Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1509 |
5.4 (3.1)
|
Avada (Fusion) Builder <= 3.15.1 - Authenticated (Subs… |
themefusion |
Avada (Fusion) Builder |
2026-04-15T01:25:18.275Z | 2026-04-15T16:13:37.307Z |
| CVE-2026-1541 |
4.3 (3.1)
|
Avada (Fusion) Builder <= 3.15.1 - Authenticated (Subs… |
themefusion |
Avada (Fusion) Builder |
2026-04-15T01:25:17.892Z | 2026-04-15T15:56:52.964Z |
| CVE-2026-4812 |
5.3 (3.1)
|
Advanced Custom Fields (ACF®) <= 6.7.0 - Unauthenticat… |
wpengine |
Advanced Custom Fields (ACF®) |
2026-04-15T01:25:17.540Z | 2026-04-15T16:01:25.621Z |
| CVE-2026-2834 |
7.2 (3.1)
|
Age Verification & Identity Verification by Token of T… |
tokenoftrust |
Age Verification & Identity Verification by Token of Trust |
2026-04-15T01:25:16.957Z | 2026-04-15T13:22:48.260Z |
| CVE-2025-54550 |
N/A
|
Apache Airflow: RCE by race condition in example_xcom dag |
Apache Software Foundation |
Apache Airflow |
2026-04-15T00:22:03.305Z | 2026-04-16T12:05:38.834Z |
| CVE-2026-33806 |
7.5 (3.1)
|
fastify vulnerable to Body Schema Validation Bypass vi… |
fastify |
fastify |
2026-04-15T00:14:02.376Z | 2026-04-15T16:13:42.961Z |
| CVE-2026-40105 |
6.5 (4.0)
|
XWiki has Reflected Cross-Site Scripting (XSS) in its … |
xwiki |
xwiki-platform |
2026-04-15T00:07:23.150Z | 2026-04-15T16:13:48.450Z |
| CVE-2026-40104 |
6.9 (4.0)
|
XWiki's REST APIs can list all pages/spaces, leading t… |
xwiki |
org.xwiki.platform:xwiki-platform-oldcore |
2026-04-15T00:01:58.583Z | 2026-04-15T00:01:58.583Z |
| CVE-2026-30996 |
7.5 (3.1)
|
An issue in the file handling logic of the compon… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T18:05:30.972Z |
| CVE-2026-30995 |
8.6 (3.1)
|
Slah CMS v1.5.0 and below was discovered to conta… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T17:23:41.420Z |
| CVE-2026-30994 |
7.5 (3.1)
|
Incorrect access control in the config.php compon… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T18:06:38.418Z |
| CVE-2026-30993 |
N/A
|
Slah CMS v1.5.0 and below was discovered to conta… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T17:24:08.072Z |
| CVE-2026-30625 |
N/A
|
Upsonic 0.71.6 contains a remote code execution v… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T14:54:37.529Z |
| CVE-2026-30624 |
8.6 (3.1)
|
Agent Zero 0.9.8 contains a remote code execution… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T18:02:40.808Z |
| CVE-2026-30617 |
8.6 (3.1)
|
LangChain-ChatChat 0.3.1 contains a remote code e… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T18:00:20.495Z |
| CVE-2026-30616 |
7.3 (3.1)
|
Jaaz 1.0.30 contains a remote code execution vuln… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T17:56:48.614Z |
| CVE-2026-30615 |
8 (3.1)
|
A prompt injection vulnerability in Windsurf 1.95… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T17:54:48.560Z |
| CVE-2026-30461 |
N/A
|
Daylight Studio FuelCMS v1.5.2 was discovered to … |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T15:37:12.754Z |
| CVE-2026-30364 |
7.5 (3.1)
|
CentSDR commit e40795 was discovered to contain a… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T17:49:52.557Z |
| CVE-2025-67841 |
N/A
|
Nordic Semiconductor IronSide SE for nRF54H20 bef… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T15:29:43.634Z |
| CVE-2024-53412 |
8.4 (3.1)
|
Command injection in the connect function in Niet… |
n/a |
n/a |
2026-04-15T00:00:00.000Z | 2026-04-15T17:27:22.513Z |
| CVE-2026-40096 |
5.1 (4.0)
|
immich: Open Redirect via Shared Album name |
immich-app |
immich |
2026-04-14T23:54:17.662Z | 2026-04-15T16:19:07.744Z |
| CVE-2026-40091 |
6 (3.1)
|
SpiceDB: SPICEDB_DATASTORE_CONN_URI is leaked on start… |
authzed |
spicedb |
2026-04-14T23:50:25.479Z | 2026-04-15T13:23:15.155Z |
| CVE-2026-40090 |
7.1 (3.1)
|
Zarf has a Path Traversal via Malicious Package Metada… |
zarf-dev |
zarf |
2026-04-14T23:46:18.804Z | 2026-04-15T16:13:54.180Z |
| CVE-2026-39984 |
5.5 (3.1)
|
Sigstore Timestamp Authority has Improper Certificate … |
sigstore |
timestamp-authority |
2026-04-14T23:41:47.909Z | 2026-04-14T23:41:47.909Z |
| CVE-2026-39971 |
7.2 (3.1)
|
Serendipity: Host Header Injection leads to SMTP heade… |
s9y |
Serendipity |
2026-04-14T23:35:49.305Z | 2026-04-15T16:22:04.004Z |
| CVE-2026-39963 |
6.9 (3.1)
|
Serendipity: Host Header Injection enables authenticat… |
s9y |
Serendipity |
2026-04-14T23:31:13.843Z | 2026-04-15T13:23:48.591Z |
| CVE-2026-1314 |
5.3 (3.1)
|
3D FlipBook – PDF Embedder, PDF Flipbook Viewer, Flipb… |
iberezansky |
3D FlipBook – PDF Embedder, PDF Flipbook Viewer, Flipbook Image Gallery |
2026-04-14T23:26:07.668Z | 2026-04-15T16:22:29.670Z |
| CVE-2026-2396 |
4.4 (3.1)
|
List View Google Calendar <= 7.4.3 - Authenticated (Ad… |
kimipooh |
List View Google Calendar |
2026-04-14T23:26:07.293Z | 2026-04-16T13:24:58.936Z |
| CVE-2025-15470 |
6.5 (3.1)
|
Eleganzo <= 1.2 - Authenticated (Subscriber+) Arbitrar… |
DesigningMedia |
Eleganzo |
2026-04-14T23:26:06.733Z | 2026-04-15T17:26:49.516Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-40897 |
7.2 (4.0)
8.1 (3.1)
|
Incorrect authorization for Threat Intelligence in Gua… |
Nozomi Networks |
Guardian |
2026-04-15T08:18:05.174Z | 2026-04-15T13:20:48.924Z |
| CVE-2026-5088 |
7.5 (3.1)
|
Apache::API::Password versions through v0.5.2 for Perl… |
JDEGUEST |
Apache::API::Password |
2026-04-15T07:03:13.742Z | 2026-04-16T12:05:32.095Z |
| CVE-2026-6293 |
4.3 (3.1)
|
Inquiry form to posts or pages <= 1.0 - Cross-Site Req… |
udamadu |
Inquiry form to posts or pages |
2026-04-15T06:46:18.890Z | 2026-04-16T13:38:48.144Z |
| CVE-2026-40719 |
7.5 (3.1)
|
Deadwood in MaraDNS 3.5.0036 allows attackers to … |
MaraDNS |
MaraDNS |
2026-04-15T06:23:09.912Z | 2026-04-15T13:22:14.897Z |
| CVE-2026-5160 |
6.1 (3.1)
|
Versions of the package github.com/yuin/goldmark/… |
n/a |
github.com/yuin/goldmark/renderer/html |
2026-04-15T05:00:01.655Z | 2026-04-15T18:07:10.025Z |
| CVE-2026-5397 |
7.8 (3.1)
|
Vulnerability Related to an Uncontrolled Search Path E… |
OMRON SOCIAL SOLUTIONS CO., Ltd. |
PowerAttendant Standard Edition |
2026-04-15T04:11:29.716Z | 2026-04-15T16:13:26.313Z |
| CVE-2026-26291 |
5.4 (3.0)
4.8 (4.0)
|
Stored cross-site scripting vulnerability exists … |
GROWI, Inc. |
GROWI |
2026-04-15T04:19:31.678Z | 2026-04-15T16:13:20.770Z |
| CVE-2026-40499 |
8.4 (4.0)
|
radare2 < 6.1.4 Command Injection via PDB Parser print… |
radareorg |
radare2 |
2026-04-15T02:05:20.899Z | 2026-04-16T01:01:14.730Z |
| CVE-2026-39963 |
6.9 (3.1)
|
Serendipity: Host Header Injection enables authenticat… |
s9y |
Serendipity |
2026-04-14T23:31:13.843Z | 2026-04-15T13:23:48.591Z |
| CVE-2026-39884 |
8.3 (3.1)
|
MCP Server Kubernetes has Argument Injection in its po… |
Flux159 |
mcp-server-kubernetes |
2026-04-14T23:25:59.780Z | 2026-04-15T16:13:59.605Z |
| CVE-2025-54550 |
N/A
|
Apache Airflow: RCE by race condition in example_xcom dag |
Apache Software Foundation |
Apache Airflow |
2026-04-15T00:22:03.305Z | 2026-04-16T12:05:38.834Z |
| CVE-2026-40688 |
6.7 (3.1)
|
An out-of-bounds write vulnerability [CWE-787] vu… |
Fortinet |
FortiWeb |
2026-04-14T22:35:15.438Z | 2026-04-16T03:55:18.342Z |
| CVE-2026-39399 |
9.6 (3.1)
|
NuGet Gallery: Arbitrary Blob Overwrite via Nuspec Con… |
NuGet |
NuGetGallery |
2026-04-14T23:01:38.176Z | 2026-04-15T14:42:02.662Z |
| CVE-2026-39387 |
7.2 (3.1)
|
BoidCMS: Local File Inclusion (LFI) leads to Remote Co… |
BoidCMS |
BoidCMS |
2026-04-14T22:56:20.935Z | 2026-04-15T13:42:26.866Z |
| CVE-2026-35589 |
8 (3.1)
|
nanobot: Cross-Site WebSocket Hijacking in WhatsApp Br… |
HKUDS |
nanobot |
2026-04-14T22:47:32.837Z | 2026-04-15T16:14:06.128Z |
| CVE-2026-35034 |
6.5 (3.1)
|
Jellyfin: Potential Application DoS from excessively l… |
jellyfin |
jellyfin |
2026-04-14T22:31:44.796Z | 2026-04-15T17:48:39.733Z |
| CVE-2026-35033 |
9.3 (4.0)
|
Jellyfin: Potential SSRF + Arbitrary file read via str… |
jellyfin |
jellyfin |
2026-04-14T22:28:47.558Z | 2026-04-15T13:36:26.787Z |
| CVE-2026-35032 |
8.6 (4.0)
|
Jellyfin: Potential SSRF + Arbitrary file read via Liv… |
jellyfin |
jellyfin |
2026-04-14T22:25:35.729Z | 2026-04-15T20:02:29.887Z |
| CVE-2026-35031 |
10 (3.1)
|
Jellyfin: Potential RCE via subtitle upload path trave… |
jellyfin |
jellyfin |
2026-04-14T22:18:30.565Z | 2026-04-14T22:18:30.565Z |
| CVE-2026-34457 |
9.1 (3.1)
|
OAuth2 Proxy: Health Check User-Agent Matching Bypasse… |
oauth2-proxy |
oauth2-proxy |
2026-04-14T22:14:38.937Z | 2026-04-15T17:43:30.711Z |
| CVE-2026-34454 |
3.5 (3.1)
|
OAuth2 Proxy: Session cookie not cleared when renderin… |
oauth2-proxy |
oauth2-proxy |
2026-04-14T22:10:37.901Z | 2026-04-15T13:30:10.300Z |
| CVE-2026-33414 |
4 (4.0)
|
PowerShell Command Injection in Podman HyperV Machine |
containers |
podman |
2026-04-14T22:42:19.822Z | 2026-04-14T22:42:19.822Z |
| CVE-2026-33023 |
7.8 (3.1)
|
libsixel: Use-after-free in load_with_gdkpixbuf() |
saitoha |
libsixel |
2026-04-14T22:05:31.493Z | 2026-04-15T20:02:36.839Z |
| CVE-2026-33021 |
7.3 (3.1)
|
libsixel: Use-after-free in sixel_encoder_encode_bytes() |
saitoha |
libsixel |
2026-04-14T21:57:22.817Z | 2026-04-14T21:57:22.817Z |
| CVE-2026-27301 |
5.5 (3.1)
|
Adobe Framemaker | Heap-based Buffer Overflow (CWE-122) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:13.588Z | 2026-04-15T17:30:38.862Z |
| CVE-2026-27300 |
5.5 (3.1)
|
Adobe Framemaker | Access of Uninitialized Pointer (CWE-824) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:18.661Z | 2026-04-15T17:29:10.177Z |
| CVE-2026-27299 |
6.3 (3.1)
|
Adobe Framemaker | Improper Input Validation (CWE-20) |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:12.664Z | 2026-04-15T13:28:12.518Z |
| CVE-2026-27298 |
7.8 (3.1)
|
Adobe Framemaker | Access of Resource Using Incompatib… |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:16.131Z | 2026-04-15T09:13:10.357Z |
| CVE-2026-27297 |
7.8 (3.1)
|
Adobe Framemaker | Integer Underflow (Wrap or Wraparou… |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:20.265Z | 2026-04-15T09:13:09.916Z |
| CVE-2026-27296 |
7.8 (3.1)
|
Adobe Framemaker | Integer Underflow (Wrap or Wraparou… |
Adobe |
Adobe Framemaker |
2026-04-14T22:58:17.850Z | 2026-04-15T09:13:10.081Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2024 | The PhotoStack Gallery plugin for WordPress is vulnerable to SQL Injection via the 'postid' paramet… | 2026-02-14T07:16:13.020 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-2022 | The Smart Forms plugin for WordPress is vulnerable to unauthorized access of data due to a missing … | 2026-02-14T07:16:12.847 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1988 | The Flexi Product Slider and Grid for WooCommerce plugin for WordPress is vulnerable to Local File … | 2026-02-14T07:16:12.670 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1987 | The Scheduler Widget plugin for WordPress is vulnerable to Insecure Direct Object Reference in all … | 2026-02-14T07:16:12.493 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1985 | The Press3D plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 3D Model Gute… | 2026-02-14T07:16:12.320 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1944 | The CallbackKiller service widget plugin for WordPress is vulnerable to unauthorized modification o… | 2026-02-14T07:16:12.150 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1939 | The Percent to Infograph plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the … | 2026-02-14T07:16:11.977 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1915 | The Simple Plyr plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'poster' … | 2026-02-14T07:16:11.803 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1910 | The UpMenu – Online ordering for restaurants plugin for WordPress is vulnerable to Stored Cross-Sit… | 2026-02-14T07:16:11.633 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1905 | The Sphere Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'width… | 2026-02-14T07:16:11.460 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1903 | The Ravelry Designs Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via th… | 2026-02-14T07:16:11.283 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1901 | The QuestionPro Surveys plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '… | 2026-02-14T07:16:11.113 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1796 | The StyleBidet plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the URL pat… | 2026-02-14T07:16:10.903 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1795 | The Address Bar Ads plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the UR… | 2026-02-14T07:16:10.733 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1792 | The Geo Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the URL path i… | 2026-02-14T07:16:10.553 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1394 | The WP Quick Contact Us plugin for WordPress is vulnerable to Cross-Site Request Forgery in all ver… | 2026-02-14T07:16:10.343 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1306 | The midi-Synth plugin for WordPress is vulnerable to arbitrary file uploads due to missing file typ… | 2026-02-14T07:16:10.150 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1303 | The MailChimp Campaigns plugin for WordPress is vulnerable to Missing Authorization in all versions… | 2026-02-14T07:16:09.970 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1187 | The ZoomifyWP Free plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'filen… | 2026-02-14T07:16:09.800 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-1096 | The Best-wp-google-map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'l… | 2026-02-14T07:16:09.627 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0753 | The Super Simple Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting … | 2026-02-14T07:16:09.450 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0751 | The Payment Page | Payment Form for Stripe plugin for WordPress is vulnerable to Stored Cross-Site … | 2026-02-14T07:16:09.283 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0745 | The User Language Switch plugin for WordPress is vulnerable to Server-Side Request Forgery in all v… | 2026-02-14T07:16:09.113 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0736 | The Chatbot for WordPress by Collect.chat plugin for WordPress is vulnerable to Stored Cross-Site S… | 2026-02-14T07:16:08.940 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0735 | The User Language Switch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the … | 2026-02-14T07:16:08.770 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0727 | The Accordion and Accordion Slider plugin for WordPress is vulnerable to authorization bypass in al… | 2026-02-14T07:16:08.590 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0693 | The Allow HTML in Category Descriptions plugin for WordPress is vulnerable to Stored Cross-Site Scr… | 2026-02-14T07:16:08.417 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0559 | The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vul… | 2026-02-14T07:16:08.240 | 2026-04-15T00:35:42.020 |
