Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-33096 |
7.5 (3.1)
|
HTTP.sys Denial of Service Vulnerability |
Microsoft |
Windows 11 version 22H3 |
2026-04-14T16:57:45.953Z | 2026-04-16T14:18:37.154Z |
| CVE-2025-62571 |
7.8 (3.1)
|
Windows Installer Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:55:41.832Z | 2026-04-16T14:18:37.112Z |
| CVE-2026-33095 |
7.8 (3.1)
|
Microsoft Word Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-04-14T16:57:45.386Z | 2026-04-16T14:18:36.534Z |
| CVE-2025-62564 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:41.228Z | 2026-04-16T14:18:36.486Z |
| CVE-2025-62563 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:40.704Z | 2026-04-16T14:18:35.957Z |
| CVE-2026-32226 |
5.9 (3.1)
|
.NET Framework Denial of Service Vulnerability |
Microsoft |
Microsoft .NET Framework 3.5 AND 4.7.2 |
2026-04-14T16:57:44.474Z | 2026-04-16T14:18:35.942Z |
| CVE-2026-32224 |
7 (3.1)
|
Windows Server Update Service (WSUS) Elevation of Priv… |
Microsoft |
Windows 11 version 26H1 |
2026-04-14T16:57:43.822Z | 2026-04-16T14:18:35.421Z |
| CVE-2025-62562 |
7.8 (3.1)
|
Microsoft Outlook Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:40.028Z | 2026-04-16T14:18:35.343Z |
| CVE-2025-62561 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-12-09T17:55:39.367Z | 2026-04-16T14:18:34.760Z |
| CVE-2026-32222 |
7.8 (3.1)
|
Windows Win32k Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2026-04-14T16:57:42.408Z | 2026-04-16T14:18:34.728Z |
| CVE-2026-32221 |
8.4 (3.1)
|
Windows Graphics Component Remote Code Execution Vulne… |
Microsoft |
Windows 11 Version 24H2 |
2026-04-14T16:57:41.793Z | 2026-04-16T14:18:34.161Z |
| CVE-2025-62549 |
8.8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Remot… |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:55:38.801Z | 2026-04-16T14:18:34.154Z |
| CVE-2025-62473 |
6.5 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Infor… |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:55:38.210Z | 2026-04-16T14:18:33.591Z |
| CVE-2026-32220 |
4.4 (3.1)
|
UEFI Secure Boot Security Feature Bypass Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2026-04-14T16:57:40.959Z | 2026-04-16T14:18:33.489Z |
| CVE-2026-32219 |
7 (3.1)
|
Microsoft Brokering File System Elevation of Privilege… |
Microsoft |
Windows 11 Version 24H2 |
2026-04-14T16:57:40.275Z | 2026-04-16T14:18:32.828Z |
| CVE-2025-62472 |
7.8 (3.1)
|
Windows Remote Access Connection Manager Elevation of … |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:55:37.606Z | 2026-04-16T14:18:32.768Z |
| CVE-2026-32218 |
5.5 (3.1)
|
Windows Kernel Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 21H2 |
2026-04-14T16:57:39.560Z | 2026-04-16T14:18:32.246Z |
| CVE-2025-62470 |
7.8 (3.1)
|
Windows Common Log File System Driver Elevation of Pri… |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:55:36.983Z | 2026-04-16T14:18:32.198Z |
| CVE-2025-62469 |
7 (3.1)
|
Microsoft Brokering File System Elevation of Privilege… |
Microsoft |
Windows 11 Version 24H2 |
2025-12-09T17:55:36.456Z | 2026-04-16T14:18:31.537Z |
| CVE-2026-32217 |
5.5 (3.1)
|
Windows Kernel Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:57:38.988Z | 2026-04-16T14:18:31.520Z |
| CVE-2025-62466 |
7.8 (3.1)
|
Windows Client-Side Caching Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:55:35.762Z | 2026-04-16T14:18:30.910Z |
| CVE-2026-32216 |
5.5 (3.1)
|
Windows Redirected Drive Buffering System Denial of Se… |
Microsoft |
Windows 11 version 26H1 |
2026-04-14T16:57:38.302Z | 2026-04-16T14:18:30.906Z |
| CVE-2025-62458 |
7.8 (3.1)
|
Win32k Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-12-09T17:55:34.989Z | 2026-04-16T14:18:30.205Z |
| CVE-2026-32215 |
5.5 (3.1)
|
Windows Kernel Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2026-04-14T16:57:37.693Z | 2026-04-16T14:18:29.343Z |
| CVE-2025-62457 |
7.8 (3.1)
|
Windows Cloud Files Mini Filter Driver Elevation of Pr… |
Microsoft |
Windows 10 Version 1809 |
2025-12-09T17:55:34.137Z | 2026-04-16T14:18:20.988Z |
| CVE-2026-32202 |
4.3 (3.1)
|
Windows Shell Spoofing Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-04-14T16:57:36.996Z | 2026-04-16T14:18:20.780Z |
| CVE-2025-62456 |
8.8 (3.1)
|
Windows Resilient File System (ReFS) Remote Code Execu… |
Microsoft |
Windows 11 version 22H3 |
2025-12-09T17:55:33.275Z | 2026-04-16T14:18:20.423Z |
| CVE-2026-32195 |
7 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 version 26H1 |
2026-04-14T16:57:36.253Z | 2026-04-16T14:18:20.212Z |
| CVE-2025-62454 |
7.8 (3.1)
|
Windows Cloud Files Mini Filter Driver Elevation of Pr… |
Microsoft |
Windows 10 Version 1809 |
2025-12-09T17:55:32.317Z | 2026-04-16T14:18:19.763Z |
| CVE-2026-32192 |
7.8 (3.1)
|
Azure Monitor Agent Elevation of Privilege Vulnerability |
Microsoft |
Azure Monitor |
2026-04-14T16:57:35.447Z | 2026-04-16T14:18:19.716Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2018-25246 |
8.7 (4.0)
7.5 (3.1)
|
Wikipedia 12.0 Denial of Service via Search |
Wikipedia |
Wikipedia |
2026-04-04T19:59:31.660Z | 2026-04-06T18:02:53.895Z |
| CVE-2018-25245 |
8.7 (4.0)
7.5 (3.1)
|
7 Tik 1.0.1.0 Denial of Service via Search |
7Tik |
7 Tik |
2026-04-04T13:51:11.572Z | 2026-04-06T16:41:49.928Z |
| CVE-2018-25244 |
6.9 (4.0)
6.2 (3.1)
|
Eco Search 1.0.2.0 Denial of Service |
EcoSearch |
Eco Search |
2026-04-04T13:51:10.888Z | 2026-04-06T18:02:54.185Z |
| CVE-2018-25243 |
6.9 (4.0)
6.2 (3.1)
|
FastTube 1.0.1.0 Denial of Service via Search |
FastTube |
FastTube |
2026-04-04T13:51:10.119Z | 2026-04-06T15:40:16.729Z |
| CVE-2018-25242 |
6.9 (4.0)
6.2 (3.1)
|
One Search 1.1.0.0 Denial of Service |
OneSearch |
One Search |
2026-04-04T13:51:09.345Z | 2026-04-06T13:28:11.892Z |
| CVE-2018-25241 |
8.7 (4.0)
7.5 (3.1)
|
VPN Browser+ 1.1.0.0 Denial of Service |
VPNBrowser |
VPN Browser+ |
2026-04-04T13:51:08.550Z | 2026-04-06T15:28:31.164Z |
| CVE-2018-25240 |
6.9 (4.0)
6.2 (3.1)
|
Watchr 1.1.0.0 Denial of Service via Search |
Watchr |
Watchr |
2026-04-04T13:51:07.827Z | 2026-04-06T19:05:28.808Z |
| CVE-2018-25239 |
6.9 (4.0)
6.2 (3.1)
|
Smart VPN 1.1.3.0 Denial of Service via Search |
SmartVPN |
Smart VPN |
2026-04-04T13:51:07.117Z | 2026-04-06T16:42:33.379Z |
| CVE-2018-25238 |
6.9 (4.0)
6.2 (3.1)
|
VSCO 1.1.1.0 Denial of Service via Search |
vsco |
VSCO |
2026-04-04T13:51:06.397Z | 2026-04-06T18:02:54.326Z |
| CVE-2016-20061 |
8.5 (4.0)
7.8 (3.1)
|
sheed AntiVirus 2.3 Unquoted Service Path Privilege Es… |
Sheedantivirus |
sheed AntiVirus |
2026-04-04T13:51:05.616Z | 2026-04-06T15:41:08.215Z |
| CVE-2016-20060 |
8.5 (4.0)
7.8 (3.1)
|
Hotspot Shield 6.0.3 Unquoted Service Path Privilege E… |
Hotspotshield |
Hotspot Shield |
2026-04-04T13:51:04.326Z | 2026-04-06T13:29:02.393Z |
| CVE-2016-20056 |
8.5 (4.0)
7.8 (3.1)
|
Spy Emergency build 23.0.205 Unquoted Service Path Pri… |
Spy-Emergency |
Spy Emergency |
2026-04-04T13:50:59.759Z | 2026-04-06T18:02:54.460Z |
| CVE-2026-21765 |
8.8 (3.1)
|
HCL BigFix Platform is affected by insecure permission… |
HCLSoftware |
BigFix Platform |
2026-04-01T23:36:45.573Z | 2026-04-02T18:21:14.546Z |
| CVE-2022-0239 |
4.7 (3.0)
|
Improper Restriction of XML External Entity Reference … |
stanfordnlp |
stanfordnlp/corenlp |
2022-01-17T06:15:11.000Z | 2024-08-23T14:38:48.375Z |
| CVE-2026-21767 |
4 (3.1)
|
HCL BigFix Platform is affected by insufficient authen… |
HCLSoftware |
BigFix Platform |
2026-04-01T23:47:39.363Z | 2026-04-02T18:22:19.150Z |
| CVE-2026-33613 |
7.2 (3.1)
|
MB connect line mbCONNECT24 vulnerable to RCE in gener… |
MB connect line |
mbCONNECT24 |
2026-04-02T08:59:34.008Z | 2026-04-02T13:42:38.209Z |
| CVE-2026-33614 |
7.5 (3.1)
|
MB connect line mbCONNECT24 vulnerable to an unauthent… |
MB connect line |
mbCONNECT24 |
2026-04-02T08:59:40.736Z | 2026-04-02T13:30:10.029Z |
| CVE-2026-33615 |
9.1 (3.1)
|
MB connect line mbCONNECT24 vulnerable to an unauthent… |
MB connect line |
mbCONNECT24 |
2026-04-02T08:59:48.843Z | 2026-04-02T14:29:46.546Z |
| CVE-2026-33616 |
7.5 (3.1)
|
MB connect line mbCONNECT24 vulnerable to an unauthent… |
MB connect line |
mbCONNECT24 |
2026-04-02T08:59:55.743Z | 2026-04-02T13:08:18.951Z |
| CVE-2026-33617 |
5.3 (3.1)
|
MB connect line mbCONNECT24 vulnerable to an unauthent… |
MB connect line |
mbCONNECT24 |
2026-04-02T09:00:10.713Z | 2026-04-03T17:21:51.783Z |
| CVE-2026-27284 |
7.8 (3.1)
|
InDesign Desktop | Out-of-bounds Read (CWE-125) |
Adobe |
InDesign Desktop |
2026-04-14T16:45:55.885Z | 2026-04-15T03:58:30.100Z |
| CVE-2026-27283 |
7.8 (3.1)
|
InDesign Desktop | Use After Free (CWE-416) |
Adobe |
InDesign Desktop |
2026-04-14T16:45:52.852Z | 2026-04-15T03:58:28.922Z |
| CVE-2026-27238 |
7.8 (3.1)
|
InDesign Desktop | Heap-based Buffer Overflow (CWE-122) |
Adobe |
InDesign Desktop |
2026-04-14T16:45:51.566Z | 2026-04-15T03:58:36.317Z |
| CVE-2026-27286 |
5.5 (3.1)
|
InDesign Desktop | Heap-based Buffer Overflow (CWE-122) |
Adobe |
InDesign Desktop |
2026-04-14T16:45:54.103Z | 2026-04-14T19:37:43.093Z |
| CVE-2026-27285 |
5.5 (3.1)
|
InDesign Desktop | Heap-based Buffer Overflow (CWE-122) |
Adobe |
InDesign Desktop |
2026-04-14T16:45:54.941Z | 2026-04-14T19:41:12.307Z |
| CVE-2026-6409 |
7.1 (4.0)
|
Denial of Service (DoS) vulnerability exists in the Pr… |
Protocol Buffers |
Protobuf-php (Pecl) |
2026-04-16T14:30:51.568Z | 2026-04-16T15:24:43.164Z |
| CVE-2026-40786 |
4.3 (3.1)
|
WordPress MyRewards plugin <= 5.7.3 - Broken Access Co… |
Long Watch Studio |
MyRewards |
2026-04-15T10:21:36.068Z | 2026-04-16T14:20:54.766Z |
| CVE-2026-40778 |
5.3 (3.1)
|
WordPress Majestic Support plugin <= 1.1.2 - Broken Ac… |
Majestic Support |
Majestic Support |
2026-04-15T10:21:35.665Z | 2026-04-16T14:35:34.783Z |
| CVE-2026-40763 |
5.3 (3.1)
|
WordPress Royal Elementor Addons plugin <= 1.7.1056 - … |
WP Royal |
Royal Elementor Addons |
2026-04-15T10:21:35.155Z | 2026-04-16T14:41:45.860Z |
| CVE-2026-40744 |
8.5 (3.1)
|
WordPress Beaver Builder plugin <= 2.10.1.2 - SQL Inje… |
Beaver Builder |
Beaver Builder |
2026-04-15T10:21:34.729Z | 2026-04-16T14:47:03.967Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2018-25246 | Wikipedia 12.0 contains a denial of service vulnerability that allows unauthenticated attackers to … | 2026-04-04T20:16:18.210 | 2026-04-16T16:15:56.380 |
| fkie_cve-2018-25245 | 7 Tik 1.0.1.0 contains a denial of service vulnerability that allows attackers to crash the applica… | 2026-04-04T14:16:20.330 | 2026-04-16T16:15:56.380 |
| fkie_cve-2018-25244 | Eco Search 1.0.2.0 contains a denial of service vulnerability that allows local attackers to crash … | 2026-04-04T14:16:20.160 | 2026-04-16T16:15:56.380 |
| fkie_cve-2018-25243 | FastTube 1.0.1.0 contains a denial of service vulnerability that allows local attackers to crash th… | 2026-04-04T14:16:19.993 | 2026-04-16T16:15:56.380 |
| fkie_cve-2018-25242 | One Search 1.1.0.0 contains a denial of service vulnerability that allows local attackers to crash … | 2026-04-04T14:16:19.810 | 2026-04-16T16:15:56.380 |
| fkie_cve-2018-25241 | VPN Browser+ 1.1.0.0 contains a denial of service vulnerability that allows unauthenticated attacke… | 2026-04-04T14:16:19.623 | 2026-04-16T16:15:56.380 |
| fkie_cve-2018-25240 | Watchr 1.1.0.0 contains a denial of service vulnerability that allows local attackers to crash the … | 2026-04-04T14:16:19.453 | 2026-04-16T16:15:56.380 |
| fkie_cve-2018-25239 | Smart VPN 1.1.3.0 contains a denial of service vulnerability that allows local attackers to crash t… | 2026-04-04T14:16:19.293 | 2026-04-16T16:15:56.380 |
| fkie_cve-2018-25238 | VSCO 1.1.1.0 contains a denial of service vulnerability that allows local attackers to crash the ap… | 2026-04-04T14:16:19.120 | 2026-04-16T16:15:56.380 |
| fkie_cve-2016-20061 | sheed AntiVirus 2.3 contains an unquoted service path vulnerability in the ShavProt service that al… | 2026-04-04T14:16:18.930 | 2026-04-16T16:15:56.380 |
| fkie_cve-2016-20060 | Hotspot Shield 6.0.3 contains an unquoted service path vulnerability in the hshld service binary th… | 2026-04-04T14:16:18.757 | 2026-04-16T16:15:56.380 |
| fkie_cve-2016-20056 | Spy Emergency build 23.0.205 contains an unquoted service path vulnerability in the SpyEmrgHealth a… | 2026-04-04T14:16:18.057 | 2026-04-16T16:15:56.380 |
| fkie_cve-2026-21765 | HCL BigFix Platform is affected by insecure permissions on private cryptographic keys. The private… | 2026-04-02T00:16:23.953 | 2026-04-16T16:07:39.550 |
| fkie_cve-2022-0239 | corenlp is vulnerable to Improper Restriction of XML External Entity Reference | 2022-01-17T07:15:06.867 | 2026-04-16T16:07:03.053 |
| fkie_cve-2026-21767 | HCL BigFix Platform is affected by insufficient authentication. The application might allow users … | 2026-04-02T00:16:24.147 | 2026-04-16T16:05:38.500 |
| fkie_cve-2026-33613 | Due to the improper neutralisation of special elements used in an OS command, a remote attacker can… | 2026-04-02T10:16:15.727 | 2026-04-16T15:49:47.683 |
| fkie_cve-2026-33614 | An unauthenticated remote attacker can exploit an unauthenticated SQL Injection vulnerability in th… | 2026-04-02T10:16:16.723 | 2026-04-16T15:45:35.270 |
| fkie_cve-2026-33615 | An unauthenticated remote attacker can exploit an unauthenticated SQL Injection vulnerability in th… | 2026-04-02T10:16:16.910 | 2026-04-16T15:45:00.943 |
| fkie_cve-2026-33616 | An unauthenticated remote attacker can exploit an unauthenticated blind SQL Injection vulnerability… | 2026-04-02T10:16:17.080 | 2026-04-16T15:41:30.207 |
| fkie_cve-2026-33617 | An unauthenticated remote attacker can access a configuration file containing database credentials.… | 2026-04-02T10:16:17.260 | 2026-04-16T15:40:56.680 |
| fkie_cve-2026-27284 | InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds read vulnerabil… | 2026-04-14T17:16:48.040 | 2026-04-16T15:35:38.830 |
| fkie_cve-2026-27283 | InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Use After Free vulnerability t… | 2026-04-14T17:16:47.883 | 2026-04-16T15:35:29.583 |
| fkie_cve-2026-27238 | InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vul… | 2026-04-14T17:16:47.717 | 2026-04-16T15:35:21.867 |
| fkie_cve-2026-27286 | InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vul… | 2026-04-14T17:16:48.357 | 2026-04-16T15:33:03.350 |
