20:59:25.443 |
| fkie_cve-2026-35389 | Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, S/MIME s… | 2026-04-06T21:16:20.580 | 2026-04-09T20:58:45.777 |
| fkie_cve-2025-54659 | An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CW… | 2026-03-10T18:17:58.200 | 2026-04-09T20:56:21.100 |
| fkie_cve-2026-22627 | A buffer copy without checking size of input ('classic buffer overflow') vulnerability in Fortinet … | 2026-03-10T18:18:12.570 | 2026-04-09T20:54:45.860 |
| fkie_cve-2026-22628 | An improper access control vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may all… | 2026-03-10T18:18:12.720 | 2026-04-09T20:53:56.180 |
| fkie_cve-2026-35390 | Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the reve… | 2026-04-06T21:16:20.723 | 2026-04-09T20:49:31.790 |
| fkie_cve-2026-35414 | OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involvin… | 2026-04-02T18:16:34.690 | 2026-04-09T20:47:15.020 |
| fkie_cve-2025-61648 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T01:15:58.680 | 2026-04-09T20:33:17.323 |
| fkie_cve-2025-61651 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T02:16:07.407 | 2026-04-09T20:33:09.617 |
| fkie_cve-2025-61655 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T02:16:07.887 | 2026-04-09T20:32:51.403 |
| fkie_cve-2025-61656 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T02:16:08.010 | 2026-04-09T20:32:45.010 |
| fkie_cve-2025-67475 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T02:16:08.457 | 2026-04-09T20:32:30.940 |
| fkie_cve-2025-67477 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T02:16:08.707 | 2026-04-09T20:32:13.213 |
| fkie_cve-2026-3904 | Calling NSS-backed functions that support caching via nscd may call the nscd client side code and … | 2026-03-11T14:16:30.113 | 2026-04-09T20:31:38.103 |
| fkie_cve-2025-67481 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T02:16:09.207 | 2026-04-09T20:30:34.163 |
| fkie_cve-2025-67483 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T02:16:09.467 | 2026-04-09T20:30:14.820 |
| fkie_cve-2025-70802 | Tenda G1V3.1si V16.01.7.8 Firmware V16.01.7.8 was discovered to contain a hardcoded password vulner… | 2026-03-10T21:16:42.367 | 2026-04-09T20:27:54.323 |
| fkie_cve-2025-70798 | Tenda i24V3.0si V3.0.0.5 Firmware V3.0.0.5 was discovered to contain a hardcoded password vulnerabi… | 2026-03-10T21:16:42.233 | 2026-04-09T20:27:36.003 |
| fkie_cve-2026-30231 | Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools… | 2026-03-06T21:16:17.223 | 2026-04-09T20:21:57.980 |
| fkie_cve-2026-30230 | Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools… | 2026-03-06T21:16:17.077 | 2026-04-09T20:20:02.933 |
| fkie_cve-2026-5976 | A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This affects the func… | 2026-04-09T20:16:29.763 | 2026-04-09T20:16:29.763 |
| fkie_cve-2026-5975 | A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is th… | 2026-04-09T20:16:29.547 | 2026-04-09T20:16:29.547 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-v7px-3835-7gjx |
9.3 (4.0)
|
PraisonAIAgents has an OS Command Injection via shell=True in Memory Hooks Executor (memory/hooks.py) | 2026-04-10T19:21:54Z | 2026-04-10T19:21:54Z |
| ghsa-w95v-4h65-j455 |
8.7 (4.0)
|
SiYuan Affected by Zero-Click NTLM Hash Theft and Blind SSRF via Mermaid Diagram Rendering | 2026-04-10T19:21:44Z | 2026-04-10T19:21:44Z |
| ghsa-fm2x-c5qw-4h6f |
9.1 (3.1)
|
LXD: VM lowlevel restriction bypass via raw.apparmor and raw.qemu.conf | 2026-04-10T19:21:00Z | 2026-04-10T19:21:00Z |
| ghsa-q96j-3fmm-7fv4 |
9.1 (3.1)
|
LXD: Importing a crafted backup leads to project restriction bypass | 2026-04-10T19:20:55Z | 2026-04-10T19:20:55Z |
| ghsa-c3h3-89qf-jqm5 |
9.1 (3.1)
|
LXD: Update of type field in restricted TLS certificate allows privilege escalation to cluster admin | 2026-04-10T19:20:50Z | 2026-04-10T19:20:50Z |
| ghsa-xrrh-p7f2-27vm |
7.3 (3.1)
5.5 (4.0)
|
decolua 9router vulnerable to authorization bypass | 2026-04-09T06:30:28Z | 2026-04-10T19:20:27Z |
| ghsa-95hg-3c55-xf9x |
5.3 (3.1)
1.9 (4.0)
|
awwaiid mcp-server-taskwarrior vulnerable to command injection | 2026-04-09T06:30:27Z | 2026-04-10T19:20:15Z |
| ghsa-c9vm-hv86-f23r |
|
justhtml includes multiple security fixes | 2026-04-10T19:20:04Z | 2026-04-10T19:20:04Z |
| ghsa-3xp3-pr8x-f755 |
6.3 (3.1)
5.3 (4.0)
|
Agions taskflow-ai vulnerable to os command injection in src/mcp/server/handlers.ts | 2026-04-09T03:31:14Z | 2026-04-10T19:19:46Z |
| ghsa-crh9-3gjh-m6gc |
7.3 (3.1)
5.5 (4.0)
|
api-lab-mcp vulnerable to SSRF | 2026-04-09T03:31:15Z | 2026-04-10T19:19:34Z |
| ghsa-qrwv-475h-2439 |
8.1 (3.1)
|
An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur … | 2026-04-10T18:31:20Z | 2026-04-10T18:31:20Z |
| ghsa-x53v-pxf5-chx6 |
6.2 (3.1)
|
In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-q8qr-wp2r-738r |
6.3 (4.0)
|
Apache Log4cxx's XMLLayout https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayo… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-jf3x-2pf6-c45w |
6.7 (3.1)
|
In systemd 259 before 260, there is local privilege escalation in systemd-machined because varlink … | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-hc7r-6254-88w5 |
6.4 (3.1)
|
In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted o… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-h383-gmxw-35v2 |
6.9 (4.0)
|
The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden … | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-grjh-583f-v73h |
2.9 (3.1)
|
In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-8fhh-33x2-c7c5 |
|
An open redirect vulnerability in Rocket.Chat versions prior to 8.4.0 allows users to be redirected… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-52rm-r39v-fwv9 |
4.7 (3.1)
|
In systemd 258 before 260, a local unprivileged user can trigger an assert when a Delegate=yes and … | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-4f7c-pmjv-c25w |
6.3 (4.0)
|
Apache Log4net's XmlLayout https://logging.apache.org/log4net/manual/configuration/layouts.html#la… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-445c-vh5m-36rj |
6.9 (4.0)
|
Apache Log4j Core's Rfc5424Layout https://logging.apache.org/log4j/2.x/manual/layouts.html#RFC5424… | 2026-04-10T18:31:17Z | 2026-04-10T18:31:18Z |
| ghsa-396h-m3pm-fpm5 |
6.4 (3.1)
|
In udev in systemd before 260, local root execution can occur via malicious hardware devices and un… | 2026-04-10T18:31:18Z | 2026-04-10T18:31:18Z |
| ghsa-wxjc-8jrx-5v2m |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the… | 2026-04-08T21:33:31Z | 2026-04-10T18:31:17Z |
| ghsa-wwjw-6p2f-76rh |
6.5 (3.1)
|
NASM contains a heap use after free vulnerability in response file (-@) processing where a dangling… | 2026-04-10T15:31:57Z | 2026-04-10T18:31:17Z |
| ghsa-vgrj-r347-cwxq |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of inp… | 2026-04-08T21:33:32Z | 2026-04-10T18:31:17Z |
| ghsa-v9v4-x4hg-jg4g |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the… | 2026-04-08T21:33:32Z | 2026-04-10T18:31:17Z |
| ghsa-rp5p-fr9g-xq7m |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the… | 2026-04-08T21:33:31Z | 2026-04-10T18:31:17Z |
| ghsa-rg42-2jgq-39w3 |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of par… | 2026-04-08T21:33:32Z | 2026-04-10T18:31:17Z |
| ghsa-q864-377f-88pv |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of par… | 2026-04-08T21:33:32Z | 2026-04-10T18:31:17Z |
| ghsa-q5q5-66wx-rc4c |
7.5 (3.1)
|
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the… | 2026-04-08T21:33:32Z | 2026-04-10T18:31:17Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-889 |
5.4 (3.1)
|
A stored cross-site scripting (XSS) vulnerability in Plone CMS 5.2.3 exists in site-contr… | plone | 2021-03-24T15:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2019-252 |
5.5 (3.1)
|
In parser/btorsmt2.c in Boolector 3.0.0, opening a specially crafted input file leads to … | pyboolector | 2019-02-07T07:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2018-154 |
6.5 (3.1)
|
An issue was discovered in libpg_query 10-1.0.2. There is a memory leak in pg_query_raw_p… | pg-query | 2018-10-18T18:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2018-152 |
7.2 (3.1)
|
An authorization-check flaw was discovered in federation configurations of the OpenStack … | keystone | 2018-07-19T13:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2018-149 |
6.1 (3.1)
|
The Galaxy Project Galaxy version v14.10 contains a CWE-79: Improper Neutralization of In… | galaxy-app | 2018-06-26T16:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2017-147 |
7.8 (3.1)
|
In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of da… | pyspark | 2017-09-13T16:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2017-145 |
4.7 (3.1)
|
OpenStack Compute (nova) Icehouse, Juno and Havana when live migration fails allows local… | nova | 2017-08-09T18:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2017-143 |
5.5 (3.1)
|
The image signature algorithm in OpenStack Glance 11.0.0 allows remote attackers to bypas… | glance | 2017-03-29T14:59:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2016-38 |
4.3 (3.1)
|
The Fernet Token Provider in OpenStack Identity (Keystone) 9.0.x before 9.0.1 (mitaka) al… | keystone | 2016-06-13T14:59:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2015-40 |
|
Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in OpenStack … | horizon | 2015-08-20T20:59:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2015-39 |
|
The import task action in OpenStack Image Service (Glance) 2015.1.x before 2015.1.2 (kilo… | glance | 2015-08-19T15:59:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2015-38 |
|
OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not p… | glance | 2015-02-24T15:59:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2015-37 |
|
OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not p… | glance | 2015-02-24T15:59:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-116 |
|
The TempURL middleware in OpenStack Object Storage (Swift) 1.4.6 through 1.8.0, 1.9.0 thr… | swift | 2014-01-23T01:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-113 |
|
The VMWare driver in OpenStack Compute (Nova) 2013.2 through 2013.2.2 does not properly p… | nova | 2014-03-25T16:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-112 |
|
The instance rescue mode in OpenStack Compute (Nova) 2013.2 before 2013.2.3 and Icehouse … | nova | 2014-05-08T14:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-111 |
|
The i_create_images_and_backing (aka create_images_and_backing) method in libvirt driver … | nova | 2014-02-06T17:00:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-109 |
|
OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 does not … | keystone | 2014-08-25T14:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-108 |
|
The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Ju… | keystone | 2014-08-25T14:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-107 |
|
The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Ju… | keystone | 2014-08-25T14:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-106 |
|
The V3 API in OpenStack Identity (Keystone) 2013.1 before 2013.2.4 and icehouse before ic… | keystone | 2014-04-15T14:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-105 |
|
The memcache token backend in OpenStack Identity (Keystone) 2013.1 through 2.013.1.4, 201… | keystone | 2014-04-01T06:35:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-102 |
|
OpenStack Image Registry and Delivery Service (Glance) 2013.2 through 2013.2.1 and Icehou… | glance | 2014-02-14T15:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2013-44 |
|
OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) does not properly i… | nova | 2013-03-22T21:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2013-43 |
|
OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authe… | nova | 2013-03-22T21:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2013-42 |
|
The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.… | keystone | 2013-09-23T20:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2013-41 |
|
OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly before 2013.1.1, and H… | keystone | 2013-05-21T18:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2013-39 |
|