| fkie_cve-2026-0557 | The WP Data Access plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin… | 2026-02-14T07:16:08.053 | 2026-04-15T00:35:42.020 |
| fkie_cve-2025-6792 | The One to one user Chat by WPGuppy plugin for WordPress is vulnerable to unauthorized access of da… | 2026-02-14T07:16:07.270 | 2026-04-15T00:35:42.020 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-fj52-5g4h-gmq8 |
2.9 (4.0)
|
pyLoad's Session Not Invalidated After Permission Changes | 2026-04-14T23:39:25Z | 2026-04-14T23:39:25Z |
| ghsa-66hx-chf7-3332 |
8.8 (3.1)
|
pyLoad has Stale Session Privilege After Role/Permission Change (Privilege Revocation Bypass) | 2026-04-14T23:38:35Z | 2026-04-14T23:38:35Z |
| ghsa-95wr-3f2v-v2wh |
5.5 (4.0)
|
Craft CMS has a host header injection leading to SSRF via resource-js endpoint | 2026-04-14T23:36:09Z | 2026-04-14T23:36:10Z |
| ghsa-3m9m-24vh-39wx |
5.5 (4.0)
|
Server-Side Request Forgery (SSRF) in Craft CMS with Asset Uploads Mutations | 2026-04-14T23:35:16Z | 2026-04-14T23:35:16Z |
| ghsa-jq2f-59pj-p3m3 |
5.3 (4.0)
|
Craft CMS has a Missing Authorization Check on User Group Removal via save-permissions Action | 2026-04-14T23:34:52Z | 2026-04-14T23:34:52Z |
| ghsa-hw5x-4r37-72w7 |
3.1 (3.1)
|
OpenTofu has unbounded memory usage, high CPU usage, or deadlock in "tofu init" with maliciously-cr… | 2026-04-14T23:34:08Z | 2026-04-14T23:34:09Z |
| ghsa-fcpv-w245-r2q7 |
|
DotNetNuke.Core security code analysis rules triggered | 2026-04-14T23:33:30Z | 2026-04-14T23:33:30Z |
| ghsa-pq96-pwvg-vrr9 |
6.5 (3.1)
|
frp has an authentication bypass in HTTP vhost routing when routeByHTTPUser is used for access control | 2026-04-14T23:33:15Z | 2026-04-14T23:33:15Z |
| ghsa-x928-4434-crqj |
3.7 (3.1)
|
ImageMagick has a memory leak in PNG encoder when writing a MNG image | 2026-04-14T23:32:44Z | 2026-04-14T23:32:44Z |
| ghsa-pmpg-6pww-fg6q |
3.3 (3.1)
|
ImageMagick has out-of-bounds access in ConnectedComponentsImage() via CLI-controlled connected-com… | 2026-04-14T23:32:35Z | 2026-04-14T23:32:35Z |
| ghsa-8vfj-q2cp-5m5j |
3.3 (3.1)
|
ImageMagick has a heap buffer overflow read in magnify operation via unrecognized magnify:method value | 2026-04-14T23:32:22Z | 2026-04-14T23:32:22Z |
| ghsa-98cp-rj9f-6v5g |
6.9 (3.1)
|
ImageMagick has has a stack-buffer-overflow in MNG encoder with oversized pallete | 2026-04-14T23:31:52Z | 2026-04-14T23:31:52Z |
| ghsa-q8h3-jv9v-57qx |
3.3 (3.1)
|
ImageMagick has has an off-by-one origin validation in allows out-of-bounds read in morphology processing | 2026-04-14T23:31:38Z | 2026-04-14T23:31:38Z |
| ghsa-w54j-7wpm-crhj |
3.3 (3.1)
|
ImageMagick has a heap-buffer-overflow in FTXT encoder | 2026-04-14T23:31:31Z | 2026-04-14T23:31:32Z |
| ghsa-w3x6-4m5h-cxqf |
7.5 (3.1)
|
Microsoft Security Advisory CVE-2026-26171 – .NET Denial of Service Vulnerability | 2026-04-14T23:31:08Z | 2026-04-15T16:10:52Z |
| ghsa-37gx-xxp4-5rgx |
7.5 (3.1)
|
Microsoft Security Advisory CVE-2026-33116 – .NET, .NET Framework, and Visual Studio Denial of Serv… | 2026-04-14T23:30:27Z | 2026-04-15T16:44:52Z |
| ghsa-vmwf-m9c5-3jvc |
0.0 (3.1)
|
Microsoft Security Advisory CVE-2026-32178 – .NET Spoofing Vulnerability | 2026-04-14T23:27:52Z | 2026-04-14T23:27:52Z |
| ghsa-pq8p-wc4f-vg7j |
8.8 (4.0)
|
WWBN AVideo has an incomplete fix for CVE-2026-33502: Command Injection | 2026-04-14T23:27:18Z | 2026-04-14T23:27:18Z |
| ghsa-m7r8-6q9j-m2hc |
5.9 (4.0)
|
WWBN AVideo has an incomplete fix for CVE-2026-33500: XSS | 2026-04-14T23:25:28Z | 2026-04-14T23:25:28Z |
| ghsa-m63r-m9jh-3vc6 |
6.5 (3.1)
|
WWBN AVideo has an Incomplete fix: Directory traversal bypass via query string in ReceiveImage down… | 2026-04-14T23:23:14Z | 2026-04-14T23:23:14Z |
| ghsa-26wg-9xf2-q495 |
8.1 (3.1)
|
Novu has a XSS sanitization bypass | 2026-04-14T23:23:01Z | 2026-04-14T23:23:01Z |
| ghsa-4x48-cgf9-q33f |
|
Novu has SSRF via conditions filter webhook bypasses validateUrlSsrf() protection | 2026-04-14T23:22:48Z | 2026-04-14T23:22:48Z |
| ghsa-8pv3-29pp-pf8f |
5.4 (3.1)
|
WWBN AVideo has Stored XSS via Unanchored Duration Regex in Video Encoder Receiver | 2026-04-14T23:22:21Z | 2026-04-14T23:22:21Z |
| ghsa-j432-4w3j-3w8j |
7.7 (3.1)
|
WWBN AVideo has a SSRF via same-domain hostname with alternate port bypasses isSSRFSafeURL | 2026-04-14T23:22:01Z | 2026-04-14T23:22:01Z |
| ghsa-5879-4fmr-xwf2 |
6.9 (4.0)
|
WWBN AVideo has an incomplete fix for CVE-2026-33293: Path Traversal | 2026-04-14T23:21:31Z | 2026-04-14T23:21:31Z |
| ghsa-ff5q-cc22-fgp4 |
7.1 (3.1)
|
WWBN AVideo has a CORS Origin Reflection Bypass via plugin/API/router.php and allowOrigin(true) Exp… | 2026-04-14T23:18:28Z | 2026-04-14T23:18:28Z |
| ghsa-ccq9-r5cw-5hwq |
8.1 (3.1)
|
WWBN AVideo has CORS Origin Reflection with Credentials on Sensitive API Endpoints Enables Cross-Or… | 2026-04-14T23:18:19Z | 2026-04-14T23:18:19Z |
| ghsa-793q-xgj6-7frp |
5.3 (3.1)
|
WWBN AVideo has an incomplete fix for CVE-2026-33039: SSRF | 2026-04-14T23:15:43Z | 2026-04-14T23:15:43Z |
| ghsa-7jrq-q4pq-rhm6 |
8.0 (4.0)
|
Oxia's TLS CA certificate chain validation fails with multi-certificate PEM bundles | 2026-04-14T23:15:16Z | 2026-04-14T23:15:16Z |
| ghsa-5gqc-qhrj-9xw8 |
8.7 (4.0)
|
Oxia affected by server crash via race condition in session heartbeat handling | 2026-04-14T23:15:00Z | 2026-04-14T23:15:00Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-205 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using … | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-19T19:19:01.519824+00:00 |
| pysec-2024-164 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an exces… | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-16T21:21:41.436934+00:00 |
| pysec-2024-40 |
|
orjson.loads in orjson before 3.9.15 does not limit recursion for deeply nested JSON documents. | orjson | 2024-02-26T16:28:00+00:00 | 2024-02-26T18:22:26.039698+00:00 |
| pysec-2024-253 |
|
pretix before 2024.1.1 mishandles file validation. | pretix | 2024-02-26T16:28:00+00:00 | 2025-06-11T15:23:51.683422+00:00 |
| pysec-2024-235 |
8.1 (3.1)
|
With the following crawler configuration: ```python from bs4 import BeautifulSoup as Sou… | langchain-exa | 2024-02-26T16:27:49+00:00 | 2025-02-26T02:48:56.937312+00:00 |
| pysec-2024-39 |
|
Versions of the package fastecdsa before 2.3.2 are vulnerable to Use of Uninitialized Var… | fastecdsa | 2024-02-24T05:15:00+00:00 | 2024-02-24T07:19:09.418536+00:00 |
| pysec-2024-241 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untru… | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.946136+00:00 |
| pysec-2024-240 |
9.6 (3.1)
|
Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe. This … | mlflow | 2024-02-23T22:15:55+00:00 | 2025-04-08T10:23:24.900947+00:00 |
| pysec-2024-223 |
9.1 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds … | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:22.060512+00:00 |
| pysec-2024-222 |
7.5 (3.1)
|
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Trav… | onnx | 2024-02-23T18:15:50+00:00 | 2025-01-22T16:23:21.994731+00:00 |
| pysec-2024-249 |
6.1 (3.1)
|
### Summary On all Label Studio versions prior to 1.11.0, data imported via file upload f… | label-studio | 2024-02-22T22:15:47+00:00 | 2025-05-19T11:22:35.312280+00:00 |
| pysec-2024-226 |
7.8 (3.1)
|
Pymatgen (Python Materials Genomics) is an open-source Python library for materials analy… | pymatgen | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:28.734730+00:00 |
| pysec-2024-225 |
7.5 (3.1)
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2024-02-21T17:15:09+00:00 | 2025-02-06T00:34:24.427679+00:00 |
| pysec-2024-155 |
7.5 (3.1)
|
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) … | cbor2 | 2024-02-19T23:15:07+00:00 | 2025-01-14T05:22:09.226388+00:00 |
| pysec-2024-107 |
5.0 (3.1)
|
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modif… | exiv2 | 2024-02-12T23:15:00+00:00 | 2024-10-23T00:00:00+00:00 |
| pysec-2024-106 |
5.0 (3.1)
|
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modif… | exiv2 | 2024-02-12T23:15:00+00:00 | 2024-10-23T00:00:00+00:00 |
| pysec-2024-104 |
5.3 (3.1)
|
A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of … | jwcrypto | 2024-02-12T14:15:00+00:00 | 2024-10-10T17:22:00.587279+00:00 |
| pysec-2024-37 |
6.5 (3.1)
|
nonebot2 is a cross-platform Python asynchronous chatbot framework written in Python. Thi… | nonebot2 | 2024-02-09T23:15:00+00:00 | 2024-02-16T16:22:37.389642+00:00 |
| pysec-2024-125 |
7.5 (3.1)
|
DIRAC is a distributed resource framework. In affected versions any user could get a toke… | dirac | 2024-02-09T00:15:00+00:00 | 2024-11-21T14:22:45.495938+00:00 |
| pysec-2024-150 |
9.8 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. Arrays can … | vyper | 2024-02-07T17:15:00+00:00 | 2024-11-21T14:23:03.024978+00:00 |
| pysec-2024-28 |
|
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 be… | django | 2024-02-06T22:16:00+00:00 | 2024-02-07T00:25:46.826634+00:00 |
| pysec-2024-36 |
5.5 (3.1)
|
An information disclosure flaw was found in ansible-core due to a failure to respect the … | ansible-core | 2024-02-06T12:15:00+00:00 | 2024-02-14T07:20:09.911618+00:00 |
| pysec-2024-147 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. There is an error in the stack m… | vyper | 2024-02-05T21:15:00+00:00 | 2024-11-21T14:23:02.864019+00:00 |
| pysec-2024-38 |
7.5 (3.1)
|
FastAPI is a web framework for building APIs with Python 3.8+ based on standard Python ty… | fastapi | 2024-02-05T15:15:00+00:00 | 2024-02-16T18:22:32.607118+00:00 |
| pysec-2024-148 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. When calls … | vyper | 2024-02-02T17:15:00+00:00 | 2024-11-21T14:23:02.917464+00:00 |
| pysec-2024-35 |
5.4 (3.1)
|
Versions of the package dash-core-components before 2.13.0; all versions of the package d… | dash | 2024-02-02T05:15:00+00:00 | 2024-02-10T07:18:43.563257+00:00 |
| pysec-2024-149 |
9.8 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In versions… | vyper | 2024-02-01T17:15:00+00:00 | 2024-11-21T14:23:02.970591+00:00 |
| pysec-2024-29 |
4.9 (3.1)
|
OctoPrint is a web interface for 3D printer.s OctoPrint versions up until and including 1… | octoprint | 2024-01-31T18:15:00+00:00 | 2024-02-08T07:19:40.535297+00:00 |
| pysec-2024-127 |
5.3 (3.1)
|
Label Studio is a popular open source data labeling tool. The vulnerability affects all v… | label-studio | 2024-01-31T17:15:00+00:00 | 2024-11-21T14:22:53.294472+00:00 |
| pysec-2024-151 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Vyper compi… | vyper | 2024-01-30T21:15:00+00:00 | 2024-11-21T14:23:03.091183+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2485 | Malicious code in strapi-plugin-sync (npm) | 2026-04-03T17:24:04Z | 2026-04-07T15:47:31Z |
| mal-2026-2464 | Malicious code in strapi-plugin-health (npm) | 2026-04-03T17:23:49Z | 2026-04-07T15:47:31Z |
| mal-2026-2469 | Malicious code in strapi-plugin-logger (npm) | 2026-04-03T16:13:59Z | 2026-04-07T15:47:31Z |
| mal-2026-2470 | Malicious code in strapi-plugin-monitor (npm) | 2026-04-03T16:13:14Z | 2026-04-07T16:38:18Z |
| mal-2026-2467 | Malicious code in strapi-plugin-hooks (npm) | 2026-04-03T16:11:54Z | 2026-04-07T15:47:31Z |
| mal-2026-2456 | Malicious code in strapi-plugin-core (npm) | 2026-04-03T16:11:29Z | 2026-04-07T15:47:31Z |
| mal-2026-2458 | Malicious code in strapi-plugin-database (npm) | 2026-04-03T16:11:12Z | 2026-04-07T15:47:31Z |
| mal-2026-2483 | Malicious code in strapi-plugin-server (npm) | 2026-04-03T16:10:54Z | 2026-04-07T14:41:25Z |
| mal-2026-2454 | Malicious code in strapi-plugin-config (npm) | 2026-04-03T16:10:23Z | 2026-04-07T15:47:31Z |
| mal-2026-2457 | Malicious code in strapi-plugin-cron (npm) | 2026-04-03T16:09:41Z | 2026-04-07T15:47:31Z |
| mal-2026-2448 | Malicious code in supervisors (PyPI) | 2026-04-03T11:40:59Z | 2026-04-03T11:40:59Z |
| mal-2026-2460 | Malicious code in strapi-plugin-events (npm) | 2026-04-03T11:03:27Z | 2026-04-07T15:47:31Z |
| mal-2026-2449 | Malicious code in mgc (npm) | 2026-04-03T11:03:27Z | 2026-04-07T14:41:23Z |
| mal-2026-2446 | Malicious code in @corpweb-ui/wmkt-library (npm) | 2026-04-03T08:18:07Z | 2026-04-07T14:41:19Z |
| mal-2026-2447 | Malicious code in @toprank/partner (npm) | 2026-04-03T07:43:43Z | 2026-04-07T14:41:20Z |
| mal-2026-2433 | Malicious code in pycolorlib3 (PyPI) | 2026-04-02T20:38:16Z | 2026-04-16T07:40:04Z |
| mal-2026-2432 | Malicious code in nwin64tls (PyPI) | 2026-04-02T20:28:37Z | 2026-04-02T20:28:37Z |
| mal-2026-2431 | Malicious code in nwin32tls (PyPI) | 2026-04-02T20:26:19Z | 2026-04-02T20:26:19Z |