| fkie_cve-2026-27285 | InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vul… | 2026-04-14T17:16:48.200 | 2026-04-16T15:32:29.730 |
| fkie_cve-2026-6409 | A Denial of Service (DoS) vulnerability exists in the Protobuf PHP library during the parsing of un… | 2026-04-16T15:17:41.910 | 2026-04-16T15:17:41.910 |
| fkie_cve-2026-40786 | Missing Authorization vulnerability in Long Watch Studio MyRewards woorewards allows Exploiting Inc… | 2026-04-15T11:16:37.153 | 2026-04-16T15:17:40.500 |
| fkie_cve-2026-40778 | Missing Authorization vulnerability in Majestic Support Majestic Support majestic-support allows Ex… | 2026-04-15T11:16:36.900 | 2026-04-16T15:17:40.333 |
| fkie_cve-2026-40763 | Missing Authorization vulnerability in WP Royal Royal Elementor Addons royal-elementor-addons allow… | 2026-04-15T11:16:36.657 | 2026-04-16T15:17:40.167 |
| fkie_cve-2026-40744 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-04-15T11:16:36.413 | 2026-04-16T15:17:39.990 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-8m7q-ggj7-m3wx |
7.5 (3.1)
|
The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' … | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-83mq-cmhp-6pvq |
6.1 (3.1)
|
The CodeColorer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' p… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-742g-5jmq-x7cr |
6.4 (3.1)
|
The Vantage theme for WordPress is vulnerable to Stored Cross-Site Scripting via Gallery block text… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-6pcx-jf98-3w2h |
7.5 (3.1)
|
The Payment Gateway for Redsys & WooCommerce Lite plugin for WordPress is vulnerable to Improper Ve… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-6cjg-w4wg-37mh |
9.8 (3.1)
|
The Riaxe Product Customizer plugin for WordPress is vulnerable to Privilege Escalation in all vers… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-4xx2-h7jh-g7ph |
4.4 (3.1)
|
The Custom New User Notification plugin for WordPress is vulnerable to Stored Cross-Site Scripting … | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-4g9p-x8vm-f7qg |
5.3 (3.1)
|
The Riaxe Product Customizer plugin for WordPress is vulnerable to authorization bypass in all vers… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-45x5-433g-pc2h |
5.3 (3.1)
|
The Basic Google Maps Placemarks plugin for WordPress is vulnerable to authorization bypass in vers… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-3phr-p473-vc8q |
8.8 (3.1)
|
The AcyMailing plugin for WordPress is vulnerable to privilege escalation in all versions From 9.11… | 2026-04-16T06:31:23Z | 2026-04-16T06:31:23Z |
| ghsa-wxm2-x9x9-x5mj |
9.3 (3.1)
|
Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a crafted mod. | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-wc72-m63f-4pcv |
6.4 (3.1)
|
The WP YouTube Lyte plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugi… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-vmw6-xgxq-pw9v |
5.4 (4.0)
|
An Incorrect Permission Assignment for Critical Resource vulnerability in the ASUS DriverHub update… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-v352-gq4q-9qjf |
7.4 (3.1)
|
radare2 before 9236f44, when configured on UNIX without SSL, allows command injection via a PDB nam… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-ppm7-9255-8gmf |
8.8 (3.1)
9.3 (4.0)
|
WinMatrix agent developed by Simopro Technology has a Missing Authentication vulnerability, allowin… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-mgwx-w2xc-pjq7 |
7.5 (3.1)
8.7 (4.0)
|
MailGates/MailAudit developed by Openfind has a CRLF Injection vulnerability, allowing unauthentica… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-hx2j-xhcm-gv72 |
10.0 (4.0)
|
The iSherlock developed by HGiga has an OS Command Injection vulnerability, allowing unauthentica… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-hj44-m5xv-x75q |
3.3 (3.1)
4.8 (4.0)
|
MuPDF mutool does not sanitize PDF metadata fields before writing them to terminal output, allowing… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-fwhx-4vqr-m9gj |
6.5 (3.1)
7.1 (4.0)
|
OpenHarness prior to commit dd1d235 contains a path traversal vulnerability that allows remote gate… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-99qg-46r6-v9px |
6.4 (3.1)
|
The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-S… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-6v5j-prr3-phf9 |
9.8 (3.1)
9.3 (4.0)
|
MailGates/MailAudit developed by Openfind has a Stack-based Buffer Overflow vulnerability, allowing… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-6v58-5584-rv99 |
8.1 (3.1)
|
Luanti 5 before 5.15.2 sometimes allows unintended access to an insecure environment. If at least o… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-49h6-4qj3-4f42 |
5.4 (4.0)
|
A Download of Code Without Integrity Check vulnerability in the update modules in ASUS Member Cente… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-48wr-p98v-9w5h |
4.9 (3.1)
|
FFmpeg before 8.1 has an integer overflow and resultant out-of-bounds write via CENC (Common Encryp… | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-3r49-76f3-pf2m |
9.8 (3.1)
9.3 (4.0)
|
Creolabs Gravity before 0.9.6 contains a heap buffer overflow vulnerability in the gravity_vm_exec … | 2026-04-16T03:31:06Z | 2026-04-16T03:31:06Z |
| ghsa-x87c-g7pw-2xr5 |
6.3 (3.1)
5.3 (4.0)
|
GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulner… | 2026-04-10T21:31:15Z | 2026-04-16T03:31:05Z |
| ghsa-v8f7-cg9p-w5jx |
6.3 (3.1)
5.3 (4.0)
|
GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulner… | 2026-04-10T21:31:15Z | 2026-04-16T03:31:05Z |
| ghsa-9w66-jgph-vx6j |
8.8 (3.1)
8.7 (4.0)
|
OpenHarness prior to commit dd1d235 contains a command injection vulnerability that allows remote g… | 2026-04-16T03:31:05Z | 2026-04-16T03:31:05Z |
| ghsa-7rhq-9q45-5gm4 |
8.4 (4.0)
|
radare2 prior to version 6.1.4 contains a command injection vulnerability in the PDB parser's print… | 2026-04-16T03:31:05Z | 2026-04-16T03:31:05Z |
| ghsa-6f54-qjvm-wwq3 |
5.1 (4.0)
|
wger has Stored XSS via Unescaped License Attribution Fields | 2026-04-16T01:37:21Z | 2026-04-16T01:37:21Z |
| ghsa-xppv-4jrx-qf8m |
7.6 (3.1)
|
wger has Broken Access Control in Global Gym Configuration Update Endpoint | 2026-04-16T01:35:16Z | 2026-04-16T01:35:16Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-889 |
5.4 (3.1)
|
A stored cross-site scripting (XSS) vulnerability in Plone CMS 5.2.3 exists in site-contr… | plone | 2021-03-24T15:15:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2019-252 |
5.5 (3.1)
|
In parser/btorsmt2.c in Boolector 3.0.0, opening a specially crafted input file leads to … | pyboolector | 2019-02-07T07:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2018-154 |
6.5 (3.1)
|
An issue was discovered in libpg_query 10-1.0.2. There is a memory leak in pg_query_raw_p… | pg-query | 2018-10-18T18:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2018-152 |
7.2 (3.1)
|
An authorization-check flaw was discovered in federation configurations of the OpenStack … | keystone | 2018-07-19T13:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2018-149 |
6.1 (3.1)
|
The Galaxy Project Galaxy version v14.10 contains a CWE-79: Improper Neutralization of In… | galaxy-app | 2018-06-26T16:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2017-147 |
7.8 (3.1)
|
In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of da… | pyspark | 2017-09-13T16:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2017-145 |
4.7 (3.1)
|
OpenStack Compute (nova) Icehouse, Juno and Havana when live migration fails allows local… | nova | 2017-08-09T18:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2017-143 |
5.5 (3.1)
|
The image signature algorithm in OpenStack Glance 11.0.0 allows remote attackers to bypas… | glance | 2017-03-29T14:59:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2016-38 |
4.3 (3.1)
|
The Fernet Token Provider in OpenStack Identity (Keystone) 9.0.x before 9.0.1 (mitaka) al… | keystone | 2016-06-13T14:59:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2015-40 |
|
Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in OpenStack … | horizon | 2015-08-20T20:59:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2015-39 |
|
The import task action in OpenStack Image Service (Glance) 2015.1.x before 2015.1.2 (kilo… | glance | 2015-08-19T15:59:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2015-38 |
|
OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not p… | glance | 2015-02-24T15:59:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2015-37 |
|
OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not p… | glance | 2015-02-24T15:59:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-116 |
|
The TempURL middleware in OpenStack Object Storage (Swift) 1.4.6 through 1.8.0, 1.9.0 thr… | swift | 2014-01-23T01:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-113 |
|
The VMWare driver in OpenStack Compute (Nova) 2013.2 through 2013.2.2 does not properly p… | nova | 2014-03-25T16:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-112 |
|
The instance rescue mode in OpenStack Compute (Nova) 2013.2 before 2013.2.3 and Icehouse … | nova | 2014-05-08T14:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-111 |
|
The i_create_images_and_backing (aka create_images_and_backing) method in libvirt driver … | nova | 2014-02-06T17:00:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-109 |
|
OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 does not … | keystone | 2014-08-25T14:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-108 |
|
The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Ju… | keystone | 2014-08-25T14:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-107 |
|
The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Ju… | keystone | 2014-08-25T14:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-106 |
|
The V3 API in OpenStack Identity (Keystone) 2013.1 before 2013.2.4 and icehouse before ic… | keystone | 2014-04-15T14:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-105 |
|
The memcache token backend in OpenStack Identity (Keystone) 2013.1 through 2.013.1.4, 201… | keystone | 2014-04-01T06:35:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-102 |
|
OpenStack Image Registry and Delivery Service (Glance) 2013.2 through 2013.2.1 and Icehou… | glance | 2014-02-14T15:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2013-44 |
|
OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) does not properly i… | nova | 2013-03-22T21:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2013-43 |
|
OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authe… | nova | 2013-03-22T21:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2013-42 |
|
The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.… | keystone | 2013-09-23T20:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2013-41 |
|
OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly before 2013.1.1, and H… | keystone | 2013-05-21T18:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2013-39 |
|
OpenStack Keystone Folsom (2012.2) does not properly perform revocation checks for Keysto… | keystone | 2013-03-22T21:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2010-32 |
|
ZServer in Zope 2.10.x before 2.10.12 and 2.11.x before 2.11.7 allows remote attackers to… | Zope | 2010-09-08T20:00:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2009-13 |
|
MoinMoin 1.6.2 and 1.7 does not properly enforce ACL checks when acl_hierarchic is set to… | moin | 2009-04-03T18:30:00Z | 2024-11-25T18:35:18.357593Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33677 | Cross-Site Request Forgery (CSRF) vulnerability in Renzo Johnson Contact Form 7 Extension… | 2024-04-27T05:02:18.290583Z |
| gsd-2024-31152 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:17.731991Z |
| gsd-2024-4290 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.575829Z |
| gsd-2024-4289 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.612538Z |
| gsd-2024-4288 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.569916Z |
| gsd-2024-4287 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.611362Z |
| gsd-2024-4286 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.599503Z |
| gsd-2024-4285 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.599710Z |
| gsd-2024-4284 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.527556Z |
| gsd-2024-4283 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.614027Z |
| gsd-2024-4282 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.598979Z |
| gsd-2024-4281 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.536355Z |
| gsd-2024-4280 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.533977Z |
| gsd-2024-4279 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.521267Z |
| gsd-2024-4278 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.578652Z |
| gsd-2024-4277 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.524486Z |
| gsd-2024-4276 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.567475Z |
| gsd-2024-4275 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.560967Z |
| gsd-2024-4274 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.542869Z |
| gsd-2024-4273 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.625570Z |
| gsd-2024-4272 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.564269Z |
| gsd-2024-4271 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.557860Z |
| gsd-2024-4270 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.565894Z |
| gsd-2024-4269 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.543844Z |
| gsd-2024-4268 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.561404Z |
| gsd-2024-4267 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.595290Z |
| gsd-2024-4266 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.592000Z |
| gsd-2024-4265 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.621175Z |
| gsd-2024-4264 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.584159Z |
| gsd-2024-4263 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.603449Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2719 | Malicious code in @youcanneverguessthisonereally/test-pkg (npm) | 2026-04-16T09:42:05Z | 2026-04-16T09:42:05Z |