OpenStack Keystone Folsom (2012.2) does not properly perform revocation checks for Keysto… | keystone | 2013-03-22T21:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2010-32 |
|
ZServer in Zope 2.10.x before 2.10.12 and 2.11.x before 2.11.7 allows remote attackers to… | Zope | 2010-09-08T20:00:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2009-13 |
|
MoinMoin 1.6.2 and 1.7 does not properly enforce ACL checks when acl_hierarchic is set to… | moin | 2009-04-03T18:30:00Z | 2024-11-25T18:35:18.357593Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33677 | Cross-Site Request Forgery (CSRF) vulnerability in Renzo Johnson Contact Form 7 Extension… | 2024-04-27T05:02:18.290583Z |
| gsd-2024-31152 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:17.731991Z |
| gsd-2024-4290 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.575829Z |
| gsd-2024-4289 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.612538Z |
| gsd-2024-4288 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.569916Z |
| gsd-2024-4287 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.611362Z |
| gsd-2024-4286 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.599503Z |
| gsd-2024-4285 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.599710Z |
| gsd-2024-4284 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.527556Z |
| gsd-2024-4283 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.614027Z |
| gsd-2024-4282 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.598979Z |
| gsd-2024-4281 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.536355Z |
| gsd-2024-4280 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.533977Z |
| gsd-2024-4279 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.521267Z |
| gsd-2024-4278 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.578652Z |
| gsd-2024-4277 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.524486Z |
| gsd-2024-4276 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.567475Z |
| gsd-2024-4275 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.560967Z |
| gsd-2024-4274 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.542869Z |
| gsd-2024-4273 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.625570Z |
| gsd-2024-4272 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.564269Z |
| gsd-2024-4271 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.557860Z |
| gsd-2024-4270 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.565894Z |
| gsd-2024-4269 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.543844Z |
| gsd-2024-4268 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.561404Z |
| gsd-2024-4267 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.595290Z |
| gsd-2024-4266 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.592000Z |
| gsd-2024-4265 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.621175Z |
| gsd-2024-4264 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.584159Z |
| gsd-2024-4263 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.603449Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2421 | Malicious code in @mgcrae/pino-pretty-logger (npm) | 2026-04-02T11:28:24Z | 2026-04-07T14:41:19Z |
| mal-2026-2420 | Malicious code in @_wnpm/wnpm-cli (npm) | 2026-04-02T09:53:07Z | 2026-04-07T14:41:19Z |
| mal-2026-2408 | Malicious code in @cloudsop/hmoment (npm) | 2026-03-24T09:03:56Z | 2026-04-07T14:41:19Z |
| mal-2026-2407 | Malicious code in @ceeferenderer/itg-renderer-sdk (npm) | 2026-03-24T09:03:48Z | 2026-04-07T14:41:19Z |
| mal-2026-2406 | Malicious code in @ceeferenderer/fe-renderer-sdk (npm) | 2026-03-24T09:03:41Z | 2026-04-07T14:41:19Z |
| mal-2026-2332 | Malicious code in @hsbc-mfe/host (npm) | 2026-03-24T15:28:47Z | 2026-04-07T14:41:19Z |
| mal-2026-2331 | Malicious code in @girirajravichandran/corp-build-utils-poc (npm) | 2026-03-24T15:28:29Z | 2026-04-07T14:41:19Z |
| mal-2026-2330 | Malicious code in @fyxer-ai/shared (npm) | 2026-03-24T15:28:28Z | 2026-04-07T14:41:19Z |
| mal-2026-2329 | Malicious code in @abi-labs-frontend/standards (npm) | 2026-03-24T15:23:58Z | 2026-04-07T14:41:19Z |
| mal-2026-2318 | Malicious code in @logcore/pino-pretty-logger (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:19Z |
| mal-2026-2314 | Malicious code in @c8o/nimbus-core (npm) | 2026-03-31T18:13:08Z | 2026-04-07T14:41:19Z |
| mal-2026-2503 | Malicious code in genesis-1p-tools-rpm-bundle (PyPI) | 2026-04-07T09:41:03Z | 2026-04-07T09:41:03Z |
| mal-2026-2001 | Malicious code in laserlogsink (npm) | 2026-03-20T17:21:01Z | 2026-04-06T23:17:57Z |
| mal-2026-2488 | Malicious code in photo-extractor (PyPI) | 2026-04-04T16:41:48Z | 2026-04-04T16:41:48Z |
| mal-2026-2487 | Malicious code in discord-request (PyPI) | 2026-04-04T12:56:18Z | 2026-04-04T12:56:18Z |
| mal-2026-2486 | Malicious code in gangomodule (PyPI) | 2026-04-04T12:01:55Z | 2026-04-04T12:01:55Z |
| mal-2026-2448 | Malicious code in supervisors (PyPI) | 2026-04-03T11:40:59Z | 2026-04-03T11:40:59Z |
| mal-2026-2432 | Malicious code in nwin64tls (PyPI) | 2026-04-02T20:28:37Z | 2026-04-02T20:28:37Z |
| mal-2026-2431 | Malicious code in nwin32tls (PyPI) | 2026-04-02T20:26:19Z | 2026-04-02T20:26:19Z |
| mal-2026-2430 | Malicious code in k8s-node-health (PyPI) | 2026-04-02T15:10:22Z | 2026-04-02T15:52:55Z |
| mal-2026-2223 | Malicious code in cr-static-shared-components (npm) | 2026-03-24T09:05:26Z | 2026-04-02T02:59:23Z |
| mal-2026-2405 | Malicious code in eht-account (PyPI) | 2026-04-01T17:49:00Z | 2026-04-01T17:49:00Z |
| mal-2026-2404 | Malicious code in ether-account (PyPI) | 2026-04-01T16:32:11Z | 2026-04-01T16:32:11Z |
| mal-2026-2403 | Malicious code in polymarkets-sdk (PyPI) | 2026-04-01T15:30:14Z | 2026-04-01T16:27:32Z |
| mal-2026-870 | Malicious code in b10connoisseur (PyPI) | 2026-02-12T12:10:26Z | 2026-04-01T12:28:04Z |
| mal-2026-1973 | Malicious code in woltpickerapp (npm) | 2026-03-20T04:48:44Z | 2026-04-01T12:28:04Z |
| mal-2026-1926 | Malicious code in tokenshower (npm) | 2026-03-19T15:16:36Z | 2026-04-01T12:28:04Z |
| mal-2026-1407 | Malicious code in thief-utils (PyPI) | 2026-03-13T08:43:52Z | 2026-04-01T12:28:04Z |
| mal-2026-1406 | Malicious code in makenotion-ppetest (PyPI) | 2026-03-13T08:13:53Z | 2026-04-01T12:28:04Z |
| mal-2026-1405 | Malicious code in whatsapp-fastdesk-utils-drzak (npm) | 2026-03-13T06:47:06Z | 2026-04-01T12:28:04Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0690 | cURL: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0507 | util-linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-02-24T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0482 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0469 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2026-02-19T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0422 | Mattermost: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0388 | Synacor Zimbra: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0279 | GIMP: Schwachstelle ermöglicht Codeausführung | 2026-02-01T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0586 | OpenClaw: Mehrere Schwachstellen | 2026-03-03T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0573 | OpenClaw: Mehrere Schwachstellen | 2026-03-02T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0557 | OpenClaw: Mehrere Schwachstellen | 2026-03-01T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0501 | OpenClaw: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0472 | OpenClaw: Mehrere Schwachstellen | 2026-02-22T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0736 | NetBox: Schwachstelle ermöglicht Cross-Site Scripting | 2026-03-16T23:00:00.000+00:00 | 2026-03-17T23:00:00.000+00:00 |
| wid-sec-w-2026-0726 | TYPO3 Core: Mehrere Schwachstellen | 2020-07-27T22:00:00.000+00:00 | 2026-03-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1433 | Red Hat Enterprise Linux (python-setuptools): Schwachstelle ermöglicht Codeausführung | 2025-06-30T22:00:00.000+00:00 | 2026-03-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0705 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0695 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2026-03-11T23:00:00.000+00:00 | 2026-03-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0551 | OpenClaw: Mehrere Schwachstellen | 2026-02-26T23:00:00.000+00:00 | 2026-03-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0490 | OpenClaw: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0660 | Microsoft System Center Operations Manager: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0659 | Microsoft Office und SharePoint Produkte: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0658 | Microsoft SQL Server: Mehrere Schwachstellen ermöglichen Erlangen von Administratorrechten | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0657 | Microsoft ASP.NET und .NET: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0656 | Microsoft Authenticator App: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0655 | Microsoft Azure Komponenten: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0377 | Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2026-02-10T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2026-0629 | Zabbix: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0628 | Nextcloud: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0627 | CoreDNS: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| wid-sec-w-2026-0626 | Flowise: Mehrere Schwachstellen | 2026-03-05T23:00:00.000+00:00 | 2026-03-08T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-23-157-02 | Mitsubishi Electric MELSEC iQ-R Series/iQ-F Series (Update C) | 2023-06-06T06:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-329-06 | SiRcom SMART Alert (SiSA) | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-05 | Festo Compact Vision System, Control Block, Controller, and Operator Unit products | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-03 | Zenitel TCIV-3+ | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-02 | Rockwell Automation Arena Simulation | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-01 | Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, Cobalt Share | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-22-333-05 | Mitsubishi Electric FA Engineering Software (Update C) | 2022-12-05T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-04 | Opto 22 groov View | 2025-11-25T06:00:00.000000Z | 2025-11-25T06:00:00.000000Z |
| icsa-25-324-06 | Emerson Appleton UPSMON-PRO | 2025-11-20T07:00:00.000000Z | 2025-11-20T07:00:00.000000Z |
| icsa-25-324-01 | Automated Logic WebCTRL Premium Server | 2025-11-20T07:00:00.000000Z | 2025-11-20T07:00:00.000000Z |
| icsa-25-324-03 | Opto 22 GRV-EPIC and groov RIO | 2025-11-20T06:00:00.000000Z | 2025-11-20T06:00:00.000000Z |
| icsa-25-324-02 | ICAM365 CCTV Camera Multiple Models | 2025-11-20T06:00:00.000000Z | 2025-11-20T06:00:00.000000Z |
| icsa-25-322-05 | METZ CONNECT EWIO2 | 2025-11-18T12:00:00.000000Z | 2025-11-18T12:00:00.000000Z |
| icsa-25-322-03 | Shelly Pro 3EM | 2025-11-18T07:00:00.000000Z | 2025-11-18T07:00:00.000000Z |
| icsa-25-322-02 | Shelly Pro 4PM | 2025-11-18T07:00:00.000000Z | 2025-11-18T07:00:00.000000Z |
| icsa-25-317-12 | Siemens Spectrum Power 4 | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-11 | Siemens SICAM P850 family and SICAM P855 family | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-10 | *Rockwell Automation AADvance-Trusted SIS Workstation * | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-09 | Rockwell Automation FactoryTalk Policy Manager | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-08 | General Industrial Controls Lynx+ Gateway | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-07 | Rockwell Automation FactoryTalk DataMosaix Private Cloud | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-06 | Rockwell Automation Studio 5000 Simulation Interface | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-05 | Rockwell Automation Verve Asset Manager | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-04 | Brightpick Mission Control / Internal Logic Control | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-03 | AVEVA Edge | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-02 | AVEVA Application Server IDE | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-317-01 | Mitsubishi Electric MELSEC iQ-F Series | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-273-04 | Festo Controller CECC-S,-LK,-D Family Firmware (Update A) | 2025-09-30T06:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-322-04 | Schneider Electric PowerChute Serial Shutdown | 2025-11-11T08:00:00.000000Z | 2025-11-11T08:00:00.000000Z |