| mal-2026-2443 | Malicious code in exprrrress (npm) | 2026-04-02T18:21:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2442 | Malicious code in expreeeess (npm) | 2026-04-02T18:11:34Z | 2026-04-07T14:41:21Z |
| mal-2026-2439 | Malicious code in expeewas (npm) | 2026-04-02T15:22:21Z | 2026-04-07T14:41:21Z |
| mal-2026-2445 | Malicious code in pro-express (npm) | 2026-04-02T15:21:37Z | 2026-04-07T14:41:24Z |
| mal-2026-2441 | Malicious code in expirs (npm) | 2026-04-02T15:13:53Z | 2026-04-07T14:41:21Z |
| mal-2026-2437 | Malicious code in exaprse (npm) | 2026-04-02T15:12:58Z | 2026-04-07T14:41:21Z |
| mal-2026-2444 | Malicious code in exszpe3szs (npm) | 2026-04-02T15:12:47Z | 2026-04-07T14:41:21Z |
| mal-2026-2435 | Malicious code in 4xperss (npm) | 2026-04-02T15:12:23Z | 2026-04-07T14:41:19Z |
| mal-2026-2438 | Malicious code in expeedsxs (npm) | 2026-04-02T15:12:22Z | 2026-04-07T14:41:21Z |
| mal-2026-2434 | Malicious code in 4exepreds (npm) | 2026-04-02T15:12:19Z | 2026-04-07T14:41:19Z |
| mal-2026-2436 | Malicious code in eixp4ressz (npm) | 2026-04-02T15:12:04Z | 2026-04-07T14:41:21Z |
| mal-2026-2440 | Malicious code in experedzss (npm) | 2026-04-02T15:11:56Z | 2026-04-07T14:41:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0207 | Red Hat Enterprise Linux (urllib3): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0203 | SmarterTools SmarterMail: Schwachstelle ermöglicht Umgehung | 2026-01-22T23:00:00.000+00:00 | 2026-02-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0202 | Logback: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-22T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0199 | Red Hat OpenShift Pipelines Operator (Fulcio): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0198 | Red Hat OpenShift und OpenShift AI (urllib3): Schwachstelle ermöglicht Denial of Service | 2026-01-22T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0196 | CPython: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-01-21T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0194 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0190 | vllm: Mehrere Schwachstellen | 2026-01-21T23:00:00.000+00:00 | 2026-01-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0188 | Internet Systems Consortium BIND: Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0187 | Red Hat Enterprise Linux (glib): Schwachstelle ermöglicht Denial of Service | 2026-01-21T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0185 | M-Files M-Files Server: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0184 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0183 | InetUtils (telnetd): Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-01-20T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0182 | Apache Solr: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0179 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2026-01-20T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0177 | Atlassian Bamboo, Bitbucket, Confluence und Jira: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-28T23:00:00.000+00:00 |
| wid-sec-w-2026-0176 | Google Chrome/Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2026-01-20T23:00:00.000+00:00 | 2026-01-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0174 | Oracle Systems: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0172 | Oracle Virtualization: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0168 | Oracle MySQL: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0164 | Oracle Java SE: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0159 | Oracle E-Business Suite: Mehrere Schwachstellen | 2026-01-20T23:00:00.000+00:00 | 2026-01-21T23:00:00.000+00:00 |
| wid-sec-w-2026-0148 | ImageMagick: Mehrere Schwachstellen | 2026-01-19T23:00:00.000+00:00 | 2026-02-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0145 | FreeRDP: Mehrere Schwachstellen ermöglichen DoS und Codeausführung | 2026-01-19T23:00:00.000+00:00 | 2026-04-09T22:00:00.000+00:00 |
| wid-sec-w-2026-0144 | n8n: Schwachstelle ermöglicht Codeausführung | 2026-01-18T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0138 | Red Hat Enterprise Linux (gpsd): Mehrere Schwachstellen | 2026-01-18T23:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0136 | AMD EPYC-Prozessoren: Schwachstelle ermöglicht Manipulation von Daten | 2026-01-15T23:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| wid-sec-w-2026-0135 | Google Fast Pair Bluetooth Protokoll: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-15T23:00:00.000+00:00 | 2026-01-20T23:00:00.000+00:00 |
| wid-sec-w-2026-0133 | SmarterTools SmarterMail: Mehrere Schwachstellen | 2026-01-15T23:00:00.000+00:00 | 2026-01-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0132 | GNU libc: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-01-15T23:00:00.000+00:00 | 2026-02-02T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-289-05 | Siemens Solid Edge | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| va-25-282-01 | Newforma Project Center multiple vulnerabilities | 2025-10-09T19:50:00Z | 2025-10-09T19:50:00Z |
| icsa-25-282-03 | Rockwell Automation Stratix | 2025-10-09T06:00:00.000000Z | 2025-10-09T06:00:00.000000Z |
| icsa-25-282-02 | Rockwell Automation Lifecycle Services with Cisco | 2025-10-09T06:00:00.000000Z | 2025-10-09T06:00:00.000000Z |
| va-25-280-01 | OPEXUS FOIAXpress stored XSS | 2025-10-07T22:50:29Z | 2025-10-07T22:50:29Z |
| icsa-25-280-01 | Delta Electronics DIAScreen | 2025-10-07T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-275-01 | Raise3D Pro2 Series 3D Printers** | 2025-10-02T05:00:00.000000Z | 2025-10-02T05:00:00.000000Z |
| icsa-25-289-11 | Hitachi Energy MACH GWS | 2025-09-30T12:50:29.000000Z | 2025-09-30T12:50:29.000000Z |
| icsa-25-275-02 | Hitachi Energy MSM | 2025-09-30T09:02:31.000000Z | 2025-09-30T09:02:31.000000Z |
| icsa-25-282-01 | Hitachi Energy Asset Suite (Update A) | 2025-09-30T08:50:13.000000Z | 2025-10-28T09:50:00.000000Z |
| icsa-25-273-06 | National Instruments Circuit Design Suite | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-05 | OpenPLC_V3 | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-04 | Festo Controller CECC-S,-LK,-D Family Firmware (Update A) | 2025-09-30T06:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| icsa-25-273-01 | MegaSys Enterprises Telenium Online Web Application | 2025-09-30T06:00:00.000000Z | 2025-09-30T06:00:00.000000Z |
| icsa-25-273-07 | LG Innotek Camera Multiple Models | 2025-09-30T05:00:00.000000Z | 2025-09-30T05:00:00.000000Z |
| va-25-273-01 | Microsoft Windows inconsistent driver blocking | 2025-09-30T00:00:00Z | 2025-09-30T00:00:00Z |
| va-25-272-01 | Medical Informatics Engineering Enterprise Health multiple vulnerabilities | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| icsa-25-268-01 | Dingtian DT-R002 | 2025-09-25T06:00:00.000000Z | 2025-09-25T06:00:00.000000Z |
| icsa-25-266-04 | Viessmann Vitogate 300 | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-02 | Mitsubishi Electric MELSEC-Q Series CPU Module | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| icsa-25-266-01 | AutomationDirect CLICK PLUS | 2025-09-23T06:00:00.000000Z | 2025-09-23T06:00:00.000000Z |
| va-25-265-01 | Airship AI MFA bypass and default credentials vulnerabilities | 2025-09-22T14:06:13Z | 2025-09-22T14:06:13Z |
| icsa-25-261-07 | Dover Fueling Solutions ProGauge MagLink LX4 Devices | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-06 | Cognex In-Sight Explorer and In-Sight Camera Firmware | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-03 | Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-02 | Westermo Network Technologies WeOS 5 | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-261-01 | Westermo Network Technologies WeOS 5 | 2025-09-18T06:00:00.000000Z | 2025-09-18T06:00:00.000000Z |
| icsa-25-259-07 | Delta Electronics DIALink | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-06 | Siemens Multiple Industrial Products | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| icsa-25-259-05 | Siemens OpenSSL Vulnerability in Industrial Products | 2025-09-16T06:00:00.000000Z | 2025-09-16T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-esa-sma-xss-wck2wcug | Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-wsa-snmp-inf-fqpvl8sx | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance SNMP Polling Information Disclosure Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-wsa-multi-ykujhs34 | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-07T19:21:57+00:00 |
| cisco-sa-cmm-privesc-uy2vf8pc | Cisco Meeting Management REST API Privilege Escalation Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-clamav-ole2-h549rpha | ClamAV OLE2 File Format Decryption Denial of Service Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-bw-sip-dos-msysbrmt | Cisco BroadWorks SIP Denial of Service Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-xwork-xss-kccg7wwu | Cisco Crosswork Network Controller Stored Cross-Site Scripting Vulnerabilities | 2025-01-08T16:00:00+00:00 | 2025-01-08T16:00:00+00:00 |
| cisco-sa-thousandeyes-cert-pqtjuv9n | Cisco ThousandEyes Endpoint Agent for MacOS and RoomOS Certificate Validation Vulnerability | 2025-01-08T16:00:00+00:00 | 2025-01-13T22:15:18+00:00 |
| cisco-sa-cspc-xss-cdojzyh | Cisco Common Services Platform Collector Cross-Site Scripting Vulnerabilities | 2025-01-08T16:00:00+00:00 | 2025-01-08T16:00:00+00:00 |
| cisco-sa-nxos-image-sig-bypas-pqdrqvjl | Cisco NX-OS Software Image Verification Bypass Vulnerability | 2024-12-04T16:00:00+00:00 | 2025-04-07T16:43:32+00:00 |
| cisco-sa-phone-infodisc-sbyqqvbg | Cisco 7800, 8800, and 9800 Series Phones Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ndfc-sqli-cyppaxrl | Cisco Nexus Dashboard Fabric Controller SQL Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-mpp-xss-8tav2tvf | Cisco 6800, 7800, 8800, and 9800 Series Phones with Multiplatform Firmware Stored Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vulns-af544ed5 | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-multi-vuln-dbqdwry | Cisco Identity Services Engine Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ise-auth-bypass-bbrf7mke | Cisco Identity Services Engine Authorization Bypass and Cross-Site Scripting Vulnerabilities | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-imp-inf-disc-cupkua5n | Cisco Unified Communications Manager IM & Presence Service Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-esa-wsa-sma-xss-zym3f49n | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-epnmpi-sxss-yyf2zkxs | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ece-dos-oqb9ufev | Cisco Enterprise Chat and Email Denial of Service Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cucm-xss-svckmmw | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-cmm-info-disc-9zemahga | Cisco Meeting Management Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ccmp-sxss-qbtdbzdd | Cisco Unified Contact Center Management Portal Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-backhaul-ap-cmdinj-r7e28ecs | Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-3550-acl-bypass-mhskzc2q | Cisco Nexus 3550-F Switches Access Control List Programming Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-snort-rf-bypass-oy8f3pnm | Multiple Cisco Products Snort Rate Filter Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2025-01-13T16:44:31+00:00 |
| cisco-sa-snort-bypass-ptry37fx | Cisco Firepower Threat Defense Software TCP Snort 3 Detection Engine Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-sa-ftd-snort-fw-bcjtzpmu | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services TCP/IP Traffic with Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd2100-snort-dos-m9humt75 | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Appliances TCP UDP Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-vdb-snort-djj4cnbr | Cisco Firepower Threat Defense Software Vulnerability Database with Snort Detection Engine Security Policy Bypass and Denial of Service Issue | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-32288 | Unbounded allocation for old GNU sparse in archive/tar | 2026-04-02T00:00:00.000Z | 2026-04-15T01:46:07.000Z |
| msrc_cve-2026-32283 | Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls | 2026-04-02T00:00:00.000Z | 2026-04-15T01:47:16.000Z |
| msrc_cve-2026-32282 | TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix | 2026-04-02T00:00:00.000Z | 2026-04-15T01:48:20.000Z |
| msrc_cve-2026-32281 | Inefficient policy validation in crypto/x509 | 2026-04-02T00:00:00.000Z | 2026-04-15T01:46:32.000Z |
| msrc_cve-2026-32280 | Unexpected work during chain building in crypto/x509 | 2026-04-02T00:00:00.000Z | 2026-04-15T01:47:43.000Z |
| msrc_cve-2026-3184 | Util-linux: util-linux: access control bypass due to improper hostname canonicalization | 2026-04-02T00:00:00.000Z | 2026-04-14T14:44:51.000Z |
| msrc_cve-2026-31790 | Incorrect Failure Handling in RSA KEM RSASVE Encapsulation | 2026-04-02T00:00:00.000Z | 2026-04-10T14:39:43.000Z |
| msrc_cve-2026-31789 | Heap Buffer Overflow in Hexadecimal Conversion | 2026-04-02T00:00:00.000Z | 2026-04-15T01:45:06.000Z |
| msrc_cve-2026-31428 | netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD | 2026-04-02T00:00:00.000Z | 2026-04-14T01:02:38.000Z |
| msrc_cve-2026-31427 | netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp | 2026-04-02T00:00:00.000Z | 2026-04-14T01:02:11.000Z |
| msrc_cve-2026-31426 | ACPI: EC: clean up handlers on probe failure in acpi_ec_setup() | 2026-04-02T00:00:00.000Z | 2026-04-14T01:02:16.000Z |
| msrc_cve-2026-31424 | netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:49.000Z |
| msrc_cve-2026-31423 | net/sched: sch_hfsc: fix divide-by-zero in rtsc_min() | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:43.000Z |