| mal-2026-2718 | Malicious code in @the-coca-cola-company/receipt-scanner-admin-lib (npm) | 2026-04-16T09:39:26Z | 2026-04-16T09:39:26Z |
| mal-2026-2717 | Malicious code in @tax-taxdev/tools-scripts (npm) | 2026-04-16T09:39:16Z | 2026-04-16T09:39:16Z |
| mal-2026-2716 | Malicious code in @needl-ai/common (npm) | 2026-04-16T09:35:35Z | 2026-04-16T09:35:35Z |
| mal-2026-2715 | Malicious code in @mesh-atoms/typography (npm) | 2026-04-16T09:35:32Z | 2026-04-16T09:35:32Z |
| mal-2026-2714 | Malicious code in @gameforge/http-server (npm) | 2026-04-16T09:34:11Z | 2026-04-16T09:34:11Z |
| mal-2026-2713 | Malicious code in @fuego-tools/analytics (npm) | 2026-04-16T09:34:04Z | 2026-04-16T09:34:04Z |
| mal-2026-2712 | Malicious code in @evoja-web/redaction (npm) | 2026-04-16T09:33:49Z | 2026-04-16T09:33:49Z |
| mal-2026-2711 | Malicious code in @evoja-web/react-login (npm) | 2026-04-16T09:33:48Z | 2026-04-16T09:33:48Z |
| mal-2026-2710 | Malicious code in @evoja-web/create-react-project (npm) | 2026-04-16T09:33:46Z | 2026-04-16T09:33:46Z |
| mal-2026-2709 | Malicious code in @appleseed-apple/ac-sass-kit (npm) | 2026-04-16T09:29:32Z | 2026-04-16T09:29:32Z |
| mal-2026-2708 | Malicious code in @3stripes/toolkit (npm) | 2026-04-16T09:28:30Z | 2026-04-16T09:28:30Z |
| mal-2026-2707 | Malicious code in @3stripes/shared (npm) | 2026-04-16T09:28:29Z | 2026-04-16T09:28:29Z |
| mal-2026-2706 | Malicious code in @3stripes/sdk (npm) | 2026-04-16T09:28:28Z | 2026-04-16T09:28:28Z |
| mal-2026-2705 | Malicious code in @3stripes/core (npm) | 2026-04-16T09:28:27Z | 2026-04-16T09:28:27Z |
| mal-2026-2704 | Malicious code in @3stripes/config (npm) | 2026-04-16T09:28:27Z | 2026-04-16T09:28:27Z |
| mal-2026-2703 | Malicious code in @3stripes/components (npm) | 2026-04-16T09:28:26Z | 2026-04-16T09:28:26Z |
| mal-2026-2625 | Malicious code in robase-install (PyPI) | 2026-04-13T22:03:44Z | 2026-04-16T07:40:04Z |
| mal-2026-2570 | Malicious code in robase-app (PyPI) | 2026-04-12T21:27:44Z | 2026-04-16T07:40:04Z |
| mal-2026-2569 | Malicious code in bloxy-api (PyPI) | 2026-04-12T21:39:57Z | 2026-04-16T07:40:04Z |
| mal-2026-2563 | Malicious code in robase-installer (PyPI) | 2026-04-11T20:04:56Z | 2026-04-16T07:40:04Z |
| mal-2026-2562 | Malicious code in robase-fallback (PyPI) | 2026-04-11T20:26:50Z | 2026-04-16T07:40:04Z |
| mal-2026-2561 | Malicious code in robase-help (PyPI) | 2026-04-11T17:14:47Z | 2026-04-16T07:40:04Z |
| mal-2026-2559 | Malicious code in databasesupalake (PyPI) | 2026-04-11T17:07:46Z | 2026-04-16T07:40:04Z |
| mal-2026-2558 | Malicious code in robase-utils (PyPI) | 2026-04-11T14:15:49Z | 2026-04-16T07:40:04Z |
| mal-2026-2557 | Malicious code in databasesupasafe (PyPI) | 2026-04-11T14:13:54Z | 2026-04-16T07:40:04Z |
| mal-2026-2556 | Malicious code in api-analysis (PyPI) | 2026-04-11T14:18:43Z | 2026-04-16T07:40:04Z |
| mal-2026-2555 | Malicious code in api-feature (PyPI) | 2026-04-11T14:04:25Z | 2026-04-16T07:40:04Z |
| mal-2026-2544 | Malicious code in roboat-utilities (PyPI) | 2026-04-10T21:23:20Z | 2026-04-16T07:40:04Z |
| mal-2026-2543 | Malicious code in robase (PyPI) | 2026-04-10T21:22:56Z | 2026-04-16T07:40:04Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0081 | Microsoft Office Produkte: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-03-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0794 | Microsoft Azure DevOps, Data Factory and Cloud Shell: Mehrere Schwachstellen | 2026-03-19T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0793 | Netwrix Password Secure: Mehrere Schwachstellen | 2026-03-19T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0792 | SuiteCRM: Mehrere Schwachstellen | 2026-03-18T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0784 | Ubiquiti UniFi Network Application: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2026-03-18T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0758 | Canonical Snap: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-03-17T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0723 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0714 | ImageMagick: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-03-12T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0702 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0690 | cURL: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0507 | util-linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-02-24T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0482 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-23T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0469 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2026-02-19T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0422 | Mattermost: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0388 | Synacor Zimbra: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0279 | GIMP: Schwachstelle ermöglicht Codeausführung | 2026-02-01T23:00:00.000+00:00 | 2026-03-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0586 | OpenClaw: Mehrere Schwachstellen | 2026-03-03T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0573 | OpenClaw: Mehrere Schwachstellen | 2026-03-02T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0557 | OpenClaw: Mehrere Schwachstellen | 2026-03-01T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0501 | OpenClaw: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-03-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0736 | NetBox: Schwachstelle ermöglicht Cross-Site Scripting | 2026-03-16T23:00:00.000+00:00 | 2026-03-17T23:00:00.000+00:00 |
| wid-sec-w-2026-0726 | TYPO3 Core: Mehrere Schwachstellen | 2020-07-27T22:00:00.000+00:00 | 2026-03-15T23:00:00.000+00:00 |
| wid-sec-w-2025-1433 | Red Hat Enterprise Linux (python-setuptools): Schwachstelle ermöglicht Codeausführung | 2025-06-30T22:00:00.000+00:00 | 2026-03-15T23:00:00.000+00:00 |
| wid-sec-w-2026-0705 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0695 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2026-03-11T23:00:00.000+00:00 | 2026-03-12T23:00:00.000+00:00 |
| wid-sec-w-2026-0551 | OpenClaw: Mehrere Schwachstellen | 2026-02-26T23:00:00.000+00:00 | 2026-03-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0490 | OpenClaw: Mehrere Schwachstellen | 2026-02-23T23:00:00.000+00:00 | 2026-03-11T23:00:00.000+00:00 |
| wid-sec-w-2026-0660 | Microsoft System Center Operations Manager: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0659 | Microsoft Office und SharePoint Produkte: Mehrere Schwachstellen | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| wid-sec-w-2026-0658 | Microsoft SQL Server: Mehrere Schwachstellen ermöglichen Erlangen von Administratorrechten | 2026-03-10T23:00:00.000+00:00 | 2026-03-10T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-256-16 | Siemens Third-Party Component in SICAM and SITIPE Products | 2024-09-10T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-193-05 | Siemens SCALANCE, RUGGEDCOM | 2024-07-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-338-07 | Advantech iView | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-06 | SolisCloud Monitoring Platform | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-05 | Sunbird DCIM dcTrack and Power IQ | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-04 | Johnson Controls iSTAR | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-03 | Johnson Controls OpenBlue Mobile Web Application for OpenBlue Workplace | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-02 | MAXHUB Pivot | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-338-01 | Mitsubishi Electric GX Works2 | 2025-12-04T07:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-219-02 | Johnson Controls FX Server, FX80 and FX90 (Update A) | 2025-08-07T06:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsa-25-148-03 | Consilium Safety CS5000 Fire Panel (Update A) | 2025-05-29T06:00:00.000000Z | 2025-12-04T07:00:00.000000Z |
| icsma-25-336-01 | Mirion Medical EC2 Software NMIS BioDose | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-336-02 | Iskra iHUB and iHUB Lite | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-336-01 | Industrial Video & Control Longwatch | 2025-12-02T07:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-23-157-02 | Mitsubishi Electric MELSEC iQ-R Series/iQ-F Series (Update C) | 2023-06-06T06:00:00.000000Z | 2025-12-02T07:00:00.000000Z |
| icsa-25-329-06 | SiRcom SMART Alert (SiSA) | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-05 | Festo Compact Vision System, Control Block, Controller, and Operator Unit products | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-03 | Zenitel TCIV-3+ | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-02 | Rockwell Automation Arena Simulation | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-01 | Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, Cobalt Share | 2025-11-25T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-22-333-05 | Mitsubishi Electric FA Engineering Software (Update C) | 2022-12-05T07:00:00.000000Z | 2025-11-25T07:00:00.000000Z |
| icsa-25-329-04 | Opto 22 groov View | 2025-11-25T06:00:00.000000Z | 2025-11-25T06:00:00.000000Z |
| icsa-25-324-06 | Emerson Appleton UPSMON-PRO | 2025-11-20T07:00:00.000000Z | 2025-11-20T07:00:00.000000Z |
| icsa-25-324-01 | Automated Logic WebCTRL Premium Server | 2025-11-20T07:00:00.000000Z | 2025-11-20T07:00:00.000000Z |
| icsa-25-324-03 | Opto 22 GRV-EPIC and groov RIO | 2025-11-20T06:00:00.000000Z | 2025-11-20T06:00:00.000000Z |
| icsa-25-324-02 | ICAM365 CCTV Camera Multiple Models | 2025-11-20T06:00:00.000000Z | 2025-11-20T06:00:00.000000Z |
| icsa-25-322-05 | METZ CONNECT EWIO2 | 2025-11-18T12:00:00.000000Z | 2025-11-18T12:00:00.000000Z |
| icsa-25-322-03 | Shelly Pro 3EM | 2025-11-18T07:00:00.000000Z | 2025-11-18T07:00:00.000000Z |
| icsa-25-322-02 | Shelly Pro 4PM | 2025-11-18T07:00:00.000000Z | 2025-11-18T07:00:00.000000Z |
| icsa-25-317-12 | Siemens Spectrum Power 4 | 2025-11-13T07:00:00.000000Z | 2025-11-13T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-sb-lkm-znerzjbz | Cisco IOS XR Software Secure Boot Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ncs-hybridacl-crmzffkq | Cisco IOS XR Software Hybrid Access Control List Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-multicast-ermrsvq7 | Cisco IOS XR Software for ASR 9000 Series Routers Layer 3 Multicast Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-modular-acl-u5mepxmm | Cisco IOS XR Software Access Control List Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ipv4uni-lfm3cfbu | Cisco IOS XR Software for ASR 9000 Series Routers IPv4 Unicast Packets Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-iosxr-priv-esc-gfqjxvof | Cisco IOS XR Software CLI Privilege Escalation Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-iosxr-bgp-dos-o7stephx | Cisco IOS XR Software Border Gateway Protocol Confederation Denial of Service Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-ios-xr-verii-bypass-hhpwqrvx | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-03-12T16:00:00+00:00 | 2025-03-12T16:00:00+00:00 |
| cisco-sa-snmp-dos-sdxnsucw | Cisco IOS, IOS XE, and IOS XR Software SNMP Denial of Service Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-03-12T15:22:33+00:00 |
| cisco-sa-sbr042-multi-vuln-ej76pke5 | Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers Vulnerabilities | 2023-01-11T16:00:00+00:00 | 2025-03-07T17:33:55+00:00 |
| cisco-sa-tms-xss-vuln-wbtcywxg | Cisco TelePresence Management Suite Cross-Site Scripting Vulnerability | 2025-03-05T16:00:00+00:00 | 2025-03-05T16:44:57+00:00 |
| cisco-sa-secure-dll-injection-aoyzeqsg | Cisco Secure Client for Windows with Secure Firewall Posture Engine DLL Hijacking Vulnerability | 2025-03-05T16:00:00+00:00 | 2025-03-05T16:00:00+00:00 |
| cisco-sa-nxos-ici-dpojbwxk | Cisco Nexus 3000 and 9000 Series Switches Command Injection Vulnerability | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| cisco-sa-n3kn9k-healthdos-eoqswk4g | Cisco Nexus 3000 and 9000 Series Switches Health Monitoring Diagnostics Denial of Service Vulnerability | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| cisco-sa-apic-multi-vulns-9ummtg5 | Cisco Application Policy Infrastructure Controller Vulnerabilities | 2025-02-26T16:00:00+00:00 | 2025-02-26T16:00:00+00:00 |
| cisco-sa-phone-info-disc-yyxswstk | Cisco Video Phone 8875 and Desk Phone 9800 Series Information Disclosure Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-esa-mailpol-bypass-5nvcjzmw | Cisco Secure Email Gateway Email Filter Bypass Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-broadworks-xss-gdpgj58p | Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability | 2025-02-19T16:00:00+00:00 | 2025-02-19T16:00:00+00:00 |
| cisco-sa-ise-multivuls-ftw9aoxf | Cisco Identity Services Engine Insecure Java Deserialization and Authorization Bypass Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-10T20:23:50+00:00 |
| cisco-sa-esa-sma-wsa-multi-ykujhs34 | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-07T19:21:57+00:00 |
| cisco-sa-swa-range-bypass-2bsehysu | Cisco Secure Web Appliance Range Request Bypass Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-ise-xss-42tgsdmg | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-expressway-xss-uexuzrew | Cisco Expressway Series Cross-Site Scripting Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-xss-wck2wcug | Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-esa-sma-wsa-snmp-inf-fqpvl8sx | Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance SNMP Polling Information Disclosure Vulnerability | 2025-02-05T16:00:00+00:00 | 2025-02-05T16:00:00+00:00 |
| cisco-sa-cmm-privesc-uy2vf8pc | Cisco Meeting Management REST API Privilege Escalation Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-clamav-ole2-h549rpha | ClamAV OLE2 File Format Decryption Denial of Service Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-bw-sip-dos-msysbrmt | Cisco BroadWorks SIP Denial of Service Vulnerability | 2025-01-22T16:00:00+00:00 | 2025-01-22T16:00:00+00:00 |
| cisco-sa-thousandeyes-cert-pqtjuv9n | Cisco ThousandEyes Endpoint Agent for MacOS and RoomOS Certificate Validation Vulnerability | 2025-01-08T16:00:00+00:00 | 2025-01-13T22:15:18+00:00 |