| icsa-25-322-01 | Schneider Electric EcoStruxure Machine SCADA Expert & Pro-face BLUE Open Studio | 2025-11-11T08:00:00.000000Z | 2025-11-11T08:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-tms-xss-vuln-wbtcywxg | Cisco TelePresence Management Suite Cross-Site Scripting Vulnerability | 2025-03-05T16:00:00+00:00 | 2025-03-05T16:44:57+00:00 |
| cisco-sa-secure-dll-injection-aoyzeqsg | Cisco Secure Client for Windows with Secure Firewall Posture Engine DLL Hijacking Vulnerability | 2025-03-05T16:00:00+00:00 | 2025-03-05T16:00:00+00:00 |
| cisco-sa-nxos-ici-dpojbwxk | Cisco Nexus 3000 and 9000 Series Switches Command Injection Vulnerability | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| cisco-sa-n3kn9k-healthdos-eoqswk4g | Cisco Nexus 3000 and 9000 Series Switches Health Monitoring Diagnostics Denial of Service Vulnerability | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| cisco-sa-apic-multi-vulns-9ummtg5 | Cisco Application Policy Infrastructure Controller Vulnerabilities | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| cisco-sa-phone-info-disc-yyxswstk | Cisco Video Phone 8875 and Desk Phone 9800 Series Information Disclosure Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-esa-mailpol-bypass-5nvcjzmw | Cisco Secure Email Gateway Email Filter Bypass Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-broadworks-xss-gdpgj58p | Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-ise-multivuls-ftw9aoxf | Cisco Identity Services Engine Insecure Java Deserialization and Authorization Bypass Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-10T20:23:50+00:00 |
| cisco-sa-esa-sma-wsa-multi-ykujhs34 | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-07T19:21:57+00:00 |
| cisco-sa-swa-range-bypass-2bsehysu | Cisco Secure Web Appliance Range Request Bypass Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-ise-xss-42tgsdmg | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-expressway-xss-uexuzrew | Cisco Expressway Series Cross-Site Scripting Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-xss-wck2wcug | Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-wsa-snmp-inf-fqpvl8sx | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance SNMP Polling Information Disclosure Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-cmm-privesc-uy2vf8pc | Cisco Meeting Management REST API Privilege Escalation Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-clamav-ole2-h549rpha | ClamAV OLE2 File Format Decryption Denial of Service Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-bw-sip-dos-msysbrmt | Cisco BroadWorks SIP Denial of Service Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-thousandeyes-cert-pqtjuv9n | Cisco ThousandEyes Endpoint Agent for MacOS and RoomOS Certificate Validation Vulnerability | 2025-01-08T16:00:00+00:00 | 2025-01-13T22:15:18+00:00 |
| cisco-sa-snort-rf-bypass-oy8f3pnm | Multiple Cisco Products Snort Rate Filter Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2025-01-13T16:44:31+00:00 |
| cisco-sa-thousandeyes-cert-pqtJUv9N | Cisco ThousandEyes Endpoint Agent for MacOS and RoomOS Certificate Validation Vulnerability | 2025-01-08T16:00:00+00:00 | 2025-01-13T22:15:18+00:00 |
| cisco-sa-xwork-xss-kccg7wwu | Cisco Crosswork Network Controller Stored Cross-Site Scripting Vulnerabilities | 2025-01-08T16:00:00+00:00 | 2025-01-08T16:00:00+00:00 |
| cisco-sa-cspc-xss-cdojzyh | Cisco Common Services Platform Collector Cross-Site Scripting Vulnerabilities | 2025-01-08T16:00:00+00:00 | 2025-01-08T16:00:00+00:00 |
| cisco-sa-nxos-image-sig-bypas-pQDRQvjL | Cisco NX-OS Software Image Verification Bypass Vulnerability | 2024-12-04T16:00:00+00:00 | 2025-04-07T16:43:32+00:00 |
| cisco-sa-ap-dos-capwap-ddmczs4m | Cisco Access Point Software Uncontrolled Resource Consumption Vulnerability | 2023-09-27T16:00:00+00:00 | 2024-12-12T12:27:21+00:00 |
| cisco-sa-ap-dos-capwap-DDMCZS4m | Cisco Access Point Software Uncontrolled Resource Consumption Vulnerability | 2023-09-27T16:00:00+00:00 | 2024-12-12T12:27:21+00:00 |
| cisco-sa-swa-priv-esc-7uhpzscc | Cisco Secure Web Appliance Privilege Escalation Vulnerability | 2024-07-17T16:00:00+00:00 | 2024-11-22T17:13:56+00:00 |
| cisco-sa-swa-priv-esc-7uHpZsCC | Cisco Secure Web Appliance Privilege Escalation Vulnerability | 2024-07-17T16:00:00+00:00 | 2024-11-22T17:13:56+00:00 |
| cisco-sa-iosxr-load-infodisc-9rdor5fq | Cisco IOS XR Software Bootloader Unauthenticated Information Disclosure Vulnerability | 2023-03-08T16:00:00+00:00 | 2024-11-13T15:00:06+00:00 |
| cisco-sa-iosxr-load-infodisc-9rdOr5Fq | Cisco IOS XR Software Bootloader Unauthenticated Information Disclosure Vulnerability | 2023-03-08T16:00:00+00:00 | 2024-11-13T15:00:06+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-2915 | HDF5 H5Faccum.c H5F__accum_free heap-based overflow | 2025-03-02T00:00:00.000Z | 2026-03-31T15:14:30.000Z |
| msrc_cve-2024-57924 | fs: relax assertions on failure to encode file handles | 2025-01-02T00:00:00.000Z | 2026-03-31T15:14:28.000Z |
| msrc_cve-2024-47794 | bpf: Prevent tailcall infinite loop caused by freplace | 2025-01-02T00:00:00.000Z | 2026-03-31T15:14:28.000Z |
| msrc_cve-2026-3849 | Buffer Overflow in HPKE via Oversized ECH Config | 2026-03-02T00:00:00.000Z | 2026-03-31T15:14:23.000Z |
| msrc_cve-2026-2443 | Libsoup: out-of-bounds read in libsoup handle_partial_get() leading to heap information disclosure | 2026-02-02T00:00:00.000Z | 2026-03-31T15:14:17.000Z |
| msrc_cve-2024-46678 | bonding: change ipsec_lock from spin lock to mutex | 2024-09-01T07:00:00.000Z | 2026-03-31T15:14:17.000Z |
| msrc_cve-2023-53209 | wifi: mac80211_hwsim: Fix possible NULL dereference | 2025-09-02T00:00:00.000Z | 2026-03-31T15:14:13.000Z |
| msrc_cve-2024-57893 | ALSA: seq: oss: Fix races at processing SysEx messages | 2025-01-02T00:00:00.000Z | 2026-03-31T15:14:09.000Z |
| msrc_cve-2024-50098 | scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down | 2024-11-02T00:00:00.000Z | 2026-03-31T15:14:04.000Z |
| msrc_cve-2026-4395 | Heap-based buffer overflow in wc_ecc_import_x963_ex KCAPI path | 2026-03-02T00:00:00.000Z | 2026-03-31T15:14:03.000Z |
| msrc_cve-2024-24856 | NULL pointer deference in acpi_db_convert_to_package of Linux acpi module | 2024-04-02T07:00:00.000Z | 2026-03-31T15:14:00.000Z |
| msrc_cve-2025-40158 | ipv6: use RCU in ip6_output() | 2025-11-02T00:00:00.000Z | 2026-03-31T15:13:57.000Z |
| msrc_cve-2025-29923 | go-redis allows potential out of order responses when `CLIENT SETINFO` times out during connection establishment | 2025-03-02T00:00:00.000Z | 2026-03-31T15:13:52.000Z |
| msrc_cve-2024-46762 | xen: privcmd: Fix possible access to a freed kirqfd instance | 2024-09-01T07:00:00.000Z | 2026-03-31T15:13:52.000Z |
| msrc_cve-2022-50304 | mtd: core: fix possible resource leak in init_mtd() | 2025-09-02T00:00:00.000Z | 2026-03-31T15:13:50.000Z |
| msrc_cve-2024-46733 | btrfs: fix qgroup reserve leaks in cow_file_range | 2024-09-01T07:00:00.000Z | 2026-03-31T15:13:46.000Z |
| msrc_cve-2025-71227 | wifi: mac80211: don't WARN for connections on invalid channels | 2026-02-02T00:00:00.000Z | 2026-03-31T15:13:44.000Z |
| msrc_cve-2026-3580 | Compiler-induced timing leak in sp_256_get_entry_256_9 on RISC-V | 2026-03-02T00:00:00.000Z | 2026-03-31T15:13:42.000Z |
| msrc_cve-2024-50111 | LoongArch: Enable IRQ if do_ale() triggered in irq-enabled context | 2024-11-02T00:00:00.000Z | 2026-03-31T15:13:42.000Z |
| msrc_cve-2024-57898 | wifi: cfg80211: clear link ID from bitmap during link delete after clean up | 2025-01-02T00:00:00.000Z | 2026-03-31T15:13:37.000Z |
| msrc_cve-2025-40170 | net: use dst_dev_rcu() in sk_setup_caps() | 2025-11-02T00:00:00.000Z | 2026-03-31T15:13:34.000Z |
| msrc_cve-2022-50303 | drm/amdkfd: Fix double release compute pasid | 2025-09-02T00:00:00.000Z | 2026-03-31T15:13:30.000Z |
| msrc_cve-2024-46770 | ice: Add netif_device_attach/detach into PF reset flow | 2024-09-01T07:00:00.000Z | 2026-03-31T15:13:29.000Z |
| msrc_cve-2024-41069 | ASoC: topology: Fix references to freed memory | 2024-07-01T07:00:00.000Z | 2026-03-31T15:13:25.000Z |
| msrc_cve-2024-50108 | drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too | 2024-11-02T00:00:00.000Z | 2026-03-31T15:13:22.000Z |
| msrc_cve-2026-4159 | wc_PKCS7_DecodeEnvelopedData 1 byte out-of-bounds read | 2026-03-02T00:00:00.000Z | 2026-03-31T15:13:21.000Z |
| msrc_cve-2023-52737 | btrfs: lock the inode in shared mode before starting fiemap | 2024-05-02T07:00:00.000Z | 2026-03-31T15:13:19.000Z |
| msrc_cve-2025-40168 | smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match(). | 2025-11-02T00:00:00.000Z | 2026-03-31T15:13:13.000Z |
| msrc_cve-2026-23214 | btrfs: reject new transactions if the fs is fully read-only | 2026-02-02T00:00:00.000Z | 2026-03-31T15:13:10.000Z |
| msrc_cve-2025-21833 | iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE | 2025-03-02T00:00:00.000Z | 2026-03-31T15:13:08.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0276 | Kwetsbaarheden verholpen in Schneider Electric Saitel | 2025-09-09T15:16:00.122647Z | 2025-09-09T15:16:00.122647Z |
| ncsc-2025-0275 | Kwetsbaarheden verholpen in SAP producten | 2025-09-09T11:12:22.945466Z | 2025-09-09T11:12:22.945466Z |
| ncsc-2025-0274 | Kwetsbaarheden verholpen in Siemens producten | 2025-09-09T11:06:34.785987Z | 2025-09-09T11:06:34.785987Z |
| ncsc-2025-0245 | Kwetsbaarheden verholpen in SAP producten | 2025-08-12T11:10:21.111816Z | 2025-09-05T11:12:05.722381Z |
| ncsc-2025-0273 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-09-04T08:15:14.806733Z | 2025-09-04T08:15:14.806733Z |
| ncsc-2025-0272 | Kwetsbaarheid verholpen in FreePBX | 2025-08-29T08:37:54.893549Z | 2025-08-29T08:37:54.893549Z |
| ncsc-2025-0271 | Kwetsbaarheden verholpen in Arcserve Unified Data Protection | 2025-08-28T12:56:02.228992Z | 2025-08-28T12:56:02.228992Z |
| ncsc-2025-0270 | Kwetsbaarheden verholpen in Cisco NX-OS Software | 2025-08-28T08:36:20.358948Z | 2025-08-28T08:36:20.358948Z |
| ncsc-2025-0234 | Kwetsbaarheid verholpen in CrushFTP | 2025-07-21T08:34:35.304610Z | 2025-08-28T07:59:34.275023Z |
| ncsc-2025-0269 | Kwetsbaarheden verholpen in IBM Cognos Command Center | 2025-08-27T13:10:59.965070Z | 2025-08-27T13:10:59.965070Z |
| ncsc-2025-0268 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en Gateway | 2025-08-26T13:11:42.925280Z | 2025-08-26T17:34:30.428328Z |
| ncsc-2025-0266 | Kwetsbaarheid verholpen in Apple MacOS, iOS en iPadOS | 2025-08-22T05:49:07.556948Z | 2025-08-25T12:16:10.430485Z |
| ncsc-2025-0267 | Kwetsbaarheden verholpen in Foxit Reader | 2025-08-25T11:26:17.380689Z | 2025-08-25T11:26:17.380689Z |
| ncsc-2025-0265 | Kwetsbaarheden verholpen in Commvault | 2025-08-20T12:15:48.655099Z | 2025-08-20T12:15:48.655099Z |
| ncsc-2025-0264 | Kwetsbaarheden verholpen in Cisco Secure Firewall Software | 2025-08-15T08:52:41.012811Z | 2025-08-15T08:52:41.012811Z |
| ncsc-2025-0263 | Kwetsbaarheden verholpen in N-able N-Central | 2025-08-14T12:38:27.349283Z | 2025-08-14T12:38:27.349283Z |
| ncsc-2025-0262 | Kwetsbaarheden verholpen in Xerox FreeFlow Core | 2025-08-14T07:00:50.843871Z | 2025-08-14T07:00:50.843871Z |
| ncsc-2025-0261 | Kwetsbaarheden verholpen in Adobe InCopy | 2025-08-13T10:13:59.220398Z | 2025-08-13T10:13:59.220398Z |
| ncsc-2025-0260 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-08-13T10:12:35.130811Z | 2025-08-13T10:12:35.130811Z |
| ncsc-2025-0259 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2025-08-13T10:11:22.733287Z | 2025-08-13T10:11:22.733287Z |
| ncsc-2025-0258 | Kwetsbaarheden verholpen in Adobe InDesign | 2025-08-13T10:05:31.442414Z | 2025-08-13T10:05:31.442414Z |
| ncsc-2025-0257 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-08-13T10:00:18.181867Z | 2025-08-13T10:00:18.181867Z |
| ncsc-2025-0256 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-08-13T09:59:45.240348Z | 2025-08-13T09:59:45.240348Z |
| ncsc-2025-0255 | Kwetsbaarheden verholpen in Fortinet producten | 2025-08-13T09:16:29.067287Z | 2025-08-13T09:35:40.587034Z |