| msrc_cve-2026-31422 | net/sched: cls_flow: fix NULL pointer dereference on shared blocks | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:59.000Z |
| msrc_cve-2026-31421 | net/sched: cls_fw: fix NULL pointer dereference on shared blocks | 2026-04-02T00:00:00.000Z | 2026-04-14T01:02:33.000Z |
| msrc_cve-2026-31420 | bridge: mrp: reject zero test interval to avoid OOM panic | 2026-04-02T00:00:00.000Z | 2026-04-14T01:02:27.000Z |
| msrc_cve-2026-31419 | net: bonding: fix use-after-free in bond_xmit_broadcast() | 2026-04-02T00:00:00.000Z | 2026-04-14T01:02:22.000Z |
| msrc_cve-2026-31418 | netfilter: ipset: drop logically empty buckets in mtype_del | 2026-04-02T00:00:00.000Z | 2026-04-14T01:44:36.000Z |
| msrc_cve-2026-31417 | net/x25: Fix overflow when accumulating packets | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:54.000Z |
| msrc_cve-2026-31416 | netfilter: nfnetlink_log: account for netlink header size | 2026-04-02T00:00:00.000Z | 2026-04-14T01:01:38.000Z |
| msrc_cve-2026-31414 | netfilter: nf_conntrack_expect: use expect->helper | 2026-04-02T00:00:00.000Z | 2026-04-14T01:02:05.000Z |
| msrc_cve-2026-31410 | ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION | 2026-04-02T00:00:00.000Z | 2026-04-07T01:01:16.000Z |
| msrc_cve-2026-31408 | Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold | 2026-04-02T00:00:00.000Z | 2026-04-07T01:01:28.000Z |
| msrc_cve-2026-31407 | netfilter: conntrack: add missing netlink policy validations | 2026-04-02T00:00:00.000Z | 2026-04-07T01:01:22.000Z |
| msrc_cve-2026-31394 | mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations | 2026-04-02T00:00:00.000Z | 2026-04-07T14:37:49.000Z |
| msrc_cve-2026-29181 | OpenTelemetry-Go multi-value `baggage` header extraction causes excessive allocations (remote dos amplification) | 2026-04-02T00:00:00.000Z | 2026-04-11T01:03:43.000Z |
| msrc_cve-2026-28810 | Predictable DNS Transaction IDs Enable Cache Poisoning in Built-in Resolver | 2026-04-02T00:00:00.000Z | 2026-04-11T01:01:30.000Z |
| msrc_cve-2026-28390 | Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo | 2026-04-02T00:00:00.000Z | 2026-04-15T01:45:23.000Z |
| msrc_cve-2026-28389 | Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo | 2026-04-02T00:00:00.000Z | 2026-04-15T01:44:54.000Z |
| msrc_cve-2026-28388 | NULL Pointer Dereference When Processing a Delta CRL | 2026-04-02T00:00:00.000Z | 2026-04-15T01:44:38.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0286 | Kwetsbaarheden verholpen in Cisco IOS XR Software | 2025-09-11T08:14:36.960621Z | 2025-09-11T08:14:36.960621Z |
| ncsc-2025-0285 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-09-10T11:01:43.415733Z | 2025-09-10T11:01:43.415733Z |
| ncsc-2025-0284 | Kwetsbaarheid verholpen in Adobe Commerce en Magento | 2025-09-10T10:49:56.787627Z | 2025-09-10T10:49:56.787627Z |
| ncsc-2025-0283 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-09-10T10:46:54.808276Z | 2025-09-10T10:46:54.808276Z |
| ncsc-2025-0282 | Kwetsbaarheid verholpen in Adobe Dreamweaver | 2025-09-10T10:38:24.553749Z | 2025-09-10T10:38:24.553749Z |
| ncsc-2025-0281 | Kwetsbaarheid verholpen in Adobe ColdFusion | 2025-09-10T10:24:09.409410Z | 2025-09-10T10:24:09.409410Z |
| ncsc-2025-0280 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-09-09T18:27:39.956624Z | 2025-09-09T18:27:39.956624Z |
| ncsc-2025-0279 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-09-09T18:25:53.539582Z | 2025-09-09T18:25:53.539582Z |
| ncsc-2025-0278 | Kwetsbaarheden verholpen in Microsoft Office | 2025-09-09T18:23:23.763765Z | 2025-09-09T18:23:23.763765Z |
| ncsc-2025-0277 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-09-09T18:22:30.766030Z | 2025-09-09T18:22:30.766030Z |
| ncsc-2025-0276 | Kwetsbaarheden verholpen in Schneider Electric Saitel | 2025-09-09T15:16:00.122647Z | 2025-09-09T15:16:00.122647Z |
| ncsc-2025-0275 | Kwetsbaarheden verholpen in SAP producten | 2025-09-09T11:12:22.945466Z | 2025-09-09T11:12:22.945466Z |
| ncsc-2025-0274 | Kwetsbaarheden verholpen in Siemens producten | 2025-09-09T11:06:34.785987Z | 2025-09-09T11:06:34.785987Z |
| ncsc-2025-0273 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-09-04T08:15:14.806733Z | 2025-09-04T08:15:14.806733Z |
| ncsc-2025-0272 | Kwetsbaarheid verholpen in FreePBX | 2025-08-29T08:37:54.893549Z | 2025-08-29T08:37:54.893549Z |
| ncsc-2025-0271 | Kwetsbaarheden verholpen in Arcserve Unified Data Protection | 2025-08-28T12:56:02.228992Z | 2025-08-28T12:56:02.228992Z |
| ncsc-2025-0270 | Kwetsbaarheden verholpen in Cisco NX-OS Software | 2025-08-28T08:36:20.358948Z | 2025-08-28T08:36:20.358948Z |
| ncsc-2025-0269 | Kwetsbaarheden verholpen in IBM Cognos Command Center | 2025-08-27T13:10:59.965070Z | 2025-08-27T13:10:59.965070Z |
| ncsc-2025-0268 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en Gateway | 2025-08-26T13:11:42.925280Z | 2025-08-26T17:34:30.428328Z |
| ncsc-2025-0267 | Kwetsbaarheden verholpen in Foxit Reader | 2025-08-25T11:26:17.380689Z | 2025-08-25T11:26:17.380689Z |
| ncsc-2025-0266 | Kwetsbaarheid verholpen in Apple MacOS, iOS en iPadOS | 2025-08-22T05:49:07.556948Z | 2025-08-25T12:16:10.430485Z |
| ncsc-2025-0265 | Kwetsbaarheden verholpen in Commvault | 2025-08-20T12:15:48.655099Z | 2025-08-20T12:15:48.655099Z |
| ncsc-2025-0264 | Kwetsbaarheden verholpen in Cisco Secure Firewall Software | 2025-08-15T08:52:41.012811Z | 2025-08-15T08:52:41.012811Z |
| ncsc-2025-0263 | Kwetsbaarheden verholpen in N-able N-Central | 2025-08-14T12:38:27.349283Z | 2025-08-14T12:38:27.349283Z |
| ncsc-2025-0262 | Kwetsbaarheden verholpen in Xerox FreeFlow Core | 2025-08-14T07:00:50.843871Z | 2025-08-14T07:00:50.843871Z |
| ncsc-2025-0261 | Kwetsbaarheden verholpen in Adobe InCopy | 2025-08-13T10:13:59.220398Z | 2025-08-13T10:13:59.220398Z |
| ncsc-2025-0260 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-08-13T10:12:35.130811Z | 2025-08-13T10:12:35.130811Z |
| ncsc-2025-0259 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2025-08-13T10:11:22.733287Z | 2025-08-13T10:11:22.733287Z |
| ncsc-2025-0258 | Kwetsbaarheden verholpen in Adobe InDesign | 2025-08-13T10:05:31.442414Z | 2025-08-13T10:05:31.442414Z |
| ncsc-2025-0257 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-08-13T10:00:18.181867Z | 2025-08-13T10:00:18.181867Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10377-1 | python312-3.12.13-2.1 on GA media | 2026-03-16T00:00:00Z | 2026-03-16T00:00:00Z |
| opensuse-su-2026:10376-1 | chromedriver-146.0.7680.80-1.1 on GA media | 2026-03-16T00:00:00Z | 2026-03-16T00:00:00Z |
| opensuse-su-2026:10375-1 | coturn-4.9.0-1.1 on GA media | 2026-03-15T00:00:00Z | 2026-03-15T00:00:00Z |
| opensuse-su-2026:10374-1 | python311-tornado6-6.5.5-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10373-1 | python311-simpleeval-1.0.5-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10372-1 | python311-black-26.3.1-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10371-1 | curl-8.19.0-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:20357-1 | Security update for qemu | 2026-03-13T10:47:15Z | 2026-03-13T10:47:15Z |
| opensuse-su-2026:20354-1 | Security update for libsoup2 | 2026-03-13T08:41:04Z | 2026-03-13T08:41:04Z |
| opensuse-su-2026:10370-1 | smb4k-4.0.5-1.2 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10369-1 | skaffold-2.18.0-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10368-1 | ruby4.0-rubygem-websocket-extensions-0.1.5-1.24 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10367-1 | ruby4.0-rubygem-web-console-4.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10366-1 | ruby4.0-rubygem-thor-1.4.0-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10365-1 | ruby4.0-rubygem-sprockets-3.7-3.7.5-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10364-1 | ruby4.0-rubygem-sprockets-4.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10363-1 | ruby4.0-rubygem-rubyzip-2.3.2-1.19 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10362-1 | ruby4.0-rubygem-railties-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10361-1 | ruby4.0-rubygem-rails-html-sanitizer-1.6.0-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10360-1 | ruby4.0-rubygem-rails-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10359-1 | ruby4.0-rubygem-rack-session-2.1.1-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10358-1 | ruby4.0-rubygem-rack-3.1.18-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10357-1 | ruby4.0-rubygem-puma-6.4.3-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10356-1 | ruby4.0-rubygem-nokogiri-1.18.9-1.4 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10355-1 | ruby4.0-rubygem-multi_xml-0.6.0-1.31 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10354-1 | ruby4.0-rubygem-minitar-0.9-1.21 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10353-1 | ruby4.0-rubygem-loofah-2.23.1-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10352-1 | ruby4.0-rubygem-kramdown-2.4.0-1.17 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10351-1 | ruby4.0-rubygem-json_pure-2.7.6-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10350-1 | ruby4.0-rubygem-jquery-rails-4.6.0-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:6384 | Red Hat Security Advisory: freerdp security update | 2026-04-01T14:55:19+00:00 | 2026-04-09T14:38:07+00:00 |
| rhsa-2026:6388 | Red Hat Security Advisory: grafana-pcp security update | 2026-04-01T14:40:49+00:00 | 2026-04-16T13:51:56+00:00 |
| rhsa-2026:6344 | Red Hat Security Advisory: grafana security update | 2026-04-01T11:23:28+00:00 | 2026-04-16T13:51:56+00:00 |
| rhsa-2026:5876 | Red Hat Security Advisory: OpenShift Container Platform 4.19.27 packages and security update | 2026-04-01T10:19:18+00:00 | 2026-04-16T11:02:14+00:00 |
| rhsa-2026:5877 | Red Hat Security Advisory: OpenShift Container Platform 4.19.27 bug fix and security update | 2026-04-01T10:06:58+00:00 | 2026-04-02T16:39:26+00:00 |
| rhsa-2026:5878 | Red Hat Security Advisory: OpenShift Container Platform 4.19.27 bug fix and security update | 2026-04-01T09:48:10+00:00 | 2026-04-16T10:16:40+00:00 |
| rhsa-2026:6342 | Red Hat Security Advisory: thunderbird security update | 2026-04-01T09:40:38+00:00 | 2026-04-16T10:24:11+00:00 |
| rhsa-2026:5866 | Red Hat Security Advisory: OpenShift Container Platform 4.17.52 packages and security update | 2026-04-01T09:29:07+00:00 | 2026-04-16T11:02:13+00:00 |
| rhsa-2026:6341 | Red Hat Security Advisory: Red Hat build of Cryostat security update | 2026-04-01T09:19:49+00:00 | 2026-04-16T13:51:57+00:00 |
| rhsa-2026:5867 | Red Hat Security Advisory: OpenShift Container Platform 4.17.52 bug fix and security update | 2026-04-01T09:17:57+00:00 | 2026-04-02T16:39:27+00:00 |
| rhsa-2026:6340 | Red Hat Security Advisory: freerdp security update | 2026-04-01T09:08:02+00:00 | 2026-04-14T07:11:28+00:00 |
| rhsa-2026:5907 | Red Hat Security Advisory: OpenShift Container Platform 4.17.52 bug fix and security update | 2026-04-01T03:47:45+00:00 | 2026-04-16T10:16:35+00:00 |
| rhsa-2026:6311 | Red Hat Security Advisory: nginx security update | 2026-04-01T02:29:52+00:00 | 2026-04-08T14:07:10+00:00 |
| rhsa-2026:6310 | Red Hat Security Advisory: kernel security update | 2026-04-01T01:15:17+00:00 | 2026-04-13T07:08:47+00:00 |
| rhsa-2026:6309 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-03-31T23:31:56+00:00 | 2026-04-16T10:45:24+00:00 |
| rhsa-2026:6308 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2026-03-31T22:34:16+00:00 | 2026-04-16T10:29:41+00:00 |
| rhsa-2026:6302 | Red Hat Security Advisory: nginx:1.24 security update | 2026-03-31T22:05:06+00:00 | 2026-04-08T14:07:09+00:00 |
| rhsa-2026:6301 | Red Hat Security Advisory: squid security update | 2026-03-31T20:09:21+00:00 | 2026-04-15T21:58:29+00:00 |
| rhsa-2026:6300 | Red Hat Security Advisory: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update | 2026-03-31T19:50:01+00:00 | 2026-04-14T06:25:51+00:00 |
| rhsa-2026:6285 | Red Hat Security Advisory: python3.12 security update | 2026-03-31T17:26:23+00:00 | 2026-04-15T13:53:48+00:00 |
| rhsa-2026:6286 | Red Hat Security Advisory: python3.11 security update | 2026-03-31T17:26:16+00:00 | 2026-04-15T13:53:40+00:00 |
| rhsa-2026:6283 | Red Hat Security Advisory: python3.12 security update | 2026-03-31T17:06:33+00:00 | 2026-04-15T13:53:48+00:00 |
| rhsa-2026:6292 | Red Hat Security Advisory: General availability of the satellite/iop-insights-engine-rhel9 container image | 2026-03-31T16:56:51+00:00 | 2026-04-16T11:28:36+00:00 |
| rhsa-2026:6291 | Red Hat Security Advisory: General availability of the satellite/iop-advisor-backend-rhel9 container image | 2026-03-31T16:56:50+00:00 | 2026-03-31T22:32:22+00:00 |
| rhsa-2026:6288 | Red Hat Security Advisory: General availability of the satellite/iop-remediations-rhel9 container image | 2026-03-31T16:45:29+00:00 | 2026-04-15T16:26:42+00:00 |
| rhsa-2026:6287 | Red Hat Security Advisory: General availability of the satellite/iop-advisor-frontend-rhel9 container image | 2026-03-31T16:45:05+00:00 | 2026-04-15T21:53:51+00:00 |
| rhsa-2026:6281 | Red Hat Security Advisory: python3.11 security update | 2026-03-31T16:39:52+00:00 | 2026-04-15T13:53:40+00:00 |
| rhsa-2026:6278 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2026-03-31T16:23:06+00:00 | 2026-04-16T13:48:24+00:00 |
| rhsa-2026:6277 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Product Security and Bug Fix Update | 2026-03-31T16:12:45+00:00 | 2026-04-16T13:48:24+00:00 |
| rhsa-2026:6268 | Red Hat Security Advisory: 389-ds:1.4 security update | 2026-03-31T15:37:55+00:00 | 2026-03-31T17:31:28+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2020-287-01 | Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules | 2020-10-13T00:00:00.000Z | 2025-06-10T04:00:00.000Z |
| sevd-2020-252-01 | SCADAPack x70 Remote Connect and SCADAPack x70 Security Administrator | 2020-09-08T00:00:00.000Z | 2021-02-09T00:00:00.000Z |