| cisco-sa-snort-rf-bypass-oy8f3pnm | Multiple Cisco Products Snort Rate Filter Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2025-01-13T16:44:31+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-27920 | Windows UPnP Device Host Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27919 | Windows UPnP Device Host Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27918 | Windows Shell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27917 | Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27916 | Windows UPnP Device Host Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27915 | Windows UPnP Device Host Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27914 | Microsoft Management Console Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27913 | Windows BitLocker Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27912 | Windows Kerberos Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27911 | Windows User Interface Core Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27910 | Windows Installer Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27909 | Windows Search Service Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27908 | Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27907 | Windows Storage Spaces Controller Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-27906 | Windows Hello Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26184 | Windows Projected File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26183 | Remote Access Management service/API (RPC server) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26182 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26181 | Microsoft Brokering File System Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26180 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26179 | Windows Kernel Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26178 | Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26177 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26176 | Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26175 | Windows Boot Manager Security Feature Bypass Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26174 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26173 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26172 | Windows Push Notifications Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26171 | .NET Denial of Service Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| msrc_cve-2026-26170 | PowerShell Elevation of Privilege Vulnerability | 2026-04-14T07:00:00.000Z | 2026-04-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0287 | Kwetsbaarheden verholpen in Cisco NX-OS Software | 2025-09-11T08:18:37.706725Z | 2025-09-11T08:18:37.706725Z |
| ncsc-2025-0286 | Kwetsbaarheden verholpen in Cisco IOS XR Software | 2025-09-11T08:14:36.960621Z | 2025-09-11T08:14:36.960621Z |
| ncsc-2025-0285 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-09-10T11:01:43.415733Z | 2025-09-10T11:01:43.415733Z |
| ncsc-2025-0284 | Kwetsbaarheid verholpen in Adobe Commerce en Magento | 2025-09-10T10:49:56.787627Z | 2025-09-10T10:49:56.787627Z |
| ncsc-2025-0283 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-09-10T10:46:54.808276Z | 2025-09-10T10:46:54.808276Z |
| ncsc-2025-0282 | Kwetsbaarheid verholpen in Adobe Dreamweaver | 2025-09-10T10:38:24.553749Z | 2025-09-10T10:38:24.553749Z |
| ncsc-2025-0281 | Kwetsbaarheid verholpen in Adobe ColdFusion | 2025-09-10T10:24:09.409410Z | 2025-09-10T10:24:09.409410Z |
| ncsc-2025-0280 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-09-09T18:27:39.956624Z | 2025-09-09T18:27:39.956624Z |
| ncsc-2025-0279 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-09-09T18:25:53.539582Z | 2025-09-09T18:25:53.539582Z |
| ncsc-2025-0278 | Kwetsbaarheden verholpen in Microsoft Office | 2025-09-09T18:23:23.763765Z | 2025-09-09T18:23:23.763765Z |
| ncsc-2025-0277 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-09-09T18:22:30.766030Z | 2025-09-09T18:22:30.766030Z |
| ncsc-2025-0276 | Kwetsbaarheden verholpen in Schneider Electric Saitel | 2025-09-09T15:16:00.122647Z | 2025-09-09T15:16:00.122647Z |
| ncsc-2025-0275 | Kwetsbaarheden verholpen in SAP producten | 2025-09-09T11:12:22.945466Z | 2025-09-09T11:12:22.945466Z |
| ncsc-2025-0274 | Kwetsbaarheden verholpen in Siemens producten | 2025-09-09T11:06:34.785987Z | 2025-09-09T11:06:34.785987Z |
| ncsc-2025-0245 | Kwetsbaarheden verholpen in SAP producten | 2025-08-12T11:10:21.111816Z | 2025-09-05T11:12:05.722381Z |
| ncsc-2025-0273 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-09-04T08:15:14.806733Z | 2025-09-04T08:15:14.806733Z |
| ncsc-2025-0272 | Kwetsbaarheid verholpen in FreePBX | 2025-08-29T08:37:54.893549Z | 2025-08-29T08:37:54.893549Z |
| ncsc-2025-0271 | Kwetsbaarheden verholpen in Arcserve Unified Data Protection | 2025-08-28T12:56:02.228992Z | 2025-08-28T12:56:02.228992Z |
| ncsc-2025-0270 | Kwetsbaarheden verholpen in Cisco NX-OS Software | 2025-08-28T08:36:20.358948Z | 2025-08-28T08:36:20.358948Z |
| ncsc-2025-0234 | Kwetsbaarheid verholpen in CrushFTP | 2025-07-21T08:34:35.304610Z | 2025-08-28T07:59:34.275023Z |
| ncsc-2025-0269 | Kwetsbaarheden verholpen in IBM Cognos Command Center | 2025-08-27T13:10:59.965070Z | 2025-08-27T13:10:59.965070Z |
| ncsc-2025-0268 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en Gateway | 2025-08-26T13:11:42.925280Z | 2025-08-26T17:34:30.428328Z |
| ncsc-2025-0266 | Kwetsbaarheid verholpen in Apple MacOS, iOS en iPadOS | 2025-08-22T05:49:07.556948Z | 2025-08-25T12:16:10.430485Z |
| ncsc-2025-0267 | Kwetsbaarheden verholpen in Foxit Reader | 2025-08-25T11:26:17.380689Z | 2025-08-25T11:26:17.380689Z |
| ncsc-2025-0265 | Kwetsbaarheden verholpen in Commvault | 2025-08-20T12:15:48.655099Z | 2025-08-20T12:15:48.655099Z |
| ncsc-2025-0264 | Kwetsbaarheden verholpen in Cisco Secure Firewall Software | 2025-08-15T08:52:41.012811Z | 2025-08-15T08:52:41.012811Z |
| ncsc-2025-0263 | Kwetsbaarheden verholpen in N-able N-Central | 2025-08-14T12:38:27.349283Z | 2025-08-14T12:38:27.349283Z |
| ncsc-2025-0262 | Kwetsbaarheden verholpen in Xerox FreeFlow Core | 2025-08-14T07:00:50.843871Z | 2025-08-14T07:00:50.843871Z |
| ncsc-2025-0261 | Kwetsbaarheden verholpen in Adobe InCopy | 2025-08-13T10:13:59.220398Z | 2025-08-13T10:13:59.220398Z |
| ncsc-2025-0260 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-08-13T10:12:35.130811Z | 2025-08-13T10:12:35.130811Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10377-1 | python312-3.12.13-2.1 on GA media | 2026-03-16T00:00:00Z | 2026-03-16T00:00:00Z |
| opensuse-su-2026:10376-1 | chromedriver-146.0.7680.80-1.1 on GA media | 2026-03-16T00:00:00Z | 2026-03-16T00:00:00Z |
| opensuse-su-2026:10375-1 | coturn-4.9.0-1.1 on GA media | 2026-03-15T00:00:00Z | 2026-03-15T00:00:00Z |
| opensuse-su-2026:10374-1 | python311-tornado6-6.5.5-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10373-1 | python311-simpleeval-1.0.5-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10372-1 | python311-black-26.3.1-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:10371-1 | curl-8.19.0-1.1 on GA media | 2026-03-14T00:00:00Z | 2026-03-14T00:00:00Z |
| opensuse-su-2026:20357-1 | Security update for qemu | 2026-03-13T10:47:15Z | 2026-03-13T10:47:15Z |
| opensuse-su-2026:20354-1 | Security update for libsoup2 | 2026-03-13T08:41:04Z | 2026-03-13T08:41:04Z |
| opensuse-su-2026:10370-1 | smb4k-4.0.5-1.2 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10369-1 | skaffold-2.18.0-1.1 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10368-1 | ruby4.0-rubygem-websocket-extensions-0.1.5-1.24 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10367-1 | ruby4.0-rubygem-web-console-4.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10366-1 | ruby4.0-rubygem-thor-1.4.0-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10365-1 | ruby4.0-rubygem-sprockets-3.7-3.7.5-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10364-1 | ruby4.0-rubygem-sprockets-4.2.1-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10363-1 | ruby4.0-rubygem-rubyzip-2.3.2-1.19 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10362-1 | ruby4.0-rubygem-railties-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10361-1 | ruby4.0-rubygem-rails-html-sanitizer-1.6.0-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10360-1 | ruby4.0-rubygem-rails-8.0-8.0.3-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10359-1 | ruby4.0-rubygem-rack-session-2.1.1-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10358-1 | ruby4.0-rubygem-rack-3.1.18-1.3 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10357-1 | ruby4.0-rubygem-puma-6.4.3-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10356-1 | ruby4.0-rubygem-nokogiri-1.18.9-1.4 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10355-1 | ruby4.0-rubygem-multi_xml-0.6.0-1.31 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10354-1 | ruby4.0-rubygem-minitar-0.9-1.21 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10353-1 | ruby4.0-rubygem-loofah-2.23.1-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10352-1 | ruby4.0-rubygem-kramdown-2.4.0-1.17 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10351-1 | ruby4.0-rubygem-json_pure-2.7.6-1.5 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| opensuse-su-2026:10350-1 | ruby4.0-rubygem-jquery-rails-4.6.0-1.9 on GA media | 2026-03-13T00:00:00Z | 2026-03-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3343 | Red Hat Security Advisory: skopeo security update | 2026-02-25T11:50:40+00:00 | 2026-04-16T20:41:55+00:00 |
| rhsa-2026:3341 | Red Hat Security Advisory: containernetworking-plugins security update | 2026-02-25T12:14:45+00:00 | 2026-04-16T20:41:55+00:00 |
| rhsa-2026:3340 | Red Hat Security Advisory: skopeo security update | 2026-02-25T12:16:20+00:00 | 2026-04-16T20:41:53+00:00 |
| rhsa-2026:3337 | Red Hat Security Advisory: podman security update | 2026-02-25T11:48:26+00:00 | 2026-04-16T20:41:53+00:00 |
| rhsa-2026:3336 | Red Hat Security Advisory: podman security update | 2026-02-25T11:30:01+00:00 | 2026-04-16T20:41:53+00:00 |
| rhsa-2026:3297 | Red Hat Security Advisory: buildah security update | 2026-02-25T09:09:30+00:00 | 2026-04-16T20:41:53+00:00 |
| rhsa-2026:3298 | Red Hat Security Advisory: buildah security update | 2026-02-25T09:32:15+00:00 | 2026-04-16T20:41:52+00:00 |
| rhsa-2026:3296 | Red Hat Security Advisory: RHTAS - Tech Preview Release Of the Policy Controller Operator | 2026-02-25T08:49:49+00:00 | 2026-04-16T20:41:52+00:00 |
| rhsa-2026:3291 | Red Hat Security Advisory: runc security update | 2026-02-25T07:41:04+00:00 | 2026-04-16T20:41:51+00:00 |
| rhsa-2026:3193 | Red Hat Security Advisory: golang security update | 2026-02-24T12:01:01+00:00 | 2026-04-16T20:41:51+00:00 |
| rhsa-2026:3192 | Red Hat Security Advisory: golang security update | 2026-02-24T12:06:46+00:00 | 2026-04-16T20:41:50+00:00 |
| rhsa-2026:3040 | Red Hat Security Advisory: grafana-pcp security update | 2026-02-23T02:14:35+00:00 | 2026-04-16T20:41:50+00:00 |
| rhsa-2026:3188 | Red Hat Security Advisory: grafana security update | 2026-02-24T11:39:36+00:00 | 2026-04-16T20:41:49+00:00 |
| rhsa-2026:3187 | Red Hat Security Advisory: grafana-pcp security update | 2026-02-24T11:39:51+00:00 | 2026-04-16T20:41:49+00:00 |
| rhsa-2026:3186 | Red Hat Security Advisory: Red Hat build of Cryostat 4.1.1: new RHEL 9 container image security update | 2026-02-26T02:56:36+00:00 | 2026-04-16T20:41:49+00:00 |
| rhsa-2026:3184 | Red Hat Security Advisory: RHTAS - Tech Preview Release Of the Policy Controller Operator | 2026-02-24T09:58:16+00:00 | 2026-04-16T20:41:48+00:00 |
| rhsa-2026:3092 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-02-23T15:34:28+00:00 | 2026-04-16T20:41:48+00:00 |
| rhsa-2026:3089 | Red Hat Security Advisory: Red Hat Developer Hub 1.8.4 release. | 2026-02-23T14:46:08+00:00 | 2026-04-16T20:41:47+00:00 |
| rhsa-2026:3035 | Red Hat Security Advisory: grafana-pcp security update | 2026-02-23T01:30:21+00:00 | 2026-04-16T20:41:46+00:00 |
| rhsa-2026:2920 | Red Hat Security Advisory: grafana security update | 2026-02-18T12:55:46+00:00 | 2026-04-16T20:41:45+00:00 |
| rhsa-2026:2914 | Red Hat Security Advisory: grafana security update | 2026-02-18T11:31:17+00:00 | 2026-04-16T20:41:45+00:00 |
| rhsa-2026:2844 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.26.1 Release. | 2026-02-17T18:20:32+00:00 | 2026-04-16T20:41:45+00:00 |
| rhsa-2026:2709 | Red Hat Security Advisory: golang security update | 2026-02-16T10:32:31+00:00 | 2026-04-16T20:41:43+00:00 |
| rhsa-2026:2708 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-16T10:08:41+00:00 | 2026-04-16T20:41:42+00:00 |
| rhsa-2026:2706 | Red Hat Security Advisory: golang security update | 2026-02-16T09:40:31+00:00 | 2026-04-16T20:41:42+00:00 |
| rhsa-2026:2681 | Red Hat Security Advisory: Red Hat Quay 3.16.2 | 2026-02-12T17:29:21+00:00 | 2026-04-16T20:41:42+00:00 |
| rhsa-2026:8339 | Red Hat Security Advisory: nodejs:20 security update | 2026-04-15T19:16:52+00:00 | 2026-04-16T20:07:49+00:00 |
| rhsa-2026:8548 | Red Hat Security Advisory: nghttp2 security update | 2026-04-16T20:01:12+00:00 | 2026-04-16T20:07:47+00:00 |
| rhsa-2026:8545 | Red Hat Security Advisory: nghttp2 security update | 2026-04-16T19:46:47+00:00 | 2026-04-16T20:07:47+00:00 |
| rhsa-2026:8541 | Red Hat Security Advisory: nghttp2 security update | 2026-04-16T18:40:31+00:00 | 2026-04-16T20:07:47+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2020-252-01 | SCADAPack x70 Remote Connect and SCADAPack x70 Security Administrator | 2020-09-08T00:00:00.000Z | 2021-02-09T00:00:00.000Z |
| sevd-2021-040-01 | PowerLogic Power Metering Products | 2021-02-08T00:00:00.000Z | 2021-02-08T00:00:00.000Z |
| sevd-2020-315-05 | Modicon M100/M200/M221 Programmable Logic Controller | 2020-11-10T00:00:00.000Z | 2021-01-12T00:00:00.000Z |
| sevd-2020-315-02 | EcoStruxure™ Operator Terminal Expert (Vijeo XD), Pro-face BLUE and WinGP runtime | 2020-11-09T00:00:00.000Z | 2021-01-11T00:00:00.000Z |
| sevd-2020-343-06 | Web Server on Modicon M340, Legacy Offers Modicon Quantum Modicon Premium and associated Communication Modules | 2020-12-08T09:08:01.000Z | 2020-12-08T09:08:01.000Z |