| ncsc-2025-0254 | Kwetsbaarheden verholpen in Zoom | 2025-08-13T09:09:21.491424Z | 2025-08-13T09:09:21.491424Z |
| ncsc-2025-0253 | Kwetsbaarheden verholpen in Ivanti Connect Secure, Policy Secure en ZTA Gateways | 2025-08-13T09:06:58.420498Z | 2025-08-13T09:06:58.420498Z |
| ncsc-2025-0252 | Kwetsbaarheden verholpen in Microsoft Exchange Server | 2025-08-13T07:29:24.639524Z | 2025-08-13T07:29:24.639524Z |
| ncsc-2025-0251 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-08-13T07:25:08.789693Z | 2025-08-13T07:25:08.789693Z |
| ncsc-2025-0250 | Kwetsbaarheden verholpen in Microsoft Office | 2025-08-13T07:23:56.395786Z | 2025-08-13T07:23:56.395786Z |
| ncsc-2025-0249 | Kwetsbaarheden verholpen in Azure-producten | 2025-08-13T07:22:17.432067Z | 2025-08-13T07:22:17.432067Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10367-1 | ruby4.0-rubygem-web-console-4.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10366-1 | ruby4.0-rubygem-thor-1.4.0-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10365-1 | ruby4.0-rubygem-sprockets-3.7-3.7.5-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10364-1 | ruby4.0-rubygem-sprockets-4.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10363-1 | ruby4.0-rubygem-rubyzip-2.3.2-1.19 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10362-1 | ruby4.0-rubygem-railties-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10361-1 | ruby4.0-rubygem-rails-html-sanitizer-1.6.0-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10360-1 | ruby4.0-rubygem-rails-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10359-1 | ruby4.0-rubygem-rack-session-2.1.1-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10358-1 | ruby4.0-rubygem-rack-3.1.18-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10357-1 | ruby4.0-rubygem-puma-6.4.3-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10356-1 | ruby4.0-rubygem-nokogiri-1.18.9-1.4 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10355-1 | ruby4.0-rubygem-multi_xml-0.6.0-1.31 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10354-1 | ruby4.0-rubygem-minitar-0.9-1.21 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10353-1 | ruby4.0-rubygem-loofah-2.23.1-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10352-1 | ruby4.0-rubygem-kramdown-2.4.0-1.17 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10351-1 | ruby4.0-rubygem-json_pure-2.7.6-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10350-1 | ruby4.0-rubygem-jquery-rails-4.6.0-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10349-1 | ruby4.0-rubygem-http-cookie-1.0.8-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10348-1 | ruby4.0-rubygem-grpc-1.70.1-1.7 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10347-1 | ruby4.0-rubygem-globalid-1.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10346-1 | ruby4.0-rubygem-fluentd-1.17.1-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10345-1 | ruby4.0-rubygem-activesupport-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10344-1 | ruby4.0-rubygem-activestorage-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10343-1 | ruby4.0-rubygem-activerecord-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10342-1 | ruby4.0-rubygem-activemodel-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10341-1 | ruby4.0-rubygem-activejob-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10340-1 | ruby4.0-rubygem-actionview-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10339-1 | ruby4.0-rubygem-actiontext-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10338-1 | ruby4.0-rubygem-actionpack-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:4002 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.12.3 container image updates | 2025-04-17T22:09:36+00:00 | 2026-04-11T14:06:51+00:00 |
| rhsa-2025:3993 | Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift 2.15.1-6 Update | 2025-04-17T14:42:51+00:00 | 2026-04-11T14:06:50+00:00 |
| rhsa-2025:3959 | Red Hat Security Advisory: VolSync 0.11.2 security fixes and enhancements for RHEL 9 | 2025-04-16T21:10:52+00:00 | 2026-04-11T14:06:50+00:00 |
| rhsa-2025:3932 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.20.0 release | 2025-04-16T02:48:23+00:00 | 2026-04-11T14:06:49+00:00 |
| rhsa-2025:3930 | Red Hat Security Advisory: RHACS 4.7 security update | 2025-04-15T20:29:23+00:00 | 2026-04-11T14:06:48+00:00 |
| rhsa-2025:3929 | Red Hat Security Advisory: ACS 4.6 enhancement and security update | 2025-04-15T19:52:32+00:00 | 2026-04-11T14:06:48+00:00 |
| rhsa-2025:3928 | Red Hat Security Advisory: ACS 4.5 enhancement and security update | 2025-04-15T19:46:07+00:00 | 2026-04-11T14:06:48+00:00 |
| rhsa-2025:3907 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.1.5 | 2025-04-16T21:35:18+00:00 | 2026-04-11T14:06:47+00:00 |
| rhsa-2025:3906 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.9.13 | 2025-04-16T10:29:32+00:00 | 2026-04-11T14:06:46+00:00 |
| rhsa-2025:3905 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.0.7 | 2025-04-16T14:51:29+00:00 | 2026-04-11T14:06:46+00:00 |
| rhsa-2025:3886 | Red Hat Security Advisory: RHOAI 2.19.0 - Red Hat OpenShift AI | 2025-04-15T07:52:02+00:00 | 2026-04-11T14:06:46+00:00 |
| rhsa-2025:3863 | Red Hat Security Advisory: Red Hat multicluster global hub 1.3.3 bug fixes and container update | 2025-04-14T18:00:47+00:00 | 2026-04-11T14:06:45+00:00 |
| rhsa-2025:3833 | Red Hat Security Advisory: gvisor-tap-vsock security update | 2025-04-14T09:21:59+00:00 | 2026-04-11T14:06:44+00:00 |
| rhsa-2025:3820 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T17:22:43+00:00 | 2026-04-11T14:06:44+00:00 |
| rhsa-2025:3814 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T15:20:44+00:00 | 2026-04-11T14:06:44+00:00 |
| rhsa-2025:3813 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T14:56:45+00:00 | 2026-04-11T14:06:43+00:00 |
| rhsa-2025:3811 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T14:32:08+00:00 | 2026-04-11T14:06:42+00:00 |
| rhsa-2025:3808 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | 2025-04-10T14:26:28+00:00 | 2026-04-11T14:06:41+00:00 |
| rhsa-2025:3798 | Red Hat Security Advisory: OpenShift Container Platform 4.17.25 bug fix and security update | 2025-04-16T17:46:00+00:00 | 2026-04-11T14:06:38+00:00 |
| rhsa-2025:3790 | Red Hat Security Advisory: OpenShift Container Platform 4.15.49 bug fix and security update | 2025-04-17T04:03:56+00:00 | 2026-04-11T14:06:38+00:00 |
| rhsa-2025:3720 | Red Hat Security Advisory: multicluster engine for Kubernetes 2.8.1 container image updates | 2025-04-08T23:25:49+00:00 | 2026-04-11T14:06:38+00:00 |
| rhsa-2025:3775 | Red Hat Security Advisory: OpenShift Container Platform 4.18.9 bug fix and security update | 2025-04-16T06:12:24+00:00 | 2026-04-11T14:06:37+00:00 |
| rhsa-2025:3763 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.13.2 container image updates | 2025-04-09T16:37:37+00:00 | 2026-04-11T14:06:37+00:00 |
| rhsa-2025:3743 | Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.5.1 release | 2025-04-09T09:53:12+00:00 | 2026-04-11T14:06:36+00:00 |
| rhsa-2025:3740 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.5.1 release | 2025-04-09T08:52:08+00:00 | 2026-04-11T14:06:36+00:00 |
| rhsa-2025:3698 | Red Hat Security Advisory: opentelemetry-collector security update | 2025-04-08T15:23:59+00:00 | 2026-04-11T14:06:36+00:00 |
| rhsa-2025:3685 | Red Hat Security Advisory: Red Hat Edge Manager Version 0.5.1 (Technology Preview) security fixes | 2025-04-08T13:01:54+00:00 | 2026-04-11T14:06:35+00:00 |
| rhsa-2025:3618 | Red Hat Security Advisory: grafana security update | 2025-04-07T02:07:30+00:00 | 2026-04-11T14:06:34+00:00 |
| rhsa-2025:3616 | Red Hat Security Advisory: grafana security update | 2025-04-07T01:59:15+00:00 | 2026-04-11T14:06:34+00:00 |
| rhsa-2025:3607 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.5.1 release | 2025-04-04T13:38:55+00:00 | 2026-04-11T14:06:34+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2020-315-02 | EcoStruxure™ Operator Terminal Expert (Vijeo XD), Pro-face BLUE and WinGP runtime | 2020-11-09T00:00:00.000Z | 2021-01-11T00:00:00.000Z |
| sevd-2020-343-06 | Web Server on Modicon M340, Legacy Offers Modicon Quantum Modicon Premium and associated Communication Modules | 2020-12-08T09:08:01.000Z | 2020-12-08T09:08:01.000Z |
| sevd-2020-343-09 | Modicon M258 Logic Controllers and SoMachine/ SoMachine Motion Software | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-08 | Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-02 | EcoStruxure Geo SCADA Expert | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-315-06 | Easergy T300 | 2020-11-10T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-287-02 | Wibu-Systems CodeMeter Vulnerabilities | 2020-10-13T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-315-04 | EcoStruxure Building Operation (EBO) | 2020-11-10T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| sevd-2020-105-02 | Modicon M218/M241/M251/M258 Logic Controllers,SoMachine/SoMachine Motion, EcoStruxure™ Machine Expert | 2020-04-14T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| sevd-2020-287-04 | EcoStruxure™ and SmartStruxure™ Power Monitoring and SCADA Software | 2020-10-13T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-287-03 | Smartlink, PowerTag, and Wiser Series Gateways | 2020-10-13T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-224-01 | Schneider Electric Modbus Serial Driver | 2020-08-11T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-133-02 | Vijeo Designer and Vijeo Designer Basic Software | 2020-05-12T00:00:00.000Z | 2020-08-14T00:00:00.000Z |
| sevd-2020-224-08 | Schneider Electric PACTware | 2020-08-11T00:00:00.000Z | 2020-08-13T00:00:00.000Z |
| sevd-2020-224-07 | SoMove | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-06 | Harmony® eXLhoist | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-05 | PowerChute Business Edition | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-04 | APC Easy UPS On-Line Software | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-03 | Modicon M218 Logic Controller | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-02 | spaceLYnk & Wiser for KNX (formerly homeLYnk) | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-105-03 | Vijeo Designer and Vijeo Designer Basic | 2020-04-14T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-196-01 | Schneider Electric Software Update (SESU) | 2020-07-14T00:00:00.000Z | 2020-07-14T00:00:00.000Z |
| sevd-2020-161-03 | Modicon LMC078 Logic Controller additional URGENT/11 Fix | 2020-06-09T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| sevd-2020-161-01 | Modicon M218 Logic Controller | 2020-06-09T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| sevd-2015-344-01 | GoAhead Web Server vulnerability | 2015-12-15T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| sevd-2020-070-04 | Andover Continuum System | 2020-03-10T00:00:00.000Z | 2020-05-12T00:00:00.000Z |
| sevd-2020-105-01 | Modicon M100/M200/M221 controllers, SoMachine Basic and EcoStruxure Machine Expert - Basic Programming Software | 2020-04-14T00:00:00.000Z | 2020-04-14T00:00:00.000Z |
| sevd-2020-070-03 | ZigBee Installation Toolkit | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-070-02 | Modicon Quantum Ethernet Network module and Quantum / Premium COPRO | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-070-01 | IGSS (Interactive Graphical SCADA System) | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-583523 | SSA-583523: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2024-10-08T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-384652 | SSA-384652: Cross-Site Request Forgery (CSRF) Vulnerability in RUGGEDCOM ROX II | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-264815 | SSA-264815: Type Confusion Vulnerability in OpenSSL X.400 Address Processing in SIMATIC Products | 2023-08-08T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-264814 | SSA-264814: Timing Based Side Channel Vulnerability in the OpenSSL RSA Decryption in SIMATIC Products | 2023-08-08T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-128393 | SSA-128393: Firmware Decryption Vulnerability in SICAM A8000 CP-8031 and CP-8050 | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-042050 | SSA-042050: Know-How Protection Mechanism Failure in TIA Portal | 2023-06-13T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-824503 | SSA-824503: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation Before V2302.0018 and V2404.0007 | 2024-11-18T00:00:00Z | 2024-11-18T00:00:00Z |