| sevd-2020-224-08 | Schneider Electric PACTware | 2020-08-11T00:00:00.000Z | 2020-08-13T00:00:00.000Z |
| sevd-2020-224-07 | SoMove | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-06 | Harmony® eXLhoist | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-05 | PowerChute Business Edition | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-04 | APC Easy UPS On-Line Software | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-03 | Modicon M218 Logic Controller | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-02 | spaceLYnk & Wiser for KNX (formerly homeLYnk) | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-01 | Schneider Electric Modbus Serial Driver | 2020-08-11T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-196-01 | Schneider Electric Software Update (SESU) | 2020-07-14T00:00:00.000Z | 2020-07-14T00:00:00.000Z |
| sevd-2020-175-01 | Treck TCP/IP Vulnerabilities (Ripple20) | 2020-06-23T16:00:00.000Z | 2022-08-08T13:57:08.970Z |
| sevd-2020-174-01 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2020-06-22T00:00:00.000Z | 2021-06-30T00:00:00.000Z |
| sevd-2020-161-05 | Easergy Builder | 2020-06-09T00:00:00.000Z | 2021-05-13T00:00:00.000Z |
| sevd-2020-161-04 | Easergy T300 | 2020-06-09T00:00:00.000Z | 2021-05-13T00:00:00.000Z |
| sevd-2020-161-03 | Modicon LMC078 Logic Controller additional URGENT/11 Fix | 2020-06-09T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| sevd-2020-161-01 | Modicon M218 Logic Controller | 2020-06-09T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| sevd-2020-133-03 | U.motion Servers and Touch Panels | 2020-05-12T00:00:00.000Z | 2021-04-15T00:00:00.000Z |
| sevd-2020-133-02 | Vijeo Designer and Vijeo Designer Basic Software | 2020-05-12T00:00:00.000Z | 2020-08-14T00:00:00.000Z |
| sevd-2020-105-03 | Vijeo Designer and Vijeo Designer Basic | 2020-04-14T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-105-02 | Modicon M218/M241/M251/M258 Logic Controllers,SoMachine/SoMachine Motion, EcoStruxure™ Machine Expert | 2020-04-14T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| sevd-2020-105-01 | Modicon M100/M200/M221 controllers, SoMachine Basic and EcoStruxure Machine Expert - Basic Programming Software | 2020-04-14T00:00:00.000Z | 2020-04-14T00:00:00.000Z |
| sevd-2020-080-01 | Modicon Controllers, EcoStruxure™ Control Expert and Unity Pro Programming Software | 2020-03-20T00:00:00.000Z | 2021-05-11T00:00:00.000Z |
| sevd-2020-070-04 | Andover Continuum System | 2020-03-10T00:00:00.000Z | 2020-05-12T00:00:00.000Z |
| sevd-2020-070-03 | ZigBee Installation Toolkit | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-070-02 | Modicon Quantum Ethernet Network module and Quantum / Premium COPRO | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-070-01 | IGSS (Interactive Graphical SCADA System) | 2020-03-10T00:00:00.000Z | 2020-03-10T00:00:00.000Z |
| sevd-2020-042-01 | ProSoft Configurator for Modicon PMEPXM0100 (H) | 2020-02-11T00:00:00.000Z | 2020-02-11T00:00:00.000Z |
| sevd-2020-014-01 | MSX Configurator | 2020-01-14T00:00:00.000Z | 2020-01-14T00:00:00.000Z |
| sevd-2019-281-02 | Modicon Controllers | 2019-09-26T12:53:28.000Z | 2024-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-868282 | SSA-868282: Multiple Vulnerabilities in SINEMA Remote Connect Client before V3.2 HF1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-825651 | SSA-825651: Deserialization Vulnerability in SIMATIC STEP 7 (TIA Portal) before V18 Update 2 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-824889 | SSA-824889: XML File Parsing Vulnerabilities in JT Open and PLM XML SDK | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-779936 | SSA-779936: Catalog-Profile Deserialization Vulnerability in Siemens Engineering Platforms before V19 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-750499 | SSA-750499: Weak Encryption Vulnerability in SIPROTEC 5 Devices | 2024-07-09T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-723487 | SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products | 2024-07-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-722010 | SSA-722010: Datalogics File Parsing Vulnerability in Teamcenter Visualization and JT2Go | 2024-07-09T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-698820 | SSA-698820: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.4 on RUGGEDCOM APE1808 Devices | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-381581 | SSA-381581: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 SP1 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-364175 | SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-313039 | SSA-313039: Deserialization Vulnerability in STEP 7 Safety before V19 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-170375 | SSA-170375: Multiple Vulnerabilities in RUGGEDCOM ROS Before V5.9 | 2024-07-09T00:00:00Z | 2025-08-12T00:00:00Z |
| ssa-088132 | SSA-088132: Denial of Service Vulnerability in the OPC UA Server Implementations of Several Industrial Products | 2024-07-09T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-064222 | SSA-064222: Multiple File Parsing Vulnerabilities in Simcenter Femap before V2406 | 2024-07-09T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-900277 | SSA-900277: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0012 and V2024.0001 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-879734 | SSA-879734: Multiple Vulnerabilities in SCALANCE XM-400/XR-500 before V6.6.1 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-771940 | SSA-771940: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-06-11T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-690517 | SSA-690517: Multiple Vulnerabilities in SCALANCE W-700 IEEE 802.11ax Family | 2024-06-11T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-625862 | SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-620338 | SSA-620338: Buffer Overflow Vulnerability in SICAM AK3 / BC / TM | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-540640 | SSA-540640: Improper Privilege Management Vulnerability in Mendix Runtime | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-481506 | SSA-481506: Information Disclosure Vulnerability in SIMATIC S7-200 SMART Devices | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-341067 | SSA-341067: Multiple vulnerabilities in third-party components in ST7 ScadaConnect before V1.1 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-337522 | SSA-337522: Multiple Vulnerabilities in TIM 1531 IRC before V2.4.8 | 2024-06-11T00:00:00Z | 2024-07-09T00:00:00Z |
| ssa-319319 | SSA-319319: Denial of Service Vulnerability in TIA Administrator | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-238730 | SSA-238730: Out-of-Bounds Write Vulnerabilities in SITOP UPS1600 before V2.5.4 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-196737 | SSA-196737: Multiple Vulnerabilities in SINEC Traffic Analyzer Before V1.2 | 2024-06-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-024584 | SSA-024584: Authentication Bypass Vulnerability in PowerSys before V3.11 | 2024-06-11T00:00:00Z | 2024-06-11T00:00:00Z |
| ssa-976324 | SSA-976324: Multiple IGS File Parsing Vulnerabilities in PS/IGES Parasolid Translator Component before V27.1.215 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-962515 | SSA-962515: Out of Bounds Read Vulnerability in Industrial Products | 2024-05-14T00:00:00Z | 2024-12-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1160-1 | Security update for freerdp | 2026-03-31T15:03:59Z | 2026-03-31T15:03:59Z |
| suse-su-2026:1159-1 | Security update for expat | 2026-03-31T15:03:48Z | 2026-03-31T15:03:48Z |
| suse-su-2026:1158-1 | Security update for python-pyasn1 | 2026-03-31T11:55:53Z | 2026-03-31T11:55:53Z |
| suse-su-2026:20951-1 | Security update for python311 | 2026-03-31T09:13:02Z | 2026-03-31T09:13:02Z |
| suse-su-2026:20988-1 | Security update for gnome-online-accounts, gvfs | 2026-03-31T09:08:21Z | 2026-03-31T09:08:21Z |
| suse-su-2026:20956-1 | Security update for python311 | 2026-03-31T09:07:43Z | 2026-03-31T09:07:43Z |
| suse-su-2026:1154-1 | Security update for libjxl | 2026-03-31T09:04:47Z | 2026-03-31T09:04:47Z |
| suse-su-2026:0227-2 | Security update for net-snmp | 2026-03-31T08:48:04Z | 2026-03-31T08:48:04Z |
| suse-su-2026:1153-1 | Security update for perl-XML-Parser | 2026-03-31T08:40:07Z | 2026-03-31T08:40:07Z |
| suse-su-2026:1152-1 | Security update for perl-XML-Parser | 2026-03-31T08:28:50Z | 2026-03-31T08:28:50Z |
| suse-su-2026:1150-1 | Security update for webkit2gtk3 | 2026-03-30T17:34:50Z | 2026-03-30T17:34:50Z |
| suse-su-2026:20986-1 | Security update for postgresql13 | 2026-03-30T15:24:20Z | 2026-03-30T15:24:20Z |
| suse-su-2026:20985-1 | Security update for expat | 2026-03-30T15:01:10Z | 2026-03-30T15:01:10Z |
| suse-su-2026:20963-1 | Security update for expat | 2026-03-30T15:01:10Z | 2026-03-30T15:01:10Z |
| suse-su-2026:20984-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20968-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20962-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20983-1 | Security update for postgresql16 | 2026-03-30T14:26:12Z | 2026-03-30T14:26:12Z |
| suse-su-2026:1149-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T13:44:05Z | 2026-03-30T13:44:05Z |
| suse-su-2026:1148-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T11:21:20Z | 2026-03-30T11:21:20Z |
| suse-su-2026:1146-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:17:48Z | 2026-03-30T09:17:48Z |
| suse-su-2026:1142-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:16:26Z | 2026-03-30T09:16:26Z |
| suse-su-2026:1141-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:16:08Z | 2026-03-30T09:16:08Z |
| suse-su-2026:1140-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:15:49Z | 2026-03-30T09:15:49Z |
| suse-su-2026:1139-1 | Security update for webkit2gtk3 | 2026-03-30T09:13:58Z | 2026-03-30T09:13:58Z |
| suse-su-2026:20982-1 | Security update for tomcat10 | 2026-03-30T08:17:19Z | 2026-03-30T08:17:19Z |
| suse-su-2026:1137-1 | Security update for expat | 2026-03-28T02:34:02Z | 2026-03-28T02:34:02Z |
| suse-su-2026:1136-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T18:04:04Z | 2026-03-27T18:04:04Z |
| suse-su-2026:20978-1 | Security update for MozillaFirefox | 2026-03-27T17:19:44Z | 2026-03-27T17:19:44Z |
| suse-su-2026:1132-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T16:04:11Z | 2026-03-27T16:04:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1661 | Moderate: kernel-rt security update | 2026-02-02T00:00:00Z | 2026-02-02T13:40:07Z |
| alsa-2026:1631 | Moderate: python3 security update | 2026-02-02T00:00:00Z | 2026-02-02T12:08:18Z |
| alsa-2026:1628 | Important: php security update | 2026-02-02T00:00:00Z | 2026-02-02T09:59:40Z |
| alsa-2026:1617 | Moderate: kernel security update | 2026-02-02T00:00:00Z | 2026-02-06T08:24:53Z |
| alsa-2026:1597 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:00:47Z |
| alsa-2026:1595 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:01:50Z |
| alsa-2026:1592 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T11:56:57Z |
| alsa-2026:1574 | Important: gimp:2.8 security update | 2026-01-29T00:00:00Z | 2026-01-29T14:07:36Z |
| alsa-2026:1518 | Important: grafana-pcp security update | 2026-01-28T00:00:00Z | 2026-01-29T12:32:40Z |
| alsa-2026:1478 | Moderate: python3.9 security update | 2026-01-28T00:00:00Z | 2026-01-28T19:56:37Z |
| alsa-2026:1473 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-02-02T11:12:21Z |
| alsa-2026:1472 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-01-28T19:58:47Z |
| alsa-2026:1429 | Important: php:8.3 security update | 2026-01-27T00:00:00Z | 2026-01-29T11:59:57Z |
| alsa-2026:1412 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:16:18Z |
| alsa-2026:1410 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:02:18Z |
| alsa-2026:1409 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:20:21Z |
| alsa-2026:1408 | Moderate: python3.12 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:05:44Z |
| alsa-2026:1381 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-02-02T11:22:03Z |
| alsa-2026:1380 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-01-29T12:07:35Z |
| alsa-2026:1377 | Moderate: image-builder security update | 2026-01-27T00:00:00Z | 2026-02-12T10:36:07Z |
| alsa-2026:1374 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:10:37Z |
| alsa-2026:1359 | Moderate: gcc-toolset-15-binutils security update | 2026-01-27T00:00:00Z | 2026-02-02T11:23:42Z |
| alsa-2026:1350 | Moderate: curl security update | 2026-01-27T00:00:00Z | 2026-01-29T12:31:06Z |
| alsa-2026:1344 | Important: grafana security update | 2026-01-27T00:00:00Z | 2026-01-29T12:12:24Z |
| alsa-2026:1334 | Moderate: glibc security update | 2026-01-27T00:00:00Z | 2026-01-29T12:29:45Z |
| alsa-2026:1254 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-29T12:14:07Z |
| alsa-2026:1239 | Important: fence-agents security update | 2026-01-26T00:00:00Z | 2026-02-02T11:30:59Z |
| alsa-2026:1226 | Important: python3.12-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:21:23Z |
| alsa-2026:1224 | Important: python3.11-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-27T08:28:50Z |
| alsa-2026:1178 | Moderate: kernel security update | 2026-01-26T00:00:00Z | 2026-02-02T11:36:10Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-215 | Security exception in graphql.parser.GraphqlAntlrToLanguage.createType | 2025-03-18T00:09:36.655072Z | 2025-03-18T00:09:36.655425Z |
| osv-2025-207 | Security exception in org.apache.lucene.analysis.tokenattributes.CharTermAttributeImpl.clone | 2025-03-16T00:02:33.765869Z | 2025-06-20T17:14:14.229009Z |
| osv-2025-202 | UNKNOWN READ in _blit_xrgb32_lerp_spans | 2025-03-15T00:01:51.127135Z | 2026-03-18T14:26:56.370221Z |