| sevd-2020-343-09 | Modicon M258 Logic Controllers and SoMachine/ SoMachine Motion Software | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-08 | Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-343-02 | EcoStruxure Geo SCADA Expert | 2020-12-08T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-315-06 | Easergy T300 | 2020-11-10T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-287-02 | Wibu-Systems CodeMeter Vulnerabilities | 2020-10-13T00:00:00.000Z | 2020-12-08T00:00:00.000Z |
| sevd-2020-315-04 | EcoStruxure Building Operation (EBO) | 2020-11-10T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| sevd-2020-105-02 | Modicon M218/M241/M251/M258 Logic Controllers,SoMachine/SoMachine Motion, EcoStruxure™ Machine Expert | 2020-04-14T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| sevd-2020-287-04 | EcoStruxure™ and SmartStruxure™ Power Monitoring and SCADA Software | 2020-10-13T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-287-03 | Smartlink, PowerTag, and Wiser Series Gateways | 2020-10-13T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-224-01 | Schneider Electric Modbus Serial Driver | 2020-08-11T00:00:00.000Z | 2020-10-13T00:00:00.000Z |
| sevd-2020-133-02 | Vijeo Designer and Vijeo Designer Basic Software | 2020-05-12T00:00:00.000Z | 2020-08-14T00:00:00.000Z |
| sevd-2020-224-08 | Schneider Electric PACTware | 2020-08-11T00:00:00.000Z | 2020-08-13T00:00:00.000Z |
| sevd-2020-224-07 | SoMove | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-06 | Harmony® eXLhoist | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-05 | PowerChute Business Edition | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-04 | APC Easy UPS On-Line Software | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-03 | Modicon M218 Logic Controller | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-224-02 | spaceLYnk & Wiser for KNX (formerly homeLYnk) | 2020-08-11T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-105-03 | Vijeo Designer and Vijeo Designer Basic | 2020-04-14T00:00:00.000Z | 2020-08-11T00:00:00.000Z |
| sevd-2020-196-01 | Schneider Electric Software Update (SESU) | 2020-07-14T00:00:00.000Z | 2020-07-14T00:00:00.000Z |
| sevd-2020-161-03 | Modicon LMC078 Logic Controller additional URGENT/11 Fix | 2020-06-09T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| sevd-2020-161-01 | Modicon M218 Logic Controller | 2020-06-09T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| sevd-2015-344-01 | GoAhead Web Server vulnerability | 2015-12-15T00:00:00.000Z | 2020-06-09T00:00:00.000Z |
| sevd-2020-070-04 | Andover Continuum System | 2020-03-10T00:00:00.000Z | 2020-05-12T00:00:00.000Z |
| sevd-2020-105-01 | Modicon M100/M200/M221 controllers, SoMachine Basic and EcoStruxure Machine Expert - Basic Programming Software | 2020-04-14T00:00:00.000Z | 2020-04-14T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-446448 | SSA-446448: Denial of Service Vulnerability in PROFINET Stack Integrated on Interniche Stack | 2022-04-12T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-416411 | SSA-416411: Cross-Site Scripting Vulnerability in Industrial Edge Management | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-413565 | SSA-413565: Multiple Vulnerabilities in SCALANCE Products | 2022-12-13T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-314390 | SSA-314390: LDAP Injection Vulnerability in Mendix LDAP Module | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| ssa-979056 | SSA-979056: Out of Bounds Write Vulnerability in Parasolid | 2024-12-10T00:00:00Z | 2024-12-12T00:00:00Z |
| ssa-981975 | SSA-981975: Information Disclosure Vulnerability in Intel-CPUs (CVE-2022-40982) Impacting SIMATIC IPCs | 2023-09-12T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-962515 | SSA-962515: Out of Bounds Read Vulnerability in Industrial Products | 2024-05-14T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-881356 | SSA-881356: Multiple Memory Corruption Vulnerabilities in Simcenter Femap | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-822518 | SSA-822518: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW Before V11.0.1 on RUGGEDCOM APE1808 Devices | 2024-04-09T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-730188 | SSA-730188: Multiple File Parsing Vulnerabilities in Solid Edge V2024 | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-701627 | SSA-701627: XXE Injection Vulnerabilities in COMOS | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-645131 | SSA-645131: Multiple WRL File Parsing Vulnerabilities in Teamcenter Visualization | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-583523 | SSA-583523: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2024-10-08T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-384652 | SSA-384652: Cross-Site Request Forgery (CSRF) Vulnerability in RUGGEDCOM ROX II | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-264815 | SSA-264815: Type Confusion Vulnerability in OpenSSL X.400 Address Processing in SIMATIC Products | 2023-08-08T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-264814 | SSA-264814: Timing Based Side Channel Vulnerability in the OpenSSL RSA Decryption in SIMATIC Products | 2023-08-08T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-128393 | SSA-128393: Firmware Decryption Vulnerability in SICAM A8000 CP-8031 and CP-8050 | 2024-12-10T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-042050 | SSA-042050: Know-How Protection Mechanism Failure in TIA Portal | 2023-06-13T00:00:00Z | 2024-12-10T00:00:00Z |
| ssa-824503 | SSA-824503: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation Before V2302.0018 and V2404.0007 | 2024-11-18T00:00:00Z | 2024-11-18T00:00:00Z |
| ssa-472448 | SSA-472448: Security Bypass Vulnerability in the SQL Client-Server Communication in Siveillance Video | 2024-11-13T00:00:00Z | 2024-11-13T00:00:00Z |
| ssa-915275 | SSA-915275: Multiple Vulnerabilities in SINEC INS Before V1.0 SP2 Update 3 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-883918 | SSA-883918: Information Disclosure Vulnerability in SIMATIC WinCC | 2024-07-09T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-654798 | SSA-654798: Incorrect Authorization Vulnerability in SIMATIC CP 1543-1 Devices | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-616032 | SSA-616032: Local Privilege Escalation Vulnerability in Spectrum Power 7 Before V24Q3 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-454789 | SSA-454789: Deserialization Vulnerability in TeleControl Server Basic V3.1 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-354112 | SSA-354112: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.2 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-351178 | SSA-351178: Multiple Vulnerabilities in Solid Edge Before SE2024 Update 9 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-331112 | SSA-331112: Multiple Vulnerabilities in SINEC NMS Before V3.0 SP1 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-230445 | SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ssa-064257 | SSA-064257: Privilege Escalation Vulnerability in SIPORT Before V3.4.0 | 2024-11-12T00:00:00Z | 2024-11-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1160-1 | Security update for freerdp | 2026-03-31T15:03:59Z | 2026-03-31T15:03:59Z |
| suse-su-2026:1159-1 | Security update for expat | 2026-03-31T15:03:48Z | 2026-03-31T15:03:48Z |
| suse-su-2026:1158-1 | Security update for python-pyasn1 | 2026-03-31T11:55:53Z | 2026-03-31T11:55:53Z |
| suse-su-2026:20951-1 | Security update for python311 | 2026-03-31T09:13:02Z | 2026-03-31T09:13:02Z |
| suse-su-2026:20988-1 | Security update for gnome-online-accounts, gvfs | 2026-03-31T09:08:21Z | 2026-03-31T09:08:21Z |
| suse-su-2026:20956-1 | Security update for python311 | 2026-03-31T09:07:43Z | 2026-03-31T09:07:43Z |
| suse-su-2026:1154-1 | Security update for libjxl | 2026-03-31T09:04:47Z | 2026-03-31T09:04:47Z |
| suse-su-2026:0227-2 | Security update for net-snmp | 2026-03-31T08:48:04Z | 2026-03-31T08:48:04Z |
| suse-su-2026:1153-1 | Security update for perl-XML-Parser | 2026-03-31T08:40:07Z | 2026-03-31T08:40:07Z |
| suse-su-2026:1152-1 | Security update for perl-XML-Parser | 2026-03-31T08:28:50Z | 2026-03-31T08:28:50Z |
| suse-su-2026:1150-1 | Security update for webkit2gtk3 | 2026-03-30T17:34:50Z | 2026-03-30T17:34:50Z |
| suse-su-2026:20986-1 | Security update for postgresql13 | 2026-03-30T15:24:20Z | 2026-03-30T15:24:20Z |
| suse-su-2026:20985-1 | Security update for expat | 2026-03-30T15:01:10Z | 2026-03-30T15:01:10Z |
| suse-su-2026:20963-1 | Security update for expat | 2026-03-30T15:01:10Z | 2026-03-30T15:01:10Z |
| suse-su-2026:20984-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20968-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20962-1 | Security update for gnutls | 2026-03-30T14:36:26Z | 2026-03-30T14:36:26Z |
| suse-su-2026:20983-1 | Security update for postgresql16 | 2026-03-30T14:26:12Z | 2026-03-30T14:26:12Z |
| suse-su-2026:1149-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T13:44:05Z | 2026-03-30T13:44:05Z |
| suse-su-2026:1148-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T11:21:20Z | 2026-03-30T11:21:20Z |
| suse-su-2026:1146-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:17:48Z | 2026-03-30T09:17:48Z |
| suse-su-2026:1142-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:16:26Z | 2026-03-30T09:16:26Z |
| suse-su-2026:1141-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:16:08Z | 2026-03-30T09:16:08Z |
| suse-su-2026:1140-1 | Security Beta update 5.2.0 Beta1 for Multi-Linux Manager Client Tools | 2026-03-30T09:15:49Z | 2026-03-30T09:15:49Z |
| suse-su-2026:1139-1 | Security update for webkit2gtk3 | 2026-03-30T09:13:58Z | 2026-03-30T09:13:58Z |
| suse-su-2026:20982-1 | Security update for tomcat10 | 2026-03-30T08:17:19Z | 2026-03-30T08:17:19Z |
| suse-su-2026:1137-1 | Security update for expat | 2026-03-28T02:34:02Z | 2026-03-28T02:34:02Z |
| suse-su-2026:1136-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T18:04:04Z | 2026-03-27T18:04:04Z |
| suse-su-2026:20978-1 | Security update for MozillaFirefox | 2026-03-27T17:19:44Z | 2026-03-27T17:19:44Z |
| suse-su-2026:1132-1 | Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 2026-03-27T16:04:11Z | 2026-03-27T16:04:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1715 | Important: golang-github-openprinting-ipp-usb security update | 2026-02-02T00:00:00Z | 2026-02-03T11:03:28Z |
| alsa-2026:1714 | Moderate: wireshark security update | 2026-02-02T00:00:00Z | 2026-02-03T11:02:21Z |
| alsa-2026:1662 | Moderate: kernel security update | 2026-02-02T00:00:00Z | 2026-02-02T13:45:57Z |
| alsa-2026:1661 | Moderate: kernel-rt security update | 2026-02-02T00:00:00Z | 2026-02-02T13:40:07Z |
| alsa-2026:1631 | Moderate: python3 security update | 2026-02-02T00:00:00Z | 2026-02-02T12:08:18Z |
| alsa-2026:1592 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T11:56:57Z |
| alsa-2026:1178 | Moderate: kernel security update | 2026-01-26T00:00:00Z | 2026-02-02T11:36:10Z |
| alsa-2026:1239 | Important: fence-agents security update | 2026-01-26T00:00:00Z | 2026-02-02T11:30:59Z |
| alsa-2026:1359 | Moderate: gcc-toolset-15-binutils security update | 2026-01-27T00:00:00Z | 2026-02-02T11:23:42Z |
| alsa-2026:1381 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-02-02T11:22:03Z |
| alsa-2026:1409 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:20:21Z |
| alsa-2026:1412 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:16:18Z |
| alsa-2026:1473 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-02-02T11:12:21Z |
| alsa-2026:1595 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:01:50Z |
| alsa-2026:1597 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:00:47Z |
| alsa-2026:1628 | Important: php security update | 2026-02-02T00:00:00Z | 2026-02-02T09:59:40Z |
| alsa-2026:1143 | Important: kernel security update | 2026-01-26T00:00:00Z | 2026-01-30T09:51:59Z |
| alsa-2026:1574 | Important: gimp:2.8 security update | 2026-01-29T00:00:00Z | 2026-01-29T14:07:36Z |
| alsa-2026:0932 | Important: java-1.8.0-openjdk security update | 2026-01-26T00:00:00Z | 2026-01-29T13:07:43Z |
| alsa-2026:1518 | Important: grafana-pcp security update | 2026-01-28T00:00:00Z | 2026-01-29T12:32:40Z |
| alsa-2026:1350 | Moderate: curl security update | 2026-01-27T00:00:00Z | 2026-01-29T12:31:06Z |
| alsa-2026:1334 | Moderate: glibc security update | 2026-01-27T00:00:00Z | 2026-01-29T12:29:45Z |
| alsa-2026:1254 | Important: python-urllib3 security update | 2026-01-26T00:00:00Z | 2026-01-29T12:14:07Z |
| alsa-2026:1344 | Important: grafana security update | 2026-01-27T00:00:00Z | 2026-01-29T12:12:24Z |
| alsa-2026:1374 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:10:37Z |
| alsa-2026:1380 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-01-29T12:07:35Z |
| alsa-2026:1408 | Moderate: python3.12 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:05:44Z |
| alsa-2026:1410 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:02:18Z |
| alsa-2026:1429 | Important: php:8.3 security update | 2026-01-27T00:00:00Z | 2026-01-29T11:59:57Z |
| alsa-2026:1472 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-01-28T19:58:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-1023 | Use-of-uninitialized-value in pcpp::SomeIpLayer::parseSomeIpLayer | 2024-08-16T00:17:01.984623Z | 2025-12-22T14:18:12.391769Z |
| osv-2025-718 | Heap-buffer-overflow in pcpp::ArpLayer::toString | 2025-09-10T00:08:49.177204Z | 2025-12-22T14:17:36.857810Z |
| osv-2023-1306 | Heap-use-after-free in pcpp::TLVRecordReader<pcpp::DhcpOption>::getTLVRecord | 2023-12-15T00:10:21.932370Z | 2025-12-22T14:15:50.738544Z |
| osv-2023-1232 | Heap-buffer-overflow in pcpp::TLSECPointFormatExtension::getECPointFormatList | 2023-11-28T13:01:23.208343Z | 2025-12-22T14:15:49.713990Z |
| osv-2023-1150 | Heap-buffer-overflow in pcpp::computeChecksum | 2023-11-13T13:01:45.923889Z | 2025-12-22T14:15:48.387128Z |
| osv-2022-819 | Use-of-uninitialized-value in init_main_qtable | 2022-09-02T00:00:49.565627Z | 2025-12-22T14:15:44.411248Z |
| osv-2025-994 | Heap-buffer-overflow in rx_icmp | 2025-12-18T00:00:43.710332Z | 2025-12-21T14:32:46.078182Z |