| ssa-472448 | SSA-472448: Security Bypass Vulnerability in the SQL Client-Server Communication in Siveillance Video | 2024-11-13T00:00:00Z | 2024-11-13T00:00:00Z |
| ssa-915275 | SSA-915275: Multiple Vulnerabilities in SINEC INS Before V1.0 SP2 Update 3 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-883918 | SSA-883918: Information Disclosure Vulnerability in SIMATIC WinCC | 2024-07-09T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-654798 | SSA-654798: Incorrect Authorization Vulnerability in SIMATIC CP 1543-1 Devices | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-616032 | SSA-616032: Local Privilege Escalation Vulnerability in Spectrum Power 7 Before V24Q3 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-454789 | SSA-454789: Deserialization Vulnerability in TeleControl Server Basic V3.1 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-354112 | SSA-354112: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.2 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-351178 | SSA-351178: Multiple Vulnerabilities in Solid Edge Before SE2024 Update 9 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-331112 | SSA-331112: Multiple Vulnerabilities in SINEC NMS Before V3.0 SP1 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-230445 | SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-064257 | SSA-064257: Privilege Escalation Vulnerability in SIPORT Before V3.4.0 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-000297 | SSA-000297: Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.6 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-333468 | SSA-333468: Multiple Vulnerabilities in InterMesh Subscriber Devices | 2024-10-23T00:00:00Z | 2024-10-23T00:00:00Z |
| ssa-438590 | SSA-438590: Buffer Overflow Vulnerability in Siveillance Video Camera Drivers | 2024-10-10T00:00:00Z | 2024-10-10T00:00:00Z |
| ssa-959281 | SSA-959281: XML File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-955858 | SSA-955858: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2022-10-11T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-921449 | SSA-921449: Plaintext Storage of a Password Vulnerability in LOGO! V8.3 BM Devices | 2024-08-13T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-852501 | SSA-852501: Multiple Memory Corruption Vulnerabilities in Simcenter Nastran Before 2406.5000 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-850560 | SSA-850560: Use of 4-Digit PIN in SENTRON PAC3200 Devices | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-844582 | SSA-844582: Electromagnetic Fault Injection in LOGO! V8.3 BM Devices Results in Broken LOGO! V8.3 Product CA | 2023-12-12T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-783481 | SSA-783481: Denial-of-Service Vulnerability in LOGO! 8 BM | 2021-03-09T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-626178 | SSA-626178: Stack-Based Buffer Overflow Vulnerability in JT2Go Before V2406.0003 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-540493 | SSA-540493: Kiosk Mode Escape Vulnerability in HiMed Cockpit Devices Before V11.6.2 | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20853-1 | Security update for the Linux Kernel RT (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:44Z | 2026-03-24T16:48:44Z |
| suse-su-2026:20845-1 | Security update for the Linux Kernel | 2026-03-24T16:48:38Z | 2026-03-24T16:48:38Z |
| suse-su-2026:20896-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:35Z | 2026-03-24T16:48:35Z |
| suse-su-2026:20895-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:35Z | 2026-03-24T16:48:35Z |
| suse-su-2026:20852-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:35Z | 2026-03-24T16:48:35Z |
| suse-su-2026:20851-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:35Z | 2026-03-24T16:48:35Z |
| suse-su-2026:20876-1 | Security update for the Linux Kernel | 2026-03-24T16:48:29Z | 2026-03-24T16:48:29Z |
| suse-su-2026:20894-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20893-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20892-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20891-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20850-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20849-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20848-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20847-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-03-24T16:48:26Z | 2026-03-24T16:48:26Z |
| suse-su-2026:20926-1 | Security update for tomcat11 | 2026-03-24T16:09:46Z | 2026-03-24T16:09:46Z |
| suse-su-2026:0998-1 | Security update for gstreamer-plugins-ugly | 2026-03-24T14:56:39Z | 2026-03-24T14:56:39Z |
| suse-su-2026:0997-1 | Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4) | 2026-03-24T14:34:37Z | 2026-03-24T14:34:37Z |
| suse-su-2026:20925-1 | Security update for nghttp2 | 2026-03-24T12:31:51Z | 2026-03-24T12:31:51Z |
| suse-su-2026:20833-1 | Security update for nghttp2 | 2026-03-24T12:31:51Z | 2026-03-24T12:31:51Z |
| suse-su-2026:20832-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-03-24T11:33:36Z | 2026-03-24T11:33:36Z |
| suse-su-2026:20826-1 | Security update for systemd | 2026-03-24T09:34:46Z | 2026-03-24T09:34:46Z |
| suse-su-2026:20822-1 | Security update for systemd | 2026-03-24T09:27:18Z | 2026-03-24T09:27:18Z |
| suse-su-2026:0992-1 | Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4) | 2026-03-24T09:11:21Z | 2026-03-24T09:11:21Z |
| suse-su-2026:20821-1 | Security update for python-pyasn1 | 2026-03-24T09:09:54Z | 2026-03-24T09:09:54Z |
| suse-su-2026:0993-1 | Security update for go1.26-openssl | 2026-03-24T08:54:50Z | 2026-03-24T08:54:50Z |
| suse-su-2026:0991-1 | Security update for systemd | 2026-03-24T07:23:00Z | 2026-03-24T07:23:00Z |
| suse-su-2026:0990-1 | Security update for systemd | 2026-03-24T07:22:51Z | 2026-03-24T07:22:51Z |
| suse-su-2026:20825-1 | Security update for salt | 2026-03-24T06:19:37Z | 2026-03-24T06:19:37Z |
| suse-su-2026:20820-1 | Security update for salt | 2026-03-24T05:49:23Z | 2026-03-24T05:49:23Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1715 | Important: golang-github-openprinting-ipp-usb security update | 2026-02-02T00:00:00Z | 2026-02-03T11:03:28Z |
| alsa-2026:1714 | Moderate: wireshark security update | 2026-02-02T00:00:00Z | 2026-02-03T11:02:21Z |
| alsa-2026:1662 | Moderate: kernel security update | 2026-02-02T00:00:00Z | 2026-02-02T13:45:57Z |
| alsa-2026:1661 | Moderate: kernel-rt security update | 2026-02-02T00:00:00Z | 2026-02-02T13:40:07Z |
| alsa-2026:1631 | Moderate: python3 security update | 2026-02-02T00:00:00Z | 2026-02-02T12:08:18Z |
| alsa-2026:1592 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T11:56:57Z |
| alsa-2026:1178 | Moderate: kernel security update | 2026-01-26T00:00:00Z | 2026-02-02T11:36:10Z |
| alsa-2026:1239 | Important: fence-agents security update | 2026-01-26T00:00:00Z | 2026-02-02T11:30:59Z |
| alsa-2026:1359 | Moderate: gcc-toolset-15-binutils security update | 2026-01-27T00:00:00Z | 2026-02-02T11:23:42Z |
| alsa-2026:1381 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-02-02T11:22:03Z |
| alsa-2026:1409 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:20:21Z |
| alsa-2026:1412 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:16:18Z |
| alsa-2026:1473 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-02-02T11:12:21Z |
| alsa-2026:1595 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:01:50Z |
| alsa-2026:1597 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:00:47Z |
| alsa-2026:1628 | Important: php security update | 2026-02-02T00:00:00Z | 2026-02-02T09:59:40Z |
| alsa-2026:1143 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-30T09:51:59Z |
| alsa-2026:1574 | Important: gimp:2.8 security update | 2026-01-29T00:00:00Z | 2026-01-29T14:07:36Z |
| alsa-2026:0932 | Important: java-1.8.0-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-29T13:07:43Z |
| alsa-2026:1518 | Important: grafana-pcp security update | 2026-01-28T00:00:00Z | 2026-01-29T12:32:40Z |
| alsa-2026:1350 | Moderate: curl security update | 2026-01-27T00:00:00Z | 2026-01-29T12:31:06Z |
| alsa-2026:1334 | Moderate: glibc security update | 2026-01-27T00:00:00Z | 2026-01-29T12:29:45Z |
| alsa-2026:1254 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-29T12:14:07Z |
| alsa-2026:1344 | Important: grafana security update | 2026-01-27T00:00:00Z | 2026-01-29T12:12:24Z |
| alsa-2026:1374 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:10:37Z |
| alsa-2026:1380 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-01-29T12:07:35Z |
| alsa-2026:1408 | Moderate: python3.12 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:05:44Z |
| alsa-2026:1410 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:02:18Z |
| alsa-2026:1429 | Important: php:8.3 security update | 2026-01-27T00:00:00Z | 2026-01-29T11:59:57Z |
| alsa-2026:1472 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-01-28T19:58:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-1004 | Security exception in com.code_intelligence.jazzer.sanitizers.RegexInjection.hookInternal | 2025-12-21T00:18:27.214786Z | 2025-12-21T00:18:27.215115Z |
| osv-2025-1001 | Dynamic-stack-buffer-overflow in _ox_err_set_with_location | 2025-12-21T00:04:56.743119Z | 2025-12-21T00:04:56.743638Z |
| osv-2025-593 | Heap-buffer-overflow in mmcall | 2025-08-02T00:16:19.626747Z | 2025-12-20T14:30:41.473113Z |
| osv-2025-538 | Heap-double-free in policydb_destroy | 2025-07-09T00:05:37.052433Z | 2025-12-20T14:25:14.356814Z |
| osv-2025-92 | Null-dereference READ in session_startup | 2025-02-05T00:18:00.385170Z | 2025-12-20T14:25:08.038174Z |
| osv-2022-881 | Heap-use-after-free in AcquireCodePageWithCapacity | 2022-09-11T00:00:52.269838Z | 2025-12-20T14:17:45.282070Z |
| osv-2022-784 | Segv on unknown address in FreeCodePages | 2022-08-26T00:01:54.152651Z | 2025-12-20T14:16:22.419962Z |
| osv-2025-90 | Null-dereference READ in ubsan_GetStackTrace | 2025-02-03T00:02:54.185593Z | 2025-12-20T14:15:37.974751Z |
| osv-2023-298 | UNKNOWN READ in active_edges | 2023-04-12T14:02:04.134251Z | 2025-12-19T14:30:39.005796Z |
| osv-2025-989 | Bad-cast to UT_hash_bucket' (aka 'struct UT_hash_bucket')password_file__cleanup | 2025-12-17T00:01:12.806838Z | 2025-12-17T00:01:12.807184Z |
| osv-2025-983 | Dynamic-stack-buffer-overflow in _ox_err_set_with_location | 2025-12-14T00:14:21.963982Z | 2025-12-14T00:14:21.964726Z |
| osv-2025-698 | Use-of-uninitialized-value in AesEncrypt_C | 2025-09-02T00:02:49.308939Z | 2025-12-05T14:58:11.846817Z |
| osv-2025-970 | Heap-buffer-overflow in check_sync_pes | 2025-12-05T00:18:22.703657Z | 2025-12-05T00:18:22.704029Z |
| osv-2025-965 | Stack-use-after-scope in Assimp::FBX::FBXExportProperty::FBXExportProperty | 2025-12-04T00:10:11.975493Z | 2025-12-04T00:10:11.975920Z |
| osv-2024-372 | Security exception in java.base/java.util.Arrays.copyOf | 2024-04-30T00:09:04.989259Z | 2025-12-01T14:21:29.544925Z |
| osv-2024-28 | Security exception in java.base/java.util.Arrays.copyOf | 2024-01-21T00:12:30.613951Z | 2025-12-01T14:21:19.263844Z |
| osv-2024-661 | Security exception in java.base/java.util.ArrayList.<init> | 2024-07-18T00:05:57.665844Z | 2025-12-01T14:21:01.321021Z |
| osv-2023-955 | Security exception in org.apache.poi.ddf.EscherPropertyFactory$$Lambda$285/ADDRESS.apply | 2023-10-03T13:03:23.482168Z | 2025-12-01T14:19:00.140619Z |
| osv-2025-959 | Heap-buffer-overflow in re_parse_term | 2025-11-29T00:18:54.036831Z | 2025-11-29T00:18:54.037236Z |
| osv-2025-955 | Use-of-uninitialized-value in decoder_context::construct_reference_picture_lists | 2025-11-29T00:15:46.812919Z | 2025-11-29T00:15:46.813402Z |
| osv-2022-150 | Heap-buffer-overflow in coap_split_uri_sub | 2022-02-14T00:00:50.308933Z | 2025-11-27T14:04:04.584406Z |
| osv-2025-938 | Use-of-uninitialized-value in comp_func_SourceOver_avx2 | 2025-11-23T00:03:38.943405Z | 2025-11-23T00:03:38.943780Z |
| osv-2025-932 | Heap-use-after-free in password_file__cleanup | 2025-11-22T00:01:32.642847Z | 2025-11-22T00:01:32.643269Z |