| osv-2025-190 | Heap-buffer-overflow in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-03-11T00:04:32.361664Z | 2025-03-11T00:04:32.362119Z |
| osv-2025-178 | Heap-buffer-overflow in usm_set_user_password | 2025-02-28T00:16:54.655227Z | 2025-02-28T00:16:54.655745Z |
| osv-2025-177 | Segv on unknown address in chunk_free_object | 2025-02-28T00:16:24.018716Z | 2025-02-28T00:16:24.019131Z |
| osv-2025-175 | UNKNOWN READ in insert_free | 2025-02-28T00:12:26.919208Z | 2025-02-28T00:12:26.919553Z |
| osv-2025-174 | Heap-use-after-free in gc_trace | 2025-02-28T00:12:25.140274Z | 2025-02-28T00:12:25.140618Z |
| osv-2025-173 | UNKNOWN READ in chunk_obj_alloc | 2025-02-28T00:11:40.566459Z | 2025-02-28T00:11:40.566797Z |
| osv-2025-169 | Stack-buffer-overflow in utf8_in2 | 2025-02-27T00:07:08.029075Z | 2026-03-21T14:18:54.197384Z |
| osv-2025-165 | Index-out-of-bounds in dwg_decode_eed | 2025-02-26T00:17:27.930225Z | 2025-02-26T00:17:27.930707Z |
| osv-2025-162 | Heap-buffer-overflow in snmp_in_options | 2025-02-24T00:15:40.967551Z | 2025-03-18T00:30:24.116747Z |
| osv-2025-161 | Heap-buffer-overflow in se_add_pair | 2025-02-24T00:15:33.662895Z | 2025-03-18T00:37:12.676515Z |
| osv-2025-160 | UNKNOWN WRITE in ndpi_free_flow_data | 2025-02-24T00:07:49.495615Z | 2025-02-24T00:07:49.495976Z |
| osv-2025-156 | Check failed in CheckUnwind | 2025-02-23T00:16:50.073196Z | 2025-02-23T00:16:50.073520Z |
| osv-2025-154 | UNKNOWN READ in ndpi_strdup | 2025-02-23T00:13:05.487818Z | 2025-02-23T00:13:05.488183Z |
| osv-2025-149 | UNKNOWN READ in processClientServerHello | 2025-02-23T00:00:50.236281Z | 2025-02-23T00:00:50.236700Z |
| osv-2025-148 | Heap-buffer-overflow in setup_engineID | 2025-02-23T00:00:36.951152Z | 2025-03-18T00:22:22.817245Z |
| osv-2025-147 | UNKNOWN WRITE in ndpi_free_flow_data | 2025-02-22T00:18:07.814416Z | 2025-02-22T00:18:07.814726Z |
| osv-2025-145 | Heap-buffer-overflow in ___interceptor_strncat | 2025-02-22T00:14:15.620085Z | 2025-02-22T00:14:15.620535Z |
| osv-2025-133 | Stack-buffer-overflow in se_read_conf | 2025-02-17T00:02:18.986364Z | 2025-03-18T00:27:33.917908Z |
| osv-2025-132 | Heap-use-after-free in netsnmp_hex_to_binary | 2025-02-17T00:01:01.920904Z | 2025-03-18T00:33:26.648884Z |
| osv-2025-131 | Heap-buffer-overflow in vips_foreign_save_heif_write_block | 2025-02-16T00:13:44.282887Z | 2025-03-18T00:32:21.245932Z |
| osv-2025-127 | Object-size in unpack_dsd_samples | 2025-02-15T00:16:56.314634Z | 2025-02-15T00:16:56.315060Z |
| osv-2025-124 | Use-of-uninitialized-value in get_word | 2025-02-15T00:09:23.967012Z | 2025-02-15T00:09:23.967345Z |
| osv-2025-119 | Heap-buffer-overflow in snmp_config_when | 2025-02-14T00:15:08.375253Z | 2025-03-18T00:37:43.437021Z |
| osv-2025-114 | Index-out-of-bounds in ada_fuzz_header.h | 2025-02-14T00:11:24.754671Z | 2025-02-14T00:11:24.755045Z |
| osv-2025-113 | Heap-buffer-overflow in snmp_log_options | 2025-02-14T00:01:45.812592Z | 2025-03-18T00:35:43.690001Z |
| osv-2025-111 | Stack-buffer-overflow in absl::debugging_internal::ParseLocalNameSuffix | 2025-02-13T00:15:36.403252Z | 2025-02-13T00:15:36.403744Z |
| osv-2022-1292 | Heap-buffer-overflow in LibRaw::phase_one_correct | 2025-02-10T00:13:32.671074Z | 2025-02-10T00:13:32.671487Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0009 | Some AES functions may panic when overflow checking is enabled. | 2025-03-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0010 | Versions of *ring* prior to 0.17 are unmaintained. | 2025-03-05T12:00:00Z | 2025-03-07T15:46:47Z |
| rustsec-2025-0012 | `backoff` is unmaintained. | 2025-03-04T12:00:00Z | 2025-08-06T09:33:04Z |
| rustsec-2025-0011 | `openpgp-card-sequoia` is unmaintained. | 2025-03-04T12:00:00Z | 2025-03-07T15:47:21Z |
| rustsec-2025-0008 | Openh264 Decoding Functions Heap Overflow Vulnerability | 2025-02-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0013 | resolve is unmaintained | 2025-02-21T12:00:00Z | 2025-03-07T15:52:15Z |
| rustsec-2025-0007 | *ring* is unmaintained | 2025-02-20T12:00:00Z | 2025-03-06T21:16:59Z |
| rustsec-2025-0015 | Denial of Service via malicious Web Push endpoint | 2025-02-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0159 | `sophosfirewall-python` was removed from crates.io for malicious code | 2025-02-15T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0155 | `rands` was removed from crates.io for malicious code | 2025-02-10T12:00:00Z | 2026-03-26T06:26:31Z |
| rustsec-2025-0030 | totally-safe-transmute allows transmuting any type to any other type in safe Rust | 2025-02-10T12:00:00Z | 2025-05-06T20:14:30Z |
| rustsec-2025-0029 | totally-safe introduces memory vulnerabilities in safe Rust | 2025-02-10T12:00:00Z | 2025-05-05T18:31:28Z |
| rustsec-2025-0028 | cve-rs introduces memory vulnerabilities in safe Rust | 2025-02-10T12:00:00Z | 2025-05-06T21:08:48Z |
| rustsec-2025-0006 | Hickory DNS failure to verify self-signed RRSIG for DNSKEYs | 2025-02-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0004 | ssl::select_next_proto use after free | 2025-02-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0160 | `custom-req-on-workers` was removed from crates.io for malicious code | 2025-01-30T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0158 | `jfrog_quotes` was removed from crates.io for malicious code | 2025-01-30T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0001 | gix-worktree-state nonexclusive checkout sets executable files world-writable | 2025-01-18T12:00:00Z | 2025-01-22T17:11:51Z |
| rustsec-2025-0040 | `root` appended to group listings | 2025-01-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0161 | libsecp256k1 is unmaintained | 2025-01-14T12:00:00Z | 2026-04-14T11:24:03Z |
| rustsec-2025-0026 | registry is unmaintained | 2025-01-13T12:00:00Z | 2025-04-29T08:11:21Z |
| rustsec-2025-0005 | Out of bounds write triggered by crafted coverage data | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0003 | Segmentation fault due to lack of bound check | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0002 | Segmentation fault due to lack of bound check | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0430 | Use of insecure cryptographic algorithms | 2024-12-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0431 | Unsound usages of `core::slice::from_raw_parts` | 2024-12-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0435 | Unsound usages of `Vec::from_raw_parts` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0426 | Unsound usages of `u8` type casting | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0424 | Unsound usages of `core::slice::from_raw_parts_mut` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0433 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2026-1182 | Improper Removal of Sensitive Information Before Storage or Transfer in GitLab | 2026-03-14T09:09:00.605Z | 2026-03-14T09:10:54.038Z |
| bit-python-2025-13462 | tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling | 2026-03-14T08:49:56.012Z | 2026-03-20T09:47:33.381Z |
| bit-libpython-2025-13462 | tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling | 2026-03-14T08:42:41.133Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-32234 | Parse Server has a SQL injection via query field name when using PostgreSQL | 2026-03-13T12:28:58.177Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-32098 | Parse Server has a protected fields bypass via LiveQuery subscription WHERE clause | 2026-03-13T12:28:55.457Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31901 | Parse Server has user enumeration via email verification endpoint | 2026-03-13T12:28:52.748Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31875 | Parse Server MFA recovery codes not consumed after use | 2026-03-13T12:28:49.853Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31872 | Parse Server has a protected fields bypass via dot-notation in query and sort | 2026-03-13T12:28:47.303Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31871 | Parse Server has a SQL Injection via dot-notation sub-key name in `Increment` operation on PostgreSQL | 2026-03-13T12:28:44.452Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31868 | Parse Server has Stored XSS via file upload of HTML-renderable file types | 2026-03-13T12:28:41.729Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31856 | Parse Server has a SQL injection via `Increment` operation on nested object field in PostgreSQL | 2026-03-13T12:28:38.912Z | 2026-03-13T12:55:29.610Z |
| bit-parse-2026-31840 | Parse Server has a SQL injection via dot-notation field name in PostgreSQL | 2026-03-13T12:28:36.029Z | 2026-03-13T12:55:29.610Z |
| bit-gitlab-2026-3848 | Improper Neutralization of CRLF Sequences ('CRLF Injection') in GitLab | 2026-03-13T09:35:49.642Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-1732 | Improper Removal of Sensitive Information Before Storage or Transfer in GitLab | 2026-03-13T09:35:40.993Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-1663 | Missing Authorization in GitLab | 2026-03-13T09:35:36.922Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-1230 | Use of Incorrectly-Resolved Name or Reference in GitLab | 2026-03-13T09:35:23.537Z | 2026-03-18T09:23:06.258Z |
| bit-gitlab-2026-1090 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-03-13T09:35:17.166Z | 2026-03-14T09:10:54.038Z |
| bit-gitlab-2026-1069 | Uncontrolled Recursion in GitLab | 2026-03-13T09:35:15.010Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2026-0602 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2026-03-13T09:35:05.636Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-14513 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-13T09:31:32.729Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-13929 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-13T09:31:23.093Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-13690 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-13T09:31:10.589Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-12704 | Missing Authorization in GitLab | 2026-03-13T09:30:55.187Z | 2026-03-18T09:23:06.258Z |
| bit-gitlab-2025-12697 | Improper Encoding or Escaping of Output in GitLab | 2026-03-13T09:30:53.383Z | 2026-03-18T09:23:06.258Z |
| bit-gitlab-2025-12576 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-13T09:30:49.795Z | 2026-03-13T09:37:20.375Z |
| bit-gitlab-2025-12555 | Incorrect Authorization in GitLab | 2026-03-13T09:30:40.688Z | 2026-03-13T09:37:20.375Z |
| bit-wordpress-2026-3906 | WordPress 6.9 - 6.9.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Note Creation via REST API | 2026-03-13T09:17:59.157Z | 2026-03-13T09:37:20.375Z |
| bit-consul-2026-2808 | Consul vulnerable to arbitrary file reads through the vault kubernetes authentication provider | 2026-03-13T09:02:37.072Z | 2026-03-13T09:37:20.375Z |
| bit-parse-2026-31828 | Parse Server has an LDAP injection via unsanitized user input in DN and group filter construction | 2026-03-12T14:48:18.251Z | 2026-03-20T09:47:33.381Z |
| bit-parse-2026-31800 | Parse Server: Classes `_GraphQLConfig` and `_Audience` master key bypass via generic class routes | 2026-03-12T14:48:16.613Z | 2026-03-20T09:47:33.381Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-cl65461 | Security fixes for CVE-2022-29526, CVE-2025-47907, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.10-r0, 0.11-r0, 0.8-r0, 0.8-r1, 0.8-r2, 0.9-r0 | 2026-04-01T09:31:56.332937Z | 2026-03-23T07:35:18Z |
| cleanstart-2026-pv93827 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.25.4-r0, 1.25.4-r1, 1.25.4-r2 | 2026-04-01T09:31:37.416388Z | 2026-03-23T07:38:20Z |
| cleanstart-2026-dv49099 | Security fixes for CVE-2025-64756, CVE-2025-69873, CVE-2026-1525, CVE-2026-1526, CVE-2026-1527, CVE-2026-1528, CVE-2026-2229, CVE-2026-2327, CVE-2026-23745, CVE-2026-2391, CVE-2026-24842, CVE-2026-25128, CVE-2026-25547, CVE-2026-2581, CVE-2026-25896, CVE-2026-26278, CVE-2026-26960, CVE-2026-27601, CVE-2026-27903, CVE-2026-27904, CVE-2026-27942, CVE-2026-28292, CVE-2026-29786, CVE-2026-31802, CVE-2026-32141, CVE-2026-33036, ghsa-23c5-xmqv-rm74, ghsa-25h7-pfq9-p65f, ghsa-2g4f-4pwh-qvx6, ghsa-2mjp-6q6p-2qxm, ghsa-34x7-hfp2-rc4v, ghsa-37qj-frw5-hhjh, ghsa-38c4-r59v-3vqw, ghsa-3ppc-4f35-3m26, ghsa-4992-7rv2-5pvq, ghsa-5j98-mcp5-4vw2, ghsa-73rr-hh4g-fpgx, ghsa-7h2j-956f-4vf2, ghsa-7r86-cg39-jmmj, ghsa-83g3-92jg-28cx, ghsa-8gc5-j5rx-235r, ghsa-8qq5-rm4j-mr97, ghsa-8wc6-vgrq-x6cf, ghsa-9ppj-qmqm-q256, ghsa-f269-vfmq-vjvj, ghsa-fj3w-jwp8-x2g3, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-phc3-fgpg-7m6h, ghsa-qffp-2rhf-9h96, ghsa-qpx9-hpmf-5gmw, ghsa-r275-fr43-pm7q, ghsa-r6q2-hw4h-h46w, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w7fw-mjwx-w883 applied in versions: 43.4.4-r0 | 2026-04-01T09:31:16.419730Z | 2026-03-23T10:49:42Z |
| cleanstart-2026-li47669 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.26.2-r0, 1.26.3-r0, 1.26.3-r1 | 2026-04-01T09:31:09.448053Z | 2026-03-23T07:38:42Z |
| cleanstart-2026-nc32267 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.24.4-r0, 1.28.1-r0, 1.28.1-r1 | 2026-04-01T09:31:06.582607Z | 2026-03-23T07:39:20Z |
| cleanstart-2026-qv50101 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-8r3f-844c-mc37 applied in versions: 1.6.0-r0 | 2026-04-01T09:30:36.985458Z | 2026-03-23T07:45:33Z |
| cleanstart-2026-gm81143 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-8r3f-844c-mc37 applied in versions: 1.7.0-r0, 1.7.0-r1 | 2026-04-01T09:30:33.612618Z | 2026-03-23T07:45:53Z |
| cleanstart-2026-ia43044 | Security fixes for CVE-2020-8908, CVE-2022-42889, CVE-2023-2976, CVE-2024-25710, CVE-2024-26308, CVE-2024-29371, CVE-2024-29857, CVE-2024-30171, CVE-2024-31573, CVE-2024-47554, CVE-2025-11143, CVE-2025-12383, CVE-2025-48734, CVE-2025-48924, CVE-2025-58057, CVE-2025-67735, CVE-2025-68161, CVE-2025-8916, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.47.0-r2, 0.47.0-r3 | 2026-04-01T09:30:15.088429Z | 2026-03-23T07:56:09Z |