| osv-2025-1004 | Security exception in com.code_intelligence.jazzer.sanitizers.RegexInjection.hookInternal | 2025-12-21T00:18:27.214786Z | 2025-12-21T00:18:27.215115Z |
| osv-2025-1001 | Dynamic-stack-buffer-overflow in _ox_err_set_with_location | 2025-12-21T00:04:56.743119Z | 2025-12-21T00:04:56.743638Z |
| osv-2025-593 | Heap-buffer-overflow in mmcall | 2025-08-02T00:16:19.626747Z | 2025-12-20T14:30:41.473113Z |
| osv-2025-538 | Heap-double-free in policydb_destroy | 2025-07-09T00:05:37.052433Z | 2025-12-20T14:25:14.356814Z |
| osv-2025-92 | Null-dereference READ in session_startup | 2025-02-05T00:18:00.385170Z | 2025-12-20T14:25:08.038174Z |
| osv-2022-881 | Heap-use-after-free in AcquireCodePageWithCapacity | 2022-09-11T00:00:52.269838Z | 2025-12-20T14:17:45.282070Z |
| osv-2022-784 | Segv on unknown address in FreeCodePages | 2022-08-26T00:01:54.152651Z | 2025-12-20T14:16:22.419962Z |
| osv-2025-90 | Null-dereference READ in ubsan_GetStackTrace | 2025-02-03T00:02:54.185593Z | 2025-12-20T14:15:37.974751Z |
| osv-2023-298 | UNKNOWN READ in active_edges | 2023-04-12T14:02:04.134251Z | 2025-12-19T14:30:39.005796Z |
| osv-2025-989 | Bad-cast to UT_hash_bucket' (aka 'struct UT_hash_bucket')password_file__cleanup | 2025-12-17T00:01:12.806838Z | 2025-12-17T00:01:12.807184Z |
| osv-2025-983 | Dynamic-stack-buffer-overflow in _ox_err_set_with_location | 2025-12-14T00:14:21.963982Z | 2025-12-14T00:14:21.964726Z |
| osv-2025-698 | Use-of-uninitialized-value in AesEncrypt_C | 2025-09-02T00:02:49.308939Z | 2025-12-05T14:58:11.846817Z |
| osv-2025-970 | Heap-buffer-overflow in check_sync_pes | 2025-12-05T00:18:22.703657Z | 2025-12-05T00:18:22.704029Z |
| osv-2025-965 | Stack-use-after-scope in Assimp::FBX::FBXExportProperty::FBXExportProperty | 2025-12-04T00:10:11.975493Z | 2025-12-04T00:10:11.975920Z |
| osv-2024-372 | Security exception in java.base/java.util.Arrays.copyOf | 2024-04-30T00:09:04.989259Z | 2025-12-01T14:21:29.544925Z |
| osv-2024-28 | Security exception in java.base/java.util.Arrays.copyOf | 2024-01-21T00:12:30.613951Z | 2025-12-01T14:21:19.263844Z |
| osv-2024-661 | Security exception in java.base/java.util.ArrayList.<init> | 2024-07-18T00:05:57.665844Z | 2025-12-01T14:21:01.321021Z |
| osv-2023-955 | Security exception in org.apache.poi.ddf.EscherPropertyFactory$$Lambda$285/ADDRESS.apply | 2023-10-03T13:03:23.482168Z | 2025-12-01T14:19:00.140619Z |
| osv-2025-959 | Heap-buffer-overflow in re_parse_term | 2025-11-29T00:18:54.036831Z | 2025-11-29T00:18:54.037236Z |
| osv-2025-955 | Use-of-uninitialized-value in decoder_context::construct_reference_picture_lists | 2025-11-29T00:15:46.812919Z | 2025-11-29T00:15:46.813402Z |
| osv-2025-938 | Use-of-uninitialized-value in comp_func_SourceOver_avx2 | 2025-11-23T00:03:38.943405Z | 2025-11-23T00:03:38.943780Z |
| osv-2025-932 | Heap-use-after-free in password_file__cleanup | 2025-11-22T00:01:32.642847Z | 2025-11-22T00:01:32.643269Z |
| osv-2025-926 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement | 2025-11-21T00:05:31.621567Z | 2025-11-21T00:05:31.621958Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0435 | Unsound usages of `Vec::from_raw_parts` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0431 | Unsound usages of `core::slice::from_raw_parts` | 2024-12-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0430 | Use of insecure cryptographic algorithms | 2024-12-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0429 | Unsoundness in `Iterator` and `DoubleEndedIterator` impls for `glib::VariantStrIter` | 2024-03-30T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0428 | Undefined behaviour in `kvm_ioctls::ioctls::vm::VmFd::create_device` | 2024-12-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0426 | Unsound usages of `u8` type casting | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0424 | Unsound usages of `core::slice::from_raw_parts_mut` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0421 | `idna` accepts Punycode labels that do not produce any non-ASCII when decoded | 2024-12-09T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0409 | Build corruption when using `PYO3_CONFIG_FILE` environment variable | 2024-12-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0408 | Unsound usages of `std::slice::from_raw_parts` | 2024-12-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0407 | Fails to ensure slice elements match the slice's declared type | 2024-03-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0405 | op_panic in the base runtime can force a panic in the runtime's containing thread | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0404 | Unsoundness in anstream | 2024-09-08T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0403 | op_panic in the base runtime can force a panic in the runtime's containing thread | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0402 | Borsh serialization of HashMap is non-canonical | 2024-10-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0400 | `ruzstd` uninit and out-of-bounds memory reads | 2024-11-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0399 | rustls network-reachable panic in `Acceptor::accept` | 2024-11-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0398 | Bias of Polynomial Coefficients in Secret Sharing | 2024-11-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0393 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0392 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0391 | Ambiguous challenge derivation | 2024-07-18T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0379 | Multiple soundness issues | 2024-10-31T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0378 | Risk of use-after-free in `borrowed` reads from Python weak references | 2024-10-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0377 | Heap Buffer overflow using c_chars_to_str function | 2024-10-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0374 | Segmentation fault due to use of uninitialized memory | 2024-09-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0368 | olm-sys: wrapped library unmaintained, potentially vulnerable | 2024-09-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0366 | CWA-2023-004: Excessive number of function parameters in compiled Wasm | 2024-08-27T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0365 | Binary Protocol Misinterpretation caused by Truncating or Overflowing Casts | 2024-08-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0363 | Binary Protocol Misinterpretation caused by Truncating or Overflowing Casts | 2024-08-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0362 | Stack overflow when parsing specially crafted JSON ABI strings | 2024-07-30T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tomcat-2024-38286 | Apache Tomcat: Denial of Service | 2024-11-09T07:20:25.873Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-34750 | Apache Tomcat: HTTP/2 excess header handling DoS | 2025-07-29T14:30:29.115Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-24549 | Apache Tomcat: HTTP/2 header handling DoS | 2025-07-17T08:09:49.355Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-21733 | Apache Tomcat: Leaking of unrelated request bodies in default error page | 2024-03-06T11:07:26.980Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-46589 | Apache Tomcat: HTTP request smuggling via malformed trailer headers | 2024-03-06T11:07:35.204Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-45648 | Apache Tomcat: Trailer header parsing too lenient | 2024-03-06T11:07:43.292Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-42795 | Apache Tomcat: Failure during request clean-up leads to sensitive data leaking to subsequent requests | 2024-03-06T11:08:01.506Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-41080 | Apache Tomcat: Open redirect with FORM authentication | 2024-03-06T11:08:22.964Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-33163 | Parse Server leaks protected fields via LiveQuery afterEvent trigger | 2026-03-20T11:37:51.448Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-33042 | Parse Server affected by empty authData bypassing credential requirement on signup | 2026-03-20T11:37:48.161Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32944 | Parse Server crash via deeply nested query condition operators | 2026-03-20T11:37:45.054Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32943 | Parse Server has a password reset token single-use bypass via concurrent requests | 2026-03-20T11:37:41.707Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32886 | Parse Server's Cloud function dispatch crashes server via prototype chain traversal | 2026-03-20T11:37:38.226Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32878 | Parse Server vulnerable to schema poisoning via prototype pollution in deep copy | 2026-03-20T11:37:35.433Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32770 | Parse Server: LiveQuery subscription with invalid regular expression crashes server | 2026-03-20T11:37:32.539Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32742 | Parse Server session creation endpoint allows overwriting server-generated session fields | 2026-03-20T11:37:29.063Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32728 | Parse Server has a stored XSS filter bypass via Content-Type MIME parameter and missing XML extension blocklist entries | 2026-03-20T11:37:25.520Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2026-24733 | Apache Tomcat: Security constraint bypass with HTTP/0.9 | 2026-02-20T09:52:58.708Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-66614 | Apache Tomcat: Client certificate verification bypass due to virtual host mapping | 2026-02-20T09:52:57.300Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-61795 | Apache Tomcat: Delayed cleaning of multi-part upload temporary files may lead to DoS | 2025-11-06T13:00:35.478Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-55754 | Apache Tomcat: console manipulation via escape sequences in log messages | 2025-11-06T13:00:33.572Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-55668 | Apache Tomcat: session fixation via rewrite valve | 2025-08-18T08:14:21.163Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-52520 | Apache Tomcat: DoS via integer overflow in multipart file upload | 2025-07-16T08:19:00.271Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-48989 | Apache Tomcat: h2 DoS - Made You Reset | 2025-08-18T08:14:11.138Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-48988 | Apache Tomcat: FileUpload large number of parts with headers DoS | 2025-07-10T10:47:06.961Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-46701 | Apache Tomcat: Security constraint bypass for CGI scripts | 2025-07-10T10:47:00.568Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-31650 | Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame | 2025-04-30T05:56:04.703Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2024-54677 | Apache Tomcat: DoS in examples web application | 2025-07-10T10:46:30.955Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2024-50379 | Apache Tomcat: RCE due to TOCTOU issue in JSP compilation | 2025-07-10T10:45:55.643Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2024-23672 | Apache Tomcat: WebSocket DoS with incomplete closing handshake | 2025-07-17T08:09:47.503Z | 2026-03-20T09:47:33.381Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-kj56465 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 5.4.8-r0 | 2026-04-01T09:41:55.075579Z | 2026-03-19T07:57:48Z |
| cleanstart-2026-gs57401 | Security fixes for CVE-2025-69873, CVE-2026-1525, CVE-2026-1526, CVE-2026-1527, CVE-2026-1528, CVE-2026-2229, CVE-2026-2327, CVE-2026-2391, CVE-2026-25128, CVE-2026-25547, CVE-2026-2581, CVE-2026-25896, CVE-2026-26278, CVE-2026-26960, CVE-2026-27601, CVE-2026-27903, CVE-2026-27904, CVE-2026-27942, CVE-2026-28292, CVE-2026-29786, CVE-2026-31802, CVE-2026-32141, CVE-2026-33036, ghsa-23c5-xmqv-rm74, ghsa-25h7-pfq9-p65f, ghsa-2g4f-4pwh-qvx6, ghsa-2mjp-6q6p-2qxm, ghsa-37qj-frw5-hhjh, ghsa-38c4-r59v-3vqw, ghsa-3ppc-4f35-3m26, ghsa-4992-7rv2-5pvq, ghsa-7h2j-956f-4vf2, ghsa-7r86-cg39-jmmj, ghsa-83g3-92jg-28cx, ghsa-8gc5-j5rx-235r, ghsa-8wc6-vgrq-x6cf, ghsa-9ppj-qmqm-q256, ghsa-f269-vfmq-vjvj, ghsa-fj3w-jwp8-x2g3, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-phc3-fgpg-7m6h, ghsa-qffp-2rhf-9h96, ghsa-qpx9-hpmf-5gmw, ghsa-r275-fr43-pm7q, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w7fw-mjwx-w883 applied in versions: 43.4.3-r1 | 2026-04-01T09:43:24.793409Z | 2026-03-19T07:48:38Z |
| cleanstart-2026-jd68539 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61732, CVE-2025-68121, ghsa-vvgc-356p-c3xw applied in versions: 1.7.0-r0 | 2026-04-01T09:42:09.713315Z | 2026-03-19T07:35:12Z |
| cleanstart-2026-gx29850 | Security fixes for CVE-2025-61732, CVE-2025-68121 applied in versions: 1.132.0-r0, 1.132.0-r1 | 2026-04-01T09:42:09.716696Z | 2026-03-19T07:32:54Z |
| cleanstart-2026-em40436 | Security fixes for ghsa-8v2v-wjwg-vx6r applied in versions: 1.16.3-r0 | 2026-04-01T09:42:07.970704Z | 2026-03-19T07:29:54Z |
| cleanstart-2026-ck42797 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, ghsa-37cx-329c-33x3 applied in versions: 0.18.0-r1, 1.16.0-r0 | 2026-04-01T09:42:37.879665Z | 2026-03-19T07:29:02Z |
| cleanstart-2026-qb67682 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1, 3.3.3-r0 | 2026-04-01T09:43:42.917590Z | 2026-03-19T07:11:57Z |
| cleanstart-2026-gc37751 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-66jq-2c23-2xh5, ghsa-9h8m-3fm2-qjrq applied in versions: 0.65.0-r0, 0.65.0-r1 | 2026-04-01T09:43:05.536029Z | 2026-03-19T07:09:40Z |
| cleanstart-2026-mq21261 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142 applied in versions: 1.5.1-r0, 1.5.1-r1, 1.5.1-r2, 1.5.1-r3 | 2026-04-01T09:43:56.426341Z | 2026-03-19T07:05:59Z |
| cleanstart-2026-bt99405 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.29.2-r0, 1.29.2-r1 | 2026-04-01T09:43:54.267145Z | 2026-03-19T07:01:48Z |
| cleanstart-2026-iy78242 | Security fixes for CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-273p-m2cw-6833, ghsa-4c4x-jm2x-pf9j, ghsa-4qg8-fj49-pxjh, ghsa-59jp-pj84-45mr, ghsa-72c7-4g63-hpw5, ghsa-846p-jg2w-w324, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-f83f-xpx7-ffpw, ghsa-fcv2-xgw5-pqxf, ghsa-fphv-w9fq-2525, ghsa-fw7p-63qq-7hpr, ghsa-j5w8-q4qc-rx2x, ghsa-jqc5-w2xx-5vq4, ghsa-p436-gjf2-799p, ghsa-whqx-f9j3-ch6m applied in versions: 0.26.0-r0, 0.26.0-r1, 0.26.0-r2, 0.26.0-r3, 0.26.0-r4 | 2026-04-01T09:44:29.089231Z | 2026-03-19T06:58:14Z |