| osv-2025-926 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement | 2025-11-21T00:05:31.621567Z | 2025-11-21T00:05:31.621958Z |
| osv-2025-906 | Use-of-uninitialized-value in QImage::pixel | 2025-11-18T00:08:20.557059Z | 2025-11-18T00:08:20.557392Z |
| osv-2025-901 | Heap-use-after-free in apache::thrift::protocol::TCompactProtocolT<apache::thrift::transport::TMemoryBu | 2025-11-17T00:02:08.125421Z | 2025-11-17T00:02:08.125970Z |
| osv-2025-871 | UNKNOWN READ in ojph::local::param_cod::~param_cod | 2025-11-03T00:01:55.461376Z | 2025-11-16T14:04:09.695272Z |
| osv-2025-900 | Heap-buffer-overflow in DecodeFrame | 2025-11-15T00:18:33.800030Z | 2025-11-15T00:18:33.800379Z |
| osv-2025-890 | Heap-buffer-overflow in icalmemory_tmp_copy | 2025-11-10T00:03:23.954817Z | 2025-11-10T00:03:23.955223Z |
| osv-2025-884 | Heap-use-after-free in JS_DefineProperty | 2025-11-08T00:17:46.632315Z | 2025-11-08T00:17:46.633033Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0424 | Unsound usages of `core::slice::from_raw_parts_mut` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0421 | `idna` accepts Punycode labels that do not produce any non-ASCII when decoded | 2024-12-09T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0409 | Build corruption when using `PYO3_CONFIG_FILE` environment variable | 2024-12-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0408 | Unsound usages of `std::slice::from_raw_parts` | 2024-12-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0407 | Fails to ensure slice elements match the slice's declared type | 2024-03-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0405 | op_panic in the base runtime can force a panic in the runtime's containing thread | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0404 | Unsoundness in anstream | 2024-09-08T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0403 | op_panic in the base runtime can force a panic in the runtime's containing thread | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0402 | Borsh serialization of HashMap is non-canonical | 2024-10-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0400 | `ruzstd` uninit and out-of-bounds memory reads | 2024-11-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0399 | rustls network-reachable panic in `Acceptor::accept` | 2024-11-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0398 | Bias of Polynomial Coefficients in Secret Sharing | 2024-11-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0393 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0392 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0391 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0379 | Multiple soundness issues | 2024-10-31T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0378 | Risk of use-after-free in `borrowed` reads from Python weak references | 2024-10-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0377 | Heap Buffer overflow using c_chars_to_str function | 2024-10-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0374 | Segmentation fault due to use of uninitialized memory | 2024-09-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0368 | olm-sys: wrapped library unmaintained, potentially vulnerable | 2024-09-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0366 | CWA-2023-004: Excessive number of function parameters in compiled Wasm | 2024-08-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0365 | Binary Protocol Misinterpretation caused by Truncating or Overflowing Casts | 2024-08-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0363 | Binary Protocol Misinterpretation caused by Truncating or Overflowing Casts | 2024-08-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0362 | Stack overflow when parsing specially crafted JSON ABI strings | 2024-07-30T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0360 | `XmpFile::close` can trigger UB | 2024-07-26T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0358 | Apache Arrow Rust Object Store: AWS WebIdentityToken exposure in log files | 2024-07-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0357 | `MemBio::get_buf` has undefined behavior with empty buffers | 2024-07-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0347 | Incorrect usage of `#[repr(packed)]` | 2024-07-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0346 | Incorrect usage of `#[repr(packed)]` | 2024-07-01T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0345 | Low severity (DoS) vulnerability in sequoia-openpgp | 2024-06-26T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-solr-2020-9492 | 2024-03-06T11:07:01.582Z | 2026-03-20T09:47:33.381Z | |
| bit-redis-2023-45145 | Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window. | 2024-03-06T11:03:25.305Z | 2026-03-20T09:47:33.381Z |
| bit-python-2026-3479 | pkgutil.get_data() does not enforce documented restrictions | 2026-03-20T09:21:01.169Z | 2026-03-20T09:47:33.381Z |
| bit-python-2025-13462 | tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling | 2026-03-14T08:49:56.012Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32594 | Parse Server GraphQL WebSocket endpoint bypasses security middleware | 2026-03-20T09:19:20.642Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32269 | Parse Server OAuth2 adapter app ID validation sends wrong token to introspection endpoint | 2026-03-16T09:53:45.375Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32248 | Parse Server: Account takeover via operator injection in authentication data identifier | 2026-03-16T09:53:42.464Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32242 | Parse Server OAuth2 adapter shares mutable state across providers via singleton instance | 2026-03-16T09:53:39.413Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-31828 | Parse Server has an LDAP injection via unsanitized user input in DN and group filter construction | 2026-03-12T14:48:18.251Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-31800 | Parse Server: Classes `_GraphQLConfig` and `_Audience` master key bypass via generic class routes | 2026-03-12T14:48:16.613Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30972 | Parse Server has a rate limit bypass via batch request endpoint | 2026-03-12T14:48:14.900Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30967 | Parse Server OAuth2 authentication adapter account takeover via identity spoofing | 2026-03-12T14:48:13.390Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30966 | Parse Server role escalation and CLP bypass via direct `_Join` table write | 2026-03-12T14:48:11.522Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30965 | Parse Server session token exfiltration via `redirectClassNameForKey` query parameter | 2026-03-12T14:48:09.696Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30962 | Parse Server has a protected fields bypass via logical query operators | 2026-03-12T14:48:07.977Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30949 | Parse Server is missing audience validation in Keycloak authentication adapter | 2026-03-12T14:48:06.075Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30948 | Parse Server has stored cross-site scripting (XSS) via SVG file upload | 2026-03-12T14:48:04.274Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30947 | Parse Server ha a bypass of class-level permissions in LiveQuery | 2026-03-12T14:48:02.496Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30946 | Parse Server affected by denial-of-service via unbounded query complexity in REST and GraphQL API | 2026-03-12T14:48:00.783Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30941 | Parse Server has a NoSQL injection via token type in password reset and email verification endpoints | 2026-03-12T14:47:58.977Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30939 | Parse Server has Denial of Service (DoS) and Cloud Function Dispatch Bypass via Prototype Chain Resolution | 2026-03-12T14:47:57.281Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30938 | Parse Server has denylist `requestKeywordDenylist` keyword scan bypass through nested object placement | 2026-03-12T14:47:55.401Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-30925 | Parse Server affected by Regular Expression Denial of Service (ReDoS) via `$regex` query in LiveQuery | 2026-03-12T14:47:53.415Z | 2026-03-20T09:47:33.381Z |
| bit-nifi-2024-45477 | Apache NiFi: Improper Neutralization of Input in Parameter Description | 2025-09-12T11:47:04.858Z | 2026-03-20T09:47:33.381Z |
| bit-nifi-2023-49145 | Apache NiFi: Improper Neutralization of Input in Advanced User Interface for Jolt | 2025-09-12T11:47:03.168Z | 2026-03-20T09:47:33.381Z |
| bit-mongodb-2020-7925 | Denial of Service when processing malformed Role names | 2024-03-06T10:58:54.976Z | 2026-03-20T09:47:33.381Z |
| bit-mongodb-2020-7923 | Specific GeoQuery can cause DoS against MongoDB Server | 2024-03-06T10:59:03.972Z | 2026-03-20T09:47:33.381Z |
| bit-mastodon-2025-67500 | Mastodon Error Handling Discrepancy Enables Private Status Existence Enumeration | 2025-12-11T11:41:16.693Z | 2026-03-20T09:47:33.381Z |
| bit-mastodon-2025-62605 | Mastodon quotes control can be bypassed | 2025-10-23T08:44:09.997Z | 2026-03-20T09:47:33.381Z |
| bit-mastodon-2023-42452 | Mastodon vulnerable to Stored XSS through the translation feature | 2024-03-06T10:55:46.292Z | 2026-03-20T09:47:33.381Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-jo01099 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.3-r0 | 2026-04-01T09:58:23.141059Z | 2026-03-12T13:09:34Z |
| cleanstart-2026-jd75482 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0 | 2026-04-01T09:58:30.410416Z | 2026-03-12T13:09:34Z |
| cleanstart-2026-bp32212 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.87.0-r0, 0.87.0-r1, 0.88.0-r0 | 2026-04-01T09:58:48.421220Z | 2026-03-11T10:14:30Z |
| cleanstart-2026-np19113 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.10-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4 | 2026-04-01T09:59:46.805882Z | 2026-03-11T10:03:22Z |
| cleanstart-2026-ju62670 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2x5j-vhc8-9cwm, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2gw2-vh5m, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-c6gw-w398-hv78, ghsa-cfpf-hrx2-8rv6, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-jgfp-53c3-624w, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r, ghsa-pwhc-rpq9-4c8w, ghsa-r6j8-c6r2-37rr, ghsa-vv39-3w5q-974q applied in versions: 2.13.9-r0, 2.14.20-r0, 2.14.20-r1, 3.0.16-r0, 3.0.19-r0, 3.0.20-r2, 3.0.21-r0, 3.0.21-r1, 3.1.4-r0, 3.1.8.-r0 | 2026-04-01T10:00:01.931332Z | 2026-03-11T10:03:00Z |
| cleanstart-2026-jw58725 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2x5j-vhc8-9cwm, ghsa-2xsj-vh29-9cwm, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r, ghsa-r6j8-c6r2-37rr applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.0.22-r0, 3.0.23-r0, 3.0.23-r1, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4 | 2026-04-01T10:00:01.222759Z | 2026-03-11T10:01:48Z |
| cleanstart-2026-lz54652 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729 applied in versions: 1.7.0-r0, 1.7.1-r0 | 2026-04-01T10:00:12.081449Z | 2026-03-11T07:18:17Z |
| cleanstart-2026-bb17877 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.87.1-r0, 0.89.0-r0 | 2026-04-01T10:00:31.981994Z | 2026-03-11T05:53:58Z |
| cleanstart-2026-pm59896 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729 applied in versions: 1.41.1-r0, 1.41.1-r1 | 2026-04-01T10:00:44.608929Z | 2026-03-11T05:51:53Z |
| cleanstart-2026-mk01488 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-27141, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p applied in versions: 3.6.16-r0, 3.7.10-r0, 3.7.10-r1, 3.7.10-r2, 3.7.10-r3, 3.7.10-r4, 3.7.4-r0, 3.7.9-r0 | 2026-04-01T10:00:43.919294Z | 2026-03-10T12:46:44Z |
| cleanstart-2026-dr75226 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1 | 2026-04-01T10:01:44.354704Z | 2026-03-10T12:28:42Z |
| cleanstart-2026-bm51903 | Security fixes for CVE-2015-20107, CVE-2015-2104, CVE-2019-16056, CVE-2019-16935, CVE-2019-20907, CVE-2019-5010, CVE-2020-14422, CVE-2020-8492, CVE-2021-23336, CVE-2021-29921, CVE-2021-3177, CVE-2022-45061, CVE-2023-27043, CVE-2024-6232, CVE-2024-6923, CVE-2025-59375 applied in versions: 3.10.5-r0, 3.11.1-r0, 3.11.5-r0, 3.12.12-r0, 3.12.3-r2, 3.12.6-r0, 3.6.8-r1, 3.7.5-r0, 3.8.2-r0, 3.8.4-r0, 3.8.5-r0, 3.8.7-r2, 3.8.8-r0, 3.9.4-r0, 3.9.5-r0 | 2026-04-01T10:02:05.179897Z | 2026-03-10T11:38:44Z |