| cleanstart-2026-ld14062 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.27.4-r0, 1.27.4-r1, 1.27.7-r0 | 2026-04-01T09:30:12.003312Z | 2026-03-23T07:46:39Z |
| cleanstart-2026-jw59894 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.28.4-r0 | 2026-04-01T09:30:04.839715Z | 2026-03-23T07:47:23Z |
| cleanstart-2026-pw47027 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, ghsa-9h8m-3fm2-qjrq, ghsa-jv3w-x3r3-g6rm applied in versions: 1.28.1-r0, 1.28.1-r1, 1.28.3-r0, 1.29.0-r0 | 2026-04-01T09:30:02.510665Z | 2026-03-23T07:47:56Z |
| cleanstart-2026-fr61696 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.17.0-r0 | 2026-04-01T09:29:33.599999Z | 2026-03-23T07:49:32Z |
| cleanstart-2026-as59691 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-31837, CVE-2026-31838, ghsa-9h8m-3fm2-qjrq applied in versions: 1.28.3-r0 | 2026-04-01T09:29:30.943219Z | 2026-03-23T07:49:41Z |
| cleanstart-2026-pi36812 | Security fixes for CVE-2026-33186, ghsa-6v2p-p943-phr9, ghsa-c6gw-w398-hv78, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-p754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-qxp5-gw88-xv66, ghsa-v778-237x-gjrc, ghsa-vvgc-356p-c3xw applied in versions: 1.15.0-r1, 1.19.0-r0 | 2026-04-01T09:29:23.569974Z | 2026-03-23T07:52:18Z |
| cleanstart-2026-dc73689 | Security fixes for CVE-2025-11143, CVE-2025-67735, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.48.0-r1 | 2026-04-01T09:29:13.129218Z | 2026-03-23T08:05:00Z |
| cleanstart-2026-gy92571 | Security fixes for ghsa-22h5-pq3x-2gf2, ghsa-33mh-2634-fwr2, ghsa-4cx2-fc23-5wg6, ghsa-6xw4-3v39-52mm, ghsa-72hv-8253-57qq, ghsa-72qj-48g4-5xgx, ghsa-c2f4-jgmc-q2r5, ghsa-gh9q-2xrm-x6qv, ghsa-j4pr-3wm6-xx2r, ghsa-mhwm-jh88-3gjf, ghsa-mr3q-g2mv-mr4q, ghsa-p543-xpfm-54cp, ghsa-vc5p-v9hr-52mj, ghsa-vqg5-3255-v292, ghsa-w9pc-fmgc-vxvw, ghsa-wpv5-97wm-hp9c applied in versions: 9.0.8-r2, 9.0.8-r3, 9.0.8-r4, 9.3.0-r1, 9.3.0-r2 | 2026-04-01T09:28:54.070298Z | 2026-03-23T10:27:15Z |
| cleanstart-2026-gm79879 | Security fixes for CVE-2025-11143, CVE-2025-68161, CVE-2026-1002, CVE-2026-1605, ghsa-72hv-8253-57qq applied in versions: 0.49.1-r0 | 2026-04-01T09:28:51.825289Z | 2026-03-23T08:12:03Z |
| cleanstart-2026-ez47382 | Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23991, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2x5j-vhc8-9cwm, ghsa-59jp-pj84-45mr, ghsa-6m8w-jc87-6cr7, ghsa-jqc5-w2xx-5vq4, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-vvgc-356p-c3xw applied in versions: 1.14.4-r1, 1.14.4-r2, 1.16.3-r3, 1.16.3-r4 | 2026-04-01T09:28:49.379705Z | 2026-03-23T08:59:19Z |
| cleanstart-2026-ds86833 | Security fixes for CVE-2025-11143, CVE-2026-1605, ghsa-72hv-8253-57qq, ghsa-cphf-4846-3xx9 applied in versions: 0.50.0-r0, 0.50.1-r0 | 2026-04-01T09:28:26.952828Z | 2026-03-23T08:16:08Z |
| cleanstart-2026-nn77774 | Security fixes for CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 2.4.0-r0 | 2026-04-01T09:28:03.910369Z | 2026-03-23T12:37:31Z |
| cleanstart-2026-cu52059 | Security fixes for CVE-2025-61728, CVE-2025-61730, CVE-2026-24051, CVE-2026-27139, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq applied in versions: 3.3.0-r7, 3.5.0-r0 | 2026-04-01T09:27:57.960712Z | 2026-03-23T14:23:15Z |
| cleanstart-2026-am88528 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3 applied in versions: 3.6.16-r0, 3.6.18-r0, 3.6.19-r0, 3.6.19-r1, 3.6.19-r2, 3.6.19-r3, 3.7.4-r0 | 2026-04-01T09:27:52.956018Z | 2026-03-23T14:25:49Z |
| cleanstart-2026-mz18595 | Security fixes for CVE-2025-61730, CVE-2025-61732, CVE-2026-27139, CVE-2026-27142 applied in versions: 3.4.0-r7 | 2026-04-01T09:27:48.953742Z | 2026-03-23T14:24:01Z |
| cleanstart-2026-hk06185 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0, 3.7.9-r1, 3.7.9-r2, 4.0.2-r0 | 2026-04-01T09:27:48.241920Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-ka15295 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.7.0-r0, 3.7.0.-r1 | 2026-04-01T09:27:33.488765Z | 2026-03-23T14:26:32Z |
| cleanstart-2026-ci66802 | Security fixes for CVE-2015-2104, CVE-2020-8908, CVE-2021-21295, CVE-2021-21409, CVE-2021-37136, CVE-2022-1471, CVE-2022-41881, CVE-2023-27043, CVE-2023-2976, CVE-2023-34462, CVE-2023-6378, CVE-2024-12254, CVE-2024-12718, CVE-2024-12798, CVE-2024-12801, CVE-2024-27137, CVE-2024-6232, CVE-2024-6923, CVE-2024-9287, CVE-2025-0938, CVE-2025-23015, CVE-2025-4138, CVE-2025-4330, CVE-2025-4516, CVE-2025-4517, CVE-2026-1225, ghsa-25qh-j22f-pwp8, ghsa-3mc7-4q67-w48m, ghsa-5mg8-w23w-74h3, ghsa-6v67-2wr5-gvf4, ghsa-72hv-8253-57qq, ghsa-7g45-4rm6-3mm3, ghsa-98wm-3w3q-mw94, ghsa-9w3m-gqgf-c4p9, ghsa-c4r9-r8fh-9vj2, ghsa-hhhw-99gj-p3c3, ghsa-mjmj-j48q-9wg2, ghsa-pr98-23f8-jwxv, ghsa-qqpg-mvqg-649v, ghsa-vmq6-5m68-f53m, ghsa-w37g-rhq8-7m4j applied in versions: 4.0.17-r1, 4.0.19-r2, 4.0.19-r3, 4.1.9-r0 | 2026-04-01T09:27:07.387904Z | 2026-03-24T10:05:19Z |
| cleanstart-2026-id24148 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-33186 applied in versions: 0.28.7-r1, 0.29.0-r0, 0.30.0-r0 | 2026-04-01T09:27:05.843609Z | 2026-03-24T04:58:10Z |
| cleanstart-2026-db61851 | Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.8.11-r0, 1.8.11-r1, 1.8.11-r2, 1.8.11-r3, 1.9.4-r0 | 2026-04-01T09:26:58.691080Z | 2026-03-24T08:56:04Z |
| cleanstart-2026-km27583 | Security fixes for CVE-2015-2104, CVE-2023-27043, CVE-2024-12254, CVE-2024-12718, CVE-2024-12798, CVE-2024-12801, CVE-2024-27137, CVE-2024-6232, CVE-2024-6923, CVE-2024-9287, CVE-2025-0938, CVE-2025-23015, CVE-2025-4138, CVE-2025-4330, CVE-2025-4516, CVE-2025-4517, CVE-2025-58057, CVE-2026-1225, ghsa-25qh-j22f-pwp8, ghsa-3p8m-j85q-pgmj, ghsa-5mg8-w23w-74h3, ghsa-6v67-2wr5-gvf4, ghsa-72hv-8253-57qq, ghsa-7g45-4rm6-3mm3, ghsa-pr98-23f8-jwxv, ghsa-qqpg-mvqg-649v applied in versions: 4.0.17-r1, 4.1.9-r0, 5.0.6-r1, 5.0.6-r2 | 2026-04-01T09:26:50.907320Z | 2026-03-24T09:56:29Z |
| cleanstart-2026-jj09127 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-33186 applied in versions: 0.28.7-r1, 0.29.0-r0, 0.30.0-r0 | 2026-04-01T09:26:20.691727Z | 2026-03-24T04:58:10Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2019-ALE-003 | Campagnes de rançongiciels | 2019-01-31T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-002 | Vulnérabilités affectant l'écosystème Microsoft Exchange et Active Directory | 2019-01-30T00:00:00.000000 | 2019-03-06T00:00:00.000000 |
| CERTFR-2019-ALE-002 | Vulnérabilités affectant l'écosystème Microsoft Exchange et Active Directory | 2019-01-30T00:00:00.000000 | 2019-03-06T00:00:00.000000 |
| certfr-2019-ale-001 | Vulnérabilité dans le gestionnaire de paquets APT | 2019-01-22T00:00:00.000000 | 2019-02-27T00:00:00.000000 |
| CERTFR-2019-ALE-001 | Vulnérabilité dans le gestionnaire de paquets APT | 2019-01-22T00:00:00.000000 | 2019-02-27T00:00:00.000000 |
| certfr-2018-ale-013 | Vulnérabilité dans Microsoft Internet Explorer | 2018-12-20T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| CERTFR-2018-ALE-013 | Vulnérabilité dans Microsoft Internet Explorer | 2018-12-20T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| certfr-2018-ale-012 | Vulnérabilité dans Wallix AdminBastion | 2018-10-26T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| CERTFR-2018-ALE-012 | Vulnérabilité dans Wallix AdminBastion | 2018-10-26T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| certfr-2018-ale-011 | Vulnérabilité dans le client Git | 2018-10-08T00:00:00.000000 | 2018-10-12T00:00:00.000000 |
| CERTFR-2018-ALE-011 | Vulnérabilité dans le client Git | 2018-10-08T00:00:00.000000 | 2018-10-12T00:00:00.000000 |
| certfr-2018-ale-010 | Vulnérabilité activement exploitée dans le framework STRUTS 2 | 2018-08-29T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-009 | Vulnérabilité dans Microsoft Windows | 2018-08-29T00:00:00.000000 | 2018-09-17T00:00:00.000000 |
| CERTFR-2018-ALE-010 | Vulnérabilité activement exploitée dans le framework STRUTS 2 | 2018-08-29T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-009 | Vulnérabilité dans Microsoft Windows | 2018-08-29T00:00:00.000000 | 2018-09-17T00:00:00.000000 |
| certfr-2018-ale-008 | Campagne de messages électroniques non sollicités de type Locky Locker | 2018-08-03T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-008 | Campagne de messages électroniques non sollicités de type Locky Locker | 2018-08-03T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-007 | Multiples vulnérabilités dans S/MIME et OpenPGP | 2018-05-14T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-007 | Multiples vulnérabilités dans S/MIME et OpenPGP | 2018-05-14T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-006 | Vulnérabilité dans Cisco IOS et IOS XE Smart Install Client | 2018-04-06T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-006 | Vulnérabilité dans Cisco IOS et IOS XE Smart Install Client | 2018-04-06T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-005 | Multiples vulnérabilités dans Drupal | 2018-03-29T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-005 | Multiples vulnérabilités dans Drupal | 2018-03-29T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-004 | Vulnérabilité dans le serveur de messagerie Exim | 2018-03-07T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-004 | Vulnérabilité dans le serveur de messagerie Exim | 2018-03-07T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-003 | Vulnérabilité dans Adobe Flash Player | 2018-02-02T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| CERTFR-2018-ALE-003 | Vulnérabilité dans Adobe Flash Player | 2018-02-02T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| certfr-2018-ale-002 | Vulnérabilité dans Cisco Adaptive Security Appliance | 2018-02-01T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| CERTFR-2018-ALE-002 | Vulnérabilité dans Cisco Adaptive Security Appliance | 2018-02-01T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| certfr-2018-ale-001 | Multiples vulnérabilités de fuite d'informations dans des processeurs | 2018-01-04T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0211 | Multiples vulnérabilités dans Wireshark | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0210 | Multiples vulnérabilités dans Cisco Catalyst SD-WAN | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0209 | Multiples vulnérabilités dans les produits VMware | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0208 | Vulnérabilité dans les produits Synology | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0207 | Multiples vulnérabilités dans GitLab | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0206 | Multiples vulnérabilités dans les produits Trend Micro | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0205 | Multiples vulnérabilités dans SolarWinds Serv-U | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0204 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0203 | Vulnérabilité dans Microsoft Azure Linux | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0202 | Multiples vulnérabilités dans les produits SonicWall | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0201 | Multiples vulnérabilités dans Mattermost Server | 2026-02-24T00:00:00.000000 | 2026-03-26T00:00:00.000000 |
| certfr-2026-avi-0200 | Vulnérabilité dans Centreon open tickets | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0199 | Multiples vulnérabilités dans les produits VMware | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0198 | Multiples vulnérabilités dans Google Chrome | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0197 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-23T00:00:00.000000 | 2026-02-23T00:00:00.000000 |
| certfr-2026-avi-0196 | Multiples vulnérabilités dans les produits IBM | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0195 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0194 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0193 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0192 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0191 | Vulnérabilité dans Traefik | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0190 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0189 | Vulnérabilité dans F5 BIG-IP | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0188 | Multiples vulnérabilités dans les produits Splunk | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0187 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-19T00:00:00.000000 | 2026-02-23T00:00:00.000000 |
| certfr-2026-avi-0186 | Multiples vulnérabilités dans Google Chrome | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0185 | Vulnérabilité dans Microsoft Windows | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0184 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0183 | Vulnérabilité dans HPE Aruba Networking ClearPass Policy Manager | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0182 | Multiples vulnérabilités dans Atlassian Confluence | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-002592 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-03-26T13:25+09:00 | 2025-03-26T13:25+09:00 |
| jvndb-2025-000019 | Multiple vulnerabilities in AssetView | 2025-03-25T17:10+09:00 | 2025-03-25T17:10+09:00 |
| jvndb-2025-000018 | Multiple vulnerabilities in home gateway HGW-BL1500HM | 2025-03-19T15:33+09:00 | 2025-03-28T11:48+09:00 |
| jvndb-2025-000020 | +F FS010M vulnerable to OS command injection | 2025-03-18T15:01+09:00 | 2025-03-18T15:01+09:00 |
| jvndb-2025-000017 | hostapd vulnerable to improper processing of RADIUS packets | 2025-03-12T14:19+09:00 | 2025-03-12T14:19+09:00 |
| jvndb-2025-000016 | Multiple vulnerabilities in RemoteView Agent (for Windows) | 2025-03-06T14:27+09:00 | 2025-03-10T15:22+09:00 |
| jvndb-2025-001898 | Multiple vulnerabilities in FutureNet AS series (Industrial Routers) and FA series (Protocol Conversion Machine) | 2025-03-04T14:56+09:00 | 2025-03-04T14:56+09:00 |