| cleanstart-2026-pj76318 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-273p-m2cw-6833, ghsa-4c4x-jm2x-pf9j, ghsa-4qg8-fj49-pxjh, ghsa-846p-jg2w-w324, ghsa-fcv2-xgw5-pqxf, ghsa-fphv-w9fq-2525, ghsa-jqc5-w2xx-5vq4, ghsa-whqx-f9j3-ch6m applied in versions: 1.14.1-r0, 1.14.1-r1, 1.14.1-r2, 1.14.1-r3 | 2026-04-01T09:44:23.291711Z | 2026-03-19T06:56:15Z |
| cleanstart-2026-gr86205 | Security fixes for CVE-2022-23181, CVE-2022-29885, CVE-2022-34305, CVE-2022-42252, CVE-2022-45143, CVE-2023-24998, CVE-2023-28708, CVE-2026-24515, CVE-2026-25210 applied in versions: 11.0.18-r0, 9.0.58-r0, 9.0.63-r0, 9.0.64-r0, 9.0.68-r0, 9.0.70-r0, 9.0.71-r0, 9.0.73-r0, 9.0.80-r0 | 2026-04-01T09:45:02.431388Z | 2026-03-19T05:47:18Z |
| cleanstart-2026-ox88144 | Security fixes for CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61732, CVE-2026-27139 applied in versions: 1.34.1-r0, 1.34.1-r2 | 2026-04-01T09:45:10.149925Z | 2026-03-18T13:13:46Z |
| cleanstart-2026-pk48502 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-68121 applied in versions: 2.3.0-r0 | 2026-04-01T09:45:06.972039Z | 2026-03-18T08:57:33Z |
| cleanstart-2026-fx51482 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.5.1-r0, 1.5.1-r1 | 2026-04-01T09:45:37.795716Z | 2026-03-18T07:43:14Z |
| cleanstart-2026-ow14897 | Security fixes for CVE-2025-25285, CVE-2025-69873, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.5.10-r2, 2.5.10-r3, 2.6.0-r1 | 2026-04-01T09:45:25.624227Z | 2026-03-18T07:42:00Z |
| cleanstart-2026-lm72903 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 4.5.1-r0 | 2026-04-01T09:45:35.196573Z | 2026-03-18T05:58:10Z |
| cleanstart-2026-ei62818 | Security fixes for ghsa-3677-xxcr-wjqv, ghsa-qqpg-mvqg-649v, ghsa-x44p-gvrj-pj2r applied in versions: 2.7.2-r0 | 2026-04-01T09:45:31.119946Z | 2026-03-18T05:57:33Z |
| cleanstart-2026-kr58137 | Security fixes for CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, ghsa-6v2p-p543-phr9 applied in versions: 0.8.19-r0, 0.8.19-r1, 0.8.19-r2 | 2026-04-01T09:46:06.671153Z | 2026-03-17T13:57:04Z |
| cleanstart-2026-ie15850 | Security fixes for CVE-2023-32762, CVE-2023-32763 applied in versions: 6.5.0-r5 | 2026-04-01T09:45:56.402696Z | 2026-03-17T13:11:05Z |
| cleanstart-2026-do09088 | Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-67721, CVE-2025-68119, CVE-2025-68121, CVE-2026-1225, CVE-2026-1605, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-72hv-8253-57qq applied in versions: 479-r0 | 2026-04-01T09:47:03.615107Z | 2026-03-17T07:41:03Z |
| cleanstart-2026-fz57809 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.15.1-r0 | 2026-04-01T09:46:36.079269Z | 2026-03-17T05:43:20Z |
| cleanstart-2026-bw46578 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086, CVE-2026-24515, CVE-2026-25210 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.16.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:55:26.061155Z | 2026-03-16T17:22:25Z |
| cleanstart-2026-ay18527 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086, CVE-2026-24515, CVE-2026-25210 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.17.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:55:26.067667Z | 2026-03-16T17:21:19Z |
| cleanstart-2026-lq42192 | Security fixes for CVE-2014-0138, CVE-2014-0139, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9594, CVE-2017-1000099, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000257, CVE-2017-2629, CVE-2017-7407, CVE-2017-7468, CVE-2017-8816, CVE-2017-8817, CVE-2017-8818, CVE-2018-0500, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000300, CVE-2018-1000301, CVE-2018-14618, CVE-2018-16839, CVE-2018-16840, CVE-2018-16842, CVE-2018-16890, CVE-2019-3822, CVE-2019-3823, CVE-2019-5435, CVE-2019-5436, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22876, CVE-2021-22890, CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-22576, CVE-2022-27774, CVE-2022-27775, CVE-2022-27776, CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, CVE-2022-27782, CVE-2022-30115, CVE-2022-32205, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-35260, CVE-2022-42915, CVE-2022-42916, CVE-2022-43551, CVE-2022-43552, CVE-2023-23914, CVE-2023-23915, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27537, CVE-2023-27538, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-38039, CVE-2023-38545, CVE-2023-38546, CVE-2023-46218, CVE-2023-46219, CVE-2024-0853, CVE-2024-11053, CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-6197, CVE-2024-6874, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, CVE-2025-10148, CVE-2025-4947, CVE-2025-5025, CVE-2025-5399, CVE-2025-9086, CVE-2026-24515, CVE-2026-25210 applied in versions: 0, 7.36.0-r0, 7.50.1-r0, 7.50.2-r0, 7.50.3-r0, 7.51.0-r0, 7.52.1-r0, 7.53.0-r0, 7.53.1-r2, 7.54.0-r0, 7.55.0-r0, 7.56.1-r0, 7.57.0-r0, 7.59.0-r0, 7.60.0-r0, 7.61.0-r0, 7.61.1-r0, 7.62.0-r0, 7.64.0-r0, 7.65.0-r0, 7.66.0-r0, 7.71.0-r0, 7.72.0-r0, 7.74.0-r0, 7.76.0-r0, 7.77.0-r0, 7.78.0-r0, 7.79.0-r0, 7.83.0-r0, 7.83.1-r0, 7.84.0-r0, 7.85.0-r0, 7.86.0-r0, 7.87.0-r0, 7.88.0-r0, 8.0.0-r0, 8.1.0-r0, 8.10.0-r0, 8.11.0-r0, 8.11.1-r0, 8.12.0-r0, 8.14.0-r0, 8.14.1-r0, 8.15.0-r0, 8.18.0-r0, 8.3.0-r0, 8.4.0-r0, 8.5.0-r0, 8.6.0-r0, 8.7.1-r0, 8.9.0-r0, 8.9.1-r0 | 2026-04-01T09:55:24.898216Z | 2026-03-16T17:19:31Z |
| cleanstart-2026-ol32822 | Security fixes for CVE-2024-36537, CVE-2025-47910, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2026-25518, ghsa-gx3x-vq4p-mhhv applied in versions: 2.4.0-r1, 2.4.0-r2 | 2026-04-01T09:48:17.130268Z | 2026-03-16T16:39:54Z |
| cleanstart-2026-kw35511 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 5.0.18-r6, 5.0.18-r7 | 2026-04-01T09:48:16.623063Z | 2026-03-16T16:36:08Z |
| cleanstart-2026-fj01373 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.34.0-r0, 0.34.0-r1, 0.34.0-r2 | 2026-04-01T09:49:20.210015Z | 2026-03-16T11:05:40Z |
| cleanstart-2026-jk47870 | Security fixes for CVE-2025-66614, CVE-2026-1225, CVE-2026-24281, CVE-2026-24308, CVE-2026-24733, ghsa-6rw7-vpxm-498p, ghsa-73rr-hh4g-fpgx, ghsa-8qq5-rm4j-mr97, ghsa-wqch-xfxh-vrr4 applied in versions: 4.2.1.1-r1, 4.3.1-r0 | 2026-04-01T09:49:35.155892Z | 2026-03-16T09:42:46Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2019-ALE-004 | Multiples vulnérabilités dans Microsoft Edge et Internet Explorer | 2019-04-01T00:00:00.000000 | 2019-04-17T00:00:00.000000 |
| certfr-2019-ale-002 | Vulnérabilités affectant l'écosystème Microsoft Exchange et Active Directory | 2019-01-30T00:00:00.000000 | 2019-03-06T00:00:00.000000 |
| CERTFR-2019-ALE-002 | Vulnérabilités affectant l'écosystème Microsoft Exchange et Active Directory | 2019-01-30T00:00:00.000000 | 2019-03-06T00:00:00.000000 |
| certfr-2019-ale-001 | Vulnérabilité dans le gestionnaire de paquets APT | 2019-01-22T00:00:00.000000 | 2019-02-27T00:00:00.000000 |
| CERTFR-2019-ALE-001 | Vulnérabilité dans le gestionnaire de paquets APT | 2019-01-22T00:00:00.000000 | 2019-02-27T00:00:00.000000 |
| certfr-2018-ale-013 | Vulnérabilité dans Microsoft Internet Explorer | 2018-12-20T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| certfr-2018-ale-012 | Vulnérabilité dans Wallix AdminBastion | 2018-10-26T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| CERTFR-2018-ALE-013 | Vulnérabilité dans Microsoft Internet Explorer | 2018-12-20T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| CERTFR-2018-ALE-012 | Vulnérabilité dans Wallix AdminBastion | 2018-10-26T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| certfr-2018-ale-011 | Vulnérabilité dans le client Git | 2018-10-08T00:00:00.000000 | 2018-10-12T00:00:00.000000 |
| CERTFR-2018-ALE-011 | Vulnérabilité dans le client Git | 2018-10-08T00:00:00.000000 | 2018-10-12T00:00:00.000000 |
| certfr-2018-ale-010 | Vulnérabilité activement exploitée dans le framework STRUTS 2 | 2018-08-29T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-008 | Campagne de messages électroniques non sollicités de type Locky Locker | 2018-08-03T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-007 | Multiples vulnérabilités dans S/MIME et OpenPGP | 2018-05-14T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-001 | Multiples vulnérabilités de fuite d'informations dans des processeurs | 2018-01-04T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-010 | Vulnérabilité activement exploitée dans le framework STRUTS 2 | 2018-08-29T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-008 | Campagne de messages électroniques non sollicités de type Locky Locker | 2018-08-03T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-007 | Multiples vulnérabilités dans S/MIME et OpenPGP | 2018-05-14T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| CERTFR-2018-ALE-001 | Multiples vulnérabilités de fuite d'informations dans des processeurs | 2018-01-04T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-009 | Vulnérabilité dans Microsoft Windows | 2018-08-29T00:00:00.000000 | 2018-09-17T00:00:00.000000 |
| CERTFR-2018-ALE-009 | Vulnérabilité dans Microsoft Windows | 2018-08-29T00:00:00.000000 | 2018-09-17T00:00:00.000000 |
| certfr-2018-ale-006 | Vulnérabilité dans Cisco IOS et IOS XE Smart Install Client | 2018-04-06T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-005 | Multiples vulnérabilités dans Drupal | 2018-03-29T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-004 | Vulnérabilité dans le serveur de messagerie Exim | 2018-03-07T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-006 | Vulnérabilité dans Cisco IOS et IOS XE Smart Install Client | 2018-04-06T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-005 | Multiples vulnérabilités dans Drupal | 2018-03-29T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| CERTFR-2018-ALE-004 | Vulnérabilité dans le serveur de messagerie Exim | 2018-03-07T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-002 | Vulnérabilité dans Cisco Adaptive Security Appliance | 2018-02-01T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| certfr-2017-ale-020 | Vulnérabilité dans des implémentations de TLS | 2017-12-13T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| CERTFR-2018-ALE-002 | Vulnérabilité dans Cisco Adaptive Security Appliance | 2018-02-01T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0216 | Vulnérabilité dans PostgreSQL | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0215 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0214 | Vulnérabilité dans Juniper Networks Junos OS Evolved | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0213 | Multiples vulnérabilités dans les produits Cisco | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0212 | Multiples vulnérabilités dans les produits Centreon | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0211 | Multiples vulnérabilités dans Wireshark | 2026-02-26T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2026-avi-0210 | Multiples vulnérabilités dans Cisco Catalyst SD-WAN | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0209 | Multiples vulnérabilités dans les produits VMware | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0208 | Vulnérabilité dans les produits Synology | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0207 | Multiples vulnérabilités dans GitLab | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0206 | Multiples vulnérabilités dans les produits Trend Micro | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0205 | Multiples vulnérabilités dans SolarWinds Serv-U | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0204 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-25T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0179 | Multiples vulnérabilités dans SPIP | 2026-02-18T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0155 | Multiples vulnérabilités dans SPIP | 2026-02-12T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2025-avi-0043 | Multiples vulnérabilités dans SPIP | 2025-01-17T00:00:00.000000 | 2026-02-25T00:00:00.000000 |
| certfr-2026-avi-0203 | Vulnérabilité dans Microsoft Azure Linux | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0202 | Multiples vulnérabilités dans les produits SonicWall | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0200 | Vulnérabilité dans Centreon open tickets | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0199 | Multiples vulnérabilités dans les produits VMware | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0198 | Multiples vulnérabilités dans Google Chrome | 2026-02-24T00:00:00.000000 | 2026-02-24T00:00:00.000000 |
| certfr-2026-avi-0197 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-23T00:00:00.000000 | 2026-02-23T00:00:00.000000 |
| certfr-2026-avi-0187 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-19T00:00:00.000000 | 2026-02-23T00:00:00.000000 |
| certfr-2026-avi-0196 | Multiples vulnérabilités dans les produits IBM | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0195 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0194 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0193 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0192 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0191 | Vulnérabilité dans Traefik | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0190 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-003091 | Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (April 2025) | 2025-04-09T14:55+09:00 | 2025-04-09T14:55+09:00 |
| jvndb-2025-002990 | Multiple vulnerabilities in Inaba Denki Sangyo Wi-Fi AP UNIT 'AC-WPS-11ac series' | 2025-04-07T17:44+09:00 | 2025-04-07T17:44+09:00 |
| jvndb-2025-002714 | Improper symbolic link file handling in FutureNet NXR series, VXR series and WXR series routers | 2025-03-31T16:59+09:00 | 2025-04-03T15:19+09:00 |
| jvndb-2025-000025 | WinRAR vulnerable to the symbolic link based "Mark of the Web" check bypass | 2025-04-03T12:29+09:00 | 2025-04-03T12:29+09:00 |
| jvndb-2025-000022 | Multiple vulnerabilities in JTEKT ELECTRONICS CORPORATION's products | 2025-04-02T15:12+09:00 | 2025-04-02T15:12+09:00 |