| cleanstart-2026-pp64690 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-1229, CVE-2026-25934, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-q9hv-hpm4-hj6x applied in versions: 0.20.4-r1, 0.20.4-r2, 0.20.4-r3 | 2026-04-01T10:01:43.950159Z | 2026-03-10T11:34:26Z |
| cleanstart-2026-iy77127 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.29.0-r0 | 2026-04-01T10:01:36.492383Z | 2026-03-10T11:31:41Z |
| cleanstart-2026-lu81821 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.28.3-r1 | 2026-04-01T10:02:04.894450Z | 2026-03-10T11:29:14Z |
| cleanstart-2026-ei44621 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.27.4-r0, 1.27.4-r1, 1.27.7-r0 | 2026-04-01T10:02:07.249071Z | 2026-03-10T11:28:54Z |
| cleanstart-2026-jk38734 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121 applied in versions: 1.80.1-r1 | 2026-04-01T10:02:16.597211Z | 2026-03-10T06:53:47Z |
| cleanstart-2026-al75891 | Security fixes for CVE-2026-24051, ghsa-9h8m-3fm2-qjrq applied in versions: 1.19.2-r0 | 2026-04-01T10:02:21.610635Z | 2026-03-10T06:30:49Z |
| cleanstart-2026-ds01292 | Security fixes for CVE-2025-47910, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-27141, ghsa-9h8m-3fm2-qjrq applied in versions: 1.19.1-r0, 1.19.2-r0, 1.19.2-r1 | 2026-04-01T10:03:13.135534Z | 2026-03-10T06:29:01Z |
| cleanstart-2026-jo97977 | Security fixes for ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T10:02:43.649563Z | 2026-03-10T06:18:32Z |
| cleanstart-2026-fo41609 | Security fixes for CVE-2025-48924, ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j288-q9x7-2f5v, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 8.19.12-r0, 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T10:02:50.908381Z | 2026-03-10T06:14:42Z |
| cleanstart-2026-fz71456 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 1.0.18-r0 | 2026-04-01T10:02:32.121585Z | 2026-03-10T06:07:45Z |
| cleanstart-2026-df22934 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, ghsa-6v2p-p543-phr9, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-q754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-qxp5-gwg8-xv66, ghsa-v778-237x-gjrc, ghsa-vvgc-356p-c3xw applied in versions: 0.28.0-r0, 0.28.0-r1 | 2026-04-01T10:03:39.072806Z | 2026-03-09T13:31:49Z |
| cleanstart-2026-ew27017 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.10.0-r0, 1.10.0-r1 | 2026-04-01T10:03:13.124366Z | 2026-03-09T13:26:38Z |
| cleanstart-2026-zv38826 | Within HostnameError | 2026-03-10T01:00:05.764793Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-xh31600 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:58:05.974960Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-ra63757 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T00:56:05.142237Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-qk48981 | Redis is an open source, in-memory database that persists on disk | 2026-03-10T01:00:35.988532Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-oh74241 | Security fixes for GHSA-MQQF-5WVP-8FH8 applied in versions: 0.122-r0 | 2026-03-10T00:58:07.551022Z | 2026-03-09T13:15:34Z |
| cleanstart-2026-od98869 | Within HostnameError | 2026-03-10T00:59:05.580952Z | 2026-03-09T13:15:34Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2019-ALE-004 | Multiples vulnérabilités dans Microsoft Edge et Internet Explorer | 2019-04-01T00:00:00.000000 | 2019-04-17T00:00:00.000000 |
| certfr-2019-ale-002 | Vulnérabilités affectant l'écosystème Microsoft Exchange et Active Directory | 2019-01-30T00:00:00.000000 | 2019-03-06T00:00:00.000000 |
| CERTFR-2019-ALE-002 | Vulnérabilités affectant l'écosystème Microsoft Exchange et Active Directory | 2019-01-30T00:00:00.000000 | 2019-03-06T00:00:00.000000 |
| certfr-2019-ale-001 | Vulnérabilité dans le gestionnaire de paquets APT | 2019-01-22T00:00:00.000000 | 2019-02-27T00:00:00.000000 |
| CERTFR-2019-ALE-001 | Vulnérabilité dans le gestionnaire de paquets APT | 2019-01-22T00:00:00.000000 | 2019-02-27T00:00:00.000000 |
| certfr-2018-ale-013 | Vulnérabilité dans Microsoft Internet Explorer | 2018-12-20T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| certfr-2018-ale-012 | Vulnérabilité dans Wallix AdminBastion | 2018-10-26T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| CERTFR-2018-ALE-013 | Vulnérabilité dans Microsoft Internet Explorer | 2018-12-20T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| CERTFR-2018-ALE-012 | Vulnérabilité dans Wallix AdminBastion | 2018-10-26T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| certfr-2018-ale-011 | Vulnérabilité dans le client Git | 2018-10-08T00:00:00.000000 | 2018-10-12T00:00:00.000000 |
| CERTFR-2018-ALE-011 | Vulnérabilité dans le client Git | 2018-10-08T00:00:00.000000 | 2018-10-12T00:00:00.000000 |
| certfr-2018-ale-010 | Vulnérabilité activement exploitée dans le framework STRUTS 2 | 2018-08-29T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-008 | Campagne de messages électroniques non sollicités de type Locky Locker | 2018-08-03T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-007 | Multiples vulnérabilités dans S/MIME et OpenPGP | 2018-05-14T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-001 | Multiples vulnérabilités de fuite d'informations dans des processeurs | 2018-01-04T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-010 | Vulnérabilité activement exploitée dans le framework STRUTS 2 | 2018-08-29T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-008 | Campagne de messages électroniques non sollicités de type Locky Locker | 2018-08-03T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-007 | Multiples vulnérabilités dans S/MIME et OpenPGP | 2018-05-14T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-001 | Multiples vulnérabilités de fuite d'informations dans des processeurs | 2018-01-04T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-009 | Vulnérabilité dans Microsoft Windows | 2018-08-29T00:00:00.000000 | 2018-09-17T00:00:00.000000 |
| CERTFR-2018-ALE-009 | Vulnérabilité dans Microsoft Windows | 2018-08-29T00:00:00.000000 | 2018-09-17T00:00:00.000000 |
| certfr-2018-ale-006 | Vulnérabilité dans Cisco IOS et IOS XE Smart Install Client | 2018-04-06T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-005 | Multiples vulnérabilités dans Drupal | 2018-03-29T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-004 | Vulnérabilité dans le serveur de messagerie Exim | 2018-03-07T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-006 | Vulnérabilité dans Cisco IOS et IOS XE Smart Install Client | 2018-04-06T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-005 | Multiples vulnérabilités dans Drupal | 2018-03-29T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-004 | Vulnérabilité dans le serveur de messagerie Exim | 2018-03-07T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-002 | Vulnérabilité dans Cisco Adaptive Security Appliance | 2018-02-01T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| certfr-2017-ale-020 | Vulnérabilité dans des implémentations de TLS | 2017-12-13T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| CERTFR-2018-ALE-002 | Vulnérabilité dans Cisco Adaptive Security Appliance | 2018-02-01T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0192 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0191 | Vulnérabilité dans Traefik | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0190 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0189 | Vulnérabilité dans F5 BIG-IP | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0188 | Multiples vulnérabilités dans les produits Splunk | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0186 | Multiples vulnérabilités dans Google Chrome | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0185 | Vulnérabilité dans Microsoft Windows | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0184 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0183 | Vulnérabilité dans HPE Aruba Networking ClearPass Policy Manager | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0182 | Multiples vulnérabilités dans Atlassian Confluence | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0181 | Vulnérabilité dans Apache Tomcat | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0180 | Vulnérabilité dans NetApp StorageGRID | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0178 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0177 | Multiples vulnérabilités dans Moodle | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0175 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0174 | Multiples vulnérabilités dans LibreNMS | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2024-avi-0858 | Multiples vulnérabilités dans Mitel Micollab | 2024-10-10T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| CERTFR-2026-AVI-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| CERTFR-2026-AVI-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| CERTFR-2026-AVI-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-03-17T00:00:00.000000 |
| certfr-2026-avi-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0166 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0165 | Vulnérabilité dans Mattermost Server | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0164 | Multiples vulnérabilités dans PostgreSQL | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0163 | Multiples vulnérabilités dans HAProxy | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-002714 | Improper symbolic link file handling in FutureNet NXR series, VXR series and WXR series routers | 2025-03-31T16:59+09:00 | 2025-04-03T15:19+09:00 |
| jvndb-2025-000025 | WinRAR vulnerable to the symbolic link based "Mark of the Web" check bypass | 2025-04-03T12:29+09:00 | 2025-04-03T12:29+09:00 |
| jvndb-2025-000022 | Multiple vulnerabilities in JTEKT ELECTRONICS CORPORATION's products | 2025-04-02T15:12+09:00 | 2025-04-02T15:12+09:00 |
| jvndb-2025-002790 | Out-of-bounds Write vulnerabilities in Canon Printer Drivers for Production Printers, Office/Small Office Multifunction Printers and Laser Printers | 2025-04-02T15:05+09:00 | 2025-04-02T15:05+09:00 |
| jvndb-2025-000023 | WordPress plugin "Welcart e-Commerce" vulnerable to untrusted data deserialization | 2025-04-01T14:20+09:00 | 2025-04-01T14:20+09:00 |
| jvndb-2024-003016 | Multiple vulnerabilities in home gateway HGW BL1500HM | 2024-03-25T17:28+09:00 | 2025-03-28T12:01+09:00 |
| jvndb-2025-000018 | Multiple vulnerabilities in home gateway HGW-BL1500HM | 2025-03-19T15:33+09:00 | 2025-03-28T11:48+09:00 |
| jvndb-2025-000024 | a-blog cms vulnerable to untrusted data deserialization | 2025-03-28T10:46+09:00 | 2025-03-28T10:46+09:00 |
| jvndb-2025-000021 | Multiple vulnerabilities in PowerCMS | 2025-03-26T18:13+09:00 | 2025-03-26T18:13+09:00 |
| jvndb-2025-002592 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-03-26T13:25+09:00 | 2025-03-26T13:25+09:00 |
| jvndb-2025-000019 | Multiple vulnerabilities in AssetView | 2025-03-25T17:10+09:00 | 2025-03-25T17:10+09:00 |
| jvndb-2025-000020 | +F FS010M vulnerable to OS command injection | 2025-03-18T15:01+09:00 | 2025-03-18T15:01+09:00 |
| jvndb-2025-000017 | hostapd vulnerable to improper processing of RADIUS packets | 2025-03-12T14:19+09:00 | 2025-03-12T14:19+09:00 |
| jvndb-2025-000016 | Multiple vulnerabilities in RemoteView Agent (for Windows) | 2025-03-06T14:27+09:00 | 2025-03-10T15:22+09:00 |
| jvndb-2025-001898 | Multiple vulnerabilities in FutureNet AS series (Industrial Routers) and FA series (Protocol Conversion Machine) | 2025-03-04T14:56+09:00 | 2025-03-04T14:56+09:00 |
| jvndb-2025-001605 | "RoboForm Password Manager" App for Android vulnerable to authentication bypass using an alternate path or channel | 2025-02-20T20:15+09:00 | 2025-02-20T20:15+09:00 |
| jvndb-2025-000004 | Multiple vulnerabilities in I-O DATA router UD-LT2 | 2025-01-22T13:55+09:00 | 2025-02-20T15:55+09:00 |
| jvndb-2025-000014 | Multiple cross-site scripting vulnerabilities in Movable Type | 2025-02-19T16:19+09:00 | 2025-02-19T16:19+09:00 |
| jvndb-2025-000015 | RevoWorks SCVX and RevoWorks Browser vulnerable to incorrect resource transfer between spheres | 2025-02-19T14:51+09:00 | 2025-02-19T14:51+09:00 |