| jvndb-2025-001605 | "RoboForm Password Manager" App for Android vulnerable to authentication bypass using an alternate path or channel | 2025-02-20T20:15+09:00 | 2025-02-20T20:15+09:00 |
| jvndb-2025-000014 | Multiple cross-site scripting vulnerabilities in Movable Type | 2025-02-19T16:19+09:00 | 2025-02-19T16:19+09:00 |
| jvndb-2025-000015 | RevoWorks SCVX and RevoWorks Browser vulnerable to incorrect resource transfer between spheres | 2025-02-19T14:51+09:00 | 2025-02-19T14:51+09:00 |
| jvndb-2025-001563 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation Corp. MFPs | 2025-02-18T16:33+09:00 | 2025-02-18T16:33+09:00 |
| jvndb-2025-001562 | Out-of-bounds read vulnerability in OMRON CX-Programmer | 2025-02-18T16:24+09:00 | 2025-02-18T16:24+09:00 |
| jvndb-2025-001548 | Out-of-bounds read vulnerability in Cente middleware | 2025-02-17T18:22+09:00 | 2025-02-17T18:22+09:00 |
| jvndb-2025-000012 | Multiple vulnerabilities in The LuxCal Web Calendar | 2025-02-17T13:43+09:00 | 2025-02-17T13:43+09:00 |
| jvndb-2025-000013 | acmailer CGI and acmailer DB vulnerable to OS command injection | 2025-02-14T16:39+09:00 | 2025-02-14T16:39+09:00 |
| jvndb-2025-000002 | Multiple vulnerabilities in NEC Aterm series (NV25-003) | 2025-02-14T15:48+09:00 | 2025-02-14T15:48+09:00 |
| jvndb-2025-000011 | Multiple vulnerabilities in FileMegane | 2025-02-13T13:39+09:00 | 2025-02-13T13:39+09:00 |
| jvndb-2025-000010 | acmailer vulnerable to cross-site scripting | 2025-02-12T15:05+09:00 | 2025-02-12T15:05+09:00 |
| jvndb-2025-001017 | Multiple vulnerabilities in STEALTHONE D220/D340/D440 | 2025-02-06T18:27+09:00 | 2025-02-06T18:27+09:00 |
| jvndb-2025-001016 | OMRON NJ/NX series vulnerable to path traversal | 2025-02-06T18:27+09:00 | 2025-05-08T17:44+09:00 |
| jvndb-2025-001018 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON NB-Designer | 2025-02-06T18:26+09:00 | 2025-02-06T18:26+09:00 |
| jvndb-2025-000008 | Multiple vulnerabilities in Defense Platform Home Edition | 2025-02-05T14:06+09:00 | 2025-02-05T14:06+09:00 |
| jvndb-2025-000009 | WordPress Plugin "Activity Log WinterLock" vulnerable to cross-site request forgery | 2025-02-04T13:58+09:00 | 2025-02-04T13:58+09:00 |
| jvndb-2025-001244 | Clickjacking Vulnerability in JP1/ServerConductor/Deployment Manager | 2025-01-30T18:19+09:00 | 2025-01-30T18:19+09:00 |
| jvndb-2025-000007 | SXF Common Library vulnerable to improper input data handling | 2025-01-29T14:57+09:00 | 2025-01-29T14:57+09:00 |
| jvndb-2025-001238 | Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers | 2025-01-29T13:41+09:00 | 2025-05-27T16:06+09:00 |
| jvndb-2025-000006 | WordPress Plugin "Simple Image Sizes" vulnerable to cross-site scripting | 2025-01-28T13:44+09:00 | 2025-01-28T13:44+09:00 |
| jvndb-2025-000005 | EXIF Viewer Classic vulnerable to cross-site scripting | 2025-01-27T14:25+09:00 | 2025-01-27T14:25+09:00 |
| jvndb-2025-000004 | Multiple vulnerabilities in I-O DATA router UD-LT2 | 2025-01-22T13:55+09:00 | 2025-02-20T15:55+09:00 |
| jvndb-2025-000003 | FortiWeb vulnerable to SQL injection | 2025-01-21T15:59+09:00 | 2025-01-21T15:59+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14396 | OpenClaw文件包含漏洞 | 2026-03-12 | 2026-03-20 |
| cnvd-2026-14395 | OpenClaw访问控制错误漏洞(CNVD-2026-14395) | 2026-03-12 | 2026-03-20 |
| cnvd-2026-13832 | OpenClaw拒绝服务漏洞(CNVD-2026-13832) | 2026-03-12 | 2026-03-16 |
| cnvd-2026-13801 | OpenClaw命令注入漏洞(CNVD-2026-13801) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13800 | OpenClaw拒绝服务漏洞(CNVD-2026-13800) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13601 | OpenClaw信息泄露漏洞(CNVD-2026-13601) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13596 | OpenClaw存在未明漏洞(CNVD-2026-13596) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13595 | OpenClaw访问控制错误漏洞(CNVD-2026-13595) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13594 | OpenClaw加密问题漏洞 | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13593 | OpenClaw存在未明漏洞(CNVD-2026-13593) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13592 | OpenClaw路径遍历漏洞(CNVD-2026-13592) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13591 | OpenClaw数据伪造问题漏洞(CNVD-2026-13591) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13590 | OpenClaw代码问题漏洞(CNVD-2026-13590) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13589 | OpenClaw存在未明漏洞(CNVD-2026-13589) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13588 | OpenClaw访问控制错误漏洞(CNVD-2026-13588) | 2026-03-12 | 2026-03-13 |
| cnvd-2026-13555 | OpenClaw任意文件读取漏洞(CNVD-2026-13555) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13554 | OpenClaw拒绝服务漏洞(CNVD-2026-13554) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13553 | OpenClaw路径遍历漏洞 | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13552 | OpenClaw拒绝服务漏洞(CNVD-2026-13552) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13551 | OpenClaw路径遍历漏洞(CNVD-2026-13551) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13544 | OpenClaw身份伪造漏洞 | 2026-03-12 | 2026-03-12 |
| cnvd-2026-13543 | OpenClaw拒绝服务漏洞(CNVD-2026-13543) | 2026-03-12 | 2026-03-12 |
| cnvd-2026-15390 | Mozilla Firefox和Mozilla Thunderbird代码执行漏洞 | 2026-03-11 | 2026-03-31 |
| cnvd-2026-15389 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15389) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15388 | 多款Mozilla产品代码执行漏洞(CNVD-2026-15388) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15387 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15387) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15386 | 多款Mozilla产品代码执行漏洞(CNVD-2026-15386) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15385 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15385) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15384 | 多款Mozilla产品整数溢出漏洞(CNVD-2026-15384) | 2026-03-11 | 2026-03-30 |
| cnvd-2026-15383 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-15383) | 2026-03-11 | 2026-03-30 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01454 | Уязвимость функции rcu_tasks_rude_wait_gp() модуля kernel/rcu/tasks.h ядра операционной с… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01453 | Уязвимость функции gfs2_show_options() модуля fs/gfs2/super.c файловой системы GFS2 ядра … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01452 | Уязвимость функции show_ipi_list() модуля arch/loongarch/kernel/smp.c поддержки архитекту… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01451 | Уязвимость функции ucsi_read_message_in() модуля drivers/usb/typec/ucsi/ucsi.c драйвера п… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01450 | Уязвимость определения структуры imx8mp_blk_ctrl_domain_data{} модуля drivers/pmdomain/im… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01449 | Уязвимость функции free_netvsc_device() модуля drivers/net/hyperv/netvsc.c драйвера подде… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01448 | Уязвимость функции iwl_txq_reclaim() модуля drivers/net/wireless/intel/iwlwifi/queue/tx.c… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01447 | Уязвимость функции x86_android_tablet_remove() модуля drivers/platform/x86/x86-android-ta… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01446 | Уязвимость функции __ext4_fill_super() модуля fs/ext4/super.c ядра операционной системы L… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01445 | Уязвимость функции ena_com_cdesc_rx_pkt_get() модуля drivers/net/ethernet/amazon/ena/ena_… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01444 | Уязвимость функции scrub_submit_extent_sector_read() модуля fs/btrfs/scrub.c поддержки фа… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01443 | Уязвимость функции nvmf_reg_read32() модуля drivers/nvme/host/fabrics.c драйвера поддержк… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01442 | Уязвимость функции kvm_get_mode() модуля arch/arm64/include/asm/kvm_host.h поддержки плат… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01441 | Уязвимость компонента RDMA/mlx5 ядра операционной системы Linux, позволяющая нарушителю в… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01440 | Уязвимость команды WMI_TXSTATUS_EVENTID ядра операционной системы Linux, позволяющая нару… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01439 | Уязвимость компонента smb ядра операционной системы Linux, позволяющая нарушителю оказать… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01438 | Уязвимость функции stbi__convert_format библиотек для C/C++ Libstb, позволяющая нарушител… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01437 | Уязвимость компонента kdc/do_tgs_req.c сетевого протокола аутентификации Kerberos, позвол… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01436 | Уязвимость программной платформы Node.js, связанная с неконтролируемым расходом ресурсов,… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01435 | Уязвимость функций Buffer.fill() и Buffer.alloc() программной платформы Node.js, позволяю… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01434 | Уязвимость компонентов node_http2 программной платформы Node.js, позволяющая нарушителю в… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01433 | Уязвимость сетевого протокола аутентификации Kerberos, связанная с непринятием мер по ней… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01432 | Уязвимость сетевого протокола аутентификации Kerberos, связанная с недостатком использова… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01431 | Уязвимость программной платформы для разработки и управления веб-приложениями Symfony, св… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01430 | Уязвимость функции url.parse() программной платформы Node.js, позволяющая нарушителю оказ… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01429 | Уязвимость компонентов http программной платформы Node.js, позволяющая нарушителю вызвать… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01428 | Уязвимость кодировки UCS-2 программной платформы Node.js, позволяющая нарушителю вызвать … | 09.02.2026 | 09.02.2026 |
| bdu:2026-01427 | Уязвимость функции GetImagePixelCache компонента MagickCore/cache.c консольного графическ… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01426 | Уязвимость функции WriteTIFFImage компонента coders/tiff.c консольного графического редак… | 09.02.2026 | 09.02.2026 |
| bdu:2026-01425 | Уязвимость функции MontageImageCommand компонента MagickWand/montage.c консольного графич… | 09.02.2026 | 09.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200610-0022 | User interface inconsistency in Workgroup Manager in Apple Mac OS X 10.4 through 10.4.7 a… | 2024-07-23T21:56:15.078000Z |
| var-200905-0505 | Array index error in the insertItemBefore method in WebKit, as used in Apple Safari befor… | 2024-07-23T21:56:07.125000Z |
| var-201912-0618 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:36.712000Z |
| var-202112-2011 | Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 an… | 2024-07-23T21:55:35.394000Z |
| var-201810-0932 | The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side chan… | 2024-07-23T21:55:35.727000Z |
| var-201210-0063 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:55:35.147000Z |
| var-200809-0182 | ImageIO in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows context-dependent attack… | 2024-07-23T21:55:33.188000Z |
| var-201903-0417 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:16.315000Z |
| var-201912-0597 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:13.309000Z |
| var-200809-0009 | ImageIO in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows context-dependent attack… | 2024-07-23T21:55:12.610000Z |
| var-201704-1589 | In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server t… | 2024-07-23T21:55:11.835000Z |
| var-200911-0398 | The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Int… | 2024-07-23T21:54:40.707000Z |
| var-201912-0128 | A logic issue was addressed with improved state management. This issue is fixed in watchO… | 2024-07-23T21:54:39.274000Z |
| var-201502-0366 | named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when D… | 2024-07-23T21:54:05.549000Z |
| var-201006-1183 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2024-07-23T21:53:56.790000Z |
| var-202003-1784 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:53:51.536000Z |
| var-201302-0132 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:53:51.971000Z |
| var-201711-0447 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:53:49.059000Z |
| var-201805-0963 | Systems with microprocessors utilizing speculative execution and speculative execution of… | 2024-07-23T21:53:48.206000Z |
| var-200102-0104 | "Multiple Users" Control Panel in Mac OS 9 allows Normal users to gain Owner privileges b… | 2024-07-23T21:53:48.441000Z |
| var-201403-0387 | Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python … | 2024-07-23T21:53:47.789000Z |
| var-201208-0344 | libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, does not pro… | 2024-07-23T21:53:17.145000Z |
| var-201910-1495 | The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print… | 2024-07-23T21:53:16.217000Z |
| var-201912-0579 | A logic issue existed in the handling of synchronous page loads. This issue was addressed… | 2024-07-23T21:53:15.777000Z |
| var-200905-0196 | racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denia… | 2024-07-23T21:53:12.318000Z |
| var-200609-0315 | Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary c… | 2024-07-23T21:53:10.410000Z |
| var-202212-1751 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2024-07-23T21:52:34.161000Z |
| var-201404-0398 | Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 an… | 2024-07-23T21:52:34.093000Z |
| var-201008-0172 | Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType befor… | 2024-07-23T21:52:33.872000Z |
| var-202108-2172 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:52:30.241000Z |