| jvndb-2025-002790 | Out-of-bounds Write vulnerabilities in Canon Printer Drivers for Production Printers, Office/Small Office Multifunction Printers and Laser Printers | 2025-04-02T15:05+09:00 | 2025-04-02T15:05+09:00 |
| jvndb-2025-000023 | WordPress plugin "Welcart e-Commerce" vulnerable to untrusted data deserialization | 2025-04-01T14:20+09:00 | 2025-04-01T14:20+09:00 |
| jvndb-2024-003016 | Multiple vulnerabilities in home gateway HGW BL1500HM | 2024-03-25T17:28+09:00 | 2025-03-28T12:01+09:00 |
| jvndb-2025-000018 | Multiple vulnerabilities in home gateway HGW-BL1500HM | 2025-03-19T15:33+09:00 | 2025-03-28T11:48+09:00 |
| jvndb-2025-000024 | a-blog cms vulnerable to untrusted data deserialization | 2025-03-28T10:46+09:00 | 2025-03-28T10:46+09:00 |
| jvndb-2025-000021 | Multiple vulnerabilities in PowerCMS | 2025-03-26T18:13+09:00 | 2025-03-26T18:13+09:00 |
| jvndb-2025-002592 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-03-26T13:25+09:00 | 2025-03-26T13:25+09:00 |
| jvndb-2025-000019 | Multiple vulnerabilities in AssetView | 2025-03-25T17:10+09:00 | 2025-03-25T17:10+09:00 |
| jvndb-2025-000020 | +F FS010M vulnerable to OS command injection | 2025-03-18T15:01+09:00 | 2025-03-18T15:01+09:00 |
| jvndb-2025-000017 | hostapd vulnerable to improper processing of RADIUS packets | 2025-03-12T14:19+09:00 | 2025-03-12T14:19+09:00 |
| jvndb-2025-000016 | Multiple vulnerabilities in RemoteView Agent (for Windows) | 2025-03-06T14:27+09:00 | 2025-03-10T15:22+09:00 |
| jvndb-2025-001898 | Multiple vulnerabilities in FutureNet AS series (Industrial Routers) and FA series (Protocol Conversion Machine) | 2025-03-04T14:56+09:00 | 2025-03-04T14:56+09:00 |
| jvndb-2025-001605 | "RoboForm Password Manager" App for Android vulnerable to authentication bypass using an alternate path or channel | 2025-02-20T20:15+09:00 | 2025-02-20T20:15+09:00 |
| jvndb-2025-000004 | Multiple vulnerabilities in I-O DATA router UD-LT2 | 2025-01-22T13:55+09:00 | 2025-02-20T15:55+09:00 |
| jvndb-2025-000014 | Multiple cross-site scripting vulnerabilities in Movable Type | 2025-02-19T16:19+09:00 | 2025-02-19T16:19+09:00 |
| jvndb-2025-000015 | RevoWorks SCVX and RevoWorks Browser vulnerable to incorrect resource transfer between spheres | 2025-02-19T14:51+09:00 | 2025-02-19T14:51+09:00 |
| jvndb-2025-001563 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation Corp. MFPs | 2025-02-18T16:33+09:00 | 2025-02-18T16:33+09:00 |
| jvndb-2025-001562 | Out-of-bounds read vulnerability in OMRON CX-Programmer | 2025-02-18T16:24+09:00 | 2025-02-18T16:24+09:00 |
| jvndb-2024-000114 | Multiple vulnerabilities in baserCMS | 2024-10-25T15:07+09:00 | 2025-02-18T15:35+09:00 |
| jvndb-2025-001548 | Out-of-bounds read vulnerability in Cente middleware | 2025-02-17T18:22+09:00 | 2025-02-17T18:22+09:00 |
| jvndb-2025-000012 | Multiple vulnerabilities in The LuxCal Web Calendar | 2025-02-17T13:43+09:00 | 2025-02-17T13:43+09:00 |
| jvndb-2025-000013 | acmailer CGI and acmailer DB vulnerable to OS command injection | 2025-02-14T16:39+09:00 | 2025-02-14T16:39+09:00 |
| jvndb-2025-000002 | Multiple vulnerabilities in NEC Aterm series (NV25-003) | 2025-02-14T15:48+09:00 | 2025-02-14T15:48+09:00 |
| jvndb-2023-002797 | Multiple vulnerabilities in ELECOM and LOGITEC network devices | 2023-08-15T11:54+09:00 | 2025-02-13T15:21+09:00 |
| jvndb-2024-001061 | ELECOM wireless LAN routers vulnerable to OS command injection | 2024-01-24T17:16+09:00 | 2025-02-13T14:31+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14507 | Adobe Substance3D Designer越界写入漏洞 | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14506 | Adobe Audition越界读取漏洞(CNVD-2026-14506) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14505 | Adobe Audition缓冲区溢出漏洞(CNVD-2026-14505) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14504 | Adobe Substance3D Designer缓冲区溢出漏洞(CNVD-2026-14504) | 2026-02-24 | 2026-03-23 |
| cnvd-2026-14503 | Adobe Premiere Pro越界读取漏洞(CNVD-2026-14503) | 2026-03-17 | 2026-03-23 |
| cnvd-2026-14502 | Adobe Illustrator堆缓冲区溢出漏洞(CNVD-2026-14502) | 2026-03-17 | 2026-03-23 |
| cnvd-2026-14501 | Adobe Illustrator堆栈缓冲区溢出漏洞(CNVD-2026-14501) | 2026-03-17 | 2026-03-23 |
| cnvd-2026-14500 | 多款Apple产品信息泄露漏洞(CNVD-2026-14500) | 2026-02-05 | 2026-03-23 |
| cnvd-2026-14499 | 多款Apple产品越界读取漏洞(CNVD-2026-14499) | 2026-02-05 | 2026-03-23 |
| cnvd-2026-14498 | 多款Apple产品路径遍历漏洞 | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14497 | 多款Apple产品代码执行漏洞(CNVD-2026-14497) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14496 | 多款Apple产品信息泄露漏洞(CNVD-2026-14496) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14495 | 多款Apple产品信息泄露漏洞(CNVD-2026-14495) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14494 | 多款Apple产品存在未明漏洞(CNVD-2026-14494) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14493 | 多款Apple产品安全绕过漏洞(CNVD-2026-14493) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14492 | 多款Apple产品安全绕过漏洞(CNVD-2026-14492) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14491 | 多款Apple产品安全绕过漏洞(CNVD-2026-14491) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14490 | 多款Apple产品信息泄露漏洞(CNVD-2026-14490) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14489 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14489) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14488 | 多款Apple产品信息泄露漏洞(CNVD-2026-14488) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14487 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14487) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14486 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14486) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14485 | 多款Apple产品信息泄露漏洞(CNVD-2026-14485) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14484 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14484) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14483 | 多款Apple产品存在未明漏洞(CNVD-2026-14483) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14482 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14482) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14481 | 多款Apple产品拒绝服务漏洞(CNVD-2026-14481) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14480 | 多款Apple产品信息泄露漏洞(CNVD-2026-14480) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14479 | 多款Apple产品安全绕过漏洞(CNVD-2026-14479) | 2026-03-02 | 2026-03-23 |
| cnvd-2026-14478 | 多款Apple产品信息泄露漏洞(CNVD-2026-14478) | 2026-03-02 | 2026-03-23 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15026 | Уязвимость функции do_register_framebuffer() компонента fbdev/core/fbmem.c ядра операцион… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15025 | Уязвимость компонента blocklayout/extent_tree.c ядра операционной системы Linux, позволяю… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15024 | Уязвимость компонента fbdev ядра операционной системы Linux, позволяющая нарушителю оказа… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15023 | Уязвимость компонента drivers/iommu/amd/init.c ядра операционной системы Linux, позволяющ… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15022 | Уязвимость ядра операционной системы Linux, связанная с недостатком использования функции… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15002 | Уязвимость компонента net/vmw_vsock/virtio_transport.c ядра операционной системы Linux, п… | 03.12.2025 | 16.02.2026 |
| bdu:2025-15000 | Уязвимость компонента fs/ntfs3/file.c ядра операционной системы Linux, позволяющая наруши… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14999 | Уязвимость функции mem_pool_alloc() компонента mm/kmemleak.c ядра операционной системы Li… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14997 | Уязвимость функции find_hw_thread_mask() компонента drivers/infiniband/hw/hfi1/affinity.c… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14981 | Уязвимость компонента ipv6 ядра операционной системы Linux, позволяющая нарушителю вызват… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14979 | Уязвимость компонента huge_memory.c ядра операционной системы Linux, позволяющая нарушите… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14978 | Уязвимость компонента dmaengine ядра операционной системы Linux, позволяющая нарушителю в… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14977 | Уязвимость компонента ipv6 ядра операционной системы Linux, позволяющая нарушителю оказат… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14972 | Уязвимость компонента hid-ntrig ядра операционной системы Linux, позволяющая нарушителю в… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14971 | Уязвимость компонента scsi.c операционной системы Linux, позволяющая нарушителю вызвать о… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14970 | Уязвимость функции rray_index_nospec() ядра операционной системы Linux, позволяющая наруш… | 03.12.2025 | 16.02.2026 |
| bdu:2025-14968 | Уязвимость компонента drm/amdkfd ядра операционной системы Linux, позволяющая нарушителю … | 03.12.2025 | 16.02.2026 |
| bdu:2025-14933 | Уязвимость компонента rseq.c ядра операционной системы Linux, позволяющая нарушителю оказ… | 02.12.2025 | 16.02.2026 |
| bdu:2025-14438 | Уязвимость функции elf_swap_shdr() программного средства разработки GNU Binutils, связанн… | 18.11.2025 | 16.02.2026 |
| bdu:2025-14421 | Уязвимость сервера FreeIpa, связанная с недостатками разграничения доступа, позволяющая н… | 18.11.2025 | 16.02.2026 |
| bdu:2025-14122 | Уязвимость функции __iodyn_find_io_region() ядра операционной системы Linux, позволяющая … | 14.11.2025 | 16.02.2026 |
| bdu:2025-14121 | Уязвимость функции arch_sync_kernel_mappings() ядра операционной системы Linux, позволяющ… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14120 | Уязвимость функции __populate_section_memmap() ядра операционной системы Linux, позволяющ… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14119 | Уязвимость функции set_track_prepare() ядра операционной системы Linux, позволяющая наруш… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14118 | Уязвимость функции batadv_nc_skb_decode_packet() ядра операционной системы Linux, позволя… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14117 | Уязвимость функции ocfs2_delete_osb() ядра операционной системы Linux, позволяющая наруши… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14116 | Уязвимость компонента scsi ядра операционной системы Linux, позволяющая нарушителю вызват… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14114 | Уязвимость функции __cifs_sfu_make_node() ядра операционной системы Linux, позволяющая на… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14100 | Уязвимость функции do_sme_acc() ядра операционной системы Linux, позволяющая нарушителю в… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14099 | Уязвимость функции bpf_exec_tx_verdict() компонента bpf ядра операционной системы Linux, … | 14.11.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200610-0022 | User interface inconsistency in Workgroup Manager in Apple Mac OS X 10.4 through 10.4.7 a… | 2024-07-23T21:56:15.078000Z |
| var-200905-0505 | Array index error in the insertItemBefore method in WebKit, as used in Apple Safari befor… | 2024-07-23T21:56:07.125000Z |
| var-201912-0618 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:36.712000Z |
| var-202112-2011 | Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 an… | 2024-07-23T21:55:35.394000Z |
| var-201810-0932 | The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side chan… | 2024-07-23T21:55:35.727000Z |
| var-201210-0063 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:55:35.147000Z |
| var-200809-0182 | ImageIO in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows context-dependent attack… | 2024-07-23T21:55:33.188000Z |
| var-201903-0417 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:16.315000Z |
| var-201912-0597 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:55:13.309000Z |
| var-200809-0009 | ImageIO in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows context-dependent attack… | 2024-07-23T21:55:12.610000Z |
| var-201704-1589 | In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server t… | 2024-07-23T21:55:11.835000Z |
| var-200911-0398 | The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Int… | 2024-07-23T21:54:40.707000Z |
| var-201912-0128 | A logic issue was addressed with improved state management. This issue is fixed in watchO… | 2024-07-23T21:54:39.274000Z |
| var-201502-0366 | named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when D… | 2024-07-23T21:54:05.549000Z |
| var-201006-1183 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2024-07-23T21:53:56.790000Z |
| var-202003-1784 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:53:51.536000Z |
| var-201302-0132 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:53:51.971000Z |
| var-201711-0447 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:53:49.059000Z |
| var-201805-0963 | Systems with microprocessors utilizing speculative execution and speculative execution of… | 2024-07-23T21:53:48.206000Z |
| var-200102-0104 | "Multiple Users" Control Panel in Mac OS 9 allows Normal users to gain Owner privileges b… | 2024-07-23T21:53:48.441000Z |
| var-201403-0387 | Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python … | 2024-07-23T21:53:47.789000Z |
| var-201208-0344 | libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, does not pro… | 2024-07-23T21:53:17.145000Z |
| var-201910-1495 | The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print… | 2024-07-23T21:53:16.217000Z |
| var-201912-0579 | A logic issue existed in the handling of synchronous page loads. This issue was addressed… | 2024-07-23T21:53:15.777000Z |
| var-200905-0196 | racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denia… | 2024-07-23T21:53:12.318000Z |
| var-200609-0315 | Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary c… | 2024-07-23T21:53:10.410000Z |
| var-202212-1751 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2024-07-23T21:52:34.161000Z |
| var-201404-0398 | Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 an… | 2024-07-23T21:52:34.093000Z |
| var-201008-0172 | Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType befor… | 2024-07-23T21:52:33.872000Z |
| var-202108-2172 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:52:30.241000Z |