| jvndb-2025-001563 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation Corp. MFPs | 2025-02-18T16:33+09:00 | 2025-02-18T16:33+09:00 |
| jvndb-2025-001562 | Out-of-bounds read vulnerability in OMRON CX-Programmer | 2025-02-18T16:24+09:00 | 2025-02-18T16:24+09:00 |
| jvndb-2024-000114 | Multiple vulnerabilities in baserCMS | 2024-10-25T15:07+09:00 | 2025-02-18T15:35+09:00 |
| jvndb-2025-001548 | Out-of-bounds read vulnerability in Cente middleware | 2025-02-17T18:22+09:00 | 2025-02-17T18:22+09:00 |
| jvndb-2025-000012 | Multiple vulnerabilities in The LuxCal Web Calendar | 2025-02-17T13:43+09:00 | 2025-02-17T13:43+09:00 |
| jvndb-2025-000013 | acmailer CGI and acmailer DB vulnerable to OS command injection | 2025-02-14T16:39+09:00 | 2025-02-14T16:39+09:00 |
| jvndb-2025-000002 | Multiple vulnerabilities in NEC Aterm series (NV25-003) | 2025-02-14T15:48+09:00 | 2025-02-14T15:48+09:00 |
| jvndb-2023-002797 | Multiple vulnerabilities in ELECOM and LOGITEC network devices | 2023-08-15T11:54+09:00 | 2025-02-13T15:21+09:00 |
| jvndb-2024-001061 | ELECOM wireless LAN routers vulnerable to OS command injection | 2024-01-24T17:16+09:00 | 2025-02-13T14:31+09:00 |
| jvndb-2025-000011 | Multiple vulnerabilities in FileMegane | 2025-02-13T13:39+09:00 | 2025-02-13T13:39+09:00 |
| jvndb-2025-000010 | acmailer vulnerable to cross-site scripting | 2025-02-12T15:05+09:00 | 2025-02-12T15:05+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14507 | Adobe Substance3D Designer越界写入漏洞 | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14506 | Adobe Audition越界读取漏洞(CNVD-2026-14506) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14505 | Adobe Audition缓冲区溢出漏洞(CNVD-2026-14505) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14504 | Adobe Substance3D Designer缓冲区溢出漏洞(CNVD-2026-14504) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14503 | Adobe Premiere Pro越界读取漏洞(CNVD-2026-14503) | 2026-03-17 | 2026-03-23 |
| cnvd-2026-14502 | Adobe Illustrator堆缓冲区溢出漏洞(CNVD-2026-14502) | 2026-03-17 | 2026-03-23 |
| cnvd-2026-14501 | Adobe Illustrator堆栈缓冲区溢出漏洞(CNVD-2026-14501) | 2026-03-17 | 2026-03-23 |
| cnvd-2026-14500 | 多款Apple产品信息泄露漏洞(CNVD-2026-14500) | 2026-02-05 | 2026-03-23 |
| cnvd-2026-14499 | 多款Apple产品越界读取漏洞(CNVD-2026-14499) | 2026-02-05 | 2026-03-23 |
| cnvd-2026-14498 | 多款Apple产品路径遍历漏洞 | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14497 | 多款Apple产品代码执行漏洞(CNVD-2026-14497) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14496 | 多款Apple产品信息泄露漏洞(CNVD-2026-14496) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14495 | 多款Apple产品信息泄露漏洞(CNVD-2026-14495) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14494 | 多款Apple产品存在未明漏洞(CNVD-2026-14494) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14493 | 多款Apple产品安全绕过漏洞(CNVD-2026-14493) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14492 | 多款Apple产品安全绕过漏洞(CNVD-2026-14492) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14491 | 多款Apple产品安全绕过漏洞(CNVD-2026-14491) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14490 | 多款Apple产品信息泄露漏洞(CNVD-2026-14490) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14489 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14489) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14488 | 多款Apple产品信息泄露漏洞(CNVD-2026-14488) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14487 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14487) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14486 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14486) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14485 | 多款Apple产品信息泄露漏洞(CNVD-2026-14485) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14484 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14484) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14483 | 多款Apple产品存在未明漏洞(CNVD-2026-14483) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14482 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14482) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14481 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14481) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14480 | 多款Apple产品信息泄露漏洞(CNVD-2026-14480) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14479 | 多款Apple产品安全绕过漏洞(CNVD-2026-14479) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14478 | 多款Apple产品信息泄露漏洞(CNVD-2026-14478) | 2026-03-02 | 2026-03-23 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15026 | Уязвимость функции do_register_framebuffer() компонента fbdev/core/fbmem.c ядра операцион… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15025 | Уязвимость компонента blocklayout/extent_tree.c ядра операционной системы Linux, позволяю… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15024 | Уязвимость компонента fbdev ядра операционной системы Linux, позволяющая нарушителю оказа… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15023 | Уязвимость компонента drivers/iommu/amd/init.c ядра операционной системы Linux, позволяющ… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15022 | Уязвимость ядра операционной системы Linux, связанная с недостатком использования функции… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15002 | Уязвимость компонента net/vmw_vsock/virtio_transport.c ядра операционной системы Linux, п… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15000 | Уязвимость компонента fs/ntfs3/file.c ядра операционной системы Linux, позволяющая наруши… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14999 | Уязвимость функции mem_pool_alloc() компонента mm/kmemleak.c ядра операционной системы Li… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14997 | Уязвимость функции find_hw_thread_mask() компонента drivers/infiniband/hw/hfi1/affinity.c… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14981 | Уязвимость компонента ipv6 ядра операционной системы Linux, позволяющая нарушителю вызват… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14979 | Уязвимость компонента huge_memory.c ядра операционной системы Linux, позволяющая нарушите… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14978 | Уязвимость компонента dmaengine ядра операционной системы Linux, позволяющая нарушителю в… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14977 | Уязвимость компонента ipv6 ядра операционной системы Linux, позволяющая нарушителю оказат… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14972 | Уязвимость компонента hid-ntrig ядра операционной системы Linux, позволяющая нарушителю в… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14971 | Уязвимость компонента scsi.c операционной системы Linux, позволяющая нарушителю вызвать о… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14970 | Уязвимость функции rray_index_nospec() ядра операционной системы Linux, позволяющая наруш… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14968 | Уязвимость компонента drm/amdkfd ядра операционной системы Linux, позволяющая нарушителю … | 03.12.2025 | 16.02.2026 |
| bdu:2025-14933 | Уязвимость компонента rseq.c ядра операционной системы Linux, позволяющая нарушителю оказ… | 02.12.2025 | 16.02.2026 |
| bdu:2025-14438 | Уязвимость функции elf_swap_shdr() программного средства разработки GNU Binutils, связанн… | 18.11.2025 | 16.02.2026 |
| bdu:2025-14421 | Уязвимость сервера FreeIpa, связанная с недостатками разграничения доступа, позволяющая н… | 18.11.2025 | 16.02.2026 |
| bdu:2025-14122 | Уязвимость функции __iodyn_find_io_region() ядра операционной системы Linux, позволяющая … | 14.11.2025 | 16.02.2026 |
| bdu:2025-14121 | Уязвимость функции arch_sync_kernel_mappings() ядра операционной системы Linux, позволяющ… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14120 | Уязвимость функции __populate_section_memmap() ядра операционной системы Linux, позволяющ… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14119 | Уязвимость функции set_track_prepare() ядра операционной системы Linux, позволяющая наруш… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14118 | Уязвимость функции batadv_nc_skb_decode_packet() ядра операционной системы Linux, позволя… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14117 | Уязвимость функции ocfs2_delete_osb() ядра операционной системы Linux, позволяющая наруши… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14116 | Уязвимость компонента scsi ядра операционной системы Linux, позволяющая нарушителю вызват… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14114 | Уязвимость функции __cifs_sfu_make_node() ядра операционной системы Linux, позволяющая на… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14100 | Уязвимость функции do_sme_acc() ядра операционной системы Linux, позволяющая нарушителю в… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14099 | Уязвимость функции bpf_exec_tx_verdict() компонента bpf ядра операционной системы Linux, … | 14.11.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200610-0022 | User interface inconsistency in Workgroup Manager in Apple Mac OS X 10.4 through 10.4.7 a… | 2024-07-23T21:56:15.078000Z |
| var-200905-0505 | Array index error in the insertItemBefore method in WebKit, as used in Apple Safari befor… | 2024-07-23T21:56:07.125000Z |
| var-201912-0618 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:36.712000Z |
| var-202112-2011 | Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 an… | 2024-07-23T21:55:35.394000Z |
| var-201810-0932 | The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side chan… | 2024-07-23T21:55:35.727000Z |
| var-201210-0063 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:55:35.147000Z |
| var-200809-0182 | ImageIO in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows context-dependent attack… | 2024-07-23T21:55:33.188000Z |
| var-201903-0417 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:16.315000Z |
| var-201912-0597 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:13.309000Z |
| var-200809-0009 | ImageIO in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows context-dependent attack… | 2024-07-23T21:55:12.610000Z |
| var-201704-1589 | In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server t… | 2024-07-23T21:55:11.835000Z |
| var-200911-0398 | The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Int… | 2024-07-23T21:54:40.707000Z |
| var-201912-0128 | A logic issue was addressed with improved state management. This issue is fixed in watchO… | 2024-07-23T21:54:39.274000Z |
| var-201502-0366 | named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when D… | 2024-07-23T21:54:05.549000Z |
| var-201006-1183 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2024-07-23T21:53:56.790000Z |
| var-202003-1784 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:53:51.536000Z |
| var-201302-0132 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:53:51.971000Z |
| var-201711-0447 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:53:49.059000Z |
| var-201805-0963 | Systems with microprocessors utilizing speculative execution and speculative execution of… | 2024-07-23T21:53:48.206000Z |
| var-200102-0104 | "Multiple Users" Control Panel in Mac OS 9 allows Normal users to gain Owner privileges b… | 2024-07-23T21:53:48.441000Z |
| var-201403-0387 | Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python … | 2024-07-23T21:53:47.789000Z |
| var-201208-0344 | libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, does not pro… | 2024-07-23T21:53:17.145000Z |
| var-201910-1495 | The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print… | 2024-07-23T21:53:16.217000Z |
| var-201912-0579 | A logic issue existed in the handling of synchronous page loads. This issue was addressed… | 2024-07-23T21:53:15.777000Z |
| var-200905-0196 | racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denia… | 2024-07-23T21:53:12.318000Z |
| var-200609-0315 | Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary c… | 2024-07-23T21:53:10.410000Z |
| var-202212-1751 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2024-07-23T21:52:34.161000Z |
| var-201404-0398 | Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 an… | 2024-07-23T21:52:34.093000Z |
| var-201008-0172 | Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType befor… | 2024-07-23T21:52:33.872000Z |
| var-202108-2172 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:52:30.241000Z |